Chapter 1: Microsoft Exchange Server 2007 Administration Overview
Figure 1-1: The Exchange Management Console.
Figure 1-2: The Exchange Management Shell.
Chapter 3: Managing Microsoft Exchange Server 2007 Clients
Figure 3-1: The Microsoft Outlook Startup Wizard automatically fills in your account information when you are logged on to a domain.
Figure 3-2: Specify incoming and outgoing mail server options with the Internet Connection Wizard.
Figure 3-3: Use the Advanced tab to configure how and when mail should be left on the server.
Figure 3-4: Use the Advanced tab to configure how folders are used with IMAP4 mail accounts.
Figure 3-5: Use the Create Or Open Outlook Data File dialog box to search for an existing .pst file or to create a new one.
Figure 3-6: Use the Add Users dialog box to delegate access to mailboxes.
Figure 3-7: Grant access to a folder through the Permissions tab.
Figure 3-8: To add, remove, or edit mail profiles, click Show Profiles to display this dialog box.
Chapter 4: Managing Mobile Messaging Users
Figure 4-1: Outlook Web Access has nearly all of the features of Outlook 2007.
Figure 4-2: Use the Mailbox Features tab to manage a user's mobile and Web access settings.
Figure 4-3: Use manual connection settings for working offline and dial-up networking.
Figure 4-4: Connect using a phone line, and then specify the dial-up networking connection to use.
Figure 4-5: The Filter dialog box lets you filter mail so that it meets specified criteria.
Figure 4-6: Connect to the Internet-facing Client Access server.
Chapter 5: Microsoft Exchange Server 2007 Administration Essentials
Figure 5-1: Message traffic between sites is routed over IP site links.
Figure 5-2: The configuration containers are used to manage the Exchange organization.
Figure 5-3: Organization Configuration extends to administrator roles as well as other organization-wide settings.
Figure 5-4: Specify the domain and domain controller to use.
Figure 5-5: Server Configuration settings apply to individual servers according to their role.
Figure 5-6: General properties provide additional configuration details for the selected server.
Figure 5-7: Recipient Configuration settings apply to individual recipients according to their type.
Figure 5-8: Specify the scope for recipient configuration.
Figure 5-9: Specify the number of recipients to display.
Figure 5-10: The Exchange data store has primary data files for each database as well as working files for the storage group.
Figure 5-11: The Exchange message queues are all stored in a single database.
Figure 5-12: Use the Services node of the Computer Management console to manage Exchange Server services.
Figure 5-13: For troubleshooting, you might want to change the service startup option in the Properties dialog box.
Figure 5-14: By using the Recovery tab in the Properties dialog box, you can configure services to automatically recover in case of failure.
Chapter 6: Configuring Microsoft Exchange Server with Exchange Management Shell
Figure 6-1: Start the Windows PowerShell.
Figure 6-2: Use the Exchange Management Shell to manage Exchange Server from the command line.
Chapter 7: User and Contact Administration
Figure 7-1: Access the Recipient Configuration node to work with mailboxes, distribution groups, and mail contacts.
Figure 7-2: Configure the user's domain settings.
Figure 7-3: Configure the user's Exchange mailbox.
Figure 7-4: Find the user account you want to mailbox-enable.
Figure 7-5: Configure the e-mail addresses for the user account.
Figure 7-6: You change wireless service and protocol options for users in the Properties dialog box for each user.
Figure 7-7: Configure the contact information.
Chapter 8: Mailbox Administration
Figure 8-1: You can schedule a meeting that includes a reserved room and equipment.
Figure 8-2: Select a room to use for the meeting.
Figure 8-3: View mailbox statistics.
Figure 8-4: Use the Move Mailbox wizard to move mailboxes.
Figure 8-5: You can apply individual delivery restrictions on a per-user basis.
Figure 8-6: You can apply send and receive restrictions on messages on a per-user basis.
Figure 8-7: Using the Delivery Options dialog box, you can specify alternate recipients for mailboxes and deliver mail to the current mailbox as well.
Figure 8-8: Using the Storage Quotas dialog box, you can specify storage limits and deleted item retention on a per-user basis when necessary.
Chapter 9: Working with Distribution Groups and Address Lists
Figure 9-1: Use the Select Group dialog box to select the existing universal security group to mailbox-enable.
Figure 9-2: Configure the group's domain settings.
Figure 9-3: Configure the filter settings.
Figure 9-4: Set the filter conditions.
Figure 9-5: Access online address lists and offline address books under the Organization Configuration node.
Figure 9-6: Determine a name and configure the address list.
Figure 9-7: Set the name and configure the offline address book.
Figure 9-8: Configure distribution points for the offline address book.
Chapter 10: Implementing Exchange Server 2007 Security
Figure 10-1: You can use Active Directory Users And Computers to manage Exchange administrator groups.
