Introduction
In the previous chapters we already discussed some of Exchange's built-in security and compliance features like mailbox audit logging, DLP, Transport rules, personal archives, and so on. This chapter, although also dedicated to security, takes a look at the security features that can be used to protect Exchange (and its configuration) rather than its data, something that the aforementioned features are mainly used for.