Hello Reader,In this entry I�d like to discuss log analysis on Outlook Web Access servers. I�ve successfully used OWA log analysis in the past to quickly determine who has been reading mailboxes other than their own. Two pieces of information in the logs that exist by default in the OWA creation process allow this to occur. The first is that OWA uses NTLM authentication for web mail users who log
0 komentar:
Posting Komentar