Introduction |
|
xv | |
|
|
xvi | |
|
|
xvi | |
|
|
xvii | |
|
|
xvii | |
Chapter 1 Client access servers |
|
1 | (42) |
|
CAS architecture demystified |
|
|
2 | (5) |
|
CAS authentication methods |
|
|
7 | (3) |
|
|
10 | (4) |
|
External and internal U RLs |
|
|
11 | (1) |
|
External and internal authentication |
|
|
12 | (1) |
|
Managing virtual directory settings |
|
|
12 | (2) |
|
|
14 | (1) |
|
Load balancing made simpler |
|
|
15 | (4) |
|
|
15 | (1) |
|
|
15 | (2) |
|
|
17 | (1) |
|
Windows Network Load Balancing |
|
|
17 | (1) |
|
Choosing a load balancing solution |
|
|
18 | (1) |
|
The role of Outlook Anywhere |
|
|
19 | (2) |
|
|
21 | (2) |
|
|
21 | (1) |
|
|
21 | (1) |
|
Using a single internal name for Outlook Anywhere |
|
|
22 | (1) |
|
External names for Outlook Anywhere |
|
|
22 | (1) |
|
The Front End Transport service |
|
|
23 | (1) |
|
|
24 | (7) |
|
|
26 | (1) |
|
Accessing Autodiscover through SCPs |
|
|
27 | (1) |
|
Accessing Autodiscover through well-known URLs |
|
|
28 | (1) |
|
The role of Exchange providers |
|
|
28 | (2) |
|
Retrieving configuration information with Autodiscover |
|
|
30 | (1) |
|
Understanding CAS proxying and redirection |
|
|
31 | (3) |
|
|
32 | (1) |
|
|
33 | (1) |
|
CAS coexistence and migration |
|
|
34 | (2) |
|
Routing inbound traffic to the 2013 CAS role |
|
|
34 | (1) |
|
|
35 | (1) |
|
|
36 | (5) |
|
How Exchange uses certificates |
|
|
36 | (1) |
|
Where to get certificates |
|
|
37 | (1) |
|
|
38 | (1) |
|
What certificates do you need? |
|
|
38 | (1) |
|
Requesting and applying certificates |
|
|
39 | (2) |
|
|
41 | (2) |
Chapter 2 The Exchange transport system |
|
43 | (112) |
|
A quick introduction to Exchange transport |
|
|
43 | (4) |
|
The transport pipeline: An overview |
|
|
44 | (2) |
|
Message routing: An overview |
|
|
46 | (1) |
|
Exchange 2013 transport architecture in depth |
|
|
47 | (26) |
|
The Front End Transport service |
|
|
52 | (1) |
|
|
52 | (1) |
|
The Mailbox Transport Delivery service |
|
|
53 | (1) |
|
The Mailbox Transport Submission service |
|
|
53 | (1) |
|
|
53 | (15) |
|
Securing mail with Transport Layer Security (TLS) |
|
|
68 | (5) |
|
|
73 | (16) |
|
|
73 | (1) |
|
|
74 | (2) |
|
|
76 | (1) |
|
|
77 | (4) |
|
Enabling prioritized message delivery |
|
|
81 | (1) |
|
|
82 | (7) |
|
|
89 | (4) |
|
|
93 | (1) |
|
|
94 | (12) |
|
|
95 | (1) |
|
Exchange 2013 and Active Directory |
|
|
96 | (4) |
|
Overriding Active Directory site link costs |
|
|
100 | (2) |
|
Selecting a send connector |
|
|
102 | (2) |
|
Exchange 2013 and DNS MX lookups |
|
|
104 | (1) |
|
|
105 | (1) |
|
High availability and Exchange transport |
|
|
106 | (9) |
|
|
109 | (5) |
|
|
114 | (1) |
|
|
115 | (8) |
|
|
118 | (1) |
|
How transport rules are applied |
|
|
119 | (1) |
|
Setting transport rule priority |
|
|
120 | (2) |
|
Active Directory Rights Management Services and transport rules |
|
|
122 | (1) |
|
|
123 | (6) |
|
|
124 | (1) |
|
Data loss prevention rules |
|
|
125 | (3) |
|
|
128 | (1) |
|
|
129 | (8) |
|
|
131 | (2) |
|
Alternate journal recipients |
|
|
133 | (2) |
|
Journaling at the mailbox database level |
|
|
135 | (1) |
|
Journaling using journal rules |
|
|
135 | (1) |
|
Journaling of unified messaging messages |
|
|
136 | (1) |
|
Securing a mailbox used as a journal recipient |
|
|
136 | (1) |
|
Changing organization-level transport settings |
|
|
137 | (6) |
|
Setting server-level behavior |
|
|
143 | (6) |
|
|
143 | (1) |
|
|
144 | (2) |
|
Interpreting protocol log files |
|
|
146 | (3) |
|
Customizing transport system messages |
|
|
149 | (6) |
|
|
149 | (3) |
|
|
152 | (3) |
