^ APP.5.2 ^ Name ^ CIA ^ G 0.15 ^ G 0.18 ^ G 0.19 ^ G 0.22 ^ G 0.25 ^ G 0.26 ^ G 0.27 ^ G 0.30 ^ G 0.31 ^ G 0.36 ^ G 0.45 ^ G 0.46 ^ | **APP.5.2.A1** | Planung des Einsatzes von Exchange und Outlook | | | X | | | | | | | | | | | | **APP.5.2.A2** | Auswahl einer geeigneten Exchange-Infrastruktur | | | X | | | | | | | | | | | | **APP.5.2.A3** | Berechtigungsmanagement und Zugriffsrechte | | | | | | | | | X | | | | | | **APP.5.2.A4** | ENTFALLEN | | | | | | | | | | | | | | | **APP.5.2.A5** | Datensicherung von Exchange | | | | | | | | | | | | X | | | **APP.5.2.A6** | ENTFALLEN | | | | | | | | | | | | | | | **APP.5.2.A7** | Migration von Exchange-Systemen | | | X | | | X | X | | | | | | | | **APP.5.2.A8** | ENTFALLEN | | | | | | | | | | | | | | | **APP.5.2.A9** | Sichere Konfiguration von Exchange-Servern | | | | X | | X | | X | | | | | X | | **APP.5.2.A10** | Sichere Konfiguration von Outlook | | | | | | | | | X | X | | | | | **APP.5.2.A11** | Absicherung der Kommunikation zwischen Exchange-Systemen | | X | | X | X | | | | X | | | | | | **APP.5.2.A12** | Einsatz von Outlook Anywhere, MAPI over HTTP und Outlook im Web | | | | X | X | | | | | | X | | | | **APP.5.2.A13** | ENTFALLEN | | | | | | | | | | | | | | | **APP.5.2.A14** | ENTFALLEN | | | | | | | | | | | | | | | **APP.5.2.A15** | ENTFALLEN | | | | | | | | | | | | | | | **APP.5.2.A16** | ENTFALLEN | | | | | | | | | | | | | | | **APP.5.2.A17** | Verschlüsselung von Exchange-Datenbankdateien | C | | | X | | | | | | | | | | | **APP.5.2.A18** | ENTFALLEN | | | | | | | | | | | | | | | **APP.5.2.A19** | ENTFALLEN | | | | | | | | | | | | | |