Exchange 2 K 3 Admin Guide
Exchange 2 K 3 Admin Guide
Contents
Administration Guide for Exchange Server 2003.............................................................. 25 Preparing to Administer Your Exchange Server 2003 Environment................................. 25 Understanding Exchange Administration Architecture ..................................................... 26 Interacting with Active Directory........................................................................................ 27 Selecting the Right Management Tools ............................................................................ 29 Working with Exchange System Manager ........................................................................ 30 How to Open Exchange System Manager........................................................................ 34 Procedure ......................................................................................................................35 Working with Active Directory Users and Computers ....................................................... 35 How to Open Active Directory Users and Computers....................................................... 37 Before You Begin........................................................................................................... 37 Procedure ......................................................................................................................38 Creating Recipients........................................................................................................... 39 Performing Exchange Tasks............................................................................................. 40 How to Perform an Exchange-Specific Task in Active Directory Users and Computers.. 41 Before You Begin........................................................................................................... 41 Procedure ......................................................................................................................42 Managing Exchange in Multiple Domains......................................................................... 42 How to Manage Exchange in Another Domain................................................................. 42 Before You Begin........................................................................................................... 42 Procedure ......................................................................................................................43 Deciding Where to Manage Exchange ............................................................................. 43 Setting Up a Management Station Using Windows XP Professional SP1 or Later.......... 45 How to Set Up a Management Station Using Windows XP Professional SP1 or Later ... 46 Procedure ......................................................................................................................46 Installing the Windows Administrative Tools Pack............................................................ 47
How to Install the Windows Administrative Tools Pack .................................................... 47 Before You Begin........................................................................................................... 47 Procedure ......................................................................................................................48 For More Information ..................................................................................................... 48 Installing the SMTP Service .............................................................................................. 48 How to Install the SMTP Service ...................................................................................... 49 Before You Begin........................................................................................................... 49 Procedure ......................................................................................................................49 For More Information ..................................................................................................... 49 Installing the Exchange System Management Tools........................................................ 50 Windows Server 2003.................................................................................................... 50 Windows 2000 Professional SP3 or later ...................................................................... 50 Windows 2000 Server SP3 or later ............................................................................... 50 How to Install the Exchange System Management Tools ................................................ 51 Before You Begin........................................................................................................... 51 Procedure ......................................................................................................................51 For More Information ..................................................................................................... 52 Shutting Down SMTP and NNTP Services ....................................................................... 53 Using Custom Consoles.................................................................................................... 53 Creating Custom Consoles ............................................................................................... 54 How to Create Custom Consoles...................................................................................... 55 Procedure ......................................................................................................................55 How to Create a New Instance of MMC............................................................................ 55 Procedure ......................................................................................................................56 For More Information ..................................................................................................... 56 How to Add Snap-Ins to MMC .......................................................................................... 57 Procedure ......................................................................................................................57 Automating Administrative Tasks...................................................................................... 57 Managing an Exchange Server 2003 Organization .......................................................... 58 Promoting an Exchange Server 2003 Organization from Mixed Mode to Native Mode ... 59 Switching from Mixed Mode to Native Mode ................................................................. 59
How to Switch from Mixed Mode to Native Mode ............................................................. 60 Before You Begin........................................................................................................... 60 Procedure ......................................................................................................................60 For More Information ..................................................................................................... 61 Applying Global Settings in an Exchange Server 2003 Organization............................... 62 Associating File Name Extensions with MIME.................................................................. 62 How to Manage Associations for File Name Extensions .................................................. 63 Procedure ......................................................................................................................63 Configuring SMTP Policies to Control Outbound Mail Formatting and Automatic Responses..................................................................................................................... 64 Understanding the Default Policy...................................................................................... 65 Creating a Policy for a New SMTP Domain ...................................................................... 66 How to Create a New Policy for a New SMTP Domain .................................................... 68 Procedure ......................................................................................................................68 Setting Message Formatting Options for a Policy............................................................. 69 How to Set the Message Formats for a Policy.................................................................. 70 Procedure ......................................................................................................................70 Controlling Automatic Replies and Advanced Formatting for a Policy ............................. 71 How to Set Advanced Properties for a Policy ................................................................... 72 Procedure ......................................................................................................................72 Configuring Message Delivery Options............................................................................. 73 How to Access the Message Delivery Properties Dialog Box........................................... 74 Procedure ......................................................................................................................74 Configuring Default Message Size and Recipient Limits .................................................. 74 How to Change the Default Message Delivery Options.................................................... 76 Procedure ......................................................................................................................76 Configuring SMTP Message Filtering Options.................................................................. 78 Configuring Sender Filtering ............................................................................................. 79 How to Enable Sender Filtering ........................................................................................ 79
Procedure ......................................................................................................................79 Configuring Connection Filtering....................................................................................... 81 How to Configure a Connection Filtering Rule.................................................................. 82 Procedure ......................................................................................................................82 For More Information ..................................................................................................... 83 How to Create a List of Exceptions to Connection Filtering Rules ................................... 84 Procedure ......................................................................................................................84 For More Information ..................................................................................................... 85 How to Create Either a Global Accept or Deny List.......................................................... 86 Procedure ......................................................................................................................86 For More Information ..................................................................................................... 87 Configuring Recipient Filtering.......................................................................................... 88 How to Add a Recipient to the Recipient Filtering List...................................................... 89 Procedure ......................................................................................................................89 For More Information ..................................................................................................... 90 Creating and Managing Administrative Groups ................................................................ 91 Understanding Exchange Server 2003 Administrative Models......................................... 92 Understanding the Types of Administrative Models ...................................................... 92 Using a Centralized Administrative Model ........................................................................ 93 Using a Mixed Administrative Model................................................................................. 94 Using a Decentralized Administrative Model .................................................................... 96 Configuring Exchange Server 2003 Administrative Groups ............................................. 97 Displaying Administrative Groups.................................................................................. 97 How to Display Administrative Groups.............................................................................. 97 Procedure ......................................................................................................................98 For More Information ..................................................................................................... 99 Creating Additional Administrative Groups ....................................................................... 99 How to Create a New Administrative Group ...................................................................100 Before You Begin.........................................................................................................100 Procedure ....................................................................................................................100 For More Information ...................................................................................................101
Moving Objects Between Administrative Groups............................................................101 How to Move Objects Between Administrative Groups ..................................................102 Before You Begin.........................................................................................................102 Procedure ....................................................................................................................102 For More Information ...................................................................................................103 Deleting Administrative Groups ......................................................................................103 How to Delete an Administrative Group..........................................................................103 Procedure ....................................................................................................................104 For More Information ...................................................................................................104 Configuring Exchange Server 2003 System Policies .....................................................104 Understanding How System Policies Affect Individual Settings .....................................106 Creating a Server Policy .................................................................................................107 How to Create a System Policy Container......................................................................108 Procedure ....................................................................................................................108 How to Create a Server Policy........................................................................................109 Before You Begin.........................................................................................................109 Procedure ....................................................................................................................110 Handling Policy Conflicts.................................................................................................111 Adding Servers to a Server Policy ..................................................................................112 How to Add Servers to a Server Policy...........................................................................112 Before You Begin.........................................................................................................112 Procedure ....................................................................................................................112 Viewing the Objects Controlled by a System Policy .......................................................113 How to View the Objects That a Policy Controls ............................................................114 Procedure ....................................................................................................................114 How to View the Policies that Exchange Applies to a Particular Object.........................114 Procedure ....................................................................................................................114 Copying System Policies Between Administrative Groups.............................................115 How to Copy Policy Objects Between Administrative Groups ........................................115 Procedure ....................................................................................................................116
Modifying or Removing a Policy......................................................................................116 How to Modify a Policy....................................................................................................117 Procedure ....................................................................................................................117 How to Remove an Object from the Control of a Policy .................................................117 Procedure ....................................................................................................................118 How to Delete a Policy ....................................................................................................118 Procedure ....................................................................................................................118 Managing Exchange Server 2003 Permissions..............................................................119 Understanding Exchange Objects and Exchange System Manager..............................120 Benefiting from Standardized Security Roles in Exchange ............................................121 Benefiting from Exchange Administration Delegation Wizard ........................................123 Benefiting from Support for Inheritance ..........................................................................125 Configuring Exchange Server 2003 Settings..................................................................126 Configuring Server-Specific Settings ..............................................................................126 How to Open a Server's Properties Dialog Box ..............................................................128 Procedure ....................................................................................................................128 Viewing Messages in Message Tracking Center............................................................129 How to Enable a Server's Messages to Appear in Message Tracking Center ...............130 Before You Begin.........................................................................................................131 Procedure ....................................................................................................................131 For More Information ...................................................................................................131 Enabling Message Tracking............................................................................................131 How to Enable Message Tracking ..................................................................................132 Procedure ....................................................................................................................132 For More Information ...................................................................................................133 Managing Message Tracking Log Files ..........................................................................133 Selecting a Location for the Log Files .........................................................................133 Removing Log Files .....................................................................................................133 How to Select a Location for the Message Tracking Log Files.......................................134
Procedure ....................................................................................................................134 How to Specify How Frequently Log Files are Removed ...............................................136 Before You Begin.........................................................................................................136 Procedure ....................................................................................................................136 Designating a Front-End Server .....................................................................................137 Sending Error Information to Microsoft ...........................................................................138 How to Send Error Information to Microsoft....................................................................139 Before You Begin.........................................................................................................139 Procedure ....................................................................................................................139 For More Information ...................................................................................................140 Configuring Language Settings.......................................................................................140 How to Add a Locale to the Server .................................................................................140 Procedure ....................................................................................................................141 Scheduling Mailbox Manager Processes........................................................................142 Defining a Schedule ........................................................................................................144 How to Set a Schedule for Mailbox Management...........................................................144 Before You Begin.........................................................................................................145 Procedure ....................................................................................................................145 For More Information ...................................................................................................145 How to Set a Custom Schedule for Mailbox Management .............................................145 Before You Begin.........................................................................................................146 Procedure ....................................................................................................................146 For More Information ...................................................................................................146 Setting Reporting Options ...............................................................................................147 How to Set Mailbox Management Reporting Options.....................................................147 Before You Begin.........................................................................................................147 Procedure ....................................................................................................................148 For More Information ...................................................................................................148 Configuring Diagnostics Logging on a Server ................................................................148 How to Configure Diagnostics Logging...........................................................................151 Procedure ....................................................................................................................152
Customizing Public Folder Referrals...............................................................................152 How to Specify a Custom List for Public Folder Referrals ..............................................154 Procedure ....................................................................................................................154 For More Information ...................................................................................................155 Assigning Costs on the Public Folder Referrals List.......................................................156 How to Assign Costs on the Public Folder Referrals List ...............................................156 Procedure ....................................................................................................................157 For More Information ...................................................................................................158 Understanding Directory Access Options .......................................................................158 Automatically Constructing a Topology for Directory Access .........................................160 How to Automatically Discover Servers ..........................................................................161 Before You Begin.........................................................................................................162 Procedure ....................................................................................................................162 Manually Constructing a Topology for Directory Access ................................................164 How to Manually Create a Topology for Directory Access .............................................164 Before You Begin.........................................................................................................165 Procedure ....................................................................................................................165 For More Information ...................................................................................................165 Viewing System Policies Applied to the Server ..............................................................166 Setting Server-Specific Permissions...............................................................................167 How to Modify Permissions on a Specific Server ...........................................................170 Before You Begin.........................................................................................................170 Procedure ....................................................................................................................170 For More Information ...................................................................................................171 Configuring System Resource Usage During Full-Text Indexing ...................................172 How to Control Server Performance During Indexing.....................................................172 Procedure ....................................................................................................................173 For More Information ...................................................................................................174 Managing Recipients and Recipient Policies in Exchange Server 2003 ........................175 Understanding Recipients ...............................................................................................175
Understanding Recipient Policies ...................................................................................179 Managing E-Mail Addresses ...........................................................................................179 Example Scenario........................................................................................................180 Managing Mailboxes Using Mailbox Manager ................................................................182 Creating a Recipient........................................................................................................185 Mailbox-Enabled and Mail-Enabled Recipients ..............................................................185 How to Make an Existing Active Directory Object a Recipient........................................188 Procedure ....................................................................................................................189 For More Information ...................................................................................................190 Mail-Enabled Groups ......................................................................................................191 Creating Mail-Enabled Groups........................................................................................191 How to Enable an Existing Group for Mail ......................................................................192 Before You Begin.........................................................................................................192 Procedure ....................................................................................................................193 Expanding Mail-Enabled Groups ....................................................................................194 Using Mail-Enabled Groups in Multi-Domain Environments...........................................195 Understanding Query-Based Distribution Groups ..........................................................196 Query-Based Distribution Groups Described..................................................................196 Modifying Exchange 2000 SP3 Servers for Use with Windows 2000 Global Catalog Servers.........................................................................................................................197 How to Modify Your Exchange 2000 SP3 Servers for Use with Windows 2000 Global Catalog Servers ...........................................................................................................198 Before You Begin.........................................................................................................198 Procedure ....................................................................................................................198 For More Information ...................................................................................................199 How Query-Based Distribution Groups Work .................................................................199 Deployment Recommendations for Query-Based Distribution Groups ..........................200 Guidelines for Creating Query-Based Distribution Groups .............................................202 Creating Query-Based Distribution Groups ....................................................................203
How to Create a Query-Based Distribution Group..........................................................204 Before You Begin.........................................................................................................204 Procedure ....................................................................................................................205 How to Verify That a Query-Based Distribution Group Is Working Correctly .................206 Procedure ....................................................................................................................206 Combining Multiple Query-Based Distribution Groups ...................................................207 How to Add Query-Based Distribution Groups as Members of a Distribution Group .....208 Procedure ....................................................................................................................208 Managing Recipients.......................................................................................................209 Notes for Exchange 5.5 Administrators ..........................................................................209 Managing Recipients with Recipient Policies..................................................................211 Creating a Recipient Policy.............................................................................................211 Select the Property Sheets ..........................................................................................213 Name the New Policy ..................................................................................................213 Create a Filter ..............................................................................................................213 Configure the Settings .................................................................................................214 Set the Priority and Apply the Policy ...........................................................................214 How to Create a Recipient Policy ...................................................................................215 Procedure ....................................................................................................................215 For More Information ...................................................................................................219 Managing Recipient Settings ..........................................................................................219 Configuring Message Settings for Mailbox-Enabled Recipients.....................................219 How to Navigate to the Exchange General Tab .............................................................220 Procedure ....................................................................................................................221 Delivery Restrictions .......................................................................................................222 Delivery Options..............................................................................................................224 Storage Limits .................................................................................................................224 Exchange Advanced Settings for Mailbox-Enabled Recipients ......................................225 Setting Custom Attributes ............................................................................................225 Assigning Mailbox Rights.............................................................................................225
How to Get to the Exchange Advanced Tab...................................................................227 Procedure ....................................................................................................................227 Configuring Message Settings for Mail-Enabled Recipients...........................................228 Distribution Groups .........................................................................................................230 Understanding Address Lists ..........................................................................................231 Address Lists Described .................................................................................................232 Creating Address Lists ....................................................................................................234 How to Create an Address List .......................................................................................236 Before You Begin.........................................................................................................236 Procedure ....................................................................................................................237 Offline Address Lists .......................................................................................................238 How to Populate the Default Offline Address List...........................................................240 Before You Begin.........................................................................................................240 Procedure ....................................................................................................................241 How to View System Public Folders ...............................................................................242 Before You Begin.........................................................................................................243 Procedure ....................................................................................................................243 Customizing the Details Templates ................................................................................243 How to Customize the Details Template.........................................................................246 Procedure ....................................................................................................................247 Recipient Update Service................................................................................................250 How to Create a New Recipient Update Service ............................................................251 Before You Begin.........................................................................................................251 Procedure ....................................................................................................................251 How to Change the Update Interval of the Recipient Update Service............................253 Procedure ....................................................................................................................253 Managing Exchange Clusters in Exchange Server 2003 ...............................................253 Reviewing Exchange Clusters ........................................................................................254 Reviewing the Exchange Resources Associated with Exchange Clusters.....................255
Understanding How Failover Works in an Exchange Cluster .........................................258 Using Cluster Administrator to Manage Exchange Clusters...........................................260 How to Open Cluster Administrator ................................................................................261 Before You Begin.........................................................................................................261 Procedure ....................................................................................................................261 Customizing Your Exchange Cluster Configuration........................................................262 Configuring Exchange Virtual Server Settings................................................................263 How to Access the Properties of an Exchange Virtual Server Using Cluster Administrator .....................................................................................................................................264 Before You Begin.........................................................................................................264 Procedure ....................................................................................................................265 Specifying Preferred Owners ..........................................................................................265 How to Specify a List of Preferred Owners for an Exchange Virtual Server Using Cluster Administrator................................................................................................................267 Before You Begin.........................................................................................................268 Procedure ....................................................................................................................268 Specifying Failover Options ............................................................................................269 How to Specify Failover Options for an Exchange Virtual Server Using Cluster Administrator................................................................................................................270 Before You Begin.........................................................................................................270 Procedure ....................................................................................................................271 Considering Other Factors That Affect Failover .............................................................272 How to Add the MsgHandleThreshold Registry Key Value ............................................273 Before You Begin.........................................................................................................273 Procedure ....................................................................................................................274 Setting Failback Options .................................................................................................274 How to Specify the Failback Options for an Exchange Virtual Server Using Cluster Administrator................................................................................................................276 Before You Begin.........................................................................................................276 Procedure ....................................................................................................................277 Configuring Exchange Cluster Resources ......................................................................278
How to Access the Properties of an Exchange Cluster Resource Using Cluster Administrator................................................................................................................280 Before You Begin.........................................................................................................280 Procedure ....................................................................................................................280 How to Change the IP Address of an Exchange Virtual Server .....................................281 Before You Begin.........................................................................................................281 Procedure ....................................................................................................................281 Specifying Possible Owners ...........................................................................................283 How to Specify the Possible Owners for an Exchange Resource Using Cluster Administrator................................................................................................................285 Before You Begin.........................................................................................................285 Procedure ....................................................................................................................285 Specifying a Separate Resource Monitor .......................................................................286 How to Run an Exchange Resource in a Separate Resource Monitor Using Cluster Administrator................................................................................................................287 Before You Begin.........................................................................................................287 Procedure ....................................................................................................................288 Understanding Resource Dependencies ........................................................................288 Adding Disk Resource Dependencies ............................................................................289 How to Make the Exchange System Attendant Dependent on a New Disk Resource...290 Procedure ....................................................................................................................290 Specifying Service Restart Options ................................................................................292 How to Adjust the Restart Options for an Exchange Resource Using Cluster Administrator................................................................................................................294 Before You Begin.........................................................................................................294 Procedure ....................................................................................................................295 Setting Polling Cluster Resources ..................................................................................296 Setting Pending States....................................................................................................296 How to Change the Length of Time That a Resource Remains Pending Before Failing Using Cluster Administrator .........................................................................................297 Before You Begin.........................................................................................................297 Procedure ....................................................................................................................298
Viewing the Exchange Virtual Server That Connects to a Protocol Resource ...............298 How to View the Exchange Virtual Server That Is Used to Connect the Protocol Resource Using Cluster Administrator .........................................................................................299 Before You Begin.........................................................................................................299 Procedure ....................................................................................................................299 Taking Exchange Virtual Servers or Exchange Resources Offline ................................300 How to Take an Exchange Virtual Server or Exchange Resource Offline Using Cluster Administrator................................................................................................................302 Before You Begin.........................................................................................................302 Procedure ....................................................................................................................303 Adding IMAP4 and POP3 Resources .............................................................................303 How to Add an IMAP4 or POP3 Virtual Server as a Resource to an Exchange Virtual Server ..........................................................................................................................304 Before You Begin.........................................................................................................304 Procedure ....................................................................................................................305 For More Information ...................................................................................................306 Adding a Node ................................................................................................................307 Adding an Exchange Virtual Server ................................................................................307 Removing an Exchange Virtual Server ...........................................................................308 How to Remove an Exchange Virtual Server from an Exchange Cluster.......................310 Before You Begin.........................................................................................................310 Procedure ....................................................................................................................311 For More Information ...................................................................................................312 Moving All Mailboxes and Public Folder Content ...........................................................312 How to Move Mailboxes from One Exchange Virtual Server to Another Server ............313 Procedure ....................................................................................................................313 For More Information ...................................................................................................314 How to Move Public Folder Content from One Exchange Virtual Server to Another Server .....................................................................................................................................314 Procedure ....................................................................................................................315 For More Information ...................................................................................................315 Taking the Exchange System Attendant Resource Offline.............................................315
