At Ignite 2019, Microsoft announced the Connected Cache (previously known as Delivery Optimization In-Network Cache (DOINC)). I’ll take a closer look at it now. But what do you really need it for?Continue reading “Implement Microsoft Connected Cache with SCCM”
This article is part of my migration from my old Office 365 to my new Microsoft 365 Tenant. It is also about setting up Office 365, the other Microsoft 365 topics will follow later. I also have written this article intentionally so that it can also be used for setup outside of a migration scenario. Part 1 was about choosing the right edition, setting up the account and configuring the domains and DNS.Continue reading “Setting up Office 365 – Part 2”
This article is part of my migration from my old Office 365 to my new Microsoft 365 Tenant. It is also about setting up Office 365, the other Microsoft 365 topics will follow later. I also have written this article intentionally so that it can also be used for setup outside of a migration scenario.Continue reading “Setting up Office 365 Part 1”
This article is part of my migration journey from my old Office 365 to my new Microsoft 365 Tenant. This article is about mail traffic during the migration and how to avoid data loss.
In May 2015 I have already written the article “Migration from one Office365 Tenant to another Office365 Tenant“. I will adopt and adapt the relevant parts from the old article here.Continue reading “Preparing the mail flow for the Office 365 migration”
As MCT, I have a developer tenant for Office 365, and this year we are finally getting access to the Microsoft 365 function, i.e. Enterprise Mobility and Security. The disadvantage is that a new tenant is required and so a migration is pending. But at the same time, a lot of things have to be set up from scratch. I take the opportunity to write a series of blog posts directly from this.Continue reading “Migration from an Office 365 to a new Microsoft 365 Tenant – The approaches to migration”
This time an article slightly outside the Microsoft world. This time there is an excursion into monitoring and the monitoring of web servers under Linux. Some know this, nothing is worse than when the website you want to visit is not reachable. Since this happened to me 2 times in 2 days, the web server has hung up and I could not find the error, something had to be done.Continue reading “Website monitoring with PRTG”
As most people know, I like to make my life easy at work. That doesn’t mean I’m afraid of work, I just like to automate or simplify it where I can. I like to use PowerShell for this.
Another reason besides the convenience or lack of time why you should solve tasks through scripts is a consistent level of quality. Let’s face it, who doesn’t know this, even if there are checklists, you might forget one step when you get distracted.Continue reading “Creating Users Easily with PowerShell”
I am often asked, what actually is this Azure-AD? I thought I could dedicate a blog series to this question, after all it is becoming more and more important. In this series, I will also write about authentication methods, types of identities and objects, licenses and compatible services. In short, everything about Azure Active Directory.Continue reading “Microsoft Azure AD – what do you need it for?”
Welcome to part 2 of the Azure-AD series. This part covers license types and features. We will also deal with the topic of license procurement and licensing possibilities. Due to the scope of functions, I cannot describe all functions contained in the individual licenses in this article. But I try to cover as much as possible and to provide links to further information.Continue reading “Microsoft Azure AD – the license types and functions”
Windows Remote Management is no longer a way to think in today’s world. But why do we do it unencrypted? Normally the authentication is done by Kerberos. That’s secure enough for most people. However, Kerberos also has limitations, for example when using local accounts.
In the standard system, communication is via HTTP via TCP port 5985. Why not HTTPS? This is possible, the port TCP 5986 is intended for this. Unfortunately, this is not only missing in the firewall rule templates but also has a few barriers still in the way. We take care of these barriers today.Continue reading “Windows WinRM over HTTPs”