get-sendconnector fl | port yazın enter e basarak portun 25 olduğunu görün
Set-SendConnector -Identity “*” -port 587
Bu Blogda Ara
16 Temmuz 2012 Pazartesi
4 Temmuz 2012 Çarşamba
event id 1022 scecli
başlat/çalıştıra rsop.msc yi çalıştırın.
bilgisayar yapılandırması / windows ayarları / güvenlik ayarları / yerel ilkeler / kullanıcı hakları ataması
altında kırmızı işaretli sistemi kapat vardır ve yanında onu etkileyen domain policy görünmektedir.
Bundan kurtulmak için
başlat / çalıştır / mmc / ekle birleşen ekle /kaldır / grup ilke nesne düzenleyiciyi açın / gözatı tıklayın ve default domain policy i seçin ( kırmızı işaretlinin yanındaki policy hangisiyse onu seçin) / son / kapat /tamam ı tıklayın.
bu pencerede ise
bilgisayar yapılandırması / windows ayarları / güvenlik ayarları / yerel ilkeler / kullanıcı hakları ataması altına gelin ve kırmızı işaretli olan sistemi kapatı çift tıklayıp size ait olmayan domain adını kaldırın.
sonra farklı bir isimle kaydedin.başlattan çalıştıra gpoupdate / force yazın
sorun giderilmiş olacaktır.
bilgisayar yapılandırması / windows ayarları / güvenlik ayarları / yerel ilkeler / kullanıcı hakları ataması
altında kırmızı işaretli sistemi kapat vardır ve yanında onu etkileyen domain policy görünmektedir.
Bundan kurtulmak için
başlat / çalıştır / mmc / ekle birleşen ekle /kaldır / grup ilke nesne düzenleyiciyi açın / gözatı tıklayın ve default domain policy i seçin ( kırmızı işaretlinin yanındaki policy hangisiyse onu seçin) / son / kapat /tamam ı tıklayın.
bu pencerede ise
bilgisayar yapılandırması / windows ayarları / güvenlik ayarları / yerel ilkeler / kullanıcı hakları ataması altına gelin ve kırmızı işaretli olan sistemi kapatı çift tıklayıp size ait olmayan domain adını kaldırın.
sonra farklı bir isimle kaydedin.başlattan çalıştıra gpoupdate / force yazın
sorun giderilmiş olacaktır.
3 Temmuz 2012 Salı
Sunucu hatası: '550 5.7.1 Unable to relay' HATASI
Add-AdPermission -Identity "Default XXXX" -User "NT AUTHORITY\ANONYMOUS LOGON" -ExtendedRights ms-Exch-SMTP-Submit,ms-Exch-SMTP-Accept-Any-Recipient,ms-Exch-Bypass-Anti-Spam
Installing an SSL Certificate in Microsoft Exchange Server 2007
- From the Start menu, click Run...
- Type mmc and click OK. The Microsoft Management Console (Console) window opens.
- From the File menu, click Add/Remove Snap In.
- Select Certificates, and then click Add.
- Select Computer Account, and then click Next.
- Select Local Computer, and then click Finish.
- Click OK to close Add or Remove Snap-ins.
- In the Console window, expand the Certificates folder.
- Right-click Intermediate Certification Authorities, mouse-over All Tasks, and then click Import.
- In the Certificate Import Wizard, click Next.
- Click Browse to find the certificate file.
- In the bottom right corner, change the file extension filter to PKCS #7 Certificates (*.spc;*.p7b).
- Select your certificate file, and then click Open.
- Click Next.
- Select Place all certificates in the following store.
- Click Browse, select Intermediate Certification Authorities, and then click Next.
- Click Finish.
- From the Start menu, select Microsoft Exchange Server 2007, and then click Exchange Management Shell.
- At the prompt, type the following to import the certificate:Import-ExchangeCertificate -Path C:\CertificateFile.crtNOTE: Replace CertificateFile.crt with the complete path and file name of your certificate.
- Copy the thumbprint of the certificate.
- Type the following to enable the certificate:Enable-ExchangeCertificate -Thumbprint paste_thumbprint_here -Services "SMTP, IMAP, IIS"NOTE: Paste the thumbprint in place of paste_thumbprint_here. Specify the services this certificate covers, using quotes. Valid service identifiers are SMTP, POP, IMAP, UM, and IIS. Do not enable services that are not in use.
- Close the Exchange Management Shell window.
To Install an SSL in Microsoft IIS 5 & 6
- To install the Intermediate certificate, click Start , and then click Run....
