Access control, 308–9
entries (ACEs), 301, 310
with Exchange 2000/2003, 308–9
lists (ACLs), 301, 309
public folder, 309–10
ACID properties, 77
Active/Active clustering, 251, 255–56, 276, 277
choice of, 277
defined, 251
See also Clustering; Clusters
Active Directory (AD), 96
availability, 109
database, 304–5
ESE implementation and, 74
infrastructure failures, 108–9
objects, 305
uses, 108
Active/Passive clustering, 251, 255–56, 276, 277
choice of, 277
defined, 251
reliability, 277
scalability, 277
See also Clustering; Clusters
Administration roles, 310–11
Alerts tool, 369
Antispam
Exchange 2003 features, 342
solution, 341
user education, 341–43
See also Spam
AntiVirus API (AVAPI), 111
Application Service Providers (ASPs), 241, 379
Asynchronous data replication, 222
Attachment table, 65, 66
Audience, this book, 22–23
Auditing, 312–13
Authentication
delegation, 308
with front-end/back-end architecture, 309
Kerberos, 305–7, 318–19
message content, 343–47
OWA forms-based logon/cookie, 319–20
See also Security
Authorized Training and Education Center (ATEC), 9
Availability, 6
Active Directory (AD), 109
clustering and, 241–42
high, 41
requirements, 274