Applications Server
 

Exchange Server 2013 : Exchange Clients - Design Considerations (part 1) - Supportability, Security

1/26/2014 1:02:44 AM

As we have discussed, clients offer a varying range of features and thus they have a varied range of requirements and dependencies. Client choice can be both a solution to a design requirement and a design requirement in their own right. An example of this might be that a customer has deployed Outlook 2007 and for some reason cannot upgrade. Thus Outlook 2007 becomes a design constraint; that is, regardless of any other requirements, the solution must support Outlook 2007. In contrast, consider a customer who has a widespread use case that is satisfied only by a new feature within Outlook 2013. Then the use of Outlook 2013 becomes a design decision that satisfies a requirement.

1. Supportability

Supportability of the client is clearly important, but it is often not viewed strategically. In an ideal world, the version of Outlook and Exchange should be from the same release wave. This would mean that a customer would pair Outlook 2010 and Exchange 2010 or Outlook 2013 and Exchange 2013. One reason for this suggestion is that these products were developed together and will provide the best feature set and end-user experience. Additionally, the support life cycle is likely to be well matched in that both client and server will be at the same support life cycle phase.

As mentioned previously, Outlook 2003 is not supported with Exchange Server 2013. Many customers currently use Outlook 2003 with Exchange Server 2010. If you spend some time on support forums, you will see that many customers are experiencing performance problems with this configuration, especially if Outlook is in online mode. Switching to Outlook cached mode or changing the MSExchangeRPC polling interval on the Exchange 2010 server can help, but be aware that if you have a significant mismatch in client release version and Exchange release version, you may run into difficult-to-resolve problems.

As a general rule, the best design is the most common one. We often have discussions with customers about “the art of the possible.” However, the reality is that, for most customers, you should deploy a solution that is based on common components and software. The main benefit of this is that whenever an update is released, it is highly likely that someone on the technical adoption program shares a similar environment, and so bugs will be caught before you get the update.

The bottom line is that when making decisions about client versions, you do not want to be the exclusive user of a specific client version with Exchange Server 2013. Stick to the well-trodden path to avoid problems. Also remember that clients have support life cycles as well. As an example, Outlook 2010 was first released in July 2010. It is in mainstream support until October 2015 with extended support running until October 2020. Extended support means that the product receives critical security fixes only and that there will be no feature development and limited updates.

You can check Microsoft client version support at the following address:

http://support.microsoft.com/gp/lifeselectindex

Although Outlook is most likely to be the primary interface between end users and an Exchange service, do not forget about browser support for the Outlook Web App and Exchange Administration Center (EAC). As mentioned previously, browser support has changed with Exchange 2013. Many customers still have older browsers installed, such as Internet Explorer 7, which are not supported in Exchange Server 2013. Also make sure that the customer's browser will support any features that you need to provide in OWA. This is especially important if you intend to make use of new features such as OWA offline mode.

2. Security

CONNECTION ENCRYPTION

Connection encryption is the use of encryption technology to secure communication between two or more computers. Typically, an encrypted connection will make use of Public Key Infrastructure (PKI) to issue certificates, which are used to encrypt and decrypt data.

Clients create network connections to the server, typically over TCP/IP. One of the most common requests from security teams is to ensure that all client traffic is encrypted when passing over untrusted networks such as the Internet. When making design decisions, it is important to consider how your clients will meet these requirements. For example, some POP3 and IMAP4 clients can only create an encrypted secure sockets layer (SSL) connection if the encryption certificate has the uniform resource locator (URL) name at the top of the list of subject alternate names (SAN), or it is the only name on the certificate. Many design teams do not consider this when planning their certificates, and they end up having to request a new certificate just for POP3 and IMAP4 clients. Our advice is to ensure that you analyze encrypted client connectivity in your design test lab to ensure that your proposed certificate and name spaces will work with your clients.

DATA ENCRYPTION

Data encryption refers to encrypting data sent between computers; that is, rather than encrypt all communications as with connection encryption, only the data that needs to be securely transmitted is encrypted. This is often used in combination with connection encryption to provide a robust and secure communications mechanism. Typically, the certificates used to create the secure sockets layer connection encryption and the email body encryption will be different, and so an individual would need to breach both layers of encryption and get both certificates before they could read the contents of the email message.

There are many ways to encrypt message contents, ranging from simple password protection of a Microsoft Office document or compressed Zip file to encrypting the entire message body with secure MIME (S/MIME). Attaching an encrypted attachment to the message only protects the attachment. Thus if someone is able to intercept the email message, they are still able to view the message body and any text that is in it. S/MIME encrypts the entire message body, and so it protects both the attachment(s) and message content. Not all clients, however, support S/MIME, whereas virtually all clients allow an encrypted attachment to be sent.

Additional levels of security can be provided through information rights management (IRM). But not all clients support IRM, and those that do often provide varying IRM feature levels. Again, our recommendation here is that your design test lab include an implementation of your proposed IRM solution so that you can validate client behavior.

AUTHENTICATION

Authentication is the process of identifying yourself to the messaging service so that it knows to which mailbox to provide you access. Unfortunately, network authentication credentials suffer from exactly the same problems as real-world credentials; that is, if an ill-intentioned individual gains access to them, that individual can impersonate the user to whom the credentials apply and access their data.

