ChangeAuditor 5.7. What s New

Size: px
Start display at page:

Download "ChangeAuditor 5.7. What s New"

Transcription

1 ChangeAuditor 5.7 What s New

2 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement. This software may be used or copied only in accordance with the terms of the applicable agreement. No part of this guide may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording for any purpose other than the purchaser s personal use without the written permission of Quest Software, Inc. The information in this document is provided in connection with Quest products. No license, express or implied, by estoppel or otherwise, to any intellectual property right is granted by this document or in connection with the sale of Quest products. EXCEPT AS SET FORTH IN QUEST'S TERMS AND CONDITIONS AS SPECIFIED IN THE LICENSE AGREEMENT FOR THIS PRODUCT, QUEST ASSUMES NO LIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS, IMPLIED OR STATUTORY WARRANTY RELATING TO ITS PRODUCTS INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT. IN NO EVENT SHALL QUEST BE LIABLE FOR ANY DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL DAMAGES (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION OR LOSS OF INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN IF QUEST HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Quest makes no representations or warranties with respect to the accuracy or completeness of the contents of this document and reserves the right to make changes to specifications and product descriptions at any time without notice. Quest does not make any commitment to update the information contained in this document. If you have any questions regarding your potential use of this material, contact: Quest Software World Headquarters LEGAL Dept 5 Polaris Way Aliso Viejo, CA Refer to our Web site for regional and international office information. Patents This product is protected by U.S. Patent #7,979,494. Additional Patents Pending. Trademarks Quest, Quest Software, the Quest Software logo, ActiveRoles, ChangeAuditor, Defender, GPOADmin, InTrust, and Quest Authentication Services are trademarks and registered trademarks of Quest Software, Inc in the United States of America and other countries. For a complete list of Quest Software s trademarks, please see Other trademarks and registered trademarks are property of their respective owners. Third Party Contributions ChangeAuditor contains some third party components. For a complete list, see the Third Party Components page in the ChangeAuditor online help. ChangeAuditor What s New March 2012 Version 5.7

3 TABLE OF CONTENTS About Quest Software Contacting Quest Software Contacting Quest Support What s New in ChangeAuditor ChangeAuditor for SharePoint ChangeAuditor for VMware vcenter Web Based Administrative Console and Dashboards ChangeAuditor for NetApp: Additional NetApp Classes Improved Integration with Other Quest Products Quest GPOADmin ChangeAuditor for Quest Authentication Services (QAS) Improved Logging of User Activity Windows 2008 GPO Support Alert Notification Enhancements What s New In ChangeAuditor ActiveRoles Server Integration New Searching Capabilities Search for Events Based on Originating Workstation Search for Events Based on Event Result Status Include Events Generated by ARS Ability to Capture Events Based on Result Database Maintenance Enhancements More Purge Options New Purge/Archive Once Option Alert History Purge Job ChangeAuditor for Exchange: Shared Mailbox Support ChangeAuditor for Exchange: Expanded Coverage of Exchange ChangeAuditor for SQL Server: Auditing Enhancements Audit All Instances on SQL Server Column Filtering Enhancements What s New In ChangeAuditor EMC Auditing and Event Logging NetApp Auditing and Event Logging Software Development Kit (SDK) Capture Originating IP/Workstation in Events Exclude Accounts from Object Protection Expanded Coverage of Exchange Auditing Expanded Exchange 2010 Auditing Entourage Support New Built-in Searches LDAP Encryption FIPS Compatibility

4 Quest ChangeAuditor What s New In ChangeAuditor SQL Server Auditing and Event Logging LDAP Query Auditing Exchange 2010 Auditing Integration with Quest Defender Ability to Construct Searches and Alerts Using Wildcard Expressions SQL Reporting Services Templates Enhancements to Object Protection Feature Enhancements to Customize Alert s Ability to Search for Blank Comments User Interface Enhancements What s New in ChangeAuditor What s New for ChangeAuditor Users Event Logging Originating Workstation Reporting Services Integration Object Protection What s New for InTrust Plug-in Users In-depth Auditing for Registry, Local Users and Groups, and Services Single Download Package Internal Auditing Enhanced User Interface Filtering and Grouping Dashboards / Executive Summary Integration with Recovery Manager for AD (RMAD) System Center Operations Manager (SCOM) Integration What s New for both ChangeAuditor and InTrust Plug-in Users Role-based Access Auto Agent Deployment Support for Windows Server 2008 R2 and Windows Integration with Quest Authentication Services

5 About Quest Software Established in 1987, Quest Software (Nasdaq: QSFT) provides simple and innovative IT management solutions that enable more than 100,000 global customers to save time and money across physical and virtual environments. Quest products solve complex IT challenges ranging from database management, data protection, identity and access management, monitoring, user workspace management to Windows management. For more information, visit Contacting Quest Software Mail Web site Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA USA Please refer to our Web site for regional and international office information. Contacting Quest Support Quest Support is available to customers who have a trial version of a Quest product or who have purchased a Quest product and have a valid maintenance contract. Quest Support provides unlimited 24x7 access to our Support Portal at From our Support Portal, you can do the following: Review thousands of solutions from our Knowledge Base Download the latest releases and service packs Create, update and review Support cases View the Global Support Guide for a detailed explanation of support programs, online services, contact information, policies and procedures. The guide is available at: 5

