Solved

can mail merge send as a mail enabled publc folder

Posted on 2009-07-07
5
1,176 Views
Last Modified: 2013-11-30
User here is trying to do a mail merge, and send as an e-mail address that is in fact a mail enabled public folder, not an e-mail account.

We have tried using profiles within outlook but when attempting to associate that profile with that e-mail address, it asks us for credentials we don't have since it is not an actual e-mail account.

We have also gotten close by within outlook selecting actions, new mail using, microsoft word, and putting the e-mail address (GTA) in the from field which it accepts. Upon doing a test merge, the e-mail came from the user's account, not the GTA e-mail address we told it to.

Any help would be much appreciated. Thank you.
0
Comment
Question by:crphd
  • 3
  • 2
5 Comments
 
LVL 6

Expert Comment

by:grandebob
ID: 24798574
You need to give the user "Send As" permissions to that public folder.

You can use the Public Folder Managment tool to modify the "Send As" Permission. Then use the "From" Field to specify the public folders address.
0
 
LVL 1

Author Comment

by:crphd
ID: 24798585
The user does have send as permissions, she can send to users individually from that e-mail address, its when she uses a mail merge that it doesnt want to work.
0
 
LVL 6

Accepted Solution

by:
grandebob earned 500 total points
ID: 24798868
You could set up a second outlook profile and set up a pop3/smtp account that has that email address. As long as your exchange server will allow your local outlook client to use it as a relay server, you should be set.

It doesn't matter if it can receive messages, as long as the outbound works, you should be golden.
0
 
LVL 1

Author Comment

by:crphd
ID: 24798894
That's a good idea, let me try this tomorrow and I will get back to you. Thank you.
0
 
LVL 1

Author Closing Comment

by:crphd
ID: 31600824
It worked like a charm. Thank you so much.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Local Continuous Replication is a cost effective and quick way of backing up Exchange server data. The following article describes the steps required to configure Local Continuous Replication. Also, the article tells you how to restore from a backup…
Scam emails are a huge burden for many businesses. Spotting one is not always easy. Follow our tips to identify if an email you receive is a scam.
To show how to create a transport rule in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.: First we need to log into the Exchange Admin Center. Navigate to the Mail Flow >> Rules tab.:  To cr…
The basic steps you have just learned will be implemented in this video. The basic steps are shown to configure an Exchange DAG in a live working Exchange Server Environment and manage the same (Exchange Server 2010 Software is used in a Windows Ser…

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now