• October 13, 2005 13 Oct'05

    Exchange 2003 Query-Based Distribution Groups

    In this tip from "15 tips in 15 minutes: Managing recipients and distribution lists," you'll learn everything you need to know about Query-based groups (QDGs), the new group type introduced by Exchange 2003.  Continue Reading

  • October 13, 2005 13 Oct'05

    Exchange mail retention

    In this tip from "15 tips in 15 minutes: Managing recipients and distribution lists," you'll gain essential information on Exchange email retention, saving you a great deal of time. Learn how to recover a deleted mailbox, a deleted user ...  Continue Reading

  • October 13, 2005 13 Oct'05

    Maximize your hard drive free space

    How to keep your hard drive free space at a maximum.  Continue Reading

  • October 13, 2005 13 Oct'05

    Users can't add contacts to address books after migration

    After a migration, if the Outlook address book service is not associated with the users Outlook MAPI profile, users may find the option to add contacts to their address books are grayed out. Here's how to fix it.  Continue Reading

  • October 13, 2005 13 Oct'05

    Group Policy: The final consideration in securing Active Directory

    Group Policy considerations can't be left out of the equation when addressing Active Directory security. Expert Derek Melber gives you an idea of some things to think about when securing Active Directory.  Continue Reading

  • October 13, 2005 13 Oct'05

    Exchange security groups

    In the following tip from "15 tips in 15 minutes: Managing recipients and distribution lists," you'll learn the ins and outs of Exchange security groups: why they're used, how to use them, and issues with mail-enabled Security groups. You'll also ...  Continue Reading

  • October 13, 2005 13 Oct'05

    The Exchange server mailbox management service

    In this tip from "15 tips in 15 minutes: Managing recipients and distribution lists," you'll discover the must-have Exchange mailbox management service cleans up users' folders for you. Follow these steps to set up recipient policies and automate ...  Continue Reading

  • October 13, 2005 13 Oct'05

    Windows networking mistakes: The five most common

    It's one thing if a genius hacker comes up with some inspired way of exploiting your system; it's another thing all together if some novice takes advantage of a silly mistake. So make sure you aren't making them. In this article, contributor ...  Continue Reading

  • October 13, 2005 13 Oct'05

    Blocking a user's email access

    In the following tip from "15 tips in 15 minutes: Managing recipients and distribution lists," you'll learn how to block a user's email access in Exchange including how to disable the user's Active Directory account, remove the user's mailbox and ...  Continue Reading

  • October 13, 2005 13 Oct'05

    Managing recipients with system policies

    In this tip from "15 tips in 15 minutes: Managing recipients and distribution lists," you'll strengthen your Exchange administrative skills by learning how to manage Exchange 2003 system policies in the Exchange System Manager.  Continue Reading

-ADS BY GOOGLE

SearchServerVirtualization

SearchCloudComputing

SearchSQLServer

SearchEnterpriseDesktop

SearchVirtualDesktop

Close