6 Quest ChangeAuditor What s New in ChangeAuditor 5.7 ChangeAuditor for SharePoint Auditing your SharePoint platform is critical to maintaining internal security controls and meeting external auditing regulation requirements. ChangeAuditor for SharePoint tracks operations across your SharePoint environment, providing comprehensive auditing and reporting that tells you who, what, when and where changes are being made to SharePoint configuration, documents, lists and sites. ChangeAuditor for SharePoint provides built-in queries and reports that focus on auditing the following areas: access to content in SharePoint sites modifications of content (creation, modification and deletion) changes to permissions and security settings ChangeAuditor for VMware vcenter This new auditing capability, which is available in the core ChangeAuditor solution, provides centralized auditing for VMware vcenter based installations. ChangeAuditor for VMware vcenter provides built-in queries and reports that identify and report against activities of vcenter security changes, ESX (and ESXi) hosts, clusters and resource pools, virtual machines, tasks and alerts, and user and self-auditing. Web Based Administrative Console and Dashboards The new web based portal allows users who do not require access to the configuration or operational information in ChangeAuditor to run searches and reports on the data collected by ChangeAuditor. It provides access to valuable information about ChangeAuditor and the audited events being captured. When viewing ChangeAuditor data using a standard browser, in addition to the pre-defined overviews, you can create custom views, which can then be shared with other users interested in viewing the selected ChangeAuditor data. ChangeAuditor for NetApp: Additional NetApp Classes New no from-value event classes have been added to ChangeAuditor for NetApp which allow you to audit security events asynchronously. The current security events that return a from value require synchronous event exchange and therefore can have a negative impact on performance. Whereas, the new no from-value events allow ChangeAuditor to connect and use asynchronous interfaces. These new security events are intended for users that are experiencing network degradation when security events are enabled. 6

7 What s New in ChangeAuditor 5.7 Improved Integration with Other Quest Products Quest GPOADmin Quest GPOADmin uses a proxy account (service account) to connect and make changes to Active Directory objects and group policies. In past releases, ChangeAuditor only captured the service account name in the event details for GPO deployment operations initiated through GPOADmin. GPOADmin now integrates with ChangeAuditor and allows the name of the user that initiated the GPO deployment operation and comments to be displayed in the ChangeAuditor Client. ChangeAuditor for Quest Authentication Services (QAS) ChangeAuditor for QAS queries Active Directory for modifications made to the QAS configuration container. In past releases, you needed to install QAS on the domain controller being used to perform the GPO change in order to capture the QAS GPO events. In ChangeAuditor for QAS 5.7, the QAS settings provider is now packaged with the ChangeAuditor Agent, therefore this requirement is no longer necessary. Improved Logging of User Activity With this release, ChangeAuditor adds functionality to capture and display the user name for password reset events as well as service control actions (start, stop, etc.). Windows 2008 GPO Support ChangeAuditor now audits additional Group Policies that were added to Microsoft Windows 2008 R2. Alert Notification Enhancements Alerts are key to ChangeAuditor. In this release, we ve added the capability to configure (enable or disable) alert notifications on multiple searches all at once. We ve also created a method to allow additional parameterized values to be used in the To field of alert notification s. Parameterized values that can be added to the To field now include: %WHO% - Adding this parameter will send an alert to the user who initiated the change that triggered the alert. %OWNER% - Adding this parameter will send an alert to the Exchange Mailbox owner whose mailbox was accessed by another user and their action triggered an alert. (This feature only applies to Exchange Mailbox Monitoring, which is available in ChangeAuditor for Exchange.) %MANAGEDBY% - For events associated with groups that are being managed by another account, adding this parameter will send an alert to the managing user s . 7

8 Quest ChangeAuditor What s New In ChangeAuditor 5.6 ActiveRoles Server Integration ActiveRoles Server (ARS) uses a proxy account (service account) to connect and make changes to Active Directory objects and group policies. In past releases, ChangeAuditor only captured the service account name in the event details for changes initiated through ARS. ChangeAuditor now provides a means for deploying scripts to an ARS server which signals ARS to retrieve and send the name of the user that was logged into the ARS client to ChangeAuditor. Once the ChangeAuditor/ARS integration script is deployed, the initiator information retrieved from ActiveRoles Server can be viewed in the ChangeAuditor Client. The following features have been added to the ChangeAuditor 5.6 Client to provide you with this new information: New Source field on the Event Details pane. New All Active Directory Events Including ActiveRoles Initiator built-in report which includes both the Initiator UserName and EventSource in the search results. New Initiator UserName, Initiator SID, and EventSource columns on the Advanced tab allowing you to add this information to other search definitions. New option on the Who tab that allows you to create a custom search to search for events initiated by a specific user, including those generated through ARS. New tags which allow you to add the ARS initiator information to alert notifications. New Searching Capabilities Search for Events Based on Originating Workstation A new Origin tab has been added to the Search Properties tabs allowing you to search for events that originated from a specific workstation. You can enter a wildcard expression to search for a workstation based on its NetBIOS name or IP address. Search for Events Based on Event Result Status Using the What tab, you can now search for events based on the result (none, success, protected or failed) of the operation mentioned in the event. Include Events Generated by ARS A new option has been added to the Who tab, Include Event Source Initiator, which when selected instructs ChangeAuditor to retrieve all change events made by the specified user account, including those initiated by ARS. In addition, a new column is added to the Search Results grid to display the user account that initiated the change using ARS. 8

9 What s New In ChangeAuditor 5.6 Ability to Capture Events Based on Result By default, ChangeAuditor captures change events regardless of the result of the operation mentioned in the event. However, ChangeAuditor now allows you to specify which events are to be captured based on the event result: All Results (default) Success Only Success and Failed Only Success and Protected Only This feature helps eliminate events that you are not interested in capturing. For example, if you only want to capture successful events where the operation occurred as stated in the event, you would set this to Success Only. Then, if the change did not occur as stated in the event (because the object was protected by ChangeAuditor or the operation did not occur due to a factor/setting outside of ChangeAuditor s control) the associated event would not be captured. Database Maintenance Enhancements More Purge Options The Select Purge Options page in the Database Maintenance wizard has been redesigned allowing you to choose the records to be deleted from the production database based on the following criteria: Who - purge events generated by a specific user, computer or group What - purge events based on subsystem, event class, object class, severity or result Where - purge events captured by a specific agent, domain or site Origin - purge events originating from a specific workstation Comments - purge events that contain a specific comment New Purge/Archive Once Option The Schedule Database Maintenance page in the Database Maintenance wizard now contains an option where you can specify to archive/purge data one time only. Alert History Purge Job ChangeAuditor now allows you to define a purge job to delete alert history that is older than the specified time interval. 9

