microsoft - download.e-bookshelf.de€¦ · joseph tuan nguyen, mcitp, is a systems architect with...
TRANSCRIPT
Microsoft®
Exchange Server 2010 Administration
Microsoft®
Exchange Server 2010 Administration
Real World Skills for MCITP Certification and Beyond
Joel Stidley
Erik Gustafson
Acquisitions Editor: Jeff KellumTechnical Editor: Bob ReinschProduction Editor: Christine O’ConnorCopy Editor: Judy FlynnEditorial Manager: Pete GaughanProduction Manager: Tim TateVice President and Executive Group Publisher: Richard SwadleyVice President and Publisher: Neil EddeMedia Project Manager 1: Laura Moss-HollisterMedia Associate Producer: Josh FrankMedia Quality Assurance: Shawn PatrickBook Designers: Judy Fung and Bill GibsonCompositor: Craig Woods, Happenstance Type-O-RamaProofreader: Scott Klemp and Louise Watson, Word One New YorkIndexer: Robert SwansonProject Coordinator, Cover: Lynsey StanfordCover Designer: Ryan SneedCopyright © 2011 by Wiley Publishing, Inc., Indianapolis, IndianaPublished simultaneously in CanadaISBN: 978-0-470-62443-2No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permit-ted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copy-right Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permissions.Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or war-ranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation warranties of fitness for a particular purpose. No warranty may be created or extended by sales or promotional materials. The advice and strategies contained herein may not be suitable for every situation. This work is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or other professional services. If professional assistance is required, the services of a competent professional person should be sought. Neither the publisher nor the author shall be liable for damages arising herefrom. The fact that an organization or Web site is referred to in this work as a citation and/or a potential source of further information does not mean that the author or the publisher endorses the information the organization or Web site may provide or recommendations it may make. Further, readers should be aware that Internet Web sites listed in this work may have changed or disappeared between when this work was written and when it is read.For general information on our other products and services or to obtain technical support, please contact our Customer Care Department within the U.S. at (877) 762-2974, outside the U.S. at (317) 572-3993 or fax (317) 572-4002.Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books.Library of Congress Cataloging-in-Publication DataStidley, Joel, 1976- Exchange server 2010 administration : real world skills for MCITP certification and beyond / Joel Stidley, Erik Gustafson. p. cm. ISBN-13: 978-0-470-62443-2 (pbk.) ISBN-10: 0-470-62443-4 (pbk.) ISBN: 978-0-470-94733-3 (ebk.) ISBN: 978-0-470-94735-7 (ebk.) ISBN: 978-0-470-94734-0 (ebk.) 1. Microsoft Exchange server. 2. Client/server computing. 3. Electronic mail systems. 4. Electronic data processing personnel—Certification. I. Gustafson, Erik, 1971- II. Title. QA76.9.C55S797 2011 005.7’1376—dc22 2010036021TRADEMARKS: Wiley, the Wiley logo, and the Sybex logo are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates, in the United States and other countries, and may not be used with-out written permission. Microsoft is a registered trademark of Microsoft Corporation in the United States and/or other countries. All other trademarks are the property of their respective owners. Wiley Publishing, Inc., is not associated with any product or vendor mentioned in this book.10 9 8 7 6 5 4 3 2 1
Dear Reader,
Thank you for choosing Microsoft Exchange Server 2010 Administration: Real World Skills for MCITP Certification and Beyond. This book is part of a family of premium-quality Sybex books, all of which are written by outstanding authors who combine practi-cal experience with a gift for teaching.
Sybex was founded in 1976. More than 30 years later, we’re still committed to producing consistently exceptional books. With each of our titles, we’re working hard to set a new standard for the industry. From the paper we print on, to the authors we work with, our goal is to bring you the best books available.
I hope you see all that reflected in these pages. I’d be very interested to hear your com-ments and get your feedback on how we’re doing. Feel free to let me know what you think about this or any other Sybex book by sending me an email at [email protected]. If you think you’ve found a technical error in this book, please visit http://sybex.custhelp.com. Customer feedback is critical to our efforts at Sybex.
Best regards,
Neil Edde Vice President and Publisher Sybex, an Imprint of Wiley
This book is dedicated to our friendship, our loving families, and our friends;
all of which make us who we are today.
AcknowledgmentsThis book, like all publications, took a lot of hard work and patience on many levels. We would like to thank Jeff Kellum, Christine O’Connor, and the others at Sybex for their com-mitment to this book and their vision for this new series of books. Also, a sincere thank you goes out to the entire Microsoft Exchange development team for making a truly awesome product and doing so much to meet the needs of their customers.
