SlideShare une entreprise Scribd logo
1  sur  47
Module 6 Implementing Messaging Security
Module Overview ,[object Object],[object Object],[object Object],[object Object]
Lesson 1: Deploying Edge Transport Servers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What Is the Edge Transport Server Role? The Edge Transport server role : The Edge Transport server role provides : ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Edge Transport Server Role Infrastructure Requirements The Edge Transport server : ,[object Object],[object Object],[object Object]
What Is AD LDS? AD LDS on an Edge Transport server stores : ,[object Object],[object Object],[object Object],AD LDS is an LDAP directory service that stores information for directory-enabled applications You can use the Exchange Server 2010 tools to perform most of the AD LDS configuration tasks
Demonstration: How to Configure Edge Transport Servers ,[object Object],[object Object]
What Is Edge Synchronization? Reasons for implementing Edge Synchronization include: ,[object Object],[object Object],Edge Synchronization replicates Active Directory information to AD LDS on Edge Transport servers Edge Synchronization: ,[object Object],[object Object]
How Internet Message Flow Works Hub Transport / Client Access / Mailbox Server Edge Transport Server 1 6 5 4 3 2
Demonstration: How to Configure Edge Synchronization ,[object Object],[object Object],[object Object],[object Object]
Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
What Is Cloned Configuration? To implement cloned configuration, use the: ,[object Object],[object Object],[object Object],Cloned configuration is a process of configuring multiple Edge Transport servers with identical configurations
Discussion: Securing Edge Transport Servers ,[object Object],[object Object],[object Object]
Lesson 2: Deploying an Antivirus Solution ,[object Object],[object Object],[object Object],[object Object],[object Object]
Antivirus Solution Features in Exchange Server 2010 Exchange Server 2010 supports : ,[object Object],[object Object],[object Object],[object Object]
What Is Forefront Protection 2010 for Exchange Server? Benefits of Forefront Protection 2010 for Exchange Server include: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Forefront Protection 2010 Deployment Options You can install Forefront Protection 2010 : ,[object Object],[object Object],When installing Forefront Protection 2010, consider : ,[object Object],[object Object]
Best Practices for Deploying an Antivirus Solution When you implement an antivirus solution, you should:  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Demonstration: How to Install and Configure Forefront Protection 2010 for Exchange Server ,[object Object],[object Object],[object Object],[object Object]
Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
Lab A: Configuring Edge Transport Servers and Forefront Protection 2010  ,[object Object],[object Object],Logon information Estimated time: 45   minutes Virtual machines 10135-VAN-DC1, 10135-VAN-EX1, 10135-VAN-SVR1  User name Administrator   Password Pa$$w0rd
Lab Scenario ,[object Object],[object Object]
Lab Review ,[object Object],[object Object]
Lesson 3: Deploying an Anti-Spam Solution ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Overview of Spam-Filtering Features Feature Filters messages based on: Connection Filtering The IP address of the sending SMTP server  Content Filtering The message contents Sender ID The IP address of the sending server from which the message was received Sender Filtering The Sender in the MAIL FROM: SMTP header  Recipient Filtering The Recipients in the RCPT TO: SMTP header  Sender Reputation Several characteristics of the sender, accumulated over a period of time  Attachment Filtering Attachment file name, file name extension, or file MIME content type
How Exchange Server 2010 Applies Spam Filters Exchange Server 2010  Edge Transport server Internet Sender Filtering  Below SCL Threshold  Outlook Safe Senders List  Exceed SCL Threshold Recipient Filtering  Connection Filtering  RBL IP Allow List  IP Block List  Content Filtering  Sender ID Filtering
What Is Sender ID Filtering? Internet SMTP Server DNS Server Edge Transport Server Hub Transport Server You can configure it to: ,[object Object],[object Object],[object Object],1 3 4 2 Sender ID filtering is a concept in virus protection that was introduced in Exchange Server 2007
What Is Sender Reputation Filtering? The Protocol Analysis agent assigns an SRL that is based on: ,[object Object],[object Object],[object Object],[object Object],Sender Reputation filtering filters messages based on information about recent e-mail messages received from specific senders
What Is Content Filtering? You can configure content filtering to: ,[object Object],[object Object],[object Object],Content Filtering analyzes the content of each e-mail message and assigns an SCL   to the message Quarantined messages are sent to a quarantine mailbox
Demonstration: How to Configure Anti-Spam Options ,[object Object],[object Object],[object Object],[object Object],[object Object]
Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
Lesson 4: Configuring Secure SMTP Messaging ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Discussion: SMTP Security Issues ,[object Object],[object Object]
SMTP E-Mail Security Options SMTP e-mail can be additionally   secured by using authentication and authorization on the SMTP connector Protocol   Layer   Purpose   IPSec   Network-based   Encrypts server-to-server or client-to-server traffic  VPN   Network-based   Encrypts site-to-site traffic  TLS   Session-based  Encrypts server-to-server traffic  S/MIME   Client-based  Encrypts client side e-mail and enables digital signing
Demonstration: How to Configure SMTP Security ,[object Object],[object Object],[object Object]
Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
What Is Domain Security? To set up mutual TLS : ,[object Object],[object Object],[object Object],[object Object],Uses mutual TLS with business partners to  enable secured message paths over the Internet
How Domain Security Works 2 1 Mail Client Mail Client
Process for Configuring Domain Security To configure Domain Security: Generate a certificate request for TLS certificates  Import certificate to Edge Transport servers Configure outbound Domain Security Configure inbound Domain Security Notify partner to configure Domain Security  Test mail flow 1 2 3 4 5 6
Demonstration: How to Configure Domain Security ,[object Object],[object Object],[object Object]
Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
How S/MIME Works S/MIME   Infrastructure requirements:  ,[object Object],[object Object],[object Object],Method Type of Security Provided Digital signatures ,[object Object],[object Object],[object Object],Message encryption ,[object Object]
Lab B: Implementing Anti-Spam Solutions ,[object Object],Estimated time: 65   minutes Logon information Virtual machines 10135-VAN-DC1, 10135-VAN-EX1, 10135-VAN-SVR1  User name Administrator   Password Pa$$w0rd
Lab Scenario ,[object Object]
Lab Review ,[object Object],[object Object],[object Object]
Module Review and Takeaways ,[object Object],[object Object]

Contenu connexe

Tendances

10135 a 11
10135 a 1110135 a 11
10135 a 11Bố Su
 
10135 a 10
10135 a 1010135 a 10
10135 a 10Bố Su
 
Sending mail,web services
Sending mail,web servicesSending mail,web services
Sending mail,web servicesDevang Patel
 
vishal_sharma: python email sending software
vishal_sharma: python email sending software  vishal_sharma: python email sending software
vishal_sharma: python email sending software vishal sharma
 
Exchange 2013 Architecture Poster
Exchange 2013 Architecture PosterExchange 2013 Architecture Poster
Exchange 2013 Architecture PosterRian Yulian
 
Email - Electronic Mail
Email - Electronic MailEmail - Electronic Mail
Email - Electronic MailPeter R. Egli
 
Brokered Messaging in Windows Azure
Brokered Messaging in Windows AzureBrokered Messaging in Windows Azure
Brokered Messaging in Windows AzureNeil Mackenzie
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer ProtocolRajan Pandey
 
Lecture 9 electronic_mail_representation_and_transfer
Lecture 9 electronic_mail_representation_and_transferLecture 9 electronic_mail_representation_and_transfer
Lecture 9 electronic_mail_representation_and_transferSerious_SamSoul
 
