Security Manager for Microsoft Exchange |
Release Notes |
Date Published: May 2010 |
|
Security Manager for Microsoft Exchange helps secure your enterprise from internal and external attacks. The product monitors your Microsoft Exchange environment for various changes to Exchange settings and objects, including mailboxes, message retention policies, and email accounts. For example, this module enables you to perform the following tasks:
Security Manager for Microsoft Exchange also collects events from logs and stores them in secure repositories so you can archive this data, create reports for management or auditing purposes, and analyze critical events to research issues. This module for the Security Manager product includes several new features. You can post feedback in the NetIQ Security Manager forum on Qmunity, our community Web site that also includes product notifications, blogs, and product user groups. This document outlines why you should install this module, lists installation requirements, and identifies known issues. Supported ProductsFor the latest information about supported software versions and the availability of module updates, visit the Security Manager Supported Products page at www.netiq.com/support/sm/supportedproducts/default.asp. If you encounter problems using this module with a later version of your application, contact NetIQ Technical Support. This release supports the following products:
Why Install This Module?Security Manager for Microsoft Exchange monitors events on Microsoft Exchange servers to detect a variety of occurrences and alert you to them. When significant events occur, Security Manager sends alerts to the consoles and can notify your staff so they can quickly take corrective action. System RequirementsThe following table lists additional requirements for a Windows agent. For more information about agent requirements, see the Installation Guide for NetIQ Security Manager.
Installing This ModuleInstall this module using the Module Installer utility. If this is the first time you have installed the module, ensure you also add a license. For more information about installing modules, see the Installation Guide for NetIQ Security Manager. You can verify successful installation of the module in the Module Installer. After the installation completes, verify the Status column indicates the module is current and the module version listed in the Installed Version column is the same as the version in the Available Version column.
After you install the module, enable Active Directory auditing and configure your Microsoft Exchange servers so Security Manager can monitor Exchange events. You can also run the Configuration Wizard to configure the module to enable archiving of Mailbox Access Auditing events, message tracking events, and Message Records Management (MRM) events. The Configuration Wizard includes steps for enabling auditing of each type of event log. For more information about using the Configuration Wizard, see the User Guide for NetIQ Security Manager. Before you can configure Security Manager to monitor Exchange logs, you must know where Microsoft Exchange stores the logs. To find this location, use the Exchange Management Shell to run one of the commands listed in the table below on your Microsoft Exchange server. After you find the log location, navigate to the location specified on the Exchange server and copy the full path to the folder that contains the log or logs. To enable Security Manager to monitor Exchange logs, you must let Security Manager know where to look for the logs. Add the system environment variables listed in the table below to each agent computer with Exchange installed, where each system environment variable corresponds to the location of a particular log file on the computer.
For more information about setting environment variables, see the Microsoft Windows documentation. Enabling and Configuring Microsoft Exchange AuditingBefore Security Manager can monitor Microsoft Exchange events, you must enable and configure Microsoft Exchange auditing. Microsoft Exchange stores configuration information not within Exchange itself but within a set of Active Directory (AD) objects. Every time a user or administrator creates, deletes, or modifies an Exchange AD object, AD logs an event. To monitor Exchange, you must enable and configure several different Active Directory settings and objects for Exchange, as well as logging for Mailbox Access Auditing, message tracking, and MRM. To enable and configure Microsoft Exchange auditing:
For more information about configuring Microsoft Exchange auditing, see the Microsoft documentation and the Microsoft TechNet White Paper "Configuration and Mailbox Access Auditing for Exchange 2007 Organizations." For more information about configuring Security Manager to monitor Microsoft Exchange, see the Configuration Wizard Help. Contact InformationPlease contact us with your questions and comments. We look forward to hearing from you. For detailed contact information, see the Support Contact Information Web site. For interactive conversations with your peers and NetIQ experts, become an active member of Qmunity, our community Web site that offers product forums, product notifications, blogs, and product user groups. Legal NoticeTHIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE AGREEMENT OR A NON-DISCLOSURE AGREEMENT. EXCEPT AS EXPRESSLY SET FORTH IN SUCH LICENSE AGREEMENT OR NON-DISCLOSURE AGREEMENT, NETIQ CORPORATION PROVIDES THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. SOME STATES DO NOT ALLOW DISCLAIMERS OF EXPRESS OR IMPLIED WARRANTIES IN CERTAIN TRANSACTIONS; THEREFORE, THIS STATEMENT MAY NOT APPLY TO YOU. This document and the software described in this document may not be lent, sold, or given away without the prior written permission of NetIQ Corporation, except as otherwise permitted by law. Except as expressly set forth in such license agreement or non-disclosure agreement, no part of this document or the software described in this document may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, or otherwise, without the prior written consent of NetIQ Corporation. Some companies, names, and data in this document are used for illustration purposes and may not represent real companies, individuals, or data. This document could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein. These changes may be incorporated in new editions of this document. NetIQ Corporation may make improvements in or changes to the software described in this document at any time. © 2010 NetIQ Corporation. All rights reserved. U.S. Government Restricted Rights: If the software and documentation are being acquired by or on behalf of the U.S. Government or by a U.S. Government prime contractor or subcontractor (at any tier), in accordance with 48 C.F.R. 227.7202-4 (for Department of Defense (DOD) acquisitions) and 48 C.F.R. 2.101 and 12.212 (for non-DOD acquisitions), the government's rights in the software and documentation, including its rights to use, modify, reproduce, release, perform, display or disclose the software or documentation, will be subject in all respects to the commercial license rights and restrictions provided in the license agreement. Check Point, FireWall-1, VPN-1, Provider-1, and SiteManager-1 are trademarks or registered trademarks of Check Point Software Technologies Ltd. ActiveAudit, ActiveView, Aegis, AppManager, Change Administrator, Change Guardian, Compliance Suite, the cube logo design, Directory and Resource Administrator, Directory Security Administrator, Domain Migration Administrator, Exchange Administrator, File Security Administrator, Group Policy Administrator, Group Policy Guardian, Group Policy Suite, IntelliPolicy, Knowledge Scripts, NetConnect, NetIQ, the NetIQ logo, PSAudit, PSDetect, PSPasswordManager, PSSecure, Secure Configuration Manager, Security Administration Suite, Security Manager, Server Consolidator, VigilEnt, and Vivinet are trademarks or registered trademarks of NetIQ Corporation or its subsidiaries in the USA. All other company and product names mentioned are used only for identification purposes and may be trademarks or registered trademarks of their respective companies. For purposes of clarity, any module, adapter or other similar material ("Module") is licensed under the terms and conditions of the End User License Agreement for the applicable version of the NetIQ product or software to which it relates or interoperates with, and by accessing, copying or using a Module you agree to be bound by such terms. If you do not agree to the terms of the End User License Agreement you are not authorized to use, access or copy a Module and you must destroy all copies of the Module and contact NetIQ for further instructions. | ||||||||||||||||||||||||||||
Template date: April 6, 2010 |