Extended Protection and Authentication

mara2021 1,121 Reputation points
2024-04-28T02:47:32.7166667+00:00

We are a hybrid deployment. Exchange Server 2019 (SRV01 and SRV02). We use ADSync. The servers are in a DAG. They are behind a load balancer. Our users are in Exchange Online. We have an SMTP relay. We have an on-premises mailbox for our on-premises archiver application. Exchange online forwards the email to this mailbox (considered a 3rd party mailbox). The mailbox sends emails to the archiver server. Both servers are configured for TLS1.2, NTLM is set to send NTLMv2 responses only. Refuse LM & NTLM. Extended Protection is enabled on SRV01. Extended Protection is not enabled on SRV02.

SRV02 shows successes for the mailbox and is only using NTLMv2.

SRV01(extended protection enabled) shows failures for the mailbox and is only using NTLM.

Extended protection is the only difference on the server. Everything else is the same.

Is the enabled Extended Protection causing the failures? If it was NTLMv2 responses only, I would think failures would be on SRV02 also.

Any suggestions on what may be causing this and how to fix? Thank you.

Exchange Online
Exchange Online
A Microsoft email and calendaring hosted service.
6,185 questions
Exchange | Exchange Server | Management
Exchange | Hybrid management
Windows for business | Windows Server | User experience | Other
{count} votes

1 answer

Sort by: Most helpful
  1. OLATUNJI AYODELE ABIDEMI 0 Reputation points
    2024-04-29T13:46:48.91+00:00

    Microsoft Extended Protection for Authentication (EPA) is a security feature that enhances the protection of user authentication credentials and prevents unauthorized access to resources. It's designed to mitigate common attacks like man-in-the-middle, replay, and credential forwarding.

    EPA introduces two main components:

    1. Channel Binding: Verifies the identity of the client and server in a authentication session, ensuring that both parties are genuine and not impersonated.
    2. Authentication Header: Adds an extra layer of protection to the authentication process by inserting a unique token in the authentication header, making it difficult for attackers to reuse or tamper with the credentials.

    EPA supports various authentication protocols, including:

    • NTLM (NT LAN Manager)
    • Kerberos
    • TLS-DSK (Transport Layer Security-Desktop Single Sign-On)

    Benefits of Microsoft Extended Protection for Authentication:

    • Improved security for user authentication
    • Enhanced protection against credential-based attacks
    • Better compliance with security standards and regulations
    • Compatible with existing authentication infrastructure

    By implementing EPA, organizations can strengthen their authentication processes and reduce the risk of unauthorized access to sensitive resources.


Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.