List of Figures

 < Day Day Up > 



Chapter 1: A Brief History of Exchange

Figure 1.1: Exchange and Windows timelines.
Figure 1.2: Membership of the Exchange Domain Servers group.
Figure 1.3: ExDeploy.

Chapter 2: Exchange and the Active Directory

Figure 2.1: The contents of the Active Directory.
Figure 2.2: Windows NT and AD namespaces.
Figure 2.3: AD forest and trees.
Figure 2.4: Active Directory USNs.
Figure 2.5: Exchange routing information in the configuration NC.
Figure 2.6: Setting the Global Catalog property for a DC.
Figure 2.7: Server USN.
Figure 2.8: Windows domains, sites, and the network.
Figure 2.9: Connection object schedule.
Figure 2.10: Exchange 5.5 data replicated to the Active Directory.
Figure 2.11: Configuring a connection agreement.
Figure 2.12: Determining the type of connection agreement.
Figure 2.13: Specifying target containers for a bidirectional connection agreement.
Figure 2.14: Adding multiple Exchange sites to a connection agreement.
Figure 2.15: Setting a schedule for a connection agreement.
Figure 2.16: Configuring an interorganizational CA.
Figure 2.17: LegacyExchangeDN values for a user and an administrative group.
Figure 2.18: Directory access property page.
Figure 2.19: Setting diagnostics for DSAccess.
Figure 2.20: Event 2080-DSAccess suitability report.
Figure 2.21: Outlook connections to Exchange.
Figure 2.22: Outlook 2002 has problems talking with a GC.
Figure 2.23: Enabling the GC cache.
Figure 2.24: Checking the schema version.
Figure 2.25: The Exchange configuration container.
Figure 2.26: Using AD Sites and Services to view configuration data.
Figure 2.27: Viewing Exchange attributes in the AD schema.
Figure 2.28: Ambiguous names detected by Outlook Web Access.
Figure 2.29: Where to enable ANR resolution for a selected attribute.
Figure 2.30: Extended AD permissions used by Exchange.
Figure 2.31: Migration wizard options.
Figure 2.32: The Exchange Migration wizard in action.
Figure 2.33: A successful migration.
Figure 2.34: Email addresses.
Figure 2.35: Adding the ADSIEDIT snap-in to a console.
Figure 2.36: Connecting ADSIEDIT to a naming context.
Figure 2.37: The ADSIEDIT utility.
Figure 2.38: Schema and configuration naming contexts.
Figure 2.39: Using ADSIEDIT to view properties of a user object.
Figure 2.40: LDP utility.

Chapter 3: Exchange Basics

Figure 3.1: Contents of the Microsoft Exchange AD container.
Figure 3.2: Mailbox permissions.
Figure 3.3: Permissions on an Exchange organization.
Figure 3.4: A highly permissioned account.
Figure 3.5: Delegating control over an administrative group.
Figure 3.6: Running the Delegation wizard.
Figure 3.7: Examining permissions after delegation.
Figure 3.8: A system policy applied to multiple stores.
Figure 3.9: A site is an administrative group and a routing group.
Figure 3.10: Mixed-mode exchange.
Figure 3.11: Properties of an organization.
Figure 3.12: Adding a new administrative group.
Figure 3.13: Displaying administrative groups.
Figure 3.14: Information Store service logs on as LocalSystem.
Figure 3.15: Multiple routing groups operating within an administrative group.
Figure 3.16: Separating routing into a specific administrative group.
Figure 3.17: Creating a new mailbox.
Figure 3.18: Exchange 2003 Features Property page.
Figure 3.19: Exchange 2000 Advanced Properties.
Figure 3.20: Exchange Tasks added to the AD context-sensitive menu.
Figure 3.21: The Exchange Tasks wizard.
Figure 3.22: Hidden group membership.
Figure 3.23: The Exchange 2003 Move Mailbox wizard.
Figure 3.24: Moving mailboxes.
Figure 3.25: Viewing Task wizard reports.
Figure 3.26: General properties of a Windows group.
Figure 3.27: Viewing group membership.
Figure 3.28: Details of a list maintainer and its PF repository.
Figure 3.29: Sample ONDL output.
Figure 3.30: Properties of a distribution group.
Figure 3.31: Limiting a group to authenticated users only.
Figure 3.32: LDIFDE output for a query-based group.
Figure 3.33: Creating a new query-based distribution group.
Figure 3.34: Setting query parameters.
Figure 3.35: Previewing the results of the query.
Figure 3.36: Setting values for custom properties.
Figure 3.37: Viewing a query-based distribution group from the GAL.