Httpbasics 1207412539273264-9-converted
Httpbasics 1207412539273264-9-convertedHttpbasics 1207412539273264-9-converted
Httpbasics 1207412539273264-9-convertedcomputerorganization
 
HyperText Transfer Protocol
HyperText Transfer ProtocolHyperText Transfer Protocol
HyperText Transfer Protocolponduse
 
Jsr120 sup
Jsr120 supJsr120 sup
Jsr120 supSMIJava
 

Tendances (18)

10135 a 11
10135 a 1110135 a 11
10135 a 11
 
10135 a 10
10135 a 1010135 a 10
10135 a 10
 
Sending mail,web services
Sending mail,web servicesSending mail,web services
Sending mail,web services
 
vishal_sharma: python email sending software
vishal_sharma: python email sending software  vishal_sharma: python email sending software
vishal_sharma: python email sending software
 
Smtp protocol
Smtp protocolSmtp protocol
Smtp protocol
 
Exchange 2013 Architecture Poster
Exchange 2013 Architecture PosterExchange 2013 Architecture Poster
Exchange 2013 Architecture Poster
 
Email - Electronic Mail
Email - Electronic MailEmail - Electronic Mail
Email - Electronic Mail
 
E mail flow
E mail flowE mail flow
E mail flow
 
How Email Works
How Email WorksHow Email Works
How Email Works
 
Brokered Messaging in Windows Azure
Brokered Messaging in Windows AzureBrokered Messaging in Windows Azure
Brokered Messaging in Windows Azure
 
how email works
how email workshow email works
how email works
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer Protocol
 
Electronic Mail
Electronic MailElectronic Mail
Electronic Mail
 
Lecture 9 electronic_mail_representation_and_transfer
Lecture 9 electronic_mail_representation_and_transferLecture 9 electronic_mail_representation_and_transfer
Lecture 9 electronic_mail_representation_and_transfer
 
Httpbasics 1207412539273264-9-converted
Httpbasics 1207412539273264-9-convertedHttpbasics 1207412539273264-9-converted
Httpbasics 1207412539273264-9-converted
 
Introduction to SOAP
Introduction to SOAPIntroduction to SOAP
Introduction to SOAP
 
HyperText Transfer Protocol
HyperText Transfer ProtocolHyperText Transfer Protocol
HyperText Transfer Protocol
 
Jsr120 sup
Jsr120 supJsr120 sup
Jsr120 sup
 

Similaire à 10135 a 06

24 Hours Of Exchange Server 2007 ( Part 13 Of 24)
24  Hours Of  Exchange  Server 2007 ( Part 13 Of 24)24  Hours Of  Exchange  Server 2007 ( Part 13 Of 24)
24 Hours Of Exchange Server 2007 ( Part 13 Of 24)Harold Wong
 
24 Hours Of Exchange Server 2007 ( Part 14 Of 24)
24  Hours Of  Exchange  Server 2007 ( Part 14 Of 24)24  Hours Of  Exchange  Server 2007 ( Part 14 Of 24)
24 Hours Of Exchange Server 2007 ( Part 14 Of 24)Harold Wong
 
10135 a 04
10135 a 0410135 a 04
10135 a 04Bố Su
 
10135 a 05
10135 a 0510135 a 05
10135 a 05Bố Su
 
Optimer Sikkerheden Exchange Server 2003
Optimer Sikkerheden Exchange Server 2003Optimer Sikkerheden Exchange Server 2003
Optimer Sikkerheden Exchange Server 2003Armando Leon
 
24 Hours Of Exchange Server 2007 ( Part 15 Of 24)
24  Hours Of  Exchange  Server 2007 ( Part 15 Of 24)24  Hours Of  Exchange  Server 2007 ( Part 15 Of 24)
24 Hours Of Exchange Server 2007 ( Part 15 Of 24)Harold Wong
 
Session 1: The SOAP Story
Session 1: The SOAP StorySession 1: The SOAP Story
Session 1: The SOAP Storyukdpe
 
Centaf Sms Day 1
Centaf Sms Day 1Centaf Sms Day 1
Centaf Sms Day 1ejcometh
 
Java Networking
Java NetworkingJava Networking
Java NetworkingSunil OS
 
Securing Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid CloudsSecuring Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid CloudsRightScale
 
On Premises Protection Technologies
On Premises Protection TechnologiesOn Premises Protection Technologies
On Premises Protection TechnologiesCurtis Parker
 
A Deep Dive in the World of IT Networking (Part 2)
A Deep Dive in the World of IT Networking (Part 2)A Deep Dive in the World of IT Networking (Part 2)
A Deep Dive in the World of IT Networking (Part 2)Tuan Yang
 
WCF tutorial
WCF tutorialWCF tutorial
WCF tutorialAbhi Arya
 
Top 15 Exchange Questions that Senior Admin ask - Jaap Wesselius
Top 15 Exchange Questions that Senior Admin ask - Jaap WesseliusTop 15 Exchange Questions that Senior Admin ask - Jaap Wesselius
Top 15 Exchange Questions that Senior Admin ask - Jaap WesseliusKemp
 
Updating current Network Design It18 roshan basnet
Updating current Network Design It18 roshan basnetUpdating current Network Design It18 roshan basnet
Updating current Network Design It18 roshan basnetrosu555
 
WINDOWS COMMUNICATION FOUNDATION
WINDOWS COMMUNICATION FOUNDATIONWINDOWS COMMUNICATION FOUNDATION
WINDOWS COMMUNICATION FOUNDATIONDeepika Chaudhary
 
Exchange 2007 Overview Son Vu
Exchange 2007 Overview Son VuExchange 2007 Overview Son Vu
Exchange 2007 Overview Son Vuvncson
 
Take a Leap into the Connected Cloud; 3 Trending Hybrid Cloud Scenarios
Take a Leap into the Connected Cloud; 3 Trending Hybrid Cloud ScenariosTake a Leap into the Connected Cloud; 3 Trending Hybrid Cloud Scenarios
Take a Leap into the Connected Cloud; 3 Trending Hybrid Cloud ScenariosGina Montgomery, V-TSP
 

Similaire à 10135 a 06 (20)

24 Hours Of Exchange Server 2007 ( Part 13 Of 24)
24  Hours Of  Exchange  Server 2007 ( Part 13 Of 24)24  Hours Of  Exchange  Server 2007 ( Part 13 Of 24)
24 Hours Of Exchange Server 2007 ( Part 13 Of 24)
 
24 Hours Of Exchange Server 2007 ( Part 14 Of 24)
24  Hours Of  Exchange  Server 2007 ( Part 14 Of 24)24  Hours Of  Exchange  Server 2007 ( Part 14 Of 24)
24 Hours Of Exchange Server 2007 ( Part 14 Of 24)
 
10135 a 04
10135 a 0410135 a 04
10135 a 04
 
10135 a 05
10135 a 0510135 a 05
10135 a 05
 
Optimer Sikkerheden Exchange Server 2003
Optimer Sikkerheden Exchange Server 2003Optimer Sikkerheden Exchange Server 2003
Optimer Sikkerheden Exchange Server 2003
 
24 Hours Of Exchange Server 2007 ( Part 15 Of 24)
24  Hours Of  Exchange  Server 2007 ( Part 15 Of 24)24  Hours Of  Exchange  Server 2007 ( Part 15 Of 24)
24 Hours Of Exchange Server 2007 ( Part 15 Of 24)
 
