Solved

Exchange 2007 group permissions

Posted on 2011-09-05
3
292 Views
Last Modified: 2012-08-14
Hi All,
  It seems we have had a security group that has been given a number of read permissions to mailboxes that it shouldnt. We have secured the system now but we are looking to track back how the permissions were put in place. We are compiling a list of user accounts that had the read permission attached to confirm if a patten of OU/Location/Group can be found as currently this seems to be random.

Is there any way we can track back the changes within the accounts to find who assigned the permissions? None of our engineers were remember pushing out such a change and so we want to be 100% that the network is secure.

Many thanks
0
Comment
Question by:ncomper
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 5

Author Comment

by:ncomper
ID: 36483299
On Additional Digging it seems the Read permisison was pushed out to Two of the Exchange databases. Inorder for this to happen would this have needed to be pushed out by powershell?

Many thanks,
0
 
LVL 7

Accepted Solution

by:
Praveen Balan earned 500 total points
ID: 36484026
Yes, the ADPermissions are pushed through PowerShell

Command will be like,

get-mailboxdatabase - identity "<mailbox database identitiy>" | Add-adpermission -user <user or group name> -accessrights GenericAll -extendedrights <permissions>

you can get the current rights by

Get-MailboxDatabase -Identity "DB Name" |get-adpermission

-Praveen

0
 
LVL 5

Author Closing Comment

by:ncomper
ID: 36598112
Thanks
0

Featured Post

Best Practices: Disaster Recovery Testing

Besides backup, any IT division should have a disaster recovery plan. You will find a few tips below relating to the development of such a plan and to what issues one should pay special attention in the course of backup planning.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Read this checklist to learn more about the 15 things you should never include in an email signature.
This article aims to explain the working of CircularLogArchiver. This tool was designed to solve the buildup of log file in cases where systems do not support circular logging or where circular logging is not enabled
In this video we show how to create a Contact in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.: First we need to log into the Exchange Admin Center. Navigate to the Recipients >> Contact ta…
In this video we show how to create an Accepted Domain in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.: First we need to log into the Exchange Admin Center. Navigate to the Mail Flow >> Ac…

710 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question