FINAL EXAM REVIEW

                                           CHAPTERS 11-20, 22, 23

 

 

Chapter 11:  Internet-Based Client Access

 

 

POP3 features and abilities (p345)

 

·        POP3 is a messaging protocol that defines commands to download messages

·        from a host.

·        It is read-only protocol.  Used for receiving E-Mails CANNOT send E-Mails.

·        To send messages, POP3 users rely on SMTP.

·        POP3 commands are not case sensitive.  Sent Clear Text.

·        There are three states:  Authorization, Transaction and Update

·        Advantages:  Universal, well known.

·        Port # 110, SSL port 995

 

 

IMAP4 Features and abilities (p348)

 

·        IMAP4 is a modern Internet protocol that allows you to access all kinds of

server-based messaging folders.

·        There are 4 session states:  Non-Authenticated, Authenticated, Selected,

and Logout States.

·        IMAP4 commands are case-insensitive strings or printable ASCII characters,

which consist of a tag followed by a keyword and its arguments.

·        Untagged responses show in the form of an * asterisk.

·        Advantage:  Synchronization, Multiple Profiles, and easy to program.

·        Uses port #143  SSL port 993

 

 

OWA Features and abilities (p763)

 

·        OWA supports e-mail, calendar features, and contact management, which represent

essential information management features.

·        OWA requires Microsoft Windows 2000 Server and Internet Information Services (IIS) 5.0

·        OWA components are placed in the \Program Files\Exchsrvr\exchweb directory.

·        Port #80, SSL port #443

·        HTML 3.2 or greater version

·        OWA  can use Multimedia Messaging, if your workstation is equipped with audio and

video features.

·        Advantage: Remote access (laptop users), Macintosh or UNIX clients need OWA,

they have no MAPI.

 

 

Why would you choose each of the above? 

 

·        You would have look at the advantages and disadvantages of each.  POP3 has limitations

·        for receiving E-mails, as it cannot.

 

·        IMAP4.  More up-to-date version.  There are 4 session states:  Non-Authenticated,

·        Authenticated, Selected, and Logout States.

 

·        OWA.  Supports Multimedia.  Supports Calendars, e-mails etc.

 

 

 

Chapter 12:  Management Tools for Microsoft Exchange 2000 Server

 

 

Delete a user’s mailbox (p448)

 

·          Active Directory Users and Computers, select a user or create a new user.  Then Right click on the

   user and select “Exchange Tasks”.  You have three options  1.  Move Mailbox, 2.  Delete Mailbox, 

·          Enable Instant Messaging.

·          Held by default for 30 days.

 

 

How to set up a policy (p400)

 

  •   Exchange System Manager Recipient Policy in Global option select X.400 extensions.
  •   Policies container is not there by default, you must add it by right-clicking the group, pointing to New

  and then selecting System Policies Container.  Is not there when you install Exchange, a large mistake

  by Microsoft, it should have been installed.

  •   You can create a new server, public store and mailbox store policies.

 

 

How does a policy conflict occur?

 

  •   If possibly there is a Group Policy in effect, and another policy is introduced that has

  the Deny as an option.  Exchange lets you know with an error message.

 

 

 

Which containers are hidden by default?  How do you enable them?

 

  •   The System Policies container does not exists by default, you must create it.  You need to add it

  to the first administrative group by right-clicking the group, pointing to New and then selecting System

  •   Policies Containers.  Right-clicking the System Policies Container and pointing to New, you can create

  a new server, public store, and mailbox.

  •   If you have more than 1 by default they won’t be hidden.

 

 

 

Chapter 13:  Creating and Managing Recipients

 

 

Exchange Task Wizard (p417)

 

  •  Available in Active Directory Users and Computers, you can right click on the user and select
  •  “Exchange Tasks” and the wizard appears.  You have the option of moving or deleting a mailbox,

and enabling Instant Messaging.

  •  If you select Delete the mailbox, you can go into the users and see that the mailbox has been deleted,

and the tabs on the menu are no longer available, and there is a checkbox in Delete Exchange

  •  Mailbox box.

 

 

How can you create a secondary address for a user?  (Note:  there are

at least three different ways)

 

 

  1.   Go into Active Directory Users and Computers properties of a users.  Select the E-Mail tab and you

can choose the New button, and create another address.

  1.   Define a Policy (but not used as often as #1 & #3)
  2.   Outlook – create another address.

 

 

How do you designate an expansion server for a user?  (p1035)

 

·          An Exchange 2000 server designated for distribution group expansion.  The expansion

  server can be defined per mail-enabled group in each group’s Exchange Advanced tab.

·          Must be in the Local Administrators Group.  Reduces E-MAIL traffic, send one e-mail not 500. 

·          Expansion Server is the more power machine as far as hardware goes.

 

 

How do you mail-enable a user?

 

·          When you create the user, ensure that the check box to create a mailbox is ticked. 

   Exchange Tasks mailenable if you have a foreign mail system.

