Foreword In this article, I describe one (of several) ways in which a mailbox migration can be carried out from, for example, an old on-premise infrastructure to a new Exchange online migration. In my practical example, the two sites are on different tiers, and have no connection to each other. Once again, this is one […]

From time to time I get requests from customers for the following scenario: The customer basically has a hybrid infrastructure, must (or wants to) continue to operate Exchange on-premise. However, the customer wants to protect the Outlook Web App (OWA) of the on-premise messaging infrastructure with Multi Factor. On the one hand, this can be […]

In this article, I describe the most important points about email encryption in a kind of FAQ. We have all heard a few buzzwords on this topic in the past, and we know most of them… And still there can be question marks again and again. I hope this article sheds more light on the […]



MS Exchange

Today is the first of July and I am extremely pleased to have received an email from Microsoft on this special day. Those who are familiar with the Microsoft MVP Award or are Microsoft MVPs themselves know on this day whether they have also been awarded an MVP by Microsoft in the new fiscal year. […]

Every Microsoft product is very complex in itself, depending on the role and functionality there are different communication channels and protocols which communicate with each other. The same is also true for Exchange. Although Exchange has been rolled out again as a multirole system since the 2013 version, we are thinking back briefly to the […]

Prolog Recently, I have been getting inquiries from customers, who have the following scenario: The environment was originally an on-premises infrastructure. Then the customers have decided to switch to Office 365 and implemented this step as follow:   The AAD was configured to sync the user accounts to the cloud, but without the Exchange attributes.  […]

Prolog At this point I am happy to present the third part of my series “Phishing attack simulation”. In this article we will focus on Brute force Password (Dictionary) attacks. A brute-force attack dictionary is an automated, trial-and-error method of generating multiple passwords guesses from a dictionary file against a user’s password. Identical to Spear […]