Session 1: The SOAP Story
Session 1: The SOAP StorySession 1: The SOAP Story
Session 1: The SOAP Story
 
3. email relay fpe
3. email relay   fpe3. email relay   fpe
3. email relay fpe
 
Centaf Sms Day 1
Centaf Sms Day 1Centaf Sms Day 1
Centaf Sms Day 1
 
07 advanced topics
07 advanced topics07 advanced topics
07 advanced topics
 
Java Networking
Java NetworkingJava Networking
Java Networking
 
Securing Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid CloudsSecuring Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid Clouds
 
On Premises Protection Technologies
On Premises Protection TechnologiesOn Premises Protection Technologies
On Premises Protection Technologies
 
A Deep Dive in the World of IT Networking (Part 2)
A Deep Dive in the World of IT Networking (Part 2)A Deep Dive in the World of IT Networking (Part 2)
A Deep Dive in the World of IT Networking (Part 2)
 
WCF tutorial
WCF tutorialWCF tutorial
WCF tutorial
 
Top 15 Exchange Questions that Senior Admin ask - Jaap Wesselius
Top 15 Exchange Questions that Senior Admin ask - Jaap WesseliusTop 15 Exchange Questions that Senior Admin ask - Jaap Wesselius
Top 15 Exchange Questions that Senior Admin ask - Jaap Wesselius
 
Updating current Network Design It18 roshan basnet
Updating current Network Design It18 roshan basnetUpdating current Network Design It18 roshan basnet
Updating current Network Design It18 roshan basnet
 
WINDOWS COMMUNICATION FOUNDATION
WINDOWS COMMUNICATION FOUNDATIONWINDOWS COMMUNICATION FOUNDATION
WINDOWS COMMUNICATION FOUNDATION
 
Exchange 2007 Overview Son Vu
Exchange 2007 Overview Son VuExchange 2007 Overview Son Vu
Exchange 2007 Overview Son Vu
 
Take a Leap into the Connected Cloud; 3 Trending Hybrid Cloud Scenarios
Take a Leap into the Connected Cloud; 3 Trending Hybrid Cloud ScenariosTake a Leap into the Connected Cloud; 3 Trending Hybrid Cloud Scenarios
Take a Leap into the Connected Cloud; 3 Trending Hybrid Cloud Scenarios
 

Plus de Bố Su

10135 a 09
10135 a 0910135 a 09
10135 a 09Bố Su
 
10135 a 08
10135 a 0810135 a 08
10135 a 08Bố Su
 
10135 a 07
10135 a 0710135 a 07
10135 a 07Bố Su
 
10135 a 03
10135 a 0310135 a 03
10135 a 03Bố Su
 
10135 a 02
10135 a 0210135 a 02
10135 a 02Bố Su
 
10135 a 01
10135 a 0110135 a 01
10135 a 01Bố Su
 
10135 a 00
10135 a 0010135 a 00
10135 a 00Bố Su
 
10135 a 12
10135 a 1210135 a 12
10135 a 12Bố Su
 
50357 a enu-module05
50357 a enu-module0550357 a enu-module05
50357 a enu-module05Bố Su
 
50357 a enu-module03
50357 a enu-module0350357 a enu-module03
50357 a enu-module03Bố Su
 
50357 a enu-module02
50357 a enu-module0250357 a enu-module02
50357 a enu-module02Bố Su
 
50357 a enu-module01
50357 a enu-module0150357 a enu-module01
50357 a enu-module01Bố Su
 
50357 a enu-module00
50357 a enu-module0050357 a enu-module00
50357 a enu-module00Bố Su
 
50357 a enu-module04
50357 a enu-module0450357 a enu-module04
50357 a enu-module04Bố Su
 

Plus de Bố Su (14)

10135 a 09
10135 a 0910135 a 09
10135 a 09
 
10135 a 08
10135 a 0810135 a 08
10135 a 08
 
10135 a 07
10135 a 0710135 a 07
10135 a 07
 
10135 a 03
10135 a 0310135 a 03
10135 a 03
 
10135 a 02
10135 a 0210135 a 02
10135 a 02
 
10135 a 01
10135 a 0110135 a 01
10135 a 01
 
10135 a 00
10135 a 0010135 a 00
10135 a 00
 
10135 a 12
10135 a 1210135 a 12
10135 a 12
 
50357 a enu-module05
50357 a enu-module0550357 a enu-module05
50357 a enu-module05
 
50357 a enu-module03
50357 a enu-module0350357 a enu-module03
50357 a enu-module03
 
50357 a enu-module02
50357 a enu-module0250357 a enu-module02
50357 a enu-module02
 
50357 a enu-module01
50357 a enu-module0150357 a enu-module01
50357 a enu-module01
 
50357 a enu-module00
50357 a enu-module0050357 a enu-module00
50357 a enu-module00
 
50357 a enu-module04
50357 a enu-module0450357 a enu-module04
50357 a enu-module04
 

Dernier

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 

Dernier (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

10135 a 06

  • 1. Module 6 Implementing Messaging Security
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9. How Internet Message Flow Works Hub Transport / Client Access / Mailbox Server Edge Transport Server 1 6 5 4 3 2
  • 10.
  • 11. Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20. Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
  • 21. Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26. Overview of Spam-Filtering Features Feature Filters messages based on: Connection Filtering The IP address of the sending SMTP server Content Filtering The message contents Sender ID The IP address of the sending server from which the message was received Sender Filtering The Sender in the MAIL FROM: SMTP header Recipient Filtering The Recipients in the RCPT TO: SMTP header Sender Reputation Several characteristics of the sender, accumulated over a period of time Attachment Filtering Attachment file name, file name extension, or file MIME content type
  • 27. How Exchange Server 2010 Applies Spam Filters Exchange Server 2010 Edge Transport server Internet Sender Filtering Below SCL Threshold Outlook Safe Senders List Exceed SCL Threshold Recipient Filtering Connection Filtering RBL IP Allow List IP Block List Content Filtering Sender ID Filtering
  • 28.
  • 29.
  • 30.
  • 31.
  • 32. Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
  • 33.
  • 34.
  • 35. SMTP E-Mail Security Options SMTP e-mail can be additionally secured by using authentication and authorization on the SMTP connector Protocol Layer Purpose IPSec Network-based Encrypts server-to-server or client-to-server traffic VPN Network-based Encrypts site-to-site traffic TLS Session-based Encrypts server-to-server traffic S/MIME Client-based Encrypts client side e-mail and enables digital signing
  • 36.
  • 37. Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
  • 38.
  • 39. How Domain Security Works 2 1 Mail Client Mail Client
  • 40. Process for Configuring Domain Security To configure Domain Security: Generate a certificate request for TLS certificates Import certificate to Edge Transport servers Configure outbound Domain Security Configure inbound Domain Security Notify partner to configure Domain Security Test mail flow 1 2 3 4 5 6
  • 41.
  • 42. Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.

