Damian Scoles | Project Leadership Associates Microsoft Exchange Server MVP

Slides:



Advertisements
Similar presentations
MFA for Business Banking – Security Code Multifactor Authentication: Quick Tip Sheets Note to Financial Institutions: We are providing these QT sheets.
Advertisements

Module 12 Upgrading from Exchange Server 2003 or Exchange Server 2007 to Exchange Server 2010.
Installation and Deployment in Microsoft Dynamics CRM 4.0
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 13: Planning Server and Network Security.
Chapter 7 HARDENING SERVERS.
Windows 2003 SP1 Member Server in ASU Active Directory WNUG/CCC February 2, 2006 Sharon Bushart CLAS Information Technology.
Installing Exchange 2010 IT:Network:Applications.
Exchange server Mail system Four components Mail user agent (MUA) to read and compose mail Mail transport agent (MTA) route messages Delivery agent.
Cambodia-India Entrepreneurship Development Centre - : :.... :-:-
Installing software on personal computer
Installing and Maintaining ISA Server. Planning an ISA Server Deployment Understand the current network infrastructure Review company security policies.
Introduction to UTORexchange For IT support providers.
SP2 Mikael Nystrom. Agenda Översikt Installation.
Winter Consolidated Server Deployment Guide for Hosted Messaging and Collaboration version 3.5 Philippe Maurent Principal Consultant Microsoft.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 14: Problem Recovery.
CRMUG ® Summit 2011 November 8-11 Caesars Palace – Las Vegas, NV Implementing CRM 2011 Claims-Based Authentication, ADFS and IFD Best Practices and Tips.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Managing Client Access
Module 4 Managing Client Access. Module Overview Configuring the Client Access Server Role Configuring Client Access Services for Outlook Clients Configuring.
Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.
Test Review. What is the main advantage to using shadow copies?
Microsoft Windows 2003 Server. Client/Server Environment Many client computers connect to a server.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
Migration XenDesktop 7. © 2013 Citrix | Confidential – Do Not Distribute Migration prerequisites Set up a XenDesktop 7 Site, including the site database.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
Configuring the MagicInfo Pro Display
Internal NetworkExternal Network. Hub Internal NetworkExternal Network WS.
PPD Computing “Business Continuity” Windows and Mac Kevin Dunford May 17 th 2012.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
New | Remove-SearchDocumentFormat New | Remove | Set | Get- IntraOrganizationConnector Get-IntraOrganizationConfiguration.
CIS 375—Web App Dev II Microsoft’s.NET. 2 Introduction to.NET Steve Ballmer (January 2000): Steve Ballmer "Delivering an Internet-based platform of Next.
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
Windows 2003 Overview Lecture 1. Windows Networking Evolution Windows for Workgroups – peer-to-peer networking built into the OS Windows NT – separate.
Troubleshooting Windows Vista Security Chapter 4.
Exchange Exchange Server Role Architecture in Exchange Server 2013 Server roles in Exchange Server 2013: Client Access Server Mailbox Server Client.
Module 14: Configuring Server Security Compliance
Section 1: Introducing Group Policy What Is Group Policy? Group Policy Scenarios New Group Policy Features Introduced with Windows Server 2008 and Windows.
New SharePoint 2016 Features
1 © 2004, Cisco Systems, Inc. All rights reserved. CISCO CONFIDENTIAL Using Internet Explorer 7.0 to Access Cisco Unity 5.0(1) Web Interfaces Unity 5.0(1)
Microsoft Exchange 2000 Service Pack 2 Features Mark Barringer Support Professional Enterprise Messaging Support Microsoft Corporation.
OFC290 Information Rights Management in Microsoft Office 2003 Lauren Antonoff Group Program Manager.
Module 11: Implementing ISA Server 2004 Enterprise Edition.
Module 6: Managing Client Access. Overview Implementing Client Access Servers Implementing Client Access Features Implementing Outlook Web Access Introduction.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Module 12 Upgrading from Exchange Server 2003 or Exchange Server 2007 to Exchange Server 2010.
Module 11 Upgrading to Microsoft ® Exchange Server 2010.
PLANNING A MICROSOFT EXCHANGE SERVER 2003 INFRASTRUCTURE Chapter 2.
Module 7 Planning and Deploying Messaging Compliance.
Module 1: Implementing Active Directory ® Domain Services.
Module 2: Installing Exchange Server Overview Introduction to the Exchange Server 2007 Server Roles Installing Exchange Server 2007 Completing the.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Vlad Mazek Own Web Now Corp CEO, MCSE, MCSA, CISSP (877) Portions reproduced with permission from Dean Calvert.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Microsoft ® Lync™ Server 2010 Setup and Deployment Module 04 Microsoft Corporation.
LM/NTLMv1 Retirement Hosted by LSP Services.
SBS 2003 Exchange Lars Wallin. Agenda Limitations Limitations Installation Installation Configuration Configuration Security Security SPAM SPAM Mobility.
BE-com.eu Brussel, 26 april 2016 EXCHANGE 2010 HYBRID (IN THE EXCHANGE 2016 WORLD)
Microsoft Exchange Server 2013 Security Mick Tomlinson– Technical Instructor New Horizons.
@GPUG WHAT’S NEW IN DYNAMICS GP 2016 ? Presented by Beat Bucher, Dynamics GP MVP 1 Tweet During today’s #GPUG, #GPUG.
QUESTION 1: Your role of Network Administrator at ABC.com includes the management of the Active Directory Domain Services (AD DS) domain named ABC.com.
Scott Schnoll Senior Content Developer Microsoft Corporation Overview of Exchange Server 2013 Service Pack 1.
Vmware 2V0-621D Vmware Exam Questions & Answers VMware Certified Professional 6 Presents
VIRTUAL SERVERS Chapter 7. 2 OVERVIEW Exchange Server 2003 virtual servers Virtual servers in a clustering environment Creating additional virtual servers.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
CACI Proprietary Information | Date 1 PD² v4.2 Increment 2 SR13 and FPDS Engine v3.5 Database Upgrade Name: Semarria Rosemond Title: Systems Analyst, Lead.
MCSA Windows Server 2012 Pass Upgrading Your Skills to MCSA Windows Server 2012 Exam By The Help Of Exams4Sure Get Complete File From
Implementing CRM 2011 Claims-Based Authentication, ADFS and IFD
Securing the Network Perimeter with ISA 2004
Install Active Directory
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

