-
1 Edge Transport server role
An Exchange Server 2007 and 2010 server role that provides anti-spam and antivirus protection and applies messaging security policies to messages in transport between organizations by using a series of agents that act on messages as they are processed by the message transport components. This server role is deployed in the perimeter network outside the Active Directory directory service forest. Computers that have the Edge Transport server role installed handle all Internet-facing mail flow and provide Simple Mail Transfer Protocol (SMTP) relay and smart host services for the Exchange organization.English-Arabic terms dictionary > Edge Transport server role
-
2 EdgeSync
"A collection of processes that are run on the Exchange Server 2007 Hub Transport server role to establish one-way replication of recipient and configuration information from the Active Directory directory service to the Active Directory Application Mode (ADAM) instance on a computer that has the Edge Transport server role installed. EdgeSync copies only the information that is required for the Edge Transport server to perform anti-spam and message security configuration tasks, and information about the Send connector configuration that is required to enable mail flow from the Exchange 2007 organization's Hub Transport servers to the Internet through one or more Edge Transport servers. EdgeSync performs scheduled updates so that the information in ADAM remains current."
См. также в других словарях:
Security Assertion Markup Language — (SAML) is an XML based standard for exchanging authentication and authorization data between security domains, that is, between an identity provider (a producer of assertions) and a service provider (a consumer of assertions). SAML is a product… … Wikipedia
Message-oriented middleware — (MOM) is software or hardware infrastructure supporting sending and receiving messages between distributed systems. MOM allows application modules to be distributed over heterogeneous platforms and reduces the complexity of developing… … Wikipedia
Message precedence — is an indicator attached to a message indicating its level of urgency. Contents 1 CCEB military precedence 1.1 FLASH (Z) 1.2 IMMEDIATE (O) 1.3 PRIORITY (P) … Wikipedia
Communications security — Not to be confused with Commonwealth Securities. Communications security is the discipline of preventing unauthorized interceptors from accessing telecommunications in an intelligible form, while still delivering content to the intended… … Wikipedia
Transport Layer Security — (TLS) and its predecessor, Secure Sockets Layer (SSL), are cryptographic protocols that provide secure communications on the Internet for such things as web browsing, e mail, Internet faxing, instant messaging and other data transfers. There are… … Wikipedia
Information security — Components: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to identify and apply information security… … Wikipedia
Wireless security — An example wireless router, that can implement wireless security features Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. Many laptop computers have wireless cards pre installed. The… … Wikipedia
Application security — encompasses measures taken throughout the life cycle to prevent exceptions in the security policy of an application or the underlying system (vulnerabilities) through flaws in the design, development, deployment, upgradation,or maintenance of the … Wikipedia
Social Security (United States) — This article is about the retirement/disability program. For the general concept of providing welfare, see Social security. For other uses, see Social Security (disambiguation) … Wikipedia
Multiple Independent Levels of Security — Multiple Independent Levels of Security/Safety (MILS) is a high assurance security architecture based on the concepts of separation[1] and controlled information flow; implemented by separation mechanisms that support both untrusted and… … Wikipedia
Voip security — VoIP SecurityDefined: Voice over IP (VoIP) Security is a branch of the information security field that is specifically applied to VoIP infrastructures. The objective of VoIP security is to preserve the availability of VoIP services, protection of … Wikipedia