Restoring Deleted mail items using the PowerShell cmdlet Restore-RecoverableItems | 3#3

In the current article, we review the use of the PowerShell cmdlet – Restore-RecoverableItems. Restore deleted mail items to their original folder using PowerShell| The article series The article series includes the following articles: Restore deleted mail items to their original folder using PowerShell – introduction | 1#3 Display information about Deleted mail items using…

Read more

Display information about Deleted mail items using the PowerShell cmdlet Get-RecoverableItems | 2#3

In the current article, we review how to display information about deleted mail items, by using the PowerShell cmdlet – Get-RecoverableItems. Restore deleted mail items to their original folder using PowerShell| The article series The article series includes the following articles: Restore deleted mail items to their original folder using PowerShell – introduction | 1#3…

Read more

Restore deleted mail items to their original folder using PowerShell – introduction | 1#3

The current article series is dedicated to the subject of – Viewing + Restoring deleted mail items from an Exchange Online mailbox, to their original folder, using two new PowerShell cmdlets – Get-RecoverableItems and Restore-RecoverableItems. Restore deleted mail items to their original folder using PowerShell| The article series The article series includes the following articles:…

Read more

Using Office 365 content search for exporting deleted mail items to a PST file – prefix | 1#3

In the current article series, we review how to use the Office 365 Search Content feature, as a tool, that we can use for exporting the content of Exchange Online mailbox to a PST file. Office 365 content search | The article series The article series includes the following articles: Using Office 365 content search…

Read more

Export the content of Exchange mailbox “Recoverable items” folder to PST using the Office 365 content search | Step by step guide | 2#3

In this article, we review in detailed step by step description of the process of – exporting the content of Exchange Online mailbox to a PST file. Office 365 content search | The article series The article series includes the following articles: Using Office 365 content search for exporting deleted mail items to a PST…

Read more

Import PST file that was exported by Office 365 Content Search to Outlook | View “Recoverable items” folder | 3#3

In this article, we review the process of importing a PST file to an Outlook mail profile + how to review the information that is stored in the “Recoverable items” folder. Office 365 content search | The article series The article series includes the following articles: Using Office 365 content search for exporting deleted mail…

Read more

Restoring Exchange Online mailbox content to another mailbox using PowerShell command New-MailboxRestoreRequest | Part 22#23

The current article we review the second solution that we can use for – dealing with a common Exchange Online mailbox restore mistake that occurs in Office 365 Directory synchronization environment or Exchange Hybrid environment. In our scenario Exchange, Online mailbox deleted because of the event in which an On-Premise Active Directory user account deleted.…

Read more

Import PST files to Office 365 using Microsoft Azure Storage Explorer tool | 2#2

This current article is the second article in a series of two articles. In the former article, we review in high level the components and the concepts that involved throughout the process of importing PST files to Exchange Online mailboxes.The current article, serve as a step by step guide which includes a detailed description of…

Read more

Import PST files to Office 365 using Microsoft Azure Storage Explorer tool | 1#2

The current article is the first article in a series of two articles, which describe the process of importing PST files to Office 365 (or if we want to be more accurate Exchange Online mailboxes) by using the “Azure Storage Explorer” graphic utility. Article series The current article provides a high-level review description of the…

Read more

How to use the spam mail report PowerShell script | Part 3#3

In the current article, we review the PowerShell menu script that I created for exporting and viewing information stored in Exchange Online spam mail log file. Article series | Using Get-MailDetailSpamReport | View and export spam mail report Office 365 spam mail report using PowerShell | Introduction | 1#3 Using Get-MailDetailSpamReport PowerShell cmdlet | View…

Read more

Using Get-MailDetailSpamReport PowerShell cmdlet | View and export spam mail report | Part 2#3 

The PowerShell Get-MailDetailSpamReport cmdlet was created as a tool that simplifies the process of viewing and “dumping” information stored in Exchange Online spam log file.The Exchange Online spam log file, serve as a store that holds the documentation for each of the “spam mail events” that relates to incoming and outgoing mail flow. In the…

Read more

Office 365 spam mail report using PowerShell | Introduction | 1#3

The current article is the first article in a three-article series. The Purpose of this article series is to Show you a relatively new PowerShell cmdlet named – Get-MailDetailSpamReport, that was created for Exchange Online and Office 365 administrator that need to view and export information stored in Exchange Online spam mail log file. Article…

Read more

Managing Focused Inbox in Office 365 using PowerShell

In the current article, we review how to manage the option of – Focused Inbox in Office 365 by using PowerShell. Generally speaking, we can enable or disable the option Focused Inbox in “organization level” by using the PowerShell cmdlet – Get-OrganizationConfig or by managing single Exchange mailbox” by using the PowerShell cmdlet – Set-FocusedInbox…

Read more

Delete mail items from Single Exchange mailbox using PowerShell | Part 5#5

In this article, we review various scenarios of using the Search-Mailbox cmdlet for deleting mail items from a Single Exchange mailbox (Bulk Deletion). In the former article –  we review various scenarios of using the Search-Mailbox cmdlet for deleting mail items from multiple Exchange mailboxes (Bulk Deletion). PowerShell | Help & additional information Running PowerShell…

Read more

Delete mail items from Multiple Exchange mailboxes (Bulk) using PowerShell | Part 4#5

The current article serves as an introduction to the subject of Deleting mail items using the Search-Mailbox cmdlet. In this article, we review some various scenarios of using the Search-Mailbox cmdlet for deleting mail items from multiple Exchange mailboxes (Bulk Deletion).     PowerShell | Help & additional information Running PowerShell commands in Office 365…

Read more

Recover mail items from Recovery mail folder (the Dumpster) using PowerShell | Part 3#5

In the current article, we will review how to use the PowerShell cmdlet Search-Mailbox for -recover mail item stored in the Recovery mail folder (also named the Dumpster).The recovery mail folder considers as a “system folder” and it’s not visible to the user (mailbox owner). PowerShell | Help & additional information Running PowerShell commands in…

Read more

Search + Save a copy of mail items using PowerShell | Part 2#5

In the current article, we will review how to use the Search-Mailbox PowerShell cmdlet for performing a search on a specific Exchange mailbox + copy the search results to a “destination mailbox” (Target Mailbox). PowerShell | Help & additional information Running PowerShell commands in Office 365 based environment To be able to run the PowerShell…

Read more

Using the Search-Mailbox PowerShell command – Introduction | Part 1#5

The current article series deal with a very useful and powerful PowerShell command named – Search-Mailbox . I relate to the Search-Mailbox PowerShell command as a “Swiss Knife” because we can use the Search-Mailbox PowerShell command for many types of scenarios.   What does the Search-Mailbox PowerShell command do? The Search-Mailbox PowerShell command as the…

Read more

Using PowerShell for view and export information about mailbox migration to Office 365 | Part 2#5

In the following article and the next article, we review the various PowerShell cmdlets, that we can use for view, and export information about the process of Exchange mailbox migration process. Most of the time, the main use for viewing and export information about the mailbox migration process is, for the purpose of – troubleshooting…

Read more

Using PowerShell for view and export information about mailbox migration to Office 365 | Part 3#5

In the current article and the next article, we review the various PowerShell cmdlets that we can use for viewing and export information about the process of Exchange mailbox migration process. The “mailbox migration” PowerShell commands that we review in this article are: Get-MigrationBatch Get-MoveRequest Get-MoveRequestStatistics 1. Migration batches | Get-MigrationBatch The term – “Migration…

Read more

How to use the export mailbox migration information and troubleshooting PowerShell script | Part 5#5

In the following article, we review how to use the “Export mailbox migration information and troubleshooting” PowerShell script. The PowerShell script structure The menu PowerShell script is dived to couple of sections that we will review later in the article. The PowerShell script was designed to work in two different environments: Office 365 (Exchange Online)…

Read more

Using PowerShell for view and export information about mailbox migration to Office 365 | Part 4#5

The current article is the continuation of the former article, in which we review the various PowerShell cmdlets that we can use for viewing, and export information about the process of Exchange mailbox migration process. The “mailbox migration” PowerShell commands that we review in this article are: Get-MigrationStatistics Get-MigrationUser Get-MigrationUserStatistics In addition, we review the…

Read more

Mailbox migration to Office 365 the PowerShell migration entities | Part 1#5

The current article is the first article in a series of five articles, that deal with the subject of using PowerShell as a tool for getting information about the mailbox migration process from the On-Premise environment to Office 365 (Exchange Online).In the first article, we review the following subjects: The various entities that are involved…

Read more

Enabling Outbound DKIM signing + Verifying the process of Outbound DKIM signing in the Office 365 environment | Part 10#10

In the current article, we were complete to process of “Enabling Outbound DKIM signing” in an Office 365 based environment.In addition, we review how to verify that the process of outgoing DKIM signature is implemented properly. Activating (enabling) the Outbound DKIM signing for our domain name In this phase, we assume that the required DNS…

Read more

Verifying that the DKIM CNAME records configured properly | Office 365 | Part 9#10

In the current article, we review to process of – how to verify the DNS CNAME DKIM records, that represent a domain hosted at Office 365. The process of verifying the Office 365 DKIM CNAME records include three parts: Verify that the two CNAME records were successfully published. Verify that the CNAME “redirect” process is…

Read more

How to create the CNAME records for Outbound DKIM signing using GoDaddy DNS | Office 365 | Part 8#10

In the current article, we provide step by step guideline, for the task of – creating the required two “DKIM CNAME records,” that we needed to publish. This is a preliminary step that we must complete. Only after the required “DKIM CNAME” records were successfully created, we can continue to the last step, in which…

Read more

Get the value of the DKIM record for a Domain, using PowerShell | Office 365 | Part 7#10

The task of getting the value of the DKIM records for a specific domain name in Office 365 based environment, can be described as a “challenging task, ” because, at the current time, there is no “user-friendly” graphic interface that can provide us the information that we need. The only way for getting the required…

Read more

How to use the PowerShell script – manage Email addresses in Office 365 | Part 13#13

