Solved

Copiers and exchange 2010

Posted on 2012-03-29
7
1,094 Views
Last Modified: 2012-08-14
I just installed/moved to Exch 2010 from exch 2003. Before the change anyone could scan to email on the copiers inside or outside email addresses. now you can only scan to network (domain) email addresses, can not scan to outside email addresses anymore.
What needs to be changed on the exch2010 server?
0
Comment
Question by:Hubman
  • 2
  • 2
  • 2
  • +1
7 Comments
 
LVL 38

Accepted Solution

by:
Philip Elder earned 250 total points
Comment Utility
Steps are here:

http://blog.mpecsinc.ca/2009/09/sbs-2008-mfpcopier-to-scan-to-e-mail.html

SBS Specific but they work in Exchange 2010.

Philip
0
 
LVL 4

Assisted Solution

by:Red_Tech
Red_Tech earned 50 total points
Comment Utility
0
 
LVL 1

Author Comment

by:Hubman
Comment Utility
Do you have an SMTP Relay Connector? Not sure. I will read over these articles.
0
Too many email signature changes to deal with?

Are you constantly being asked to update your organization's email signatures? Do they take up too much of your time? Wouldn't you love to be able to manage all signatures from one central location, easily design them and deploy them quickly to users. Well, you can!

 
LVL 29

Assisted Solution

by:pwindell
pwindell earned 200 total points
Comment Utility
It is pretty simple.  You have to give the Copier's IP# permission to "Relay" mail.  When it sends to local internal mailboxes that is not considered a "relay",...but when it has to bounce emails off of your Exchange to go to outside email addresses then that is considered a "Relay"
0
 
LVL 38

Expert Comment

by:Philip Elder
Comment Utility
Our blog post provides a step-by-step for setting everything up start to finish.

Philip
0
 
LVL 29

Expert Comment

by:pwindell
Comment Utility
I'm sure it does.  I was just trying to give him the "short version" in case he already knows how to setup something to relay.
0
 
LVL 1

Author Comment

by:Hubman
Comment Utility
Sorry for the delay..had wireless system issues.  MPECSInc, your blog is great, scan to outside email work now!

Thanks All
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Utilizing an array to gracefully append to a list of EmailAddresses
Restoring deleted objects in Active Directory has been a standard feature in Active Directory for many years, yet some admins may not know what is available.
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…
The video tutorial explains the basics of the Exchange server Database Availability groups. The components of this video include: 1. Automatic Failover 2. Failover Clustering 3. Active Manager

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

7 Experts available now in Live!

Get 1:1 Help Now