Flylib.com
List of Figures
Previous page
Table of content
Next page
< Day Day Up >
Chapter 1: A Brief History of Exchange
Figure 1.1: Exchange and Windows timelines.
Figure 1.2: Membership of the Exchange Domain Servers group.
Figure 1.3: ExDeploy.
Chapter 2: Exchange and the Active Directory
Figure 2.1: The contents of the Active Directory.
Figure 2.2: Windows NT and AD namespaces.
Figure 2.3: AD forest and trees.
Figure 2.4: Active Directory USNs.
Figure 2.5: Exchange routing information in the configuration NC.
Figure 2.6: Setting the Global Catalog property for a DC.
Figure 2.7: Server USN.
Figure 2.8: Windows domains, sites, and the network.
Figure 2.9: Connection object schedule.
Figure 2.10: Exchange 5.5 data replicated to the Active Directory.
Figure 2.11: Configuring a connection agreement.
Figure 2.12: Determining the type of connection agreement.
Figure 2.13: Specifying target containers for a bidirectional connection agreement.
Figure 2.14: Adding multiple Exchange sites to a connection agreement.
Figure 2.15: Setting a schedule for a connection agreement.
Figure 2.16: Configuring an interorganizational CA.
Figure 2.17: LegacyExchangeDN values for a user and an administrative group.
Figure 2.18: Directory access property page.
Figure 2.19: Setting diagnostics for DSAccess.
Figure 2.20: Event 2080-DSAccess suitability report.
Figure 2.21: Outlook connections to Exchange.
Figure 2.22: Outlook 2002 has problems talking with a GC.
Figure 2.23: Enabling the GC cache.
Figure 2.24: Checking the schema version.
Figure 2.25: The Exchange configuration container.
Figure 2.26: Using AD Sites and Services to view configuration data.
Figure 2.27: Viewing Exchange attributes in the AD schema.
Figure 2.28: Ambiguous names detected by Outlook Web Access.
Figure 2.29: Where to enable ANR resolution for a selected attribute.
Figure 2.30: Extended AD permissions used by Exchange.
Figure 2.31: Migration wizard options.
Figure 2.32: The Exchange Migration wizard in action.
Figure 2.33: A successful migration.
Figure 2.34: Email addresses.
Figure 2.35: Adding the ADSIEDIT snap-in to a console.
Figure 2.36: Connecting ADSIEDIT to a naming context.
Figure 2.37: The ADSIEDIT utility.
Figure 2.38: Schema and configuration naming contexts.
Figure 2.39: Using ADSIEDIT to view properties of a user object.
Figure 2.40: LDP utility.
Chapter 3: Exchange Basics
Figure 3.1: Contents of the Microsoft Exchange AD container.
Figure 3.2: Mailbox permissions.
Figure 3.3: Permissions on an Exchange organization.
Figure 3.4: A highly permissioned account.
Figure 3.5: Delegating control over an administrative group.
Figure 3.6: Running the Delegation wizard.
Figure 3.7: Examining permissions after delegation.
Figure 3.8: A system policy applied to multiple stores.
Figure 3.9: A site is an administrative group and a routing group.
Figure 3.10: Mixed-mode exchange.
Figure 3.11: Properties of an organization.
Figure 3.12: Adding a new administrative group.
Figure 3.13: Displaying administrative groups.
Figure 3.14: Information Store service logs on as LocalSystem.
Figure 3.15: Multiple routing groups operating within an administrative group.
Figure 3.16: Separating routing into a specific administrative group.
Figure 3.17: Creating a new mailbox.
Figure 3.18: Exchange 2003 Features Property page.
Figure 3.19: Exchange 2000 Advanced Properties.
Figure 3.20: Exchange Tasks added to the AD context-sensitive menu.
Figure 3.21: The Exchange Tasks wizard.
Figure 3.22: Hidden group membership.
Figure 3.23: The Exchange 2003 Move Mailbox wizard.
Figure 3.24: Moving mailboxes.
Figure 3.25: Viewing Task wizard reports.
Figure 3.26: General properties of a Windows group.
