Home
Search results “Types of exchange servers”
Difference between IMAP and POP3
 
05:47
Difference between POP3 and IMAP What is IMAP and POP? These two are the most common incoming email protocols. These protocols are used to connect your mail box server to an email client. Here an email client refers to for an example (microsoft outlook or mozila thunderbird). So basically it allows you to send and receive the emails from mail client just we mentioned from Outlook or Thunderbird to your desktop/laptop. It also allows you to access your Emails through Online web services like Gmail, Microsoft Mail or on the mobile devices like your smart phones or tablets. Whats the difference? What is POP? So POP stands for Post office Protocol and the latest version is POP3 and it is supported by all email client and servers. POP3 download mails on your local device(Computer or Phone or Tablets) using the client and deletss them from the email server. By using POP an internet connected email client, accesses the mail server, then it download all your mails to local device(Computer or Phone or Tablets) and then it marks the messages for deletion on Email Server. So it means that if you have received emails using POP, they can only be accessible on specific email client on a specific device that you downloaded to. Which means that they can not be accessible through the other clients on devices other than that you downloaded to. However some email clients allow you to keep the copy of emails on server. and once you delete them from your client it may not get synced with the email server. What is IMAP? IMAP stands for Internet Message Access Protocol. Unlike POP3 which downloads and auto deletes the emails from email server, IMAP allows us to view emails from any internet connected Email Clients or web email services from any device at multiple locations. This feature has made it popular So basically if you are using IMAP to access your mails, your email client receives a copy of emails and the original stays on the email server, rather than deleting them from server. This feature makes is possible for us to access our mails from any client on any devices unless you deletes them from one client. Synchronization is done with all the devices and email server. If you delete an email from one of the client on one of the devices, it gets deleted from the server and other devices too. Main Differences are as below. 1) If you want to receive your e-mail messages only on one single computer or device, then POP3 is usefull, while using IMAP you can access your mails on multiple devices simultaneously at any time. 2) POP is a one way communication, because it deletes the messages once you download them to your local device and then disconnects the device from Mail Server, While IMAP is a two way communication, where retrives your mails and caches it on local device and keep the original content on server. Synchronication is done both the way. 3) Both protocols operate on different ports. 4) POP3 does not require an internet connection if you want to access the downloaded e-mails unless you want to retrieve new e-mails. While IMAP which stores your emails in cache only requires internet connection all the time.
Views: 210234 Techno Math
Manage Mailbox in Microsoft Windows Exchange Server 2010
 
27:15
http://www.trainsignal.com/Exchange-Server-2010-Training-Videos.aspx?utm_source=YouTube&utm_medium=Social%20Media&utm_campaign=IntroToExchange2010 In this lesson entitled, "Mailbox Overview and Configuration," from our free Intro to Exchange Server 2010 Training, Exchange MVP J. Peter Bruzzese discusses the Mailbox Server role, which holds the mailbox and the public server databases. -~-~~-~~~-~~-~- This channel is an archive! Subscribe to Pluralsight for new IT Pro training ➨ https://www.youtube.com/user/Pluralsight?sub_confirmation=1 -~-~~-~~~-~~-~-
Dedicated v shared exchange servers
 
01:26
•Microsoft exchange servers meet the communications needs of businesses. •They allow for mobile and remote email access plus a wealth of other benefits. •But when youre looking for communications hosting what is the best choice for your business? Shared or dedicated?
Views: 120 UKFast
Exchange Server Daily Checklist
 
07:11
Exchange Server Daily Checklist 1. Prepare - DC11 : Domain Controller(pns.vn) | DC12 : Exchange Server 2. Step by step : Exchange Daily Checklist on DC12 - DC12 : Exchange Daily Checklist + Check free disk contain Databases + Start - Exchange Management Shell : + Check Mailbox Role, type : + Get-MailboxDatabase -Status | ft name,mounted # Check databases mount status + Get-MailboxDatabaseCopyStatus -Server DC12 # Check database copy status + Get-MailboxDatabase | Test-MAPIConnectivity # Check Mapi Connectivity + Check HUB Role, type : + Get-Queue -Server DC12 # Check current queue + Check CAS Role, type : + Get-ClientAccessService -Identity dc12.pns.vn | Format-List # Check CAS Role ---------------------------------******************** Youtube.com/c/MicrosoftLab ********************---------------------------
Views: 218 microsoft lab
What Is SMTP? | GoDaddy
 
03:02
Learn how SMTP works and its role in the email process. For more details visit: https://www.godaddy.com/help/what-are-smtp-relays-345?cvosrc=video.youtube_organic.us_how-to&cvo_creative=tmE9OqjdK7sisc=ythowto Hi there! In this video, you’ll learn what SMTP is and how it works. SMTP stands for Simple Mail Transfer Protocol. While POP and IMAP are protocols that allow you to retrieve email from a mail server, SMTP is the protocol that allows you to send email to a mail server. Specifically, the SMTP protocol is used to send email from an email client to your email provider’s mail server, and to send email between two mail servers on the Internet. When you use a free email provider, your email address uses their domain name and in turn they allow you to use their email servers. If you use their webmail site to read and send email, they handle the email server settings that direct your incoming and outgoing emails. However, if you want to use a local email client, like MS Outlook, Apple Mail or Mozilla Thunderbird, you’ll need to enter your email provider’s incoming and outgoing mail server settings when you set up your client. The Incoming server setting tells the email client where it can retrieve your email from, and the outgoing mail server setting tells the email client where it can send your email to. The outgoing server setting is also known as the SMTP server setting. Let’s focus on the send mail process and role SMTP servers play in it. Meet Maggie; her email address is [email protected] . Though Maggie is using Yahoo! as her free email service provider, she likes to use the email client, Microsoft Outlook, for composing, reading and sending her email. To make sure Outlook can communicate to with Yahoo’s mail servers, she entered Yahoo’s! email server settings when she configured MS Outlook. Maggie writes an email to her friend Rob using MS Outlook. When she clicks Send, MS Outlook sends Rob’s email address; her email address; and the body of the message to Yahoo’s SMTP server. Upon receipt, the Yahoo! SMTP server breaks Rob’s email address into two parts: the recipient ID, or what displays in front of the ‘at’ sign, and the domain name or what displays after the ‘at’ sign. The Yahoo! SMTP server then goes out to the Internet, and through a series of server conversations, locates the SMTP server for the domain name, Gmail.com. The Yahoo! SMTP server passes Maggie’s email to Gmail SMTP server. Once Maggie’s email arrives at Gmail’s SMTP server, it remains there until Rob, logs into his Gmail account and retrieves the email. Let’s recap: SMTP is the protocol that allows you to send emails from an email client to a mail server. Once on a sender’s outgoing email server, SMTP uses the domain name in an email address to locate the recipient’s email server, where the email remains until the recipient retrieves it. #SMTP #WhatIsSMTP #SMTPserver #SMTPrelay
Views: 92788 GoDaddy
What are the different Servers in an Enterprise Company | VIDEO OVERVIEW
 
23:27
Different types of IT Servers 1) File Server (DFS) 2) Database Server (Microsoft SQL, Oracle, mySQL) 3) AD Server / Domain Controller 4) DNS Server 5) DHCP Server 6) Web Server (IIS, Apache) 7) Mail Server (Exchange) 8) Proxy Server | Acts as an intermediary between a client and a server 9) Management / Patching Server (SCCM, WSUS) 10) Print Server 11) FTP Servers 12) Monitoring Server (FogLight, Orion, PRTG) 13) Time Server (NTP) 14) KMS Server (Microsoft Licensing) 15) Protection / Virus Server (SEP) 16) Terminal Server 17) Certificate Server (Certificate Authority) 18) Load balancers (HA Proxy) 19) Firewall Server (pfSence) 20) Application Server - Backup Server - Phone / Voicemail / Fax Server - vCenter - Ticket logging Server (ServiceNow, ManageEnginer, HEAT) **Please give me a thumbs up, and subscribe to my channel if you found this video helpful** Website - http://www.digitalbytecomputing.com Facebook - http://www.facebook.com/digitalbytecomputing Twitter - https://twitter.com/digibytecomp
Understanding Windows Server Editions
 
