Exchange Online Enforcement Pause

Lot of people already know the new Microsoft strategy for blocking outdated Exchange OnPrem Versions in hybrid environments. See this old article which describes the most important informations, see also the timeline for throttling and blocking. https://techcommunity.microsoft.com/t5/exchange-team-blog/update-on-transport-enforcement-system-in-exchange-online/ba-p/3827774 After some time the Exchange Teams announced an new article about pausing this enforcement with throttling and blocking. …

Exchange SU Security Update November 2023

One month after realesing Exchange October update Microsoft launched another SU for November. Some CVE are patched and a “new” Feature is activated. Original blogpost can be found here. SUs are available for the following specific versions of Exchange Server: The process of updating did not change during this year, so nothing special here. Only …

Exchange 2016 / 2019 SU october 2023

Some days ago Microsoft released the October SU for Exchange 2016 and 2019. Installing this update is the same setup routine as known from previous updates before. See the original Exchange Team Blog post. Of course here are the downloadlinks for manual downloads. This is the official update instruction: Updating to SU october Microsoft treates …

Exchange Online send mails with E-Mail alias

Long time, there was no way to change the send mail address from primary to alias mail addresses. So sending address was forced by administration. Even if users have multiple smtp-addresses there was no official way to accomplish this. January 2022 changed this statement, now it is possible to use the secondary mail address. More …

Exchange Server 2016 and 2019 receive June SU Security Update

Some days ago Microsoft released another SU Security Update for Exchange 2019 and 2016. See the original article from Exchange Team The June 2023 SUs address vulnerabilities responsibly reported to Microsoft by security partners and found through Microsoft’s internal processes. Although we are not aware of any active exploits in the wild, our recommendation is …