Tech Thursday: How To Configure Microsoft Certificate Services PKI

For the last few weeks, we’ve been looking at digital certificates and the Public Key Infrastructure (PKI) that makes them work. Last week, we looked at some design considerations for a Microsoft AD Certificate Services PKI. If you’ve decided to go ahead and set up your own in-house PKI, then this article will help you get started!

This week we will cover setting up the offline root CA. Then next week we’ll finish up with configuring an issuing CA and making sure that the certs and CRL are published so that your clients can use them.

Tech Thursday: Should I Set Up My Own PKI?

This month, we’ve been talking about digital certificates and public key infrastructure (PKI). So far we’ve covered the basics of how certs work, and how to install publicly trusted certs for Exchange and IIS. This week, we’re going to tackle what’s involved in setting up your own PKI using Microsoft Active Directory Certificate Services (AD CS).

As the name suggests, AD CS is highly dependent on Active Directory.

Tech Thursday: How to Install an SSL Certificate in IIS

Once you have a security certificate configured for Exchange, it’s time to start looking at other places where you need to install a cert. Internet Information Services (IIS) is used by many businesses to host Intranet apps and external web pages. This guide will show you how to request and install a certificate in IIS versions 7 through 10, for Windows Server 2008 to 2016.
Create a Certificate Request
First, you’ll need to create the Certificate Signing Request.

Tech Tuesday: How To Configure an SSL Certificate for Outlook Web Access

As we discussed in our previous article, properly configured security certificates are the key to secure communication over the Internet. And nowhere is security more important than your email system. If you host your own Exchange server, and you allow access to it over the Internet through OWA or EAS, it’s important that you configure a secure, trusted certificate to protect the information that your users transmit to it.

Tech Thursday: How Do Digital Certificates Work?

As a system administrator, one of your main priorities should be keeping your company’s data secure. But, that data doesn’t just stay in one place. It’s always on the move -- whether someone is checking their email, accessing a document on their phone, or connecting in with a VPN, data is constantly flowing in and out of your network.

Tech Thursday: How to Enable Retention Policies in Exchange Server

For the last few weeks, we’ve been looking at how to create data retention policies for various services where old data may accumulate. This week, we’ll cover creating retention policies for on-premises Exchange mailboxes. The concepts are similar to Exchange Online, but the process to create retention policies is just a bit different for self-managed Exchange servers.