did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9781555582784

Microsoft Exchange Server 2003

by
  • ISBN13:

    9781555582784

  • ISBN10:

    1555582788

  • Format: Paperback
  • Copyright: 2003-11-01
  • Publisher: Elsevier Science Ltd
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $65.95
  • Digital
    $71.94
    Add to Cart

    DURATION
    PRICE

Supplemental Materials

What is included with this book?

Summary

Written exclusively for Exchange 2003, this title contains intermediate to advanced coverage far beyond the competition's typical installation and set-up how-to's including planning, migration, security, disaster recovery, and vast troubleshooting tips.

Table of Contents

Foreword xix
Preface xxi
Acknowledgments xxv
1 A Brief History of Exchange 1(30)
1.1 Exchange first generation
1(4)
1.2 Exchange second generation
5(8)
1.2.1 Titanium
8(1)
1.2.2 Microsoft support policy
9(2)
1.2.3 Supporting Windows
11(2)
1.3 Exchange third generation
13(5)
1.3.1 The competition
16(2)
1.4 Deploying Exchange 2003
18(7)
1.4.1 Upgrade time
20(3)
1.4.2 Deployment tools
23(2)
1.5 Some things that Microsoft still has to do
25(4)
1.5.1 Administrative flexibility
25(1)
1.5.2 Collaboration
26(1)
1.5.3 Application development
27(1)
1.5.4 Too many servers
28(1)
1.5.5 Security
28(1)
1.6 Moving on
29(2)
2 Exchange and the Active Directory 31(98)
2.1 The Active Directory
32(9)
2.1.1 Multiple forests or just one
33(2)
2.1.2 Components of the Active Directory
35(1)
2.1.3 Moving to a Windows namespace
36(1)
2.1.4 Forests, trees, and domains
37(3)
2.1.5 Domain renaming
40(1)
2.1.6 The Global Catalog
40(1)
2.2 Preparing the Active Directory for Exchange
41(1)
2.3 Active Directory replication
42(21)
2.3.1 Replication basics
43(2)
2.3.2 When Active Directory replication happens
45(1)
2.3.3 Active Directory naming contexts
46(3)
2.3.4 Transforming DCs to GCs
49(2)
2.3.5 USNs and replication
51(4)
2.3.6 Urgent replication
55(1)
2.3.7 Intra- and intersite replication
56(4)
2.3.8 High watermark vector tables and up-to-date vector tables
60(2)
2.3.9 AD replication changes in Windows 2003
62(1)
2.4 The Active Directory Connector
63(15)
2.4.1 Connection agreements
66(5)
2.4.2 Handling multiple recipient containers
71(1)
2.4.3 How the ADC performs synchronization
72(1)
2.4.4 Scheduling a connection agreement
73(1)
2.4.5 Primary and nonprimary connection agreements
74(1)
2.4.6 Synchronizing multiple Exchange 5.5 organizations
75(1)
2.4.7 Site replication services
76(2)
2.5 The LegacyExchangeDN attribute
78(2)
2.6 DSAccess-Exchange's directory access component
80(12)
2.6.1 DSAccess tasks
83(1)
2.6.2 Selecting DCs and GCs for DSAccess
84(2)
2.6.3 Automatic topology detection
86(1)
2.6.4 Directory suitability tests
87(5)
2.7 Interaction between Global Catalogs and clients
92(7)
2.7.1 How many GCs do I need?
94(3)
2.7.2 The GC logon cache
97(2)
2.8 Exchange and the Active Directory schema
99(12)
2.8.1 The impact of updating the schema with new GC attributes
102(1)
2.8.2 Updating the schema with an installation
102(3)
2.8.3 Changing the schema
105(3)
2.8.4 Updating the schema for ambiguous name resolution
108(2)
2.8.5 Exchange-specific permissions
110(1)
2.9 Running Exchange in multiple forests
111(9)
2.9.1 Costs of multiple forests
111(2)
2.9.2 Directory synchronization
113(1)
2.9.3 Calendar interoperability
114(2)
2.9.4 Common platforms
116(1)
2.9.5 Moving users between different Exchange organizations
116(4)
2.10 Active Directory tools
120(9)
2.10.1 ADSIEDIT
120(6)
2.10.2 LDP and LDIFDE
126(1)
2.10.3 ADSI programming interface
127(2)
3 Exchange Basics 129(62)