10 Quest ChangeAuditor ChangeAuditor for Exchange: Shared Mailbox Support In past releases, ChangeAuditor for Exchange did not distinguish between individual and shared mailboxes. Therefore, all access to shared mailboxes was treated as a non-owner event which had the potential of overwhelming the ChangeAuditor agent on the Exchange store. ChangeAuditor for Exchange now generates shared mailbox events for Exchange 2007 and 2010 shared mailbox, room and equipment resources, and for any other mailboxes that the user has identified as shared. ChangeAuditor for Exchange: Expanded Coverage of Exchange 2010 Many new events associated with Exchange 2010 and Exchange 2010 SP1 have been added. ChangeAuditor for SQL Server: Auditing Enhancements Audit All Instances on SQL Server An additional option has been added to the first page of the SQL Auditing wizard allowing you to audit all SQL instances on the server. Column Filtering Enhancements In the past, when multiple filters were specified on the third page of the SQL Auditing wizard, they were ANDed together and all of the criteria specified had to be met in order to be included in SQL auditing. Now, you can change this AND operator to an OR for a filter, so that only one of the filters must be met in order to be considered a match. 10

11 What s New In ChangeAuditor 5.5 What s New In ChangeAuditor 5.5 EMC Auditing and Event Logging ChangeAuditor for EMC helps ensure the security, compliance and control of files and folders by tracking, auditing, reporting and alerting on EMC Celerra changes in real time. With ChangeAuditor for EMC, administrators can report on and analyze events and changes without the complexity and time required by native auditing or concerns over system performance. In addition to real-time auditing, you can also enable event logging to capture EMC Celerra events locally in a Windows event log. These event logs can then be collected using Quest InTrust to satisfy long-term storage requirements. NetApp Auditing and Event Logging ChangeAuditor for NetApp helps ensure the security, compliance and control of files and folders by tracking, auditing, reporting and alerting on NetApp filer changes in real time. With ChangeAuditor for NetApp, administrators can report on and analyze events and changes without the complexity and time required by native auditing or concerns over system performance. In addition to real-time auditing, you can also enable event logging to capture NetApp filer events locally in a Windows event log, which can then be collected using Quest InTrust to satisfy long-term storage requirements. Software Development Kit (SDK) The new Software Development Kit in ChangeAuditor 5.5 provides a powerful tool that enables administrators to capture user-defined audit events generated from third-party applications. These audited events can then be displayed either in the ChangeAuditor Client or another application s console. Capture Originating IP/Workstation in Events Since ChangeAuditor 5.0, the event details for most audited events include the workstation name or IP address of the originating system (workstation or server). Now in ChangeAuditor 5.5, this same originating IP/workstation information is also available for Account Lockout and SQL events. Exclude Accounts from Object Protection ChangeAuditor now allows you to protect objects from being accessed by specified accounts. That is, using this feature you can specify to allow everyone to access the resource except those listed in the protection template. 11

12 Quest ChangeAuditor Expanded Coverage of Exchange Auditing Expanded Exchange 2010 Auditing ChangeAuditor for Exchange now supports Exchange 2010 SP1. In addition, new events associated with Exchange 2010 and Exchange 2010 SP1 have been added, such as: User Mailbox Properties Calendar settings Remove meeting forward notifications to the Deleted Items Folder Remove old meeting requests and responses Mark new meeting requests as Tentative Process meeting requests and responses originating outside the Exchange organization Room, Linked, Equipment Mailbox Properties Resource General Tab section Resource Policy Tab section Resource Information Tab section Resource In-Policy Requests Resource Out-of-Policy Requests Mobile Devices List the mobile phones or devices for a specific user Initiate remote wipes on mobile phones or devices Remove old mobile phone or device partnerships Create a rule for all users of a specific mobile phone or device or mobile phone type Allow or block a specific mobile phone or device for the specific user Entourage Support ChangeAuditor for Exchange now supports Entourage for Exchange Web Services (EWS), the Microsoft client developed for the Macintosh. New Built-in Searches Additional built-in searches provide more coverage of LDAP activities. For example, the new LDAP searches are designed to assist with Active Directory forest migrations and query optimizations. LDAP Encryption ChangeAuditor for Active Directory and ChangeAuditor for LDAP events now display whether or not the client network connection was encrypted with SSL/TLS and also if it was Signed and Sealed. FIPS Compatibility 12 ChangeAuditor 5.5 now supports Group Policy "System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing".

13 What s New In ChangeAuditor 5.1 What s New In ChangeAuditor 5.1 SQL Server Auditing and Event Logging ChangeAuditor for SQL Server provides database auditing to secure SQL database assets with extensive, customizable auditing and reporting for all critical SQL Server changes including broker, database, object, performance, and transaction events, plus errors and warnings. ChangeAuditor for SQL Server helps tighten enterprise-wide change and control policies by tracking user and administrator activity such as database additions and deletions, granting and removing SQL access, etc. LDAP Query Auditing ChangeAuditor for LDAP monitors directory access across all domain controllers in the environment and aggregates that information in a central database identifying LDAP-enabled applications and how they use Active Directory. The LDAP access data gathered by ChangeAuditor for LDAP can then be used during Active Directory forest migration and restructuring projects. Exchange 2010 Auditing With the release of 5.1, the ChangeAuditor for Exchange module has been expanded to proactively audit the activities taking place in your Exchange 2010 environment. Integration with Quest Defender Quest Defender enhances security by enabling two-factor authentication to network, Web, and applications-based resources. Defender was designed to base all administration and identity management on an organization s existing investment in Active Directory and eliminates the costs and time involved in setting up and maintaining proprietary databases. ChangeAuditor for Defender tracks changes to user accounts enabled with Defender tokens in Active Directory. Ability to Construct Searches and Alerts Using Wildcard Expressions Using ChangeAuditor, you have always been able to run detailed searches and enable alerts based on user-defined criteria and customize the report templates to fit the needs of your organization. However, now in ChangeAuditor 5.1, you can use wildcard expressions to construct searches and alerts. That is, you can specify either the Like or Not Like comparison operator and a pattern (character string and * wildcard character) to be used to search for an Active Directory or Group Policy object, user or group, or an agent, domain or site. 13

