Solved

Exchange 2007 SP3 + Active Sync

Posted on 2014-11-11
6
103 Views
Last Modified: 2014-11-13
I am looking for a solution, where users via their devices, that use Microsoft's active sync go through say webmail01.xyz.com.

When they go through OWA they go through webmail02.xyz.com.  I want this URL  not to use active sync at all.

Can this be done via Exchange 2007 SP3?

thanks
0
Comment
Question by:techgenious
  • 3
  • 3
6 Comments
 
LVL 33

Expert Comment

by:it_saige
ID: 40435997
Theoretically, you could, but I have to ask, is there a specific reason why?

-saige-
0
 

Author Comment

by:techgenious
ID: 40436093
Yes  more for security reasons to separate the two.
How can it be done ?
0
 

Author Comment

by:techgenious
ID: 40436102
It was asked by management and they want them separated due to security reasons ?
Thanks
0
NAS Cloud Backup Strategies

This article explains backup scenarios when using network storage. We review the so-called “3-2-1 strategy” and summarize the methods you can use to send NAS data to the cloud

 
LVL 33

Accepted Solution

by:
it_saige earned 500 total points
ID: 40436123
Simply changing the url does not change the security landscape.  Management has to understand, that whether one address or many are used, ultimately, the service requests for OWA and ActiveSync, get answered by the same mechanism, your CAS [or Client Access Server].  The key is securing each of the services path's to the CAS [e.g. - Using SSL, WindowsIntegrated Authentication and FBA (Forms Based Authentication)].

More on Securing an Exchange 2007 Client Access Server:
http://www.msexchange.org/articles-tutorials/exchange-server-2007/mobility-client-access/securing-exchange-2007-client-access-server-3rd-party-san-certificate.html
http://technet.microsoft.com/en-us/library/bb400932(v=exchg.141).aspx

More on Hardening Exchange Server 2007:
http://www.msexchange.org/articles-tutorials/exchange-server-2007/security-message-hygiene/hardening-exchange-server-2007-part1.html

-saige-
0
 

Author Comment

by:techgenious
ID: 40436567
Thanks Saige let me check those articles.

The overall issue they have is, if you are able to obtain my user ID & password you can get into our network.
We want to have a infrastructure where, if the device is not configured to enter our network, then they cannot get in.

Example:
configuring their email with the stolen user ID & Password and getting the users email.  We want it where devices are also are authorized the internal network.
0
 
LVL 33

Expert Comment

by:it_saige
ID: 40437505
0

Featured Post

Being driven mad by email signature updates?

Having to make a change to your users’ email signatures, yet again? Feel like your head is going to explode? Rely on an Exclaimer email signature management solution to make the process simple!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Prevent spoofed emails for Office 365 customer 4 45
AD RMS - Exchange 2010 3 37
exchange 19 40
Exchange: Unable to mount datase missing log files. Events 9518 and 455 6 38
Lotus Notes – formerly IBM Notes – is an email client application, while IBM Domino (earlier Lotus Domino) is an email server. The client possesses a set of features that are even more advanced as compared to that of Outlook. Likewise, IBM Domino is…
Scam emails are a huge burden for many businesses. Spotting one is not always easy. Follow our tips to identify if an email you receive is a scam.
In this video we show how to create a mailbox database in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.: First we need to log into the Exchange Admin Center. Navigate to the Servers >> Data…
In this Micro Video tutorial you will learn the basics about Database Availability Groups and How to configure one using a live Exchange Server Environment. The video tutorial explains the basics of the Exchange server Database Availability grou…

932 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now