Restoring Deleted mail items using the PowerShell cmdlet Restore-RecoverableItems | 3#3

Post Views: 5,101 In the current article, we review the use of the PowerShell cmdlet – Restore-RecoverableItems. Restore deleted mail items to their original folder using PowerShell| The article series The article series includes the following articles: Restore deleted mail items to their original folder using PowerShell – introduction | 1#3 Display information about Deleted…

Read more

Display information about Deleted mail items using the PowerShell cmdlet Get-RecoverableItems | 2#3

Post Views: 6,037 In the current article, we review how to display information about deleted mail items, by using the PowerShell cmdlet – Get-RecoverableItems. Restore deleted mail items to their original folder using PowerShell| The article series The article series includes the following articles: Restore deleted mail items to their original folder using PowerShell –…

Read more

Restore deleted mail items to their original folder using PowerShell – introduction | 1#3

Post Views: 6,758 The current article series is dedicated to the subject of – Viewing + Restoring deleted mail items from an Exchange Online mailbox, to their original folder, using two new PowerShell cmdlets – Get-RecoverableItems and Restore-RecoverableItems. Restore deleted mail items to their original folder using PowerShell| The article series The article series includes…

Read more

Using Office 365 content search for exporting deleted mail items to a PST file – prefix | 1#3

Post Views: 7,486 In the current article series, we review how to use the Office 365 Search Content feature, as a tool, that we can use for exporting the content of Exchange Online mailbox to a PST file. Office 365 content search | The article series The article series includes the following articles: Using Office…

Read more

Export the content of Exchange mailbox “Recoverable items” folder to PST using the Office 365 content search | Step by step guide | 2#3

Post Views: 6,205 In this article, we review in detailed step by step description of the process of – exporting the content of Exchange Online mailbox to a PST file. Office 365 content search | The article series The article series includes the following articles: Using Office 365 content search for exporting deleted mail items…

Read more

Import PST file that was exported by Office 365 Content Search to Outlook | View “Recoverable items” folder | 3#3

Post Views: 5,052 In this article, we review the process of importing a PST file to an Outlook mail profile + how to review the information that is stored in the “Recoverable items” folder. Office 365 content search | The article series The article series includes the following articles: Using Office 365 content search for…

Read more

Restoring Exchange Online mailbox content to another mailbox using PowerShell command New-MailboxRestoreRequest | Part 22#23

Post Views: 6,754 The current article we review the second solution that we can use for – dealing with a common Exchange Online mailbox restore mistake that occurs in Office 365 Directory synchronization environment or Exchange Hybrid environment. In our scenario Exchange, Online mailbox deleted because of the event in which an On-Premise Active Directory…

Read more

Import PST files to Office 365 using Microsoft Azure Storage Explorer tool | 2#2

Post Views: 5,915 This current article is the second article in a series of two articles. In the former article, we review in high level the components and the concepts that involved throughout the process of importing PST files to Exchange Online mailboxes.The current article, serve as a step by step guide which includes a…

Read more

Import PST files to Office 365 using Microsoft Azure Storage Explorer tool | 1#2

Post Views: 5,880 The current article is the first article in a series of two articles, which describe the process of importing PST files to Office 365 (or if we want to be more accurate Exchange Online mailboxes) by using the “Azure Storage Explorer” graphic utility. Article series The current article provides a high-level review…

Read more

How to use the spam mail report PowerShell script | Part 3#3

Post Views: 5,280 In the current article, we review the PowerShell menu script that I created for exporting and viewing information stored in Exchange Online spam mail log file. Article series | Using Get-MailDetailSpamReport | View and export spam mail report Office 365 spam mail report using PowerShell | Introduction | 1#3 Using Get-MailDetailSpamReport PowerShell…

Read more

Using Get-MailDetailSpamReport PowerShell cmdlet | View and export spam mail report | Part 2#3 

Post Views: 4,925 The PowerShell Get-MailDetailSpamReport cmdlet was created as a tool that simplifies the process of viewing and “dumping” information stored in Exchange Online spam log file.The Exchange Online spam log file, serve as a store that holds the documentation for each of the “spam mail events” that relates to incoming and outgoing mail…

Read more

Office 365 spam mail report using PowerShell | Introduction | 1#3

Post Views: 17,564 The current article is the first article in a three-article series. The Purpose of this article series is to Show you a relatively new PowerShell cmdlet named – Get-MailDetailSpamReport, that was created for Exchange Online and Office 365 administrator that need to view and export information stored in Exchange Online spam mail…

Read more

Managing Focused Inbox in Office 365 using PowerShell

Post Views: 8,705 In the current article, we review how to manage the option of – Focused Inbox in Office 365 by using PowerShell. Generally speaking, we can enable or disable the option Focused Inbox in “organization level” by using the PowerShell cmdlet – Get-OrganizationConfig or by managing single Exchange mailbox” by using the PowerShell…

Read more

Delete mail items from Single Exchange mailbox using PowerShell | Part 5#5

Post Views: 8,622 In this article, we review various scenarios of using the Search-Mailbox cmdlet for deleting mail items from a Single Exchange mailbox (Bulk Deletion). In the former article –  we review various scenarios of using the Search-Mailbox cmdlet for deleting mail items from multiple Exchange mailboxes (Bulk Deletion). PowerShell | Help & additional…

Read more

Delete mail items from Multiple Exchange mailboxes (Bulk) using PowerShell | Part 4#5

Post Views: 6,043 The current article serves as an introduction to the subject of Deleting mail items using the Search-Mailbox cmdlet. In this article, we review some various scenarios of using the Search-Mailbox cmdlet for deleting mail items from multiple Exchange mailboxes (Bulk Deletion).     PowerShell | Help & additional information Running PowerShell commands…

Read more

Recover mail items from Recovery mail folder (the Dumpster) using PowerShell | Part 3#5

Post Views: 5,305 In the current article, we will review how to use the PowerShell cmdlet Search-Mailbox for -recover mail item stored in the Recovery mail folder (also named the Dumpster).The recovery mail folder considers as a “system folder” and it’s not visible to the user (mailbox owner). PowerShell | Help & additional information Running…

Read more

Search + Save a copy of mail items using PowerShell | Part 2#5

Post Views: 5,533 In the current article, we will review how to use the Search-Mailbox PowerShell cmdlet for performing a search on a specific Exchange mailbox + copy the search results to a “destination mailbox” (Target Mailbox). PowerShell | Help & additional information Running PowerShell commands in Office 365 based environment To be able to…

Read more

Using the Search-Mailbox PowerShell command – Introduction | Part 1#5

Post Views: 17,515 The current article series deal with a very useful and powerful PowerShell command named – Search-Mailbox . I relate to the Search-Mailbox PowerShell command as a “Swiss Knife” because we can use the Search-Mailbox PowerShell command for many types of scenarios.   What does the Search-Mailbox PowerShell command do? The Search-Mailbox PowerShell…

Read more

Using PowerShell for view and export information about mailbox migration to Office 365 | Part 2#5

Post Views: 6,501 In the following article and the next article, we review the various PowerShell cmdlets, that we can use for view, and export information about the process of Exchange mailbox migration process. Most of the time, the main use for viewing and export information about the mailbox migration process is, for the purpose…

Read more

Using PowerShell for view and export information about mailbox migration to Office 365 | Part 3#5

Post Views: 14,818 In the current article and the next article, we review the various PowerShell cmdlets that we can use for viewing and export information about the process of Exchange mailbox migration process. The “mailbox migration” PowerShell commands that we review in this article are: Get-MigrationBatch Get-MoveRequest Get-MoveRequestStatistics 1. Migration batches | Get-MigrationBatch The…

Read more

How to use the export mailbox migration information and troubleshooting PowerShell script | Part 5#5

Post Views: 5,156 In the following article, we review how to use the “Export mailbox migration information and troubleshooting” PowerShell script. The PowerShell script structure The menu PowerShell script is dived to couple of sections that we will review later in the article. The PowerShell script was designed to work in two different environments: Office…

Read more

Using PowerShell for view and export information about mailbox migration to Office 365 | Part 4#5

Post Views: 7,470 The current article is the continuation of the former article, in which we review the various PowerShell cmdlets that we can use for viewing, and export information about the process of Exchange mailbox migration process. The “mailbox migration” PowerShell commands that we review in this article are: Get-MigrationStatistics Get-MigrationUser Get-MigrationUserStatistics In addition,…

Read more

Mailbox migration to Office 365 the PowerShell migration entities | Part 1#5

Post Views: 9,729 The current article is the first article in a series of five articles, that deal with the subject of using PowerShell as a tool for getting information about the mailbox migration process from the On-Premise environment to Office 365 (Exchange Online).In the first article, we review the following subjects: The various entities…

Read more

Enabling Outbound DKIM signing + Verifying the process of Outbound DKIM signing in the Office 365 environment | Part 10#10

Post Views: 5,891 In the current article, we were complete to process of “Enabling Outbound DKIM signing” in an Office 365 based environment.In addition, we review how to verify that the process of outgoing DKIM signature is implemented properly. Activating (enabling) the Outbound DKIM signing for our domain name In this phase, we assume that…

Read more

Verifying that the DKIM CNAME records configured properly | Office 365 | Part 9#10

Post Views: 9,933 In the current article, we review to process of – how to verify the DNS CNAME DKIM records, that represent a domain hosted at Office 365. The process of verifying the Office 365 DKIM CNAME records include three parts: Verify that the two CNAME records were successfully published. Verify that the CNAME…

Read more

How to create the CNAME records for Outbound DKIM signing using GoDaddy DNS | Office 365 | Part 8#10

Post Views: 16,381 In the current article, we provide step by step guideline, for the task of – creating the required two “DKIM CNAME records,” that we needed to publish. This is a preliminary step that we must complete. Only after the required “DKIM CNAME” records were successfully created, we can continue to the last…

Read more

Get the value of the DKIM record for a Domain, using PowerShell | Office 365 | Part 7#10

Post Views: 7,500 The task of getting the value of the DKIM records for a specific domain name in Office 365 based environment, can be described as a “challenging task, ” because, at the current time, there is no “user-friendly” graphic interface that can provide us the information that we need. The only way for…

Read more

How to use the PowerShell script – manage Email addresses in Office 365 | Part 13#13

Post Views: 5,773 In the current article, I would like to provide a basic review of the PowerShell script that I created that will help you to implement various tasks that relate to E-mail address management in Office 365 and Exchange Online based environment. The structure of the – “Manage E-mail addresses menu based PowerShell…