 

 

LDIFDE  (P435-436, 426)

 

 

  •   Windows 2000 server provides you with a very powerful console application LDIFDE.EXE that

   supports batch operations based on LDAP  Directory Interface Format (LDIF) files.

  •   Can change SMTP on the fly.

 

 

Recipient Update Service—What does it do?  (p434-435)

 

  • When you make changes or add new mailboxes, there may be a delay before the changes are reflected.
  • It is an internal process of system attendant, handles the process of updating in the background.
  • The recipient update service is also responsible for updating address lists in Active Directory.

 

 

 

Single Instance Storage (p427)

 

  •   If you send a message to several users on the same server, only one copy of the message is initially

stored in the database and all local addresses receive a pointer to this particular object.  This save

1000 e-mails from being sent, instead it only sends 1.

 

 

 

What are the differences between mail-enabled recipient, mailbox-enabled

recipient, and a mail-enabled contact?

 

  •   Mail-enabled recipient.  Mail-enabled recipient object is in possession of an e-mail but isn’t

associated with an Exchange mailbox.

  •   Mailbox-enabled recipient.  Are user-account objects with associated mailbox information. 
  •   Mailbox-enabled accounts possess corresponding e-mail addresses and can be used to send

and receive message in an Exchange organization.

  •   Mail-enabled contact.  Are not referring to users working in your Windows 2000 environment. 
  •   They usually are outside of the organizations networking messaging system.

 

 

 

What is a recipient?   (p409-438)

 

·          Recipient object in a directory that provides information, such as e-mail addresses about a

  destination that can receive e-mail messages.  In active Directory, recipient objects are mail-

  box enabled users accounts or mail-enabled user accounts or contacts. 

·          Recipient objects are replicated to the Global Catalog to make them available in server-based

  address books.

·          Public folders can be recipients

 

 

What is CSVDE used for?  (p426, 436-437)

 

  • A utility which allows you to deal with numerous recipient objects in bulk, (eg) Mail-Boxes.
  • A Microsoft Windows 2000 command-line utility to import or export objects to a from Active
  • Directory in a comma-separated value (.csv) file format.

 

 

What is special about the Exchange Advanced tab in Active Directory

Users and computers?

 

·          You can “Hide from Exchange address lists”.  The name will not be available to the users. 

  You assign mailbox rights to it.

 

 

 

Chapter 14:  Managing Server Configuration

 

Adding and moving servers between Administrative Groups? (p459)

 

·        You can add servers to an administrative group only during setup.

·        It is not possible to move servers between administrative groups.

·        You can ADSI Edit to move later, but it is a real headache, sort of like editing the Schema.

 

 

Enabling Circular Logging:  (p687)

 

·          It means automatically deleting transaction log files and their entries.  Circular logging

  prevents duplicate consumption of disk space, but is it not compatible with sophisticated

  fault-tolerant configurations and several online backup types, which rely on the existence of

  transaction logs.

·          With Circular logging enabled, you can only recover information included in the last full backup.

·          Really only good in Public Stores, to enable right-click properties.

 

 

How can you improve server performance?  (p446)

 

  • If you have Multiple Information Stores you can gain server performance.
  • You should place the transaction log files on a separate disk.

 

 

How can your users access Internet e-mail addresses when your DNS

servers are not integrated with the Internet?

 

  • Type in the URL address or the fully qualified name to access the e-mail address.

 

 

Offline Address lists (p464, 465)

 

·          The offline address lists container holds the Default Offline Address List objects that

  provides the information from the Default Global Address Lists to remote users.

·          Usually for Laptop users.

·          Offline Address Lists must be generated on the server before clients can download them.

·          Offline Address Lists will be unavailable until the next store maintenance cycle has recreated

  the required public folder on the new server

·          By default, this will happen at 5:00 a.m. each day.

 

 

Removing an Exchange server from AD?  (p460)

 

  •   It is possible to rename administrative groups, but it is not possible to move servers.
  •   Before removing a server, move existing mailboxes to mailbox stores on other servers and

replicate existing public folders.

  •   The second method is right-clicking the server object in Exchange System Manager and

All Tasks, and clicking Remove Server.

 

 

Transaction Log Location (p688)

 

  • The transaction logs should be on a separate hard disk.
  • You can use RAID for more protection.
  • C:\Program Files\Exchsrvr\Mdbdata

 

 

What are the names and functions of the sub containers found in the

Administrative Group?  (p459)

 

 

  • CN=Configuration, DC=Bluesky.com,
  • CN=Services.
  • CN=Microsoft Exchange
  • CN = <Organization name, such as Blue Sky Airlines>
  • CN= Administrative Groups
  • CN= First Administrative Groups
  • CN=<Further Administrative Groups>

 

To grant user permissions you simply add the desired Windows 2000 account to the list of

accounts with permissions for the corresponding administrative group object.

 

 

What are the setup procedures for Full Text Indexing and why would

you do it?  (p452, 453, 454)

 

  •   First you need to create a full-text index for a store.  You then need to populate the store’s

full-text catalog.  Then, you can make the catalog available for full-text searches by clients. 

