Protocols (Regular Profile) : Managing Audit, Shadowing and Alerts for Protocols : Audit and Shadowing Rights : IBM Notes
  
IBM Notes
Audit and shadowing rights applicable to the IBM Notes protocol:
Audit: Connection - Enables the auditing of user attempts to connect the IBM Notes client to IBM Domino server.
The Connection action and the IP address or the name of the host are written to the log. A successful connection to the IBM Domino Server can generate several Connection events.
Audit: Incoming Messages, Incoming Files - Enables the auditing of user attempts to receive an e-mail message with or without attachments from IBM Domino server to the IBM Notes client.
The Incoming Message action, the number of attachments, the e-mail address of the sender and recipients, the message subject are written to the log. The sender address precedes recipient addresses (sender => recipient1, recipient2).
Audit: Outgoing Messages, Outgoing Files - Enables the auditing of user attempts to send an e-mail message with or without attachments from the IBM Notes client to IBM Domino server.
The Outgoing Message action, the number of attachments, the e-mail address of the sender and recipients, the message subject are written to the log. The sender address precedes recipient addresses (sender => recipient1, recipient2).
The number of attachments is always written to the Audit Log.
Shadowing: Incoming Messages, Incoming Files - Enables the shadow copying of received e-mail messages with or without attachments.
Shadow copies of received e-mail messages with or without attachments are written to the log as .eml files. You can, for example, open .eml files in Microsoft Outlook Express, in Windows Mail, and in Mozilla Thunderbird.
Shadowing: Outgoing Messages, Outgoing Files - Enables the shadow copying of sent e-mail messages with or without attachments.
Shadow copies of sent e-mail messages with or without attachments are written to the log as .eml files. These files can be opened, for example, in Microsoft Outlook Express, Windows Mail, or Mozilla Thunderbird.
The number of attachments is always written to the Shadow Log.