The security of Exchange
environment to a large extent depends on how meticulously and
elaborately the auditing data is being collected from it. The next
step is to process that data and present it in a format from which
inferences can be drawn about the nature of changes and their effects
on the overall health of Exchange environment. Those responsible for
the stability and security of Exchange servers must be in a position
to instantly filter...