Then you must define update and rebuild intervals to ensure that the search information is

always up to date.

  •   Full Text Indexing uses up to 20% of disk space.  But quickens searches.
  •   Not enabled by default.

 

 

What are the steps in creating Mailbox only servers? (p445-451)

Prerequisites:

 

  • You must remove the Mailstore and stop and start the service.

 

 

 

Which types of address lists can Outlook access?  (p464)

 

  • Global Server
  • Offline Address Book
  • Personal Folders
  • Outlook Address Book
  • Microsoft Exchange Server
  • Personal Address Book

 

 

Zero out deleted database pages (444)

 

  •   Enabled on the Server Properties
  •   Storage groups and Information Stores.  A Server is able to handle a maximum of four

storage groups, each capable of managing up to 5 individual groups.

  •   Zero out helps to increase the security of the server system by clearing deleted data entries

from the database file.  Activating this option affects server performance.

  •   Tab in First Storage Group Properties.  If you select this box the zero out deleted

database pages is chosen.

 

 

 

Chapter 15:  SMTP Transport Configuration

 

 

How can you optimize connection speeds?  (p483)

 

  •   Per domain, 100 concurrent connections are allowed by default.  You can have up to

1000 concurrent connections to multiple Internet domains and deliver messages to them

at the same time.  Anonymous.

 

 

IMAP4 (p348)

 

·          IMAP4 is a modern Internet protocol that allows you to access all kinds

of server-based messaging folders.

·          You are not restricted to INBOX access only as with POP3.

·          There are 4 sessions:  Non-Authenticated, Authenticated, Selected, and Logout states.

·          IMAP4 clients connect to TCP port 143 at the server.

·          IMAP4 commands are case-insensitive strings of printable ASCII characters.

·          Multiple protocols

 

 

 

MetaEdit (p78-79)

 

·          MetaEdit 2.0 utility allows you to configure properties in the metabase.  Edit the

  metabase using the MetaEdit directly only if you cannot adjust the settings in the

  Internet Service Manager, System Manager, or other user interface.

·          Be careful, only Metaedit if you are stuck.

 

 

POP3 (p345-348)

 

·        POP3 is a messaging protocol that defines commands to download messages from a host.

·        It is read-only protocol.  Used for receiving E-Mails CANNOT send E-Mails.

·        To send messages, POP3 users rely on SMTP.

·        POP3 commands are not case sensitive.  Sent Clear Text.

·        There are three states:  Authorization, Transaction and Update

·        Outlook Express keeps mail on the server

 

 

Relay Host (p481)

 

·        It is up to the host to deliver the nondeliverable messages to the specified host.

·        A relay host can also be known as a SMTP host.

·        Check box in Server Properties “General Tab”.

·        Access Tab, go into Relay option under Virtual Server.

 

 

Smart Host (p483, 517-518)

 

·          You can specify the smart host in the Advanced Delivery dialog box the

  Delivery tab’s Advanced button. 

·          A smart host is a server that is able to receive messages from relaying

  systems and send them to the proper destinations on behalf of the relayers. 

·          Internet Service Providers (ISPs) often provide their customers with access

  to a central smart host that handles the message transfer.

·          Smart Hosts are relayed through a proxy or a firewall.

 

 

SMTP Virtual Server—How to set one up?  What do they do?  (p475)

 

·          By default, every Exchange 2000 server relies on one SMTP virtual server for its

  communication with other servers in the local routing group.

·          Each virtual server must use a unique TCP socket (that is IP address and TCP port)

·          Increases scalability, different size messages

·          Outside connector, and external DNS and Recipient Policy.

 

 

TNEF (p598)

 

·          The format of a binary message attachment that is used to package message properties

  not understood by intermediate messaging systems in the delivery path.  In most cases,

  the binary attachment is named WINMAIL.DAT.

 

 

 

What is the Forward All Mail With Unresolved Recipients To Host text box used for?

 

·        Other machine generates a NDR and sends back.  Be careful not to create a loop.

 

 

WinMail.dat (p598)

 

·          Is a binary attachment called WINMAIL.DAT which contains all the information in the

  TNEF.  The WINMail.dat file is usually garbage.

·          All MAPI clients.

 

 

 

Chapter 16:  Message Routing Administration

 

 

60 Seconds (p540, 548)

 

·          After a connector is tagged as unavailable, the original bridgehead server

  continues to retry the connection at 60-second intervals even if no messages are

  awaiting transfer. 

OR

·          By default, hierarchy replication generates an e-mail message 60 seconds after

  the last modification has occurred.

 

 

Bridgehead Servers (p512-513)

 

·          Multiple bridgehead servers can guarantee message delivery even if a particular

  server is shut down.  Because it provides many advantages, it is typically the preferred connector.

·          Remote Brideghead servers are specified in the Remote Bridgeheads tab.

·          Multiple bridgeheads provide fault tolerance and load balancing.

