Introduction |
|
xix | |
|
Chapter 1 Business, Functional, and Technical Requirements |
|
|
1 | (10) |
|
Building the Foundation for Requirements |
|
|
1 | (1) |
|
Establishing Project Roles |
|
|
2 | (1) |
|
Getting Started with the Exchange Design |
|
|
2 | (1) |
|
Requirements as Part of a Larger Framework |
|
|
3 | (1) |
|
Understanding the Types of Requirements |
|
|
4 | (4) |
|
|
4 | (2) |
|
|
6 | (1) |
|
|
7 | (1) |
|
|
8 | (1) |
|
|
8 | (1) |
|
|
9 | (2) |
|
Chapter 2 Exchange Design Fundamentals |
|
|
11 | (16) |
|
Introducing Design Documents |
|
|
11 | (1) |
|
From Requirements to Design |
|
|
11 | (1) |
|
No Single Way to Implement Exchange |
|
|
12 | (1) |
|
How Much Detail Is Enough? |
|
|
12 | (1) |
|
|
12 | (12) |
|
|
13 | (1) |
|
|
13 | (1) |
|
|
14 | (1) |
|
Summary of Vision and Scope |
|
|
14 | (1) |
|
|
14 | (1) |
|
|
14 | (1) |
|
|
15 | (1) |
|
|
15 | (1) |
|
Migration or Legacy Integration Requirements |
|
|
15 | (1) |
|
Interoperation with Third-Party Applications |
|
|
16 | (1) |
|
High-Availability Strategy and Requirements |
|
|
16 | (1) |
|
|
17 | (1) |
|
|
18 | (1) |
|
|
18 | (1) |
|
|
19 | (1) |
|
|
20 | (1) |
|
|
20 | (4) |
|
|
24 | (3) |
|
|
24 | (1) |
|
How Do You Know When to Finish Designing? |
|
|
24 | (1) |
|
|
25 | (1) |
|
|
25 | (1) |
|
|
25 | (1) |
|
|
25 | (2) |
|
Chapter 3 Exchange Architectural Concepts |
|
|
27 | (32) |
|
The Evolution of Exchange 2013 |
|
|
27 | (12) |
|
|
28 | (2) |
|
|
30 | (4) |
|
|
34 | (5) |
|
|
39 | (18) |
|
|
42 | (1) |
|
|
42 | (1) |
|
|
42 | (2) |
|
|
44 | (1) |
|
|
45 | (9) |
|
|
54 | (3) |
|
Exchange Online Integration |
|
|
57 | (1) |
|
|
57 | (2) |
|
Chapter 4 Defining a Highly Available Messaging Solution |
|
|
59 | (20) |
|
|
59 | (3) |
|
Defining Availability Components |
|
|
60 | (2) |
|
Defining the Cost of Downtime |
|
|
62 | (1) |
|
|
63 | (2) |
|
Defining Terms for Availability |
|
|
65 | (2) |
|
|
65 | (1) |
|
|
65 | (1) |
|
Defining High Availability and Disaster Recovery |
|
|
66 | (1) |
|
Achieving High Availability |
|
|
67 | (2) |
|
Building an Available Messaging System |
|
|
69 | (9) |
|
|
69 | (1) |
|
|
69 | (3) |
|
Exchange Hybrid Deployment |
|
|
72 | (1) |
|
Database Availability Group Planning |
|
|
73 | (5) |
|
|
78 | (1) |
|
Chapter 5 Designing a Successful Exchange Storage Solution |
|
|
79 | (22) |
|
A Brief History of Exchange Storage |
|
|
79 | (3) |
|
|
79 | (1) |
|
|
80 | (1) |
|
|
80 | (1) |
|
|
81 | (1) |
|
Storage Changes in Exchange 2013 |
|
|
82 | (5) |
|
Issue 1 Storage Capacity Increasing |
|
|
82 | (1) |
|
Issue 2 Mechanical Disk IOPS Performance Not Increasing |
|
|
83 | (2) |
|
Issue 3 JBOD Solutions Require Operational Maturity |
|
|
85 | (1) |
|
Issue 4 Mailbox Capacity Requirements Increasing |
|
|
86 | (1) |
|
Issue 5 Everything Needs to Be Cheaper |
|
|
86 | (1) |
|
Storage Improvements in Exchange Server 2013 |
|
|
87 | (3) |
|
Automatic Database Reseed |
|
|
88 | (1) |
|
Multiple Databases for Each JBOD Disk Spindle |
|
|
88 | (2) |
|
Designing a Successful Exchange Storage Solution |
