We have an Exchange server 5.5 with more than 600 users. In future we want to have a new SMTP address. At the same time we want to retain the existing e-mail address as a secondary address. Is there a mechanism or toll that would help to implement this procedure? Manually editing each mail is a...
I have an exchange server 5.5 at one of our sites. I want to create a w2k domain and install exchange 5.5. During installation I want to join the existing site of windows NT domain. My question is: is it possible to join an exchange site in a different domain?
Thanks
Thank you for immediate response. We have servers at 3 sites. Therefore I can't use the built in function of moving mailboxes. Are there any other tools apart from exmerge?
Thanks
I have an exchange 5.5 environment with 3 sites. I want to move several mailboxes from one site to another. Are there microsoft or third party tools that would enable such action?
Thanks
I have the following access list that I have applied to the outside interface of pix 501.
access-list acl_in deny ip host 255.255.255.255 any
access-list acl_in deny ip host 10.0.0.0 any
access-list acl_in deny icmp any any
access-list acl_in permit tcp any host xxx.xxx.xxxx.xxx eq www...
Yes I was looking for such issues. My question was too general. I have inqured about possible security holes that are relevant to Exchange. I have checked important points whcih I have assumed were important. But I just wanted to know if there are areas that I am not aware of or missed.
Thanks
I hope someone would help me. I have been given a new assignment to administer an exchange server 5.5. I would like to assess the implemented security measures. What are major areas of interest from secuirity pespective?
Thanks
Thank you for your response. Internet connection is provided by the router of the ISP that is installed at our site. The problem is it does not do any filtering. We do not have control over it. According to the current plan the PIX would be connected to the ISP on one side and the firewall on...
Is it possible to use a PIX as a perimeter router. We had a cisco router which had functioned as a perimeter router. Our new chief has insisted that we MUSt use PIX instead of a router. From design point of view is that logical and possible? Can anyone explain to me the pros and cons of such a...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.