MCSA/MCSE Self-Paced Training Kit (Exam 70-284): Implementing and Managing MicrosoftВ® Exchange Server 2003 (Pro-Certification)
Chapter 2: Planning a Microsoft Exchange Server 2003 Infrastructure
- Figure 2-1: Enabling ASP in the IIS Manager console
- Figure 2-2: Starting the ForestPrep Setup command
- Figure 2-3: The Component Selection portion of Setup
- Figure 2-4: Identifying the service account that will be given Exchange Full Administrator permissions
- Figure 2-5: The Component Selection Page
- Figure 2-6: Creating a new organization or installing into an existing organization
- Figure 2-7: Defining the organization name
- Figure 2-8: Confirming your installation choices
- Figure 2-9: Exchange Server Per Seat licensing agreement
- Figure 2-10: Tracking the progress of the installation
- Figure 2-11: A Microsoft Exchange Installation Wizard error message
Chapter 3: Configuring a Microsoft Exchange Server 2003 Infrastructure
- Figure 3-1: Exchange Server 2003 services
- Figure 3-2: The organization's property sheet
Chapter 4: Coexistence with Microsoft Exchange Server 5.5
- Figure 4-1: The ADC Tools Page
- Figure 4-2: Selecting ADC components to install
- Figure 4-3: Setting the server options for the ADC
- Figure 4-4: The Resource Mailbox Wizard
- Figure 4-5: Establishing administrative credentials for each site
- Figure 4-6: Configuring a default Windows destination
- Figure 4-7: Configuring connection agreements
- Figure 4-8: Configuring connection agreements
- Figure 4-9: Connection agreement installation summary
- Figure 4-10: The Connections tab
- Figure 4-11: The connection agreement schedule
- Figure 4-12: Configuring replication from Exchange to Active Directory
- Figure 4-13: Configuring replication from Active Directory to Exchange
- Figure 4-14: Configuring deleted item replication
- Figure 4-15: The Advanced tab
- Figure 4-16: The ExDeploy command-line utility
- Figure 4-17: Exchange Features for an Exchange Server 5.5 mailbox
- Figure 4-18: Exchange Features for an Exchange Server 2003 mailbox
- Figure 4-19: The graphical Exchange Server Deployment Tools
- Figure 4-20: Meeting coexistence prerequisites
- Figure 4-21: Exchange Server 2003 installation checklist
- Figure 4-22: Active Directory Connector Diagnostics Logging
- Figure 4-23: Identifying duplicate accounts
- Figure 4-24: Reviewing accounts to be merged
- Figure 4-25: Choosing to begin the merge or to export to a .csv file
Chapter 5: Migrating from Microsoft Exchange Server and Other Mail Systems
- Figure 5-1: Choosing source and target domains for the migration
- Figure 5-2: Listing all user accounts in the Users container in Active Directory
- Figure 5-3: Adding user accounts to migrate
- Figure 5-4: Specifying the target OU
- Figure 5-5: Migrating passwords
- Figure 5-6: The Account Transition Options Page
- Figure 5-7: Configuring user options
- Figure 5-8: Configuring object property exclusions
- Figure 5-9: Configuring naming conflict settings
- Figure 5-10: Selecting a migration destination
- Figure 5-11: Specifying the source server
- Figure 5-12: Configuring the message information to migrate
- Figure 5-13: Configuring account migration options
- Figure 5-14: Configuring general settings
- Figure 5-15: Configuring the address space
- Figure 5-16: Configuring the import container
- Figure 5-17: Configuring the export containers
- Figure 5-18: Configuring advanced options
- Figure 5-19: Configuring directory synchronization options
- Figure 5-20: Configuring delivery restrictions
- Figure 5-21: Configuring the general settings for the Calendar Connector
- Figure 5-22: Configuring a Calendar Connection type
- Figure 5-23: Configuring a new TCP/IP X.400 transport stack
- Figure 5-24: Configuring general settings for the X.400 connector
- Figure 5-25: Configuring the remote X.400 name and entering its password
- Figure 5-26: Configuring advanced message settings
- Figure 5-27: Configuring content restrictions
Chapter 6: Installing Microsoft Exchange Server 2003 Clusters and Front-End and Back-End Servers
- Figure 6-1: Creating a new cluster
- Figure 6-2: Specifying the name and domain of the cluster
- Figure 6-3: Analyzing cluster feasibility
- Figure 6-4: The Proposed Cluster Configuration Page
- Figure 6-5: The new server cluster
- Figure 6-6: An Exchange Server 2003 virtual server configuration
- Figure 6-7: Server node failover properties
- Figure 6-8: Server node failback properties
- Figure 6-9: Advanced resource properties
- Figure 6-10: Configuring the resource type
- Figure 6-11: Configuring the network name
- Figure 6-12: The new Exchange Server 2003 virtual server
