Microsoft KB Archive/829027

= INFO: Security Operations for Microsoft Exchange 2000 Server Guide =

Article ID: 829027

Article Last Modified on 4/29/2004

-

APPLIES TO


 * Microsoft Exchange 2000 Server Standard Edition

-



SUMMARY
This article discusses the Microsoft Security Operations for Microsoft Exchange 2000 Server guide.

The Security Operations for Microsoft Exchange 2000 Server guide contains information to help you securely set and operate a messaging and collaboration environment. This guide contains procedures and best practices for system administrators to create and maintain a secure environment on computers that are running Microsoft Exchange 2000 Server. This guide discusses the following specific server roles:
 * Microsoft Outlook Web Access (OWA) front-end servers
 * Microsoft Outlook Web Access (OWA) back-end servers

This guide was created as a supplement to the Microsoft Solution guide Securing Microsoft Windows 2000 Server.

For more information about Securing Microsoft Windows 2000 Server, visit the following Microsoft Web site:

http://www.microsoft.com/technet/Security/prodtech/win2000/secwin2k/01intro.mspx



MORE INFORMATION
The Security Operations for Microsoft Exchange 2000 Server guide is made up of the following chapters:
 * Chapter 1 – Introduction

This chapter discusses the scope of the guide and how the guide follows the operational guidelines that are set by the Microsoft Operations Framework (MOF). This chapter also includes many useful links to information about how to maintain a secure environment for operating Exchange 2000 Server.
 * Chapter 2 – Securing your Exchange 2000 environment

Exchange Server is a complex application. It has many components that depend on each other. To secure the Exchange 2000 Server environment successfully, you must be aware of these relationships and design your security accordingly. This chapter discusses some of the general risks to Exchange Server 2000 environments. This chapter also introduces the two server roles that appear in the following chapters: back-end and front-end servers. It also discusses Microsoft Windows 2000 security operations and describes how you can implement security measures on these server types.
 * Chapter 3 – Securing Exchange 2000 Servers based on role

This chapter specifically discusses how to secure the back-end server role and the OWA front-end server role. It includes the steps that you can take to increase the security of these servers. This chapter also describes changes that Microsoft recommends that you make to a secure Windows 2000 environment to allow a server computer that is running Exchange 2000 Server to run more securely.
 * Chapter 4 – Securing Exchange communications

This chapter discusses how to secure communication between clients and Exchange 2000 Server. For example, it discusses how to secure communication between Outlook and Exchange. This chapter also discusses possible firewall considerations for positioning of the OWA server and how to secure traffic both from the OWA server to the client and from the OWA server to internal Exchange back-end servers.

