Top Banner
Dell™ Change Auditor for Exchange 6.6 User Guide
46

Dell™ Change Auditor for Exchange 6i.dell.com/sites/doccontent/shared-content/data-sheets/en/Document… · ©2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary

May 28, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Dell™ Change Auditor for Exchange 6i.dell.com/sites/doccontent/shared-content/data-sheets/en/Document… · ©2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary

Dell™ Change Auditor for Exchange 6.6User Guide

Page 2: Dell™ Change Auditor for Exchange 6i.dell.com/sites/doccontent/shared-content/data-sheets/en/Document… · ©2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary

© 2014 Dell Inc. ALL RIGHTS RESERVED.

This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement. This software may be used or copied only in accordance with the terms of the applicable agreement. No part of this guide may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording for any purpose other than the purchaser’s personal use without the written permission of Dell Inc.

The information in this document is provided in connection with Dell products. No license, express or implied, by estoppel or otherwise, to any intellectual property right is granted by this document or in connection with the sale of Dell products. EXCEPT AS SET FORTH IN THE TERMS AND CONDITIONS AS SPECIFIED IN THE LICENSE AGREEMENT FOR THIS PRODUCT, DELL ASSUMES NO LIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS, IMPLIED OR STATUTORY WARRANTY RELATING TO ITS PRODUCTS INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT. IN NO EVENT SHALL DELL BE LIABLE FOR ANY DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL DAMAGES (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION OR LOSS OF INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN IF DELL HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Dell makes no representations or warranties with respect to the accuracy or completeness of the contents of this document and reserves the right to make changes to specifications and product descriptions at any time without notice. Dell does not make any commitment to update the information contained in this document.

If you have any questions regarding your potential use of this material, contact:

Dell Inc. Attn: LEGAL Dept 5 Polaris Way Aliso Viejo, CA 92656

Refer to our web site (software.dell.com) for regional and international office information.

Patents

This product is protected by U.S. Patents # 7,979,494; 8,185,598; 8,266,231; and 8,650,578. Additional Patents Pending.

Trademarks

Dell, the Dell logo, GPOADmin, SonicWALL and InTrust are trademarks of Dell Inc. Microsoft, Active Directory, ActiveSync, Excel, Internet Explorer, Lync, Office 365, OneDrive, Outlook, SharePoint, SQL Server, Windows, Windows PowerShell and Windows Server are either registered trademarks or trademarks of the Microsoft Corporation in the United States and/or other countries. Linux® is a registered trademark of Linus Torvalds in the United States, other countries. EMC, Celerra, Isilon, VNX, and VNXe are registered trademarks of EMC Corporation. VMware, ESX, ESXi, and vCenter are registered trademarks or trademarks of VMware, Inc. in the United States or other countries. Safari and iCloud are registered trademarks of Apple Inc. Google Drive is a trademark of Google Inc. Amazon Cloud Drive is a trademark of Amazon.com, Inc. or its affiliates. Blackberry® and related trademarks, names and logos are the property of Research In Motion Limited and are registered and/or used in the U.S. and countries around world. Used under license from Research In Motion Limited. Itanium is a trademark of the Intel Corporation in the U.S. and/or other countries. Box® is a registered trademark of Box. Change Auditor is not affiliated with or otherwise sponsored by Dropbox, Inc. Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their products. Dell disclaims any proprietary interest in the marks and names of others.

Change Auditor for Exchange User Guide Updated - September 2014 Software Version - 6.6

Legend

CAUTION: A CAUTION icon indicates potential damage to hardware or loss of data if instructions are not followed.

WARNING: A WARNING icon indicates a potential for property damage, personal injury, or death.

IMPORTANT NOTE, NOTE, TIP, MOBILE, or VIDEO: An information icon indicates supporting information.

Page 3: Dell™ Change Auditor for Exchange 6i.dell.com/sites/doccontent/shared-content/data-sheets/en/Document… · ©2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary

Contents

Dell Change Auditor for Exchange 6.6User Guide

3

Dell Change Auditor for Exchange Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4Deployment requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5Client components/features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6

Exchange Searches/Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8Run the All Exchange Events report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8Create custom Exchange searches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9Create custom Exchange Online searches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12

Exchange Mailbox Auditing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15Exchange Mailbox Auditing page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16Exchange Mailbox Auditing list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17Exchange Mailbox Auditing wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19

Exchange Online Mailbox Auditing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23

System Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .24Exchange Online Auditing page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .24Exchange Online Auditing templates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26Exchange Online Auditing wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .28

Exchange Settings and Event Logging (Agent Configuration Page) . . . . . . . . . . . . . . 31Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .31Exchange Folder Open Event setting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .31Exchange event logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .32

Exchange Mailbox Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .33Exchange Mailbox Protection page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .33Exchange Mailbox Protection templates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .35Exchange Protection wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .36

Managing Shared Mailboxes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40Shared Mailbox events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .41

Disabled Exchange Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43

About Dell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46Contacting Dell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .46Technical Support Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .46

Page 4: Dell™ Change Auditor for Exchange 6i.dell.com/sites/doccontent/shared-content/data-sheets/en/Document… · ©2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary

1

Dell Change Auditor for ExchangeOverview

• Introduction

• Deployment requirements

• Client components/features

IntroductionDell™ Change Auditor for Exchange proactively audits the activities taking place in your entire Exchange environment, then provides real-time, detailed alerts about vital changes that occur. It provides extensive, customizable auditing and reporting capabilities for all critical changes, including those made to administrative groups, mailbox policies, public and private information stores, ActiveSync® mailbox policies, and distribution lists. Continually being in-the-know helps you to prove compliance, drive security, and improve uptime while proactively auditing changes to Exchange Server configurations and permissions.

The Exchange Mailbox auditing feature in Change Auditor for Exchange also helps tighten enterprise-wide change and control policies by tracking user and administrator activity such as user account changes, delivery restriction changes, send on behalf updates, and more. With these types of real-time alerts and in-depth analysis and reporting capabilities, your Exchange infrastructure is always protected from exposure to suspicious behavior or unauthorized access and kept in compliance with corporate and government standards.

In addition to the Exchange Mailbox auditing feature, the Change Auditor for Exchange product also provides an Exchange Mailbox protection feature that allows you to lock down critical Exchange mailboxes from unauthorized or accidental access.

New in version 6.5, the Exchange Online auditing feature allows you to audit the activities taking place in your Exchange Online/Office 365™ mailboxes. A new Exchange Online subsystem has been added to Change Auditor for Exchange for administration, searching and reporting.

To verify that Change Auditor for Exchange is licensed:

1 From the member server where Change Auditor is installed, launch the License Manager (Start | All Programs | Dell | Change Auditor | License Manager).

2 On the About Change Auditor dialog, verify that the License Status field is set to ‘Installed’ for Change Auditor for Exchange.

3 If the License Status field indicates that Change Auditor for Exchange is ‘Uninstalled’, click the Update License button to locate and apply the appropriate license.

NOTE: Exchange auditing, including Exchange Mailbox auditing and protection and Exchange Online auditing are only available if you have licensed Change Auditor for Exchange. The product will not prevent you from using these features; however, associated events or protection will not be captured/enforced unless the proper license is applied.

Dell Change Auditor for Exchange 6.6User Guide

4

Page 5: Dell™ Change Auditor for Exchange 6i.dell.com/sites/doccontent/shared-content/data-sheets/en/Document… · ©2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary

Deployment requirementsFor a successful deployment of Change Auditor for Exchange, ensure that your environment meets the minimum system requirements. Refer to the Dell™ Change Auditor Installation Guide for the Change Auditor system requirements and details on installing Change Auditor and deploying Change Auditor agents.

Exchange auditing requirements

Change Auditor license requirement:

• Change Auditor for Exchange

Exchange Server Service Pack requirements:

• Windows Server® 2003 and 2003 R2:

• Microsoft® Exchange Server 2007 x64 SP1

• Windows Server 2008 and 2008 R2:

• Microsoft Exchange Server 2007 x64 SP1

• Microsoft Exchange Server 2010 RTM

• Windows Server 2008 R2 SP1:

• Microsoft Exchange Server 2007 x64 SP1

• Microsoft Exchange Server 2010 RTM

• Microsoft Exchange Server 2013 CU1

• Windows Server 2012:

• Microsoft Exchange Server 2010 SP 3

• Microsoft Exchange Server 2013 RTM

• Windows Server 2012 R2:

• Microsoft Exchange Server 2013 SP 1

Office 365 Exchange Online auditing requirements

Change Auditor license requirement:

• Change Auditor for Exchange 6.5 (or higher)

Exchange Online/Office 365 Platforms supported and required permissions:

• Office 365 Small Business

• Minimum permissions: The user account configured for Change Auditor for Exchange auditing must be assigned the Administrator role for Office 365 Small Business. The account must also be licensed for Exchange Online (other Office 365 licenses are not required).

• Office 365 Small Business Premium

• Minimum permissions: The user account configured for Change Auditor for Exchange auditing must be assigned the Administrator role for Office 365 Small Business Premium. The account must also be licensed for Exchange Online (other Office 365 licenses are not required).

NOTE: Exchange Online events are generated for activity in an Office 365™ Exchange Online (cloud) organization; they are not generated for any on-premises version of Exchange.

Dell Change Auditor for Exchange 6.6User Guide

5

Page 6: Dell™ Change Auditor for Exchange 6i.dell.com/sites/doccontent/shared-content/data-sheets/en/Document… · ©2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary

• Office 365 Midsize Business

• Minimum permissions: The user account configured for Change Auditor for Exchange auditing must be assigned the Global Administrator role for Office 365 Midsize Business. The account must also be licensed for Exchange Online (other Office 365 licenses are not required).

• Office 365 Enterprise

• Minimum permissions: The user account configured for Change Auditor for Exchange auditing must be assigned the Global Administrator role for Office 365 Enterprise. The account must also be licensed for Exchange Online (other Office 365 licenses are not required).

Client components/featuresThe following table lists the client components and features that require a valid Change Auditor for Exchange license. The product will not prevent you from using these features; however, associated events or protection will not be captured/enforced unless the proper license is applied.

NOTE: To hide unlicensed Change Auditor features from the Administration Tasks tab (including unavailable audit events throughout the client), use the Action | Hide Unlicensed Components menu command. Note this command is only available when the Administration Tasks tab is the active page.

Table 1. Change Auditor for Exchange client components/features

Client Page Feature

Administration Tasks Tab Agent Configuration:

• Configuration Setup Dialog - Exchange Tab

• Discard duplicates that occur within nn seconds

• Event Logging - enable/disable Exchange event logging

NOTE: See Exchange Settings and Event Logging (Agent Configuration Page) for information on viewing/modifying the agent configuration setting and enabling event logging.

Audit Task List:

• Exchange Mailbox

• Exchange Online

NOTE: See Exchange Mailbox Auditing for information on including mailboxes for Exchange Mailbox auditing and Shared Mailbox auditing.

NOTE: See Exchange Online Mailbox Auditing for information on creating and maintaining Exchange Online Auditing templates.

Protection Task List:

• Exchange Mailbox

NOTE: See Exchange Mailbox Protection for information on creating and maintaining Exchange Mailbox Protection templates.