30:30
Info Level: Beginner Presenter: Eli the Computer Guy Date Created: April 8, 2010 Length of Class: 30 Minutes Tracks Servers Prerequisites Introduction to Servers Understanding Licensing for Servers Purpose of Class This class explains the arcane world of Windows Server Editions. Picking the right server Windows Operating System is not as easy as it used to be. Topics Covered Web Edition Foundation Edition Small Business Server Standard Edition Server Software Real World Considerations for Deciding on the Correct Server Operating System Class Notes Basics The Server Operating System is an Operating System that has been optimized to deal with client computer interactions. Functionality such as Email, SQL, VPN End Point, Active Directory are all components that are in addition to the core Operating System Windows Server Web Edition Only for Web Services no Active Directory Windows Server 2008 R2 Foundation Active Directory Only 15 users Small Business Server Bill Gates gift to Small Businesses Includes Exchange and a number of high level services normally only accessible by large corporations Server Standard Edition Most common Gives standard functionality -- Active Directory, File/ Print Sharing, IIS, VPN Other Editions If you don't know what they are you probably don't need them -- Enterprise, Data Center, HPC Server Software Some server software you have to buy in addition to the Server Operating System Some server software requires additional access licenses just like Server CAL's Exchange -- Email Server MSSQL -- SQL/ Database Server Sharepoint -- Document Management Final Thoughts... Get the edition you need! Total cost of licensing can make the purchase of a piece of software go from affordable to impossible. (Example of $3000 work order system that required Windows Server, MSSQL and Exchange to function) Resources Windows Server Price List Windows Server Licensing Overview Windows Server Role Comparison For Questions: My Account Rep at CDW is Lauren Booth at 877-741-4552 . She'll treat you well. Just tell her Eli the Computer Guy sent you.
Views: 110975 Eli the Computer Guy
IMAP POP Exchange Server 2010 in Hindi Part 76
 
02:28
In This Video Jagvinder Thind explains what is pop3 and Imap4 in Exchange Server 2010 in hindi. Exchange Server 2010 Configuration step by step in hindi. The Series is for all Novice to experts.Software clients such as Microsoft Outlook Express and Eudora use POP3 or IMAP4 connections to communicate with the Exchange server. Hardware clients, such as mobile phones, use ActiveSync, POP3, or IMAP4 to communicate with the Exchange server. You must install the Client Access server role in every Exchange organization and every Active Directory site that has the Mailbox server role installed. The Client Access server role also provides access to free/busy data by using the Availability service and enables certain clients to download automatic configuration settings from the Autodiscover service.
Views: 33977 JagvinderThind
IMAP vs POP
 
04:48
IMAP vs POP - wondering what the difference is and which to use? We'll help explain some key points when deciding between IMAP and POP3 protocols. For more answers to technical questions, visit us at http://www.helpdesk-blog.com or to learn more about Help Desk Premier visit us at http://www.helpdesksoftware.biz IMAP vs POP IMAP stands for Internet Message Access Protocol and POP stands for Post Office Protocol. Both of these protocols are used for email retrieval purposes -- specifically, they process the transfer of email messages from the server to an email client. The POP email Retrieval Process goes like this When you click the "receive" option in your email client, it will connect to your remote email server. It will retrieve all mail and store it locally as new mail, and it will also it will delete those emails from the server. The exception to this is if the email client is configured to "keep mail on server", in which case the client will just disconnect. The IMAP email Retrieval Process goes like this The IMAP protocol operates differently. First, when you click the "receive" option, the email will connect to the remote email server. It then pulls the user-requested content and caches it locally. Then it will process user edit processes, such marking emails as read or deleting emails and so on. Finally it disconnects from the server. IMAP vs POP -- The Differences Between Them The two protocols generally operate on different ports. Essentially, POP is a one-way communication path, whereas IMAP offers two-way synchronization between server and client. POP is sufficient if you're accessing your email using only one device such as your PC. IMAP is the protocol of choice if you need to access your email from multiple locations -- for example, both your office workstation and your notebook or tablet. IMAP vs POP -- What are the Pros and Cons? The Advantages of POP POP will download emails without leaving copies of them on the server. This keeps the space used on the email server low. The other advantage is that mails are stored locally and are always accessible even without an internet connection. A connection will only be needed when sending and receiving email. The Disadvantages of POP Since there is no remote server copy, if data is lost from the location where the email are downloaded, no email recovery option will be available and all your email will be gone. If you intend to use a single email account configured with POP, but want to use multiple email clients on multiple devices, some emails will be missed, since there is no synchronization between server and the devices/clients. The Advantages of IMAP IMAP is often preferred in many use-cases. In the IMAP protocol, emails are stored on the remote server and are therefore accessible from multiple different locations. IMAP can take a little time to download and synchronize emails from some remote servers, but it's a flexible, more reliable, and more complete email retrieval method compared to POP. If a user adds an account to Outlook or another email client. How do they decide between POP vs IMAP? Choose IMAP if you require the following: (1) Access to your emails, both old and new, at multiple locations. (2) Emails kept on the server rather than stored offline in your personal storage -- perhaps due to limited personal storage space on your device (3) Real time email synchronization across all of your devices and the server. Choose POP if you need: (1) To access your email from a single location. (2) Webmail for when you need to check new email remotely. (3) To have your own regular backups of your email messages. (4) Constant access to your email, regardless of internet availability. (5) To minimize use of storage space your server, perhaps due to a quota-based limitation. Let's look at how to change Microsoft Outlook Settings to Keep Emails on the Server While Using POP This can be done when you first configure your email client the first time, or by editing settings later. we just need to edit Account Settings to change email storage on the server. First we need to double click on the email highlighted in the E-mail tab: It is for a POP account. Click on "More Settings". Then navigate to the "Advanced" tab. In the delivery section, tick "Leave a copy of message on the server" and select your desired length of time. If you choose a large time frame, your server Inbox may fill with emails, which could push you towards your storage quota.
Views: 134647 Help Desk Premier
Federation Services Terminology
 
15:28
Check out http://YouTube.com/ITFreeTraining or http://itfreetraining.com for more of our always free training videos. This video will look at the different Terminology that is used with Federation Services. This will give you a good indication of what components make up a Federation Service in Active Directory Federation Services and other Federation services. Download the PDF handout http://ITFreeTraining.com/handouts/federation/terminology.pdf Terminology This video will look at 17 different Federation Services terms. They have been placed in a logically order to make it easier to understand. Account Partner Organization This contains the user accounts that will access the Federation Service. In some cases this may be a domain in other cases it may be a database or simply an e-mail address. The important point to remember is that these are the users that will access Federation Services. This will contain information like their usernames, password and other details about the user. Resource Partner Organization A resource partner organization contains the resources that are accessed by the Federation Service Users. Normally this will be external to the company, but in some cases may be on a DMZ of the company. A resource partner could also be in a cloud based application. For example MS Office products located in the cloud. Federation Trust A Federation Trust is a trust between different parts of Federation Services. An example is the trust between the Account Partner Organization and Resource Partner Organization. The trust is not a connection style trust and thus when created does not require communication to happen over the trust. The trust does not require a direct connection between the two Federation Servers, however it is often simpler to have a connection between the two so that the Federation Server can obtain information that it requires in order to create the trust. Claim A claim is essentially a statement about a user. When the claim is created, it will need to be created with information required by the other side. This may include information about what services they require. This may also contain information about groups they are in. The Federation Server creating the claim needs to ensure all this information is put into the claim. The claim is essentially a file that is then transferred to the other party. In a lot of cases, the user may request the claim from their Federation Server and then present this claim to the Federation Server that is providing the service. Claims Provider Trust Active Directory Federation Services has two types of trusts that are used. The first trust is a Claims Provider Trust. A Claims Provider Trust accepts claims. So essentially this trust defines who and how the trust can be used. Relying Party Trust A Relying Party Trust is used to create claims. Once a claim is created it is supplied to a Claims Provider Trust. A Relying Party Trust is required in the account partner organization to create claims that will be used in the Resource Partner Organization. A relying party trust is also used to access resources. For example, if the Active Directory Federation Services needs to access an application or Domain Services. Claim Provider A claims provider is an organization that provides claims for users. These claims are normally used by Claims Aware applications that can be in the domain, external domain or in the cloud. Federation Server This is a server that is running Federation Services. In the case of Windows this will be Active Directory Federation Services. Account Federation Server An Account Federation Server provides security tokens that contains claims. These are given to the user. In order to do this the account Federation Server must get this information from somewhere. Attribute Store An attribute store contains information about the user. This can be stored in Active Directory Domain Services, SQL Server or Active Directory Light Weight Directory Services. This does not provide authentication. For example a Domain Controller could be used to authenticate the user and then the attribute store could be used to get additional information about the user. For example the attribute store may contain a picture of the user. Description to long for YouTube. For the rest of the description please see the following link. http://itfreetraining.com/federation#terminology References "MCTS 70-640 Configuring Windows Server 2008 Active Directory Second edition" pg 888-896 "Understanding Key Concepts Before You Deploy AD FS 2.0" http://technet.microsoft.com/en-us/library/ee913566(WS.10).aspx "Federation trusts" http://technet.microsoft.com/en-us/library/cc738707(v=ws.10).aspx "Understanding Application Types for AD FS Federation" http://technet.microsoft.com/en-us/library/cc772483.aspx
Views: 32685 itfreetraining
Client Access Licenses (CALs) in Windows Server 2012
 
06:20
Check out http://YouTube.com/ITFreeTraining or http://itfreetraining.com for more of our always free training videos. This video will look at the 3 different CALs that are available in Windows Server 2012. These are user, device and RDS. This video looks at how many you need in order to make sure your network is compliant and what these CALs allow you to do and not do. http://ITFreeTraining.com/handouts/server/cals.pdf What is a CAL? A CAL is a Client Access License which is required for a user or computer to use features on a Windows Server, like file shares or printing. Services like unauthenticated internet access do not require a CAL. If you however use a 3rd party system to authenticate users before they connect to the web server you would need to purchase a CAL. Types of CALs There are 3 basic CALs available for Windows Server 2012. There are other features CALs that are available for products like SQL Server, but these are not covered in this video. The CALs covered in this video are user, device and Remote Desktop. User: Required for a user to access a Windows Server. Device: Required for a device to access a Windows Server. Remote Desktop: Required for each user or device that uses Remote Desktop Services. Does not include remote desktop connection for administrator performing administration work on the server. Each server supports 2 remote desktop connection for administration only. User CAL A user CAL is associated with a user. Once the user has a CAL, it is associated with the user, and that user is free to access any Windows Server on the network using any device. If you have more users than devices on your network you should purchase user CALs. Device CALs Device CALs are associated with a devices like a computer or device like a tablet. Once a device CAL is associated with that device, any number of users can login to that device and access Windows Server. The users that use this device do not require a user CAL. Device CALs are a good choice when you have more users on your network than devices. Remote Desktop CALs This CAL is also referred to as an additive CAL as once you add the CAL to Windows Server it activates additional functionality. Unlike the other CALs, remote desktop CALs need to be activated before they can be used. User and Device CALs rely on the administrator to check that they have enough CALs on the network to cover the number of users and devices they have. Functionality on the Windows Server is not gained or lost if the Administrator does not have the correct number of user and device CALs. Remote Desktop CALs come in 3 different types. These are user, device and external connector. User: Like a standard User CAL, a remote desktop user CAL allows the one user to connect to the remote desktop server using any device. Device: A device CAL allows any device to connect up and use Remote Desktop Service. Any user is free to login to this device and use it. External Connector: This allows multiple users from a 3rd party to connect to a single Remote Desktop Server. New CALs support older OSs The CAL that you purchase can be used with any operating system before it. For example, if you are running Windows Server 2008 on your network and need additional CALs, you should purchase Windows Server 2012 CALs as these will work with Windows Server 2008 and will work when you upgrade your Servers to Windows Server 2012. Microsoft also allows CALs to be updated to newer operating systems as required. See http://YouTube.com/ITFreeTraining or http://itfreetraining.com for our always free training videos. This is only one video from the many free courses available on YouTube. References "Client Access Licenses and Management Licenses" http://www.microsoft.com/licensing/about-licensing/client-access-license.aspx "Newegg TV: Microsoft Windows Server 2012 CALs Interview" http://www.youtube.com/watch?v=9dYDeDNIUt0
Views: 186468 itfreetraining
MCITP 70-640: Active Directory different group types available
 
18:41
This video looks at the different group types available in Active Directory. These include Local, Domain Local, Global, and Universal. The video also covers membership requirements which can be used in each of the different groups and converting between different groups. Finally, this video looks at distribution vs security groups. Demonstration 14:35 Distribution Group Any group in Active Directory can be created as either a distribution group or a security group. Distribution groups do not have a SID (Security Identifier) associated with them. For this reason distribution groups can't be used for security. That is, a distribution group cannot be used to assign permissions to files or objects. Distribution groups are mainly used with e-mail programs like Exchange to send e-mails to groups of people. Since there is no SID associated with the group, when you make a user a member of a distribution group, this does not affect the size of the security token for that user. A security token is created when the user logs in and contains their SID and any SID's for any security groups of which they are a member. Security Group A security group has a SID and thus can be used for assigning permissions to files or objects. A security group can also be used as a distribution group in e-mail software like Exchange. Thus, the difference between a security group and a distribution group is simply that a security group is security enabled whereas a distribution group is not. If you are not sure which group to create, create a security group since it can do everything a distribution group can do and can also be used in security related operations. Local Group Local groups exist only on the computer on which they were created. A local group can have as a member any user or computer account as well as any other type of valid group. Domain Local Group Domain Local groups can only be used in the domain in which they were created. A Domain Local group allows membership from any other group as well as any user or computer. Domain Local groups from other domains cannot be used as members because they are limited in their use outside of the domain in which they were created. Universal groups can only be used as members when the Universal group exists in the same forest as the Domain Local group. Global Group Global groups have the most restrictive membership requirements, only allowing users, computers, and other Global groups from the same domain to be used as members. However, Global groups can be used as members of any other group, including other forest and external domains. This means a Global group has the most restrictive membership requirements of all the groups but is the most flexible when being used as members of other groups. Universal Group The Universal group is replicated via the global catalog server. For this reason, it is available to any domain in the forest but not to other forests or external domains. Since the Universal group is available forest wide, it does not allow Domain Local groups to be members even when the Universal group has been created in the same domain as the Domain Local group. Summary of Groups' Membership 1) Users and computers can go into any group in any domain and any forest or external domain if the group supports it. 2) Local and Domain Local groups allow the same membership requirements. 3) Universal, Domain Local and Local groups have the least strict membership requirements allowing any valid group with appropriate scope to be a member. 4) Global groups can contain only users, computers and other Global groups from the same domain only. 5) Global groups can be used everywhere, any domain, forest or external domain. 6) Universal groups are available only in the same forest since they are replicated using the global catalog. Since they are forest wide, Domain Local groups can't be members since the Domain Local scope is limited to the domain in which they were created. Description to long for YouTube. Please see the following link for the rest of the description. http://itfreetraining.com/70-640/group-types References "MCTS 70-640 Configuring Windows Server 2008 Active Directory" pg 145-152 "Active Directory Users, Computers, and Groups" http://technet.microsoft.com/en-us/library/bb727067.aspx
Views: 89338 itfreetraining
What is the Difference Between POP and IMAP? | GoDaddy
 
