Audits and Recertification

Audit and recertification policies are actionable snapshots of data that reveal the access to resources granted to people and roles, the assignments of people to roles, and the security assignments that have been made against protected resources like Exchange mailboxes, applications, and groups. As an auditor or line manager, you can review this data, recertifying and revoking the access to resources the people have within your organization. The topics in this section show you how to get started with these policies.

Getting Started


CREATING AUDIT RECERTIFICATION POLICIES

Creating Audit Recertification Policies

ADDING TARGETS TO POLICIES

Adding Targets to Policies

CREATING AND CONFIGURING AUDITS

Creating and Configuring Audits

ADDING RECERTIFICATION POLICIES TO AUDITS

Adding Recertification Policies to Audits

COMPILING AN AUDIT

Compiling an Audit

RESPONDING TO RECERTIFICATION TASKS

Responding to Recertification Tasks

PERFORMING REVOKES QUALITY CHECKS

Performing Revokes Quality Checks

FULFILLING REVOKES

Fulfilling Revokes