Flylib.com
List of Figures
Previous page
Table of content
Next page
Chapter 1: Introducing Exchange Server 2007
Figure 1.1: The Outlook 2007 client Inbox
Figure 1.2: The Outlook 2007 client Calendar
Figure 1.3: Outlook Web Access web browser accesses mail stored on an Exchange Server 2007.
Figure 1.4: A typical e-mail message
Figure 1.5: Microsoft Word 2003 includes messaging-enabled functions for sending and routing.
Figure 1.6: Object insertion makes it easy to create sophisticated messaging-enabled applications.
Figure 1.7: Double-clicking an Excel spreadsheet object in a message enables Excel menus and toolbars.
Figure 1.8: Electronic forms turn messages into structured information-gathering tools.
Figure 1.9: Using CPU-Z to identify the CPU type
Figure 1.10: The new and improved Exchange Management Console
Figure 1.11: Specifying server roles
Figure 1.12: Managed folders assigned by the managed folder mailbox policy
Figure 1.13: Creating a journaling rule
Figure 1.14: Classifying a message using Outlook Web Access
Figure 1.15: Local continuous replication
Figure 1.16: Clustered continuous replication
Figure 1.17: Resource type is designated when the mailbox is created.
Figure 1.18: Configuring Outlook 2007 for Autodiscover
Figure 1.19: Deploying an Edge Transport server
Chapter 2: Exchange Server 2007 Architecture
Figure 2.1: Viewing the configuration from ADSI Edit
Figure 2.2: E-mail Addresses properties
Figure 2.3: Protecting a simple Exchange organization
Figure 2.4: A standard Exchange organization
Figure 2.5: Common Exchange Server 2007 services
Figure 2.6: Exchange 2007 services in Task Manager
Figure 2.7: Basics of the Hub Transport architecture
Figure 2.8: Security when messages are being transmitted
Figure 2.9: Sample message routing architecture
Figure 2.10: Microsoft Mail for PC Networks is a typical shared-file electronic messaging system.
Figure 2.11: Microsoft Exchange is based on the client/server model.
Chapter 3: Designing a New Exchange 2007 System
Figure 3.1: Display names are created using first and last names when a user account is created.
Figure 3.2: The alias name for an Exchange 2007 mailbox
Figure 3.3: The Exchange client global address book shows each mailbox's display name.
Figure 3.4: Exchange Server uses the mailbox alias or the first and last names to construct e-mail addresses.
Figure 3.5: Mail-enabled group properties as viewed through the Exchange Management Console
Figure 3.6: Managing more than a few transport rules can become difficult.
Figure 3.7: Assigning a storage group and mailbox database to a new mailbox
Figure 3.8: Defining Active Directory sites and subnets
Figure 3.9: Exchange System Manager after the first Exchange 2007 server is installed
Figure 3.10: Exchange 2007 routing group container used for interoperability with Exchange 2000/2003
Figure 3.11: Disk configuration for an Exchange 2007 Mailbox server
Chapter 4: Installing Exchange Server 2007
Figure 4.1: The Exchange 2007 setup GUI
Figure 4.2: Exchange 2007 setup options
Figure 4.3: Customizing the installation
Figure 4.4: A successful CAS installation
Figure 4.5: Finalizing the deployment
Figure 4.6: End-to-end scenarios
Chapter 5: Upgrading to Exchange Server 2007
Figure 5.1: Logical structures present when Exchange 2007 coexists in a legacy organization
Figure 5.2: Logical structures simplified when only Exchange 2007 remains
Figure 5.3: Output from the
Get-RoutingGroup Connector
cmdlet
Chapter 6: Scaling Upward and Outward
Figure 6.1: Adding counters to the System Monitor tool
Figure 6.2: Using the chart view of the System Monitor
Figure 6.3: Changing System Monitor properties
Figure 6.4: Using the report view of System Monitor
Figure 6.5: Managing storage groups and mailbox databases using the Exchange Management Console
Figure 6.6: Creating a new storage group using the Exchange Management Console
Figure 6.7: Moving a storage group's transaction logs and system files
Figure 6.8: Viewing a storage group's properties
Figure 6.9: Creating a new mailbox database using the Exchange Management Console
Figure 6.10: General property page of a mailbox database
Figure 6.11: Setting limits on a mailbox database
Figure 6.12: Using the Customize Schedule dialog box
Figure 6.13: Warning message a user receives when their mailbox exceeds the Prohibit Send at (KB) limit
Figure 6.14: Client Settings properties of a mailbox database
Figure 6.15: Starting the Enable Storage Group Local Continuous Replication Wizard
