FINAL EXAM REVIEW
CHAPTERS 11-20, 22, 23
Chapter 11:
Internet-Based Client Access
POP3
features and abilities (p345)
· POP3 is a messaging protocol that defines commands to download messages
· from a host.
· It is read-only protocol. Used for receiving E-Mails CANNOT send E-Mails.
· To send messages, POP3 users rely on SMTP.
· POP3 commands are not case sensitive. Sent Clear Text.
· There are three states: Authorization, Transaction and Update
· Advantages: Universal, well known.
· Port # 110, SSL port 995
IMAP4 Features and abilities (p348)
· IMAP4 is a modern Internet protocol that allows you to access all kinds of
server-based messaging folders.
· There are 4 session states: Non-Authenticated, Authenticated, Selected,
and Logout States.
· IMAP4 commands are case-insensitive strings or printable ASCII characters,
which consist of a tag followed by a keyword and its arguments.
· Untagged responses show in the form of an * asterisk.
· Advantage: Synchronization, Multiple Profiles, and easy to program.
· Uses port #143 SSL port 993
OWA
Features and abilities (p763)
· OWA supports e-mail, calendar features, and contact management, which represent
essential information management features.
· OWA requires Microsoft Windows 2000 Server and Internet Information Services (IIS) 5.0
· OWA components are placed in the \Program Files\Exchsrvr\exchweb directory.
· Port #80, SSL port #443
· HTML 3.2 or greater version
· OWA can use Multimedia Messaging, if your workstation is equipped with audio and
video features.
· Advantage: Remote access (laptop users), Macintosh or UNIX clients need OWA,
they have no MAPI.
Why
would you choose each of the above?
· You would have look at the advantages and disadvantages of each. POP3 has limitations
· for receiving E-mails, as it cannot.
· IMAP4. More up-to-date version. There are 4 session states: Non-Authenticated,
· Authenticated, Selected, and Logout States.
· OWA. Supports Multimedia. Supports Calendars, e-mails etc.
Chapter 12:
Management Tools for Microsoft Exchange 2000 Server
Delete
a user’s mailbox (p448)
· Active Directory Users and Computers, select a user or create a new user. Then Right click on the
user and select “Exchange Tasks”. You have three options 1. Move Mailbox, 2. Delete Mailbox,
· Enable Instant Messaging.
· Held by default for 30 days.
How
to set up a policy (p400)
and then selecting System Policies Container. Is not there when you install Exchange, a large mistake
by Microsoft, it should have been installed.
How
does a policy conflict occur?
the Deny as an option. Exchange lets you know with an error message.
Which
containers are hidden by default? How do
you enable them?
to the first administrative group by right-clicking the group, pointing to New and then selecting System
a new server, public store, and mailbox.
Chapter 13:
Creating and Managing Recipients
Exchange
Task Wizard (p417)
and enabling Instant Messaging.
and the tabs on the menu are no longer available, and there is a checkbox in Delete Exchange
How can you create a secondary address for a user? (Note: there are
at least three different ways)
can choose the New button, and create another address.
How
do you designate an expansion server for a user? (p1035)
· An Exchange 2000 server designated for distribution group expansion. The expansion
server can be defined per mail-enabled group in each group’s Exchange Advanced tab.
· Must be in the Local Administrators Group. Reduces E-MAIL traffic, send one e-mail not 500.
· Expansion Server is the more power machine as far as hardware goes.
How
do you mail-enable a user?
· When you create the user, ensure that the check box to create a mailbox is ticked.
Exchange Tasks mailenable if you have a foreign mail system.
LDIFDE (P435-436, 426)
supports batch operations based on LDAP Directory Interface Format (LDIF) files.
Recipient
Update Service—What does it do?
(p434-435)
stored in the database and all local addresses receive a pointer to this particular object. This save
1000 e-mails from being sent, instead it only sends 1.
What are the differences between mail-enabled recipient, mailbox-enabled
recipient, and a mail-enabled contact?
associated with an Exchange mailbox.
and receive message in an Exchange organization.
What is a recipient? (p409-438)
· Recipient object in a directory that provides information, such as e-mail addresses about a
destination that can receive e-mail messages. In active Directory, recipient objects are mail-
box enabled users accounts or mail-enabled user accounts or contacts.
