Blocking a mass spam attack (updated)
Recently a new trend has emerged where criminals are attempting to hide their activity behind a barrage of spam email to the compromised mailbox or to any popular mailbox in the domain.
Recently a new trend has emerged where criminals are attempting to hide their activity behind a barrage of spam email to the compromised mailbox or to any popular mailbox in the domain.
Defender for Office has a new way of making it easy for you to deploy policies. Instead of […]
It is determined that a user outside of normal IT operations should be given the ability to manage the email quarantine for the company.
10 Management tips and 3 security tips for shared mailboxes
do I dare ignore what I see in the logs if my AV is giving me a clean bill of health? Can I really afford to rebuild this server when things seem mostly ok?
There's been a lively discussion with "breaking news" about the extent of the intrusion into networks and the solution to it over on our Ransomware and Security group. Now that it seems to have reached a stable information point I thought I would summarize that you need to know.
This month I covered a whirlwind of email security settings.
New ways to secure email use old tools like transport rules, some are anti-phishing rules, some are cloud app security policies, some are conditional access.
The ability to encrypt email is a critical feature. So much information gets sent via email — corporate […]
As a result of finding that eDiscovery results were not complete I needed to re-index the mailbox database […]
If you are using Exchange 2007 or Exchange 2010 (SBS or non-SBS) and are using a single-name certificate, […]
Here are the elevated PowerShell commands to run to set the virtual directory URLs Get-ActiveSyncVirtualDirectory -server EXCHANGE | […]