Happy New Year … Not!
With the New Year comes a new class of malicious attack that can impact IT systems. This time, the attack is hardware based, affecting mostly Intel based systems, and to some extent, AMD systems as well.
Here is a list of resources that highlight what it is all about and how to mitigate against this new threat. In the words of Microsoft, “Don’t panic.”
Here is a great resource for evaluating and comparing the myriad of options available in Office 365. This site also provides you with a downloadable Excel workbook so that you can work on this offline.
The technet resource is available here – https://technet.microsoft.com/en-us/office/dn788955.aspx
I just spent the weekend working performing some SBS to Office 365 migrations.
Here are some useful links that make the process a whole lot easier.
Export mailboxes to PST for Exchange 2010 (SBS 2011 Standard)
Export mailboxes to PST for Exchange 2007 (SBS 2008)
Import PST files to Office 365
Enabling Autodiscover for Outlook in SBS Exchange Environments
Getting Outlook 2007 and Outlook 2010 to work with Office 365
- The following link lists the minimum requirements needed to quickly get your Outlook desktop client running with Office 365.
- With SBS 2011, it is necessary to remove the Service Connection Point (SCP)
- Show SCP information: Get-ClientAccessServer | Select Name, AutoDiscoverServiceInternalUri
- Remove SCP information: Set-ClientAccessServer -Identity “[Servername]” -AutoDiscoverServiceInternalUri $NULL
Importing LegacyDN information
Problems connecting Outlook to Office 365
AND if you happen to still be using SBS 2003 (I certainly hope not!), you can use Exmerge or Outlook to output individual mailboxes to PST. Do it soon!
Here’s a great resource – powershell.office.com
Are you an Office 365 IT administrator who is new to PowerShell? Are you looking for an Office 365 admin tool to automate repetitive administrative tasks? Or perhaps you are looking to access additional capabilities that aren’t available in the Office 365 Admin Center? Then PowerShell for Office 365 is for you.
If you want to have a play with the various new preview releases of Windows, here are the links to resources and information on where to download these previews.
If you have a MSDN or Microsoft Azure subscription, you can get them directly via the respective site portals.
Otherwise, here are the public links.
Here are a couple of useful resources for working with Subnets.
I came across a useful site that helps you build up an SPD record using a form that asks various questions.
Here is a list of where you can find important log files for Windows Server 2012 Essentials and Windows Server 2012 R2 Essentials.
In Windows Server Essentials 2012 and 2012 R2, the location of the log files is under %programdata%\Microsoft\Windows Server\Logs.
Service Integration Log Files:
|Windows Azure Backup
Backup Log Files:
|Server Backup Configuration wizard
|Server Backup restore wizard
|Client Backup Feature server side log
|Client backup database cleanup
|Client backup database checker
Storage and Devices Log Files:
|User/Device management feature
|Storage related feature
Azure Backup Log Files:
|Location: C:\Program Files\Windows Azure Backup Agent\Temp
|Azure Backup Logs
|Failed Azure Backup Logs
Other Helpful Log Files:
|Health evaluation schedule task
|Macintosh Clients Status update
|Server DNS status
|Customer Experience Improvement
Program and Service Quality Measurement Log Files:
|CA Role installation
|Media pack installation (2012 R2)
|Media Service (Specially with RWA)
|O365 (Assign/Un-assign Accounts)
The client-side log files are located in the folder %programdata%\Microsoft\Windows Server\logs. They are as:
|Client package installation Failures
|Client backup restore mount driver
|Client operation for File history Sync
|Main log for client launch pad
|Password synchronization feature in AAD
|Add-in feature on client
|Health evaluation schedule task
|Client Backup scheduled task
|Connector uninstall cleanup task
|Update health definition file from server to client task
|RDP feature for RWA
||RunTask-RDP Group Configuration.log
|Client VPN connectivity issues
||RunTask-VPN Routes Repair.log
|Client network status update
|Client deployment API call (Client deployment fails)
|Health alert feature
Reference – http://blogs.technet.com/b/sbs/archive/2014/09/30/windows-server-essentials-log-files.aspx
It was bound to happen. A major bug targeting the Linux community, and not Windows users. Thanks to Trend Micro labs, here are some related resources that will bring you up-to-date with this latest threat.
The original blog post can be found here – http://blog.trendmicro.com/trendlabs-security-intelligence/summary-of-shellshock-related-stories-and-materials/