Category Archives: Internet

Install OnlyOffice Docs with Nextcloud on the same Ubuntu Server

See the following Article to Install and Configure NextCloud and OnlyOffice Document Server on the same Linux Ubuntu server box, and integrate their document editing and cloud storage:

Install OnlyOffice Docs with Nextcloud on the same Ubuntu Server

The above referenced article containing the detailed installation and configuration instructions appears on InstallConfig.com.  Following is the preface summary:  

This Article applies to installing OnlyOffice docs on Ubuntu 22.04 LTS along side of NextCloud 27.0.0 with NextCloud being served via Apache2 webserver with SSL on port 443 and OnlyOffice being hosted from Nginx webserver on non-standard port 81, plus Apache2 being configured to proxy the OnlyOffice app from port 81 on Nginx to port 80 on Apache2 (and eventually port 443 on Apache2). Both the NextCloud Apache Virtual Host and the OnlyOffice Apache Virtual Host configurations will each have letsencrypt SSL certificates for their respective domains or subdomains, thus generating a separate Apache virtual host SSL.conf file for each subdomain which shall each be served by Apache on TCP Port 443. Nginx merely hosts and serves the OnlyOffice application (the OnlyOffice app) via TCP port 81 and does not need to operate with encryption and decryption via SSL certificates for the following reasons. With the Apache virtual host accessing the Nginx-hosted OnlyOffice App on localhost at port 81 and “proxying” OnlyOffice to the internet through Apache on port 443 with SSL certificate configured on the Apache virtual host ssl.conf configured for the separate OnlyOffice domain (or subdomain), there is no need to obtain an SSL certificate to bind on Nginx.

This article assumes that the apache2 webserver, php 8.1, MySQL, and NextCloud are properly installed, configured and enabled.

Adding Strict Transport Security Response Header in IIS

Make sure the web.config file in the root directory of your website is not set to read only on the properties page for that file.

Open Internet Information Services Manger.  Select the website where you want to add this Strict-Transport-Security response header.  Double click and select the Icon for HTTP Response Headers.

In HTTP Response Headers window, click on Add… on the right pane and type in Strict-Transport-Security for Name and max-age=63072000; includeSubDomains; preload for Value and click OK. The max-age value 63072000 is the number of seconds for the duration of two years. You need to enter a value of at least one year.

Source URL for this information:

https://www.itnota.com/setup-http-strict-transport-security-hsts-iis/

Disable xmlrpc.php in WordPress

See: https://www.hostinger.com/tutorials/xmlrpc-wordpress

What Is Xmlrpc.php in WordPress and Why You Should Disable It

Simply navigate to the Plugins › Add New section from within your WordPress dashboard. Search for Disable XML-RPC and install the plugin .

If you’d want to only turn certain elements of XML-RPC off, but still allow certain plugins and features to work, then use the following plugins instead:

  • Stop XML-RPC Attack. This plugin will stop all XML-RPC attacks, but it’ll continue to allow plugins like Jetpack, and other automatic tools and plugins to retain access to the xmlrpc.php file.
  • Control XML-RPC Publishing. This allows you to retain control and use over the remote publishing option afforded by xmlrpc.php.

Managing Mailbox Size and Quota on Exchange Server 2016

See:

https://theitbros.com/mailbox-size-and-quota-exchange-server/

Global Settings:  You can configure mailbox quotas from the Exchange admin center (EAC) web interface. To do this, go to the section Servers > Databases > select the required databaseProperties > Limits.  Set the necessary quotas on the Limits tab.

 

 

Customize Per Mailbox:  Mailbox quota settings can also be changed from EAC (Recipients Mailboxes > Properties > Mailbox usage > More Options > Customize the quota settings for this mailbox).

 

Example:  Change to “unlimited” instead of 2GB default maximum.

Issue a warning at (GB)  9.9

Prohibit Send at (GB)  “unlimited”

Prohibit send and receive at (GB) “unlimited”

Click “Save”

 

Creating Redirect in IIS7 from HTTP to HTTPS after Installing SSL Certificate

IIS Redirect HTTP to HTTPS

Setting up an HTTP/HTTPS redirect in IIS

Once the SSL certificate is installed, your site still remains accessible via a regular insecure HTTP connection. To connect securely, visitors must specify the https:// prefix manually when entering your site’s address in their browsers.

In order to force a secure connection on your website, it is necessary to set up a certain HTTP/HTTPS redirection rule. This way, anyone who enters your site using a link like “yourdomain.com” will be redirected to “https://yourdomain.com” or “https://www.yourdomain.com” (depending on your choice) making the traffic encrypted between the server and the client side.