14 Quest ChangeAuditor SQL Reporting Services Templates ChangeAuditor allows you to define SQL Reporting Services (SRS) templates that define all the necessary Report Server and ChangeAuditor data source information for publishing reports. These templates can then be made available to users to publish ChangeAuditor reports to SRS. That is, when an authorized user attempts to publish a ChangeAuditor report to SRS using the Create Report(s) Using SQL Reporting Services right-click command on the Searches page, they can use the Import SRS Settings button on the Reporting Services Setup dialog to import the settings defined in an SQL Reporting Services template to publish their reports. Enhancements to Object Protection Feature The Active Directory and Group Policy protection wizards now include an additional page that allow you to optionally assign template ownership to another user or group. In addition, you can now use ChangeAuditor for Windows File Servers to protect file shares. Enhancements to Customize Alert s Using the Alert Custom dialog you can now send alerts to: the user who initiated the change that triggered the alert the Exchange Mailbox owner whose mailbox was accessed by another user. (This feature only applies to Exchange Mailbox Monitoring, which is available in ChangeAuditor for Exchange.) Ability to Search for Blank Comments In additional to searching for a string of characters in a comment, you can now search for blank comments or comments that do not contain a specific string of characters. User Interface Enhancements The ChangeAuditor client has undergone some enhancements, including: Ability to Hide Unlicensed Components - when on the Administration Tasks tab, you can use the Action Hide Unlicensed Components menu command to hide unlicensed components from the Administration Tasks tab and unavailable events throughout the client. Redesign of Navigation Pane in Administration Tasks Tab - using the new redesigned navigation pane, you can open individual task lists. In addition, you can quickly see which templates are global and which ones need to be assigned to an agent configuration. Ability to Show Count of Events of License Type - an additional Overview pane is now available on the Overview page where you can show the number of events generated per licensed component. 14

15 What s New in ChangeAuditor 5.0 What s New in ChangeAuditor 5.0 ChangeAuditor provides total auditing and security coverage for Microsoft infrastructures including Active Directory, Exchange and Windows File Servers. ChangeAuditor audits the activities taking place in your infrastructure and, with real-time alerts, delivers detailed information about vital changes and activities as they occur. What s New for ChangeAuditor Users For existing ChangeAuditor customers, ChangeAuditor 5.0 includes the following new features: Event Logging With ChangeAuditor 5.0, in addition to real-time event auditing, you can optionally enable event logging to capture all activity locally in a Windows event log. These event logs can then be captured by Quest InTrust and stored in the InTrust Repository for efficient long term retention. Originating Workstation ChangeAuditor s enhanced audit data now includes the workstation name or IP address of the originating system (workstation or server). Reporting Services Integration ChangeAuditor reports can now be published to Quest Knowledge Portal in addition to SQL Reporting Services for streamlined report generation and automated delivery. To use this extended reporting capability, you must enable event logging within the ChangeAuditor Client. These event logs can then be collected using the Quest InTrust framework and imported into the InTrust database for forensic analysis from the Quest Knowledge Portal. Object Protection The object protection features new to ChangeAuditor 5.0 enable administrators to prevent accidental and unauthorized modifications and deletions to critical object in Active Directory by effectively securing these objects against potentially dangerous changes (add, move, modify, delete). 15

16 Quest ChangeAuditor ChangeAuditor provides proactive protection against unwanted changes to critical Active Directory objects, Group Policy objects, ADAM (AD LDS) objects, Exchange mailboxes, and Windows files and folders. What s New for InTrust Plug-in Users For existing InTrust Plug-in customers, ChangeAuditor 5.0 includes the following new features: In-depth Auditing for Registry, Local Users and Groups, and Services ChangeAuditor provides extensive auditing coverage for registry, local users and groups, and Windows services. With these auditing features, ChangeAuditor ensures that administrators can track, alert and identify these type of changes, providing unprecedented visibility into the changes that are made and the impact those changes have on the environment. In addition, you can optionally enable event logging for Registry, Service and/or Local Account events -- writing them to a Windows event log which can be gathered by Quest InTrust and Quest Knowledge Portal for further processing and reporting. Single Download Package Similar to the InTrust Plug-ins, ChangeAuditor uses a modular approach which allows for separate product deployment and management for key environments including Active Directory, Exchange and Windows File Servers. However, all ChangeAuditor modules are included in one package and it is the license keys that unlock the features specific to the different modules. Therefore, you now only need to download and install a single product instead of separate plug-in modules. 16

17 What s New in ChangeAuditor 5.0 Internal Auditing All administrative activity performed within the ChangeAuditor Client is automatically captured and can optionally be recorded to a Windows event log. This event log can then be collected using Quest InTrust to satisfy long-term storage requirements. Enhanced User Interface ChangeAuditor gives you the power to audit your Windows network s most visible and business-critical applications - all from a single client. The ChangeAuditor Client shows all events captured in real-time simplifying troubleshooting and analysis. Once ChangeAuditor captures an audited event, it provides several flexible ways to generate meaningful reports. All audited event information is displayed in ChangeAuditor s Client and its built-in reports provide views for the most common and complex requests. You can view configuration changes from a variety of perspectives. You can view all changes at a particular site. You can view changes made during a specific time frame. You can view the changes performed by a particular administrator. You can even run detailed searches based on user-defined criteria and customize the report templates to fit the needs of your organization. Filtering and Grouping The ChangeAuditor Client provides advanced filtering and grouping capabilities that allow users to modify the results of a search without changing the original search -- making it easy for users to find the events they are looking for and ultimately reducing the need to build the same search multiple times with minor customizations. Dashboards / Executive Summary Every search can quickly render the results into a pie chart or bar graph perfect for upper-level management to quickly see what s going on. 17

18 Quest ChangeAuditor Integration with Recovery Manager for AD (RMAD) By installing ChangeAuditor for Active Directory in Recovery Manager s home forest, administrators can run reports from the RMAD console to show who modified or deleted specific Active Directory objects. To be more specific, through this integration, the Recovery Manager comparison reports on Active Directory objects can include who (which user account) modified the objects being reported. System Center Operations Manager (SCOM) Integration ChangeAuditor includes an extremely efficient and robust SCOM Management Pack which can be configured to complement SCOM and send ChangeAuditor audited events and alert information to the SCOM console. What s New for both ChangeAuditor and InTrust Plug-in Users In addition to the features mentioned above, ChangeAuditor 5.0 provides the following new features and product enhancements to both ChangeAuditor and InTrust Plug-in customers: Role-based Access ChangeAuditor now allows administrators to control user access through granular, role-based permissions to ensure users are permitted to access only what they need in the ChangeAuditor Client. Using the Authorization tasks available on the Administration Tasks tab, administrators can restrict access as follows: Using the Application User Interface Authorization feature administrators can define who is authorized to perform the different operations available within the ChangeAuditor Client. Using the Active Directory Protection Authorization feature administrators can specify who is authorized to define Active Directory protection for a given domain or organizational unit. 18

