O'Reilly logo

Microsoft® Exchange Server 2010: Best Practices by Joel Stidley, Siegfried Jagott

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Planning for Messaging Security

Secure messaging in Exchange 2010 can be separated into three levels: network-based, session (or SMTP)–based, and client-based. It is important to understand at what level you want to implement protection. For example, if you implement network- or session-based security, messages are still not encrypted in a user's mailbox. Only client-based security does this. Alternatively you can also consider implementing security at every level, which definitely never can be reached.

Implementing Network-Based Security

Network-based security basically protects the communication on the network layer using protocols such as IPsec or VPN.

IPsec provides a set of extensions to the basic IP protocol and is used to encrypt server-to-server ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required