Owa Redirect bedingt das der Download des OAB fehlschlägt in Office 2007/2010

Häufig gibt es in Foren oder in Mailinglisten die Nachfrage warum der Download des Adressbuches nicht funktioniert. Über ein weiteres mögliches Problem bin ich gestern gestolpert. Wenn man einen Redirect in Owa konfiguriert, beispielsweise um den Usern zu ermöglichen im Browser einfach “owa” einzugeben anstatt immer den FQDN und https voranstellen zu müssen. Wie das mit Exchange 2010 funktioniert hat Microsoft im Technet beschrieben.

Leider passiert dann außer das der Redirect sich vererbt auch noch eine andere “Unschönheit”. In der Datei web.config im OAB-Verzeichnis (default zu finden unter c:\program files\microsoft\exchange\v14\clientaccess\oab ) wird die Berechtigung Read & Execute für Authentifizierte Benutzer entfernt. Nachvollziehen kann man das folgendermaßen. Im Browser die Adresse des OAB´s eingeben (get-oabvirtualdirectory | internalUrl auf der Powershell zeigt die Url an). Wenn dort “500 Serverfehler” erscheint hat die Datei die falschen Berechtigungen. Erscheint ein Anmeldefenster sollte es passen.

So sollte das Aussehen wenn die Berechtigung für die User richtig gesetzt ist:

image

Viele Grüße

 

Walter Steinsdorfer

Exchange 2010 Sp1 Rollup 4 verfügbar

Das Exchange – Team hat Rollup 4 für Exchange 2010 Service Pack 1 zur Verfügung gestellt. Auf dem Teamblog hat die Exchange PG die 3 wichtigsten Issues aufgelistet, die mit dem Rollup 4 behoben werden. In dem Packet sind natürlich noch andere Fixes enthalten. KB 2509910 fast diese zusammen:

  • 2537099 (http://support.microsoft.com/kb/2537099/ ) "80040154" error message when you try to configure external Client Access namespaces on an Exchange Server 2010 server

  • 2536700 (http://support.microsoft.com/kb/2536700/ ) Outlook stops responding when you try to copy a folder to its subfolder by using Outlook in online mode in an Exchange Server 2010 SP1 environment

  • 2536517 (http://support.microsoft.com/kb/2536517/ ) The Microsoft Exchange RPC Client Access service crashes intermittently on an Exchange Server 2010 server

  • 2536494 (http://support.microsoft.com/kb/2536494/ ) It takes a long time to return results when you perform an Advanced Find search on a mailbox by using Outlook in online mode in an Exchange Server 2010 SP1 environment

  • 2535648 (http://support.microsoft.com/kb/2535648/ ) The EMC takes a long time to open in an Exchange Server 2010 environment

  • 2535130 (http://support.microsoft.com/kb/2535130/ ) Performance in Outlook or in OWA decreases when you use IMAP4 to access the contacts folder in an Exchange Server 2010 environment

  • 2535105 (http://support.microsoft.com/kb/2535105/ ) There is no option to disable the Availability service in an Exchange Server 2010 environment

  • 2533543 (http://support.microsoft.com/kb/2533543/ ) Event ID 2153 is logged on each database availability group member in an Exchange Server 2010 environment

  • 2533538 (http://support.microsoft.com/kb/2533538/ ) You cannot look up the free/busy information of a user who is located on an Exchange Server 2010 organization from another Exchange Server 2010 organization

  • 2533451 (http://support.microsoft.com/kb/2533451/ ) A RBAC role assignee can unexpectedly run the "Update-FileDistributionService" command on an Exchange Server 2010 server that is outside the role assignment scope

  • 2519359 (http://support.microsoft.com/kb/2519359/ ) "Changes to the rule cannot be saved." error message when you try to create a reply rule by using Outlook in an Exchange Server 2010 environment

  • 2518850 (http://support.microsoft.com/kb/2518850/ ) You cannot receive email messages on a mobile phone by using ActiveSync in an Exchange Server 2010 environment

