<

Exchange 2019 - Change the cypher suites using IIS Crypto 3.0

Posted on
3,071 Points
71 Views
Last Modified:
Published
Experience Level: Beginner
4:21
Edward van Biljon
Experienced Messaging Specialist with a demonstrated history of working in the information technology and services industry.
In today's world, any protocol that is vulnerable is attacked and allows a remote attacker to gain access to the system and compromise your environment.

In this video we look at how you can launch the IIS Crypto application and navigate through the Schannel options and turn off older algorithms like DHE etc.
0
0 Comments
What to do if there looks to be a compromise of on-premises Exchange. This list is _not_ complete but an aggregate of the various things we have in our toolbox.
This article explain the need of relay connector in Exchange and how to create relay connector in Exchange server.