Exchange online is the most widely used cloud application in the Office 365 with a significant number of users and devices accessing the cloud mail system from anywhere, anytime. Obviously this creates administrators several challenges in managing Office 365 security because of the increased possibilities for a security breach. Security vulnerabilities are usually caused by users not being careful in the manner in which they access their Exchange online mailboxes. Mailbox owners may have also granted inadvertent access rights or permissions to other users in violation of the company’s security policies and guidelines. There are several examples of such violations such as allowing temporary access other users, creating temporary users and groups for projects and granting them common mailbox access and so on. All these pose significant challenges to administrators frequently and they need to have Exchange online security reports that will pinpoint such security vulnerabilities.
This report shows the list of all users who are not owners but have permissions to other mailboxes.
This report shows the list of shared mailbox access. Other information like Mailbox Name, Mailbox E-mail Address, Identity, User Name, User E-mail Address, Access Rights are also displayed in this report.
This report shows whether Mailbox Audit are Enabled or not for each mailbox. Other information like User Name, IsAudit Enabled, Display Name, Identiy, Alias, Location, Mail address, Account Disabled, Created Date, Mailbox When Created, Modified Date, IsShared can also be viewed.
This report displays each user’s retention policy. Other information like User Name, Retention Policy, Display Name, Identiy, Alias, Location, Mail address, Account Disabled, Created Date, Mailbox When Created, Modified Date, IsShared are also shown in this report.