Category Archives: UC&C

Thursday trivia #48

[ putting this in the “FAIL” category since it’s no longer Thursday, but better late than never…]

To begin with, my hearty congratulations to Tony Redmond on receiving a “Distinguished” award from the Society for Technical Communications (STC) for Exchange 2010 Inside Out. This is quite an honor, but a well-deserved one. I read and edit a great deal of material focused on Exchange, and Tony’s book is the best I’ve encountered. Well done.

  • And speaking of books: I have the galleys for Bruce Schneier’s latest book, Liars and Outliers. It’s been an interesting read so far, although much of what he has to say about the nature of trust and how trust granting works seems intuitively obvious.
  • Looks like I’ll be speaking at TEC 2012 in San Diego. That should be fun; I thoroughly enjoyed speaking at TEC 2010 in Vegas.
  • I think it’s telling that if you search for “Exchange Connections 2012” you get this page, which doesn’t actually mention Exchange Connections– you have to scroll the list of icons over to the right to see it at all, and the textual conference descriptions don’t mention it. That’s rather sad. The page that is ostensibly about Exchange Connections is even worse.
  • After next week my teaching schedule will lighten up a bit, so I’m hopeful that I’ll be spending a lot more time flying.
  • Some people tend to think that their negative statements and claims won’t get back to their intended target. Wrong-o.

 

 

 

Leave a comment

Filed under FAIL, Friends & Family, General Stuff, UC&C

An Exchange UM IPv6 conundrum

Sometimes it happens that there are two distinct and opposite facts presented at the same time… and only one of them can be correct. Here’s a great example:

  • The Exchange 2010 SP2 help topic “Understanding IPv6 Support in Exchange 2010” says that Exchange “Unified Messaging doesn’t support IPv6 in any version of Exchange 2010.”
  • The Windows IPv6 FAQ says that you should leave IPv6 enabled and present: “From Microsoft’s perspective, IPv6 is a mandatory part of the Windows operating system and it is enabled and included in standard Windows service and application testing during the operating system development process.”

I take this to mean that, from the Windows team’s perspective, IPv6 is expected to be present and functional. From the Exchange viewpoint, UM doesn’t use IPv6 and thus doesn’t care whether or not it is present. I’m not sure that this is 100% correct, but neither the Windows team nor the Exchange team has said anything publicly to clarify the situation. In the meantime, my advice is to leave IPv6 alone; having it enabled doesn’t seem to interfere with the normal function of Exchange 2010 UM.

1 Comment

Filed under UC&C

Syncing Outlook for Mac calendars, and when “Outlook” isn’t Outlook

Although I’ve been working with Outlook for Mac for quite some time, there are lots of its features that I don’t use. Because all my mailboxes are hosted on Exchange, for example, I don’t ever use any of the IMAP functionality. In the same vein, because all my calendar and contact data live on an Exchange server, I haven’t had to fiddle with calendar sync for some time. I used to sync my calendar with various Palm devices back in the day using Entourage, Outlook’s predecessor, but it was always a painful and error-fraught process, and I was happy to move to an all-Exchange, all-Exchange ActiveSync environment.

A friend and fellow MVP mailed me with a Mac Outlook calendar sync question, and I didn’t have the faintest idea of what the right answer was. Accordingly, I dragged a third MVP into the fray: Mac/Windows interop expert William Smith. He came up with a workable solution, and as a bonus he wrote a detailed tutorial on how to set up calendar sync.

That got me to thinking about the differences in the Outlook brand between Mac and Windows. The functional differences have been discussed at length elsewhere (like on Steve Goodman’s excellent feature comparison table.) As Steve points out, the Mac version of Outlook feels much like Entourage. Although the user interface has been revamped, and is much more pleasant as a result, many of the same issues that plagued Entourage are still around. For example, I’m running Outlook with 3 Exchange accounts on a MacBook Pro with a 2GHz quad-core i7 and 8GB of RAM. This is a snappy machine… and yet Outlook still frequently takes leisurely breaks to show me the spinning rainbow when I click on messages, and it often gets confused about exactly which messages are, or are not, part of a given conversation.

That’s not to say it’s more or less buggy than Windows Outlook, which of course has its own set of issues. I use both on a daily basis. There are some things that Mac Outlook does better; for example, I love having a single unified inbox for all my accounts, and the integration of Outlook with other apps (like iPhoto) is better than it is, in general, with Windows counterparts. On the other hand, I find it much easier to work with the schedule and calendar views in Windows Outlook; I really like the Outlook Social Connector, and the “Ignore Conversation” and QuickSteps features are both super valuable for plowing through large volumes of mail.

