SAN (storage area networks), 12-11 to 12-12, 12-15
SASL (Simple Authentication and Security Layer), 9-42
scheduled tasks, 13-20 to 13-34
capacity planning, 13-21
configuring protocol logs, 13-23 to 13-25, 13-28 to 13-30
creating mailbox policies and checking for oversized mailboxes, 13-32
generating reports and identifying trends, 13-21, 13-30 to 13-31
HTTP Monitoring Tool for, 13-25
managing mailbox limits, 13-26 to 13-27
monitoring postmaster mailbox, 13-27 to 13-28
Performance console for, 13-22 to 13-23
questions and answers, 13-33, 13-54
reading default SMTP protocol log file, 13-31
reviewing Badmail folder, 13-27
summary points, 13-33 to 13-34
types of, 13-20 to 13-21
Schema Master, 1-8, 1-17
schema naming context, 1-9, 1-11, 1-17
schemas, 1-3, 1-7
SCL (Spam Confidence Level), 11-24
Secure Multi-Purpose Internet Mail Extensions (S/MIME), 11-31
Secure Sockets Layer (SSL). See SSL (Secure Sockets Layer)
security
administering from client workstations, 3-7 to 3-8
administrative permissions, 11-36 to 11-45
antivirus software, 11-14 to 11-16
blocking junk e-mail, 11-58 to 11-60
case scenario exercise, 11-56 to 11-58, 11-66 to 11-68
checking e-mail encryption, 14-41 to 14-44
connectivity across firewalls, 14-36 to 14-39
delegating administrative authority, 3-6
digital signatures and encryption, 11-30 to 11-35
disabling services, 11-46 to 11-51, 11-55 to 11-56
downloading antivirus software, 11-20
encryption and digital signatures, 14-40 to 14-41
firewalls, 11-3 to 11-11, 11-61, 11-63, 14-44
flaws in basic authentication, 9-41
key terms, 11-62
mailbox, 11-22 to 11-29, 11-64
overview, 11-1
permissions problems, 14-39 to 14-40, 14-44
protocol logging, 11-46 to 11-56, 11-61, 11-65 to 11-66, 14-35
public folders, 8-26 to 8-34, 8-41 to 8-42
questions and answers, 11-11, 11-20 to 11-21, 11-29, 11-35, 11-44, 11-55 to 11-56, 11-63 to 11-68, 14-44
security updates, 11-18 to 11-19
SMTP, 10-21 to 10-35
spam masquerading as administrator alert, 11-18
strategies for, 11-13 to 11-15, 14-38
summary points, 11-21, 11-29, 11-56, 11-60 to 11-61, 14-44
troubleshooting, 14-36 to 14-44
types of, 11-12 to 11-13
virus protection, 11-12 to 11-21
security groups
created by DomainPrep, 2-15 to 2-16, 2-18, 2-46
creating global, 14-31 to 14-32
mail-enabling, 7-5, 8-17
security identifiers. See SIDs (security identifiers)
security principals, 14-51
security updates, 11-18 to 11-19
Send On Behalf permissions, 7-24 to 7-25
sender filtering, 11-25
Senior Managers security group, 14-31 to 14-32
servers. See also back-end servers; front-end servers; virtual servers
accelerating front-end, 3-29
clustering, 6-3
customizing list of referral, 8-22 to 8-23
expansion, 7-38
front-end and back-end, 3-28 to 3-30, 3-36
installing Exchange Server 2003 on existing, 2-6
mixed mode, 3-22 to 3-24, 4-27 to 4-28
restoring, 12-36 to 12-37, 12-43 to 12-44
starting and stopping virtual, 9-52
supporting Network Load Balancing, 6-4
upgrading from Exchange Server 5.5 on different, 5-5 to 5-7
troubleshooting, 14-16 to 14-25
server-side antivirus software, 11-15
service accounts
about, 2-6 to 2-7, 2-11
creating, 2-8 to 2-9
defined, 2-46
service dependencies, 3-4 to 3-5, 3-36
service logon accounts, 3-5
services
added in typical installation, 3-2 to 3-3
Exchange Server ports and, 14-37
modifying, 3-9
monitoring, 13-6
monitoring resources and, 13-5 to 13-6
optional for front-end and back-end servers, 11-49 to 11-51
required for front-end and back-end servers, 11-48, 11-50
service dependencies, 3-4 to 3-5, 3-36
stopping prior to rebooting, 3-5
/ShowUI switch, 2-20
Shutdown.exe file, 3-5
SIDs (security identifiers)
conflicting IDs for migrated user accounts, 5-7
defined, 5-45
migrating history of user account, 5-8
Simple Mail Transport Protocol. See SMTP (Simple Mail Transport Protocol)
Single Node server clusters, 6-6
Single Quorum Device server clusters, 6-6
site connection agreements. See connection agreements
site credentials, 4-13
Site Replication Service, 4-28 to 4-29, 4-33, 4-38
sites, 1-3, 1-7, 3-36
smart hosts
configuring SMTP virtual servers to use, 10-13
forwarding unresolved messages to, 10-13 to 10-14
on SMTP connectors, 10-14
S/MIME (Secure Multi-Purpose Internet Mail Extensions), 11-31
SMS (Microsoft Systems Management Server), 11-19
SMTP (Simple Mail Transport Protocol). See also ESMTP (Extended Simple Mail Transport Protocol); SMTP relays; SMTP virtual servers
associating MIME types with extensions, 10-44
asymmetric request-response protocol, 10-3 to 10-4
authentication, 10-23, 10-27 to 10-28
case scenario exercise, 10-52 to 10-54, 10-61 to 10-62
common commands, 10-4
common reply codes, 10-5
configuring Exchange for other SMTP messaging systems, 10-36 to 10-52
connecting to Internet with Routing and Remote Access, 10-33
creating mailbox-enabled users, 10-46 to 10-47
defined, 10-57
DNS support, 10-9 to 10-10
domain message defaults, 10-44 to 10-46
encryption, 10-23 to 10-24
global settings features, 10-37 to 10-38
HTTP clients, 10-39 to 10-41
identifying message delivery failures, 10-27
IMAP4 clients, 10-41 to 10-42, 10-47 to 10-49
implementing SMTP connection, 10-3 to 10-5
incoming connection options, 10-21 to 10-22
installing, 2-7 to 2-8
Internet connectivity with, 10-11 to 10-12
junk e-mail prevention, 10-25 to 10-26
key terms, 10-57
mailbox defaults, 10-38 to 10-39
managing message transfer support, 10-3 to 10-20
message defaults, 10-38
MX records, 10-15 to 10-16
NNTP clients, 10-43 to 10-44
outgoing connection options, 10-22
overview, 10-1 to 10-2, 10-21, 10-36 to 10-37
POP3 clients, 10-42 to 10-43, 10-49 to 10-51
practice exercises, 10-27 to 10-34
provided by Windows Server 2003, 1-13
pulling queued e-mail from another server, 10-34
questions and answers, 10-19 to 10-20, 10-34 to 10-35, 10-51, 10-58 to 10-62
relaying, 10-12 to 10-15, 10-31 to 10-32
restricting Internet e-mail, 10-24 to 10-25, 10-30 to 10-31
retrieving mail from ISP dial-up connection, 10-26 to 10-27
reverse DNS lookup, 10-24
security and advanced options, 10-21 to 10-35
SMTP connectors, 10-11 to 10-12, 10-32 to 10-33
summary points, 10-20, 10-35, 10-51 to 10-52, 10-56
TLS encryption, 10-29 to 10-30
troubleshooting lab, 10-54 to 10-55
SMTP connectors
configuring credentials of, 10-12
configuring for only receiving or sending e-mail, 10-12
creating with Internet Mail Wizard, 10-12
implementing, 10-3 to 10-5
limiting scope of, 10-11
overriding relay settings on virtual server, 10-32 to 10-33
practice exercises, 10-17 to 10-18, 10-30
setting to only receive or send mail, 10-12
smart hosts with, 10-14
SMTP relays, 10-12 to 10-15
configuring relay host, 10-14, 10-18
defined, 10-20
forwarding unresolved messages to smart host, 10-13 to 10-14
limiting domains for, 10-14 to 10-15
overview, 10-12 to 10-13
preventing open relaying, 10-31 to 10-32
relaying mail for IMAP4 clients, 10-43
restricting servers relaying e-mail messages, 10-14
troubleshooting junk mail, 10-54 to 10-55
SMTP virtual servers
additional, 10-11
configuring, 9-14 to 9-15, 9-22 to 9-23, 9-37 to 9-38
creating, 9-21, 9-36 to 9-37
enabling protocol logging for, 11-53 to 11-54
incoming connection options for, 10-21 to 10-22
limiting domains for relay messages, 10-14 to 10-15
masquerade domains, 9-23
outgoing connection options, 10-22
overview, 9-14, 9-19
relaying mail for POP3 and IMAP4 clients, 9-40, 10-43
restricting servers relaying e-mail messages, 10-14
setting up as relay host, 10-14
summary points, 9-51
supported authentication methods, 9-43
using smart hosts, 10-13 to 10-14
software-related installation failures, 14-6
source domains, 5-46
spam. See also junk e-mail
extended periods in queues as symptom of, 13-38
junk e-mail vs., 11-22
masquerading as administrator alert, 11-18
Spam Confidence Level (SCL), 11-24
special ports, 14-38
spikes in queued messages, 13-38
SSL (Secure Sockets Layer)
benefits of front-end and back-end servers for, 3-29
combining TLS with, 10-29
enabling on POP3 virtual server, 9-6
Standard edition of Exchange Server 2003, 3-14
starting and stopping virtual servers, 9-52
static data, 12-16 to 12-17
static IP addresses, 6-10, 6-37
.stm files, 7-46, 12-4
storage area networks (SANs), 12-11 to 12-12, 12-15
storage groups. See also recovery storage groups
adding, 7-48 to 7-52, 7-54
architecture of, 7-46 to 7-47
backing up, 12-22 to 12-24
circular logging, 7-48, 7-77
creating, 12-12 to 12-13
data storage for minimizing recovery time, 12-9
defined, 7-77
dismounting, 12-13 to 12-14
managing, 12-13 to 12-14
moving, 7-52 to 7-55
multiple databases and, 7-47 to 7-48
recovery, 14-20 to 14-21, 14-63 to 14-67
support for, 6-11
storage limits
mailbox, 7-17 to 7-24, 14-19
public folder, 8-18 to 8-19
stores. See also information stores; mailbox stores; public folder stores; public stores
defragmenting, 13-36
monitoring Exchange store statistics, 13-7 to 13-8
restoring, 12-29
verifying integrity of, 13-35, 13-37, 13-40 to 13-41
strong passwords, 2-9
subnets, 9-31 to 9-32
Summary pane (Network Monitor), 13-46
SUS (Microsoft Software Update Services), 11-19
switches for Microsoft Exchange Installation Wizard, 2-19 to 2-21
synchronizing Lotus Notes with Exchange Server, 5-45
system state data
backups of, 12-36, 12-40 to 12-41
restoring, 12-36, 12-41 to 12-43