Exchange Online Send AS Keep Sent Item in Shared Mailbox

Hi everyone

If in a shared mailbox you need to keep the sent items in the mailbox and not just in the main account that sent the mail item, you have to make a small change via powershell. You can do the chnage in the local Outlook too, but I suggest in powershell as it will follow anyone that send from that mailbox.

There is the step;

Install-Module ExchangeOnlineManagement


Connect-ExchangeOnline -UserPrincipalName admin@account.onmicrosoft.com

Get-Mailbox

Set-Mailbox <mailbox name> -MessageCopyForSentAsEnabled $True

Set-Mailbox <mailbox name> -MessageCopyForSendOnBehalfEnabled $True

After the command we can validate the mailbox to be sure it’s set, or not;

Get-Mailbox <mailbox-name> | fl

That should do the tip to have the sent items saved inside the shared mailbox sent item’s folder !

Windows Server 2025 In Preview !

Hi everyone !

I wanted to share that today Windows Server 2025 was available to test in preview !

Download the ISO

Download the VHD

To quote the article for the main change;

Some key improvements include:

  • Hybrid: Adapt quickly across hybrid, cloud and edge. Easier to connect to Azure Arc to bridge on-premises and cloud-based servers. Deliver Azure capabilities to your on-premises servers.
  • Security: Hardware and software-level security to deter cyberattacks; next-generation Active Directory that improves security and scalability. Enable a tailored security baseline and  configure drift protection from the start.
  • Modern, future-ready platform: Windows Server 2025 is now easier to upgrade and scale, with better-than-ever app compatibility. Windows Server 2025 desktop brings consistent client and server UI experience, plus conveniences like WiFi and Bluetooth.
  • Performance: Faster and easier networking and storage; live hotpatching for reduced downtime; GPU partitioning for inferencing at the edge. Improvements in flash-based storage make Windows Server an even better platform for SQL Server.

Ref: Gain enhanced security and performance with Windows Server 2025—now in preview

Exchange Server SE – The beginning of a new Era !

Today we got some exciting news about the new Exchange features that is coming ! Finally the Exchange 2019 successor got named as Exchange Server Subscription Edition (SE).

The releasing will be in late 2025 (Q3), with a possible CU1 in Q4 of 2025.

Exchange Server 2019 will got a final CU, the CU15, that will prepare the 2019 to be Exchange Server SE.

If you are already at the latest Exchange CU, the update is like only to install a CU.

As the CU prepare the server to be ready for Exchange Server SE, some major change will happen in that CU15, as;

  • Adding support for TLS1.3
  • Adding back the long awaited certificate management in the EAC.

For the other minor changes and all the details, there is the link to the full article !

Exchange Server Roadmap Update

Be ready by be up to date ! and to be secure too at the same time 🙂

WSUS Windows Update error 0x80244022

Hi everyone !

Todya I wanted to share a bug you can encounter on your computer and Windows Server Update Service’s server.

This is the event id 0x80244022, and the reason is a faulting App in the IIS AppPool. You can enlarge the memory to have it work better.

I set 3G, but at 0 it’s unlimited .

There the step to do it;

Open IIS Manager

Click to show the App pools;

Click on WsusPool, stop it if not stopped.

Right click in Advanced detail, and look for those settings to change;

Active Directory – Delegate to Disable Users

Hi everyone

Today I wanted to talk a older topic, but still up to date, as I had to do it lately 🙂

If you want to delegate the control to an group / user to disable some Active Directory user you must delegate control to the user to read/write on the userAccountControl field.

That field is used there inside that windows (first pic took from there);

To be more exact, the filed control those options;

In the Active Directory User and Computer’s applet you can click to delegate;

After you click to enable the delegation only for users account;

After we click on read/write userAccountControl;

And that’s all, it should work after 🙂

For reference the field hold these values; (reference)

Property flagValue in hexadecimalValue in decimal
SCRIPT0x00011
ACCOUNTDISABLE0x00022
HOMEDIR_REQUIRED0x00088
LOCKOUT0x001016
PASSWD_NOTREQD0x002032
PASSWD_CANT_CHANGE

You can’t assign this permission by directly modifying the UserAccountControl attribute. For information about how to set the permission programmatically, see the Property flag descriptions section.
0x004064
ENCRYPTED_TEXT_PWD_ALLOWED0x0080128
TEMP_DUPLICATE_ACCOUNT0x0100256
NORMAL_ACCOUNT0x0200512
INTERDOMAIN_TRUST_ACCOUNT0x08002048
WORKSTATION_TRUST_ACCOUNT0x10004096
SERVER_TRUST_ACCOUNT0x20008192
DONT_EXPIRE_PASSWORD0x1000065536
MNS_LOGON_ACCOUNT0x20000131072
SMARTCARD_REQUIRED0x40000262144
TRUSTED_FOR_DELEGATION0x80000524288
NOT_DELEGATED0x1000001048576
USE_DES_KEY_ONLY0x2000002097152
DONT_REQ_PREAUTH0x4000004194304
PASSWORD_EXPIRED0x8000008388608
TRUSTED_TO_AUTH_FOR_DELEGATION0x100000016777216
PARTIAL_SECRETS_ACCOUNT0x0400000067108864

Migrate files server to the cloud – Hybrid GPO

Hi everyone

Today I wanted to two useful GPO if you migrate your file server to SharePoint online.

