Flylib.com
Secure Messaging with MicrosoftВ® Exchange Server 2003 (Pro-Other)
Secure Messaging with MicrosoftВ® Exchange Server 2003 (Pro-Other)
ISBN: 0735619905
EAN: 2147483647
Year: 2004
Pages: 189
Authors:
Paul Robichaux
BUY ON AMAZON
Table of Contents
BackCover
Secure Messaging with Microsoft Exchange Server 2003
Introduction
Who This Book Is For
What s in This Book
What s Not in This Book
Conventions Used in This Book
Support
Part I: Security Fundamentals
Chapter 1: Security Buzzwords
What Does Security Mean?
Authentication
Access and Resource Control
Data Integrity
Confidentiality and Privacy
Malicious Code
Rights Management
Summary
Additional Reading
Chapter 2: Security Protocols and Algorithms
Secret-Key Encryption
Public-Key Encryption
Digital Signatures
Protocols
Summary
Additional Reading
Chapter 3: Windows and Exchange Security Architecture
Learning the Right Lingo
Authentication
Access Control and Permissions
Summary
Additional Reading
Chapter 4: Threats and Risk Assessment
Types of Security Threats
Models for Risk Assessment
Summary
Additional Reading
Chapter 5: Physical and Operational Security
Physical and Operational Threat Assessment
Beefing Up Your Physical Security
Strengthening Operational Security
Summary
Additional Reading
Part II: Exchange Server Security
Chapter 6: Windows Server Security Basics
Taking the First Step: Patch Management
Securing What s Most at Risk: A Checklist
Tightening Things Further
Summary
Additional Reading
Chapter 7: Installing Exchange with Security in Mind
Designing an Active Directory Structure for Exchange
Installing Exchange
Delegating Control
Applying the Finishing Touches
Summary
Additional Reading
Chapter 8: SMTP Relaying and Spam Control
Understanding Relaying
Controlling Relaying
Understanding Spam
Using Exchange s Spam Control Features
Evaluating Third-Party Antispam Products
Summary
Additional Reading
Chapter 9: Content Control, Monitoring, and Filtering
Adding Disclaimers
Filtering Inbound and Outbound Content
Reading Other People s Mail
Using Message Tracking
Searching the Store for Specific Content
Summary
Additional Reading
Chapter 10: Antivirus Protection
Understanding Virus Protection Principles
Designing Defense in Depth
Everything Else
Summary
Additional Reading
Part III: Communications Security
Chapter 11: Securing Internet Communications
Using TLSSSL with SMTP
Using IPSec
Publishing MAPI RPCs with ISA Server
Tunneling RPC over HTTPS
Summary
Additional Reading
Chapter 12: Secure E-Mail
Understanding the Exchange - PKI Combination
Introducing Rights Management
Comparing SMIME and RM
Planning Your SMIME Encryption Infrastructure
Installing Certificate Services
Configuring and Managing Certificate Services
Summary
Additional Reading
Part IV: Client Security
Chapter 13: Securing Outlook
Understanding Outlook s Security Features
Customizing the Outlook Security Update
Customizing Outlook Security Settings for End Users
Setting Up RPC over HTTP
Using SMIME
Using Information Rights Management
Reaching into Outlook s Toolbox
Summary
Additional Reading
Chapter 14: Securing Outlook Web Access
Understanding Outlook Web Access
Controlling Access to Outlook Web Access
Using SSL with Outlook Web Access
Improving Outlook Web Access Client Security
Securing Outlook Web Access with Firewalls
Publishing Outlook Web Access with ISA Server
Applying the Finishing Touches
Summary
Additional Reading
Chapter 15: Securing POP and IMAP
Understanding POP and IMAP
Controlling User Access to IMAP and POP
Using POP and IMAP with SSL
Summary
Additional Reading
Part V: Advanced Topics
Chapter 16: Securing Mobile Exchange Access
Understanding Exchange s Mobility Features
Securing OMA and EAS
Securing Mobile Devices
Summary
Additional Reading
Chapter 17: Discovery, Compliance, Archive, and Retrieval
What, Me Worry?
Understanding DCAR
Building a DCAR System
Summary
Additional Reading
Chapter 18: Security Logging
Using Auditing in Windows Server 2003
What to Audit and Why
Summary
Additional Reading
Chapter 19: Security Auditing
Summary
Additional Reading
Chapter 20: The Law and Your Exchange Environment
Some Legal Principles
Devising Network Use Policies
Summary
Additional Reading
Part VI: Appendixes
Appendix A: The Ten Immutable Laws
The Ten Immutable Laws of Security Administration
Appendix B: Setup Permissions Guide
A Note About Interpreting ACL Entries
Permissions on Objects in the Exchange Configuration Tree
Permissions on the Server Object and Its Children
Permissions on Other Objects in the Configuration Tree
Permissions on Objects in the Domain Naming Context
Permissions on File System Objects
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X
Index_Z
List of Figures
List of Tables
List of Sidebars
Secure Messaging with MicrosoftВ® Exchange Server 2003 (Pro-Other)
ISBN: 0735619905
EAN: 2147483647
Year: 2004
Pages: 189
Authors:
Paul Robichaux
BUY ON AMAZON
Kanban Made Simple: Demystifying and Applying Toyotas Legendary Manufacturing Process
Forming Your Kanban Team
Size the Kanban
Developing a Kanban Design
Initial Startup and Common Pitfalls
Improving the Kanban
Microsoft Windows Server 2003(c) TCP/IP Protocols and Services (c) Technical Reference
Internet Protocol (IP) Basics
Transmission Control Protocol (TCP) Basics
Transmission Control Protocol (TCP) Connections
Transmission Control Protocol (TCP) Data Flow
Internet Information Services (IIS) and the Internet Protocols
C++ How to Program (5th Edition)
Proxy Classes
Exception Specifications
Swapping strings
Wrap-Up
L.4. Controlling Execution Using the Step Into, Step Over, Step Out and Continue Commands
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
Overview of Captology
Computers as Persuasive Media Simulation
Increasing Persuasion through Mobility and Connectivity
The Ethics of Persuasive Technology
Captology Looking Forward
AutoCAD 2005 and AutoCAD LT 2005. No Experience Required
Setting Up a Drawing
Gaining Drawing Strategies: Part 2
Dimensioning a Drawing
Managing External References
Appendix A Look at Drawing in 3D
802.11 Wireless Networks: The Definitive Guide, Second Edition
Encapsulation of Higher-Layer Protocols Within 802.11
Differential Phase Shift Keying (DPSK)
OFDM PMD
Cisco 1200 Access Point
Logical Wireless Network Architecture
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies