Computer Technos

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Thursday, 11 March 2010

Exchange Server Security Groups

Posted on 09:59 by Unknown
Like Exchange Server 2007, Exchange Server 2010 uses predefined universal security groups to separate administration of Exchange permissions from administration of other permissions. When you add an administrator to one of these security groups, the administrator inherits the permissions permitted by that role.

The predefined security groups have permissions to manage the following types of Exchange data in Active Directory:

• Organization Configuration node This type of data is not associated with a specific server and is used to manage databases, policies, address lists, and other types of organizational configuration details.

• Server Configuration node This type of data is associated with a specific server and is used to manage the server’s messaging configuration.

• recipient Configuration node This type of data is associated with mailboxes, mail-enabled contacts, and distribution groups.

In Exchange Server 2010, databases have been moved from the Server Configuration node to the Organization Configuration node. this change was necessary because the Exchange schema was flattened and storage groups were removed. As a result of these changes, all storage group functionality has been moved to the database level.

The predefined groups are as follows:
• Delegated Setup Members of this group have permission to install and uninstall Exchange on provisioned servers.

• Discovery Management Members of this group can perform mailbox searches for data that meets specific criteria.

• Exchange all hosted Organizations Members of this group include
hosted organization mailbox groups. This group is used to apply Password
Setting objects to all hosted mailboxes.

• Exchange Servers Members of this group are Exchange servers in the
organization. This group allows Exchange servers to work together.

• Exchange trusted Subsystem Members of this group are Exchange servers that run Exchange cmdlets using WinRM. Members of this group have permission to read and modify all Exchange configuration settings as well as user accounts and groups.

• Exchange Windows permissions Members of this group are Exchange servers that run Exchange cmdlets using WinRM. Members of this group have permission to read and modify user accounts and groups.

• ExchangelegacyInterop Members of this group are granted send-to and receive-from permissions, which are necessary for routing group connections between Exchange Server 2010 and Exchange Server 2003. Exchange Server 2003 bridgehead servers must be made members of this group to allow proper mail flow in the organization.

• Help Desk Members of this group can view any property or object within the Exchange organization and have limited management permissions, including the right to change and reset passwords.

• Hygiene Management Members of this group can manage the antispam and antivirus features of Exchange.

• Organization Management Members of this group have full access to all Exchange properties and objects in the Exchange organization.

• Public Folder Management Members of this group can manage public folders and perform most public folder management operations.

• Recipient Management Members of this group have permissions to modify Exchange user attributes in Active Directory and perform most mailbox operations.

• Records Management Members of this group can manage compliance features, including retention policies, message classifications, and transport rules.

• Server Management Members of this group can manage all Exchange servers in the organization but do not have permission to perform global operations.

• UM Management Members of this group can manage all aspects of unified messaging, including unified messaging server configuration and unified messaging recipient configuration.

• View-Only Organization Management Members of this group have read-only access to the entire Exchange organization tree in the Active Directory configuration container and read-only access to all the Windows domain containers that have Exchange recipients.

Source of Information : Microsoft Press - Exchange Server 2010 Administrators Pocket Consultant
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Exchange Server 2010 | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Windows 7 Shortcut Keys
    Longtime users of Windows have probably grown accustomed to navigating around the Windows user interface using the keyboard. This especially...
  • Windows on Mac: Virtualization Solutions
    If you’d prefer to join the ever-increasing ranks of Mac switchers—you traitor, you—you can still run Windows and, more important, Windows a...
  • Customizing Library Folders in Windows 7
    In your library folders, you can customize view options based on the contents. In the toolbar of the Pictures and Music library folders, Win...
  • Windows 7 BitLocker Drive Encryption
    In Windows Vista, you had the BitLocker Drive Encryption feature that allowed you to encrypt the content of entire volumes. In Windows 7, Mi...
  • Using Windows 7’s Performance Options
    While all the performance tools are available individually throughout the system, Windows 7 introduces a nice list of available tools, if yo...
  • Windows 7 - Installing and Configuring a Printer
    If your printer is already installed and operational at this point, you can skip this section and skim ahead for others that may be of inter...
  • Considering Centralized versus Group Sharing
    One of the most important preparation steps for your server is determining how to store the data you create. The two common methods are cent...
  • Berkeley Motes
    The Berkeley motes are a family of embedded sensor nodes sharing roughly the same architecture. Let us take the MICA mote as an example. The...
  • Using Windows 7 Ease of Access Tools
    If you have difficulty using a mouse or typing, have slightly impaired vision, or are deaf or hard of hearing, you can adjust the appearance...
  • Troubleshooting Boot and Startup Problems - Driver Loading in Safe Mode
    How does Windows know which device drivers and services are part of standard and networking-enabled safe mode? The answer lies in the HKLM\S...

