HAPPY BOOKSGIVING
Use code BOOKSGIVING during checkout to save 40%-55% on books and eBooks. Shop now.
Register your product to gain access to bonus material or receive a coupon.
Microsoft Exchange Server 2010 Unleashed is the ultimate guide to designing, deploying, managing, troubleshooting, and supporting any Exchange Server 2010 environment, no matter how large or complex.
Drawing on their extensive experience with hundreds of enterprise Exchange Server environments--including Exchange Server 2010 early adopters--the authors thoroughly cover every stage of the Exchange Server 2010 lifecycle. They present detailed recommendations, proven tips and tricks, and step-by-step techniques for implementation and migration planning, architecture, installation, administration, security, monitoring, integration, availability, optimization, and much more.
Rand Morimoto and his expert colleagues also offer indispensable practical guidance for making the most of Microsoft Exchange Server 2010’s many enhancements--from its improved web access to its enhanced support for Unified Communications and Mobility.
Understanding Core Exchange Server 2010 Design Plans
Download the sample pages (includes Chapter 3 and Index)
Introduction 1
Part I: Microsoft Exchange Server 2010 Overview
1 Exchange Server 2010 Technology Primer 5
What Is Exchange Server 2010? 5
What’s New in Exchange Server 2010? 13
Understanding Exchange Server 2010 Server Roles and Mail Flow 26
Understanding the Importance of Active Directory for an Exchange Server 2010 Environment 31
Installing and Migrating to Exchange Server 2010 32
Managing and Administering Exchange Server 2010 33
Summary 34
Best Practices 34
2 Planning, Prototyping, Migrating, and Deploying Exchange Server 2010 37
Initiation, Planning, Testing, and Pilot: The Four Phases to the Upgrade 38
Initiation Phase: Defining the Scope and Goals 40
Initiation Phase: Creating the Statement of Work 46
Planning Phase: Discovery 51
Planning Phase: Creating the Design Document 53
Creating the Migration Document 57
The Prototype Phase 62
The Pilot Phase: Deploying Services to a Limited Number of Users 65
The Production Migration/Upgrade 67
Summary 68
Best Practices 69
Part II: Planning and Designing an Exchange Server 2010 Environment
3 Understanding Core Exchange Server 2010 Design Plans 71
Planning for Exchange Server 2010 71
Understanding AD Design Concepts for Exchange Server 2010 76
Determining Exchange Server 2010 Placement 80
Configuring Exchange Server 2010 for Maximum Performance and Reliability 83
Securing and Maintaining an Exchange Server 2010 Implementation 86
Summary 87
Best Practices 87
4 Architecting an Enterprise-Level Exchange Server Environment 89
Designing Active Directory for Exchange Server 2010 89
Determining Hardware and Software Components 92
Designing Exchange Server Roles in an Exchange Server Environment 93
Designing Exchange Server Infrastructure 97
Integrating Client Access into Exchange Server 2010 Design 99
Summary 100
Best Practices 101
5 Integrating Exchange Server 2010 in a Non-Windows Environment 103
Synchronizing Directory Information with Forefront Identity Manager (FIM) 104
Managing Identity Information Between LDAP Directories and Exchange Server 2010 109
Using Services for UNIX to Integrate UNIX Systems with an Active Directory/Exchange Server 2010 Environment 111
Understanding the Identity Management for UNIX Components 118
Administrative Improvements with Windows Server 2008 121
Summary 122
Best Practices 123
6 Understanding Network Services and Active Directory Domain Controller Placement for Exchange Server 2010 125
Domain Name System and Its Role in Exchange Server 2010 125
Outlining the Types of DNS Servers 128
Examining DNS Components 129
Using DNS to Route SMTP Mail in Exchange Server 2010 137
Understanding DNS Requirements for Exchange Server 2010 138
Configuring DNS to Support Exchange Servers 144
Troubleshooting DNS Problems 144
Global Catalog and Domain Controller Placement 148
Examining the Role of Domain Controllers in AD 150
Defining the Global Catalog 152
Exploring DSAccess, DSProxy, and the Categorizer 159
Understanding AD Functionality Modes and Their Relationship to Exchange Server Groups 163
Summary 166
Best Practices 167
Part III: Implementing Exchange Server 2010 Services
7 Installing Exchange Server 2010 169
Understanding the Exchange Server 2010 Server Roles 170
Understanding the Prerequisites for Exchange Server 2010 171
