1 Exchange in the cloud Investigative and forensic aspects of Office 365 Owen O Connor Cernam Online Evidence
2 Intros Focusing today on Exchange Online, the hosted Exchange component of Microsoft s Office 365 service offering Why should we care about ? Exchange is one of the most important & sensitive stores of corporate records Also the repository of critical investigative data, e.g. mail content, user contacts, artefacts relating to usage Often the focus of investigations, e.g., dealing with questioned records, unauthorised data access and data leakage / spillage
3 Why do I care? Working with Exchange since the late 90 s, beginning with Exchange 5.5 Pre Active Directory, pre LDAP, pre MMC! Lots of IR projects, tons of investigations, too many e-discovery projects Using and working with Office 365 and predecessor services since 2007 Plus, who doesn t love investigating ?
4 Understanding Office 365 Effectively two separate things 1. a set of Microsoft infrastructure products delivered as a service 2. a new way to purchase the Office application suite We ll ignore the "way to purchase Office apps" piece and focus on 365 as a replacement for on-premises Exchange, SharePoint & Lync 3 core component services: Exchange Online, SharePoint Online, Lync Online Current version released this year but predecessor services date back to 2005 Exchange Online is arguably the flagship service and the main driver for organisations migrating to Office 365 Exchange Online is also available as a standalone service but in reality seems to be almost exclusively bought through Office 365 (e.g., to bundle Lync for IM)
5 What does Exchange Online give us? Users get the full Exchange + Outlook experience, without the hassle of VPN for remote access, and with full mobile device support including ActiveSync and BES practically no negative points Administrators get roughly the functionality of Exchange 2010 for a fixed per-user cost, without the overhead of managing on-premises infrastructure for Exchange and AD and without managing backups, AV, spam solutions, etc Security and DF teams get... to live in interesting times So, what happens if you encounter Exchange Online rather than Exchange Server in an investigation?
6 Administering Exchange
7 Exchange Online for administrators Privileged users have two options for administering Exchange Online: a web console or a PowerShell remote session The web console is really a collection of consoles: a top-level Office 365 console with basic settings for each service, plus product-specific consoles for Exchange, SharePoint and Lync Prior to the 2013 release the web console was a second-class interface and many common tasks required PowerShell Web console functionality is now far closer to parity and seems to be the main dayto-day interface for most O365 administrators As we ll see, several interesting investigative aspects do require PowerShell
10 Exchange Online versus Exchange Server Exchange Online is effectively a subset of Exchange Server, mostly based on Exchange 2013 (but sometimes identifies as Exchange 2010) Some aspects are identical to Exchange Server, e.g., the permissions model: mailbox level permissions, folder level permissions, SOBO, etc Several key features which you may have used are unavailable, e.g., the "exportmailbox" and "get-logonstatistics" cmdlets Disabling certain features makes sense for a multi-tenant hosted service, others Overall Exchange Online feels familiar but remember that it is a black box cloud service where key functionality could change at any time
11 Audit trails
12 The bad news on audit trails Moving to 365 means losing some of our most valuable data sources No authentication logs (really! forget about "who logged on around X time", "where did Y log on from this week, "when did Z last log on" or even "how many failed logins have occurred for Z's account this month ) No client connection details (client agent, protocol, IP, computer name) No message tracking data No OWA webserver logs No details of last user logged on ( LastLoggedOnUserAccount attribute) Some data can sometimes be obtained indirectly from Microsoft Support Some of these gaps can be filled through more complex hybrid deployments but the standard configuration causes significant issues
13 So what do we get? Microsoft provides 3 features which replace some of the missing data: 1. Mailbox Access audit trail 2. Admin audit trail 3. Canned reports
14 Mailbox Access audit trail The mailbox audit trail includes details of non-owner access to mailboxes, e.g., admin access and delegate access But... auditing is not enabled by default, must be enabled per mailbox 3 key settings to consider in enabling auditing: AuditEnabled, AuditLogAgeLimit and AuditAdmin / AuditDelegate If auditing is not enabled for the target mailbox then no events are logged Microsoft support answers on "how do I do X for all users" can be ambiguous: appears to be no way to enable auditing globally, only for then-live mailboxes Once auditing is enabled for a mailbox where do audit events get stored?