Chapter 4: Outlook-The Client

Figure 4.1: Details of a MAPI profile.
Figure 4.2: Outlook authentication modes.
Figure 4.3: Outlook 2003 interface.
Figure 4.4: Configuring Outlook 2003 to use RPC over HTTP.
Figure 4.5: Outlook options to compress graphics.
Figure 4.6: Setting up cached Exchange mode for Outlook 2003.
Figure 4.7: Outlook progress bar and Exchange connection types.
Figure 4.8: Using the OAB as the preferred address book provider.
Figure 4.9: The OST is unicode.
Figure 4.10: Reviewing an item in conflict.
Figure 4.11: Some items that Outlook had a problem with.
Figure 4.12: Enabling mail logging.
Figure 4.13: Examining the version number of the MAPI provider.
Figure 4.14: Viewing the MAPI client version of connected users.
Figure 4.15: Blocking a range of MAPI clients.
Figure 4.16: Disabling user access to specific protocols.
Figure 4.17: Using ADSIEDIT to discover a LegacyExchangeDN.
Figure 4.18: Junk mail options.
Figure 4.19: Adding a message to the Blocked Senders list.
Figure 4.20: Blocked Senders list.
Figure 4.21: Checking a suspected Outlook message for spam.
Figure 4.22: Creating a rule from a message.
Figure 4.23: Viewing details of a user in the OAB.
Figure 4.24: Options to download the OAB.
Figure 4.25: OAB local files.
Figure 4.26: OAB properties via ESM.
Figure 4.27: The OAB public folder.
Figure 4.28: OAB replica synchronization.
Figure 4.29: System folders for free and busy information.
Figure 4.30: Controlling how Outlook publishes free and busy information.
Figure 4.31: Properties of a PST.
Figure 4.32: Selecting personal folders as the mail delivery location.
Figure 4.33: Changing the properties of a PST.
Figure 4.34: Archiving an Outlook folder.
Figure 4.35: Outlook 2002 auto-archive options.
Figure 4.36: Adding a favorite public folder to the offline store.
Figure 4.37: Telling Outlook 2000 to use the local calendar.
Figure 4.38: The result of scanning an offline store.
Figure 4.39: Checking for OST errors.

Chapter 5: Outlook Web Access

Figure 5.1: Outlook Web Access architecture.
Figure 5.2: Applying a view to a large public folder.
Figure 5.3: Outlook Web Access and IE6 (Exchange 2000).
Figure 5.4: Outlook Web Access and IE6 (Exchange 2003).
Figure 5.5: Setting up a Blocked Senders list with OWA.
Figure 5.6: Signed and encrypted OWA email.
Figure 5.7: IE6 runs the reach interface (Exchange 2003).
Figure 5.8: OWA spell checking.
Figure 5.9: OWA subscriptions.
Figure 5.10: Enabling forms- based authentication.
Figure 5.11: OWALOGON.ASP properties.
Figure 5.12: Working with rules in OWA 2003.
Figure 5.13: OWA and Web beacons.
Figure 5.14: User interface to control how OWA handles external content.
Figure 5.15: Exchange IIS applications.
Figure 5.16: Viewing Exchange IIS application properties from ESM.
Figure 5.17: Properties of the IIS Exchange application.
Figure 5.18: Changing the content expiration timeout for OWA.
Figure 5.19: Adding a performance counter for OWA operations.
Figure 5.20: Accessing an item with a URL.
Figure 5.21: Creating unique URLs for duplicate item names.
Figure 5.22: Viewing the deleted items cache for a folder.
Figure 5.23: Branded OWA.
Figure 5.24: Basic layout of OWA access through a firewall.
Figure 5.25: OWA expiration dates for attachments.
Figure 5.26: IE6 enhanced security and OWA logon.

Chapter 6: Internet and Other Clients

Figure 6.1: Outlook Express.
Figure 6.2: Configuring IMAP access to Exchange.
Figure 6.3: Outlook Express rules processing.
Figure 6.4: The Squirrel IMAP client connected to Exchange 2003.
Figure 6.5: Properties of an IMAP virtual server (part 1).
Figure 6.6: Properties of an IMAP virtual server (part 2).
Figure 6.7: Details of connected IMAP clients.
Figure 6.8: Configuring access to the Active Directory.
Figure 6.9: Executing an LDAP search against Active Directory.
Figure 6.10: Global settings for Mobile Services.
Figure 6.11: Controlling OMA access.
Figure 6.12: Properties of the OMA Web application.
Figure 6.13: The Smartphone interface
Figure 6.14: OMA running on IE6.
Figure 6.15: ActiveSync synchronization settings.
Figure 6.16: Synchronization conflict.
Figure 6.17: Synchronization rules.
Figure 6.18: Synchronization settings.
Figure 6.19: User properties from BES.
Figure 6.20: Setting BlackBerry filters.
Figure 6.21: Formatted SMTP message.

