How to Delete a User Profile from Server 2008 Terminal Server

Introduction DISCLAIMER: EditingDeleting registry keys is very dangerous and should always be done with caution. Before making any changes to the registry please create backups...

Some Group Policy areas are missing from the Group Policy Editor

SUMMARY When you open the Group Policy Editor MMC snap-in tool, focused either on a local GPO or AD-based one, some Group Policy areas that...

Office 365 now supports larger email messages—up to 150 MB

For the last few years the largest email message you could send or receive in Office 365 was 25 MB. While 25 MB is...

How to set Exchange Online mailbox sizes and limits in the...

INTRODUCTION This article describes how to use Exchange Online PowerShell to set Exchange Online mailbox sizes and limits in the Microsoft Office 365 environment. PROCEDURE To set...

Important notice for Office 365 email customers who have configured connectors

If you’re an Exchange Online or Exchange Online Protection (EOP) subscriber and you have configured connectors, this post contains important information that might impact...

ESET Anti-Virus Light System Foot print

https://youtu.be/kCeRurXUTXo

Basic Tintri Storage Tasks with Powershell

Download Tintri powershell tools here: http://urbannerd-consulting.com/?page_id=7094 Launch the Tintri Powershell Module Next we will connect to the Tintri Server Using the following command : Connect-TintriServer TintriServer (zactst01) Next you...

How to Manually Configure Outlook for Office 365

How to Manually Configure Outlook for Office 365. This is especially handy if you encounter issues with auto-discover attempting to connect to the Exchange server. Here’s...

VMware vs Hyper-V – Virtualization Battle

VMware vs Hyper-V is the hot topic in the virtualization Market because more than half of all server workloads are virtualized currently. It will be...

How to Disabled OWA Signatures in Office 365 for all Staff.

This is normally done if a 3rd Party email branding software like exclaimer or CodeTwo is being used. Native to Office 365 (Exchange Online) there...

Outlook on the web makes going on vacations less stressful

Outlook on the web makes going on vacations less stressful by Outlook Team,   Vacation is a time to relax. However, the weeks leading up to it can...

DHCP Server UI displaying wrong IP address in Windows 2012 (169.254)

Got to help out with a customer with a very interesting query. Authorized DHCP server not showing the correct server name or IP instead...

Find MAC Addresses of member NICs in a Native Windows Team

This article describes how to get the MAC addresses of all member Network Interface Cards (NICs ) in Native Windows Network Teams  present in...

HOW TO: Add UPN Suffixes to a Forest

This article describes how to add UPN suffixes to a forest. Adding these suffixes gives you the ability to use a friendly user-logon name...

Finding Domain Controllers with Powershell

One Liner in PowerShell to provide the following information . 1.Domain Controllers 2. Forest 3. Ipv4Address 4.OperatingSytem 5.Is the Server a Global Catalog   First we will start by running a...

Office 365 Plan Selector Tool

Microsoft released a tool to help you find the right Office 365 plan for your organisation . This tool allows you to select what you...

Creating fine grained password policies through GUI Windows server 2012

A quick description of fine grained password policies is that you can specify multiple password policies within a single domain. You can use...

Customize junk e-mail protection for Outlook for mac

You can adjust the junk e-mail filter so that it classifies more or fewer messages as "junk." IMPORTANT: Junk e-mail protection is available in Outlook for...

Cannot Rename Computer Name or Un-join Computer – Certificate Services 2012

Introduction: Careful consideration should be made before installing Certificate Services on the Windows Server 2012. A proper CA hierarchy should be design along with Naming...

Authenticate Google Apps email with DKIM

About DKIM You can help prevent spoofing by adding a digital signature to outgoing message headers using the DKIM standard. This involves using a private domain key...

System Center Virtual Machine Manager Host in “Pending State”

In Virtual Machine Manager (VMM) 2008 or VMM 2008 R2 or VMM 2012 R2, pending hosts are cluster nodes that VMM discovers and that are not currently...