Applies to: Exchange Server 2013, Exchange Online

Topic Last Modified: 2012-10-13

The Non-Owner Mailbox Access Report in the Exchange Administration Center (EAC) lists the mailboxes that have been accessed by someone other than the person who owns the mailbox. When a mailbox is accessed by a non-owner, Microsoft Exchange logs information about this action in a mailbox audit log that’s stored as an email message in a hidden folder in the mailbox being audited. Entries from this log are displayed as search results and include a list of mailboxes accessed by a non-owner, who accessed the mailbox and when, the actions performed by the non-owner, and whether the action was successful. By default, entries in the mailbox audit log are retained for 90 days.

When you enable mailbox audit logging for a mailbox, Microsoft Exchange logs specific actions by non-owners, including both administrators and users, called delegated users, who have been assigned permissions to a mailbox. You can also narrow the search to users inside or outside your organization.

What do you need to know before you begin?

Tip:
Having problems? Ask for help in the Exchange forums. Visit the forums at: Exchange Server, Exchange Online, or Exchange Online Protection.

What do you want to do?

Enable mailbox audit logging

You have to enable mailbox audit logging for each mailbox that you want to run a non-owner mailbox access report for. If mailbox audit logging isn't enabled, you won't get any results when you run a report.

To enable mailbox audit logging for a single mailbox, run the following Shell command.

Copy Code
Set-Mailbox <Identity> -AuditEnabled $true

For example, to enable mailbox auditing for a user named Florence Flipo, run the following command.

Copy Code
Set-Mailbox "Florence Flipo" -AuditEnabled $true

To enable mailbox auditing for all user mailboxes in your organization, run the following commands.

Copy Code
$UserMailboxes = Get-mailbox -Filter {(RecipientTypeDetails -eq 'UserMailbox')}
Copy Code
$UserMailboxes | ForEach {Set-Mailbox $_.Identity -AuditEnabled $true}

How do you know this worked?

Run the following command to verify that you’ve successfully configured mailbox audit logging.

Copy Code
Get-Mailbox | FL Name,AuditEnabled

A value of True for the AuditEnabled property verifies that audit logging is enabled.

Run a non-owner mailbox access report

  1. In the EAC, navigate to Compliance Management > Auditing.

  2. Click Run a non-owner mailbox access report.

    By default, Microsoft Exchange runs the report for non-owner access to any mailboxes in the organization over the past two weeks. The mailboxes listed in the search results have been enabled for mailbox audit logging.

  3. To view non-owner access for a specific mailbox, select the mailbox from the list of mailboxes. View the search results in the details pane.

Tip:
Want to narrow the search results? Select the start date, end date, or both, and select specific mailboxes to search. Click Search to re-run the report.

Search for specific types of non-owner access

You can also specify the type of non-owner access, also called the logon type, to search for. Here are your options:

  • All non-owners   Search for access by administrators and delegated users inside your organization. Also includes access by Microsoft datacenter administrators for Exchange Online organizations.

  • External users   Search for access by Microsoft datacenter administrators for Exchange Online organizations.

  • Administrators and delegated users   Search for access by administrators and delegated users inside your organization.

  • Administrators   Search for access by administrators in your organization.

What gets logged in the mailbox audit log?

When you run a non-owner mailbox access report, entries from the mailbox audit log are displayed in the search results in the EAC. Each report entry contains this information:

  • Who accessed the mailbox and when

  • The actions performed by the non-owner

  • The affected message and its folder location

  • Whether the action was successful

The following table describes the types of actions logged, and whether these actions are logged by default for access by administrators and for access by delegated users. If you want to track actions that aren't logged by default, you have to use the Shell to enable logging of those actions.

Action Description Administrators Delegated users

Update

A message was changed.

Yes

Yes

Copy

A message was copied to another folder.

No

No

Move

A message was moved to another folder.

Yes

No

Move To Deleted Items

A message was moved to the Deleted Items folder.

Yes

No

Soft-delete

A message was deleted from the Deleted Items folder.

Yes

Yes

Hard-delete

A message was purged from the Recoverable Items folder.

Yes

Yes

FolderBind

A mailbox folder was accessed.

Yes

No

Send as

A message was sent using SendAs permission. This means another user sent the message as though it came from the mailbox owner.

Yes

Yes

Send on behalf of

A message was sent using SendOnBehalf permission. This means another user sent the message on behalf of the mailbox owner. The message will indicate to the recipient who the message was sent on behalf of and who actually sent the message.

Yes

No

MessageBind

A message was viewed in the preview pane or opened.

No

No

How do you know this worked?

To verify that you’ve successfully run a non-owner mailbox access report, check the search results pane. Mailboxes that you ran the report for are displayed in this pane. If there are no results for a specific mailbox, it’s possible there hasn’t been access by a non-owner or that non-owner access hasn’t taken place within the specified date range. As previously described, be sure to verify that audit logging has been enabled for the mailboxes you want to search for access by non-owners.