Figure 3.27: Viewing group membership.
Figure 3.28: Details of a list maintainer and its PF repository.
Figure 3.29: Sample ONDL output.
Figure 3.30: Properties of a distribution group.
Figure 3.31: Limiting a group to authenticated users only.
Figure 3.32: LDIFDE output for a query-based group.
Figure 3.33: Creating a new query-based distribution group.
Figure 3.34: Setting query parameters.
Figure 3.35: Previewing the results of the query.
Figure 3.36: Setting values for custom properties.
Figure 3.37: Viewing a query-based distribution group from the GAL.
Chapter 4: Outlook-The Client
Figure 4.1: Details of a MAPI profile.
Figure 4.2: Outlook authentication modes.
Figure 4.3: Outlook 2003 interface.
Figure 4.4: Configuring Outlook 2003 to use RPC over HTTP.
Figure 4.5: Outlook options to compress graphics.
Figure 4.6: Setting up cached Exchange mode for Outlook 2003.
Figure 4.7: Outlook progress bar and Exchange connection types.
Figure 4.8: Using the OAB as the preferred address book provider.
Figure 4.9: The OST is unicode.
Figure 4.10: Reviewing an item in conflict.
Figure 4.11: Some items that Outlook had a problem with.
Figure 4.12: Enabling mail logging.
Figure 4.13: Examining the version number of the MAPI provider.
Figure 4.14: Viewing the MAPI client version of connected users.
Figure 4.15: Blocking a range of MAPI clients.
Figure 4.16: Disabling user access to specific protocols.
Figure 4.17: Using ADSIEDIT to discover a LegacyExchangeDN.
Figure 4.18: Junk mail options.
Figure 4.19: Adding a message to the Blocked Senders list.
Figure 4.20: Blocked Senders list.
Figure 4.21: Checking a suspected Outlook message for spam.
Figure 4.22: Creating a rule from a message.
Figure 4.23: Viewing details of a user in the OAB.
Figure 4.24: Options to download the OAB.
Figure 4.25: OAB local files.
Figure 4.26: OAB properties via ESM.
Figure 4.27: The OAB public folder.
Figure 4.28: OAB replica synchronization.
Figure 4.29: System folders for free and busy information.
Figure 4.30: Controlling how Outlook publishes free and busy information.
Figure 4.31: Properties of a PST.
Figure 4.32: Selecting personal folders as the mail delivery location.
Figure 4.33: Changing the properties of a PST.
Figure 4.34: Archiving an Outlook folder.
Figure 4.35: Outlook 2002 auto-archive options.
Figure 4.36: Adding a favorite public folder to the offline store.
Figure 4.37: Telling Outlook 2000 to use the local calendar.
Figure 4.38: The result of scanning an offline store.
Figure 4.39: Checking for OST errors.
Chapter 5: Outlook Web Access
Figure 5.1: Outlook Web Access architecture.
Figure 5.2: Applying a view to a large public folder.
Figure 5.3: Outlook Web Access and IE6 (Exchange 2000).
Figure 5.4: Outlook Web Access and IE6 (Exchange 2003).
Figure 5.5: Setting up a Blocked Senders list with OWA.
Figure 5.6: Signed and encrypted OWA email.
Figure 5.7: IE6 runs the reach interface (Exchange 2003).
Figure 5.8: OWA spell checking.
Figure 5.9: OWA subscriptions.
Figure 5.10: Enabling forms- based authentication.
Figure 5.11: OWALOGON.ASP properties.
Figure 5.12: Working with rules in OWA 2003.
Figure 5.13: OWA and Web beacons.
Figure 5.14: User interface to control how OWA handles external content.
Figure 5.15: Exchange IIS applications.
Figure 5.16: Viewing Exchange IIS application properties from ESM.
Figure 5.17: Properties of the IIS Exchange application.
Figure 5.18: Changing the content expiration timeout for OWA.
Figure 5.19: Adding a performance counter for OWA operations.
Figure 5.20: Accessing an item with a URL.
Figure 5.21: Creating unique URLs for duplicate item names.
