When an Exchange Online user has access to a shared mailbox through full access permissions, he can reply on behalf of that address. The problem is that, by default, emails sent as the shared mailbox are saved in the user’s main mailbox instead of the delegated mailbox. To fix that you have 2 options:
Option 1: Use Exchange Online Powershell
For emails sent as the shared mailbox (Full Access)
In this article we are going to configure password change through Citrix Netscaler, which is very handy nowadays that a lot of people work from home and are rarely in the office. The steps are very simple but you should always think what the impact of the change could be before blindy following my screenshots.
You can also insert multiple Subject Alternative Names separated by comma, that might include two or more Domain Controllers like in the example above.
Testing can be done with lpd.exe, make sure that the newly generated certificate is also placed in the Trusted Root Certificate Authorities.
In Citrix Netscaler go to Citrix Gateway > Virtual Servers > Select the VIP > Primary Authentication > Select the LDAP Policy:
Edit Server
Select SSL under Security Type and Port 636
Further down, select Allow Password Change.
In Citrix Storefront, make sure Password Change is enabled:
The password reminder can also be enabled.
That’s it. Make sure your NetScaler Config is saved!
Mailing is daily business in an organization and to increase the trustworthiness of your domain, you should firstly configure a TXT/SPF record and secondly configure DomainKeys, also known as DKIM.
DKIM works by adding a digital signature to the header of an email message that verifies that the message was sent from a trusted source and has not been tampered with during transmission. When an email is sent using DKIM, the sender’s domain name is included in the digital signature. This allows the receiving email server to verify that the message was sent from an authorized sender and that the message has not been modified in transit. If the digital signature is valid, the email is considered to be legitimate and is delivered to the recipient’s inbox. If the digital signature is invalid, the email is likely to be marked as spam or blocked entirely.
Configuring DKIM if you have Microsoft 365 Exchange Online as a mail system is very straightforward. Just go to https://security.microsoft.com/dkimv2 and enable DKIM on the corresponding domain. Afterwards create the DNS entries as instructed by Microsoft 365.
Usually you’ll have 2 entries, for example:
selector1 and selector2._domainkey.ajni.it CNAME pointing to a Microsoft internal DNS entry.
After creating the DNS entries (like usual you’ll have to wait a bit because of DNS and its slowness), you can verify them in the M365 portal and activate the DKIM signature on all emails (see reference below).
If you have a newsletter solution that does not use Microsoft 365 to send emails, you should check whether they offer DKIM (they should otherwise it’s not a proper newsletter software). Usually you’ll have to configure two CNAME DNS entries on your domain with a selector, similar to Microsoft 365:
k1_domainkey.domain.com and k2_domainkey.domain.com CNAME points to the newsletter solution domain. The TXT record of that DNS record contains the public key. See mailchimp for example:
Looking at the message headers, you can see that domain signature is all right:
The next step would be to configure a DMARC policy, so that someone trying to impersonate your domain gets rejected and reported to you.
When an email is received, the receiving email server checks the sender’s domain for a DMARC policy, and then follows the instructions specified in that policy to determine whether the email is legitimate or not.
This policy tells email receivers to reject any messages that fail authentication checks (p=reject), and to send aggregate and forensic DMARC reports to the specified email addresses (rua and ruf). The policy also indicates that the domain owner is not enforcing a policy for messages that do not pass SPF checks (sp=none), and that they are requesting SPF-aligned messages to be treated as passing but are not requiring DKIM alignment to pass (aspf=r).
This is just an example and policies may vary depending on the organization’s specific needs and email infrastructure.
Having issues with users reconnecting a disconnected Citrix Virtual Apps and Desktops session? These keys might help you. Citrix support confirmed, that they help starting at Server 2016 VDA.
Fastreconnect is a feature that was introduced by Microsoft to enhance session reconnect through RDP, but through Citrix ICA it seems that is does not improve anything.
Having grey screen issues with CVAD 2203+ and higher on Windows Server 2022 Terminal server? I had this issue occurring on Citrix 2212. Try running this script. It might help you out. Do a VM backup or snapshot before running the script, just to be sure.