Below are steps to setup a IIS HTTPS redirect:

    1. Download and install the “URL Rewrite” module.
    2. Open the “IIS Manager” console and select the website you would like to apply the redirection to in the left-side menu:
    3. Double-click on the “URL Rewrite” icon.
    4. Click “Add Rule(s)” in the right-side menu.
    5. Select “Blank Rule” in the “Inbound” section, then press “OK”:
    6. Enter any rule name you wish.
    7. In the “Match URL” section:- Select “Matches the Pattern” in the “Requested URL” drop-down menu 
      – Select “Regular Expressions” in the “Using” drop-down menu 
      – Enter the following pattern in the “Match URL” section: “(.*)” 
      – Check the “Ignore case” box
    8. In the “Conditions” section, select “Match all” under the “Logical Grouping” drop-down menu and press “Add”.
    9. In the prompted window:
      – Enter “{HTTPS}” as a condition input 
      – Select “Matches the Pattern” from the drop-down menu 
      – Enter “^OFF$” as a pattern 
      – Press “OK”
    10. In the “Action” section, select “Redirect” as the action type and specify the following for “Redirect URL”:https://{HTTP_HOST}{REQUEST_URI}
    11. Check the “Append query string” box.
    12. Select the Redirection Type of your choice. The whole “Action” section should look like this:

NOTE: There are 4 redirect types of the redirect rule that can be selected in that menu: 
– Permanent (301) – preferable type in this case, which tells clients that the content of the site is permanently moved to the HTTPS version. Good for SEO, as it brings all the traffic to your HTTPS website making a positive effect on its ranking in search engines. 
– Found (302) – should be used only if you moved the content of certain pages to a new place *temporarily*. This way the SEO traffic goes in favour of the previous content’s location. This option is generally not recommended for a HTTP/HTTPS redirect. 
– See Other (303) – specific redirect type for GET requests. Not recommended for HTTP/HTTPS. 
– Temporary (307) – HTTP/1.1 successor of 302 redirect type. Not recommended for HTTP/HTTPS.

  1. Click on “Apply” on the right side of the “Actions” menu.

The IIS redirect can be checked by accessing your site via http:// specified in the URL. To make sure that your browser displays not the cached version of your site, you can use anonymous mode of the browser.

The rule is created in IIS, but the site is still not redirected to https://

[Skip to #6 and #7 Below “SOLVED.” This is my recommended tip which I doubt that you will find elsewhere on the net.  You will see the logic.]

Normally, the redirection rule gets written into the web.config file located in the document root directory of your website. If the redirection does not work for some reason, make sure that web.config exists and check if it contains the appropriate rule.

To do this, follow these steps:

  1. In the sites list of IIS, right-click on your site. Choose the “Explore” option:
  2. “Explore” will open the document root directory of the site. Check if the web.config file is there.
  3. The web.config file must have the following code block:
    <configuration>
     <system.webServer>
     <rewrite>
     <rules>
     <rule name="HTTPS force" enabled="true" stopProcessing="true">
     <match url="(.*)" />
     <conditions>
     <add input="{HTTPS}" pattern="^OFF$" />
     </conditions>
     <action type="Redirect" url="https://{HTTP_HOST}{REQUEST_URI}" redirectType="Permanent" />
     </rule>
     </rules>
     </rewrite>
     </system.webServer>
    </configuration>
  4. In Windows File Explorer on the IIS Server, open the web.config file using a good editor like Notepad++.  Make sure the elements of this rule are contained between one set of beginning and ending rule elements, that is between <rule> {redirect rule code goes here] </rule>.  There may have been one or more existing rules already configured between the “<rules></rules>” elements.
  5. If the web.config file is missing, you can create a new .txt file, put the aforementioned code there, save and then rename the file to web.config.
  6. [SOLVED]  Go into your IIS Management Console and click to select your website name on the left menu.  Click “Bindings” on the far right action column.  In the bindings page dialog, you should see an existing “https” host header for yourdomain.com that has the SSL certificate bind to it in order to handle SSL.  Make sure you ADD an http: host header for www.yourdomain.com and ADD an http: host header for yourdomain.com (without the www) to handle Non-SSL.  YOU NEED THE NON-SSL headers to capture the web query before it can be redirected to https SSL for the encryption to be handled by your SSL Certificate.
  7. [SOLVED] ALSO, make sure NOT to require SSL from within IIS.  Select your website on the left.  Double click on the SSL icon in the middle pane.  CLEAR THE CHECKBOX THAT WOULD REQUIRE SSL.  APPLY.
  8. Click the text Restart link on the far right pane / column of the IIS management console (mmc snapin) to restart the websits.
  9. Open and CMD.exe prompt from the Start / Run in Windows Server.
  10. Stop and Start the Web Service.  In the command prompt window, type “net start w3svc” and [Enter]. Wait until the service is stopped.  Then, type “net start w3svc” and [Enter]. Wait until the service is started.  Close the command prompt window (X out or exit).
  11. Go test the website from a remote browser by typing in the address bar www.yourdomain.com and it should properly redirect to https//your domain.com.  Accomplished.  

If this article helped you and saved considerable time and effort, please consider donating a little something through paypal to support continued hosting of this site.  Thank you.