Solved

How to configure Kiwi Syslog server for Exchange

Posted on 2013-12-29
10
1,208 Views
Last Modified: 2014-02-10
I have installed Kiwi syslog server. I want to configure it so that Exchange logs will go to Kiwi Syslog and at the same time leave a current copy in Exchange server.

Any help will be very much appreciated.

Thanks
0
Comment
Question by:jskfan
  • 8
  • 2
10 Comments
 
LVL 17

Assisted Solution

by:lruiz52
lruiz52 earned 500 total points
ID: 39744871
Check link below may help

http://forums.iis.net/t/1145010.aspx
0
 

Author Comment

by:jskfan
ID: 39744905
That was for the closed question….
the link  did not help…..
=======================

from kiwi syslog or from Exchange 2010, I do not know from which to tell exchange logs to be sent to kiwi Syslog
0
 

Author Comment

by:jskfan
ID: 39744908
I need screenshots or true guidance…on the link it says checkout the SYSLOG output format help in the online docs.
0
 

Author Comment

by:jskfan
ID: 39744910
I am not sure where I can find it
0
 

Author Comment

by:jskfan
ID: 39745207
any step by step to configure Kiwi syslog server for Exchange 2010 ? or the other way around ?
0
The curse of the end user strikes again      

You’ve updated all your end user’s email signatures. Hooray! But guess what? They’re playing around with the HTML, adding stupid taglines and ruining the imagery. Find out how you can save your signatures from end users today.

 
LVL 17

Accepted Solution

by:
lruiz52 earned 500 total points
ID: 39745270
0
 

Author Comment

by:jskfan
ID: 39745536
Even with Log parser, how do you send the logs from exchange to syslog server ?
0
 

Author Comment

by:jskfan
ID: 39746375
0
 

Author Comment

by:jskfan
ID: 39746622
It does not have to be Kiwi syslog though...and syslog server where we can centralize Exchange logs will be helpful
0
 

Author Closing Comment

by:jskfan
ID: 39849169
Thanks
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
Following basic email etiquette rules will help you write a professional email and achieve a good, lasting impression with your contacts.
In this video we show how to create a User Mailbox in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.: First we need to log into the Exchange Admin Center. Navigate to the Recipients >> Mailb…
In this video we show how to create an email address policy in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.:  First we need to log into the Exchange Admin Center. Navigate to the Mail Flow…

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now