Skip to end of banner
Go to start of banner

Audits and Recertification

Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 3 Current »

Audit and recertification policies are actionable snapshots of data that reveal the access to resources granted to people and roles, the assignments of people to roles, and the security assignments that have been made against protected resources like Exchange mailboxes, applications, and groups. As an auditor or line manager, you can review this data, recertifying and revoking the access to resources the people have within your organization. The topics in this section show you how to get started with these policies.

Getting Started


CREATING AUDIT RECERTIFICATION POLICIES

Creating Audit Recertification Policies

ADDING TARGETS TO POLICIES

Adding Targets to Policies

CREATING AND CONFIGURING AUDITS

Creating and Configuring Audits

ADDING RECERTIFICATION POLICIES TO AUDITS

Adding Recertification Policies to Audits

COMPILING AN AUDIT

Compiling an Audit

RESPONDING TO RECERTIFICATION TASKS

Responding to Recertification Tasks

PERFORMING REVOKES QUALITY CHECKS

Performing Revokes Quality Checks

FULFILLING REVOKES

Fulfilling Revokes

  • No labels