Error loading component: com_user, Component not found.

Sujata Blog

  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Categories
    Categories Displays a list of categories from this blog.
  • Tags
    Tags Displays a list of tags that have been used in the blog.
  • Bloggers
    Bloggers Search for your favorite blogger from this site.
  • Team Blogs
    Team Blogs Find your favorite team blogs here.
  • Login
    Login Login form
Subscribe to this list via RSS Blog posts tagged in sujata

Virtualization may be defined as creating virtual version of something. In IT industry in case of server virtualization, it is all about creating multiple virtual machines (guest) on a single hardware server (host). Originated in 1960s, it involves logical distribution of hardware resources among different guests. With the passage of time it gained popularity because of following benefits: -

Cost :- When one is planning to erect a datacenter, major investment goes into physical hardware. Apart from that, to run a data center, one needs space, electricity, false flooring, air conditioning, facilities to repel rodents etc: If one opts for virtualization technology one is saving a lot on above mentioned cost. Lesser hardware requirement means less space, less electricity consumption and less cooling facilities. And this boils down to less investment.

Back Up :- The compulsory item of datacenter is back up solution. Taking back up of virtualized server and its redeployment is less time consuming then that of taking back up of hardware server and redeploying it.  Firing up a snapshot is faster than rebooting a typical hardware server.

Testing Environment :- If one has testing environment then virtualization is the best option. One can create virtual machines (in accordance with the licensing policy of software) and can use it for testing purpose. If a terrible mistake happens and machine crashes new VM can be created in jiffy.

Virtualized servers are the best option when high availability is required.
mshv-overviewHyper-V (a Microsoft product) and formerly known as Windows Server Virtualization, is a native hypervisor. It comes as a separate SKU and it comes bundled with Window server 2012R2.
Windows server 2012R2 comes in four editions

  • Foundation – For up to 15 users and no virtual machine (VM) can be created.
  • Essentials – For up to 25 users and only one virtual machine can be created
  • Standard- for unlimited users and only two virtual machines can be created
  • Datacenter – For unlimited users and unlimited virtual machines can be created.
Hits: 1399

Source of information: Office blogs

Written by: Microsoft office 365 team

We’ve all been there, you search for an email or calendar invite in Outlook only to find that it isn’t there anymore. Until now deleted items were moved into the Deleted Items folder, then they would disappear after being in that folder for 30 days. With this update, the length of time items remain in the Deleted Items folder is extended to indefinitely or according to the duration set by your administrator. So that email or calendar invite you were looking for is still there if you search for it later—even if you accidentally deleted it.

If you are an Office 365 administrator, this means we’ll be updating the Default MRM Policy for everyone using Exchange Online over the next month. As an administrator, you also have control over this behavior. If you want to keep the 30-day policy or set a custom retention period, that can be done as well and you don’t even need to wait for the change. Also, if you have already created a custom MRM policy, (as long as it has a name other than “Default MRM Policy”), you don’t need to do anything and the change will not impact you.

Create a custom retention policy

You can either edit the name of the Default MRM Policy or create a new policy to opt out of this change. To change the policy name in Office 365 navigate to Office 365 Admin >Exchange admin center > compliance management > retention policies. Next, select Default MRM Policy, click the edit icon and then change the name of the policy.


Exchange admin center for compliance management and retention policies.


Editing experience for retention policies.

Now your policy will not be overwritten and will maintain the settings you’ve specified. Frequently asked questions

Q. Will this be only for new users or will this policy change for all my users who are already in Office 365?

A. This change will affect all existing and new users in your Office 365 tenant who have been assigned the Default MRM Policy.

Q. What if I customized the Default MRM Policy with other settings and properties, but did not rename it?

A. Modifying the properties in the Default MRM Policy alone will not exclude it from being overwritten by this change. If you have customized your Default MRM Policy and kept the original name, the change will still apply.

Q. Does this policy apply to the Recoverable Items folder?

A. No the change does not apply to the Recoverable Items folder. It is only for the visible Deleted Items folder.

Q. If I already have a custom retention policy, will it also be changed to this new default?

A. No, custom policies that you have created will not be modified. For example, if the admin has added extra tags, modified the retention period, modified retention enabled of an existing tag etc. the new behavior will not be enforced.