Notes de l'éditeur

  1. Module 6: Implementing Messaging Security Course 10135A Presentation: 70 minutes Lab: 110 minutes After completing this module, students will be able to: Deploy Edge Transport servers. Configure an antivirus solution. Configure an anti-spam solution. Implement secure SMTP messaging. Required materials To teach this module, you need the Microsoft® Office PowerPoint® file 10135A_06.ppt. Important: We recommend that you use PowerPoint 2002 or a later version to display the slides for this course. If you use PowerPoint Viewer or an earlier version, all the features of the slides might not display correctly. Preparation tasks To prepare for this module: Read all of the materials for this module. Practice performing the demonstrations and the lab exercises. Work through the Module Review and Takeaways section, and determine how you will use this section to reinforce student learning and promote knowledge transfer to on-the-job performance. Note about the demonstrations : To prepare for the demonstrations, start the 10135A-VAN-DC1 virtual machine and log on to the server before starting the other virtual machines. To save time during the demonstrations, log on to the Exchange servers and open the Exchange Server management tools before starting the demonstrations. Additionally, connect to the Microsoft Outlook® Web App site on the Exchange servers, and then log on as Administrator. It can take more than a minute to open the management tools and Outlook Web App for the first time. Make sure that students are aware that the Course Companion CD has additional information and resources for the module.
  2. Module 6: Implementing Messaging Security Course 10135A
  3. Module 6: Implementing Messaging Security Course 10135A
  4. Explain that the Edge Transport server role provides a Simple Mail Transfer Protocol (SMTP) gateway that can be used for messaging security, such as anti-spam and antivirus scanning, address rewriting, and other tasks. Mention the new features specific to Edge Transport servers such as incremental EdgeSync that decreases the time taken to synchronize changes from Active Directory® Domain Services (AD DS) to Active Directory Application Mode (ADAM) on Edge Transport servers and the inclusion of per-user block lists. Also mention the following new features in Microsoft Exchange Server 2010 Edge Transport server: New Configuration Settings to Windows® PowerShell™ New log file to track EdgeSync activity Module 6: Implementing Messaging Security Course 10135A
  5. Describe in sufficient detail the infrastructure requirements for the Edge Transport server role. Emphasize that the server is not part of the domain, but is placed in the perimeter network. Mention that the Forefront Threat Management Gateway (TMG) now includes the Edge Transport components. Module 6: Implementing Messaging Security Course 10135A
  6. Active Directory Lightweight Directory Service (AD LDS) is a special mode of the AD DS that stores information for directory-enabled applications. Mention that the AD LDS was earlier known as ADAM. AD LDS is a Lightweight Directory Access Protocol (LDAP)-compatible directory service that runs on servers running the Windows Server® 2008 operating system. AD LDS is designed to be a standalone directory service. It does not require the deployment of Domain Name System (DNS), domains, or domain controllers. Instead, it stores and replicates only application-related information. AD LDS is configured using PowerShell in Exchange Server 2010. Module 6: Implementing Messaging Security Course 10135A
  7. Preparation Ensure that the 10135A-VAN-DC1, 10135A-VAN-EDG and 10135A-VAN-EX1 virtual machines are running. Log on to the virtual machine 10135A-VAN-EDG as Administrator using the password Pa$$w0rd . Demonstration Steps – Configure the Edge Transport role On VAN-EDG, click Start , point to All Programs , point to Microsoft Exchange Server 2010 , and then click Exchange Management Console . In Exchange Management Console, in the left pane, click Edge Transport . Note that the console is focused just on an Edge Transport server, and that there is no organization node. You must manage each Edge Transport server individually. Review the configuration options on the Anti-spam tab. These settings will be covered in detail later in the module. Click the Receive Connectors tab, and then double-click Default internal receive connector VAN-EDG . Review the receive connector properties. This connector will accept SMTP connections from all IP addresses and will accept anonymous connections. If you are using this server as a SMTP gateway server, you do not need to configure any other receive connectors to enable the server to accept messages. Click Cancel . Click the Send Connectors tab. Note that no Send Connectors are configured on the server. In order to send e-mail, either to the internal network or to the Internet, you will need to configure a Send Connector. Click the Transport Rules tab. Note that no transport rules are configured by default. You can use transport rules to apply actions to messages as they pass through the Edge Transport server. Click the Accepted Domains tab. Note that no accepted domains are configured. This means that you would need to configure an accepted domain before the Edge Transport server will accept any messages. Module 6: Implementing Messaging Security Course 10135A
  8. Emphasize that EdgeSync Synchronization is based on the Edge Transport servers’ certificate. Therefore, a certificate change will break the EdgeSync Synchronization. EdgeSync Synchronization means that you can manage most of your Edge Transport server settings in your organization by using the Exchange Management Console or the PowerShell. You do not need to configure every Edge Transport server one-by-one. For example, if you want to configure a new remote domain, you just do this centrally, and EdgeSync Synchronization will synchronize the configuration settings to all of your Edge Transport servers. Module 6: Implementing Messaging Security Course 10135A
  9. Explain how Internet message flow works in an Exchange 2010 organization. Tell the students that this example assumes that EdgeSync Synchronization is used, but it is not a mandatory requirement. After enabling EdgeSync, e-mail flows through the Exchange organization in the following manner: A user submits a message to a Mailbox server. The Hub Transport server retrieves the message from the Mailbox server, and categorizes it for delivery. In this case, the message recipient is outside the organization. The Hub Transport server determines that it must use the EdgeSync  – sitename to the Internet Send Connector to send e-mail to the Internet. It locates the Edge Transport server that is configured as the bridgehead server for the connector. The Hub Transport server forwards the message to the Edge Transport server, which sends the e-mail message to the Internet using the EdgeSync – sitename to the Internet Send Connector using the EdgeSync – sitename to the Internet Send Connector. For inbound messages, the sending SMTP connector connects to the Edge Transport server. The Edge Transport server accepts this connection using the Default internal Receive connector SERVERNAME, which is configured to accept anonymous connections on port 25 from all IP addresses. The Edge Transport server applies all spam-filtering rules. If the message is accepted, the Edge Transport server uses the EdgeSync-inbound to sitename connector to forward the message to a Hub Transport server that is configured to accept Internet messages. The Hub Transport server uses the default SERVERNAME connector to receive the message, and then forwards the message to the appropriate Mailbox server.   Module 6: Implementing Messaging Security Course 10135A
  10. This demonstration should show the basic steps to configure the Edge Transport role, and enable Edge Sync synchronization. Also, provide an example on address rewriting, a concept that should be explained in this step. You should also mention when to use address rewriting. For example, you use different e-mail addresses internally compared to externally, or internet-facing. Demonstration Steps – Enable EdgeSync Synchronization On VAN-EDG, click Start , point to All Programs , point to Microsoft Exchange Server 2010 , and then click Exchange Management Shell . In Exchange Management Shell, at the command prompt, type New-EdgeSubscription -FileName “c:\\van-edg.xml” and press ENTER. In the Confirm text dialog box, enter Y . Click Start , and in the Search box, type \\\\VAN-EX1\\c$ and press ENTER . Copy c:\\van-edg.xml to the server \\\\VAN-EX1\\c$ Best Practice: Remember that in real-world scenarios, it would be a security violation if you were able to copy the EdgeSubscription file directly from the Edge Transport server to the Hub Transport server. Normally, you should use an USB device or other means to copy the file. On VAN-EX1, click Start , point to All Programs , point to Microsoft Exchange Server 2010 , and then click Exchange Management Console . In Exchange Management Console, expand Microsoft Exchange On-Premises , expand Organization Configuration , and then click Hub Transport . In the Hub Transport pane, click the Edge Subscriptions tab. In the Actions pane, click New Edge Subscription . In the New Edge Subscription window, select Default-First-Site-Name as Active Directory site , and C:\\VAN-EDGE.XML as Subscription file, and then click New . On the Completion page, click Finish . Module 6: Implementing Messaging Security Course 10135A
