Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.
@echo off del smtp2.txt "C:\Program Files (x86)\Log Parser 2.2\logparser.exe" "SELECT CASE TO_INT( SUBSTR(DATA,0,3)) when NULL then 0 else TO_INT( SUBSTR(DATA,0,3)) END AS RemoteHostReturnCode, data, count (*) AS hits FROM D:\Progra~1\Microsoft\Exchan~1\V14\TransportRoles\Logs\ProtocolLog\SmtpSend\SEND*.log WHERE RemoteHostReturnCode > 400 AND context <> 'Certificate thumbprint' AND context <> 'sending message' GROUP BY RemoteHostReturnCode, data ORDER BY hits DESC" -i:CSV -nSkipLines:4 -o:w3c >c:\util\smtp2.txt Exit
|What Software/Licenses do i need to get a Hybrid Exchange and a local ActiveDirectory||7||27|
|How to synch Office 365 with AD in hybrid mode?||7||35|
|Modifying Powershell command to export the list of current Active AD user account with its Exchange mailbox address ?||2||44|
|Exchange 2013 Services not starting||3||17|
Join the community of 500,000 technology professionals and ask your questions.
Connect with top rated Experts
18 Experts available now in Live!