Microsoft Exchange Server 2003
Introduction
You should have the following skills
before studying for the Implementing and Managing Microsoft Exchange Server
2003 certification:
- Detailed knowledge of TCP/IP and TCP/IP protocols such as HTTP, SMTP, POP3
- Knowledge of Active Directory and Active Directory management tools
- Knowledge of DNS
- Knowledge of network infrastructure design and configuration
- Knowledge of IIS and IIS management tools
Exchange
Server 2003
As you study this section, answer
the following questions:
- What are the advantages of a client/server messaging system?
- What are the differences between shared folder and client/server messaging systems?
- How does Active Directory affect the deployment of Exchange?
- What advantages does clustering offer?
- What are the differences between the Standard and Enterprise editions of Exchange 2003?
Installation
Prerequisites
Exchange Server 2003 requires the
following components and services:
- Windows 2000 Server with SP3 or Windows Server 2003
- Active Directory
- DNS services
- Internet connectivity for sending and receiving e-mail over the Internet
Active Directory performs many of
the services that earlier versions of Exchange performed. Active Directory
has three partitions (also referred to as naming contexts). Each
partition has its own replication and permissions configuration.
Partition
|
Function
|
Schema
|
The schema defines the
rules for how objects are created and the properties and bounds for object
properties. When you install Exchange, the schema is extended to:
|
Configuration
|
The configuration partition
controls communication and replication for all Exchange 2003 servers. The
configuration partition:
|
Domain
|
The domain holds all data for
individual users, contacts, and mailboxes. As Exchange runs, it stores and
modifies data in the domain.
|
Before installing Exchange Server
2003, you should prepare the forest and Active Directory domains. Although
these actions can be performed during installation, doing them first allows for
enough time to complete the replication process. The following table describes
the actions to take.
Phase
|
Description
|
Forest Preparation
|
Forestprep extends the Active
Directory schema by adding classes and attributes used by Exchange.
|
Domain Preparation
|
Domainprep adds the necessary
objects for Exchange administration.
|
In order for Exchange Server
2003 to use Active Directory properly, a good DNS infrastructure must be
set up. Exchange Server 2003 uses DNS for the following:
- An Exchange server contacts DNS to get service locator records (SRV) to locate Active Directory domain controllers.
- An Exchange server contacts DNS servers to retrieve MX (mailbox) records and to locate SMTP domains.
- An Exchange server uses DNS to resolve hosts names, especially when locating hosts on the Internet.
Installation
Requirements
As you plan your Exchange
implementation, you need to select the Exchange version that best meets your
organization's needs. The following table compares the two Exchange Server 2003
versions.
Exchange Version
|
Feature Support
|
Exchange Server 2003 Standard
Edition
|
|
Exchange Server 2003 Enterprise
Edition
|
|
Exchange Server 2003 requires a
Windows Server operating system and Active Directory. You can install Exchange
Server 2003 on the following operating systems:
- Windows 2000 Server with SP3
- Windows 2000 Advanced Server with SP3
- Windows 2000 Datacenter Server with SP3
- Windows Server 2003 Standard Edition
- Windows Server 2003 Enterprise Edition
- Windows Server 2003 Datacenter Edition
Note: To take full advantage of Exchange Server 2003
functionality, you must run Windows Server 2003. The following features are
only available on a Windows Server 2003 version:
- Mount points
- Volume Shadow Copy service for database backup
- Internet Protocol Security (IPSec) support for front-end and back-end clusters.
- Cross-forest Kerberos authentication with Microsoft Outlook 2003
- Internet Information Server (IIS) 6 enhanced security and dedicated application mode.
- Hypertext Transfer (HTTP) access from Outlook 2003 Real-time collaboration (requires Real-Time Collaboration service).
- Microsoft SharePoint Portal Server Web Parts
The following table lists the
hardware requirements for installing Exchange.
Component
|
Minimum Hardware Requirements
|
Recommended Hardware
|
Processor
|
Pentium 133
|
Pentium III 500 (Standard Edition)
Pentium III 750 (Enterprise
Edition)
Multiprocessor support:
|
Memory
|
256 MB
|
512 MB
Note: Exchange uses only 3 GB of RAM. Additional RAM can be
used by the operating system and other running programs, but will not be used
by Exchange. Adding RAM above about 4 GB has little effect on Exchange
performance.
|
Disk Space
|
500 MB on partition where Exchange
Server 2003 is installed
|
200 MB on system drive
500 MB on Exchange Server 2003 drive
Separate physical disks for the
Exchange binaries, database files, and transaction logs
|
File System
|
All disks used by Exchange must be
formatted with NTFS
|
|
Display
|
VGA or better
|
SVGA or Better
|
Other
|
NIC
CD-ROM drive
|
NIC
CD-ROM, DVD-ROM
RAID configuration
|
Exchange also requires the following
components and services be installed and running prior to performing the
Exchange installation. Note that in many cases the default installation of
Windows will not include all necessary components.
Component
|
Windows 2000 Server
|
Windows Server 2003
|
Microsoft .NET Framework
|
Added during Exchange installation
|
Included in the default
installation
|
Microsoft ASP.NET
|
Added during Exchange installation
|
Included in the default
installation
|
Internet Information Services
(IIS)
|
Included in the default
installation
|
Installation required
|
World Wide Web Publishing Service
|
Installation required
|
Installation required
|
Simple Mail Transfer Protocol
(SMTP) Service
|
Installation required
|
Installation required
|
Network News Transfer Protocol
(NNTP) Service
|
Installation required
|
Installation required
|
Installation
Facts
To install Exchange Server 2003, you
must be a member of the following groups:
- Full Exchange Administrator
- Local Administrators
You can begin the Exchange Server
2003 Setup automatically or manually. To start the installation manually,
run <drive>:\setup\i386\setup.exe. The following table
lists common switches to use with the installation program.
Switch
|
Purpose
|
/ChooseDC dcname
|
Identifies a domain controller
used during Setup
Note: When installing Exchange on multiple servers at the same
time, use this switch to have all servers use the same domain controller.
Specifying the domain controller name avoids Active Directory synchronization
problems that might result when different domain controllers are accessed
during installation. When using this option, the Exchange server must be in
the same domain as the specified domain controller.
|
/DisasterRecovery
|
Recovers an Exchange installation
after the server's configuration has been restored from backup
|
/ForestPrep
|
Prepares Active Directory for
Exchange Server 2003
|
/DomainPrep
|
Prepares each Active Directory
domain for an Exchange Server 2003 installation or mailbox-enabled objects
|
/?
|
Display a list of all command-line
switches with a brief function description
|
/CreateUnattend filename.ini
|
Creates an .ini for an unattended
setup
Note: You cannot use an unattended installation for the first
Exchange server in an organization, for installing Exchange into an Exchange
5.5 organization, or for installing an Exchange cluster.
|
/EncryptedMode
|
Encrypts the .ini file
|
/UnattendFile filename.ini
|
Launches the unattended setup
using the .ini file specified
|
/Password password
|
Allows the currently logged on
user to bypass entering a password during Setup
|
/ShowUI
|
Displays the wizard user interface
during unattended Setup
|
/NoEventLog
|
Decreases clutter in the event log
by disabling messages from being written to it
|
/NoErrorLogging
|
Disables error logging during
Setup
|
/All
|
Enables all Exchange components
for an install, upgrade, or reinstall
|
The Exchange Deployment Tools are a
collection of tools and a predefined process for installing Exchange. Although
you can run Setup.exe directly, in most cases you will use the process outlined
in the Deployment Tools. Using the Deployment Tools you can:
- Deploy the first Exchange 2003 server
- Install Exchange 2003 on an additional server
- Perform post-installation setup
- Install Exchange System Management Tools only
Keep in mind the following details
regarding Exchange Server 2003 installation:
- The installation is the same whether you are installing the Exchange Server 2003 Standard or Enterprise Edition.
- The default directory for the Exchange Server 2003 installation is C:\Program Files\Exchsrvr.
- Exchange Deployment Tools guides you through the installation.
- The Messaging and Collaboration Services option installs all the necessary components of an Exchange server.
- If you haven't run /forestprep or /domainprep they will run when you run the standard setup (if your account has the necessary rights).
- View the event log to see installation events and troubleshoot the installation.
- To upgrade from Exchange 2000 to Exchange 2003, run the setup program. Following the upgrade, you must remove the Mobile Information Server Exchange 2000 Event Source.
- When you install Exchange, the SMTP and HTTP virtual servers are the only servers that are started. If you require other services (such as POP3, IMAP4, or NNTP), you must start these virtual servers manually.
After installing Exchange 2003, you
can verify the installation in the following ways:
- Use the Services snap-in to view the list of installed services. Make sure that the Exchange-specific services have been installed and started on the server.
- In Active Directory Users and Computers, check a user account to make sure the Exchange Tasks wizard has been added.
- Run the Exchange System Manager and verify the Exchange organization and server are correctly listed.
- Check the C:\Exchange Server Setup Progress.log file for successful installation messages.
- Check the Application log in Event Viewer for the following message: ID: 1001 "Setup [build nnnn] completed successfully."
Core
Component Facts
The following table identifies the
core component of Exchange.
Component
|
Service and Function
|
Information Store (IS)
|
Store.exe is a service running on
the Exchange server that manages the database process of Exchange. This
service is required for databases to be loaded and for clients to connect to
Exchange server. Note: Store.exe requires more memory than most other
processes that are running on the Exchange server
|
Internet Information Services
(IIS)
|
Exchange relies on IIS and several
of its services including:
|
System Attendant (SA)
|
Mad.exe is a service running on
the Exchange server that is responsible for:
|
Active Directory (AD)
|
Exchange requires Active Directory
for locating users and routing processes. NTDS.dit is the name of the Active
Directory database. Note: It is recommend that you don't install
Active Directory on Exchange Server unless you have only one server in the
organization.
|
Exchange
Organization and Objects
The following table lists some of
the major objects that are used to organize and administer Exchange. You will
learn more details about each throughout this course.
Object
|
Description
|
Organization
|
The organization is the top
Exchange infrastructure object.
|
Administrative Group
|
An administrative group is
a logical administrative structure that is used to manage permissions and
delegate permissions to Exchange servers.
|
Server
|
The server object in Exchange
System Manager represents a physical Exchange server. Objects below the
server identify resources and processes running on the server.
|
Queue
|
The queue folder beneath a server
holds the messages or jobs that are awaiting transmission or processing.
|
Virtual Server
|
A virtual server identifies
a protocol running on the Exchange server. You can have multiple different
protocols running at the same time or multiple instances of the same protocol
running on a single server. Each instance of a protocol is represented by a
different virtual server. Virtual servers used in Exchange are:
The virtual servers you will need
on your Exchange server depends on the servers and clients that will need to
communicate with your server.
|
Recipient
|
A recipient is an Active
Directory object that has Exchange mail capabilities. Potential recipient
objects include users, groups, contacts, and InetOrgPerson objects.
|
Mailbox
|
A mailbox is a logical
storage location associated with a recipient. The mailbox is where all e-mail
messages are stored. The In Box and all other associated folders make up the
mailbox.
|
Store
|
A store is a database of
Exchange information. The store contains individual recipient mailboxes. All
mailboxes in the store share common configuration settings.
|
Storage Group
|
A storage group is a
collection of stores. All stores in the storage group are held on the same
physical server.
|
Address Lists
|
An address list is a list
of recipients. The global address list is an address list that is
automatically generated by Exchange and which includes all recipients in the
Exchange organization. In addition, you can define custom address lists.
|
Public Folder
|
A public folder is a repository
for data that can be accessed by multiple users. A public folder is a
recipient that can have an associated e-mail address. Users can e-mail or
post content into the public folder. Content in the public folder is
accessible through the Outlook clients.
|
Routing Group
|
A routing group is a group
of Exchange servers that are connected by constant, high-speed links. The
routing group identifies Exchange servers that can contact each other without
any additional routing considerations. The routing group topology typically
mirrors sites in your organization that are connected by WAN links. Routing
groups identify the physical routes that messages take. By default all
Exchange servers are in the First Routing Group.
|
Routing Group Connector
|
Connectors identify paths between routing groups, to the Internet, or
to external mail systems. Connectors identify the protocols used to
communicate between routing groups. You can also control how communication
occurs by controlling delivery time, message size, and users among other
criteria.
|
Recipient Update Service
|
The Recipient Update Service is
responsible for updating Active Directory with Exchange-specific information.
For example, the Recipient Update Service updates e-mail addresses associated
with user accounts.
|
Exchange
Management Tools Facts
You have several tools available to
you to monitor and manage Exchange servers. The table below describes some
common Exchange management tools.
Tool
|
Description
|
Exchange System Manager
|
The System Manager tool is
installed by default and is the primary tool you use to monitor and manage
your Exchange Server 2003 configuration. Use System Manager to:
System Manager runs on Windows
2003 or Windows 2000 SP3 as long as Active Directory Users and Computers is
running on the machine. You can also use System Manager on a Windows XP
machine with SP1 as long as SMTP service is running on the machine during the
installation of the tools.
|
Active Directory Users and
Computers
|
Active Directory Users and
Computers is the primary tool you use to manage users in an Exchange Server
2003 environment. Use Active Directory Users and Computers to:
Active Directory Users and
Computers runs on Windows 2003, Windows 2000 SP3, or Windows XP.
|
Adsiedit
|
Adsiedit is the tool you use to
modify advanced properties in Active directory. Use Adsiedit to:
Adsiedit runs on any Windows 2003,
Windows 2000 SP3 or Windows XP machine that is part of the domain. Install
Adsiedit using the Support Tools available on the Windows 2000 or Windows
2003 CD.
|
LDAP Viewer
|
The LDAP viewer allows you to view
advanced properties of recipients such as:
|
Keep in mind the following facts
regarding management tools:
- Because Exchange System Manager and the Active Directory Users and Computers are snap-ins, you can create custom MMCs for both of them. You do this by typing MMC.exe at the command line to run the Microsoft Management Console.
- Exchange System Manager can only be used to administer Exchange Server 2003.
- Use Active Directory Users and Computers to move mailboxes within an organization. Use the migration wizard and other migration tools to move mailboxes between organizations.
Exchange
Modes
An Exchange Server 2003 organization
runs in one of two modes of operation: mixed mode or native mode. The following
table defines each mode and identifies characteristics of each.
Mode Type
|
Description
|
Mixed
|
Mixed mode is the default Exchange
mode that is designed for backwards compatibility with other Exchange
servers. When operating in mixed mode:
Used mixed mode if your
organization includes servers running previous versions of Exchange.
|
Native
|
An organization in native mode
contains only computers that are running Exchange 2000 Server or Exchange
Server 2003 or later. To switch to native mode, the following conditions must
exist:
Note: After you change to native mode, you cannot change back
to mixed mode. This means that no earlier releases can be added to the
Exchange organization. It is important to understand the implications of the
conversion before you convert. Use native mode to take
advantage of the following features:
|
To determine the mode of the
Exchange organization, view the properties of the Organization object in
Exchange System Manager. Edit the setting on the General tab to change the
Exchange mode.
Administrative
Groups and Permission Facts
An administrative group is a
logical administrative structure that is used to manage permissions and
delegate permissions to Exchange servers. Note the following facts about
installing Administrative Groups:
- During installation you specify the name of the administrative group into which you install the Exchange server.
- It is important to select the correct administrative group for each server because you cannot change it after installation.
- During the installation, if there is only one administrative group, all Exchange servers will automatically be installed in that group. You are not prompted to select the administrative group if Exchange only has a single administrative group.
- You can set up administrative groups prior to the installation of the first Exchange server. This gives you the advantage of being able to select multiple administrative groups during the install of the first Exchange Server. To set up administrative groups prior to installation:
- Run /forestprep
- Use Adsiedit to create administrative groups in Active Directory.
- After installation, you can use Exchange System Manager to create new administrative groups.
- If Exchange is running in native mode, you can rename administrative groups in Exchange System Manager. Otherwise, use Adsiedit to rename administrative groups.
Using permissions you can delegate
Exchange server administrative tasks to other users. Keep in mind the following
facts for managing Exchange permissions:
- Permissions are assigned either at the organizational level or the administrative group level.
- Use the Exchange Delegation Wizard in Exchange System Manager to manage delegations.
- While running /forestprep or during the Exchange Server 2003 installation, you identify the default Exchange System Administrator. This administrator has all permissions to the Exchange organization.
- Exchange administrators must have specific permissions in Active Directory for the objects and levels they will be working. They must also have permissions on the local computer.
The following table identifies the
permissions of each Exchange administrator role.
Administrator Role
|
Administrative Rights
|
Full Administrator
|
Full control over all objects
within the hierarchy
Change all permissions
Delegate permissions
Read mailboxes
|
Administrator
|
Full control over all objects,
except cannot change permissions
|
View Only Administrator
|
View configuration
|
Note: When you assign the Full Administrator or
Administrator roles to an administrative group, the user also receives
View Only permissions to the organization, allowing the administrator to view
the configuration of the entire organization.
System
Policies
A system policy is a
collection of configuration settings that are applied to multiple objects. For
example, you can create a single policy with settings that are applied to
multiple Exchange servers. Exchange includes three different types of system
policies:
- Public Store Policy
- Mailbox Store Policy
- Server Policy
System policies are created inside
an administrative group. To configure a system policy, take the following
steps:
- If you have not yet defined a system policy in an administrative group, add a System Policy container (right-click the administrative group and select New | System Policy Container).
- Add a policy to the System Policy container (right-click the System Policies container and select New, followed by the type of policy you want to create). Select the property pages that the policy will define.
- Edit the policy settings. Give the policy a name and modify the property settings that will be controlled by the policy.
- Add objects that will be controlled by the policy (right-click the policy and add the servers, public stores, or mailbox stores to which the policy will be applied).
Be aware of the following facts
about system policies:
- Although policies are defined inside an administrative group, policies can apply to objects outside of the administrative group.
- You can move or copy policies between administrative groups. However, you cannot move or copy the System Policies container between administrative groups.
- After copying the policy, you must apply it to the corresponding objects that will be controlled by the policy.
- When a policy is applied to an object, the properties controlled by the policy are disabled in the corresponding objects. For example, if a policy enables message tracking on a server, you will be unable to edit the server and modify the message tracking settings.
- When you remove an object from a policy or delete a policy, the settings remain on the corresponding object. You must edit the properties of the object in order to modify the settings after it has been removed from the control of the policy.
Recipient
Concepts
As you study this section, answer
the following questions:
- What is an Exchange recipient?
- What administrative tasks can you perform using the Exchange Tasks wizard?
- How do you determine when to mailbox-enable or mail-enable a user?
- What types of recipient objects can be mailbox-enabled?
- How does a query-based distribution group alleviate administrative overhead?
After finishing this section, you
should be able to complete the following tasks:
- Use the Exchange Tasks wizard to perform recipient configuration tasks.
This section covers the following
exam objectives:
- 502. Manage user objects
- 503. Manage distribution and security groups
- 504. Manage contacts
Recipient
Facts
A recipient is an Active
Directory object that has Exchange mail capabilities. The mail capabilities of
an object are classified as follows:
Classification
|
Description
|
Mailbox-enabled
|
Mailbox-enabled recipients can
both send and receive e-mail through Exchange.
Create mailbox-enabled recipients
to identify users who use the Exchange system for e-mail services.
|
Mail-enabled
|
Mail-enabled recipients can only
receive e-mail.
Create mail-enabled recipients to
identify users who have external e-mail addresses and for which e-mail
services are provided by another mail system.
|
When you install Exchange, the
Active Directory schema is extended to add mail properties to existing objects.
The following table lists the objects with e-mail capabilities.
Object
|
Description
|
User
|
A normal Active Directory user
account can be designated as an Exchange recipient. Users accounts:
Use Active Directory user accounts
as recipients to add e-mail capabilities to existing network users, or to add
new users who need both e-mail services and access to network resources.
|
InetOrgPerson
|
The InetOrgPerson object is a user
account object used in non-Microsoft LDAP and X.500 directory services.
Use InetOrgPerson to create user
accounts in Active Directory that are compatible with non-Microsoft
directories or to prepare for migration from other LDAP directory systems.
|
Contact
|
A contact is and Active Directory
object that represents a recipient in an external (non-Exchange) messaging
system.
Use contacts to identify e-mail
addresses for users outside of your network who do not need to access network
resources.
|
Public Folder
|
A public folder is a folder where
users with the appropriate permissions can post and read messages.
|
Group
|
Use groups to identify a list of
recipients.
Active Directory has the following
group types:
|
Query-based Distribution Group
|
A query-based distribution group
is similar to a regular group. However, group membership is dynamically
generated rather than statically configured.
Use a query-based distribution
group to simplify e-mail group management. Be aware, however, that these
groups require increased processing capabilities.
|
Mailbox-enabled
Recipients
After finishing this section, you
should be able to complete the following tasks:
- Create mailbox-enabled users and mailbox-enable existing users.
- Move and delete mailboxes.
- Manage mailbox properties such as size limits and sending mail.
This section covers the following
exam objectives:
- 502. Manage user objects.
Mailbox-enabled
Facts
When you mailbox-enable an object,
Exchange-specific properties are added to the object in Active Directory. Use
Active Directory Users and Computers to manage individual mailbox settings.
Keep in mind the following when managing mailboxes:
- A mailbox is not set up until a mail message is sent to the mailbox or a user logs into the mailbox.
- When you mailbox-enable the object, an Alias is defined. The default value for the alias matches the logon name. The alias is also used by default for the recipient's e-mail address.
- E-mail addresses used by Exchange are automatically generated using recipient policies. The recipient policy identifies the format used to generate the e-mail addresses. The Automatically update e-mail addresses based on recipient policy setting identifies whether the e-mail addresses are generated automatically by the recipient policy.
- In most cases, you will not need to create e-mail addresses manually. Instead you will use recipient policies to generate e-mail addresses based on the rules you define.
- Having multiple e-mail addresses allows you to receive e-mail at different e-mail addresses. This feature is very useful for company acquisitions, name changes and those situations in which you want to continue to receive mail at an address while it is being phased out.
- The primary address is the e-mail address automatically used for the recipient when sending mail.
- All addresses used by a recipient must be within the domain that the Exchange Server is responsible for.
