Migrating Exchange Without Trusts
One of the more common questions we see is "Can we migrate Exchange without any trusts in the environment?"The answer to that is "YES" however there are some hurdles. Here are 3 of them: If you hav...
One of the more common questions we see is "Can we migrate Exchange without any trusts in the environment?"The answer to that is "YES" however there are some hurdles. Here are 3 of them: If you hav...
The challenges associated with securing data in Office 365, whether completely cloud based or a hybrid AD iteration, are numerous, and addressing them requires a solid plan to ensure your risk of a da...
If your organization made the jump to Office 365 and are now completely cloud based or in a hybrid AD environment, you probably spent a lot of time getting your on-premises AD ready for the move. Now ...
Office 365 has more than 60 million active monthly users, and adoption of the platform is increasing—for good reason. It allows organizations to reduce infrastructure and costs related to licensing an...
Whether you are an Email Service Provider or just a company running one of the above solutions there is a product that can easily be setup in a matter of minutes to start your migration to Exchange On...
Both Exchange and Office 365 have the option to provide users with two separate mailboxes. First, there is the normal “User Mailbox”, which is typically used on an everyday basis and is housed on high...
I've been asked many times for a list of events Change Auditor can produce for all modules so I thought it would be a good idea to share the list I have produced in Excel and also explain how you can ...
Step 4: Control and simplify Group Policy management. Using GPOADmin, you can be very granular with who is allowed to do what with a particular Group Policy. Much like Active Roles, GPOAdmin allows yo...
Part two of this blog series may be found here A few days ago, I was working with a MSP customer that had the same issue on multiple Exchange servers hosted by his own customers. Specifically, in that...
By Tim Eichmann, Head of Infrastructure & Cloud Services, Core Technology Systems (UK) Limited Whatever your opinion is on the cloud and how secure it is for data storage, one thing that holds true is...
In my previous post, I touched on how you can identify users in AD with elevated rights. Now we need to determine if they're really necessary. Step 2: Identifying what rights are needed for the job. ...
One of the tools that Active Directory administrators have to help mitigate brute force hacking attempts is the account lockout. Typically configured in a Group Policy, the account lockout policy tall...