Chapter 9. Implementing Exchange security
In this chapter, you’ll learn how to implement Microsoft Exchange Server security. In Active Directory, you manage security using permissions. Users, contacts, and security groups all have permissions assigned to them. These permissions control the resources that users, contacts, and groups can access and the actions they can perform. You use auditing to track the use of these permissions, as well as log ons and log offs. You manage Exchange permissions using either the Active Directory tools or the Exchange management tools.
As with Exchange ...
Get Microsoft Exchange Server 2013 Pocket Consultant: Configuration & Clients now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.