- Message size and/or storage limits can be configured at the following levels in Exchange:
- Global settings apply to all recipients in the organization.
- Connector settings apply to all messages sent using a logical connector.
- SMTP virtual server settings apply to all messages that use a specific virtual server.
- Store settings apply to all mailboxes within the store.
- Mailbox settings are configured for each recipient and apply to that recipient.
The most
restrictive of these settings is enforced. This means that for the mailbox, you
can only configure more restrictive settings than exist at other levels. For
example, you cannot configure a higher mailbox storage size for a user through
the user account settings.
- Message size limits restrict the size of messages that can be sent or received. Storage limits restrict the amount of disk space that the mailbox uses.
- When configuring storage limits, setting the Prohibit send at and Prohibit send and receive at values could result in a user being unable to send or receive e-mail. If users are unable to send or receive e-mail, check to see if storage limits have been exceeded.
- You can use two methods to enable other recipients to send mail for a recipient:
- Use the Send on behalf of property to identify recipients who can send mail for the recipient. When messages are sent, the From field in the message appears as: From UserB on behalf of UserA.
- Use the Security tab to grant Send As permissions to allow other users to send mail as if they were the recipient. When messages are sent, the From field in the message appears as: From UserA. (Note: Users will not be able to tell that the message was not sent from the purported recipient.)
- The Deleted item retention setting identifies how long mail messages are kept after they have been removed from the Deleted Items folder. By default, Exchange keeps e-mail items for 7 days. During this time, messages can be recovered through the Outlook client. Items can be permanently deleted and therefore they are non-recoverable. This happens in the following ways:
- In Outlook a user presses Shift+Delete to remove an item.
- The client application the recipient uses to access Exchange does not move items to a Deleted Items folder. The IMAP4 and POP3 clients do not move items to a Deleted Items folder.
- An Outlook user working offline with an offline folder file (.ost) moves the item to the Deleted Items folder and then deletes the Deleted Items folder before the offline folder file is synchronized with the server.
Note: Deleted item retention is an exception to the rule about
global limits overriding less restrictive limits set at the mailbox level. You
can specify that the e-mail from the Deleted Items folder be held longer than
the global setting.
- The Hide from Exchange address lists option allows you to prevent a recipient from appearing in address lists.
- If you hide an e-mail name from the Exchange address list, the name is not available from any point.
- This feature is useful in situations when the e-mail address is used only for client communication, a recipient leaves the company, or a similar circumstance in which you do not want internal users sending e-mail to that address.
Recipient
Policies
As you study this section, answer
the following questions:
- What does a recipient policy do?
- When you have multiple recipient policies, when is the default recipient policy applied?
- How do you determine which address is a user's return address when the user has multiple addresses?
- Which variables (and variable combinations) allow you to display a user's whole name in an e-mail address?
- What is the relationship between the Recipient Update Service (RUS) and Active Directory?
After finishing this section, you
should be able to complete the following tasks:
- Modify the default recipient policy.
- Create, modify, and delete recipient policies.
- Configure filter rules to customize how recipient policies are applied.
This section covers the following
exam objectives:
- 501. Manage recipient policies.
Recipient
Policy Facts
A recipient policy is a
collection of configuration settings that apply to Exchange recipients.
Specifically, recipient policies specify the way in which e-mail addresses are
generated for recipients.
Keep in mind the following facts
when modifying recipient policies:
- The default policy assigns the SMTP address format for recipients as alias@ADdomain where alias is the Exchange alias (by default the user account logon name) and ADdomain is the DNS domain of Active Directory.
- You cannot delete the default recipient policy. You can, however, edit the default policy to modify how the default e-mail address is formatted or to add one or more addresses to enable users to receive mail at multiple addresses.
- For a recipient with more than one address, only one is considered to be the primary address. The primary address is the address used as the return e-mail address when a recipient sends mail.
- Each user can have a primary SMTP and a primary X.400 address.
- You can create additional recipient policies for a subset of recipients. When you create the recipient policy you chose the types of recipients to apply the policy to. These recipient policies use LDAP filters to determine the subset of the specified recipients to apply the policy.
- When you have multiple policies, only one is applied to each recipient. The policy used for the recipient is the policy with the highest priority that meets the specified LDAP filter criteria. If no criteria is met, the default policy is used.
- If multiple policies might apply to a given user, give the more specific policy a higher priority to ensure it gets applied.
Variables allow you to use names
other than the user account name in the address. The following table lists the
available variables.
Variable
|
Description
|
%g
|
Given name (first name)
|
%i
|
Middle initial
|
%s
|
Surname (last name)
|
%d
|
Display name
|
%m
|
Exchange 2003 alias
|
%rxy
|
Replaces character x with
character y
If x = y, the character will be
deleted
|
%number+variable
|
Uses the specified number of
characters in the variable
|
The following table lists several
examples of using variables in the address string of the recipient policy. Each
example uses the following information from a sample user account:
- Given name = Mary
- Middle initials = R.
- Last name = Smith
- Display name = Mary R. Smith
- Exchange 2003 alias = MarySmith
Policy Entry
|
Resultant E-mail Address
|
@westsim.com
|
MarySmith@westsim.com
The Exchange 2003 alias will be
used as the first part of the e-mail address.
|
%m@westsim.com
|
MarySmith@westsim.com
|
%g.%s@westsim.com
|
Mary.Smith@westsim.com
|
%1g%i%s@westsim.com
|
MR.Smith@westsim.com
The first character of the given
name is used, followed by the middle initials value, followed by the surname.
Notice how the middle initials field contains two characters (R followed by a
period).
|
%1g%1i%2s@westsim.com
|
MRSm@westsim.com
The first character of the given
name and middle initials is used followed by the first two characters of the
surname field.
|
%d@westsim.com
|
MaryR.Smith@westsim.com
|
%r..%d@westsim.com
|
MaryRSmith@westsim.com
All periods in the display name
are removed.
|
Keep in mind the following when
working with variables in recipient policies:
- Spaces are removed automatically.
- Invalid e-mail address characters will automatically be removed.
Recipient
Update Service Facts
The Recipient Update Service updates
recipient objects in a domain with specific types of information. The
Recipient Update Service is responsible for:
- Updating SMTP addresses for mailbox-enabled recipients
- Populating address lists
- Associating mailboxes with recipients
- Verifying membership of the Exchange Enterprise Servers security group
There are two different types of
Recipient Update Services:
- A single instance of the Enterprise Configuration Recipient Update Service runs in each organization.
- The Domain Recipient Update Service runs in the domain. Each domain with mailbox-enabled recipients must have at least one instance of the service running.
Be aware of the following facts
about the Recipient Update Service:
- When you create a mailbox for a user or create or modify a recipient policy, the Recipient Update Policy is responsible for communicating those changes to Active Directory.
- The Recipient Update Service update is scheduled to run at regular intervals (the default is every 60 seconds). You can administratively change this interval.
- Users will not be able to log on to their mailboxes and changes will not appear until after the update service runs.
- The Recipient Update Service processes only those changes that were made since the last time it was run.
- You can manually force the update service to run to make the changes take place immediately.
- Perform an update operation (select Update Now) to make only those changes since the last time the service has run.
- Perform a rebuild operation (select Rebuild) to regenerate all SMTP addresses. This process can take some time and should be run in off-peak hours.
Note: Manual updates might fail if you have insufficient
permissions to force the update.
Keep in mind the following facts
regarding managing the Recipient Update Service:
- The Recipient Update Service runs on an Exchange server and communicates with a domain controller. The Recipient Update Service object is associated with both the Exchange server and the domain controller.
- A single Exchange server can run multiple instances of the service. A single domain controller can only participate in one instance of the Recipient Update Service.
- For those domains without an Exchange server running, you create a Recipient Update Service in a domain with an Exchange server and specify in the Active Directory domain where the recipients exists.
- If you have multiple domain controllers in a domain, you can have multiple instances of the Recipient Update Service running.
- The enterprise and domain services are installed automatically when Exchange is installed. However, under special circumstances you will need to manually add the service to a domain. Add instances of the Recipient Update Service in the following cases:
- If a domain has no Exchange servers but does have Exchange recipients.
- If a domain has only Exchange 5.5 servers.
- If a domain has multiple sites. This allows changes to be propagated with local domain controllers instead of waiting for Active Directory replication across sites to occur. For example, if your network consists of two sites with the update service running only in the first site, mailboxes created in the second site will not appear until cross-site replication has taken place. By creating an instance of the Recipient Update Service that uses a domain controller in the second side, updates take place much sooner.
Note:
When you make changes to a recipient
in a domain where there are no Exchange Server 2003 servers and where the
Recipient Update Service is not running, the Exchange-specific attributes
specified in the recipient policy will not be propagated to the Active
Directory objects.
- To add an instance of the Recipient Update Service to a domain:
- Run /domainprep.
- Use the Exchange System Manager to add the instance.
- When you create a Recipient Update Service, you select the domain (not the domain controller) that is associated with the service. After you create the Recipient Update Service, edit the properties of the Recipient Update Service to select a specific domain controller.
Managing Groups
As you
study this section, answer the following questions:
- What factors should you consider when choosing whether to create security, distribution, or query-based groups?
- How does the group scope affect your choice of the type of group to create?
- What requirements must your system meet to allow you to use query-based distribution groups?
After finishing this section, you
should be able to complete the following tasks:
- Mail-enable security and distribution groups.
- Create mail-enabled groups and modify group properties.
- Create query-based distribution groups.
This section covers the following
exam objectives:
- 503. Manage distribution and security groups.
Group
Management Facts
Groups can be mail-enabled. E-mail
sent to the group is forwarded to all group members. Groups that can be
mail-enabled are:
- Security groups
- Distribution groups
- Query-based distribution groups
As you administer mail-enabled
groups, keep in mind the following:
- Security groups can be used to control resource access in Active Directory in addition to providing e-mail group capabilities.
- Distribution groups can be assigned permissions to public folders in Exchange only if Active Directory is running in Windows 2000 native mode or higher. When you assign permissions to the distribution group, it is automatically converted to a security group if Active Directory supports it. If the conversion fails, change the functional level to Windows 2000 native mode or higher.
- Universal groups of the security type (USGs), can be used only in native-mode domains.
- Universal groups of the distribution type (UDGs), can be used in mixed mode and in native mode domains.
- Membership of global group objects is replicated to every domain controller in a forest.
- The membership of global groups can only be visible from domain controllers or global catalogs that are located in the same domain as the group.
- Only universal group memberships are replicated across all domains to all global catalog servers in the forest. Microsoft strongly recommends using universal distribution groups for mail distribution in a multi-domain environment.
Be aware of the following special
facts about using query-based distribution groups:
- Query-based distribution groups are only available when Exchange is running in native mode.
- When you create the query-based distribution group, you create an LDAP filter with filter rules. The rules define the criteria used for determining group membership.
- To use query-based distribution groups, your network requires the following:
- Exchange Server 2003 only or a native mode environment including both Exchange Server 2003 and Exchange Server 2000 with SP3.
- Global catalog servers running Windows Server 2003 or Windows 2000 Server. When implementing on an Exchange Server 2000 with a global catalog server running Windows 2000 Server, you must modify the registry on the Exchange server for reliable performance.
- It is recommended that you update all Exchange System Manager consoles to the Exchange Server 2003 versions. You can only create query-based distribution groups through the Exchange Server 2003 console.
- Group membership is dynamically determined each time the group is accessed. For example, when you send mail to the query-based distribution group, the following process is used:
- The mail is sent to the e-mail submission queue.
- Exchange identifies that the recipient is a query-based distribution group.
- Exchange sends the LDAP query contained in the group to a global catalog server.
- The global catalog server returns a list of recipients that meets the filter rules.
- Exchange builds a list of recipients based on the query results.
- Exchange forwards the e-mail to each individual recipient.
- When working in a multi-domain environment, use universal groups.
- After creating the filter rules, use the Preview tab to view the results of the query. If the filter contains bad information, the query will fail on the global catalog server and mail will not be forwarded to group members.
- The Exchange server must have the necessary permissions to execute the query. If the query returns an incomplete list of objects, check to make sure the Exchange server security context is sufficient to read all necessary object attributes.
- Using query-based distributions increases the processor load on the server.
Address
Lists
As you study this section, answer
the following questions:
- What methods can you use to create an easily navigable address list?
- How can you determine which users to include in an offline address list?
- What are the advantages of creating address lists in addition to the global address list?
After finishing this section, you
should be able to complete the following tasks:
- Create and modify address lists.
- Hide contacts from global address lists.
This section covers the following
exam objectives:
- 505. Manage address lists.
Address
List Facts
An address list displays a
list of recipients with similar characteristics. Address lists let users easily
list and find recipients. You can use address lists to display recipients based
on Active Directory attributes such as department or city. Exchange System
Manager organizes address lists into the following categories:
Address List Type
|
Description
|
Address Lists
|
An address list is a custom list
that filters recipients according to filter rules.
|
Global Address Lists
|
The Global Address List represents
all recipients in the organization.
|
Offline Address Lists
|
An offline address list is an
address list that is downloaded and stored on the client computer. In this
way, the address list will be available even when the client is disconnected
from the Exchange server.
|
Recipient
Bulk Creation
As you study this section, answer
the following questions:
- How do Csvde.exe and Ldifde.exe differ in terms of features supported and file format?
- Which command would you choose if you need to modify existing user accounts?
This section covers the following
exam objectives:
- 502. Manage user objects.
Recipient
Bulk Creation Facts
If you have a large number of
objects to create or modify, you can use one of the following tools:
Tool
|
Description
|
CSVDE
|
Csvde.exe imports and exports Active Directory objects using a
comma-separated list file.
|
LDIFDE
|
Ldifde.exe imports, exports, modifies, and deletes objects in Active
Directory using LDAP Data Interchange Format (LDIF) files.
|
Programmatic changes to Active
Directory
|
Using a programming or scripting
language (such as Visual Basic), you can programmatically access the Active
Directory database to modify, delete, or add objects or attributes. This
approach requires a thorough knowledge of programming and the APIs that give
you access to Active Directory.
|
Storage
Concepts
As you study this section, answer
the following questions:
- In which database would you look to find messages from an Internet client?
- What types of backups should you use if circular logging is enabled?
- When does the system delete log files (both when circular logging is used and when it is not used)?
- What are the storage group and store limitations with Exchange Standard edition? What are the limitations with Exchange Enterprise edition?
This section covers the following
exam objectives:
- 202. Manage, monitor, and troubleshoot data storage.
Storage
Group and Store Facts
Databases within Exchange are
organized as follows:
Unit
|
Description
|
Store
|
A store is a database of
Exchange information. There are two types of Exchange stores:
|
Storage Group
|
A storage group is a
collection of stores. All stores in a storage group:
|
An Exchange server can hold multiple
stores and multiple storage groups. The edition of Exchange Server 2003
determines the maximum number of stores, storage groups, and store size as
shown in the following table.
Exchange Server 2003 Edition
|
Maximum Storage Groups
|
Maximum Stores per Storage Group
|
Standard Edition
|
One
|
Two stores, one for mailboxes and
one for public folders. Each store has a 16 GB size limit.
|
Enterprise Edition
|
Four
|
Five stores per storage group for
a total of 20 stores (any combination of mailbox and public folder stores are
allowed).
|
Note: In addition to the storage groups listed here, you can also
create one additional storage group, the Recovery Storage Group. This storage
group is used to restore stores to a location other than the regular store.
Database
File Facts
A store is made up of two database
files: .edb and .stm. These two files together make up the store for either a
mailbox or a public folder. The client application and the original message
format determines which database is used to hold the message.
Database File
|
Client Application
|
Format
|
.edb
|
Outlook and other MAPI clients
|
MDBEF (native Exchange format)
|
.stm
|
Native Internet client (HTTP,
NNTP, or SMTP)
|
MIME (streaming format)
|
In addition to these two files, a
copy of each message is stored in a transaction log file.
- The log file is a flat ASCII text file.
- The active log file is called E00.log and has a 5 MB size limit.
- Log files are used to protect data that has not yet been backed up.
- Log files are deleted during a full, incremental, or differential backup.
What happens when the log file is
full depends on the type of logging enabled on the storage group.
Logging Method
|
Description
|
Default Logging
|
|
Circular Logging
|
|
Be aware of the following facts
about the Exchange database files:
- Every store has both a .edb and a .stm file.
- The .edb file contains folders, tables, and indexes as well as MAPI client messages.
- Messages are stored in the database that corresponds to the format of the sending client:
- Messages from Outlook clients are put in the .edb database.
- Messages from other clients are put in the .stm database.
- The message is converted in memory to the appropriate format for the client. The message is not copied or converted to be stored in a different database file.
- A copy of every message is also placed in a log file. The log file contains copies of messages that are in both the .edb and the .stm files.
- Log files are maintained on a storage group level. This means that all stores in a storage group share the same transaction log.
- Do not use circular logging if you use the Volume Shadow Copy Service to enable third-party (or custom) backup and recovery operations.
- With circular logging enabled, you should only perform Full backups, and these backups should be very regular.
Stores
and Storage Groups
After finishing this section, you
should be able to complete the following tasks:
- Create and manage stores and storage groups.
- Move transaction logs and database files.
- Configure store and mailbox store properties.
This section covers the following
exam objectives:
- 202. Manage, monitor, and troubleshoot data storage.
Store
and Storage Group Properties
Stores and storage groups are
managed using Exchange System Manager. Be aware of the following facts
regarding managing stores.
- Storage limits apply to all mailboxes in the store. More restrictive settings for a mailbox override these settings.
- The Keep deleted items setting can be less restrictive on the mailbox. For example, you can configure a specific mailbox to keep deleted items longer than the default configured on the store.
- Items can be permanently deleted and therefore they are non-recoverable. This happens in the following ways:
- The client specifically requests the item be permanently deleted.
- The deleted item retention time is set to zero.
- In Outlook a user presses Shift+Delete to remove an item.
- The registry key that indicates Force Hard Deletes is enabled for the private or public information store.
- The account requesting the deletion is a gateway.
- The account requesting the deletion is a system.
- The client application the recipient uses to access Exchange does not move items to a Deleted Items folder. The IMAP4 and POP3 clients do not move items to a Deleted Items folder.
- An Outlook user working offline with an offline folder file (.ost) moves the item to the Deleted Items folder and then deletes the Deleted Items folder before the offline folder file is synchronized with the server.
- The Archive all messages sent or received by mailboxes on this store setting sends a copy of all messages to another mailbox. Archival of messages can impact performance and there may also be legal issues that should be explored before enabling this option.
- You should move the Exchange database (EDB) and Exchange Streaming Database files (STM) files to a disk separate from other files for fault tolerance and performance reasons.
- Online defragmentation is the process of automatically detecting and deleting objects that are no longer being used frees space in the database. The Maintenance interval setting controls when defragmentation occurs (by default it is 1 am every day). Do not start a back up after starting an online defragmentation. Doing so stops the defragmentation.
- You can view the last successful backup time to verify that the last full and incremental backups that you performed were completed successfully.
- The Do not mount this store at start-up setting prevents the store from mounting after a server reboot.
- Not mounting a store after a reboot is beneficial if you are performing data recovery on the store or you want to perform an offline maintenance procedure on the store.
- If no users can access mailboxes in the store, check this setting and verify that the store is mounted.
- By default a restore will not overwrite an existing database. To restore over an existing store, enable the This database can be overwritten by a restore setting. Note: This setting is reset after each restore operation. If you have to perform multiple restore operations on a store, you must re-enable this setting prior to each restore operation.
- It is recommend that mailboxes of employees no longer with the company are kept at least 30 days.
- Use the Do not permanently delete mailboxes and items until the store has been backed up setting to ensure that a copy of deleted mailboxes and deleted items are available on a backup.
- You can apply system policies to mailbox stores to centrally control settings such as the default public store, offline address list, mailbox limits, deleted item and mailbox retention, and indexing.
Storage group settings apply to all
stores within the storage group.
- The Transaction log location is where all copies of old log files are stored (E0000001.log etc. files). These files need to be on a disk that is very large.
- The System path location is the location of the current log file (E00.log). This file needs to be on a disk that is very fast. By default, the system path and transaction log locations are the same.
- The Zero out deleted database pages setting overwrites deleted database tables with zeros during a backup. Enabling this setting increases security because data is completely erased. However, it increases the amount of time required to complete a backup.
- Use the Enable circular logging setting to use circular logging. When using circular logging, you should only perform full backups. Reserve this option for storage groups that support Network News Transfer Protocol (NNTP) folders (in public folder stores), which do not require log files.
SMTP
Facts
A virtual server identifies a
protocol running on the Exchange server. You can have multiple different
protocols running at the same time or multiple instances of the same protocol
running on a single server. Each instance of a protocol is represented by a
different virtual server.
Simple Mail Transfer Protocol (SMTP)
is the default protocol for Exchange Server 2003. SMTP is used in an Exchange
system to:
- Transfer mail between servers within an Exchange organization
- Transfer mail between an Exchange server and a mail server on the Internet
- Send mail from some Outlook clients to an Exchange server
You should be aware of the following
facts regarding Exchange servers and SMTP:
- By default, SMTP is enabled on all Exchange servers.
- Windows 2000 Server and Window Server 2003 support Extended SMTP (ESMTP) by default. ESMTP supports host authentication and encryption.
- An ESMTP host reverts to SMTP when the receiving host does not support ESMTP.
- Exchange Server 2003 communicates with other mail servers using standard SMTP commands and numerical reply codes over TCP port 25. Exchange uses an asymmetric request-response protocol. This means that one host sends a command, waits for a reply and then sends another command.
Exchange uses one of three methods
to identify the destination mail server for each message.
Method
|
Description
|
|
Active Directory
|
For messages sent within an
Exchange organization, the Exchange server uses information stored in Active
Directory to locate the destination mail server. The destination mail server
is the Exchange server that holds the mailbox store that contains the
recipient's mailbox.
|
|
DNS
|
For mail sent outside of your
organization, the virtual server can be configured to use DNS for locating
mail servers.
|
|
Smart Host
|
For mail sent outside of your
organization, you can configure the Exchange server to forward all mail to a smart
host (also called an SMTP relay). When using a smart host, all
mail for external domains is sent to the smart host. The Exchange server will
not use DNS to locate the destination mail server. Instead, the smart host is
responsible for locating destination mail servers and sending the mail
accordingly.
|
SMTP
Virtual Server Facts
Keep in mind the following facts
about managing SMTP virtual servers:
- An SMTP virtual server is installed and enabled by default. Virtual servers for POP3, IMAP4, and NNTP are disabled by default on a new install, but enabled for an upgrade from Exchange Server 2000 (if they were enabled on the Exchange 2000 system).
