RE: Transaction logs

2009-02-23 Thread Sobey, Richard A
The method I would use - that gets the same results really - is to run eseutil 
/mh on the database (it needs to be dismounted first).


From: bounce-8435332-8066...@lyris.sunbelt-software.com 
[mailto:bounce-8435332-8066...@lyris.sunbelt-software.com] On Behalf Of Phil 
Thompson
Sent: 20 February 2009 13:30
To: MS-Exchange Admin Issues
Subject: RE: Transaction logs

Yes I do, it's a long story. I just want to make sure that it is a valid work 
around before I do something that could cause more problems. Especially on a 
'Friday'!!

Thank you again.

From: Jake Gardner [mailto:jgard...@ttcdas.com]
Sent: Friday, February 20, 2009 8:25 AM
To: MS-Exchange Admin Issues
Subject: RE: Transaction logs

Do you have a backup solution like Backup Exec?  I use BE to flush my commited 
logs.

I've never had to use the steps you mention, but I know they are the ones to 
use when you need to manually flush the logs.

Thanks,

Jake Gardner
TTC Network Administrator
Ext. 246



From: Phil Thompson [mailto:ph...@wpiinc.com]
Sent: Friday, February 20, 2009 8:07 AM
To: MS-Exchange Admin Issues
Subject: Transaction logs
I have 30 some GB of transaction logs that are no longer used. (for what ever 
reasons)..

I read this article that gave instructions on how to tell where the last log 
that was committed.

The instructions are below. I want to run this by you'll before I do this. It 
is a valid thing to do?

*
How to manually (and safely) purge Exchange Server transaction logs

To do this from a command line, go to the \Program Files\Exchsvr\bin directory 
on the server and run the following command:

eseutil /mk C:\Program Files\Exchsrvr\MDBDATA\E00.chk

(The quotes are important, as they delimit the full pathname for the file.)

In the results returned you'll see these lines:

LastFullBackupCheckpoint: (0x0,0,0)
Checkpoint: (0x2,EC2,1C7)

The first number in the Checkpoint entry -- 0x2 -- is a hexadecimal number 
that refers to the last checkpoint log. Therefore, any logs numbered 
E01.log or earlier could be removed. If the checkpoint was 0x14C8, then 
logs numbered E0014C7.log or earlier could be removed.


Thank you,

Phil







***Teletronics Technology Corporation***
This e-mail is confidential and may also be privileged.  If you are not the 
addressee or authorized by the addressee to receive this e-mail, you may not 
disclose, copy, distribute, or use this e-mail. If you have received this 
e-mail in error, please notify the sender immediately by reply e-mail or by 
telephone at 267-352-2020 and destroy this message and any copies.

Thank you.

***




~ Ninja Email Security with Cloudmark Spam Engine Gets Image Spam ~
~ http://www.sunbeltsoftware.com/Ninja~

RE: Transaction logs

2009-02-23 Thread gsweers
It may be a bit late, but I would just do a NTbackup of the Exchange
Store.  It will flush any log files and give you a good backup before
doing anything else..

 

From: Sobey, Richard A [mailto:r.so...@imperial.ac.uk] 
Sent: Monday, February 23, 2009 4:45 AM
To: MS-Exchange Admin Issues
Subject: RE: Transaction logs

 

The method I would use - that gets the same results really - is to run
eseutil /mh on the database (it needs to be dismounted first).

 

 

From: bounce-8435332-8066...@lyris.sunbelt-software.com
[mailto:bounce-8435332-8066...@lyris.sunbelt-software.com] On Behalf Of
Phil Thompson
Sent: 20 February 2009 13:30
To: MS-Exchange Admin Issues
Subject: RE: Transaction logs

 

Yes I do, it's a long story. I just want to make sure that it is a valid
work around before I do something that could cause more problems.
Especially on a 'Friday'!! 

 

Thank you again.

 

From: Jake Gardner [mailto:jgard...@ttcdas.com] 
Sent: Friday, February 20, 2009 8:25 AM
To: MS-Exchange Admin Issues
Subject: RE: Transaction logs

 

Do you have a backup solution like Backup Exec?  I use BE to flush my
commited logs.  

 

I've never had to use the steps you mention, but I know they are the
ones to use when you need to manually flush the logs.

 

Thanks,

 

Jake Gardner

TTC Network Administrator

Ext. 246

 

 



From: Phil Thompson [mailto:ph...@wpiinc.com] 
Sent: Friday, February 20, 2009 8:07 AM
To: MS-Exchange Admin Issues
Subject: Transaction logs

I have 30 some GB of transaction logs that are no longer used. (for what
ever reasons)..

 

I read this article that gave instructions on how to tell where the last
log that was committed. 

 

The instructions are below. I want to run this by you'll before I do
this. It is a valid thing to do?

 

*

How to manually (and safely) purge Exchange Server transaction logs

To do this from a command line, go to the \Program Files\Exchsvr\bin
directory on the server and run the following command: 

eseutil /mk C:\Program Files\Exchsrvr\MDBDATA\E00.chk 

(The quotes are important, as they delimit the full pathname for the
file.) 

In the results returned you'll see these lines: 

LastFullBackupCheckpoint: (0x0,0,0)
Checkpoint: (0x2,EC2,1C7) 

The first number in the Checkpoint entry -- 0x2 -- is a hexadecimal
number that refers to the last checkpoint log. Therefore, any logs
numbered E01.log or earlier could be removed. If the checkpoint was
0x14C8, then logs numbered E0014C7.log or earlier could be removed. 

 

 

Thank you,

 

Phil

 

 

 

 

***Teletronics Technology Corporation*** 
This e-mail is confidential and may also be privileged.  If you are not
the addressee or authorized by the addressee to receive this e-mail, you
may not disclose, copy, distribute, or use this e-mail. If you have
received this e-mail in error, please notify the sender immediately by
reply e-mail or by telephone at 267-352-2020 and destroy this message
and any copies.  

Thank you.

***

 

 

 

 


~ Ninja Email Security with Cloudmark Spam Engine Gets Image Spam ~
~ http://www.sunbeltsoftware.com/Ninja~

RE: Incoming spoofed e-mail issue

2009-02-23 Thread Joe Heaton
In the reverse DNS section of this tool, do I need to check the box?  I
don't host my external DNS records, so I don't know what PTR records, if
any, are out there.

Joe Heaton
Employment Training Panel

-Original Message-
From: Troy Meyer [mailto:troy.me...@monacocoach.com] 
Sent: Thursday, February 19, 2009 8:06 AM
To: MS-Exchange Admin Issues
Subject: RE: Incoming spoofed e-mail issue

Although it isn't perfect, this link has been out on the list before and
is a good way to generate an SPF if you are wondering where to start.

http://www.microsoft.com/mscorp/safety/content/technologies/senderid/wiz
ard/


-troy

-Original Message-
From: Micheal Espinola Jr [mailto:michealespin...@gmail.com] 
Sent: Thursday, February 19, 2009 6:52 AM
To: MS-Exchange Admin Issues
Subject: Re: Incoming spoofed e-mail issue

+1. Although impossible to quantify, it can only help your situation.

--
ME2



On Wed, Feb 18, 2009 at 7:22 PM, Don Andrews don.andr...@safeway.com
wrote:
 You might consider advertising an SPF record - cheap and little
effort.  No
 guarantees except that it lets honest domains that check for it ignore
 spoofed sends.



 

 From: Joe Heaton [mailto:jhea...@etp.ca.gov]
 Sent: Wednesday, February 18, 2009 10:24 AM

 To: MS-Exchange Admin Issues
 Subject: RE: Incoming spoofed e-mail issue



 Thomas,



 I think I've found a way to take care of some of this stuff.  I have a
 Watchguard firewall, which has a feature built in called an SMTP
Proxy.
 Within that, I can set a filter to deny any messages coming from
specific
 domains, or, as in this case, from specific country codes (.pl, .ru,
etc).



 I just put it in place, so I'm hoping it's going to help the issue
here.  As
 far as backscatter from within the US, I'm still working on that
one...



 Joe Heaton

 Employment Training Panel



 From: Thomas Gonzalez [mailto:tgonza...@girlscouts-swtx.org]
 Sent: Tuesday, February 17, 2009 10:35 AM
 To: MS-Exchange Admin Issues
 Subject: RE: Incoming spoofed e-mail issue



 That's exactly what I'm battling right now Joe...if you look at the
header you
 will see the actual sender / originator. I couldn't give you a correct
way
 how to tackle this issue. But this backscatter has become a pain in
the you
 know what.



 From: Joe Heaton [mailto:jhea...@etp.ca.gov]
 Sent: Tuesday, February 17, 2009 12:30 PM
 To: MS-Exchange Admin Issues
 Subject: Incoming spoofed e-mail issue



 I'm getting users who are getting lots of mail in their inbox every
morning
 that looks like it is coming from themselves.  Looking at the headers,
I see
 various actual senders, many coming from domains ending in .ru, or
.pl,
 etc.  Is there a way of blocking e-mails from these foreign domains?
None
 of my users have legitimate business with anyone in Russia, or Poland,
or
 any other foreign country.  I tried setting this up under Sender
Filtering,
 by putting the following in, for example:  *...@*.pl



 Is there a different way of putting this in?  I notice that the
instructions
 for Sender Filtering says to block messages claiming to be from the
 following:, but these messages are actually claiming to be from the
user,
 not what is actually in the header.  Is there a different way of
filtering
 these messages?  There's nothing in the subject line that is keying
the IMF,
 or my Symantec Mail Security for Microsoft Exchange.



 Joe Heaton

 AISA

 Employment Training Panel

 1100 J Street, 4th Floor

 Sacramento, CA  95814

 (916) 327-5276

 jhea...@etp.ca.gov







 This email and any attached files are confidential and intended solely
for
 the intended recipient(s). If you are not the named recipient you
should not
 read, distribute, copy or alter this email. Any views or opinions
expressed
 in this email are those of the author and do not represent those of
the Girl
 Scouts of Southwest Texas. Warning: Although precautions have been
taken to
 make sure no viruses are present in this email, Girl Scouts of
Southwest
 Texas cannot accept responsibility for any loss or damage that arise
from
 the use of this email or attachments.











~ Ninja Email Security with Cloudmark Spam Engine Gets Image Spam ~
~ http://www.sunbeltsoftware.com/Ninja~


~ Ninja Email Security with Cloudmark Spam Engine Gets Image Spam ~
~ http://www.sunbeltsoftware.com/Ninja~


~ Ninja Email Security with Cloudmark Spam Engine Gets Image Spam ~
~ http://www.sunbeltsoftware.com/Ninja~



RE: Incoming spoofed e-mail issue

2009-02-23 Thread Don Andrews
You appear to have a valid PTR at least for the IP this message came
from.

-Original Message-
From: Joe Heaton [mailto:jhea...@etp.ca.gov] 
Sent: Monday, February 23, 2009 7:47 AM
To: MS-Exchange Admin Issues
Subject: RE: Incoming spoofed e-mail issue

In the reverse DNS section of this tool, do I need to check the box?  I
don't host my external DNS records, so I don't know what PTR records, if
any, are out there.

Joe Heaton
Employment Training Panel

-Original Message-
From: Troy Meyer [mailto:troy.me...@monacocoach.com] 
Sent: Thursday, February 19, 2009 8:06 AM
To: MS-Exchange Admin Issues
Subject: RE: Incoming spoofed e-mail issue

Although it isn't perfect, this link has been out on the list before and
is a good way to generate an SPF if you are wondering where to start.

http://www.microsoft.com/mscorp/safety/content/technologies/senderid/wiz
ard/


-troy

-Original Message-
From: Micheal Espinola Jr [mailto:michealespin...@gmail.com] 
Sent: Thursday, February 19, 2009 6:52 AM
To: MS-Exchange Admin Issues
Subject: Re: Incoming spoofed e-mail issue

+1. Although impossible to quantify, it can only help your situation.

--
ME2



On Wed, Feb 18, 2009 at 7:22 PM, Don Andrews don.andr...@safeway.com
wrote:
 You might consider advertising an SPF record - cheap and little
effort.  No
 guarantees except that it lets honest domains that check for it ignore
 spoofed sends.



 

 From: Joe Heaton [mailto:jhea...@etp.ca.gov]
 Sent: Wednesday, February 18, 2009 10:24 AM

 To: MS-Exchange Admin Issues
 Subject: RE: Incoming spoofed e-mail issue



 Thomas,



 I think I've found a way to take care of some of this stuff.  I have a
 Watchguard firewall, which has a feature built in called an SMTP
Proxy.
 Within that, I can set a filter to deny any messages coming from
specific
 domains, or, as in this case, from specific country codes (.pl, .ru,
etc).



 I just put it in place, so I'm hoping it's going to help the issue
here.  As
 far as backscatter from within the US, I'm still working on that
one...



 Joe Heaton

 Employment Training Panel



 From: Thomas Gonzalez [mailto:tgonza...@girlscouts-swtx.org]
 Sent: Tuesday, February 17, 2009 10:35 AM
 To: MS-Exchange Admin Issues
 Subject: RE: Incoming spoofed e-mail issue



 That's exactly what I'm battling right now Joe...if you look at the
header you
 will see the actual sender / originator. I couldn't give you a correct
way
 how to tackle this issue. But this backscatter has become a pain in
the you
 know what.



 From: Joe Heaton [mailto:jhea...@etp.ca.gov]
 Sent: Tuesday, February 17, 2009 12:30 PM
 To: MS-Exchange Admin Issues
 Subject: Incoming spoofed e-mail issue



 I'm getting users who are getting lots of mail in their inbox every
morning
 that looks like it is coming from themselves.  Looking at the headers,
I see
 various actual senders, many coming from domains ending in .ru, or
.pl,
 etc.  Is there a way of blocking e-mails from these foreign domains?
None
 of my users have legitimate business with anyone in Russia, or Poland,
or
 any other foreign country.  I tried setting this up under Sender
Filtering,
 by putting the following in, for example:  *...@*.pl



 Is there a different way of putting this in?  I notice that the
instructions
 for Sender Filtering says to block messages claiming to be from the
 following:, but these messages are actually claiming to be from the
user,
 not what is actually in the header.  Is there a different way of
filtering
 these messages?  There's nothing in the subject line that is keying
the IMF,
 or my Symantec Mail Security for Microsoft Exchange.



