Solved

exchange 2010 cas server

Posted on 2011-09-21
3
387 Views
Last Modified: 2012-05-12
How do i determine which 2010 cas server clients are accessing to get mailbox data ..I think they are crossing subnets to get info that should be local.

i have an enviroment of
1 exchange 2003 server
1 owa front end 2003 exchange server
1 cas server for internet owa and outlookanywhere
1 2010 exchagne server with mailbox roles and cas roles on separate subnet
0
Comment
Question by:ckness
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 49

Expert Comment

by:Akhater
ID: 36575837
ctrl + right click on the outlook icon in the system tray and click on connection status it will show you the client is connected to which server
0
 

Author Comment

by:ckness
ID: 36581291
that helpful but it is my understanding outlook goes to a cas server first to communicated with a database server.  How do i determine which server it contacts ...
0
 
LVL 49

Accepted Solution

by:
Akhater earned 500 total points
ID: 36581311
yes outlook will connect to a cas server and the cas server name will show in the server name
0

Featured Post

Does Powershell have you tied up in knots?

Managing Active Directory does not always have to be complicated.  If you are spending more time trying instead of doing, then it's time to look at something else. For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

After hours on line I found a solution which pointed to the inherited Active Directory permissions . You have to give/allow permissions to the "Exchange trusted subsystem" for the user in the Active Directory...
Group policies can be applied selectively to specific devices with the help of groups. Utilising this, it is possible to phase-in group policies, over a period of time, by randomly adding non-members user or computers at a set interval, to a group f…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …
Suggested Courses

617 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question