- To run multiple SMTP virtual servers on a single Exchange server, you need to assign a different IP address and port combination for each.
- By default, the SMTP virtual server uses port 25. You can also configure an outbound port on which the server will try to communicate with other servers.
- For internal mail servers, you can choose a custom port to prevent communication with servers on the Internet.
- With Anonymous access disabled, Internet servers will not be able to communicate with your Exchange server.
- Basic authentication sends credentials in plain text. Use TLS to encrypt authentication credentials. When using TLS, you will need to import a certificate.
- An SMTP relay accepts mail from a client or server and relays it to other servers. By default, the Exchange server will only relay mail for internal users.
- An open SMTP relay accepts inbound connections and relays messages from outside your organization. For security purposes, do not allow this type of relay. If necessary, add only specific hosts that are allowed to relay through the Exchange server.
- You can configure message size limits on the virtual server. The message sizes enforced depend also on the global settings and the mailbox settings.
- The Send copy of Non-Delivery Report to setting identifies an e-mail address where undeliverable mail is forwarded.
- The Badmail directory receives messages that cannot be delivered. You should periodically review this directory and delete messages. The Badmail directory is not used with Exchange 2003 SP1--all bad mail is automatically deleted.
- The Queue directory receives messages that are waiting to be delivered.
- The Delay notification period identifies when a message is sent to the user indicating that there might be a problem sending the mail. The Expiration timeout is the amount of time after which an NDR is returned and the server stops trying to contact the destination mail server.
- The Masquerade domain is a domain name that is used externally. Configuring the masquerade domain replaces internal SMTP addresses as they are used externally. This makes sent messages appear as if they have come from a different domain.
- Use the Smart host setting to identify an SMTP server to which Internet mail will be forwarded. When you use a smart host, the Exchange server will no longer use DNS to locate other SMTP servers. Note: Typically you configure this at the connector, not on the virtual server itself.
- When using the IP address to identify the smart host, enclose the address in brackets. For example: [192.168.1.1].
- When you configure reverse DNS lookups, mail is not blocked. Instead, failed lookups are simply logged and the mail is allowed to be delivered.
Exchange
Routing Facts
Routing in Exchange is the process of identifying how messages are
sent within and outside of the Exchange organization. Routing is controlled by
the following components.
Component
|
Description
|
Routing Group
|
A routing group is a group
of Exchange servers that are connected by constant, high-speed links. The
routing group topology typically mirrors sites in your organization that are
connected by WAN links. Routing groups identify the physical routes that
messages take. For communication within a routing group:
For communication between routing
groups or with external systems:
|
Connectors
|
Connectors identify paths between routing groups, to the Internet, or
to external mail systems.
|
Link State Information
|
Link state information is
information about routing groups and connectors that the routing process uses
to make routing decisions.
|
Internal Routing Components
|
Various software processes within
Exchange are used to make routing decisions. Internal components include the
following:
|
By default, all servers are part of
a single routing group. You can create additional routing groups, move existing
servers into new routing groups, and identify the routing group location during
Exchange installation. After creating a routing group, you must also create
connectors between those groups for communication to take place. The following
table identifies the three types of connectors you can create.
Connector Type
|
Description
|
Routing group connector
|
Use a routing group connector to
connect two Exchange routing groups.
|
SMTP connector
|
Use an SMTP connector to connect a
routing group to an external mail system, the Internet, or a non-Exchange
system.
|
X.400 connector
|
Use an X.400 connector to connect
to X.400 systems or to Exchange 5.5 mail servers that are external to your
organization.
|
Routing
Group and Connector Facts
When you install Exchange, you
decide which routing group the server goes in. You can also customize the
routing group configuration by creating new routing groups. To manage routing
groups, use the following process:
- Create new routing groups and rename existing ones.
- Move servers to the appropriate routing group.
- In mixed mode, you can only move servers to routing groups in the same administrative group.
- You cannot move a server that is a bridgehead server for a connector in the current routing group. Remove the connectors from the server first, then move the server.
- Create connectors. Without a connector, communication between routing groups is not possible.
- You must create a connector between the groups from each group. When you create the first connector, you will be prompted if you want to create a corresponding connector on the other routing group.
- Before you can create a connector, you will need to define a virtual server if it does not already exist.
The following table describes some
important configuration settings for the routing group connector and the SMTP
connector.
Connector Type
|
Setting Considerations
|
Routing Group Connector
|
For routing group connectors,
The
bridgehead server links to a virtual server on the Exchange server.
|
SMTP Connector
|
For the SMTP connector,
|
Note: Many settings in the connector can also be configured in the
virtual server. As a best practice, you should configure settings on the
connector, not the virtual server. When conflicting settings are configured,
the settings in the connector are used.
Communication
Troubleshooting Facts
In a organization with different
routing groups, there might be multiple routes between any two routing
groups. The following table lists the criteria used to select the route.
Factor
|
Criteria
|
Schedule restrictions
|
Is the connector available now?
|
Size restrictions
|
Is the size of the message under
the maximum specified?
|
Message priority restrictions
|
Does the message qualify given its
priority?
|
Permission of user
|
Does the user have permission to
use this connector?
|
Cost of the route
|
Which route has the lowest cost?
|
An Exchanger server selects one
route over another in the following way.
- The server identifies all routes that meet the first four conditions.
- If multiple routes can be used to send the message, the route cost is then used to select the route.
- The cost is cumulative for each connector on the route. This means that the total cost is the sum of the costs for all connectors on the route.
- The route with the lowest cost will be the one selected among the available routes.
- In situations where the routes have the same costs, the route is selected at random.
Message tracking is an invaluable
tool in troubleshooting Exchange servers. Message tracking allows you to
track messages within and between Exchange servers. Keep in mind the
following facts regarding message tracking:
- To use message tracking, you must enable message tracking in the properties of each server the message will be routed through.
- The Message Tracking Center allows you to see the whole flow process for each message.
- Tracking information is kept in log files. The log files are stored in the Drive:\Program Files\Exchsrvr\servername.log.
- You can specific the number of days that log files will be kept.
- When troubleshooting message flow, use the Message Tracking Center. The Message Tracking Center allows you to track messages:
- Using the message id
- Based on the message sender or recipient
- That have flowed through a specific server
In addition to message tracking, you
can use the WinRoute tool to view the contents of the link state table. The
link state table contains message routing information such as routing group and
connector configuration. The link state table is maintained by the master
server in the routing group (by default the first Exchange server installed in
the routing group).
Exchange
Client Facts
An e-mail client is a software
application that supports specific protocols and provides the user with an
interface to a server. Exchange Server 2003 supports many different types of
client connections. The following table identifies the most common clients
used.
Client
|
Description
|
Outlook 2003 (MAPI) client
|
The Outlook 2003 client is the
recommended client for Exchange Server 2003. Outlook 2003 takes
advantage of newer Exchange Server 2003 features. The Outlook 2003 client:
|
Outlook Web Access (OWA)
|
Outlook Web Access connects to the
Exchange server through the Internet. Outlook Web Access provides the same
look and feel as Outlook 2003 and many of the same features. Outlook Web
Access:
|
Outlook Express
|
Outlook Express is a generic
e-mail client that can be used to connect to Exchange and non-Exchange e-mail
servers. Outlook Express:
Note: You can also connect to an Exchange server using various
other clients
|
Outlook Mobile Access (OMA)
|
Outlook Mobile Access is used with
WAP-enabled browsers such as a cell phone or other portable device and is
only available through Exchange 2003 servers. Outlook Mobile Access:
|
Non-Outlook Clients
|
Non-Outlook clients use POP3,
IIMAP3, or SMTP for sending and receiving e-mail. To enable non-Outlook
client support, you must configure the corresponding virtual servers on your
Exchange server.
|
Note: Outlook and Outlook Web Access gives users the ability to
create their own public folders.
Outlook 2003 provides users access
to more features of the Exchange environment than other clients and even
previous versions of Outlook. The following table identifies some of the
Outlook 2003 enhancements and their benefits.
Enhancement
|
Benefit
|
Cache mode
|
Note: Cache mode is different than the offline files used in
previous versions. Outlook 2003 users do not have to select between
working in cache mode offline or working with an online copy.
|
RPC over HTTP or HTTPS
|
Note: When you install Exchange Server 2003, support is
automatically enabled for Outlook 2003 and Outlook Web Access clients. To
enable support for other clients, start the corresponding virtual servers
(POP3 or IMAP4). When you upgrade to Exchange Server 2003 from Exchange
Server 2000, POP3 and IMAP4 virtual servers are already started.
|
Front-end
Server Facts
When you create a front-end/back-end
server configuration, clients connect to the front-end server. The front-end
server then routes all requests to the Exchange server where the mailbox
resides.
- The primary benefit for using a front-end/back-end server configuration is to provide a single point of access for clients. For example, you can have a single URL for all Outlook Web Access users in your organization even though mailboxes might be located on multiple Exchange servers in the organization.
- Using a front-end server also creates a single point of access to e-mail within the organization. This simplifies security administration and control, and allows you to disable various protocols that must be supported on each server.
When you use a front-end/back-end
server configuration, one server is designated as the front-end server. All
other servers are back-end servers.
Server
|
Description
|
Front-end server
|
The front-end server is the point
of communication between the clients and the back-end servers. The front-end
server:
You must specifically configure a
front-end server by editing the properties of the server object in Exchange
System Manager.
|
Back-end server
|
Back-end servers host mailboxes
and process client requests. By definition, all Exchange Server 2003
computers are back-end servers. When you configure a front-end server, you do
not need to complete any additional tasks to configure the back-end servers.
|
The following Exchange versions
support front-end servers:
- Exchange Server 2000, Enterprise Edition
- Exchange Server 2003, Standard Edition
- Exchange Server 2003, Enterprise Edition
Note: Front-end servers are not supported in a Windows cluster. To
provide fault tolerance and improve performance, configure multiple front-end
servers using Network Load Balancing.
To configure a front-end server,
complete the following steps:
- Edit the properties of the server object in Exchange System Manager to designate the server as a front-end server. Restart all necessary services.
- On the front-end server, move any mailboxes to other servers. Delete all public folder stores. If using SMTP, delete all mailbox stores except for one, otherwise delete all mailbox stores.
- If necessary, configure additional virtual servers to support necessary clients (POP3, IMAP4). By default, HTTP and SMTP virtual servers are already configured on an Exchange Server 2003 system.
- Disable any unneeded services and protocols.
- Enable SSL to use HTTPS. To secure front-end and back-end server communications, use IPSec between the front-end and back-end servers.
- Open required firewall ports to enable communication with the front-end server. Close unnecessary ports.
Public
Folder Facts
Public folders are a shared storage location for any type of electronic
documents.
- Public folders can hold contacts, calendars, tasks, e-mail messages, and other documents.
- Public folders, and the data they contain, are accessed through a client such as Outlook 2003, Outlook Web Access, IMAP clients, or NNTP applications.
- Public folders exist in the public folder store on an Exchange server. Like a mailbox store, the public folder store is composed of two database files: .edb and .stm.
- Public folders are organized in a public folder tree. The tree is the hierarchy of public folders.
- The public folder organization is automatically replicated between Exchange servers in the organization. Content within a public folder (the data) is stored on a server and is not replicated automatically.
- Each public store on the server is associated with a public folder tree. Only one public store per server can be associated for each tree, although a single tree may have multiple public stores associated with it as long as each store is on a different server.
- Each organization has a single public folder tree. You can create additional public folder trees (called general purpose trees). One reason to use additional trees is for hosting news groups. Additional trees:
- Are not replicated automatically.
- Are not accessible through Outlook.
- Are accessible only to NNTP and HTTP clients.
- Require an HTTP virtual server for users to access from a Web browser.
- To create a new public store on a server, there must be a public folder tree in the organization that is not associated with an existing store on that server. This means that to create a second public store on the server in a default environment, you will need to create a new public folder tree.
- Public folders have an Active Directory entry with associated properties.
- You can configure a public folder as a recipient. Public folders appear as objects in the global address list if they are mail-enabled.
- In a mixed mode Exchange environment, public folders are mail-enabled by default.
- In a native mode Exchange environment, public folders are not mail-enabled.
- If you have the appropriate permissions, you can create public folders in the Exchange System Manager or in Outlook. Note: The tool you use determines some of the features available for managing public folders. For example, in Outlook (but not in Exchange System Manager) you can identify the type of data held in a public folder.
- Properties for the public folder store are similar to properties for the mailbox store.
- To create additional public folder stores for non-default public folder trees, you must create the public folder tree first.
- To allow clients to access additional public folder trees, you must create an associated virtual directory beneath the HTTP virtual server.
- You can configure storage limits and deleted item limits on the public store or on the public folder itself.
- You can apply system policies to public stores to centrally control settings such as the maintenance interval, replication interval, store limits and deletion settings, and indexing.
Public
Folder Permissions
Public folder permissions control
what users can do to both the folder and its contents. Public folder permission
types include:
Permission Type
|
Description
|
Client Permissions
|
Client permissions identify the actions that users can take on the contents
of the public folder, such as posting or reading folder contents.
|
Directory Rights
|
Directory rights identify actions that can be performed on the Active Directory
objects and properties associated with public folders. Note: The
Directory rights option will be disabled if the public folder is not
mail-enabled.
|
Administrative Rights
|
Administrative rights identify the actions that users can take on the public
folder itself through an administrative tool (such as Exchange System
Manager), modifying properties such as replication settings or modifying
folder permissions.
|
Client permissions are configured
either through Outlook or the Exchange System Manager. With two exceptions,
client permissions are either granted or denied. Client permissions are:
- Create items
- Read items
- Create subfolders
- Folder owner (the folder owner can assign client permissions to the folder)
- Folder contact
- Folder visible
- Edit items (options are None, Own, or All)
- Delete items (options are None, Own, or All)
To assign permissions, add users or
groups to the permission list, then give the user a role. Each role has an
associated combination of client permissions.
Role
|
Permissions
|
Owner
|
All permissions (including Folder
owner and Folder contact), Edit and Delete all items
|
Publishing Editor
|
Create items, Read items, Create
subfolders, Folder visible, Edit and Delete all items
|
Editor
|
Same as Publishing Editor except
without Create subfolders
|
Publishing Author
|
Create items, Read items, Create
subfolders, Folder visible, Edit and Delete Own items
|
Author
|
Same as Publishing Author except
without Create subfolders
|
Nonediting Author
|
Create items, Read items, Folder
visible, Edit None and Delete Own
|
Reviewer
|
Read items, Folder visible, Edit
and Delete None
|
Contributor
|
Create items, Folder visible, Edit
and Delete None
|
None
|
Folder visible, Edit and Delete
None
|
Note: If you manually choose a permission combination not
represented by a role, the role is listed as Custom.
Keep in mind the following
regarding managing client permissions:
- By default, the Anonymous user is configured with Contributor permissions. This means that anyone can add content to a public folder.
- When you create a child folder, permissions from the parent folder are copied to the child folder.
- Changes made to the parent folder permissions are not automatically propagated to the child folders.
- To copy parent folder permissions to child folders, use the Exchange System Manager to push the changes to child folders. When you propagate permissions to the child folder, existing permissions are deleted and replaced with the permissions from the parent folder.
One administrative task you might
need to perform is to grant other users the ability to create top level
folders. If you use the Delegate control wizard to grant rights to the
organization or the administrative group, the rights granted using the
predefined roles might be more than what you want to allow. To grant only the
necessary rights to create top level public folders, take the following steps:
- Open the registry.
- Browse to HKEY_CURRENT_USER\Software\Microsoft\Exchange\EXAdmin\.
- Create the following DWORD value: ShowSecurityPage = 1
- In Exchange System Manager, edit the properties of the organization or administrative group. Use the Security tab to grant the Create public folder and Create top level public folder rights.
Public
Folder Replication Facts
Replication of the various public
folder components takes place as described in the following table.
Component
|
Replication method
|
Hierarchy
|
The hierarchy is the public folder
tree or organization. The hierarchy for the default public folder tree is
replicated automatically to other Exchange servers within the organization by
the Information Store.
|
Content
|
Public folder data or contents are
not replicated automatically. You must configure public folder content
replication manually between servers. When you configure replication, you can
configure the schedule and frequency that replication occurs.
|
Directory entry
|
The directory entry is the Active
Directory object and its properties. Directory entries are replicated
automatically through Active Directory replication.
|
When users view public folders, they
see a replica of the public folder hierarchy. When the contents of the public
folder are accessed, the data itself comes from the public folder store on the
server on which the data resides. Replicating public folder data:
- Increases the fault tolerance of the public folder data.
- Places copies of the data on local servers. Access data from local can reduce WAN link usage and improve access times.
Keep in mind the following facts
about public folder data replication:
- Replicating public folder data can decrease the WAN traffic associated with data access. However, it does cause an increase in WAN traffic due to replication traffic. Depending on the number of users, replication traffic might be less than data access traffic.
- Only new information going into the original public folder is replicated.
- When configuring replication, you specify the public folder store that will host a replica of the public folder.
- The amount of time data in two replicas is different is called replication latency. Replication latency is dependent on the replication schedule. It is also associated with the amount of time it takes to replicate.
- Determine the importance of current data being available in the replicated public folder, then adjust the replication schedule to reflect that level of importance.
- When a user connects to a public folder store and the store does not contain a copy of the content the user is requesting, Exchange Server 2003 automatically redirects the user to a server that does contain the content. This is known as public folder referral.
- To disable public folder referrals, edit the properties of the connector and check Do not allow public folder referrals. With this setting disabled, clients will only access local copies of public folder content.
When a client needs to access data
in a public folder, Exchange uses replicas in the following order:
- The public folder held on the mailbox server for the recipient.
- A public folder held on another server in the local routing group.
- If public folder referrals are allowed, a public folder in a remote routing group. The client chooses the routing group with the lowest cost. If two routing groups with the same cost exist, the location is chosen at random.
Exchange
Firewall Ports
The following table lists various
protocols and their associated ports that might be used in an Exchange
implementation.
Protocol
|
Description
|
Ports
|
|
SMTP
|
Used to communicate with mail
servers and by POP3 and IMAP4 clients to send mail. Note: SMTP with
SSL is rarely used.
|
TCP 25
Using SSL, TCP 26
|
|
POP3
|
Used to retrieve mail from an
Exchange Server. Disabled on the Exchange server by default.
|
TCP 110
Using SSL, TCP 995
|
|
IMAP4
|
Used to retrieve mail and other
directories from an Exchange Server. Disabled on the Exchange server by
default.
|
TCP 143
Using SSL, TCP 993
|
|
HTTP
|
Used by Outlook Web Access for
mail access.
|
TCP 80
Using SSL, TCP 443
|
|
LDAP
|
Used to access information from
Active Directory.
|
TCP and UDP 389 for Active
Directory access
TCP 3268 for Global Catalog access
|
|
NNTP
|
Used to retrieve information from
Usenet servers on and enables sharing news group public folders.
|
TCP 119
Using SSL, TCP 563
|
|
RPC
|
Used to establish an RPC
connection (end point mapper) and also acts as an RPC client establishing
sessions.
|
TCP 135
TCP 1024 and above (multiple ports
are typically enabled)
|
|
DNS
|
When contacting Active Directory,
a DNS server must be contacted for name resolution. The Exchange server uses
DNS to find mail servers on the Internet
|
TCP and UDP 53
|
|
MTA
|
Used for X.400 connections or
connections to Exchange 5.5 servers.
|
TCP 102
|
|
Kerberos
|
Used for communication and
authentication with Windows 2003 servers.
|
TCP and UDP 88
|
|
IPSec
|
Used to secure server-to-server
communications.
|
IP protocol 51 for AH
IP protocol 50 for ESP
UDP 500 for key exchange
TCP and UDP 88 for Kerberos
|
Common
Internet Configurations
By default, Exchange servers are
enabled to communicate with other mail servers on the Internet.
- Messages sent from users on your private network are routed through your Exchange servers to the appropriate Internet mail servers for external domains.
- Messages sent from hosts on the Internet are sent to your Exchange servers where they can be retrieved by your network users.
- Communication with other mail servers is controlled through properties set on the SMTP virtual servers or SMTP connectors.
The following table shows several
methods for configuring and securing mail servers connected to the Internet.
Design
|
Description
|
Single Exchange Server
|
By default, every Exchange server
is running an SMTP virtual server which is preconfigured to allow Internet
access. You can quickly establish Internet mail service by adding a single
Exchange server to your network.
Note: If your network had multiple Exchange servers, you can
simply accept the default installation and all servers will have Internet
connectivity as long as they have a physical connection to the Internet and
the appropriate MX records have been configured. However, this configuration
exposes multiple servers to Internet traffic.
|
Bridgehead Server
|
If your network has multiple
Exchange servers, it is recommended that you use a bridgehead server to
provide Internet messaging services. This method uses an SMTP connector to
control which servers are allowed to send and receive mail through the
Internet.
|
SMTP Relay (Smart Host)
|
An SMTP relay host is any
Windows Server 2003 running the SMTP services, a third-party server or
hardware device that supports SMTP routing. Inbound and outbound messages
move through the SMTP relay server.
|
Be aware of the following
considerations for connecting servers to the Internet:
- The configurations shown above do not allow clients on the Internet to retrieve mail from your Exchange servers. They only permit incoming and outgoing server-to-server communications.
- Internet mail servers are configured to use port 25 for SMTP. For the server configurations illustrated above, you only need to open port 25 in the firewall to enable server-to-server SMTP communications and port 53 to enable DNS name resolution. Internet mail servers are not configured to use secure SMTP.
- Most Internet mail servers are not configured to use authentication. By default, SMTP virtual servers and connectors are configured to allow anonymous access. This enables your server to anonymously communicate with other mail servers.
- To improve security on internal mail servers, you can require authentication or use TLS. However, disabling anonymous access on servers connected to the Internet will likely prevent that server from sending and receiving mail from Internet servers.
