You are previewing Mastering Microsoft® Exchange Server 2010.
O'Reilly logo
Mastering Microsoft® Exchange Server 2010

Book Description

A top-selling guide to Exchange Server-now fully updated for Exchange Server 2010.

Keep your Microsoft messaging system up to date and protected with the very newest version, Exchange Server 2010, and this comprehensive guide. Whether you're upgrading from Exchange Server 2007 SP1 or earlier, installing for the first time, or migrating from another system, this step-by-step guide provides the hands-on instruction, practical application, and real-world advice you need.

  • Explains Microsoft Exchange Server 2010, the latest release of Microsoft's messaging system that protects against spam and viruses and allows for access to e-mail, voicemail, and calendars from a variety devices and any location

  • Helps you thoroughly master the new version with step-by-step instruction on how to install, configure, and manage this multifaceted collaboration system

  • Covers planning and design, installation, administration and management, maintenance and more

Install or update your Microsoft Exchange Server with this guide, then keep it on hand for a comprehensive reference.

Table of Contents

  1. Copyright
  2. Dear Reader,
  3. Acknowledgments
  4. About the Authors
  5. Introduction
    1. Improvements to Exchange Server 2010
    2. Windows Server 2008
    3. What You Need to Run Exchange Server
    4. How This Book Is Organized
      1. Part 1: Exchange Fundamentals
      2. Part 2: Getting Exchange Running
      3. Part 3: Recipient Administration
      4. Part 4: Server Administration
      5. Part 5: Troubleshooting, Operations, and Monitoring
    5. Conventions Used in This Book
  6. 1. Exchange Fundamentals
  7. 1. Introducing Exchange Server 2010
    1. 1.1. Getting to Know Exchange Server 2010
    2. 1.2. Exchange Server Architecture
      1. 1.2.1. x64 Processor Requirement
      2. 1.2.2. Windows Server 2008 x64
      3. 1.2.3. Installer, Service Pack, and Patching Improvements
      4. 1.2.4. Server Roles
      5. 1.2.5. Edge Transport Services
      6. 1.2.6. Unified Messaging
      7. 1.2.7. Improved High-Availability Features
        1. 1.2.7.1. Continuous Replication Basics
        2. 1.2.7.2. Mailbox Database Mobility
      8. 1.2.8. MAPI and Directory on the Middle Tier
      9. 1.2.9. Content Storage Improvements
        1. 1.2.9.1. Mailbox Databases
        2. 1.2.9.2. Smaller Transaction Logs
        3. 1.2.9.3. Improved Search Features
      10. 1.2.10. Exchange Server Management
    3. 1.3. Improved Message and Content Control
      1. 1.3.1. Messaging Records Management
      2. 1.3.2. Built-In Archiving
      3. 1.3.3. Message Transport Rules
      4. 1.3.4. Per-User Journaling
      5. 1.3.5. Message Classifications
      6. 1.3.6. Rights Management Service Message Protection
      7. 1.3.7. New Programming Interfaces
        1. 1.3.7.1. Exchange Management
        2. 1.3.7.2. Transport Agents
        3. 1.3.7.3. Exchange-Managed APIs
        4. 1.3.7.4. Web Services
    4. 1.4. Client-Side Features
      1. 1.4.1. Schedulable and Internal/External Out-of-Office Messages
      2. 1.4.2. Improved Calendaring and Resource Management
        1. 1.4.2.1. Resource Management
        2. 1.4.2.2. Calendar Concierge
        3. 1.4.2.3. Availability Service
        4. 1.4.2.4. Autodiscover
      3. 1.4.3. New and Improved Outlook Web App
      4. 1.4.4. Windows Mobile and Improved Security
    5. 1.5. Now, Where Did That Go?
      1. 1.5.1. Deemphasized Functions
      2. 1.5.2. Features No Longer Included
        1. 1.5.2.1. Exchange Server 2003 Features Removed from Exchange Server 2010
        2. 1.5.2.2. Exchange Server 2007 Features Removed from Exchange 2010
    6. 1.6. Clearing Up Some Confusion
    7. 1.7. The Bottom Line
  8. 2. Introduction to Email Administration
    1. 2.1. Introducing Email
      1. 2.1.1. A Brief HistoryofEmail
        1. 2.1.1.1. Slow Initial Adoption
        2. 2.1.1.2. Improving the Interface
        3. 2.1.1.3. Attachments
        4. 2.1.1.4. Shared Files
      2. 2.1.2. About Messaging Services
        1. 2.1.2.1. How Messaging Services Are Used
        2. 2.1.2.2. How Messaging Servers Work
      3. 2.1.3. Application Networking Models
        1. 2.1.3.1. Shared-File Applications
        2. 2.1.3.2. Client/Server Applications
    2. 2.2. Things Every Email Administrator Should Know
      1. 2.2.1. Finding Answers
        1. 2.2.1.1. Helpful Resources
        2. 2.2.1.2. Calling for Support
      2. 2.2.2. A Day in the Life of the Email Administrator
        1. 2.2.2.1. Daily Administrative Tasks
        2. 2.2.2.2. Communicating with Your Users
        3. 2.2.2.3. Preparing Reports
        4. 2.2.2.4. Scheduled Downtime, Patches, and Service Packs
      3. 2.2.3. Tools You Should Know
    3. 2.3. What Is Exchange Server?