· Recipient objects are replicated to the Global Catalog to make them available in server-based
address books.
· Public folders can be recipients
What
is CSVDE used for? (p426, 436-437)
What is special about the Exchange Advanced tab in Active Directory
Users and computers?
· You can “Hide from Exchange address lists”. The name will not be available to the users.
You assign mailbox rights to it.
Chapter 14:
Managing Server Configuration
Adding and moving servers between Administrative Groups? (p459)
· You can add servers to an administrative group only during setup.
· It is not possible to move servers between administrative groups.
· You can ADSI Edit to move later, but it is a real headache, sort of like editing the Schema.
Enabling
Circular Logging: (p687)
· It means automatically deleting transaction log files and their entries. Circular logging
prevents duplicate consumption of disk space, but is it not compatible with sophisticated
fault-tolerant configurations and several online backup types, which rely on the existence of
transaction logs.
· With Circular logging enabled, you can only recover information included in the last full backup.
· Really only good in Public Stores, to enable right-click properties.
How can you improve server performance? (p446)
How
can your users access Internet e-mail addresses when your DNS
servers
are not integrated with the Internet?
Offline Address lists (p464, 465)
· The offline address lists container holds the Default Offline Address List objects that
provides the information from the Default Global Address Lists to remote users.
· Usually for Laptop users.
· Offline Address Lists must be generated on the server before clients can download them.
· Offline Address Lists will be unavailable until the next store maintenance cycle has recreated
the required public folder on the new server
·
By
default, this will happen at
Removing
an Exchange server from AD? (p460)
replicate existing public folders.
All Tasks, and clicking Remove Server.
Transaction Log Location (p688)
What are the names and functions of the sub containers found in the
Administrative Group? (p459)
To grant user permissions you simply add the desired Windows 2000 account to the list of
accounts with permissions for the corresponding administrative group object.
What
are the setup procedures for Full Text Indexing and why would
you
do it? (p452, 453, 454)
full-text catalog. Then, you can make the catalog available for full-text searches by clients.
Then you must define update and rebuild intervals to ensure that the search information is
always up to date.
What
are the steps in creating Mailbox only servers? (p445-451)
Prerequisites:
Which types of address lists
can Outlook access? (p464)
|
|
|
|
|
|
storage groups, each capable of managing up to 5 individual groups.
from the database file. Activating this option affects server performance.
database pages is chosen.
Chapter 15:
SMTP Transport Configuration
How can you optimize connection speeds? (p483)
1000 concurrent connections to multiple Internet domains and deliver messages to them
at the same time. Anonymous.
IMAP4 (p348)
· IMAP4 is a modern Internet protocol that allows you to access all kinds
of server-based messaging folders.
· You are not restricted to INBOX access only as with POP3.
· There are 4 sessions: Non-Authenticated, Authenticated, Selected, and Logout states.
· IMAP4 clients connect to TCP port 143 at the server.
· IMAP4 commands are case-insensitive strings of printable ASCII characters.
· Multiple protocols
MetaEdit
(p78-79)
· MetaEdit 2.0 utility allows you to configure properties in the metabase. Edit the
metabase using the MetaEdit directly only if you cannot adjust the settings in the
Internet Service Manager, System Manager, or other user interface.
· Be careful, only Metaedit if you are stuck.
POP3 (p345-348)
· POP3 is a messaging protocol that defines commands to download messages from a host.
· It is read-only protocol. Used for receiving E-Mails CANNOT send E-Mails.
·
To send messages, POP3 users rely on SMTP.
· POP3 commands are not case sensitive. Sent Clear Text.
· There are three states: Authorization, Transaction and Update
· Outlook Express keeps mail on the server
Relay Host (p481)
· It is up to the host to deliver the nondeliverable messages to the specified host.
· A relay host can also be known as a SMTP host.
· Check box in Server Properties “General Tab”.
· Access Tab, go into Relay option under Virtual Server.
Smart
Host (p483, 517-518)
· You can specify the smart host in the Advanced Delivery dialog box the
Delivery tab’s Advanced button.
