Microsoft Exchange Server 2003 Client Access Guide
Microsoft Exchange Server 2003 Client Access Guide
Access Guide
Microsoft Corporation
Abstract
This guide provides information about working with Microsoft Exchange Server 2003 and
client access. It describes the new features for Exchange 2003 and Office Outlook 2003, in
addition to improvements in Outlook Web Access 2003.
Contents...................................................................................................................................3
How to Use SSL to Secure the Communications Between the Client Messaging Applications
and the Exchange Front-End Server...................................................................................25
Before You Begin................................................................................................................25
Procedure............................................................................................................................26
How to Enable and Disable Exchange ActiveSync Features at the Organizational Level......44
Procedure............................................................................................................................45
For More Information...........................................................................................................45
How to Enable and Disable Exchange ActiveSync Features at the User Level......................45
Before You Begin................................................................................................................46
Procedure............................................................................................................................46
For More Information...........................................................................................................46
How to Set the Outlook Web Access Forms-Based Authentication Public Computer Cookie
Time-Out Value...................................................................................................................52
Before You Begin................................................................................................................52
Procedure............................................................................................................................52
For More Information...........................................................................................................53
How to Set the Outlook Web Access Forms-Based Authentication Trusted Computer Cookie
Time-Out Value...................................................................................................................53
Before You Begin................................................................................................................53
Procedure............................................................................................................................54
For More Information...........................................................................................................54
Managing Protocols................................................................................................................64
Managing Calendaring Options for the POP3 and IMAP4 Virtual Servers..............................71
How to Include All Public Folders When a Folder Is Requested on an IMAP4 Virtual Server. 78
Procedure............................................................................................................................78
For More Information...........................................................................................................79
How to Configure Posting Limits and Moderation Settings for an NNTP Virtual Server..........80
Before You Begin................................................................................................................80
Procedure............................................................................................................................81
For More Information...........................................................................................................82
How to Modify the Default Browser Language Settings for Outlook Web Access...................88
Before You Begin................................................................................................................89
Procedure............................................................................................................................89
For More Information...........................................................................................................89
How to Set the Enable Notifications to User-Specified SMTP Address Option for Your
Organization......................................................................................................................101
Procedure..........................................................................................................................101
For More Information.........................................................................................................102
Copyright..............................................................................................................................103
10
Note:
Download Microsoft Exchange Server 2003 Client Access Guide to print or read
offline.
Systems Architects
Those individuals responsible for planning and crafting overall business strategies and
solutions
Helpdesk Operators
Those individuals who help end-users with a variety of hardware and software issues,
including simple messaging issues
Hardware Requirements
You need the following hardware to do the procedures in this guide. This list does not include
your general Exchange servers, storage hardware, and so on. It includes only security-
specific hardware requirements:
• A minimum of one front-end server running Internet Security and Acceleration (ISA)
Server
Software Requirements
You need the following software to do the procedures in this guide:
• Mobile device support using Outlook Mobile Access and Exchange ActiveSync®
The new and improved clients enable you to provide your users with a simplified remote
access, more access options, and an improved user experience.
Synchronization Improvements
To reduce the amount of information that is sent between the Outlook 2003 client and
Exchange 2003 servers, Exchange 2003 performs data compression. Exchange 2003 also
reduces the total requests for information between the client and server, thereby optimizing
the communication between the client and the server.
Note:
A file created with the new Outlook .pst file format is not compatible with earlier
versions of Outlook. For compatibility with earlier versions of Outlook, create files by
13
using the .pst file format for Outlook 97 through Outlook 2002. Outlook 2003 can view
and create files of either type.
Outlook Web Access for Exchange 2003 can perform faster, especially over slow
connections, and therefore will be more responsive to user interactions.
The following sections briefly describes some of the new features for Outlook Web Access for
Exchange 2003.
The speed of Outlook Web Access has been improved by reducing the amount of information
that must travel from the server to the browser. Fewer bytes are sent over the wire from
server to browser. However, be aware that the logon process involves more bytes than the
logon process in Outlook 2003.
Compression support
Administrators can configure compression support for Outlook Web Access, which improves
performance on slow network connections and provides increased performance for most
14
You can enable a new logon page for Outlook Web Access that will store the user's name and
password in a cookie instead of in the browser. When a user closes the browser, the cookie is
cleared. Additionally, after a period of inactivity, the cookie is cleared automatically. The new
logon page requires users to enter their domain, user name, and password, or their full user
principal name (UPN) e-mail address and password. To enable the Outlook Web Access
logon page, you must enable forms-based authentication on the server.
S/MIME support
Outlook Web Access in Exchange 2000 did not support signed and encrypted e-mail. Now,
with the new Microsoft Outlook Web Access S/MIME ActiveX control, users can digitally sign
and encrypt e-mail messages. The S/MIME control works with any X.509 v3-based public key
infrastructure (PKI) to provide the signing and encryption capabilities.
For more information about S/MIME support in Outlook Web Access, see What's New in
Exchange Server 2003.
The improvements in features, functionality, and performance may affect decisions about
which client your users should primarily use to access their Exchange information. In remote
sites, Outlook Web Access may be the primary choice, which is a consideration when
planning WAN connections and server placement.
Note:
Microsoft Internet Explorer 6 is required for some features.
The following table shows the new level of browser support for the operating systems offered
by Outlook Web Access for Exchange 2003.
Browser support for Outlook Web Access for Microsoft operating systems
SP2
Netscape B B B B B
Navigator 4.8
Netscape B B B B B
Navigator 7
Key:
• B,P - Both the Basic and Premium versions of Outlook Web Access are supported
• None - Neither the Basic nor Premium versions of Outlook Web Access are
supported
The following table shows the level of functionality for the operating systems and browsers for
Outlook Web Access.
16
Browser support for Outlook Web Access with other operating systems
SP2
Netscape B B B
Navigator 4.8
Netscape B B B
Navigator 6.2
Netscape Navigator 7 B B B
Key:
• B,P - Both the Basic and Premium versions of Outlook Web Access are supported
• None - Neither the Basic nor Premium versions of Outlook Web Access are
supported
Additionally, support for the following browsers and operating systems has been discontinued
for Exchange 2003:
• Microsoft Windows 95
• Microsoft Windows 98
• Apple OS 8.17
17
• Comparing messaging features in Outlook Web Access (Premium and Basic) with
earlier versions of Outlook, see Comparing Office Outlook Web Access to Earlier
Versions.
• The new features for Outlook Web Access, see What's New in Exchange Server
2003.
• Configuring and managing Outlook Web Access, see the following topics:
For information about configuring and managing mobile services for Exchange, see the
following topics:
Exchange ActiveSync
Exchange 2003 now includes the ability to use Pocket PC 2002 devices to synchronize
Exchange data with Microsoft® Exchange ActiveSync®. By default, when you install
Exchange, all your users are enabled for synchronization.
By synchronizing a device to an Exchange server, your users can access their Exchange
information without having to be always connected to a mobile network. Specifically, users
can use their mobile carrier connection to synchronize their Exchange information to their
Pocket PC Phone Edition or Smartphone device and then access this information while
offline.
browser. The mobile browser must support one of the following markup languages: HTML,
xHTML, or cHTML. To deploy your Exchange server to use Outlook Mobile Access, follow the
same steps involved in deploying an Exchange server to use Outlook Web Access.
Outlook Mobile Access for Exchange 2003 supports WAP 2.0 devices only. However, this
does not eliminate the possibility of certain devices being able to use a WAP 1.x gateway.
Therefore, the security issue exists whenever a WAP 2.0 device, that can use a WAP 1.x
gateway, uses a Mobile Operator with WAP 1.x gateways deployed.
To resolve this issue, you can purchase and install your own corporate WAP gateway. This
solution requires that you situate a WAP gateway in the perimeter network and limit your
mobile users to use this gateway alone.
Alternatively, you can choose to provide only WAP 2.0 devices that use only carriers that
have WAP 2.0 gateways deployed. WAP 2.0 gateways allow SSL sessions to be passed
through directly to WAP 2.0 devices that support SSL without decrypting and re-encrypting
the session.
• Security
• Topological boundaries and limitations
• Routing design
• User requirements
All these factors help you to design the client access infrastructure to meet your messaging
requirements. For more information about designing and planning your messaging system,
see Planning an Exchange Server 2003 Messaging System.
• Configuring the Exchange servers for your supported client access methods
20
3. Secure communications.
To secure your messaging system, complete these steps in the order given.
Securing the messaging environment also involves configuring the front-end servers in a
manner that disables the features and settings for the front-end server that are not necessary
in a front-end and back-end server architecture. For more information about how to configure
a front-end server for the front-end and back-end server architecture, see Exchange Server
2003 and Exchange 2000 Server Front-End and Back-End Topologies.
All inbound Internet traffic bound to your Exchange servers (such as Outlook Web Access,
RPC over HTTP communication from Microsoft® Office Outlook® 2003 clients, Outlook
Mobile Access, Post Office Protocol version 3 (POP3), Internet Message Access Protocol
version 4rev1 (IMAP4), and so on) is processed by the ISA Server. When ISA Server receives
a request for an Exchange server, ISA Server proxies the requests to the appropriate
Exchange servers on your internal network. The internal Exchange servers return the
requested data to the ISA Server, and then ISA Server sends the information to the client
21
through the Internet. The following figure shows an example of a recommended ISA Server
deployment.