 Joe Heaton

 AISA

 Employment Training Panel

 1100 J Street, 4th Floor

 Sacramento, CA  95814

 (916) 327-5276

 jhea...@etp.ca.gov







 This email and any attached files are confidential and intended solely
for
 the intended recipient(s). If you are not the named recipient you
should not
 read, distribute, copy or alter this email. Any views or opinions
expressed
 in this email are those of the author and do not represent those of
the Girl
 Scouts of Southwest Texas. Warning: Although precautions have been
taken to
 make sure no viruses are present in this email, Girl Scouts of
Southwest
 Texas cannot accept responsibility for any loss or damage that arise
from
 the use of this email or attachments.











~ Ninja Email Security with Cloudmark Spam Engine Gets Image Spam ~
~ http://www.sunbeltsoftware.com/Ninja~


~ Ninja Email Security with Cloudmark Spam Engine Gets Image Spam ~
~ http://www.sunbeltsoftware.com/Ninja~


~ Ninja Email Security with Cloudmark Spam Engine Gets Image Spam ~
~ http://www.sunbeltsoftware.com/Ninja~




~ Ninja Email Security with Cloudmark Spam Engine Gets Image Spam ~
~ http://www.sunbeltsoftware.com/Ninja~



RE: Incoming spoofed e-mail issue

2009-02-23 Thread Joe Heaton
Thanks Don.  So in the creation process, since I only have one IP that
should be sending e-mail, I can check the box saying that all the
reverse DNS records for my domain resolve to outbound e-mail servers?
Or could there be PTR records for my web servers as well?

Joe Heaton
Employment Training Panel


-Original Message-
From: Don Andrews [mailto:don.andr...@safeway.com] 
Sent: Monday, February 23, 2009 8:38 AM
To: MS-Exchange Admin Issues
Subject: RE: Incoming spoofed e-mail issue

You appear to have a valid PTR at least for the IP this message came
from.

-Original Message-
From: Joe Heaton [mailto:jhea...@etp.ca.gov] 
Sent: Monday, February 23, 2009 7:47 AM
To: MS-Exchange Admin Issues
Subject: RE: Incoming spoofed e-mail issue

In the reverse DNS section of this tool, do I need to check the box?  I
don't host my external DNS records, so I don't know what PTR records, if
any, are out there.

Joe Heaton
Employment Training Panel

-Original Message-
From: Troy Meyer [mailto:troy.me...@monacocoach.com] 
Sent: Thursday, February 19, 2009 8:06 AM
To: MS-Exchange Admin Issues
Subject: RE: Incoming spoofed e-mail issue

Although it isn't perfect, this link has been out on the list before and
is a good way to generate an SPF if you are wondering where to start.

http://www.microsoft.com/mscorp/safety/content/technologies/senderid/wiz
ard/


-troy

-Original Message-
From: Micheal Espinola Jr [mailto:michealespin...@gmail.com] 
Sent: Thursday, February 19, 2009 6:52 AM
To: MS-Exchange Admin Issues
Subject: Re: Incoming spoofed e-mail issue

+1. Although impossible to quantify, it can only help your situation.

--
ME2



On Wed, Feb 18, 2009 at 7:22 PM, Don Andrews don.andr...@safeway.com
wrote:
 You might consider advertising an SPF record - cheap and little
effort.  No
 guarantees except that it lets honest domains that check for it ignore
 spoofed sends.



 

 From: Joe Heaton [mailto:jhea...@etp.ca.gov]
 Sent: Wednesday, February 18, 2009 10:24 AM

 To: MS-Exchange Admin Issues
 Subject: RE: Incoming spoofed e-mail issue



 Thomas,



 I think I've found a way to take care of some of this stuff.  I have a
 Watchguard firewall, which has a feature built in called an SMTP
Proxy.
 Within that, I can set a filter to deny any messages coming from
specific
 domains, or, as in this case, from specific country codes (.pl, .ru,
etc).



 I just put it in place, so I'm hoping it's going to help the issue
here.  As
 far as backscatter from within the US, I'm still working on that
one...



 Joe Heaton

 Employment Training Panel



 From: Thomas Gonzalez [mailto:tgonza...@girlscouts-swtx.org]
 Sent: Tuesday, February 17, 2009 10:35 AM
 To: MS-Exchange Admin Issues
 Subject: RE: Incoming spoofed e-mail issue



 That's exactly what I'm battling right now Joe...if you look at the
header you
 will see the actual sender / originator. I couldn't give you a correct
way
 how to tackle this issue. But this backscatter has become a pain in
the you
 know what.



 From: Joe Heaton [mailto:jhea...@etp.ca.gov]
 Sent: Tuesday, February 17, 2009 12:30 PM
 To: MS-Exchange Admin Issues
 Subject: Incoming spoofed e-mail issue



 I'm getting users who are getting lots of mail in their inbox every
morning
 that looks like it is coming from themselves.  Looking at the headers,
I see
 various actual senders, many coming from domains ending in .ru, or
.pl,
 etc.  Is there a way of blocking e-mails from these foreign domains?
None
 of my users have legitimate business with anyone in Russia, or Poland,
or
 any other foreign country.  I tried setting this up under Sender
Filtering,
 by putting the following in, for example:  *...@*.pl



 Is there a different way of putting this in?  I notice that the
instructions
 for Sender Filtering says to block messages claiming to be from the
 following:, but these messages are actually claiming to be from the
user,
 not what is actually in the header.  Is there a different way of
filtering
 these messages?  There's nothing in the subject line that is keying
the IMF,
 or my Symantec Mail Security for Microsoft Exchange.



 Joe Heaton

 AISA

 Employment Training Panel

 1100 J Street, 4th Floor

 Sacramento, CA  95814

 (916) 327-5276

 jhea...@etp.ca.gov







 This email and any attached files are confidential and intended solely
for
 the intended recipient(s). If you are not the named recipient you
should not
 read, distribute, copy or alter this email. Any views or opinions
expressed
 in this email are those of the author and do not represent those of
the Girl
 Scouts of Southwest Texas. Warning: Although precautions have been
taken to
 make sure no viruses are present in this email, Girl Scouts of
Southwest
 Texas cannot accept responsibility for any loss or damage that arise
from
 the use of this email or attachments.











~ Ninja Email Security with Cloudmark Spam Engine Gets Image Spam ~
~ 

RE: Incoming spoofed e-mail issue

2009-02-23 Thread Don Andrews
Any IP that SHOULD be allowed to send email directly to external
recipients - if your web servers have port 25 open intentionally so they
can send directly rather then relaying through your normal email source,
they would be blocked by systems checking for SPF records if you don't
supply SPF and PTR records for them.

-Original Message-
From: Joe Heaton [mailto:jhea...@etp.ca.gov] 
Sent: Monday, February 23, 2009 8:40 AM
To: MS-Exchange Admin Issues
Subject: RE: Incoming spoofed e-mail issue

Thanks Don.  So in the creation process, since I only have one IP that
should be sending e-mail, I can check the box saying that all the
reverse DNS records for my domain resolve to outbound e-mail servers?
Or could there be PTR records for my web servers as well?

Joe Heaton
Employment Training Panel


-Original Message-
From: Don Andrews [mailto:don.andr...@safeway.com] 
Sent: Monday, February 23, 2009 8:38 AM
To: MS-Exchange Admin Issues
Subject: RE: Incoming spoofed e-mail issue

You appear to have a valid PTR at least for the IP this message came
from.

-Original Message-
From: Joe Heaton [mailto:jhea...@etp.ca.gov] 
Sent: Monday, February 23, 2009 7:47 AM
To: MS-Exchange Admin Issues
Subject: RE: Incoming spoofed e-mail issue

In the reverse DNS section of this tool, do I need to check the box?  I
don't host my external DNS records, so I don't know what PTR records, if
any, are out there.

Joe Heaton
Employment Training Panel

-Original Message-
From: Troy Meyer [mailto:troy.me...@monacocoach.com] 
Sent: Thursday, February 19, 2009 8:06 AM
To: MS-Exchange Admin Issues
Subject: RE: Incoming spoofed e-mail issue

Although it isn't perfect, this link has been out on the list before and
is a good way to generate an SPF if you are wondering where to start.

http://www.microsoft.com/mscorp/safety/content/technologies/senderid/wiz
ard/


-troy

-Original Message-
From: Micheal Espinola Jr [mailto:michealespin...@gmail.com] 
Sent: Thursday, February 19, 2009 6:52 AM
To: MS-Exchange Admin Issues
Subject: Re: Incoming spoofed e-mail issue

+1. Although impossible to quantify, it can only help your situation.

--
ME2



On Wed, Feb 18, 2009 at 7:22 PM, Don Andrews don.andr...@safeway.com
wrote:
 You might consider advertising an SPF record - cheap and little
effort.  No
 guarantees except that it lets honest domains that check for it ignore
 spoofed sends.



 

 From: Joe Heaton [mailto:jhea...@etp.ca.gov]
 Sent: Wednesday, February 18, 2009 10:24 AM

 To: MS-Exchange Admin Issues
 Subject: RE: Incoming spoofed e-mail issue



 Thomas,



 I think I've found a way to take care of some of this stuff.  I have a
 Watchguard firewall, which has a feature built in called an SMTP
Proxy.
 Within that, I can set a filter to deny any messages coming from
specific
 domains, or, as in this case, from specific country codes (.pl, .ru,
etc).



 I just put it in place, so I'm hoping it's going to help the issue
here.  As
 far as backscatter from within the US, I'm still working on that
one...



 Joe Heaton

 Employment Training Panel



 From: Thomas Gonzalez [mailto:tgonza...@girlscouts-swtx.org]
 Sent: Tuesday, February 17, 2009 10:35 AM
 To: MS-Exchange Admin Issues
 Subject: RE: Incoming spoofed e-mail issue



 That's exactly what I'm battling right now Joe...if you look at the
header you
 will see the actual sender / originator. I couldn't give you a correct
way
 how to tackle this issue. But this backscatter has become a pain in
the you
 know what.



 From: Joe Heaton [mailto:jhea...@etp.ca.gov]
 Sent: Tuesday, February 17, 2009 12:30 PM
 To: MS-Exchange Admin Issues
 Subject: Incoming spoofed e-mail issue



 I'm getting users who are getting lots of mail in their inbox every
morning
 that looks like it is coming from themselves.  Looking at the headers,
I see
 various actual senders, many coming from domains ending in .ru, or
.pl,
 etc.  Is there a way of blocking e-mails from these foreign domains?
None
 of my users have legitimate business with anyone in Russia, or Poland,
or
 any other foreign country.  I tried setting this up under Sender
Filtering,
 by putting the following in, for example:  *...@*.pl



 Is there a different way of putting this in?  I notice that the
instructions
 for Sender Filtering says to block messages claiming to be from the
 following:, but these messages are actually claiming to be from the
user,
 not what is actually in the header.  Is there a different way of
filtering
 these messages?  There's nothing in the subject line that is keying
the IMF,
 or my Symantec Mail Security for Microsoft Exchange.



 Joe Heaton

 AISA

 Employment Training Panel

 1100 J Street, 4th Floor

 Sacramento, CA  95814

 (916) 327-5276

 jhea...@etp.ca.gov







 This email and any attached files are confidential and intended solely
for
 the intended recipient(s). If you are not the named recipient you
should not
 read, distribute, copy or 

Default Mailbox Features POP and IMAP to Disabled

2009-02-23 Thread Russ Patterson
Hello all -

Anyone have a way to tweak things so that new users created in a Windows
2008, Exchange 2007 forest all default to disabled for POP and IMAP? We have
a real business need to have those OFF for the vast majority of our users. I
know you can script existing boxes with Set-CASMailbozx (I think) - but we
really need - in the GUI - for a new blank user dialog box to come up with
the defaults already at DISABLED. Anyone have any suggestions? As always -
thanks in advance!

~ Ninja Email Security with Cloudmark Spam Engine Gets Image Spam ~
~ http://www.sunbeltsoftware.com/Ninja~

RE: Incoming spoofed e-mail issue

2009-02-23 Thread Don Andrews
Any IP that SHOULD be allowed to send email directly to external
destinations should have them - if your web servers have port 25 open
intentionally so they can send directly rather then relaying through
your normal email source, they would be blocked by systems checking for
SPF records if you don't supply SPF and PTR records for them.

-Original Message-
From: Joe Heaton [mailto:jhea...@etp.ca.gov] 
Sent: Monday, February 23, 2009 8:40 AM
To: MS-Exchange Admin Issues
Subject: RE: Incoming spoofed e-mail issue

Thanks Don.  So in the creation process, since I only have one IP that
should be sending e-mail, I can check the box saying that all the
reverse DNS records for my domain resolve to outbound e-mail servers?
Or could there be PTR records for my web servers as well?

Joe Heaton
Employment Training Panel


-Original Message-
From: Don Andrews [mailto:don.andr...@safeway.com] 
Sent: Monday, February 23, 2009 8:38 AM
To: MS-Exchange Admin Issues
Subject: RE: Incoming spoofed e-mail issue

You appear to have a valid PTR at least for the IP this message came
from.

-Original Message-
From: Joe Heaton [mailto:jhea...@etp.ca.gov] 
Sent: Monday, February 23, 2009 7:47 AM
To: MS-Exchange Admin Issues
Subject: RE: Incoming spoofed e-mail issue

In the reverse DNS section of this tool, do I need to check the box?  I
don't host my external DNS records, so I don't know what PTR records, if
any, are out there.

Joe Heaton
Employment Training Panel

-Original Message-
From: Troy Meyer [mailto:troy.me...@monacocoach.com] 
Sent: Thursday, February 19, 2009 8:06 AM
To: MS-Exchange Admin Issues
Subject: RE: Incoming spoofed e-mail issue

Although it isn't perfect, this link has been out on the list before and
is a good way to generate an SPF if you are wondering where to start.

http://www.microsoft.com/mscorp/safety/content/technologies/senderid/wiz
ard/


-troy

-Original Message-
From: Micheal Espinola Jr [mailto:michealespin...@gmail.com] 
Sent: Thursday, February 19, 2009 6:52 AM
To: MS-Exchange Admin Issues
Subject: Re: Incoming spoofed e-mail issue

+1. Although impossible to quantify, it can only help your situation.