· A smart host is a server that is able to receive messages from relaying
systems and send them to the proper destinations on behalf of the relayers.
· Internet Service Providers (ISPs) often provide their customers with access
to a central smart host that handles the message transfer.
· Smart Hosts are relayed through a proxy or a firewall.
SMTP
Virtual Server—How to set one up? What
do they do? (p475)
· By default, every Exchange 2000 server relies on one SMTP virtual server for its
communication with other servers in the local routing group.
· Each virtual server must use a unique TCP socket (that is IP address and TCP port)
· Increases scalability, different size messages
· Outside connector, and external DNS and Recipient Policy.
TNEF (p598)
· The format of a binary message attachment that is used to package message properties
not understood by intermediate messaging systems in the delivery path. In most cases,
the binary attachment is named WINMAIL.DAT.
What is the Forward All Mail With Unresolved Recipients To Host text box used for?
· Other machine generates a NDR and sends back. Be careful not to create a loop.
· Is a binary attachment called WINMAIL.DAT which contains all the information in the
TNEF. The WINMail.dat file is usually garbage.
· All MAPI clients.
Chapter 16:
Message Routing Administration
· After a connector is tagged as unavailable, the original bridgehead server
continues to retry the connection at 60-second intervals even if no messages are
awaiting transfer.
OR
· By default, hierarchy replication generates an e-mail message 60 seconds after
the last modification has occurred.
Bridgehead Servers (p512-513)
· Multiple bridgehead servers can guarantee message delivery even if a particular
server is shut down. Because it provides many advantages, it is typically the preferred connector.
· Remote Brideghead servers are specified in the Remote Bridgeheads tab.
· Multiple bridgeheads provide fault tolerance and load balancing.
· By default, all servers are Bridgehead servers, installed that way.
· Service Pack 3 or better.
· Have an Active Directory Connector (even if same organization).
· If you use RC uses RPC not SMTP.
· Site Replication Services.
ETRN (p519)
· An extension of SMTP that allows an SMTP host to request the message
transfer from another SMTP host.
· The SMTP Connector supports the ETRN command completely.
GWART (p530)
· Earlier versions of Exchange use GWART (Gateway Address Routing Table) for
message routing.
· GWART is generated and replicated to Exchange Server 2000.
· Exchange 2000 Server generates a GWART containing all message routes and their cost
factors only for the purposes of backward compatibility.
· Message routing in Exchange 2000 server uses a link state table (LST) instead of a GWART.
Hierarchical routing group (p507)
· In this structure, a central group of hub servers controls the entire message transfer
between subordinated groups, known as spokes. See picture page 507.
· This arrangement is very reliable, scalable, and resilient.
· Multiple hub server share the workload and provide redundancy for well-defined message
paths between all locations.
LSI
(p670)
· Link State Information is Information that Microsoft Exchange 2000 Server uses for the
purposes of message routing to determine whether connectors are working.
· LSI and system monitors rely on the System Attendant services and the Microsoft
Exchange Routing Engine.
· Links are either up or down. Will not send to a down state.
Mesh Routing Group (p508/509)
· Full-Mesh connects point A to B and A to C and A to D and so on. There is a direct
connection, therefore there is redundancy, and the connections are quicker.
· Mesh is difficult to troubleshoot, because there is lots of traffic and lots of wiring.
· Not physical topology. Only 70 routing connectors, not 70 cables of wires.
Optimization of WAN traffic (p505)
·
If a company relies of WAN connections, it
will be desirable to control network connections.
·
Scheduling times, TTL. Quality of Service, IIS likes Quality of
Service.
·
You can optimize a WAN link by adding a
dedicated bridgehead server, which can act as a
concentrators for message traffic over the WAN connections between
routing groups.
RPG (p512)
·
Routing
Group Connector is the easiest connector to install and more powerful than the
others.
·
High
level of fault tolerance because it supports multiple source and destination
bridgehead servers.
·
Multiple
bridgehead servers can guarantee message delivery even if a particular server
is shut down.
·
Connectors
only go one-way.
Routing Group Master (p538)
·
The master server is normally the first
server in a routing group.
