Integrating Data Security with Existing Infrastructure > Working with Exchange servers
|
With Data Security, you can perform discovery on Microsoft Exchange servers. Before you begin, there are a number of steps you need to take.
2. Grant the account one of the following roles. This is necessary so that Data Security can discover messages and display results.The service account should now be able to accesse Exchange via Outlook Web App (OWA) and move between the mailboxes intended to be scanned during the discovery. Try switching between mailboxes as shown below:
3. Configure Exchange impersonation. Exchange impersonation needs to be enabled for the service account used for the discovery
b. Run the New-ManagementRoleAssignment cmdlet to add the permission to impersonate to the specified user.For example, to enable a service account to impersonate all other users in an organization, enter the following:New-ManagementRoleAssignment -Name:impersonationAssignmentName -Role:ApplicationImpersonation -User:ServiceAccountFor more information on Exchange impersonation, see http://msdn.microsoft.com/en-us/library/bb204095.
b.
Integrating Data Security with Existing Infrastructure > Working with Exchange servers
|