Exchange 2007

View membership of a Dynamic Distribution Group

Dynamic Distribution Group is the Exchange Server 2010/2007 term for Query-Based Distribution Groups supported by Active Directory (and therefore Exchange Server 2003/2000) in Windows Server 2003. Unlike normal security and distribution groups, which have static membership (defined by manually adding users/recipients as members of the group), the membership of a Dynamic Distribution Group is determined […]

More →

New-Mailbox Parameters

When creating a new mailbox using the New Mailbox wizard in the Exchange console, you are required to enter a number of parameters. The Completion page/dialog box in the wizard shows the shell command used under the hood to create the mailbox. This functionality is quite useful in understanding the commands used by such wizards, […]

More →

CAS In DMZ Redux: Time For an OWA Appliance?

The number of times I continue to field this question is amazing – Can the Client Access Server be located in the perimeter (DMZ) network? I wrote about it not too long ago [read previous post titled “Locating Exchange Server 2007 CAS role in the perimeter?“]. Exchange folks continue to get the standard requirement/mandate from […]

More →

Cluster Continuous Replication and Public Folders

In previous versions of Exchange Server, Exchange Virtual Servers (EVSes) are not very different from standalone servers. Besides mailboxes, they can host protocol virtual servers (SMTP, IMAP4, POP3, HTTP/OWA), Public Folders, etc. Exchange Server 2007’s clustering model is simplified further to provide high availability for mailboxes. There is no protocol support – SMTP is the […]

More →

Applying Managed Folder Policy to more than one user

Scenario: You have a Managed Folder Mailbox Policy called Policy-DeletedItems90Days. The policy has Managed Content Settings to permanently delete items in the Deleted Items folder after 90 days. You can easily apply this Managed Folder Mailbox Policy to a single user using the Exchange console, as shown in Figure 1. Figure 1: Applying a Managed […]

More →

HOW TO: Expose original senders and recipients of quarantined messages

The Content Filter Agent in Exchange Server 2007 allows you to quarantine messages above the SCLQuarantineThreshold. Messages so quarantined are delivered to a quarantine mailbox, specified in the Content Filter configuration. [Read previous post for more info, “Exchange 2007 Content Filter: How to move messages to users’ Junk Mail folder“] Messages arriving in the quarantine […]

More →

Determine cluster configuration of mailbox server (CCR/SCC)

To determine whether a mailbox server is clustered or standalone, and if clustered – whether it’s using Cluster Continuous Replication (CCR) or Single Copy Cluster (SCC), use the following command: Get-MailboxServer | select name,ClusteredStorageType The possible values:1. NonShared = CCR cluster2. Shared = SCC cluster3. Disabled = standalone / non-clustered mailbox server

More →

Released: Update Rollup 2 for Exchange Server 2007 (KB935490)

Microsoft has just released Update Rollup 2 for Exchange Server 2007 (KB935490). This update comes less than 3 weeks after the previous rollup – Update Rollup 1. It includes updates for 4 vulnerabilities in Microsoft Exchange Server – (including a critical remote code execution vulnerability from the way MIME messages are decoded), as outlined in […]

More →

Logging SMTP Protocol Activity in Exchange 2013/2010 and Exchange 2007

I wrote about logging SMTP protocol activity in Exchange Server 2003 in what is one of the most popular posts on Exchangepedia. Starting with Exchange Server 2007, Exchange discontinued using the SMTP stack in IIS and developed its own SMTP stack. I like to think of it as smarter or more intelligent Receive Connectors (these […]

More →

Protect users from spam from your own domain in Exchange 2010 and Exchange 2007

One of the common complaints from users and many messaging folks is spam received from senders that appear to be from your own domain. SMTP mail is exchanged with anonymous Internet hosts without any authentication. Headers can be and are effortlessly spoofed. Rather than using an unregistered or invalid domain in the From: header, many […]

More →