Does OWA work on the back-end server only?
Neil
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of M2web
Posted At: 22 December 2003 21:39
Posted To: Swynk Exchange (30 days)
Conversation: HTTP error 404 and OWA
Subject: HTTP error 404 and OWA
I have a
Well, titles can be very handy - we have an honours system in the UK that
would seem to back that up.
But they are not as valuable as personal reputation as is evidenced by the
number of people that refuse these titles on point of principle - often very
publicly. (As you have done with your MVP,
We use MessageLabs for virus and Spam filtering.
The service we get is generally good flexible but they do seem to be
under-resourced leading to occasional delays in mail processing at their
end.
We've also had problems with SpamCop others classing one of their clients
as a Spam source and
I would be grateful if anyone would be able to confirm that Exchange 2k
is able to utilise dual processor technology on W2k server.
Regards
David
Registered Office: Hillfields, Burghfield Common, Reading, Berkshire, RG7 3YG
Registered Charity No. 209617
A company limited by guarantee
Utilise now idea, but it runs on a dual processer w2k here.
Kind regards,
Kim Schotanus
===
Kim Schotanus
Information Systems Manager
INTAS
Avenue des Arts 58
B-1000 Brussels
Belgium
T. +32 2 549 01 11
F. +32 2 549 01 56
===
-Original
Yes of course it can.
--
Robert Moir
Microsoft MVP
Senior IT Systems Engineer
Luton Sixth Form College
RM Eunt Domus
-Original Message-
From: Exchange Discussion [mailto:[EMAIL PROTECTED]
Sent: 23 December 2003 12:44
To: Exchange Discussions
Subject: Dual Processor EXCH2K/SVR2K
http://www.microsoft.com/exchange/evaluation/features/win_compare.asp
-Original Message-
From: Microsoft Exchange List Server
[mailto:[EMAIL PROTECTED]
Sent: Monday, December 22, 2003 6:21 PM
To: Exchange Discussions
Subject: exchange2003 features in a Windows2000AD
Hi all,
What do
Cheers Robert as I said I just wanted it confirmed ;-)
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Robert Moir
Sent: Tuesday, December 23, 2003 12:47 PM
To: Exchange Discussions
Subject: RE: Dual Processor EXCH2K/SVR2K
Yes of course it can.
--
You are not allowed to thank Robert per the Decklerheitsgebot Purity Laws
of IT Ethics.
-Original Message-
From: Exchange Discussion [mailto:[EMAIL PROTECTED]
Sent: Tuesday, December 23, 2003 8:45 AM
To: Exchange Discussions
Subject: RE: Dual Processor EXCH2K/SVR2K
Cheers Robert as I
Am I allowed to apologise then?
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of David, Andy
Sent: Tuesday, December 23, 2003 1:50 PM
To: Exchange Discussions
Subject: RE: Dual Processor EXCH2K/SVR2K
You are not allowed to thank Robert per the
Shhh don't worry about him. He's just jealous that Windows Server MVPs
get better bribes than Exchange server ones do.
-Original Message-
From: Exchange Discussion [mailto:[EMAIL PROTECTED]
Sent: 23 December 2003 13:53
To: Exchange Discussions
Subject: RE: Dual Processor
I don't know about that...
--
Roger D. Seielstad - MTS MCSE MS-MVP
Sr. Systems Administrator
Inovis Inc.
-Original Message-
From: Robert Moir [mailto:[EMAIL PROTECTED]
Sent: Tuesday, December 23, 2003 8:56 AM
To: Exchange
I want my compiler!
-Original Message-
From: Robert Moir [mailto:[EMAIL PROTECTED]
Sent: Tuesday, December 23, 2003 8:56 AM
To: Exchange Discussions
Subject: RE: Dual Processor EXCH2K/SVR2K
Shhh don't worry about him. He's just jealous that Windows Server MVPs get
better bribes than
See!
-Original Message-
From: David, Andy [mailto:[EMAIL PROTECTED]
Sent: Tue 23/12/2003 13:57
To: Exchange Discussions
Cc:
Subject: RE: Dual Processor EXCH2K/SVR2K
I want my compiler!
Nor do I really. I'm making it up as I go along.
-Original Message-
From: Roger Seielstad [mailto:[EMAIL PROTECTED]
Sent: Tue 23/12/2003 13:57
To: Exchange Discussions
Cc:
Subject: RE: Dual Processor EXCH2K/SVR2K
I don't care who you are.
That's *FUNNY* right there!
