Netwrix Enterprise Auditor (formerly StealthAUDIT) 11.6 has been released LEARN MORE
Stealthbits

Stealthbits ProTip: Identifying Non-Owner Exchange Activity

Blog >Stealthbits ProTip: Identifying Non-Owner Exchange Activity

Need visibility into the mailbox activity by anyone other than the owner of a specific mailbox? In this ProTip, you will learn how to view Exchange Activity within StealthINTERCEPT and how to scope the policy to view only Non-Owner activity.

Once you are licensed for Exchange Activity, you will need to ensure that you have agents deployed to all Exchange Role Hosts (HUB, CAS, & MBX). This is done by selecting the hosts to which you need to deploy the agent and selecting the Exchange Server Monitoring option:

exchange-monitoring-image-1

Next, you will need a new policy created either from an existing template or from scratch. Exchange policy templates are located in the Templates Node, under Templates > Microsoft > Exchange. There are a lot of options out-of-the-box, but for this example, we will create one from scratch with the Exchange Changes event type. Create a new policy in your desired policy folder (I made a new one called Exchange Activity). Select the Event Type tab and set the event type to Exchange Changes:

exchange-monitoring-image-2

Once the event type is selected, available options will be displayed. These are different for 3.4 and the new upcoming 4.0 version of StealthINTERCEPT. Version 3.4 merely provided visibility into all login types, while the newer version 4.0 will now also show the specific activity:

Version 3.4

exchange-monitoring-image-3

Version 4.0 (Added Operation Type filtering)

exchange-monitoring-image-4

Finally, we must specify that we want to see Non-Owner activity by designating only Delegates and Administrators in the Exchange Perpetrators tab:

exchange-monitoring-image-5

Your policy will now show all activity by anyone other than the owner of the mailbox. Once upgraded to the upcoming version 4.0 you will also be able to filter by the operations themselves, thus being able to make separate policies permitting notifications for specific unwanted activities as well.

Don’t miss a post! Subscribe to The Insider Threat Security Blog here:

Loading

Featured Asset

Leave a Reply

Your email address will not be published. Required fields are marked *

Subscribe

DON’T MISS A POST. SUBSCRIBE TO THE BLOG!


Loading

© 2022 Stealthbits Technologies, Inc.

Start a Free Stealthbits Trial!

No risk. No obligation.

FREE TRIAL