Figure 6.16: Specifying LCR paths for transaction logs and system paths
Figure 6.17: Specifying a path for the LCR database
Figure 6.18: Errors found when Exchange Server reads a corrupted page from the database
Chapter 7: Administering Exchange 2007
Figure 7.1: Exchange System Manager console for Exchange 2000/2003
Figure 7.2: Exchange 2007 administrative architecture
Figure 7.3: Installing the Exchange 2007 Management Tools
Figure 7.4: Installing the Exchange 2003 system management tools
Figure 7.5: Introducing the Exchange 2007 Management Console
Figure 7.6: Exchange Management Console navigation tree
Figure 7.7: General view of the Recipient Configuration work center
Figure 7.8: Mailbox-specific view of the Recipient Configuration work center
Figure 7.9: Server objects include a Work pane.
Figure 7.10: Work pane property pages and objects when the Client Access server subcontainer is selected
Figure 7.11: Corresponding actions available based on selected objects
Figure 7.12: Actions pane for Recipient Configuration Mailboxes subcontainer
Figure 7.13: Customizing the components shown in the Exchange Management Console
Figure 7.14: Customized recipient management console
Figure 7.15: The Toolbox work center of the Exchange Management Console
Figure 7.16: Finalize Deployment tips in the Exchange Management Console.
Figure 7.17: Confirmation screen for the Move Mailbox Wizard
Figure 7.18: Move Mailbox Wizard progress screen
Figure 7.19: Move Mailbox Wizard Completion screen and EMS cmdlets
Figure 7.20: The Move Schedule page of the Move Mailbox Wizard
Figure 7.21: Improved error controls
Figure 7.22: Selecting objects from Active Directory
Figure 7.23: Delegating Exchange 2007 administrative roles
Figure 7.24: Prebuilt Windows security groups for managing Exchange 2007
Figure 7.25: Output of the
Get-Mailbox
cmdlet
Figure 7.26: Outputting to a formatted table
Figure 7.27: Outputting to a formatted list
Figure 7.28: Referring to the online help for creating a new mailbox
Figure 7.29: Online help for creating a new mailbox using the Exchange Management Shell
Chapter 8: Exchange Organization, Server, and Recipient Management
Figure 8.1: Viewing the Exchange 2007 configuration data using ADSIEdit
Figure 8.2: Active Directory security groups
Figure 8.3: Using the Exchange Management Console to assign permissions
Figure 8.4: Managing message records management settings
Figure 8.5: Address lists when viewed from the Exchange Management Console
Figure 8.6: Offline address book management viewed from the Exchange Management Console
Figure 8.7: Managing ActiveSync Mailbox policies using the Exchange Management Console
Figure 8.8: Managing Internet message formats using the Exchange Management Console
Figure 8.9: Accepted domains properties in the Exchange Management Console
Figure 8.10: Editing an e-mail address policy using the Exchange Management Console
Figure 8.11: Editing a transport rule using the Exchange Management Console
Figure 8.12: Configuring journaling for an entire mailbox database
Figure 8.13: Creating a journaling rule
Figure 8.14: Assigning journaling settings to a managed content setting
Figure 8.15: Properties of a Send connector as shown in the Exchange Management Console
Figure 8.16: Creating a new Edge Subscription using the Exchange Management Console
Figure 8.17: Anti-spam configuration using the Exchange Management Console
Figure 8.18: The Exchange Management Console showing an unlicensed server
Figure 8.19: Properties of an Exchange 2007 server
Figure 8.20: Managing storage groups, mailbox databases, and public folder databases
Figure 8.21: Managing Client Access server properties
Figure 8.22: Managing Hub Transport properties and Receive connectors
Figure 8.23: Managing Exchange 2007 recipients using the Exchange Management Console
Figure 8.24: Managing a mailbox's properties using the Exchange Management Console
Figure 8.25: Managing the membership of a mail-enabled group
Figure 8.26: Managing a mail-enabled contact's e-mail addresses
Chapter 9: Imposing Limits
Figure 9.1: Default mailbox database Limits properties
Figure 9.2: Individual mailbox storage quotas
Figure 9.3: Applying message size restrictions for a single mailbox
Figure 9.4: Non-delivery report indicating that a message is too large to be delivered
Figure 9.5: Defining a condition that will reject messages with attachments larger than 5MB
Figure 9.6: Defining an action to send back a customized report of undeliverable mail message
