In the enterprises where Exchange Servers are responsible for internal and external communications, they contain a lot of valuable information. For both reasons, security of data stored in Exchange Servers and to meet the compliance requirements, it is quite essential to audit all Exchange Server activities including non-owner mailbox accesses. In this article, you will see how to monitor non-owner mailbox accesses through LepideAuditor.

Problems with the native method

Tracking non-owner mailbox accesses with native methods may get complicated as you have to enable auditing for each mailbox individually. The process may become time-consuming and complicated, as you need to do it for each mailbox separately. The other option is taking help of third-party applications. LepideAuditor makes non-owner mailbox accesses tracking easy, as you can configure settings for all the mailboxes through a few clicks.

Audit non-owner mailbox accesses using LepideAuditor

LepideAuditor makes Exchange Server non-owner mailbox auditing very easy. With some configuration, it automates auditing and makes it easy to satisfy different sections of regulatory compliances. At the macro level, you will have to do the following:

1. Add the domain that has the Exchange Server, and configure settings.

2. Generate the reports for tracking non-owner mailbox accesses.

1. Add the domain and configure settings

The following image shows the configuration part, wherein you have to add the domain in which Exchange Server is present, and enable auditing for the Exchange Server.

Figure 1: LepideAuditor configuration

The following image shows the mailbox auditing configuration wizard. For each mailbox, you can set auditing for delegated users, admins, and even owners. In LepideAuditor, you will not have to enable audit for each mailbox separately. Instead, you can configure auditing for all the mailboxes at a time.

Figure 1: LepideAuditor configuration
2. Generate the reports for tracking

You can generate and view non-owner mailbox access report in the “Audit report” section. You just have to select the date range and click on the “Generate” button. After processing your request, the application will show the report as shown in the following image.

Figure 3: Non-owner Mailbox Access Report generated by Auditor Suite
 

The report has the following columns, and the information they give is written corresponding to them.

1. “Action Performed By” - Who accessed the mailbox

2. “Action Performed on” - Mailbox Name

3. “Operation” – What activities were done by the non-owner

4. “When” – When was the mailbox accessed

5. “What” – Further information on the mailbox activities

To get more details on each record, you will have to click on the record, and then complete details will be displayed in the right-bottom pane.

The following report gives a graphical view of the same report.

Figure 4: Graphical view of non-owner mailbox access report
 

In this report, you will see bar graphs which show who were the most active users who accessed the mailbox within the specified period.

Conclusion:

With LepideAuditor the auditing of non-owner mailbox accesses becomes easy. It also simplifies Exchange Server security and adherence to compliances. All these features make this solution preferable over other solutions.



Download LepideAuditor for Exchange Server

Lepide® is a registered trademark of Lepide Software Private Limited. © Copyright 2018 Lepide Software Private Limited. All trademarks acknowledged.