Skip to main content

How to monitor employees emails in Office 365

Applicable to Office 365 with Administrator privileges to manage corporate emails.

Here's an example on how to use Office 365 Mail Flow rules:
The business owner (normally your company CEO or President) requested to monitor one or more of your employees mailboxes. Basically, he/she would like to know the incoming and outgoing messages without the employees knowing about it.

Disclaimer: Before you apply this mail flow rule within your organization. You need to have an official permission request from the Authorized Users e.g. Business Owner, President or any Authorized Personnel.

You need to create two new mail flow rules, for sender and recipients.

In Exchange Admin Center, click the Mail Flow, then click on (+) to create a new rule.
Create a New Rule.
Fill up the following entry fields.
Name: for example "Monitor - Sender" to monitor email sender.
Apply this rule if, select "The Sender is ..." this will pop-up your organization email list. Select the name of the mailbox you want to monitor.
Do the following, select "Bcc the message to ..." this will pop-up your organization email list. Select the name of the mailbox to receive blind copy of emails. For example, KING Monitor Mailbox.

See depicted image below.

Choose a mode for this rule, select "Enforce". Click on Save.

And the second part of this instruction.

Create another New Rule.
Fill up the following entry fields.
Name: for example "Monitor - Recipient" to monitor email sender.
Apply this rule if, select "The recipient is ..." this will pop-up your organization email list. Select the name of the mailbox you want to monitor.
Do the following, select "Bcc the message to ..." this will pop-up your organization email list. Select the name of the mailbox to receive blind copy of emails. For example, KING Monitor Mailbox.

See the depicted images below:

To test your mail flow rules, login using your KING Monitor Mailbox to see if the sending/receiving mail flow  rules blind copied Monitor Mailbox.

Hope this help you perform your job.

Sponsored by NeedName.com Domain Name Registration Services for Entrepreneurs and Small-Mid Businesses.

Comments

Popular posts from this blog

Alternative Social Networks

If you are planning to create your  social network  e.g. similar to Facebook. Here's a short list of alternative software's: Open Source and Free​ http://buddypress.org/  - Wordpress (Open Source and Free) http://elgg.org/  - (Open Source and Free) Commercial Social Networks software http://www.socialengine.com/  ($299 Stand Alone, $29/mo Cloud) http://www.jomsocial.com/  (run with Joomla, need to know CMS) http://www.boonex.com/  (very expensive, $399 for Standard) http://www.anahitapolis.com/ http://www.oxwall.org/ http://sharetronix.com/ http://www.moosocial.com/ http://www.jcow.net/ http://phpdolphin.com http://www.grou.ps  (from free to Commercial, I left my networks and they are selling it  http://www.phpfox.com/  (I used this before, it's hard to maintain. I moved to NING but left too after it was sold to another company) http://www.ning.com  (I don't recommend using this service, it's hard to export your data when it's time to move) S

Learning Vulnerability Scanning by KING.NET

Learning Vulnerability Scanning is fun and easy. So I hope you enjoy reading this short how to guide on how to use vulnerability scanning to secure your servers and networks. NMAP is the swiss tool that you need to learn if you're serious in Cyber Security profession. The NMAP tool can be use with NSE scripting (Nmap Scripting Engine) to automate your tasks. For example using NSE Script using a  single vulnerability (cold fusion)  to scan our test lab machine. root@kali:~# nmap -v -p 80  --script http-vuln-cve2010-2861  10.11.1.220 Starting Nmap 6.47 ( http://nmap.org ) at 2016-07-22 17:34 EDT NSE: Loaded 1 scripts for scanning. NSE: Script Pre-scanning. Initiating ARP Ping Scan at 17:34 Scanning 10.11.1.220 [1 port] Completed ARP Ping Scan at 17:34, 0.04s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 17:34 Completed Parallel DNS resolution of 1 host. at 17:35, 13.01s elapsed Initiating SYN Stealth Scan at 17:35 Scanning 10.11.1.220 [1 port] Comp