<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Computing &#8211; AbsTechServices.co.uk</title>
	<atom:link href="https://web.abstechservices.co.uk/tag/computing/feed/" rel="self" type="application/rss+xml" />
	<link>https://web.abstechservices.co.uk</link>
	<description>IT Support</description>
	<lastBuildDate>Mon, 14 Jul 2025 19:53:17 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>

<image>
	<url>https://web.abstechservices.co.uk/wp-content/uploads/2025/02/cropped-AbsTechIconLarge-32x32.png</url>
	<title>Computing &#8211; AbsTechServices.co.uk</title>
	<link>https://web.abstechservices.co.uk</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Is a Home Media Server Worth Your Time?</title>
		<link>https://web.abstechservices.co.uk/2025/07/14/is-a-home-media-server-worth-your-time/</link>
					<comments>https://web.abstechservices.co.uk/2025/07/14/is-a-home-media-server-worth-your-time/#respond</comments>
		
		<dc:creator><![CDATA[AbsTechAdmin]]></dc:creator>
		<pubDate>Mon, 14 Jul 2025 19:53:17 +0000</pubDate>
				<category><![CDATA[Computing]]></category>
		<category><![CDATA[Guide]]></category>
		<guid isPermaLink="false">https://web.abstechservices.co.uk/?p=456</guid>

					<description><![CDATA[We live in an age when data is more plentiful than ever, and where media consumption is more prevalent than ever. Not too long ago when it came to computer data storage, files were only a few megabytes or a few gigabytes at most. Now it’s extremely common for there to be hundreds, if not [&#8230;]]]></description>
										<content:encoded><![CDATA[<!-- content style : start --><style type="text/css" data-name="kubio-style"></style><!-- content style : end -->
<p>We live in an age when data is more plentiful than ever, and where media consumption is more prevalent than ever. Not too long ago when it came to computer data storage, files were only a few megabytes or a few gigabytes at most. Now it’s extremely common for there to be hundreds, if not thousands of files taking up storage space into the Terabytes.</p>



<figure class="wp-block-image size-full"><img fetchpriority="high" decoding="async" width="698" height="425" src="https://web.abstechservices.co.uk/wp-content/uploads/2025/07/image.jpeg" alt="" class="wp-image-457" srcset="https://web.abstechservices.co.uk/wp-content/uploads/2025/07/image.jpeg 698w, https://web.abstechservices.co.uk/wp-content/uploads/2025/07/image-300x183.jpeg 300w" sizes="(max-width: 698px) 100vw, 698px" /></figure>



<p>If you have a lot of content that you consume, home media servers will make your life so much easier by giving you a new way to interact with that content. We live in an age when data is more plentiful than ever, and where media consumption is more prevalent than ever. Not too long ago when it came to computer data storage, files were only a few megabytes or a few gigabytes at most for large files. Now it’s extremely common for files to be dozens, if not hundreds of gigabytes in size. File sizes have gotten larger because data has gotten more complex. When it comes to content like TV shows and movies, there are multiple different resolutions that those shows and movies can be captured in. Standard definition picture quality has an extremely low file size because of its low resolution.&nbsp; Standard definition shows and movies typically only weigh a few hundred megabytes at most depending on how long the run time of the content in question is.</p>



<p>However, when you find content at higher resolutions, say High-Definition content, which is rendered in 1080p resolution or 4K resolution, those files are often in the dozens, if not hundreds of gigabytes. This is because of the amount of data necessary to be able to render and display high-resolution content. These larger file sizes are a perfect example of why having a home media server can be so beneficial, because having a home media server will allow you to store all of your data, large in small in one location and access it whenever you want to.</p>



<figure class="wp-block-image size-full"><img decoding="async" width="698" height="379" src="https://web.abstechservices.co.uk/wp-content/uploads/2025/07/image-2.png" alt="" class="wp-image-459" srcset="https://web.abstechservices.co.uk/wp-content/uploads/2025/07/image-2.png 698w, https://web.abstechservices.co.uk/wp-content/uploads/2025/07/image-2-300x163.png 300w" sizes="(max-width: 698px) 100vw, 698px" /></figure>



<p><strong>Where Am I Going To Put All That Data?</strong></p>



<p>As data sizes have increased, data storage needs have increased. So, people find themselves in need of data storage solutions that allow them to hold all of the media that they want to consume, or preserve, and by far the best solution is to have a home media server.</p>



<p>Some people like to use cloud storage servers, which means that they upload their data directly to a cloud service such as Dropbox, Microsoft Azure, or Google Drive, and trust a third party to hold, manage, and maintain their data.&nbsp;</p>



<p>This is a good option for people that are not technologically savvy enough to build or maintain a server on their own. However, it is cost prohibitive because in many cases these services cost money to use every month. If you don’t pay the monthly fee, your data could be deleted, and if you don’t have that data backed up, you’ll lose everything.</p>



<p>With a personal data server, you never have to worry about paying a monthly subscription fee to access your data. You can buy a pre-built file server like a Synology DS 220+ and install hard drives in it that will meet your storage needs. For instance, someone that just wants to fill a server with pictures and home movies is often not going to need the same amount of storage as someone that’s storing audiobooks, movies, and TV shows.</p>



<figure class="wp-block-image size-full"><img decoding="async" width="698" height="465" src="https://web.abstechservices.co.uk/wp-content/uploads/2025/07/image-1.jpeg" alt="" class="wp-image-458" srcset="https://web.abstechservices.co.uk/wp-content/uploads/2025/07/image-1.jpeg 698w, https://web.abstechservices.co.uk/wp-content/uploads/2025/07/image-1-300x200.jpeg 300w" sizes="(max-width: 698px) 100vw, 698px" /></figure>



<p><strong>What Can I Do with A Home Media Server?</strong></p>



<p>Storing files isn’t the only thing that you can do with a personal media server. You can configure your server to let you access your data at any time, in whatever form is most convenient.</p>



<p>Services like Plex and Emby give you the ability to categorize the content you own by the type of media it is. So, you can have your TV shows, movies, audiobooks,&nbsp;music, documentaries and more all in one place. So instead of having to pay for subscriptions to multiple streaming apps every month to be able to access the content you want to consume, you can have it all stored on your server and access it from one central location! The days of switching apps to be able to keep up with all of your favourite shows and movies are over when you have your own server and host your own content.</p>



<p>I’m sure we’ve all been devastated when our favourite TV show or movie got taken off the streaming service that we pay for every month, whether that be Netflix, Amazon, Hulu or something else. If you buy a digital download of that show, you have legal access to do whatever you want to do with it, so you can store that content on your server and never have to worry about losing access to your favourite media again. Eventually, you may get to the point where you’ve cut the cord altogether and stopped paying for subscription services because you prefer to host everything you want to consume on your server instead of paying every month to use someone else’s service.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="579" height="476" src="https://web.abstechservices.co.uk/wp-content/uploads/2025/07/image-3.png" alt="" class="wp-image-460" srcset="https://web.abstechservices.co.uk/wp-content/uploads/2025/07/image-3.png 579w, https://web.abstechservices.co.uk/wp-content/uploads/2025/07/image-3-300x247.png 300w" sizes="(max-width: 579px) 100vw, 579px" /></figure>



<p><strong>Remote Access</strong></p>



<p>Another great feature of having a personal server is that you can configure it for remote access, so you can access your content not only anywhere in your home, but anywhere in the world should you give yourself remote access permissions. This means you can access your content anywhere that you have an internet connection, and bypass the limits that services like Netflix have of a limited number of authorized devices being able to access content at once.</p>



<p><strong>Never Lose Your Data Again</strong></p>



<p>Finally, one of the best things about having a personal server is the ability to back up the data that’s most important to you. Some things like pictures, home movies, and important documents are priceless and cannot be replaced. Natural disasters can happen at any time and destroy the physical copies of something like a birth certificate, but if you have a digital backup of it, you’ll never lose it. Personal servers allow you to quickly back up all of your data and easily get access to it if and or when you should need it.</p>