Barry J. Horner
NT Server/Exchange/WWW Administrator
Central Community College - Grand Island, NE
(V) 308.398.7361(F) 308.398.7399
[EMAIL PROTECTED]
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
I personally don't trust other's handing my mail - then again, I'm
apparently a bit of a control freak when it comes to that kind of thing.
--
Roger D. Seielstad - MTS MCSE MS-MVP
Sr. Systems Administrator
Inovis Inc.
-Original
So you only transfer mail within systems over which you have complete
control?
-Original Message-
From: Roger Seielstad [mailto:[EMAIL PROTECTED]
Sent: 23 December 2003 13:09
To: Exchange Discussions
Subject: RE: Outsourcing email?
I personally don't trust other's handing my mail - then
In the states we call that inter-office mail. ;-)
Eric
Eric Fretz
L-3 Communications
ComCept Division
2800 Discovery Blvd.
Rockwall, TX 75032
tel: 972.772.7501
fax: 972.772.7510
-Original Message-
From: Shotton Jolyon [mailto:[EMAIL PROTECTED]
Sent: Tuesday, December 23, 2003
i can't speak for roger but personally i like knowing that when someone says
they've sent us an email and i'm asked if it's arrived that i can look in my
maillog and _know_ if it's touched my network server or not and not have to
wonder if it's stuck on some third party box because they do our
Why would you want the control of your un-encrypted, completely open to reading,
mission critical, company insider information, mail left to someone outside your
control?
Do yourself a great big favor by keeping it in house.
John Matteson
Geac Corporate ISS
(404) 239 - 2981
Atlanta,
Inside the company, all the mail servers were built by me, and they are
controlled by me. Once it's picked up by a server from my gateway
machine, it's out of my control, and also no longer my worry.
John Matteson
Geac Corporate ISS
(404) 239 - 2981
Atlanta, Georgia, USA.
-Original
No.
John Matteson
Geac Corporate ISS
(404) 239 - 2981
Atlanta, Georgia, USA.
-Original Message-
From: Martin Tuip [MVP] [mailto:[EMAIL PROTECTED]
Posted At: Monday, December 22, 2003 1:51 PM
Posted To: Exchange Discussion List
Conversation: Greg's Utterly Fascinating Views on Ethics
Exch 5.5 sp4
In a scenario where a end users password has been compromised and is being
used to drop spam crap on the internet mail service, what logging options
can be used to identify the account that is authenticating? Also is there a
way to tie a message id to a specific authenticated user?
I totally appreciate Paul's point of not wanting another potential delay
that you can't control imposed but the data security aspect I don't
understand. Email, if unencrypted, is insecure.
If you are emailing something unencrypted outside your organisation you
should assume it is public
Man, I can't EVEN believe that I allowed myself to get sucked back into
this infernal list again. Merry Christmas and Happy Holidays everyone. And
the New Year thing.
_
List posting FAQ:
Does EX2K caches the DNS data? If so, what is the default settings and
where/how it can be changed?
Also can EX2K be configured to use an IP address, instead of the host name
in DNS?
If so, where/how it can be configured?
Thanks
--Alex Alborzfard
If all you care about is out of site, out of mind I still don't see the
worry - at some point you pass over the handling of these mail items to
someone else and at that point you have no control. This is just moving
that boundary / adding another layer beyond it.
Very few of us outside those who
Leave the DNS settings in Exchange 2000 alone (SMTP VS properties,
Delivery, Advanced, configure DNS servers). Instead, let it use the DNS
servers that are specified in the TCP/IP properties of the network card.
I heard at one point that adding DNS servers to the SMTP VS causes
Exchange to
I agree, I wouldn't want to run all my internal only mail through a
service provider for spam/virus filtering. As for outgoing mail and
inbound mail, why make it easy for someone to run a man in the middle
intelligence gathering operation against your company? Running all your
mail through one
I suppose.
Any organisation I've worked for that cares that much uses dedicated
networks for data transfer to third parties it has to trust and places
controls on what sort of information can be allowed onto public networks.
I wouldn't trust the public networks with anything I wanted to keep
IMS Diagnostics Logging / SMTP Protocol Logging / Medium
You'll need to look for the AUTH handshake. The handshake is done using
base64 encoded strings. You can use
http://www.securecode.net/Base64Convert+main.html to decode them.
-Original Message-
From: [EMAIL PROTECTED]
For my domain, yes. I have complete control over the systems accepting mail
for my domains. That's something which you lose when outsourcing this kind
of service.
Roger
--
Roger D. Seielstad - MTS MCSE MS-MVP
Sr. Systems Administrator
In that particular event( app log? ) is there anything else in the
description that I can search against to find it quickly? Like sending
domain, ip, message id, etc,?
e-
-Original Message-
From: Webb, Andy [mailto:[EMAIL PROTECTED]
Sent: Tuesday, December 23, 2003 9:12 AM
To: Exchange
That's complete bunk.
