Your Ad Here

Saturday, May 30, 2009

Introduction to Hosting Exchange 2000 Enterprise Server

This session will introduce the new features and technologies in Microsoft Exchange 2000 Enterprise Server that are targeted at the application service provider business. In this high-level overview, we will discuss design, implementation, as well as management options and considerations to be taken into account when deploying Exchange 2000 as a hosted service.

This is a session that was recorded November 30, 2000 and presented by Jeff Strasser. Jeff Strasser is a Support Professional in the Microsoft Business Applications - Server group. He has focused his support efforts towards application service providers (informally known as ASPs) and Exchange 2000 issues specific to their needs. Currently, Jeff is working on the Microsoft Mobile Information Server Beta program which will allow wireless access to retrieve Exchange data.

Viewing the Presentation



Collapse this imageExpand this image
View this Support     WebCast
To view, please click on the link: View this Support Webcast (Length: 1 hour 16 minutes)

This Windows Streaming Media archive requires an Internet connection of 28.8 Kbps or faster, and is best viewed with a minimum screen resolution of 800 X 600.

Additional Resources



Collapse this imageExpand this image
Download the     presentation
Download presentation (http://download.microsoft.com/download/7/6/3/76321006-30f1-46ed-bd33-20f530b3763f/wc113000.exe) wc113000. This is a 549-KB Microsoft PowerPoint (.ppt) file.
If you do not have PowerPoint and you want a copy of the slides, use the PowerPoint Viewer (http://office.microsoft.com/downloads/2000/Ppview97.aspx) (1,911 KB).

Collapse this imageExpand this image
Read the     transcript
Read the transcript from this Support WebCast (http://support.microsoft.com/?scid=http%3a%2f%2fsupport.microsoft.com%2fservicedesks%2fwebcasts%2fen%2fwc113000%2fwct113000.asp)

Collapse this imageExpand this image
Tell a     friend
Tell a friend about this Support WebCast (mailto:?subject=Support WebCast: Introduction to Hosting Exchange 2000 Enterprise Server&body=Take a look at this Microsoft Support WebCast about Introduction to Hosting Exchange 2000 Enterprise Server (November 30, 2000). More information about this WebCast is available at http://support.microsoft.com/WebCasts.)

Collapse this imageExpand this image
Supplemental     reading
Supplemental reading: Provide Feedback on this Broadcast (http://support.microsoft.com/common/survey.aspx?scid=sw;en;1073&p0=wc&p1=en-us&p2=WC113000)
Read more!

Wednesday, April 29, 2009

what is DNS Server

WHAT IS A DNS SERVER ?
The Domain Name System (DNS) is a standard technology for managing the names of Web sites and other Internet domains. DNS technology allows you to type names into your Web browser like compnetworking.about.com and your computer to automatically find that address on the Internet. A key element of the DNS is a worldwide collection of DNS servers. What, then, is a DNS server?


Answer: A DNS server is any computer registered to join the Domain Name System. A DNS server runs special-purpose networking software, features a public address, and contains a database of network names and addresses for other Internet hosts.
DNS Root Servers
DNS servers communicate with each other using private network protocols. All DNS servers are organized in a hierarchy. At the top level of the hierarchy, so-called root servers store the complete database of Internet domain names and their corresponding IP addresses. The Internet employs 13 root servers that have become somewhat famous for their special role. Maintained by various independent agencies, the servers are aptly named A, B, C and so on up to M. Ten of these servers reside in the United States, one in Japan, one in London, UK and one in Stockholm, Sweden.
DNS Server Hierarchy
The DNS is a distributed system, meaning that only the 13 root servers contain the complete database of domain names and IP addresses. All other DNS servers are installed at lower levels of the hierarchy and maintain only certain pieces of the overall database.
Most lower level DNS servers are owned by businesses or Internet Service Providers (ISPs). For example, Google maintains various DNS servers around the world that manage the google.com, google.co.uk, and other domains. Your ISP also maintains DNS servers as part of your Internet connection setup.
DNS networking is based on the client / server architecture. Your Web browser functions as a DNS client (also called DNS resolver) and issues requests to your Internet provider's DNS servers when navigating between Web sites.
When a DNS server receives a request not in its database (such as a geographically far away or rarely visited Web site), it temporarily transforms from a server to a DNS client. The server automatically passes that request to another DNS server or up to the next higher level in the DNS hierarchy as needed. Eventually the request arrives at a server that has the matching name and IP address in its database (all the way to the root level if necessary), and the response flows back through the chain of DNS servers to your client.
DNS Servers and Home Networking
Computers on your home network locate a DNS server through the Internet connection setup properties. Providers give their customers the public IP address(es) of primary and backup DNS servers. You can find the current IP addresses of your DNS server configuration via several methods:
· on the configuration screens of a home network router
· on the TCP/IP connection properties screens in Windows Control Panel (if configured via that method)
· from ipconfig or similar command line utility


Read more!

Tuesday, April 28, 2009

Microsoft Small Business Server 2003 Spam Filtering

This article takes an in-depth look at the spam filtering features provided with Microsoft SBS 2003 and how to implement them.

Unsolicited commercial email (UCE), generally known as spam, is becoming a bigger and bigger problem for each company and even home users. A lot of time has to be spent on filtering which emails are spam and which are not. So an important task of each Server Administrator who has the responsibility of the Messaging and Collaboration Server System, is to implement a good SPAM Email Filtering System.

