Flylib.com
List of Figures
Previous page
Table of content
Next page
Chapter 2: Planning a Microsoft Exchange Server 2003 Infrastructure
Figure 2-1: Enabling ASP in the IIS Manager console
Figure 2-2: Starting the ForestPrep Setup command
Figure 2-3: The Component Selection portion of Setup
Figure 2-4: Identifying the service account that will be given Exchange Full Administrator permissions
Figure 2-5: The Component Selection Page
Figure 2-6: Creating a new organization or installing into an existing organization
Figure 2-7: Defining the organization name
Figure 2-8: Confirming your installation choices
Figure 2-9: Exchange Server Per Seat licensing agreement
Figure 2-10: Tracking the progress of the installation
Figure 2-11: A Microsoft Exchange Installation Wizard error message
Chapter 3: Configuring a Microsoft Exchange Server 2003 Infrastructure
Figure 3-1: Exchange Server 2003 services
Figure 3-2: The organization's property sheet
Chapter 4: Coexistence with Microsoft Exchange Server 5.5
Figure 4-1: The ADC Tools Page
Figure 4-2: Selecting ADC components to install
Figure 4-3: Setting the server options for the ADC
Figure 4-4: The Resource Mailbox Wizard
Figure 4-5: Establishing administrative credentials for each site
Figure 4-6: Configuring a default Windows destination
Figure 4-7: Configuring connection agreements
Figure 4-8: Configuring connection agreements
Figure 4-9: Connection agreement installation summary
Figure 4-10: The Connections tab
Figure 4-11: The connection agreement schedule
Figure 4-12: Configuring replication from Exchange to Active Directory
Figure 4-13: Configuring replication from Active Directory to Exchange
Figure 4-14: Configuring deleted item replication
Figure 4-15: The Advanced tab
Figure 4-16: The ExDeploy command-line utility
Figure 4-17: Exchange Features for an Exchange Server 5.5 mailbox
Figure 4-18: Exchange Features for an Exchange Server 2003 mailbox
Figure 4-19: The graphical Exchange Server Deployment Tools
Figure 4-20: Meeting coexistence prerequisites
Figure 4-21: Exchange Server 2003 installation checklist
Figure 4-22: Active Directory Connector Diagnostics Logging
Figure 4-23: Identifying duplicate accounts
Figure 4-24: Reviewing accounts to be merged
Figure 4-25: Choosing to begin the merge or to export to a .csv file
Chapter 5: Migrating from Microsoft Exchange Server and Other Mail Systems
Figure 5-1: Choosing source and target domains for the migration
Figure 5-2: Listing all user accounts in the Users container in Active Directory
Figure 5-3: Adding user accounts to migrate
Figure 5-4: Specifying the target OU
Figure 5-5: Migrating passwords
Figure 5-6: The Account Transition Options Page
Figure 5-7: Configuring user options
Figure 5-8: Configuring object property exclusions
Figure 5-9: Configuring naming conflict settings
Figure 5-10: Selecting a migration destination
Figure 5-11: Specifying the source server
Figure 5-12: Configuring the message information to migrate
Figure 5-13: Configuring account migration options
Figure 5-14: Configuring general settings
Figure 5-15: Configuring the address space
Figure 5-16: Configuring the import container
Figure 5-17: Configuring the export containers
Figure 5-18: Configuring advanced options
Figure 5-19: Configuring directory synchronization options
Figure 5-20: Configuring delivery restrictions
Figure 5-21: Configuring the general settings for the Calendar Connector
Figure 5-22: Configuring a Calendar Connection type
Figure 5-23: Configuring a new TCP/IP X.400 transport stack
Figure 5-24: Configuring general settings for the X.400 connector
Figure 5-25: Configuring the remote X.400 name and entering its password
Figure 5-26: Configuring advanced message settings
Figure 5-27: Configuring content restrictions
Chapter 6: Installing Microsoft Exchange Server 2003 Clusters and Front-End and Back-End Servers
Figure 6-1: Creating a new cluster
Figure 6-2: Specifying the name and domain of the cluster
Figure 6-3: Analyzing cluster feasibility
Figure 6-4: The Proposed Cluster Configuration Page
Figure 6-5: The new server cluster
Figure 6-6: An Exchange Server 2003 virtual server configuration
Figure 6-7: Server node failover properties
Figure 6-8: Server node failback properties
Figure 6-9: Advanced resource properties
Figure 6-10: Configuring the resource type
Figure 6-11: Configuring the network name
Figure 6-12: The new Exchange Server 2003 virtual server
Figure 6-13: Confirming the conversion to a front-end server
Chapter 7: Managing Recipient Objects and Address Lists
Figure 7-1: Creating a mailbox
Figure 7-2: The Available Tasks page of the Exchange Task Wizard
Figure 7-3: The mail properties of the selected object
Figure 7-4: Choosing an e-mail address type
Figure 7-5: Configuring an SMTP address for a mail-enabled object
Figure 7-6: Deleting a mailbox by using the Exchange Task Wizard
Figure 7-7: Configuring the Deleted Mailbox Retention period