I have complete control over where mail entering and leaving my networks is
delivered, as well as having full logs of those transactions.
Any system sending mail to inovis.com will route to one of 4 boxes under our
control - I control the publication of the MX records that
No, it's not bunk.
You care about more and that's great but if, like the previous poster, all
you care about is that Once it's picked up by a server from my gateway
machine, it's out of my control, and also no longer my worry. then the
presence in the chain of a third party is not significant.
For the record those are event 2010
-Original Message-
From: Webb, Andy [mailto:[EMAIL PROTECTED]
Sent: Tuesday, December 23, 2003 9:12 AM
To: Exchange Discussions
Subject: RE: SMTP Logging options?
IMS Diagnostics Logging / SMTP Protocol Logging / Medium
You'll need to look for the
It's in the exchsrvr\IMCDATA\LOG directory. There is a .LOG file for
each thread in the IMS, so by default there may be as many as 30 of the
files. Each line contains the IP address and datestamp.
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of
[EMAIL
For the record, :), SMTP Protocol Logging doesn't write to the App Event
Log, rather it writes to file system files.
Knowing how to read SMTP conversations in the protocol log is a good
thing.
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of
[EMAIL
I looked in the log dir and I only have a route.log and a route.old neither
contain and IP or sender data related to this, the 2010 events don't
correspond with the loads of garbage ndr's I am seeing either.
Could these logs be in another folder?
e-
-Original Message-
From: Webb, Andy
that is right it only works on the BE server.
- Original Message -
From: Neil Hobson [EMAIL PROTECTED]
To: Exchange Discussions [EMAIL PROTECTED]
Sent: Tuesday, December 23, 2003 12:16 AM
Subject: RE: HTTP error 404 and OWA
Does OWA work on the back-end server only?
Neil
Well I'm totally lost I think. I found a tacking.log folder in root of
exchsrvr. So for example in my ims ques ( which is relay secure) I have a
ndr of spam, for destination in-f01.net and in the tracking log I see..
c=us;a= ;p=arup;l=POSTOFFICE020312221600190859 10182003.12.23 14:50:24
YFR.
Ed Crowley MCSE+Internet MVP
Freelance E-Mail Philosopher
Protecting the world from PSTs and Bricked Backups!T
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Greg Deckler
Sent: Monday, December 22, 2003 10:53 AM
To: Exchange Discussions
Subject:
Mr. Deckler argues that the IT profession will collapse into a heap unless
it adopts HIS standards of ethics.
Ed Crowley MCSE+Internet MVP
Freelance E-Mail Philosopher
Protecting the world from PSTs and Bricked Backups!T
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL
Greg, you can take (and have taken) your crusade to ridiculous extremes. I
daresay EVERYONE who you would respect has some potential conflict of
interest. Have you disclosed to every customer every stock you hold, and
the stock holdings of every mutual fund you own? Have you disclosed every
I see your humor is on a par with your logic.
Ed Crowley MCSE+Internet MVP
Freelance E-Mail Philosopher
Protecting the world from PSTs and Bricked Backups!T
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Greg Deckler
Sent: Monday, December 22, 2003
So you're admitting you can't prove your point? So you don't always deal in
facts and logic, but your own personal opinion? Will you take the next step
and agree that you opinion is not necessarily supreme?
Ed Crowley MCSE+Internet MVP
Freelance E-Mail Philosopher
Protecting the world from PSTs
You're looking at the wrong direction - inbound is where the problems can
lie. You don't have control between the sender and your gateway. IMO, that's
too much of a risk for any but the smallest companies to take.
--
Roger D. Seielstad -
No, it means you don't have the logging turned on in the IMS (it does
require a restart of the IMS service once you change the settings).
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of
[EMAIL PROTECTED]
Sent: Tuesday, December 23, 2003 11:39 AM
To:
I am getting the following errors on my first exchange 2k server in exchange
5.5 organization:
A sockets error 0 on a bind() call was detected. The MTA will attempt to
recover the sockets connection. Control block index: 0. [BASE IL TCP/IP DRVR
11 258] (12)
The source is MSEXCHANGEMTA and
Tracking logs are different. They're not really human readable and they
don't let you know the auth information.
If you have Logon Success auditing turned on, you should get events in
the security event logs, but they're not limited to SMTP or indicated as
SMTP, so they're tougher to diagnose
Name a 80's dance band that successfully used the word Parthenogenesis
in a song, for $5.38 and an ethical conflict from Microsoft.
