Go Up
You are here: AdministrationMonitoring PlansManage Data SourcesExchange

Exchange

Complete the following fields:

Option Description

Monitor this data source and collect activity data

Enable monitoring of the selected data source and configure Netwrix Auditor to collect and store audit data.

Detect additional details

Specify additional information to include in reports and activity summaries. Configure the following:

  • Originating workstation—Workstation from which the change was made.
  • Group membership—Group membership of the account under which the change was made.

Specify data collection method

You can enable network traffic compression. If enabled, a Compression Service will be automatically launched on the audited computer, collecting and prefiltering data. This significantly improves data transfer and minimizes the impact on the target computer performance.

Configure audit settings

You can adjust audit settings automatically. Your current audit settings will be checked on each data collection and adjusted if necessary.

NOTE: This method is recommended for evaluation purposes in test environments. If any conflicts are detected with your current audit settings, automatic audit configuration will not be performed.

Do not select the checkbox if you want to configure audit settings manually. For a full list of audit settings required to collect comprehensive audit data and instructions on how to configure them, refer to Configure IT Infrastructure for Auditing and Monitoring.

Collect data on non-owner access to mailboxes

Enable monitoring of unauthorized access to mailboxes within your Exchange organization. Configure the following:

  • Enable automatic audit configuration—If you select to automatically configure audit in the target environment, your current audit settings will be checked on each data collection and adjusted if necessary. This method is recommended for evaluation purposes in test environments. For a full list of audit settings required for Netwrix Auditor to collect comprehensive audit data and instructions on how to configure them, refer to Configure IT Infrastructure for Auditing and Monitoring.

    If you want to configure audit manually, refer to Configure IT Infrastructure for Auditing and Monitoring for a full list of audit settings, and instructions on how to configure them.

  • Notify users if someone gained access to their mailboxes—Select this checkbox if you want to notify users on non-owner access to their mailboxes.
  • Notify only specific users—Select this checkbox and click Add Recipient to specify the list of users who will receive notifications on non-owner access to their mailboxes. Users not included in this list will not be notified.

Review your data source settings and click Add to go back to your plan. The newly created data source will appear in the Data source list. As a next step, click Add item to specify an object for monitoring. See Add Items for Monitoring for more information.

Go Up