How to Take the Exchange System Attendant Resource Offline ...................................315 Procedure ....................................................................................................................316 For More Information ...................................................................................................316 Using Cluster Administrator to Remove the Exchange Virtual Server............................316 How to Remove an Exchange Virtual Server Using Cluster Administrator ....................317 Before You Begin.........................................................................................................317 Procedure ....................................................................................................................317 For More Information ...................................................................................................318 Deleting the Remaining Cluster Resources ....................................................................318 How to Delete the Remaining Resources After Removing an Exchange Virtual Server 319 Before You Begin.........................................................................................................319 Procedure ....................................................................................................................319 For More Information ...................................................................................................320 Removing Exchange 2003 from a Cluster Node ............................................................320 How to Remove Exchange 2003 from a Node ...............................................................321 Before You Begin.........................................................................................................321 Procedure ....................................................................................................................322 Migrating an Exchange Cluster Node to a Stand-Alone (Non-Clustered) Server...........323 Monitoring Performance of an Exchange Cluster ...........................................................323 Monitoring Active/Passive Clusters.................................................................................324 Monitoring Active/Active Clusters ...................................................................................324 Monitoring Virtual Memory in a Cluster...........................................................................325 Deciding Which Virtual Memory Counters to Monitor .....................................................326 Enabling Exchange Logging ...........................................................................................329 Disabling MTA Monitoring on Nodes That Are Not Running MTA..................................330 How to Disable MTA Monitoring on an Exchange Virtual Server ...................................330 Before You Begin.........................................................................................................331 Procedure ....................................................................................................................331 Enabling SMTP Logging .................................................................................................332
How to Enable SMTP Logging and Log the Files to a Shared Disk ...............................332 Before You Begin.........................................................................................................332 Procedure ....................................................................................................................333 Tuning Servers in a Cluster ............................................................................................333 Removing Exchange 2000 Tuning Parameters ..............................................................334 Setting the /3GB Switch ..................................................................................................334 Configuring /Userva and System Pages .........................................................................335 Troubleshooting Your Exchange Clusters ......................................................................335 Identifying the Cause of a Failure ...................................................................................336 Performing Disaster Recovery on Your Exchange Clusters ...........................................338 Backing Up Data on an Exchange 2003 Server Cluster Node .......................................338 Recovering an Exchange 2003 Cluster ..........................................................................339 Managing Mailbox Stores and Public Folder Stores.......................................................340 Working with Permissions for Public Folders and Mailboxes .........................................341 Using Exchange Administrative Roles with Exchange Store Components ....................342 Understanding the Types of Permissions That Control Access to Mailboxes and Public Folders .........................................................................................................................344 Using Mailbox Permissions .............................................................................................345 Designating a User as a Mailbox Delegate.....................................................................346 How to Give a User the Ability to Send Mail on Behalf of a Public Folder......................347 Procedure ....................................................................................................................347 Using Public Folder Permissions ....................................................................................348 Understanding the Three Types of Public Folder Permissions.......................................348 Special Considerations for Working with Client Permissions .........................................349 Special Considerations for Coexisting Exchange 2003 and Exchange 5.5 Servers ......352 Designating a User as a Public Folder Delegate ............................................................354
Maintaining the Minimum Permissions Required for Mail-Enabled Public Folders ........354 Maintaining the Minimum Permissions Required for Mailbox Stores and Public Folder Stores...........................................................................................................................355 How to Restore the Permissions that Exchange Requires .............................................356 Procedure ....................................................................................................................356 Managing Storage Groups and Stores ...........................................................................357 Configuring Transaction Logs for a Storage Group ........................................................360 How to Configure Transaction Logs and Choose Other Storage Group Options...........361 Before You Begin.........................................................................................................361 Procedure ....................................................................................................................362 For More Information ...................................................................................................362 Moving Transaction Log Files to a Separate Drive.........................................................363 How to Configure New Locations for the Transaction Logs............................................364 Procedure ....................................................................................................................364 Using Circular Logging....................................................................................................364 Overwriting Deleted Data During Backup .......................................................................365 Adding a Storage Group .................................................................................................365 How to Create a New Storage Group .............................................................................366 Procedure ....................................................................................................................366 Mounting or Dismounting Stores.....................................................................................366 Moving Store Files to a New Directory............................................................................367 Configuring Store Maintenance and Backup Options.....................................................368 Configuring Mailbox Stores.............................................................................................370 Linking Mailbox Stores and Public Folder Stores ...........................................................372 Understanding Single Instance Message Storage..........................................................372 Adding a Mailbox Store ...................................................................................................373 How to Create a New Mailbox Store...............................................................................373 Procedure ....................................................................................................................373
Configuring the Default Mailbox Limits ...........................................................................375 Setting Up Mailbox Store Policies...................................................................................378 How to Apply a Policy to One or More Mailbox Stores ...................................................379 Before You Begin.........................................................................................................379 Procedure ....................................................................................................................379 Monitoring Mailbox Store Activity....................................................................................380 Configuring Public Folder Stores ....................................................................................382 Understanding the Relationship Between Mailbox Stores and Default Public Folder Stores...........................................................................................................................385 Creating a New Public Folder Store for an Existing Public Folder Tree .........................385 How to Create a Public Folder Store on a New Server for an Existing Tree ..................386 Procedure ....................................................................................................................386 Configuring a New Public Folder Tree and Public Folder Store .....................................386 How to Create a New Hierarchy and Public Folder Store...............................................387 Procedure ....................................................................................................................387 For More Information ...................................................................................................389 Configuring the Default Public Folder Limits...................................................................390 Configuring Limits on a Specific Public Folder Replica ..................................................393 How to View Additional Age Limit Settings .....................................................................393 Procedure ....................................................................................................................393 Setting Up Public Folder Store Policies ..........................................................................395 How to Apply a Policy to One or More Public Folder Stores ..........................................396 Procedure ....................................................................................................................396 Monitoring Public Folder Store Activity ...........................................................................397 Managing Mailboxes .......................................................................................................399 Creating a Mailbox ..........................................................................................................399 Deleting a Mailbox...........................................................................................................400 Deleting a Mailbox Without Deleting the User .............................................................400 Deleting a User Without Deleting Mailbox Data ..........................................................401
Recovering a Mailbox......................................................................................................401 How to Recover One or More Mailboxes on One or More Mailbox Stores.....................402 Before You Begin.........................................................................................................402 Procedure ....................................................................................................................402 For More Information ...................................................................................................403 Moving Mailboxes Using Exchange System Manager....................................................403 Managing Public Folders.................................................................................................404 Understanding Types of Public Folders ..........................................................................404 Understanding Public Folders and System Folders........................................................405 Understanding Content Replicas ....................................................................................408 Understanding Mail-Enabled Folders..............................................................................409 Understanding Public Folder Referrals ...........................................................................413 How to Configure a Connector to Allow or Block Referrals from One Routing Group to Another ........................................................................................................................414 Before You Begin.........................................................................................................414 Procedure ....................................................................................................................414 How to Configure an Exchange 2003 Server to Use a Specific List of Servers and Costs for Referrals .................................................................................................................416 Before You Begin.........................................................................................................416 Procedure ....................................................................................................................416 For More Information ...................................................................................................417 Understanding the Basic Process for Referring Clients..................................................418 Understanding Referrals in Mixed-Mode Topologies......................................................419 Referring Outlook Web Access in a Front-end/Back-end Topology ...............................419 Configuring Public Folders..............................................................................................422 Connecting to a Public Folder Store ...............................................................................423 Creating a New Public Folder .........................................................................................424 Propagating Folder Settings ...........................................................................................424 Configuring Individual Public Folder Limits .....................................................................425
Age Limit Settings and System Folders ..........................................................................428 Mail-Enabling a Public Folder .........................................................................................428 Configuring the Address Book Listing and E-Mail Alias..................................................429 Configuring E-Mail Addresses ........................................................................................433 Setting Delivery Restrictions ...........................................................................................435 Configuring a Forwarding Address .................................................................................437 Maintaining Public Folders..............................................................................................440 Viewing Public Folder Status ..........................................................................................440 Viewing Public Folder Content Using Exchange System Manager ................................442 Searching for Public Folders Using Exchange System Manager ...................................443 Moving Public Folders In a Public Folder Tree ...............................................................445 Maintaining the Organizational Forms Library ................................................................445 Understanding and Configuring Message Routing and Transport .................................446 Configuring Routing for Internal Mail Flow......................................................................447 How to Disable Outbound Mail .......................................................................................448 Procedure ....................................................................................................................448 How to Disable a Connector ...........................................................................................449 Procedure ....................................................................................................................449 How to Remove a Connector..........................................................................................449 Procedure ....................................................................................................................450 Understanding Routing Groups ......................................................................................450 How to Create a Routing Group.....................................................................................453 Before You Begin.........................................................................................................453 Procedure ....................................................................................................................454 How to Move a Server Between Routing Groups ...........................................................455 Procedure ....................................................................................................................455 How to Rename a Routing Group...................................................................................456
Procedure ....................................................................................................................457 How to Delete a Routing Group ......................................................................................457 Procedure ....................................................................................................................457 How to Configure the Options for a Routing Group ........................................................457 Procedure ....................................................................................................................458 Procedure ....................................................................................................................458 How to Specify a Remote Bridgehead Server for a Routing Group ...............................459 Before You Begin.........................................................................................................460 Procedure ....................................................................................................................460 Understanding Link State Information.............................................................................462 Understanding Routing Group Masters ..........................................................................463 Using Routing Groups in Native and Mixed Modes ........................................................464 Connecting Routing Groups............................................................................................465 How to Create an SMTP Connector for Internet Mail Delivery .......................................467 Procedure ....................................................................................................................468 How to Create an X.400 Connector ................................................................................472 Procedure ....................................................................................................................472 Connecting to the Internet...............................................................................................474 How to Use a Wizard to Configure Internet Mail.............................................................476 Before You Begin.........................................................................................................476 Procedure ....................................................................................................................476 Defining SMTP Dependencies........................................................................................480 Configuring SMTP...........................................................................................................482 Configuring a Dual-Homed Server Using the Wizard .....................................................483 Manually Configuring the Sending of Internet Mail .........................................................484 Verifying Outbound Settings on SMTP Virtual Servers ..................................................484 How to Verify an Outbound Port for Mail Delivery Is set to Port 25 ................................485 Procedure ....................................................................................................................486 How to Specify an External DNS Server That Is Used by the SMTP Virtual Server ......487
Procedure ....................................................................................................................487 Configuring an SMTP Connector ....................................................................................488 How to Route Mail for Outbound Delivery? .................................................................489 Which Servers to Use as Local Bridgehead Servers? ................................................490 Which Domains Should Be Included in the Address Space?......................................490 What Is Appropriate Scope for the Connector?...........................................................491 How to Enable Anonymous Access for an SMTP Connector .........................................492 Procedure ....................................................................................................................492 Customizing Mail Delivery...............................................................................................493 Verifying DNS Setup for Outbound Mail .........................................................................495 How to Enable Filtering to Control Junk E-Mail ..............................................................496 Procedure ....................................................................................................................496 Manually Configuring the Receipt of Internet Mail ..........................................................497 Configuring Recipient Policies ........................................................................................498 Verifying DNS Setup for Inbound Mail ............................................................................499 How to Verify the Inbound Port and IP Address .............................................................499 Procedure ....................................................................................................................500 Connecting to Exchange 5.5 Servers and Other X.400 Systems...................................501 How to Create an X.400 Protocol Stack .........................................................................502 Procedure ....................................................................................................................502 Customizing the X.400 Protocol......................................................................................505 Understanding X.400 Connectors...................................................................................507 Creating an X.400 Protocol Stack...................................................................................508 Creating an X.400 Connector .........................................................................................508 Configuring Additional Options on the X.400 Connector ................................................512 Overriding X.400 Properties............................................................................................513 Using Queue Viewer to Manage Messages ...................................................................517 How to Use the Find Messages Option ..........................................................................518
Procedure ....................................................................................................................519 Using SMTP Queues to Troubleshoot Message Flow....................................................520 How to Verify an SMTP Virtual Server Is Not Set to Open Relay...................................526 Procedure ....................................................................................................................526 How to Verify an SMTP Virtual Server Is Configured to Allow Anonymous Access.......528 Procedure ....................................................................................................................528 Using X.400 (MTA) Queues to Troubleshoot Message Flow .........................................529 How to Configure Diagnostic Logging for the X.400 Service (MSExchangeMTA) .........531 Procedure ....................................................................................................................531 Configuring Diagnostic Logging for SMTP......................................................................531 How to Enable Debug Level Logging..............................................................................532 Before You Begin.........................................................................................................532 Procedure ....................................................................................................................533 How to Modify Logging Settings .....................................................................................533 Procedure ....................................................................................................................533 Tools That Are Used with Exchange...............................................................................534 Services That Are Used by Exchange ............................................................................551 Configuration Settings for a Four-Node Cluster..............................................................558 Copyright.........................................................................................................................560
25
26
27 Directory Connector (ADC) to replicate directory information between the Exchange 5.5 directory and Active Directory.
As this figure shows, all the information that you see (read) and work with (write) using Active Directory Users and Computers is stored in Active Directory. Most, but not all, of the information that Exchange System Manager reads and writes also comes from Active Directory. However, in addition to data in Active Directory, Exchange System Manager draws information from other sources, such as: MAPI Exchange System Manager uses MAPI to gather data from the Exchange store to display mailboxes.
28 Mailbox data gathered using MAPI and displayed in Exchange System Manager
Windows Management Instrumentation (WMI) Exchange System Manager uses the data supplied by WMI to display cached directory information (DSAccess, a cache of directory information that reduces the number of calls to your global catalog server) and queue information. Web Distributed Authoring and Versioning (WebDAV) Exchange System Manager uses the data supplied by WebDAV to display public folders using the Exadmin virtual directory. Note The location of the Exadmin virtual directory is in Internet Information Services (IIS) under the default Web site. If the default Web site service is stopped, you will not be able to display public folder information in Exchange System Manager.
29
To clarify these usage differences, the following table provides specific examples of when you can use Exchange System Manager, and when you can use Active Directory Users and Computers. Comparing Exchange System Manager and Active Directory Users and Computers
Use Exchange System Manager to Use Active Directory Users and Computers to
Manage Active Directory objects (recipients). Manage users. Move an individual's mailbox from one server to another server. Create distribution groups.
Manage servers. Move all mailboxes from one server to another server. Create public folders.
As this table shows, some tasks can be performed using either Exchange System Manager or Active Directory Users and Computers. For example, you can move mailboxes using either Exchange System Manager or Active Directory Users and Computers. The difference between the two approaches is whether you want to find all the users on a server or only a selected subset. When you want to quickly find all the users on a server, Exchange System Manager is the better choice. When you want to select users based on specific criteria, use Active Directory Users and Computers because by using this snap-in, you can create custom LDAP filters that can filter using virtually any criteria.
30 Tip In newsgroups or conversations with other Exchange administrators, some people refer to Exchange System Manager as ESM. Active Directory Users and Computers may be referred to as ADU&C or DSA (Directory Server Agent). Building on the previous overview of how Exchange System Manager and Active Directory Users and Computers work in the Exchange administration architecture, the next two sections explain Exchange System Manager and Active Directory Users and Computers in more detail. If you are already confident about using these tools, see "Deciding Where to Manage Exchange" for information about whether to use these tools through Remote Desktop, Terminal Server, or a dedicated management station.
The top node of this tree is the root organization node that contains all the Exchange containers. Each of these containers gives you access to specific administrative features in Exchange. The following table describes what you can do with each of these containers. Exchange System Manager containers
Container Description
Global Settings
Includes features to configure system-wide settings. These settings apply to all servers and recipients in an Exchange organization.
32
Container Description
Recipients
Includes features to manage objects and settings for recipients in your organization. You can manage address lists, offline address lists, recipient update services, recipient policies, mailbox management settings, details templates, and address templates. Includes features to manage administrative groups. Each group is a collection of Active Directory objects that are grouped together for permissions management. Each administrative group can contain policies, routing groups, public folder hierarchies, and servers. Note This container only appears if you have created administrative groups for your organization.
Administrative Groups
Servers
Holds server-specific configuration objects, such as Queues, Mailbox stores, Public Folder stores, and Protocols information. Contains policies that affect the system's configuration settings. Policies are collections of configuration settings that are applied to one or more Exchange objects in Active Directory.
System Policies
33
Container Description
Routing Groups
Defines the physical network topology of Exchange servers. An Exchange mail system, or organization, includes one or more servers running Exchange. Unless you plan a small Exchange installation, you will probably have more than one Exchange server. In some organizations, these servers are connected by reliable, permanent connections. Groups of servers that are linked in this way should be organized in the same routing group. Note This container only appears if you have created routing groups for your organization.
Folders
Displays public folder hierarchies. A public folder stores messages or information that can be shared with all designated users in your organization. Public folders can contain different types of information, from simple messages to multimedia clips and custom forms. Contains tools that help you to monitor your Exchange organization, track messages, and recover mailboxes.
Tools
Using Exchange System Manager and its containers, you can: Use Properties of the root node to configure Exchange 2003 to display or not display routing groups and administrative groups in the console tree. Manage your Exchange organization by setting properties on different containers under the root node in the console tree. For example, you can delegate administrative permissions at the organization level in Exchange System Manager, or at an administrative group level using the Exchange Delegation Wizard.
34 Set permissions on a specific server by modifying the permissions settings in the server's Properties dialog box.
35
Procedure
To open Exchange System Manager Click Start, point to Programs, point to Microsoft Exchange, and then click System Manager.
The left pane of Active Directory Users and Computers is the console tree that shows your fully qualified domain name at the root level. Click the + (plus) sign to expand the root container. Under the root container are several default containers: Builtin Container for built-in user accounts. Computers Default container for computer objects. Domain Controllers Default container for domain controllers. ForeignSecurityPrincipals Container for security principals from trusted external domains. Administrators should not manually change the contents of this container. Users Default container for user objects.
37 In addition to the default containers, you can organize directory objects in logical units by creating containers named organizational units. For example, you can create an organizational unit for your marketing group that holds all the directory objects associated with your company's marketing department. Organizational units are useful for applying Group Policy settings and for organizing objects in a meaningful way. For more information about organizational units, see the Windows documentation. After you have organized the containers in Active Directory Users and Computers, you can then use those containers to: Create recipients. Perform Exchange-specific tasks. Manage multiple Exchange domains.
38
Procedure
To open Active Directory Users and Computers 1. Click Start, and then click Run. 2. In the Open box, type dsa.msc, and then click OK. or Click Start, point to All Programs, point to Microsoft Exchange, and then click Active Directory Users and Computers.
The following figure shows how Active Directory Users and Computers appears on the screen.
Creating Recipients
After Exchange has extended Active Directory Users and Computers, you can mailenable or mailbox-enable an object, and thereby turn the Active Directory object into a recipient. However, not all objects can be mail-enabled or mailbox-enabled. For example, you can create a mailbox for a user object or a mail-enabled group object, but you cannot
40 do either for a computer object. Therefore, the Active Directory objects that are of most interest to you as an Exchange administrator are: Users InetOrgPerson objects Contacts Groups Query-based distribution groups
For more information about creating recipients, see "Managing Recipients and Recipient Policies in Exchange Server 2003."
For detailed instructions on how to use Exchange Task Wizard to perform one of these tasks, see How to Perform an Exchange-Specific Task in Active Directory Users and Computers.
The following procedure outlines how to perform an Exchange-specific task in Active Directory Users and Computers.
42 You start Active Directory Users and Computers from either an Exchange server or from a workstation that has the Exchange System Management Tools installed. For detailed information, see How to Open Active Directory Users and Computers.
Procedure
To perform an Exchange-specific task In Active Directory Users and Computers, right-click a user or group object, and then click Exchange Tasks.
43 You start Active Directory Users and Computers from either an Exchange server or from a workstation that has the Exchange System Management Tools installed. For detailed information, see How to Open Active Directory Users and Computers.
Procedure
To manage Exchange in another domain In Active Directory Users and Computers, right-click the root object in the console tree, and then select Connect to Domain. Note You must have the appropriate permissions for the target domain.
44 Administration scenarios
Management scenario Advantages Disadvantages
Increased risk. Administrators can inadvertently delete files or introduce viruses. Increased risk. Administrators can inadvertently delete files or introduce viruses. Number of remote connections is limited to the number of Terminal Server licenses purchased. Extra setup required. Extra hardware required.
No extra setup required. Can manage from outside the data center. Administrators can perform most tasks without leaving their desks.
For more information about using a dedicated management station, see Setting Up a Management Station Using Windows XP Professional SP1 or Later. Directly logging on to the server requires no special setup. If you decide to use Remote Desktop or Terminal Server, the best source for setup information is the documentation that came with your copy of Windows.
45
46 Note To manage Exchange 2003, the workstation must be joined to the same forest as your Exchange servers. You cannot manage domains in a different forest.
Procedure
To set up a management station 1. Install Microsoft Windows XP Professional SP 1 or later on the workstation. For more information about installing Windows XP Professional SP1 or later and adding the workstation to the domain, see your Windows XP Professional documentation. 2. Join the workstation to the domain with Exchange 2003. To manage Exchange 2003, the workstation must be joined to the same forest as your Exchange servers. You cannot manage domains in a different forest. 3. Install the Windows Administrative Tools Pack on the workstation. For more information, see How to Install the Windows Administrative Tools Pack. 4. Install the Simple Mail Transfer Protocol service (SMTPSVC) on the workstation. For more information, see How to Install the SMTP Service. Note You do not need to install the SMTP service for Windows XP Professional SP2 or later. 5. Install the Exchange System Management Tools on the workstation: For detailed
47 steps, see How to Install the Exchange System Management Tools. 6. Shut down the SMTPSVC service on the workstation. After installing the Exchange System Management Tools, disable the SMTPSVC and NntpSvc services because you only need these services to install the Exchange System Management Tools.
48 1. Install Microsoft Windows XP Professional SP 1 or later on the workstation. For more information about installing Windows XP Professional SP1 or later and adding the workstation to the domain, see your Windows XP Professional documentation. 2. Join the Windows XP Professional workstation to the domain that includes the Exchange 2003 organization.
Procedure
To install the Windows Administrative Tools Pack On the dedicated management workstation, locate Microsoft Knowledge Base Article 304718, How to use the Administration Tools Pack to remotely administer computers that are running Windows Server 2003, Windows XP, or Windows 2000, and follow the instructions.
49
Procedure
To install the SMTPSVC service 1. On the dedicated management workstation, open Add or Remove Programs, and then click Add/Remove Windows Components. 2. Select Internet Information Services (IIS), and then click Details. 3. Select the SMTP Service component check box. 4. Click OK, click Next, and then click Finish.
50
51
Procedure
To install the Exchange System Management Tools 1. On the dedicated management workstation, insert the Exchange 2003 Setup CD into the workstation's CD drive, and then locate <drive>: \setup\i386\setup.exe. 2. On the Component Selection page, do the following: Under Component Name, locate Microsoft Exchange. In the corresponding Action column, select Custom. Under Component Name, locate Microsoft Exchange System Management Tools. In the corresponding Action column, select Install (see figure below). Microsoft Exchange System Management Tools installation option
52
53
54 A custom console that contains Exchange System Manager, Active Directory Users and Computers, and Event Viewer
As shown in this figure, the user interface (UI) of a custom console is the same as that of the individual snap-ins. In the left pane is the console tree. The console tree shows a hierarchical view of the different containers of the various snap-ins. On the right is the details pane, where you can manage the different objects in the containers by rightclicking an object and selecting an appropriate command for that object.
55 To create a custom MMC console, there are two steps. First, you create a new instance of MMC, and then you add the snap-ins that you want to the instance. For detailed instructions, see How to Create Custom Consoles.
Procedure
To create a custom MMC console 1. Create a new instance of MMC. For detailed information, see How to Create a New Instance of MMC. 2. Add the snap-ins that you want to the instance of MMC. For detailed information, see How to Add Snap-Ins to MMC.
56
Procedure
To create a new instance of MMC 1. Click Start, and then click Run. 2. In the Open box, type MMC, and then click OK. This opens a blank MMC window (see the following figure: A new instance of MMC
3. Add the snap-ins that you want to use. For detailed steps, see How to Add Snap-Ins to MMC.
57
Procedure
To add snap-ins to MMC 1. In MMC, on the File menu, click Add/Remove Snap-in. 2. Click Add to open the Add Standalone Snap-in window. 3. Select the snap-in that you want to add from the list, and then click Add. For example, you can select Active Directory Users and Computers or Exchange System Manager. 4. Repeat Step 3 until you have added the snap-ins that you want. 5. Click Close, and then click OK.
58 download the Exchange SDK or view it online from the Exchange developer center on MSDN.
59
Promoting an Exchange Server 2003 Organization from Mixed Mode to Native Mode
This topic gives you information about promoting an Exchange Server 2003 Organization from Mixed Mode to Native Mode.
60
Procedure
To switch from mixed mode to native mode 1. In Exchange System Manager, right-click your Exchange organization, and then click Properties. 2. On the General tab (see the following figure), click Change Mode. Change Mode option on the General tab
61
62
Global settings are also available for Exchange ActiveSync and Microsoft Outlook Mobile Access.
63
Procedure
To manage associations for file name extensions 1. In Exchange System Manager, expand Global Settings, right-click Internet Message Formats, and then click Properties. 2. On the General tab (see the following figure), use the following options: To associate a new file name extension with a MIME type, click Add. To prioritize the associated extension that Exchange uses with each MIME type, click Move Up to move the extension up the list or Move Down to move the extension down the list. If two associated extensions exist for a single MIME type, Exchange uses the extension that appears higher on the list.
64
Configuring SMTP Policies to Control Outbound Mail Formatting and Automatic Responses
You can use Internet message formats to define SMTP policies that control the format of messages that are sent to the Internet, or to specific external SMTP domains. These policies also control what types of automatic responses, such as out-of-office notifications, can be sent to Internet domains from users in your organization.
65 For each domain that is defined in Internet Message Formats, you can set the following properties: Message formatting options that determine how messages sent to this domain are encoded, and the language character set is used to display these messages. Advanced options that determine when messages are sent in Exchange RTF, how text is formatted, and what types of automatic responses, such as non-delivery reports (NDRs) or out-of-office notifications, are sent to this domain. Important Do not send mail exclusively in RTF because many non-Microsoft mail servers cannot read rich-text messages. Servers that cannot read rich-text messages provide their users with e-mail messages that include a Winmail.dat file attachment. To avoid this problem, make sure that your message settings do not use Exchange RTF exclusively.
A policy must exist for the * domain. This policy controls how messages are sent to all external domains. You can modify the properties on this policy.
For example, you want to communicate with a business partner who has an SMTP domain named contoso.com, and you want to allow out-of-office replies to be sent to this domain, but not to other external domains. You can create a new policy for the contoso.com domain that does exactly that. Because Exchange uses the SMTP policy that most closely matches the SMTP domain, all messages sent to Contoso users use the policy for the Contoso domain, but messages sent to any other SMTP domain use the default policy for the * domain. For detailed instructions, see How to Create a New Policy for a New SMTP Domain.
68
Procedure
To create a new policy 1. In Exchange System Manager, expand Global Settings, right-click Internet Message Formats, point to New, and then click Domain. 2. On the General tab (see following figure), enter a policy name and the SMTP domain. Entering a policy name and an associated SMTP domain
69
70 character set. For detailed instructions, see How to Set the Message Formats for a Policy.
Procedure
To set the message formats for a policy 1. In Exchange System Manager, right-click the policy, and then click Properties. 2. On the Message Format tab (see the following figure), select the message encoding and character sets that you want to use with this policy. Message Format tab for the Contoso policy
71
72 What types of auto-responses can be sent to users in the domain or domains on the policy. For security purposes, you can prevent automatic responses to external domains. For example, you may want to prevent out-of-office responses.
For detailed instructions, see How to Set Advanced Properties for a Policy.
Procedure
To set advanced properties for a policy 1. In Exchange System Manager, right-click the policy, and then click Properties. 2. On the Advanced tab (see the following figure), select the appropriate options. Note Do not select Always use under Exchange rich-text format, unless you are configuring a policy for a domain whose users always use MAPI clients. Advanced tab for the Contoso policy
73
74 SMTP message filtering to control unsolicited commercial e-mail (also known as spam), using sender, connection, and recipient filtering.
For detailed instructions, see How to Access the Message Delivery Properties Dialog Box.
Procedure
To access the Message Delivery Properties dialog box In Exchange System Manager, expand Global Settings, right-click Message Delivery, and then click Properties.
