It is hard to imagine an office without access to e-mail. Just as hard as finding a large company that does not have irresponsible employees who prefer exchanging e-mail messages with their friends rather than doing their job. If you are a manager, business owner or IT specialist, you have to know that there is a simple, quick and inexpensive way to take control of corporate e-mail system. Mail Access Monitor is a simple tool that analyses mail server logs and shows how much traffic is being used by e-mail, who sends and receives most messages, where the messages are being send to and if e-mail abuse takes place in your office. The program works with all popular e-mail servers (MDaemon, Kerio MailServer, Merak Mail Server, MS Exchange Server, VisNetic MailServer, SendMail, PostFix, CommuniGate Pro and QMail) and builds charts that are easy to comprehend. A simple glance at the chart reveals a lot of information. For example, you may find out that most outgoing e-mail messages are not related to work in any way and cost you hundreds of dollars in extra traffic a year. Or that some employees average 30-50 emails a day. Or, on the other hand, some of your sales staff members who are supposed to be proactive at approaching clients only reply to incoming messages. The best part of Mail Access Monitor is that it starts working right after installation (which takes less then 1 minute) and frees you from having to look over employees shoulders. As soon as employees learn that their e-mail use is being tracked and that the abusers will be punished, their productivity increases drastically. In fact, Mail Access Monitor is so effective that some Fortune 500 companies made it a mandatory policy to have the program installed in every office and branch around the globe! To see how Mail Access Monitor can help your company fight e-mail abuse, download free trial version now!
» version 3.9c - posted on 2011-02-14
3)Log files import process was optimized.
4)Product icons were renewed.
» version 3.2 - posted on 2006-05-10
1) added Hierarchical style for report. Now you can form complicated analytical samplings
2) support of wildcards (* and ?) in creating reports on hosts was added
3) a legend was added in the diagram
4) added French resource file
5) now the report is formed much faster
6) new templates, new column and new reports were added
7) fixed a lot of small bugs
Mail Access Monitor Pro
Copyright (C) 2003-2004, Red Line Software.
All Rights Reserved
The trial version of this software may be used for evaluation purposes at
the user's own risk for a period of 40 days from the date of installation.
At the end of the trial period, the user must either purchase a license to
continue using the software, or remove it from his/her system.
The trial version may be freely distributed, provided the distribution
package is not modified. No person or company may charge a fee for the
distribution of Mail Access Monitor Pro without written permission
from the copyright holder.
On payment of the appropriate license fee, the user is granted a
non-exclusive license to use Mail Access Monitor Pro on one
computer, for any legal purpose, at a time. The
registered software may not be rented or leased, but may be permanently
transferred, if the person receiving it agrees to terms of this license.
If the software is an update, the transfer must include the update and all
Whilst every care has been taken in the construction and testing of this
software, it is supplied subject to the condition that the user undertakes
to evaluate the suitability of the control for his/her purposes.
Red Line Software makes no representation of the software's
suitability for any purpose, and the user agrees that Red Line Software
has no responsibility for any loss or damage occasioned by the use of
TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, THE SOFTWARE AND
DOCUMENTATION ARE PROVIDED "AS IS" AND RED LINE SOFTWARE DISCLAIMS
ALL OTHER WARRANTIES AND CONDITIONS, EITHER EXPRESS OR IMPLIED, INCLUDING,
BUT NOT LIMITED TO, IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR
A PARTICULAR PURPOSE, CONFORMANCE WITH DESCRIPTION, TITLE AND
NON-INFRINGEMENT OF THIRD PARTY RIGHTS.
TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, IN NO EVENT SHALL
RED LINE SOFTWARE BE LIABLE FOR ANY INDIRECT, INCIDENTAL, CONSEQUENTIAL,
SPECIAL OR EXEMPLARY DAMAGES OR LOST PROFITS WHATSOEVER (INCLUDING, WITHOUT
LIMITATION, DAMAGES FOR LOSS OF BUSINESS PROFITS, BUSINESS INTERRUPTION,
LOSS OF BUSINESS INFORMATION, OR ANY OTHER PECUNIARY LOSS) ARISING OUT OF
THE USE OR INABILITY TO USE THE SOFTWARE PRODUCT, EVEN IF RED LINE SOFTWARE
HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. IN ANY CASE, RED LINE
SOFTWARE'S CUMULATIVE AND ENTIRE LIABILITY TO YOU OR ANY OTHER PARTY FOR ANY LOSS OR DAMAGES
RESULTING FROM ANY CLAIMS, DEMANDS OR ACTIONS ARISING OUT OF OR RELATING TO
THIS AGREEMENT SHALL NOT EXCEED THE PURCHASE PRICE PAID FOR THIS LICENSE.
Should any term of these terms and conditions be declared void or
unenforceable by any court of competent jurisdiction, such declaration shall
have no effect on the remaining terms hereof.
If you do not agree to these conditions you should not install this software.