In the current article, I would like to provide a basic review of the PowerShell script that I created that will help you to implement various tasks that relate to E-mail address management in Office 365 and Exchange Online based environment. The structure of the – “Manage E-mail addresses menu based PowerShell script” In the…

Read more

Remove Email addresses using PowerShell | Office 365 | Part 12#13

In this article, we review the subject of removing (deleting) E-mail address by using PowerShell. The subject of – “removing existing E-mail address” using PowerShell can cause some confusion because there are two types of “deletion operations” that depend on the specific PowerShell command syntax that we use. The two methods for removing (deleting) E-mail…

Read more

Searching Email addresses with a specific domain name suffix Using PowerShell | Office 365 | Part 10#13

In the current article, we review the scenario in which we use PowerShell for searching for an E-mail address with a specific domain name suffix.       In our case, we review a scenario which I defined as “unified search” because that search will “run” on two different Office 365 infrastructures: Exchange Online infrastructure…

Read more

Searching for an Email addresses using PowerShell | Where Filter | Office 365 | Part 9#13

The current article we review the PowerShell command syntax, that we use for “constructing” a query, for searching specific E-mail address using the PowerShell where filter. The thing that we need to know before we start the search for E-mail address In this section, I would like to briefly review the main points that relate…

Read more

Introduction to the various type of Exchange Online recipients | PowerShell cmdlets | Office 365 | Part 8#13

Addressing “recipient’s objects” in Exchange Online and Azure Active Directory environment for performing tasks such as looking for information about E-mail addresses could be realized as a challenging task. In the current article, we will take a walk in the “thick forest” of Exchange Online and Azure Active Directory infrastructure, and learn about the various…

Read more

Manage Email addresses using PowerShell | Office 365 | Command reference | Part 2#13

The current article is the continuation of the former article in which we review various management tasks that relates to the subject of – Managing E-mail address using PowerShell. In this article, we review that following types of management tasks: Display information about E-mail addresses. Searching for information about E-mail addresses. Removing (deleting) E-mail address…

Read more

Adding Email addresses using PowerShell – Import from CSV file | Bulk mode | Office 365 | Part 5#13

In the current article, we review the way we use PowerShell for – adding and updating Exchange recipient’s E-mail address, by importing the information stored in a CSV file. Manage E-mail address by using CSV file | Bulk mode In the next section, we review a couple of scenarios in which we implement the task…

Read more

Export and display information about Email addresses using PowerShell | Office 365 | Part 6#13

In this article, we review that basic PowerShell command syntax that we use for display information about the E-mail addresses of Exchange Online recipients. In addition, we review the PowerShell command syntax that we use in case we need to export the PowerShell command output the various type files such as – TXT, CSV, HTML,…

Read more

Display information about E-mail Addresses using PowerShell | Customizing the output using Hash Table and Custom expressions | Office 365 | Part 7#13

In this article, we review that subject of – how to create a Hash table + Custom expressions as a “tool” that we can use for optimizing and manipulating the PowerShell output in scenarios of – Get information about recipient’s E-mail addresses. We will learn how to create a Hash table + Custom expressions that…

Read more

Using Get-MessageTrace PowerShell command for viewing and exporting information on mail sent and received | Exchange Online | Part 2#2

The current article is the second article in our two-article series. In this article, we review how to use the Get-MessageTrace PowerShell command for viewing and exporting information about incoming and outgoing mail transactions that are stored in the Exchange Online log files. In the former article, we review in details the concept of the…

Read more

Using Get-MessageTrace PowerShell command for viewing and exporting information on mail sent and received | Exchange Online | Part 1#2

In the current two-article series, we review the Exchange Online PowerShell command Get-MessageTrace, that is used to view and export information about incoming and outgoing mail transaction that are saved in the Exchange Online Logfiles. In the first article, we provide a basic introduction to the Get-MessageTrace PowerShell command, and to her “sister” the Get-HistoricalSearch…

Read more

Save a copy of sent mail items when using Send As permissions | Shared mailbox | Office 365

In the current article, we review how to change and manage the default settings of “saving mail items,” in a scenario in which recipient sends E-mail using another recipient “identity” (other recipient E-mail addresses). By default, when recipient A send E-mail on behalf of recipient B, the sent mail items will be saved in the…

Read more

Creating a Loop through an array Using the “ForEach” statement and variables | PowerShell environment| Part 2#2

The current article, is the continuation of the former article, in which we provide a basic introduction to the subject of the way that we write a PowerShell command, the loop through an array using the “ForEach” statement. The Creating a loop through an array Using the “ForEach” PowerShell article series, including the following articles:…

Read more

Creating a loop through an array Using the “ForEach” PowerShell command | Basic introduction | Part 1#2

In the current article, I would like to provide a basic introduction to the concept of “Array” and the “ForEach statement”, in PowerShell based environment (especially in Office 365 and Exchange Online based environment). The Creating a loop through an array Using the “ForEach” PowerShell article series, including the following articles: Creating a loop through…

Read more

Manage Distribution Group using PowerShell in Office 365 | Delete Distribution Group and members | Convert Distribution Group | Part 5#5

The current article is fifth and the last article in our article series, which is dedicated to the subject of managing Distribution Group in Office 365 and Exchange Online based environment using PowerShell. Manage Distribution Group using PowerShell in Office 365 | Article Series Manage Distribution Group using PowerShell in Office 365 | PowerShell command…

Read more

Manage Distribution Group using PowerShell in Office 365 | view and export information about Distribution Group | Part 4#5

The current article is that Fourth article on the five-article series, which is dedicated to the subject of managing Distribution Group in Office 365 and Exchange Online based environment using PowerShell.The article includes two main sections: Management tasks that relate to the need for viewing information about Distribution Group settings, Distribution Group members and so…

Read more

Manage Distribution Group using PowerShell in Office 365 | Adding members to existing Distribution Group | Part 3#5

The current article is that third article on the five-article series, which is dedicated to the subject of managing Distribution Group in Office 365 and Exchange Online based environment using PowerShell. The article is dedicated to the subject of adding members to existing Distribution Group by using PowerShell. Manage Distribution Group using PowerShell in Office…

Read more

Manage Distribution Group using PowerShell in Office 365 | Creating and managing Distribution Groups | Part 2#5

The current article is that second article on the five-article series, which is dedicated to the subject of managing Distribution Group in Office 365 and Exchange Online based environment using PowerShell.The article includes two main sections: Creating New Distribution Group. Configure the setting of existing Distribution Group. Manage Distribution Group using PowerShell in Office 365…

Read more

Using the PowerShell “Where statement” for creating filtered search | Office 365 and Exchange Online objects | Part 1#3

The current article series, include three articles that are dedicated to the subject of – using PowerShell for “view” information about Office 365 (Azure Active Directory), and Exchange Online objects. The first article includes a basic introduction to the PowerShell “Where statement,” that we use as a “filter” for getting information about objects with specific…

Read more

How to run and use o365info PowerShell menu script

The purpose if the following article is to enable you to use effectively the “Office 365 PowerShell scripts” that I add to my PowerShell articles. The PowerShell script that provides can be described as “Menu based” PowerShell scripts. Each menu performs a particular “task.” To execute a specific “task” all you need to do is…

Read more

Solving an Exchange Online mailbox restore mistake Office 365 user was restored – removing the ImmutableID value | Part 23#23

In the current article, we provide the step by step instructions, for resolving a typical Exchange Online mailbox restore mistake, in Office 365 Directory synchronization environment. The Mailbox restore mistake is realized by – restoring Soft Deleted Office 365 user account, instead of restoring the original Soft Deleted On-Premise Active Directory user account. The proposed…

Read more

Solving an Exchange Online mailbox restore mistake by Restoring the original Soft Deleted Active Directory user | Part 21#23

In the current article, we provide the step by step instructions, for resolving a typical Exchange Online mailbox restore mistake in Office 365 Directory synchronization environment. The Mailbox restore mistake is realized by – creating a NEW Active Directory user created, instead of restoring the original Soft Deleted On-Premise Active Directory user account. The proposed…

Read more

Reviewing the characters of Exchange Online mailbox recovery mistake – Soft Deleted Office 365 was restored | Part 20#23

In the current article, we describe characters of a typical Exchange Online mailbox restore mistake in Office 365 Directory synchronization environment and describe the characteristics of an optional solution. The mailbox restore mistake is: Office 365 User account was restored (and his Exchange Online mailbox was restored). New Active Directory user with seemingly identical details…

Read more

Reviewing the characters of Exchange Online mailbox recovery mistake – New On-Premise Active Directory User Account was created | Part 19#23

In the current article, we describe characters of a typical Exchange Online mailbox restore mistake in Office 365 Directory synchronization environment and describe the characteristics of an optional solution. The restore mistake is – that a NEW Active Directory user created, instead of restoring the original Soft Deleted On-Premise Active Directory user account. The provided…

Read more

Prefix – the “Problematic” Exchange Online mailbox restores scenarios in Directory synchronization environment | Part 18#23

In the current article, can be considered as a “prefix” to the subject which I describe as “the “Problematic Exchange Online mailbox restore scenarios in Directory synchronization environment.” Office 365 and Directory synchronization can consider as a complex environment, that “bind together” two different environments – the On-Premise environment and the “cloud” environment. This character…

Read more

Restore Exchange Online USER mailbox | Directory synchronization environment | The “right way” | Part 17#23

In the current article, we review how to successfully restore an Exchange Online mailbox, in Directory synchronization based environment, by implementing the best-practice procedure. In Office 365 environment that uses Directory synchronization (when the user account synchronized from the On-Premise Active Directory to the Office 365 Directory), the restore process of an Exchange Online mailbox…

Read more

How to restore Active Directory deleted user account by using Active Directory recycle bin | Article 4#4 | Part 16#23

In the current article, we review the process of restoring a deleted user account by using the Active Directory recycle bin. Technically speaking, the Active Directory recycle bin, can be used for restoring any type of “Active Directory object” such as – user account, computer account, group account and so on. The purpose of this…

