Every mailbox in an Exchange Server 2010 organization accesses the Client Access server. Because people interact directly with this server over the Internet, it’s exposed to potential attackers. Therefore, ensuring the Client Access server’s security is paramount. In previous articles I walked you through various aspects of the Client Access server role and showed you how to deploy it and load-balance it. (See the Learning Path for previous articles about the Client Access ...
Buy This Project Plan Now!
This content is part of the Exchange Server 2010 Migration Project Plan.
Purchase this project plan to receive:
- Step-by-step guidance for managing your project, start to finish
- Tested advice for preparing for and completing your project
- Insights to help you avoid common pitfalls and traps