SlideShare a Scribd company logo
Understanding Security and Exchange Server 2007 Harold Wong [email_address] blogs.technet.com/haroldwong
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object]
Security Threats to E-Mail ,[object Object],[object Object],[object Object],“… antivirus experts at SoftScan said that 89.5 per cent of all viruses scanned were classified as phishing malware”       - Clement James, “Virus Levels Soar in August,” IT News.com.au,      September 5, 2006 “ Spammers now generate an estimated 55 billion messages per day... A year ago that number was 30billion..”   - Robert McMillian, “Spam’s New Image,” CIO.com,    August 15, 2006
Choices for Exchange Message Filtering ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Antivirus Filtering Anti-spam Filtering
Comprehensive Antivirus, Anti-Spam Protection Choice: Hosted e-mail security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Firewall Mailbox Server Hub Transport Server Client Access Server SMTP Internet + On-Premise Software
Features of Exchange Hosted Services Active  Protection ,[object Object],[object Object],[object Object],Enterprise-Class Reliability ,[object Object],[object Object],[object Object],Simplified E-mail Administration ,[object Object],[object Object],[object Object]
Exchange  Hosted Filtering Anti-spam, Antivirus, Content and Policy Enforcement, Disaster Recovery  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Protection with Hosted Services ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Comprehensive Antivirus, Anti-Spam Protection Choice: On-premise protection  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Firewall SMTP Internet + On-Premise Software Mailbox Server Hub Transport Server Client Access Server Edge Transport Server
The Edge Transport Server Role ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Features Unique to Edge Transport  ,[object Object],[object Object],[object Object]
Highly Available Messaging With Exchange Server 2007 ,[object Object],[object Object],[object Object]
Exchange 2007 Antivirus Support Native Scanning Infrastructure ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Example of an Antivirus Stamp: X-MS-Exchange-Organization-AVStamp-Mailbox: VSKing;5;0;info VSKing: AV vendor name  (8 characters) 5: Vendor version  (32-bit unsigned integer) 0 (VIRSCAN_NO_VIRUS): Virus status (32-bit unsigned integer) Info: Optional Virus info (128 byte string)
Forefront Security for Exchange Server  Antivirus Features ,[object Object],[object Object],Multiple scan engines at multiple layers throughout the corporate infrastructure provide maximum protection against e-mail and collaboration threats Advanced Protection Tight integration with Microsoft Exchange, Windows-based SMTP, SharePoint and Live Communications Servers maximizes availability and management control Availability & Control Ensures organizations can eliminate inappropriate language and dangerous attachments from internal and external communications   Secure Content
Anti-spam Feature Comparison by Exchange Release Anti-spam Feature Exchange 2003 RTM Exchange 2003 SP1 Exchange 2003 SP2 Exchange 2007 RTM IP Allow And Deny Lists  Yes  Yes Yes Yes IP DNS Block Lists Yes Yes Yes Yes Recipient Filtering Yes Yes Yes Yes Sender Filtering Yes  Yes Yes Yes Content Filtering (Smartscreen) Yes Yes Yes Content Filter Updates (Smartscreen) Bi-weekly Daily Sender ID Yes Yes IP Safe Lists (aka Bonded Sender) Yes Outlook Postmark Validation Yes Protocol Analysis Data Gathering Yes Protocol Analysis Sender Reputation Yes Open Proxy Validation  Yes Dynamic Spam Data Update Service Yes Per User/OU Spam Settings Yes Admin Quarantine Yes Automatic DNS block lists Yes
How Spam is Filtered Connection filtering Real Time Block Lists  Global accept / deny and exception lists SMTP Filtering Layer Sender and Recipient Filtering Sender ID SMTP Command Tar-pitting   Content Filtering Outlook Safe List Aggregation Anti-Spam/Anti-Phishing SCL  Per-user/OU Spam preferences International Domain Support Outlook Postmark Validation Quarantine and Spam Reporting Incoming  Internet  E-mail  Outlook Mailbox Inbox Junk E-mail 1  Connection Filtering 3 Content Filtering 2 Sender & Recipient Filtering 1 2 3 1 3 2
Robust Anti-Spam Reporting ,[object Object],[object Object],[object Object]
Forefront Security for Exchange Server Updates: Anti-Spam ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Security enhancements with Internet Security and Acceleration Server 2006
Securing Exchange Server 2007 with ISA Server 2006 External Web  Server Intranet Web Server Exchange Active Directory SharePoint Administrator DMZ User Internet ISA 2006 Appliance HEAD QUARTERS Internal  Network Integrated Security Improved idle-based time-outs for session mgmt NEW Smartcards & one-time password support NEW Customized logon forms for most devices & apps NEW LDAP authentication for Active Directory NEW Authentication delegation (NTLM, Kerberos) NEW Efficient Management Web publishing load balancing NEW Exchange & SharePoint publishing tools NEW Enhanced certificate administration NEW Fast, Secure Access Single sign-on for multiple resource access NEW Automatic translation of embedded internal links NEW
Enhancing Exchange Server 2007 Security DMZ Ready ,[object Object],[object Object],Pre-authentication ,[object Object],[object Object],Feature Without ISA With ISA Server ,[object Object],[object Object],[object Object],[object Object],[object Object],Authentication strength ,[object Object],[object Object],[object Object],[object Object],Access to links (from OWA & from Outlook) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Content / traffic inspection Load balancing an array of OWA ,[object Object],[object Object],[object Object],[object Object]
Pre-Authentication Basics ,[object Object],[object Object],[object Object],[object Object],Client Access Server Firewall ISA 2006 Firewall HTTPS Mailbox Server Active Directory
Confidential Messaging Features in Exchange 2007 ,[object Object],[object Object],[object Object],[object Object],[object Object],Clients Internal Network Perimeter  Network Internet Perimeter  Network
Security and Exchange Server 2007 ,[object Object],[object Object],[object Object],[object Object],[object Object]
 
