List of Figures


Chapter 2: Planning a Microsoft Exchange Server 2003 Infrastructure

Figure 2-1: Enabling ASP in the IIS Manager console
Figure 2-2: Starting the ForestPrep Setup command
Figure 2-3: The Component Selection portion of Setup
Figure 2-4: Identifying the service account that will be given Exchange Full Administrator permissions
Figure 2-5: The Component Selection Page
Figure 2-6: Creating a new organization or installing into an existing organization
Figure 2-7: Defining the organization name
Figure 2-8: Confirming your installation choices
Figure 2-9: Exchange Server Per Seat licensing agreement
Figure 2-10: Tracking the progress of the installation
Figure 2-11: A Microsoft Exchange Installation Wizard error message

Chapter 3: Configuring a Microsoft Exchange Server 2003 Infrastructure

Figure 3-1: Exchange Server 2003 services
Figure 3-2: The organization's property sheet

Chapter 4: Coexistence with Microsoft Exchange Server 5.5

Figure 4-1: The ADC Tools Page
Figure 4-2: Selecting ADC components to install
Figure 4-3: Setting the server options for the ADC
Figure 4-4: The Resource Mailbox Wizard
Figure 4-5: Establishing administrative credentials for each site
Figure 4-6: Configuring a default Windows destination
Figure 4-7: Configuring connection agreements
Figure 4-8: Configuring connection agreements
Figure 4-9: Connection agreement installation summary
Figure 4-10: The Connections tab
Figure 4-11: The connection agreement schedule
Figure 4-12: Configuring replication from Exchange to Active Directory
Figure 4-13: Configuring replication from Active Directory to Exchange
Figure 4-14: Configuring deleted item replication
Figure 4-15: The Advanced tab
Figure 4-16: The ExDeploy command-line utility
Figure 4-17: Exchange Features for an Exchange Server 5.5 mailbox
Figure 4-18: Exchange Features for an Exchange Server 2003 mailbox
Figure 4-19: The graphical Exchange Server Deployment Tools
Figure 4-20: Meeting coexistence prerequisites
Figure 4-21: Exchange Server 2003 installation checklist
Figure 4-22: Active Directory Connector Diagnostics Logging
Figure 4-23: Identifying duplicate accounts
Figure 4-24: Reviewing accounts to be merged
Figure 4-25: Choosing to begin the merge or to export to a .csv file

Chapter 5: Migrating from Microsoft Exchange Server and Other Mail Systems

Figure 5-1: Choosing source and target domains for the migration
Figure 5-2: Listing all user accounts in the Users container in Active Directory
Figure 5-3: Adding user accounts to migrate
Figure 5-4: Specifying the target OU
Figure 5-5: Migrating passwords
Figure 5-6: The Account Transition Options Page
Figure 5-7: Configuring user options
Figure 5-8: Configuring object property exclusions
Figure 5-9: Configuring naming conflict settings
Figure 5-10: Selecting a migration destination
Figure 5-11: Specifying the source server
Figure 5-12: Configuring the message information to migrate
Figure 5-13: Configuring account migration options
Figure 5-14: Configuring general settings
Figure 5-15: Configuring the address space
Figure 5-16: Configuring the import container
Figure 5-17: Configuring the export containers
Figure 5-18: Configuring advanced options
Figure 5-19: Configuring directory synchronization options
Figure 5-20: Configuring delivery restrictions
Figure 5-21: Configuring the general settings for the Calendar Connector
Figure 5-22: Configuring a Calendar Connection type
Figure 5-23: Configuring a new TCP/IP X.400 transport stack
Figure 5-24: Configuring general settings for the X.400 connector
Figure 5-25: Configuring the remote X.400 name and entering its password
Figure 5-26: Configuring advanced message settings
Figure 5-27: Configuring content restrictions

Chapter 6: Installing Microsoft Exchange Server 2003 Clusters and Front-End and Back-End Servers

Figure 6-1: Creating a new cluster
Figure 6-2: Specifying the name and domain of the cluster
Figure 6-3: Analyzing cluster feasibility
Figure 6-4: The Proposed Cluster Configuration Page
Figure 6-5: The new server cluster
Figure 6-6: An Exchange Server 2003 virtual server configuration
Figure 6-7: Server node failover properties
Figure 6-8: Server node failback properties
Figure 6-9: Advanced resource properties
Figure 6-10: Configuring the resource type
Figure 6-11: Configuring the network name
Figure 6-12: The new Exchange Server 2003 virtual server
Figure 6-13: Confirming the conversion to a front-end server