  11. Demonstration Steps – Test Edge Synchronization Click Start , point to All Programs , point to Microsoft Exchange Server 2010 , and click Exchange Management Shell . In Exchange Management Shell, at the PS prompt, type Start-EdgeSynchronization , and then press ENTER. Verify that the synchronization was successful. In Exchange Management Shell, at the PS prompt, type Test-EdgeSynchronization , and then press ENTER. On VAN-EDG, in the Exchange Management Console, click Edge Transport . On the Receive Connectors tab, confirm that no new receive connectors have been added. The default connector is configured to receive e-mail from all source addresses on port 25. Click the Send Connectors tab, and click Refresh . Confirm that a new connector named EdgeSync – Default-First-Site-Name to Internet has been created. Double-click EdgeSync – Default-First-Site-Name to Internet . On the Address Space tab, confirm that an address space of * is configured. On the Network tab, confirm that the connector will use DNS to route e-mail. Click OK . On the Accepted Domain tab, confirm that the internal domains are listed as authoritative domains. On VAN-EX1, in the Exchange Management Console, in the Organization Configuration work area, click Hub Transport . On the Send Connectors tab, confirm that the EdgeSync – Default-First-Site-Name to Internet connector is displayed. Double-click the connector. On the Source Server tab, confirm that VAN-EDG is listed as the source server. Click OK . Demonstration Steps – Configure Address Rewriting On VAN EDG, if required, click Start , point to All Programs , point to Microsoft Exchange Server 2010 , and then click Exchange Management Shell . When you configure address rewriting, Exchange rewrites all e-mail messages with the domain name Adatum.com to display a domain name of Bdatum.com when they leave the organization. This feature is useful when an organization requires different mail domain names internally and externally. In Exchange Management Shell, at the command prompt, type New-addressRewriteEntry -Name "Bdatum.com” -InternalAddress adatum.com -ExternalAddress bdatum.com , and then press ENTER. Module 6: Implementing Messaging Security Course 10135A
  12. Cloned configuration is a process of configuring multiple Edge Transport servers with identical configurations. You use cloned configuration information to configure Edge Transport server-specific settings only once, and then export it to many Edge servers. Thus cloning is only used when you have many (or at least two) Edge Transport servers in place. Briefly discuss the need for implementing more than one Edge Transport server. Cloning configuration includes configurations that are not synchronized with EdgeSync, such as the path to your mail queue. Module 6: Implementing Messaging Security Course 10135A
  13. Discuss the functionality of the Security Configuration Wizard (SCW). Question: Why is it important to secure Edge Transport servers? Ask the students whether, in their experience, they have ever faced the need for securing their servers. Ask them if one of their servers was ever hacked from the Internet . Because Edge Transport servers are directly exposed to the Internet, securing the servers is critical. Lead a discussion around the topic, “How to Secure the Edge Transport Servers”. This should include the following topics: Security features in the Windows Server 2008 or Windows Server 2008 R2 operating systems Firewall configurations face any issues with password hackers? The Edge Transport server role performs a number of functions such as routing messages between the Exchange Server organization and the Internet, and providing antivirus and anti-spam protection. You typically install this server role in the DMZ or perimeter network. This location makes the Edge Transport server role more vulnerable than the other servers on your protected network. Therefore, you must perform certain additional tasks to secure this server role. Question: What factors should you consider at the operating system level? Answers can vary, from implementing a firewall solution, implementing restrictive password policies, to enforcing very strong passwords. However, the best tool around is the Security Configuration Wizard (SCW) that is part of Windows Server 2003 and newer versions. The Windows Server 2008 Administrative Tools includes the SCW. SCW is an easy-to-use wizard that allows you to quickly create and apply security templates to servers. It provides a user-friendly interface to configure your Windows servers not only for the Edge Transport role, but also for other products. Provide some examples on what administrators can do to better protect their servers, such as enforcing strong passwords, enabling only those accounts that are used, ensuring that a spyware and antivirus software is installed on the server, and so on. Question: How do you secure an Edge Transport server? The Edge Transport server includes certain security settings by default. For example, you can configure anti-spam features, or you can configure secure Transport Layer Security (TLS) for SMTP communication. All these features will be discussed later in this module. Additional references (based on Exchange 2007, but still valid): http://go.microsoft.com/fwlink/?LinkId=179976 Module 6: Implementing Messaging Security Course 10135A
  14. Module 6: Implementing Messaging Security Course 10135A
  15. A critical component of messaging security is antivirus protection. Students need to understand how virus detection works, and what type of functionality must be available in an antivirus product. Ask the student to suggest some virus threats and antivirus products that they know. Some examples of virus threats include the Melissa virus, which was introduced some years back. Some examples of antivirus products include the Forefront Protection 2010 for Exchange Server. Forefront Protection 2010 for Exchange Server is a separate antivirus package from Microsoft that integrates with Exchange Server 2010 to provide advanced protection, optimized performance, and centralized management. Also, discuss how virus detection works. Mention that the e-mail is analyzed using a virus pattern file to identify the virus. If the virus is not part of the pattern file, it will not be detected. Provide an overview of the virus protection features included in Exchange Server 2010. The key features remain the same as Exchange Server 2003 Exchange Server 2007, but it would be good to focus on the new features. Module 6: Implementing Messaging Security Course 10135A
  16. Forefront Protection 2010 for Exchange Server is a separate antivirus software package that can be integrated with Exchange Server 2010 to provide antivirus protection for the Exchange environment.   Explain the following services of Forefront Protection: Microsoft IP Reputation Service, which provides sender reputation information about IP addresses that are known to send spam. This is an IP Block List offered exclusively to Exchange Server. Premium spam protection also includes automated updates for this filter, available on an as-needed basis, up to several times a day. Spam Signature updates to identify the most recent spam campaigns. The signature updates are available on an as-needed basis, up to several times a day. Automated content filtering updates for Microsoft Smartscreen spam heuristics, phishing Web sites, and other Intelligent Message Filter (IMF) updates.   References: Protecting Your Microsoft Exchange Organization with Microsoft Forefront Protection 2010 for Exchange Server http://go.microsoft.com/fwlink/?LinkId=96630  Module 6: Implementing Messaging Security Course 10135A
  17. Discuss the options and other considerations for deploying Forefront Protection 2010. Mention that as a baseline, it is important to install an antivirus solution on all Hub and Edge Transport servers. You could also discuss the advantages and disadvantages of installing a virus scanner on the Mailbox server. Explain the different types of virus scanners that are available in Forefront Protection 2010, and how many should be used to scan messages. A best practice is to select five virus scanners, and scan each message with at least one, but a maximum of three scanners. Lead a discussion with students about on which roles you should or you should not deploy Forefront Protection 2010 for Exchange. Also, discuss some possible scenarios for deploying Forefront Protection. Module 6: Implementing Messaging Security Course 10135A