Understanding High Availability and Site Resilience in Exchange Server 2010 174
Exchange Server 2010 Hardware Requirements 175
Understanding the Active Directory Requirements for Exchange Server 2010 176
Understanding Role Based Access Control 186
Planning Your Exchange Server 2010 Installation 188
Deploying Active Directory from Scratch 190
Preparing Your Environment for Exchange Server 2010 199
Installing Exchange Server 2010 206
Finalizing the Deployment 209
Summary 210
Best Practices 211
8 Implementing Edge Services for an Exchange 2010 Environment 213
Installing and Configuring the Edge Transport Server Components 214
Utilizing the Basic Sender and Recipient Connection Filters 222
Utilizing SenderID on an Edge Transport Server 231
Using Content Filtering to Isolate Inappropriate Content 237
Fine-Tuning Content Filtering 243
Using Content Filtering to Allow and Reject Domain-Level Content 245
Filtering Content in a Message Attachment 247
Using Sender/IP Reputation to Filter Content 250
Using Address Rewriting to Standardize on Domain Address Naming for an Organization 252
Using EdgeSync to Synchronize Active Directory Information to the Edge Transport Server 255
Implementing Safelist Aggregation for Outlook 2003 and Outlook 2007 259
Managing and Maintaining an Edge Transport Server 261
Forefront Online Security for Exchange Server 2010 265
Summary 266
Best Practices 266
9 Using Windows PowerShell in an Exchange Server 2010 Environment 269
What Is Windows PowerShell 269
Introducing the Exchange Management Shell 272
Understanding the Exchange Server Task Model 275
Starting the Exchange Management Shell 276
More on How PowerShell and EMS Work Together 280
Understanding the EMS Syntax 281
Creating Your Own Scripts 285
Managing Cmdlets 288
Introducing the Windows PowerShell Command Log 289
Using EMS to Do Administrative Mailbox Tasks 290
Using EMS to Do Reporting 295
Finding Other Resources 297
Summary 298
Best Practices 298
Part IV: Securing an Exchange Server 2010 Environment
10 Client-Level Secured Messaging 301
Microsoft’s Trustworthy Computing Initiative 301
Securing Your Windows Environment 302
Exchange Server 2010 Client-Level Security Enhancements 311
Securing Outlook 2007 312
Protecting Against Spam 317
Securing Outlook Web App 322
Summary 324
Best Practices 325
11 Server and Transport-Level Security 327
Considering the Importance of Security in an Exchange Server 2010Environment 327
Components of a Secure Messaging Environment 331
Exchange Server-Level Security Features 344
Transport-Level Security Defined 350
Exchange Server 2010 SMTP Connectors 352
Edge Transport Server Connectors 359
Securing Windows for the Edge Transport Server Role 364
Summary 366
Best Practices 366
12 Integrating Certificate-Based Public Key Infrastructure (PKI) in Exchange Server 2010 369
Understanding Public Key Infrastructure 370
Installing a Windows Certification Authority Server 376
Server Certificates in Exchange Server 2010 378
Implementing Secured Email Communications with Exchange Server 2010 383
Using Outlook to Send and Receive Digitally Signed and Encrypted Emails 388
Summary 394
Best Practices 394
13 Securing Exchange Server 2010 with ISA Server 397
Understanding the Internet Security and Acceleration (ISA) Server 2006 398
Outlining the Need for ISA Server 2006 in Exchange Server Environments 398
Outlining the Inherent Threat in Exchange Server HTTP Traffic 401
Securing Exchange Outlook Web App with ISA Server 2006 403
Securing POP and IMAP Exchange Server Traffic 412
Managing and Controlling Simple Mail Transfer Protocol (SMTP) Traffic 414
Logging ISA Traffic 417
Monitoring ISA from the ISA Console 420
Summary 425
Best Practices 425
14 Understanding Exchange Policy Enforcement Security 427
What Is Exchange Policy Management in Exchange Server 2010 428
Understanding Relevant Governmental Regulations for Policy Enforcement 428
Using Transport Agents in Exchange Server 2010 439
Understanding the Hub Role Transport Agents in Exchange Server 2010 440
Implementing Transport Agent Policies on the Edge 446
Creating Messaging Records Management Policies 448
Summary 453
Best Practices 453
Part V: Migrations and Coexistence with Exchange Server 2010
15 Migrating from Active Directory 2000/2003 to Active Directory 2008 455
Understanding What Needs to Be Migrated to Windows Server 2008 455
Understanding the Benefits to Upgrading Active Directory 458
Beginning the Migration Process 460
Big Bang Migration 463
Phased Migration 467