One of the most critical pieces of a successful technical book is the accuracy. Thankfully, we had the best editors, Judy Flynn and Bob Reinsch who worked hard to make this book accurate both technically and grammatically.
We are also indebted to a number of other people who were crucial for providing honest and direct guidance and assistance along the way: Joseph Nguyen, Brian Tirch, Joézer Cookey-Gam, Jules Yacho, Kory Sebby, and Jon Webster.
About the AuthorsJoel Stidley has been working in the IT field for 15 years, and he has been a computer fanatic for much longer. He obtained his first Microsoft certification in 1999 and is currently an MCSE, MCTS, and Exchange MVP. At the beginning of his IT career, he was supporting MS-DOS and Windows for Workgroups clients on a Novell NetWare network at a small man-ufacturing company. Shortly thereafter, he discovered the joys of Windows NT Server. Joel worked with Microsoft Exchange on the Exchange Server 5.0 beta releases. Since that time, he has done migrations from legacy messaging systems such as Lotus cc:Mail to Exchange as well as numerous migrations from Exchange 5.5 to 2000 and 2003 versions. He also led an engi-neering team to create a shared Exchange 2000 hosting platform before Microsoft released guidance on how to do so. Since then, he has been working extensively with Exchange in a variety of environments.
In 2004, Joel founded ExchangeExchange.com, a Microsoft Exchange-focused community website, where he blogs and provides forums for discussing Exchange, PowerShell, certifica-tion, and general Windows topics. In the last few years, he has also been writing extensively. He contributed content to MCITP: Microsoft Exchange Server 2007 Messaging Design and Deployment Study Guide: Exams 70-237 and 70-238 (Sybex, 2007) and served as lead author on Professional PowerShell for Exchange Server 2007 SP1 (Wrox, 2008), MCTS: Windows Server 2008 Applications Infrastructure Configuration Study Guide: Exam 70-643 (Sybex, 2008), and Microsoft Exchange Server 2010 Best Practices (Microsoft Press, 2010). Currently, he is the principal systems architect at Terremark Worldwide Inc., where he works with a variety of cloud computing and messaging technologies.
Joel lives near the Dallas, Texas area with his wife and two children. You can contact him at [email protected] or read his blog at http://exchangeexchange.com/blogs/joel.stidley/.
Erik R. Gustafson is a nine-year veteran of IT consulting and IT support. He started work-ing professionally with Microsoft products while running a successful signage business in 1995, and after selling the business a few years later, he refocused his career on providing IT services. He obtained his first Microsoft certification in 2002 and is currently an MCSE and an MCSA. For the last few years he has helped grow an IT consulting business and set up an IT managed service provider from the ground up. Recently, he has relocated to the Dallas area with his wife, Kelly, and now works as a solutions architect for Terremark Worldwide Inc.
Erik also was a contributing author of MCTS: Windows Server 2008 Applications Infrastructure Configuration Study Guide: Exam 70-643 (Sybex, 2008) and writes Microsoft exam simulation questions for Ucertify.com.
You can contact Erik at [email protected] or read his blog at www.blueskwer.com.
About the Contributing Authors
Joseph Tuan Nguyen, MCITP, is a systems architect with 13 years’ experience working with Exchange Server. He has worked as a system administrator, consultant, author, and trainer covering various Microsoft server technologies for messaging, communications, and collaboration. He has worked in small, medium, and enterprise organizations and is currently employed at the University of Oklahoma, where he puts his professional and technical experience to work serving the needs of the campus community. He resides in Oklahoma City with his wife, Jessica, and two daughters, Natalie and Claire.
Jules Yacho has over 13 years of IT experience. He is currently employed as a regional sales engineer at Terremark Worldwide Inc. and is responsible for designing and architect-ing solutions for complex challenges using his knowledge of networks, security, systems, storage, co-location, and cloud computing.
Jules has worked extensively with all versions of Exchange, from Exchange Server 5.0 all the way to Exchange Server 2010. Prior to Joining Terremark, he was an infrastructure consultant with Dell Inc. specializing in Active Directory and Exchange deployments, and prior to that, Jules was a senior messaging engineer with Turner Construction.
When he is not busy working with technology, Jules enjoys watching his sons play com-petitive soccer. Jules is married and currently lives in Irving, Texas, with his wife, Erin, and their four children.
Kory Sebby grew up in a small town in Illinois with two loving and supportive parents and three obnoxious younger siblings. While Kory was growing up, he was always taking things apart and rebuilding them or building new items from the parts. After being introduced to computers, things just took off. Kory learned from gaming on PCs new ways to do things and ways to reprogram the games to make them a little easier or play smoother. Kory started his computer training in high school and continued his education at a technical school in Phoenix, Arizona. Using this technical training, Kory started his computer career working at a computer retail store and then worked hard to qualify for his current position as a technical analyst at Verity Three in the suburbs of Chicago. He has since obtained a number of certifications (MCSA, MCDST, VSTP, CCA) and has become a proud father. Kory continues to work hard and learn new technology; he is often the one analyst chosen to learn a new technology. As such, he was chosen to deploy the first Exchange Server 2007 servers for his company’s customers a few years ago.
