[Okta Webinar] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

Log of who is changeing exchange permissions

Posted on 2006-04-13
4
Medium Priority
?
215 Views
Last Modified: 2010-03-18
We have 4 IT workers here in the office and my manager has asked me for a way to report and log who is makeing permission changes to view exchange mailboxes.  Does AD and exchange keep a log of this someplace? If not is there any third party tools that can do this?
0
Comment
Question by:walub
  • 2
2 Comments
 
LVL 48

Accepted Solution

by:
Jay_Jay70 earned 1000 total points
ID: 16451456
0
 
LVL 48

Expert Comment

by:Jay_Jay70
ID: 16451458
walub,

sorry to just send a link but it tells better than i would!
0

Featured Post

Free Tool: Path Explorer

An intuitive utility to help find the CSS path to UI elements on a webpage. These paths are used frequently in a variety of front-end development and QA automation tasks.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Nslookup is a command line driven utility supplied as part of most Windows operating systems that can reveal information related to domain names and the Internet Protocol (IP) addresses associated with them. In simple terms, it is a tool that can …
Sometimes you might need to configure routing based not only on destination IP address, but also on a combination of destination IP address (or hostname) and destination port number. I will describe a method how to accomplish this with free tools. …
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Is your data getting by on basic protection measures? In today’s climate of debilitating malware and ransomware—like WannaCry—that may not be enough. You need to establish more than basics, like a recovery plan that protects both data and endpoints.…
Suggested Courses

873 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question