Figure 10-2: Use the Members tab to view and manage membership in the group.
Figure 10-3: Specify the name of the user, contact, computer, or group to add.
Figure 10-4: Use the Security tab to manage advanced permissions.
Figure 10-5: View Exchange administrators by selecting the Organization Configuration node.
Figure 10-6: Use the Add Exchange Administrator Wizard to assign Exchange administrator permissions.
Figure 10-7: Use the Audit Policy node in Group Policy to enable auditing.
Chapter 11: Managing Microsoft Exchange Server 2007 Data and Storage Groups
Figure 11-1: Set the storage group name and file locations.
Figure 11-2: Set the backup location for the storage group.
Figure 11-3: Move the storage group's files to new locations.
Chapter 12: Mailbox and Public Folder Database Administration
Figure 12-1: Enter a name for the new mailbox database.
Figure 12-2: Use the Limits tab to set storage limits and deleted item retention for individual mailboxes and entire mailbox databases.
Figure 12-3: Enter a name for the new public folder database.
Figure 12-4: Set the storage limits, age limits, and deleted item retention for a public folder database using the Limits tab.
Figure 12-5: Configure replication of public folder data using the Replication tab.
Figure 12-6: Move the database and its backup to new locations.
Chapter 13: Implementing Managed Folders and Managed Records
Figure 13-1: View the default managed folders.
Figure 13-2: View and set properties of a default managed folder.
Figure 13-3: Create a managed custom folder.
Figure 13-4: Specify how to control managed folder content.
Figure 13-5: Set journaling options as necessary.
Figure 13-6: View policies applied to folders.
Figure 13-7: Create a new policy.
Figure 13-8: Enable records management.
Chapter 14: Accessing and Managing Public Folders
Figure 14-1: Create a new public folder in the default public folder tree.
Figure 14-2: Use the Permissions tab to set permissions and assign roles for users. The role controls the actions the user can perform.
Chapter 15: Managing Hub Transport and Edge Transport Servers
Figure 15-1: Create a new SMTP Send connector.
Figure 15-2: Create a new SMTP Receive connector.
Figure 15-3: Create a New Edge Subscription.
Figure 15-4: Create a new accepted domain.
Figure 15-5: Create a new e-mail address policy.
Figure 15-6: Select options to generate e-mail addresses.
Figure 15-7: Create a new remote domain.
Figure 15-8: Use sender filtering to set restrictions on addresses and domains that can send mail to your organization.
Figure 15-9: Use recipient filtering to set restrictions for specific or invalid recipients.
Figure 15-10: Configure the Block List provider.
Chapter 16: Managing Client Access Servers
Figure 16-1: Select the Client Access server with which you want to work.
Figure 16-2: You can use the Advanced Web Site Identification dialog box to configure multiple identities for the virtual server.
Figure 16-3: Use the Performance tab to limit connections and set time-out values for each virtual server.
Figure 16-4: Use the Authentication Methods dialog box to set access control on virtual directories. Virtual directories can have different authentication settings than the virtual server.
Figure 16-5: Create the Exchange ActiveSync Mailbox policy.
Figure 16-6: Enable or disable direct file access for public computers.
Figure 16-7: Configure the direct file access settings.
Figure 16-8: Configure remote file server options.
Figure 16-9: Configure WebReady Document Viewing.
Chapter 17: Microsoft Exchange Server 2007 Maintenance, Monitoring, and Queuing
Figure 17-1: Use the Message Tracking tool to search for user messages, system messages, and postings to public folders.
Figure 17-2: Use the Logging Properties dialog box to set the log time, directory, and other properties.
Figure 17-3: Event Viewer displays events for the selected log.
Figure 17-4: View the status of essential services during troubleshooting.
Figure 17-5: Track performance objects and counters to monitor server performance.
Figure 17-6: Select the counters you want to monitor.
Figure 17-7: Configure the alert threshold.
Figure 17-8: Set actions that are executed when the alert occurs.
Figure 17-9: The Queue Viewer provides an overview of the status of each active queue.
Figure 17-10: The Queue Viewer provides a summary for each message in a queue.
Chapter 18: Backing Up and Restoring Microsoft Exchange Server 2007
Figure 18-1: The Windows Backup utility provides a user-friendly interface for backup and restore.
Figure 18-2: Choose the Exchange data to back up.
Figure 18-3: Use the Backup tab to configure backups by hand, and then click Start Backup.
Figure 18-4: Use the Backup Job Information dialog box to configure backup options and information as necessary, and then click Start Backup.
Figure 18-5: In the Restore Wizard, select the Exchange data you want to restore.
Figure 18-6: Use the Restore And Manage Media tab to specify the Exchange data to restore.