Exchange Server


Exchange 2013, Exchange 2010, Exchange 2007, Exchange 2003, Outlook, and Lync

  • Nov 26, 2015

    Building efficient keyword queries for eDiscovery searches in Exchange and SharePoint

    The ability to run searches across a mixture of Exchange mailboxes and SharePoint sites to uncover the deep and dark secrets of those who would prefer their work to go unnoticed is what, in some degree, eDiscovery is all about. Microsoft has invested heavily in the area of compliance over the last decade, with the initial work showing up in Exchange 2010 and SharePoint 2010. There was much to like in the first implementation, especially in Exchange 2010, if only because so many legal discovery actions center on email....More
  • Nov 24, 2015

    Why Exchange 2016 ignores Outlook 2007

    Part of planning a deployment of a new on-premises release of Exchange is a review of client requirements. It’s therefore reasonable that anyone who is interested in deploying Exchange 2016 might start to look at clients to make sure that users will be able to access the new server after it is deployed. It’s also true that you might be interested in new clients if you want to deploy technology that’s only available in a specific client....More
  • Nov 17, 2015

    Why Microsoft decided to keep deleted items in Exchange Online and why it might be the right decision 2

    Some interesting discussion has flowed into my mailbox since Microsoft announced their decision to stop cleaning out the Deleted Items folder of user mailboxes in Office 365. The announcement appeared on February 20 and started a 28-day countdown to implementation....More
  • Oct 29, 2015

    Understanding what the Exchange 2016 Preferred Architecture really means 1

    The notion of “best practice” has long been an elastic commodity when applied to Exchange architecture and design. Consultants and consulting companies have professed to have their own magic method to ensure the successful deployment of Exchange since the first version appeared nearly twenty years ago. There’s nothing harmful in following a successful recipe. Problems only appear when people refuse to change the recipe to reflect new developments....More
  • Oct 13, 2015

    FUD continues over OWA backdoor exploit 5

    Last week, I wrote about a report issued by security company Cybereason that reported how an attacker had gathered 11,000 sets of user credentials after planting a compromised OWAAUTH.DLL file on an Exchange server. A spirited debate duly resulted and Cybereason commented back on the original post....More
  • Oct 7, 2015

    Doubtful security report about OWA flaw gains headlines but offers little real value 13

    The recent Cybereason report titled “A new persistent attack methodology targeting Microsoft Outlook Web Application (OWA)” probably caused some heart flutters for Exchange administrators who might have imagined that the client had been compromised in some fundamental way. I didn’t have quite that reaction because I don’t think the results described in the report are valid....More

Join the Conversation

Get answers to questions, share tips, and engage with the IT professional community at myITforum. Are you a data center professional? Join AFCOM for the best data center insights.

Sponsored Introduction Continue on to (or wait seconds) ×