Analyze Reports in Office 365
来源:互联网 发布:JAVA中图标引入 编辑:程序博客网 时间:2024/05/16 18:01
Auditing Reports
There are severalauditing reports available in the Reports menu of the Office 365 admin center.These reports can be found in the overview section under auditing.
Mailbox Access by Non-Owners Report
This report returnsa list of mailboxes that have been accessed by someone other than the owner ofthe mailbox. The audit log that report is generated from logs information suchas the person accessing the mailbox, when they accessed it, what actions theyperformed, and whether their actions where successful or not.
To run the MailboxAccess by Non-owners report:
- In the Office 365 admin center, in the left menu, click reports.
- At the bottom of the overview page, under auditing, click mailbox access by non-owners.
- In the Start date boxes, specify a start date for the report.
- In the End date boxes specify an end date for the report.
- Then do one of the following:
- Click select mailboxes and select which mailboxes to search.
- Leave the field blank to search all mailboxes.
- Under Search for access by, click the drop-down list and select one of these options:
- All non-owners
- External users
- Administrators and delegated users
- Administrators
- Click search.
- Theresults are returned in the Search results window.
Role Group Changes Report
Thisreport returns a list of all the changes made to the Office 365 role groups byadministrators in yourorganization.The audit log that this report is generated from logs information about whomade thechange, when they didit, and what the change was.
To runthe Role Group Changes report:
- In the Office 365 admin center, in the left menu, click reports.
- At the bottom of the page, under auditing, click role group changes.
- In the Start date boxes, specify a start date for the report.
- In the End date boxes specify an end date for the report.
- Then do one of the following:
- Click select role groups and select the role groups to search.
- Leave the field blank to search all role groups.
- Click search.
- Theresults are returned in the window at the bottom of the page.
Mailbox Content Search and Hold Report
Thisreport returns a list of all the mailboxes that have been put on, or removedfrom In-Place Hold or In-PlaceeDiscovery using the In-Place eDiscovery and Hold feature. The audit log thatthis report isgenerated fromlogs information about who put the mailbox on hold, and when they did it.
To runthe Mailbox Content Search and Hold report:
- In the Office 365 admin center, in the left menu, click reports.
- At the bottom of the page, under auditing, click mailbox content search and hold.
- In the Start date boxes, specify a start date for the report.
- In the End date boxes specify an end date for the report.
- Click search.
- Theresults are returned in the Search results window.
Mailbox Litigation Holds Report
Thisreport returns a list of all changes made to per-mailbox litigation holds. Theaudit log that this reportisgenerated from logs information about who enabled or disabled litigation holdon a mailbox, and whenthey didit.
To runthe Mailbox Litigation Holds report:
- In the Office 365 admin center, in the left menu, click reports.
- At the bottom of the page, under auditing, click mailbox litigation holds.
- In the Start date boxes, specify a start date for the report.
- In the End date boxes specify an end date for the report.
- Then do one of the following:
- Click select users and select which users’ mailboxes to search.
- Leave the field blank to search all users’ mailboxes.
- Click search.
- Theresults are returned in the Search results window.
Note: For all of these auditing reports you can click the7 (printer) icon to print theresulting reports.
Mail and Protection Reports
Thereports menu of the Office 365 admin centerprovides access to several mail and protectionreports.
Mail Reports
Thereare several mail-related reports availableunder the mail section of the reports menu in theOffice 365 admin center, including:
- Active and inactive mailboxes. This report showsthe number of active and inactive mailboxesover a period of time. A mailbox is consideredinactive if a user has notaccessed it for morethan 30 days.
- New and deleted mailboxes. This report shows the number of active, new, and deleted mailboxes.
- New and deleted groups. This report shows the number of groups created and deleted.
- Mailbox usage. This report shows the total number of mailboxes, inactive mailboxes, mailboxes whichhave exceeded their storage quota, and mailboxes which arecurrently using less than a quarter oftheir storage quota.
- Types of mailbox connections. This report shows the number of mailbox connections made over time,which are then grouped by connection type, such as POP3, IMAP, and OWA.
Allthese reports are displayed as charts and provide a link to view each chart asa table instead. Some ofthemhave clickable links which display the information on a daily, weekly, monthly,or yearly basis.
Protection Reports
Thereare several protection-related reports available under the protection sectionof the reports menuin theOffice 365 admin center, including:
- Received mail. This report shows mail that has been received, grouped by type of traffic, such as goodmail, spam, malware, transport rules, and DLP policy. It also displays a list of top mail recipients,showing the recipient’s email address and count of emails received.