For detailed instructions about changing the default message delivery settings, see How to Change the Default Message Delivery Options.
76
Procedure
To change the default message delivery options In the Message Delivery Properties dialog box, on the Defaults tab (see the following figure), select the appropriate options. Defaults tab in the Message Delivery Properties dialog box
77
The maximum message size that can be sent by users This is the Sending message size option, and it defaults to 10240 KB (users can send a message of any size). Based on your available network bandwidth and your user requirements, you may want to limit the maximum message size that is allowed in your organization. If a user tries to send a message that exceeds the specified size limit, the user receives a non-delivery report (NDR) and Exchange will not send the message. The maximum message size that can be received by users This is the Receiving message size option, and it defaults to 10240 KB (users can receive a message of any size). Again, based on network bandwidth and user requirements, you may want to limit the message size. Senders in your organization receive an NDR if they try to send a message to a user who exceeds the specified size limit. Depending on the NDR settings that you
78 configure in Internet Message Formats, external senders may or may not receive an NDR. Note For more information about Internet Message Formats, see Configuring SMTP Policies to Control Outbound Mail Formatting and Automatic Responses. The maximum number of recipients to which a single message can be sent This is the Recipient limits option, and it defaults to 5000 recipients. Recipients include all users on the To, Cc, and Bcc lines, and also expanded distribution lists. Select No limit to allow users to send and receive messages regardless of how many recipients to which the messages are addressed.
79
Procedure
To enable sender filtering 1. On the Sender Filtering tab of the Message Delivery Properties dialog box (see the following figure), click Add to add the SMTP address of a user or a particular domain from whom you want to block messages. You can block an individual sender, a whole domain, or a display name by entering the display name in quotes. Sender Filtering tab in the Message Delivery Properties dialog box
80
2. To have Exchange save any messages that sender filtering blocks to an archive folder (instead of automatically deleting these filtered messages), select Archive filtered messages. The archive folder is in the <drive>: \Program Files\Exchsrvr\Mailroot\vsi n\archivefolder, where n is the virtual server instance of the SMTP virtual server where sender filtering is enabled. 3. To block messages with a blank sender address (a technique that some senders of unsolicited commercial e-mail messages use), select Filter messages with blank sender. 4. To end the SMTP session when a sender matches an address on the sender filter, select Drop connection if address matches filter. 5. To accept messages from senders on the block list without sending notification to
81 the sender that mail was not delivered, select Accept messages without notifying sender of filtering.
82 connecting server's IP address appears on the global accept list, Exchange automatically accepts the mail and does not check any additional filters. Global deny list This list contains all the IP addresses from which you always want to reject mail. Exchange checks this list immediately after checking the global accept list. If an IP address appears on the global deny list, Exchange automatically rejects the mail and does not check any additional filters.
Procedure
To configure a connection filtering rule On the Connection Filtering tab (see the following figure) of the Message Delivery Properties dialog box, under Block List Service Configuration, click Add. Connection Filtering tab in the Message Delivery Properties dialog box
83
84
Procedure
To create a list of exceptions to connection filtering rules On the Connection Filtering tab (see the following figure) of the Message Delivery Properties dialog box, click Exception. Connection Filtering tab in the Message Delivery Properties dialog box
85
86
Procedure
To create either a global accept or deny list On the Connection Filtering tab (see the following figure) of the Message Delivery Properties dialog box, click Accept to add an IP address to the global accept list or click Deny to add an IP address to the global deny list. Connection Filtering tab in the Message Delivery Properties dialog box
87
88
89
Procedure
To add a recipient to the recipient filtering list On the Recipient Filtering tab (see the following figure) of the Message Delivery Properties dialog box, click Add. Recipient Filtering tab in the Message Delivery Properties dialog box
90
91
For more information about routing groups, see Understanding and Configuring Message Routing and Transport. This topic focuses only on administrative groups. An administrative group can contain any of the following Exchange objects: Servers Policies Routing groups Public folder trees
Administrative groups allow you to delegate specific administrative permissions, and define system policies for the administrative groups and the objects in the group. You can create system policies that control the administration of servers, mailbox stores, and public folder stores in an administrative group. The remainder of this section focuses on the following topics: Understanding the types of administrative models Displaying administrative groups Creating administrative groups Creating a system policy Moving objects between administrative groups Deleting administrative groups
92 Note Use the Exchange Administration Delegation Wizard to assign a specific group permission to manage an administrative group. For more information about the Exchange Administration Delegation Wizard, see Managing Exchange Server 2003 Permissions.
To illustrate these administrative models, the following sections show how to apply each of these models to a fictitious company named Contoso, Ltd. This fictitious company has global branches in North America, Europe, and Asia, as shown in the following figure. Branches in Contoso, Ltd
Note In a mixed-mode organization, each site becomes a single administrative group, and you cannot use the administrative models discussed in this section.
This administrative model is similar to a data center where all administration tasks are performed by a single information technology group. This administrative model is typical in small-sized or medium-sized organizations, but can also be used in larger organizations that have high-bandwidth connectivity to all regional offices.
95 You typically use the mixed administrative model in larger organizations that have many divisions or offices in many geographical locations. The mixed model can also apply when one company acquires another company. The following figure shows how Contoso applies a mixed administrative model to its organization. To centrally administer public folders and policies, Contoso created one central administrative group for administering public folders and another for administering policies. The remaining administrative groups are regional and allow regional control of other functions, such as routing groups. Mixed administrative model
96
97
98
Procedure
To display administrative groups 1. In Exchange System Manager, right-click your Exchange organization, and then click Properties. 2. On the General tab (see the following figure), select Display Administrative groups. Displaying administrative groups
99
100
Procedure
To create a new administrative group In Exchange System Manager, right-click Administrative Groups, point to New, and then click Administrative Group.
101
Objects that you cannot move between administrative groups are as follows: Servers Containers
You can move objects only between containers of the same type. For example, you can move a system policy from one system policy container to another system policy container in a different administrative group, but you cannot move a system policy into a public folder container. This type of action is blocked by default. For detailed instructions, see How to Move Objects Between Administrative Groups. Note When you are moving or copying objects between administrative groups, click Refresh to see the object in the new container.
102
However, there are other objects that you cannot move. Objects that you cannot move between administrative groups are: Servers Containers
You can move objects only between containers of the same type. Note When you are moving or copying objects between administrative groups, click Refresh to see the object in the new container.
Procedure
To move system policies or public folders between administrative groups Cut the system policy or public folder from the source container, and paste it into
103 the target container. or Drag the system policy or public folder from the source container to the target container.
104
Procedure
To delete an administrative group In Exchange System Manager, expand Administrative Groups, right-click the administrative group that you want to delete, and then click Delete.
There are three types of system policies: Public folder store policies Allow you to configure settings across public folder stores. Mailbox store policies Allow you to configure settings across mailbox stores. Server policies Allow you to enable message tracking options on servers.
Of the three types of system policies, this topic discusses only server policies in more detail.
106
108 messages using Message Tracking Center. Message tracking and subject logging are explained in more detail in Configuring Exchange Server 2003 Settings. Before you can create a server policy (or, for that matter, any other system policy) in an administrative group, you must add a system policy container. After you have created the system policy container, you can then create a server policy. For detailed instructions about creating a system policy container, see How to Create a System Policy Container. For detailed instructions about creating a server policy, see How to Create a Server Policy.
Procedure
To create a system policy container In Exchange System Manager, expand Administrative Groups, right-click the administrative group, point to New, and then click System Policy Container. System Policies container
109
110
Procedure
To create a server policy 1. In Exchange System Manager, expand Administrative Groups, expand the appropriate administrative group, right-click System Policies, point to New, and then click Server policy. 2. On the General (Policy) tab (see the following figure), select the following options: To log the message subject and make this subject visible when messages are tracked, select Enable subject logging and display. To track all messages that flow to and from the server, select Enable message tracking.
111
112 server from the control of the previous policy, or apply the new policy you just created. If you do not resolve the policy conflict, you receive the following message: The objectname (for example, Server1) could not be associated with policy policyname (ServerPolicy) because you refused to remove the object from the control of conflicting policies.
Procedure
To add servers to a server policy 1. In Exchange System Manager, expand Administrative Groups, expand the administrative group that contains the server policy to which you want to add servers, expand System Policies, right-click the server policy, and then click Add server.
113 2. In the Select the items to place under the control of this policy dialog box (see the following figure), type the server name, and then click OK. Selecting items for a server policy
Note The figure shows the dialog box that appears when you run Exchange 2003 on Microsoft Windows Server 2003. If you run Exchange on Windows 2000 Server, this dialog box offers the same functionality but it looks slightly different.
114 For detailed instructions on how to view the policies that Exchange applies to a particular object, see How to View the Policies that Exchange Applies to a Particular Object.
Procedure
How to view the objects that a policy controls In Exchange System Manager, click a policy in the System Policies container. The objects appear in the details pane under Policy Applied To.
Procedure
How to view the objects that a policy controls In Exchange System Manager, click the Policies tab in the server's Properties
116 This procedure outlines how policies can be copied or moved between policy containers that are in different administrative groups
Procedure
To copy policy objects between administrative groups 1. In Exchange System Manager, right-click the policy, click Copy, and then paste the policy in your target container. 2. Right-click the target container, and then click Refresh to view the policy in the container. After you copy a policy, you must apply it to the individual servers, mailbox stores, or public folder stores in the administrative group where you copied the policy.
117
Procedure
To modify a policy 1. In Exchange System Manager, right-click the policy that you want to modify, click Properties, and then use the tabs to modify the policy. 2. After you have made the necessary modifications, right-click the policy, and then click Apply now to apply the changes.
118
Procedure
To remove an object from the control of a policy 1. In Exchange System Manager, expand System Policies, and then click the appropriate system policy. 2. In the Policy Applied To column, right-click the object, point to All Tasks, and then click Remove from policy.
Procedure
To delete a policy In Exchange System Manager, right-click the policy that you want to delete, and then click Delete.
119
Together, these permissions provide the means to implement security on all elements in an Exchange 2003 installation. This topic focuses on using Exchange System Manager to manage permissions on Exchange objects in Active Directory and the IIS metabase. For detailed information about managing store permissions, see "Managing Mailbox Stores and Public Folder Stores." For detailed information about understanding and managing NTFS permissions, see the Windows documentation and resource kits. Important Use only Exchange System Manager to set permissions on Exchange objects.
120
Together, these features simplify the management of permissions so that most Exchange implementations can implement their security requirements without having to set permissions on individual attributes on individual objects.
121
122 Note The Exchange security roles should not be confused with security groups in Active Directory. The roles are a collection of standardized permissions that are applied to users or groups in Active Directory. The roles can best be thought of as a template, instead of as a security group. Because these roles are a set of standardized permissions, unlike security groups, roles inherently supersede one other. Therefore, you do not have to apply both a higher and a lower privileged role. It is sufficient to apply the higher privileged role. Roles differ slightly, depending on whether they are applied to an organization or an administrative group. Therefore, the effective permissions that result when a role is applied can differ slightly. The following tables list the effective permissions, based on the role applied and where it has been applied. These tables help explain how roles supersede each other, and the impact of differences at the organization level and administrative level. Note There is no table that shows the effective role at the organization level from roles applied at the administrative group level. This is because roles applied at the administrative group level apply only to the local administrative group. Because administrative groups are under the organization level in the hierarchy, the administrative group can inherit permissions from the organization, but not vice versa. Effective roles at the administrative group level from roles applied at the administrative group level
Granted Exchange Administrator role View Only Administrator Full Administrator
Yes
No
No
Yes
Yes
No
Yes
Yes
Yes
123 Effective roles at the administrative group level from roles applied at the organization level
Granted Exchange Administrator role View Only Administrator Full Administrator
Yes
No
No
Yes
Yes
No
Yes
Yes
Yes
Effective roles at the organization level from roles applied at the organization level
Granted Exchange Administrator role View Only Administrator Full Administrator
Yes
No
No
Yes
Yes
No
Yes
Yes
Yes
124 of this consistency in application of permissions, the wizard is the recommended and preferred method of managing permissions in your Exchange environment. Only apply customized permissions to individual objects when your security policy requires you to do so, and after complete testing. Manually creating customized permissions increases the chance of human error. It also increases the chance of creating inappropriate permissions because of a misunderstanding of how permissions work. Additionally, customized security settings will require increased maintenance because they must be documented, and the customized settings must be verified. Although there are instances where customized security is appropriate, you must weigh the risks and costs carefully. You can start the Exchange Administration Delegation Wizard from either the organization level or the administrative group level. As noted in "Benefiting from Standardized Security Roles in Exchange," the permissions associated with the role will then be applied down the hierarchy from the object from which you started the wizard. For example, if you start the wizard at the organization level, the permissions associated with the role will be applied to all objects under the organization in the hierarchy, including all administrative groups. Alternatively, if you start the wizard at an administrative group, the permissions associated with the role will be applied only to the objects in the administrative group. When you start the Exchange Administration Delegation Wizard, it prompts you to specify the users and groups to which you want to apply the security role. Generally, it is recommended that you place your users in security groups, and then use the wizard to apply roles against those groups. Applying permissions to individual users can quickly become difficult to manage. After the wizard is completed, Exchange System Manager applies permissions to the group or the user selected in the hierarchy that the wizard was started from. The permissions are propagated down the hierarchy through inheritance. By using the wizard, you can set all the permissions on the Exchange objects in both Active Directory and the IIS metabase with several clicks. Note For more information about managing store permissions, see "Managing Mailbox Stores and Public Folder Stores."
125
For some Exchange objects, you can customize this inheritance. These objects are public folder trees, address lists, and mailbox stores. For these objects, you can specify that the child does not inherit permissions. Or, you can specify that only the following containers or subcontainers inherit permissions: This container only This container and all subcontainers Subcontainers only
Inheritance makes it possible for permissions to be applied consistently in an object hierarchy. In itself, inheritance is an important tool for simplifying the application of permissions.
126
For information about configuring settings on the Locales tab, see Configuring Language Settings. For information about configuring settings on the Mailbox Management tab, see Scheduling Mailbox Manager Processes. For information about configuring settings on the Directory Access tab, see Understanding Directory Access Options. For information about viewing settings on the Policies tab, see Viewing System Policies Applied to the Server. For information about configuring settings on the Security tab, see Setting ServerSpecific Permissions.
128 For information about configuring settings on the Full-Text Indexing tab, see Configuring System Resource Usage During Full-Text Indexing. For information about configuring settings on the Diagnostic Logging tab, see Configuring Diagnostics Logging on a Server. For information about configuring settings on the Public Folder Referrals tab, see Customizing Public Folder Referrals.
Procedure
To open a server's Properties dialog box In Exchange System Manager, right-click an Exchange server, and then select Properties. Properties dialog box for SERVER01
129
130 system messages (alerts that are displayed when problems occur), public folder messages, and e-mail messages. Note To search for a specific system message in Message Tracking Center, search for the Message ID. If you do not know the Message ID, you can find system messages manually by reviewing the message tracking logs. Exchange automatically creates these logs if you have message tracking enabled on a server. To search for other types of messages, you can search by sender, recipient, or server. Before enabling a server's messages to appear in Message Tracking Center, you must enable subject logging on the Exchange server. However, enabling this type of logging causes the subject lines of messages in Simple Mail Transfer Protocol (SMTP) and MAPI queues to be displayed in the Subject column of Queue Viewer. By default, the Subject column is left empty to preserve confidentiality. (For example, some Exchange organizations prefer to keep low-level administrators from viewing message subjects.) Therefore, verify your organization's policy about revealing subject line information before enabling subject logging. For detailed instructions, see How to Enable a Server's Messages to Appear in Message Tracking Center.
131
Procedure
To enable a server's messages to appear in Message Tracking Center 1. In Exchange System Manager, right-click an Exchange server, and then select Properties. 2. On the General tab, select the Enable subject logging and display check box. Note If the Enable subject logging and display check box is unavailable or appears dimmed, there is a server policy object applied to this server. You must either enable subject logging and display on the policy, or remove the server from this policy. To view the policies that are applied to this server, view the Policies tab.
132 but users on a specific Exchange server are experiencing mail flow problems, you may want to enable message tracking on the server that is experiencing mail flow problems. Alternatively, you may want to track messages only on your Internet gateway servers. When you enable message tracking on an individual server, messages routed through the server are added to the message tracking logs. These logs are text files that you can review to monitor and troubleshoot message flow. The Exchange System Attendant service on each server maintains these log files. For detailed instructions on enabling message tracking, see How to Enable Message Tracking.
Procedure
To enable message tracking 1. In Exchange System Manager, right-click an Exchange server, and then select Properties. 2. On the General tab, select the Enable message tracking check box. Note If the Enable message tracking check box is unavailable or appears dimmed, there is a server policy object applied to this server. You must either enable message tracking on the policy, or remove the server from this policy.
133
134
Procedure
To move message tracking logs 1. In Exchange System Manager, right-click an Exchange server, and then select Properties. 2. On the General tab, select the Enable Message Tracking check box. The General tab in the <Server Name> Properties dialog box
135
3. In the Log file directory box, click Change to change the log file directory. 4. In Message Tracking Log File Directory, select the directory where you want to store message tracking logs, and then click OK. The Message Tracking Log File Directory dialog box
136
Procedure
To specify how frequently log files are removed 1. In Exchange System Manager, right-click an Exchange server, and then select Properties. 2. On the General tab, select Remove log files. 3. In the Remove files older than (days) text box, type the number of days that you want the files to remain on the server before being deleted.
137
POP3
IMAP4
SMTP
MSExchangeSA Microsoft Exchange Routing Engine (RESvc) Note The routing engine must be running on all Exchange servers, both frontend and back-end servers.
138
Protocol/tool on server Services required
NNTP
Network News Transfer Protocol (NNTP) must be enabled on a server during upgrades. Note You can disable this protocol if you are not offering it to your users.
For detailed instructions on designating a front-end server, see "How to Designate a Front-End Server" in Exchange Server 2003 and Exchange 2000 Server Front-End and Back-End Topology. After designating a server as a front-end server, remove any nonessential components or disable any unnecessary services on the server. Removing these components or disabling these services allows the front-end server to relay client requests more efficiently and improves security by reducing the number of services or components that are vulnerable to attack. In particular, you can remove public folder stores and storage groups from an Exchange front-end server. Also, if your front-end users are not sending mail using SMTP, you can remove mailbox stores from the frontend server. Important To stop or disable services, use the Services snap-in in Microsoft Management Console (MMC).
139 your reported issue. However, before sending information about any fatal service error to Microsoft, confirm that sending this information is permitted under your organization's security policy. When you send error reports to Microsoft, they are sent over Secure HTTP (HTTPS), which is a more encrypted channel than HTTP. Note To send reports, the server must have HTTP access to the Internet. For more information about automatic error reporting, see the "Microsoft Online Crash Analysis" Web site (http://go.microsoft.com/fwlink/?LinkId=18428).
Procedure
To send error information to Microsoft 1. In Exchange System Manager, right-click an Exchange server, and then select Properties. 2. On the General tab, select the Automatically send fatal service error
141
Procedure
To add a locale to the server 1. In Exchange System Manager, right-click an Exchange server, and then select Properties. 2. On the Locales tab, click Add. See the "Locales tab" figure. Locales tab
3. In the Add Locale dialog box, select a language, and then click OK. See the "Add Locale dialog box" figure.
142
Note You can also remove locales by selecting a locale on the Locales tab and then clicking Remove.
143 To schedule when the Mailbox Manager process runs and whether the process generates a report, you use the Mailbox Management tab in the server's Properties dialog box. Mailbox Management tab
144
Defining a Schedule
In the Start mailbox management process drop-down list, you select when you want the Mailbox Management process to start (on that particular server) according to the rules defined by associated recipient policies. The recipient policies that are associated with the server determine which mailbox or mailboxes that Mailbox Manager cleans. For detailed instructions, see How to Set a Schedule for Mailbox Management. You can also customize the mailbox management schedule to suit your organizational requirements. For example, you can create a custom schedule that runs Mailbox Manager on Saturday at midnight. For detailed instructions, see How to Set a Custom Schedule for Mailbox Management.
145
Procedure
To define a schedule 1. In Exchange System Manager, right-click an Exchange server, and then select Properties. 2. On the Mailbox Management tab, in the Start mailbox management process list, select a schedule, and then click OK. Note You can manually start Mailbox Manager by right-clicking the server object and then selecting Start Mailbox Management Process. If you use this command, Mailbox Manager still runs at its next scheduled interval.
146 when the Mailbox Manager process runs on a server and whether the process generates a report. You can also customize the mailbox management schedule to suit your organizational requirements. In the Start mailbox management process drop-down list, you select when you want the Mailbox Management process to start on that particular server according to the rules defined by associated recipient policies. The recipient policies that are associated with the server determine which mailbox or mailboxes that Mailbox Manager cleans. This procedure outlines how to set a custom schedule for the Mailbox Management process.
Procedure
To define a custom schedule 1. In Exchange System Manager, right-click an Exchange server, and then select Properties. 2. On the Mailbox Management tab in the server's Properties dialog box, in the Start mailbox management process list, select Use custom schedule, click Customize, and then enter the schedule information. Note You can manually start Mailbox Manager by right-clicking the server object and then selecting Start Mailbox Management Process. If you use this command, Mailbox Manager still runs at its next scheduled interval.
147 For more information about Mailbox Manager and recipient policies, see Managing Recipients and Recipient Policies in Exchange Server 2003.
148
Procedure
To set reporting options 1. In Exchange System Manager, right-click an Exchange server, and then select Properties. 2. On the Mailbox Management tab, in the Reporting drop-down list, select the type of report that you want created whenever mailboxes are processed: A summary report that contains basic information, including the total size of all messages that Mailbox Manager moved or deleted. A detailed report that includes the specific policies that Mailbox Manager ran, the specific mailboxes that were processed, and the specific folders in each mailbox that were processed every time that Mailbox Manager runs.
3. In the Administrator text box, click Browse, and then select a mailbox in your organization to receive these reports.
149 The first step in configuring diagnostics logging is to decide which services on an Exchange server must be enabled for diagnostics logging. Note You configure diagnostics logging separately for each service on each server. For example, if you enable protocol logging on an individual virtual server, it is the setting on the Exchange server on which the virtual server runs that determines the logging capabilities for the protocol. Diagnostics logging services
Service Description
IMAP4Svc
Allows users to access mailboxes and public folders through Internet Message Access Protocol version 4 (IMAP4). Runs connection agreements if Active Directory Connector is installed. Logs events when the Recipient Update Service updates address lists and e-mail addresses in the Microsoft Active Directory directory service. Allows Exchange access to Active Directory. Allows access to the Exchange store. Allows X.400 connectors to verify whether the message transfer agent (MTA) is being used. Replicates Exchange configuration information changes to the Internet Information Services (IIS) metabase.
MSADC
MSExchangeAL
MSExchangeDSAccess
MSExchangeIS MSExchangeMTA
MSExchangeMU
150
Service Description
MSExchangeSA
Handles many core Exchange tasks, such as mailbox management, e-mail proxy generation, offline address list generation, and monitoring. Note This service is also known as Microsoft Exchange System Attendant.
MSExchangeSRS
Replicates computers that are running Microsoft Exchange 2000 Server (or later) with computers running Microsoft Exchange Server version 5.5. Note This service is also known as Site Replication Service (SRS).
MSExchangeTransport
Controls message routing and transport functions in Exchange. If you experience mail flow problems, set diagnostics logging for this service. Controls the operation of POP3.
POP3Svc
After selecting a service, the next step is to set the logging levels for those services. There are four logging levels of detail. When Exchange generates an event less than or equal to the logging level, the event is logged. Events range from significant events (such as application failures) to moderately important events (such as the receipt of messages across a gateway) to events that are relevant only to debugging. Typically, you log only critical events. However, when problems occur, diagnostics logging helps you to change the logging levels to capture more events in greater detail.
None
Only critical events, error events, and events with a logging level of zero are logged. Note This is the default level for all services on Exchange servers.
Minimum
Events with a logging level of 1 or lower are logged. Events with a logging level of 3 or lower are logged. Events with a logging level of 5 or lower are logged.
Medium
Maximum
After selecting a logging level, logging begins automatically whenever you start Exchange. You can view the log entries in Event Viewer. For more information about configuring diagnostics logging, see How to Configure Diagnostics Logging.
152
Procedure
To configure diagnostics logging 1. In Exchange System Manager, right-click an Exchange server, and then select Properties. 2. On the Diagnostics Logging tab, in the Services list, select an Exchange 2003 service on which you want to set category logging levels. 3. In the Categories list, select the categories and logging levels that you want to configure.