--
ME2



On Wed, Feb 18, 2009 at 7:22 PM, Don Andrews don.andr...@safeway.com
wrote:
 You might consider advertising an SPF record - cheap and little
effort.  No
 guarantees except that it lets honest domains that check for it ignore
 spoofed sends.



 

 From: Joe Heaton [mailto:jhea...@etp.ca.gov]
 Sent: Wednesday, February 18, 2009 10:24 AM

 To: MS-Exchange Admin Issues
 Subject: RE: Incoming spoofed e-mail issue



 Thomas,



 I think I've found a way to take care of some of this stuff.  I have a
 Watchguard firewall, which has a feature built in called an SMTP
Proxy.
 Within that, I can set a filter to deny any messages coming from
specific
 domains, or, as in this case, from specific country codes (.pl, .ru,
etc).



 I just put it in place, so I'm hoping it's going to help the issue
here.  As
 far as backscatter from within the US, I'm still working on that
one...



 Joe Heaton

 Employment Training Panel



 From: Thomas Gonzalez [mailto:tgonza...@girlscouts-swtx.org]
 Sent: Tuesday, February 17, 2009 10:35 AM
 To: MS-Exchange Admin Issues
 Subject: RE: Incoming spoofed e-mail issue



 That's exactly what I'm battling right now Joe...if you look at the
header you
 will see the actual sender / originator. I couldn't give you a correct
way
 how to tackle this issue. But this backscatter has become a pain in
the you
 know what.



 From: Joe Heaton [mailto:jhea...@etp.ca.gov]
 Sent: Tuesday, February 17, 2009 12:30 PM
 To: MS-Exchange Admin Issues
 Subject: Incoming spoofed e-mail issue



 I'm getting users who are getting lots of mail in their inbox every
morning
 that looks like it is coming from themselves.  Looking at the headers,
I see
 various actual senders, many coming from domains ending in .ru, or
.pl,
 etc.  Is there a way of blocking e-mails from these foreign domains?
None
 of my users have legitimate business with anyone in Russia, or Poland,
or
 any other foreign country.  I tried setting this up under Sender
Filtering,
 by putting the following in, for example:  *...@*.pl



 Is there a different way of putting this in?  I notice that the
instructions
 for Sender Filtering says to block messages claiming to be from the
 following:, but these messages are actually claiming to be from the
user,
 not what is actually in the header.  Is there a different way of
filtering
 these messages?  There's nothing in the subject line that is keying
the IMF,
 or my Symantec Mail Security for Microsoft Exchange.



 Joe Heaton

 AISA

 Employment Training Panel

 1100 J Street, 4th Floor

 Sacramento, CA  95814

 (916) 327-5276

 jhea...@etp.ca.gov







 This email and any attached files are confidential and intended solely
for
 the intended recipient(s). If you are not the named recipient you
should not
 read, 

RE: Loving your new body?

2009-02-23 Thread Stu Sjouwerman
Results:The following members were successfully deleted:

squaliderks...@campingalporto.com   
 

Warm regards,


Stu Sjouwerman
Founder, VP Marketing.
P: +1-727-562-0101 ext 218
F: +1-727-562-5199
s...@sunbelt-software.com


  

 



From: Carmela Calloway [mailto:squaliderks...@campingalporto.com] 
Sent: Saturday, February 21, 2009 11:46 PM
To: MS-Exchange Admin Issues
Subject: Loving your new body?


Surely the easiest way to lose weight
 
Click for access http://tesobiciz.cn 


 




..
~ Ninja Email Security with Cloudmark Spam Engine Gets Image Spam ~
~ http://www.sunbeltsoftware.com/Ninja~

HOWTO: do reverse lookups (PTR records) with the nslookup tool

2009-02-23 Thread Jason Gurtz
Note: the dig tool is easier and better than nslookup, but unfortunately
doesn't come with windows.  You can download the Windows port of the BIND
name server and find dig there, but that's extra steps to find out just
what dlls you also need, etc...  If you're going to do this a lot I do
recommend that you take the time to learn dig instead of nslookup.

 In the reverse DNS section of this tool, do I need to check the box?  I
 don't host my external DNS records, so I don't know what PTR records, if
 any, are out there.

Open cmd prompt. Type nslookup and press enter. At the new   prompt
type set type=ptr and press enter

wacky thing #1: IP addy that you query is backwards from what it is
wacky thing #2: you are querying for the backwards address in this weird
domain called in-addr.arpa.  You can think of .in-addr.arpa as being to
IP addresses the same as .com. or .org. are to domain names.  It is the
story of the whale; it's just how it is.

So, for example let's look up some aol.com PTR records...3 MX records I
see are:

mailin-01.mx.aol.cominternet address = 205.188.156.248
mailin-02.mx.aol.cominternet address = 205.188.249.91
mailin-03.mx.aol.cominternet address = 205.188.252.17

Hey, let's see if their ducks are in a row! To query the PTR record for
the first one just type this:

 248.156.188.205.in-addr.arpa

After pressing enter you should see something like this :

Non-authoritative answer:
248.156.188.205.in-addr.arpaname = dd.mx.aol.com

What!?  dd.mx.aol.com != mailin-01.mx.aol.com.  Well that's OK, aol is
probably not sending any mail out from this box here ;)  Likely, that
box is a load balancer of some type...  OK, trawling through some logs
here I do see them sending mail from host imo-d05.mx.aol.com which has an
address of 205.188.157.37.  Let's check it out!

 set type=a
 imo-d05.mx.aol.com
Server:  dns-01.ns.aol.com
Address:  64.12.51.132

Name:imo-d05.mx.aol.com
Address:  205.188.157.37

[Yup, still sitting on the same addy]

 set type=ptr
 37.157.188.205.in-addr.arpa
Server:  dns-01.ns.aol.com
Address:  64.12.51.132

37.157.188.205.in-addr.arpa name = imo-d05.mx.aol.com

[This time we have a match! AOL admins know what they're doing.]

157.188.205.in-addr.arpanameserver = dns-02.ns.aol.com
157.188.205.in-addr.arpanameserver = dns-01.ns.aol.com
dns-01.ns.aol.com   internet address = 64.12.51.132
dns-02.ns.aol.com   internet address = 205.188.157.232

So yeppers, all aol.com ducks in a row for that outbound server.  As you
can see nslookup also tells you what name servers have authority for the
address space containing 205.188.157.37.  Using a whois tool you can
lookup who has registered ownership of the IP block.  Now we're getting
off on a spam fighting tangent

if you want to script nslookup to do auditing you can use the tool like
this to query one address at a time.  Now you can loop over a whole block
of IPs that you might own in a batch file or powershell or whatever:

C:\nslookup -type=ptr 37.157.188.205.in-addr.arpa dns-01.ns.aol.com

The last argument (dns server to query) is optional. By default, nslookup
should be querying the first dns server listed in your ipconfig /all
output.  If you're at the nslookup prompt the command server
serverName|IP will do the same thing.  Check the ? command to see other
commands.  Note: -type=a would be redundant since it's the default query
type assumed and obviously -type=mx could be useful in the email world as
well.

~JasonG

-- 

~ Ninja Email Security with Cloudmark Spam Engine Gets Image Spam ~
~ http://www.sunbeltsoftware.com/Ninja~


RE: HOWTO: do reverse lookups (PTR records) with the nslookup tool

2009-02-23 Thread Campbell, Rob
I ran across this over the weekend. Haven't tried it yet, but looks like it 
might be good stuff.

http://huddledmasses.org/update-to-poshnet-and-get-dns/

-Original Message-
From: Jason Gurtz [mailto:jasongu...@npumail.com] 
Sent: Monday, February 23, 2009 11:23 AM
To: MS-Exchange Admin Issues
Subject: HOWTO: do reverse lookups (PTR records) with the nslookup tool

Note: the dig tool is easier and better than nslookup, but unfortunately
doesn't come with windows.  You can download the Windows port of the BIND
name server and find dig there, but that's extra steps to find out just
what dlls you also need, etc...  If you're going to do this a lot I do
recommend that you take the time to learn dig instead of nslookup.

 In the reverse DNS section of this tool, do I need to check the box?  I
 don't host my external DNS records, so I don't know what PTR records, if
 any, are out there.

Open cmd prompt. Type nslookup and press enter. At the new   prompt
type set type=ptr and press enter

wacky thing #1: IP addy that you query is backwards from what it is
wacky thing #2: you are querying for the backwards address in this weird
domain called in-addr.arpa.  You can think of .in-addr.arpa as being to
IP addresses the same as .com. or .org. are to domain names.  It is the
story of the whale; it's just how it is.

So, for example let's look up some aol.com PTR records...3 MX records I
see are:

mailin-01.mx.aol.cominternet address = 205.188.156.248
mailin-02.mx.aol.cominternet address = 205.188.249.91
mailin-03.mx.aol.cominternet address = 205.188.252.17

Hey, let's see if their ducks are in a row! To query the PTR record for
the first one just type this:

 248.156.188.205.in-addr.arpa

After pressing enter you should see something like this :

Non-authoritative answer:
248.156.188.205.in-addr.arpaname = dd.mx.aol.com

What!?  dd.mx.aol.com != mailin-01.mx.aol.com.  Well that's OK, aol is
probably not sending any mail out from this box here ;)  Likely, that
box is a load balancer of some type...  OK, trawling through some logs
here I do see them sending mail from host imo-d05.mx.aol.com which has an
address of 205.188.157.37.  Let's check it out!

 set type=a
 imo-d05.mx.aol.com
Server:  dns-01.ns.aol.com
Address:  64.12.51.132

Name:imo-d05.mx.aol.com
Address:  205.188.157.37

[Yup, still sitting on the same addy]

 set type=ptr
 37.157.188.205.in-addr.arpa
Server:  dns-01.ns.aol.com
Address:  64.12.51.132

37.157.188.205.in-addr.arpa name = imo-d05.mx.aol.com

[This time we have a match! AOL admins know what they're doing.]

157.188.205.in-addr.arpanameserver = dns-02.ns.aol.com
157.188.205.in-addr.arpanameserver = dns-01.ns.aol.com
dns-01.ns.aol.com   internet address = 64.12.51.132
dns-02.ns.aol.com   internet address = 205.188.157.232

So yeppers, all aol.com ducks in a row for that outbound server.  As you
can see nslookup also tells you what name servers have authority for the
address space containing 205.188.157.37.  Using a whois tool you can
lookup who has registered ownership of the IP block.  Now we're getting
off on a spam fighting tangent

if you want to script nslookup to do auditing you can use the tool like
this to query one address at a time.  Now you can loop over a whole block
of IPs that you might own in a batch file or powershell or whatever:

C:\nslookup -type=ptr 37.157.188.205.in-addr.arpa dns-01.ns.aol.com

The last argument (dns server to query) is optional. By default, nslookup
should be querying the first dns server listed in your ipconfig /all
output.  If you're at the nslookup prompt the command server
serverName|IP will do the same thing.  Check the ? command to see other
commands.  Note: -type=a would be redundant since it's the default query
type assumed and obviously -type=mx could be useful in the email world as
well.

~JasonG

-- 

~ Ninja Email Security with Cloudmark Spam Engine Gets Image Spam ~
~ http://www.sunbeltsoftware.com/Ninja~

**
Note: 
The information contained in this message may be privileged and confidential 
and 
protected from disclosure.  If the reader of this message is not the intended  
recipient, or an employee or agent responsible for delivering this message to  
the intended recipient, you are hereby notified that any dissemination,   
distribution or copying of this communication is strictly prohibited. If you  
have received this communication in error, please notify us immediately by  
replying to the message and deleting it from your computer. 
**



~ Ninja Email Security with Cloudmark Spam Engine Gets Image Spam ~
~ http://www.sunbeltsoftware.com/Ninja~



RE: Excessive Connections Between Outlook 2007 SP1 and Exchange 2003 SP2

2009-02-23 Thread Severson, Kyle M
I am still seeing the same issue after running update KB948496 (disable SNP). I 
am also running down the angle of Desktop Search, we have primarily XP SP2 
clients running WDS version 6.0.6000.16431 and some Vista SP1 running 
6.0.6001.18000. We also may have rouge installs of Google, etc.

-Original Message-
From: jamwel [mailto:jam...@gmail.com] 
Sent: Tuesday, February 10, 2009 5:26 PM
To: MS-Exchange Admin Issues
Subject: Re: Excessive Connections Between Outlook 2007 SP1 and Exchange 2003 
SP2

The disable TCP chimneying might be accurate. I haven't seen that
combo with SNP myself, but it sounds reasonable. A network trace will
show a TCP ACK flood, more than likely, if SNP is to blame.

See KB 948496 if you haven't already read it...


--James


On 2/10/09, Severson, Kyle M kyle.sever...@kcc.com wrote:
 I am seeing an excessive number of connections between some of our
 Outlook 2007 SP1 clients and Exchange 2003 SP2. Anybody else seen this?
 Microsoft isn't coming up with much other then disable TCP Chimney and
 possibly some 3rd party add-ins. Both client and server are NOT having
 performance issues.



 Most users seem to average about 4 connections, but the ones with the
 issue have between 100-300.



 Thanks,



 Kyle Severson

 Messaging Engineer

 Kimberly-Clark Corp.




 This e-mail is intended for the use of the addressee(s) only and may contain
 privileged, confidential, or proprietary information that is exempt from
 disclosure under law.  If you have received this message in error, please
 inform us promptly by reply e-mail, then delete the e-mail and destroy any
 printed copy.   Thank you.


 ~ Ninja Email Security with Cloudmark Spam Engine Gets Image Spam ~
 ~ http://www.sunbeltsoftware.com/Ninja~

-- 
Sent from my mobile device

~ Ninja Email Security with Cloudmark Spam Engine Gets Image Spam ~
~ http://www.sunbeltsoftware.com/Ninja~




 
This e-mail is intended for the use of the addressee(s) only and may contain 
privileged, confidential, or proprietary information that is exempt from 
disclosure under law.  If you have received this message in error, please 
inform us promptly by reply e-mail, then delete the e-mail and destroy any 
printed copy.   Thank you. 