3.1 The organization
129(3)
3.1.1 Back to the past Exchange sites
130(2)
3.1.2 Naming the organization
132(1)
3.2 Access control
132(9)
3.2.1 Administrative delegation
134(7)
3.3 Administrative and routing groups
141(15)
3.3.1 Defining an administrative group
142(2)
3.3.2 Moving from sites to administrative groups
144(4)
3.3.3 No way to change administrative group design
148(1)
3.3.4 Moving to native mode
149(1)
3.3.5 The move to LocalSystem
150(2)
3.3.6 Routing groups
152(1)
3.3.7 Routing group design
153(3)
3.4 Mailboxes and user accounts
156(12)
3.4.1 Accessing Exchange attributes for mail-enabled objects
159(5)
3.4.2 Moving mailboxes
164(4)
3.5 Distribution groups
168(12)
3.5.1 Forming Windows groups
169(3)
3.5.2 Expanding distribution lists
172(1)
3.5.3 How many objects can I have in a group?
173(1)
3.5.4 Managing distribution lists
174(3)
3.5.5 Protected groups
177(1)
3.5.6 Suppressing 00F
178(1)
3.5.7 Using public folder repositories for distribution lists
179(1)
3.5.8 Using groups for permissions
180(1)
3.6 Query-based distribution groups
180(9)
3.6.1 Creating new query-based groups
182(4)
3.6.2 Using custom attributes in query-based groups
186(1)
3.6.3 Using query-based distribution groups
187(2)
3.7 Summarizing Exchange basics
189(2)
4 Outlook-The Client 191(88)
4.1 MAPI-Messaging Application Protocol
192(6)
4.1.1 Outlook
194(1)
4.1.2 Supporting MAPI clients
195(2)
4.1.3 Authentication
197(1)
4.2 Making Outlook a better network client for Exchange
198(27)
4.2.1 Why RPC latency is important to Exchange
199(2)
4.2.2 Networking improvements in Outlook 2003
201(5)
4.2.3 Cached Exchange mode
206(2)
4.2.4 Drizzle synchronization
208(2)
4.2.5 Download activity
210(4)
4.2.6 Incremental synchronization
214(1)
4.2.7 Deploying cached Exchange mode
215(4)
4.2.8 Compression and buffers
219(2)
4.2.9 Conflict resolution
221(3)
4.2.10 Is Outlook 2003 the best Exchange client?
224(1)
4.3 How many clients can I support at the end of a pipe?
225(1)
4.4 Blocking client access
226(7)
4.4.1 Blocking Outlook clients
229(2)
4.4.2 Blocking clients for Internet Protocol access
231(1)
4.4.3 Selective blocks
232(1)
4.5 Junk mail processing
233(7)
4.5.1 Detecting junk mail
234(1)
4.5.2 How Outlook's junk mail filter works
234(6)
4.5.3 More about rules
240(1)
4.6 The Offline Address Book (OAB)
240(9)
4.6.1 OAB generation process
246(3)
4.7 Free/busy information
249(5)
4.7.1 Other system folders
254(1)
4.8 Personal folders and offline folder files
254(11)
4.8.1 Personal folders
255(2)
4.8.2 Mail delivery to personal folders
257(4)
4.8.3 Configuring PSTs
261(1)
4.8.4 PST archiving
262(3)
4.9 Offline folder files
265(7)
4.9.1 OST synchronization
266(4)
4.9.2 Restricting synchronization traffic
270(1)
4.9.3 The local calendar
271(1)
4.10 SCANPST-first aid for PSTs and OSTs
272(3)
4.10.1 The value of an OST
275(1)
4.11 Working offline or online
275(2)
4.12 Outlook command-line switches
277(2)
5 Outlook Web Access 279(60)
5.1 Second-generation OWA
281(3)
5.1.1 The strategic relationship between IIS and Exchange
282(2)
5.1.2 IIS changes in Exchange 2003
284(1)
5.2 The OWA architecture
284(5)
5.2.1 HTTP-DAV extensions
286(3)
5.3 Functionality: rich versus reach or premium and basic
289(21)
5.3.1 Updating slowly
298(1)
5.3.2 Limiting richness
299(1)
5.3.3 Spell checking
300(2)
5.3.4 Subscriptions
302(2)
5.3.5 Forms or cookie authentication
304(3)
5.3.6 Some missing features in OWA
307(2)
5.3.7 Password updates
309(1)
5.4 Suppressing Web beacons and attachment handling
310(3)
5.5 OWA administration
313(7)
5.5.1 OWA scalability
317(3)
5.6 Exchange's URL namespace
320(3)
