Search Posts

Category: Uncategorized

430-4.2.0 STOREDRV;

430-4.2.0 STOREDRV; mailbox logon failure 430 4.2.0 STOREDRV.Deliver.Exception:ConnectionFailedTransientException.MapiExceptionLogonFailed; Failed to process message due to a transient exception with message Cannot open mailbox /o=WTE/ou=Exchange Administrative Group (FYDIBOHF23SPDLT)/cn=Configuration/cn=Servers/cn=2K10EXCHANGE/cn=Microsoft System Attendant. 16.47655:4E010000, 17.64039:110104805E000000000000000000000000000000, 4.41073:11010480, 0.48243:FE000000, 4.50033:11010480, 255.1494:00000000, 0.64445:11010480, 4.60989:0F010480, 0.61373:0F010480, 0.24684:0F010480, 4.20076:11010480, 4.57713:11010480, 4.49009:11010480, 255.1750:0F010480, 4.52465:11010480, 0.60065:0F010480, 4.33777:11010480, 0.59805:00000000, 4.52209:11010480, 0.56583:320A0000, 4.52487:11010480, 0.19778:320A0000, 4.27970:11010480, 0.17730:320A0000, 4.25922:11010480 [Stage: CreateSession] […]

Shell Script command to track messages

Shell Script command to track messages Get-MessageTrackingLog -ResultSize Unlimited -EVENTID receive -MessageSubject “***INFECTED***”   Get-MessageTrackingLog -ResultSize Unlimited -EVENTID receive -MessageSubject “***INFECTED***” | Select-Object timestamp,ServerHostname,ClientHostname,Source,EventId,Recipients | Sort-Object -Property Timestamp >> c:\steve2.txt   Get-MessageTrackingLog -ResultSize Unlimited -EVENTID receive -MessageSubject “***” Get-MessageTrackingLog -ResultSize Unlimited -EVENTID receive -MessageSubject “***” | Select-Object timestamp,ServerHostname,ClientHostname,Source,EventId,Recipients | Sort-Object -Property Timestamp https://technet.microsoft.com/en-us/library/bb124926(v=exchg.160).aspx

Attachments are blocked after applying June 2017 update

Attachments are blocked after applying June 2017 update After applying the June update for Outlook 2007, 2010, 2013 or Outlook 2016 (MSI) some attachments may be blocked from being opened. There are two issues here; Attachments could get blocked as they are deemed “potentially unsafe attachments” even when they don’t have an unsafe file extension […]

Good Websites on Recovering Active Directory

Good Websites on Recovering Active Directory   https://social.technet.microsoft.com/wiki/contents/articles/5549.recover-active-directory-deleted-items-using-ldp-exe.aspx   https://aptechtonics.wordpress.com/2012/07/07/recover-active-directory-deleted-items-without-using-backup/   https://www.petri.com/manually-undeleting-objects-windows-active-directory-ad   https://technet.microsoft.com/en-us/library/dd379481(v=ws.10).aspx   http://o365info.com/deleted-active-directory-user-account-and-the-deleted-object-store-basic-introduction-article-1-4-part-13-23/   http://o365info.com/how-to-restore-active-directory-deleted-user-account-active-directory-recycle-bin-is-not-enabled-using-ldp-exe-article-2-4-part-14-23/   http://o365info.com/how-to-restore-active-directory-deleted-user-account-active-directory-recycle-bin-is-not-enabled-using-adrestore-adrestore-net-and-lex-the-ldap-explorer-article-3-4-part-15-23/   http://o365info.com/restore-active-directory-deleted-user-account-using-active-directory-recycle-bin-article-4-4-part-16-23/   http://www.technig.com/enable-active-directory-recycle-bin-powershell/#

Using the Trend Micro WCRY Simple Patch Validation Tool

https://esupport.trendmicro.com/media/13792564/supportcustomizedpackage-ms17-010-chk.exe   https://esupport.trendmicro.com/en-us/home/pages/technical-support/1117416.aspx?vwd=KB-_-prd=gen-_-src=KB1117393-_-loc=Default     Using the Trend Micro WCRY Simple Patch Validation Tool Due to the vulnerability of SMB v1, remote code execution may be conducted on a computer. This will allow attackers to drop the WCRY (WannaCry) Ransomware and other infections on a computer. Trend Micro WCRY Simple Patch Validation Tool is a […]

Wanna Cry XP Patches

For MS17-010 for XP, there are 2 versions   For SP3 http://download.windowsupdate.com/d/csa/csa/secu/2017/02/windowsxp-kb4012598-x86-custom-enu_eceb7d5023bbb23c0dc633e46b9c2f14fa6ee9dd.exe   for SP3 embeded http://download.windowsupdate.com/c/csa/csa/secu/2017/02/windowsxp-kb4012598-x86-embedded-custom-enu_8f2c266f83a7e1b100ddb9acd4a6a3ab5ecd4059.exe

Next Page » « Previous Page