Removing a phishing email from all Exchange 2016 mailboxes with PowerShell

Does’t matter how good is your security and design in your environment with with complex spam filters, gateways and appliances… sooner or later you’ll need to remove some sort of unwanted communication from one or more mailboxes on your Exchange Server.

In a very common incident response scenario like this, PowerShell is a very useful tool, this time the cmdlet used is New-ComplianceSearch and is available on-premises and on cloud services for Exchange Server 2016.

Continue reading “Removing a phishing email from all Exchange 2016 mailboxes with PowerShell”

PowerShell Dot Sourcing

My career in IT started in Software Development and most of the time I take for granted some of the common practices and basics of programming that I learnt are also clear for every one of my IT Pro colleagues.

In brief, as developers, when we try to solve problems we define objects and writing source code we describe them into classes. That class definition has attributes and methods that let us interact with that object. Continue reading “PowerShell Dot Sourcing”

How To Modify Your Proxy Settings with Powershell

Proxy servers are everywhere and used for more than one purpose. Frequently a bad configuration of a proxy server on the device can be the root cause of users navigation problems or negative experience, needless to say, that companies use group policies to manage proxy settings or transparent proxy in a router/firewall to avoid this problem.

But in general, a proxy server has a positive impact on the user experience and sometimes the user is not even aware of it. Continue reading “How To Modify Your Proxy Settings with Powershell”

Audit Office Documents with Macros with Powershell

Every organisation sooner or later has to deal with Office documents with macros enabled. Risk assessment and auditing are the first steps when planning to disable them via group policy or just to mitigate risk implied.

The priority should target real usage and avoid any untrusted macro. In this article I will try to help to create a simple report where we can simply leverage powershell to find documents with macros enabled.

Continue reading “Audit Office Documents with Macros with Powershell”