Solved

DOmino R5 group problem.

Posted on 2001-07-27
6
193 Views
Last Modified: 2013-12-18
hi,

I have a group DVLP.I want to restrict specific users so that they won't be able to fire any mail to this specific group.
is it possible to restrict a specific user from sending mail to a group?

please help...I need solution ASAP.

bye
pankaj
0
Comment
Question by:vsaraogi
6 Comments
 
LVL 5

Accepted Solution

by:
snocross earned 100 total points
Comment Utility
Here's a couple ideas.  This first option is very interesting to me...

http://www.notes.net/46dom.nsf/55c38d716d632d9b8525689b005ba1c0/cb30bd7a9a3404b58525698a005e119b!OpenDocument

Let me know if you need clarification but I think this will work for you.
0
 
LVL 5

Expert Comment

by:snocross
Comment Utility
I've just read that the above solution will work to hide the group when using the address book but the group could still show up using the type-ahead feature... here's another method I stumbled upon that requires you to modify your mail template:

http://www.notes.net/46dom.nsf/55c38d716d632d9b8525689b005ba1c0/350f7649053b7c4685256a47001a4241?OpenDocument&Highlight=0,restrict,group,mail
0
 
LVL 3

Assisted Solution

by:Joep8020
Joep8020 earned 100 total points
Comment Utility
I think there is an even easier way to do it.

In the document properties of the Group document, adjust who can read the document. This way you have complete control over who can use the group.

success
0
 

Author Comment

by:vsaraogi
Comment Utility
Joep8020

This will work only with in the organization. But outsiders can send a mail to that group. We want to stop it for outsiders also.


Vishal
0
 
LVL 63

Expert Comment

by:Zvonko
Comment Utility
vsaraogi,
No comment has been added lately (941 days), so it's time to clean up this TA.
I will leave a recommendation in the Cleanup topic area for this question:

RECOMMENDATION: split points between snocross http:#6328259 and Joep8020 http:#6337663
Please leave any comments here within 4 days.

-- Please DO NOT accept this comment as an answer ! --

Thanks,

Zvonko
EE Cleanup Volunteer
0

Featured Post

What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

Join & Write a Comment

This is an old article, please see an updated version of this article, located here: http://www.experts-exchange.com/articles/23619/Notes-8-5x-Windows-7-Notes-info-and-tips.html
Problem "Can you help me recover my changes?  I double-clicked the attachment, made changes, and then hit Save before closing it.  But when I try to re-open it, my changes are missing!"    Solution This solution opens the Outlook Secure Temp Fold…
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now