| Foreword |
|
xiii | |
| Preface |
|
xv | |
| Acknowledgments |
|
xix | |
|
|
|
1 | (22) |
|
|
|
1 | (1) |
|
|
|
2 | (2) |
|
Exchange 2000 and forests |
|
|
4 | (1) |
|
The importance of Domain Controllers and Global Catalog servers |
|
|
5 | (7) |
|
Choosing the right domain model |
|
|
12 | (2) |
|
Universal Security Groups and mixed mode membership |
|
|
14 | (1) |
|
|
|
15 | (1) |
|
Preparing Windows 2000 domains for Exchange 2000 |
|
|
16 | (4) |
|
|
|
20 | (1) |
|
|
|
21 | (2) |
|
Synchronization with the Active Directory Connector |
|
|
23 | (40) |
|
|
|
23 | (1) |
|
ADC core technology description |
|
|
23 | (6) |
|
|
|
29 | (5) |
|
|
|
34 | (1) |
|
Determining which directory objects to synchronize |
|
|
35 | (1) |
|
|
|
36 | (1) |
|
How the ADC uses the Active Directory |
|
|
37 | (1) |
|
Mailbox-enabled and mail-enabled objects |
|
|
38 | (1) |
|
Object class mapping from Exchange 5.5 to Active Directory |
|
|
38 | (4) |
|
Object class mapping from Active Directory to Exchange 5.5 |
|
|
42 | (2) |
|
Synchronizing hidden objects |
|
|
44 | (1) |
|
Dealing with hidden distribution list membership |
|
|
44 | (1) |
|
|
|
45 | (1) |
|
Connection Agreements and authentication |
|
|
46 | (2) |
|
Controlling the synchronization schedule |
|
|
48 | (3) |
|
Connection Agreement advanced parameters |
|
|
51 | (4) |
|
Exchange 5.5 mailboxes and multiple Windows NT accounts |
|
|
55 | (2) |
|
|
|
57 | (2) |
|
Troubleshooting ADC synchronization problems |
|
|
59 | (2) |
|
|
|
61 | (2) |
|
Advanced Active Directory Connector Configuration |
|
|
63 | (34) |
|
|
|
63 | (1) |
|
Default ADC object matching |
|
|
64 | (1) |
|
|
|
65 | (1) |
|
Customizing synchronization with LDAP search filters |
|
|
66 | (1) |
|
An LDAP search filter primer |
|
|
67 | (1) |
|
Modifying Connection Agreements with LDAP search filters |
|
|
68 | (2) |
|
Default ADC object-matching process |
|
|
70 | (3) |
|
Using custom object-matching rules on the ADC |
|
|
73 | (5) |
|
|
|
78 | (2) |
|
Active Directory Connector attribute mapping |
|
|
80 | (1) |
|
Default attribute mapping behavior |
|
|
80 | (1) |
|
The default ADC policy for schema mapping |
|
|
81 | (8) |
|
Active Directory Distinguished Name mapping |
|
|
89 | (2) |
|
Exchange 5.5 and LDAP names |
|
|
91 | (1) |
|
Attribute mapping rule syntax |
|
|
92 | (1) |
|
|
|
93 | (4) |
|
The Site Replication Service |
|
|
97 | (14) |
|
|
|
97 | (1) |
|
The SRS does not job share with the ADC! |
|
|
97 | (2) |
|
The components that comprise the SRS |
|
|
99 | (1) |
|
SRS operation with intrasite replication |
|
|
100 | (3) |
|
SRS operation with intersite replication |
|
|
103 | (3) |
|
What occurs during a bridgehead server upgrade? |
|
|
106 | (2) |
|
SRS management requirements |
|
|
108 | (1) |
|
|
|
109 | (1) |
|
|
|
110 | (1) |
|
Exchange 5.5 and Exchange 2000 Public Folder Interoperability |
|
|
111 | (16) |
