List of Figures - MCSA/MCSE Self-Paced Training Kit (Exam 70-284): Implementing and Managing Microsoft Exchange Server 2003 [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

MCSA/MCSE Self-Paced Training Kit (Exam 70-284): Implementing and Managing Microsoft Exchange Server 2003 [Electronic resources] - نسخه متنی

Will WillisandIan McLean

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
توضیحات
افزودن یادداشت جدید






List of Figures


Chapter 2: Planning a Microsoft Exchange Server 2003 Infrastructure




Figure 2-1: Enabling ASP in the IIS Manager console



Figure 2-2: Starting the ForestPrep Setup command



Figure 2-3: The Component Selection portion of Setup



Figure 2-4: Identifying the service account that will be given Exchange Full Administrator permissions



Figure 2-5: The Component Selection Page



Figure 2-6: Creating a new organization or installing into an existing organization



Figure 2-7: Defining the organization name



Figure 2-8: Confirming your installation choices



Figure 2-9: Exchange Server Per Seat licensing agreement



Figure 2-10: Tracking the progress of the installation



Figure 2-11: A Microsoft Exchange Installation Wizard error message




Chapter 3: Configuring a Microsoft Exchange Server 2003 Infrastructure




Figure 3-1: Exchange Server 2003 services



Figure 3-2: The organization's property sheet




Chapter 4: Coexistence with Microsoft Exchange Server 5.5




Figure 4-1: The ADC Tools Page



Figure 4-2: Selecting ADC components to install



Figure 4-3: Setting the server options for the ADC



Figure 4-4: The Resource Mailbox Wizard



Figure 4-5: Establishing administrative credentials for each site



Figure 4-6: Configuring a default Windows destination



Figure 4-7: Configuring connection agreements



Figure 4-8: Configuring connection agreements



Figure 4-9: Connection agreement installation summary



Figure 4-10: The Connections tab



Figure 4-11: The connection agreement schedule



Figure 4-12: Configuring replication from Exchange to Active Directory



Figure 4-13: Configuring replication from Active Directory to Exchange



Figure 4-14: Configuring deleted item replication



Figure 4-15: The Advanced tab



Figure 4-16: The ExDeploy command-line utility



Figure 4-17: Exchange Features for an Exchange Server 5.5 mailbox



Figure 4-18: Exchange Features for an Exchange Server 2003 mailbox



Figure 4-19: The graphical Exchange Server Deployment Tools



Figure 4-20: Meeting coexistence prerequisites



Figure 4-21: Exchange Server 2003 installation checklist



Figure 4-22: Active Directory Connector Diagnostics Logging



Figure 4-23: Identifying duplicate accounts



Figure 4-24: Reviewing accounts to be merged



Figure 4-25: Choosing to begin the merge or to export to a .csv file




Chapter 5: Migrating from Microsoft Exchange Server and Other Mail Systems




Figure 5-1: Choosing source and target domains for the migration



Figure 5-2: Listing all user accounts in the Users container in Active Directory



Figure 5-3: Adding user accounts to migrate



Figure 5-4: Specifying the target OU



Figure 5-5: Migrating passwords



Figure 5-6: The Account Transition Options Page



Figure 5-7: Configuring user options



Figure 5-8: Configuring object property exclusions



Figure 5-9: Configuring naming conflict settings



Figure 5-10: Selecting a migration destination



Figure 5-11: Specifying the source server



Figure 5-12: Configuring the message information to migrate



Figure 5-13: Configuring account migration options



Figure 5-14: Configuring general settings



Figure 5-15: Configuring the address space



Figure 5-16: Configuring the import container



Figure 5-17: Configuring the export containers



Figure 5-18: Configuring advanced options



Figure 5-19: Configuring directory synchronization options



Figure 5-20: Configuring delivery restrictions



Figure 5-21: Configuring the general settings for the Calendar Connector



Figure 5-22: Configuring a Calendar Connection type



Figure 5-23: Configuring a new TCP/IP X.400 transport stack



Figure 5-24: Configuring general settings for the X.400 connector



Figure 5-25: Configuring the remote X.400 name and entering its password



Figure 5-26: Configuring advanced message settings



Figure 5-27: Configuring content restrictions




Chapter 6: Installing Microsoft Exchange Server 2003 Clusters and Front-End and Back-End Servers