·          By default, all servers are Bridgehead servers, installed that way.

 

 

Connecting to Exchange 5.5

 

·        Service Pack 3 or better.

·        Have an Active Directory Connector (even if same organization).

·        If you use RC uses RPC not SMTP.

·        Site Replication Services.

 

 

 

ETRN (p519)

 

·          An extension of SMTP that allows an SMTP host to request the message

  transfer from another SMTP host.

·          The SMTP Connector supports the ETRN command completely.

 

 

GWART (p530)

 

·          Earlier versions of Exchange use GWART (Gateway Address Routing Table) for

  message routing.

·          GWART is generated and replicated to Exchange Server 2000.

·          Exchange 2000 Server generates a GWART containing all message routes and their cost

  factors only for the purposes of backward compatibility.

·           Message routing in Exchange 2000 server uses a link state table (LST) instead of a GWART.

 

 

 

Hierarchical routing group (p507)

 

·          In this structure, a central group of hub servers controls the entire message transfer

  between subordinated groups, known as spokes.  See picture page 507. 

·          This arrangement is very reliable, scalable, and resilient. 

·          Multiple hub server share the workload and provide redundancy for well-defined message

  paths between all locations.

 

 

LSI (p670)

 

·          Link State Information is Information that Microsoft Exchange 2000 Server uses for the

  purposes of message routing to determine whether connectors are working.

·          LSI and system monitors rely on the System Attendant services and the Microsoft

  Exchange Routing Engine.

·          Links are either up or down.  Will not send to a down state.

 

 

Mesh Routing Group (p508/509)

 

·          Full-Mesh connects point A to B and A to C and A to D and so on.  There is a direct

  connection, therefore there is redundancy, and the connections are quicker. 

·          Mesh is difficult to troubleshoot, because there is lots of traffic and lots of wiring.

·          Not physical topology.  Only 70 routing connectors, not 70 cables of wires.

 

 

 

Optimization of WAN traffic (p505)

 

·          If a company relies of WAN connections, it will be desirable to control network connections.

·          Scheduling times, TTL.  Quality of Service, IIS likes Quality of Service.

·          You can optimize a WAN link by adding a dedicated bridgehead server, which can act as a

  concentrators for message traffic over the WAN connections between routing groups.

 

 

RPG (p512)

 

·        Routing Group Connector is the easiest connector to install and more powerful than the others.

·        High level of fault tolerance because it supports multiple source and destination bridgehead servers.

·        Multiple bridgehead servers can guarantee message delivery even if a particular server is shut down.

·        Connectors only go one-way.

 

 

Routing Group Master (p538)

 

·          The master server is normally the first server in a routing group.

·          If this server fails or is taken offline, link state information is no longer propagated within the

  routing group.

·          If Routing Group Master is down, updates are not kept up-to-date.

 

 

Routing Groups (p503)

 

·          Is a collection of Exchange 2000 Servers that typically share a permanent, reliable, high-

 bandwidth network connection.

·          Routing Groups rely on connectors to communicate between multiple groups.

·          Why use Routing Groups?  Only for Load Balancing!

 

 

 

SMTP Connectors (p516)

 

·          Is to Connect an Exchange 2000 organization to foreign SMTP systems, such as

SMTP hosts on the internet or other Exchange 2000 organizations.

 

 

What are the requirements for a Microsoft Exchange 2000 messaging

connector that connects routing groups?  (p541)

 

·          You can use RGCs, SMTP connectors, or X.400 connectors to connect routing

  groups in Exchange 2000.

·          DNS unique name, must support link state information.

·          Able to accept format in Rich Text.

 

 

X.400 (p522-523)

 

·          Using an X.400 connector, you can connect Exchange 2000 server to any foreign X.400

  system and to earlier versions of Exchange Server and Exchange 2000 Server in different

  routing groups or organizations.

·          Backward compatibility, for older systems.

·          Best for restart, uses LDAP, needs MTA Stack (unidirectional)

 

 

Chapter 17:  Public Folder Management

 

 

16GB (p567)

 

·        Public store databases have a size limit of 16GB (Standard Edition) or no internal size limit

·        (Enterprise Edition), in which case they are restricted only by the capacity of the server’s local disk space.

 

 

 

Affinity (p569)

 

·          In relation to Public Folders.  The cost between routing groups.  The lowest affinity cost determines

  the most preferred routing group if multiple routing groups exist.

·          Goes to home server and if you do not choose affinity it will search randomly for another server.

 

 

 

Changing permissions of public folders  (p561-563)

 

·          NTFS permissions are best for controlling security

·          Permissions can be inherited from a higher level, such as the organization, administrative group,

  public folder hierarchy and parent folder.

·          When the parent container has permissions, by default all child objects inherit the permissions.

·          If you change permissions (even deny), if someone has a shortcut set up to link to that folder

  they still have access.  Stupid loophole on Microsofts behalf.

 

 

 

 

Controlling Public folder Size  (p567)

 

·        Move Public folders to a separate drive and enable quotas.