Securing Communications
To secure communications for your Exchange messaging environment, you need to do the
following tasks:
• Secure the communications between the client messaging applications and the
Exchange front-end server.
• Secure the communications between the Exchange front-end server and the internal
network.
The following sections include information about securing communications for these two
situations.
Additionally, to ensure that user data is always secure, you should configure the front-end
server to require SSL (you can set this option in the SSL configuration). When using basic
authentication, it is critical to protect the network traffic by using SSL to protect user
passwords from network packet sniffing.
Caution:
If you do not use SSL between clients and the front-end server, HTTP data
transmission to your front-end server will not be secure. It is highly recommended
that you configure the front-end server to require SSL.
It is recommended that you obtain an SSL certificate by purchasing a certificate from a third-
party certification authority (CA). Purchasing a certificate from a certification authority is the
preferred method because most browsers trust many of these certification authorities.
As an alternative, you can use Certificate Services to install your own certification authorities.
Although installing your own certification authority may be less expensive, browsers will not
trust your certificate, and users will receive a warning message indicating that the certificate
is not trusted. For more information about SSL, see Microsoft Knowledge Base article
320291, "XCCC: Turning On SSL for Exchange 2000 Server Outlook Web Access."
After you receive a server certificate file, use the Web Server Certificate Wizard to install it.
The installation process attaches (or binds) your certificate to a Web site.
If you require 128-bit key encryption, your users must use Web browsers that support 128-bit
encryption. For more information about upgrading to 128-bit encryption capability, see the
Microsoft Product Support Services Web site.
23
For a detailed overview of the steps required to configure Secure Sockets Layer, see How to
Use SSL to Secure the Communications Between the Client Messaging Applications and the
Exchange Front-End Server.
This section explains the issues to consider when deciding whether to obtain your server
certificates from an outside CA or to issue your own server certificates. This section includes
the following information:
If you are replacing your current server certificate, IIS continues to use that certificate until the
new request has been completed. When you are selecting a CA, consider the following
questions:
• Will the CA be able to issue a certificate that is compatible with all the browsers used
to access my server?
• Does the CA have a system for receiving online certificate requests, such as requests
generated by the Web Server Certificate Wizard?
• How much will the certificate cost initially, and how much will renewal or other
services cost?
Note:
Some certification authorities require you that you prove your identity before they will
process your request or issue a certificate.
For detailed steps for obtaining a server certificate from a certification authority, see How to
Obtain a Server Certificate from a Certification Authority.
• Remember that your organization will require an initial adjustment period to learn,
implement, and integrate Certificate Services with existing security systems and policies.
Use Certificate Services to create a customizable service for issuing and managing
certificates. You can create server certificates for the Internet or for corporate intranets, which
gives your organization complete control over certificate management policies. For more
information about using Certificate Services, see "Certificate Services" in Microsoft®
Windows Server™ 2003 Help.
Online requests for server certificates can be made only to local and remote Enterprise
Certificate Services and remote stand-alone Certificate Services. The Web Server Certificate
Wizard does not recognize a stand-alone installation of Certificate Services on the same
computer when requesting a certificate. If you need to use Web Server Certificate Wizard on
the same computer as a stand-alone Certificate Services installation, use the offline
certificate request to save the request to a file and then process it as an offline request. For
more information about using Certificate Services, see "Certificate Services" in Microsoft
Windows Server 2003 Help.
Note:
If you open a Server Gated Cryptography (SGC) certificate, you may receive the
following notice on the General tab: The certificate has failed to verify for all
its intended purposes. This notice is issued because of how SGC certificates
interact with Windows and does not necessarily indicate that the certificate does not
work correctly.
25
• For detailed steps for adding Certificate Manager to the MMC, see How to Add
Certificate Manager to Microsoft Management Console.
• For detailed steps for backing up your server certificate, see How to Back Up Your
Server Certificate.
After you configure your network to issue server certificates, you need to secure your
Exchange front-end server and the services for your Exchange server by requiring SSL
communication to the Exchange front-end server. You do this by enabling SSL for your
default Web site.
Procedure
To use SSL to secure the communications between client messaging applications
and the Exchange front-end server
1. Set up SSL on a server. For detailed steps, see How to Set Up SSL on a Server.
2. Obtain and install server certificates. You can obtain a server certificate from a
certification authority or issue your own certificate.
• For information about obtaining and installing server certificates, see "Using
Secure Sockets Layer" in Securing Your Exchange Messaging Environment.
• For detailed steps for obtaining a certificate from a certificate authority, see
How to Obtain a Server Certificate from a Certification Authority.
• For detailed steps for adding Certificate Manager to MMC, see How to Add
Certificate Manager to Microsoft Management Console.
• For detailed steps for backing up certificates, see How to Back Up Your
Server Certificate.
4. Enable SSL for the default Web site. For detailed steps for enabling SSL for the
default Web site, see How to Configure Virtual Directories to Use SSL.
Before you perform this procedure, you must read "Using Secure Sockets Layer" in "Securing
Your Exchange Messaging Environment" in the Exchange Server 2003 Client Access Guide.
27
Important:
You must be a member of the Administrators group on the local computer to perform
the following procedure, or you must have been delegated the appropriate authority.
As a security best practice, log on to your computer using an account that is not in
the Administrators group, and then use the Run as command to run Internet
Information Services (IIS) Manager as an administrator. At the command prompt,
type the following command: runas /user:administrative_accountname "mmc
%systemroot%\system32\inetsrv\iis.msc"
Procedure
To set up SSL on a server
1. In IIS Manager, expand the local computer, and then expand the Web Sites
folder. Right-click the Web site or file that you want to protect with SSL, and then click
Properties.
3. In the Advanced Web site identification box, under Multiple identities for this
Web site, verify that the Web site IP address is assigned to port 443 (the default port
for secure communications), and then click OK. Optionally, to configure more SSL
ports for this Web site, click Add under Multiple identities of this Web site, and
then click OK.
5. In the Secure Communications box, select the Require secure channel (SSL)
check box.
"How to Use SSL to Secure the Communications Between the Client Messaging Applications
and the Exchange Front-End Server" in the Exchange Server 2003 Client Access Guide.
For questions you should consider when selecting a certificate authority, see "Obtaining
Server Certificates from a Certification Authority" in "Securing Your Exchange Messaging
Environment" in the Exchange Server 2003 Client Access Guide.
Note:
Some certification authorities require that you prove your identity before they will
process your request or issue a certificate.
Procedure
To obtain a server certificate from a certification authority
1. Use the Web Server Certificate Wizard to create a certificate request.
3. Use the Web Server Certificate Wizard to send the request to the certification
authority. The CA will process the request and then send you the certificate.
Procedure
To add Certificate Manager to Microsoft Management Console
1. Click Start, and then click Run.
5. In the Available Standalone Snap-ins list, click Certificates, and then click
Add.
7. Click the Local computer (the computer this console is running on) option, and
then click Finish.
Note:
If you do not have Certificate Manager installed in Microsoft Management Console
(MMC), see How to Add Certificate Manager to Microsoft Management Console. After
you install Certificate Manager, you can back up your server certificate.
Procedure
To back up your server certificate
1. Locate the correct certificate store. This store is typically the Local Computer
store in Certificate Manager.
Note:
When you have Certificate Manager installed, it points to the correct Local
Computer certificate store.
2. In the Personal store, click the certificate that you want to back up.
3. On the Action menu, point to All tasks, and then click Export.
4. In the Certificate Manager Export Wizard, click Yes, export the private key.
30
5. Follow the wizard default settings, and enter a password for the certificate
backup file when prompted.
Note:
Do not select Delete the private key if export is successful because this
option disables your current server certificate.
For detailed steps for adding Certificate Manager to MMC, see How to Add Certificate
Manager to Microsoft Management Console.
Note:
The \Exchange, \Exchweb, \Public, \OMA, and \Microsoft-Server-ActiveSync virtual
directories are installed by default on any Exchange 2003 installation. The \RPC
virtual directory for RPC over HTTP communication is installed manually when you
configure Exchange to support RPC over HTTP. For more information about how to
set up Exchange to use RPC over HTTP, see Exchange Server 2003 RPC over
HTTP Deployment Scenarios.
Before you perform this procedure, you must read "Using Secure Sockets Layer" in "Securing
Your Exchange Messaging Environment" in the Exchange Server 2003 Client Access Guide.
Procedure
To configure virtual directories to use SSL
1. In Internet Information Services (IIS), select the Default Web site or the Web site
where you are hosting your Exchange services, and then click Properties.
4. After you complete this procedure, all virtual directories on the Exchange front-
end server on the default Web site are configured to use SSL.
Note:
The \Exchange, \Exchweb, \Public, \OMA, and \Microsoft-Server-ActiveSync virtual
directories are installed by default on any Exchange 2003 installation. The \RPC
virtual directory for RPC over HTTP communication is installed manually when you
configure Exchange to support RPC over HTTP. For more information about how to
set up Exchange to use RPC over HTTP, see "Configuring RPC over HTTP for
Outlook 2003" in Configuring Outlook 2003 Features.
