| Foreword |
|
xiii | |
| Preface |
|
xv | |
|
|
|
xvi | |
|
|
|
xvii | |
| Acknowledgments |
|
xix | |
| 1 Exchange 2003 Deployment Fundamentals |
|
1 | (38) |
|
|
|
1 | (1) |
|
1.2 Windows 2000/Windows 2003 Refresher |
|
|
2 | (3) |
|
1.3 Exchange 2003 and Its Relationship to the Forest |
|
|
5 | (1) |
|
1.4 The Importance of Domain Controllers and Global Catalog Servers |
|
|
6 | (11) |
|
1.5 Choosing an Appropriate Domain Model |
|
|
17 | (2) |
|
1.6 Universal Security Groups and Windows Domain Mixed-Mode Membership |
|
|
19 | (1) |
|
|
|
19 | (1) |
|
1.8 Exchange 2003 Installation Requirements |
|
|
20 | (4) |
|
1.9 Exchange System Manager on Windows XP |
|
|
24 | (1) |
|
1.10 Exchange 2003 and Internet Information Services 6.0 |
|
|
25 | (1) |
|
1.11 Exchange 2003 Installation Improvements |
|
|
26 | (2) |
|
1.12 Preparing and Planning for Deployment |
|
|
28 | (1) |
|
1.13 DCDiag and NetDiag Utilities |
|
|
29 | (2) |
|
1.14 Preparing Windows 2003 Domains for Exchange 2003 |
|
|
31 | (5) |
|
1.15 Installing Exchange 2000 |
|
|
36 | (1) |
|
|
|
37 | (2) |
| 2 Active Directory Connector Synchronization |
|
39 | (40) |
|
|
|
39 | (1) |
|
2.2 Active Directory Connector Core Technology Description |
|
|
40 | (5) |
|
2.3 Connection Agreements |
|
|
45 | (5) |
|
2.4 Active Directory Connector Schema Modifications |
|
|
50 | (2) |
|
2.5 Determining Which Directory Objects to Synchronize |
|
|
52 | (1) |
|
2.6 Active Directory Connector Block Searching |
|
|
53 | (1) |
|
2.7 How the Active Directory Connector Uses the Active Directory |
|
|
54 | (1) |
|
2.8 Mailbox-enabled and Mail-enabled Objects |
|
|
55 | (1) |
|
2.9 Object Class Mapping from Exchange 5.5 to the Active Directory |
|
|
55 | (3) |
|
2.10 Object Class Mapping from the Active Directory to Exchange 5.5 |
|
|
58 | (2) |
|
2.11 Synchronizing Hidden Objects |
|
|
60 | (1) |
|
2.12 Dealing with Hidden Distribution List Membership |
|
|
60 | (1) |
|
|
|
61 | (1) |
|
2.14 Connection Agreements and Authentication |
|
|
62 | (3) |
|
2.15 Controlling the Synchronization Schedule |
|
|
65 | (2) |
|
2.16 Connection Agreement Advanced Parameters |
|
|
67 | (4) |
|
2.17 Exchange 5.5 Mailboxes and Multiple Windows NT Accounts |
|
|
71 | (1) |
|
2.18 Mailbox Delegate Access |
|
|
72 | (2) |
|
2.19 Troubleshooting Active Directory Connector Synchronization Problems |
|
|
74 | (3) |
|
2.20 The New Exchange 2003 Active Directory Connector Features |
|
|
77 | (1) |
|
|
|
78 | (1) |
| 3 Advanced Active Directory Connector Configuration |
|
79 | (30) |
|
|
|
79 | (1) |
|
3.2 Default Object-Matching Behavior |
|
|
80 | (1) |
|
3.3 How the Active Directory Connector Uses LDAP |
|
|
81 | (1) |
|
3.4 Using a Customized LDAP Search Filter |
|
|
82 | (1) |
|
3.5 nderstanding LDAP Search Filters |
|
|
82 | (1) |
|
3.6 Setting an LDAP Search Filter on a Connection Agreement |
|
|
83 | (1) |
|
