Skip to main content

Whaddya know how to create a Mailing Distribution List in MS Exchange Server 2007?

Ok you're the Network Administrator in your company and they had asked you to create a Mailing Distribution List. For example a mailing list for your HelpDesk support, let's call it as HelpDesk @ King.net. Well, as Network Administrator/Email Administrator you suppose to know it. This is just another technical how to references to guide other Network or Email Administrator out there.

In this example, we are using MS Exchange Server 2007. I need to point this out because the management console is different between MS Exchange Server 2003 and 2007.

Ok, let's begin. Fire up (I mean double click on)  your Exchange Management Console.
  • In Recipient Configuration, select Distribution Group.
  • Right click on Distribution Group to create New Distribution Group.
  • Select New Group, click Next
  • Select Group Type as Distribution
  • Type the Name and Alias e.g. HelpDesk, click Next to complete.
  • Add the user(s) to be member of this distribution list
  • Send a test message and you're done.
Well not yet! By default, MS Exchange Server 2007 policy is requiring that all senders are authenticated. In this case, when someone from outside send you a message. They will receive an email from the Postmaster regarding undeliverable due to Exchange policy.

But if you're senders are all within your organization. It is safe (highly recommended) to requires all senders are authenticated.

How do you disable "Requires that all senders are authenticated" for this specific Mailing Distribution List?

Let's go back to the Exchange Management Console, select the Distribution Group e.g. HelpDesk, click on Properties.
  • In HelpDesk properties, click on Mail Flow Settings tab.
  • Select Message Delivery Restrictions, then click Properties
  • In Message Delivery Restrictions, uncheck "Requires that all senders are authenticated".
  • Click OK to apply your changes.
Now test sending email to your HelpDesk distribution list from your outside email such as Gmail, MSN or Yahoo. This should work now.

SECURITY REMINDER: When you disabled "Requires that all senders are authenticated" you will receive email from outside of your company including unsolicited emails or SPAM. This is only applicable if you have a number of consultants working for your company. 

As IT Security person, I don't recommend disabling this feature. I want all exchange users to properly authenticated before they can use the service. As always, consider other best alternative.

Share your thought, post your comments or join me at PCLiveSupport.com community.

Comments

Popular posts from this blog

Alternative Social Networks

If you are planning to create your  social network  e.g. similar to Facebook. Here's a short list of alternative software's: Open Source and Free​ http://buddypress.org/  - Wordpress (Open Source and Free) http://elgg.org/  - (Open Source and Free) Commercial Social Networks software http://www.socialengine.com/  ($299 Stand Alone, $29/mo Cloud) http://www.jomsocial.com/  (run with Joomla, need to know CMS) http://www.boonex.com/  (very expensive, $399 for Standard) http://www.anahitapolis.com/ http://www.oxwall.org/ http://sharetronix.com/ http://www.moosocial.com/ http://www.jcow.net/ http://phpdolphin.com http://www.grou.ps  (from free to Commercial, I left my networks and they are selling it  http://www.phpfox.com/  (I used this before, it's hard to maintain. I moved to NING but left too after it was sold to another company) http://www.ning.com  (I don't recommend using this service, it's hard to export your data when it's time to move) S

Learning Vulnerability Scanning by KING.NET

Learning Vulnerability Scanning is fun and easy. So I hope you enjoy reading this short how to guide on how to use vulnerability scanning to secure your servers and networks. NMAP is the swiss tool that you need to learn if you're serious in Cyber Security profession. The NMAP tool can be use with NSE scripting (Nmap Scripting Engine) to automate your tasks. For example using NSE Script using a  single vulnerability (cold fusion)  to scan our test lab machine. root@kali:~# nmap -v -p 80  --script http-vuln-cve2010-2861  10.11.1.220 Starting Nmap 6.47 ( http://nmap.org ) at 2016-07-22 17:34 EDT NSE: Loaded 1 scripts for scanning. NSE: Script Pre-scanning. Initiating ARP Ping Scan at 17:34 Scanning 10.11.1.220 [1 port] Completed ARP Ping Scan at 17:34, 0.04s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 17:34 Completed Parallel DNS resolution of 1 host. at 17:35, 13.01s elapsed Initiating SYN Stealth Scan at 17:35 Scanning 10.11.1.220 [1 port] Comp