Archive

Archive for February, 2017

Manually Update the global address list (GAL)

February 24, 2017 No comments
  1. In the Exchange Management Console, expand ‘Organization Configuration’, and then select the ‘Mailbox’ 
  2. Open the ‘Offline Address Book’ tab, this will list all available Address Books for your organisation
  3. Right click on the appropriate address book and select ‘Update’
  4. When prompted, click ‘Yes’
Categories: Uncategorized Tags:

Mail-Enable or Mail-Disable a Security Group

February 21, 2017 No comments

• Security groups grant access permissions to Active Directory resources.
• If you mail-enable the security group, you can send e-mail to all members of that group.
For example, if you create a security group that gives members access, you may want to send mail to that group to notify them of a power outage.

You may need to change the group from Global security group to a Universal Security Group.


Categories: Uncategorized Tags:

Listing all mailboxes in a database

February 17, 2017 No comments

Categories: Uncategorized Tags:

Opportunistic TLS vs. Enforced/Mandatory TLS

February 5, 2017 No comments

Transport Layer Security (TLS) is a cryptographic protocol that provides security over a network. It’s predecessor is Secure Sockets Layer (SSL) protocol, frequently referred to as “SSL.

  • The connection is private because symmetric cryptography is used to encrypt the data transmitted.
  • The keys are generated (unique) for each connection and are based on a shared secret negotiated at the handshaek or start of the session.

Opportunistic TLS is a common encryption method used to protect sensitive data. When opprtunistic TLS is enabled, the sender will attempt a TLS connection when sending data if it is offered, and fall back to SMTP (unencypted) if it is not. Simply, the connection will tattempts to invoke TLS.

Enforced TLS means the sender will attempt to connect using TLS, and if it is not offered will not send. If TLS is offered, it will negotiate the handshare, determine the approriate algorithum, and pass the data. 

Often a TLS partnership or relationship is created between two established organizations to ensure TLS is mandatory and enforced during communication or data  The enforced TLS guarantees that messages are always sent or received encrypted.

Categories: Uncategorized Tags:

Reporting Mailbox Folder Sizes

February 3, 2017 No comments

Select relevant columns, sort, and export to csv

Categories: Uncategorized Tags:

Exchange Server 2010 Message Tracking

February 2, 2017 No comments

Exchange Server 2010 Message Tracking
Message Tracking is a component of Exchange 2010 and is a feature of the Hub Transport, Edge Transport, and Mail Server role. It’s job is to log e-mail traffic in the organization when messages transverse between mailboxes.

Export Search Log to CSV

Show Full List in PowerShell

Categories: Uncategorized Tags:

Robots.txt

February 1, 2017 No comments

Domains use the robots.txt, also known or called the robots exclusion protocol to provide instruction about their site to web robots (also known as web wanders, crawlers, or spiders). A web robot is a program that systematically browses or runs scripts againt the internet for many different purposes including web indexing. Web Robots are used by such search engines as Google, Bing, and Yahoo to build their databases and to index web content.

The robots.txt is a text file, typically placed on the highest-level directory of your site or root of your domain. It is a publicly available file and can be viewed by anyone. When a web robot looks for the robots.txt from any URL, it will automatically strips the path components. The robots.txt will inform the web robot what sections of the website should be indexed or disallowed for scanning or processing.

Not all web robots will honor the robots.txt and will ignore the instructions. Some examples include spammers, who uses web robots to harvest e-mails and malware robots will scan the web for security vulnerabilities.

Categories: Uncategorized Tags:

Identify LegacyExchangeDN and Adding X500 Address

LegacyExchangeDN:

• The legacyExchangeDN value is set when a mailbox is created and includes the name of the Exchange administrative group where the mailbox belongs.
Example LegacyExchangeDN: /o=Organisation/ou=Administrative Group/cn= Recipients/cn=Username
X500 address stores the LegacyExchangeDN attribute in Active Directory.
• The legacyexchangeDN is used by exchange to send internal emails

Scenarios that requires the addition of x500 Addresses
• Converting a distrubtion list into a shared mailbox (email aliases are the same, however it would need the x500 to associate to the new sharedmailbox alias)
• Senders are receiving an NDR while responding to old emails of a returned e-mail (previous cached x500 stored no longer exist and will need the association)

How to gather the LegacyExchangeDN of a mailbox
1. From Exchange Management Shell
2. Run a Get-Mailbox -Identity [user] | ft LegacyExchangeDN

Adding the X500 Address
1. From the Exchange Management Console (EMC)
2. Pull the reciepent from Receipent Configuartoin > Mailbox
3. Select Custom Address.. in the drop down next to Add… under E-mail Address Properties of the Recipent
4. E-mail Type is X500, E-mail Address is the [LegacyExchangeDN]. Should look like this: /O=EXCH/OU=EXCHANGE ADMINISTRATIVE GROUP (BLAH)/CN=RECIPIENTS/CN=EPIC@epiclau.com

Categories: Uncategorized Tags:

Managed Folder Assistant (MFA)

Managed Folder Assistant (MFA) ensures retention policies have been correctly applied to mailboxes.MFA processes a mailbox, it makes sure that each item has the right tag and applies the defined action

http://windowsitpro.com/blog/behind-scenes-managed-folder-assistant

    ElcLastRunTotalProcessingTime The total time (in milliseconds) that the Managed Folder Assistant spent processing the mailbox in its last run.
    ElcLastRunSubAssistantProcessingTime The total time (in milliseconds) that the ELCTagSubAssistant (the part of MFA that handles item tagging and expiration). Only time spent processing items in the IPM folder tree is calculated. Time spent processing items in the Recoverable Items folder structure (dumpster) is ignored.
    ElcLastRunUpdatedFolderCount The number of folders that were updated by MFA in its last run.
    ElcLastRunTaggedFolderCount The number of folders tagged (or untagged) by MFA in its last run.
    ElcLastRunUpdatedItemCount The number of individual items that were tagged (or untagged) by MFA in its last run.
    ElcLastRunTaggedWithArchiveItemCount The number of items that MFA updated with an archive tag in its last run.
    ElcLastRunTaggedWithExpiryItemCount The number of items that MFA updated with an expiry (delete) tag in its last run.
    ElcLastRunDeletedFromRootItemCount The number of items MFA deleted from the IPM folder tree in its last run.
    ElcLastRynDeletedFromDumpsterItemCount The number of items MFA deleted from the Recoverable Items folder structure in its last run.
    ElcLastRunArchivedFromDumpsterItemCount The number of items MFA moved from the Recoverable Items folder structure to the archive mailbox in its last run.
    ElcLastRunArchivedFromRootItemCount The number of items MFA moved from the IPM folder tree into the archive mailbox in its last run.
    ElcLastRunSuccessTimeStamp The last time MFA successfully finished processing a mailbox.

https://social.technet.microsoft.com/Forums/exchange/en-US/c24fc0fe-c8e0-45fc-a3cc-40d680c9c32e/startmanagedfolderassistant-how-do-i-know-it-worked?forum=exchange2010

Categories: Uncategorized Tags:

Getting Mailbox Sizes

Get-MailboxStatistics cmdlet and supply a username like this:

Categories: Uncategorized Tags: