<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:blogChannel="http://backend.userland.com/blogChannelModule" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:pingback="http://madskills.com/public/xml/rss/module/pingback/" xmlns:trackback="http://madskills.com/public/xml/rss/module/trackback/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#" xmlns:betag="https://blogengine.io/schemas/tags">
  <channel>
    <title>Sembee</title>
    <description>Blog of Exchange Consultant Simon Butler</description>
    <link>http://blog.sembee.co.uk/</link>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>BlogEngine.NET 3.3.8.0</generator>
    <language>en-GB</language>
    <blogChannel:blogRoll>http://blog.sembee.co.uk/opml.axd</blogChannel:blogRoll>
    <dc:creator>Simon Butler</dc:creator>
    <dc:title>Sembee</dc:title>
    <geo:lat>0.000000</geo:lat>
    <geo:long>0.000000</geo:long>
    <item>
      <title>Windows 11 Upgrade Failure – BitLocker, SAFE_OS / MIGRATE_DATA and 0x8007042B</title>
      <description>&lt;p&gt;I recently spent a lot longer than expected trying to get a Windows 11 23H2 installation to update. This was after many attempts at scripted updates which kept failing. Not my usual subject matter for this blog, but having spent a long time on it, I wanted to document it.&lt;/p&gt;
&lt;p&gt;Scenario I was faced with:&lt;/p&gt;
&lt;p&gt;- Needing to in place upgrade to Windows 11 25H2 due to a LOT of specialist software on the machine. &lt;br /&gt; - Multiple attempts using various methods, such as Windows Update Assistant and an ISO install had failed&lt;br /&gt; - Logs indicated a BitLocker issue&lt;br /&gt; - Even after removing BitLocker, subsequent failures logged SAFE_OS / MIGRATE_DATA stage.&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Step 1 - The BitLocker problem.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This is fairly common &amp;mdash; once I had looked at the logs and confirmed BitLocker was involved, it was straightforward to fix.&lt;/p&gt;
&lt;p&gt;BitLocker issues are usually one of:&lt;br /&gt; - Active in a way setup doesn't like&lt;br /&gt; - Mid-state - such as a suspension not applied correctly.&lt;br /&gt; - Tied to something with the TPM chip or a change during the upgrade.&lt;/p&gt;
&lt;p&gt;Check the status with&lt;/p&gt;
&lt;p&gt;manage-bde -status&lt;/p&gt;
&lt;p&gt;Protection was still active, so I suspended it:&lt;/p&gt;
&lt;p&gt;manage-bde -protectors -disable C:&lt;/p&gt;
&lt;p&gt;Confirmed of course:&lt;/p&gt;
&lt;p&gt;manage-bde -status C:&lt;/p&gt;
&lt;p&gt;Tried the upgrade again, still failed, so I decrypted the drive:&lt;/p&gt;
&lt;p&gt;manage-bde -off C:&lt;/p&gt;
&lt;p&gt;Still failed, but with a different error - so progress was made.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Step 2 - Persistent Upgrade Failures&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;With Bitlocker neutered, the upgrade still failed. &lt;br /&gt;I tried a couple of techniques at this point:&lt;/p&gt;
&lt;p&gt;- Fresh download, as the one I was using was from last year and there had been reports that the original ISO release had a problem. &lt;br /&gt; - Copying the installation files locally.&lt;/p&gt;
&lt;p&gt;Usually I would have wiped the machine by this point. However the client informed me that there is between 12 and 18 hours of setup time on this machine, plus the cost to get someone to do it, so I was being strongly discouraged from the wipe option.&lt;/p&gt;
&lt;p&gt;At this point, I turned to AI, as it was a more complex problem than anything I had seen before. The logs went in to AI to see if it would make any suggestions.&lt;/p&gt;
&lt;p&gt;AI immediately pointed to the migration phase (SAFE_OS / MIGRATE_DATA), and as there had been a problem with BitLocker earlier, that something with the TPM configuration was the most likely cause. AI was also able to confirm that a lot of the log was noise which I had been ignoring and was right to do so.&lt;/p&gt;
&lt;p&gt;AI said that these four elements were the key indicators:&lt;/p&gt;
&lt;p&gt;&amp;bull; 0x8007042B &lt;br /&gt;&amp;bull; Result: 44 &lt;br /&gt;&amp;bull; V2VArbitrate &lt;br /&gt;&amp;bull; "script" attribute is mandatory&lt;/p&gt;
&lt;p&gt;Pointing to a migration engine failure. That kind of made sense. &lt;br /&gt;There was a fair bit of back-and-forth while I got it to justify the conclusion - I needed to be confident before trying something this invasive and be aware of the consequences if it didn't work.&lt;/p&gt;
&lt;p&gt;Satisfied that the solution it was suggesting was worth a try, I did the following:&lt;/p&gt;
&lt;p&gt;1. Copied the Windows 11 ISO to the local machine. &lt;br /&gt; 2. Within the ISO files, I renamed the file tpmdriverwmi-replacement.man in the sources\replacementmanifests directory so it wasn't used during the setup.&lt;/p&gt;
&lt;p&gt;Then as a further step, I cleaned up the previous upgrade attempts, as the logs had been showing some errors. This was a little more involved than expected.&lt;/p&gt;
&lt;p&gt;rd /s /q C:\$WINDOWS.~BT&lt;br /&gt;rd /s /q C:\$WINDOWS.~WS&lt;/p&gt;
&lt;p&gt;Fairly obvious ones, not always present. &lt;br /&gt;Sometimes a permission fix was required:&lt;/p&gt;
&lt;p&gt;takeown /f C:\$WINDOWS.~BT /r /d y&lt;br /&gt;icacls C:\$WINDOWS.~BT /grant Administrators:F /t /c&lt;/p&gt;
&lt;p&gt;(I got very good at this by the end).&lt;/p&gt;
&lt;p&gt;Then there is a registry key - learnt this one the hard way.&lt;/p&gt;
&lt;p&gt;reg delete HKLM\SYSTEM\Setup\Upgrade /f&lt;/p&gt;
&lt;p&gt;That often requires a ownership/permissions change to get it to all remove.&lt;/p&gt;
&lt;p&gt;That still didn't do it.&lt;/p&gt;
&lt;p&gt;The final fix was to actually remove the reference to that file from the OS:&lt;/p&gt;
&lt;p&gt;Using an elevated command prompt:&lt;br /&gt;notepad C:\Windows\WinSxS\migration.xml&lt;/p&gt;
&lt;p&gt;Then searched for&lt;/p&gt;
&lt;p&gt;microsoft-windows-tpm-driver-wmi&lt;/p&gt;
&lt;p&gt;And removed the entry for it, including the &amp;lt;file&amp;gt; and &amp;lt;/file&amp;gt; elements - of course a backup of the file was taken before editing!&lt;/p&gt;
&lt;p&gt;After all that, running setup.exe without updates the installation went through.&lt;/p&gt;
&lt;p&gt;I counted nine upgrade attempts, each taking two hours, so this went on for over two days. Fortunately the end user didn't need the device as it was used for sporadic specialist tasks, so I was able to keep plugging away.&lt;/p&gt;
&lt;p&gt;Easily the most complex upgrade I have done, which just a few years ago I wouldn't have been able to resolve - I simply wouldn't have found that issue without AI. &lt;/p&gt;</description>
      <link>http://blog.sembee.co.uk/post/windows-11-upgrade-failure-bitlocker-safe-os-migrate-data-and-0x8007042b2</link>
      <comments>http://blog.sembee.co.uk/post/windows-11-upgrade-failure-bitlocker-safe-os-migrate-data-and-0x8007042b2#comment</comments>
      <guid>http://blog.sembee.co.uk/post.aspx?id=7ad14d2f-6dfe-4387-afda-215bdd4fded0</guid>
      <pubDate>Thu, 2 Apr 2026 13:25:00 +0100</pubDate>
      <dc:publisher>Sembee</dc:publisher>
      <pingback:server>http://blog.sembee.co.uk/pingback.axd</pingback:server>
      <pingback:target>http://blog.sembee.co.uk/post.aspx?id=7ad14d2f-6dfe-4387-afda-215bdd4fded0</pingback:target>
      <slash:comments>0</slash:comments>
      <trackback:ping>http://blog.sembee.co.uk/trackback.axd?id=7ad14d2f-6dfe-4387-afda-215bdd4fded0</trackback:ping>
      <wfw:comment>http://blog.sembee.co.uk/post/windows-11-upgrade-failure-bitlocker-safe-os-migrate-data-and-0x8007042b2#comment</wfw:comment>
      <wfw:commentRss>http://blog.sembee.co.uk/syndication.axd?post=7ad14d2f-6dfe-4387-afda-215bdd4fded0</wfw:commentRss>
    </item>
    <item>
      <title>When DKIM Exists But Still Fails: How Email Gets Broken in Transit</title>
      <description>&lt;p&gt;Following on from a recent issue with DMARC failures caused by missing SPF, I ran into a slightly different &amp;ndash; and increasingly common &amp;ndash; problem.&lt;/p&gt;
&lt;p&gt;A client reported that emails from a supplier were being quarantined by their email filtering platform. The messages could be manually released, but even after adding the sender to the allowed senders list, the issue continued.&lt;/p&gt;
&lt;p&gt;The quarantine reason pointed to DKIM failure.&lt;/p&gt;
&lt;h3&gt;What the headers showed&lt;/h3&gt;
&lt;p&gt;Reviewing the message headers revealed the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;SPF: pass&lt;/li&gt;
&lt;li&gt;DKIM: fail&lt;/li&gt;
&lt;li&gt;Mail routed through a third-party relay service before delivery&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;At first glance, this might look like a simple DKIM configuration issue. However, the presence of a DKIM signature tells a different story.&lt;/p&gt;
&lt;h3&gt;DKIM was present &amp;ndash; but invalid&lt;/h3&gt;
&lt;p&gt;In this case, the sending domain was signing outbound email correctly. The DKIM signature was present in the message headers.&lt;/p&gt;
&lt;p&gt;However, by the time the message reached the recipient, the signature no longer validated.&lt;/p&gt;
&lt;p&gt;This typically indicates that the message was modified after it was signed.&lt;/p&gt;
&lt;h3&gt;Why DKIM breaks&lt;/h3&gt;
&lt;p&gt;DKIM works by generating a cryptographic hash of selected message headers and the message body. That hash is then signed using the sender&amp;rsquo;s private key.&lt;/p&gt;
&lt;p&gt;When the receiving system checks DKIM, it recalculates the hash and compares it to the original.&lt;/p&gt;
&lt;p&gt;If anything in the signed portion of the message has changed, the hashes no longer match and DKIM fails.&lt;/p&gt;
&lt;p&gt;Common causes of this include:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Disclaimer injection&lt;/li&gt;
&lt;li&gt;Outbound spam filtering or relays&lt;/li&gt;
&lt;li&gt;Message reformatting&lt;/li&gt;