  • 2517088 (http://support.microsoft.com/kb/2517088/ ) Public folder conflict resolution does not work as usual in an Exchange Server 2010 environment

  • 2515259 (http://support.microsoft.com/kb/2515259/ ) "The items could not be copied." error message when you run the Get-MailboxSearch cmdlet in an Exchange Server 2010 SP1 environment

  • 2514709 (http://support.microsoft.com/kb/2514709/ ) Event ID 1001 after you successfully the install Exchange Server 2010 Unified Messaging server role

  • 2514574 (http://support.microsoft.com/kb/2514574/ ) The Exchange RPC Client Access service crashes in an Exchange Server 2010 environment

  • 2513723 (http://support.microsoft.com/kb/2513723/ ) The "New-MailboxImportRequest" cmdlet does not import all messages in a .pst file in the ANSI format in an Exchange Server 2010 environment

  • 2512023 (http://support.microsoft.com/kb/2512023/ ) "GetUserOofSettings", "SetUserOofSettings" and "GetUserAvailability" operations do not support Exchange Impersonation on the Exchange Server 2010 SP1 schema

  • 2511897 (http://support.microsoft.com/kb/2511897/ ) You cannot send an email message to a mailbox for a brief period when you move the mailbox by using online move in an Exchange Server 2010 environment

  • 2507463 (http://support.microsoft.com/kb/2507463/ ) You cannot move a mailbox that contains a corrupted Search Folder in an Exchange Server 2010 environment

  • 2506820 (http://support.microsoft.com/kb/2506820/ ) The free/busy information does not display of a user whose mailbox is located on an Exchange Server 2003 server

  • 2506049 (http://support.microsoft.com/kb/2506049/ ) The hierarchy of a new public folder database on an Exchange Server 2010 SP1 server is not replicated

  • 2505968 (http://support.microsoft.com/kb/2505968/ ) The EdgeTransport.exe process crashes when you apply a rule that contains a bad email address in an Exchange Server 2010 environment

  • 2504453 (http://support.microsoft.com/kb/2504453/ ) You cannot retrieve statistical information about a public folder by using the "Get-PublicFolderStatistics" cmdlet in an Exchange Server 2010 SP1 environment

  • 2503337 (http://support.microsoft.com/kb/2503337/ ) Comments of your meeting response message is missing when you decline a meeting request in an Exchange Server 2010 environment

  • 2501070 (http://support.microsoft.com/kb/2501070/ ) A RBAC role assignee can stop queue processing on an Exchange Server 2010 Hub Transport server or an Exchange Server 2010 Edge Transport server that is outside the role assignment scope

  • 2500903 (http://support.microsoft.com/kb/2500903/ ) A space is missing in the subject line of a "Tentative" meeting response in an Exchange Server 2010 environment

  • 2500648 (http://support.microsoft.com/kb/2500648/ ) "There are no items to show in this view." error message when you try to view a folder in Outlook in an Exchange Server 2010 environment

  • 2495167 (http://support.microsoft.com/kb/2495167/ ) You cannot recover a deleted public folder by using Outlook or MFCMAPI in an Exchange Server 2010 environment

  • 2495010 (http://support.microsoft.com/kb/2495010/ ) The EdgeTransport.exe process consumes 100% CPU usage on an Exchange Server 2010 Edge Transport server or an Exchange Server 2007 Edge Transport server

  • 2493393 (http://support.microsoft.com/kb/2493393/ ) You cannot use ECP to perform a wipe on a mobile phone in an Exchange Server 2010 SP1 environment

  • 2492068 (http://support.microsoft.com/kb/2492068/ ) "The item cannot be saved to this folder." error message when try to post an item to a mail-disabled public folder in an Exchange Server 2010 SP1 environment

  • 2491354 (http://support.microsoft.com/kb/2491354/ ) You cannot view the free/busy information of users in a mixed Exchange Server 2007 and Exchange Server 2010 environment

  • 2490134 (http://support.microsoft.com/kb/2490134/ ) A deferred delivery email message is not delivered by using Outlook 2007 in online mode in an Exchange Server 2010 environment

