You are previewing Microsoft Exchange Server 2013: Mailbox and High Availability.
O'Reilly logo
Microsoft Exchange Server 2013: Mailbox and High Availability

Book Description

With a focus on mailbox and high availability features, this book delivers the ultimate, in-depth reference to IT professionals planning and managing an Exchange Server 2013 deployment. Guided by Tony Redmond, a Microsoft MVP and award-winning author, you will:

  • Understand major changes to Exchange Server architecture

  • Get inside insights for planning your upgrade or deployment

  • Examine the new web-based Exchange admin center (EAC)

  • Take a deep dive into configuring mailboxes, distribution groups, and contacts; planning and managing the Managed Store; database availability groups; mailbox replication service; compliance, data leakage, and data loss prevention; site mailboxes; modern public folders

  • Table of Contents

    1. Microsoft Exchange Server 2013: Mailbox and High Availability
    2. Foreword for Exchange 2013 Inside Out books
    3. Introduction
      1. Acknowledgments
      2. Errata & book support
      3. We want to hear from you
      4. Stay in touch
    4. 1. Introducing Microsoft Exchange Server 2013
      1. Understanding development priorities
      2. The influence of The Service
        1. Exchange Online and Exchange development
        2. Transition into the cloud
      3. Exchange 2013 architecture
      4. The motivation to upgrade
        1. Evolving from earlier versions of Exchange
        2. Waiting for updates
        3. Fundamental questions before you upgrade
          1. Building a business case
          2. Tighter integration with SharePoint and Lync
          3. Greater compliance
          4. Information Store improvements
          5. Modern public folders
          6. Management interfaces
      5. Selecting the right Windows Server for Exchange 2013
      6. Using virtualization
      7. Preparing for Exchange 2013
        1. A word about transport
        2. The test plan
        3. Testing for operational processes
        4. Testing for programming and customizations
        5. Updating earlier versions of Exchange
        6. Deploying earlier versions of Exchange servers alongside Exchange 2013
      8. Exchange 2013 editions
      9. Active Directory
        1. Using the strong link between Exchange and Active Directory
        2. ADSIEdit
      10. Useful utilities
        1. MFCMAPI
        2. Exchange Web Services Editor
      11. Installing Exchange 2013
    5. 2. Installing Exchange 2013
      1. Approaching the installation
      2. Types of Active Directory deployment that support Exchange
      3. Preparing Active Directory for Exchange
      4. Creating the Exchange 2013 organization
      5. Deploying an Exchange 2013 server
        1. Installing UCMA
        2. Running Setup
        3. Setup logs
        4. Uninstalling Exchange
        5. Repairing Exchange
        6. Recovering a failed server
      6. Versions, cumulative updates, and service packs
        1. Cumulative updates
        2. Version numbers
        3. Object versions
        4. Reporting licenses
      7. Security groups and accounts Exchange creates
      8. Namespace planning
        1. Self-signed certificates
        2. Using the Exchange 2013 CAS to handle connections
        3. The case for protocol-specific namespaces
      9. Contemplating management
    6. 3. The Exchange Management Shell
      1. How Exchange uses Windows PowerShell
      2. Using remote Windows PowerShell
        1. Connecting to remote PowerShell
        2. Limiting user functionality
      3. EMS basics
        1. Command editing
        2. Handling information EMS returns
        3. Selective output
        4. Using common and user-defined variables
        5. Using PowerShell ISE with Exchange
        6. Identities
        7. Piping
        8. OPATH filters
        9. Server-side and client-side filters
        10. Transcripts
        11. Bulk updates
        12. Calling scripts
        13. Execution policies
        14. Profiles
      4. Active Directory for PowerShell
        1. Setting the right scope for objects in a multi-domain forest
      5. Exploring useful EMS examples
        1. Looking for large folders
        2. Outputting a CSV file
        3. Creating a report in HTML
      6. Verbose PowerShell
      7. Controlling access to Exchange
    7. 4. Role-based access control
      1. RBAC basics
      2. Roles
      3. Role groups
      4. Scopes
      5. Working with RBAC
        1. Creating a new role group
        2. Maintaining role group membership
      6. Role group management
      7. Role assignment
        1. Using role assignment policy to limit access
        2. Creating roles for specific tasks
        3. Specific scopes for role groups
        4. Database scoping
        5. Special roles
        6. Unscoped roles
        7. Which role groups do I belong to?
      8. Assignment policies
      9. Implementing a split permissions model
      10. Figuring out RBAC
      11. On to management
    8. 5. Mailbox management
      1. Seeking perfection halts progress
        1. Starting EAC
        2. How EAC accesses Exchange data
        3. Changing EAC columns
        4. Naming conventions
      2. Managing Recipients
        1. Recipient filtering
        2. Exporting EAC information to CSV files
        3. Some mysterious mailboxes
      3. The need for mailboxes
      4. Naming mailboxes
      5. Creating new mailboxes
        1. Completing mailboxes
        2. Bulk mailbox creation
        3. Creating new room and resource mailboxes
        4. Languages
        5. Default folders
        6. Manipulating mailbox settings
        7. Automating mailbox settings
        8. What’s in a mailbox?
        9. Ready-to-go custom attributes
