{"id":52850,"date":"2025-06-20T13:03:20","date_gmt":"2025-06-20T13:03:20","guid":{"rendered":"https:\/\/www.edgenexus.io\/non-classifiee\/microsoft-pretend-quexchange-na-pas-besoin-dune-securite-de-preauthentification\/"},"modified":"2025-06-20T13:03:20","modified_gmt":"2025-06-20T13:03:20","slug":"microsoft-pretend-quexchange-na-pas-besoin-dune-securite-de-preauthentification","status":"publish","type":"post","link":"https:\/\/www.edgenexus.io\/fr\/blog-fr\/microsoft-pretend-quexchange-na-pas-besoin-dune-securite-de-preauthentification\/","title":{"rendered":"Microsoft pr\u00e9tend qu&rsquo;Exchange n&rsquo;a pas besoin d&rsquo;une s\u00e9curit\u00e9 de pr\u00e9authentification"},"content":{"rendered":"<p>            <span class=\"multiline-text\"><\/p>\n<p>Un autre article utile sur les arguments autour de l&rsquo;\u00e9change et de la pr\u00e9authenticit\u00e9<\/p>\n<p><\/span><\/p>\n<blockquote><p>Selon M. Taylor, le TMG \u00e9tait n\u00e9cessaire \u00e0 l&rsquo;\u00e9poque o\u00f9 Exchange fonctionnait sous Windows 2000. Cependant, les efforts de Microsoft en mati\u00e8re de s\u00e9curit\u00e9 (Trustworthy Computing), ainsi que son initiative Secure Windows et l&rsquo;imposition de son approche de codage du cycle de vie du d\u00e9veloppement de la s\u00e9curit\u00e9 ont rendu ces approches de s\u00e9curit\u00e9 avant authentification facultatives, dans le meilleur des cas, pour prot\u00e9ger Exchange, a-t-il expliqu\u00e9. <\/p>\n<p>Non seulement TMG n&rsquo;est pas n\u00e9cessaire, mais il s&rsquo;agit simplement d&rsquo;un pare-feu, tout comme les divers \u00e9quilibreurs de charge utilis\u00e9s avec Exchange, a sugg\u00e9r\u00e9 M. Taylor. Ils ne font qu&rsquo;ajouter de la complexit\u00e9 \u00e0 la s\u00e9curit\u00e9 du r\u00e9seau. Toutefois, M. Taylor n&rsquo;a pas totalement rejet\u00e9 l&rsquo;utilisation d&rsquo;\u00e9quilibreurs de charge avec Exchange. Il a simplement sugg\u00e9r\u00e9 que l&rsquo;utilisation de la pr\u00e9authentification avec eux n&rsquo;ajoute pas grand-chose en termes de s\u00e9curit\u00e9.   <\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>Un autre article utile sur les arguments autour de l&rsquo;\u00e9change et de la pr\u00e9authenticit\u00e9 Selon M. Taylor, le TMG \u00e9tait n\u00e9cessaire \u00e0 l&rsquo;\u00e9poque o\u00f9 Exchange fonctionnait sous Windows 2000. Cependant, les efforts de Microsoft en mati\u00e8re de s\u00e9curit\u00e9 (Trustworthy Computing), ainsi que son initiative Secure Windows et l&rsquo;imposition de son approche de codage du cycle [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[375],"tags":[],"class_list":["post-52850","post","type-post","status-publish","format-standard","hentry","category-blog-fr"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.1 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Microsoft pr\u00e9tend qu&#039;Exchange n&#039;a pas besoin d&#039;une s\u00e9curit\u00e9 de pr\u00e9authentification - Edgenexus load balancers and Application Security<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.edgenexus.io\/fr\/blog-fr\/microsoft-pretend-quexchange-na-pas-besoin-dune-securite-de-preauthentification\/\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Donna Toomey\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.edgenexus.io\/fr\/blog-fr\/microsoft-pretend-quexchange-na-pas-besoin-dune-securite-de-preauthentification\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.edgenexus.io\/fr\/blog-fr\/microsoft-pretend-quexchange-na-pas-besoin-dune-securite-de-preauthentification\/\"},\"author\":{\"name\":\"Donna Toomey\",\"@id\":\"https:\/\/www.edgenexus.io\/zh-hans\/#\/schema\/person\/dc553ff5b496630eb88bf2d9ee2b31ca\"},\"headline\":\"Microsoft pr\u00e9tend qu&rsquo;Exchange n&rsquo;a pas besoin d&rsquo;une s\u00e9curit\u00e9 de pr\u00e9authentification\",\"datePublished\":\"2025-06-20T13:03:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.edgenexus.io\/fr\/blog-fr\/microsoft-pretend-quexchange-na-pas-besoin-dune-securite-de-preauthentification\/\"},\"wordCount\":191,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.edgenexus.io\/zh-hans\/#organization\"},\"articleSection\":[\"Blog\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.edgenexus.io\/fr\/blog-fr\/microsoft-pretend-quexchange-na-pas-besoin-dune-securite-de-preauthentification\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.edgenexus.io\/fr\/blog-fr\/microsoft-pretend-quexchange-na-pas-besoin-dune-securite-de-preauthentification\/\",\"url\":\"https:\/\/www.edgenexus.io\/fr\/blog-fr\/microsoft-pretend-quexchange-na-pas-besoin-dune-securite-de-preauthentification\/\",\"name\":\"Microsoft