<p><strong>Final Thoughts on Home Media Servers</strong></p>



<p>Having your own server may seem daunting at first, especially if you’re not tech-savvy. Worrying about which server you want to buy, or how to repurpose an old computer into a server can seem scary, especially since the upfront cost can be high. But when you really sit down and look at the peace of mind that can come from having a personal server that allows you to store and access all of your data at a moment’s notice, whether that be TV shows and movies or backups of important documents, it can be well worth the price you have to pay.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://web.abstechservices.co.uk/2025/07/14/is-a-home-media-server-worth-your-time/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Upgrading to Exchange Server SE</title>
		<link>https://web.abstechservices.co.uk/2025/07/11/upgrading-to-exchange-server-se/</link>
					<comments>https://web.abstechservices.co.uk/2025/07/11/upgrading-to-exchange-server-se/#respond</comments>
		
		<dc:creator><![CDATA[AbsTechAdmin]]></dc:creator>
		<pubDate>Fri, 11 Jul 2025 22:01:54 +0000</pubDate>
				<category><![CDATA[Computing]]></category>
		<category><![CDATA[Email]]></category>
		<category><![CDATA[Guide]]></category>
		<category><![CDATA[Management]]></category>
		<category><![CDATA[Business]]></category>
		<guid isPermaLink="false">https://web.abstechservices.co.uk/?p=447</guid>

					<description><![CDATA[Microsoft, as per its product roadmap for Exchange Server, has released the Microsoft Exchange Server SE (Subscription Edition) to meet the needs of on-premises customers. As the name states, this new iteration of Exchange Server will be subscription-based, similar to the SharePoint Server Subscription Edition. This means that it will require subscription licenses or active [&#8230;]]]></description>
										<content:encoded><![CDATA[<!-- content style : start --><style type="text/css" data-name="kubio-style"></style><!-- content style : end -->
<p>Microsoft, as per its product roadmap for Exchange Server, has released the Microsoft Exchange Server SE (Subscription Edition) to meet the needs of on-premises customers. As the name states, this new iteration of Exchange Server will be subscription-based, similar to the SharePoint Server Subscription Edition. This means that it will require subscription licenses or active Software Assurance (SA) licenses, and licenses for users. The Exchange Server subscription will include access updates, security patches, and support.</p>



<p><strong>Features and Changes in Exchange Server SE</strong></p>



<p>Although the Exchange Server SE is based on the Exchange Server 2019, there are a number of improvements and new features in the new edition. These are:</p>



<ul class="wp-block-list">
<li>One of the major new features is the support for the new operating system of Microsoft, which is Windows Server 2025.</li>



<li>With regards to product key or license, if you are upgrading from a previous Exchange Server version, a new product key will be needed.</li>



<li>There is an exception to hybrid setups, where a free license will be available via the Hybrid Configuration Wizard (HCW).</li>



<li>To improve security, support for Transport Layer Security (TLS) 1.3 is added in the Subscription Edition.</li>
</ul>



<p>However, there are a few features that will not be available in Exchange Server SE, such as:</p>



<ul class="wp-block-list">
<li>It will not support Outlook Anywhere (RPC/ HTTP protocol) service. So, if you have any systems which are dependent on the protocol, you need to upgrade the systems or change the integration part with the Exchange Server.</li>



<li>The new version will not support the Unified Communications Managed API (UCMA 4.0) and instant messaging in Outlook.</li>
</ul>



<p><strong>Upgrading to Exchange Server SE</strong></p>



<p>Exchange Server SE (Subscription Edition) will block the coexistence support with Exchange Server 2013. With Cumulative Update 1 (CU) for the Subscription Edition, coexistence will be blocked with all the unsupported versions of Exchange Server, i.e., Exchange Server 2013, 2016, and 2019. This means that if you’re running an older version of Exchange Server (Exchange Server 2013 or earlier), you need to decommission it prior to upgrade. After the release of Cumulative Update (CU) 1, you need to decommission any other older version of Exchange Server.</p>



<p>If you are running an Exchange Server 2016 or 2019, you should consider to first upgrade to the latest Cumulative Update (Exchange Server 2016 CU23 or Exchange Server 2019 CU13/CU14).</p>



<p>&nbsp;To upgrade from Exchange 2016 or 2019 to the new Exchange Server SE, there are two methods:</p>



<ul class="wp-block-list">
<li><strong>Legacy Upgrade:</strong> In this, you need to introduce the new Exchange Server version in the organization, move all the mailboxes and other resources to the new server, and then uninstall the old server. This type of upgrade is suitable when migrating from Exchange 2016 to Exchange 2019 or from Exchange 2016 to Exchange Server SE.</li>
</ul>



<ul class="wp-block-list">
<li><strong>In-Place Upgrade: </strong>It is similar to installing a cumulative update (CU). This method is available only for upgrading from Exchange Server 2019 (with CU14 or CU15) to Exchange Server SE.</li>
</ul>



<p><strong>Things to Consider before Upgrading to Exchange Server SE</strong></p>



<p>If you’re planning to upgrade to the Exchange Server Subscription Edition, you must ensure that all the requirements and guidelines set by Microsoft are fulfilled beforehand. Here are some things you should consider before upgrade:</p>



<ul class="wp-block-list">
<li><strong>Check the Compatibility and Guidelines:</strong> It’s important to follow the coexistence guidelines and check compatibility of the operating system. If you’ve Exchange Server 2019, it’s important to update it to the Cumulative Update (CU) 15.</li>



<li><strong>Backup the Infrastructure</strong>: It’s a best practice to take backup of the servers, along with the mailbox databases prior to upgrade. If something happens, this will come in handy.</li>



<li><strong>Maintenance Window</strong>: The upgrade operation should be scheduled outside office hours. Also, inform the involved parties accordingly.</li>



<li><strong>Obtain the License</strong>: You should have the Subscription Edition license in hand so that you can activate the system once it has been fully upgraded. You can obtain the license from Microsoft or through their respective vendor.</li>



<li><strong>Post Upgrade Tasks</strong>: Post upgrade, you should perform tests (mail flow tests and other tests) to ensure that everything is working correctly.</li>
</ul>



<p><strong>Conclusion</strong></p>



<p>So, if you’re running the Exchange Server 2013/2016, it is suggested you can upgrade to Exchange 2019. This will allow you to perform the legacy upgrade (from Exchange Server 2016 to 2019). For this, you need to install the Exchange Server 2019 in the organization and move all the databases and other resources to the newer version. Once complete run the in-place upgrade and follow the wizards</p>
]]></content:encoded>
					
					<wfw:commentRss>https://web.abstechservices.co.uk/2025/07/11/upgrading-to-exchange-server-se/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to Install Exchange Server step by step.</title>
		<link>https://web.abstechservices.co.uk/2025/07/11/how-to-install-exchange-server-step-by-step/</link>
					<comments>https://web.abstechservices.co.uk/2025/07/11/how-to-install-exchange-server-step-by-step/#respond</comments>
		
		<dc:creator><![CDATA[AbsTechAdmin]]></dc:creator>
		<pubDate>Fri, 11 Jul 2025 21:50:06 +0000</pubDate>
				<category><![CDATA[Computing]]></category>
		<category><![CDATA[Guide]]></category>
		<category><![CDATA[Management]]></category>
		<category><![CDATA[Business]]></category>
		<category><![CDATA[Email]]></category>
		<category><![CDATA[Exchange]]></category>
		<guid isPermaLink="false">https://web.abstechservices.co.uk/?p=435</guid>

					<description><![CDATA[Install Exchange Server step by step on Windows Server. Before you start installing Exchange Server, make sure to install Exchange Server prerequisites first. After that, prepare Active Directory and domains for Exchange Server. After doing both tasks, you are ready to install Exchange Server. In this article, you will learn how to install Exchange Server. [&#8230;]]]></description>
										<content:encoded><![CDATA[<!-- content style : start --><style type="text/css" data-name="kubio-style"></style><!-- content style : end -->
<p>Install Exchange Server step by step on Windows Server. Before you start installing Exchange Server, make sure to install Exchange Server prerequisites first. After that, prepare Active Directory and domains for Exchange Server. After doing both tasks, you are ready to install Exchange Server. In this article, you will learn how to install Exchange Server.</p>



