Checking security protocols and ciphers on your Exchange servers

Reading Time: 6 minutesMicrosoft states that Exchange 2010 and 2013 are secure out of the box. With this they mean that every traffic coming in and out of Exchange is one way or another encrypted with security protocols. Whether this is web traffic or specific for SMTP. Even IMAP and POP are enabled with mandatory encryption (although the services are disabled by default). However the past few months we've had reports that specific encryption security protocols and ciphers (algorithms used for encryption and decryption)

Read more

IIS Exploit can reboot your Windows Server; install patch KB3042553 ASAP

Reading Time: 3 minutesThis week Microsoft release a patch for Windows 7/Windows Server 2008 R2 and up that fixed a critical remote execution bug, see MS15-034 and CVE-2015-1635 for more info. Unfortunately the patch was reversed engineered and now an exploit is available. This was detected and described by ISC SANS. They added Denial of Service (DoS) as possible impact, next to Remote Code Execution. As it turns out, the DoS in question actually causes a Blue Screen of Death (BSoD, also known as bugcheck)

Read more

Azure Active Directory Synchronization: Object Matching

Reading Time: 5 minutesThis post is the fifth in a series about Azure Active Directory Synchronization and will cover Object Matching. Other posts have covered and will cover: Introduction, Part 1 Introduction, Part 2 Filtering, Part 1 Filtering, Part 2 Alternate Logon ID Object Matching and Joining Object matching or joining is relevant if you have multiple Active Directory (AD) forests you want to use for Directory Synchronization to Azure Active Directory (Azure AD). Previously with DirSync, it wasn't possible (or supported) to connect

Read more

Azure Active Directory Synchronization: Filtering, Part 2

Reading Time: 5 minutesThis post is the fourth in a series about Azure Active Directory Synchronization and will cover Filtering. Originally I've planned to make this one post, but in my opinion it became to large and complex thus again a part 2. Other posts have covered and will cover: Introduction, Part 1 Introduction, Part 2 Filtering, Part 1 Object Matching Alternate Logon ID In the previous post I discussed why and how to filter: Domain, Organizational Unit or Attribute based filtering. When to

Read more

Azure Active Directory Synchronization: Filtering, Part 1

Reading Time: 6 minutesThis post is the third in a series about Azure Active Directory Synchronization and will cover Filtering. Originally I've planned to make this one post, but in my opinion it became too large and complex thus again a part 2. Other posts have covered and will cover: Introduction, Part 1 Introduction, Part 2 Filtering, Part 2 Object Matching Alternate Logon ID   Why would you want to filter? In most cases the current Active Directory (AD) implementation contains a lot

Read more

Azure Active Directory Synchronization: An Introduction, Part 2

Reading Time: 5 minutesThis post is the second in a series about Azure Active Directory Synchronization, covering part 2 of an introduction. Previous and follow up posts have covered and will cover: Introduction, Part 1 Filtering, Part 1 Filtering, Part 2 Object Matching Alternate Logon ID As most organizations will not require FIM, I will focus my attention mostly on AADSync. Although DirSync is (unless features from AADSync are required) the first choice, it's deprecated, but more importantly: most concepts are still unchanged.

Read more

Azure Active Directory Synchronization: An Introduction, Part 1

Reading Time: 3 minutesThis post is a first in a series about Azure Active Directory Synchronization, covering part 1 of the introduction. Follow up posts will cover: Introduction Part 2 Filtering Part 1 Filtering Part 2 Object Matching Alternate Logon ID   Why you want have synchronization For those who don't work regularly with Office 365 or other Microsoft cloud services (like Azure, Exchange Online Protection), it can be a complex myriad of information to work through in order to find out what you exactly need. In

Read more

Using your browser to check Exchange 2013 protocol health

Reading Time: 2 minutesSometimes you're not at work and you suspect there is something wrong with your Exchange 2013 servers and you can't access your environment remotely for whatever reason. Well, in some cases you can check this with just a browser. For each Exchange protocol, there is an URL you can use to check the health. The format would be: https://<External FQDN>/<protocol>/healthcheck.htm If the specific protocol is working correctly, the Exchange server will respond with: 200 OK SERVER.CONTOSO.LOCAL The server.contoso.local would be the

Read more

Tool Tip: RBAC Manager R2 for Exchange

Reading Time: 2 minutesThis week I had a session at a customer to customize the default RBAC roles, for instance removing the mobile device remote wipe feature from Recipient Management. Customizing RBAC roles is in most cases not something that is a frequent task, so it can take a while to familiarize and re-familiarize with the concept and all cmdlets. But if your organization does not fit in the default roles, you will have to dig into it. However, I came across a

Read more

A quick look at the Sunrise Calendar app

Reading Time: 5 minutesNow that Microsoft has purchased the Sunrise Calendar app, it's probably a good idea to take a closer look to that app and see what we are or will be dealing with before everyone panics (again). The Acompli Outlook app for iOS and Android (from now on referenced as just the Outlook app) has received praise regarding it's functionality and usability, but also a lot of criticism on security and compliancy. A major issue is the temporary caching of data and

Read more
1 2 3 4 5 6 20