List of Tables


Chapter 3: Windows and Exchange Security Architecture

Table 3-1: Common Exchange Permissions
Table 3.2: Effective Permissions Granted to Exchange Objects Might Differ from What You Explicitly Grant

Chapter 6: Windows 2000 Server Security Basics

Table 6.1: MBSA Command-Line Options
Table 6.2: Events You Should Log as Part of Your Auditing Strategy
Table 6.3: Recommended Settings for Password Policies
Table 6.4: Choose the Correct Template for Your Server’s Role

Chapter 7: Installing Exchange with Security in Mind

Table 7.1: Permissions Required for Various Exchange Management Tasks
Table 7.2: Property Sets Available for Delegation

Chapter 13: Securing Outlook

Table 13.1: Level 1 File Attachment Types
Table 13.2: CheckAdminSettings Values

Chapter 14: Securing Outlook Web Access

Table 14-1: Flag Values for Outlook Web Access Segmentation
Table 14-2: Services to Turn Off on Outlook Web Access Servers

Chapter 16: Instant Messaging Security

Table 16-1: Throttling Specific IM Service Features

Chapter 17: Security Logging

Table 17-1: Audited Security Event Types Logged by Windows 2000
Table 17-2: Account Management Events
Table 17-3: Events in the Account Logon Category
Table 17-4: Events in the Logon Category

Appendix B: Permissions Guide

Table B-1: Permissions granted to objects in the Microsoft Exchange container
Table B-2: Permissions granted on the ADC Connection Agreement container
Table B-3: Permissions granted on the Organization container
Table B-4: Permissions granted on the Address Lists container
Table B-5: Permissions granted on the Addressing container
Table B-6: Permissions set on the Recipient Update Services container
Table B-7: Permissions set on individual administrative groups within the Administrative Groups container
Table B-8: Permissions set on the default top-level public folder hierarchy
Table B-9: Permissions set on the CA container
Table B-10: Permissions set on the Connections container within each routing group
Table B-11: Permissions set on the Server object
Table B-12: Permissions set on the server-specific Protocols container
Table B-13: Permissions set on the System Attendant object
Table B-14: Permissions set on the MTA object
Table B-15: Permissions set on the Deleted Items container (cn=Deleted Items, cn=Configuration, dc=domain)
Table B-16: Permissions set on the Active Directory Connector object (cn=Active Directory Connector, cn=Exchange Settings, cn=server, cn=Servers, cn=site, cn=sites, cn=Configuration,…)
Table B-17: Permissions set on the MachineEnrollmentAgent object (cn=MachineEnrollmentAgent, cn=Certificate Templates, cn=Public Key Services, …)
Table B-18: Permissions set on the ExchangeUser object (cn=Exchange User, cn=Certificate Templates, cn=Public Key Services, …)
Table B-19: Permissions set on the ExchangeUserSignature object (cn=ExchangeUserSignature, cn=Certificate Templates, cn=Public Key Services, …)
Table B-20: Permissions set on the Domain container (dc=domain)
Table B-21: Permissions set on the domain proxy container (cn=Microsoft Exchange System Objects, dc=domain)
Table B-22: Permissions set on the Exchange Enterprise Servers group
Table B-23: Permissions set on the Exchange Domain Servers group




Secure Messaging with Microsoft Exchange Server 2000
Secure Messaging with Microsoft Exchange Server 2000
ISBN: 735618763
EAN: N/A
Year: 2003
Pages: 169

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net