Summary

This chapter outlined some security policy elements that relate to e-mail and Exchange Server that should be included in your overall security policy manual. The creation of such policies forms the foundation for creating electronic policies that, in turn, inform security technology decisions and purchases. In reality, a great security implementation starts with information security policies that are comprehensive in nature and that specify acceptable and unacceptable behavior in a number of areas, including messaging.

In Chapter 19, Chapter 20, and Chapter 21, you learn how to implement specific security policies and technologies to support a secure Exchange messaging infrastructure in your organization.

Get Microsoft® Exchange Server 2007 Administrator's Companion now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.