Manage Learn to apply best practices and optimize your operations.

8 Exchange 2003 security tips in 8 minutes

"8 Exchange 2003 security tips in 8 minutes" is excerpted from a chapter in David McAmis and Don Jones' book, Microsoft Exchange Server 2003 Delta Guide

"8 Exchange 2003 security tips in 8 minutes" is excerpted from a chapter in David McAmis and Don Jones' book, Microsoft...

Exchange Server 2003 Delta Guide, published by Sams Publishing.

To download a .pdf version of Chapter 8, "Security," in David McAmis and Don Jones' new book, click here.


Table of contents


   Server security enhancements
   Client security enhancements


Server security enhancements
[ Return to Table of Contents ]

Security has always been a concern for Exchange administrators. Since the introduction of Exchange 5.5, the tools for securing the Exchange platform have grown with every release of Exchange and the Windows Server operating system in general.

In Exchange 2003, security is a vital concern, and much time and effort have been placed on getting the security right from the start.

From the "secure by design" operating system to full support for Kerberos authentication for both servers and clients, Exchange 2003 provides a tough set of security features to crack.

One of the key areas where security administrators can really make a difference when working with Exchange is with the security of the servers. Aside from the normal security concerns (physical access, passwords, and so on), several security concerns are specific to deploying Exchange servers. The following sections examine some of the enhancements in Exchange 2003 that make it easier to secure your messaging and collaboration platform.


Client security enhancements
[ Return to Table of Contents ]

In addition to security improvements for Exchange servers, enhancements have been made to security of the clients that access Exchange. Here you will find information to help you understand some of the new security features and functionality as you think about deploying these clients.


To download a .pdf version of Chapter 8, "Security," in David McAmis and Don Jones' new book, click here.

About the authors:

David McAmis is an enterprise architect and partner in a consulting firm in Sydney, Australia. David has written a number of books and more than 100 articles that have appeared in magazines and journals.

Don Jones, MCSE, CTT+, is an independent consultant and founding partner of BrainCore.Net. Don is the author of more than a dozen books and the creator and series editor of Sams Publishing's Delta Guide series. He is also a contributing editor and columnist for Microsoft® Certified Professional Magazine, the Microsoft technology columnist for CertCities.com, and a speaker at technology conferences.


This was last published in September 2004

Dig Deeper on Email Protocols

PRO+

Content

Find more PRO+ content and other member only offers, here.

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchWindowsServer

SearchEnterpriseDesktop

SearchCloudComputing

SearchSQLServer

Close