Read more

How to restore Active Directory deleted user account (Active Directory recycle bin is not enabled) using AdRestore, AdRestore.net and LEX – the LDAP explorer | Article 3#4 | Part 15#23

In the current article, we will review the process of restoring Active Directory deleted a user, in a scenario in which the Active Directory recycle bin was not enabled (activated). In the former article, we review the restore process by using a built-in windows server tool named – LDP.EXE. In the current article, we review…

Read more

How to restore Active Directory deleted user account (Active Directory recycle bin is not enabled) using LDP.EXE | Article 2#4 | Part 14#23

In the current article, we will review the process of restoring Active Directory deleted the user, in a scenario in which the Active Directory recycle bin was not enabled (activated).We will review how to restore deleted Active Directory object by using a built-in Windows server tool named – LDP.EXE. The LDP.EXE was not created as…

Read more

Deleted Active Directory User account and the Deleted object store | Basic introduction | Article 1#4 | Part 13#23

In the following article, I would like to provide a high-level review on the subject of – “Restoring Soft Deleted Active Directory User account.” We will review the following subjects: The method that the Active Directory uses for storing deleted objects such as User account. The two main Active Directory methods, that we can use…

Read more

The special characters of Directory synchronization in an Office 365 environment | Article 2#2 | Part 12#23

In this article, we continue to review the special characters of Office 365 Directory synchronization environment, so we will be able to understand better the “flow of events” in Office 365 Directory synchronization environment. We will review the events flow of three major scenarios: The event of – Creating a NEW Active Directory user account…

Read more

The special characters of Directory synchronization in an Office 365 environment | Article 1#2 | Part 11#23

In the current article and the next article, we review the main characters of the Directory synchronization process in an Office 365 based environment.The reason that I add two dedicates articles, or this subject is, because of the knowledge about “what happens behind the scenes” of the Directory synchronization, is very crucial to: Our understanding…

Read more

Restore Exchange Online user mailbox | Cloud only (Fully Hosted) environment | Article 3#3 | Part 10#23

In the current article, we review the second option for restoring Soft Deleted Exchange Online mailbox. In this scenario, we “Instantiate” the restore process by using a PowerShell command (Undo-SoftDeletedMailbox), that will restore the Soft Deleted Exchange Online mailbox, and also, create a NEW Office 365 user account that will associated with the recovered Exchange…

Read more

Restore Exchange Online user mailbox | Cloud only (Fully Hosted) environment | Article 2#3 | Part 9#23

In the current article, we review the required steps for recovering Soft Deleted Exchange Online mailbox by restoring the Office 365 user account that considered as the Exchange Online mailbox owner. In the former article, we prepare all the required setting for simulating the “deletion event.” In this article, we will continue to process of…

Read more

Restore Exchange Online user mailbox | Cloud only (Fully Hosted) environment | Article 1#3 | Part 8#23

In the following article, we will review the restore process of the Exchange Online user mailbox. We will demonstrate two options for restoring a deleted Exchange Online User mailbox. Option 1#2 – Restore the Office 365 user account. In the current article and the next article, we demonstrate the method of – restoring the Office…

Read more

Restore Exchange Online Shared mailbox | Cloud only (Fully Hosted) environment | Part 7#23

In the following article, we will review the restore process of Exchange Online Shared mailbox. We will demonstrate two options for restoring a deleted Exchange Online Shared mailbox: Restore the Office 365 user account, that was the owner of the deleted Shared mailbox. The restore process will be implemented by using the Active Directory admin…

Read more

Restore Exchange Online Room mailbox | Cloud only (Fully Hosted) environment | Part 6#23

In the following article, we will review the restore process of the Exchange Online Room mailbox. We will demonstrate two options for restoring a deleted Exchange Online Room mailbox: Restore the Office 365 user account, that was the owner of the deleted Room mailbox. The restore process will be implemented by using the Active Directory…

Read more

The Index of the different Exchange Online mailbox restores methods| Part 5#23

The current article serves as an index, for the different Exchange Online mailbox restore scenarios, which appear along the current article series that include 23 articles. The purpose of this “index” is, to help you to quickly and efficiently locate the specific Exchange Online mailbox restore scenario that you need to deal with, and to…

Read more

What are the possible options for recovering Exchange Online mailbox? | Part 4#23

In the current article, we will review in high level the different options, for recovering Exchange Online mailbox.Before we dive into the deep water off – “Exchange Online restores mailbox scenario” and specific details of the restore process that will be reviewed in the next articles in the current article series. It’s important that we…

Read more

What are the possible causes for an Exchange Online mailbox deletion? | Part 3#23

In the current article, we review the possible causes that lead to a scenario, in which Exchange Online mailbox is deleted.The logical assumption is that “mailbox deletion event” not just happens, but instead, the person that acts as the Exchange Online administrator, performs the mailbox deletion consciously. In reality, there are many scenarios, in which…

Read more

Directory Object Deletion and the restore “domino effect + little bit about the concept of the Active Directory Recycle bin | Part 2#23

In the current article, we continue to review different concepts and components that relate and involved throughout the process of restoring Exchange Online mailbox. We will start by describing a concept which I define as “Falling domino effect,” that relates to the chain of an event in an Office 365 based environment when a “deletion…

Read more

Restore deleted Exchange Online mailbox in Office 365 environment | Prefix | Part 01#23

The current article series deal with the subject of – restoring or recovering a deleted mailbox in Office 365 (Exchange Online) environment. The interesting thing about “Restore deleted mailbox” in an Office 365 based environment is, that most of the time, most of us (including me), not fully understand what is happening behind the scenes…

Read more

Configure Exchange Online inbound mail flow to accept SMTP connection only from a specific mail security gateway IP address

In the current article, we will review how to change the default Exchange Online incoming mail policy, which enables any host, to address Exchange Online using SMTP. A different way of describing such a scenario is – Block SMTP access of external mail servers to Exchange Online. In our scenario, we want to implement an…

Read more

Configure your WordPress site to send E-mail via GoDaddy mail server – Shared Hosting plan | Part 6#6

In the current article, we review how to configure a WordPress site that is hosted at GoDaddy, and use a Shared Hosting plan, use the GoDaddy SMTP mail server. In our scenario, we use the help of Postman SMTP Mailer/Email Log mail plugin. Before we start, it’s important to me to emphasize that the information…

Read more

Configure WordPress site send E-mail via Exchange Online (Office 365) | Provide user credentials without purchase Office 365 license | Part 5#6

In the current article, we continue to review the scenario in which we want to configure our WordPress site to address Exchange Online server, and implement the best-practice scenario, in which we implement an authenticated mail session (providing Office 365 user credentials). The main reason in which users often avoid the best practice of providing…

Read more

Configure your WordPress site to send E-mail via Exchange Online (Office 365) provide user credentials | Part 4#6

In the current article, we review how to configure a WordPress site, to address Office 365 mail by using the recommended configuration. In a scenario in which our WordPress website serves as a “mail client” that addresses mail server and asks him to be “his mail server,” the best practice is to configure the mail…

Read more

Creating Exchange Online bypass spam rule – whitelist specific sender E-mail address | Part 3#6

In the following article, we will provide “step by step” instructions for creating Exchange Online bypass spam rule, that will prevent the “spam check” that the Exchange Online mail server performs for a specific E-mail address. The current article is the continuation of the former article. A quick reminder, in the previous article, we learn…

Read more

Configure your WordPress site to send E-mail via Exchange Online (Office 365) anonymous session | Part 2#6

In the current article, we review a scenario in which we need to configure our WordPress site to use Exchange Online as “mail server”.The main character of this scenario is – that we want to configure our WordPress site to address Office 365 mail services without providing any user credentials (anonymously). The reason for this…

Read more

Configure your WordPress site to send E-mail via SMTP mail server | GoDaddy and Office 365 based environment | Part 1#6

In the current article series, we review the steps by step instructions, that are needed for configuring WordPress site to send E-mail by using an SMTP mail server. Generally speaking, the required configuration that is needed depends on three variables: The network infrastructure which hosts the WordPress site The specific characters of the mail server…

Read more

Automatic Reply in Office 365 -Dealing with mail loop (mail storm) scenarios |Part 7#7   

In the current article, I would like to review the possibility of a scenario which can be described as Mail loop (other common terms are – Mail storm or “reply back loop”) when using the option of Automatic Reply. The term “Mail loop” and Automatic Reply scenario The term “Mail loop” describes an unwanted scenario,…

Read more

Setting up an Automatic Reply in Office 365 using mailbox rule and Shared mailbox | Part 6#7

In the current article, we continue to review the steps that are needed for completing the tasks of – creating an Exchange Online shared mailbox that will serve as a “service mailbox” for the service request tickets that will be opened by our organization users. In the former article , we have reviewed the process of…

Read more

Setting up an Automatic Reply in Office 365 using Public Folder | Part 4#7

The current article is the sequel to the former article, in which we review the process of configuring Public Folder in Office 365 based environment to use the option of an automatic reply. Our specific scenario is quite complicated and include many “parts” (business requirements). In the former article, we have already reviewed all the…

Read more

Configuring Automatic Replies (Out of office) using Outlook, OWA, and PowerShell |Part 2#7

In the current article, we will review how to configure the option of Automatic replies (Out of office assistant) in Exchange based environment. Most of the time, the activation of the Automatic replies (Out of office assistant) will be implemented by the user himself via the Outlook or the OWA graphic interface. In addition, Exchange…

Read more

Automatic replies (Out of office assistant) versus Automatic reply using mailbox rule – Exchange Online |Part 1#7

In the current article series, we will review the different options for implementing Automatic Reply in Office 365 (Exchange Online) based environment. Corresponding terms are Automatic respond, Autoresponder, Automatic replies or, Out of office. The term “Automatic reply” (and of the equivalent terms) defines a configuration in which we configure a specific mail user (mailbox)…

Read more

How to recognize an event in which Office 365 recipient send spam mail?