For detailed steps for enabling SSL for the default Web site, see How to Configure Virtual
Directories to Use SSL.
32
• Configure two servers running Windows 2000 to require trusted network access.
In a front-end and back-end topology, you can use IPSec to encrypt traffic between the front-
end and back-end servers that would otherwise not be encrypted. For more information about
configuring IPSec with firewalls, see Microsoft Knowledge Base article 233256, "How to
Enable IPSec Traffic Through a Firewall."
33
To configure the Exchange front-end and back-end server architecture, you need to configure
one Exchange server as a front-end server. Make sure you review your deployment options
before you continue with the installation process. The following sections help you decide if
you want to deploy Exchange 2003 in a front-end and back-end server configuration.
• For detailed steps for designating a server to be a front-end server, see How to
Designate a Front-End Server.
• For more information about front-end and back-end scenarios, configurations, and
installation, see the following guides:
• Exchange Server 2003 and Exchange 2000 Server Front-End and Back-End
Topologies
• The server that you will designate as a front-end server is a member of the same
Microsoft® Windows® forest as the back-end servers.
• The server that you will designate as a front-end server is a member of the same
Exchange organization as the back-end servers.
Procedure
To designate a front-end server
1. Install the server that will be running Exchange Server in the organization.
Note:
With Exchange 2000 Server, only Enterprise Edition servers can be
configured as front-end servers. In Exchange Server 2003, both Standard
Edition and Enterprise Edition can be configured as front-end servers.
2. Use Exchange System Manager to go to the server object, right-click the server
object, and then click Properties.
5. The default Exchange virtual directories have now been configured for you.
However, it is recommended that you also configure SSL. For detailed instructions on
how to configure SSL for POP3, IMAP4, and SMTP, see "How to Configure SSL for
POP3, IMAP4, and SMTP" in the Exchange Server 2003 and Exchange 2000 Server
Front-End and Back-End Server Topology Guide. For detailed instructions about how
to configure SSL for HTTP, see How to Configure SSL for HTTP in the Exchange
Server 2003 and Exchange 2000 Server Front-End and Back-End Server Topology
Guide.
• Configure synchronization.
36
For an overview of mobile devices support features for Exchange Server 2003, see Mobile
Services for Exchange.
Configuring Synchronization
When you install Exchange, synchronization access to Exchange is enabled by default for all
users in your organization. You can disable synchronization at the organizational level using
Exchange System Manager. You can also use the Active Directory Users and Computers
snap-in to enable or disable synchronization access for a user or groups of users.
Note:
No additional device configuration is required to support RSA SecurID. The device
presents the appropriate authentication automatically when synchronizing with an
Exchange ActiveSync server protected by RSA SecurID.
The steps to use RSA SecurID with Exchange ActiveSync include the following:
For detailed steps for configuring RSA SecurID with Exchange ActiveSync, see How to Use
RSA SecurID with Exchange ActiveSync.
• For detailed steps for configuring a mobile device to use Exchange ActiveSync, see
How to Configure a Mobile Device to Use Exchange ActiveSync.
37
• For detailed steps for configuring a mobile device to use AUTD, see How to Specify a
Mobile Operator for Up-to-Date Notifications on a Device.
• For information about how to enable Exchange ActiveSync for individual users or
groups of users, see How to Enable and Disable Exchange ActiveSync Features at the
User Level.
Root certificates that are included with a Windows Mobile 5.0 device represent the following
certificate authorities:
• VeriSign
• GTE CyberTrust
• Equifax
• Entrust
• GlobalSign
• Thawte
For the procedure to add a root certificate to a Windows Mobile-based 5.0 device, see the
Installing a Root Certificate in the Windows Mobile Version 5.0 SDK.
For information about how to add root certificates to the Windows Mobile 2003 Smartphone
and to Windows Mobile 2002 Smartphone, see the Microsoft Knowledge Base article 841060,
"How to add root certificates to Windows Mobile 2003 Smartphone and to Windows Mobile
2002 Smartphone."
38
Note:
No additional device configuration is required to support RSA SecurID. The device
presents the appropriate authentication automatically when synchronizing with an
Exchange ActiveSync server protected by RSA SecurID.
Use the procedures in this topic to use RSA SecurID with Exchange ActiveSync.
Procedure
How to use RSA SecurID with Exchange ActiveSync
1. Set up the RSA SecurID server components. To configure the RSA SecurID
server components, you need to:
• Set up the RSA ACE/Server The RSA ACE/Server is the RSA server that
stores and manages authentication tickets and credentials for your users. To set
up the RSA ACE/Server, follow the procedures as outlined in the RSA SecurID
documentation provided by RSA Security Inc.
• Set up the RSA ACE/Agent on the front-end server The RSA ACE/Agent
is the Internet Server Application Programming Interface (ISAPI) filter that
performs authentication and communicates to the ACE/Server to retrieve
SecurID credentials. To set up the RSA ACE/Agent, follow the procedures as
outlined in the RSA documentation provided by RSA Security Inc.
a. Protect the Exchange ActiveSync virtual directories. You can protect this
virtual directory in one of the following two ways:
• Protect the entire Web server (recommended) In this option, you protect
all virtual roots on the IIS server with RSA ACE/Agent, including any other
services implemented by the front-end server. For example, you may have
configured your front-end Exchange server as an access point for Outlook Mobile
Access or for Outlook Web Access. For information about how to verify that the
ACE/Agent is configured to protect the entire Web server, see How to Verify
ACE/Agent is Configured to Protect the Entire Web Server.
39
Note:
By default, the ACE/Agent is configured to protect the entire Web server.
3. Set up user accounts. User accounts for SecurID should be set up by the
administrator as recommended by the RSA SecurID product documentation, with the
following restriction:
Important:
For all users, SecurID user IDs must be selected to match the Windows
account name. Exchange ActiveSync with SecurID does not function for
users who have a distinct RSA user ID that does not match their Windows
account name.
This procedure shows you how to verify that the ACE/Agent is configured to protect the entire
Web server. By default, the ACE/Agent is configured to protect the entire Web server.
Use RSA SecurID with Exchange ActiveSync" in the Exchange Server 2003 Client Access
Guide.
If you do not want to protect the entire Web server with RSA SecurID, you configure the RSA
ACE/Agent so that SecurID protects only Exchange ActiveSync. You may want to do this if
you intend to enable additional services, such as Outlook Web Access and Outlook Mobile
Access, on the same server without protecting those services with SecurID. For detailed
steps for how to limit RSA SecurID authentication to Exchange ActiveSync, see How to Limit
SecurID Authentication to the Microsoft-Exchange-ActiveSync Virtual Directory.
Procedure
To verify ACE/Agent is configured to protect the entire Web server
1. In the Internet Information Services snap-in for MMC, right-click the default Web
server and select Properties.
2. Click the RSA SecurID tab, and verify that the Protect This Resource check
box is selected.
Procedure
To limit SecurID authentication to the Microsoft-Exchange-ActiveSync virtual
directory
1. To disable server-wide protection, in the Internet Information Services (IIS) snap-
in, right-click the default Web server, and then click Properties.
2. Click the RSA SecurID tab, and then clear the Protect This Resource check
box. (This step ensures that RSA SecurID is not enabled for the entire server, but
rather only for the virtual roots that you specify.)
3. To enable protection for the virtual directories, in the IIS snap-in, right-click the
Microsoft-Server-ActiveSync virtual directory, and then click Properties.
4. Select the RSA SecurID tab, and then select the Protect This Resource check
box.
Note:
If the check box is selected and shaded, this means that the virtual directory
is inheriting its setting from the parent directory. Inspect the properties for the
parent directory, and clear the Protect This Resource check box if you do
not want the parent directory to be protected. Then, return to the child
directory and make sure the check box is selected.
Procedure
To configure custom HTTP responses for devices
1. In the IIS snap-in for MMC, locate the WebID virtual directory on the front-end server. This virtual direc
2. Right-click the WebID virtual directory, and then click Properties to open the properties for this virtual d
3. Click the HTTP Headers tab, click the Add button, and then enter the following header information.
Note:
The following value is case-sensitive and must be entered on one line.
Custom Header Name: MSAS-TwoFactorAuth Custom Header Value: True Custom Header Name: MS-AS
Value:
Sync,SendMail,SmartForward,SmartReply,GetAttachment,GetHierarchy,CreateCollection,DeleteCollection
Procedure
To configure a mobile device to use Exchange ActiveSync
1. On the mobile device, from the Today screen, tap Start, and then tap
ActiveSync.
2. Tap Tools, tap Options, and then tap the Server tab.
43
3. Select the check box next to each type of information that you want to
synchronize with the server.
4. To configure synchronization options for each type of information, select the type
of information, and then tap Settings.
5. In the Server Name field, enter the address or name of the server to connect to
when synchronizing Exchange data.
6. Tap Advanced.
7. On the Connection tab, enter the user name, password, and domain name.
8. On the Rules tab, select the rule that best applies to you, for how you want
synchronization to work whenever information about your device and your Exchange
server have both been changed.