Figure 5.22: Viewing the deleted items cache for a folder.
Figure 5.23: Branded OWA.
Figure 5.24: Basic layout of OWA access through a firewall.
Figure 5.25: OWA expiration dates for attachments.
Figure 5.26: IE6 enhanced security and OWA logon.
Chapter 6: Internet and Other Clients
Figure 6.1: Outlook Express.
Figure 6.2: Configuring IMAP access to Exchange.
Figure 6.3: Outlook Express rules processing.
Figure 6.4: The Squirrel IMAP client connected to Exchange 2003.
Figure 6.5: Properties of an IMAP virtual server (part 1).
Figure 6.6: Properties of an IMAP virtual server (part 2).
Figure 6.7: Details of connected IMAP clients.
Figure 6.8: Configuring access to the Active Directory.
Figure 6.9: Executing an LDAP search against Active Directory.
Figure 6.10: Global settings for Mobile Services.
Figure 6.11: Controlling OMA access.
Figure 6.12: Properties of the OMA Web application.
Figure 6.13: The Smartphone interface
Figure 6.14: OMA running on IE6.
Figure 6.15: ActiveSync synchronization settings.
Figure 6.16: Synchronization conflict.
Figure 6.17: Synchronization rules.
Figure 6.18: Synchronization settings.
Figure 6.19: User properties from BES.
Figure 6.20: Setting BlackBerry filters.
Figure 6.21: Formatted SMTP message.
Chapter 7: The Store
Figure 7.1: The structure of the Store.
Figure 7.2: The B-tree structure within an ESE database.
Figure 7.3: How Outlook accesses database tables.
Figure 7.4: Creating search folders.
Figure 7.5: Search folders.
Figure 7.6: Header dump from a checkpoint file.
Figure 7.7: Viewing the storage group prefix.
Figure 7.8: A set of transaction logs.
Figure 7.9: Select new location for transaction logs.
Figure 7.10: Data in a transaction log.
Figure 7.11: Editing a transaction log with Notepad.
Figure 7.12: Dumping the header of a transaction log.
Figure 7.13: Transaction log checksum failure.
Figure 7.14: Enabling circular logging for a storage group.
Figure 7.15: Monitoring SIS on an Exchange 2000 server.
Figure 7.16: No sharing at all!
Figure 7.17: Storage groups.
Figure 7.18: The option to dismount a Store.
Figure 7.19: Do not mount a Store at startup.
Figure 7.20: Storage naming convention.
Figure 7.21: Creating a new storage group from ESM.
Figure 7.22: Specifying details of a new storage group.
Figure 7.23: Viewing database locations for a new Store.
Figure 7.24: Warning before moving a database.
Figure 7.25: Error 475 precedes a potential -1018.
Figure 7.26: Result of online defragmentation.
Figure 7.27: ESEUTIL succeeds in a database defragmentation.
Figure 7.28: How many items can you hold in a public folder?
Figure 7.29: Viewing the contents of a large public folder.
Figure 7.30: A well-laid-out PF hierarchy.
Figure 7.31: Creating a new calendar folder from Outlook.
Figure 7.32: TLH properties.
Figure 7.33: Replication for the Schedule+ free/busy folder.
Figure 7.34: PFTREE.
Figure 7.35: Outlook Folders utility.
Figure 7.36: Mail-enabling a public folder.
Figure 7.37: Public folder favorites.
Figure 7.38: Setting a deleted item retention period.
Figure 7.39: Setting administrative permissions on a public folder.
Figure 7.40: Controlling public folder access from Outlook.
Figure 7.41: Viewing public folder replication status.
Figure 7.42: Pushing a new public folder replica.
Figure 7.43: Selective public folder referrals.
Figure 7.44: Public folder replication schedules.
Figure 7.45: Send public folder contents.
Figure 7.46: Adjusting diagnostics for public folder replication.
Figure 7.47: Typical replication events.
Figure 7.48: Public folders in the AD.
Figure 7.49: ExIFS architecture.
Figure 7.50: Viewing the same items through Windows Explorer and Outlook Express.