Brian Tirch has been working in the IT field for over 11 years and currently works as a technology architect for Microsoft, where he provides guidance on a number of Microsoft technologies like Exchange Server. Brian currently holds a bachelor of science degree in com-puter networking and has multiple Microsoft certifications; he obtained his first in 1999.
Brian has been the technical editor of a number of Exchange books over the years: Mastering Microsoft Exchange Server 2007 (Sybex, 2007), Mastering Microsoft Exchange Server (2007 SP1 Sybex, 2009), and Microsoft Exchange Server 2007:
About the Contributing Authors xi
Implementation and Administration (Sybex, 2008). He was awarded the honor of being a Microsoft MVP in Exchange Server before joining Microsoft. Brian also hosts a blog dedicated to Microsoft Exchange Server, located at http://exchange-genie.com.
Brian’s most recent achievement is fatherhood. He has become the proud father to his son, Tyler Nicholas Tirch (TNT). He is always appreciative of his family and friends for their support. He is especially appreciative for his wife, Jodie Tirch, who makes it possible for him to spend long hours on the computer.
Joézer Cookey-Gam holds a bachelor of technology degree in electrical engineering from the Rivers State University of Science and Technology in Nigeria. He is a Microsoft Certified Systems Engineer and an IT professional with focus on messaging. He began his IT career as a network engineer and Exchange administrator, supporting medium to large enterprise networks. In this role, he provided solutions for LinkServe Limited, a leading Internet service provider in Nigeria. He joined Microsoft in 2001 and is currently a tech-nical support lead, supporting both Microsoft vendors and partners.
Contents at a Glance
Introduction xxix
Part I Introduction to Exchange Server 2010 1
Chapter 1 Introduction to Exchange Server 2010 3
Part II Messaging Administrator’s Guide to Exchange Server 2010 27
Chapter 2 Installing and Configuring Exchange Server 2010 29
Chapter 3 Configuring Connectors, Routing and Transport, and Connectivity 73
Chapter 4 Managing Exchange Server 2010 Mail-Enabled Objects 153
Chapter 5 Configuring and Managing Public Folders 233
Chapter 6 Configuring Security, Compliance, and Policies 279
Chapter 7 Configuring High-Availability Solutions for Exchange Server 359
Chapter 8 Disaster Recovery Operations for Exchange Server 415
Chapter 9 Monitoring and Reporting with Exchange Server 2010 443
Part III Messaging Professional’s Guide to Exchange Server 2010 479
Chapter 10 Planning the Exchange Server 2010 Migration and Infrastructure 481
Chapter 11 Designing and Deploying Mailbox Services 507
Chapter 12 Designing Routing and Client Connectivity 531
Chapter 13 Designing Security and Compliance 577
Chapter 14 Designing High Availability and Recovery 605
Appendix A Microsoft’s Certification Program 631
Appendix B About the Companion CD 645
Glossary 649
Index 673
Contents
Introduction xxix
Part I Introduction to Exchange Server 2010 1
Chapter 1 Introduction to Exchange Server 2010 3
Brief History of Exchange Servers 4New Features in Exchange Server 2010 6Improvements in Exchange Server 2010 9Discontinued Features 13
Features That Have Been Removed 13A De-emphasized Feature 15
Comparison between Exchange Server 2007 and Exchange Server 2010 15
Client Benefits to Exchange Server 2010 20Large Mailbox Support 20Native Archiving Features 21eDiscovery Features 22Retention Policies and Legal Holds 23User-Specific HTML Disclaimers 23MailTips 24
Summary 25Chapter Essentials 25
Part II Messaging Administrator’s Guide to Exchange Server 2010 27
Chapter 2 Installing and Configuring Exchange Server 2010 29
Understanding the Administrator’s Job Role 30Installing Exchange Prerequisites 31Preparing the Infrastructure for Exchange Server 2010 39
Active Directory Forests 39Active Directory Partitions 40Message Flow 40Active Directory 41Domain Name Service 44Verifying Name Resolution 45Running Network and Domain Controller
Diagnostics Tests
3
Brief History of Exchange Servers 4New Features in Exchange Server 2010 6Improvements in Exchange Server 2010 9Discontinued Features 13Comparison between Exchange Server 2007 and Exchange Server
2010 15Client Benefits to Exchange Server 2010 20Summary 25Chapter Essentials
29
Understanding the Administrator’s Job Role 30Installing Exchange Prerequisites 31Preparing the Infrastructure for Exchange Server 2010 39Preparing the Infrastructure for Exchange Server 2010 Deployment
47Introducing the Server Roles 59Installing Microsoft Exchange Server 2010 62Understanding Role Based Access Control 67Summary 71Chapter Essentials 71
xvi Contents
Preparing the Infrastructure for Exchange Server 2010 Deployment 47
Verifying Domain and Forest Functional Levels 48Preparing the Windows Active Directory Forest 49Preparing Other Windows Active Directory Domains 54Modifying Existing Exchange Organizations to