One of our Office 365 recipients complains that the E-mail that he sent to an external recipient is blocked or classified as a “spam mail.” Our underlying assumption is that the problem is related to “Office 365 infrastructure” and they should immediately fix the problem! In the following article, we will learn how to recognize…

Read more

Prevent the option of Reply All by using NoReplyAll Outlook Add-In – Part 4#5

In the following article, we review additional method for preventing to option to reply to All by using a very nice utility named – NoReplyAll Outlook Add-In Prevent to option of Reply All | Article Series The Prevent to option of Reply All article series, including the following three articles: Prevent the option of Reply…

Read more

Import Google’s contacts with non-English characters to Office 365 mailboxes |Part 2#2

In the current article, we review the process of Export information from our Google mail account to a CSV file. The difference from the previous article is that in this scenario, we have Google’s contacts whom their name and their information include non-English characters. Import Google’s contacts| Article Series The Import Google’s contacts article series,…

Read more

Import Google’s contacts from a CSV file using Outlook or OWA | Part 1#2

In the current article, we review the process of Export information from our Google mail account to a CSV file. Import the contents’ information stored in the CSV file using Outlook and OWA mail client. Import Google’s contacts| Article Series The Import Google’s contacts article series, including the following articles: Import Google’s contacts from a…

Read more

How to efficiency and easily read the information in the Exchange Online message trace historical search CSV file

Exchange Online, offer us a very in-depth and comprehensive information about each mail flow transaction, which occurs in our mail infrastructure. The information about each incoming and outgoing mail transaction which passes via the Exchange Online server is kept for 90 days.The Exchange Online web based management interface enables us to look at this “Log…

Read more

Bulk Import Contacts to Exchange Online (Office 365) Using PowerShell script | Part 2#2

The current article is the second article in our two article series, in which we review the process of Bulk Import contacts to Exchange Online (Office 365) using PowerShell. The two topics that we will review in this article are: Using a “Bulk Import contacts” PowerShell script. Using the PowerShell script will simplify and streamline…

Read more

Bulk Import Contacts to Exchange Online (Office 365) Using PowerShell | Part 1#2

In Exchange based environment, the term “external contacts” or just “contacts,” describe an Exchange recipient object, which their E-mail address is an external E-mail address (non-organization E-mail address). For example – suppliers, business partners, customers and so on. By default, “external contacts” appear as part of the GAL (global address list) alongside with the “standard”…

Read more

How to Connect to Office 365 using PowerShell script + using saved encrypted user credentials

In the current article, we will learn how to create a PowerShell script, which will help us to connect automatically to Office 365 (Windows Azure Active Directory) and Exchange Online, without the need of typing complicated PowerShell commands! The added bonus that I would like to add to this “automation” is – a method that…

Read more

Send E-mail to office 365 using PowerShell script and saved encrypted password |Part 2#2

In the following article, we will review how to write and run PowerShell script; that will address the Office 365 mail servers (Exchange Online). Versus the scenario that we have examined in the previous article, we review a situation, in which we address the Office 365 mail server anonymously (without providing user credentials). In the…

Read more

Migrating Exchange on-Premises Mailboxes Separately | Exchange Hybrid based environment | What are the migrated permissions? | Part 5#5 

In the current article, we will review the mail migration scenario in which we “break” existing Exchange permission’s relationship. I use the term “break” because, in this scenario, we are migrating only one partner from the existing “couple” to the cloud. When we migrate Exchange on-Premises mailboxes in the cloud not as a “group” we…

Read more

Migrating Exchange on-Premises mailboxes as a group | Exchange Hybrid based environment | What are the migrated permissions? | Part 4#5

In the current article, we will review the scenario in which we migrate Exchange on-Premises mailboxes that have an “existing permission’s relationship” to the cloud as a group. Our purpose is to check what are the Exchange permissions, which will migrate to the cloud, along with the mailbox data. In the next article, we will…

Read more

Migrated permissions of migrated mailboxes in Exchange Hybrid based environment – Introduction | Part 3#5

The subject of the Exchange permission’s relationship between migrated mailboxes in the Exchange Hybrid environment could be quite confusing. The term “Exchange permission’s relationship,” try to describe two (or more) mailboxes that have existing permission’s structure between them. When we migrate these mailboxes from their “native environment” to the “other environment” the central question that…

Read more

Testing cross site permissions in Exchange Hybrid based environment| Part 2#5

As mentioned in the previous article, the subject of Exchange permissions relationship in Exchange Hybrid environment can be realized in two major scenarios: Scenario 1 – Cross site permission Scenario 1 – Cross site permission The Exchange permissions that Exchange on-Premises mailbox can have on cloud mailbox and vice versa. Scenario 2 – Mailbox migration…

Read more

Cross site permission and migrated permissions in Exchange Hybrid based environment | Part 1#5

The current article series dedicated to the subject of – the available Exchange permissions in Exchange Hybrid environment. The term “Exchange permissions” is realized in two major scenarios: Scenario 1 – Cross site permissions The term “cross site permissions”, define the available Exchange permissions, that we can assign to Exchange on-Premises mailbox on a cloud…

Read more

Manage Safe Senders and Block Sender Lists using PowerShell – Office 365

The term “Junk Email Filter” defines an Exchange mail security mechanism, that implemented on the “mailbox level.” In Exchange based environment, most of the times, the mail security infrastructure is implemented most of the time in the “server level” (Exchange server). The interesting thing is that also, Exchange enables his recipients, to use an additional…

Read more

Implementing SPF Fail policy using Exchange Online rule (dealing with Spoof E-mail attack) | Phase 2 production | part 3#3

The current article is the last article in the article series, in which we review how to implement SPF Fail policy using Exchange Online rule. In the present article, we will discuss how to apply the second phase of our project, in which, when the Exchange rule identifies an event of “SPF = Fail,” the…

Read more

Implementing SPF Fail policy using Exchange Online rule (dealing with Spoof E-mail attack) | Phase 1 – learning mode | Part 2#3

In the current article, we will review how to implement an SPF Policy for incoming mail by using an Exchange rule. In our scenario, we want to identify an event, in which hostile element tries to execute a Spoof mail attack by presenting himself, as a legitimate recipient who uses an E-mail address that includes…

Read more

Implementing SPF Fail policy using Exchange Online rule (dealing with Spoof E-mail attack) | Introduction | Part 1#3

In the current article, I would have to provide you a useful way, for implementing a mail security policy that relates to an event in which the result of the SPF sender verification check is “Fail.” If we want to be more precise, an event in which the SPF sender verification test result is “Fail”,…

Read more

Configure Outlook connect your Gmail mailbox automatically (look mama no hands!) | Part 2#3

In the current article, I’m going to reveal a secret that is going to affect humankind permanently – How to configure Outlook to connect Gmail mailbox automatically, without the need for manual settings. If we want to use the most scientific definition – look, mama, no hands! Maybe I’m exaggerating a bit, but the interesting…

Read more

Manage Send As Permissions using PowerShell – Office 365

The current article dedicated to the subject of performing a management task that relates to the Send As permission using PowerShell. The Send As permission enables recipient X to send an E-mail message using the identity of a recipient Y. Technically speaking, this method can describe as “impersonation.” In Office 365 based environment, we can…

Read more

Office 365 Cutover mail migration – Exchange on-Premises pre requirements

The most common cause for a scenario, in which we fail to start the process of Office 365 cutover mail migration is – the lack of the Exchange on-Premises pre requirements. The primary goals of the current article are: Provide the checklist of Exchange on-Premises pre-requirements Explain in details the reasons for each Exchange on-Premises…

Read more

Dealing with a Spoof mail attacks and Phishing mail attacks | A little story with a sad end | Part 1#9

In the current article, I would like to review the chain of events that occurs every time, again and again, in a scenario in which an attacker manages to execute a Phishing mail attack successfully. The reaction of the involved persons is known in advance, and the sad end of the story is also known…

Read more

What are the possible damages of Phishing and spoofing mail attacks? | Part 2#9

We are living in a dangerous world that produces many types of threats and risks to our organizational mail infrastructure, to our users and us. In the current article, I would like to review some of the possible damages that we can experience in a scenario, in which Spoof or Phishing mail attacks realized. The…

Read more

Why our mail system is exposed to Spoof and Phishing mail attacks |Part 5#9

Let’s start with a declaration about a strange phenomenon: Spoof mail attacks and Phishing mail attacks, are well-known attacks, and consider as a popular attack among the “hostile elements.” Most of the existing organizations, do not have effective defense mechanisms against the above attacks, and there is a high chance, at some point, that your…

Read more

Dealing with the threat of Spoof and Phishing mail attacks |Part 6#9

In the following article, we will review the solution and the methods that we can use for dealing with the threat of – Phishing mail attacks and his derivative Spoof mail attack. What are the Ingredients that needed for successfully dealing with the threat of attacks and Phishing and spoofing mail attacks? To be able…

Read more

The questions that we will need to answer before we start the project of – building a defense system that will protect us from Spoof mail attacks | Part 7#9

The planning stage of the “defense system” that protects our mail infrastructure, and our users from Spoof mail attack, need to begin with a definition of some framework. This framework will serve as a “logical container,” that defines the particular structure and the characters of our defense system, that will need to deal with the…

Read more

Using sender verification for identifying Spoof mail | SPF, DKIM, DMARC, Exchange and Exchange Online |Part 8#9

Spoof mail attack is implemented by a hostile element the try to spoof sender identity. The way for dealing with a Spoof mail attack is, by applying a procedure, which check and verify the sender identity (check if the sender considers as a legitimate sender of a spoofed sender). Using SPF, DKIM and DMARC, Exchange…

Read more

How does sender verification work? (How we identify Spoof mail) | The five hero’s SPF, DKIM DMARC, Exchange and Exchange Online protection | Part 9#9

The process of “sender verification”, enables us to distinguish between a legitimate sender versus an attacker who spoofs his identity and prevent a possible Spoof mail attack. In the current article, we will review in details three sender verification standard – SPF, DKIM, DMARC and also two sender verification methods that can implement in Exchange…

