Something caught be few day back regarding the cloud, everyone does know the word ‘cloud’ and ‘cloud computing’ but you sure how these things work. If we ask someone what are the platform of cloud, they will immediately reply SaaS, PaaS and IaaS. But we barely know what does things are and how it works.
On my last blog, I had a talk about DAG (Database Availability Group) on Exchange 2016. Fortunately, I had smooth configuration but luck doesn’t go every day like that. Here is one of the issue you might face during the configuration of DAG and also I have posted resolution on it.
As I have already explained on my previous blog, that Email has become quite critical service within an organization. Service down of an email might bring the business down. Hence every organization would like to configure HA (High Availability) of Email Services. Since there has been restructure of an Architecture of Exchange server 2016, it
Group Policy are the essential factors of the Active Directory Domain Controller, if anyone is using the Active Directory on their environment the first thing he would like to configure is GPO. Which will control the method of giving facility and responsibilities to the users, but in the same organization it does have less GPO
As of I remember, last time when we were on the blog of Exchange. We were up to the configuration of Virtual Directories for Exchange server. And we have already done work with import of bulk users on our Active Directory, Importing user on Active Directory will not create an Exchange mailbox on the Exchange
Few Days back, one of my client has requested if we can write a script for him on the details of user, group and computer within his environment. As of that request, I have created a script on which Administrator can have details of user, Group and computers. Like total users, disabled users, enabled users
On my previous blog, I have shared my knowledge regarding the security of the Organization with DLP on Document Fingerprints. As all of know how crucial email has been these days, even for any official approval or submission or information circulation we use email. If such critical information on email gets leaked, it might burn
Since last few months there has been yellow alert from Microsoft Team on the Enforcement of SHA1 Certificates. Not only Microsoft team but also the other certificate provider and browsers too. Although most of the public SSL has already using SHA2 or we say SHA256, still there might be some private certificate with SHA1. Hence
Email has become the Business-Critical application on any of the enterprise. And to secure such infrastructure, there arises a challenge for everyone. If we go with the history of the Microsoft Exchange, since Exchange 2013 Microsoft has enhanced its security feature for the inflow and outflow of the emails. One of the feature for the
Hey, Hi I am back again with the few tips on Active Directory User Accounts. There are few scenarios that we want to expire the account immediately, or sometime we just want to expire account or Password for testing purpose. In case of the password expire, you cannot do it immediately. Instead you can expire