XADM: The Basics of Advanced SecurityLast reviewed: April 3, 1997Article ID: Q149333 |
The Information in this article applies to:
SUMMARYIf Advanced Security is enabled on a user's mailbox, they can enable the Advanced Security features of Microsoft Exchange by using either the Microsoft Exchange Administrator program or a Microsoft Exchange client. To do this, they will need to check the Message Encryption and Digital Signatures options available by choosing Tools, Options, and the Security tab. If these features are enabled and another user also has these features enabled, messages sent between those users are encrypted and they cannot be "sniffed" on the network. These features prevents potential security breaches such as reading or modifying the messages on the network. However, the message cannot be sent in encrypted format if the recipient has not enabled the Advanced Security features. Once the encrypted message arrives at the recipient's mailbox, the message can be opened by typing in a password. The message is then decrypted and appears as a normal message to the recipient. The message can be modified and forwarded to other users. As long as the message is sent to users that have the Advanced Security features turned on, the message will be encrypted again on the network each time it is sent.
MORE INFORMATIONAdvanced Security features can be enabled by installing the Microsoft Exchange Key Management server from the Microsoft Exchange Server CD in the SETUP\<platform>\EXCHKM directory. Once installed, a new service will be available in Control Panel-Services. This is the Microsoft Exchange Key Manager service. The following processes must occur for these features to work:
If there is a potential breach of security occurring with the Microsoft Exchange messaging system, the format can be changed at any point. There will be no limitations on what can be done to the messages once they are opened. The following are the changes noticeable by the clients:
REFERENCESMicrosoft Exchange Administrator's Guide, Microsoft Exchange Concepts and Planning Guide (Chapter 4).
|
Additional query words: KM Server
© 1998 Microsoft Corporation. All rights reserved. Terms of Use. |