- Figure 6-13: Confirming the conversion to a front-end server
Chapter 7: Managing Recipient Objects and Address Lists
- Figure 7-1: Creating a mailbox
- Figure 7-2: The Available Tasks page of the Exchange Task Wizard
- Figure 7-3: The mail properties of the selected object
- Figure 7-4: Choosing an e-mail address type
- Figure 7-5: Configuring an SMTP address for a mail-enabled object
- Figure 7-6: Deleting a mailbox by using the Exchange Task Wizard
- Figure 7-7: Configuring the Deleted Mailbox Retention period
- Figure 7-8: Reconnecting a user account to a mailbox
- Figure 7-9: Hiding a recipient from the GAL
- Figure 7-10: Configuring e-mail address types
- Figure 7-11: Configured e-mail addresses for a recipient object
- Figure 7-12: Overriding the default storage limits
- Figure 7-13: Configuring storage limits at the mailbox store level
- Figure 7-14: Choosing which pages display for a policy
- Figure 7-15: Assigning a mailbox store policy
- Figure 7-16: Searching Active Directory for mailbox stores
- Figure 7-17: Policy effects on local settings
- Figure 7-18: The Policies tab
- Figure 7-19: Granting Send On Behalf permissions
- Figure 7-20: Granting mailbox rights
- Figure 7-21: Granting permissions to a user folder in Outlook
- Figure 7-22: Configuring delivery restrictions for a mailbox
- Figure 7-23: Using the Exchange Task Wizard to move a mailbox
- Figure 7-24: Determining how to handle corrupted messages
- Figure 7-25: The Microsoft Exchange Mailbox Merge Wizard
- Figure 7-26: Selecting the source server
- Figure 7-27: The Data Page
- Figure 7-28: The Import Procedure Page
- Figure 7-29: The Folders Page
- Figure 7-30: The Dates Page
- Figure 7-31: The Message Details Page
- Figure 7-32: Selecting the destination server for the migrated mailboxes
- Figure 7-33: Selecting the specific mailboxes to be migrated
- Figure 7-34: Selecting a folder to store the temporary .pst files used in the migration
- Figure 7-35: Selecting the address types that the LDAP query should filter for
- Figure 7-36: Storage group properties
- Figure 7-37: Configuring a new mailbox store
- Figure 7-38: Database properties
- Figure 7-39: Confirming the database move
- Figure 7-40: The LDAP query for an address list
- Figure 7-41: Previewing an address list
- Figure 7-42: Filtering an address list by recipient type
- Figure 7-43: Filtering an address list by attributes
- Figure 7-44: The security properties of an address list
- Figure 7-45: The Recipient Update Service Properties
- Figure 7-46: The Default Offline Address List properties
Chapter 8: Public Folders
- Figure 8-1: Creating a new public folder
- Figure 8-2: Creating a public folder in OWA
- Figure 8-3: The Folders container
- Figure 8-4: Creating a public folder in Exchange System Manager
- Figure 8-5: Configuring a virtual directory
- Figure 8-6: Browsing the public folder tree
- Figure 8-7: Configuring e-mail addresses for public folders
- Figure 8-8: Configuring delivery restrictions for a public folder
- Figure 8-9: The Exchange Advanced tab
- Figure 8-10: The Member Of tab
- Figure 8-11: The Limits tab
- Figure 8-12: Configuring replication properties
- Figure 8-13: Manually replicating a public folder tree
- Figure 8-14: Configuring public folder referrals
- Figure 8-15: Propagating public folder permissions
- Figure 8-16: Configuring client permissions in Exchange System Manager
- Figure 8-17: Configuring client permissions in Outlook
- Figure 8-18: Configuring additional security settings
- Figure 8-19: Configuring moderated folder settings
Chapter 9: Virtual Servers
- Figure 9-1: The Microsoft Exchange POP3 service Properties dialog box
- Figure 9-2: Configuring the default IMAP4 virtual server
- Figure 9-3: Assigning a unique identity
- Figure 9-4: Configuring read, write, and browse permissions
- Figure 9-5: Specifying a subnet
- Figure 9-6: NNTP virtual server settings
- Figure 9-7: SMTP virtual server messages settings
- Figure 9-8: SMTP virtual server delivery settings
- Figure 9-9: Authentication options for an additional HTTP virtual server on a back-end Exchange server
- Figure 9-10: Authentication options for POP3 and IMAP4 virtual servers on a back-end Exchange server
- Figure 9-11: Authentication options for an NNTP virtual server
- Figure 9-12: Authentication options for an SMTP virtual server
- Figure 9-13: Authentication options for an Exchange virtual server on a front-end or back-end Exchange server
- Figure 9-14: Authentication options for an additional HTTP virtual server on a front-end Exchange server
- Figure 9-15: Authentication dialog box for a POP3 virtual server on a front-end Exchange server