Q. Does this change affect “Move to Archive” actions on the Deleted Items folder?

A. No, this change will not affect any explicit tags set by the users on items in the Deleted Items folder.

Q. If there is a “Move to Archive” action on the Deleted Items folder will that be affected?

A. No, the change will not affect any “Move to Archive” actions on the Deleted Items folder.

Q. Will this change apply both to the primary and personal archive mailbox Deleted Items folders?

A. Yes, the change will apply for the Deleted Items folder in both the primary and archive mailbox.

Q. Will this change affect a Litigation Hold or In-Place Hold?

A. No, this will not an affect Ligation Hold or In-Place Hold.

Q. How is Microsoft implementing this change?

A. We are instructing the system to ignore the 30 day delete tag on the Deleted Items folder if the retention policy’s name is “Default MRM Policy.”This is why changing the policy name will ensure that the tag continues to work. We are not removing or disabling the tag.

Hits: 1486


In today’s increasingly mobile world, networks change constantly posing new challenges to IT team and to the administration on how to control security and protect the data. New services, access methods, and even devices continue to show up in networks at a frenetic pace.
For years, you must have been told that you need antivirus or some piece of software to protect your computer. These antivirus or software are usually reactive and alert you once they discover something unusual on a particular computer and not in the network. Of course, they are helpful but they do not provide full-proof security to your data and to your network.
Users are accessing an increasing number of applications with a wide range of device types, often times to get their job done, yet with little regard to the business or security risks. Meanwhile, datacenter expansion, network segmentation, virtualization and mobility initiatives are forcing you to re-think how to enable access to applications and data, yet protect your network from a new, more sophisticated class of advanced threats that are adept at evading traditional security mechanisms.
Below are some challenges that are now concerns for Mid-size and Enterprise Businesses -
Challenge #1 : Employees bringing their personal mobile and tablet at work creates data security a concern for IT team

Who could have foreseen the impact of WhatsApp, Twitter and Facebook,or iPads and Android smartphones and tablets, only a few years ago? Today, employees expect to use personal smartphones and mobile devices at work also known as Bring Your Own Device (BYOD), making data security a concern for IT teams.
Challenge #2 : New applications evade threat detection
Traditional or “first-generation” firewalls rely on scanning of port numbers or protocol that are used by applications to detect the  threat and to prevent any misbehavior or intrusion in the network.
Traditional firewalls cannot detect new applications that are accessed through web browser and do not use specific port number or prototype.
Challenge #3 : Multiple Devices or Tools Addressing Incoming Data Security Threats
With the new challenges and threats, there is a need to have multi-level security and to do so, we do not recommend customers to buy different brands of traditional firewall, Data Loss/Leak Prevention (DLP), Intrusion Prevention System (IPS), filtering of websites and data traffic, malware screening at the gateway level and patch management in the network. Different tools create problem of managing them effectively and there can be a problem of compatibility.

From a performance point of view also it is not recommended as each tool/device performs its own inspection of network data, which means that data is inspected multiple times by multiple devices and that create a time latency in data transfer.

In below image, you can see the flow of the data and the possible ways in which threat can enter into the network.



As a network’s complexity increases, so does the expense required to manage that network.
Every administrator should carefully consider the TCO of add-on security appliances versus an integrated solution like UTM or Next-Gen Firewall before making significant infrastructure solution commitments.
UTM should be flexible in terms of output, should be future-ready and should be powerful enough to support your requirement.

The application, content, and user—the elements that run your business—then become integral components of your enterprise security policy. The result is the ability to align security with key business initiatives.

  • Safely enable applications, users and content by classifying all traffic, determining the business use case and assigning policies to allow and protect the relevant applications.
  • Prevent threats by eliminating unwanted applications to reduce the threat footprint and applying targeted security polices to block known vulnerability exploits, viruses, spyware, botnets and unknown malware (APTs).
  • Embrace mobile computing by ensuring devices are properly configured and that they are protected from threats.
  • Protect your datacenters through validation of applications, isolation of data, control over rogue applications and high speed threat prevention.
  • Secure cloud-computing environments with increased visibility and control; deploy and maintain security policies at the same pace as your virtual machines.

UTM-Solution-Sujata Computers Pvt Ltd

As we write this, the best UTM solutions for networks include the following core security functions / policies in their arsenals:

  • Network firewalls perform stateful packet inspection.
  • IPS detects and blocks intrusions and certain attacks.
  • Application control provides visibility and control of application behavior and content.
  • VPN enables secure remote access to networks.
  • Content filtering halts access to malicious, inappropriate, or questionable websites and online content.
  • IPv6 support in all network security functions protects networks as they migrate from IPv4 to IPv6.
  • Support for virtualized environments, both virtual domains and virtual appliance.

