طراحی پورتال های سازمانی شرکت پروجان

شیرپوینت و پراجکت سرور پروجان

استقرار شیرپوینت و پراجکت سرور
  • شیرپوینت

    شیرپوینت راهکاری است آنلاین که به سازمانها امکان پیاده سازی انواع سامانه های اطلاعاتی ، طراحی آنلاین فرمها و فرایندهای گردش کار را به سادگی و با صرف کمترین زمان و هزینه و البته بدون نیاز به دانش برنامه نویسی میدهد.

    ادامه مطلب
  • پراجکت سرور

    پراجکت سرور (استقرار EPM) راهکاری جامع برای مدیریت پروژه در شرکتهای کوچک و بزرگ میباشد. توانایی مدیریت بر روی فعالیتهای پرسنل و پیمانکاریان موجود در سازمان و سنجش  تحقق اهداف از قابلیتهای این سامانه میباشد.

    ادامه مطلب
  • CRM مایکروسافت

    مدیریت ارتباط با مشتری (CRM) سامانه ای کاربردی برای سازمانهای ارائه دهنده محصولات و خدمات میباشد که به آنها در مدیریت اطلاعات مشتریان ، بازاریابی موثر، مدیریت منابع و طراحی و پیاده سازی فرایندهای فروش کمک میکند.

    ادامه مطلب
  • Exchange مایکروسافت

    مایکروسافت Exchange Server به سازمان شما امکان راه اندازی یک ایمیل سرور داخلی را میدهد که علاوه بر امکان به اشتراک گذاری ایمیلها میتوانید دسترسی های مورد نظر خود را برای مشاهده و یا ویرایش کاربران تعریف نمایید. 

    ادامه مطلب

هوش تجاری

شرکت پروجان با ارائه خدمات مشاوره و پیاده سازی سامانه های منعطف بسیار پیشرفته هوش تجاری(BI) و داشبوردهای گزارش گیری قابل نمایش بر روی دسکتاپ ، مرورگر و موبایل همواره در کنار سازمان شما میباشد. جهت آشنایی با خدمات ما و کسب اطلاعات بیشتر اینجا کلیک کنید.

دانلود کتاب آموزش مایکروسافت Exchange

مایکروسافت اکسچنج

کتاب Mastering Microsoft Exchange Server.pdf

David Elfassy

John Wiley & Sons, Inc., Indianapolis, Indiana

همواره زمانی که نیاز به ایجاد یک ایمیل سرور کارا و با قابلیت اطمینان بالا در سازمان مطرح میشود مایکروسافت Exchange یکی از گزینه هایی است که معمولا پیش روی تصمیم گیرندگان قرار میگیرد. سادگی کار با این نرم افزار ، توانایی و امکانات بالای مدیریتی و اتصال به سایر نرم افزارهای آفیس تنها برخی از دلایل استفاده از این نرم افزار میباشند. با این حال بسیاری از کاربردهای این نرم افزار معمولا مورد غفلت واقع شده و با وجود استفاده گسترده از آن ، سازمانها از تمام امکانات این نرم افزار استفاده نمی کنند. کتابی که در پیش روی شما قرار دارد، راهنمای بسیار مناسبی برای استفاده از قابلیتهای مختلف این نرم افزار بوده و با ارائه مثالهای عملیاتی به شما کمک میکند بتوانید با درک صحیحی که از سرویسهای ارائه شده توسط مایکروسافت Exchange پیدا میکنید. تجربه راه اندازی موفق این نرم افزار را در سازمان خود داشته باشید.

لینک دانلود Mastering Microsoft Exchange Server.pdf

 

 

Contents
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxv
Part 1 Exchange Fundamentals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

Email’s Importance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
How Messaging Servers Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
What Is Exchange Server?. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
About Messaging Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Many Modes of Access. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
The Universal Inbox. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Architecture Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Controlling Mailbox Growth . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Personal Folders or PST Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Email Archiving . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Public Folders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Things Every Email Administrator Should Know. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
A Day in the Life of the Email Administrator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Finding Answers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Tools You Should Know. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
The Bottom Line. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Getting to Know Exchange Server 2013 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Exchange Server Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
x64 Processor Requirement. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Windows Server 2008 R2 and Windows Server 2012 . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Installer, Service Pack, and Patching Improvements . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Server Roles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Edge Transport Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Unified Messaging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Client Connectivity. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
The Managed Store. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
High-Availability Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Content Storage. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Exchange Server Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Improved Message and Content Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Built-in Archiving. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Message Transport Rules. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
Message Classifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 

