Preview

Exchange Server 2010 Architecture Poster

Satisfactory Essays
Open Document
Open Document
3344 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Exchange Server 2010 Architecture Poster
Microsoft Exchange Server 2010 Architecture
Management and Monitoring
Remote PowerShell
Remote PowerShell extends PowerShell from servers to client computers so commands can be executed remotely. Set-AddressList Exchange Server 2010 takes advantage Set-AddressList of new PowerShell v2.0 and Windows Remote Management All Exchange management tools are built on Remote PowerShell. Remote PowerShell enables administrators to run Exchange cmdlets on computers without the need to install Exchange management tools.

Exchange Server 2010 High-Level Architecture
Scope (Where) Defines the objects in AD that the Role can act on. For example, the Boston Users OU
Boston Users Scope

Role Based Access Control (RBAC)
Role Assignment – The link that holds together the Who, What, and Where. (Where)

Internet Clients
Anti-spam and anti-virus filters • Connection Filter • Sender Filtering • Recipient Filtering • Sender ID Filter • Content Filter • Sender Reputation • Attachment Filter • Virus Scanning • Outlook Junk E-mail Filter

Edge Transport Server Role
The Edge Transport server role cannot coexist on the same computer with any other server role. Recommendation: Install the Edge Transport server role on a computer that is not part of a domain.
Edge Transport Server Deliver Hub Transport Server

Client Access Server Array (CAS Array)
Serves as a single contact point for all client connections within an Active Directory site. Can include one or many Client Access servers. Each Active Directory site can have a single Client Access server array. Does not provide load balancing. A separate load balancing solution is still needed. Recommendation: Create a Client Access server array even if you only have a single Client Access server.

Add/Del/Mod Users

Role Assignment

Role Group (Who) A security group that defines Who gets a specific scope applied to them. For example, the Boston Exchange Admins

PBX Outlook

HTTP, POP3, IMAP4 Clients

SMTP

Mobile

You May Also Find These Documents Helpful

  • Better Essays

    Flexible single master operation (FSMO) Roles should be assigned to ensure the best recoverability and operation of your Domain Controllers.…

    • 1426 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Nt1210 U6 Lab

    • 447 Words
    • 2 Pages

    ESS - An Extended Service Set (ESS) is a set of two or more BSSs that form a single sub network.…

    • 447 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    3. Another SMTP Server security threat is malware. Malware is malicious software which can be in various forms such as trojans, viruses, spyware and worms. Malware is usually installed without the user’s consent. It can attack the user’s computer and then use the user’s computer to attack other computers. To help prevent the spread of malware, you can have firewalls and proper security software protection. (Hampton, 2011)…

    • 487 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Scenario 5: (RBAC) Role Based Access Control. With RBAC in place the security measures would be assigned to each user and monitored by the security administrator(s). Using this Access control method would allow for high-grade security with manageability in mind. Allowing each user a set of permissions dependent on their group, or role, allows the system admin to more easily monitor security by group; which is perfect for a military network.…

    • 286 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The Second threat is Spam. Spam is expected to increase to 80 to 90 percent of total email. Moreover, the boundary between spam and viruses is blurring. New viruses turn desktop PCs into spam-spewing "zombies." There is also a new type of spamming technique called "phishing," used to dupe recipients into providing confidential personal identity information.…

    • 546 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Ch05EOCAs

    • 2578 Words
    • 13 Pages

    What defines the types of objects that can belong to a particular group and the types of resources that group can be used to secure?…

    • 2578 Words
    • 13 Pages
    Satisfactory Essays
  • Powerful Essays

    NT2670 Midtern Questions

    • 842 Words
    • 3 Pages

    The Add Roles Wizard provides roles that fall into three basic categories: directory services, Application services, and what else?…

    • 842 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    Apply email server and attachment antivirus/malware and email quadrating for unknown file types. Disable for ping, probing, and port scanning on all exterior IP devices. Denying of outbound traffic using source IP addresses. Apply file transfer monitoring, scanning and alarming for unknown file types. Web Surfing should be monitored by filtering out any unknown IP address with trusted cites. Apply domain-name content filtering at the internet entry/access point as well.…

    • 313 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Nt280 Week 1 Homework

    • 359 Words
    • 2 Pages

    A. Enable content filtering and antivirus scanning at the entry and exit points of the internet. Enable workstation auto-scans and auto-quarantine for unknown file types.…

    • 359 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Network 230 Week 1 Quiz

    • 278 Words
    • 2 Pages

    (TCO 1) The _____ role is central to implementing Active Directory and creating one or more domains.…

    • 278 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Exercise 1 Upgrading

    • 444 Words
    • 2 Pages

    The person who installed this told me that the server is functioning as a domain controller and the eight…

    • 444 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Role Based Access Control or RBAC, this will work well with the Non-Discretionary Access Control model, which will be detailed in the next paragraph. RBAC is defined as setting permissions or granting access to a group of people with the same job roles or responsibilities . With many different locations along with many different users it is important to identify the different users and different workstations within this network. Every effort should be dedicated towards preventing user to access information they should not have access to.…

    • 651 Words
    • 3 Pages
    Good Essays
  • Good Essays

    lab 4

    • 503 Words
    • 2 Pages

    The Windows tool that allows you to administer granular policies and permissions on a Windows network using role-based access is the Group Policy Object Editor.…

    • 503 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    communication and crisis

    • 298 Words
    • 3 Pages

    The individuals or groups that will be communicating inside and outside the organization during this crisis situation…

    • 298 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Communication and Crisis

    • 1785 Words
    • 8 Pages

    The individuals or groups that will be communicating inside and outside the organization during this crisis situation…

    • 1785 Words
    • 8 Pages
    Better Essays

Related Topics