~ Ninja Email Security with Cloudmark Spam Engine Gets Image Spam ~
~ http://www.sunbeltsoftware.com/Ninja~



RE: HOWTO: do reverse lookups (PTR records) with the nslookup tool

2009-02-23 Thread Exchange (Sunbelt)
Sam Spade is still good



-Original Message-
From: Jason Gurtz [mailto:jasongu...@npumail.com] 
Sent: Monday, February 23, 2009 1:23 PM
To: MS-Exchange Admin Issues
Subject: HOWTO: do reverse lookups (PTR records) with the nslookup tool

Note: the dig tool is easier and better than nslookup, but unfortunately
doesn't come with windows.  You can download the Windows port of the BIND
name server and find dig there, but that's extra steps to find out just
what dlls you also need, etc...  If you're going to do this a lot I do
recommend that you take the time to learn dig instead of nslookup.

 In the reverse DNS section of this tool, do I need to check the box?  I
 don't host my external DNS records, so I don't know what PTR records, if
 any, are out there.

Open cmd prompt. Type nslookup and press enter. At the new   prompt
type set type=ptr and press enter

wacky thing #1: IP addy that you query is backwards from what it is
wacky thing #2: you are querying for the backwards address in this weird
domain called in-addr.arpa.  You can think of .in-addr.arpa as being to
IP addresses the same as .com. or .org. are to domain names.  It is the
story of the whale; it's just how it is.

So, for example let's look up some aol.com PTR records...3 MX records I
see are:

mailin-01.mx.aol.cominternet address = 205.188.156.248
mailin-02.mx.aol.cominternet address = 205.188.249.91
mailin-03.mx.aol.cominternet address = 205.188.252.17

Hey, let's see if their ducks are in a row! To query the PTR record for
the first one just type this:

 248.156.188.205.in-addr.arpa

After pressing enter you should see something like this :

Non-authoritative answer:
248.156.188.205.in-addr.arpaname = dd.mx.aol.com

What!?  dd.mx.aol.com != mailin-01.mx.aol.com.  Well that's OK, aol is
probably not sending any mail out from this box here ;)  Likely, that
box is a load balancer of some type...  OK, trawling through some logs
here I do see them sending mail from host imo-d05.mx.aol.com which has an
address of 205.188.157.37.  Let's check it out!

 set type=a
 imo-d05.mx.aol.com
Server:  dns-01.ns.aol.com
Address:  64.12.51.132

Name:imo-d05.mx.aol.com
Address:  205.188.157.37

[Yup, still sitting on the same addy]

 set type=ptr
 37.157.188.205.in-addr.arpa
Server:  dns-01.ns.aol.com
Address:  64.12.51.132

37.157.188.205.in-addr.arpa name = imo-d05.mx.aol.com

[This time we have a match! AOL admins know what they're doing.]

157.188.205.in-addr.arpanameserver = dns-02.ns.aol.com
157.188.205.in-addr.arpanameserver = dns-01.ns.aol.com
dns-01.ns.aol.com   internet address = 64.12.51.132
dns-02.ns.aol.com   internet address = 205.188.157.232

So yeppers, all aol.com ducks in a row for that outbound server.  As you
can see nslookup also tells you what name servers have authority for the
address space containing 205.188.157.37.  Using a whois tool you can
lookup who has registered ownership of the IP block.  Now we're getting
off on a spam fighting tangent

if you want to script nslookup to do auditing you can use the tool like
this to query one address at a time.  Now you can loop over a whole block
of IPs that you might own in a batch file or powershell or whatever:

C:\nslookup -type=ptr 37.157.188.205.in-addr.arpa dns-01.ns.aol.com

The last argument (dns server to query) is optional. By default, nslookup
should be querying the first dns server listed in your ipconfig /all
output.  If you're at the nslookup prompt the command server
serverName|IP will do the same thing.  Check the ? command to see other
commands.  Note: -type=a would be redundant since it's the default query
type assumed and obviously -type=mx could be useful in the email world as
well.

~JasonG

-- 

~ Ninja Email Security with Cloudmark Spam Engine Gets Image Spam ~
~ http://www.sunbeltsoftware.com/Ninja~

~ Ninja Email Security with Cloudmark Spam Engine Gets Image Spam ~
~ http://www.sunbeltsoftware.com/Ninja~



RE: HOWTO: do reverse lookups (PTR records) with the nslookup tool

2009-02-23 Thread Don Andrews
An easier way is;

nslookup -q=ptr 205.188.156.248

-Original Message-
From: Campbell, Rob [mailto:rob_campb...@centraltechnology.net] 
Sent: Monday, February 23, 2009 9:31 AM
To: MS-Exchange Admin Issues
Subject: RE: HOWTO: do reverse lookups (PTR records) with the nslookup
tool

I ran across this over the weekend. Haven't tried it yet, but looks like
it might be good stuff.

http://huddledmasses.org/update-to-poshnet-and-get-dns/

-Original Message-
From: Jason Gurtz [mailto:jasongu...@npumail.com] 
Sent: Monday, February 23, 2009 11:23 AM
To: MS-Exchange Admin Issues
Subject: HOWTO: do reverse lookups (PTR records) with the nslookup tool

Note: the dig tool is easier and better than nslookup, but unfortunately
doesn't come with windows.  You can download the Windows port of the
BIND
name server and find dig there, but that's extra steps to find out just
what dlls you also need, etc...  If you're going to do this a lot I do
recommend that you take the time to learn dig instead of nslookup.

 In the reverse DNS section of this tool, do I need to check the box?
I
 don't host my external DNS records, so I don't know what PTR records,
if
 any, are out there.

Open cmd prompt. Type nslookup and press enter. At the new   prompt
type set type=ptr and press enter

wacky thing #1: IP addy that you query is backwards from what it is
wacky thing #2: you are querying for the backwards address in this weird
domain called in-addr.arpa.  You can think of .in-addr.arpa as being to
IP addresses the same as .com. or .org. are to domain names.  It is the
story of the whale; it's just how it is.

So, for example let's look up some aol.com PTR records...3 MX records I
see are:

mailin-01.mx.aol.cominternet address = 205.188.156.248
mailin-02.mx.aol.cominternet address = 205.188.249.91
mailin-03.mx.aol.cominternet address = 205.188.252.17

Hey, let's see if their ducks are in a row! To query the PTR record for
the first one just type this:

 248.156.188.205.in-addr.arpa

After pressing enter you should see something like this :

Non-authoritative answer:
248.156.188.205.in-addr.arpaname = dd.mx.aol.com

What!?  dd.mx.aol.com != mailin-01.mx.aol.com.  Well that's OK, aol is
probably not sending any mail out from this box here ;)  Likely, that
box is a load balancer of some type...  OK, trawling through some logs
here I do see them sending mail from host imo-d05.mx.aol.com which has
an
address of 205.188.157.37.  Let's check it out!

 set type=a
 imo-d05.mx.aol.com
Server:  dns-01.ns.aol.com
Address:  64.12.51.132

Name:imo-d05.mx.aol.com
Address:  205.188.157.37

[Yup, still sitting on the same addy]

 set type=ptr
 37.157.188.205.in-addr.arpa
Server:  dns-01.ns.aol.com
Address:  64.12.51.132

37.157.188.205.in-addr.arpa name = imo-d05.mx.aol.com

[This time we have a match! AOL admins know what they're doing.]

157.188.205.in-addr.arpanameserver = dns-02.ns.aol.com
157.188.205.in-addr.arpanameserver = dns-01.ns.aol.com
dns-01.ns.aol.com   internet address = 64.12.51.132
dns-02.ns.aol.com   internet address = 205.188.157.232

So yeppers, all aol.com ducks in a row for that outbound server.  As you
can see nslookup also tells you what name servers have authority for the
address space containing 205.188.157.37.  Using a whois tool you can
lookup who has registered ownership of the IP block.  Now we're getting
off on a spam fighting tangent

if you want to script nslookup to do auditing you can use the tool like
this to query one address at a time.  Now you can loop over a whole
block
of IPs that you might own in a batch file or powershell or whatever:

C:\nslookup -type=ptr 37.157.188.205.in-addr.arpa dns-01.ns.aol.com

The last argument (dns server to query) is optional. By default,
nslookup
should be querying the first dns server listed in your ipconfig /all
output.  If you're at the nslookup prompt the command server
serverName|IP will do the same thing.  Check the ? command to see
other
commands.  Note: -type=a would be redundant since it's the default query
type assumed and obviously -type=mx could be useful in the email world
as
well.

~JasonG

-- 

~ Ninja Email Security with Cloudmark Spam Engine Gets Image Spam ~
~ http://www.sunbeltsoftware.com/Ninja~


**
Note: 
The information contained in this message may be privileged and
confidential and 
protected from disclosure.  If the reader of this message is not the
intended  
recipient, or an employee or agent responsible for delivering this
message to  
the intended recipient, you are hereby notified that any dissemination,

distribution or copying of this communication is strictly prohibited. If
you  
have received this communication in error, please notify us immediately
by  
replying to the message and deleting it from your computer. 

RE: HOWTO: do reverse lookups (PTR records) with the nslookup tool

2009-02-23 Thread Campbell, Rob
Maybe.

Depends on what you want to do with the information after you get it.

IMHO.

-Original Message-
From: Don Andrews [mailto:don.andr...@safeway.com] 
Sent: Monday, February 23, 2009 11:47 AM
To: MS-Exchange Admin Issues
Subject: RE: HOWTO: do reverse lookups (PTR records) with the nslookup tool

An easier way is;

nslookup -q=ptr 205.188.156.248

-Original Message-
From: Campbell, Rob [mailto:rob_campb...@centraltechnology.net] 
Sent: Monday, February 23, 2009 9:31 AM
To: MS-Exchange Admin Issues
Subject: RE: HOWTO: do reverse lookups (PTR records) with the nslookup
tool

I ran across this over the weekend. Haven't tried it yet, but looks like
it might be good stuff.

http://huddledmasses.org/update-to-poshnet-and-get-dns/

-Original Message-
From: Jason Gurtz [mailto:jasongu...@npumail.com] 
Sent: Monday, February 23, 2009 11:23 AM
To: MS-Exchange Admin Issues
Subject: HOWTO: do reverse lookups (PTR records) with the nslookup tool

Note: the dig tool is easier and better than nslookup, but unfortunately
doesn't come with windows.  You can download the Windows port of the
BIND
name server and find dig there, but that's extra steps to find out just
what dlls you also need, etc...  If you're going to do this a lot I do
recommend that you take the time to learn dig instead of nslookup.

 In the reverse DNS section of this tool, do I need to check the box?
I
 don't host my external DNS records, so I don't know what PTR records,
if
 any, are out there.

Open cmd prompt. Type nslookup and press enter. At the new   prompt
type set type=ptr and press enter

wacky thing #1: IP addy that you query is backwards from what it is
wacky thing #2: you are querying for the backwards address in this weird
domain called in-addr.arpa.  You can think of .in-addr.arpa as being to
IP addresses the same as .com. or .org. are to domain names.  It is the
story of the whale; it's just how it is.

So, for example let's look up some aol.com PTR records...3 MX records I
see are:

mailin-01.mx.aol.cominternet address = 205.188.156.248
mailin-02.mx.aol.cominternet address = 205.188.249.91
mailin-03.mx.aol.cominternet address = 205.188.252.17

Hey, let's see if their ducks are in a row! To query the PTR record for
the first one just type this:

 248.156.188.205.in-addr.arpa

After pressing enter you should see something like this :

Non-authoritative answer:
248.156.188.205.in-addr.arpaname = dd.mx.aol.com

What!?  dd.mx.aol.com != mailin-01.mx.aol.com.  Well that's OK, aol is
probably not sending any mail out from this box here ;)  Likely, that
box is a load balancer of some type...  OK, trawling through some logs
here I do see them sending mail from host imo-d05.mx.aol.com which has
an
address of 205.188.157.37.  Let's check it out!

 set type=a
 imo-d05.mx.aol.com
Server:  dns-01.ns.aol.com
Address:  64.12.51.132

Name:imo-d05.mx.aol.com
Address:  205.188.157.37

[Yup, still sitting on the same addy]

 set type=ptr
 37.157.188.205.in-addr.arpa
Server:  dns-01.ns.aol.com
Address:  64.12.51.132

37.157.188.205.in-addr.arpa name = imo-d05.mx.aol.com

[This time we have a match! AOL admins know what they're doing.]

157.188.205.in-addr.arpanameserver = dns-02.ns.aol.com
157.188.205.in-addr.arpanameserver = dns-01.ns.aol.com
dns-01.ns.aol.com   internet address = 64.12.51.132
dns-02.ns.aol.com   internet address = 205.188.157.232

So yeppers, all aol.com ducks in a row for that outbound server.  As you
can see nslookup also tells you what name servers have authority for the
address space containing 205.188.157.37.  Using a whois tool you can
lookup who has registered ownership of the IP block.  Now we're getting
off on a spam fighting tangent

if you want to script nslookup to do auditing you can use the tool like
this to query one address at a time.  Now you can loop over a whole
block
of IPs that you might own in a batch file or powershell or whatever:

C:\nslookup -type=ptr 37.157.188.205.in-addr.arpa dns-01.ns.aol.com

The last argument (dns server to query) is optional. By default,
nslookup
should be querying the first dns server listed in your ipconfig /all
output.  If you're at the nslookup prompt the command server
serverName|IP will do the same thing.  Check the ? command to see
other
commands.  Note: -type=a would be redundant since it's the default query
type assumed and obviously -type=mx could be useful in the email world
as
well.

~JasonG

-- 

~ Ninja Email Security with Cloudmark Spam Engine Gets Image Spam ~
~ http://www.sunbeltsoftware.com/Ninja~


**
Note: 
The information contained in this message may be privileged and
confidential and 
protected from disclosure.  If the reader of this message is not the
intended  
recipient, or an employee or agent responsible for delivering this
message to  
the intended recipient, you are hereby 

RE: HOWTO: do reverse lookups (PTR records) with the nslookup tool

2009-02-23 Thread Don Andrews
True 'nough - but for the basic question (don't know what PTR records
are out there) - running this against the sending IPs will give the
answer.

-Original Message-
From: Campbell, Rob [mailto:rob_campb...@centraltechnology.net] 
Sent: Monday, February 23, 2009 9:56 AM
To: MS-Exchange Admin Issues
Subject: RE: HOWTO: do reverse lookups (PTR records) with the nslookup
tool

Maybe.

Depends on what you want to do with the information after you get it.

