Pour bénéficier d’une expérience Web optimale, utilisez Internet Explorer 11 ou version ultérieure, Chrome, Firefox, ou Safari.

Detect and Monitor Threats to Your Executive Mailboxes with Exchange Mailbox Auditing

Detect and Monitor Threats to Your Executive Mailboxes with Exchange Mailbox Auditing
a la demande
  • Date enregistrée:Feb. 15, 2018
  • Événement:a la demande
Detect and Monitor Threats to Your Executive Mailboxes with Exchange Mailbox Auditing

Executive mailboxes are full of confidential information. It's unacceptable to not know if someone is reading the CEO's mailbox or otherwise tampering with it. You will find out eventually, but your security solutions should be the ones to tell you – not the Wall Street Journal.

Whether you use on-premises Exchange or Exchange Online, email security and mailbox auditing is not a simple matter. Both on-premises and cloud versions allow you to manually run reports on mailbox access, but that doesn’t fit most enterprise requirements for automated monitoring and near real-time alerting. So where should you look for the security you need?

In this webcast, security expert Randy Franklin Smith explores the differences in auditing on-premises Exchange vs. Exchange Online. You’ll learn how Exchange prevents a deluge of duplicate view events when a user is perusing a given folder in someone else’s mailbox, as well as how Exchange differentiates between what it considers delegate access and access by privileged administrators.

Finally, Randy and Quest expert Clinton Pless will review how easy it can be to monitor, report and alert on non-owner mailbox access, whether on premises or in the cloud, with third-party solutions, like Change Auditor.

Regarder votre webcast gratuit

Veuillez patienter...

triangle-down check
En téléchargeant, vous vous inscrivez pour recevoir des e-mails marketing de notre part. Pour vous désinscrire, veuillez suivre les instructions figurant dans notre politique de confidentialité.

Site protégé par reCAPTCHA. Consultez les conditions d’utilisation et la politique de confidentialité de Google.