Logo
PREGNANCY
Windows XP
Windows Vista
Windows 7
Windows Azure
Windows Server
Windows Phone
 
 
Windows Server

Exchange Server 2010 : Setting Up Public Folders (part 4) - Create and Configure a Dynamic Distribution Group

3/26/2011 6:25:07 PM
EXERCISE 3 Create and Configure a Dynamic Distribution Group

In this practice exercise, you will create and configure a dynamic distribution group called Research. To complete this exercise, perform the following steps:

  1. Ensure that you are logged on to computer VAN-EX2 with the Kim_Akers user account. Navigate to the Recipient Configuration node and select the Anne Wallace Mail User. In the Actions pane, click on Properties. On the Organization tab of the Ann Wallace Properties dialog box, enter Research in the Department text box, as shown in Figure 8, and then click OK.

    Figure 8. Configure Anne Wallace Organization attribute


  2. Select the Rob Walters Mail User. In the Actions pane, click on Properties. On the Organization tab of the Rob Walters Properties dialog box, enter Development in the Department text box and then click OK.

  3. Select the Recipient Configuration\Distribution Group node and then click on New Dynamic Distribution Group in the Actions pane. This will open the New Dynamic Distribution Group Wizard.

  4. On the Introduction page, enter ResearchDDG in the Name and Alias text boxes and then click Next. On the Filter Settings page, click Next.

  5. On the Conditions page, select the Recipient Is In A Department condition. Click on the underlined word Specified to open the Specify Department dialog box. Enter Research and then click Add and then click OK. Verify that the Conditions page matches Figure 9 and then click Preview.

    Figure 9. New Dynamic Distribution Group conditions


  6. In the Dynamic Distribution Group Preview window, verify that Ann Wallace is listed and then click OK. Click Next. On the Configuration Summary page, click New. Click Finish when the group is created.

  7. In the EMS, issue the following command:

    New-DynamicDistributionGroup -Name 'DevelopDDG' -IncludedRecipients
    'AllRecipients' -ConditionalDepartment 'Development' -Alias 'DevelopDDG'

  8. In the EMC, right-click on DevelopDDG under Recipient Configuration\Distribution Group and then click Properties.

  9. On the Mail Flow Settings tab, click on Message Delivery Restrictions and then click Properties.

  10. On the Message Delivery Restrictions dialog box, select Only Senders In The Following List and then click Add. In the Select Recipient dialog box, click DevelopDDG and then click OK. Verify that the Message Delivery Restrictions dialog box matches Figure 10 and then click OK twice.

    Figure 10. Message delivery restrictions


  11. In the EMS, issue the following command:

    Set-DynamicDistributionGroup -AcceptMessagesOnlyFromSendersOrMembers 'Adatum.com/
    Users/ResearchDDG' -Identity 'adatum.com/Users/ResearchDDG'

Other -----------------
- Exchange Server 2010 : Setting Up Public Folders (part 2) - Mail-Enable Public Folder & Configuring Public Folder Limits
- Exchange Server 2010 : Setting Up Public Folders (part 1) - Creating Public Folders & Configuring Public Folder Permissions
- Windows Server 2008 R2 : Managing Computers with Domain Policies (part 7)
- Windows Server 2008 R2 : Managing Computers with Domain Policies (part 6)
- Windows Server 2008 R2 : Managing Computers with Domain Policies (part 5)
- Windows Server 2008 R2 : Managing Computers with Domain Policies (part 4) - Deploying Printers
- Windows Server 2008 R2 : Managing Computers with Domain Policies (part 3) - Creating Application Control Policies
- Windows Server 2008 R2 : Managing Computers with Domain Policies (part 2) - Creating a Software Restriction Policy
- Windows Server 2008 R2 : Managing Computers with Domain Policies (part 1)
- BizTalk 2010 Recipes : Document Schemas - Defining Regular Expressions
- BizTalk 2010 Recipes : Creating Complex Types
- Windows Server 2008 High Availability : Load Balancing (part 2) - Load-Balancing Hardware & Load Balancing and SharePoint Farm Topology
- Windows Server 2008 High Availability : Load Balancing (part 1) - Load-Balancing Software
- Windows Server 2003 : Troubleshooting Internet Connectivity (part 2) - Verifying the Computer’s Network Settings
- Windows Server 2003 : Troubleshooting Internet Connectivity (part 1) - Identifying the Specific Networking Issue
- Exchange Server 2010 : Securing Windows for the Edge Transport Server Role
- Exchange Server 2010 : Edge Transport Server Connectors
- BizTalk 2010 Recipes : Creating Envelopes to Split Inbound Data
- BizTalk 2010 Recipes : Referencing Schemas
- BizTalk 2010 Recipes : Importing Schemas
 
 
Most view of day
- Microsoft Project 2010 : Fine-Tuning Task Details (part 8) - Setting Up a Recurring Task
- Maintaining Desktop Health : Monitoring Reliability and Performance (part 4)
- Windows Phone 8 : Scheduled Tasks - To-Do List Scheduled Task Sample (part 3) - Debugging Scheduled Tasks
- Managing Change through Group Policy (part 2) - Working with central policies
- Windows Server 2012 : Configuring IPsec (part 2) - Configuring IPsec settings - Customizing IPsec defaults
- SQL Server 2008 : Security - Authentication mode
- Microsoft PowerPoint 2010 : Inserting Content from External Sources - Inserting New Slides from an Outline
- Sharepoint 2013 : Service Application Administration (part 4) - Setting Up the Farm Trust, Publishing a Service Application
- Windows 7 Mobility Features : Working with the Windows 7 User Interface
- Plug and Play and Power Management : Device Enumeration and Startup (part 2) - Device Power-Down and Removal
Top 10
- Windows Server 2012 : Configuring IPsec (part 7) - Configuring connection security rules - Monitoring IPsec
- Windows Server 2012 : Configuring IPsec (part 6) - Configuring connection security rules - Creating a custom rule, Configuring authenticated bypass
- Windows Server 2012 : Configuring IPsec (part 5) - Configuring connection security rules - Creating an authentication exemption rule, Creating a server-to-server rule, Creating a tunnel rule
- Windows Server 2012 : Configuring IPsec (part 4) - Configuring connection security rules - Types of connection security rules, Creating an isolation rule
- Windows Server 2012 : Configuring IPsec (part 3) - Configuring IPsec settings - Customizing IPsec tunnel authorizations, Configuring IPsec settings using Windows PowerShell
- Windows Server 2012 : Configuring IPsec (part 2) - Configuring IPsec settings - Customizing IPsec defaults
- Windows Server 2012 : Configuring IPsec (part 1) - Understanding connection security
- Microsoft Project 2010 : Linking Tasks (part 8) - Auditing Task Links,Using the Task Inspector
- Microsoft Project 2010 : Linking Tasks (part 7) - Creating Links by Using the Mouse,Working with Automatic Linking Options
- Microsoft Project 2010 : Linking Tasks (part 6) - Creating Links by Using the Entry Table
 
 
Windows XP
Windows Vista
Windows 7
Windows Azure
Windows Server
Windows Phone
2015 Camaro