Tip: Configure Auditing for Exchange Server Usage
Auditing lets you track what’s happening with Exchange Server. You can collect information about logons and logoffs, permission use, and much more. Any time an action that you’ve configured for auditing occurs, it is written to the system’s security log, which you can access from Event Viewer.
Follow Our Daily Tips
Tell Us Your Tips
You can audit Exchange activity by enabling auditing in a Group Policy object applied to your Exchange servers. This policy object can be a local Group Policy object or an Active Directory Group Policy object. You manage a server’s local Group Policy object using the Local Security Policy tool. You manage Active Directory Group Policy using the Group Policy Management Console (GPMC). GPMC is included as a Windows feature with Windows Vista and later versions of Windows. After you add GPMC as a feature, you can access it on the Administrative Tools menu.
You can enable Exchange auditing by completing the following steps:
1. Start the Group Policy Management Console by clicking Start, All Programs, Administrative Tools, Group Policy Management. You can now navigate through the forest and domains in the organization to view individual Group Policy objects.
2. To specifically audit users’ actions on Exchange Server, you should consider creating an organizational unit (OU) for Exchange servers and then define auditing policy for a Group Policy object applied to the OU. After you’ve created the OU or if you have an existing OU for Exchange servers, right-click the related policy object, and then select Edit to open the policy object for editing in Group Policy Management Editor.
3. You access the Audit Policy node by working your way down through the console tree. Expand Computer Configuration, Policies, Windows Settings, Security Settings, and Local Policies. Then select Audit Policy.
4. You should now see the following auditing options:
- Audit Account Logon Events Tracks user account authentication during logon. Account logon events are generated on the authenticating computer when a user is authenticated.
- Audit Account Management Tracks account management by means of Active Directory Users And Computers. Events are generated any time user, computer, or group accounts are created, modified, or deleted.
- Audit Directory Service Access Tracks access to Active Directory. Events are generated any time users or computers access the directory.
- Audit Logon Events Tracks local logon events for a server or workstation.
- Audit Object Access Tracks system resource usage for mailboxes, information stores, and other types of objects.
- Audit Policy Change Tracks changes to user rights, auditing, and trust relationships.
- Audit Privilege Use Tracks the use of user rights and privileges, such as the right to create mailboxes.
- Audit Process Tracking Tracks system processes and the resources they use.
- Audit System Events Tracks system startup, shutdown, and restart, as well as actions that affect system security or the security log.
5. To configure an auditing policy, double-click or right-click its entry, and then select Properties. This opens a Properties dialog box for the policy.
6. Select the Define These Policy Settings check box, and then select the Success check box, the Failure check box, or both. Success logs successful events, such as successful logon attempts. Failure logs failed events, such as failed logon attempts.
7. Repeat steps 5 and 6 to enable other auditing policies. Note that the policy changes won’t be applied until the next time you start the Exchange server.
From the Microsoft Press book Microsoft Exchange Server 2010 Administrator’s Pocket Consultant by William R. Stanek.
Looking for More Tips?
For more tips on Exchange Server and other Microsoft technologies, visit the TechNet Magazine Tips library.