Monday, 8 July 2019

Create Email Distribution List in office 365 and add users to the group

In this document I am going to show how we can create an email distribution list in Office 365 cloud ( Cloud exchange) and add users in to the distribution list. 

Distribution list is a handy way to get a group email to an In e-mail applications, a distribution list is a group of mail recipients that is addressed as a single recipient. Distribution lists are used to send e-mail to groups of people without having to enter each recipient's individual address. A distribution list is different from an e-mail list in that members cannot reply to the distribution list's name to send messages to everyone else in the group. 

But in Exchange cloud has an option to sent email to distribution list from out side the group as well. 

Lets see how we can create it. 

First of all login to you office portal @ https://admin.microsoft.com/

Then go to your admin page and click Groups 

























Click + Add a Group 





Click Type and select Distribution list.




Give the name of your distribution list and email address. You can notice at the bottom it says Allow people outside of my organisation to send email to this distribution list.

Should you wish to receive mail click this and make it on. 

Thats all we have now created a distribution list and it will take some time to appear in your group list. 



Once the list is in the groups we will go and add users to our distribution list. 

In exchange we can't add users from external domain to distribution list, so the option for us to do this is, Create the external users as contact in the exchange contact and then we can add them to the distribution list. 

Create Contact in Exchange server 





















Create new contact 



Now go back to Groups and click the newly created Distribution list and add the users under the members 


Click Edit and search the newly created contact and add them all in to the group. 

Thats all , we are now ready to receive email to the listed users using distribution list. 

Thanks 

Wednesday, 29 May 2019

Setup Remote Desktop Services in Windows Server 2012 R2

Setup Remote Desktop Services in Windows Server 2012 R2


RDS allows you to remove the repetitiveness of configuring and managing multiple PCs in multiple location.  In one way you can think of a RDS solution for your business as a multi-user “PC”. This means, you will be able to access your desktop from home or any branch office or on the go because you can access securely through Internet.


Let see how to install and setup RDS server in Win 2012R2


Installing RDS Roles


RDS have three core roles. we can installs and run on a single server or separate each role onto its own server.
For small environment we can run RDS all-in-one setup, this would save you hardware resources. 
If your environment is large you will have to run the roles in spread servers. 

To start open Server Manager then click Manager -> Add Roles and Features

1 Remote Desktop Service - Add Role and Feature

On the next screen you will need to select 





Change the selection to Remote Desktop Services Installation then click Next



Click Quick Start setup you can add additional servers to each role to allow expansion






Change selection to Session-based desktop deployment and click Next



Connection Broker, Web Access and Session Host roles will be installed on the single server. Click Next





Restart the destination server automatically if required




Once finished click Close. Remote Desktop Services is now installed!


Thursday, 13 December 2018

Monday, 30 October 2017

IPv4 SUBNETTING

IPv4 SUBNETTING 


Given network Address 192.168.1.0/24, you have been asked to use the given network address to do the subneting and configure the network.

Step 1: Always you need to start with the Highest IP requirement, so the highest IP requirement is 30.

Calculating network address of each network from the given classful lP address is called VLSM.
To find the classless IP network we have to first find the required host bits.

2n -2 ³REQUIRED IP      ( n is number of host bits)

2n -2 ³30
2n ³30+2
2n ³32
2n  ³25
n=5
so required number of host bits = 5
that’s bring the subnet mask bits to à 32-5=27
so the network address of first network is 192.168.1.0/27

Since the network address is 192.168.1.0/27 , we should be able to find the first and last IP address in this network.
To find the first IP address, we need to convert the IP address to binary format and change all the host bits to zero (0)

192.168.1.0

11000000.10101000.00000001.00000000 (Binary format) in this first 27 bits are assigned to network and the last 5 bits assigned to Host.

