I searched around for this answer but could not find any documentation so decided to join this forum and ask... I see that James does a lot of logging to various log files, but as an administrator I cannot find any info on how to really use the information stored within them. Is there such an administrator guide somewhere that explains the model of how the log files relate to the model of how James is organized?

To clarify my needs, for example, how can I determine if one of my users has had his/her email account compromised by a spammer who is now using that account to send out spam? How do I trace the reception of an email by the server and its disposition of that email, in particular how do I trace whether James is relaying or forwarding email that it shouldn't be doing?

Users sometimes complain to me that they did not receive a particular email. How does one go about verifying whether James did indeed receive such an email and whether the user retrieved it or not... I know I can look in the mail repositories and search them but if the user is not leaving their email on the server that approach will not work.

I have been puzzling over the log files but without any good documentation it is very hard to understand exactly what it all means and what is happening within the server... Thanks for any help or pointers in advance...

   Marc....





---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to