Security

Released: ISA 2006 Service Pack 1

ISA Server 2006 SP1 has been released. SP1 brings some new features, and improvements such as support for SAN certificates. Download SP1. New features: Configuration Change Tracking: Registers all configuration changes applied to ISA Server to help you assess issues that may occur as a result of these changes. Test Button: Tests the consistency of […]

More →

ISA 2006 SP1: Support for SAN certs, and new features

When ISA Server 2006 SP1 rolls out this summer, there will be some cool new features to look forward to, including support for SAN certificates. Having started using Proxy Server 1.0 (I know… hold on to your comments for now.. :) back in the days, I turned away from ISA’s predecessor(s) for a few years […]

More →

Removing internal host names and IP addresses from message headers

Another frequently asked question about SMTP mail – how can I remove internal host names and IP addresses from outbound Internet mail? More often than not, this results from the belief that somehow if the outside world finds out an organization’s internal IP addresses and host names, it makes the organization vulnerable. Auditors love to […]

More →

PWN to OWN Contest: Vista gets compromised

Update on the PWN to OWN contest at the CanSecWest conference. After the MacBook Air got compromised in 2 minutes, Shane Macaulay claimed victory over the Fujitsu laptop running Windows Vista. Yes, Windows Vista was compromised at the tail end of Day 2, at 7:30 p.m., thanks to a vulnerability in Adobe Flash. More in […]

More →

Mac, meet PC: PC, the Mac’s already hacked!

The Event: CanSecWest’s PWN 2 OWN contest, Vancouver, CanadaThe Contenders: Mac OS X Leopard, Microsoft’s Windows Vista, and Linux.The Challenge: Compromise the OSThe Prize: $10,000 + laptopThe Winner: Charlie Miller Apparently, the OS that’s safer by design is the first to get compromised, after the rules were relaxed a little bit. 2 minutes is all […]

More →

India wants access to BlackBerry encryption algorithms to fight terrorism

India’s half a million BlackBerry users may have to live with the prospect of the Indian government having easy access to their wireless communication. India says it needs access to RIM’s encryption algorithms, used to encrypt email sent and received by BlackBerry smartphones, to fight terrorism. The Indian government is delaying a license to offer […]

More →

HOW TO: Delegate recipient administration for an OU

Exchange Server 2007 allows easier delegation of administration responsibilities, based on the following predefined administration roles:1) Exchange Organization Administrator 2) Exchange Server Administrator 3) Exchange Recipient Administrator 4) Exchange Public Folder Administrator and 5) Exchange View Only Administrator. Figure 1: Exchange Server 2007 allows delegation of administrative responsibilities The delegation wizard in the EMC allows […]

More →

InfoWorld’s campaign to “Save Windows XP”

I’ve been an avid reader of InfoWorld for as long as I can remember. It is one of the finest trade publications out there. In case you’ve missed it, they’ve been running an online campaign to “save Windows XP”. A few weeks ago, they announced that 75,000 XP users had signed up for it (Read […]

More →

List mailboxes with Full Mailbox Access permission assigned

In “HOW TO: Grant Full Mailbox Access permission“, we saw how to assign and view mailbox permissions, including Full Access. Here’s how you can get a list of mailboxes with explicitly-assigned (i.e. not inherited) Full Access permissions. You can specify a single mailbox and retrieve the permissions assigned on it by using the Get-MailboxPermission cmdlet. […]

More →

Renew self-signed certificates in Exchange 2010 and Exchange 2007

In Exchange 2007 and later, Exchange Setup creates a self-signed certificate to protect communication with Exchange services such as SMTP, IMAP, POP, OWA, EAS, EWS and UM. Exchange’s self-signed certificates meet an important need – securing communication paths for all Exchange services by default. The self-signed certificate meets an important need – securing communication paths […]

More →