caching, 14-48, 14-50, 14-56 to 14-58
centralized administrative model, 3-14 to 3-15
certificates
deploying digital signature and encryption, 11-32 to 11-35
obtaining and installing for IMAP4 server, 9-44 to 9-45
troubleshooting, 14-40 to 14-41
child folders, 8-26 to 8-27
/ChooseDC dcname switch, 2-19
circular logging
defined, 7-48, 7-77, 12-50
incorrect uses of, 12-10
saving disk space with, 12-9 to 12-10
client workstation requirements, 3-7 to 3-8, 3-12
clients. See also IMAP4 clients; POP3 clients
client-side antivirus software, 11-14
configuring access to virtual server protocols, 9-43 to 9-44
experimenting with additional client hosts, 10-2
HTTP, 10-39 to 10-41
NNTP, 10-43 to 10-44
permissions for public folders, 8-27 to 8-29, 8-32, 8-34
solving cache entry problems for, 14-50
Cluster Administrator, 6-15, 13-6
clustering, 6-3 to 6-28. See also managing clusters; virtual servers
active/active and active/passive clusters, 6-9
case scenario exercise, 6-34 to 6-36, 6-41 to 6-42
cluster nodes, 6-16, 6-37
clustering components, 6-9 to 6-11
configuring Exchange Server as front-end server, 6-29 to 6-30, 6-32
defined, 6-3
Enterprise edition required for, 6-8
Exchange Server installation on Windows Server 2003, 6-11 to 6-16
front-end and back-end servers and, 6-30 to 6-31
installing Exchange Server in clustered environment, 6-3 to 6-18
key terms, 6-37
managing Exchange Server cluster, 6-19 to 6-28
Microsoft Cluster Service, 6-3, 6-5 to 6-8
monitoring resources daily, 13-6
Network Load Balancing, 6-3 to 6-5
overview, 6-3
performing Exchange cluster backups, 12-21 to 12-22
permissions and, 6-11
practice exercise, 6-12 to 6-16
questions and answers, 6-16 to 6-17, 6-27 to 6-28, 6-33, 6-38 to 6-41
restoring clusters, 12-34 to 12-36
selecting technology for, 6-8 to 6-9
static IP addresses and private cluster network, 6-10
storage groups, 6-11
summary points, 6-18, 6-34, 6-36 to 6-37
virtual memory fragmentation, 14-19 to 14-20
virtual servers in Windows environment, 9-3
commands
ESMTP, 10-6 to 10-8
etrn, 10-34
SMTP, 10-4, 10-8
vrfy, 10-6 to 10-7
components
adding and removing, 3-8, 3-10
clustering, 6-9 to 6-11
compression for forms-based authentication, 9-29 to 9-30
concurrent connections to virtual server, 9-40
ConfigDSInteg tool, 4-25
configuration naming context, 1-9, 1-11, 1-17
configuring Exchange Server infrastructure, 3-1 to 3-44. See also administrative groups; back-end servers; front-end servers
adding and removing Exchange Server components, 3-8, 3-10
administration from client workstations, 3-7 to 3-8
administrative and routing groups, 3-13 to 3-20
case scenario exercise, 3-32 to 3-35, 3-42 to 3-44
delegating administrative authority, 3-5 to 3-6, 3-9 to 3-10, 3-36
front-end and back-end servers, 3-28 to 3-32
key terms, 3-36
mixed and native modes, 3-21 to 3-27
modifying services, 3-9
overview, 3-1
practice exercises, 3-8 to 3-10
questions and answers, 3-10 to 3-11, 3-18 to 3-19, 3-26 to 3-27, 3-31, 3-37 to 3-44
service dependencies, 3-4 to 3-5, 3-36
service logon accounts, 3-5
services added in typical installation, 3-2 to 3-3
stopping services prior to rebooting, 3-5
summary points, 3-12, 3-19 to 3-20, 3-27, 3-32, 3-35 to 3-36
connecting Exchange Server 5.5 to Active Directory, 4-3 to 4-22
installing Active Directory Connector, 4-3 to 4-5, 4-9 to 4-10
overview, 4-3
practice exercises, 4-8 to 4-20
questions and answers, 4-21 to 4-22, 4-47 to 4-48
setting up connection agreement manually, 4-6 to 4-8, 4-17 to 4-20
summary points, 4-22
synchronizing with ADC tools, 4-5 to 4-6, 4-11 to 4-16
Connection Agreement Wizard, 4-6
connection agreements
configuring, 4-14 to 4-15, 4-44
defined, 4-46
function of, 4-4
setting up manually, 4-6 to 4-8, 4-17 to 4-20
summary points, 4-22
connection filtering, 11-26 to 11-17
connections
arp utility for troubleshooting, 14-53
configuring Internet connectivity for SMTP messages, 10-11 to 10-12
connectivity for organizations, 14-30
diagnosing connectivity problems, 14-8
ESMTP, 10-5 to 10-8
firewall connectivity, 14-36 to 14-39
implementing SMTP, 10-3 to 10-5
incoming SMTP options, 10-21 to 10-22
Internet connections with Routing and Remote Access, 10-33
nbstat utility for troubleshooting, 14-54
netstat utility for troubleshooting, 14-54 to 14-55
network, 14-11 to 14-12, 14-52 to 14-56, 14-60
outgoing SMTP options, 10-22
pathping utility for troubleshooting, 14-55 to 14-56
ping utility for troubleshooting, 14-53
retrieving mail from ISP dial-up connection, 10-26 to 10-27
tracert utility for troubleshooting, 14-55
troubleshooting Active Directory, 4-37 to 4-38
virtual server, 9-40, 9-52 to 9-53
Connectix Virtual PC, 10-2
Connector for Lotus Notes, 5-26 to 5-30
contact recipients, 7-5
copy backups, 12-18, 12-21
copy plus incremental backups, 12-18
corrupted messages, 7-30
/CreateUnattend filename.ini switch, 2-20
creating public folders. See also public folders
creating public folder trees, 8-8 to 8-9
in Exchange System Manager, 8-5 to 8-7
in Outlook, 8-3 to 8-4
in OWA, 8-4 to 8-5
practice exercise, 8-9
troubleshooting lab, 8-37
CRL (certificate revocation list), 11-31 to 11-32
customer feedback e-mail addresses, 8-3