Skip to main content

Netwrix Change Tracker v8.0 Documentation

Netwrix Change Tracker is a system integrity monitoring product, used for compliance programs, host intrusion detection and change control for enterprise IT systems. It is used by Enterprise IT organizations including the military, federal, banks, financial services, airlines, retailers, utilities and not-for-profit organizations globally.

The product automates the collection of configuration data from any IT devices, including Servers and Desktops, database systems, firewalls, network routers and switches and stores a baseline for each device. Platforms supported include Windows, Linux, Unix, Oracle, SQL Server.

Configuration data collected is then analyzed for compliance with an organizations hardened build standard. This is typically based on a CIS Benchmark hardening checklist or one provided by a manufacturer such as Microsoft, Red Hat, Oracle or Cisco, for example. Compliance standards supported by Change Tracker include PCI DSS, DISA STIG, NERC CIP, ISO 27001, GLBA), FISMA), HIPAA HITECH, S-OX, NIST 800-53/171 and GPG 13.

TechnicalOverview

Devices are then monitored continuously using either a Change Tracker Agent installed directly onto the device, or using a periodically scheduled agentless interaction with the device. Any changes recorded deviating from the initial baseline are assessed for a match with Planned Changes configured in the Change Tracker system. Planned Change rules can be recorded directly from a device exhibiting changes, for example, when pre-staging patches, or from observed changes reported by Change Tracker. Planned Changes comprise the devices to assess, change window and details of the changes to match, such as a file change or registry value, for example.

This Closed-Loop, Intelligent Change Control closely aligns to COBIT or ITIL Change Control processes whereby changes are pre-approved via a ‘Request For Change’ process, then reviewed for accuracy and quality via a QA Testing or Post-implementation review. Netwrix offer a ServiceNow Certified ITSM Integration Module to automatically pull in Change Requests from most leading ITSM products. In this way, Change Tracker automates the entire process by reviewing changes observed against pre-defined Planned Change rules, or by retrospectively building new Planned Change Rules based on observed changes, hence the Closed-Loop terminology.

Any changes recorded that are not matched by a Planned Change rule are reported as being potentially breach activity. In this way, Change Tracker provides a Host Intrusion Detection System capability.

Netwrix Change Tracker have been awarded Security Software Certification for CIS Benchmarks.

Other Netwrix products have also received several rewards including a series of Five Star reviews from SC Magazine and a Winners Award from Computer Defense Magazine. Netwrix is also an official OVAL Adopter utilizing OVAL vulnerability and inventory and compliance content in either SCAP or xccdf content.

Solution Architecture

Netwrix Change Tracker is delivered as a 100% software solution. The central server component can be installed on either a Windows or Linux platform. A virtualized host is supported but resources, and in particular disk I/O performance, are critical. (missing or bad snippet)

Architecture

For a full list of supported operating systems see OS Support Matrix.

Administration and everyday usage for reporting on the change history of a device and managing planned changes is all provided via the secure web interface. Integration options include alert propagation via syslog and email, and for more advanced, two-way integration, Netwrix Change Tracker provides a REST API.

  • Windows Servers and Workstations are tracked using a locally installed active Agent;
  • Solaris, Ubuntu, SUSE Linux, RedHat and CentOS hosts can also be tracked using an Agent;
  • Legacy Unix systems are monitored for File Integrity changes using the Express Agent;
  • Network devices, Unix and Linux Servers are also tracked using an agentless, scripted interaction executed automatically from the Change Tracker server or using a Proxy Agent function;
  • Detailed Configuration Policy management for Servers and Workstations and Policy Compliance Reporting is performed via Change Tracker Hub.