Solved

Problems with setting up DLs in AD

Posted on 2006-06-25
7
228 Views
Last Modified: 2010-03-19
I had set up a Query Based DL. I then change it to a regular DL but when I try to use it from my client machine all it seems to still only see the Query Based DL because I can't expand it to see the recipents even though i had deleted the original Query based DL.
0
Comment
Question by:ronfast
  • 5
  • 2
7 Comments
 
LVL 13

Expert Comment

by:itcoza
ID: 16979076
Hi ronfast,

And this has ? to do with networking ? :)

Regards,
M
0
 

Author Comment

by:ronfast
ID: 16979110
how do i delete this question
0
 
LVL 13

Expert Comment

by:itcoza
ID: 16979129
If you want to delete this question, post a zero-point question in http://www.experts-exchange.com/Community_Support/

Subject: Moderator Please Delete
Body: Please delete this question:
http://www.experts-exchange.com/Networking/Q_21898443.html
0
Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

 
LVL 13

Accepted Solution

by:
itcoza earned 500 total points
ID: 16979131
ronfast,

Or you can just give me the points...  :)

*****************************
Regards, M
   
0
 

Author Comment

by:ronfast
ID: 16979390
Since I gave you the points do you have teh answer to the original question?
0
 
LVL 13

Expert Comment

by:itcoza
ID: 16979415
ronfast,

Sweet. ;)

*****************************
Regards, M
   
0
 
LVL 13

Expert Comment

by:itcoza
ID: 16979427
0

Featured Post

Live: Real-Time Solutions, Start Here

Receive instant 1:1 support from technology experts, using our real-time conversation and whiteboard interface. Your first 5 minutes are always free.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Vlan to Vlan communication 9 102
Setting up a VPN 60 137
Help logging in to my router 12 45
Switch ports not working 8 32
If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

785 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question