logo
November 10, 2016 | Jonathan Hassell

Should Mailboxes Be Shared or Inactive?

When people leave the company, change roles, or departments get closed, oftentimes you’ll need to keep the messages and mailbox contents that accumulated while those accounts were in service. To do this used to be fairly simple for organizations that were running Exchange Server on premises...
August 18, 2016 | Jonathan Hassell

Visibility Tips: Who Has Access to Mailbox?

Most organizations with more than 10 or 20 people on staff that are running either Exchange Server on premises or Office 365 in the cloud have mailboxes that are shared on some level. These scenarios could include the following: An executive or manager that generally handles his own tasks but...
August 9, 2016 | Matt Hopton

5 Free Exchange Security Tools You Probably Don’t Know About

Exchange email security is a huge front to defend. There are now so many attack surfaces that it can be hard to decide how to start. Here are a few things that you might want to consider when thinking about your Exchange infrastructure security setup. This is by no means a full list. 1. Full...
April 22, 2016 | Danny Murphy

Exchange Best Practices: How to Detect Who Accessed Another User’s Mailbox

Using shared mailboxes in Office 365 can facilitate communication in team projects. However, giving multiple users access permissions for the same mailbox increases the risk of security incidents and leaks of sensitive data. Non-owners with access rights can, unintentionally or maliciously, forward...
April 20, 2016 | Alex Vovk

4 Rules to Enhance Email Security in the Cloud

The long-existing problem of email hacking appears to be unsolved by 2016. According to the recent warning released by FBI, companies have lost above $2.3 billion over the past three years due to email frauds, in which the employees are tricked into wiring funds to adversaries by fake messages sent...
June 2, 2015 | Brian Svidergol

Phishing Attack Catches Another Organization Off Guard

Saint Agnes Health Care, Inc. announced that an attacker successfully phished an employee and obtained personally identifiable information of approximately 25,000 patients. The information included names, dates of birth, gender, medical record number, insurance information, and limited clinical...
October 15, 2014 | Krishna Kumar

Understanding the Mailbox Move Request in Exchange 2010

Mailbox Move Request is the process of moving a mailbox from its source mailbox database to a target mailbox database. Target mailbox database can be either on the same server or on a different server or even in a different domain/forest.  Mailboxes are moved for various reasons like transitioning...
August 1, 2014 | Krishna Kumar

Exchange 2013 Reseeding Automation

Reseeding is a process of updating the failed mailbox database to be in sync with the Active mailbox database. This has been greatly improved in Exchange 2013. Some of the new and interesting features in Exchange 2013 is Automatic Reseed and multiple databases per volume. AutoReseed is purposed...
July 22, 2014 | Krishna Kumar

Exchange 2013 Mailbox Audit Logging

We continue the “Deep Dive” series. In it you might find the answers to some of your technical questions. The industry experts will provide their insights on several topics and research some new features of most popular applications. Don't miss out on the article about Administrative Audit...
...