      1. 2.3.1. History of Exchange
      2. 2.3.2. The Universal Inbox
      3. 2.3.3. Many Modes of Access
      4. 2.3.4. Architecture Overview
        1. 2.3.4.1. Exchange as a Client/Server Mail System
        2. 2.3.4.2. The Extensible Storage Engine (ESE)
        3. 2.3.4.3. Exchange and Active Directory
      5. 2.3.5. Controlling Mailbox Growth
      6. 2.3.6. Personal Folders or PST Files
      7. 2.3.7. Email Archiving
      8. 2.3.8. Messaging-Enabled Applications
      9. 2.3.9. Objects
      10. 2.3.10. Public Folders
      11. 2.3.11. Electronic Forms
    4. 2.4. The Bottom Line
  9. 3. Standards and Protocols
    1. 3.1. Components of an Email System
    2. 3.2. Defining the Standards
    3. 3.3. Active Directory: The Foundation of Exchange 2010
      1. 3.3.1. Finding Messaging Hosts with the Domain Name System
        1. 3.3.1.1. Fully Qualified Domain Names
        2. 3.3.1.2. Canonical Addresses
        3. 3.3.1.3. Aliases
        4. 3.3.1.4. Reverse Pointers
        5. 3.3.1.5. Mail Exchangers
        6. 3.3.1.6. Sender Policy Framework
        7. 3.3.1.7. Service Location
        8. 3.3.1.8. Split Brain DNS
        9. 3.3.1.9. Disjoint DNS namespace
      2. 3.3.2. Finding People and Services with Directory Services
      3. 3.3.3. Kerberos
    4. 3.4. Other Key Technologies Used by Exchange
      1. 3.4.1. Moving Messages with the Simple Mail Transport Protocol
      2. 3.4.2. Accessing Mailboxes with Message Access Protocols
        1. 3.4.2.1. The Messaging Application Programming Interface
        2. 3.4.2.2. HTTP and Exchange Server
        3. 3.4.2.3. POP3 and IMAP
      3. 3.4.3. Securing Network Sessions with TLS and SSL
    5. 3.5. The Bottom Line
  10. 4. Understanding Availability, Recovery, and Compliance
    1. 4.1. Changing from a Technology to a Business Viewpoint
    2. 4.2. What's in a Name?
      1. 4.2.1. Backup and Recovery
      2. 4.2.2. Disaster Recovery
      3. 4.2.3. Location, Location, Location
        1. 4.2.3.1. On-Premise Solutions
        2. 4.2.3.2. Off-Premise Solutions
      4. 4.2.4. Management Frameworks
        1. 4.2.4.1. ITIL
        2. 4.2.4.2. MOF
    3. 4.3. A Closer Look at Availability
      1. 4.3.1.
        1. 4.3.1.1. Service Availability
        2. 4.3.1.2. Network Availability
        3. 4.3.1.3. Data Availability
    4. 4.4. Storage Availability
      1. 4.4.1. An Overview of Exchange Storage
      2. 4.4.2. Direct Attached Storage
      3. 4.4.3. Storage Area Networks
    5. 4.5. Compliance and Governance
    6. 4.6. The Bottom Line
  11. 5. Message Security and Hygiene
    1. 5.1. Transport Security
      1. 5.1.1. SSL: Pick Your Port
      2. 5.1.2. How SSL Works
      3. 5.1.3. Enter Transport Layer Security
      4. 5.1.4. Opportunistic TLS
      5. 5.1.5. Domain Security
    2. 5.2. Message-Level Security
      1. 5.2.1. S/MIME
      2. 5.2.2. Rights-Managed Email
    3. 5.3. Mail Hygiene
      1. 5.3.1. Blocking Unsolicited Messages
      2. 5.3.2. Levels of Inspection
      3. 5.3.3. Why Is My Mail Being Rejected?
    4. 5.4. The Bottom Line
  12. 6. Introduction to PowerShell and the Exchange Management Shell
    1. 6.1. Why Use PowerShell?
    2. 6.2. Understanding the Command Syntax
      1. 6.2.1. Verbs and Nouns
      2. 6.2.2. Help
      3. 6.2.3. The -Identity Parameter
      4. 6.2.4. Cmdlet vs. Command
      5. 6.2.5. Cmdlet Parameters
      6. 6.2.6. Tab Completion
      7. 6.2.7. Alias
    3. 6.3. Object-Oriented Use of PowerShell
      1. 6.3.1. Filtering Output
      2. 6.3.2. Formatting Output
      3. 6.3.3. Directing Output to Other Cmdlets
    4. 6.4. PowerShell v2
      1. 6.4.1. Integrated Scripting Environment
      2. 6.4.2. Remote PowerShell
    5. 6.5. Tips and Tricks
      1. 6.5.1. Managing Output
        1. 6.5.1.1. Output to Lists or Tables
        2. 6.5.1.2. Sorting and Grouping Output
        3. 6.5.1.3. Output to File
      2. 6.5.2. Out-GridView
        1. 6.5.2.1. Putting It All Together
      3. 6.5.3. Running Scripts
      4. 6.5.4. Running Scheduled PowerShell Scripts
      5. 6.5.5. Debugging and Troubleshooting from PowerShell
    6. 6.6. Getting Help
      1. 6.6.1. Exchange Server 2010 Help File
      2. 6.6.2. Help from the Command Line
      3. 6.6.3. Getting Tips
      4. 6.6.4. Learning from the Graphical User Interface
    7. 6.7. The Bottom Line
  13. 7. Exchange Autodiscover
    1. 7.1. Autodiscover Concepts
      1. 7.1.1. What Autodiscover Provides
        1. 7.1.1.1. Client Benefits
        2. 7.1.1.2. Server Benefits
      2. 7.1.2. How Autodiscover Works
        1. 7.1.2.1. The Service Connection Point Object
        2. 7.1.2.2. DNS Options
        3. 7.1.2.3. Two Step-by-Step Examples
      3. 7.1.3. Advanced Autodiscover Concepts
        1. 7.1.3.1. Site Affinity
    2. 7.2. Planning Certificates for Autodiscover
      1. 7.2.1. The X.509 Certificate Standard
      2. 7.2.2. Deploying Exchange Certificates
        1. 7.2.2.1. Planning Certificate Names
        2. 7.2.2.2. Issuing and Enabling Certificates with EMC
        3. 7.2.2.3. Issuing and Enabling Certificates with EMS
    3. 7.3. The Bottom Line
  14. 8. Virtualizing Exchange Server 2010
    1. 8.1. Virtualization Overview
