In a Organization, Exchange is the critical application. Being Exchange administrator, I know the pain where users won’t even allow for even 5 Minutes of downtime for their mailboxes.
Think how much escalations you will get if the Database which … Continue Reading
The change in the architecture of public folders has made it easier for Exchange end users to recover public folders that are mistakenly deleted. Public folders, within the deleted item retention period, are recoverable from their parent folder in Outlook. … Continue Reading
In the post,Will show you how to install Subordinate CA where you have already have Enterprise ROOT-CA available in the domain.
Ideally, When you install Subirdiante CA Under ROOT-CA is called 2-Tier PKI Infrastructure. Many Organizations they use 2-Tier Method … Continue Reading
By default, Exchange Online always uses opportunistic TLS. Which means Exchange Online always tries to encrypt connections with the most secure version of TLS first, then by default the message will be sent unencrypted if the recipient organization doesn’t … Continue Reading
If any Email System is compromised by Malware or a Malicious Spam Attack, and it is sending outbound spam using EOP(Exchange online Protection), it will end up with block listing the IP addresses of the EOP Data Center Servers. Hence … Continue Reading