Category: Technical Blog

Finding the World of Restricted Mailboxes

In today’s world, we are constantly connected to each other through various means of communication. One of the most popular methods of communication is through email, which allows us to send and receive messages at lightning-fast speeds. However, in the vast ocean of emails, there exists a lesser-known world that many people may not be aware of – the world of restricted email inboxes.

 

In this tutorial, we’ll show you how to access restricted mailboxes and unblock restricted entities. 

  • Open the Microsoft 365 Defender portal.
  • At the left menu, and below “Email & collaboration“, click on “Review“, and finally click on “Restricted entities“.
  • Find and pick users you wish to unblock on the Restricted Entities page by clicking on them, then from the above ribbon click on “Unblock“.
  • Follow the guide and unblock the user.

In conclusion, restricted email inboxes may not be widely known, but they play an important role in maintaining secure and organized communication in various settings. They offer a level of protection for sensitive information and ensure that only authorized individuals have access to it. However, they also come with their own challenges, which users need to be aware of. As we continue to navigate the world of digital communication, it is important to understand and appreciate the various methods used to safeguard our information.

 

Presenting the Mystery of Quarantined Email

Have you ever received an email that was mysteriously labeled as “quarantined” by your email provider? If so, you’re not alone. Many people have encountered this perplexing situation and wondered what it means and why it happens. In this post, we will delve into the mystery of quarantined email and shed some light on this often misunderstood phenomenon.

 

Firstly, let’s define what a quarantined email is. A quarantined email is essentially an email that has been flagged by your email provider as potentially harmful or suspicious. This means that the email has been isolated or “quarantined” from your inbox and placed in a separate folder for further inspection. This is done to protect you from potential threats such as viruses, spam, or phishing attempts.

STEP #1:

STEP #1: To open the Microsoft 365 Defender portal, go to https://security.microsoft.com. Go to Review.
 STEP #2:
  • Go to Quarantine.
  • Select the email that you want to release.
STEP #1: Go to Quarantine. Select the email that you want to release.

Why Email Quarantines:

In Microsoft 365 organizations with mailboxes in Exchange Online or standalone Exchange Online Protection (EOP) organizations without Exchange Online mailboxes, quarantine is available to hold potentially dangerous or unwanted messages.

Whether a detected message is quarantined by default depends on the following factors:

In conclusion, the mystery of quarantined email is not so mysterious after all. It is a precautionary measure taken by email providers to protect users from potential threats. By understanding the reasons behind quarantined emails and following the necessary steps, we can ensure the safety and security of our email inboxes.
 

Your Guide to Mastering Email Forwarding

Have you ever experienced the overwhelming feeling of having your inbox flooded with messages, posing a threat to your productivity? Rest assured, because you are not alone. Effectively managing emails can be quite challenging. However, busy professionals need not worry! There exists a potent tool hidden within your email settings: email forwarding.

Beyond its simple definition, email forwarding offers a surprising depth of functionality, capable of streamlining your workflow, enhancing collaboration, and ensuring important information reaches the right people, every time.

Intrigued? Follow us as we dive deeper into this tutorial of email forwarding. We’ll explore its various applications, from basic message redirection to advanced filtering and automation, all designed to help you. 

Step #1: Exchange Admin Center

First you need to go to Exchange Admin Center (https://admin.exchange.microsoft.com).

 

Step #2: Create Rules

Then expand “Mail Flow” and select “Rules”.

Under Rules, click on “Add a rule” and then “Create a New Rule”.

 
Your Guide to Mastering Email Forwarding

Step #3: Setting up Conditions for Email Transportation

This is an important step. First, we Define Forwarding Conditions:

  • Give your rule a clear and descriptive name (e.g., “Arif to Dawood”).
  • Under “Apply this Rule if” choose “The recipient is.”
  • Under “is this person”, select one.
  • Then, under “Do the following” 
  • Select “Redirect the message to”  
  • Then select “These recipient”
Your Guide to Mastering Email Forwarding

After filling out the fields your rule will look like.

Now click on “Next” button.

 

Your Guide to Mastering Email Forwarding

Step #4: Set Rule Settings

  • Under “Set rule settings”.
  • You can select the Activation and Deactivation time for your rule.
  • After setting up click on “Next” button.
Your Guide to Mastering Email Forwarding

Step #5: Review and Finish

  • Under “Review and Finish”.
  • Review all your configuration and then click finish.
Your Guide to Mastering Email Forwarding

Step #6: Enable Rule

When you create new rule by default it is in disabled state.