Chapter 7: The Store

Figure 7.1: The structure of the Store.
Figure 7.2: The B-tree structure within an ESE database.
Figure 7.3: How Outlook accesses database tables.
Figure 7.4: Creating search folders.
Figure 7.5: Search folders.
Figure 7.6: Header dump from a checkpoint file.
Figure 7.7: Viewing the storage group prefix.
Figure 7.8: A set of transaction logs.
Figure 7.9: Select new location for transaction logs.
Figure 7.10: Data in a transaction log.
Figure 7.11: Editing a transaction log with Notepad.
Figure 7.12: Dumping the header of a transaction log.
Figure 7.13: Transaction log checksum failure.
Figure 7.14: Enabling circular logging for a storage group.
Figure 7.15: Monitoring SIS on an Exchange 2000 server.
Figure 7.16: No sharing at all!
Figure 7.17: Storage groups.
Figure 7.18: The option to dismount a Store.
Figure 7.19: Do not mount a Store at startup.
Figure 7.20: Storage naming convention.
Figure 7.21: Creating a new storage group from ESM.
Figure 7.22: Specifying details of a new storage group.
Figure 7.23: Viewing database locations for a new Store.
Figure 7.24: Warning before moving a database.
Figure 7.25: Error 475 precedes a potential -1018.
Figure 7.26: Result of online defragmentation.
Figure 7.27: ESEUTIL succeeds in a database defragmentation.
Figure 7.28: How many items can you hold in a public folder?
Figure 7.29: Viewing the contents of a large public folder.
Figure 7.30: A well-laid-out PF hierarchy.
Figure 7.31: Creating a new calendar folder from Outlook.
Figure 7.32: TLH properties.
Figure 7.33: Replication for the Schedule+ free/busy folder.
Figure 7.34: PFTREE.
Figure 7.35: Outlook Folders utility.
Figure 7.36: Mail-enabling a public folder.
Figure 7.37: Public folder favorites.
Figure 7.38: Setting a deleted item retention period.
Figure 7.39: Setting administrative permissions on a public folder.
Figure 7.40: Controlling public folder access from Outlook.
Figure 7.41: Viewing public folder replication status.
Figure 7.42: Pushing a new public folder replica.
Figure 7.43: Selective public folder referrals.
Figure 7.44: Public folder replication schedules.
Figure 7.45: Send public folder contents.
Figure 7.46: Adjusting diagnostics for public folder replication.
Figure 7.47: Typical replication events.
Figure 7.48: Public folders in the AD.
Figure 7.49: ExIFS architecture.
Figure 7.50: Viewing the same items through Windows Explorer and Outlook Express.
Figure 7.51: Listing an Exchange mailbox folder with the DOS DIR command.
Figure 7.52: Example output from DOS TYPE command (Outlook Express 6.0).

Chapter 8: Performance and Clusters

Figure 8.1: Memory used by the Store.
Figure 8.2: Exchange reports nonoptimal memory.
Figure 8.3: Snapshots and clones.
Figure 8.4: Resource dependency.
Figure 8.5: Cluster groups and resources.
Figure 8.6: The cluster quorum.
Figure 8.7: Exchange cluster resource models.
Figure 8.8: Allocating resources to mount a database, and a failure.
Figure 8.9: Monitoring virtual memory.