The simplest form of authentication is providing a username and password in plain text to the server. As discussed earlier, this was very common with early Internet protocols, such as POP3 and IMAP4. Most enterprise customers, however, do not relish the prospect of their username and password being sent unencrypted over a network for someone to view with a freely downloadable application, such as Wireshark or Microsoft's Network Monitor.

To protect plain-text credentials from being viewed via a network monitor, you can encrypt the network connection via secure sockets layer (SSL), as discussed in the “Connection Encryption” section. This process works by using certificates to establish an encrypted connection prior to sending the credentials. This does not prevent an ill-intentioned person from capturing the credentials from the network, but it makes what they manage to capture a lot less useful by encrypting it with the same level of security that online commerce companies and banks use to secure their transactions. It's a bit like stealing a safe but not being able to get at what's inside. This mechanism is used in many scenarios, such as Outlook Anywhere where MAPI is used to connect to Exchange via SSL, and also for secure POP3 (POP3S) and secure IMAP4 (IMAP4S).

Many organizations are concerned not only with the identity of the end user but also with the identity of the device. This brings with it a separate set of challenges, especially for mobile devices. A common solution to this requirement is to use certificate-based authentication. This process uses a certificate to prove identity. For mobile devices, this certificate replaces the requirement for a password (with the exception of first configuration). The connection between the device and the server is encrypted and then the certificate is sent to the Exchange server as proof of identity. This solution is very robust, but it does require that the organization have a well-deployed PKI and the ability to deploy certificates to both end users and mobile devices.

 
Others
 
- Sharepoint 2013 : Community portals and sites - Managing your community settings
- Sharepoint 2013 : Community portals and sites - Adding users to community sites
- Sharepoint 2013 : Community portals and sites - Adding moderators to community sites
- Sharepoint 2013 : Community portals and sites - Creating a community site subsite
- Sharepoint 2013 : Community portals and sites - Creating a community site site collection
- Microsoft Lync Server 2013 Edge Server : Edge Server Installation (part 5) - Creating Certificates
- Microsoft Lync Server 2013 Edge Server : Edge Server Installation (part 4) - Installing the Edge Server
- Microsoft Lync Server 2013 Edge Server : Edge Server Installation (part 3) - Deploying a Load-Balanced Edge Server Pool, Publish the Topology
- Microsoft Lync Server 2013 Edge Server : Edge Server Installation (part 2) - Edit the Topology, Deploying a Single Edge Server Pool
- Microsoft Lync Server 2013 Edge Server : Edge Server Installation (part 1) - Configure Networking
- Microsoft Lync Server 2013 Edge Server : Edge Server Overview (part 2)
- Microsoft Lync Server 2013 Edge Server : Edge Server Overview (part 1) - Access Edge Service
- Exchange Server 2013 : Exchange Clients - Performing a Client Inventory
- Exchange Server 2013 : Exchange Clients - Why Does Client Choice Matter?
- Exchange Server 2013 : Types of Exchange Client (part 2) - Web Browsers, Exchange ActiveSync, Collaboration Data Objects
- Exchange Server 2013 : Types of Exchange Client (part 1) - Messaging Application Programming Interface, Exchange Web Services
- Exchange Server 2013 : Mail Apps for Outlook and the Outlook Web App
- Developing, Integrating, and Building Applications in Sharepoint 2013 (part 5) - Data Integration
- Developing, Integrating, and Building Applications in Sharepoint 2013 (part 4) - Events and Logic Integration
- Developing, Integrating, and Building Applications in Sharepoint 2013 (part 3) - User Interface Integration - Ribbon and Action Menus
 
 
Most View
 
- Exchange Server 2013 : Exploring useful EMS examples (part 2) - Creating a report in HTML
- Sharepoint 2013 : Navigate Through a SharePoint Site (part 3) - Use the Breadcrumbs, Use the Navigate Up Breadcrumbs
- Personalizing Windows 8 : Protecting Yourself with Windows Firewall - Advanced Firewall Configuration
- Microsoft Project 2010 : Strategic Importance of Project 2010
- Microsoft Excel 2010 : Working with Graphics - Inserting WordArt, Using Smart Art in Excel
- Taking Microsoft Project 2010 for a Test Drive (part 7) - How Long Will All These Tasks Take?
- Windows 8 : Disks and Storage Devices - Optical Discs, USB Flash Drives
- Windows 8 : Creating a Windows Network - Installing Network Adapters
- Sharepoint 2013 : Customizing a SharePoint Site - Open the Site Settings Page
- Microsoft Visio 2010 : Distributing Templates and Stencils (part 2) - Creating a Separate Stencil for Shape and Code Delivery
 
 
Top 10
 
- Sharepoint 2013 : Working with media - Working with video files (part 3) - Use a picture from a web address as a thumbnail, Associate related content to a video file
- Sharepoint 2013 : Working with media - Working with video files (part 2) - Use an image from your computer as a thumbnail
- Sharepoint 2013 : Working with media - Working with video files (part 1) - Capture a thumbnail from the video
- Sharepoint 2013 : Working with media - Organizing by using keywords and metadata
- Sharepoint 2013 : Working with media - Tagging media files
- Sharepoint 2013 : Working with media - Uploading and tagging media files
- Sharepoint 2013 : Working with media - Introducing the Asset Library app
- Microsoft Word 2010 : Creating Mail Merge Documents - Creating a Data Document
- Microsoft Word 2010 : Creating Mail Merge Documents - Importing Data from Outlook
- Microsoft Word 2010 : Creating Mail Merge Documents - Importing Data from a Database