You are previewing Microsoft® Exchange Server 2010 Inside Out.
O'Reilly logo
Microsoft® Exchange Server 2010 Inside Out

Book Description

Dive into Exchange Server 2010 and SP1—and discover how to really put your messaging solutions to work! This well-organized and in-depth reference packs all the details you need to deploy and manage Exchange 2010, including hundreds of timesaving solutions, expert tips, and workarounds. Topics include preparing for the deployment of Exchange 2010; new features of Service Pack 1; using Remote PowerShell and the Exchange Management Shell; understanding how the new Role Based Access Control (RBAC) permissions model works and how to customize it to your requirements; the new high availability model for the Exchange Store and how to approach designs for Database Availability Groups; using compliance features such as archive mailboxes, retention policies, and multi-mailbox discovery searches; the new role of the Client Access Server as the MAPI endpoint for Microsoft Outlook clients; the redesign of Outlook Web App (OWA) and the introduction of the Exchange Control Panel; and many more topics to ease the roll-out of Microsoft’s latest messaging server.

Table of Contents

  1. Microsoft® Exchange Server 2010 Inside Out
  2. A Note Regarding Supplemental Files
  3. Foreword
  4. Introduction
    1. Service Pack 1
      1. Service Pack 1
      2. Writing style and general approach to content
      3. Examples used in the book
      4. Thanks
      5. In conclusion
    2. Support for this book
    3. We want to hear from you
    4. Your Companion eBook
  5. 1. Introducing Microsoft Exchange 2010
    1. The motivation to upgrade
      1. Moving from Exchange 2003 or Exchange 2007
      2. Testing and beta versions
      3. Fundamental questions before you upgrade
      4. No in-place upgrades
    2. What version of Windows?
    3. Preparing for Exchange 2010
      1. The test plan
      2. Testing for operational processes
      3. Testing for programming and customizations
      4. Bringing Exchange 2007 up to speed
      5. Deploying earlier versions of Exchange servers alongside Exchange 2010
      6. Web-based Deployment Assistant
    4. Exchange 2010 editions
    5. Active Directory
      1. The strong link between Exchange and Active Directory
      2. ADSIEdit
      3. Types of Active Directory deployments that support Exchange
      4. The role of ADAccess
      5. Planning for global catalogs
      6. Preparing Active Directory for Exchange
      7. The joys of a customizable schema
      8. Ready-to-go custom attributes
    6. Let’s install
  6. 2. Installing Microsoft Exchange 2010
    1. Approaching the installation
      1. Running /PrepareAD
      2. Installing prerequisite system components
      3. Installing the Microsoft Filter Pack
      4. Running Setup
      5. Setup logs
      6. Uninstalling Exchange
      7. Repairing Exchange
      8. Installing an edge server
      9. Language packs
      10. Recovering a failed server
      11. Customer Experience Improvement Program
    2. The services of Exchange
    3. Versions, roll-up updates, and service packs
      1. Exchange 2010 Service Pack 1
      2. Version numbers
      3. Object versions
      4. Reporting licenses
    4. Security groups and accounts created by Exchange
    5. Contemplating management
  7. 3. The Exchange Management Shell
    1. How Exchange leverages Windows PowerShell
    2. Remote PowerShell
      1. Flowing remotely
      2. Connecting to remote PowerShell
      3. Be careful where you execute
      4. A more complex environment to manage
      5. Advantages of remote PowerShell
    3. EMS basics
      1. Command editing
      2. Handling information returned by EMS
      3. Selective output
      4. Using common and user-defined variables
      5. Identities
      6. Piping
        1. When piping information generates errors
      7. Adding recipient photos
      8. OPATH filters
      9. Server-side and client-side filters
      10. Transcripts
      11. Bulk updates
      12. Code changes required by remote PowerShell
    4. Command line versus Integrated Scripting Environment
      1. Calling scripts
      2. Profiles
      3. Script initialization
    5. Active Directory for PowerShell
      1. Setting the right scope for objects in a multidomain forest
    6. Some useful EMS snippets
      1. Looking for large folders
      2. Outputting a CSV file
      3. Creating a report in HTML
      4. Finding disconnected mailboxes
      5. Creating and sending messages from the shell
      6. Reporting database size and mailbox count via email
    7. Verbose PowerShell
    8. Setting language values
    9. Execution policies
    10. Testing cmdlets
      1. Test-SystemHealth
      2. Test-ServiceHealth
      3. Test-MAPIConnectivity
      4. Test-ReplicationHealth
      5. Test-ExchangeSearch