10. Repeat this procedure for each of your users' Pocket PC Phone Edition devices.
As an alternative, instruct your users about how to configure their devices for use
with Exchange ActiveSync.
To get information on Exchange ActiveSync 4.0 error codes, see the Microsoft Knowledge
Base article 915152: Information about Microsoft ActiveSync 4.0 error codes, error
messages, and how to troubleshoot the error codes.
Procedure
To specify a mobile operator for up-to-date notifications on a device
1. In ActiveSync, on a mobile device that is powered by Microsoft Windows®, tap
Tools, and then tap Options.
2. On the Server tab, tap Options.
• If your users are using a mobile operator that you specify, select Corporate
Service Provider, and then enter the Device Phone Number and Service
Provider Name in the fields that are provided.
5. If your users are using their own mobile operators, select Device SMS Address,
and then enter the device address in the field provided.
Procedure
To enable and disable Exchange ActiveSync features at the organizational level
1. Start Exchange System Manager.
2. Expand Global Settings, right-click Mobile Services, and then click Properties.
Note:
With this feature enabled, when a new message arrives in a user's
mailbox, up-to-date notifications allow synchronization to occur on a
user's device. Enable this feature if you have users who are using mobile
devices to synchronize, and you do not want to specify the carrier.
For detailed steps for how to configure a mobile device to use Exchange ActiveSync, see
How to Configure a Mobile Device to Use Exchange ActiveSync.
Procedure
To enable and disable Exchange ActiveSync features at the user level
1. On the Exchange server with the user's mailbox, log on with the Exchange
administrator account, and then start Active Directory Users and Computers.
2. Expand the domain, and then open the location for the users that you want to
manage.
3. Right-click the user or users whose Exchange ActiveSync settings you want to
modify, and then select Exchange Tasks.
4. In the Exchange Task Wizard, on the Available Tasks page, select Configure
Exchange Features, and then click Next.
• To prevent the users' settings from being modified when you have selected
more than one user, select Do not modify.
7. Click Finish.
Note:
To view a detailed report of the settings and the changes you made to users,
select View detailed report when this wizard closes.
For detailed steps for how to configure a mobile device to use Exchange ActiveSync, see
How to Configure a Mobile Device to Use Exchange ActiveSync.
47
For complete information about configuring the Exchange ActiveSync up-to-date notifications
feature in your organization, see How to Configure the Exchange ActiveSync Up-to-Date
Notifications Feature.
To enable this logon page, you must first enable forms-based authentication on the server,
and then secure the logon page by setting the cookie time-out period and adjusting client-side
security settings.
For detailed steps about enabling forms-based authentication, see How to Enable Forms-
Based Authentication.
Public or shared computer option on the Outlook Web Access logon screen, the cookie on
this computer expires automatically after 15 minutes of user inactivity.
The automatic time-out is valuable because it helps protect a user's account from
unauthorized access. However, although the automatic time-out greatly reduces the risk of
unauthorized access, it does not completely eliminate the possibility that an unauthorized
user might access an Outlook Web Access account if a session is left running on a public
computer. Therefore, make sure that you educate users about precautions to take to avoid
risks.
To match the security requirements of your organization, an administrator can configure the
inactivity time-out values on the Exchange front-end server. To configure the time-out value,
you must modify the registry settings on the server.
Note:
Incorrectly editing the registry can cause serious problems that may require you to
reinstall your operating system. Problems resulting from editing the registry
incorrectly may not be able to be resolved. Before editing the registry, back up any
valuable data.
• For detailed steps about how to configure the public computer cookie time out value,
see How to Set the Outlook Web Access Forms-Based Authentication Public Computer
Cookie Time-Out Value.
• For detailed steps about how to configure the trusted computer cookie time out value,
see How to Set the Outlook Web Access Forms-Based Authentication Trusted Computer
Cookie Time-Out Value.
To match the security requirements of your organization, an administrator can configure the
inactivity time-out values.
Note:
The default value for the public computer cookie time-out is fifteen minutes. To
change this, you must modify the registry settings on the server.
49
Note:
Incorrectly editing the registry can cause serious problems that may require you to
reinstall your operating system. Problems resulting from editing the registry
incorrectly may not be able to be resolved. Before editing the registry, back up any
valuable data.
• For detailed steps about how to configure the public computer cookie time out value,
see How to Set the Outlook Web Access Forms-Based Authentication Public Computer
Cookie Time-Out Value.
• For detailed steps about how to configure the trusted computer cookie time out value,
see How to Set the Outlook Web Access Forms-Based Authentication Trusted Computer
Cookie Time-Out Value.
• The Exchange server that users authenticate against for Outlook Web Access must
be running Windows Server 2003.
• Your users' mailboxes must be on Exchange 2003 servers. (If you have a mixed
deployment of Exchange mailboxes, you can create a separate virtual server on your
Exchange server just for Exchange 2003 users and enable compression on it.)
• Client computers must be running Internet Explorer version 6 or later. The client
computers must also be running Microsoft® Windows® XP or Microsoft
50
Windows® 2000 Server and have installed on them the security update that is discussed
in Microsoft Security Bulletin MS02-066, "Cumulative Patch for Internet Explorer
(Q328970)."
Note:
If a user does not have a supported browser for compression, the client computer
still operates normally.
• You may need to enable HTTP 1.1 support through proxy servers for some dial-up
connections. (HTTP 1.1 support is required for compression to function correctly.)
For detailed steps about how to enable Outlook Web Access compression, see How to
Enable Outlook Web Access Data Compression.
However, users frequently request that a URL that is simpler than the default URL be made
available for accessing their mailboxes. Creating this simple URL makes the URL both easier
to remember and easier to enter in a Web browser. For example, http://www.contoso1.com is
an easier URL for users to remember than http://contosoexchange01/exchange.
The following procedure provides a method for simplifying the URL that is used to access
Outlook Web Access. This procedure configures a request sent to the root directory of the
Web server (http://server_name/) to redirect to the Exchange virtual directory. For example, a
request to http://server_name/ is directed to http://server_name/exchange/, which then
triggers implicit logon.
For detailed steps about how to simplify the Outlook Web Access URL, see How to Simplify
the Outlook Web Access URL.
For detailed steps, see "How to Enable Forms-Based Authentication When Using SSL
Offloading" in the Exchange Server 2003 and Exchange 2000 Server Front-End and Back-
End Server Topology Guide.
Procedure
To enable forms-based authentication
1. On the Exchange server, log on with the Exchange administrator account, and
then start Exchange System Manager.
3. Expand the server for which you want to enable forms-based authentication, and
then expand Protocols.
4. Expand HTTP, right-click Exchange Virtual Server, and then click Properties.
5. In the Exchange Virtual Server Properties dialog box, on the Settings tab, in
the Outlook Web Access pane, select the Enable Forms Based Authentication
option.
• For detailed steps about how to configure the public computer cookie time-out value,
see "How to Set the Outlook Web Access Forms-Based Authentication Public Computer
Cookie Time-Out Value."
• For detailed steps about how to configure the trusted computer cookie time-out value,
see "How to Set the Outlook Web Access Forms-Based Authentication Trusted Computer
Cookie Time-Out Value."
• For information about managing and configuring Outlook Web Access, see the
following topics:
The automatic time-out is valuable because it helps protect a user's account from
unauthorized access. To match the security requirements of your organization, an
administrator can configure the inactivity time-out values on the Exchange front-end server.
To configure the time-out value, you must modify the registry settings on the server.
Procedure
To set the Outlook Web Access forms-based authentication public computer
cookie time-out value
1. On the Exchange front-end server, log on with the Exchange administrator
account, and then start Registry Editor (regedit).
3. On the Edit menu, point to New, and then click DWORD Value.
7. In the Value Data box, type a value (in minutes) between 1 and 432,000.
8. Click OK.
• For information about managing and configuring Outlook Web Access, see the
following topics:
Users should select the Private computer option only if the user is the sole operator of the
computer, and the computer adheres to that user's organizational security policies. When
selected, the Private computer option allows for a much longer period of inactivity before
automatically ending the session—its internal default value is 24 hours. This option is
intended to benefit Outlook Web Access users who are using personal computers in their
office or home.
To match the security requirements of your organization, an administrator can configure the
inactivity time-out values.
Note:
Incorrectly editing the registry can cause serious problems that may require you to
reinstall your operating system. Problems resulting from editing the registry
incorrectly may not be able to be resolved. Before editing the registry, back up any
valuable data.
Procedure
To set the Outlook Web Access forms-based authentication trusted computer
cookie time-out value
1. Start Registry Editor (regedit).
3. On the Edit menu, point to New, and then click DWORD Value.
7. In the Value Data box, type a value (in minutes) between 1 and 432,000.
8. Click OK.
• For information about managing and configuring Outlook Web Access, see the
following topics:
• The Exchange server that users authenticate against for Outlook Web Access must
be running Microsoft Windows Server™ 2003.
• Your users' mailboxes must be on Exchange 2003 servers. (If you have a mixed
deployment of Exchange mailboxes, you can create a separate virtual server on your
Exchange server just for Exchange 2003 users and enable compression on it.)