Read more

Remove Email addresses using PowerShell | Office 365 | Part 12#13

Post Views: 20,523 In this article, we review the subject of removing (deleting) E-mail address by using PowerShell. The subject of – “removing existing E-mail address” using PowerShell can cause some confusion because there are two types of “deletion operations” that depend on the specific PowerShell command syntax that we use. The two methods for…

Read more

Searching Email addresses with a specific domain name suffix Using PowerShell | Office 365 | Part 10#13

Post Views: 14,223 In the current article, we review the scenario in which we use PowerShell for searching for an E-mail address with a specific domain name suffix.       In our case, we review a scenario which I defined as “unified search” because that search will “run” on two different Office 365 infrastructures:…

Read more

Searching for an Email addresses using PowerShell | Where Filter | Office 365 | Part 9#13

Post Views: 11,000 The current article we review the PowerShell command syntax, that we use for “constructing” a query, for searching specific E-mail address using the PowerShell where filter. The thing that we need to know before we start the search for E-mail address In this section, I would like to briefly review the main…

Read more

Introduction to the various type of Exchange Online recipients | PowerShell cmdlets | Office 365 | Part 8#13

Post Views: 6,082 Addressing “recipient’s objects” in Exchange Online and Azure Active Directory environment for performing tasks such as looking for information about E-mail addresses could be realized as a challenging task. In the current article, we will take a walk in the “thick forest” of Exchange Online and Azure Active Directory infrastructure, and learn…

Read more

Manage Email addresses using PowerShell | Office 365 | Command reference | Part 2#13

Post Views: 6,072 The current article is the continuation of the former article in which we review various management tasks that relates to the subject of – Managing E-mail address using PowerShell. In this article, we review that following types of management tasks: Display information about E-mail addresses. Searching for information about E-mail addresses. Removing…

Read more

Adding Email addresses using PowerShell – Import from CSV file | Bulk mode | Office 365 | Part 5#13

Post Views: 12,734 In the current article, we review the way we use PowerShell for – adding and updating Exchange recipient’s E-mail address, by importing the information stored in a CSV file. Manage E-mail address by using CSV file | Bulk mode In the next section, we review a couple of scenarios in which we…

Read more

Export and display information about Email addresses using PowerShell | Office 365 | Part 6#13

Post Views: 8,369 In this article, we review that basic PowerShell command syntax that we use for display information about the E-mail addresses of Exchange Online recipients. In addition, we review the PowerShell command syntax that we use in case we need to export the PowerShell command output the various type files such as –…

Read more

Display information about E-mail Addresses using PowerShell | Customizing the output using Hash Table and Custom expressions | Office 365 | Part 7#13

Post Views: 4,727 In this article, we review that subject of – how to create a Hash table + Custom expressions as a “tool” that we can use for optimizing and manipulating the PowerShell output in scenarios of – Get information about recipient’s E-mail addresses. We will learn how to create a Hash table +…

Read more

Using Get-MessageTrace PowerShell command for viewing and exporting information on mail sent and received | Exchange Online | Part 2#2

Post Views: 21,688 The current article is the second article in our two-article series. In this article, we review how to use the Get-MessageTrace PowerShell command for viewing and exporting information about incoming and outgoing mail transactions that are stored in the Exchange Online log files. In the former article, we review in details the…

Read more

Using Get-MessageTrace PowerShell command for viewing and exporting information on mail sent and received | Exchange Online | Part 1#2

Post Views: 14,000 In the current two-article series, we review the Exchange Online PowerShell command Get-MessageTrace, that is used to view and export information about incoming and outgoing mail transaction that are saved in the Exchange Online Logfiles. In the first article, we provide a basic introduction to the Get-MessageTrace PowerShell command, and to her…

Read more

Save a copy of sent mail items when using Send As permissions | Shared mailbox | Office 365

Post Views: 14,322 In the current article, we review how to change and manage the default settings of “saving mail items,” in a scenario in which recipient sends E-mail using another recipient “identity” (other recipient E-mail addresses). By default, when recipient A send E-mail on behalf of recipient B, the sent mail items will be…

Read more

Creating a Loop through an array Using the “ForEach” statement and variables | PowerShell environment| Part 2#2

Post Views: 10,499 The current article, is the continuation of the former article, in which we provide a basic introduction to the subject of the way that we write a PowerShell command, the loop through an array using the “ForEach” statement. The Creating a loop through an array Using the “ForEach” PowerShell article series, including…

Read more

Creating a loop through an array Using the “ForEach” PowerShell command | Basic introduction | Part 1#2

Post Views: 5,363 In the current article, I would like to provide a basic introduction to the concept of “Array” and the “ForEach statement”, in PowerShell based environment (especially in Office 365 and Exchange Online based environment). The Creating a loop through an array Using the “ForEach” PowerShell article series, including the following articles: Creating…

Read more

Manage Distribution Group using PowerShell in Office 365 | Delete Distribution Group and members | Convert Distribution Group | Part 5#5

Post Views: 10,388 The current article is fifth and the last article in our article series, which is dedicated to the subject of managing Distribution Group in Office 365 and Exchange Online based environment using PowerShell. Manage Distribution Group using PowerShell in Office 365 | Article Series Manage Distribution Group using PowerShell in Office 365…

Read more

Manage Distribution Group using PowerShell in Office 365 | view and export information about Distribution Group | Part 4#5

Post Views: 9,199 The current article is that Fourth article on the five-article series, which is dedicated to the subject of managing Distribution Group in Office 365 and Exchange Online based environment using PowerShell.The article includes two main sections: Management tasks that relate to the need for viewing information about Distribution Group settings, Distribution Group…

Read more

Manage Distribution Group using PowerShell in Office 365 | Adding members to existing Distribution Group | Part 3#5

Post Views: 14,025 The current article is that third article on the five-article series, which is dedicated to the subject of managing Distribution Group in Office 365 and Exchange Online based environment using PowerShell. The article is dedicated to the subject of adding members to existing Distribution Group by using PowerShell. Manage Distribution Group using…

Read more

Manage Distribution Group using PowerShell in Office 365 | Creating and managing Distribution Groups | Part 2#5

Post Views: 11,147 The current article is that second article on the five-article series, which is dedicated to the subject of managing Distribution Group in Office 365 and Exchange Online based environment using PowerShell.The article includes two main sections: Creating New Distribution Group. Configure the setting of existing Distribution Group. Manage Distribution Group using PowerShell…

Read more

Use PowerShell for view Office 365 objects | Part 2#3

Post Views: 6,446 In the current article, we review the various examples of the way that we use PowerShell, for creating a “Filtered search” in an Office 365 based environment. Use PowerShell for view Office 365 and Exchange Online objects | Article Table of content Using the PowerShell “Where statement” for creating filtered search |…

Read more

Using the PowerShell “Where statement” for creating filtered search | Office 365 and Exchange Online objects | Part 1#3

Post Views: 15,036 The current article series, include three articles that are dedicated to the subject of – using PowerShell for “view” information about Office 365 (Azure Active Directory), and Exchange Online objects. The first article includes a basic introduction to the PowerShell “Where statement,” that we use as a “filter” for getting information about…

Read more

How to run and use o365info PowerShell menu script

Post Views: 5,398 The purpose if the following article is to enable you to use effectively the “Office 365 PowerShell scripts” that I add to my PowerShell articles. The PowerShell script that provides can be described as “Menu based” PowerShell scripts. Each menu performs a particular “task.” To execute a specific “task” all you need…

Read more

Solving an Exchange Online mailbox restore mistake Office 365 user was restored – removing the ImmutableID value | Part 23#23

Post Views: 4,964 In the current article, we provide the step by step instructions, for resolving a typical Exchange Online mailbox restore mistake, in Office 365 Directory synchronization environment. The Mailbox restore mistake is realized by – restoring Soft Deleted Office 365 user account, instead of restoring the original Soft Deleted On-Premise Active Directory user…

Read more

Solving an Exchange Online mailbox restore mistake by Restoring the original Soft Deleted Active Directory user | Part 21#23

Post Views: 4,852 In the current article, we provide the step by step instructions, for resolving a typical Exchange Online mailbox restore mistake in Office 365 Directory synchronization environment. The Mailbox restore mistake is realized by – creating a NEW Active Directory user created, instead of restoring the original Soft Deleted On-Premise Active Directory user…

Read more

Reviewing the characters of Exchange Online mailbox recovery mistake – Soft Deleted Office 365 was restored | Part 20#23

Post Views: 3,004 In the current article, we describe characters of a typical Exchange Online mailbox restore mistake in Office 365 Directory synchronization environment and describe the characteristics of an optional solution. The mailbox restore mistake is: Office 365 User account was restored (and his Exchange Online mailbox was restored). New Active Directory user with…

Read more

Reviewing the characters of Exchange Online mailbox recovery mistake – New On-Premise Active Directory User Account was created | Part 19#23

Post Views: 2,727 In the current article, we describe characters of a typical Exchange Online mailbox restore mistake in Office 365 Directory synchronization environment and describe the characteristics of an optional solution. The restore mistake is – that a NEW Active Directory user created, instead of restoring the original Soft Deleted On-Premise Active Directory user…

Read more

Prefix – the “Problematic” Exchange Online mailbox restores scenarios in Directory synchronization environment | Part 18#23

Post Views: 2,947 In the current article, can be considered as a “prefix” to the subject which I describe as “the “Problematic Exchange Online mailbox restore scenarios in Directory synchronization environment.” Office 365 and Directory synchronization can consider as a complex environment, that “bind together” two different environments – the On-Premise environment and the “cloud”…

Read more

Restore Exchange Online USER mailbox | Directory synchronization environment | The “right way” | Part 17#23

Post Views: 3,317 In the current article, we review how to successfully restore an Exchange Online mailbox, in Directory synchronization based environment, by implementing the best-practice procedure. In Office 365 environment that uses Directory synchronization (when the user account synchronized from the On-Premise Active Directory to the Office 365 Directory), the restore process of an…

Read more

How to restore Active Directory deleted user account by using Active Directory recycle bin | Article 4#4 | Part 16#23

Post Views: 6,155 In the current article, we review the process of restoring a deleted user account by using the Active Directory recycle bin. Technically speaking, the Active Directory recycle bin, can be used for restoring any type of “Active Directory object” such as – user account, computer account, group account and so on. The…