15 Mailbox Access audit trail What s the craziest place you could think to store these audit events? Yup, in the target mailbox: when you access another user s mailbox, the record of that access is written into their mailbox, specifically in a folder named Audits under Recoverable Items Situation isn t quite as bad as it might seem: Exchange seems to effectively block access to the Audits folder but deleting the mailbox does delete audit data Two options for viewing the audit trails: web console or PowerShell PowerShell gives significantly more detail via search-mailboxauditlog including client info: ClientInfoString, ClientIPAddress, ClientProcessName, ClientVersion Bottom line: defaults are awful, most likely you will find auditing is not enabled and will need to enable it at the outset of your investigation
16 Admin actions audit trail Admin audit log contains details of administrator actions other than mailbox access which result in changes i.e., ready only actions such as "get-*" cmdlet or browsing user config details are not logged Certain user events are also mysteriously logged, e.g., creating and deleting inbox rules Admin audit log is enabled by default with a 90-day retention period No facility to configure or disable logging ("set-adminauditlogconfig" not available) Audit events do not include client or source details
17 Canned reports Two reports with some value for investigations 1. types of mailbox connections (Get-ConnectionByClientTypeReport) Useful for spotting odd or unexpected types of access, e.g., POP3 May be enough to warrant a support request to get detailed logs 2. Message delivery reports (Search-MessageTrackingReport) Accessible under Exchange admin center -> mail flow -> delivery reports View details of messages sent from or received by individual mailboxes Somewhat equivalent to the data previously found in message tracking logs but limited to single mailbox at a time and two week time window Get-MessageTraceDetail also useful, operates on 30 day time window
18 Accessing mailbox content
19 So you want mailbox content? First question: what content? Just what you would see in Outlook? Do you need Dumpster content? Do you need folder associated items? Dumpster content should arguably be part of every investigative mailbox export and time is a factor in obtaining Dumpster data Associated items and other internal Outlook data can also contain valuable forensic artefacts
20 Gaining access Ideally we want to access a mailbox using delegated rights Any user can be granted full access to another user's mailbox (without granting them admin access to O365) via either the Exchange admin center or via PowerShell Accessing mail data as the target user should be a last resort but could be done by obtaining or changing their password Some OAUTH functionality also exists which might allow token-based access as a user, but documentation is patchy Bear in mind: your access to the target mailbox may be audited and it may not be obvious who has access to that audit trail or if it is reviewed
21 Access mechanics Using either delegated access or user credentials there are several routes to accessing mailbox data 1. Directly accessing the mailbox, using OWA or Outlook 2. Run a search using native tools and export the results 3. Export all mailbox content and search offline Significant issues with direct access Covertness risks: read notifications, accidental changes, Lync presence integration, Out of Office reset, etc Search functionality has limitations and searches may be exposed to the user
22 Access mechanics Native search / ediscovery tools Increasingly sophisticated "ediscovery" features including in-place search All ediscovery features appear to rely on indexed searches (Exchange Search) Exchange Search in on-prem servers needs care and feeding, e.g., to manage ifilters, re-index after adding ifilters, monitor non-indexed items Exchange Search in 365 is a black box: can t manage ifilters or re-index, can t even see details of un-indexed content (no "Get-FailedContentIndexDocuments") Have to assume that at least certain attachments or attachment types are not being indexed and potentially certain messages being missed entirely in indexing Bottom line is that the native tools (if they are available) are probably not the solution unless you would trust OWA search for an investigation
23 Access mechanics Leaving us back in the 1990s: extract mailbox content and search externally Likely the best approach for high-integrity search and for any investigation with multiple data sources, e.g., PC data as well as mailbox data Multiple options for bulk mail access (MAPI, EWS, IMAP, POP3), each with its own issues, e.g., some will not provide MAPI-level properties, only SMTP headers Until recently IMAP was a good starting point in terms of ease of use but now appears to no longer support delegated access ("user\target\password syntax) IMAP, POP3 and EWS are non-native or second-class interfaces which work by translating a message from the native binary format to an RFC822-type format, causing issues with irretrievable items as well as generally poor performance Certain third-party mailbox export tools are available but need to test carefully and consider interfaces used (e.g., IMAP cannot retrieve certain types of item)
24 The bottom line on mailbox access Collecting the whole mailbox is probably impossible currently Even if you collect every user item including calendar items, Lync conversations, tasks etc you likely won't be able to collect all associated items, dumpster items or other internal content Certain mailbox content may not be available via any method, e.g., the mailbox audit information in the "audits" folder (remember: no backups available!) Even certain folders under IPM_SUBTREE may not be accessible via all interfaces, e.g., the various hidden folders under "Contacts" containing recipient cache entries, Lync contacts and Lync groups Lastly, even if you collect every item, are you collecting all of the metadata?