·
If this server fails or is taken offline,
link state information is no longer propagated within the
routing group.
·
If Routing Group Master is down, updates are
not kept up-to-date.
Routing Groups (p503)
·
Is a collection of Exchange 2000 Servers that
typically share a permanent, reliable, high-
bandwidth network connection.
·
Routing Groups rely on connectors to
communicate between multiple groups.
·
Why use Routing Groups? Only for Load Balancing!
SMTP Connectors (p516)
·
Is to Connect an Exchange 2000 organization
to foreign SMTP systems, such as
SMTP hosts on the internet or other
Exchange 2000 organizations.
What are the requirements for a Microsoft Exchange 2000 messaging
connector that connects routing groups? (p541)
·
You can use RGCs, SMTP connectors, or X.400
connectors to connect routing
groups in Exchange 2000.
·
DNS unique name, must support link state
information.
·
Able to accept format in Rich Text.
X.400 (p522-523)
·
Using an X.400 connector, you can connect
Exchange 2000 server to any foreign X.400
system and to earlier versions of Exchange Server and Exchange 2000
Server in different
routing groups or organizations.
·
Backward compatibility, for older systems.
·
Best for restart, uses LDAP, needs MTA Stack
(unidirectional)
Chapter 17:
Public Folder Management
16GB (p567)
·
Public
store databases have a size limit of 16GB (Standard Edition) or no internal
size limit
·
(Enterprise
Edition), in which case they are restricted only by the capacity of the
server’s local disk space.
Affinity (p569)
·
In relation to Public Folders. The cost between routing groups. The lowest affinity cost determines
the most preferred routing group if multiple routing groups exist.
·
Goes to home server and if you do not choose
affinity it will search randomly for another server.
Changing permissions of public folders (p561-563)
·
NTFS permissions are best for controlling
security
·
Permissions can be inherited from a higher
level, such as the organization, administrative group,
public folder hierarchy and parent folder.
·
When the parent container has permissions, by
default all child objects inherit the permissions.
·
If you change permissions (even deny), if someone has a shortcut set up to link to that folder
they still have access. Stupid
loophole on Microsofts behalf.
Controlling Public folder Size (p567)
·
Move
Public folders to a separate drive and enable quotas.
·
Possibly
set up quotas to limit space for e-mails for users.
·
16GB
size limit for the public store database, limit
sizes of attachments.
·
You
can set a KB limit for users.
·
NOTE:
If the Public Store is full, it will shut down the Exchange Server.
Favourites (p563)
·
The
favourites shortcut in the Outlook program.
Hierarchy (p547)
·
A public folder hierarchy develops when
multiple folders are created. Can get
very
complicated if there is a lot of nesting.
·
Also you should only let the Administrators
create the top-level folders, or you can have
a real mess on your hands.
·
Hierarchy always gets Replicated, but content
does not always.
How to create a public folder tree? (p547)
·
When you have another public folder within
the public folder from the root, you have the
lower folder with the actual items and attachments.
·
Must have permissions to do this.
Outlook, WebDAV, and HTTP and their usage of public folders (p546)
·
Outlook is a messaging system. WebDAV is an extension of HTTP standard that
allows
remote authors to add, search, delete, or change files, directories, and
documents and
their properties through an HTTP connection.
Referrals (p569)
·
Referrals are similar to transitive
trusts. If you allow referrals between
Routing Group
A and B, and B and C, then they are explicitly allowed between A and C.
·
Transitive Trusts, but only one way?
·
You should not allow referrals to routing
groups over connections that do not support
RPCs, such as routing groups connected through the Internet and
firewalls.
Replication (p546)
·
Public folder replication gives allows you to
distribute multiple instances of a public folder to
different Exchange 2000 servers and keep them synchronized.
·
You can also use the InterOrg Replication
utility, which replicates public folders between
Exchange Organizations.
Top-level folder creation (p547)
·
By default, all users can create top-level
folders.
·
Top-Level folder creation should be
restricted to a small group of administrators because
these folders are at the top of All Public folders tree.
·
It is more nesting, but in a large
corporation, it may be necessary.
·
Top-level folders are not mail-enabled so you
must do this as a separate step.
