Chapter 3: Windows and Exchange Security Architecture
Table 3-1: Common Exchange Permissions
Table 3.2: Effective Permissions Granted to Exchange Objects Might Differ from What You Explicitly Grant
Chapter 6: Windows 2000 Server Security Basics
Table 6.1: MBSA Command-Line Options
Table 6.2: Events You Should Log as Part of Your Auditing Strategy
Table 6.3: Recommended Settings for Password Policies
Table 6.4: Choose the Correct Template for Your Server’s Role
Chapter 7: Installing Exchange with Security in Mind
Table 7.1: Permissions Required for Various Exchange Management Tasks
Table 7.2: Property Sets Available for Delegation
Chapter 13: Securing Outlook
Table 13.1: Level 1 File Attachment Types
Table 13.2: CheckAdminSettings Values
Chapter 14: Securing Outlook Web Access
Table 14-1: Flag Values for Outlook Web Access Segmentation
Table 14-2: Services to Turn Off on Outlook Web Access Servers
Chapter 16: Instant Messaging Security
Table 16-1: Throttling Specific IM Service Features
Chapter 17: Security Logging
Table 17-1: Audited Security Event Types Logged by Windows 2000
Table 17-2: Account Management Events
Table 17-3: Events in the Account Logon Category
Table 17-4: Events in the Logon Category
Appendix B: Permissions Guide
Table B-1: Permissions granted to objects in the Microsoft Exchange container
Table B-2: Permissions granted on the ADC Connection Agreement container
Table B-3: Permissions granted on the Organization container
Table B-4: Permissions granted on the Address Lists container
Table B-5: Permissions granted on the Addressing container
Table B-6: Permissions set on the Recipient Update Services container
Table B-7: Permissions set on individual administrative groups within the Administrative Groups container
Table B-8: Permissions set on the default top-level public folder hierarchy
Table B-9: Permissions set on the CA container
Table B-10: Permissions set on the Connections container within each routing group
Table B-11: Permissions set on the Server object
Table B-12: Permissions set on the server-specific Protocols container
Table B-13: Permissions set on the System Attendant object
Table B-14: Permissions set on the MTA object
Table B-15: Permissions set on the Deleted Items container (cn=Deleted Items, cn=Configuration, dc=domain)
Table B-16: Permissions set on the Active Directory Connector object (cn=Active Directory Connector, cn=Exchange Settings, cn=server, cn=Servers, cn=site, cn=sites, cn=Configuration,…)
Table B-17: Permissions set on the MachineEnrollmentAgent object (cn=MachineEnrollmentAgent, cn=Certificate Templates, cn=Public Key Services, …)
Table B-18: Permissions set on the ExchangeUser object (cn=Exchange User, cn=Certificate Templates, cn=Public Key Services, …)
Table B-19: Permissions set on the ExchangeUserSignature object (cn=ExchangeUserSignature, cn=Certificate Templates, cn=Public Key Services, …)
Table B-20: Permissions set on the Domain container (dc=domain)
Table B-21: Permissions set on the domain proxy container (cn=Microsoft Exchange System Objects, dc=domain)
Table B-22: Permissions set on the Exchange Enterprise Servers group
Table B-23: Permissions set on the Exchange Domain Servers group