I find Apple’s Mail.app weird and unsatisfying: it doesn’t include all the data I want (like calendar and contact info), and it doesn’t do many of the familiar things that I expect from the Outlook family. That would be OK if Mail provided a better experience than Outlook but in my judgement it doesn’t– I’d rather use Windows Outlook in a VM than the native mail app. In that light, rebranding the Mac client as Outlook has been a success: Outlook users on either platform will find familiar things to like (and perhaps to gripe about) on the other platform. Throw OWA into the mix and overall I’d say that Microsoft has done a good job of building consistency between the platforms.

There are still some major differences between platforms. For example, Outlook 2011 has little to no SharePoint integration; it lacks proper conversation threading (plus the aforementioned QuickSteps and “Ignore Conversation”); it doesn’t integrate properly with Exchange UM, there’s no Personal Archive access, and it doesn’t support VBA (although its AppleScript support is quite extensive, and much improved from Entourage).

Most users, of course, will use whatever version of Outlook happens to run on their preferred platform. That’s natural enough. Overall I’m quite satisfied with Outlook 2010 (well, except that for some reason 64-bit Office Communicator hates it). I’m hoping that the Mac Office team can address some of the performance and behavior issues in Outlook 2011 in the forthcoming Service Pack 2. I’m not as concerned about missing features, as those will come in time, and the Mac team has the benefit of seeing what features in Outlook 2010 are actually worth porting and which ones are not.

4 Comments

Filed under UC&C

2011 Exchange Maestro wrap-up

Greetings from high over Nebraska, where I’m aboard a Delta flight to San Francisco for a well-deserved day of rest at home (and, hopefully, a visit to In-N-Out) before heading to Vegas for Exchange Connections and then back to Pensacola.

My first visit to Connecticut was, I’d say, quite the success. We had a good-sized group of attendees, and they asked excellent and focused questions throughout. As a presenter it’s always rewarding when the audience asks questions that indicate not only that they’re listening but that they’re thinking and this group did so particularly well. That kind of back-and-forth increases the value of the workshop for everyone, and we had a lot of it.

For a first, Tony and I hit all of our timing marks until the third day! (As you might expect, I ran long on the UM content; my natural enthusiasm got the best of me.) This left the attendees more time than usual for labs, which they used to their full advantage. We didn’t have any major equipment or logistical problems; the sponsor presentations from Hewlett-Packard and BinaryTree were quite well done.

In a side note, I’m glad to report that Tony now knows what “homeboy” means in American English after discussing my PC price advantage post. He and Brian both disagreed strenuously with my assessment of the build quality of H-P’s EliteBook line, and Tony further questioned why I spec’d a 17″ EliteBook given its inconvenient size for truly mobile use– I did so because I wanted the closest match for CPU speed. In any event my admission that there still seems to be a price premium at the higher end of the configuration scale stands. Having said that, I’ve no plans to switch away from my MacBook Pro.

As of right now, we don’t currently have plans to do any Maestro events in 2012. I’m certainly open to the possibility, but we’ve had a hard time finding the optimum way to market these events and get the word out. One possibility is that we’ll work more closely with consulting and systems integration firms to go directly to their customers, and we have a few other potential tricks up our sleeves. Stay tuned for more details!

1 Comment

Filed under General Tech Stuff, UC&C

A tricky UM routing problem

A colleague who earned his Exchange 2010 last year recently contacted me with a bit of an odd UM question. Here’s the basic scenario: Steve Secretary answers the phone for Betty Bosswoman. This was set up in Cisco Call Manager such that Steve’s phone has two extensions: 1000 (Betty’s extension) and 1001 (Steve’s extension). When someone calls Betty, both phones ring, and Steve can answer it as necessary. Sometimes Steve would answer the phone and the caller would ask for Betty’s voicemail; Steve could oblige by doing a blind transfer to Betty’s extension and the call would be routed to the voicemail system.

Things were all fine with this configuration until the advent of Exchange UM. Call answering and delivery worked fine until Steve tried to transfer a call to Betty’s voicemail, now hosted on Exchange UM. The caller whose call was transferred was getting Steve’s voicemail.. not at all the right result.