IMHO.

-Original Message-
From: Don Andrews [mailto:don.andr...@safeway.com] 
Sent: Monday, February 23, 2009 11:47 AM
To: MS-Exchange Admin Issues
Subject: RE: HOWTO: do reverse lookups (PTR records) with the nslookup
tool

An easier way is;

nslookup -q=ptr 205.188.156.248

-Original Message-
From: Campbell, Rob [mailto:rob_campb...@centraltechnology.net] 
Sent: Monday, February 23, 2009 9:31 AM
To: MS-Exchange Admin Issues
Subject: RE: HOWTO: do reverse lookups (PTR records) with the nslookup
tool

I ran across this over the weekend. Haven't tried it yet, but looks like
it might be good stuff.

http://huddledmasses.org/update-to-poshnet-and-get-dns/

-Original Message-
From: Jason Gurtz [mailto:jasongu...@npumail.com] 
Sent: Monday, February 23, 2009 11:23 AM
To: MS-Exchange Admin Issues
Subject: HOWTO: do reverse lookups (PTR records) with the nslookup tool

Note: the dig tool is easier and better than nslookup, but unfortunately
doesn't come with windows.  You can download the Windows port of the
BIND
name server and find dig there, but that's extra steps to find out just
what dlls you also need, etc...  If you're going to do this a lot I do
recommend that you take the time to learn dig instead of nslookup.

 In the reverse DNS section of this tool, do I need to check the box?
I
 don't host my external DNS records, so I don't know what PTR records,
if
 any, are out there.

Open cmd prompt. Type nslookup and press enter. At the new   prompt
type set type=ptr and press enter

wacky thing #1: IP addy that you query is backwards from what it is
wacky thing #2: you are querying for the backwards address in this weird
domain called in-addr.arpa.  You can think of .in-addr.arpa as being to
IP addresses the same as .com. or .org. are to domain names.  It is the
story of the whale; it's just how it is.

So, for example let's look up some aol.com PTR records...3 MX records I
see are:

mailin-01.mx.aol.cominternet address = 205.188.156.248
mailin-02.mx.aol.cominternet address = 205.188.249.91
mailin-03.mx.aol.cominternet address = 205.188.252.17

Hey, let's see if their ducks are in a row! To query the PTR record for
the first one just type this:

 248.156.188.205.in-addr.arpa

After pressing enter you should see something like this :

Non-authoritative answer:
248.156.188.205.in-addr.arpaname = dd.mx.aol.com

What!?  dd.mx.aol.com != mailin-01.mx.aol.com.  Well that's OK, aol is
probably not sending any mail out from this box here ;)  Likely, that
box is a load balancer of some type...  OK, trawling through some logs
here I do see them sending mail from host imo-d05.mx.aol.com which has
an
address of 205.188.157.37.  Let's check it out!

 set type=a
 imo-d05.mx.aol.com
Server:  dns-01.ns.aol.com
Address:  64.12.51.132

Name:imo-d05.mx.aol.com
Address:  205.188.157.37

[Yup, still sitting on the same addy]

 set type=ptr
 37.157.188.205.in-addr.arpa
Server:  dns-01.ns.aol.com
Address:  64.12.51.132

37.157.188.205.in-addr.arpa name = imo-d05.mx.aol.com

[This time we have a match! AOL admins know what they're doing.]

157.188.205.in-addr.arpanameserver = dns-02.ns.aol.com
157.188.205.in-addr.arpanameserver = dns-01.ns.aol.com
dns-01.ns.aol.com   internet address = 64.12.51.132
dns-02.ns.aol.com   internet address = 205.188.157.232

So yeppers, all aol.com ducks in a row for that outbound server.  As you
can see nslookup also tells you what name servers have authority for the
address space containing 205.188.157.37.  Using a whois tool you can
lookup who has registered ownership of the IP block.  Now we're getting
off on a spam fighting tangent

if you want to script nslookup to do auditing you can use the tool like
this to query one address at a time.  Now you can loop over a whole
block
of IPs that you might own in a batch file or powershell or whatever:

C:\nslookup -type=ptr 37.157.188.205.in-addr.arpa dns-01.ns.aol.com

The last argument (dns server to query) is optional. By default,
nslookup
should be querying the first dns server listed in your ipconfig /all
output.  If you're at the nslookup prompt the command server
serverName|IP will do the same thing.  Check the ? command to see
other
commands.  Note: -type=a would be redundant since it's the default query
type assumed and obviously -type=mx could be useful in the email world
as
well.

~JasonG

-- 

~ Ninja Email Security with Cloudmark Spam Engine Gets Image Spam ~
~ http://www.sunbeltsoftware.com/Ninja~


RE: HOWTO: do reverse lookups (PTR records) with the nslookup tool

2009-02-23 Thread Maglinger, Paul
Oh... NOW you've done it!  Ya broke the website...

Internet Explorer cannot display the webpage 
   
   Most likely causes:
You are not connected to the Internet. 
The website is encountering problems. 
There might be a typing error in the address. 
 
   What you can try: 
 Diagnose Connection Problems  
 
 More information 

This problem can be caused by a variety of issues, including: 

Internet connectivity has been lost. 
The website is temporarily unavailable. 
The Domain Name Server (DNS) is not reachable. 
The Domain Name Server (DNS) does not have a listing for the website's
domain. 
If this is an HTTPS (secure) address, click Tools, click Internet
Options, click Advanced, and check to be sure the SSL and TLS protocols
are enabled under the security section. 

For offline users

You can still view subscribed feeds and some recently viewed webpages.
To view subscribed feeds 

Click the Favorites Center button , click Feeds, and then click the feed
you want to view. 

To view recently visited webpages (might not work on all pages) 

Click Tools , and then click Work Offline. 
Click the Favorites Center button , click History, and then click the
page you want to view. 



-Original Message-
From: Campbell, Rob [mailto:rob_campb...@centraltechnology.net] 
Sent: Monday, February 23, 2009 11:31 AM
To: MS-Exchange Admin Issues
Subject: RE: HOWTO: do reverse lookups (PTR records) with the nslookup
tool

I ran across this over the weekend. Haven't tried it yet, but looks like
it might be good stuff.

http://huddledmasses.org/update-to-poshnet-and-get-dns/

-Original Message-
From: Jason Gurtz [mailto:jasongu...@npumail.com] 
Sent: Monday, February 23, 2009 11:23 AM
To: MS-Exchange Admin Issues
Subject: HOWTO: do reverse lookups (PTR records) with the nslookup tool

Note: the dig tool is easier and better than nslookup, but unfortunately
doesn't come with windows.  You can download the Windows port of the
BIND
name server and find dig there, but that's extra steps to find out just
what dlls you also need, etc...  If you're going to do this a lot I do
recommend that you take the time to learn dig instead of nslookup.

 In the reverse DNS section of this tool, do I need to check the box?
I
 don't host my external DNS records, so I don't know what PTR records,
if
 any, are out there.

Open cmd prompt. Type nslookup and press enter. At the new   prompt
type set type=ptr and press enter

wacky thing #1: IP addy that you query is backwards from what it is
wacky thing #2: you are querying for the backwards address in this weird
domain called in-addr.arpa.  You can think of .in-addr.arpa as being to
IP addresses the same as .com. or .org. are to domain names.  It is the
story of the whale; it's just how it is.

So, for example let's look up some aol.com PTR records...3 MX records I
see are:

mailin-01.mx.aol.cominternet address = 205.188.156.248
mailin-02.mx.aol.cominternet address = 205.188.249.91
mailin-03.mx.aol.cominternet address = 205.188.252.17

Hey, let's see if their ducks are in a row! To query the PTR record for
the first one just type this:

 248.156.188.205.in-addr.arpa

After pressing enter you should see something like this :

Non-authoritative answer:
248.156.188.205.in-addr.arpaname = dd.mx.aol.com

What!?  dd.mx.aol.com != mailin-01.mx.aol.com.  Well that's OK, aol is
probably not sending any mail out from this box here ;)  Likely, that
box is a load balancer of some type...  OK, trawling through some logs
here I do see them sending mail from host imo-d05.mx.aol.com which has
an
address of 205.188.157.37.  Let's check it out!

 set type=a
 imo-d05.mx.aol.com
Server:  dns-01.ns.aol.com
Address:  64.12.51.132

Name:imo-d05.mx.aol.com
Address:  205.188.157.37

[Yup, still sitting on the same addy]

 set type=ptr
 37.157.188.205.in-addr.arpa
Server:  dns-01.ns.aol.com
Address:  64.12.51.132

37.157.188.205.in-addr.arpa name = imo-d05.mx.aol.com

[This time we have a match! AOL admins know what they're doing.]

157.188.205.in-addr.arpanameserver = dns-02.ns.aol.com
157.188.205.in-addr.arpanameserver = dns-01.ns.aol.com
dns-01.ns.aol.com   internet address = 64.12.51.132
dns-02.ns.aol.com   internet address = 205.188.157.232

So yeppers, all aol.com ducks in a row for that outbound server.  As you
can see nslookup also tells you what name servers have authority for the
address space containing 205.188.157.37.  Using a whois tool you can
lookup who has registered ownership of the IP block.  Now we're getting
off on a spam fighting tangent

if you want to script nslookup to do auditing you can use the tool like
this to query one address at a time.  Now you can loop over a whole
block
of IPs that you might own in a batch file or powershell or whatever:

C:\nslookup -type=ptr 37.157.188.205.in-addr.arpa dns-01.ns.aol.com

The last argument (dns server to query) is optional. By default,
nslookup
should be querying the first dns server listed in 

RE: HOWTO: do reverse lookups (PTR records) with the nslookup tool

2009-02-23 Thread Jason Gurtz
The canonical http://downforeveryoneorjustme.com/

 -Original Message-
 From: Campbell, Rob [mailto:rob_campb...@centraltechnology.net]
 Sent: Monday, February 23, 2009 13:07
 To: MS-Exchange Admin Issues
 Subject: RE: HOWTO: do reverse lookups (PTR records) with the nslookup
 tool
 
 It works for me
 
 -Original Message-
 From: Maglinger, Paul [mailto:pmaglin...@scvl.com]
 Sent: Monday, February 23, 2009 12:05 PM
 To: MS-Exchange Admin Issues
 Subject: RE: HOWTO: do reverse lookups (PTR records) with the nslookup
 tool
 
 Oh... NOW you've done it!  Ya broke the website...
 
 Internet Explorer cannot display the webpage
 
Most likely causes:
 You are not connected to the Internet.
 The website is encountering problems.
 There might be a typing error in the address.
 
What you can try:
  Diagnose Connection Problems
 
  More information
 
 This problem can be caused by a variety of issues, including:
 
 Internet connectivity has been lost.
 The website is temporarily unavailable.
 The Domain Name Server (DNS) is not reachable.
 The Domain Name Server (DNS) does not have a listing for the website's
 domain.
 If this is an HTTPS (secure) address, click Tools, click Internet
 Options, click Advanced, and check to be sure the SSL and TLS protocols
 are enabled under the security section.
 
 For offline users
 
 You can still view subscribed feeds and some recently viewed webpages.
 To view subscribed feeds
 
 Click the Favorites Center button , click Feeds, and then click the feed
 you want to view.
 
 To view recently visited webpages (might not work on all pages)
 
 Click Tools , and then click Work Offline.
 Click the Favorites Center button , click History, and then click the
 page you want to view.
 
 
 
 -Original Message-
 From: Campbell, Rob [mailto:rob_campb...@centraltechnology.net]
 Sent: Monday, February 23, 2009 11:31 AM
 To: MS-Exchange Admin Issues
 Subject: RE: HOWTO: do reverse lookups (PTR records) with the nslookup
 tool
 
 I ran across this over the weekend. Haven't tried it yet, but looks like
 it might be good stuff.
 
 http://huddledmasses.org/update-to-poshnet-and-get-dns/
 
 -Original Message-
 From: Jason Gurtz [mailto:jasongu...@npumail.com]
 Sent: Monday, February 23, 2009 11:23 AM
 To: MS-Exchange Admin Issues
 Subject: HOWTO: do reverse lookups (PTR records) with the nslookup tool
 
 Note: the dig tool is easier and better than nslookup, but unfortunately
 doesn't come with windows.  You can download the Windows port of the
 BIND
 name server and find dig there, but that's extra steps to find out just
 what dlls you also need, etc...  If you're going to do this a lot I do
 recommend that you take the time to learn dig instead of nslookup.
 
  In the reverse DNS section of this tool, do I need to check the box?
 I
  don't host my external DNS records, so I don't know what PTR records,
 if
  any, are out there.
 
 Open cmd prompt. Type nslookup and press enter. At the new   prompt
 type set type=ptr and press enter
 
 wacky thing #1: IP addy that you query is backwards from what it is
 wacky thing #2: you are querying for the backwards address in this weird
 domain called in-addr.arpa.  You can think of .in-addr.arpa as being to
 IP addresses the same as .com. or .org. are to domain names.  It is the
 story of the whale; it's just how it is.
 
 So, for example let's look up some aol.com PTR records...3 MX records I
 see are:
 
 mailin-01.mx.aol.cominternet address = 205.188.156.248
 mailin-02.mx.aol.cominternet address = 205.188.249.91
 mailin-03.mx.aol.cominternet address = 205.188.252.17
 
 Hey, let's see if their ducks are in a row! To query the PTR record for
 the first one just type this:
 
  248.156.188.205.in-addr.arpa
 
 After pressing enter you should see something like this :
 
 Non-authoritative answer:
 248.156.188.205.in-addr.arpaname = dd.mx.aol.com
 
 What!?  dd.mx.aol.com != mailin-01.mx.aol.com.  Well that's OK, aol is
 probably not sending any mail out from this box here ;)  Likely, that
 box is a load balancer of some type...  OK, trawling through some logs
 here I do see them sending mail from host imo-d05.mx.aol.com which has
 an
 address of 205.188.157.37.  Let's check it out!
 
  set type=a
  imo-d05.mx.aol.com
 Server:  dns-01.ns.aol.com
 Address:  64.12.51.132
 
 Name:imo-d05.mx.aol.com
 Address:  205.188.157.37
 
 [Yup, still sitting on the same addy]
 
  set type=ptr
  37.157.188.205.in-addr.arpa
 Server:  dns-01.ns.aol.com
 Address:  64.12.51.132
 
 37.157.188.205.in-addr.arpa name = imo-d05.mx.aol.com
 
 [This time we have a match! AOL admins know what they're doing.]
 
