intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Course 2824B: Implementing Microsoft internet security and acceleration server 2004 - Module 6

Chia sẻ: Nothing Nothing | Ngày: | Loại File: PPT | Số trang:34

50
lượt xem
4
download
 
  Download Vui lòng tải xuống để xem tài liệu đầy đủ

Module 6: Integrating ISA Server 2004 and Microsoft Exchange Server. This module explains how Microsoft Exchange Server is a critical network service that is virtually always accessible from the Internet and how ISA Server 2004 can be used to provide security for Exchange Server and for securing client connections to Exchange.

Chủ đề:
Lưu

Nội dung Text: Course 2824B: Implementing Microsoft internet security and acceleration server 2004 - Module 6

  1. Module 6: Integrating ISA Server 2004 and Microsoft Exchange Server
  2. Overview Issues in E-Mail Security Configuring ISA Server to Secure SMTP Traffic Configuring ISA Server to Secure Web Client Connections Configuring ISA Server to Secure Client Connections
  3. Lesson: Issues in E-Mail Security E-Mail Security Threats Overview E-Mail Access Using Web Clients E-Mail Access Using Outlook Clients E-Mail Access Using POP3, IMAP4, and NNTP Clients SMTP Protocol-Level Exploits Unwanted and Malicious E-Mail How ISA Server 2004 Secures Exchange Server
  4. E-Mail Security Threats Overview Ensuring the security of e-mail includes: Ensuring that all e-mail client connections to the e-mail server are secure Protecting the e-mail servers from SMTP exploits Preventing unwanted or malicious e-mails from entering the organization’s network
  5. E-Mail Access Using Web Clients Outlook Mobile Access ActiveSync XHTML, cHTML, HTML Enabled Mobile Devices Exchange Front-End Server Wirele ss Netwo rk ISA Server Exchange Back-End Servers Outlook Web Access
  6. E-Mail Access Using Outlook Clients Exchang Port 135 and dynamic e ports Front- End Outlook RPC Server Connections ISA Serve Outlook RPC Exchang r over HTTP e Connections Back- End Port 80 or 443 Servers
  7. E-Mail Access Using POP3, IMAP4, and NNTP Clients Exchang Port 110 or 995 Port 25 e Front- End POP3 Server Connections ISA Serve r IMAP4 Exchang Connections e Back- End Port 143 or 993 Port Servers 25
  8. SMTP Protocol-Level Exploits SMTP servers can be vulnerable to: Buffer overflow attacks when SMTP commands are sent with more than expected data, causing memory buffer overflows Mail relay attacks when an SMTP server is used to forward unwanted e-mail to Internet recipients SMTP command attacks where SMTP commands are used to compromise the server or gain information about the server or recipients on the server
  9. Unwanted and Malicious E-Mail Unwanted e-mail is unsolicited commercial Consumes e-mail that: server and network resources Reduces user productivity and increases administrative effort Can be filtered using an application-level filter May result in exposure to legal liability Malicious e-mails contain viruses or worms that: Damage data or computers or consume network and computer resources Increase administrative cost and effort Increase the risk of an information leak
  10. How ISA Server 2004 Secures Exchange Server Mail publishing Exchang wizards e Secure access Front- for Web End clients Server Secure ISA access Exchang Serve for Outlook e r clients Back- End Servers Filtering unwanted e- mail SMTP command filtering
  11. Lesson: Configuring ISA Server to Secure SMTP Traffic How ISA Server Secures SMTP Traffic How to Configure ISA Server to Secure SMTP Traffic How SMTP Filtering Works How to Configure the SMTP Application Filter How SMTP Message Screener Works How to Implement SMTP Message Screener Integrating ISA Server and Exchange Server to Secure SMTP Traffic
  12. How ISA Server Secures SMTP Traffic Use Mail Publishing Wizard to publish Exchang SMTP Servers e Front- End Server Use SMTP application filter to filter SMTP ISA commands Serve Exchang r e SMTP Back- End Serve Servers r Use SMTP message screener to filter unwanted e-mail
  13. How to Configure ISA Server to Secure SMTP Traffic To configure ISA Server to secure SMTP Configure MX records on the Internet traffic: 1 servers to refer to the computer running ISA Server Use the Mail Server Publishing Wizard 2 to publish the SMTP server Configure the internal SMTP servers 3 as SecureNAT clients Configure an access rule for internal 4 SMTP servers to send e-mail to the Internet Configure DNS so the Internal SMTP 5 servers can resolve Internet host names
  14. Practice: Publishing an SMTP Server Creating the Internet DNS records Configuring a new SMTP mail server publishing rule Configuring outbound SMTP traffic Gen-Web-01 Testing SMTP traffic flow Den-ISA-01 Internet Den-Msg-01Den-DC-01
  15. How SMTP Filtering Works Is the … Exchang Command allowed? e Command length allowed? Front- End Server SMTP Serve r ISA Exchang Serve EHLO contoso.com e r Mail from: Ben@contoso.com Back- End Rcpt to: Jay@cohovineyard.com Servers Data
  16. How to Configure the SMTP Application Filter
  17. How SMTP Message Screener Works Install Message Screener Is the … Source Host allowed? IIS 6.0 Source Domain allowed? With Attachment allowed? SMTP Service Keyword blocked? SMTP Serve r ISA Exchang Serve e r Back- End Servers
  18. How to Implement SMTP Message Screener To implement SMTP message screener: Install the SMTP service on an IIS 5.0 or 1 IIS 6.0 server Install the SMTP message screener on 2 the IIS server Configure an SMTP mail server 3 publishing rule that publishes the SMTP server running message screener Configure the message screener 4 settings on the SMTP filter
  19. Practice: Implementing SMTP Message Screener Install the SMTP service on the computer running ISA Server Install the SMTP message screener Configure the SMTP message screener Test the SMTP message Gen-Web-01 screener Den-ISA-01 Internet Den-Msg-01Den-DC-01
  20. Integrating ISA Server and Exchange Server to Secure SMTP Traffic On the computer running ISA Server. This You can is option deploy message the easiest screener: to configure but least secure On an IIS server in the internal or perimeter network. Using a server in the perimeter network is most complicated to configure, but most secure To filter only inbound messages. Configure ISA Server to publish the message screener server, and configure access rules for the internal SMTP servers to send e-mail to the Internet To filter inbound and outbound messages. Configure ISA Server to publish the message screener server, and configure the internal SMTP servers to route messages to the message screener server
ADSENSE

CÓ THỂ BẠN MUỐN DOWNLOAD

 

Đồng bộ tài khoản
2=>2