Chapter 9: Getting the Mail through-Routing and Message Delivery

Figure 9.1: A DSN displayed by Outlook 2002.
Figure 9.2: Extended SMTP commands supported by Exchange.
Figure 9.3: Dependencies of the SMTP service.
Figure 9.4: Editing the IIS metabase to change an SMTP banner.
Figure 9.5: The SMTP banner is successfully changed.
Figure 9.6: The Exchange transport core.
Figure 9.7: SMTP VS "Messages" properties (Exchange 2003).
Figure 9.8: SMTP messages that cannot be processed.
Figure 9.9: Messages waiting to go.
Figure 9.10: Viewing queues-Exchange 2000.
Figure 9.11: The Exchange 2003 queue viewer.
Figure 9.12: Search message queues.
Figure 9.13: Properties of a queue.
Figure 9.14: Examining a queue.
Figure 9.15: Properties of a message on a queue.
Figure 9.16: SMTP error in the system event log.
Figure 9.17: Defining a routing master.
Figure 9.18: Creating a new routing group.
Figure 9.19: Duplicate routing groups.
Figure 9.20: Properties of the new routing group.
Figure 9.21: Error when moving a server to a routing group.
Figure 9.22: A defunct routing group awaits deletion.
Figure 9.23: Extract from SMTP log file.
Figure 9.24: Exchange 5.5 routing calculation.
Figure 9.25: Link state routing and network outages.
Figure 9.26: Taking a snapshot of the routing environment.
Figure 9.27: Improved naming conventions.
Figure 9.28: Examining the headers of a message.
Figure 9.29: General properties of a routing group connector.
Figure 9.30: Remote bridgehead server for an RGC.
Figure 9.31: Delivery options for an RGC.
Figure 9.32: Routing group connectors.
Figure 9.33: General properties of an SMTP connector.
Figure 9.34: Specifying the address space for an SMTP connector.
Figure 9.35: Advanced properties of the SMTP connector.
Figure 9.36: Limiting users on an SMTP connector.
Figure 9.37: General properties of an X.400 connector.
Figure 9.38: Installing a new X.400 transport stack.
Figure 9.39: Setting stack properties for an X.400 connector.
Figure 9.40: Defining an address space for an X.400 connector.
Figure 9.41: Advanced properties of an X.400 connector.
Figure 9.42: The WinRoute utility.
Figure 9.43: Details exposed by WinRoute.
Figure 9.44: Enabling logging for the default SMTP virtual server.
Figure 9.45: Extended properties for an SMTP log.
Figure 9.46: Examining an SMTP log file.
Figure 9.47: SMTP archive registry entries.
Figure 9.48: Reading SMTP archived messages.
Figure 9.49: Disabling the SMTP archive sink.
Figure 9.50: Internet message formats.
Figure 9.51: Message Format properties for a typical UNIX domain.
Figure 9.52: A selection of Internet message formats used at HP.
Figure 9.53: Message delivery properties.
Figure 9.54: Setting relay restrictions.
Figure 9.55: Setting relay permissions.
Figure 9.56: Blocking users on an Exchange 2000 server.
Figure 9.57: Exchange 2000: applying a filter.
Figure 9.58: Sample filtered message.
Figure 9.59: Defining a connection filter.
Figure 9.60: Configuring RBL response codes.
Figure 9.61: Configuring an exception.
Figure 9.62: Applying the connection filter to an SMTP VS.
Figure 9.63: Setting up a sender filter.
Figure 9.64: Recipient filtering.

Chapter 10: Managing Exchange: Users

Figure 10.1: Managing Exchange through ESM.
Figure 10.2: Server types shown by ESM.
Figure 10.3: New ESM columns.
Figure 10.4: Managing public folders with ESM.
Figure 10.5: Managing Exchange through computer management.
Figure 10.6: Users, contacts, and groups in the Active Directory.
Figure 10.7: Moving to another organizational unit.
Figure 10.8: A well-organized GAL.
Figure 10.9: You can populate AD with organizational information.
Figure 10.10: Exchange Advanced options for user accounts.
Figure 10.11: Defining who can send messages to a mailbox.
Figure 10.12: Actions Outlook users can take when they exceed quota.
Figure 10.13: Viewing folder sizes from Outlook.
Figure 10.14: Listing mailbox quotas used in ESM.
Figure 10.15: Granting delegate permission to folders from Outlook.
Figure 10.16: Allowing "Send on Behalf " permission for a mailbox from AD Users and Computers.
Figure 10.17: Providing a password to log on to Exchange 2000 (Outlook 2000).
Figure 10.18: Providing credentials to OWA.
Figure 10.19: Outlook Express account details.
Figure 10.20: Secure IMAP logon to Exchange.
Figure 10.21: A secret Outlook message.
Figure 10.22: Mailbox Manager policy settings.
Figure 10.23: Creating notification message text.
Figure 10.24: Mailbox management server properties.
Figure 10.25: Starting the Mailbox Manager.
Figure 10.26: User notification message.
Figure 10.27: Summary message from the Mailbox Manager.
Figure 10.28: Mailbox Manager diagnostics.
Figure 10.29: Enabling archiving on a Mailbox Store.
Figure 10.30: Options in Outlook (left) and Outlook Express (right) to control the Deleted Items folder.
Figure 10.31: Recovering deleted items.
Figure 10.32: Setting the deleted items retention period.
Figure 10.33: Setting a specific retention period for a mailbox.
Figure 10.34: Adding Stores to a system policy.
Figure 10.35: Items removed from the deleted items cache.
Figure 10.36: Using Performance Monitor to track the size of the deleted items cache.
Figure 10.37: Adding the deleted items column to a display.
Figure 10.38: Using ESM to view deleted items by mailbox.
Figure 10.39: Specifying a forwarding address.
Figure 10.40: Creating a server- side rule to process new messages.
Figure 10.41: The message sent to the originator.
Figure 10.42: Processing for list server messages.
Figure 10.43: Adding an outrageous graphic to an auto-signature file.
Figure 10.44: Outlook smart tags.
Figure 10.45: Creating HTML code with Microsoft FrontPage.
Figure 10.46: HTML code creating command buttons in a message.
Figure 10.47: Changing the security settings in Outlook 2002.
Figure 10.48: Setting folder names in VBScript.

