1. Understanding Client Access Services in Exchange I want to spend some time now going over the concepts of understanding the client access services in Microsoft Exchange. Now, as I told you before, back when Exchange 2007 came out, they had broken Exchange into a bunch of different roles. And then slowly, over the years, […]
1. Understanding Public Folders So what are public folders? All right, so public folders allow our users to easily share and organise information into a folder that can be accessed by the different users in Microsoft Exchange. You can also control the permissions on it as well. So in Access Control, I can have a […]
1. Understanding the Global Address List Address lists are something that are created automatically when you install Exchange, and with Exchange Online, you’ve got a global address list as well. The global address list can be found in the different versions of Outlook, whether it be Outlook Online or Outlook on the Web, also known […]
1. Understanding and Planning DAGs and Settings We’re now going to get into the concepts of understanding and planning database availability groups, also known as DAGs. We’re going to also be looking at some of the configurations and settings that go right along with that. Now the first thing I want to do is kind […]
31. File and Directory Permissions / Files Ownership As I previously stated, when you create that file, whichever group your primary group is becomes the owner. Let’s say I’m a user who didn’t create your file, but I want to look at your file. My primary group might be primary group Blue, and you, as […]
21. The finger Command Now if you want to get information about a particular user, you know what they currently have as their data. So maybe it helps you make a better choice about whether to make a change or even if a change is necessary. This very old command has been around forever. It’s […]
11. The /etc/login.defs File Now there may be some defaults that you want to use for every single user, like the location of their mail, the length of their password, the password expiration, and the range of user and group IDs. Maybe you already know where the home directory should be going, and so you […]
1. System Administration Now in this unit, we’re going to deal with system administration. So what do we mean by system administration? That’s the operating system. Now, that generally means that we’re going to talk about accessing the operating system and dealing with user accounts and groups of users. Not only must we deal with […]
31. Mount Options Okay, so far, we’ve looked at the mount command and dealt with the type. We dealt with the device file that describes the device that you’re working with, the hardware, the mount point, and the argument that should be in the MNT mount or the media or anywhere else you want to […]
21. File Info with ls –l If I use the LS command with the LF option, I’m basically asking for file information and long detail information, and it’ll show me a lot of stuff. What you’ll see are several columns. The first set of columns would be basically my permissions. Now, we haven’t talked about […]