They also include additional security technologies that organizations can choose to deploy, including

  • Data loss prevention that blocks accidental or intentional loss of confidential, proprietary, or regulated data.
  • Anti-virus/anti-spam protection that prevents malicious payloads or unwanted messages from entering networks.
  • Endpoint control that enforces corporate security policies with remote users and devices.
  • Integrated wireless LAN (WLAN) controller to consolidate all wired and wireless traffic through a single device, to simplify policy creation and enforcement while reducing network complexity.

UTM solution is integration of multiple security features like firewall, application control, intrusion prevention, VPN, reporting and other elements into a single product. There are multiple brands for which Sujata Computers Pvt Ltd has expertise in.  We can recommend you an appropriate brand and model from Fortinet, SonicWall, Check Point, Cyberoam, Juniper, Palo Alto, Sophos and Cisco depending on your use, industry, existing and future infrastructure, budget and skill-set available with your IT team.
In short, we recommend UTM that includes following features:

Application Control
IPsec and SSL VPN
Web content filtering
Data loss/leakage prevention
Anti-virus and anti-spyware protection
IPv6 native support
Traffic shaping and bandwidth control
Detailed reporting
and if you have no constrain on budget, you should opt for UTM that has independent processors for one-single activity (feature) i.e the more silicon is in UTM the better performance it will deliver.

We also take up responsibility of maintaining the UTM for its customers and help them implement it. We can sign an annual or long-term service and support contract for UTM and help our customers safeguard their infrastructure.


Dinesh Golecha | +91-8888165300 | [email protected]
Paresh Lodha | +91-7276000222 | [email protected]

Hits: 1606




Hello Readers

Sujata Computers Pvt Ltd is providing Adobe Licensing and consultancy for below segment of Customers-

1.Commercial Customers.

2.Academic Customers.

3.Government Customers.

We are serving 1000+ customer from web designing and animation industry who are using Adobe software.
We are also serving 500+ school and colleges customers and more than 200+ Government Customers who are using adobe software.

Adobe Licenses which are available today as on 11 October 2014:

1.Creative Cloud for teams: All individual desktops apps are available in this suite.
2.Creative cloud for single apps: Single apps are available in this category. Acrobat is also   available as singe apps product.
3.PPBU Products like eLearning Suite, Adobe Technical Suite, Captivate, Cold fusion Builder, Contribute, Director, Technical Suite, RoboHelp Office, Robohelp Server, Lightroom, Pagemaker Plus, FrameMaker and Presenter License
4.Acrobat Standard and Professional XI

Top benefits Creative Cloud for teams

1.Get the world’s best tools – Access all the new Adobe Creative Suite 6 desktop applications you want, plus a host of additional tools and services—Adobe Muse,™ Acrobat® XI, Photoshop® Lightroom® 4, and Adobe Edge tools and services, and more. Creative Cloud gives your team the right creative tool the moment they need it. Use our expert support services to make team members even more successful.

2.Collaborate with your team - Share widely, collaborate privately. Share files with colleagues both inside and outside your organization. Use up to 100GB of cloud-based storage and device syncing capabilities to share projects anywhere, anytime.

3.Publish apps and website - Explore new outlets for your content with the publishing services included with Creative Cloud for teams. Create and host websites, deliver stunning digital apps to the iPad, and more.

4.Centralize administration - Easily manage and scale your team’s software with centralized purchasing and license management tools. You and your designated administrators can quickly add, assign, or transfer seats and track usage by team members.

5.Stay up to date - Get upgrades upon release, as well as new features and services as they become  available.

You can activate 30-days trials of different Adobe offerings from here -http://www.adobe.com/in/creativecloud/catalog/desktop.html
Creative Cloud for teams is sold through the value incentive Plan(VIP). Creative cloud for team is subscription based licensing program designed for all sizes of customers. Once VIP no. is generated you can immediately add your number of license. There is no minimum license purchase is required. It is very is easy to manage the Admin console of VIP. License are deploy immediately. Once seats is added in VIP console. Purchase order has to be placed in 30days. User can be added or removed. It’s very easy to manage it. Through Admin console companies can monitor for number of license they have purchase.
You can give me your feedback and comments for improving Adobe blog and let me know what do you want to know about Adobe.
You can contact me on 9822324300 or write to me on [email protected]m

Warmest regards
Umesh Kumar
Certified Adobe Expert
Sujata Computers Pvt Ltd

Hits: 1984

Contact Us

Email: [email protected]

India: +91-20-40100300

US: +1-7323195103