      6. Test-OWAConnectivity
      7. Test-ECPConnectivity
      8. Test-MRSHealth
      9. Testing POP3 and IMAP4 Connectivity
      10. Testing mail flow
    11. But we need some control
  8. 4. Role-Based Access Control
    1. RBAC basics
    2. Roles
      1. Using role assignment policy to limit access
      2. Creating roles for specific tasks
    3. Scopes
    4. Role groups
      1. Creating a new role group
    5. Role assignment
      1. Specific scopes for role groups
      2. Special roles
      3. Unscoped roles
      4. What role groups do I belong to?
    6. Assignment policies
    7. RBAC enhancements in SP1
      1. Managing role groups through ECP
      2. Database scoping
      3. Implementing a split permissions model
      4. RBAC reports in ExBPA
      5. RBAC validation rules
    8. Exchange Control Panel and roles
    9. Figuring out RBAC
    10. On to management
  9. 5. Exchange Management Console and Control Panel
    1. Exchange Management Console
      1. Changes to EMC in Exchange 2010
      2. A different console philosophy from Exchange 2003
      3. Managing objects across Exchange 2010 and Exchange 2007
      4. EMC startup
      5. How EMC accesses Exchange data
      6. Changing EMC columns
      7. Auto-generated PowerShell commands
      8. Using EMS command logs
      9. Naming conventions
      10. Organizational health data
      11. Managing multiple organizations
    2. Sharing policies
    3. Certificate management
    4. Exchange Control Panel
      1. SP1 updates for ECP
      2. An overview of the ECP application
    5. Basic ECP user options
      1. Inbox rules
      2. Delivery reports
    6. ECP administrator options
      1. Administrator searches for delivery reports
        1. Using EMS to search delivery reports
      2. Running ECP without an Exchange mailbox
    7. Managing groups with ECP
      1. Defining a default group location and group naming policy
      2. Creating new groups
      3. Creating security groups with ECP
      4. Users and groups
      5. Allowing users to create new groups through ECP
      6. Planning for user-created groups
      7. Maintain groups but don’t create!
    8. Setting diagnostics for Exchange servers
    9. But what will we manage?
  10. 6. Managing Mail-Enabled Recipients
    1. Stop and think
    2. Mailbox naming conventions
    3. Creating new mailboxes
      1. Completing the new mailbox setup
      2. Creating new room and resource mailboxes
      3. Mailbox provisioning agent and database allocation
      4. Languages and folders
      5. Manipulating mailbox settings
      6. Bulk mailbox creation
      7. Setting quotas
      8. What’s in a mailbox?
    4. Removing or disabling mailboxes
      1. Reconnecting mailboxes
    5. Email address policies
      1. Email policy priority
      2. Creating a new email address policy
      3. Creating email address policies with custom filters
      4. Setting priority for an email address policy
      5. Virtual list view (VLV) for Exchange address lists
    6. Discovery mailboxes
      1. Creating additional discovery mailboxes
    7. Setting mailbox permissions
      1. Mail flow settings
      2. The difference between Send on Behalf and Send As
      3. Managing full access permission
      4. Sending messages on behalf of other users
      5. Opening another user’s mailbox
    8. Distribution groups
      1. Room lists
      2. Group owners
      3. Group expansion
      4. Protected groups
      5. Self-maintaining groups
      6. Viewing group members
    9. Tracking group usage
    10. Dynamic distribution groups
      1. OPATH queries
      2. Creating new dynamic distribution groups
      3. Creating dynamic groups using custom filters
    11. Moderated recipients
      1. Moderation requests
      2. Moderated mailboxes
    12. Mail-enabled contacts
      1. Mail users
    13. Resource mailboxes
      1. Defining custom properties for resource mailboxes
      2. Providing policy direction to the Resource Booking Attendant
      3. Processing meeting requests according to policy
      4. Equipment mailboxes
    14. Data, data, everywhere
  11. 7. The Exchange 2010 Store
    1. Long live Jet!
    2. Maximum database size
      1. Database limits for the standard edition
      2. Mailboxes per database (or per server)
    3. Dealing with I/O
      1. Maintaining contiguity
      2. A new database schema
    4. Database management
      1. Creating new mailbox databases
      2. Updating mailbox databases after installation
      3. Background maintenance
      4. Scheduling background maintenance
      5. Content maintenance tasks
      6. Tracking background maintenance
      7. Corrupt item detection and isolation
      8. Backups and permanent removal
      9. Protection against high latency
      10. Protection against excessive database or log growth