You must click on your rule and then enable it manually.

 

Your Guide to Mastering Email Forwarding

And that’s it! Stay tuned as we explore different forwarding techniques, best practices, and insider tips to help you achieve the full potential of this powerful tool. Remember, conquering your inbox starts with one forward at a time!

 

Stay tuned for further insights and tips on email forwarding in the upcoming posts!

IT Assessments, The Best Insurance Against Downtime

With the evolving technology landscape businesses now heavily rely on their IT systems, for day to day operations. These systems play a role in managing data and facilitating customer communications making their optimal performance essential for success. However many businesses tend to overlook the significance of IT assessments. In this blog post we will explore the importance of conducting IT assessments and how they can be the best insurance against downtime.

Why IT Assessments Matter

To begin with regular IT assessments help businesses uncover any underlying issues or vulnerabilities within their systems. As technology continues to advance at a pace cyber threats also evolve simultaneously. It is therefore imperative to stay updated and ensure security measures are in place. Regular assessments enable you to pinpoint points in your IT infrastructure and promptly address risks. This proactive approach aids in preventing data breaches, downtime disruptions and other costly consequences that may arise if these issues are left unattended.

Proactive Security for Peace of Mind

Moreover IT assessments contribute to optimizing the performance and efficiency of your systems. As your business grows and evolves over time so do your IT requirements. Regular assessments play a role, in identifying areas where enhancements can be made. Whether it involves updating hardware or software components or integrating technologies into your operations.

 

Optimizing Your IT Infrastructure

By optimizing your information technology systems you have the opportunity to enhance productivity and streamline operations, which ultimately results in saving costs and achieving performance.

 

Avoid Costly Surprises with Proactive IT Management

Regular IT assessments offer numerous benefits for businesses, including the ability to plan for the future. By conducting these assessments, businesses can gain valuable insights into their current IT infrastructure and make necessary upgrades or changes in advance. This proactive approach saves time and resources in the long run, eliminating the need for reactive measures that often come with higher costs and operational impact.

 

Get the Most Out of Your Investment

Additionally, regular IT assessments provide businesses with a better understanding of their IT budget. By identifying potential risks and areas for improvement, businesses can effectively plan and allocate their IT budget. This approach prevents overspending on unnecessary upgrades or emergency fixes.

 

Happy Customers, Happy Business

Furthermore, conducting regular IT assessments improves customer satisfaction. In today’s digitally driven world, downtime and technical issues significantly impact customer experience. By regularly assessing and optimizing IT systems, businesses ensure smooth operations and minimal interruptions, leading to improved customer satisfaction and loyalty.

 

Ensuring Data Security and Privacy

Lastly, IT assessments help businesses stay compliant with industry regulations and laws. Industries like healthcare and finance have strict data privacy and security regulations that businesses must adhere to. Regular assessments ensure that IT systems are up to date with these regulations, avoiding potential penalties or legal consequences.

 

Choose Security, Choose ITCS

In conclusion, regular IT assessments are crucial for maintaining optimal performance, efficiency, and security within organizations. They allow businesses to proactively identify risks, optimize systems, plan for the future, stay compliant, and improve customer satisfaction. Therefore, it is important not to overlook the significance of IT assessments and the significant benefits they provide for businesses.

ITCS is your premiere partner for all of your IT needs, ready to guide you through every step of the journey.

5 Cloud Myths That Are Holding You Back

As cloud solutions grow increasingly popular, misconceptions about them proliferate. Many businesses and individuals harbor reservations, often stemming from misinformation or misunderstandings. However, misconceptions can prevent organizations and people from capitalizing on the many benefits of cloud solutions. This article debunks common myths about cloud solutions.

Myth #1: Cloud solutions only benefit large enterprises

In fact, cloud solutions offer advantages for organizations of all sizes, from startups to corporations. Cloud solutions provide cost savings by eliminating expensive hardware and IT staff. Moreover, they scale to accommodate business growth. Therefore, cloud solutions suit businesses of any size.

 

Myth #2: Cloud solutions are insecure.

While data breaches are a valid concern, cloud solutions offer robust security. Providers invest heavily in encryption, firewalls, and regular updates. Most offer advanced features like multi-factor authentication and backup. Thus, cloud solutions are as secure as on-premise systems, if not more.

