Every Microsoft product is very complex in itself, depending on the role and functionality there are different communication channels and protocols which communicate with each other. The same is also true for Exchange. Although Exchange has been rolled out again as a multirole system since the 2013 version, we are thinking back briefly to the […]

25/02/2020

Prolog There are several ways to create a Certificate request (CSR) for SSL Certificates. There are a large number of tools that can help or assist you in this process. Personally, I like to use PowerShell for this. There is a module in my Exchange Suite which you can download HERE and create a CSR […]

11/02/2020

Prolog Recently, I have been getting inquiries from customers, who have the following scenario: The environment was originally an on-premises infrastructure. Then the customers have decided to switch to Office 365 and implemented this step as follow:   The AAD was configured to sync the user accounts to the cloud, but without the Exchange attributes.  […]

03/02/2020

With Intune you can manage devices and apps of your employees as well as their access to your company data. To use this Mobile Device Management (MDM) system, devices must first be registered for the Intune service. However, there are several ways to register your employee’s devices. Each method depends on the type of device […]

28/01/2020

Prolog At this point I am happy to present the third part of my series “Phishing attack simulation”. In this article we will focus on Brute force Password (Dictionary) attacks. A brute-force attack dictionary is an automated, trial-and-error method of generating multiple passwords guesses from a dictionary file against a user’s password. Identical to Spear […]

21/01/2020

Prolog In my last article about this topic I have described how you can perform simulated phishing attacks on your own infrastructure. This is all about raising the awareness of your own employees. If you haven’t read this article yet, I recommend you do that later. This article is based in many points of the […]

06/01/2020

In this article I have decided not to write a technical contribution. Here you can see a video of me thanking you for all your support in 2019. I look back a little bit what happened last year and also a little bit to see what will happen in 2020. I hope you enjoy the […]

30/12/2019

Prolog One of the biggest dangers in the industry for IT professionals is attacks on their own company network. There are different types of attacks. As I have described in a previous article, one of the biggest threats are phishing attacks. There are several providers of employee training aimed at improving awareness of such attacks […]

17/12/2019

Prolog This article is about an old school topic. In the last few weeks after my vacation, I was supporting a company who had issues between a server and the mail environment to send emails. In this company, the messaging environment is configured that only authenticated systems are allowed to send messages. This I have […]

28/11/2019

Microsoft Ignite this year is already finished, and it was a huge event and It was an honour for me to visit it this year in Orlando. However, during the last couple of days on Ignite, I wrote daily a splitter in my Blog, in which I wanted to show this Event through my Eyes […]

22/11/2019

Here we are, the last Day at Microsoft Ignite 2019 has come 🙁 This article is not about a lock back, but if I do it for a moment, it was a very good Event for me this year…   On this last day I have only two left sessions ready to intend, one of […]

19/11/2019

Day four at the Microsoft Ignite 2019. If you ever was wondering what equipment Attendees are carrying on during the day, here a short view about it. I always have a Backpack with me, there inside you can find a Bottle of water (At the Ignite you get drinks for free, but those are sweet […]

18/11/2019