ptg
Blocking Read Receipts ......................................................................321
Information Rights Management......................................................321
Securing Outlook Web App ........................................................................322
Supported Authentication Methods..................................................322
Disabling Web Beacons for Outlook Web App .................................324
Using Safe and Block Lists.................................................................324
Summary .....................................................................................................324
Best Practices ...............................................................................................325
11 Server and Transport-Level Security 327
Considering the Importance of Security in an Exchange Server 2010
Environment.............................................................................................327
Microsoft’s Trustworthy Computing Initiative .................................328
Assessing Your Risks...........................................................................329
Exchange Server 2010 Administrative Roles.....................................330
Components of a Secure Messaging Environment ....................................331
Hardening Windows Server 2008......................................................331
Establishing a Corporate Email Policy ..............................................338
Securing Exchange Server 2010 through Administrative Policies....339
Securing Groups.................................................................................340
Using Email Disclaimers....................................................................342
Standardizing Server Builds ...............................................................344
Exchange Server-Level Security Features ....................................................344
Exchange Server 2010 Antispam Measures .......................................344
Additional Antispam Measures .........................................................346
Protecting Exchange Server 2010 from Viruses ................................347
Transport-Level Security Defined ...............................................................350
Encrypting Email Communications..................................................350
Utilizing Public Key Infrastructure (PKI)...........................................351
Utilizing S/MIME ...............................................................................351
Utilizing TLS and SSL ........................................................................352
Exchange Server 2010 SMTP Connectors...................................................352
Connector Topology..........................................................................352
Understanding Receive Connectors ..................................................354
Understanding Send Connectors ......................................................354
How Connectors Are Created............................................................355
Hub Transport Server Connectors .....................................................356
Edge Transport Server Connectors .............................................................359
Configuring Receive Connectors on the Edge Transport Server ......360
Configuring Send Connectors on the Edge Transport Server ..........361
Automatic Creation of Send Connectors..........................................361
Manual Completion of Send Connectors .........................................361
Contents
xvii
From the Library of Lee Bogdanoff