Damian Scoles | Project Leadership Associates Microsoft Exchange Server MVP

Edge Transport Role DLP Enhancements MAPI over HTTP IP Less DAGs EAC Command Logging OWA Enhancements Miscellaneous

Microsoft Confidential Edge role in production: Deployed in DMZ o Talks directly to CAS/MBX through the firewall

Reduce attack surface o Reduced set of services o Reduced set of PowerShell commands o Member server with AD LDS installed Provides mail routing as well as message hygiene No GUI o No interface like the EAC for other roles o Configurable via PowerShell only

Policy Tips in OWA Document Finger Printing Sensitive information types expanded

No longer limited to just Outlook. Can Enforce – warn, block or allow exceptions – as well as test Seamless user experience – OWA/Outlook operate the same Above example warns on SSN or Bank Numbers

What is fingerprinting? What can we use it for? o Government forms o HIPPA o Employee forms (HR) o Patent forms o Custom Forms (proprietary to your company) Limitations o Password protected files will not work o Documents with images only How are the documents stored? o XML Hash file Microsoft Confidential

Source -

Create a document finger print from an existing document. − EAC –> DLP –> Manage document finger prints -> Add document Create DLP Policy that uses this document fingerprint o Add a custom rule o Edit the ‘Sensitive Information types’, select the fingerprint o Finish the rules you want applies to the policy. The same process can be performed in PowerShell o get-content o new-fingerprint o New-transportrule Microsoft Confidential

Exchange 2013 SP1

More types have been added to DLP: o Finland National ID o Poland National ID (PESEL) o Poland Identity Card o Poland Passport o Taiwan National ID Microsoft Confidential

Replacement for RPC over HTTP o RPC is a legacy protocol with no real updates in a decade o Design for LANs and not communication over the Internet o RPC is sensitive to interruptions o More information (history of RPC and reasoning for HTTP transition)  Provides a common communication platform for Exchange communications – HTTP o Active Sync o OWA o Outlook Uses POST Commands based on HTTP 1.1 No metrics on actual performance yet. Still pending from Microsoft.

