Audit and recertification policies are actionable snapshots of data that reveal the access to resources granted to people and roles, the assignments of people to roles, and the security assignments that have been made against protected resources like Exchange mailboxes, applications, and groups. As an auditor or line manager, you can review this data, recertifying and revoking the access to resources the people have within your organization. The topics in this section show you how to get started with these policies.





Getting Started










CREATING AUDIT RECERTIFICATION POLICIES

Creating Audit Recertification Policies







ADDING TARGETS TO POLICIES

Adding Targets to Policies







CREATING AND CONFIGURING AUDITS

Creating and Configuring Audits







ADDING RECERTIFICATION POLICIES TO AUDITS

Adding Recertification Policies to Audits









RESPONDING TO RECERTIFICATION TASKS

Responding to Recertification Tasks







PERFORMING REVOKES QUALITY CHECKS

Performing Revokes Quality Checks







FULFILLING REVOKES

Fulfilling Revokes