Chapter 11: Managing Exchange: Servers

Figure 11.1: Creating a policy for storage limits.
Figure 11.2: A system policy for server objects.
Figure 11.3: Server policies displayed in ESM.
Figure 11.4: Recipient policies.
Figure 11.5: Email addresses and LDAP query in a recipient policy.
Figure 11.6: Building a search query.
Figure 11.7: Changing the user display name default format strings.
Figure 11.8: Ensuring that the new default format works.
Figure 11.9: Recipient Update Services.
Figure 11.10: Properties of a RUS.
Figure 11.11: Default global address list.
Figure 11.12: Hiding mailboxes and distribution groups from the GAL.
Figure 11.13: Using the Windows Backup Wizard to select databases.
Figure 11.14: A full backup is about to start.
Figure 11.15: A backup in progress.
Figure 11.16: Last good backup timestamp.
Figure 11.17: Selecting a database for restore.
Figure 11.18: Setting parameters for the restore.
Figure 11.19: A restore operation in progress.
Figure 11.20: Files used by a restore operation in the temporary directory.
Figure 11.21: Database logical and file names.
Figure 11.22: The LegacyDN utility.
Figure 11.23: Checking the LegacyExchangeDN value for an administrative group.
Figure 11.24: Unassociated mailboxes after a restore.
Figure 11.25: Viewing deleted mailboxes.
Figure 11.26: Reconnect a deleted mailbox.
Figure 11.27: Viewing a list of Mailbox Stores.
Figure 11.28: Finding a Mailbox Store.
Figure 11.29: Viewing a list of deleted mailboxes.
Figure 11.30: The Store offers to create a new database.
Figure 11.31: Creating a new Recovery Storage Group.
Figure 11.32: Setting locations for the RSG.
Figure 11.33: Adding a database to the RSG.
Figure 11.34: Adding a database to the RSG is completed.
Figure 11.35: Restoring the failed database from the backup set.
Figure 11.36: Viewing the mailboxes in the restored RSG.
Figure 11.37: Editing database locations with ADSIEDIT.
Figure 11.38: Running ExMerge to recover mailboxes.
Figure 11.39: ExMerge options.
Figure 11.40: Import options for ExMerge.
Figure 11.41: Selecting mailboxes to process.
Figure 11.42: The export process begins.
Figure 11.43: Looking for specific items.
Figure 11.44: Message tracking logs.
Figure 11.45: Security on Exchange 2000 and Exchange 2003 shares.
Figure 11.46: Server properties.
Figure 11.47: A system policy for message tracking.
Figure 11.48: Changing the tracking log directory.
Figure 11.49: Results of a message tracking request.
Figure 11.50: Results of tracking a message.
Figure 11.51: Tracking through multiple servers.
Figure 11.52: Examining data from a message tracking log loaded into Excel.
Figure 11.53: Exchange advanced properties of a distribution group.
Figure 11.54: MessageStats analysis of tracking log data.
Figure 11.55: HTML summary output from ExchDump.
Figure 11.56: Full-text report from ExchDump.
Figure 11.57: Running ExchDump.
Figure 11.58: Viewing the status of servers and connectors.
Figure 11.59: Viewing the monitoring properties for a server.
Figure 11.60: Adding a new resource to monitor.
Figure 11.61: Critical queue.
Figure 11.62: Examining monitoring data with Excel.
Figure 11.63: Server monitoring.
Figure 11.64: Notification parameters and a notification message.
Figure 11.65: Defining conditions for monitoring.
Figure 11.66: Event Viewer.
Figure 11.67: Setting diagnostic logging level for a server.



 < Day Day Up > 



Microsoft Exchange Server 2003
Microsoft Exchange Server 2003 Administrators Pocket Consultant
ISBN: 0735619786
EAN: 2147483647
Year: 2003
Pages: 188

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net