StealthAUDIT® for Exchange

Microsoft Exchange Reporting

Microsoft Exchange contains much of the most critical information within an organization. Confidential IP, strategic discussions, partner and customer communication, and other sensitive information is shared daily via email.

Effectively controlling access to mailboxes and public folders, and monitoring and measuring activity by users and their delegates is crucial to guaranteeing the security of your information.

Watch Video


Request a Free Trial

Powered by ChronoForms -

Hess Coporation Logo
Charles Schwab Logo
Florida's Natural Logo

The STEALTHbits Advantage

StealthAUDIT for Exchange provides surgical insight into access, usage, and environment configuration so organizations can ensure optimal security and performance within Microsoft Exchange. StealthAUDIT for Exchange lets you answer questions like:

  • Who Has Access To Which Mailboxes and Public Folders?
  • Who Can Impersonate Another User?
  • Who Has Admin Access?
  • How Much Email Is Being Sent?
  • Who Is Causing Excessive IIS Connections?
  • Are Databases Reaching Dangerous Limits?
  • Who’s Reaching Their Mailbox Quota?
  • Where is there Sensitive Data in emails?

Learn why organizations all over the world rely on STEALTHbits as their Exchange solution provider

What Our Customers Are Saying

Microsoft Ignite - Tony Frasco


Learn More


StealthAUDIT® for Exchange Reports

  • Public Folder Cleanup Report
  • Non-Owner Mailbox Remediation Report
  • Mailbox Access Analysis Report
  • Stale Resource Cleanup Report
  • Public Folder Cleanup

    Public Folders are old, they’re costing you unnecessary expense, and are putting your organization at risk. Over time, they’ve grown stale and there’s high potential for sensitive data to be sitting unprotected in this largely ungoverned data repository.

    Enlarge Screenshot

  • Non-Owner Mailbox Remediation

    Who has access to mailboxes that don’t belong to them? Identify where non-owners have access and safely remediate to ensure only the right levels of access across your Exchange environment.

    Enlarge Screenshot

  • Mailbox Access Analysis

    Understand who has access to which mailboxes, including access granted via both sharing and mailbox permissions.

    Enlarge Screenshot

  • Stale Resource Cleanup

    Identify and cleanup stale data in your Exchange environment to ensure effective defensible disposition policies.

    Enlarge Screenshot


    Understand where sensitive information as well as confidential and proprietary information exists within Exchange mailboxes. Use default search criteria or custom criteria to identify information unique to your organization, including employee IDs, internal compliance regulations, and more.

    Enlarge Screenshot


StealthAUDIT for Exchange - Microsoft Exchange Reporting

Data Sheet

Learn More

STEALTHbits Solutions for Microsoft Exchange Server

Solution Brief

Learn More

StealthAUDIT Action Module Framework

Solution Brief

Learn More

Solving The Public Folder Problem

White Paper

Learn More

Free Risk Assessment
Free Trial Request
STEALTHbits Demo Request
Browse Resource Library