Multiple Domain Consolidation Migration 479
Summary 489
Best Practices 490
16 Transitioning from Exchange Server 2003/2007 to Exchange Server 2010 491
High-Level Guide for Transition from Exchange Server 2003 to Exchange Server 2010 492
High-Level Guide for Transition from Exchange Server 2007 to Exchange Server 2010 493
Understanding How to Transition to Exchange Server 2010 494
Understanding What’s New and What’s Different with Exchange Server 2010 497
Deploying a Prototype Lab for the Exchange Server 2010 Transition Process 502
Transitioning to a Brand-New Exchange Server 2010 Environment 504
Transitioning from Exchange Server 2003 to Exchange Server 2010 505
Transitioning from Exchange Server 2007 to Exchange Server 2010 520
Summary 521
Best Practices 521
17 Implementing Client Access and Hub Transport Servers 523
Understanding the Client Access Server 524
Installing the Client Access Server 544
Understanding the Hub Transport Server 546
Transport Pipeline 550
Installing the Hub Transport Server 553
Test Cmdlets for CAS and Hub Transport Servers 555
Summary 561
Best Practices 561
Part VI: Exchange Server 2010 Administration and Management
18 Administering an Exchange Server 2010 Environment 563
Introduction to Role Based Access Control 563
Administrative Tools 570
Performing Common Tasks 584
Recipient Configuration 604
Understanding Journaling 611
Understanding Archiving 616
Using the Exchange Server 2010 Toolbox 618
Exchange Server Coexistence 627
Server Administration 628
Summary 631
Best Practices 632
19 Exchange Server 2010 Management and Maintenance Practices 633
Proper Care and Feeding of Exchange Server 2010 633
Maintenance Tools for Exchange Server 2010 636
The Exchange Control Panel 640
Auditing the Environment 647
Best Practices for Performing Database Maintenance 656
Prioritizing and Scheduling Maintenance Best Practices 658
Post-Maintenance Procedures 663
Reducing Management and Maintenance Efforts 664
Summary 665
Best Practices 665
20 Using Operations Manager to Monitor Exchange Server 2010 667
OpsMgr Exchange Server 2010 Monitoring 668
What’s New in OpsMgr R2 670
Explaining How OpsMgr Works 671
Outlining OpsMgr Architecture 674
Understanding How to Use OpsMgr 677
Understanding OpsMgr Component Requirements 680
Understanding Advanced OpsMgr Concepts 681
Securing OpsMgr 686
Installing Operations Manager 2007 R2 689
Installing Edge Transport Monitoring Certificates 697
Summary 703
Best Practices 704
21 Remote Administration of Exchange Server 2010 Servers 705
Certificates, Trust, and Remote Administration 706
Using the Exchange Management Console Remotely 707
Using the Remote Exchange Management Shell 707
Using the ECP Remotely 710
RDP with Exchange Server 2010 710
Summary 724
Best Practices 725
22 Documenting an Exchange Server 2010 Environment 727
Benefits of Documentation 728
Exchange Server 2010 Project Documentation 730
Exchange Server 2010 Environment Documentation 741
Exchange Server 2010 Administration and Maintenance Documents 744
Disaster Recovery Documentation 747
Performance Documentation 749
Security Documentation 750
Training Documentation 752
Summary 752
Best Practices 753
Part VII: Unified Communications in an Exchange Server 2010 Environment
23 Designing and Implementing Mobility in Exchange Server 2010 755
Understanding Mobility Enhancements in Exchange Server 2010 755
Enabling ActiveSync in Exchange Server 2010 757
Securing Access to ActiveSync with Secure Sockets Layer Encryption 760
Securing Access to ActiveSync Using Internet Security and Acceleration (ISA) Server 2006 764
Working with ActiveSync Policies 768
Working with Windows Mobile Pocket PC and Smartphone Editions 770
Summary 774
Best Practices 775
24 Designing and Configuring Unified Messaging in Exchange Server 2010 777
Unified Messaging Features 777
Unified Messaging Architecture 783
Unified Messaging Installation 797
Monitoring and Troubleshooting Unified Messaging 811
Unified Messaging Shell Commands 825
SIP Protocol 828
Summary 831
Best Practices 831
25 Collaborating Within an Exchange Server Environment Using Microsoft Office SharePoint Server 2007 833
Understanding the History of SharePoint Technologies 833
Identifying the Need for MOSS 2007 837
Exploring Basic MOSS Features 838
Exploring End-User Features in MOSS 845
Customizing and Developing MOSS Sites 851
Summary 854
Best Practices 854
26 Integrating Office Communications Server 2007 in an Exchange Server 2010 Environment 857