Read more

How to restore Active Directory deleted user account (Active Directory recycle bin is not enabled) using AdRestore, AdRestore.net and LEX – the LDAP explorer | Article 3#4 | Part 15#23

Post Views: 4,089 In the current article, we will review the process of restoring Active Directory deleted a user, in a scenario in which the Active Directory recycle bin was not enabled (activated). In the former article, we review the restore process by using a built-in windows server tool named – LDP.EXE. In the current…

Read more

How to restore Active Directory deleted user account (Active Directory recycle bin is not enabled) using LDP.EXE | Article 2#4 | Part 14#23

Post Views: 4,338 In the current article, we will review the process of restoring Active Directory deleted the user, in a scenario in which the Active Directory recycle bin was not enabled (activated).We will review how to restore deleted Active Directory object by using a built-in Windows server tool named – LDP.EXE. The LDP.EXE was…

Read more

Deleted Active Directory User account and the Deleted object store | Basic introduction | Article 1#4 | Part 13#23

Post Views: 4,021 In the following article, I would like to provide a high-level review on the subject of – “Restoring Soft Deleted Active Directory User account.” We will review the following subjects: The method that the Active Directory uses for storing deleted objects such as User account. The two main Active Directory methods, that…

Read more

The special characters of Directory synchronization in an Office 365 environment | Article 2#2 | Part 12#23

Post Views: 3,543 In this article, we continue to review the special characters of Office 365 Directory synchronization environment, so we will be able to understand better the “flow of events” in Office 365 Directory synchronization environment. We will review the events flow of three major scenarios: The event of – Creating a NEW Active…

Read more

The special characters of Directory synchronization in an Office 365 environment | Article 1#2 | Part 11#23

Post Views: 3,689 In the current article and the next article, we review the main characters of the Directory synchronization process in an Office 365 based environment.The reason that I add two dedicates articles, or this subject is, because of the knowledge about “what happens behind the scenes” of the Directory synchronization, is very crucial…

Read more

Restore Exchange Online user mailbox | Cloud only (Fully Hosted) environment | Article 3#3 | Part 10#23

Post Views: 3,717 In the current article, we review the second option for restoring Soft Deleted Exchange Online mailbox. In this scenario, we “Instantiate” the restore process by using a PowerShell command (Undo-SoftDeletedMailbox), that will restore the Soft Deleted Exchange Online mailbox, and also, create a NEW Office 365 user account that will associated with…

Read more

Restore Exchange Online user mailbox | Cloud only (Fully Hosted) environment | Article 2#3 | Part 9#23

Post Views: 2,367 In the current article, we review the required steps for recovering Soft Deleted Exchange Online mailbox by restoring the Office 365 user account that considered as the Exchange Online mailbox owner. In the former article, we prepare all the required setting for simulating the “deletion event.” In this article, we will continue…

Read more

Restore Exchange Online user mailbox | Cloud only (Fully Hosted) environment | Article 1#3 | Part 8#23

Post Views: 2,954 In the following article, we will review the restore process of the Exchange Online user mailbox. We will demonstrate two options for restoring a deleted Exchange Online User mailbox. Option 1#2 – Restore the Office 365 user account. In the current article and the next article, we demonstrate the method of –…

Read more

Restore Exchange Online Shared mailbox | Cloud only (Fully Hosted) environment | Part 7#23

Post Views: 8,386 In the following article, we will review the restore process of Exchange Online Shared mailbox. We will demonstrate two options for restoring a deleted Exchange Online Shared mailbox: Restore the Office 365 user account, that was the owner of the deleted Shared mailbox. The restore process will be implemented by using the…

Read more

Restore Exchange Online Room mailbox | Cloud only (Fully Hosted) environment | Part 6#23

Post Views: 4,887 In the following article, we will review the restore process of the Exchange Online Room mailbox. We will demonstrate two options for restoring a deleted Exchange Online Room mailbox: Restore the Office 365 user account, that was the owner of the deleted Room mailbox. The restore process will be implemented by using…

Read more

The Index of the different Exchange Online mailbox restores methods| Part 5#23

Post Views: 2,669 The current article serves as an index, for the different Exchange Online mailbox restore scenarios, which appear along the current article series that include 23 articles. The purpose of this “index” is, to help you to quickly and efficiently locate the specific Exchange Online mailbox restore scenario that you need to deal…

Read more

What are the possible options for recovering Exchange Online mailbox? | Part 4#23

Post Views: 3,982 In the current article, we will review in high level the different options, for recovering Exchange Online mailbox.Before we dive into the deep water off – “Exchange Online restores mailbox scenario” and specific details of the restore process that will be reviewed in the next articles in the current article series. It’s…

Read more

What are the possible causes for an Exchange Online mailbox deletion? | Part 3#23

Post Views: 2,882 In the current article, we review the possible causes that lead to a scenario, in which Exchange Online mailbox is deleted.The logical assumption is that “mailbox deletion event” not just happens, but instead, the person that acts as the Exchange Online administrator, performs the mailbox deletion consciously. In reality, there are many…

Read more

Directory Object Deletion and the restore “domino effect + little bit about the concept of the Active Directory Recycle bin | Part 2#23

Post Views: 3,195 In the current article, we continue to review different concepts and components that relate and involved throughout the process of restoring Exchange Online mailbox. We will start by describing a concept which I define as “Falling domino effect,” that relates to the chain of an event in an Office 365 based environment…

Read more

Restore deleted Exchange Online mailbox in Office 365 environment | Prefix | Part 01#23

Post Views: 16,885 The current article series deal with the subject of – restoring or recovering a deleted mailbox in Office 365 (Exchange Online) environment. The interesting thing about “Restore deleted mailbox” in an Office 365 based environment is, that most of the time, most of us (including me), not fully understand what is happening…

Read more

Configure Exchange Online inbound mail flow to accept SMTP connection only from a specific mail security gateway IP address

Post Views: 12,658 In the current article, we will review how to change the default Exchange Online incoming mail policy, which enables any host, to address Exchange Online using SMTP. A different way of describing such a scenario is – Block SMTP access of external mail servers to Exchange Online. In our scenario, we want…

Read more

Configure your WordPress site to send E-mail via GoDaddy mail server – Shared Hosting plan | Part 6#6

Post Views: 11,807 In the current article, we review how to configure a WordPress site that is hosted at GoDaddy, and use a Shared Hosting plan, use the GoDaddy SMTP mail server. In our scenario, we use the help of Postman SMTP Mailer/Email Log mail plugin. Before we start, it’s important to me to emphasize…

Read more

Configure WordPress site send E-mail via Exchange Online (Office 365) | Provide user credentials without purchase Office 365 license | Part 5#6

Post Views: 4,548 In the current article, we continue to review the scenario in which we want to configure our WordPress site to address Exchange Online server, and implement the best-practice scenario, in which we implement an authenticated mail session (providing Office 365 user credentials). The main reason in which users often avoid the best…

Read more

Configure your WordPress site to send E-mail via Exchange Online (Office 365) provide user credentials | Part 4#6

Post Views: 10,660 In the current article, we review how to configure a WordPress site, to address Office 365 mail by using the recommended configuration. In a scenario in which our WordPress website serves as a “mail client” that addresses mail server and asks him to be “his mail server,” the best practice is to…

Read more

Creating Exchange Online bypass spam rule – whitelist specific sender E-mail address | Part 3#6

Post Views: 6,368 In the following article, we will provide “step by step” instructions for creating Exchange Online bypass spam rule, that will prevent the “spam check” that the Exchange Online mail server performs for a specific E-mail address. The current article is the continuation of the former article. A quick reminder, in the previous…

Read more

Configure your WordPress site to send E-mail via Exchange Online (Office 365) anonymous session | Part 2#6

Post Views: 15,943 In the current article, we review a scenario in which we need to configure our WordPress site to use Exchange Online as “mail server”.The main character of this scenario is – that we want to configure our WordPress site to address Office 365 mail services without providing any user credentials (anonymously). The…

Read more

Configure your WordPress site to send E-mail via SMTP mail server | GoDaddy and Office 365 based environment | Part 1#6

Post Views: 15,990 In the current article series, we review the steps by step instructions, that are needed for configuring WordPress site to send E-mail by using an SMTP mail server. Generally speaking, the required configuration that is needed depends on three variables: The network infrastructure which hosts the WordPress site The specific characters of…

Read more

Automatic Reply in Office 365 -Dealing with mail loop (mail storm) scenarios |Part 7#7   

Post Views: 13,540 In the current article, I would like to review the possibility of a scenario which can be described as Mail loop (other common terms are – Mail storm or “reply back loop”) when using the option of Automatic Reply. The term “Mail loop” and Automatic Reply scenario The term “Mail loop” describes…

Read more

Setting up an Automatic Reply in Office 365 using mailbox rule and Shared mailbox | Part 6#7

Post Views: 4,819 In the current article, we continue to review the steps that are needed for completing the tasks of – creating an Exchange Online shared mailbox that will serve as a “service mailbox” for the service request tickets that will be opened by our organization users. In the former article , we have reviewed…

Read more

Setting up an Automatic Reply in Office 365 using Public Folder | Part 4#7

Post Views: 4,539 The current article is the sequel to the former article, in which we review the process of configuring Public Folder in Office 365 based environment to use the option of an automatic reply. Our specific scenario is quite complicated and include many “parts” (business requirements). In the former article, we have already…

Read more

Configuring Automatic Replies (Out of office) using Outlook, OWA, and PowerShell |Part 2#7

Post Views: 7,290 In the current article, we will review how to configure the option of Automatic replies (Out of office assistant) in Exchange based environment. Most of the time, the activation of the Automatic replies (Out of office assistant) will be implemented by the user himself via the Outlook or the OWA graphic interface.…

Read more

Automatic replies (Out of office assistant) versus Automatic reply using mailbox rule – Exchange Online |Part 1#7

Post Views: 8,090 In the current article series, we will review the different options for implementing Automatic Reply in Office 365 (Exchange Online) based environment. Corresponding terms are Automatic respond, Autoresponder, Automatic replies or, Out of office. The term “Automatic reply” (and of the equivalent terms) defines a configuration in which we configure a specific…

Read more

How to recognize an event in which Office 365 recipient send spam mail?

