SlideShare a Scribd company logo
RBAC Role Groups
Role Based Access Control (RBAC) lets you
control what administrators and users can do
in your Exchange organization.
The RBAC consist of the following
components:
◦ Management role group The management role
group maps to a universal security group (USG)
in Active Directory, and users or the
administrator can be members of these security
groups.
Active Directory Users
and Computers
Exchange Admin Center 
permissions  admin roles
RBAC Roles and Role Assignment
◦ Management roles Management roles are assigned to a management role group. A management role is a
container for grouping management role entries. A management role entry can be a cmdlet or a script, so
management role entries in a management role determine what an administrator or user can do.
◦ Management role assignment A management role assignment is the linchpin between a management role
and a management role group.
RBAC Scope Management
Management role scope A management role scope determines where the management role
assignment is actually active—that is, where the user or administrator can perform his or her
tasks.
◦ The scope is not limited using the “Default” but is easily limited to a specific OU in the EAC.
RBAC Scope: Limiting to Servers
You can limit the scope of a management role assignment to specific servers in your
organization. For instance the following cmdlet creates a scope limited to two specific Exchange
servers:
RBAC Scope: Limiting to an AD Site
The following cmdlet will create a management scope limiting the management role to a specific
Active Directory site:
RBAC Creating an Exclusive Scope
When the exclusive scope is created, all users are immediately blocked from modifying the
recipients that match the exclusive scope until the scope is associated with a management role
assignment. If other role assignments are associated with other exclusive scopes that match the
same recipients, those assignments can still modify the recipients.
This example creates the Protected Exec Users exclusive scope. Users that contain the string
"VP" in their title match the recipient filter for the scope. This scope will not be displayed in EAC.
RBAC Applying an Exclusive Scope
The exclusive scope is then associated with a management role assignment that assigns the Mail
Recipients management role to the Executive Administrators role group. This role group contains
administrators who are allowed to modify the mailboxes of high-profile executives. Only the
administrators of the Executive Administrators role group can modify users with the string "VP"
in their title.
Create the universal security group “Executive Administrators”:
RBAC Viewing Exclusive Scopes
Be aware that scopes that can be “selected” for association with a role group are displayed in
EAC. However, scopes that match recipients, servers, or sites based on a filter do not. It’s
important to be familiar with the EMS as you can often retrieve information not otherwise
available.
Shown below the EAC still displays two of the three scopes that have been created whereas the
EMS will show all scopes.
RBAC Role Entry
Management role entry A management role entry determines what the management role
group (i.e., user or USG) can do and what cmdlets are available to the management role group.
◦ New management role entries can only be made to custom management roles.
◦ Only managed using EMS
First get a listing of management roles using Get-ManagementRole then get a listing of all
associated management role entries using the cmdlet below (where Exchange Servers is a
management role):
RBAC
Together these components in RBAC
determine "who” can do "what" management
functions and "where" in Active Directory this
management can be done.
Role Groups
There are 12 default
management role groups.
To grant permission to a user it is
simply a matter of adding their
account to the appropriate role
group.
Question: RBAC cmdlet
Your company has an Exchange 2013 organization. The users in the Moncton office no longer
should be able to manage their voice mail options. The MyVoicemail management role allows
users to manage their voice mail options. You need to remove the MyVoicemail management
role from the MonctonUsers assignment policy.
Answer:
Get-ManagementRoleAssignment -RoleAssignee ”MonctonUsers" -Role
MyVoicemail | Remove-ManagementRoleAssignment
Default Role Assignment Policy
This role assignment policy is assigned to all users by default, and it ensures that the users can
manage their own properties.
OWA Policies
Control options available to users within Outlook Web App.
References
Microsoft TechNet. Manage Role Groups
https://technet.microsoft.com/en-us/library/jj657480(v=exchg.150).aspx
Microsoft TechNet. New-ManagementScope
https://technet.microsoft.com/en-us/library/dd335137%28v=exchg.150%29.aspx

More Related Content

What's hot

Cloudhub and Mule
Cloudhub and MuleCloudhub and Mule
Cloudhub and Mule
Shanky Gupta
 
Validate soap request in mule
Validate soap request in muleValidate soap request in mule
Validate soap request in mule
Mohammed246
 