      1. 8.1.1. Terminology
      2. 8.1.2. Understanding Virtualized Exchange
      3. 8.1.3. Understanding Your Exchange Environment
    2. 8.2. Benefits of Virtualization
      1. 8.2.1. Environmental Impact
      2. 8.2.2. Datacenter Impact
    3. 8.3. Virtualization Requirements
      1. 8.3.1. Hardware Requirements
      2. 8.3.2. Software Requirements
    4. 8.4. Operations
    5. 8.5. Deciding What to Virtualize
      1. 8.5.1. Exchange Roles
      2. 8.5.2. Performance Counters
      3. 8.5.3. Testing
    6. 8.6. Possible Times to Virtualize
      1. 8.6.1. Small Office/Remote or Branch Office
      2. 8.6.2. Site Resilience
      3. 8.6.3. Mobile Scenario
    7. 8.7. The Bottom Line
  15. 9. Exchange Server, Email, and SharePoint 2007
    1. 9.1. SharePoint Overview
    2. 9.2. Outlook Integration
      1. 9.2.1. Integration Overview
      2. 9.2.2. Calendar Integration
      3. 9.2.3. Creating a Meeting Workspace
      4. 9.2.4. Contact Integration
      5. 9.2.5. Task Integration
      6. 9.2.6. Alert Integration
      7. 9.2.7. Document Library Integration
      8. 9.2.8. Outlook 2003 Integration
    3. 9.3. Email Integration
      1. 9.3.1. Configuring Outgoing Email
      2. 9.3.2. Configuring Incoming Email
        1. 9.3.2.1. Directory Management Service
        2. 9.3.2.2. Troubleshooting Incoming Email
    4. 9.4. Indexing Exchange Public Folders
      1. 9.4.1. Defining a Content Source
    5. 9.5. The Bottom Line
  16. 2. Getting Exchange Running
  17. 10. Exchange Server 2010 Quick Start Guide
    1. 10.1. Server Sizing Quick Reference
      1. 10.1.1. Hardware
        1. 10.1.1.1. Memory
        2. 10.1.1.2. Processors
        3. 10.1.1.3. Disk Space
        4. 10.1.1.4. Network
        5. 10.1.1.5. Server Virtualization
      2. 10.1.2. Operating System
    2. 10.2. Configuring Windows Server 2008 R2
      1. 10.2.1.
        1. 10.2.1.1. Active Directory Requirements
        2. 10.2.1.2. Operating System Prerequisites
    3. 10.3. Installing Exchange Server 2010
      1. 10.3.1. GUI-Based Installation
      2. 10.3.2. Unattended Installation
    4. 10.4. Post Installation Configuration Steps
      1. 10.4.1. Configuring the Mailbox Role
      2. 10.4.2. Configuring the Hub Transport Role
        1. 10.4.2.1. Configuring Email Address Policies
        2. 10.4.2.2. Send Connectors
        3. 10.4.2.3. Receive Connectors
        4. 10.4.2.4. Installing Antispam Agents
        5. 10.4.2.5. Testing the Configuration
    5. 10.5. Configuring Recipients
      1. 10.5.1. Creating Distribution Groups
      2. 10.5.2. Organizational Health
      3. 10.5.3. Configuring a Postmaster Address
      4. 10.5.4. SSL Certificate
      5. 10.5.5. Entering the Product Key
        1. 10.5.5.1. Testing Outlook Web App
    6. 10.6. The Bottom Line
  18. 11. Understanding Server Roles and Configurations
    1. 11.1. The Importance of Server Roles
    2. 11.2. Exchange 2010 Server Roles
      1. 11.2.1. Mailbox Server
      2. 11.2.2. Hub Transport Server
      3. 11.2.3. Client Access Server
      4. 11.2.4. Unified Messaging Server
      5. 11.2.5. Edge Transport Server
    3. 11.3. Possible Role Configurations
      1. 11.3.1. Combined Function Server
      2. 11.3.2. Scaling Exchange Server 2010 Roles
    4. 11.4. The Bottom Line
  19. 12. Exchange Server 2010 Requirements
    1. 12.1. Getting the Right Server Hardware
      1. 12.1.1. The Typical User
      2. 12.1.2. CPU Recommendations
        1. 12.1.2.1. Hub Transport CPU Considerations
        2. 12.1.2.2. Client Access Server CPU Considerations
        3. 12.1.2.3. Mailbox Server CPU Considerations
        4. 12.1.2.4. Scaling to Dedicated Servers Roles
      3. 12.1.3. Memory Recommendations
      4. 12.1.4. Network Requirements
      5. 12.1.5. Disk Requirements
        1. 12.1.5.1. Improved Caching and Reduced I/O Profiles
        2. 12.1.5.2. Mailbox Storage
        3. 12.1.5.3. Planning for Mail Growth
        4. 12.1.5.4. Email Archiving and Mail Storage
    2. 12.2. Software Requirements
      1. 12.2.1. Operating System Requirements
      2. 12.2.2. Additional Software
      3. 12.2.3. Windows Server Roles and Features
        1. 12.2.3.1. Preparing Windows 2008 for the Mailbox Role
        2. 12.2.3.2. Preparing Windows 2008 for the Hub Transport Role
        3. 12.2.3.3. Preparing Windows 2008 for the Client Access Role
        4. 12.2.3.4. Preparing Windows 2008 for the Unified Messaging Role
        5. 12.2.3.5. Preparing Windows 2008 for a Combined Function Server
        6. 12.2.3.6. Preparing Windows 2008 for the Edge Transport Role
    3. 12.3. Additional Requirements
      1. 12.3.1. Active Directory Requirements
      2. 12.3.2. Installation and Preparation Permissions
      3. 12.3.3. Coexisting with Previous Versions of Exchange Server
        1. 12.3.3.1. Coexistence with Exchange Server 2003
        2. 12.3.3.2. Coexistence with Exchange Server 2007
    4. 12.4. The Bottom Line
  20. 13. Installing Exchange Server 2010
    1. 13.1. Before You Begin
    2. 13.2. Preparing for Exchange 2010 Ahead of Time
      1. 13.2.1. Existing Exchange Organizations
      2. 13.2.2. Preparing the Schema
