• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
OpenTechTips

OpenTechTips

Comprehensive IT Guides for Pros and Enthusiasts

MENUMENU
  • HOME
  • ALL TOPICS
    • Exchange
    • InfoSec
    • Linux
    • Networking
    • Scripting
      • PowerShell
    • SSL
    • Tools
    • Virtualization
    • Web
    • Windows
  • ABOUT
  • SUBSCRIBE

Home

Home

How to Run a Command Stored in a Variable | PowerShell

May 5, 2025 Zsolt Agoston
Use the & operator to execute the content of a variable in PowerShell ... Read More
Home

How to EASILY set up DKIM on a Zimbra 8 Server

September 19, 2020
Home
Deploying DKIM on Zimbra Collaboration Edition Server is simple compared to the difficulty of doing so on an on-premises Exchange server. As it's built into the suit, we have an easy job creating the key pairs with a single command ... Read More
Home

Automatically Renewing FREE SSL on Zimbra

September 17, 2020
Home
We already covered how to get LE certificates for CentOS boxes, this time we incorporate that knowledge into a script to get and automatically renew the SSL certificate for our Zimbra server running on CentOS 8 ... Read More
Home

Install Zimbra 8.8 on CentOS 8 – Step by Step

September 12, 2020
Home
If you are on a budget and you need an email system that doesn't require licensing and run on a modest hardware, Zimbra is a good choice. Here's how to install it on CentOS 8 ... Read More
Home

Setting up DKIM in Office 365 – Step by Step

September 10, 2020
Home
On-premises Exchange servers have no built-in DKIM modules, so a 3rd party software is needed to implement DKIM (detailed here), but luckily in Office 365 setting up the DKIM signing process is very simple ... Read More
Home

Immediate AD DNS Replication

September 7, 2020
Home
In this lab we take a look at triggering instant replication of both AD objects and their special subset: DNS zones ... Read More
Home

Install Postfix on CentOS for Internet email traffic

September 4, 2020
Home
It's a quick guide to install a postfix server on CentOS, that can receive incoming email from the internet. In our lab we use our protectigate.com domain, and a user mailbox john@protectigate.com, who will receive our test email ... Read More
Home

How to Force Update the Address Book in Outlook

August 27, 2020
Home
Address lists are built-in features in the Exchange messaging system, there is always at least one global address list that users can use to look up other users in the organization. They can either use the Address Book button in ... Read More
Home

Automatically Assign Signatures to Shared Mailboxes in Outlook

August 23, 2020
Home
Alice wants to set Abigail's out of office message in her absence. Also, she needs to send email messages out from Abigail's mailbox which she's able to do anyway, as she was given send-as permissions to Abigail's mailbox, but each ... Read More
Home

How to Reseed an Exchange 2019 DAG Database Copy

August 22, 2020
Home
If for some reason a passive copy of a mailbox database in a DAG gets corrupted (see screenshot below), the safest way to fix the issue is by reseeding the database ... Read More
Home

Office 365 – Connect Mailbox to Different User | The ImmutableID Property

August 21, 2020
Home
In this lab we take a look at the special ImmutableID property of the Microsoft Online user accounts. This property is used when we synchronize on-prem AD accounts to the cloud. The ImmutableID shows the hybrid system which on-prem account ... Read More
Home

Office 365 – Force Password Sync with Azure AD

August 19, 2020
Home
Password hashes are synchronized separately from the user account to the Azure Active Directory by AADSync. If there are issues with hash sync for certain users or even whole domains, there is a great built-in tool to diagnose the issues ... Read More
Home

Move maiboxes between on-prem Exchange systems with PowerShell

August 17, 2020
Home
An interesting test is how to migrate user mailboxes between two on-prem Exchange systems that have no connection whatsoever, other than a plain network connection through the internet. They belong to different forests, and there are no trust relationships set ... Read More
Home

Office 365 – How to Complete Individual Move Requests in a Batch?

August 15, 2020
Home
During onboarding or offboarding Office365 migration batches are created with collections of users to first sync the given users' mailboxes to or from the cloud, and keep it synced until they are completed. When whole batches are completed, all mailboxes ... Read More
Home

How to Configure NFSv4 and NFSv3 on CentOS?

August 14, 2020
Home
Installing an NFS file server on linux mainly consists of three short steps: install the NFS package, then configure (or in another words export) the NFS shares and lastly set the built-in firewall to allow incoming NFS queries ... Read More
Home

FIX: Is Office365 MFA still enforced, although it looks disabled?

August 13, 2020
Home
Is Office365 still asking for 2FA for your global admin, even though MFA is disabled for all of your users?
This is because 'Security defaults' are enabled in your tenant. To disable it open the Azure portal: https://aad.portal.azure.com Under 'Azure Active ... Read More
Home

Don’t let hackers lock out user AD accounts | ADFS Smart Lockout to the Rescue!

August 12, 2020
Home
ADFS Smart Lockout handles authentication requests, blocking users when getting suspicious activities from certain IP addresses, while allowing valid users continue to use their accounts. Doing this without locking the actual AD user account ... Read More
  • ‹
  • 1
  • …
  • 5
  • 6
  • 7
  • 8
  • 9
  • …
  • 13
  • ›
Home

Primary Sidebar

Tools

  • Terms of Use
  • Disclaimer
  • Privacy Policy
Manage your privacy

To provide the best experiences, we and our partners use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us and our partners to process personal data such as browsing behavior or unique IDs on this site and show (non-) personalized ads. Not consenting or withdrawing consent, may adversely affect certain features and functions.

Click below to consent to the above or make granular choices. Your choices will be applied to this site only. You can change your settings at any time, including withdrawing your consent, by using the toggles on the Cookie Policy, or by clicking on the manage consent button at the bottom of the screen.

Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Statistics

Marketing

Features
Always active

Always active
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Manage options
{title} {title} {title}
Manage your privacy
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Statistics

Marketing

Features
Always active

Always active
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Manage options
{title} {title} {title}