WebService with VM Mule
WebService with VM MuleWebService with VM Mule
WebService with VM Mule
irfan1008
 
Soap in mule
Soap in muleSoap in mule
Soap in mule
D.Rajesh Kumar
 
Web service vm in mule
Web service vm in muleWeb service vm in mule
Web service vm in mule
Mohammed246
 
Mulesoft idempotent Message Filter
Mulesoft idempotent Message FilterMulesoft idempotent Message Filter
Mulesoft idempotent Message Filter
kumar gaurav
 
Soap request in mule
Soap request in mule Soap request in mule
Soap request in mule
Praneethchampion
 
Mule securing
Mule   securingMule   securing
Mule securing
Sindhu VL
 
VM example in mule
VM example in muleVM example in mule
VM example in mule
Anirban Sen Chowdhary
 
Validate Soap Request in Mule
Validate Soap Request in MuleValidate Soap Request in Mule
Validate Soap Request in Mule
irfan1008
 
Webservice vm in mule
Webservice vm in muleWebservice vm in mule
Webservice vm in mule
Praneethchampion
 
Secure runtime properties mule4
Secure runtime properties   mule4 Secure runtime properties   mule4
Secure runtime properties mule4
Integration Assistance
 
Anypoint enterprise security overview
Anypoint enterprise security overviewAnypoint enterprise security overview
Anypoint enterprise security overview
danishsm84
 
Software Reuse & Distributed Services
Software Reuse & Distributed ServicesSoftware Reuse & Distributed Services
Software Reuse & Distributed Services
raj_naveen
 
Scatter gather flow in mule
Scatter gather flow in muleScatter gather flow in mule
Scatter gather flow in mule
Son Nguyen
 
Mule batch processing
Mule batch processingMule batch processing
Mule batch processing
Praneethchampion
 
Mule properties
Mule propertiesMule properties
Mule properties
Ravinder Singh
 
Mule - logger
Mule -  loggerMule -  logger
Mule - logger
Ankush Sharma
 
Mule velocity
Mule velocityMule velocity
Mule velocity
Praneethchampion
 
Mule and web services
Mule and web servicesMule and web services
Mule and web services
Prabhat gangwar
 

What's hot (20)

Cloudhub and Mule
Cloudhub and MuleCloudhub and Mule
Cloudhub and Mule
 
Validate soap request in mule
Validate soap request in muleValidate soap request in mule
Validate soap request in mule
 
WebService with VM Mule
WebService with VM MuleWebService with VM Mule
WebService with VM Mule
 
Soap in mule
Soap in muleSoap in mule
Soap in mule
 
Web service vm in mule
Web service vm in muleWeb service vm in mule
Web service vm in mule
 
Mulesoft idempotent Message Filter
Mulesoft idempotent Message FilterMulesoft idempotent Message Filter
Mulesoft idempotent Message Filter
 
Soap request in mule
Soap request in mule Soap request in mule
Soap request in mule
 
Mule securing
Mule   securingMule   securing
Mule securing
 
VM example in mule
VM example in muleVM example in mule
VM example in mule
 
Validate Soap Request in Mule
Validate Soap Request in MuleValidate Soap Request in Mule
Validate Soap Request in Mule
 
Webservice vm in mule
Webservice vm in muleWebservice vm in mule
Webservice vm in mule
 
Secure runtime properties mule4
Secure runtime properties   mule4 Secure runtime properties   mule4
Secure runtime properties mule4
 
Anypoint enterprise security overview
Anypoint enterprise security overviewAnypoint enterprise security overview
Anypoint enterprise security overview
 
Software Reuse & Distributed Services
Software Reuse & Distributed ServicesSoftware Reuse & Distributed Services
Software Reuse & Distributed Services
 
Scatter gather flow in mule
Scatter gather flow in muleScatter gather flow in mule
Scatter gather flow in mule
 
Mule batch processing
Mule batch processingMule batch processing
Mule batch processing
 
Mule properties
Mule propertiesMule properties
Mule properties
 
Mule - logger
Mule -  loggerMule -  logger
Mule - logger
 
Mule velocity
Mule velocityMule velocity
Mule velocity
 
Mule and web services
Mule and web servicesMule and web services
Mule and web services
 

Similar to Ch10 security

Exchange Server 2010
Exchange Server 2010Exchange Server 2010
Exchange Server 2010
Leonardo Elias
 