• Client computers must be running Microsoft Internet Explorer version 6 or later. The
client computers must also be running Microsoft Windows® XP or Microsoft
Windows 2000 Server and have installed on them the security update that is discussed in
Microsoft Security Bulletin MS02-066, "Cumulative Patch for Internet Explorer
(Q328970)."
Note:
If a user does not have a supported browser for compression, the client computer
still operates normally.
• You may need to enable HTTP 1.1 support through proxy servers for some dial-up
connections. (HTTP 1.1 support is required for compression to function correctly.)
56
Procedure
To enable Outlook Web Access data compression
1. Start Exchange System Manager.
2. In the details pane, expand Servers, expand the server you want, and then
expand Protocols.
3. Expand HTTP, right-click Exchange Virtual Server, and then click Properties.
Procedure
To simplify the Outlook Web Access URL
1. Using the Internet Services Manager, open the properties for the Default Web
Site.
2. Click the Home Directory tab, and then select A redirection to a URL.
3. In Redirect to, type /<directory name>, and then click A directory below URL
entered. For example, to redirect https://mail/ requests to https://mail/exchange, in
Redirect to, you would type /exchange.
If you want your users to use SSL to access their server, you can redirect client requests
to https://mail/<directory name>. To require users to use SSL, In Redirect to, type
https://mail/<directory name>, and then click A directory below URL entered. This
setting hard codes the name of the server; therefore if you redirect client requests to
https://mail, the client must be able to resolve the name mail.
Note:
Users still must enter the full URL, including username, to access other mailboxes or
content in folders other than the inbox.
For detailed steps about how to enable POP3, or IMAP4 using the Services snap-in, see How
to Enable a POP3, IMAP4, or NNTP Virtual Server.
If you set the services to start automatically and then need to start, pause, or stop the
services, use Exchange System Manager. For detailed steps, see How to Start, Pause, or
Stop a Virtual Server..
58
Procedure
To enable a POP3, IMAP4, or NNTP virtual server
1. In the Services snap-in, in the console tree, click Services (Local).
3. On the General tab, under Startup type, select Automatic, and then click
Apply.
5. Repeat this procedure on all nodes that will be running the POP3, IMAP4, or
NNTP virtual server.
• For information about configuring and managing client protocols, see Managing
Protocols.
Procedure
To start, pause, or stop the virtual server
• In Exchange System Manager, right-click the IMAP4, POP3, or NNTP virtual
server you want to manage, and do one of the following:
Note:
When a server is paused, an icon indicating that the server is paused
appears next to the server name in the console tree.
Note:
When a server is stopped, an icon indicating that the server is stopped
appears next to the server name in the console tree.
• For information about how to enable POP3, IMAP4, and NNTP virtual servers, see
How to Enable a POP3, IMAP4, or NNTP Virtual Server.
• For information about configuring and managing client protocols, see Managing
Protocols.
Follow these steps to enable your Exchange 2003 users to use Outlook Mobile Access.
1. Configure your Exchange 2003 front-end server for Outlook Mobile Access.
• For detailed information about enabling Outlook Mobile Access at the organizational
level, see How to Enable or Disable Outlook Mobile Access at the Organizational Level.
• For detailed steps for enabling Outlook Mobile Access at the user level, see How to
Enable or Disable Outlook Mobile Access at the User Level.
For detailed steps about how to configure a Pocket PC Phone Edition device to use Outlook
Mobile Access, see How to Access Exchange Data Using Outlook Mobile Access.
61
Procedure
To enable or disable Outlook Mobile Access at the organizational level
1. On the Exchange server where the user's mailbox is located, log on as an
Exchange administrator and start Exchange System Manager.
2. Expand Global Settings, right-click Mobile Services, and then click Properties.
Note:
For more information about supported devices for Exchange and planning for
mobile device support with Exchange, see the section "Mobile Device
Support for Exchange Server 2003" in Planning an Exchange Server 2003
Messaging System.
5. Click OK.
For an overview of how to deploy Outlook Mobile Access in your organization, see
"Configuring Outlook Mobile Access" in the Exchange Server 2003 Client Access Guide.
62
Procedure
To enable or disable Outlook Mobile Access at the user level
1. Log on to the Exchange server as an Exchange administrator with the user's
mailbox, and then start Active Directory Users and Computers.
2. Expand the domain, and then open the location for the users whose settings that
you want to modify.
3. Right-click the user or users whose Outlook Mobile Access settings you want to
modify, and then select Exchange Tasks.
4. In the Exchange Task Wizard, on the Available Tasks page, select Configure
Exchange Features, and then click Next.
• To prevent the users' settings from being modified when you have selected
more than one user, select Do not Modify.
7. Click Finish.
63
For an overview of how to deploy Outlook Mobile Access in your organization, see
"Configuring Outlook Mobile Access" in the Exchange Server 2003 Client Access Guide.
Procedure
To access Exchange data using Outlook Mobile Access
1. On the device, from the Today screen, tap Start, and then tap Internet Explorer.
2. On the Internet Explorer screen, tap View, and then tap Address Bar to open
the address bar in your browser window.
3. Tap anywhere inside the address bar, enter the following URL, and then tap the
Go button: https://ExchangeServerName/oma, where ExchangeServerName is the
name of your Exchange server running Outlook Mobile Access.
Note:
If a connection bubble does not appear, you may have to connect to your
network manually.
4. At the Network Log On screen, enter the user name, password, and domain in
the spaces provided, and then tap OK.
5. Repeat this procedure for each of your users' Pocket PC Phone Edition devices.
As an alternative, instruct your users about how to configure their devices for use
with Exchange ActiveSync.
64
Note:
To correctly manage client access to Exchange 2003, you must first understand how
Microsoft Windows technologies, such as Internet Information Services (IIS) and
Microsoft Active Directory® directory service, interact with Exchange. You must also
understand protocols such as HTTP and MAPI, and how client applications such as
Exchange ActiveSync® and Microsoft Office Outlook® 2003 use these respective
protocols to interact with Exchange.
Managing Protocols
In your Exchange messaging deployment configuration, you use Exchange System Manager
to manage the protocols that you support. When you use Exchange System Manager to
manage protocols, you handle settings on the individual virtual servers for the protocol that is
to be configured. The virtual servers that are associated with the various protocols, such as
the Exchange Virtual Server and the Internet Message Access Protocol version 4rev1
(IMAP4) virtual server, contain settings based on the capabilities and use of the specific
protocol. For example, the Exchange Virtual Server, which manages HTTP access to
Exchange, provides settings for Microsoft Office Outlook 2003 Web Access, such as gzip
compression support.
Generally, managing the virtual server for one protocol is the same as managing a virtual
server for a different protocol. The common management tasks include enabling a virtual
server, assigning ports, setting connection limits, starting or stopping a virtual server, and
disconnecting users. However, there are some server-specific management tasks. The
following sections describe the common tasks for all virtual servers associated with protocols
and the server-specific tasks for the Exchange Virtual Server, IMAP4 virtual server, and the
Network News Transfer Protocol (NNTP) virtual server.
65
Note:
To manage individual Exchange client access settings, use Active Directory Users
and Computers.
Note:
Although Outlook Mobile Access uses the HTTP protocol, Outlook Mobile Access is
disabled by default and must be enabled by using Exchange System Manager.
However, Exchange installs, but does not enable services for Post Office Protocol version 3
(POP3), IMAP4, and NNTP. If your client access model relies on communications that use
POP3, IMAP4, or NTTP, you must manually enable them.
To enable either the POP3 or IMAP4 service, you use the Services snap-in to set the service
to start automatically. Then, you start the service by using Exchange System Manager. To
enable NNTP, use the Services snap-in to set the NNTP service to start automatically, and
then use Exchange System Manager to start the service.
• For detailed steps on how to configure the POP3, IMAP4, or NNTP services to start
automatically, see How to Enable a POP3, IMAP4, or NNTP Virtual Server.
• For detailed steps on how to start, pause, or stop a POP3, IMAP4, or NNTP virtual
server, see How to Start, Pause, or Stop a Virtual Server.
Important:
If you do not use the recommended port assignments, some clients may be not able
to connect. You may also have to reconfigure your client software manually to
connect to the new port assignments.
Note:
To fully enable SSL on the POP3 virtual server, you must request and install a
certificate. You must do this even if you leave the default SSL port set at 995 on the
POP3 virtual server. For more information about installing certificates, see "Using
Secure Sockets Layer" in Securing Your Exchange Messaging Environment.
Although it is highly recommended that you use the default port assignments, you do not
have to use the default IP address. You can use the IP address from any available network
card as the IP address for the virtual server.
If you plan to create multiple virtual servers, each virtual server must have a unique
combination of ports and IP address. Because the port settings are standard and should not
be changed, you will need to provide each virtual server with a unique IP address.
Besides creating a unique combination of ports and IP address for each virtual server, you
can also configure multiple identities for your virtual server. Multiple identities enable you to
associate multiple host or domain names with a single virtual server.
For detailed steps for assign a unique IP address to a virtual server or to assign multiple
identities to a virtual server, see How to Assign Ports and IP Addresses to Virtual Servers.
After users are connected, you can also limit the length of time that idle connections remain
logged on to the server. By default, Exchange disconnects idle sessions after 10 minutes.
