Blog

Managed Availability Components – Exchange 2016​

Managed Availability Components Probes The first component is called a Probe. Probes are responsible for taking measurements on the server and collecting data. There are three primary categories of probes: recurrent probes, notifications, and checks. Recurrent probes are synthetic transactions performed by the system to test the end-to-end user experience. Checks are the infrastructure that perform…

DAG Quorum and the File Share Witness

DAG Quorum and the File Share Witness Quorum is the voting process that the cluster uses to determine whether the DAG should remain online or go offline. If the DAG goes offline all of the databases in the DAG are dismounted and are therefore inaccessible to end users, causing an outage. There are two quorum…

Exchange File mode replication vs Block mode replication

Exchange File mode replication vs Block mode replication Database replication occurs between DAG members using two methods: (1). File mode replication (2). Block mode replication (1). File mode replication: During file mode replication, each transaction log files generated by the active database copy is written until it is closed off when it reaches 1MB in…

Exchange Database Availability Group (DAG) Concepts

Database Availability Group (DAG) Concepts DAG Members The Mailbox servers that are members of the DAG and can host database copies within the DAG. A DAG can have up to 16 members and a File Share Witness. Quorum The process by which the DAG members determine whether a majority of members are online and available.…

Azure AD Connect Sync process

Azure AD Connect Sync process   AAD Sync Process.

Protect against threats – Office 365

Protect against threats – Office 365 Microsoft 365 includes a variety of threat protection features. Here’s a quick-start guide you can use as a checklist to make sure your threat protection features are set up for your organization.  Important Initial recommended settings are included for each kind of policy; however, many options are available, and…

Types of reports in the Office 365 Security & Compliance Center

Types of reports in the Security & Compliance Center – Office 365 A wide variety of reports are available in the Security & Compliance Center. (Go to Reports > Dashboard to get an all-up view.) The following table lists available reports with links to learn more: Type of information How to get there Where to go to learn more…

Manage your Allowed and Blocked URLs in the Tenant Allow/Block List – Office 365

Manage your Allowed and Blocked URLs in the Tenant Allow/Block List – Office 365 Open https://protection.office.com/ In the Security & Compliance Center, go to Threat management > Policy > Tenant Allow/Block Lists. On the Tenant Allow/Block List page, verify that the URLs tab is selected, and then click Add In the Add new URLs flyout that appears, configure the following settings: Add URLs with wildcards: Enter one…

Remove yourself from the blocked senders list – Office 365

Use the delist portal to remove yourself from the blocked senders list Are you getting an error message when you try to send an email to a recipient whose email address is in Microsoft 365? If you think you should not be receiving the error message, you can use the delist portal to remove yourself…

Safety tips in email messages Office 365

Safety tips in email messages Office 365 Exchange Online Protection (EOP) and Microsoft 365 protect you with spam, phishing, and malware prevention. Today, some of these attacks are so well crafted that they look legitimate. Sending messages to the Junk Email folder isn’t always enough. Now, when you check your email in Outlook or Outlook…

Loading…

Something went wrong. Please refresh the page and/or try again.


Follow My Blog

Get new content delivered directly to your inbox.

%d bloggers like this: