Security

 

Applies to: Exchange Server 2010 SP3, Exchange Server 2010 SP2

By default, Exchange Server 2010 is designed to help your organization be more secure. The server role-based Exchange Setup installs only the code required for a selected server role, thereby minimizing attack surface. Setup enables only the services required for a given server role and creates the necessary firewall exceptions (rules) in Windows Firewall with Advanced Security to allow communication with those services.

The following topics are gateways to information about security in Exchange 2010.

  • Exchange 2010 Security Guide
    The Exchange 2010 Security Guide provides a comprehensive overview of the security features included in Exchange 2010.
  • Certificates
    View a list of links to topics that provide information about managing digital certificates in Exchange 2010.
  • Securing Transport Servers
    View a list of links to topics that provide information about managing the security of your transport infrastructure.
  • Permissions
    View a list of links to topics that provide information about the permissions models used by Exchange 2010, including the permissions required to perform operations in each area of Exchange 2010.
  • Administrator Audit Logging
    View a list of links to topics that provide information about administrator audit logging and how to use it to log the cmdlets run in the Exchange Management Shell, the Exchange Management Console, and the Exchange Control Panel.
  • Mailbox Audit Logging
    View a list of links to topics that provide information about mailbox audit logging, a feature that allows you to track mailbox owner, delegate, and administrator logons to a mailbox, as well as what actions are taken while the user is logged on.

 © 2010 Microsoft Corporation. All rights reserved.