Rights Management Service Message Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Programming Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
New and Improved Outlook Web App. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
Mobile Clients and Improved Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Now, Where Did That Go? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Features No Longer Included. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Clearing Up Some Confusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
The Bottom Line. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Changing from a Technology to a Business Viewpoint. . . . . . . . . . . . . . . . . . . . . . . . . . . 55
What’s in a Name? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
Backup and Recovery. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
Disaster Recovery. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
Location, Location, Location. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
Management Frameworks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
A Closer Look at Availability. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
Storage Availability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
An Overview of Exchange Storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
Direct Attached Storage. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Storage Area Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Compliance and Governance. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
The Bottom Line. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
Virtualization Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
Terminology. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
Understanding Virtualized Exchange. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Understanding Your Exchange Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
Effects of Virtualization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
Environmental Impact . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
Space Impact . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
Complexity Impact . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
Additional Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
Virtualization Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
Hardware Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
Software Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Operations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
Deciding What to Virtualize . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
Exchange Roles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
Testing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Possible Virtualization Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Small Office/Remote or Branch Office . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Site Resilience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Mobile Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
The Bottom Line. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101

Why Use PowerShell? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
Understanding the Command Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
Verbs and Nouns. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
Help. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
The -Identity Parameter. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
Cmdlet Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
Tab Completion. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110
Alias . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110
Object-oriented Use of PowerShell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
Filtering Output . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
Formatting Output . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122
Directing Output to Other Cmdlets. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
PowerShell v3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
Remote PowerShell. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
Tips and Tricks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
Managing Output. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
Running Scripts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
Running Scheduled PowerShell Scripts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
Debugging and Troubleshooting from PowerShell. . . . . . . . . . . . . . . . . . . . . . . . . . . 132
Getting Help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133
Exchange Server 2013 Help File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133
Help from the Command Line . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133
Getting Tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146
The Bottom Line. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147
Autodiscover Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
What Autodiscover Provides . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
How Autodiscover Works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
Site Affinity (aka Site Scope) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162
Planning Certificates for Autodiscover . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
The X.509 Certificate Standard. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
Deploying Exchange Certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167
The Bottom Line. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174
Server Sizing Quick Reference. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177
Hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178
Operating Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181
Configuring Windows. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183
Active Directory Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183

Operating-system Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184
Installing Exchange Server 2013 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186
GUI-based Installation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187
Command-line Installation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192
Post-installation Configuration Steps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192
Final Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
Configuring Recipients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197
The Bottom Line. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199
The Roles of Server Roles. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201
Exchange Server 2013 Server Roles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203
Mailbox Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204
Client Access Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208
Possible Role Configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213
Combined-function Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213
Scaling Exchange Server 2013 Roles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214
The Bottom Line. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215
Getting the Right Server Hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217
The Typical User . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219
CPU Recommendations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220
Memory Recommendations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223
Network Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225
Disk Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226
Software Requirements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
Operating System Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
Windows 7 and Windows 8 Management Consoles. . . . . . . . . . . . . . . . . . . . . . . . . . 235
Additional Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236
Active Directory Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236
Installation and Preparation Permissions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237
Coexisting with Previous Versions of Exchange Server. . . . . . . . . . . . . . . . . . . . . . . 237
The Bottom Line. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238
Before You Begin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241
Preparing for Exchange 2013 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242
Existing Exchange Organizations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243
Preparing the Schema . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243
Preparing the Active Directory Forest . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245
Preparing Additional Domains . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248
Graphical User Interface Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248
Command-Line Setup. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252
Command-Line Installation Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252
Command-Line Server-Recovery Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255

Command-Line Delegated Server Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256
Installing Language Packs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256
The Bottom Line. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257
Upgrades, Migrations, Transitions, and Deployments . . . . . . . . . . . . . . . . . . . . . . . . . . 260
Factors to Consider before Upgrading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260
Choosing Your Strategy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263
Transitioning Your Exchange Organization. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265
Upgrading Your Exchange Organization. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267
Order of Installation for Exchange Server 2013 Roles. . . . . . . . . . . . . . . . . . . . . . . . . 269
On-Premises Coexistence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 270
Office 365. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271
Office 365 Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271
Office 365 Coexistence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272
Performing an On-Premises Interorganization Migration . . . . . . . . . . . . . . . . . . . . . . . 273
Is Interorganization Migration the Right Approach? . . . . . . . . . . . . . . . . . . . . . . . . . 273
Choosing the Right Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274
Maintaining Interoperability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275
Preparing for Migration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277
Moving Mailboxes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277
Migrating User Accounts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278
Permissions Required . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279
Importing Data from PSTs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279
Tasks Required Prior to Removing Legacy Exchange Servers . . . . . . . . . . . . . . . . . . . . 280
Exchange Server Deployment Assistant. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281
The Bottom Line. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281
RBAC Basics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285
Differences from Previous Exchange Versions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285
How RBAC Works. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 286
Managing RBAC. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289
Exchange Administration Center. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289
Exchange Management Shell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 290
RBAC Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293
Defining Roles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294
What’s in a Role?. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294
Choosing a Role. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297
Customizing Roles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299