Post Views: 6,283 One of our Office 365 recipients complains that the E-mail that he sent to an external recipient is blocked or classified as a “spam mail.” Our underlying assumption is that the problem is related to “Office 365 infrastructure” and they should immediately fix the problem! In the following article, we will learn…

Read more

Prevent the option of Reply All by using NoReplyAll Outlook Add-In – Part 4#5

Post Views: 5,749 In the following article, we review additional method for preventing to option to reply to All by using a very nice utility named – NoReplyAll Outlook Add-In Prevent to option of Reply All | Article Series The Prevent to option of Reply All article series, including the following three articles: Prevent the…

Read more

Import Google’s contacts with non-English characters to Office 365 mailboxes |Part 2#2

Post Views: 5,735 In the current article, we review the process of Export information from our Google mail account to a CSV file. The difference from the previous article is that in this scenario, we have Google’s contacts whom their name and their information include non-English characters. Import Google’s contacts| Article Series The Import Google’s…

Read more

Import Google’s contacts from a CSV file using Outlook or OWA | Part 1#2

Post Views: 3,827 In the current article, we review the process of Export information from our Google mail account to a CSV file. Import the contents’ information stored in the CSV file using Outlook and OWA mail client. Import Google’s contacts| Article Series The Import Google’s contacts article series, including the following articles: Import Google’s…

Read more

How to efficiency and easily read the information in the Exchange Online message trace historical search CSV file

Post Views: 6,276 Exchange Online, offer us a very in-depth and comprehensive information about each mail flow transaction, which occurs in our mail infrastructure. The information about each incoming and outgoing mail transaction which passes via the Exchange Online server is kept for 90 days.The Exchange Online web based management interface enables us to look…

Read more

Bulk Import Contacts to Exchange Online (Office 365) Using PowerShell script | Part 2#2

Post Views: 6,074 The current article is the second article in our two article series, in which we review the process of Bulk Import contacts to Exchange Online (Office 365) using PowerShell. The two topics that we will review in this article are: Using a “Bulk Import contacts” PowerShell script. Using the PowerShell script will…

Read more

Bulk Import Contacts to Exchange Online (Office 365) Using PowerShell | Part 1#2

Post Views: 20,174 In Exchange based environment, the term “external contacts” or just “contacts,” describe an Exchange recipient object, which their E-mail address is an external E-mail address (non-organization E-mail address). For example – suppliers, business partners, customers and so on. By default, “external contacts” appear as part of the GAL (global address list) alongside…

Read more

How to Connect to Office 365 using PowerShell script + using saved encrypted user credentials

Post Views: 26,910 In the current article, we will learn how to create a PowerShell script, which will help us to connect automatically to Office 365 (Windows Azure Active Directory) and Exchange Online, without the need of typing complicated PowerShell commands! The added bonus that I would like to add to this “automation” is –…

Read more

Send E-mail to office 365 using PowerShell script and saved encrypted password |Part 2#2

Post Views: 11,607 In the following article, we will review how to write and run PowerShell script; that will address the Office 365 mail servers (Exchange Online). Versus the scenario that we have examined in the previous article, we review a situation, in which we address the Office 365 mail server anonymously (without providing user…

Read more

Migrating Exchange on-Premises Mailboxes Separately | Exchange Hybrid based environment | What are the migrated permissions? | Part 5#5 

Post Views: 4,121 In the current article, we will review the mail migration scenario in which we “break” existing Exchange permission’s relationship. I use the term “break” because, in this scenario, we are migrating only one partner from the existing “couple” to the cloud. When we migrate Exchange on-Premises mailboxes in the cloud not as…

Read more

Migrating Exchange on-Premises mailboxes as a group | Exchange Hybrid based environment | What are the migrated permissions? | Part 4#5

Post Views: 3,438 In the current article, we will review the scenario in which we migrate Exchange on-Premises mailboxes that have an “existing permission’s relationship” to the cloud as a group. Our purpose is to check what are the Exchange permissions, which will migrate to the cloud, along with the mailbox data. In the next…

Read more

Migrated permissions of migrated mailboxes in Exchange Hybrid based environment – Introduction | Part 3#5

Post Views: 5,614 The subject of the Exchange permission’s relationship between migrated mailboxes in the Exchange Hybrid environment could be quite confusing. The term “Exchange permission’s relationship,” try to describe two (or more) mailboxes that have existing permission’s structure between them. When we migrate these mailboxes from their “native environment” to the “other environment” the…

Read more

Testing cross site permissions in Exchange Hybrid based environment| Part 2#5

Post Views: 11,518 As mentioned in the previous article, the subject of Exchange permissions relationship in Exchange Hybrid environment can be realized in two major scenarios: Scenario 1 – Cross site permission Scenario 1 – Cross site permission The Exchange permissions that Exchange on-Premises mailbox can have on cloud mailbox and vice versa. Scenario 2…

Read more

Cross site permission and migrated permissions in Exchange Hybrid based environment | Part 1#5

Post Views: 12,548 The current article series dedicated to the subject of – the available Exchange permissions in Exchange Hybrid environment. The term “Exchange permissions” is realized in two major scenarios: Scenario 1 – Cross site permissions The term “cross site permissions”, define the available Exchange permissions, that we can assign to Exchange on-Premises mailbox…

Read more

Manage Safe Senders and Block Sender Lists using PowerShell – Office 365

Post Views: 19,966 The term “Junk Email Filter” defines an Exchange mail security mechanism, that implemented on the “mailbox level.” In Exchange based environment, most of the times, the mail security infrastructure is implemented most of the time in the “server level” (Exchange server). The interesting thing is that also, Exchange enables his recipients, to…

Read more

Implementing SPF Fail policy using Exchange Online rule (dealing with Spoof E-mail attack) | Phase 2 production | part 3#3

Post Views: 6,327 The current article is the last article in the article series, in which we review how to implement SPF Fail policy using Exchange Online rule. In the present article, we will discuss how to apply the second phase of our project, in which, when the Exchange rule identifies an event of “SPF…

Read more

Implementing SPF Fail policy using Exchange Online rule (dealing with Spoof E-mail attack) | Phase 1 – learning mode | Part 2#3

Post Views: 6,523 In the current article, we will review how to implement an SPF Policy for incoming mail by using an Exchange rule. In our scenario, we want to identify an event, in which hostile element tries to execute a Spoof mail attack by presenting himself, as a legitimate recipient who uses an E-mail…

Read more

Implementing SPF Fail policy using Exchange Online rule (dealing with Spoof E-mail attack) | Introduction | Part 1#3

Post Views: 11,970 In the current article, I would have to provide you a useful way, for implementing a mail security policy that relates to an event in which the result of the SPF sender verification check is “Fail.” If we want to be more precise, an event in which the SPF sender verification test…

Read more

Configure Outlook connect your Gmail mailbox automatically (look mama no hands!) | Part 2#3

Post Views: 5,570 In the current article, I’m going to reveal a secret that is going to affect humankind permanently – How to configure Outlook to connect Gmail mailbox automatically, without the need for manual settings. If we want to use the most scientific definition – look, mama, no hands! Maybe I’m exaggerating a bit,…

Read more

Manage Send As Permissions using PowerShell – Office 365

Post Views: 33,285 The current article dedicated to the subject of performing a management task that relates to the Send As permission using PowerShell. The Send As permission enables recipient X to send an E-mail message using the identity of a recipient Y. Technically speaking, this method can describe as “impersonation.” In Office 365 based…

Read more

Office 365 Cutover mail migration – Exchange on-Premises pre requirements

Post Views: 11,025 The most common cause for a scenario, in which we fail to start the process of Office 365 cutover mail migration is – the lack of the Exchange on-Premises pre requirements. The primary goals of the current article are: Provide the checklist of Exchange on-Premises pre-requirements Explain in details the reasons for…

Read more

Dealing with a Spoof mail attacks and Phishing mail attacks | A little story with a sad end | Part 1#9

Post Views: 2,962 In the current article, I would like to review the chain of events that occurs every time, again and again, in a scenario in which an attacker manages to execute a Phishing mail attack successfully. The reaction of the involved persons is known in advance, and the sad end of the story…

Read more

What are the possible damages of Phishing and spoofing mail attacks? | Part 2#9

Post Views: 4,302 We are living in a dangerous world that produces many types of threats and risks to our organizational mail infrastructure, to our users and us. In the current article, I would like to review some of the possible damages that we can experience in a scenario, in which Spoof or Phishing mail…

Read more

Why our mail system is exposed to Spoof and Phishing mail attacks |Part 5#9

Post Views: 2,572 Let’s start with a declaration about a strange phenomenon: Spoof mail attacks and Phishing mail attacks, are well-known attacks, and consider as a popular attack among the “hostile elements.” Most of the existing organizations, do not have effective defense mechanisms against the above attacks, and there is a high chance, at some…

Read more

Dealing with the threat of Spoof and Phishing mail attacks |Part 6#9

Post Views: 3,104 In the following article, we will review the solution and the methods that we can use for dealing with the threat of – Phishing mail attacks and his derivative Spoof mail attack. What are the Ingredients that needed for successfully dealing with the threat of attacks and Phishing and spoofing mail attacks?…

Read more

The questions that we will need to answer before we start the project of – building a defense system that will protect us from Spoof mail attacks | Part 7#9

Post Views: 2,130 The planning stage of the “defense system” that protects our mail infrastructure, and our users from Spoof mail attack, need to begin with a definition of some framework. This framework will serve as a “logical container,” that defines the particular structure and the characters of our defense system, that will need to…

Read more

Using sender verification for identifying Spoof mail | SPF, DKIM, DMARC, Exchange and Exchange Online |Part 8#9

Post Views: 5,730 Spoof mail attack is implemented by a hostile element the try to spoof sender identity. The way for dealing with a Spoof mail attack is, by applying a procedure, which check and verify the sender identity (check if the sender considers as a legitimate sender of a spoofed sender). Using SPF, DKIM…

Read more

How does sender verification work? (How we identify Spoof mail) | The five hero’s SPF, DKIM DMARC, Exchange and Exchange Online protection | Part 9#9

Post Views: 6,133 The process of “sender verification”, enables us to distinguish between a legitimate sender versus an attacker who spoofs his identity and prevent a possible Spoof mail attack. In the current article, we will review in details three sender verification standard – SPF, DKIM, DMARC and also two sender verification methods that can…