153 Note A custom list for public folder referrals is new in Exchange 2003. In Exchange 2000, you can only specify whether to allow public folder referrals among routing groups. To create a custom list of servers for public folder referrals, you use the Public Folder Referrals tab. For detailed instructions, see How to Specify a Custom List for Public Folder Referrals. When you create a custom list of servers, you also assign costs to prioritize the servers in your referral list. Public Folder Referrals tab
154
Procedure
To specify a custom list for public folder referrals 1. In Exchange System Manager, right-click an Exchange server, and then select Properties. 2. On the Public Folder Referrals tab, in the Public folder referral options list, select Use Custom List. Public Folder Referrals tab
155
156
157
Procedure
To change a server's priority in a custom public folder referrals list 1. In Exchange System Manager, right-click an Exchange server, and then select Properties. 2. On the Public Folder Referrals tab, select a server in the list, and then click Modify. 3. In the Modify Referral Cost dialog box, specify a cost for that server. Modify Referral Cost dialog box
158 Note If you want to prioritize the order in which Exchange uses the listed servers, you must change the costs associated with each server, assigning lower costs to those servers that you want Exchange to use first.
Directory changes tracked by update sequence number (USN) User and configuration lookups List of global catalog servers in the topology
159
Component Dependency on DSAccess
List of global catalog servers in the topology User and configuration lookups User and configuration lookups User and configuration lookups
In Exchange 2003, DSAccess is the centralized mechanism that determines the Active Directory topology, opens the appropriate Lightweight Directory Access Protocol (LDAP) connections, and works around server failures. DSAccess is responsible for the following functions: Retrieving and writing information from Active Directory, such as configuration data and recipients. Caching information from Active Directory for better performance when querying Active Directory. DSAccess caches configuration and recipient data locally so that this information is available for subsequent queries from other Exchange servers. Caching information locally has the additional benefit of preventing the network traffic that is caused by additional queries to Active Directory. Constructing a list of available domain controllers and global catalog servers that other Exchange components can query. For example: The MTA routes LDAP queries through the DSAccess layer to Active Directory. To connect to databases, the store process uses DSAccess to obtain configuration information from Active Directory. To route messages, the transport process uses DSAccess to obtain information about the connector arrangement.
Of the previously listed functions, the only function that you can control on a server is the one that deals with constructing a list of available domain controllers and global catalog servers. You can have this list constructed automatically by DSAccess, or you can manually create this list for DSAccess to use.
160
161 Selecting the Automatically discover servers check box enables DSAccess components to automatically discover the following servers in an Exchange organization: Configuration domain controller The single domain controller that reads and writes information in the configuration naming context in Active Directory. DSAccess chooses a domain controller or global catalog server to act as the configuration domain controller. All configuration data is written and read by this configuration domain controller. Working domain controllers As many as ten domain controllers that perform Active Directory lookups for objects in the local domain. These domain controllers are primarily used to update objects in the local domain or read non-configuration data that is not replicated to global catalog servers. Working global catalog servers As many as ten global catalog servers that perform forest-wide queries. All user data is looked up on the global catalog servers.
To discover these servers, Directory Access locates domain controllers and global catalog servers that run Microsoft Windows Server 2003, or Microsoft Windows 2000 Server Service Pack 3 (SP3) or higher. Directory Access then tests these servers and chooses suitable servers for Exchange services to use to perform Active Directory queries. Note Because manually constructed topologies do not update automatically, it is strongly recommended that you use the Automatically discover servers setting.
162
Procedure
To automatically discover servers 1. In Exchange System Manager, right-click an Exchange server, and then select Properties.
2. On the Directory Access tab, select the Automatically discover servers checkbox. Directory Access tab
163
Note This checkbox is unavailable when All Domain Controllers is selected in the Show list.
164
165 Note When you manually create a topology for DSAccess, you no longer have the advantages of automatic failover and load balancing that you have when DSAccess automatically discovers the topology.
Procedure
To manually create a topology for Directory Access 1. In Exchange System Manager, right-click an Exchange server, and then select Properties. 2. On the Directory Access tab, in the Show list, select the type of servers that you want to view. Note You cannot clear the Automatically discover servers check box if you select All Domain Controllers in the Show list. 3. Clear the Automatically discover servers check box. This action clears the current list of servers. Caution By default, DSAccess automatically discovers servers. It is strongly recommended that you keep this setting. 4. Click Add to add servers to the topology, or click Remove to remove servers from the topology.
166
168 and List contents. Examples of extended Exchange permissions are Create public folder and View Information Store status. When you view an object's permissions, Active Directory permissions appear first in the list, followed by Exchange extended permissions. Permissions in Exchange are inherited by default. For example, the permissions that you apply to a particular server are inherited by the objects that the server contains, such as the public folder and mailbox stores on that server. Inherited permissions are convenient because you do not have to set the permissions for every object in your Exchange organization manually. Important When setting permissions on Exchange objects, use Exchange System Manager. Do not set permissions on Exchange objects using Windows Server 2003 MMC snap-ins, such as the Active Directory Sites and Services or Active Directory Users and Computers. You can set permissions using the Exchange Delegation Wizard and apply these settings to a whole Exchange organization or to a specific administrative group. Because permissions are inherited, these permissions control who can view or modify settings at the server level. By default, these permissions are configured to support the standard Exchange administrator types (Exchange View Only Administrator, Exchange Administrator, and Exchange Full Administrator). You are strongly advised to use the standard Exchange administrator types and only change the settings if more detailed settings are required by your organization's security policy.
Note For more information about the Exchange Delegation Wizard, see "Understanding Exchange Objects and Exchange System Manager." For detailed instructions on modifying server-specific permissions, see How to Modify Permissions on a Specific Server.
170
Procedure
To modify permissions on a specific server 1. In Exchange System Manager, right-click an Exchange server, and then select Properties. 2. On the Security tab, in the Group or user names list, select the group or user
171 name for which you want to modify permissions. Security tab
3. In the Permissions for <selected entry> list, select the appropriate permissions.
172
Indexing is a resource-intensive feature that requires a significant number of CPU cycles. Indexing gigabytes of data can take hours or days. Schedule indexing when the server is not being heavily used. For detailed instructions, see How to Control Server Performance During Indexing.
173 Note Indexing is a resource-intensive feature that requires a significant number of CPU cycles. Indexing gigabytes of data can take hours or days. Consider scheduling indexing when the server is not being heavily used. This procedure outlines how to control server performance during indexing.
Procedure
To control server performance during indexing On the Full-Text Indexing tab in the server's Properties dialog box, in the System resource usage list, select a usage level: Minimum, Low, High, or Maximum. Note To limit the CPU resources that the indexing service occupies, set the server usage level to a lower value (Minimum or Low). Full-Text Indexing tab
174
175
Understanding Recipients
Central to any messaging system are the people and resources that receive messages. An individual may receive a message from a coworker, or a public folder may receive a message from a participant in a particular discussion. Although messages are received by people, the term recipients refers to Microsoft Active Directory directory service objects, not people. Recipients are Active Directory objects that have messaging capabilities. However, the object itself does not receive messages. The messages are not stored in Active Directory. Instead, they can reside in a mailbox on an Exchange server, in a public folder, or in another messaging system. People access messages that are sent to them by using a client application. Examples of client applications include Microsoft Outlook, Outlook Web Access, and Outlook Mobile Access. Each of these clients receives notification when a new message arrives and receives pointers to the location of the message, so that the message can be opened and read. The following scenario explains the difference between the person who receives e-mail messages and Active Directory objects. Carole, a member of the marketing team, has a user account that prompts her to type her user name and password to log on to her computer and her company's network. After logging on, she has access to several network resources. One of these resources is her Exchange mailbox. Carole accesses her mailbox with an e-mail client, Outlook 2002. Outlook queries her Exchange mailbox and presents Carole a list of messages in her Outlook Inbox. When Carole opens one of
176 these messages, Outlook retrieves the contents of the message from the message store on the Exchange server that houses her mailbox. As shown in the following figure, there is a recipient that is an Active Directory user object named carole. Mail that is addressed to carole is stored in an associated mailbox on an Exchange server. When the correct credentials are sent to the domain controller for user object carole, the contents of the mailbox become available to the e-mail client. Users authenticate to Active Directory and then use mail clients to access the contents of their Exchange mailbox
In Exchange, the term recipient refers to an Active Directory object that is mailboxenabled or mail-enabled. Mailbox-enabled recipients can send, receive, and store messages. Mail-enabled recipients can only receive messages. The following table describes the Active Directory objects that can be Exchange recipients.
Users
Mailbox-enabled Mail-enabled
Users can log on to networks and access domain resources. Users can be added to groups and appear in the global address list (GAL). Mailbox-enabled users can send and receive messages and store messages on their Exchange server. Mail-enabled users can receive messages at an external e-mail address only. They cannot send or store messages on Exchange.
InetOrgPerson
Mailbox-enabled Mail-enabled
A user object that has had its properties extended to improve compatibility with directory services that use the InetOrgPerson object. As a recipient, InetOrgPerson has the same characteristics as a user object. To mail-enable or mailboxenable an InetOrgPerson object, you must have a Microsoft Windows Server 2003 domain controller and an Exchange 2003-only environment (no servers running Exchange 2000 Server or Exchange Server version 5.5).
178
Active Directory object Type of recipient Description
Contacts
Mail-enabled
Contacts are objects that contain information about people or organizations outside the Exchange organization. Mail-enabled contacts can receive e-mail messages at an external email address. They can be added to distribution lists and appear in the GAL. Contacts cannot access network resources. A group is an object that can contain users, InetOrgPerson objects, contacts, public folders, and other groups. Query-based distribution groups are similar to standard distribution groups, except that they use an LDAP query to dynamically build the group membership. The query is run when a message is sent to the query-based distribution group. When you create a query-based distribution group, you select the criteria for the query. Public folders are repositories for messages and other files that can be accessed by users on the network.
Groups
Mail-enabled
Mail-enabled
Public folders
Mail-enabled
179 Note Although public folders are recipients, they are different from the other recipient types mentioned here. For more information about public folders, see "Managing Mailbox Stores and Public Folder Stores."
180
Example Scenario
The Exchange administrator for Fourth Coffee wants to create three e-mail addresses for recipients in the organization. The first is for the board of directors, the second is for the employees of the company who work in New York, and the third is for the remainder of the employees at the home office. He creates three recipient policies, as shown in the following table. Policies and their priorities
Policy Priority SMTP address
1 2 lowest
The following table shows information for three different users. User information for Fourth Coffee personnel
Name Office Board
Yes No No
The first recipient policy, Board of Directors, runs and finds Jonathan Haas in the list of board members. His address is set to <alias>@board.fourthcoffee.com. The next policy, New York Employees, runs. It finds Jonathan Haas again. However, because a policy with a higher priority has already been applied to him, no action is taken. The policy continues running and finds Yale Li. No previous policy has applied to Yale, and Yale Li's address becomes <alias>@newyork.fourthcoffee.com. Finally, the default policy runs. Because no previous policy has applied to Britta Simon, her address becomes the default address, <alias>@fourthcoffee.com. You may want to apply more than one address to a group of recipients. In the previous example, if everyone in the company should receive e-mail messages at <alias>@fourthcoffee.com, that address must be included in all three recipient policies. When you have more than one address in a recipient policy, only one address is considered the primary address per address type. This means that you can only have
181 one primary Simple Mail Transfer Protocol (SMTP) address and one primary X.400 address. You can have 10 SMTP addresses for one recipient, but only one of those can be the primary SMTP address. The difference between primary and secondary addresses is that the primary address serves as the return e-mail address. When mail is received from a recipient, the primary address determines which address the mail appears to have come from. Recipients can receive mail sent to any of the addresses associated with them. The following table shows the primary and secondary e-mail addresses of the three people in the scenario. Primary and secondary e-mail addresses
Name (alias) Receive mail sent to Send mail from (primary e-mail address only)
Jonathan Haas [email protected] (Jon) [email protected] Yale Li (Yale) [email protected] [email protected] Britta Simon (Britta) [email protected]
Notice that Jonathan Haas is in the New York office, yet does not have the <alias>@newyork.fourthcoffee.com address. To have this secondary address, it would be necessary to include it in the recipient policy that applies to him. However, the policy with the highest priority that applies to Jonathan is the Board of Directors policy. Because the members of the board of directors all work in different states, the policy does not include <alias>@newyork.fourthcoffee.com. To add <alias>@newyork.fourthcoffee.com to Jonathan, you can manually add a secondary address in Active Directory Users and Computers, or you can programmatically add <alias>@newyork.fourthcoffee.com as a secondary address to all employees in the New York office. Note This example scenario shows how recipient policies are applied. The behavior of recipient policies differs when co-existing with Exchange Server 5.5.
182
What occurs when Mailbox Manager processes a message depends on the setting that you select when creating the policy. By default, only a report is generated. No additional action is taken. In addition to the default setting, there are three other options for how Mailbox Manager processes messages that exceed the specified limits. The following table describes all four of these Mailbox Manager options.
No messages are moved or deleted, but an administrator report is generated that indicates which mailboxes contain items that exceed the limits defined by the mailbox recipient policy. Messages are moved to the Deleted Items folder in each client mailbox. Messages are handled as if deleted by the client. Users can remove them from the Deleted Items folder if they want to. A partial replica of the folder hierarchy of the mailbox is created under a root folder named System Cleanup. Affected messages are moved to the appropriate subfolder of the System Cleanup folder. This feature gives users a way to recover recently deleted items, without losing information about the original folder location of the items. Messages are immediately deleted from client view without being moved to either the Deleted Items or System Cleanup folder.
Delete immediately
You can use the same limits for every folder that the mailbox recipient policy applies to, or set custom limits on a folder-by-folder basis. Each folder must be configured individually if its limits differ from the default limits.
185
Creating a Recipient
Recipients can either be created manually using Active Directory Users and Computers or programmatically using APIs. This section focuses on manually creating mailboxenabled and mail-enabled objects, including distribution groups. For information about public folder creation, see "Managing Mailbox Stores and Public Folder Stores." For information about programmatically creating recipients, download the Exchange Software Development Kit (SDK) or view it online from the Exchange developer center (http://go.microsoft.com/fwlink/?LinkId=24705).
To create a new Active Directory object that can be mail-enabled or mailbox-enabled, use Active Directory Users and Computers, as shown in the following figure.
When you create a recipient object on a network where Exchange is already installed, the recipient will be mailbox-enabled or mail-enabled by default. Clear the Create an Exchange mailbox check box if you do not want to mail-enable or mailbox-enable the Active Directory object. Note To see the options that are specific to Exchange, you must have the Exchange system tools installed on the computer that is being used to create users in
187 Active Directory Users and Computers. Users created on computers without Exchange system tools installed will not have mailboxes created by default. Clear the check box for the object not to be a recipient
You can use the Exchange Task Wizard to mail-enable or mailbox-enable an existing user object. For detailed information, see How to Make an Existing Active Directory Object a Recipient.
188 Using Exchange Task Wizard to mail-enable or mailbox-enable an existing user object
This procedure outlines how to make an Active Directory object into mail-enabled or mailbox-enabled recipient.
Procedure
To make an existing Active Directory object a recipient 1. In Active Directory Users and Computers, right-click the object, and then select Exchange Tasks.
190 2. On the Available Tasks page in the Exchange Task Wizard, select Create Mailbox or Establish E-mail Address. Using Exchange Task Wizard to mail-enable or mailbox-enable an existing user object
Note If Create Mailbox is not available, the object cannot be mailbox-enabled. However, if Delete Mailbox is listed instead, the object already has a mailbox associated with it. Each recipient can have only one Exchange mailbox.
191
Mail-Enabled Groups
Groups are used to assemble Active Directory objects under one name. This reduces the overhead required to manage users, especially those with similar requirements. For example, you may have a network resource, such as a public folder, that everyone on your marketing team must access. You can give each user on the team permissions to that folder, or you could create a security group named "marketing" and add each member of the marketing team to that group. Then, you can give the group permission to the folder. After a group has been established, you can give that group access to other resources, such as additional public folders, without having to locate every member of the marketing team every time. There are two main types of groups: security and distribution. Security groups are security principals in Active Directory. This means that security groups can be set in the access control list (ACL) of a resource, such as a network share or public folder. Distribution groups exist for sending e-mail messages to collections of users. In a Microsoft Windows environment without Exchange, there are limited uses for distribution groups. Both security and distribution groups can be mail-enabled. They cannot be mailbox-enabled because they represent a collection of users.
Procedure
To enable an existing group for mail 1. In Active Directory Users and Computers, right-click the group, and then click Exchange tasks. 2. On the Available Tasks page in the Exchange Task Wizard, select Establish Email Address on Groups. Using Exchange Task Wizard to enable an existing group for mail
194
195 There is a drawback to setting a specific server as the expansion server for a group: If that server is unavailable, no member of the distribution group receives the message. However, if you leave the default setting, Any Server in the Organization, most of the users receive their messages if one server fails. Also, if all members of a distribution group are on well-connected servers, setting a specific expansion server may be unnecessary. For information about setting specific expansion servers, see "Managing Recipient Settings."
196
197 key on the Exchange 2000 SP3 servers to increase reliability. This modification is covered in the next section. If you are running versions of Exchange prior to Exchange 2000 SP3 in your environment, query-based distribution groups will not work reliably.
Modifying Exchange 2000 SP3 Servers for Use with Windows 2000 Global Catalog Servers
Follow these steps to configure an Exchange 2000 SP3 server for improved reliability in environments where query-based distribution groups will be expanded with Windows 2000 global catalog servers. Caution Incorrectly editing the registry can cause serious problems that may require you to reinstall your operating system. Problems resulting from editing the registry incorrectly may not be able to be resolved. Before editing the registry, back up any valuable data. For detailed instructions, see How to Modify Your Exchange 2000 SP3 Servers for Use with Windows 2000 Global Catalog Servers.
198
How to Modify Your Exchange 2000 SP3 Servers for Use with Windows 2000 Global Catalog Servers
This procedure outlines how to configure an Exchange 2000 SP3 server for improved reliability in environments where query-based distribution groups will be expanded with Windows 2000 global catalog servers.
Procedure
To modify your Exchange 2000 SP3 server 1. Start Registry Editor. 2. In Registry Editor, locate the following registry key:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SMTPSVC \Parameters
3. In the details pane, right-click, point to New, and then click DWORD Value. 4. Type DynamicDLPageSize for the name. 5. Right-click DynamicDLPageSize, and then click Modify. 6. Under Base, click Decimal. 7. Under Value Data, type 31 and then click OK.
199 Note You must complete this step only for Exchange 2000 servers that use Windows 2000 global catalog servers.
200 The process differs if a dedicated expansion server is used for query-based distribution groups. In this case, instead of sending a query to the global catalog server for expansion as discussed in Step 3, the e-mail message is first routed to the dedicated expansion server. After the message arrives at the expansion server, the expansion occurs, and the delivery follows the same process as described earlier. The expansion server must be an Exchange 2000 SP3 server or later.
201 resources to expand the query-based distribution group, expansion and delivery are more efficient. Option 2 Create a query-based distribution group for every Exchange server, and limit each query-based distribution group to the mailboxes on that Exchange server. Designating this same server as the expansion server optimizes mail delivery. Then, use aggregate standard distribution groups that contain these query-based distribution groups as members. For example, to create a query-based distribution group for all full-time employees, you can create a query-based distribution group on each server for full-time employees, and name them "Server1 Full Time" and "Server2 Full Time." Then, create a distribution group composed of these serverbased groups named "AllFullTime." Note The distribution group that you use to combine the query-based distribution groups cannot itself be a query-based distribution group. Option 3 The following example illustrates a third approach for improved handling of large query-based distribution groups. You want to create a query-based distribution group named "All employees" with 100,000 users. Consider dividing the group into the following smaller query-based distribution groups and combining these groups into a single standard distribution group: "All Temps" 10,000 users "All Vendors" 5,000 users "All Full-Time" 65,000 users "All Interns" 2,000 users "All Contractors" 18,000 users
In this case "All Full-Time" would be a large distribution group, so you may want to assign a specific expansion server to it. The other query-based distribution groups can be assigned an expansion server based on how the users are distributed across your Exchange servers. For example, if all of the interns reside on one Exchange server, you may want to designate the same server as the expansion server for "All Interns." Overall, this proposed approach will perform much better than a single query-based distribution group with 100,000 recipients.
202
Index the attributes that you use in the query. Indexing greatly improves the performance of the query, and it reduces the time that Exchange requires to expand the distribution group and deliver the e-mail message to the intended recipients. If the filter string contains incorrect formatting or incorrect LDAP syntax, the global catalog server will not run the query. Using Active Directory Users and Computers to create your query can help prevent you from constructing an incorrect query. You can also use the Preview button to view the result of the query. This will confirm the validity and expected results of the query. If you create a query-based distribution group based on an incorrect LDAP query, when a user sends mail to the query-based distribution group, the user receives a non-delivery report (NDR) with the code 5.2.4. If you enable categorizer logging, Exchange logs one of two events with event identifiers of 6024 or 6025.
203 If the filter string is well-formatted, but produces no results, the sender will not receive an NDR. This is the same outcome that occurs if you send to an empty distribution group. As previously stated, use the Preview button in Active Directory Users and Computers to confirm the expected results of your query. Use Exchange System Manager in a security context where its permissions for reading objects in Active Directory are the same as those of the Exchange server. Exchange System Manager runs in the security context of the user who is currently logged on. If an administrator is running with lower security privileges than the Exchange server, the query might show a subset of the actual results in the preview pane. The preview pane will show only those Active Directory objects that the administrator has permissions to read. When mail is sent to the query-based distribution groups, however, the categorizer will run with the Exchange server permissions. Assuming the Exchange server has permissions for all the objects in the query, the query will return the correct results.
There will be issues when a base distinguished name is deleted. Query-based distribution expansion relies on its base distinguished name referring to a valid container in the directory. If the base distinguished name container for a query-based distribution group is deleted, the categorizer cannot run the query, and the sender receives an NDR with the code 5.2.4. If categorizer logging is enabled, an event ID of 6024 or 6025 is logged. For example, you create a sales container in the users container for all sales employees and build a query-based distribution group using the sales container. If you delete the sales container, the query will no longer work.
204 When creating a query-based distribution group, Active Directory Users and Computers provides a way to format the LDAP query using standard attributes, without requiring specific knowledge of LDAP. For example, you can select all mailboxes under the organizational unit, or even customize the query to select all mailboxes under an organizational unit that exist on a particular server. For detailed instructions on creating a query-based distribution group, see How to Create a Query-Based Distribution Group. After you create a query-based distribution group, you can make sure that your query works the way that you intended it to work by using the preview feature. This feature is useful not only for query validation, but also to determine how long it takes a query to run. Based on this time, you can decide whether to divide the query into smaller queries for better performance and faster delivery times. For detailed instructions, see How to Verify That a Query-Based Distribution Group Is Working Correctly.
205 You should also read the Deployment Recommendations for Query-Based Distribution Groups and Guidelines for Creating Query-Based Distribution Groups topics before you create your query-based distribution groups. After you create a query-based distribution group, you can make sure that your query works the way that you intended it to work by using the preview feature. For detailed information, see How to Verify That a Query-Based Distribution Group Is Working Correctly.
Procedure
To create a query-based distribution group 1. In Active Directory Users and Computers, in the console tree, right-click the container where you want to create the query-based distribution group, point to New, and then click Query-based Distribution Group. 2. In Query-based Distribution Group name, type a name for the query-based distribution group, and then click Next. 3. Under Apply filter to recipients in and below, verify that the parent container shown is the one that you want the query-based distribution group to be run against. If this is not the correct container, click Change to select another container. Note The query returns only recipients in the selected container and its child containers. To get the results that you want, you may have to select a parent container or create multiple queries. 4. Under Filter, select one of the following options: To filter the query based on a set of predefined criteria, click Include in this query-based distribution group, and then select from the following criteria: - Users with Exchange mailboxes - Users with external e-mail addresses - Groups that are mail-enabled - Contacts with external e-mail addresses - Public folders that are mail-enabled To create your own criteria for the query, click Customize filter, and then
206 click Customize. 5. Click Next to see a summary of the query-based distribution group that you are about to create. 6. Click Finish to create the query-based distribution group. The new query-based distribution group appears under the container that you selected in Step 3.
Procedure
To verify that a query-based distribution group works correctly 1. In Active Directory Users and Computers, right-click the query-based distribution group that you just created, and then click Properties. 2. Select the Preview tab to view the query results, and verify that the correct recipients are included in the distribution group. Note The results that are displayed in the preview pane may vary from the actual results when the query is run, depending on permissions settings.