In topologies that contain Exchange front-end and back-end servers, the connection time-out
setting varies based on server role. On back-end servers, the connection time-out setting
limits the length of time clients can be connected to the server without performing any activity.
However, on front-end servers, the connection time-out setting limits the total length of the
client session, regardless of client activity. Therefore, in front-end and back-end server
environments, you should configure the time-out value on your front-end servers high enough
so that users can download the maximum message size that is permitted over the slowest
connection speed that you want to support. Setting this value high enough ensures that
clients are not disconnected while they are downloading messages. For more information
about configuring your Exchange front-end and back-end server architecture, see the
Exchange Server 2003 Deployment Guide.
Note:
Setting the connection time-out setting too low can cause clients to be unexpectedly
disconnected from the server and possibly receive error messages. Thirty minutes is
the lowest recommended connection time-out setting.
For detailed steps about how to configure connection limits, see How to Set Connection
Limits.
For detailed steps on how to start, pause, or stop a POP3, IMAP4, or NNTP virtual server,
see How to Start, Pause, or Stop a Virtual Server.
Disconnecting Users
You can immediately disconnect a single user or all users if they are accessing the virtual
server without permission.
For detailed steps on how to disconnect users, see How to Disconnect Users from a Virtual
Server.
68
The default IP address is (All Unassigned), which means that a specific IP address has not
been assigned and the virtual server will use the IP address of the Microsoft® Exchange
2003 server that is currently hosting the virtual server. These default values provide a virtual
server with automatic discovery—the server can immediately receive incoming connections
by using the default IP address and ports.
If you plan to create multiple virtual servers, each virtual server must have a unique
combination of ports and IP address. Because the port settings are standard and should not
be changed, you will need to provide each virtual server with a unique IP address.
Besides creating a unique combination of ports and IP address for each virtual server, you
can also configure multiple identities for your virtual server. Multiple identities enable you to
associate multiple host or domain names with a single virtual server.
Important:
If you do not use the recommended port assignments, some clients may be not able
to connect. You may also have to reconfigure your client software manually to
connect to the new port assignments.
69
Note:
To fully enable SSL on the POP3 virtual server, you must request and install a
certificate. You must do this even if you leave the default SSL port set at 995 on the
POP3 virtual server. For more information about installing certificates, see "Using
Secure Sockets Layer" in Securing Your Exchange Messaging Environment.
Procedure
To assign ports and IP addresses to virtual servers
1. Log on the Exchange server where the virtual server is running using the
Exchange administrator account that has local Administrator permissions and
Exchange Full Administrator permissions.
4. In the Advanced dialog box, click Edit to change the IP address to a unique
value, or click Add to add a new identity (that is, a new IP address and port
combination).
After users are connected, you can also limit the length of time that idle connections remain
logged on to the server. By default, Exchange disconnects idle sessions after 10 minutes.
70
Note:
Setting the connection time-out setting too low can cause clients to be unexpectedly
disconnected from the server and possibly receive error messages. Thirty minutes is
the lowest recommended connection time-out setting.
Procedure
To set connection limits
1. Log on to the Exchange server where the virtual server is running using the
Exchange administrator account that has local Administrator permissions and
Exchange Full Administrator permissions.
• For more information about configuring an Exchange 2003 front-end server, see and
back-end server architecture, see Configuring an Exchange Front-End Server.
71
Procedure
To disconnect users from a virtual server
1. In Exchange System Manager, expand SMTP, IMAP4, or POP3, and then
double-click the virtual server from which you want to disconnect users.
2. To disconnect users from the Current Sessions node under the virtual server,
use one of the following methods:
Note:
In topologies that contain Exchange front-end and back-end servers, configure the
URL that is used to access calendaring information about the back-end server.
Exchange does not recognize any URL settings that you configure on the front-end
servers.
When downloading meeting requests through POP3 and IMAP4, a URL to the meeting
request in Outlook Web Access is added to the plain text/HTML part of the message. Users
click the URL to access the meeting request, and then accept or decline the request. (Some
72
IMAP4 and POP3 messaging clients include a graphical user interface that allows those
clients to accept or decline meetings without having to click the URL.) If users accept the
request, Exchange automatically adds it to their calendar.
Note:
The URL to the meeting request does not work for POP3 clients that are configured
to download messages from the server. This situation occurs because the message
is downloaded to the client. As a result, the URL points to a message that is no
longer on the server.
For detailed steps, see How to Configure Calendaring Options for a POP3 or IMAP4 Virtual
Server.
Note:
In topologies that contain Exchange front-end and back-end servers, configure the
URL that is used to access calendaring information about the back-end server.
Exchange does not recognize any URL settings that you configure on the front-end
servers.
Note:
The URL to the meeting request does not work for POP3 clients that are configured
to download messages from the server. The URL does not work because the
message is downloaded to the client. As a result, the URL points to a message that is
no longer on the server.
73
Procedure
To configure calendaring options for a POP3 or IMAP4 virtual server
1. In Exchange System Manager, expand First Administrative Group, expand the
Servers node, and then expand the Exchange server for which you want to manage
POP3 or IMAP4 calendaring options.
2. Expand the Protocols node, and then right-click the POP3 or IMAP4 protocol
and select Properties.
3. On the Calendaring tab, select the server where recipients download meeting
requests:
• To designate the recipient's home server as the server where the recipient
downloads meeting requests, select Use recipient's server.
This is the default setting. If you select this option, the URL has the following
format:
http://<HomeServerName>/Exchange/Username/Inbox/Team%20Meeting.eml
This option is useful if you have configured your Outlook Web Access users to
access their mailboxes through a front-end server. If you select this option, the
URL has the following format:
http://<FQDomainName>/Exchange/Username/Inbox/Team%20Meeting.eml
4. To use SSL to connect to the Exchange servers, select Use SSL connections.
Note:
If you select this option, the URL syntax includes https:// instead of http://.
Exchange front-end server, as well as retrieve and handle information in the Exchange store.
By supporting both HTTP and WebDAV, Exchange 2003 can provide more data access
functionality to users. For example, users of Outlook Web Access can do calendar request
operations and can store Microsoft Office files, such as Microsoft Office Word documents, in
the Exchange store.
Exchange provides support for both HTTP and WebDAV through the HTTP virtual server.
When you install Exchange, Exchange automatically installs and configures an HTTP virtual
server. You administer this default server only from IIS.
However, to provide for several collaboration scenarios and to supplement the access to
folders that is provided by the default Web site in IIS, you can create new HTTP virtual
servers in Exchange System Manager. As with any virtual server, each new HTTP virtual
server that you create requires a unique combination of IP address, TCP port, SSL port, and
host name. Furthermore, for each virtual server that you create, you must define one virtual
directory as the root directory of the server for publishing content.
Note:
The folder contents displayed by the HTTP virtual server are converted to Web pages
and sent to a user's browser by IIS.
For detailed steps about how to create a new HTTP virtual server, see How to Create a New
HTTP Virtual Server.
However, to provide for several collaboration scenarios and to supplement the access to
folders that is provided by the default Web site in IIS, you can create new HTTP virtual
servers in Exchange System Manager.
Note:
The folder contents displayed by the HTTP virtual server are converted to Web pages
and sent to a user's browser by IIS.
Procedure
To create a new HTTP virtual server
1. In Exchange System Manager, expand the First Administrative Group, expand
the Servers node, and then expand the Exchange server where you want to create a
new HTTP virtual directory.
2. Expand the Protocols node, right-click the HTTP protocol, select New and then
click HTTP Virtual Server.
3. In the Properties dialog box for the new HTTP virtual server, configure the
settings for your new Exchange virtual directory.
• Include all public folders when a folder is requested Unlike POP3, which allows
clients to access only mail messages, IMAP4 clients have access to folders other than
the Inbox folder. However, this ability to access other folders must be enabled on the
virtual server.
You select these settings on the General tab in the Default IMAP4 Virtual Server
Properties dialog box.
The General tab in the Default IMAP4 Virtual Server Properties dialog box
For detailed steps about how to configure these settings, see the following topics:
• How to Include All Public Folders When a Folder Is Requested on an IMAP4 Virtual
Server
is required. You select these settings on the General tab in the Default IMAP4 Virtual
Server Properties dialog box.
Procedure
To enable fast message retrieval for an IMAP4 virtual server
1. In Exchange System Manager, navigate to the IMAP4 Virtual Server you want to
configure.
2. In the console tree, right-click a virtual server, and then click Properties.
The General tab in the Default IMAP4 Virtual Server Properties dialog box
78
• For information about configuring and managing client protocols, see Managing
Protocols.
Procedure
To include all public folders when a folder is requested on an IMAP4 virtual server
1. In Exchange System Manager, navigate to the IMAP4 virtual server that you want
to configure.
2. In the console tree, right-click a virtual server, and then click Properties.
• Click Include all public folders when a folder list is requested to allow
IMPA4 clients to access folders other than the Inbox folder.
The General tab in the Default IMAP4 Virtual Server Properties dialog box
79
• For information about configuring and managing client protocols, see Managing
Protocols.
and post items, such as messages and documents, to NNTP newsgroups that are
represented in Exchange as public folders. For example, users can share information by
posting messages to a newsgroup public folder in their area of interest. Other users can read
and respond to items in the newsgroup. Items in newsgroups can be replicated to USENET
host computers through newsfeeds.