Figure 9.7: Report of undeliverable mail issued when recipient limit is reached
Figure 9.8: Overriding the maximum number of recipients for a single mailbox
Figure 9.9: The Managed Custom Folders tab of the results pane
Figure 9.10: Specifying a limit for a custom folder
Figure 9.11: Default public folder database limits
Figure 9.12: Limits property page of the Research Documents folder
Chapter 10: Managing Recipients
Figure 10.1: List of accepted domains
Figure 10.2: Creating a new accepted domain
Figure 10.3: The e-mail address policies for an Exchange 2007 organization
Figure 10.4: E-mail addresses properties of an e-mail address policy
Figure 10.5: Changing how the SMTP address is generated
Figure 10.6: Scheduling an update to the e-mail address policy
Figure 10.7: Newly created SMTP address for existing user
Figure 10.8: Naming the e-mail address policy and defining the objects to which it applies
Figure 10.9: Defining conditions for an e-mail address policy
Figure 10.10: The E-mail Address Policy Preview dialog box helps to confirm that the policy conditions are correct.
Figure 10.11: Completion page of the New E-mail Address Policy Wizard
Figure 10.12: Defining the type of mailbox to be created
Figure 10.13: Assigning a mailbox to a server, storage group, and mailbox database
Figure 10.14: Successfully completing the assignment of a mailbox to an existing user
Figure 10.15: Creating a user account from the Exchange Management Console
Figure 10.16: General information property page for a mailbox
Figure 10.17: E-mail address properties of a mailbox
Figure 10.18: Storage Quotas and Messaging Records Management options are found on the Mailbox Settings property page.
Figure 10.19: A mailbox's delivery options
Figure 10.20: Restricting who can send mail to a mailbox
Figure 10.21: Non-delivery report message sent when sender is not authorized to send to the intended recipient
Figure 10.22: Mailbox features property page
Figure 10.23: Defining user information for a conference room mailbox
Figure 10.24: Viewing just the room resources in the Address Book
Figure 10.25: Browsing for room resources. Note the Capacity and Description columns.
Figure 10.26: A resource mailbox's Resource Scheduling Options section
Figure 10.27: Defining room resource scheduling permissions
Figure 10.28: Resource Privacy Options and Response Message options
Figure 10.29: Defining the server, storage group, and mailbox database
Figure 10.30: Mailbox move operations
Figure 10.31: Reconnecting mailboxes that have been deleted
Figure 10.32: Starting the Connect Mailbox Wizard
Figure 10.33: Assigning a deleted mailbox to a user account that does not currently have a mailbox
Figure 10.34: A distribution group's Message Delivery Restrictions dialog box
Figure 10.35: E-mail address properties of a mail-enabled group
Figure 10.36: Advanced properties of a mail-enabled group
Figure 10.37: Narrowing the membership of a dynamic distribution group
Figure 10.38: Dynamic distribution group Filter and Conditions property pages
Figure 10.39: Contact information in the Active Directory
Figure 10.40: Contact object's General properties
Chapter 11: Managing Address Lists
Figure 11.1: Viewing the global address list
Figure 11.2: Viewing an mail-enabled object's
showInAddressBook
attribute
Figure 11.3: Using ADSIEdit to manage the permissions on a global address list
Figure 11.4: Viewing the available address lists from within Outlook
Figure 11.5: Viewing the address lists using the Exchange Management Console
Figure 11.6: Viewing the Engineering address list
Figure 11.7: Changing the default address list
Figure 11.8: Managing offline address books using the Exchange Management Console
Figure 11.9: Configuring the address lists that an offline address book contains
Figure 11.10: Offline address book Distribution properties
Figure 11.11: OAB virtual directory for the default website
Figure 11.12: General property page of an offline address book
Chapter 12: Managing Folder Content
Figure 12.1: Custom managed folders created by a managed folder mailbox policy
Figure 12.2: Viewing the messaging records management components in the Exchange Management Console
Figure 12.3: Configuring a managed content setting to delete items that have been in the Deleted Items folder longer than 14 days
Figure 12.4: Moving content from the Inbox to the System Cleanup folder
Figure 12.5: Creating a new managed custom folder
Figure 12.6: The user is prompted to clean up their mailbox if a managed custom folder is over its size limit.