&lt;li&gt;Link rewriting or tracking additions&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;In this case, the message passed through multiple systems before delivery, making it highly likely that one of them altered the message after it had been signed.&lt;/p&gt;
&lt;h3&gt;Why whitelisting didn&amp;rsquo;t help&lt;/h3&gt;
&lt;p&gt;A common reaction in situations like this is to add the sender to an allowed list.&lt;/p&gt;
&lt;p&gt;However, modern email filtering systems do not simply bypass authentication checks because a sender is trusted.&lt;/p&gt;
&lt;p&gt;If DKIM fails, the system has to assume the message may have been altered or tampered with in transit.&lt;/p&gt;
&lt;p&gt;As a result, the message is still treated as suspicious, regardless of allow list entries.&lt;/p&gt;
&lt;p&gt;In other words, the system is behaving correctly.&lt;/p&gt;
&lt;h3&gt;The key takeaway&lt;/h3&gt;
&lt;p&gt;This was not a case of DKIM being missing or incorrectly configured at the source.&lt;/p&gt;
&lt;p&gt;Instead, DKIM was broken in transit.&lt;/p&gt;
&lt;p&gt;This is an important distinction, because it shifts the responsibility from DNS configuration to mail flow design.&lt;/p&gt;
&lt;p&gt;If outbound email is being modified, then one of the following needs to happen:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The original message must be preserved so the DKIM signature remains valid&lt;/li&gt;
&lt;li&gt;The message must be re-signed with DKIM after modification, using the correct domain alignment&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Without this, email authentication will fail, and receiving systems will increasingly reject or quarantine those messages.&lt;/p&gt;
&lt;h3&gt;Final thought&lt;/h3&gt;
&lt;p&gt;Email authentication controls do not operate in isolation.&lt;/p&gt;
&lt;p&gt;SPF, DKIM and DMARC all interact with each other, and with any systems that touch the message in transit.&lt;/p&gt;
&lt;p&gt;Adding security layers without considering how they interact can easily result in legitimate email being blocked.&lt;/p&gt;
&lt;p&gt;And as seen here, the problem is not always that authentication was never configured.&lt;/p&gt;
&lt;p&gt;Sometimes, it was configured &amp;ndash; but something else broke it along the way.&lt;/p&gt;
&lt;p&gt;This is a different failure mode to missing SPF or DKIM entirely &amp;mdash; here, authentication was present, but invalidated during transit.&lt;/p&gt;</description>
      <link>http://blog.sembee.co.uk/post/when-dkim-exists-but-still-fails-how-email-gets-broken-in-transit</link>
      <comments>http://blog.sembee.co.uk/post/when-dkim-exists-but-still-fails-how-email-gets-broken-in-transit#comment</comments>
      <guid>http://blog.sembee.co.uk/post.aspx?id=db81c531-0cbe-4550-a3d9-69f59682af64</guid>
      <pubDate>Mon, 30 Mar 2026 10:50:00 +0100</pubDate>
      <dc:publisher>Sembee</dc:publisher>
      <pingback:server>http://blog.sembee.co.uk/pingback.axd</pingback:server>
      <pingback:target>http://blog.sembee.co.uk/post.aspx?id=db81c531-0cbe-4550-a3d9-69f59682af64</pingback:target>
      <slash:comments>0</slash:comments>
      <trackback:ping>http://blog.sembee.co.uk/trackback.axd?id=db81c531-0cbe-4550-a3d9-69f59682af64</trackback:ping>
      <wfw:comment>http://blog.sembee.co.uk/post/when-dkim-exists-but-still-fails-how-email-gets-broken-in-transit#comment</wfw:comment>
      <wfw:commentRss>http://blog.sembee.co.uk/syndication.axd?post=db81c531-0cbe-4550-a3d9-69f59682af64</wfw:commentRss>
    </item>
    <item>
      <title>DMARC Quarantine and Missing SPF: Why Legitimate Email Gets Blocked</title>
      <description>&lt;p&gt;At the end of last month I dealt with a mail delivery issue that is becoming increasingly common as organisations enable DMARC enforcement.&lt;/p&gt;
&lt;p&gt;A user at a client reported that an important email was being quarantined by their spam filter. The messages could be manually released and the sender was even added to the allowed senders list, but it made no difference &amp;mdash; the messages continued to be blocked.&lt;/p&gt;
&lt;p&gt;The quarantine reason reported &lt;strong&gt;DMARC failure&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;As organisations increasingly deploy DMARC to improve email security, configuration mistakes are becoming more visible. One of the most common is enabling a DMARC policy without properly configuring SPF or DKIM authentication. When that happens, legitimate email can be quarantined or rejected by receiving mail systems that are simply following the sender&amp;rsquo;s published policy.&lt;/p&gt;
&lt;h2&gt;Understanding What Happened&lt;/h2&gt;
&lt;p&gt;The sending organisation had enabled a DMARC policy of &lt;strong&gt;quarantine&lt;/strong&gt;. This instructs receiving mail systems to treat messages as suspicious if they cannot be authenticated as coming from an authorised sending source.&lt;/p&gt;
&lt;p&gt;In principle this is good practice. DMARC helps prevent spoofing and improves the overall trustworthiness of email.&lt;/p&gt;
&lt;p&gt;However, the sender had not completed the configuration required to support the policy they had enabled.&lt;/p&gt;
&lt;p&gt;They were using &lt;strong&gt;Google Workspace&lt;/strong&gt; for email, but their domain did not have an SPF record published at all.&lt;/p&gt;
&lt;p&gt;This meant that when a receiving mail system checked authentication it saw:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;No SPF record&lt;/li&gt;
&lt;li&gt;No validated sending source&lt;/li&gt;
&lt;li&gt;DMARC policy instructing quarantine&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;From the receiving system&amp;rsquo;s perspective the message could not be authenticated, so the policy published by the sender&amp;rsquo;s own domain was applied.&lt;/p&gt;
&lt;p&gt;The spam filter was simply following instructions.&lt;/p&gt;
&lt;h2&gt;Why Whitelisting Didn&amp;rsquo;t Help&lt;/h2&gt;
&lt;p&gt;A common response when email is blocked is to ask the recipient to &lt;strong&gt;whitelist the sender&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;However, when DMARC enforcement is being honoured, authentication failure takes precedence. If a domain&amp;rsquo;s policy instructs receivers to quarantine unauthenticated mail, most modern mail security systems will comply with that policy.&lt;/p&gt;
&lt;p&gt;In other words, this was not a spam filtering problem.&lt;/p&gt;
&lt;p&gt;It was an &lt;strong&gt;authentication configuration problem&lt;/strong&gt;.&lt;/p&gt;
&lt;h2&gt;The Fix&lt;/h2&gt;
&lt;p&gt;The technical fix was straightforward: publish the correct SPF record as recommended by the mail provider (in this case Google).&lt;/p&gt;
&lt;p&gt;Once the SPF record was created, the sending source could be authenticated correctly. With authentication passing, the DMARC policy was satisfied and the messages were delivered normally.&lt;/p&gt;
&lt;h2&gt;How DMARC, SPF and DKIM Work Together&lt;/h2&gt;
&lt;p&gt;DMARC does not authenticate email on its own. Instead, it relies on SPF and DKIM to verify the sending source. If neither mechanism passes and aligns with the sending domain, the DMARC policy determines how the receiving system should handle the message.&lt;/p&gt;
&lt;h2&gt;Why These Issues Often Go Unnoticed&lt;/h2&gt;
&lt;p&gt;It is quite possible that the sending organisation had been experiencing similar delivery problems with other recipients without realising it.&lt;/p&gt;
&lt;p&gt;Unless someone reports the issue, problems like this can persist quietly for months, causing friction between suppliers and customers.&lt;/p&gt;
&lt;p&gt;In this case, because of the close relationship with my client and someone on the sender&amp;rsquo;s side keen to resolve the issue, the correct fix was implemented rather than relying on a temporary workaround.&lt;/p&gt;
&lt;h2&gt;A Reminder About DMARC Configuration&lt;/h2&gt;
&lt;p&gt;Major mail providers such as Google, Yahoo and Microsoft have tightened sender requirements in recent years. Proper authentication is increasingly expected for reliable email delivery.&lt;/p&gt;
&lt;p&gt;If DMARC is enabled, the underlying authentication mechanisms must also be correctly configured. At a minimum this usually means:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;A valid SPF record&lt;/li&gt;
&lt;li&gt;DKIM signing enabled&lt;/li&gt;
&lt;li&gt;Alignment between authentication and the sending domain&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Enabling a DMARC quarantine or reject policy before those pieces are in place can easily lead to legitimate mail being blocked.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sometimes the spam filter isn&amp;rsquo;t broken &amp;mdash; it is simply doing exactly what the sender&amp;rsquo;s domain asked it to do.&lt;/strong&gt;&lt;/p&gt;</description>
      <link>http://blog.sembee.co.uk/post/dmarc-quarantine-and-missing-spf-why-legitimate-email-gets-blocked</link>
      <comments>http://blog.sembee.co.uk/post/dmarc-quarantine-and-missing-spf-why-legitimate-email-gets-blocked#comment</comments>
      <guid>http://blog.sembee.co.uk/post.aspx?id=685aef94-b0c5-47cc-995a-23b1eabe6cd8</guid>
      <pubDate>Mon, 9 Mar 2026 10:55:00 +0100</pubDate>
      <category>Microsoft Exchange Server</category>
      <dc:publisher>Sembee</dc:publisher>
      <pingback:server>http://blog.sembee.co.uk/pingback.axd</pingback:server>
      <pingback:target>http://blog.sembee.co.uk/post.aspx?id=685aef94-b0c5-47cc-995a-23b1eabe6cd8</pingback:target>
      <slash:comments>0</slash:comments>
      <trackback:ping>http://blog.sembee.co.uk/trackback.axd?id=685aef94-b0c5-47cc-995a-23b1eabe6cd8</trackback:ping>
      <wfw:comment>http://blog.sembee.co.uk/post/dmarc-quarantine-and-missing-spf-why-legitimate-email-gets-blocked#comment</wfw:comment>
      <wfw:commentRss>http://blog.sembee.co.uk/syndication.axd?post=685aef94-b0c5-47cc-995a-23b1eabe6cd8</wfw:commentRss>
    </item>
    <item>
      <title>Podcast - Holy Trinity for Email Delivery – DMARC, DKIM and SPF</title>
      <description>&lt;div id="buzzsprout-player-12821132"&gt;