 157.188.205.in-addr.arpanameserver = dns-02.ns.aol.com
 157.188.205.in-addr.arpanameserver = dns-01.ns.aol.com
 dns-01.ns.aol.com   internet address = 64.12.51.132
 dns-02.ns.aol.com   internet address = 205.188.157.232
 
 So yeppers, all aol.com ducks in a row for that outbound server.  As you
 can 

RE: HOWTO: do reverse lookups (PTR records) with the nslookup tool

2009-02-23 Thread Jason Gurtz
Very nice!

 -Original Message-
 From: Kurt Buff [mailto:kurt.b...@gmail.com]
 Sent: Monday, February 23, 2009 13:52
 To: MS-Exchange Admin Issues
 Subject: Re: HOWTO: do reverse lookups (PTR records) with the nslookup
 tool
 
 A Win32 version of digL http://members.shaw.ca/nicholas.fong/dig/
 
 On Mon, Feb 23, 2009 at 09:23, Jason Gurtz jasongu...@npumail.com
 wrote:
  Note: the dig tool is easier and better than nslookup, but
 unfortunately
  doesn't come with windows.  You can download the Windows port of the
 BIND
  name server and find dig there, but that's extra steps to find out
just
  what dlls you also need, etc...  If you're going to do this a lot I do
  recommend that you take the time to learn dig instead of nslookup.
 
  In the reverse DNS section of this tool, do I need to check the box?
 I
  don't host my external DNS records, so I don't know what PTR records,
 if
  any, are out there.
 
  Open cmd prompt. Type nslookup and press enter. At the new   prompt
  type set type=ptr and press enter
 
  wacky thing #1: IP addy that you query is backwards from what it is
  wacky thing #2: you are querying for the backwards address in this
 weird
  domain called in-addr.arpa.  You can think of .in-addr.arpa as being
to
  IP addresses the same as .com. or .org. are to domain names.  It is
the
  story of the whale; it's just how it is.
 
  So, for example let's look up some aol.com PTR records...3 MX records
I
  see are:
 
  mailin-01.mx.aol.cominternet address = 205.188.156.248
  mailin-02.mx.aol.cominternet address = 205.188.249.91
  mailin-03.mx.aol.cominternet address = 205.188.252.17
 
  Hey, let's see if their ducks are in a row! To query the PTR record
for
  the first one just type this:
 
  248.156.188.205.in-addr.arpa
 
  After pressing enter you should see something like this :
 
  Non-authoritative answer:
  248.156.188.205.in-addr.arpaname = dd.mx.aol.com
 
  What!?  dd.mx.aol.com != mailin-01.mx.aol.com.  Well that's OK, aol is
  probably not sending any mail out from this box here ;)  Likely, that
  box is a load balancer of some type...  OK, trawling through some
 logs
  here I do see them sending mail from host imo-d05.mx.aol.com which has
 an
  address of 205.188.157.37.  Let's check it out!
 
  set type=a
  imo-d05.mx.aol.com
  Server:  dns-01.ns.aol.com
  Address:  64.12.51.132
 
  Name:imo-d05.mx.aol.com
  Address:  205.188.157.37
 
  [Yup, still sitting on the same addy]
 
  set type=ptr
  37.157.188.205.in-addr.arpa
  Server:  dns-01.ns.aol.com
  Address:  64.12.51.132
 
  37.157.188.205.in-addr.arpa name = imo-d05.mx.aol.com
 
  [This time we have a match! AOL admins know what they're doing.]
 
  157.188.205.in-addr.arpanameserver = dns-02.ns.aol.com
  157.188.205.in-addr.arpanameserver = dns-01.ns.aol.com
  dns-01.ns.aol.com   internet address = 64.12.51.132
  dns-02.ns.aol.com   internet address = 205.188.157.232
 
  So yeppers, all aol.com ducks in a row for that outbound server.  As
 you
  can see nslookup also tells you what name servers have authority for
 the
  address space containing 205.188.157.37.  Using a whois tool you can
  lookup who has registered ownership of the IP block.  Now we're
getting
  off on a spam fighting tangent
 
  if you want to script nslookup to do auditing you can use the tool
like
  this to query one address at a time.  Now you can loop over a whole
 block
  of IPs that you might own in a batch file or powershell or whatever:
 
  C:\nslookup -type=ptr 37.157.188.205.in-addr.arpa dns-01.ns.aol.com
 
  The last argument (dns server to query) is optional. By default,
 nslookup
  should be querying the first dns server listed in your ipconfig /all
  output.  If you're at the nslookup prompt the command server
  serverName|IP will do the same thing.  Check the ? command to see
 other
  commands.  Note: -type=a would be redundant since it's the default
 query
  type assumed and obviously -type=mx could be useful in the email world
 as
  well.
 
  ~JasonG
 
  --
 
  ~ Ninja Email Security with Cloudmark Spam Engine Gets Image Spam ~
  ~ http://www.sunbeltsoftware.com/Ninja~
 
 
 ~ Ninja Email Security with Cloudmark Spam Engine Gets Image Spam ~
 ~ http://www.sunbeltsoftware.com/Ninja~

~ Ninja Email Security with Cloudmark Spam Engine Gets Image Spam ~
~ http://www.sunbeltsoftware.com/Ninja~

RE: backscatter issue

2009-02-23 Thread John Hornbuckle
Sounds promising, but not widely-implemented (or, apparently, an option with 
Exchange without 3rd party software).



John Hornbuckle
MIS Department
Taylor County School District
318 North Clark Street
Perry, FL 32347

www.taylor.k12.fl.us




-Original Message-
From: Jason Gurtz [mailto:jasongu...@npumail.com] 
Sent: Friday, February 13, 2009 4:34 PM
To: MS-Exchange Admin Issues
Subject: RE: backscatter issue

 What I came up with based on feedback from this list and some research I
 did was that not a heck of a lot can be done about it.

BATV will take care of this in 99% of cases.
http://en.wikipedia.org/wiki/Bounce_Address_Tag_Validation and
http://mipassoc.org/batv/ explain in detail.

~JasonG


~ Ninja Email Security with Cloudmark Spam Engine Gets Image Spam ~
~ http://www.sunbeltsoftware.com/Ninja~

~ Ninja Email Security with Cloudmark Spam Engine Gets Image Spam ~
~ http://www.sunbeltsoftware.com/Ninja~



outlook locking up

2009-02-23 Thread DAVID SMITH
I have a problem with outlook locking up when you try to delete mutiple 
documents at one time.  We use outlook 2003 on a xp workstation.  It is not in 
cache mode.  I have uninstalled outlook and installed it again and it still did 
not fix the problem.  It will let me empty the recycle bin at one time but it 
want not let me delete mutiple documents that I select.  I don't know what else 
to do.  Does anyone have any suggestions.
~ Ninja Email Security with Cloudmark Spam Engine Gets Image Spam ~
~ http://www.sunbeltsoftware.com/Ninja~


Re: HOWTO: do reverse lookups (PTR records) with the nslookup tool

2009-02-23 Thread Kurt Buff
Google is your friend...

On Mon, Feb 23, 2009 at 11:45, Jason Gurtz jasongu...@npumail.com wrote:
 Very nice!

 -Original Message-
 From: Kurt Buff [mailto:kurt.b...@gmail.com]
 Sent: Monday, February 23, 2009 13:52
 To: MS-Exchange Admin Issues
 Subject: Re: HOWTO: do reverse lookups (PTR records) with the nslookup
 tool

 A Win32 version of digL http://members.shaw.ca/nicholas.fong/dig/

 On Mon, Feb 23, 2009 at 09:23, Jason Gurtz jasongu...@npumail.com
 wrote:
  Note: the dig tool is easier and better than nslookup, but
 unfortunately
  doesn't come with windows.  You can download the Windows port of the
 BIND
  name server and find dig there, but that's extra steps to find out
 just
  what dlls you also need, etc...  If you're going to do this a lot I do
  recommend that you take the time to learn dig instead of nslookup.
 
  In the reverse DNS section of this tool, do I need to check the box?
 I
  don't host my external DNS records, so I don't know what PTR records,
 if
  any, are out there.
 
  Open cmd prompt. Type nslookup and press enter. At the new   prompt
  type set type=ptr and press enter
 
  wacky thing #1: IP addy that you query is backwards from what it is
  wacky thing #2: you are querying for the backwards address in this
 weird
  domain called in-addr.arpa.  You can think of .in-addr.arpa as being
 to
  IP addresses the same as .com. or .org. are to domain names.  It is
 the
  story of the whale; it's just how it is.
 
  So, for example let's look up some aol.com PTR records...3 MX records
 I
  see are:
 
  mailin-01.mx.aol.cominternet address = 205.188.156.248
  mailin-02.mx.aol.cominternet address = 205.188.249.91
  mailin-03.mx.aol.cominternet address = 205.188.252.17
 
  Hey, let's see if their ducks are in a row! To query the PTR record
 for
  the first one just type this:
 
  248.156.188.205.in-addr.arpa
 
  After pressing enter you should see something like this :
 
  Non-authoritative answer:
  248.156.188.205.in-addr.arpaname = dd.mx.aol.com
 
  What!?  dd.mx.aol.com != mailin-01.mx.aol.com.  Well that's OK, aol is
  probably not sending any mail out from this box here ;)  Likely, that
  box is a load balancer of some type...  OK, trawling through some
 logs
  here I do see them sending mail from host imo-d05.mx.aol.com which has
 an
  address of 205.188.157.37.  Let's check it out!
 
  set type=a
  imo-d05.mx.aol.com
  Server:  dns-01.ns.aol.com
  Address:  64.12.51.132
 
  Name:imo-d05.mx.aol.com
  Address:  205.188.157.37
 
  [Yup, still sitting on the same addy]
 
  set type=ptr
  37.157.188.205.in-addr.arpa
  Server:  dns-01.ns.aol.com
  Address:  64.12.51.132
 
  37.157.188.205.in-addr.arpa name = imo-d05.mx.aol.com
 
  [This time we have a match! AOL admins know what they're doing.]
 
  157.188.205.in-addr.arpanameserver = dns-02.ns.aol.com
  157.188.205.in-addr.arpanameserver = dns-01.ns.aol.com
  dns-01.ns.aol.com   internet address = 64.12.51.132
  dns-02.ns.aol.com   internet address = 205.188.157.232
 
  So yeppers, all aol.com ducks in a row for that outbound server.  As
 you
  can see nslookup also tells you what name servers have authority for
 the
  address space containing 205.188.157.37.  Using a whois tool you can
  lookup who has registered ownership of the IP block.  Now we're
 getting
  off on a spam fighting tangent
 
  if you want to script nslookup to do auditing you can use the tool
 like
  this to query one address at a time.  Now you can loop over a whole
 block
  of IPs that you might own in a batch file or powershell or whatever:
 
  C:\nslookup -type=ptr 37.157.188.205.in-addr.arpa dns-01.ns.aol.com
 
  The last argument (dns server to query) is optional. By default,
 nslookup
  should be querying the first dns server listed in your ipconfig /all
  output.  If you're at the nslookup prompt the command server
  serverName|IP will do the same thing.  Check the ? command to see
 other
  commands.  Note: -type=a would be redundant since it's the default
 query
  type assumed and obviously -type=mx could be useful in the email world
 as
  well.
 
  ~JasonG
 
  --
 
  ~ Ninja Email Security with Cloudmark Spam Engine Gets Image Spam ~
  ~ http://www.sunbeltsoftware.com/Ninja~
 

 ~ Ninja Email Security with Cloudmark Spam Engine Gets Image Spam ~
 ~ http://www.sunbeltsoftware.com/Ninja~

 ~ Ninja Email Security with Cloudmark Spam Engine Gets Image Spam ~
 ~ http://www.sunbeltsoftware.com/Ninja~

~ Ninja Email Security with Cloudmark Spam Engine Gets Image Spam ~
~ http://www.sunbeltsoftware.com/Ninja~


RE: outlook locking up

2009-02-23 Thread Campbell, Rob
Does it consistently lock up deleting multiple itmes (ie does it lock up if you 
just try to delete 2 at once)?

Normally, I'd suspect a corrupted email somewhere in the block of items you're 
trying to delete.  

Possible solutions are to try it with OWA, or move to mailbox to another mail 
store, and tell it to skip corrupted items during the move.

-Original Message-
From: DAVID SMITH [mailto:davidsm...@dritz.com] 
Sent: Monday, February 23, 2009 2:30 PM
To: MS-Exchange Admin Issues
Subject: outlook locking up

I have a problem with outlook locking up when you try to delete mutiple 
documents at one time.  We use outlook 2003 on a xp workstation.  It is not in 
cache mode.  I have uninstalled outlook and installed it again and it still did 
not fix the problem.  It will let me empty the recycle bin at one time but it 
want not let me delete mutiple documents that I select.  I don't know what else 
to do.  Does anyone have any suggestions.
~ Ninja Email Security with Cloudmark Spam Engine Gets Image Spam ~
~ http://www.sunbeltsoftware.com/Ninja~

**
Note: 
The information contained in this message may be privileged and confidential 
and 
protected from disclosure.  If the reader of this message is not the intended  
recipient, or an employee or agent responsible for delivering this message to  
the intended recipient, you are hereby notified that any dissemination,   
distribution or copying of this communication is strictly prohibited. If you  
have received this communication in error, please notify us immediately by  
replying to the message and deleting it from your computer. 
**



~ Ninja Email Security with Cloudmark Spam Engine Gets Image Spam ~
~ http://www.sunbeltsoftware.com/Ninja~



RE: backscatter issue

2009-02-23 Thread Jason Gurtz
Yea, this is something you'd implement in front of your exchange box on a
mail gateway.  It is actually widely implemented but, as you've found, not
on Exchange servers, which is too bad since it's a very effective solution
with little side effects.

If you're a smallish shop with the right knowledge (Linux, etc...) you can
put this together for next to free on spare hardware.  It all depends on
management, abilities, and how bad the itch is.