·        Possibly set up quotas to limit space for e-mails for users.

·        16GB size limit for the public store database, limit sizes of attachments.

·        You can set a KB limit for users.

·        NOTE:  If the Public Store is full, it will shut down the Exchange Server.

 

 

Favourites (p563)

 

·        The favourites shortcut in the Outlook program.

 

 

Hierarchy  (p547)

 

·          A public folder hierarchy develops when multiple folders are created.  Can get very

  complicated if there is a lot of nesting.

·          Also you should only let the Administrators create the top-level folders, or you can have

  a real mess on your hands.

·          Hierarchy always gets Replicated, but content does not always.

 

 

How to create a public folder tree?  (p547)

 

·          When you have another public folder within the public folder from the root, you have the

  lower folder with the actual items and attachments.

·          Must have permissions to do this.

 

 

Outlook, WebDAV, and HTTP and their usage of public folders (p546)

 

·          Outlook is a messaging system.  WebDAV is an extension of HTTP standard that allows

  remote authors to add, search, delete, or change files, directories, and documents and

  their properties through an HTTP connection.

 

 

 

Referrals  (p569)

 

·          Referrals are similar to transitive trusts.  If you allow referrals between Routing Group

  A and B, and B and C, then they are explicitly allowed between A and C.

·          Transitive Trusts, but only one way?

·          You should not allow referrals to routing groups over connections that do not support

  RPCs, such as routing groups connected through the Internet and firewalls.

 

 

Replication  (p546)

 

·          Public folder replication gives allows you to distribute multiple instances of a public folder to

  different Exchange 2000 servers and keep them synchronized.

·          You can also use the InterOrg Replication utility, which replicates public folders between

  Exchange Organizations.

 

 

Top-level folder creation (p547)

 

·         By default, all users can create top-level folders.

·          Top-Level folder creation should be restricted to a small group of administrators because

  these folders are at the top of All Public folders tree.

·          It is more nesting, but in a large corporation, it may be necessary.

·          Top-level folders are not mail-enabled so you must do this as a separate step.

 

 

What are the two ways to centralize administration of public folders?

(p547-550)

 

 

1.        Have a top-level public folder and another public folder below.  Then have all the files shared

  out in the lower public folder.  You will have better administrative control and flexibility over

  workgroup and workflow solutions.

2.        Also, have tight control over who is adding folders.  This permissions should only be given to

  Administrators, not your average Joe.

 

 

 

What are the two ways to mail-disable a public folder? (553)

 

1.      Use Exchange System manager.  Right-click the desired mail-enabled public folder, point to

All Tasks and then select the mail disable command.

2.      Outlook, Properties of Public Folders/Advanced/Advanced Tab/open additional mailboxes.

 

 

 

What does Mail-enabling a public folder do?  (549)

 

·          System Manager/Servers/folders/Right-click Public folders and Select “Mail Enable”.

·          By default, public folders are not mail-enabled, or they do not possess e-mail addresses.

·          Mail-enabling a public folder does not affect existing or new subfolders.  These subfolders

  do not inherit a mail-enabled state.

·          Use Outlook to post messages.

 

 

 

Which roles exist for public folders? (on screen, follow path below)

 

Open Exchange System Manager/Administrative Group/First Administrative Group/Folders/Internet

Newsgroup Properties, select Permissions/Client Permissions, and all of the roles are displayed.

 

 

·        Owner

·        Publishing Editor

·        Editor

·        Publishing Author

·        Author

·        Non editing Author

·        Reviewer

·        Contributor

·        None

 

 

 

Chapter 18:  Public Folder Replication

 

How to create a new top level Hierarchy?  What are its limitations?

 

·          Folders in System Manager New “Public Folder Tree”

·          Create an empty top-level public folder, then another public folder directly beneath it with the

  actual contents of the public folders.

·          Administrators should only have permissions to crate folders @ the root.  All users should not

  have this permission, or there is no control.

·          Not mail-enabled by default.

·          MAPI clients can’t see a secondary top-level clients.

 

 

 

Accidental Backfill (p604)

 

·        If you need to restore a deleted public folder from a recent backup, the messages are out of

date, but not for long.  The backfill process ensures that all public folder replicas are brought

up to date from the restored backup version. 

 

 

 

Controlling messages between routing groups

 

·        Set a GPO, and NTFS permissions, and apply a routing group.

·        Get rid of the public folder referrals.

 

 

 

Deleted vs Time expired messages (p602)

 

·          When you delete an object from a public folder, the object must be removed in all other

  locations.  Replicated to other servers that it is deleted.

·          When you use the Time Expired messages, it refers to the automatic deletion of public

  folder items through defined age limits.  Times, each server must remove.

 

 

Fault Tolerance (p581, 1036)

 

·          The assurance of data integrity when system failures occur.  A fault-tolerant system has the

  ability to either continue the operation without data loss or to shut down safely and recover

   at next restart.

·          You can have fault tolerance between multiple server.  If one of the servers is down you can

  pull information from another server, they should be the same due to replication.