-Original Message-
From: Bob Sadler [mailto:[EMAIL PROTECTED]
Sent: Monday, December 22, 2003 12:40 PM
To: Exchange Discussions
Subject: RE: Greg's
Ouch
However the time stamps should coincide yes? And if its one or a few users
that have been compd the garbage is fairly regular intervals, I would think
it would show up.
What about this base64 thing? I cant seem to find this encoded base 64 auth
string to plug into that website.
It's Nemesis from Shriekback.
Eric Fretz
L-3 Communications
ComCept Division
2800 Discovery Blvd.
Rockwall, TX 75032
tel: 972.772.7501
fax: 972.772.7510
-Original Message-
From: East, Bill [mailto:[EMAIL PROTECTED]
Sent: Tuesday, December 23, 2003 12:40 PM
To: Exchange
Paying attention to differences between GMT time and local time, yes the
times should coincide.
If you haven't had the logging enabled, there won't be anything to look
at in the past, it will be in the future. The way the conversation
looks is this:
Sending MTA -
Tell me you Googled that.
--
be - MOS
One more such victory, and we are lost. --Pyrrus
-Original Message-
From: Eric Fretz [mailto:[EMAIL PROTECTED]
Sent: Tuesday, December 23, 2003 1:58 PM
To: Exchange Discussions
Subject: RE: Greg's Utterly Fascinating Views on Ethics
I'm not telling =)
Eric Fretz
L-3 Communications
ComCept Division
2800 Discovery Blvd.
Rockwall, TX 75032
tel: 972.772.7501
fax: 972.772.7510
-Original Message-
From: East, Bill [mailto:[EMAIL PROTECTED]
Sent: Tuesday, December 23, 2003 1:16 PM
To: Exchange Discussions
We're starting a filtering service with a local MSP in a week or so.
My reasoning came down to economies of scale. They can afford to have a
guy watch the recipies full time and tweak them when the spam starts
coming through. They can afford to have someone watch the mailflow and
make sure that
Oh yeah, there was one other thing. Since we'll be pointing both primary
and secondary MXen to the MSP, I no longer will have to worry about
script kiddies and nitwits hammering our SMTP servewr (not and Exchange
box, but still a possible weakness). Only the MSP's MXen will be allowed
to access
Ok I think I found a problem. The 250 auth in the middle
12/23/2003 12:42:33 PM : A connection to 81.21.68.106 was established.
12/23/2003 12:42:59 PM : 220 www.redmode.com ESMTP
12/23/2003 12:42:59 PM : EHLO postoffice02.aruplab.com
12/23/2003 12:42:59 PM : 250-www.redmode.com
250-AUTH
No, just advertising that AUTH LOGIN is available isn't the bad thing.
There was not an authentication done in that transaction. That message
was accepted, as messages from postmaster ought to be.
What would be bad is if your server then tried to make an outbound
connection to chaudhry.co.uk
This is slightly off-topic but I have several users who complain that
signatures are mis-formated when they leave our servers. There are
extra line breaks in them. I have been trying to track this down but
can't put my finger on it. I can't provide an example because of the
posting rules.
Any
For anyone looking for a good rfc:
http://www.faqs.org/rfcs/
I have found being able to look up rfc1893 to be very helpful, and have
it bookmarked for quick access.
(p.s. they have all the April 1 rfc's on there too)
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL
I didn't take it as a slam :) I'll read those rfc's
So those auth's should be there cause they are NDR's, Now I just need to
find the entries for the real messages that are causing the ndr's and find
out what user they are using. In the mean time and I am going to cut my
timeouts down to nothing
I found this by searching for the first sentence on
support.microsoft.com.
It's an old article, but have you checked it out?
http://support.microsoft.com/default.aspx?scid=kb;en-us;170056
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Davinder Gupta
We have migrated users from 5.5 to 2003, now the users do not see the
elements in the GAL.
I test from a user which is DOMAIN ADMIN.
In Exchange System Manager, under Recipients, All GAL, Default GAL, i
checked that the default permissions allowed my users to read the
information. Authenticated
The AUTH you posted below was just an advertisement from your server to
the sending server saying that AUTH is supported. You didn't actually
receive an AUTH from the sending server.
You can see the IP that the messages are coming from - you can block any
connections from that IP to reduce the
Yes, but for every single IP I block 10 more show up. It has more of a feel
of a hole or a compd password especially when I come in AM and there are
24,000 ndr's in the que.
Just to clarify are the logs you are talking about a few emails ago are in
fact the logs from the imcdata/log folder yes?
