Reports

Distribution List Traffic Reports

Apart from its ability to report comprehensively on Distribution Lists in an Exchange organization, Exchange Reporter Plus also offers Distribution List Traffic reports. The reports are as follows:

  • Distribution List By Message
  • Distribution List By Size
  • Users of Distribution List By Message
  • Users of Distribution List By Size

These four distribution list traffic reports offer you data that will help you perform the following:

  • Planning expansion servers for distribution lists.
  • Load balancing for expansion servers or servers on which distribution lists reside.

Distribution List Traffic Summary & Server Load Balancing:

Distribution List by Message and Distribution List by Size are two reports that help you identify the most popular email distribution lists in your environment. While the first report returns distribution lists and the number of messages they have received in a given period, the later speaks of the size of the e-mails received.

Identifying busy distribution lists helps administrators perform expansion server load balancing easily, as they would be in a much better position to judge which free server a busy distribution list should be moved to.

Granularity:

One can filter out traffic summary for any specified time and even drill it down to hourly traffic rate. The reports also provide you the flexibility of extracting distribution list traffic summary for specified intervals, which is an important aspect that makes post-mortem of any unusual spikes in traffic easy.

Distribution List Traffic Summary & Virus Detection

Some viruses, especially spam malware or Trojans, get hold of a user´s GAL (Global Address List) and shoot out a barrage of emails to every email address contained in it. Therefore, it is a good practice to monitor the number of mails a user sends to a distribution list, to look for unusual piques, and to prevent email onslaughts well ahead of time.

And again, with the available filters, it becomes easy to identify potential threats and take evasive actions.