Category: System administration

28 August 2025 0

Migrating a Domain Controller

By Rached Chader

I migrate a DC step by step: preparation (name/IP/DNS), promotion of NEWDC (DNS+GC), FSMO transfers, PDC NTP, SYSVOL migration to DFSR, then decommissioning of OLDDC. We prioritize the GUI and validate each step with repadmin/dcdiag and DNS SRV checks.

5 November 2021 0

Office 365 Data Loss Protection – DLP

By Rached Chader

Data Loss Prevention “DLP” helps organizations comply with industry regulations and protect sensitive information. It also prevents inadvertent disclosure. The sensitive information you need to prevent leaks outside your organization includes financial data, such as credit card numbers, social security numbers, or medical records. With a DLP policy, you can identify, track, and protect sensitive information in Office and Microsoft 365.

17 June 2021 2

This mailbox database contains one or more mailboxes, mailbox plans, archive mailboxes, public folder mailboxes or arbitration mailboxes

By Rached Chader

Cannot delete a database in Exchange 2016
“This mailbox database contains one or more mailboxes, mailbox plans, archive mailboxes, public folder mailboxes or arbitration mailboxes, audit mailboxes. To get a list of all mailboxes in this database, run the Get-Mailbox -Database command. To get a list of all mailbox plans in this database, run the Get-MailboxPlan command. To get a list of archive mailboxes in this database, run the Get-Mailbox -Database -Archive command.

7 January 2021 0

Hardening Windows 10 Desktops

By Rached Chader

Here are some privacy settings that allow you to limit the communication of your information to the publisher and its partners.
This will go through the use of Group Policy Objects, which we will discover in this article.
The article was inspired by the recommendations of the National Agency for Information Systems Security, as well as my experience.

3 January 2021 0

Hardening Windows 10 Desktops – Part 2

By Rached Chader

Here are some privacy settings that allow you to limit the communication of your information to the publisher and its partners.
This will go through the use of Group Policy Objects, which we will discover in this article.
The article was inspired by the recommendations of the National Agency for Information Systems Security, as well as my experience.