03:18
Learn the difference between the two most common incoming email protocols: POP and IMAP.For more details visit https://www.godaddy.com/help/setting-up-your-email-address-with-pop-4715?cvosrc=video.youtube_organic.us_how-to&cvo_creative=MlvksPMunQ0isc=ythowto and https://www.godaddy.com/help/setting-up-your-email-address-with-imap-4714?cvosrc=video.youtube_organic.us_how-to&cvo_creative=MlvksPMunQ0isc=ythowto Hi there! In this video, you’ll learn the difference between the two most common incoming email protocols: POP and IMAP. POP, or Post Office Protocol, was created as a simplified way to download and delete messages on a remote email server. The latest version, POP3, is supported by virtually all email clients and servers. Using POP, an internet-connected email client accesses a remote mail server; downloads all email to your local computer; and marks the messages for deletion on the mail server. This means the messages you retrieve using POP can only be viewed in the specific email client, on the specific computer that you downloaded them to. Once downloaded, you cannot access these messages via webmail, or a different email client on another computer. Think of POP like a traditional telephone answering machine that uses tapes. Callers can leave a recorded message on the answering machine, but you can only listen to the message if you are physically in the same room as your answering machine and press play. Until you erase your messages from the tape, they remain available to replay at any time, but only from that answering machine. IMAP, or Internet Message Access Protocol, was specifically designed to free us from the limits of sending and receiving email from a single email client. In contrast to POP, IMAP allows you to log into any internet-connected email client or a webmail site, and view all of the same emails at any time. In a constantly connected world, the ability to send and receive email from both email clients and webmail sites, has made IMAP very popular. With IMAP, your email is stored on your provider’s email servers until you delete it. While this makes email access convenient, some provider’s limit the amount of email you can store on their servers, and may temporarily suspend email services if you exceed this amount. Think of IMAP like your remote digital voicemail. When a caller leaves a message using voicemail, their message is kept on a centralized computer data storage device, and you access the messages using the touch tones on your telephone or mobile. This digital storage in a centralized location means that you can access and listen to voicemails from any telephonic device that can generate touch tones. Your messages remain on your provider’s data storage device until you delete them. However, most providers limit the number of messages you can store, and if you exceed this amount, callers may temporarily not be able to leave you a message. To decide which will work best for you, think about how you like to check your email. If you’re someone who always checks their email from one location, or on only one device, POP will work. However, if you’re someone who checks your email from your laptop, just as frequently as your mobile, and you need to be able to access it no matter where you, then IMAP is a better choice. While POP and IMAP are not the only incoming email server settings, they are the most common. At GoDaddy, the type of incoming email server you have is primarily dependent on the type of email account you have and where you purchased it. So find out which type of incoming email server you’re using – and if it’s not meeting your needs you always have the option to change it.
Views: 42554 GoDaddy
DNS Records
 
11:33
In order to find resources on the network, computers need a system to look up the location of resources. Check out http://YouTube.com/ITFreeTraining or http://itfreetraining.com for more of our always free training videos. This video looks at the DNS records that contain information about resources and services on the network. The client can request these records from a DNS server in order to locate resources like web sites, Active Directory Domains and Mail Servers just to name a few. http://ITFreeTraining.com/handouts/dn... In this video This video will look at the following DNS records: Host (A and AAAA): Contains IP Addresses for IPv4 and IPv6 hosts Alias (CNAME): Works just like a shortcut for files except for DNS records. Mail Exchange (MX): Holds the address of mail servers for that domain. Service Record (SRV): Holds the address of services on the network. E.g. Active Directory DC's. Start of Authority (SOA): Contains information and configuration for a zone file. Name Server (NS): Contain the address of other DNS servers for that zone. Pointer (PTR): Reverse look up record allowing a hostname for an IP Address to be look up. Host (A and AAAA) The host record is used to store the address of a hostname. "A" is used for IPv4 and AAAA (Quad A) for IPv6. These can be created manually in DNS or if dynamic DNS is enabled and the client can register its hostname and thus its IP Address with the DNS server. Alias (CName) A canonical name or CName record provides an alias service in DNS. A CName effectively points to another A or Quad A record. When the client requests the hostname that is contained in the CName, they are given the IP Address that is contained in the A record or Quad A record. The advantage of a CName is that it can provide a simple name to the user rather than a more complex server name. For example, instead of having to remember FS27 for the local file server, a CName of FS could be used to point towards the server FS27. CName's can also be used to transparently redirect network traffic. For example, if you changed you mind and wanted to redirect the user to FS28 you would only need to change the CName record to point to FS28 rather than FS27. It should be remembered that the old record may exist in the client cache and may take some time to expire. Mail Exchange (MX) The mail exchange record contains a mail server that is able to process mail for that domain name. When a mail server wants to deliver mail, it will perform a DNS lookup asking the DNS server for an MX record for that DNS Domain name. The mail server will then attempt to deliver mail to that server. The mail server does not need to have the same DNS name as the mail that is being delivered, it simply needs to understand how to process mail for that DNS domain name. The MX record also has priority value that can be configured. If two or more MX Exchange records exist for the same DNS Doman name, the MX record with the lowest priority will be tried first. If this fails, the MX record with the next lowest value will be tried until the mail is delivered. Often large companies will have multiple mail severs for incoming mail. In some cases, these additional mail servers may be located on different sides of the globe in case there is a long network outage. Service Record (SRV) Service records allow clients on the network to find resources on the network. Active Directory creates a number of service records in DNS to allow clients to find resources like Domain Controllers. This is why Active Directory cannot operate without DNS. A single service record has a number of data fields associated with it. These include, service, target, port and priority. Service records are normally created automatically by applications assuming that your DNS server allows dynamic updates. Start of Authority (SOA) There is one start of authority record (SOA) for each zone. Even though the SOA is technically a DNS record, essentially modification of the SOA record is performed through the properties of the DNS zone. Looking at the data in the SOA record, you can configure options for the zone like the primary name server for that zone (DNS servers that hold the master records for the zone), the e-mail address of an administrator, serial number (Incremented each time a change is made in the DNS zone) and the refresh time for the zone (How often a secondary zone should query a master for changes). Video description to long for YouTube. For full description please see http://itfreetraining.com/70-642/dns-... See http://YouTube.com/ITFreeTraining or http://itfreetraining.com for our always free training videos. This is only one video from the many free courses available on YouTube. References "MCTS 70-640 Configuring Windows Server 2008 Active Directory Second edition" pg 458 -- 459 "Installing and Configuring Windows Server 2012 Exam Ref 70-410" pg 236-237 "SRV record" http://en.wikipedia.org/wiki/SRV_record
Views: 185578 itfreetraining
03 - Plan and Implement High Availability  In Exchange Server 2016
 
34:02
Course information Want help planning and designing the key component of the Microsoft Exchange infrastructure? Join us for this look at Exchange Server 2016 Mailbox Databases. Mailbox servers host mailbox databases and addresses books, handle message transport and routing, and provide unified messaging services. Examine the Mailbox server role in Exchange Server 2016. Learn to protect your mailbox databases and the data they contain by configuring your Mailbox servers and databases for high availability and site resilience. Finally, find out how to plan and implement backup, restore, and recovery. NOTE: This course is part of a four-part series on Exchange Server 2016: Microsoft Exchange Server 2016 Infrastructure, Microsoft Exchange Server 2016 Client Access Services, Microsoft Exchange Server 2016 Mailbox Databases, and Microsoft Exchange Server 2016 Transport Services. 1 | The Mailbox Server Role in Exchange Server 2016 Examine the Mailbox server role in Exchange Server 2016. 2 | Deployment Considerations for Mailbox Databases Analyze deployment considerations for Mailbox databases, examine hardware and software requirements, and plan for performance and database sizing. 3 | Plan and Implement High Availability Plan and implement high availability, and configure and maintain database availability groups. 4 | Plan and Implement a Site-Resilient Solution Plan and implement a site-resilient solution. 5 | Plan and Implement Backup, Restore, and Recovery Plan and implement backup, restore, and recovery for Exchange Server 2016 mailbox databases. Learn Examine the Mailbox server role in Exchange Server 2016. Analyze deployment considerations for Mailbox databases. Plan and implement high availability. Plan and implement a site-resilient solution. Plan and implement backup, restore, and recovery.
Views: 703 RG Edu
Symmetric Key and Public Key Encryption
 
