Overview of Enterprise Reporter for Exchange
Information residing in mailboxes and public folders is sensitive and often becomes subject to compliance efforts and security breaches. Enterprise Reporter for Exchange offers the visibility you need to understand who has access to what across your Exchange and Exchange Online environments. Ensure email security and prepare for internal and external audits with predefined and customizable reports on:
Extend your visibility beyond Exchange and Exchange Online and improve security in other Office 365 workloads with Enterprise Reporter Suite.
Gain visibility both on premises and in the cloud with a unified view of permissions and configurations across your Exchange and Exchange Online environments.
Get the insight you need with comprehensive reporting, including complete reports on delegated rights based on the permissions status of mailboxes, public folders, users and contacts.
Scale to Exchange and Exchange Online environments of any size and location. Schedule data collection during off-peak hours to minimize the impact on network and server performance, and leverage the distributed collection architecture for load balancing.
Ensure stakeholders get the reports they need, when they need them, with automated report generation and flexible delivery schedules.
Honor departmental and business function boundaries by enabling auditors, helpdesk staff, IT managers and other stakeholders get exactly the reports they need and nothing more.
Perform efficient, effective data analysis and satisfy the unique information needs of your organization using predefined reports or by creating new reports with even more attributes. Customize any report with advanced filtering, and choose from multiple formats, including PDF, HTML, MHT, RTF, XLS, XLSX, CSV, text and images.
Disk space requirements will vary with the Enterprise Reporter components you install:
The following operating systems are supported for Enterprise Reporter components.
NOTE: It is not recommended that the server or console be installed on a domain controller.
The follow versions of Active Roles are supported as targets of Active Directory discoveries. See the Active Roles web site for hardware and software requirements for your version of Active Roles:
Enterprise Reporter can be configured to send discovery information to the following versions of IT Security Search. See the IT Security Search web site for the hardware and software requirements for your version of IT Security Search.
The following versions of SQL Server® are supported for the Enterprise Reporter database. See the Microsoft® web site for the hardware and software requirements for your version of SQL Server®:
SSL Encryption of SQL Server Connections using Certificates
Enterprise Reporter can be configured to work with a SQL Server® instance. To secure communications while working with Enterprise Reporter, data sent over connections to the SQL Server can be encrypted using an SSL certificate.
The steps required to configure this encryption are as follows.
To obtain links to the following required software, open the Enterprise Reporter Autorun.
To collect Active Roles information, the following software is required on the computer where the Enterprise Reporter Configuration Manager is installed and on the computer where the Enterprise Reporter node is installed:
For more information and installation instructions, see the Active Roles Quick Start Guide. The following additional considerations are required:
To collect Exchange® 2007 information, the following additional considerations are required:
The following services are required on the Enterprise Reporter server and nodes.
The following services must be enabled on discovery targets for collections.
For more information see the release notes.
In this new report from the Information Security Community on LinkedIn, you will learn how your peers are approaching cybersecurity in the era of cloud, including the latest trends and benchmarks to gauge how your own organization stacks up.
This white paper explains the key provisions of GDPR and why organizations need to take action today to achieve compliance before May 25, 2018, when steep penalties for non-compliance take effect.
This white paper discusses best practices to prevent healthcare data breaches — focused on implementing appropriate strategies, policies, processes, training and cybersecurity defenses — that can mitigate much of the risk that healthcare organizations fac
In this white paper, we provide a checklist for complying with EU GDPR compliance requirements.
Active Directory (AD) security is a constantly moving target. With AD acting as the foundation for resources accessed both on premises and in the cloud, it’s critical to assess what state your AD’s security is in, understanding where to look and what to l
Changes in your AD environment can be indicative of a breach, leaving it unreliable. Explore AD security investigation and recovery plan best practices.
Simplify Microsoft on-premises and cloud-based platform security and compliance reporting
Gain deep visibility into discovery, reporting and project planning on AD and Azure AD
Document all critical group, mailbox and public/private changes to Exchange
Flexible unified communications management, reporting and diagnostics
Self-service tools will help you to install, configure and troubleshoot your product.
Find the right level of support to accommodate the unique needs of your organization.