In a Organization, Exchange is the critical application. Being Exchange administrator, I know the pain where users won’t even allow for even 5 Minutes of downtime for their mailboxes. Think how much escalations you will get if the Database which is hosting hundreds of the mailboxes is going down and not getting restored within time. Also You […]
The change in the architecture of public folders has made it easier for Exchange end users to recover public folders that are mistakenly deleted. Public folders, within the deleted item retention period, are recoverable from their parent folder in Outlook. After the retention period they can still be recovered from a full back-up with the […]
In this post, I will be covering how to Migrate 2-Tier Windows PKI SHA-1 Algorithm Infrastructure to SHA-256(Simply called as SHA-2) Algorithm. Why do we need this migration: Server Authentication certificates: CA must begin issuing new certificates using only the SHA-2 algorithm after January 1, 2016. Windows will no longer trust certificates signed with SHA-1 […]
In the post,Will show you how to install Subordinate CA where you have already have Enterprise ROOT-CA available in the domain. Ideally, When you install Subirdiante CA Under ROOT-CA is called 2-Tier PKI Infrastructure. Many Organizations they use 2-Tier Method to avoid abnormal down due to the Servers, Threats and Vulnerability. ROOT-CA or Offline-CA will […]
In this Article, Will show you how to install the Azure AD Connect 1.1 using Express Settings. Express Settings is the default option. Prerequisites for Azure AD Connect Before you install Azure AD Connect, you need to keep the following Prerequisites ready. Azure AD On-premises servers and environment Accounts Connectivity Copy <system.net><defaultProxy> <proxy usesystemdefault=”true” proxyaddress=”http://<PROXYADDRESS>:<PROXYPORT>” […]
In this Article, Will show you how to install the Azure AD Connect 1.1 using Customised Settings. Prerequisites for Azure AD Connect Before you install Azure AD Connect, you need to keep the following Prerequisites ready. Azure AD On-premises servers and environment Accounts Connectivity Copy <spanclass=”tag”style=”color: maroon;”><system.net></span><spanclass=”tag”style=”color: maroon;”><defaultProxy></span><spanclass=”pln”style=”color:#000000;”> <proxy usesystemdefault=”true” proxyaddress=”http://</span><spanclass=”tag”style=”color: maroon;”><PROXYADDRESS></span><spanclass=”pln”style=”color:#000000;”>:</span><spanclass=”tag”style=”color: maroon;”><PROXYPORT></span><spanclass=”pln”style=”color:#000000;”>” bypassonlocal=”true” /> […]
If any Email System is compromised by Malware or a Malicious Spam Attack, and it is sending outbound spam using EOP(Exchange online Protection), it will end up with block listing the IP addresses of the EOP Data Center Servers. Hence the Mails from theses IP Addresses will be rejected by the other mailing systems. Since […]
By default, Exchange Online always uses opportunistic TLS. Which means Exchange Online always tries to encrypt connections with the most secure version of TLS first, then by default the message will be sent unencrypted if the recipient organization doesn’t support TLS encryption. Unless you have configured Exchange Online to ensure that messages to that recipient are only sent […]