Windows Management and Scripting

A wealth of tutorials Windows Operating Systems SQL Server and Azure

Posts Tagged ‘cellular telephone’

Unified messaging features in Exchange Server 2010

Posted by Alin D on August 2, 2011

When Microsoft introduced unified messaging in Exchange Server 2007, it was pretty basic. The auto attendant, universal inbox and Outlook voice access features were nothing to sneeze at, but unified messaging was still in its early stages. Some improvements were made in Exchange Server 2010. This article takes a look at some of them.

Voicemail transcription

When you receive a new voice message, Exchange Server 2010 uses a speech recognition engine to transcribe the message. This is my favorite new unified messaging feature for two reasons.

First, having a written transcript of your voicemail messages in an Outlook inbox makes it possible to perform queries against voice messages in the same way that Outlook allows you to search email messages.

To understand the second reason, imagine that you’re on an important phone call and another call comes in. You don’t know how important the other call is, but you don’t want to put your current call on hold to find out. The transcription feature gives you a quick glance at the voicemail transcript will determine if the missed call was urgent.

As you might expect, the transcription feature isn’t perfect. Sometimes the speech recognition will make mistakes, particularly if the caller has a thick accent or a cold. However, the feature works well the majority of the time.

Call answering rules

The auto attendant feature allows you to create telephone menus that use voice prompts, such as Press 1 for English, Press 2 for Spanish, etc. Auto attendant existed in Exchange Server 2007, but only at the organizational level. It allowed an administrator to create voice menus for the organization’s main telephone number, but you couldn’t create a set of voice prompts for each individual user’s extension.

This feature has been changed in Exchange Server 2010. The new call answering rulesfeature works similarly to mailbox rules. These rules offer a great deal of flexibility, but a user doesn’t even have to use Outlook to create a new call answering rule.

To access the call answering rules, log into OWA and click on Options to open the Exchange Control Panel. Choose the Phone option (Figure 1). This screen allows you to create, delete or edit call answering rules.

Create call answering rules through the Exchange Control Panel

If you click on the New Rule link, you’ll be taken to the screen that allows you to create a call answering rule by specifying a condition and a set of options (Figure 2). For example, if I had a high-profile client, I might not want his or her call to go to voicemail. I could create a rule that reroutes those calls to my cell phone. You can also use the call answering rule to time stamp each rerouted call, in case someone calls you late at night or early in the morning.

Create call answering rules with your specific condition

In Exchange Server 2010, just about all functions available in Outlook are also available in OWA. Since Outlook 2010 won’t be available for a while, OWA will be the only interface that lets users access some of the new features. In Exchange Server 2010, OWA has been renamed Outlook Web App.

Posted in Exchange | Tagged: , , , , , | Leave a Comment »

System Enhances Security for Microsoft Security Essentials and the TMG Firewall

Posted by Alin D on February 2, 2011

You have probably heard the old chestnut that says ?the only way to secure your network is to pull all the cables out of their Ethernet jacks?. While such an answer is given a bit tongue in cheek, and that wouldn?t work in today?s wireless world anyway, the idea is that if one computer is able to communicate with another computer (or computing device, as tablets and smart phones are making up an increasing percentage of the network connected devices compared to PCs) there is always a chance that one of the machines is going to compromise the other machine. Of course, you don?t necessarily need a wired Ethernet network or even wi-fi to accomplish the compromise, as exploits can also be carried from one device to another using removable media (CDs, DVDs, floppies, USB keys, etc). As for wireless, given the ever-increasing use of wi-fi and cell phone carrier-based ?G? (3G, 4G) networks, the future of network attacks is likely to be ?over the air?.

Regardless of the medium over which the attacks take place, however, it?s clear that we all need protection against such attacks. In the earlier days of networking, the miscreants and malcontents used simple denial of service attacks to create havoc and interrupt business activities. As the Internet bad guys got more sophisticated (and maybe a bit more egotistical) they began to spend their ?valuable? time defacing web sites. Then, when the Internet became more mainstream and more actual business started taking place over the global network, criminal types (individuals and organizations) were able to take advantage of the opportunities to make money off their crimes, and co-opt the skills of hackers to quietly compromise devices so that they could steal data (including businesses? trade secrets and individuals? identities) without detection. As networking itself has grown more complex, so have the threats against which we need to protect ourselves.

