5
Protection
Introduction
By its very nature, Exchange 2000 Server has a public face. You will be offering
This chapter also examines disaster recovery scenarios. If you are to meet your service level agreements (SLAs) on availability, you must first ensure that your system is down as infrequently as possible. This is covered in Chapter 2, “Capacity and Availability Manage- ment,” but you must also make sure that if you do suffer downtime, it is kept to the bare minimum required to restore service. Disaster recovery procedures for Exchange 2000 are detailed in this chapter.
Chapter Start Point
At the start of this chapter, you should be familiar with basic security concepts and differ- ent types of backup and restore hardware.
Chapter End Point
By the end of this chapter, you should be aware of appropriate measures to take when guarding against hacker attacks and