|
|
|
111 | (1) |
|
Public Folder Connection Agreements |
|
|
111 | (3) |
|
Configuring Public Folder CAs |
|
|
114 | (3) |
|
Public Folder permissions in Exchange 5.5 and Exchange 2000 |
|
|
117 | (1) |
|
Exchange 5.5 and Exchange 2000 Public Folder replication |
|
|
118 | (1) |
|
Permission handling during mixed version replication |
|
|
119 | (4) |
|
Exchange 5.5 distribution lists and ACLs |
|
|
123 | (2) |
|
|
|
125 | (2) |
|
Active Directory Connector Deployment |
|
|
127 | (24) |
|
|
|
127 | (1) |
|
Why native mode Windows 2000 domains are best |
|
|
127 | (1) |
|
Scenarios tha require multiple Connection Agreements |
|
|
128 | (3) |
|
Container hierarchy mapping |
|
|
131 | (1) |
|
Moving synchronized objects between containers |
|
|
132 | (1) |
|
|
|
133 | (1) |
|
Exchange 5.5 back replication |
|
|
134 | (2) |
|
Connection Agreement deployment models |
|
|
136 | (9) |
|
|
|
145 | (3) |
|
Network impact from ADC synchronization |
|
|
148 | (2) |
|
|
|
150 | (1) |
|
|
|
151 | (42) |
|
|
|
151 | (1) |
|
|
|
152 | (1) |
|
|
|
153 | (1) |
|
Migration terminology refresher |
|
|
154 | (1) |
|
The importance of SID History during migration |
|
|
155 | (1) |
|
The ClonePrincipal toolkit |
|
|
156 | (1) |
|
Requirements for writeable access to SID history |
|
|
157 | (1) |
|
Running Exchange 5.5 on Windows 2000 servers |
|
|
158 | (2) |
|
Exchange 2000 migration approaches |
|
|
160 | (19) |
|
Active Directory Account Domain Cleanup wizard |
|
|
179 | (11) |
|
|
|
190 | (3) |
|
Messaging Technology Fundamentals |
|
|
193 | (22) |
|
|
|
193 | (1) |
|
|
|
193 | (3) |
|
Transfer and routing embedded as a core service |
|
|
196 | (11) |
|
|
|
207 | (6) |
|
|
|
213 | (2) |
|
Routing and Connectivity Basics |
|
|
215 | (34) |
|
|
|
215 | (1) |
|
The Exchange 2000 SMTP service |
|
|
216 | (15) |
|
|
|
231 | (3) |
|
|
|
234 | (6) |
|
|
|
240 | (3) |
|
Connecting to non-Exchange 2000 environments |
|
|
243 | (4) |
|
|
|
247 | (2) |
|
|
|
249 | (36) |
|
|
|
249 | (1) |
|
|
|
249 | (21) |
|
Connecting routing groups |
|
|
270 | (1) |
|
Interrouting group delivery |
|
|
271 | (13) |
|
|
|
284 | (1) |
|
SMTP Deployment Scenarios |
|
|
285 | (28) |
|
|
|
285 | (1) |
|
Front- and back-end servers |
|
|
285 | (4) |
|
How front- and back-end topology works |
|
|
289 | (1) |
|
Deployment considerations |
|
|
290 | (1) |
|
|
|
291 | (16) |
|
Configuring firewalls with front- and back-end deployments |
|
|
307 | (4) |
|
Additional configuration considerations |
|
|
311 | (1) |
|
|
|
312 | (1) |
|
|
|
313 | (26) |
|
|
|
313 | (1) |
|
|
|
313 | (3) |
|
|
|
316 | (4) |
|
|
|
320 | (5) |
|
|
|
325 | (3) |
|
|
|
328 | (2) |
|
Performance monitor counters |
|
|
330 | (2) |
|
Unsolicited Bulk E-mail (UBE) |
|
|
332 | (5) |
|
|
|
337 | (2) |
| Appendix: Lists of Events Generated by the ADC |
|
339 | (56) |
| Glossary |
|
395 | (14) |
| Index |
|
409 | |