This was happening because when the call was transferred, CUCM was emitting a diversion header that indicated that the call was being sent to Steve. Why? Because Steve had Betty’s extension assigned as a secondary extension! Remember, Exchange UM uses the SIP diversion information to determine where the call’s from, who it’s to, and why Exchange is getting it. If any of these three data are incorrect or missing, Exchange will fall back to assuming that the call is to the voicemail pilot number, and you’ll hear “Welcome to Microsoft Exchange. Please enter your mailbox extension” (or whatever; the exact phrase escapes me) instead of the correct greeting.

My interlocutor wanted to know if there was a way to change this behavior on the Exchange side. Sadly there isn’t– whatever diversion header information is provided, Exchange will consume. There’s no way to rewrite, edit, or otherwise control the diversion data on the Exchange side, nor can you create rules or filters that modify the actions that Exchange takes. That’s what the call coverage map on the PBX is for, see?

Anyway, after a little head scratching, some consultation with a CUCM engineer, and the sacrifice of a chicken, it was discovered that CUCM had a way to modify the extension information sent as part of a blind transfer. The change was made so that transferring a call from Steve’s phone emitted Betty’s extension instead, and the problem was solved. Unfortunately I don’t know exactly what change was made, or I’d document it here. Such are the perils of not being a CUCM guy…

4 Comments

Filed under UC&C

E-mail and defamation

So LegalZoom (which I recommend if you need a will or other basic legal document) sent me an interesting newsletter the other day. Headlined “Can You Be Sued for Sending an Email?”, it covers the case of Sandals Resorts vs Google. Basically, Sandals filed suit to force Google to disclose information about a Gmail user who wrote an e-mail they didn’t like. Google won, Sandals lost, and LegalZoom’s asking a valid question.

(Disclaimer: as though you didn’t know this, I’m not a lawyer, and this is not legal advice.)

The first facile answer that comes to mind is “of course you can be sued for an e-mail you write.” Under the American system of jurisprudence, anyone can sue anyone for anything. I’ve been harassed and threatened with lawsuits by a crazy person who objected to something I wrote on my blog about his business; so could you be. That’s part of the price of admission to a nation where you get the benefits of a stable, well-established judicial system based on adversarial law. It doesn’t mean that such a suit would be valid, just that the potential exists for it to be filed.

A little more nuanced answer requires us to dig into the facts of this particular case: Sandals didn’t sue the person who wrote the e-mail, they asked Google to find out who that person was. Google declined, and the fight was on. Anonymity is often an effective defense against bearing the consequences of what you say in e-mail… but don’t count on it. Some e-mail providers are more, shall we say, flexible than others when asked to provide information about who created an e-mail; they may do so based on a subpoena or merely upon a written request. If you use an e-mail service that you don’t run yourself, it would be worth your time to find out what kind of privacy and disclosure policies your provider follows. In this case, Google did the right thing and resisted the discovery request.

A still more nuanced answer: in this particular case, Sandals claimed that the e-mail in question was libelous, defamed their business, and caused them financial injury. The judge ruled against them on several points. The most interesting ones are these: first, because the plaintiff didn’t prove any actual financial injury, they couldn’t claim that the alleged defamation had actually harmed them. Second, the judge found that the e-mail was clearly an expression of opinion, and would be very likely perceived as such by the recipients. Defamation and libel require that the offender present their claims as fact. It’s OK for me to say “It’s my opinion that Oracle makes crappy software”; couched as an opinion, my statement cannot be construed as libelous or defamatory. If I instead claimed that Larry Ellison eats small children, and presented that claim as fact, that might be defamatory (unless I could prove that it was true, not that I’m planning on trying.)

The New York Law Journal review of the case is worth reading in depth if this sort of thing interests you, in part because it explains what you must do to write e-mails that don’t meet the legal standard for defamation (hint: overblown rhetorical language helps). It’s also fairly entertaining in its own right.

Leave a comment

Filed under UC&C

Testing speech grammars with Exchange Unified Messaging

One of the things i teach in the MCM UM curriculum is the fact that Exchange UM has a phonetic name attribute that you can use to adjust how the system pronounces unusual names like “Robichaux” or “Szcezpanski.” MVP (and now Exchange MCM!) Jeff Guillet shared an article with me during the MCM R10 UM class that explains how to preview the pronunciation you’re going to get from a given phonetic value– I’d always done it with trial and error, but Jeff’s method is better. See Jeff’s article for background on how the phonetic system works, and learn how to preview pronunciation as a bonus.

