Export (0) Print
Expand All

Security

Exchange 2010
 

Applies to: Exchange Server 2010 SP3, Exchange Server 2010 SP2

Topic Last Modified: 2011-02-14

By default, Exchange Server 2010 is designed to help your organization be more secure. The server role-based Exchange Setup installs only the code required for a selected server role, thereby minimizing attack surface. Setup enables only the services required for a given server role and creates the necessary firewall exceptions (rules) in Windows Firewall with Advanced Security to allow communication with those services.

The following topics are gateways to information about security in Exchange 2010.

Exchange 2010 Security Guide

The Exchange 2010 Security Guide provides a comprehensive overview of the security features included in Exchange 2010.

Certificates

View a list of links to topics that provide information about managing digital certificates in Exchange 2010.

Securing Client Access Servers

View a list of links to topics that provide information about managing the security of your Client Access servers.

Securing Transport Servers

View a list of links to topics that provide information about managing the security of your transport infrastructure.

Securing Unified Messaging Servers

View a list of links to topics that provide information about managing the security of your Unified Messaging servers.

Permissions

View a list of links to topics that provide information about the permissions models used by Exchange 2010, including the permissions required to perform operations in each area of Exchange 2010.

Administrator Audit Logging

View a list of links to topics that provide information about administrator audit logging and how to use it to log the cmdlets run in the Exchange Management Shell, the Exchange Management Console, and the Exchange Control Panel.

Mailbox Audit Logging

View a list of links to topics that provide information about mailbox audit logging, a feature that allows you to track mailbox owner, delegate, and administrator logons to a mailbox, as well as what actions are taken while the user is logged on.

 © 2010 Microsoft Corporation. All rights reserved.
Was this page helpful?
(1500 characters remaining)
Thank you for your feedback

Community Additions

ADD
Show:
© 2014 Microsoft