Chapter 8. Implementing Exchange Server 2010 Security
Configuring Standard Permissions for Exchange Server 233
Configuring Role-Based Permissions for Exchange Server 244
Auditing Exchange Server Usage 268
Configuring Compliance and Messaging Retention 270
In this chapter, you'll learn how to implement Microsoft Exchange Server 2010 security and auditing. In Active Directory, you manage security using permissions. Users, contacts, and security groups all have permissions assigned to them. These permissions control the resources that users, contacts, and groups can access and the actions they can perform. You use auditing to track the use of these permissions, as well as logons and logoffs. You manage Exchange permissions using either the Active Directory ...
Get Microsoft® Exchange Server 2010 Administrator’s Pocket Consultant now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.