I'm adding a 3rd Internet Mail Service server and want to know if there is a quick,painless, thorough method for copying all of the config data from one of the existing ones. Info like domain names accepted (over 100).
Ex 5.5 SP 4 on Win2k Server SP 4 with Trend Internet Security Suite...
I think you can change where the new mail is delivered, possibly to a password protected PST (Personal STorage) file on the workstations local drive.... but this may be overkill. I use a screen saver with password and a short timeout.
Ooops. Corrected. I was looking at the docs that MS Prof Svcs had created for us, but I verified in Technet the server doesn't have to be named the same... that is just the procedure we have in place.
If July 3 is within your "deleted item retention period", then yes. If it isn't, then how are your backups? If you are doing "brick-level backups" (individual mailbox at a time), then it is easy to restore just a mailbox. If you (like most, I think) are doing database...
I would look in the logs of the Exchange and forwarding (unix/sendmail?) servers. When the messages are NOT delivered, are they returned as undeliverable or just lost?
Frank
You could change the "display name" of your mailbox to be who you want to send the message, then send it back. It will "appear on the surface" to be from that person, but any investigation will reveal where it really came from.
We're having wonderful (luck?) success with a new product called Mail Verdict from a company named Message Gate. It runs on Solaris or Linux between the Internet and your Exchange servers. We're blocking about 150,000 - 250,000 messages a day. Still some getting thru, and we have a few users...
Messages in Exchange are stamped with Universal, or Grenwich Mean Time, also known as Zulu time. The client Time Zone setting then calculates what time it should display. My guess is a time zone or Daylight Savings setting wrong somewhere. Mail from outside (Internet) is stamped by the...
I'm not sure exactly what you want to log, but this Technet article has saved some tails for my users in the past.
======================================================================
-------------------------------------------------------------------------------
The information in this...
I do manual lookups using www.samspade.org and use some of the lists that THEY use for our spam filtering. Not to actually reject mail but for reporting what we got from spammers.
You can use the Exchange Admin to grant access to another mailbox (unless you are already have admin rights already ) and then it can be viewed / accessed with Outlook:
File
Open
Other Users Folder
Inbox or Calendar or whatever folder
or... you can add the mailbox to your (or a) profile in...
It is simple to GIVE everyone "acomp.com" email addresses, but do they want everyone to use that as their only or primary address? Do they also want both SMTP gates to stay up?
Are these servers in the same or different ORGS? What about SITES?
It is easy to give everyone these...
I've experienced this in the past also. What I have done is to advance the date on the router and then run Message Manager and delete messages older than X days from the bulletin board "##Directory Updates" to clean them out.
Frank Hardwick
frank@tribune.com
What should I be concerned about before running NTDSATRB in our production environment?
Is there a significant performance impact? Is this something that should be run after hours or during a maintenance window?
I've run it in our lab several times, but want to be absolutely sure before...
It sounds as if something else may have a file or files open. I've had random problems like this in the past that were solved by moving the CCDATA directory before running maintenance on it so that there was much less possibility of something re-attaching to the files.
Frank Hardwick
I'm working on a team to develop the plan and new Ex2k infrastructure for our Enterprise and I have a couple of feasibility questions.
Our Exchange 5.5 environment stretches coast-to-coast, but is all connected via reliable/high-speed links. It seems that the most robust, tolerant...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.