You are previewing Microsoft Exchange Server 2013: Connectivity, Clients, and UM.
O'Reilly logo
Microsoft Exchange Server 2013: Connectivity, Clients, and UM

Book Description

With a focus on connectivity, clients, and unified messaging, this book delivers the ultimate, in-depth reference to IT professionals planning and managing an Exchange Server 2013 deployment. Guided by Paul Robichaux, a Microsoft MVP and popular author, you will:

  • Understand how Exchange Server 2013 works with previous versions

  • Gain expert insights into supporting clients, mobile devices, and UM

  • Take a deep dive into front-end servers; certificate and namespace management; transport rules; load balancing; client management, including Microsoft Outlook, Outlook Web App (OWA), and POP3/IMAP4; mobile devices; anti-malware and anti-spam features; Unified Messaging; Microsoft Lync; Office 365; Exchange Online.

  • Table of Contents

    1. Microsoft Exchange Server 2013: Connectivity, Clients, and UM
    2. Foreword for Exchange 2013 Inside Out books
    3. Introduction
      1. Acknowledgments
      2. Errata & book support
      3. We want to hear from you
      4. Stay in touch
    4. 1. Client access servers
      1. CAS architecture demystified
      2. CAS authentication methods
      3. External vs. internal
        1. External and internal URLs
        2. External and internal authentication
        3. Managing virtual directory settings
      4. The death of affinity
      5. Load balancing made simpler
        1. Layer 4 load balancing
        2. Layer 7 load balancing
        3. DNS round robin
        4. Windows Network Load Balancing
        5. Choosing a load balancing solution
      6. The role of Outlook Anywhere
      7. Designing namespaces
        1. Using a single namespace
        2. One name per service?
        3. Using a single internal name for Outlook Anywhere
        4. External names for Outlook Anywhere
      8. The Front End Transport service
      9. Autodiscover
        1. The Autodiscover process
        2. Accessing Autodiscover through SCPs
        3. Accessing Autodiscover through well-known URLs
        4. The role of Exchange providers
        5. Retrieving configuration information with Autodiscover
      10. Understanding CAS proxying and redirection
        1. Proxying
        2. Redirection
      11. CAS coexistence and migration
        1. Routing inbound traffic to the 2013 CAS role
        2. Removing ambiguous URLs
      12. Certificate management
        1. How Exchange uses certificates
        2. Where to get certificates
        3. Certificate contents
        4. What certificates do you need?
        5. Requesting and applying certificates
      13. Moving mail
    5. 2. The Exchange transport system
      1. A quick introduction to Exchange transport
        1. The transport pipeline: An overview
        2. Message routing: An overview
      2. Exchange 2013 transport architecture in depth
        1. The Front End Transport service
        2. The Transport service
        3. The Mailbox Transport Delivery service
        4. The Mailbox Transport Submission service
        5. The role of connectors
          1. Send connectors
          2. Basic send connector options
          3. Receive connectors
          4. Routing group connectors
          5. Delivery agent and foreign connectors
        6. Securing mail with Transport Layer Security (TLS)
          1. Using basic TLS
          2. Using domain security
      3. Queues in Exchange 2013
        1. Queue types
        2. Queue databases
        3. Queue velocity
        4. Viewing queues
          1. Using Get-Queue
          2. Using Get-QueueDigest
          3. Using the Exchange Queue Viewer
        5. Enabling prioritized message delivery
        6. Managing queues
          1. Viewing and managing messages in a queue
          2. Suspending and resuming queues
          3. Submitting messages through the pickup directory
          4. The role of the Replay directory
      4. Message throttling
      5. Back pressure
      6. Message routing in depth
        1. Delivery groups
        2. Exchange 2013 and Active Directory
          1. Designing Active Directory to support Exchange
          2. How Exchange uses Active Directory for message routing
        3. Overriding Active Directory site link costs
        4. Selecting a send connector
        5. Exchange 2013 and DNS MX lookups
        6. Delayed fan-out
      7. High availability and Exchange transport
        1. Shadow redundancy
        2. Safety Net
      8. Transport rules
        1. Transport rule structure
        2. How transport rules are applied
        3. Setting transport rule priority
        4. Active Directory Rights Management Services and transport rules
      9. Data loss prevention
        1. DLP policies
        2. Data loss prevention rules
        3. Policy Tips
      10. Journaling
        1. Journal reports
        2. Alternate journal recipients
        3. Journaling at the mailbox database level
        4. Journaling using journal rules
        5. Journaling of unified messaging messages
        6. Securing a mailbox used as a journal recipient
      11. Changing organization-level transport settings
      12. Setting server-level behavior
        1. Logging
        2. Controlling logging
        3. Interpreting protocol log files
      13. Customizing transport system messages
        1. Exchange DSNs
        2. Customizing NDRs
    6. 3. Client management
      1. Choosing a client
        1. Outlook
          1. Outlook 2013
          2. Outlook 2010 and Outlook 2007
          3. Earlier versions of Outlook
        2. Outlook Web App
          1. New features in Outlook Web App 2013
          2. Extending Outlook Web App with apps
          3. Browser and operating system support
          4. Deprecated features from Outlook Web App 2010
        3. Mac OS X
        4. Outlook Web App for Devices
      2. Managing Outlook for Windows
        1. Managing Outlook Anywhere
        2. Managing Autodiscover
        3. Using the Exchange Remote Connectivity Analyzer
          1. Using the online version of ExRCA
          2. Using the Microsoft Connectivity Analyzer
        4. Outlook settings and group policies
        5. Pre-staging OST files for Outlook 2013 deployment
        6. Controlling PST files
          1. Restricting use of PST files in Outlook
          2. Using the Exchange PST Capture tool
          3. Exploring third-party solutions
        7. Blocking client connections to a mailbox
        8. Blocking client access to a Mailbox server
        9. Using the Office Configuration Analyzer Tool
      3. Managing Outlook Web App
        1. Outlook Web App mailbox policies
          1. Managing Outlook Web App mailbox policies in EMS
          2. Applying an Outlook Web App mailbox policy
        2. Controlling offline Outlook Web App use
        3. Controlling attachment access and rendering
          1. Attachment access
          2. The role of Office Web Apps Server
        4. Managing Outlook Web App virtual directory settings
        5. Managing Outlook Web App timeouts
        6. Managing Office Store apps for Outlook Web App
          1. Who can install and configure apps?
          2. Enabling or disabling apps at the organization level
          3. Installing, removing, and configuring apps
          4. Managing apps from EMS
          5. Self-service app management for users
        7. Customizing Outlook Web App
      4. Managing Outlook for Mac
      5. Managing Outlook Web App for Devices
      6. POP3 and IMAP4
        1. Configuring the IMAP4 server
        2. Configuring IMAP4 client access
      7. Client throttling
    7. 4. Mobile device management
      1. All about Exchange ActiveSync
        1. A quick tour of EAS history
        2. What it means to “support EAS”
      2. How Exchange ActiveSync works
        1. WBXML
        2. Autodiscover
        3. EAS policies
        4. Device provisioning
        5. Device synchronization
          1. Capturing device-side changes
          2. Some details to consider
        6. Remote device wipes
        7. Device access rules
          1. How quarantine works
      3. Managing Exchange ActiveSync
        1. Organization-level settings
          1. Completely disabling Exchange ActiveSync
        2. CAS-level settings
        3. Mobile device mailbox policies
        4. Certificate management
        5. Handling users who leave the company
        6. Reporting on EAS sync and device activity
          1. Reporting on synchronized devices
        7. Building device access rules
        8. Blocking devices on a per-user basis
        9. Wiping lost devices
        10. Debugging ActiveSync
          1. Identifying and blocking badly behaved devices
      4. Other mobile device management alternatives
    8. 5. Message hygiene and security
      1. A quick message-hygiene primer
        1. Spam
        2. Phish
        3. Malware
        4. Are you positive?
      2. Message security and protection in Exchange
        1. Built-in security features
        2. Client-side features
        3. Exchange Online Protection
        4. Major changes from previous versions
      3. Managing anti-malware scanning
        1. Managing server-level settings
        2. Disabling anti-malware scanning
        3. Configuring server-based third-party anti-malware scanners
      4. Managing anti-spam filtering
        1. Methods of spam filtering
          1. Connection filtering
          2. Sender filtering
          3. Recipient filtering
          4. Sender ID
          5. Content filtering
          6. Sender reputation
          7. Safe lists and aggregation
        2. Enabling anti-spam filtering on mailbox servers
        3. The spam filtering pipeline
        4. Controlling protocol filtering
          1. Controlling connection filtering
          2. Controlling recipient filtering
          3. Controlling sender filtering
          4. Controlling the use of Sender ID
        5. Controlling content filtering
          1. Adding trigger phrases to the content filter
          2. Setting SCL-based behavior
        6. Controlling sender reputation filtering
          1. Blocking messages from disreputable senders
          2. Checking for proxies
        7. Controlling how Exchange interacts with client-side junk mail filtering
        8. Working with quarantined messages
    9. 6. Unified messaging
      1. A quick introduction to Exchange UM
        1. Major Exchange UM features
        2. Unified messaging concepts
          1. The unified communications market
          2. The exciting world of telephony
          3. The Session Initiation Protocol (SIP)
          4. Audio and the Real-Time Protocol (RTP)
        3. Unified messaging objects and attributes
          1. UM dial plans
          2. UM IP gateways
          3. UM hunt groups
          4. UM mailbox policies
        4. Unified messaging architecture
      2. What happens when the phone rings
        1. Call answering for a user mailbox
          1. Call answering rules
          2. Recording a message or not
          3. Voice Mail Preview
          4. Resolving calling line ID information
          5. Protected voice mail