5.6.1 FreeDocs
323(1)
5.7 Customizing OWA
323(8)
5.7.1 Branding
327(1)
5.7.2 Segmenting OWA functionality
327(4)
5.8 OWA firewall access
331(6)
5.8.1 Securing OWA
333(1)
5.8.2 IPSec
333(2)
5.8.3 Leaving sensitive files around
335(1)
5.8.4 IE enhanced security
336(1)
5.9 OWA for all
337(2)
6 Internet and Other Clients 339(44)
6.1 IMAP4 clients
339(8)
6.1.1 IMAP virtual server settings
344(3)
6.2 POPS clients
347(1)
6.3 LDAP directory access for IMAP4 and POPS clients
347(3)
6.4 Supporting Apple Macintosh
350(1)
6.5 Supporting UNIX and Linux clients
351(2)
6.6 Exchange Mobile Services
353(8)
6.6.1 Exchange ActiveSync
357(2)
6.6.2 Outlook Mobile Access
359(2)
6.7 Pocket PC clients
361(9)
6.7.1 Connection options
362(2)
6.7.2 Accessing email with the Pocket PC
364(1)
6.7.3 Security and passwords
364(1)
6.7.4 Explaining Pocket PC synchronization
365(2)
6.7.5 Using the Pocket PC
367(3)
6.8 Palm Pilots
370(1)
6.9 Mobile BlackBerries
370(10)
6.9.1 BlackBerry Enterprise Server (BES)
372(4)
6.9.2 Using the BlackBerry
376(2)
6.9.3 The Good option
378(2)
6.9.4 Is a handheld better than a Pocket PC?
380(1)
6.10 Sending messages without clients
380(3)
6.11 Client licenses
383(1)
7 The Store 383(120)
7.1 Structure of the Store
385(2)
7.2 Exchange ACID
387(2)
7.3 EDB database structure
389(14)
7.3.1 EDB page structure
390(1)
7.3.2 Within the trees
390(2)
7.3.3 Database tables and fields
392(1)
7.3.4 Tables in a Mailbox Store
393(3)
7.3.5 Search Folders
396(4)
7.3.6 The checkpoint file
400(2)
7.3.7 Page checksum
402(1)
7.4 The streaming file
403(1)
7.5 Transaction logs
404(18)
7.5.1 Managing transaction logs
406(1)
7.5.2 Creating new generations of transaction logs
407(3)
7.5.3 Reserved logs
410(1)
7.5.4 Locating transaction logs
411(1)
7.5.5 Transactions, buffers, and commitment
412(2)
7.5.6 Examining a transaction log
414(1)
7.5.7 Dumping a transaction log
415(2)
7.5.8 Data records
417(1)
7.5.9 Transaction log I/O
418(1)
7.5.10 Protecting transaction logs
419(1)
7.5.11 Transaction log checksum
420(1)
7.5.12 Circular logging
421(1)
7.5.13 Database zeroing
422(1)
7.6 Store partitioning
422(10)
7.6.1 The advantages of storage groups
423(1)
7.6.2 Planning storage groups
424(3)
7.6.3 Does single-instance storage matter anymore?
427(5)
7.7 Managing storage groups
432(9)
7.7.1 Store status
433(2)
7.7.2 Planning storage groups
435(3)
7.7.3 Creating new storage groups
438(3)
7.8 ESE database errors
441(8)
7.8.1 Hard and soft recoveries
444(5)
7.9 Database utilities
449(7)
7.9.1 Running ESEUTIL
450(5)
7.9.2 ISINTEG
455(1)
7.9.3 ESEFILE
455(1)
7.10 The epoxy layer
456(1)
7.11 The Public Store
457(2)
7.11.1 The goals for public folders
457(2)
7.12 Laying out a public folder design
459(15)
7.12.1 Top-level hierarchies
462(2)
7.12.2 Should you deploy dedicated public folder servers?
464(2)
7.12.3 Auditing public folders
466(1)
7.12.4 Mail-enabling a public folder
467(2)
7.12.5 Public folder favorites
469(2)
7.12.6 Public folder permissions
471(3)
7.13 Public folder replication
474(19)
7.13.1 Creating new replicas
476(2)
7.13.2 Public folder referrals
478(2)
7.13.3 Scheduling replication
480(3)
7.13.4 When public folder replication happens
483(1)
7.13.5 How replication occurs
483(2)
7.13.6 Monitoring the flow of replication
485(2)
7.13.7 Backfilling public folders
487(1)
7.13.8 Replicating public folders with Exchange 5.5
488(1)
7.13.9 Erasing zombies
489(1)
7.13.10 Problems with public folder replication
490(1)
7.13.11 Long-term options for public folders
491(2)
7.14 ExIFS-the Exchange Installable File System
493(10)
7.14.1 The role of ExIFS
495(8)
8 Performance and Clusters 503(46)
8.1 Aspects of Exchange performance
504(9)
8.1.1 Storage
505(2)
8.1.2 Multiple CPUs
507(1)
8.1.3 Memory
508(2)
8.1.4 Using more than 1 GB of memory
510(2)
8.1.5 Advanced performance
512(1)
8.2 Measuring performance
513(6)
8.2.1 Performance measuring tools
514(2)
8.2.2 The difference between vendor testing and your testing
516(3)
8.3 Cloning, snapshots, and lies
519(6)
8.3.1 Volume ShadowCopy Services
522(2)
8.3.2 Using VSS with Exchange 2003
524(1)
8.4 Virtual Exchange servers
525(1)
8.5 A brief history of clustering Exchange
526(1)
8.6 Second-generation Exchange clusters
527(3)
8.6.1 The complexity of clusters
528(2)
8.7 Microsoft cluster basics
530(19)
8.7.1 Resources
530(1)
8.7.2 Resource groups and other cluster terms
530(5)
8.7.3 Installing Exchange on a cluster
535(1)
8.7.4 What clusters do not support
536(1)
8.7.5 Dependencies
537(1)
8.7.6 Clusters and memory fragmentation
537(4)
8.7.7 Monitoring virtual memory use
541(2)
8.7.8 RPC client requests
543(1)
8.7.9 Deciding for or against a cluster
544(2)
8.7.10 Does Exchange 2003 make a difference to clusters?
546(1)
8.7.11 Clusters-in summary
547(2)
9 Getting the Mail through-Routing and Message Delivery 549(118)
9.1 SMTP and X.400
550(1)
9.2 The evolution of SMTP
551(16)
9.2.1 SMTP extensions in Exchange
553(7)
9.2.2 SMTP virtual servers
560(2)
9.2.3 Relays
562(1)
9.2.4 Changing SMTP banners
563(1)
9.2.5 Installing Exchange servers in the DMZ
564(2)
9.2.6 The ongoing role of the X.400 MTA
566(1)
9.3 The transport core
567(5)
9.3.1 Domain and link queues
571(1)
9.4 Processing incoming messages
572(4)
9.4.1 SMTP messages
572(3)
9.4.2 MAPI messages
575(1)
9.4.3 HTTP messages
576(1)
9.4.4 X.400 messages
576(1)
9.4.5 Foreign connectors
576(1)
9.5 Categorization and routing
576(14)
9.5.1 Handling messages for protected groups
577(1)
9.5.2 Moving messages off queues
578(8)
9.5.3 Unreachable domains
586(3)
9.5.4 Exchange and MX records
589(1)
9.6 Routing groups
590(9)
9.6.1 Routing group master
592(2)
9.6.2 Creating new routing groups
594(5)
9.6.3 Routing groups and public folder referrals
599(1)
9.7 Link state routing
599(12)
9.7.1 Routing, retries, and updates
607(2)
9.7.2 Looking at routing information
609(2)
9.8 Connecting routing groups
611(6)
8.1 Creating a routing group connector
613(4)
9.9 Creating an SMTP connector
617(6)
9.9.1 Encrypted SMTP communications
621(1)
9.9.2 Delivery restrictions for SMTP-based connectors
621(2)
9.10 Creating an X.400 connector
623(9)
9.10.1 Deciding when to use an X.400 connection
630(2)
9.11 Understanding routing
632(2)
9.11.1 WinRoute
632(2)
9.12 SMTP logging
634(4)
9.13 SMTP archiving
638(4)
9.14 Global messaging settings
642(6)
9.14.1 Internet message formats
643(4)
9.14.2 Global message delivery aettings
647(1)
9.15 Combating the menace of spam
648(19)
9.15.1 Blocking relays
652(2)
9.15.2 Defining message filters
654(4)
9.15.3 Connection filters and real-time blackhole lists
658(2)
9.15.4 Configuring a connection filter policy
660(1)
9.15.5 Return status codes
661(3)
9.15.6 Sender filters
664(1)
9.15.7 Recipient filters
665(2)
10 Managing Exchange: Users 667(100)
10.1 ESM and other consoles
667(8)
10.1.1 Other Exchange management snap-ins
671(3)
10.1.2 Running ESM on workstations
674(1)
10.2 User access
675(20)
10.2.1 Creating accounts and mailboxes
678(5)
10.2.2 Maintaining mailbox details
683(2)
10.2.3 Restricting mailboxes
685(2)
10.2.4 Mailbox quotas
687(5)
10.2.5 Mailbox surrogacy
692(3)
10.3 User authentication
695(3)
10.4 Defining a document retention policy
698(2)
10.5 The Exchange Mailbox Manager
700(11)
10.5.1 Email and discovery
700(3)