Support Migration 56Introducing the Server Roles 59
Mailbox Server 59Hub Transport Server 60Client Access Server 60Edge Transport Server 61Unified Messaging Server 62
Installing Microsoft Exchange Server 2010 62Understanding Role Based Access Control 67
Management Role Groups 67Management Role Assignment Policies 68Direct User Role Assignment 69
Summary 71Chapter Essentials 71
Chapter 3 Configuring Connectors, Routing and Transport, and Connectivity 73
Configuring Connectors 74Configuring Send Connectors 75Configuring Receive Connectors 81
Configuring Message Routing and Transport 88Using Internal Message Routing 90Using External Message Routing 92Configuring and Managing EdgeSync 94Configuring Transport 102
Configuring Client Access for Exchange Server 2010 107Configuring Client Connectivity with Autodiscover 109Configuring Client Access 121Supporting POP3 and IMAP4 Clients 135Configuring ActiveSync 140
Summary 150Chapter Essentials 151
Chapter 4 Managing Exchange Server 2010 Mail-Enabled Objects 153
Understanding Databases in Exchange Server 2010 154Creating Mailboxes 162User Mailbox Properties 169
Contents xvii
Creating Resource Mailboxes 176Modifying Resource Mailbox Properties 180Configuring Mail-Enabled Groups 190Modifying Mail-Enabled Group Properties 193
Performing Basic Management with the Exchange Management Console 193
Managing Group Properties 194Managing Dynamic Distribution Groups 198Creating Dynamic Distribution Groups with
the Exchange Management Console 199Modifying Dynamic Distribution Groups 201
Configuring Mail Contacts 203Creating Contacts with the Exchange
Management Console 203Modifying Mail Contacts 206
Moving Mailboxes 210Using the Exchange Control Panel and Outlook Web App 214Managing Myself in the Exchange Control Panel 215Managing an Organization with the Exchange Control Panel 225Managing Another User’s Inbox with the Exchange
Control Panel 229Summary 230Chapter Essentials 231
Chapter 5 Configuring and Managing Public Folders 233
Creating Public Folders 235Creating a Public Folder Database 236Designing a Public Folder Hierarchy 241Creating Public Folders 241
Managing and Configuring Public Folders 246Configuring a Public Folder Database 247Changing the Default Public Folder Database 250Using PFMC to Configure and Manage Public Folders 251Configuring and Managing Public Folders with EMS 257Managing Public Folders with Outlook Client 267Introduction to ExFolders 269
Replicating Your Public Folders 270Choosing a Replication Design 270Replicating the Hierarchy 271Replicating the Content 272Understanding Backfill Events 276Removing a Replica 276
Summary 277Chapter Essentials 278
xviii Contents
Chapter 6 Configuring Security, Compliance, and Policies 279
Configuring Role Based Access Control 281Enabling Administrator Audit Logging 287
Introducing Message Compliance and Record Management 288Configuring Managed Folders 289Creating and Applying Retention Tags and
Retention Policies and Using Archive Mailboxes 296Scheduling the Managed Folder Assistant 300Classifying Message Classifications 302Configuring Information Rights Management 305Assigning Legal Holds and Creating Mailbox
Journaling Rules 307Using Multi-Mailbox Search and Discovery Mailboxes 309
Configuring Transport Rules 311Transport Predicates 312Transport Actions 318Working with Transport Rules 323
Managing Policies and Address Lists 325Configuring Email Address Policies 325Creating Address Lists 328Configuring Mobile Device Policies 330
Configuring Antivirus and Antispam Solutions 334Configuring Exchange Server 2010 Antispam 334Using Forefront Protection 2010 for Exchange Server 351
Summary 357Chapter Essentials 358
Chapter 7 Configuring High-Availability Solutions for Exchange Server 359
Introducing High Availability in Exchange Server 2010 360Understanding Database Availability Groups 361
Using Database Availability Group Properties 363Using Failover Clustering in Exchange Server 2010 366Using Majority Node Set 367Employing a Witness Server 367
Managing a Database Availability Group 371Managing Database Copies 376
Seeding a Database Copy 376Using Log Truncation 379Suspending, Resuming, and Switching Over
Database Copies 379Configuring AutoDatabaseMountDial 380Monitoring Database Copies 383
Contents xix
Availability for Client Access, Hub Transport, and Edge Transport Roles 392
Client Access Server Arrays 392Determining the MAPI Endpoint 393Installing and Configuring Network Load Balancing 403Scoping the MAPI Ports 411Using DNS Round-Robin 413
Summary 414Chapter Essentials 414
Chapter 8 Disaster Recovery Operations for Exchange Server 415
What Is Disaster Recovery? 416Avoiding Disasters and Reacting to Them 417
Avoiding Data Loss 417Reacting to Disasters 418
Configuring Backups 420Using Replication-Based Backup 422Creating, Modifying, and Performing Backup Jobs 423Monitoring and Validating Backup Jobs 425Repairing a Damaged Exchange Database 426
