Documentation forAccess Rights Manager

Customize an Exchange Logga configuration

When you start the Configuration application and click Scans, the Scans page displays with your scan configurations. Each configuration includes several controls you can use to configure, schedule, and start your scan.

Below is an example of the configuration controls in an Exchange Logga configuration.

The following table describes the controls you can use to configure and initiate your Exchange Logga scan.

Number Icon Description
N/A Indicates an Exchange Logga scan configuration.
N/A Activates or deactivates Exchange Logga.
1

Indicates the scan configuration name.

You can change the configuration name. If you configured several resource scans, use the filter to locate and select a configuration for your scan.

2

The account used by Exchange Logga.

You can change the credentials used by the Exchange Logga to read the events from the Exchange Server. SolarWinds recommends using a service account.

See Service account permissions in the system requirements for the required permissions.

3

(Optional) Filters out uninteresting events, allowing you to record only relevant entries.

Filtering means that filtered out events are not recorded, which significantly increases the overview and reduces data volumes.

N/A Selects the authentication method that matches the PowerShell website configuration.
N/A

Determines how frequently Exchange Loggia is refreshed.

Events are cached by the collector and transferred to the data base through the ARM server in configured intervals.

The default setting is 10 minutes. You can select between 1 and 60 minutes.