
Google Search Cheat Sheet
A list of the most useful Google search commands and operators ... Read More

In this short guide we have create a free Let's Encrypt wildcard certificate. Before you Begin We'll need a fresh installation of Ubuntu or Debian linux. The box doesn't need to b e publicly accessible as we will use DNS ... Read More

It this article we'll create basic, single site Exchange 2019 DAG (Database Availability Group). We already installed two mailbox servers with the same specifications (detailed here). Each of them has a single database configured already, MAIL has DB01 and MAIL2 ... Read More

Export a CSV list of all the mailboxes with names and sizes in a fully numeric format, so they can be ordered, summed, etc. The script works on Office365 and on-prem servers as well ... Read More

Do you want to automate distribution group creation, making your job easier? With this script you'll be able to mass-create distribution groups. It takes a simple text file as an input that contains a list of delivery group names, and ... Read More

Office365 is increasingly popular among businesses as a managed email service with a plethora of features and competitive pricing. The best and most efficient way to administer your Exchange Online tenant is via Exchange PowerShell. It comes with no surprise ... Read More

In certain scenarios we might need to forward a full VLAN trunk to a VM. In this article we go through a process of virtualizing a switch in ProxMox to achieve this easily. Before You Begin We assume the trunk ... Read More

Have you ever wondered while typing the same long PowerShell command again and again, that there must be an abbreviation for at least a few of them? Here you go! ... Read More

Every day we need to log into hundreds of portals, as it is important for security, there must be a way to script it, automate logins without putting our actual passwords in scripts in plain text, right? Luckily this is ... Read More

In our previous article we discussed enforced TLS with Exchange. More precisely with on-premises Exchange servers. We established that Exchange uses opportunistic TLS, meaning it prefers encryption but it is not enforced if the other party only supports plain SMTP ... Read More

Most of the time administrators manage distribution group memberships. But it is absolutely possible for selected users to add/remove group members as needed, using simply their Outlook client. Before You Begin - Enabling MyDistributionGroupManagement
In our example a user called ... Read More
In our example a user called ... Read More

This guide is for on-premises Exchange deployments. If you are interested in enforced TLS on Office365 tenants, please click HERE Opportunistic Exchange - like most modern email systems - has the facility to transfer email messages encrypted. It is to ... Read More

UNIX type systems use the octal file permission model, that is limited in terms of setting access permissions for specific users and groups. By default there are only three attributes to be set on files and directories: for the owner, ... Read More

Exchange - like most of the other email systems - limits the maximum size of incoming and outgoing messages. There are three layers where these limits can be set: system-wide, on the send- and receive connectors and on individual mailboxes ... Read More

Huge Logs Sometimes the Exchange server runs out of space. As it happens often, the transaction log files use up all the free space, causing the transport service to stop as there is no more room to write messages to ... Read More

Quick Cleanup List When disk is almost full there here is a quick list I usually go through to recover some free space:
- Delete files from c:\windows\temp
- Download and run TreeSize to see what uses up ... Read More

Custom commands John needs to access Exchange PowerShell a lot. He's tired of logging in the actual Exchange server all the time, he prefers to use his local computer to run cmdlets and manage mailboxes. He created a script, called ... Read More

Installation In Exchange Online DKIM is a built-in service, but on an on-prem Exchange 2019 deployment we need a 3rd party application to add this functionality to our Exchange infrastructure. In this guide we use Stefan Profanter's excellent dkim-exchange application ... Read More

Spam messages have become a huge issue. They are both annoying, flooding our mailboxes with unneeded content and they are a security risk too, as many of them contain links to malicious websites or even viruses. To fight spamming SPF, ... Read More

You have a new Exchange installation. You've just clicked on the Setup Finished window, lean back in your chair and sip on your steamy coffee, saying to yourself: great, now I have a mail server, I could start setting up ... Read More

Our local diner, AlwaysHot Café hired us to build a mail server. They have a small network that consists of a switch and a firewall with a single static public IP. After discussing our options we decided to go with ... Read More