Blog
Projects
About
Backtrack:
Blog
›
Restrict access to Exchange Ad…
›
Comments
Comments
Restrict access to Exchange Admin Center to local subnets
posted on March 5th 2015, at 12:35
by
lunarg
By default, when opening up OWA (Outlook Web App) access to the internet, you could technically also get into Exchange Admin Center (EAC) by appending /ecp after the external OWA URL, potentionally creating a security vulnerability and increasing the chance for a brute-force attack to succeed.
While it is generally a good idea to deny access to the Administrator user to manage the Exchange-server, this is not always possible or desireable. Additionally, because EAC is a VirtualDirectory within a site in IIS, it is not possible to have it listen on a separate internal IP address and secure it through the edge firewall. Luckily, IIS also has some other mechanisms to secure access. There's an
...
read more
Add a new comment
Your name:
Your e-mail:
Your comment:
Basic BBcode is supported.
Captcha:
Type the letters and numbers as shown.
Not readable?
Get another
.
Tags
computer
windows
software
vmware
microsoft
linux
exchange
hardware
network
news
mac
powershell
home
office365
msoffice
ad
server
sqlserver
dell
soaring
esx
internet
mssql
rds
sbs
events
powercli
terminalserver
virtualization
antivirus
Archive
«
‹
November 2024
›
»
Sun
Mon
Tue
Wed
Thu
Fri
Sat
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
Links
-
@harkx
-
Cats & Dogs
-
Jargon-free Security Guide
Quote
«
Smith & Wesson - the original point and click interface
»
Contact
© 2009-2024 Black Manticore – all rights reserved
code by
lunarg
, design by
SuriAmanah
, hosted at Cats&Dogs