19 What s New in ChangeAuditor 5.0 Auto Agent Deployment Integrated within the ChangeAuditor Client, administrators can install and upgrade agents on demand or on a schedule. The Auto Agent Deployment feature allows administrators to automatically deploy a ChangeAuditor Agent to any new servers that are added to the forest. Administrators can automatically deploy agents to all new servers or those in selected containers, based on OU membership for instance. Support for Windows Server 2008 R2 and Windows 7 ChangeAuditor 5.0 provides support for Windows Server 2008 R2 and Windows 7, as follows: The ChangeAuditor Client can be installed on Windows Server 2008 R2 or Windows 7 computers. The ChangeAuditor Coordinator can be installed on Windows Server 2008 R2 computers. ChangeAuditor Agents can be deployed to Windows Server 2008 R2 computers. Integration with Quest Authentication Services Quest Authentication Services (formerly Vintela Authentication Services) is patented technology that enables organizations to extend the security and compliance of Active Directory to Unix, Linux and Mac platforms and enterprise applications. Leveraging ChangeAuditor for Quest Authentication Services, users of Authentication Services can now track, audit, report and alert on all critical changes to: Unix/Linux/Mac-related data for Active Directory users, groups, computers, NIS objects and QAS personalities Unix/Linux/Max settings in Group Policy Objects 19

Quest ChangeAuditor 5.1 FOR ACTIVE DIRECTORY. User Guide

Quest ChangeAuditor 5.1 FOR ACTIVE DIRECTORY. User Guide Quest ChangeAuditor FOR ACTIVE DIRECTORY 5.1 User Guide Copyright Quest Software, Inc. 2010. All rights reserved. This guide contains proprietary information protected by copyright. The software described

More information

FOR WINDOWS FILE SERVERS

FOR WINDOWS FILE SERVERS Quest ChangeAuditor FOR WINDOWS FILE SERVERS 5.1 User Guide Copyright Quest Software, Inc. 2010. All rights reserved. This guide contains proprietary information protected by copyright. The software described

More information

ChangeAuditor 6.0 For Windows File Servers. Event Reference Guide

ChangeAuditor 6.0 For Windows File Servers. Event Reference Guide ChangeAuditor 6.0 For Windows File Servers Event Reference Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

ChangeAuditor 5.6. For Windows File Servers Event Reference Guide

ChangeAuditor 5.6. For Windows File Servers Event Reference Guide ChangeAuditor 5.6 For Windows File Servers Event Reference Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Quick Connect Express for Active Directory

Quick Connect Express for Active Directory Quick Connect Express for Active Directory Version 5.2 Quick Start Guide 2012 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in

More information

ChangeAuditor 6.0. Web Client User Guide

ChangeAuditor 6.0. Web Client User Guide ChangeAuditor 6.0 Web Client User Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

4.0. Offline Folder Wizard. User Guide

4.0. Offline Folder Wizard. User Guide 4.0 Offline Folder Wizard User Guide Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this

More information

Quest ChangeAuditor 4.8

Quest ChangeAuditor 4.8 Quest ChangeAuditor 4.8 Migration Guide Copyright Quest Software, Inc. 2009. All rights reserved. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Foglight. Foglight for Virtualization, Free Edition 6.5.2. Installation and Configuration Guide

Foglight. Foglight for Virtualization, Free Edition 6.5.2. Installation and Configuration Guide Foglight Foglight for Virtualization, Free Edition 6.5.2 Installation and Configuration Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.

More information

Defender Delegated Administration. User Guide

Defender Delegated Administration. User Guide Defender Delegated Administration User Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

2.0. Quick Start Guide

2.0. Quick Start Guide 2.0 Quick Start Guide Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this guide is furnished

More information

Dell InTrust 11.0. Preparing for Auditing and Monitoring Microsoft IIS

Dell InTrust 11.0. Preparing for Auditing and Monitoring Microsoft IIS Preparing for Auditing and Monitoring Microsoft IIS 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

formerly Help Desk Authority 9.1.2 Quest Free Network Tools User Manual

formerly Help Desk Authority 9.1.2 Quest Free Network Tools User Manual formerly Help Desk Authority 9.1.2 Quest Free Network Tools User Manual 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo,

More information

Foglight. Managing Hyper-V Systems User and Reference Guide

Foglight. Managing Hyper-V Systems User and Reference Guide Foglight Managing Hyper-V Systems User and Reference Guide 2014 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this

More information

Dell Spotlight on Active Directory 6.8.3. Server Health Wizard Configuration Guide

Dell Spotlight on Active Directory 6.8.3. Server Health Wizard Configuration Guide Dell Spotlight on Active Directory 6.8.3 Server Health Wizard Configuration Guide 2013 Dell Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software

More information

Enterprise Reporter Report Library

Enterprise Reporter Report Library Enterprise Reporter Overview v2.5.0 This document contains a list of the reports in the Enterprise Reporter. Active Directory Reports Change History Reports Computer Reports File Storage Analysis Reports

More information

Quest Collaboration Services 3.6.1. How it Works Guide

Quest Collaboration Services 3.6.1. How it Works Guide Quest Collaboration Services 3.6.1 How it Works Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Spotlight Management Pack for SCOM

Spotlight Management Pack for SCOM Spotlight Management Pack for SCOM User Guide January 2015 The is used to display data from alarms raised by Spotlight on SQL Server Enterprise in SCOM (System Center Operations Manager). About System

More information

Foglight 5.6.5.2. Managing SQL Server Database Systems Getting Started Guide. for SQL Server

Foglight 5.6.5.2. Managing SQL Server Database Systems Getting Started Guide. for SQL Server Foglight for SQL Server 5.6.5.2 Managing SQL Server Database Systems Getting Started Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.