      6. Mailbox resources provisioning management agent
      7. Setting mailbox quotas
      8. Removing or disabling mailboxes
      9. Reconnecting mailboxes
      10. Discovery mailboxes
        1. Creating additional discovery mailboxes
      11. Health mailboxes
      12. Setting mailbox permissions
        1. Mailbox delegation
        2. Managing Full Access permission
        3. Mailbox auto-mapping through Autodiscover
        4. Opening another user’s mailbox with Outlook Web App
        5. Sending messages on behalf of other users
        6. Outlook delegate access
      13. Shared mailboxes
      14. Recalling messages
      15. Moderated recipients
        1. Moderated groups
        2. Processing moderation requests
        3. Moderated mailboxes
      16. Mail-enabled contacts
      17. Mail users
      18. Resource mailboxes
        1. Defining custom properties for resource mailboxes
        2. Providing policy direction to the Resource Booking Attendant
        3. Processing meeting requests according to policy
        4. Equipment mailboxes
      19. Enough about mailboxes
    9. 6. More about the Exchange Administration Center
      1. Groups
        1. Managing groups
        2. Creating new groups
        3. Group owners
        4. Group expansion
        5. Protected groups
        6. Viewing group members
        7. Security groups
        8. Tracking group usage
        9. Allowing users to manage groups
          1. Planning for user-maintained groups
          2. Defining a default group location
          3. Creating a group naming policy
          4. How users maintain groups
          5. Restricting users to looking but not touching
        10. Room lists
      2. Dynamic distribution groups
        1. OPATH queries
        2. Creating new dynamic distribution groups
        3. Validating query results
        4. Creating dynamic groups with EMS
        5. Using custom filters
          1. A custom filter to address mailboxes in a database
      3. Sharing
      4. Certificate management
      5. Mail flow and rules
      6. Delivery reports
        1. Administrator searches for delivery reports
        2. Using EMS to search delivery reports
      7. Running EAC without an Exchange mailbox
      8. Setting diagnostics for Exchange servers
      9. But what will you manage?
    10. 7. Addressing Exchange
      1. Email address policies
        1. Email policy priority
        2. Creating a new email address policy
        3. Focusing on certain recipients by using filters
        4. Creating email address policies with custom filters
      2. Address lists
      3. Address book policies
        1. ABPs and groups
        2. Creating and implementing an ABP
      4. The Offline Address Book
        1. The OAB and Outlook
        2. How Exchange 2013 generates the Offline Address Book
          1. Default OAB operation
          2. What’s in the OAB
          3. Creating new OAB generation mailboxes
        3. Creating and using customized OABs
      5. Hierarchical address book
      6. MailTips and group metrics
        1. Client interaction
        2. Configuring MailTips
        3. User experience
        4. Custom MailTips
        5. Multilingual custom MailTips
        6. OAB support for MailTips
      7. The display or Details Templates Editor
      8. The next step
    11. 8. The Exchange 2013 Store
      1. Long live JET!
      2. Maximum database size
        1. Sizing mailboxes
      3. Dealing with I/O
        1. Maintaining contiguity
        2. The database schema
        3. Exchange 2013 I/O improvements
      4. Workers, controller, and memory
      5. Managed Availability and the Managed Store
      6. Database management
        1. Creating new mailbox databases
        2. Updating mailbox databases after installation
        3. Backups and permanent removal
        4. Removing a database
      7. Transaction logs
        1. Log sets
        2. Transaction log checksum
        3. Transaction log I/O
        4. The question of circular logging
        5. Reserved logs
      8. Background maintenance
        1. Database checksums
        2. Database defragmentation
        3. Database compaction
        4. Page zeroing
        5. Content maintenance tasks
      9. Corrupt item detection and isolation
        1. Protection against high latency
        2. Protection against excessive database or log growth
        3. Debugging swelling databases
        4. Online repair cmdlets
      10. Rebuilding a database
        1. Using ESEUTIL
      11. Database usage statistics
      12. Mailbox assistants
      13. And now for something completely different
    12. 9. The Database Availability Group
      1. Changes in high availability in Exchange 2013
      2. Database portability
        1. Database Availability Group basics
        2. The dependency on Windows clustering
      3. Migrating an Exchange 2010 DAG
      4. Active Manager
        1. Automatic database transitions
        2. Managed Availability and high availability
        3. Best copy and server selection
        4. ACLL: Attempt copy last logs
      5. Transaction log replay: The foundation for DAG replication
        1. Transaction log compression
        2. Block mode replication
        3. Transaction log truncation
        4. Incremental resynchronization
        5. Seeding a database
      6. Changes in message submission within a DAG
      7. Day-to-day DAG management and operations
        1. Building the DAG
        2. Pre-staging the Cluster Name Object
        3. The role of the FSW
        4. DAG task logging
        5. Crimson events
        6. Managing DAG properties
        7. DAG networks
        8. Cleaning up before creating database copies
        9. Using circular logging inside a DAG
        10. Adding new database copies to a DAG
