I have covered how to install WAP (Web Application Proxy) in Server 2012 R2 and Let’s see how to publish Exchange 2013 OWA using WAP. The following table describes the Exchange services that you can publish through Web Application Proxy and the supported preauthentication for these services: What is Pass-Through Authentication? When you want to publish […]
NUMA Stands for Non-Uniform Memory Access. Name itself says what is it. Isn’t it?? In a NUMA system, CPUs are arranged in smaller systems called nodes. Each node has its own processors and memory, and is connected to the larger system through a cache-coherent interconnect bus. Each Node connected to set of CPUs and Memory which […]
RAID for Redundant Array of Inexpensive (Independent) Disks. When we talks about Storage and File Servers, we should be very familiar with RAID concepts. Without knowing them deeply, we will end up with confusion. Here we we will go through four types of RAID Level which are highly used in the industry. 1. RAID 0 2. […]
Exchange 2016 Technical Preview is available for the public since July, 2015 for testing and evaluate the features. which i have posted here during that time. AI have posted how to install Exchange 2016 Technical Preview on Server 2012 R2 in my past Article. Exchange released Exchange Server 2016 RTM today and it can be downloaded […]
Update Rollup 11 for Microsoft Exchange Server 2010 Service Pack 3 (SP3) was released on September 15, 2015. From the Microsoft Exchange Team blog: it Fixes following Issues reported, 1. This release provides an important fix for an Information Store crash when customers are upgrading their Lync server infrastructure to Skype for Business.Exchange Server 2010 is […]
Cumulative Update 10 contains the latest set of fixes and builds upon Exchange Server 2013 Cumulative Update 9. As per Microsoft September 2015 Quarterly Exchange Update Notes, 1.The release includes fixes for customer reported issues, minor product enhancements and previously released security bulletins, including MS15-103. 2.A complete list of customer reported issues resolved can be […]
DomainKeys Identified Mail (DKIM) is another method of Spam and Phishing fighting by Signing outgoing Mails using Cryptographic Signature. So that Recipient can validate and determine the Mail whether it is sent by Authorized Mail System. I have posted what is Sender Policy Framework (SPF) and how it works. DKIM is also another method like SPF wherein […]
If you want to see availability of the room(Resource) Mailbox, You will add it in outlook and go for Scheduling Assistant to checking the availability of the room. Right?? Now take an example, you want to see all the room mailboxes availability,we can’t go for typical adding and checking Scheduling Assistant. it will be lengthy process […]
What is MRS Proxy? Mailbox Replication Service(MRS) Proxy which is used to enable option for Cross forest migration. It is very much required if you want to have Hybrid Exchange Forest where integrated with Exchange Online(Office 365). This service makes your on-board and Off-Boarding of mailboxes very seamless. You need to enable MRSProxy in all […]
Sender Policy Framework simply called as SPF is defining a policy who, which are servers can send mails from the domain. It will be very useful to the large and Medium Scale companies to avoid Spoofing attacks from the spammers but now a days small scale companies also started to use the SPF Records. How Does it […]





