Logo
programming4us
programming4us
programming4us
programming4us
Home
programming4us
XP
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server
programming4us
Windows Phone
 
Windows Server

Implementing Secured Email Communications with Exchange Server 2010 (part 1) - Configuring Exchange Server User Certificates Using Autoenrollment

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
3/27/2011 9:16:59 PM
Encrypted email communications can be sent by manually configuring certificates, or by enabling the autoenrollment of certificates for emails that are issued to users via Group Policy. Email encryption can be automated to the point where users are effectively issued certificates, the certificates are automatically installed, and the user can immediately begin to send and receive messages using encrypted communications.

If you have completed the following steps for the autoenrollment of certificates for a user, the certificate will automatically work for Exchange Outlook encryption.

Note that Exchange Server 2010 provides opportunistic TLS encryption, which essentially means that the Exchange Server 2010 servers encrypt mail with outside organizations if possible. The requirement is that the outside organization supports the STARTTLS command. This is described in RFC 3207, “SMTP Service Extension for Secure SMTP over TLS,” and is supported by a number of mail systems in addition to Exchange Server 2010. This encrypts only email between the servers, leaving the messages in the users’ inboxes unencrypted. This protects the confidentiality of the email while traveling over the Internet.

Note

Opportunistic TLS encryption and the support for the STARTTLS command have been a huge leap forward in the security of intercompany email communications. In the past, most communications between companies were sent in clear-text and completely unprotected, unless the companies spent considerable time and effort to coordinate to secure their email communications. Now, it just happens automatically using the STARTTLS command.


Opportunistic TLS does not protect the confidentiality of the email while it is traveling from the user’s desktop to the server, while stored on the server, or when traveling from the receiving user’s server to their desktop. Also, there is no guarantee that the email will be encrypted if the opportunistic TLS fails because the email is then transmitted unencrypted. To ensure that the email is truly secure end-to-end during the transmissions and storage, the following procedures must be followed.

Configuring Exchange Server User Certificates Using Autoenrollment

After Certificate Services has been installed on the system, the administrator of the network can issue certificates to users and computers. However, rather than manually generating and issuing certificates, the best practice is to have the certificate server automatically issue certificates to users and computers in Active Directory. This is known as autoenrollment of certificates.

Autoenrollment of certificates requires the following processes to be followed:

1.
A certificate template needs to be created.

2.
The template needs to be added to the certificate of authority server.

3.
A group policy needs to be created to automatically deploy the certificate to the user or computer.

With autoenrollment of certificates, rules are created that define which certificates should be issued to a user or computer. As an example, a rule can be created to create the autoenrollment of a certificate that allows a user to have his certificates automatically created for the encryption of data files. With autoenrollment of encrypted files, the user can simply save files to a shared location, and the files stored in the location will be encrypted.

To have certificates automatically installed for the Exchange Server users in Active Directory, do the following:

1.
On the certificate server you just created, launch the Certificate Template Microsoft Management Console (MMC) by clicking Start, Run, typing mmc.exe in the Open text box, and then clicking OK.

2.
Click File and click Add/Remove Snap-in.

3.
Select Certificate Templates and then click Add.

4.
Click OK.

5.
Click the Certificate Templates folder.

6.
Right-click the Exchange User template, select Duplicate Template and click OK.

7.
Select the desired certificate and authority version for the template.

8.
In the Template Display Name text box, type AutoEnroll Exchange User.

9.
Make sure the Publish Certificate in Active Directory and the Do Not Automatically Reenroll if a Duplicate Certificate Exists in Active Directory check boxes are both checked. The screen should look similar to Figure 1.

Figure 1. Creating an AutoEnroll Exchange User template.


10.
Select the Subject Name tab.

11.
Select the Build from this Active Directory Information and select Subject Name format as the Common name. Check the Include E-Mail Name in the Subject name and E-mail name boxes.

12.
Click the Request Handling tab.

13.
In the Purpose pull-down, select Signature and encryption.

14.
Click the Security tab.

15.
Highlight the Authenticated Users name and select the check boxes in the Allow column for the Read, Enroll, and Autoenroll permissions for the Authenticated Users.

16.
Click OK.
Other -----------------
- Server Certificates in Exchange Server 2010
- Governing the SharePoint 2010 Ecosystem : Creating the Governance Plan (part 2) - Visually Mapping the Governance Strategy & Defining Governance Roles and Responsibilities
- Governing the SharePoint 2010 Ecosystem : Creating the Governance Plan (part 1) - Reviewing the Vision and Scope Documents
- Creating a Reusable Workflow from SharePoint Designer 2010
- Verifying the Web Application Settings for SharePoint Designer 2010 Use
- SharePoint 2010 : An Overview of Other Standard Workflows
- Windows Server 2008 Server Core : Getting a More Functional Command Line with WinOne
- Windows Server 2008 Server Core : Creating a Friendlier Interface with PromptPal
- Windows Server 2008 Server Core : Using Quick Shutdown to End a Session Fast
- Windows Server 2008 Server Core : Obtaining Additional Information with ToggIt Command Line Helper
 
 
Top 10
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
 
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server