&lt;iframe src="https://www.buzzsprout.com/2050959/12821132-the-holy-trinity-of-email-delivery?client_source=small_player&amp;amp;iframe=true&amp;amp;referrer=https://www.buzzsprout.com/2050959/12821132-the-holy-trinity-of-email-delivery.js?container_id=buzzsprout-player-12821132&amp;amp;player=small&amp;amp;_=1683724306484" loading="lazy" width="100%" height="200" frameborder="0" scrolling="no" title="Cyber Anxiety, The Holy Trinity of Email Delivery"&gt;&lt;/iframe&gt;


&lt;/div&gt;&lt;script src="https://www.buzzsprout.com/2050959/12821132-the-holy-trinity-of-email-delivery.js?container_id=buzzsprout-player-12821132&amp;amp;player=small" type="text/javascript" charset="utf-8"&gt;&lt;/script&gt;
&lt;div&gt;&lt;span style="font-family: &amp;quot;Open Sans&amp;quot;, sans-serif;"&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style="font-family: &amp;quot;Open Sans&amp;quot;, sans-serif;"&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style="font-family: &amp;quot;Open Sans&amp;quot;, sans-serif;"&gt;This a blog post supporting one of the Cyber Anxiety podcast series, hosted by&amp;nbsp;&lt;/span&gt;&lt;a href="https://www.inbay.co.uk/" style="overflow-wrap: break-word; font-family: &amp;quot;Open Sans&amp;quot;, sans-serif; color: rgb(51, 122, 183); "&gt;Inbay&lt;/a&gt;&lt;span style="font-family: &amp;quot;Open Sans&amp;quot;, sans-serif;"&gt;, alongside Daniel Welling of&amp;nbsp;&lt;/span&gt;&lt;a href="https://www.wellingmsp.com/" style="overflow-wrap: break-word; font-family: &amp;quot;Open Sans&amp;quot;, sans-serif; color: rgb(51, 122, 183);"&gt;WellingMSP.&lt;/a&gt;&lt;span style="font-family: &amp;quot;Open Sans&amp;quot;, sans-serif;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style="font-family: &amp;quot;Open Sans&amp;quot;, sans-serif;"&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;In this episode, Danial Welling, Luke Betteridge and I talk about the holy trinity for email delivery - DMARC, DKIM and SPF.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br&gt;&lt;/div&gt;&lt;div&gt;DKIM, DMARC and SPF have been described as the holy trinity for email delivery. Configured correctly they can improve the deliverability of your email and provide some useful reporting. Even if you are using a hosted email platform, you still need to be aware of them and ideally configure them for all services using your domain for email.&amp;nbsp;&lt;/div&gt;&lt;div&gt;These are mainly DNS changes, with only DKIM requiring support from the email server to implement.&amp;nbsp;&lt;/div&gt;&lt;div&gt;With the news that Microsoft Office365 now sends out DMARC reports, the value of setting up that system in particular has increased.&amp;nbsp;&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;What they are NOT&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;br&gt;&lt;/div&gt;&lt;div&gt;These three standards are not something that will impact the amount of spam or other junk email that you receive. This has been a common reason why admins don’t take the time to implement them, because they are only interested in something which deals with the spam problem for their own users.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;What they are&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;br&gt;&lt;/div&gt;&lt;div&gt;What they can do is improve the reliability of your email being delivered, and what remote sites do with emails that come from other sources, therefore enhancing the reputation of your email domain. On top of that, they can provide reporting on how those measures are doing and what recipient services did with the emails.&amp;nbsp;&lt;/div&gt;&lt;div&gt;Furthermore, they can also help identity other services which are using your domain name, which could be harming your domain’s reputation, or simply discover that a service has been setup by end users without the involvement of their IT people.&amp;nbsp;&lt;/div&gt;&lt;div&gt;All three are domain wide settings – it is not possible to exclude specific users.&amp;nbsp;&lt;/div&gt;&lt;div&gt;However, you can use sub domains, and configure different records for each sub domain. That would allow you to have a separate sub domain for bulk or transactional emails, with its own set of records, allowing for more accurate reporting and reputational management.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;SPF – Sender Policy Framework&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;br&gt;&lt;/div&gt;&lt;div&gt;SPF is the oldest of the three protocols, first discussed in the early 2000s.&lt;/div&gt;&lt;div&gt;As with the other two, it uses DNS extensively, but unlike DKIM, it does not require support of the sending server to work.&amp;nbsp;&lt;/div&gt;&lt;div&gt;In an SPF record, you list what servers are allowed to send email for your domain. This could include your primary email server (Exchange, Office365 etc), then any marketing or sales tools. It could also include things like a payroll system, monitoring platform etc.&amp;nbsp;&lt;/div&gt;&lt;div&gt;The drawback with this method is that because it simply lists IP addresses or hostnames, if a system gets compromised on the same network and starts sending emails from the same IP address, then it can pass the SPF test.&amp;nbsp;&lt;/div&gt;&lt;div&gt;There are limits on the size of the SPF record, and there are various methods that can be used to reduce the size of the record. You will find online tools which can help flatten the SPF record to within the allowed sizes.&amp;nbsp;&lt;/div&gt;&lt;div&gt;You can also only have one SPF record, so if a third party asks you to setup a SPF record, then you will need to incorporate their information in to your existing record (if you have one).&amp;nbsp;&lt;/div&gt;&lt;div&gt;Be careful though – if you don’t have an SPF record then do not just implement the one from the third party. That can mean that you are telling the rest of the internet to only accept email from the third party and not from your primary source. For a first SPF record, follow the guidance from your primary email provider (Office365 or Google for example), or configure it with your servers if you are still hosting your own. You can find tools online which can help you create the first record. Then add in other providers to that record.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;DKIM – Domain Keys Identified Mail&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;&lt;br&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;DKIM is not quite as old as SPF, but emerged in to the public view around the same time, and for a while was seen as a competitor to SPF as they both do the same thing – which is to tell the wider internet which servers are allowed to send email for that domain. However, as they do this in a different way, they are ideally suited to working together.&amp;nbsp;&lt;/div&gt;&lt;div&gt;DKIM signs the message, with the public key held in DNS. It therefore proves the server sending the email is allowed to do so – even if the DNS or IP address changes.&amp;nbsp;&lt;/div&gt;&lt;div&gt;DKIM uses a combination of DNS records and modifying the sent email, therefore requires support from the sending server. Exchange (on premises) doesn’t natively support DKIM, but Exchange Online from Office365 does, as do most third-party spam filtering services.&amp;nbsp;&lt;/div&gt;&lt;div&gt;If you have multiple services that support DKIM in your outbound email flow, then it should be applied to the last server you control – i.e. the last hop before it goes out to the internet.&amp;nbsp;&lt;/div&gt;&lt;div&gt;Each server or service which signs email using DKIM has its own set of DNS records – referred to as an identifier.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;DMARC – Domain-Based Message Authentication, Report and Conformance&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;br&gt;&lt;/div&gt;&lt;div&gt;DMARC is the newest of the three, from around 2012, and emerged to cover gaps in SPF and DKIM – specifically telling receivers what to do with the email if it fails one of those tests, and also to provide reporting on what those receivers did.&amp;nbsp;&lt;/div&gt;&lt;div&gt;As with the other two, it requires DNS records in each domain. As the sender, there is nothing to do on the server. As the recipient, you need to use a service that supports DMARC.&amp;nbsp;&lt;/div&gt;&lt;div&gt;A DMARC record contains two parts – action and report.&amp;nbsp;&lt;/div&gt;&lt;div&gt;The action element allows the sender to tell the recipient what to do with emails that fail the SPF and DKIM test. It has three stages – report (do nothing), quarantine (put in to the spam folder) and reject. On top of that, you can also set a percentage value – so the receiving server can be told to only quarantine or reject some of the failing email, allowing the email administrator to catch a potential configuration problem.&amp;nbsp;&lt;/div&gt;&lt;div&gt;The end goal is to get to 100% reject, but that can take some time while the various services are found and setup correctly - either by moving to a subdomain, adding to the SPF record, and ideally having a DKIM record setup (if supported).&amp;nbsp;&lt;/div&gt;&lt;div&gt;The reporting element is an email address, which is where the reports are sent to, and depending on the volume of email, you can receive multiple reports per day from the same recipient domain. The reports themselves are in XML format – they are not designed to be read by a human. The format is standard and they are designed to be sent to a service provider, who processes those reports and then presents them to their customer in a more structured format allowing for more sophisticated reports to be created. This allows patterns and trends to be noticed, and the configuration of the settings adjusted. As confidence grows, based on the reports, you can consider moving to quarantine and then reject, monitoring the reports to ensure that nothing is being rejected which shouldn’t be, due to incorrect or missing DNS records.&amp;nbsp;&lt;/div&gt;&lt;div&gt;Not all providers support all functionality of DMARC. Google does for example, not only respecting the first part about what to do with the email if it fails a SPF or DKIM test, but also returning the reports back to the sending domain.&amp;nbsp;&lt;/div&gt;&lt;div&gt;Microsoft Office365 have respected the DMARC policy settings, but were not sending out the reports, but that changed in March of 2023, with reports now being sent for most of their tenants where the MX records point directly to Microsoft, although at the time of writing it is still in preview. If you are using a third-party filtering service in front of Office365, then that service needs to send DMARC reports instead.&amp;nbsp;&lt;/div&gt;&lt;div&gt;Their consumer targeted service (Hotmail/Outlook.com) has been sending DMARC reports for some time.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br&gt;&lt;/div&gt;&lt;div&gt;Full details on DMARC on the project web site at https://dmarc.org/&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;No Email Domains&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;br&gt;&lt;/div&gt;&lt;div&gt;If you have domains that do not send email at all, then configure an SPF and DMARC record to indicate that. Spammers will often use dormant domains as their spoofed from address. Therefore, by configuring SPF to say that there are no servers authorised and setting DMARC to 100% reject, you help out the rest of the internet community by not allowing your domain to be abused. You can omit the reporting email addresses from the record if you not want to receive reports for those domains.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;Where to start?&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;br&gt;&lt;/div&gt;&lt;div&gt;All of this can seem daunting, particularly if you are an MSP. It can also take months to get to the point where you can confidently set the DMARC record to reject, so it is difficult to know where to begin.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br&gt;&lt;/div&gt;&lt;div&gt;The strategy I use is very simple.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br&gt;&lt;/div&gt;&lt;div&gt;On each client I will setup an email address for DMARC END User reports – these are the reports generated by the various DMARC reporting services. This could be something like dmarc-reports@example.com. The email address is on a group, and as the service provider, I will have an email address on my system that is a member of that group. You can also include any internal recipients at the client in that list.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br&gt;&lt;/div&gt;&lt;div&gt;Next, I will create another email address – dmarc@example.com which is used to receive the actual XML files. Again, a group, and could also include something like a public folder so that you can see who is actually sending reports.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br&gt;&lt;/div&gt;&lt;div&gt;I then start with the free Postmark weekly DMARC report - &lt;a href="https://dmarc.postmarkapp.com/" style=""&gt;https://dmarc.postmarkapp.com/&lt;/a&gt;&amp;nbsp;&lt;/div&gt;&lt;div&gt;That will give you the first DNS record for DMARC and ensure that you have configured it correctly. Set it up for each domain you control, using the dmarc-reports@example.com email address that you setup earlier.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br&gt;&lt;/div&gt;&lt;div&gt;Once it has been configured you need to test the DMARC setup. There are lots of test sites out there, but I find the most user friendly one is &lt;a href="https://www.learndmarc.com/" style=""&gt;https://www.learndmarc.com/&lt;/a&gt; .&lt;/div&gt;&lt;div&gt;&lt;br&gt;&lt;/div&gt;&lt;div&gt;If you decide to use additional services, simply take the email address that postmark provided to you and add it to the dmarc@example.com group as a member. Then change the email address in the DNS record to dmarc@example.com. As you sign up for other services, simply add the email address they provide to you to the group – that allows multiple services to get the same emails.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br&gt;&lt;/div&gt;&lt;div&gt;You can add multiple email addresses to the DNS record itself, but eventually you will hit a limit on the record size, and the group method is a good way to get round that.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br&gt;&lt;/div&gt;&lt;div&gt;For DKIM, if you are not using a third-party email filtering services for outbound email on Office365, then enable it in the Office365 console. Microsoft have instructions on how to do that here: &lt;a href="https://learn.microsoft.com/en-us/microsoft-365/security/office-365-security/email-authentication-dkim-configure?view=o365-worldwide" style=""&gt;https://learn.microsoft.com/en-us/microsoft-365/security/office-365-security/email-authentication-dkim-configure?view=o365-worldwide&lt;/a&gt;&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br&gt;&lt;/div&gt;&lt;div&gt;It takes a few minutes to configure DMARC per domain.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br&gt;&lt;/div&gt;&lt;div&gt;For DKIM, if you are using a third-party service for outbound email, then look in their service guides on how to configure DKIM.&amp;nbsp;&lt;/div&gt;&lt;div&gt;Similarly, if you know that the client is using other email services, such as SendGrid or Salesforce, then setup DKIM in their service as well. Remember each service has its own DKIM records, with a unique identifier.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br&gt;&lt;/div&gt;&lt;div&gt;For SPF, you may already have an SPF record as they are in the standard DNS records suggested for Office365, and most third-party spam providers will also ask you to configure one. If you don’t have one, then wait.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br&gt;&lt;/div&gt;&lt;div&gt;With that done, leave it a week or more, for the reports to build up. Review the reports to see what services are sending email as your domain. You can then investigate whether they are in the SPF record, whether they support DKIM etc. If you don’t have an SPF record then you can look up what the service provider suggests and use the various tools to create the SPF record.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;DMARC Reporting Provider&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;&lt;br&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;When you start looking at DMARC reporting providers you will usually see that they charge per domain and also per email volume. The volume will be the number of emails that generate DMARC reports, not the total volume of email that you send. Use the trial periods to see what kind of volume emails are generating reports and then shop accordingly.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;DNS record management&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;br&gt;&lt;/div&gt;&lt;div&gt;I see a lot of errors with DNS records, including duplication and multiple records not being supported, usually because service providers will provide a record presuming that it is only their service you are using, when you actually need to combine records. Therefore, to be clear on the DNS records:&lt;/div&gt;&lt;div&gt;&lt;br&gt;&lt;/div&gt;&lt;div&gt;&lt;ul&gt;&lt;li&gt;SPF – single DNS record, but it can reference other records.&amp;nbsp;&lt;/li&gt;&lt;li&gt;DMARC – single DNS record, but it can have multiple email addresses listed.&amp;nbsp;&lt;/li&gt;&lt;li&gt;DKIM – multiple DNS records, one or more for each service that is sending email.&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div&gt;&lt;br&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;On Going Maintenance&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;br&gt;&lt;/div&gt;&lt;div&gt;It is important that the reports are reviewed regularly (which is why I like to start with the Postmark report as I get it once a week), to ensure that no new services have been introduced which need to be included in the various DNS records. As the confidence in what services are sending email grows, you can move from the default report setting, to a quarantine setting.&lt;/div&gt;&lt;div&gt;&lt;br&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;Summary&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;br&gt;&lt;/div&gt;&lt;div&gt;The holy trinity of SPF, DKIM and DMARC can be a very useful tool for IT service providers, whether internal or an MSP. It can not only help with email delivery, but it also identifies other email services that are being used and ensure that they are setup correctly in compliance with the best practises for email configuration. It can also show if the domain is being abused so that the client is aware. As the initial setup takes a few minutes and costs nothing, it can be something that all IT service providers can setup and configure for their clients.&amp;nbsp;&lt;/div&gt;&lt;div&gt;DMARC Service Providers and useful links&lt;/div&gt;&lt;div&gt;The most comprehensive and independent list of DMARC service providers and other resources is available at &lt;a href="https://dmarcvendors.com/" style=""&gt;https://dmarcvendors.com/&lt;/a&gt;&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br&gt;&lt;/div&gt;&lt;div&gt;&lt;span style="font-family: &amp;quot;Open Sans&amp;quot;, sans-serif;"&gt;If you would like to listen to the rest of the series, then they can be found here:&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style="font-family: &amp;quot;Open Sans&amp;quot;, sans-serif;"&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style="font-family: &amp;quot;Open Sans&amp;quot;, sans-serif;"&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div id="buzzsprout-large-player"&gt;&lt;div class="episode"&gt;
&lt;iframe id="player_iframe" src="https://www.buzzsprout.com/2050959?client_source=large_player&amp;amp;iframe=true&amp;amp;referrer=https://www.buzzsprout.com/2050959.js?container_id=buzzsprout-large-player&amp;amp;player=large&amp;amp;_=1683724306485" width="100%" height="375" frameborder="0" scrolling="no" title="Cyber Anxiety"&gt;&lt;/iframe&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;script type="text/javascript" charset="utf-8" src="https://www.buzzsprout.com/2050959.js?container_id=buzzsprout-large-player&amp;amp;player=large"&gt;&lt;/script&gt;</description>
      <link>http://blog.sembee.co.uk/post/podcast-holy-trinity-for-email-delivery-dmarc-dkim-and-spf</link>
      <comments>http://blog.sembee.co.uk/post/podcast-holy-trinity-for-email-delivery-dmarc-dkim-and-spf#comment</comments>
      <guid>http://blog.sembee.co.uk/post.aspx?id=9e910a24-a7ad-42d0-aca7-1cb51abe5a0e</guid>
      <pubDate>Wed, 10 May 2023 14:05:00 +0100</pubDate>
      <category>Microsoft Exchange Server</category>
      <category>Podcast</category>
      <dc:publisher>Sembee</dc:publisher>
      <pingback:server>http://blog.sembee.co.uk/pingback.axd</pingback:server>
      <pingback:target>http://blog.sembee.co.uk/post.aspx?id=9e910a24-a7ad-42d0-aca7-1cb51abe5a0e</pingback:target>
      <slash:comments>0</slash:comments>
      <trackback:ping>http://blog.sembee.co.uk/trackback.axd?id=9e910a24-a7ad-42d0-aca7-1cb51abe5a0e</trackback:ping>
      <wfw:comment>http://blog.sembee.co.uk/post/podcast-holy-trinity-for-email-delivery-dmarc-dkim-and-spf#comment</wfw:comment>
      <wfw:commentRss>http://blog.sembee.co.uk/syndication.axd?post=9e910a24-a7ad-42d0-aca7-1cb51abe5a0e</wfw:commentRss>
    </item>
    <item>
      <title>Podcast - Conditional Access</title>
      <description>&lt;div id="buzzsprout-player-12673464"&gt;

