List of Tables


Chapter 3: Windows and Exchange Security Architecture

Table 3-1: Common Exchange Permissions
Table 3-2: Effective Permissions Granted to Exchange Objects Might Differ from What You Explicitly Grant

Chapter 6: Windows Server Security Basics

Table 6-1: MBSA Command-Line Options
Table 6-2: Events You Should Log as Part of Your Auditing Strategy
Table 6-3: Recommended Settings for Password Policies

Chapter 7: Installing Exchange with Security in Mind

Table 7-1: Permissions Required for Various Exchange Management Tasks
Table 7-2: Property Sets Available for Delegation

Chapter 12: Secure E-Mail

Table 12-1: S/MIME Digital Signing, S/MIME Encryption, and IRM

Chapter 13: Securing Outlook

Table 13-1: Level 1 File Attachment Types
Table 13-2: CheckAdminSettings Values
Table 13-3: Policy Settings for Outlook Cryptographic Features

Chapter 14: Securing Outlook Web Access

Table 14-1: Flag Values for Outlook Web Access Segmentation
Table 14-2: Services to Turn Off on Outlook Web Access Servers

Chapter 17: Discovery, Compliance, Archive, and Retrieval

Table 17-1: Applicable United States Regulations
Table 17-2: Storage Types and Trade-Offs

Chapter 18: Security Logging

Table 18-1: Audited Security Event Types Logged by Windows Server 2003
Table 18-2: Account Management Events
Table 18-3: Events in the Account Logon Category
Table 18-4: Events in the Logon Category

Appendix B: Setup Permissions Guide

Table B-1: Permission Names and Numerical Equivalents
Table B-2: Permissions Set on the Microsoft Exchange Container
Table B-3: Permissions Set on the ADC Connection Agreement Container
Table B-4: Permissions Set on the Organization Container
Table B-5: Permissions Set on the Address Lists Container
Table B-6: Permissions Set on the Addressing Container
Table B-7: Permissions Set on the Recipient Update Services Container
Table B-8: Permissions Set on Individual Administrative Groups Within the Administrative Groups Container
Table B-9: Permissions Set on the Default Top-Level Public Folder Hierarchy
Table B-10: Permissions Set on the Connections Container Within Each Routing Group
Table B-11: Permissions Set on the Servers Container Within Each Routing Group
Table B-12: Permissions Set on the Server Object
Table B-13: Permissions Set on the Server-Specific Protocols Container
Table B-14: Permissions Set on the System Attendant Object
Table B-15: Permissions Set on the MTA Object
Table B-16: Permissions Set on the Deleted Items Container (cn=Deleted Items, cn=Configuration,dc= domain )
Table B-17: Permissions Set on the Active Directory Connector Object (cn=Active Directory Connector,cn=Exchange Settings,cn= server ,cn=Servers,cn= site ,cn=sites,cn=Configuration,)
Table B-18: Permissions Set on the Domain Container (dc= domain )
Table B-19: Permissions Set on the Domain Proxy Container (cn=Microsoft Exchange System Objects,dc= domain )
Table B-20: Permissions Set on the Pre-Windows 2000Compatible Access Group (cn=Pre-Windows 2000 Compatible Access, cn=Builtin, dc= domain )
Table B-21: Permissions Set on the Exchange Enterprise Servers Group
Table B-22: Permissions Set on the Exchange Domain Servers Group
Table B-23: Permissions Applied to Installation Directory
Table B-24: Permissions Applied to Mailroot Directory
Table B-25: Permissions Applied to Exchweb Directory
Table B-26: Permissions Applied to Exchweb\Bin Directory
Table B-27: Permissions Applied to Exchweb\Bin\Auth Directory
Table B-28: Permissions Applied to Other Exchweb Subdirectories



Secure Messaging with Microsoft Exchange Server 2003
Secure Messaging with MicrosoftВ® Exchange Server 2003 (Pro-Other)
ISBN: 0735619905
EAN: 2147483647
Year: 2004
Pages: 189

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net