Wednesday, May 21, 2014

Reduce Inbox Spam in Outlook

Set Up Junk Mail Filtering

Outlook 2007
  1. Go to the Actions menu.
  2. Select Junk Mail.
  3. From the menu that pops out, select Junk Mail Options.
  4. On the Options tab, select the level of filtering you would like. (I keep mine on Low.)
  5. Click OK.
Outlook 2010
  1. Change to the Mail view (if you aren’t there already).
  2. Go to the Home tab of the ribbon.
  3. In the Delete section, click on the Junk button.
  4. From the menu that pops out, select Junk Mail Options.
  5. On the Options tab, select the level of filtering you would like. (I keep mine on Low.)
  6. Click OK.
With filtering turned on, junk messages will go to the Junk E-mail folder in Outlook. I recommend that you check this folder regularly. I have found that on occasion, even with the filtering set on Low, emails from friends or from my organization have been sent to my Junk folder.

Block An Email Address

If you regularly receive spam from a specific email address, you can block the sender. To block a sender:

  1. Right click on the email.
  2. Select Junk Email.
  3. Select Add Sender to Blocked Senders List (wording is slightly different in 2010, but similar).

Recover Deleted Items in Outlook

Some items can be recovered even after the Deleted Items folder has been emptied, depending on the kind of item and how long it has been since you emptied the folder. The amount of time you have to recover an item depends on your Exchange Administrator.
Recover Deleted Items in Outlook 2010
  1. Select your Deleted Items folder.
  2. Go to the File tab on the ribbon.
  3. In the Clean Up group click Recover Deleted Items.
  4. Select the item(s) you would like to recover.
  5. Click Recover Selected Items.
Recover Deleted Items in Outlook 2007 
  1. Select your Deleted Items folder.
  2. Go to Tools > Recover Deleted Items…
  3. Select the item(s) you would like to recover.
  4. Click the Recover selected items button.

Please note: These instructions only apply to items sent to the Deleted Items folder and then emptied from it. If you deleted an item using the Shift + Delete shortcut (not recommended), or if you deleted an attachment but not the email, you cannot recover them through this method.

Overview of Storage Manager for SANs

Applies To: Windows Server 2008 R2
You can use Storage Manager for SANs to create and manage logical unit numbers (LUNs) on both Fibre Channel and iSCSI disk storage subsystems that support Virtual Disk Service (VDS).
Because of hardware, protocol, and security differences, LUN configuration and management are different in Fibre Channel and iSCSI environments. This section explains those differences.

Managing LUNs in a Fibre Channel environment

In a Fibre Channel environment, LUNs created on a disk storage subsystem are assigned directly to a server or cluster, which accesses the LUN through one or more Fibre Channel host bus adapter (HBA) ports. You only need to identify the server or cluster that will access the LUN, and then select which HBA ports on that server or cluster will be used for LUN traffic.
When a server or cluster is identified, Storage Manager for SANs automatically discovers the available Fibre Channel HBA ports on that server or cluster. You can also add ports manually by typing their World Wide Name (WWN).

Managing LUNs in an iSCSI environment

Unlike in a Fibre Channel environment, LUNs created on an iSCSI disk storage subsystem are not only assigned to a server or cluster. For iSCSI, LUNs are first assigned to logical entities called targets.
Targets are created in order to manage the connections between an iSCSI device and the servers that need to access it. A target defines the portals (IP addresses) that can be used to connect to the iSCSI device, as well as the security settings (if any) that the iSCSI device requires in order to authenticate the servers that are requesting access to its resources.
noteNote
In most cases, you can create and manage targets yourself. However, some iSCSI storage subsystems only support simple target configurations, where targets are automatically created when you create a LUN. With simple target configurations, you also cannot delete a target or manually assign LUNs to it. LUNs are automatically assigned when they are created. For this type of subsystem, you just need to identify the server or cluster that will access the LUN, and the iSCSI subsystem will enable access from that server or cluster to the LUN.

To connect to a target, a server in the storage area network (SAN) uses an iSCSI initiator. An iSCSI initiator is a logical entity that enables the server to communicate with the target. The iSCSI initiator first logs on to the target, and only after access is granted by the target, the server can start reading and writing to LUNs assigned to that target. Each iSCSI initiator can have one or more network adapters through which communication is established.
As with Fibre Channel environments, you only need to identify the server or cluster that will access the LUN, and Storage Manager for SANs automatically discovers the iSCSI initiators on that server or cluster, and lists all the available adapters for those initiators. After the iSCSI initiator adapters have been discovered, you can select which adapters will be used for LUN traffic.
For more information about iSCSI, see http://go.microsoft.com/fwlink/?LinkId=93543.

Thursday, May 15, 2014

How to fix NSLOOKUP *** UnKnown can't find : Non-existent domain?

Issue : " *** UnKnown can't find : Non-existent domain" on NSLOOKUP from Windows Server 2008 DNS server



The reason for this error is there is there is no any Reverse Lookup Zone configured on the server. Or the Reverse zone is crashed. To fix this issue you need to create or reconfigure the reverse lookup zone.

Here is the way to do it.
1. Open the DNS management console in the Server 2008
        Start > Administrative Tools > DNS

2. Go to the Reverse Zone Lookup folder icon, Right click on it and Select New Zone


3. New Zone Wizard will open up and click Next.

4. Select Primary Zone as the Zone Type and click Next.

5. Here you can select the Zone Replication Scope as you like. If you are not sure select    servers in the domain and click Next.

6. Select the address type based on your requirement (Here I use IPV4) and Next.

7. Type the first three octets of your network IPV4 address range like 192.168.1 and click Next.


8. Select Secure Update and click Next.

9. Click Finish and Restart the DNS Server service.

Tuesday, May 13, 2014

How to add an image to your Outlook Web Access (OWA) signature


1) Upload the logo images to a public web server
2) Open Outlook (desktop application) on your computer.
3) Click on Tools, Options, Mail Format tab, Signatures

4) Edit your signature text
To insert the logo, position your cursor on a blank line
Click on the Insert Picture button
On the Insert Picture dialog box, in the File name line, enter the URL of the picture you want to use

5) Then, in the [Insert] button, use the drop arrow and select the Link to File option
After this the logo will appear in your signature box.
Click OK
Next, send an email to yourself.



6) Now, open webmail (OWA)
Login to your Outlook email with your credentials.
Open the message you just sent, and highlight the image. Then copy it by pressing Ctrl +C. You could also right click on the logo image and select Copy or Copy Image.

To insert this image into the OWA signature:
Click on Options on the top left corner of the screen then 
Select “See All Options”
Select “Settings” on the left hand side

You will see the E-Mail signature box.
Type the text you would like in the signature box, including your name, title, office,
phone, etc.
Paste your picture in the E-Mail signature by pressing Ctrl + V.
Click on Save 



Friday, May 9, 2014

Install Certificates for VPN Connections

Applies To: Windows Server 2008, Windows Server 2008 R2
A certificate infrastructure is a requirement for VPN connections based on Layer Two Tunneling Protocol over Internet Protocol security (L2TP/IPsec), Secure Socket Tunneling Protocol (SSTP), or Extensible Authentication Protocol-Transport Layer Security (EAP-TLS). Certificates provide stronger authentication security than password-based authentication does.
To provide a certificate infrastructure for a VPN client that makes L2TP/IPsec or SSTP connections:
  1. Install a certificate in the Local Computer certificate store on the VPN server.
  2. Install a user certificate in the Current User certificate store of each client.
To provide a certificate infrastructure for user-level authentication with EAP-TLS:
  1. Install a certificate on the authenticating server for the VPN server.
  2. If you are not using smart cards, install a registry-based user certificate on each client.

    -Or-

    If you are using smart cards, install a certificate on each smart card distributed to a VPN client user.
Before you can install a certificate, a certification authority (CA) must be present and reachable. For a computer in a Windows Server 2008 domain, you can use auto-enrollment or the Certificates snap-in to install a certificate. Alternatively, you can install a certificate by using a Web browser to connect the VPN client to the CA Web enrollment agent.
For more information, see Appendix A: Computer Certificates for VPN Connections in the Routing and Remote Access Design Guide.

Configure Automatic Certificate Allocation from an Enterprise CA

Applies To: Windows Server 2008, Windows Server 2008 R2
To install computer certificates through auto-enrollment, configure Group Policy on the Active Directory domain for automatic allocation of computer certificates.

To configure automatic certificate allocation from an enterprise CA

Membership in the local Administrators group, or equivalent, is the minimum required to complete this procedure.
  1. On the domain controller, open the Active Directory Users and Computers MMC snap-in.
  2. In the console tree, double-click Active Directory Users and Computers, right-click the domain name in which your CA is located, and then click Properties.
  3. On the Group Policy tab, click Default Domain Policy, and then click Edit.
  4. In the console tree, right-click Automatic Certificate Request Settings, point to New, and then click Automatic Certificate Request.

    Where?

    • Computer Configuration/Windows Settings/Security Settings/Public Key Policies/Automatic Certificate Request Settings
  5. When the Automatic Certificate Request wizard appears, click Next.
  6. In Certificate templates, click Computer, and then click Next.

    Your enterprise root CA appears on the list.
  7. Click the CA, click Next, and then click Finish.
  8. To create a computer certificate for the CA computer, type the following at the command prompt:

    gpupdate /target:Computer