See the Change Auditor for Exchange Event Reference Guide for a list of the events that can be sent to this event log.
2 |
Click Configuration. |
3 |
Select Agent in the Configuration task list to display the Agent Configuration page. |
4 |
Click Event Logging. |
5 |
On the Event Logging dialog, select Exchange. |
6 |
Click OK to save your selection and close the dialog. |
Before the system is returned to normal load, one user should log in to Outlook Web Access (OWA), Outlook, and Exchange Web Services (EWS, Outlook for Mac) clients. This triggers the agent to process the Exchange Mailbox auditing and protection configuration changes when the fewest login are occurring. |
The Exchange Mailbox Protection page displays when you select Exchange Mailbox from the Protection task list in the navigation pane of the Administration Tasks tab. From this page you can start the Exchange Mailbox Protection wizard to define the mailboxes to protect from unauthorized access. You can also edit existing templates, disable a template, and remove templates that are no longer being used.The Exchange Mailbox Protection page contains an expandable view of all previously defined Exchange Mailbox Protection templates. To add a template to this list, click Add. Once added, the following information is provided for each template:
NOTE: Authorization to use the administration tasks on the Administrations Tasks tab is defined using the Application User Interface page under the Configuration task list. If you are denied access to the tasks on this page, refer to the Change Auditor User Guide for more information on how to gain access. |
• |
Excluded from Protection - indicates that you selected the Allow option to allow only the selected accounts to access the protected objects. |
• |
Included in Protection — indicates that you selected the Deny option to allow all accounts to access the protected objects EXCEPT for those selected. |
© 2024 Quest Software Inc. ALL RIGHTS RESERVED. 이용 약관 개인정보 보호정책 Cookie Preference Center