To set up impersonation rights to a user, a management scope needs to be created, which would define the scope of the rights for all Microsoft Exchange mailboxes, followed by a management role assignment, which would assign impersonation rights over the management scope to the assigned user. This user must have the ability to impersonate domain users, so as to access the users' mailboxes. In the case of Microsoft Exchange 2010 and later, this is performed through the use of Exchange Web Services, which requires the credentials of a specific user in order to perform this action. When blocking spam, one of the actions which can be performed is that of moving spam emails to sub-folders within mailboxes in Microsoft Exchange Server. The next section describes how to move spam email to user's subfolders in Exchange. For more information refer to Configuring MailEssentials Spam Actions. When GFI MailEssentials is installed on the Microsoft ® Exchange Server, spam emails can be saved in a user’s mailbox folder.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |