Categories
Ebooks
-
Business and economy
- Bitcoin
- Businesswoman
- Coaching
- Controlling
- E-business
- Economy
- Finances
- Stocks and investments
- Personal competence
- Computer in the office
- Communication and negotiation
- Small company
- Marketing
- Motivation
- Multimedia trainings
- Real estate
- Persuasion and NLP
- Taxes
- Social policy
- Guides
- Presentations
- Leadership
- Public Relation
- Reports, analyses
- Secret
- Social Media
- Sales
- Start-up
- Your career
- Management
- Project management
- Human Resources
-
For children
-
For youth
-
Education
-
Encyclopedias, dictionaries
-
E-press
- Architektura i wnętrza
- Biznes i Ekonomia
- Home and garden
- E-business
- Finances
- Personal finance
- Business
- Photography
- Computer science
- HR & Payroll
- Computers, Excel
- Accounts
- Culture and literature
- Scientific and academic
- Environmental protection
- Opinion-forming
- Education
- Taxes
- Travelling
- Psychology
- Religion
- Agriculture
- Book and press market
- Transport and Spedition
- Healthand beauty
-
History
-
Computer science
- Office applications
- Data bases
- Bioinformatics
- IT business
- CAD/CAM
- Digital Lifestyle
- DTP
- Electronics
- Digital photography
- Computer graphics
- Games
- Hacking
- Hardware
- IT w ekonomii
- Scientific software package
- School textbooks
- Computer basics
- Programming
- Mobile programming
- Internet servers
- Computer networks
- Start-up
- Operational systems
- Artificial intelligence
- Technology for children
- Webmastering
-
Other
-
Foreign languages
-
Culture and art
-
School reading books
-
Literature
- Antology
- Ballade
- Biographies and autobiographies
- For adults
- Dramas
- Diaries, memoirs, letters
- Epic, epopee
- Essay
- Fantasy and science fiction
- Feuilletons
- Work of fiction
- Humour and satire
- Other
- Classical
- Crime fiction
- Non-fiction
- Fiction
- Mity i legendy
- Nobelists
- Novellas
- Moral
- Okultyzm i magia
- Short stories
- Memoirs
- Travelling
- Narrative poetry
- Poetry
- Politics
- Popular science
- Novel
- Historical novel
- Prose
- Adventure
- Journalism, publicism
- Reportage novels
- Romans i literatura obyczajowa
- Sensational
- Thriller, Horror
- Interviews and memoirs
-
Natural sciences
-
Social sciences
-
School textbooks
-
Popular science and academic
- Archeology
- Bibliotekoznawstwo
- Cinema studies
- Philology
- Polish philology
- Philosophy
- Finanse i bankowość
- Geography
- Economy
- Trade. World economy
- History and archeology
- History of art and architecture
- Cultural studies
- Linguistics
- Literary studies
- Logistics
- Maths
- Medicine
- Humanities
- Pedagogy
- Educational aids
- Popular science
- Other
- Psychology
- Sociology
- Theatre studies
- Theology
- Economic theories and teachings
- Transport i spedycja
- Physical education
- Zarządzanie i marketing
-
Guides
-
Game guides
-
Professional and specialist guides
-
Law
- Health and Safety
- History
- Road Code. Driving license
- Law studies
- Healthcare
- General. Compendium of knowledge
- Academic textbooks
- Other
- Construction and local law
- Civil law
- Financial law
- Economic law
- Economic and trade law
- Criminal law
- Criminal law. Criminal offenses. Criminology
- International law
- International law
- Health care law
- Educational law
- Tax law
- Labor and social security law
- Public, constitutional and administrative law
- Family and Guardianship Code
- agricultural law
- Social law, labour law
- European Union law
- Industry
- Agricultural and environmental
- Dictionaries and encyclopedia
- Public procurement
- Management
-
Tourist guides and travel
- Africa
- Albums
- Southern America
- North and Central America
- Australia, New Zealand, Oceania
- Austria
- Asia
- Balkans
- Middle East
- Bulgary
- China
- Croatia
- The Czech Republic
- Denmark
- Egipt
- Estonia
- Europe
- France
- Mountains
- Greece
- Spain
- Holand
- Iceland
- Lithuania
- Latvia
- Mapy, Plany miast, Atlasy
- Mini travel guides
- Germany
- Norway
- Active travelling
- Poland
- Portugal
- Other
- Russia
- Romania
- Slovakia
- Slovenia
- Switzerland
- Sweden
- World
- Turkey
- Ukraine
- Hungary
- Great Britain
- Italy
-
Psychology
- Philosophy of life
- Kompetencje psychospołeczne
- Interpersonal communication
- Mindfulness
- General
- Persuasion and NLP
- Academic psychology
- Psychology of soul and mind
- Work psychology
- Relacje i związki
- Parenting and children psychology
- Problem solving
- Intellectual growth
- Secret
- Sexapeal
- Seduction
- Appearance and image
- Philosophy of life
-
Religion
-
Sport, fitness, diets
-
Technology and mechanics
Audiobooks
-
Business and economy
- Bitcoin
- Businesswoman
- Coaching
- Controlling
- E-business
- Economy
- Finances
- Stocks and investments
- Personal competence
- Communication and negotiation
- Small company
- Marketing
- Motivation
- Real estate
- Persuasion and NLP
- Taxes
- Guides
- Presentations
- Leadership
- Public Relation
- Secret
- Social Media
- Sales
- Start-up
- Your career
- Management
- Project management
- Human Resources
-
For children
-
For youth
-
Education
-
Encyclopedias, dictionaries
-
History
-
Computer science
-
Other
-
Foreign languages
-
Culture and art
-
School reading books
-
Literature
- Antology
- Ballade
- Biographies and autobiographies
- For adults
- Dramas
- Diaries, memoirs, letters
- Epic, epopee
- Essay
- Fantasy and science fiction
- Feuilletons
- Work of fiction
- Humour and satire
- Other
- Classical
- Crime fiction
- Non-fiction
- Fiction
- Mity i legendy
- Nobelists
- Novellas
- Moral
- Okultyzm i magia
- Short stories
- Memoirs
- Travelling
- Poetry
- Politics
- Popular science
- Novel
- Historical novel
- Prose
- Adventure
- Journalism, publicism
- Reportage novels
- Romans i literatura obyczajowa
- Sensational
- Thriller, Horror
- Interviews and memoirs
-
Natural sciences
-
Social sciences
-
Popular science and academic
-
Guides
-
Professional and specialist guides
-
Law
-
Tourist guides and travel
-
Psychology
- Philosophy of life
- Interpersonal communication
- Mindfulness
- General
- Persuasion and NLP
- Academic psychology
- Psychology of soul and mind
- Work psychology
- Relacje i związki
- Parenting and children psychology
- Problem solving
- Intellectual growth
- Secret
- Sexapeal
- Seduction
- Appearance and image
- Philosophy of life
-
Religion
-
Sport, fitness, diets
-
Technology and mechanics
Videocourses
-
Data bases
-
Big Data
-
Biznes, ekonomia i marketing
-
Cybersecurity
-
Data Science
-
DevOps
-
For children
-
Electronics
-
Graphics/Video/CAX
-
Games
-
Microsoft Office
-
Development tools
-
Programming
-
Personal growth
-
Computer networks
-
Operational systems
-
Software testing
-
Mobile devices
-
UX/UI
-
Web development
-
Management
Podcasts
- Ebooks
- Computer science
- Internet servers
- Microsoft Exchange 2013 Cookbook. Get the most out of Microsoft Exchange with this comprehensive guide. Structured around a series of clear, step-by-step exercises it will help you deploy and configure both basic and advanced features for your enterprise
E-book details
Log in, If you're interested in the contents of the item.
Microsoft Exchange 2013 Cookbook. Get the most out of Microsoft Exchange with this comprehensive guide. Structured around a series of clear, step-by-step exercises it will help you deploy and configure both basic and advanced features for your enterprise
Michael Van Horenbeeck, Peter De Tender
Ebook
- Microsoft Exchange 2013 Cookbook
- Table of Contents
- Microsoft Exchange 2013 Cookbook
- Credits
- About the Author
- Acknowledgments
- About the Author
- Acknowledgments
- About the Reviewers
- www.PacktPub.com
- Support files, eBooks, discount offers, and more
- Why Subscribe?
- Free Access for Packt account holders
- Instant Updates on New Packt Books
- Support files, eBooks, discount offers, and more
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Errata
- Piracy
- Questions
- 1. Planning an Exchange Server 2013 Infrastructure
- Introduction
- Gathering the business requirements
- Getting ready
- How to do it
- Theres more...
- Sizing Exchange 2013
- Getting ready
- How to do it
- Step 1Gathering the data
- Step 2Calculating the requirements
- There's more...
- Preparing for Exchange 2013
- Getting ready
- How to do it...
- Supported coexistence scenarios
- Hardware requirements
- Operating system requirements
- How it works...
- Designing storage for Exchange
- Getting ready
- How to do it...
- How it works...
- There's more...
- Understanding Active Directory and DNS dependencies
- Getting ready
- How to do it...
- Active Directory system requirements
- DNS infrastructure requirements
- Troubleshooting DNS
- Logging events and debugging
- Basic DNS commands
- How it works...
- Planning related platform components
- How to do it...
- Firewall and/or reverse proxy
- SMTP gateway/Anti-Spam/Malware/Virus appliance
- Telephony system or Microsoft Lync Server for voice or unified messaging integration
- SharePoint
- Faxing solution
- Backup and restore
- Custom developed and other third-party applications
- Software-based anti-virus
- There's more...
- How to do it...
- 2. Installing Exchange Server 2013
- Introduction
- Preparing the Active Directory
- Getting ready
- How to do it
- Active Directory schema extension
- Preparing Active Directory, groups and permissions
- How it works...
- There's more
- Installing Exchange 2013 prerequisites
- Getting ready
- How to do it
- Windows Server 2008 R2 Service Pack 1 (or higher)
- Windows Server 2012
- How it works
- Installing Exchange 2013 using the Setup Wizard
- How to do it
- Installing Exchange 2013 from the command line
- How to do it
- There's more...
- Verifying the Exchange 2013 installation
- How to do it
- Get-ExchangeServer
- Setup Log file and Event Viewer
- How it works...
- There's more...
- How to do it
- Introducing the Exchange Admin Center
- Getting ready
- How to do it
- There's more
- Uninstalling an Exchange 2013 Server or Server role
- Getting ready
- How to do it
- By using the Setup Wizard
- By using the command line
- How it works...
- There's more
- 3. Configuring the Client Access Server Role
- Introduction
- Configuring certificates
- Getting ready
- How to do it
- Creating a shared network folder
- Creating a certificate request
- Completing a certificate request
- Exporting a certificate
- Importing a certificate
- Enabling a certificate
- How it works
- Wildcard certificates
- See also
- Configuring Autodiscover
- How to do it...
- Configuring the AutodiscoverServiceInternalURI
- Configuring the AutodiscoverSiteScope
- How it works
- See also
- Configuring Outlook Anywhere
- How to do it...
- How it works...
- See also
- Configuring Outlook Web App
- Getting ready
- How to do it...
- Configuring Access to OWA
- Enabling/Disabling OWA
- Controlling OWA features globally
- OWA Mailbox Policies
- Configuring Exchange Web Services
- How to do it...
- Configuring Exchange ActiveSync
- How to do it...
- See also
- Configuring ActiveSync Device Access
- Getting ready
- How to do it...
- Defining the default access level for the entire organization
- Blocking specific devices
- Explicitly allowing or blocking devices for an individual user
- Configuring ActiveSync Auto-Block Thresholds
- How it works...
- Device Access evaluation
- ActiveSync Device Auto-Block Thresholds
- Configuring SMTP
- How to do it...
- Creating Receive Connectors
- Configuring Logging
- How it works...
- See also
- How to do it...
- Configuring POP and IMAP
- How to do it...
- How it works...
- See also
- Using non-Microsoft clients with Exchange Server 2013
- 4. Configuring and Managing the Mailbox Server Role
- Introduction
- Creating and removing mailbox databases
- How to do it...
- Creating a new mailbox database
- Removing a mailbox database
- How it works...
- There's more...
- How to do it...
- Mounting and dismounting mailbox databases
- Getting ready
- How to do it...
- Mounting a database
- Dismounting a database:
- How it works...
- There's more...
- See also
- Moving database files to another location
- Getting ready
- How to do it...
- There's more...
- Configuring circular logging
- Getting ready
- How to do it...
- How it works...
- See also
- Creating and removing mailboxes
- Getting ready
- How to do it...
- Creating a new user with mailbox
- Enabling a mailbox for an existing user
- Removing a mailbox
- Disabling a mailbox
- How it works...
- There's more...
- Working with disabled mailboxes
- Managing resource mailboxes
- Getting ready
- How to do it...
- Creating a new room mailbox
- Configuring booking options
- How it works...
- There's more...
- Defining additional custom resource properties
- Adding custom properties to a resource
- See also
- Configuring mailbox size limits
- Getting ready
- How to do it...
- Configuring mailbox sizes at database level
- Configuring mailbox sizes at user level
- How it works...
- Managing personal archives
- Getting ready
- How to do it...
- How it works...
- See also
- Assigning mailbox permissions
- Getting ready
- How to do it...
- Assigning full access permissions to a mailbox
- Assigning send-as or send on behalf of permissions
- Granting receive-as permission
- How it works...
- There's more...
- See also
- Moving mailboxes to another database
- Getting ready
- How to do it...
- Moving mailboxes using migration batches
- Moving mailboxes using move requests
- Checking the progress of a mailbox move
- Checking the status of a migration batch
- Removing completed move request
- How it works...
- There's more...
- Synchronous mailbox moves
- Bad item limit
- See also
- Managing public folders
- Getting ready
- How to do it...
- Creating new public folder mailboxes
- Creating public folders
- Managing public folder permissions
- How it works...
- See also
- Configuring outbound mail flow
- Getting ready
- How to do it...
- How it works...
- There's more...
- Send connector costs
- Configure a send connector to route e-mails through the Client Access Server
- See also
- Configuring accepted domains
- Getting ready
- How to do it...
- How it works...
- There's more...
- Configuring e-mail address policies
- See also
- Configuring message size limits
- Getting ready
- How to do it...
- Configuring message size limits at organizational level
- Configuring message size limits at connector level
- Configuring message size limits at mailbox level
- How it works...
- See also
- 5. Configuring External Access
- Introduction
- Configuring Exchange workloads for external access
- How to do it...
- Configuring Outlook Web App
- Configuring the Exchange Admin Center
- Configuring Exchange Web Services
- Configuring the Offline Address Book
- Configuring ActiveSync
- How it works...
- There's more...
- Turning off the Exchange Admin Center
- See also
- How to do it...
- Configuring Autodiscover
- Getting ready
- How to do it...
- Configuring Autodiscover redirection when using multiple primary e-mail domains through IIS
- Using SRV records record
- How it works...
- See also
- Configuring Outlook Anywhere to support external access
- How to do it...
- How it works...
- See also
- Publishing Exchange onto the Internet through TMG 2010
- Getting ready
- How to do it...
- Creating a publishing rule for ActiveSync
- Creating a publishing rule for OWA
- Creating a publishing rule for Outlook Anywhere
- Publishing Autodiscover
- Configuring basic authentication
- How it works...
- Publishing Exchange onto the Internet through UAG 2010 SP3
- Getting ready
- How to do it...
- Creating a new HTTPS-trunk
- Configuring Outlook Anywhere and Exchange ActiveSync
- Configuring Exchange for basic authentication
- How it works...
- Publishing Exchange 2013 to the Internet without using a reverse proxy solution
- Getting ready
- How to do it...
- How it works...
- 6. Implementing and Managing High Availability
- Introduction
- Designing for high availability
- How to do it...
- Creating a highly available Client Access Server infrastructure
- Load balancing at layer 4 using DNS round robin
- Getting ready
- How to do it...
- How it works...
- Load balancing at layer 4 using a single IP address and a load balancer
- Getting ready
- How to do it...
- How it works...
- Load balancing at layer 4 using multiple IP addresses and a load balancer
- Getting ready
- How to do it...
- How it works...
- Load balancing at layer 7 using a load balancer
- Getting ready
- How to do it...
- How it works...
- There's more...
- Creating a highly available mailbox server infrastructure
- Configuring a DAG
- Getting ready
- How to do it...
- How it works...
- Managing a DAG
- Getting ready
- How to do it...
- Adding database copies
- Moving database paths
- Checking replication status
- Testing Replication Health
- How it works...
- There's more...
- Configuring transport high availability
- How to do it...
- Configuring safety net parameters
- How it works...
- Shadow Redundancy
- Safety net
- How to do it...
- Configuring redundant inbound mail delivery
- Getting ready
- How to do it...
- How it works...
- There's more...
- Performing maintenance in a highly available environment
- Getting ready
- How to do it...
- Starting maintenance on Mailbox or multi-role servers
- Starting maintenance on Client Access Servers
- Stopping maintenance
- How it works...
- There's more...
- 7. Transitioning to Exchange Server 2013
- Introduction
- Installing Exchange 2013 in an existing Exchange organization
- Getting ready
- How to do it...
- Preparing the existing Exchange Organization
- Preparing Active Directory
- Check whether an Offline Address Book has been defined
- Configuring an OAB for a mailbox database
- Installing Exchange 2013 CU2
- Performing Exchange 2013 post installation steps
- Getting ready
- How to do it...
- Accessing the Exchange Admin Center
- Configuring virtual directories
- Configuring Autodiscover
- Configuring certificates
- Configuring Outlook Anywhere
- Configuring a Legacy Namespace (Exchange 2007 only)
- Pointing DNS to Exchange 2013
- There's more...
- Moving mailboxes to Exchange 2013
- Getting ready
- How to do it...
- Determining migration batches
- Creating migration batches
- Scheduling migration batches
- There's more...
- Synchronizing data ahead of time
- Moving Public Folders to Exchange 2013
- Getting ready
- How to do it...
- Gathering Public Folder statistics
- Preparing Exchange 2007/2010 for the migration
- Preparing Exchange 2013 for the migration
- Generating the CSV files for migration
- Changing Public Folder names
- Creating Public Folders
- Initiating the Public Folder move request
- Locking existing Public Folders
- Completing the Public Folder migration request
- Verifying the migration
- Finalizing and cleaning up
- There's more...
- Performing delta synchronizations
- Rolling back a migration
- Post migration steps
- Getting ready
- How to do it
- Configuring send connectors
- Performing maintenance in a co-existence scenario
- Getting ready
- How to do it
- How it works...
- There's more...
- 8. Configuring Security and Compliance Features
- Introduction
- Configuring In-Place Archiving
- How to do it...
- Enabling an in-place Archive for a mailbox
- Creating policy tags
- Applying personal tags
- Creating retention policies
- Adding retention policy tag links to an existing retention policy
- Assigning retention policies
- Configuring the Managed Folder Assistant (MFA)
- Enabling or disabling retention hold
- How it works...
- There's more...
- Delegating access to an archive
- Exchange Online Archiving (EOA)
- How to do it...
- Enabling In-Place Hold for a mailbox
- Getting ready
- How to do it...
- How it works...
- There's more...
- Time and query based hold
- Litigation hold
- eDiscovery in SharePoint 2013
- Retrieving Discovery Search results
- Getting ready
- How to do it...
- Retrieving search results
- There's more...
- Searching and deleting e-mails
- Unsearchable items
- Configuring Transport rules
- Getting ready
- How to do it...
- Creating Transport rules
- Enabling/disabling Transport rules
- Testing Transport rules
- How it works...
- There's more...
- Supported file types
- Working with Data Loss Prevention policies
- Getting ready
- How to do it...
- Creating a custom DLP policy
- Creating custom policy tip messages
- How it works...
- Using mailbox audit logging
- How to do it...
- Auditing for specific events
- Configuring an audit log age
- Searching the audit logs
- Generating audit reports
- How it works...
- There's more...
- How to do it...
- 9. Performing Backup, Restore, and Disaster Recovery
- Introduction
- Defining backup objectives
- How to do it
- How it works
- There's more
- Creating a new backup job with Windows Server Backup
- How to do it
- There's more
- Inspect the Event Viewer
- Inspect the Windows Server Backup tool
- Investigating database properties
- Restoring an Exchange Server Database
- Getting ready
- How to do it...
- Performing a full Exchange 2013 database restore
- Setup and usage of an Exchange 2013 Recovery Database
- Performing ESEUTIL /R on a restored Exchange database
- Restoring mailbox data from a Recovery Database into the active Mailbox Database
- How it works
- There's more...
- Recovering a failed Exchange server
- Getting ready
- How to do it
- Resetting a computer account in Active Directory
- Recovering a failed exchange server using the /m:recoverserver switch
- Executing post-installation tasks
- How it works
- 10. Implementing Security
- Introduction
- Configuring role-based access control
- How to do it...
- Adding members to a role group
- Creating a custom role group and limit the write-scope to an organizational unit
- Creating a role group from scratch
- Creating a new management role assignment with a limited scope
- There's more...
- How to do it...
- Configuring administrator audit logging
- How to do it...
- Configuring the auditing of specific events
- Configuring the audit log age
- Generating the audit log reports
- How it works...
- How to do it...
- Configuring anti-spam and anti-malware features
- Getting ready
- How to do it...
- Installing anti-spam agents
- Enabling or disabling anti-malware scanning
- Updating the anti-malware engine
- Verifying the installed updates
- How it works...
- There's more...
- Connection filtering and RBL
- A. Getting to Know Exchange Server 2013
- Exchange, then and now
- Exploring some new features in Exchange Server 2013
- The new public folders
- Outlook Web App
- Data Loss Prevention
- Anti-malware
- Messaging security
- Site Mailboxes
- Understanding the new system architecture
- The old architecture
- The new architecture
- Database Availability Groups
- There's more
- Features removed from Exchange Server 2013
- Understanding Exchange 2013 hybrid deployments
- Secure mail flow
- Federation
- Cross-premises mailbox moves
- Index
- Title: Microsoft Exchange 2013 Cookbook. Get the most out of Microsoft Exchange with this comprehensive guide. Structured around a series of clear, step-by-step exercises it will help you deploy and configure both basic and advanced features for your enterprise
- Author: Michael Van Horenbeeck, Peter De Tender
- Original title: Microsoft Exchange 2013 Cookbook. Get the most out of Microsoft Exchange with this comprehensive guide. Structured around a series of clear, step-by-step exercises it will help you deploy and configure both basic and advanced features for your enterprise.
- ISBN: 9781782170631, 9781782170631
- Date of issue: 2013-09-20
- Format: Ebook
- Item ID: e_3cyb
- Publisher: Packt Publishing