Distributing Roles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303
Determining Where Roles Will Be Applied. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303
Assigning Roles to Administrators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 309
Assigning Roles to End Users. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 315
Auditing RBAC. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 320
Seeing What Changes Were Made. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 320
Seeing Who Has Been Assigned Rights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 322
The Bottom Line. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 323
Understanding Exchange Recipients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 325
Mailbox-enabled Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 325
Mail-enabled Users and Contacts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 326
Mail-enabled Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327
Mail-enabled Public Folders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328
Defining Email Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328
Accepted Domains . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329
Email Address Policies. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331
The Bottom Line. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 336
Managing Mailboxes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339
Using the EAC to Assign a Mailbox. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339
Assigning a Mailbox to a User from the EMS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343
Creating a New User and Assigning a Mailbox Using the EAC. . . . . . . . . . . . . . . . 346
Managing User and Mailbox Properties. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 347
Moving Mailboxes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 360
Moving Mailboxes Using the EAC. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 361
Moving Mailboxes Using the EMS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 364
Retrieving Mailbox Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 370
Deleting Mailboxes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 372
Deleting the Mailbox but Not the User . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 373
Deleting Both the User and the Mailbox. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 373
Permanently Purging a Mailbox . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 373
Reconnecting a Deleted Mailbox . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 374
Bulk Manipulation of Mailboxes Using the EMS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 376
Managing Mailbox Properties with the EMS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 376
Scripting Account Creation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 377
Managing Mailbox Content . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 378
Understanding the Basics of Messaging Records Management . . . . . . . . . . . . . . . . 378
Getting Started with Messaging Records Management . . . . . . . . . . . . . . . . . . . . . . . . . 380
Managing Default Folders. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 380
Creating Retention Tags. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 381
Managing Retention Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383
The Bottom Line. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 387

Understanding Mail-enabled Groups. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 389
Naming Mail-enabled Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 390
Creating Mail-enabled Groups. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 391
Managing Mail-enabled Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 395
Creating and Managing Mail-enabled Contacts and Users . . . . . . . . . . . . . . . . . . . . . . 405
Managing Mail-enabled Contacts and Users via the EAC. . . . . . . . . . . . . . . . . . . . . 407
Managing Mail-enabled Contacts and Users via the EMS . . . . . . . . . . . . . . . . . . . . 409
The Bottom Line. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 410
The Unique Nature of Resource Mailboxes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 413
Exchange 2013 Resource Mailbox Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 414
Creating Resource Mailboxes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 414
Creating and Defining Resource Mailbox Properties. . . . . . . . . . . . . . . . . . . . . . . . . 414
Defining Advanced Resource Mailbox Features. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 416
Defining Resource Scheduling Policies. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 418
Automatic Processing: AutoUpdate vs. AutoAccept. . . . . . . . . . . . . . . . . . . . . . . . . . 425
Migrating Resource Mailboxes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 425
The Bottom Line. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 426
Understanding Architectural Changes for Modern Public Folders. . . . . . . . . . . . . . . . 429
Modern Public Folders and Replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 430
Modern Public Folder Limitations and Considerations . . . . . . . . . . . . . . . . . . . . . . . 430
Moving Public Folders to Exchange Server 2013. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 431
Managing Public Folder Mailboxes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 433
Managing Public Folders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 435
Defining Public Folder Administrators. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 442
Using the Exchange Management Shell to Manage Public Folders . . . . . . . . . . . . . 442
Using Outlook to Create a Public Folder. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 447
Understanding the Public Folder Hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 449
Exploring Public Folder High Availability. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 450
Managing Public Folder Permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 451
Comparing Public Folders, Site Mailboxes, and Shared Mailboxes. . . . . . . . . . . . . . . . 452
The Bottom Line. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 453
Introduction to Archiving . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 455
Benefits of Archiving. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 456
Retention . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 456
Discovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 458
Eliminating PST Files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 458
Reducing Storage Size . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 458

Disaster Recovery. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 458
Compliance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 459
Industry Best Practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 461
Storage Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 461
Archiving PSTs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 462
Retention Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 464
Archiving with Exchange Server 2013 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 465
Exchange In-Place Archive vs. Third-Party Enterprise Archives. . . . . . . . . . . . . . . 466
Retention Policies and Tags. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 467
Enabling Archiving . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 472
Using the Exchange Server 2013 In-Place Archive . . . . . . . . . . . . . . . . . . . . . . . . . . . 474
Archive Quotas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 474
Offline Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 475
Understanding Litigation and In-Place Hold . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 475
Placing a Mailbox on In-Place Hold. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 475
Implementing eDiscovery. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 476
Requirements and Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 480
Licensing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 480
Server Storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 480
Client Requirements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 481
The Bottom Line. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 481
Getting to Know Exchange Server Database Storage. . . . . . . . . . . . . . . . . . . . . . . . . . . . 485
Exchange Server 2007 (Third Generation) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 485
Exchange Server 2010 (Fourth Generation). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 486
Exchange Server 2013 (Current Generation). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 486
Basics of Storage Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 486
Storage in Exchange Server 2013 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 488
An Additional Factor: the Personal Archive (aka the Archive Mailbox). . . . . . . . . 489
Disk Size vs. I/O Capacity. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 490
What’s Keeping Me Up at Night?. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 491
Planning Mailbox Storage. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 491
Maximum Database Sizes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 491
Determining the Number of Databases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 492
Allocating Disk Drives. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 493
Managing Mailbox Databases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 494
Viewing Mailbox Databases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 494
Creating Mailbox Databases. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 495
Moving the Mailbox Database EDB File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 496
Moving the Mailbox Database Log Files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 496
Properties of a Mailbox Database. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 497
The Bottom Line. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 505

Understanding Database Replication in Exchange Server 2013. . . . . . . . . . . . . . . . . . . 508
File Mode vs. Block Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 508
The Anatomy of a Database Availability Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 509
File Share Witness. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 512
Creating a Database Availability Group Using the EAC . . . . . . . . . . . . . . . . . . . . . . 513
Creating a Database Availability Group Using EMS . . . . . . . . . . . . . . . . . . . . . . . . . 515
Managing a Database Availability Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 515
Managing a DAG in EMS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 515
Multiple Databases per Volume . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 516
Managing a DAG Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 518
Adding a Mailbox Database to a DAG. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 521
Automatic Reseed (aka AutoReseed). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 528
Understanding Active Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 529
Understanding the Best Copy and Server Selection Process. . . . . . . . . . . . . . . . . . . 533
Understanding Site Resiliency for Exchange Server 2013 . . . . . . . . . . . . . . . . . . . . . . . . 539
Page Patching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 539
Datacenter Activation Coordination . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 540
Implementing Site-resiliency Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 542
The Bottom Line. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 545
Learning the Client Access Server Role Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . 548
Requirements for the Client Access Server Role. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 548
CAS Operating System Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 549
CAS Hardware Recommendations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 549
Services the Client Access Server Provides . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 550
Remote PowerShell. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 550
Outlook Web App. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 551
Exchange Admin Center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 554
Autodiscover . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 556
Outlook/Outlook Anywhere . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 561
IMAP4/POP3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 563
The Availability Service. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 564
Positioning the Client Access Server Role . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 565
Network Placement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 565
Multirole Servers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 566
Namespace Planning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 567
Load Balancing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 572
Coexistence with Previous Versions of Exchange Server . . . . . . . . . . . . . . . . . . . . . . . . 573
Coexistence with Exchange Server 2010 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 574
Coexistence with Exchange Server 2007. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 580
Certificates. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 587
Default Certificate Usage. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 587

Using Subject Alternative Name Certificates. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 589
Using the Exchange Certificate Wizards. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 589
Generating a Certificate Request in the EMS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 592
The Front End Transport Service. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 592
The Front End Transport Service Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 593
Front End Transport Message Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 594
Unified Messaging. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 595
UM Front End Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 595
The Bottom Line. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 596
Understanding the Transport Improvements
in Exchange Server 2013. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 599
Message Routing in the Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 600
Sending and Receiving Email . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 604
Important Information When Receiving Email. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 604
Receive Connectors. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 606
Important Information When Sending Email . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 613
Send Connectors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 614
Securing Mail Flow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 618
Accepted Domains . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 620
Remote Domains. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 622
Messages in Flight . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 624
Understanding Shadow Redundancy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 624
Understanding Safety Net. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 625
Using Exchange Server 2013 Anti-Spam/
Anti-Malware Tools. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 626
Updating Anti-Malware Engines. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 627
Anti-Malware Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 627
Managing Anti-Malware Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 629
Enabling Anti-Spam Agents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 630
Content Filtering. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 630
Recipient Filtering. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 633
Tarpitting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 633
Sender Filtering. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 634
Sender Reputation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 635
Troubleshooting Email Routing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 636
The Bottom Line. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 637
Introducing the New Exchange 2013 Transport Architecture . . . . . . . . . . . . . . . . . . . . 640
All Messages Pass Through the Mailbox Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 640
Setting Up Message Classifications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 641
Modifying and Creating Message Classifications. . . . . . . . . . . . . . . . . . . . . . . . . . . . 643

