Robocopy Example to Sync Altered Files/Folders
The following command will copy all contents from drive D: to drive E: If the process is interrupted, the same command makes sure to pick up where the earlier process left off, meaning already copied files won't be transferred again. /COPYALL: copies all files, folders
/E: includes empty folders as ... Read More
/E: includes empty folders as ... Read More
Scenario: we have a dedicate mailbox that receives a regular report attached to an email every morning. We want that attachment to be saved to a specific folder on a server, and move the message away from the Inbox to ... Read More
This article guides you through the steps of setting up a proper load balancer for Exchange 2019, 2016 or 2013 client connections on a pfSense firewall, using HAProxy ... Read More
Basic CAS connection path In this article we address the issue of client access during Exchange maintenance. By default, all client access services are configured with the owner server's name on Exchange servers after installation. Let's take a simple example ... Read More
In this guide we take a look on how to create a PFX file, if you need just the opposite: extracting the private, public keys from a PFX file, follow the tutorial here ... Read More
A pfx file is technically a container that contains the private key, public key of an SSL certificate, packed together with the signer CA's certificate all in one in a password protected single file. Here are the steps to extract ... Read More
1. CAS - stateless goodness! This article is solely dealing with the Exchange CAS array (client access services), more precisely with Outlook connectivity. A client has multiple ways to access his/her mailbox on an Exchange server. They can use the ... Read More
This a quick guide on how to mount different type of volumes or shares in Linux. We go through the most common scenarios: local volumes, NFS and SMB shares. For each we discuss the manual way to mount them, also ... Read More
Before removing the last Exchange server in the organization we must make sure that all the Exchange databases are removed. We cannot have any mailboxes still active, as they are tied to Active Directory and deleting the server without gracefully ... Read More
Removing an Exchange Database is not as simple as clicking on a delete button. Exchange is tied together with Active Directory, a mailbox and other objects have footprints there and if a database is removed that still has any objects ... Read More
This article aims to get a view of all the scenarios how SMTP messages travel through an Exchange organization. We'll cover all the variations, from having one server in the company only, all the way to many sites, with multiple ... Read More
Quickie guide for removing empty lines with Notepad+ and Vim ... Read More
Both Notepad++ in Windows and Vim in unix-type machines are perfectly capable of using regular expressions which is a super handy tool in an admin's hands ... Read More
25/TCP or 2525/TCP? Have you ever wondered how incoming and outgoing SMTP messages flow through your Exchange environment on their way to the destination mailboxes? In this article we utilize Wireshark packet capturing tool to see what ports are used ... Read More
After abandoning the 8.3 file name limitation (pre-Win95 all files had a max name length of 8 characters, and a 3-char long extension), the Windows Win32 API allowed whole file paths to be as long as 260 characters long. However, ... Read More
Knowing how to recover disconnected or straight up deleted mailboxes could come very handy, this article goes through the possible scenarios and gives a simple step-by-step guidance on the recovery process. 1. Retention period - while it's not too late ... Read More
In case you cannot use the CredentialManager PowerShell module to store and retrieve user credentials, but you still need to securely store user passwords or other confidential data there is another way to do so. 1. Securely Encrypt and Store ... Read More