Solved

How can I audit who has been reading other users e-mails

Posted on 2007-11-26
5
193 Views
Last Modified: 2010-03-06
Dear Folks,
In my organisation, we are running exchange 2003. Recently I noticed that one of the  junior systems administrator has put his user account in the security of other key director accounts (i.e in AD when I checked the directors account properties, under the security tab, his account was there and having all the permissions to the directors mailboxes). We thought of pulling him in and asking what his account is doing inside other directors mailboxes, but one of the directors has suggested that we actually try and audit to find out what he is up to and what exactly he has been doing in these users mailboxes.
The problem is we don't know where to set up this auditing. Please help

0
Comment
Question by:Ogdhelpdesk
5 Comments
 
LVL 13

Accepted Solution

by:
cshepfam earned 250 total points
ID: 20349731
0
 
LVL 35

Assisted Solution

by:rakeshmiglani
rakeshmiglani earned 250 total points
ID: 20349738
0
 
LVL 104

Expert Comment

by:Sembee
ID: 20349929
You can only audit access, not down to message level. If the access is regular then that admin should be updating their CV about now.

Simon.
0
 
LVL 22

Expert Comment

by:ATIG
ID: 20349935
just curously what perms did the user have?

running tools like Exmerge require specific rights like send-as and recieve-as
0
 

Author Comment

by:Ogdhelpdesk
ID: 20355564
Every single box is ticked for the user (complete full control). And why would he need to run this tool as himself on the exchange server? We all log in to the exchange server with the admin account.  Finally, the sys admin is not the person who would normally administer our exchange.
0

Featured Post

Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Every computer eventually fails. When that happens, your valuable data is only as safe as your current backup.
These days, all we hear about hacktivists took down so and so websites and retrieved thousands of user’s data. One of the techniques to get unauthorized access to database is by performing SQL injection. This article is quite lengthy which gives bas…
In this video we show how to create a Contact in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.: First we need to log into the Exchange Admin Center. Navigate to the Recipients >> Contact ta…
To add imagery to an HTML email signature, you have two options available to you. You can either add a logo/image by embedding it directly into the signature or hosting it externally and linking to it. The vast majority of email clients display l…

932 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now