06:45
Modern day encryption is performed in two different ways. Check out http://YouTube.com/ITFreeTraining or http://itfreetraining.com for more of our always free training videos. Using the same key or using a pair of keys called the public and private keys. This video looks at how these systems work and how they can be used together to perform encryption. Download the PDF handout http://itfreetraining.com/Handouts/Ce... Encryption Types Encryption is the process of scrambling data so it cannot be read without a decryption key. Encryption prevents data being read by a 3rd party if it is intercepted by a 3rd party. The two encryption methods that are used today are symmetric and public key encryption. Symmetric Key Symmetric key encryption uses the same key to encrypt data as decrypt data. This is generally quite fast when compared with public key encryption. In order to protect the data, the key needs to be secured. If a 3rd party was able to gain access to the key, they could decrypt any data that was encrypt with that data. For this reason, a secure channel is required to transfer the key if you need to transfer data between two points. For example, if you encrypted data on a CD and mail it to another party, the key must also be transferred to the second party so that they can decrypt the data. This is often done using e-mail or the telephone. In a lot of cases, sending the data using one method and the key using another method is enough to protect the data as an attacker would need to get both in order to decrypt the data. Public Key Encryption This method of encryption uses two keys. One key is used to encrypt data and the other key is used to decrypt data. The advantage of this is that the public key can be downloaded by anyone. Anyone with the public key can encrypt data that can only be decrypted using a private key. This means the public key does not need to be secured. The private key does need to be keep in a safe place. The advantage of using such a system is the private key is not required by the other party to perform encryption. Since the private key does not need to be transferred to the second party there is no risk of the private key being intercepted by a 3rd party. Public Key encryption is slower when compared with symmetric key so it is not always suitable for every application. The math used is complex but to put it simply it uses the modulus or remainder operator. For example, if you wanted to solve X mod 5 = 2, the possible solutions would be 2, 7, 12 and so on. The private key provides additional information which allows the problem to be solved easily. The math is more complex and uses much larger numbers than this but basically public and private key encryption rely on the modulus operator to work. Combing The Two There are two reasons you want to combine the two. The first is that often communication will be broken into two steps. Key exchange and data exchange. For key exchange, to protect the key used in data exchange it is often encrypted using public key encryption. Although slower than symmetric key encryption, this method ensures the key cannot accessed by a 3rd party while being transferred. Since the key has been transferred using a secure channel, a symmetric key can be used for data exchange. In some cases, data exchange may be done using public key encryption. If this is the case, often the data exchange will be done using a small key size to reduce the processing time. The second reason that both may be used is when a symmetric key is used and the key needs to be provided to multiple users. For example, if you are using encryption file system (EFS) this allows multiple users to access the same file, which includes recovery users. In order to make this possible, multiple copies of the same key are stored in the file and protected from being read by encrypting it with the public key of each user that requires access. References "Public-key cryptography" http://en.wikipedia.org/wiki/Public-k... "Encryption" http://en.wikipedia.org/wiki/Encryption
Views: 462370 itfreetraining
Exchange Server 2010 Server Roles
 
01:28:37
http://www.trainsignal.com/Exchange-Server-2010-Training-Videos.aspx?utm_source=YouTube&utm_medium=Social%20Media&utm_campaign=IntroToExchange2010 In this lesson entitled, "Overview of Server Roles," from our free Intro to Exchange Server 2010 Training, Exchange MVP J. Peter Bruzzese gives an overview of the 5 Server Roles: Mailbox Role, Client Access Role, Hub Transport Role, Unified Messaging Role, and Edge Transport Role. -~-~~-~~~-~~-~- This channel is an archive! Subscribe to Pluralsight for new IT Pro training ➨ https://www.youtube.com/user/Pluralsight?sub_confirmation=1 -~-~~-~~~-~~-~-
MCITP 70-640: Service Accounts
 
14:12
A service account is a user account that is created to isolate a service or application. Check out http://itfreetraining.com for more of our always free training videos. This video looks at how to create and use service accounts in your organization. What is a service account A service account is user account that has been created to run a particular piece of software or service. Principle of least privilege The principle of least privilege is giving the user only the minimum required amount of access. For example, if a user only requires access to certain files than they should only have access to those files. If the user only requires access to certain servers or workstations, they should only have access to those. The advantage of this is that it minimizes the amount of damage that can be done if the user account was to become comprised. When used with service accounts, one service account should be created for each service or application. If the same service account is shared between services and applications, and this service account was to stop working (for example the account became locked) all software using this service account would be effected. Using the same user account for multiple services Some administrators will choose to run multiple services and applications using the same user account. To ensure that there are no problems running their software, some administrators will use a user account that has Domain Administrator access. If you use the same user account for multiple pieces of software, and the user account was to fail for any reason, all the software using that service account would also be affected. Also if the account was to become compromised, this service account could be used to access resources on the network. The more access the service account has the more potential damage that it could do. The service account could prevent applications and services using it from running by simply changing the password of the account. Service Account Lockout When the password for a service account is changed, the password must be updated in all locations that use the service account. A user account can become locked after to many wrong password attempts. When the service account is used in multiple locations and the password is not updated in all locations, the old password will still be used. After Windows Server 2003 with Service Pack 1, Active Directory will check the last two passwords used. If there is a match, the service account will not be locked. Service account expires It should be noted that if a service account password was to expire, this will prevent the user account from being able to be used until the password for the user account has been changed. Demonstration The following procedure can be used to create a service account. Run Active Directory Users and Computers. Right click the OU where you want the user to be created. When prompted, ensure user must change password at next logon is not ticked. This will prevent the service account from being used until the password has been changed. To prevent the password for the service account from expiring, tick the tick box password never expires. To maintain high security, when ticking this option, the password for the user account should be changed at regular interval. For additional security for your service account, you can create a domain group and place the service account in that group. Once service account has been added to this group, you can remove all other group membership. This will ensure the service account does not have any permissions, not even Domain User permissions unless they are allocated to the service account. To give the service account access to a particular service, type lusrmgr.msc in the start menu to edit the local users and groups. Add the service account to the local groups as required. To the change the password that is being used for a service account, open services from the start menu. Open the properties for the service you want to change the password for and change the password on the log on tab. See http://YouTube.com/ITFreeTraining or http://itfreetraining.com for our always free training videos. This is only one video from the many free courses available on YouTube References "Create a Service Account" http://technet.microsoft.com/en-us-library/cc739458(v=ws.10).aspx "principle of least privilege" http://en.wikipedia.org/wiki/Principle_of_least_privilege "managed service accounts" http://technet.microsoft.com/en-us/library/dd548356(v=ws.10).aspx "Account Lockout and Password Concepts" http://technet.microsoft.com/en-us/library/cc780271(v=ws.10).aspx "Securing Critical and Service Accounts" http://technet.microsoft.com/en-us/library/cc875826
Views: 78067 itfreetraining
04 - Manage Exchange Server 2016 Recipient Objects  In Exchange Server 2016
 
32:30
Are you setting up an Exchange Server 2016 environment? In this course, learn to plan and configure the Active Directory infrastructure requirements to support an Exchange Server 2016 organization. Take a look at prerequisites and requirements. Find out how to deploy and configure Exchange 2016 servers for messaging, manage Exchange servers, create recipients in Exchange 2016, and manage mailbox permissions. Plus, see how to set up role-based access and control for your Exchange 2016 environment. NOTE: This course is part of a four-part series on Exchange Server 2016: Microsoft Exchange Server 2016 Infrastructure, Microsoft Exchange Server 2016 Client Access Services, Microsoft Exchange Server 2016 Mailbox Databases, and Microsoft Exchange Server 2016 Transport Services. 1 | Exchange Server 2016 Prerequisites and Requirements Take a look at prerequisites and requirements for Exchange Server 2016. 2 | Exchange Server 2016 Deployment Prepare your Active Directory for Exchange Server 2016, analyze your Exchange Server architecture, and install Exchange Server 2016. 3 | Manage Exchange Server 2016 Manage Exchange Server and client settings, and examine the Exchange Management Shell. 4 | Manage Exchange Server 2016 Recipient Objects Explore mailbox recipient objects and email address policies. 5 | Manage Mail-Enabled Object Permissions Manage mailbox permissions, mailbox folder permissions, and automapping. 6 | Plan and Implement Public Folder Mailboxes Plan and implement public folder mailboxes. 7 | Plan and Configure Administrative Security and Auditing Plan and configure administrative security and auditing. Learn Examine the Exchange Server 2016 prerequisites and requirements. Prepare your Active Directory for Exchange Server 2016. Manage Exchange Server 2016 clients. Administer Exchange Server using the Exchange Management Shell and Exchange admin center. Manage Exchange Server 2016 recipients. Plan and implement public folder mailboxes. Plan and configure administrative security and auditing. Manage mail-enabled object permissions.
Views: 538 RG Edu
Introduction to Backup Systems
 
44:09
Info Level: Beginner Presenter: Eli the Computer Guy Course Length: 45 Minutes Tracks Security/ Data Integrity Prerequisites None Purpose of Class This class introduces you to the basic concepts of computer backups. Topics Covered Types of Backups Media Used for Backing Up Data Software Used to Backup Data Online Backup Technologies Advice for Maintaining Backup Procedures Class Notes Types of Backup Full -- backup everything Incremental -- backup everything since the last incremental backup Differential -- backup everything since the last Full backup Rsync -- backup the bits that have changed in the files Combined -- modern backup software uses a combination of techniques Formats of Backup Compressed Bare Metal -- allows you to recover not just files, but the entire operating system Readable Software Problems -- not all backup software is made the same Media Online FTP Hard Drive Tape CD or DVD Flash Drive /External Offsite Backup is a good idea, but no one ever does it. Software Microsoft's built in backup has a poor track record Server vs. Workstation -- The software is different and the Server backup software costs around $600-$1000 Add-ins -- You may need special add-ins for your backup software to backup Microsoft SQL databases or Exchange servers. Online Backup Solutions Only backup files, does not do a "bare metal" backup It can take a long time to backup or recover data Final Thoughts Check your log files Do a test recovery
Views: 220849 Eli the Computer Guy
Install Exchange Server 2016 CU3 On Windows Server 2016
 