 

Myth #3: Migrating to the cloud is difficult

While initial setup is required, cloud solutions aim for user-friendly, smooth migration. Providers offer extensive support throughout the transition. Once complete, intuitive interfaces simplify data and application management. Hence, migration is straightforward with provider assistance.

 

Myth #4: Cloud solutions are costly

In reality, cloud solutions offer long-term savings by eliminating hardware, software, and IT staff expenses. Subscription-based pricing allows paying only for needed services and scaling accordingly. Therefore, cloud solutions provide cost-effective flexibility.

 

Myth #5: Cloud solutions lack reliability.

Leading providers offer strong uptime guarantees and backup systems for downtime. Because cloud solutions work anywhere with Internet access, business operations continue despite location issues. Thus, cloud solutions deliver proven reliability.

 

Choose Security, Choose ITCS

In summary, cloud solutions benefit organizations of all types and sizes. They provide security, savings, and resilience while being easy to adopt. It is time to dispel misconceptions and unlock the many advantages of cloud solutions.

 

Cloud solutions offer cost savings, security, and flexibility that can propel your business to new heights. It’s time to stop living in the IT stone age and step into the cloud. You might just find it’s the missing piece that unlocks your business’s true potential.

Don’t let outdated myths hold you back from experiencing the power and flexibility of cloud solutions. ITCS is your premiere partner for all things cloud, ready to guide you through every step of the journey.

Stop cyberattacks before they happen with Barracuda!

In today’s digital era, safeguarding your business from cyber threats is of utmost importance. With the constant evolution of cyber attacks, it is crucial to have a reliable cybersecurity solution in place. This is where Barracuda excels – as the leading choice for businesses seeking top-notch cybersecurity. 

Barracuda is a renowned provider of cloud-enabled security and data protection solutions. With a vast customer base of over 150,000 worldwide, their cutting-edge technology and comprehensive approach to cybersecurity have earned them a solid reputation in the industry.

Let’s delve deeper into why Barracuda should be your ultimate choice for all your cybersecurity needs. 

 

Advanced Threat Protection 

The internet is a breeding ground for cybercriminals who continuously devise new and sophisticated methods to breach security defenses. This is where Barracuda’s Advanced Threat Protection (ATP) comes into play. 

This powerful solution enables businesses to stay one step ahead of potential threats by constantly monitoring and analyzing inbound and outbound traffic. By utilizing machine learning techniques, it can detect and block advanced threats in real-time, ensuring the safety of your systems and data. 
 

Simple and Scalable Solutions

One of the biggest challenges businesses face in cybersecurity is finding a solution that is both effective and easy to manage. Barracuda addresses this challenge by offering simple and scalable solutions that can be tailored to meet the specific needs of any business. 

Their user-friendly interface and intuitive dashboard make it effortless for businesses to manage their security and data protection, even with limited IT resources. 
 

Cloud-First Approach 

In today’s era of cloud computing, it is essential for businesses to adopt a cloud-first approach to their cybersecurity needs. Barracuda offers a wide range of cloud-enabled solutions designed to protect data and applications in the cloud. Their user-friendly interface and intuitive dashboard make it effortless for businesses to manage their security and data protection, even with limited IT resources. 

 
From email security to backup and disaster recovery, their cloud-first approach ensures that your business remains secure and resilient in the face of evolving cyber threats.
 
 In conclusion, Barracuda stands out as the go-to choice for businesses seeking robust cybersecurity solutions. With their advanced threat protection, simple and scalable solutions, and cloud-first approach, they provide the necessary tools and expertise to safeguard your valuable data and systems. Trust Barracuda to be your partner in the ever-changing landscape of cybersecurity. 
 

Choose Security, Choose ITCS

Is your data safe from the ever-evolving landscape of cyber threats? Don’t let your business become the next victim. ITCS partners with Barracuda, the world’s leading cybersecurity provider, to offer comprehensive protection against viruses, malware, ransomware, and more.  

Get a customized quote that fits your budget and protects your valuable assets. Contact us today to protect your business from cyberattacks and secure it for the future!

Exporting Mailbox Data to PST Files in Microsoft 365

In the present era of global connectivity, it is inevitable to create a digital trail consisting of emails, contacts, and calendar entries. However, what if you find yourself needing to transition to a different platform or safeguard important data from your Microsoft 365 mailbox?  

If you have accumulated years of emails, contacts, and calendar entries in your Microsoft 365 mailbox, it is important to preserve that data for future reference. However, you shouldn’t have to rely solely on a cloud account to access it.

