Some companies choose to restrict the way permissions can be granted on users accounts or mailboxes.
Impersonation is the process of impersonating a user (such as an administrator) in an application that is not necessarily running as that user. It is particularly useful to use impersonation if your company policy states that only low-privilege accounts should run Promodag Reports.
Data source name | Description | Configuration |
---|---|---|
Messages tracking files | Message tracking file access can be impersonated in the Security tab of the Server Properties dialog box. | Required permissions
|
Directory | Directory access requires an administrative account. It may be impersonated in the Directory Connection tab of Tools > Options. | Required permissions
|
Internet Information Services Files | IIS log access can be impersonated in the Security tab of the Server Properties dialog box. | Required permissions
|
Mailbox and Public Folders size | A specific account can be set in the PowerShell Connection tab of Tools > Options. | Required permissions
|
Mailbox and Public Folder content | A specific account can be set in the EWS Connection tab of Tools > Options. | Required permissions
|
Exchange database size | Database access can be impersonated in the Security tab of the Server Properties dialog box. | Required permissions
|