Hi All, It's that time of the Month again and Microsoft has released Patches for Exchange 2013 up to Exchange 2019
Released: March 2022 Exchange Server Security Updates
https://techcommunity.microsoft.com/t5/exchange-team-blog/released-march-2022-exchange-server-security-updates/ba-p/3247586 Description of the security update for Microsoft Exchange Server 2019 and 2016: March 8, 2022 (KB5012698)
https://support.microsoft.com/en-us/topic/description-of-the-security-update-for-microsoft-exchange-server-2019-and-2016-march-8-2022-kb5012698-440c5421-dc0e-448f-93ef-4e686c18f7c3
Security Update For Exchange Server 2016 CU22 (KB5012698)
https://www.microsoft.com/en-us/download/details.aspx?id=103999 Don't forget to start the msp from an elevated cmd Prompt
Regards Andres Bohren
Hi All, Recently there was an Annoucement in the M365 Message Center that announced the depreciation of the Get/Set-PhishFilterPolicy. Move to the new Commands
Get-TenantAllowBlockListSpoofItems New-TenantAllowBlockListSpoofItems Set-TenantAllowBlockListSpoofItems Remove-TenantAllowBlockListSpoofItems The Get-PhishFilterPolicy will soon be depreciated
Get-PhishFilterPolicy | ft Sender, SpoofedUser, NumberOfMessages, DecisionSetBy, AllowedToSpoof, SpoofType
To see only the entrys, that are allowed to Spoof
Get-PhishFilterPolicy | where {$_.AllowedToSpoof -eq "Yes"} | ft Sender, SpoofedUser, NumberOfMessages, DecisionSetBy, AllowedToSpoof, SpoofType
Instead use this Command now
Hi All, A few Weeks ago i received the Mail below that was filtered out as Junk-E-Mail. So i took a closer look as it is legitimate. It contained a "Forgot Password" Link to theyr Portal. These are classic Phishing Techniques-
I took a look at the Mailheaders with the Message Header Analyzer https://mha.azurewebsites.net/ As you can see the Spam Confidence Level (SCL) is high at 5 and it's classified also as spam (SPM).
Hi All, I've recently had to deal with Litigation Hold. So i did a bit of research.
Place a mailbox on Litigation Hold
https://docs.microsoft.com/en-us/exchange/policy-and-compliance/holds/litigation-holds?view=exchserver-2019
When a mailbox is placed on Litigation Hold, items in the Purges subfolder are preserved for the hold duration specified by the Litigation Hold. The hold duration is calculated from the original date an item was received or created, and defines how long items in the Purges subfolder are held.
Hi Everybody, In June 2020 i applied for the Data residency move to the newly created M365 Datacenter Location in Switzerland
Today i had the following Message in the M365 Message Center Moving core data to new Microsoft 365 datacenter geos
https://docs.microsoft.com/en-us/microsoft-365/enterprise/moving-data-to-new-datacenter-geos?view=o365-worldwide
I've checked the Data location. As you can see the Exchange Data has been moved to Switzerland 😍
Regards Andres Bohren
Hi All, You might have stumbled over the Microsoft Anouncement of DNSSEC/DANE for Exchange Online. In this Blog i would like to explain how it works in detail Support of DANE and DNSSEC in Office 365 Exchange Online
https://techcommunity.microsoft.com/t5/exchange-team-blog/support-of-dane-and-dnssec-in-office-365-exchange-online/ba-p/1275494
Microsoft 365 roadmap
https://www.microsoft.com/en-us/microsoft-365/roadmap?filters=&searchterms=dane What is DANE? DANE is the abbreviation for "DNS based Authentification of Named Entities".
It requires DNSSEC https://www.ietf.org/rfc/rfc4035.txt Dane is defined in the RFC6698
The DNS-Based Authentication of Named Entities (DANE)
Hi all, Recently i was stumbled over a new expression called "BIMI"
What is BIMI? Brand Indicators for Message Identification or BIMI (pronounced: Bih-mee) is an emerging email specification that enables the use of brand-controlled logos within supporting email clients. BIM' leverages the work an organization has put into deploying DMARC protection, by bringing brand logos to the customers inbox. For the brands logo to be displayed. the email must pass DMARC authentication checks.
Hi Everybody, Instead of the delayed December Exchange Cumulative Updates, we've got Security Updates for Exchange 2013/2016/2019
Released: January 2022 Exchange Server Security Updates
https://techcommunity.microsoft.com/t5/exchange-team-blog/released-january-2022-exchange-server-security-updates/ba-p/3050699
In my Blog Post i'm covering the Exchange 2016 CU22 Security update.
Security Update For Exchange Server 2016 CU22 (KB5008631)
https://www.microsoft.com/en-us/download/details.aspx?id=103855
Please make shure you run the *.msp in an elevated CMD
Regards Andres Bohren
Hallo zusammen, Jeder Exchange Admin kennt das. Beim Update auf ein bestimmtes CU müssen manchmal Schema Updates gemacht werden, es gibt neue Prerequisits etc. Hier hilft die Website von Microsoft. Einfach die aktuelle Version von Exchange mit dem aktuell installierten CU eingeben und dann auswählen auf welches CU man aktualisieren will. https://aka.ms/ExchangeUpdateWizard
Anschliessend werden detaillierte Informationen zum Upgrade ausgegeben
Liebe Grüsse Andres Bohren
Hallo zusammen, Längst dürfte den meisten Benutzern das neue "Viva Insights" Outlook Add-In aufgefallen sein.
Klickt man auf das Outlook Add-in, dann öffnet sich auf der rechten Seite die Viva Insights Übersicht. Klickt man gar auf das Symbol mit den drei Balken, so öffnet sich das "Viva Insight Dashboard" im Browser
Das Dashboard kann auch direkt über https://insights.viva.office.com aufgerufen werden. Auf der rechten Seite gibt es das Zahnrad Symbol für die Einstellungen.