Read more

How to simulate Spoof E-mail attack and bypass SPF sender verification? | 2#2

In the current article, we will demonstrate how to simulate Spoof E-mail attack, that will bypass existing SPF sender verification implementation. The current article series include two articles. The former article is – How can hostile element execute Spoof E-mail attack and bypass existing SPF implementation? | introduction | 1#2 Disclaimer For the avoidance of…

Read more

How can hostile element execute Spoof E-mail attack and bypass existing SPF implementation? | introduction | 1#2

In the current article series, we will learn about a structured vulnerability of the SPF mail standard, which can be easily exploited by a hostile element. The hostile element that is aware of this SPF vulnerability, can bypass the existing “SPF wall” that was built for protecting our organization recipients from Spoofing or Phishing attacks.…

Read more

How to enable outbound DKIM signing for your domain in Office 365 | Part 5#10

In the current article, we will review the process of – How to enable outbound DKIM signing in Office 365 for our public domain name. In Office 365 based environment, the process of signing outgoing E-mail using DKIM signature happens automatically for each of the Office 365 tenant domain names. I emphasize the term “our…

Read more

Outbound DKIM signing and DNS infrastructure | Building the required DNS records for Office 365 | Part 4#10

In a scenario in which we want to use outbound DKIM signing for our public domain name in Office 365 based environment, we will need to generate 4 DNS records that will be used for the required two CNAME records. Regarding the task of the required DKIM DNS records, the primary challenge that we are…

Read more

DKIM as standard that based upon the Public key infrastructure | Part 2#10

DKIM is implemented by using Digital signature. The “Digital signature” method is one of the main building blocks of the Public key infrastructure. In the current article, I want to show you a fraction of an Interesting and wonderful world of Public key infrastructure and, the way that the DKIM uses this infrastructure for implementing…

Read more

DKIM – Domain Keys Identified Mail | Basic introduction | Part 1#10

DKIM (Domain Keys Identified Mail) is a mail security standard that enables the sender to declare about his “identity” and allows the mail destination infrastructure, meaning the receiving mail server, to verify the identity of the originator. The central paradox regarding a security standard is that most of the time, we don’t really understand what…

Read more

Report spoof E-mail and send E-mail for Inspection In Office 365|Part 12#12

In the current article, we will review two subjects that relate to a scenario in which organization experiences a Spoof E-mail attack: Report the Spoof E-mail as “Phishing mail”. Sent the Spoof E-mail for further analysis. Report Spoof E-mail as “Phishing mail” I try to get additional information regarding the subject of “what happens behind…

Read more

How to Simulate E-mail Spoof Attack |Part 11#12

In the current article, we will demonstrate three options for accomplishing the task of simulating E-mail spoof attack. Our primary goal is performing a test, in which verify if the Exchange Online Spoof E-mail rule that we have created is manage to identify an event of Spoof E-mail and respond accordingly. Disclaimer It is important…

Read more

How to simulate E-mail Spoof Attack |Part 10#12

When we hear the term “spoof E-mail attack,” the initial association that appears to our mind is – a hacker sitting in a dark room, filled with flashing lights, which quickly tap the keyboard commands and strange markings! Sound romantic? Well, in reality, the ability to perform or simulate E-mail spoof attack is very simple…

Read more

Analyzing the results of the Exchange spoof E-mail rule |Part 9#12

In the current article, we will review the options that are available for analyzing the result of the Exchange Online Spoof E-mail rule that we have created. The term “analyze” relate to our ability to answer fundamental questions such as: How many times the Exchange Online rule that we have created was “triggered”? What is…

Read more

Detect spoof E-mail and send the spoof E-mail to — USER quarantine using Exchange Online rule |Part 8#12

In the current article, we will review how to deal with Spoof E-mail scenario in an Office 365 environment, by creating an Exchange Online rule that will identify Spoofed E-mail (spoof sender) and as a response – “route” this E-mail to the Exchange Online user quarantine. In our scenario, we don’t want to enable the…

Read more

Detect spoof E-mail and send the spoof E-mail to Administrative Quarantine using Exchange Online rule |Part 7#12

In the current article, we will review how to deal with Spoof E-mail scenario in an Office 365 environment, by creating an Exchange Online rule that will identify Spoofed E-mail (spoof sender) and as a response – “route” this E-mail to the Exchange Online administrative quarantine. In our particular scenario, we don’t want to enable…

Read more

Detect spoof E-mail and add disclaimer using Exchange Online rule |Part 6#12

In the current article, we will review how to deal with Spoof mail by creating an Exchange rule that will identify incoming Spoof E-mail (spoofed sender). In such scenario, we would like to implement the following sequence of actions: Add a disclaimer to the E-mail message. Prepend the E-mail subject. Generate + send an incident…

Read more

Detect spoof E-mail and delete the spoof E-mail using Exchange Online rule | Part 5#12

In the current article, we will review how to deal with Spoof mail by creating an Exchange rule that will identify incoming Spoof E-mail (spoofed sender). In such scenario, we would like to implement the following sequence of actions: Delete (reject) the E-mail . Generate + send an incident report to a designated recipient. In…

Read more

Detect spoof E-mail and mark the E-mail as spam using Exchange Online rule | Part 4#12

In the current article, we will review how to deal with Spoof mail by creating an Exchange rule that will identify incoming Spoof E-mail (spoofed sender). In such scenario, we would like to implement the following sequence of actions: Mark the E-mail as spam by setting the SCL (spam confidence level) value to 5. Generate…

Read more

Configuring exceptions for the Exchange Online Spoof E-mail rule | Part 3#12

In this article, we will review the subject of – “how to create an Exchange Online rule exception. As the name implies, the “exceptions” part of the Exchange rule was created to prevent the execution of the Exchange Online rule in a specific scenario. In the current article, we will continue to use the scenario…

Read more

Detect spoof E-mail and send an incident report using Exchange Online rule (Learning mode) |Part 2#12

In the current article, we will review how to deal with Spoof E-mail scenario in an Office 365 environment, by creating an Exchange Online rule that will identify Spoofed E-mail (spoof sender) and as a response, will generate and send an incident report to a designated recipient. In our scenario, we want to use the…

Read more

Dealing with an E-mail Spoof Attack in Office 365 based environment | Introduction | Part 1#12

An organization IT manager call to Office 365 supports, worried and upset, declaring that he is very disappointed about the fact that “Office 365” allow the occurrence of a spoofed E-mail attack! Besides of the urgent need for understanding, how could this happened; the additional urgent need is – to implement some security mechanism, that…

Read more

Configure Exchange Online to forward E-mail to a FAX service |Part 2#2

The current article is the continuation of the former article in which we review that subject of the required settings that need to be configured for implementing a scenario in which Exchange Online to forward E-mail to on-Premises FAX. The demonstration will include two phases. Creating the required Exchange Online send (outbound) connector that will…

Read more

Configure Exchange Online to forward E-mail to a FAX service |Part 1#2

In the current article and the next article, we will review a scenario in which we need to use the Exchange Online infrastructure for – “forward” E-mail messages that need to be sent as an FAX message, to an FAX service that is hosted on an external network, such as our On-Premises organization’s network. Theoretically,…

Read more

Manage E-mail attachment policy in Office 365 – part 4#4

In the current article, we will review how to enforce an E-mail attachment policy by using Exchange Online transport rule.The examples that we will review in the current article are as follows: E-mail attachment policy that stops E-mail messages, that include a password-protected attachment. Each E-mail message that has this type of attachment will be…

Read more

Manage E-mail attachment policy in Office 365 – part 1#4

The subject of E-mail Message attachment manifests itself in two main scenarios: Malware scenario – a scenario that relates to an event, in which hostile element attached some malware to an E-mail message, send the E-mail message to one of our organization recipients, the recipient opens the E-mail message and “excite” the malware file. Company…

Read more

Configuring Catch all Mailbox in Office 365 | Part 1#2

The request for “catch all mailbox” feature is very popular among Office 365 customer’s.The term “catch all mailbox“, define a concept of mail services, in which a dedicated mailbox is designated as a special mailbox that will “accept” all the E-mail messages that was sent to “non-existing organization recipients”. The “business need” is the avoid…

Read more

Implementing Force TLS by using Transport rule & Conditional Mail Routing | Exchange online | Part 11#12

In the current article, we will review the option implementing the option of Force TLS using Exchange Transport rule & Conditional Mail Routing. The option of Conditional Mail Routing implemented by combining two different Exchange Online components: Exchange Online transport Exchange Online mail connector Versus the former implementation of Force TLS by using “simple Exchange…

Read more

Configure Force TLS on Exchange on-Premises environment | Settings of Receive connector | Part 9#12

In the current article, we will review the required configuration settings for implementing Force TLS in Exchange on-Premises based environment. In our specific scenario, we need to configure the Force TLS option for the “incoming mail flow”. The meaning is – mail that sent from external mail server to the Exchange on-Premises server that represents…

Read more

Configure Force TLS on Exchange on-Premises environment |Settings of Send connector | Part 8#12

In the current article, we will review the required configuration settings for implementing Force TLS in Exchange on-Premises based environment. In our specific scenario, we need to configure the Force TLS option for the “outgoing mail flow“. The meaning is – mail that is sent by the Exchange on-Premises server to a specific external domain…

Read more

Configure Force TLS in Exchange Online environment | Settings of inbound connector | Part 7#12

In the current article, we will review the required configuration settings for implementing Force TLS in Exchange Online based environment. In our specific scenario, we need to configure the Force TLS option for the “incoming mail flow”. The meaning is – mail that sent from external mail server to the Exchange Online server that represent…

Read more

Configure Force TLS in Exchange Online environment | Settings of outbound connector | Part 6#12

In the current article, we will review the required configuration settings for implementing Force TLS in Exchange Online based environment. In our specific scenario, we need to configure the Force TLS option for the “outgoing mail flow”. The meaning is – mail that is sent by the Exchange Online server to a specific external domain…

Read more

Force TLS | Exchange Online environment versus Exchange on-Premises environment | Part 5#12

In the current article, is consists of two parts: The part in which we provide a high-level review of the differences that exists between the Exchange on-Premises based environment versus the Exchange Online based environment regarding mail connectors and TLS settings. The reason for examining these differences is, that there are much essential deferences’s begging…

