Third-party products supplement Exchange Server's capabilities for dealing with unsolicited commercial email (UCE). Because desktop solutions typically have scalability problems, I recommend that you use a server-based solution. Here's a sampling...
A vulnerability in Exchange Server 5.5 allows unauthorized mail relaying, even when you've disabled or restricted the relaying feature. This vulnerability occurs when Exchange uses encapsulated SMTP addresses when it's using the IMS as a site...
On several occasions during the last couple of months, Lotus has taken various comments and points I have made in this column (or those Tony Redmond has made in his articles in the Exchange Administrator newsletter) and used them out of context to...
The following Internet Engineering Task Force (IETF) Requests for Comments (RFCs—http://www.ietf.org) detail the standards in several areas that relate to UCE control...
The question I receive most frequently is "Is it OK to send you questions?" Of course, it's OK—I welcome your questions. The newsletter's goal is to provide you with the information you need to do your job, so I need to hear what problems you're...
\[Editor's note: Email your Exchange Server and Outlook solutions (400 words maximum) to R2R at kfisher@winntmag.com. Please include your phone number. We will edit submissions for style, grammar, and length. If we print your contribution, you'll...
Providing the easiest possible transition to a new messaging system is a major concern for anyone involved in a migration project. One way to facilitate the passage is to ensure that users are familiar with the new client software...
The proliferation of unsolicited commercial email (UCE, aka spam or junk mail) has changed the way companies operate in the Internet email world. Although some ISPs have prohibited UCE on their servers, unscrupulous mailers get around the...