 

 

How is a public folder message conflict resolved?

 

·          The conflict is posted to the public folder.  The conflict message is only a notification that the

  last design had been applied.

 

 

 

InterOrg Replication Utility (p582)

 

·          InterOrg Replication utility can be used if you are replicating public folder content between Organizations. 

·          Regular replication is supported within a single organization.

·          You need to run this utility on a dedicated Microsoft Windows 2000 workstation, which typically

  belongs to the Windows 2000 domain of the publishing Exchange 2000 server.

·          A tool needed is EXSCFG.EXE which is part of the InterOrg Replication utility.

 

 

 

Load Balancing  (p771)

 

·          If in a FE/BE environment, you can group all your front end systems together for load balancing

  using Microsoft Network Load Balancing or another high-performance hardware load-balancing

  solution as Cisco Local Director.

·          Load Balancing is simply distributing he load more evenly, so one server is not overloaded.

·          NLB (Network load balancing) and Round-robin.

 

 

 

Moving a public folder between server (p592)

 

·          You need to add a public folder replica to a new server and remove the old instance from the

  first machine. 

·          In the public folder’s replication tab, use the Add and Remove buttons for this purpose.

·          It may be a good idea to do a backup before doing this just in case.

 

 

 

PFRA (p604-605)

 

·          This is a complex process.  When you add replicas to a public store, the PFRA must fill the new

  instances.  If you remove a replica, the PFRA must stop sending replication messages to the

 affected public store.

·          The PFRA is responsible for maintaining a list of servers that is used to address replication

  message to the required remote Information Store services.

·          It is important to note that delivery confirmations are not exchanged between PFRAs because

  the e-mail-based transport is not suitable for sequencing and data acknowledgements.  A

  nondelivery Report may be the only sign that a replication message has not been delivered.

·          Tracks the storage.

 

 

 

Predecessor Change List (p600)

 

·          This permits the PFRA to detect folder replication conflicts.

·          It maintains a list of all Information Store services that have ever made changes to an

  object and their server-specific change counters.

 

 

 

Replicated public folders (p603)

 

·        Whenever a user modifies an item in a replicated public folder, a new change number is added

to the modified time stamp is updated, the predecessor change list is refreshed, and finally,

the public folder replication is initiated.

 

 

 

Schedule + Free/Busy Folder (p591)

 

·          Every public store holds a number of system folders not visible in the hierarchy.

·          Contains a subfolder per administrative group for Schedule+free/busy information.  It allows

  Outlook users to view availability information of other users when composing meeting requests.

 

 

 

Stand-alone Public folders (p579)

 

·          A single public folder consumes disk space on one server only; additional disk space for

  redundant folder copies is not required.

·          Because there is no replication delay, changes to the contents are seen immediately by users.

·          Works best in small business environments.

·          Disadvantage:  Single Point of Failure.

 

 

 

What is the downside of mailbox only servers?

 

·        They are tied up only handling mail requests, and they may be underutilized.

 

 

 

What are the three components of message state information?

 

·        Change Number

·        Change List

·        Time Stamp

 

 

 

Chapter 19:  Implementing Advanced Security

 

 

128-bit hash value  (p645)

 

·          The clients use a complex mathematical function to derive a unique 128-bit valve from

  the message that you want to sign.

 

 

 

Auditing – How is it set up?  (p620)

 

·          You must turn auditing on before you can use it, in Group Policy or Domain controller

  Security Policy, Active Directory Users and Computers.

·          Failure audits help to reveal break-in attempts that rely on password-guessing methods.

·          Auditing degrades the systems performance, so be careful to monitor and to review the logs.

 

 

 

DMZ – What is required to set it up?  (p624, 625)

 

·        1 server is the DMZ and you need 3 NIC cards in a DMZ

·        A DMZ is a type of perimeter network

·        The DMZ should not have internal mailboxes, because the DMZ is vulnerable to the Internet.

 

 

 

Exchange Administration Delegation Wizard (p1024)

 

·          An administrative tool to facilitate the delegation of control for Active Directory object,

  such as computers and OUs, to a user or group.

 

 

 

 

How can you recover a lost key? (p655)

 

·        Recover the key option from Active Directory Users and Computers.

 

 

 

How to exchange Sealed Messages (646)

 

·          In the “Message Options” dialog box, you need to select the “Encrypt Message Contents

and Attachments” Check Box.

 

 

How to move a KMS server?  (p658)

 

·        You should follow these steps:

 

1.      Back-up the KMS server

2.      Uninstall KMS

3.      Install KMS on the new server

4.      Restore the database to the new machine.

 

 

KMDatabase (p635)

 

·          KM maintains a database, which stores advanced security information for

  Exchange 2000 users.  This database can be found on the KMS Server under

 \Program Files\Exchsrvr\KMSData.

·          Only one KMS database can exist in an administrative group.

·          You should have the passwords locked up, and never loose them.

·          You can store them on paper, on the hard drive or on a floppy disks.

