How to simulate spam mail?

Post Views: 14,081 Let’s start with the most obvious question – why should I try to simulate spam mail? And the answer is – to test our existing mail security infrastructure. In a modern mail environment, the need for implementing some “security mechanism” which will protect our mail infrastructure from spam mail and other threats,…

Details

Manage Send As Permissions using PowerShell – Office 365

Post Views: 33,527 The current article dedicated to the subject of performing a management task that relates to the Send As permission using PowerShell. The Send As permission enables recipient X to send an E-mail message using the identity of a recipient Y. Technically speaking, this method can describe as “impersonation.” In Office 365 based…

Details

Office 365 Cutover mail migration – Exchange on-Premises pre requirements

Post Views: 11,191 The most common cause for a scenario, in which we fail to start the process of Office 365 cutover mail migration is – the lack of the Exchange on-Premises pre requirements. The primary goals of the current article are: Provide the checklist of Exchange on-Premises pre-requirements Explain in details the reasons for…

Details