Solved

Mailbox Audit Exchange 2010

Posted on 2014-11-25
7
283 Views
Last Modified: 2014-12-01
Hi

I have CEO and it seems someone is accessing his email through an application or web browser - i would like to know how to get a report of who or what time is certain contacts where delete "Suggested Contacts"

i would like to see as much information as possible senior exchange engineer says exchange audit is enable just need the powershell commands.
0
Comment
Question by:Jorge Ocampo
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 3
7 Comments
 
LVL 7

Expert Comment

by:Satyendra Sharma
ID: 40465587
0
 
LVL 2

Author Comment

by:Jorge Ocampo
ID: 40465598
@satyendra mailbox auditing is already enable
0
 
LVL 7

Expert Comment

by:Satyendra Sharma
ID: 40465610
Then you should be able to look for activities by search-mailboxauditlog command
http://technet.microsoft.com/en-us/library/ff522360(v=exchg.141).aspx
0
Microsoft Certification Exam 74-409

Veeam® is happy to provide the Microsoft community with a study guide prepared by MVP and MCT, Orin Thomas. This guide will take you through each of the exam objectives, helping you to prepare for and pass the examination.

 
LVL 2

Author Comment

by:Jorge Ocampo
ID: 40465614
Search-MailboxSearch-MailboxAuditLog : The term 'Search-MailboxSearch-MailboxAuditLog' is not recognized as the name of
 a cmdlet, function, script file, or operable program. Check the spelling of the name, or if a path was included, verif
y that the path is correct and try again.
0
 
LVL 7

Expert Comment

by:Satyendra Sharma
ID: 40465619
Search-MailboxAuditLog -Identity "CEO's Mailbox" -LogonTypes Admin,Delegate -StartDate x/x/xxxx -EndDate x/x/xxxx -ResultSize 2000
0
 
LVL 2

Author Comment

by:Jorge Ocampo
ID: 40465652
"search-mailboxauditlog" is not recognized do i need to get a module?
0
 
LVL 7

Accepted Solution

by:
Satyendra Sharma earned 500 total points
ID: 40465667
You need to have 'Organization management' or 'Records Management' permissions to execute the command.
http://technet.microsoft.com/en-us/library/dd638205(v=exchg.141).aspx
0

Featured Post

Salesforce Has Never Been Easier

Improve and reinforce salesforce training & adoption using WalkMe's digital adoption platform. Start saving on costly employee training by creating fast intuitive Walk-Thrus for Salesforce. Claim your Free Account Now

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A company’s centralized system that manages user data, security, and distributed resources is often a focus of criminal attention. Active Directory (AD) is no exception. In truth, it’s even more likely to be targeted due to the number of companies …
Had a business requirement to store the mobile number in an environmental variable. This is just a quick article on how this was done.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Are you ready to implement Active Directory best practices without reading 300+ pages? You're in luck. In this webinar hosted by Skyport Systems, you gain insight into Microsoft's latest comprehensive guide, with tips on the best and easiest way…

710 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question