Navigate to the following registry key:
HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\OneDrive
Check if any of the "Disabled" keys are set to 1. If they are, set them to 0.
Navigate to the following registry key:
HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\OneDrive
Check if any of the "Disabled" keys are set to 1. If they are, set them to 0.
Import-Module ADSync
Get-ADSyncScheduler
Replicate your DCs first- repadmin /syncall /AdeP
Delta Sync-
Start-ADSyncSyncCycle -PolicyType Delta
Full Sync-
Start-ADSyncSyncCycle -PolicyType Initial
So here's a nice surprise, apparently, exchange is reporting an error Can't Convert "2201010001" to long this morning. As of Jan. 1, 2022 0:00 UTC on-premises Exchange servers seem to freezing transport of all emails – a date can't get converted. Here is a quick overview of what is going on.
To resolve this, for now, disable the anti malware-
& $env:ExchangeInstallPath\Scripts\Disable-Antimalwarescanning.ps1
redundancy management-module nonstop-switching
show redundancy
redundancy rapid-switchover 60
redundancy swtchover
show redundancy detail
Firmware-
boot set-default flash primary
write memory
boot standby
show redundancy (wait for sync
redundancy switchover
Check users email fields-
get-aduser -Filter * -Properties mail | select name,mail | Out-GridView
Command to copy-
Get-ADUser -LDAPFilter '(userPrincipalName=*)' ` -Properties userPrincipalName,mail | Select-Object * | ` ForEach-Object { Set-ADObject -Identity ` $_.DistinguishedName -Replace ` @{mail=$($_.userPrincipalName)} }
Here is how to set up Mimecast to work with Duo's Cloud SSO. The online instructions are confusing and inaccurate.
DUO SSO-
Deploy and configure DUO SSO if you haven't already.
https://duo.com/docs/sso
DUO Application-
In Duo, go to Applications, click Protect an Application, search for Generic, there will be two Generic Service Providers, select the one that says "2FA with SSO hosted by DUO".
Fill in the following-
Entity ID- us-api.mimecast.com.ACCOUNTCODE (Replace account code with your account code, it will be something like CUSA88U99)
Assertion Consumer Services ACS URL- https://us-api.mimecast.com/login/saml
Copy the metadata URL to notepad, you'll need it later.
Name (under settings)- Mimecast
Leave everything else alone, click save.
Mimecast-
Administration, Services, Applications, Authentication Profiles, Default Authentication Profile.
Check the box that says "Enforce SAML Authentication for Mimecast Personal Portal"
Provider- Other
Metadata URL- paste the Metadata URL you copied earlier. Click Import.
Click Save and Exit.
Repeat above if you want to enforce User Applications.
Repeat above in Administration, Services, Applications, Authentication Profiles, Account_Administrators_Authentication_Profile if you want to enforce it for admins.
1. DISM /Online /Cleanup-Image /RestoreHealth
2. Get-AppXPackage -AllUsers | Foreach {Add-AppxPackage -DisableDevelopmentMode -Register “$($_.InstallLocation)\AppXManifest.xml”} --
3. Delete this folder for each user: C:\Users\username\AppData\Local\TileDataLayer