<p><strong>Download Exchange Server</strong></p>



<p>Go to the Exchange Server build numbers and release dates page. The page lists all Exchange Server build numbers and release dates. Download and save the Exchange Server ISO image.</p>



<p>Note: We recommend downloading the latest Exchange Server build version.</p>



<p>In File Explorer, right-click on the Exchange Server CU ISO image file and select Mount. It will mount the ISO to a drive. For example, the E:\ drive. The E:\ drive contains the Exchange installation files.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="588" height="438" src="https://web.abstechservices.co.uk/wp-content/uploads/2025/07/image.jpg" alt="" class="wp-image-436" srcset="https://web.abstechservices.co.uk/wp-content/uploads/2025/07/image.jpg 588w, https://web.abstechservices.co.uk/wp-content/uploads/2025/07/image-300x223.jpg 300w" sizes="(max-width: 588px) 100vw, 588px" /></figure>



<p>Mount the Exchange ISO image before proceeding to the next step.</p>



<p><strong>Before installing Exchange Server</strong></p>



<p>Before you can proceed further with the Exchange Server installation you must complete the following:</p>



<ol start="1" class="wp-block-list">
<li>Install Exchange Server prerequisites</li>



<li>Prepare Active Directory and domains for Exchange Server</li>
</ol>



<p>After you have walked through the above configuration, install the Exchange Mailbox Server Role.</p>



<p><strong>Install Exchange Server prerequisites</strong></p>



<p>Install Exchange Server prerequisites before you start to install Exchange Server. Ensure you have an operating system that supports the Exchange Server version that you want to install. In this article, we will look at how to install Exchange Server prerequisites on Windows Server.</p>



<p><strong>Mailbox and Edge Transport server roles</strong></p>



<p>The Mailbox server contains:</p>



<ul class="wp-block-list">
<li>Transport services that are used to route mail</li>



<li>Mailbox databases that process, render, and store data</li>



<li>Client Access services that accept client connections for all protocols</li>
</ul>



<p>The Edge Transport server is:</p>



<ul class="wp-block-list">
<li>An optional role that handles all external mail flow for the Exchange organization</li>



<li>Protecting the Exchange organization from viruses and spam as mail enters and leaves</li>



<li>Installed in an Exchange organization perimeter (DMZ) network</li>
</ul>



<p><strong>Supported operating systems</strong></p>



<p>Have a look at which operating systems support Exchange Server 2016 and Exchange Server 2019.</p>



<p><strong>Exchange Server 2016</strong></p>



<ul class="wp-block-list">
<li>Windows Server 2016 Standard or Datacenter (Exchange Server 2016 CU3 or later)</li>



<li>Windows Server 2012 R2 Standard or Datacenter</li>



<li>Windows Server 2012 Standard or Datacenter</li>



<li>Windows Server Desktop Experience</li>
</ul>



<p><strong>Exchange Server 2019</strong></p>



<ul class="wp-block-list">
<li>Windows Server 2022 Standard or Datacenter (Exchange Server 2019 CU12 or later)</li>



<li>Windows Server 2019 Standard or Datacenter</li>



<li>Windows Server Desktop Experience</li>



<li>Windows Server Core</li>
</ul>



<p><strong>Install Exchange Mailbox server prerequisites</strong></p>



<p>Follow the steps below to install Exchange Mailbox server prerequisites for Windows Server.</p>



<p>Step 1. Run PowerShell as administrator. Run the following command to install the required Windows components.</p>



<p><em>Install-WindowsFeature Server-Media-Foundation, NET-Framework-45-Core, NET-Framework-45-ASPNET, NET-WCF-HTTP-Activation45, NET-WCF-Pipe-Activation45, NET-WCF-TCP-Activation45, NET-WCF-TCP-PortSharing45, RPC-over-HTTP-proxy, RSAT-Clustering, RSAT-Clustering-CmdInterface, RSAT-Clustering-Mgmt, RSAT-Clustering-PowerShell, WAS-Process-Model, Web-Asp-Net45, Web-Basic-Auth, Web-Client-Auth, Web-Digest-Auth, Web-Dir-Browsing, Web-Dyn-Compression, Web-Http-Errors, Web-Http-Logging, Web-Http-Redirect, Web-Http-Tracing, Web-ISAPI-Ext, Web-ISAPI-Filter, Web-Metabase, Web-Mgmt-Console, Web-Mgmt-Service, Web-Net-Ext45, Web-Request-Monitor, Web-Server, Web-Stat-Compression, Web-Static-Content, Web-Windows-Auth, Web-WMI, Windows-Identity-Foundation, RSAT-ADDS</em></p>



<p>Step 2. Install <a href="https://dotnet.microsoft.com/download/dotnet-framework" target="_blank" rel="noreferrer noopener">.NET Framework 4.8</a> (restart required).</p>



<p>Step 3. Install <a href="https://www.microsoft.com/en-us/download/details.aspx?id=30679" target="_blank" rel="noreferrer noopener">Visual C++ Redistributable for Visual Studio 2012</a>.</p>



<p>Step 4. Install <a href="https://support.microsoft.com/help/4032938" target="_blank" rel="noreferrer noopener">Visual C++ Redistributable Packages for Visual Studio 2013</a>.</p>



<p>Step 5. Install <a href="https://www.iis.net/downloads/microsoft/url-rewrite" target="_blank" rel="noreferrer noopener">IIS URL Rewrite Module</a>.</p>



<p>Note: The IIS URL Rewrite Module is required with Exchange Server 2016 CU22 and Exchange Server 2019 CU11 or later.</p>



<p>Step 6. Install <a href="https://www.microsoft.com/en-us/download/details.aspx?id=34992" target="_blank" rel="noreferrer noopener">Unified Communications Managed API 4.0 Runtime</a>.</p>



<p><strong>Install Exchange Edge Transport server prerequisites</strong></p>



<p>Follow the steps below to install Exchange Edge Transport server prerequisites for Windows Server.</p>



<p>Step 1. Run PowerShell as administrator. Run the following command to install the required Windows components.</p>



<p><em>Install-WindowsFeature ADLDS</em></p>



<p>Step 2. Install <a href="https://dotnet.microsoft.com/download/dotnet-framework" target="_blank" rel="noreferrer noopener">.NET Framework 4.8</a> (restart required).</p>



<p>Step 3. Install <a href="https://www.microsoft.com/en-us/download/details.aspx?id=30679" target="_blank" rel="noreferrer noopener">Visual C++ Redistributable for Visual Studio 2012</a>.</p>



<p><strong>Install Exchange Management tools prerequisites</strong></p>



<p>Follow the steps below to install Exchange Management tools prerequisites:</p>



<p>Step 1. Install <a href="https://www.microsoft.com/download/details.aspx?id=30679" target="_blank" rel="noreferrer noopener">Visual C++ Redistributable for Visual Studio 2012</a>.</p>



<p>Step 2. Run PowerShell as administrator and run the following command to install the required Windows components.</p>



<p>Windows Server OS:</p>



<p><em>Install-WindowsFeature -Name Web-Mgmt-Console, Web-Metabase</em></p>



<p>Windows 10 and Windows 11 OS:</p>



<p><em>Enable-WindowsOptionalFeature -Online -FeatureName IIS-ManagementConsole, IIS-Metabase -All</em></p>



<p><strong>Prepare Active Directory and domains for Exchange Server</strong></p>



<p>You want to prepare Active Directory (AD) schema and domains for Exchange Server. Before you prepare Active Directory and domains for Exchange, install Exchange Server prerequisites. After that, you can install Exchange Server in the organization.</p>



<p><strong>Information</strong></p>



<p>Before you start, sign in to the Windows Server that will be the Exchange Server, and go through these steps:</p>



<ul class="wp-block-list">
<li>Install the latest Windows Updates</li>



<li>Restart after installing Windows Updates</li>



<li>Join the server to the domain</li>
</ul>



<p><strong>Prerequisites extending the Active Directory</strong></p>



<p>Before extending the Active Directory schema, the following needs to be installed on the Exchange Server:</p>



<ul class="wp-block-list">
<li><a href="https://dotnet.microsoft.com/download/dotnet-framework/" target="_blank" rel="noreferrer noopener">.NET Framework</a> must be installed</li>