Event Details Pane What Details:

• Class (Exchange)

• Object (Exchange and Exchange Online Administration)

• Mailbox (Exchange Online Mailbox)

• Folder (Exchange Online Mailbox)

• Cmdlet (Exchange Online Administration)

Dell Change Auditor for Exchange 6.6User Guide

6

Page 7: Dell™ Change Auditor for Exchange 6i.dell.com/sites/doccontent/shared-content/data-sheets/en/Document… · ©2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary

This document has been prepared to assist you in becoming familiar with Change Auditor for Exchange. This User Guide contains information about the additional features that are available when a valid Change Auditor for Exchange license has been applied. It is intended for network administrators, consultants, analysts, and any other IT professionals using the product. For information on installing and configuring Change Auditor for Exchange, see the Dell™ Change Auditor Installation Guide.

Events Facilities:

• Exchange ActiveSync Monitoring

• Exchange Administrative Group

• Exchange Distribution List

• Exchange Mailbox Monitoring

• Exchange Online Administration

• Exchange Online Mailbox

• Exchange Organization

• Exchange Permission Tracking

• Exchange User

Search Properties What Tab:

• Subsystem | Exchange

• Subsystem | Exchange Online

NOTE: See Exchange Searches/Reports for information on creating custom Exchange and Exchange Online search queries.

Searches Page Built-in Reports:

• All reports that include the events in the facilities listed above.

Alert Custom Email Dialog Add Owner(s) of Non-Owner Events option - to send an alert to the Exchange Mailbox owner when their mailbox has been accessed by another user.

NOTE: The Dell™ Change Auditor User Guide explains the core functionality available in Change Auditor regardless of the product license that has been applied. In addition, there are separate user guides available that describe the additional functionality added to Change Auditor when the different auditing modules are licensed. The supplemental user guides include:

• Dell™ Change Auditor for Active Directory® User Guide

• Dell™ Change Auditor for Active Directory® Queries User Guide

• Dell™ Change Auditor for EMC® User Guide

• Dell™ Change Auditor for Exchange User Guide

• Dell™ Change Auditor for Logon Activity User Guide

• Dell™ Change Auditor for NetApp® User Guide

• Dell™ Change Auditor for SharePoint® User Guide

• Dell™ Change Auditor for SonicWALL™ User Guide

• Dell™ Change Auditor for SQL Server® User Guide

• Dell™ Change Auditor for Windows® File Servers User Guide

Table 1. Change Auditor for Exchange client components/features

Client Page Feature

Dell Change Auditor for Exchange 6.6User Guide

7

Page 8: Dell™ Change Auditor for Exchange 6i.dell.com/sites/doccontent/shared-content/data-sheets/en/Document… · ©2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary

2

Exchange Searches/Reports

• Introduction

• Run the All Exchange Events report

• Create custom Exchange searches

• Create custom Exchange Online searches

IntroductionChange Auditor delivers both pre-configured and customizable reports displaying events from Exchange servers in one centralized viewer. Change Auditor for Exchange provides two subsystems related to Exchange auditing:

• The Exchange subsystem is used for administration, searching and reporting on the Exchange events contained in the following facilities:

• Exchange ActiveSync Monitoring

• Exchange Administrative Group

• Exchange Distribution List

• Exchange Mailbox Monitoring

• Exchange Organization

• Exchange Permission Tracking

• Exchange User

• The Exchange Online subsystem is used for administration, searching and reporting on the Exchange Online/Office 365™ events, including the events in the following facilities:

• Exchange Online Administration

• Exchange Online Mailbox

This chapter explains how to run a built-in Exchange report and how to create custom Exchange and Exchange Online search queries using the What tab. For a description of the dialogs mentioned in this chapter, refer to the online help.

Run the All Exchange Events reportRunning this report will retrieve the Exchange events captured on all Exchange servers hosting a Change Auditor agent.

1 Launch the Change Auditor client and open the Searches tab.

2 In the explorer view (left pane), expand the Shared | Built-in | All Events folder.

3 Locate and double-click All Exchange Events in the right pane.

NOTE: This query uses the Exchange subsystem; therefore, it will return all Exchange events except for Exchange Online events.

Dell Change Auditor for Exchange 6.6User Guide

8

Page 9: Dell™ Change Auditor for Exchange 6i.dell.com/sites/doccontent/shared-content/data-sheets/en/Document… · ©2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary

4 This will display a new Search Results page displaying the Exchange events captured over the last seven days.

Create custom Exchange searchesThe following scenarios explain how to use the What tab to create custom Exchange searches.

To search for changes to a specific Exchange container:

1 Open the Searches page.

2 In the explorer view (left pane), expand and select the folder where you want to save your search.

Selecting the Private folder will create a search that only you can run and view, whereas selecting the Shared folder will create a search which can be run and viewed by all Change Auditor users.

3 Click the New tool bar button at the top of the Searches page (or right-click a folder and select the New | New Search menu command).

This will activate the Search Properties tabs across the bottom of the Searches page.

4 On the Info tab, enter a name and description for the search.

5 On the What tab, expand the Add tool bar button and click Subsystem | Exchange to display the Add Exchange Container dialog.

NOTE: If you’d rather just retrieve the Exchange events captured over the last 24 hours, you can use the All Exchange Events in the last 24 hours report under the Shared | Built-In | Recommended Best Practice | Exchange folder in the explorer view.

NOTE: If you wanted to, you can use the other search properties tabs to define additional criteria:

• Who - allows you to search for events generated by a specific user, computer or group

• Where - allows you to search for events captured by a specific agent or within a specific domain or site

• When - allows you to search for events that occurred within a specific date/time range

• Origin - allows you to search for events that originated from a specific workstation or server

NOTE: You can use the Add with Events | Subsystem | Exchange command (instead of Add | Subsystem | Exchange) to search for an entity that already has an event associated with it in the database.

Dell Change Auditor for Exchange 6.6User Guide

9

Page 10: Dell™ Change Auditor for Exchange 6i.dell.com/sites/doccontent/shared-content/data-sheets/en/Document… · ©2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary

6 On the Add Exchange Container dialog, select one of the following options to define the scope of coverage:

• All Exchange Objects - select to include all objects. (Default when the Add tool bar button is used.)

• This Object - select to include the selected object(s) only. (Default when the Add With Events tool bar button is used.)

• This Object and Child Objects Only - select to include the selected object(s) and its direct child objects.

• This Object and All Child Objects - select to include the selected object(s) and all subordinate objects (in all levels).

7 By default, All Actions is selected meaning that all of the activity associated with the object will generate an audited event. However, you can clear the All Actions option and select individual options. The options available are:

• All Actions - select to include when any of the following actions occur (Default)

• Add Attribute - select to include when an attribute is added

• Delete Attribute - select to include when an attribute is deleted

• Modify Attribute - select to include when an attribute is modified

• Rename Object - select to include when an object is renamed

• Add Object - select to include when an object is added

• Delete Object - select to include when an object is deleted

• Move Object - select to include when an object is moved

• Other - select to include other types of activity against the selected object

8 By default, All Transports is selected indicating that all AD query events regardless of the transport protocol used will be included in the search. However, you can clear the All Transports option and select individual options. The transport options available are:

• All Transports - select to include AD queries regardless of the transport protocol used (Default)

• SSL/TLS - select to include AD queries that are secured using SSL or TLS technology

Dell Change Auditor for Exchange 6.6User Guide

10

Page 11: Dell™ Change Auditor for Exchange 6i.dell.com/sites/doccontent/shared-content/data-sheets/en/Document… · ©2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary

• Sign/Seal - select to include AD queries that are signed using Kerberos-based encryption

9 When a scope other than All Exchange Objects is selected, the directory object picker will be activated allowing you to select the object(s) to be included in the search definition.

Use either the Browse or Search page to search your environment to locate and select the Exchange container(s) to be included. Use the Options page to view or modify the search options to be used to retrieve directory objects.

10 Once you select an Exchange container to be included, click the Add button to add it to the list at the bottom of the dialog.

11 Once you have added all the Exchange containers to be included in the search, click the OK button to save your selection and close the dialog.

12 Once you have defined the search criteria to be used, you can either save the search definition or run the search.

• To save the search definition without running it, click Save.

• To save and run the search, click Run.

13 When this search is run, Change Auditor will search for changes to the Exchange containers specified on the What tab.

To search for changes to an Exchange object using a wildcard expression:

1 Open the Searches page.

2 In the explorer view (left pane), expand and select the folder where you want to save your search.

Selecting the Private folder will create a search that only you can run and view, whereas selecting the Shared folder will create a search which can be run and viewed by all Change Auditor users.

3 Click the New tool bar button at the top of the Searches page (or right-click a folder and select the New | New Search menu command).

This will activate the Search Properties tabs across the bottom of the Searches page.

4 On the Info tab, enter a name and description for the search.

5 On the What tab, expand the Add tool bar button and click Subsystem | Exchange.

6 On the Add Exchange Container dialog, select the This Object scope.

7 Use the wildcard expression fields in the middle of the dialog to specify the expression to be used to search for Exchange objects (Object Name column in Search Results grid).

• Select the comparison operator to be used: Like or Not Like.

• In the field to the right, enter the pattern (character string and * wildcard character) to be used to search for a match.

Use the * wildcard character to match any zero or more characters. For example: LIKE *admin* will find Exchange objects that contain ‘admin’ anywhere in their name.

NOTE: When you clear the All Transports check box and select both the SSL/TLS and Sign/Seal check boxes, only AD queries using both of these transport protocols will be included in the search results.

NOTE: Select the Exclude the Above Selection(s) check box if you want to search for changes to all Exchange containers EXCEPT those listed in the ‘what’ list.

NOTE: Select the Runtime Prompt check box on this dialog to prompt for an Exchange container every time the search is run.

Dell Change Auditor for Exchange 6.6User Guide

11

Page 12: Dell™ Change Auditor for Exchange 6i.dell.com/sites/doccontent/shared-content/data-sheets/en/Document… · ©2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary

• Click the Add button to add the wildcard expression to the Selected Objects list box at the bottom of the dialog.

8 After entering the wildcard expression to be used, click the OK button to close the dialog and add the wildcard expression to the ‘What’ list.

9 Once you have defined the search criteria to be used, you can either save the search definition or run the search.

• To save the search definition without running it, click Save.

• To save and run the search, click Run.

10 When this search is run, Change Auditor will search for changes to the Exchange containers specified on the What tab.

Create custom Exchange Online searchesThe following scenarios explain how to use the What tab to create custom Exchange Online searches.

To search for changes to a specific Exchange Online mailbox:

1 Open the Searches page.

2 In the explorer view (left pane), expand and select the folder where you want to save your search.

Selecting the Private folder will create a search that only you can run and view, whereas selecting the Shared folder will create a search which can be run and viewed by all Change Auditor users.

3 Click the New tool bar button at the top of the Searches page (or right-click a folder and select the New | New Search menu command).

This will activate the Search Properties tabs across the bottom of the Searches page.

4 On the Info tab, enter a name and description for the search.

5 On the What tab, expand the Add tool bar button and click Subsystem | Exchange Online to display the Exchange Online dialog.

NOTE: If you wanted to, you can use the other search properties tabs to define additional criteria:

• Who - allows you to search for events generated by a specific user, computer or group

• Where - allows you to search for events captured by a specific agent or within a specific domain or site

• When - allows you to search for events that occurred within a specific date/time range

• Origin - allows you to search for events that originated from a specific workstation or server

NOTE: You can use the Add with Events | Subsystem | Exchange Online command (instead of Add | Subsystem | Exchange Online) to search for events associated with an online mailbox that already has an event associated with it in the database.

