Logo
programming4us
programming4us
programming4us
programming4us
Home
programming4us
XP
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server
programming4us
Windows Phone
 
Windows Server

Troubleshooting Microsoft Exchange Server 2003 : Troubleshooting Security

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
6/21/2011 11:36:19 AM
Security troubleshooting can be a complex and difficult process. Traffic can be filtered at a firewall, at a router, or at a virtual server. If a particular type of traffic or traffic from a particular source is getting through when it should not or is not getting through when it should, then it can be difficult to locate the problem. Troubleshooting permissions can also be problematic. Permission inheritance is a very useful function, but sometimes it is not easy to discover the level at which a permission is defined. The use of security certificates is typically invisible to the ordinary user, but you need to know what to do if a certificate is compromised or corrupted.

Troubleshooting Connectivity Across Firewalls

You can secure network applications and services by restricting connections to their associated ports. TCP port filtering on a firewall enables you to control the type of network traffic that reaches your Exchange Server 2003 servers and network devices. Correctly configured firewalls are stable and sturdy devices, invisible to the legitimate user, but a barrier to the attacker. However, like everything else, firewalls may not do what you intended them to, and troubleshooting is required.

Back-end servers contain private stores and sensitive public stores and need strong protection. Front-end servers typically require weaker protection and more functionality.

Therefore, many organizations implement light (or no) firewall protection between front-end servers and the outside world and strong firewall protection to protect back-end servers and other sensitive parts of the intranet. The front-end servers are then said to be in a demilitarized zone (DMZ), also known as a perimeter network.

Troubleshooting firewall connections requires that you allow only essential connections. If you allow a TCP port to connect, ensure that only the hosts that need to make a connection are allowed through the firewall. If you have to err at all, err on the side of blocking access rather than enabling it. 

Table 1. Exchange Server 2003 Ports and Services
PortService
25SMTP
80HTTP
88Kerberos
102Message Transfer Agent (MTA)-X.400 connector over TCP/IP
110POP3
119NNTP
135Client/server communication
 RPC
 Exchange administration
143IMAP4
389Lightweight Directory Application Protocol (LDAP)
443HTTP using Secure Sockets Layer (SSL)
563NNTP using SSL
636LDAP using SSL
993IMAP4 using SSL
995POP3 using SSL
3268 and 3269Global catalog lookups

In addition to opening and closing ports, firewalls also filter traffic by blocking or allowing specific addresses, ranges of addresses, and domains. Selected protocols can also be blocked. It is, for example, common practice to block ICMP packets. Incoming traffic often has different filtering conditions to outgoing traffic. Also, filtering can be set up on connectors and virtual servers, and on routers. Blocking and filtering can therefore be complex, and it can be difficult to determine where it has been incorrectly configured. The key to troubleshooting in this area (as in most others) is good documentation that records all the configuration changes that you make.

Network Address Translation

Network Address Translation (NAT) is often implemented by the firewall, although Routing and Remote Access servers can also provide this service. The computers in your DMZ, including front-end Exchange Server 2003 servers, need public Internet IP addresses to communicate externally. They also need private IP addresses to communicate with your intranet. Because the public IP addresses of these computers should not change, your NAT service needs to permanently associate a public address with each private address allocated to them. This allocation is known as a special port. If external users report disruption in accessing your Exchange Server 2003 organization, then check that NAT has been set up correctly. The IIS server that hosts your organization’s public Web page also requires a special port. If external users also report problems accessing this Web site, then incorrect NAT configuration is probably the problem.

Virus Protection

Virus protection can be implemented on your firewall, on your servers, and on your clients. You should check virus logs on a daily basis. Microsoft does not offer any antivirus products, so the format and content of your virus logs will depend upon the third-party antivirus product that you choose.