10.5.2 Email retention policies
703(1)
10.5.3 Defining a policy for mailbox management
704(2)
10.5.4 Running Mailbox Manager
706(2)
10.5.5 Mailbox Manager notification messages
708(1)
10.5.6 Mailbox Manager diagnostics
709(2)
10.6 Archiving messages
711(6)
10.6.1 Internal snooping (but nicely)
714(3)
10.7 Exploring the deleted items cache
717(11)
10.7.1 Recovering items
718(2)
10.7.2 Setting a deleted item retention period
720(3)
10.7.3 Cleaning the cache
723(1)
10.7.4 Sizing the cache
723(5)
10.8 Decommissioning mailboxes
728(7)
10.8.1 Mailboxes and document retention
729(1)
10.8.2 Creating a blackhole for messages
730(1)
10.8.3 Redirecting messages
731(1)
10.8.4 Using Outlook rules to process messages
732(2)
10.8.5 User death
734(1)
10.9 Helping users to do a better job
735(10)
10.9.1 Eliminating bad habits to reduce network and storage demands
735(7)
10.9.2 Abusing disclaimers
742(2)
10.9.3 Out of office notifications
744(1)
10.9.4 Some other bad email habits
745(1)
10.10 Email and viruses
745(14)
10.10.1 A brief history of office viruses
746(1)
10.10.2 The Melissa virus, Outlook, and variants
747(1)
10.10.3 Luring users toward infection
748(2)
10.10.4 The dangers of HTML
750(2)
10.10.5 The damage caused by viruses
752(3)
10.10.6 Multistage protection
755(4)
10.11 Exchange antivirus tools
759(8)
10.11.1 The problems with MAPI
760(1)
10.11.2 VSAPI-virus scanning API
761(1)
10.11.3 AV impact on multilingual clients
762(2)
10.11.4 Selecting the right AV product
764(3)
11 Managing Exchange: Servers 767(114)
11.1 System policies
767(2)
11.2 Recipient policies
769(8)
11.2.1 Generating SMTP addresses
774(1)
11.2.2 Changing display names
774(3)
11.3 Recipient update services
777(7)
11.3.1 Mail-enabling objects
780(3)
11.3.2 Processing server details
783(1)
11.4 Backups
784(33)
11.4.1 Creating a backup strategy
785(3)
11.4.2 Backups and storage groups
788(1)
11.4.3 Backup operations
789(4)
11.4.4 Backup patch file
793(1)
11.4.5 Checkpoint file
794(1)
11.4.6 Restoring a database
794(5)
11.4.7 Third-party backup utilities
799(4)
11.4.8 Backing up individual mailboxes
803(1)
11.4.9 Restoring an Exchange server
804(4)
11.4.10 Recovery servers
808(2)
11.4.11 Recovering a Mailbox Store
810(6)
11.4.12 Rapid online, phased recovery
816(1)
11.5 Recovering deleted mailboxes
817(5)
11.5.1 MRC: Mailbox Recovery Center
819(3)
11.6 The Recovery Storage Group
822(12)
11.6.1 Encountering database problems
823(1)
11.6.2 Creating a temporary database
824(2)
11.6.3 Creating the RSG
826(2)
11.6.4 Restoring the database
828(4)
11.6.5 Using ExMerge to recover mailbox data
832(2)
11.6.6 Cleaning up
834(1)
11.7 The ExMerge utility
834(8)
11.7.1 Running ExMerge in batch mode
841(1)
11.7.2 Other recovery utilities
842(1)
11.8 Risk management
842(2)
11.9 The message tracking center
844(16)
11.9.1 Tracking messages
845(3)
11.9.2 Changing tracking log location
848(1)
11.9.3 Changes in Exchange 2003
849(1)
11.9.4 Starting to track messages
850(4)
11.9.5 Tracking log format
854(1)
11.9.6 Understanding message tracking log data
855(3)
11.9.7 Analyzing Message Tracking Data
858(2)
11.10 ExchDump
860(6)
11.10.1 Running ExchDump
861(5)
11.11 Monitoring Exchange
866(9)
11.11.1 Monitoring and notifications
871(4)
11.12 Standard diagnostics
875(2)
11.12.1 Turning up logging
876(1)
11.13 Management frameworks
877(3)
11.14 Exchange and WMI
880(1)
A Appendix A: Recommended Books for Further Reading 881(2)
B Appendix B: Message Tracking Log Codes 883(4)
C Appendix C: TCP/IP Ports Used by Exchange 887(4)
Glossary 891(10)
Index 901

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program