What are the two ways to centralize administration of public folders?
(p547-550)
1.
Have a top-level public folder and another
public folder below. Then have all the
files shared
out in the lower public folder.
You will have better administrative control and flexibility over
workgroup and workflow solutions.
2.
Also, have tight control over who is adding
folders. This permissions should only be
given to
Administrators, not your average Joe.
What are the two ways to mail-disable a public folder? (553)
1.
Use
Exchange System manager. Right-click the
desired mail-enabled public folder, point to
All Tasks and then select the mail disable command.
2.
Outlook,
Properties of Public Folders/Advanced/Advanced Tab/open additional mailboxes.
What does Mail-enabling a public folder do? (549)
·
System Manager/Servers/folders/Right-click Public
folders and Select “Mail Enable”.
·
By default, public folders are not
mail-enabled, or they do not possess e-mail addresses.
·
Mail-enabling a public folder does not affect
existing or new subfolders. These
subfolders
do not inherit a mail-enabled state.
·
Use Outlook to post messages.
Which roles exist for public folders? (on screen, follow path below)
Open
Exchange System Manager/Administrative Group/First Administrative
Group/Folders/Internet
Newsgroup
Properties, select Permissions/Client Permissions, and all of the roles are
displayed.
·
Owner |
·
Publishing Editor |
·
Editor |
·
Publishing Author |
·
Author |
·
Non editing Author |
·
Reviewer |
·
Contributor ·
None |
Chapter 18:
Public Folder Replication
How to create a new top level Hierarchy? What are its limitations?
·
Folders in System Manager New “Public Folder
Tree”
·
Create an empty top-level public folder, then
another public folder directly beneath it with the
actual contents of the public folders.
·
Administrators should only have permissions
to crate folders @ the root. All users
should not
have this permission, or there is no control.
·
Not mail-enabled by default.
·
MAPI clients can’t see a secondary top-level clients.
Accidental Backfill (p604)
·
If
you need to restore a deleted public folder from a recent backup, the messages
are out of
date, but not for long. The backfill process ensures that all public
folder replicas are brought
up to date from the restored backup
version.
Controlling messages between routing groups
·
Set
a GPO, and NTFS permissions, and apply a routing group.
·
Get
rid of the public folder referrals.
Deleted vs Time expired messages (p602)
·
When you delete an object from a public
folder, the object must be removed in all other
locations. Replicated to other
servers that it is deleted.
· When you use the Time Expired messages, it refers to the automatic deletion of public
folder items through defined age limits. Times, each server must remove.
Fault Tolerance (p581, 1036)
·
The assurance of data integrity when system
failures occur. A fault-tolerant system
has the
ability to either continue the operation without data loss or to shut
down safely and recover
at next restart.
·
You can have fault tolerance between multiple
server. If one of the servers is down
you can
pull information from another server, they should be the same due to
replication.
How is a public folder message conflict resolved?
·
The conflict is posted to the public
folder. The conflict message is only a
notification that the
last design had been applied.
InterOrg Replication Utility (p582)
·
InterOrg Replication utility can be used if
you are replicating public folder content between Organizations.
·
Regular replication is supported within a
single organization.
·
You need to run this utility on a dedicated
Microsoft Windows 2000 workstation, which typically
belongs to the Windows 2000 domain of the publishing Exchange 2000
server.
·
A tool needed is EXSCFG.EXE which is part of
the InterOrg Replication utility.
Load Balancing (p771)
·
If in a FE/BE environment, you can group all
your front end systems together for load balancing
using Microsoft Network Load Balancing or another high-performance
hardware load-balancing
solution as Cisco Local Director.
·
Load Balancing is simply distributing he load
more evenly, so one server is not overloaded.
·
NLB (Network load balancing) and Round-robin.
Moving a public folder between server (p592)
·
You need to add a public folder replica to a
new server and remove the old instance from the
first machine.
·
In the public folder’s replication tab, use
the Add and Remove buttons for this purpose.
·
It may be a good idea to do a backup before
doing this just in case.
PFRA (p604-605)
·
This is a complex process. When you add replicas to a public store, the
PFRA must fill the new
instances. If you remove a
replica, the PFRA must stop sending replication messages to the
affected public store.