          6. Submitting the message
          7. Lighting the message-waiting indicator
        2. Call answering for an automated attendant
          1. Automated attendants and the GAL
          2. Automated attendants and call transfers
        3. Call answering for Outlook Voice Access
        4. Call answering for faxes
      3. Placing outbound calls
        1. The parts of a phone number
        2. The role of dialing rules
          1. What’s in a dialing rule
          2. Dialing rule authorization
        3. Blind transfers
        4. Supervised transfers
      4. Multilingual support in UM
        1. Installing and removing language packs
        2. Choosing the right language
      5. Deploying UM
        1. Sizing and scaling UM
        2. Preparing your network
        3. Installing UM
        4. Creating core UM objects
          1. Creating UM dial plans
          2. Creating UM IP gateway objects
          3. Creating UM hunt groups
          4. Creating UM mailbox policies
        5. Designing automated attendants
        6. Enabling users for UM
      6. Managing UM
        1. A quick note about permissions
        2. Managing UM server-level settings
          1. Managing UM call router settings
          2. Managing UM server settings
          3. Using certificates with UM
          4. GAL grammar generation
        3. Scheduling UM work on the Mailbox server
        4. Dial plan settings
          1. Additional dial plan settings with Set-UMDialPlan
        5. UM IP gateway settings
        6. UM mailbox policy settings
          1. Additional UM mailbox policy settings with Set-UMMailboxPolicy
        7. Mailbox settings
          1. Additional settings with Set-UMMailbox
          2. Call answering rules
        8. Automated attendant settings
          1. Additional settings with Set-UMAutoAttendant
      7. Unified messaging and the future
    10. 7. Integrating Exchange 2013 with Lync Server
      1. A quick history of Lync
      2. Combining Lync and Exchange
        1. What Lync provides
        2. What Exchange adds to Lync
        3. Lync integration concepts and architecture
        4. Certificates, trust, and permissions
          1. Trust, certificates, and OAuth
          2. Partner applications and permissions
          3. The rest of integration
      3. Initial integration steps
        1. Installing prerequisites on Exchange servers
        2. Configuring server authentication
        3. Configuring Autodiscover
        4. Creating partner applications
          1. Configuring Lync as a partner application for Exchange
          2. Configuring Exchange as a partner application for Lync
          3. Testing the partner application objects
      4. Enabling IM and presence integration in Outlook Web App
        1. Configuring IM/P with single-role servers
        2. Completing IM/P integration
        3. Troubleshooting Outlook Web App IM integration
      5. Integrating Exchange UM and Lync Server
        1. Exchange UM integration concepts
        2. Initial setup
          1. Configuring Exchange for integration
          2. Configuring Lync for integration
          3. Testing your work
      6. Enabling the Unified Contact Store for Lync users
      7. Working with high-resolution photos
        1. Assigning photos to users
      8. Integrating Exchange archiving with Lync Server
        1. What archiving integration means
        2. Understanding Lync archiving
        3. Enabling Lync archiving to Exchange
      9. On to the cloud
    11. 8. Office 365: A whirlwind tour
      1. What is Office 365?
        1. The many faces of Office 365
        2. Plans and licensing
        3. Dedicated vs. shared
        4. A word about pricing
      2. Is Office 365 right for you?
        1. The big bet
        2. Hybrid or hosted?
        3. Connectivity
        4. Uptime and support
          1. Service level agreements
          2. Support boundaries
        5. Privacy and security
        6. Cost
        7. Unique service features
      3. Hybrid operations, migration, and coexistence
        1. The role of directory synchronization
        2. Single sign-on and federation
        3. Password synchronization
        4. Hybrid mode
          1. Hybrid mode features
          2. Setting up hybrid mode
          3. Managing hybrid mode
        5. Understanding types of migration
      4. Assessing your Office 365 readiness
        1. Signing up for the service
        2. The OnRamp process
      5. Setting up a hybrid organization
        1. Enabling directory synchronization
          1. Running the IDFix tool
          2. Installing and configuring the dirsync tool
          3. Filtering dirsync
          4. Verifying that dirsync is working
          5. Password synchronization
          6. Troubleshooting dirsync
          7. Using AD FS
        2. Mail flow
          1. Your mail flow options
          2. Setting up connectors
        3. Domains
          1. Confirming ownership of your domain
          2. Adding users and assigning licenses
          3. Configuring DNS records for the new tenant
        4. Running the Hybrid Configuration Wizard
        5. Moving users to the cloud
          1. Creating a test mailbox
          2. Licensing users
          3. Moving user mailboxes
      6. Managing a hybrid organization
        1. Connecting Windows PowerShell and EAC to the service
        2. Enabling customization
        3. Changing hybrid settings after deployment
        4. Dealing with throttling
      7. All-in on the cloud
    12. A. About the Author
    13. Index
    14. About the Author
    15. Copyright