[Okta Webinar] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

Exchange 2010 and 2003 integration encryption

Posted on 2011-04-21
2
Medium Priority
?
287 Views
Last Modified: 2012-05-11
I heard during the integration Exchange 2010 and 2003 in the same organization Exch2010 encrypts messages and 2003 not.  So on 2010 I need to disable the encryption duting the migration/integration.
Is that true?  Please advice.

Thanks.
0
Comment
Question by:Tiras25
  • 2
2 Comments
 
LVL 10

Accepted Solution

by:
Muzafar Momin earned 2000 total points
ID: 35441279
that should not create any issue

 have a look at http://technet.microsoft.com/en-us/library/dd638130.aspx
0
 
LVL 10

Assisted Solution

by:Muzafar Momin
Muzafar Momin earned 2000 total points
ID: 35441318
if you are using outlook 2003 as a email client then you will need to disable

command
Set-RpcClientAccess Server <Server Name> EncryptionRequired $False
0

Featured Post

Simplify Active Directory Administration

Administration of Active Directory does not have to be hard.  Too often what should be a simple task is made more difficult than it needs to be.The solution?  Hyena from SystemTools Software.  With ease-of-use as well as powerful importing and bulk updating capabilities.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this post, I will showcase the steps for how to create groups in Office 365. Office 365 groups allow for ease of flexibility and collaboration between staff members.
Eseutil Hard Recovery is part of exchange tool and ensures Exchange mailbox data recovery when mailbox gets corrupt due to some problem on Exchange server.
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses
Course of the Month19 days, 2 hours left to enroll

834 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question