Chapter 3 Client management |
|
155 | (72) |
|
|
156 | (13) |
|
|
156 | (5) |
|
|
161 | (5) |
|
|
166 | (1) |
|
Outlook Web App for Devices |
|
|
167 | (2) |
|
Managing Outlook for Windows |
|
|
169 | (20) |
|
Managing Outlook Anywhere |
|
|
169 | (1) |
|
|
170 | (1) |
|
Using the Exchange Remote Connectivity Analyzer |
|
|
171 | (4) |
|
Outlook settings and group policies |
|
|
175 | (2) |
|
Pre-staging OST files for Outlook 2013 deployment |
|
|
177 | (1) |
|
|
178 | (2) |
|
Blocking client connections to a mailbox |
|
|
180 | (5) |
|
Blocking client access to a Mailbox server |
|
|
185 | (1) |
|
Using the Office Configuration Analyzer Tool |
|
|
186 | (3) |
|
|
189 | (23) |
|
Outlook Web App mailbox policies |
|
|
189 | (7) |
|
Controlling offline Outlook Web App use |
|
|
196 | (2) |
|
Controlling attachment access and rendering |
|
|
198 | (2) |
|
Managing Outlook Web App virtual directory settings |
|
|
200 | (1) |
|
Managing Outlook Web App timeouts |
|
|
201 | (1) |
|
Managing Office Store apps for Outlook Web App |
|
|
202 | (7) |
|
Customizing Outlook Web App |
|
|
209 | (3) |
|
|
212 | (1) |
|
Managing Outlook Web App for Devices |
|
|
213 | (1) |
|
|
213 | (8) |
|
Configuring the IMAP4 server |
|
|
215 | (4) |
|
Configuring IMAP4 client access |
|
|
219 | (2) |
|
|
221 | (6) |
Chapter 4 Mobile device management |
|
227 | (44) |
|
All about Exchange ActiveSync |
|
|
228 | (4) |
|
A quick tour of EAS history |
|
|
228 | (2) |
|
What it means to "support EAS |
|
|
230 | (2) |
|
How Exchange ActiveSync works |
|
|
232 | (16) |
|
|
233 | (1) |
|
|
233 | (1) |
|
|
234 | (1) |
|
|
235 | (3) |
|
|
238 | (2) |
|
|
240 | (2) |
|
|
242 | (6) |
|
Managing Exchange ActiveSync |
|
|
248 | (22) |
|
Organization-level settings |
|
|
249 | (2) |
|
|
251 | (1) |
|
Mobile device mailbox policies |
|
|
251 | (2) |
|
|
253 | (2) |
|
Handling users who leave the company |
|
|
255 | (2) |
|
Reporting on EAS sync and device activity |
|
|
257 | (4) |
|
Building device access rules |
|
|
261 | (4) |
|
Blocking devices on a per-user basis |
|
|
265 | (1) |
|
|
266 | (1) |
|
|
267 | (3) |
|
Other mobile device management alternatives |
|
|
270 | (1) |
Chapter 5 Message hygiene and security |
|
271 | (38) |
|
A quick message-hygiene primer |
|
|
274 | (3) |
|
|
274 | (1) |
|
|
274 | (1) |
|
|
275 | (1) |
|
|
276 | (1) |
|
Message security and protection in Exchange |
|
|
277 | (8) |
|
Built-in security features |
|
|
278 | (1) |
|
|
278 | (5) |
|
Exchange Online Protection |
|
|
283 | (2) |
|
Major changes from previous versions |
|
|
285 | (1) |
|
Managing anti-malware scanning |
|
|
285 | (5) |
|
Managing server-level settings |
|
|
286 | (2) |
|
Disabling anti-malware scanning |
|
|
288 | (1) |
|
Configuring server-based third-party anti-malware scanners |
|
|
289 | (1) |
|
Managing anti-spam filtering |
|
|
290 | (19) |
|
Methods of spam filtering |
|
|
291 | (6) |
|
Enabling anti-spam filtering on mailbox servers |
|
|
297 | (1) |
|
The spam filtering pipeline |
|
|
297 | (1) |
|
Controlling protocol filtering |
|
|
298 | (5) |
|
Controlling content filtering |
|
|
303 | (1) |
|
Controlling sender reputation filtering |
|
|
304 | (1) |
|
Controlling how Exchange interacts with client-side junk mail filtering |
|
|
304 | (2) |
|
Working with quarantined messages |
|
|
306 | (3) |
Chapter 6 Unified messaging |
|
309 | (82) |
|
A quick introduction to Exchange UM |
|
|
310 | (15) |
|
Major Exchange UM features |
|
|
310 | (2) |
|
Unified messaging concepts |
|
|
312 | (6) |
|
Unified messaging objects and attributes |
|
|
318 | (5) |
|
Unified messaging architecture |
|
|
323 | (2) |