Leave a comment

Filed under UC&C

Exchange MCM R10 wrapup and a reminder about Exchange Maestro

Fellow Exchange MVP Jeff Guillet just finished rotation 10 (R10) of the Microsoft Certified Master program for Exchange. His writeup gives an excellent overview of what the program’s really like: intense and focused learning, now 7 days per week. It is very hard work, but the quality of the work that MCM candidates do with the skills and knowledge they get at MCM speaks for itself.

But suppose that you can’t spare the time or money to attend an MCM rotation? Good news: Tony Redmond and I have one more Exchange Maestro class coming up at the end of October in Greenwich, CT. For a limited time, using the registration code “FAN” will net you $250 off registration. (When I say “limited”, what I really mean is that I don’t know when Penton will stop honoring the code so I encourage you not to dawdle; the class is nearly full.)

But further suppose that you aren’t able to attend this Maestro event– after all, Connecticut in the fall isn’t for everyone. Good news: don’t forget that Tony and I are co-presenting a one-day workshop on planning and executing Exchange 2010 migrations as a pre-conference session at the Fall Exchange Connections show. In one action-packed day, we’ll cover the migration-related highlights from the Maestro curriculum, plus Tony will tell jokes. Trust me when I say that his jokes are not to be missed. Plus, it’s Halloween that day, so if I can persuade Tony to agree we might have a costume contest for attendees. I mean, who wouldn’t want to dress up in costume for Halloween in Las Vegas? That’s certainly on my bucket list. Feel free to leave costume suggestions for me in the comments section of this post.

Leave a comment

Filed under UC&C

Webcast: Office 365 vs Google Apps

Tony has been writing about Office 365 quite a bit lately, including a few discussions of pros and cons of Office 365 versus Google Apps, its chief competitor. (IBM Lotus would really like to imagine that they’re competing effectively in this space but I’ve seen no evidence that they’re doing so. Sorry, guys.)

On that theme, I wanted to mention a webcast I’m doing with the Windows IT Pro folks. Paul Thurrott, Jeff James, and I will be joined by a special guest, Matt James (no relation to Jeff). Matt’s a satisfied Google Apps customer, and we’re looking forward to getting his perspective on how these two application stacks, well, stack up.

To register for the webcast, drop by the vConference site and sign up. I hope to see you there!

1 Comment

Filed under UC&C

MCM Exchange rotation 10 notes

This weekend, I taught the unified messaging portion of rotation 10 of the Microsoft Certified Master | Exchange program. This was quite a milestone in a couple of ways. First, it’s rotation 10. That means that there are now more than 200 Exchange Masters graduates running around loose and applying the things I’ve taught them. (There aren’t that many actual MCM credential holders, as not every attendee passes the exams necessary to earn the credential.)

Second, this is the first time the Exchange MCM course has run for seven days each week. In the past, the classes have met Monday through Friday from 8am to 5pm, and often much later, with weekends reserved for study, lab work, and life maintenance– laundry, grocery shopping, and so on. The theory for this rotation is that moving to a schedule of seven class days with shorter days would be an improvement. In the past I’ve taught UM on the first day of the third week; this time I taught on class day 7. The students had already had a couple of much longer-than-expected days during the preceding week, but I attribute that to some new lab elements that were being debugged as part of this rotation. Their schedule should settle down a bit.

This rotation is small– only 4 students are in Redmond, with a dozen or so remote students attending via Lync meetings. This fostered a really intimate teaching atmosphere, which was further enhanced by our off-campus trip for lunch (Microsoft’s cafeterias are closed on weekends). I cut down the amount of material in my presentation a bit; this time the attendees only had 3 labs and about 125 slides to digest. We finished about 5:15pm, and I left them well-prepared both for the UM portion of the exam and to get through the next two weeks thinking “wow, these other instructors are way better than that UM guy.” Exchange MVP and MCM R10 candidate Jeff Guillet posted a summary of his first week in class, which you might enjoy if you want to see things from the students’ perspective.

Registration is now ongoing for the November rotation. If you’ve been considering whether to try for your MCM credential, this would be a good time to register; contact me for details if you’re interested.