Appendix June 1, 2009
Security Environment ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Enterprise Topology Enterprise Network Other SMTP Servers Routing Hygiene Routing Policy I N T E R N E T Applications OWA Protocols ActiveSync, POP, IMAP, RPC / HTTP … Programmability Web services,  Web parts Mailbox Public Folders Voice Messaging Fax PBX  or  VoIP Edge Transport Hub Transport Client Access Mailbox Unified  Messaging
EdgeSync Overview ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The New Edge Transport Server Role Feature Rich Perimeter E-mail Defense ,[object Object],[object Object],[object Object],[object Object],[object Object]
EdgeSync Published Data ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Subscribing Edge Servers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Forefront Security for Exchange Server 2007 Incremental background scanning ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Antivirus Antivirus stamp ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Managing Exchange Anti-spam ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Configuring SCL thresholds ,[object Object],[object Object]
Spam Quarantine ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Monitoring Antispam Activity ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Connection Filtering ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Internet Sender Authentication ,[object Object],[object Object],[object Object]
Sender Id ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Protocol Filtering ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Intelligent Message Filter v3.0 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Intelligent Message Filter v3.0 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],ISA 2006 Pre-Authentication Mobile  Client Web  Client User Directory ISA 2006  Array Web Server 1 2 3 FBA SecurID Client Certificate Basic NTLM Negotiate Basic NTLM Negotiate SecurID KCD AD (Windows) AD (LDAP) RADIUS Server SecurID Server
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],ISA 2006 Pre-Authentication  (Contd.) Mobile  Client Web  Client User Directory ISA 2006  Array Web Server 1 2 3 FBA SecurID Client Certificate Basic NTLM Negotiate Basic NTLM Negotiate SecurID KCD AD (Windows) AD (LDAP) RADIUS Server SecurID Server

More Related Content

What's hot

20070605 Radware
20070605 Radware20070605 Radware
20070605 Radware
INFOTIME
 
Abaca: The World's Most Effective Spam Filter
Abaca: The World's Most Effective Spam FilterAbaca: The World's Most Effective Spam Filter
Abaca: The World's Most Effective Spam Filter
John Jefferies
 
Www architecture,cgi, client server security, protection
Www architecture,cgi, client server security, protectionWww architecture,cgi, client server security, protection
Www architecture,cgi, client server security, protection
Austina Francis
 
WT - Firewall & Proxy Server
WT - Firewall & Proxy ServerWT - Firewall & Proxy Server
WT - Firewall & Proxy Server
vinay arora
 
Aureon Managed Firewall
Aureon Managed FirewallAureon Managed Firewall
Aureon Managed Firewall
Mike Wallen
 

What's hot (20)

20070605 Radware
20070605 Radware20070605 Radware
20070605 Radware
 
Abaca: The World's Most Effective Spam Filter
Abaca: The World's Most Effective Spam FilterAbaca: The World's Most Effective Spam Filter
Abaca: The World's Most Effective Spam Filter
 
Radware DefensePipe: Cloud-Based Attack Mitigation Solution
Radware DefensePipe:  Cloud-Based Attack Mitigation SolutionRadware DefensePipe:  Cloud-Based Attack Mitigation Solution
Radware DefensePipe: Cloud-Based Attack Mitigation Solution
 
