Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions

Exchange 2007 SP3 + Active Sync

Posted on 2014-11-11
Last Modified: 2014-11-13
I am looking for a solution, where users via their devices, that use Microsoft's active sync go through say webmail01.xyz.com.

When they go through OWA they go through webmail02.xyz.com.  I want this URL  not to use active sync at all.

Can this be done via Exchange 2007 SP3?

Question by:techgenious
  • 3
  • 3
LVL 33

Expert Comment

ID: 40435997
Theoretically, you could, but I have to ask, is there a specific reason why?


Author Comment

ID: 40436093
Yes  more for security reasons to separate the two.
How can it be done ?

Author Comment

ID: 40436102
It was asked by management and they want them separated due to security reasons ?
PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

LVL 33

Accepted Solution

it_saige earned 500 total points
ID: 40436123
Simply changing the url does not change the security landscape.  Management has to understand, that whether one address or many are used, ultimately, the service requests for OWA and ActiveSync, get answered by the same mechanism, your CAS [or Client Access Server].  The key is securing each of the services path's to the CAS [e.g. - Using SSL, WindowsIntegrated Authentication and FBA (Forms Based Authentication)].

More on Securing an Exchange 2007 Client Access Server:

More on Hardening Exchange Server 2007:


Author Comment

ID: 40436567
Thanks Saige let me check those articles.

The overall issue they have is, if you are able to obtain my user ID & password you can get into our network.
We want to have a infrastructure where, if the device is not configured to enter our network, then they cannot get in.

configuring their email with the stolen user ID & Password and getting the users email.  We want it where devices are also are authorized the internal network.
LVL 33

Expert Comment

ID: 40437505

Featured Post

Problems using Powershell and Active Directory?

Managing Active Directory does not always have to be complicated.  If you are spending more time trying instead of doing, then it's time to look at something else. For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Read this checklist to learn more about the 15 things you should never include in an email signature.
This article aims to explain the working of CircularLogArchiver. This tool was designed to solve the buildup of log file in cases where systems do not support circular logging or where circular logging is not enabled
In this video we show how to create a User Mailbox in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.: First we need to log into the Exchange Admin Center. Navigate to the Recipients >> Mailb…
In this Micro Video tutorial you will learn the basics about Database Availability Groups and How to configure one using a live Exchange Server Environment. The video tutorial explains the basics of the Exchange server Database Availability grou…

792 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question