O'Reilly logo

Microsoft® Exchange Server 2010 Inside Out by Tony Redmond

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Auditing mailbox access

Users gain access to mailboxes in different ways:

  • Users log on and use their mailboxes as normal.

  • An administrator can delegate full access to a mailbox to another user. See Chapter 6 for more information on this topic.

  • Administrators can grant themselves access to a user’s mailbox and then log on to it.

Normally administrators do not concern themselves about what happens inside user mailboxes. However, there are mailboxes that contain sensitive information that might need to be protected against attempts to conceal or remove items that are required by the company, typically to justify actions that the company or its employees took in a particular situation such as discussions with other companies relating to a merger, sale, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required