1 / 18

Implementing Advanced Security

Implementing Advanced Security. Exchange 2000 Server Security Advanced Security Features. Microsoft Exchange 2000 Server Security. Controlling Access to Exchange 2000 resources Auditing and protocol logging Secured Internet connections Private/public key security.

lave
Download Presentation

Implementing Advanced Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Implementing Advanced Security • Exchange 2000 Server Security • Advanced Security Features

  2. Microsoft Exchange 2000 Server Security • Controlling Access to Exchange 2000 resources • Auditing and protocol logging • Secured Internet connections • Private/public key security

  3. Controlling Access to Exchange 2000 Resources • Access control in Microsoft Windows 2000 Server • Extended permissions for Exchange 2000 Server • Applying and denying permission • Access to mailbox settings • Access control through NT File System (NTFS) and shared file permissions

  4. Permissions Inheritance

  5. Auditing and Protocol Logging • System access control list (SACL) • Enabling security auditing • Auditing and system performance • Internet Protocol (IP) logging

  6. Enabling Security Auditing

  7. Firewall Support forExchange 2000 Server

  8. Encryption Key Types

  9. Advanced Security Features • The architecture • Server keys and passwords • Enabling and implementing advanced security • Exchanging signed and sealed messages • Managing keys and certificates • Managing a Key Management (KM) Server • Advanced security with other organizations

  10. KM Server Architecture • Exchange Key Management Service (KMS) • The KM database • The Information Store and System Attendant • KM administration • The KM Administrator

  11. Server Keys and Passwords • KM Database Master Encryption key • KM Server password

  12. Key Management Server Architecture

  13. Exchanging Signed Messages

  14. Sending a Sealed Message

  15. KM Considerations • KM Server for multiple administrative groups • Country-to-country encryption • Different versions in one organization

  16. Key and Certificate Management

  17. Moving the KM Server

  18. Chapter Summary • Exchange 2000 Server Security • Advanced Security Features

More Related