pr\u00e9tend qu'Exchange n'a pas besoin d'une s\u00e9curit\u00e9 de pr\u00e9authentification - Edgenexus load balancers and Application Security\",\"isPartOf\":{\"@id\":\"https:\/\/www.edgenexus.io\/zh-hans\/#website\"},\"datePublished\":\"2025-06-20T13:03:20+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.edgenexus.io\/fr\/blog-fr\/microsoft-pretend-quexchange-na-pas-besoin-dune-securite-de-preauthentification\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.edgenexus.io\/fr\/blog-fr\/microsoft-pretend-quexchange-na-pas-besoin-dune-securite-de-preauthentification\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.edgenexus.io\/fr\/blog-fr\/microsoft-pretend-quexchange-na-pas-besoin-dune-securite-de-preauthentification\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.edgenexus.io\/fr\/edgenexus-load-balancing-adc-waf-et-gslb\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft pr\u00e9tend qu&#8217;Exchange n&#8217;a pas besoin d&#8217;une s\u00e9curit\u00e9 de pr\u00e9authentification\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.edgenexus.io\/zh-hans\/#website\",\"url\":\"https:\/\/www.edgenexus.io\/zh-hans\/\",\"name\":\"Edgenexus load balancers and Application Security\",\"description\":\"Edgenexus Load Balancers, ADC and Web application Firewalls (WAF)\",\"publisher\":{\"@id\":\"https:\/\/www.edgenexus.io\/zh-hans\/#organization\"},\"alternateName\":\"Load balancers and Web application firewall\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.edgenexus.io\/zh-hans\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.edgenexus.io\/zh-hans\/#organization\",\"name\":\"Edgenexus\",\"url\":\"https:\/\/www.edgenexus.io\/zh-hans\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.edgenexus.io\/zh-hans\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.edgenexus.io\/wp-content\/uploads\/2023\/09\/edgenexus-adc-sq-transparentAsset-7.png\",\"contentUrl\":\"https:\/\/www.edgenexus.io\/wp-content\/uploads\/2023\/09\/edgenexus-adc-sq-transparentAsset-7.png\",\"width\":903,\"height\":921,\"caption\":\"Edgenexus\"},\"image\":{\"@id\":\"https:\/\/www.edgenexus.io\/zh-hans\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/edgenexusio\",\"https:\/\/x.com\/edgenexusio\",\"https:\/\/www.linkedin.com\/company\/edgenexus\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.edgenexus.io\/zh-hans\/#\/schema\/person\/dc553ff5b496630eb88bf2d9ee2b31ca\",\"name\":\"Donna Toomey\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.edgenexus.io\/zh-hans\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3d4a009f6c17add48ad6905e40aac5308c04c77cdcff0616649d6c31251d1955?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3d4a009f6c17add48ad6905e40aac5308c04c77cdcff0616649d6c31251d1955?s=96&d=identicon&r=g\",\"caption\":\"Donna Toomey\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Microsoft pr\u00e9tend qu'Exchange n'a pas besoin d'une s\u00e9curit\u00e9 de pr\u00e9authentification - Edgenexus load balancers and Application Security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.edgenexus.io\/fr\/blog-fr\/microsoft-pretend-quexchange-na-pas-besoin-dune-securite-de-preauthentification\/","twitter_misc":{"\u00c9crit par":"Donna Toomey","Dur\u00e9e de lecture estim\u00e9e":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.edgenexus.io\/fr\/blog-fr\/microsoft-pretend-quexchange-na-pas-besoin-dune-securite-de-preauthentification\/#article","isPartOf":{"@id":"https:\/\/www.edgenexus.io\/fr\/blog-fr\/microsoft-pretend-quexchange-na-pas-besoin-dune-securite-de-preauthentification\/"},"author":{"name":"Donna Toomey","@id":"https:\/\/www.edgenexus.io\/zh-hans\/#\/schema\/person\/dc553ff5b496630eb88bf2d9ee2b31ca"},"headline":"Microsoft pr\u00e9tend qu&rsquo;Exchange n&rsquo;a pas besoin d&rsquo;une s\u00e9curit\u00e9 de