Exchange mailbox permissions auditing

Posted on 2007-07-29
Last Modified: 2013-12-04
We have an administrative level user that may be doing a bad thing...specifically, granting herself full mailbox access to other users mailboxes and then (we are guessing) reading their email.

We need to prove this if this really is happening.

The environment is Windows 2003 (with AD) and Exchange 2003.

Thus, is it possible to set up auditing to watch for this specific behavior and show what is happening and by whom?  We do not want to stop it just yet, but record the activity.

Thanks in advance.
Question by:dasmail2000
    LVL 35

    Accepted Solution

    LVL 31

    Assisted Solution

    by:Toni Uranjek
    Hi dasmail2000,

    It's possible, but you have some reading to do first:
    How to monitor mailbox access by auditing or by viewing Mailbox Resources in Exchange Server:
    How to assign service account access to all mailboxes in Exchange Server 2003:;en-us;821897 <-- to understand involved permissions
    Complete tutorial:

    LVL 1

    Author Comment

    I split the points as you two were both right on the money with your identical answers.  Usually it is a first come first serve, but you guys were a mere three minutes apart so I split them.

    Hope that is agreeableto you both.

    And thanks a ton for the quick and accurate replies.

    Expert Comment

    I'm not sure this solution really is all that helpful. The auditing described shows if a user accessing an Exchange account other than their own, but doesn't specify the *folder.* A user could be legitimately accessing someone else's calendar and it will show up.

    Is there a way to actually show that a user viewed another's *inbox* vs. simply queried their calendar?

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    How does your email signature look on mobiles?

    Do your employees use mobile devices to reply to emails? With mobile becoming increasingly important to the business world, it is in your best interest to make sure that your email signature looks great across all types of devices.

    SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
    Set up iPhone and iPad email signatures to always send in high-quality HTML with this step-by step guide.
    In this Micro Video tutorial you will learn the basics about Database Availability Groups and How to configure one using a live Exchange Server Environment. The video tutorial explains the basics of the Exchange server Database Availability grou…
    This video discusses moving either the default database or any database to a new volume.

    759 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    13 Experts available now in Live!

    Get 1:1 Help Now