Read more

How to simulate Spoof E-mail attack and bypass SPF sender verification? | 2#2

Post Views: 17,520 In the current article, we will demonstrate how to simulate Spoof E-mail attack, that will bypass existing SPF sender verification implementation. The current article series include two articles. The former article is – How can hostile element execute Spoof E-mail attack and bypass existing SPF implementation? | introduction | 1#2 Disclaimer For…

Read more

How can hostile element execute Spoof E-mail attack and bypass existing SPF implementation? | introduction | 1#2

Post Views: 4,501 In the current article series, we will learn about a structured vulnerability of the SPF mail standard, which can be easily exploited by a hostile element. The hostile element that is aware of this SPF vulnerability, can bypass the existing “SPF wall” that was built for protecting our organization recipients from Spoofing…

Read more

How to enable outbound DKIM signing for your domain in Office 365 | Part 5#10

Post Views: 30,335 In the current article, we will review the process of – How to enable outbound DKIM signing in Office 365 for our public domain name. In Office 365 based environment, the process of signing outgoing E-mail using DKIM signature happens automatically for each of the Office 365 tenant domain names. I emphasize…

Read more

Outbound DKIM signing and DNS infrastructure | Building the required DNS records for Office 365 | Part 4#10

Post Views: 5,328 In a scenario in which we want to use outbound DKIM signing for our public domain name in Office 365 based environment, we will need to generate 4 DNS records that will be used for the required two CNAME records. Regarding the task of the required DKIM DNS records, the primary challenge…

Read more

DKIM as standard that based upon the Public key infrastructure | Part 2#10

Post Views: 3,546 DKIM is implemented by using Digital signature. The “Digital signature” method is one of the main building blocks of the Public key infrastructure. In the current article, I want to show you a fraction of an Interesting and wonderful world of Public key infrastructure and, the way that the DKIM uses this…

Read more

DKIM – Domain Keys Identified Mail | Basic introduction | Part 1#10

Post Views: 5,206 DKIM (Domain Keys Identified Mail) is a mail security standard that enables the sender to declare about his “identity” and allows the mail destination infrastructure, meaning the receiving mail server, to verify the identity of the originator. The central paradox regarding a security standard is that most of the time, we don’t…

Read more

Report spoof E-mail and send E-mail for Inspection In Office 365|Part 12#12

Post Views: 3,234 In the current article, we will review two subjects that relate to a scenario in which organization experiences a Spoof E-mail attack: Report the Spoof E-mail as “Phishing mail”. Sent the Spoof E-mail for further analysis. Report Spoof E-mail as “Phishing mail” I try to get additional information regarding the subject of…

Read more

How to Simulate E-mail Spoof Attack |Part 11#12

Post Views: 12,438 In the current article, we will demonstrate three options for accomplishing the task of simulating E-mail spoof attack. Our primary goal is performing a test, in which verify if the Exchange Online Spoof E-mail rule that we have created is manage to identify an event of Spoof E-mail and respond accordingly. Disclaimer…

Read more

How to simulate E-mail Spoof Attack |Part 10#12

Post Views: 3,825 When we hear the term “spoof E-mail attack,” the initial association that appears to our mind is – a hacker sitting in a dark room, filled with flashing lights, which quickly tap the keyboard commands and strange markings! Sound romantic? Well, in reality, the ability to perform or simulate E-mail spoof attack…

Read more

Analyzing the results of the Exchange spoof E-mail rule |Part 9#12

Post Views: 3,535 In the current article, we will review the options that are available for analyzing the result of the Exchange Online Spoof E-mail rule that we have created. The term “analyze” relate to our ability to answer fundamental questions such as: How many times the Exchange Online rule that we have created was…

Read more

Detect spoof E-mail and send the spoof E-mail to — USER quarantine using Exchange Online rule |Part 8#12

Post Views: 3,206 In the current article, we will review how to deal with Spoof E-mail scenario in an Office 365 environment, by creating an Exchange Online rule that will identify Spoofed E-mail (spoof sender) and as a response – “route” this E-mail to the Exchange Online user quarantine. In our scenario, we don’t want…

Read more

Detect spoof E-mail and send the spoof E-mail to Administrative Quarantine using Exchange Online rule |Part 7#12

Post Views: 2,616 In the current article, we will review how to deal with Spoof E-mail scenario in an Office 365 environment, by creating an Exchange Online rule that will identify Spoofed E-mail (spoof sender) and as a response – “route” this E-mail to the Exchange Online administrative quarantine. In our particular scenario, we don’t…

Read more

Detect spoof E-mail and add disclaimer using Exchange Online rule |Part 6#12

Post Views: 6,208 In the current article, we will review how to deal with Spoof mail by creating an Exchange rule that will identify incoming Spoof E-mail (spoofed sender). In such scenario, we would like to implement the following sequence of actions: Add a disclaimer to the E-mail message. Prepend the E-mail subject. Generate +…

Read more

Detect spoof E-mail and delete the spoof E-mail using Exchange Online rule | Part 5#12

Post Views: 3,090 In the current article, we will review how to deal with Spoof mail by creating an Exchange rule that will identify incoming Spoof E-mail (spoofed sender). In such scenario, we would like to implement the following sequence of actions: Delete (reject) the E-mail . Generate + send an incident report to a…

Read more

Detect spoof E-mail and mark the E-mail as spam using Exchange Online rule | Part 4#12

Post Views: 3,619 In the current article, we will review how to deal with Spoof mail by creating an Exchange rule that will identify incoming Spoof E-mail (spoofed sender). In such scenario, we would like to implement the following sequence of actions: Mark the E-mail as spam by setting the SCL (spam confidence level) value…

Read more

Configuring exceptions for the Exchange Online Spoof E-mail rule | Part 3#12

Post Views: 3,219 In this article, we will review the subject of – “how to create an Exchange Online rule exception. As the name implies, the “exceptions” part of the Exchange rule was created to prevent the execution of the Exchange Online rule in a specific scenario. In the current article, we will continue to…

Read more

Detect spoof E-mail and send an incident report using Exchange Online rule (Learning mode) |Part 2#12

Post Views: 4,327 In the current article, we will review how to deal with Spoof E-mail scenario in an Office 365 environment, by creating an Exchange Online rule that will identify Spoofed E-mail (spoof sender) and as a response, will generate and send an incident report to a designated recipient. In our scenario, we want…

Read more

Dealing with an E-mail Spoof Attack in Office 365 based environment | Introduction | Part 1#12

Post Views: 7,872 An organization IT manager call to Office 365 supports, worried and upset, declaring that he is very disappointed about the fact that “Office 365” allow the occurrence of a spoofed E-mail attack! Besides of the urgent need for understanding, how could this happened; the additional urgent need is – to implement some…

Read more

Configure Exchange Online to forward E-mail to a FAX service |Part 2#2

Post Views: 3,360 The current article is the continuation of the former article in which we review that subject of the required settings that need to be configured for implementing a scenario in which Exchange Online to forward E-mail to on-Premises FAX. The demonstration will include two phases. Creating the required Exchange Online send (outbound)…

Read more

Manage E-mail attachment policy in Office 365 – part 4#4

Post Views: 4,368 In the current article, we will review how to enforce an E-mail attachment policy by using Exchange Online transport rule.The examples that we will review in the current article are as follows: E-mail attachment policy that stops E-mail messages, that include a password-protected attachment. Each E-mail message that has this type of…

Read more

Manage E-mail attachment policy in Office 365 – part 1#4

Post Views: 14,704 The subject of E-mail Message attachment manifests itself in two main scenarios: Malware scenario – a scenario that relates to an event, in which hostile element attached some malware to an E-mail message, send the E-mail message to one of our organization recipients, the recipient opens the E-mail message and “excite” the…

Read more

Configuring Catch all Mailbox in Office 365 | Part 1#2

Post Views: 18,968 The request for “catch all mailbox” feature is very popular among Office 365 customer’s.The term “catch all mailbox“, define a concept of mail services, in which a dedicated mailbox is designated as a special mailbox that will “accept” all the E-mail messages that was sent to “non-existing organization recipients”. The “business need”…

Read more

Exchange Force TLS | Troubleshooting and verifying secure mail flow |Part 12#12

Post Views: 7,226 In the current article, we will review three subjects that relate to mailing flow scenario that based on TLS communication. Verify mail server TLS configuration In a scenario in which we create all the required TLS configurations, but for some reason, the mail communication failed. We need to be able to understand…

Read more

Implementing Force TLS by using Transport rule & Conditional Mail Routing | Exchange online | Part 11#12

Post Views: 4,693 In the current article, we will review the option implementing the option of Force TLS using Exchange Transport rule & Conditional Mail Routing. The option of Conditional Mail Routing implemented by combining two different Exchange Online components: Exchange Online transport Exchange Online mail connector Versus the former implementation of Force TLS by…

Read more

Implementing Force TLS by using Transport rule | Exchange online | Part 10#12

Post Views: 4,612 In the current article and the next article, we will review a very interesting feature that exists in Exchange Online server and Exchange 2013 on-Premises, which enable us to “activate” the option of Force TLS option using an Exchange Online Transport rule The use of Transport rule for implementing the option of…

Read more

Configure Force TLS on Exchange on-Premises environment | Settings of Receive connector | Part 9#12

Post Views: 5,847 In the current article, we will review the required configuration settings for implementing Force TLS in Exchange on-Premises based environment. In our specific scenario, we need to configure the Force TLS option for the “incoming mail flow”. The meaning is – mail that sent from external mail server to the Exchange on-Premises…

Read more

Configure Force TLS on Exchange on-Premises environment |Settings of Send connector | Part 8#12

Post Views: 13,710 In the current article, we will review the required configuration settings for implementing Force TLS in Exchange on-Premises based environment. In our specific scenario, we need to configure the Force TLS option for the “outgoing mail flow“. The meaning is – mail that is sent by the Exchange on-Premises server to a…

Read more

Configure Force TLS in Exchange Online environment | Settings of inbound connector | Part 7#12

Post Views: 8,206 In the current article, we will review the required configuration settings for implementing Force TLS in Exchange Online based environment. In our specific scenario, we need to configure the Force TLS option for the “incoming mail flow”. The meaning is – mail that sent from external mail server to the Exchange Online…

Read more

Configure Force TLS in Exchange Online environment | Settings of outbound connector | Part 6#12

Post Views: 4,542 In the current article, we will review the required configuration settings for implementing Force TLS in Exchange Online based environment. In our specific scenario, we need to configure the Force TLS option for the “outgoing mail flow”. The meaning is – mail that is sent by the Exchange Online server to a…

