<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: 5 Steps to Protect Exchange Server from Security Attacks</title>
	<atom:link href="http://www.gfi.com/blog/5-steps-to-protect-exchange-server-from-security-attacks/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog/5-steps-to-protect-exchange-server-from-security-attacks/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=5-steps-to-protect-exchange-server-from-security-attacks</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Tue, 06 Aug 2013 14:24:30 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>By: Sailaish Booluck</title>
		<link>http://www.gfi.com/blog/5-steps-to-protect-exchange-server-from-security-attacks/comment-page-1/#comment-31800</link>
		<dc:creator>Sailaish Booluck</dc:creator>
		<pubDate>Thu, 08 Mar 2012 12:54:29 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8086#comment-31800</guid>
		<description><![CDATA[The best option is to use an efficient email hygiene solution (for e.g. MAX Mail Protection hosted solution) and forward only genuine mails to your exchange server.]]></description>
		<content:encoded><![CDATA[<p>The best option is to use an efficient email hygiene solution (for e.g. MAX Mail Protection hosted solution) and forward only genuine mails to your exchange server.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Ruby RM</title>
		<link>http://www.gfi.com/blog/5-steps-to-protect-exchange-server-from-security-attacks/comment-page-1/#comment-31591</link>
		<dc:creator>Ruby RM</dc:creator>
		<pubDate>Mon, 20 Feb 2012 18:39:17 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8086#comment-31591</guid>
		<description><![CDATA[For a more secure Exchange Server (while accessing either your IMAP4 or POP3 email account), you can use EMC by accessing its Server Configuration tool. Just go to Server Configuration then click Client Access. Under this you can see the POP3 and IMAP4 tab, choose what platform you would like to choose: POP3 or IMAP4. It depends on you and your account access but I recommend using POP3. It&#039;s easier and faster to get it. Good for Exchange Server beginners. When you are done, select Properties and you&#039;re good to go.

The process above is also a great alternative for the Set-PopSettings and Set-ImapSettings method.]]></description>
		<content:encoded><![CDATA[<p>For a more secure Exchange Server (while accessing either your IMAP4 or POP3 email account), you can use EMC by accessing its Server Configuration tool. Just go to Server Configuration then click Client Access. Under this you can see the POP3 and IMAP4 tab, choose what platform you would like to choose: POP3 or IMAP4. It depends on you and your account access but I recommend using POP3. It&#8217;s easier and faster to get it. Good for Exchange Server beginners. When you are done, select Properties and you&#8217;re good to go.</p>
<p>The process above is also a great alternative for the Set-PopSettings and Set-ImapSettings method.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Beck Anderson</title>
		<link>http://www.gfi.com/blog/5-steps-to-protect-exchange-server-from-security-attacks/comment-page-1/#comment-31389</link>
		<dc:creator>Beck Anderson</dc:creator>
		<pubDate>Mon, 06 Feb 2012 07:35:19 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8086#comment-31389</guid>
		<description><![CDATA[When hiring a DDoS mitigation vendor, remember to ask them first their list of successful works and how they did it. Methodologies are really important in protecting against DoS attacks. You can learn from the other companies&#039; past experiences and how your vendor handled the situation.

As the user, IT manager, or administrator, the first thing you should do when attacked by a DoS is to stay calm - DONT PANIC. Take charge and assure everyone in your organization (especially your boss) that everything is under control.]]></description>
		<content:encoded><![CDATA[<p>When hiring a DDoS mitigation vendor, remember to ask them first their list of successful works and how they did it. Methodologies are really important in protecting against DoS attacks. You can learn from the other companies&#8217; past experiences and how your vendor handled the situation.</p>
<p>As the user, IT manager, or administrator, the first thing you should do when attacked by a DoS is to stay calm &#8211; DONT PANIC. Take charge and assure everyone in your organization (especially your boss) that everything is under control.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: William Tate</title>
		<link>http://www.gfi.com/blog/5-steps-to-protect-exchange-server-from-security-attacks/comment-page-1/#comment-31385</link>
		<dc:creator>William Tate</dc:creator>
		<pubDate>Mon, 06 Feb 2012 05:17:59 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8086#comment-31385</guid>
		<description><![CDATA[In the present company I&#039;m with, all our updates are done automatically - these include updates done on our PC and Mac computer operating systems, browser software, Microsoft Exchange Server, virus definitions and programs, etc. It&#039;s really time consuming for updates to be done manually especially when you&#039;re dealing with Exchange Servers.

It&#039;s also wise to hire an outsourced company to do your enterprise&#039;s penetration and vulnerability testing. It&#039;s an investment worth paying for. Trust me, if you are worried about hack attacks and other security issues, penetration testing can do wonders for your business.]]></description>
		<content:encoded><![CDATA[<p>In the present company I&#8217;m with, all our updates are done automatically &#8211; these include updates done on our PC and Mac computer operating systems, browser software, Microsoft Exchange Server, virus definitions and programs, etc. It&#8217;s really time consuming for updates to be done manually especially when you&#8217;re dealing with Exchange Servers.</p>
<p>It&#8217;s also wise to hire an outsourced company to do your enterprise&#8217;s penetration and vulnerability testing. It&#8217;s an investment worth paying for. Trust me, if you are worried about hack attacks and other security issues, penetration testing can do wonders for your business.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: David Nodge</title>
		<link>http://www.gfi.com/blog/5-steps-to-protect-exchange-server-from-security-attacks/comment-page-1/#comment-31383</link>
		<dc:creator>David Nodge</dc:creator>
		<pubDate>Sun, 05 Feb 2012 06:09:30 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8086#comment-31383</guid>
		<description><![CDATA[The really great thing about Exchange security is that a lot like email itself, it hasn&#039;t changed a whole great deal in years. As long as you&#039;re on top of your security and making sure that threats are few and far between, it&#039;s a pretty low maintenance task most of the time.]]></description>
		<content:encoded><![CDATA[<p>The really great thing about Exchange security is that a lot like email itself, it hasn&#8217;t changed a whole great deal in years. As long as you&#8217;re on top of your security and making sure that threats are few and far between, it&#8217;s a pretty low maintenance task most of the time.</p>
]]></content:encoded>
	</item>
</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-08-12 09:13:17 by W3 Total Cache --