VerCheck tool, 4-24
verifying
backups, 12-22
Exchange store, 13-37
mailbox stores, 13-40 to 13-41
mailboxes, 13-35, 13-37
MX records, 10-15 to 10-16
public folder stores, 13-35
virtual directories
creating, 8-9 to 8-10
HTTP, 8-9 to 8-10, 9-12, 10-40
public folder and mailbox access in, 10-40
RPC, 11-6
setting permissions, 9-28
virtual memory fragmentation, 14-19 to 14-20, 14-25
virtual organizations, 10-3, 10-9
virtual server protocols, 9-43 to 9-44
virtual servers, 9-1 to 9-62. See also specific virtual servers
adding disk resources to, 6-25 to 6-26
additional, 9-20 to 9-21
assigning IP addresses to, 9-17 to 9-18
authentication methods, 9-41 to 9-51
calendaring settings ignored on front-end POP3 and IMAP4, 14-30
case scenario exercise, 9-54 to 9-56, 9-62
clustering and, 6-9
configuring, 9-21 to 9-23
creating, 6-19 to 6-20, 6-23
defined, 6-31, 6-37
diagnostic logging, 9-53, 9-56 to 9-59, 14-28
enabling and starting, 9-15 to 9-16
front-end and back-end configuration, 9-23 to 9-24
HTTP, 9-11 to 9-13, 9-19, 9-21, 9-26 to 9-29
icons indicating stop or pause in service, 9-17
IMAP4, 9-7 to 9-8, 9-16 to 9-17, 9-19, 9-21 to 9-22, 9-33
Internet protocol, 9-59
key terms, 9-59
maintaining, 9-52 to 9-54
in network load balancing environment, 9-4
NNTP, 9-8 to 9-10, 9-16 to 9-17, 9-19, 9-22, 9-33 to 9-36
overriding relay settings with SMTP connectors, 10-32 to 10-33
overview, 9-1
POP3, 9-5 to 9-7, 9-16 to 9-17, 9-19, 9-21 to 9-22, 9-30 to 9-32
practice exercises, 9-15 to 9-18, 9-25 to 9-39, 9-44 to 9-50
questions and answers, 9-19, 9-39 to 9-40, 9-50 to 9-51, 9-53 to 9-54, 9-60 to 9-62
resource requirements and dependencies for, 9-4 to 9-5
SMTP, 9-14 to 9-15, 9-19, 9-22 to 9-23, 9-36 to 9-38, 10-11, 10-21 to 10-22
starting and stopping servers, 9-52
summary points, 9-19, 9-40, 9-51, 9-54, 9-58 to 9-59
troubleshooting lab, 9-56 to 9-58
in Windows clustering environment, 9-3
virus protection, 11-12 to 11-21
antivirus software, 11-14 to 11-16
downloading antivirus software, 11-20
questions and answers, 11-20 to 11-21, 11-63 to 11-64
security updates, 11-18 to 11-19
sensible precautions against, 11-12
spam sent as administrator alert, 11-18
strategies for, 11-13 to 11-15, 14-38
summary points, 11-21
types of, 11-12 to 11-13
virus transmission, 11-13
virus-clean policies and procedures, 11-16 to 11-17
virus signatures, 11-19
viruses, 11-12 to 11-13, 11-62
VMWare, 10-2
vrfy command, 10-6 to 10-7
VSS (Volume Shadow Copy Service), 12-20 to 12-21, 12-24, 12-50