 -Original Message-
 From: John Hornbuckle [mailto:john.hornbuc...@taylor.k12.fl.us]
 Sent: Monday, February 23, 2009 15:12
 To: MS-Exchange Admin Issues
 Subject: RE: backscatter issue
 
 Sounds promising, but not widely-implemented (or, apparently, an option
 with Exchange without 3rd party software).
 
 
 
 John Hornbuckle
 MIS Department
 Taylor County School District
 318 North Clark Street
 Perry, FL 32347
 
 www.taylor.k12.fl.us
 
 
 
 
 -Original Message-
 From: Jason Gurtz [mailto:jasongu...@npumail.com]
 Sent: Friday, February 13, 2009 4:34 PM
 To: MS-Exchange Admin Issues
 Subject: RE: backscatter issue
 
  What I came up with based on feedback from this list and some research
 I
  did was that not a heck of a lot can be done about it.
 
 BATV will take care of this in 99% of cases.
 http://en.wikipedia.org/wiki/Bounce_Address_Tag_Validation and
 http://mipassoc.org/batv/ explain in detail.
 
 ~JasonG
 
 
 ~ Ninja Email Security with Cloudmark Spam Engine Gets Image Spam ~
 ~ http://www.sunbeltsoftware.com/Ninja~
 
 ~ Ninja Email Security with Cloudmark Spam Engine Gets Image Spam ~
 ~ http://www.sunbeltsoftware.com/Ninja~


~ Ninja Email Security with Cloudmark Spam Engine Gets Image Spam ~
~ http://www.sunbeltsoftware.com/Ninja~


RE: OAB 0X8004010F Error

2009-02-23 Thread Sam Cayze
Oddly enough, I noticed these errors just stopped as of yesterday.  I
have not changed anything since Jan 28th.  I finally have a current OAB.
 
Weird a$$ Exchange.



From: Sam Cayze [mailto:sam.ca...@rollouts.com] 
Sent: Wednesday, January 28, 2009 2:00 PM
To: MS-Exchange Admin Issues
Subject: RE: OAB 0X8004010F Error


Nope



From: KevinM [mailto:kev...@wlkmmas.org] 
Sent: Wednesday, January 28, 2009 1:45 PM
To: MS-Exchange Admin Issues
Subject: RE: OAB 0X8004010F Error



Do you have Exchange clustered? 

 

From: Sam Cayze [mailto:sam.ca...@rollouts.com] 
Sent: Wednesday, January 28, 2009 9:11 AM
To: MS-Exchange Admin Issues
Subject: RE: OAB 0X8004010F Error

 

Total oops!  

 

Everything is 2003 (Client, server, network, outlook), SP2 on exch,
single/no replicas.

 

Public folder structure:

 

 

'New' is a test OAB I created last night to make sure changes were being
updated to the system folders.  Not sure what the EX:/ folder is all
about.  Dates on the contents are very very old.

 



From: Michael B. Smith [mailto:mich...@theessentialexchange.com] 
Sent: Wednesday, January 28, 2009 11:05 AM
To: MS-Exchange Admin Issues
Subject: RE: OAB 0X8004010F Error

Exchange version and backend topology? (And yes, it may be relevant)

 

Regards,

 

Michael B. Smith, MCITP:SA,EMA/MCSE/Exchange MVP

My blog: http://TheEssentialExchange.com/blogs/michael

I'll be at TEC'2009! http://www.tec2009.com/vegas/index.php

 

From: Sam Cayze [mailto:sam.ca...@rollouts.com] 
Sent: Wednesday, January 28, 2009 11:37 AM
To: MS-Exchange Admin Issues
Subject: OAB 0X8004010F Error

 

Yes, the famous 0X8004010F error.  Tons of info on the web, I know, but
here is a twist that I can't find any information about online:

 

I only get the download OAB error if I can connected via TCP/IP.  If I
am connected via HTTPS, the OAB download works great...

 

I have done all the basis OAB error checking, rebuilt it, checked the
public/system folders, made sure an oab is selected for the storage
group..

 

 

Anyone know of a good place to start looking?

 

Tia!

 

Sam

 

 

 

 

 

 


 


 


~ Ninja Email Security with Cloudmark Spam Engine Gets Image Spam ~
~ http://www.sunbeltsoftware.com/Ninja~image001.jpg

RE: OAB 0X8004010F Error

2009-02-23 Thread Roger Wright
I was plagued with this issue recently.  

End up deleting the OAB(s), recreating it, rebuilding it, then
reassigning it on each Exchange DB.

 

   

 

Roger Wright

Network Administrator

Evatone, Inc.

727.572.7076  x388

_  

 

From: Sam Cayze [mailto:sam.ca...@rollouts.com] 
Sent: Monday, February 23, 2009 4:54 PM
To: MS-Exchange Admin Issues
Subject: RE: OAB 0X8004010F Error

 

Oddly enough, I noticed these errors just stopped as of yesterday.  I
have not changed anything since Jan 28th.  I finally have a current OAB.

 

Weird a$$ Exchange.

 



From: Sam Cayze [mailto:sam.ca...@rollouts.com] 
Sent: Wednesday, January 28, 2009 2:00 PM
To: MS-Exchange Admin Issues
Subject: RE: OAB 0X8004010F Error

Nope

 



From: KevinM [mailto:kev...@wlkmmas.org] 
Sent: Wednesday, January 28, 2009 1:45 PM
To: MS-Exchange Admin Issues
Subject: RE: OAB 0X8004010F Error

Do you have Exchange clustered? 

 

From: Sam Cayze [mailto:sam.ca...@rollouts.com] 
Sent: Wednesday, January 28, 2009 9:11 AM
To: MS-Exchange Admin Issues
Subject: RE: OAB 0X8004010F Error

 

Total oops!  

 

Everything is 2003 (Client, server, network, outlook), SP2 on exch,
single/no replicas.

 

Public folder structure:

 

 

'New' is a test OAB I created last night to make sure changes were being
updated to the system folders.  Not sure what the EX:/ folder is all
about.  Dates on the contents are very very old.

 



From: Michael B. Smith [mailto:mich...@theessentialexchange.com] 
Sent: Wednesday, January 28, 2009 11:05 AM
To: MS-Exchange Admin Issues
Subject: RE: OAB 0X8004010F Error

Exchange version and backend topology? (And yes, it may be relevant)

 

Regards,

 

Michael B. Smith, MCITP:SA,EMA/MCSE/Exchange MVP

My blog: http://TheEssentialExchange.com/blogs/michael

I'll be at TEC'2009! http://www.tec2009.com/vegas/index.php

 

From: Sam Cayze [mailto:sam.ca...@rollouts.com] 
Sent: Wednesday, January 28, 2009 11:37 AM
To: MS-Exchange Admin Issues
Subject: OAB 0X8004010F Error

 

Yes, the famous 0X8004010F error.  Tons of info on the web, I know, but
here is a twist that I can't find any information about online:

 

I only get the download OAB error if I can connected via TCP/IP.  If I
am connected via HTTPS, the OAB download works great...

 

I have done all the basis OAB error checking, rebuilt it, checked the
public/system folders, made sure an oab is selected for the storage
group..

 

 

Anyone know of a good place to start looking?

 

Tia!

 

Sam

 

 

 

 

 

 

 

 

 

 

 

 


~ Ninja Email Security with Cloudmark Spam Engine Gets Image Spam ~
~ http://www.sunbeltsoftware.com/Ninja~image001.jpg

RE: OAB 0X8004010F Error

2009-02-23 Thread Sam Cayze
Those are just some of the things I tried on Jan 28th :)



From: Roger Wright [mailto:rwri...@evatone.com] 
Sent: Monday, February 23, 2009 4:11 PM
To: MS-Exchange Admin Issues
Subject: RE: OAB 0X8004010F Error



I was plagued with this issue recently.  

End up deleting the OAB(s), recreating it, rebuilding it, then
reassigning it on each Exchange DB.

 

   

 

Roger Wright

Network Administrator

Evatone, Inc.

727.572.7076  x388

_  

 

From: Sam Cayze [mailto:sam.ca...@rollouts.com] 
Sent: Monday, February 23, 2009 4:54 PM
To: MS-Exchange Admin Issues
Subject: RE: OAB 0X8004010F Error

 

Oddly enough, I noticed these errors just stopped as of yesterday.  I
have not changed anything since Jan 28th.  I finally have a current OAB.

 

Weird a$$ Exchange.

 



From: Sam Cayze [mailto:sam.ca...@rollouts.com] 
Sent: Wednesday, January 28, 2009 2:00 PM
To: MS-Exchange Admin Issues
Subject: RE: OAB 0X8004010F Error

Nope

 



From: KevinM [mailto:kev...@wlkmmas.org] 
Sent: Wednesday, January 28, 2009 1:45 PM
To: MS-Exchange Admin Issues
Subject: RE: OAB 0X8004010F Error

Do you have Exchange clustered? 

 

From: Sam Cayze [mailto:sam.ca...@rollouts.com] 
Sent: Wednesday, January 28, 2009 9:11 AM
To: MS-Exchange Admin Issues
Subject: RE: OAB 0X8004010F Error

 

Total oops!  

 

Everything is 2003 (Client, server, network, outlook), SP2 on exch,
single/no replicas.

 

Public folder structure:

 

 

'New' is a test OAB I created last night to make sure changes were being
updated to the system folders.  Not sure what the EX:/ folder is all
about.  Dates on the contents are very very old.

 



From: Michael B. Smith [mailto:mich...@theessentialexchange.com] 
Sent: Wednesday, January 28, 2009 11:05 AM
To: MS-Exchange Admin Issues
Subject: RE: OAB 0X8004010F Error

Exchange version and backend topology? (And yes, it may be relevant)

 

Regards,

 

Michael B. Smith, MCITP:SA,EMA/MCSE/Exchange MVP

My blog: http://TheEssentialExchange.com/blogs/michael

I'll be at TEC'2009! http://www.tec2009.com/vegas/index.php

 

From: Sam Cayze [mailto:sam.ca...@rollouts.com] 
Sent: Wednesday, January 28, 2009 11:37 AM
To: MS-Exchange Admin Issues
Subject: OAB 0X8004010F Error

 

Yes, the famous 0X8004010F error.  Tons of info on the web, I know, but
here is a twist that I can't find any information about online:

 

I only get the download OAB error if I can connected via TCP/IP.  If I
am connected via HTTPS, the OAB download works great...

 

I have done all the basis OAB error checking, rebuilt it, checked the
public/system folders, made sure an oab is selected for the storage
group..

 

 

Anyone know of a good place to start looking?

 

Tia!

 

Sam

 

 

 

 

 

 

 

 

 

 

 

 


 


~ Ninja Email Security with Cloudmark Spam Engine Gets Image Spam ~
~ http://www.sunbeltsoftware.com/Ninja~image001.jpg

RE: OAB 0X8004010F Error

2009-02-23 Thread Roger Wright
You may need to allow several hours to see the results...

 

   

 

Roger Wright

Network Administrator

Evatone, Inc.

727.572.7076  x388

_  

 

From: Sam Cayze [mailto:sam.ca...@rollouts.com] 
Sent: Monday, February 23, 2009 5:15 PM
To: MS-Exchange Admin Issues
Subject: RE: OAB 0X8004010F Error

 

Those are just some of the things I tried on Jan 28th :)

 



From: Roger Wright [mailto:rwri...@evatone.com] 
Sent: Monday, February 23, 2009 4:11 PM
To: MS-Exchange Admin Issues
Subject: RE: OAB 0X8004010F Error

I was plagued with this issue recently.  

End up deleting the OAB(s), recreating it, rebuilding it, then
reassigning it on each Exchange DB.

 

   

 

Roger Wright

Network Administrator

Evatone, Inc.

727.572.7076  x388

_  

 

From: Sam Cayze [mailto:sam.ca...@rollouts.com] 
Sent: Monday, February 23, 2009 4:54 PM
To: MS-Exchange Admin Issues
Subject: RE: OAB 0X8004010F Error

 

Oddly enough, I noticed these errors just stopped as of yesterday.  I
have not changed anything since Jan 28th.  I finally have a current OAB.

 

Weird a$$ Exchange.

 



From: Sam Cayze [mailto:sam.ca...@rollouts.com] 
Sent: Wednesday, January 28, 2009 2:00 PM
To: MS-Exchange Admin Issues
Subject: RE: OAB 0X8004010F Error

Nope

 



From: KevinM [mailto:kev...@wlkmmas.org] 
Sent: Wednesday, January 28, 2009 1:45 PM
To: MS-Exchange Admin Issues
Subject: RE: OAB 0X8004010F Error

Do you have Exchange clustered? 

 

From: Sam Cayze [mailto:sam.ca...@rollouts.com] 
Sent: Wednesday, January 28, 2009 9:11 AM
To: MS-Exchange Admin Issues
Subject: RE: OAB 0X8004010F Error

 

Total oops!  

 

Everything is 2003 (Client, server, network, outlook), SP2 on exch,
single/no replicas.

 

Public folder structure:

 

 

'New' is a test OAB I created last night to make sure changes were being
updated to the system folders.  Not sure what the EX:/ folder is all
about.  Dates on the contents are very very old.

 



From: Michael B. Smith [mailto:mich...@theessentialexchange.com] 
Sent: Wednesday, January 28, 2009 11:05 AM
To: MS-Exchange Admin Issues
Subject: RE: OAB 0X8004010F Error

Exchange version and backend topology? (And yes, it may be relevant)

 

Regards,

 

Michael B. Smith, MCITP:SA,EMA/MCSE/Exchange MVP

My blog: http://TheEssentialExchange.com/blogs/michael

I'll be at TEC'2009! http://www.tec2009.com/vegas/index.php

 

From: Sam Cayze [mailto:sam.ca...@rollouts.com] 
Sent: Wednesday, January 28, 2009 11:37 AM
To: MS-Exchange Admin Issues
Subject: OAB 0X8004010F Error

 

Yes, the famous 0X8004010F error.  Tons of info on the web, I know, but
here is a twist that I can't find any information about online:

 

I only get the download OAB error if I can connected via TCP/IP.  If I
am connected via HTTPS, the OAB download works great...

 

I have done all the basis OAB error checking, rebuilt it, checked the
public/system folders, made sure an oab is selected for the storage
group..

 

 

Anyone know of a good place to start looking?

 

Tia!