Global Azure Bootcamp 2018 - Oh no my organization went Azure
Global Azure Bootcamp 2018 - Oh no my organization went AzureGlobal Azure Bootcamp 2018 - Oh no my organization went Azure
Global Azure Bootcamp 2018 - Oh no my organization went Azure
Karim Vaes
 
Ucs rbac aaa-backu-ps
Ucs rbac aaa-backu-psUcs rbac aaa-backu-ps
Ucs rbac aaa-backu-ps
Krunal Shah
 
10135 a 10
10135 a 1010135 a 10
10135 a 10
Bố Su
 
Access Control Facilities in Oracle Database 11g r2
Access Control Facilities in Oracle Database 11g r2Access Control Facilities in Oracle Database 11g r2
Access Control Facilities in Oracle Database 11g r2
Amin Saqi
 
RBAC in Kuberetes
RBAC in KuberetesRBAC in Kuberetes
RBAC in Kuberetes
Knoldus Inc.
 
Hovitaga authorization concept and setup guide
Hovitaga authorization concept and setup guideHovitaga authorization concept and setup guide
Hovitaga authorization concept and setup guide
Hovitaga Kft.
 
TrackStudio Permissions
TrackStudio PermissionsTrackStudio Permissions
TrackStudio Permissions
Maxim Kramarenko
 
Oracle WorkManager
Oracle WorkManagerOracle WorkManager
Oracle WorkManager
Giampiero Cerroni
 
Sql server configuration manager
Sql server configuration managerSql server configuration manager
Sql server configuration manager
ssuser1eca7d
 
10135 b 10
10135 b 1010135 b 10
10135 b 10
Wichien Saisorn
 
1BT_Tech_Talk_AWS_Cross_Account_Access
1BT_Tech_Talk_AWS_Cross_Account_Access1BT_Tech_Talk_AWS_Cross_Account_Access
1BT_Tech_Talk_AWS_Cross_Account_Access
Crishantha Nanayakkara
 
359555069 aae-control room-usermanual
359555069 aae-control room-usermanual359555069 aae-control room-usermanual
359555069 aae-control room-usermanual
BishnujitBanerjee
 
03_DP_300T00A_Secure_Environment.pptx
03_DP_300T00A_Secure_Environment.pptx03_DP_300T00A_Secure_Environment.pptx
03_DP_300T00A_Secure_Environment.pptx
KareemBullard1
 
Role-based access control (RBAC) and more
Role-based access control (RBAC) and moreRole-based access control (RBAC) and more
Role-based access control (RBAC) and more
Tim Hermie ☁️
 
Custom RBAC - Can I Do That?
Custom RBAC - Can I Do That? Custom RBAC - Can I Do That?
Custom RBAC - Can I Do That?
Lance Bragstad
 
Azure arch vs aws
Azure arch vs awsAzure arch vs aws
Azure arch vs aws
Darnette A
 
21 Rac
21 Rac21 Rac
21 Pdfsam
21 Pdfsam21 Pdfsam
21 Pdfsam
Emanuel Mateus
 
ENHANCING THE WORDPRESS SYSTEM:FROM ROLE TO ATTRIBUTE-BASED ACCESS CONTROL
ENHANCING THE WORDPRESS SYSTEM:FROM ROLE TO ATTRIBUTE-BASED ACCESS CONTROLENHANCING THE WORDPRESS SYSTEM:FROM ROLE TO ATTRIBUTE-BASED ACCESS CONTROL
ENHANCING THE WORDPRESS SYSTEM:FROM ROLE TO ATTRIBUTE-BASED ACCESS CONTROL
IJNSA Journal
 

Similar to Ch10 security (20)

Exchange Server 2010
Exchange Server 2010Exchange Server 2010
Exchange Server 2010
 
Global Azure Bootcamp 2018 - Oh no my organization went Azure
Global Azure Bootcamp 2018 - Oh no my organization went AzureGlobal Azure Bootcamp 2018 - Oh no my organization went Azure
Global Azure Bootcamp 2018 - Oh no my organization went Azure
 
Ucs rbac aaa-backu-ps
Ucs rbac aaa-backu-psUcs rbac aaa-backu-ps
Ucs rbac aaa-backu-ps
 
