Index_S


S

SAN (storage area networks), 12-11 to 12-12, 12-15

SASL (Simple Authentication and Security Layer), 9-42

scheduled tasks, 13-20 to 13-34

capacity planning, 13-21

configuring protocol logs, 13-23 to 13-25, 13-28 to 13-30

creating mailbox policies and checking for oversized mailboxes, 13-32

generating reports and identifying trends, 13-21, 13-30 to 13-31

HTTP Monitoring Tool for, 13-25

managing mailbox limits, 13-26 to 13-27

monitoring postmaster mailbox, 13-27 to 13-28

Performance console for, 13-22 to 13-23

questions and answers, 13-33, 13-54

reading default SMTP protocol log file, 13-31

reviewing Badmail folder, 13-27

summary points, 13-33 to 13-34

types of, 13-20 to 13-21

Schema Master, 1-8, 1-17

schema naming context, 1-9, 1-11, 1-17

schemas, 1-3, 1-7

SCL (Spam Confidence Level), 11-24

Secure Multi-Purpose Internet Mail Extensions (S/MIME), 11-31

Secure Sockets Layer (SSL). See SSL (Secure Sockets Layer)

security

administering from client workstations, 3-7 to 3-8

administrative permissions, 11-36 to 11-45

antivirus software, 11-14 to 11-16

blocking junk e-mail, 11-58 to 11-60

case scenario exercise, 11-56 to 11-58, 11-66 to 11-68

checking e-mail encryption, 14-41 to 14-44

connectivity across firewalls, 14-36 to 14-39

delegating administrative authority, 3-6

digital signatures and encryption, 11-30 to 11-35

disabling services, 11-46 to 11-51, 11-55 to 11-56

downloading antivirus software, 11-20

encryption and digital signatures, 14-40 to 14-41

firewalls, 11-3 to 11-11, 11-61, 11-63, 14-44

flaws in basic authentication, 9-41

key terms, 11-62

mailbox, 11-22 to 11-29, 11-64

overview, 11-1

permissions problems, 14-39 to 14-40, 14-44

protocol logging, 11-46 to 11-56, 11-61, 11-65 to 11-66, 14-35

public folders, 8-26 to 8-34, 8-41 to 8-42

questions and answers, 11-11, 11-20 to 11-21, 11-29, 11-35, 11-44, 11-55 to 11-56, 11-63 to 11-68, 14-44

security updates, 11-18 to 11-19

SMTP, 10-21 to 10-35

spam masquerading as administrator alert, 11-18

strategies for, 11-13 to 11-15, 14-38

summary points, 11-21, 11-29, 11-56, 11-60 to 11-61, 14-44

troubleshooting, 14-36 to 14-44

types of, 11-12 to 11-13

virus protection, 11-12 to 11-21

security groups

created by DomainPrep, 2-15 to 2-16, 2-18, 2-46

creating global, 14-31 to 14-32

mail-enabling, 7-5, 8-17

security identifiers. See SIDs (security identifiers)

