Share via


Overview

The Microsoft Patterns and Practices team has decided to archive this content to help us to streamline our latest content offerings and focus on the newest, most relevant content. However, because some of our readers may still find this content useful, it will remain available. We offer this content as-is, without warranty that it is still technically accurate. Some of the material and URLs contained within may be outdated.

Security Operations for Exchange 2000 Server delivers the guidance necessary for IT pros to securely set up and operate a messaging and collaboration environment. This guide delivers procedures and best practices for system administrators to create and maintain a secure environment on servers running Microsoft Exchange 2000 Server with a focus on two specific server roles: Microsoft Outlook Web Access front-end servers and back-end servers. This guide was created as a supplement to Security Operations for Microsoft Windows 2000 Server. You are strongly advised to read the Windows 2000 guide in full before going on to read this guide. Sections of this guide will depend directly on information in Security Operations for Microsoft Windows 2000, and this will be indicated in the text where appropriate and the pertinent chapters are included as appendices.

Chapters

Chapter 1: Introduction

This chapter covers the scope of the guide as well as showing how it conforms to the operational guidelines set forth by the Microsoft Operations Framework (MOF). It also includes many useful links containing information pertinent to maintaining a secure environment for operating Exchange 2000 Server.

Chapter 2: Securing your Exchange 2000 Server Environment

Exchange Server is a complex application with many components that depend on each other. In order to secure Exchange Server successfully, you need to be aware of these relationships and design your security accordingly. This chapter looks at general risks to Exchange 2000 Server environments. It also introduces the two server roles that appear in the following chapters, back-end and front-end servers, and links in to Windows 2000 Security Operations to show how security can be implemented on these server types.

Chapter 3: Securing Exchange 2000 Servers Based on Role

This chapter specifically deals with securing the back-end server role and the Outlook Web Access front-end server role, including the steps you need to follow to help increase their security. It looks at the changes you need to make to a secure Windows 2000 environment to enable an Exchange 2000 server to run as securely as possible.

Chapter 4: Securing Exchange Server Communications

This chapter covers securing communication between clients and Exchange 2000 Server, for example, securing communication between Microsoft Outlook and Exchange Server. In addition, it examines possible firewall considerations for positioning of the Outlook Web Access server and looks at securing traffic not only from the Outlook Web Access server to the client, but also from the Outlook Web Access server to internal Exchange Server back-end servers.

Downloads