Firewall Logs

Firewall devices, and software firewall programs, produce logs. These are invaluable in troubleshooting inappropriate firewall operation and also for detecting attempts to attack your system. The logs give you details of attempts to communicate through blocked ports and various Transmission Control Protocol/User Datagram Protocol (TCP/UDP) probes that the firewall has intercepted. Attempts on the same set of ports from a number of sources on the Internet probably indicate that your organization is being subjected to a decoy scan. One of these attempts is an attack; the others are not. Firewall logs can also detect Trojan horse probes, such as GirlFriend (port 21544) or GateCrasher (port 6969). SubSeven (ports 1243, 6711, and 27374) is a particularly powerful probe widely used by hackers.

If details of such probes appear in your firewall log, then your firewall is doing its job and is blocking them. However, such entries indicate that your organization is under attack, and you need to find out more about the attackers. There is not sufficient space in this book to cover this topic fully, but an Internet search for “firewall logs” is highly recommended.

Troubleshooting Permissions

You can use the Exchange Administration Delegation Wizard in Exchange System Manager to control access to the Exchange objects contained within your Exchange organization or administrative group. These objects include public folder trees, address lists, message databases (MDBs), protocols, and connectors. Exchange Server 2003 uses Active Directory permissions such as read, write, and list contents, and Exchange extended permissions such as Create Public Folder and View Information Store Status. If you look at an object’s permissions, Active Directory permissions are listed first, followed by Exchange extended permissions.

Permissions may be inherited from a parent object, or applied directly to an Exchange object. Because permissions give considerable flexibility, they can also introduce complexity. You need to troubleshoot permissions when you first set up your Exchange Server 2003 organization, and again if the organization changes significantly and new objects are added. You can make your permissions structure more robust by allowing permissions to groups rather than individual users and by using deny permissions as sparingly as possible.

An example of a permission problem is when two organizations are unable to send authenticated messages to each other over SMTP connectors. The problem is that the required Send As permission has not been granted on the SMTP virtual servers in both organizations for the account used for authentication. Without this additional permission, messages sent between the servers will be denied, because the server performs a check to see if the authentication account has permissions to send as the user who sent the mail.

You can view the permissions that a user or group has on any Exchange object by navigating to that object in Exchange System Manager and then accessing the Security tab in the object’s Properties dialog box. If the Allow and Deny check boxes for a permission are shaded, the object has inherited permissions from its parent object. You can change inherited permissions, or you can click Advanced and block inheritance. If you choose to do the latter, then you have the option of either removing all the inherited permissions or copying them so that the object retains its permission settings, but they are no longer inherited. Figure 1 illustrates this option.

Figure 1. Copying or deleting inherited permissions


One of the most common errors when setting permissions is that the administrator decides that the inherited permissions are not appropriate, blocks inheritance, removes all the inherited permissions, sets a required permission, but neglects to restore those inherited permissions that are essential for correct operation. If you are changing permissions, and especially if you are delegating that task, then all changes must be carefully documented.

Troubleshooting Encryption and Digital Signatures

Exchange Server 2003 uses Transport Layer Security (TLS) to encrypt and digitally sign SMTP communications. Other Internet protocols use SSL. Both TLS and SSL require certificates that you obtain from a certification authority (CA). A certificate consists of a public key, which can be made available to anyone, and a private key known only to its owner.

If you use basic authentication, then a user’s username and password will be transmitted in plain text unless the entire communication is encrypted. Encryption protects the contents of a message from being intercepted and read, and from being altered in transit. The sender encrypts the message using the recipient’s public key and the recipient decrypts it using his or her private key. Only the recipient can decrypt the message.

A sender digitally signs a message using his or her private key. The recipient uses the sender’s public key to validate the signature. Only the sender could have sent the message because only the sender has the private key.

Encryption and digital signatures can fail for the following reasons:

  • The certificate has been revoked Typically, certificates are revoked if an administrator believes they may have become compromised. If, for example, a third party has obtained a private key, the certificate is no longer secure.

  • A key has been corrupted A user’s private key is stored in that user’s profile and can become corrupt. In this case, an administrator needs to revoke the certificate and issue a new one.