Deploying Message Classifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 643
Setting Up Transport Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 645
Transport Rules Coexistence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 647
Transport Rules and Server Design Decisions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 648
Selecting Conditions and Exceptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 648
Creating New Rules with the Exchange Administration Center . . . . . . . . . . . . . . . 651
Creating New Rules with the Exchange Management Shell . . . . . . . . . . . . . . . . . . . 654
Introducing Data Loss Prevention. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 655
Understanding DLP Policies. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 655
Creating DLP Policies. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 660
Introducing Journaling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 664
Implementing Journaling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 665
Reading Journal Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 667
The Bottom Line. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 667
Basic Troubleshooting Principles. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 671
General Server Troubleshooting Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 673
Event Viewer (Diagnostic Logging). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 673
The Test-* Cmdlets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 676
Troubleshooting Mailbox Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 678
General Mailbox Server Health . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 679
Using Test-MapiConnectivity. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 679
Checking Poison Mailboxes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 680
Checking Database Replication Health. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 680
Troubleshooting Mail Flow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 682
Using Test-Mailflow. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 683
Utilizing the Queue Viewer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 684
Using Message Tracking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 686
Exploring Other Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 688
Troubleshooting Client Connectivity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 689
Troubleshooting Autodiscover . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 690
Using the Test-* Connectivity Cmdlets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 692
The Bottom Line. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 693
Backing Up Exchange Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 695
Determining Your Strategy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 696
Preparing to Recover the Exchange Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 700
Using Windows Server Backup to Back Up the Server . . . . . . . . . . . . . . . . . . . . . . . . . . 700
Performing the Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 701
Using Windows Server Backup to Recover the Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . 704
Recovering the Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 705

Recover Exchange Server Data Using Alternate Methods . . . . . . . . . . . . . . . . . . . . . . . 708
Working with Disconnected Mailboxes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 708
Using a Recovery Database. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 710
Recovering Single Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 711
Recovering the Entire Exchange Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 718
Client Access Server Role . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 719
Database Availability Group Members. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 720
The Bottom Line. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 720
Chapter 1: Putting Exchange Server 2013 in Context . . . . . . . . . . . . . . . . . . . . . . . . . . . . 723
Chapter 2: Introducing the Changes in Exchange Server 2013. . . . . . . . . . . . . . . . . . . . 723
Chapter 3: Understanding Availability, Recovery, and Compliance . . . . . . . . . . . . . . . 724
Chapter 4: Virtualizing Exchange Server 2013 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 725
Chapter 5: Introduction to PowerShell and the Exchange Management Shell . . . . . . 726
Chapter 6: Understanding the Exchange Autodiscover Process . . . . . . . . . . . . . . . . . . 727
Chapter 7: Exchange Server 2013 Quick Start Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . 728
Chapter 8: Understanding Server Roles and Configurations . . . . . . . . . . . . . . . . . . . . . 729
Chapter 9: Exchange Server 2013 Requirements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 730
Chapter 10: Installing Exchange Server 2013. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 732
Chapter 11: Upgrades and Migrations to Exchange Server 2013 or Office 365. . . . . . . 734
Chapter 12: Management Permissions and Role-based Access Control . . . . . . . . . . . . 736
Chapter 13: Basics of Recipient Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 738
Chapter 14: Managing Mailboxes and Mailbox Content . . . . . . . . . . . . . . . . . . . . . . . . . 739
Chapter 15: Managing Mail-enabled Groups, Mail-enabled Users,
and Mail-enabled Contacts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 741
Chapter 16: Managing Resource Mailboxes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 742
Chapter 17: Managing Modern Public Folders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 744
Chapter 18: Managing Archiving and Compliance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 745
Chapter 19: Creating and Managing Mailbox Databases . . . . . . . . . . . . . . . . . . . . . . . . 746
Chapter 20: Creating and Managing Database Availability Groups. . . . . . . . . . . . . . . 747
Chapter 21: Understanding the Client Access Server. . . . . . . . . . . . . . . . . . . . . . . . . . . . 748
Chapter 22: Managing Connectivity with Transport Services . . . . . . . . . . . . . . . . . . . 751
Chapter 23: Managing Transport, Data Loss Prevention, and Journaling Rules . . . . 753
Chapter 24: Troubleshooting Exchange Server 2013. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 754
Chapter 25: Backing Up and Restoring Exchange Server . . . . . . . . . . . . . . . . . . . . . . . . 755
Index. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 757

 

Introduction
Thank you for purchasing (or considering the purchase of) Mastering Exchange Server 2013; this is the latest in a series of Mastering Exchange Server books that have helped thousands of readers to better understand Microsoft’s excellent messaging system. Along the way, we hope that this series of books has made you a better administrator and allowed you to support your organizations to the best of your abilities.
When we started planning the outline of this book more than a year before its release, Exchange Server 2013 appeared to be simply a minor series of improvements over Exchange Server 2010. Of course, the further we explored the product, the more we found that was not the case. Many of the improvements in Exchange Server 2013 were major improvements (such as DAG management) and sometimes even complete rewrites (such as in the case of the Client Access server role) of how the product worked previously.
Another challenge then presented itself. The market penetration of Exchange Server 2010 was fairly dominant, but we found that many organizations still run Exchange Server 2007. Though increasingly smaller, a percentage of Exchange Server customers are still using Exchange Server 2003. Thus, we needed to explain the differences for not only Exchange Server 2010 administrators but also for the Exchange Server 2007 and even Exchange Server 2003 administrators.
We took a step back and looked at the previous editions of the book to figure out how much of the previous material was still relevant. Some of the material from the Exchange Server 2010 book is still relevant but needed updating. Some required completely new chapters to cover new technologies introduced in Exchange Server 2013 or technologies that have since taken on more importance in deployments and management. We faced the challenge of explaining two management interfaces, Exchange Management Shell and Exchange Admin Center, as well as
describing the new roles and features.
We started working with the Exchange Server 2013 code more than a year before we expected to release the book. Much of the book was written using the RTM code that was first made available in October 2012, but as we continued writing the book, we made updates to changes introduced in Cumulative Update 1 and Cumulative Update 2. So, you can safely assume when reading this book that it is based on the latest bits of Exchange Server 2013 that released in late summer 2013. In writing this book, we had a few goals for the book and the knowledge we wanted to impart to the reader:
◆ We wanted to provide an appropriate context for the role of messaging services in an organization, outlining the primary skills required by an Exchange Server administrator.
◆ We wanted the reader to feel comfortable when approaching an Exchange Server environment of any size. The content in this book can assist administrators of small companies with only one server, as well as administrators who handle large Exchange Server farms.
◆ We wanted the skills and tasks covered in this book to be applicable to 80 percent of all organizations running Exchange Server.
◆ We wanted the book to educate not only “new to product” administrators but also those “new to version” administrators who are upgrading from a previous version.

◆ We wanted the book to familiarize administrators with Office 365 environments and the implementation of hybrid coexistence with on-premises Exchange Server deployments.
◆ We wanted to provide familiar references for administrators of previous versions, ensuring that Exchange Server 2003, 2007, and 2010 administrators can easily find equivalent solutions in Exchange Server 2013.
Microsoft listened to the advice of many of its customers, its internal consultants at Microsoft Consulting Services (MCS), Microsoft Certified Systems Engineers (MCSEs), Most Valuable Professionals (MVPs), Microsoft Certified Solutions Masters (MCSMs), and Microsoft Certified Trainers (MCTs) to find out what was missing from earlier versions of the product and what organizations’ needs were. Much of this work started even before Exchange Server 2013 was
released.

 

Major Changes in Exchange Server 2013
This book covers the many changes in Exchange Server 2013 in detail, but we thought we would give you a little sample of what is to come in the chapters. As you can imagine, the changes are once again significant, considering the tremendous effort that Microsoft sinks into the Exchange Server line of products. Exchange Server is a significant generator of revenue for Microsoft and is also a foundational service for Office 365. Microsoft has every reason to continue improving this most impressive market leader of email and collaboration services. The primary changes in Exchange Server 2013 since the latest release (Exchange Server 2010) have come in the following areas:
◆ Replacement of the Exchange Management Console by the web-based console Exchange Admin Center
◆ Integration of Transport services into the Client Access and Mailbox server roles and subsequent removal of the Hub Transport server role
◆ Integration of Unified Messaging services into the Client Access and Mailbox server roles and subsequent removal of the Unified Messaging server role
◆ Reconfiguration of public folders to be stored in mailbox databases within a public folder mailbox
◆ Improved integration with SharePoint Server 2013 and Lync Server 2013, including options for archiving Lync conversations in Exchange Server
◆ Completely rewritten Information Store processes, now named the Managed Store
◆ Significant improvement in database maintenance, database availability group management, and overall site resiliency functionalities
◆ Significant improvement in Transport rules, mainly through the implementation of the new Data Loss Prevention (DLP) policies Of course, many more changes have been introduced in Exchange Server 2013, but the preceding
list stands out to us as the most noteworthy improvements. Chapter 2, “Introducing the Changes in Exchange Server 2013,” contains an exhaustive list of all significant changes, as well as changes since specific versions of Exchange Server (for example, Exchange Server 2003 versus Exchange Server 2013).

