In the previous chapters we already discussed some of Exchange's built-in security and compliance features like mailbox audit logging, DLP, Transport rules, personal archives, and so on. This chapter, although also dedicated to security, takes a look at the security features that can be used to protect Exchange (and its configuration) rather than its data, something that the aforementioned features are mainly used for.
Microsoft Exchange 2013 Cookbook
Microsoft Exchange 2013 Cookbook
Overview of this book
Table of Contents (21 chapters)
Microsoft Exchange 2013 Cookbook
Credits
About the Author
Acknowledgments
About the Author
Acknowledgments
About the Reviewers
www.PacktPub.com
Preface
Free Chapter
Planning an Exchange Server 2013 Infrastructure
Installing Exchange Server 2013
Configuring the Client Access Server Role
Configuring and Managing the Mailbox Server Role
Configuring External Access
Implementing and Managing High Availability
Transitioning to Exchange Server 2013
Configuring Security and Compliance Features
Performing Backup, Restore, and Disaster Recovery
Implementing Security
Getting to Know Exchange Server 2013
Index
Customer Reviews