- By default, SMTP virtual servers are configured to relay outbound messages sent from authenticated users and to relay incoming messages sent to the private domain. If you allow more open relaying, your server might be used as a spam relay where messages sent from the Internet are relayed through your server to other Internet hosts.
Securing
Client Connections
By default, Exchange servers are
configured to allow Outlook Web Access (OWA) connections. However, the default
configuration does not provide secure client-to-server communications. Securing
client communications is typically done using a front-end/back-end Exchange
server configuration. The following links show two common ways of configuring a
front-end server for Internet connectivity:
Front-end Server in the DMZ
Front-end Server Behind an ISA
Server
When enabling client connections
through the Internet, you need to take several steps to ensure secure
connections.
- Secure client connections to the front-end server.
- Secure front-end server connections to other servers.
- Open outer firewall ports.
- Open inner firewall ports.
Securing Client-to-Server
Communications
By default, e-mail client
communications with Exchange servers is not secured. You can use the following
methods to secure client communications:
Client(s)
|
Considerations
|
Outlook Web Access, POP3, and
IMAP4
|
Outlook Web Access, POP3, and
IMAP4 clients use Internet protocols to communicate with the front-end
server. Use SSL to secure these connections.
|
Outlook 2003
|
The Outlook 2003 client uses RPC
to communicate with the front-end server. Because RPC is not a secure
protocol, use one of the following methods to provide security:
When using RPC over HTTP, be aware
of the following requirements:
|
When configuring SSL, be aware of
the following considerations:
Consideration
|
Description
|
Adding SSL to the Server
|
You must add SSL to the
appropriate protocols on the Exchange server based on the client protocols
used.
|
SSL Accelerators
|
An SSL accelerator decreases the
performance overhead created by SSL connections. There are two types of SSL
accelerators:
An SSL accelerator card offloads
the encryption and decryption work and increases throughput by decreasing the
workload of the server software. SSL accelerator cards work well in
environments with a small number of front-end servers. In environments with a
large number of front-end servers, the cost of a card for each server and the
administrative overhead makes this solution prohibitive. In such a situation,
an external accelerator is more appropriate.
An external accelerator decrypts
traffic coming from the client and sends it to the front-end server
unencrypted. In the same manner, traffic from the front-end server is sent
unencrypted, the accelerator device encrypts it, and forwards it to the
client. When using an external accelerator, you must configure a special
header, the Front-End-HTTPs: on header for OWA.
|
SSL Offloading
|
To gain the full benefits
offloading SSL traffic to an external SSL accelerator device, the offloading
device must support custom headers because it has to pass the Front-End-HTTPs:
on header to the front-end server, which passes it to the back-end
server. You can configure SSL between the accelerator device and the
front-end server, but this defeats the purpose of offloading SSL.
|
Securing Server-to-Server
Communications
The front-end server uses specific
protocols to communicate with clients. The front-end server uses these same
protocols to communicate with the back-end servers. However, the front-end
server cannot use SSL to communicate with back-end servers. For example, a POP3
client uses POP3 with SSL to communicate with the front-end server. The
front-end server would then use POP3 without SSL to communicate with the
back-end servers.
Use IPSec to secure
front-end/back-end communications, as well as communication between the
front-end server and other servers. Be aware of the following facts when using
IPSec:
- IPSec is typically used when the front-end server is in a DMZ or on a different subnet than other servers. It is not needed when the front-end server is behind the intranet firewall.
- The Authentication Header (AH) protocol provides authentication. The packet is not encrypted, but a checksum is added to verify data integrity.
- The Encapsulating Security Payload (ESP) provides data encryption.
- Use IPSec policies to control the communications allowed between servers. Use the Client (respond only) policy on back-end servers. This allows the backend server to use IPSec with the front-end server, while communicating normally with clients connected through the private network.
Opening Outer Firewall Ports
To enable communication with the
front-end server, you need to open specific ports in the outer (Internet)
firewall. The ports you need to open depend on the type of client connection
that is used.
Client
|
Ports Required
|
Outlook Web Access
|
HTTPS (TCP 443)
HTTP (TCP 80)
|
POP3
|
POP3 with SSL (TCP 995)
POP3 w/o SSL (TCP 110)
SMTP (TCP 25)
|
IMAP4
|
IMAP 4 with SSL (TCP 993)
SMTP (TCP 25)
|
Outlook 2003 with RPC over HTTP
|
HTTPS (TCP 443)
|
Outlook 2003 with a VPN
|
You can use either PPTP or L2TP as
the VPN tunneling protocol. PPTP (TCP 1723, 47)
L2TP (UDP 500, 5500, 1701)
|
Note: The ports listed here are the only ports required for
client-to-server communications. However, your firewall might need other ports
open depending on the other services provided (such as a Web server or a DNS
server).
Opening Inner Firewall Ports
Depending on location of the
front-end server, you will need to open ports on the inner (intranet) firewall
to enable clients or the front-end server to communicate with servers on the
private network. The following table describes the ports required:
Configuration
|
Description
|
If the front-end server is inside
the firewall, the front-end server must be able to communicate with back-end
servers, DNS servers, and Active Directory through the inner firewall. Open
the following ports:
|
|
If the front-end server is behind
the inner firewall using an ISA server, you need to configure ISA to allow
mail traffic to pass to the front-end server. Take the following steps to
configure the ISA server:
|
S/MIME
Facts
Secure Multi-purpose Internet Mail
Extension (S/MIME) protects the integrity and confidentiality of e-mail
messages. S/MIME protects the message itself, while other forms of protection,
such as SSL, protect the transmission channel. S/MIME requires the use of
certificates issued through a public key infrastructure (PKI).
- Certificates are available through the Windows 2003 Certificate Authority or through a certificate authority on the Internet. The key management service offered by Exchange 2000 does not exist in Exchange 2003.
- The certificate authority is responsible for validating identity and for issuing the certificate.
- To obtain a certificate from an Internet certificate authority, you must request a certificate by answering a series of questions in order to validate your identity. To obtain a certificate from a Windows 2003 Certificate Authority, you must be a member of a domain with auto-enrollment or be approved by the certificate authority administrator.
- Security using a PKI uses two mathematically-related values: a public key and a private key.
- The public key is shared with other users.
- The private key is known only by the certificate owner.
- The certificate includes a public key and other information such as the certificate holder and an expiration date.
- E-mail message content can be encrypted.
- The sender encrypts the message using the receiver's public key.
- The receiver decrypts the message using the private key. Because only the receiver has the private key, only that user can read the e-mail contents.
- Adding a digital signature to the e-mail message verifies that the message came from the purported sender (proof of identity) and that the message has arrived unaltered (data integrity).
- The digital signature is encrypted using the sender's private key.
- The receiver uses the sender's public key to decrypt the digital signature. Because only the sender knows the private key, this guarantees the message came from the sender.
S/MIME is supported by Outlook,
Outlook Web Access, or POP3 or IMAP4 clients. Use the following process to use
S/MIME for secure e-mail.
- Obtain a certificate for each user.
- Use the Web enrollment feature or the MMC to request a certificate from the Windows Server 2003 certificate authority.
- Configure Active Directory with certificate autoenrollment. All users will be automatically given a certificate.
- Request a certificate from a third-party certificate authority.
- Enable S/MIME in the e-mail client application.
- For Outlook/POP3/IMAP4 clients, load the certificate into the client application.
- For Outlook Web Access, add the S/MIME control.
- Share and obtain public keys with other users. Users who will send you encrypted e-mail must have your public key. You must have the public key for all users to whom you will send encrypted or digitally signed e-mails.
- If you are using Active Directory autoenrollment, certificates will be added to the user accounts in Active Directory. When connecting through an Outlook client, the necessary public keys will automatically be retrieved for all recipients.
- Users and administrators can add certificates to Active Directory recipients.
- Users who obtain a certificate from a third-part CA can use the Publish to GAL option in Outlook to add the certificate to their user account.
- Administrators can manually add certificates to recipients. For example, adding the certificate to a Contact object makes the certificate available through the Global Address List.
With the
certificates added to Active Directory recipients, the recipient's public key
is automatically retrieved from Active Directory.
- For users who do not exist in Active Directory, or if you are using a POP3 client:
- Send each user your public key by sending a digitally signed message.
- Have each user send their public key by sending a digitally signed message. When you receive their message, add their certificate to your address book. Note: The certificate is only added to your personal address book, not the Global Address List.
- Add the certificate authorities to the Trusted Root Certification Authorities list on the local computer (when using POP3 or IMAP4) or the Exchange server (when using SMTP). This ensures that your computer trusts the certificate authority who issued the recipient's certificate.
Message Filtering Facts
Message
filtering allows an organization to reduce the amount of unsolicited mail
entering the organization by stopping the flow of messages at the mail server.
Exchange supports the following types of filtering.
Filter Type
|
Description
|
Connection Filtering
|
Connection filtering blocks
messages based on the IP address of the SMTP server.
§ You can configure accept and deny lists of servers.
§ You can configure a Realtime Block List (RBL). The
RBL is a commercially available list of IP and IP subnet addresses of known
junk mail sources.
§ When using an RBL, you can allow exceptions to the block
list.
§ Using an RBL puts an additional load on the server.
|
Recipient Filtering
|
Recipient filtering blocks
Internet messages sent to specific recipients within the organization. This
prevents certain recipients in the organization from receiving mail from the
Internet.
|
Sender Filtering
|
Sender filtering blocks messages
sent from a specific e-mail address.
§ You can block messages from a specific address or an
entire domain.
§ You can delete or archive blocked messages.
|
Intelligent Message Filtering
|
Intelligent Message Filtering
blocks messages that have specific words or phrases in the message.
Intelligent Message Filtering is an add-on product to Exchange.
§ Intelligent Message Filtering assigns a number referred to
as a Spam Confidence Level (SCL) based on the analysis of the content.
§ Exchange uses the assigned number to determine whether to
send the message to the recipient, send it to a junk mail folder, or delete
the message.
|
In
addition to the filtering done at the server level, the Outlook and Outlook Web
Access clients allow recipients to establish Safe Senders,
Safe Recipients, and Blocked Senders lists.
Filtering settings are configured on an Organization-wide basis but enabled on individual virtual servers. To configure message filtering, complete the following steps:
Filtering settings are configured on an Organization-wide basis but enabled on individual virtual servers. To configure message filtering, complete the following steps:
- In the Global Settings, edit the Message Filtering properties to configure the filtering settings.
- For each virtual server, enable connection, recipient, and/or sender filtering.
Typically
you will enable filtering on servers connected to the Internet that forward
messages to internal Exchange servers. You should not need to enable filtering
on servers that are used only for internal communications.
Note: Exchange only applies filtering to mail that is received from external SMTP servers. It does not apply filtering to mail sent between Exchange servers in an organization.
Note: Exchange only applies filtering to mail that is received from external SMTP servers. It does not apply filtering to mail sent between Exchange servers in an organization.
Auditing Exchange Servers
Because
Exchange uses Active Directory objects, you can use auditing in Active
Directory for Exchange the same way you use it on regular servers. The table
below describes the audit categories and events available through Active
Directory.
Audit Category
|
Trigger Event(s)
|
Account logon
|
Audits logon through a user
account (users must log on to the company's domain to access their mailboxes)
Recorded by the local computer for
the local account, recorded by domain controller for the AD account
|
Account management
|
Add, rename, disable/enable,
delete, or change the password for a user account (creates entries when
changes are made to Active Directory user objects)
|
Directory service access
|
Access an object that has its own
system control access list (SACL) (includes mailboxes, folders, and messages
in Exchange)
|
Logon
|
Log on or off of the local system
Make a network connection to a
local computer
Writes entries to the security log
only on the computer to which the user attempts access. For example, if a
user is attempting to access a mailbox on an Exchange server, the Exchange
server will record entries in its security log.
|
Object access
|
File, folder, printer access
Adds an entry to the security log
on the server where the mailbox resides when a user accesses a mailbox
|
Policy change
|
Change account password or logon
settings, user rights, or audit policies (records entries whenever account
policy configurations change)
|
Privilege use
|
User exercises user rights
(records entries whenever user rights are enforced)
An administrator takes ownership
of an object
|
Process tracking
|
Records entries whenever
applications perform certain actions, such as loading objects into memory or
creating new threads
This is used mainly for program
debugging and tracking
|
System events
|
Shutdown, restart, service starts
An event affects security or the
security log
|
Note: For Exchange Server 2003, Microsoft recommends that you set
Audit account logon events and Audit logon events to Failure
to avoid filling the security logs with large numbers of successful logon
events.
To enable auditing for a domain member, edit the appropriate Group Policy Object and enable either Success or Failure auditing (or both). When enabling object access auditing, you must also access the Security tab of the object and enable auditing for the actions you want to track. You can enable auditing on specific Exchange objects by first enabling the Object Access policy, then using Exchange System Manager to access the Security tab for specific objects and enabling audit events for specific users. For example, you can set auditing to occur at any of the following levels:
To enable auditing for a domain member, edit the appropriate Group Policy Object and enable either Success or Failure auditing (or both). When enabling object access auditing, you must also access the Security tab of the object and enable auditing for the actions you want to track. You can enable auditing on specific Exchange objects by first enabling the Object Access policy, then using Exchange System Manager to access the Security tab for specific objects and enabling audit events for specific users. For example, you can set auditing to occur at any of the following levels:
- Administrative Group level
- Server level
- Storage Group level
- Store level
Exchange-specific events you can
audit include:
- Create public folder, create top level public folder, modify public folder ACL, modify public folder replica list
- Open mail send queue
- Administer information store, view information store status
- Receive As, Send As
Be aware that in Exchange System
Manager the Security tab is not available on all objects by default. To make
the Security tab available, you must use the following procedure to edit the
registry (Warning: Editing the registry improperly can result in
catastrophic system failure from which you cannot recover. Before editing the
registry, back up all valuable data.):
- In Registry Editor (regedit), open the HKEY_CURRENT_USER | Software | Microsoft | Exchange | ExAdmin.
- Select Edit | New | DWORD Value. Use the following settings:
- Value Name = ShowSecurityPage
- Value = 1
- Close the Registry Editor. Exchange System Manager displays the results of the change immediately.
The following steps explain one way
to enable auditing on an object within Exchange System Manager:
- In Exchange System Manager, open the properties dialog box of the object you wish to audit (i.e., the administrative group, the server, the storage group, or the mailbox store).
- Select the Security tab and click the Advanced button.
- Select the Auditing tab and click Add.
- Enter Everyone and click OK.
- In the Auditing entry for dialog box, select This object, sub-containers, and children objects in the Apply onto drop-down list.
- Select all the boxes for both Success and Failure in the Access List.
In addition to auditing events, you
can analyze the security of your systems by running the Microsoft Baseline Security
Analyzer (MBSA). This tool analyzes current system settings and identifies
potential security weaknesses. You should run this tool on each system
periodically to ensure that unwanted changes are not introduced on your
systems.
Server
Management Tools
The following table identifies tools
in Exchange Server 2003 and Windows Server 2003 that will help you with your
management tasks.
Tool
|
Description
|
Event Viewer
|
When troubleshooting Exchange, one
of first places to go is the Event Viewer. Keep in mind the following
regarding events:
|
Performance Monitor
|
Within Performance Monitor you can
use the System Monitor to view real-time Exchange server statistics. You
can view this information in a chart, histogram or report. System Monitor
uses performance objects (categories of information) and counters (specific
pieces of information) to track server statistics. When you configure System
Monitor, you identify the objects and counters you want to track. The
following list represents some of the key values you should examine:
|
Use the Performance Logs and
Alerts option to collect data over a period of time. This data is collected
in log files. You can use this data to create a baseline of
performance, forecast future needs and identify bottlenecks. You
can also use Performance Logs and Alerts to send alerts based on thresholds
(you can put the thresholds in counter logs).
|
|
Exchange System Manager
|
Enable diagnostic logging for a
server in Exchange System Manager to send Exchange event information to the
Event Viewer.
|
Enable protocol logging for a
virtual server to log information about the operation of a protocol instance.
|
|
Use the Message Tracking Center to
view the flow of a message through the Exchange system. When using message
tracking:
|
|
Use Monitoring and Status tools to
monitor servers and connectors and to create notifications for server
processes and statuses.
Using this tool you can monitor
and send notifications specifying such situations as:
|
|
Beneath each server is a Queues
folder. This folder holds messages that are waiting to be delivered. Be aware
of the following facts regarding queues:
|
|
WinRoute
|
WinRoute is an additional tool
that shows the link state table for Exchange. Use WinRoute to query a server
and view its table, routing groups, connectors, master, address spaces, and
member servers.
|
Isinteg.exe
|
Isinteg is a command-line tool
that analyzes and makes some repairs to the Exchange databases. Use Isinteg
for problems similar to the following:
Keep in mind the following when
using Isinteg:
|
Eseutil.exe
|
Eseutil is more powerful than Isinteg for repairing
problems in the database. When using Eseutil:
|
Microsoft Baseline Security
Analyzer (MBSA)
|
You can use MBSA to analyze the
security settings of your system according to Microsoft recommended security
guidelines. MBSA finds security misconfigurations and missing security
updates on a system. MBSA also offers specific guidance for correcting security
problems.
|
Establishing
a Baseline
To ensure the optimization and
availability of your server, the following maintenance should be done on a
daily basis.
- Review the Event Viewer for events with error or warning status.
- Use Performance Console to review the status of the disks, memory, network cards and processor for Exchange and Windows servers.
- Review the status of required services on the Exchange and Windows servers.
- Monitor failovers using the Cluster Administrator.
- Review the status of all queues.
- Ensure that there is an adequate amount of disk space, especially for the database and log files.
You should also perform the
following tasks periodically:
- Check the mdbdata directory for log files. If this directory has a large number of log files, it means that backups are not being performed properly.
- Check the contents of the Badmail directory. Badmail contains mail that could not be delivered locally. You can manually delete the contents of this directory or download a tool from Microsoft which cleans out the directory periodically. Note: With Exchange Server 2003 SP1, the Badmail directory is no longer used.
As part of normal server
maintenance, you should create a baseline to identify normal values for various
system processes. In that way, you will be able to identify unusual loads and
pinpoint the source of server problems. The following table lists the minimum
counters you should monitor to establish a baseline for Exchange servers.
Counter
|
Description
|
MSExchange IS Mailbox\Message
Opens/sec
|
Identifies the rate of message
open requests.
|
MSExchangeIS Mailbox\Folder
Opens/sec
|
Identifies the rate of folder open
requests.
|
MSExchangeIS Mailbox\Local
Delivery Rate
|
Identifies the rate of message
delivery.
|
MSExchangeIS\ RPC Operations /sec
|
Identifies the rate of RPC
operations. An unusually high number could result in Outlook not being able
to contact the Exchange server.
On 4-processor systems, this value
should be 0.
|
MSExchangeIS\RPC Requests
|
Identifies the number of RPC
requests currently being processed.
This value should not exceed 100.
|
PhysicalDisk(_Total)Disk
Transfers/sec
|
Identifies disk utilization as a
percentage.
This value should be below 50.
Higher values could indicate that the disk is becoming a bottleneck.
|
Process(store)\% Processor Time
|
Identifies the percentage of time
the processor spends on non-idle threads for the store process.
A value consistently over 75-80%
indicates an overloaded processor.
|
Processor(_Total)\% Processor Time
|
Identifies the percentage of time
the processor spends on non-idle threads (overall).
A value consistently over 75-80%
indicates an overloaded processor.
|
SMTP Server\Local Queue Length
|
Identifies the number of messages
waiting in the SMTP queue.
|
SMTP Server\Messages Delivered/sec
|
Identifies the rate at which
messages are delivered to local mailboxes.
|
SMTP Server\Messages Received/sec
|
Identifies the rate at which
messages are being received.
|
SMTP Server\Messages Sent/sec
|
Identifies the rate at which
messages are being sent.
|
Note: Unless otherwise indicated, normal value ranges depend on
your organization. You must identify the normal ranges for your servers so that
you can identify when unusual values occur.
Optimization
Facts
The following table covers important
facts for optimizing the hardware components of your Exchange system.
Component
|
Facts to Consider
|
Memory
|
|
CPU
|
|
Disk
|
Because of Exchange's heavy
database usage, disk I/O is usually the area where bottlenecks will occur.
Keep in mind the following facts regarding disk storage:
|
Network
|
Keep in mind the following facts
regarding your network hardware.
|
Additional points to consider for
optimization are:
- Ensure that you have the current updates applied for your browsers, drivers, firmware, and other system components.
- Review how you use various machines in the system to determine if you can turn off services.
- Ensure that access to the global catalog server is readily available to all users especially in larger environments.
For more information on improving
the performance of your Exchange network, see the document Optimizing
Storage for Exchange Server 2003 on the Microsoft Website. Microsoft
also has a topology calculator on their Website to help you to evaluate your
hardware needs.
Troubleshooting
Performance
The best way to troubleshoot
problems is to prevent them from occurring. When you implement Exchange, it is
important to correctly configure your systems to handle the projected load. Use
the following tools to load test your current systems to determine if they can
handle projected loads.
Tool
|
Description
|
Load Simulator (LoadSim)
|
LoadSim simulates the performance
load of MAPI clients. LoadSim allows you to determine whether your servers
can handle the loads that you've planned for them. However, LoadSim does not
measure the following factors that may affect server performance:
|
Exchange Stress and Performance
(ESP)
|
ESP allows you to simulate several
client sessions concurrently accessing the Exchange servers in your system.
ESP compensates for some of the factors that LoadSim fails to evaluate. ESP
simulates client sessions from the following protocols or APIs:
|
Jetstress
|
Jetstress allows you to verify the
performance of Exchange Server 2003 disk subsystems by simulating I/O
operations from a specific number of users. You use Jetstress in conjunction
with Performance Monitor, Event Viewer, and ESEUTIL to verify that the
Exchange disk subsystem meets the performance criteria you establish for before
deploying the system.
|
By monitoring key statistics, you
can identify problems as they start, or you can identify the likely cause of
performance problems. The following table lists key statistics and threshold
values.