security principals, 14-51

security updates, 11-18 to 11-19

Send On Behalf permissions, 7-24 to 7-25

sender filtering, 11-25

Senior Managers security group, 14-31 to 14-32

servers. See also back-end servers; front-end servers; virtual servers

accelerating front-end, 3-29

clustering, 6-3

customizing list of referral, 8-22 to 8-23

expansion, 7-38

front-end and back-end, 3-28 to 3-30, 3-36

installing Exchange Server 2003 on existing, 2-6

mixed mode, 3-22 to 3-24, 4-27 to 4-28

restoring, 12-36 to 12-37, 12-43 to 12-44

starting and stopping virtual, 9-52

supporting Network Load Balancing, 6-4

upgrading from Exchange Server 5.5 on different, 5-5 to 5-7

troubleshooting, 14-16 to 14-25

server-side antivirus software, 11-15

service accounts

about, 2-6 to 2-7, 2-11

creating, 2-8 to 2-9

defined, 2-46

service dependencies, 3-4 to 3-5, 3-36

service logon accounts, 3-5

services

added in typical installation, 3-2 to 3-3

Exchange Server ports and, 14-37

modifying, 3-9

monitoring, 13-6

monitoring resources and, 13-5 to 13-6

optional for front-end and back-end servers, 11-49 to 11-51

required for front-end and back-end servers, 11-48, 11-50

service dependencies, 3-4 to 3-5, 3-36

stopping prior to rebooting, 3-5

/ShowUI switch, 2-20

Shutdown.exe file, 3-5

SIDs (security identifiers)

conflicting IDs for migrated user accounts, 5-7

defined, 5-45

migrating history of user account, 5-8

Simple Mail Transport Protocol. See SMTP (Simple Mail Transport Protocol)

Single Node server clusters, 6-6

Single Quorum Device server clusters, 6-6

site connection agreements. See connection agreements

site credentials, 4-13

Site Replication Service, 4-28 to 4-29, 4-33, 4-38

sites, 1-3, 1-7, 3-36

smart hosts

configuring SMTP virtual servers to use, 10-13

forwarding unresolved messages to, 10-13 to 10-14

on SMTP connectors, 10-14

S/MIME (Secure Multi-Purpose Internet Mail Extensions), 11-31

SMS (Microsoft Systems Management Server), 11-19

SMTP (Simple Mail Transport Protocol). See also ESMTP (Extended Simple Mail Transport Protocol); SMTP relays; SMTP virtual servers

