Solved

In refrence to  Mailbox Security policy

Posted on 2011-03-03
9
255 Views
Last Modified: 2012-05-11
http://www.experts-exchange.com/Q_26854479.html

I know the concepts please tell the steps a to

d.
0
Comment
Question by:kunalclk
  • 4
  • 2
9 Comments
 
LVL 2

Author Comment

by:kunalclk
Comment Utility
I want to know the steps in exchange 2007. Since have to configure it. Just a breif idea.
0
 
LVL 31

Expert Comment

by:DrUltima
Comment Utility
Your previous Question mentioned Exchange 2003.  Instead, you are asking how to set up mailbox size limits in Exchange 2007.  Is this a correct statement?

DrUltima
0
 
LVL 2

Author Comment

by:kunalclk
Comment Utility
Oh DrUltima you helped me in remembering things please just tell the receipient policy in 2007 thanks.
0
Maximize Your Threat Intelligence Reporting

Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

 
LVL 31

Accepted Solution

by:
DrUltima earned 500 total points
Comment Utility
Those steps are well documented by Microsoft, and I will not plagiarize their work:

http://technet.microsoft.com/en-us/library/bb201753%28EXCHG.80%29.aspx

DrUltima
0
 
LVL 2

Author Comment

by:kunalclk
Comment Utility
thanks for help was not okay sorry.
0
 
LVL 2

Author Comment

by:kunalclk
Comment Utility
thanks for help was not okay sorry.
0

Featured Post

Don't lose your head updating email signatures!

Do your end users still have the wrong email signature? Do email signature updates bore you or fill you with a sense of dread? You can make this a whole lot easier on yourself by trusting an Exclaimer email signature management solution. Over 50 million users do...so should you!

Join & Write a Comment

ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
OfficeMate Freezes on login or does not load after login credentials are input.
This tutorial will give a short introduction and overview of Backup Exec 2012 and how to navigate and perform basic functions. Click on the Backup Exec button in the upper left corner. From here, are global settings for the application such as conne…
This tutorial will walk an individual through locating and launching the BEUtility application to properly change the service account username and\or password in situation where it may be necessary or where the password has been inadvertently change…

763 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now