·
The PFRA is responsible for maintaining a
list of servers that is used to address replication
message to the required remote Information Store services.
·
It is important to note that delivery
confirmations are not exchanged between PFRAs because
the e-mail-based transport is not suitable for sequencing and data
acknowledgements. A
nondelivery Report may be the only sign that a replication message has
not been delivered.
·
Tracks the storage.
Predecessor Change List (p600)
·
This permits the PFRA to detect folder
replication conflicts.
·
It maintains a list of all Information Store
services that have ever made changes to an
object and their server-specific change counters.
Replicated public folders (p603)
·
Whenever
a user modifies an item in a replicated public folder, a new change number is
added
to the modified time stamp is
updated, the predecessor change list is refreshed, and finally,
the public folder replication is
initiated.
Schedule + Free/Busy Folder (p591)
·
Every public store holds a number of system
folders not visible in the hierarchy.
·
Contains a subfolder per administrative group
for Schedule+free/busy information. It
allows
Outlook users to view availability information of other users when
composing meeting requests.
Stand-alone Public folders (p579)
·
A single public folder consumes disk space on
one server only; additional disk space for
redundant folder copies is not required.
·
Because there is no replication delay,
changes to the contents are seen immediately by users.
·
Works best in small business environments.
·
Disadvantage: Single Point
of Failure.
What is the downside of mailbox only servers?
·
They
are tied up only handling mail requests, and they may be underutilized.
What are the three components of message state information?
·
Change
Number
·
Change
List
·
Time
Stamp
Chapter 19:
Implementing Advanced Security
128-bit hash value
(p645)
·
The clients use a complex mathematical
function to derive a unique 128-bit valve from
the message that you want to sign.
Auditing – How is it set up? (p620)
·
You must turn auditing on before you can use
it, in Group Policy or Domain controller
Security Policy, Active Directory Users and Computers.
·
Failure audits help to reveal break-in
attempts that rely on password-guessing methods.
·
Auditing degrades the systems performance, so
be careful to monitor and to review the
logs.
DMZ – What is required to set it up? (p624, 625)
·
1
server is the DMZ and you need 3 NIC cards in a DMZ
·
A
DMZ is a type of perimeter network
·
The
DMZ should not have internal mailboxes, because the DMZ is vulnerable to the
Internet.
Exchange Administration Delegation Wizard (p1024)
·
An administrative tool to facilitate the
delegation of control for Active Directory object,
such as computers and OUs, to a user or group.
How can you recover a lost key? (p655)
·
Recover the key option from Active Directory Users
and Computers.
How to exchange Sealed Messages (646)
·
In the “Message Options” dialog box, you need
to select the “Encrypt Message Contents
and Attachments” Check Box.
How to move a KMS server? (p658)
·
You
should follow these steps:
1. Back-up the KMS server
2. Uninstall KMS
3. Install KMS on the new server
4. Restore the database to the new
machine.
KMDatabase (p635)
·
KM maintains a database, which stores
advanced security information for
Exchange 2000 users. This
database can be found on the KMS Server under
\Program Files\Exchsrvr\KMSData.
·
Only one KMS database can exist in an
administrative group.
·
You should have the passwords locked up, and
never loose them.
·
You can store them on paper, on the hard drive
or on a floppy disks.
MAPI clients through firewalls (p626)
·
Be careful to let MAPI clients access to
Exchange 2000 over the Internet.
·
You may want to configure the server that is
exposed to the Internet as a Global
Catalog Server.
·
You will have to open TCP port 135 across
your firewall systems and configure
static TCP ports for the Active Directory RPC interface and the
Information Store service.
Multiple KM Passwords (p640)
·
Can be generated and written to a floppy text
file named KMSERVER.PWD. or
the hard disk or written down.
·
You must provide the password each time you
enter the KMS properties, and even
when you change the tabs.
·
The KM Server Password is 15 characters and
it is autogenerated for certificates.
Sealed Message (p646)
·
During
the sealing process, the contents of a message and all attachments are
encrypted.
·
The
sealing process is initiated by clicking the Send button if you have elected to
encrypt the message.
