Solved

how to understand W3SVC1 logs to identify one user was blocked for oma access

Posted on 2013-01-07
4
450 Views
Last Modified: 2013-03-07
one user was smart enough to figure out how to access company exchange server through her own mobile phone without MDM software. To be able to comply with MDM security, i need to block her access to the company email by herself and force her to use MSM software. I have disabled her account mobile service through ADUC. . but i am not sure if that works. how do i know if she still gets company emails or not?

many thanks
0
Comment
Question by:Elaine_Shi
  • 2
4 Comments
 
LVL 13

Expert Comment

by:imkottees
ID: 38753343
0
 
LVL 3

Expert Comment

by:jodiddy
ID: 38753373
You should be able to parse the logs for her username.  But it's been a while since I had to troubleshoot something like with 2003, the logging is much better with 2007 and 2010. See screen shot of Exchange 2010 logging options..

Exchange 2010 Manage Logging
0
 

Author Comment

by:Elaine_Shi
ID: 38753511
I can see GET, post, non subscribe etc. keywords by filtering using her name. I don't know which command represents her failure of retrieving emails.
0
 
LVL 3

Accepted Solution

by:
jodiddy earned 200 total points
ID: 38753521
Good good, that is promising. You should see an error or failure result in there in the line I would imagine. But if you are seeing get and post commands that seems like she still has access.

Another test is to follow these steps:

Assuming that EXCHANGE1 is running Exchange 2003:

From a desktop PC running IE, navigate to http://exchange1/oma
Enter the logon credentials for an existing mailbox which resides on exchange1.
Click the OK hyperlink when you receive the warning about your device being unsupported.
Welcome to OMA!

You should not be able to gain access to this site using the credentials of the person whom you blocked.

Another method is use an Emulator and test putting her settings into a virtual phone and test connecting with her credentials.
0

Featured Post

Best Practices: Disaster Recovery Testing

Besides backup, any IT division should have a disaster recovery plan. You will find a few tips below relating to the development of such a plan and to what issues one should pay special attention in the course of backup planning.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Restoring deleted objects in Active Directory has been a standard feature in Active Directory for many years, yet some admins may not know what is available.
A safe way to clean winsxs folder from your windows server 2008 R2 editions
In this Micro Video tutorial you will learn the basics about Database Availability Groups and How to configure one using a live Exchange Server Environment. The video tutorial explains the basics of the Exchange server Database Availability grou…
To add imagery to an HTML email signature, you have two options available to you. You can either add a logo/image by embedding it directly into the signature or hosting it externally and linking to it. The vast majority of email clients display l…

867 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now