MCSA/MCSE Self-Paced Training Kit (Exam 70-284): Implementing and Managing Microsoft Exchange Server 2003 [Electronic resources]

Will WillisandIan McLean

نسخه متنی -صفحه : 221/ 220
نمايش فراداده

List of Figures

Chapter 2: Planning a Microsoft Exchange Server 2003 Infrastructure

Figure 2-1: Enabling ASP in the IIS Manager console

Figure 2-2: Starting the ForestPrep Setup command

Figure 2-3: The Component Selection portion of Setup

Figure 2-4: Identifying the service account that will be given Exchange Full Administrator permissions

Figure 2-5: The Component Selection Page

Figure 2-6: Creating a new organization or installing into an existing organization

Figure 2-7: Defining the organization name

Figure 2-8: Confirming your installation choices

Figure 2-9: Exchange Server Per Seat licensing agreement

Figure 2-10: Tracking the progress of the installation

Figure 2-11: A Microsoft Exchange Installation Wizard error message

Chapter 3: Configuring a Microsoft Exchange Server 2003 Infrastructure

Figure 3-1: Exchange Server 2003 services

Figure 3-2: The organization's property sheet

Chapter 4: Coexistence with Microsoft Exchange Server 5.5

Figure 4-1: The ADC Tools Page

Figure 4-2: Selecting ADC components to install

Figure 4-3: Setting the server options for the ADC

Figure 4-4: The Resource Mailbox Wizard

Figure 4-5: Establishing administrative credentials for each site

Figure 4-6: Configuring a default Windows destination

Figure 4-7: Configuring connection agreements

Figure 4-8: Configuring connection agreements

Figure 4-9: Connection agreement installation summary

Figure 4-10: The Connections tab

Figure 4-11: The connection agreement schedule

Figure 4-12: Configuring replication from Exchange to Active Directory

Figure 4-13: Configuring replication from Active Directory to Exchange

Figure 4-14: Configuring deleted item replication

Figure 4-15: The Advanced tab

Figure 4-16: The ExDeploy command-line utility

Figure 4-17: Exchange Features for an Exchange Server 5.5 mailbox

Figure 4-18: Exchange Features for an Exchange Server 2003 mailbox

Figure 4-19: The graphical Exchange Server Deployment Tools

Figure 4-20: Meeting coexistence prerequisites

Figure 4-21: Exchange Server 2003 installation checklist

Figure 4-22: Active Directory Connector Diagnostics Logging

Figure 4-23: Identifying duplicate accounts

Figure 4-24: Reviewing accounts to be merged

Figure 4-25: Choosing to begin the merge or to export to a .csv file

Chapter 5: Migrating from Microsoft Exchange Server and Other Mail Systems

Figure 5-1: Choosing source and target domains for the migration

Figure 5-2: Listing all user accounts in the Users container in Active Directory

Figure 5-3: Adding user accounts to migrate

Figure 5-4: Specifying the target OU

Figure 5-5: Migrating passwords

Figure 5-6: The Account Transition Options Page

Figure 5-7: Configuring user options

Figure 5-8: Configuring object property exclusions

Figure 5-9: Configuring naming conflict settings

Figure 5-10: Selecting a migration destination

Figure 5-11: Specifying the source server

Figure 5-12: Configuring the message information to migrate

Figure 5-13: Configuring account migration options

Figure 5-14: Configuring general settings

Figure 5-15: Configuring the address space

Figure 5-16: Configuring the import container

Figure 5-17: Configuring the export containers

Figure 5-18: Configuring advanced options

Figure 5-19: Configuring directory synchronization options

Figure 5-20: Configuring delivery restrictions

Figure 5-21: Configuring the general settings for the Calendar Connector

Figure 5-22: Configuring a Calendar Connection type

Figure 5-23: Configuring a new TCP/IP X.400 transport stack

Figure 5-24: Configuring general settings for the X.400 connector

Figure 5-25: Configuring the remote X.400 name and entering its password

Figure 5-26: Configuring advanced message settings

Figure 5-27: Configuring content restrictions

Chapter 6: Installing Microsoft Exchange Server 2003 Clusters and Front-End and Back-End Servers

Figure 6-1: Creating a new cluster

Figure 6-2: Specifying the name and domain of the cluster

Figure 6-3: Analyzing cluster feasibility

Figure 6-4: The Proposed Cluster Configuration Page

Figure 6-5: The new server cluster

Figure 6-6: An Exchange Server 2003 virtual server configuration

Figure 6-7: Server node failover properties

Figure 6-8: Server node failback properties

Figure 6-9: Advanced resource properties

Figure 6-10: Configuring the resource type

Figure 6-11: Configuring the network name

Figure 6-12: The new Exchange Server 2003 virtual server

Figure 6-13: Confirming the conversion to a front-end server

Chapter 7: Managing Recipient Objects and Address Lists

Figure 7-1: Creating a mailbox

Figure 7-2: The Available Tasks page of the Exchange Task Wizard

Figure 7-3: The mail properties of the selected object

Figure 7-4: Choosing an e-mail address type

Figure 7-5: Configuring an SMTP address for a mail-enabled object

Figure 7-6: Deleting a mailbox by using the Exchange Task Wizard

Figure 7-7: Configuring the Deleted Mailbox Retention period

Figure 7-8: Reconnecting a user account to a mailbox

Figure 7-9: Hiding a recipient from the GAL

Figure 7-10: Configuring e-mail address types

Figure 7-11: Configured e-mail addresses for a recipient object

Figure 7-12: Overriding the default storage limits

Figure 7-13: Configuring storage limits at the mailbox store level

Figure 7-14: Choosing which pages display for a policy

Figure 7-15: Assigning a mailbox store policy

Figure 7-16: Searching Active Directory for mailbox stores

Figure 7-17: Policy effects on local settings

Figure 7-18: The Policies tab

Figure 7-19: Granting Send On Behalf permissions

Figure 7-20: Granting mailbox rights

Figure 7-21: Granting permissions to a user folder in Outlook

Figure 7-22: Configuring delivery restrictions for a mailbox

Figure 7-23: Using the Exchange Task Wizard to move a mailbox

Figure 7-24: Determining how to handle corrupted messages

Figure 7-25: The Microsoft Exchange Mailbox Merge Wizard

Figure 7-26: Selecting the source server

Figure 7-27: The Data Page

Figure 7-28: The Import Procedure Page

Figure 7-29: The Folders Page

Figure 7-30: The Dates Page

Figure 7-31: The Message Details Page

Figure 7-32: Selecting the destination server for the migrated mailboxes

Figure 7-33: Selecting the specific mailboxes to be migrated

Figure 7-34: Selecting a folder to store the temporary .pst files used in the migration

Figure 7-35: Selecting the address types that the LDAP query should filter for

Figure 7-36: Storage group properties

Figure 7-37: Configuring a new mailbox store

Figure 7-38: Database properties

Figure 7-39: Confirming the database move

Figure 7-40: The LDAP query for an address list

Figure 7-41: Previewing an address list

Figure 7-42: Filtering an address list by recipient type

Figure 7-43: Filtering an address list by attributes

Figure 7-44: The security properties of an address list

Figure 7-45: The Recipient Update Service Properties

Figure 7-46: The Default Offline Address List properties

Chapter 8: Public Folders

Figure 8-1: Creating a new public folder

Figure 8-2: Creating a public folder in OWA

Figure 8-3: The Folders container

Figure 8-4: Creating a public folder in Exchange System Manager

Figure 8-5: Configuring a virtual directory

Figure 8-6: Browsing the public folder tree

Figure 8-7: Configuring e-mail addresses for public folders

Figure 8-8: Configuring delivery restrictions for a public folder

Figure 8-9: The Exchange Advanced tab

Figure 8-10: The Member Of tab

Figure 8-11: The Limits tab

Figure 8-12: Configuring replication properties

Figure 8-13: Manually replicating a public folder tree

Figure 8-14: Configuring public folder referrals

Figure 8-15: Propagating public folder permissions

Figure 8-16: Configuring client permissions in Exchange System Manager

Figure 8-17: Configuring client permissions in Outlook

Figure 8-18: Configuring additional security settings

Figure 8-19: Configuring moderated folder settings

Chapter 9: Virtual Servers

Figure 9-1: The Microsoft Exchange POP3 service Properties dialog box

Figure 9-2: Configuring the default IMAP4 virtual server

Figure 9-3: Assigning a unique identity

Figure 9-4: Configuring read, write, and browse permissions

Figure 9-5: Specifying a subnet

Figure 9-6: NNTP virtual server settings

Figure 9-7: SMTP virtual server messages settings

Figure 9-8: SMTP virtual server delivery settings

Figure 9-9: Authentication options for an additional HTTP virtual server on a back-end Exchange server

Figure 9-10: Authentication options for POP3 and IMAP4 virtual servers on a back-end Exchange server

Figure 9-11: Authentication options for an NNTP virtual server

Figure 9-12: Authentication options for an SMTP virtual server

Figure 9-13: Authentication options for an Exchange virtual server on a front-end or back-end Exchange server

Figure 9-14: Authentication options for an additional HTTP virtual server on a front-end Exchange server

Figure 9-15: Authentication dialog box for a POP3 virtual server on a front-end Exchange server

