ENTERPRISE

Understanding Exchange Policy Enforcement Security : Implementing Transport Agent Policies on the Edge

4/2/2011 3:31:07 PM
The Edge Transport server role is vital in today’s risk-fraught messaging environment as it is responsible for intercepting the onslaught of viruses and spam before they reach the internal network. Special transport rules have been created specifically for Edge servers in Exchange Server 2010. These transport rules include address rewriting policies, content filtering policies, SenderID, and Sender Filtering.

Understanding the Role of EdgeSync in Exchange Policy Management

The EdgeSync service runs as a special synchronization component that keeps specific information from the internal AD forest in sync with an external AD in Application Mode (ADAM) forest. It uses this information to determine if policies have changed.

Implementing Edge Rule Agents

Many of the transport rules in Exchange Server 2010 were designed to work on the Edge Transport role systems. This is especially true for services such as antivirus and antispam. Several other key pieces of functionality are run as policies on Edge Rule agents, as described in this section.

Setting Up Address Rewriting Policies

One of the edge transport rules available by default is the address rewriting policy. This policy allows internal email domains to be rewritten to a common external domain, or any other combination of domain rewriting as necessary.

Address rewriting cannot currently be performed from the graphical user interface (GUI)—it must be scripted. The following illustrates a sample script to set up a rewriting policy:

New-AddressRewriteEntry -name "marina@abc.internal to marina@companyabc.com"
-InternalAddress marina@abc.internal -ExternalAddress marina@companyabc.com


This sample policy rewrites any instance of marina@abc.internal to marina@companyabc.com.

Configuring Content Filtering Policies

Edge Server role systems have a built-in Content filter running to provide for antispam and antivirus functionality. This agent serves as a direct replacement for the Exchange 2003 Intelligent Message Filter (IMF). The agent works by assigning a Spam Confidence Level of 1-9 for an email. The higher the number, the more likely it is to be spam. Removing the junk messages at the edge is the best way to reduce the load that this type of environment has on the current messaging environment.

Working with Sender Filtering Policies

Sender filtering on an Edge Transport role server allows for antispam functionality on the edge. It can be easily enabled or disabled for a server by following the command outlined as follows:

1.
On the Edge server in Exchange Management Console, click Edge Transport.

2.
In the work pane, click the Antispam tab.

3.
Click Sender Filtering.

4.
Click either the Disable or Enable action, depending on how you want to set it up.

Understanding and Configuring SenderID

SenderID is an antispam framework that defines how organizations can create special domain name system (DNS) records, known as Sender Policy Framework (SPF) records, to easily verify that they really are who they purport to be.

SenderID can be disabled or enabled on an Edge Transport server via the following process:

1.
On the Edge server in Exchange Management Console, click Edge Transport.

2.
In the work pane, click the Antispam tab.

3.
Click Sender ID.

4.
Click either the Disable or Enable action, depending on the action desired.

Other  
  •  Safeguarding Confidential Data in SharePoint 2010 : Using Active Directory Rights Management Services (AD RMS) for SharePoint Document Libraries
  •  Safeguarding Confidential Data in SharePoint 2010 : Enabling TDE for SharePoint Content Databases
  •  Safeguarding Confidential Data in SharePoint 2010 : Using SQL Transparent Data Encryption (TDE)
  •  Safeguarding Confidential Data in SharePoint 2010 : Enabling SQL Database Mirroring
  •  Safeguarding Confidential Data in SharePoint 2010 : Outlining Database Mirroring Requirements
  •  Remote Administration of Exchange Server 2010 Servers : RDP with Exchange Server 2010 (part 2)
  •  Remote Administration of Exchange Server 2010 Servers : RDP with Exchange Server 2010 (part 1) - Planning and Using Remote Desktop for Administration
  •  Remote Administration of Exchange Server 2010 Servers : Using the ECP Remotely
  •  Safeguarding Confidential Data in SharePoint 2010 : Examining Supported Topologies
  •  SharePoint 2010 : SQL Server Database Mirroring for SharePoint Farms
  •  Remote Administration of Exchange Server 2010 Servers : Using the Remote Exchange Management Shell
  •  Remote Administration of Exchange Server 2010 Servers : Certificates, Trust, and Remote Administration
  •  Enabling Presence Information in SharePoint with Microsoft Communications Server 2010
  •  Integrating Exchange 2010 with SharePoint 2010
  •  Documenting an Exchange Server 2010 Environment : Exchange Server 2010 Project Documentation
  •  Documenting an Exchange Server 2010 Environment : Benefits of Documentation
  •  Getting the Most Out of the Microsoft Outlook Client : Using Cached Exchange Mode for Offline Functionality
  •  UML Essentials - UML at a Glance
  •  Understanding Microsoft Exchange Server 2010
  •  Working with Email-Enabled Content in SharePoint 2010
  •  
    Top 10
    Sky vs. Virgin - Which Smart Service Comes Out On Top?
    The Gateway Drug
    The Latest Home And Office Products - March 2013
    Weird And Wacky
    iPhone 5 - First Among Equals
    Looking For A Smartphones – Q1 2013
    Otter Grade Protection For Consumer Smartphones
    Plantronic Marque 2 - A Sure Keeper
    Edifier E30 Spinnaker - By The Horns
    Audio Technica ATH PRO5MK2 - Devil In The Details
    Most View
    Sharepoint 2007: Add a Column to a List or Document Library
    Anatomy of an interchangeable-lens camera (part 1)
    The 10 Things To Know Before Buying A Laptop (Part 5)
    Developing an SEO-Friendly Website : Optimizing Flash (part 1)
    System Center Configuration Manager 2007 : Planning for Internet-Based Clients
    iPhone 3D Programming : Vector Beautification with C++
    Olympus-620UZ
    Windows Vista Security Guide
    Windows Phone 7 : In the Cloud - Creating a Google API–Based Translator
    SQL Server 2008 : Auditing SQL Server - Creating Server Audit Specifications
    Discover the @-SIGN : From Wine Fairs to Email Addresses
    Asus P8Z68-V Pro
    Installing the Exchange Server 2010 prerequisites
    Working with Disks, Partitions, and Volumes in Vista
    SharePoint 2010 : Operations Management with the SharePoint Central Administration Tool (part 5) - Reviewing Security Settings in SPCA
    Integrating Office Communications Server 2007 in an Exchange Server 2010 Environment : Exploring Office Communications Server Tools and Concepts
    Buying Guide – Router (Part 2) - Asus RT-N56U, D-Link DIR-636L, Edimax BR-6428nS, Cisco Linksys EA0
    Buying Guide: CPU Cooling Equipment (Part 6) - Deepcool by Logisys ICE BLADE PRO,Enermax ETD-T60-VD, Enzotech Extreme-X REV.A
    Windows Phone 7 Development : Building a Phone Client to Access a Cloud Service (part 3) - Coding the BoolToVisibilityConvert
    The Go-To Reference Design Map For The Cloud?