UserGate Proxy & Firewall
UserGate Proxy & FirewallUserGate Proxy & Firewall
UserGate Proxy & Firewall
 
Www architecture,cgi, client server security, protection
Www architecture,cgi, client server security, protectionWww architecture,cgi, client server security, protection
Www architecture,cgi, client server security, protection
 
Security Implications of the Cloud
Security Implications of the CloudSecurity Implications of the Cloud
Security Implications of the Cloud
 
Radware - WAF (Web Application Firewall)
Radware - WAF (Web Application Firewall)Radware - WAF (Web Application Firewall)
Radware - WAF (Web Application Firewall)
 
Presentatie McAfee: Optimale Endpoint Protection 26062015
Presentatie McAfee: Optimale Endpoint Protection 26062015Presentatie McAfee: Optimale Endpoint Protection 26062015
Presentatie McAfee: Optimale Endpoint Protection 26062015
 
Proxy Servers & Firewalls
Proxy Servers & FirewallsProxy Servers & Firewalls
Proxy Servers & Firewalls
 
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
 
WT - Firewall & Proxy Server
WT - Firewall & Proxy ServerWT - Firewall & Proxy Server
WT - Firewall & Proxy Server
 
Discover Synchronized Security - Sophos Day Netherlands
Discover Synchronized Security - Sophos Day Netherlands Discover Synchronized Security - Sophos Day Netherlands
Discover Synchronized Security - Sophos Day Netherlands
 
Security Implications of the Cloud
Security Implications of the CloudSecurity Implications of the Cloud
Security Implications of the Cloud
 
Measure Network Performance, Security and Stability
Measure Network Performance, Security and StabilityMeasure Network Performance, Security and Stability
Measure Network Performance, Security and Stability
 
Advanced Threat Defense Intel Security
Advanced Threat Defense  Intel SecurityAdvanced Threat Defense  Intel Security
Advanced Threat Defense Intel Security
 
ieeehs042204d
ieeehs042204dieeehs042204d
ieeehs042204d
 
Web Services Security Tutorial
Web Services Security TutorialWeb Services Security Tutorial
Web Services Security Tutorial
 
PASTA: Risk-centric Threat Modeling
PASTA: Risk-centric Threat ModelingPASTA: Risk-centric Threat Modeling
PASTA: Risk-centric Threat Modeling
 
Aureon Managed Firewall
Aureon Managed FirewallAureon Managed Firewall
Aureon Managed Firewall
 
Novinky F5
Novinky F5Novinky F5
Novinky F5
 

Similar to Exchange Conference (Philadelphia) - Exchange 2007 Security

Windows Server 2008 Security Enhancements
Windows Server 2008 Security EnhancementsWindows Server 2008 Security Enhancements
Windows Server 2008 Security Enhancements
Presentologics
 
Borderware Security Platform
Borderware Security PlatformBorderware Security Platform
Borderware Security Platform
costigaj
 
Astaro Customer Presentation
Astaro Customer PresentationAstaro Customer Presentation
Astaro Customer Presentation
techworldvn
 

Similar to Exchange Conference (Philadelphia) - Exchange 2007 Security (20)

Ironport Data Loss Prevention
Ironport Data Loss PreventionIronport Data Loss Prevention
Ironport Data Loss Prevention
 
Email Security Appliance from IBM
Email Security Appliance from IBMEmail Security Appliance from IBM
Email Security Appliance from IBM
 
Exchange 2007 Overview Son Vu
Exchange 2007 Overview Son VuExchange 2007 Overview Son Vu
Exchange 2007 Overview Son Vu
 
Windows Server 2008 Security Enhancements
Windows Server 2008 Security EnhancementsWindows Server 2008 Security Enhancements
Windows Server 2008 Security Enhancements
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...
 
Microsoft Office 365 Advanced Threat Protection
Microsoft Office 365 Advanced Threat ProtectionMicrosoft Office 365 Advanced Threat Protection
Microsoft Office 365 Advanced Threat Protection
 
Overview of Microsoft Exchange Online
Overview of Microsoft Exchange OnlineOverview of Microsoft Exchange Online
Overview of Microsoft Exchange Online
 
Borderware Security Platform
Borderware Security PlatformBorderware Security Platform
Borderware Security Platform
 
SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...
SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...
SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...
 