The GPO are to create automatically the OneDrive Sync to the document library, the some useful setting to push and a settings for the delay for applying the configuration.

The first GPO to apply is to create the Mount point for the selected user. I suggest to use the same security group as the mapped drive was.

It’s in HKEY_CURRENT_USER\Software\Policies\Microsoft\OneDrive\TenantAutoMount (REG_SZ)

Value Name = Text for the mount point to be created.

Value = Site URL

The site url can be obtained by navigating to the site, and click to Sync the site, it will offer an option to copy the link. The link must be un-escaped.

The link format is; tenantId=xxx&siteId=xxx&webId=xxx&listId=xxx&webUrl=httpsxxx&version=1

To un-escape use PowerShell, it’s the easiest to do;

[uri]::UnescapeDataString(“Copied String”)

To that GPO can be added one more registry setting; its tagged as it will make the change appear more fast, but it’s to test. On Reddit its a value that is tagged to be working for some, and not for other. On my side I seen a difference, maybe 10-20min and not near 8 hours, but it’s maybe just the GPO time to apply.

HKCU\Software\Microsoft\OneDrive\Accounts\Business1

“TimerAutoMount”==dword:00000001

The last option I recommand is to make sure the File On Demand is activated, so that change in a computer GPO for that one;

HKLM\SOFTWARE\Policies\Microsoft\OneDrive

“FilesOnDemandEnabled”=dword:00000001

Microsoft 365 roadmap – MFA for admin portal in November 2023

If you have Conditional Access rule inside your Entra tenant please make sure to see that roadmap;

The roadmap will force admin user to enable MFA on their account. Which is a good new to securing all the admin login out there.

Starting in November 2023, Microsoft will begin automatically protecting customers with Microsoft managed Conditional Access policies. These are policies that Microsoft creates and enables in customer tenants.

The following Conditional Access policies will be rolled out to all eligible tenants:

1. MFA for admin portals

This policy covers privileged admin roles and requires MFA when an admin signs into a Microsoft admin portal.

2. MFA for per user MFA users

This policy covers users with per-user MFA and requires MFA for all cloud apps.

3. MFA for high-risk sign-in

This policy covers all users and requires MFA and re authentication for high-risk sign-ins.

Exchange Online New requirement for SMTP Relay

Hi everyone

I wanted to warn that on 1 November 2023 a new requirement will be there for SMTP relay inside Exchange Online.

Nov 1, 2023 – New Requirements for SMTP Relay through Exchange Online 

Effective from November 1, 2023, the matching condition for the SMTP P2 sender domain will be removed. This means that relaying email through Exchange Online will require meeting the following criteria: 

  • Accepted domain: The SMTP certificate domain on the SMTP connection or the SMTP envelope sender domain in the MAIL FROM command (P1 sender domain) must be one of your organization’s accepted domains. 
  • Inbound Connector: The sending host’s IP address or certificate domain on the SMTP connection must match your organization’s Inbound Connector of on-premises type. 

Failure to meet either of these conditions after November 1, 2023, will result in the rejection of relay attempts from your on-premises environment to Exchange Online 

Solution: It is necessary to modify your Inbound Connector of the on-premises type and switch from using IP addresses to a certificate domain. Furthermore, you need to ensure that the certificate domain is included as an accepted domain of your organization.   

Ref: https://techcommunity.microsoft.com/t5/exchange-team-blog/updated-requirements-for-smtp-relay-through-exchange-online/ba-p/3851357 

Unifi Dream Machine UDM-Pro WAN IP Change

Hi everyone

Today I wanted to share a tip, as if I read reddit or ui’s forum it seem a really complex task to change a WAN IP.

After multiple error and guess I now found the correct solution for that.

First we log locally if we can.

After we need to remove the NAT’ing definition for the public IP we will change; to set none

If we have multiple network, it’s to be done for all of them, as seen below I have two to change;

If we forget that step the unifi will complaint about the IP being used in the Default network.

After we pause all Site-to-Site VPN.

If we forget that step the unifi will complain that it can’t change the gateway.

After all those steps, now we can change the public IP 🙂