Standardizing Exchange Server Virtual Directories authentication settings

EnterpriseArchitect 6,301 Reputation points
2025-12-09T11:46:55.0866667+00:00

I need help and suggestions to standardise the authentication of Exchange Server (2016) and Subscription Edition Virtual Directories. I am concerned about security, as I have noticed some of them are blank and are using insecure Basic Authentication.

Server    Name                                           Internal                                      External                                     
------    ----                                           --------                                      --------                                     
VMEXCSE01 Autodiscover (Default Web Site)                Basic,Ntlm,OAuth,WindowsIntegrated,WSSecurity Basic,Ntlm,OAuth,WindowsIntegrated,WSSecurity
EXC2k1601 Autodiscover (Default Web Site)                Basic,Ntlm,OAuth,WindowsIntegrated,WSSecurity Basic,Ntlm,OAuth,WindowsIntegrated,WSSecurity
EXC2k1602 Autodiscover (Default Web Site)                Basic,Ntlm,OAuth,WindowsIntegrated,WSSecurity Basic,Ntlm,OAuth,WindowsIntegrated,WSSecurity
EXC2k1601 ecp (Default Web Site)                         Basic,Fba                                     Fba                                          
EXC2k1602 ecp (Default Web Site)                         Basic,Fba                                     Fba                                          
VMEXCSE01 ecp (Default Web Site)                                                                       Fba                                          
VMEXCSE01 EWS (Default Web Site)                         Ntlm,OAuth,WindowsIntegrated,WSSecurity       Ntlm,OAuth,WindowsIntegrated,WSSecurity      
EXC2k1602 EWS (Default Web Site)                         Ntlm,OAuth,WindowsIntegrated,WSSecurity       Ntlm,OAuth,WindowsIntegrated,WSSecurity      
EXC2k1601 EWS (Default Web Site)                         Ntlm,OAuth,WindowsIntegrated,WSSecurity       Ntlm,OAuth,WindowsIntegrated,WSSecurity      
EXC2k1602 Microsoft-Server-ActiveSync (Default Web Site)                                                                                            
EXC2k1601 Microsoft-Server-ActiveSync (Default Web Site)                                                                                            
VMEXCSE01 Microsoft-Server-ActiveSync (Default Web Site)                                                                                            
EXC2k1601 owa (Default Web Site)                         Basic,Fba                                     Fba                                          
VMEXCSE01 owa (Default Web Site)                                                                       Fba                                          
EXC2k1602 owa (Default Web Site)                         Basic,Fba                                     Fba                                          
EXC2k1602 Rpc (Default Web Site)                         Ntlm                                          Ntlm                                         
EXC2k1601 Rpc (Default Web Site)                         Ntlm                                          Negotiate                                    
VMEXCSE01 Rpc (Default Web Site)                         Ntlm                                          Ntlm                                         

Note: VMEXCSE01 is the Windows Server 2025 and Exchange Server SE, whereas the rest is just WIndows Server 2016 with Exchange Server 2016.

Any help would be greatly appreciated.

Exchange | Exchange Server | Management
Exchange | Exchange Server | Management
The administration and maintenance of Microsoft Exchange Server to ensure secure, reliable, and efficient email and collaboration services across an organization.
0 comments No comments
{count} votes

1 answer

Sort by: Most helpful
  1. Steven-N 15,160 Reputation points Microsoft External Staff Moderator
    2025-12-09T13:34:30.65+00:00

    Hi EnterpriseArchitect

    Thank you for reaching out to Microsoft Q&A

    From my perspective view and as states in Default settings for Exchange virtual directories in Exchange Server, this behavior arises from inconsistent authentication settings across servers, like defaulting to Basic Authentication in some directories, create security risks such as credential theft and man-in-the-middle attacks.

    This is especially problematic in mixed setups (Windows Server 2016/Exchange 2016 and 2025/Exchange SE) where blank settings rely on insecure defaults. As Basic Authentication is being deprecated, this could disrupt connectivity and compliance.

    Therefore, to address this behavior, may you can try the following approach to see if it can resolve your concern:

    1. Backup current configurations

    Before making any changes, export your current settings. Use Exchange Management Shell (EMS) commands like:

    Get-AutodiscoverVirtualDirectory | fl > Backup.txt
    

    Do this for each directory type (Autodiscover, ECP, EWS, ActiveSync, OWA, RPC) on all your servers.

    2. Assess and standardize settings

    • Autodiscover: Set to NTLM or Negotiate (disable Basic) using this command:
    Set-AutodiscoverVirtualDirectory -Identity "<Server>\Autodiscover (Default Web Site)" -BasicAuthentication $false -WindowsAuthentication $true
    
    • ECP and OWA: Use Forms-Based Authentication (FBA), but move to ADFS for better security since FBA uses Basic Authentication in the background.
    • EWS: Enable NTLM, Windows Integrated, and OAuth.
    • ActiveSync: Disable Basic Authentication. Enable Certificate-Based Authentication (CBA) if you have a PKI or use NTLM as a fallback.
    • RPC (Outlook Anywhere): Standardize to Negotiate/NTLM. Consider disabling if your clients use MAPI/HTTP.

    3. Enable modern authentication

    For better security, switch to OAuth-based Modern Authentication. This works in Exchange SE (via ADFS) and hybrid setups for Exchange 2016. You’ll need to set up an Authentication Policy and enable it for each directory. Link instructions

    4. Test and Apply Changes: After updates, restart IIS (iisreset /noforce), test connectivity with tools like Test-OutlookWebServices, and monitor event logs for issues. Apply changes during maintenance windows to minimize disruption.

    5. Ongoing security measures: Enable Extended Protection for Windows Authentication and ensure all traffic uses TLS 1.2+ with valid certificates as states in Configure Windows Extended Protection in Exchange Server

    Additionally, I have found the document about the best practice in setting security in Exchange Sever, you can read at: CSI_MICROSOFT_EXCHANGE_SERVER_SECURITY_BEST_PRACTICES.PDF

    Note: Microsoft is providing this information as a convenience to you. These sites are not controlled by Microsoft, and Microsoft cannot make any representations regarding the quality, safety, or suitability of any software or information found there. Please ensure that you fully understand the risks before using any suggestions from the above link.

    Hope my answer will help you, for any further concern, kindly let me know in the comment section.


    If the answer is helpful, please click "Accept Answer" and kindly upvote it. If you have extra questions about this answer, please click "Comment".     

    Note: Please follow the steps in our documentation to enable e-mail notifications if you want to receive the related email notification for this thread.


Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.