This self-paced training course combines notes, activities, and review questions to teach you how to design and deploy Exchange 2000 Server. It is designed to be completed from beginning to end, but you can choose a customized track and complete only the sections that interest you. (See the next section, "Finding the Best Starting Point for You," for more information.) If you choose the customized track option, see the "Before You Begin" section in each chapter. Any activities that require preliminary work from preceding chapters refer to the appropriate chapters.
The book is divided into the following chapters:
Because this book is self-paced, you can skip some lessons and revisit them later. Use the following table to find the best starting point for you:
If You | Follow This Learning Path |
Are preparing to take the Microsoft Certified Professional exam 70-225, Designing and Deploying a Messaging Infrastructure with Microsoft Exchange 2000 Server | Read the "Getting Started" section. Then work through Chapter 1, then Chapters 3-5, and then work through Chapters 6-11 in any order. |
Want to review information about specific topics from the exam | Use the "Where to Find Specific Skills in This Book" section that follows this table. |
Note
The following tables provide a list of the skills measured on MCP exam 70-225, Designing and Deploying a Messaging Infrastructure with Microsoft Exchange 2000 Server. The table lists the skill and where in this book you will find the lesson relating to that skill.
Analyzing Business Requirements
Skill Being Measured | Location in Book |
Analyze factors that influence organizational policy requirements. Factors include planned mergers and acquisitions and existing and planned human resources. | Chapters 3 and 4 |
Analyze the existing and planned business models. Considerations include user distribution and user mail needs and habits. | Chapters 3 and 4 |
Analyze the existing and planned business security model. | Chapter 3 |
Analyze the existing and planned administrative model. | Chapter 3 |
Analyze existing and planned resources. | Chapters 3 and 4 |
Analyze existing server roles. Factors include existing and anticipated server load. Roles include mailbox server, public folder server, and bridgehead server. | Chapters 3, 4, and 6 |
Analyze existing and planned network resources. Resources include hardware, available bandwidth, network topology, and firewall configuration. | Chapters 3, 4, and 7 |
Analyze existing directory and name resolution configurations. | Chapter 3 |
Analyze the impact of Exchange 2000 Server on the existing and planned network. Considerations include requirements for local authentication servers and local Global Catalog servers, delegation and rights assignments, bandwidth, and messaging traffic. | Chapters 3 and 4 |
Analyze the existing messaging system architecture and potential changes to this architecture. | Chapter 4 |
Analyze existing messaging client configurations. Considerations include hardware, operating system, access methods, existing message store requirements, and existing messaging client. | Chapters 4 and 7 |
Designing an Exchange 2000 Server Messaging Solution
Skill Being Measured | Location in Book |
Design an Exchange 2000 Server routing group topology. | Chapters 5 and 6 |
Design an Exchange 2000 Server administrative model. Considerations include organizational unit (OU) structure, policies, administrative group placement and boundaries, permissions, and multiple stores. | Chapters 3, 5, and 6 |
Design an Exchange 2000 Server real-time collaboration solution that uses Chat Service, Instant Messaging, or both. | Chapters 1 and 8 |
Plan public folder usage and implementation. Considerations include company structure, geographical structure, maintenance policies, permissions, replication, and indexing. | Chapters 5, 6, and 10 |
Design an Exchange 2000 Server security plan. Secure the Exchange 2000 Server infrastructure against external and internal attacks. | Chapter 9 |
Design an authentication and encryption strategy. Considerations include user authentication and encryption requirements, such as Secure/Multipurpose Internet Mail Extensions (S/MIME), Key Management Service (KMS), Internet Protocol Security (IPSec), Windows NT challenge/ response protocol (NTLM), digest authentication, and Secure Sockets Layer (SSL). | Chapters 8 and 9 |
Plan for coexistence of Exchange 2000 Server with other messaging systems, such as Lotus Notes, Lotus cc:Mail, Novell GroupWise, MS Mail, Professional Office System (PROFS), TAO, and System Network Architecture Distribution Services (SNADS). | Chapters 6 and 7 |
Plan for coexistence with Exchange Server 5.5. | Chapter 6 |
Design interorganizational connectivity and synchroni- zation. Considerations include existing Active Directory environment, existing Domain Name System (DNS) configuration, Active Directory Connector (ADC) configuration, security, permissions, and administrative permissions and delegation. | Chapter 3 |
Designate and design servers. | Chapters 3, 5, 8, 10, and 11 |
Plan traffic flow. Considerations include ADC computer and bridgeheads, routing group boundaries, bandwidth, directory replication, public folder replication, existing network connection, and Site Replication Service (SRS). | Chapters 5 and 6 |
Design server hardware and disk configurations to achieve fault tolerance and increased performance and to provide for a backup strategy, based on server role. | Chapters 10 and 11 |
Design an upgrade or migration strategy. Considerations include primary versus nonprimary connections and use of the appropriate version of ADC. | Chapter 6 |
Design a strategy for mail access. Messaging clients include Messaging Application Programming Interface (MAPI), Internet Message Access Protocol 4 (IMAP4), Post Office Protocol 3 (POP3), and Hypertext Transfer Protocol (HTTP) mail. | Chapters 8 and 9 |
Designing for Fault Tolerance and Data Recovery
Skill Being Measured | Location in Book |
Design a backup solution. Considerations include planning backup scope, defining the backup schedule, media storage and rotation, and backup type. | Chapter 11 |
Design a recovery solution. Considerations include recovering the entire messaging system, individual databases, and servers; reassociating user mailboxes with accounts; and designing mailbox stores to support recovery. | Chapter 11 |
Design fault-tolerance solutions. | Chapters 8 and 10 |
Deploying an Exchange 2000 Server Messaging Solution
Skill Being Measured | Location in Book |
Deploy routing groups and foreign connectors. | Chapters 3, 4, 5, 6, and 7 |
Deploy administrative groups. | Chapters 3, 5, and 6 |
Plan deployments of messaging clients, such as MAPI, IMAP4, POP3, and HTTP mail. | Chapters 1, 5, and 8 |
Deploy an Exchange 2000 Server messaging solution in a cluster. | Chapter 10 |
Diagnose and resolve coexistence problems. | Chapters 3, 4, and 7 |
Diagnose and resolve other deployment problems, such as failed deployments that require a rollback to Exchange Server 5.5. | Chapters 5, 6, 7, 8, and 11 |