3.7 Default Active Directory Connector Object-Matching Behavior |
|
|
84 | (3) |
|
3.8 Using Custom Object-Matching Rules on the Active Directory Connector |
|
|
87 | (5) |
|
3.9 The NTDSNoMatch Utility |
|
|
92 | (1) |
|
3.10 Summarizing Object-Matching Behavior |
|
|
93 | (1) |
|
3.11 Introduction to Attribute Mapping |
|
|
94 | (1) |
|
3.12 Default Attribute Mapping Behavior |
|
|
94 | (1) |
|
3.13 Moving Beyond the Schema Mapping GUI |
|
|
95 | (7) |
|
3.14 Active Directory Distinguished Name Mapping with the Exchange 2000 Active Directory Connector |
|
|
102 | (2) |
|
3.15 Distinguished Name Mapping with the Exchange 2003 Active Directory Connector |
|
|
104 | (1) |
|
3.16 Exchange 5.5 and LDAP Names |
|
|
104 | (1) |
|
3.17 Attribute Mapping Rule Syntax |
|
|
105 | (2) |
|
|
|
107 | (2) |
| 4 The Site Replication Service |
|
109 | (156) |
|
|
|
109 | (1) |
|
4.2 Positioning the Site Replication Service and the Active Directory Connector |
|
|
109 | (1) |
|
4.3 Components that Comprise the Site Replication Service |
|
|
110 | (1) |
|
4.4 The Site Replication Service in Intrasite Replication Operation |
|
|
111 | (3) |
|
4.5 The Site Replication Service in Intersite Replication Operation |
|
|
114 | (2) |
|
4.6 What Takes Place during a Bridgehead Server Upgrade? |
|
|
116 | (1) |
|
4.7 Site Replication Service Management |
|
|
117 | (2) |
|
4.8 Site Replication Service Preference |
|
|
119 | (1) |
|
|
|
120 | (3) |
|
5 Public Folder Interoperability and Migration |
|
|
123 | (22) |
|
|
|
123 | (1) |
|
5.2 Public Folder Connection Agreements |
|
|
123 | (2) |
|
5.3 Configuring Public Folder Connection Agreements |
|
|
125 | (2) |
|
5.4 Public Folder Permissions |
|
|
127 | (1) |
|
5.5 Exchange 5.5 and Exchange 2003 Public Folder Replication |
|
|
128 | (2) |
|
5.6 Permission Handling during Mixed-Version Replication |
|
|
130 | (2) |
|
5.7 Dealing with Zombie Users |
|
|
132 | (2) |
|
5.8 Exchange 5.5 Distribution Lists and Access Control Lists |
|
|
134 | (1) |
|
5.9 Public Folder Deployment Guidelines |
|
|
135 | (1) |
|
5.10 Planning and Understanding Public Folder Topologies |
|
|
136 | (1) |
|
5.11 Reintroducing Public Folder Affinity |
|
|
137 | (2) |
|
5.12 Getting Ready to Migrate Public Folders |
|
|
139 | (1) |
|
5.13 Moving User and System Public Folder Content |
|
|
140 | (2) |
|
5.14 Using the Public Folder Migration Tool |
|
|
142 | (1) |
|
|
|
143 | (2) |
|
6 Deployment and Interoperability Guidelines for the Active Directory Connector |
|
|
145 | (24) |
|
|
|
145 | (1) |
|
6.2 Why Native-Mode Windows 2000 or Windows 2003 Domains Are Best |
|
|
145 | (2) |
|
6.3 Scenarios that Require Multiple Connection Agreements |
|
|
147 | (2) |
|
6.4 Container Hierarchy Mapping |
|
|
149 | (1) |
|
6.5 Moving Synchronized Objects between Containers |
|
|
150 | (1) |
|
6.6 Using Multiple Active Directory Connectors |
|
|
151 | (1) |
|