10135 a 10
10135 a 1010135 a 10
10135 a 10
 
Access Control Facilities in Oracle Database 11g r2
Access Control Facilities in Oracle Database 11g r2Access Control Facilities in Oracle Database 11g r2
Access Control Facilities in Oracle Database 11g r2
 
RBAC in Kuberetes
RBAC in KuberetesRBAC in Kuberetes
RBAC in Kuberetes
 
Hovitaga authorization concept and setup guide
Hovitaga authorization concept and setup guideHovitaga authorization concept and setup guide
Hovitaga authorization concept and setup guide
 
TrackStudio Permissions
TrackStudio PermissionsTrackStudio Permissions
TrackStudio Permissions
 
Oracle WorkManager
Oracle WorkManagerOracle WorkManager
Oracle WorkManager
 
Sql server configuration manager
Sql server configuration managerSql server configuration manager
Sql server configuration manager
 
10135 b 10
10135 b 1010135 b 10
10135 b 10
 
1BT_Tech_Talk_AWS_Cross_Account_Access
1BT_Tech_Talk_AWS_Cross_Account_Access1BT_Tech_Talk_AWS_Cross_Account_Access
1BT_Tech_Talk_AWS_Cross_Account_Access
 
359555069 aae-control room-usermanual
359555069 aae-control room-usermanual359555069 aae-control room-usermanual
359555069 aae-control room-usermanual
 
03_DP_300T00A_Secure_Environment.pptx
03_DP_300T00A_Secure_Environment.pptx03_DP_300T00A_Secure_Environment.pptx
03_DP_300T00A_Secure_Environment.pptx
 
Role-based access control (RBAC) and more
Role-based access control (RBAC) and moreRole-based access control (RBAC) and more
Role-based access control (RBAC) and more
 
Custom RBAC - Can I Do That?
Custom RBAC - Can I Do That? Custom RBAC - Can I Do That?
Custom RBAC - Can I Do That?
 
Azure arch vs aws
Azure arch vs awsAzure arch vs aws
Azure arch vs aws
 
21 Rac
21 Rac21 Rac
21 Rac
 
21 Pdfsam
21 Pdfsam21 Pdfsam
21 Pdfsam
 
ENHANCING THE WORDPRESS SYSTEM:FROM ROLE TO ATTRIBUTE-BASED ACCESS CONTROL
ENHANCING THE WORDPRESS SYSTEM:FROM ROLE TO ATTRIBUTE-BASED ACCESS CONTROLENHANCING THE WORDPRESS SYSTEM:FROM ROLE TO ATTRIBUTE-BASED ACCESS CONTROL
ENHANCING THE WORDPRESS SYSTEM:FROM ROLE TO ATTRIBUTE-BASED ACCESS CONTROL
 

More from Shane Flooks

Ch07 disaster recovery
Ch07 disaster recoveryCh07 disaster recovery
Ch07 disaster recovery
Shane Flooks
 
Ch06 edge transport
Ch06 edge transportCh06 edge transport
Ch06 edge transport
Shane Flooks
 
Ch05 high availability
Ch05 high availabilityCh05 high availability
Ch05 high availability
Shane Flooks
 
Ch04 mailbox server
Ch04 mailbox serverCh04 mailbox server
Ch04 mailbox server
Shane Flooks
 
Ch03 cas
Ch03 casCh03 cas
Ch03 cas
Shane Flooks
 
Ch01 Introduction to Exchange 2013
Ch01 Introduction to Exchange 2013Ch01 Introduction to Exchange 2013
Ch01 Introduction to Exchange 2013
Shane Flooks
 
Ch02 installing exchange
Ch02 installing exchangeCh02 installing exchange
Ch02 installing exchange
Shane Flooks
 

More from Shane Flooks (7)

Ch07 disaster recovery
Ch07 disaster recoveryCh07 disaster recovery
Ch07 disaster recovery
 
Ch06 edge transport
Ch06 edge transportCh06 edge transport
Ch06 edge transport
 
Ch05 high availability
Ch05 high availabilityCh05 high availability
Ch05 high availability
 
Ch04 mailbox server
Ch04 mailbox serverCh04 mailbox server
Ch04 mailbox server
 
Ch03 cas
Ch03 casCh03 cas
Ch03 cas
 
Ch01 Introduction to Exchange 2013
Ch01 Introduction to Exchange 2013Ch01 Introduction to Exchange 2013
Ch01 Introduction to Exchange 2013
 
