Exchange HybridExchange Hybrid Cross site permissionsMail migration Exchange HybridMail migration to Office 365

Migrated permissions of migrated mailboxes in Exchange Hybrid based environment – Introduction | Part 3#5

The subject of the Exchange permission’s relationship between migrated mailboxes in the Exchange Hybrid environment could be quite confusing. The term “Exchange permission’s relationship,” try to describe two (or more) mailboxes that have existing permission’s structure between them. When we migrate these mailboxes from their “native environment” to the “other environment” the central question that…

Details
Exchange HybridExchange Hybrid Cross site permissionsMail migration Exchange HybridMail migration to Office 365

Testing cross site permissions in Exchange Hybrid based environment| Part 2#5

As mentioned in the previous article, the subject of Exchange permissions relationship in Exchange Hybrid environment can be realized in two major scenarios: Scenario 1 – Cross site permission Scenario 1 – Cross site permission The Exchange permissions that Exchange on-Premises mailbox can have on cloud mailbox and vice versa. Scenario 2 – Mailbox migration…

Details
Exchange HybridExchange Hybrid Cross site permissionsMail migration Exchange HybridMail migration to Office 365

Cross site permission and migrated permissions in Exchange Hybrid based environment | Part 1#5

The current article series dedicated to the subject of – the available Exchange permissions in Exchange Hybrid environment. The term “Exchange permissions” is realized in two major scenarios: Scenario 1 – Cross site permissions The term “cross site permissions”, define the available Exchange permissions, that we can assign to Exchange on-Premises mailbox on a cloud…

Details
PowerShell – Office 365PowerShell command reference

Manage Safe Senders and Block Sender Lists using PowerShell – Office 365

The term “Junk Email Filter” defines an Exchange mail security mechanism, that implemented on the “mailbox level.” In Exchange based environment, most of the times, the mail security infrastructure is implemented most of the time in the “server level” (Exchange server). The interesting thing is that also, Exchange enables his recipients, to use an additional…

Details
E-mail SecuritySPF

Implementing SPF Fail policy using Exchange Online rule (dealing with Spoof E-mail attack) | Phase 2 production | part 3#3

The current article is the last article in the article series, in which we review how to implement SPF Fail policy using Exchange Online rule. In the present article, we will discuss how to apply the second phase of our project, in which, when the Exchange rule identifies an event of “SPF = Fail,” the…

Details
E-mail SecuritySPF

Implementing SPF Fail policy using Exchange Online rule (dealing with Spoof E-mail attack) | Phase 1 – learning mode | Part 2#3

In the current article, we will review how to implement an SPF Policy for incoming mail by using an Exchange rule. In our scenario, we want to identify an event, in which hostile element tries to execute a Spoof mail attack by presenting himself, as a legitimate recipient who uses an E-mail address that includes…

Details