<li>The RSAT-ADDS feature must be installed</li>



<li>Account needs to be added to the Schema Admins and Enterprise Admins security groups</li>
</ul>



<p>Install .NET Framework</p>



<p>.NET Framework is already installed if you have followed Install Exchange Server prerequisites. If you didn’t, find the correct .NET Framework version on the Exchange Server supportability matrix. Go to the <a href="https://dotnet.microsoft.com/download/dotnet-framework" target="_blank" rel="noreferrer noopener">download page of .NET Framework</a> and download the appropriate version.</p>



<p>In our example, we have to install <a href="https://dotnet.microsoft.com/download/dotnet-framework/net48" target="_blank" rel="noreferrer noopener">.NET Framework 4.8</a>. If the download finishes, right-click the file and choose run as administrator. Install the .NET Framework on the Exchange Server. Restart when the installation completes.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="602" height="273" src="https://web.abstechservices.co.uk/wp-content/uploads/2025/07/image-1.jpg" alt="" class="wp-image-437" srcset="https://web.abstechservices.co.uk/wp-content/uploads/2025/07/image-1.jpg 602w, https://web.abstechservices.co.uk/wp-content/uploads/2025/07/image-1-300x136.jpg 300w" sizes="(max-width: 602px) 100vw, 602px" /></figure>



<p>Note: You can extend the Active Directory Schema from the domain controller or any other server in the organization. The feature RSAT-ADDS is already installed on the domain controller. If you want to prepare the schema on the Domain Controller, you only need to install the .NET Framework. Some organizations have different teams because of different administrative responsibilities in the environment.</p>



<p><strong>Install RSAT-ADDS feature</strong></p>



<p>RSAT-ADDS feature is already installed if you have followed Install Exchange Server prerequisites. Suppose you didn’t install the RSAT-ADDS feature. Run PowerShell as administrator. Run the Install-WindowsFeature cmdlet, including the RSAT-ADDS feature.</p>



<p><em>Install-WindowsFeature RSAT-ADDS</em></p>



<p>The output below appears.</p>



<p><em>Success Restart Needed Exit Code Feature Result</em></p>



<p><em>&#8212;&#8212;- &#8212;&#8212;&#8212;&#8212;&#8211; &#8212;&#8212;&#8212; &#8212;&#8212;&#8212;&#8212;&#8211;</em></p>



<p><em>True&nbsp;&nbsp;&nbsp; No&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Success&nbsp;&nbsp; {Remote Server Administration Tools, Activ&#8230;</em></p>



<p><strong>Schema Admins and Enterprise Admins security groups</strong></p>



<p>Before you can extend the schema, your account needs to be a member of the Schema Admins and Enterprise Admins security groups. Open Active Directory and add both groups to your account if it’s not set already. These are high privilege groups. We recommend removing your account from the groups when you’re done with this task.</p>



<p>Note: If you’ve just added yourself to these groups, you’ll need to log out and back into the server for the new group membership to take effect.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="411" height="556" src="https://web.abstechservices.co.uk/wp-content/uploads/2025/07/image.png" alt="" class="wp-image-438" srcset="https://web.abstechservices.co.uk/wp-content/uploads/2025/07/image.png 411w, https://web.abstechservices.co.uk/wp-content/uploads/2025/07/image-222x300.png 222w" sizes="(max-width: 411px) 100vw, 411px" /></figure>



<p><strong>Prepare Active Directory Schema</strong></p>



<p>The first step in getting your organization ready for Exchange Server is to extend the Active Directory schema. Exchange stores a lot of information in Active Directory, but before it can do that, it needs to add/update classes and attributes.</p>



<p>In File Explorer, right-click on the Exchange Server CU ISO image file and select Mount. It will mount the ISO image to a drive. For example, the E:\ drive. The E:\ drive contains the Exchange installation files. Make sure to mount the Exchange ISO image before proceeding to the next step.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="602" height="449" src="https://web.abstechservices.co.uk/wp-content/uploads/2025/07/image-2.jpg" alt="" class="wp-image-439" srcset="https://web.abstechservices.co.uk/wp-content/uploads/2025/07/image-2.jpg 602w, https://web.abstechservices.co.uk/wp-content/uploads/2025/07/image-2-300x224.jpg 300w" sizes="(max-width: 602px) 100vw, 602px" /></figure>



<p>Run Command Prompt as administrator. Run the following command to extend/prepare the schema for Exchange Server.</p>



<p><em>E:\Setup.exe /IAcceptExchangeServerLicenseTerms_DiagnosticDataOFF /PrepareSchema</em></p>



<p>You will see the COMPLETED messages in the output. The extend/prepare schema for Exchange Server went successfully.</p>



<p><strong>Prepare Active Directory</strong></p>



<p>After the Active Directory schema has been extended, you can prepare other parts of Active Directory for Exchange Server. During this step, Exchange will create containers, objects, and other items in Active Directory to store information. The collection of the Exchange containers, objects, attributes, and so on is called the <em>Exchange organization</em>.</p>



<p>If you followed the article, you are already a member of the Schema Admins and Enterprise Admins security groups. Open Active Directory and add both groups to your account if it’s not set already. These are high privilege groups. We recommend you to remove your account from the groups when you’re done with this task.</p>



<p>Note: If you’ve just added yourself to these groups, you’ll need to log out and back into the Server for the new group membership to take effect.</p>



<p>If you do not already have an Exchange organization, you’ll need to provide a name for the organization.</p>



<p>Note: You need to select a name for the Exchange organization. The organization name is used internally by Exchange. It isn’t typically seen by users and doesn’t affect the functionality of Exchange. Also, it doesn’t determine what you can use for email addresses. The organization name can’t contain more than 64 characters and can’t be blank. Valid characters are A to Z, a to z, 0 to 9, hyphen or dash (-), and space, but leading or trailing spaces aren’t allowed. You can’t change the organization name after it’s set.</p>



<p>Run Command Prompt as administrator. Run the following command to prepare Active Directory for Exchange Server.</p>



<p><em>E:\Setup.exe /IAcceptExchangeServerLicenseTerms_DiagnosticDataOFF /PrepareAD /OrganizationName:&#8221;EXOIP&#8221;</em></p>



<p>The output will then display “The Exchange Server setup operation completed.</p>



<p>If you’re installing Exchange Server into an existing Exchange organization, you do not need to specify the organization name.</p>



<p>Run Command Prompt as administrator. Run the following command to prepare Active Directory for Exchange Server.</p>



<p><em>E:\Setup.exe /IAcceptExchangeServerLicenseTerms_DiagnosticDataOFF /PrepareAD</em></p>



<p><strong>Prepare Active Directory domains</strong></p>



<p>The final step to get Active Directory ready for Exchange is to prepare each of the Active Directory domains where Exchange will be installed. This step creates additional containers, security groups and sets permissions so that Exchange can access them.</p>



<p>If you have more than one domain, you can run the following command in Command Prompt to prepare all the domains for Exchange Server.</p>



<p>Note: If you have only one domain, you can skip this step because the /PrepareAD command in the previous step has already prepared the domain for you.</p>



<p><em>E:\Setup.exe /IAcceptExchangeServerLicenseTerms_DiagnosticDataOFF /PrepareAllDomains</em></p>



<p>You will get this at the end “The Exchange Server setup operation completed successfully.”</p>



<p><strong>Check Exchange Active Directory versions</strong></p>



<p>After you prepare AD for Exchange Server, you like to check if the Active Directory is updated. Run PowerShell as administrator. Make sure that you set the Execution Policy to Unrestricted. If you don’t, the script will not run.</p>



<p><em>Set-ExecutionPolicy Unrestricted -Force</em></p>



<p>Run the following commands one by one.</p>



<p><em># Exchange Schema Version</em></p>



<p><em>$sc = (Get-ADRootDSE).SchemaNamingContext</em></p>



<p><em>$ob = &#8220;CN=ms-Exch-Schema-Version-Pt,&#8221; + $sc</em></p>



<p><em>Write-Output &#8220;RangeUpper: $((Get-ADObject $ob -pr rangeUpper).rangeUpper)&#8221;</em></p>



