Solved

OWA SSL access from public or potentially exposed workstations - security implications advice please!

Posted on 2006-11-28
4
182 Views
Last Modified: 2010-03-06
Hi - assuming use SSL to access OWA, are there any security implications if a user uses 'any old pc' to view his Outlook via OWA - am thinking of malware running on the workstation which could be a public pc, or even a friends - especially as 'modern' malware goes to great lengths nowadays to keep its presence quiet!

Cheers
0
Comment
Question by:MPSmith4258
  • 2
  • 2
4 Comments
 
LVL 104

Expert Comment

by:Sembee
ID: 18028898
As with many things, it is a calculated risk.

The main thing that you are at risk from is key loggers. Very little you can do about those other than encourage the users to frequently change their passwords. If you do not have a password policy, particularly expiring passwords then you should implement one. That will cause complaints, but it has to be done to limit any damage.

Most attackers though are after bank passwords, so as long as you take similar precautions to those that the banks take you shouldn't have too many things to worry about.

To some extent it depends on what your business is and whether you are likely to be a target for the data or not.

Simon.
0
 

Author Comment

by:MPSmith4258
ID: 18106819
Simon,

Thanks for that. I'm going ahead and implementing OWA and Remote Web Workplace access now. But is there a way of me getting alerted every time a user has use OWA or RWW?
Thanks
0
 
LVL 104

Accepted Solution

by:
Sembee earned 250 total points
ID: 18107828
No way I know of.
Something would have to monitor the IIS logs and then alert on that basis. That may require some custom scripting, but it isn't anything I have ever had to do before so it would mean looking for something or writing something yourself.  

Simon.
0
 

Author Comment

by:MPSmith4258
ID: 18108600
Thanks Simon. Cheers
0

Featured Post

Best Practices: Disaster Recovery Testing

Besides backup, any IT division should have a disaster recovery plan. You will find a few tips below relating to the development of such a plan and to what issues one should pay special attention in the course of backup planning.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Combining Get-Mailbox and Get-MailboxStatistics in PowerShell 3 51
AD Account lockout 11 69
Save Exchange PowerShell Command 12 38
Error on OWA 2016 14 24
Scam emails are a huge burden for many businesses. Spotting one is not always easy. Follow our tips to identify if an email you receive is a scam.
A list of top three free exchange EDB viewers that helps the user to extract a mailbox from an unmounted .edb file and get a clear preview of all emails & other items with just a single click on mailboxes.
In this video we show how to create an email address policy in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.:  First we need to log into the Exchange Admin Center. Navigate to the Mail Flow…
The video tutorial explains the basics of the Exchange server Database Availability groups. The components of this video include: 1. Automatic Failover 2. Failover Clustering 3. Active Manager

730 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question