Exchange Center

ENow Software's Exchange blog built by Microsoft MVPs for IT/Sys Admins.

Posts about:

Microsoft SharePoint

computer code

Preservation Policies in Office 365

Image of Vasil Michev MVP
Vasil Michev MVP

Preservation policies were introduced almost a year ago as part of the Compliance Center in Office 365 (which you might also know as the Protection center, or as Security & Compliance Center after the latest rebranding). In a nutshell, they allow you to preserve content across (almost) all Office 365 workloads. They also provide support for true immutability of the data, such that even the company administrators cannot override.

Read More
keyboard keys

Are You Automating Enough?

Image of Michael Van Horenbeeck MVP, MCSM
Michael Van Horenbeeck MVP, MCSM

Earlier this week, Tony Redmond wrote about Jeffrey Snover – also known as the godfather of PowerShell – being promoted to Technical Fellow at Microsoft; one of the highest achievable ranks.

Given that Jeffrey is considered to be the founding father of PowerShell, that does not really come as a surprise, as PowerShell has changed the way we work and interact with systems. And this does not only apply to large-scale environments or cloud solutions like Office 365.

Read More
Solutions Engine blog

System vs. Application Monitoring

Image of Thomas Stensitzki
Thomas Stensitzki

When it comes to monitoring application administrators often disagree with system administrators on what to monitor and which thresholds to configure. By nature, system administrators focus on system related counters and objects to monitor. They do not care about application related monitoring as those information's are out of scope of their daily work. Vice versa the same is true for application administrators.

Therefore there is no and will never be a single monitoring solution to combine totally different interests in information. On the other hand, the business is highly interested in implementing a single monitoring solution to reduce the overall licensing cost (priority 1), reduce the number of servers required to host monitoring solutions (priority 2) and to eliminate the need for technical training (priority 3).

System monitoring and application monitoring systems sometimes share an intersecting set of “things” they are able to monitor. The fact is that both monitoring approaches have totally different procedures on how to monitor.

The following diagram illustrates the system monitoring approach, where a probe connects to a target and queries data using a dedicated protocol supported by the target (e.g. SNMP, WMI, SSH, etc.).

Read More