Solving “Big Problems” in Security by Building a Service Model

Remediating strategic security concerns can be very difficult, particularly in large organizations with diverse and rapidly evolving product lines. While security is critically important for every part of an organization, individual security risks are not necessarily the most urgent problem to solve for all teams at the same time. That means our ability to effect […]

Continue reading

Closing Open Doors by Bringing Vulnerabilities to Resolution – Six Essential Questions

New vulnerabilities are discovered every day, and they are an intruders’ best friend. It’s a bit like a burglar finding the door unlocked and wide open; he’s going to have a really easy day at work and you’ll be wondering for a long time why you left it open. Therefore, it is absolutely critical to resolve […]

Continue reading

Internet Security @ Home: How to Protect Your Kids Online

Protecting our children is one of the most important things we are charged with as a parent, and for thousands of years parents have used their own experiences growing up in order to know what to protect their own kids from. It only took three summers of burnt fingertips in the 80’s for me to […]

Continue reading

Buy The Book: “The Exceptional Presenter” by Timothy J. Koegel

“Every time you open your mouth to speak in public, you are a public speaker.” – Koegel It’s easy to forget how often we really present at work. It’s not just those rare occasions where we are asked to stand up in front of a large group of people. It’s every time we are speaking […]

Continue reading

The Fatal Flaw of the Apple Pencil

I’m not an artist. I’m a highly mobile business user. I use my iPad Pro several hours a day, and absolutely love the Apple’s Smart Keyboard that goes along with it. It’s the primary way I interface with my tablet. Coupled with Office 365 and a handful of apps, I can pretty much do anything […]

Continue reading

Buy The Book: “How to Hire A-Players” by Eric Herrenkohl

Recruiting IT professionals has never been more challenging. The demand for solid performers is increasing while the skill set becomes more difficult for an individual to acquire, leading to a serious deficit of available talent. As managers, we are judged largely on the success of our team, which means hiring and leading exceptional individuals. In […]

Continue reading

How to Explain Virtual Desktop Infrastructure (VDI) to Management, Executives, Etc

I recently had a need to explain what exactly VDI is to a group of executives without getting technical, which is pretty difficult because VDI has a lot of technical complexities. This did a pretty good job of not only giving a good idea of “what” it is, but “why” we need it. To understand […]

Continue reading

Why Is An SMTP Address Displayed on the “TO” Line for Some Addressee’s and Not Others in Outlook?

Ever wonder why some addressees in the “TO” line of an Outlook email show the actual email address next to the contact name, and others just show the contact name without an email address? Like this: It all has to do with where you originally chose the addressee from. If you chose them from your […]

Continue reading

Event ID 5003 Generated When Starting Exchange 2010 Information Store Service (Even With Correct Server Time)

I ran across an interesting issue with an Exchange 2010 Mailbox Server (SP1 RU6) recently where the Information Store service would not start on a DAG member after a reboot. Every time I tried, even after additional reboots, I got this error message: Source: MSExchangeIS Event ID: 5003 Description: Unable to initialize the Information Store […]

Continue reading

How to Append Outlook 2010 Safe Senders List via Group Policy Object

I recently wrote an article about using the Exchange Management Shell to quickly add/remove addresses in the Outlook Safe Sender’s list. However, it’s dependent upon Exchange 2007/2010 and while it gets the job done for current users (or a subset of users), it doesn’t solve the problem for future users. Fortunately, we can use a […]

Continue reading

How to Enable Opportunistic TLS on an Exchange 2010 Edge Transport Server

Microsoft has an excellent guide available for configuring Mutual TLS with a trusted partner. However, the same cannot be said for enabling Opportunistic TLS. That’s probably because Opporunistic TLS is generally automatically enabled set up as part of a routine configuration of an Edge Transport server. However, that’s may not have happened in your case and […]

Continue reading

Outlook 2007/2010 on Windows XP Cannot Connect to Availability Service with Exchange 2007/2010

I ran in to an interesting issue recently with some users reporting that they could not see Free/Busy information. Upon further discovery, I found out that they couldn’t use the Out-of-Office Assistant either. The immediately tipped me off that we had some sort of issue Availability/AutoDiscover. We narrowed it down to our users using Windows […]

Continue reading

How to Bulk Modify “Safe Senders” List in Outlook with Exchange Management Shell

Adding an email address or domain to the Safe Senders list in Outlook for all of your user mailboxes can be handy for a number of reasons. For me, we wanted to add the email address of an externally generated newsletter from a trusted source to everyone’s “Safe Sender” list so that images within the […]

Continue reading

Attempting to Remove Additional Mailboxes from Outlook 2010 Fails

I had an issue escalated to me today where a mailbox that had been properly removed from the “Open These Additional Mailboxes” box in the Advanced properties of an Outlook profile did not disappear from Outlook as expected. We attempted to remove the relevant keys that were still hanging out in: HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profile […]

Continue reading