25 Looking in from outside
26 Detecting use of Office 365 externally What if you don t have access or you re looking at another company? Can we tell whether a particular company is using Exchange Online? Looking at MX records is obvious but not always accurate, e.g., a Microsoft MX may relate to FrontBridge anti-spam rather than Exchange Online SPF records for the domain are more accurate query for TXT record and look for include:spf.protection.outlook.com or similar A CNAME named autodiscover pointing to autodiscover.outlook.com or similar is also a good indicator More generically an NS record for ORGNAME.onmicrosoft.com indicates that some O365 service has been provisioned at some point in time and an A record for ORGNAME-my.sharepoint.com points to Sharepoint Online
27 Detecting use of Office 365 internally Risk of unofficial Office 365 adoption is limited based on the requirement to verify domain ownership, similar to Google Apps Internal clients could however be accessing personal O365 accounts, partner environments or unofficial corporate accounts on unmanaged domains Unofficial use of O365 can be detected through DNS resolver logs or web access logs based on the following hostname artefacts: lyncdiscover.* lyncdiscoverinternal.* webdir*.online.lync.com sipdir.online.lync.com autodiscover-s.outlook.com outlook.office365.com pod*.outlook.com *-my.sharepoint.com
28 Investigating Office 365 users If examining a dead system look for filenames ending Autodiscover.xml in Outlook s local appdata folder Mailbox details Server details Additional mailboxes to which the user has access At least in Outlook 2013 all mailboxes to which a user has full access are added to the MAPI profile by default, creating very useful artefacts If investigating Exchange Online externally, check inbound mails for IP addresses included in an "x-originating-ip" header Also be aware that Exchange Online supports SPF but currently does not support DKIM
29 Security considerations
30 Questionable Defaults Although Office 365 is a great product there are some questionable security elements, beginning with the PowerShell admin interface All users have access to the PowerShell remote session interface by default Unprivileged users see far fewer PowerShell cmdlets but can run key commands like get-mailbox and get-mailboxstatistics against their own mailbox Even with limited access an unprivileged user can view several sensitive items Litigation hold status and basic details of any hold Auditing status and configuration (including specific events for which auditing is enabled) SOBO permissions (but not mailbox-level permissions) Any deliver-and-forward config (as sometimes used for double-delivery monitoring) Users can also view some tenant-level settings including the list of accepted domains (potentially reflecting new ventures, pending acquisitions etc)
31 Questionable Defaults Newly-created Exchange Online mailboxes have every external interface enabled by default MAPI OWA OWA for devices Exchange ActiveSync IMAP POP3 (including plaintext!) By default there are no restrictions on addition of mobile devices, including via ActiveSync, i.e., any user can add their own mobile device, company-issued or not!
