Tip: Configure Auditing to Track Exchange Server Usage
Auditing lets you track what’s happening with Exchange Server. You can use auditing to collect information related to information logons and logoffs, permission use, and much more. Any time an action that you’ve configured for auditing occurs, this action is written to the system’s security log. You can then access the security log from Event Viewer. You enable auditing in the domain through Group Policy.
To enable Exchange auditing, follow these steps:
1. Start the Group Policy Management Console by clicking Start, All Programs, Administrative Tools, Group Policy Management. You can now navigate through the forest and domains in the organization to view individual Group Policy Objects.
2. To specifically audit users’ actions on Exchange Server, you should consider creating an organizational unit (OU) for Exchange servers and then define auditing policy for a Group Policy Object applied to the OU. After you’ve created the OU or if you have an existing OU for Exchange servers, right-click the related policy object, and then select Edit to open the policy object for editing in Group Policy Management Editor.
Tips RSS Feed
Subscribe to the TechNet Magazine Tips RSS feed.
3. Access the Audit Policy node by working your way down through the console tree. Expand Computer Configuration, Policies, Windows Settings, Security Settings, and Local Policies. Then select Audit Policy.
4. You should now see the following auditing options:
- Audit Account Logon Events Tracks user account authentication during logon. Account logon events are generated on the authenticating computer when a user is authenticated.
- Audit Account Management Tracks account management by means of Active Directory Users And Computers. Events are generated any time user, computer, or group accounts are created, modified, or deleted.
- Audit Directory Service Access Tracks access to Active Directory. Events are generated any time users or computers access the directory.
- Audit Logon Events Tracks local logon events for a server or workstation.
- Audit Object Access Tracks system resource usage for mailboxes, information stores, and other types of objects.
- Audit Policy Change Tracks changes to user rights, auditing, and trust relationships.
- Audit Privilege Use Tracks the use of user rights and privileges, such as the right to create mailboxes.
- Audit Process Tracking Tracks system processes and the resources they use.
- Audit System Events Tracks system startup, shutdown, and restart, as well as actions that affect system security or the security log.
5. To configure an auditing policy, double-click or right-click its entry, and then select Security. This opens a Properties dialog box for the policy. 6. Select the Define These Policy Settings check box, and then select the Success check box, the Failure check box, or both. Success logs successful events, such as successful logon attempts. Failure logs failed events, such as failed logon attempts. 7. Repeat steps 5 and 6 to enable other auditing policies. The policy changes won’t be applied until the next time you start the Exchange server.
From the Microsoft Press book Microsoft Exchange Server 2007 Administrator’s Pocket Consultant, Second Edition by William R. Stanek.
Looking for More Tips?
For more Exchange Server tips, visit the TechNet Magazine Exchange Server 2007 Tips page.
For more Tips on other products, visit the TechNet Magazine Tips index.