associating MIME types with extensions, 10-44

asymmetric request-response protocol, 10-3 to 10-4

authentication, 10-23, 10-27 to 10-28

case scenario exercise, 10-52 to 10-54, 10-61 to 10-62

common commands, 10-4

common reply codes, 10-5

configuring Exchange for other SMTP messaging systems, 10-36 to 10-52

connecting to Internet with Routing and Remote Access, 10-33

creating mailbox-enabled users, 10-46 to 10-47

defined, 10-57

DNS support, 10-9 to 10-10

domain message defaults, 10-44 to 10-46

encryption, 10-23 to 10-24

global settings features, 10-37 to 10-38

HTTP clients, 10-39 to 10-41

identifying message delivery failures, 10-27

IMAP4 clients, 10-41 to 10-42, 10-47 to 10-49

implementing SMTP connection, 10-3 to 10-5

incoming connection options, 10-21 to 10-22

installing, 2-7 to 2-8

Internet connectivity with, 10-11 to 10-12

junk e-mail prevention, 10-25 to 10-26

key terms, 10-57

mailbox defaults, 10-38 to 10-39

managing message transfer support, 10-3 to 10-20

message defaults, 10-38

MX records, 10-15 to 10-16

NNTP clients, 10-43 to 10-44

outgoing connection options, 10-22

overview, 10-1 to 10-2, 10-21, 10-36 to 10-37

POP3 clients, 10-42 to 10-43, 10-49 to 10-51

practice exercises, 10-27 to 10-34

provided by Windows Server 2003, 1-13

pulling queued e-mail from another server, 10-34

questions and answers, 10-19 to 10-20, 10-34 to 10-35, 10-51, 10-58 to 10-62

relaying, 10-12 to 10-15, 10-31 to 10-32

restricting Internet e-mail, 10-24 to 10-25, 10-30 to 10-31

retrieving mail from ISP dial-up connection, 10-26 to 10-27

reverse DNS lookup, 10-24

security and advanced options, 10-21 to 10-35

SMTP connectors, 10-11 to 10-12, 10-32 to 10-33

summary points, 10-20, 10-35, 10-51 to 10-52, 10-56

TLS encryption, 10-29 to 10-30

troubleshooting lab, 10-54 to 10-55

SMTP connectors

configuring credentials of, 10-12

configuring for only receiving or sending e-mail, 10-12

creating with Internet Mail Wizard, 10-12

implementing, 10-3 to 10-5

limiting scope of, 10-11

overriding relay settings on virtual server, 10-32 to 10-33

practice exercises, 10-17 to 10-18, 10-30

setting to only receive or send mail, 10-12

smart hosts with, 10-14

SMTP relays, 10-12 to 10-15

configuring relay host, 10-14, 10-18

defined, 10-20

forwarding unresolved messages to smart host, 10-13 to 10-14

limiting domains for, 10-14 to 10-15

overview, 10-12 to 10-13

preventing open relaying, 10-31 to 10-32

relaying mail for IMAP4 clients, 10-43

restricting servers relaying e-mail messages, 10-14

troubleshooting junk mail, 10-54 to 10-55

SMTP virtual servers

additional, 10-11

configuring, 9-14 to 9-15, 9-22 to 9-23, 9-37 to 9-38

creating, 9-21, 9-36 to 9-37

enabling protocol logging for, 11-53 to 11-54

incoming connection options for, 10-21 to 10-22

limiting domains for relay messages, 10-14 to 10-15

masquerade domains, 9-23

outgoing connection options, 10-22

overview, 9-14, 9-19

relaying mail for POP3 and IMAP4 clients, 9-40, 10-43

restricting servers relaying e-mail messages, 10-14

setting up as relay host, 10-14

summary points, 9-51

supported authentication methods, 9-43

using smart hosts, 10-13 to 10-14

software-related installation failures, 14-6

source domains, 5-46

spam. See also junk e-mail

extended periods in queues as symptom of, 13-38

junk e-mail vs., 11-22

masquerading as administrator alert, 11-18

Spam Confidence Level (SCL), 11-24

special ports, 14-38

spikes in queued messages, 13-38

SSL (Secure Sockets Layer)

benefits of front-end and back-end servers for, 3-29

combining TLS with, 10-29

enabling on POP3 virtual server, 9-6

Standard edition of Exchange Server 2003, 3-14

starting and stopping virtual servers, 9-52

static data, 12-16 to 12-17

static IP addresses, 6-10, 6-37

.stm files, 7-46, 12-4

storage area networks (SANs), 12-11 to 12-12, 12-15

storage groups. See also recovery storage groups

adding, 7-48 to 7-52, 7-54

architecture of, 7-46 to 7-47

backing up, 12-22 to 12-24

circular logging, 7-48, 7-77

creating, 12-12 to 12-13

data storage for minimizing recovery time, 12-9

defined, 7-77

dismounting, 12-13 to 12-14

managing, 12-13 to 12-14

moving, 7-52 to 7-55

multiple databases and, 7-47 to 7-48

recovery, 14-20 to 14-21, 14-63 to 14-67

support for, 6-11

storage limits

mailbox, 7-17 to 7-24, 14-19

public folder, 8-18 to 8-19

stores. See also information stores; mailbox stores; public folder stores; public stores

defragmenting, 13-36

monitoring Exchange store statistics, 13-7 to 13-8

restoring, 12-29

verifying integrity of, 13-35, 13-37, 13-40 to 13-41

strong passwords, 2-9

subnets, 9-31 to 9-32

Summary pane (Network Monitor), 13-46

SUS (Microsoft Software Update Services), 11-19

switches for Microsoft Exchange Installation Wizard, 2-19 to 2-21

synchronizing Lotus Notes with Exchange Server, 5-45

system state data

backups of, 12-36, 12-40 to 12-41

restoring, 12-36, 12-41 to 12-43




MCSA/MCSE Self-Paced Training Kit (Exam 70-284(c) Implementing and Managing Microsoft Exchange Server 2003)
MCSA/MCSE Self-Paced Training Kit (Exam 70-284): Implementing and Managing MicrosoftВ® Exchange Server 2003 (Pro-Certification)
ISBN: 0735618992
EAN: 2147483647
Year: 2003
Pages: 221

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net