Audits and Recertification
Audit and recertification policies are actionable snapshots of data that reveal the access to resources granted to people and roles, the assignments of people to roles, and the security assignments that have been made against protected resources like Exchange mailboxes, applications, and groups. As an auditor or line manager, you can review this data, recertifying and revoking the access to resources the people have within your organization. The topics in this section show you how to get started with these policies.
Getting Started
CREATING AUDIT RECERTIFICATION POLICIES
Creating Audit Recertification Policies
ADDING TARGETS TO POLICIES
Adding Targets to Policies
CREATING AND CONFIGURING AUDITS
Creating and Configuring Audits
ADDING RECERTIFICATION POLICIES TO AUDITS
Adding Recertification Policies to Audits
COMPILING AN AUDIT
Compiling an Audit
RESPONDING TO RECERTIFICATION TASKS
Responding to Recertification Tasks
PERFORMING REVOKES QUALITY CHECKS
Performing Revokes Quality Checks
FULFILLING REVOKES
Fulfilling Revokes