There are a couple of ways you can protect yourself against today?s more sophisticated attackers. One effective method is to put technologies on both the network and on the host operating systems that can inspect the nature of the traffic destined for the host that needs the protection. Network based approaches are typically located on network firewalls that lie on the edge of the network, such as the Forefront Threat Management Gateway (TMG) firewall, and that works well for many purposes.

The problem with network based protections (when used alone) is that they are typically focused on a particular ?choke point? on the network ? commonly at the network edge or right behind the network edge. For example, the TMG firewall is often placed behind a traditional so-called hardware firewall ? this configuration allows the dedicated firewall device to do some basic and simplistic processing of old-style network layer attacks, and this reduces the processing overhead required of the TMG firewall, which is capable of doing much more sophisticated protection than the ?hardware? firewall.

Since you can?t cost-effectively put TMG firewalls at every juncture on your network, it?s important that you also put network layer protection on the host operating systems themselves. This gives you protection against both Internet based attacks (typically initiated by the user who tries to access malicious content, since Internet hosts rarely can initiate connections to private network hosts without the hosts being previously compromised) and attacks sourced from other hosts on the same corporate network, where those other hosts have been compromised and then automatically seek to spread an infection or other type of system exploit.

This is where the Network Inspection System (NIS) comes in. NIS is Microsoft?s response to the growing threat of network based attacks. NIS was first introduced with the Forefront Threat Management Gateway (TMG) firewall to enable sophisticated network based IDS/IPS at the edge of the corporate network. Recently, Microsoft extended the significant protection enabled by having NIS on the TMG firewall by including NIS with the most recently released version of Microsoft Security Essentials (version 2.0).

With an increasing number of application layer attacks hitting the scene and new ones being released on a regular basis, Microsoft Research designed the Generic Application-level Protocol Analyzer (GAPA).GAPA includes a protocol specification language and an inspection engine that operates on network streams and captures. GAPA makes it possible to create network protocol parsers faster and reduces the development time required to create the parsers, and these parsers are used extensively by the NIS.

One of the key problems networks security professionals have to deal with is that attackers usually create and launch exploits for disclosed vulnerabilities more quickly than application vendors can deploy security updates. In addition to the time it takes to develop the security updates, you have to factor in the time it takes for most administrators to test these security fixes before deploying them, to realize that networks often go unprotected for a significant amount of time after an exploit becomes known.

This delay leaves computers vulnerable to attacks and exploitation, during a period when the bad guys know all about the exploit and are scrambling to take advantage of it before it?s patched. The Network Inspection System reduces these windows of vulnerability between disclosures and patch deployment from weeks to a few hours. That is a significant improvement and can make the difference between a network that goes on working and one brought down to its knees by a zero day attack.

The vulnerability research and the signature development are done by Microsoft?s Malware Protection Center (MMPC). For security bulletins that fix publicly-unknown vulnerabilities, NIS helps provide immediate protection shortly after the details of the vulnerability become publicly known. The MMPC also rapidly responds to zero day incidents by releasing NIS signatures for them as soon as they are known. At this time, NIS signatures help detect exploits of vulnerabilities in Microsoft products only. While this might be interpreted as a limitation when implemented with the TMG firewall (since the TMG firewall is intended to protect the entire network), it isn?t a problem at all when the NIS is included with Microsoft Security Essentials, since MSE can only be installed on Windows computers.

The Network Inspection System uses three types of signatures when performing its IDS/IPS functions:

Vulnerability-based. These signatures will detect most variants of exploits against a given vulnerability. Exploit-based. These signatures will detect a specific exploit of a given vulnerability. Policy-based. These are signatures that are generally used for auditing purposes and are developed when neither vulnerability nor an exploit-based signature can be written.

We don?t know at this time which of these signature types is used with Microsoft Security Essentials, as there is no public information available on this currently. We do know that the TMG firewall uses all three types of signatures and they are enabled by default. Note that while the policy-based signatures might not seem to be useful in that they are not providing IPS protection, they do provide IDS functionality so that you?re aware of the possible compromise of a system on your network and you can then initiate your incident response plan as needed.

