Saturday, 10 March 2018

Microsoft MCT & Exchange Admins Meetup at Deira, Dubai UAE Participants

The purpose of this Meetup is to discuss MCT day to day problem and the solutions to fix them. Also discussed MCT portal registration for new MCT awareness and learning materials.


All MCT participants presented and shared his thoughts for the improvement of MCT courses, students issues, and future Microsoft technologies with Office 365 and Azure capabilities.


Event is Organized at Orient IT Services Office Dubai UAE, a Microsoft Gold Partner. 




Friday, 9 March 2018

Step by Step MS SQL 17 Installation on CentOS Linux Release 7.4

Traditionally, Microsoft SQL Server, being part of Microsoft’s back office platform, has always run on Windows operating systems. However, Microsoft has made a commitment to enable customers to choose any platform. As part of this commitment, for SQL Server 2017,

Step by Step Changing Default Windows RDP Port with Advance Firewall

The requirement was to Secure Remote Access to Server in a private cloud infrastructure, where the customer wanted to provide RDP of Microsoft Windows Server with different RDP port other than the default one which shipped with default Windows installation.

Step by Step SharePoint Administration For Anyone

A fundamental responsibility concerning site security is to manage who can access resources on your site. SharePoint enables you, as a site owner, to control

Monday, 5 March 2018

Introducing Azure Advanced Threat Protection

The recent years have witnessed a distinct and consistent escalation in cyberattacks’ scope, scale, and sophistication, impacting organizations across all verticals and locations. This escalation is manifested not only in increasing proliferation of threat-actor groups, but also in the diversity of the utilized attack Tools Techniques and Procedures (TTPs), ranging from zero-day exploits to weaponized antimalware and publicly available toolkits.

This threat landscape is driving a change in the common security paradigm, bringing security stakeholders to realize that a resourceful and determined attacker will at a certain point succeed in bypassing the traditional prevention and detection controls.

To proactively respond to these threats, there is a need for a security layer that operates following the successful bypass of these controls and is tasked with detecting the malicious activity consecutive to this bypass.

Step by Step Domain Migration Windows 2008 to Windows 2012.

Active Directory is one of the most widely used services on enterprise networks. In addition to providing basic authentication and authorization services, Active Directory enables so many other capabilities that its popularity is no surprise.

Most of the people are still running Windows Server 2008 in the network and wants to safely migrate to Windows Server 2012 R2 edition. Windows Server 2012 R2 adds some significant new features to both Active Directory Domain Services (AD DS).

Announcing Microsoft 365 for US Government



Make no mistake: over the last few years, we’ve seen faster acceleration of government organizations moving to the cloud. So why now? This move is driven largely by the desire to bring the most up-to-date tools and capabilities to employees to meet demands for mobility and create a more modern workplace—and to ensure they are better equipped to face rising security challenges. And this desire is supported by recent legislation like the Modernizing Government.Technology Act, which creates IT modernization funds to help agencies replace aging infrastructure that poses security risks. 


 

How to Connect with O365 with PowerShell

PowerShell allows you to manage your Exchange Online (office 365) settings from the command line.You can use Windows PowerShell from your loca

Sunday, 4 March 2018

How to Create Fine Grained Password Policy in Server 2012

You can use fine-grained password policies to specify multiple password policies in a single domain and apply different restrictions for password and account lockout policies to different sets of users in a domain. For example, you can apply stricter settings to privileged accounts and less strict settings to the accounts of other users. In other cases,

Step by Step Virtual Machine Creation in Azure

Azure Virtual Machines (VM) is one of several types of on-demand, scalable computing resources that Azure offers. Typically, you choose a VM when you need more control over the computing environment than the other choices offer. This article gives you information about what you should consider before you create a VM, how you create it, and how you manage it.

An Azure VM gives you the flexibility of virtualization

Types of Exchange Server Recipients.

Exchange Server recipients are any objects within the Active Directory Domain Services (AD DS) forest that have been configured with an email address. When AD DS objects are configured with an email address, they appear in the Global Address List (GAL). Exchange Server 2016 supports the following recipient types:

User mailboxes:- A mailbox that you assign to an individual user in your Exchange organization. This is the most common type of recipient in Exchange Server 2016.

Mail contacts:- Contacts that contain information about people or organizations that exist outside an Exchange Server organization and that have an external email address. Exchange Server routes all messages sent to the mail contact to this external email address. 

Mail users:- Users who have an AD DS user account but have an external email address.

Step by Step SharePoint 2016 Multi Server Installation for anyone.

SharePoint Server 2016 has been designed, developed, and tested with the Microsoft Software as a Service (SaaS) strategy, building on SharePoint Online as its core. Drawing extensively from that experience, SharePoint Server 2016 offers you new and improved, highly flexible deployment options. You can choose from a traditional on-premises deployment, a hosted service with Microsoft Office 365 sites powered by Microsoft SharePoint Online, deployment in Azure Infrastructure as a Service (IaaS), or a mix of these options with a hybrid approach, empowering you to choose how and when you take advantage of on-premises or cloud-based solutions, all without changing the user experience. Seamless integration with on-premises people experiences and taxonomy ensure a consistent experience within or beyond the firewall.

