Best Practices


  • Use ISA to reverse-proxy web-based mail products, such as Outlook Web Access, whenever possible.

  • Use a second external IP Address, DNS host, and certificate if forms-based authentication for OWA is required to co-exist with OMA, ActiveSync, and RPC-HTTP.

  • Use Secure Sockets Layer (SSL) encryption whenever possible to secure Outlook Web Access.

  • Use forms-based authentication where possible to secure access and prevent unauthenticated traffic from touching the Exchange server.

  • Secure an OWA virtual server with the settings described in Table 12.1.



    Microsoft Internet Security and Acceleration ISA Server 2004 Unleashed
    Microsoft Internet Security and Acceleration (ISA) Server 2004 Unleashed
    ISBN: 067232718X
    EAN: 2147483647
    Year: 2005
    Pages: 216
    Authors: Michael Noel

    flylib.com © 2008-2017.
    If you may any questions please contact us: flylib@qtcs.net