Solved

Exchange 2010 OWA page

Posted on 2013-01-12
5
381 Views
Last Modified: 2013-03-17
Dear Team,

I have deployed owa Sign in and Signout page in Exchange 2010 Env.

I applied in all the CAS server and able to get new owa page in Internal office network.

When i check from Outside of my office network.. I was able to get the signin page in owa and the signout page is not showing the exact one. the signout page shows like signout page and added as its secured by threat management gateway.

I have OWA published in TMG. so how to change the signout page for external network.

Do i need to do any changes in TMG or its normal that it will show as Secured by Threat management gateway when publishing owa in TMG.

Kindly help on this
0
Comment
Question by:sekar_raj32
5 Comments
 

Expert Comment

by:Xavier_arena
ID: 38771237
You need configure logout page using forefront tmg, Check the link

http://blogs.technet.com/b/exchange/archive/2012/11/21/publishing-exchange-server-2013-using-tmg.aspx
0
 
LVL 7

Author Comment

by:sekar_raj32
ID: 38773664
I tried but still not working..

Can you let me know the procedure the apply the signout OWA page in TMG servers.
0
 
LVL 37

Accepted Solution

by:
Jamie McKillop earned 500 total points
ID: 38801330
Hello,

Here are instructions on how to modify the Forms-based OWA authentication pages in TMG.

http://richardkok.wordpress.com/2010/10/22/creating-a-custom-forefront-tmg-2010-owa-fba-logon-page/

JJ
0

Featured Post

Is Your AD Toolbox Looking More Like a Toybox?

Managing Active Directory can get complicated.  Often, the native tools for managing AD are just not up to the task.  The largest Active Directory installations in the world have relied on one tool to manage their day-to-day administration tasks: Hyena. Start your trial today.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Large Outlook files lead to various unwanted errors and corruption issues. Furthermore, large outlook files can also make Outlook take longer to start-up, search, navigate, and shut-down. So, In this article, i will discuss a method to make your Out…
Read this checklist to learn more about the 15 things you should never include in an email signature.
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles from a Windows Server 2008 domain controller to a Windows Server 2012 domain controlle…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

822 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question