  18. Stress the importance of providing multiple layers of protection against viruses. Provide some comprehensive information on best practice considerations for deploying antivirus solutions. You can find examples in Microsoft’s Antivirus Defense-in-Depth Guide http://go.microsoft.com/fwlink/?LinkId=179977. Module 6: Implementing Messaging Security Course 10135A
  19. In this demonstration, use Forefront Protection 2010 for Exchange Server as an example to show how to configure antivirus scanning features. Students must also know how to manage this antivirus product to maintain protection. Preparation Ensure that the 10135A-VAN-EDG virtual machine is running. On the host computer, in the Hyper-V Manager MMC, right-click the 10135A-VAN-EDG virtual machine, and then click Settings . In the Settings for 10135A-VAN-EDG dialog box, in the Hardware section, expand IDE Controller 1 , and then click DVD Drive . In the details pane, click Image file , and type C:\\Program Files\\Microsoft Learning\\10135\\Drives\\ForeFrontInstall.iso in the field and click OK . Log on to the virtual machine 10135A-VAN-EDG as Administrator using the password Pa$$w0rd . Important: Forefront Security for Exchange Server 2007 does not work with Exchange Server 2010. You need to use Forefront Protection 2010 for Exchange Server. Demonstration Steps - Install Forefront Protection 2010 for Exchange Server In the 10135A-VAN-EDG on localhost – Virtual Machine Connection window, on the File menu, click Settings . Click DVD Drive , and then click Image File . Click Browse , and browse to C:\\Program Files\\Microsoft Learning\\10135\\Drives . Click ForeFrontInstall.iso , and click Open . Click OK . On VAN-EDG, click Start , in the Search field, type D:\\ , and then press ENTER. In Windows Explorer, double-click forefrontexchangesetup.exe . In the Setup Wizard Window, on the License Agreement page, click I agree to the terms of the license agreement and privacy statement , and then click Next . On the Service Restart page, click Next . On the Installation Folders page, click Next . On the Proxy Information page, click Next . On the Antispam Configuration page, click Enable antispam later , and then click Next . On the Microsoft Update page, click I don't want to use Microsoft Update , and then click Next . On the Customer Experience Improvement Program page, click Next . On the Confirm Settings page, click Next . Wait for the installation to finish. It will take about five minutes. On the Installation Results page, click Finish . Close Windows Explorer. Module 6: Implementing Messaging Security Course 10135A
  20. Demonstration Steps - Configure Forefront Protection 2010 for Exchange Server Click Start , point to All Programs , point to Microsoft Forefront Server Protection , and then click Forefront Protection for Exchange Server Console . In the Evaluation License Notice dialog box, click OK . In Forefront Protection 2010 for Exchange Server Administrator Console, in the left pane, click Policy Management . In the Policy Management pane, expand Antimalware , and then click Edge Transport . In the Antimalware – Edge Transport pane , in the Engines and Performance section , select the Scan with a dynamically chosen subset of engines check box. In the Additional Options section, verify that the Optimize for performance by not rescanning messages already virus scanned check box is selected. Click Save . In the Policy Management pane, expand Antispam , and then click Configure . In the Antispam – Configure pane, click the Enable Antispam Filtering button. In the Service Restart Required window, click Yes . Select the Enable content filtering check box. Under SCL Thresholds and Actions, in the Suspected spam drop-down list, select SCL 5 to 7 . Explain the impact of this setting to the students and explain the other options to reject or delete messages above this SCL level. Click Save . In the Policy Management pane, expand Global Settings , and then click Scan Options . Explain the options that you can configure here. Under Global Settings , click Engine Options . Explain the options that you can configure here. Under Global Settings , click Advanced Options . Explain the options that you can configure here. Focus mainly on Threshold Levels and Intelligent Engine Management . Demonstration Steps - Manage Forefront Protection 2010 In Forefront Protection 2010 for Exchange Server Administrator Console, in the left pane, click Monitoring . In the Monitoring pane, under Server Security Views , click Incidents . Explain what kind of incidents you would see here. For example, a message that has a virus detected will appear here. In the Monitoring pane, under Server Security Views , click Quarantine . Explain that the items that were configured for Quarantine based on the SCL level are found here Module 6: Implementing Messaging Security Course 10135A
  21. In the Monitoring pane, under Server Security Views , click Dashboard . Explain the different Monitors available on this page. In the Monitoring pane, under Configuration , click Notifications . Explain some of the available notifications and their use. For example, you should consider carefully whether to use Engine Update failed, because it is important for keeping your engines updated to prevent virus attacks. Ask the students if they find a Virus found notification useful, especially in large organizations that detect dozens of viruses every day. Typically, a Virus notification would not be useful permanently. It just makes sense to control that viruses are found correctly for the first couple of hours. Module 6: Implementing Messaging Security Course 10135A
  22. In this lab, students will: Configure Edge Transport servers. Configure Forefront Protection 2010 for Exchange Servers. Exercise 1: Configuring Edge Transport Servers In this exercise, students will be able to configure Edge Transport servers. The main tasks for this exercise are as follows: Install the Edge Transport server role. Configure Edge Synchronization. Verify that EdgeSync is working, and that AD LDS contains data. Verify that Internet message delivery works. Exercise 2: Configuring Forefront Protection 2010 for Exchange Servers In this exercise, students will be able to configure Forefront Protection 2010 for Exchange Servers, The main tasks for this exercise are as follows: Install Forefront Protection 2010 for Exchange Server. Configure Forefront Protection 2010 for Exchange Server. Verify antivirus functionality. Note: At present time, because an actual virus cannot be shipped with the course, students will not be able to verify the antivirus functionality. Module 6: Implementing Messaging Security Course 10135A
  23. Module 6: Implementing Messaging Security Course 10135A
  24. Use the questions on the slide to guide the debriefing after students have completed the lab exercises. Question : When you implement new certificates on your existing Edge Server, what do you need to consider? Answer : You need to run Edge Synchronization again , as the new certification will break it. Question : Does Forefront Protection 2010 Suite scan the message multiple times when it is passed over Edge Transport and Hub Transort servers? Answer : No, the message is tagged when it is scanned the first time , and is not scanned again . Module 6: Implementing Messaging Security Course 10135A
  25. Module 6: Implementing Messaging Security Course 10135A
  26. As you start this topic, ask the students about the anti-spam tools they are using currently in their organizations. Ask them how effective the tools are, and how much effort is involved in managing the solution. Next, discuss the agents available in Exchange Server 2010, and briefly discuss their functionality. If students are not familiar with the Exchange Server 2003 or Exchange Server 2007 anti-spam features, you might want to spend some additional time describing connection, recipient, and sender filtering, because this lesson does not cover them in detail. Module 6: Implementing Messaging Security Course 10135A
  27. Describe each step of the filtering process. Emphasize the order in which messages are processed. For example, a message from an SMTP host that is on the IP Block List will never be scanned for content. Mention the real-time block list (RBL) and its use. Emphasize that for most filter types, the messages or SMTP connections are simply dropped, and there is no option for archiving or quarantining the message. Only content filtering provides the option of quarantining messages so that administrators can monitor them for false positives. Introduce the student to the Spam Confidence Level (SCL) threshold and its purpose. Module 6: Implementing Messaging Security Course 10135A
  28. Mention that Sender ID filtering was first introduced in Exchange Server 2003 Service Pack 2 (SP2). Stress that the Sender ID Framework is a concept in virus protection that was introduced in Exchange Server 2007. Many organizations have not yet implemented the required Sender of Policy Framework (SPF) records in the Domain Name System (DNS). For this reason, the users should not configure the Sender ID filter to reject or delete messages. Module 6: Implementing Messaging Security Course 10135A