Figure 7-8: Reconnecting a user account to a mailbox
Figure 7-9: Hiding a recipient from the GAL
Figure 7-10: Configuring e-mail address types
Figure 7-11: Configured e-mail addresses for a recipient object
Figure 7-12: Overriding the default storage limits
Figure 7-13: Configuring storage limits at the mailbox store level
Figure 7-14: Choosing which pages display for a policy
Figure 7-15: Assigning a mailbox store policy
Figure 7-16: Searching Active Directory for mailbox stores
Figure 7-17: Policy effects on local settings
Figure 7-18: The Policies tab
Figure 7-19: Granting Send On Behalf permissions
Figure 7-20: Granting mailbox rights
Figure 7-21: Granting permissions to a user folder in Outlook
Figure 7-22: Configuring delivery restrictions for a mailbox
Figure 7-23: Using the Exchange Task Wizard to move a mailbox
Figure 7-24: Determining how to handle corrupted messages
Figure 7-25: The Microsoft Exchange Mailbox Merge Wizard
Figure 7-26: Selecting the source server
Figure 7-27: The Data Page
Figure 7-28: The Import Procedure Page
Figure 7-29: The Folders Page
Figure 7-30: The Dates Page
Figure 7-31: The Message Details Page
Figure 7-32: Selecting the destination server for the migrated mailboxes
Figure 7-33: Selecting the specific mailboxes to be migrated
Figure 7-34: Selecting a folder to store the temporary .pst files used in the migration
Figure 7-35: Selecting the address types that the LDAP query should filter for
Figure 7-36: Storage group properties
Figure 7-37: Configuring a new mailbox store
Figure 7-38: Database properties
Figure 7-39: Confirming the database move
Figure 7-40: The LDAP query for an address list
Figure 7-41: Previewing an address list
Figure 7-42: Filtering an address list by recipient type
Figure 7-43: Filtering an address list by attributes
Figure 7-44: The security properties of an address list
Figure 7-45: The Recipient Update Service Properties
Figure 7-46: The Default Offline Address List properties
Chapter 8: Public Folders
Figure 8-1: Creating a new public folder
Figure 8-2: Creating a public folder in OWA
Figure 8-3: The Folders container
Figure 8-4: Creating a public folder in Exchange System Manager
Figure 8-5: Configuring a virtual directory
Figure 8-6: Browsing the public folder tree
Figure 8-7: Configuring e-mail addresses for public folders
Figure 8-8: Configuring delivery restrictions for a public folder
Figure 8-9: The Exchange Advanced tab
Figure 8-10: The Member Of tab
Figure 8-11: The Limits tab
Figure 8-12: Configuring replication properties
Figure 8-13: Manually replicating a public folder tree
Figure 8-14: Configuring public folder referrals
Figure 8-15: Propagating public folder permissions
Figure 8-16: Configuring client permissions in Exchange System Manager
Figure 8-17: Configuring client permissions in Outlook
Figure 8-18: Configuring additional security settings
Figure 8-19: Configuring moderated folder settings
Chapter 9: Virtual Servers
Figure 9-1: The Microsoft Exchange POP3 service Properties dialog box
Figure 9-2: Configuring the default IMAP4 virtual server
Figure 9-3: Assigning a unique identity
Figure 9-4: Configuring read, write, and browse permissions
Figure 9-5: Specifying a subnet
Figure 9-6: NNTP virtual server settings
Figure 9-7: SMTP virtual server messages settings
Figure 9-8: SMTP virtual server delivery settings
Figure 9-9: Authentication options for an additional HTTP virtual server on a back-end Exchange server
Figure 9-10: Authentication options for POP3 and IMAP4 virtual servers on a back-end Exchange server
Figure 9-11: Authentication options for an NNTP virtual server
Figure 9-12: Authentication options for an SMTP virtual server
Figure 9-13: Authentication options for an Exchange virtual server on a front-end or back-end Exchange server
Figure 9-14: Authentication options for an additional HTTP virtual server on a front-end Exchange server
Figure 9-15: Authentication dialog box for a POP3 virtual server on a front-end Exchange server
Figure 9-16: Setting a diagnostic logging level
Figure 9-17: An Application event log entry for an IMAP4 virtual server
Chapter 10: SMTP Protocol Configuration and Management
Figure 10-1: Testing ESMTP connectivity
Figure 10-2: Verifying that MX records exist
Figure 10-3: Verifying that the MX record for Server01 can be resolved
Figure 10-4: The General SMTP Connector object
Figure 10-5: Verifying the SMARTHOST configuration
Figure 10-6: The Authentication Page
Figure 10-7: The Security Page
Figure 10-8: Adding prohibited users
Figure 10-9: The Relay Restrictions dialog box
Figure 10-10: Disabling OWA for an individual user
Figure 10-11: Configuring multilingual support
Figure 10-12: Accessing per-user properties for an IMAP4 user
Figure 10-13: Displaying valid entry formats
Chapter 11: Microsoft Exchange Server 2003 Security
Figure 11-1: The Rpc/HTTP NSPI port setting
Figure 11-2: The Exchange Server Settings dialog box