The Network Inspection System can analyze a number of application layer protocols for potential exploit code. While there are literally thousands of application layer protocols in use today, only a small handful represent a significant percentage of all network traffic. Because there are time constraints for any endeavor of this kind, Microsoft has focused on the following popular protocols:

HTTP DNS SMB SMB2 NetBIOS MSRPC SMTP POP3 IMAP MIME

After reviewing that list of protocols, I think you can agree that these are the most commonly used ? and most commonly abused ? protocols used on the Internet and on intranets today.

Microsoft evaluates the need for supporting additional protocols on a continuous basis and will add that support as necessary if there is an exploit using some other protocol that needs to be protected against. If additional protocols are enabled, the support for that protocol will be included when the signature update takes place. In most cases, support for a new protocol is added because there is a significant vulnerability or exploit that uses that protocol, and therefore in most cases, the MMPC will also release a signature that uses that new protocol. If you are using a TMG firewall, you can see which protocols the signatures use by grouping the NIS signatures by protocol. The TMG firewall obviously gives you more information and more control, as a network administrator, whereas MSE is designed for the use of consumers and very small businesses and thus is intended to work more transparently.

The Network Inspection System is a network level IDS/IPS system that uses the GAPA language to enable fast development of NIS signatures. NIS inspects network traffic for a collection of the most commonly used protocols on both the Internet and the intranet, and assesses that traffic for potentially malicious code. NIS is currently available with the TMG firewall, where it inspects traffic to and from the Internet, and with Microsoft Security Essentials, where it inspects traffic moving into or out of Windows hosts. NIS depends on the Windows Filtering Platform, which means it?s available for Windows Server 2008 and above and Windows Vista and above. NIS focuses on Windows based vulnerabilities, which makes it the ideal IDS/IPS for Windows hosts. All these features enable both the TMG firewall and Microsoft Security Essentials to provide an exceptional level of security for networks that contain Windows servers and client systems.

Posted in Security | Tagged: , , , , , , | Leave a Comment »

Step by step to configure Exchange 2010 Unified Messaging Server

Posted by Alin D on September 24, 2010

An UM infrastructure is an integration of Microsoft Exchange Server, IP Gateway Conventional PBX and IP-PBX to deliver voicemail, greetings and customer messages to a single outlook client.  Microsoft Exchange Server Unified Messaging (UM) combines voice messaging and e-mail messaging into a single messaging infrastructure. Unified Messaging puts all e-mail and voice messages into one Exchange 2010 mailbox that can be accessed from many different devices. After Unified Messaging servers have been deployed on a network, users can access their messages using Outlook Voice Access, from any telephone, from a mobile phone, or from the computer.

Systems Requirements

Microsoft Certified PBX and IP Gateway

Microsoft Telephony Advisor for Exchange Server

Exchange 2010 pre-requisites

Unified Communication Architecture

image

To install Unified Messaging Server Role on Exchange 2010

  • Log on to the server on which you want to install Exchange 2010
  • Insert the Exchange 2010 DVD into the DVD drive (or browse to your install location). If Setup.exe doesn’t start automatically, navigate to the DVD drive and double-click Setup.exe
  • On the Start page, click Choose Exchange language option. Select Install only languages from the DVD
  • In the Exchange Server 2010 Setup wizard, on the Introduction page, click Next.
  • On the License Agreement page, review the software license terms. If you agree to the terms, select I accept the terms in the license agreement, and then click Next.
  • On the Error Reporting page, select Yes, and then click Next.
  • On the Installation Type page, click Custom Exchange Server Installation.
  • On the Server Role Selection page, select the UM server role
  • On the Customer Experience Improvement Program page, choose the appropriate selection for your organization, and then click Next.
  • On the Completion page, click Finish

After you install and configure the Unified Messaging server, You must create the following objects after you successfully install the Unified Messaging server role:

  • Dial Plan objects
  • IP Gateway objects
  • Hunt Group objects
  • Mailbox Policy objects
  • Auto Attendant objects
  • UM Server objects

Once UM server configured. You must configure other UM devices such AudioCodecs IP Gateway, Siemens, Cisco or your preferred PBX, IP-PBX devices to work with Microsoft Exchange Server 2010 UM. Microsoft supported configuration “how to” guides are at the end this articles in PDF format.

