CYA: Securing Exchange Server 2003 and Outlook Web Access. by Henrik Walther and Patrick Santry (Auth.)

By Henrik Walther and Patrick Santry (Auth.)

Content material:
Acknowledgments

, Page v
Author

, Page vii
Technical Editor

, Page viii
About the Series

, Pages xvii-xviii
Chapter 1 - Introducing alternate 2003 Security

, Pages 1-8
Chapter 2 - home windows and trade 2003 protection Practices

, Pages 9-24
Chapter three - Delegating and Controlling Permissions in alternate 2003

, Pages 25-53
Chapter four - SMTP Security

, Pages 55-92
Chapter five - Securing the Outlook internet entry Server

, Pages 93-131
Chapter 6 - OWA Front-End/Back-End Deployment Scenarios

, Pages 133-156
Chapter 7 - Outlook net entry shopper protection Features

, Pages 157-177
Chapter eight - trade Protocol/Client Encryption

, Pages 179-212
Chapter nine - battling Spam

, Pages 213-240
Chapter 10 - holding opposed to Viruses

, Pages 241-260
Chapter eleven - Auditing Exchange

, Pages 261-270
Appendix - making plans Server Roles and Server Security

, Pages 271-303
Index

, Pages 305-317

Show description

Read or Download CYA: Securing Exchange Server 2003 and Outlook Web Access. Cover Your A©© by Getting It Right the First Time PDF

Best nonfiction_9 books

Grundlagen elektrischer Maschinen, Neunte Auflage

Content material: bankruptcy 1 Transformator (pages 43–201): bankruptcy 2 Allgemeine Betrachtungen uber rotierende elektrische Maschinen (pages 203–281): bankruptcy three Gleichstrommaschine (pages 283–357): bankruptcy four Allgemeine Betrachtungen uber Maschinen mit Drehfeldern als Luftspaltfeld (pages 359–392): bankruptcy five Dreiphasen?

Hadronic Transport Coefficients from Effective Field Theories

This dissertation specializes in the calculation of shipping coefficients within the subject created in a relativistic heavy-ion collision after chemical freeze-out. This topic should be good approximated utilizing a pion gasoline out of equilibrium. We describe the theoretical framework had to receive the shear and bulk viscosities, the thermal and electric conductivities and the flavour diffusion coefficients of a meson fuel at low temperatures.

34th Hemophilia Symposium: Hamburg 2003

This booklet comprises the contributions to the thirty fourth Hemophilia Symposium, Hamburg 2003. the most themes are HIV an infection and epidemiology, administration of bleedings in hemophiliacs with inhibitors, orthopedic difficulties and remedy in hemophiliacs, remedy with protein C and pediatric hemostaseology. the quantity is rounded off by way of quite a few unfastened papers and posters on hemophilia, hemophiliacs with inhibitors, thrombophilia and molecular diagnostics.

Extra info for CYA: Securing Exchange Server 2003 and Outlook Web Access. Cover Your A©© by Getting It Right the First Time

Example text

But it's important that you understand this wouldn't work, because all SMTP servers delivering e-mail messages to your server would need to configure a valid user account/password at their end, making the Exchange administration even more complex. Try to imagine configuring a valid username and password for each mail domain with which your users communicate via e-mail. It would be an absolute nightmare, so in the end, you will have to accept this "vulnerability" Luckily, there are several ways to limit it.

The Public Folder Store on a given Exchange server can replicate its Public Folders to Public Folder Stores located on other Exchange servers in the organization. You can create additional Public Folder trees, which can contain their own set of Public Folder hierarchies. Because this book is about Exchange security, we won't go into detail on how to administer and manage Public Folders, Public Folder Stores, and Public Folder Trees, but instead we'll dive into how you configure permissions in regard to Public Folder Stores and Public Folders.

You can delegate administrative permissions at the organization level in System Manager or at an administrative group level. The scope of permissions you set is determined by the location from which you launch the wizard. If you start the wizard from the organization level, the groups or users that you specify will have administrative permissions at the organizational level. If you launch the wizard from the administrative group level, the groups or users that you specify will have administrative permissions at the administrative group level.

Download PDF sample

Rated 4.58 of 5 – based on 25 votes