Ch02 installing exchange
Ch02 installing exchangeCh02 installing exchange
Ch02 installing exchange
 

Recently uploaded

20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 

Recently uploaded (20)

20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 

Ch10 security

  • 1.
  • 2. RBAC Role Groups Role Based Access Control (RBAC) lets you control what administrators and users can do in your Exchange organization. The RBAC consist of the following components: ◦ Management role group The management role group maps to a universal security group (USG) in Active Directory, and users or the administrator can be members of these security groups. Active Directory Users and Computers Exchange Admin Center  permissions  admin roles
  • 3. RBAC Roles and Role Assignment ◦ Management roles Management roles are assigned to a management role group. A management role is a container for grouping management role entries. A management role entry can be a cmdlet or a script, so management role entries in a management role determine what an administrator or user can do. ◦ Management role assignment A management role assignment is the linchpin between a management role and a management role group.
  • 4. RBAC Scope Management Management role scope A management role scope determines where the management role assignment is actually active—that is, where the user or administrator can perform his or her tasks. ◦ The scope is not limited using the “Default” but is easily limited to a specific OU in the EAC.
  • 5. RBAC Scope: Limiting to Servers You can limit the scope of a management role assignment to specific servers in your organization. For instance the following cmdlet creates a scope limited to two specific Exchange servers:
  • 6. RBAC Scope: Limiting to an AD Site The following cmdlet will create a management scope limiting the management role to a specific Active Directory site:
  • 7. RBAC Creating an Exclusive Scope When the exclusive scope is created, all users are immediately blocked from modifying the recipients that match the exclusive scope until the scope is associated with a management role assignment. If other role assignments are associated with other exclusive scopes that match the same recipients, those assignments can still modify the recipients. This example creates the Protected Exec Users exclusive scope. Users that contain the string "VP" in their title match the recipient filter for the scope. This scope will not be displayed in EAC.
  • 8. RBAC Applying an Exclusive Scope The exclusive scope is then associated with a management role assignment that assigns the Mail Recipients management role to the Executive Administrators role group. This role group contains administrators who are allowed to modify the mailboxes of high-profile executives. Only the administrators of the Executive Administrators role group can modify users with the string "VP" in their title. Create the universal security group “Executive Administrators”:
  • 9. RBAC Viewing Exclusive Scopes Be aware that scopes that can be “selected” for association with a role group are displayed in EAC. However, scopes that match recipients, servers, or sites based on a filter do not. It’s important to be familiar with the EMS as you can often retrieve information not otherwise available. Shown below the EAC still displays two of the three scopes that have been created whereas the EMS will show all scopes.
  • 10. RBAC Role Entry Management role entry A management role entry determines what the management role group (i.e., user or USG) can do and what cmdlets are available to the management role group. ◦ New management role entries can only be made to custom management roles. ◦ Only managed using EMS First get a listing of management roles using Get-ManagementRole then get a listing of all associated management role entries using the cmdlet below (where Exchange Servers is a management role):
  • 11. RBAC Together these components in RBAC determine "who” can do "what" management functions and "where" in Active Directory this management can be done.
  • 12. Role Groups There are 12 default management role groups. To grant permission to a user it is simply a matter of adding their account to the appropriate role group.
  • 13. Question: RBAC cmdlet Your company has an Exchange 2013 organization. The users in the Moncton office no longer should be able to manage their voice mail options. The MyVoicemail management role allows users to manage their voice mail options. You need to remove the MyVoicemail management role from the MonctonUsers assignment policy. Answer: Get-ManagementRoleAssignment -RoleAssignee ”MonctonUsers" -Role MyVoicemail | Remove-ManagementRoleAssignment
  • 14. Default Role Assignment Policy This role assignment policy is assigned to all users by default, and it ensures that the users can manage their own properties.
  • 15. OWA Policies Control options available to users within Outlook Web App.
  • 16. References Microsoft TechNet. Manage Role Groups https://technet.microsoft.com/en-us/library/jj657480(v=exchg.150).aspx Microsoft TechNet. New-ManagementScope https://technet.microsoft.com/en-us/library/dd335137%28v=exchg.150%29.aspx