logo

Top 5 Tips for a New Network Administrator

Imagine you’re in the position to take over a new job as a network administrator. Finally, you get to be the boss! Sounds good, right? But what if you’re taking over a network that you know little or nothing about, and the person who previously managed the network has already left so you have no … Continued

Exchange 2013 Mailbox Audit Logging

We continue the “Deep Dive” series. In it you might find the answers to some of your technical questions. The industry experts will provide their insights on several topics and research some new features of most popular applications. Don’t miss out on the article about Administrative Audit Logging. The first article of the series can be found here. Also, … Continued

Exchange 2013 Administrator Audit Logging

We continue the “Deep Dive” series. In it you might find the answers to some of your technical questions. The industry experts will provide their insights on several topics and research some new features of most popular applications. The first article of the series can be found here. Also, read more about Exchange 2013 CAS configuration (Part … Continued

Disaster Recovery: The Four Pieces

I don’t care where you’re from, we can all relate to this one.  It doesn’t matter if you’re from the United States, Brazil, Russia, China, or wherever.  Someplace, somewhere,  we were chowing down on something as a child and taking huge bites and just cramming our mouths full, and our mother gave us that look … Continued

PowerShell to Customize RBAC Permission in Exchange 2013

We continue the “Deep Dive” series. In it you might find the answers to some of your technical questions. The industry experts will provide their insights on several topics and research some new features of most popular applications. The first article of the series can be found here. Also, read more about Exchange 2013 CAS configuration (Part … Continued

How to Protect Backed Up Data from Human Error

As a systems administrator, it is important to remember that you don’t just need to protect sensitive data stored on production servers from being accessed by unauthorized third parties. You need to also have a plan for the security of backed up data. Just because the data isn’t hosted in the production environment doesn’t make … Continued