02:06
How Install Exchange Server 2016 CU3 On Windows Server 2016 visit us at: http://www.ntweekly.com
Views: 766 WWWNTWEEKLYCOM
01. How to install Windows Server 2016 (Step by Step guide)
 
19:31
Support NLB Solutions - https://www.patreon.com/NLBSolutions In this video series I am going to be installing and configuring the new Windows Server 2016. In the first video from the series we are going to perform a clean install of Windows Server 2016 and perform the initial configuration of the server. Minimum requirements for Windows Server 2016: Processor: 1.4 GHz 64-bit processor Compatible with x64 instruction set Supports NX and DEP Supports CMPXCHG16b, LAHF/SAHF, and PrefetchW Supports Second Level Address Translation (EPT or NPT) Memory: 512 MB (2 GB for Server with Desktop Experience installation option) ECC (Error Correcting Code) type or similar technology Storage: 32 GB
Views: 459383 NLB Solutions
TOP 20 SYSTEM ADMINISTRATOR INTERVIEW QUESTIONS AND ANSWERS MICROSOFT JOB PREPARATION VIDEO
 
12:23
Written Version Located Here:https://goo.gl/3deMK2 System Administrator Learning Book from Amazon: http://amzn.to/2u6jpal (affiliate link) INDIA A+ Guide (affiliate) https://amzn.to/2VomAV6 Show Support/Love on Patreon https://www.patreon.com/cobuman This is a great video to watch if you are looking to get hired as MS System Administrator. It will help you prepare for some of the most commonly asked questions during an interview. Refresher Crash Course for Desktop Support, Network Admin, System Admin, Web Dev, Help Desk https://youtu.be/9u32zZjjeFw TOP 10 Desktop PC Issues and Problems with Solutions https://youtu.be/Fza_ykzypGU Desktop Support, What is Production Impact? https://youtu.be/LzEDEhgUPgg TOP 5 HIGHEST PAYING ENTRY LEVEL TECH JOBS https://youtu.be/SsRyKTJRhD4 Desktop Support DHCP Basics You Must Know https://youtu.be/m03FTgXHQ3Q Desktop Support, What is a Local Profile? https://youtu.be/oHctJ3Us1UU Desktop Support, Windows 10 Crash Course https://youtu.be/-_Fxtldhrco | COBUMAN | Although, mostly helping people get IT jobs; if you Subscribe you can expect to see some Random, Funny, Entertaining and Bizarre videos. Purpose of this channel is to provide fun and education for all kinds of people..See you on the youtube side my friends! : ) https://www.facebook.com/cobuman Intermediate and beginner difficulty of Desktop Support tutorials and how to instructional videos. Interested in becoming an IT professional? Well, don't worry! I will you teach you the most important tools required for these types of jobs and send you of with confidence. Once you complete my super easy to follow courses, you will have the key to succeed in IT. Personal vlog; games, VR, advice, funny stories, life happenings.. After all, knowledge is power... THANKS FOR WATCHING...
Views: 149809 cobuman
Welcome to Exchange Server 2019!  - BRK2176
 
01:15:31
Exchange Server 2019 releases at the end of this year and we want to tell you about it! Come and learn what's new in 2019 and how our engineers changed the way they build the software. We talk about the features from the cloud we've added to on-premises, and tell you why this is the most reliable and dependable version of Exchange ever. Will we reduce disk IO AGAIN? Maybe. Will you be able to take advantage of bigger servers with more processors and memory? Perhaps. Will we finally make Exchange PowerShell easy to use? Unlikely, but it's worth coming to find out, isn't it?
Views: 2869 Microsoft Ignite
Running Exchange hybrid over the long term
 
01:01:18
When you connect on-premises Microsoft Exchange Server to Exchange Online through a hybrid environment, are you creating a short-lived bridge to migrate to the cloud? Or will this hybrid live on indefinitely, waiting for internal and external policy to support a cloud-only reality? Either way, make sure you catch this session to learn best practices of running a hybrid Exchange environment. Topics addressed include: maintaining hybrid across patching cycles and upgrades; accommodating changes to network models; adapting during acquisitions and mergers; and more.
exchange server 2013 Course 20341 by Sailesh Mehta and student Adam Birch
 
02:27
The Microsoft Official Course 20341 covers the following: • Deploying and Managing Microsoft Exchange Server 2013 • Understand Microsoft® Exchange Server 2013 prerequisites and requirements. • Understand Exchange Server 2013 deployment. • Manage Exchange Server 2013. • Active Directory Components and Exchange Server Integration DNS Server Requirements for Exchange Server 2013 Software Requirements for Exchange Server 2013 Hardware Requirements for Exchange Server 2013 Infrastructure Requirements for Exchange Server 2013 Preparing AD DS for Exchange Server 2013 Deployment • Exchange Server 2013 uses DNS to locate AD DS domain controllers and to register its SRV records • Exchange Server 2013 uses following record types: • SRV records • Host records • MX records • Exchange Server Role Architecture in Exchange Server 2013 Deployment Options for Exchange Server 2013 Exchange Server 2013 Hybrid Deployment with Office 365 Upgrade and Migration Options Deploying Exchange Server 2013 as Virtual Machines Discussion: Implementing Exchange Infrastructure in a Virtual Environment How to Install Exchange Server 2013 Using the Setup Wizard How to Install Exchange Server 2013 in Unattended Mode Demonstration: Installing Exchange Server 2013 Post-Installation Tasks Troubleshooting Exchange Server Installation : Planning and Configuring Mailbox Servers Managing Recipient Objects Planning and Deploying Client Access Servers Planning and Configuring Messaging Client Connectivity Planning and Implementing High Availability Planning and Implementing Disaster Recovery Planning and Configuring Message Transport Planning and Configuring Message Hygiene Planning and Configuring Administrative Security and Auditing Monitoring and Troubleshooting Exchange Server 2013
Views: 283 Sailesh Mehta
(2) M10135 M3 (Recipient) Managing Recipient Objects
 
01:49:56
Managing Recipient Objects Manage mailboxes in Exchange Server 2010 Manage other recipients in Exchange Server 2010 Configure e-mail address policies Configure address lists Perform bulk recipient management tasks
Views: 1042 lee4er
Server 2012 Windows backup and restore
 
12:33
Server 2012 Windows backup and restore
Views: 225764 Mahir Ali Ahmed
Switchover the active database to other server in Exchange 2010
 
03:38
Switchover the active database to other server in Exchange 2010 1. Prepare - DC1 : Domain Controller - DC2, DC3 , DC4 : Exchange Server (DAG) 2. Step by step : Switchover DB3 active on Server DC2 to Server DC3 - DC2 : + Exchange Management Console - Organization Configuration - Mailbox - Click DB3 - Database Copies tab - Right-Click row (DB3,DC3) (or the passive copy you want to activate) - Activate Database Copy... - Choose "Best Availability" - OK - Refresh + Check database DB3 mounted on DC3 = OK
Views: 2251 microsoft lab
Windows Server 2012: Creating a Two-Node Cluster
 
17:22
Michael Otey discusses how to configure a two-node Windows Server 2012 cluster
Views: 343770 Windows IT Pro Videos
How to Configure Outlook to connect to Microsoft (Live, MSN, Hotmail, Outlook.com) email account
 
