I searched around for this answer but could not find any documentation
so decided to join this forum and ask... I see that James does a lot of
logging to various log files, but as an administrator I cannot find any
info on how to really use the information stored within them. Is there
such an administrator guide somewhere that explains the model of how the
log files relate to the model of how James is organized?
To clarify my needs, for example, how can I determine if one of my users
has had his/her email account compromised by a spammer who is now using
that account to send out spam? How do I trace the reception of an email
by the server and its disposition of that email, in particular how do I
trace whether James is relaying or forwarding email that it shouldn't be
doing?
Users sometimes complain to me that they did not receive a particular
email. How does one go about verifying whether James did indeed receive
such an email and whether the user retrieved it or not... I know I can
look in the mail repositories and search them but if the user is not
leaving their email on the server that approach will not work.
I have been puzzling over the log files but without any good
documentation it is very hard to understand exactly what it all means
and what is happening within the server... Thanks for any help or
pointers in advance...
Marc....
---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]