Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

which calendar did a user access for forward a meeting on

Posted on 2016-08-25
2
Medium Priority
?
169 Views
Last Modified: 2016-09-22
a user has accessed one of potentially 5 peoples calendars (it was a team meeting with several attendee's), and forwarded a meeting request on to a 3rd party. I can see from the tracking logs that they did it (as it shows that email sent to the 3rd party, from this  person in question), but I need to identify which persons calendar they accessed to forward the meeting on to this 3rd party (for the record they do have access to all of these users calendar). Is this possible through any of the exchange logs or outlook logs?
0
Comment
Question by:pma111
2 Comments
 
LVL 3

Author Comment

by:pma111
ID: 41770072
custom-data field looks quite promising in the exchange tracking logs. it contains a purportedsender type record.
0
 
LVL 37

Accepted Solution

by:
Jian An Lim earned 2000 total points
ID: 41771135
depends on what kind of logging you have
mailbox auditing should log any



mailbox auditing also will have logs shows a non-owner access to the mailbox
0

Featured Post

Get free NFR key for Veeam Availability Suite 9.5

Veeam is happy to provide a free NFR license (1 year, 2 sockets) to all certified IT Pros. The license allows for the non-production use of Veeam Availability Suite v9.5 in your home lab, without any feature limitations. It works for both VMware and Hyper-V environments

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

There are literally thousands of Exchange recovery applications out there. So how do you end up picking one that’s ideal for your business & purpose? By carefully scouting the product’s features, the benefits it offers you, & reading ample reviews f…
Spectre and Meltdown, how it affects me and my clients?
This video shows how to quickly and easily deploy an email signature for all users in Office 365 and prevent it from being added to replies and forwards. (the resulting signature is applied on the server level in Exchange Online) The email signat…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Suggested Courses

578 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question