<p><em># Exchange Object Version (domain)</em></p>



<p><em>$dc = (Get-ADRootDSE).DefaultNamingContext</em></p>



<p><em>$ob = &#8220;CN=Microsoft Exchange System Objects,&#8221; + $dc</em></p>



<p><em>Write-Output &#8220;ObjectVersion (Default): $((Get-ADObject $ob -pr objectVersion).objectVersion)&#8221;</em></p>



<p><em># Exchange Object Version (forest)</em></p>



<p><em>$cc = (Get-ADRootDSE).ConfigurationNamingContext</em></p>



<p><em>$fl = &#8220;(objectClass=msExchOrganizationContainer)&#8221;</em></p>



<p><em>Write-Output &#8220;ObjectVersion (Configuration): $((Get-ADObject -LDAPFilter $fl -SearchBase $cc -pr objectVersion).objectVersion)&#8221;</em></p>



<p>Important: After you install Exchange on a server, you must not change the server’s name. Renaming a server after you’ve installed an Exchange server role is not supported.</p>



<p><strong>Install Exchange Server with command line</strong></p>



<p>There are two options for installing Exchange server. You can choose to:</p>



<ol start="1" class="wp-block-list">
<li>Install Exchange Mailbox server using the setup wizard</li>



<li>Install Exchange Mailbox server using unattended mode (this article)</li>
</ol>



<p>The Exchange setup wizard will guide you to install Exchange Server with GUI. The Exchange unattended mode will install Exchange Server with the command line.</p>



<p>Note: The Exchange Server installation will fail if there is a pending reboot available on the system. We recommend restarting the Windows Server before you start the installation.</p>



<p>Run Command Prompt as administrator. Install the Mailbox Server Role and the management tools in the default folder on the local server.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="602" height="583" src="https://web.abstechservices.co.uk/wp-content/uploads/2025/07/image-1.png" alt="" class="wp-image-442" srcset="https://web.abstechservices.co.uk/wp-content/uploads/2025/07/image-1.png 602w, https://web.abstechservices.co.uk/wp-content/uploads/2025/07/image-1-300x291.png 300w" sizes="(max-width: 602px) 100vw, 602px" /></figure>



<p>Exchange Server Mailbox Role finished installing. Reboot the server.</p>



<p><strong>Sign in to Exchange Admin Center (EAC)</strong></p>



<p>Sign in to Exchange Admin Center (EAC). Start your favourite browser and go to <em>https://hostname/ecp</em>. Change the hostname to yours. Another way is to use <em>https://localhost/ecp</em>.</p>



<p>You will get a certificate warning in your browser. Accept the risk and continue.</p>



<p>In our example, the Exchange Server hostname is EX01-2016.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="617" height="417" src="https://web.abstechservices.co.uk/wp-content/uploads/2025/07/image-3.jpg" alt="" class="wp-image-440" srcset="https://web.abstechservices.co.uk/wp-content/uploads/2025/07/image-3.jpg 617w, https://web.abstechservices.co.uk/wp-content/uploads/2025/07/image-3-300x203.jpg 300w" sizes="(max-width: 617px) 100vw, 617px" /></figure>



<p>Fill in the domain and administrator credentials. Then, click sign in.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="623" height="420" src="https://web.abstechservices.co.uk/wp-content/uploads/2025/07/image-4.jpg" alt="" class="wp-image-441" srcset="https://web.abstechservices.co.uk/wp-content/uploads/2025/07/image-4.jpg 623w, https://web.abstechservices.co.uk/wp-content/uploads/2025/07/image-4-300x202.jpg 300w" sizes="(max-width: 623px) 100vw, 623px" /></figure>



<p>The mailboxes area is almost empty, except for one mailbox that shows up. That’s the account that you used for installing Exchange Server.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="613" height="415" src="https://web.abstechservices.co.uk/wp-content/uploads/2025/07/image-5.jpg" alt="" class="wp-image-443" srcset="https://web.abstechservices.co.uk/wp-content/uploads/2025/07/image-5.jpg 613w, https://web.abstechservices.co.uk/wp-content/uploads/2025/07/image-5-300x203.jpg 300w" sizes="(max-width: 613px) 100vw, 613px" /></figure>



<p><strong>Conclusion</strong></p>



<p>You learned how to install Exchange Server step by step on Windows Server. An excellent way to install the Mailbox Server Role is with the command line. After a reboot, verify that you can sign in to the Exchange Admin Center.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://web.abstechservices.co.uk/2025/07/11/how-to-install-exchange-server-step-by-step/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Remote Monitoring and Management (RMM)</title>
		<link>https://web.abstechservices.co.uk/2025/07/09/remote-monitoring-and-management-rmm/</link>
					<comments>https://web.abstechservices.co.uk/2025/07/09/remote-monitoring-and-management-rmm/#respond</comments>
		
		<dc:creator><![CDATA[AbsTechAdmin]]></dc:creator>
		<pubDate>Wed, 09 Jul 2025 20:55:04 +0000</pubDate>
				<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Computing]]></category>
		<category><![CDATA[Management]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Remote]]></category>
		<guid isPermaLink="false">https://web.abstechservices.co.uk/?p=409</guid>

					<description><![CDATA[Advantages and Disadvantages In an increasingly digital and remote-first world, IT service providers and internal IT departments need efficient ways to monitor, maintain, and manage networks and endpoints. Remote Monitoring and Management (RMM) software has become an essential tool in achieving this, enabling IT professionals to proactively support systems without being physically present. RMM tools [&#8230;]]]></description>
										<content:encoded><![CDATA[<!-- content style : start --><style type="text/css" data-name="kubio-style"></style><!-- content style : end -->
<h2 class="wp-block-heading"> Advantages and Disadvantages</h2>



<p>In an increasingly digital and remote-first world, IT service providers and internal IT departments need efficient ways to monitor, maintain, and manage networks and endpoints. Remote Monitoring and Management (RMM) software has become an essential tool in achieving this, enabling IT professionals to proactively support systems without being physically present.<br><br>RMM tools have become especially vital in the wake of hybrid and remote work models. They provide IT teams with the visibility and control necessary to support a distributed workforce, manage endpoints across different geographies, and maintain strong cybersecurity hygiene from a central console.</p>



<h2 class="wp-block-heading">What is RMM?</h2>



<p>RMM stands for Remote Monitoring and Management. It is a type of software designed to help IT professionals monitor client endpoints, networks, and computers remotely. With RMM tools, administrators can track performance, deploy updates, manage patches, automate maintenance tasks, and address issues before they impact users.<br><br>Commonly used by Managed Service Providers (MSPs), RMM platforms are also increasingly adopted by internal IT teams to improve efficiency and reduce downtime.<br><br>At its core, RMM software acts as the digital eyes and hands of IT professionals. It not only monitors the health and performance of systems but also provides the ability to apply patches, reboot machines, install software, and run scripts — all without interrupting the end-user experience. This makes it an indispensable tool for both reactive troubleshooting and proactive system health management.</p>



<h2 class="wp-block-heading">Advantages of RMM</h2>



<ul class="wp-block-list">
<li>Proactive Maintenance: RMM tools allow for continuous monitoring of systems, enabling issues to be detected and resolved before they cause significant disruption.</li>



<li>Increased Efficiency: Automation of tasks like software updates, patch management, and system scans saves time and reduces manual workload.</li>



<li>Remote Access and Support: Technicians can troubleshoot and resolve problems without needing to be on-site, speeding up resolution times.</li>



<li>Improved Security: RMM software helps ensure that devices are always updated and compliant with security standards, reducing vulnerability exposure.</li>



<li>Scalability: As businesses grow, RMM tools make it easier to manage a larger number of endpoints without a proportional increase in IT staff.</li>



<li>Cost Savings: Reduces the need for on-site visits, travel costs, and reactive fixes — leading to long-term savings.</li>
</ul>



<h2 class="wp-block-heading">Disadvantages of RMM</h2>



<ul class="wp-block-list">
<li>Initial Setup Complexity: Deploying RMM tools can be technically complex and time-consuming, especially in larger or more diverse environments.</li>



<li>Cost of Licensing: High-quality RMM platforms often come with significant subscription or licensing costs.</li>