Yeah, I don't try to block everything, but I do occasionally block
individual IPs that seem to be extra chatty. Doing it all is
impossible. Some folks use one RBL or another on a gateway server, but
that has its own drawbacks.
Yes, the logs I'm talking about are the ones in imcdata\log.
IIS
The first message I posted in this thread is in your PST file. I have
reprinted it several times. Everything since then has been in-kind
responses to yours.
Ed Crowley MCSE+Internet MVP
Freelance E-Mail Philosopher
Protecting the world from PSTs and Bricked Backups!T
-Original Message-
...circling that drain. I like that.
Ed Crowley MCSE+Internet MVP
Freelance E-Mail Philosopher
Protecting the world from PSTs and Bricked Backups!T
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Jim Helfer
Sent: Monday, December 22, 2003 2:45 PM
To:
I'd wager that Ed, for example, is proud of his online reputation.
Thanks for the nice words. I would like to add that nobody who knows me
thinks that I hesitate to criticize anything I feel deserves it, be it
Microsoft or anything or anyone else. Here's one example: I've caught
flack for some
Happy holidays, Greg.
Ed Crowley MCSE+Internet MVP
Freelance E-Mail Philosopher
Protecting the world from PSTs and Bricked Backups!T
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Greg Deckler
Sent: Tuesday, December 23, 2003 7:38 AM
To: Exchange
Maybe you can't buy your way into Who's Who, but I guarantee you that if
you buy the Who's Who book, you'll get included a lot more in the future!
Ed Crowley MCSE+Internet MVP
Freelance E-Mail Philosopher
Protecting the world from PSTs and Bricked Backups!T
-Original Message-
From:
And they're misdirected. Spam is another name for UCE, unsolicited
commercial e-mail, which the thread in question definitely is not.
Ed Crowley MCSE+Internet MVP
Freelance E-Mail Philosopher
Protecting the world from PSTs and Bricked Backups!
-Original Message-
From: [EMAIL PROTECTED]
It may have ended now. Even if it hasn't, you can rest assured that it will
eventually. It always does.
Ed Crowley MCSE+Internet MVP
Freelance E-Mail Philosopher
Protecting the world from PSTs and Bricked Backups!T
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On
This is not strictly required, but I would recommend you do it because you
never know if you will want to use these attributes in the future. The
process only takes a few minutes.
Have you seen this fine article:
http://support.microsoft.com/default.aspx?scid=kb;en-us;325379 ?
Ed Crowley
A big issue with outsourcing can be if the company in question goes out of
business, in which case you often have a short time to make alternative
arrangements. Since the company won't actually be hosting your e-mail, your
risk is smaller, but still worth considering.
Ed Crowley MCSE+Internet
His comments don't even require a response to validate them. Why bother
then?
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Ed Crowley [MVP]
Sent: Tuesday, December 23, 2003 4:22 PM
To: Exchange Discussions
Subject: RE: Recall: Greg's Utterly
Ex 5.5, SP4.
The Diagnostics Logging for Message Archival is set to Medium on the front
end exchange server. When I look into the imcdata\In\Archive folder I see
tons of email files with alpha-numeric name. I see in every minute there
are about 4 to 5 emails. Are these messages have already
Ex 5.5, SP4.
The Diagnostics Logging for Message Archival is set to Medium on the front
end exchange server. When I look into the imcdata\In\Archive folder I see
tons of email files with alpha-numeric name. I see in every minute there
are about 4 to 5 emails. Are these messages have already
They are copies delivered to that location because you asked for it by
setting the Message Archival diagnostic logging setting. Set it back to
None and they'll stop accruing. Delete the files at your leisure.
Ed Crowley MCSE+Internet MVP
Freelance E-Mail Philosopher
Protecting the world from
Is that an opinion or fact?
Ed Crowley MCSE+Internet MVP
Freelance E-Mail Philosopher
Protecting the world from PSTs and Bricked Backups!T
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Christopher
Hummert
Sent: Tuesday, December 23, 2003 4:42 PM
To:
Thanks Ed for clarifying it.
-Original Message-
From: Ed Crowley [MVP] [mailto:[EMAIL PROTECTED]
Sent: Tuesday, December 23, 2003 6:01 PM
To: Exchange Discussions
Subject: RE: SMTP Logging options?
They are copies delivered to that location because you asked for it by
setting the
both
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Ed Crowley [MVP]
Sent: Tuesday, December 23, 2003 6:01 PM
To: Exchange Discussions
Subject: RE: Recall: Greg's Utterly Fascinating Views on Ethics
Is that an opinion or fact?
Ed Crowley MCSE+Internet
85 matches
Mail list logo