Search This Blog

Tuesday, May 24, 2016

threats from Pete - Microsoft licensing

-----------
after v3 of ELOP, Pete suddenly become angry ...

Please note that this document identifies a license shortfall.  We would ask you to please remedy the shortfall identified within the attached by acquiring the necessary licenses within the next 10 working days.  We will be able to complete this process once we see that an order has been placed.  Please feel free to email me confirmation of the purchases you have made, e.g. agreement numbers, copy/ies of invoices, etc so that we can expedite the completion of this process.

We encourage you to speak with an authorised Microsoft Reseller/Partner on this matter.  If you do not have an incumbent partner we would be happy to arrange for a preferred Microsoft Partner to reach out to you.  Please let us know via return email if you would like us to initiate a referral.

-------------------

I feel shocked and angry as previously Microsoft asked for 5 windows server 2012 R2 licenses which I proved the customer already bought.

now I have to prove local ms pete is correct in saying the shortfall for the un-priviledged customer

-------------------------------------------------------------------------

Saturday, May 21, 2016

one - click convert O365 user mailbox to a user mail box and the other way around

one - click convert O365 user mailbox to a user mail box and the other way around

https://blogs.technet.microsoft.com/exchange/2015/02/06/single-click-mailbox-conversion/

Admins can now convert a cloud-based user mailbox to a shared mailbox with a single click in the Exchange Admin Center (EAC). No more needing to use PowerShell. Similarly, a cloud-based shared mailbox can be converted to user mailbox with a single click, as well.

Wednesday, May 18, 2016

Sunday, May 15, 2016

Office 365 manage office installations

Office 365 manage office installations

-

https://community.office365.com/en-us/f/153/t/409077

-- basically

 1.Sign into the Office 365 portal and click Admin.
 2.Choose UsersActive Users in the left.
 3.Choose yourself and click Edit Office Installations.
 4.Deactivate the device.

Saturday, May 14, 2016

exchange 2016 - message transport services and components

smtp receive and smtp send
the categorizer
pick up and replay directories
store driver
submission queue and delivery queue
transport agents

AD DS and Exchange server integration -

AD DS and Exchange server integration -  (source : mva)

forest  ---------- Exchange organization

schema -------- exchange object classes and attributes

configuration ------ exchange configuration

domain 000 exchange recipients

global catalog ---- exchange object attributes for mail-enabkled and mailbox-enabled objects

Thursday, May 12, 2016

default passwords -- where I can find those

http://www.defaultpassword.com/

default passwords -- where I can find those


can you join a windows embedded to a domain

can you join a windows embedded 7 or the likes to a domain

look like -- yes

https://www.microsoft.com/windowsembedded/en-us/windows-embedded-7.aspx

Enterprise connectivity and device management: Active Directory, Domain Join, Group Policy Network Access Protection, Windows Update, System CenterBulletBulletBullet

Sunday, May 8, 2016

office 2013 automatically upgraded to Office 2016

on 2 PCs, on this Mothers Day

offcie 2013 upgraded to office 2016

I have Office 365 E3 licenses

Saturday, May 7, 2016

quotes and expressions in powershell

https://technet.microsoft.com/en-us/library/hh847740.aspx

https://blogs.msdn.microsoft.com/powershell/2006/07/15/variable-expansion-in-strings-and-here-strings/


retrieve the properties and methods for an object in PowerShell

retrieve the properties and methods for an object in PowerShell

Using the Get-Member Cmdlet


Thursday, May 5, 2016

Cryptolocker targets some of the most important files on a PC: things like pictures, documents, movies, music files, etc.

http://searchitchannel.techtarget.com/tip/Cryptolocker-ransomware-protection-A-new-reason-for-old-advice

, according to reports on those who admit to having paid the ransom, less than half say they received a decryption key after payment.

( all quotes)

Ransomware is an absolute pandemic. Threat actors are increasing

Ransomware is an absolute pandemic. Threat actors are increasing 

http://searchwindowsserver.techtarget.com/feature/Ransomware-protection-is-futile-but-all-hope-is-not-lost?utm_medium=EM&asrc=EM_NLN_56585633&utm_campaign=20160504_Ransomware%20prevention%20isn%27t%20feasible,%20so%20do%20the%20next%20best%20thing_tholman&utm_source=NLN&track=NL-1810&ad=907489&src=907489

The ultimate ransomware protection is a backup that is physically disconnected from the rest of your network. The next closest thing is something that can read your network but cannot be written to or controlled by your network.

Everything is about compartmentalization

( all quotes)

Sunday, May 1, 2016

Set mobile device management authority - intune

Set mobile device management authority - intune

as there are many ways to manage

need to set an authority

Microsoft cloud device management stack --- Office 365 , intune, SCCM + iNtune

Microsoft cloud device management stack --- Office 365 , intune, SCCM + iNtune

actually

there are a plethora of Microsoft offering on the cloud for managing devices

1/ Office 365 device management

2/ intune device management

3/ SCCM device management

3/ SCCM + intune

complicated -- heh