Read more

Force TLS | Exchange Online environment versus Exchange on-Premises environment | Part 5#12

Post Views: 3,232 In the current article, is consists of two parts: The part in which we provide a high-level review of the differences that exists between the Exchange on-Premises based environment versus the Exchange Online based environment regarding mail connectors and TLS settings. The reason for examining these differences is, that there are much…

Read more

Configuring the option of Force TLS in Exchange on-Premises environment |Part 4#12

Post Views: 10,507 In the current article, we will review the subject of Force TLS in Exchange on-Premises based environment. In Exchange on-Premises based environment, we can choose to implement the option of Force TLS using two options. 1. Domain Security This option defines a set of mail connectors and configuration settings that serve for…

Read more

Exchange architecture and default opportunistic TLS settings |Part 3#12

Post Views: 6,654 In the following article, we will review in more details that implementation of opportunistic TLS on Exchange on-Premises based environment and also in the Exchange Online-based environment. As mentioned, in the Exchange-based environment, the Exchange mail connectors are automatically configured to use the option of opportunistic TLS. The configuration of opportunistic TLS…

Read more

Opportunistic TLS versus Force TLS in Exchange based environment |Part 2#12

Post Views: 12,537 In the current article, we will review the two “flavor” of TLS in the Exchange-based environment.The two options for implementing TLS are opportunistic TLS and Force TLS. Exchange-based server (Exchange on-Premises and Exchange Online) are configured by default to use the option of opportunistic TLS. The meaning is that given that the…

Read more

Using TLS in Exchange based environment |Introduction |Part 1#12

Post Views: 3,782 The purpose of the current article series is, to review the implementation and the use of the TLS protocol in an Exchange-based environment.We will examine the utilization of the TLS protocol in two Exchange environments: Exchange Online Exchange on-Premises The article series The article series that is dedicated to the subject of…

Read more

Disable clutter for all users using PowerShell

Post Views: 8,472 The Clutter option is a new Exchange Online feature, which was created for helping Office 365 customers (Exchange Online recipient) to effectively manage their mailbox content by “relocate” non-important or non-Crucial E-mail message to a specific folder named Clutter. The Exchange Online Clutter feature is automatically activated for all Exchange Online recipients…

Read more

Connect to Exchange Online using PowerShell

Post Views: 5,468 To be able to create a remote PowerShell session to Exchange Online, we can use the “Windows built PowerShell console”. We will need to use some “first-time” configurations, and then, the rest of the process includes running the required PowerShell command for connecting to Exchange Online. PowerShell console – First-time configuration To…

Read more

Manage Clutter by using PowerShell | Office 365

Post Views: 11,033 Clutter is a new Exchange server feature that created for facilitating better and more efficient mailbox management by Exchange users. The Clutter feature is implemented by analyzing the Exchange mailbox data and based on a “learning process” and other algorithmic decide which of the mail items is “less important.” The Clutter mechanism…

Read more

Office 365 Import Service – Import PST into Office 365 user mailbox | Part 1#2

Post Views: 20,422 This current article is the first article in a series of two articles, which describe the process of importing PST files to Office 365 (or if we want to be more accurate Exchange Online mailboxes) by using the AzCopy command line utility. Article series The current article provides a high-level review description…

Read more

Office 365 Import Service – Import PST into Office 365 user mailbox | Part 2#2

Post Views: 8,900 This current article is the second article in a series of two articles. In the former article, we review in high level the components and the concepts that involved throughout the process of importing PST files to Exchange Online mailboxes. The current article, serve as a step by step guide which includes…

Read more

Stage migration, Exchange and Autodiscover infrastructure | Part 1#2 | Part 35#36

Post Views: 4,673 In the current article, we will review the subject of Exchange stage migration and the issue of configuring new Outlook mail profile for users whom their mailbox migrated to the cloud. The current article deals with the “theoretical part”, in which we will review the special characters of Exchange stage migration and,…

Read more

Connecting users to their Exchange Online mailbox – Stage migration – solving the mystery | Part 2#2 | Part 36#36

Post Views: 4,671 The current article is the second article in which we review the subject of the challenges and optional solution for the task of creating a new Outlook mail profile for the users whom their mailbox was migrated to Exchange Online using an Exchange stage migration. Exchange Stage migration and Autodiscover infrastructure |…

Read more

Autodiscover flow in an Exchange Hybrid environment | Part 3#3 | Part 34#36

Post Views: 9,982 The current article, is the continuation of the previous article , in which we will continue to review in details the Autodiscover journey in Exchange Hybrid based environment Autodiscover flow in an Exchange Hybrid environment | The article series The current article is the last article in a series of three articles.…

Read more

Autodiscover flow in an Exchange Hybrid environment | Part 2#3 | Part 33#36

Post Views: 6,633 The current article and the next article, will be dedicated for detailed review of the Autodiscover flow, that is implemented in Exchange Hybrid environment, by using the Microsoft web-based tool, the Microsoft Remote Connectivity Analyzer (ExRCA). Autodiscover flow in an Exchange Hybrid environment | The article series The current article is the…

Read more

Autodiscover flow in an Exchange Hybrid environment | Part 1#3 | Part 32#36

Post Views: 27,645 The Autodiscover flow in an Exchange Hybrid based environment can be considered the most complex flow because the Autodiscover “journey” implemented in two different environments. Regarding users whom their mailbox migrated to the “cloud” (Exchange Online), the Autodiscover journey will start by the Autodiscover client by addressing the Exchange on-Premises infrastructure. Autodiscover…

Read more

Autodiscover flow in an Office 365 environment | Part 3#3 | Part 31#36

Post Views: 6,205 The current article is the continuation of the previous article, in which we review the Autodiscover flow that implemented in an Office 365 based environment, by using the Microsoft web-based tool, the Microsoft Remote Connectivity Analyzer (ExRCA). Autodiscover flow in an Office 365 environment | The article series The current article is…

Read more

Autodiscover flow in an Office 365 environment | Part 2#3 | Part 30#36

Post Views: 12,104 The current article and the next article will be dedicated to detailed review of the Autodiscover flow; that implemented in an Office 365 based environment by using the Microsoft web-based tool, the Microsoft Remote Connectivity Analyzer (ExRCA). The Autodiscover in Office 365 environment includes many steps. I have tried to separate each…

Read more

Autodiscover flow in an Exchange on-Premises environment | non-Active Directory environment| Part 3#3 | Part 28#36

Post Views: 4,583 The current article is the continuation of the previous article, in which we review the Autodiscover flow that implemented in Autodiscover flow in a non-Active Directory environment. In this article, we will inspect the Autodiscover flow by using the Microsoft web-based tool, the Microsoft Remote Connectivity Analyzer (ExRCA). Autodiscover flow in non-Active…

Read more

Autodiscover flow in an Office 365 environment | Part 1#3 | Part 29#36

Post Views: 19,501 The Autodiscover flow in an Office 365 based environment can be considered as a fascinating process because the way that Autodiscover client locates their Autodiscover Endpoint, includes many twists and turns. Autodiscover flow in an Office 365 environment | The article series The current article is the first article on a series…

Read more

Autodiscover flow in an Exchange on-Premises environment | non-Active Directory environment| Part 2#3 | Part 27#36

Post Views: 5,861 The current article, we review the Autodiscover algorithm that Autodiscover client uses in a “non-Active Directory environment.” The Autodiscover Toolbox offers a verity of methods which the Autodiscover client can use when he tries to locate his Autodiscover Endpoint. Autodiscover flow in non-Active Directory environment| Article Series The Autodiscover flow in non-Active…

Read more

Autodiscover flow in an Exchange on-Premises environment | non-Active Directory environment| Part 1#3 | Part 26#36

Post Views: 5,799 Autodiscover client uses a different Autodiscover method for locating the Autodiscover Endpoint in an On-Premise Active Directory based environment versus a non-Active Directory environment. The Autodiscover client verifies if he is located in an Active Directory environment or not. If he decides that he located in a non-Active Directory environment, the Autodiscover…

Read more

Seven major Autodiscover flow scenarios | Part 25#36

Post Views: 3,702 In the following article, we will review seven major common Autodiscover flow in a different environment. The review is a high-level review and not a detailed examination that deals with each of the specific steps and process that are involved. The purpose – in the continuation of the current series of articles,…

Read more

Microsoft Connectivity Analyzer (MCA) | Autodiscover troubleshooting tools | Part 3#4 | Part 23#36

Post Views: 8,118 The Microsoft Connectivity Analyzer (MCA) tool is the “installable client” or the “software client” version of the ExRCA (Microsoft Remote Connectivity Analyzer Tool) Autodiscover test. The primary purpose of using the Microsoft Connectivity Analyzer (MCA) tool versus the Microsoft Remote Connectivity Analyzer web Tool is the ability to test the Autodiscover process…

Read more

Using Fiddler for Autodiscover troubleshooting scenarios | Part 4#4 | Part 24#36

Post Views: 11,592 The current article is the last article in the Autodiscover troubleshooting tools article series. In this article, we will review a fascinating tool named – Fiddler, that can help us in our task of capturing and analyzing Autodiscover data that passed between the Autodiscover client and the Autodiscover Endpoint throughout the Autodiscover…

Read more

Microsoft Remote Connectivity Analyzer (ExRCA) | Autodiscover troubleshooting tools | Part 2#4 | Part 22#36

Post Views: 16,053 In the current article, we will learn to know the ExRCA also known as Microsoft Connectivity Analyzer web-based tool, that serves as the name implies for testing and analyzing information that is related to “relationships” of different Exchange clients with their Exchange server. Autodiscover Troubleshooting tools | The article series The article…

Read more

Outlook Test E-mail AutoConfiguration | Autodiscover troubleshooting tools | Part 1#4 | Part 21#36

Post Views: 33,207 In the current article, we will review one of the most useful and “strongest” Autodiscover troubleshooting tools, Outlook client built-in tool named: Test E-mail AutoConfiguration. Autodiscover Troubleshooting tools | The article series The article series include the following articles: Outlook Test E-mail AutoConfiguration | Autodiscover troubleshooting tools | Part 1#4 | Part…

Read more

Autodiscover process and Exchange security infrastructure | Part 20#36

Post Views: 3,775 The article is all about the subject of the security mechanism that is implemented as part of the Autodiscover process. Autodiscover and security Autodiscover mechanism includes three major parts: Locating the Autodiscover Endpoint Getting the Autodiscover information \data Using the Autodiscover information In the current article, we relate to the “middle part”…