207
208
Procedure
To add query-based distribution groups as members of a distribution group 1. In Active Directory Users and Computers, in the console tree, navigate to the container where the distribution group resides, right-click the distribution list, and then click Add Exchange Query-based Distribution Groups. 2. In Select Exchange Query-based Distribution Groups, under Enter the object names to select, enter the name of the query-based distribution group that you want to add as a member of this group. 3. Click Check Names to verify the entry. 4. Click OK. 5. Repeat Steps 1 through 4 for each query-based distribution group to be added as a member of this distribution group.
209
Managing Recipients
Managing recipients involves assigning e-mail addresses to recipients with recipient policies, and managing settings for recipient objects with Active Directory Users and Computers.
Mailbox
Mailbox-enabled user When a user is mailbox-enabled, the user has an e-mail address and a corresponding mailbox. Mailbox-enabled users can send, receive, and store e-mail messages in an Exchange organization.
Custom recipient
Mail-enabled user When a user is mail-enabled, they have an associated e-mail address external to the Exchange organization, but they do not have an associated Exchange mailbox. Mail-enabled users can receive messages at a specified external address, but they cannot store messages on Exchange servers in your organization. or Mail-enabled contact A mail-enabled contact does not have a Windows logon account or a mailbox. A contact can represent someone outside the Exchange organization, such as a customer or a business partner.
Distribution list
Mail-enabled group E-mail messages that are sent to a group are routed to the e-mail address of each group member.
211
After you click Recipient Policy, you then start the process of completing the steps that are outlined in the following checklist and described in the following sections. Recipient Policy Checklist __ Select the property sheets (e-mail address or Mailbox Manager settings). __ Name the new policy. __ Create a filter. __ Configure the settings. __ Set the priority of the policy. __ Apply the policy.
213
Create a Filter
Initially, there are no filter rules applied to the policy. If you do not create a filter, the policy will not be applied to any recipients.
214 Policy does not apply to anyone because no filter rules are set
215
Procedure
To create a recipient policy 1. In Exchange System Manager, right-click the Recipient Policies container, point to New, and then click Recipient Policy. Creating a new recipient policy
216
2. After you click Recipient Policy, complete the following steps, which are outlined in detail in steps 3 through 7: Select the property sheets (e-mail address or Mailbox Manager settings). Name the new policy. Create a filter. Configure the settings. Set the priority of the policy. Apply the policy.
3. Select the Property Sheets: Choose the type of policy to create. A single recipient policy can contain an address policy, a Mailbox Manager policy, or both. Selecting both will add property pages for both address and Mailbox Manager features to one recipient policy. Selecting property pages for a new policy
217
4. Name the New Policy: After you select the property pages, give the new policy a name. To help you identify the recipients to which the policy applies, give the policy a descriptive name. 5. Create a Filter: Initially, there are no filter rules applied to the policy. If you do not create a filter, the policy will not be applied to any recipients. To create the filter using an LDAP query, click Modify on the General tab. Policy does not apply to anyone because no filter rules are set
218
6. Configure the Settings: To customize the recipient policy, switch to either the E-Mail Addresses (Policy) tab or the Mailbox Manager Settings (Policy) tab in the policy's Properties dialog box. Use the settings on these tabs to configure the recipient policy to meet the requirements of the associated recipients. After configuring the settings, click OK to create the policy. 7. Set the Priority and apply the policy: After you create a new recipient policy, the policy and its assigned priority appear in Exchange System Manager. If you want to change the priority of a recipient policy, right-click the policy, select All Tasks, and then move the policy up or down the list of recipient policies that are shown in Exchange System Manager. After you create a new recipient policy, you also must apply the policy by right-clicking the policy in Exchange System Manager, and then clicking Apply Policy Now.
219
221
Procedure
To navigate to the Exchange General tab 1. In Active Directory Users and Computers, right-click the object to be modified, and then click Properties. 2. Click the Exchange General tab. Exchange General tab
222
Delivery Restrictions
To maintain system performance and to prevent users from wasting valuable system resources by sending large files through your e-mail infrastructure, message size limits are set at the global level in Exchange System Manager, as explained in "Managing an Exchange Server 2003 Organization." Typically, e-mail messages for legitimate business purposes can be sent under the threshold set at the global level. Use the Delivery Restrictions dialog box to override the global setting for those users who have special requirements and need to send larger files than the global limit allows. Tip Consider setting up users who need to transfer large files with an FTP account, instead of trying to use your Exchange server as though it were an FTP server. In addition to setting message size limits, you can use the Delivery Restrictions dialog box to specify to whom users can send messages and from whom they can receive messages. This is similar to the global setting. Important When you make these changes for individuals, you can only set restrictions that reference other Active Directory objects. Blocking mail from a specific Internet mail source or IP address must be done at the global level.
You can further restrict delivery of messages to recipients by selecting the From authenticated users only check box. This prevents anyone who is not authenticated by your Windows network from sending mail to this recipient. Selecting this check box effectively stops all Internet mail to this recipient. After selecting this check box, select how messages will further be restricted by choosing to allow messages from everyone (all authenticated users), only from users in the restricted list at the bottom of the Delivery Restrictions dialog box, or from everyone except users in the restricted list. To add users to the restricted list, use the Add button.
224
Delivery Options
One delivery option is the use of delegates. In many organizations, delegates are granted permission to send mail on behalf of someone else. For example, an administrative assistant may send a meeting request on behalf of a manager. You can assign delegates to a mailbox-enabled user in the Delivery Options dialog box. Another delivery option is address forwarding, wherein mail sent to the user is forwarded to another address in the organization. You can also choose to have copies of the message sent to both the forwarding address and the user's mailbox. In this case, deleting one copy of the message does not delete the other. You may want to use forwarding to protect the identity of the actual recipient, or for administrative assistants who help sort e-mail messages for others. Recipient limits control the number of recipients to which a user can send a single message. By default, there is no set limit.
Storage Limits
Individuals in your organization may need more storage space on their Exchange servers than the threshold for the mailbox store allows. You can set storage limits for individual users in the Storage Limits dialog box. Users can be warned as they approach the limit, subsequently denied the ability to send, and then denied the ability to send and receive mail. Also, you can override the setting for deleted item retention that is set on the mailbox store. When a user deletes an item, it appears deleted to the user. However, a copy is kept in the user's mailbox store for a specified time, allowing the item to be recovered if it was unintentionally deleted. Some users in your organization may need extra recovery protection, and you can override the setting in the Storage Limits dialog box. If you choose to override the limit set on the mailbox store, you will also have the choice to not permanently delete an item until the store is backed up, adding even greater recovery opportunities for that user.
225
226 Note Each Exchange mailbox must be associated with an Active Directory object, such as a user, in the same forest as the mailbox. If the intended user account resides outside the forest where Exchange is, Exchange first associates the mailbox with an account in its same Active Directory forest. That account is disabled. Then, the mailbox is associated with the external account. Special permissions Click Advanced to work more granularly with permissions, including changing inheritance.
You assign these rights on the Mailbox Rights tab in the user's Permissions dialog box. Assigning rights to read another user's mailbox
227
Procedure
To navigate to the Exchange Advanced tab 1. In Active Directory Users and Computers, right-click the object that you want to modify, and then click Properties. 2. On the Exchange Advanced tab, select the following options: In Simple display name, set a display name that will be used by systems that cannot interpret all the characters in the typical display name. This situation may occur when more than one language version of Exchange System Manager is used to manage an Exchange organization. For example, the English version of Exchange System Manager cannot display all the characters in the Kanji character set. Because the simple display name takes ASCII characters only, all versions of Exchange System Manager can display the simple display name. To prevent the recipient from being displayed in address lists, select Hide from Exchange address lists. To prevent the recipient from sending mail that is marked high priority to an X.400 mail system, select Downgrade high priority mail bound for X.400. Exchange Advanced tab
228
The Exchange General tab for mail-enabled recipients is slightly different from that for mailbox-enabled recipients. It has fewer features, omitting those features that apply only to mailbox-enabled users. For more information, see "Configuring Message Settings for Mailbox-Enabled Recipients" earlier in this chapter. The Exchange Advanced tab adds one option that is not included for mailbox-enabled users, Use MAPI Rich Text Format (RTF). When you select this option, mail sent to this recipient will be sent using MAPI RTF, overriding the settings configured in Internet Message Formats in Exchange System Manager. Select this option only if you are sure that the recipient can view MAPI-rich text.
230
Distribution Groups
Distribution groups are similar to other mail-enabled recipients, but they have the following unique features on the Exchange Advanced tab. Expansion server Use the Expansion server drop-down list to select the server where the group is expanded. If this is set to any server in the organization, the group is expanded on the first Exchange server in your organization that receives the message. For more information about expansion servers, see "Expanding MailEnabled Groups." Hide group from Exchange address lists Select this check box to prevent this distribution group from appearing in the GAL or any other address list. You may want to do this for groups that you do not want everyone in the company to know about. For example, you may have a team of auditors who are investigating unethical business practices. You may not want to show that such a group exists. Send out-of-office messages to originator When someone sends a message to a group, by default, out-of-office messages are not sent to the sender. Select this check box to enable out-of-office replies from group members. For large groups, outof-office replies may be unnecessary. For example, if the chief security officer of a company sends mail describing new security policies to a group named All Fulltime Employees, out-of-office replies are not necessary. Delivery reports for groups Delivery reports warn about delayed or failed delivery of messages. Choose to send delivery reports to either the owner of the group, the sender of the message, or not at all.
232 they need to find information about another recipient quickly. Address lists help you to organize this type of information in a meaningful way.
An Exchange organization can contain thousands of recipients. Compiling all your users, contacts, mail-enabled groups, and other recipients can cause many entries. As an administrator, you can create address lists to help users in your organization find what they are looking for more easily. For example, consider a company that has two large divisions and one Exchange organization. One division, named Fourth Coffee, imports and sells coffee beans while the other, Contoso, Ltd, underwrites insurance policies. For most day-to-day activities, the workers in the coffee division have almost no relationship with those in the insurance division. To make it easier for people to find each other, you create two new address listsone for Fourth Coffee and one for Contoso. Users can now choose to use the smaller address lists when looking up people in a certain division, or they can always use the GAL, if they are not sure which division a coworker is part of. Address lists can be sorted by any attribute that is associated with a recipient. City, title, company, office building, or any other attribute that you can filter recipients with can be the basis for a new address list. You can also create subcategories of address lists. For example, you can create an address list for everyone in Manchester and another for everyone in Stuttgart. You can then create an address list under Manchester for everyone who works in research and
234 development. Because the research and development list is under the Manchester list, the research and development list contains only those recipients who are in research and development and in Manchester. Address lists are created dynamically. When new users are added to your organization, they are automatically added to all the appropriate address lists. These updates are one of the primary responsibilities of both the Recipient Update Service and Exchange System Attendant.
To additionally simplify the user experience and organize your lists, you may want to create an empty address list. Because no query has been created for an empty address list, it returns no recipients, and serves strictly as a parent container that organizes other lists. In the previous example, you may create an empty address list named States.
237
Procedure
To create an address list 1. In Exchange System Manager, expand the Recipients container. 2. Expand All Address Lists, right-click the node that the new list belongs in, point to New, and then click Address List. 3. On the Create Exchange Address List page (see the following figure ), name your new address list, and then modify the filter rules appropriately. Creating an Exchange address list
You can move address lists to create a new hierarchy, using a drag-and-drop operation. As explained in "Managing Recipient Settings," you can hide recipients from address lists using Active Directory Users and Computers.
238
Whenever you choose, you can set any offline address list in your Exchange organization as the default offline address list. This new default list is then associated with all newly created mailbox stores. There can be only one default list at a time in your Exchange organization. If you delete the current default list, Exchange does not automatically assign another list as the default. If you want to use a default list after you delete the existing default list, you must manually designate another offline address list as the default.
240 Note When you upgrade Microsoft Exchange 2000 Server to Exchange Server 2003, offline address book replication between your servers might no longer work as you expect. For more information, see Microsoft Knowledge Base article 817377, "Offline Address Book Replication Does Not Work After You Upgrade to Exchange Server 2003." Offline address lists use system public folders to contain the required address list information. Their associated public folders are created during the public store maintenance interval, and the content of the public folder is updated according to the Update interval that you specify on the Properties dialog box of each offline address list. The Offline Address List (System) public folders are hidden from users by default. For detailed instructions on viewing the System public folders, see How to View System Public Folders. In a mixed environment where some users connect to Exchange 2003 or Exchange 2000 servers, and others connect to Exchange 5.5 servers, you must have multiple address lists. Those users who connect to Exchange 5.5 need to use the offline address book that is generated by Exchange 5.5.
241 more information, see Microsoft Knowledge Base article 817377, "Offline Address Book Replication Does Not Work after You Upgrade to Exchange Server 2003."
Procedure
To populate the default offline address list 1. In Exchange System Manager, click the Offline Address Lists container, right-click Default Offline Address List, and then click Properties. 2. In the Default Offline Address List Properties dialog box (see the following figure), click Add to add any address list that you have created. You can add as many address lists as you require. Then click OK. Default Offline Address List Properties dialog box
242
243 Update interval that you specify on the Properties dialog box of each offline address list. By default, the Offline Address List (System) public folders are hidden from users. This procedure outlines how to view the system public folders.
Procedure
To see the System public folders 1. In Exchange System Manager, expand the administrative group, and then expand the folders container. 2. Right-click the Public Folders container, and then click View System Folders.
You can customize the template to better suit the needs of your users. You can select the language for the template that you want to modify.
Then, using the Templates tab, you can modify details such as resizing fields, adding or removing fields, adding or removing tabs, and rearranging the order of the fields. For detailed instructions, see How to Customize the Details Template.
Procedure
To customize the details template 1. In Exchange System Manager, expand the Recipients container, expand the Detail Templates container, and then select the language for the template that you want to modify. For example, the English language has been selected in the following figure. Selecting English
248
The following languages are supported: Arabic, Basque, Brazilian, Bulgarian, Catalan, Chinese Simplified, Chinese Traditional, Croatian, Czech, Danish, Dutch, German, Greek, English, Estonian, Finnish, French, Hebrew, Hungarian, Italian, Japanese, Korean, Latvian, Lithuanian, Norwegian, Polish, Portuguese, Romanian, Russian, Serbian, Slovak, Slovenian, Spanish, Swedish, Thai, Turkish, and Ukrainian. Other languages may be supported by the client, but they will not be able to display the Properties pages. 2. In the list of templates displayed in the right-pane, right-click the template to be changed, and then click Properties.
249 3. On the Templates tab, resize fields, add or remove fields, add or remove tabs, and rearrange the order of the fields. Modifying the user details template
4. To see how the changes you made affect the template, click Test. To revert to the original template, click Original.
250
251
Procedure
To create a new Recipient Update Service 1. In Exchange System Manager, expand the Recipients container. 2. Right-click the Recipient Update Service container, point to New, and then click Recipient Update Service.
252 The Recipient Update Service wizard starts and guides you through the creation process. The final step in creating a Recipient Update Service
Note If all the domain controllers are currently associated with a Recipient Update Service, you receive an error when you try to create the next Recipient Update Service. You can have only one Recipient Update Service per domain controller.
253
Procedure
To change the update interval 1. In Exchange System Manager, expand the Recipients container. 2. Right-click the Recipient Update Service to be modified, click Properties, and then change the Update interval option.
254 Before you start managing your Exchange cluster, you may want to review what constitutes an Exchange Virtual Server and its associated Exchange resources. You may also want to become more familiar with Cluster Administratorthe primary tool used to configure and manage clusters. Note Before performing the cluster administration tasks outlined in this chapter, you must be familiar with the clustering concepts described in "Checklist: Preparation for installing a cluster" in the Microsoft Windows Server 2003 Enterprise Edition Online Help and in the Windows Server 2003 Technical Reference.
255 Sample Exchange 2003 cluster with four physical nodes and three logical Exchange Virtual Servers
IP address
256
Resource Description When created
Network name
Provides an alternative computer name to identify your Exchange cluster. Manages a disk that is on a cluster storage device. Controls the creation and deletion of all resources in the Exchange Virtual Server. Provides mailbox and public folder storage for Exchange Server 2003.
Physical disk
Created manually during initial cluster deployment. Created automatically during initial cluster deployment. Created automatically after the creation of the Exchange System Attendant resource. Created automatically after the creation of the Exchange System Attendant resource. Added manually after initial cluster deployment.
Exchange store
SMTP
IMAP4
Optional component that provides access to e-mail for IMAP4 clients. Optional component that provides access to e-mail for POP3 clients. Provides access to an Exchange mailbox and public folders through HTTP (for example, using Outlook Web Access). Provides content indexing for the Exchange Virtual Server.
POP3
HTTP
Created automatically after the creation of the Exchange System Attendant resource.
Created automatically after the creation of the Exchange System Attendant resource.
257
Resource Description When created
Handles communication with X.400 systems and interoperation with Exchange Server 5.5. There can be only one MTA per cluster. The MTA is created on the first Exchange Virtual Server. All additional Exchange Virtual Servers depend on this MTA.
Created automatically after the creation of the Exchange System Attendant resource.
Routing service
Created automatically after the creation of the Exchange System Attendant resource.
The following figure shows the dependency between Exchange 2003 resources. (A resource dependency indicates what other Exchange resources must be brought online before a specific Exchange resource can be brought online.) In the figure, the arrows point to the resource or resources on which a specific resource depends. For example, the arrow from Simple Mail Transfer Protocol (SMTP) points to Exchange System Attendant. Therefore, SMTP depends on Exchange System Attendant. Similarly, Exchange System Attendant has one arrow that points to the network name and one that points to the physical disk. This means that Exchange System Attendant is dependent on both of these resources.
In an active/active cluster as shown in the following figure, there are only two Exchange Virtual Servers: EVS1 and EVS2. This configuration can handle a single node failure at a time and still maintain 100 percent availability after the failure occurs. That is, if Node 2 fails, Node 1 still owns EVS1, and Node 1 also takes ownership of EVS2 with all the storage groups mounted after the failover. However, if Node 1 fails while Node 2 is still down, the whole cluster is in a failed state, because no nodes are available for failover. Effect of failures on an active/active cluster
260
You can also use Cluster Administrator to remotely administer a server cluster. Computers that are used to administer a server cluster remotely must be secure and restricted to trusted personnel. For more information, see "Best practices for securing server clusters" in the Windows Server 2003 Enterprise Edition Online Help. For detailed instructions, see How to Open Cluster Administrator.
261
Procedure
To open Cluster Administrator On a computer that is running Cluster Administrator, click Start, point to Programs, point to Administrative Tools, and then click Cluster Administrator. Cluster Administrator
262
Note As an alternative to Cluster Administrator, you can administer clusters from the command line. For information about using the command line to manage cluster settings, see "Managing a Server Cluster from the Command Line" in the Cluster Administrator Help.
263 Exchange Virtual Server, automatically creates the remaining Exchange resources, like the Exchange store and the MTA, using the default settings for each of these additional resources. Because initial cluster deployment typically involves so many default settings, you may have to customize your cluster configuration settings. This customization is important not only to achieve your cluster objectives, but also to obtain optimal cluster performance. Incorrect cluster configuration is the source of many of the Exchange-related issues handled by Microsoft Product Support Services. Therefore, carefully follow the recommendations in this chapter to make sure that your clusters perform optimally. Note If you upgraded your Exchange cluster from Exchange 2000 to Exchange 2003, you can ignore this section about customizing your cluster configuration because your configuration settings will not have changed. There are two levels of settings that you may want to adjust in your Exchange cluster configuration: Settings for the Exchange Virtual Servers. Settings for the Exchange resources that are associated with a specific Exchange Virtual Server.
For a simplified example of the configuration settings for a four-node cluster, see "Configuration Settings for a Four-Node Cluster."
264 detailed instructions, see How to Access the Properties of an Exchange Virtual Server Using Cluster Administrator. After you open the Properties dialog box for a specific Exchange Virtual Server, you can use the options on the various tabs to customize the preferred owner, failover, and failback settings.
How to Access the Properties of an Exchange Virtual Server Using Cluster Administrator
When you create Exchange Virtual Servers, the default properties that are applied at that time should allow your Exchange cluster to operate adequately. However, you may want to modify these settings to customize your clusters to accommodate your specific Exchange environment. This procedure outlines how to access the properties of an Exchange Virtual Server using Cluster Administrator.
265
Procedure
To access the properties of an Exchange Virtual Server 1. On a computer that is running Cluster Administrator, click Start, point to Programs, point to Administrative Tools, and then click Cluster Administrator. 2. In the console tree, right-click the Exchange Virtual Server that you want to configure, and then click Properties.
266 The General tab in the Properties dialog box for an Exchange Virtual Server
The preferred owners list is also important if you configure your Exchange Virtual Server to fail back automatically. With automatic failback enabled, an Exchange Virtual Server that is trying to come back online tries to fail back to the first node in the preferred owners list. Again, this first node should be the node that is best able to accommodate the Exchange Virtual Server. If the Exchange Virtual Server cannot fail back to any of the nodes in the list, the server will not come online, and the mailboxes on that server will not be available for your users. When setting the preferred owners for your Exchange Virtual Servers, follow the rules outlined in the following table.
267 Rules for setting the preferred owners for an Exchange Virtual Server
Setting Rule
Specifying a single node as the preferred owner for each Exchange Virtual Server
Assign a different node to each server. For example, the 4-node/3 Exchange Virtual Server example, shown earlier in Figure 8.1, can have the following preferred owners: EVS1 to Node 1 EVS2 to Node 2 EVS3 to Node 3
Specifying a list of nodes as the preferred owners for each Exchange Virtual Server
Make sure that the first node that is listed for one Exchange Virtual Server is not listed as the first node for any other Exchange Virtual server. For example, the 4-node/3 Exchange Virtual Server example, shown earlier in Figure 8.1, can have the following preferred owner lists: EVS1 to Node 1, Node 2, and Node 3 EVS2 to Node 2, Node 3, and Node 1 EVS3 to Node 3, Node 1, and Node 2
How to Specify a List of Preferred Owners for an Exchange Virtual Server Using Cluster Administrator
During the creation of an Exchange Virtual Server, you have the option of defining a list of preferred cluster nodes or preferred owners for that server. Cluster Service uses this
268 list of preferred owners when assigning the Exchange Virtual Server to a node. Cluster Service first tries to assign the Exchange Virtual Server to the first node in the list. If that node is unavailable, Cluster Service tries the next node in the list. If that node is unavailable, Cluster Service continues through the list, until it can assign the Exchange Virtual Server to a node. If Cluster Service cannot find an available node in the preferred owners list, it tries to failover to the other available nodes in the cluster that have Exchange installed. By default, you do not have to specify any preferred owners. If you do not specify owners, Cluster Service assigns an Exchange Virtual Server to the next available node that has Exchange installed. This procedure outlines how to specify a list of preferred owners for an Exchange Virtual Server using Clustering Administrator.
Procedure
To specify a list of preferred owners 1. On a computer that is running Cluster Administrator, click Start, point to Programs, point to Administrative Tools, and then click Cluster Administrator. 2. In the console tree, right-click the Exchange Virtual Server that you want to configure, and then click Properties. 3. On the General tab in the Exchange Virtual Server's Properties dialog box,
269 under Preferred owners, click Modify to specify the nodes that are to be preferred owners for this server. The General tab in the Properties dialog box for an Exchange Virtual Server
270 actual number of failovers exceeds the threshold during the failover period, the Exchange Virtual Server may be in a failed state, and Cluster Service will not bring it online. The default and recommended settings for these failover options are to have Exchange fail over 10 times in a 6-hour period. For detailed instructions, see How to Specify Failover Options for an Exchange Virtual Server Using Cluster Administrator.
How to Specify Failover Options for an Exchange Virtual Server Using Cluster Administrator
This procedure outlines how to specify failover options for an Exchange Virtual Server using Cluster Administrator. Note When configuring how Cluster Service manages failovers, consider the Threshold and Period options on the Failover tab. The Threshold setting determines the number of times that the Exchange Virtual Server can fail over during the failover Period. If the actual number of failovers exceeds the threshold during the failover period, the Exchange Virtual Server may be in a failed state, and Cluster Service will not bring it online. The default and recommended settings for these failover options are to have Exchange fail over 10 times in a 6hour period.
271 for installing a cluster" in the Microsoft Windows Server 2003 Enterprise Edition Online Help and in the Windows Server 2003 Technical Reference. Also, make sure that you are familiar with "Using Server Clustering" in Planning an Exchange Server 2003 Messaging System and with "Deploying Exchange 2003 in a Cluster," in the Exchange Server 2003 Deployment Guide.
