Markus Klein

I've been working for about 20 year in IT with a focus on Microsoft technologies, specifically the cloud. I work on Azure at a huge German Service Provider and have also implemented it as an architect with smaller customers.

Configuring ISA Server 2004 as an Exchange Frontend Server in the DMZ (Part 1)

Ever since ISA Server 2004 has been available, there have been quite different opinions on which is the best design strategy for publishing Exchange Server 2003 services securely on the web. Within this drill down we will delve a little bit deeper into the configuration details on how to make your Exchange Server 2003 publishing as secure as possible using ISA Server 2004 taking into consideration the ideas of the Exchange product team.

Booking Resources with Exchange Server 2003 and Outlook System 2003

After a successful implementation of Microsoft Exchange Server 2003, the next step would be implementing lots of improvements within the working processes of the company and its organizational infrastructure. Many companies are willing to plan their company resources using Exchange and Outlook to make it easier for each employee to find out if a resource is already booked or still available.

Configuring S/MIME Security with Outlook Web Access 2003

Email Security has become increasingly important because of the possibility of man-in-the-middle attacks or the risk of an unknown third person that may sniff your SMTP traffic within the internet or even your intranet. In addition, in some countries there are laws preventing you from sending insecure email. Therefore Microsoft implemented the S/MIME standard in its Exchange Server architecture. The feature to encrypt or sign your emails became a default feature within all messaging and collaboration systems. Within this article we will look at how S/MIME has to be configured and how it works.

Free/Busy Folders in Exchange Server 2003 in Depth

With every Exchange Server environment, you as the administrator have to deal with the free/busy functionality and its problems. To understand how this works and what you have to consider in projects and processes, this article will dive a little bit deeper into this topic. We will have a close look at the system folder itself and how to deal with this topic during migrations and normal work troubleshooting topics.

Scroll to Top