Read more

Configuring the option of Force TLS in Exchange on-Premises environment |Part 4#12

In the current article, we will review the subject of Force TLS in Exchange on-Premises based environment. In Exchange on-Premises based environment, we can choose to implement the option of Force TLS using two options. 1. Domain Security This option defines a set of mail connectors and configuration settings that serve for creating a secure…

Read more

Exchange architecture and default opportunistic TLS settings |Part 3#12

In the following article, we will review in more details that implementation of opportunistic TLS on Exchange on-Premises based environment and also in the Exchange Online-based environment. As mentioned, in the Exchange-based environment, the Exchange mail connectors are automatically configured to use the option of opportunistic TLS. The configuration of opportunistic TLS is automatically configured…

Read more

Opportunistic TLS versus Force TLS in Exchange based environment |Part 2#12

In the current article, we will review the two “flavor” of TLS in the Exchange-based environment.The two options for implementing TLS are opportunistic TLS and Force TLS. Exchange-based server (Exchange on-Premises and Exchange Online) are configured by default to use the option of opportunistic TLS. The meaning is that given that the “other side” also…

Read more

Using TLS in Exchange based environment |Introduction |Part 1#12

The purpose of the current article series is, to review the implementation and the use of the TLS protocol in an Exchange-based environment.We will examine the utilization of the TLS protocol in two Exchange environments: Exchange Online Exchange on-Premises The article series The article series that is dedicated to the subject of implementing TLS in…

Read more

Disable clutter for all users using PowerShell

The Clutter option is a new Exchange Online feature, which was created for helping Office 365 customers (Exchange Online recipient) to effectively manage their mailbox content by “relocate” non-important or non-Crucial E-mail message to a specific folder named Clutter. The Exchange Online Clutter feature is automatically activated for all Exchange Online recipients and the issue…

Read more

Connect to Exchange Online using PowerShell

To be able to create a remote PowerShell session to Exchange Online, we can use the “Windows built PowerShell console”. We will need to use some “first-time” configurations, and then, the rest of the process includes running the required PowerShell command for connecting to Exchange Online. PowerShell console – First-time configuration To be able to…

Read more

Manage Clutter by using PowerShell | Office 365

Clutter is a new Exchange server feature that created for facilitating better and more efficient mailbox management by Exchange users. The Clutter feature is implemented by analyzing the Exchange mailbox data and based on a “learning process” and other algorithmic decide which of the mail items is “less important.” The Clutter mechanism will relocate this…

Read more

Office 365 Import Service – Import PST into Office 365 user mailbox | Part 1#2

This current article is the first article in a series of two articles, which describe the process of importing PST files to Office 365 (or if we want to be more accurate Exchange Online mailboxes) by using the AzCopy command line utility. Article series The current article provides a high-level review description of the components…

Read more

Office 365 Import Service – Import PST into Office 365 user mailbox | Part 2#2

This current article is the second article in a series of two articles. In the former article, we review in high level the components and the concepts that involved throughout the process of importing PST files to Exchange Online mailboxes. The current article, serve as a step by step guide which includes a detailed description…

Read more

Stage migration, Exchange and Autodiscover infrastructure | Part 1#2 | Part 35#36

In the current article, we will review the subject of Exchange stage migration and the issue of configuring new Outlook mail profile for users whom their mailbox migrated to the cloud. The current article deals with the “theoretical part”, in which we will review the special characters of Exchange stage migration and, the “problem” that…

Read more

Connecting users to their Exchange Online mailbox – Stage migration – solving the mystery | Part 2#2 | Part 36#36

The current article is the second article in which we review the subject of the challenges and optional solution for the task of creating a new Outlook mail profile for the users whom their mailbox was migrated to Exchange Online using an Exchange stage migration. Exchange Stage migration and Autodiscover infrastructure | The article series…

Read more

Autodiscover flow in an Exchange Hybrid environment | Part 3#3 | Part 34#36

The current article, is the continuation of the previous article , in which we will continue to review in details the Autodiscover journey in Exchange Hybrid based environment Autodiscover flow in an Exchange Hybrid environment | The article series The current article is the last article in a series of three articles. The additional articles…

Read more

Autodiscover flow in an Exchange Hybrid environment | Part 2#3 | Part 33#36

The current article and the next article, will be dedicated for detailed review of the Autodiscover flow, that is implemented in Exchange Hybrid environment, by using the Microsoft web-based tool, the Microsoft Remote Connectivity Analyzer (ExRCA). Autodiscover flow in an Exchange Hybrid environment | The article series The current article is the second article in…

Read more

Autodiscover flow in an Exchange Hybrid environment | Part 1#3 | Part 32#36

The Autodiscover flow in an Exchange Hybrid based environment can be considered the most complex flow because the Autodiscover “journey” implemented in two different environments. Regarding users whom their mailbox migrated to the “cloud” (Exchange Online), the Autodiscover journey will start by the Autodiscover client by addressing the Exchange on-Premises infrastructure. Autodiscover flow in an…

Read more

Autodiscover flow in an Office 365 environment | Part 3#3 | Part 31#36

The current article is the continuation of the previous article, in which we review the Autodiscover flow that implemented in an Office 365 based environment, by using the Microsoft web-based tool, the Microsoft Remote Connectivity Analyzer (ExRCA). Autodiscover flow in an Office 365 environment | The article series The current article is the third article…

Read more

Autodiscover flow in an Office 365 environment | Part 2#3 | Part 30#36

The current article and the next article will be dedicated to detailed review of the Autodiscover flow; that implemented in an Office 365 based environment by using the Microsoft web-based tool, the Microsoft Remote Connectivity Analyzer (ExRCA). The Autodiscover in Office 365 environment includes many steps. I have tried to separate each of these steps…

Read more

Autodiscover flow in an Exchange on-Premises environment | non-Active Directory environment| Part 3#3 | Part 28#36

The current article is the continuation of the previous article, in which we review the Autodiscover flow that implemented in Autodiscover flow in a non-Active Directory environment. In this article, we will inspect the Autodiscover flow by using the Microsoft web-based tool, the Microsoft Remote Connectivity Analyzer (ExRCA). Autodiscover flow in non-Active Directory environment| Article…

Read more

Autodiscover flow in an Office 365 environment | Part 1#3 | Part 29#36

The Autodiscover flow in an Office 365 based environment can be considered as a fascinating process because the way that Autodiscover client locates their Autodiscover Endpoint, includes many twists and turns. Autodiscover flow in an Office 365 environment | The article series The current article is the first article on a series of three articles…

Read more

Autodiscover flow in an Exchange on-Premises environment | non-Active Directory environment| Part 2#3 | Part 27#36

The current article, we review the Autodiscover algorithm that Autodiscover client uses in a “non-Active Directory environment.” The Autodiscover Toolbox offers a verity of methods which the Autodiscover client can use when he tries to locate his Autodiscover Endpoint. Autodiscover flow in non-Active Directory environment| Article Series The Autodiscover flow in non-Active Directory environmentarticle series,…

Read more

Autodiscover flow in an Exchange on-Premises environment | non-Active Directory environment| Part 1#3 | Part 26#36

Autodiscover client uses a different Autodiscover method for locating the Autodiscover Endpoint in an On-Premise Active Directory based environment versus a non-Active Directory environment. The Autodiscover client verifies if he is located in an Active Directory environment or not. If he decides that he located in a non-Active Directory environment, the Autodiscover client starts to…

Read more

Seven major Autodiscover flow scenarios | Part 25#36

In the following article, we will review seven major common Autodiscover flow in a different environment. The review is a high-level review and not a detailed examination that deals with each of the specific steps and process that are involved. The purpose – in the continuation of the current series of articles, article 29 until…

Read more

Microsoft Connectivity Analyzer (MCA) | Autodiscover troubleshooting tools | Part 3#4 | Part 23#36

The Microsoft Connectivity Analyzer (MCA) tool is the “installable client” or the “software client” version of the ExRCA (Microsoft Remote Connectivity Analyzer Tool) Autodiscover test. The primary purpose of using the Microsoft Connectivity Analyzer (MCA) tool versus the Microsoft Remote Connectivity Analyzer web Tool is the ability to test the Autodiscover process from inside the…

Read more

Using Fiddler for Autodiscover troubleshooting scenarios | Part 4#4 | Part 24#36

The current article is the last article in the Autodiscover troubleshooting tools article series. In this article, we will review a fascinating tool named – Fiddler, that can help us in our task of capturing and analyzing Autodiscover data that passed between the Autodiscover client and the Autodiscover Endpoint throughout the Autodiscover communication channel. Autodiscover…

Read more

Microsoft Remote Connectivity Analyzer (ExRCA) | Autodiscover troubleshooting tools | Part 2#4 | Part 22#36

In the current article, we will learn to know the ExRCA also known as Microsoft Connectivity Analyzer web-based tool, that serves as the name implies for testing and analyzing information that is related to “relationships” of different Exchange clients with their Exchange server. Autodiscover Troubleshooting tools | The article series The article series include the…

Read more

Outlook Test E-mail AutoConfiguration | Autodiscover troubleshooting tools | Part 1#4 | Part 21#36

In the current article, we will review one of the most useful and “strongest” Autodiscover troubleshooting tools, Outlook client built-in tool named: Test E-mail AutoConfiguration. Autodiscover Troubleshooting tools | The article series The article series include the following articles: Outlook Test E-mail AutoConfiguration | Autodiscover troubleshooting tools | Part 1#4 | Part 21#36 Microsoft Remote…

Read more

Autodiscover process and Exchange security infrastructure | Part 20#36

The article is all about the subject of the security mechanism that is implemented as part of the Autodiscover process. Autodiscover and security Autodiscover mechanism includes three major parts: Locating the Autodiscover Endpoint Getting the Autodiscover information \data Using the Autodiscover information In the current article, we relate to the “middle part” in the diagram…

Read more

Exchange infrastructure | Implementing single domain namespace scheme | Part 2#2 | Part 18#36