Figure 7.51: Listing an Exchange mailbox folder with the DOS DIR command.
Figure 7.52: Example output from DOS TYPE command (Outlook Express 6.0).
Chapter 8: Performance and Clusters
Figure 8.1: Memory used by the Store.
Figure 8.2: Exchange reports nonoptimal memory.
Figure 8.3: Snapshots and clones.
Figure 8.4: Resource dependency.
Figure 8.5: Cluster groups and resources.
Figure 8.6: The cluster quorum.
Figure 8.7: Exchange cluster resource models.
Figure 8.8: Allocating resources to mount a database, and a failure.
Figure 8.9: Monitoring virtual memory.
Chapter 9: Getting the Mail through-Routing and Message Delivery
Figure 9.1: A DSN displayed by Outlook 2002.
Figure 9.2: Extended SMTP commands supported by Exchange.
Figure 9.3: Dependencies of the SMTP service.
Figure 9.4: Editing the IIS metabase to change an SMTP banner.
Figure 9.5: The SMTP banner is successfully changed.
Figure 9.6: The Exchange transport core.
Figure 9.7: SMTP VS "Messages" properties (Exchange 2003).
Figure 9.8: SMTP messages that cannot be processed.
Figure 9.9: Messages waiting to go.
Figure 9.10: Viewing queues-Exchange 2000.
Figure 9.11: The Exchange 2003 queue viewer.
Figure 9.12: Search message queues.
Figure 9.13: Properties of a queue.
Figure 9.14: Examining a queue.
Figure 9.15: Properties of a message on a queue.
Figure 9.16: SMTP error in the system event log.
Figure 9.17: Defining a routing master.
Figure 9.18: Creating a new routing group.
Figure 9.19: Duplicate routing groups.
Figure 9.20: Properties of the new routing group.
Figure 9.21: Error when moving a server to a routing group.
Figure 9.22: A defunct routing group awaits deletion.
Figure 9.23: Extract from SMTP log file.
Figure 9.24: Exchange 5.5 routing calculation.
Figure 9.25: Link state routing and network outages.
Figure 9.26: Taking a snapshot of the routing environment.
Figure 9.27: Improved naming conventions.
Figure 9.28: Examining the headers of a message.
Figure 9.29: General properties of a routing group connector.
Figure 9.30: Remote bridgehead server for an RGC.
Figure 9.31: Delivery options for an RGC.
Figure 9.32: Routing group connectors.
Figure 9.33: General properties of an SMTP connector.
Figure 9.34: Specifying the address space for an SMTP connector.
Figure 9.35: Advanced properties of the SMTP connector.
Figure 9.36: Limiting users on an SMTP connector.
Figure 9.37: General properties of an X.400 connector.
Figure 9.38: Installing a new X.400 transport stack.
Figure 9.39: Setting stack properties for an X.400 connector.
Figure 9.40: Defining an address space for an X.400 connector.
Figure 9.41: Advanced properties of an X.400 connector.
Figure 9.42: The WinRoute utility.
Figure 9.43: Details exposed by WinRoute.
Figure 9.44: Enabling logging for the default SMTP virtual server.
Figure 9.45: Extended properties for an SMTP log.
Figure 9.46: Examining an SMTP log file.
Figure 9.47: SMTP archive registry entries.
Figure 9.48: Reading SMTP archived messages.
Figure 9.49: Disabling the SMTP archive sink.
Figure 9.50: Internet message formats.
Figure 9.51: Message Format properties for a typical UNIX domain.
Figure 9.52: A selection of Internet message formats used at HP.
Figure 9.53: Message delivery properties.
Figure 9.54: Setting relay restrictions.
Figure 9.55: Setting relay permissions.
Figure 9.56: Blocking users on an Exchange 2000 server.
Figure 9.57: Exchange 2000: applying a filter.
Figure 9.58: Sample filtered message.
Figure 9.59: Defining a connection filter.
Figure 9.60: Configuring RBL response codes.
Figure 9.61: Configuring an exception.
