O'Reilly logo

Microsoft Exchange 2013 Cookbook by Peter De Tender, Michael Van Horenbeeck

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Using mailbox audit logging

It's not uncommon to see that mailboxes contain sensitive information or company-internal documents that possibly include personal, financial, or other private records of third-party individuals or companies.

Especially in larger environments it's difficult to keep track of who has access to what, even more so it's almost impossible to track who exercised the permissions that he or she was granted.

Mailbox audit logging will exactly do that: keep track of who accesses a mailbox. Not only will it do that for users or delegates, but also for administrators. The latter would not only happen when an Administrator opens another user's mailbox, but also when administrative tasks are executed like In-Place eDiscovery or Mailbox ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required