Event Review: Secure Manageable Messaging (Session ITPROHOT-15)

Welcome to the material supporting page for this session. The materials on this page have been selected as the best matches to the content covered in the live event session.

Session Outline

As Contoso's business practices have evolved to offer workers more flexibility and to encourage collaboration, the messaging infrastructure has become a central hub of activity. This has led the company's IT department to identify the messaging environment as a potential target for attack. In part six in our series, Contoso prepares to upgrade to a more secure, monitored, and maintained messaging infrastructure that supports mobile users. We show how to configure Microsoft Internet Security and Acceleration (ISA) Server 2006, Windows Rights Management Services, Microsoft Antigen, and Microsoft Exchange Hosted Services to provide a secure server infrastructure. We also demonstrate how to deploy Microsoft Operations Manager with management packs to minimize the costs associated with maintaining this solution.

Session Media

This session consists of a Windows Media presentation and demonstrations:
Download the full session

Download the full multimedia recording of this session.

Download all slides and transcripts

Download just the slides and transcripts of this session.

Microsoft Press Books

  • Secure Messaging with Microsoft Exchange Server 2003

    Summary: From risk assessment to implementation and auditing procedures, get critical guidance to help enhance the security of your messaging infrastructure. Written by a network security expert who works closely with the Microsoft Exchange Server team, this guide delivers essential information and advice to help protect your clients, servers, and communications channels. Discover how to use the security features available in the Exchange and Microsoft Windows environments to harden the underlying system configuration and create multiple layers of defense against viruses, worms, and other threats-helping you improve messaging integrity over e-mail and the Internet.

  • Assessing Network Security

    Summary: Don't wait for an attacker to find and exploit your security vulnerabilities—take the lead by assessing the state of your network's security. This book delivers advanced network testing strategies, including vulnerability scanning and penetration testing, from members of the Microsoft security teams. These real-world practitioners provide hands-on guidance on how to perform security assessments, uncover security vulnerabilities, and apply appropriate countermeasures. The companion CD features time-saving tools and scripts that you can use to reveal and help correct security vulnerabilities in your own network