        11. Monitoring database copies
        12. Reseeding a database copy
        13. Adding database copies with EMS
        14. Using a lagged database copy
          1. Self-maintained lagging
          2. Lagged database copies and Safety Net
        15. Activating a mailbox database copy
        16. Rebalancing database copies
        17. Performing a server switchover
        18. AutoDatabaseMountDial and potential issues moving databases
        19. Activation blocks
        20. Moving database locations within a DAG
        21. Removing database copies
        22. Removing servers from a DAG
        23. Handling storage failures
      8. Datacenter Activation Coordination
      9. Approaching DAG designs
        1. How Exchange 2013 changes the resilience equation
        2. Building a DAG with Exchange Standard edition
      10. Server maintenance
      11. Stressed servers
      12. On to protecting data
    13. 10. Moving mailboxes
      1. The Mailbox Replication service
      2. Moving mailboxes
        1. Asynchronous moving
      3. The Migration service
      4. Mailbox Replication service processing
        1. MRS and system resources
        2. Preventing loss of data
      5. Creating and managing migration batches with EAC
      6. Using EMS with migration batches
      7. Reporting mailbox moves
        1. Getting more information about a move
        2. Accessing move report histories
      8. Managing individual mailbox moves
        1. Assigning move priority
        2. Moves and mailbox provisioning
        3. Handling move request errors
        4. Checking and altering move request status
        5. Clearing move requests
      9. Migration endpoints
      10. Enabling MRSProxy
      11. Planning mailbox moves
        1. Suspending mailbox moves
      12. Ensuring high availability
      13. MRS configuration file
      14. Mailbox import and export
        1. Gaining permission through RBAC to execute mailbox import and export
        2. Planning the import of PST data
        3. Importing and exporting mailbox data with EAC
        4. Importing and exporting mailbox data with EMS
          1. Retrieving information about import jobs
          2. Exporting mailbox data
          3. Exporting mailbox data with EMS
      15. Alerts
      16. Time to comply
    14. 11. Compliance management
      1. The joy of legal discovery
      2. Archive mailboxes
        1. Enabling archives
          1. Managing archive properties
          2. Checking space usage
          3. Updating properties of an archive mailbox
        2. The default archive and retention policy
        3. Using an archive mailbox
        4. Disabling an archive mailbox
      3. Messaging records management
        1. Types of retention tags
        2. System tags
        3. Designing a retention policy
        4. Managed Folder Assistant and retention policies
        5. Naming retention tags
        6. Creating retention tags
        7. Creating a retention policy
        8. Applying a retention policy to mailboxes
        9. Modifying a retention policy
        10. Customizing retention policies for specific mailboxes
        11. User interaction with retention policies
        12. Setting a retention policy on a folder
        13. Removing tags from policies
        14. Removing a retention policy
        15. Upgrading from managed folders
      4. How the Managed Folder Assistant implements retention policies
        1. Behind the scenes with the MFA
        2. Retention date calculation
      5. Preserving information
        1. Putting a mailbox on retention hold
        2. Putting a mailbox on litigation hold
        3. Searching mailbox content
          1. Search and destroy
        4. In-place holds
        5. Creating a new search
          1. Refining a search
        6. Retrieving discovered content
        7. Examining search results
          1. Controlling access to discovery mailboxes
          2. Exporting discovered content
        8. Resource throttling for searches
        9. How in-place holds work
        10. Using groups with searches
        11. Removing a search
        12. Executing searches with EMS
        13. What Exchange can search
        14. Search syntaxes
      6. The value of the Recoverable Items structure
        1. The function of the Recoverable Items structure
        2. Improvements in Exchange 2013
        3. Single-item recovery
        4. Knowing what’s in Recoverable Items
        5. Managing quotas for Recoverable Items
      7. Auditing administrator actions
        1. The audit mailbox
        2. How administrator auditing happens
      8. Auditing mailbox access
        1. Enabling mailboxes for auditing
        2. Accessing mailbox audit data
      9. Other compliance features
    15. 12. Public folders and site mailboxes
      1. Public folders
        1. New concepts
        2. Creating public folder mailboxes
        3. How many public folder mailboxes are needed?
          1. Calculating public folder mailbox size
        4. Controlling the root
        5. Creating public folders
        6. Mail-enabling public folders
        7. Moving public folders
        8. Redirecting content
        9. Removing a public folder
        10. Mobile access
        11. Organizational forms library
      2. Migration to modern public folders
      3. Site mailboxes
        1. How site mailboxes work
          1. Synchronization between Exchange and SharePoint
          2. Accessing information about site mailboxes from Outlook
          3. Site mailboxes and Office 365
        2. The life cycle of site mailboxes
        3. Site mailbox provisioning policy
      4. Summarizing public folders and site mailboxes
      5. Moving on
    16. A. About the Author
    17. Index
    18. About the Author
    19. Copyright