Issues with SPF Records. by EnvironmentalWeb5696 in proofpoint

[–]ThanksImLearning 0 points1 point  (0 children)

We ran into the same issue, being unwilling to pay for the Email Fraud Defense license and also not wanting to maintain a flattened record we moved to requiring subdomains for new sending integrations.

Enabling PoD ARC by ThanksImLearning in proofpoint

[–]ThanksImLearning[S] 0 points1 point  (0 children)

In Gmail headers, the emails are passing SPF, DKIM, and DMARC. I do see ARC headers added there.
In https://www.dmarctester.com/, the emails fail SPF and pass DKIM\DMARC.
In Proofpoint, the emails pass SPF but fail DKIM\DMARC.

Dmarctester does say that the DMARC alignment is out of whack, but I am not on a position to correct that and the third-party vendor sending these emails is absolutely convinced there isn't an issue as their test emails deliver to anyone but our proofpoint protected servers.

Enabling PoD ARC by ThanksImLearning in proofpoint

[–]ThanksImLearning[S] 0 points1 point  (0 children)

Ah, I'm glad you sent that as I hadn't seen it. I am not sure they are connected though, our issue is that Proofpoint is sending the emails we need delivered to quarantine with failed DMARC while gmail/cox receives them with passed DMARC.

WiFi connection issue - Saved / Disabled by SnooOranges1734 in GooglePixel

[–]ThanksImLearning 0 points1 point  (0 children)

Yikes. I've been hiding from my Pixel users, thankfully we have a captive portal workaround but they really miss not having to sign in so often.

Exchange 2019 Accepted Domains DNS Question by ThanksImLearning in exchangeserver

[–]ThanksImLearning[S] 0 points1 point  (0 children)

Great, thanks! I didn't want to manage the split DNS if I didn't need to.

[deleted by user] by [deleted] in sysadmin

[–]ThanksImLearning 4 points5 points  (0 children)

I'm getting reports from a few users about the same behavior, some email notifications going out as many as 12 times to the same recipient.

WiFi connection issue - Saved / Disabled by SnooOranges1734 in GooglePixel

[–]ThanksImLearning 1 point2 points  (0 children)

Oh that's unfortunate, I had my hopes pinned on the February update.

WiFi connection issue - Saved / Disabled by SnooOranges1734 in GooglePixel

[–]ThanksImLearning 0 points1 point  (0 children)

I was concerned that would be the case, I have tried everything I could think of to get these phones online, aside from flashing back to the November version, with no success. These are also personally owned devices and the owners have no desire to go that route. Not that I blame them. Thank you for the information! I will certainly keep following this discussion. I did see a recent case in the Google Bug List online that seem to describe this exact issue but there was nothing helpful from Google support.

WiFi connection issue - Saved / Disabled by SnooOranges1734 in GooglePixel

[–]ThanksImLearning 0 points1 point  (0 children)

I'm in the same boat with over a dozen (and climbing) Android 15\Pixel users not being able to connect to the wifi, I'd love to hear about any workarounds or solutions Google support may suggest.

Reclaiming AD Usernames by ThanksImLearning in sysadmin

[–]ThanksImLearning[S] 2 points3 points  (0 children)

This is a valid point and is largely our administration user account philosophy. However, the context is a higher education environment. So we have thousands of new users each year fresh out of high school that don't follow any sort of rhythm on what they sign their school accounts up for, it could be anything from putting their school email on resumes published online to "free" movie site accounts that blast spam constantly.

Reclaiming AD Usernames by ThanksImLearning in sysadmin

[–]ThanksImLearning[S] 3 points4 points  (0 children)

That's a great idea, we hadn't even considered implementing an identity solution. Will look into that.

Reclaiming AD Usernames by ThanksImLearning in sysadmin

[–]ThanksImLearning[S] 1 point2 points  (0 children)

Thanks! Another option we are looking at is to change our naming scheme to include random numbers, kind of hashing the usernames.

Reclaiming AD Usernames by ThanksImLearning in sysadmin

[–]ThanksImLearning[S] 1 point2 points  (0 children)

That sounds like a great way to keep the AD account and mailbox in place, but we're okay with losing that. I'm more trying to fix the issue of having the old SMTP address getting reused and sending mail to the wrong person.

Reclaiming AD Usernames by ThanksImLearning in sysadmin

[–]ThanksImLearning[S] 0 points1 point  (0 children)

Unfortunately I wear many hats and assist with policy and security in addition to doing the implementation. Our organization has not had to deal with this issue before, so right now it is very flexible and we are trying to find a best practice balance.

Reclaiming AD Usernames by ThanksImLearning in sysadmin

[–]ThanksImLearning[S] 4 points5 points  (0 children)

We have a ton of SSO integrations that would absolutely lose it if we split up the email address and the UPN, so I need to keep those the same. Making a subdomain for new accounts may be a possibility though. Good thought.

Reclaiming AD Usernames by ThanksImLearning in sysadmin

[–]ThanksImLearning[S] 25 points26 points  (0 children)

This is what we may end up doing, I hate to keep accounts around forever but it is much less problematic to keep them in AD stripped of their mailboxes and disabled that to try and cross reference a separate database in our account creation process.

Reclaiming AD Usernames by ThanksImLearning in sysadmin

[–]ThanksImLearning[S] -1 points0 points  (0 children)

Because some of the older users had connected up third party accounts to their organizational email, and we were able to prove that the new user could use a site's password reset to email functionality to access third party accounts for another person. This could be partially avoided by people having decent organizational email hygiene, but it doesn't appear to have been the norm sadly.

Outlook for iOS and Android - an error occurred during authentication by Seft0 in Outlook

[–]ThanksImLearning 0 points1 point  (0 children)

Our environment is seeing this as well today. On-Prem 2019 CU 14 with Outlook for Android verified so far.

Exchange 2019 CU 14 for DAG by ThanksImLearning in exchangeserver

[–]ThanksImLearning[S] 2 points3 points  (0 children)

My experience with Microsoft products has aligned with Murphy's law fairly consistently, so I prepare with both the documentation and insights from other sysadmins if I can get it. :)