Category
|
Counter
|
Threshold Value
|
Disk
|
% Disk Time
|
Keep below 90%
A high value may indicate a hard
disk bottleneck.
|
Avg. Disk Queue Length
|
Keep below 2
|
|
Memory
|
Available Bytes
|
Keep above 4000 (4 MB)
|
Pages/sec
|
Keep below 20 (5 is ideal)
If it is over 10, the system may
be doing a lot of disk thrashing.
|
|
Pool Page Bytes
|
If you are using the /3GB switch,
this value should not be larger than 200 MB, except during backups when
increases are normal.
|
|
Pool Nonpaged Bytes
|
If you are using the /3GB switch,
this value should not be larger than 100 MB.
|
|
Free System Page Table Entries
|
Keep below 3,000
|
|
Private Bytes
|
Any steady increases from the
baseline indicate a possible memory leak.
|
|
MSExchangeIS
|
SMTP Server\Local Queue Length
|
Keep below 1,000
|
Mailbox\Send Queue Size
|
Should be less than 500
|
|
RPC Requests
|
Keep below 30
|
|
RPC Averaged Latency
|
Should be below 50 ms
|
|
Paging File
|
% Usage
|
Keep below 75%
If high, adding more RAM might
solve the problem.
|
Physical Disk
|
% Disk Time
|
Should be below 50%
|
Avg. Disk sec/Transfer
|
A high value might mean a full
queue or disk failure
|
|
Disk Transfers/sec
|
Keep below 50%
|
|
Process Counters
|
% Processor Time
|
Keep below 75-80%
|
Processor
|
% Privileged Time
|
Keep below 75%
A high value typically indicates a
failing device
|
% Processor Time
|
Keep below 75-80%
|
|
% User time
|
Keep below 75%
|
|
Server Work Queues
|
Queue Length
|
Should be below 4
A high value indicates processor
congestion
|
Because you cannot constantly
monitor system statistics, Exchange Server 2003 allows you to configure
notifications when your system reaches thresholds you define. To set
notifications, open the Tools folder in Exchange System Manager,
right-click the Notifications folder and select New | E-mail
Notification. You can select any combination of the following variables
Exchange uses in notifications:
- %TargetInstance.Name% variable indicates the name of the server or connector that triggered the notification.
- %TargetInstance.ServerStateString% indicates the type of alert, either warning or critical.
- %TargetInstance.ServicesStateString% reports the status of the services running on the server.
- %TargetInstance.CPUStateString% indicates the status of the server's CPU.
- %TargetInstance.QueuesStateString% indicates the status of the queues on the server.
- %TargetInstance.DisksStateString% reports the status of the server's hard drives.
- %TargetInstance.MemoryStateString% indicates the status of the server's virtual memory.
Once you identify the symptoms of
poor performance, you can isolate the components that cause it.
Cause
|
Solution
|
High disk space usage
|
To isolate disk problems, you
should examine the following five disk subsystems:
For each group of disks that
performs the above functions, you'll have to perform a separate analysis
since each function demonstrates distinctive I/O patterns. You can do the
following to improve disk usage:
|
High memory usage
|
To alleviate physical memory
problems, remove unnecessary software from your Exchange server and run your
maintenance tasks when server use is low. While Exchange Server 2003 can use
up to 3 GB of memory (Store.exe can use up to 1.5 GB itself), Exchange's
ExIFS kernel driver can also use up enough kernel memory to cause sever
performance problems. You can do the following to improve kernel memory use:
|
Processor time conflicts
|
To alleviate processor conflicts,
do the same things you would do for memory problems. Perform maintenance
tasks (backups, particularly) outside of normal operating hours, and rather
than having an Exchange server perform multiple roles (e.g., as a mail server
and public folder server), offload tasks to dedicated servers.
|
For more information on
troubleshooting Exchange Server 2003 performance, particularly for Performance
Monitor counters and values, use the Troubleshooting Exchange Server 2003
Performance document from Microsoft.
Storage
Design Facts
The design of your storage system
allows you to optimize the system and protect your data. An effective design
strategy considers file location, protection level for the files, and the
necessary hardware to support it. The table below identifies one way to
structure the Exchange system to ensure optimization and fault tolerance.
Drive
|
Contents
|
Recommended Configuration
|
C:\
|
Operating System
|
RAID 1 or RAID 5
|
D:\
|
Pagefile
|
The pagefile should be on a
different physical disk from the operating system. No special protection for
the pagefile is required.
|
E:\
|
Transaction Logs
|
RAID 1 or if using a SAN system
RAID 0+1
|
F:\
|
Exchange Store Databases
|
RAID 5
|
When designing data storage, keep in
mind the following recommendations:
- Separate the transaction logs and databases on even the smallest of systems for fault tolerance and performance.
- When using default logging, you can optimize your system by storing the saved log files on a disk other than the one used to store the current (E00.log) file.
- Place the current file on a fast disk to improve performance.
- Place saved log files on a large disk.
- If you have multiple storage groups, each group should have their own RAID 5 set.
- Use SAN/NAS solutions to increase performance and storage capabilities. Verify with the hardware vendor that the system is designed to work with Exchange Server 2003.
- Use a separate disk for the SMTP queue for increased performance.
- RAID 0+1 is becoming more common because it delivers better I/O performance and eliminates the need for a write-back cache.
In addition to designing disk
locations, you can improve manageability and availability by creating multiple
stores and storage groups. The following table describes the recommendations
for working with each.
Unit
|
Design Considerations
|
Stores
|
By creating multiple stores, you
divide the Exchange database into multiple smaller databases. You might
create multiple stores for the following reasons:
|
Storage Groups
|
With Exchange Server 2003,
Microsoft recommends that you create a storage group for each store until you
have reached the maximum number of allowable storage groups. Doing so:
You might also create multiple
storage groups for the following reasons:
|
SMTP Facts
A virtual server identifies a protocol running on the Exchange server. You can have multiple different protocols running at the same time or multiple instances of the same protocol running on a single server. Each instance of a protocol is represented by a different virtual server.Simple Mail Transfer Protocol (SMTP) is the default protocol for Exchange Server 2003. SMTP is used in an Exchange system to:
- Transfer mail between servers within an Exchange organization
- Transfer mail between an Exchange server and a mail server on the Internet
- Send mail from some Outlook clients to an Exchange server
- By default, SMTP is enabled on all Exchange servers.
- Windows 2000 Server and Window Server 2003 support Extended SMTP (ESMTP) by default. ESMTP supports host authentication and encryption.
- An ESMTP host reverts to SMTP when the receiving host does not support ESMTP.
- Exchange Server 2003 communicates with other mail servers using standard SMTP commands and numerical reply codes over TCP port 25. Exchange uses an asymmetric request-response protocol. This means that one host sends a command, waits for a reply and then sends another command.
Method | Description |
Active Directory | For messages sent within an Exchange organization, the Exchange server uses information stored in Active Directory to locate the destination mail server. The destination mail server is the Exchange server that holds the mailbox store that contains the recipient's mailbox. |
DNS | For mail sent outside of your organization, the virtual server can be
configured to use DNS for locating mail servers.
|
Smart Host | For mail sent outside of your organization, you can configure the Exchange server to forward all mail to a smart host (also called an SMTP relay). When using a smart host, all mail for external domains is sent to the smart host. The Exchange server will not use DNS to locate the destination mail server. Instead, the smart host is responsible for locating destination mail servers and sending the mail accordingly. |
SMTP Virtual Server Facts
Keep in mind the following facts about managing SMTP virtual servers:- An SMTP virtual server is installed and enabled by default. Virtual servers for POP3, IMAP4, and NNTP are disabled by default on a new install, but enabled for an upgrade from Exchange Server 2000 (if they were enabled on the Exchange 2000 system).
- To run multiple SMTP virtual servers on a single Exchange server, you need to assign a different IP address and port combination for each.
- By default, the SMTP virtual server uses port 25. You can also configure an outbound port on which the server will try to communicate with other servers.
- For internal mail servers, you can choose a custom port to prevent communication with servers on the Internet.
- With Anonymous access disabled, Internet servers will not be able to communicate with your Exchange server.
- Basic authentication sends credentials in plain text. Use TLS to encrypt authentication credentials. When using TLS, you will need to import a certificate.
- An SMTP relay accepts mail from a client or server and relays it to other servers. By default, the Exchange server will only relay mail for internal users.
- An open SMTP relay accepts inbound connections and relays messages from outside your organization. For security purposes, do not allow this type of relay. If necessary, add only specific hosts that are allowed to relay through the Exchange server.
- You can configure message size limits on the virtual server. The message sizes enforced depend also on the global settings and the mailbox settings.
- The Send copy of Non-Delivery Report to setting identifies an e-mail address where undeliverable mail is forwarded.
- The Badmail directory receives messages that cannot be delivered. You should periodically review this directory and delete messages. The Badmail directory is not used with Exchange 2003 SP1--all bad mail is automatically deleted.
- The Queue directory receives messages that are waiting to be delivered.
- The Delay notification period identifies when a message is sent to the user indicating that there might be a problem sending the mail. The Expiration timeout is the amount of time after which an NDR is returned and the server stops trying to contact the destination mail server.
- The Masquerade domain is a domain name that is used externally. Configuring the masquerade domain replaces internal SMTP addresses as they are used externally. This makes sent messages appear as if they have come from a different domain.
- Use the Smart host setting to identify an SMTP server to which Internet mail will be forwarded. When you use a smart host, the Exchange server will no longer use DNS to locate other SMTP servers. Note: Typically you configure this at the connector, not on the virtual server itself.
- When using the IP address to identify the smart host, enclose the address in brackets. For example: [192.168.1.1].
- When you configure reverse DNS lookups, mail is not blocked. Instead, failed lookups are simply logged and the mail is allowed to be delivered.
Exchange Routing Facts
Routing in Exchange is the process of identifying how messages are sent within and outside of the Exchange organization. Routing is controlled by the following components.Component | Description |
Routing Group | A routing group is a group of Exchange servers that are connected by
constant, high-speed links. The routing group topology typically mirrors sites
in your organization that are connected by WAN links. Routing groups identify
the physical routes that messages take.
For communication within a routing group:
|
Connectors | Connectors identify paths between routing groups, to the Internet, or
to external mail systems.
|
Link State Information | Link state information is information about routing groups and connectors
that the routing process uses to make routing decisions.
|
Internal Routing Components | Various software processes within Exchange are used to make routing
decisions. Internal components include the following:
|
Connector Type | Description |
Routing group connector | Use a routing group connector to connect two Exchange routing groups.
|
SMTP connector | Use an SMTP connector to connect a routing group to an external mail system,
the Internet, or a non-Exchange system.
|
X.400 connector | Use an X.400 connector to connect to X.400 systems or to Exchange 5.5 mail
servers that are external to your organization.
|
Routing Group and Connector Facts
When you install Exchange, you decide which routing group the server goes in. You can also customize the routing group configuration by creating new routing groups. To manage routing groups, use the following process:- Create new routing groups and rename existing ones.
- Move servers to the appropriate routing group.
- In mixed mode, you can only move servers to routing groups in the same administrative group.
- You cannot move a server that is a bridgehead server for a connector in the current routing group. Remove the connectors from the server first, then move the server.
- Create connectors. Without a connector, communication between routing groups
is not possible.
- You must create a connector between the groups from each group. When you create the first connector, you will be prompted if you want to create a corresponding connector on the other routing group.
- Before you can create a connector, you will need to define a virtual server if it does not already exist.
Connector Type | Setting Considerations |
Routing Group Connector | For routing group connectors,
|
SMTP Connector | For the SMTP connector,
|
Communication Troubleshooting Facts
In a organization with different routing groups, there might be multiple routes between any two routing groups. The following table lists the criteria used to select the route.Factor | Criteria |
Schedule restrictions | Is the connector available now? |
Size restrictions | Is the size of the message under the maximum specified? |
Message priority restrictions | Does the message qualify given its priority? |
Permission of user | Does the user have permission to use this connector? |
Cost of the route | Which route has the lowest cost? |
- The server identifies all routes that meet the first four conditions.
- If multiple routes can be used to send the message, the route cost is then used to select the route.
- The cost is cumulative for each connector on the route. This means that the total cost is the sum of the costs for all connectors on the route.
- The route with the lowest cost will be the one selected among the available routes.
- In situations where the routes have the same costs, the route is selected at random.
- To use message tracking, you must enable message tracking in the properties of each server the message will be routed through.
- The Message Tracking Center allows you to see the whole flow process for each message.
- Tracking information is kept in log files. The log files are stored in the Drive:\Program Files\Exchsrvr\servername.log.
- You can specific the number of days that log files will be kept.
- When troubleshooting message flow, use the Message Tracking Center. The
Message Tracking Center allows you to track messages:
- Using the message id
- Based on the message sender or recipient
- That have flowed through a specific server
Exchange Client Facts
An e-mail client is a software application that supports specific protocols and provides the user with an interface to a server. Exchange Server 2003 supports many different types of client connections. The following table identifies the most common clients used.Client | Description | ||
Outlook 2003 (MAPI) client | The Outlook 2003 client is the recommended client for Exchange
Server 2003. Outlook 2003 takes advantage of newer Exchange Server 2003
features. The Outlook 2003 client:
| ||
Outlook Web Access (OWA) | Outlook Web Access connects to the Exchange server through the
Internet. Outlook Web Access provides the same look and feel as Outlook 2003 and
many of the same features. Outlook Web Access:
| ||
Outlook Express | Outlook Express is a generic e-mail client that can be used to
connect to Exchange and non-Exchange e-mail servers. Outlook Express:
| ||
Outlook Mobile Access (OMA) | Outlook Mobile Access is used with WAP-enabled browsers such as a
cell phone or other portable device and is only available through Exchange 2003
servers. Outlook Mobile Access:
| ||
Non-Outlook Clients | Non-Outlook clients use POP3, IIMAP3, or SMTP for sending and receiving e-mail. To enable non-Outlook client support, you must configure the corresponding virtual servers on your Exchange server. |
Outlook 2003 provides users access to more features of the Exchange environment than other clients and even previous versions of Outlook. The following table identifies some of the Outlook 2003 enhancements and their benefits.
Enhancement | Benefit |
Cache mode |
|
RPC over HTTP or HTTPS |
|
Front-end Server Facts
When you create a front-end/back-end server configuration, clients connect to the front-end server. The front-end server then routes all requests to the Exchange server where the mailbox resides.- The primary benefit for using a front-end/back-end server configuration is to provide a single point of access for clients. For example, you can have a single URL for all Outlook Web Access users in your organization even though mailboxes might be located on multiple Exchange servers in the organization.
- Using a front-end server also creates a single point of access to e-mail within the organization. This simplifies security administration and control, and allows you to disable various protocols that must be supported on each server.
Server | Description |
Front-end server | The front-end server is the point of communication between the clients and
the back-end servers. The front-end server:
|
Back-end server | Back-end servers host mailboxes and process client requests. By definition, all Exchange Server 2003 computers are back-end servers. When you configure a front-end server, you do not need to complete any additional tasks to configure the back-end servers. |
- Exchange Server 2000, Enterprise Edition
- Exchange Server 2003, Standard Edition
- Exchange Server 2003, Enterprise Edition
To configure a front-end server, complete the following steps:
- Edit the properties of the server object in Exchange System Manager to designate the server as a front-end server. Restart all necessary services.
- On the front-end server, move any mailboxes to other servers. Delete all public folder stores. If using SMTP, delete all mailbox stores except for one, otherwise delete all mailbox stores.
- If necessary, configure additional virtual servers to support necessary clients (POP3, IMAP4). By default, HTTP and SMTP virtual servers are already configured on an Exchange Server 2003 system.
- Disable any unneeded services and protocols.
- Enable SSL to use HTTPS. To secure front-end and back-end server communications, use IPSec between the front-end and back-end servers.
- Open required firewall ports to enable communication with the front-end server. Close unnecessary ports.
Public Folder Facts
Public folders are a shared storage location for any type of electronic documents.- Public folders can hold contacts, calendars, tasks, e-mail messages, and other documents.
- Public folders, and the data they contain, are accessed through a client such as Outlook 2003, Outlook Web Access, IMAP clients, or NNTP applications.
- Public folders exist in the public folder store on an Exchange server. Like a mailbox store, the public folder store is composed of two database files: .edb and .stm.
- Public folders are organized in a public folder tree. The tree is the hierarchy of public folders.
- The public folder organization is automatically replicated between Exchange servers in the organization. Content within a public folder (the data) is stored on a server and is not replicated automatically.
- Each public store on the server is associated with a public folder tree. Only one public store per server can be associated for each tree, although a single tree may have multiple public stores associated with it as long as each store is on a different server.
- Each organization has a single public folder tree. You can create additional
public folder trees (called general purpose trees). One reason to use
additional trees is for hosting news groups. Additional trees:
- Are not replicated automatically.
- Are not accessible through Outlook.
- Are accessible only to NNTP and HTTP clients.
- Require an HTTP virtual server for users to access from a Web browser.
- To create a new public store on a server, there must be a public folder tree in the organization that is not associated with an existing store on that server. This means that to create a second public store on the server in a default environment, you will need to create a new public folder tree.
- Public folders have an Active Directory entry with associated properties.
- You can configure a public folder as a recipient. Public folders appear as
objects in the global address list if they are mail-enabled.
- In a mixed mode Exchange environment, public folders are mail-enabled by default.
- In a native mode Exchange environment, public folders are not mail-enabled.
- If you have the appropriate permissions, you can create public folders in the Exchange System Manager or in Outlook. Note: The tool you use determines some of the features available for managing public folders. For example, in Outlook (but not in Exchange System Manager) you can identify the type of data held in a public folder.
- Properties for the public folder store are similar to properties for the mailbox store.
- To create additional public folder stores for non-default public folder trees, you must create the public folder tree first.
- To allow clients to access additional public folder trees, you must create an associated virtual directory beneath the HTTP virtual server.
- You can configure storage limits and deleted item limits on the public store or on the public folder itself.
- You can apply system policies to public stores to centrally control settings such as the maintenance interval, replication interval, store limits and deletion settings, and indexing.
Public Folder Permissions
Public folder permissions control what users can do to both the folder and its contents. Public folder permission types include:Permission Type | Description |
Client Permissions | Client permissions identify the actions that users can take on the contents of the public folder, such as posting or reading folder contents. |
Directory Rights | Directory rights identify actions that can be performed on the Active Directory objects and properties associated with public folders. Note: The Directory rights option will be disabled if the public folder is not mail-enabled. |
Administrative Rights | Administrative rights identify the actions that users can take on the public folder itself through an administrative tool (such as Exchange System Manager), modifying properties such as replication settings or modifying folder permissions. |
- Create items
- Read items
- Create subfolders
- Folder owner (the folder owner can assign client permissions to the folder)
- Folder contact
- Folder visible
- Edit items (options are None, Own, or All)
- Delete items (options are None, Own, or All)
Role | Permissions |
Owner | All permissions (including Folder owner and Folder contact), Edit and Delete all items |
Publishing Editor | Create items, Read items, Create subfolders, Folder visible, Edit and Delete all items |
Editor | Same as Publishing Editor except without Create subfolders |
Publishing Author | Create items, Read items, Create subfolders, Folder visible, Edit and Delete Own items |
Author | Same as Publishing Author except without Create subfolders |
Nonediting Author | Create items, Read items, Folder visible, Edit None and Delete Own |
Reviewer | Read items, Folder visible, Edit and Delete None |
Contributor | Create items, Folder visible, Edit and Delete None |
None | Folder visible, Edit and Delete None |
Keep in mind the following regarding managing client permissions:
- By default, the Anonymous user is configured with Contributor permissions. This means that anyone can add content to a public folder.
- When you create a child folder, permissions from the parent folder are copied to the child folder.
- Changes made to the parent folder permissions are not automatically propagated to the child folders.
- To copy parent folder permissions to child folders, use the Exchange System Manager to push the changes to child folders. When you propagate permissions to the child folder, existing permissions are deleted and replaced with the permissions from the parent folder.
- Open the registry.
- Browse to HKEY_CURRENT_USER\Software\Microsoft\Exchange\EXAdmin\.
- Create the following DWORD value: ShowSecurityPage = 1
- In Exchange System Manager, edit the properties of the organization or administrative group. Use the Security tab to grant the Create public folder and Create top level public folder rights.
Public Folder Replication Facts
Replication of the various public folder components takes place as described in the following table.Component | Replication method |
Hierarchy | The hierarchy is the public folder tree or organization. The hierarchy for the default public folder tree is replicated automatically to other Exchange servers within the organization by the Information Store. |
Content | Public folder data or contents are not replicated automatically. You must configure public folder content replication manually between servers. When you configure replication, you can configure the schedule and frequency that replication occurs. |
Directory entry | The directory entry is the Active Directory object and its properties. Directory entries are replicated automatically through Active Directory replication. |
- Increases the fault tolerance of the public folder data.
- Places copies of the data on local servers. Access data from local can reduce WAN link usage and improve access times.
- Replicating public folder data can decrease the WAN traffic associated with data access. However, it does cause an increase in WAN traffic due to replication traffic. Depending on the number of users, replication traffic might be less than data access traffic.
- Only new information going into the original public folder is replicated.
- When configuring replication, you specify the public folder store that will host a replica of the public folder.
- The amount of time data in two replicas is different is called replication latency. Replication latency is dependent on the replication schedule. It is also associated with the amount of time it takes to replicate.
- Determine the importance of current data being available in the replicated public folder, then adjust the replication schedule to reflect that level of importance.
- When a user connects to a public folder store and the store does not contain a copy of the content the user is requesting, Exchange Server 2003 automatically redirects the user to a server that does contain the content. This is known as public folder referral.
- To disable public folder referrals, edit the properties of the connector and check Do not allow public folder referrals. With this setting disabled, clients will only access local copies of public folder content.
- The public folder held on the mailbox server for the recipient.
- A public folder held on another server in the local routing group.
- If public folder referrals are allowed, a public folder in a remote routing group. The client chooses the routing group with the lowest cost. If two routing groups with the same cost exist, the location is chosen at random.