Email Security Overview
Email Security OverviewEmail Security Overview
Email Security Overview
 
Presentation1.ppt
Presentation1.pptPresentation1.ppt
Presentation1.ppt
 
24 Hours Of Exchange Server 2007 ( Part 13 Of 24)
24  Hours Of  Exchange  Server 2007 ( Part 13 Of 24)24  Hours Of  Exchange  Server 2007 ( Part 13 Of 24)
24 Hours Of Exchange Server 2007 ( Part 13 Of 24)
 
Primend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisusPrimend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisus
 
TechNet Webcast: Exchange 2010 Overview
TechNet Webcast: Exchange 2010 OverviewTechNet Webcast: Exchange 2010 Overview
TechNet Webcast: Exchange 2010 Overview
 
Astaro Customer Presentation
Astaro Customer PresentationAstaro Customer Presentation
Astaro Customer Presentation
 
KVH MailScan MX
KVH MailScan MXKVH MailScan MX
KVH MailScan MX
 
Evaluating Network and Security Devices
Evaluating Network and Security DevicesEvaluating Network and Security Devices
Evaluating Network and Security Devices
 
Endpoint Protection as a Service (EPaaS)
Endpoint Protection as a Service (EPaaS)Endpoint Protection as a Service (EPaaS)
Endpoint Protection as a Service (EPaaS)
 
Forefront Protection for Office Overview
Forefront Protection for Office OverviewForefront Protection for Office Overview
Forefront Protection for Office Overview
 
Webinar: New Face of Managed File Transfer
Webinar: New Face of Managed File TransferWebinar: New Face of Managed File Transfer
Webinar: New Face of Managed File Transfer
 

More from Harold Wong

It camp veeam presentation (no videos)
It camp veeam presentation (no videos)It camp veeam presentation (no videos)
It camp veeam presentation (no videos)
Harold Wong
 

More from Harold Wong (20)

System Center 2012 SP1 Overview and Window Azure IaaS
System Center 2012 SP1 Overview and Window Azure IaaSSystem Center 2012 SP1 Overview and Window Azure IaaS
System Center 2012 SP1 Overview and Window Azure IaaS
 
Upgrading from Windows Server 2008 / 2008 R2 to Windows Server 2012
Upgrading from Windows Server 2008 / 2008 R2 to Windows Server 2012Upgrading from Windows Server 2008 / 2008 R2 to Windows Server 2012
Upgrading from Windows Server 2008 / 2008 R2 to Windows Server 2012
 
Windows 8 Deployment
Windows 8 DeploymentWindows 8 Deployment
Windows 8 Deployment
 
FY13 Q2 IT Camp - Windows 8 Overview
FY13 Q2 IT Camp - Windows 8 OverviewFY13 Q2 IT Camp - Windows 8 Overview
FY13 Q2 IT Camp - Windows 8 Overview
 
TechMentor 2012: Deploying Windows Server 2012 Server Core
TechMentor 2012: Deploying Windows Server 2012 Server CoreTechMentor 2012: Deploying Windows Server 2012 Server Core
TechMentor 2012: Deploying Windows Server 2012 Server Core
 
TechMentor 2012: What's new in Windows Server 2012 and Hyper-V
TechMentor 2012: What's new in Windows Server 2012 and Hyper-VTechMentor 2012: What's new in Windows Server 2012 and Hyper-V
TechMentor 2012: What's new in Windows Server 2012 and Hyper-V
 
IT Camp - Vision Solutions Presentation
IT Camp - Vision Solutions PresentationIT Camp - Vision Solutions Presentation
IT Camp - Vision Solutions Presentation
 
Windows Server 2012 Beta Storage Overview
Windows Server 2012 Beta Storage OverviewWindows Server 2012 Beta Storage Overview
Windows Server 2012 Beta Storage Overview
 
IT Camp Windows Server 2012 Beta Hyper-V Overview
IT Camp Windows Server 2012 Beta Hyper-V OverviewIT Camp Windows Server 2012 Beta Hyper-V Overview
IT Camp Windows Server 2012 Beta Hyper-V Overview
 
FI-B328 How to Build a Microsoft Private Cloud Lab in 1,000 Tiny Steps
FI-B328 How to Build a Microsoft Private Cloud Lab in 1,000 Tiny StepsFI-B328 How to Build a Microsoft Private Cloud Lab in 1,000 Tiny Steps
FI-B328 How to Build a Microsoft Private Cloud Lab in 1,000 Tiny Steps
 
It camp veeam presentation (no videos)
It camp veeam presentation (no videos)It camp veeam presentation (no videos)
It camp veeam presentation (no videos)
 
Cloud Intelligence - Get Your Head Out of the Clouds
Cloud Intelligence - Get Your Head Out of the CloudsCloud Intelligence - Get Your Head Out of the Clouds
Cloud Intelligence - Get Your Head Out of the Clouds
 
