Issue OverviewExchange Insider - July 2011, Vol. 10
With more business being conducted via email and an increasing reliance on messages, concerns about mail server security, accessibility and admin privileges (or excessive privileges) are completely valid. Volume 10 of the Exchange Insider e-zine dissects two types of Exchange 2010 auditing and explains why you should use them. Access >>>
Premium Content for Free.
Exchange 2010 auditing tools to track admin, end-user behavior
by Ed Fisher, Contributor
Compliance rules make tracking admin and email users a necessary evil. Thankfully, audit logging tools in Exchange 2010 can help.
- Exchange 2010 auditing tools to track admin, end-user behavior by Ed Fisher, Contributor
Five steps to preparing for Exchange virtualization failures
by David Davis
Virtualized Exchange infrastructure failures are inevitable. Take these five crucial preparation steps to make sure you’re ready for anything.
- Five steps to preparing for Exchange virtualization failures by David Davis
More Premium Content Accessible For Free
Now that more IT admins are getting comfortable with the idea of hosted Exchange, the next challenge is deciding on the best approach to the cloud, ...
While virtualizing Exchange Server can reduce operational costs, improve flexibility and consolidate resources, a proper plan is necessary in order ...
Virtualization is a great way to consolidate resources and save precious capital, but messaging administrators still need to keep a close eye on ...