Figure 12.7: Creating a managed folder mailbox policy
Figure 12.8: Assigning a managed folder mailbox policy at account creation
Chapter 13: Managing Messages in Transit
Figure 13.1: A message classification displayed in Outlook 2007
Figure 13.2: Applying a message classification in OWA
Figure 13.3: New Transport Rule Wizard Introduction screen
Figure 13.4: New Transport Rule Wizard Conditions screen
Figure 13.5: New Transport Rule Wizard Actions screen
Figure 13.6: New Transport Rule Wizard Exceptions screen
Figure 13.7: New Transport Rule Wizard Create Rule screen
Figure 13.8: New Transport Rule Wizard Completion screen
Chapter 14: Public Folder Administration
Figure 14.1: Naming a new folder
Figure 14.2: The Outlook client's Properties dialog box for a public folder
Figure 14.3: The default public folder store property of the mailbox store
Figure 14.4: Public folders on RED-EXCH01
Figure 14.5: Public folders on RED-MSG01
Figure 14.6: The default public folder tree container
Figure 14.7: Choosing a public folder store
Figure 14.8: Creating a new Public Folders container on an Exchange 2007 server
Figure 14.9: Setting up replication of a public folder
Figure 14.10: Viewing the new replica on the Exchange 2007 mailbox server
Figure 14.11: The General tab of the public folder property sheet
Figure 14.12: The Exchange General tab of the public folder property sheet
Figure 14.13: The Exchange Advanced tab of the public folder property sheet
Figure 14.14: The Permissions tab of the public folder property sheet
Chapter 15: Reliability and Availability 101
Figure 15.1: Ensuring that cached Exchange mode is enabled
Figure 15.2: Redundant inbound mail routing
Figure 15.3: Improving redundancy with multiple Hub Transport servers
Figure 15.4: Implementing load balancing for Client Access and Unified Messaging servers
Figure 15.5: Implementing Network Load Balancing
Figure 15.6: Creating a new NLB cluster
Figure 15.7: Defining port rules for a Network Load Balancing cluster
Figure 15.8: Adding a host to the Network Load Balancing cluster
Figure 15.9: Confirming host parameters for a member of a Network Load Balancing cluster
Figure 15.10: Examining the status of the Network Load Balancing cluster
Figure 15.11: Configuring more than two DNS servers for a Windows server
Figure 15.12: Simple two-node clustered mailbox server
Figure 15.13: Simple clustered continuous replication configuration
Chapter 16: Backup and Disaster Recovery
Figure 16.1: The default online maintenance time for a database is 1:00 a.m. until 5:00 a.m.
Figure 16.2: Selecting the Microsoft Information Store object for backup
Figure 16.3: Viewing properties of scheduled jobs
Figure 16.4: Sample backup log
Figure 16.5: Event viewer showing backup-related events
Figure 16.6: Important ESE backup events
Figure 16.7: ESE backup events related to transaction logs
Figure 16.8: Limits property page for a mailbox database.
