Chat now with support
Chat with Support

Unified Communications Analytics 8.6 - Deployment Guide

Prerequisites for your installation Installing UC Analytics Configuring UC Analytics Adding data sources for Active Directory or Azure Active Directory Adding data sources, chargeback costs, and thresholds for Exchange and Exchange Online
Permissions needed to collect Exchange on-premises or hybrid data Permissions needed to collect from native Exchange Online Creating an Exchange Configuration data source Creating an Exchange Tracking Logs data source Creating an Exchange Mailbox Contents data source Do I need both Exchange Tracking Logs and Exchange Mailbox Contents collections? Creating an Exchange IIS Logs data source Creating an Exchange Mailbox Content Summary data source Creating an Exchange Calendar data source Creating an Exchange Public Folders data source Adding Exchange Online hybrid data sources for hybrid Office 365 Adding Exchange Online data sources for native Office 365 Setting chargeback costs for Exchange Setting thresholds for Exchange metrics Omitting words when filtering by subject or body
Adding data sources, chargeback costs, and thresholds for Skype for Business/Lync Adding data sources, chargeback, and thresholds for Cisco Managing which insights can seen by users Configuring and managing subscriptions Making changes to your deployment Appendix A:Configuring Impersonation Appendix B:Configuring the Skype for Business or Lync Server Appendix C:Configuring IIS Log Files to capture ActiveSync or OWA events Appendix D:PowerShell cmdlets used by data sources Appendix E:Custom configurations and backup and recovery options Appendix F: Questions and answers about configuration

Modifying the Data Query Availability job run

The Data Query Availability job (which runs in the background) is split into two parts: one part for the most recent shards and one part for more distant shards. How often each part is run can be configured separately to reduce the number of times the job runs and to create an interim version of a shard while gatherings are still collecting and writing the data for the shard.

By default, both the “most recent” shards (within the last 3 days) and the “more distant” shards (older than 3 days) are still committed every hour. The values for each Data Query Availability job type are located in the UC.Analytics.Insights.DataEngine.DataCollector.dll.config file in the commitJobSettings section:

You can modify the job run frequency for each part separately. For example, you might set recent shards to run every 3 hours and more distant shards every 12 hours.

When you view data collection status on the Data Collection Status page, you will see two Data Query Availability jobs which are responsible for committing both recent shards and distant shards.

Appendix A:Configuring Impersonation

Any credentials that are used to collect data using the Exchange Mailbox Contents or the Exchange Online Mailbox Contents data sources must have application impersonation rights or “Exchange Impersonation” permissions to all the target mailboxes:

Setting impersonation for Exchange 2013/2016/2019

To collect data from Exchange 2013/2016/2019, the credentials used to collect Exchange data must have Application Impersonation rights for the mailboxes from which you are collecting.

2
Click Permissions.
4
6
Select ApplicationImpersonation and click add->.
7
10
Click Save.

Setting impersonation for Office 365

To collect data from Exchange Online (Office 365) using the Exchange Online Mailbox Contents data source, the credentials used to collect the data must have Application Impersonation rights. The account must be assigned to a Role-Based Access Control group that has Application Impersonation rights. By default, no groups have Application Impersonation rights in Office 365.

You must sign in as an administrator to the Office 365 portal and add this right either to an existing role group or to a new role group that you create.

For example, you could create a new role group named Impersonation for Office 365 and add the Application Impersonation right to the group.

3
Click admin roles.
4
Click the + Icon to add a new role group.
6
7
Select ApplicationImpersonation from the list of roles
8
Click Add and click OK.
11
Click Add and click OK.
12
Click Save.
Related Documents