&lt;iframe src="https://www.buzzsprout.com/2050959/12673464-conditional-access?client_source=small_player&amp;amp;iframe=true&amp;amp;referrer=https://www.buzzsprout.com/2050959/12673464-conditional-access.js?container_id=buzzsprout-player-12673464&amp;amp;player=small&amp;amp;_=1682066377103" loading="lazy" width="100%" height="200" frameborder="0" scrolling="no" title="Cyber Anxiety, Conditional Access"&gt;&lt;/iframe&gt;


&lt;/div&gt;&lt;script src="https://www.buzzsprout.com/2050959/12673464-conditional-access.js?container_id=buzzsprout-player-12673464&amp;amp;player=small" type="text/javascript" charset="utf-8"&gt;&lt;/script&gt;

&lt;p class="MsoNormal"&gt;This a blog post supporting one of the Cyber Anxiety series, hosted by &lt;a href="https://www.inbay.co.uk/"&gt;Inbay&lt;/a&gt;, alongside Daniel Welling of &lt;a href="https://www.wellingmsp.com/"&gt;WellingMSP.&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p class="MsoNormal"&gt;The latest one is about Conditional Access in Office365&lt;/p&gt;&lt;p class="MsoNormal"&gt;&lt;b&gt;Conditional Access in Office365&lt;/b&gt;&lt;/p&gt;&lt;p class="MsoNormal"&gt;Conditional Access is probably the most powerful tool
available for security of your and your client’s Office365 tenants. When used
in combination with Multi Factor authentication (MFA), it can keep most of the bad
actors away, but can also protect your client’s data. It is such a powerful
tool that I can only give you a brief introduction to the power it has. &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;

&lt;p class="MsoNormal"&gt;First a warning – it is very easy to lock yourself out of
the tenant with Conditional Access, so always have an emergency access account
configured and confirmed as working. &lt;br&gt;
This is documented on the Microsoft web site (&lt;a href="https://docs.microsoft.com/en-us/azure/active-directory/roles/security-emergency-access"&gt;https://docs.microsoft.com/en-us/azure/active-directory/roles/security-emergency-access&lt;/a&gt;) . If you have any rules already configured, then exclude this
account from all of them. &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;

&lt;p class="MsoNormal"&gt;&lt;b&gt;What is Conditional Access?&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/p&gt;

&lt;p class="MsoNormal"&gt;Conditional Access is a feature of
AzureAD which allows you to control who and what can access the Office365
tenant. It can enforce the use of a managed machine, MFA, location and approved
apps, giving the administrator full control over the tenant access. &lt;br&gt;
It can also be used to limit MFA prompts, which are one of the main barriers to
adoption of MFA. &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;

&lt;p class="MsoNormal"&gt;During initial adoption, the rules can be
run in Report Only mode, therefore allowing you to catch anything that could be
outside of the ruleset before it goes live. Enabling a small Azure subscription
(usually less than £10/month) will allow more advanced reporting. This can be very
useful to show to the client to demonstrate what conditional access could or is
blocking. If you followed my advice at the start about configuring an Emergency
Access Account, then the same log workspace can be used.&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;

&lt;p class="MsoNormal"&gt;Two of the most common uses for
Conditional Access are Country Restrictions and Securing Sign Ups for MFA. &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;

&lt;p class="MsoNormal"&gt;&lt;b&gt;Country Restrictions&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/p&gt;

&lt;p class="MsoNormal"&gt;One of the easiest to implement, but most
effective uses of Conditional Access is to restrict what countries can access
the tenant. If you or your client are all located in the UK, then restricting
login to the UK will stop a lot of attacks, even if an account gets
compromised. &lt;br&gt;
Conditional Access works on the Block Everything, with exceptions rule, so you
will need to build a list of countries that can access the tenant (typically I
do UK, ROI, Jersey, Guernsey and Isle of Man). &lt;br&gt;
&lt;br&gt;
The only drawback is if a user goes travelling and needs to access company
resources. To combat that, create a group for the exceptions, then add and
remove users from that group as required. Make sure that end users know to
inform you that they are traveling. &lt;br&gt;
It can be tempting to allow some users to be in the exception group all of the
time. If this is a high value account (CEO, MD etc) then this should be
discouraged, because they remain a target. &lt;br&gt;
However, be creative – if an end user has a holiday home where they spend a lot
of their time, then build an exception ruleset for them. If the staff member
can get a static IP address, then even better as you can restrict it to that
location only. &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;

&lt;p class="MsoNormal"&gt;&lt;b&gt;Securing MFA&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/p&gt;

&lt;p class="MsoNormal"&gt;Conditional Access is the preferred
method to enforce the use of MFA, but you can also use Conditional Access to
secure MFA. If you are using trusted location to allow office-based staff to bypass
the need for MFA, then you can use Conditional Access to ensure that those users
cannot have their account abused. A common attack would be for a bad actor to
phish the user’s security details from them, then sign up for MFA using their
own phone and are able to access the tenant from wherever. &lt;br&gt;
Therefore, configure a trusted location and then restrict MFA sign up to that
trusted location – so a user has to be in the office to sign up for MFA. &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;