On a more personal note, for this rotation I was able to get in a day early and spend some time with people I like: my former parter at 3Sharp, Paul Flynn, and I had a delicious lunch at Purple, (a favorite of mine; try the apple, walnut, and Stilton salad!), and then I met my brother Tim and his lovely wife Julie for Julie’s first trip to the pistol range, some time playing with their three cats, and a delicious Italian dinner at Paolo’s (where I’d never been but hope to return.) When I first started traveling to Seattle more than a dozen years ago, each trip was an exciting odyssey, with new people, sights, and places to encounter and explore. Even after the newness wore off, I still enjoyed the feel of visiting the big city– Toledo and its environs aren’t small, exactly, but metro Seattle is a much bigger and more diverse place. Now that I live in the Bay Area, I’m a little saddened to recognize that I don’t have exactly that same feeling towards Seattle. Living in the big city means that visiting there doesn’t have that same country-mouse-goes-to-town vibe. On the other hand, I still love the scenery there: the mountains (when visible), the pattern of the waters on Elliott Bay and Lake Washington, the thousand shades of green that blanket the hills and streets… there’s a lot to see there even if you’re on the east side. My many visits mean that it’s a comfortable and familiar place, too, which is valuable in itself. I’ll definitely be back!

1 Comment

Filed under UC&C

17 mistakes, Exchange, and thin provisioning

Justin Vashisht, whom I’ve never met but already like, unleashed a really good article on his blog this week: the 17 biggest mistakes made in Exchange 2010 deployment. His article stands well on its own; you could maybe quibble over the ordering of the items, but all of the things he cites are potential mistakes that you can easily make if you’re not careful or experienced. (Actually, I think the preferred phrase is now “operationally mature.”)

Justin’s list includes a few things that have been recent topics of discussion in the MCM community lately, and I wanted to call those out for attention because they’re important.

First, two warnings that you can’t get something for nothing:

  • Be very careful with allowing memory overcommitment (or, as Microsoft calls it, dynamic memory). Hyper-V and VMware both allow you to allocate more than the total amount of physical RAM across your VMs; that is, on a server with 64GB of RAM you could allow your VMs to consume more than 64GB. Virtual memory is certainly useful, but Exchange doesn’t like it much. Exchange 2010’s storage engine will consume as much RAM as it can get, backing off and releasing RAM only if the page fault rate increases excessively. The problem is that virtualized Exchange instances don’t see the page fault rate increasing– when you enable overcommitment, swapping happens on the host, not the guests. Memory overcommitment is mostly a cost-saving measure, and there are other, better ways to save money on your Exchange deployments. That’s why Microsoft recommends against using overcommitment on Exchange, but for some reason the word doesn’t seem to have gotten out very well.
  • Avoid thin provisioning of storage. The idea behind thin provisioning is sound: you authorize a pool of storage for an application, but you don’t actually allocate it until it’s needed. (Cue the joke about the old man whose son wanted to go to college; when the son expressed his desire, the old man said “Well, son, you have my permission.”) While the up-front savings are tempting, thin provisioning makes it very, very hard to predict exactly what your storage usage or performance patterns will look like.. not to mention that it makes stress testing difficult or impossible. Justin mentions the performance burden of on-the-fly storage allocation in his mistake #7, and that’s a sound reason to avoid it too.

The third thing I want to mention is something that you may already have heard, but it bears repeating. Stress test your storage system before deployment. This should go without saying; the fact that it’s on Justin’s list (and a similar list I’ve seen circulating around Microsoft) tells me that not everyone’s gotten the memo. You must, must, MUST test your storage hardware using both jetstress and loadgen to ensure that it will respond properly under load. There is no substitute, shortcut, or workaround that will excuse you from this requirement. If you don’t test it, you can’t know whether you’ll get suitable performance under load… and if you can’t know that, how do you know whether you’re spending your money wisely?

The rest of Justin’s list is good reading too, and I commend it to your attention. I also should mention that the last Exchange Maestro event of 2011 is right around the corner, so if you’re looking for more, shall we say, direct guidance on what to do, and not do, with Exchange, perhaps you should join us there.

1 Comment

Filed under UC&C

Microsoft is loosely coupled

Something that Tony wrote about the other day got my mental wheels spinning. He wrote a pointed explanation of the seemingly inexplicable fact that IE9 and the Exchange Management Console don’t work together. This is no fault of the Exchange team; the EMC is built on top of the Microsoft Management Console (MMC) core, and it’s the MMC that has a problem with IE9.

