Protocols (Regular Profile) : Managing Audit, Shadowing and Alerts for Protocols : Audit and Shadowing Rights : Web Mail
  
Web Mail
Audit and shadowing rights applicable to the Web Mail protocol:
Audit: Connection - Enables the auditing of user attempts to access Webmail.
The Connection action, the IP address with the port number and the name of the host, the name of the protocol are written to the log. If IP address to host name resolution fails, the host name is not written to the log.
Audit: Outgoing Messages, Outgoing Files - Enables the auditing of user attempts to send an e-mail message with or without attachments.
The Outgoing Message action, the name of the e-mail provider (such as Yahoo, Gmail, Hotmail (Outlook.com), etc.), the number of attachments, the e-mail address of the sender and recipients, the message subject are written to the log. The sender address precedes recipient addresses (sender => recipient1, recipient2).
The number of attachments is always written to the Audit Log.
Shadowing: Outgoing Messages, Outgoing Files - Enables the shadow copying of sent e-mail messages with or without attachments.
Shadow copies of sent e-mail messages with or without attachments are written to the log as .eml files. These files can be opened, for example, in Microsoft Outlook Express, Windows Mail, or Mozilla Thunderbird.
The number of attachments is always written to the Shadow Log.
 
Note: Web-mail services automatically save drafts of messages. DeviceLock handles saving a draft as sending a message.