The current article is the second article in which we review the concept of Exchange infrastructure and the use of a single namespace. In the former article, we review the concept and the reason for the recommendation of using an Exchange single namespace. The present article focused on a scenario in which we want to…

Read more

Public SAN certificate | Deprecated support in the internal server name | Part 19#36

In the current article, we will review the subject of – “Invalid Fully Qualified Domain Names” in SAN certificate. The interesting thing is that hostname (2014), there is not too much public information about this subject, but although this topic seems to be minor and not “cool”, the Implications of this new standard could be…

Read more

Autodiscover scenarios in enterprise environment | Part 16#36

Exchange on-Premises infrastructure was designed to serve the need of a small company and at the same time, meet the needs of an enterprise business that needs to provide mail services to thousands or even tens of thousands of users. The main characters of enterprise environment are: The use of multiple Exchange servers in multiple…

Read more

Should I use a single namespace for Exchange Infrastructure? | Part 1#2 | Part 17#36

The current article is dedicated to the Interesting and not so clear subject of – Exchange Infrastructure namespace. Exchange server architecture, enable us to use a different interface with internal Exchange clients versus external Exchange clients that based on various namespace. The major question that I will try to answer in this article are: Is…

Read more

Outlook Autodiscover decision process | Choosing the right Autodiscover method | Part 14#36

Outlook client entirely depends on the Autodiscover service as an infrastructure for his relationship with the Exchange server. This dependence relates to the initial phase in which Outlook needs to get the required information for creating a new mail profile and later the ongoing communication process with the Exchange infrastructure. It all begins with the…

Read more

Autodiscover flow in Active Directory based environment | Part 15#36

In the following article, we look “under the hood” of the Autodiscover method that implemented in Active Directory-based environment. In the Active Directory-based environment, the process in which the Autodiscover client such as Outlook locates available Autodiscover Endpoint performed by addressing the Active Directory as a source of information for available Autodiscover Endpoints (available Exchange…

Read more

Exchange clients and their Public facing Exchange server | Part 13#36

The current article will be dedicated to the subject of Exchange clients that access Exchange services from a public network. The focus is on the “public Exchange clients” because, the characters of the communication channel between the Exchange server and his Exchange client in a public environment, have a different character from the communication channel…

Read more

Outlook client protocol connectivity flow in an internal network environment | Part 12#36

In the current article, we will review the basic concepts of the Autodiscover flow, which is implemented by internal Outlook clients. The term “internal”, relate to a private network environment that has On-Premise Active Directory. Getting Autodiscover information The first part of the Autodiscover process implemented by the phase in which the Autodiscover client locates…

Read more

Exchange Web services | Manage the Internal and external URL address | Part 10#36

The current article should provide us a small glimpse to the subject of managing the internal and the external Exchange URL address of the different services. We will review a couple of examples to the interfaces the available to us for managing the variety of Exchange services – the graphical interface and the PowerShell interface.…

Read more

The content of the Autodiscover server response | Part 11#36

In the current article, we will review the subject of the Autodiscover response content. The term – “Autodiscover response” relates to the Autodiscover information that the Exchange CAS server provides to his Autodiscover client.In this article, we will refer to the Exchange Server Autodiscover response content from the perspective of the three Outlook providers –EXPR,…

Read more

The basics of Domain name, FQDN and URL address | Exchange infrastructure |Part 09#36

The communication channel that between Exchange client and Exchange server is based on a simple concept, in which Exchange client address the Exchange server by using the Exchange host name or, if we want to be more accurate – the Exchange server FQDN. The variety of the services that are offered by Exchange server to…

Read more

The dual identity of the Exchange server | Part 08#36

One of the most confusing and unclear subjects in the Exchange architecture is what I describe as – “the dual identity of the Exchange server”. I use the term “dual identity” because the Exchange server relates in a different way to Exchange client that located on the internal \Private network versus the Exchange client that…

Read more

Exchange CAS server as information + Web service provider | Part 07#36

The current article focused on the two primary responsibilities of the Exchange CAS server: Exchange CAS server as an information provider (Autodiscover information). Exchange CAS server as Exchange web service provider. The current article is the continuation of the previous article –xx. In the former article, we have reviewed the Exchange CAS server responsibilities that…

Read more

Exchange CAS server | Providing Exchange clients access to their mailbox | Part 06#36

In this article, I would like to review the secret romance of Exchange mail clients and “his” Exchange CAS server. Exchange clients have very unusual and exciting relationships with their Exchange CAS server and, the Autodiscover infrastructure is the glow that unified these two lovers. Continue with our romantic metaphor; the truth is that the…

Read more

The Autodiscover algorithm for locating the “source of information” | Part 05#36

The Autodiscover algorithm that is used by the Autodiscover client for locating his “source of information” (the Exchange CAS server), is based on a very sophisticated algorithm, that was designed to overcome and bypass many types of “obstacles’” and operate in different networking environments. In the current article, we will review the Autodiscover algorithm that…

Read more

The Autodiscover information | Part 04#36

Exchange Autodiscover is relating to “information” from three different perspectives: Autodiscover is the tool that Exchange client uses for getting information about the Exchange infrastructure. Autodiscover is the method in which Exchange CAS server provides information to his Exchange clients. Autodiscover is the information itself. In the following article, I would like to zoom in on…

Read more

Who are the Exchange Autodiscover clients? | Part 03#36

Throughout the current article series, the term “Autodiscover client\s” will be mentioned dozens or even hundreds of times. The obvious question could be – who or what are these “Autodiscover clients”? Autodiscover Client\server model versus server to server model Technically speaking, every Exchange client or another client that “know” how to locate Exchange CAS server,…

Read more

The old Exchange environment versus “modern” Exchange environment | Part 02#36

In this article, we will review how does the Autodiscover answer the needs and the requirements of the modern Exchange environment. To be able to understand the immense significance of the Exchange Autodiscover infrastructure, we will take a look at the older or previous version of Exchange architecture that did not have the Autodiscover services.…

Read more

Exchange Autodiscover infrastructure – Introduction | Part 01#36

Autodiscover is one of the most important and essential components of the Microsoft Exchange server architecture but at the same time, one of the most “unknown” and “misunderstood” terms. My primary goal is to “open a door” into the fascinating and exciting Exchange Autodiscover architecture. When I decided that I want to write an article…

Read more

Exchange Autodiscover – Article series – INDEX | Part 00#36

Exchange Autodiscover – Article series – INDEX Exchange Autodiscover – Article series – INDEX | Part 00#36 Exchange Autodiscover – Article series – INDEX   Exchange and Autodiscover infrastructure | The building blocks Exchange Autodiscover infrastructure – Introduction | Part 01#36 First impressions and introduction to the term “Autodiscover”, as a part of the Exchange…

Read more

Office 365 welcome kit – Links and Resources

The following page includes links and information that could serve as a “welcome kit” to Office 365 infrastructure or as “my first steps in Office 365 world”. Legend for Link and Resources table Articles Links table Video link table PowerShell Scripts link table Tools Link table Information about Office 365 infrastructure Video Links Table Office…

Read more

SMTP Relay in Office 365 environment | Troubleshooting scenarios |Part 4#4

The current article is dedicated the subject on – troubleshooting possible problems when using an SMTP mail relay server for sending mail to the Office 365 mail infrastructure. Send mail to Exchange Online – Article Series Send mail to Exchange Online | Part 1#4 Send mail to Exchange Online using standard SMTP session | Part…

Read more

Cannot create a new Outlook mail profile – using the Office 365 Support and Recovery Assistant

One of the most common troubleshooting scenarios in Office 365 and the Exchange Online environment described as – cannot create a new Outlook mail profile. Technically speaking, there are pre-requirements and best practices that need to be implemented before we try to configure a new Outlook mail profile for Office 365 users. In a scenario…

Read more

Using Exchange In-place eDiscovery & Hold for recovering deleted mail items | 6#7

In the current article, we will review how to use the Exchange In-place eDiscovery & Hold feature as a tool for searching and recovering deleted mail items. We will review the following subjects: How to create an Exchange In-place eDiscovery & Hold query. How to send a copy of the search results to the Discovery…

Read more

Exchange In-Place eDiscovery & Hold | Introduction | 5#7

The Exchange In-Place Hold & eDiscovery is a very powerful tool that can help us to accomplish three main tasks. Search for information (mail items) in single or multiple mailboxes. Put specific information on “hold” (enable to save the information for an unlimited time period). Recover deleted mail items. In this article, we will review…

Read more

Recover deleted mail items in the Exchange Online environment | Deleted mail flow | 3#7

In the current article, we will review the following subjects: The flow of a “deleted mail item” in an Exchange base environment for a standard mailbox and for Litigation Hold or In-Place Hold enabled mailbox. The subject of Deleted Item retention policy, the Exchange server policy that removes deleted mail items after a specific time…

Read more

Recover deleted mail items in the Exchange Online environment | Single item recovery | 2#7

In the current article, we will review the subject of Exchange single item recovery mechanism and his physical implementation – the Recoverable Items folder. The purpose of these “Exchange components” is to provide an easy and efficient way to solve the requirement of – recovering mail in Exchange base environment. The concept of single item…

Read more

Recover deleted mail items in the Exchange Online environment | introduction | 1#7

The current article is a basic introduction to the subject of – recovering mail items in the Exchange Online based environment. We will review a couple of common misconceptions that relate to the scenario in which users report that his E-mail deleted. The need to verify if the scenario is indeed a case of “deleted…

Read more

Recovering deleted mail items using PowerShell cmdlets Search-Mailbox | 7#7

In the current article, we will review the use of the PowerShell cmdlets Search-Mailbox that we can use for searching and recovering specific mail items. The PowerShell cmdlets Search-Mailbox is the “older sister” of the newer PowerShell cmdlets New-MailboxSearch. Booth of this PowerShell cmdlets was designed for providing the Exchange administrator the robust capability of…

Read more

De-list your organization from a Blacklist | My E-mail appears as spam | Part 16#17