Chapter 7: Managing Recipient Objects and Address Lists

Figure 7-1: Creating a mailbox
Figure 7-2: The Available Tasks page of the Exchange Task Wizard
Figure 7-3: The mail properties of the selected object
Figure 7-4: Choosing an e-mail address type
Figure 7-5: Configuring an SMTP address for a mail-enabled object
Figure 7-6: Deleting a mailbox by using the Exchange Task Wizard
Figure 7-7: Configuring the Deleted Mailbox Retention period
Figure 7-8: Reconnecting a user account to a mailbox
Figure 7-9: Hiding a recipient from the GAL
Figure 7-10: Configuring e-mail address types
Figure 7-11: Configured e-mail addresses for a recipient object
Figure 7-12: Overriding the default storage limits
Figure 7-13: Configuring storage limits at the mailbox store level
Figure 7-14: Choosing which pages display for a policy
Figure 7-15: Assigning a mailbox store policy
Figure 7-16: Searching Active Directory for mailbox stores
Figure 7-17: Policy effects on local settings
Figure 7-18: The Policies tab
Figure 7-19: Granting Send On Behalf permissions
Figure 7-20: Granting mailbox rights
Figure 7-21: Granting permissions to a user folder in Outlook
Figure 7-22: Configuring delivery restrictions for a mailbox
Figure 7-23: Using the Exchange Task Wizard to move a mailbox
Figure 7-24: Determining how to handle corrupted messages
Figure 7-25: The Microsoft Exchange Mailbox Merge Wizard
Figure 7-26: Selecting the source server
Figure 7-27: The Data Page
Figure 7-28: The Import Procedure Page
Figure 7-29: The Folders Page
Figure 7-30: The Dates Page
Figure 7-31: The Message Details Page
Figure 7-32: Selecting the destination server for the migrated mailboxes
Figure 7-33: Selecting the specific mailboxes to be migrated
Figure 7-34: Selecting a folder to store the temporary .pst files used in the migration
Figure 7-35: Selecting the address types that the LDAP query should filter for
Figure 7-36: Storage group properties
Figure 7-37: Configuring a new mailbox store
Figure 7-38: Database properties
Figure 7-39: Confirming the database move
Figure 7-40: The LDAP query for an address list
Figure 7-41: Previewing an address list
Figure 7-42: Filtering an address list by recipient type
Figure 7-43: Filtering an address list by attributes
Figure 7-44: The security properties of an address list
Figure 7-45: The Recipient Update Service Properties
Figure 7-46: The Default Offline Address List properties

Chapter 8: Public Folders

Figure 8-1: Creating a new public folder
Figure 8-2: Creating a public folder in OWA
Figure 8-3: The Folders container
Figure 8-4: Creating a public folder in Exchange System Manager
Figure 8-5: Configuring a virtual directory
Figure 8-6: Browsing the public folder tree
Figure 8-7: Configuring e-mail addresses for public folders
Figure 8-8: Configuring delivery restrictions for a public folder
Figure 8-9: The Exchange Advanced tab
Figure 8-10: The Member Of tab
Figure 8-11: The Limits tab
Figure 8-12: Configuring replication properties
Figure 8-13: Manually replicating a public folder tree
Figure 8-14: Configuring public folder referrals
Figure 8-15: Propagating public folder permissions
Figure 8-16: Configuring client permissions in Exchange System Manager
Figure 8-17: Configuring client permissions in Outlook
Figure 8-18: Configuring additional security settings
Figure 8-19: Configuring moderated folder settings

Chapter 9: Virtual Servers

Figure 9-1: The Microsoft Exchange POP3 service Properties dialog box
Figure 9-2: Configuring the default IMAP4 virtual server
Figure 9-3: Assigning a unique identity
Figure 9-4: Configuring read, write, and browse permissions
Figure 9-5: Specifying a subnet
Figure 9-6: NNTP virtual server settings
Figure 9-7: SMTP virtual server messages settings
Figure 9-8: SMTP virtual server delivery settings
Figure 9-9: Authentication options for an additional HTTP virtual server on a back-end Exchange server
Figure 9-10: Authentication options for POP3 and IMAP4 virtual servers on a back-end Exchange server
Figure 9-11: Authentication options for an NNTP virtual server
Figure 9-12: Authentication options for an SMTP virtual server
Figure 9-13: Authentication options for an Exchange virtual server on a front-end or back-end Exchange server
Figure 9-14: Authentication options for an additional HTTP virtual server on a front-end Exchange server
Figure 9-15: Authentication dialog box for a POP3 virtual server on a front-end Exchange server
Figure 9-16: Setting a diagnostic logging level
Figure 9-17: An Application event log entry for an IMAP4 virtual server