 

How This Book Is Organized
This book consists of 25 chapters, divided into five broad parts. As you proceed through the book, you’ll move from general concepts to increasingly detailed descriptions of hands-on implementation. This book won’t work well for practitioners of the time-worn ritual of chapter hopping. Although some readers may benefit from reading one or two chapters, we recommend that you read most of the book in order. Even if you have experience as an Exchange Server administrator, we recommend that you do not skip any chapter, because they all provide new information since the previous iterations of Exchange Server. Only if you already have considerable experience with these products should you jump to the chapter that discusses in detail the information you are looking for.
If you are like most administrators, though, you like to get your hands on the software and actually see things working. Having a working system also helps many people as they read a book or learn about a new piece of software because this lets them test new skills as they learn them. If this sounds like you, then start with Chapter 7, “Exchange Server 2013 Quick Start Guide.” This chapter will take you briefly through some of the things you need to know to get Exchange Server running, but not in a lot of detail. As long as you’re not planning to put your quickie server into production immediately, there should be no harm done. Before you put it into production, though, we strongly suggest that you explore other parts of this book. Here’s a guide to what’s in each chapter.

 

Part 1: Exchange Fundamentals

This part of the book focuses on concepts and features of Microsoft’s Windows Server 2012, Exchange Server 2013, and some of the fundamentals of operating a modern client/server email system.

Chapter 1, “Putting Exchange Server 2013 in Context,” is for those administrators who have been handed an Exchange Server organization but who have never managed a previous version of Exchange Server or even another mail system. This will give you some of the basic information and background to help you get started managing Exchange Server and, hopefully, a little history and perspective.
Chapter 2, “Introducing the Changes in Exchange Server 2013,” introduces the new features of Exchange Server 2013 as contrasted with previous versions.
Chapter 3, “Understanding Availability, Recovery, and Compliance,” helps even experienced administrators navigate some of the new hurdles that Exchange Server administrators must overcome, including providing better system availability, site resiliency, backup and restoration plans, and legal compliance. This chapter does not cover database availability groups in detail; instead, that information is covered in Chapter 20, “Creating and Managing Database
Availability Groups.”
Chapter 4, “Virtualizing Exchange Server 2013,” helps you decide whether you should virtualize some percentage of your servers, as many organizations are doing.
Chapter 5, “Introduction to PowerShell and the Exchange Management Shell,” focuses on and uses examples of features that are enabled in PowerShell through the Exchange Server 2013 management extensions for PowerShell. All administrators should have at least a basic familiarity with the Exchange Management Shell extensions for PowerShell even if you rarely use them.

Chapter 6, “Understanding the Exchange Autodiscover Process,” helps you to come up to speed on the inner workings of the magic voodoo that is Autodiscover, a feature that greatly simplifies the configuration of both internal and external clients.

 

Part 2: Getting Exchange Server Running

This section of the book is devoted to topics related to meeting the prerequisites for Exchange Server and getting Exchange Server installed correctly the first time. While installing Exchange Server correctly is not rocket science, getting everything right the first time will greatly simplify your deployment.
Chapter 7, “Exchange Server 2013 Quick Start Guide,” is where everyone likes to jump right in and install the software. This chapter will help you quickly get a single server up and running for your test and lab environment. While you should not deploy an entire enterprise based on the content of this one chapter, it will help you get started quickly.
Chapter 8, “Understanding Server Roles and Configurations,” covers the primary services that run on the two Exchange Server roles: Mailbox server and Client Access server. It also covers the architecture of communications between the roles.
Chapter 9, “Exchange Server 2013 Requirements,” guides you through the requirements (pertaining to Windows Server, Active Directory, and previous versions of Exchange Server) that you must meet in order to successfully deploy Exchange Server 2013.
Chapter 10, “Installing Exchange Server 2013,” takes you through both the graphical user interface and the command-line setup for installing Exchange Server 2013.
Chapter 11, “Upgrades and Migrations to Exchange Server 2013 or Office 365,” helps you decide on the right migration or transition approach for your organization. It recommends steps to take to upgrade your organization from Exchange Server 2007 or 2010 to Exchange Server 2013 or to Office 365. Also included in this chapter are recommendations for migration phases and hybrid coexistence with Office 365.

 

Part 3: Recipient Administration

Recipient administration generally ends up being the most time-consuming portion of Exchange Server administration. Recipient administration includes creating and managing mailboxes, managing mail groups, creating and managing contacts, and administering public folders.
Chapter 12, “Management Permissions and Role-based Access Control,” introduces one of the most powerful features of Exchange Server 2013, Role-based Access Control, which enables extremely detailed delegation of permissions for all Exchange Server administrative tasks. This feature will be of great value to large organizations.
Chapter 13, “Basics of Recipient Management,” introduces you to some concepts you should consider before you start creating users, including how email addresses are generated and how recipients should be configured.

