Chapter 8. Implementing Exchange Server 2010 Security

  • Configuring Standard Permissions for Exchange Server 233

  • Configuring Role-Based Permissions for Exchange Server 244

  • Auditing Exchange Server Usage 268

  • Configuring Compliance and Messaging Retention 270

In this chapter, you'll learn how to implement Microsoft Exchange Server 2010 security and auditing. In Active Directory, you manage security using permissions. Users, contacts, and security groups all have permissions assigned to them. These permissions control the resources that users, contacts, and groups can access and the actions they can perform. You use auditing to track the use of these permissions, as well as logons and logoffs. You manage Exchange permissions using either the Active Directory ...

Get Microsoft® Exchange Server 2010 Administrator’s Pocket Consultant now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.