Cloud Intelligence - Build a Private Cloud in a 1,000 Easy Steps
Cloud Intelligence - Build a Private Cloud in a 1,000 Easy StepsCloud Intelligence - Build a Private Cloud in a 1,000 Easy Steps
Cloud Intelligence - Build a Private Cloud in a 1,000 Easy Steps
 
IT Camp Opening - Los Angeles
IT Camp Opening - Los AngelesIT Camp Opening - Los Angeles
IT Camp Opening - Los Angeles
 
IT Camp Opening - Phoenix / Tempe
IT Camp Opening - Phoenix / TempeIT Camp Opening - Phoenix / Tempe
IT Camp Opening - Phoenix / Tempe
 
IT Camp - Server Migration Overview
IT Camp - Server Migration OverviewIT Camp - Server Migration Overview
IT Camp - Server Migration Overview
 
Private cloud forefront identity manager 2010 (adam bresson)
Private cloud   forefront identity manager 2010 (adam bresson)Private cloud   forefront identity manager 2010 (adam bresson)
Private cloud forefront identity manager 2010 (adam bresson)
 
Private cloud 201 how to build a private cloud
Private cloud 201 how to build a private cloud Private cloud 201 how to build a private cloud
Private cloud 201 how to build a private cloud
 
Get ready for tomorrow, today!
Get ready for tomorrow, today!Get ready for tomorrow, today!
Get ready for tomorrow, today!
 
Lync 2010 Conferencing Deep Dive
Lync 2010 Conferencing Deep DiveLync 2010 Conferencing Deep Dive
Lync 2010 Conferencing Deep Dive
 

Recently uploaded

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 

Exchange Conference (Philadelphia) - Exchange 2007 Security

  • 1. Understanding Security and Exchange Server 2007 Harold Wong [email_address] blogs.technet.com/haroldwong
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15. Anti-spam Feature Comparison by Exchange Release Anti-spam Feature Exchange 2003 RTM Exchange 2003 SP1 Exchange 2003 SP2 Exchange 2007 RTM IP Allow And Deny Lists Yes Yes Yes Yes IP DNS Block Lists Yes Yes Yes Yes Recipient Filtering Yes Yes Yes Yes Sender Filtering Yes Yes Yes Yes Content Filtering (Smartscreen) Yes Yes Yes Content Filter Updates (Smartscreen) Bi-weekly Daily Sender ID Yes Yes IP Safe Lists (aka Bonded Sender) Yes Outlook Postmark Validation Yes Protocol Analysis Data Gathering Yes Protocol Analysis Sender Reputation Yes Open Proxy Validation Yes Dynamic Spam Data Update Service Yes Per User/OU Spam Settings Yes Admin Quarantine Yes Automatic DNS block lists Yes
  • 16. How Spam is Filtered Connection filtering Real Time Block Lists Global accept / deny and exception lists SMTP Filtering Layer Sender and Recipient Filtering Sender ID SMTP Command Tar-pitting Content Filtering Outlook Safe List Aggregation Anti-Spam/Anti-Phishing SCL Per-user/OU Spam preferences International Domain Support Outlook Postmark Validation Quarantine and Spam Reporting Incoming Internet E-mail Outlook Mailbox Inbox Junk E-mail 1 Connection Filtering 3 Content Filtering 2 Sender & Recipient Filtering 1 2 3 1 3 2
  • 17.
  • 18.
  • 19. Security enhancements with Internet Security and Acceleration Server 2006
  • 20. Securing Exchange Server 2007 with ISA Server 2006 External Web Server Intranet Web Server Exchange Active Directory SharePoint Administrator DMZ User Internet ISA 2006 Appliance HEAD QUARTERS Internal Network Integrated Security Improved idle-based time-outs for session mgmt NEW Smartcards & one-time password support NEW Customized logon forms for most devices & apps NEW LDAP authentication for Active Directory NEW Authentication delegation (NTLM, Kerberos) NEW Efficient Management Web publishing load balancing NEW Exchange & SharePoint publishing tools NEW Enhanced certificate administration NEW Fast, Secure Access Single sign-on for multiple resource access NEW Automatic translation of embedded internal links NEW
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.  
  • 27.
  • 28. Enterprise Topology Enterprise Network Other SMTP Servers Routing Hygiene Routing Policy I N T E R N E T Applications OWA Protocols ActiveSync, POP, IMAP, RPC / HTTP … Programmability Web services, Web parts Mailbox Public Folders Voice Messaging Fax PBX or VoIP Edge Transport Hub Transport Client Access Mailbox Unified Messaging
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.

Editor's Notes

  1. 06/01/09 08:41 © 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.