Project Management

Creating and Implementing an Audit Strategy for Exchange

Free registration required

Executive Summary

This paper provides practical guidance to IT administrators on creating and implementing an audit strategy for Exchange to protect business from unauthorized access to information, compromise of user identity, and unwanted changes to system configuration. Formalized audit strategies are critical to organizations that store privileged, classified or proprietary information in their e-mail system or have multiple Exchange administrators: audit reports serve as proof of incidents and can be used for legal purposes. The absence of audit logs often makes it impossible for organizations to respond to e-discovery requests. The intended audiences for this paper are Exchange administrators and IT professionals responsible for the security of e-mail systems.

  • Format: PDF
  • Size: 2212.5 KB