Chapter 10. Exchange Security
In this chapter, we will cover the following:
Granting users full access permissions to mailboxes
Finding users with full access to mailboxes
Sending e-mail messages as another user or group
Working with Role Based Access Control (RBAC)
Creating a custom RBAC role for administrators
Creating a custom RBAC role for end users
Troubleshooting Role Based Access Control
Generating a certificate request
Installing certificates and enabling services
Importing certificates on multiple exchange servers