More information

formerly Help Desk Authority 9.1.3 HDAccess Administrator Guide

formerly Help Desk Authority 9.1.3 HDAccess Administrator Guide formerly Help Desk Authority 9.1.3 HDAccess Administrator Guide 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656

More information

7.5 7.5. Spotlight on Messaging. Evaluator s Guide

7.5 7.5. Spotlight on Messaging. Evaluator s Guide 7.5 Spotlight on Messaging 7.5 Evaluator s Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Dell InTrust 11.0 Best Practices Report Pack

Dell InTrust 11.0 Best Practices Report Pack Complete Product Name with Trademarks Version Dell InTrust 11.0 Best Practices Report Pack November 2014 Contents About this Document Auditing Domain Controllers Auditing Exchange Servers Auditing File

More information

Foglight 5.6.4. Managing SQL Server Database Systems Getting Started Guide. for SQL Server

Foglight 5.6.4. Managing SQL Server Database Systems Getting Started Guide. for SQL Server Foglight for SQL Server 5.6.4 Managing SQL Server Database Systems Getting Started Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.

More information

8.7. Resource Kit User Guide

8.7. Resource Kit User Guide 8.7 Resource Kit User Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected by copyright. The software described in this document is furnished under

More information

10.6. Auditing and Monitoring Quest ActiveRoles Server

10.6. Auditing and Monitoring Quest ActiveRoles Server 10.6 Auditing and Monitoring Quest ActiveRoles Server 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Foglight. Foglight for Virtualization, Enterprise Edition 7.2. Virtual Appliance Installation and Setup Guide

Foglight. Foglight for Virtualization, Enterprise Edition 7.2. Virtual Appliance Installation and Setup Guide Foglight Foglight for Virtualization, Enterprise Edition 7.2 Virtual Appliance Installation and Setup Guide 2014 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected

More information

Dell Change Auditor 6.5. User Guide

Dell Change Auditor 6.5. User Guide Dell Change Auditor 6.5 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license

More information

Dell Recovery Manager for Active Directory 8.6. Quick Start Guide

Dell Recovery Manager for Active Directory 8.6. Quick Start Guide Dell Recovery Manager for Active Directory 8.6 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

2007 Quest Software, Inc. ALL RIGHTS RESERVED. TRADEMARKS. Disclaimer

2007 Quest Software, Inc. ALL RIGHTS RESERVED. TRADEMARKS. Disclaimer What s New 6.7 2007 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license

More information

Quest InTrust for Active Directory. Product Overview Version 2.5

Quest InTrust for Active Directory. Product Overview Version 2.5 Quest InTrust for Active Directory Product Overview Version 2.5 Copyright Quest Software, Inc. 2006. All rights reserved. This guide contains proprietary information, which is protected by copyright. The

More information

6.7. Quick Start Guide

6.7. Quick Start Guide 6.7 Quick Start Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software

More information

Dell InTrust 11.0. Preparing for Auditing Microsoft SQL Server

Dell InTrust 11.0. Preparing for Auditing Microsoft SQL Server 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

Quest Collaboration Services 3.5. How it Works Guide

Quest Collaboration Services 3.5. How it Works Guide Quest Collaboration Services 3.5 How it Works Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Foglight. Dashboard Support Guide

Foglight. Dashboard Support Guide Foglight Dashboard Support Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

Foglight for Oracle. Managing Oracle Database Systems Getting Started Guide

Foglight for Oracle. Managing Oracle Database Systems Getting Started Guide Foglight for Oracle Managing Oracle Database Systems Getting Started Guide 2014 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software

More information

Security Explorer 9.5. User Guide

Security Explorer 9.5. User Guide 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

Foglight 1.0.0.0. Cartridge for Active Directory Installation Guide

Foglight 1.0.0.0. Cartridge for Active Directory Installation Guide Foglight 1.0.0.0 Cartridge for Active Directory Installation Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Dell Enterprise Reporter 2.5. Configuration Manager User Guide

Dell Enterprise Reporter 2.5. Configuration Manager User Guide Dell Enterprise Reporter 2.5 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license

More information

Security Analytics Engine 1.0. Help Desk User Guide

Security Analytics Engine 1.0. Help Desk User Guide 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

Dell Client Profile Updating Utility 5.5.6

Dell Client Profile Updating Utility 5.5.6 Complete Product Name with Trademarks Version Dell 5.5.6 April 21, 2015 These release notes provide information about the Dell release. Welcome to What's New Known issues Upgrade and Compatibility System

More information

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 May 2015 This guide describes how to configure Microsoft Office 365 for use with Dell One Identity Cloud Access Manager

More information

About Recovery Manager for Active

About Recovery Manager for Active Dell Recovery Manager for Active Directory 8.6.1 May 30, 2014 These release notes provide information about the Dell Recovery Manager for Active Directory release. About Resolved issues Known issues System

More information

DATA GOVERNANCE EDITION

DATA GOVERNANCE EDITION Quest One Identity Manager DATA GOVERNANCE EDITION 6.1 What s New 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

formerly Help Desk Authority 9.1.3 Upgrade Guide

formerly Help Desk Authority 9.1.3 Upgrade Guide formerly Help Desk Authority 9.1.3 Upgrade Guide 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656 USA www.quest.com

More information

Quest ChangeAuditor 5.1. For Windows File Servers. Events Reference

Quest ChangeAuditor 5.1. For Windows File Servers. Events Reference Quest ChangeAuditor For Windows File Servers 5.1 Events Reference 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Defender 5.7. Remote Access User Guide

Defender 5.7. Remote Access User Guide Defender 5.7 Remote Access User Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Web Portal Installation Guide 5.0

Web Portal Installation Guide 5.0 Web Portal Installation Guide 5.0 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

Built-in Plug-ins User s Guide

Built-in Plug-ins User s Guide Quest NetVault Backup version 9.1 Built-in Plug-ins User s Guide Version: Product Number: NVG-129-9.1-EN-01 NVG-129-9.1-EN-01 05/10/13 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains

More information

Foglight 5.5.5. Managing Microsoft Active Directory Installation Guide

Foglight 5.5.5. Managing Microsoft Active Directory Installation Guide Foglight 5.5.5 Managing Microsoft Active Directory 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Dell Recovery Manager for Active Directory 8.6.0