      11. Store driver fault isolation
      12. The death of ISINTEG
      13. Controlling named properties
    5. Database defragmentation
      1. Using ESEUTIL
    6. Database usage statistics
    7. Transaction logs
      1. Log sets
      2. Transactions, buffers, and commitment
      3. Transaction log checksum
      4. Transaction log I/O
      5. The question of circular logging
      6. Noncircular logging
      7. Reserved logs
    8. And now for something completely different
  12. 8. Exchange’s Search for High Availability
    1. Breaking the link between database and server
      1. Introducing Database Availability Groups
      2. The dependency on Windows clustering
    2. Active Manager
      1. Automatic database transitions
      2. Best copy selection
      3. ACLL: Attempt copy last logs
    3. Transaction log replay: The foundation for DAG replication
      1. Transaction log compression
      2. Block replication
      3. Transaction log truncation
      4. Incremental resynchronization
      5. Seeding a database
    4. Unique database names
    5. Changes in message submission within a DAG
    6. Day-to-day DAG management and operations
      1. Building the DAG
      2. Investigating DAG problems
      3. Managing DAG properties
      4. DAG networks
      5. Using circular logging with database copies
      6. Adding new database copies to a DAG
      7. Handling initial seeding errors
      8. Monitoring database copies
      9. Reseeding a database copy
      10. Adding database copies with EMS
      11. Using a lagged database
      12. Activating a mailbox database copy
      13. Applying updates to DAG servers
      14. Dealing with a failed server
      15. AutoDatabaseMountDial and potential issues moving databases
      16. Activation blocks
      17. Moving database locations within a DAG
      18. Removing database copies
      19. Removing servers from a DAG
      20. Handling storage hangs
    7. Upgrading servers in a DAG
    8. Datacenter Activation Coordination
      1. Planning for datacenter resilience
      2. Managing cross-site connections
    9. Crimson events
    10. Approaching DAG designs
    11. Scripts to help with DAG management
    12. On to protecting data
  13. 9. Backups and Restores
    1. An interesting philosophical question
    2. The Windows Server Backup plug-in for Exchange
      1. Exchange and Volume ShadowCopy Services
    3. Making an Exchange 2010 backup
      1. The backup complexities posed by passive database copies
    4. Restoring to a recovery database
      1. Performing a restore
      2. Validating the recovered database
      3. Mounting a recovery database
      4. Restoring mailbox data
    5. Complete server backups
    6. Clients
  14. 10. Clients
    1. The Outlook question
      1. Missing functionality when using earlier versions of Outlook
      2. Why new mail notifications seem slower on Outlook
      3. Forcing faster Outlook Anywhere connections
      4. Conversation views
      5. Conflict resolution
      6. Listing client connections
      7. Blocking client connections to a mailbox
      8. Blocking client access to a mailbox server
    2. Outlook Web App
      1. A refresh for OWA provided by Exchange 2010 SP1
      2. OWA functionality deprecated in Exchange 2010
      3. Different browsers, different experiences
      4. OWA configuration file
      5. Missing favorites
      6. Forwarding meeting requests
      7. OWA Web parts
      8. Long signatures
      9. Sharing calendars
      10. Sharing calendars with Internet users
      11. Mailbox quota exceeded
      12. Handling attachments
      13. OWA themes and customizations
    3. OWA mailbox policies and feature segmentation
      1. More than just segmentation
      2. Attachment processing
      3. Applying an OWA mailbox policy
    4. POP3 and IMAP4 clients
      1. Configuring the IMAP4 server
      2. Configuring IMAP4 client access
    5. Exchange ActiveSync
      1. Setting ActiveSync policies
      2. Generating ActiveSync reports
      3. Reporting synchronized devices
      4. Blocking types of mobile devices
      5. Blocking devices on a per-user basis
      6. Wiping lost devices
      7. Debugging ActiveSync
      8. Testing mobile connectivity
      9. ActiveSync for BlackBerry
    6. Client throttling
    7. Unified Messaging
      1. Voice mail preview
      2. Fax integration
    8. Exchange 2010 APIs
      1. Exchange Web Services
    9. A common connection point
  15. 11. Client Access Server
    1. The CAS role
      1. Benefits of relocating the MAPI endpoint
      2. CAS installation priority
    2. The RPC Client Access layer
      1. Linking CAS to mailbox databases
      2. Supporting Outlook 2003 clients
    3. CAS access to directory information
    4. The Autodiscover service
      1. Accessing a Service Connection Point
