Exchange: Stop Email Exfiltration
When your users leave or get removed from the organization they may still be getting company confidential information. Here is how you can find out and stop this from happening.
Continue readingWhen your users leave or get removed from the organization they may still be getting company confidential information. Here is how you can find out and stop this from happening.
Continue readingI’ve already gone over the basic phases of a Skype for Business enterprise voice deployment in my prior article. Now it is time to skip right over the first two of those phases and start preparing to replace your existing PBXs. To prepare you need to know what you are going to be replacing. In this article we will be focusing on beginning the information gathering process.
Continue readingHere is a quick bit of PowerShell. It is some snippets of C# code wrapped up with PowerShell which will allow you to assign accounts to the ‘login as batch job’ local security rights of a local machine. The code is no great shakes but it is a good example of how you might take some existing online code and modify to suit your needs in PowerShell. This function also compliments another script I’ve released in the past for automatically scheduling PowerShell scheduled tasks rather well.
Continue readingBy default a Lync enabled account within a Lync/Exchange 2013 environment will be enabled for UCS (Unified Contact Store). This means that the Lync contacts get saved in the Lync user’s mailbox and not the Lync database. In order to get a list of the contacts associated with these accounts you have to export data to a zip file with some debug Lync commands and, even then, the information is buried in a hard to interpret XML file.
Continue reading