11000000.10101000.00000001.000|00000, we could see all the host bits are zero so this is the first IP address in this network, but this is also the network address. There for we cannot use this address to any end device, this address is used to identify the Network

Network Address = 192.168.1.0/27

Now we need to find the last IP address,
To find the last IP address change all the host bits to one (1)

11000000.10101000.00000001.000|00000 change the host bits to one
11000000.10101000.00000001.000|11111 when you convert this to Decimal we will get the Last IP address which is called broadcast address.
11000000 = 192

10101000= 168

00000001= 1

000|11111 = 31

So, the Broadcast IP address is 192.168.1.31/27

So we can conclude this as follows, for 30 IP address requirement, we need /27 network
Which has a range from 192.168.1.0/27 --- 192.168.1.31/27


______________________________________________________________________________________________________________________________________________________


Now we need to calculate for the second biggest network


2n -2 ³REQUIRED IP      ( n is number of host bits)

2n -2 ³15
2n ³15+2
2n ³17 since its greater than or equal we can change this to closest 2 to the power number which is 32 (1,2,4,8,16,32,64,128,256)
2n  ³32
2n  ³25
n=5
so, required number of host bits = 5
that’s bring the subnet mask bits to à 32-5=27
so the network address of the second network is
we have used up to 31 , that’s mean we can start the next network from 32.

Network address is : 192.168.1.32/27

Now we need to find the last IP on this network, to do the calculation we will again convert this Network address to Binary

11000000.10101000.00000001.00100000

Last IP address has all the hosts bits set to one


11000000.10101000.00000001.001| 11111
which is 192.168.1.63 /27 in binary

so the range of the second network is 192.168.1.32/27 --- 192.168.1.63/27

______________________________________________________________________________________________________________________________________________________

Now we can calculate the third network which has a requirement of 8 IP address


2n -2 ³REQUIRED IP      ( n is number of host bits)

2n -2 ³8
2n ³8+2
2n ³10  since its greater than or equal we can change this to closest 2 to the power number which is 16 (1,2,4,8,16,32,64,128,256)
2n  ³16
2n  ³24
n=4
so, required number of host bits = 4

that’s bring the subnet mask bits to à 32-4=28
so, the network address of the second network is
we have used up to 63, that’s mean we can start the next network from 64.

Network address is: 192.168.1.64/28
Now we need to find the last IP on this network, to do the calculation we will again convert this Network address to Binary

11000000.10101000.00000001.0100|0000

Last IP address has all the hosts bits set to one


11000000.10101000.00000001.0100|1111


which is 192.168.1.79 /28 in binary

so the range of the second network is 192.168.1.64/28 --- 192.168.1.79/28


______________________________________________________________________________________________________________________________________________________


-->
similar way we need to calculate to N12,N23,N13, but in this network we need only 2 IP address.

Thursday, 31 August 2017

How to create roaming user profile ?

How to create roaming user profile ?

We can create roaming profile in 2 different way depends on our need.

1. From Active directory users and computers.
2. From Group policy.

But for both process we need to have a shared location where profiles need to save. And also securing shared location we need to change security permission.

For shared location we create a folder named Roaming profile then right click to the folder name and click on properties.


Go to Properties and Sharing


Click Share this Folder and change the Permissions


Click add and add the following as in the screenshot

Then go and change the permissions

Everyone Only Read Permission.


Domain Admin Full Control

Authenticated User with Read and Change Permission

Click OK.

Now go to security tab in Properties.



Disable the Inheritance.


We have done the sharing and ready to configure now the Roaming Profile

Lets do

Step 1

1. From Active directory users and computers.

Go to Users and Computers, and select the user you want to configure Roaming Profile.

Right click and go to Properties , Go to Profile Tab.

In Profile Path give your shared folders path with %username%

Type 1:

Type 2 :  Find the shared path from the Network Path and copy it.


Using the copied shared network path with %username%


Thats all. we are done.

Method 2:

Using GPO

Create a new Group Policy under  Domains and Edit it.


Go to  Computer Policy->Computer Configuration->administrative Templates->System->User Profiles.


Enable Set roaming profile path for all users logging into this computer and provide the shared location with %username% then click OK.


Also enable Add the Administrators security group to roaming profiles.


All Done........

Http vs Https