Exchange Firewall Ports
The following table lists various protocols and their associated ports that might be used in an Exchange implementation.Protocol | Description | Ports |
SMTP | Used to communicate with mail servers and by POP3 and IMAP4 clients to send mail. Note: SMTP with SSL is rarely used. | TCP 25 Using SSL, TCP 26 |
POP3 | Used to retrieve mail from an Exchange Server. Disabled on the Exchange server by default. | TCP 110 Using SSL, TCP 995 |
IMAP4 | Used to retrieve mail and other directories from an Exchange Server. Disabled on the Exchange server by default. | TCP 143 Using SSL, TCP 993 |
HTTP | Used by Outlook Web Access for mail access. | TCP 80 Using SSL, TCP 443 |
LDAP | Used to access information from Active Directory. | TCP and UDP 389 for Active Directory access TCP 3268 for Global Catalog access |
NNTP | Used to retrieve information from Usenet servers on and enables sharing news group public folders. | TCP 119 Using SSL, TCP 563 |
RPC | Used to establish an RPC connection (end point mapper) and also acts as an RPC client establishing sessions. | TCP 135 TCP 1024 and above (multiple ports are typically enabled) |
DNS | When contacting Active Directory, a DNS server must be contacted for name resolution. The Exchange server uses DNS to find mail servers on the Internet | TCP and UDP 53 |
MTA | Used for X.400 connections or connections to Exchange 5.5 servers. | TCP 102 |
Kerberos | Used for communication and authentication with Windows 2003 servers. | TCP and UDP 88 |
IPSec | Used to secure server-to-server communications. | IP protocol 51 for AH IP protocol 50 for ESP UDP 500 for key exchange TCP and UDP 88 for Kerberos |
Common Internet Configurations
By default, Exchange servers are enabled to communicate with other mail servers on the Internet.- Messages sent from users on your private network are routed through your Exchange servers to the appropriate Internet mail servers for external domains.
- Messages sent from hosts on the Internet are sent to your Exchange servers where they can be retrieved by your network users.
- Communication with other mail servers is controlled through properties set on the SMTP virtual servers or SMTP connectors.
Design | Description |
Single Exchange Server | By default, every Exchange server is running an SMTP virtual server which is
preconfigured to allow Internet access. You can quickly establish Internet mail
service by adding a single Exchange server to your network.
|
Bridgehead Server | If your network has multiple Exchange servers, it is recommended that you
use a bridgehead server to provide Internet messaging services. This method uses
an SMTP connector to control which servers are allowed to send and receive mail
through the Internet.
|
SMTP Relay (Smart Host) | An SMTP relay host is any Windows Server 2003 running the SMTP services, a
third-party server or hardware device that supports SMTP routing. Inbound and
outbound messages move through the SMTP relay server.
|
- The configurations shown above do not allow clients on the Internet to retrieve mail from your Exchange servers. They only permit incoming and outgoing server-to-server communications.
- Internet mail servers are configured to use port 25 for SMTP. For the server configurations illustrated above, you only need to open port 25 in the firewall to enable server-to-server SMTP communications and port 53 to enable DNS name resolution. Internet mail servers are not configured to use secure SMTP.
- Most Internet mail servers are not configured to use authentication. By default, SMTP virtual servers and connectors are configured to allow anonymous access. This enables your server to anonymously communicate with other mail servers.
- To improve security on internal mail servers, you can require authentication or use TLS. However, disabling anonymous access on servers connected to the Internet will likely prevent that server from sending and receiving mail from Internet servers.
- By default, SMTP virtual servers are configured to relay outbound messages sent from authenticated users and to relay incoming messages sent to the private domain. If you allow more open relaying, your server might be used as a spam relay where messages sent from the Internet are relayed through your server to other Internet hosts.
Securing Client Connections
By default, Exchange servers are configured to allow Outlook Web Access (OWA) connections. However, the default configuration does not provide secure client-to-server communications. Securing client communications is typically done using a front-end/back-end Exchange server configuration. The following links show two common ways of configuring a front-end server for Internet connectivity:Front-end Server in the DMZWhen enabling client connections through the Internet, you need to take several steps to ensure secure connections.
Front-end Server Behind an ISA Server
- Secure client connections to the front-end server.
- Secure front-end server connections to other servers.
- Open outer firewall ports.
- Open inner firewall ports.
By default, e-mail client communications with Exchange servers is not secured. You can use the following methods to secure client communications:
Client(s) | Considerations |
Outlook Web Access, POP3, and IMAP4 | Outlook Web Access, POP3, and IMAP4 clients use Internet protocols to communicate with the front-end server. Use SSL to secure these connections. |
Outlook 2003 | The Outlook 2003 client uses RPC to communicate with the front-end server.
Because RPC is not a secure protocol, use one of the following methods to
provide security:
|
Consideration | Description |
Adding SSL to the Server | You must add SSL to the appropriate protocols on the Exchange server based
on the client protocols used.
|
SSL Accelerators |
An SSL accelerator decreases the performance overhead created by SSL
connections. There are two types of SSL accelerators:
An external accelerator decrypts traffic coming from the client and sends it to the front-end server unencrypted. In the same manner, traffic from the front-end server is sent unencrypted, the accelerator device encrypts it, and forwards it to the client. When using an external accelerator, you must configure a special header, the Front-End-HTTPs: on header for OWA. |
SSL Offloading | To gain the full benefits offloading SSL traffic to an external SSL accelerator device, the offloading device must support custom headers because it has to pass the Front-End-HTTPs: on header to the front-end server, which passes it to the back-end server. You can configure SSL between the accelerator device and the front-end server, but this defeats the purpose of offloading SSL. |
The front-end server uses specific protocols to communicate with clients. The front-end server uses these same protocols to communicate with the back-end servers. However, the front-end server cannot use SSL to communicate with back-end servers. For example, a POP3 client uses POP3 with SSL to communicate with the front-end server. The front-end server would then use POP3 without SSL to communicate with the back-end servers.
Use IPSec to secure front-end/back-end communications, as well as communication between the front-end server and other servers. Be aware of the following facts when using IPSec:
- IPSec is typically used when the front-end server is in a DMZ or on a different subnet than other servers. It is not needed when the front-end server is behind the intranet firewall.
- The Authentication Header (AH) protocol provides authentication. The packet is not encrypted, but a checksum is added to verify data integrity.
- The Encapsulating Security Payload (ESP) provides data encryption.
- Use IPSec policies to control the communications allowed between servers. Use the Client (respond only) policy on back-end servers. This allows the backend server to use IPSec with the front-end server, while communicating normally with clients connected through the private network.
To enable communication with the front-end server, you need to open specific ports in the outer (Internet) firewall. The ports you need to open depend on the type of client connection that is used.
Client | Ports Required |
Outlook Web Access | HTTPS (TCP 443) HTTP (TCP 80) |
POP3 | POP3 with SSL (TCP 995) POP3 w/o SSL (TCP 110) SMTP (TCP 25) |
IMAP4 | IMAP 4 with SSL (TCP 993) SMTP (TCP 25) |
Outlook 2003 with RPC over HTTP | HTTPS (TCP 443) |
Outlook 2003 with a VPN | You can use either PPTP or L2TP as the VPN tunneling protocol.
PPTP (TCP 1723, 47) L2TP (UDP 500, 5500, 1701) |
Opening Inner Firewall Ports
Depending on location of the front-end server, you will need to open ports on the inner (intranet) firewall to enable clients or the front-end server to communicate with servers on the private network. The following table describes the ports required:
Configuration | Description |
Front-end Server in the DMZ | If the front-end server is inside the firewall, the front-end server must be
able to communicate with back-end servers, DNS servers, and Active Directory
through the inner firewall. Open the following ports:
|
Front-end Server in the Private Network | If the front-end server is behind the inner firewall using an ISA server,
you need to configure ISA to allow mail traffic to pass to the front-end server.
Take the following steps to configure the ISA server:
|
S/MIME Facts
Secure Multi-purpose Internet Mail Extension (S/MIME) protects the integrity and confidentiality of e-mail messages. S/MIME protects the message itself, while other forms of protection, such as SSL, protect the transmission channel. S/MIME requires the use of certificates issued through a public key infrastructure (PKI).- Certificates are available through the Windows 2003 Certificate Authority or through a certificate authority on the Internet. The key management service offered by Exchange 2000 does not exist in Exchange 2003.
- The certificate authority is responsible for validating identity and for issuing the certificate.
- To obtain a certificate from an Internet certificate authority, you must request a certificate by answering a series of questions in order to validate your identity. To obtain a certificate from a Windows 2003 Certificate Authority, you must be a member of a domain with auto-enrollment or be approved by the certificate authority administrator.
- Security using a PKI uses two mathematically-related values: a public key
and a private key.
- The public key is shared with other users.
- The private key is known only by the certificate owner.
- The certificate includes a public key and other information such as the certificate holder and an expiration date.
- E-mail message content can be encrypted.
- The sender encrypts the message using the receiver's public key.
- The receiver decrypts the message using the private key. Because only the receiver has the private key, only that user can read the e-mail contents.
- Adding a digital signature to the e-mail message verifies that the message
came from the purported sender (proof of identity) and that the message has
arrived unaltered (data integrity).
- The digital signature is encrypted using the sender's private key.
- The receiver uses the sender's public key to decrypt the digital signature. Because only the sender knows the private key, this guarantees the message came from the sender.
- Obtain a certificate for each user.
- Use the Web enrollment feature or the MMC to request a certificate from the Windows Server 2003 certificate authority.
- Configure Active Directory with certificate autoenrollment. All users will be automatically given a certificate.
- Request a certificate from a third-party certificate authority.
- Enable S/MIME in the e-mail client application.
- For Outlook/POP3/IMAP4 clients, load the certificate into the client application.
- For Outlook Web Access, add the S/MIME control.
- Share and obtain public keys with other users. Users who will send you
encrypted e-mail must have your public key. You must have the public key for all
users to whom you will send encrypted or digitally signed e-mails.
- If you are using Active Directory autoenrollment, certificates will be added to the user accounts in Active Directory. When connecting through an Outlook client, the necessary public keys will automatically be retrieved for all recipients.
- Users and administrators can add certificates to Active Directory
recipients.
- Users who obtain a certificate from a third-part CA can use the Publish to GAL option in Outlook to add the certificate to their user account.
- Administrators can manually add certificates to recipients. For example, adding the certificate to a Contact object makes the certificate available through the Global Address List.
- For users who do not exist in Active Directory, or if you are using a POP3
client:
- Send each user your public key by sending a digitally signed message.
- Have each user send their public key by sending a digitally signed message. When you receive their message, add their certificate to your address book. Note: The certificate is only added to your personal address book, not the Global Address List.
- Add the certificate authorities to the Trusted Root Certification Authorities list on the local computer (when using POP3 or IMAP4) or the Exchange server (when using SMTP). This ensures that your computer trusts the certificate authority who issued the recipient's certificate.
Message Filtering Facts
Message filtering allows an organization to reduce the amount of unsolicited mail entering the organization by stopping the flow of messages at the mail server. Exchange supports the following types of filtering.
Filter Type Description Connection Filtering Connection filtering blocks messages based on the IP address of the SMTP server. - You can configure accept and deny lists of servers.
- You can configure a Realtime Block List (RBL). The RBL is a commercially available list of IP and IP subnet addresses of known junk mail sources.
- When using an RBL, you can allow exceptions to the block list.
- Using an RBL puts an additional load on the server.
Recipient Filtering Recipient filtering blocks Internet messages sent to specific recipients within the organization. This prevents certain recipients in the organization from receiving mail from the Internet. Sender Filtering Sender filtering blocks messages sent from a specific e-mail address. - You can block messages from a specific address or an entire domain.
- You can delete or archive blocked messages.
Intelligent Message Filtering Intelligent Message Filtering blocks messages that have specific words or phrases in the message. Intelligent Message Filtering is an add-on product to Exchange. - Intelligent Message Filtering assigns a number referred to as a Spam Confidence Level (SCL) based on the analysis of the content.
- Exchange uses the assigned number to determine whether to send the message to the recipient, send it to a junk mail folder, or delete the message.
Filtering settings are configured on an Organization-wide basis but enabled on individual virtual servers. To configure message filtering, complete the following steps:
- In the Global Settings, edit the Message Filtering properties to configure the filtering settings.
- For each virtual server, enable connection, recipient, and/or sender filtering.
Note: Exchange only applies filtering to mail that is received from external SMTP servers. It does not apply filtering to mail sent between Exchange servers in an organization.
Auditing Exchange Servers
Because Exchange uses Active Directory objects, you can use auditing in Active Directory for Exchange the same way you use it on regular servers. The table below describes the audit categories and events available through Active Directory.
Audit Category Trigger Event(s) Account logon Audits logon through a user account (users must log on to the company's domain to access their mailboxes)
Recorded by the local computer for the local account, recorded by domain controller for the AD accountAccount management Add, rename, disable/enable, delete, or change the password for a user account (creates entries when changes are made to Active Directory user objects) Directory service access Access an object that has its own system control access list (SACL) (includes mailboxes, folders, and messages in Exchange) Logon Log on or off of the local system
Make a network connection to a local computer
Writes entries to the security log only on the computer to which the user attempts access. For example, if a user is attempting to access a mailbox on an Exchange server, the Exchange server will record entries in its security log.Object access File, folder, printer access
Adds an entry to the security log on the server where the mailbox resides when a user accesses a mailboxPolicy change Change account password or logon settings, user rights, or audit policies (records entries whenever account policy configurations change) Privilege use User exercises user rights (records entries whenever user rights are enforced)
An administrator takes ownership of an objectProcess tracking Records entries whenever applications perform certain actions, such as loading objects into memory or creating new threads
This is used mainly for program debugging and trackingSystem events Shutdown, restart, service starts
An event affects security or the security log
To enable auditing for a domain member, edit the appropriate Group Policy Object and enable either Success or Failure auditing (or both). When enabling object access auditing, you must also access the Security tab of the object and enable auditing for the actions you want to track. You can enable auditing on specific Exchange objects by first enabling the Object Access policy, then using Exchange System Manager to access the Security tab for specific objects and enabling audit events for specific users. For example, you can set auditing to occur at any of the following levels:
- Administrative Group level
- Server level
- Storage Group level
- Store level
- Create public folder, create top level public folder, modify public folder ACL, modify public folder replica list
- Open mail send queue
- Administer information store, view information store status
- Receive As, Send As
- In Registry Editor (regedit), open the HKEY_CURRENT_USER | Software | Microsoft | Exchange | ExAdmin.
- Select Edit | New | DWORD Value. Use the following settings:
- Value Name = ShowSecurityPage
- Value = 1
- Close the Registry Editor. Exchange System Manager displays the results of the change immediately.
- In Exchange System Manager, open the properties dialog box of the object you wish to audit (i.e., the administrative group, the server, the storage group, or the mailbox store).
- Select the Security tab and click the Advanced button.
- Select the Auditing tab and click Add.
- Enter Everyone and click OK.
- In the Auditing entry for dialog box, select This object, sub-containers, and children objects in the Apply onto drop-down list.
- Select all the boxes for both Success and Failure in the Access List.
Server Management Tools
The following table identifies tools in Exchange Server 2003 and Windows Server 2003 that will help you with your management tasks.Tool | Description |
Event Viewer | When troubleshooting Exchange, one of first places to go is the Event
Viewer. Keep in mind the following regarding events:
|
Performance Monitor | Within Performance Monitor you can use the System Monitor to view real-time
Exchange server statistics. You can view this information in a chart, histogram
or report.
System Monitor uses performance objects (categories of information) and
counters (specific pieces of information) to track server statistics. When you
configure System Monitor, you identify the objects and counters you want to
track. The following list represents some of the key values you should
examine:
|
Use the Performance Logs and Alerts option to collect data over a period of time. This data is collected in log files. You can use this data to create a baseline of performance, forecast future needs and identify bottlenecks. You can also use Performance Logs and Alerts to send alerts based on thresholds (you can put the thresholds in counter logs). | |
Exchange System Manager | Enable diagnostic logging for a server in Exchange System Manager to send
Exchange event information to the Event Viewer.
|
Enable protocol logging for a virtual server to log information about the
operation of a protocol instance.
| |
Use the Message Tracking Center to view the flow of a message through the
Exchange system. When using message tracking:
| |
Use Monitoring and Status tools to monitor servers and connectors and to
create notifications for server processes and statuses.
| |
Beneath each server is a Queues folder. This folder holds messages that are
waiting to be delivered. Be aware of the following facts regarding queues:
| |
WinRoute | WinRoute is an additional tool that shows the link state table for Exchange. Use WinRoute to query a server and view its table, routing groups, connectors, master, address spaces, and member servers. |
Isinteg.exe | Isinteg is a command-line tool that analyzes and makes some repairs to the
Exchange databases. Use Isinteg for problems similar to the following:
|
Eseutil.exe | Eseutil is more powerful than Isinteg for repairing problems
in the database. When using Eseutil:
|
Microsoft Baseline Security Analyzer (MBSA) | You can use MBSA to analyze the security settings of your system according to Microsoft recommended security guidelines. MBSA finds security misconfigurations and missing security updates on a system. MBSA also offers specific guidance for correcting security problems. |
Establishing a Baseline
To ensure the optimization and availability of your server, the following maintenance should be done on a daily basis.- Review the Event Viewer for events with error or warning status.
- Use Performance Console to review the status of the disks, memory, network cards and processor for Exchange and Windows servers.
- Review the status of required services on the Exchange and Windows servers.
- Monitor failovers using the Cluster Administrator.
- Review the status of all queues.
- Ensure that there is an adequate amount of disk space, especially for the database and log files.
- Check the mdbdata directory for log files. If this directory has a large number of log files, it means that backups are not being performed properly.
- Check the contents of the Badmail directory. Badmail contains mail that could not be delivered locally. You can manually delete the contents of this directory or download a tool from Microsoft which cleans out the directory periodically. Note: With Exchange Server 2003 SP1, the Badmail directory is no longer used.
Counter | Description |
MSExchange IS Mailbox\Message Opens/sec | Identifies the rate of message open requests. |
MSExchangeIS Mailbox\Folder Opens/sec | Identifies the rate of folder open requests. |
MSExchangeIS Mailbox\Local Delivery Rate | Identifies the rate of message delivery. |
MSExchangeIS\ RPC Operations /sec | Identifies the rate of RPC operations. An unusually high number could result
in Outlook not being able to contact the Exchange server. On 4-processor systems, this value should be 0. |
MSExchangeIS\RPC Requests | Identifies the number of RPC requests currently being processed. This value should not exceed 100. |
PhysicalDisk(_Total)Disk Transfers/sec | Identifies disk utilization as a percentage. This value should be below 50. Higher values could indicate that the disk is becoming a bottleneck. |
Process(store)\% Processor Time | Identifies the percentage of time the processor spends on non-idle threads
for the store process. A value consistently over 75-80% indicates an overloaded processor. |
Processor(_Total)\% Processor Time | Identifies the percentage of time the processor spends on non-idle threads
(overall). A value consistently over 75-80% indicates an overloaded processor. |
SMTP Server\Local Queue Length | Identifies the number of messages waiting in the SMTP queue. |
SMTP Server\Messages Delivered/sec | Identifies the rate at which messages are delivered to local mailboxes. |
SMTP Server\Messages Received/sec | Identifies the rate at which messages are being received. |
SMTP Server\Messages Sent/sec | Identifies the rate at which messages are being sent. |
Optimization Facts
The following table covers important facts for optimizing the hardware components of your Exchange system.Component | Facts to Consider |
Memory |
|
CPU |
|
Disk | Because of Exchange's heavy database usage, disk I/O is usually the area
where bottlenecks will occur. Keep in mind the following facts regarding disk
storage:
|
Network | Keep in mind the following facts regarding your network hardware.
|
- Ensure that you have the current updates applied for your browsers, drivers, firmware, and other system components.
- Review how you use various machines in the system to determine if you can turn off services.
- Ensure that access to the global catalog server is readily available to all users especially in larger environments.
Troubleshooting Performance
The best way to troubleshoot problems is to prevent them from occurring. When you implement Exchange, it is important to correctly configure your systems to handle the projected load. Use the following tools to load test your current systems to determine if they can handle projected loads.Tool | Description |
Load Simulator (LoadSim) | LoadSim simulates the performance load of MAPI clients. LoadSim allows you
to determine whether your servers can handle the loads that you've planned for
them. However, LoadSim does not measure the following factors that may affect
server performance:
|
Exchange Stress and Performance (ESP) | ESP allows you to simulate several client sessions concurrently accessing
the Exchange servers in your system. ESP compensates for some of the factors
that LoadSim fails to evaluate. ESP simulates client sessions from the following
protocols or APIs:
|
Jetstress | Jetstress allows you to verify the performance of Exchange Server 2003 disk subsystems by simulating I/O operations from a specific number of users. You use Jetstress in conjunction with Performance Monitor, Event Viewer, and ESEUTIL to verify that the Exchange disk subsystem meets the performance criteria you establish for before deploying the system. |
Category | Counter | Threshold Value |
Disk | % Disk Time | Keep below 90% A high value may indicate a hard disk bottleneck. |
Avg. Disk Queue Length | Keep below 2 | |
Memory | Available Bytes | Keep above 4000 (4 MB) |
Pages/sec | Keep below 20 (5 is ideal) If it is over 10, the system may be doing a lot of disk thrashing. | |
Pool Page Bytes | If you are using the /3GB switch, this value should not be larger than 200 MB, except during backups when increases are normal. | |
Pool Nonpaged Bytes | If you are using the /3GB switch, this value should not be larger than 100 MB. | |
Free System Page Table Entries | Keep below 3,000 | |
Private Bytes | Any steady increases from the baseline indicate a possible memory leak. | |
MSExchangeIS | SMTP Server\Local Queue Length | Keep below 1,000 |
Mailbox\Send Queue Size | Should be less than 500 | |
RPC Requests | Keep below 30 | |
RPC Averaged Latency | Should be below 50 ms | |
Paging File | % Usage | Keep below 75% If high, adding more RAM might solve the problem. |
Physical Disk | % Disk Time | Should be below 50% |
Avg. Disk sec/Transfer | A high value might mean a full queue or disk failure | |
Disk Transfers/sec | Keep below 50% | |
Process Counters | % Processor Time | Keep below 75-80% |
Processor | % Privileged Time | Keep below 75% A high value typically indicates a failing device |
% Processor Time | Keep below 75-80% | |
% User time | Keep below 75% | |
Server Work Queues | Queue Length | Should be below 4 A high value indicates processor congestion |
- %TargetInstance.Name% variable indicates the name of the server or connector that triggered the notification.