Dell Change Auditor for Exchange 6.6User Guide

12

Page 13: Dell™ Change Auditor for Exchange 6i.dell.com/sites/doccontent/shared-content/data-sheets/en/Document… · ©2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary

6 On the Exchange Online dialog, select the Selected Events option. Selecting this option enables the remaining fields/controls on this dialog.

• Select the Mailbox Event option.

• Click the check box under the Mailbox Name heading to specify the online mailbox to be included.

• Select the comparison operator to be used: Contains or Does not contain

• Enter the name (or partial name) of a mailbox to be used to search for a match. Case sensitivity is based on your SQL setting.

• If you want to restrict the search to a specific folder in the specified mailbox, click the check box under the Folder Name heading:

• Select the comparison operator to be used: Contains or Does not contain

• Enter the name (or partial name) of a folder (e.g., Inbox) to be used to search for a match. Case sensitivity is based on your SQL setting.

• Click the Add button to add the expression to the selection list at the bottom of the page.

Repeat this step to add any additional Exchange Online mailboxes to the search query.

To search for changes to a specific folder in all monitored Exchange Online mailboxes:

1 On the What tab, expand the Add tool bar button and click Subsystem | Exchange Online to display the Exchange Online dialog.

2 On the Exchange Online dialog, select the Selected Events option. Selecting this option enables the remaining fields/controls on this dialog.

• Select the Mailbox Event option.

• Click the check box under the Folder Name heading:

• Select the comparison operator to be used: Contains or Does not contain

• Enter the name (or partial name) of a folder to be used to search for a match. Case sensitivity is based on your SQL setting.

• Click the Add button to add the expression to the selection list at the bottom of the page.

NOTE: If both the Mailbox Name and Folder Name are specified, both expressions must be met before an event will be returned.

NOTE: When multiple entries are added to the selection list at the bottom of the page, Change Auditor uses the ‘OR’ operator to evaluate events, returning events that meet any of the entries listed.

Dell Change Auditor for Exchange 6.6User Guide

13

Page 14: Dell™ Change Auditor for Exchange 6i.dell.com/sites/doccontent/shared-content/data-sheets/en/Document… · ©2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary

Repeat this step to add any additional folder names to the search query.

To search for changes to a specific Administration cmdlet:

1 On the What tab, expand the Add tool bar button and click Subsystem | Exchange Online to display the Exchange Online dialog.

2 On the Exchange Online dialog, select the Selected Events option. Selecting this option enables the remaining fields/controls on this dialog.

• Select the Administration Cmdlet Event option.

• Click the check box under the Cmdlet heading:

• Select the comparison operator to be used: Contains or Does not contain

• Enter the ‘command’ to be used to search for a match. For example, to search for any ‘add’ users, enter add.

• If you want to restrict the search to a specific mailbox, click the check box under the Cmdlet Object heading:

• Select the comparison operator to be used: Contains or Does not contain

• Enter the name (or partial name) of a mailbox to be used to search for a match. Case sensitivity is based on your SQL setting.

• Click the Add button to add the expression to the selection list at the bottom of the page.

Repeat this step to add any additional cmdlets and/or cmdlet objects to the search query.

To search for changes to a specific Administration cmdlet object:

1 On the What tab, expand the Add tool bar button and click Subsystem | Exchange Online to display the Exchange Online dialog.

2 On the Exchange Online dialog, select the Selected Events option. Selecting this option enables the remaining fields/controls on this dialog.

• Select the Administration Cmdlet Event option.

• Click the check box under the Cmdlet Object heading:

• Select the comparison operator to be used: Contains or Does not contain

• Enter the name (or partial name) of a mailbox to be used to search for a match. Case sensitivity is based on your SQL setting.

• Click the Add button to add the expression to the selection list at the bottom of the page.

Repeat this step to add any additional cmdlet objects to the search query.

NOTE: When multiple folder names are added to the selection list at the bottom of the page, Change Auditor uses the ‘OR’ operator to evaluate events, returning events that meet any of the entries listed.

NOTE: If both the Cmdlet and Cmdlet Object are specified, both expressions must be met before an event will be returned.

NOTE: When multiple entries are added to the selection list at the bottom of the page, Change Auditor uses the ‘OR’ operator to evaluate events, returning events that meet any of the entries listed.

NOTE: When multiple entries are added to the selection list at the bottom of the page, Change Auditor uses the ‘OR’ operator to evaluate events, returning events that meet any of the entries listed.

Dell Change Auditor for Exchange 6.6User Guide

14

Page 15: Dell™ Change Auditor for Exchange 6i.dell.com/sites/doccontent/shared-content/data-sheets/en/Document… · ©2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary

3

Exchange Mailbox Auditing

• Introduction

• Exchange Mailbox Auditing page

• Exchange Mailbox Auditing list

• Exchange Mailbox Auditing wizard

IntroductionThe Exchange Mailbox auditing feature in Change Auditor for Exchange helps tighten enterprise-wide change and control policies by tracking user and administrator activity such as user account changes, delivery restriction changes, send on behalf updates, and more. With these types of real-time alerts and in-depth analysis and reporting capabilities, your Exchange infrastructure is always protected from exposure to suspicious behavior or unauthorized access and kept in compliance with corporate and government standards.

To enable Exchange Mailbox auditing, you must first define whose (users or groups) mailbox activities are to be audited.

1 Define an Exchange Mailbox Auditing list that contains the directory objects whose mailbox activities are to be audited.

2 In Change Auditor, some of the Exchange Mailbox events are disabled by default due to the potentially high volume of events that can occur. To captured these events, you must first enable them using the Audit Events page of the Administration Tasks tab.

NOTE: Agent processing of Exchange auditing and protection configurations may slow down initial user logon access or cause timeouts if a large number of end user logons are occurring at the same time. To avoid this issue, it is recommended that changes to Change Auditor Exchange Mailbox auditing or protection configurations be performed during maintenance intervals or other periods of low user mailbox activity.

Before the system is returned to normal load, one user should logon to Outlook® Web Access (OWA), Outlook, and Exchange Web Services (EWS, Outlook for Mac®) clients. This will trigger the Change Auditor agent to process the Exchange Mailbox auditing and protection configuration changes when the fewest logons are occurring.

NOTE: To eliminate auditing of automated tasks, the Change Auditor agent attempts to automatically exclude auditing of mailbox accesses by Blackberry® Enterprise Server (BES) or similar service accounts. These accounts have both ‘Receive All’ and ‘Administer Information Store’ rights on the mailbox database. If these explicit rights are granted to user accounts, those accounts will also be excluded from mailbox auditing, which may not be desired. If necessary, this automated exclusion can be disabled on a server-by-server basis. Contact Dell™ Technical Support for additional information.

NOTE: Change Auditor for Exchange now generates shared mailbox events for Exchange 2007 SP1 (and higher) shared mailbox, room and equipment resources, and for any other mailboxes that the user has identified as shared. See the Managing Shared Mailboxes appendix for more information.

Dell Change Auditor for Exchange 6.6User Guide

15

Page 16: Dell™ Change Auditor for Exchange 6i.dell.com/sites/doccontent/shared-content/data-sheets/en/Document… · ©2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary

This chapter provides a description of the Exchange Mailbox Auditing page and explains how to create and maintain the Exchange Mailbox Auditing list. For a description of the dialogs mentioned in this chapter, refer to the online help.

Exchange Mailbox Auditing pageTo enable Exchange Mailbox auditing in Change Auditor for Exchange, you must first specify whose mailbox activities are to be audited. To do this, you will use the Exchange Mailbox Auditing page, which is displayed when Exchange Mailbox is selected from the Auditing task list in the navigation pane of the Administration Tasks tab.

The Exchange Mailbox Auditing page contains a list of the directory objects whose mailboxes are to be audited. That is, if a directory object is NOT listed on this page, its mailbox will NOT be audited by Change Auditor. To add a directory object to this list, click the Add tool bar button. Once added, the following information will be displayed:

Type

IMPORTANT: When the Message read by non-owner event is enabled and a mailbox is moved from one mailbox store to another, Change Auditor will generate an event for every email in the mailbox that is being moved. For example, if a user has 1,000 emails in his/her mailbox, you will receive 1,000 Message read by non-owner events in Change Auditor.

To avoid generating these events, do NOT add the user account for the mailbox to be moved to the list on the Exchange Mailbox Auditing page on the Administration Tasks tab.

NOTE: Authorization to use the administration tasks on the Administrations Tasks tab is defined using the Application User Interface page under the Configuration task list. If you are denied access to the tasks on this page, refer to the Dell™ Change Auditor User Guide for more information on how to gain access.

NOTE: The directory objects listed on this page only apply to the events contained in the Exchange Mailbox Monitoring and Exchange ActiveSync Monitoring facilities. This list does not apply to any of the other Exchange facilities.

Dell Change Auditor for Exchange 6.6User Guide

16

Page 17: Dell™ Change Auditor for Exchange 6i.dell.com/sites/doccontent/shared-content/data-sheets/en/Document… · ©2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary

Displays the type of directory object selected for Exchange Mailbox auditing (i.e., User, Group, Container, DomainDNS, OrganizationalUnit, or BuiltinDomain)

Events

Indicates the type of events to be audited:

• Non-owner

• Non-owner or Owner (only applies to individual user objects)

To change this setting, place your cursor in this cell, click the arrow control and select the appropriate option from the list.

Scope

Displays the scope of coverage:

• Object

• One Level

• Subtree

To change this setting, place your cursor in this cell and select the appropriate option from the list.

Exclude

Indicates whether mailboxes in the directory object will be audited (Exclude = No) or excluded from auditing (Exclude = Yes).

To change this setting, place your cursor in this cell, click the arrow control and select Yes to exclude the directory object or No to include the directory object in the auditing process.

Status

Indicates whether the audit entry for this directory object is enabled or disabled. Disabled entries have no effect on auditing, as if they has been deleted. Disabled entries can be re-enabled later, if desired.

To change this setting, place your cursor in this cell, click the arrow control and select Enabled to enable the audit object or Disabled to disable the audit object.

Exchange Mailbox

Displays the canonical name associated with the directory objects listed.

Name

Displays the name of the directory objects listed.

DisplayNameIf applicable, this column shows the display name assigned to the directory object.

Exchange Mailbox Auditing listThe Exchange Mailbox Auditing list contains a list of the directory object’s whose Exchange Mailbox is to be either included or excluded in the auditing process. Click the Add tool bar button to include a mailbox in the auditing process or use the Add | Exclude tool bar option to exclude a mailbox from the auditing process.

NOTE: ‘By owner’ events are disabled by default and will need to be enabled in order to capture these events if the Non-owner or Owner option is selected.

NOTE: The cells directly under the main heading rows are used for filtering data. That is, as you enter characters into these cells, the client will redisplay the templates that meet the search criteria (i.e., comparison operator and characters entered). For more details about using the data filtering function provided throughout the Change Auditor client, see the Dell™ Change Auditor User Guide.

Dell Change Auditor for Exchange 6.6User Guide

17

Page 18: Dell™ Change Auditor for Exchange 6i.dell.com/sites/doccontent/shared-content/data-sheets/en/Document… · ©2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary

To include an Exchange Mailbox in the auditing process:

1 Open the Administration Tasks tab.

2 Click the Auditing task button at the bottom of the navigation pane (left pane).

3 Select Exchange Mailbox (under the Applications heading in the Auditing task list) to open the Exchange Mailbox Auditing page.