&lt;p class="MsoNormal"&gt;Spend some time with the conditional
access documentation and see how you can secure both your own tenant and those
of your clients. Just don’t lock yourself out!&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;p class="MsoNormal"&gt;Luke, Daniel and I discuss conditional access in the pod cast series Cyber Anxiety, the link to it can be found above.&amp;nbsp;&lt;/p&gt;&lt;p class="MsoNormal"&gt;If you would like to listen to the rest of the series, then they can be found here:&lt;/p&gt;&lt;p class="MsoNormal"&gt;&lt;br&gt;&lt;/p&gt;

&lt;div id="buzzsprout-large-player"&gt;&lt;div class="episode"&gt;
&lt;iframe id="player_iframe" src="https://www.buzzsprout.com/2050959?client_source=large_player&amp;amp;iframe=true&amp;amp;referrer=https://www.buzzsprout.com/2050959.js?container_id=buzzsprout-large-player&amp;amp;player=large&amp;amp;_=1682066377104" width="100%" height="375" frameborder="0" scrolling="no" title="Cyber Anxiety"&gt;&lt;/iframe&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;script type="text/javascript" charset="utf-8" src="https://www.buzzsprout.com/2050959.js?container_id=buzzsprout-large-player&amp;amp;player=large"&gt;&lt;/script&gt;

&lt;p class="MsoNormal"&gt;&lt;o:p&gt;&amp;nbsp;&lt;/o:p&gt;&lt;/p&gt;</description>
      <link>http://blog.sembee.co.uk/post/podcast-conditional-access</link>
      <comments>http://blog.sembee.co.uk/post/podcast-conditional-access#comment</comments>
      <guid>http://blog.sembee.co.uk/post.aspx?id=929b3195-e208-43e4-b196-2c8b6ba4277d</guid>
      <pubDate>Thu, 20 Apr 2023 15:30:00 +0100</pubDate>
      <category>Podcast</category>
      <dc:publisher>Sembee</dc:publisher>
      <pingback:server>http://blog.sembee.co.uk/pingback.axd</pingback:server>
      <pingback:target>http://blog.sembee.co.uk/post.aspx?id=929b3195-e208-43e4-b196-2c8b6ba4277d</pingback:target>
      <slash:comments>0</slash:comments>
      <trackback:ping>http://blog.sembee.co.uk/trackback.axd?id=929b3195-e208-43e4-b196-2c8b6ba4277d</trackback:ping>
      <wfw:comment>http://blog.sembee.co.uk/post/podcast-conditional-access#comment</wfw:comment>
      <wfw:commentRss>http://blog.sembee.co.uk/syndication.axd?post=929b3195-e208-43e4-b196-2c8b6ba4277d</wfw:commentRss>
    </item>
    <item>
      <title>PodCast - Disaster Recovery &amp; Business Continuity Planning</title>
      <description>&lt;div id="buzzsprout-player-12459275"&gt;

&lt;iframe src="https://www.buzzsprout.com/2050959/12459275-disaster-recovery-business-continuity-planning?client_source=small_player&amp;amp;iframe=true&amp;amp;referrer=https://www.buzzsprout.com/2050959/12459275-disaster-recovery-business-continuity-planning.js?container_id=buzzsprout-player-12459275&amp;amp;player=small&amp;amp;_=1679915718381" loading="lazy" width="100%" height="200" frameborder="0" scrolling="no" title="Cyber Anxiety, Disaster Recovery &amp;amp; Business Continuity Planning"&gt;&lt;/iframe&gt;


&lt;/div&gt;&lt;div id="buzzsprout-player-12459275"&gt;&lt;br&gt;&lt;/div&gt;&lt;div id="buzzsprout-player-12459275"&gt;This a blog post supporting one of the Cyber Anxiety series, hosted by &lt;a href="https://www.inbay.co.uk/" style=""&gt;Inbay&lt;/a&gt;, alongside Daniel Welling of &lt;a href="https://www.wellingmsp.com/" style=""&gt;WellingMSP&lt;/a&gt;.&amp;nbsp;&lt;br&gt;The latest one is about Disaster Recovery and Business Continuity Planning.&amp;nbsp;&lt;/div&gt;&lt;div id="buzzsprout-player-12459275"&gt;&lt;br&gt;&lt;/div&gt;&lt;div id="buzzsprout-player-12459275"&gt;&lt;h2&gt;&lt;b&gt;Is Disaster Recovery and Business Continuity an Outdated Concept, and if not, where to start?&lt;/b&gt;&lt;/h2&gt;&lt;div id="buzzsprout-player-12459275"&gt;&lt;br&gt;&lt;/div&gt;&lt;div id="buzzsprout-player-12459275"&gt;Disaster Recovery or Business Continuity Planning is something that all MSPs should have not only for themselves, but also for their clients.&amp;nbsp;&lt;/div&gt;&lt;div id="buzzsprout-player-12459275"&gt;However, with the growth of cloud-based services, it could be argued that DR/BCP is now an outdated concept which most companies no longer need. Yet the company still needs to operate, so even if the plan is simply to work from home, it is still valuable to have a plan which can be communicated to staff.&amp;nbsp;&lt;/div&gt;&lt;div id="buzzsprout-player-12459275"&gt;&lt;br&gt;&lt;/div&gt;&lt;h3&gt;Disaster Recovery – what is it and where to start?&lt;/h3&gt;&lt;div id="buzzsprout-player-12459275"&gt;&lt;br&gt;&lt;/div&gt;&lt;div id="buzzsprout-player-12459275"&gt;&lt;h4&gt;Traditionally, what is a Disaster?&lt;/h4&gt;&lt;br&gt;&lt;/div&gt;&lt;div id="buzzsprout-player-12459275"&gt;Simply put a disaster should be considered the loss of something within the business. All of the below would mean that a DR plan of some kind maybe activated.&amp;nbsp;&lt;/div&gt;&lt;div id="buzzsprout-player-12459275"&gt;&lt;ul&gt;&lt;li&gt;Loss of the building.&lt;/li&gt;&lt;li&gt;Loss of access to the building.&lt;/li&gt;&lt;li&gt;Loss of data.&lt;/li&gt;&lt;li&gt;Loss of internet access.&lt;/li&gt;&lt;li&gt;Loss of electric supply.&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div id="buzzsprout-player-12459275"&gt;The likelihood of the above and their impact will play a big part in the planning that needs to take place.&amp;nbsp;&lt;/div&gt;&lt;div id="buzzsprout-player-12459275"&gt;&lt;br&gt;&lt;/div&gt;&lt;div id="buzzsprout-player-12459275"&gt;With the warnings in the Autumn of 2022 that we could have seen scheduled power blackouts, planning for that kind of scenario seems a good opportunity to open conversations with your clients regarding their plans and see what can be adapted or needs to be changed.&amp;nbsp;&lt;/div&gt;&lt;div id="buzzsprout-player-12459275"&gt;&lt;br&gt;&lt;/div&gt;&lt;h4&gt;Where to Start with DR Planning?&lt;/h4&gt;&lt;div id="buzzsprout-player-12459275"&gt;&lt;br&gt;&lt;/div&gt;&lt;div id="buzzsprout-player-12459275"&gt;A lot of companies and their IT support will look at DR and not know where to begin, or because some or all of their services are now in the cloud, feel they are at least partially covered.&amp;nbsp;&lt;/div&gt;&lt;div id="buzzsprout-player-12459275"&gt;&lt;br&gt;&lt;/div&gt;&lt;div id="buzzsprout-player-12459275"&gt;Obviously the first thing to consider is what is still physically in the office and would therefore be affected by a local failure.&amp;nbsp;&lt;/div&gt;&lt;div id="buzzsprout-player-12459275"&gt;&lt;br&gt;&lt;/div&gt;&lt;div id="buzzsprout-player-12459275"&gt;Then, after looking at the list above, it should be obvious that a lot of clients and their IT support will already have the beginnings of a plan, which can be adapted and expanded for other scenarios.&lt;/div&gt;&lt;div id="buzzsprout-player-12459275"&gt;&lt;br&gt;&lt;/div&gt;&lt;div id="buzzsprout-player-12459275"&gt;Start by asking the client a few simple questions:&lt;/div&gt;&lt;div id="buzzsprout-player-12459275"&gt;&lt;br&gt;&lt;/div&gt;&lt;div id="buzzsprout-player-12459275"&gt;&lt;ul&gt;&lt;li&gt;What do you do when the power goes out?&lt;/li&gt;&lt;li&gt;What do you do when the internet goes down?&lt;/li&gt;&lt;li&gt;What do you do if everyone is snowed in and cannot get to the office?&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div id="buzzsprout-player-12459275"&gt;For power loss, this could be a UPS that requires its own room and a generator the size of a small van in the car park, at the other end of the scale, something as simple as pen and paper or more sophisticated such as telling everyone to go home and work from there.&lt;/div&gt;&lt;div id="buzzsprout-player-12459275"&gt;&lt;br&gt;&lt;/div&gt;&lt;div id="buzzsprout-player-12459275"&gt;For loss of the internet, you might already have a 4g gateway available to take to a client at a moment’s notice.&lt;/div&gt;&lt;div id="buzzsprout-player-12459275"&gt;&lt;br&gt;&lt;/div&gt;&lt;div id="buzzsprout-player-12459275"&gt;If everyone is snowed in, do staff work from home, have soft phones for example, or is it just a day off?&lt;/div&gt;&lt;div id="buzzsprout-player-12459275"&gt;&lt;br&gt;&lt;/div&gt;&lt;div id="buzzsprout-player-12459275"&gt;For loss of data, you should already have a plan for dealing with ransomware.&lt;/div&gt;&lt;div id="buzzsprout-player-12459275"&gt;&lt;br&gt;&lt;/div&gt;&lt;div id="buzzsprout-player-12459275"&gt;All of those elements can be used and adapted for the more serious events. If the client has everything in the cloud already, then all you might have to add to a plan is how to get access to the data in a secure manner. That can be something as simple as renting dedicated servers and building a remote desktop services farm, or even just deploying Azure Virtual Desktop.&amp;nbsp;&lt;/div&gt;&lt;div id="buzzsprout-player-12459275"&gt;&lt;br&gt;&lt;/div&gt;&lt;div id="buzzsprout-player-12459275"&gt;For on premise servers, if you have protection for encryption malware, then that protection may well be adaptable for dealing with other scenarios.&amp;nbsp;&lt;/div&gt;&lt;div id="buzzsprout-player-12459275"&gt;&lt;br&gt;&lt;/div&gt;&lt;div id="buzzsprout-player-12459275"&gt;Disaster Recovery shouldn’t be seen as a massive thing that can overwhelm you or your clients. A basic plan can be put together which can be easily adapted for most clients IT needs. Even if the client then requires more advanced needs, this can be a good start and also a valuable source of revenue with the initial planning and then annual reviews to ensure the plan keeps up with the technology that they are now using.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br&gt;&lt;/div&gt;&lt;/div&gt;&lt;div id="buzzsprout-player-12459275"&gt;Luke, Daniel and I discuss DR in the pod cast series Cyber Anxiety, the link to it can be found above.&amp;nbsp;&lt;/div&gt;&lt;div id="buzzsprout-player-12459275"&gt;&lt;br&gt;&lt;/div&gt;&lt;div id="buzzsprout-player-12459275"&gt;&lt;br&gt;&lt;/div&gt;&lt;div id="buzzsprout-player-12459275"&gt;If you would like to listen to the rest of the series, then they can be found here:
&lt;div id="buzzsprout-large-player"&gt;&lt;div class="episode"&gt;
&lt;iframe id="player_iframe" src="https://www.buzzsprout.com/2050959?client_source=large_player&amp;amp;iframe=true&amp;amp;referrer=https://www.buzzsprout.com/2050959.js?container_id=buzzsprout-large-player&amp;amp;player=large&amp;amp;_=1679916459741" width="100%" height="375" frameborder="0" scrolling="no" title="Cyber Anxiety"&gt;&lt;/iframe&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;script type="text/javascript" charset="utf-8" src="https://www.buzzsprout.com/2050959.js?container_id=buzzsprout-large-player&amp;amp;player=large"&gt;&lt;/script&gt;
&lt;/div&gt;
</description>
      <link>http://blog.sembee.co.uk/post/podcast-disaster-recovery-and-business-continuity-planning</link>
      <comments>http://blog.sembee.co.uk/post/podcast-disaster-recovery-and-business-continuity-planning#comment</comments>
      <guid>http://blog.sembee.co.uk/post.aspx?id=c78f1245-2d14-4916-b6a6-3e5101642a46</guid>
      <pubDate>Mon, 27 Mar 2023 10:30:00 +0100</pubDate>
      <category>Podcast</category>
      <dc:publisher>Sembee</dc:publisher>
      <pingback:server>http://blog.sembee.co.uk/pingback.axd</pingback:server>
      <pingback:target>http://blog.sembee.co.uk/post.aspx?id=c78f1245-2d14-4916-b6a6-3e5101642a46</pingback:target>
      <slash:comments>0</slash:comments>
      <trackback:ping>http://blog.sembee.co.uk/trackback.axd?id=c78f1245-2d14-4916-b6a6-3e5101642a46</trackback:ping>
      <wfw:comment>http://blog.sembee.co.uk/post/podcast-disaster-recovery-and-business-continuity-planning#comment</wfw:comment>
      <wfw:commentRss>http://blog.sembee.co.uk/syndication.axd?post=c78f1245-2d14-4916-b6a6-3e5101642a46</wfw:commentRss>
    </item>
    <item>
      <title>Version Error When you Install Exchange in Recovery Mode Post Jan 2023 SU</title>
      <description>Quick post to say that if you are attempting to recover a server with the Jan 2023 security update installed, it will fail with a version mismatch error and ask you to use a later version of the installer. Microsoft have published a fix for the error.&amp;nbsp;&lt;div&gt;&lt;br&gt;&lt;/div&gt;&lt;div&gt;https://learn.microsoft.com/en-us/exchange/troubleshoot/setup/version-error-in-recover-server-mode-install&lt;/div&gt;</description>
      <link>http://blog.sembee.co.uk/post/version-error-when-you-install-exchange-in-recovery-mode-post-jan-2023-su</link>
      <comments>http://blog.sembee.co.uk/post/version-error-when-you-install-exchange-in-recovery-mode-post-jan-2023-su#comment</comments>
      <guid>http://blog.sembee.co.uk/post.aspx?id=774bc2be-544d-4363-99fa-cbb124e562cb</guid>
      <pubDate>Wed, 25 Jan 2023 21:00:00 +0100</pubDate>
      <category>Microsoft Exchange Server</category>
      <dc:publisher>Sembee</dc:publisher>
      <pingback:server>http://blog.sembee.co.uk/pingback.axd</pingback:server>
      <pingback:target>http://blog.sembee.co.uk/post.aspx?id=774bc2be-544d-4363-99fa-cbb124e562cb</pingback:target>
      <slash:comments>0</slash:comments>
      <trackback:ping>http://blog.sembee.co.uk/trackback.axd?id=774bc2be-544d-4363-99fa-cbb124e562cb</trackback:ping>
      <wfw:comment>http://blog.sembee.co.uk/post/version-error-when-you-install-exchange-in-recovery-mode-post-jan-2023-su#comment</wfw:comment>
      <wfw:commentRss>http://blog.sembee.co.uk/syndication.axd?post=774bc2be-544d-4363-99fa-cbb124e562cb</wfw:commentRss>
    </item>
    <item>
      <title>Exchange 2016 and Exchange 2019 Certificate Management - Post April 2022</title>
      <description>&lt;p style="margin:0in;font-family:Calibri;font-size:11.0pt"&gt;In April 2022
Microsoft released CU 23 for Exchange 2016 and CU 12 for Exchange 2019.
&lt;br&gt;
While these updates, which were much delayed, were very welcome, one of the
changes which wasn't announced was the removal of the GUI management tools for
SSL certificates. &lt;br&gt;
With Exchange being heavily web based since Exchange 2010, SSL certificates
play a key part in ensuring Exchange and its clients work correctly. The GUI
controls have been in place since Exchange 2010 was released. &lt;br&gt;
However the commands used for Exchange 2007 don't work, so a new set of
commands is required. &lt;/p&gt;