      3. 13.2.3. Preparing the Active Directory Forest
      4. 13.2.4. Preparing Additional Domains
    3. 13.3. Graphical User Interface Setup
    4. 13.4. Command-Line Setup
      1. 13.4.1. Command-Line Installation Options
      2. 13.4.2. Command-Line Server Recovery Options
      3. 13.4.3. Command-Line Delegated Server Installation
      4. 13.4.4. Installing Language Packs
    5. 13.5. The Bottom Line
  21. 14. Upgrades and Migrations
    1. 14.1. Upgrades, Migrations, or Transitions
      1. 14.1.1. Exchange 2003 Migration Overview
        1. 14.1.1.1. Migration to New Server Hardware
        2. 14.1.1.2. Leapfrog Migration
      2. 14.1.2. Exchange 5.5 Migrations
      3. 14.1.3. Considering Messaging Connectors
      4. 14.1.4. Legacy Exchange and Third-Party Services
    2. 14.2. Factors to Consider Before Upgrading
      1. 14.2.1. Prerequisites
        1. 14.2.1.1. Hardware and Operating System
        2. 14.2.1.2. Active Directory
        3. 14.2.1.3. Exchange Version
      2. 14.2.2. Setting the Legacy Routing Server Parameter
    3. 14.3. Choosing Your Strategy
      1. 14.3.1. Comparing the Strategies
        1. 14.3.1.1. Migrating Your Exchange Organization
        2. 14.3.1.2. Upgrading Your Exchange Organization
        3. 14.3.1.3. An Overview of Transition
        4. 14.3.1.4. Order of Installation for Exchange 2010 Roles
        5. 14.3.1.5. Client Access Servers
        6. 14.3.1.6. Hub Transport Servers
        7. 14.3.1.7. Mailbox Servers
        8. 14.3.1.8. Edge Transport Servers
        9. 14.3.1.9. Unified Messaging Servers
    4. 14.4. Management Consoles
    5. 14.5. Coexistence
    6. 14.6. Performing an Interorganization Migration
      1. 14.6.1. Is Interorganization Migration the Right Approach?
        1. 14.6.1.1. Choosing the Right Tools
        2. 14.6.1.2. Maintaining Interoperability
          1. 14.6.1.2.1. Light-Switch Migrations
          2. 14.6.1.2.2. Interoperability Factors
      2. 14.6.2. Preparing for Migration
      3. 14.6.3. Moving Mailboxes Using the New-MoveRequest Feature
        1. 14.6.3.1. Migrating User Accounts
        2. 14.6.3.2. Permissions Required
        3. 14.6.3.3. New-MoveRequest Required Parameters
      4. 14.6.4. Importing Data from PST
    7. 14.7. The Bottom Line
  22. 3. Recipient Administration
  23. 15. Management Permissions and Role-Based Administration (RBAC)
    1. 15.1. RBAC Basics
      1. 15.1.1. Differences from Previous Exchange Versions
      2. 15.1.2. How RBAC Works
        1. 15.1.2.1. RBAC for Administrators
        2. 15.1.2.2. RBAC for End Users
    2. 15.2. Managing RBAC
      1. 15.2.1. Exchange Control Panel
      2. 15.2.2. Exchange Management Shell
    3. 15.3. Defining Roles
      1. 15.3.1. What's in a Role?
      2. 15.3.2. Choosing a Role
      3. 15.3.3. Customizing Roles
        1. 15.3.3.1. How a Custom Role Works
        2. 15.3.3.2. Defining Custom Roles
        3. 15.3.3.3. Unscoped Top-Level Roles: The Exception
    4. 15.4. Distributing Roles
      1. 15.4.1. Determining Where Roles Will Be Applied
        1. 15.4.1.1. Inherited Scopes
        2. 15.4.1.2. Using Predefined Scopes
        3. 15.4.1.3. Creating Custom Scopes
      2. 15.4.2. Assigning Roles to Administrators
        1. 15.4.2.1. How Roles Are Assigned to Administrators
        2. 15.4.2.2. Adding Administrators to a Role Group
        3. 15.4.2.3. Modifying Role Groups
        4. 15.4.2.4. Directly Assigning Roles to Administrators
      3. 15.4.3. Assigning Roles to End Users
        1. 15.4.3.1. How Roles Are Assigned to End Users
        2. 15.4.3.2. Default User Roles
        3. 15.4.3.3. Working with Role Assignment Policies
    5. 15.5. The Bottom Line
  24. 16. Basics of Recipient Management
    1. 16.1. Exchange Recipients
      1. 16.1.1. Mailbox-Enabled Users (Mailbox)
      2. 16.1.2. Mail-Enabled User
      3. 16.1.3. Mail-Enabled Contacts
      4. 16.1.4. Mail-Enabled Groups
      5. 16.1.5. Mail-Enabled Public Folders
    2. 16.2. Defining Email Addresses
      1. 16.2.1. Accepted Domains
        1. 16.2.1.1. Setting Up an Accepted Domain Using the EMC
        2. 16.2.1.2. Setting Up an Accepted Domain Using the EMS
          1. 16.2.1.2.1. About Domain Types
      2. 16.2.2. Email Address Policies
        1. 16.2.2.1. Changing an Existing Policy
        2. 16.2.2.2. Creating a New Email Address Policy
    3. 16.3. The Bottom Line
  25. 17. Managing Mailboxes and Mailbox Content
    1. 17.1. Managing Mailboxes
      1. 17.1.1. Using the EMC to Assign a Mailbox
      2. 17.1.2. Assigning a Mailbox to More than One User
      3. 17.1.3. Assigning a Mailbox to a User from the EMS
        1. 17.1.3.1. Assigning Permissions to a Mailbox Using the EMS
        2. 17.1.3.2. Assigning Full Access Permission
        3. 17.1.3.3. Assigning Send As Permission
      4. 17.1.4. Creating a New User and Assigning a Mailbox Using the EMC
      5. 17.1.5. Managing User and Mailbox Properties
        1. 17.1.5.1. Using the EMC to Manage User and Mailbox Properties
        2. 17.1.5.2. Using the EMS to Manage User Properties
        3. 17.1.5.3. Using the EMS to Manage Mailbox Properties
    2. 17.2. Moving Mailboxes
      1. 17.2.1.
