Access "Exchange 2010 auditing tools to track admin, end-user behavior"
This article is part of the July 2011, Vol. 10 issue of Who's reading your email?
I read your email. Well, I don’t really read your email but how would you know? IT finds this statement funny, but it makes non-tech folks a little nervous. A lot of business occurs via email and companies rely on Exchange Server for critical business processes. So, CEOs are concerned with what’s actually happening on email servers and who can access them. As an Exchange administrator, where do you turn when the CEO comes to you for answers? You turn to auditing. And Exchange Server 2010 has two levels of auditing that administrators can use: administrator audit logging and mailbox auditing logging. Each tool differs slightly in functionality and setup, so let’s take a look at what each one means and why users shouldn’t fear administrator-based audits. What is administrator audit logging? Administrator audit logging (AAL) in Exchange 2010 Service Pack 1 (SP1) gives administrators a way to log commands that have been executed on the server. Enabled by default in Exchange 2010 SP1, AAL stores all commands (except Get- and Search-) in an arbitration ... Access >>>
Premium Content for Free.
Exchange 2010 auditing tools to track admin, end-user behavior
by Ed Fisher, Contributor
Compliance rules make tracking admin and email users a necessary evil. Thankfully, audit logging tools in Exchange 2010 can help.
- Exchange 2010 auditing tools to track admin, end-user behavior by Ed Fisher, Contributor
Five steps to preparing for Exchange virtualization failures
by David Davis
Virtualized Exchange infrastructure failures are inevitable. Take these five crucial preparation steps to make sure you’re ready for anything.
- Five steps to preparing for Exchange virtualization failures by David Davis
More Premium Content Accessible For Free
The benefits and challenges of virtualizing Exchange Server
While virtualizing Exchange Server can reduce operational costs, improve flexibility and consolidate resources, a proper plan is necessary in order ...
Who, what, where? How the cloud complicates identity management
IT security and regulatory compliance require identity and access management. However, the move to the cloud and the spread of mobile devices has ...
The many paths to Exchange 2013
Exchange 2013 offers features that could benefit administrators and make the idea of hosted Exchange more appealing. We look at how to install and ...