Figure 11-3: Configuring the ICF Advanced Settings
Figure 11-4: Setting connection filtering
Figure 11-5: Blocking e-mail from a specific user
Figure 11-6: Blocking e-mail from a domain
Figure 11-7: Allowing Authenticated Users Enroll permission so they can digitally sign and encrypt e-mail
Figure 11-8: Encryption and signature options
Figure 11-9: Configuring a limits policy
Figure 11-10: Delegating control to Don Hall
Figure 11-11: Creating the ShowSecurityPage registry entry
Figure 11-12: Granting Kim Akers permissions on all administrative groups
Figure 11-13: Scheduling logging and specifying the file location
Figure 11-14: Blocking junk-mail domains
Chapter 12: Backup and Restore
Figure 12-1: Specifying a new location for the transaction log files
Figure 12-2: Specifying what to back up
Figure 12-3: The backup log
Figure 12-4: Checking that the GatherLogs folder is empty
Figure 12-5: Setting a mailbox retention period for an individual user
Figure 12-6: Setting a mailbox retention policy
Figure 12-7: Setting the restore parameters
Figure 12-8: Recovering deleted messages
Figure 12-9: Specifying a System State restore
Figure 12-10: Specifying the advanced restore options
Chapter 13: Monitoring Microsoft Exchange Server 2003
Figure 13-1: Public folder access and logon statistics
Figure 13-2: An Event Viewer event report
Figure 13-3: The Queue Viewer utility
Figure 13-4: Setting a diagnostic logging level
Figure 13-5: Selecting an event source
Figure 13-6: MSExchangeIS mailbox store events at maximum diagnostic logging level
Figure 13-7: Specifying the virtual memory threshold levels
Figure 13-8: Specifying CPU utilization threshold levels
Figure 13-9: Configuring events to be monitored
Figure 13-10: Adding the Process(store)\% Processor Time counter
Figure 13-11: Captured data displayed in report format
Figure 13-12: Configuring Mailbox View to view storage limits
Figure 13-13: eseutil output
Figure 13-14: isinteg output
Figure 13-15: The Summary, Detail, and Hex panes in Network Monitor
Figure 13-16: Frame containing e-mail message text
Figure 13-17: Filtering out all frames except TCP frames
Figure 13-18: Filtering by IP address and direction
Figure 13-19: Specifying an address for filtering
Figure 13-20: Specifying two way traffic between Server01 and Server02
Chapter 14: Troubleshooting Microsoft Exchange Server 2003
Figure 14-1: Netdiag output
Figure 14-2: Netdiag output showing a fatal error
Figure 14-3: Running dcdiag on Server02
Figure 14-4: Output of dcdiag test on Server02
Figure 14-5: Dcdiag failure notification on Server02
Figure 14-6: Selecting a performance object, counter, and instance
Figure 14-7: Settings for the send queue alert
Figure 14-8: Granting the Create Top Level Public Folder permission
Figure 14-9: Specifying the Senior Managers global security group
Figure 14-10: The Senior Managers Properties dialog box
Figure 14-11: Specifying permissions for the Senior Managers group
Figure 14-12: Copying or deleting inherited permissions
Figure 14-13: An intercepted, unencrypted e-mail message
Figure 14-14: Selecting a certificate authority
Figure 14-15: Specifying security settings
Figure 14-16: The ARP request
Figure 14-17: The ARP reply
Figure 14-18: Resolving a remote IP address
Figure 14-19: Identifying operations masters
Figure 14-20: The ARP cache
Figure 14-21: Displaying the ARP cache for a specified interface
Figure 14-22: The ping command adds an entry to the ARP cache
Figure 14-23: Analyzing the ARP-RARP Request frame
Previous page
Table of content
Next page
MCSA/MCSE Self-Paced Training Kit (Exam 70-284): Implementing and Managing MicrosoftВ® Exchange Server 2003 (Pro-Certification)
ISBN: 0735618992
EAN: 2147483647
Year: 2003
Pages: 221
Authors:
Will Willis
,
Ian McLean
BUY ON AMAZON
Agile Project Management: Creating Innovative Products (2nd Edition)
Champion Technical Excellence
Principles to Practices
Phase: Adapt
Project Size
Progress
Metrics and Models in Software Quality Engineering (2nd Edition)
Total Quality Management
Criteria for Causality
Test Compression Factor
Availability Metrics
1 Definition and Measurements of System Availability
Software Configuration Management
Configuration Identification
Configuration Status Accounting
Configuration Change Management
CM Automation
Appendix G Sample Inspection Plan
SQL Hacks
Hack 6. Dont Perform the Same Calculation Over and Over
Text Handling
Hack 23. Second Tuesday of the Month
Hack 26. Include the Rows Your JOIN Forgot
Hack 48. Prevent an SQL Injection Attack
Cisco CallManager Fundamentals (2nd Edition)
The Three Responsibilities of Call Routing
Overview of Circuit-Switched Interfaces
Summary
Understanding Field Data in CMRs
SCCP Call Signaling
Digital Character Animation 3 (No. 3)
Chapter Two. Modeling Characters
The Mechanics of Walking
Beyond Walking
Acting Vs. Animating
Acting and the Body
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies