Retrieving messages from the Mail Journaling database
Administrators can examine the contents of the Mail Journaling database by logging in as the user for whom Domino® encrypts journaled messages.
A user who is listed in the database ACL, but who is not the specified journal user (and thus does not own the correct private decryption key), may be able to access the Mail Journaling database but will receive the following error when attempting to open messages in the database:
You cannot access portions of this document because it is encrypted and was not intended for you.
By default, the Mail Journaling database does not appear in the Open Application dialog box. You can open the database by specifying its file name -- for example MAILJRN.NSF -- in the Filename field in the Open Application dialog box. To list the database in the Open Application dialog box, check Show in 'Open Application' dialog on the Design tab of the Database properties dialog box.
To facilitate searches and provide quick information about journaled messages, the Mail Journaling database provides a full-text index and several views. You can create views or customize existing ones to better determine the characteristics of your mail traffic.
View name |
Description |
---|---|
By Hierarchy |
Displays messages by the Internet domain hierarchy (for messages received over SMTP) or Notes® organizational certifier hierarchy (for messages received over Notes® routing) of the sender. The Count column displays separate message totals for all messages, for messages received from each node in the hierarchy, and for messages received from each sender. Expand entries for each node to view messages in descending order by date and time (most recent message first). In addition to the date, individual message entries display the size in bytes and the message subject, if that field is specified in the Field Encryption Exclusion list. |
By Sender |
Displays messages by the name of the sender. Senders may be listed more than once: by their Internet address for messages received by the server over SMTP routing and by their Notes® address for messages received over Notes® routing. The Count column displays the total number of messages routed and the number of messages from each sender. Expand sender entries to view messages in descending order by date and time (most recent message first). In addition to the date, individual message entries display the size in bytes and the message subject, if that field is specified in the Field Encryption Exclusion list. |
By Size |
Displays messages in descending order by size in bytes. Click the column head to reverse the order. Individual message entries display the message date, sender (From), and subject, if that field is specified in the Field Encryption Exclusion list. |
By Date |
(Default) Displays messages in ascending order by date, with the most recent date last. The Count column displays the number of messages routed on each date. Expand date entries to view messages sorted in descending order by time, with the most recent message listed first. Individual message entries display the message time, sender (From), and subject, if that field is specified in the Field Encryption Exclusion list. |
By Form |
Displays messages in ascending alphabetical order by the name of the Notes® message form used; for example, Delivery report, Memo, Reply, Trace Report, and so forth. Uncategorized forms are listed last. The Count column displays the number of messages routed for each form type. Expand form entries to view messages sorted in ascending order by date and time. Individual message entries display the message date, sender (From), and subject, if that field is specified in the Field Encryption Exclusion list. |
By Attachments |
Displays messages in ascending order by attachment size in bytes. Column totals provide the average size in bytes of journaled attachments and the total size of all journaled attachments. Individual message entries display the attachment name, sender (From), date, and subject, if that field is specified in the Field Encryption Exclusion list. |