- Type mmc, and then click OK. The Microsoft Management Console (Console 1) opens.
- From the File menu, click Add/Remove Snap-in... .
- In the Add/Remove Snap-in window, click Add.
- In the Add Standalone Snap-in window, select Certificates, and then click Add.
- In the Certificates snap-in window, select Computer Account, and then click Next.
- In the Select Computer window, select Local Computer, then click Finish.
- In the Add Standalone Snap-in window, click Close.
- In the Add/Remove Snap-ins window, click OK.
- In the Console 1 window, click + to expand the Certificates folder.
- Right-click Intermediate Certification Authorities, mouse-over All Tasks, and then click Import.
- In the Certificate Import Wizard, click Next.
- Click Browse to find the certificate file.
- In the Open window, select *.p7b for the Files of type.
- Select the appropriate intermediate certificate file, and then click Open.
- In the Certificate Import Wizard window, click Next.
- Select Place all certificates in the following store, and then click Browse.
- In the Select Certificate Store window, select Intermediate Certification Authorities, and then click OK.
- In the Certificate Import Wizard, click Next.
- Click Finish.
- Click OK.
- Close the Console 1 window, and then click No to remove the console settings.
- To install the primary certificate, click Start, select Administrative Tools, and then click Internet Information Services (IIS) Manager.
- In the Internet Information Services (IIS) Manager window, click + next to your local computer.
- Click + next to Web Sites.
- Right-click the website or host name for your certificate, and then click Properties.
- In the Default Web Site Properties window, click Directory Security.
- Click Server Certificate.
- In the Welcome to the Web Server Certificate Wizard window, click Next.
- In the IIS Certificate Wizard window, select Process the pending request and install the certificate, and then click Next.
- Click Browse.
- In Open window, select All files (*.*) for Files of type:, select your certificate file, and then click Open.
- In the IIS Certificate Wizard window, click Next.
- Enter the port you want your website to use, and then click Next.
- Verify the Certificate Summary, and then click Next.
- Click Finish.
1 Temmuz 2012 Pazar
Event ID: 1173 Source: MSExchangeIS Mailbox Store
1). In Exchange System Manager, right click the Store, click
Properties. Then, copy the "Exchange database" path in the Database
tab. For your information, my path is: E:\Program
Files\Exchsrvr\mdbdata\priv1.edb.
2). Dismount the Store.
3). Click Start -> Run, type "cmd", and press Enter.
4). Use the "cd" command to enter the following directory "E:\Program Files\Exchsrvr\bin".
5). Enter the following command and press Enter:
esetuil /d "E:\Program Files\Exchsrvr\mdbdata\priv1.edb".
For your information, a successful output is similar to the following information:
Initiating DEFRAGMENTATION mode...
Database: E:\Program Files\Exchsrvr\mdbdata\priv1.edb
Streaming File: E:\Program Files\Exchsrvr\mdbdata\priv1.STM
Temp. Database: TEMPDFRG2880.EDB
Temp. Streaming File: TEMPDFRG2880.STM
Defragmentation Status (% complete).
6). Mount the Store again".
2). Dismount the Store.
3). Click Start -> Run, type "cmd", and press Enter.
4). Use the "cd" command to enter the following directory "E:\Program Files\Exchsrvr\bin".
5). Enter the following command and press Enter:
esetuil /d "E:\Program Files\Exchsrvr\mdbdata\priv1.edb".
For your information, a successful output is similar to the following information:
Initiating DEFRAGMENTATION mode...
Database: E:\Program Files\Exchsrvr\mdbdata\priv1.edb
Streaming File: E:\Program Files\Exchsrvr\mdbdata\priv1.STM
Temp. Database: TEMPDFRG2880.EDB
Temp. Streaming File: TEMPDFRG2880.STM
Defragmentation Status (% complete).
6). Mount the Store again".
MSExchangeTransport event 1025
Default Receive connectors on all HUB server and then delete it.
After
recreated a Default <SERVER> Receive connectors on all HUB server one by one with proper permission.
=> Delete the Default Receive connector and recreate it
General --> Verbose
Network --> local IP address
àAll availableIPv4
Remote Ip address: 0.0.0.0-255.255.255.255
Permission Groups -->
Anonymous users, Exchange Server & Exchange server
Authentication -->
Transport Layer security (TLS), Basic Authentication, Offer Basic Auth & Integrated windows authentication
Kaydol:
Kayıtlar (Atom)