Category: Exchange Server

In this blog, I will review the configuration needed in order to activate Kerberos authentication with Exchange 2019 servers. General Kerberos authentication for Exchange’s is not configured by default when using a commonly shared namespace for more than one Exchange server. The reason is that the shared namespace URL, for example, mail.contoso.com is not “attached” to a […]
The scenarios in this topic describe the deployment solutions for address book policies (ABPs) in three of the most common organization types where multiple entities (companies, government agencies, school classrooms, etc.) share a common Exchange environment. In all scenarios, a recipient filter divides recipients into separate virtual organizations, which then defines the ABPs that are […]
Configuring ASA (Alternate Service Account) for Kerberos authentication on all of the CAS servers We will setup ASA (Alternate Service Account) for Kerberos authentication on all CAS servers in kkishoreblog.com resource forest. By default, clients that attempt to negotiate authentication will fail Kerberos authentication when a CAS array is configured thus falling back to NTLM. […]
Exchange ASA configuration The coexistence of both Exchange Environments requires us to configure the Exchange Service (ASA) for Exchange 2016. The existing account should not be used for both environments. https://docs.microsoft.com/en-us/exchange/architecture/client-access/kerberos-auth-for-load-balanced-client-access First check if the Exchange 2010 Environment has ever been assigned or configured with an ASA. Get-ClientAccessServer -IncludeAlternateServiceAccountCredentialStatus | fl name, age * Create […]
This question seems to get asked a lot, and people are unaware how easy the answer really is. Here it is: List all mailboxes to which a particular user has Full Access permissions: 1 2 3 4 5 6 7 8 9 10 PS C:\> Get-Mailbox | Get-MailboxPermission -User vasil Identity             User                 AccessRights --------             ----                 […]
As mentioned, in the Exchange-based environment, the Exchange mail connectors are automatically configured to use the option of opportunistic TLS. The configuration of opportunistic TLS is automatically configured on the default incoming mail connector and, on the default outgoing mail connector. Exchange on-Premises infrastructure | opportunistic TLS settings In the following section, we will review the default settings […]
We have been seeing the different Architecture of the Exchange Server and has been implementing those architecture on our environment. One of the major component on the Exchange Architecture is Edge Server. There might be different WH question for the Edge server like, WHAT, WHY and HOW. So, on this blog I am sharing my […]
In this tutorial we’ll explore the purpose of a Room Mailbox in Exchange Server 2010, how to create a Room Mailbox, and look at different ways to configure a Room Mailbox to suit different scenarios. Exchange Server 2010 Room Mailbox Overview A Room Mailbox is a special type of mailbox that is assigned to a […]
Archives