The Microsoft Skype for Business Client first tries direct connection for the Session Initiation Protocol (SIP) traffic. After it gets time-out, the client will use a proxy proxy server, id exists. This could causes noticeable delays when you sign in the client, especially if the client tries to connect to Skype for Business Online.

Microsoft published some Updates and a UC Lobby Blog article about that. There is also a Support article about that.

In the UC Lobby Blog article contains a the following:

reg add HKCU\Software\Microsoft\UCCPlatform\Lync /v EnableDetectProxyForAllConnections /t REG_DWORD /d 1 /f

Read More

Exchange Server

Microsoft announced that they deprecated the support for the SmartScreen Antispam content filters for Exchange Servers. This script uninstall the old and retired SmartScreen Antispam Agents from the local Exchange Server.

There are known issues with the SmartScreen AntiSpam content filters if you run Exchange 2016 on Windows Server 2016. So removing them might be always a good idea if you want to have a stable Exchange.

The Script removes the following AntiSpam Agents:

  • Content Filter Agent
  • Sender Id Agent
  • Protocol Analysis Agent

Before running the script and remove the AntiSpam Agents listed above, you should consider a solid alternative solution. There are several good on Premises Solutions available, and there are even more Cloud Services, including Microsoft’s own Exchange Online Protection (EOP). This could be handy if you have Office 365, you just change/tweak the Mailflow and your Mailboxes are protected.
My favorite solution is a CentOS based Linux Box running Postfix, SpamAssassin and MIMEDefang. I use this together with some AntiVirus solutions to scan all inbound and Outbound mails. However, this is just my personal favorite because it’s very reliable and flexible, but I know that many prefer a all-in-one solution running on Windows. Again, there are a lot of great solutions out there!

Read More

By default the Active Directory related commands search for a best domain controller. This is great, but by default, I want them to make use of the closest one.

And when I do bulk operations, I even want to do that on the server who have the PDC role. Some might find that useful as well.

# When it comes to scripts that do bulk operations, especially bulk loads and manipulation,
# I use the following within the Script:
if (Get-Command Set-ADServerUsage -ErrorAction SilentlyContinue) 
	Set-ADServerUsage -pdc

Please note: The write operations during bulk operations against the server that has the PDC role might not be allowed within your company. Please ask your Domain Admins before doing it! You might see a increased replication traffic if you use the PDC Server. You might also keep in mind.
There is a fine line between the benefit by using the PDC and the drawbacks that you might get. I might be better to use the closest one instead. Something you have to decide based on the operations that you want to do!

I use PowerShell Web Access a lot while commuting and traveling. That comes handy, because I don’t need a working VPN and with an App (comes free from Sapien) even triggering some long-running scripts from the iPad out of a Hotel room as no longer a pain. And it doesn’t use a lot of data.

Here is a little function to tweak the web-based PowerShell window rendered by the gateway:

Time to remove Java?

After Oracle release a bunch of (Yet again: Critical) Patches today, my Munki Server updated my Java installation… Now I start to think abbot a removal.

About 18 month ago I decided to do a fresh Installation of my Mac! The first since a very long time. While installing everything I decided to pass on Adobes Flash, and guess what: I don’t miss it anymore. Maybe now is a good time to rethink my Java installation.

I guess with the next MacOS Major release I will do another fresh installation and I will try to pass on it.

What do you think?