This article describes how Cayosoft Guardian performs the discovery of the initiator of the change (Who) and how to troubleshoot some common issues.
Active Directory change collection
Cayosoft Guardian collects changes in Active Directory (AD) using the DirSync control, which allows for efficient retrieval of delta changes. This method ensures that only modified objects and attributes are collected, reducing system overhead. For more details on how DirSync functions, see Polling for Changes Using the DirSync Control.
Additionally, Cayosoft Guardian can retrieve initiator details by analyzing security event logs on domain controllers. This enables organizations to determine who made specific modifications within AD.
Cloud change collection
For cloud environments, Cayosoft Guardian collects changes in Microsoft Entra ID (formerly Azure AD) using API-based monitoring. This method allows Cayosoft Guardian to track modifications made to cloud-based directory objects efficiently. Here's how it works:
Integration with Microsoft Entra ID Audit Logs
Guardian connects to Microsoft Entra ID through Microsoft Graph API, which provides access to the Audit Logs and Sign-in Logs. These logs contain details about user, group, and directory changes. For more information about the audit logs, see Microsoft Entra audit logs.
Retrieving delta changes
Guardian queries Microsoft Entra ID’s Audit Log API at regular intervals to detect changes such as:
-
User modifications (e.g., password changes, role assignments)
-
Group membership updates
-
Application permission changes
-
Policy modifications (e.g., conditional access policies)
Microsoft provides delta query capabilities in Graph API, allowing Guardian to collect only the new and modified records instead of retrieving the entire audit log each time.
Storing and analyzing changes
Once retrieved, changes are processed and stored in Guardian’s database. This enables:
-
Tracking and reporting on who made what changes and when
-
Triggering alerts on critical modifications
-
Providing rollback capabilities if needed
Permissions
Guardian requires read access to Entra ID’s audit logs, which is granted through a registered Entra ID application with appropriate permissions. For more information see, Planning and preparation: Cayosoft Guardian System Requirements.
Detecting initiator for Active Directory changes
Cayosoft Guardian uses events from the Windows Event Log to detect the initiator. The event collection job reads the log and correlates found events with previously created change records. Learn more about events collected by Cayosoft Guardian. Learn more in: Events collected by Cayosoft Guardian from the Windows Event Log related to the Active Directory operations.
Cayosoft Guardian uses discovery status as an indication of an event processing progress. The discovery status is shown as an icon in the Who column in the Change History.
For more information regarding common causes and solutions for missing initiator information, see Troubleshooting missing initiator issues in Cayosoft Guardian.
Discovery Status
The Discovery status property in the Change History displays the current state of the additional information discovery, such as initiator and event time. Discovery status also affects values in the When column.
The Search for initiator and event time in progress status means that a change has been collected from the target system and is pending information discovery.
Initiator and event time discovery complete status means that additional information was found and added to a change record. The initiator and event timestamp were added from the target system event log, also collection time is replaced with event time in When column.
The Search for corresponding event and initiator canceled by timeout status means that additional information was not found within the given period of time. This might happen if an event matching these Change Record details is not found in the target system event log.
Comments
0 comments
Please sign in to leave a comment.