|
What happens when the phone rings |
|
|
325 | (28) |
|
Call answering for a user mailbox |
|
|
326 | (20) |
|
Call answering for an automated attendant |
|
|
346 | (4) |
|
Call answering for Outlook Voice Access |
|
|
350 | (1) |
|
|
351 | (2) |
|
|
353 | (7) |
|
The parts of a phone number |
|
|
353 | (2) |
|
The role of dialing rules |
|
|
355 | (4) |
|
|
359 | (1) |
|
|
359 | (1) |
|
Multilingual support in UM |
|
|
360 | (3) |
|
Installing and removing language packs |
|
|
362 | (1) |
|
Choosing the right language |
|
|
362 | (1) |
|
|
363 | (5) |
|
|
364 | (1) |
|
|
364 | (1) |
|
|
365 | (1) |
|
|
365 | (1) |
|
Designing automated attendants |
|
|
366 | (2) |
|
|
368 | (1) |
|
|
368 | (22) |
|
A quick note about permissions |
|
|
369 | (1) |
|
Managing UM server-level settings |
|
|
369 | (6) |
|
Scheduling UM work on the Mailbox server |
|
|
375 | (1) |
|
|
376 | (5) |
|
|
381 | (1) |
|
UM mailbox policy settings |
|
|
381 | (3) |
|
|
384 | (3) |
|
Automated attendant settings |
|
|
387 | (3) |
|
Unified messaging and the future |
|
|
390 | (1) |
Chapter 7 Integrating Exchange 2013 with Lync Server |
|
391 | (42) |
|
|
391 | (2) |
|
Combining Lync and Exchange |
|
|
393 | (9) |
|
|
393 | (2) |
|
What Exchange adds to Lync |
|
|
395 | (2) |
|
Lync integration concepts and architecture |
|
|
397 | (4) |
|
Certificates, trust, and permissions |
|
|
401 | (1) |
|
Initial integration steps |
|
|
402 | (6) |
|
Installing prerequisites on Exchange servers |
|
|
403 | (1) |
|
Configuring server authentication |
|
|
403 | (1) |
|
|
404 | (1) |
|
Creating partner applications |
|
|
405 | (3) |
|
Enabling IM and presence integration in Outlook Web App |
|
|
408 | (7) |
|
Configuring IM/P with single-role servers |
|
|
408 | (1) |
|
Completing IM/P integration |
|
|
409 | (3) |
|
Troubleshooting Outlook Web App IM integration |
|
|
412 | (3) |
|
Integrating Exchange L IM and Lync Server |
|
|
415 | (8) |
|
Exchange UM integration concepts |
|
|
415 | (1) |
|
|
416 | (7) |
|
Enabling the Unified Contact Store for Lync users |
|
|
423 | (3) |
|
Working with high-resolution photos |
|
|
426 | (3) |
|
Assigning photos to users |
|
|
427 | (2) |
|
Integrating Exchange archiving with Lync Server |
|
|
429 | (2) |
|
What archiving integration means |
|
|
429 | (1) |
|
Understanding Lync archiving |
|
|
429 | (1) |
|
Enabling Lync archiving to Exchange |
|
|
430 | (1) |
|
|
431 | (2) |
Chapter 8 Office 365: A whirlwind tour |
|
433 | (60) |
|
|
434 | (5) |
|
The many faces of Office 365 |
|
|
435 | (1) |
|
|
435 | (3) |
|
|
438 | (1) |
|
|
439 | (1) |
|
Is Office 365 right for you? |
|
|
439 | (11) |
|
|
439 | (3) |
|
|
442 | (2) |
|
|
444 | (1) |
|
|
444 | (3) |
|
|
447 | (2) |
|
|
449 | (1) |
|
|
449 | (1) |
|
Hybrid operations, migration, and coexistence |
|
|
450 | (9) |
|
The role of directory synchronization |
|
|
450 | (2) |
|
Single sign-on and federation |
|
|
452 | (1) |
|
|
453 | (1) |
|
|
454 | (4) |
|
Understanding types of migration |
|
|
458 | (1) |
|
Assessing your Office 365 readiness |
|
|
459 | (4) |
|
Signing up for the service |
|
|
459 | (1) |
|
|
460 | (3) |
|
Setting up a hybrid organization |
|
|
463 | (25) |
|
Enabling directory synchronization |
|
|
463 | (8) |
|
|
471 | (2) |
|
|
473 | (6) |
|
Running the Hybrid Configuration Wizard |
|
|
479 | (5) |
|
Moving users to the cloud |
|
|
484 | (4) |
|
Managing a hybrid organization |
|
|
488 | (4) |
|
Connecting Windows PowerShell and EAC to the service |
|
|
488 | (1) |
|
|
489 | (1) |
|
Changing hybrid settings after deployment |
|
|
490 | (1) |
|
|
490 | (2) |
|
|
492 | (1) |
Index |
|
493 | |