Optimer Sikkerheden Exchange Server 2003

  • 1,454 views
Uploaded on

Implementing Exchange Server Security.

Implementing Exchange Server Security.

More in: Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
1,454
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
53
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Implementing Exchange Server Security Henrik Damslund Senior Technology Specialist Microsoft
  • 2. Session Prerequisites
    • Hands-on experience with Microsoft Windows Server 2003
    • Working knowledge of Microsoft Exchange Server 2003
    • Working knowledge of Internet protocols including POP3, IMAP4, SMTP, HTTP, and NNTP
    • Working knowledge of networking, including TCP/IP, DNS, and IIS
    • Basic understanding of PKI concepts and technologies
    Level 300
  • 3. Session Overview
    • Implementing Exchange Server
    • Securing Exchange Server Services and Messaging Protocols
    • Maintaining Security on Exchange Server
    • Configuring Exchange to Protect Against Unwanted E-Mail
  • 4. Implementing Exchange Server
    • Implementing Exchange Server
      • An overview of Exchange Server 2003 security.
      • Exchange Server deployment scenarios.
      • Exchange Server client scenarios.
      • Configuration and security update recommendations for Exchange Server.
      • Implementing a defense-in-depth approach to Exchange Server security.
    • Securing Exchange Server Services and Messaging Protocols
    • Maintaining Security on Exchange Server
    • Configuring Exchange to Protect Against Unwanted E-Mail
  • 5. Exchange Server 2003 Security Overview Secure by design
    • Secure by default
    • Support for Sender, Recipient and Connection filtering, including Block List services
    Microsoft Exchange Server 2003 Security Enhancements http://www.microsoft.com/exchange/evaluation/ security_E2k3.mspx Secure by default
    • User logon on server disabled
    • Messaging limits configuration of 10MB
  • 6. Exchange Server Deployment Scenarios ISA Server integrated General deployment FE/BE deployment Exchange server Internet Front-end Exchange server Back-end Exchange servers ISA server Exchange server
  • 7. Exchange Server Client Scenarios General client access:
    • Microsoft Outlook
    Mobile client access:
    • Outlook Web Access
    • Outlook Mobile Access
    • Exchange Server ActiveSync
    Exchange Server 2003 client scenarios include the following:
  • 8. Configuration and Security Update Recommendations for Exchange Server
    • Microsoft Baseline Security Analyzer
    Security update management
    • Internet Explorer 6 with the latest security updates
    Browser Configuration Component
    • Microsoft Windows Server 2003 with the latest security updates
    • Exchange Server 2003 with Service Pack 1 (or higher)
    • Microsoft Exchange Intelligent Message Filter
    Operating system and software
  • 9. Implementing a Defense-in-Depth Approach to Exchange Server Security
    • Using a layered approach:
    • Increases an attacker’s risk of detection
    • Reduces an attacker’s chance of success
    Security policies, procedures, and education Policies, procedures, and awareness Guards, locks, tracking devices Physical security Application hardening Application OS hardening, authentication, security update management, antivirus updates, auditing Host Network segments, NIDS Internal network Firewalls, boarder routers, VPNs with quarantine procedures Perimeter Strong passwords, ACLs, backup and restore strategy Data
  • 10. Securing Exchange Server Services and Messaging Protocols
    • Implementing Exchange Server
    • Securing Exchange Server Services and Messaging Protocols
      • The challenges of securing Exchange Server 2003.
      • Hardening the messaging environment.
      • Hardening back-end Exchange servers.
      • Hardening front-end Exchange servers.
      • SMTP relaying.
      • Securing SMTP communication between mail servers.
      • Additional best practices for securing Exchange servers.
