Exchange Client Setup for Sensitive E-mails

Exchange Client Setup for Sensitive E-mails

Can you explain if the Exchange client can be set up as follows: User A has shared the Inbox for Secretary A. User A receives a message from another user that is to be seen only by User A. By default Secretary A can read this too. What is the best way to keep Secretary A from reading User A’s mail? Can Advance Security be set up for a “Prompt on open password”?

Unfortunately, if you have the Inbox really shared, then all people with permissions to that Inbox can see the e-mail that arrives.

If you simply have the secretary set up as a delegate of that mailbox, however, then you have some options. So if the secretary is running the Outlook client, any messages sent to User A with the “Private” sensitivity set will not be seen by the secretary. You mention the “Exchange client,” however, and if you’re really using the Exchange client software (not Outlook) then the sensitivity settings aren’t going to help you.

If the secretary doesn’t need to read the e-mail, then you should revise your security settings. Our secretaries here have access to the Calendars and, sometimes, Contacts folders of their bosses, but never the Inbox.

To prevent the secretary from seeing sensitive e-mail in the Inbox, consider either revising your security settings for the mailbox or moving her to the Outlook client (if she isn’t already there) and instructing other users to send you private e-mail marked as private.

Share the Post:
data observability

Data Observability Explained

Data is the lifeblood of any successful business, as it is the driving force behind critical decision-making, insight generation, and strategic development. However, due to its intricate nature, ensuring the

Heading photo, Metadata.

What is Metadata?

What is metadata? Well, It’s an odd concept to wrap your head around. Metadata is essentially the secondary layer of data that tracks details about the “regular” data. The regular

XDR solutions

The Benefits of Using XDR Solutions

Cybercriminals constantly adapt their strategies, developing newer, more powerful, and intelligent ways to attack your network. Since security professionals must innovate as well, more conventional endpoint detection solutions have evolved