Robocopy Example to Sync Altered Files/Folders
The following command will copy all contents from drive D: to drive E: If the process is interrupted, the same command makes sure to pick up where the earlier process left off, meaning already copied files won't be transferred again. /COPYALL: copies all files, folders
/E: includes empty folders as ... Read More
/E: includes empty folders as ... Read More
Always Hot Café wants extra security on the perimeter of it's network. They asks us to deploy an Exchange Transport server in their organization. When installing and Exchange server we need to specify the type of the server which can ... Read More
In Exchange there is a single Global Address List that contains all the mail objects in the organization. Always Hot Café has three locations in the following cities: New York and Austin. The management wants the workers at those locations ... Read More
Have you ever bought a brand new SSD with 256GB on it's label, then when connecting it to a computer the storage space of only 240GB was showing? Were you taught in school that a 'kilobyte' is actually 1024 bytes, ... Read More
The idea of encoding and decoding to- and from Base64 using PowerShell is based on the very same algorithm as we used in our Python example. In this short article we go through the process of encoding and then decoding ... Read More
Always Hot Café has three coffee shops in three different cities: New York, Los Angeles and Austin. They asked IT to create a distribution list for all three, keeping in mind that staff move around and whenever one person is ... Read More
In Python there is a built-in Base64 encoder/decoder ready to use. Here is a very simple example on how to encode and decode using the built-in base64 library ... Read More
Have you ever been wondering why SSL certificates have a strange code in their body, that seemingly only consists of letters, numbers, the "+" and the "/" characters? If you've ever checked the actual content of a saved email, the ... Read More
The SPF record a domain owns can have the maximum length of 255 characters. A longer record - or even nearly that long - is not advisable as recipient servers have a more difficult job to process all elements, especially ... Read More
When access to a mailbox in Exchange 2013-2019 is assigned, by default the mailbox is auto-mapped to the trustee's profile. That means if Alice gets access to Peter's mailbox, Alice will see her colleague's mailbox appearing automatically in her Outlook ... Read More
You are searching for the folder inside a mailbox that contains the oldest message. Mailbox folders can be scanned specifying certain criteria. This one-liner takes advantage of the OldestItemReceivedDate property of the MailboxDatabaseFolder query output. It crawls through all the ... Read More
Are emails deleted forever in Exchange? Obviously if you delete an email the normal way, it will be put in the "Deleted Items" folder inside your mailbox. But what happens if you delete them even from there? Or straight hard-delete ... Read More
There are scenarios where we need to know if an email address already exists inside the organization. At first glance it might not be obvious what object has a specific email address, as in Exchange any mail enabled objects can ... Read More
In this short guide we deploy a Windows-based SSTP server for clients. For details about the protocol and the way to deploy a linux-based implementation of the server that has auto-renewing SSL certificates, visit my guide HERE. Our test VM ... Read More
Always Hot Café needs a fast and cheap way to set up a VPN solution for it's workers. They don't want to invest in expensive hardware, or software. Also, the employees have Windows laptops and they want to use the ... Read More
The quick way to get a user's SID or identify a SID if the username is unknown. First we use the command line to retrieve the reqested values, then a custom PowerShell function that can be used to get any ... Read More
Does expired mean it is not working anymore? When an SSL certificate is signed, it gets an expiry date. It doesn't matter if it is "self-signed" - meaning that a not trusted server signed it (for instance the webserver itself) ... Read More