In the following article, we review the charters of a scenario in which your organization appears as blacklisted. For the avoidance of doubt – the purpose of this article is not to provide a detailed instruction and links to the procedure of de-listing your organization from a particular blacklist. The purpose of the current article…

Read more

My E-mail appears as spam | Troubleshooting – Mail server | Part 14#17

In the current article and the next article: My E-mail appears as spam | Troubleshooting – Mail server | Part 15#17, we will review the troubleshooting process of the scenario – “our mail server appears as blacklisted” in Office 365 and Exchange Online environment Another variation of this scenario could be – a scenario, in…

Read more

My E-mail appears as spam | Troubleshooting – Domain name and E-mail content | Part 12#17

The current articles and the next three articles dedicated troubleshooting process of the scenario, in which our organization E-mail appears as a spam mail (internal \ outbound spam). The current article devoted to the most essential and efficient troubleshooting steps in which we verify the following parts: Verify if our domain name appears as blacklisted.…

Read more

My E-mail appears as spam – Troubleshooting path | Part 11#17

The current articles and the next three following articles dedicated to the subject of a troubleshooting scenario of internal \ outbound spam in Office 365 and Exchange Online environment. In the current article is the focus is on: “drowning” the path of the troubleshooting processes flow. The troubleshooting flow includes steps such as: Step 1…

Read more

High Risk Delivery Pool and Exchange Online | Part 10#17

The current article is the continuation of the previous article: High Risk Delivery Pool and Exchange Online | Part 9#17 In this article we will focus on the following subjects: How does Exchange Online “decide” to classify particular E-mail as spam\junk mail? Description of the internal spam E-mail message flow Who is the authority who…

Read more

High Risk Delivery Pool and Exchange Online | Part 9#17

The term: “High Risk Delivery Pool”, describes a “dedicated Exchange Online server’s pool” which is responsible for “handling” mail that posted by Office 365 recipients, which recognized as “problematic mail.” The current article and the next article – High Risk Delivery Pool and Exchange Online | Part 10#17 ,are dedicated to the description of: How…

Read more

Commercial E-mail – Using the right tools | Office 365 | Part 4#17

The current article dedicated to the subject of – ”Commercial E-mail”. At first glance, there is no clear relationship between the subject of internal \ outbound spam and commercial E-mail but my arguments are: Most of the time, the main reason for the phenomenon of internal \ outbound spam is related to misuse of commercial…

Read more

My E-mail appears as a spam – Introduction | Office 365 | Part 1#17

This article series dedicated to the scenario in which our organization’s user\s, turn to us urgently to solve a critical issue, which described by our users as: “My E-mail appears as spam!” Besides of the uncomfortable feeling in which somebody else treats our E-mail as – “spam \ junk mail”, the issue is critical because…

Read more

The Exchange 2013 coexistence article series index page | 0#23

This is the index page that will enable you to find your way around the maze of the Exchange 2013 coexistence article series. Exchange 2013 coexistence environment and client protocol connectivity flow | The prefix Part 01#23 An introduction to the subject of Exchange 2013 coexistence environment beginning with reviewing basic terms such as: “Exchange…

Read more

OWA client protocol connectivity flow in Exchange 2013/2010 coexistence | 3/4 | 22#23

The current article is the third article of four articles series, on the subject of: “Exchange 2013/2010 coexistence environment and mail client protocol connectivity flow”. In this article, we will review the client protocol connectivity flow of: OWA Exchange 2010 clients in an Exchange 2013/2010 coexistence environment. To be able to understand the different “Exchange…

Read more

Autodiscover and Outlook client protocol connectivity flow in Exchange 2013/2010 coexistence | 2/4 | 21#23

The current article is the second article in a series of three articles, which will dedicate to a detailed review of the client protocol connectivity flow in Exchange 2013/2010 coexistence environment. The current article deals with the following type of client protocol connectivity flow in Exchange 2013/2010 coexistence environment: Autodiscover client protocol connectivity flow Outlook…

Read more

Client protocol connectivity flow in Exchange 2013/2010 coexistence | Introduction and basic concepts| 1/4 | 20#23

The current article, is the first article in a series of four articles, which will dedicate to a detailed review of the client protocol connectivity flow in Exchange 2013/2010 coexistence environment. So… get ready to dive into the wonderful world of Exchange 2013 and Exchange 2010 coexistence! To be able to understand the different “Exchange…

Read more

OWA client protocol connectivity flow in Exchange 2013/2007 coexistence | 3/4 |18#23

The current article is the third article of four articles series, on the subject of – “Exchange 2013/2007 coexistence environment and mail client protocol connectivity flow”. In this article, we will review the client protocol connectivity flow of: OWA Exchange 2007 clients in an Exchange 2013/2007 coexistence environment.   To be able to understand the…

Read more

ActiveSync and Exchange web service client protocol connectivity flow in Exchange 2013/2007 coexistence | 4/4 | 19#23

The current article, is the fourth article of four articles series, on the subject of: “Exchange 2013/2007 coexistence environment and mail client protocol connectivity flow”. In this article, our primary focus is reviewing two types of client protocol connectivity flow in Exchange 2013/2007 coexistence environment: ActiveSync client protocol connectivity flow Exchange web services client protocol…

Read more

Autodiscover and Outlook client protocol connectivity flow in Exchange 2013/2007 coexistence | 2/4 | 17#23

The current article, is the second article of four articles series, on the subject of – “Exchange 2013/2007 coexistence environment and mail client protocol connectivity flow”. In this article, we will review the client protocol connectivity flow of: Autodiscover Exchange 2007 clients and Outlook Exchange 2007 clients in an Exchange 2013/2007 coexistence environment. To be…

Read more

Client protocol connectivity flow in Exchange 2013/2007 coexistence | Introduction and basic concepts| 1/4 | 16#23

The current article is the first article in a series of four articles, which will dedicate to a detailed review of the client protocol connectivity flow in Exchange 2013/2007 coexistence environment. So… get ready to dive into the wonderful world of Exchange 2013 and Exchange 2007 coexistence! To be able to understand the different “Exchange…

Read more

Manage legacy Exchange URL address using a PowerShell script | 15#23

The current article dedicated to the presentation of a little PowerShell script that I have written that was created to simplify the task of the “preparation” of existing Exchange infrastructure to the Exchange 2013 coexistence environment. The PowerShell script includes options that will help us to configure Exchange CAS server URL address, authentication type and…

Read more

Exchange 2013 coexistence and Outlook infrastructure | Part 2/2 | 14#23

In the current article, we will continue to review the subject of the Outlook client protocol connectivity flow in an Exchange 2013 coexistence environment. In this article, we will have a closer look at the specific charters, which build the Outlook and the Exchange relationship in this environment. The parts which we will review are:…

Read more

Basic concepts of Outlook connectivity in Exchange 2013 coexistence | Part 1/2 |13#23

Before we dive into the subject of “Outlook client protocol connectivity flow in an Exchange 2013 coexistence environment, it’s important to understand some of the basic concepts of Outlook connectivity and only then, understand the requirements and the individual charters of Outlook connectivity in an Exchange 2013 coexistence environment. The infrastructure of Outlook client protocol…

Read more

Exchange 2013 coexistence | Autodiscover infrastructure | Part 2/2 | 12#23

The focus of the current article is the Exchange Autodiscover infrastructure in the internal\private environment. In the current article, we will review the following subjects: General review of the Exchange Autodiscover environment The specific characters of Exchange Autodiscover infrastructure in an Exchange 2013 coexistence environment The reason for implementing the “Autodiscover centralized model” The Active…

Read more

Exchange 2013 coexistence | Autodiscover infrastructure | Part 1/2 | 11#23

In the following article, we will review the subject of Autodiscover infrastructure in an Exchange 2013 CAS environment. In a modern Exchange environment, we can say that the Autodiscover services consider the foundation for all the rest of the various Exchange infrastructure.The Exchange Autodiscover architecture can consider as complex and sophisticated, especially in an Exchange…

Read more

The checklist for preparing your Exchange 2010 infrastructure for Exchange 2013 coexistence |10#23

In the current article focus on the preparation that we will need to implement in the existing Exchange 2010 environment for a project of implementing Exchange 2013/2010 coexistence environment. Generally speaking, the good news is that the Exchange 2013 and Exchange CAS 2010 are “good friends.” Versus the scenario of Exchange 2013/2007 coexistence environment that…

Read more

The checklist for preparing your Exchange 2007 infrastructure for Exchange 2013 coexistence | 9#23

In the current article, I would like to review the subject of the required preparation that we will need to implement in the Exchange CAS 2007 environment before or while we are moving to the “new” Exchange 2013 coexistence environment. In this article, we will briefly review the different “parts” that we will need to…

Read more

Exchange 2013 coexistence environment and the Exchange legacy infrastructure | 8#23

In this article, I would like to focus on the term “legacy” that is used very often in the Exchange 2013 coexistence environment. As usual, the common assumption is that everyone knows and understands this term, but in reality, the term is not so clear, and we are as ashamed to admit that we don’t…

Read more

Exchange web services in an Exchange 2013 coexistence | Part 2/2 | 7#23

In the former article – Exchange web services in an Exchange 2013 coexistence environment | Part 1/2, we have already reviewed the concept and the logic of the Exchange web service in Exchange 2013 coexistence environment but in this article, I would like to get a closer look at the client protocol connectivity flow that…

Read more

Exchange web services in an Exchange 2013 coexistence | Part 1/2 | 6#23

The purpose of the current article is to enable us to understand better the concept of Exchange web services in an Exchange 2013 coexistence environment. In the present article, we will review the logic and the characters of the Exchange web service in Exchange 2013 coexistence environment. The article is the first of two, in…

Read more

Exchange Public infrastructure | Public versus non-Public facing Exchange site | 5#23

The current article dedicated to the subject of Exchange public infrastructure. When we relate to the topic of Exchange 2013 coexistence environment and client protocol connectivity flow, one of the most fundamental factors that determine and influence, the “client protocol connectivity flow” is the physical location of the Exchange clients. In simple words – whether…

Read more