<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0">
  <channel>
    <image>
      <title>ExchangeInbox Updates</title>
      <link>http://www.exchangeinbox.com/</link>
      <width>88</width>
      <height>31</height>
    </image>
    <title>ExchangeInbox Updates - Security</title>
    <link>http://www.exchangeinbox.com/</link>
    <description>Latest updates from ExchangeInbox - MS Exchange resource site.</description>
    <copyright>Copyright (c) 2005 - 2018, All rights reserved.</copyright>
    <ttl>1440</ttl>
    <language>en-us</language>
    <pubDate>Tue, 22 Jan 2013 10:00:00 GMT</pubDate>
    <lastBuildDate>Tue, 22 Jan 2013 10:00:00 GMT</lastBuildDate>
    <item>
      <title>Exchange 2013 Malware Protection - Part 2</title>
      <description>The Exchange 2013 Management Shell provides a number of scripts and cmdlets for administering Malware Protection. When it comes to managing filter updates or enabling/disabling the filter the shell is our only administrative interface.</description>
      <link>https://exchangeinbox.com/article.aspx?i=202</link>
      <pubDate>Tue, 22 Jan 2013 10:00:00 GMT</pubDate>
    </item>
    <item>
      <title>Exchange 2013 Malware Protection - Part 1</title>
      <description>Since Exchange 2003 we grew to expect basic email hygiene to be include out-of-the-box in every new Exchange release. Today we look at the way Exchange 2013 is evolving in this area starting from the new malware protection.</description>
      <link>https://exchangeinbox.com/article.aspx?i=201</link>
      <pubDate>Tue, 18 Dec 2012 10:00:00 GMT</pubDate>
    </item>
    <item>
      <title>Exchange Server 2010 Role Based Access Control (RBAC)</title>
      <description>In this Article I’ll talk about Role Based Access Control (RBAC), the new permission granting model introduced in Exchange Server 2010. Using RBAC we grant administrators the exact set of permissions required, without handing any additional rights.</description>
      <link>https://exchangeinbox.com/article.aspx?i=159</link>
      <pubDate>Tue, 29 Jun 2010 10:00:00 GMT</pubDate>
    </item>
    <item>
      <title>Sniffing User Credentials and more</title>
      <description>Network sniffing provides a plethora of information useful in troubleshooting and identifying security weaknesses. Today we look at a practical example by extracting user credentials from a network capture. </description>
      <link>https://exchangeinbox.com/article.aspx?i=130</link>
      <pubDate>Thu, 12 Mar 2009 10:00:00 GMT</pubDate>
    </item>
    <item>
      <title>Sniffing with Microsoft Network Monitor</title>
      <description>If the Exchange Queue Viewer or Message Tracking is not showing you enough, the Microsoft Network Monitor might be the right addition to your diagnostic and troubleshooting arsenal. Here is how to start capturing the information most relevant to you.</description>
      <link>https://exchangeinbox.com/article.aspx?i=128</link>
      <pubDate>Tue, 17 Feb 2009 10:00:00 GMT</pubDate>
    </item>
    <item>
      <title>Plain Text Authentication Exposed</title>
      <description>Exchange allows the use of plain text authentication for inbound and outbound SMTP email. Employing telnet we test for the availability of this authentication method, and expose its key weakness.</description>
      <link>https://exchangeinbox.com/article.aspx?i=93</link>
      <pubDate>Thu, 06 Sep 2007 10:00:00 GMT</pubDate>
    </item>
    <item>
      <title>Authentication Primer</title>
      <description>The value of our virtual identity grows with every service we subscribe to. Acting as a bridge between the real and virtual world, Authentication is there to verify the credentials linking us to our virtual identity.</description>
      <link>https://exchangeinbox.com/article.aspx?i=92</link>
      <pubDate>Thu, 30 Aug 2007 10:00:00 GMT</pubDate>
    </item>
    <item>
      <title>Four Exchange Vulnerabilities Fixed on Patch Tuesday</title>
      <description>Microsoft just released details and fixes for four vulnerabilities affecting Exchange versions 2000, 2003 and 2007. The vulnerability classification varies from Important to Critical, demanding immediate action.</description>
      <link>https://exchangeinbox.com/article.aspx?i=81</link>
      <pubDate>Wed, 09 May 2007 10:00:00 GMT</pubDate>
    </item>
    <item>
      <title>Using IIS Lockdown to Tighten Exchange</title>
      <description>Internet Information Services 5.0 includes services Exchange doesn't require to function properly. Being enabled by default, these pose a security risk. Today we use IIS Lockdown to limit the exposed services.</description>
      <link>https://exchangeinbox.com/article.aspx?i=80</link>
      <pubDate>Tue, 08 May 2007 10:00:00 GMT</pubDate>
    </item>
    <item>
      <title>Time to Trash the Outlook Security Administrative Package</title>
      <description>Do you hate the Outlook Security Administrative Package (AdmPack)? Six years from the birth of the Outlook Security lockdown a new administrative interface is on the horizon.</description>
      <link>https://exchangeinbox.com/article.aspx?i=57</link>
      <pubDate>Tue, 27 Jun 2006 10:00:00 GMT</pubDate>
    </item>
  </channel>
</rss>