6.7 Exchange 5.5 Back-Replication |
|
|
152 | (2) |
|
6.8 Connection Agreement Deployment Models |
|
|
154 | (9) |
|
6.9 Deploying Active Directory Connectors |
|
|
163 | (2) |
|
6.10 Network Impact from Active Directory Connector Synchronization |
|
|
165 | (2) |
|
|
|
167 | (2) |
|
7 Moving from Exchange 5.5 to Exchange 2003 |
|
|
169 | (42) |
|
|
|
169 | (1) |
|
7.2 Exchange 5.5 Migration Fundamentals |
|
|
169 | (2) |
|
7.3 Making a Clean Break from Exchange 5.5 |
|
|
171 | (1) |
|
7.4 Exchange 5.5 Migration Terminology Refresher |
|
|
172 | (1) |
|
7.5 The Importance of sID History During Exchange 5.5 Migration |
|
|
173 | (1) |
|
7.6 Exchange 5.5, Windows Migrations, and the ClonePrincipal Toolkit |
|
|
174 | (1) |
|
7.7 Requirements for Writeable Access to slDHistory |
|
|
175 | (1) |
|
7.8 Running Exchange 5.5 on Windows 2000 Servers |
|
|
176 | (1) |
|
7.9 Exchange 5.5 to Exchange 2003 Migration Approaches |
|
|
177 | (23) |
|
7.10 Active Directory Account Domain Cleanup Wizard |
|
|
200 | (10) |
|
|
|
210 | (1) |
|
8 Moving from Exchange 2000 to Exchange 2003 |
|
|
211 | (18) |
|
|
|
211 | (1) |
|
8.2 Exchange 2000 to Exchange 2003 Migration Approaches |
|
|
211 | (5) |
|
8.3 Mixed Exchange 5.5/Exchange 2000 migrations to Exchange 2003 |
|
|
216 | (1) |
|
8.4 The Exchange 2003 Move Mailbox Wizard |
|
|
217 | (10) |
|
|
|
227 | (2) |
|
9 Interorganization Migrations |
|
|
229 | (36) |
|
|
|
229 | (1) |
|
9.2 Deciding on an Interorganization Migration Approach |
|
|
229 | (1) |
|
9.3 Using the Exchange Server Migration Wizard |
|
|
230 | (5) |
|
9.4 Partial Organization Migrations |
|
|
235 | (6) |
|
9.5 Third-Party Tool Approach to Interorganization Migration |
|
|
241 | (21) |
|
|
|
262 | (3) |
| 10 Deploying Exchange for External Access |
|
265 | (36) |
|
|
|
265 | (1) |
|
10.2 Using Exchange 2003 Front-End Servers in the DMZ |
|
|
265 | (2) |
|
10.3 Exchange, DSAccess, and Firewalls |
|
|
267 | (2) |
|
10.4 Should You Allow RPCs across Your DMZ? |
|
|
269 | (1) |
|
10.5 Generalized Internal-Facing Firewall Requirements |
|
|
270 | (1) |
|
10.6 Outlook Web Access Security Issues |
|
|
271 | (1) |
|
10.7 Secure Architectural Alternative |
|
|
272 | (2) |
|
10.8 Tunneling and Bridging |
|
|
274 | (1) |
|
10.9 Putting Components into Practice |
|
|
274 | (1) |
|
10.10 Using Microsoft ISA Server with OWA |
|
|
275 | (3) |
|
10.11 Using a Hardware-Based SSL/TLS Proxy Server with OWA |
|
|
278 | (1) |
|
10.12 Back-End Encryption |
|
|
279 | (2) |
|
10.13 Understanding OWA, Authentication, Front-End Servers, and Redirection |
|
|
281 | (7) |
|
10.14 Implementing Outlook RPC over HTTP |
|
|
288 | (11) |
|
|
|
299 | (2) |
| A Lists of Events Generated by the Active Directory Connector |
|
301 | (52) |
| B Connection Agreement Attributes |
|
353 | (10) |
| C Active Directory Connector Registry Keys |
|
363 | (2) |
| Index |
|
365 | |