Select Page

How to fix Veeam backup error-host is either not a cluster or has its cluster services unavailable

Today I am going to show you how to fix Veeam backup failed and showed host is either not a cluster or has its cluster services unavailable error message.

Read More

How to Configure Custom Safe Links Policies in Microsoft Defender for Office 365

Safe Links is a feature in Microsoft Defender for Office 365 (formerly known as Office 365 Advanced Threat Protection or ATP) that helps protect your organization from malicious hyperlinks in email messages. When an email contains a hyperlink, Safe Links checks the URL against a list of known malicious links. If the link is safe, the user can access the website normally. However, if the link is malicious, Safe Links blocks access to the website and alerts the user and administrators.

Read More

Migrate Physical Machine to Microsoft Failover Cluster

​Let’s walk through the steps to perform a Physical to Virtual machine (P2V) conversion using Veeam Backup and Replication (VBR) to migrate a physical server to a Cluster virtual machine.

Read More

How to create custom Safe Attachments policies in Microsoft Defender for Office 365

In Microsoft Defender for Office 365, Safe Attachments is a feature that helps protect your organization from malicious email attachments. It automatically scans email attachments for potential threats, such as malware or viruses, before delivering them to recipients’ mailboxes.

Read More

How to create a Custom Quarantine Policy in Microsoft Deferent for Office 365

Creating a custom quarantine policy in Microsoft Defender for Office 365 involves configuring advanced threat protection settings to protect your organization’s email environment.

Read More

How to use the Microsoft Defender portal to assign Strict preset security policies to users

Strict preset security policies typically refer to predefined rules and guidelines designed to enhance security measures within an organization or system. These policies safeguard sensitive data, prevent unauthorized access, and mitigate potential security threats.

Read More

How to use the Microsoft Defender portal to assign Standard preset security policies to users

Microsoft Defender for Office 365 provides preset security policies to help organizations protect their Office 365 environment from various threats. These preset policies are designed to offer baseline protection and can be customized according to the organization’s specific requirements.

Read More

Microsoft Defender for Office 365-Find the Domain Name of the Trusted ARC Sealers from the Message Header

An email message internet header is a metadata set containing information about the sender, recipient, routing, and delivery of an email. It can help you find the domain name of the trusted ARC sealers. The domain name must match the domain specified in the d value of the ARC-Seal and ARC-Message-Signature headers in affected messages.

Read More

Microsoft Defender for Office 365-Configure trusted ARC sealers email authentication for Microsoft 365 Custom domains

Authenticated Received Chain (ARC) is a mechanism used in email authentication protocols to address the issues of message forwarding and intermediary handling of emails. It is designed to improve the reliability and security of email authentication systems like SPF (Sender Policy Framework) and DKIM (DomainKeys Identified Mail).

Read More