So they do not have individual network logins? If that is the case, you really are not going to be able to tie anything to anyone - at all. Seriously, you might as well scrap the audit as well. You can capture what was changed and when, and on what computer, but you cannot identify who did it.