programming4us
programming4us
ENTERPRISE

Understanding Exchange Policy Enforcement Security : Implementing Transport Agent Policies on the Edge

- How To Install Windows Server 2012 On VirtualBox
- How To Bypass Torrent Connection Blocking By Your ISP
- How To Install Actual Facebook App On Kindle Fire
The Edge Transport server role is vital in today’s risk-fraught messaging environment as it is responsible for intercepting the onslaught of viruses and spam before they reach the internal network. Special transport rules have been created specifically for Edge servers in Exchange Server 2010. These transport rules include address rewriting policies, content filtering policies, SenderID, and Sender Filtering.

Understanding the Role of EdgeSync in Exchange Policy Management

The EdgeSync service runs as a special synchronization component that keeps specific information from the internal AD forest in sync with an external AD in Application Mode (ADAM) forest. It uses this information to determine if policies have changed.

Implementing Edge Rule Agents

Many of the transport rules in Exchange Server 2010 were designed to work on the Edge Transport role systems. This is especially true for services such as antivirus and antispam. Several other key pieces of functionality are run as policies on Edge Rule agents, as described in this section.

Setting Up Address Rewriting Policies

One of the edge transport rules available by default is the address rewriting policy. This policy allows internal email domains to be rewritten to a common external domain, or any other combination of domain rewriting as necessary.

Address rewriting cannot currently be performed from the graphical user interface (GUI)—it must be scripted. The following illustrates a sample script to set up a rewriting policy:

New-AddressRewriteEntry -name "marina@abc.internal to marina@companyabc.com"
-InternalAddress marina@abc.internal -ExternalAddress marina@companyabc.com


This sample policy rewrites any instance of marina@abc.internal to marina@companyabc.com.

Configuring Content Filtering Policies

Edge Server role systems have a built-in Content filter running to provide for antispam and antivirus functionality. This agent serves as a direct replacement for the Exchange 2003 Intelligent Message Filter (IMF). The agent works by assigning a Spam Confidence Level of 1-9 for an email. The higher the number, the more likely it is to be spam. Removing the junk messages at the edge is the best way to reduce the load that this type of environment has on the current messaging environment.

Working with Sender Filtering Policies

Sender filtering on an Edge Transport role server allows for antispam functionality on the edge. It can be easily enabled or disabled for a server by following the command outlined as follows:

1.
On the Edge server in Exchange Management Console, click Edge Transport.

2.
In the work pane, click the Antispam tab.

3.
Click Sender Filtering.

4.
Click either the Disable or Enable action, depending on how you want to set it up.

Understanding and Configuring SenderID

SenderID is an antispam framework that defines how organizations can create special domain name system (DNS) records, known as Sender Policy Framework (SPF) records, to easily verify that they really are who they purport to be.

SenderID can be disabled or enabled on an Edge Transport server via the following process:

1.
On the Edge server in Exchange Management Console, click Edge Transport.

2.
In the work pane, click the Antispam tab.

3.
Click Sender ID.

4.
Click either the Disable or Enable action, depending on the action desired.

Other  
  •  Safeguarding Confidential Data in SharePoint 2010 : Using Active Directory Rights Management Services (AD RMS) for SharePoint Document Libraries
  •  Safeguarding Confidential Data in SharePoint 2010 : Enabling TDE for SharePoint Content Databases
  •  Safeguarding Confidential Data in SharePoint 2010 : Using SQL Transparent Data Encryption (TDE)
  •  Safeguarding Confidential Data in SharePoint 2010 : Enabling SQL Database Mirroring
  •  Safeguarding Confidential Data in SharePoint 2010 : Outlining Database Mirroring Requirements
  •  Remote Administration of Exchange Server 2010 Servers : RDP with Exchange Server 2010 (part 2)
  •  Remote Administration of Exchange Server 2010 Servers : RDP with Exchange Server 2010 (part 1) - Planning and Using Remote Desktop for Administration
  •  Remote Administration of Exchange Server 2010 Servers : Using the ECP Remotely
  •  Safeguarding Confidential Data in SharePoint 2010 : Examining Supported Topologies
  •  SharePoint 2010 : SQL Server Database Mirroring for SharePoint Farms
  •  
    Top 10
    - Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
    - Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
    - Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
    - Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
    - Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
    - Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
    - Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
    - Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
    - Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
    - Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
    REVIEW
    - First look: Apple Watch

    - 3 Tips for Maintaining Your Cell Phone Battery (part 1)

    - 3 Tips for Maintaining Your Cell Phone Battery (part 2)
    programming4us programming4us
    programming4us
     
     
    programming4us