Figure 9.62: Applying the connection filter to an SMTP VS.
Figure 9.63: Setting up a sender filter.
Figure 9.64: Recipient filtering.
Chapter 10: Managing Exchange: Users
Figure 10.1: Managing Exchange through ESM.
Figure 10.2: Server types shown by ESM.
Figure 10.3: New ESM columns.
Figure 10.4: Managing public folders with ESM.
Figure 10.5: Managing Exchange through computer management.
Figure 10.6: Users, contacts, and groups in the Active Directory.
Figure 10.7: Moving to another organizational unit.
Figure 10.8: A well-organized GAL.
Figure 10.9: You can populate AD with organizational information.
Figure 10.10: Exchange Advanced options for user accounts.
Figure 10.11: Defining who can send messages to a mailbox.
Figure 10.12: Actions Outlook users can take when they exceed quota.
Figure 10.13: Viewing folder sizes from Outlook.
Figure 10.14: Listing mailbox quotas used in ESM.
Figure 10.15: Granting delegate permission to folders from Outlook.
Figure 10.16: Allowing "Send on Behalf " permission for a mailbox from AD Users and Computers.
Figure 10.17: Providing a password to log on to Exchange 2000 (Outlook 2000).
Figure 10.18: Providing credentials to OWA.
Figure 10.19: Outlook Express account details.
Figure 10.20: Secure IMAP logon to Exchange.
Figure 10.21: A secret Outlook message.
Figure 10.22: Mailbox Manager policy settings.
Figure 10.23: Creating notification message text.
Figure 10.24: Mailbox management server properties.
Figure 10.25: Starting the Mailbox Manager.
Figure 10.26: User notification message.
Figure 10.27: Summary message from the Mailbox Manager.
Figure 10.28: Mailbox Manager diagnostics.
Figure 10.29: Enabling archiving on a Mailbox Store.
Figure 10.30: Options in Outlook (left) and Outlook Express (right) to control the Deleted Items folder.
Figure 10.31: Recovering deleted items.
Figure 10.32: Setting the deleted items retention period.
Figure 10.33: Setting a specific retention period for a mailbox.
Figure 10.34: Adding Stores to a system policy.
Figure 10.35: Items removed from the deleted items cache.
Figure 10.36: Using Performance Monitor to track the size of the deleted items cache.
Figure 10.37: Adding the deleted items column to a display.
Figure 10.38: Using ESM to view deleted items by mailbox.
Figure 10.39: Specifying a forwarding address.
Figure 10.40: Creating a server- side rule to process new messages.
Figure 10.41: The message sent to the originator.
Figure 10.42: Processing for list server messages.
Figure 10.43: Adding an outrageous graphic to an auto-signature file.
Figure 10.44: Outlook smart tags.
Figure 10.45: Creating HTML code with Microsoft FrontPage.
Figure 10.46: HTML code creating command buttons in a message.
Figure 10.47: Changing the security settings in Outlook 2002.
Figure 10.48: Setting folder names in VBScript.
Chapter 11: Managing Exchange: Servers
Figure 11.1: Creating a policy for storage limits.
Figure 11.2: A system policy for server objects.
Figure 11.3: Server policies displayed in ESM.
Figure 11.4: Recipient policies.
Figure 11.5: Email addresses and LDAP query in a recipient policy.
Figure 11.6: Building a search query.
Figure 11.7: Changing the user display name default format strings.
Figure 11.8: Ensuring that the new default format works.
Figure 11.9: Recipient Update Services.
Figure 11.10: Properties of a RUS.
Figure 11.11: Default global address list.
Figure 11.12: Hiding mailboxes and distribution groups from the GAL.
Figure 11.13: Using the Windows Backup Wizard to select databases.
Figure 11.14: A full backup is about to start.
Figure 11.15: A backup in progress.
Figure 11.16: Last good backup timestamp.
Figure 11.17: Selecting a database for restore.
Figure 11.18: Setting parameters for the restore.
Figure 11.19: A restore operation in progress.
Figure 11.20: Files used by a restore operation in the temporary directory.