Understanding Microsoft’s Unified Communications Strategy 858
Installing OCS 2007 R2 861
Exploring Office Communications Server Tools and Concepts 876
Installing and Using the Communicator 2007 Client 879
Web Conferencing 880
Summary 881
Best Practices 881
Part VIII: Client Access to Exchange Server 2010
27 Getting the Most Out of the Microsoft Outlook Client 883
Outlook over the Years 883
Highlighted Features in Outlook 2007 885
Security Enhancements in Outlook 2007 893
Implementing Outlook Anywhere 900
Deploying Outlook 2007 903
Using Outlook 2007 905
Using Cached Exchange Mode for Offline Functionality 914
Summary 919
Best Practices 920
28 Leveraging the Capabilities of the Outlook Web App (OWA) Client 921
Understanding Microsoft’s Direction on OWA 922
What’s New in OWA 2010? 924
Understanding Available Versions and Security Options 927
Using OWA 2010 931
Using the Calendar in OWA 947
Using Tasks in OWA 952
Using Contacts in OWA 953
Using Keyboard Shortcuts 953
The Options Page 954
Signing Out of OWA 2010 967
Configuring OWA and IM Integration 967
Summary 972
Best Practices 972
29 Using Non-Windows Systems to Access Exchange Server 2010 973
Understanding Non-Windows--Based Mail Client Options 974
Outlook Express 977
Mac Mail, iCal, and Address Book 982
Configuring and Implementing Entourage for the Mac 984
Remote Desktop Connection Client for Mac 987
Understanding Other Non-Windows Client Access Methods 991
Summary 993
Best Practices 993
30 Deploying the Client for Microsoft Exchange Server 2010 995
Outlook 2007 Auto Account Setup 995
Understanding Deployment Options 999
Planning Considerations and Best Practices 1003
Preparing the Deployment 1005
Installing the Outlook Client for Exchange Server 1012
Pushing Outlook Client Software with Group Policies 1015
Deploying with Microsoft System Center Configuration Manager 2007 1023
Managing Post-Deployment Tasks 1025
Summary 1026
Best Practices 1026
Part IX: Data Protection and Disaster Recovery of Exchange Server 2010
31 Database Availability Group Replication in Exchange Server 2010 1027
Understanding Database Availability Groups 1028
Deploying a Database Availability Group 1030
Comparing and Contrasting DAG Versus CCR/SCR/SCC 1050
Load Balancing in Exchange Server 2010 1052
Summary 1057
Best Practices 1057
32 Backing Up the Exchange Server 2010 Environment 1059
Understanding the Importance of Backups 1059
Establishing Service Level Agreements 1061
Supporting Backups with Documentation 1063
Logging Daily Backup Results and Evaluation 1066
Roles and Responsibilities 1066
Developing a Backup Strategy 1067
What to Back Up on Exchange Servers 1071
The Need for Backups with Database Availability Groups 1074
Backing Up Windows Server 2008 and Exchange Server 2010 1075
Backing Up Specific Windows Services 1078
Summary 1081
Best Practices 1082
33 Recovering from a Disaster in an Exchange Server 2010 Environment 1085
Identifying the Extent of the Problem 1086
What to Do Before Performing Any Server-Recovery Process 1090
Preparing for a More Easily Recoverable Environment 1091
Recovering from a Site Failure 1094
Recovering from a Disk Failure 1098
Recovering from a Boot Failure 1100
Recovering from a Complete Server Failure 1101
Recovering Exchange Server Application and Exchange Server Data 1103
Recovering from Database Corruption 1105
Recovering Internet Information Services 1109
Recovering Windows Server 2008 Domain Controllers 1109
Recovering Active Directory 1110
Summary 1112
Best Practices 1113
Part X: Optimizing Exchange Server 2010 Environments
34 Optimizing an Exchange Server 2010 Environment 1115
Examining Exchange Server 2010 Performance Improvements 1116
Analyzing Capacity and Performance 1119
Optimizing Exchange Server 2010 Servers 1122
Monitoring Exchange Server 2010 1131
Analyzing and Monitoring Core Elements 1131
Properly Sizing Exchange Server 2010 1137
Optimizing Exchange Server Through Ongoing Maintenance 1146
Monitoring Exchange Server with System Center Operations Manager 1146
Summary 1147
Best Practices 1147
35 Designing and Optimizing Storage in an Exchange Server 2010 Environment 1149
Defining the Technologies 1150
When Is the Right Time to Implement NAS and SAN Devices? 1152
Designing the Right Data Storage Structure for Exchange Server 2010 1154
Adding in Fault Tolerance for External Storage Systems 1160
Recommendations for SAN and NAS Solutions 1161
Making the Best Use of SAN/NAS Disks with Exchange Server 2010 1163
Summary 1167
Best Practices 1168
Index 1169