|
|
90 | (8) |
|
|
90 | (3) |
|
Making Sense of the Exchange Mailbox Server Role Requirements Calculator |
|
|
93 | (2) |
|
Selecting the Right Storage Hardware |
|
|
95 | (1) |
|
Storage Validation Using Jetstress |
|
|
96 | (2) |
|
|
98 | (3) |
|
|
101 | (36) |
|
Trends in Management of Platforms |
|
|
101 | (1) |
|
Role-Based Access Control |
|
|
102 | (25) |
|
|
103 | (1) |
|
Understanding the Components of the RBAC Permissions Model |
|
|
104 | (1) |
|
Planning Your Management Strategy |
|
|
105 | (2) |
|
Understanding Built-in Management Roles, Role Groups, and Role Association |
|
|
107 | (4) |
|
|
111 | (1) |
|
|
112 | (1) |
|
|
113 | (1) |
|
Creating New Management Scopes |
|
|
114 | (1) |
|
Creating and Managing Role Groups |
|
|
115 | (1) |
|
Creating New Role Assignments |
|
|
115 | (2) |
|
Understanding Role Assignment Policies |
|
|
117 | (2) |
|
Applying Business Logic Using Unscoped Top-Level Roles |
|
|
119 | (2) |
|
Reporting Effective Permissions and Cmdlet Usage |
|
|
121 | (2) |
|
Understanding Split Permissions |
|
|
123 | (2) |
|
|
125 | (2) |
|
|
127 | (9) |
|
The Exchange Management Tools |
|
|
131 | (1) |
|
|
132 | (2) |
|
|
134 | (1) |
|
Hybrid Deployments and EAC |
|
|
135 | (1) |
|
PowerShell and Exchange Management Shell |
|
|
135 | (1) |
|
|
136 | (1) |
|
Chapter 7 Exchange 2013 Hybrid Coexistence with Office 365 |
|
|
137 | (22) |
|
|
137 | (3) |
|
High-Level Infrastructure Overview |
|
|
137 | (3) |
|
Why Consider Exchange Hybrid? |
|
|
140 | (3) |
|
Benefits of Exchange Online |
|
|
140 | (1) |
|
Trade-offs of Exchange Online |
|
|
141 | (2) |
|
|
143 | (13) |
|
|
143 | (1) |
|
|
144 | (1) |
|
|
145 | (1) |
|
Deployment Planning and Preparation |
|
|
145 | (5) |
|
Common Deployment Hurdles |
|
|
150 | (6) |
|
|
156 | (3) |
|
Chapter 8 Designing a Secure Exchange Solution |
|
|
159 | (40) |
|
|
159 | (3) |
|
|
159 | (1) |
|
How Real Is the Threat Today? |
|
|
160 | (1) |
|
What Is Necessary to Secure? |
|
|
161 | (1) |
|
Handling Security Conversations |
|
|
162 | (8) |
|
|
162 | (2) |
|
|
164 | (6) |
|
Designing a Secure Exchange Solution |
|
|
170 | (13) |
|
Protecting against Malware and Spam |
|
|
170 | (7) |
|
Protecting against Unauthorized Network Access |
|
|
177 | (6) |
|
Protecting against Unauthorized Data Access |
|
|
183 | (14) |
|
Security of Data in Transit |
|
|
184 | (2) |
|
|
186 | (7) |
|
Security of Data in Long-Term Storage |
|
|
193 | (1) |
|
|
193 | (4) |
|
|
197 | (2) |
|
|
199 | (32) |
|
Overview of Messaging Compliance |
|
|
199 | (1) |
|
|
200 | (3) |
|
|
203 | (3) |
|
Discussions with the Legal Department |
|
|
203 | (1) |
|
|
203 | (2) |
|
|
205 | (1) |
|
|
206 | (23) |
|
|
206 | (3) |
|
Exchange 2013 Compliance Scenarios |
|
|
209 | (20) |
|
|
229 | (1) |
|
|
229 | (2) |
|
Chapter 10 Collaborating with Exchange |
|
|
231 | (30) |
|
|
231 | (1) |
|
Basic Collaboration with Email |
|
|
232 | (3) |
|
|
232 | (1) |
|
Helping Users Learn to Collaborate |
|
|
233 | (1) |
|
The Address Book: a Place to Find and Get to Know People |
