Logo
programming4us
programming4us
programming4us
programming4us
Home
programming4us
XP
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server
programming4us
Windows Phone
 
Windows Server

Securing an Exchange Server 2010 Environment : Securing Outlook Web App

- How To Install Windows Server 2012 On VirtualBox
- How To Bypass Torrent Connection Blocking By Your ISP
- How To Install Actual Facebook App On Kindle Fire
3/25/2011 11:20:11 AM
Outlook Web App (OWA) provides the interface for users to access their mail across the Internet utilizing a web browser. Over the years, Microsoft improved the OWA client until it was almost as powerful as the actual Microsoft Outlook client.

With OWA 2010, Microsoft has continued this trend, providing an improved user experience and enhanced security over previous versions.

Some of the security-related features in OWA include the following:

  • Stripping of web beacons, referrals, and other potentially harmful content from messages

  • Attachment blocking

  • OWA forms-based (cookie) authentication

  • Session inactivity timeout

  • OWA infrastructure using IPSec and Kerberos

  • Safe and block lists

  • Improved logon screen— In OWA 2010, when you connect from a trusted machine, your previous “private” selection (and your username) is remembered on subsequent connections.

  • Junk email management— OWA 2010 has improved the capabilities of the junk email filter by allowing users to manage their junk email settings from within OWA.

  • Protection from harmful content— If an OWA 2010 user clicks a link that is embedded in an email message, and the link uses a protocol that is not recognized by OWA, the link is blocked, and the user receives a warning stating “Outlook Web App has disabled this link for your protection.”

Supported Authentication Methods

Client access servers in Exchange Server 2010 support more authentication methods than Exchange Server 2003 front-end (OWA) servers did.

The following types of authentication are allowed:

  • Standard— Standard authentication methods include Integrated Windows authentication, Digest authentication, and Basic authentication.

  • Forms-based authentication— Using forms-based authentication creates a logon page for OWA. Forms-based authentication uses cookies to store user logon credentials and password information in an encrypted state.

  • Microsoft Internet Security and Acceleration (ISA) Server forms-based authentication— By using ISA Server, administrators can securely publish OWA servers by using Mail server publishing rules. ISA Server also allows administrators to configure forms-based authentication and control email attachment availability.

  • Smart card and certificate authentication— Certificates can reside on either a client computer or on a smart card. By utilizing certificate authentication, Extensible Authentication Protocol (EAP) and Transport Layer Security (TLS) protocols are used, providing a two-way authentication method where both the client and server prove their identities to each other.

Table 1 shows a comparison of authentication methods along with the security level provided relative to password transmission and client requirements.

Table 1. Authentication Methods for OWA Logon Options
Authentication MethodSecurity Level ProvidedHow Passwords Are SentClient Requirements
Basic authenticationLow (unless Secure Sockets Layer [SSL] is enabled)Base 64-encoded clear text.All browsers support Basic authentication.
Digest authenticationMediumHashed by using MD5.Microsoft Internet Explorer 5 or later versions.
Integrated Windows authenticationLow (unless SSL is enabled)Hashed when Integrated Windows authentication is used; Kerberos ticket Integrated Windows authentication includes the Kerberos and NTLM authentication methods.Internet Explorer 2.0 or later versions for Integrated Windows authentication. Microsoft Windows 2000 Server or later versions with Internet Explorer 5 or later versions for Kerberos.
Forms-based authenticationHighEncrypts user authentication information and stores it in a cookie. Requires SSL to keep the cookie secure.Forms-based authentication is now supported in Internet Explorer, Mozilla Firefox, Apple’s Safari, and other browsers.

Note

When multiple methods of authentication are configured, Internet Information Services (IIS) uses the most restrictive method first. IIS then searches the list of available authentication protocols (starting with the most restrictive), until an authentication method that is supported by both the client and the server is found.


Disabling Web Beacons for Outlook Web App

Web beaconing is a method used to retrieve valid email addresses and recipient information. Web beaconing is often used by unscrupulous advertisers and spammers to improve the accuracy and effectiveness of their spamming campaigns.

Exchange Server 2010 allows the disabling of web beacons for OWA. Administrators can use the Exchange Management Shell to define the type of filtering that is used for web beacon content and enforce it for all users.

To use the Exchange Management Shell to configure web beacon filtering settings, perform the following command from the shell:

Set-OwaVirtualDirectory -identity "Owa (Default Web Site)" -FilterWebBeaconsAndHtmlForms ForceFilter


This command configures the filtration of web beacon content in the Outlook virtual directory named OWA in the default IIS website. Possible values for the FilterWebBeaconsandHtmlforms setting are as follows:

  • UserFilterChoice— Prompts the user to allow or block web beacons

  • ForceFilter— Blocks all web beacons

  • DisableFilter— Allows web beacons

Using Safe and Block Lists

OWA 2010 users can now manage their junk email settings from within OWA. Users can enable or disable junk email filtering, create and maintain Safe Senders, Blocked Senders, and Safe Recipient lists, enter email domains or Simple Mail Transfer Protocol (SMTP) addresses, and elect to trust email from their contacts.

Note

The option to “always trust contacts” does not function if the user has more than 1,024 contacts. Although this limitation will not be reached for most users, those with an exceptionally large number of contacts should be aware of the limitation.


To access the Junk E-Mail settings in OWA, select Options from the upper-right corner of the screen, and then select Junk E-Mail on the left side of the page.

Other -----------------
- Securing an Exchange Server 2010 Environment : Protecting Against Spam
- Securing an Exchange Server 2010 Environment : Securing Outlook 2007
- Securing an Exchange Server 2010 Environment : Securing Your Windows Environment
- Windows Server 2008 R2 Administration Tools for Desktops : Creating Custom Installations Using Capture Images
- Windows Server 2008 R2 : Creating Discover Images (part 3) - Pre-creating Active Directory Computer Accounts for WDS
- Windows Server 2008 R2 : Creating Discover Images (part 2) - Adding Drivers to Boot and Discover Images
- Windows Server 2008 R2 : Creating Discover Images (part 1) - Creating Bootable Media with Discover Boot Images and the Windows Automated Installation Kit
- BizTalk Server 2010 : Correcting Errors in Functoids
- BizTalk Server 2010 : Navigating the Mapping Surface
- BizTalk Server 2010 : Using the Relevance Tree View
 
 
Top 10
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
- First look: Apple Watch

- 3 Tips for Maintaining Your Cell Phone Battery (part 1)

- 3 Tips for Maintaining Your Cell Phone Battery (part 2)
programming4us programming4us
Popular tags
Microsoft Access Microsoft Excel Microsoft OneNote Microsoft PowerPoint Microsoft Project Microsoft Visio Microsoft Word Active Directory Biztalk Exchange Server Microsoft LynC Server Microsoft Dynamic Sharepoint Sql Server Windows Server 2008 Windows Server 2012 Windows 7 Windows 8 windows Phone 7 windows Phone 8
programming4us programming4us
 
programming4us
Natural Miscarriage
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server
programming4us
Game Trailer