packet filters, 11-3
parent folders, 8-26 to 8-27
password migration, 5-18 to 5-20
/Password password switch, 2-20
payload, 11-12
PDC Emulator, 1-6, 1-17
performance
accelerating front-end servers, 3-29
monitoring network, 13-5
Performance console
configuring, 13-22 to 13-23
defined, 13-51
summary points, 13-51
System Manager and Performance Logs And Alerts, 13-6
performance counters, 14-16 to 14-18
adding, 14-21 to 14-22
diagnosing server health with, 14-16 to 14-18
virtual memory fragmentation, 14-19 to 14-20, 14-25
Performance Optimizer, 7-52
perimeter network. See demilitarized zone (DMZ)
permissions
administrative, 11-36 to 11-45
allowing Relay Permissions for POP3 and IMAP4 users, 10-55
clustering and, 6-11
configuring on public folder store, 14-32 to 14-34
incorrectly configured, 14-27
installation failures and sufficient, 14-6 to 14-7
mailbox, 7-24 to 7-25, 7-28 to 7-29, 7-42
public folder, 8-28 to 8-32, 14-31 to 14-34
questions and answers, 11-44, 11-65
removing groups rather than denying, 10-54
required for Exchange installation, 2-7
setting on virtual directory, 9-28
summary points, 11-45
troubleshooting, 14-39 to 14-40, 14-44
write and delete, 14-34 to 14-35
per-user options
IMAP4 client, 10-48 to 10-49
overriding global defaults with, 10-56
POP3 clients, 10-50 to 10-51
Pickup folder, 10-8
ping utility, 14-53, 14-57 to 14-58
PKI (public key infrastructure), 11-31, 11-62
planning Exchange Server infrastructure, 2-1 to 2-54
case scenario exercise, 2-40 to 2-43, 2-52 to 2-54, 3-42 to 3-44
creating service account, 2-6 to 2-7
forest and domain preparation, 2-12 to 2-18, 2-46
.ini file for unattended setup, 2-28 to 2-32
installation hardware requirements, 2-5 to 2-6, 2-45
installing Exchange Server, 2-19 to 2-27
key terms, 2-46
overview, 2-1 to 2-2
practice exercises, 2-8 to 2-10, 2-15 to 2-16
preparing for installation, 2-3 to 2-11
questions and answers, 2-10 to 2-11, 2-17, 2-26 to 2-27, 2-33 to 2-34, 2-39 to 2-40, 2-47 to 2-54
removing Exchange Server from organization, 2-35 to 2-40, 2-44 to 2-45
required Windows services, 2-7 to 2-10
summary points, 2-11, 2-18, 2-27, 2-34, 2-40, 2-45 to 2-26
supported combinations of Exchange and Windows Server, 2-3 to 2-5
unattended setup, 2-28 to 2-34
PolCheck tool, 4-24
POP3 (Post Office Protocol version 3)
about, 1-13
accessing Exchange inboxes with, 10-36
allowing Relay Permissions for users, 10-55
defined, 10-57
encrypting SMTP message delivery for clients, 10-26
unable to deliver e-mail, 10-36, 10-41 to 10-42
POP3 clients
calendaring with, 10-43
configuring, 10-42 to 10-43, 10-49 to 10-51
per-user options, 10-50 to 10-51
relaying mail with SMTP virtual server for, 10-43
SMTP support for sending e-mail for, 10-42
POP3 virtual servers
additional, 9-20
authentication options on back-end server, 9-46
configuring, 9-21 to 9-22
creating, 9-30
enabling and starting, 9-16 to 9-17
examining settings on front-end server, 9-49 to 9-50
overview, 9-5 to 9-7, 9-19
SASL authentication for clients, 9-42
SSL for, 9-6
summary points, 9-51
supported authentication methods, 9-43
ports
blocking unused, 11-46
configuring RPC proxy server to use specific, 11-7 to 11-8
Exchange Server, 11-6, 14-37
special, 14-38
TCP port filtering, 11-4 to 11-5
postmaster account, 10-38 to 10-39
postmaster mailbox, 13-27 to 13-28
practice exercises
address lists and recipient policies, 7-69 to 7-70
authenticating virtual servers, 9-44 to 9-50
backups, 12-22 to 12-26
configuration steps after installation, 3-8 to 3-10
connecting with Exchange Server 5.5 with Active
Directory, 4-8 to 4-20
information stores, 7-54 to 7-55
installing Exchange Server, 2-21 to 2-26, 4-29 to 4-32, 6-12 to 6-16, 6-29 to 6-30, 6-32
limiting permissions to public folders, 14-31 to 14-34
managing Exchange Server cluster, 6-23 to 6-27
merging duplicate accounts, 4-38 to 4-41
migrating Active Directory user accounts, 5-15 to 5-22
MX records, 10-15 to 10-16
netdiag and dcdiag command-line utility, 14-10 to 14-14
on-demand monitoring and maintenance, 13-39 to 13-41
preparing forests and domains, 2-15 to 2-16
public folder trees, 8-8 to 8-9
public folders, 8-23 to 8-24, 8-32
restoring data, 12-37 to 12-44
security, 11-5 to 11-6, 11-20, 11-32 to 11-35
service account, 2-8 to 2-9
SMTP, 10-27 to 10-34, 10-41 to 10-49
SMTP connectors, 10-17 to 10-18, 10-30
unattended Exchange Server installation, 2-31 to 2-32
virtual servers, 9-15 to 9-18, 9-25 to 9-39, 9-45 to 9-50, 9-53
preparing forests and domains, 2-12 to 2-18
DomainPrep, 2-15 to 2-16, 2-18, 2-46
ForestPrep, 2-12 to 2-16, 2-18, 2-46
overview, 2-12
practice exercises, 2-15 to 2-16
questions and answers, 2-17, 2-48 to 2-49
primary and resource mailboxes, 4-12
Principle of Least Privilege, 9-16, 10-27, 14-23
private keys, 11-31
PrivFoldCheck tool, 4-25 to 4-26
protocol logging, 11-46 to 11-55
configuring, 11-53 to 11-55, 13-23 to 13-25, 13-28 to 13-30
defined, 11-51
formats for, 11-51 to 11-52
overview, 11-46
questions and answers, 11-55 to 11-56, 11-65 to 11-66
summary points, 11-56, 11-61, 14-35
protocol virtual servers. See virtual servers
proxy servers, 11-3
PubFoldCheck tool, 4-24 to 4-25
public folder indexes, 12-24 to 12-25
public folder recipients, 7-6
public folder referrals, 8-22 to 8-23
public folder stores
configuring permissions on, 14-32 to 14-34
creating, 8-8 to 8-9
defragmenting, 13-35
policies for, 14-19
storage limits, 8-18 to 8-19
verifying integrity of, 13-35
public folder trees, 8-7 to 8-8
accessing, 8-10 to 8-11
creating, 8-8 to 8-9
Default, 8-7, 8-12
defined, 8-39
General Purpose, 8-7 to 8-8
manual replication of, 8-21 to 8-22
practice exercises for, 8-8 to 8-9
questions and answers, 8-11 to 8-12, 8-40
public folders, 8-1 to 8-44. See also public folder trees
administrative rights for, 8-27, 8-31 to 8-32, 8-34
age limits on storage, 8-19
case scenario exercise, 8-34 to 8-36, 8-43 to 8-44
configuring folder e-mail addresses, 8-13 to 8-14
creating, 8-3 to 8-7, 8-9
Default public folder trees, 8-7, 8-12
directory rights for, 8-27, 8-31, 8-34
function of, 8-1 to 8-2
General Purpose public folder trees, 8-7 to 8-8
inherited and assigned permissions, 8-26 to 8-27
key terms, 8-38 to 8-39
limiting permissions, 14-31 to 14-34
mail delivery restrictions, 8-14 to 8-16
mail-enabling folders, 8-13, 8-23 to 8-24, 8-37
managing e-mail properties, 8-13 to 8-17
monitoring, 13-7 to 13-8
moving, 8-19, 8-25
permissions, 8-26 to 8-32, 14-31 to 14-34
practice exercises, 8-8 to 8-9, 8-23 to 8-24, 8-32
public folder trees, 8-7 to 8-8
questions and answers, 8-11 to 8-12, 8-24 to 8-25, 8-33 to 8-34, 8-40 to 8-44
referrals, 8-22 to 8-23
removing, 13-8
replication, 8-19 to 8-22, 8-24
restoring, 12-32 to 12-33, 14-27
security, 8-26 to 8-34
setting storage limits, 8-18 to 8-19
summary points, 8-12, 8-25, 8-34, 8-37 to 8-38
tasks in, 8-13
top-level folders, 8-39
troubleshooting, 14-26 to 14-27
troubleshooting lab, 8-36 to 8-37
using, 8-2 to 8-3
Public Folders container, 8-6
public key encryption, 11-30 to 11-31
public key infrastructure (PKI), 11-31, 11-62
public stores. See public folder stores
pull relationship, 10-26