Categories

  • Access 2010
  • BlackBerr
  • BlackBerry
  • Computer Science
  • Cyber Security
  • Exchange Server 2010
  • File Utilities
  • Foursquare
  • Google
  • Hardware
  • Internet
  • iPad
  • Linux
  • Lync Server
  • Microsoft Virtualization
  • Mobile Web
  • Networking
  • News
  • Security
  • Server Architectures
  • Smartphone
  • Ubuntu Linux
  • Windows
  • Windows 7
  • Windows Home Server
  • Windows Security
  • Windows Server 2008
  • Windows Server 2008 Hyper-V
  • Windows XP
  • Wireless

Blog Archive

  • ►  2012 (66)
    • ►  August (5)
    • ►  July (9)
    • ►  June (9)
    • ►  May (8)
    • ►  April (9)
    • ►  March (9)
    • ►  February (8)
    • ►  January (9)
  • ►  2011 (85)
    • ►  December (5)
    • ►  November (6)
    • ►  October (7)
    • ►  September (8)
    • ►  August (9)
    • ►  July (9)
    • ►  June (7)
    • ►  May (7)
    • ►  April (4)
    • ►  March (6)
    • ►  February (8)
    • ►  January (9)
  • ▼  2010 (230)
    • ►  December (13)
    • ►  November (3)
    • ►  October (2)
    • ►  September (10)
    • ►  August (31)
    • ►  July (32)
    • ►  June (23)
    • ►  May (2)
    • ►  April (21)
    • ▼  March (32)
      • When Windows won’t start at all
      • Advanced Crash Dump Analysis - When There Is No Cr...
      • Advanced Crash Dump Analysis - Hung or Unresponsiv...
      • Advanced Crash Dump Analysis - Stack Trashes
      • Advanced Crash Dump Analysis
      • Buffer Overrun, Memory Corruptions, and Special Pool
      • Code Overwrite and System Code Write Protection
      • Using Crash Troubleshooting Tools
      • Basic Crash Dump Analysis
      • Online Crash Analysis
      • Windows Error Reporting
      • Crash Dump Generation
      • Crash Dump Files
      • Troubleshooting Crashes
      • The Blue Screen
      • Why Does Windows Crash?
      • Understanding Exchange Server Messaging roles
      • Deploying Exchange Server 2010
      • Understanding how Exchange routes Messages
      • Understanding how Exchange Stores Information
      • Exchange Server Security Groups
      • Exchange Server Authentication and Security
      • Exchange Server 2010 and Your hardware
      • Exchange Server 2010 Administration Overview
      • Windows 7 Architectural and Internal Security Impr...
      • Windows 7 Architectural and Internal Security Impr...
      • Windows 7 Architectural and Internal Security Impr...
      • Windows 7 Architectural and Internal Security Impr...
      • Windows 7 Architectural and Internal Security Impr...
      • Windows 7 Architectural and Internal Security Impr...
      • Windows 7 Architectural and Internal Security Impr...
      • Windows 7 Architectural and Internal Security Impr...
    • ►  February (28)
    • ►  January (33)
  • ►  2009 (119)
    • ►  December (33)
    • ►  November (31)
    • ►  October (35)
    • ►  September (20)
Powered by Blogger.

About Me

Unknown
View my complete profile