        1. 17.2.1.1. Moving Mailboxes Using the EMC
      2. 17.2.2. Moving Mailboxes Using the EMS
      3. 17.2.3. Retrieving Mailbox Statistics
    3. 17.3. Deleting Mailboxes
      1. 17.3.1.
        1. 17.3.1.1. Deleting the Mailbox but Not the User
        2. 17.3.1.2. Deleting Both the User and the Mailbox
        3. 17.3.1.3. Permanently Purging a Mailbox
      2. 17.3.2. Reconnecting a Deleted Mailbox
        1. 17.3.2.1. Reconnecting a Mailbox Using the EMC
        2. 17.3.2.2. Reconnecting a Mailbox Using the EMS
    4. 17.4. Bulk Manipulation of Mailboxes Using the EMS
      1. 17.4.1. Managing Mailbox Properties with the EMS
      2. 17.4.2. Scripting Account Creation
    5. 17.5. Managing Mailbox Content
      1. 17.5.1. Understanding the Basics of Messaging Records Management
        1. 17.5.1.1. User Participation
        2. 17.5.1.2. Possible Scenarios
      2. 17.5.2. Getting Started with Messaging Records Management
    6. 17.6. Managing Default Folders
      1. 17.6.1. List of Default Folders
      2. 17.6.2. Creating Managed Content Settings
      3. 17.6.3. Keeping the Deleted Items Folder Clean
      4. 17.6.4. Creating and Managing Custom Folders
    7. 17.7. Managed Folder Mailbox Policies
      1. 17.7.1. Creating Managed Folder Mailbox Policies
      2. 17.7.2. Assigning Managed Folder Mailbox Policies to Users
      3. 17.7.3. Enabling Messaging Records Management on the Mailbox Server
    8. 17.8. The Bottom Line
  26. 18. Managing Mail-Enabled Groups
    1. 18.1. Managing Mail-Enabled Groups
      1. 18.1.1. Creating and Managing Mail-Enabled Groups
      2. 18.1.2. Creating Mail-Enabled Groups
      3. 18.1.3. Managing Mail-Enabled Groups
        1. 18.1.3.1. Managing General Properties of Mail-Enabled Groups
        2. 18.1.3.2. Managing Moderation for Distribution Groups
      4. 18.1.4. Creating Dynamic Distribution Groups
      5. 18.1.5. Using the Exchange Management Shell to Manage Groups
        1. 18.1.5.1. Creating Distribution Groups Using the EMS
        2. 18.1.5.2. Creating Dynamic Distribution Groups Using the EMS
        3. 18.1.5.3. Converting Global or Local Distribution Groups to Universal Groups
      6. 18.1.6. Allowing End Users to Manage Group Membership
    2. 18.2. The Bottom Line
  27. 19. Managing Mail-Enabled Contacts and Users
    1. 19.1. Creating and Managing Contacts
    2. 19.2. Managing Mail-Enabled Contacts and Users Using the EMC
    3. 19.3. Managing Mail-Enabled Contacts and Users Using the EMS
    4. 19.4. Implementing Coexistence Between Exchange On-Premise and Outlook Live Deployments
      1. 19.4.1. Implementing a Single Global Address List in a Coexistence Scenario
    5. 19.5. The Bottom Line
  28. 20. Managing Resource Mailboxes
    1. 20.1. How Resource Mailboxes Differ from Regular Mailboxes
    2. 20.2. Exchange 2010 Resource Mailbox Features
    3. 20.3. Creating Resource Mailboxes
      1. 20.3.1. Creating and Defining Resource Mailbox Properties
      2. 20.3.2. Defining Advanced Resource Mailbox Features
      3. 20.3.3. Defining Resource Scheduling Policies
        1. 20.3.3.1. Defining Resource Scheduling Policies Using the EMC
        2. 20.3.3.2. Defining Resource Scheduling Policies Using the Exchange Control Panel
        3. 20.3.3.3. Defining Resource Scheduling Policies Using the Exchange Management Shell
        4. 20.3.3.4. Settings That Can Only Be Configured in the EMS
      4. 20.3.4. Automatic Processing: AutoUpdate vs. AutoAccept
    4. 20.4. Migrating Resource Mailboxes
    5. 20.5. The Bottom Line
  29. 21. Public Folder Management
    1. 21.1. Understanding Public Folder Support in Exchange 2010
      1. 21.1.1. Understanding Native Exchange 2010 Support
      2. 21.1.2. Public Folder Limitations
      3. 21.1.3. Moving the Public Folder Hierarchy to Exchange 2010
    2. 21.2. Creating a Public Folder Database
      1. 21.2.1. Managing Public Folder Database Properties
      2. 21.2.2. Defining the Default Public Folder Server
      3. 21.2.3. Defining Public Folder Administrators
    3. 21.3. Managing Public Folders
      1. 21.3.1. Using the Exchange 2010 Public Folder Management Console
        1. 21.3.1.1. Viewing the Properties of a Public Folder
        2. 21.3.1.2. Additional Management Tasks
      2. 21.3.2. Using the Exchange Management Shell to Manage Public Folders
        1. 21.3.2.1. Performing General Public Folder Tasks
        2. 21.3.2.2. Manipulating Individual Public Folders
        3. 21.3.2.3. Manipulating Public Folder Mail Attributes
        4. 21.3.2.4. Managing Public Folder Databases
        5. 21.3.2.5. Managing Public Folder Permissions
        6. 21.3.2.6. Using Additional Scripts for Complicated Tasks
      3. 21.3.3. Using Outlook to Create a Public Folder
    4. 21.4. Working with the Public Folder Hierarchy and Replication
      1. 21.4.1. Understanding Public Folder Replication
      2. 21.4.2. Replicating Public Folders
      3. 21.4.3. Configuring Public Folder Replication
      4. 21.4.4. Understanding Public Folder Referrals
      5. 21.4.5. Managing Public Folder Permissions
    5. 21.5. The Bottom Line
  30. 22. Getting Started with Email Archiving
    1. 22.1. Introduction to Archiving
    2. 22.2. Archiving
      1. 22.2.1. Retention
      2. 22.2.2. Discovery
      3. 22.2.3. Eliminating PST Files
      4. 22.2.4. Reducing Storage
      5. 22.2.5. Compliance
      6. 22.2.6. Disaster Recovery
    3. 22.3. Industry Best Practices