32 Administrative password recovery Office 365 users with admin privileges can recover their own passwords 365 s web console strongly encourages adding recovery contact details
33 Administrative password recovery As well as nagging users on each login the 365 web console will refuse to add an admin role to a user unless recovery details are provided 365 refuse to accept secondary addresses which are hosted within the same 365 organisation must be external, e.g., Gmail Microsoft then uses the secondary address for certain s as well as for recovery purposes Cellphone number is also required for PhoneFactor verification but not verified against any corporate contact details
34 Mobile device security 365 has (mostly) full Exchange ActiveSync support, including the ability to view the last successful sync time Can view full details of device make and model Can (sometimes) also see device IMEI and mobile network subscriber number
36 Mobile device security Remote device wiping is a key part of Exchange ActiveSync and works well on Office 365 from PowerShell Device wipe commands can also be sent from the web console but in repeated testing we have never seen this work Wipes sent from web console seem to have no effect: device continues working, even continues to sync mails as normal Wipes sent from PowerShell take effect instantaneously in our testing Device acknowledgement of wipe and final wipe status are both accessible through PowerShell and should be checked in all cases
37 Finally on security There are many other positive aspects we don t have time to cover e.g., Microsoft s document-level DRM solution is also available as a service, and potentially of benefit in certain types of investigation Bottom line: Exchange Online needs ongoing care and feeding 1. Enable auditing for all mailboxes and add to user provisioning process 2. Disable un-used or unauthorised interfaces (POP3!) for all mailboxes 3. Block users ability to add own mobile devices, approve by exception 4. Extract and review key reports regularly (e.g., automate via PowerShell)
MICROSOFT EXCHANGE, OFFERED BY INTERCALL Comparison Sheet The table below compares in-product or service feature availability between Microsoft 2013 on-premises and Online within. Planning and Deployment
THE COMPLETE GUIDE TO GOOGLE APPS SECURITY Building a comprehensive Google Apps security plan Contents Introduction................................ 3 1. Secure the core.............................4 Google
Microsoft Office 365 from Vodafone Administrator s Guide for Midsize Businesses and Enterprises Contents Footer bar Return to contents page Go to next of section Return to start of section Previous page
Additions and Subtractions The primary design goal was for simplicity of scale, hardware utilization, and failure isolation. Microsoft Exchange Team Exchange Version Exchange Server 2003 and earlier versions
Chapter 128 Office 365 deployment checklists This document provides some checklists to help you make sure that you install and configure your Office 365 deployment correctly and with a minimum of issues.
Course 10135B: Configuring, Managing and Troubleshooting Microsoft Exchange Server 2010 Service Pack 2 Course Details Course Outline Module 1: Deploying Microsoft Exchange Server 2010 This module describes
BUILT FOR YOU Introduction is designed so it is as cost effective as possible for you to configure, provision and manage to a specification to suit your organisation. With a proven history of delivering
AlwaysMail Sector 5 Cloud E-Mail INDEX INDEX 2 SECTOR 5 COMPANY PROFILE 3 Background Company Name & Address 3 1. SECTOR 5 HOSTED E-MAIL OFFERING 4 2. MICROSOFT HOSTED EXCHANGE 5 3. HOW WE MIGRATE COMPANIES?
10135A: Configuring, Managing, and Troubleshooting Microsoft Exchange Server 2010 Course Number: 10135A Course Length: 5 Day Course Overview This instructor-led course will provide you with the knowledge
How to Migrate to MailEnable using the Migration Console Contents 1. OVERVIEW... 2 2. MAILENABLE MIGRATION CONSOLE... 2 3. SELECT THE MIGRATION APPROACH... 2 Server Migration... 2 Domain Migration... 3
Office 365 Migrating and Managing Your Business in the Cloud Matthew Katzer Don Crawford Contents About the Authors About the Technical Reviewers Acknowledgments Introduction xxi xxiii xxv xxvii Chapter
Chapter Title Time Warner Cable Business Class Cloud Solutions Control Panel User Guide Hosted Microsoft Exchange 2007 Hosted Microsoft SharePoint 2007 Version 1.1 Table of Contents Table of Contents...
MS 10135 Configuring, Managing and Troubleshooting Microsoft Exchange Server 2010 Service Pack 2 P a g e 1 of 10 About this Course This course will provide you with the knowledge and skills to configure
MS 10135B Configuring, Managing and Troubleshooting Microsoft Exchange Server 2010 Description: Days: 5 Prerequisites: This course will provide you with the knowledge and skills to configure and manage
70-662: Deploying Microsoft Exchange Server 2010 Course Introduction Course Introduction Chapter 01 - Active Directory and Supporting Infrastructure Active Directory and Supporting Infrastructure Network
Exchange Forensics for Incident Response OWEN O CONNOR What we ll cover today Basics of Exchange Understanding and exploring Exchange mailboxes Exploring Exchange mailboxes Scenario walkthrough: external
Business Email Setup guide Contents Introduction 3 Provisioning Business Email Service to a User Logging into the UC Management Centre Adding Business Email Service to a User Configuring Advanced Options
Contents Introduction xxix Part I Introduction to Exchange Server 2010 1 Chapter 1 Introduction to Exchange Server 2010 3 Part II Brief History of Exchange Servers 4 New Features in Exchange Server 2010
EXCHANGE EMAIL CONFIGURATION Outlook Web Access and Outlook Anywhere Outlook Web Access Exchange mailbox users can access their email from anywhere using the Outlook Web Access (OWA) facility. This may
Course 10135 Configuring, Managing and Troubleshooting Microsoft Exchange Server 2010 Service Pack 2 Length: 5 Days Language(s): English Audience(s): IT Professionals Level: 200 Technology: Microsoft Exchange
Course 10135B: Configuring, Managing and Troubleshooting Microsoft Exchange Server 2010 Service Pack 2 Length: 5 Days Audience(s): IT Professionals Level: 200 Technology: Microsoft Exchange Server 2010
Monitoring and Troubleshooting Microsoft Exchange Server 2007 (5051A) Course length: 2 days Who Should Attend: This workshop is intended for experienced enterprise-level messaging professionals who have
THE ESSENTIAL GUIDE TO Exchange Management Using EMS By Paul Robichaux SPONSORED BY The Exchange Management Shell (EMS) offers more power and flexibility for managing and monitoring Exchange Server 2010
Web: Overview INSTALLATION AND CONFIGURATION GUIDE (THIS DOCUMENT RELATES TO MDAEMON v15.5.0 ONWARDS) This document provides an installation and configuration guide for MDaemon Messaging Server along with
Administering Microsoft Exchange Server 2016 20345-1; 5 Days, Instructor-led Course Description This 5-day instructor-led course teaches IT professionals how to administer and support Exchange Server 2016.
