Applies to: Exchange Server 2010 SP3, Exchange Server 2010 SP2
Topic Last Modified: 2011-02-14
By default, Exchange Server 2010 is designed to help your organization be more secure. The server role-based Exchange Setup installs only the code required for a selected server role, thereby minimizing attack surface. Setup enables only the services required for a given server role and creates the necessary firewall exceptions (rules) in Windows Firewall with Advanced Security to allow communication with those services.
The following topics are gateways to information about security in Exchange 2010.
- Exchange 2010 Security Guide
-
The Exchange 2010 Security Guide provides a comprehensive overview of the security features included in Exchange 2010.
- Certificates
-
View a list of links to topics that provide information about managing digital certificates in Exchange 2010.
- Securing Client Access Servers
-
View a list of links to topics that provide information about managing the security of your Client Access servers.
- Securing Transport Servers
-
View a list of links to topics that provide information about managing the security of your transport infrastructure.
- Securing Unified Messaging Servers
-
View a list of links to topics that provide information about managing the security of your Unified Messaging servers.
- Permissions
-
View a list of links to topics that provide information about the permissions models used by Exchange 2010, including the permissions required to perform operations in each area of Exchange 2010.
- Administrator Audit Logging
-
View a list of links to topics that provide information about administrator audit logging and how to use it to log the cmdlets run in the Exchange Management Shell, the Exchange Management Console, and the Exchange Control Panel.
- Mailbox Audit Logging
-
View a list of links to topics that provide information about mailbox audit logging, a feature that allows you to track mailbox owner, delegate, and administrator logons to a mailbox, as well as what actions are taken while the user is logged on.