Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

deleting specific emails with attachments

Posted on 2006-06-22
8
Medium Priority
?
209 Views
Last Modified: 2013-12-18
Ive got a problem.

I need an agent that will go out on my mail servers and look for and select emails with two attachments. One is a .zip file and the other a .gif.

The files are 52k in size  ( I've seen 52,037 to 52,081)

I'm not a developer by any means, so the more help you can supply, the better.
It's VERY urgent!!

Fred
0
Comment
Question by:FredBro
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
  • 2
8 Comments
 
LVL 18

Expert Comment

by:marilyng
ID: 16961903
How many mail files are we talking about?  Try scanez from ytria.com
0
 

Author Comment

by:FredBro
ID: 16962391
we're pushing 5 Terabytes @ ~10,000 mail files
0
 

Author Comment

by:FredBro
ID: 16962416
Forgot, That's across 9 servers

Fred
0
VIDEO: THE CONCERTO CLOUD FOR HEALTHCARE

Modern healthcare requires a modern cloud. View this brief video to understand how the Concerto Cloud for Healthcare can help your organization.

 
LVL 20

Expert Comment

by:brwwiggins
ID: 16962540
Is this from a message that got sent out on accident or you trying to remove a virus? I remember an article from The View magazine talking about recalling a message but it required that you be able to get the document ID from the original sent item
0
 
LVL 20

Accepted Solution

by:
brwwiggins earned 1000 total points
ID: 16962548
and I think PowerTools from helpsoft has something similar
0
 
LVL 18

Assisted Solution

by:marilyng
marilyng earned 1000 total points
ID: 16964508
Else virus checker will do this - depending on the one that you have for Notes.  i.e.  Nod32 I think will go in and remove specific attachments, e-Trust might also, basically any of those that are managed from a server you can specify to find and delete specific files having specific parameters.

An agent can step through, and do this, but for that many mail files it would be inefficient.  Unless you have no other solution.

If you want to use an agent, have to use an agent, hmm.. I would roll out one that runs on the database open on the client, this way you're not impacting your server(s), then you can always  remove the agent in the mail templates.

How i did this was to put the code in a script library that ran when the database opened.  I also set a profile field to "done" so the agent wouldn't run twice, and this way, I didn't need to be concerned about rolling out another change in the mail template.  

Also, you need to test before you roll out.  

Still think virus software is your best bet.
0

Featured Post

Free Tool: Port Scanner

Check which ports are open to the outside world. Helps make sure that your firewall rules are working as intended.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I thought it will be a good idea to make a post as it will help in case someone else faces these issues. I trust this gives an idea how each entry in Notes.ini can mean a lot for the Domino Server to be functioning properly. This article discusses t…
Article by: Rob
Notes 8.5 Archiving Steps and Tips This article covers setting up a Notes archive, and helps understand some of the menu choices making setting up and maintaining a Notes archive file easier.
In this brief tutorial Pawel from AdRem Software explains how you can quickly find out which services are running on your network, or what are the IP addresses of servers responsible for each service. Software used is freeware NetCrunch Tools (https…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

670 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question