A newsfeed is the flow of items from one USENET site to another. Newsfeeds enable users of
different news sites to read and post articles to newsgroups as though they are using one
news site. A news site is a collection of related newsgroups. An article posted to one news
site is sent to other news sites where it can be read. You need to create a newsfeed to each
remote server to which you want to distribute news articles.
Because the reason for using newsgroups is to post and share information, you will likely
need to manage the size of these postings in relation to the resources available on the NNTP
virtual server. Accepting articles that are too large or accepting too much data during one
connection can cause increased traffic, overload your network, and quickly fill your hard disk.
Be sure to set a size limit that matches your server's capabilities.
For detailed steps on how to configure posting limits and moderations settings, see How to
Configure Posting Limits and Moderation Settings for an NNTP Virtual Server.
Procedure
To configure posting limits and moderation settings for an NNTP virtual server
1. Log on to the Exchange server where the virtual server is running using the
Exchange administrator account that has local Administrator permissions and
Exchange Full Administrator permissions.
3. On the Settings tab (see the figure below), select from the following options:
The Settings tab in the Default NNTP Virtual Server Properties dialog box
82
Note:
For more information about configuring NTTP, see the Exchange Server 2003
Help.
You use both Exchange System Manager and the IIS snap-in to manage Outlook Web
Access. Use:
83
• Exchange System Manager to modify settings for access control to Outlook Web
Access.
• The IIS snap-in to control the authentication settings for the virtual directories for
Outlook Web Access, including \Exchange, \Exchweb, and \Public.
The IIS snap-in to enable SSL for Outlook Web Access. For more information about using
SSL with Outlook Web Access, see "Configuring Exchange Server 2003 for Client Access" in
the Exchange Server 2003 Deployment Guide.
The following sections show how to use Exchange System Manager and the IIS snap-in to do
management tasks associated with Outlook Web Access.
For detailed steps on how to enable Outlook Web Access for internal clients only, see How to
Enable Outlook Web Access for Internal Clients Only.
Besides enabling Outlook Web Access for users in your corporate network, you can also
prevent specific internal users from accessing Outlook Web Access. You do this by disabling
the HTTP and NNTP protocols for those users.
For detailed steps on how to disable Outlook Web Access for specific users, see How to
Disable Outlook Web Access for Specific Users.
If you upgrade a server running Exchange 2000 that was modified to use a browser's
language setting, Exchange 2003 continues to function in the same manner. The following
table lists the language groups and respective character sets.
84
Baltic iso-8859-4
Cyrillic koi8-r
Greek iso-8859-7
Hebrew windows-1255
Japanese iso-2022-jp
Korean ks_c_5601-1987
Thai windows-874
Turkish iso-8859-9
Vietnamese windows-1258
If you expect Outlook Web Access users in your organization to send mail frequently, you can
modify registry settings so that users who are running Internet Explorer 5 or later can use
UTF-8 encoded Unicode characters to send mail.
Note:
Incorrectly editing the registry can cause serious problems that may require you to
reinstall your operating system. Problems resulting from editing the registry
incorrectly may not be able to be resolved. Before editing the registry, back up any
valuable data.
For detailed steps on modifying the default language setting, see How to Modify the Default
Browser Language Settings for Outlook Web Access.
mail informing the sender that the e-mail address of your user is valid. The result is that the
user will receive junk e-mail more frequently because the junk e-mail sender now knows that
the e-mail address is valid.
In Outlook Web Access, an incoming message with any content that can be used as a
beacon, regardless of whether the message actually contains a beacon, prompts Outlook
Web Access to display the following warning message:
If users know that a message is legitimate, they can click the Click here to unblock content
link in the warning message and unblock the content. If your users do not recognize the
sender or the message, they can open the message without unblocking the content and then
delete the message without triggering beacons. If your organization does not want to use this
feature, you can disable the blocking option for Outlook Web Access.
For detailed steps for disabling the blocking of Web beacons, see How to Disable Blocking of
Web Beacons.
Additionally, you can specify a list of front-end servers that are exceptions to the "Allow
attachment access through backend servers" option thereby allowing the users that connect
through the specified front-end servers to be able to accept attachments. Note that if you set
the server to "Allow all attachments" or "Don't allow any attachments," this value is ignored.
Also, if a request is through a front-end server specified in this list of front-end servers that
can accept attachments, the attachments must still pass Level 1 and 2 restrictions.
Blocking Attachments
With Outlook Web Access, you can block users from opening, sending, or receiving specified
attachment types. In particular, you can:
• Prevent users from accessing certain file type attachments By default, all new
Exchange 2003 installations block attachments of Levels 1 and 2 file types, and Levels 1
and 2 MIME types. This feature is particularly useful in stopping Outlook Web Access
users from opening attachments at public Internet terminals, which could potentially
compromise corporate security. If an attachment is blocked, a warning message
indicating that the user cannot open the attachment appears in the InfoBar of the e-mail
message.
86
Outlook Web Access users who are working in their offices or connected to the corporate
network from home can open and read attachments. You can enable full intranet access
to attachments by providing the URL to the back-end servers and allowing attachments
on the Exchange back-end servers.
To change the attachment blocking settings, you must modify the registry settings on the
server.
For detailed steps for modifying attachment blocking settings, see How to Modify Attachment
Handling Settings.
After you complete these steps, users whose e-mail addresses do not have the same SMTP
domain as the HTTP virtual server will not be able to log on and access Outlook Web Access.
Also, if you do not use the SMTP domain as the default domain, external users will not be
able to determine what the SMTP domain is because the domain does not appear in the
From field when users send e-mail messages outside the organization.
Procedure
To enable Outlook Web Access for internal clients only
1. Create a recipient policy with an SMTP domain name. Users who are connecting
to an HTTP virtual server must have an e-mail address with the same SMTP domain
as the virtual server. Creation of a recipient policy is an efficient way to apply the
same SMTP domain to multiple users.
Note:
Outlook Web Access users do not have to know the name of the SMTP
87
domain.
2. Apply the recipient policy to the user accounts for which you want to enable
access.
3. Then, on the front-end server, create a new HTTP virtual server that specifies the
domain that is used in the recipient policy.
• For information about managing and configuring Outlook Web Access, see the
following topics:
Procedure
To disable Outlook Web Access for specific users
1. In Active Directory Users and Computers, open the user's Properties dialog
box.
2. On the Exchange Features tab, clear the settings for HTTP and NNTP.
• For information about managing and configuring Outlook Web Access, see the
following topics:
If you upgrade a server running Exchange 2000 Server that was modified to use a browser's
language setting, Exchange Server 2003 continues to function in the same manner. The
following table lists the language groups and respective character sets.
Baltic iso-8859-4
Cyrillic koi8-r
Greek iso-8859-7
Hebrew windows-1255
Japanese iso-2022-jp
Korean ks_c_5601-1987
Thai windows-874
Turkish iso-8859-9
Vietnamese windows-1258
If you expect Outlook Web Access users in your organization to send mail frequently, you can
modify registry settings so that users who are running Internet Explorer 5 or later versions
can use UTF-8-encoded Unicode characters to send mail.
Procedure
To modify the default language setting for Outlook Web Access
1. On the Exchange server, log on with the Exchange administrator account, and
start Registry Editor (regedit).
5. In Edit DWORD Value, in the Value data box, type 1, and then click OK.
any content that can be used as a beacon, regardless of whether the message actually
contains a beacon, prompts Outlook Web Access to display the following warning message:
To help protect your privacy, links to images, sounds, or other external content in this
message have been blocked. Click here to unblock content.
If your organization does not want to use this feature, you can have your users perform the
following procedure to disable the blocking option for Outlook Web Access.
Procedure
To disable the blocking of Web beacons
1. Use a Web browser to gain access to Outlook Web Access.
2. Click Options.
3. Under Privacy and Junk E-mail Prevention, clear the Block external content
in HTML e-mail messages check box.
Your Exchange server can handle attachments in the following three ways:
Caution:
Incorrectly editing the registry can cause serious problems that may require you to
reinstall your operating system. Problems resulting from editing the registry
incorrectly may not be able to be resolved. Before editing the registry, back up any
valuable data.
Procedure
To modify the attachment blocking settings on an Exchange server
1. Log on to the Exchange server using the Exchange administrator account, and
then start Registry Editor (regedit).
3. On the Edit menu, point to New, and then click DWORD Value.
8. Click OK.
92
• For information about managing and configuring Outlook Web Access, see the
following topics:
For detailed steps about how to specify the front-end servers that can accept attachments,
see How to Specify the Front-End Servers That Allow for Attachment Handling.
For steps for how to configure the value that determines how a server will block attachments,
see How to Modify Attachment Handling Settings.
Caution:
Incorrectly editing the registry can cause serious problems that may require you to
reinstall your operating system. Problems resulting from editing the registry
incorrectly may not be able to be resolved. Before editing the registry, back up any
valuable data.
Procedure
To specify the front-end servers that allow for attachment handling
1. Log on to the Exchange server using the Exchange administrator account, and
then start Registry Editor (regedit).