 

 

MAPI clients through firewalls (p626)

 

·          Be careful to let MAPI clients access to Exchange 2000 over the Internet.

·          You may want to configure the server that is exposed to the Internet as a Global

  Catalog Server.

·          You will have to open TCP port 135 across your firewall systems and configure

  static TCP ports for the Active Directory RPC interface and the Information Store service.

 

 

 

Multiple KM Passwords (p640)

 

·          Can be generated and written to a floppy text file named KMSERVER.PWD. or

  the hard disk or written down.

·          You must provide the password each time you enter the KMS properties, and even

  when you change the tabs.

·          The KM Server Password is 15 characters and it is autogenerated for certificates.

 

 

Sealed Message (p646)

 

·        During the sealing process, the contents of a message and all attachments are encrypted. 

·        The sealing process is initiated by clicking the Send button if you have elected to encrypt the message.

·        Can only be sent to Advanced Security, must be enabled.

 

Secret Key (p628)

 

·        Three are three types of keys:  Secret Key, Private Key and Public Key.

·        The secret key is generated and used to encrypt the message.

 

 

Secured Internet Connections (624)

·        Use SSL, only way to secure the Internet.

 

 

 

Signed Message (p645)

 

·         With Message signing, a message checksum is built, encrypted, and attached to the message. 

The receiving user builds a checksum and compares it to the decrypted original.

·         If the checksums are identical, the message has not been modified during transmission.

·         Both users must have a certificate and they must be digitally signed.

 

 

What is used to decrypt the Key Management Database Master

Encryption key?  (p660)

 

·          Drag them from Outlook Express to the desktop, open with Notepad, and replace the

  string octet-stream with pkcs7-mime).

 

 

 

What needs to be installed before you install KMS?  (p634)

 

·        Microsoft Exchange

·        Certificate Services (CA)

 

 

 

X.509 certificate contents (p629)

 

·          X.509 holds encryption keys, which contains information about supported encryption

  methods and ensure the legality of the keys.  DES is the default encryption protocol.

 

 

 

 

Chapter 20:  Microsoft Exchange 2000 Server Maintenance and

Troubleshooting:

 

 

.chk (p685, 686) (checkpoint file)

 

·          Needed for fault-tolerance, transaction-based ESE.

·          The checkpoint files are updated whenever ESE writes a particular transaction into a

  database, so the checkpoint always point to the last transaction that was transferred successfully.

 

 

 

.pat (p686, 687) (patch files)

 

·        Patch files such as PRIV1.PAT and PUB1.PAT.

·        Patch files should not exists during regular server operation. 

·        Patch files ensure that the current online backup represents the most recent state.

 

 

 

Backup types (p696-697)

 

·        There are 4 different types of online backups: 

 

1.      Full backup. 

2.      Incremental Backup

3.      Differential Backup

4.      Copy Backup.

 

NOTE:  If an offline backup, only when the server services are stopped.  Usually a Full Backup.

 

 

 

Circular logging (p687)

 

·          Means automatically deleting transaction log files and their entries.

·          Circular logging prevents duplicate consumption of disk space, but it is not

  compatible with sophisticated fault-tolerant configurations and several online backup types,

  which rely on the existence of transaction logs.

·          With Circular logging enabled you can only recover information included in the last full backup.

 

 

ESEUtil (p690)

 

·          To reduce the physical size of the database files, you need to use the database

  compaction tool ESEUtil.

·          Do not forget to perform a full backup before compating databases offline, just to be

  prepared in case ESEUTIL.EXE acts differently than expected.

·          Microsoft does not recommend this.

 

 

Forklifting (p709)

 

·          This is taking all contents of a server including mailboxes and moving them to a

  new server.

·          Use with caution and lots of preparation.  Make sure you do not dismantle the old

  server until the new one is fully operational.

 

 

Freezing messages (p678)

 

·        This means you keep the message in the queue of SMTP virtual server.  

·        The message cannot be delivered if it is frozen.             

·        When you unfreeze the message it will leave the queue, but there will be lots of traffic.

 

 

 

How is MSBackup different under Exchange?

 

 

·        MSBackup can backup online files.

 

 

 

How to defragment a database?  (p690)

 

·          You cannot prevent database defragmentation, it just happens normally over time.

·          However, it will slow down the server.  The Information Store automatically performs

  regular defragmentations during its Maintenance Cycles.  DOES NOT WORK!!!!!!!!!!

 

 

 

How to perform a hard recovery?  (p704)

 

·        If you forget to select the last Backup check box. You can not mount the backup, and it is useless.

 

 

 

ISINTEG (p691)

 

·          This is the Information Store Integrity Utility which eliminates database errors and problems

  in high-level data structures.  It can be found in the \Program Files\Exchsrvr\Bin directory. 

·          By default this utility does not fix the problems it just checks for table damage, incorrect

  reference counters, and nonreferenced items.

·          You can write its findings to a log file.

·          -f switch is the fix switch.