Dell Recovery Manager for Active Directory 8.6.0 Dell Recovery Manager for Active Directory 8.6.0 April, 2014 These release notes provide information about the Recovery Manager for Active Directory release. About Recovery Manager for Active Directory

More information

Active Directory Change Notifier Quick Start Guide

Active Directory Change Notifier Quick Start Guide Active Directory Change Notifier Quick Start Guide Software version 3.0 Mar 2014 Copyright 2014 CionSystems Inc., All Rights Reserved Page 1 2014 CionSystems Inc. ALL RIGHTS RESERVED. This guide may not

More information

NetVault LiteSpeed for SQL Server version 7.5.0. Integration with TSM

NetVault LiteSpeed for SQL Server version 7.5.0. Integration with TSM NetVault LiteSpeed for SQL Server version 7.5.0 Integration with TSM 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

ActiveRoles 6.8. Web Interface User Guide

ActiveRoles 6.8. Web Interface User Guide ActiveRoles 6.8 Web Interface User Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

8.7. Target Exchange 2010 Environment Preparation

8.7. Target Exchange 2010 Environment Preparation 8.7 Target Exchange 2010 Environment Preparation 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected by copyright. The software described in this document

More information

System Requirements and Platform Support Guide

System Requirements and Platform Support Guide Foglight 5.6.7 System Requirements and Platform Support Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in

More information

10.2. Auditing Cisco PIX Firewall with Quest InTrust

10.2. Auditing Cisco PIX Firewall with Quest InTrust 10.2 Auditing Cisco PIX Firewall with Quest InTrust 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Dell InTrust 11.0. Preparing for Auditing Cisco PIX Firewall

Dell InTrust 11.0. Preparing for Auditing Cisco PIX Firewall 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

Foglight. Managing Java EE Systems Supported Platforms and Servers Guide

Foglight. Managing Java EE Systems Supported Platforms and Servers Guide Foglight Managing Java EE Systems Supported Platforms and Servers Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Top 10 Most Popular Reports in Enterprise Reporter

Top 10 Most Popular Reports in Enterprise Reporter Top 10 Most Popular Reports in Enterprise Reporter Users Rely Most on Reports for Active Directory Security and Operations and File Server Migration Assessment Written by Alexey Korotich, Dell Software

More information

Dell Statistica Document Management System (SDMS) Installation Instructions

Dell Statistica Document Management System (SDMS) Installation Instructions Dell Statistica Document Management System (SDMS) Installation Instructions 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Dell InTrust 11.0. Auditing and Monitoring Microsoft Windows

Dell InTrust 11.0. Auditing and Monitoring Microsoft Windows 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

Dell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud

Dell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud Dell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud February 2015 This guide describes how to deploy Dell One Identity Cloud Access Manager within

More information

Dell Recovery Manager for Active Directory 8.6. Deployment Guide

Dell Recovery Manager for Active Directory 8.6. Deployment Guide Dell Recovery Manager for Active Directory 8.6 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Dell InTrust 11.0. Real-Time Monitoring Guide

Dell InTrust 11.0. Real-Time Monitoring Guide Dell InTrust 11.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure

More information

ActiveRoles 6.9. Quick Start Guide

ActiveRoles 6.9. Quick Start Guide ActiveRoles 6.9 Quick Start Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

Quest vworkspace. System Requirements. Version 7.2 MR1

Quest vworkspace. System Requirements. Version 7.2 MR1 Quest vworkspace System Requirements Version 7.2 MR1 2011 Quest Software, Inc. ALL RIGHTS RESERVED. Patents Pending. This guide contains proprietary information protected by copyright. The software described

More information

Dell Spotlight on Active Directory 6.8.4. Deployment Guide

Dell Spotlight on Active Directory 6.8.4. Deployment Guide Dell Spotlight on Active Directory 6.8.4 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

Spotlight Management Pack for SCOM

Spotlight Management Pack for SCOM Spotlight Management Pack for SCOM User Guide March 2015 The Spotlight Management Pack for SCOM is used to display data from alarms raised by Spotlight on SQL Server Enterprise in SCOM (System Center Operations

More information

Object Level Authentication

Object Level Authentication Toad Intelligence Central Version 2.5 New in This Release Wednesday, 4 March 2015 New features in this release of Toad Intelligence Central: Object level authentication - Where authentication is required

More information

Quick Connect for Cloud Services

Quick Connect for Cloud Services Quick Connect for Cloud Services Version 3.5 Administrator Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Dell One Identity Quick Connect for Cloud Services 3.6.1

Dell One Identity Quick Connect for Cloud Services 3.6.1 Dell One Identity Quick Connect for Cloud Services 3.6.1 March 2015 These release notes provide information about the Dell One Identity Quick Connect for Cloud Services release. About New features Resolved

More information

6.9. Administrator Guide

6.9. Administrator Guide 6.9 Administrator Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software

More information

Quest vworkspace Virtual Desktop Extensions for Linux

Quest vworkspace Virtual Desktop Extensions for Linux Quest vworkspace Virtual Desktop Extensions for Linux What s New Version 7.6 2012 Quest Software, Inc. ALL RIGHTS RESERVED. Patents Pending. This guide contains proprietary information protected by copyright.

More information

Dell One Identity Manager 7.0. Help Desk Module Administration Guide

Dell One Identity Manager 7.0. Help Desk Module Administration Guide Dell 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure

More information

Dell NetVault Backup Plug-in for Advanced Encryption 2.2. User s Guide

Dell NetVault Backup Plug-in for Advanced Encryption 2.2. User s Guide Dell Backup Plug-in for Advanced Encryption 2.2 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Dell Statistica 13.0. Statistica Enterprise Installation Instructions

Dell Statistica 13.0. Statistica Enterprise Installation Instructions Dell Statistica 13.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or

More information

Troubleshooting Guide 5.1. Quest Workspace ChangeBASE

Troubleshooting Guide 5.1. Quest Workspace ChangeBASE Troubleshooting Guide 5.1 Quest Workspace ChangeBASE [Type text] 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Quest Site Administrator 4.4

Quest Site Administrator 4.4 Quest Site Administrator 4.4 for SharePoint Product Overview 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information, which is protected by copyright. The software described

More information

Quest Management Agent for Forefront Identity Manager

Quest Management Agent for Forefront Identity Manager Quest Management Agent for Forefront Identity Manager Version 1.0 Administrator Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.

