logo
August 21, 2015 | Orin Thomas

3 Basic Steps to Exchange Server Security

If communication is the lifeblood of an organization, it could be fair to assume that Exchange functions is its heart. An Exchange server, especially one that hosts the mailbox server role, stores messages - both external and internal. An attacker that gains administrative access to Exchange...
October 31, 2014 | Krishna Kumar

Ten Simple Ways to Prevent Security Breaches in Microsoft Exchange 2010

Exchange data is the heart of any enterprise and is considered to be a critical business application, because it is used for record keeping and as a low-cost communication solution. Today, e-mails are not just accessible from the workstation within the corporate network; they can also be accessed...
October 23, 2014 | Krishna Kumar

Ten Simple Ways to Prevent Security Breaches in Active Directory

Any IT organization is liable to security threats; however, they can be prevented if appropriate policies, processes and controls are implemented. “Better safe than sorry” applies to this situation perfectly. It is better to secure your infrastructure from being compromised than counting losses...
July 3, 2014 | Krishna Kumar

PowerShell to Customize RBAC Permission in Exchange 2013

We continue the "Deep Dive" series. In it you might find the answers to some of your technical questions. The industry experts will provide their insights on several topics and research some new features of most popular applications. The first article of the series can be found here. Also, read...
...