Hello Robert,
It seems that in a situation where ARR rewrites requests for owa.domain.com to your Exchange Server you need to check the IIS logs for suspicious traffic on the Essentials server. One of my other customers mentioned that he did not find any traces of successful hacks of the Exchange Server when it sits behind the reverse proxy on your Essentials server.
Restricting access to untrusted connections is impossible as far as I see. You can only do that if you know from where people connect to your Exchange Server.
Mitigation steps (installing URL rewriting and running ExchangeMitigations.ps1 is not needed on a patched server but if you run it that will increase security. As a matter of fact I use URL Rewriting on this site to 'rewrite and drop' suspicious traffic. It acts as a WAF (Web Application Firewall).
answered 03/13/2021 07:23