4 Click the Add tool bar button to display the Exchange Auditing Wizard.

5 Select one of the options at the top of the page: Enterprise or This Object (default).

6 If the This Object option is selected, use the Browse and Search pages to locate and select a directory object (i.e., User, Group, Container, DomainDNS, OrganizationalUnit, or BuiltinDomain) and use the Add button to add the selected directory object to the Selected Object list at the bottom of the page.

Repeat this step to add additional directory objects to the Exchange Mailbox Auditing list.

7 Click the Finish button to close this wizard and return to the Exchange Mailbox Auditing page, where your selections will now be listed with a No in the Exclude cell.

8 By default, only Non-Owner events will be selected for auditing.

For individual user mailboxes, you can change this to include ‘By Owner’ events as well. To do this, place your cursor in the Events cell, click the arrow control and select the Owner, Non-Owner option from the list.

9 The default scope of coverage is displayed in the Scope cell. You can change this by placing your cursor in the Scope cell, clicking the arrow control and selecting the appropriate option from the list:

• Object - to audit an individual object

• One Level - to audit an object and its direct child objects

• Subtree - to audit an object and all of its subordinate objects (all levels)

To exclude an Exchange Mailbox from the auditing process:

1 Open the Administration Tasks tab.

2 Click the Auditing task button at the bottom of the navigation pane (left pane).

3 Select Exchange Mailbox (under the Applications heading in the Auditing task list) to open the Exchange Mailbox Auditing page.

4 Expand the Add tool bar button and click Exclude to display the Exchange Auditing Wizard.

NOTE: From the Exchange Mailbox Auditing page you can include a previously excluded mailbox by changing the setting in the Exclude cell. Use one of the following methods:

• Place your cursor in the Exclude cell of the mailbox to be included, click the arrow control and select No.

• Right-click the mailbox entry and click Audit.

IMPORTANT: Selecting ‘By Owner’ auditing for many mailboxes can produce a very large number of events. This adversely affects Change Auditor auditing and in severe cases the performance of the Exchange Server itself. In extreme cases, Outlook® connections may be slowed or dropped. Select owner auditing for at most only a small number of critical mailboxes.

NOTE: ‘By Owner’ events are disabled by default. Therefore, you will need to enable these events from the Audit Events page on the Administration Tasks tab before Change Auditor will process these events.

NOTE: Auditing normal mailboxes where access permission is granted to many delegates (more than 10), can produce large numbers of non-owner events. This will adversely affect Change Auditor auditing and in severe cases, the performance of the Exchange Server itself. If these mailboxes need to be audited, add them to the Shared Mailbox list (User Defined tab) to reduce unwanted non-owner events and to improve performance. See Managing Shared Mailboxes for more information.

Dell Change Auditor for Exchange 6.6User Guide

18

Page 19: Dell™ Change Auditor for Exchange 6i.dell.com/sites/doccontent/shared-content/data-sheets/en/Document… · ©2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary

5 Select one of the options at the top of the page: Enterprise or This Object (default).

6 If the This Object option is selected, use the Browse and Search pages to locate and select a directory object (i.e., User, Group, Container, DomainDNS, OrganizationalUnit, or BuiltinDomain) and click the Add button to add the selected directory object to the Selected Object list at the bottom of the page.

Repeat this step to add additional directory objects to the exclusion list.

7 Click the Finish button to close this wizard and return to the Exchange Mailbox Auditing page, where your selections will now be listed with a Yes in the Exclude cell.

For example, if you wanted to audit all mailboxes in the Enterprise, except those belonging to the accounts in the ExchangeAdmin organizational unit, you would create two entries in the Exchange Mailbox Auditing list:

• Use the Add tool bar button to create an audit entry for the Enterprise with Exclude = No.

• Use the Add | Exclude tool bar option to create an audit entry for the ExchangeAdmin OU with Exclude = Yes.)

To disable an audit entry:

The disable feature allows you to temporarily disable the audit entry of a directory object without having to remove it from the Exchange Mailbox Auditing list.

1 On the Exchange Mailbox Auditing page, use one of the following methods to disable the auditing of a directory object’s mailbox:

• Place your cursor in the Status cell for the Exchange mailbox whose auditing is to be disabled, click the arrow control and select Disabled

• Right-click the Exchange mailbox whose auditing is to be disabled and select Disable

The entry in the Status column for the object will change to ‘Disabled’.

2 To re-enable the auditing of a directory object’s mailbox, use the Enable option in either the Status cell or right-click menu.

To delete an Exchange mailbox from the auditing list:

1 On the Exchange Mailbox Auditing page, use one of the following methods to delete an Exchange mailbox from the auditing list:

• Select the Exchange mailbox to be deleted and click the Delete tool bar button

• Right-click the Exchange mailbox to be deleted and select Delete

2 A dialog will be displayed confirming that you want to delete the Exchange mailbox from the auditing list. Click Yes.

Exchange Mailbox Auditing wizardThe Exchange Mailbox Auditing wizard is displayed when you use the Add (or Add | Exclude) tool bar button on the Exchange Mailbox Auditing page. This wizard allows you to locate and select directory objects (i.e., User, Group, Container, DomainDNS, OrganizationalUnit, or BuiltinDomain) that are to be added to the Exchange Mailbox Auditing list. Depending on the commands used (Add vs. Add | Exclude) you will either be selecting directory objects whose Exchange mailboxes are to be included or excluded from the auditing process.

The following table provides a description of the fields and controls in the Exchange Mailbox Auditing wizard.

NOTE: From the Exchange Mailbox Auditing page you can exclude a previously included mailbox by changing the setting in the Exclude cell. Use one of the following methods:

• Place your cursor in the Exclude cell of the mailbox to be included, click the arrow control and select Yes.

• Right-click the mailbox entry and click Exclude.

Dell Change Auditor for Exchange 6.6User Guide

19

Page 20: Dell™ Change Auditor for Exchange 6i.dell.com/sites/doccontent/shared-content/data-sheets/en/Document… · ©2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary

Table 2. Exchange Auditing wizard

Select an Exchange Mailbox(es) to Audit pageThis page is displayed when the Add tool bar button is used. On this page select the Exchange mailbox(es) to be audited.

NOTE: If you want to audit members of a group, you must select a security group (not a distribution group, even though distribution groups will be included in the list).

Scope Select one of the following options to define the scope of coverage:

• Enterprise• This Object

When the This Object option is selected the Browse and Search pages will be enabled allowing you to select a directory object (e.g., user, group, container, DomainDNS, OrganizationalUnit, or BuiltinDomain) whose mailbox is to be audited.

Browse page Displays a hierarchical view of the containers in your environment allowing you to locate and select the directory object(s) whose Exchange mailbox is to be audited.

Once you have selected an object, click the Add button to move the entry to the list at the bottom of the page.

Search page Use the controls at the top of the Search page to search your environment to locate the directory object(s) whose Exchange mailbox is to be audited.

Once you have selected an object, click the Add button to move the entry to the list at the bottom of the page.

Options page Use the Options page to modify the search options used to retrieve directory objects.

NOTE: For more information on using the Browse, Search or Options pages, refer to Directory Object Picker in the online help or Dell™ Change Auditor User Guide.

Selection List The directory object(s) selected for Exchange mailbox auditing are displayed in the list box located across the bottom of this page. Use the buttons located above this list box to add and remove objects.

• Add - Select an object in the Browse or Search page and then click the Add button to add it to the list.

• Remove - Select an entry in the selection list and then click the Remove button to remove it.

Dell Change Auditor for Exchange 6.6User Guide

20

Page 21: Dell™ Change Auditor for Exchange 6i.dell.com/sites/doccontent/shared-content/data-sheets/en/Document… · ©2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary

Select An Exchange Mailbox(es) to Exclude From Auditing pageThis page is displayed when the Add | Exclude tool bar option is used. On this page, select the directory objects whose Exchange mailboxes are to be excluded from auditing.

NOTE: If you want to exclude members of a group, you must select a security group (not a distribution group, even though distribution groups will be included in the list).

Scope Select one of the following options to define the scope of coverage:

• Enterprise• This Object

When the This Object option is selected the Browse and Search pages will be enabled allowing you to select a directory object (e.g., user, group, container, DomainDNS, OrganizationalUnit, or BuiltinDomain) whose mailbox is to be excluded from being audited.

Browse page Displays a hierarchical view of the containers in your environment allowing you to locate and select the directory object(s) whose Exchange mailbox is to be excluded from being audited.

Once you have selected an object, click the Add button to move the entry to the list at the bottom of the page.

Search page Use the controls at the top of the Search page to search your environment to locate the directory object(s) whose Exchange mailbox is to be excluded from being audited.

Once you have selected an object, click the Add button to move the entry to the list at the bottom of the page.

Options page Use the Options page to modify the search options used to retrieve directory objects.

Table 2. Exchange Auditing wizard

Dell Change Auditor for Exchange 6.6User Guide

21

Page 22: Dell™ Change Auditor for Exchange 6i.dell.com/sites/doccontent/shared-content/data-sheets/en/Document… · ©2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary

NOTE: For more information on using the Browse, Search or Options pages, refer to Directory Object Picker in the online help or Dell™ Change Auditor User Guide.

Excluded Objects List The directory object(s) selected for exclusion from Exchange mailbox auditing are displayed in the list box located across the bottom of this page. Use the buttons located above this list box to add and remove objects.

• Add - Select an object in the Browse or Search page and then click the Add button to add it to the list.

• Remove - Select an entry in the Excluded Objects list and then click the Remove button to remove it.

Table 2. Exchange Auditing wizard

Dell Change Auditor for Exchange 6.6User Guide

22

Page 23: Dell™ Change Auditor for Exchange 6i.dell.com/sites/doccontent/shared-content/data-sheets/en/Document… · ©2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary

4

Exchange Online Mailbox Auditing

• Introduction

• Exchange Online Auditing page

• Exchange Online Auditing templates

• Exchange Online Auditing wizard

IntroductionExchange Online was previously offered as a stand-alone service, but is now rolled up into the Office 365™ product line. Microsoft® offers a number of different plans for small, mid-sized and enterprise businesses. Since these are cloud-based solutions, Change Auditor for Exchange is limited as to what can be audited. Change Auditor for Exchange requests and collects mailbox and administrative audit logs provided by Microsoft, and as a result the events and details reported in Change Auditor are limited to what is provided by these logs. Further, performance is limited to back-end server availability and utilization, and remote PowerShell® audit log search performance.

Relative to other Exchange auditing, Exchange Online auditing has the following limitations:

• Only non-owner mailbox activity can be audited because Exchange Online has no provisions for auditing owner activity.

• Fewer event classes are available because there are no provisions in Exchange Online for message-read or certain other events.

• Exchange Online events are organized in a new Change Auditor subsystem and facilities. They are not included with Exchange events for administration, searching or reporting.

• Multiple Office 365 Exchange Online organizations can be audited; however, each organization must be monitored by a separate auditing template and different Change Auditor agent.

• When auditing large numbers of Exchange Online mailboxes, you can expect a substantial increase in the time between an event occurring and that event being reported by Change Auditor.

• Exchange Online auditing enables and uses Microsoft’s Mailbox and Administrative audit logging in the selected Exchange Online organization. Change Auditor enables all auditing options for any mailbox selected for auditing, and attempts to disable all auditing options for previously audited mailboxes that have been subsequently deselected for auditing. If you are using those facilities for other applications or purposes, you may witness application conflicts in your logs.

