Posts

Showing posts from March, 2017

365 One Drive Business Setting up Synchronization

Image
Create a separate One Drive “Cloud Administrator” account and assign a 365 license to the account. From the file server open Http://portal.office.com and log on using the Cloud Administrator account Once logged on select One Drive as shown below: Once it sets up your One Drive you can select “Your OneDrive is ready” In the OneDrive Menu select Sync as shown below: Click Allow this website to open an app: It will pop up the following “Getting Ready to sync…” if nothing happens or if you get prompted that you need an app. Then it does not have the proper version already on the system you may have to click on “Get the latest version of OneDrive as: You should then see the following to enter in your Cloud Admin account and sign in: You will get prompted with a password logon for Office 365 which will require that same account Sign in. Then you will see the following which we will redirect to the folder we want to sync by selecting “Change Location” In this case I will go to the D:\

365 One Drive Business Share Permissions

Image
Create a separate One Drive “Cloud Administrator” account and assign a 365 license to the account and setup the One Drive Share sync. Once that is done to edit cloud permissions: From the file server open Http://portal.office.com and log on using the “Cloud Administrator” account Once logged on select One Drive as shown below: It will open your One Drive Business share: To change permissions, select the check box to the left of the file or folder as shown below: Right Click and select Details as shown below: You will notice on the right side the file details scroll down to “Sharing” as shown below: That will expand to show you the file or folder permissions from there you can add people, stop sharing to that person, or revise read/write permissions as shown below: CAUTION: These are One Drive share permissions ONLY this will not impact your share permissions internally on the file share those permissions should be modified as well. Note: I would recommend using fo

Veeam backup fails with “Virtual Disk is not a multiple of” error

Depending on what other backup, build, or restoration solutions you have in place you may see a “virtual disk is not a multiple of…” error when backing up with Veeam. The error sounds quite ominous like a major disk issue on the host. The good news is it ends up it is a quick fix on the VM using the GUI interface. Open up the VM settings and resize the virtual drive from the weird size such as 79.435346435 GB to 80GB and the same for the secondary or other disks for example 250.45346324GB to 251GB. Then access the VM and expanded the drives via the OS. If it is already a “normal” drive size try going up another drive size for example 80GB to 81GB and expand the drive in the OS. Then test the backup job. Credit: Veeam KB article https://www.veeam.com/kb1848

Thunderbird to Office Migration

There are several tools out there to migrate your email from Thunderbird to PST that you can then import into Office. Many of them are pay per license. I would stay clear of the freeware version. One pay version that I am familiar with is: http://www.thunderbirdtooutlook.com/description/ It does a decent job of exporting/importing. Note: In the case of my imports there was a lot of malware hidden in the old Thunderbird email that my Antivirus found and quarantined as it was exporting. So I would recommend you make sure your Antivirus is online and up to date. Importing contacts however from Thunderbird can be time consuming due to the fact that Thunderbird and Office use different headers for the categories. Once I exported from Thunderbird to a CSV file I edit it with excel and changed the headers to match what Office is expecting. That avoids manually mapping during the import process. I was then able to cut and paste the header to all the exports and import them into Office sea

Office 365 Configuration XML made simple

Creating the configuration XML can be a time consuming and multiple test and fail process before your finally get what you want for that ONE deployment. Luckily now there is a tool for that and it is located here: https://officedev.github.io/Office-IT-Pro-Deployment-Scripts/XmlEditor.html This tool will create a complex XML file for you allowing you to select version, excluded programs, remove products, configuration manager support, custom options, update options, silent mode, EULA, logging and even includes templates and an installation toolkit. Credit: Jason Powell

Macro Exploits–Trusted Locations what you need to know

Image
Malicious macro exploits have been a security issue for Office since the day macros were introduced. There are lots of legitimate work flow macros, so you cannot by default disable all macros in all Office programs. In the past you could create trusted macro locations within your network or system to add a layer of protection and prevention from malicious macros running. GPO- Configuration/Administrative Templates/Microsoft Office XXX 20XX/Application Settings/Security/Trust Center/Trusted Locations The latest threat though, with the added use of cloud locations, makes that harder to control and disable external document macros. While there is now an option to “Block macros from running in Office files from the Internet” unless users save the “trusted” cloud documents to a local path, designated as trusted in the GPO or system, then it may block legitimate work macros as well. So you will need to plan accordingly and remind the users “what to” and “what not to” open and where. Knowi

Office 365 increased email filtering

Image
With Office 365 there are many features you can enable to reduce additional spam and malware. Below are a few of the higher level settings that can compliment your existing email filtering. On your Office 365 Console open the “Exchange Admin Center” select “protection”, select “malware filter” and edit (pencil) your Default rule as shown below: The rule above is a more severe setting that deletes the full email with known potential malware type extensions. You can however make it more end user admin friendly by using the other settings to strip the attachment instead and alert the reciever that is was removed. Note: Don’t forget to hit “Save” in the bottom right hand corner In the same “protection” section select “connection filter” and “enable safe list” to allow Office 365 known safe senders as shown below: Note: Don’t forget to hit “Save” in the bottom right hand corner In the same “protection” section select “spam filter” and updated your “allow list” with senders and domains to

How to Relay Veeam Endpoint Protection email using GMX

Image
Setup a free email account at http://www.GMX.com and enable send and receive via external programs under Settings, Email, POP3 & IMAP as shown below: Veeam Endpoint protection by default lets you email and authenticate to “yourself” so use your GMX account as shown below and then click “Test Message”: Open up your inbox on GMX and confirm you received the email as shown below: Now you need to setup a filtering rule to forward those emails to your work distribution group. Go to Settings, Folder, Filter Rules, and select “Forward e-mails to another email account” as shown below: You then enter in the GMX email address as the “email from sender” you want to forward and “forward email to” address and click “Create Filter Rule” as shown below: Once applied from Veeam Endpoint Protection initiate a test email and you can confirm the rules work.