<li>Learning Curve: IT teams may need training to fully utilize all the features and capabilities of the RMM solution.</li>



<li>Potential Privacy Concerns: Remote access capabilities may raise concerns among employees about monitoring and data privacy.</li>



<li>False Positives and Alert Fatigue: Misconfigured alerts can result in excessive notifications, making it difficult to identify genuine threats or issues.</li>
</ul>



<h2 class="wp-block-heading">Conclusion</h2>



<p>RMM solutions are a cornerstone of modern IT support strategies, offering a range of benefits from proactive monitoring to cost savings. However, they are not without challenges, and organisations should weigh the pros and cons carefully. When implemented correctly and with the right training, RMM tools can dramatically improve IT service delivery, reduce downtime, and enhance user satisfaction.</p>



<p>RMM tools are particularly beneficial for Managed Service Providers (MSPs), allowing them to support dozens or hundreds of client environments efficiently. For internal IT departments, RMM systems help manage infrastructure with minimal resources, which is crucial in today’s landscape where many teams are expected to do more with less.<br><br>Before implementing an RMM solution, it&#8217;s important to assess your specific needs, compare feature sets, ensure integration with existing tools, and provide adequate training. Done right, an RMM strategy can future-proof your IT operations, improve service levels, and enable more strategic use of technical resources.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://web.abstechservices.co.uk/2025/07/09/remote-monitoring-and-management-rmm/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Is cloud computing worth it?</title>
		<link>https://web.abstechservices.co.uk/2025/07/08/is-cloud-computing-worth-it/</link>
					<comments>https://web.abstechservices.co.uk/2025/07/08/is-cloud-computing-worth-it/#respond</comments>
		
		<dc:creator><![CDATA[AbsTechAdmin]]></dc:creator>
		<pubDate>Tue, 08 Jul 2025 20:23:07 +0000</pubDate>
				<category><![CDATA[Computing]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Cloud]]></category>
		<guid isPermaLink="false">https://web.abstechservices.co.uk/?p=406</guid>

					<description><![CDATA[Cloud computing is a term that refers to the use of remote servers to store, manage, and process data. The cloud is a metaphor for the internet, which is why it&#8217;s also sometimes referred to as on-demand computing or utility computing.  So, what exactly is cloud computing? And is it worth it? This IT solution [&#8230;]]]></description>
										<content:encoded><![CDATA[<!-- content style : start --><style type="text/css" data-name="kubio-style"></style><!-- content style : end -->
<p>Cloud computing is a term that refers to the use of remote servers to store, manage, and process data. The cloud is a metaphor for the internet, which is why it&#8217;s also sometimes referred to as on-demand computing or utility computing. </p>



<p><em>So, what exactly is cloud computing? And is it worth it?</em></p>



<p>This IT solution is typically implemented with the help of a cloud computing service provider, made up of a team of experts to ensure the transition process is as smooth as possible.</p>



<p>But even with the rampant use of cloud computing, many business executives across various industries still ask that exact question. And with the near-endless list of options cloud computing offers businesses, it’s only crucial that you (as a decision-maker) know what it is and if it’s the right option for your company.</p>



<p>Here&#8217;s a breakdown of what you need to know about cloud computing and whether it’s a worthy investment or not.</p>



<p><strong>What is cloud computing?</strong></p>



<p>Cloud computing is still a relatively new concept to many businesses. It’s only been in the last few years that cloud services have become widely adopted, with more and more businesses seeing the benefits of moving to the cloud.</p>



<p>Cloud computing is the method to deliver computing services (e.g., data and applications) via the internet. It uses a cloud-shaped symbol representing the internet infrastructure in network flowcharts, where it makes software, hardware, and processing work on any device.</p>



<p>In simple terms, cloud computing is only accessible through the internet in an on-demand function. It means storing and accessing data and programs over the internet anytime and anywhere instead of your computer&#8217;s local hard drive.</p>



<p>The cloud is just a way of describing a remote server that&#8217;s accessible via the internet since the processing takes place on a remote machine. Your data gets collected, stored, and processed in a remote server maintained by a cloud service provider. So, your device is not working as much as it used to since all processing happens in the cloud.</p>



<p>There are many benefits of cloud computing, including that you can access your data from anywhere in the world and that you won&#8217;t need to worry about losing confidentiality.</p>



<p>So, is cloud computing worth it?</p>



<p>The short answer is yes.</p>



<p><strong>The benefits of cloud computing for businesses</strong></p>



<p>There’s no doubt that cloud computing has taken the business world by storm. By enabling businesses to access data and applications from anywhere in the world, the cloud has opened new opportunities for growth and innovation.</p>



<p>But what are the specific benefits of cloud computing?</p>



<p>Here are just a few of our favorites:</p>



<p><strong>Cost savings</strong></p>



<p>One of the significant advantages of cloud computing is that it can help businesses save money. With on-demand scalability and pay-as-you-go pricing models, you only have to pay for the resources you use when you use them.</p>



<p>There’s no need to make expensive upfront investments in hardware or software that you won’t need anytime soon.</p>



<p>Hardware and software are expensive! You must buy, install, and maintain these assets to ensure everything’s working well, especially during peak business times.</p>



<p>This function is especially critical because once your system goes down (whether from equipment breaking or applications becoming legacies), your profits and customers&#8217; happiness are in deep trouble.</p>



<p>With cloud computing, you are less likely to experience these issues that could potentially cost you a lot of money to fix.</p>



<p>Cloud computing’s pay-as-you-go model is ideal for businesses that want a transparent and predictable IT budget. So, if your goal is to have a trusty infrastructure without hurting your pockets, cloud computing is a worthy asset!</p>



<p><strong>Increased agility and flexibility</strong></p>



<p>The cloud gives businesses the ability to be more agile and flexible.</p>



<p>With cloud computing, you can quickly scale up or down depending on your business needs without worrying about managing complex infrastructure.</p>



<p>If your business tends to have seasonal spikes or unforeseen events that may increase customer demand, cloud computing can assist you with that. Cloud computing is a flexible solution you can use anytime to adapt to expected/unexpected circumstances that will affect your business.</p>



<p><strong>Improved security posture</strong></p>



<p>Cloud computing can help businesses improve their security posture by taking advantage of the latest security technologies and services by cloud providers.</p>



<p>Data loss is horrible. It is a heavy burden that affects both you and your customers. You’re highly prone to data disasters if you don’t have (cloud or local) backups. With cloud computing, you can back up your data on remote servers that you can access anytime when the need arises.</p>



<p>Cyber security is not only about preventing disasters. There should also be a solution to mitigating a disaster once they’ve breached your IT. Cloud backups will help you get back up and running in no time in case your local backups are unusable.</p>



<p>When it comes to security, cloud computing will ensure that a copy of your data gets stored on a very secure remote server that you can use to restore your data and systems without any hitch.</p>



<p><strong>Workplace mobility</strong></p>



<p>Remote work is getting more relevant even after quarantine restrictions have died down. This demand means that the office is wherever you want it to be (as long as there’s an internet connection).</p>



<p>You no longer have to be tied down and work in the office to access business data. You can be productive anytime and anywhere without the restrictions of on-premises servers.</p>



<p>Cloud computing is worth your while if you’re looking to be more agile in your processes. And it is cloud-based apps like Microsoft 365 that make this a reality. You can communicate with team members, collaborate on projects, be more productive and efficient with work, etc.</p>



<p>On-premise servers are starting to become a thing of the past. Adapting to cloud computing puts your business forward to further innovation that would make target goals easier to reach.</p>



<p><strong>The drawbacks of cloud computing for businesses</strong></p>



<p>Cloud computing has a few disadvantages that businesses should be aware of before switching.</p>



<p><strong>Possibility of security breaches</strong></p>



<p>One such drawback is the potential for security breaches. Because data is stored off-site on remote servers, it could be more vulnerable to hacking.</p>



<p>That’s why cloud service providers only implement industry-level security solutions to ensure their clients&#8217; data are safe from criminals.</p>



<p>But that’s not all there is to security.</p>



<p>You also have to do your part in maintaining the security posture of your cloud environment. Because cloud computing, although reliable, can be a pathway for cyber criminals to gain access to your most important asset.</p>