      2. CAS settings
      3. Site scope
      4. AutoConfiguration
      5. Logging Autodiscover actions
      6. Static Autodiscover
      7. SRV pointers to Autodiscover
    5. Client Access Server arrays
      1. Creating a CAS array
      2. Managing cross-site connections with the RPC Client Access service
      3. Load balancing and CAS arrays
      4. Upgrading a Client Access Server in an array
    6. CAS and perimeter networks
    7. RPC Client Access logging
    8. Certificates
    9. Outlook Anywhere
    10. An increased load for the CAS
      1. Load balancing the CAS
      2. The importance of affinity
      3. Assigning static ports to the CAS
      4. Web services URLs and load balancing
      5. Changes to facilitate SSL offloading
      6. Domain controllers
    11. Preparing for transition and interoperability
    12. A matter of manipulation
  16. 12. Mailbox Support Services
    1. The Mailbox Replication Service
      1. MRS configuration file
    2. Moving mailboxes
      1. Asynchronous moving
      2. Mailbox Replication Service processing
      3. Preventing loss of data
      4. Moving mailboxes
      5. Clearing move requests
      6. Managing mailbox moves with EMS
      7. Preserving the mailbox signature
      8. Moving mailboxes between versions of Exchange
      9. Moving mailboxes with personal archives
      10. Checking move request status
      11. Planning mailbox moves
      12. Ensuring high availability
      13. Reporting mailbox moves
      14. Accessing move report log data
      15. Moves and mailbox provisioning
      16. Handling move request errors
    3. Mailbox import and export
      1. Gaining permission through RBAC to execute mailbox import and export
      2. Planning the import of PST data
        1. Importing mailbox data with EMS
        2. Retrieving information about import jobs
      3. Exporting mailbox data
        1. Exporting mailbox data with EMS
      4. Limiting user access to PSTs
    4. MailTips and group metrics
      1. Client interaction
      2. Configuring MailTips
      3. User experience
      4. Custom MailTips
      5. Multilingual custom MailTips
    5. The Offline Address Book
      1. OAB download
      2. OAB generation
      3. Updating OAB files
      4. Moving the OAB generation server
      5. Web-based distribution
      6. Creating and using customized OABs
      7. OAB support for MailTips
      8. OABInteg and Dave Goldman’s Blog
    6. Hierarchical address book
    7. Mailbox assistants
      1. Calendar Repair Assistant (CRA)
      2. Work cycles
    8. Time to transport
  17. 13. The Exchange Transport System
    1. Overview of the transport architecture
      1. Active Directory and routing
      2. Overriding Active Directory site link costs
      3. Delayed fan-out
      4. The critical role of hub transport servers
      5. Version-based routing
    2. Transport configuration settings
      1. Limits on user mailboxes
      2. Transport configuration file
      3. Caching the results of group expansion
      4. Routing tables
      5. TLS security
    3. Receive connectors
      1. Creating a receive connector
    4. Send connectors
      1. Creating a send connector
      2. Selecting a send connector
    5. Linked connectors
    6. Throttling
    7. Back pressure
    8. Transport queues
      1. How messages enter the submission queue
      2. Moving messages to delivery queues
      3. Viewing queues
      4. Problem queues
      5. Exchange Queue Viewer
      6. Submitting messages through the pickup directory
      7. Replay directory
    9. Customizable system messages
      1. Exchange DSNs
      2. Customizing NDRs
      3. Customizing quota messages
    10. Logging
      1. Controlling connectivity logging
      2. Interpreting a connectivity log
      3. Protocol logging
    11. Accepted domains
      1. Creating a new accepted domain
      2. Updating accepted domains
    12. Remote domains
    13. Transport pipeline
    14. Foreign and delivery connectors
    15. Shadow redundancy
    16. Linking Exchange 2003 to Exchange 2010
      1. Decommissioning Exchange 2003 routing groups
      2. Handling Exchange 2003 link state updates
    17. Changes in Exchange 2010 SP1
      1. Better SMTP load balancing
      2. Monitoring the submission queue
      3. Mailbox delivery prioritization
      4. Upgraded shadow redundancy
    18. Squeaky-clean email
  18. 14. Message Hygiene
    1. To Edge or not to Edge, that’s the question
    2. Edge servers
      1. Edge synchronization
      2. Validating Edge synchronization
      3. Ongoing synchronization
    3. Exchange anti-spam agents
      1. Installing the anti-spam agents on a hub transport server
      2. Order of anti-spam agent processing
      3. X-headers added by anti-spam agents
      4. Header firewalls
      5. Connection filtering
      6. Sender filtering
