This section contains instructions on how to configure security features in Microsoft Exchange 2000 Server. You can control access to different Exchange objects (such as connectors, public folders, and servers) by setting object permissions. You can also control connections to your Exchange virtual servers by requiring user authentication or by blocking access from certain users and computers. You can audit the messages sent to your Exchange mail system by logging the client IP addresses, domain names, dates and times of messages, or message sizes.
This section contains the following topics: