Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

How to test end-to-end TLS security

Posted on 2010-08-16
3
Medium Priority
?
1,443 Views
Last Modified: 2012-05-10
Hi All,

I want to test TLS security email end to end (between my company and client)
I have setup all in one Exchange Server 2007 (HT-CAS-MBx role) and alrady got the SSL certificate for securing my OWA, so does this means by default TLS security is happening here ?

I notice that i alrady setup the TLS option in the receive connector.

any comments would be greatly appreciated.

Thanks,
0
Comment
Question by:jjoz
3 Comments
 
LVL 5

Accepted Solution

by:
danubian earned 668 total points
ID: 33451997
0
 
LVL 2

Assisted Solution

by:zsaurabh
zsaurabh earned 664 total points
ID: 33453124
Please see the doc attached.
How-to-secure-remote-desktop-con.doc
0
 
LVL 5

Assisted Solution

by:Shibu Kuttan
Shibu Kuttan earned 668 total points
ID: 33461905
Hi,

Testing Domain-Secured Mail Flow
After you have configured domain-secured e-mail, you can test the connection by reviewing the performance logs and the protocol logs. Messages that have successfully authenticated over the domain-secured mail flow path are displayed in Outlook 2007 as "Domain Secure" messages.

please read Testing Domain-Secured Mail Flow on the below link
http://technet.microsoft.com/en-us/library/bb123543(EXCHG.80).aspx

Thanks.
0

Featured Post

Prepare for your VMware VCP6-DCV exam.

Josh Coen and Jason Langer have prepared the latest edition of VCP study guide. Both authors have been working in the IT field for more than a decade, and both hold VMware certifications. This 163-page guide covers all 10 of the exam blueprint sections.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

How to effectively resolve the number one email related issue received by helpdesks.
Eseutil Hard Recovery is part of exchange tool and ensures Exchange mailbox data recovery when mailbox gets corrupt due to some problem on Exchange server.
This video discusses moving either the default database or any database to a new volume.
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …
Suggested Courses

885 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question