      1. 22.3.1. Storage Management
      2. 22.3.2. Importing PSTs
      3. 22.3.3. Retention
    4. 22.4. Exchange Server 2010 Email Archiving
      1. 22.4.1. Personal Archive vs. Organizational Archive
      2. 22.4.2. Policies
        1. 22.4.2.1. Moving Items Between Folders
        2. 22.4.2.2. Setting a Retention Tag
        3. 22.4.2.3. Changing a Retention Tag Policy
        4. 22.4.2.4. Deleting and Removing a Retention Tag
        5. 22.4.2.5. Retention Hold
    5. 22.5. Placing a Mailbox on Retention Hold
    6. 22.6. Litigation or Legal Hold
      1. 22.6.1. Placing a Mailbox on Litigation Hold
    7. 22.7. Enabling Archiving
      1. 22.7.1. Archive Quotas
      2. 22.7.2. Exchange 2010 Discovery Operation Considerations
        1. 22.7.2.1. When Do You Use Discovery?
        2. 22.7.2.2. Using the Exchange Server 2010 Archive
      3. 22.7.3. Using Exchange 2010 Discovery
        1. 22.7.3.1. Viewing the Search Results
      4. 22.7.4. Offline Access
      5. 22.7.5. Requirements and Factors to Consider
        1. 22.7.5.1. Licensing
        2. 22.7.5.2. Server Storage
        3. 22.7.5.3. Client Requirements
    8. 22.8. The Bottom Line
  31. 4. Server Administration
  32. 23. Creating and Managing Mailbox Databases
    1. 23.1. Getting to Know Exchange Database Storage
      1. 23.1.1. Exchange Server 4.0, 5.0, and 5.5 (First Generation)
      2. 23.1.2. Exchange Server 2000 and 2003 (Second Generation)
      3. 23.1.3. Exchange Server 2007 (Third Generation)
      4. 23.1.4. Exchange Server 2010 (Current Generation)
      5. 23.1.5. Basics in Storage Terminology
        1. 23.1.5.1. Mailbox Database
        2. 23.1.5.2. Transaction Logs
        3. 23.1.5.3. Storage Groups, RIP
      6. 23.1.6. Storage in Exchange Server 2010
      7. 23.1.7. An Additional Factor: The Personal Archive
      8. 23.1.8. Disk Size vs. I/O Capacity
      9. 23.1.9. What's Keeping Me Up at Night?
    2. 23.2. Mailbox Storage
      1. 23.2.1. Maximum Database Sizes
      2. 23.2.2. Determining the Number of Databases
      3. 23.2.3. Allocating Disk Drives
    3. 23.3. Managing Mailbox Databases
      1. 23.3.1. Viewing Mailbox Databases
      2. 23.3.2. Creating Mailbox Databases
      3. 23.3.3. Moving the Mailbox Database EDB File
      4. 23.3.4. Moving the Mailbox Database Log Files
      5. 23.3.5. Properties of a Mailbox Database
    4. 23.4. The Bottom Line
  33. 24. Understanding the Client Access Server
    1. 24.1. Requirements for the Client Access Server Role
      1. 24.1.1. Client Access Server Operating System Requirements
      2. 24.1.2. Client Access Server Hardware Recommendations
    2. 24.2. Services Provided by the Client Access Server
      1. 24.2.1. RPC Client Access
      2. 24.2.2. Address Book Service
      3. 24.2.3. Mailbox Replication
      4. 24.2.4. Remote PowerShell
      5. 24.2.5. Outlook Web App
      6. 24.2.6. Exchange Control Panel
        1. 24.2.6.1. ECP for End Users
        2. 24.2.6.2. ECP for Administrators
        3. 24.2.6.3. Managing ECP Settings
        4. 24.2.6.4. Testing the ECP
      7. 24.2.7. Outlook Anywhere
        1. 24.2.7.1. Enabling Outlook Anywhere
        2. 24.2.7.2. SSL Offloading
      8. 24.2.8. The Autodiscover Service
        1. 24.2.8.1. Internal Autodiscover
        2. 24.2.8.2. External Autodiscover
        3. 24.2.8.3. The Autodiscover XML
      9. 24.2.9. The Availability Service
      10. 24.2.10. Offline Address List Distribution
    3. 24.3. Positioning the Client Access Server in Your LAN
      1. 24.3.1. Client Access Server Proxying
      2. 24.3.2. Client Redirection
      3. 24.3.3. Client Access Arrays
        1. 24.3.3.1. Load-Balancing Your Client Access Servers
        2. 24.3.3.2. Configure DNS
        3. 24.3.3.3. Configuring the Client Access Array
    4. 24.4. Interoperability with Earlier Versions of Exchange
      1. 24.4.1. Exchange 2010 Coexistence Behavior
      2. 24.4.2. Coexistence with Exchange Server 2003
      3. 24.4.3. Coexistence with Exchange Server 2007
    5. 24.5. Certificates
      1. 24.5.1. Default Certificate Usage
      2. 24.5.2. Using Subject Alternative Name (SAN) Certificates
        1. 24.5.2.1. Using the Exchange Certificate Wizards
        2. 24.5.2.2. Generating a Certificate Request in the EMS
    6. 24.6. The Bottom Line
  34. 25. Managing Connectivity with Hub Transport Servers
    1. 25.1. Transport Improvements in Exchange Server 2010
    2. 25.2. Message Routing in the Organization
      1. 25.2.1. Basics of Exchange Message Routing
    3. 25.3. Send and Receive Connectors
      1. 25.3.1. Receive Connectors
      2. 25.3.2. Send Connectors
        1. 25.3.2.1. Creating a Send Connector
      3. 25.3.3. Connectivity to Exchange 2003
    4. 25.4. Messages in Flight
      1. 25.4.1. Understanding Shadow Redundancy
      2. 25.4.2. Transport Dumpster
    5. 25.5. The Bottom Line
  35. 26. Managing Transport and Journaling Rules
    1. 26.1. Introducing the New Exchange 2010 Transport Architecture
      1. 26.1.1. All Messages Pass Through Hub Transport
    2. 26.2. Setting Up Message Classifications
      1. 26.2.1. Modifying and Creating Message Classifications
      2. 26.2.2. Deploying Message Classifications
        1. 26.2.2.1. Exporting Classifications from Exchange
        2. 26.2.2.2. Out-of-Sync Classifications
        3. 26.2.2.3. Importing Classifications in Outlook
    3. 26.3. Setting Up Transport Rules
      1. 26.3.1.
