Very, very disappointed by this book.
The editing was just plain shocking, in several instances it uses the incorrect version of Exchange, eg, Exchange 2007 introduced the Unified Messaging Role and Exchange 2007 has built on that
In the section on securing Exchange with ISA the author uses the wrong product altogether changing Exchange 2010 for SharePoint.
The book is about 500 pages too long as well. Every time a concept is discuses it seems that the authors felt the need to define it EVERY TIME. This lead to me skipping large portions of the book because it had already been discussed in earlier chapters.
I would recommend getting the Pocket Administrators Consultant as that is a significantly better book.
Author(s): Rand Morimoto, Michael Noel, Chris Amaris, Andrew Abbate, Mark Weinhardt
Series: Unleashed
Edition: 1
Publisher: Sams
Year: 2010
Language: English
Pages: 1307
City: Indianapolis, Ind
Table of Contents......Page 6
Introduction......Page 50
What Is Exchange Server 2010?......Page 54
What's New in Exchange Server 2010?......Page 62
Understanding Exchange Server 2010 Server Roles and Mail Flow......Page 75
Understanding the Importance of Active Directory for an Exchange Server 2010 Environment......Page 80
Installing and Migrating to Exchange Server 2010......Page 81
Managing and Administering Exchange Server 2010......Page 82
Best Practices......Page 83
2 Planning, Prototyping, Migrating, and Deploying Exchange Server 2010......Page 86
Initiation, Planning, Testing, and Pilot: The Four Phases to the Upgrade......Page 87
Initiation Phase: Defining the Scope and Goals......Page 89
Initiation Phase: Creating the Statement of Work......Page 95
Planning Phase: Discovery......Page 100
Planning Phase: Creating the Design Document......Page 102
Creating the Migration Document......Page 106
The Prototype Phase......Page 111
The Pilot Phase: Deploying Services to a Limited Number of Users......Page 114
The Production Migration/Upgrade......Page 116
Summary......Page 117
Best Practices......Page 118
Planning for Exchange Server 2010......Page 120
Understanding AD Design Concepts for Exchange Server 2010......Page 125
Determining Exchange Server 2010 Placement......Page 129
Configuring Exchange Server 2010 for Maximum Performance and Reliability......Page 132
Securing and Maintaining an Exchange Server 2010 Implementation......Page 135
Best Practices......Page 136
Designing Active Directory for Exchange Server 2010......Page 138
Determining Hardware and Software Components......Page 141
Designing Exchange Server Roles in an Exchange Server Environment......Page 142
Designing Exchange Server Infrastructure......Page 146
Integrating Client Access into Exchange Server 2010 Design......Page 148
Summary......Page 149
Best Practices......Page 150
5 Integrating Exchange Server 2010 in a Non-Windows Environment......Page 152
Synchronizing Directory Information with Forefront Identity Manager (FIM)......Page 153
Managing Identity Information Between LDAP Directories and Exchange Server 2010......Page 158
Using Services for UNIX to Integrate UNIX Systems with an Active Directory/Exchange Server 2010 Environment......Page 160
Understanding the Identity Management for UNIX Components......Page 167
Administrative Improvements with Windows Server 2008......Page 170
Summary......Page 171
Best Practices......Page 172
Domain Name System and Its Role in Exchange Server 2010......Page 174
Outlining the Types of DNS Servers......Page 177
Examining DNS Components......Page 178
Using DNS to Route SMTP Mail in Exchange Server 2010......Page 186
Understanding DNS Requirements for Exchange Server 2010......Page 187
Troubleshooting DNS Problems......Page 193
Global Catalog and Domain Controller Placement......Page 197
Examining the Role of Domain Controllers in AD......Page 199
Defining the Global Catalog......Page 201
Exploring DSAccess, DSProxy, and the Categorizer......Page 208
Understanding AD Functionality Modes and Their Relationship to Exchange Server Groups......Page 212
Summary......Page 215
Best Practices......Page 216
7 Installing Exchange Server 2010......Page 218
Understanding the Exchange Server 2010 Server Roles......Page 219
Understanding the Prerequisites for Exchange Server 2010......Page 220
Understanding High Availability and Site Resilience in Exchange Server 2010......Page 223
Exchange Server 2010 Hardware Requirements......Page 224
Understanding the Active Directory Requirements for Exchange Server 2010......Page 225
Understanding Role Based Access Control......Page 235
Planning Your Exchange Server 2010 Installation......Page 237
Deploying Active Directory from Scratch......Page 239
Preparing Your Environment for Exchange Server 2010......Page 248
