Chapter 10. Exchange Security

In this chapter, we will cover the following:

  • Granting users full access permissions to mailboxes
  • Finding users with full access to mailboxes
  • Sending e-mail messages as another user or group
  • Working with Role Based Access Control (RBAC)
  • Creating a custom RBAC role for administrators
  • Creating a custom RBAC role for end users
  • Troubleshooting Role Based Access Control
  • Generating a certificate request
  • Installing certificates and enabling services
  • Importing certificates on multiple exchange servers

Introduction

When it comes to managing security in Exchange 2010, you have several options, depending on the resources that you're dealing with. For example, you can allow multiple users to open a mailbox by assigning them full access permissions ...

Get Microsoft Exchange 2010 PowerShell Cookbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.