How UM use Active Directory and HT server to Transmit Email

The Unified Messaging server role uses Active Directory site membership information to determine which Hub Transport servers are located in the same Active Directory site as the Unified Messaging server. The Unified Messaging server submits messages for routing to a Hub Transport server within the same Active Directory site. The Hub Transport server performs recipient resolution and queries Active Directory to match a telephone number, or another Unified Messaging property, to a recipient account. After the recipient resolution completes, the Hub transport server will deliver the message to the target mailbox in the same way as a regular e-mail message.

To Create UM Dial Plan

  • In the console tree, navigate to Organization Configuration > Unified Messaging.
  • In the action pane, click New UM Dial Plan.
  • In the New UM Dial Plan wizard
  • On the Set UM Servers page, click Add, and then, on the Select UM Server page, select the UM server that you want to add to the UM dial plan.
  • On the Completion page, confirm whether the dial plan was successfully created.
  • Click Finish to complete the New UM Dial Plan wizard 1183

    To enable Unified Messaging on an Exchange 2010 server

  • In the console tree, navigate to Server Configuration > Unified Messaging.
  • select the Unified Messaging server, Click on Enter Product Key to enter UM license
  • Once licensed, In the result pane, select the Unified Messaging server to enable.
  • In the action pane, click Enable UM Server 17

    To Create an UM IP Gateway

  • In the console tree, navigate to Organization Configuration > Unified Messaging.
  • In the work pane, click the UM IP Gateways tab.
  • In the action pane, click New UM IP Gateway.
  • In the New UM IP Gateway wizard
  • On the Completion page, confirm whether the UM IP gateway was successfully created.
  • Click Finish to complete the New UM IP Gateway wizard 4567

    To Create an UM Hunt Group

  • In the console tree, navigate to Organization Configuration > Unified Messaging.
  • In the work pane, click the UM IP Gateways tab.
  • In the result pane, select a UM IP gateway.
  • In the action pane, click New UM Hunt Group.
  • In the New UM Hunt Group wizard,view or complete the following fields,  Associated UM IP gateway ,Name  Dial plan   Click the Browse button to select the dial plan that will be associated with the UM hunt group.  Pilot identifier   An extension number or a Session Initiated Protocol (SIP) Uniform Resource Identifier (URI) can be used in this field.
  • On the Completion page, confirm whether the UM hunt group was successfully created
  • Click Finish to complete the New UM Hunt Group wizard. 192021

    To add a UM server to a dial plan

  • In the console tree, click Server Configuration.
  • In the result pane, select the Unified Messaging server.
  • In the action pane, click Properties.
  • On the UM Settings > Associated Dial Plans, click Add.
  • In the Select Dial Plan window, select the dial plan you want to add from the list of available dial plans, and then click OK.
  • Click OK again to accept your changes. 222324
  • To configure the start-up mode
  • In the console root, navigate to Server Configuration > Unified Messaging.
  • In the result pane, click to select the Unified Messaging server you want to set up.
  • In the action pane, click Properties.
  • On the UM Settings tab, in the Startup Mode drop-down list, select one of the following settings: TCP   Use this setting if the UM server is being added to only UM dial plans that are set to Unsecured but won’t be added to dial plans that are set to SIP Secured or Secured. In TCP mode, the UM server will only listen on TCP port 5060 for SIP requests. By default, the UM server will startup in TCP only mode.

    TLS   Use this setting if the UM server is being added to UM dial plans that are set to SIP Secured or Secured but won’t be added to dial plans that are set to Unsecured. In TLS mode, the UM server will only listen on TCP port 5061 for SIP requests.

    Dual   Use this setting if the UM server is being added to UM dial plans that have different security settings. In Dual mode, the UM server can listen on ports 5060 and 5061 simultaneously.

    Click OK.

    To configure number of concurrent voice calls

  • In the console tree, navigate to Server Configuration > Unified Messaging.
  • In the result pane, click to select the Unified Messaging server you want to set up.
  • In the action pane, click Properties.
  • On the UM Settings tab, in the Maximum concurrent calls text box, type the maximum number of concurrent voice calls.
  • Click OK. 22

    To view number of active calls

  • Click Start, click Programs, click Administrative Tools, and then click Performance.
  • In the Performance console, right-click the details pane, and then select Add Counters from the menu. You can also press CTRL+I to open the Add Counters window.
  • In the Add Counters window, in the Performance object list, select MSExchangeUMGeneral.
  • In Select Counters from list, select Current Calls, click Add, and then click Close.
  • In the Performance console, in the details pane, select the Current Calls counter to display the number of current calls.

    To add UM Mailbox

  • In the console tree, navigate to Organization Configuration > Unified Messaging.
  • In the work pane, click the UM Mailbox tab.
  • In the action pane, click New UM Mailbox.
  • In the New UM Mailbox wizard
  • On the Completion page, confirm whether the UM Mailbox was successfully created.
  • Click Finish to complete the New UM Mailbox wizard
  • 89

    10

    To add UM Auto Attendant

  • In the console tree, navigate to Organization Configuration > Unified Messaging.
  • In the work pane, click the UM Auto Attendant tab.
  • In the action pane, click New UM Auto Attendant .
  • In the New UM Auto Attendant wizard
  • On the Completion page, confirm whether the UM Auto Attendant was successfully created.
  • Click Finish to complete the New UM Auto Attendant wizard
  • 11 12

    To verify UM mailbox property

  • In the console tree, navigate to Organization Configuration > Unified Messaging.
  • In the work pane, click the UM Mailbox tab.
  • Right click Newly UM Mailbox.
  • Click on Property
  • 13 14

    15 16

  • Posted in Exchange | Tagged: , , , , , , , , , , , , | Leave a Comment »

    Synchronize Microsoft Hosted Exchange 2007 E-Mail From Anywhere Using Activesync Or Outlook Web Access (Owa)

    Posted by Alin D on August 24, 2010

    Synchronize Microsoft Hosted Exchange 2007 E-Mail From Anywhere Using Activesync Or Outlook Web Access (Owa)

    Microsoft Hosted Exchange 2007 is one of the most widely used collaboration suites in the business world. Many corporate offices and multi-office organizations prefer MS Exchange 2007 because of its compatibility with Microsoft business applications such as Microsoft Outlook and SharePoint 2007 by which e-mails, calendars, tasks, contacts, and notes can be accessed and shared irrespective of the location.

    As the world becomes more competitive, small organizations and individuals also need the above features to remain competitive and efficient. Deploying and maintaining a Microsoft Exchange server for a few e-mail boxes is very expensive. However, small offices and individuals and can now get all these benefits by using Microsoft Hosted Exchange 2007. Many vendors provide Hosted Exchange 2007 plans on rent or subscription basis.

    Best MS Hosted Exchange 2007 allows you to access your e-mails, calendars, tasks, contacts and appointments using a mobile phone or a Web Browser. You can make changes to your appointment from your mobile phone and the changes are stored centrally on your vendor’s Hosted Exchange 2007 server. You can access and check the same appointment from your Mac or normal desktop. Mails that you sent using your mobile phone will also be available on your mail client. When you add a folder inside your Hosted Exchange 2007 mailbox, this information is reflected on all devices that you use. If you use different mobile or handheld devices then you can configure your MS Hosted exchange 2007 account on all the devices. Any changes that you do to your e-mail, calendar, contacts and tasks through out your day are updated to all these devices in real time.

    E-mails on MS Hosted Exchange 2007 can also be accessed via a web browser. The interface is similar to Microsoft Outlook. You can send and receive mails, check your schedule, setup meetings and tasks. The mails that you compose and receive using Outlook Web Access (OWA) will also be available on your mobile phone and mail client if you have configured them with your Microsoft Hosted Exchange 2007 account. These are the advantages of Microsoft’s Hosted Exchange 2007 technology that is all about simplifying communication and collaboration.

    Using Microsoft Outlook Web Access, you will be able to find people in Address Book. OWA has been designed to cater to people who use Microsoft Hosted Exchange 2007 and want to access e-mails irrespective of the location. As all this happens from the browser, all the changes are registered with the Hosted Exchange 2007 server. If you have multiple hosted Exchange 2007 accounts, then you can access them from within your current OWA.

    Adrian Gates (sales@apps4rent.com) is a Business Manager with Apps4Rent (http://www.apps4rent.com/sharepoint.html); which offers premium hosted Exchange, Microsoft sharepoint services, SharePoint 2007 web hosting and other application hosting services.

    Posted in Exchange | Tagged: , , , , , , , , , , , , | Leave a Comment »