Legacy Public Folder Migration – Notes from the Field
This post is about a recent migration of legacy public folders hosted on Exchange Server 2007 to modern public folders hosted on Exchange Server 2013.
ENow Software's Exchange blog built by Microsoft MVPs for IT/Sys Admins.
This post is about a recent migration of legacy public folders hosted on Exchange Server 2007 to modern public folders hosted on Exchange Server 2013.
There are a few words Microsoft likes to use in several different situations. “Federated” is a great example of this. Federated can mean several different things in the Microsoft world, and it can sometimes be hard to tell what sort of “federation” you’re talking about.
“Supported” is another word Microsoft uses to mean different things in different situations, and what I’d like to talk about in this blog post.
This is a blog post I never thought I'd write, and just a short time ago, I couldn’t have imagined it would be something that you'd want to spend 10 minutes reading. Turns out “the cloud” really does keep us on our toes.
In part 1 of this series, I discussed how to connect to the Exchange database cache and the importance of transaction logs in database transactions. In this next part, you'll learn how transaction logging and recovery work in Exchange.
Exchange database internals might seem to be a complicated topic, but we’re going to briefly discuss database internals from a very practical perspective.
Despite the recent surge in popularity of the cloud, moving to Office 365 isn't a viable option for every modern-day business. For this reason, enterprise-based Exchange will continue to be a mission-critical platform for many companies, and Microsoft has shown no sign of abandoning the platform anytime soon.
Microsoft recently announced a new DAG copy activation feature that will be available in Exchange 2016 CU2, but before we talk about that, I’d like to do a quick refresher on how database copy activation works currently and will continue to work for Exchange 2013 and 2010.
Spoofing has long been one of the biggest issues with email, and with the move to cloud services in the last few years it has become an ever hotter topic. Although a number of features designed to combat spoofing exist, many of which have been discussed on the blog, no perfect solution is available.