Exchange Server Auditing

We all rely so heavily on email today – it’s on our desktops, tablets, mobile phones and now even on our watches! If your email server drops for even just a few minutes, you just know it’s going to result in countless helpdesk calls from end users ‘desperately’ needing their emails. The reality is, in the event of an Exchange outage trying to get an Exchange Server back up and running quickly is not always easy… unless you have Lepide of course. As a part of our LepideAuditor range we created LepideAuditor for Exchange, available either standalone or as a part of our award winning LepideAuditor. This really simple solution provides a simple, cost effective way of seeing who, what, where and when changes are made to your Exchange environment. It gives you real time alerts when changes occur and provides you with hundreds of reports – all showing you before and after values of every change made. Simply put – it gives you the insight you need to make faster decisions to resolve issues quicker.

Over 5,000 Organizations Use LepideAuditor to Protect Their Businesses Against Data Breaches

How We Help to Audit Exchange Server Changes

Deploying an Exchange Server auditing solution, like LepideAuditor, can help you monitor, detect and alert on suspicious or unwanted Exchange Server changes. Through a combination of real-time monitoring, pre-defined reports and powerful alerting capabilities, LepideAuditor enables you to get better visibility into mailbox access, permissions and the overall health of your Exchange Server. Here are just some ways in which LepideAuditor can help your business.

  • Intuitive Dashboard Easily track all changes occurring across your Exchange Server environment with our simple, yet powerful, intuitive dashboard. It enables you to easily determine the total number of changes being made to your Exchange Server. These changes can be broken down into changes per source or changes per administrator. You can also spot anomalies in trends to help you determine if you are experiencing the symptoms of an attack or data leakage incident. Help minimize the risk of system downtime through performance and health tracking. See all Exchange Server changes instantly as they happen through our LiveFeed.
  • Granular Reports The simple, yet granular, audit reports of LepideAuditor give you answers to the “who, what, when and where” auditing questions in a single log for a single change. Over 40 pre-defined reports have been included to help you instantly find the audit data you require for your security or compliance demands. We specifically monitor changes made to active directory objects, mailbox databases, exchange policies, storage groups, all of which you can drill down and select based on the object class. All of the reports are delivered on schedule either in CSV, PDF, or MHT or via secure web console for further manipulation as needed.
  • Real Time Alerting The best time to discover unauthorized or unwanted Exchange Server changes is immediately after they happen. This enables you to take quicker action to rectify these changes if required. To help you do this, LepideAuditor has the ability to send real time alerts, based on a single event of threshold conditions, to any specified user. Threshold alerting is particularly important, as it enables you to determine when a certain event occurs an unusually high number of times over a small period of time. All of this should add to your arsenal when it comes to spotting change trends that may be unusual or unauthorized.
  • Mobile App To help IT teams monitor Exchange Server changes while out and about we have provided a Mobile App. Our LepideAuditor App shows a live feed and real time alerts of Exchange Server changes as they happen straight to any Apple device such as an iPhone or iPad or any Android phone or tablet. Read more

Want to see the award-winning LepideAuditor in action? Schedule a Demo
What We Audit in Exchange Server

Reports on Exchange Server Security, Compliance and Management

We allow you to keep track of all changes as they happen. All of our auditing solutions provide you with one log per change showing who, what, where and when the change was made. We then provide this data to you through over 40 relevant reports to help you address PCI, SOX, GLBA, HIPAA and GDPR reporting requirements along with all manner of security and IT operations tasks. We specifically monitor changes made to active directory objects, mailbox databases, exchange policies, storage groups, all of which you can drill down and select based on the object class. All of the reports are delivered on schedule either in CSV, PDF, HTML, DOC or TXT or via secure web console for further manipulation as needed.

Audit Mailbox Accessed by Owner and Non-Owner

Perhaps your CEO has a PA with access to their mailbox, or maybe you have some shared mailboxes you just want to keep a track of. Whether it’s for HR, Security or just good practice, you really need to make sure you have proper auditing in place. With this solution, you can audit based on specific user access and instantly get alerts and receive regular reports showing you who, what, where, when and where from a specific mailbox was accessed and what they did.
Read more

Analyze the Permission Changes to Your Exchange Server

Exchange Server permission analysis displays historical changes in the permissions of Exchange objects. The administrator can compare the permissions for selected objects between two date and time intervals. You can save separate reports of both “Permission History” and “Compare Permission” in PDF, MHT or CSV formats on the disk.
Read more

Get to the Detail You Need, When You Need it

A key feature of our auditing platform is our powerful search functionality. We provide a logical and intuitive interface where you can search based on object path, user and resource as needed and create custom searches to create your own reports and filters which you can save for future use. It makes light work of even the most complex of queries and searches.
Read more

See What’s Changed and Where that Change Came From

Naturally, you want to know if anything in your Exchange environment has been changed but the real value comes from the context. We think it’s important to show you what it was changed from. Our in-depth reporting helps IT teams improve security, streamline IT operations and meet any kind of compliance challenge – making the life of the IT team much simpler.

Keep Track of the Health of Your Exchange Server

Lepide Exchange Server HealthCheck is an integrated feature of our LepideAuditor solution that provides a simple and powerful dashboard to help you keep track of important elements pertaining to Exchange server health and continuity. It provides continuous monitoring and real time alerting based on resource utilization, exchange server status, mailbox database size, EDB size monitoring and message queues.
Read more

Make Your Exchange Server Audit Delegation More Secure

While you may want certain users to see certain Exchange Server audit reports, it’s quite likely you won’t want everyone to have full access to all of the reports, all of the time. To address this, we offer a secure web-based console in which IT teams can grant access to only the specific reports they wish that user to be able to access. We also think it’s important, given the sensitivity of the audit data, we also allow the encryption of the data while at rest.

Read all reviews

Read all stories

More from Lepide

Blog
What Are Intrusion Prevention Systems and Can They Protect Your Network from Attacks?

Many organizations rely on SIEM solutions to aggregate and correlate data from the logs these solutions generate, in order to provide an overview of all events that take place on their network

Learn More ->
Whitepaper
Popular Cyber Attack Methods and How to Mitigate Them

This White Paper will go through some of the most popular cyber-attack methods attackers are using and the steps you can take to mitigate the risks of you falling victim to them.

Learn More ->
News
LepideAuditor Introduces Data Discovery and Classification

The Data Discovery and Classification Technology was developed, and is completely supported, in-house to give users a more complete Data-Centric Audit and Protection solution.

Learn More ->

Lepide® is a registered trademark of Lepide Software Private Limited. © Copyright 2018 Lepide Software Private Limited. All trademarks acknowledged.