Many people in the Notes sector asked this question, I hope this rough translation will bring you an enlightenment. Thank you!
Translation:
Notes is a completely different example. One of the ways to have such an internet-based virus and an attack is one of the ways that the communication is anonymous. They don't have to worry about retribution or punishment. However, you don't have to worry about attacking Notes Server like an attack firewall or file transfer protocol server. You can't even touch a Notes Server unless someone has an ID for you. And once an identity ID exists, there is an electronic trail that can be followed, I don't care what domain you are eliminated. Someone made an anonymous mail bomb? So, I will pass all the server tracking traces, where to find the starting message from the Routeservers field from. Then I will check Routetimes / PostedDate and compare the Notes log to see it through that server. Then I will check the log of the relevant person and find them. Worrying in your N & A attack? Do not give any human rights more than "readers", and tightly control the verifier. It is not letting anyone get a copy / copy on the server. Also, place a mail-paste macro - a @Documentdelete located in N & A. (This will prevent the mail and setting the user's mail database location in any database documentation is the main or second N & A to threaten N & A.) Finally, for all files to mark the local workspace in accordance with N & A read and Check the database unread document in a basic cycle. Whether there is a new thing or change there (even if it doesn't appear in the view), you will find an extra table name and find it. (Because worried about changing the document or form, inherit N & A from "AppRoved" template and design a code set inspection document has a mysterious or "non-approved" form name). Oh, and don't forget to install statistics and events Reporting the database! My point is just this: Since the method Notes is designed, the connection is always "granted", not default. In this way, in any case, always somewhere and there are record activities and refusal to connect. If you have a sensitive security guard, you tune the log to the biggest, and train your user Note Buttons forcing them before using (highlight buttons and select Edit -> button). So you really don't worry about it. If you have actually encountered an unknown, you will be able to use the information to track the annoying document. Not letting panic, scare you away from notes! "
original:
"... Notes is an entirely different paradigm. One of the reasons viruses and attacks on internet-based systems happen so frequently, is that the initiators are anonymous. They do not have to worry about retribution or punishment. However, you don 't attack a Notes server anonymously like a Firewall or FTP server. you can not even begin to touch a Notes server unless someone has created an ID for you. And as soon as an ID exists, there's an electronic trail to follow, I do not care what fields you delete. Someone creates an anonymous mail-bomb? Fine. I'll just trace through all the servers listed in the RouteServers field to find where the initial mail came from. Then I'll check the RouteTimes / PostedDate and compare that to the Notes Log to see when it was routed through that server. Then I'll check to see who was logged in and bust them. Worried about attacks on your N & A? Do not give anyone greater than reader access, And Control The Certifier Tightly. Don't Let Just Anyone Create Replicas / Co pies on the server. Also, place a mail-paste macro that does an @DocumentDelete in the N & A. (This will keep anyone from routing anything nasty to the N & A by using Mail-In database documents or by setting the mail database destination of a user in the main or secondary N & A book to be the N & A itself.) Finally, mark all documents in the N & A as read and check the database for unread documents on a periodic basis from the local workspace. If anything new or changed is there (even IF it doesn't show up in a view) you '