How do I access my journal from Outlook?

View the sent items log from Outlook

The Secure Exchanges logs in Microsoft Outlook allow you to view activity related to sent emails: sending, opening, downloading, signing, and other actions associated with your secure messages. This feature is accessible directly from the Secure Exchanges ribbon in Microsoft Outlook.

1. Access the newspapers

  1. Open Microsoft Outlook.
  2. Next, open the Secure Exchanges ribbon and select "Open History"


2. Search for messages in the logs

From the journals window, you have two search methods available.
Option 1: Search by date
This option allows you to display all items sent via Secure Exchanges during a given period.
  1. Select a start date.
  2. Select an end date.
  3. Click on "Get my journals"
The list of messages sent during this period is displayed.
Option 2: Search by file

This option allows you to verify to whom a specific file has been sent via Secure Exchanges.

  1. Click on the "Search by file" button.
  2. Select the file you want to retrieve.
  3. Click on "Get the logs".
This method is particularly useful when you want to trace the sending of a specific document without knowing the exact date of sending.

3. Information available in Outlook logs

The logs displayed in Outlook allow you to view, among other things:

  • the date and time of sending;
  • the recipient;
  • the message status (open, unopened, expired, deleted);
  • the number of openings;
  • the activities performed (opening, downloading, signing);
  • the files associated with the submission.
Explanation of the columns
First, please note that when you select one of the rows displayed on this page, additional sections become available, including "Activities" and "Files." The columns in the main table are explained in the order they appear on the screen. If you would like a description of the other sections, additional explanatory tables are provided below.



Main table

Column
Description
To recover If you have a SESAR license, this column allows you to retrieve a message sent via Secure Exchanges. To do so, simply check the box corresponding to the message you wish to retrieve, and then click the "Retrieve" button.
Opening status Indicates whether the message is Open, Unread, Expired, Deleted, etc.
Date of creation Date the secure message was sent.
Number of openings Number of times the message has been opened.
RECIPIENT Recipient's email address.
Sender's email address Your email address associated with the submission.
Subject Subject of the message sent.
Message type Type of sending (message, reply).
Last updated Date and time of the last action performed by the recipient (opening the message, replying, etc.)
The signing process is complete. This box will be checked if your submission contained files to be signed and the signing process is completed by all signatories.
Contains files that need to be signed This box will be checked if your submission contained files to be signed.
Number of files This column indicates the number of files included in the message.
Number of activities This column indicates the number of activities on the message.
Delete a message You can also revoke access to a message on this page. To do so, double-click on the line corresponding to the message you wish to revoke.


Table "Activities"

To view the details of activities associated with a specific message, you must select a row in the main section. Once the row is selected, you will see all actions performed on that message appear in the lower section of the interface. These columns allow you to track the different actions performed on the messages:

Column
Description
Remote IP This column shows you the IP address of the machine that interacted with the message. This can be useful for identifying the origin of message accesses.
Status The action status is displayed here. This could be an attempt to open the message, file retrieval, a test, or message deletion.
Date The date on which each activity took place is indicated in this column, allowing you to follow the sequence of events chronologically.
Reference This column indicates the exact reference of the action that was performed, such as opening a secure message, retrieving files, the signing process, displaying the message in the inbox, or even searching for information on the sender's IP address.

Table "Files"

Finally, in the third section, you will find a table linked to the files attached to each message. Just as with the activities, you must select a row containing files to see their details:

Column
Description
File name This column displays the names of the attached files. This allows you to easily identify each file exchanged.
Opening status Here you will see whether the file has been opened by the recipient or not.
Number of openings This column gives you the exact number of times the file has been opened by the recipient.
Date of creation This column indicates the date and time the file was created and sent via Secure Exchanges.
Last updated This column indicates the last update associated with file activity. This could be an action such as opening the message, retrieving the attachment, or another interaction with the message.
File size This column indicates the size of the exchanged file.  
This is a file to be signed When the box in this column is checked, it informs you that the file is a file to be signed.
Hashing This column shows you the unique numerical value of the file. A file hash is like a unique fingerprint that ensures the file's integrity and security. It allows you to verify that the file has not been modified during its transfer.
Notes  The content of the message or attachments is never accessible , in accordance with Secure Exchanges security principles.



    • Related Articles

    • Is it possible to keep my sent items unencrypted?

      By default, Secure Exchanges encrypts sent items to maximize the security of your communications. Important We do not recommend storing your sent items unencrypted, as this reduces the level of protection for your data. However, this option remains ...
    • The Secure Exchanges ribbon in Outlook: shortcuts and available options

      The Secure Exchanges ribbon in Outlook groups together various options and shortcuts related to email security and your license: You can use the drop-down list below to learn more about each category (Status, Envelope, Chat, etc.) "Status" section ...
    • Configure Secure Exchanges in Outlook

      Secure Exchanges offers several configurable settings directly within Outlook to tailor the security level, sending behavior, and signature management to your needs. This article explains each settings tab , specifying its purpose and how to use it. ...
    • Sign a document in Microsoft Outlook using Secure Exchanges

      This article explains how to send a PDF document for signature with Secure Exchanges directly from Microsoft Outlook, from creating the email to defining the signature areas. Prerequisites Before you begin, make sure you have: The Secure Exchanges ...
    • Can I enable Secure Exchanges only for attachments in Outlook?

      Yes, it's possible. Secure Exchanges allows you to automatically secure your emails only when they contain attachments, without intervening on emails without documents. Here's how to configure it: 1. In Outlook, open the Secure Exchanges ribbon. 2. ...