Chapter 10: SMTP Protocol Configuration and Management

Figure 10-1: Testing ESMTP connectivity
Figure 10-2: Verifying that MX records exist
Figure 10-3: Verifying that the MX record for Server01 can be resolved
Figure 10-4: The General SMTP Connector object
Figure 10-5: Verifying the SMARTHOST configuration
Figure 10-6: The Authentication Page
Figure 10-7: The Security Page
Figure 10-8: Adding prohibited users
Figure 10-9: The Relay Restrictions dialog box
Figure 10-10: Disabling OWA for an individual user
Figure 10-11: Configuring multilingual support
Figure 10-12: Accessing per-user properties for an IMAP4 user
Figure 10-13: Displaying valid entry formats

Chapter 11: Microsoft Exchange Server 2003 Security

Figure 11-1: The Rpc/HTTP NSPI port setting
Figure 11-2: The Exchange Server Settings dialog box
Figure 11-3: Configuring the ICF Advanced Settings
Figure 11-4: Setting connection filtering
Figure 11-5: Blocking e-mail from a specific user
Figure 11-6: Blocking e-mail from a domain
Figure 11-7: Allowing Authenticated Users Enroll permission so they can digitally sign and encrypt e-mail
Figure 11-8: Encryption and signature options
Figure 11-9: Configuring a limits policy
Figure 11-10: Delegating control to Don Hall
Figure 11-11: Creating the ShowSecurityPage registry entry
Figure 11-12: Granting Kim Akers permissions on all administrative groups
Figure 11-13: Scheduling logging and specifying the file location
Figure 11-14: Blocking junk-mail domains

Chapter 12: Backup and Restore

Figure 12-1: Specifying a new location for the transaction log files
Figure 12-2: Specifying what to back up
Figure 12-3: The backup log
Figure 12-4: Checking that the GatherLogs folder is empty
Figure 12-5: Setting a mailbox retention period for an individual user
Figure 12-6: Setting a mailbox retention policy
Figure 12-7: Setting the restore parameters
Figure 12-8: Recovering deleted messages
Figure 12-9: Specifying a System State restore
Figure 12-10: Specifying the advanced restore options

Chapter 13: Monitoring Microsoft Exchange Server 2003

Figure 13-1: Public folder access and logon statistics
Figure 13-2: An Event Viewer event report
Figure 13-3: The Queue Viewer utility
Figure 13-4: Setting a diagnostic logging level
Figure 13-5: Selecting an event source
Figure 13-6: MSExchangeIS mailbox store events at maximum diagnostic logging level
Figure 13-7: Specifying the virtual memory threshold levels
Figure 13-8: Specifying CPU utilization threshold levels
Figure 13-9: Configuring events to be monitored
Figure 13-10: Adding the Process(store)\% Processor Time counter
Figure 13-11: Captured data displayed in report format
Figure 13-12: Configuring Mailbox View to view storage limits
Figure 13-13: eseutil output
Figure 13-14: isinteg output
Figure 13-15: The Summary, Detail, and Hex panes in Network Monitor
Figure 13-16: Frame containing e-mail message text
Figure 13-17: Filtering out all frames except TCP frames
Figure 13-18: Filtering by IP address and direction
Figure 13-19: Specifying an address for filtering
Figure 13-20: Specifying two way traffic between Server01 and Server02

Chapter 14: Troubleshooting Microsoft Exchange Server 2003

Figure 14-1: Netdiag output
Figure 14-2: Netdiag output showing a fatal error
Figure 14-3: Running dcdiag on Server02
Figure 14-4: Output of dcdiag test on Server02
Figure 14-5: Dcdiag failure notification on Server02
Figure 14-6: Selecting a performance object, counter, and instance
Figure 14-7: Settings for the send queue alert
Figure 14-8: Granting the Create Top Level Public Folder permission
Figure 14-9: Specifying the Senior Managers global security group
Figure 14-10: The Senior Managers Properties dialog box
Figure 14-11: Specifying permissions for the Senior Managers group
Figure 14-12: Copying or deleting inherited permissions
Figure 14-13: An intercepted, unencrypted e-mail message
Figure 14-14: Selecting a certificate authority
Figure 14-15: Specifying security settings
Figure 14-16: The ARP request
Figure 14-17: The ARP reply
Figure 14-18: Resolving a remote IP address
Figure 14-19: Identifying operations masters
Figure 14-20: The ARP cache
Figure 14-21: Displaying the ARP cache for a specified interface
Figure 14-22: The ping command adds an entry to the ARP cache
Figure 14-23: Analyzing the ARP-RARP Request frame




MCSA/MCSE Self-Paced Training Kit (Exam 70-284(c) Implementing and Managing Microsoft Exchange Server 2003)
MCSA/MCSE Self-Paced Training Kit (Exam 70-284): Implementing and Managing MicrosoftВ® Exchange Server 2003 (Pro-Certification)
ISBN: 0735618992
EAN: 2147483647
Year: 2003
Pages: 221

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net