Solved

Exchange rooming user profile.

Posted on 1998-11-12
3
228 Views
Last Modified: 2013-12-19
I am using Exchange Server 5.5, with 200 users,I want to allow users to access there mail from any workstation in the office , I have WIN95 with outook97 on workstation. If I want to do this i have to create profiles on each computer & user will choose the profile while logingin, for me it practicly impossible as the no. of users growing every day. Is there any way where the user just puts his username & password & can check the mail.
0
Comment
Question by:mohan_pande
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 

Expert Comment

by:datap
ID: 1565613
I have a similar issue and am trying to avoid rebooting. We have a generic login to Netware and NT first, then multiple profiles on a PC. When I select Outlook I want to be prompted for which profile then have to enter username and password to validate on NT for access to Exchange. All PC's are Win95 with Office 97 but some have the option under Control Panel, Mail & Fax, Outlook Properties, Exchange Server, Advanced to "Use Network Security During Logon" - and others have a drop down box to choose from. I can't figure out what causes the two different options. If the Use Network Security box is there and checked, unchecking it allows me to do what I want. If the machine has the drop down box I can't do it and each user has to reboot and login to access their account. Any Ideas?

0
 

Accepted Solution

by:
sedd earned 50 total points
ID: 1565614
mohan

I setup access like this regularly for schools.  The easiest way to establish this kind of roaming access for people within a site is to install and configure the Outlook WebAccess module (check out the microsoft whitepaper on this subject [URL unavailable, email me if you can't find it sedd@innocent.com]).

Of course, this will only work if machines have browsers installed and configured, IIS is running on the network somewhere, and its configured as an intranet.

Setting up the OWA components is a simple task and then the actual email logon is independant of the network logon, allowing mail checks of different accounts without having to reconnect to the network, all through the simple interface of a web browser.

Cheers
0
 

Expert Comment

by:sedd
ID: 1565615
Sorry, in addition to the above answer.

If you *dont* install any profiles in MS Outlook 97, you will get a prompt when you start the program requesting you to input a username, message server name and password.

This is another possible solution for you to use not requiring any configuration or additional rollout at all.
0

Featured Post

Free Tool: Port Scanner

Check which ports are open to the outside world. Helps make sure that your firewall rules are working as intended.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

FIPS stands for the Federal Information Processing Standardisation and FIPS 140-2 is a collection of standards that are generically associated with hardware and software cryptography. In most cases, people can refer to this as the method of encrypti…
Enterprise networks where VoIP phones have been deployed frequently use port configurations that allow both a computer and an IP phone to be plugged into the same switch port but use different VLANs. On Cisco equipment I'm referring to the "native V…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
Suggested Courses
Course of the Month4 days, 21 hours left to enroll

636 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question