Exchange Server 2003 Message Security Guide
来源:互联网 发布:淘宝茶叶店铺前十 编辑:程序博客网 时间:2024/05/29 18:14
With the growth of the Internet in recent years, e-mail has fundamentally changed. It is no longer only an internal tool within companies and organizations. Instead, it now unites people across companies, countries, and has even allowed people on earth to share information with those in space, as if they were in the same building. E-mail has arguably become the single most important benefit of the Internet to date. As people and companies increasingly integrate e-mail into their lives, its importance increases daily. Where e-mail was once a convenience, now it is a necessity. Before, people used e-mail to simply send short, unimportant notes to one another. Now, though, people use e-mail to send critical information.
The unprecedented growth of e-mail has been enabled by the worldwide adoption of the underlying protocol or language of Internet e-mail: Simple Mail Transfer Protocol (SMTP). The SMTP standard makes it possible for different e-mail systems connected to the Internet to exchange information with one another.
However, despite all the benefits that SMTP has brought to the Internet, it has an inherent problem. The SMTP standard was originally developed to carry brief, relatively unimportant messages on a closed network, not to carry critical and sensitive information in an interconnected world. No one who developed SMTP imagined that it would play the role it plays today. Because of that, SMTP was not designed to protect the type of information it carries today across the networks it crosses today. It was designed to carry simpler information across simpler networks, hence the name Simple Mail Transfer Protocol. For example, SMTP sends information across the Internet in a way that allows anyone to read the message.
Fortunately, Secure/Multipurpose Internet Mail Extension (S/MIME) has emerged as a standard to enhance SMTP e-mail messages with security capabilities. Using S/MIME, encryption protects the contents of e-mail messages and digital signatures verify the identity of a purported sender of an e-mail message.
Implementing S/MIME for e-mail requires a solution that spans multiple products and technologies. This book provides guidance on how to implement S/MIME with Microsoft® Exchange Server 2003. In addition, this book provides guidance and pointers to other resources where those are necessary.
Essentially, this book provides detailed answers to the following questions:
- What is S/MIME?
- What security services does S/MIME provide?
- What are the components of an Exchange 2003-based S/MIME system?
- What steps need to be taken with other technologies to implement S/MIME in Exchange 2003?
- How does someone using Key Management Server in Exchange Server version 5.5 or Exchange 2000 Server upgrade to Exchange 2003?
- What is the Microsoft Office Outlook® Web Access with S/MIME control, and how does it work?
Although practically anyone with a technical background can benefit from reading this book, it is designed to produce maximum benefits for the following professionals.
- Exchange Administrators
Those individuals responsible for installation, maintenance, and administration of Exchange Server 2003 in the enterprise.
- E-Mail Client Administrators
Those individuals responsible for installation, maintenance, and administration of e-mail client software in the enterprise.
- Public Key Infrastructure (PKI) Administrators
Those individuals responsible for planning, deployment, maintenance, and administration of the PKI in the enterprise.
Before reading this book, you may find it helpful to familiarize yourself with the following terms.
- PKCS #7
An encryption mechanism that is used when storing S/MIME digital certificates in a directory. PKCS #7 is used in Microsoft Active Directory® directory service to store digital certificates in the userSMIMECertificate attribute.
- Distinguished Encoding Rules (DER) Encoded
An encryption mechanism that is used when storing X.509 v3 digital certificates in a directory. Active Directory uses DER encoding to store digital certificates in the userCertificate attribute.
- Plaintext
In this book, plaintext (or cleartext) is used to differentiate unencrypted information from encrypted information. Do not confuse plaintext with plain text when referring to the format of an e-mail message. In that context, plain text is used to differentiate a message's format from HTML format or Rich Text Format (RTF). When discussing message security, plaintext is used to differentiate from ciphertext to indicate that the text is not encrypted.
- Exchange Server 2003 Message Security Guide
- Microsoft Exchange Server 2003 Delta Guide
- Windows Server 2003 Security Guide学习笔记
- Microsoft Exchange Server 2007: A Beginner's Guide
- 迁移Exchange Server 2003
- Exchange Server 2003
- Exchange Server 2003跨林迁移到Exchange Server 2010
- Exchange Server 2003升级到Exchange Server 2010实施步骤
- Exchange Server 2003/2007升级到Exchange Server 2010注意事项
- Exchange Server 2003 Cluster 实践
- Exchange Server 2003 部署手册
- 如何卸载 Exchange Server 2003
- Exchange Server
- Microsoft Exchange Server 2007: Tony Redmond's Guide to Successful Implementation
- MCITP: Microsoft Exchange Server 2007 Messaging Design and Deployment Study Guide
- Web Security Field Guide
- Security+ Study Guide
- sap netweaver security guide
- 直面IT业界众多挑战 英特尔启动商务博锐
- ASP.NET (C#)动态添加控键
- 十二星座八月运势详解
- 用javascript动态调整iframe高度
- xstream
- Exchange Server 2003 Message Security Guide
- Windows Mobile 05 系统数据库卷
- CVS使用手册
- 编辑和运行.NET应用程序
- 一位浙大教授的惊人言论
- How working of Copy and Paste
- 千万不要死于无知
- GNU gettext -- 简洁即优美
- 常用CASE工具介绍