 

Sam

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 


~ Ninja Email Security with Cloudmark Spam Engine Gets Image Spam ~
~ http://www.sunbeltsoftware.com/Ninja~image001.jpg

question about modifying allowed senders to a distribution list

2009-02-23 Thread James Winzenz
Good afternoon all,

 

We recently had an issue where a user was removed from being able to
send TO a distribution list that has been configured to only accept
messages from certain indivduals on the Exchange General tab.
Environment is Exchange 2003 SP2.  In ADUC, the object tab in the
properties of the distribution list shows that it was last modified on
2/2.  Yet the individual in question indicated he was able to send to
the distribution list as recently as last Thursday (2/19).  There do not
appear to be any security logs pertaining to this change generated by
any of our DC's (which I didn't really expect, since this was an
exchange property that was modified).  My question is this - is this
something that would be logged somewhere within Exchange?  If so, would
I need to have logging levels turned way up to find it (if so, too
late)?  Sorry, I always have the weird questions - please let me know if
more details are needed.  I have checked google, my googlefu is weak
today . . .

 

Thanks,

 

James Winzenz

Infrastructure Systems Engineer II - Security

Pulte Homes Information Services

Telefax: (602) 797-5823 

CONFIDENTIALITY NOTICE:  This email may contain confidential and privileged 
material for the sole use of the intended recipient(s).  Any review, use, 
distribution or disclosure by others is strictly prohibited.  If you have 
received this communication in error, please notify the sender immediately by 
email and delete the message and any file attachments from your computer.  
Thank you.

~ Ninja Email Security with Cloudmark Spam Engine Gets Image Spam ~
~ http://www.sunbeltsoftware.com/Ninja~image001.jpg

RE: OAB 0X8004010F Error

2009-02-23 Thread Sam Cayze
Um...  yes, Jan 28th.  A few hours ago ;)



From: Roger Wright [mailto:rwri...@evatone.com] 
Sent: Monday, February 23, 2009 4:19 PM
To: MS-Exchange Admin Issues
Subject: RE: OAB 0X8004010F Error



You may need to allow several hours to see the results...

 

   

 

Roger Wright

Network Administrator

Evatone, Inc.

727.572.7076  x388

_  

 

From: Sam Cayze [mailto:sam.ca...@rollouts.com] 
Sent: Monday, February 23, 2009 5:15 PM
To: MS-Exchange Admin Issues
Subject: RE: OAB 0X8004010F Error

 

Those are just some of the things I tried on Jan 28th :)

 



From: Roger Wright [mailto:rwri...@evatone.com] 
Sent: Monday, February 23, 2009 4:11 PM
To: MS-Exchange Admin Issues
Subject: RE: OAB 0X8004010F Error

I was plagued with this issue recently.  

End up deleting the OAB(s), recreating it, rebuilding it, then
reassigning it on each Exchange DB.

 

   

 

Roger Wright

Network Administrator

Evatone, Inc.

727.572.7076  x388

_  

 

From: Sam Cayze [mailto:sam.ca...@rollouts.com] 
Sent: Monday, February 23, 2009 4:54 PM
To: MS-Exchange Admin Issues
Subject: RE: OAB 0X8004010F Error

 

Oddly enough, I noticed these errors just stopped as of yesterday.  I
have not changed anything since Jan 28th.  I finally have a current OAB.

 

Weird a$$ Exchange.

 



From: Sam Cayze [mailto:sam.ca...@rollouts.com] 
Sent: Wednesday, January 28, 2009 2:00 PM
To: MS-Exchange Admin Issues
Subject: RE: OAB 0X8004010F Error

Nope

 



From: KevinM [mailto:kev...@wlkmmas.org] 
Sent: Wednesday, January 28, 2009 1:45 PM
To: MS-Exchange Admin Issues
Subject: RE: OAB 0X8004010F Error

Do you have Exchange clustered? 

 

From: Sam Cayze [mailto:sam.ca...@rollouts.com] 
Sent: Wednesday, January 28, 2009 9:11 AM
To: MS-Exchange Admin Issues
Subject: RE: OAB 0X8004010F Error

 

Total oops!  

 

Everything is 2003 (Client, server, network, outlook), SP2 on exch,
single/no replicas.

 

Public folder structure:

 

 

'New' is a test OAB I created last night to make sure changes were being
updated to the system folders.  Not sure what the EX:/ folder is all
about.  Dates on the contents are very very old.

 



From: Michael B. Smith [mailto:mich...@theessentialexchange.com] 
Sent: Wednesday, January 28, 2009 11:05 AM
To: MS-Exchange Admin Issues
Subject: RE: OAB 0X8004010F Error

Exchange version and backend topology? (And yes, it may be relevant)

 

Regards,

 

Michael B. Smith, MCITP:SA,EMA/MCSE/Exchange MVP

My blog: http://TheEssentialExchange.com/blogs/michael

I'll be at TEC'2009! http://www.tec2009.com/vegas/index.php

 

From: Sam Cayze [mailto:sam.ca...@rollouts.com] 
Sent: Wednesday, January 28, 2009 11:37 AM
To: MS-Exchange Admin Issues
Subject: OAB 0X8004010F Error

 

Yes, the famous 0X8004010F error.  Tons of info on the web, I know, but
here is a twist that I can't find any information about online:

 

I only get the download OAB error if I can connected via TCP/IP.  If I
am connected via HTTPS, the OAB download works great...

 

I have done all the basis OAB error checking, rebuilt it, checked the
public/system folders, made sure an oab is selected for the storage
group..

 

 

Anyone know of a good place to start looking?

 

Tia!

 

Sam

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 


 


~ Ninja Email Security with Cloudmark Spam Engine Gets Image Spam ~
~ http://www.sunbeltsoftware.com/Ninja~image001.jpg

RE: outlook locking up

2009-02-23 Thread Barsodi.John
I've seen this with a large/mismanaged mailbox:  5,000 items in a single 
folder or over 2GB in total mailbox size.  Then again this was on our 
underpowered Exchange 2003 servers.

John Barsodi | Messaging
775.448.2230 | IGT Reno - IS


-Original Message-
From: Campbell, Rob [mailto:rob_campb...@centraltechnology.net] 
Sent: Monday, February 23, 2009 12:39 PM
To: MS-Exchange Admin Issues
Subject: RE: outlook locking up

Does it consistently lock up deleting multiple itmes (ie does it lock up if you 
just try to delete 2 at once)?

Normally, I'd suspect a corrupted email somewhere in the block of items you're 
trying to delete.  

Possible solutions are to try it with OWA, or move to mailbox to another mail 
store, and tell it to skip corrupted items during the move.

-Original Message-
From: DAVID SMITH [mailto:davidsm...@dritz.com] 
Sent: Monday, February 23, 2009 2:30 PM
To: MS-Exchange Admin Issues
Subject: outlook locking up

I have a problem with outlook locking up when you try to delete mutiple 
documents at one time.  We use outlook 2003 on a xp workstation.  It is not in 
cache mode.  I have uninstalled outlook and installed it again and it still did 
not fix the problem.  It will let me empty the recycle bin at one time but it 
want not let me delete mutiple documents that I select.  I don't know what else 
to do.  Does anyone have any suggestions.
~ Ninja Email Security with Cloudmark Spam Engine Gets Image Spam ~
~ http://www.sunbeltsoftware.com/Ninja~

**
Note: 
The information contained in this message may be privileged and confidential 
and 
protected from disclosure.  If the reader of this message is not the intended  
recipient, or an employee or agent responsible for delivering this message to  
the intended recipient, you are hereby notified that any dissemination,   
distribution or copying of this communication is strictly prohibited. If you  
have received this communication in error, please notify us immediately by  
replying to the message and deleting it from your computer. 
**



~ Ninja Email Security with Cloudmark Spam Engine Gets Image Spam ~
~ http://www.sunbeltsoftware.com/Ninja~


~ Ninja Email Security with Cloudmark Spam Engine Gets Image Spam ~
~ http://www.sunbeltsoftware.com/Ninja~



RE: OAB 0X8004010F Error

2009-02-23 Thread Roger Wright
Try it again, in the order I listed.  Wait until morning to see if it's
resolved.  Worked for my, YMMV.

 

   

 

Roger Wright

Network Administrator

Evatone, Inc.

727.572.7076  x388

_  

 

From: Sam Cayze [mailto:sam.ca...@rollouts.com] 
Sent: Monday, February 23, 2009 5:37 PM
To: MS-Exchange Admin Issues
Subject: RE: OAB 0X8004010F Error

 

Um...  yes, Jan 28th.  A few hours ago ;)



From: Roger Wright [mailto:rwri...@evatone.com] 
Sent: Monday, February 23, 2009 4:19 PM
To: MS-Exchange Admin Issues
Subject: RE: OAB 0X8004010F Error

You may need to allow several hours to see the results...

 

   

 

Roger Wright

Network Administrator

Evatone, Inc.

727.572.7076  x388

_  

 

From: Sam Cayze [mailto:sam.ca...@rollouts.com] 
Sent: Monday, February 23, 2009 5:15 PM
To: MS-Exchange Admin Issues
Subject: RE: OAB 0X8004010F Error

 

Those are just some of the things I tried on Jan 28th :)

 



From: Roger Wright [mailto:rwri...@evatone.com] 
Sent: Monday, February 23, 2009 4:11 PM
To: MS-Exchange Admin Issues
Subject: RE: OAB 0X8004010F Error

I was plagued with this issue recently.  

End up deleting the OAB(s), recreating it, rebuilding it, then
reassigning it on each Exchange DB.

 

   

 

Roger Wright

Network Administrator

Evatone, Inc.

727.572.7076  x388

_  

 

From: Sam Cayze [mailto:sam.ca...@rollouts.com] 
Sent: Monday, February 23, 2009 4:54 PM
To: MS-Exchange Admin Issues
Subject: RE: OAB 0X8004010F Error

 

Oddly enough, I noticed these errors just stopped as of yesterday.  I
have not changed anything since Jan 28th.  I finally have a current OAB.

 

Weird a$$ Exchange.

 



From: Sam Cayze [mailto:sam.ca...@rollouts.com] 
Sent: Wednesday, January 28, 2009 2:00 PM
To: MS-Exchange Admin Issues
Subject: RE: OAB 0X8004010F Error

Nope

 



From: KevinM [mailto:kev...@wlkmmas.org] 
Sent: Wednesday, January 28, 2009 1:45 PM
To: MS-Exchange Admin Issues
Subject: RE: OAB 0X8004010F Error

Do you have Exchange clustered? 

 

From: Sam Cayze [mailto:sam.ca...@rollouts.com] 
Sent: Wednesday, January 28, 2009 9:11 AM
To: MS-Exchange Admin Issues
Subject: RE: OAB 0X8004010F Error

 

Total oops!  

 

Everything is 2003 (Client, server, network, outlook), SP2 on exch,
single/no replicas.

 

Public folder structure:

 

 

'New' is a test OAB I created last night to make sure changes were being
updated to the system folders.  Not sure what the EX:/ folder is all
about.  Dates on the contents are very very old.

 



From: Michael B. Smith [mailto:mich...@theessentialexchange.com] 
Sent: Wednesday, January 28, 2009 11:05 AM
To: MS-Exchange Admin Issues
Subject: RE: OAB 0X8004010F Error

Exchange version and backend topology? (And yes, it may be relevant)

 

Regards,

 

Michael B. Smith, MCITP:SA,EMA/MCSE/Exchange MVP

My blog: http://TheEssentialExchange.com/blogs/michael

I'll be at TEC'2009! http://www.tec2009.com/vegas/index.php

 

From: Sam Cayze [mailto:sam.ca...@rollouts.com] 
Sent: Wednesday, January 28, 2009 11:37 AM
To: MS-Exchange Admin Issues
Subject: OAB 0X8004010F Error

 

Yes, the famous 0X8004010F error.  Tons of info on the web, I know, but
here is a twist that I can't find any information about online:

 

I only get the download OAB error if I can connected via TCP/IP.  If I
am connected via HTTPS, the OAB download works great...

 

I have done all the basis OAB error checking, rebuilt it, checked the
public/system folders, made sure an oab is selected for the storage
group..

 

 

Anyone know of a good place to start looking?

 

Tia!

 

Sam

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 


~ Ninja Email Security with Cloudmark Spam Engine Gets Image Spam ~
~ http://www.sunbeltsoftware.com/Ninja~image001.jpg

RE: question about modifying allowed senders to a distribution list

2009-02-23 Thread Michael B. Smith
It's far too late.

 

You would have to have object auditing enabled in your AD. Even though the
attribute is an exchange-related attribute, it is stored in AD and obeys AD
auditing principles.

 

That being said, do your message tracking logs agree with the user that she
was able to send to the list as of last Thursday? That would be where I
would start my investigation.

 

From: James Winzenz [mailto:james.winz...@pulte.com] 
Sent: Monday, February 23, 2009 5:28 PM
To: MS-Exchange Admin Issues
Subject: question about modifying allowed senders to a distribution list

 

Good afternoon all,

 

We recently had an issue where a user was removed from being able to send TO
a distribution list that has been configured to only accept messages from
certain indivduals on the Exchange General tab.  Environment is Exchange
2003 SP2.  In ADUC, the object tab in the properties of the distribution
list shows that it was last modified on 2/2.  Yet the individual in question
indicated he was able to send to the distribution list as recently as last
Thursday (2/19).  There do not appear to be any security logs pertaining to
this change generated by any of our DC's (which I didn't really expect,
since this was an exchange property that was modified).  My question is this
- is this something that would be logged somewhere within Exchange?  If so,
would I need to have logging levels turned way up to find it (if so, too
late)?  Sorry, I always have the weird questions - please let me know if
more details are needed.  I have checked google, my googlefu is weak today .
. .

 

Thanks,

 

James Winzenz

Infrastructure Systems Engineer II - Security

Pulte Homes Information Services

Telefax: (602) 797-5823

 



 


CONFIDENTIALITY NOTICE:  This email may contain confidential and privileged
material for the sole use of the intended recipient(s).  Any review, use,
distribution or disclosure by others is strictly prohibited.  If you have
received this communication in error, please notify the sender immediately
by email and delete the message and any file attachments from your computer.
Thank you.

 

 


~ Ninja Email Security with Cloudmark Spam Engine Gets Image Spam ~
~ http://www.sunbeltsoftware.com/Ninja~image001.jpg