Secure Messaging with MicrosoftВ® Exchange Server 2003 (Pro-Other)
Chapter 2: Security Protocols and Algorithms
- Key Length and Work Factor
- Signatures and the Law
- Hashed Message Authentication Codes
Chapter 3: Windows and Exchange Security Architecture
- Global, Domain Local, and Universal Groups
- Permissions and Public Folders
Chapter 6: Windows Server Security Basics
- Stop, Drop, and Bulletin!
- The Ultra-Short Guide to Group Policies
- Administrator Passwords
Chapter 7: Installing Exchange with Security in Mind
- Domain Controller or Member Server?
- Delegating Control on the Users Container
Chapter 8: SMTP Relaying and Spam Control
- The Stealth SMTP AUTH Attack
- Accepting or Rejecting Messages on a Connector
- Accepting or Rejecting Messages on a Connector
- Separating Spam from Real Mail
- How to Get Off Block Lists
- Creating Your Own DNS Block List
Chapter 11: Securing Internet Communications
- Approving Pending Requests
- When Negotiation Fails
- CRL Checking for IPSec
- Careful with Those Exemptions
- What About New Mail Notification?
Chapter 12: Secure E-Mail
- Protecting the Root CA
- Why We Still Love the KMS
- Integrating Smart Cards
Chapter 14: Securing Outlook Web Access
- Outlook Web Access and the Single Server
- Virtual Servers Versus Virtual Directories
- Accelerating SSL
- More Security for Windows 2000 Server Password Changes
Chapter 15: Securing POP and IMAP
- SSL and Wireless Devices
Chapter 17: Discovery, Compliance, Archive, and Retrieval
- A Sample Case: Woodgrove Bank