How to enable this in Exchange? o Set-MapiVirtualDirectory -Identity "Contoso\mapi (Default Web Site)" - InternalUrl -IISAuthenticationMethods Negotiate o Set-OrganizationConfig -MapiHttpEnabled $true Caveats o May not be able to access legacy Public Folders. o All Exchange servers at 2013 Service Pack 1 o All clients at Outlook 2013 Service Pack 1

What is an IP Less DAG? o Windows cluster has no IP Address – no resource in cluster core group o No cluster name – no resource in cluster core group o No DNS entry for cluster o No computer objects (CNO) are created in Active Directory o Cluster managable with PowerShell and not Failover Clustering o Reduces attack surface of Exchange 2013 o Can convert an existing DAG Requirements o Windows Server 2012 R2 o Exchange 2013 SP1 ** Caveat - "We do not recommend this deployment method for any scenario that requires Kerberos authentication.“ Source -

IP Address is entered as No object in Active Directory

Originally in Exchange 2007 and 2010 What is it? Why do we care? How do I turn it on Logging? What does it actually do? Actual Output:

Caveats/Information o Displays only current actions o When closed, previous results are lost o Up to 500 entries at a time o Searchable Microsoft Confidential

S/MIME o Can be enabled in the Outlook Web App Policy via PowerShell Set-OWAVirtualDirectory -identity "owa (Default Web Site)" -SMimeEnabled $true o Requires IE 7+, recommend IE 9+ (supported clients) o Uses Rich Text Editor o Improvements in the user interface for easier use  Copy and Paste  Better format options Firefox - Offline Mode o Controlled by Outlook Web App Policies (on by default) o Offline-supported folders include:  Inbox  Drafts  Any folder viewed from the browser in the last week Microsoft Confidential

Loose truncation ExBPA in Exchange 2013 SP Server R2 Supported OS Forest/Domain R2 Enhancements in Managed Availability Enhancements in Cluster stability o Hotfix that was available for Windows 2008 OS released for 2012 Schema Updates – minor changes SSL Offloading Post Hot Fix ‘required’:

Prior to Exchange 2013 SP1 – two options for database logging o Full: truncate on backup o Circular: self truncating Disabled by default Enabled via registry entries o HKLM\Software\Microsoft\ExchangeServer\v15\BackupInformation  LooseTruncation_MinCopiesToProtect  LooseTruncation_MinDiskFreeSpaceThresholdInMB  LooseTruncation_MinLogsToProtect Purpose o Prevent disks from running out of space (i.e. during maintenance windows) o Keeps only the logs that are needed – unverified logs not replicated to other servers o Ignores the farthest copy out of sync

Microsoft Confidential No longer requires Office 365 tenant to download Does not run on Edge server Only gives results for one server at a time Can be run on a non-Exchange server

Microsoft Confidential

SOURCE:

− After you install Microsoft Exchange Server 2013 Service Pack 1 (SP1) or you upgrade an existing Microsoft Exchange Server 2013 installation to Exchange Server 2013 SP1, third-party or custom-developed transport agents cannot be installed correctly. Additionally, the Microsoft Exchange Transport service (MSExchangeTransport.exe) cannot start automatically. Specifically, you cannot enable third-party products that rely on transport agents. For example, you cannot enable anti- malware software or custom-developed transport agents. When the installation fails, you also receive an error message that resembles the following: The TransportAgentFactory type must be the Microsoft.NET class type of the transport agent factory. Why does this happen? − This problem occurs because the global assembly cache (GAC) policy configuration files contain invalid XML code. So what does this mean? Microsoft Confidential

Q & A Damian Scoles | Project Leadership Associates Microsoft Exchange Server MVP