      7. Backscattering
      8. Sender reputation
      9. Recipient filtering
      10. Tarpits
      11. Sender ID
      12. Content filtering
        1. SCL thresholds
        2. Per-mailbox SCL thresholds
        3. Managing the Content Filter agent with EMS
        4. Using SCL values in transport rules
      13. Attachment filtering
      14. Address rewriting
      15. Agent logs
      16. Safelist aggregation
    4. Choosing an antivirus product
    5. Client defense
      1. Outlook’s junk mail filter
    6. Cleansed email, but compliant?
  19. 15. Compliance
    1. The joy of legal discovery
    2. Personal archives
      1. Enabling a personal archive
        1. Scanning mailboxes that are in managed folders
        2. Filtering for archived mailboxes
        3. Enabling the archive and its properties
        4. Checking space usage
        5. Updating the name of an archive mailbox
      2. Default archive policy
      3. Disabling a personal archive
      4. Using a personal archive
    3. Messaging records management
      1. The new approach to messaging records management in Exchange 2010
        1. Types of retention tags
      2. System tags
      3. Designing a retention policy
      4. Naming retention tags
      5. Creating retention tags
      6. Creating a retention policy
      7. Applying a retention policy to mailboxes
      8. Modifying a retention policy
      9. Customizing retention policies for specific mailboxes
      10. User interaction with retention policies
      11. Removing a retention policy
      12. Upgrading from managed folders
    4. How the Managed Folder Assistant implements retention policies
    5. Putting a mailbox on retention hold
    6. Putting a mailbox on litigation hold
    7. The very valuable dumpster
      1. Dumpster basics
      2. Dumpster 2.0 arrives
      3. Single item recovery
      4. Knowing what’s in the dumpster
      5. Managing dumpster parameters
    8. Discovery searches
      1. Unsearchable items
      2. Creating and executing a multimailbox search
      3. Accessing search results
      4. Deduplication of search results
      5. Search logging
      6. Search annotation
      7. Executing searches with EMS
    9. Auditing administrator actions
      1. The audit mailbox
      2. How administrator auditing happens
    10. Auditing mailbox access
      1. Enabling mailboxes for auditing
      2. Accessing mailbox audit data
    11. Message classifications
      1. Creating a message classification
      2. Localized message classifications
      3. Client access to message classifications
    12. Protecting content
      1. Active Directory Rights Management Services
      2. Installing Active Directory Rights Management
      3. Using AD RMS to protect content
      4. Rights management enhancements in Exchange 2010 SP1
    13. Outlook Protection Rules
    14. Rules help compliance, too
  20. 16. Rules and Journals
    1. Transport rules
      1. Examples of transport rules
      2. Rules and ECP
      3. Basic structure of transport rules
      4. Edge versus hub rules
      5. Setting transport rule priority
      6. Creating a corporate disclaimer
      7. Basic moderated workflow
      8. Evaluating Active Directory attributes in transport rules
      9. Ethical firewalls
      10. Blocking certain users from sending external email
      11. Scanning attachments with transport rules
      12. Using message classifications and rights management templates in transport rules
      13. Caching transport rules
      14. Transferring rules between Exchange versions
      15. Transport rule actions
      16. Developing custom transport agents
      17. Transport rule priority
    2. Journaling
      1. When journaling happens
      2. Journaling options
      3. Journal reports
      4. Alternate journal recipient
      5. Standard journaling
      6. Journal rules
      7. Creating a journal rule
      8. Assessing journal load
      9. Securing a mailbox used as a journal recipient
      10. Interversion and interorganization journaling
    3. To the toolbox
  21. 17. The Exchange Toolbox
    1. Display or Details Templates Editor
    2. Message tracking
      1. Message tracking log files generated on servers
      2. Interpreting entries in message tracking logs
      3. Measuring message latency
      4. Using the Tracking Log Explorer
      5. Other options for analyzing messaging tracking logs
        1. Building your own analysis framework
        2. Buying a commercial product
        3. Integrating messaging tracking analysis into a broader framework
    3. Performance Monitor
    4. Exchange Performance Troubleshooter
      1. ExPerfWiz
      2. ExPerfWiz limitations
    5. Exchange Load Generator 2010
    6. Remote Connectivity Analyzer
    7. Searching for more information
  22. Index
  23. About the Author