Email Service CPTE 433 John Beckett. The Fundamentals Reliable Scalable –Issue is speed Flexible –Clients, locations Growing issue: Spam control Growing.

Slides:



Advertisements
Similar presentations
What you will get? Or what you like to know?
Advertisements

Hosted Revolution Ltd Hosted Exchange October 2009 V2.01.
Managing Incoming Chapter 3 Bit Literacy. Terminology client – program which retrieves s from a mail server, lets you read the mails,
Accelerate Your Business RP IaaS (Infrastructure as a Service) IaaS.
Introduction to Your Name Goes Here
 Guy Jacob  Roee Shapiro – Project A Spring, 2008 INFINI DRIVE  Project Supervisor: Hai Vortman  Lab Chief Engineer: Dr. Ilana David.
Internet Messaging in 60 Minutes Terry Gray -University of Washington Policy Issues Mission Critical Messaging Goals Relevant Standards Standards Update.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 5 Introduction to DNS in Windows Server 2008.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Introduction to the Secure SMTP Server service. Secure SMTP server is a secure, reliable SMTP mail relay server for your outgoing mail. Secure SMTP service.
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
IT:Network:Applications Fall  Running one “machine” inside another “machine”  OS in Virtual machines sees ◦ CPU(s) ◦ Memory ◦ Disk ◦ USB ◦ etc.
1 WELCOME TO BASIC Instructor Donna DeMedicis ♦ 22 Years of Library Service ♦ BPL Support Staff In Opening The Regional Library Computer Center (Gates.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
Internet Service Provisioning Phase - I August 29, 2003 TSPT Web:
Sun One IMAP & Microsoft Exchange Coexistence Dan Oberst Princeton University CSG 9/21/04.
Cloud Computing Saneel Bidaye uni-slb2181. What is Cloud Computing? Cloud Computing refers to both the applications delivered as services over the Internet.
Chapter 7: Using Windows Servers to Share Information.
The Linux Operating System Lecture 7: Tonga Institute of Higher Education.
IST346 – Servies Agenda  What is ?  Policies  The technical side of  Components  Protocols  architecture  Security.
U3A New Technology 4 March 2013 Mike Hender 1.
Webmail. Agenda Why use webmail? Why use webmail? What is webmail What is webmail – basic » system MDA MDA MTA MTA MUA MUA »Protocol SMTP SMTP.
IT:Network:Applications.  How messaging servers work  Initial tips for success Exchange management  Server roles  Exchange Server Management  Message.
MIGRATING FROM MICROSOFT EXCHANGE SERVER AND OTHER MAIL SYSTEMS Appendix B.
Security and Privacy Strategic Global Partners, LLC.
DECS Community IT DIVISION OF ENGINEERING COMPUTING SERVICES Michigan State University College of Engineering.
XP New Perspectives on The Internet, Fifth Edition— Comprehensive, 2005 Update Tutorial 7 1 Mass Communication on the Internet Using Mailing Lists Tutorial.
Denial-of-Service Attacks Justin Steele Definition “A "denial-of-service" attack is characterized by an explicit attempt by attackers to prevent legitimate.
Archiving s. How to Manage Auto-Archive in Outlook Your Microsoft Outlook mailbox grows as you create and receive items. To manage the space.
Climb Out of the Hole CPTE 433 Chapter 2 Adapted by John Beckett from The Practice of System & Network Administration by Limoncelli, Hogan, & Chalup.
Module 4 Planning and Deploying Client Access Services in Microsoft® Exchange Server 2010 Presentation: 120 minutes Lab: 90 minutes After completing.
Appendix A UM in Microsoft® Exchange Server 2010.
Network Security Lecture 20 Presented by: Dr. Munam Ali Shah.
Linux Networking and Security
2  Supervisor : MENG Sreymom  SNA 2012_Group4  Group Member  CHAN SaratYUN Sinot  PRING SithaPOV Sopheap  CHUT MattaTHAN Vibol  LON SichoeumBEN.
Module 12 Integrating Exchange Server 2010 with Other Messaging Systems.
Introduction to Student Name Student Class.
Application Security: (April 10, 2013) © Abdou Illia – Spring 2013.
1 Firewall Rules. 2 Firewall Configuration l Firewalls can generally be configured in one of two fundamental ways. –Permit all that is not expressly denied.
Security fundamentals Topic 9 Securing internet messaging.
CHAPTER 7 CLUSTERING SERVERS. CLUSTERING TYPES There are 2 types of clustering ; Server clusters Network Load Balancing (NLB) The difference between the.
A Quick Look At How Works Understanding the basics of how works can make life a lot easier for any user. Especially those who are interested.
Linux Operations and Administration Chapter Twelve Configuring a Mail Server.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Computer Security Sample security policy Dr Alexei Vernitski.
VIRTUAL SERVERS Chapter 7. 2 OVERVIEW Exchange Server 2003 virtual servers Virtual servers in a clustering environment Creating additional virtual servers.
Week-2 (Lecture-1) An electronic message sent from one computer to another. contains account i.e. How does.
– Protocols 21 – Protocols 21. – Protocols 21 Now we’ll move on to more technical aspects of This means protocols Remember.
FNAL Central Systems Jack Schmidt, Al Lilianstrom, Ray Pasetes, and Kevin Hill (Fermi National Accelerator Laboratory) Introduction The FNAL .
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
101 Derek Carter
Barracuda Networks Professzionális levélarchiválás Barracuda Message Archiver.
Chapter 7: Using Windows Servers
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
Working at a Small-to-Medium Business or ISP – Chapter 8
Introduction to Your Name Goes Here
3.1 Types of Servers.
Working at a Small-to-Medium Business or ISP – Chapter 7
Introduction to Justin R. Scott CIS Introduction to .
Working at a Small-to-Medium Business or ISP – Chapter 7
Design Unit 26 Design a small or home office network
Working at a Small-to-Medium Business or ISP – Chapter 7
has many aspects that work together to give people almost instant communication from any computer on the internet to any other computer There.
Introduction to Your Name Goes Here
Chapter 2: Operating-System Structures
LO3 – Understand Business IT Systems
Chapter 2: Operating-System Structures
6. Application Software Security
STATEL an easy way to transfer data
Presentation transcript:

