Implementing a large Exchange Server Organization in independent autonomous (or franchised) sites can be difficult. Guidelines can help companies set up naming conventions, connectors, directory replication, public folders, and address book views.
Using the Internet as a network backbone exposes the network to security risks. Find out how Exchange Server 5.5 protects the IMS by preventing unauthorized access and using encryption to secure message traffic.
In Exchange Server 5.5, Microsoft introduced address-space restrictions to give systems administrators more control over users' access to connectors. You can use this restrictions to configures your organization the way you want it.