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MSExchangeWeb\OWA
3. On the Edit menu, point to New, and then click String Value.
6. In Edit String Value, under Value Data, enter the names of the front-end servers
that you want to allow attachments.
7. Click OK.
• For information about managing and configuring Outlook Web Access, see the
following topics:
1. Use the front-end and back-end server architecture to provide a single namespace
for users to connect to your network (recommended). For more information, see Planning
an Exchange Server 2003 Messaging System.
2. Install an SSL certificate on the front-end server. For more information, see the
Exchange Server 2003 Deployment Guide.
3. Inform users how to connect to the Internet from their device and use ActiveSync on
their device to connect to their Exchange server. For more information, see the Exchange
Server 2003 Deployment Guide.
The following sections provide information about how to manage Exchange ActiveSync for
your organization, including how to enable and disable the Exchange ActiveSync application,
and how to enable ActiveSync for your users.
access Exchange with a mobile device that is powered by Windows, use Active Directory
Users and Computers to modify the settings for a user or groups of users.
Important:
• Exchange ActiveSync must use the default virtual directory created by Exchange
Server 2003 Setup. Deleting, renaming, and creating additional virtual directories on
the same virtual server will prevent Exchange ActiveSync from functioning properly.
Additionally, if you attempt to re-create the Exchange ActiveSync virtual directory in
Exchange System Manager, Exchange ActiveSync will not function.
• For detailed steps about enabling and disabling Exchange ActiveSync features at the
organizational level, see How to Enable or Disable Exchange ActiveSync for Your
Organization.
• For detailed steps about how to modify ActiveSync settings for a user or groups of
users, see How to Enable and Disable Exchange ActiveSync Features at the User Level.
• The following are the server-side procedures you use to enable AUTD notifications:
• For detailed steps about enabling AUTD at the organizational level, see How to
Enable Up-to-Date Notifications for Your Organization.
• For detailed steps on how to modify AUTD settings for a user or groups of users,
see How to Enable and Disable Up-to-Date Notifications at the User Level.
• The following are the server-side procedures you use to enable AUTD notifications:
• For detailed steps about enabling AUTD at the organizational level, see How to
Enable Up-to-Date Notifications for Your Organization.
• For detailed steps about how to modify AUTD settings for a user or groups of
users, see How to Enable and Disable Up-to-Date Notifications at the User Level.
96
• For detailed steps on how to specify a mobile operator for an up-to-date notifications
on a device, see How to Specify a Mobile Operator for Up-to-Date Notifications on a
Device.
Procedure
To enable or disable Exchange ActiveSync for your organization
1. On the Exchange front-end server that is running Exchange ActiveSync, log on
with the Exchange administrator account, and then start Exchange System Manager.
2. Expand Global Settings, right-click Mobile Services, and then click Properties.
4. Click OK.
For detailed steps for how to configure a mobile device to use Exchange ActiveSync, see
How to Configure a Mobile Device to Use Exchange ActiveSync.
Procedure
To configure the Exchange ActiveSync up-to-date notifications feature
1. Ensure that Exchange is configured to support the always up-to-date notification
feature. For detailed steps, see the following procedures:
2. Configure any mobile carriers that you need to support your deployment. For
detailed steps, see "How to Configure a Mobile Carrier When Using Up-to-Date
Notifications" in the Exchange Server 2003 Client Access Guide.
3. Configure your user devices to use the up-to-date notification feature. For
detailed steps, see How to Specify a Mobile Operator for Up-to-Date Notifications on
a Device.
Procedure
To enable up-to-date notifications for your organization
1. On the Exchange front-end server running Exchange ActiveSync, log on with the
Exchange administrator account, and then start Exchange System Manager.
2. Expand Global Settings, right-click Mobile Services, and then click Properties.
4. Click OK.
99
• For detailed steps for how to configure up-to-date notifications so that users in your
organization can specify their own mobile operator, see How to Set the Enable
Notifications to User-Specified SMTP Address Option for Your Organization.
• For detailed steps for how to modify up-to-date notification settings for a user or
groups of users, see How to Enable and Disable Up-to-Date Notifications at the User
Level.
• For conceptual information about the up-to-date notification feature, see "Enabling
Up-to-Date Notifications for Your Organization" in Managing Mobile Services.
Procedure
To enable and disable always up-to-date notifications at the user level
1. On the Exchange server on which the user's mailbox resides, log on with the
Exchange administrator account, and then start Active Directory Users and
Computers.
2. Expand the domain, and then open the location for the users whose settings you
want to modify.
3. Right-click the user or users whose up-to-date notifications settings you want to
modify, and then select Exchange Tasks.
6. To prevent the users' settings from being modified when you have selected more
than one user, select Do not modify.
• For an overview of the steps that you need to consider when deploying AUTD
notifications, see How to Configure the Exchange ActiveSync Up-to-Date Notifications
Feature.
• For conceptual information about the AUTD feature, see "Enabling Up-to-Date
Notifications for Your Organization" in Managing Mobile Services.
Note:
After you configure your mobile carriers, your users will be able to select a mobile
carrier from the Service Provider Name drop-down list when configuring their
devices for up-to-date notifications.
If you do not configure mobile carriers for your users, users who are configured with the
Enable notification to user specified SMTP addresses option can specify a mobile carrier
by entering the SMS address of their device. This address uses the same format as an SMTP
address (for example, <PhoneNumber>@<MobileCarrier>).
Important:
Not all mobile carriers and devices support up-to-date notifications. One reason is
because the mobile carrier and the device must specifically support the conversion of
SMTP e-mail messages into SMS messages.
101
Procedure
To configure a mobile carrier when using always up-to-date notifications
1. In Exchange System Manager, right-click Mobile Services, select New,and then
select Mobile Carrier.
2. In the Properties dialog box, in the Name field, type a display name for the
carrier. The name you use here will be the name displayed on the mobile device.
3. In SMTP domain, type the SMTP domain being served by the carrier, for
example, type tmomail.net if your carrier is T-Mobile.
Procedure
To set the Enable notifications to user-specified SMTP address option for your
organization
1. On the Exchange front-end server that is running Exchange ActiveSync, log on
with the Exchange administrator account, and then start Exchange System Manager.
2. Expand Global Settings, right-click Mobile Services, and then click Properties.
3. On the Mobile Services Properties page, in the Exchange ActiveSync pane, set
the Enable notifications to user specified SMTP address option as follows:
• If you want to specify a mobile operator for your user, clear Enable
102
• If you want to allow your users to specify their own mobile operators, select
Enable notifications to user specified SMTP address.
4. Click OK.
• For detailed steps for how to modify up-to-date notification settings for a user or
groups of users, see How to Enable and Disable Up-to-Date Notifications at the User
Level.
The following sections provide information about how to manage Outlook Mobile Access for
your organization, including how to enable the Outlook Mobile Access application for your
organization and how to enable users for Outlook Mobile Access.
1. Use the front-end and back-end server architecture to provide a single namespace
for users to connect to your network. For more information, see Exchange Server 2003
and Exchange 2000 Server Front-End and Back-End Topologies.
2. Install an SSL certificate on the front-end server. For more information, see the
Exchange Server 2003 Deployment Guide.
103
3. Inform users how to connect to the Internet from their devices and how to use
Outlook Mobile Access to access their Exchange information. For detailed steps for how
to use Outlook Web Access to access Exchange data, see How to Access Exchange
Data Using Outlook Mobile Access.
• For detailed steps for enabling Outlook Mobile Access for your organization, see How
to Enable or Disable Outlook Mobile Access at the Organizational Level.
• For detailed steps for modifying Outlook Mobile Access settings, see How to Enable
or Disable Outlook Mobile Access at the User Level.
Copyright
The information contained in this document represents the current view of Microsoft
Corporation on the issues discussed as of the date of publication. Because Microsoft must
respond to changing market conditions, it should not be interpreted to be a commitment on
the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information
presented after the date of publication.
Complying with all applicable copyright laws is the responsibility of the user. Without limiting
the rights under copyright, no part of this document may be reproduced, stored in or
introduced into a retrieval system, or transmitted in any form or by any means (electronic,
mechanical, photocopying, recording, or otherwise), or for any purpose, without the express
written permission of Microsoft Corporation.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual
property rights covering subject matter in this document. Except as expressly provided in any
written license agreement from Microsoft, the furnishing of this document does not give you
any license to these patents, trademarks, copyrights, or other intellectual property.
Unless otherwise noted, the companies, organizations, products, domain names, e-mail
addresses, logos, people, places, and events depicted in examples herein are fictitious. No
104
association with any real company, organization, product, domain name, e-mail address,
logo, person, place, or event is intended or should be inferred.
Microsoft, MS-DOS, Windows, Windows Server, Windows Vista, Active Directory, ActiveSync,
ActiveX, Entourage, Excel, FrontPage, Hotmail, JScript, Microsoft Press, MSDN, MSN,
Outlook, SharePoint, Visual Basic, Visual C++, Visual Studio, Win32, Windows Mobile,
Windows NT, and Windows Server System are either registered trademarks or trademarks of
Microsoft Corporation in the United States and/or other countries.