Logo
programming4us
programming4us
programming4us
programming4us
Home
programming4us
XP
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server
programming4us
Windows Phone
 
Windows Server

Exchange Server 2010 : Securing POP and IMAP Exchange Server Traffic

- How To Install Windows Server 2012 On VirtualBox
- How To Bypass Torrent Connection Blocking By Your ISP
- How To Install Actual Facebook App On Kindle Fire
3/28/2011 9:07:39 PM
The ancillary mail services of the Post Office Protocol version 3 (POP3) and Internet Message Access Protocol version 4 (IMAP4) can be secured through an ISA server. This is particularly important for organizations that require support of these legacy protocols; they are less secure than the newer forms of mail access available.

Creating and Configuring a POP Mail Publishing Rule

POP3 servers are secured in ISA through the creation of a special rule that enables ISA to examine all traffic sent to the POP3 server and perform intrusion detection heuristics on it with an advanced POP intrusion detection filter. The POP server does not necessarily need to be a Microsoft server, such as Exchange Server, but can be run on any POP3-compliant messaging system.

Caution

Enable POP support in a messaging environment only if there is no other viable option. POP3 support is less secure than other access methods, and can cause mail delivery and security issues. For example, many POP clients are configured to pull all the mail off the POP server, making it difficult to do disaster recovery of mail data.


After a POP server has been enabled or established on the internal network, it can be secured via modification of an existing rule or creation of a new rule to secure POP traffic as follows:

1.
From the ISA console, select the Firewall Policy node from the console tree.

2.
In the tasks pane, click the Publish Mail Servers link.

3.
Enter a descriptive name for the rule (for example, POP Access), and click Next.

4.
Select the Client Access: RPC, IMAP, POP3, SMTP option, and click Next.

5.
In the Select Services dialog box, select POP3 (Standard port), and click Next.

6.
Enter the internal IP address of the POP server, and click Next.

7.
Select to which networks the ISA server will listen by checking the boxes next to them, and click Next.

8.
Click Finish, click Apply, and then click OK.

Note

By default, enabling a POP publishing rule turns on the POP intrusion detection filter, which can help protect a POP system from potential exploits. That said, POP3 is still an insecure protocol, and it is preferable not to deploy it on a server.


Creating and Configuring an IMAP Mail Publishing Rule

The Internet Message Access Protocol (IMAP) is often used as a mail access method for UNIX systems and even for clients such as Outlook Express. It also can be secured through an ISA server, using the same rule as a POP rule, or through the configuration of a unique IMAP publishing rule.

After the internal IMAP presence has been established, an ISA rule can be created to allow IMAP traffic to the IMAP server. The following procedure outlines this process:

1.
From the ISA console, select the Firewall Policy node from the console tree.

2.
In the tasks pane, click the Publish Mail Servers link.

3.
Enter a descriptive name for the rule (for example, IMAP Access), and click Next.

4.
Click the Client Access: RPC, IMAP, POP3, SMTP option button, as shown in Figure 1, and click Next.

Figure 1. Setting up an ISA IMAP publishing rule.

5.
In the Select Services dialog box, select Secure Ports for IMAP4, and click Next.

6.
Enter the internal IP address of the POP server, and click Next.

7.
Select to which networks the ISA server will listen by checking the boxes next to them, and click Next.

8.
Click Finish.

Other -----------------
- Securing Exchange Outlook Web App with ISA Server 2006 (part 2) - Creating an Outlook Web App Publishing Rule
- Securing Exchange Outlook Web App with ISA Server 2006 (part 1) - Exporting and Importing the OWA Certificate to the ISA Server
- Leveraging Social Networking Tools in SharePoint 2010 : Restricting User Access to and Creation of My Site Sites
- Leveraging Social Networking Tools in SharePoint 2010 : Reviewing the User Profile Service Application Settings
- Leveraging Social Networking Tools in SharePoint 2010 : Reviewing the Components of a Healthy My Site Configuration
- Windows Server 2008 Server Core : Working with General Applications (part 2) - Listing Applications and Services with the TaskList Command
- Windows Server 2008 Server Core : Working with General Applications (part 1) - Terminating Tasks with the TaskKill Command
- Exchange Server 2010 : IMAP, POP, and Microsoft ActiveSync (part 3) - Autodiscover & ActiveSync
- Exchange Server 2010 : IMAP, POP, and Microsoft ActiveSync (part 2) - Assigning an External Name & Configure POP and IMAP
- Exchange Server 2010 : IMAP, POP, and Microsoft ActiveSync (part 1) - Client Access Server Certificates
 
 
Top 10
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
- First look: Apple Watch

- 3 Tips for Maintaining Your Cell Phone Battery (part 1)

- 3 Tips for Maintaining Your Cell Phone Battery (part 2)
programming4us programming4us
Popular tags
Microsoft Access Microsoft Excel Microsoft OneNote Microsoft PowerPoint Microsoft Project Microsoft Visio Microsoft Word Active Directory Biztalk Exchange Server Microsoft LynC Server Microsoft Dynamic Sharepoint Sql Server Windows Server 2008 Windows Server 2012 Windows 7 Windows 8 windows Phone 7 windows Phone 8
programming4us programming4us
 
programming4us
Natural Miscarriage
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server
programming4us
Game Trailer