Solved

Microsoft POP connector with windows 2003

Posted on 2004-10-11
6
282 Views
Last Modified: 2006-11-17
Windows 2003 server with all mail delivered to an external ISP mail box.  

This is POPed regularly but any mail that is sent to a name that is not in AD needs to be sent to a particular mail box.

I have ticked the box for undeliverable mail to go to this mail box in the POP connector but this does not seem to deal with mail sent to people who are not in AD

How do I get fred@mydomain.com to get delivered to Peters mail box in exchange
0
Comment
Question by:jimcrint
  • 3
  • 2
6 Comments
 
LVL 7

Expert Comment

by:jaguarpriest
ID: 12277698
You question is a little unclear. What did you mean by you "ticked".

your first line about POPed is also blurry. Please clarify so we can try to help
0
 
LVL 1

Author Comment

by:jimcrint
ID: 12279667
I am using Windows 2003 small business server with all domain mail delivered to an external ISP mail box.   The SBS POP3 connector is configured to downloaed all mail from the ISP mail box every 15 minutes.  All mail that is addressed to a valid user in the domain is then distributed to their respective mail boxes by the exchange server.

In the POP3 connector manager there is a check box under trouble shooting for specifying a user that will receive all undeliverable POP3 email.  This does not appear to deal with mail addressed to a user who is not in the domain.

What i require is this:
1) where jim is a valid domain user
mail sent to jim@mydomain.com to be recieved in jims mail box in exchange  (this works OK)

2)Where fred is not a valid domain user (currently the sender of this email receives an email saying that the email has not been delivered and that the name was not found)
I need mail sent to fred@mydomain.com to get delivered to Peters mail box in exchange
and the sender to not recieve a non delivery message

I hope this is clearer
0
 

Expert Comment

by:BoltonWanderer
ID: 13489120
Hi Jim - did you ever get an answer to this - we are getting exactly the same?
0
Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

 
LVL 1

Author Comment

by:jimcrint
ID: 13502933
No
0
 

Accepted Solution

by:
BoltonWanderer earned 250 total points
ID: 13506917
0
 
LVL 1

Author Comment

by:jimcrint
ID: 14057445
Thanks for that it works well
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Join & Write a Comment

ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
This process describes the steps required to Import and Export data from and to .pst files using Exchange 2010. We can use these steps to export data from a user to a .pst file, import data back to the same or a different user, or even import data t…
In this video we show how to create an Accepted Domain in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.: First we need to log into the Exchange Admin Center. Navigate to the Mail Flow >> Ac…
This video discusses moving either the default database or any database to a new volume.

759 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now