This section describes how to set up mapped security for information that is extracted from Exchange.