Solved

Secure logon

Posted on 2011-03-07
5
242 Views
Last Modified: 2012-05-11
My Exchange organisation contain two back-end

server and four front-end server. All servers

run Exchange 2003. A new written security

policies require encryption for all internet

connections to the front-end servers. You try

modify the configuration of each font-end

server,but the SSL encrypton option is

unavailable on each one

I need to ensure that users can use SSL to

secure Internet-based e-mail connections?

A.Obtain and install a server encrytion

certificate on each font-end server

B.Obtain and install  a server encrytion

certificate on each back-end server

C. Install and configure the Key Management

Service on a new front-end server

D.Install and configure Microsoft Certificate

Services on each back-end server

A. Since logon is from front end
0
Comment
Question by:kunalclk
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
5 Comments
 
LVL 26

Expert Comment

by:e_aravind
ID: 35071390
In E2k3,
IMO, OWA and Outlook-Anywhere clients will connect from remote locations...which are already having an SSL certificate and ssl negotiations.

What are the other data-paths which you are planning\concentrating ON?
0
 
LVL 2

Author Comment

by:kunalclk
ID: 35174078
hello e_aravind, I need to do configure IP phone using OMA. Please tell what is key management service? Should I go for the a.?
0
 
LVL 26

Expert Comment

by:e_aravind
ID: 35179924
IMO,
KMS -- Key Management Service is an Older version of the "Certificate Services" in W2k3 servers

Reference:
========
http://technet.microsoft.com/en-us/library/cc751024.aspx#EGAA

Chapter 9 - Ensuring Messaging Security

Introduction to PKI and KMS

In versions of Exchange prior to Exchange 5.5 Service Pack 1, the Key Management Server (KMS) acted as its own Certification Authority (CA). This meant that it was a self-contained, independent unit within Exchange capable of issuing security certificates.


Plan:
===
with KMS or CA...we will end-up in getting an cert. for the SSL

What is the response of the https://localhost/OMA...this should give you the browser based low-level client to your mailbox
0
 
LVL 26

Accepted Solution

by:
e_aravind earned 500 total points
ID: 35179932
Configuring Outlook Mobile Access
http://technet.microsoft.com/en-us/library/aa998981(EXCHG.65).aspx

To access Exchange 2003 using Outlook Mobile Access, users must have a mobile device from a mobile operator who has an established data network for mobile data. However, before your users connect to Exchange 2003 and use Outlook Mobile Access, they need to know how to access their Exchange server and use Outlook Mobile Access. You must therefore instruct them about how to configure their devices to use a mobile network, or provide them with resources that explain how to do so.



How to Access Exchange Data Using Outlook Mobile Access
http://technet.microsoft.com/en-us/library/aa998390(EXCHG.65).aspx
0
 
LVL 2

Author Closing Comment

by:kunalclk
ID: 35335485
thnx
0

Featured Post

Free Tool: Postgres Monitoring System

A PHP and Perl based system to collect and display usage statistics from PostgreSQL databases.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

This article explains in simple steps how to renew expiring Exchange Server Internal Transport Certificate.
This article aims to explain the working of CircularLogArchiver. This tool was designed to solve the buildup of log file in cases where systems do not support circular logging or where circular logging is not enabled
This tutorial will walk an individual through the steps necessary to enable the VMware\Hyper-V licensed feature of Backup Exec 2012. In addition, how to add a VMware server and configure a backup job. The first step is to acquire the necessary licen…
This tutorial will walk an individual through configuring a drive on a Windows Server 2008 to perform shadow copies in order to quickly recover deleted files and folders. Click on Start and then select Computer to view the available drives on the se…

749 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question