Exchange Server Security News
May 01, 2014
Administrators stuck on Windows XP, which hit end-of-life in April, were granted a small reprieve when Microsoft released a patch for an IE bug.
January 15, 2007
SearchExchange.com's editors sat down this past fall to assess the 2006 crop of third-party Exchange Server administration products. Find out what products made our "A" list.
January 09, 2007
Microsoft starts the year with security updates for Excel, Outlook and Windows. Three of the fixes are rated critical.
October 31, 2006
In October alone, security firm Akonix Systems tracked 88 attacks that used instant messaging programs to spread. Attackers are also exploiting P2P programs.
Exchange Server Security Get Started
Bring yourself up to speed with our introductory content
Based on your clicks, here are the top 10 most popular Exchange Server administration tips from 2006. From enhancing Exchange Server memory and performance to tackling Exchange Server compatibility and authentication issues, these topics piqued your... Continue Reading
Tech or treat! Here's a gruesome collection of Halloween horror for technophiles and technophobes alike. How many of these terrifying IT terms can you guess without shrieking? Continue Reading
Everyone wants their systems to be secure. But how much do you know about different types of security attacks? Take our quiz and test your knowledge about the tricks, traps and dirty techniques of security hackers and crackers. Continue Reading
Evaluate Exchange Server Security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
SpoofStick is a free browser toolbar that helps defeat phishing scams by telling users exactly what domain they're in at any given time. Continue Reading
Product ReviewsPowered by IT Central Station
The FortiGate security appliances. UTM security in a single device, good administrative interface and performances.Powered by IT Central Station
First things first Talking about FortiGate from Fortinet we are talking about a family of UTM (Unified Threat Management) appliances. This...Continue Reading
It makes the discovery of applications and classification of user traffic simple but I'd like to see a roadmap for SSL decryption.Powered by IT Central Station
Valuable Features: I'm most impressed with the visibility and control SourceFire solutions provide in to the types of traffic flowing in and out...Continue Reading
For price criteria, Fortinet wins over competitors. That being said, certain areas of the product need improvementPowered by IT Central Station
Valuable Features: <ul> <li>Performances</li> <li>VDOM</li> <li>UTM</li> <li>Consolidated...Continue Reading
Manage Exchange Server Security
Learn to apply best practices and optimize your operations.
Discover three different methods for determining what ports are in use by Exchange Server -- RPCDUMP, Netstat and Tasklist. Continue Reading
Learn about client-side and server-side security features in Exchange Server 2003, including Kerberos authentication, SSL security, and RPC over HTTP. Continue Reading
Mobile security can no longer be an afterthought. Mobile experts say security starts, but doesn't end, with policy. Continue Reading
Problem Solve Exchange Server Security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Making changes to the definitions of Internet Explorer security zones can cause OWA to malfunction, particularly if it's done by a user who isn't well- versed in OWA's security zone setting requirements. Continue Reading
A bare linefeed is a single linefeed character that isn't preceded by an ASCII carriage return. In some instances, virus scanners or security appliances will insert bare linefeeds into an Exchange Server email and cause delivery failures. Continue Reading
Protocol logging lets you see the commands that clients are sending to your Exchange server. If you detect suspicious SMTP, NNTP or HTTP traffic patterns, you can take action before they become a problem. Protocol logs are also an excellent forensic... Continue Reading