·
Can
only be sent to Advanced Security, must be enabled.
Secret Key (p628)
·
Three
are three types of keys: Secret Key,
Private Key and Public Key.
·
The
secret key is generated and used to encrypt the message.
Secured Internet Connections (624)
·
Use
SSL, only way to secure the Internet.
Signed Message (p645)
·
With Message signing, a message checksum is
built, encrypted, and attached to the message.
The receiving user builds a
checksum and compares it to the decrypted original.
·
If the checksums are identical, the message
has not been modified during transmission.
· Both users must have a certificate and they must be digitally signed.
What is used to decrypt the Key Management Database Master
Encryption key? (p660)
·
Drag them from Outlook Express to the
desktop, open with Notepad, and replace the
string octet-stream with pkcs7-mime).
What needs to be installed before you install KMS? (p634)
·
Microsoft
Exchange
·
Certificate
Services (CA)
X.509 certificate contents (p629)
·
X.509 holds encryption keys, which contains information
about supported encryption
methods and ensure the legality of the keys. DES is the default encryption protocol.
Chapter
20: Microsoft Exchange 2000 Server
Maintenance and
Troubleshooting:
.chk (p685, 686) (checkpoint file)
·
Needed for fault-tolerance, transaction-based
ESE.
·
The checkpoint files are updated whenever ESE
writes a particular transaction into a
database, so the checkpoint always point to the last transaction that
was transferred successfully.
.pat (p686, 687) (patch files)
·
Patch
files such as PRIV1.PAT and PUB1.PAT.
·
Patch
files should not exists during regular server operation.
·
Patch
files ensure that the current online backup represents the most recent state.
Backup types (p696-697)
·
There
are 4 different types of online backups:
1. Full backup.
2. Incremental Backup
3. Differential Backup
4. Copy Backup.
NOTE:
If an offline backup, only when the server services are stopped. Usually a Full Backup.
Circular logging (p687)
·
Means automatically deleting transaction log
files and their entries.
·
Circular logging prevents duplicate
consumption of disk space, but it is not
compatible with sophisticated fault-tolerant configurations and several
online backup types,
which rely on the existence of transaction logs.
·
With Circular logging enabled you can only
recover information included in the last full backup.
ESEUtil (p690)
·
To reduce the physical size of the database
files, you need to use the database
compaction tool ESEUtil.
·
Do not forget to perform a full backup before
compating databases offline, just to be
prepared in case ESEUTIL.EXE acts differently than expected.
·
Microsoft does not recommend this.
Forklifting (p709)
·
This is taking all contents of a server
including mailboxes and moving them to a
new server.
·
Use with caution and lots of
preparation. Make sure you do not
dismantle the old
server until the new one is fully operational.
Freezing messages (p678)
·
This
means you keep the message in the queue of SMTP virtual server.
·
The
message cannot be delivered if it is frozen.
·
When
you unfreeze the message it will leave the queue, but there will be lots of
traffic.
How is MSBackup different under Exchange?
·
MSBackup
can backup online files.
How to defragment a database? (p690)
·
You cannot prevent database defragmentation,
it just happens normally over time.
·
However, it will slow down the server. The Information Store automatically performs
regular defragmentations during its Maintenance Cycles. DOES
NOT WORK!!!!!!!!!!
How to perform a hard recovery? (p704)
·
If
you forget to select the last Backup check box. You can not mount the backup,
and it is useless.
ISINTEG (p691)
·
This is the Information Store Integrity
Utility which eliminates database errors and problems
in high-level data structures. It
can be found in the \Program Files\Exchsrvr\Bin directory.
·
By default this utility does not fix the
problems it just checks for table damage, incorrect
reference counters, and nonreferenced items.
·
You can write its findings to a log file.
·
-f switch is the fix switch.
Last Backup Set check box (go into exchange and find on screen)
·
You
should not select the “Last Backup Set check box before” all incremental or
differential
backups have been restored. If you forget to activate this option for the
last backup set, the
databases cannot be mounted. And, if you cannot mount the database you
cannot use it.
Message queues for troubleshooting (p678)
·
Check
the queues regularly to verify that the system is functioning properly.
