User Authentication for Microsoft Outlook and OWA News
November 03, 2015
The preview of the Azure AD PowerShell module flexes its muscles by supporting MFA and device management.
August 13, 2013
In Microsoft's August Patch Tuesday update, the company patched a range of vulnerabilities in Internet Explorer, Exchange and more.
May 15, 2006
Content filtering provider AppRiver reports an attack gaining momentum by using trusted systems to push malware before anyone notices.
September 30, 2004
The following is tip #3 from "8 Exchange 2003 security tips in 8 minutes."
User Authentication for Microsoft Outlook and OWA Get Started
Bring yourself up to speed with our introductory content
Vouch By Reference (VBR) is a protocol for adding third-party certification to email. The first part of the protocol requires the sender to add information to their email header by creating a field called VBR-Info. Continue Reading
Based on your views, here are the top five Microsoft Outlook Web Access (OWA) tips of 2008. Discover how to customize an OWA authentication logon, fix message size limits, repair damaged virtual directories and more with this collection of top tips. Continue Reading
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Manage User Authentication for Microsoft Outlook and OWA
Learn to apply best practices and optimize your operations.
Built-in OWA security features may not be enough to secure direct file access. If you can't disable the feature, what's the next best security measure? Continue Reading
Two big Outlook Web Access security issues are email attachments and OWA user authentication. Get tips on how to improve Outlook Web Access security here. Continue Reading
In Exchange 2003, OWA authentication requires, by default, a domain name and username to log on. Learn how to customize the OWA logon to avoid this hassle. Continue Reading
Problem Solve User Authentication for Microsoft Outlook and OWA Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Hackers corrupted my Exchange 2010 files, so now I can't open them. How can I restore my server and prevent this from happening again? Continue Reading
Microsoft discontinued support for NTLM in Exchange 2010 RTM, then reinstated it in Exchange 2010 SP1. But is it a good way to authenticate to Exchange? Continue Reading
Many security features in Exchange Server rely on SSL. Obtaining trusted certificates can tighten security and boost performance for SSL-based applications, including OWA and Exchange mobile devices. Continue Reading