Migrate from Exchange 2010 to Exchange 2013

In this document we will be able to see all the requirements and steps that we must take to proceed with migrating a Microsoft Exchange environment 2010 to Exchange Server 2013. We must bear in mind that it is a long process and especially depending on the number of servers as well as mailboxes we have or their sizes, It will be a migration that will not require a service stop at any time.

Importing/Exporting Local Policies from/to GPO Directives with 'LocalGPO'

The other day we installed Microsoft Security Compliance Manager, today we see that within its installation we have a command-line utility called LocalGPO. It will allow us to export the local policies of a computer to a GPO policy backup to later use them in the Active Directory or import from a GPO backup (Active Directory) to the home team, Useful for computers that can't belong to a domain, teams in DMZ…

Microsoft Security Compliance Manager – Hardening our servers

Microsoft Security Compliance Manager 2 is a repository of Microsoft security templates that we can apply to our servers or PCs on our network providing greater security, since these templates are predefined depending on the OS. and the services run by the target machine. The good thing is that we will be able to keep the templates always 'up to date’ through updates that we can download from the console. We will be able to import GPOs, More Baselines… we will be able to edit/duplicate them and to apply them to our environment we will export them.

Integrating Lync Server 2010 with OWA

In this document, we'll look at how to integrate instant messaging between Microsoft Lync Server 2010 and Microsoft Exchange Server 2010 SP1 allowing our users to connect from the outside without the Lync client, something that is missing when it previously existed in Office Communications Server, so that our users, once logged into OWA, will be able to use instant messaging from a browser anywhere securely and with any device,

Enabling archiving in Exchange 2010 SP1

One of the important features that Microsoft Exchange SP1 brings us 2010 is the possibility of managing the archiving of our users directly in Exchange and being able to store it remotely wherever we are interested, for example in an archive database located on a secondary disk drive (without good performance, no RAID protection…) in order to maintain user mailboxes in accordance with our requirements; This is interesting for specific users who need to have a high volume of stored mail.

FAQ: OWA directory redirection in TMG

We will perform the following steps if we want our users not to have to write the /owa directory in Exchange, if we are using Microsoft Forefront Threat Management Gateway (TMG) 2010. 1º Create the rule to allow OWA to https://correo.midominio.com/owa (HTTP://www.bujarra.com/?p=4862). 2º Copy & Paste that rule into the TMG. Rename it and give it a correct name. 3º Edit it, from your properties: – On the “Action” put 'Deny'’ and redirect http to 'https://correo.midominio.com/owa'. – On the “Paths” delete all paths and create one with the following settings: External path: <same as internal> Internal path: /

Exporting and Importing Mailboxes or PST Files into Microsoft Exchange 2010 SP1

Prior to Exchange 2010 SP1 we used the Export-Mailbox command (Exchange 2007 and Exchange 2010) o Dive (Exchange 2003) to export our mailboxes to PST's files. Thanks to Exchange SP1 2010 we'll use 'New-MailboxExportRequest’ and it will therefore not be necessary to have any Outlook on premises. We will perform this procedure on an Exchange server 2010 SP1, We will have to indicate which user or group will be in charge of carrying out these imports or exports, so we will have to add the role of 'Mailbox Import Export'. Otherwise, by default members of the 'Organization Management'’ will have such roles.

Configuring Debian+Apache as an OWA Reverse Proxy in DMZ

If we have an Exchange installation and we want to publish OWA abroad, we should never open the ports directly to our Exchange, for this there are proxies located in the DMZ that will present us with our OWA. In this case we are going to set up a Reverse Proxy with DEBIAN and APACHE. To do this, we start from the fact that we have a debian installed in our DMZ with the port 443 of the WAN pointing at it and allowing the port to pass through 443 from our server to the LAN's Exchange CAS.