Manage
Learn to apply best practices and optimize your operations.
Microsoft Exchange Server Permissions
Understanding Exchange Online's Role-Based Access Control model
The Role-Based Access Control model manages and evaluates permissions in Exchange Online. Admins can explore the model, create new permissions and customize roles. Continue Reading
Control Exchange Online access for a more secure organization
Exchange Online's conditional access features gives organizations tighter control over how they keep end users' devices and information safe. Continue Reading
Simple steps to strengthen Exchange 2013 security
Email is a treasure trove of sensitive information. Exchange administrators must frequently check five areas to ensure email security. Continue Reading
-
Who, what, where? How the cloud complicates identity management
IT security and regulatory compliance require identity and access management. However, the move to the cloud and the spread of mobile devices has added complexity. This handbook looks at tools and best practices for managing authentication, working ... Continue Reading
Build an enterprise security strategy for Exchange
With recent news like the NSA's PRISM program grabbing headlines, enterprises are rethinking overall security, including for Exchange. Continue Reading
How to create Exchange 2013 data loss prevention policies
While data loss prevention policies are a cool new feature in Exchange 2013, you must understand how to build them before you can use them.Continue Reading
Restoring Exchange 2010 administrative permissions after a migration
One admin lost permissions after an Exchange 2010 upgrade. See why it happened, and get two fixes as we revisit our popular Ask the Expert program.Continue Reading
Why it pays to know Exchange Server 2007 administrative controls
Step up your knowledge of Exchange Server 2007 administrative roles before diving into Microsoft's new Exchange Server 2010 administrative model and groups.Continue Reading
Why you should secure Exchange 2007 using administrative policies
When securing Exchange Server 2007, administrators should look beyond internal security options to administrative policies. These policies dictate how to configure and run the Exchange organization. Typically, administrative policies vary from ...Continue Reading
How to prevent a user from moving an Exchange Server shared calendar to personal mailbox
If a user moved an Exchange Server shared calendar from a public folder to a personal mailbox, learn how to deny permissions to the user and put the calendar back where it belongs.Continue Reading
-
Securing Exchange Server 2003 -- 5 tips in 5 minutes
Learn about client-side and server-side security features in Exchange Server 2003, including Kerberos authentication, SSL security, and RPC over HTTP.Continue Reading
How to secure Exchange Server services -- A quick guide
Exchange services, like many Windows Server 2003 add-on services, can open security holes if improperly configured. Secure your Exchange services with these recommended settings.Continue Reading
Tutorial: Exchange Server public folder permissions
In this four-part tutorial, learn how to create a simple Exchange 2003 public folder tree structure, customize Exchange public folder roles and permissions, and automatically propagate Exchange parent public folder permission changes to all child ...Continue Reading
Managing recipients and distribution lists -- 15 tips in 15 minutes
Take a look inside "Learning Exchange Server 2003," with this collection of 15 tips excerpted from Chapter 5, "Managing recipients and distribution lists." Author William Boswell uses screen shots, diagrams and step-by-step instructions to teach you...Continue Reading
How to configure top-level folder permissions in Exchange 5.5
Learn how to configure top-level folder permissions for individual users or administrative groups in an Exchange 5.5 site.Continue Reading