    • Maintaining Security on Exchange Server
    • Configuring Exchange to Protect Against Unwanted E-Mail
  • 11. Securing Exchange Servers: What Are the Challenges? Challenges to securing an Exchange server include:
    • Maintaining the security of the underlying Windows infrastructure
    • Maintaining baseline security hardening practices
    • Understanding security options for various deployment scenarios
  • 12. Hardening the Messaging Environment To harden your Exchange messaging environment, deploy the following:
    • Exchange Domain Controller Baseline Policy template
    • Exchange Server 2003 Security Hardening Guide at http://www.microsoft.com/technet/prodtechnol/ exchange/2003/library/exsecure.mspx
    Messaging environment Configuration Environment
    • Domain, Domain Controller, and Member Server Baseline Policy templates
    • Windows Server 2003 Security Guide at http://go.microsoft.com/fwlink/?LinkId=21638
    Server environment
  • 13. Hardening Back-End Exchange Servers Tasks for hardening back-end Exchange servers include:
    • Hardening services
    • Hardening file access control lists (ACLs)
    • Changing privilege rights
    • Enabling additional services (optional)
    Apply the Exchange 2003 Backend.inf security template to your back-end servers
  • 14. Hardening Front-End Exchange Servers Tasks for hardening front-end Exchange servers include:
    • Hardening services
    • Hardening file access control lists (ACLs)
    • Enabling additional services (optional)
    • Running URLScan (optional but recommended)
    • Dismounting the mailbox store and deleting the public folder store (optional but recommended)
    Apply the Exchange 2003 Frontend.inf security template to your front-end servers
  • 15. Understanding SMTP Relaying SMTP Relaying : When an SMTP server accepts mail from one DNS domain addressed to mailboxes in another domain, neither one of which the server owns Relaying may be necessary when:
    • Accepting mail for another organization
    • Supporting clients that use POP3 or IMAP4
    • Supporting applications that generate SMTP mail
    Prevent open relays by:
    • Allowing only authenticated computers to relay
    • Restricting relaying to specific computers or users
    • Using an SMTP connector to relay mail to particular domains
  • 16. Securing SMTP Communication Between Mail Servers To secure SMTP communication between servers:
    • Install and configure an X.509 certificate on the SMTP server
    1
    • Enable and configure TLS encryption for inbound mail
    2
    • Enable and configure TLS encryption for outbound mail to specific domains
    3
  • 17. Securing Exchange Servers: Best Practices Limit Exchange Server functionality to clients that are strictly required Remain current with the latest updates for both Exchange Server 2003 and the operating system Use SSL/TLS and forms-based authentication for Outlook Web Access  Use ISA Server 2004 to regulate access for HTTP, RPC over HTTPS, POP3, and IMAP4 traffic   
  • 18. Maintaining Security on Exchange Server
    • Implementing Exchange Server
    • Securing Exchange Server Services and Messaging Protocols
    • Maintaining Security on Exchange Server
      • The challenges of maintaining security on Exchange Server.
      • How to use the Microsoft Baseline Security Analyzer (MBSA) to scan Exchange Server 2003 for security issues.
      • How to validate Exchange configurations using the Microsoft Exchange Server Best Practices Analyzer Tool.
      • Implementing antivirus protection within an Exchange Server 2003 environment.
    • Configuring Exchange to Protect Against Unwanted E-Mail
  • 19. Maintaining Security on Exchange Server: What Are the Challenges? Challenges to maintaining security on an Exchange server include:
    • Keeping up with the latest security updates
    • Keeping up with recommended best practices
    • Understanding the impact of configuring the various options within Exchange Server
    • Maintaining documentation on configuration and security settings
  • 20. Analyzing Exchange Server 2003 Using MBSA MBSA checks for issues related to the following: Known Windows and Internet Explorer security issues Missing security updates Weak account passwords Internet Information Services (IIS) security issues Exchange Server security issues SQL Server security issues      
  • 21. Validating Exchange Server Configuration Settings ExBPA can examine your Exchange servers to: Generate a list of issues, such as misconfigurations or unsupported or non-recommended options Judge the general health of a system Help troubleshoot specific problems   
  • 22. Demonstration: Analyzing Configuration Settings on Exchange Server 2003
    • Analyze Exchange Server using the ExBPA Tool
  • 23. Implementing Antivirus Protection on Exchange Server Consider the following when designing and implementing an antivirus solution:
    • Design a defense-in-depth approach
    • Implement an antivirus scanner that supports AVAPI 2.5
    • Prevent file-based scanning on Exchange Server folders
  • 24. Configuring Exchange to Protect Against Unwanted E-Mail
    • Implementing Exchange Server
    • Securing Exchange Server Services and Messaging Protocols
    • Maintaining Security on Exchange Server
    • Configuring Exchange to Protect Against Unwanted E-Mail
      • The options in Exchange Server for limiting unwanted e-mail.
      • Configuring filtering by recipient address.
      • Configuring filtering by sender address or domain.
      • Implementing real-time block list support using connection filtering.
      • Exchange Server 2003 Intelligent Message Filter.
      • Deploying Intelligent Message Filter.
      • How Intelligent Message Filter works with Exchange Server and Outlook.
      • Managing IMF archived messages using the Archive Manager.
  • 25. What Are the Exchange Options for Limiting Unwanted E-Mail? Options to limit unwanted e-mail include:
    • Recipient filtering
    • Sender filtering
    • Connection filtering
    • Microsoft Exchange Intelligent Message Filter
  • 26. Configuring Filtering by Recipient Address Recipient filtering blocks mail to specified addresses within your domain and filters e-mail addressed to users who are not in your Active Directory
  • 27. Configuring Filtering by Sender Address or Domain Sender filtering blocks mail from specified senders or domains
  • 28. Implementing Real-Time Block List Support Using Connection Filtering Connection filtering is used to configure Exchange Server to contact a Real-Time Block List (RBL) provider
  • 29. Overview of Exchange Intelligent Message Filter Exchange Intelligent Message Filter is an add-on product to help companies reduce the amount of unsolicited commercial e-mail received by users
  • 30. Deploying the Intelligent Message Filter Exchange Gateway Servers Intelligent Message Filter Firewall Internet Exchange Intranet Servers Intelligent Message Filter handles e-mail based upon two thresholds:
    • Gateway blocking configuration
    • Store junk e-mail configuration
  • 31. How the Intelligent Message Filter Works with Exchange and Outlook Exchange Server 2003 Gateway Server Connection filtering Recipient filtering Sender filtering Intelligent Message Filter (Gateway Threshold) Exchange Server 2003 Back-end Store threshold User mailbox Inbox Junk Inbox Y N Y N Internet Safe sender Blocked sender Yes No Spam
  • 32. Managing IMF Archived Messages Using the Archive Manager
    • Archive Manager C# tool released with source on GotDotNet
      • http://workspaces.gotdotnet.com/imfarchive
    • Supports the following features:
      • Tree view of the Archive directory of messages
      • View of RFC2822 decoded headers and raw message
      • Resubmission of message to pickup directory
      • Deletion of messages
      • Forwarding of message as attachment to third-party address
  • 33. Session Summary Deploy Exchange Server 2003 and Microsoft Office Outlook 2003 to take advantage of the latest security enhancements Implement the appropriate base and incremental security templates to fully secure Exchange Server Install Exchange-aware antivirus applications and maintain security using the MBSA and ExBPA tools Protect against unwanted e-mail by implementing a layered approach using features such as filtering and the Intelligent Message Filter utility    
  • 34. Next Steps
    • Find additional security training events:
      • http://www.microsoft.com/seminar/events/security.mspx
    • Sign up for security communications:
      • http://www.microsoft.com/technet/security/signup/ default.mspx
    • Find additional e-learning clinics
      • https://www.microsoftelearning.com/security
    • Get additional security information on Exchange Server 2003:
      • http://www.microsoft.com/technet/prodtechnol/exchange/2003/library/default.mspx
  • 35. Questions and Answers