The Active Directory split permissions security model is typically used by large organizations that completely separate the ...

The Active Directory split permissions security model is typically used by large organizations that completely separate the responsibility for the management of Exchange and Active Directory among different groups of people. Applying this security model removes the ability for Exchange servers and administrators to create Active Directory objects such as users, groups, and contacts. The ability to manage non-Exchange attributes on those objects is also removed.You shouldn't apply this security model if the same person or group manages both Exchange and Active Directory. Click '?' for more information.