        1. 26.3.1.1. Transport Rules Coexistence Between Exchange 2007 and 2010
        2. 26.3.1.2. Transport Rules and Server Design Decisions
      2. 26.3.2. Selecting Conditions and Exceptions
        1. 26.3.2.1. Hub Transport Conditions and Exceptions
        2. 26.3.2.2. Edge Transport Conditions and Exceptions
      3. 26.3.3. Selecting Actions
        1. 26.3.3.1. Hub Transport Actions
        2. 26.3.3.2. Edge Transport Actions
      4. 26.3.4. Creating New Rules with the Exchange Management Console
      5. 26.3.5. Creating New Rules with the Exchange Management Shell
    4. 26.4. Introducing Journaling
      1. 26.4.1. Implementing Journaling
        1. 26.4.1.1. Managing Journaling Traffic and Security
      2. 26.4.2. Reading Journal Reports
    5. 26.5. The Bottom Line
  36. 27. Internet and Email
    1. 27.1. What Do You Need to Know?
      1. 27.1.1. Important Information When Receiving Email
      2. 27.1.2. Important Information When Sending Email
      3. 27.1.3. Incorporating a Separate Message Hygiene System
      4. 27.1.4. Using a Managed Provider
      5. 27.1.5. Accepted Domains
        1. 27.1.5.1. Setting Up an Accepted Domain Using the EMC
        2. 27.1.5.2. Setting Up an Accepted Domain Using the EMS
        3. 27.1.5.3. About Domain Types
      6. 27.1.6. Remote Domains
    2. 27.2. Configuring Hub Transport Servers
      1. 27.2.1. Configuring the Default Receive Connector
      2. 27.2.2. Configuring a Send Connector
    3. 27.3. Implementing Edge Transport Servers
      1. 27.3.1. Some Background Information on Edge Transport
      2. 27.3.2. Placement of the Edge Transport Server
        1. 27.3.2.1. Setting Up the Edge Transport
        2. 27.3.2.2. Configuring EdgeSync
        3. 27.3.2.3. Confirming That EdgeSync Is Running
    4. 27.4. Using Exchange Server 2010 Antispam Tools
      1. 27.4.1. Enabling Antispam Agents for Hub Transport Servers
      2. 27.4.2. Enabling Automatic Updates for the Antispam Signatures
      3. 27.4.3. Content Filtering
      4. 27.4.4. IP Block and IP Allow Providers
      5. 27.4.5. IP Block and Allow Lists
      6. 27.4.6. Recipient Filtering
      7. 27.4.7. Tarpitting
      8. 27.4.8. Sender Filtering
      9. 27.4.9. Sender ID
      10. 27.4.10. Sender Reputation
        1. 27.4.10.1. Configuring the Edge Transport Server to Enforce Organization Policies
    5. 27.5. The Bottom Line
  37. 5. Troubleshooting, Operations, and Monitoring
  38. 28. Troubleshooting Exchange Server 2010
    1. 28.1. Basic Troubleshooting Principles
    2. 28.2. General Server Troubleshooting Tools
      1. 28.2.1. Event Viewer (Diagnostic Logging)
      2. 28.2.2. Test-SystemHealth
      3. 28.2.3. Test-ServiceHealth
      4. 28.2.4. Exchange Best Practices Analyzer
    3. 28.3. Troubleshooting Mailbox Servers
      1. 28.3.1. General Mailbox Server Health
      2. 28.3.2. Using Test-MapiConnectivity
      3. 28.3.3. Checking Poison Mailboxes
      4. 28.3.4. Checking Database Replication Health
    4. 28.4. Troubleshooting Mail Flow
      1. 28.4.1. Using Test-Mailflow
      2. 28.4.2. Queue Viewer in the EMC
      3. 28.4.3. Message Tracking
        1. 28.4.3.1. Self-Service Message Tracking in the Exchange Control Panel
        2. 28.4.3.2. Message Tracking via the Exchange Management Console
        3. 28.4.3.3. Message Tracking Using the Exchange Management Shell
      4. 28.4.4. Exchange Mail Flow Troubleshooter
      5. 28.4.5. Other Tools
    5. 28.5. Troubleshooting Client Connectivity
      1. 28.5.1. Troubleshooting Autodiscover
        1. 28.5.1.1. Internal Clients
        2. 28.5.1.2. External Clients
      2. 28.5.2. Test-*Connectivity Cmdlets
    6. 28.6. The Bottom Line
  39. 29. Monitoring and Performance
    1. 29.1. Key Performance Monitor Counters
      1. 29.1.1. Types of Monitoring
      2. 29.1.2. Memory
        1. 29.1.2.1. Use of the Paging File
        2. 29.1.2.2. Available Memory
        3. 29.1.2.3. Exchange Server 2010 Memory Requirements
      3. 29.1.3. Processor
        1. 29.1.3.1. Exchange Server 2010 Processor Requirements
      4. 29.1.4. Disk
        1. 29.1.4.1. Exchange Server 2010 Disk Needs
          1. 29.1.4.1.1. A Stand-alone Disk Configuration
          2. 29.1.4.1.2. A DAG Disk Configuration
        2. 29.1.4.2. Disk Performance Counters