Installing Exchange Server 2010......Page 255
Finalizing the Deployment......Page 258
Summary......Page 259
Best Practices......Page 260
8 Implementing Edge Services for an Exchange 2010 Environment......Page 262
Installing and Configuring the Edge Transport Server Components......Page 263
Utilizing the Basic Sender and Recipient Connection Filters......Page 271
Utilizing SenderID on an Edge Transport Server......Page 280
Using Content Filtering to Isolate Inappropriate Content......Page 286
Fine-Tuning Content Filtering......Page 292
Using Content Filtering to Allow and Reject Domain-Level Content......Page 294
Filtering Content in a Message Attachment......Page 296
Using Sender/IP Reputation to Filter Content......Page 299
Using Address Rewriting to Standardize on Domain Address Naming for an Organization......Page 301
Using EdgeSync to Synchronize Active Directory Information to the Edge Transport Server......Page 304
Implementing Safelist Aggregation for Outlook 2003 and Outlook 2007......Page 308
Managing and Maintaining an Edge Transport Server......Page 310
Forefront Online Security for Exchange Server 2010......Page 314
Best Practices......Page 315
What Is Windows PowerShell?......Page 318
Introducing the Exchange Management Shell......Page 321
Understanding the Exchange Server Task Model......Page 324
Starting the Exchange Management Shell......Page 325
More on How PowerShell and EMS Work Together......Page 329
Understanding the EMS Syntax......Page 330
Creating Your Own Scripts......Page 334
Managing Cmdlets......Page 337
Introducing the Windows PowerShell Command Log......Page 338
Using EMS to Do Administrative Mailbox Tasks......Page 339
Using EMS to Do Reporting......Page 344
Finding Other Resources......Page 346
Best Practices......Page 347
Microsoft's Trustworthy Computing Initiative......Page 350
Securing Your Windows Environment......Page 351
Exchange Server 2010 Client-Level Security Enhancements......Page 360
Securing Outlook 2007......Page 361
Protecting Against Spam......Page 366
Securing Outlook Web App......Page 371
Summary......Page 373
Best Practices......Page 374
Considering the Importance of Security in an Exchange Server 2010 Environment......Page 376
Components of a Secure Messaging Environment......Page 380
Exchange Server-Level Security Features......Page 393
Transport-Level Security Defined......Page 399
Exchange Server 2010 SMTP Connectors......Page 401
Edge Transport Server Connectors......Page 408
Securing Windows for the Edge Transport Server Role......Page 413
Best Practices......Page 415
12 Integrating Certificate-Based Public Key Infrastructure (PKI) in Exchange Server 2010......Page 418
Understanding Public Key Infrastructure......Page 419
Installing a Windows Certification Authority Server......Page 425
Server Certificates in Exchange Server 2010......Page 427
Implementing Secured Email Communications with Exchange Server 2010......Page 432
Using Outlook to Send and Receive Digitally Signed and Encrypted Emails......Page 437
Best Practices......Page 443
13 Securing Exchange Server 2010 with ISA Server......Page 446
Outlining the Need for ISA Server 2006 in Exchange Server Environments......Page 447
Outlining the Inherent Threat in Exchange Server HTTP Traffic......Page 450
Securing Exchange Outlook Web App with ISA Server 2006......Page 452
Securing POP and IMAP Exchange Server Traffic......Page 461
Managing and Controlling Simple Mail Transfer Protocol (SMTP) Traffic......Page 463
Logging ISA Traffic......Page 466
Monitoring ISA from the ISA Console......Page 469
Best Practices......Page 474
14 Understanding Exchange Policy Enforcement Security......Page 476
Understanding Relevant Governmental Regulations for Policy Enforcement......Page 477
Using Transport Agents in Exchange Server 2010......Page 488
Understanding the Hub Role Transport Agents in Exchange Server 2010......Page 489
Implementing Transport Agent Policies on the Edge......Page 495
Creating Messaging Records Management Policies......Page 497
Best Practices......Page 502
Understanding What Needs to Be Migrated to Windows Server 2008......Page 504
Understanding the Benefits to Upgrading Active Directory......Page 507
Beginning the Migration Process......Page 509
Big Bang Migration......Page 512
Phased Migration......Page 516
Multiple Domain Consolidation Migration......Page 528
Summary......Page 538
Best Practices......Page 539
16 Transitioning from Exchange Server 2003/2007 to Exchange Server 2010......Page 540
High-Level Guide for Transition from Exchange Server 2003 to Exchange Server 2010......Page 541
High-Level Guide for Transition from Exchange Server 2007 to Exchange Server 2010......Page 542