<p>So aside from choosing a reputable cloud provider, you also need to ensure the levels of protection and mitigation solutions maintained in your business. You can always start by going through a security awareness webinar we hold every month.</p>



<p><strong>Possibility of service interruptions</strong></p>



<p>Another downside is that you may experience service interruptions if your internet connection goes down or your cloud service provider has technical issues.</p>



<p>Cloud computing is based on the internet, and without a reliable connection, you can experience IT-related inconveniences such as downtime, reboots, and outages. If left unattended, it will affect your entire business operations from unproductive to lost profit.</p>



<p>When setting up your cloud environment, business continuity and uptime should be at the top of your list.</p>



<p>The goal is not to prevent disruptions/outages entirely (because that’s nearly impossible) but to minimise them as much as possible.</p>



<p><strong>Possibility of extra costs</strong></p>



<p>Finally, businesses will need to weigh the cost of using a cloud computing service against the benefits.</p>



<p>While it can save businesses money on hardware and software costs, the PAYG (pay-as-you-go) pricing model also comes with its downsides. For one, it may become more expensive in the long run since there will come a time when you’ll need to scale up your cloud usage according to your growing business needs.</p>



<p>If you’re unsure what’s the best package and pricing for you, you can try out a variety of offers or talk to your IT partner directly.</p>



<p><strong>Is cloud computing worth it for your business?</strong></p>



<p>In today&#8217;s business world, the cloud is becoming increasingly popular. But is it worth it?</p>



<p>There are certainly some costs associated with cloud computing, but there are also many benefits.</p>



<p>For example, cloud computing can help businesses save money on hardware and software costs. It can also improve efficiency and collaboration between teams.</p>



<p>Cloud computing will be an asset to businesses worldwide.</p>



<p>Whether you have a full cloud infrastructure or a hybrid one, you&#8217;ll still enjoy the benefits that come with it. Yes, you can have both an onsite and cloud solution – and this is a great solution if you still want to move some data to the cloud and keep what you need in your on-premises servers. This way, you can keep up with the industry without the need to fully transition to the cloud.</p>



<p>One thing to keep in mind before you switch to cloud computing is to investigate how you can use it to your benefit and help you reach your ROIs. For starters, you should expect less expense and less IT-related work.</p>



<p>Ultimately, the decision of whether or not cloud computing is worth it depends entirely on a business&#8217;s needs and budget. But as we’ve concluded in this article, the benefits of cloud computing outweigh the costs.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://web.abstechservices.co.uk/2025/07/08/is-cloud-computing-worth-it/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is two-factor authentication (2FA)?</title>
		<link>https://web.abstechservices.co.uk/2025/02/24/what-is-two-factor-authentication-2fa/</link>
					<comments>https://web.abstechservices.co.uk/2025/02/24/what-is-two-factor-authentication-2fa/#comments</comments>
		
		<dc:creator><![CDATA[AbsTechAdmin]]></dc:creator>
		<pubDate>Mon, 24 Feb 2025 10:33:17 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[2FA]]></category>
		<category><![CDATA[Computing]]></category>
		<guid isPermaLink="false">https://web.abstechservices.co.uk/?p=342</guid>

					<description><![CDATA[Two-factor authentication (2FA), sometimes referred to as two-step verification or dual-factor authentication, is a security process in which users provide two different authentication factors to verify themselves. 2FA is implemented to better protect both a user&#8217;s credentials and the resources the user can access. It&#8217;s typically used as part of a broader effort to prevent [&#8230;]]]></description>
										<content:encoded><![CDATA[<!-- content style : start --><style type="text/css" data-name="kubio-style"></style><!-- content style : end -->
<p>Two-factor authentication (2FA), sometimes referred to as <em>two-step verification </em>or <em>dual-factor authentication</em>, is a security process in which users provide two different authentication factors to verify themselves.</p>



<p>2FA is implemented to better protect both a user&#8217;s credentials and the resources the user can access. It&#8217;s typically used as part of a broader effort to prevent data breaches and the potential loss of personal data.</p>



<p>Two-factor authentication adds an extra layer of security to the authentication process by making it harder for attackers to gain access to a person&#8217;s devices or online accounts. Even if the victim&#8217;s password is hacked, a password alone isn&#8217;t enough to pass the authentication check.</p>



<p>Two-factor authentication has long been a cybersecurity strategy to manage account security by controlling access to sensitive systems and data. Online service providers are increasingly using 2FA to protect users&#8217; credentials from being used by hackers who stole a password database or used phishing attacks to obtain user passwords.</p>



<p><strong>What are authentication factors?</strong></p>



<p>There are several ways in which someone can be authenticated using more than one authentication method. Most authentication methods rely on knowledge factors, such as a traditional password. Two-factor authentication methods add either a possession factor or an inherence factor.</p>



<p>Authentication factors, listed in approximate order of adoption for computing, include the following:</p>



<ul class="wp-block-list">
<li><strong>Knowledge factor.</strong> A knowledge factor is something the user knows, such as a password or a personal identification number (PIN).</li>



<li><strong>Possession factor.</strong> A possession factor is something the user has, such as an ID card, a security token, a mobile phone or a smartphone app, to approve authentication requests.</li>



<li><strong>Biometric factor.</strong> A biometric factor, also known as an inherence factor, is something inherent in the user&#8217;s physical self. It might be a personal attribute mapped from physical characteristics, such as fingerprints authenticated through a fingerprint reader. Other commonly used inherence factors include facial and voice recognition or behavioural biometrics, such as keystroke dynamics, gait or speech patterns.</li>



<li><strong>Location factor.</strong> A location factor is usually the location from which an authentication attempt is being made. Authentication attempts can be limited to specific devices in a particular location or the geographic source of an authentication attempt can be tracked based on the Internet Protocol address or some other geolocation information, such as Global Positioning System (GPS) data, derived from the user&#8217;s iPhone, Android phone or other mobile device.</li>



<li><strong>Time factor.</strong> A time factor restricts user authentication to a specific time window in which logging on is permitted and restricts access to the system outside of that window.</li>
</ul>



<p>Most two-factor authentication methods rely on knowledge, possession and biometric authentication factors. Systems requiring greater security use multifactor authentication (MFA), which relies on additional independent credentials for more secure authentication.</p>



<p><strong>How does two-factor authentication work?</strong></p>



<p>Enabling two-factor authentication varies depending on the specific application or vendor. However, two-factor authentication processes involve the same general, multistep process:</p>



<ol start="1" class="wp-block-list">
<li>The user is prompted to log in by the application or the website.</li>



<li>The user enters what they know, usually their username and password.</li>



<li>The site&#8217;s server finds a match and recognizes the user.</li>



<li>For processes that don&#8217;t require passwords, the website generates a unique security key for the user. The authentication tool processes the key and the site&#8217;s server validates it.</li>



<li>The site prompts the user to initiate the second login step. Although this step can take several forms, the user must prove that they have something only they would have, such as a biometric feature, security token, credit card, ID card, smartphone or other mobile device. This is the inherence or possession factor.</li>



<li>The user might have to enter a one-time passcode that was generated during Step 4.</li>



<li>After providing both factors, the user is authenticated and granted access to the application or website.</li>
</ol>



<p>Two-factor authentication involves two of three potential authentication factors.</p>



<p><strong>Elements of two-factor authentication</strong></p>



<p>Two-factor authentication is a form of MFA. Technically, it&#8217;s in use any time two authentication factors are required to gain access to a system or service. However, using two factors from the same category doesn&#8217;t constitute 2FA. For example, requiring a password and a shared secret is still considered SFA as they both belong to the knowledge authentication factor type.</p>



<p>SFA that relies on usernames and passwords isn&#8217;t the most secure. One problem with password-based authentication is it requires knowledge and diligence to create and remember strong passwords. Passwords require protection from insider threats, such as carelessly stored sticky notes with login credentials and carelessly discarded hard drives. Passwords are also prey to external threats, such as hackers using brute-force, dictionary or rainbow table attacks as well as social engineering exploits.</p>