  • 2489964 (http://support.microsoft.com/kb/2489964/ ) An update enables range 0x-0x1F characters in the display name of an Exchange Server 2010 user account

  • 2489938 (http://support.microsoft.com/kb/2489938/ ) The "Connect-ExchangeServer" function does not change the target Exchange server in Exchange Server 2010

  • 2489130 (http://support.microsoft.com/kb/2489130/ ) A RBAC role assignee can unexpectedly change mailbox properties that are outside the management role group scope in an Exchange Server 2010 environment

  • 2488643 (http://support.microsoft.com/kb/2488643/ ) Outlook downloads duplicated POP3 email messages in an Exchange Server 2010 environment

  • 2479188 (http://support.microsoft.com/kb/2479188/ ) The iCal parts of an email message contain invalid entries when they are sent from an Exchange Server 2003 mailbox to an Exchange Server 2010 mailbox

  • 2477273 (http://support.microsoft.com/kb/2477273/ ) The DomainController parameter does not work when you use the "MoveMailbox.ps1" script to move mailboxes in an Exchange Server 2010 environment

  • 2471964 (http://support.microsoft.com/kb/2471964/ ) A NDR is sent to the sender when you move an email message to a personal folder file in an Exchange Server 2010 SP1 or a later version environment

  • 2467619 (http://support.microsoft.com/kb/2467619/ ) A user who manages a distribution group cannot remove another user whose mailbox is disabled in an Exchange Server 2010 environment

  • 2465292 (http://support.microsoft.com/kb/2465292/ ) "MAPI_E_FAILONEPROVIDER (0x8004011D)" error message when you access an Exchange Server 2010 mailbox by using a MAPI application

  • 2446908 (http://support.microsoft.com/kb/2446908/ ) ESE event descriptions are missing in Event Viewer when the Eseutil utility is called on an Exchange Server 2010 SP1 server

  • 2394554 (http://support.microsoft.com/kb/2394554/ ) An email message is not delivered if it contains unsupported encoded characters in the subject line in an Exchange Server 2010 environment

  • 2491951 (http://support.microsoft.com/kb/2491951/ ) You cannot install Exchange Server 2010 SP1 if the NetBIOS domain name of the domain controller contains an ampersand (&) character

  • 2507066 (http://support.microsoft.com/kb/2507066/ ) Administrator audit logging is disabled unexpectedly during an Exchange Server 2010 SP1 installation

 

Anmerkung: Das Rollup 4 ist kumulativ und setzt lediglich Service Pack 1 voraus. Vorherige Rollups müssen nicht installiert werden. Rollup 5 könnte im August erscheinen.

 

Happy patching!

Viele Grüße

 

Walter Steinsdorfer

Office 2010 Sp1 verfügbar

Für Office 2010 ist das Service Pack 1 verfügbar. Mehr Informationen dazu mit weiterführenden Links werden im offiziellen Office-Teamblog bereitgestellt.

In dem Zug wurde auch für den Sharepoint und Project – Server das Service Pack 1 entwickelt.

Zur Downloadseite kommt man hier:

 

Achtung: Bitte immer vorher prüfen ob man 32 oder 64 Bit installiert hat!

image Zu finden ist das im Backstage – Bereich unter Hilfe.

 

Happy patching!

Viele Grüße

 

Walter Steinsdorfer

Finden wir wirklich immer das richtige?


Früher, lange bevor das Internet herauskam wurden Informationen über die Zeitung verbreitet. Hier übernahm die Presse quasi den Filter was die Bevölkerung so vorgesetzt bekommen hat. Heute haben wir Suchmaschinen und immer einen ungefilterten Einblick auf alles, quasi ein Stück Freiheit mehr mag so manche denken. Leider ist es damit nicht so weit her wie wir vor einigen Wochen bei Facebook erfahren mussten. Auch die Google-Ergebnisse sind unterschiedlich, je nachdem an welchem Rechner wir uns aufhalten oder in welchem Land. Diese von Eli Pariser gehaltene Demo stellt das eindrucksvoll dar:



Lasst euch überraschen. Die Google – Suche habe ich bereits getestet, auch in Facebook sind meine Optionen bereits angepasst.


