Solved

User reporting emails being read by someone/thing else...

Posted on 2014-03-07
5
233 Views
Last Modified: 2014-03-17
2x of my users have recently reported that email have been marked as read (not by them).

They have recently had an ipad thats using active sync and i'm guess this could have read them, but one of the users has said the ipad wasn't being used...

can i see what and when the emails were read?

what else could have cause this to happen?

thanks
0
Comment
Question by:CHI-LTD
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
5 Comments
 
LVL 9

Accepted Solution

by:
Ahmed786 earned 334 total points
ID: 39912640
If user is using outlook then you can check on exchange server his/her last login, there you can find that when someone has used his/her account, maybe someone has access to users mailbox and he is trying to see the mails.

Thats the only way to find out but you need to ask user when you ahd last logged in and logout of outlook to keep a track of that.
0
 
LVL 2

Assisted Solution

by:ssmith81
ssmith81 earned 166 total points
ID: 39916900
Good suggested above.
In Exchange management console, we can check users last login/logoff time report to find out their last access in exchange server.
0
 
LVL 1

Author Comment

by:CHI-LTD
ID: 39925944
any advise as to exactly what event logs will show this?
0
 
LVL 9

Assisted Solution

by:Ahmed786
Ahmed786 earned 334 total points
ID: 39926078
You can check that in exchange console
0
 
LVL 1

Author Closing Comment

by:CHI-LTD
ID: 39933794
seems to be the only way..
0

Featured Post

Efficient way to get backups off site to Azure

This user guide provides instructions on how to deploy and configure both a StoneFly Scale Out NAS Enterprise Cloud Drive virtual machine and Veeam Cloud Connect in the Microsoft Azure Cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article aims to explain the working of CircularLogArchiver. This tool was designed to solve the buildup of log file in cases where systems do not support circular logging or where circular logging is not enabled
Phishing attempts can come in all forms, shapes and sizes. No matter how familiar you think you are with them, always remember to take extra precaution when opening an email with attachments or links.
To add imagery to an HTML email signature, you have two options available to you. You can either add a logo/image by embedding it directly into the signature or hosting it externally and linking to it. The vast majority of email clients display l…
Exchange organizations may use the Journaling Agent of the Transport Service to archive messages going through Exchange. However, if the Transport Service is integrated with some email content management application (such as an antispam), the admini…

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question