Defender for Office has a new way of making it easy for you to deploy policies. Instead of editing the default policy or creating your own you can now use one of the Presets. But what do they contain? Microsoft has published this handy chart. What does it mean when […]
Exchange
It is determined that a user outside of normal IT operations should be given the ability to manage the email quarantine for the company.
10 Management tips and 3 security tips for shared mailboxes
do I dare ignore what I see in the logs if my AV is giving me a clean bill of health? Can I really afford to rebuild this server when things seem mostly ok?
There’s been a lively discussion with “breaking news” about the extent of the intrusion into networks and the solution to it over on our Ransomware and Security group. Now that it seems to have reached a stable information point I thought I would summarize that you need to know.
This month I covered a whirlwind of email security settings.
New ways to secure email use old tools like transport rules, some are anti-phishing rules, some are cloud app security policies, some are conditional access.
The ability to encrypt email is a critical feature. So much information gets sent via email — corporate secrets like specifications, private content like pretty much anything from your accountant or lawyer, or maybe just something you’d like to keep between you and the recipient. Email encryption is a fact […]
As a result of finding that eDiscovery results were not complete I needed to re-index the mailbox database on an Exchange 2010 server. I found that while the information is out there, it’s not so easy to find. You may also need to re-index if your index files get too […]
If you are using Exchange 2007 or Exchange 2010 (SBS or non-SBS) and are using a single-name certificate, this article is for you. When you migrate to SBS 2008 or SBS 2011 and you already have a domain name, you don’t need to use the built-in domain registration wizard that […]