Read more

Exchange infrastructure | Implementing single domain namespace scheme | Part 2#2 | Part 18#36

Post Views: 3,442 The current article is the second article in which we review the concept of Exchange infrastructure and the use of a single namespace. In the former article, we review the concept and the reason for the recommendation of using an Exchange single namespace. The present article focused on a scenario in which…

Read more

Public SAN certificate | Deprecated support in the internal server name | Part 19#36

Post Views: 5,521 In the current article, we will review the subject of – “Invalid Fully Qualified Domain Names” in SAN certificate. The interesting thing is that hostname (2014), there is not too much public information about this subject, but although this topic seems to be minor and not “cool”, the Implications of this new…

Read more

Autodiscover scenarios in enterprise environment | Part 16#36

Post Views: 3,258 Exchange on-Premises infrastructure was designed to serve the need of a small company and at the same time, meet the needs of an enterprise business that needs to provide mail services to thousands or even tens of thousands of users. The main characters of enterprise environment are: The use of multiple Exchange…

Read more

Should I use a single namespace for Exchange Infrastructure? | Part 1#2 | Part 17#36

Post Views: 4,179 The current article is dedicated to the Interesting and not so clear subject of – Exchange Infrastructure namespace. Exchange server architecture, enable us to use a different interface with internal Exchange clients versus external Exchange clients that based on various namespace. The major question that I will try to answer in this…

Read more

Outlook Autodiscover decision process | Choosing the right Autodiscover method | Part 14#36

Post Views: 13,966 Outlook client entirely depends on the Autodiscover service as an infrastructure for his relationship with the Exchange server. This dependence relates to the initial phase in which Outlook needs to get the required information for creating a new mail profile and later the ongoing communication process with the Exchange infrastructure. It all…

Read more

Autodiscover flow in Active Directory based environment | Part 15#36

Post Views: 6,036 In the following article, we look “under the hood” of the Autodiscover method that implemented in Active Directory-based environment. In the Active Directory-based environment, the process in which the Autodiscover client such as Outlook locates available Autodiscover Endpoint performed by addressing the Active Directory as a source of information for available Autodiscover…

Read more

Exchange clients and their Public facing Exchange server | Part 13#36

Post Views: 4,938 The current article will be dedicated to the subject of Exchange clients that access Exchange services from a public network. The focus is on the “public Exchange clients” because, the characters of the communication channel between the Exchange server and his Exchange client in a public environment, have a different character from…

Read more

Outlook client protocol connectivity flow in an internal network environment | Part 12#36

Post Views: 4,056 In the current article, we will review the basic concepts of the Autodiscover flow, which is implemented by internal Outlook clients. The term “internal”, relate to a private network environment that has On-Premise Active Directory. Getting Autodiscover information The first part of the Autodiscover process implemented by the phase in which the…

Read more

Exchange Web services | Manage the Internal and external URL address | Part 10#36

Post Views: 15,225 The current article should provide us a small glimpse to the subject of managing the internal and the external Exchange URL address of the different services. We will review a couple of examples to the interfaces the available to us for managing the variety of Exchange services – the graphical interface and…

Read more

The content of the Autodiscover server response | Part 11#36

Post Views: 7,665 In the current article, we will review the subject of the Autodiscover response content. The term – “Autodiscover response” relates to the Autodiscover information that the Exchange CAS server provides to his Autodiscover client.In this article, we will refer to the Exchange Server Autodiscover response content from the perspective of the three…

Read more

The basics of Domain name, FQDN and URL address | Exchange infrastructure |Part 09#36

Post Views: 12,777 The communication channel that between Exchange client and Exchange server is based on a simple concept, in which Exchange client address the Exchange server by using the Exchange host name or, if we want to be more accurate – the Exchange server FQDN. The variety of the services that are offered by…

Read more

The dual identity of the Exchange server | Part 08#36

Post Views: 3,426 One of the most confusing and unclear subjects in the Exchange architecture is what I describe as – “the dual identity of the Exchange server”. I use the term “dual identity” because the Exchange server relates in a different way to Exchange client that located on the internal \Private network versus the…

Read more

Exchange CAS server as information + Web service provider | Part 07#36

Post Views: 3,289 The current article focused on the two primary responsibilities of the Exchange CAS server: Exchange CAS server as an information provider (Autodiscover information). Exchange CAS server as Exchange web service provider. The current article is the continuation of the previous article –xx. In the former article, we have reviewed the Exchange CAS…

Read more

Exchange CAS server | Providing Exchange clients access to their mailbox | Part 06#36

Post Views: 5,633 In this article, I would like to review the secret romance of Exchange mail clients and “his” Exchange CAS server. Exchange clients have very unusual and exciting relationships with their Exchange CAS server and, the Autodiscover infrastructure is the glow that unified these two lovers. Continue with our romantic metaphor; the truth…

Read more

The Autodiscover algorithm for locating the “source of information” | Part 05#36

Post Views: 3,656 The Autodiscover algorithm that is used by the Autodiscover client for locating his “source of information” (the Exchange CAS server), is based on a very sophisticated algorithm, that was designed to overcome and bypass many types of “obstacles’” and operate in different networking environments. In the current article, we will review the…

Read more

The Autodiscover information | Part 04#36

Post Views: 3,684 Exchange Autodiscover is relating to “information” from three different perspectives: Autodiscover is the tool that Exchange client uses for getting information about the Exchange infrastructure. Autodiscover is the method in which Exchange CAS server provides information to his Exchange clients. Autodiscover is the information itself. In the following article, I would like to…

Read more

Who are the Exchange Autodiscover clients? | Part 03#36

Post Views: 3,386 Throughout the current article series, the term “Autodiscover client\s” will be mentioned dozens or even hundreds of times. The obvious question could be – who or what are these “Autodiscover clients”? Autodiscover Client\server model versus server to server model Technically speaking, every Exchange client or another client that “know” how to locate…

Read more

The old Exchange environment versus “modern” Exchange environment | Part 02#36

Post Views: 4,211 In this article, we will review how does the Autodiscover answer the needs and the requirements of the modern Exchange environment. To be able to understand the immense significance of the Exchange Autodiscover infrastructure, we will take a look at the older or previous version of Exchange architecture that did not have…

Read more

Exchange Autodiscover infrastructure – Introduction | Part 01#36

Post Views: 4,728 Autodiscover is one of the most important and essential components of the Microsoft Exchange server architecture but at the same time, one of the most “unknown” and “misunderstood” terms. My primary goal is to “open a door” into the fascinating and exciting Exchange Autodiscover architecture. When I decided that I want to…

Read more

Exchange Autodiscover – Article series – INDEX | Part 00#36

Post Views: 4,342 Exchange Autodiscover – Article series – INDEX Exchange Autodiscover – Article series – INDEX | Part 00#36 Exchange Autodiscover – Article series – INDEX   Exchange and Autodiscover infrastructure | The building blocks Exchange Autodiscover infrastructure – Introduction | Part 01#36 First impressions and introduction to the term “Autodiscover”, as a part…

Read more

Office 365 welcome kit – Links and Resources

Post Views: 3,319 The following page includes links and information that could serve as a “welcome kit” to Office 365 infrastructure or as “my first steps in Office 365 world”. Legend for Link and Resources table Articles Links table Video link table PowerShell Scripts link table Tools Link table Information about Office 365 infrastructure Video…

Read more

SMTP Relay in Office 365 environment | Troubleshooting scenarios |Part 4#4

Post Views: 31,470 The current article is dedicated the subject on – troubleshooting possible problems when using an SMTP mail relay server for sending mail to the Office 365 mail infrastructure. Send mail to Exchange Online – Article Series Send mail to Exchange Online | Part 1#4 Send mail to Exchange Online using standard SMTP…

Read more

Cannot create a new Outlook mail profile – using the Office 365 Support and Recovery Assistant

Post Views: 5,389 One of the most common troubleshooting scenarios in Office 365 and the Exchange Online environment described as – cannot create a new Outlook mail profile. Technically speaking, there are pre-requirements and best practices that need to be implemented before we try to configure a new Outlook mail profile for Office 365 users.…

Read more

Using Exchange In-place eDiscovery & Hold for recovering deleted mail items | 6#7

Post Views: 12,270 In the current article, we will review how to use the Exchange In-place eDiscovery & Hold feature as a tool for searching and recovering deleted mail items. We will review the following subjects: How to create an Exchange In-place eDiscovery & Hold query. How to send a copy of the search results…

Read more

Exchange In-Place eDiscovery & Hold | Introduction | 5#7

Post Views: 6,226 The Exchange In-Place Hold & eDiscovery is a very powerful tool that can help us to accomplish three main tasks. Search for information (mail items) in single or multiple mailboxes. Put specific information on “hold” (enable to save the information for an unlimited time period). Recover deleted mail items. In this article,…

Read more

Recover deleted mail items in the Exchange Online environment | Deleted mail flow | 3#7

Post Views: 14,777 In the current article, we will review the following subjects: The flow of a “deleted mail item” in an Exchange base environment for a standard mailbox and for Litigation Hold or In-Place Hold enabled mailbox. The subject of Deleted Item retention policy, the Exchange server policy that removes deleted mail items after…

Read more

Recover deleted mail items in the Exchange Online environment | Single item recovery | 2#7

Post Views: 5,420 In the current article, we will review the subject of Exchange single item recovery mechanism and his physical implementation – the Recoverable Items folder. The purpose of these “Exchange components” is to provide an easy and efficient way to solve the requirement of – recovering mail in Exchange base environment. The concept…

Read more

Recover deleted mail items in the Exchange Online environment | introduction | 1#7

Post Views: 6,843 The current article is a basic introduction to the subject of – recovering mail items in the Exchange Online based environment. We will review a couple of common misconceptions that relate to the scenario in which users report that his E-mail deleted. The need to verify if the scenario is indeed a…

Read more

Recovering deleted mail items using PowerShell cmdlets Search-Mailbox | 7#7

Post Views: 18,581 In the current article, we will review the use of the PowerShell cmdlets Search-Mailbox that we can use for searching and recovering specific mail items. The PowerShell cmdlets Search-Mailbox is the “older sister” of the newer PowerShell cmdlets New-MailboxSearch. Booth of this PowerShell cmdlets was designed for providing the Exchange administrator the…

