| | ||||||||||
| Secure Messaging with Microsoft Exchange Server 2003 | |
| by Paul Robichaux | ISBN:0735619905 |
| Microsoft Press © 2004 | |
| From risk assessment to implementation and auditing procedures, this guide offers critical guidance to help enhance the security of your messaging infrastructure. | |
| Table of Contents | |||
| | Secure Messaging with Microsoft Exchange Server 2003 | ||
| | Introduction | ||
| Part I - Security Fundamentals | |||
| | Chapter 1 | - | Security Buzzwords |
| | Chapter 2 | - | Security Protocols and Algorithms |
| | Chapter 3 | - | Windows and Exchange Security Architecture |
| | Chapter 4 | - | Threats and Risk Assessment |
| | Chapter 5 | - | Physical and Operational Security |
| Part II - Exchange Server Security | |||
| | Chapter 6 | - | Windows Server Security Basics |
| | Chapter 7 | - | Installing Exchange with Security in Mind |
| | Chapter 8 | - | SMTP Relaying and Spam Control |
| | Chapter 9 | - | Content Control, Monitoring, and Filtering |
| | Chapter 10 | - | Antivirus Protection |
| Part III - Communications Security | |||
| | Chapter 11 | - | Securing Internet Communications |
| | Chapter 12 | - | Secure E-Mail |
| Part IV - Client Security | |||
| | Chapter 13 | - | Securing Outlook |
| | Chapter 14 | - | Securing Outlook Web Access |
| | Chapter 15 | - | Securing POP and IMAP |
| Part V - Advanced Topics | |||
| | Chapter 16 | - | Securing Mobile Exchange Access |
| | Chapter 17 | - | Discovery, Compliance, Archive, and Retrieval |
| | Chapter 18 | - | Security Logging |
| | Chapter 19 | - | Security Auditing |
| | Chapter 20 | - | The Law and Your Exchange Environment |
| Part VI - Appendixes | |||
| | Appendix A | - | The Ten Immutable Laws |
| | Appendix B | - | Setup Permissions Guide |
| | Index | ||
| | List of Figures | ||
| | List of Tables | ||
| | List of Sidebars | ||