Viele Grüße


 


Walter Steinsdorfer

Sicherheitsupdates für Juni

So vergeht die Zeit, es ist schon wieder mal der 2. Dienstag im Monat gewesen. Wie die meisten wissen ist an diesem Tag Microsoft Patch Day. Folgende Sicherheitslücken sind aktuell gefixed worden:

MS11-038

Vulnerability in OLE Automation Could Allow Remote Code Execution (2476490)
This security update resolves a privately reported vulnerability in Microsoft Windows Object Linking and Embedding (OLE) Automation. The vulnerability could allow remote code execution if a user visits a Web site containing a specially crafted Windows Metafile (WMF) image. In all cases, however, an attacker would have no way to force users to visit such a Web site. Instead, an attacker would have to convince users to visit a malicious Web site, typically by getting them to click a link in an e-mail message or Instant Messenger request.

 

MS11-039

Vulnerability in .NET Framework and Microsoft Silverlight Could Allow Remote Code Execution (2514842)
This security update resolves a privately reported vulnerability in Microsoft .NET Framework and Microsoft Silverlight. The vulnerability could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerability could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and then executes the page, as could be the case in a Web hosting scenario. This vulnerability could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions.

 

MS11-040

Vulnerability in Threat Management Gateway Firewall Client Could Allow Remote Code Execution (2520426)
This security update resolves a privately reported vulnerability in the Microsoft Forefront Threat Management Gateway (TMG) 2010 Client, formerly named the Microsoft Forefront Threat Management Gateway Firewall Client. The vulnerability could allow remote code execution if an attacker leveraged a client computer to make specific requests on a system where the TMG firewall client is used.

 

MS11-041

Vulnerability in Windows Kernel-Mode Drivers Could Allow Remote Code Execution (2525694)
This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user visits a network share (or visits a web site that points to a network share) containing a specially crafted OpenType font (OTF). In all cases, however, an attacker would have no way to force a user to visit such a web site or network share. Instead, an attacker would have to convince a user to visit the web site or network share, typically by getting them to click a link in an e-mail message or Instant Messenger message.

 

MS11-042

Vulnerabilities in Distributed File System Could Allow Remote Code Execution (2535512)
This security update resolves two privately reported vulnerabilities in the Microsoft Distributed File System (DFS). The more severe of these vulnerabilities could allow remote code execution when an attacker sends a specially crafted DFS response to a client-initiated DFS request. An attacker who successfully exploited this vulnerability could execute arbitrary code and take complete control of an affected system. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed.

 

MS11-043

Vulnerability in SMB Client Could Allow Remote Code Execution (2536276)
This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if an attacker sent a specially crafted SMB response to a client-initiated SMB request. To exploit the vulnerability, an attacker must convince the user to initiate an SMB connection to a specially crafted SMB server.

 

MS11-044

Vulnerability in .NET Framework Could Allow Remote Code Execution (2538814)
This security update resolves a publicly disclosed vulnerability in Microsoft .NET Framework. The vulnerability could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs). Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerability could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and then executes the page, as could be the case in a Web hosting scenario. This vulnerability could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions.

 

MS11-050

Cumulative Security Update for Internet Explorer (2530548)
This security update resolves eleven privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

 

MS11-052

Vulnerability in Vector Markup Language Could Allow Remote Code Execution (2544521)
This security update resolves a privately reported vulnerability in the Microsoft implementation of Vector Markup Language (VML). This security update is rated Critical for Internet Explorer 6, Internet Explorer 7, and Internet Explorer 8 on Windows clients; and Moderate for Internet Explorer 6, Internet Explorer 7, and Internet Explorer 8 on Windows servers. Internet Explorer 9 is not affected by the vulnerability.
The vulnerability could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

 

MS11-037

Vulnerability in MHTML Could Allow Information Disclosure (2544893)
This security update resolves a publicly disclosed vulnerability in the MHTML protocol handler in Microsoft Windows. The vulnerability could allow information disclosure if a user opens a specially crafted URL from an attacker’s Web site. An attacker would have to convince the user to visit the Web site, typically by getting them to follow a link in an e-mail message or Instant Messenger message.

