Exchange online is the most widely used cloud application in the Office 365 with a significant number of users and devices accessing the cloud mail system from anywhere, anytime. Obviously this creates administrators several challenges in managing Office 365 security because of the increased possibilities for a security breach. Security vulnerabilities are usually caused by users not being careful in the manner in which they access their Exchange online mailboxes. Mailbox owners may have also granted inadvertent access rights or permissions to other users in violation of the company’s security policies and guidelines. There are several examples of such violations such as allowing temporary access other users, creating temporary users and groups for projects and granting them common mailbox access and so on. All these pose significant challenges to administrators frequently and they need to have Exchange online security reports that will pinpoint such security vulnerabilities.
This report shows the list of all users who are not owners but have permissions to other mailboxes.