Procedure
To specify the failover options for an Exchange Virtual Server On the Failover tab in the Exchange Virtual Server's Properties dialog box, type a value for the Threshold and Period options. Failover tab in the Properties dialog box for an Exchange Virtual Server
272
The state of the Exchange database and logs at the time of startup or shutdown affects failover performance. For example, if Exchange databases were shut down abruptly, there may be lots of log files to roll through before starting the Exchange databases on the new Exchange Virtual Server. Generally, the greater the number of Exchange databases on your Exchange Virtual Server, the longer it takes to move resources to the new Exchange Virtual Server.
Number of storage groups and databases on your servers Number of service connections into the Exchange store
The Exchange store performs cleanup routines before it releases and allows failover to occur. An unloaded server that takes 100 seconds to fail over takes 120 seconds to fail over when that server has 3,000 simultaneous Microsoft Office Outlook Web Access or Microsoft Outlook connections.
273
Factor Description
If the SMTP queue size is greater than 1,000 messages, the time to fail over from one cluster node to another can be significant. You can modify this setting by creating and configuring the SMTP Max Handle Threshold registry key value:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\SMTPSVC\Queuing \MsgHandleThreshold
For more information about creating and configuring this registry key, see the procedure following this table.
274 Caution Incorrectly editing the registry can cause serious problems that may require you to reinstall your operating system. Problems resulting from editing the registry incorrectly may not be able to be resolved. Before editing the registry, back up any valuable data.
Procedure
To add the MsgHandleThreshold registry key value 1. Start Registry Editor. 2. In the console tree, navigate to the following registry key:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\ SMTPSVC
3. In the console tree, right-click SMTPSVC, point to New, and then click Key. 4. For the key name, type Queuing. 5. Right-click Queuing, point to New, and then click DWORD Value. 6. In the details pane, type MsgHandleThreshold for the registry key value. 7. Right-click MsgHandleThreshold, and then click Modify. 8. Under Base, click Decimal. 9. Enter a value based on the following: To configure your cluster for optimum failover performance, set the value to 1,000. For optimum run-state performance, set the value to 10,000.
275 automatically (the default), or allowing failback to occur automatically. For detailed instructions, see How to Specify the Failback Options for an Exchange Virtual Server Using Cluster Administrator. Failback tab in the Properties dialog box for an Exchange Virtual Server
Preventing Failback If you do not allow an Exchange Virtual Server to fail back, an administrator must intervene and manually move the server back to the original, preferred node. This may be your preferred setting because it allows you to control when the failback occurs. For example, you may want to select Prevent failback if you want to take time to troubleshoot or run diagnostics on the failed node before allowing the node to take ownership of the Exchange Virtual Server again.
276 You can also use this setting to minimize downtime for users. For example, consider a scenario where a failover that occurs at 3:00 P.M. causes EVS1 to move from Node 1 to Node 4 (the stand-by node). By preventing failback, you can wait until the end of the work day to manually move EVS1 back to Node 1, and users do not have to experience downtime waiting for the server to come back online after the move. Allowing Failback By allowing an Exchange Virtual Server to fail back to the preferred node automatically, you can also specify when this failback should occur: either immediately or during a specified time interval. This is the preferred setting if you want to have Cluster Service manage the cluster without any manual administrator intervention.
How to Specify the Failback Options for an Exchange Virtual Server Using Cluster Administrator
This procedure outlines how to specify failback options for an Exchange Virtual Server. When used in conjunction with the Failover tab, the Failback tab helps define what occurs during a failover. You have the option of using the default setting that prevents failback from occurring automatically, or allowing failback to occur automatically.
277 Also, make sure that you are familiar with "Using Server Clustering" in Planning an Exchange Server 2003 Messaging System and with "Deploying Exchange 2003 in a Cluster," in the Exchange Server 2003 Deployment Guide.
Procedure
To specify the failback options for an Exchange Virtual Server 1. On a computer that is running Cluster Administrator, click Start, point to Programs, point to Administrative Tools, and then click Cluster Administrator. 2. In the console tree, right-click the Exchange Virtual Server that you want to configure, and then click Properties. 3. On the Failback tab in the Exchange Virtual Server's Properties dialog box, select the failback options for the server. Failback tab in the Properties dialog box for an Exchange Virtual Server
278
279 has all the default Exchange resources. Because the CORP-MSG-01 server is the first Exchange Virtual Server in this cluster, this server also has an MTA resource. Exchange resources for the CORP-MSG-01 Exchange Virtual Server
To change the configuration for an Exchange cluster resource, you use the property settings that are associated with the resource. These property settings instruct Cluster Service in how to manage the resource. For detailed instructions, see How to Access the Properties of an Exchange Cluster Resource Using Cluster Administrator. For information on How to Change the IP Address of an Exchange Virtual Server, see How to Change the IP Address of an Exchange Virtual Server.
280
How to Access the Properties of an Exchange Cluster Resource Using Cluster Administrator
Like the configuration settings for your Exchange Virtual Servers, the default configuration settings for the Exchange resources (instances of Exchange services) that are associated with each server allow your cluster to work adequately. However, there may be specific settings that you want to adjust, based upon your Exchange environment. This procedure outlines how to access the properties of an Exchange cluster resource.
Procedure
To access the properties of an Exchange cluster resource 1. In Cluster Administrator, in the console tree, click the Exchange Virtual Server that contains the resource that you want to configure.
281 2. In the details pane, right-click the resource that you want to configure, and then click Properties.
Procedure
To change the IP address of an Exchange Virtual Server 1. Failover all resources to Node1 and take them offline. To do this: a. Log on to Node1 using an account with Administrator privileges. b. Open Cluster Administrator. c. Move all resource groups to Node1 using the Move Group context menu item for each resource group.
d. Right click all resource groups and take them offline. 2. Change the startup type for the Cluster Service to manual. To do this: a. Logon to Node1. b. Open the Services snap-in. c. Double-click the Cluster Service and change the Startup type to Manual.
282 3. Power off both nodes, one at a time, and perform the physical relocation. 4. Change the IP addresses of Node1 and Node2 upon arrival to the new physical location. To do this: a. Power on Node1. b. Log on to Node1 using an account with Administrator privileges. c. Click Start, point to Control Panel, and click Network Connections.
d. Right-click the local area connection that you want to modify and then click Properties. e. Click Internet Protocol (TCP/IP), and then click Properties. The Internet Protocol (TCP/IP) Properties dialog box appears. f. Change the IP address accordingly.
g. Power on Node2 and repeat steps 4b-4f. 5. Change the cluster IP address. To do this: a. On Node1, click Start, and then click Run. In the Open box, type and then press ENTER. b. When you receive the prompt for the cluster name, enter a period "." (without the quotes), and then click Open. c. Take the cluster IP address resource offline.
d. Change the cluster IP address resource using Cluster Administrator and bring the cluster IP address resource online. e. Power on Node2 and test failover the Cluster Group. Note If the subnet mask is changed, Public(1) may appear as a network in Cluster Administrator. When both nodes agree on the subnets, the Public network disappears and the Public(1) network is created. You can rename the network Public(1) to Public. 1. Change the Exchange Virtual Server's IP address. To do this: a. Open Cluster Administrator and double-click each IP Address resource (cluster IP address resource and Exchange virtual server IP address resource) to open its properties. b. On the Parameters tab of each IP Address resource properties, make sure
283 that the Network to Use box contains Public as the network to use. c. Open Exchange System Manager.
d. Locate the Protocols area under the Exchange Virtual Server that you want to modify. Expand the HTTP, IMAP4, SMTP, and POP3 virtual servers. e. Open the properties of each virtual server, and then verify the IP address in the advanced properties at General tab. If necessary, change to the new Exchange virtual server IP address. f. Bring the Exchange resources online and verify connectivity to the Exchange virtual server from a client workstation.
2. Test failover and change the Cluster service startup type to automatic. To do this: a. Open Cluster Administrator and failover each resource group a few times. b. Open the Services snap-in. c. Double-click the Cluster Service and change the Startup type to Automatic.
284 General tab in the Properties dialog box for the Exchange Information Store Instance resource
However, you can specify a single node as a possible owner. Although having a single node as a possible owner disables failover for the specified Exchange resource, you still may want to specify a single owner if: The other nodes cannot handle the resource. Maintaining performance is more important than keeping the resource available. You want to control Exchange Virtual Server failover scenarios effectively.
The nodes that you list as possible owners of a resource limit where the Exchange Virtual Server can run. If all the resources on an Exchange Virtual Server have the same possible owners, the server can run on any of the listed nodes. If one of the resources cannot list a node, the Exchange Virtual Server cannot run on that node, even if all the remaining resources list the node as a possible owner. For detailed instructions, see,
285 How to Specify the Possible Owners for an Exchange Resource Using Cluster Administrator.
How to Specify the Possible Owners for an Exchange Resource Using Cluster Administrator
You can specify the nodes that can run an Exchange resource. Generally, it is a good idea to specify all nodes in the cluster as possible owners for a resource. This approach enables failover for that resource. This procedure outlines how to specify the possible owners for an Exchange resource using Cluster Administrator.
Procedure
To specify the possible owners for an Exchange resource On the General tab (see the following figure) in the resource's Properties dialog
286 box, under Possible owners, click Modify, and then specify the nodes that you want to be possible owners for this resource. General tab in the Properties dialog box for the Exchange Information Store Instance resource
287 not recommended, you may want to change this default setting on the General tab and run an Exchange resource in a separate resource monitor when you troubleshoot this cluster resource. For detailed instructions, see How to Run an Exchange Resource in a Separate Resource Monitor Using Cluster Administrator. For more information about the preferred ways of troubleshooting cluster resources, search for "troubleshoot cluster resources" in the Microsoft Product Support Knowledge Base (http://go.microsoft.com/fwlink/?LinkId=18175).
How to Run an Exchange Resource in a Separate Resource Monitor Using Cluster Administrator
By default, an Exchange resource runs in the same resource monitor as the other Exchange resources that are associated with an Exchange Virtual Server. Note Although it is not recommended, you may want to change this default setting on the General tab and run an Exchange resource in a separate resource monitor when you troubleshoot this cluster resource. For more information about the preferred ways of troubleshooting cluster resources, search for "troubleshoot cluster resources" in the Microsoft Product Support Knowledge Base (http://go.microsoft.com/fwlink/?LinkId=18175). This procedure outlines how to run an Exchange resource monitor in a separate resource monitor.
288 Note Before performing the cluster administration tasks outlined in this chapter, you must be familiar with the clustering concepts described in "Checklist: Preparation for installing a cluster" in the Microsoft Windows Server 2003 Enterprise Edition Online Help and in the Windows Server 2003 Technical Reference. Also, make sure that you are familiar with "Using Server Clustering" in Planning an Exchange Server 2003 Messaging System and with "Deploying Exchange 2003 in a Cluster," in the Exchange Server 2003 Deployment Guide.
Procedure
To run an Exchange resource in a separate resource monitor 1. In Cluster Administrator, in the console tree, click the Exchange Virtual Server that contains the resource that you want to configure. 2. In the details pane, right-click the resource that you want to configure, and then click Properties. 3. On the General tab in the resource's Properties dialog box, select Run this resource in a separate Resource Monitor.
System Attendant
Network name resource and shared disk resources Exchange System Attendant Exchange System Attendant Exchange System Attendant Exchange System Attendant Exchange System Attendant Exchange System Attendant Exchange System Attendant Exchange System Attendant
Exchange store SMTP IMAP4 POP3 HTTP Exchange Microsoft Search Instance MTA Routing service
Note Other than to add disk resource dependencies, altering dependencies is not recommended because it can adversely affect your system.
290
How to Make the Exchange System Attendant Dependent on a New Disk Resource
Before an Exchange resource can be brought online, there are frequently other Exchange resources that must be brought online before it. This requirement is known as a resource dependency. For more information, see Understanding Resource Dependencies. If you are adding disk resources to an Exchange Virtual Server, you must make sure that the Exchange System Attendant resource depends on the new disk resource. This procedure outlines how to make the Exchange System Attendant dependent on a new disk resource.
Procedure
To make the Exchange System Attendant dependent on a new disk resource 1. On the Dependencies tab, in the Exchange System Attendant Properties dialog box, click Modify. Dependencies tab of the Exchange System Attendant Properties dialog box
291
2. In the Modify Dependencies dialog box, in the Available resources list, doubleclick the disk that you want to add, and then click OK. Dependencies for the Exchange System Attendant
292
293 check box for those resources. For non-required resources (for example, POP3) that affect only several users, you may not want to fail over the server when that resource fails, and you would therefore clear the Affect the group check box for that resource. Advanced tab for an instance of the Exchange store
294
How to Adjust the Restart Options for an Exchange Resource Using Cluster Administrator
By default, when a resource experiences a failure, Cluster Service tries to restart the resource three times before trying to move the Exchange Virtual Server to another node. Note It is strongly recommended that you keep this default option because restarting a service may correct a problem that the node is experiencing. Also, restarting a service takes much less time than moving an Exchange Virtual Server to another node. However, there are additional restart options that you might want to adjust such as how many restarts are allowed before the resource fails and whether a resource failure causes a failover. This procedure outlines how to adjust the restart options for an Exchange resource.
295
Procedure
To adjust the restart options for an Exchange resource 1. In Cluster Administrator, in the console tree, click the Exchange Virtual Server that contains the resource that you want to configure. 2. In the details pane, right-click the resource that you want to configure, and then click Properties. 3. On the Advanced tab, in the resource's Properties dialog box, select the restart options for the server. Advanced tab for an instance of the Exchange store
296
297
How to Change the Length of Time That a Resource Remains Pending Before Failing Using Cluster Administrator
By default, Cluster Service allows a resource to be in a pending state (online pending or offline pending) for only 180 seconds (3 minutes) before Cluster Service terminates the resource, and the resource enters a failed state. Because of the way that the Exchange store writes log files to an Exchange database, the Exchange store for which you might want to increase the Pending timeout period. Increasing the pending time-out period allows the store more time to shut down correctly. This procedure outlines how to change the length of time that a resource remains pending before failing.
298
Procedure
To change the length of time that a resource remains pending before failing 1. In Cluster Administrator, in the console tree, click the Exchange Virtual Server that contains the resource that you want to configure. 2. In the details pane, right-click the resource that you want to configure, and then click Properties. 3. On the Advanced tab in the resource's Properties dialog box, type a value in seconds for Pending timeout.
299
How to View the Exchange Virtual Server That Is Used to Connect the Protocol Resource Using Cluster Administrator
Exchange automatically selects the Exchange Virtual Server that is used to connect the protocol resource to the cluster. This procedure outlines how to view the Exchange Virtual Server that is used to connect the protocol resource.
Procedure
To view the Exchange Virtual Server that is used to connect the protocol resource On the Parameters tab of the resource's Properties dialog box, view the Server Instance option. Parameters tab of an instance of the Exchange HTTP resource
300
Note You might not have to modify the Server Instance option.
301 You take Exchange Virtual Servers and Exchange resources offline the same way you do with cluster groups and Windows resources. For detailed instructions, see How to Take an Exchange Virtual Server or Exchange Resource Offline Using Cluster Administrator. Besides being online or offline, Exchange Virtual Servers and Exchange resources can be in other states. The following tables list the various states that are possible for Exchange Virtual Servers and Exchange cluster resources, respectively. Description of Exchange Virtual Server states
Group state Description
Failed
One or more resources in the Exchange Virtual Server cannot be brought online or offline in the allowed time. All resources in the Exchange Virtual Server are online. All resources in the Exchange Virtual Server are offline. One or more resources in the Exchange Virtual Server are online, and one or more are offline. One or more resources in the Exchange Virtual Server are Online Pending or Offline Pending. The state of the whole Exchange Virtual Server cannot be determined.
Online
Offline
Partially Online
Pending
Unknown
Failed
The resource cannot be brought online or offline in the allowed time. The resource is online. The resource is offline. The resource is Online Pending or Offline Pending.
302
Resource state Description
Unknown
How to Take an Exchange Virtual Server or Exchange Resource Offline Using Cluster Administrator
Occasionally, you must take an Exchange Virtual Server or resource offline. For example, you might have to apply a service pack. In that case, you would take each Exchange Virtual Server offline, and apply the service pack to the associated node. This procedure outlines how to take an Exchange Virtual Server or Exchange resource offline.
303
Procedure
To take an Exchange Virtual Server or Exchange resource offline In Cluster Administrator, right-click the Exchange Virtual Server or Exchange resource that you want to take offline, and then click Take Offline. Important Taking an Exchange Virtual Server or Exchange resource offline stops client connectivity to user mailboxes.
304
How to Add an IMAP4 or POP3 Virtual Server as a Resource to an Exchange Virtual Server
For improved security, by default, the Windows IMAP4 and POP3 protocol services are no longer enabled on servers that are running Windows Server 2003. Similarly, by default, the IMAP4 and POP3 protocol resources are no longer created upon creation of an Exchange 2003 virtual server. This procedure outlines how to add an IMAP4 or POP3 virtual server as a resource to an Exchange Virtual Server.
Before you start managing your Exchange cluster, you may want to review what constitutes an Exchange Virtual Server and its associated Exchange resources. You may also want to become more familiar with Cluster Administratorthe primary tool used to configure and manage clusters. Note Before performing the cluster administration tasks outlined in this chapter, you must be familiar with the clustering concepts described in "Checklist: Preparation for installing a cluster" in the Microsoft Windows Server 2003 Enterprise Edition Online Help and in the Windows Server 2003 Technical Reference.
305 Also, make sure that you are familiar with "Using Server Clustering" in Planning an Exchange Server 2003 Messaging System and with "Deploying Exchange 2003 in a Cluster" in the Exchange Server 2003 Deployment Guide.
Procedure
To add an IMAP4 or POP3 virtual server as a resource to an Exchange Virtual Server 1. In Cluster Administrator, right-click the Exchange Virtual Server to which you want to enable IMAP4 or POP3, point to New, and then click Resource. 2. In the New Resource dialog box, do the following: a. In Name, type either one of the following names: If you are adding the IMAP4 resource, type Exchange IMAP4 Virtual Server - (<EVSName>), where EVSName is the name of the selected Exchange Virtual Server. If you are adding the POP3 resource, type Exchange POP3 Virtual Server (<EVSName>), where EVSName is the name of the selected Exchange Virtual Server.
a. In the Resource Type drop-down list, click one of the following options: If you are adding the IMAP4 resource, click Microsoft Exchange IMAP4 Server Instance. If you are adding the POP3 resource, click Microsoft Exchange POP3 Server Instance.
a. Verify that the Group drop-down list contains the name of the selected Exchange Virtual Server, and then click Next. 3. In the Possible Owners dialog box (see the following figure ), verify that all nodes appear in the Possible owners list, and then click Next. Possible Owners dialog box for an IMAP4 Virtual Server Instance
306
4. In the Dependencies dialog box, under Available Resources, double-click the <System Attendant Resource Name> to add the System Attendant to the Resource dependencies list, and then click Next. 5. In the Virtual Server Instance dialog box, in the Server Instance list, select the IMAP4 or POP3 virtual server for the resource, and then click Finish. a. In Cluster Administrator, right-click the IMAP4 or POP3 resource, and then click Bring Online.
307
Adding a Node
Sometimes you might want to add a node to an existing Exchange cluster. For example, you may decide that you want to upgrade your existing 3-node, 2-active/1-passive configuration to a 4-node, 2-active/2-passive configuration. To add a node, you must install Exchange 2003 on the node. For information about installing Exchange 2003 on a cluster node, see "Deploying Exchange Server 2003 in a Cluster" in the Exchange Server 2003 Deployment Guide. After installing Exchange on the new node in the cluster, consider these settings: Preferred ownership of your Exchange Virtual Servers By default, the new node is not a preferred owner of any Exchange Virtual Server. Therefore, if you want the new node to be listed as a preferred owner you must change the properties on the respective Exchange Virtual Server in Cluster Administrator. Possible ownership of the Exchange resources in an Exchange Virtual Server By default, the new node that you created is added as a possible owner for all the resources for the Exchange Virtual Servers in your cluster. If you do not want the new node to be a possible owner for any of the resources in the Exchange Virtual Servers in your cluster, remove that node from the list of possible owners in Cluster Administrator.
308 For information about how to create an Exchange Virtual Server during deployment, see "Deploying Exchange Server 2003 in a Cluster" in the Exchange Server 2003 Deployment Guide. While you are performing this procedure, you can configure preferred ownership for the Exchange Virtual Server, and also possible ownership for the Exchange resources of that Exchange Virtual Server: Preferred ownership of your Exchange Virtual Servers By default, you do not have to choose a preferred owner when you create a new Exchange Virtual Server. However, if you want to enforce a preferred order in which the Exchange Virtual Server fails over, you can do so. Possible ownership of the Exchange resources in an Exchange Virtual Server When you create an Exchange Virtual Server, the default option is to list all cluster nodes that have Exchange installed as possible owners of the resources. However, you do not have to accept this default setting, and you can customize which nodes can be possible owners for the resources of your new Exchange Virtual Server.
Regardless of your reasons for removing an Exchange Virtual Server, you must consider the requirements shown in the following table before removing that server.
You must remove all other Exchange Virtual Servers before removing the Exchange Virtual Server that owns the MTA resource. The first Exchange Virtual Server created in a cluster owns the MTA resource. All other Exchange Virtual Servers in the cluster depend on this resource. Therefore, the Exchange Virtual Server that owns the MTA resource cannot be removed first.
You must make another Exchange Virtual Server the routing master of that group before removing the server. You must move the postmaster account to another Exchange Virtual Server before removing the server. You must move the contents of that public store to a public store on a different Exchange Virtual Server. You must make another Exchange Virtual Server the owner of the Recipient Update Service. You must designate another server as the bridgehead server before removing the Exchange Virtual Server.
Is the home for the last public store in a mixed-mode administrative group
After you have performed any necessary actions listed in the table to make sure that the Exchange Virtual Server can be removed, you can then remove that server. To remove a single Exchange Virtual Server from a cluster, perform the following steps. For detailed instructions, see How to Remove an Exchange Virtual Server from an Exchange Cluster. 1. Backing up critical data and securing resources hosted by the Exchange Virtual Server.
310 Note For information about how to back up Exchange data, see Disaster Recovery for Microsoft Exchange 2000 Server. 2. Moving all mailboxes and public folder content to another Exchange Virtual Server. 3. Taking the Exchange System Attendant resource offline. 4. Removing the Exchange Virtual Server. 5. Deleting remaining cluster resources. Important Deleting components of an Exchange Virtual Server without removing the whole server can cause interruptions in mail flow. Therefore, it is recommended that you follow all the steps in the procedure when removing an Exchange Virtual Server from a cluster.
This procedure outlines to remove an Exchange Virtual Server Exchange Virtual Server from an Exchange cluster.
311 Before you start managing your Exchange cluster, you may want to review what constitutes an Exchange Virtual Server and its associated Exchange resources. You may also want to become more familiar with Cluster Administratorthe primary tool used to configure and manage clusters. Note Before performing the cluster administration tasks outlined in this chapter, you must be familiar with the clustering concepts described in "Checklist: Preparation for installing a cluster" in the Microsoft Windows Server 2003 Enterprise Edition Online Help and in the Windows Server 2003 Technical Reference. Also, make sure that you are familiar with "Using Server Clustering" in Planning an Exchange Server 2003 Messaging System and with "Deploying Exchange 2003 in a Cluster" in the Exchange Server 2003 Deployment Guide.
Procedure
To remove a single Exchange Virtual Server from a cluster 1. Back up critical data and secure resources hosted by the Exchange Virtual Server. Note For information about how to back up Exchange data, see Disaster Recovery for Microsoft Exchange 2000 Server. 2. Move all mailboxes and public folder content to another Exchange Virtual Server. For detailed steps, see How to Move Mailboxes from One Exchange Virtual Server to Another Server and How to Move Public Folder Content from One Exchange Virtual Server to Another Server. 3. Take the Exchange System Attendant resource offline. For detailed information, see How to Take the Exchange System Attendant Resource Offline. 4. Remove the Exchange Virtual Server. For detailed information, see How to Remove an Exchange Virtual Server Using Cluster Administrator. 5. Delete remaining cluster resources. For detailed information, see How to Delete the Remaining Resources After Removing an Exchange Virtual Server. Important Deleting components of an Exchange Virtual Server without removing the whole server can cause interruptions in mail flow. Therefore, it is
312 recommended that you follow all the steps in the procedure when you remove an Exchange Virtual Server from a cluster.