Recovering Messaging Data 430Recovering Messages with Deleted Items Retention 430Recovering Deleted Mailboxes with Deleted
Mailbox Retention 431Recovering Mailbox Databases 433Backing Up and Recovering a Mailbox
Server Configuration 437Backing Up and Recovering Server Roles 437
Backing Up and Recovering a Client Access Server 437Backing Up and Recovering a Hub Transport Server 438Backing Up and Recovering an Edge Transport Server 439
Summary 441Chapter Essentials 441
Chapter 9 Monitoring and Reporting with Exchange Server 2010 443
Monitoring Databases 444Performing Message Tracking 454
Reviewing Message Tracking 455Configuring Message Tracking 457Using the Routing Log Viewer 460
Monitoring Client Connectivity 461Using the Test Cmdlets to Test Functionality 464
xx Contents
Creating Server Reports 465Creating Health Reports 465Creating Availability Reports 469
Creating Usage Reports 471Using Administrator Audit Logging 475
Summary 477Chapter Essentials 477
Part III Messaging Professional’s Guide to Exchange Server 2010 479
Chapter 10 Planning the Exchange Server 2010 Migration and Infrastructure 481
Understanding the Messaging Professional’s Job Role 482Using a Framework for Deploying Exchange Server 2010 483Preparing Exchange Server 2010 for Deployment 484
Satisfying DNS Requirements 484Planning the Site Topology 485Defining Deployment Locations 486
Planning Namespaces 488Planning the Active Directory Forest 489Forest Functional Levels 490Satisfying Schema Requirements 491
Planning Your Migration and Coexistence 491Using the Exchange Deployment Assistant 492Planning Coexistence with Exchange Server 2003 492Planning Coexistence with Exchange Server 2007 493Planning Coexistence with Third-Party Email Systems 494Upgrading from Previous Versions of Exchange 494Planning Public Folder Coexistence and Migration 496Migrating Mailboxes to Exchange 2010 500Configuring the Recipient Update Service 501Converting LDAP Filters to OPATH Filters 502Planning Unified Messaging Server Coexistence 503Removing Legacy Exchange Servers 503
Summary 505Chapter Essentials 506
Chapter 11 Designing and Deploying Mailbox Services 507
Designing Mailbox Services 508Understanding the Exchange Storage Structure 508Determining Mailbox Server Hardware Requirements 511Determining Whether to Deploy Public Folders 516Defining Naming Conventions 517Provisioning Mailboxes 519
Contents xxi
Deploying the Mailbox Server Role 521Installation Prerequisites 521Sizing Mailbox Server Hardware 523Deploying Public Folders 527
Summary 528Chapter Essentials 529
Chapter 12 Designing Routing and Client Connectivity 531
Getting to Know Exchange 2010 Server Transport and Routing Features 532
What Is Shadow Redundancy? 533Understanding Transport Service and the Mail.que
ESE Database 536Understanding Moderated Transport 536Measuring End-To-End Message Latency 537Integrating Cross-Premises Message Routing 537Understanding Version-Based Routing 537Improvements in Edge Synchronization 538
Planning Exchange Server 2010 Routing 538Understanding Exchange 2010 Server Role Dependencies 539Understanding Active Directory Dependencies and Routing 541Migrating and Coexistence Considerations 546
Defining Transport Server Hardware 546Understanding Transport Server Storage 547Defining the Processor and Memory Requirements 548Planning the Number of Transport Servers 549
Deploying the Exchange Server 2010 Infrastructure 549Deploying a New Exchange Installation (Greenfield) 550Upgrading and Coexistence with Exchange Server 2003 555Upgrading and Coexistence with Exchange Server 2007 558
Exchange 2010 Client Access and Connectivity 562Deploying Exchange Server 2010 Client Access Servers 564
Understanding Active Directory Topology 564Planning Client Access Namespace and Proxying 564Planning Client Access Load Balancing 566Deciding on Software or Hardware Load Balancing 566Restricting the MAPI Client Version 567Encrypting Client Access Security 567
Choosing Hardware and Sizing 568Deploying the Exchange Server 2010 Client Access Server Role 568
Upgrading and Coexistence with Exchange Server 2007 569Upgrading and Coexistence with Exchange Server 2003 571Proxying POP3 and IMAP4 Clients 571
Summary 574Chapter Essentials 575
xxii Contents
Chapter 13 Designing Security and Compliance 577
Designing Messaging Security and Compliance 578Supporting S/MIME 578Planning Secure Internal Receive Connectors 579Securing Interorganization Email 580Planning AD RMS Integration 580Using Transport Rules 581
Planning Exchange Permissions Models 581Designing Message Hygiene 585
Configuring FPES for Virus Protection 585Configuring FPES for Spam and Phishing Protection 588
Designing Client Access Security 591Designing ActiveSync Policies 591Using ActiveSync Device Access Rules 593Using OWA Segmentation 593Encrypting Client Communication 593
Designing Message Archival and Discovery 594Understanding Admin Audit Logging 594Working with Message Tracking Logs 595Reviewing Single Item Recovery, Journaling, and
Legal Hold 595Retaining Deleted Mailboxes 597Introducing Message Records Management 598Performing Multi-Mailbox Searches 601
Summary 602Chapter Essentials 602
Chapter 14 Designing High Availability and Recovery 605
High Availability Overview 606Designing and Deploying Exchange 2010 High Availability 608
Designing and Deploying High Availability for Exchange Infrastructure 608
Designing and Deploying High Availability for Mailbox Servers 609
Designing and Deploying High Availability for Client Access Servers 614
Designing and Deploying High Availability for Transport Servers 616
Designing and Deploying High Availability Across Sites 620Designing Exchange Backup and Recovery 621
Backup and Recovery for Mailbox Servers 623Backup and Recovery for Client Access Servers 628Backup and Recovery for Transport Servers 628
Summary 629Chapter Essentials 629
Contents xxiii
Appendix A Microsoft’s Certification Program 631
How Do You Become Certified on Exchange Server 2010? 632Tips for Taking a Microsoft Exam 633Exam Registration 633
Certification Objectives Map 634
Appendix B About the Companion CD 645
What You’ll Find on the CD 646Video Walk-Throughs 646Sybex Test Engine 646Electronic Flashcards 646PDF of the Book 646Adobe Reader 646
System Requirements 647Using the CD 647Troubleshooting 647
Customer Care 648
Glossary 649
Index 673
Table of ExercisesExercise 2.1 Installing Microsoft .NET Framework 3.5.1 . . . . . . . . . . . . . . . . . . . . . . . . . 33
Exercise 2.2 Installing Windows PowerShell 2.0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Exercise 2.3 Choosing Exchange Language Option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Exercise 2.4 Installing Required Service Roles, Features, and Updates on Windows Server 2008 R2. . . . . . . . . . . . . . . . . . . . . . . . . . 37
Exercise 2.5 Verifying the Domain and Forest Functional Levels. . . . . . . . . . . . . . . . . . 48
Exercise 2.6 Running the /PrepareSchema Command. . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Exercise 2.7 Running the /PrepareAD Command. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Exercise 2.8 Running the /PrepareDomain Command. . . . . . . . . . . . . . . . . . . . . . . . . . . 55
Exercise 2.9 Running the /PrepareLegacyExchangePermissions Command . . . . . . . 58
Exercise 2.10 Installing the First Exchange Server 2010 . . . . . . . . . . . . . . . . . . . . . . . . . . 63
Exercise 3.1 Creating a Send Connector to the Internet with the Exchange Management Console. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
Exercise 3.2 Creating a Receive Connector . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
Exercise 3.3 Creating a New Edge Subscription . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Exercise 3.4 Configuring Message Size Limits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
Exercise 3.5 Configure External Client Access Domain Using the Wizard . . . . . . . . . 116
Exercise 3.6 Request a New Certificate with the New Exchange Certificate Wizard. . . 117
Exercise 3.7 Create a New Outlook Web App Mailbox Policy . . . . . . . . . . . . . . . . . . . . 129
Exercise 3.8 Modify the Automatic Replies (Out of Office) of Another User with Exchange Control Panel. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
Exercise 3.9 Assigning an ActiveSync Policy to a User . . . . . . . . . . . . . . . . . . . . . . . . . 145
Exercise 3.10 Wiping a Mobile Phone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
Exercise 4.1 Creating and Deleting Databases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156
Exercise 4.2 Moving Mailbox Databases with the Exchange Management Console. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159
Exercise 4.3 Dismounting a Database and Mounting a Dismounted Database . . . . . 161
Exercise 4.4 Creating a New User with the Exchange Management Console . . . . . . 163
Exercise 4.5 Creating a Mailbox for an Existing Account with the Exchange Management Console. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167
Exercise 4.6 Creating Room Mailboxes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176
Exercise 4.7 Modifying Resource Mailbox Properties with the Exchange Management Console. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186
Exercise 4.8 Creating a New Distribution Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
Table of Exercises xxv
Exercise 4.9 Mail-Enabling an Existing Security Group. . . . . . . . . . . . . . . . . . . . . . . . . 192
Exercise 4.10 Creating a New Distribution Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199
Exercise 4.11 Creating a New Mail Contact. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204
Exercise 4.12 Mail-Enabling an Existing Contact . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
Exercise 4.13 Moving a Mailbox to a Local Database with the Exchange Management Console. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211
