The ability to run searches across a mixture of Exchange mailboxes and SharePoint sites to uncover the deep and dark secrets of those who would prefer their work to go unnoticed is what, in some degree, eDiscovery is all about. Microsoft has in...
Part of planning a deployment of a new on-premises release of Exchange is a review of client requirements. It’s therefore reasonable that anyone who is interested in deploying Exchange 2016 might start to look at clients to make sure that...
Some interesting discussion has flowed into my mailbox since Microsoft announced their decision to stop cleaning out the Deleted Items folder of user mailboxes in Office 365. The announcement appeared on February 20 and started a 28-day countdown...
Slack, the interoffice chat program that has reframed how many companies talk to themselves, has been growing at a meteoric rate based mostly on word of mouth. Now their chief executive wants to get serious about growth — and that means IT...
The notion of “best practice” has long been an elastic commodity when applied to Exchange architecture and design. Consultants and consulting companies have professed to have their own magic method to ensure the successful deployment...
Last week, I wrote about a report issued by security company Cybereason that reported how an attacker had gathered 11,000 sets of user credentials after planting a compromised OWAAUTH.DLL file on an Exchange server. A spirited debate duly resul...