pr\u00e9authentification","datePublished":"2025-06-20T13:03:20+00:00","mainEntityOfPage":{"@id":"https:\/\/www.edgenexus.io\/fr\/blog-fr\/microsoft-pretend-quexchange-na-pas-besoin-dune-securite-de-preauthentification\/"},"wordCount":191,"commentCount":0,"publisher":{"@id":"https:\/\/www.edgenexus.io\/zh-hans\/#organization"},"articleSection":["Blog"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.edgenexus.io\/fr\/blog-fr\/microsoft-pretend-quexchange-na-pas-besoin-dune-securite-de-preauthentification\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.edgenexus.io\/fr\/blog-fr\/microsoft-pretend-quexchange-na-pas-besoin-dune-securite-de-preauthentification\/","url":"https:\/\/www.edgenexus.io\/fr\/blog-fr\/microsoft-pretend-quexchange-na-pas-besoin-dune-securite-de-preauthentification\/","name":"Microsoft pr\u00e9tend qu'Exchange n'a pas besoin d'une s\u00e9curit\u00e9 de pr\u00e9authentification - Edgenexus load balancers and Application Security","isPartOf":{"@id":"https:\/\/www.edgenexus.io\/zh-hans\/#website"},"datePublished":"2025-06-20T13:03:20+00:00","breadcrumb":{"@id":"https:\/\/www.edgenexus.io\/fr\/blog-fr\/microsoft-pretend-quexchange-na-pas-besoin-dune-securite-de-preauthentification\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.edgenexus.io\/fr\/blog-fr\/microsoft-pretend-quexchange-na-pas-besoin-dune-securite-de-preauthentification\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.edgenexus.io\/fr\/blog-fr\/microsoft-pretend-quexchange-na-pas-besoin-dune-securite-de-preauthentification\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.edgenexus.io\/fr\/edgenexus-load-balancing-adc-waf-et-gslb\/"},{"@type":"ListItem","position":2,"name":"Microsoft pr\u00e9tend qu&#8217;Exchange n&#8217;a pas besoin d&#8217;une s\u00e9curit\u00e9 de pr\u00e9authentification"}]},{"@type":"WebSite","@id":"https:\/\/www.edgenexus.io\/zh-hans\/#website","url":"https:\/\/www.edgenexus.io\/zh-hans\/","name":"Edgenexus load balancers and Application Security","description":"Edgenexus Load Balancers, ADC and Web application Firewalls (WAF)","publisher":{"@id":"https:\/\/www.edgenexus.io\/zh-hans\/#organization"},"alternateName":"Load balancers and Web application firewall","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.edgenexus.io\/zh-hans\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.edgenexus.io\/zh-hans\/#organization","name":"Edgenexus","url":"https:\/\/www.edgenexus.io\/zh-hans\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.edgenexus.io\/zh-hans\/#\/schema\/logo\/image\/","url":"https:\/\/www.edgenexus.io\/wp-content\/uploads\/2023\/09\/edgenexus-adc-sq-transparentAsset-7.png","contentUrl":"https:\/\/www.edgenexus.io\/wp-content\/uploads\/2023\/09\/edgenexus-adc-sq-transparentAsset-7.png","width":903,"height":921,"caption":"Edgenexus"},"image":{"@id":"https:\/\/www.edgenexus.io\/zh-hans\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/edgenexusio","https:\/\/x.com\/edgenexusio","https:\/\/www.linkedin.com\/company\/edgenexus\/"]},{"@type":"Person","@id":"https:\/\/www.edgenexus.io\/zh-hans\/#\/schema\/person\/dc553ff5b496630eb88bf2d9ee2b31ca","name":"Donna Toomey","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.edgenexus.io\/zh-hans\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3d4a009f6c17add48ad6905e40aac5308c04c77cdcff0616649d6c31251d1955?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3d4a009f6c17add48ad6905e40aac5308c04c77cdcff0616649d6c31251d1955?s=96&d=identicon&r=g","caption":"Donna Toomey"}}]}},"_links":{"self":[{"href":"https:\/\/www.edgenexus.io\/fr\/wp-json\/wp\/v2\/posts\/52850","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.edgenexus.io\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.edgenexus.io\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.edgenexus.io\/fr\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.edgenexus.io\/fr\/wp-json\/wp\/v2\/comments?post=52850"}],"version-history":[{"count":0,"href":"https:\/\/www.edgenexus.io\/fr\/wp-json\/wp\/v2\/posts\/52850\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.edgenexus.io\/fr\/wp-json\/wp\/v2\/media?parent=52850"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.edgenexus.io\/fr\/wp-json\/wp\/v2\/categories?post=52850"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.edgenexus.io\/fr\/wp-json\/wp\/v2\/tags?post=52850"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}