  • The certificate is not accepted If you have Certificate Services installed in a server in your Active Directory domain, then you can issue certificates. Such certificates can be used within your organization but are unlikely to be trusted externally. To encrypt and digitally sign Internet mail, you need a third-party certificate from a trusted supplier such as VeriSign.

Practice: Checking That E-Mail is Encrypted

In this practice, you send an e-mail from Server01 to Server02 and capture the contents using Network Monitor. You then obtain a certificate and use this to encrypt outgoing mail. You then send another e-mail and check that the contents are encrypted. The practice assumes that Network Monitor has been installed and that this is not the first time it has been used. If this is the first use of Network Monitor, you need to instruct it to monitor Local Area Network when prompted.

The practice also assumes that you have not already obtained a certificate and encrypted e-mails. If so, use the certificate wizard to remove the certificate before you start. Finally, the practice assumes that Certificate Services is installed on Server01.

Exercise 1: Capture an Unencrypted E-Mail Message

To capture an unencrypted e-mail, perform the following steps:

1.
On Server01, open Network Monitor.

2.
On the Capture menu, click Start.

3.
Open Outlook and send a message to [email protected]. In the message body, type Now is the time for all good men to come to the aid of the party.

4.
On the Capture menu, click Stop And View.

5.
In the details pane (the top pane), scroll through the captured frames until you locate the message, as shown in Figure 2.

Figure 2. An intercepted, unencrypted e-mail message

6.
Close Network Monitor. Do not save the capture.

Exercise 2: Obtain a Certificate and Configure Encryption

In this exercise, you obtain a certificate and configure encryption. You then test that e-mail traffic is encrypted.

To secure your e-mail traffic by using encryption, perform the following steps:

1.
On Server01, start Exchange System Manager.

2.
Navigate to Administrative Groups\First Administrative Group\Servers\Server01\Protocols\SMTP\Default SMTP Virtual Server.

3.
Right-click Default SMTP Virtual Server and click Properties.

4.
On the Access tab, click Certificate.

5.
The Web Server Certificate Wizard opens. Click Next.

6.
Select Create A New Certificate, and then click Next.

7.
Select Send The Request Immediately To An Online Certification Authority, and then click Next.

8.
Click Next again to accept the defaults on the Security Name And Settings page.

9.
Ensure that the Organization is Tailspintoys and the Organizational Unit is Administration. Click Next.

10.
Ensure the Common Name is Server01. Click Next.

11.
Ensure that the Geographical Information is correct. Click Next.

12.
Select a certificate authority to process your request, as shown in Figure 3.

Figure 3. Selecting a certificate authority


13.
Click Next. Click Next again to submit the request.

14.
Click Finish to close the wizard.

15.
The Communication button on the Access tab of the Default SMTP Virtual Server Properties dialog box no longer appears dimmed. Click that button.

16.
Configure the security settings to use a secure channel, as shown in Figure 4.

Figure 4. Specifying security settings


17.
Click OK. Click OK again to close the Properties dialog box.

18.
Repeat the procedure in Exercise 1 to send an identical e-mail message to [email protected] and capture that message. This time, however, you should be unable to read the message body contents in Network Monitor.
Other -----------------
- Windows Server 2008 R2 : View Server Events - Work with the Event Viewer
- Windows Server 2008 R2 : View Server Performance Data (part 2) - Understand Performance Monitor
- Windows Server 2008 R2 : View Server Performance Data (part 1) - Create a System Health Report
- Microsoft Dynamics CRM 2011 : Working with Activities and Notes - Managing Your Activities
- Microsoft Dynamics CRM 2011 : Working with Activities and Notes - Creating a Note
- SQL Server 2008 : Indexing for Performance - Post-Index Creation
- SQL Server 2008 : Indexing for Performance - Creating Indexes Using the GUI
- BizTalk 2009 : The Enterprise Service Bus Toolkit 2.0 - Working with Itineraries
- Sharepoint 2010 : Creating and Managing Workflows - Deploying Workflows
- Sharepoint 2010 : Creating and Managing Workflows - Setting Up Workflow Configurations
 
 
Top 10
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
 
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server