{"version":"1.0","provider_name":"Corelan | Exploit Development &amp; Vulnerability Research","provider_url":"https:\/\/www.corelan.be","author_name":"corelanc0d3r","author_url":"https:\/\/www.corelan.be\/index.php\/author\/admin0\/","title":"Exchange 2007 Administration : Policies and limits - Corelan | Exploit Development &amp; Vulnerability Research","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"xjyQazHG94\"><a href=\"https:\/\/www.corelan.be\/index.php\/2007\/10\/14\/exchange-2007-administration-policies-and-limits\/\">Exchange 2007 Administration : Policies and limits<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.corelan.be\/index.php\/2007\/10\/14\/exchange-2007-administration-policies-and-limits\/embed\/#?secret=xjyQazHG94\" width=\"600\" height=\"338\" title=\"&#8220;Exchange 2007 Administration : Policies and limits&#8221; &#8212; Corelan | Exploit Development &amp; Vulnerability Research\" data-secret=\"xjyQazHG94\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.corelan.be\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","description":"Exchange 2007 offers a set of features that allow for centralized management of policies and limitations. These policies and limitations should help to setup and control mail flow, mailbox sizes, compliance (retention) and so. You'll need an Enterprise CAL for most of the functionalities that are explained in this post. Managed Folder Mailbox policies Every &hellip; Continue reading \"\""}