Figure 11.21: Database logical and file names.
Figure 11.22: The LegacyDN utility.
Figure 11.23: Checking the LegacyExchangeDN value for an administrative group.
Figure 11.24: Unassociated mailboxes after a restore.
Figure 11.25: Viewing deleted mailboxes.
Figure 11.26: Reconnect a deleted mailbox.
Figure 11.27: Viewing a list of Mailbox Stores.
Figure 11.28: Finding a Mailbox Store.
Figure 11.29: Viewing a list of deleted mailboxes.
Figure 11.30: The Store offers to create a new database.
Figure 11.31: Creating a new Recovery Storage Group.
Figure 11.32: Setting locations for the RSG.
Figure 11.33: Adding a database to the RSG.
Figure 11.34: Adding a database to the RSG is completed.
Figure 11.35: Restoring the failed database from the backup set.
Figure 11.36: Viewing the mailboxes in the restored RSG.
Figure 11.37: Editing database locations with ADSIEDIT.
Figure 11.38: Running ExMerge to recover mailboxes.
Figure 11.39: ExMerge options.
Figure 11.40: Import options for ExMerge.
Figure 11.41: Selecting mailboxes to process.
Figure 11.42: The export process begins.
Figure 11.43: Looking for specific items.
Figure 11.44: Message tracking logs.
Figure 11.45: Security on Exchange 2000 and Exchange 2003 shares.
Figure 11.46: Server properties.
Figure 11.47: A system policy for message tracking.
Figure 11.48: Changing the tracking log directory.
Figure 11.49: Results of a message tracking request.
Figure 11.50: Results of tracking a message.
Figure 11.51: Tracking through multiple servers.
Figure 11.52: Examining data from a message tracking log loaded into Excel.
Figure 11.53: Exchange advanced properties of a distribution group.
Figure 11.54: MessageStats analysis of tracking log data.
Figure 11.55: HTML summary output from ExchDump.
Figure 11.56: Full-text report from ExchDump.
Figure 11.57: Running ExchDump.
Figure 11.58: Viewing the status of servers and connectors.
Figure 11.59: Viewing the monitoring properties for a server.
Figure 11.60: Adding a new resource to monitor.
Figure 11.61: Critical queue.
Figure 11.62: Examining monitoring data with Excel.
Figure 11.63: Server monitoring.
Figure 11.64: Notification parameters and a notification message.
Figure 11.65: Defining conditions for monitoring.
Figure 11.66: Event Viewer.
Figure 11.67: Setting diagnostic logging level for a server.
< Day Day Up >
Previous page
Table of content
Next page
Microsoft Exchange Server 2003 Administrators Pocket Consultant
ISBN: 0735619786
EAN: 2147483647
Year: 2003
Pages: 188
Authors:
William R. Stanek
BUY ON AMAZON
Professional Java Native Interfaces with SWT/JFace (Programmer to Programmer)
Other Important SWT Components
SWT Graphics and Image Handling
Drag and Drop and the Clipboard
JFace Wizards
Eclipse Forms
Cisco IOS Cookbook (Cookbooks (OReilly))
Generating Large Numbers of Router Configurations
Adjusting OSPF Costs
Using DLSw to Bridge Between Ethernet and Token Ring
Enabling SNMP Traps and Informs
Reverse-Tunnel Forwarding
Data Structures and Algorithms in Java
Reference Types
Best, Worst, and Average Case
Vocabulary
Problems
A.8. Operators
Microsoft WSH and VBScript Programming for the Absolute Beginner
Getting Started with the WSH and VBScript
VBScript Basics
Combining Different Scripting Languages
Appendix A WSH Administrative Scripting
Appendix C Whats on the CD-ROM?
Quantitative Methods in Project Management
Project Value: The Source of all Quantitative Measures
Organizing and Estimating the Work
Expense Accounting and Earned Value
Quantitative Time Management
Special Topics in Quantitative Management
.NET-A Complete Development Cycle
References for Further Reading
Project Management Issues
Using OpenGL.NET
Secure Web Applications
No Longer under Construction
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies