Index_P


P

packet filters, 11-3

parent folders, 8-26 to 8-27

password migration, 5-18 to 5-20

/Password password switch, 2-20

payload, 11-12

PDC Emulator, 1-6, 1-17

performance

accelerating front-end servers, 3-29

monitoring network, 13-5

Performance console

configuring, 13-22 to 13-23

defined, 13-51

summary points, 13-51

System Manager and Performance Logs And Alerts, 13-6

performance counters, 14-16 to 14-18

adding, 14-21 to 14-22

diagnosing server health with, 14-16 to 14-18

virtual memory fragmentation, 14-19 to 14-20, 14-25

Performance Optimizer, 7-52

perimeter network. See demilitarized zone (DMZ)

permissions

administrative, 11-36 to 11-45

allowing Relay Permissions for POP3 and IMAP4 users, 10-55

clustering and, 6-11

configuring on public folder store, 14-32 to 14-34

incorrectly configured, 14-27

installation failures and sufficient, 14-6 to 14-7

mailbox, 7-24 to 7-25, 7-28 to 7-29, 7-42

public folder, 8-28 to 8-32, 14-31 to 14-34

questions and answers, 11-44, 11-65

removing groups rather than denying, 10-54

required for Exchange installation, 2-7

setting on virtual directory, 9-28

summary points, 11-45

troubleshooting, 14-39 to 14-40, 14-44

write and delete, 14-34 to 14-35

per-user options

IMAP4 client, 10-48 to 10-49

overriding global defaults with, 10-56

POP3 clients, 10-50 to 10-51

Pickup folder, 10-8

ping utility, 14-53, 14-57 to 14-58

PKI (public key infrastructure), 11-31, 11-62

planning Exchange Server infrastructure, 2-1 to 2-54

case scenario exercise, 2-40 to 2-43, 2-52 to 2-54, 3-42 to 3-44

creating service account, 2-6 to 2-7

forest and domain preparation, 2-12 to 2-18, 2-46

.ini file for unattended setup, 2-28 to 2-32

installation hardware requirements, 2-5 to 2-6, 2-45

installing Exchange Server, 2-19 to 2-27

key terms, 2-46

overview, 2-1 to 2-2

practice exercises, 2-8 to 2-10, 2-15 to 2-16

preparing for installation, 2-3 to 2-11

questions and answers, 2-10 to 2-11, 2-17, 2-26 to 2-27, 2-33 to 2-34, 2-39 to 2-40, 2-47 to 2-54

removing Exchange Server from organization, 2-35 to 2-40, 2-44 to 2-45

required Windows services, 2-7 to 2-10

summary points, 2-11, 2-18, 2-27, 2-34, 2-40, 2-45 to 2-26

supported combinations of Exchange and Windows Server, 2-3 to 2-5

unattended setup, 2-28 to 2-34

PolCheck tool, 4-24

POP3 (Post Office Protocol version 3)

about, 1-13

accessing Exchange inboxes with, 10-36

allowing Relay Permissions for users, 10-55

defined, 10-57

encrypting SMTP message delivery for clients, 10-26

unable to deliver e-mail, 10-36, 10-41 to 10-42

POP3 clients

calendaring with, 10-43

configuring, 10-42 to 10-43, 10-49 to 10-51

per-user options, 10-50 to 10-51

relaying mail with SMTP virtual server for, 10-43

SMTP support for sending e-mail for, 10-42

POP3 virtual servers

additional, 9-20

authentication options on back-end server, 9-46

configuring, 9-21 to 9-22

creating, 9-30

enabling and starting, 9-16 to 9-17

examining settings on front-end server, 9-49 to 9-50

overview, 9-5 to 9-7, 9-19

SASL authentication for clients, 9-42

SSL for, 9-6

summary points, 9-51

supported authentication methods, 9-43

ports

blocking unused, 11-46

configuring RPC proxy server to use specific, 11-7 to 11-8

Exchange Server, 11-6, 14-37

special, 14-38

TCP port filtering, 11-4 to 11-5

postmaster account, 10-38 to 10-39

postmaster mailbox, 13-27 to 13-28

practice exercises

address lists and recipient policies, 7-69 to 7-70

authenticating virtual servers, 9-44 to 9-50

backups, 12-22 to 12-26

configuration steps after installation, 3-8 to 3-10

connecting with Exchange Server 5.5 with Active

Directory, 4-8 to 4-20

information stores, 7-54 to 7-55

installing Exchange Server, 2-21 to 2-26, 4-29 to 4-32, 6-12 to 6-16, 6-29 to 6-30, 6-32