Exercise 5.1 Creating a Public Folder Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236
Exercise 5.2 Removing a Public Folder Database. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239
Exercise 5.3 Creating a Public Folder in the PFMC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242
Exercise 5.4 Creating a Public Folder in Outlook . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244
Exercise 5.5 Creating a Public Folder in OWA. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245
Exercise 5.6 Changing the Default Public Folder Database. . . . . . . . . . . . . . . . . . . . . . 250
Exercise 5.7 Creating a Public Folder Replica in Exchange Management Console. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273
Exercise 6.1 Using the Exchange Control Panel to Allow Users to Edit Distribution Groups. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 282
Exercise 6.2 Creating a Default Management Role Assignment to Prevent Users from Creating Distribution Groups . . . . . . . . . . . . . . 283
Exercise 6.3 Using the Exchange Control Panel to Assign the Discovery Management Role Group to a User. . . . . . . . . . . . . . . . . . . . . . . . . . . 284
Exercise 6.4 Assigning a Scoped Help Desk Role Using the Exchange Management Shell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 286
Exercise 6.5 Creating a Managed Folder Using the Exchange Management Console. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 290
Exercise 6.6 Creating a Managed Folder Using the Exchange Management Shell . . . 291
Exercise 6.7 Creating a Managed Content Setting Using the Exchange Management Console. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292
Exercise 6.8 Creating a Managed Content Setting Using the Exchange Management Shell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293
Exercise 6.9 Creating a Managed Folder Mailbox Policy Using the Exchange Management Console. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293
Exercise 6.10 Creating a Managed Folder Mailbox Policy Using the Exchange Management Shell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294
Exercise 6.11 Applying a Managed Folder Mailbox Policy Using the Exchange Management Console. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295
Exercise 6.12 Applying a Managed Folder Mailbox Policy Using Exchange Management Shell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 296
Exercise 6.13 Creating Retention Tags Using the Exchange Management Shell . . . . . 298
xxvi Table of Exercises
Exercise 6.14 Creating and Applying a Retention Policy Using the Exchange Management Shell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299
Exercise 6.15 Apply a Personal Retention Tag Using Outlook Web App . . . . . . . . . . . . 299
Exercise 6.16 Scheduling the Managed Folder Assistant Using the Exchange Management Console. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301
Exercise 6.17 Scheduling the Managed Folder Assistant Using the Exchange Management Shell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302
Exercise 6.18 Enabling and Configuring Information Rights Management. . . . . . . . . . 306
Exercise 6.19 Creating a Journaling Rule Using the Exchange Management Shell . . . 307
Exercise 6.20 Creating a Journaling Rule Using the Exchange Management Console. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 308
Exercise 6.21 Perform a Multi-Mailbox Search Using the Exchange Control Panel. . . 310
Exercise 6.22 Creating a New Transport Rule Using the Exchange Management Console. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 323
Exercise 6.23 Creating a New Transport Rule Using the Exchange Management Shell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 324
Exercise 6.24 Creating a New Email Address Policy Using the Exchange Management Console. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 326
Exercise 6.25 Creating a New Email Address Policy Using the Exchange Management Shell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328
Exercise 6.26 Creating a New Address List Using the Exchange Management Console. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329
Exercise 6.27 Creating a New Address List Using the Exchange Management Shell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 330
Exercise 6.28 Creating an ActiveSync Mailbox Policy Using the Exchange Management Console. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332
Exercise 6.29 Creating an ActiveSync Mailbox Policy Using the Exchange Management Shell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333
Exercise 6.30 Enable Content Filtering and Recipient Filtering Using the Exchange Management Console. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 349
Exercise 6.31 Enable Content Filtering and Recipient Filtering Using the Exchange Management Shell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351