|
|
234 | (1) |
|
|
235 | (3) |
|
Creating and Managing Shared Mailboxes |
|
|
236 | (1) |
|
Automatic Mailbox Mapping |
|
|
237 | (1) |
|
Accessing Shared Mailboxes from Mobile Devices |
|
|
237 | (1) |
|
|
238 | (2) |
|
Implementing Resource Mailboxes |
|
|
238 | (2) |
|
|
240 | (2) |
|
Structure of Modern Public Folders |
|
|
241 | (1) |
|
|
242 | (3) |
|
|
245 | (14) |
|
Implementing Site Mailboxes |
|
|
247 | (1) |
|
SharePoint 2013 Prerequisites |
|
|
247 | (1) |
|
Configuring the SharePoint Server |
|
|
248 | (7) |
|
Preparing the Exchange 2013 Server |
|
|
255 | (1) |
|
Creating and Configuring a Connection from SharePoint to Exchange |
|
|
256 | (3) |
|
Configuring the Connection from Exchange to SharePoint |
|
|
259 | (1) |
|
|
259 | (2) |
|
Chapter 11 Extending Exchange |
|
|
261 | (38) |
|
Accessing Exchange Programmatically |
|
|
261 | (3) |
|
|
262 | (1) |
|
Taking EWS for a Test Drive without Writing Any Code |
|
|
263 | (1) |
|
How Do You Connect Your Code to Exchange? |
|
|
263 | (1) |
|
Where Do You Run Your Code? |
|
|
263 | (1) |
|
Considerations for the Cloud |
|
|
263 | (1) |
|
Choosing the Right API for Exchange Development in Exchange 2013 |
|
|
264 | (4) |
|
|
268 | (1) |
|
Exchange Web Services in Exchange 2013 |
|
|
268 | (22) |
|
|
269 | (1) |
|
Web Services Description Language Proxy Objects |
|
|
269 | (1) |
|
|
269 | (1) |
|
Connection and Authentication |
|
|
270 | (4) |
|
|
274 | (4) |
|
|
278 | (1) |
|
In-Place eDiscovery in Exchange 2013 |
|
|
279 | (4) |
|
Creating Items Using Exchange Web Services |
|
|
283 | (3) |
|
|
286 | (4) |
|
Migrating a CDO 1.2 VBS Script to a PowerShell EWS Managed API Script |
|
|
290 | (2) |
|
Connecting to the Target Exchange Mailbox |
|
|
290 | (1) |
|
Establishing a Connection to the Mailbox's Contacts Folder |
|
|
290 | (1) |
|
Filtering the Contents of the Contacts Folder for Those That Contain a Photo |
|
|
291 | (1) |
|
Downloading the Contact Photo Attachment |
|
|
291 | (1) |
|
Mail Apps for Outlook and the Outlook Web App |
|
|
292 | (4) |
|
|
293 | (1) |
|
JavaScript API for Office |
|
|
294 | (1) |
|
Permission Levels in Mail Apps |
|
|
294 | (1) |
|
Using Exchange Web Services within Mail Apps |
|
|
295 | (1) |
|
Getting Started with a Mail App |
|
|
296 | (1) |
|
|
296 | (1) |
|
Best Practices When Writing EWS Code |
|
|
296 | (1) |
|
Exchange, the Microsoft Stack, and Other Third-Party Products |
|
|
297 | (1) |
|
|
297 | (2) |
|
Chapter 12 Exchange Clients |
|
|
299 | (22) |
|
|
299 | (6) |
|
Messaging Application Programming Interface (MAPI/RPC) |
|
|
300 | (1) |
|
|
300 | (1) |
|
|
301 | (1) |
|
|
302 | (1) |
|
|
303 | (1) |
|
Collaboration Data Objects |
|
|
304 | (1) |
|
Why Does Client Choice Matter? |
|
|
305 | (5) |
|
|
305 | (1) |
|
|
306 | (3) |
|
|
309 | (1) |
|
Organization Security Compliance |
|
|
309 | (1) |
|
Performing a Client Inventory |
|
|
310 | (3) |
|
|
310 | (1) |
|
Web Clients (EWS, EAS, and OWA) |
|
|
311 | (1) |
|
|
312 | (1) |
|
|
313 | (1) |
|
|
313 | (6) |
|
|