- %TargetInstance.ServerStateString% indicates the type of alert, either warning or critical.
- %TargetInstance.ServicesStateString% reports the status of the services running on the server.
- %TargetInstance.CPUStateString% indicates the status of the server's CPU.
- %TargetInstance.QueuesStateString% indicates the status of the queues on the server.
- %TargetInstance.DisksStateString% reports the status of the server's hard drives.
- %TargetInstance.MemoryStateString% indicates the status of the server's virtual memory.
Cause | Solution |
High disk space usage | To isolate disk problems, you should examine the following five disk
subsystems:
|
High memory usage | To alleviate physical memory problems, remove unnecessary software from your
Exchange server and run your maintenance tasks when server use is low. While
Exchange Server 2003 can use up to 3 GB of memory (Store.exe can use up to 1.5
GB itself), Exchange's ExIFS kernel driver can also use up enough kernel memory
to cause sever performance problems. You can do the following to improve kernel
memory use:
|
Processor time conflicts | To alleviate processor conflicts, do the same things you would do for memory problems. Perform maintenance tasks (backups, particularly) outside of normal operating hours, and rather than having an Exchange server perform multiple roles (e.g., as a mail server and public folder server), offload tasks to dedicated servers. |
Storage Design Facts
The design of your storage system allows you to optimize the system and protect your data. An effective design strategy considers file location, protection level for the files, and the necessary hardware to support it. The table below identifies one way to structure the Exchange system to ensure optimization and fault tolerance.Drive | Contents | Recommended Configuration |
C:\ | Operating System | RAID 1 or RAID 5 |
D:\ | Pagefile | The pagefile should be on a different physical disk from the operating system. No special protection for the pagefile is required. |
E:\ | Transaction Logs | RAID 1 or if using a SAN system RAID 0+1 |
F:\ | Exchange Store Databases | RAID 5 |
- Separate the transaction logs and databases on even the smallest of systems for fault tolerance and performance.
- When using default logging, you can optimize your system by storing the
saved log files on a disk other than the one used to store the current (E00.log)
file.
- Place the current file on a fast disk to improve performance.
- Place saved log files on a large disk.
- If you have multiple storage groups, each group should have their own RAID 5 set.
- Use SAN/NAS solutions to increase performance and storage capabilities. Verify with the hardware vendor that the system is designed to work with Exchange Server 2003.
- Use a separate disk for the SMTP queue for increased performance.
- RAID 0+1 is becoming more common because it delivers better I/O performance and eliminates the need for a write-back cache.
Unit | Design Considerations |
Stores | By creating multiple stores, you divide the Exchange database into multiple
smaller databases. You might create multiple stores for the following reasons:
|
Storage Groups | With Exchange Server 2003, Microsoft recommends that you create a storage
group for each store until you have reached the maximum number of allowable
storage groups. Doing so:
|
Windows Clustering Facts
Windows Clustering is a service that increases the availability and fault tolerance of network servers. With clustering, servers are grouped together into a cluster, with all servers sharing storage resources. Clusters provide high availability by migrating services on failed servers to available servers in the cluster.- Failover is the process of moving services from a failed server to another available server.
- Failback is the process of moving those services back to the original server when it comes back online.
Notice that each server in the cluster has the following connections:
- A connection to the regular network. This connection is used by clients to communicate with servers in the cluster.
- A connection to a private network. This network allows the clusters to communicate with each other. This connection is used to detect new nodes and to coordinate failover.
- A fiber channel connection to shared disk storage. Shared disks used by
Windows Clustering:
- Must communicate using SCSI protocols. IDE, USB, or Firewire disks are not supported.
- Must be basic (not dynamic) disks.
- Must be formatted with NTFS.
Windows Clustering uses the following objects to control the clustering configuration and operation.
Object | Description |
Cluster | A cluster is a group of servers operating as one unit that share common storage resources. The cluster itself has a name and an IP address that identifies the cluster as a single administrative unit. |
Resource | Resources are physical or logical components that can be started or
stopped and which are managed by the cluster service. Common resources include:
|
Group | A group is a collection of resources that are managed as a single
unit. Often, resources within a group are dependent upon each other.
|
Virtual Server | A virtual server is a cluster group that identifies the set of
resources needed to run applications normally associated with a physical server.
The virtual server includes resources such as:
|
Node | A node is a server that is a member of a cluster.
|
Exchange Clustering Facts
To configure clustering for Exchange, you create Exchange Virtual Servers (EVS) in Cluster Administrator. An Exchange virtual server is a cluster group that has the Exchange System Attendant resource. These virtual servers then run on a physical Exchange server that is a cluster node. Each virtual server represents a different instance of Exchange server.Note: Configuring clustering for Exchange does not provide load balancing. In other words, multiple physical servers do not share the same IP address and run the same Exchange virtual server. Instead, each physical server runs a different virtual server. This means that client requests to a specific virtual server are directed only to the physical server that is currently running the Exchange virtual server. The advantage of clustering is that the cluster provides additional nodes in the cluster that can be used for failover in the event that an active node fails.
When you configure clustering for Exchange, you have two options for configuring the relationship between the clustered servers. The various configurations are defined by which servers run an instance of an Exchange virtual server.
Configuration | Description |
Active/Passive | In an active/passive configuration:
|
Active/Active | In an active/active configuration:
|
- An Advanced or Datacenter version of the Windows operating system:
- Windows 2000 Advanced Server supports up to 2 nodes
- Windows 2000 Datacenter Server supports up to 4 nodes
- Windows Server 2003 Enterprise Edition or Windows Server 2003 Datacenter Edition supports up to 8 nodes
- Microsoft Clustering Services
- Server nodes running the Cluster Service are required to be members of a domain.
- Exchange Server 2003 Enterprise Edition installed on each node in the cluster.
- Clustering is not supported on front-end servers. To provide fault-tolerance for front-end servers, use Network Load Balancing or some other service.
- When configuring a front-end server connected to a back-end cluster, make sure the HTTP virtual directories on the front-end server and the back-end cluster are identical.
- All servers in the cluster must be in the same administrative group and the same routing group.
- Microsoft recommends that each server has identical hardware.
- Microsoft recommends that clustered servers run only Exchange and not other services on the same system.
- You cannot configure clustering on Exchange servers running connectors (such as Lotus Notes, GroupWise, Active Directory Connectors, or Calendar Connectors), Site Replication Services (SRS), or NNTP. Note: NNTP is required to install Exchange. Following installation, it will not function on the clustered server.
Task | Permission Required |
Create an Exchange Server 2003 cluster | Member of local Administrators group member on each server node |
Create an Exchange Server 2003 virtual server | Exchange Full Administrator at the organizational level |
Create additional Exchange Server 2003 virtual servers | Exchange Full Administrator at the administrative group level of the server nodes |
- Install the operating system on each node.
- Create a cluster and add cluster nodes.
- For Windows 2000, you must manually install clustering. During the cluster installation, you will define the cluster or add each node to an existing cluster.
- For Windows 2003, clustering is installed during the operating system installation. Run the Cluster Administrator to create a new cluster and add each node to the cluster.
- Create a Microsoft Distributed Transaction Coordinator (MSDTC) resource for
Exchange Server 2003.
- It is recommended that you create a separate group in the cluster for this resource. Otherwise, you can create this resource in the Cluster Group group.
- On Windows 2000, you must install MSDTC on each cluster node. This installation also creates the resource in the cluster.
- On Windows 2003, use Cluster Administrator to create the resource. You do not need to install MSDTC on each node.
- Install Exchange Server 2003 on each node. The setup program detects that
clustering has been enabled and installs a cluster-aware version of Exchange.
- Install Exchange into the same directory location on each server.
- Do not install Exchange on more than one server at the same time.
- Note: If you install Exchange 2003 before configuring clustering, you must uninstall Exchange, configure clustering, then reinstall Exchange.
- Create one or more Exchange Virtual Servers (EVS). To define a virtual
server, create a cluster group and add the following resources:
Resource Description IP address Clients connect to the Exchange server using the IP address and name associated with the virtual server, not the server's physical IP address. Network name When you create the network name resource, you must identify the IP address resource as a dependency. Physical disk The shared physical disk used to store the Exchange database files. Microsoft Exchange System Attendant The Exchange System Attendant is the main service that runs Exchange. When you create the system attendant: - You must identify the Network name and Physical disk resources as dependencies.
- For the first system attendant resource in the cluster, you also identify the administrative group and routing group where the server resides.
- You specify the shared disk location for the database files.
- Create additional Exchange Virtual Servers for each active node in the
cluster. For example:
- For an active/passive configuration with two nodes, you will create a single virtual server.
- For an active/passive configuration with four nodes, you will create three virtual servers.
- For an active/active configuration, you will create two virtual servers.
- Fail one node. The passive node takes over for the failed node.
- Upgrade the failed node to Exchange Server 2003.
- Fail the original node back to the upgraded node.
- Repeat the process for each node in the cluster.
Managing Exchange Clusters
Listed below are several tasks you might need to complete as you manage clustered Exchange servers.Management Task | Description |
Exchange Virtual Server Preferred Owner | Each virtual server has a preferred owners list. Use this list to customize
how the cluster service identifies which physical server will be used to run the
Exchange virtual server.
|
Resource Possible Owners | Each resource has a possible owners list. This list identifies which servers
can own a resource.
|
Creating POP3 and IMAP4 Resources | When the System Attendant resource for a virtual server starts, it automatically creates resources for all corresponding services (such as SMTP) that are running on the Exchange server. If the POP3 or IMAP4 resources are not created automatically, start these services on the Exchange server, then restart the System Attendant service in Cluster Administrator. |
Failover | Failover is the process of moving a virtual server from a failed node
to another node.
|
Failback | Failback is the process of moving the virtual server back to the
original server following failover when the original server comes back online.
|
Performance Issues | Clustered Exchange servers have the following performance considerations:
|
Verifying Connectivity
If you are experiencing problems communicating with your Exchange server, one of the first places to start is to verify network connectivity. A good first test is to use Telnet to determine whether the server can be contacted and whether the SMTP service is running on the server. To use Telnet:- From a command prompt, type telnet.
- Open a session by typing open servername port. For example, type open mail1 25 to open a connection to the mail1 server using port 25 (the default SMTP port number).
- The HELO command opens a standard client SMTP session.
- The EHLO command opens an ESMTP session.
- The ETRN command requests that the server send any mail in its queue for the specified domain.
- The TURN command switches the communication roles, allowing the client to become the server without establishing a new session.
- The VRFY command verifies that a mailbox is available for message delivery.
- The QUIT command ends the session.
- Verifying the network path to the destination server. For example, you can use Ping or Tracert to verify that the server can be reached.
- Verifying that the SMTP service is running on the server and with the correct port.
- Verifying the TCP/IP configuration of the Exchange server such as the IP address, subnet mask, default gateway, and IP routing information. For example, you can use Ipconfig to view the current IP configuration of the server, or use NetDiag to verify IP connectivity including the TCP/IP configuration, verify that configured DNS or WINS servers can be contacted, show the routing table, or list available domain controllers,
- Making sure that there are not any firewall or other restrictions preventing communications.
Verifying Name Resolution
Name resolution is used by both clients and servers to contact mail servers for sending and receiving mail. If you have network connectivity between hosts, but cannot establish a session, the problem might be related to name resolution. The following table lists several methods used by clients or servers to locate mail servers.Method | Description |
Active Directory | Exchange servers within an organization use Active Directory to locate other Exchange servers. If the Active Directory configuration is not valid, Exchange servers will not be able to forward mail to the destination mailboxes. |
DNS Servers | Exchange servers can use DNS to locate external mail servers. In addition,
clients use DNS to connect to mail servers to retrieve mail. DNS uses the
following records for locating mail servers.
|
Smart Hosts | You can configure servers to use smart hosts instead of DNS servers when forwarding mail to external mail servers. All external mail is sent to the smart host. The smart host then uses DNS to locate the destination mail server. |
NetBIOS Name Resolution | Most clients use DNS to locate mail servers. However, Windows NT and 9x
clients might also use NetBIOS in some circumstances to find internal mail
servers. If legacy clients cannot locate mail servers, the problem might be due
to NetBIOS name resolution. Keep in mind the following facts about NetBIOS name
resolution:
|
Tool | Description |
Nslookup | Use Nslookup to test name resolution and retrieve DNS records.
|
Ipconfig | Use Ipconfig to perform automatic DNS name registration tasks:
|
Dcdiag | Use Dcdiag to perform several DNS-related features including:
|
Verifying Active Directory
Active Directory plays a major role in an Exchange 2003 organization including locating Exchange servers and identifying mail recipients. Issues related to Active Directory might include the inability to contact Exchange servers within the organization, delay or non-delivery of mail, or unsynchronized recipient information. Be aware of the following issues related to Active Directory.Issue | Description |
Global Catalog Servers | Global catalog servers are used for logon, for identifying group membership,
and during Global Address List (GAL) access. Keep in mind the following
recommendations for using global catalog servers:
|
Expansion Servers | An expansion server is an Exchange server that is responsible for resolving
recipient addresses, identifying members of distribution groups, and choosing
Exchange routing. By default, the first server to process mail is the expansion
server for that mail.
|
Recipient Update Service | The Recipient Update Service updates Active Directory objects with
Exchange-specific information. For example, when you mailbox enable a user, the
Recipient Update Service modifies the user account to add mailbox properties.
|
Active Directory Replication | Active Directory replication replicates data that exists in Active Directory
between domain controllers. Inaccessible objects or outdated information are two
common symptoms of Active Directory replication issues. Be aware of the
following issues that might be caused by Active Directory replication problems:
|
- Verifying connectivity with domain controllers.
- Verifying Active Directory replication status.
- Verifying the availability of the logon service.
- Performing DNS tests including DNS server connectivity and performing simple name resolution tests.
Backup Facts
Regular backups protect your system from database corruption, disk failure, and system failure. As you plan a backup strategy, you will need to make the following decisions:- Should I perform an online or offline backup?
- What data needs to be backed up?
- Which backup tool should I use?
- Which type of backup operation should I perform?
The following table differentiates online and offline backups.
Backup Type | Description |
Online backup | The backup is performed while the server is running and servicing clients. Online backup backs up the databases. Performance is impacted by the backup, but users will still be able to access the server and mail can still come into your Exchange server. |
Offline backup | The backup is performed when the database is dismounted and not available to clients. During an offline backup, the transaction logs written to the database are not purged and the database is not checked for corruption. |
Selecting the Data to Back Up
The type of data you choose to back up depends on the type of restore operations you expect to perform. The frequency with which you back up data also depends on the type of data that is being backed up. The following table lists three types of data that you can choose to back up.
Backup Data | Description |
Windows Backup Set | The Windows Backup Set includes all of the necessary information to restore
Windows, but does not include applications or application data. To create a
Windows Backup Set:
|
Full Computer Backup | A Full Computer Backup backs up the operating system, applications, and some
or most application data. To create a Full Computer Backup:
|
Exchange Data | When you back up Exchange data, you back up the database files on the
Exchange server. Keep in mind the following facts about backing up Exchange
data:
|
The following table lists several tools you can use to back up Exchange data.
Product | Description |
Windows Backup | Windows Backup is integrated with Exchange. Use Windows Backup to:
|
Mailbox Merge Wizard (Exmerge) | The Mailbox Merge Wizard is a Microsoft tool that extracts data from a
mailbox store.
|
Third-part tools | Use third-party tools to provide functionality not provided by Windows
Backup. For example, third-party tools use the Exchange APIs to extract data for
the following types of backups:
|
The following table identifies the types of backup with Windows Backup. The backup types you implement determine the type of data that is backed up and what is done with the Exchange log files.
Backup Type | Description | |
Full |
| |
Incremental |
| |
Differential |
| |
Copy |
|
Additional Backup Details
Keep in mind the following facts about working with Exchange backups:
- Backup scheduling occurs at the storage group level.
- In Windows Backup, the smallest unit you can back up and restore is the mailbox store. However, you should back up and restore an entire storage group together.
- A good way to determine if your backups have been running properly is to look at your log files. If your backups have been running properly, you will not have old log files.
- Circular logging can have an impact on backup. When circular logging flushes the log files, they are not available for backing up. This means that you cannot do a differential or an incremental backup of your data when you implement circular logging. When using circular logging, perform only full backups.
- Place transaction logs on a fault tolerant drive to ensure that the most current transaction logs can be salvaged. If the transaction logs are lost, the best restore you can perform is to restore from the last backup. Mail received since the last backup will be lost.
- Permissions required for backup are:
Task Minimum permissions Exchange backups Domain backup operator Exchange restore operations Full Exchange administrator Windows backups Local backup operator Windows restore operations Local administrator rights
Using VSS for Backup
Volume Shadow Copy Service (VSS) is a component of the backup system that takes a point-in-time snapshot of files on the disk. By enabling VSS, you can quickly back up and restore files.Note: While Exchange Server 2003 has a native VSS Writer, the Windows Server 2003 backup application does not have an Exchange-aware VSS Requestor. To use VSS with Exchange Server 2003, you must use a third-party backup application that is Exchange compliant.
An Exchange Server 2003 backup with Volume Shadow Copy services uses the following process:
- The backup program runs according to the established schedule.
- The backup program uses a VSS Requestor to command VSS to make a shadow copy of the designated Exchange Server 2003 storage group(s).
- To prepare to make the shadow copy, VSS communicates with the Exchange
Server 2003 Writer. Exchange Server 2003 performs the following actions:
- It prohibits administrative actions against the designated storage groups.
- It checks volume dependencies and prohibits write operations to database and transaction log files (but it does allow read-only access).
- VSS contacts the appropriate storage provider to make the shadow copy of the volume(s) that contain the Exchange Server 2003 storage group(s).
- After completing the shadow copy, VSS contacts the Exchange Server 2003 Writer and Exchange returns to its normal operational state.
- The VSS Requestor verifies the shadow copy before it confirms a successful backup operation to Exchange.
- You can only use VSS with Exchange Server 2003 running on Windows Server 2003.
- You can only back up an entire storage group, but you can restore an individual database.
- Shadow copy backups must be restored to the same drive and directory where the backup was made.
- You cannot restore a shadow copy backup to the Recovery storage group.
- Exchange suspends all operations during VSS backup/restore procedures. The Exchange Writer coordinates with the Exchange store to freeze and dismount the storage group prior to a backup/restore.
Exchange Recovery Methods
The following table lists several operations you can perform to retrieve lost data in Exchange Server 2003.Feature | Description |
Deleted Item Retention | When a user deletes a mail message from the Deleted Items folder, the
message is retained according to the Deleted Item Retention setting.
|
Mailbox Retention | When the administrator deletes a mailbox for a user, the mailbox is retained
according to the Mailbox Retention setting.
|
Restore the Mailbox Store | If you cannot recover deleted items or deleted mailboxes, you will need to
restore the mailbox store from your latest backup. Keep in mind the following
facts for restoring mailbox stores using Windows Backup:
|
Recovery Storage Group | Restoring a database overwrites any change made or messages sent since the
last backup. If you are restoring to recover a single mailbox or message, you
will not want to overwrite existing mailboxes. To restore individual mailboxes
or messages, you can use the Recovery Storage Group.
|
Recovery Forest and Server | A recovery server is a separate Exchange server that is used for restoring
mailbox stores. When using a recovery server, you configure a duplicate Exchange
organization. Data is restored to the duplicate organization, keeping your
original organization and data intact. When using a recovery server:
|
Restore from Backup Facts
If you cannot recover deleted items or deleted mailboxes, you will need to restore the mailbox store from your latest backup. Restoring mailboxes from backup consists of two processes:- Restore is the process of putting database and log files back into place on a server.
- Recovery is the process of replaying transaction logs into the
restored database. There are two types of recovery:
- Soft recovery occurs when transaction logs are replayed into a database that is re-mounted after an unexpected stop or into an offline file copy backup of a database.
- Hard recovery occurs when a transaction log is replayed into a database that has been restored from an online backup.
- You can only restore an entire storage group or selected mailbox stores. You cannot restore individual mailboxes or messages.
- Restoring a mailbox store overwrites any changes that have taken place since the last backup.
- Before restoring a mailbox store, select the This database can be
overwritten by a restore option on the required mailbox stores.
- If this setting is not selected, the restore will fail.
- You must select this option prior to performing each restore operation. For example, if you have one full backup and two incremental backups, you must enable this setting prior to all three restore operations.
- Be sure to restore the last full backup and any incremental or differential backups that were performed. You must run the full backup first to create the Restore.env file. Incremental and differential backups only update the Restore.env file; they do not create it. Incremental and differential backups cannot run without Restore.env.
- The Restore.env file contains the following information:
- The storage group the database belongs to
- The paths for the database files from the time they were backed up
- The path to the database from the time it was restored
- The log files that were restored
- When you perform a restore operation of an online backup of an Exchange database, the database is in an inconsistent state. To bring it to a consistent state, the system performs a hard recovery in which the Extensible Storage Engine (ESE) uses log and patch files to bring the database current to the time it was lost if all the files are available.
- When you restore the Exchange data, the backup software replays the transaction logs to restore the data that has been saved since the last time the transaction logs were deleted. During the backup, check the Last Backup Set check box to indicate that all backups have been performed. Windows Backup will then replay the log files after the last backup is restored.
- If you don't select Last Backup Set, you can run a hard recovery
manually using the following command:
eseutil /cc path to directory containing the Restore.env file
Note: If you fail to run a hard recovery, you will not be able to mount the database after the restore operation. - Transaction logs in a directory may be deleted when a full storage group is restored. Remember that transaction logs are shared between all mailbox stores in the storage group. For this reason, when you restore a single mailbox store, you could lose some data in other stores. If possible, restore all mailbox stores in a storage group.
- If you need to restore deleted Active Directory objects, perform an authoritative restore of those objects. An authoritative restore forces all domain controllers to use the restored data. A non-authoritative restore adds data to one domain controller, but the data might be overwritten by other domain controllers during Active Directory replication.
- Dismount the database you wish to restore.
- In the Backup utility, click the Restore tab.
- Select the objects you wish to restore. (Note: When you work with an online backup, you don't see the actual database files and log files in the Backup program; you only see the logical names of stores and transaction logs.)