Tony pointed out that the problem in this case is due to poor coordination between two different teams. That’s true, but it’s actually a symptom of a deeper problem that Microsoft has: it’s made up of a bunch of loosely coupled business units. Each unit has its own business challenges, its own resource constraints, and its own strategy for winning in the marketplace. That seems reasonable on its face; after all, the challenges, constraints, and strategies for the Xbox team aren’t at all like the ones for the Exchange team, and both are different from the Dynamics CRM team.

The real problem arises when these items collide, or even when they fail to align. The IE9-MMC problem is one example. It certainly looks like the IE9 team released with an incompatibility that should have been fixed before release. Did their schedule constraints drive that release? Maybe. That leads to the bigger question of what Microsoft’s strategy is with IE– how does it drive revenue for Microsoft, or prevent them from losing revenue? Given that their biggest browser competitors, Chrome and Firefox, are both free, it’s not clear to me what strategic importance IE has.

Then consider the alignment of the Windows Phone 7 team and the Bing business unit. Bing is very tightly integrated into WP7; this would seem to put the lie to my claim that many of Microsoft’s problems are due to loose coupling. Au contraire; this case proves it. The WP7 release schedule (and market constraints) are almost completely decoupled from Bing. The desire to get tight integration between Bing services and the OS led the WP7 team to take a dependency on Bing that has resulted in new Bing features being released first for iOS. That’s not 100% accurate, as there are some technical constraints around the first release of the WP7 SDK that played a role too, but it’s a close enough approximation. Or consider PhotoSynth, not yet available for WP7 because the SDK doesn’t yet support the features it needs.

Exchange and Outlook have been down this road before. If you think back to the ill-fated Local Information Store (code-named “Rosebud”) in Office XP, you’ll see the same pattern at work: the release schedules and business objectives of the Office and Exchange team weren’t in alignment, and that led to schedule slips and feature cuts on both sides. Each time Exchange or Office release a new version, both sides have to coordinate to ensure that their “better together” strategy continues to bear fruit. “Better together” is one of the few clearly articulated and executed strategies that Microsoft has had over the last few years; in fact, it’s expanded to draw Lync in as well. Of course, the Lync team has had its own challenges, as witness the continuing lack of mobile Lync clients for iOS, Android, and WP7, or the lack for that matter of a desktop Linux client.

It’s a tough problem to solve.

Leave a comment

Filed under General Tech Stuff, UC&C

Advice to Exchange ActiveSync developers

Now the folks at Apple, Google, and other ISVs who develop Exchange ActiveSync clients no longer have excuses for bugs and misfeatures in their clients. Why? Because Katarzyna Puchala of Microsoft (already one of my favorite Microsofties thanks to her work as part of the Exchange unified messaging team) has posted three very detailed articles on how clients should behave when synchronizing with Exchange servers:

That means, third parties, that there are no longer any credible excuses for why your clients do things like randomly delete meeting requests, or fail to work with EAS autodiscover. Sadly these articles come after the release of OS X Lion, and past the point at which EAS bugs are likely to meet the release bar for iOS 5… but I can always hope that the first service release for each of those operating systems will include fixes to make their EAS implementations act right.

Leave a comment

Filed under UC&C

Volume encryption and Exchange

Computer security’s a complex and fairly arcane topic, but it’s become a mainstay of press coverage in outlets like the Wall Street Journal and the New York Times. There’s one area of security that gets comparatively little press, though: encrypted stored data so that an attacker who has physical access to the data and can copy it can’t read it.

This encryption of “data at rest” is of particular interest to Exchange admins because the Exchange public folder and mailbox databases can easily be mounted and inspected through a variety of methods. Thus an attacker who can connect to your server and steal the databases may end up being able to read every message that users in those databases have sent or received. (Of course, Exchange already supports TLS, IPsec, and other methods of encrypting data in transit, so I’m going to skip over them here.)

This risk is exacerbated by Exchange 2010’s support for DAGs. Why? DAS, that’s why. If your Exchange database is on a SAN, or a RAID array, an attacker who steals a single drive probably won’t end up with anything useful. On the other hand, if you subscribe to the one-disk-per-database DAS model, an attacker who steals a drive may get an entire, completely usable, database in her pocket.

Of course, strong physical security is a good way to mitigate this risk. Gates, guards, and guns FTW! Not everyone can apply a high level of physical security to their servers, though, and some of us like to have defense in depth anyway.

Enter disk encryption.