&lt;p style="margin:0in;font-family:Calibri;font-size:11.0pt"&gt;&amp;nbsp;&lt;/p&gt;

&lt;p style="margin:0in;font-family:Calibri;font-size:11.0pt"&gt;&lt;b&gt;Renewing an Existing
Certificate&lt;/b&gt;&lt;/p&gt;

&lt;p style="margin:0in;font-family:Calibri;font-size:11.0pt"&gt;&amp;nbsp;&lt;/p&gt;

&lt;p style="margin:0in;font-family:Calibri;font-size:11.0pt"&gt;For most people, you
will be renewing the certificate. If you don't have any changes to make to the
current certificate settings, then a simple on-liner of PowerShell will issue a
new renewal request for you to use with your preferred SSL provider to get a
new certificate - just enter the thumbprint of the current certificate in the
sample below:&lt;/p&gt;

&lt;p style="margin:0in;font-family:Calibri;font-size:11.0pt"&gt;&amp;nbsp;&lt;/p&gt;

&lt;p style="margin:0in;font-family:Calibri;font-size:11.0pt"&gt;$txtrequest =
Get-ExchangeCertificate -Thumbprint 123456789012344567890 |
New-ExchangeCertificate -GenerateRequest&amp;nbsp;-PrivateKeyExportable:$true&lt;/p&gt;

&lt;p style="margin:0in;font-family:Calibri;font-size:11.0pt"&gt;[System.IO.File]::WriteAllBytes('C:\SSL\renewal.req',
[System.Text.Encoding]::Unicode.GetBytes($txtrequest))&lt;/p&gt;

&lt;p style="margin:0in;font-family:Calibri;font-size:11.0pt"&gt;&amp;nbsp;&lt;/p&gt;

&lt;p style="margin:0in;font-family:Calibri;font-size:11.0pt"&gt;Use
get-exchangecertificate on its own to list the certificates currently installed
so that you can get the thumbprint. &lt;/p&gt;

&lt;p style="margin:0in;font-family:Calibri;font-size:11.0pt"&gt;&amp;nbsp;&lt;/p&gt;

&lt;p style="margin:0in;font-family:Calibri;font-size:11.0pt"&gt;&lt;b&gt;New Certificate
Request&lt;/b&gt;&lt;/p&gt;

&lt;p style="margin:0in;font-family:Calibri;font-size:11.0pt"&gt;&amp;nbsp;&lt;/p&gt;

&lt;p style="margin:0in;font-family:Calibri;font-size:11.0pt"&gt;However if this is a
new server installation, or you need to change the current certificate
configuration (for example to remove autodiscover.example.com as you are in
hybrid), then you will need to create a new certificate request. &lt;br&gt;
Another one-liner will do this, but does need to be constructed beforehand with
the relevant information:&lt;/p&gt;

&lt;p style="margin:0in;font-family:Calibri;font-size:11.0pt"&gt;&amp;nbsp;&lt;/p&gt;

&lt;p style="margin:0in;font-family:Calibri;font-size:11.0pt"&gt;$txtrequest =
New-ExchangeCertificate -GenerateRequest&amp;nbsp;-PrivateKeyExportable:$true -SubjectName "c=GB,o=Test
Company,cn=mail.example.com.com" -DomainName
autodiscover.example.com,mail.example.net,autodiscover.example.net&lt;/p&gt;

&lt;p style="margin:0in;font-family:Calibri;font-size:11.0pt"&gt;[System.IO.File]::WriteAllBytes('\\Exchange01\ssl\example.req',
[System.Text.Encoding]::Unicode.GetBytes($txtrequest))&lt;/p&gt;

&lt;p style="margin:0in;font-family:Calibri;font-size:11.0pt"&gt;&amp;nbsp;&lt;/p&gt;

&lt;p style="margin:0in;font-family:Calibri;font-size:11.0pt"&gt;Picking apart that
request…&lt;/p&gt;

&lt;p style="margin:0in;font-family:Calibri;font-size:11.0pt"&gt;The first part is
the ISO two letter designation for your country, followed by your company name.
&lt;br&gt;
cn= is the common name, which is usually the name used for OWA/ActiveSync etc
as it will appear directly on the SSL certificate. In the old wizard, it would
be set to the root of the domain (example.com) but most people would change it
to mail.example.com or whatever URL they were using for OWA. &lt;br&gt;
The -DomainName elements are the additional names on the certificate. If you
are supporting multiple domains with Exchange and need Autodiscover to work
directly, rather than one of the other methods, you need to include them here.
&lt;br&gt;
Finally is the location to place the certificate request. Unlike the first
one-liner, this requires a file share, just like it did with the wizard. As
with the old wizard, I would create a dedicated share for this process on the
Exchange server, and give everyone full control. That will ensure that Exchange
can write to it. 
&lt;br&gt;
The -PrivateKeyExportable:$true allows the certificate to be exported for use in another server. The default is false.&amp;nbsp;&lt;/p&gt;

&lt;p style="margin:0in;font-family:Calibri;font-size:11.0pt"&gt;&amp;nbsp;&lt;/p&gt;

&lt;p style="margin:0in;font-family:Calibri;font-size:11.0pt"&gt;&lt;b&gt;Completing the
Certificate Request&lt;/b&gt;&lt;/p&gt;

&lt;p style="margin:0in;font-family:Calibri;font-size:11.0pt"&gt;&amp;nbsp;&lt;/p&gt;

&lt;p style="margin:0in;font-family:Calibri;font-size:11.0pt"&gt;Whether a new or a
renewal request, once you have the certificate issued by the SSL provider, you
need to get it in to Exchange. &lt;/p&gt;

&lt;p style="margin:0in;font-family:Calibri;font-size:11.0pt"&gt;Use the same share
as above… &lt;/p&gt;

&lt;p style="margin:0in;font-family:Calibri;font-size:11.0pt"&gt;&amp;nbsp;&lt;/p&gt;

&lt;p style="margin:0in;font-family:Calibri;font-size:11.0pt"&gt;Import-ExchangeCertificate
-Server Exchange01 -FileData
([System.IO.File]::ReadAllBytes('\\Exchange01\ssl\response.cer'))&lt;/p&gt;