313
How to Move Mailboxes from One Exchange Virtual Server to Another Server
The following procedure describes how to move mailboxes. You can move mailboxes using Exchange System Manager. You can also move mailboxes using Active Directory Users and Computers. To do so, In Active Directory Users and Computers, right-click the user object, click Exchange Tasks, and then click Move Mailbox. New in SP1 You can now move mailboxes across administrative groups in mixed mode. Before moving a mailbox across administrative groups, consider the implications. For more information about the implications, see the Exchange Server 2003 Deployment Guide.
Procedure
To move mailboxes 1. Click Start, point to All Programs, point to Microsoft Exchange, and then click System Manager. 2. In the console tree, expand Servers, expand the server from which you want to move mailboxes, expand First Storage Group, expand Mailbox Store, and then click Mailboxes. 3. In the details pane, right-click the user or users whose mailboxes you want to move, and then click Exchange Tasks. 4. On the Welcome to the Exchange Task Wizard page, click Next. 5. On the Available Tasks page, click Move Mailbox, and then click Next. If you are running versions of Exchange that are earlier than Exchange Server 2003 SP1, go to step 7. Otherwise, select whether you are moving the mailbox to a store in the same administrative group, or across administrative groups. Then, click Next. The next screen provides any applicable warnings or caveats. When you are
314 finished reading, click Next. 6. On the Move Mailbox page, to specify the new destination for the mailbox, in the Server list, select a server, and then, in the Mailbox Store list, select a mailbox store. Then click Next. 7. Under If corrupted messages are found, click the option you want, and then click Next. Caution If you decide to skip corrupted items, these items are lost permanently when the mailbox is moved. To avoid data loss, back up the source database before moving mailboxes. 8. On the Task Schedule page, in the Begin processing tasks at list, select the date and time for the move. If you want to cancel any unfinished moves at a certain time, in the Cancel tasks that are still running after list, select the date and time. Click Next to start the process. 9. On the Completing the Exchange Task Wizard page, verify that the information is correct, and then click Finish. Note You can run multiple instances of the Move Mailbox wizard.
How to Move Public Folder Content from One Exchange Virtual Server to Another Server
This procedure describes how to move public folder content from one Exchange Virtual Server to another server.
315
Procedure
To move public folder content from one server to another In your Internet browser, open Microsoft Knowledge Base article 288150, "XADM: How to Rehome Public Folders in Exchange 2000," and follow the instructions.
316
Procedure
To take the Exchange System Attendant resource offline 1. In Cluster Administrator, select the Exchange Virtual Server that you want to remove. 2. In the details pane, right-click System Attendant resource, and then click Take Offline.
317
Procedure
To remove an Exchange Virtual Server using Cluster Administrator 1. In Cluster Administrator, in the console tree, select Groups. 2. In the details pane, right-click the Exchange Virtual Server that you want to remove, and then click Remove Exchange Virtual Server.
318 3. In the Microsoft Exchange Cluster Administrator Extension dialog box, click Yes to delete the Exchange Virtual Server and all resources that are either directly or indirectly dependent on the Exchange System Attendant resource. Warning when removing an Exchange Virtual Server
Clicking Yes also removes the Exchange Virtual Server information from Active Directory; the physical disk, the IP Address, and Network Name resources remain.
319 If you want to completely remove the Exchange 2003 installation, see "Removing Exchange 2003 from a Cluster Node."
How to Delete the Remaining Resources After Removing an Exchange Virtual Server
After you delete the Exchange resources of your Exchange Virtual Server, you must manually remove the Windows resources, including the IP Address and Network Name resources. This procedure describes how to delete the remaining resources after removing an Exchange Virtual Server.
Procedure
To delete the remaining resources after removing an Exchange Virtual Server 1. In Cluster Administrator, select the cluster group that contains the Exchange
320 Virtual Server that you just deleted. 2. In the details pane, right-click IP Address resource, and then click Take Offline. 3. Right-click IP Address resource again, and then click Delete. 4. In the Delete Resources dialog box, click Yes. This deletes both the IP Address and Network Name resources. 5. Move the Physical Disk resource by dragging it to another group that is owned by this node. 6. Delete the cluster group by right-clicking the group in the console tree, and then selecting Delete.
321
Before you start managing your Exchange cluster, you may want to review what constitutes an Exchange Virtual Server and its associated Exchange resources. You may also want to become more familiar with Cluster Administratorthe primary tool used to configure and manage clusters. Note Before performing the cluster administration tasks outlined in this chapter, you must be familiar with the clustering concepts described in "Checklist: Preparation for installing a cluster" in the Microsoft Windows Server 2003 Enterprise Edition Online Help and in the Windows Server 2003 Technical Reference. Also, make sure that you are familiar with "Using Server Clustering" in Planning an Exchange Server 2003 Messaging System and with "Deploying Exchange 2003 in a Cluster" in the Exchange Server 2003 Deployment Guide.
322
Procedure
To remove Exchange 2003 from a node 1. In Control Panel, open Add/Remove Programs. 2. In the Currently Installed Programs list, select Microsoft Exchange 2003. 3. Click Change/Remove. 4. In the Welcome dialog box, click Next. 5. In the Component Selection dialog box, make sure that the action next to Microsoft Exchange 2003 is Remove, and then click Next. 6. In the Component Summary dialog box, verify your installation selections, and then click Next. 7. In the Microsoft Exchange 2003 Installation Wizard dialog box (see the following figure), click Yes if you are removing the last node in the cluster, or click No if it is not the last node. Warning when removing Exchange 2003 from a cluster
If you remove Exchange from the last node in the cluster, Exchange Setup removes Exchange cluster resource types from the cluster. 8. In the Completion dialog box, click Finish.
323
324
325
However, there are several disadvantages to filling a storage group with databases before creating another storage group: Only one backup process can occur in a single storage group at a time. Backing up one database in a storage group stops the online maintenance of all other databases in the storage group. The ability to configure circular logging (a feature that automatically deletes log files that are older than a specified checkpoint) for a specific set of user's mailboxes is minimized. This is because you enable circular logging for the storage group, not for individual databases. If all your databases are in a single storage group, circular logging either applies to all the databases or none of them. If you want to apply circular logging to only several databases, you must create a new storage group, add
326 the appropriate databases to the new storage group, and then apply circular logging to the new storage group. For more information about circular logging, see Disaster Recovery for Microsoft Exchange 2000 Server.
Displays the size (in bytes) of the largest free block of virtual memory. This counter displays a line that slopes down while virtual memory is consumed. Monitor this counter to make sure that it stays above 32 megabytes (MB). When this counter decreases to below 32 MB, Exchange 2003 logs a warning (Event ID=9582) in the event log. When this counter drops below 16 MB, Exchange logs an error.
Displays the total number of free virtual memory blocks that are greater than or equal to 16 MB. This counter displays a line that may first increase, but then may eventually fall when free memory becomes more fragmented. It starts by displaying several large blocks of virtual memory and may progress to displaying a greater number of separate, smaller blocks. When these blocks become smaller than 16 MB, the line begins to fall. To predict when the number of 16 MB blocks is likely to drop below 3, monitor the trend on this counter. If the number of blocks drops below 3, restart all the services on the node.
328
Virtual memory counter Description
Displays the total number of free virtual memory blocks, regardless of size. This counter displays a line that may first increase, but then may eventually fall, when free memory first becomes fragmented into smaller blocks, and then when these blocks are consumed. Use this counter to measure how much available virtual memory is being fragmented. The average block size is the Process\Virtual Bytes\STORE instance divided by MSExchangeIS\VM Total Free Blocks.
Displays the sum, in bytes, of all the free virtual memory blocks that are greater than or equal to 16 MB. This counter displays a line that slopes down when memory is consumed.
Important The task to update the virtual memory performance counters for the Exchange store does not run until at least one Exchange Virtual Server starts on the node. Therefore, in active/passive cluster scenarios, all Exchange-related virtual memory performance counters are zero (0) on a passive node. These performance counters are zero because the store on the passive node is either not going to be running or the databases will not be mounted. Note Therefore, having performance counters set to zero may interfere with your virtual memory performance baseline. Therefore, when monitoring these performance counters, you can expect large, free virtual memory numbers on the passive nodes. When you monitor the virtual memory counters, the most important counter to monitor is VM Total Large Free Block Bytes, which should always be more than 32 MB. If a node
329 in the cluster drops below 32 MB, fail over the Exchange Virtual Servers, restart all the services on the node, and then fail back the Exchange Virtual Servers. The Exchange store logs the following events if the virtual memory for your Exchange 2003 server becomes excessively fragmented: Warning logged if the largest free block is smaller than 32
EventID=9582 Severity=Warning Facility=Perfmon Language=English The virtual memory necessary to run your Exchange server is fragmented in such a way that performance may be affected. It is highly recommended that you restart all Exchange services to correct this issue.
330 Before enabling logging on an Exchange cluster, disable MTA monitoring on all servers that do not have MTA installed. Then, you can enable SMTP logging on the selected servers.
331 of a cluster. This procedure describes how to disable MTA monitoring on an Exchange Virtual Server.
Procedure
To disable MTA monitoring on an Exchange Virtual Server 1. In Exchange System Manager, in the console tree, expand Servers, right-click the appropriate Exchange Virtual Server, and then click Properties. 2. In the <Server Name> Properties dialog box, click the Monitoring tab. 3. On the Monitoring tab, select Default Microsoft Exchange Services from the list of services, and then click Details. 4. In the Default Microsoft Exchange Services dialog box, select Microsoft Exchange MTA Stacks, and then click Remove. 5. Click OK two times.
332
How to Enable SMTP Logging and Log the Files to a Shared Disk
If you want to gather statistical data about server usage, you can enable logging of the SMTP resource. However, be aware that enabling SMTP logging reduces Exchange performance. Unless you are troubleshooting or need statistical data, disable logging, which is the default setting. This procedure describes how to enable SMTP logging and log the files to a shared disk.
333
Procedure
To enable SMTP logging and log the files to a shared disk 1. In Exchange System Manager, in the console tree, expand Servers, and then expand the server on which you want to enable IIS logging for SMTP. 2. In the console tree, expand Protocols, and then expand SMTP. 3. In the console tree, right-click Default SMTP Virtual Server, and then click Properties. 4. In the Default SMTP Virtual Server Properties dialog box, on the General tab, click Enable logging, and then click Properties. 5. In the Extended Logging Properties dialog box, on the General Properties tab, in Log file directory, change the SMTP log file location to a folder on a shared disk. 6. Click OK two times.
334
335
For additional information about the /Userva switch, see Microsoft Knowledge Base article 810371, "Using the /Userva switch on Windows Server 2003-based computers that are running Exchange ServerUsing the /Userva switch on Windows Server 2003-based computers that are running Exchange Server."
336
Turn on and configure verbose logging for Cluster Service While server clusters log errors and events to the System Event log, you can perform advanced troubleshooting by having the Cluster Service perform verbose logging to a text file named Cluster.log. For information about this log and how to enable it, see Microsoft Knowledge Base Article 168801, "How to Turn On Cluster Logging in Microsoft Cluster ServerHow to Turn On Cluster Logging in Microsoft Cluster Server." Search for resolutions in the Microsoft Product Support Knowledge Base (http://go.microsoft.com/fwlink/?LinkId=18175) Many cluster-related Knowledge Base articles that apply to Exchange 2000 also apply to Exchange 2003. Therefore, search the Knowledge Base for cluster information related to Exchange 2000 and also Exchange 2003.
338 If you still cannot determine the cause of the failure, you can perform the repair options listed in "Repairing Windows 2000" in Chapter 7, "Repairing Exchange 2000" in Disaster Recovery for Microsoft Exchange 2000 Server. If repairing the node or whole cluster is unsuccessful, you must consider replacing the node or recovering the node, cluster, or resources (such as the quorum disk resource, or Exchange mailbox and public folder stores).
339 party backup solutions to meet your backup needs. For information about third-party backup solutions, see the "Exchange Server Partner Products" Web site. To secure the data in your clusters, you must do the following: Back up Windows in each cluster node. Back up the quorum disk resource of each cluster. Back up all Exchange databases on your shared disk resources. Maintain informational records about your cluster configuration.
340
Note For detailed information about the internal workings of the stores, and for detailed backup and recovery procedures, see Disaster Recovery for Microsoft Exchange 2000 Server. Although existing recovery functionality has not changed, Microsoft Exchange Server 2003 has new recovery features. For more information about the new features, see What's New in Exchange Server 2003What's New in Exchange Server 2003.
341
342
Full Control Additional permissions in Active Directory to allow you to work with deleted items and offline address lists
Receive-As Send-As
Exchange Administrator
All except Change Permissions Additional permissions in Active Directory to allow you to work with offline address lists
Receive-As Send-As
343
Role Allowed Denied
None
The following figure summarizes how mailbox stores, public folder stores, and public folder trees inherit permissions. Direction of inheritance of permissions for Exchange Full Administrators, Exchange Administrators, or Exchange View Only Administrators
As Figure 7.1 shows, objects in the Exchange store inherit permissions from their administrative group, with the following exceptions: Delegating Exchange administrative roles on an administrative group gives administrators in those roles limited permissions on mailboxesenough to create or delete mailboxes, and set options such as storage limits. A public folder inherits some administrative permissions from the public folder tree where it resides. It does not inherit permissions from the public folder store. Administrative rights on a public folder include many folder-specific permissions that are not available on the public folder tree. For example, although an Exchange
344 Administrator cannot modify the permissions on a public folder tree, the administrator can modify permissions on a public folder in that tree. Note For an administrator to apply a system policy to a store, the administrator must have the appropriate permissions on both the System Policies container and on the target store. If you are using a distributed administration model with multiple administrative groups that have separate administrators, each administrator will be able to interact only with the stores in that administrator's own administrative group. Important Public folder trees and their public folders can only be administered in the administrative group where they were created, even though you can replicate folders in the tree to multiple administrative groups. If you are using a distributed administration model with multiple administrative groups that have separate administrators, each administrator can work with the public folder stores in that administrator's own administrative group, but may not have access to the public folders that those stores support.
Understanding the Types of Permissions That Control Access to Mailboxes and Public Folders
The access control lists (ACLs) on public folders, mailboxes, and the messages that they contain use Microsoft Windows 2000 permissions to control access (with several additional permissions that are specific to Exchange). This is a change from Microsoft Exchange 5.5, in which the ACLs used MAPI permissions. Exchange 2003 substitutes MAPI permissions for Windows 2000 permissions in the following circumstances: When communicating with MAPI-based client applications, such as Microsoft Outlook. In this case, Exchange converts the permissions to MAPI permissions when displaying them to the user. If the user modifies the permissions, Exchange converts them back to Windows 2000 permissions to save them.
345 When replicating data to Exchange 5.5 servers in a deployment that contains coexisting servers that run Exchange 5.5 and servers that run Exchange 2003. Because Exchange 5.5 servers only use MAPI permissions, Exchange 2003 replicates permissions to them in the MAPI format. When the permissions replicate back to Exchange 2003 servers, Exchange 2003 converts them to the Windows 2000 format before saving them. Note Both of these circumstances apply to mailboxes and to public folders in the Public Folders tree (and all the folders and messages contained in it). Folders and messages in general-purpose public folder trees cannot be accessed by MAPI-based clients and are not replicated to Exchange 5.5 servers. Therefore, Exchange always uses Windows 2000 permissions with these folders and messages. For more information about the differences between the Public Folders tree and general-purpose public folder trees, see "Configuring Public Folder Stores." Exchange handles all conversions between Windows 2000 permissions and MAPI permissions automatically. However, as an administrator, be aware that when you use Exchange System Manager to set permissions, you may have to work with either Windows 2000 permissions or MAPI permissions, depending on the type of object you are securing.
346
To give someone access to another user's mailbox, you must have the appropriate permissions to modify user objects in Active Directory (see the Windows Help for more information about these permissions). For detailed steps about how to give a user full access to another user's mailbox, see "How to Give a User Full Access to Another User's Mailbox" in Working with the Exchange Server 2003 Store. For detailed steps about how to give a user the ability to send mail on behalf of another user, see "How to Use Outlook to Give a User the Ability to Send Mail on Your Behalf" and "How to Use Active Directory Users and Computers to Give a User the Ability to Send Mail on Behalf of Another User" in Working with the Exchange Server 2003 Store. In this situation, the second user does not need permissions on the mailbox itself or items in the mailbox.
347
How to Give a User the Ability to Send Mail on Behalf of a Public Folder
To give a user the ability to send mail on behalf of a public folder, perform the following procedure.
Procedure
To give a user the ability to send mail on behalf of a public folder 1. In Exchange System Manager, under Folders, right-click the public folder for which you want to give a user the ability to send mail, and then click Properties. 2. Click Exchange General, and then click Delivery Options. 3. Click Add to specify a user. 4. You may have to make additional modifications if the following conditions are true: The user's mailbox resides in a domain that is different from the public folder's domain. The user's mailbox resides on a server that is located in a site that does not contain any domain controllers for the domain that hosts the public folder.
Use one of the following additional steps: Add the Exchange Domain Servers security group of the child domain with Read permissions to the ACL of the Microsoft Exchange System Objects container in the parent domain. This method is the recommended method for working around this problem.
5. Move one domain controller from the parent domain to the user's Exchange 2003 site.
348
349 Directory rights These settings are normal Active Directory permissions, and control who can change the e-mailrelated attributes of a mail-enabled public folder. Exchange stores these attributes in Active Directory, in the public folder's directory object in the Microsoft Exchange System Objects container. The default directory permissions include extensive permissions for the domain local Administrators group. Typically, any user who you have assigned to one of the Exchange administrative roles is a member of this group. Administrative rights These settings control who can use Exchange System Manager (or a custom administration program) to change the replication, limits, and other settings for a public folder. Some of these permissions are inherited from the public folder store and include permissions for the Exchange administrative roles. These permissions are Windows 2000 permissions, although they reside only in the public folder store.
If you are working with a public folder tree that has multiple levels of public folders, you can modify client permissions or administrative rights for a single folder, and you can use the Propagate Settings command to propagate the changes to all subfolders of that folder. To propagate client permissions, use Propagate Settings with the Folder rights option. To propagate administrative rights, use Propagate Settings with the Administrative rights option.
350 Permissions That Control Client Access to a Public Folder" in Working with Store Permissions in Exchange 2000 and 2003. After clicking Client Permissions, one of two different dialog boxes appears, depending on the type of public folder tree with which you are working: If you are working with a folder in the Public Folders tree, you see a dialog box that contains MAPI permissions and roles. Client Permissions dialog box for a public folder in the Public Folders tree
If you are working with a folder in a general-purpose public folder tree, you see a dialog box that contains Windows 2000 permissions, users, and groups.
351 Permissions dialog box for a public folder in a general-purpose public folder tree
You can also use Exchange System Manager to view the Windows 2000 version of the permissions on a folder in the Public Folders tree. Caution Although you can view the Windows 2000 version of the Public Folders tree permissions, do not try to edit the permissions in this view. The Windows user interface that displays the permissions formats the ACL in such a way that Exchange will no longer be able to convert the permissions to their MAPI form. If this problem occurs, you will no longer be able to use Outlook or the regular Exchange System Manager dialog boxes to edit the permissions.
352 For detailed steps about how to give a user full access to another user's mailbox, see "How to View the Windows 2000 Version of MAPI Permissions" in Working with Store Permissions in Exchange 2000 and 2003.
Special Considerations for Coexisting Exchange 2003 and Exchange 5.5 Servers
If your deployment includes both Exchange 2003 and Exchange 5.5 servers, you have an additional level of complexity to deal with when managing permissions, especially public folder permissions. Although the information that follows is technical, you must know about these details to make sure that your mixed-mode deployment operates smoothly. For a more detailed explanation of how Exchange passes access control information between Exchange 2003 and Exchange 5.5 servers, see Public Folder Permissions in a Mixed-Mode Microsoft Exchange Organization. The important points in the article that relate to managing public folder permissions are the following: Before any data can be replicated between Exchange 2003 and Exchange 5.5 servers, any users or groups that have mailboxes on the Exchange 5.5 servers must have accounts in Active Directory. If the user or group account has only an Active Directory account (not a Microsoft Windows NT 4.0 account), the Active Directory account is an enabledaccount. If the user or group has a Windows NT 4.0 account, the Active Directory account is a disabled account. This disabled account, created using the Active Directory Migration Tool, is a placeholder that associates an Active Directory security identifier (SID) with the existing Windows NT 4.0 account. Important If you plan to maintain user accounts in Windows NT 4.0 for a while and then fully migrate those accounts to Active Directory, you must create disabled accounts that have a SID history. The Active Directory Migration Tool can migrate the Windows NT 4.0 SID into the sidHistory attribute of
353 the newly disabled account in Active Directory. If you enable the accounts at a later date, Exchange can use the SID history information to determine where newly enabled accounts have replaced Windows NT 4.0 accounts in access control entries (ACEs). For more information about this process, see Microsoft Knowledge Base Article 316047, "XADM: Addressing Problems That Are Created When You Enable ADCGenerated Accounts." Exchange 5.5 uses MAPI-based permissions, identifies users and groups by their distinguished names in the Exchange Directory, and uses a property named ptagACLData to store access control information. Exchange 2003 uses two additional properties, ptagNTSD and ptagAdminNTSD, to store access control information. When Exchange 2003 replicates access control information to an Exchange 5.5 server, it does the following: a. Converts the Active Directory security identifiers (SIDs) of users and groups to Exchange Directory distinguished names. b. Converts the Windows 2000 permissions to MAPI permissions. c. Stores the converted access control information in ptagACLData.
d. Replicates ptagNTSD, ptagAdminNTSD, and ptagACLData to the Exchange 5.5 server. When an Exchange 2003 server receives data replicated by an Exchange 5.5 server, it does the following: a. Discards the incoming values of ptagNTSD and ptagAdminNTSD. This step protects against any changes that may have been made to these properties while they were under the control of Exchange 5.5. b. Extracts the user and group distinguished names from ptagACLData and converts them to Active Directory SIDs. c. Extracts the permissions from ptagACLData and converts them to Windows 2000 permissions.
d. Stores the converted access control information in ptagNTSD. (The original value of ptagAdminNTSD remains unaffected.) e. Discards the value of ptagACLData, unless a problem occurred during the conversion in Step b or Step c. If a conversion problem occurs, Exchange 2003 keeps the ptagACLData value.
354 Exchange 5.5 applies permissions to folders. You cannot assign permissions to individual messages (item-level permissions) explicitly, as you can with Exchange 2003. If you are replicating folders and their contents from Exchange 5.5 to Exchange 2003, do not try to set explicit permissions on messages. Exchange 2003 manages permissions so that the messages are secure, but if you try to change the message permissions in this situation, the changes will be lost in the next replication cycle.
355 Note This is a change from Exchange 5.5, where the default role of the Anonymous account was None.
Maintaining the Minimum Permissions Required for Mailbox Stores and Public Folder Stores
If you modify the default permissions on Exchange Server 2003 mailbox stores and public folder stores, make sure you maintain the following minimum permissions: Administrators group Full Control Authenticated Users group Read and Execute, List Folder Contents, and Read Creator Owner None Server Operators group Modify, Read and Execute, List Folder Contents, Read, and Write System account Full Control
You may experience difficulties in mounting the mailbox stores or public folder stores if you do not maintain these permissions for these groups and accounts. The following error messages and events indicate that the accounts and groups in the previous list do not have the correct permissions: An internal processing error has occurred. Try restarting Exchange System Manager or the Microsoft Exchange Information Store service, or both. MAPI or an unspecified service provider. ID no: 00000476-0000-00000000. Information Store (2520) An attempt to determine the minimum I/O block size for the volume "[drive:\]" containing "[drive:\]Exchsrvr\Mdbdata\" failed with system error 5 (0x00000005): "Access is denied." The operation will fail with error 1032 (0xfffffbf8). Error 0xfffffbf8 starting Storage Group [dn of storage group] on the Microsoft Exchange Information Store.
356 The MAPI call 'OpenMsgStore' failed with the following error: The Microsoft Exchange Server computer is not available. Either there are network problems or the Microsoft Exchange Server computer is down for maintenance. The MAPI provider failed. Microsoft Exchange Server Information Store ID no: 8004011d-052600000000.
Problems may occur when mounting public folder stores if you have cleared the Allow inheritable permissions from parent to propagate to this object option for the public folder hierarchy. The following error messages indicate that you have cleared this option: The store could not be mounted because the Active Directory information was not replicated yet. The Microsoft Exchange Information Store service could not find the specified object. ID no: c1041722
For detailed steps about how to restore the permissions that Exchange requires, see"How to Restore the Permissions that Exchange Requires".