- Select an option in the Restore files to list (by default, it is set to Original Location). Click Start Restore.
- Enter the server name in the Restore to box by browsing to it or typing it. Also, enter a path in the Temporary location for log and patch files box. This temporary location should be different from the location where log and patch files are permanently stored. Also, you should have a temporary location for each database you wish to restore so that the Restore.env files for each operation do not overwrite one another.
- After doing the full backup restore and all differential or incremental backup restores, select the Last Backup Set check box. This allows the system to perform a hard recovery. You can also select the Mount Database After Restore check box.
- Enter the full path and file name of the backup file you want to restore in the Restore from backup file box by browsing to the file or typing in the information. Click OK.
- Click OK when the restore process is complete.
Condition | Description |
Recover a storage group that is missing a database | Use the following command under this condition:
Eseutil /r enn /iThe /i switch tells the Eseutil command to ignore missing databases. After the restore operation, you'll have to mount the database, which will be empty. Restore the old database to the recovery group, and use ExMerge to combine the two databases. |
Recover a database "out of place" without affecting the other databases or the storage group's log files | To recover a database "out of place," move the database files you want to
recover and the transaction log files you want to replay to an empty folder
(this folder must not contain any other database files). Run the following
command from that location:
Eseutil /r enn /i /dThe /d switch with no path designation overrides the database path in the log files. Run from the location where you placed the database files, the database files on the server are protected from this recovery process. |
It is always best to restore from a backup, but the occasion may arise when this is not possible. In such a case, you can attempt a hard repair. The hard repair runs through the database to find errors in system tables, attachment tables, damaged database pages, among other things. As it fixes damage, the likelihood of data loss is extremely high, so you should run this only as a last resort. To run a hard repair, use the following process:
- Run Eseutil /p or Edbutil /d /r.
- Defragment the database by running Eseutil /d.
- Check the database consistency by running Isinteg -fix. Run the command until the summary report returns no errors.
Exchange Server Restore Facts
If the entire Exchange server fails and cannot be booted due to a hardware failure or configuration corruption, you can either restore or reinstall the server to correct the problem. The following table describes three methods you can use to recover from a failed server.Method | Description |
Restoring the Exchange Server | When you restore the Exchange server, you use existing backups to restore
the operating system, Exchange, and the data to the same system. Use the
following general process to restore the Exchange server:
|
Rebuilding the Exchange Server | When you rebuild a server, you reinstall a fresh copy of the operating
system and Exchange, but configure the computer as if it were the original
Exchange server. To rebuild the Exchange server:
|
Using a Standby Recovery Server | A standby recovery server is a partially-configured server with the exact
same hardware and with the operating system already installed. The process for
using a standby server is similar to the process of rebuilding the server,
except that the operating system is already installed. To rebuild using a
standby server:
|
- If possible, copy the Exchange data from the failed server. As the last step in the process, recopy the data to the restored or rebuilt server instead of restoring the data from backup. This gives you the latest version of the Exchange database.
- If restoring the Exchange server does not work (if the restored server is still unstable), try reinstalling the server. By reinstalling, you get clean installs of the operating system and Exchange.
- If the Exchange server is the only domain controller on your network, you will need to restore Active Directory before restoring or reinstalling Exchange. If the Exchange server is one of other domain controllers, make the server a domain controller prior to installing Exchange. Wait for Active Directory replication to replicate domain information to the restored server.
- If you install Exchange without the /disasterrecovery switch, information in Active Directory for that server will be deleted. Using the /disasterrecovery switch retrieves the configuration information for that server object and reapplies it to that Exchange server.
External System Migration Facts
Migration is the process of moving mailboxes, public folder, and other content from an external messaging system (such as GroupWise or Lotus Notes) to Exchange. Depending on the size and complexity of the migration, you might be able to perform the migration in a single step, possibly over a weekend, or you might need a period of time where Exchange co-exists with the other messaging system. The following table describes the general process for migration.Migration Type | Description |
Single-phase migration | In a single-phase migration, information from the external system is moved
all at once. Use a single-phase migration for small migrations that can be
performed quickly. To perform a single-phase migration:
|
Multi-phase migration | Use a multi-phase migration if the implementation is too large or too
complex to migrate all at once. During a multi-phase migration, you will have a
period of coexistence where Exchange must interact with the external messaging
system. To perform a multi-phase migration:
|
- Connectors used for migration are added during Exchange install. You can select the required connectors during install, or rerun the installation to add the connector.
- Use the Calendar Connector to synchronize GroupWise and Lotus Notes Calendars with Exchange.
- When migrating from Novell GroupWise:
- The Exchange connector only supports GroupWise 4.x and 5.x. For GroupWise 6.x, use third-party migration tools.
- The Exchange server must have the Novell Client and the GroupWise Client installed. This allows the Exchange server to connect to the Novell system.
- The NetWare server must have the Novell GroupWise API Gateway installed and configured to connect with Exchange.
- When migrating from Lotus Domino:
- On the Lotus Notes system,
- Create a user ID (user account) that will be used by the Exchange connector.
- Grant the Lotus user the appropriate permissions in Lotus to access mailboxes. You can have each Lotus user grant the administrator account access to the mailbox, or create a link to the Lotus database.
- Identify Exchange as a foreign system.
- The Exchange server must have the Lotus Notes Client installed and be running the Lotus Notes Connector.
- Configure the Lotus Notes Connector with the server name, Notes INI file location, connector mailbox, and Notes or SMTP address space.
- Before performing the migration, stop the Lotus Connector. This prevents the connector from deleting user accounts on both systems during the migration.
- On the Lotus Notes system,
- For systems without a special connector, configure a regular SMTP or X.400 connector to establish communication. You will have to manually synchronize the directories on each system. For example, you can use the Exchange Migration Wizard to use LDAP to extract the data from the other system.
- When using the Migration Wizard or connectors, be aware that not all data from the other systems can be migrated automatically. In most cases, you will need to manually create items on Exchange that provide the same functionality as non-migratable objects on the other system.
Upgrading to Exchange 2003
Keep in mind the following facts about upgrading to Exchange 2003:- You can upgrade directly from Exchange 2000 to Exchange 2003 in the
following ways:
- Perform an in-place upgrade by running the Exchange 2003 setup program on the Exchange 2000 server.
- Perform a migration by installing Exchange 2003 on a new server, then moving mailboxes and public folders from the other Exchange server to the new server.
- There is not an in-place upgrade method for upgrading from Exchange 5.5 to Exchange 2003. In this case, you will have to perform a migration. Migration from Exchange 5.5 is more complex than migrating from Exchange 2000.
- The Exchange 2000 server must have service pack 3 (SP3) installed prior to the upgrade.
- Exchange Server 2003 must be the same language version as Exchange 2000 Server.
- You must upgrade any ADCs (Active Directory Connectors) to Exchange Server 2003 before upgrading the Exchange 2000 servers.
- Certain services or features of Exchange Server 2003 do not function the
same if the system was upgraded versus a new hardware installation.
- On a new install, IMAP, POP3, and NNTP virtual servers are disabled. With an upgrade, the virtual servers are enabled if they are enabled on the original system.
- If any of the following components are installed and still required on the
Exchange 2000 Server computer you are going to upgrade, you must first move them
to other severs and then remove them from the server being upgraded.
- Instant Messaging Service
- Microsoft Chat Server
- Key Management Service
- Microsoft Exchange Connector for Lotus cc:Mail
- Microsoft Mail Connector
- Mobile Information Server Exchange 2000 Event Source component
- To select any additional components or customize the installation, wait until Setup completes and then run it again, adding components or customizing as necessary.
- You must upgrade the front-end server before upgrading the corresponding back-end servers.
Exchange 5.5 Migration Facts
Because Exchange 5.5 does not support a direct upgrade to Exchange Server 2003, if you want to move from Exchange 5.5 to Exchange Server 2003, you will need to perform a migration. In addition, you can configure Exchange Server 2003 to coexist with an Exchange 5.5 implementation.Note: You can perform an in-place upgrade of Exchange 5.5 to Exchange 2000, and then an in-place upgrade from Exchange 2000 to Exchange 2003. However, the processes outlined here are the preferred methods for migrating from Exchange 5.5 to Exchange 2003.
The following table lists the migration methods.
Migration Type | Description |
Intra-organization (standard) migration | With an intra-organization migration, you add one or more Exchange Server
2003 servers to the existing Exchange 5.5 organization. During the migration,
Exchange 5.5 and Exchange Server 2003 coexist in the same organization. To
perform an intra-organization migration, complete the following steps:
|
Inter-organization (external) migration | With an inter-organization migration, you create a new organization for the
Exchange 2003 structure and migrate data from the Exchange 5.5 organization. To
perform an inter-organization migration, complete the following steps:
|
Long-term coexistence | You can have long-term coexistence between Exchange 5.5 and Exchange Server 2003. Simply perform the migration steps outlined above for either inter- or intra-organization migration. Move data from Exchange 5.5 to Exchange Server 2003 if desired, keeping necessary Exchange 5.5 servers intact. Note: For long-term coexistence, you will need to install an Active Directory Connector to synchronize data between the Exchange 5.5 servers and Active Directory. |
Tool | Use to... |
Active Directory Migration Tool (ADMT) | Use ADMT to clone (copy) NT 4 data into Active Directory. Note: You do not need to use ADMT when upgrading an NT 4 domain to Active Directory. |
Exchange Tasks Wizard | Use the Exchange Tasks Wizard during an intra-organization migration to move mailboxes from an Exchange 5.5 server to an Exchange Server 2003 server. |
Exchange Server Migration Wizard | Use the Migration Wizard during an inter-organization migration to export Exchange data from the Exchange 5.5 organization to Exchange 2003. Note: The Exchange Server Migration Wizard only moves mailboxes. It does not export distribution lists, custom recipients, or public folders. |
Active Directory Connector (ADC) Tools | Install the Active Directory Connector (ADC) Tools prior to performing either migration. Configure an Active Directory Connector during the migration to establish communication between Exchange 5.5 and Exchange Server 2003 for coexistence. Configure an ADC to migrate distribution list, custom recipient, and public folder data from Exchange 5.5. |
Object Rehome Tool | Download the object rehome tool from Microsoft to update distribution list and custom recipient distinguished names. |
Sidhist.vbs | Run Sidhist.vbs following the migration to remove the SIDHistory attributes for objects in Active Directory. |
PFMigrate | Use PFMigrate to rehome public folders. |
- You cannot install Exchange Server 2003 on the same server that is running Exchange 5.5.
- Before the migration, Active Directory must be running on Windows 2000 Server SP3 (or higher) or Windows Server 2003.
- You must have at least one Exchange 5.5 server running SP3 (or higher) in each Exchange 5.5 site.
- When running the Server Migration Wizard, choose to migrate security
identifiers (SIDs).
- SIDs are used to match mailboxes to new accounts and to convert these accounts to mailbox-enabled user accounts.
- SID migration uses the SIDHistory attribute in Active Directory. To preserve SID history during user account migration, Active Directory must be running in Windows 2000 native mode or higher.
- If SID history is not preserved, or if the mailbox cannot be matched to an existing user account, the wizard creates a disabled user account and associates it with the mailbox.
- Run the Server Migration Wizard in clone mode to preserve the offline folder store file in Outlook.
- The Exchange Server Migration Wizard does not migrate public folders, distribution lists, or custom recipients. Use an ADC to synchronize this information with Exchange 2003.
- Using the Migration Wizard, you can perform a two-step migration: export Exchange 5.5 data to .pst files, then import that file later into the Exchange 2003 organization.
- In Exchange 5.5, you can have multiple mailboxes per user account. However, in Exchange Server 2003, you can only have a single primary mailbox for each user. Prior to the migration, use the Resource Mailbox Wizard in the ADC Tools to exclude these duplicate mailboxes from being matched to existing users.
- You must create a connection agreement between each Exchange 5.5 site and Active Directory.
- Install an Exchange Server 2003 server into the organization.
- Move mailboxes and public folders from the Exchange 2000 server.
- Decommission the Exchange 2000 server.
ADC Facts
An Active Directory Connector (ADC) establishes communication between an Exchange 5.5 site and Active Directory. Use an Active Directory Connector to transfer recipient information to Active Directory during a migration or to establish coexistence between Exchange 5.5 and Exchange Server 2003.When you create an Active Directory Connector, you establish a connection agreement. Connection agreements are the links between the recipient containers in Exchange 5.5 and the OUs in Active Directory. You must create a connection agreement between each Exchange 5.5 site and Active Directory. Connection agreements can be one of three types:
- In a one way agreement from Exchange 5.5 to the organization unit, the recipients are cloned and synchronized in the organizational unit.
- In a one way agreement from the organization unit to Exchange 5.5, the recipients from the organizational unit are cloned and synchronized in Exchange 5.5.
- A two-way replication agreement means that the replication is going both ways.
When configuring a connection agreement, you specify the objects that will be synchronized by defining the agreement type. The following table describes the agreement types.
Agreement Type | Use to |
Recipient Connection Agreement | Create a recipient agreement to synchronize for mailboxes, distribution
lists, and custom recipients. You can choose the types of information to
synchronize.
|
Public Folder Connection Agreement | Create a public folder agreement to replicate public folder information in Active Directory. Public folder agreements are automatically two-way with deletion enabled. These settings cannot be changed. Note: Access to public folders in Exchange 5.5 is controlled through distribution lists. When you synchronize data with Active Directory, distribution lists are synchronized to universal distribution groups. When a public folder is first accessed, Active Directory converts the distribution group to a security group. However, this conversion will fail if Active Directory is running in Windows 2000 mixed mode because mixed mode does not support universal security groups. To prevent this problem and ensure proper functioning of public folder access, ensure that Active Directory is running in Windows 2000 native mode or is at a Windows Server 2003 functional level. |
Configuration Connection Agreement | The configuration agreement is created automatically when you install an Exchange Server 2003 server into the site. The configuration connection agreement allows the configuration information to be shared between Exchange 5.5 and Exchange 2003. Also at the time of the Exchange 2003 installation a site replication service (SRS) is created in the Exchange 2003 Administrative Console. The SRS maintains its own database for replication with Exchange 5.5. |
Tool | Description |
Tool Settings | Modify the tool settings to identify the Exchange 5.5 server you will connect to. |
Data Collection | Run data collection to analyze the Exchange 5.5 organization. You must have proper permissions on the Exchange 5.5 site before collecting data. If this process does not complete, you will be unable to use the remaining wizards. |
Resource Mailbox Wizard | Run the Resource Mailbox Wizard to prepare mailboxes in Exchange 5.5 for
migration.
|
Connection Agreement Wizard | Use the Connection Agreement Wizard to help you establish connection agreements between Exchange 5.5 and Active Directory. Click the Verify button to check Active Directory synchronization with the Exchange 5.5 site. |
Coexistence Methods
Long-term coexistence is essentially a migration without end, where at least part of the external system continues to function and is not decommissioned. Continued coexistence requires that you maintain multiple systems and may also require users to use multiple client applications. Although not the optimal choice, long-term coexistence might be required to support legacy applications or because of administrative policies at your organization.The process for establishing coexistence is similar to the process used to migrate from one system to another, but without the moving of resources and decommissioning of servers. Configuring coexistence typically involves the following processes:
- Establish connectivity between the two systems
- Synchronize recipient databases
- Synchronize calendaring information
When you establish connectivity between systems, you typically create a trusted means of communication that allows the two systems to exchange information beyond the simple sending and receiving of mail that happens between two mail servers on the Internet. In most cases, the connectivity must be bi-directional to allow the proper flow of information.
In Exchange, connectivity between systems is configured through a connector.
Connector Type | Description |
Active Directory Connector | An Active Directory Connector (ADC) is used to establish connectivity between an Exchange 5.5 system and Active Directory. If you have Exchange 5.5 servers within your organization, you will need an Active Directory Connector to provide synchronization between the Exchange 5.5 database and Active Directory. |
System-specific Connectors | Use mail system-specific connectors, such as X.400 connectors, Connector for Lotus Notes, or Connector for Novell GroupWise to establish connectivity with these systems. The Lotus and GroupWise connectors also include features that enable directory synchronization. |
SMTP connector | Because all modern messaging systems use SMTP, you can use an SMTP connector
to establish connectivity to other systems for which there is not a specific
connector. For example, you use an SMTP connector to connect to all generic mail
servers on the Internet.
When you configure an SMTP connector for coexistence with other systems, you
will typically configure the following settings:
|
Synchronizing Recipient Databases
Synchronizing databases involves duplicating data that exists in one mail system into the directory or database of the other system. Depending on the implementation, this could be either a one-way or a two-way synchronization. For example, you might retrieve user account information from one directory and create corresponding contact objects in Active Directory, thereby making information about external recipients available in the Global Address List. (and the other way around).
Directory synchronization can be performed in one of the following ways:
- Automatic synchronization uses specialized tools to retrieve data from other systems. When changes are made, those changes are updated in the other directory system automatically.
- Manual synchronization must be done by adding information directly into Active Directory (such as creating contacts), or using tools to export and then import the data. With a manual method, a big concern is out of data (unsynchronized) information.
- Semi-automatic synchronization uses special scripts or programming tools to export and import information. The import/export process must be manually initiated or scheduled to run periodically.
Tool | Description |
Connectors | Custom connectors (such as the Lotus Notes or Novell GroupWise connector) provide automatic directory synchronization. Synchronizing the directories is as simple as installing and configuring the appropriate connector. |
Microsoft Identity Integration Server (MIIS) | The Microsoft Identity Integration Server (MIIS) (previously called Microsoft Metadirectory Services (MMS)) is an automatic directory synchronization tool that can be used with a wide variety of directories. For Exchange, you can use the GAL management agent to pull information from the other directory and automatically create users, groups, and contacts that will appear in the Global Address List. MIIS also keeps object configuration information synchronized. Changes made in one system are automatically populated to the other system. |
Exchange Server Migration Wizard | The Exchange Server Migration Wizard gives you a manual method of exporting
and importing directory information. When you run the wizard, you specify the
type of system you want to connect to, supply the necessary credentials, and the
wizard then extracts relevant information from the other database system. You
can then use the wizard to import the data into Active Directory.
Directories supported by the Migration Wizard include:
|
Csvde, Ldifde | Use Csvde or Ldifde to perform manual export and import of directory data. |
Scripting and Programming APIs | You can build a custom database synchronization solution using programming tools and accessing the necessary Windows APIs or other programming interfaces to extract data, import data, and periodically refresh data. |
Synchronizing Calendars
Calendar synchronization allows users of different systems to schedule meetings and check availability for other users. Calendar synchronization is done separately from recipient database synchronization. You can use the following methods for calendar synchronization:
Method | Description |
Calendar Connector | The Exchange Calendar Connector provides calendar synchronization with supported calendaring systems such as those used by Lotus Notes or Novell GroupWise. The Calendar Connector works by retrieving calendaring information from the other system and putting it into a hidden public folder called SCHEDULE+ FREE BUSY. This folder is used by the Outlook client to find schedule and availability information. |
Outlook Internet Free/Busy (IFB) Publishing | Using Outlook, you can publish your calendar information to a shared public
folder. Users of other systems can then view this information through the public
folder. When using Free/Busy publishing:
|
Custom Solution | You can also provide others with access to your calendar information using a custom Web publishing or scripting solution. With this method, you develop tools that pull calendar information from the SCHEDULE+ FREE BUSY folder and make it available through a Web page or other application. |
Coexisting with Other Systems
The exact methods you use to establish connectivity and directory synchronization depends on the type of mail system that you need to integrate with. The following table describes the processes for coexistence with various systems.Method | Description |
Coexistence with Exchange 5.5 in the Same Organization | To coexist with an Exchange 5.5 organization, perform the first several steps of an intra-organization migration. Add Active Directory to the network, add an Active Directory Connector (ADC) to synchronize the Exchange 5.5 data with Active Directory, and install Exchange 2003 servers into the Exchange 5.5 organization. |
Coexistence with Other Exchange Organizations | All Exchange servers in the same forest are in the same Exchange
organization. If your network has multiple forests because of business
requirements or security requirements, you might also need multiple Exchange
organizations. Use the following methods to enable cross-forest coexistence:
Dedicated Exchange Forest |
Coexistence with Lotus or Novell Mail Systems | To provide long-term coexistence with Lotus Notes or Novell GroupWise, use the corresponding connector objects to establish connectivity, directory synchronization, and calendar synchronization. Note: For full synchronization, you must use both the mail-specific connector and the calendar connector. For example, to coexist with a Novell GroupWise system, add the Connector for Novell GroupWise and the Calendar Connector. Note: When coexisting with Lotus Notes, use an Exchange server to handle inbound mail from the Internet. If inbound mail goes first to the Lotus Notes server and then to Exchange, an additional domain will be appended to the return addresses from the Internet. |
Coexistence with POP3 Mail Servers |
You can configure your Exchange server to forward mail to a POP3 server that
holds e-mail accounts for your users. You might need to establish coexistence
during a period of migration from a POP3 server to Exchange, or to enable users
of one department to continue using a POP3 server that is already configured.
The following links describe two ways to establish coexistence with a Microsoft
POP3 server.Coexistence with a Different Domain |
Coexistence with Other Systems | To establish coexistence with all other systems, use the following process.
|
Removing an Exchange Server
To remove an Exchange server, use the Exchange setup program. Before running setup to remove Exchange, take the following actions:- Move all mailboxes on the server to another server.
- Replicate all public folders to other servers. Remove public folder replicas from the server.
- Rehome any Offline Address Book folders and the Schedule+ Free Busy folder to other servers.
- If the server is the routing group master for a routing group that has other servers, move the master to another server. Be aware that the first server installed into a routing group is designated as the master.
- Rehome the Recipient Update Service. By default, the first Exchange server installed hosts the recipient update service. Move this service to another server.
- Create another Site Replication Service instance on another server. The Site Replication Service is used in a mixed Exchange 5.5/2000 or 2003 environment.
- Remove the server as a bridgehead server for any connectors.
- Exchange Full Administrator permissions to the administrative group where the server exists.
- Exchange Full Administrator permissions to the administrative group that holds the routing group where the server exists.
- Exchange Full Administrator to the organization and local computer Administrator role to uninstall the last Exchange server in the organization.
No comments:
Post a Comment