Understanding How to Transition to Exchange Server 2010......Page 543
Understanding What’s New and What’s Different with Exchange Server 2010......Page 546
Deploying a Prototype Lab for the Exchange Server 2010 Transition Process......Page 551
Transitioning to a Brand-New Exchange Server 2010 Environment......Page 553
Transitioning from Exchange Server 2003 to Exchange Server 2010......Page 554
Transitioning from Exchange Server 2007 to Exchange Server 2010......Page 569
Best Practices......Page 570
17 Implementing Client Access and Hub Transport Servers......Page 572
Understanding the Client Access Server......Page 573
Installing the Client Access Server......Page 593
Understanding the Hub Transport Server......Page 595
Transport Pipeline......Page 599
Installing the Hub Transport Server......Page 602
Test Cmdlets for CAS and Hub Transport Servers......Page 604
Best Practices......Page 610
Introduction to Role Based Access Control......Page 612
Administrative Tools......Page 619
Performing Common Tasks......Page 633
Recipient Configuration......Page 653
Understanding Journaling......Page 660
Understanding Archiving......Page 665
Using the Exchange Server 2010 Toolbox......Page 667
Exchange Server Coexistence......Page 676
Server Administration......Page 677
Summary......Page 680
Best Practices......Page 681
Proper Care and Feeding of Exchange Server 2010......Page 682
Maintenance Tools for Exchange Server 2010......Page 685
The Exchange Control Panel......Page 689
Auditing the Environment......Page 696
Best Practices for Performing Database Maintenance......Page 705
Prioritizing and Scheduling Maintenance Best Practices......Page 707
Post-Maintenance Procedures......Page 712
Reducing Management and Maintenance Efforts......Page 713
Best Practices......Page 714
20 Using Operations Manager to Monitor Exchange Server 2010......Page 716
OpsMgr Exchange Server 2010 Monitoring......Page 717
What’s New in OpsMgr R2......Page 719
Explaining How OpsMgr Works......Page 720
Outlining OpsMgr Architecture......Page 723
Understanding How to Use OpsMgr......Page 726
Understanding OpsMgr Component Requirements......Page 729
Understanding Advanced OpsMgr Concepts......Page 730
Securing OpsMgr......Page 735
Installing Operations Manager 2007 R2......Page 738
Installing Edge Transport Monitoring Certificates......Page 746
Summary......Page 752
Best Practices......Page 753
21 Remote Administration of Exchange Server 2010 Servers......Page 754
Certificates, Trust, and Remote Administration......Page 755
Using the Remote Exchange Management Shell......Page 756
RDP with Exchange Server 2010......Page 759
Summary......Page 773
Best Practices......Page 774
22 Documenting an Exchange Server 2010 Environment......Page 776
Benefits of Documentation......Page 777
Exchange Server 2010 Project Documentation......Page 779
Exchange Server 2010 Environment Documentation......Page 790
Exchange Server 2010 Administration and Maintenance Documents......Page 793
Disaster Recovery Documentation......Page 796
Performance Documentation......Page 798
Security Documentation......Page 799
Summary......Page 801
Best Practices......Page 802
Understanding Mobility Enhancements in Exchange Server 2010......Page 804
Enabling ActiveSync in Exchange Server 2010......Page 806
Securing Access to ActiveSync with Secure Sockets Layer Encryption......Page 809
Securing Access to ActiveSync Using Internet Security and Acceleration (ISA) Server 2006......Page 813
Working with ActiveSync Policies......Page 817
Working with Windows Mobile Pocket PC and Smartphone Editions......Page 819
Summary......Page 823
Best Practices......Page 824
Unified Messaging Features......Page 826
Unified Messaging Architecture......Page 832
Unified Messaging Installation......Page 846
Monitoring and Troubleshooting Unified Messaging......Page 860
Unified Messaging Shell Commands......Page 874
SIP Protocol......Page 877
Best Practices......Page 880
Understanding the History of SharePoint Technologies......Page 882
Identifying the Need for MOSS 2007......Page 886
Exploring Basic MOSS Features......Page 887
Exploring End-User Features in MOSS......Page 894
Customizing and Developing MOSS Sites......Page 900
Best Practices......Page 903
26 Integrating Office Communications Server 2007 in an Exchange Server 2010 Environment......Page 906
Understanding Microsoft's Unified Communications Strategy......Page 907
Installing OCS 2007 R2......Page 910
Exploring Office Communications Server Tools and Concepts......Page 925
Installing and Using the Communicator 2007 Client......Page 928
Web Conferencing......Page 929
Best Practices......Page 930
Outlook over the Years......Page 932
Highlighted Features in Outlook 2007......Page 934
