<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Exchange Admin Audit Logs in Log Analytics</title>
    <link>https://community.dynatrace.com/t5/Log-Analytics/Exchange-Admin-Audit-Logs/m-p/248119#M125</link>
    <description>&lt;P&gt;I am looking for recommendations on how to ingest our Exchange server 2016 Admin Audit logs into Dynatrace. I have not seen any documentation around this specifically. These logs are stored in a hidden mailbox instead of a file. I am hoping someone else has already solved for this and can point me in the right direction. I can say that we are currently ingesting them into Splunk, and that tool executes a PowerShell script to dump the logs. I am hoping that Dynatrace has something similar in place so we can move away from Splunk.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any help is appreciated.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 13 Jun 2024 06:38:29 GMT</pubDate>
    <dc:creator>BShiver</dc:creator>
    <dc:date>2024-06-13T06:38:29Z</dc:date>
    <item>
      <title>Exchange Admin Audit Logs</title>
      <link>https://community.dynatrace.com/t5/Log-Analytics/Exchange-Admin-Audit-Logs/m-p/248119#M125</link>
      <description>&lt;P&gt;I am looking for recommendations on how to ingest our Exchange server 2016 Admin Audit logs into Dynatrace. I have not seen any documentation around this specifically. These logs are stored in a hidden mailbox instead of a file. I am hoping someone else has already solved for this and can point me in the right direction. I can say that we are currently ingesting them into Splunk, and that tool executes a PowerShell script to dump the logs. I am hoping that Dynatrace has something similar in place so we can move away from Splunk.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any help is appreciated.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Jun 2024 06:38:29 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Log-Analytics/Exchange-Admin-Audit-Logs/m-p/248119#M125</guid>
      <dc:creator>BShiver</dc:creator>
      <dc:date>2024-06-13T06:38:29Z</dc:date>
    </item>
    <item>
      <title>Re: Exchange Admin Audit Logs</title>
      <link>https://community.dynatrace.com/t5/Log-Analytics/Exchange-Admin-Audit-Logs/m-p/285221#M1435</link>
      <description>&lt;P&gt;How are the logs being sent to splunk? You could look at setting up a log pipeline from exchange endpoint to Dynatrace. I am curious though how splunk is achieving, because we can always reverse engineer that.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Sep 2025 12:41:09 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Log-Analytics/Exchange-Admin-Audit-Logs/m-p/285221#M1435</guid>
      <dc:creator>ChadTurner</dc:creator>
      <dc:date>2025-09-02T12:41:09Z</dc:date>
    </item>
  </channel>
</rss>