·
Too
many backlogged messages can indicate a configuration or performance problem.
MTACheck (p679-680)
·
This component is responsible for communication
over X.400 Connectors and gateways to
foreign messaging systems.
·
This component maintains its queue in the
.dat files.
·
Temporary .dat files represent the actual
content of messages that are currently located in an
MTA message queue.
Online-backup (p696-697)
·
An
online backup is performed when the server services are running or
(online).
·
A
disadvantage of online backups is they do not include binary files or
configuration data.
Res1.log (p686)
·
Reserve logs are an “emergency repository”
for transactions.
·
Reserved logs are called RES1.LOG and
RES2.LOG and can be found in the transaction
log directories. The log is 5MG in size.
·
They are created automatically when the
databases are initialized because they cannot be
created later when they are actually needed.
System Monitoring Options (p678)
·
System Monitor allows ongoing monitoring of
SMTP-based messages.
·
You can define a period of time for the
warning and the critical state.
·
When the queue grows continuously for the
specified interval, Exchange 20000
Server can send you a notification message.
Transaction log files (p688)
·
Separate transaction log files for each
storage group, and place them on separate disks.
This is to provide some fault-tolerance.
·
1st Storage has the E000001.LOG
and then E000002.LOG etc.
What is the easiest way to get as user mailbox for a user that you have recently deleted?
When do transaction logs get purged? (p734)
·
When
you use Full or incremental backups.
Where does the Message Tracking Center information come from? (p674-675)
·
It comes from the network shares of each
server that has been involved in a particular
message transfer.
·
Message tracking is supported as long as the
through a LAN connection and foreign messaging systems are not involved
in the message transfer.
Chapter 22:
Microsoft Outlook Web Access
How do you get a FE server to support SSL (p770)
·
Default
Web Server Certificates go to owner, Did in a lab.
What do you have to type in your web browser to access your OWA server
from home? (p673)
·
DNS
name
·
Server
name/ user account
Why use OWA? (763) ** important **
·
HTML 3.2 version and Frames
Compatible.
·
It has Web browser support.
·
OWA supports E-Mail, calendar features, and
contact management, which represent
essential information management features.
Which Outlook 2000 modules does OWA support? (761)
·
Mailbox,
contacts and calendars.
How to make OWA Secure? (p771)
·
You can use SSL to encrypt the communication
between the client and the front
end server.
·
The SSL bulk encryption key is maintained on
the server and lost if the client is redirected
to another host by DNS.
·
It is impossible to work with S/MIME messages
and OWA.
·
For security reasons, you should log out
after each OWA session, close your Web
browser, and log off.
NLB and SSL (p771)
·
SSL must have a separate IP address.
·
Network Load Balancing. A clustering feature of Microsoft Windows
2000 Advanced
Server that can enhance the availability and scalability of IIS
platforms such as IIS Web server.
·
SSL a communication standard developed by
Netscape Communications that resides on top
of TCP/IP and provides public key cryptography services to guarantee
privacy over public
networks.
Chapter 23:
Microsoft Exchange 2000 Microsoft Web Storage System
**** Synchronous occur before Asynchronous ****
Network Shares created in Exchange
·
Once you reboot the server, the public shared
folder you set are gone. A real pain,
setting them up again.
How is a Word document stored in Exchange? (p785)
·
Exipc
stored in a .stm file.
How does Exchange render the view when a client is viewing Office
documents via IE? (p787)
·
HTML
format, what client can receive in.
·
NOTE: SQL needs 1GB of RAM. If you need Exchange 2000 server and SQL
server simultaneously.
What is the term used to describe how item properties are grouped in the
Web Storage System (p785-786)
·
Cluster.
EXWForms.DLL (p794)
·
EXWFORM.DLL is not required to fill the Web
page because ASPs can retrieve item
properties themselves.
·
Vacation forms. Synchronized and asynchronized.
OTHER:
·
.edb Exchange Database
·
.stm Exchange streaming databases
·
ODE
– HTTP, URL formats
·
DMZ. Do not place important services on a
DMZ. You may need to put DNS on the DMZ.
******** FINISHED LAST MICROSOFT BOOK
YIPPEE!!!!!!!*********