Exchange: Stop Email Exfiltration
When your users leave or get removed from the organization they may still be getting company confidential information. Here is how you can find out and stop this from happening.
Continue readingWhen your users leave or get removed from the organization they may still be getting company confidential information. Here is how you can find out and stop this from happening.
Continue readingWhen your users leave or get removed from the organization they may still be getting company confidential information. Here is how you can find out and stop this from happening.
Continue readingSome time ago I tackled the challenge of constructing a variant of the bin packing algorithm for leveling out Exchange databases’ size with the least amount of mailbox migrations necessary. Since then, I’ve been approached by a few people in dreadfully large environments looking for help with errors and compatibility issues around the script I released. I’ve finally rounded back to this script to do it some justice.
Continue readingSome time ago I wrote a script and GUI for performing security audits of Exchange mailbox and calendar rights in an environment. This script was far more popular than I anticipated and, I’m ashamed to say, was rather poorly written by my current Powershell standards. There is an obvious need to simplify the extraction of mailbox permissions or my old script would not still be so popular. So I’ve started to revisit my old code for this project in hopes of remaking it with my PowerShell reporting engine. The first step in this process is to pull out the several bits of code that do the actual rights/permissions extraction. I think I’ve finally got this part done and see no reason not to release this mini-library of functions first.
Continue readingI’ve been working on an Exchange/Lync voice deployment lately and have found a new level of frustration for the lack of connectivity between the several voice components involved in turning up such a solution. That being said it is not very difficult to validate your deployment with a bit of Powershell.
There are a few necessary results to gather where I believe it can be easy to ‘miss’ configuration steps when turning up or disabling users:
Continue reading