There are four primary methods for encrypting data at rest on a disk. The goal of all these solutions is to protect stored data on disk, not to protect messages in transit, provide non-repudation, or improve your golf game.

First, consider two solutions that we can’t really use with Exchange:

  •  third-party full-volume encryption (FVE) products. These solutions, such as TrueCrypt and PGP,  typically work by installing a Windows driver that handles volume encryption. They encrypt the entire disk volume, which means that they may also need a custom boot loader. The individual vendors may claim their solutions are supported, and they may be right.. but not by Microsoft, and not for Exchange. These solutions can be very useful for desktops and mobile PCs, but avoid them on your Exchange servers.
  • the Encrypting File System (EFS) , the Old Faithful of Windows-related encryption technology. EFS has been part of Windows for a long time now and is very mature. EFS has the advantage of being tightly integrated with Windows and taking automatic advantage of group policies, the Windows PKI, and other technologies. There’s one small fly in the ointment, though: it’s not supported for use with Exchange.

Next up, we have self-encrypting disks (SEDs). Over time, hardware always wins. Software functions that can be assimilated into hardware generally  will be. Think of how we used to do floating-point math in software, for example… or polygon fills, or SSL handshaking, or any number of other operations that can now be performed directly by hardware. Encryption’s no different. Vendors such as Seagate and Hitachi offer disk drives that incorporate encryption as part of the drive controller.  You plug the drive in, and from the minute it’s initialized the data on it are encrypted by the drive controller. Key management is an issue for SEDs, though. If you store the key on the drive, it goes with the drive and is thus available to an attacker. To prevent the drive from being reused in another server after being stolen, there’s usually an authentication step that must take place, either via a BIOS password or a boot loader. You can also use a controller, such as LSI’s SafeStore line, to provide more advanced key management.

Then there’s BitLocker, Microsoft’s FVE solution. It’s designed to be used with computers that have a TPM for securely storing the volume encryption key and performing boot-time measurement to prevent tampering. One weakness of software-only FVE systems is that it’s very difficult to detect when the boot chain has been tampered with in some manner; the TPM allows BitLocker to measure boot-time parameters and compare them with stored values from the TPM. (That’s why in its default configuration, a BitLocker-protected machine won’t boot with a CD-R or DVD-R in the boot drive– changing the boot source represents a change to the boot parameters.) BitLocker has a number of other interesting security features that I don’t have space to go into here, although the Data Encryption Toolkit for Mobile PCs does a good job of explaining them.

One important aspect of BitLocker is that’s it’s fully supported for use with DAG members (see the bottom part of this Exchange team blog post). In fact, it’s supported for use on Exchange 2007 databases as well. That automatically makes it my preferred solution. It’s true that BitLocker imposes a very small performance penalty (on the order of 3-5%) compared to SEDs, but it’s also true that BitLocker is disk-agnostic and can be used to protect all the volumes on a server, irrespective of their type.

One additional, and very useful, feature of both SEDs and BitLocker is that they provide essentially instant secure drive erasure for decommissioning drives. If you instruct an SED to erase its onboard encryption key, or remove a BitLocker-protected volume from the machine to which it’s sealed, the drive is no longer decryptable. At that point, the encrypted data is indistinguishable from random noise. As described here, this benefit is attracting a great deal of attention because it reduces the risk of inadvertently leaking sensitive data when removing drives from service for repair or reuse.

If you’re not currently encrypting your Exchange data on disk, I believe you should strongly consider doing so. BitLocker and SEDs both provide solid protection against theft or unauthorized access to machines that are shut down (though admittedly this doesn’t help Exchange much), and given the potential cost of lost data, the cost of deploying them may be money well spent.

8 Comments

Filed under UC&C

Quick Exchange 2010 Licensing Survey

I recently wrote an Exchange UPDATE column on licensing. After I did so, I was contacted by someone from Waggener-Edstrom, Microsoft’s PR agency, offering to put me in touch with a product team spokesperson who could help answer my questions.

Yesterday I spoke to the spokesperson, and I was a bit surprised by what I learned. I’d venture to guess that many others will be surprised too. (I won’t spoil the surprise yet, though.)

If you’re an Exchange administrator, please take this short (9-question) survey on Exchange licensing. I’m using it as research for a couple of upcoming UPDATE columns, and the more survey responses I get the better.

http://954812.polldaddy.com/s/exchange-server-licensing-survey

Leave a comment

Filed under UC&C