313 | (1) |
|
|
314 | (1) |
|
|
315 | (2) |
|
|
317 | (1) |
|
Exchange 2013 User Throttling |
|
|
318 | (1) |
|
|
319 | (2) |
|
Chapter 13 Planning Your Deployment |
|
|
321 | (10) |
|
Exchange 2013 Information Resources |
|
|
321 | (1) |
|
|
321 | (1) |
|
Preparing Active Directory |
|
|
322 | (1) |
|
|
322 | (1) |
|
Creating or Updating the Exchange Organization |
|
|
323 | (1) |
|
Preparing or Updating Active Directory Domains |
|
|
323 | (1) |
|
Designing a Rollout Process |
|
|
323 | (2) |
|
Installing into an Existing Organization |
|
|
324 | (1) |
|
SMTP Considerations for Existing Organizations |
|
|
325 | (1) |
|
Certificate Considerations |
|
|
325 | (1) |
|
|
326 | (1) |
|
|
326 | (1) |
|
Deploying Operating System-Based Antivirus Programs |
|
|
327 | (1) |
|
|
327 | (1) |
|
Publishing Exchange to the Internet |
|
|
328 | (1) |
|
|
328 | (1) |
|
Preproduction Load Testing |
|
|
329 | (1) |
|
|
329 | (1) |
|
|
330 | (1) |
|
Chapter 14 Migrating to Exchange 2013 |
|
|
331 | (24) |
|
|
331 | (5) |
|
Outlook Client Reconfiguration |
|
|
331 | (1) |
|
Availability Data Sharing |
|
|
332 | (1) |
|
Global Address List Synchronization |
|
|
332 | (1) |
|
Public Folder Data Synchronization |
|
|
333 | (1) |
|
|
333 | (1) |
|
|
334 | (1) |
|
Mobile Device Reconfiguration |
|
|
334 | (1) |
|
|
335 | (1) |
|
Exchange Application Integration |
|
|
335 | (1) |
|
|
336 | (1) |
|
|
336 | (1) |
|
|
336 | (2) |
|
Outlook Client Reconfiguration |
|
|
337 | (1) |
|
Availability Data Sharing |
|
|
337 | (1) |
|
Global Address List Synchronization |
|
|
337 | (1) |
|
Public Folder Data Synchronization |
|
|
337 | (1) |
|
Mail Flow and Mailbox Permissions |
|
|
337 | (1) |
|
Mobile Device Reconfiguration |
|
|
338 | (1) |
|
|
338 | (1) |
|
Exchange Application Integration |
|
|
338 | (1) |
|
|
338 | (1) |
|
|
338 | (1) |
|
|
338 | (5) |
|
Mailbox Replication Service |
|
|
339 | (1) |
|
Preparing for Inter-Org Mailbox Moves |
|
|
340 | (2) |
|
|
342 | (1) |
|
|
343 | (1) |
|
Modern Public Folder Data Migration |
|
|
343 | (3) |
|
Intra-Org Migration to Exchange Server 2013 |
|
|
345 | (1) |
|
|
346 | (2) |
|
|
346 | (1) |
|
|
347 | (1) |
|
|
347 | (1) |
|
Legacy Exchange Migrations |
|
|
348 | (1) |
|
Version-to-Version Upgrade |
|
|
348 | (1) |
|
Double-Hop Inter-Org Migration |
|
|
349 | (1) |
|
|
349 | (1) |
|
Migrating to Exchange Server 2010 |
|
|
349 | (1) |
|
Common Migration Problems |
|
|
349 | (4) |
|
Failure to Get Business Support |
|
|
350 | (1) |
|
|
350 | (1) |
|
Incorrect End-User Expectations |
|
|
351 | (1) |
|
|
351 | (1) |
|
|
352 | (1) |
|
|
353 | (1) |
|
Migration Improvements in Exchange 2013 |
|
|
353 | (1) |
|
|
353 | (1) |
|
|
353 | (1) |
|
|
354 | (1) |
|
Chapter 15 Operating and Monitoring Exchange Server 2013 |
|
|
355 | (18) |
|
|
356 | (1) |
|
|
357 | (1) |
|
|
358 | (7) |
|
Types of System Availability |
|
|
358 | (1) |
|
|
358 | (7) |
|
|
365 | (2) |
|
Monitoring Enhancements in Exchange 2013 |
|
|
367 | (4) |
|
|
367 | (2) |
|
|
369 | (2) |
|
|
371 | (2) |
Index |
|
373 | |