Tool Provides Change Control for Active Directory

NetIQ is shipping Change Guardian 1.0 for Active Directory, a monitoring and auditing tool for risk and compliance management, and change control, within Microsoft Active Directory environments.

Change Guardian provides the ability to audit and report on configuration changes throughout Active Directory deployments. The package is part of San Jose, Calif.-based NetIQ’s Operational Change Control product line.

The tool, which can be used from within either Microsoft Operations Manager (MOM) or NetIQ’s own Security Manager, provides both real-time alerting as well as forensic reporting on past changes, and is meant to help organizations meet requirements for regulatory compliance.

NetIQ’s Change Guardian automates the manually-intensive process of cataloguing and classifying all changes made across an Active Directory environment to help increase the level of security.

“We’ve broken [compliance auditing and reporting] down into a managed approach,” says Sacha Dawes, NetIQ senior product marketing manager.

Change Guardian monitors changes based on risk to the Active Directory environment and provides flexibility in how administrators receive alerts. According to Dawes, it audits changes made through authorized change processes, and also identifies changes made outside of the change process, such as an unauthorized administrator changing user accounts directly.

Additionally, it tracks high-profile changes, monitoring and reporting on changes made to critical objects within Active Directory, such as the Domain Admins group, providing rapid feedback on changes that may grant extended privileges or access to sensitive information.

NetIQ Change Guardian 1.0 costs $1,200 per domain controller.

About the Author

Stuart J. Johnston has covered technology, especially Microsoft, since February 1988 for InfoWorld, Computerworld, Information Week, and PC World, as well as for Enterprise Developer, XML & Web Services, and .NET magazines.


  • Weird Blue Tunnel Graphic

    Microsoft Goes Deep on 'Solorigate' Secondary Attack Methods

    Microsoft on Wednesday published an analysis of the second-stage "Solorigate" attack methods used by an advanced persistent threat (APT) attack group.

  • Microsoft Talks Teams and SharePoint at Modern Workplace Event

    It's a hybrid world, but remote work is here to stay, according to Microsoft's Teams and SharePoint head Jeff Teper.

  • Malwarebytes Affirms Other APT Attack Methods Used Besides 'Solorigate'

    Security solutions company Malwarebytes affirmed on Monday that alternative methods besides tainted SolarWinds Orion software were used in the recent "Solorigate" advanced persistent threat (APT) attacks.

  • How To Fix the Hyper-V Read Only Disk Problem

    DOS might seem like a relic now, but sometimes it's the only way to fix a problem that Windows seems ill-equipped to deal with -- like this one.

comments powered by Disqus