<p>Given enough time and resources, an attacker can usually breach password-based security systems and steal corporate data. Passwords have remained the most common form of SFA on laptops and other devices because of their low cost, ease of implementation and familiarity.</p>



<p>Multiple challenge-response authentication questions can provide more security depending on how they are implemented. Standalone biometric verification methods can also provide a more secure method of SFA.</p>



<p>Adaptive multifactor authentication introduces a gatekeeper element into the process. The authentication system has knowledge of specific characteristics or patterns associated with a specific user. The process of authenticating a user’s identify starts when a user interacts with the adaptive authenticator app. The app analyses the user&#8217;s known characteristics and behaviour – for example, how many prior access requests have been made or a time-based analysis of when the requests were made &#8212; to determine if a match can be made. Once a match is confirmed, the user proceeds to the next step in authentication or access process.</p>



<p><strong>Types of two-factor authentication products</strong></p>



<p>There are many different devices and services for implementing 2FA, from tokens to radio frequency identification cards to smartphone apps.</p>



<p>Two-factor authentication products make use of two basic features:</p>



<ul class="wp-block-list">
<li>Tokens that are given to users to use when logging in.</li>



<li>Infrastructure or software that recognizes and authenticates access for users who are using their tokens correctly.</li>
</ul>



<p>Authentication tokens can be physical devices, such as key fobs or smart cards, or software, such as mobile or desktop apps that generate PIN codes for authentication. These authentication codes are known as <em>one-time passwords </em>(OTPs). The authentication code is a short sequence linked to a particular device, user or account and can be used only once as part of an authentication process. Servers generate OTPs, and authentication devices or apps are used to recognize them as authentic.</p>



<p>Organizations need to deploy a system to accept, process, and allow or deny access to users authenticating with their tokens. These systems can be deployed in the form of server software or as a dedicated hardware server. Third-party vendors also provide authenticating services.</p>



<p>An important aspect of 2FA is ensuring the authenticated user is given access to all resources they&#8217;re approved for and only those resources. As a result, one key function of 2FA is linking the authentication system with an organization&#8217;s authentication data.</p>



<p>Microsoft, for instance, supports 2FA in Windows 10 using Windows Hello, a non-password option for Microsoft accounts. It also authenticates users through Microsoft Active Directory, Azure AD and the Fast Identity Online 2 authentication protocol.</p>



<p><strong>Two-factor authentication for mobile devices</strong></p>



<p>A trusted mobile device is one that a specific user controls and regularly uses for transactions requiring secure access. The authentication system knows the device and, with that knowledge, uses it to bypass steps in the authentication process. For instance, a trusted phone number can be used to receive verification codes by text message or automated phone call. A user must verify at least one trusted phone number to enrol in mobile 2FA.</p>



<p>Smartphones offer a variety of 2FA capabilities, enabling companies to use what works best for them. Some devices can recognize fingerprints, use the built-in camera for facial recognition or iris scanning, or use the microphone for voice recognition. Smartphones equipped with GPS can verify location as an additional factor. Voice or Short Message Service (SMS) can also be used as a channel for out-of-band authentication.</p>



<p>Apple iOS, Google Android and Windows 11 all have apps that support 2FA, enabling the phone to serve as the physical device to satisfy the possession factor. Platforms such as Cisco Duo, Microsoft Authenticator and RSA Security SecurID let customers use their trusted devices for 2FA. They establish that a user is trusted before verifying that the mobile device can also be trusted as an authentication factor.</p>



<p>Authenticator apps replace the need to obtain a verification code using text, voice call or email. For example, to access a website or web-based service that supports Google Authenticator, users type in their username and password as their knowledge factor. They are then prompted to enter a six-digit number. Instead of having to wait a few seconds to receive a text message, an authenticator generates the number for them. These numbers change every 30 seconds and are different for every login. By entering the correct number, users complete the verification process and prove possession of the correct device, which is their possession factor.</p>



<p><strong>Authentication standards</strong></p>



<p>The following are open standard authentication protocols that form the basis for different authentication tools that support 2FA:</p>



<ul class="wp-block-list">
<li><strong>FIDO.</strong> The FIDO Alliance developed this open standard, which uses public key cryptography. It&#8217;s designed to eliminate the need for passwords, replacing them with phishing-resistant passkeys.</li>



<li><strong>OAuth 2.0.</strong> An abbreviation of open authorization, OAuth is an open standard that defines an authorization framework that protects system resources, such as files and applications. It provides authorization for application programming interfaces (APIs). It doesn&#8217;t support mobile applications.</li>



<li><strong>OpenID Connect (OIDC).</strong> Developed by the OpenID Foundation, OIDC adds layers to the OAuth 2.0 protocol that support authentication and identity management. It also supports mobile applications, APIs and browser-based apps.</li>



<li><strong>Security Assertion Markup Language (SAML).</strong> Developed by the Organization for the Advancement of Structured Information Standards, SAMLis an open standard for single sign-on access to browser-based applications such as web sites.</li>
</ul>



<p><strong>Push notifications for 2FA</strong></p>



<p>A push notification is password less authentication that verifies a user by sending a notification directly to a secure app on the user&#8217;s device, alerting the user that an authentication attempt is happening. The user can view details of the authentication attempt and either approve or deny access, typically with a single tap. If the user approves the authentication request, the server receives that request and logs the user in to the web app.</p>



<p>Push notifications authenticate the user by confirming that the device &#8212; usually a mobile device &#8212; registered with the authentication system is in the user&#8217;s possession. If an attacker compromises the device, the push notifications are also compromised. Push notifications eliminate threats such as unauthorized access, social engineering and man-in-the-middle attacks.</p>



<p>While push notifications are more secure than other forms of authentication, there are security risks. For example, users can accidentally approve a fraudulent authentication request because they are used to tapping approve when they receive push notifications.</p>



<p><strong>Is two-factor authentication secure?</strong></p>



<p>Two-factor authentication improves security, but these systems are only as secure as their weakest component. For example, hardware tokens depend on the security of the issuer or manufacturer. One of the most high-profile cases of a compromised two-factor system occurred in 2011 when security company RSA reported its SecurID authentication tokens had been hacked.</p>



<p>The account recovery process in these systems can also be subverted when it&#8217;s used to defeat two-factor authentication. Recovery processes often reset a user&#8217;s current password and emails a temporary password to enable the user to log in again, bypassing the 2FA process. The business Gmail accounts of the chief executive of Cloudflare were hacked in this way.</p>



<p>Although SMS-based 2FA is inexpensive, easy to implement and considered user-friendly, it&#8217;s vulnerable to numerous attacks. The National Institute of Standards and Technology (NIST) has discouraged the use of SMS in 2FA services in its &#8220;Special Publication 800-63-3 (2023): Digital Identity Guidelines.&#8221; NIST concluded that OTPs sent via SMS text are too vulnerable due to mobile phone number portability attacks, attacks against the mobile phone network and malware that can be used to intercept or redirect text messages.</p>



<p><strong>Future of authentication</strong></p>



<p>Environments that require higher security are starting to use three-factor authentication. It typically involves possession of a physical token and a password used in conjunction with biometric data, such as fingerprint scans or voiceprints. Factors such as geolocation, type of device and time of day are also used to determine whether a user should be authenticated or blocked.</p>



<p>Other authentication factors emerging include behavioural biometric identifiers, such as a user&#8217;s keystroke length, typing speed and mouse movements. These are discreetly monitored in real time to provide continuous authentication instead of a single one-off authentication check during login.</p>



<p>Relying on passwords as the main method of authentication is common. But it often no longer offers the security or user experience that companies and their user’s demand. Even though legacy security tools, such as a password manager and MFA, attempt to deal with the problems of usernames and passwords, they depend on an essentially outdated architecture: the password database.</p>



<p>Consequently, many organizations are turning to password less authentication. Methods such as biometrics and secure protocols let users securely authenticate themselves in applications without having to enter passwords. For businesses, this means employees can access their work without passwords while IT still maintains control across every login. In addition, blockchain use has brought attention to decentralized identifiers and self-sovereign identity as an alternative to traditional authentication methods.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://web.abstechservices.co.uk/2025/02/24/what-is-two-factor-authentication-2fa/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
	</channel>
</rss>
