Solved

which calendar did a user access for forward a meeting on

Posted on 2016-08-25
2
123 Views
Last Modified: 2016-09-22
a user has accessed one of potentially 5 peoples calendars (it was a team meeting with several attendee's), and forwarded a meeting request on to a 3rd party. I can see from the tracking logs that they did it (as it shows that email sent to the 3rd party, from this  person in question), but I need to identify which persons calendar they accessed to forward the meeting on to this 3rd party (for the record they do have access to all of these users calendar). Is this possible through any of the exchange logs or outlook logs?
0
Comment
Question by:pma111
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 3

Author Comment

by:pma111
ID: 41770072
custom-data field looks quite promising in the exchange tracking logs. it contains a purportedsender type record.
0
 
LVL 37

Accepted Solution

by:
Jian An Lim earned 500 total points
ID: 41771135
depends on what kind of logging you have
mailbox auditing should log any



mailbox auditing also will have logs shows a non-owner access to the mailbox
0

Featured Post

Salesforce Has Never Been Easier

Improve and reinforce salesforce training & adoption using WalkMe's digital adoption platform. Start saving on costly employee training by creating fast intuitive Walk-Thrus for Salesforce. Claim your Free Account Now

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

A list of top three free exchange EDB viewers that helps the user to extract a mailbox from an unmounted .edb file and get a clear preview of all emails & other items with just a single click on mailboxes.
This article demonstrates probably the easiest way to configure domain-wide tier isolation within Active Directory. If you do not know tier isolation read https://technet.microsoft.com/en-us/windows-server-docs/security/securing-privileged-access/s…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

733 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question