04:38
Configure Live, Msn, Outlook.com or Hotmail com Account With Microsoft Outlook In this video we wlill learn how to configure your microsoft mail account in outlook 2013. Microsoft has announced to migrate all its outlook.com mailboxes to the office 365 Exchange Online Mail Servers, which made it very easy for us to configure your microsoft mail account with Outlook 2013. You may have one of the following mail accounts of microsoft, @live.com @outlook.com @msn.com @hotmail.com. You no longer need the Outlook Connector Add In or to mannuly configure IMAP/POP3 settings. Well Its very easy and within a minute, you will be able to access your mails by configuring your microsoft mail account. So follow this simple steps. Launch the outlook. On the welcome wizard screen click on next. Its asking "Do you want to set up outloook to connect to an email account?". Make sure its checked as yes and click on next. Under the Email Account section fill in the details. Type in your name in the name field. In the address box, provide your mail id and then password following by re-typing it. Click on next. The windows security pop up will ask you to provide your password. So enter your mail account password and click on OK. Once it shows the window saying "Congratulations! Your email account was successfully configured and is ready to use", our mission is successfull. For the final step just click on Finish. Click on OK if it says "You must restart outlook for these changes take effect." You are all set up with your outlook.com account. Thats pretty easy compared to the previous tedious and time taking method. Now if you have other than outlook.com account. Like from among these three domains. @live.com @msn.com or @hotmail.com? Its again pretty easy and method is same for all these three domain accounts. Open the outlook and this time instead of filling the information under "Email Account" section, select the other option "Manual Setup or additional server types" and click on Next. On the next screen select the second option which says "outlook.com or exchange ActiveSync compatible service" and click on next. Here provide your information. Type in your Name in the Name field. Then your email address. Under the server information fill the Mail Server field with "m.hotmail.com". This field shold be same for any of these three kind of mail accounts ([email protected], [email protected] or [email protected]) Under the logon information type the password for your account and click on Next. if The "Test Account Settings" shows the task "Log onto Exchange ActiveSync mail Server" as completed, then you have succesfully completed the mission. Close the window and then clik on Finish. There You go your mail box is ready to be use and you can now receive your important mails.
Views: 37682 Techno Math
Support Corner Webcast: Non Delivery Report (NDR) analysis and diagnostic
 
26:34
In this event we will look deeply under the hood of Non Delivery Report (NDR). We will learn how to analyse a NDR, distinguish between NDR Types. We will also Troubleshoot different NDR Types. Some of the analysis will have live demos. Webcast Audience Partners; Customers; FLs; IT Pro Level 200 – Medium When: 19/05/16 – 16.00-17.00 – Rome Time Language: English Technology: Exchange Online This video have been delivered by: Andrei Stiopu See more on: https://aka.ms/o365supportcorner
Setting up DNS Records for your Mail Server
 
05:40
How to setting up DNS Records for your Mail Server. Before mail server can communicate with other mail hosts, We must configure the DNS server to recognize our mail server. Without a functional and correctly set DNS, Server cannot deliver mail. Buy Domain Name from Godaddy 30% OFF Discount Coupon http://www.anrdoezrs.net/click-7515657-10379078 Part 2: How to setup mail server mailenable on Windows Server 2012 r2 https://www.youtube.com/watch?v=bFmCMVqBJAI Part 3: How to access mailenable webmail https://www.youtube.com/watch?v=asnVYQARNIg Part 4: How to configure email client like Outlook https://www.youtube.com/watch?v=9nJj3EyhwFU
Views: 78634 Sachin Samy
Introduction to Servers
 
53:41
Follow the Insanity at: https://www.FailedNormal.com Downloadable Podcasts at: https://failednormal.podbean.com iTunes: https://itunes.apple.com/us/podcast/failed-normal/id1349818284?mt=2 Info Level: Beginner Presenter: Eli the Computer Guy Date Created: March 23, 2010 Length of Class: 52 Minutes Tracks Servers Prerequisites None Purpose of Class Discusses what servers are and misconceptions about them. Topics Covered Definition of a Server Server Operating Systems Server Hardware Server Functions Class Notes Defining a Server A server provides services to other computers on a network. A server can be an expensive Windows 2008 Server, or a simple Windows XP Home computer with a shared printer. Operating System Server Operating Systems are more stable and secure then Desktop operating Systems Server Operating Systems and their Software are generally much more expensive then Desktop counterparts Server Operating Systems are generally not as easy to administer as Desktop Operating Systems Hardware A Server can use ANY hardware to operate, but Server Hardware is made to be more reliable then desktop hardware. Xeon Processors are standard processors used in servers Redundant Power Supply allow one power Supply to Fail while the Server is Still Running RAID -- Allows for a Hard Drive to fail without crashing the Server ECC RAM is RAM that does a self test. It is more stable then regular RAM, but much more expensive. Types of Servers Software features -- multiple features can be on one box Security and Authentication gives access to network resources Print Servers share printers on a network File Servers share files on a network Web/ FTP Servers provide websites on a network Mail Servers provide email routing for an organization Database Servers store data for outside applications Remote Access Servers allow Internet users to access the internal network. Usually a VPN connection. Final Thoughts... Buy what you need... Many people buy a $5000 server when all they need is a Dell bargain bin system.
Views: 1152108 Eli the Computer Guy
Set up IMAP email accounts on the Samsung Galaxy S & HTC
 
04:26
Android-based smartphones include two email clients, one for Gmail and one for other types of email servers including Microsoft Exchange, IMAP and POP3. http://www.avoiderrors.net/archives/5946
Views: 45226 AvoidErrors
MX Records: All You Need to Know
 
03:32
MX records. What are they, why do I need to change mine, and how can I make the changes? Prepare to learn all of this and more! Help Center links below: About MX records: https://support.google.com/a/answer/33352 Setup MX records: https://support.google.com/a/topic/1611273 Identifying your domain host: https://support.google.com/a/answer/48323
Views: 150307 G Suite
Using Gmail with Microsoft Dynamics CRM
 
05:53
This video is a sample length version of one of more than 300 Microsoft Dynamics CRM tutorials available in the Success Portal. In this video, learn how toconfigure your Microsoft Dynamics CRM Online of CRM 2013 account to utilize a Gmail or other POP3/SMTP type mail server. The purpose of this lesson is to explain how to configure your Microsoft Dynamics CRM Online account to utilize a Gmail or other POP3/SMTP type mail server. Many people who are looking to experience a Microsoft Dynamics CRM Online trial user the popular email service Gmail. Fortunately, CRM Online can be configured to use Gmail as its mail server through the built-in Email Configuration feature, which supports an array of mail server types, such as Office 365 Exchange, Gmail, and most POP/SMTP servers.
MCITP 70-640: Global Catalog Server
 
13:40
Check out http://YouTube.com/ITFreeTraining or http://itfreetraining.com for more of our always free training videos. Global Catalog Servers contain a partial replica for every object in Active Directory. A Global Catalog Server is used to find objects in any domain in the forest. Any Domain Controller can be made into a Global Catalog Server. This video looks at how to remove or make a Domain Controller into a Global Catalog Server and also the reasons why and where you should put Global Catalog Servers. Global Catalog Servers are used to find objects in any domain in the forest but it should be remembered that this does not give the user access to that object. Unless the user has the correct permissions they will not be able to access resources in other domains. Global Catalog Servers also contain information about groups that span across domains and services that work at the forest level. How to change a Domain Controller to a Global Catalog Server 04:18 Using the admin tool Active Directory Users and Computers to navigate to the computer account for your Domain Controller. By default this will be located in the Domain Controllers OU. Open the properties for the Domain Controller and select the button NTDS settings. Deselect or select the tickbox Global Catalog. Windows will do the rest. Reasons to deploy Global Catalog Servers Reason 1 Domain Controllers generate a security token for a user when they first login. If the user is in a group that spans multi--domains, that Domain Controller will need to contact a Global Catalog to get information about that group. Reason 2 If a user logs in using a Universal Principal Name (UPN), that is, they log in using a user name in the form of [email protected]name, a Domain Controller will need to access a Global Catalog Server before the log in is completed. Reason 3 Global Catalog Servers work as an index to the forest. If you perform any searches on the forest you will need to contact a Global Catalog Server. Reason 4 Microsoft recommends that any network that is separated by a Wide Area Network have a Global Catalog Server deployed at that location. This will ensure that users can log on if the Wide Area Network is down. In order for a computer to contact a Global Catalog Server, ports 389 (LDAP) and 3267 (Global Catalog) need to be opened. If these ports are not open then the user will not be able to use the remote Global Catalog Server. Reason 5 Some software requires a Global Catalog Server in order to run. Exchange is a big user of the Global Catalog Server. If you have a decent amount of Exchange users on your network, you should consider deploying a Global Catalog Server close to these users. Reasons not to deploy a Global Catalog Server Global Catalog Servers put more load on the server in the form of searches and lookups from the client. Global Catalogs need to keep their index up to date. This requires more network bandwidth. In order to store the Global Catalog Server, you are required to have additional hard disk space on your server.
Views: 162934 itfreetraining
70-410 Objective 5.3 - Creating and Managing Groups and OUs on Windows Server 2012 R2
 