Service CPTE 433 John Beckett

The Fundamentals Reliable Scalable –Issue is speed Flexible –Clients, locations Growing issue: Spam control Growing issue: Storage

Privacy Fit with your organization’s culture. Clearly state policy. Distribute policy; get signatures. Use policy as a statement of maximum intrusion, not minimum. Keep incidentally-acquired knowledge secret.

Namespaces See previous chapter. Two issues: –Recognition of who this is –Non-duplication Special problem for colleges: marriage What about when people move around? –You might have an alias list pointing to people with specific responsibilities, e.g. eclasshelp.

Reliability Upgrade plans for must be laid more carefully than those for other services. Better to hold mail at bay than to lose it. –Simplest method: unplug the Ethernet jack or take down the service

Aspects Mail Transport –This is done by the equipment designated to the right of the –In DNS, this is the “MX” record. Delivery –GUI / non-GUI client –Webmail/OWA/SquirrelMail (is both client and server) –Consider protocols used: POP3 and IMAP4 List Processing –Big question is, who can send to which list?

Fading Technologies MTA on a client machine –May wish to deny this in your firewall Proprietary protocols –CCMail –CompuServe

Emerging Technologies Encryption* Non-repudiation* Spam control * This is a reason SAU has migrated from Procmail to Microsoft Exchange Server.

Automation Setting up the account should be part of the process of signing up for a job. List administration should be automated either ex officio or at user’s election. What about when people leave? –No forwarding outside. –Either refuse the mail or send it to their replacement. –At SAU: When does a person really leave?

Monitoring Watch disk space consumption. That will tell you: –If someone is being attacked. –If you are not filtering SPAM properly. –If someone is using to do something that should be done through another process. Watch the bandwidth. –Positive trend: more bandwidth on connection –Negative trend: SPAM

Redundancy Keep mail flowing in and out of the site even if one mail exchanger goes down.

Scaling Move other services off the mail machine. Separate mail functions such as WebMail client and MTA. Get a bigger machine. Do a better job of SPAM control. Provide alternate means or hosts for troublesome s –Art department example.

Security Your mail system will be a target. If you count SPAM, it’s a target every second of the day! Watch the resources: disk I/O, disk space, bandwidth. Of course, stay updated.

Backups Do you want to back up local folders? –Yes: You have to be able to recover it if it breaks. –Yes: You may be required to recover deleted s. –No: That’s not your job. –No: Leaves unnecessary records that could be used by a prosecutorial opponent. Backup policy should be clearly stated and understood by all.

High-Volume Lists You may want to split the list into multiple sub-lists for simultaneous processing. GC example: From 4 hours to 30 minutes on a 30,000-person list.

Consider Off-Site Gmail.com is happy to do it (free!)