Chapter 14, “Managing Mailboxes and Mailbox Content,” is at the core of most Exchange Server administrators’ jobs since the mailboxes represent our direct customer (the end user). This chapter introduces the concepts of managing mailboxes, mailbox data (such as personal archives), and mailbox data retention.
Chapter 15, “Managing Mail-enabled Groups, Mail-enabled Users, and Mail-enabled Contacts,” covers management of these objects, including creating them, assigning email addresses, securing groups, and allowing for self-service management of groups, and it offers guidelines for creating contacts.
Chapter 16, “Managing Resource Mailboxes,” discusses a key task for most messaging administrators. A resource can be either a room (such as a conference room) or a piece of equipment (such as an overhead projector). Exchange Server 2013 makes it easy to allow users to view the availability of resources and request the use of these resources from within Outlook or Outlook Web App.
Chapter 17, “Managing Modern Public Folders,” introduces you to the new public folder storage and management features in Exchange Server 2013. Although public folders are being deemphasized in many organizations, other organizations still have massive quantities of data stored in them. Microsoft has reinvented public folders in this latest release of Exchange Server.
Chapter 18, “Managing Archiving and Compliance,” covers not only the overall concepts of archiving and how the rest of the industry handles archiving but also the exciting archival and retention features.

 

Part 4: Server Administration

Although recipient administration is important, administrators must not forget their responsibilities to properly set up the Exchange server and maintain it. This section helps introduce you to the configuration tasks and maintenance necessary for some of the Exchange Server 2013 roles as well as safely connecting your organization to the Internet.
Chapter 19, “Creating and Managing Mailbox Databases,” helps familiarize you with the changes in Exchange Server 2013 with respect to mailbox database, storage, and basic sizing requirements. Many exciting changes have been made to support large databases and to allow Exchange Server to scale to support more simultaneous users.
Chapter 20, “Creating and Managing Database Availability Groups,” is a key chapter in this book that will affect all administrators from small to large organizations. Exchange Server 2013 relies heavily on Windows Failover Clustering for its site resilience and high availability functionalities. This chapter covers the implementation and management of high availability solutions.
Chapter 21, “Understanding the Client Access Server,” introduces you to the critical Client Access server role and the components running on the Client Access server.
Chapter 22, “Managing Connectivity with Transport Services,” brings you up to speed on the Transport services that run on the Mailbox and Client Access server roles. This chapter discusses mail flow and the transport pipeline in detail.

Chapter 23, “Managing Transport, Data Loss Prevention, and Journaling Rules,” shows you how to implement a feature set that was first introduced in Exchange Server 2007 but has since been greatly improved: the transport rule feature. This chapter also discusses message journaling and the new Data Loss Prevention policies.

 

Part 5: Troubleshooting and Operating

Troubleshooting and keeping a proper eye on your Exchange servers’ health are often neglected tasks. You may not look at your Exchange servers until there is an actual problem. In this part we discuss some tips and tools that will help you proactively manage your Exchange Server environment, ensuring that you can track down problems as well as restore any potential lost data.
Chapter 24, “Troubleshooting Exchange Server 2013,” introduces you not only to troubleshooting the various components of Exchange Server 2013 but also to good troubleshooting techniques. This chapter also includes a discussion of some of the Exchange Server 2013 built-in tools, such as the Exchange Management Shell test cmdlets and the Remote Connectivity Analyzer.
Chapter 25, “Backing Up and Restoring Exchange Server,” includes discussions on developing a backup plan for your Exchange Server 2013 servers as well as how to implement appropriate backup solutions for Exchange Server configuration, databases, logs, and any other relevant information.

 

The Mastering Series

The Mastering series from Sybex provides outstanding instruction for readers with intermediate and advanced skills, in the form of top-notch training and development for those already working in their field and clear, serious education for those aspiring to become pros. Every Mastering book includes the following:
◆ Real-World Scenarios, ranging from case studies to interviews, that show how the tool, technique, or knowledge presented is applied in actual practice
◆ Skill-based instruction, with chapters organized around real tasks rather than abstract concepts or subjects
◆ Self-review test questions, so you can be certain you’re equipped to do the job right

 

لینک دانلود Mastering Microsoft Exchange Server.pdf

 

حوزه نفت و پتروشیمی

شرکتهای پیمانکاری

شرکتهای فناوری اطلاعات

صنایع فولاد