Step-by-Step 2 Node Hyper-V Replication.

Hyper v replication is use for Disaster recovery, A replica virtual machine is a complete, ready-to-run duplicate of the source virtual machine. It can be switched on and be up and running in a few moments. When this happens, HVR assumes that the source virtual machine is lost and unrecoverable. When the replica is activated it becomes the official copy of the virtual machine.

Step by Step Exchange 2010 to Exchange 2016 Migration-Part-III

We have successfully received email from User1. Till here we have completed our Migration Lab part I, and part II we will add one additional domain controller of Windows Server 2016 Data Center Edition and also Add one Exchange Server 2016 on Windows Server 2016 in the same AD domain so that we can start our migration from Exchange 2010 SP3 to Exchange 2016.

In next lab which is Part-III, I will also do migration FSMO roles from Windows Server 2008 Active Directory Domain Controller to new Windows Server 2016 Active Directory Domain Controller so that I can later demote Windows 2008 Domain with Exchange 2010.

Saturday, 3 March 2018

Step by Step Exchange 2010 to Exchange 2016 Migration-Part-II

I will continue from Part-I of migration, in first part we have just configured domain environment for installation of Exchange 2010 SP3, in this part we will install all prerequisites of Exchange 2010 SP3 and itself Exchange 2010 setup.

VMs related configuration will remain same as described in part-I of our migration guide. I will join the 2nd VM with Domain 2008 and login with Domain Admin credentials to perform all tasks

Step by Step Exchange 2010 to Exchange 2016 Migration-Part-I

am going to start the migration process from scratch because I don’t have pre-setup for this
migration so I will start the lab from building a Domain Controller in Windows Server 2008 R2
Standard, on the same OS I will install Exchange Server 2010 SP3. In the second part of the
Guide I will further install Domain Controller on Windows Server 2016 Standard Edition, on the
same OS I will install Exchange Server 2016.

ActiveDirecoty Fedration Services with Office 365

Active Directory Federation Services (AD FS) simplifies access to systems and applications using a claims-based access (CBA) authorization mechanism to maintain application security. AD FS supports Web single-sign-on (SSO) technologies that help information technology (IT) organizations collaborate across organizational boundaries. AD FS 2.0 is a downloadable Windows Server 2008 update that is the successor to AD FS 1.0,

Step by Step Establishing Azure Point to Site VPN

There are many scenario in which we have to work on Microsoft Azure Cloud doing experiments
and LABs, or we have to setup some Application Server’s on which different people have to work
like a team, such as a team of developer is working on a project which is hosted on Microsoft Azure plate from and the developers are located in different geo location.

Step by Step Azure Site to Site VPN with SonicWall Hardware Firewall

Azure is a cloud computing platform and infrastructure created by Microsoft. It is used for building, deploying, and managing applications and services through a global network of Microsoft managed datacenters.

How to Extend Password Expiry Date in AD

Active directory account passwords expire set (for example, every 90 days) in most of the organizations. Configuring an AD account with Password

SCCM 2012 Step by Step For Anyone

A member of the Microsoft System Center suite of management solutions, System Center 2012 Configuration Manager increases IT productivity and efficiency by reducing manual tasks and letting you focus on high-value projects, maximize hardware and software investments, and empower end-user productivity by providing the right software at the right time.

Windows Server Update Services Step by Step for Anyone

Windows Server Update Services (WSUS) enables information technology administrators to deploy the latest Microsoft product updates. WSUS is a Windows Server, server role that can be installed to manage and distribute updates. A WSUS server can be the update source for other WSUS servers within the organization. The WSUS server that acts as an update source is called an upstream server. 

In a WSUS implementation, at least one WSUS server in the network must connect to Microsoft Update to get available update information. The administrator can determine, based on network security and configuration, how many other servers connect directly to Microsoft Update.

Step by Step SQL Server 2016 Two Node Failover Cluster

SQL Server 2016 delivers mission critical performance across all workloads with in-memory built-in, faster insights from any data with familiar tools, and a platform for hybrid cloud enabling organizations to easily build, deploy, and manage solutions that span on-premises and cloud. SQL Server 2016 is the biggest leap forward in the Microsoft data platform history with real-time operational analytics, rich visualizations on mobile devices, built-in advanced analytics, new advanced security technology, and new hybrid cloud scenarios.

Step by Step iSCSI Network Storage Windows Server 2016

This is a guide on how to create and Configure iSCSI windows server 2016. Internet Small Computer System Interface (iSCSI) is a way of connecting storage devices over a network using TCP/IP. It can be used over a local area network (LAN), a wide area network (WAN), or the Internet. In this guide, we will create iSCSI in Windows Server 2016 as target and will connect the same storage from the network. In this way,

Step by Step Installation of Windows Server 2016 Domain Controller

Active Directory is one of the most widely used services on enterprise networks. In addition to providing basic authentication and authorization services, Active Directory enables so many other capabilities that its popularity is no surprise.

Windows Server 2016 adds some significant new features to both Active Directory Domain Services (AD DS) and Active Directory Federation Services (AD FS). Many of the features added in Windows Server 2016 are geared toward the increased focus on cloud applications, whether they're public, private, or hybrid.