          1. 29.1.4.2.1. Tier 1 Disk Performance Counters
          2. 29.1.4.2.2. Tier 2 Disk Performance Counters
        3. 29.1.4.3. Active Directory
        4. 29.1.4.4. Network
        5. 29.1.4.5. MAPI
    2. 29.2. Using System Center Operations Manager
      1. 29.2.1. Before Importing the Management Pack
      2. 29.2.2. Importing the Management Pack
      3. 29.2.3. Modifying Management Pack Objects
      4. 29.2.4. Creating an Override Management Pack
      5. 29.2.5. Management Pack Discoveries
    3. 29.3. Event Logs
      1. 29.3.1. Defining a Security Audit Policy
      2. 29.3.2. Exchange Event Logging
        1. 29.3.2.1. Exchange Diagnostics Logging
    4. 29.4. Protocol and Connection Logs
      1. 29.4.1. IMAP
      2. 29.4.2. POP
      3. 29.4.3. Transport
        1. 29.4.3.1. Connectivity Log
        2. 29.4.3.2. Message Tracking
        3. 29.4.3.3. Active User Statistics
        4. 29.4.3.4. Server Statistics
        5. 29.4.3.5. Send and Receive Logs
        6. 29.4.3.6. IntraOrg Connector
        7. 29.4.3.7. Routing Logs
    5. 29.5. Other Logs
    6. 29.6. The Bottom Line
  40. 30. Backing Up and Restoring Exchange Server
    1. 30.1. Backing Up Exchange
      1. 30.1.1. Determining Your Strategy
        1. 30.1.1.1. Why Recover Data?
        2. 30.1.1.2. Establishing Your Recoverability Goals
        3. 30.1.1.3. Setting a Backup Schedule
        4. 30.1.1.4. Backup Alternatives with Exchange
    2. 30.2. Preparing to Recover the Exchange Server
    3. 30.3. Using Windows Server Backup to Back Up the Server
      1. 30.3.1. Performing the Backup
        1. 30.3.1.1. Verifying That the Backup Features Are Installed
        2. 30.3.1.2. Onetime Backup
        3. 30.3.1.3. Automated Backups
    4. 30.4. Using Windows Server Backup to Recover the Data
      1. 30.4.1. Users Can Recover Email
      2. 30.4.2. Recovering the Database
        1. 30.4.2.1. Recovering to the Original Location
        2. 30.4.2.2. Recovering to an Alternate Location
        3. 30.4.2.3. Deleted Mailbox Retention
      3. 30.4.3. Recovery Database
        1. 30.4.3.1. Mailbox and Recovery Database Differences
      4. 30.4.4. Recovering Single Messages
        1. 30.4.4.1. Configuring for Single-Item Recovery
        2. 30.4.4.2. Enabling Single Item Recovery
    5. 30.5. Recovering the Entire Exchange Server
      1. 30.5.1. Client Access, Hub Transport, and Unified Messaging Roles
        1. 30.5.1.1. Edge Transport Server
    6. 30.6. The Bottom Line
  41. A. The Bottom Line
    1. A.1. Chapter 1: Introducing Exchange Server 2010
    2. A.2. Chapter 2: Introduction to Email Administration
    3. A.3. Chapter 3: Standards and Protocols
    4. A.4. Chapter 4: Understanding Availability, Recovery, and Compliance
    5. A.5. Chapter 5: Message Security and Hygiene
    6. A.6. Chapter 6: Introduction to PowerShell and the Exchange Management Shell
    7. A.7. Chapter 7: Exchange Autodiscover
    8. A.8. Chapter 8: Virtualizing Exchange Server 2010
    9. A.9. Chapter 9: Exchange Server, Email, and SharePoint 2007
    10. A.10. Chapter 10: Exchange Server 2010 Quick Start Guide
    11. A.11. Chapter 11: Understanding Server Roles and Configurations
    12. A.12. Chapter 12: Exchange Server 2010 Requirements
    13. A.13. Chapter 13: Installing Exchange Server 2010
    14. A.14. Chapter 14: Upgrades and Migrations
    15. A.15. Chapter 15: Management Permissions and Role-Based Administration (RBAC)
    16. A.16. Chapter 16: Basics of Recipient Management
    17. A.17. Chapter 17: Managing Mailboxes and Mailbox Content
    18. A.18. Chapter 18: Managing Mail-Enabled Groups
    19. A.19. Chapter 19: Managing Mail-Enabled Contacts and Users
    20. A.20. Chapter 20: Managing Resource Mailboxes
    21. A.21. Chapter 21: Public Folder Management
    22. A.22. Chapter 22: Getting Started with Email Archiving
    23. A.23. Chapter 23: Creating and Managing Mailbox Databases
    24. A.24. Chapter 24: Understanding the Client Access Server
    25. A.25. Chapter 25: Managing Connectivity with Hub Transport Servers
    26. A.26. Chapter 26: Managing Transport and Journaling Rules
    27. A.27. Chapter 27: Internet and Email
    28. A.28. Chapter 28: Troubleshooting Exchange Server 2010
    29. A.29. Chapter 29: Monitoring and Performance
    30. A.30. Chapter 30: Backing Up and Restoring Exchange Server