Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.
'This emails the task contents to the assigned user. version 1.0 Option Explicit Dim WithEvents inspector As inspector Dim WithEvents project As TaskItem Dim self As ProjectWrapper Dim originalProjectSubject As String Public Sub Init(anInspector As inspector) Set self = Me Set inspector = anInspector Set project = inspector.CurrentItem End Sub Private Sub inspector_Close() Set self = Nothing End Sub Private Sub project_Open(Cancel As Boolean) originalProjectSubject = project.UserProperties.Item("ParentDisplayName").Value End Sub Private Sub project_Write(Cancel As Boolean) Dim projectSubject As String projectSubject = project.UserProperties.Item("ParentDisplayName").Value If originalProjectSubject <> projectSubject Then originalProjectSubject = projectSubject Dim mail As MailItem Set mail = Application.CreateItem(olMailItem) mail.Subject = "Task Assigned: " & project.Subject & " for project " & projectSubject mail.Body = project.Owner & " has assigned you: " & project.Subject & " for project " & projectSubject & Chr(10) & "To be completed by " & project.DueDate & Chr(10) & "Comments: " & project.Body & Chr(10) & Chr(10) & "Please refer to/update task within BCM for more information/to log changes." mail.To = "firstname.lastname@example.org" mail.Send End If End Sub
|Exchange 2013+ impersonation - How to?||1||32|
|outlook 2010 - How to transfer sent messages from one PC to another||4||30|
|SSO via Webmail site, Exchange 2010.||1||20|
Join the community of 500,000 technology professionals and ask your questions.
Connect with top rated Experts
10 Experts available now in Live!