Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

How to test end-to-end TLS security

Posted on 2010-08-16
3
Medium Priority
?
1,448 Views
Last Modified: 2012-05-10
Hi All,

I want to test TLS security email end to end (between my company and client)
I have setup all in one Exchange Server 2007 (HT-CAS-MBx role) and alrady got the SSL certificate for securing my OWA, so does this means by default TLS security is happening here ?

I notice that i alrady setup the TLS option in the receive connector.

any comments would be greatly appreciated.

Thanks,
0
Comment
Question by:jjoz
3 Comments
 
LVL 5

Accepted Solution

by:
danubian earned 668 total points
ID: 33451997
0
 
LVL 2

Assisted Solution

by:zsaurabh
zsaurabh earned 664 total points
ID: 33453124
Please see the doc attached.
How-to-secure-remote-desktop-con.doc
0
 
LVL 5

Assisted Solution

by:Shibu Kuttan
Shibu Kuttan earned 668 total points
ID: 33461905
Hi,

Testing Domain-Secured Mail Flow
After you have configured domain-secured e-mail, you can test the connection by reviewing the performance logs and the protocol logs. Messages that have successfully authenticated over the domain-secured mail flow path are displayed in Outlook 2007 as "Domain Secure" messages.

please read Testing Domain-Secured Mail Flow on the below link
http://technet.microsoft.com/en-us/library/bb123543(EXCHG.80).aspx

Thanks.
0

Featured Post

Veeam and MySQL: How to Perform Backup & Recovery

MySQL and the MariaDB variant are among the most used databases in Linux environments, and many critical applications support their data on them. Watch this recorded webinar to find out how Veeam Backup & Replication allows you to get consistent backups of MySQL databases.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Microsoft Jet database engine errors can crop up out of nowhere to disrupt the working of the Exchange server. Decoding why a particular error occurs goes a long way in determining the right solution for it.
In this post, we will learn to set up the Group Naming policy and will see how it is going to impact the Display Name and the Email addresses of the Group.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Exchange organizations may use the Journaling Agent of the Transport Service to archive messages going through Exchange. However, if the Transport Service is integrated with some email content management application (such as an anti-spam), the admin…
Suggested Courses

581 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question