More information

White Paper. Better Together: Auditing with Microsoft Audit Collection Services (ACS) and Quest Software

White Paper. Better Together: Auditing with Microsoft Audit Collection Services (ACS) and Quest Software Better Together: Auditing with Microsoft Audit Collection Services (ACS) and Quest Software Written by Tom Crane, Product Manager, Quest Software, Inc. Edited by James Galvin, Microsoft Sr. Product Manager,

More information

Dell Statistica. Statistica Document Management System (SDMS) Requirements

Dell Statistica. Statistica Document Management System (SDMS) Requirements Dell Statistica Statistica Document Management System (SDMS) Requirements 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Dell NetVault Backup Plug-in for SQL Server 6.1

Dell NetVault Backup Plug-in for SQL Server 6.1 Dell NetVault Backup Plug-in for SQL Server 6.1 April 2014 These release notes provide information about the Dell NetVault Backup Plug-in for SQL Server release. About Enhancements Resolved issues Known

More information

Gain Control of Space with Quest Capacity Manager for SQL Server. written by Thomas LaRock

Gain Control of Space with Quest Capacity Manager for SQL Server. written by Thomas LaRock Gain Control of Space with Quest Capacity Manager for SQL Server written by Thomas LaRock Copyright Quest Software, Inc. 2008. All rights reserved. This guide contains proprietary information, which is

More information

Dell One Identity Quick Connect for Cloud Services 3.6.0

Dell One Identity Quick Connect for Cloud Services 3.6.0 Dell One Identity Quick Connect for Cloud Services 3.6.0 August, 2014 These release notes provide information about the Dell One Identity Quick Connect for Cloud Services release. About New features Resolved

More information

Go beyond basic up/down monitoring

Go beyond basic up/down monitoring Go beyond basic up/down monitoring Extending the value of SCOM with Foglight for SQL Server Introduction Microsoft Systems Center Operations Manager (SCOM) allows IT professionals to manage and monitor

More information

Using Self Certified SSL Certificates. Paul Fisher. Quest Software. Systems Consultant. Desktop Virtualisation Group

Using Self Certified SSL Certificates. Paul Fisher. Quest Software. Systems Consultant. Desktop Virtualisation Group Using Self Certified SSL Certificates Paul Fisher Systems Consultant paul.fisher@quest.com Quest Software Desktop Virtualisation Group Quest Software (UK) Limited Ascot House Maidenhead Office Park Westacott

More information

Foglight for Active Directory 5.6.8. User and Reference Guide

Foglight for Active Directory 5.6.8. User and Reference Guide Foglight for Active Directory 5.6.8 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software

More information

Dell InTrust 11.0. Preparing for Auditing CheckPoint Firewall

Dell InTrust 11.0. Preparing for Auditing CheckPoint Firewall 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

Enterprise Single Sign-On 8.0.3

Enterprise Single Sign-On 8.0.3 For Internal Use Only Enterprise Single Sign-On 8.0.3 Additional Dedicated Server Instance Copyright 1998-2009 Quest Software and/or its Licensors ALL RIGHTS RESERVED. This publication contains proprietary

More information

Active Directory Manager Pro Quick start Guide

Active Directory Manager Pro Quick start Guide Active Directory Manager Pro Quick start Guide Software version 5.0.0.0 JUNE 2014 General Information: info@cionsystems.com Online Support: support@cionsystems.com Copyright 2014 CionSystems Inc., All

More information

New Features and Enhancements

New Features and Enhancements Dell Migration Manager for SharePoint 4.7 Build number: 4.7.20141207 December 9, 2014 These release notes provide information about the Dell Migration Manager for SharePoint release. New Features and Enhancements

More information

FOR SHAREPOINT. Quick Start Guide

FOR SHAREPOINT. Quick Start Guide Quick Apps v6.2 FOR SHAREPOINT Quick Start Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Active Directory Manager Pro 5.0.0.0 New Features

Active Directory Manager Pro 5.0.0.0 New Features Active Directory Manager Pro 5.0.0.0 New Features General Information: info@cionsystems.com Online Support: support@cionsystems.com CionSystems Inc. 16625 Redmond Way, Ste M106 Redmond, WA. 98052 http://www.cionsystems.com

More information

Dell Unified Communications Command Suite - Diagnostics 8.0. Data Recorder User Guide

Dell Unified Communications Command Suite - Diagnostics 8.0. Data Recorder User Guide Dell Unified Communications Command Suite - Diagnostics 8.0 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability

Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability May 2015 Cloning the database Cloning the STS host Cloning the proxy host This guide describes how to extend a typical

More information

Dell Recovery Manager for Active Directory 8.6.3

Dell Recovery Manager for Active Directory 8.6.3 Dell Recovery Manager for Active Directory 8.6.3 May 15, 2015 These release notes provide information about the Dell Recovery Manager for Active Directory release. Resolved Issues Known Issues System Requirements

More information

Dell NetVault Backup Plug-in for SQL Server 10.0.1

Dell NetVault Backup Plug-in for SQL Server 10.0.1 Dell NetVault Backup Plug-in for SQL Server 10.0.1, Revision 1 February 2015 These release notes provide information about the Dell NetVault Backup Plug-in for SQL Server release. About Dell NetVault Backup

More information

Overcoming Active Directory Audit Log Limitations. Written by Randy Franklin Smith President Monterey Technology Group, Inc.

Overcoming Active Directory Audit Log Limitations. Written by Randy Franklin Smith President Monterey Technology Group, Inc. Overcoming Active Directory Audit Log Limitations Written by Randy Franklin Smith President Monterey Technology Group, Inc. White Paper 2009 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains

More information

Dell Migration Manager for Enterprise Social What Can and Cannot Be Migrated

Dell Migration Manager for Enterprise Social What Can and Cannot Be Migrated Dell Migration Manager for Enterprise Social What Can and Cannot Be Migrated MMES - What Can and Cannot Be Migrated First Release - April 2015 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary

More information