&lt;p style="margin:0in;font-family:Calibri;font-size:11.0pt"&gt;&amp;nbsp;&lt;/p&gt;

&lt;p style="margin:0in;font-family:Calibri;font-size:11.0pt"&gt;Where -server
Exchange01 is the server where the certificate request was generated. &lt;/p&gt;

&lt;p style="margin:0in;font-family:Calibri;font-size:11.0pt"&gt;&amp;nbsp;&lt;/p&gt;

&lt;p style="margin:0in;font-family:Calibri;font-size:11.0pt"&gt;&lt;b&gt;Exporting the
Certificate for use on Other Servers&lt;/b&gt;&lt;/p&gt;

&lt;p style="margin:0in;font-family:Calibri;font-size:11.0pt"&gt;&amp;nbsp;&lt;/p&gt;

&lt;p style="margin:0in;font-family:Calibri;font-size:11.0pt"&gt;If you have multiple
servers you will need to export the certificate to a PFX file, and then import
back in again. &lt;/p&gt;

&lt;p style="margin:0in;font-family:Calibri;font-size:11.0pt"&gt;&amp;nbsp;&lt;/p&gt;

&lt;p style="margin:0in;font-family:Calibri;font-size:11.0pt"&gt;Once again, run
get-exchangecertificate to find the thumbprint, then put it in the below
one-liner. You will probably want to use a more secure password as well! Note
that this command exports to a local folder, not a file share. &lt;/p&gt;

&lt;p style="margin:0in;font-family:Calibri;font-size:11.0pt"&gt;&amp;nbsp;&lt;/p&gt;

&lt;p style="margin:0in;font-family:Calibri;font-size:11.0pt"&gt;$bincert =
Export-ExchangeCertificate -BinaryEncoded -Thumbprint 98765432109876543210 -Password (ConvertTo-SecureString -String 'Password123'
-AsPlainText -Force)&lt;/p&gt;

&lt;p style="margin:0in;font-family:Calibri;font-size:11.0pt"&gt;[System.IO.File]::WriteAllBytes('C:\SSL\export.pfx',
$bincert.FileData)&lt;/p&gt;

&lt;p style="margin:0in;font-family:Calibri;font-size:11.0pt"&gt;&amp;nbsp;&lt;/p&gt;

&lt;p style="margin:0in;font-family:Calibri;font-size:11.0pt"&gt;To import the file,
use the following command, which goes back to using a file share for the source&lt;/p&gt;

&lt;p style="margin:0in;font-family:Calibri;font-size:11.0pt"&gt;&amp;nbsp;&lt;/p&gt;

&lt;p style="margin:0in;font-family:Calibri;font-size:11.0pt"&gt;Import-ExchangeCertificate
-Server Exchange02 -FileData
([System.IO.File]::ReadAllBytes('\\Exchange01\ssl\export.pfx')) -Password
(ConvertTo-SecureString -String 'Password123' -AsPlainText -Force)&lt;/p&gt;&lt;p style="margin:0in;font-family:Calibri;font-size:11.0pt"&gt;&lt;br&gt;&lt;/p&gt;&lt;p style="margin:0in;font-family:Calibri;font-size:11.0pt"&gt;&lt;b&gt;Enabling the
Certificate&lt;/b&gt;&lt;/p&gt;&lt;p style="margin:0in;font-family:Calibri;font-size:11.0pt"&gt;&amp;nbsp;&lt;/p&gt;&lt;p style="margin:0in;font-family:Calibri;font-size:11.0pt"&gt;With the certificate
now installed, the final step is to enable it. &lt;/p&gt;&lt;p style="margin:0in;font-family:Calibri;font-size:11.0pt"&gt;&amp;nbsp;&lt;/p&gt;&lt;p style="margin:0in;font-family:Calibri;font-size:11.0pt"&gt;enable-exchangecertificate
-ThumbPrint 98765432109876543210&amp;nbsp;
-Services IIS&lt;/p&gt;&lt;p style="margin:0in;font-family:Calibri;font-size:11.0pt"&gt;&amp;nbsp;&lt;/p&gt;&lt;p style="margin:0in;font-family:Calibri;font-size:11.0pt"&gt;