IMPORTANT: Exchange Online auditing is intended for monitoring small numbers of high-value Exchange Online mailboxes. Because of the high overhead of Change Auditor for Exchange’s use of remote PowerShell to configure and fetch audit logs from Exchange Online back-end servers, selecting more than a few dozen mailboxes will significantly increase Change Auditor event latency times. In addition, enabling Exchange audit logging on large numbers of Exchange Online mailboxes can also affect back-end server performance.

Dell Change Auditor for Exchange 6.6User Guide

23

Page 24: Dell™ Change Auditor for Exchange 6i.dell.com/sites/doccontent/shared-content/data-sheets/en/Document… · ©2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary

System OverviewThe following diagram illustrates how Exchange Online integrates with Change Auditor to provide this auditing capability.

1 Users configure the Exchange Online auditing template and select a Change Auditor agent to receive events.

2 The Change Auditor agent connects to the server for the Office 365™ Exchange Online organization using PowerShell and configures Exchange Online auditing as required to collect resulting audit events.

3 The Change Auditor agent periodically uses PowerShell to retrieve recent Exchange Online auditing.

4 The Change Auditor agent processes events and forwards them to the Change Auditor coordinator.

5 The Change Auditor coordinator forwards events to the Change Auditor database.

This chapter provides a description of the Exchange Online Auditing page and wizard. It also explains how to create and maintain the Exchange Online auditing templates. For a description of the dialogs mentioned in this chapter, refer to the online help.

Exchange Online Auditing pageTo enable Exchange Online auditing in Change Auditor for Exchange, you must first specify whose mailbox activities are to be audited and assign a Change Auditor agent to monitor the Exchange Online organization. To do this use the Exchange Online Auditing page, which is displayed when Exchange Online is selected from the Auditing task list in the navigation pane of the Administration Tasks tab.

NOTE: Authorization to use the administration tasks on the Administrations Tasks tab is defined using the Application User Interface page under the Configuration task list. If you are denied access to the tasks on this page, refer to the Dell™ Change Auditor User Guide for more information on how to gain access.

Dell Change Auditor for Exchange 6.6User Guide

24

Page 25: Dell™ Change Auditor for Exchange 6i.dell.com/sites/doccontent/shared-content/data-sheets/en/Document… · ©2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary

The Exchange Online Auditing page contains a list of Exchange Online auditing templates that define the directory objects whose Exchange Online mailboxes are to be audited. That is, if a directory object is NOT listed on this page, its Exchange Online mailbox will NOT be audited by Change Auditor. To add an auditing template, click the Add tool bar button. Once added, the following information will be displayed for each template:

Template

Displays the name assigned to the auditing template when it was created.

Status

Indicates whether the auditing template is enabled or disabled.

Organization

Displays the Exchange Online organization being audited.

Agent

Displays the name of the Change Auditor agent assigned to audit the Exchange Online organization.

Audit Administration

Indicates whether the Administrative cmdlets are to be monitored.

Accounts

This field is used for filtering data.

Excluded Accounts

This field is used for filtering data.

Click the expansion box to the left of the Template Name to expand this view and display the following details about the template:

Dell Change Auditor for Exchange 6.6User Guide

25

Page 26: Dell™ Change Auditor for Exchange 6i.dell.com/sites/doccontent/shared-content/data-sheets/en/Document… · ©2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary

Mailboxes

Displays the name of the account whose Exchange Online mailbox is included in the auditing template.

Status

Indicates whether auditing of the selected Exchange Online Mailbox is enabled or disabled.

Account Type

Displays the whether the account is a user mailbox or a shared mailbox.

If you have excluded any user accounts using the last page of the wizard, the following details are also displayed:

Excluded Account

Displays the name of any user account excluded from auditing.

Status

Indicates whether the user account is ‘exempt’ from auditing (enabled) or not (disabled).

Account Type

Displays the type of account: User mailbox or Shared mailbox.

Exchange Online Auditing templatesIn order to audit Office 365™ Exchange Online, you must first create an Exchange Online auditing template that defines the type of events (mailbox and/or administration cmdlet) to be audited, the Change Auditor agent assigned to audit the Exchange Online organization as well as the online mailboxes that are to be audited. Use the Add tool bar button on the Exchange Online Auditing page to create a new auditing template.

To create an Exchange Online auditing template:

1 Open the Administration Tasks tab.

2 Click the Auditing task button at the bottom of the navigation pane (left pane).

3 Select Exchange Online (under the Applications heading in the Auditing task list) to open the Exchange Online Auditing page.

4 Click the Add tool bar button to display the Exchange Online Auditing Wizard.

5 On the first page of wizard, enter the following information:

• Template Name: Enter a descriptive name for the auditing template.

• Audit: Select one of the following options to define what is to be included in this auditing template:

• Mailboxes (Default)

• Administration cmdlets

• Both

• Click the Browse button to select the Change Auditor agent to be used to monitor the Exchange Online organization. Selecting this button displays the Change Auditor Agents dialog allowing you to select from a list of installed Change Auditor agents.

NOTE: The cells directly under the main heading rows are used for filtering data. That is, as you enter characters into these cells, the client will redisplay the templates that meet the search criteria (i.e., comparison operator and characters entered). For more details about using the data filtering function provided throughout the Change Auditor client, see the Dell™ Change Auditor User Guide.

Dell Change Auditor for Exchange 6.6User Guide

26

Page 27: Dell™ Change Auditor for Exchange 6i.dell.com/sites/doccontent/shared-content/data-sheets/en/Document… · ©2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary

• Click Set Credentials to enter the credentials of the Office 365 administrator account to be used. Selecting this button displays the Office 365 Credentials dialog allowing you to enter the user name (<UserName>@<OrganizatonName>.onmicrosoft.com) and password to be used to access the selected Exchange Online organization.

Click Next.

6 On the Select Exchange Online Mailboxes page, select one or more directory objects whose Online Exchange mailboxes are to be audited and click the Add button to add them to the selection list at the bottom of the page.

7 (Optional) Click Next to select Exchange Online users who are to be excluded from the auditing process. The Select Exchange Online users exempt from auditing page displays a list of the user accounts selected for auditing. To exclude a user, select one or more users from the list and click the Add button to add them to the selection list at the bottom of the page.

That is, if you add ‘TestUser1’ to be exempt from auditing, you will not see any activity by TestUser1 on any mailbox TestUser1 has permission to open.

8 Click the Finish button to save the template, close the wizard and return to the Exchange Online Auditing page, where details about the template will be displayed.

To disable an auditing template:

The disable feature allows you to temporarily stop auditing the specified Exchange Online mailbox(es) without having to remove the auditing template or individual mailboxes from an active template.

1 On the Exchange Online Auditing page, use one of the following methods to disable an auditing template:

• Place your cursor in the Status cell for the auditing template to be disabled, click the arrow control and select Disabled.

• Right-click the template to be disabled and select Disable

The entry in the Status column for the template will change to ‘Disabled’.

2 To re-enable the auditing template, use the Enable option in either the Status cell or right-click menu.

To disable the auditing of a mailbox in an auditing template:

1 On the Exchange Online Auditing page, use one of the following methods to disable the auditing of an Exchange Online mailbox:

• Place your cursor in the Status cell for the Exchange Online mailbox whose auditing is to be disabled, click the arrow control and select Disabled

• Right-click the Exchange Online mailbox whose auditing is to be disabled and select Disable

The entry in the Status column for the object will change to ‘Disabled’.

2 To re-enable the auditing of an Exchange Online mailbox, use the Enable option in either the Status cell or right-click menu.

To delete a auditing template:

1 On the Exchange Online Auditing page, use one of the following methods to delete an auditing template:

• Select the template to be deleted and use the Delete | Delete Template tool bar button

• Right-click the template to be deleted and select Delete

2 A dialog will be displayed confirming that you want to delete the auditing template. Click Yes.

To delete a mailbox from the auditing template:

1 On the Exchange Online Auditing page, use one of the following methods to delete an Exchange Online mailbox from the auditing template:

Dell Change Auditor for Exchange 6.6User Guide

27

Page 28: Dell™ Change Auditor for Exchange 6i.dell.com/sites/doccontent/shared-content/data-sheets/en/Document… · ©2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary

• Select the Exchange Online mailbox to be deleted and use the Delete | Delete Exchange Mailbox tool bar button

• Right-click the Exchange Online mailbox to be deleted and select Delete

2 A dialog will be displayed confirming that you want to delete the mailbox from the auditing list. Click Yes.

Exchange Online Auditing wizardThe Exchange Online Auditing wizard is displayed when you click the Add or Edit tool bar button on the Exchange Online Auditing page. This wizard allows you to specify Exchange Online user and shared mailboxes for auditing as well as the Change Auditor agent assigned to monitor the Exchange Online organization. You can also use this wizard to modify a previously defined auditing template.

The following table provides a description of the fields and controls in the Exchange Online Auditing wizard.

NOTE: A red flashing icon ( ) indicates that you have not yet entered the required information or you have selected a Change Auditor agent that is already assigned to another Exchange Online Auditing template. Hovering your cursor over this icon displays a tool tip explaining what needs to be entered.

Table 3. Exchange Online Auditing wizard

Create or modify an Exchange Online Auditing Template pageUse the first page of the wizard to name the template, select the kind of activities to be audited and to specify the Change Auditor agent to be used to audit the selected Exchange Online organization.

Template Name Enter a descriptive name for the auditing template.

Audit Select one of the following options to define the types of activity to be audited:

• Mailboxes (default)

• Administrative cmdlets

• Both

Dell Change Auditor for Exchange 6.6User Guide

28

Page 29: Dell™ Change Auditor for Exchange 6i.dell.com/sites/doccontent/shared-content/data-sheets/en/Document… · ©2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary

Change Auditor Agent Displays information about the Change Auditor agent assigned to audit an Exchange Online organization.

NOTE: Multiple Exchange Online organizations can be audited; however, each organization must be monitored by a separate auditing template and different Change Auditor agent.

Use the buttons above this pane to select an agent and enter the Office 365™ administrator account credentials to be used.

• Browse - Click the Browse button to display the Change Auditor Agents dialog, which displays a list of available servers. From this dialog, select the Change Auditor agent to be used to capture the events from the Exchange Online organization.

• Set Credentials - Once you have selected the Change Auditor agent to be used, click the Set Credentials button to enter the credentials to be used to access the Exchange Online organization.

Selecting this button displays the Office 365 Credentials dialog which prompts you to enter the user name (<UserName>@<OrganizationName>.onmicrosoft.com) and password of the Office 365 administrator account to be used.

• Clear Credentials - Use the Clear Credentials button to clear the credentials previously entered.

Once a Change Auditor agent is selected, the following information is displayed:

• Agent

• Domain

• Agent FQDN

• Office 365 administrator account

NOTE: If the Office 365 administrator account field is blank, click the Set Credentials button to enter the credentials to be used to access the Exchange Online organization.

Select Exchange Online mailboxes to audit pageThis page displays a list of Exchange Online accounts whose mailbox can be audited. From this list, select the user or shared mailboxes to be included in this auditing template.