COMPUTER TRAINING The key to a better future EXCHANGE Course No. 5047 3 Days Target Audience: This course provides students who are new to Exchange Server with the knowledge and skills to configure and
Exchange Integration DME 4.4 Microsoft Exchange 2007, 2010, 2013 Document version 1.1 Published 09-07-2015 Integration with Microsoft Exchange 2007/2010/2013 Contents Integration with Microsoft Exchange
Administering Google Apps & Chromebooks for Education February 4, 2016 Edward Doan @edwardd / google.com/+edwarddoan customer quotes and snippets It s almost this easy. also highlight customer map? Google
Quality is Advantage Microsoft Exchange Server 2013 Configuring Course duration: 32 academic hours Exam Code: 70-662 This course is designed for novice IT specialists, who wish to master maintenance and
Contents Before you begin with an Exchange 2010 hybrid deployment... 3 Sign up for Office 365 for an Exchange 2010 hybrid deployment... 10 Verify prerequisites with an Exchange 2010 hybrid deployment...
Contents Before you begin with an Exchange 2010 hybrid deployment... 3 Sign up for Office 365 for an Exchange 2010 hybrid deployment... 10 Verify prerequisites with an Exchange 2010 hybrid deployment...
Course Code: M10135 Vendor: Microsoft Course Overview Duration: 5 RRP: 1,980 Configuring Managing and Troubleshooting Microsoft Exchange Server 2010 Overview This course will provide you with the knowledge
IceWarp to IceWarp Server Migration Registered Trademarks iphone, ipad, Mac, OS X are trademarks of Apple Inc., registered in the U.S. and other countries. Microsoft, Windows, Outlook and Windows Phone
Microsoft Exchange, Upgrade from Exchange 2000/2003 COURSE OVERVIEW This instructor-led course offers Microsoft Exchange Server administrators with the skills they need to manage a Microsoft Exchange infrastructure.
Google Apps & Chromebooks for Education Deployment Best Practices February 3, 2016 Edward Doan @edwardd / google.com/+edwarddoan Topics Google Apps for Education Chromebooks for Education Chrome Device
Rand Morimo io Michael Noel Guy Yardeni Chris Amaris Andrew Abbate Technical Edit by Ed Crowley Microsoft Exchange Server 201 UNLEASHED SAM 800 East 96th Street, Indianapolis, Indiana 46240 USA Table of
Hosting Control Panel (CP) Admin Guide Document Revision Date: May 16, 2013 Hosting CP Admin Guide / TOC Page i Contents HOW TO USE THIS HOSTING CP ADMIN GUIDE... 1 GET STARTED WITH EXCHANGE... 1 Other
Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Domains All Domains System administrators can use this section
Zarafa Setup Guide The Zarafa server on Igaware allows you to share e-mail, calendars, contacts and tasks via Outlook, on your PDA/Blackberry/Mobile phone or through our Webaccess. The Zarafa Webaccess
Configuring, Managing and Troubleshooting Microsoft Exchange Server 2010 Service Pack 2 Course Details Course Code: Duration: 10135B 5 day(s) Elements of this syllabus are subject to change. This course
MCTS: Microsoft Exchange Server 2010 Course Description and Overview Overview SecureNinja's Exchange Server 2010 training and certification boot camp in Washington, DC will provide you the knowledge necessary
Getting Started with Microsoft Outlook with Exchange Online Software from Time Warner Cable Business Class A Guide for Administrators Table of Contents Requirements... 3 1. Activate & Setup Online Software
MCSA Objectives Exam 70-236: TS:Exchange Server 2007, Configuring Installing and Configuring Microsoft Exchange Servers Prepare the infrastructure for Exchange installation. Prepare the servers for Exchange
Microsoft Exchange and Google Mail Solutions Executive Summary: Email has become a critical application in most Education entities. When considering what systems are going to be used, a great deal of investigation
Cloud Services ADM User Interface Guide 10/15/2014 CONTENTS Launching the Hosted Exchange Tab - Active Directory Users and Computers... 1 User Properties... 2 Exchange Properties... 3 Creating a New User...