  29. Sender Reputation filtering is another spam protection tool that was introduced in Exchange Server 2007. Discuss how Sender Reputation filtering works. Focus on the criteria that the Edge Transport server uses when making the filtering decisions. Discuss how this feature should be implemented. Suggest that students will need to try different Sender Reputation Level (SRL) levels to determine what will work best in their organization. Module 6: Implementing Messaging Security Course 10135A
  30. Mention that Content Filtering replaces the Intelligent Message Filter that shipped with Exchange Server 2003. As you describe content filtering, show the configuration options in the Exchange Management Console. Emphasize the importance of monitoring the quarantine mailbox, especially during the initial deployment, to ensure that the SCL thresholds are configured correctly. Module 6: Implementing Messaging Security Course 10135A
  31. In this demonstration, provide an overview to the students on Connection filters, Sender and Recipient filters, Sender ID and Content filtering Content filtering is an especially important area where you can show how to create an Edge Transport Rule. For example, you can add “*** SPAM***” to the subject line when the SCL value exceeds 5. Preparation Ensure that the 10135A-VAN-DC1, 10135A-VAN-EDG and 10135A-VAN-EX1 virtual machines are running. Log on to the virtual machine 10135A-VAN-EDG as Administrator using the password Pa$$w0rd . Demonstration Steps - Configure Connection Filters On VAN-EDG, if required, click Start , point to All Programs , point to Microsoft Exchange Server 2010 , and then click Exchange Management Console . In Exchange Management Console, click Edge Transport . In the Edge Transport pane, click the Anti-spam tab. In the VAN-EDG pane, double-click IP Allow List . On the Allowed Addresses tab, click Add . In the Add Allowed IP Address- CIDR dialog box, type 10.10.0.11 , and then click OK twice. Adding this entry means that all messages from this IP address will be accepted without any additional content filtering. In the VAN-EDG pane, double-click IP Block List . On the Blocked Addresses tab, click Add . In the Add Blocked IP Address- CIDR dialog box, type 10.10.0.12 , and then click OK twice. Adding this entry means that all SMTP connections from this IP address will be rejected. In the VAN-EDG pane, double-click IP Block List Providers . In the IP Block List Providers Properties dialog box, click the Providers tab, and then click Add . Type Spamhaus in the Provider name box, type zen.spamhaus.org in the Lookup Domain box, and then click OK twice . After adding this entry, the Edge Transport server will query the IP block list provider whenever a SMTP server attempts to make a connection. If the SMTP server IP address is on the block list, the connection will be dropped. Demonstration Steps - Configure Sender and Recipient Filters In the VAN-EDG pane, double-click Recipient Filtering . On the Blocked Recipients tab, select the Block messages sent to the following recipients check box. In the Block messages sent to the following recipients text box, type [email_address] , and then click Add . Click OK . On the Anti-spam tab, right-click Sender Filtering , and then click Properties . Module 6: Implementing Messaging Security Course 10135A
  32. On the Blocked Senders tab, click Add . In the Add Blocked Senders dialog box, under Individual e-mail address , type [email_address] , and click OK twice. Demonstration Steps - Configure Sender ID and Sender Reputation Filters On VAN-DC1, open the DNS management console. Expand Forward Lookup Zones , and then click Adatum.com . Right-click Adatum.com , and then click Other New Records . In the Resource Record Type dialog box, click Text (TXT) , and then click Create Record . In the New Resource Record dialog box, in the Text box, type v=spf1 ip4:10.10.0.40 –all , and then click OK . This record configures the Sender ID filter to accept connections only from 10.10.0.40 for the Adatum.com domain. Normally, you would configure this entry on the DNS server that is responsible for your domain on the Internet. In the Resource Record Type dialog box, click Done . On VAN-EDG, in Exchange Management Console , on the Anti-spam tab, right-click Sender ID , and then click Properties . In the Sender ID Properties dialog box, on the Action tab, click Reject Message , and then click OK . In the VAN-EDG pane, double-click Sender Reputation . On the Action tab, move the slider two stops to the left, and then click OK . Demonstration Steps - Configure Content Filtering On VAN-EDG, in the Exchange Management Shell, type set-contentfilterconfig –quarantinemailbox Jeff@adatum.com , and then press ENTER. On VAN-EDG, in the Exchange Management Console , on the Anti-spam tab, right-click Content Filtering , and then click Enable . Right-click Content Filtering , and then click Properties . On the Custom Words tab, in the Messages containing these words or phrases box, type Mortgages , and then click Add . In the Block messages containing these words or phrases box, type poker , and then click Add . On the Exceptions tab, in the Don’t filter messages sent to the following recipients box, type [email_address] , and then click Add . On the Action tab, select the Quarantine messages that have an SCL rating greater than or equal to check box, and set the value to 7 . Set the Reject messages that have an SCL rating greater than or equal to value to 9 . Click OK . Module 6: Implementing Messaging Security Course 10135A
  33. Module 6: Implementing Messaging Security Course 10135A
  34. One of the issues that new Exchange Server administrators must be aware of, is that sending SMTP e-mail to the Internet is inherently not secure, and that there are options for providing additional security. Question: What are the security issues with SMTP? SMTP was primarily designed around the idea of enabling cooperation and trust between servers. It is designed to accept any mail and forward it to its destination. This is called relaying, and this can cause security issues. Additionally, SMTP is not encrypted by default. Question: How do you currently secure SMTP? Answers may vary. Some organizations may use encryption methods such as Transport Layer Security (TLS), Internet Protocol Security (IPSec), virtual private network (VPN), and so on. Some organizations might also implement authentication and authorization to prevent relaying. Module 6: Implementing Messaging Security Course 10135A
  35. Provide an overview of the different options to secure SMTP e-mail. Describe some sample scenarios when each of the following options would be used. TLS VPN IPSec S/MIME Authentication and authorization  Module 6: Implementing Messaging Security Course 10135A
  36. In this demonstration, focus on the Receive Connector’s Authentication tab, and what can be configured using that tab. Also demonstrate how to configure an SMTP Connector that requires TLS and authentication. Emphasize that authentication and authorization on the SMTP Connector cannot always be applied. Preparation Ensure that the 10135A-VAN-DC1, 10135A-VAN-EDG and 10135A-VAN-EX1 virtual machines are running. Log on to the virtual machine 10135A-VAN-EX1 and 10135A-VAN-DC1 as Administrator using the password Pa$$w0rd . Demonstration Steps - Configure an Externally Secured SMTP Connector On VAN-EX1, click Start , point to All Programs , point to Exchange Server 2010 , and then click Exchange Management Console . In Exchange Management Console , expand Microsoft Exchange On-Premises , expand Server Configuration , and then click on Hub Transport . In the Hub Transport pane, select VAN-EX1 . In the Actions pane, click New Receive Connector . In the New Receive Connector window, in the Name box, type Externally Secured Connector , click Internal in the Select the intended use for this Receive connector list, and then click Next . In the Remote Network settings pane, click Remove , and then click Add . In the Add IP Addresses of Remote Servers window, enter 10.10.0.10 in Address or address range field, click OK , click Next , click New , and then click Finish . In Exchange Management Console , in the Receive Connectors pane, double-click Externally Secured Connector , and then click the Authentication tab. Clear the Exchange Server authentication check box, select the Externally Secured (for example, with IPsec) check box, and then click OK . On VAN-DC1 , click Start , point to All Programs , point to Accessories , and then click Command Prompt . At the command prompt, type Telnet van-ex1 smtp , and then press ENTER. Enter the following sequence: a. Helo b. Mail from: test@Contoso.com c. Rcpt to: kim@woodgrovebank.com d. Quit Note that you can relay through the server when using the externally trusted connector. You need to ensure that this option is only enabled for connections from highly trusted sources. Module 6: Implementing Messaging Security Course 10135A