Table 3. Exchange Online Auditing wizard

Dell Change Auditor for Exchange 6.6User Guide

29

Page 30: Dell™ Change Auditor for Exchange 6i.dell.com/sites/doccontent/shared-content/data-sheets/en/Document… · ©2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary

Data grid The data grid at the top of this page displays a list of the user accounts whose mailbox can be audited. It displays the following information for each account:

• Display Name

• Account Type

To include a user or shared mailbox in an auditing template, select it from the data grid list and click Add to add it to the selection list at the bottom of the page.

Selection list The account(s) selected for Exchange Online auditing are displayed in the list box located across the bottom of this page. Use the buttons located above this list box to add and remove accounts.

• Add - Select an account from the data grid and click the Add button to add it to the selection list.

• Remove - Select an account from the selection list and click Remove to remove it from this list.

(Optional) Select Exchange Online users exempt from auditing pageThe last page of the wizard displays a list of the user accounts selected on the previous page. From this page, you can optionally select one or more users who are to be exempt from auditing. That is, if you add a user account to the Excluded users list (bottom of the page), you will not see any activity by this user on any mailbox he/she has permission to open.

Data grid The data grid at the top of this page displays a list of the user accounts selected on the previous page. To exclude a user account from the auditing process, select it from the data grid and click Add to add it to the Excluded users list at the bottom of the page.

Excluded users list The user account(s) selected for exclusion from Exchange Online mailbox auditing are displayed in the list box located across the bottom of this page. Use the buttons located above this list box to add and remove accounts.

• Add - Select one or more user accounts from the data grid and click Add to add them to the Excluded users list.

• Remove - Select a user from the Excluded users list and click Remove to remove it from the list.

Table 3. Exchange Online Auditing wizard

Dell Change Auditor for Exchange 6.6User Guide

30

Page 31: Dell™ Change Auditor for Exchange 6i.dell.com/sites/doccontent/shared-content/data-sheets/en/Document… · ©2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary

5

Exchange Settings and Event Logging (Agent Configuration Page)

• Introduction

• Exchange Folder Open Event setting

• Exchange event logging

IntroductionFrom the Agent Configuration page on the Administration Tasks tab you can define how Change Auditor is to handle duplicate Exchange folder open events and enable/disable event logging for Exchange events.

This chapter explains how to modify the Exchange setting and enable event logging using the Agent Configuration page. For a description of the dialogs mentioned in this chapter, refer to the online help. For more information about agent configurations, refer to the Dell™ Change Auditor User Guide.

Exchange Folder Open Event settingUse the Exchange tab at the top of the Configuration Setup dialog to define how Change Auditor is to handle duplicate folder open events.

Discard duplicates that occur within nn seconds

This setting defines how long Exchange folder open events are to be ‘held’ to determine if duplicates have occurred before they are forwarded to the Change Auditor client. It is intended to eliminate the folder open events that Outlook or OWA Exchange users get when their inbox is automatically refreshed.

By default, this setting is set to zero indicating that it is turned off and duplicate folder opens will be sent to the Change Auditor client. However, you can use the arrow controls to enable this setting and specify the amount of time folder open events are to be held to determine if duplicates have occurred. Valid range is 0 - 600 seconds.

To set the duplicate folder open event setting:

1 Open the Administration Tasks tab.

2 Click the Configuration task button at the bottom of the navigation pane.

3 Select Agent in the Configuration task list to display the Agent Configuration page.

4 Click the Configurations tool bar button.

5 On the Configuration Setup dialog, select an agent configuration from the left-hand pane.

6 Open the Exchange tab and set the duplicate folder open event setting as defined above.

NOTE: This setting and event logging apply to the Exchange subsystem and therefore do not apply to Office 365 Exchange Online events, which are part of the Exchange Online subsystem.

Dell Change Auditor for Exchange 6.6User Guide

31

Page 32: Dell™ Change Auditor for Exchange 6i.dell.com/sites/doccontent/shared-content/data-sheets/en/Document… · ©2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary

7 Once you have set this setting, click OK to save your selections, close the dialog and return to the Agent Configuration page.

8 On the Agent Configuration page, select the Change Auditor agent(s) assigned to the selected configuration and click the Refresh Configuration tool bar button or right-click command. This will ensure the agent(s) are using the latest configuration.

Exchange event loggingIn addition to real-time event auditing, you can enable event logging to capture Exchange events locally in a Windows® event log. This event log can then be collected using Dell™ InTrust™ to satisfy long-term storage requirements.

When event logging for Exchange is enabled in Change Auditor, Exchange events are sent to the InTrust for Exchange event log. When enabled, the following types of Exchange events are sent to the event log:

• ActiveSync events

• Exchange Mailbox events, including non-owner, owner, permission and protection events

• Public folder events

• Store mount events

• System events

• Exchange Administrative PowerShell events

See the Dell™ Change Auditor for Exchange Event Reference Guide for a list of the events that can be sent to this event log.

To enable Exchange event logging:

1 Open the Administration Tasks tab.

2 Click the Configuration task button at the bottom of the navigation pane.

3 Select Agent in the Configuration task list to display the Agent Configuration page.

4 Click the Event Logging tool bar button.

5 On the Event Logging dialog, select Exchange.

6 Click OK to save your selection and close the dialog.

Exchange events, including activities associated with the Exchange Mailboxes included on the Exchange Mailbox Auditing list, will then to be sent to the event log.

NOTE: If you do not refresh the agent’s configuration, the agent will automatically check for a new agent configuration based on the polling interval setting (located on the System Settings tab of the Configuration Setup dialog). The default is every 15 minutes.

NOTE: Only configured Exchange Mailbox activities are sent to the event log.

Dell Change Auditor for Exchange 6.6User Guide

32

Page 33: Dell™ Change Auditor for Exchange 6i.dell.com/sites/doccontent/shared-content/data-sheets/en/Document… · ©2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary

6

Exchange Mailbox Protection

• Introduction

• Exchange Mailbox Protection page

• Exchange Mailbox Protection templates

• Exchange Protection wizard

IntroductionWhen licensed, Change Auditor for Exchange can also provide additional protection over important mailboxes. The Exchange Mailbox protection feature prevents unwanted access to Exchange mailboxes, making it much more difficult for rogue administrators to access critical mailboxes.

To use the Exchange Mailbox Protection feature, you must first create an Exchange Mailbox Protection template which specifies whose mailboxes are to be protected. Through these protection templates, you can prevent anyone but the mailbox owner or even the owner from accessing a particular mailbox. You can also specify particular users or groups who are allowed to access protected mailboxes.

This chapter provides instructions for creating Exchange Mailbox Protection templates, as well as a description of the Exchange Mailbox Protection page and Exchange Mailbox Protection wizard. For a description of the dialogs mentioned in this chapter, refer to the online help.

Exchange Mailbox Protection pageThe Exchange Mailbox Protection page is displayed when Exchange Mailbox is selected from the Protection task list in the navigation pane of the Administration Tasks tab. From this page you can launch the Exchange Mailbox Protection wizard to define whose mailboxes are to be protected from unauthorized access. You can also edit existing templates, disable a template, and remove templates that are no longer being used.

TIP: Exchange Mailbox protection is designed to provide protection coverage for a small number of high-value mailboxes. After monitoring has been enabled or changed, it may take several minutes to complete the configuration process necessary to enable the protection feature on the agent. Protecting a very large number of mailboxes slows down the configuration process.

TIP: Agent processing of Exchange auditing and protection configurations may slow down initial user logon access or cause timeouts if a large number of end user logons are occurring at the same time. To avoid this issue, it is recommended that changes to Change Auditor Exchange Mailbox auditing or protection configurations be performed during maintenance intervals or other periods of low user mailbox activity.

Before the system is returned to normal load, one user should logon to Outlook® Web Access (OWA), Outlook, and Exchange Web Services (EWS, Outlook for Mac) clients. This will trigger the Change Auditor agent to process the Exchange Mailbox auditing and protection configuration changes when the fewest logons are occurring.

NOTE: Authorization to use the administration tasks on the Administrations Tasks tab is defined using the Application User Interface page under the Configuration task list. If you are denied access to the tasks on this page, refer to the Dell™ Change Auditor User Guide for more information on how to gain access.

Dell Change Auditor for Exchange 6.6User Guide

33

Page 34: Dell™ Change Auditor for Exchange 6i.dell.com/sites/doccontent/shared-content/data-sheets/en/Document… · ©2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary

The Exchange Mailbox Protection page contains an expandable view of all the Exchange Mailbox Protection templates that have been previously defined. To add a new template to this list, use the Add tool bar button. Once added, the following information is provided for each template:

Template

Displays the name assigned to the template when it was created.

Status

Indicates whether the template is enabled or disabled. To enable/disable the template, place your cursor in this Status cell, click the arrow control and select the appropriate option from the drop-down menu.

Override Accounts

Indicates whether the override accounts listed are excluded from protection or included in protection. This setting corresponds to the option used at the top of the last page of the Exchange Protection wizard:

• Excluded from Protection - indicated you selected the Allow option to allow only the selected accounts to access the protected objects.

• Included in Protection - indicates you selected the Deny option to allow all accounts to access the protected objects EXCEPT for those selected.

Owner Override

Indicates whether the Mailbox owner can bypass protection check box was selected and mailbox owners are allowed to access their own mailboxes.

Mailboxes

This field is used for filtering data.

Override Account Filter

This field is used for filtering data.

Click the expansion box to the left of the Template name to expand this view and display the following details for each template:

Exchange Mailbox

Displays the canonical name of the Exchange Mailbox or directory object included in the protection template.

Status

Indicates whether the protection for the mailbox is enabled or disabled.

Name

If applicable, this column shows the display name assigned to the directory object.

Dell Change Auditor for Exchange 6.6User Guide

34

Page 35: Dell™ Change Auditor for Exchange 6i.dell.com/sites/doccontent/shared-content/data-sheets/en/Document… · ©2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary

Override Account

Displays any accounts that are allowed (or not allowed) to access the protected mailboxes, as specified on the last page of the wizard.

Exchange Mailbox Protection templatesIn order to enable Exchange Mailbox protection in Change Auditor, you must first create one or more Exchange Mailbox Protection templates which specify whose mailboxes are to be locked down. Once Exchange Mailbox Protection templates are defined they will apply to all Exchange servers that host a Change Auditor agent.

To create a protection template:

1 Open the Administration Tasks tab.

2 Click the Protection task button at the bottom of the navigation pane (left-hand pane).

3 Select Exchange Mailbox in the Protection task list to open the Exchange Mailbox Protection page.

4 Click the Add tool bar button to launch the Exchange Protection wizard which will step you through the process of defining the mailboxes to be protected.

5 Use the Browse and Search pages to locate and select a directory object (i.e., User, Group, Container, DomainDNS, OrganizationalUnit, or BuiltinDomain) and click the Add button to add the selected object to the Selected Object list at the bottom of this dialog.

Repeat this step to add additional directory objects to the Exchange Mailbox Protection template.

6 On the next page of the wizard, use the Browse or Search page to optionally select user or group accounts which will be allowed to access the protected objects selected on the previous page. Click the Add button to add the selected user or group to the Account list.

If you want to allow mailbox owners to bypass protection and be able to access their own mailboxes, select the Mailbox owner can bypass protection check box at the top of this page.

7 Click the Finish button to create the template, close the wizard, and return to the Exchange Mailbox Protection page, where the newly created template will now be listed.

To modify a template:

1 On the Exchange Mailbox Protection page, select the template to be modified and click the Edit tool bar button or right-click command.

2 This will display the Exchange Mailbox Protection wizard, where you can modify the directory objects whose mailboxes are to be protected.