 

 

Last Backup Set check box   (go into exchange and find on screen)

 

·        You should not select the “Last Backup Set check box before” all incremental or differential

backups have been restored.  If you forget to activate this option for the last backup set, the

databases cannot be mounted.  And, if you cannot mount the database you cannot use it.

 

 

Message queues for troubleshooting (p678)

 

·        Check the queues regularly to verify that the system is functioning properly. 

·        Too many backlogged messages can indicate a configuration or performance problem.

 

 

MTACheck (p679-680)

 

·          This component is responsible for communication over X.400 Connectors and gateways to

  foreign messaging systems.

·          This component maintains its queue in the .dat files.

·          Temporary .dat files represent the actual content of messages that are currently located in an

  MTA message queue.

 

 

Online-backup (p696-697)

 

·        An online backup is performed when the server services are running or (online). 

·        A disadvantage of online backups is they do not include binary files or configuration data.

 

 

Res1.log (p686)

 

 

·          Reserve logs are an “emergency repository” for transactions.

·          Reserved logs are called RES1.LOG and RES2.LOG and can be found in the transaction

  log directories.  The log is 5MG in size.

·          They are created automatically when the databases are initialized because they cannot be

  created later when they are actually needed.

 

 

 

System Monitoring Options (p678)

 

·          System Monitor allows ongoing monitoring of SMTP-based messages.

·          You can define a period of time for the warning and the critical state.

·          When the queue grows continuously for the specified interval, Exchange 20000

  Server can send you a notification message.

 

 

 

Transaction log files (p688)

 

·          Separate transaction log files for each storage group, and place them on separate disks. 

  This is to provide some fault-tolerance.

·          1st Storage has the E000001.LOG and then E000002.LOG etc.

 

 

 

What is the easiest way to get as user mailbox for a user that you have recently deleted?

 

 

 

 

 

When do transaction logs get purged?  (p734)

 

·        When you use Full or incremental backups.

 

 

Where does the Message Tracking Center information come from?  (p674-675)

 

·          It comes from the network shares of each server that has been involved in a particular

  message transfer.

·          Message tracking is supported as long as the Manchester shares are directly reachable

  through a LAN connection and foreign messaging systems are not involved in the message transfer.

 

 

 

Chapter 22:  Microsoft Outlook Web Access

 

How do you get a FE server to support SSL (p770)

 

·        Default Web Server Certificates go to owner, Did in a lab.

 

 

What do you have to type in your web browser to access your OWA server

from home?  (p673)

 

·        DNS name

·        Server name/ user account

 

 

 

Why use OWA?  (763)         ** important **

 

·          HTML 3.2 version and Frames Compatible.

·          It has Web browser support.

·          OWA supports E-Mail, calendar features, and contact management, which represent

  essential information management features.

 

 

Which Outlook 2000 modules does OWA support?   (761)

 

 

·        Mailbox, contacts and calendars.

 

 

 

How to make OWA Secure?  (p771)

 

·          You can use SSL to encrypt the communication between the client and the front

  end server.

·          The SSL bulk encryption key is maintained on the server and lost if the client is redirected

  to another host by DNS.

·          It is impossible to work with S/MIME messages and OWA.

·          For security reasons, you should log out after each OWA session, close your Web

  browser, and log off.

 

 

 

NLB and SSL  (p771)

 

·          SSL must have a separate IP address.

·          Network Load Balancing.  A clustering feature of Microsoft Windows 2000 Advanced

  Server that can enhance the availability and scalability of IIS platforms such as IIS Web server.

·          SSL a communication standard developed by Netscape Communications that resides on top

  of TCP/IP and provides public key cryptography services to guarantee privacy over public

  networks.

 

 

Chapter 23:  Microsoft Exchange 2000 Microsoft Web Storage System

 

 

**** Synchronous occur before Asynchronous ****

 

 

Network Shares created in Exchange

 

·          Once you reboot the server, the public shared folder you set are gone.  A real pain,

  setting them up again.

 

 

How is a Word document stored in Exchange?  (p785)

 

·        Exipc stored in a .stm file.

 

 

How does Exchange render the view when a client is viewing Office

documents via IE? (p787)

 

·        HTML format, what client can receive in.

·        NOTE:  SQL needs 1GB of RAM.  If you need Exchange 2000 server and SQL server simultaneously.

 

 

 

What is the term used to describe how item properties are grouped in the

Web Storage System (p785-786)

 

·        Cluster.

 

 

 

 

EXWForms.DLL (p794)

 

 

·          EXWFORM.DLL is not required to fill the Web page because ASPs can retrieve item

  properties themselves.

·          Vacation forms.  Synchronized and asynchronized.

 

 

 

OTHER:

 

·        .edb   Exchange Database

·        .stm  Exchange streaming databases

·        ODE – HTTP, URL formats

·        DMZ.  Do not place important services on a DMZ.  You may need to put DNS on the DMZ.

 

 

 

******** FINISHED  LAST MICROSOFT BOOK       

                                  YIPPEE!!!!!!!*********