Exercise 6.32 Enabling Content Filtering, Forefront DNSBL Checking, and Virus Scanning Using the Forefront Console . . . . . . . . . . . . . . . 356
Exercise 6.33 Enabling Content Filtering, Forefront DNSBL Checking, and Virus Scanning Using the Forefront Management Shell . . . . . . . . . . . . . . 357
Exercise 7.1 Creating a Database Availability Group . . . . . . . . . . . . . . . . . . . . . . . . . . . 362
Exercise 7.2 Assigning a Static IP Address to the DAG . . . . . . . . . . . . . . . . . . . . . . . . . 366
Table of Exercises xxvii
Exercise 7.3 Adding a Mailbox Server to a DAG. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 368
Exercise 7.4 Adding EX01 to a DAG Using the Exchange Management Console. . . . 370
Exercise 7.5 Creating a Database Copy in the Exchange Management Console and Replicating It . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 373
Exercise 7.6 Updating an Unhealthy Database Copy from the Exchange Management Shell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 377
Exercise 7.7 Suspending, Resuming, and Switching Over Database Copies . . . . . . . 381
Exercise 7.8 Monitoring a DAG with Get-MailboxDatabaseCopyStatus . . . . . . . . . . 385
Exercise 7.9 Monitoring a DAG with the Test-ReplicationHealth cmdlet . . . . . . . . 386
Exercise 7.10 Monitoring a DAG with the CollectReplicationMetrics.ps1 Script . . . . . . . . . . . . . . . . . . . . . 389
Exercise 7.11 Monitoring a DAG with the CollectOvermetrics.ps1 Script. . . . . . . . . 391
Exercise 7.12 Creating a Database Copy in the Exchange Management Console . . . . 394
Exercise 7.13 Setting Up an Outlook Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 396
Exercise 7.14 Checking Outlook Encryption Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . 400
Exercise 7.15 Creating a Client Access Server Array . . . . . . . . . . . . . . . . . . . . . . . . . . . . 401
Exercise 7.16 Creating an NLB Cluster to Respond to MAPI Requests . . . . . . . . . . . . . 404
Exercise 7.17 Associating a Client Access Array with a Database . . . . . . . . . . . . . . . . . 408
Exercise 7.18 Scoping RPC Client Access Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 411
Exercise 8.1 Backing Up the Exchange Server Mailbox Database with Windows Server Backup on Windows Server 2008 R2 . . . . . . . . . . 423
Exercise 8.2 Recovering Deleted Items in Outlook Web Access. . . . . . . . . . . . . . . . . . 430
Exercise 8.3 Recovering Deleted Items in Outlook. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 431
Exercise 8.4 Recovering a Deleted Mailbox Using the Exchange Management Console. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 432
Exercise 8.5 Recovering a Deleted Mailbox Using the Exchange Management Shell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 433
Exercise 8.6 Recovering an Exchange Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 435
Exercise 8.7 Backing Up an Edge Transport Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . 440
Exercise 8.8 Restoring an Edge Transport Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 441
Exercise 9.1 Monitoring Disk Free Space. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 445
Exercise 9.2 Installing the File Server Role . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 449
Exercise 9.3 Installing the File Server Resource Manager Service. . . . . . . . . . . . . . . . 450
Exercise 9.4 Configuring Soft Disk Quotas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 452
Exercise 9.5 Using Exchange Remote Connectivity Analyzer. . . . . . . . . . . . . . . . . . . . 462
Exercise 9.6 Creating a Health Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 465
Exercise 9.7 Creating a New Mailbox. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 476
xxviii Table of Exercises
Exercise 10.1 Migrating Public Folders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 497
Exercise 10.2 Moving the OAB Generation Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 499
Exercise 12.1 Viewing the Shadow Message Queue and Message . . . . . . . . . . . . . . . . 535
Exercise 12.2 Making the Chicago Site a Hub Site . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 543
Exercise 12.3 Transport Server Post-installation Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . 555
Exercise 12.4 Disabling Link-State Updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 557
Exercise 12.5 POP3/IMAP4 Cross-site Command Proxy . . . . . . . . . . . . . . . . . . . . . . . . . 573
Exercise 13.1 Considering Permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 584
Exercise 13.2 Choosing SCLs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 589
Exercise 13.3 Deciding on ActiveSync Policies. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 592
Exercise 14.1 Changing the Maximum Acknowledgement Delay on a Receive Connector . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 619
Exercise 14.2 Enabling Single Item Recovery on a Mailbox Using EMS . . . . . . . . . . . . 626