Figure 16.9: Recovering a deleted item
Figure 16.10: Reconnecting a deleted mailbox
Figure 16.11: Specifying the user account to which the mailbox will be connected
Figure 16.12: Restoring the database named Mailbox Database and associated log files
Figure 16.13: Restore process starts replaying log files
Figure 16.14: Replaying a transaction log
Figure 16.15: Recovery storage group management tasks
Figure 16.16: Selecting merge options
Figure 16.17: The Recovered Data folder structure is created.
Chapter 17: Supporting Outlook 2007
Figure 17.1: Changing the color scheme in Office 2007
Figure 17.2: The Inbox in Outlook 2007
Figure 17.3: The Word editor is the only editor in Outlook 2007.
Figure 17.4: The calendar keeps you on schedule.
Figure 17.5: The Business Card view of your Contacts folder
Figure 17.6: The Tasks folder helps you get things done.
Figure 17.7: The Mailbox Cleanup tool helps keep your user mailboxes under quota.
Figure 17.8: Adding an RSS feed to Outlook 2007
Figure 17.9: Instant Search helps you find your items
Figure 17.10: The To-Do Bar helps to keep you on task.
Figure 17.11: Configure a resource to accept scheduling requests
Figure 17.12: Autodiscover when a client is member of the Active Directory
Figure 17.13: External Autodiscover location process
Figure 17.14: Providing Outlook with your information manually
Figure 17.15: Configuring the external hostname for Outlook Anywhere
Figure 17.16: Setting the external URL for offline address book distribution
Figure 17.17: Subject Alternative Name in the Field column
Chapter 18: Delivering E-mail
Figure 18.1: Sample Active Directory site infrastructure
Figure 18.2: The Hub Transport is at the center of all message delivery.
Figure 18.3: Messages are encrypted during transit.
Figure 18.4: Receive connectors for an Exchange 2007 server
Figure 18.5: Default Receive connector permissions
Figure 18.6: Managing Send connectors
Figure 18.7: Introduction page of the New SMTP Send Connector Wizard
Figure 18.8: General properties of a Send connector
Figure 18.9: Viewing the Exchange 2007 administrative and routing group
Figure 18.10: Message routing between Exchange 2003 and Exchange 2007
Figure 18.11: Properties of a routing group connector
Figure 18.12: E-mail delivered directly to Hub Transport server
Figure 18.13: Allowing a Receive connector to receive mail from the Internet
Figure 18.14: Creating a new accepted domain
Figure 18.15: Deploying an Exchange Edge Transport server
Figure 18.16: Simple Edge Transport deployment
Figure 18.17: The result of the
New-EdgeSubscription
command
Figure 18.18: Creating a new Edge Subscription for the Hub Transport server
Figure 18.19: Viewing successful EdgeSync information
Figure 18.20: Viewing the accepted domains that have synchronized to an Exchange 2007 Edge Transport server
Figure 18.21: Customizing anti-spam features of an Edge Transport server
Figure 18.22: The Actions property page of the Content Filtering object
Figure 18.23: Configuring custom words for the content filter
Figure 18.24: Configuring a IP Block List entry
Figure 18.25: Viewing the current IP block list providers
Figure 18.26: Adding a new IP block list provider
Figure 18.27: Configuring recipient filtering
Figure 18.28: Configuring sender filtering
Figure 18.29: Configuring a Sender ID action
Figure 18.30: Configuring the sender reputation level block threshold
Figure 18.31: Configuring the sender reputation filter to perform an open proxy test
Figure 18.32: Introduction page of the New Transport Rule Wizard
Figure 18.33: Conditions page of the transport rule
Figure 18.34: The Actions page of the New Transport Rule Wizard
Chapter 19: Exchange Anywhere
Figure 19.1: Outlook Web Access logon form
Figure 19.2: Setting the location and language options
Figure 19.3: Exchange 2007 Outlook Web Access interface
Figure 19.4: Editing Outlook Web Access user options
Figure 19.5: Setting Out-of-Office options through Outlook Web Access
Figure 19.6: Using the Outlook Web Access address book feature
Figure 19.7: Configuring Outlook Web Access authentication options