That’s where PST files come in – they serve as personal storage containers for your needs.

PST files play a crucial role as personal storage containers to cater to your requirements. In this guide, we will delve into a vital technique to export your Microsoft 365 mailbox to a PST file.

Gain complete control and uninterrupted access to your valuable information by taking this step. Regardless of any changes in your subscription, you will always have the power to manage and retrieve your data.

But Why Export?

There are multiple justifications for exporting your Microsoft 365 mailbox, which may include:

Archiving: Preserve previous emails for sentimental purposes or legal requirements, regardless of your current account status.

Migration: Transfer your data to a different email platform or local backup.  

Downsizing: Free up space in your online mailbox for better performance.

In this guide, we will provide a comprehensive explanation of one of the techniques available for exporting your mailbox data into PST files. This method involves leveraging the Content Search option within the system of M365 Admin Centre. 

By Using Content Search

Step ONE: Sign in to Microsoft 365 Admin Center

Step TWO: Access the Security & Compliance Center

  • In the Microsoft 365 Admin Center, select “Admin centers” from the left-hand navigation menu. 
  • Choose “Security & Compliance” from the list of admin centers.

Step THREE: Create a New Content Search

  • In the Security & Compliance Center, go to “Search” on the left-hand navigation pane. 
  • Click on “Content search.” 

Step Four: Create a New Content Search Query

  • Click the “+ New search” button to create a new content search.
  • Provide a name and description for the search. 
screenshot-1

Step FIVE: Define Search Criteria:

  • Click on “Add conditions” to define your search criteria. You have the ability to define specific criteria such as keywords, date ranges, and sender/recipient information.

Step SIX: Configure the Output Settings

  • After defining your search criteria, click “Next” to configure the output settings. 
  • Choose “Modify the search query” and select the “Include all items” option. 

Step SEVEN: Specify the Mailboxes to Export

  • Click “Next” to specify the mailboxes from which you want to export data. 
  • You can select specific mailboxes or apply the search to all mailboxes. 

Step EIGHT: Choose the Export Settings

  • Click “Next” to configure export settings. 
  • Choose “Export to a PST file.” 
  • Specify a location to store the exported PST files. 

Step NINE: Start the Export

  • Click “Next” to review your settings. 
  • Click “Save & run” to start the export process. 
screenshot-3

Step TEN: Monitor the Export Job

  • You can monitor the status of the export job from the “Content search” page in the Security & Compliance Center. 
  • Once the export is complete, you can download the PST files from the specified location. 

Gaining access through eDiscovery

Sometimes, a user does not have access to make PST Files. In situations where a user lacks permission to create PST files, we can leverage eDiscovery to grant access. Follow these steps:

 

Step ONE: Sign in to Microsoft 365 Admin Center

  • Sign into Microsoft 365 Admin Center:

  • Go to the Microsoft 365 Admin Center (https://admin.microsoft.com/).

  • Sign in with an account that has the necessary administrative privileges.

Step two: Access Security & Compliance Center

  • In the Admin Center, navigate to the “Admin Centers” section.

  • Click on “Security & Compliance” to access the Security & Compliance Center.

Sc1-1

Step three: Navigate to eDiscovery:

  • In the Security & Compliance Center, go to the “Solutions” section.

  • Click on “eDiscovery” to access the eDiscovery dashboard.

scrennshot2

Step Four: Create a New eDiscovery Case:

  • Click on the “+ Create a case” button to create a new eDiscovery case.

  • Provide a name and description for the case.

scrennshot4

Step Five: Add Members to the eDiscovery Case:

  • In the eDiscovery case settings, add the necessary members who should have permission to access and download the PST file.

scrennshot3

Step Six: Create a New eDiscovery Search:

  • Within the eDiscovery case, click on the “Search” tab.

  • Create a new eDiscovery search by clicking on “New search.”

scrennshot6

Step Seven: Configure Search Criteria:

  • Define the search criteria to identify the mailboxes or content you want to export to a PST file. This may include specifying keywords, date ranges, etc.

scrennshot5

Step Eight: Start the Search:

  • Initiate the search to identify the relevant content.

Step Nine: Start the Search:

  • Once the search is complete, review the search results to ensure they match your criteria.

Step Ten: Export Search Results to a PST File:

  • After reviewing the search results, go to the “Export” tab.

  • Follow the prompts to export the search results to a PST file.