 

MS11-045

Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution (2537146)
This security update resolves eight privately reported vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a user opens a specially crafted Excel file. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. Installing and configuring Office File Validation (OFV) to prevent the opening of suspicious files blocks the attack vectors for exploiting the vulnerabilities described in CVE-2011-1272, CVE-2011-1273, and CVE-2011-1279. Microsoft Excel 2010 is only affected by CVE-2011-1273 described in this bulletin. The automated Microsoft Fix it solution, "Disable Edit in Protected View for Excel 2010," available in Microsoft Knowledge Base Article 2501584, blocks the attack vectors for exploiting CVE-2011-1273.

 

MS11-046

Vulnerability in Ancillary Function Driver Could Allow Elevation of Privilege (2503665)
This security update resolves a publicly disclosed vulnerability in the Microsoft Windows Ancillary Function Driver (AFD). The vulnerability could allow elevation of privilege if an attacker logs on to a user’s system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit the vulnerability.

 

MS11-047

Vulnerability in Hyper-V Could Allow Denial of Service (2525835)
This security update resolves a privately reported vulnerability in Windows Server 2008 Hyper-V and Windows Server 2008 R2 Hyper-V. The vulnerability could allow denial of service if a specially crafted packet is sent to the VMBus by an authenticated user in one of the guest virtual machines hosted by the Hyper-V server. An attacker must have valid logon credentials and be able to send specially crafted content from a guest virtual machine to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users.

 

MS11-048

Vulnerability in SMB Server Could Allow Denial of Service (2536275)
This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker created a specially crafted SMB packet and sent the packet to an affected system. Firewall best practices and standard default firewall configurations can help protect networks from attacks originating outside the enterprise perimeter that would attempt to exploit this vulnerability.

 

MS11-049

Vulnerability in the Microsoft XML Editor Could Allow Information Disclosure (2543893)
This security update resolves a privately reported vulnerability in Microsoft XML Editor. The vulnerability could allow information disclosure if a user opened a specially crafted Web Service Discovery (.disco) file with one of the affected software listed in this bulletin. Note that this vulnerability would not allow an attacker to execute code or to elevate their user rights directly, but it could be used to produce information that could be used to try to further compromise the affected system.

 

MS11-051

Vulnerability in Active Directory Certificate Services Web Enrollment Could Allow Elevation of Privilege (2518295)
This security update resolves a privately reported vulnerability in Active Directory Certificate Services Web Enrollment. The vulnerability is a cross-site scripting (XSS) vulnerability that could allow elevation of privilege, enabling an attacker to execute arbitrary commands on the site in the context of the target user. An attacker who successfully exploited this vulnerability would need to send a specially crafted link and convince a user to click the link. In all cases, however, an attacker would have no way to force a user to visit the Web site. Instead, an attacker would have to persuade a user to visit the Web site, typically by getting them to click a link in an e-mail message or Instant Messenger message that takes the user to the vulnerable Web site.

Die Patche wurden bereits auf einigen von mir betreuten Systemen ausgerollt und es gab bisher keinerlei “Unfälle”. Ein Backup kann natürlich nicht schaden.

Mehr Infos zu den Patchen stellt Microsoft unter dem folgenden Link bereit:

http://www.microsoft.com/technet/security/bulletin/ms11-jun.mspx

Desweiteren sind auch bei Adobe mehrere Patche heraus für die Produkte Adobe Reader und Flash Player (und noch etliche andere..). Dazu gibt es unter dem folgenden Link weitere Informationen: http://www.adobe.com/support/security/bulletins/apsb11-16.html

 

Happy patching also.

Viele Grüße

 

Walter Steinsdorfer