Solved

How to Do a GAL Sync during a exchange 2003 to Exchange 2010 Migration.  what do i use,  and how to configure.

Posted on 2010-09-17
5
1,075 Views
Last Modified: 2012-06-27
How do we do a gal sync from exchange 2003 to exchage 2010, in order to create mail enabled users in the Target forest. We are Migrating AD from 2003 to 2008 r2,  We are migrating Exchange 2003 to Exchange 2010.  All mailboxes are on 2003 mailbox server.  and we have built a 2010 Hub\
CAS\Mailbox server in the source domain for translation.  Using ILM contacts are created in Target,  but not mail enabled accounts.  This is the last piece to prepare for our migration.  what are we missing.  is there another tool that will do what we need.
0
Comment
Question by:bossbg01
5 Comments
 
LVL 26

Expert Comment

by:e_aravind
ID: 33708317
Not sure about your version of ILM
ILM FP1 Sp1 support GAL sync across forest
0
 

Author Comment

by:bossbg01
ID: 33720318
Yes it is ILM FP1 which does support Cross forest Sync
0
 
LVL 1

Accepted Solution

by:
jimjohnston earned 500 total points
ID: 33762625
The default GALSync code is designed to create contact, not provision new user principal objects with mailboxes.  The whole principle behind GALSync is that mailboxes on one side are created as contacts on the other side, and vice versa.  It is not designed as a migration solution.  You will need to modify the provisioning code to create AD user objects and mailboxes.
0
 
LVL 74

Expert Comment

by:Glen Knight
ID: 34690007
This question has been classified as abandoned and is being closed as part of the Cleanup Program. See my comment at the end of the question for more details.
0

Featured Post

VMware Disaster Recovery and Data Protection

In this expert guide, you’ll learn about the components of a Modern Data Center. You will use cases for the value-added capabilities of Veeam®, including combining backup and replication for VMware disaster recovery and using replication for data center migration.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article shows how to deploy dynamic backgrounds to computers depending on the aspect ratio of display
An analysis of the phishing scam that has been affecting Google users, along with steps to take for protection, as well as what to do if you receive one of the emails.
This tutorial will walk an individual through the steps necessary to join and promote the first Windows Server 2012 domain controller into an Active Directory environment running on Windows Server 2008. Determine the location of the FSMO roles by lo…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

803 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question