3 Click the Finish button.

NOTE: This field is not displayed when there are no override accounts specified in the Exchange Protection wizard.

NOTE: The cells directly under the main heading rows are used for filtering data. That is, as you enter characters into these cells, the client will redisplay the templates that meet the search criteria (i.e., comparison operator and characters entered). For more details about using the data filtering function provided throughout the Change Auditor client, see the Dell™ Change Auditor User Guide.

NOTE: If you are planning to use multiple Exchange Mailbox Protection templates, refer to the Dell™ Change Auditor Technical Insight Guide for more information on how multiple protection templates are evaluated.

NOTE: The Allow option is selected by default indicating that the selected users or groups will be allowed to access the protected objects. However, you can select the Deny option at the top of this page and select individual users or groups that are NOT allowed to access the protected objects. When using the Deny option, you are allowing all users and groups to access the protected objects EXCEPT for those selected on this page.

Dell Change Auditor for Exchange 6.6User Guide

35

Page 36: Dell™ Change Auditor for Exchange 6i.dell.com/sites/doccontent/shared-content/data-sheets/en/Document… · ©2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary

To disable a template:

The disable feature allows you to temporarily stop protecting the specified mailboxes without having to remove the protection template or individual mailbox from an active template.

1 On the Exchange Mailbox Protection page, use one of the following methods to disable a template:

• Place your cursor in the Status cell for the template to be disabled, click the arrow control and select Disabled

• Right-click the template to be disabled and select Disable

The entry in the Status column for the template will change to ‘Disabled’.

2 To re-enable the protection template, use the Enable option in either the Status cell or right-click menu.

To disable the protection of a mailbox:

1 On the Exchange Mailbox Protection page, use one of the following methods to disable the protection of an individual mailbox:

• Place your cursor in the Status cell for the mailbox whose protection is to be disabled, click the arrow control and select Disabled

• Right-click the mailbox whose protection is to be disabled and select Disable

The entry in the Status column for the selected mailbox will change to ‘Disabled’.

2 To re-enable protection for the mailbox, use the Enable option in either the Status cell or right-click menu.

To delete a template:

1 On the Exchange Mailbox Protection page, use one of the following methods to delete a template:

• Select the template to be deleted and use the Delete | Delete Template tool bar button

• Right-click the template to be deleted and select Delete

2 A dialog will be displayed confirming that you want to delete the selected template. Click Yes.

To delete an individual mailbox from a template:

1 On the Exchange Mailbox Protection page, use one of the following methods to delete a mailbox from a protection template:

• Select the mailbox to be deleted and use the Delete | Delete Exchange Mailbox tool bar button

• Right-click the mailbox to be deleted and select Delete

2 A dialog will be displayed confirming that you want to delete the selected mailbox from the template. Click Yes.

Exchange Protection wizardThe Exchange Protection wizard is displayed when you click the Add tool bar button on the Exchange Mailbox Protection page. This wizard steps you through the process of defining whose mailbox is to be protected from unauthorized access.The following table provides a description of the fields and controls in the Exchange Protection wizard:

NOTE: If the mailbox is the last one in the template, deleting this mailbox will also delete the template.

NOTE: A red flashing icon indicates that you have not yet entered the required information. Hovering your cursor over this icon displays a tool tip explaining what needs to be entered.

Dell Change Auditor for Exchange 6.6User Guide

36

Page 37: Dell™ Change Auditor for Exchange 6i.dell.com/sites/doccontent/shared-content/data-sheets/en/Document… · ©2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary

Table 4. Exchange Protection wizard

Create or modify an Exchange Mailbox Protection Template pageOn the first page of the wizard, enter a name for the template and select the Exchange mailbox(es) that are to be protected.

Template Name Enter a descriptive name for the template being created.

Browse page Displays a hierarchical view of the containers in your environment allowing you to locate and select the directory objects whose mailbox is to be protected from unauthorized access.

Once you have selected a directory object, click the Add button to add it to the list at the bottom of the page.

Search page Use the controls at the top of the Search page to search your environment to locate the directory objects whose mailbox is to be protected.

Once you have selected a directory object, click the Add button to add it to the list at the bottom of the page.

Options page Use the Options page to modify the search options used to retrieve directory objects.

NOTE: For more information on using the Browse, Search or Options pages, refer to Directory Object Picker in the online help or Dell™ Change Auditor User Guide.

Exchange Mailbox list The Exchange mailboxes selected for protection are displayed in the list box located at the bottom of the page. Use the buttons located above this list box to add and remove mailboxes.

• Add - Select a directory object in the Browse or Search page and then click the Add button to add it to the list.

• Remove - Select an entry in the Exchange Mailbox list and then click the Remove button to remove it.

• Enterprise - Click the Enterprise button to protect all mailboxes in the Enterprise from unauthorized access.

Dell Change Auditor for Exchange 6.6User Guide

37

Page 38: Dell™ Change Auditor for Exchange 6i.dell.com/sites/doccontent/shared-content/data-sheets/en/Document… · ©2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary

(Optional) Select Accounts Allowed (not Allowed) to Access Protected Objects page Use this page to optionally select user or group accounts that are allowed (not allowed) to access the selected protected mailboxes.

Allow The Allow option is selected by default indicating that the users and group selected on this page will be the only accounts allowed to access the protected objects.

Use the Browse or Search page to select the user or group accounts.

Deny Select the Deny option if you would like to allow all users and groups to access the protected objects EXCEPT for those selected on this page.

Use the Browse or Search page to select the user or group accounts.

Mailbox owner can bypass protection Select this check box to allow mailbox owners to bypass protection and access their own mailboxes even though they are not explicitly added to the Override Account list.

Browse page Displays a hierarchical view of the containers in your environment allowing you to locate and select the users or groups that will be allowed (not allowed) to access the protected mailboxes.

Once you have selected an account, click the Add button to add it to the list at the bottom of the page.

Search page Use the controls at the top of the Search page to search your environment to locate the users or groups that will be allowed (not allowed) to access the protected mailboxes.

Once you have selected an account, click the Add button to add it to the list at the bottom of the page.

Options page Use the Options page to modify the search options used to retrieve directory objects.

Table 4. Exchange Protection wizard

Dell Change Auditor for Exchange 6.6User Guide

38

Page 39: Dell™ Change Auditor for Exchange 6i.dell.com/sites/doccontent/shared-content/data-sheets/en/Document… · ©2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary

NOTE: For more information on using the Browse, Search or Options pages, refer to Directory Object Picker in the online help or Dell™ Change Auditor User Guide.

Override Account list The list box at the bottom of this page contains the user and group accounts selected above. Use the buttons located above this list box to add and remove accounts.

• Add - Select an account in the Browse or Search page and then click the Add button to add it to the list.

• Remove - Select an entry in the Override Account list and then click the Remove button to remove it.

Table 4. Exchange Protection wizard

Dell Change Auditor for Exchange 6.6User Guide

39

Page 40: Dell™ Change Auditor for Exchange 6i.dell.com/sites/doccontent/shared-content/data-sheets/en/Document… · ©2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary

A

Managing Shared Mailboxes

Change Auditor for Exchange now generates shared mailbox events for Exchange 2007 SP1 (and higher) shared mailbox, room and equipment resources, and for any other mailboxes that the user has identified as shared. Shared mailbox events will only be generated when both of the following conditions exist:

• The affected mailbox is selected for auditing (i.e., added to the Exchange Mailbox Auditing list on the Administration Tasks tab).

• The mailbox is either located in an Exchange 2007 SP1 (or higher) mailbox store or has been marked as a shared mailbox by the user.

Use the Exchange Mailbox Auditing page on the Administration Tasks tab to ensure shared mailboxes are set up correctly for auditing. From this page, you can:

• View a list of the Exchange 2007 SP1 (or higher) shared mailboxes that have been automatically detected in the network. By default, this list is filtered to display only the shared mailboxes selected for auditing.

• Mark normal mailboxes as ‘shared’ by manually adding them to the shared mailbox list.

To view list of Shared Mailboxes in auditing list:

Automatic shared mailbox detection locates Exchange 2007 SP1 (or higher) shared mail, equipment and room mailboxes in the network.

1 Open the Administration Tasks tab.

2 Click the Auditing task button at the bottom of the navigation pane (left-hand pane).

3 Select Exchange Mailboxes under the Applications heading in the Auditing task list.

The Exchange Mailbox Auditing page appears.

4 At the top of the Exchange Mailbox Auditing page, click the Shared Mailboxes tool bar button.

5 If not already displayed, open the Auto Detected page.

The Auto Detected page displays a read-only list of the shared mailboxes detected in the network.

The Filter Shared Mailboxes Based on Exchange Auditing Scope check box is selected by default and only shared mailboxes that are selected for auditing are displayed. To display all shared mailboxes detected in the network, clear this check box.

6 Click Close to close the dialog and return to the Exchange Mailbox Auditing page.

NOTE: As with individual mailboxes, if the shared mailbox is not added to the Exchange Mailbox Auditing list, the mailbox is not being audited and therefore no events are generated.

If the mailbox is not a shared mailbox, room or equipment resource in an Exchange 2007 SP1 (or higher) mailbox store AND it has not been manually marked as a shared mailbox by the user, then normal mailbox owner or non-owner events will be generated for the affected mailboxes.

Many of the shared mailbox events are disabled by default. In order to generate these events, they must first be enabled using the Audit Events page on the Administration Tasks tab.

NOTE: If you have not yet added the shared mailbox(es) to the Exchange Mailbox Auditing list, use the Add tool bar button on the Exchange Mailbox Auditing page to locate and add the mailbox(es) to be audited.

Dell Change Auditor for Exchange 6.6User Guide

40

Page 41: Dell™ Change Auditor for Exchange 6i.dell.com/sites/doccontent/shared-content/data-sheets/en/Document… · ©2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary

To manually add mailboxes to shared mailbox list:

Any mailbox can be marked as a shared mailbox by manually adding it to the shared mailbox list. This is useful for correctly monitoring mailboxes imported from Exchange 2003 (or earlier) that were used as shared mailboxes but have not been converted to Exchange 2007 shared mailboxes.

1 Open the Administration Tasks tab.

2 Click the Auditing task button at the bottom of the navigation pane (left-hand pane).

3 Select Exchange Mailboxes under the Applications heading in the Auditing task list.

The Exchange Mailbox Auditing page appears.

4 At the top of the Exchange Mailbox Auditing page, click the Shared Mailboxes tool bar button.

5 Open the User Defined page on the Shared Mailboxes dialog.

6 Click the Add button at the bottom of this page.

7 On the Exchange Shared Mailboxes dialog, use the Browse and Search pages to locate and select a directory object (i.e., User, Group, Container, DomainDNS, OrganizationalUnit, or BuiltinDomain) and click the Add button to add the selected object to the Selected Object list at the bottom of the page.

Repeat this step to add additional directory objects to the Exchange Shared Mailbox list.

8 Click the Finish button to close this dialog and return to the Shared Mailboxes dialog, where your selections will now be listed on the User Defined page of this dialog.

9 The default scope of coverage is displayed in the Scope cell. You can change this by placing your cursor in the Scope cell, clicking the arrow control and selecting the appropriate option from the list:

• Object - to audit an individual object

• One Level - to audit an object and its direct child objects

• Subtree - to audit an object all of its subordinate objects (all levels)

10 The Status field on this page indicates the type of events that are to be generated for the mailbox:

• Enabled (default) - shared mailbox events are to be generated for the mailbox

• Disabled - owner or non-owner events are to be generated for the mailbox

To change this setting, place your cursor in the Status cell, click the arrow control and select the appropriate option from the list.

