Some of my customers mailboxes were still displaying 25gb as their mailbox storage quota size instead of 50gb.
External recipients don’t receive email messages that are send to a distribution group in Exchange Online.
During one of my recent migrations from an on premise Exchange to Office 365 some people complained to me that some distribution group members didn’t receive messages send to this distribution group.
During my tests I’ve noticed that the external Anti-Spam solution didn’t accepted the messages he received for the external recipients. I also noticed that the sender was not getting any non-delivery reports.
After some investigation I found out that the distribution group parameter “ReportToOriginatorEnabled” in Exchange Online by default is set to False, which is different from the on premise Exchange version where this parameter is by default set to True.
To fix this behavior I used PowerShell:
Set-DistributionGroup “<DistributionGroupName>” – ReportToOriginatorEnabled $true
Submitted by Bart Roels – https://twitter.com/FomeZ – @FomeZ
Main selling point
Versioning has always been one of the main selling points for SharePoint Document Management. At least, that’s what I always use as an, there are more of course, argument for storing documents in SharePoint instead of file shares. While I was preparing my presentation about Best Practices: Document Management in SharePoint 2013 for SharePoint Connections Amsterdam 2013, I started to wonder if versioning worked as well as I thought it did. Let’s take a closer look.
When are new versions actually created in SharePoint? A new version is created when you:
- Upload a new document
- Upload document with the same name
- Change the properties of the document
- Open, edit or save the document
Upload a new document
Upload document with the same name
Change the properties of the document
Open, edit or save the document
What about co-authoring? Working together with multiple people in the document, how does this impact the versioning? This is the official answer from Microsoft:
Does it work?
The token security issue reported in May 2013 (Read the full story on http://adallom.com/blog/severe-office-365-token-disclosure-vulnerability-research-and-analysis/), that Office Pro Plus could be tricked in sending out it’s token for Office 365 while talking to a malicious site. Through that mechanism users tokens could be collected and be used for easy access to the users data, mailbox, …
The resolution is finally released as a part of the automatic updates of Windows/Office. You can download the patch on http://technet.microsoft.com/en-us/security/bulletin/ms13-104 if you only want to deploy this one.
I urge you to install it as soon as possible.
Read also Paul Robichaux’ blog post about the topic: http://paulrobichaux.wordpress.com/2014/01/02/office-365-token-disclosure-flaw-patch-your-desktops-now/?utm_content=buffer0f5ae&utm_source=buffer&utm_medium=twitter&utm_campaign=Buffer
The influence of Activating SharePoint Server Publishing Infrastructure on Security Trimmed Navigation
Security and Navigation, it’s something we need to be really careful with. it’s really frustrating seeing navigation items where you don’t have access to and it’s even more annoying to not see your navigation even though you have access to the library or to one of the items in it. According to the technet article http://technet.microsoft.com/en-us/library/dn169567.aspx giving access to an item is a SharePoint Library for a certain user will result in the assignment of Limited Access on the top levels to
“is to allow enough access to the object hierarchically above the uniquely permissioned item so that the Object Model (OM), master pages, and navigation can display when the user attempts to navigate to the item. Without the Limited Access permissions at the parent scopes, the user wouldn’t be able to successfully browse to or open the item that has unique permissions.”
This results in:
Let me transform this into a Real Case Scenario:
We have a Document Library Finance where only the CFO and his team have access to. In the current navigation (left side menu) only the CFO and his team will see the Document Library Finance. Every other employee will not see it since they don’t have access to the Library or to any document in that Library.
One document Expenses.xlsx must be editable for every user since they have to add their expenses in that spreadsheet. So the CFO assigns everyone with Contribute rights. As mentioned in the technet article everyone will receive Limited Access rights on the Library. In SharePoint 2013 limited access rights are not shown in the Permission Overview to avoid any confusion like we had in SharePoint 2010. So Far So Good, everyone can see the library Finance.
Since we want to incorporate some publishing features like Master Pages, Page Layouts, … we need to activate SharePoint Server Publishing Infrastructure. At that exact moment the library Finance disappears from the Current Navigation. It is only visible to the CFO and his team. The document Expenses.xlsx is only available through a direct link or when used by the WebPart/AppPart Finance.
Deactivating the feature doesn’t rollback the damage. So Be Very Careful. Since it occurs in SP On Premises & Online I doubt it that it’s a bug but a change/feature/opportunity in the platform. In my humble opinion a bad one. I’m still hoping it’s a bug. I’m also hoping pigs can fly and hell freezes over, …
I’ve made a screen cast of a similar process which you can find on YouTube : http://youtu.be/6WCqqbOE53k ..
When we create a room mailbox, we can define if the room uses delegates or does an auto accept when possible. We can define a basic setting during the creating of the room mailbox. Do to define a resource mailbox, go to Admin > Exchange > Recipients > Resources and click on the +
When we edit the Room mailbox we have more settings.
But there is one little caveat. In this scenario every conflict will result in a Tentative instead of a Rejected meeting. The reason for this behavior is a little parameter called: AllRequestOutOfPolicy. By default this parameter is true. This effectively treats all conflicts as “Out Of Policy” and requires delegate approval for the meeting to be scheduled. This causes the “Tentative” email response.
You can only change this by using PowerShell.
Set-CalendarProcessing “Name of Room” -AllRequestOutOfPolicy $False
This sets it to false and automatically sends a declined email to the meeting requestor for all “Out of Policy” Meeting requests, which includes conflicts.
I know, it’s only 2 months that we are active but what a 2 months it has been already.