Additional tasks for the Exchange server roles
This topic discusses additional steps that you should complete on the Exchange servers in your network in order to prepare the Splunk for Exchange app for complete Exchange data analysis. Some of these steps may already be completed. This is a checklist to ensure that the Splunk for Exchange app gets the data it needs.
Additional tasks for servers running the Hub and Edge Transport roles
- Turn on Message Tracking from within Exchange System Manager.
- If you have installed Microsoft Forefront Security Suite for Exchange 2007, also deploy the
fwd_exchange2007_forefront
component. - If you have moved the message tracking logs, ensure you also update the data input to reflect the new location.
Additional tasks for servers running the Client Access Server role
If you are running Post Office Protocol version 3 (POP3) or Internet Mail Access Protocol version 4rev1 (IMAP4), you must enable the POP3 and/or IMAP4 Transport Logs.
- For Exchange 2007, the instructions are available at "How to Enable Protocol Logging for POP3 and IMAP4" (http://technet.microsoft.com/en-us/library/aa997690%28EXCHG.80%29.aspx) on MS TechNet.
- For Exchange 2010, enable the transport logs through the Exchange Shell. Instructions are located at "Configure Protocol Logging for POP3 and IMAP4 (http://technet.microsoft.com/en-us/library/aa997690.aspx) on MS TechNet.
Note: Remember that you must restart either the POP3 or IMAP4 services after making changes to logging preferences.
Additional tasks for servers running the Mailbox Server role
Enable Exchange Audit logging
If you want to track Microsoft Outlook usage, enable Exchange Audit logging by executing the following PowerShell script:
powershell -File fwd_exchangeXXXX_store\bin\powershell\enable-audit-logs.ps1
This script enables the Exchange Audit log and sets the Diagnostic logging level to Medium. You must run this script on every Mailbox Server.
Note: By default, members of the Domain Admins and select other groups are exempt from auditing. You can change this in a few different ways (primarily by revoking the "Bypass Auditing" right in the schema) - consult your Exchange documentation.
Adjust the settings for the PowerShell Event log
The Splunk App for Microsoft Exchange makes extensive use of PowerShell to gather information about the Mailbox Server. Although not strictly required, we recommend you adjust the settings for the PowerShell Event log as follows:
- Open Event Viewer.
- Right click on Powershell Log and select Properties.
- Set the maximum size to 10,240 KB.
- Set 'Overwrite events as needed under Log size -> When maximum log size is reached.
- Click OK.
- Right click on the Windows PowerShell Log and select Properties.
- Set Overwrite events as needed under Log size -> When maximum log size is reached
- Click OK.
If you need long term storage of the logs, we recommend you index the PowerShell log in Splunk.
Deploy configurations for all server roles | Install the central Splunk for Microsoft Exchange app instance |
This documentation applies to the following versions of Splunk® App for Microsoft Exchange (EOL): 1.0
Feedback submitted, thanks!