Security Enhancements in Outlook 2007......Page 942
Implementing Outlook Anywhere......Page 949
Deploying Outlook 2007......Page 952
Using Outlook 2007......Page 954
Using Cached Exchange Mode for Offline Functionality......Page 963
Summary......Page 968
Best Practices......Page 969
28 Leveraging the Capabilities of the Outlook Web App (OWA) Client......Page 970
Understanding Microsoft's Direction on OWA......Page 971
What's New in OWA 2010?......Page 973
Understanding Available Versions and Security Options......Page 976
Using OWA 2010......Page 980
Using the Calendar in OWA......Page 996
Using Tasks in OWA......Page 1001
Using Keyboard Shortcuts......Page 1002
The Options Page......Page 1003
Configuring OWA and IM Integration......Page 1016
Best Practices......Page 1021
29 Using Non-Windows Systems to Access Exchange Server 2010......Page 1022
Understanding Non-Windows–Based Mail Client Options......Page 1023
Outlook Express......Page 1026
Mac Mail, iCal, and Address Book......Page 1031
Configuring and Implementing Entourage for the Mac......Page 1033
Remote Desktop Connection Client for Mac......Page 1036
Understanding Other Non-Windows Client Access Methods......Page 1040
Best Practices......Page 1042
Outlook 2007 Auto Account Setup......Page 1044
Understanding Deployment Options......Page 1048
Planning Considerations and Best Practices......Page 1052
Preparing the Deployment......Page 1054
Installing the Outlook Client for Exchange Server......Page 1061
Pushing Outlook Client Software with Group Policies......Page 1064
Deploying with Microsoft System Center Configuration Manager 2007......Page 1072
Managing Post-Deployment Tasks......Page 1074
Best Practices......Page 1075
31 Database Availability Group Replication in Exchange Server 2010......Page 1076
Understanding Database Availability Groups......Page 1077
Deploying a Database Availability Group......Page 1079
Comparing and Contrasting DAG Versus CCR/SCR/SCC......Page 1099
Load Balancing in Exchange Server 2010......Page 1101
Best Practices......Page 1106
Understanding the Importance of Backups......Page 1108
Establishing Service Level Agreements......Page 1110
Supporting Backups with Documentation......Page 1112
Roles and Responsibilities......Page 1115
Developing a Backup Strategy......Page 1116
What to Back Up on Exchange Servers......Page 1120
The Need for Backups with Database Availability Groups......Page 1123
Backing Up Windows Server 2008 and Exchange Server 2010......Page 1124
Backing Up Specific Windows Services......Page 1127
Summary......Page 1130
Best Practices......Page 1131
33 Recovering from a Disaster in an Exchange Server 2010 Environment......Page 1134
Identifying the Extent of the Problem......Page 1135
What to Do Before Performing Any Server-Recovery Process......Page 1139
Preparing for a More Easily Recoverable Environment......Page 1140
Recovering from a Site Failure......Page 1143
Recovering from a Disk Failure......Page 1147
Recovering from a Boot Failure......Page 1149
Recovering from a Complete Server Failure......Page 1150
Recovering Exchange Server Application and Exchange Server Data......Page 1152
Recovering from Database Corruption......Page 1154
Recovering Windows Server 2008 Domain Controllers......Page 1158
Recovering Active Directory......Page 1159
Summary......Page 1161
Best Practices......Page 1162
34 Optimizing an Exchange Server 2010 Environment......Page 1164
Examining Exchange Server 2010 Performance Improvements......Page 1165
Analyzing Capacity and Performance......Page 1168
Optimizing Exchange Server 2010 Servers......Page 1171
Analyzing and Monitoring Core Elements......Page 1180
Properly Sizing Exchange Server 2010......Page 1186
Monitoring Exchange Server with System Center Operations Manager......Page 1195
Best Practices......Page 1196
35 Designing and Optimizing Storage in an Exchange Server 2010 Environment......Page 1198
Defining the Technologies......Page 1199
When Is the Right Time to Implement NAS and SAN Devices?......Page 1201
Designing the Right Data Storage Structure for Exchange Server 2010......Page 1203
Adding in Fault Tolerance for External Storage Systems......Page 1209
Recommendations for SAN and NAS Solutions......Page 1210
Making the Best Use of SAN/NAS Disks with Exchange Server 2010......Page 1212
Summary......Page 1216
Best Practices......Page 1217
A......Page 1218
B......Page 1225
C......Page 1226
D......Page 1234
E......Page 1242
F......Page 1250
G......Page 1252
H......Page 1254
I......Page 1255
L......Page 1259
M......Page 1261
N......Page 1268
O......Page 1270
P......Page 1277
R......Page 1282
S......Page 1286
T......Page 1299
U......Page 1302
V......Page 1304
W......Page 1305
X......Page 1306
Z......Page 1307