Microsoft provides lots of features with Exchange Server 2003 Service Pack 2 to filter Spam and provides a solution to reduce the amount of time spent on filtering SPAM.

These features are included within Exchange Server 2003 and, due to this, are part of each Small Business Server 2003 Implementation within this solution.

Within this article we will now take an in-depth look at the features themselves and how to implement them.




Connection Level Protection

Protecting against SPAM at the connection level has been the best defense for years, because this means that SPAM will never enter the company’s network. This feature does nothing more than evaluate incoming SMTP connections for potential SPAM. If the connection SMTP host is a well known Spammer, the connection can be dropped.

Exchange itself provides two ways for connection level SPAM protection.

IP Connection Filtering

IP Connection filtering is a configurable setting within Exchange Server 2003 that can totally block SMTP connections based on IP-Addresses. This is a rudimentary method of protection because the connection filtering lists need to be administered manually. In addition to this you can allow special explict SMTP connections.


Figure 1: IP-Address Filtering

Real-Time Block Lists

With Exchange Server 2003, you will have a new and more dynamic way of providing connection level protection. This feature is called Real-Time Block Lists. These lists are known as SPAM sources, open relays or part of an IP range. But these lists should not include STMP hosts which are the same as a provider’s dial-up connection. This would lead to thousands of emails sent by dial-up users being rejected.

Block List providers are 3rd party organizations that collect IP addresses of internet SMTP domains. When a host initiates an SMTP session with a subscriber of a block list service, the subscriber issues a DNS query to the block list provider’s DNS Server with the sender’s host IP address. The block list server then checks whether the connecting host is on the block list or not.

To enable this feature you have to install Exchange Server 2003 Service Pack 2 because, in earlier versions of Exchange Server 2003, only the connection host was relevant and not the sending host, which meant that firewalls or SMTP hosts in between could be Spammers. This has been achieved by providing perimeter IP lists and an internal IP range configuration in Exchange System Manager.


Figure 2: Block List Filtering (1)


Figure 3: Block List Filtering (2)


Figure 4: Block List Filtering (3)


Figure 5: Block List Filtering (4)

Protocol Level Protection

Protocol level protection against SPAM is another way of filtering spam in the next layer of defense at the SMTP protocol level. The SMTP traffic between sending and receiving hosts is analyzed to verify that the sender and the recipient are allowed hosts.

Recipient and Sender Blocking

The first way of providing protocol level protection is to define individual senders or domains from who you do not want to accept messages (also known as white and black lists). Exchange Server 2003 can be configured to block blank sender addresses and filter recipients who are not in the Active Directory too.

This blocking method prevents the directory harvesting attack (DHA). Within this attack, the Exchange Server itself responds to RFC2821 RCPT TO: commands are passed in search of valid IP addresses. When it detects an email that is sent to a non-existing recipient, Exchange returns an “Unknown user”. Spammers now have the chance to sell valid email addresses or use them as recipients for unsolicited mail. This threat can be mitigated by using the tarpitting method, which is provided by Windows Server 2003 Service Pack 1. This feature allows the administrator to insert a configurable delay before returning an SMTP protocol response.


Figure 6: Sender Filtering


Figure 7: Recipient Filtering

Sender ID

One of the newest additions to Exchange Server 2003 anti-spam features is Sender ID filtering which comes with Exchange Server 2003 Service Pack 2. Sender ID attempts to verify that the sending host is approved to send messages from the SMTP domain.

There are two parts that need to be available for Sender ID to work. The first is a well-known DNS record known as sender policy framework. It defines which servers are allowed to send SMTP from this domain. The other one is an SMTP host that supports Sender ID.

Sender ID filtering can greatly reduce UCEs if the sending domains have SPF records registered in DNS, but all domains which do not have SPF records might encounter problems.


Figure 8: Sender-ID Filtering

Content Level Protection

The next option for filtering emails for SPAM is by using content level protection. This means that we can now analyze the message content looking for common clues that may indicate unsolicited email.

Exchange Intelligent Message Filter

With Exchange Server 2003 Service Pack 2, Microsoft provided a content filter called Exchange Intelligent Message Filter. It is based on patented machine-learning technology from Microsoft Research. This Smart Screen technology is already in use by MSN, Microsoft Hotmail and Microsoft Office Outlook 2003, and is called Junk Email Filtering.

Intelligent Message Filter was designed to categorize between SPAM and non-SPAM based on the characteristics of each email message.

After IMF adds a Spam Confidence Level (SCL) to the message, it then evaluates two configured thresholds:

  • Gateway blocking > messages can be archived, deleted, rejected or nothing can be done
  • Store junk email configuration > move emails to junk mail folder

IMF can provide anti-phishing filtering, too. It can be configured in detail using the “Custom Weighting” feature which is implemented by an XML file called MSExchange.UceContentFilter.xml and has to be saved in the same directory as the .dll and .dat files of your Exchange Server. IMF can be updated using Windows Server Update Services (WSUS).


Figure 9: Intelligent Message Filtering

Outlook 2003 and Outlook Web Access Junk E-Mail

The last step to filter Spam is to clean your Outlook client itself by using an anti-SPAM feature called Junk-Email Filtering. At first it collects the SCL information from IMF. In addition it has its own filtering feature where each user can configure their own white and black lists for SPAM.


Read more!
Web Stats
 

Copyright © 2009 by SERVER TECHNOLOGY