- Sent mail. This report shows mail that has been sent, grouped by type of traffic, such as good mail,spam, malware, transport rules, and DLP policy. It also displays a list of top mail senders, showing thesender’s email address and count of emails sent.
- Received spam. This report shows what spam has been detected, grouped by spam filtering type, suchas SMTP blocked, IP blocked, and Content filtered. It also displays a list of top spam recipients,showing each recipient’s email address and count of spam emails received.
- Malware detection in received mail. This report shows the number of malware detections in receivedmail, before the malware action was applied. It also displays a list of top malware recipients, showingeach recipient’s email address and count of malware received.
- Malware detection in sent mail. This report shows the number of malware detections in sent mail,before the malware action was applied.
- Top malware. This report shows a list of the most frequently-detected malware. Sent spam. This report shows sent mail that is suspected of being spam, grouped by filtering type, such as SMTP blocked, and content filtered.
Allof these reports are displayed as charts and provide a link to view each chartas a table instead. Theyalsoall have clickable links to enable the chart to display theinformation over seven-day, 14-day, 30-day,or 60-day periods
Mail Protection Reports for Office 365
Onthe reports page of the Office 365 admincenter, under download your reports, there is aMail protection reports (Excel) link whichenablesadministrators todownload mail protection reportsfor Office 365. The link opens a webpage on theMicrosoft Download Center, where you candownload the Microsoft Office 365 ExcelPluginfor Exchange OnlineReporting. The download ispackagedas an MSI file, and there are 32-bit and64-bit versions that can be downloaded.
Thedownload installs an Excel 2013 reportingworkbook which provides a comprehensive view ofthe email protection information that isalso available in the reports menu of the Office 365 admincenter.
Todownload and install the workbook:
- Navigate tohttp://www.microsoft.com/en-us/download/details.aspx?id=30716.
- Click Download.
- Select the check box for the version you want to download.
- Click Next.
- Save the file to a location of your choice.
- Browse to the location where you saved the MSI file and double-click it.
- On the welcome page, click Next.
- Select the I accept the terms in the License Agreement check box, and click Next.
- Select one of the following:
- Microsoft Exchange Online
- Microsoft Exchange Online Protection
- Click Next.
- On the prerequisites page, click Next.
- Click Install.
- Click OK.
- Click Finish.
To usethe Mail Protection Reports workbook for Office 365:
- On the desktop, double-click the Mail Protection Reports for Office 365 shortcut.
- On the Microsoft Office Customization Installer page, click Install.
- Select one of the worksheet tabs in the workbook and click the Query button in the worksheet.
- Enter your Office 365 credentials and click Login.
- In the Query dialog box, select a time interval and click OK.
- On the Progress page, when it completes, click OK.
Theworkbook contains summary graphs for various types of email message filteringand includesinformation aboutmessages that have been identified as either good mail, spam, or malware. Italsodisplays graphs formessages that were identified by either a transport rule or Data LossPrevention (DLP)policy.
Youcan also employ data slicers in Excel 2013 to perform deeper analysis of thedata. If you noticespecifictrends or unusual activities in the data, you can drill downfurther into the report by runningqueries on the other detailed tabs in theworkbook and viewing more detailed information about themessages themselves.
- Analyze Reports in Office 365
- Creating Reports in ASP.netwith Office Web Components
- Phrases Used In Reports
- Java Injection in Jasper Reports
- ANALYZE
- Microsoft(R) Office Access 2007 Forms, Reports, and Queries
- Automatically Printing Crystal Reports in ASP.NET
- Valgrind reports memory leaking in pthread_create()
- jasper reports - parameters for ‘in clause’
- Automatically Printing Crystal Reports in ASP.NET
- Trouble with expressions in Jasper Reports
- Developing Crystal Reports applications in PowerBuilder .NET
- Assimp reports no scene in package:
- photo in office
- in the office
- Analyze Library Cache Pin and 4021 Error in Oracle
- Use procexp.exe in sysinernalssuite to analyze process runing info
- Exporting to Excel in Crystal Reports .NET - Perfect Excel Exports
- 字符串压缩功能的实现
- Linux下开启/关闭MySql Server
- Linux挂载局域网硬盘(Linux 挂在网络硬盘),Ubuntu (Cubieboard CC-A80)挂载小米路由器硬盘
- 游戏中符文系统与天赋系统等的作用
- DB2实现分页
- Analyze Reports in Office 365
- GIS应用及OpenGIS介绍
- coderforce 587A Duff and Weight Lifting
- 基于物品的协同过滤和内容过滤有什么区别?
- 登录amazon云服务器
- leetcode 300 : Longest Increasing Subsequence
- Android Gestures - Tutorial
- JBOSS连接池调优1-如何防止连接风暴
- React Native :react-native init fail