Solutions for the Modern Workforce Office 365 Migration Performance & Server Requirements Understanding Migration Performance There are many factors that can affect performance when migrating to Office
Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Introduction This five-day instructor-led course provides in-depth training on configuring Active Directory Domain Services
Hosted Exchange & Portal Admin Guide September, 2013 Exchange Admin Guide i Contents Introduction & How to Use This Cloud Control Panel Admin Guide... 3 Get Started with Exchange... 3 Documentation Overview...
Office 365 Microsoft Exchange Online Archiving Beta Service Description : The information contained in this document relates to pre-release software and services, which may be substantially modified before
Faculty & Staff: Office 365 Email Migration Over the next few months, Berry College faculty and staff email accounts will be migrated to Office 365. This means that all of our emails are being moved to
White Paper ARCHIVING FOR EXCHANGE 2013 A Comparison with EMC SourceOne Email Management Abstract Exchange 2013 is the latest release of Microsoft s flagship email application and as such promises to deliver
Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings
Chapter 10 Office 365 Exchange Online Protection Administration Guide Office 365 version 2013 is a suite of software products: Software as a Service (SaaS). Customers can purchase Office 365 in many ways,
1. Open Outlook Express by clicking Start, All Programs, and Outlook Express. 2. Click on the Tools menu and click Accounts. 1 3. Click on Add Mail 4. Enter your name and click Next. 2 5. Enter your full
Hybrid Simple migrations IMAP migration Cutover migration Staged migration 2010 hybrid 2013 hybrid IMAP migration Supports wide range of email platforms Email only (no calendar, contacts, or tasks) Cutover
SonaVault Email Archiving Software Sonasoft specifically architected it email archiving solution, SonaVault, for small and medium-sized enterprises (SME). SonaVault Email Archiving Software is a stand-alone
EXCHANGE SERVER 2013 MESSAGING WINDOWS SERVER 2012, 70-341, 70-342 Module-1: Introduction to Windows Server 2012 Overview of Windows Sever 2012 Installing Windows Server 2012 Configuring Windows Server
MS-6425C - Configuring Windows Server 2008 Active Directory Domain Services Table of Contents Introduction Audience At Clinic Completion Prerequisites Microsoft Certified Professional Exams Student Materials
TABLE OF CONTENTS WELCOME TO EXCHANGE REPORTER PLUS... 4 CONTACT ZOHO CORP.... 5 GETTING STARTED... 7 SYSTEM REQUIREMENTS... 8 INSTALLATION OF EXCHANGE REPORTER PLUS... 9 HOW EXCHANGE REPORTER PLUS WORKS...
Resonate Central Dispatch Microsoft Exchange 2010 Resonate, Inc. Tel. + 1.408.545.5535 Fax + 1.408.545.5502 www.resonate.com Copyright 2013 Resonate, Inc. All rights reserved. Resonate Incorporated and
Configuration Information Email Security Gateway Version 7.7 This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard.
6445A - Implementing and Administering Small Business Server 2008 Table of Contents Introduction Audience At Clinic Completion Prerequisites Microsoft Certified Professional Exams Student Materials Course
Moving to the Cloud: A Practical Guide Community IT rev 2014 About Community IT Community IT Innovators partners with nonprofits to help them solve their strategic & day-to-day IT challenges. Strategic