17:33
In this video I will explain concepts for the 70-410 Objective 5.3 of Creating and Managing Active Directory Groups and Organizational Units. Most people confuse Organizational Units or OUs and Active Directory Security Groups. They are both use for totally different reasons, but still share the same concept of organizing users and computers. OUs organize Users or Computer objects in AD so that we can Policy the objects with Group Policy. Groups organize user or computer account in AD so that we can administrate by role. This administration is in the form of securing resource with ACLs in which we allow the groups to either allow access or deny access in varying levels of access. We cover this first so that we can have a clear understanding of the differences between the two before we proceed. We then proceed to understand the security on Organizational Units and how we can delegate an OU for admins to follow the principle of least permissions. In the example we can delegate an OU to an average user whom might be a manager, so that he or she can provide password reset for their employees. We could always give a higher level of permission than what is needed. However, that would not limit mistakes and abuse of privileges. We then look at group types of Distribution and Security. Since Distribution is solely used for Exchange users we will not be discussing them and Distribution Groups are not an objective for the exam. Security Groups have several scopes, such as Machine Local Groups, Domain Local Groups, Global Groups and Universal Groups. Before discussing Group Scopes further we look at the basic purpose of groups to organize users together. We do this so that we can administrate by groups and not by individual users. The process is called Role Based Access Control. We then focus on group scope types and begin with Machine Local Groups and which group types can be nested inside of them. Machine local groups have no availability outside of the local machine. Domain Local Groups can contain other Domain Local Groups, Global Groups and Universal groups in addition to User accounts or Computer accounts. The availability of a Domain Local Group for nesting under other Domain Local Groups is only for the Domain they are created in; they are “Local” to the domain. Global Groups can contain only other global groups in addition to User account and Computer accounts. They however are available outside of the domain for nesting in other Domain Local Groups, Machine Local Groups and Universal Groups. Universal Groups can contain Global Groups and other Universal groups in addition to User accounts and Computer accounts. They are available throughout the entire forest. We then focus on nesting of groups to achieve administrative control for permissions. While allowing autonomous control by other admins. Such as allowing an administrator to secure a resource, while allowing the other administrator to organize their users by role. We use the process of AGDLP or AGUDLP. Which is simply adding users to global groups nesting global groups inside of domain local groups and securing permissions with the domain local group. A variation of that is adding users to global groups nesting global groups inside of universal group then nesting the universal group inside of domain local groups and securing permissions with the domain local group. We briefly talk about creating groups with GUI and the Command line via the DS commands and PowerShell. We also talk about managing groups with Group Policy using Restricted Groups inside of GPO. Thus allowing a user to be a member of a machine local group or only allowing an absolute list of people to be members of the machine local group. Finally we learn about group conversion and how we can convert a domain local group to a global group and a global group to a domain local group. We also understand the rules behind these conversions. Understanding the differences between OUs and Groups – 0:20 Understanding what Organization Units are used for – 0:32 Understanding what Groups are used for – 0:59 How to use OUs for delegated admin access – 1:16 Group Types and Group Scopes – 3:20 Group Concepts for Security – 4:51 Understanding the Machine Local Group Scope – 5:55 Understanding the Domain Local Group Scope – 6:52 Understanding the Global Group Scope – 7:30 Understanding the Universal Group Scope – 7:55 Nesting of groups for permissions – 8:28 Creating Groups – 12:20 Managing Groups with AD – 13:15 Group Conversion – 14:28
Views: 31626 NetworkedMinds
Microsoft Exchange Server
 
34:07
Microsoft Exchange Server is calendaring software, a mail server and contact manager developed by Microsoft. It is a server program that runs on Windows Server and is part of the Microsoft Servers line of products. Windows Messaging, initially also called Microsoft Exchange, is an e-mail client that was included with Windows 95 (beginning with OSR2), 98 and Windows NT 4.0. This video is targeted to blind users. Attribution: Article text available under CC-BY-SA Creative Commons image source in video
Views: 54 Audiopedia
Microsoft software audits CAL licenses explained
 
04:13
http://www.SoftwareAuditLawyers.com Our firm helps small and large companies on software licensing audits. These audits can involve many different types of software products including Microsoft, IBM, Autodesk and audits for industry associations such as BSA and SIIA. If you received a letter alleging your business has engaged in federal copyright infringement or software piracy, it would make sense to discuss your situation with an intellectual property law firm. We have helped many companies in the past and we can help you. Contact us at (877) 276-5084 of visit our website by clicking on the link above. Software piracy is an issue that can affect directors, officers, shareholders and others. One big issue right now is architects and engineers who are facing Autodesk licensing audits for AutoCad software products. We can help you negotiate a settlement whether you are dealing with a law firm, accounting firm, or whether you are involved in software mediation, arbitration or litigation.
Views: 4996 Steve Vondran
Clustered vs. Nonclustered Index Structures in SQL Server
 
08:04
Clustered and nonclustered indexes share many of the same internal structures, but they're fundamentally different in nature. Watch Microsoft Certified IT Professional Jon Seigel explain the similarities and differences of clustered and nonclustered indexes, using a real-world example to show how these structures work to improve the performance of SQL queries. Blog post on primary key vs. the clustered index: http://voluntarydba.com/post/2012/10/02/The-Primary-Key-vs-The-Clustered-Index.aspx CREATE INDEX statement reference: http://technet.microsoft.com/en-us/library/ms188783.aspx ALTER INDEX statement reference: http://technet.microsoft.com/en-us/library/ms188388.aspx Index navigation internals by example: http://sqlblog.com/blogs/paul_white/archive/2011/08/09/sql-server-seeks-and-binary-search.aspx Sample index data is from the AdventureWorksLT2008R2 sample database: http://awlt2008dbscript.codeplex.com/releases/view/46169 Visit my channel for more database administration videos: https://www.youtube.com/voluntarydba Subscribe to get notified about my latest videos: https://www.youtube.com/voluntarydba?sub_confirmation=1 Read additional content on my blog: http://voluntarydba.com Follow on Twitter: https://twitter.com/voluntarydba Like on Facebook: https://facebook.com/voluntarydba
Views: 288281 Voluntary DBA
Understanding Windows Server Client Access Licenses (CALs)
 
02:19
Stay up to date with Windows Server Client Access License (CAL) compliance guidelines so you can ensure your licensing needs are fulfilled. Subscribe for more videos like this: http://hpe.to/6005DlCoz Learn more about CALs: http://hpe.to/6001DkPff
Views: 15064 Coffee Coaching
Configuring Group Policy (Part 1) - Windows Server 2008 R2
 
13:09
Configuring Group Policy (Part 1) - Windows Server 2008 R2 This is a two part video providing a step by step guide on how to configure Group Policy with Windows Server 2008 R2. Part 1 - Includes creating Group Policy objects (GPOs), configuring Group Policy settings and applying them to users and computers. Part 2 - Understanging and applying Group Policy precedence, inheritance, enforcing policies, blocking inheritance and linking and deleting GPOs.
Views: 224779 ittaster
EMC Avamar Exchange Backup Configuration
 
11:41
EMC Avamar Exchange Backup Configuration
Views: 1886 TechnologyFirst
MX Record - What is...
 
04:15
MX Records (Mail Exchange) are DNS records that are used to route email to email servers. You can have numerous MX Records posting to different email servers to prevent loss of email due to downtime. Email is sent to servers pointed to in MX records based on Priority which states that the lowest the Priority number the higher the priority of the server. Emails will be routed to MX records of 0 first.
Views: 2476 Eli the Computer Guy
MS Exchange 2010 DAG Backup Configuration
 
05:16
How to configure Microsoft Exchange Server 2010 backup set in Ahsay Backup Software
EMC Avamar Exchange GLR
 
02:21
EMC Avamar Exchange GLR
Views: 770 TechnologyFirst

Rosuvastatin 20 mg tabletta
Aldactone espironolactona 25mg
Can you get high off fluoxetine hcl 20 mg
Morphine 30 milligrams lexapro
Increasing celexa from 10 to 20 mg