Solved

IT Audit of MS-Exchange

Posted on 2013-01-14
12
1,065 Views
Last Modified: 2013-01-31
What should/do IT Audits of Microsft Exchange Server focus on?

What kind of issues do auditors focus on and report on in relation to MS-Exchange?

What kind of poor design/security/management issues can be apparent in Exchange?
0
Comment
Question by:pma111
  • 5
  • 5
  • 2
12 Comments
 
LVL 52

Accepted Solution

by:
Manpreet SIngh Khatra earned 250 total points
Comment Utility
0
 
LVL 41

Assisted Solution

by:Amit
Amit earned 250 total points
Comment Utility
0
 
LVL 3

Author Comment

by:pma111
Comment Utility
Can you give a flavour of the type of risk the ExRAP checks for? Or a full checklist?
0
 
LVL 52

Expert Comment

by:Manpreet SIngh Khatra
Comment Utility
ExRAP is done but most of the analysis is done by MS with Premium support

- Rancy
0
 
LVL 41

Expert Comment

by:Amit
Comment Utility
ExRAP checks almost everything starting from AD, Exchange, Storage etc. Its a in-depth analysis.
0
 
LVL 3

Author Comment

by:pma111
Comment Utility
Can you give a few examples though of actual risks it flags up?
0
Do email signature updates give you a headache?

Do you feel like you are constantly making changes to email signatures? Are the images not formatting how you want them to? Want high-quality HTML signatures on all devices, including on mobiles and Macs? Then, let Exclaimer solve all your email signature problems today.

 
LVL 3

Author Comment

by:pma111
Comment Utility
Could exchange admins run it themselves and analyze the output themselves without MS service staff??
0
 
LVL 41

Expert Comment

by:Amit
Comment Utility
Instructions

1. Extract the Scoping Tool zip package to the tools server that will be used during the RAP engagement. 2. Refer to Instructions.txt in the Scoping Tool folder for detailed instructions on how to execute the tool and gather the results. If you encounter any problems during the process, refer to your Technical Account Manager (TAM) for assistance.
0
 
LVL 3

Author Comment

by:pma111
Comment Utility
Can you give a few examples though of actual risks it flags up?
0
 
LVL 41

Expert Comment

by:Amit
Comment Utility
In my case they found below issues:

Possible SAN storage related issues on X site exchange servers
High RPC latency on X server due to possible storage issues.
High Disk latencies on X Server due to possible storage issues
Disk Latencies on C drive on X and Y Servers.
Remote delivery Queue build up on some Exchange servers
High Page file usage on some exchange Servers – Need More RAM
High CPU usage on some exchange servers – Need more CPU cores
LDAP Read Times are beyond the error threshold - Need Additional CPU and RAM on GCs
LDAP Search Times are beyond the error threshold – Need Additional CPU and RAM on GCs
0
 
LVL 3

Author Comment

by:pma111
Comment Utility
Did you run the tool yourself or was this from the service?
0
 
LVL 41

Expert Comment

by:Amit
Comment Utility
It was ran by MS onsite engg.
0

Featured Post

Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

Join & Write a Comment

Disabling the Directory Sync Service Account in Office 365 will stop directory synchronization from working.
Find out how to use Active Directory data for email signature management in Microsoft Exchange and Office 365.
Familiarize people with the process of retrieving data from SQL Server using an Access pass-thru query. Microsoft Access is a very powerful client/server development tool. One of the ways that you can retrieve data from a SQL Server is by using a pa…
how to add IIS SMTP to handle application/Scanner relays into office 365.

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now