• I have some question of Exchange Server 2010

    1- What is connector in exchange server 2010 2- What is smart host and relay. 3- What are Recipient Policies in exchange server 2010. 4-What is Online and offline defragmentation.  Please explain so that above queries will be cleared easily.

    UPENDRA1265 pointsBadges:
  • MS Exchange POP3 Connector for SBS

    I have configured a POP3 Connector in my SBS Exchange server. I believe if have the SMTP working, I can send and receive locally, and I can send to an external email address and it be delivered. What I can't do is receive an email from an external address. I can watch the inbox of where my pop3...

    Mlange04265 pointsBadges:
  • Free IT Book: AAA Identity Management Security

    This week's free IT book is your complete, authoritative guide to implementing, configuring, and managing AAA with CiscoSecure ACS. For a chance to win AAA Identity Management Security, answer one of the questions listed below and post the link to your answer in the discussion section of this...

    MelanieYarbrough6,345 pointsBadges:
  • Outlook web Access (OWA) security concerns

    Hi, I'm trying to convince my boss that our organization can provide access to e-mail over the internet without security threats. I plan to use OWA. So, can you tell me the risks and the counter measures?

    Acastanheira20015 pointsBadges:
  • Free IT Book: CompTIA Security+ Certification Passport

    This week's free IT book is Mike Meyers' CompTIA Security+ Certification Passport: Revised for the new CompTIA Security+ exam (SY0-301). The new edition provides a condensed and concise review of CompTIA’s well-established security credential. For a chance to win this quick review, cram-style...

    MelanieYarbrough6,345 pointsBadges:
  • Security/ Audit Check list for DB2

    Hi, I'm in the process of hardening the DB2 in Linux and I'm looking for a checklist to help me make sure I don't miss anypoint. Since I'm not an expert on DB2 I would like to have a starting point. I'm looking to make sure I don't leave open doors and also I want ot make sure I don't get an Audit...

    Josec990 pointsBadges:
  • Free IT Book: The Accidental Administrator: Cisco ASA Security Appliance

    This week's free IT book comes with a bonus interview with the author, Don Crawley! Check out what he has to say about the book, the process, and the joys of being an IT-type personality. Then answer one of the questions below and post the link to your answer in the discussion section for your...

    MelanieYarbrough6,345 pointsBadges:
  • Data vs. perimeter vs. network security

    A short time ago, author Wes Noonan wrote some tips for SearchWindowsSecurity.com about deperimeterization. He explained how security is always pitted against business needs, and perimeters have become porous because businesses require traffic from SMTP, HTTP or VPNs to pass through the firewall....

    RobynLorusso230 pointsBadges:
  • How to retrieve passwords in Thunderbird via HDD?

    How does Thunderbird 8 store passwords and how does one retrieve them via HDD? I would usually use NirSoft, but it's not compatible with Thunderbird 8.

    ITKE346,030 pointsBadges:
  • User circumventing security

    We have a rogue user who knows more than she should. She can grant herself and other users the authority to access files that are supposed to be secured. Does anyone know of how we can monitor her activity or go back and review what she has done or anything that we can do. We think she may be using...

    Mouse3330 pointsBadges:
  • OST files

    We are migrating users from one exchange server to another. the users sit in remote sites and use very slow links to connect to the exchange server. Is it possible to use the old ost on the pc for the new exchange server instead of recreating the ost with the new exchange server, which can take...

    PaulBone10 pointsBadges:
  • Help with E-Mail error code 550 5.7.1

    Can anyone help me please.  I am trying to send an email to a business account but I keep getting the mails bounced back to me with the following error code.  I have also tried to email someone else at their headquarters and get the same message...... reason: 550 5.7.1 Requested action not taken:...

    Dan197315 pointsBadges:
  • Security implications of a password blacklist

    Does maintaining a password blacklist on database create any security risks?  Basically, I'm looking to create a list of 500 or so commonly used passwords to stump very basic automated spambots.

    ITKE346,030 pointsBadges:
  • What should the process be to remove users on leave?

    Typically when a user goes on disability, short term, or parental leave, do you disable their AD? What about their exchange? RSA? Smartphone?Also, is there usually a process to inform them that you are disabling their access?

    sfuboy5 pointsBadges:
  • How do spammers send email that looks like its from a real company?

    How do spammers send e-mails that appear as if they came from a big company and more importantly, are there techniques to detect which messages are soam and which are real?  Are the emails being sent from a spammers server or do they hijack the company's mail servers. Is it possible for someone to...

    ITKE346,030 pointsBadges:
  • Why use Cached Exchange Mode Outlook 2007??

    Only by using Cached Exchange Mode can i access previous mailbox items or per-configured OST file items. waiting for a good response....

    OutlookOST275 pointsBadges:
  • What does the “t” in .pst and .ost stand for

    What does the "t" in .pst and .ost stand for

    Jim H5 pointsBadges:
  • Does SSL equal secure email through transit?

    If an email server sends messages via SMTP/SSL and the recipient uses SSL to receive his email, will the message be secure through the entire transit? Des this mean the e-mail will be delivered in plain text between the servers?

    ITKE346,030 pointsBadges:
  • I’m looking for a stronger authentication method for web services

    I deployed a two-factor-authentication solution in order to strength logon to our web applications. The majority of our users who have new tokens are also pop3/imap users (this is from a long time ago). However, I noticed web applications are well protected by 2FA , but mail applications is an easy...

    ITKE346,030 pointsBadges:
  • Exchange mailbox reports

    Can some one please tell me how to enable to track mailbox content and mailbox traffic of my company. I want to create a report based on the mailbox traffic and content. I want to automate this process because I don't want to log in every month.

    bradcam15 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following