  • Configure Export Settings:

  • Set the export settings, including the destination location for the PST file and any additional options.

 

That’s it! With these simple steps, you can easily export your Microsoft 365 mailbox data and ensure its safekeeping. 

Remember, the best method for you depends on your needs and technical skills. Choose the one that fits your comfort level and get exporting! 

I hope this short guide helps you navigate the world of Microsoft 365 mailbox exports.  

 

Allowing/Blocking Emails or Domains in Microsoft 365

Tired of being swamped by a flood of unwanted emails? Longing for the ability to manage your chaotic inbox?  

It’s completely understandable to feel overwhelmed by the influx of unwanted emails. You’re not alone in this constant battle against spam and irrelevant messages.   

However, there’s no need to worry, as there are effective ways to regain control over your inbox!   

We’ve prepared for you, a comprehensive tutorial that will guide you with the necessary knowledge and tools to curate your email experience, enabling you to embrace the desired emails and eliminate the unwanted ones.  

 

Step ONE: Sign in to Microsoft 365 Admin Center

Step TWO: Access the Exchange Admin Center

  • In the Microsoft 365 Admin Center, select “Admin Centers” from the left-hand navigation menu. 
  • Choose “Exchange” from the list of admin centers. 
sc1

Step THREE: Navigate to Mail Flow Rules

  • In the Exchange Admin Center, go to “mail flow” from the left-hand navigation pane. 
  • Click on “rules.” 

Step FOUR: Create a New Rule (Allow/Block)

  • To allow or block emails from specific senders or domains, you can create a new rule. 
  • Click on the “+” (New) button to create a new rule. 
  • Choose “Create a new rule” from the dropdown. 

Step FIVE: Configure the Rule

  • Give your rule a name that describes its purpose. 
  • Under “Apply this rule if,” you can specify the conditions such as the sender’s address or domain. 
  • Under “Do the following,” select either “Block the message” or “Redirect the message to” and specify the action. 
sc3
sc4

Step SIX: Save the Rule:

  • After configuring the rule, click “Save” to apply it. 
  • This rule will now allow or block emails from the specified sender addresses or domains based on your configuration. 

Now you can experience a world without spammy marketing blasts or annoying notifications that clutter your inbox. Say goodbye to wasting precious time sorting through irrelevant emails.

 

With the power to allow and block, you can create a personalized email sanctuary where only important and desired messages flow freely.

 

Message Trace in Microsoft 365

Microsoft 365
Message Trace in Microsoft 365

Message Trace in Microsoft 365 is a valuable tool for investigating email delivery issues, tracking message flow, and ensuring that important emails are reaching their intended recipients. It provides a detailed record of the path that an email message takes through your organization’s email infrastructure, from the time it is sent until it is delivered to the recipient’s inbox. 

How do you use this tool?? Below is a step-by-step guide on how to perform Message Trace in Microsoft 365. 

 

Step 1: Access the Exchange Admin Center

First you need to go to Exchange Admin Center (https://admin.exchange.microsoft.com). 

Step 2: Starting a Message Trace

Then inside “Mail Flow” click on “Message Trace” and then “Start a Trace”.

Step 3: Message Trace Filtering Options

  1. By default, Message Trace will trace all messages. You can filter your trace by sender and recipient email address. 
  2. You can select a tracing range in days. 
  3. In this section you can filter your message trace by delivery status. Also, if you know the message ID of an email then you can easily put it in this field. Message direction can be inbound or outbound. You can also insert the client IP if you know it.
  4. You can select whether to access the report online or download it as a CSV file.

Can't find a message in Message Trace?

If a message is not found in Microsoft 365 Message Trace, there could be several reasons for this issue: 

Message Hasn’t Reached Microsoft 365: The message may not have reached the Microsoft 365 environment yet. This can happen if there are delays in the email routing or if the message is still in transit. 

Search Criteria: The search criteria you entered may not match the message you’re looking for. Ensure that you’ve entered the correct sender, recipient, date range, or other relevant filters. 

Retention Policy: If the message is older and has been deleted based on your organization’s retention policies, it may no longer be available in Message Trace. 

Hybrid Deployments: In hybrid environments where you have a combination of on-premises Exchange servers and Exchange Online (Microsoft 365), Message Trace may not cover on-premises email flows. You may need to check your on-premises message tracking logs separately. 

 

Message Trace is a powerful tool that is essential for any IT administrator who is responsible for managing email infrastructure.