Search Results for: remote work

Supporting ISA Server 2000 Publishing of Exchange Server 2000/2003 with SMTP Relays – Part 3: Creating a Simple Anonymous Inbound SMTP Relay and Links to More Resources

In part 1 of this three part series on SMTP relays we talked about the definition and functions of an SMTP relay and how they’re used to protect Exchange Servers protected by an ISA Server firewall. In part 2 we went into more detail and described the features and functions of the various types of SMTP relays used in production networks. Make sure to check out these articles if you haven’t had a chance to do so yet. In this article you get the step by steps to create a secure non-authenticating inbound SMTP relay.

Introducing the ISA Server 2000 Exchange Server 2000/2003 Deployment Kit – Getting the Most Out of The Firewall for Microsoft Exchange Server

The ISA Server 2000 Exchange 2000/2003 Deployment Kit is here! Answers to all your questions regarding Exchange Server publishing and remote access to Exchange Server services via ISA Server firewalls are found in the kit. Check out this article for an intro to the kit and download links.

Changes to Default Settings Make Windows Server 2003 More Secure (Part 2)

Microsoft has made a number of changes to the default settings in Windows 2003 to make it more secure “out of the box.” In Part 2, we’ll examine the changes that have been made to the default settings for common services and changes in the authentication process, and we’ll discuss some areas in which some believe that Server 2003’s defaults are still too open.

Supporting ISA Server 2000 Publishing of Exchange Server 2000/2003 with SMTP Relays – Part 2: Types of SMTP Relays

In part 1 of this series on SMTP relays, we went over what an SMTP is, what it does and why you want one. Head on over to http://www.msexchange.org/articles/smtprelaypart1.html to read part 1 if you haven’t had a chance to look at it yet. In this, part 2 of our three part series on SMTP relays, we’ll go over the different types of SMTP relays you can use to protect and enhance your Exchange Server. I’ll explain the different types of SMTP relays you can use for both inbound and outbound access and the advantages provided by each relay type.

Announcing Beta 2 of the ISA Server 2000 Exchange Server 2000/2003 Deployment Kit

Thanks to everyone who contributed suggestions, recommendations and enhancements to the ISA Server 2000 Exchange Server 2000/2003 Deployment Kit beta 1 release. I’ve been able to incorporate a number of changes and additions to the ISA Server 2000 Exchange Server 2000/2003 Deployment Kit documents based on your suggestions. If you haven’t seen a change based on your suggestion made yet, don’t worry. I’m still trying to catch up with your mail and will make the changes ASAP. I appreciate the input you’ve sent to me a [email protected] and hope to get even more.

Announcing Beta 2 of the ISA Server 2000 Exchange Server 2000/2003 Deployment Kit

Thanks to everyone who contributed suggestions, recommendations and enhancements to the ISA Server 2000 Exchange Server 2000/2003 Deployment Kit beta 1 release. I’ve been able to incorporate a number of changes and additions to the ISA Server 2000 Exchange Server 2000/2003 Deployment Kit documents based on your suggestions. If you haven’t seen a change based on your suggestion made yet, don’t worry. I’m still trying to catch up with your mail and will make the changes ASAP. I appreciate the input you’ve sent to me a [email protected] and hope to get even more.

Securing the Windows 2000 Registry

One key security practice that is often overlooked by admins is the Windows registry. In addition to configuration information, the registry contains security contexts that can be used to elevate a user’s privilege. If left unsecured, it is a good platform from which a hacker can use to gain access to administrative functions of the computer, and even possibly the domain as well.

MSExchange.org Server Based Antispam Comparison

With the multitude of antispam solutions for Exchange, choosing the one that's suited to your network's present and future needs is no simple task. That's why we have prepared this feature comparison in which eight of the leading vendors of antispam solutions have participated. By comparing the features of these solutions side by side, you should be able to get a clearer picture of which solution is the best overall and which one will provide you with the best value for money, ensuring that the solution that you eventually pursue turns out to be the right one.

Scroll to Top