&lt;/p&gt;&lt;p style="margin:0in;font-family:Calibri;font-size:11.0pt"&gt;Services can be IIS,
SMTP, IMAP and POP - any combination of them.&lt;br&gt;
If you choose to include SMTP and get a prompt to replace the default
certificate, then choose no.&amp;nbsp;&lt;/p&gt;&lt;p style="margin:0in;font-family:Calibri;font-size:11.0pt"&gt;&lt;br&gt;&lt;/p&gt;&lt;p style="margin:0in;font-family:Calibri;font-size:11.0pt"&gt;&lt;b&gt;Update May 2022&lt;/b&gt;&lt;/p&gt;&lt;p style="margin:0in;font-family:Calibri;font-size:11.0pt"&gt;&lt;br&gt;&lt;/p&gt;&lt;p style="margin:0in;font-family:Calibri;font-size:11.0pt"&gt;This post was originally written using a single test server, so exporting the certificate wasn't required. The commands supplied by Microsoft in their process are as used above, but the resulting certificate cannot be exported. I have updated the above commands to include the ability to export the certificate so it can be used on other servers.&amp;nbsp;&lt;/p&gt;</description>
      <link>http://blog.sembee.co.uk/post/exchange-2016-and-exchange-2019-certificate-management-post-april-2022</link>
      <comments>http://blog.sembee.co.uk/post/exchange-2016-and-exchange-2019-certificate-management-post-april-2022#comment</comments>
      <guid>http://blog.sembee.co.uk/post.aspx?id=ccd957ad-2feb-4703-87f4-c44777620702</guid>
      <pubDate>Fri, 29 Apr 2022 11:05:00 +0100</pubDate>
      <category>Microsoft Exchange Server</category>
      <dc:publisher>Sembee</dc:publisher>
      <pingback:server>http://blog.sembee.co.uk/pingback.axd</pingback:server>
      <pingback:target>http://blog.sembee.co.uk/post.aspx?id=ccd957ad-2feb-4703-87f4-c44777620702</pingback:target>
      <slash:comments>0</slash:comments>
      <trackback:ping>http://blog.sembee.co.uk/trackback.axd?id=ccd957ad-2feb-4703-87f4-c44777620702</trackback:ping>
      <wfw:comment>http://blog.sembee.co.uk/post/exchange-2016-and-exchange-2019-certificate-management-post-april-2022#comment</wfw:comment>
      <wfw:commentRss>http://blog.sembee.co.uk/syndication.axd?post=ccd957ad-2feb-4703-87f4-c44777620702</wfw:commentRss>
    </item>
    <item>
      <title>Windows365 - The MSP Perspective</title>
      <description>Microsoft have announced the much anticipated Windows 10 in the cloud - Windows365 (W365).&lt;br&gt;Having spent what seems like most of the past six months talking to various MSPs about Azure Virtual Desktop (AVD) (previously called Windows Virtual Desktop), the question is how does this new service fit in with what they have been working on, have in pilot stage etc.&amp;nbsp;&lt;div&gt;&lt;br&gt;&lt;/div&gt;&lt;div&gt;It is becoming quite clear though that this is actually really good news for MSPs, particularly those that support the smaller companies of less than 100 seats.&amp;nbsp;&lt;br&gt;While AVD is a really good product, and has a lot of good uses, for small companies it doesn't make much sense because of the complexity of setup, configuration and management.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br&gt;&lt;/div&gt;&lt;div&gt;What immediately came to mind when comparing AVD and W365, was the comparison between a regular Windows Desktop and Remote Desktop Services (RDS).&amp;nbsp;&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br&gt;&lt;/div&gt;&lt;div&gt;RDS has two main uses - providing a standard desktop to a large number of users, or providing a single application on dedicated servers. These functions I see being deployed on to AVD - it feels like the natural replacement. The classic example would be something like a call centre, where the staff are using a small number of apps, but intensely, probably not requiring the full Office suite and other applications.&amp;nbsp;&lt;br&gt;However AVD has similar challenges of setup and management complexity to RDS, making it more of a challenge to get right, with the deployment requiring constant tweaking to get the balance between performance and cost just right - as AVD is priced on consumption.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br&gt;For many companies though, a full Windows 10 desktop is the better option, because the staff member is using many different apps, needs the full Office suite and other applications. That makes W365 the better option, particularly being priced per user and not on consumption. &lt;br&gt;If the company is already invested in Office365, with email, OneDrive and SharePoint in extensive use, then having the desktop in the cloud and close to those data points will also bring performance gains.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br&gt;&lt;/div&gt;&lt;div&gt;For MSPs, it becomes even more clear cut.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br&gt;A common challenge, particularly when it comes to taking on new clients is getting any kind of standardisation on the workstations. We all have the horror stories of the customer taking on a new member of staff and then going to the local computer shop, buying a "cheap" desktop then calling their MSP to get it to work (with Windows Home, and other garbage on it).&amp;nbsp;&lt;br&gt;The more recent issues of staff working from home and general supply issues have made the end user workstation more of a challenge.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br&gt;However if the end user workstation can be pretty much anything that runs an RDP client, then the problem almost goes away. With solutions to use a raspberry PI as thin client, the MSP can almost leave spares at each client for such events such as new member of staff or a system failing. If the Windows session exists in the cloud and their access device fails, they just move to something else and carry on. Power cut? Send them home. Self isolation? Work from home with everything you need available in the cloud PC. No computer at home, then a cheap chrome book or&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;I have a client who is getting close to replacing most of their field staff laptops with what would have been a AVD deployment and Samsung mobile phones (using their DEX feature), but that will probably be switched across to W365. That provides not only a consistent experience across all staff, but also provides some degree of data protection, not only from staff stealing content, but also by loss of the device. There are also considerable cost savings - the laptop and its maintenance for a start.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;Yes there will be cases where a desktop is the better solution, but as those could be seen as niche cases the MSP will have a good opportunity to ensure those niche desktops are bought, built and managed in the way that best fits their technology stack.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br&gt;&lt;/div&gt;&lt;div&gt;From the MSPs commercial point of view, it will also allow the MSP to provide a single price per user which includes everything - Windows, office, AV and other security software, monitoring and support, with the only additional cost being a standard router in the office and whatever is on the desk. Supporting work from home and nomad users will become easier and more cost effective.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br&gt;While the goal of a simple serverless environment for these small businesses has been possible for sometime (I did it many years ago for a small marketing company), there were trade-offs in performance and complexity. Windows365 takes away those two main issues, making that goal within reach of more companies (And their MSPs).&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br&gt;&lt;/div&gt;&lt;div&gt;Therefore I simply hope that Microsoft get the pricing right...&amp;nbsp;&lt;/div&gt;</description>
      <link>http://blog.sembee.co.uk/post/windows365-the-msp-perspective</link>
      <comments>http://blog.sembee.co.uk/post/windows365-the-msp-perspective#comment</comments>
      <guid>http://blog.sembee.co.uk/post.aspx?id=a05daa00-e817-4ad9-8c65-4929905de8f9</guid>
      <pubDate>Thu, 15 Jul 2021 14:07:00 +0100</pubDate>
      <category>Remote Desktop Services</category>
      <dc:publisher>Sembee</dc:publisher>
      <pingback:server>http://blog.sembee.co.uk/pingback.axd</pingback:server>
      <pingback:target>http://blog.sembee.co.uk/post.aspx?id=a05daa00-e817-4ad9-8c65-4929905de8f9</pingback:target>
      <slash:comments>0</slash:comments>
      <trackback:ping>http://blog.sembee.co.uk/trackback.axd?id=a05daa00-e817-4ad9-8c65-4929905de8f9</trackback:ping>
      <wfw:comment>http://blog.sembee.co.uk/post/windows365-the-msp-perspective#comment</wfw:comment>
      <wfw:commentRss>http://blog.sembee.co.uk/syndication.axd?post=a05daa00-e817-4ad9-8c65-4929905de8f9</wfw:commentRss>
    </item>
    <item>
      <title>Microsoft Announce Windows 365</title>
      <description>&lt;span style="color: rgba(0, 0, 0, 0.9); font-family: -apple-system, system-ui, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, &amp;quot;Helvetica Neue&amp;quot;, &amp;quot;Fira Sans&amp;quot;, Ubuntu, Oxygen, &amp;quot;Oxygen Sans&amp;quot;, Cantarell, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Apple Color Emoji&amp;quot;, &amp;quot;Segoe UI Emoji&amp;quot;, &amp;quot;Segoe UI Symbol&amp;quot;, &amp;quot;Lucida Grande&amp;quot;, Helvetica, Arial, sans-serif;"&gt;Just as everyone was starting to look at Azure Virtual Desktop (formally Windows Virtual Desktop), Microsoft announce another new service - Windows 365.&lt;/span&gt;&lt;div&gt;&lt;br&gt;&lt;/div&gt;&lt;div&gt;&lt;font color="rgba(0, 0, 0, 0.901960784313726)" face="-apple-system, system-ui, BlinkMacSystemFont, Segoe UI, Roboto, Helvetica Neue, Fira Sans, Ubuntu, Oxygen, Oxygen Sans, Cantarell, Droid Sans, Apple Color Emoji, Segoe UI Emoji, Segoe UI Symbol, Lucida Grande, Helvetica, Arial, sans-serif"&gt;https://www.microsoft.com/en-gb/windows-365&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;font color="#a00031"&gt;&lt;br style="box-sizing: inherit; font-family: -apple-system, system-ui, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, &amp;quot;Helvetica Neue&amp;quot;, &amp;quot;Fira Sans&amp;quot;, Ubuntu, Oxygen, &amp;quot;Oxygen Sans&amp;quot;, Cantarell, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Apple Color Emoji&amp;quot;, &amp;quot;Segoe UI Emoji&amp;quot;, &amp;quot;Segoe UI Symbol&amp;quot;, &amp;quot;Lucida Grande&amp;quot;, Helvetica, Arial, sans-serif; line-height: inherit !important;"&gt;&lt;/font&gt;&lt;span style="font-size:11.0pt;font-family:&amp;quot;Calibri&amp;quot;,sans-serif;
mso-fareast-font-family:Calibri;mso-fareast-theme-font:minor-latin;mso-ansi-language:
EN-GB;mso-fareast-language:EN-US;mso-bidi-language:AR-SA"&gt;&lt;a href="https://www.microsoft.com/en-us/microsoft-365/blog/2021/07/14/introducing-a-new-era-of-hybrid-personal-computing-the-windows-365-cloud-pc/"&gt;https://www.microsoft.com/en-us/microsoft-365/blog/2021/07/14/introducing-a-new-era-of-hybrid-personal-computing-the-windows-365-cloud-pc/&lt;/a&gt;&amp;nbsp;&lt;/span&gt;&lt;br style="box-sizing: inherit; color: rgba(0, 0, 0, 0.9); font-family: -apple-system, system-ui, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, &amp;quot;Helvetica Neue&amp;quot;, &amp;quot;Fira Sans&amp;quot;, Ubuntu, Oxygen, &amp;quot;Oxygen Sans&amp;quot;, Cantarell, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Apple Color Emoji&amp;quot;, &amp;quot;Segoe UI Emoji&amp;quot;, &amp;quot;Segoe UI Symbol&amp;quot;, &amp;quot;Lucida Grande&amp;quot;, Helvetica, Arial, sans-serif; line-height: inherit !important;"&gt;&lt;br style="box-sizing: inherit; color: rgba(0, 0, 0, 0.9); font-family: -apple-system, system-ui, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, &amp;quot;Helvetica Neue&amp;quot;, &amp;quot;Fira Sans&amp;quot;, Ubuntu, Oxygen, &amp;quot;Oxygen Sans&amp;quot;, Cantarell, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Apple Color Emoji&amp;quot;, &amp;quot;Segoe UI Emoji&amp;quot;, &amp;quot;Segoe UI Symbol&amp;quot;, &amp;quot;Lucida Grande&amp;quot;, Helvetica, Arial, sans-serif; line-height: inherit !important;"&gt;&lt;span style="color: rgba(0, 0, 0, 0.9); font-family: -apple-system, system-ui, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, &amp;quot;Helvetica Neue&amp;quot;, &amp;quot;Fira Sans&amp;quot;, Ubuntu, Oxygen, &amp;quot;Oxygen Sans&amp;quot;, Cantarell, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Apple Color Emoji&amp;quot;, &amp;quot;Segoe UI Emoji&amp;quot;, &amp;quot;Segoe UI Symbol&amp;quot;, &amp;quot;Lucida Grande&amp;quot;, Helvetica, Arial, sans-serif;"&gt;The big difference is that the main version that will appeal to small businesses supports AzureAD as the primary and sole domain - unlike Azure Virtual Desktop which still requires a hybrid domain with your on premise or a full server in Azure. For companies that want to go completely serverless, this is going to be the product they will go for.&lt;/span&gt;&lt;br style="box-sizing: inherit; color: rgba(0, 0, 0, 0.9); font-family: -apple-system, system-ui, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, &amp;quot;Helvetica Neue&amp;quot;, &amp;quot;Fira Sans&amp;quot;, Ubuntu, Oxygen, &amp;quot;Oxygen Sans&amp;quot;, Cantarell, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Apple Color Emoji&amp;quot;, &amp;quot;Segoe UI Emoji&amp;quot;, &amp;quot;Segoe UI Symbol&amp;quot;, &amp;quot;Lucida Grande&amp;quot;, Helvetica, Arial, sans-serif; line-height: inherit !important;"&gt;&lt;br style="box-sizing: inherit; color: rgba(0, 0, 0, 0.9); font-family: -apple-system, system-ui, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, &amp;quot;Helvetica Neue&amp;quot;, &amp;quot;Fira Sans&amp;quot;, Ubuntu, Oxygen, &amp;quot;Oxygen Sans&amp;quot;, Cantarell, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Apple Color Emoji&amp;quot;, &amp;quot;Segoe UI Emoji&amp;quot;, &amp;quot;Segoe UI Symbol&amp;quot;, &amp;quot;Lucida Grande&amp;quot;, Helvetica, Arial, sans-serif; line-height: inherit !important;"&gt;&lt;span style="color: rgba(0, 0, 0, 0.9); font-family: -apple-system, system-ui, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, &amp;quot;Helvetica Neue&amp;quot;, &amp;quot;Fira Sans&amp;quot;, Ubuntu, Oxygen, &amp;quot;Oxygen Sans&amp;quot;, Cantarell, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Apple Color Emoji&amp;quot;, &amp;quot;Segoe UI Emoji&amp;quot;, &amp;quot;Segoe UI Symbol&amp;quot;, &amp;quot;Lucida Grande&amp;quot;, Helvetica, Arial, sans-serif;"&gt;For MSPs, particularly those that support the smaller companies, this could be a game changer with regards to support. Convert the current desktops in to thin clients, or even just switch to thin clients and have everyone running on the same virtual platform, whether they are at home or in the office. New member of staff joins, they can bring their own machine in, or just have something sat on the shelf waiting. You could even use a Raspberry PI for access!&lt;/span&gt;&lt;br style="box-sizing: inherit; color: rgba(0, 0, 0, 0.9); font-family: -apple-system, system-ui, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, &amp;quot;Helvetica Neue&amp;quot;, &amp;quot;Fira Sans&amp;quot;, Ubuntu, Oxygen, &amp;quot;Oxygen Sans&amp;quot;, Cantarell, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Apple Color Emoji&amp;quot;, &amp;quot;Segoe UI Emoji&amp;quot;, &amp;quot;Segoe UI Symbol&amp;quot;, &amp;quot;Lucida Grande&amp;quot;, Helvetica, Arial, sans-serif; line-height: inherit !important;"&gt;&lt;br style="box-sizing: inherit; color: rgba(0, 0, 0, 0.9); font-family: -apple-system, system-ui, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, &amp;quot;Helvetica Neue&amp;quot;, &amp;quot;Fira Sans&amp;quot;, Ubuntu, Oxygen, &amp;quot;Oxygen Sans&amp;quot;, Cantarell, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Apple Color Emoji&amp;quot;, &amp;quot;Segoe UI Emoji&amp;quot;, &amp;quot;Segoe UI Symbol&amp;quot;, &amp;quot;Lucida Grande&amp;quot;, Helvetica, Arial, sans-serif; line-height: inherit !important;"&gt;&lt;span style="color: rgba(0, 0, 0, 0.9); font-family: -apple-system, system-ui, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, &amp;quot;Helvetica Neue&amp;quot;, &amp;quot;Fira Sans&amp;quot;, Ubuntu, Oxygen, &amp;quot;Oxygen Sans&amp;quot;, Cantarell, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Apple Color Emoji&amp;quot;, &amp;quot;Segoe UI Emoji&amp;quot;, &amp;quot;Segoe UI Symbol&amp;quot;, &amp;quot;Lucida Grande&amp;quot;, Helvetica, Arial, sans-serif;"&gt;Of course the main thing here is going to be pricing, which we need to wait a few more weeks for. As it is priced per user, rather than time based as with Azure Virtual Desktop, Microsoft get it priced right, it could be a winner.&lt;/span&gt;&lt;/div&gt;</description>
      <link>http://blog.sembee.co.uk/post/microsoft-announce-windows-365</link>
      <comments>http://blog.sembee.co.uk/post/microsoft-announce-windows-365#comment</comments>
      <guid>http://blog.sembee.co.uk/post.aspx?id=14539711-f4f1-49ce-994b-83587afee763</guid>
      <pubDate>Wed, 14 Jul 2021 16:18:00 +0100</pubDate>
      <category>Remote Desktop Services</category>
      <dc:publisher>Sembee</dc:publisher>
      <pingback:server>http://blog.sembee.co.uk/pingback.axd</pingback:server>
      <pingback:target>http://blog.sembee.co.uk/post.aspx?id=14539711-f4f1-49ce-994b-83587afee763</pingback:target>
      <slash:comments>0</slash:comments>
      <trackback:ping>http://blog.sembee.co.uk/trackback.axd?id=14539711-f4f1-49ce-994b-83587afee763</trackback:ping>
      <wfw:comment>http://blog.sembee.co.uk/post/microsoft-announce-windows-365#comment</wfw:comment>
      <wfw:commentRss>http://blog.sembee.co.uk/syndication.axd?post=14539711-f4f1-49ce-994b-83587afee763</wfw:commentRss>
    </item>
  </channel>
</rss>