Read more

De-list your organization from a Blacklist | My E-mail appears as spam | Part 16#17

Post Views: 5,484 In the following article, we review the charters of a scenario in which your organization appears as blacklisted. For the avoidance of doubt – the purpose of this article is not to provide a detailed instruction and links to the procedure of de-listing your organization from a particular blacklist. The purpose of…

Read more

My E-mail appears as spam | Troubleshooting – Mail server | Part 14#17

Post Views: 2,716 In the current article and the next article: My E-mail appears as spam | Troubleshooting – Mail server | Part 15#17, we will review the troubleshooting process of the scenario – “our mail server appears as blacklisted” in Office 365 and Exchange Online environment Another variation of this scenario could be –…

Read more

My E-mail appears as spam | Troubleshooting – Domain name and E-mail content | Part 12#17

Post Views: 2,872 The current articles and the next three articles dedicated troubleshooting process of the scenario, in which our organization E-mail appears as a spam mail (internal \ outbound spam). The current article devoted to the most essential and efficient troubleshooting steps in which we verify the following parts: Verify if our domain name…

Read more

My E-mail appears as spam – Troubleshooting path | Part 11#17

Post Views: 2,863 The current articles and the next three following articles dedicated to the subject of a troubleshooting scenario of internal \ outbound spam in Office 365 and Exchange Online environment. In the current article is the focus is on: “drowning” the path of the troubleshooting processes flow. The troubleshooting flow includes steps such…

Read more

High Risk Delivery Pool and Exchange Online | Part 10#17

Post Views: 4,074 The current article is the continuation of the previous article: High Risk Delivery Pool and Exchange Online | Part 9#17 In this article we will focus on the following subjects: How does Exchange Online “decide” to classify particular E-mail as spam\junk mail? Description of the internal spam E-mail message flow Who is…

Read more

High Risk Delivery Pool and Exchange Online | Part 9#17

Post Views: 4,931 The term: “High Risk Delivery Pool”, describes a “dedicated Exchange Online server’s pool” which is responsible for “handling” mail that posted by Office 365 recipients, which recognized as “problematic mail.” The current article and the next article – High Risk Delivery Pool and Exchange Online | Part 10#17 ,are dedicated to the…

Read more

Commercial E-mail – Using the right tools | Office 365 | Part 4#17

Post Views: 4,287 The current article dedicated to the subject of – ”Commercial E-mail”. At first glance, there is no clear relationship between the subject of internal \ outbound spam and commercial E-mail but my arguments are: Most of the time, the main reason for the phenomenon of internal \ outbound spam is related to…

Read more

My E-mail appears as a spam – Introduction | Office 365 | Part 1#17

Post Views: 3,113 This article series dedicated to the scenario in which our organization’s user\s, turn to us urgently to solve a critical issue, which described by our users as: “My E-mail appears as spam!” Besides of the uncomfortable feeling in which somebody else treats our E-mail as – “spam \ junk mail”, the issue…

Read more

The Exchange 2013 coexistence article series index page | 0#23

Post Views: 2,264 This is the index page that will enable you to find your way around the maze of the Exchange 2013 coexistence article series. Exchange 2013 coexistence environment and client protocol connectivity flow | The prefix Part 01#23 An introduction to the subject of Exchange 2013 coexistence environment beginning with reviewing basic terms…

Read more

OWA client protocol connectivity flow in Exchange 2013/2010 coexistence | 3/4 | 22#23

Post Views: 6,949 The current article is the third article of four articles series, on the subject of: “Exchange 2013/2010 coexistence environment and mail client protocol connectivity flow”. In this article, we will review the client protocol connectivity flow of: OWA Exchange 2010 clients in an Exchange 2013/2010 coexistence environment. To be able to understand…

Read more

Autodiscover and Outlook client protocol connectivity flow in Exchange 2013/2010 coexistence | 2/4 | 21#23

Post Views: 4,894 The current article is the second article in a series of three articles, which will dedicate to a detailed review of the client protocol connectivity flow in Exchange 2013/2010 coexistence environment. The current article deals with the following type of client protocol connectivity flow in Exchange 2013/2010 coexistence environment: Autodiscover client protocol…

Read more

Client protocol connectivity flow in Exchange 2013/2010 coexistence | Introduction and basic concepts| 1/4 | 20#23

Post Views: 3,517 The current article, is the first article in a series of four articles, which will dedicate to a detailed review of the client protocol connectivity flow in Exchange 2013/2010 coexistence environment. So… get ready to dive into the wonderful world of Exchange 2013 and Exchange 2010 coexistence! To be able to understand…

Read more

OWA client protocol connectivity flow in Exchange 2013/2007 coexistence | 3/4 |18#23

Post Views: 4,485 The current article is the third article of four articles series, on the subject of – “Exchange 2013/2007 coexistence environment and mail client protocol connectivity flow”. In this article, we will review the client protocol connectivity flow of: OWA Exchange 2007 clients in an Exchange 2013/2007 coexistence environment.   To be able…

Read more

ActiveSync and Exchange web service client protocol connectivity flow in Exchange 2013/2007 coexistence | 4/4 | 19#23

Post Views: 15,580 The current article, is the fourth article of four articles series, on the subject of: “Exchange 2013/2007 coexistence environment and mail client protocol connectivity flow”. In this article, our primary focus is reviewing two types of client protocol connectivity flow in Exchange 2013/2007 coexistence environment: ActiveSync client protocol connectivity flow Exchange web…

Read more

Autodiscover and Outlook client protocol connectivity flow in Exchange 2013/2007 coexistence | 2/4 | 17#23

Post Views: 3,212 The current article, is the second article of four articles series, on the subject of – “Exchange 2013/2007 coexistence environment and mail client protocol connectivity flow”. In this article, we will review the client protocol connectivity flow of: Autodiscover Exchange 2007 clients and Outlook Exchange 2007 clients in an Exchange 2013/2007 coexistence…

Read more

Client protocol connectivity flow in Exchange 2013/2007 coexistence | Introduction and basic concepts| 1/4 | 16#23

Post Views: 2,896 The current article is the first article in a series of four articles, which will dedicate to a detailed review of the client protocol connectivity flow in Exchange 2013/2007 coexistence environment. So… get ready to dive into the wonderful world of Exchange 2013 and Exchange 2007 coexistence! To be able to understand…

Read more

Manage legacy Exchange URL address using a PowerShell script | 15#23

Post Views: 5,034 The current article dedicated to the presentation of a little PowerShell script that I have written that was created to simplify the task of the “preparation” of existing Exchange infrastructure to the Exchange 2013 coexistence environment. The PowerShell script includes options that will help us to configure Exchange CAS server URL address,…

Read more

Exchange 2013 coexistence and Outlook infrastructure | Part 2/2 | 14#23

Post Views: 8,314 In the current article, we will continue to review the subject of the Outlook client protocol connectivity flow in an Exchange 2013 coexistence environment. In this article, we will have a closer look at the specific charters, which build the Outlook and the Exchange relationship in this environment. The parts which we…

Read more

Basic concepts of Outlook connectivity in Exchange 2013 coexistence | Part 1/2 |13#23

Post Views: 11,784 Before we dive into the subject of “Outlook client protocol connectivity flow in an Exchange 2013 coexistence environment, it’s important to understand some of the basic concepts of Outlook connectivity and only then, understand the requirements and the individual charters of Outlook connectivity in an Exchange 2013 coexistence environment. The infrastructure of…

Read more

Exchange 2013 coexistence | Autodiscover infrastructure | Part 2/2 | 12#23

Post Views: 4,491 The focus of the current article is the Exchange Autodiscover infrastructure in the internal\private environment. In the current article, we will review the following subjects: General review of the Exchange Autodiscover environment The specific characters of Exchange Autodiscover infrastructure in an Exchange 2013 coexistence environment The reason for implementing the “Autodiscover centralized…

Read more

Exchange 2013 coexistence | Autodiscover infrastructure | Part 1/2 | 11#23

Post Views: 4,089 In the following article, we will review the subject of Autodiscover infrastructure in an Exchange 2013 CAS environment. In a modern Exchange environment, we can say that the Autodiscover services consider the foundation for all the rest of the various Exchange infrastructure.The Exchange Autodiscover architecture can consider as complex and sophisticated, especially…

Read more

The checklist for preparing your Exchange 2010 infrastructure for Exchange 2013 coexistence |10#23

Post Views: 2,894 In the current article focus on the preparation that we will need to implement in the existing Exchange 2010 environment for a project of implementing Exchange 2013/2010 coexistence environment. Generally speaking, the good news is that the Exchange 2013 and Exchange CAS 2010 are “good friends.” Versus the scenario of Exchange 2013/2007…

Read more

The checklist for preparing your Exchange 2007 infrastructure for Exchange 2013 coexistence | 9#23

Post Views: 6,248 In the current article, I would like to review the subject of the required preparation that we will need to implement in the Exchange CAS 2007 environment before or while we are moving to the “new” Exchange 2013 coexistence environment. In this article, we will briefly review the different “parts” that we…

Read more

Exchange 2013 coexistence environment and the Exchange legacy infrastructure | 8#23

Post Views: 3,718 In this article, I would like to focus on the term “legacy” that is used very often in the Exchange 2013 coexistence environment. As usual, the common assumption is that everyone knows and understands this term, but in reality, the term is not so clear, and we are as ashamed to admit…

Read more

Exchange web services in an Exchange 2013 coexistence | Part 2/2 | 7#23

Post Views: 4,049 In the former article – Exchange web services in an Exchange 2013 coexistence environment | Part 1/2, we have already reviewed the concept and the logic of the Exchange web service in Exchange 2013 coexistence environment but in this article, I would like to get a closer look at the client protocol…

Read more

Exchange web services in an Exchange 2013 coexistence | Part 1/2 | 6#23

Post Views: 6,191 The purpose of the current article is to enable us to understand better the concept of Exchange web services in an Exchange 2013 coexistence environment. In the present article, we will review the logic and the characters of the Exchange web service in Exchange 2013 coexistence environment. The article is the first…

Read more

Exchange Public infrastructure | Public versus non-Public facing Exchange site | 5#23

Post Views: 3,248 The current article dedicated to the subject of Exchange public infrastructure. When we relate to the topic of Exchange 2013 coexistence environment and client protocol connectivity flow, one of the most fundamental factors that determine and influence, the “client protocol connectivity flow” is the physical location of the Exchange clients. In simple…

Read more