  37. Demonstration Steps - Configure an SMTP Connector that Requires TLS and Authentication Switch to VAN-EX1. In Exchange Management Console, in the Receive Connectors pane, double-click Externally Secured Connector , and then click the Authentication tab. Clear the Externally Secured (for example, with IPSec) check box, and select the following: Basic Authentication Offer Basic authentication only after starting TLS Click the Permission Groups tab, select the Exchange users check box, and then click OK . On VAN-DC1, click Start , point to All Programs , point to Accessories , and then click Command Prompt . At the command prompt, type Telnet van-ex1 smtp . Enter the following sequence: a. Helo b. Mail from: test@contoso.com response: 530 5.7.1 client was not authenticated
  38. Domain Security refers to the set of functionality in Exchange Server 2010 that provides a relatively low-cost alternative to S/MIME or other message-level security solutions. The purpose of the Domain Security feature set is to provide administrators a way to manage secured message paths over the Internet with business partners. After these secured message paths are configured, messages that have successfully traveled over the secured path from an authenticated sender are displayed as “Domain Secured” to users in the Outlook and Outlook Web App interface. Module 6: Implementing Messaging Security Course 10135A
  39. Use the following steps to describe how Domain Security works. The Edge Transport server receives an e-mail. Edge Transport initiates a mutual TLS session to the target Edge Transport server by exchanging and verifying their certificates. The message is encrypted and transferred to the target Edge Transport server The Edge Transport delivers the e-mail to the target Hub Transport server. Note : The slide explains the technical background to the Exchange Server 2010 Domain Security feature. Module 6: Implementing Messaging Security Course 10135A
  40. This process shows the steps that are needed to configure Domain Security. Generate a certificate request for TLS certificates. Explain the options to generate a certificate, such as requesting with Exchange, or creating directly from Certification Authority (CA). Show the PowerShell command to perform this task. Import the certificate to Edge Transport servers. Explain the PowerShell command, and why it is important to enable the certificate for Exchange. Also explain what services are available for an certificate. Configure outbound Domain Security. Configure inbound Domain Security. Notify the business partner to configure Domain Security. Test mail flow. After configuring the local Domain Security, you need to notify your target domain’s Exchange Administrator to also add your Domain Name to their TLS configuration, as TLS only works if it is configured on both ends. You can also discuss the limitations of implementing Domain Security, such as having to manually enable every single domain on both sides—you cannot do this automatically. References: White Paper: Domain Security in Exchange 2007 http://go.microsoft.com/fwlink/?LinkId=179978 Module 6: Implementing Messaging Security Course 10135A
  41. This demonstration shows how to configure Domain Security for one domain, and what users see when they send e-mail to a domain that is domain-secured. Preparation Ensure that the 10135A-VAN-DC1, 10135A-VAN-EDG and 10135A-VAN-EX1 virtual machines are running. Log on to the virtual machine 10135A-VAN-EX1 and 10135A-VAN-EDG as Administrator using the password Pa$$w0rd. Demonstration Steps - Verify certificate and Check Receive Connector On VAN-EDG , open Microsoft Management Console, and then add the Certificates snap-in. In the Certificates snap-in window, click Computer account , click Next , and then click Finish . In the Add or Remove Snap-ins window, click OK . In the Console window, expand Certificates (Local Computer) , expand Personal , and then click Certificates . Open the VAN-EDG certificate. This certificate is the self-signed certificate installed on the server when the Edge Transport server role was installed. In a production environment, you would need to obtain a certificate from a public CA or exchange root certificates with other organizations in order to enable domain security. Click OK , and then close Console 1 without saving changes. Click Start , point to All Programs , point to Exchange Server 2010 , and then click Exchange Management Console . In Exchange Management Console , click Edge Transport . In the Edge Transport pane, click VAN-EDG , and then click the Receive Connectors tab in the VAN-EDG pane. On the Receive Connectors tab, double-click Default internal receive connector VAN-EDG . On the Authentication tab, ensure that both the Transport Layer Security (TLS) and Enable Domain Security (Mutual Auth TLS) check boxes are selected, and then click OK . You can mention here that in a real-world implementation of Domain Security, you might want to add one dedicated Receive Connector for Domain Security connections only as a best practice recommendation. Module 6: Implementing Messaging Security Course 10135A
  42. Demonstration Steps - Configure Domain Security On VAN-EX1, click Start , point to All Programs , point to Microsoft Exchange Server 2010 , and then click Exchange Management Console . In Exchange Management Console , expand Microsoft Exchange On-Premises , expand Organization Configuration , and then click Hub Transport . Click the Send Connectors tab, and then double-click EdgeSync - Default-First-Site-Name to Internet . On the Network tab, ensure that Enable Domain Security (Mutual Auth TLS) is selected , and then click OK . Click Start , point to All Programs , point to Microsoft Exchange Server 2010 , and then click Exchange Management Shell . In Exchange Management Shell, at the command prompt, type Set-TransportConfig -TLSSendDomainSecureList contoso.com , and then press ENTER. At the command prompt, type Set-TransportConfig -TLSReceiveDomainSecureList contoso.com , and then press ENTER. At the command prompt, type Get-TransportConfig |FL , and then press ENTER. At the command prompt, type Start-EdgeSynchronization , and then press ENTER. Module 6: Implementing Messaging Security Course 10135A
  43. Another common option for configuring SMTP security is S/MIME. This enables secure message transfer between individuals in different organizations. This is a client-side feature, and there is almost nothing to configure on the server. Module 6: Implementing Messaging Security Course 10135A
  44. In this lab, students will: Configure and verify an anti-spam solution. Exercise 1: Configuring an Anti-Spam Solution on Edge Transport Servers In this exercise, students will be able to configure an anti-spam solution on Edge Transport servers. Configure global SCL for junk mail delivery. Configure content filtering to reject junk messages. Configure an IP Allow List. Configure a Block List Provider. Module 6: Implementing Messaging Security Course 10135A
  45. Module 6: Implementing Messaging Security Course 10135A
  46. Use the questions on the slide to guide the debriefing after students have completed the lab exercises. Question : What anti-spam agents are available in Exchange Server 2010? Answer : Anti-spam agents include: Connection Filtering, Content Filter, Sender ID, Sender Filter, Recipient Filter, Protocol Analysis, and Attachment Filter. Question : What is the purpose of the SCL threshold? Answer : T he SCL threshold is the threshold value that specifies whether a message is seen as spam, or a valid message. Question : What are the possible issues in implementing Domain Security for your partner domains? Answer : Domain Security needs to be configured on both sides, on a by-domain basis. Module 6: Implementing Messaging Security Course 10135A
  47. Review Questions Is EdgeSync Synchronization a mandatory requirement? No, you can use EdgeSync Synchronization to configure the Edge Transport server so that you can manage most of the settings from your Exchange Server organization. However, you can also have a stand-alone Edge Transport server. Which Exchange Server versions support the Domain Security feature? You can use Domain Security or mutual TLS only when both the sending and receiving domains have Exchange Server 2007 or Exchange Server 2010 installed. Does the Edge Transport server role in Exchange Server 2010 include virus-scanning capabilities? The Edge Transport server role only includes some basic anti-virus features. For virus scanning capabilities, you need to use a third-party software such as Forefront Protection 2010 for Exchange, or other products. Common Issues Related to EdgeSync Synchronization and Domain Security Identify the causes for the common issues related to implementing Message Security, and fill in the troubleshooting tips. For answers, refer to relevant lessons in the module. Module 6: Implementing Messaging Security Course 10135A