- Figure 9-16: Setting a diagnostic logging level
- Figure 9-17: An Application event log entry for an IMAP4 virtual server
Chapter 10: SMTP Protocol Configuration and Management
- Figure 10-1: Testing ESMTP connectivity
- Figure 10-2: Verifying that MX records exist
- Figure 10-3: Verifying that the MX record for Server01 can be resolved
- Figure 10-4: The General SMTP Connector object
- Figure 10-5: Verifying the SMARTHOST configuration
- Figure 10-6: The Authentication Page
- Figure 10-7: The Security Page
- Figure 10-8: Adding prohibited users
- Figure 10-9: The Relay Restrictions dialog box
- Figure 10-10: Disabling OWA for an individual user
- Figure 10-11: Configuring multilingual support
- Figure 10-12: Accessing per-user properties for an IMAP4 user
- Figure 10-13: Displaying valid entry formats
Chapter 11: Microsoft Exchange Server 2003 Security
- Figure 11-1: The Rpc/HTTP NSPI port setting
- Figure 11-2: The Exchange Server Settings dialog box
- Figure 11-3: Configuring the ICF Advanced Settings
- Figure 11-4: Setting connection filtering
- Figure 11-5: Blocking e-mail from a specific user
- Figure 11-6: Blocking e-mail from a domain
- Figure 11-7: Allowing Authenticated Users Enroll permission so they can digitally sign and encrypt e-mail
- Figure 11-8: Encryption and signature options
- Figure 11-9: Configuring a limits policy
- Figure 11-10: Delegating control to Don Hall
- Figure 11-11: Creating the ShowSecurityPage registry entry
- Figure 11-12: Granting Kim Akers permissions on all administrative groups
- Figure 11-13: Scheduling logging and specifying the file location
- Figure 11-14: Blocking junk-mail domains
Chapter 12: Backup and Restore
- Figure 12-1: Specifying a new location for the transaction log files
- Figure 12-2: Specifying what to back up
- Figure 12-3: The backup log
- Figure 12-4: Checking that the GatherLogs folder is empty
- Figure 12-5: Setting a mailbox retention period for an individual user
- Figure 12-6: Setting a mailbox retention policy
- Figure 12-7: Setting the restore parameters
- Figure 12-8: Recovering deleted messages
- Figure 12-9: Specifying a System State restore
- Figure 12-10: Specifying the advanced restore options
Chapter 13: Monitoring Microsoft Exchange Server 2003
- Figure 13-1: Public folder access and logon statistics
- Figure 13-2: An Event Viewer event report
- Figure 13-3: The Queue Viewer utility
- Figure 13-4: Setting a diagnostic logging level
- Figure 13-5: Selecting an event source
- Figure 13-6: MSExchangeIS mailbox store events at maximum diagnostic logging level
- Figure 13-7: Specifying the virtual memory threshold levels
- Figure 13-8: Specifying CPU utilization threshold levels
- Figure 13-9: Configuring events to be monitored
- Figure 13-10: Adding the Process(store)\% Processor Time counter
- Figure 13-11: Captured data displayed in report format
- Figure 13-12: Configuring Mailbox View to view storage limits
- Figure 13-13: eseutil output
- Figure 13-14: isinteg output
- Figure 13-15: The Summary, Detail, and Hex panes in Network Monitor
- Figure 13-16: Frame containing e-mail message text
- Figure 13-17: Filtering out all frames except TCP frames
- Figure 13-18: Filtering by IP address and direction
- Figure 13-19: Specifying an address for filtering
- Figure 13-20: Specifying two way traffic between Server01 and Server02
Chapter 14: Troubleshooting Microsoft Exchange Server 2003
- Figure 14-1: Netdiag output
- Figure 14-2: Netdiag output showing a fatal error
- Figure 14-3: Running dcdiag on Server02
- Figure 14-4: Output of dcdiag test on Server02
- Figure 14-5: Dcdiag failure notification on Server02
- Figure 14-6: Selecting a performance object, counter, and instance
- Figure 14-7: Settings for the send queue alert
- Figure 14-8: Granting the Create Top Level Public Folder permission
- Figure 14-9: Specifying the Senior Managers global security group
- Figure 14-10: The Senior Managers Properties dialog box
- Figure 14-11: Specifying permissions for the Senior Managers group
- Figure 14-12: Copying or deleting inherited permissions
- Figure 14-13: An intercepted, unencrypted e-mail message
- Figure 14-14: Selecting a certificate authority
- Figure 14-15: Specifying security settings
- Figure 14-16: The ARP request
- Figure 14-17: The ARP reply
- Figure 14-18: Resolving a remote IP address
- Figure 14-19: Identifying operations masters
- Figure 14-20: The ARP cache
- Figure 14-21: Displaying the ARP cache for a specified interface
- Figure 14-22: The ping command adds an entry to the ARP cache
- Figure 14-23: Analyzing the ARP-RARP Request frame
Категории