Figure 6-1: Creating a new cluster



Figure 6-2: Specifying the name and domain of the cluster



Figure 6-3: Analyzing cluster feasibility



Figure 6-4: The Proposed Cluster Configuration Page



Figure 6-5: The new server cluster



Figure 6-6: An Exchange Server 2003 virtual server configuration



Figure 6-7: Server node failover properties



Figure 6-8: Server node failback properties



Figure 6-9: Advanced resource properties



Figure 6-10: Configuring the resource type



Figure 6-11: Configuring the network name



Figure 6-12: The new Exchange Server 2003 virtual server



Figure 6-13: Confirming the conversion to a front-end server




Chapter 7: Managing Recipient Objects and Address Lists




Figure 7-1: Creating a mailbox



Figure 7-2: The Available Tasks page of the Exchange Task Wizard



Figure 7-3: The mail properties of the selected object



Figure 7-4: Choosing an e-mail address type



Figure 7-5: Configuring an SMTP address for a mail-enabled object



Figure 7-6: Deleting a mailbox by using the Exchange Task Wizard



Figure 7-7: Configuring the Deleted Mailbox Retention period



Figure 7-8: Reconnecting a user account to a mailbox



Figure 7-9: Hiding a recipient from the GAL



Figure 7-10: Configuring e-mail address types



Figure 7-11: Configured e-mail addresses for a recipient object



Figure 7-12: Overriding the default storage limits



Figure 7-13: Configuring storage limits at the mailbox store level



Figure 7-14: Choosing which pages display for a policy



Figure 7-15: Assigning a mailbox store policy



Figure 7-16: Searching Active Directory for mailbox stores



Figure 7-17: Policy effects on local settings



Figure 7-18: The Policies tab



Figure 7-19: Granting Send On Behalf permissions



Figure 7-20: Granting mailbox rights



Figure 7-21: Granting permissions to a user folder in Outlook



Figure 7-22: Configuring delivery restrictions for a mailbox



Figure 7-23: Using the Exchange Task Wizard to move a mailbox



Figure 7-24: Determining how to handle corrupted messages



Figure 7-25: The Microsoft Exchange Mailbox Merge Wizard



Figure 7-26: Selecting the source server



Figure 7-27: The Data Page



Figure 7-28: The Import Procedure Page



Figure 7-29: The Folders Page



Figure 7-30: The Dates Page



Figure 7-31: The Message Details Page



Figure 7-32: Selecting the destination server for the migrated mailboxes



Figure 7-33: Selecting the specific mailboxes to be migrated



Figure 7-34: Selecting a folder to store the temporary .pst files used in the migration



Figure 7-35: Selecting the address types that the LDAP query should filter for



Figure 7-36: Storage group properties



Figure 7-37: Configuring a new mailbox store



Figure 7-38: Database properties



Figure 7-39: Confirming the database move



Figure 7-40: The LDAP query for an address list



Figure 7-41: Previewing an address list



Figure 7-42: Filtering an address list by recipient type



Figure 7-43: Filtering an address list by attributes



Figure 7-44: The security properties of an address list



Figure 7-45: The Recipient Update Service Properties



Figure 7-46: The Default Offline Address List properties




Chapter 8: Public Folders




Figure 8-1: Creating a new public folder



Figure 8-2: Creating a public folder in OWA



Figure 8-3: The Folders container



Figure 8-4: Creating a public folder in Exchange System Manager



Figure 8-5: Configuring a virtual directory



Figure 8-6: Browsing the public folder tree



Figure 8-7: Configuring e-mail addresses for public folders



Figure 8-8: Configuring delivery restrictions for a public folder



Figure 8-9: The Exchange Advanced tab



Figure 8-10: The Member Of tab



Figure 8-11: The Limits tab



Figure 8-12: Configuring replication properties



Figure 8-13: Manually replicating a public folder tree



Figure 8-14: Configuring public folder referrals



Figure 8-15: Propagating public folder permissions



Figure 8-16: Configuring client permissions in Exchange System Manager



Figure 8-17: Configuring client permissions in Outlook



Figure 8-18: Configuring additional security settings



Figure 8-19: Configuring moderated folder settings




Chapter 9: Virtual Servers




Figure 9-1: The Microsoft Exchange POP3 service Properties dialog box



Figure 9-2: Configuring the default IMAP4 virtual server



Figure 9-3: Assigning a unique identity



Figure 9-4: Configuring read, write, and browse permissions



Figure 9-5: Specifying a subnet



Figure 9-6: NNTP virtual server settings



Figure 9-7: SMTP virtual server messages settings



Figure 9-8: SMTP virtual server delivery settings



Figure 9-9: Authentication options for an additional HTTP virtual server on a back-end Exchange server



Figure 9-10: Authentication options for POP3 and IMAP4 virtual servers on a back-end Exchange server



Figure 9-11: Authentication options for an NNTP virtual server



Figure 9-12: Authentication options for an SMTP virtual server



Figure 9-13: Authentication options for an Exchange virtual server on a front-end or back-end Exchange server



Figure 9-14: Authentication options for an additional HTTP virtual server on a front-end Exchange server



Figure 9-15: Authentication dialog box for a POP3 virtual server on a front-end Exchange server



