Solved

how to understand W3SVC1 logs to identify one user was blocked for oma access

Posted on 2013-01-07
4
455 Views
Last Modified: 2013-03-07
one user was smart enough to figure out how to access company exchange server through her own mobile phone without MDM software. To be able to comply with MDM security, i need to block her access to the company email by herself and force her to use MSM software. I have disabled her account mobile service through ADUC. . but i am not sure if that works. how do i know if she still gets company emails or not?

many thanks
0
Comment
Question by:Elaine_Shi
  • 2
4 Comments
 
LVL 13

Expert Comment

by:imkottees
ID: 38753343
0
 
LVL 3

Expert Comment

by:jodiddy
ID: 38753373
You should be able to parse the logs for her username.  But it's been a while since I had to troubleshoot something like with 2003, the logging is much better with 2007 and 2010. See screen shot of Exchange 2010 logging options..

Exchange 2010 Manage Logging
0
 

Author Comment

by:Elaine_Shi
ID: 38753511
I can see GET, post, non subscribe etc. keywords by filtering using her name. I don't know which command represents her failure of retrieving emails.
0
 
LVL 3

Accepted Solution

by:
jodiddy earned 200 total points
ID: 38753521
Good good, that is promising. You should see an error or failure result in there in the line I would imagine. But if you are seeing get and post commands that seems like she still has access.

Another test is to follow these steps:

Assuming that EXCHANGE1 is running Exchange 2003:

From a desktop PC running IE, navigate to http://exchange1/oma
Enter the logon credentials for an existing mailbox which resides on exchange1.
Click the OK hyperlink when you receive the warning about your device being unsupported.
Welcome to OMA!

You should not be able to gain access to this site using the credentials of the person whom you blocked.

Another method is use an Emulator and test putting her settings into a virtual phone and test connecting with her credentials.
0

Featured Post

NAS Cloud Backup Strategies

This article explains backup scenarios when using network storage. We review the so-called “3-2-1 strategy” and summarize the methods you can use to send NAS data to the cloud

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Scam emails are a huge burden for many businesses. Spotting one is not always easy. Follow our tips to identify if an email you receive is a scam.
A phishing scam that claims a recipient’s credit card details have been “suspended” is the latest trend in spoof emails.
The video tutorial explains the basics of the Exchange server Database Availability groups. The components of this video include: 1. Automatic Failover 2. Failover Clustering 3. Active Manager
This video discusses moving either the default database or any database to a new volume.

790 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question