Figure 9-16: Setting a diagnostic logging level

Figure 9-17: An Application event log entry for an IMAP4 virtual server

Chapter 10: SMTP Protocol Configuration and Management

Figure 10-1: Testing ESMTP connectivity

Figure 10-2: Verifying that MX records exist

Figure 10-3: Verifying that the MX record for Server01 can be resolved

Figure 10-4: The General SMTP Connector object

Figure 10-5: Verifying the SMARTHOST configuration

Figure 10-6: The Authentication Page

Figure 10-7: The Security Page

Figure 10-8: Adding prohibited users

Figure 10-9: The Relay Restrictions dialog box

Figure 10-10: Disabling OWA for an individual user

Figure 10-11: Configuring multilingual support

Figure 10-12: Accessing per-user properties for an IMAP4 user

Figure 10-13: Displaying valid entry formats

Chapter 11: Microsoft Exchange Server 2003 Security

Figure 11-1: The Rpc/HTTP NSPI port setting

Figure 11-2: The Exchange Server Settings dialog box

Figure 11-3: Configuring the ICF Advanced Settings

Figure 11-4: Setting connection filtering

Figure 11-5: Blocking e-mail from a specific user

Figure 11-6: Blocking e-mail from a domain

Figure 11-7: Allowing Authenticated Users Enroll permission so they can digitally sign and encrypt e-mail

Figure 11-8: Encryption and signature options

Figure 11-9: Configuring a limits policy

Figure 11-10: Delegating control to Don Hall

Figure 11-11: Creating the ShowSecurityPage registry entry

Figure 11-12: Granting Kim Akers permissions on all administrative groups

Figure 11-13: Scheduling logging and specifying the file location

Figure 11-14: Blocking junk-mail domains

Chapter 12: Backup and Restore

Figure 12-1: Specifying a new location for the transaction log files

Figure 12-2: Specifying what to back up

Figure 12-3: The backup log

Figure 12-4: Checking that the GatherLogs folder is empty

Figure 12-5: Setting a mailbox retention period for an individual user

Figure 12-6: Setting a mailbox retention policy

Figure 12-7: Setting the restore parameters

Figure 12-8: Recovering deleted messages

Figure 12-9: Specifying a System State restore

Figure 12-10: Specifying the advanced restore options

Chapter 13: Monitoring Microsoft Exchange Server 2003

Figure 13-1: Public folder access and logon statistics

Figure 13-2: An Event Viewer event report

Figure 13-3: The Queue Viewer utility

Figure 13-4: Setting a diagnostic logging level

Figure 13-5: Selecting an event source

Figure 13-6: MSExchangeIS mailbox store events at maximum diagnostic logging level

Figure 13-7: Specifying the virtual memory threshold levels

Figure 13-8: Specifying CPU utilization threshold levels

Figure 13-9: Configuring events to be monitored

Figure 13-10: Adding the Process(store)\% Processor Time counter

Figure 13-11: Captured data displayed in report format

Figure 13-12: Configuring Mailbox View to view storage limits

Figure 13-13: eseutil output

Figure 13-14: isinteg output

Figure 13-15: The Summary, Detail, and Hex panes in Network Monitor

Figure 13-16: Frame containing e-mail message text

Figure 13-17: Filtering out all frames except TCP frames

Figure 13-18: Filtering by IP address and direction

Figure 13-19: Specifying an address for filtering

Figure 13-20: Specifying two way traffic between Server01 and Server02

Chapter 14: Troubleshooting Microsoft Exchange Server 2003

Figure 14-1: Netdiag output

Figure 14-2: Netdiag output showing a fatal error

Figure 14-3: Running dcdiag on Server02

Figure 14-4: Output of dcdiag test on Server02

Figure 14-5: Dcdiag failure notification on Server02

Figure 14-6: Selecting a performance object, counter, and instance

Figure 14-7: Settings for the send queue alert

Figure 14-8: Granting the Create Top Level Public Folder permission

Figure 14-9: Specifying the Senior Managers global security group

Figure 14-10: The Senior Managers Properties dialog box

Figure 14-11: Specifying permissions for the Senior Managers group

Figure 14-12: Copying or deleting inherited permissions

Figure 14-13: An intercepted, unencrypted e-mail message

Figure 14-14: Selecting a certificate authority

Figure 14-15: Specifying security settings

Figure 14-16: The ARP request

Figure 14-17: The ARP reply

Figure 14-18: Resolving a remote IP address

Figure 14-19: Identifying operations masters

Figure 14-20: The ARP cache

Figure 14-21: Displaying the ARP cache for a specified interface

Figure 14-22: The ping command adds an entry to the ARP cache

Figure 14-23: Analyzing the ARP-RARP Request frame