target domains, 5-46
Task Manager, function of, 13-5
tasks after Exchange Server installation
delegating administrative authority, 3-5 to 3-6, 3-9 to 3-10, 3-36
modifying services, 3-9
practice exercises, 3-8 to 3-10
questions and answers, 3-10 to 3-11, 3-37 to 3-38
service dependencies, 3-4 to 3-5, 3-36
service logon accounts, 3-5
services added in typical installation, 3-2 to 3-3
stopping services prior to rebooting, 3-5
summary points, 3-12
TCP port filtering, 11-4 to 11-5
TCP/IP X.400 Service Transport Stack, 5-33 to 5-34
teaming, 6-7
telnet, 10-27, 14-30
test output files, 14-11
testing server with dcdiag utility, 14-13
TLS (Transport Layer Security) encryption
about, 9-15, 10-24
configuring, 10-29 to 10-30
requiring clients to use, 10-29
troubleshooting, 14-40 to 14-41
Tmp.edb file, 7-47
top-level folders, 8-39
tracert command-line utility, 14-55
transaction logs, 7-49 to 7-50, 7-77, 12-50. See also circular logging
ACID properties of files, 12-9
circular logging, 12-9 to 12-10, 12-50
defined, 12-50
hard recovery, 12-8 to 12-9
loss of files, 12-9
RAID configurations for storing, 12-7 to 12-8
summary points, 12-49
Transport Layer Security (TLS) encryption. See TLS (Transport Layer Security) encryption
trial restores, 12-37
Trojan horse, 11-13, 11-62
troubleshooting, 14-1 to 14-73
Active Directory, 4-34 to 4-42, 14-51 to 14-52
analyzing ARP packet, 14-58 to 14-59
backing up and restoring servers, 14-20 to 14-21
case scenario exercise, 14-60 to 14-63, 14-71 to 14-73
checking e-mail encryption, 14-41 to 14-44
configuring mailbox queue alert, 14-21 to 14-23
connectivity problems, 14-8, 14-30, 14-36 to 14-39
data storage, 14-18 to 14-19
diagnostic logging for virtual servers, 14-28
DNS, 14-48 to 14-51
encryption and digital signatures, 14-40 to 14-41
extended periods in queues, 13-38
forcing component installation in Setup, 2-21
front-end and back-end server configurations, 14-29 to 14-30
Groups, 14-51
handling corrupted e-mail messages, 7-30
hardware and software requirements, 14-2 to 14-3
host resolution, 14-45 to 14-48
identifying message delivery failures, 10-27
incorrect encoding and relaying, 14-29
Information Store service transaction logs, 7-49
installation failures, 14-4 to 14-7
interoperability, 14-9 to 14-10
key terms, 14-67
managing ARP cache, 14-56 to 14-58
migration and interoperability, 14-8 to 14-9
monitoring server performance, 14-16 to 14-18
netdiag and dcdiag for, 14-10 to 14-14
network connectivity, 14-52 to 14-56
organizations, 14-26 to 14-35
overview, 14-1 to 14-2
permissions problems, 14-39 to 14-40, 14-44
public folders, 14-26 to 14-27, 14-31 to 14-34
questions and answers, 4-41 to 4-42, 4-49, 14-14 to 14-15, 14-24, 14-34 to 14-35, 14-44, 14-59 to 14-60, 14-68 to 14-73
removing Exchange Server 2003 server, 14-7 to 14-8
security, 14-36 to 14-44
servers, 14-16 to 14-25
setting mailbox and public store policies, 14-19
situations indicating mailbox needs integrity check, 13-37
summary points, 4-42, 14-15, 14-25, 14-35, 14-44, 14-60
TLS encryption, 14-40 to 14-41
troubleshooting lab, 14-63 to 14-66
unexpected timeouts during large downloads, 9-24
virtual memory fragmentation in clusters, 14-19 to 14-20, 14-25
Windows Server 2003 technologies, 14-45 to 14-60
troubleshooting labs
blocking junk e-mail, 11-58 to 11-60
Microsoft Exchange Server 5.5, 4-44 to 4-45
migrating to Exchange Server, 5-43 to 5-44
with Network Monitor, 13-44 to 13-50
public folders, 8-36 to 8-37
recipient objects and address lists, 7-75 to 7-76
reconfiguring recovery server, 12-48 to 12-49
for removing Exchange Server, 2-44 to 2-45
setting diagnostic level and reading log, 9-56 to 9-58
setting mail relaying restrictions, 10-54 to 10-55
troubleshooting, 14-63 to 14-66
using Network Monitor, 13-44 to 13-50
virtual servers, 9-56 to 9-58
trust between migrating domains, 5-14 to 5-15