Figure 19.8: Configuring Outlook Web Access segmentation
Figure 19.9: Configuring private computer file access
Figure 19.10: Configuring Outlook Web Access for remote file server support
Figure 19.11: Redirecting the default website to the OWA virtual directory
Figure 19.12: Configuring internal domain names
Figure 19.13: Enabling Outlook Anywhere using the Exchange Management Console
Figure 19.14: Modifying the Outlook Anywhere configuration
Figure 19.15: Viewing Exchange-specific virtual directories and application pools
Figure 19.16: Managing a mobile device through OWA
Figure 19.17: Managing a mobile device
Figure 19.18: Configuring the POP3 service
Chapter 20: Securing Exchange Server
Figure 20.1: Typical firewall deployment protecting Exchange Server 2007
Figure 20.2: Viewing your security policy
Figure 20.3: Connecting to a website with an untrusted certificate
Figure 20.4: A security warning of an untrusted certificate
Figure 20.5: Viewing a certificate's general properties
Figure 20.6: The text of a certificate signing request
Figure 20.7: Pasting the certificate signing request into a text box on a certificate authority's website
Figure 20.8: An example of a multilayer message hygiene system
Figure 20.9: Using a third-party message hygiene solution
Figure 20.10: Implementing a reverse proxy in the perimeter network
Figure 20.11: Using ISA Server as an internal firewall and reverse proxy
Chapter 21: Logging, Auditing, and Monitoring
Figure 21.1: Exchange Server 2007 Tools work center
Figure 21.2: Connect to Active Directory options
Figure 21.3: Selecting the options for the ExBPA scan
Figure 21.4: Viewing the critical issues
Figure 21.5: Getting advice on problem resolution from the Best Pratices Analyzer
Figure 21.6: Viewing the Best Practices All Issues report
Figure 21.7: Including a performance baseline in the Best Practices Report
Figure 21.8: Changing the Application event log properties
Figure 21.9: Configuring events to be audited
Figure 21.10: An application event indicating that a user is logging in to their own mailbox
Figure 21.11: Exchange Troubleshooting Assistant
Figure 21.12: Specifying the criteria for a particular message
Figure 21.13: Viewing the message tracking results
Figure 21.14: Tracking a specific event
Figure 21.15: Sample connectivity log
Figure 21.16: Enabling protocol logging for a Send connector
Figure 21.17: Defining source servers for a Send connector
Figure 21.18: Sample Send protocol log
Figure 21.19: Managing queues on a Hub Transport server
Figure 21.20: Viewing the messages queued up in a specific queue
Figure 21.21: Viewing and filtering all queued messages
Figure 21.22: General properties of a queued message
Figure 21.23: Monitoring the CPU usage of Exchange-related processes
Figure 21.24: Choosing instances of a physical disk versus a logical disk
Figure 21.25: Example of the folder structure created by the
Export-Mailbox
cmdlet.
Previous page
Table of content
Next page
Mastering Microsoft Exchange Server 2007 SP1
ISBN: 0470417331
EAN: 2147483647
Year: 2004
Pages: 198
Authors:
Jim McBee
BUY ON AMAZON
CompTIA Project+ Study Guide: Exam PK0-003
IT Project+ Study Guide
Scope Planning
Other Planning Processes
Appendix A Systems Development Life Cycle
Appendix B Standard IT Project Documents
Adobe After Effects 7.0 Studio Techniques
Previews and OpenGL
Conclusion
Details
32 Bits per Channel
Conclusion
Network Security Architectures
The Difficulties of Secure Networking
Device Hardening
Campus Security Design
Threat Mitigation
Real-World Applicability
Systematic Software Testing (Artech House Computer Library)
Test Execution
The Test Organization
Appendix A Glossary of Terms
Appendix B Testing Survey
Appendix E Simplified Unit Test Plan
SQL Hacks
Hack 42. Present Data Graphically Using SVG
Hack 45. Process Web Server Logs
Hack 66. Use Optimistic Locking
Hack 75. Minimize Bandwidth in One-to-Many Joins
Hack 84. Store Comma-Delimited Lists in a Column
Data Structures and Algorithms in Java
Encapsulation
Polymorphism
Thinking Recursively
Problems
C.4. Sums of Halves and Doubles
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies