marjun_mjr
asked on
Track machine who access mail
...experts we are currently investigating a serious case in our organisation and would like to ask for an advise and possible assistance.
SCENARIOo;
...a colleague who left the organization for employment offer in another company losses the opportunity to be employed, since somebody emailed the company [who offered him employment] using his lotus mail refusing the offer of employment. The problem is that, the person might have his lotus id and password, since we din't find any other user in the activity log but the owner of the mailbox.
POSSIBLE SOLUTION;
...can you assist me on a script that will alert administrator [maybe by sending email] and capture the machine [computer name] used to access victims mailbox, with date & time? Of course this should be on the background and msg might not be save in sent folder.
...if you have any other solution, please let me know...this is really urgent.
...by the way, there are 5 client machine listed in the person document > Client Information > Notes client machines and we cannot pin point who's machine is being used to view/access victims mailbox.
...regards
SCENARIOo;
...a colleague who left the organization for employment offer in another company losses the opportunity to be employed, since somebody emailed the company [who offered him employment] using his lotus mail refusing the offer of employment. The problem is that, the person might have his lotus id and password, since we din't find any other user in the activity log but the owner of the mailbox.
POSSIBLE SOLUTION;
...can you assist me on a script that will alert administrator [maybe by sending email] and capture the machine [computer name] used to access victims mailbox, with date & time? Of course this should be on the background and msg might not be save in sent folder.
...if you have any other solution, please let me know...this is really urgent.
...by the way, there are 5 client machine listed in the person document > Client Information > Notes client machines and we cannot pin point who's machine is being used to view/access victims mailbox.
...regards
ASKER CERTIFIED SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
I hope this helps !