Figure 9-16: Setting a diagnostic logging level



Figure 9-17: An Application event log entry for an IMAP4 virtual server




Chapter 10: SMTP Protocol Configuration and Management




Figure 10-1: Testing ESMTP connectivity



Figure 10-2: Verifying that MX records exist



Figure 10-3: Verifying that the MX record for Server01 can be resolved



Figure 10-4: The General SMTP Connector object



Figure 10-5: Verifying the SMARTHOST configuration



Figure 10-6: The Authentication Page



Figure 10-7: The Security Page



Figure 10-8: Adding prohibited users



Figure 10-9: The Relay Restrictions dialog box



Figure 10-10: Disabling OWA for an individual user



Figure 10-11: Configuring multilingual support



Figure 10-12: Accessing per-user properties for an IMAP4 user



Figure 10-13: Displaying valid entry formats




Chapter 11: Microsoft Exchange Server 2003 Security




Figure 11-1: The Rpc/HTTP NSPI port setting



Figure 11-2: The Exchange Server Settings dialog box



Figure 11-3: Configuring the ICF Advanced Settings



Figure 11-4: Setting connection filtering



Figure 11-5: Blocking e-mail from a specific user



Figure 11-6: Blocking e-mail from a domain



Figure 11-7: Allowing Authenticated Users Enroll permission so they can digitally sign and encrypt e-mail



Figure 11-8: Encryption and signature options



Figure 11-9: Configuring a limits policy



Figure 11-10: Delegating control to Don Hall



Figure 11-11: Creating the ShowSecurityPage registry entry



Figure 11-12: Granting Kim Akers permissions on all administrative groups



Figure 11-13: Scheduling logging and specifying the file location



Figure 11-14: Blocking junk-mail domains




Chapter 12: Backup and Restore




Figure 12-1: Specifying a new location for the transaction log files



Figure 12-2: Specifying what to back up



Figure 12-3: The backup log



Figure 12-4: Checking that the GatherLogs folder is empty



Figure 12-5: Setting a mailbox retention period for an individual user



Figure 12-6: Setting a mailbox retention policy



Figure 12-7: Setting the restore parameters



Figure 12-8: Recovering deleted messages



Figure 12-9: Specifying a System State restore



Figure 12-10: Specifying the advanced restore options




Chapter 13: Monitoring Microsoft Exchange Server 2003




Figure 13-1: Public folder access and logon statistics



Figure 13-2: An Event Viewer event report



Figure 13-3: The Queue Viewer utility



Figure 13-4: Setting a diagnostic logging level



Figure 13-5: Selecting an event source



Figure 13-6: MSExchangeIS mailbox store events at maximum diagnostic logging level



Figure 13-7: Specifying the virtual memory threshold levels



Figure 13-8: Specifying CPU utilization threshold levels



Figure 13-9: Configuring events to be monitored



Figure 13-10: Adding the Process(store)\% Processor Time counter



Figure 13-11: Captured data displayed in report format



Figure 13-12: Configuring Mailbox View to view storage limits



Figure 13-13: eseutil output



Figure 13-14: isinteg output



Figure 13-15: The Summary, Detail, and Hex panes in Network Monitor



Figure 13-16: Frame containing e-mail message text



Figure 13-17: Filtering out all frames except TCP frames



Figure 13-18: Filtering by IP address and direction



Figure 13-19: Specifying an address for filtering



Figure 13-20: Specifying two way traffic between Server01 and Server02




Chapter 14: Troubleshooting Microsoft Exchange Server 2003




Figure 14-1: Netdiag output



Figure 14-2: Netdiag output showing a fatal error



Figure 14-3: Running dcdiag on Server02



Figure 14-4: Output of dcdiag test on Server02



Figure 14-5: Dcdiag failure notification on Server02



Figure 14-6: Selecting a performance object, counter, and instance



Figure 14-7: Settings for the send queue alert



Figure 14-8: Granting the Create Top Level Public Folder permission



Figure 14-9: Specifying the Senior Managers global security group



Figure 14-10: The Senior Managers Properties dialog box



Figure 14-11: Specifying permissions for the Senior Managers group



Figure 14-12: Copying or deleting inherited permissions



Figure 14-13: An intercepted, unencrypted e-mail message



Figure 14-14: Selecting a certificate authority



Figure 14-15: Specifying security settings



Figure 14-16: The ARP request



Figure 14-17: The ARP reply



Figure 14-18: Resolving a remote IP address



Figure 14-19: Identifying operations masters



Figure 14-20: The ARP cache



Figure 14-21: Displaying the ARP cache for a specified interface



Figure 14-22: The ping command adds an entry to the ARP cache



Figure 14-23: Analyzing the ARP-RARP Request frame



/ 221