11 Click Close to save your selections, close the dialog, and return to the Exchange Mailbox Auditing page.

Shared Mailbox eventsThe Exchange Mailbox Monitoring events that can be generated for shared mailboxes include:

• Appointment Copied in Shared Mailbox*

• Appointment Created in Shared Mailbox*

• Appointment Deleted in Shared Mailbox*

• Appointment Modified in Shared Mailbox*

• Appointment Moved in Shared Mailbox*

• Appointment Permanently Deleted in Shared Mailbox*

• Appointment Read in Shared Mailbox*

• Contact Copied in Shared Mailbox*

NOTE: If you have not yet added the ‘marked’ mailbox(es) to the Exchange Mailbox Auditing list, click the Add tool bar button on the Exchange Mailbox Auditing page to locate and add the mailbox(es) to be audited.

Dell Change Auditor for Exchange 6.6User Guide

41

Page 42: Dell™ Change Auditor for Exchange 6i.dell.com/sites/doccontent/shared-content/data-sheets/en/Document… · ©2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary

• Contact Created in Shared Mailbox*

• Contact Deleted in Shared Mailbox*

• Contact Modified in Shared Mailbox*

• Contact Moved in Shared Mailbox*

• Contact Permanently Deleted in Shared Mailbox*

• Contact Read in Shared Mailbox*

• Folder Copied in Shared Mailbox

• Folder Created in Shared Mailbox

• Folder Deleted in Shared Mailbox

• Folder Moved in Shared Mailbox

• Folder Permanently Deleted in Shared Mailbox

• Folder Renamed in Shared Mailbox

• Message Copied in Shared Mailbox*

• Message Created in Shared Mailbox*

• Message Deleted in Shared Mailbox*

• Message Marked Unread in Shared Mailbox*

• Message Modified in Shared Mailbox*

• Message Moved in Shared Mailbox*

• Message Permanently Deleted in Shared Mailbox*

• Message Read in Shared Mailbox*

• Object Copied in Shared Mailbox*

• Object Created in Shared Mailbox*

• Object Deleted in Shared Mailbox*

• Object Marked Unread in Shared Mailbox*

• Object Modified in Shared Mailbox*

• Object Moved in Shared Mailbox*

• Object Permanently Deleted in Shared Mailbox*

• Object Read in Shared Mailbox*

• Shared Mailbox Folder Permissions Changed

• Shared Mailbox Opened*

• Task Copied in Shared Mailbox*

• Task Created in Shared Mailbox*

• Task Deleted in Shared Mailbox*

• Task Modified in Shared Mailbox*

• Task Moved in Shared Mailbox*

• Task Permanently Deleted in Shared Mailbox*

• Task Read in Shared Mailbox*

NOTE: The events marked with an asterisk (*) are disabled by default. In order to generate any of these events, you must first enable them using the Audit Events page on the Administration Tasks tab.

Dell Change Auditor for Exchange 6.6User Guide

42

Page 43: Dell™ Change Auditor for Exchange 6i.dell.com/sites/doccontent/shared-content/data-sheets/en/Document… · ©2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary

B

Disabled Exchange Events

This appendix provides an alphabetical list of the Exchange Mailbox Monitoring and Exchange ActiveSync®

Monitoring events that are disabled by default in Change Auditor. You must enable these events using the Audit Events page on the Administration Tasks tab before they can be audited.

Table 5. Disabled Exchange events

Event Class disabled by default Facility

ActiveSync Autodiscover command executed Exchange ActiveSync Monitoring

ActiveSync Ping command executed Exchange ActiveSync Monitoring

Appointment Copied by Owner Exchange Mailbox Monitoring

Appointment Copied in Shared Mailbox Exchange Mailbox Monitoring

Appointment Created by Owner Exchange Mailbox Monitoring

Appointment Created in Shared Mailbox Exchange Mailbox Monitoring

Appointment Deleted by Owner Exchange Mailbox Monitoring

Appointment Deleted in Shared Mailbox Exchange Mailbox Monitoring

Appointment Modified by Owner Exchange Mailbox Monitoring

Appointment Modified in Shared Mailbox Exchange Mailbox Monitoring

Appointment Moved by Owner Exchange Mailbox Monitoring

Appointment Moved in Shared Mailbox Exchange Mailbox Monitoring

Appointment Permanently Deleted by Owner Exchange Mailbox Monitoring

Appointment Permanently Deleted in Shared Mailbox Exchange Mailbox Monitoring

Appointment Read by Non-Owner Exchange Mailbox Monitoring

Appointment Read by Owner Exchange Mailbox Monitoring

Appointment Read in Shared Mailbox Exchange Mailbox Monitoring

Calendar Opened by Non-Owner Exchange Mailbox Monitoring

Calendar Opened by Owner Exchange Mailbox Monitoring

Contact Copied by Owner Exchange Mailbox Monitoring

Contact Copied in Shared Mailbox Exchange Mailbox Monitoring

Contact Created by Owner Exchange Mailbox Monitoring

Contact Created in Shared Mailbox Exchange Mailbox Monitoring

Contact Deleted by Owner Exchange Mailbox Monitoring

Contact Deleted in Shared Mailbox Exchange Mailbox Monitoring

Contact Modified by Owner Exchange Mailbox Monitoring

Contact Modified in Shared Mailbox Exchange Mailbox Monitoring

Contact Moved by Owner Exchange Mailbox Monitoring

Contact Moved in Shared Mailbox Exchange Mailbox Monitoring

Contact Permanently Deleted by Owner Exchange Mailbox Monitoring

Contact Permanently Deleted in Shared Mailbox Exchange Mailbox Monitoring

Contact Read by Owner Exchange Mailbox Monitoring

Dell Change Auditor for Exchange 6.6User Guide

43

Page 44: Dell™ Change Auditor for Exchange 6i.dell.com/sites/doccontent/shared-content/data-sheets/en/Document… · ©2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary

Contact Read in Shared Mailbox Exchange Mailbox Monitoring

Contacts Opened by Owner Exchange Mailbox Monitoring

Folder Copied by Owner Exchange Mailbox Monitoring

Folder Created by Owner Exchange Mailbox Monitoring

Folder Deleted by Owner Exchange Mailbox Monitoring

Folder Moved by Owner Exchange Mailbox Monitoring

Folder Permanently Deleted by Owner Exchange Mailbox Monitoring

Folder Renamed by Owner Exchange Mailbox Monitoring

Inbox Opened by Owner Exchange Mailbox Monitoring

Mailbox Opened by Owner Exchange Mailbox Monitoring

Message Copied by Owner Exchange Mailbox Monitoring

Message Copied in Shared Mailbox Exchange Mailbox Monitoring

Message Created by Owner Exchange Mailbox Monitoring

Message Created in Shared Mailbox Exchange Mailbox Monitoring

Message Deleted by Owner Exchange Mailbox Monitoring

Message Deleted in Shared Mailbox Exchange Mailbox Monitoring

Message Marked Unread by Owner Exchange Mailbox Monitoring

Message Marked Unread in Shared Mailbox Exchange Mailbox Monitoring

Message Modified by Owner Exchange Mailbox Monitoring

Message Modified in Shared Mailbox Exchange Mailbox Monitoring

Message Moved by Owner Exchange Mailbox Monitoring

Message Moved in Shared Mailbox Exchange Mailbox Monitoring

Message Permanently Deleted by Owner Exchange Mailbox Monitoring

Message Permanently Deleted in Shared Mailbox Exchange Mailbox Monitoring

Message Read by Owner Exchange Mailbox Monitoring

Message Read in Shared Mailbox Exchange Mailbox Monitoring

Object Copied by Owner Exchange Mailbox Monitoring

Object Copied in Shared Mailbox Exchange Mailbox Monitoring

Object Created by Owner Exchange Mailbox Monitoring

Object Created in Shared Mailbox Exchange Mailbox Monitoring

Object Deleted by Owner Exchange Mailbox Monitoring

Object Deleted in Shared Mailbox Exchange Mailbox Monitoring

Object Marked Unread by Owner Exchange Mailbox Monitoring

Object Marked Unread in Shared Mailbox Exchange Mailbox Monitoring

Object Modified by Owner Exchange Mailbox Monitoring

Object Modified in Shared Mailbox Exchange Mailbox Monitoring

Object Moved by Owner Exchange Mailbox Monitoring

Object Moved in Shared Mailbox Exchange Mailbox Monitoring

Object Permanently Deleted by Owner Exchange Mailbox Monitoring

Object Permanently Deleted in Shared Mailbox Exchange Mailbox Monitoring

Object Read by Owner Exchange Mailbox Monitoring

Object Read in Shared Mailbox Exchange Mailbox Monitoring

Table 5. Disabled Exchange events

Event Class disabled by default Facility

Dell Change Auditor for Exchange 6.6User Guide

44

Page 45: Dell™ Change Auditor for Exchange 6i.dell.com/sites/doccontent/shared-content/data-sheets/en/Document… · ©2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary

Shared Mailbox Opened Exchange Mailbox Monitoring

Task Copied by Owner Exchange Mailbox Monitoring

Task Copied in Shared Mailbox Exchange Mailbox Monitoring

Task Created by Owner Exchange Mailbox Monitoring

Task Created in Shared Mailbox Exchange Mailbox Monitoring

Task Deleted by Owner Exchange Mailbox Monitoring

Task Deleted in Shared Mailbox Exchange Mailbox Monitoring

Task Modified by Owner Exchange Mailbox Monitoring

Task Modified in Shared Mailbox Exchange Mailbox Monitoring

Task Moved by Owner Exchange Mailbox Monitoring

Task Moved in Shared Mailbox Exchange Mailbox Monitoring

Task Permanently Deleted by Owner Exchange Mailbox Monitoring

Task Permanently Deleted in Shared Mailbox Exchange Mailbox Monitoring

Task Read by Owner Exchange Mailbox Monitoring

Task Read in Shared Mailbox Exchange Mailbox Monitoring

Tasks Opened by Owner Exchange Mailbox Monitoring

Table 5. Disabled Exchange events

Event Class disabled by default Facility

Dell Change Auditor for Exchange 6.6User Guide

45

Page 46: Dell™ Change Auditor for Exchange 6i.dell.com/sites/doccontent/shared-content/data-sheets/en/Document… · ©2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary

About Dell

Dell listens to customers and delivers worldwide innovative technology, business solutions and services they trust and value. For more information, visit www.software.dell.com.

Contacting DellTechnical Support: Online Support

Product Questions and Sales: (800) 306-9329

Email: [email protected]

Technical Support ResourcesTechnical support is available to customers who have purchased Dell software with a valid maintenance contract and to customers who have trial versions. To access the Support Portal, go to http://software.dell.com/support/.

The Support Portal provides self-help tools you can use to solve problems quickly and independently, 24 hours a day, 365 days a year. In addition, the portal provides direct access to product support engineers through an online Service Request system.

The site enables you to:

• Create, update, and manage Service Requests (cases)

• View Knowledge Base articles

• Obtain product notifications

• Download software. For trial software, go to Trial Downloads.

• View how-to videos

• Engage in community discussions

• Chat with a support engineer

Dell Change Auditor for Exchange 6.6User Guide

46