limiting permissions to public folders, 14-31 to 14-34

managing Exchange Server cluster, 6-23 to 6-27

merging duplicate accounts, 4-38 to 4-41

migrating Active Directory user accounts, 5-15 to 5-22

MX records, 10-15 to 10-16

netdiag and dcdiag command-line utility, 14-10 to 14-14

on-demand monitoring and maintenance, 13-39 to 13-41

preparing forests and domains, 2-15 to 2-16

public folder trees, 8-8 to 8-9

public folders, 8-23 to 8-24, 8-32

restoring data, 12-37 to 12-44

security, 11-5 to 11-6, 11-20, 11-32 to 11-35

service account, 2-8 to 2-9

SMTP, 10-27 to 10-34, 10-41 to 10-49

SMTP connectors, 10-17 to 10-18, 10-30

unattended Exchange Server installation, 2-31 to 2-32

virtual servers, 9-15 to 9-18, 9-25 to 9-39, 9-45 to 9-50, 9-53

preparing forests and domains, 2-12 to 2-18

DomainPrep, 2-15 to 2-16, 2-18, 2-46

ForestPrep, 2-12 to 2-16, 2-18, 2-46

overview, 2-12

practice exercises, 2-15 to 2-16

questions and answers, 2-17, 2-48 to 2-49

primary and resource mailboxes, 4-12

Principle of Least Privilege, 9-16, 10-27, 14-23

private keys, 11-31

PrivFoldCheck tool, 4-25 to 4-26

protocol logging, 11-46 to 11-55

configuring, 11-53 to 11-55, 13-23 to 13-25, 13-28 to 13-30

defined, 11-51

formats for, 11-51 to 11-52

overview, 11-46

questions and answers, 11-55 to 11-56, 11-65 to 11-66

summary points, 11-56, 11-61, 14-35

protocol virtual servers. See virtual servers

proxy servers, 11-3

PubFoldCheck tool, 4-24 to 4-25

public folder indexes, 12-24 to 12-25

public folder recipients, 7-6

public folder referrals, 8-22 to 8-23

public folder stores

configuring permissions on, 14-32 to 14-34

creating, 8-8 to 8-9

defragmenting, 13-35

policies for, 14-19

storage limits, 8-18 to 8-19

verifying integrity of, 13-35

public folder trees, 8-7 to 8-8

accessing, 8-10 to 8-11

creating, 8-8 to 8-9

Default, 8-7, 8-12

defined, 8-39

General Purpose, 8-7 to 8-8

manual replication of, 8-21 to 8-22

practice exercises for, 8-8 to 8-9

questions and answers, 8-11 to 8-12, 8-40

public folders, 8-1 to 8-44. See also public folder trees

administrative rights for, 8-27, 8-31 to 8-32, 8-34

age limits on storage, 8-19

case scenario exercise, 8-34 to 8-36, 8-43 to 8-44

configuring folder e-mail addresses, 8-13 to 8-14

creating, 8-3 to 8-7, 8-9

Default public folder trees, 8-7, 8-12

directory rights for, 8-27, 8-31, 8-34

function of, 8-1 to 8-2

General Purpose public folder trees, 8-7 to 8-8

inherited and assigned permissions, 8-26 to 8-27

key terms, 8-38 to 8-39

limiting permissions, 14-31 to 14-34

mail delivery restrictions, 8-14 to 8-16

mail-enabling folders, 8-13, 8-23 to 8-24, 8-37

managing e-mail properties, 8-13 to 8-17

monitoring, 13-7 to 13-8

moving, 8-19, 8-25

permissions, 8-26 to 8-32, 14-31 to 14-34

practice exercises, 8-8 to 8-9, 8-23 to 8-24, 8-32

public folder trees, 8-7 to 8-8

questions and answers, 8-11 to 8-12, 8-24 to 8-25, 8-33 to 8-34, 8-40 to 8-44

referrals, 8-22 to 8-23

removing, 13-8

replication, 8-19 to 8-22, 8-24

restoring, 12-32 to 12-33, 14-27

security, 8-26 to 8-34

setting storage limits, 8-18 to 8-19

summary points, 8-12, 8-25, 8-34, 8-37 to 8-38

tasks in, 8-13

top-level folders, 8-39

troubleshooting, 14-26 to 14-27

troubleshooting lab, 8-36 to 8-37

using, 8-2 to 8-3

Public Folders container, 8-6

public key encryption, 11-30 to 11-31

public key infrastructure (PKI), 11-31, 11-62

public stores. See public folder stores

pull relationship, 10-26




MCSA/MCSE Self-Paced Training Kit (Exam 70-284(c) Implementing and Managing Microsoft Exchange Server 2003)
MCSA/MCSE Self-Paced Training Kit (Exam 70-284): Implementing and Managing MicrosoftВ® Exchange Server 2003 (Pro-Certification)
ISBN: 0735618992
EAN: 2147483647
Year: 2003
Pages: 221

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net