Auditing mailbox access
Users gain access to mailboxes in different ways:
Users log on and use their mailboxes as normal.
An administrator can delegate full access to a mailbox to another user. See Chapter 6 for more information on this topic.
Administrators can grant themselves access to a user’s mailbox and then log on to it.
Normally administrators do not concern themselves about what happens inside user mailboxes. However, there are mailboxes that contain sensitive information that might need to be protected against attempts to conceal or remove items that are required by the company, typically to justify actions that the company or its employees took in a particular situation such as discussions with other companies relating to a merger, sale, ...