Implementing advanced security
This presentation is the property of its rightful owner.
Sponsored Links
1 / 18

Implementing Advanced Security PowerPoint PPT Presentation


  • 76 Views
  • Uploaded on
  • Presentation posted in: General

Implementing Advanced Security. Exchange 2000 Server Security Advanced Security Features. Microsoft Exchange 2000 Server Security. Controlling Access to Exchange 2000 resources Auditing and protocol logging Secured Internet connections Private/public key security.

Download Presentation

Implementing Advanced Security

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Implementing advanced security

Implementing Advanced Security

  • Exchange 2000 Server Security

  • Advanced Security Features


Microsoft exchange 2000 server security

Microsoft Exchange 2000 Server Security

  • Controlling Access to Exchange 2000 resources

  • Auditing and protocol logging

  • Secured Internet connections

  • Private/public key security


Controlling access to exchange 2000 resources

Controlling Access to Exchange 2000 Resources

  • Access control in Microsoft Windows 2000 Server

  • Extended permissions for Exchange 2000 Server

  • Applying and denying permission

  • Access to mailbox settings

  • Access control through NT File System (NTFS) and shared file permissions


Permissions inheritance

Permissions Inheritance


Auditing and protocol logging

Auditing and Protocol Logging

  • System access control list (SACL)

  • Enabling security auditing

  • Auditing and system performance

  • Internet Protocol (IP) logging


Enabling security auditing

Enabling Security Auditing


Firewall support for exchange 2000 server

Firewall Support forExchange 2000 Server


Encryption key types

Encryption Key Types


Advanced security features

Advanced Security Features

  • The architecture

  • Server keys and passwords

  • Enabling and implementing advanced security

  • Exchanging signed and sealed messages

  • Managing keys and certificates

  • Managing a Key Management (KM) Server

  • Advanced security with other organizations


Km server architecture

KM Server Architecture

  • Exchange Key Management Service (KMS)

  • The KM database

  • The Information Store and System Attendant

  • KM administration

  • The KM Administrator


Server keys and passwords

Server Keys and Passwords

  • KM Database Master Encryption key

  • KM Server password


Key management server architecture

Key Management Server Architecture


Exchanging signed messages

Exchanging Signed Messages


Sending a sealed message

Sending a Sealed Message


Km considerations

KM Considerations

  • KM Server for multiple administrative groups

  • Country-to-country encryption

  • Different versions in one organization


Key and certificate management

Key and Certificate Management


Moving the km server

Moving the KM Server


Chapter summary

Chapter Summary

  • Exchange 2000 Server Security

  • Advanced Security Features


  • Login