Is it desirable (and unproblematic) to make Internet access to the OWA and RWW sites more 'cryptic' than "/exchange" and "/remote" ?

Hello experts.  Acknowledging that SBS has been well designed in the area of security, given the fact that public DNS info is so...public and the standard format of the URLs for web access to Exchange and the RWW is generally well known, I was curious if substituting something more cryptic for the familiar "/exchange" and "/remote" has any value in adding another bit of security by making it harder for the would-be hacker to find the respective web pages?  Or does anybody out there make changes just to simplify the addresses?  If so, does it simply come down to changing the site settings in IIS and/or adding pointers in the internal DNS?  Are there any negative ramifications to the overall configuration of SBS, as I DO appreciate such a change would be a non-wizard based alteration?  Thanks for educating me on this.
Who is Participating?
Rob WilliamsConnect With a Mentor Commented:
Customizing SBS is never a good idea. You may find an update or a seemingly unrelated change may 'break' the configuration at a latter date. It is always best to try to stick with the defaults and wizards with SBS.
To give you a bit of comfort though, understand basic hacking. If a user wanted to guess your full DNS name (granted there are ways to locate it), they have to know server name (difficult to get) and domain name, as well as have the assumption you have SBS. The next option would be to use the IP address. Assuming you have a registered domain name the SSL certificate will not validate for the IP address. Finally most hackers do port scans. When they find an open port such as 3389 for remote desktop they try to hack using the related service, in this case remote desktop. SBS uses RWW which not only uses port 4125 which is less common, but it does not reply to a port scan, telnet or any other utility. The port is only opened to a user who first establishes a secure SSL connection on port 443.

It's pretty secure.
Jason WatkinsConnect With a Mentor IT Project LeaderCommented:

I would use secure https for these sites, and not mess with the virtual directory names.  ADSIEdit may need to be involved in the process of doing so, and that is a tricky environment.

mrpierce2Author Commented:
Ok.  I've rarely seen any talk about this so I figured the general recommendation would be not to mess with it, but I needed to ask.  I came to appreciate the sanctity of the wizards a while back (thanks to TechSoEasy)  and not "breaking" the SBS so their importance is understood.

Thanks .  I did have the opportunity to use ADSIEdit for cleaning up when I did a swing migration from SBS 2K to 2K3 and understand its capability to address special situations or do serious damage if misused, but as per above, I'll leave things as they are.  I AM curious to know a bit more about S-HTTP.  Just did a quick look up on it.  Guess I've been aware of it but have kind of taken its application for granted.  I've been more focused on SSL in regards to certificates etc. in relation to SBS, but I do understand they're not the same.  If for no other reason than my edification, any recommendations on a site(s)/source for the best primer?


Thanks for the explanation of the security underpinnings of RWW.  You know, I did my due diligence in ensuring the necessary ports opened by the CEICW were opened on the firewall as well, aware of what needed which port, but not really appreciating HOW the ports were being used.  So, thanks for clarifying that.
Get expert help—faster!

Need expert help—fast? Use the Help Bell for personalized assistance getting answers to your important questions.

Jason WatkinsIT Project LeaderCommented:

The SBS Security Site might be a good place to start:
mrpierce2Author Commented:
Rob WilliamsCommented:
Thanks mrpierce2.
Cheers !
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.