June 2007
Intermediate to advanced
720 pages
20h 39m
English
This chapter outlined some security policy elements that relate to e-mail and Exchange Server that should be included in your overall security policy manual. The creation of such policies forms the foundation for creating electronic policies that, in turn, inform security technology decisions and purchases. In reality, a great security implementation starts with information security policies that are comprehensive in nature and that specify acceptable and unacceptable behavior in a number of areas, including messaging.
In Chapter 19, Chapter 20, and Chapter 21, you learn how to implement specific security policies and technologies to support a secure Exchange messaging infrastructure in your organization.