Procedure
To restore the permissions that Exchange requires 1. In Exchange System Manager, right-click the public folder tree, and then click Properties. 2. In the Properties dialog box, click the Security tab, click Advanced, and then select Allow inheritable permissions from parent to propagate to this object.
357 3. Wait for Active Directory to replicate the change to all the domain controllers. 4. Right-click the public folder store, and then click Mount Store.
These databases (or stores) are organized into storage groups. All the databases in a storage group share a single set of transaction log files, a single backup schedule, and a single set of logging and backup-related settings. Exchange System Manager lists the storage groups for each server, and the mailbox stores and public folder stores in those storage groups. To view stores and storage groups in Exchange System Manager, expand the server node in the Exchange System Manager console tree. The following figure shows the mailbox and public folder stores in the First Storage Group of a single server.
If you are using Exchange Server 2003 Standard Edition, each Exchange server can have one storage group, which contains one mailbox store and one public folder store. If you are using Exchange Server 2003 Enterprise Edition, each server can have up to four storage groups, each of which up to five databases (either mailbox stores or public folder stores). Using either Exchange Server 2003 Standard Edition or Exchange Server 2003 Enterprise Edition, you can create a Recovery Storage Group in addition to your other storage groups. Use this special storage group to recover mailbox data when restoring data from a backup. For more information about how to configure and use a Recovery Storage Group, see "Setting Up a Recovery Storage Group" in Using Recovery Storage Groups in Exchange Server 2003. You can use multiple mailbox stores to increase the reliability and recoverability of your Exchange organization. If the users are spread across multiple mailbox stores, the loss of a single store affects only a subset of the users instead of the whole organization.
359 Additionally, reducing the number of users per store reduces the time that you need to recover a damaged store from a backup. Note Increasing the number of mailbox stores on a server can increase the server resources consumed relative to the resources consumed for the same number of users in a single store. However, the benefits of using multiple stores typically outweigh the resource costs. You can use multiple public folder stores to spread public folders across multiple servers. You can put multiple replicas of the same folder on several servers, to increase the system's ability to handle user traffic. If you have multiple routing groups, you may want to distribute folders among the routing groups so that users have easy access to the folders that they use most frequently. This section includes information about the following: For each storage group, how to configure settings for the transaction logs. For each storage group, how to overwrite deleted data during backups. How to add new storage groups. How to mount or dismount stores. For each store, how to move the database files out of the system directory. This task is the same for mailbox stores and public folder stores. For each store, how to configure maintenance and backup options. These tasks are the same for mailbox stores and public folder stores. How to create and configure mailbox stores. These tasks are specific to the type of store that you are working with. How to create and configure public folder stores. These tasks are specific to the type of store that you are working with.
360
361 Full backup A full backup (named a normal backup in Windows Backup) backs up the store and transaction log files. After the backup, transaction log files in which all transactions are complete are deleted. Copy backup A copy backup backs up the store and transaction log files, but leaves the transaction logs in place. Incremental backup An incremental backup backs up the transaction logs and removes all transaction logs in which all transactions are completed. Differential backup A differential backup backs up the transaction logs, but leaves them in place. Important You can perform an incremental or differential backup only if you have previously performed a normal backup. If you must recover a store, you must recover the store itself from the last normal backup, and then you can recover log files from an incremental or differential backup. For detailed steps about how to configure transaction logs and choose other storage group options, see "How to Configure Transaction Logs and Choose Other Storage Group Options"
How to Configure Transaction Logs and Choose Other Storage Group Options
To configure transaction logs and choose other storage group options, perform the following procedure.
362
Procedure
To configure transaction logs and choose other storage group options In Exchange System Manager, right-click the storage group, and then click Properties. This figure shows the options that are available for configuring a storage group. The storage group Properties dialog box
363 Server. Although existing functionality has not changed, Exchange Server 2003 has new recovery features. For more information about the new recovery features, see What's New in Exchange Server 2003What's New in Exchange Server 2003.
364 For detailed steps about how to configure new locations for the transaction logs, see "How to Configure New Locations for the Transaction Logs."
Procedure
To configure new locations for the transaction logs 1. In Exchange System Manager, right-click the storage group, and then click Properties. 2. On the General tab, specify a new location for the files. For example, if the E:\ drive will contain only log files for this storage group, in Transaction log location, click Browse, and then choose the E:\ drive..
365 Caution Using the Enable circular logging option prevents you from creating a set of log files, and you can restore only from your last backup. Reserve this option for storage groups that support Network News Transfer Protocol (NNTP) folders (in public folder stores), which do not require log files.
366 You have databases with different backup or restore requirements. For example, you have one database that you cannot afford to have offline for more than several hours, even if it must be completely reconstructed.
For detailed steps about how to create a new storage group, see "How to Create a New Storage Group."
Procedure
To create a new storage group 1. In Exchange System Manager, right-click the server where the new storage group will reside, point to New, and then click Storage Group. 2. When prompted, type a name for the storage group. Exchange provides default values for Transaction log location and System path location. You can change the defaults now, or you can change these values later.
367 Under certain conditions, you may have to mount or dismount stores manually. For example, you can configure stores so that, if the server restarts, the store must be mounted manually. That way you can check the server for problems before allowing users to access the store again. For more information, see "Configuring Store Maintenance and Backup Options". The Mount Store and Dismount Store commands are available in the Action menu for each store that appears in Exchange System Manager. Note If you do not have permissions on a particular store, the store may appear to be dismounted in Exchange System Manager when it is actually running. This may occur if you are using a distributed administration model, with multiple administrative groups with separate administrators. Each administrator will only be able to interact with the stores in that administrator's own administrative group.
368 For more information about recovery operations and transaction log files, see Disaster Recovery for Microsoft Exchange 2000 Server.
The Database tab for a mailbox store includes the following maintenance and backup options. Maintenance interval Specifies the schedule for the automatic database maintenance process. This process: Checks that none of the storage limit settings have been exceeded on any mailbox or public folder. Sends mail to the administrator or the mailbox owner if storage limits have been exceeded. Checks for deleted items that have been retained for the time configured for the store.
370 Checks for and deletes expired items in the folders if age limits have been set on any public folders. Because this process can consume significant server resources, it is a good idea to schedule it to run during off-peak hours. Note For more information about the settings that the maintenance process enforces, see "Configuring the Default Mailbox Limits," "Configuring the Default Public Folder Limits," and "Configuring Limits on a Specific Public Folder Replica." Do not mount this store at start-up When this option is selected, the mailbox store does not mount automatically when Exchange is started. By default, this check box is cleared. This database can be overwritten by a restore Do not use this option for normal restore operations. Select this option only if a restore operation fails with an error that indicates the database cannot be overwritten. By default, this option is not selected.
Mailboxes inherit many of their properties (such as storage limits) from the mailbox store. You can create different mailbox stores for different groups of users. For example, you may put mailboxes for workers in one store and mailboxes for executives in another store, and give the executives double the normal storage limits by configuring the store instead of configuring the individual mailboxes. This section describes the following: The relationship between a mailbox store and its associated public folder store. Single instance storage of messages (when it applies and when it does not). How to add a mailbox store. How to configure the default mailbox storage limits and the length of time that deleted items and mailboxes will be retained. How to control mailbox store settings with system policies. Interfaces to use for monitoring mailbox store activity.
372 For information about configuring the store for full-text indexing updates, see "Using Exchange Server 2003 Full-Text Indexing" in Working with the Exchange Server 2003 Store.
373 If the message is sent to mailboxes in a different mailbox store, the message is written one time to each mailbox store. Single instance storage may not be maintained when a mailbox that contains a message is moved to a server that contains a mailbox store with the same message. Tip To maximize single instance message storage, put similar users in the same mailbox store, such as users in the same department who use Reply All or users who send large attachments to one another frequently.
Procedure
To create a new mailbox store 1. In Exchange System Manager, right-click the storage group where the new store will reside, point to New, and then click Mailbox Store. 2. When prompted, type a name for the mailbox store. Exchange automatically selects a default public store (associated with the Public Folders tree) and offline address book (which users will download for offline use)
374 for your new mailbox store. You can modify these options now or later by right-clicking the mailbox store and clicking Properties. The following figure shows the properties of a mailbox store. The General tab for a mailbox store
375
376 Note For an individual user, you can override the store's limits settings by using Active Directory Users and Computers to configure limits settings for the user. The following table describes the possible limits that can be set for a mailbox store. By default, no limits are set. Options available on the Limits tab for a mailbox store
Option Description
When a user's mailbox exceeds the specified size limit, the user receives an email alert to delete messages from the mailbox. By default, this option is not selected. When a user's mailbox exceeds the specified size limit, the user receives an email alert to delete messages from the mailbox. Additionally, the user cannot send e-mail messages until the mailbox size is reduced below the specified limit. By default, the option is not selected. When a user's mailbox exceeds the specified size limit, the user receives an email alert to delete messages from the mailbox. Additionally, the user cannot send e-mail messages until the mailbox size is reduced below the specified limit, and incoming e-mail messages are returned to the sender with a non-delivery report (NDR).
377
Option Description
Use this drop-down list to schedule when warning messages are generated. You can select one of the standard maintenance schedules, or click Customize to set up your own schedule. This process is CPU-intensive and diskintensive, and can slow server performance. It is a good idea to schedule maintenance of this type at off-peak times.
You can designate the number of days that deleted items (such as e-mail messages) remain on the server before they are removed permanently. You can type a number from 0 to 24855. If you type 0, deleted items are removed from the server immediately. As long as deleted items remain on the server, Outlook users can retrieve them using Outlook's Recover Deleted Items function.
You can designate the number of days that deleted mailboxes remain on the server before they are removed permanently. After this value is set, you have the specified number of days to recover mailboxes that were deleted by accident. You can type a number from 0 to 24855. If you type 0, deleted mailboxes are removed from the server immediately.
Do not permanently delete mailboxes and items until the store has been backed up
You can keep deleted mailboxes and items on the server until a backup is performed. After a backup is performed, mailboxes and items are deleted, according to the settings that you specified.
378
Limits tab Issue warning at (KB) Prevent send at (KB) Prevent send and receive at (KB) Warning message interval Keep deleted items for (days) Keep deleted mailboxes for (days) Do not permanently delete mailboxes and items until the store has been backed up
379 Use the System Policies node in Exchange System Manager to create and apply policies. After you create a mailbox store policy, you can apply that policy to one or more mailbox stores on any server. Note You can only apply a policy to a store if you have permissions to modify that store. If you are using a distributed administration model, with multiple administrative groups that have separate administrators, each administrator will only be able to interact with the stores in that administrator's own administrative group. For detailed steps about how to apply a policy to one or more mailbox stores, see "How to Apply a Policy to One or More Mailbox Stores"
Procedure
To apply a policy to one or more mailbox stores 1. In Exchange System Manager, right-click the policy, and then click Add Mailbox Store. 2. Select the appropriate stores. 3. After you have applied the policy, the options that the policy controls are no
380 longer available in the mailbox store's Properties dialog box. This design prevents local settings from overriding the policy. For a list of all the policies that are applied to a particular mailbox store, view that mailbox store's Policies tab.
381 The following table lists the status information that is available for each of the nodes under the mailbox store. To display different columns of information in the right pane, click the node that you want to view. On the View menu, click Add/Remove columns, and then select the types of information that you want to display. For a detailed listing of the available columns, see "Administer a Mailbox Store" in the Exchange Server 2003 Help. Status information for a mailbox store
Node Status Information
Logons
Users who are currently logged on to their mailboxes, and their activities. Use this information to look for mailbox users who are atypically active or inactive. The Total Ops column is especially useful for this purpose. You must be at least an Exchange Administrator to view this information.
Mailboxes
Current mailboxes in the store. Although this node provides information about mailboxes, it does not provide access to the messages in the mailboxes. You must be at least an Exchange Administrator to view this information.
Full-Text Indexing
You can also use the Windows Performance application to monitor activity related to the mailbox store. The following counters (available on the MSExchangeIS Mailbox performance object) provide especially useful information: Average Delivery Time Local delivery rate Logon Operations/sec Folder opens/sec Message Opens/sec
382 Message Delivered/min Messages Sent/min Message Submitted/min Receive Queue Size
For more information about how to use these counters, see the Windows Performance Help.
383 The following figure shows an example of a set of public folder servers that support multiple trees: Each server has a Public Folder Store, which supports the Public Folders tree. Two servers also support a second public folder tree. These servers run one public folder store per tree.
If you try to create a public folder store without an available public folder tree, you receive the following error message: All the public folder trees already have an associated public store on the server. You must create a new public folder tree before creating this new public folder store. The following figure shows where to find public folder store information in Exchange System Manager.
This section describes the following: Functions of the Public Folder Store, especially when it is associated with a mailbox store. How to add a public folder store when you work with an existing public folder tree. How to configure a new public folder tree and public folder store. How to configure the default public folder storage limits: Maximum size of public folders and of individual items in the folders. Length of time deleted items are retained. Age limits for items in public folders.
How to control public folder store settings with system policies. Interfaces to use for monitoring public folder store activity.
For information about configuring the store's options for the default public folder replication interval, see "Controlling Exchange Server 2003 Public Folder Replication" in Working with the Exchange Server 2003 Store.
385
Understanding the Relationship Between Mailbox Stores and Default Public Folder Stores
Each mailbox store is associated with a default public folder store, either on the local server or another server. For each mailbox-enabled user who is supported by a particular mailbox store, the associated public folder store is the user's homepublic folder store. If you can, use the default public folder store on the same server as the mailbox store. This improves performance when users access public folders, and may make it easier to troubleshoot public folder access problems.
Creating a New Public Folder Store for an Existing Public Folder Tree
A tree can have multiple stores when each store exists on a separate server. In such a configuration, Exchange replicates information among the stores to keep the tree consistent. For detailed steps about how to create a public folder store on a new server for an existing tree, see "How to Create a Public Folder Store on a New Server for an Existing Tree".
386
How to Create a Public Folder Store on a New Server for an Existing Tree
To create a public folder store on a new server for an existing public folder tree, perform the following procedure.
Procedure
To create a public folder store on a new server for an existing tree 1. In Exchange System Manager, on a server that does not already have a store for the tree with which you are working, right-click a storage group, point to New, and then click Public Store. 2. When prompted, select the existing tree that you want to use for this store, and then finish creating the store. 3. In Exchange System Manager, under the Folders node, locate the tree that you are working with and configure the folders that you want to replicate to the new store.
387 For detailed steps about how to create a new hierarchy and public folder store, see How to Create a New Hierarchy and Public Folder Store. When you have finished configuring this virtual server, Exchange automatically configures a corresponding Web site using Microsoft Internet Information Services (IIS). Users access the public folder with Outlook Web Access using this Web site. For more information about configuring HTTP virtual servers and IIS Web sites, see "Configuring Exchange 2003 for Client Access" in the Exchange Server 2003 Deployment Guide.
Procedure
To create a new hierarchy and public folder store 1. In Exchange System Manager, right-click the Folders node, point to New, and then click Public Folder Tree. 2. In the Properties dialog box (see the following figure), in the Name box, type a name for the new tree. The Properties dialog box for a new public folder tree
388
3. In Exchange System Manager, on the server that you want to host the new store, right-click a storage group, point to New, and then click Public Store. 4. On the new store's General tab (see the following figure), type a name for the new store and then, under Associated public folder tree, click Browse. The General tab for a new public folder store
389
5. In the Select a Public Folder Tree dialog box, choose a public folder tree. 6. In Exchange System Manager, under the node for the server that holds the new store, double-click Protocols, right-click HTTP, point to New, and then click HTTP Virtual Server. 7. When prompted, provide a name for the virtual server and select the new public folder tree.
390
391 The following table describes the options that you can set on the Limits tab for a public folder store. Caution Do not set an age limit on folders that contain Contact or Calendar items. Note You can also set limits on individual public folders that override the store settings. If you use only the store settings, the same folder may have different limits on different servers. If you use individual folder settings, the limits are the same for all replicas of the folder. Options available on the Limits tab for a public folder store
Option Description
When a folder exceeds the specified size limit, the administrator receives an e-mail alert to delete messages from the folder. You can type a number from 0 to 2097151. By default, this option is not selected.
When a folder exceeds the specified size limit, the administrator receives an e-mail alert to delete messages from the folder. Additionally, no users can post messages to the folder until the folder size is reduced below the specified limit. You can type a number from 0 to 2097151. By default, this option is not selected.
The maximum size for individual messages that can be posted to the folder. You can type a number from 0 to 2097151.
392
Option Description
Use this drop-down list to schedule when warning messages are generated. You can select one of the standard maintenance schedules, or click Customize to set up your own schedule. This process is CPU-intensive and diskintensive, and can slow server performance. It is a good idea to schedule maintenance of this type at off-peak times.
You can designate the number of days that deleted items (such as messages in a folder) remain on the server, before they are removed permanently. You can type a number from 0 to 24855. If you type 0, deleted items are removed from the server immediately. Because items deleted from public folders are not held in a Deleted Items folder, if you set this option, you can recover deleted items without having to use a backup of the public folder.
Do not permanently delete items until the store has been backed up
You can keep deleted items on the server until a backup is performed. After a backup is performed, items are deleted, according to the settings that you specified. You can use this setting for folders that contain important information. For other folders, such as Newsgroup folders, you may want to leave this setting cleared to save storage space.
The number of days after which items in this folder will be deleted automatically if they have not been modified.
393
Procedure
To view additional age limit settings 1. In Exchange System Manager, under the public folder store node, click Public Folder Instances. 2. In the right pane, right-click the folder you want, and then click Replica Properties. The Replica Properties dialog box appears The Replica Properties dialog box for a public folder on a specific store
394
This dialog box lists all the limits that are applied to this folder instance: Age limit of all replicas of this folder (days) This is the limit (if any) that is set in the public folder's properties. Age limit of all folders on this public store (days) This is the limit (if any) that is set in the public folder store's properties. Effective age limit of this folder on this public store (days) This is the final value of the age limit for this replica.
3. To set a specific age limit for this folder replica, click Age limit of this folder on this public store (days) and type a value. Exchange automatically updates Effective age limit of this folder on this public store (days).
395
Replication tab Replication interval Replication interval for always (minutes) Replication message size limit (KB)
Limits tab Issue warning at (KB) Prevent send at (KB) Prevent send and receive at (KB) Warning message interval Keep deleted items for (days) Do not permanently delete items until the store has been backed up Age limit for all folders in this store (days)
For detailed steps about how to apply a policy to one or more public folder stores, see "How to Apply a Policy to One or More Public Folder Stores".
396 After you have applied the policy, the options that the policy controls are no longer available in the public folder store's Properties dialog box. For a list of all the policies that are applied to a particular public folder store, view that store's Policies tab. Note You can only apply a policy to a store if you have permissions to modify that store. If you are using a distributed administration model, with multiple administrative groups that have separate administrators, each administrator will be able to interact only with the stores in that administrator's own administrative group.
Procedure
To apply a policy to one or more public folder stores 1. Use the System Policies node in Exchange System Manager to create and apply policies. After you create a public folder store policy, you can apply that policy to one or more public folder stores on any server. 2. In Exchange System Manager, right-click the policy, and then click Add Public Store. 3. Select the appropriate stores.
397
The following table lists the status information that is available in Exchange System Manager for a public folder store. To display different columns of information in the right pane, click the node that you want to view, click Add/Remove columns on the View menu, and select the types of information that you want to display. For a detailed listing of the columns that are
398 available for you to view, see "Administer a Public Folder Store" in the Exchange Server 2003 Help. Status information for a public folder store
Node Status Information
Logons
Users who are currently logged on to the public folders. Use this information to look for users who are atypically active or inactive. The Total Ops column is especially useful for this purpose. You must be at least an Exchange Administrator to view this information.
Current public folder replicas in the store, and their replication configuration. Current public folders in the store. Although this node provides information about the folders, it does not provide access to messages in the folders.
Public Folders
Replication
Replication status of the public folders in this store. Status of current full-text indexes.
Full-Text Indexing
You can also use the Windows Performance application to monitor activity related to the public folder store. The following counters (available on the MSExchangeIS Public performance object) provide especially useful information: Average Delivery Time Folder opens/sec Message Opens/sec Message Delivered/min Receive Queue Size
For more information about how to use these counters, see the Windows Performance Help.
399
Managing Mailboxes
Mailbox information resides both in Active Directory (in mailbox-enabled user objects) and in mailbox stores. Although this section mentions ways to work with mailbox-enabled users in Active Directory, it focuses on the storage aspects of mailboxes: Creating a mailbox by mailbox-enabling a user in Active Directory Deleting mailboxes and removing them from the mailbox store Recovering deleted mailboxes Moving mailboxes from one store to another
Detailed procedures for working with mailbox-enabled users in Active Directory are described in Managing Recipients and Recipient Policies in Exchange Server 2003.
Creating a Mailbox
This section describes what occurs in the mailbox store when you create a mailbox. To create mailboxes, use Active Directory Users and Computers. You can create mailboxes in two ways: Create a new user You can create the mailbox as part of the process of creating a user. Create a mailbox for an existing user You can right-click a user, and then click Exchange Tasks to start the Exchange Task Wizard. Creating a mailbox is one of the tasks you can perform with this wizard.
The mailbox is not immediately accessible. Although Active Directory attributes for the mailbox are configured immediately, the attributes for the mailbox in the Exchange store are not configured completely until one of the following occurs: The user tries to access the mailbox.
400 Exchange receives a message that is addressed to the new mailbox. You may want to automatically send new e-mail users an introductory or hello message after their accounts have been configured, especially if the users may not be using Outlook.
Either of these events will trigger Exchange to finish configuring the mailbox in the store.
Deleting a Mailbox
There are two ways to make an Exchange mailbox unusable: Use Exchange System Manager to delete the mailbox. Delete a mailbox-enabled user from Active Directory. This makes the mailbox unowned. The mailbox still exists, but no user can access it.
401
Recovering a Mailbox
Deleted mailboxes can be recovered only by restoring them from a backup. However, mailboxes that belong to users who were deleted from Active Directory can be recovered by associating them with existing users who do not have mailboxes. This is named reconnecting the mailbox. When you reconnect a mailbox, Exchange presents a list of users from which you can choose. Even if you have re-created the original deleted user, the re-created user object has a different security ID (SID) and will not be recognized as the original user. The selected user becomes the new owner of the mailbox. Note In specific disaster recovery circumstances, you may have to remove Exchange attributes from a user object before reconnecting the Exchange mailbox. If Exchange-related attributes are present, Exchange may assume that the user already has a mailbox, and leave the user off of the list of possible users who you can associate with the mailbox. There are two methods for recovering mailboxes: Recover a single mailbox on a single mailbox store. Use the Reconnect command, which is available when you select the mailbox in Exchange System Manager. During the reconnect process, select the user who you want to associate with the mailbox. Use Mailbox Recovery Center to recover one or more mailboxes on one or more mailbox stores. You can export the mailbox properties to a file, and you can associate the mailboxes with users in Active Directory and reconnect the mailboxes.
For detailed instructions, see "How to Recover One or More Mailboxes on One or More Mailbox Stores".
402 For more detailed information about recovering mailboxes, including how to remove the mailbox stores from the Mailbox Recovery Center, see the Exchange Server 2003 Help.
To recover a mailbox by reconnecting it to an Active Directory account, perform the following procedure.
Procedure
To recover one or more mailboxes on one or more mailbox stores 1. In Exchange System Manager, expands Tools. 2. To choose a mailbox store to work with, right-click Mailbox Recovery Center and then click Add Mailbox Store.
403 3. If you want to export the mailbox properties, right-click the mailbox that you want to export, and then click Export. This is a useful way to store the mailbox properties if you do not intend to associate the mailbox with a user. 4. If you want a user to be able to access the mailbox, do the following to reconnect the mailbox: a. To associate a user with a mailbox, right-click the mailbox that you want to match to a user (or group), and then click Find Match. If a mailbox matches more than one user (or if no match exists), right-click the mailbox, and then click Resolve Conflicts. Follow the instructions in the Mailbox Conflict Resolution Wizard to identify a single matching user. b. To reconnect the mailbox, select the mailbox, right-click the selected mailbox, and then click Reconnect. 5. When you have finished reconnecting mailboxes, remove the mailbox stores from the Mailbox Recovery Center.
404 business hours. Using the wizard's multithreaded capabilities, you can move up to four mailboxes at the same time. Note The following procedure describes how to move mailboxes using Exchange System Manager. You can also move mailboxes using Active Directory Users and Computers. For detailed instructions, see "How to Move Mailboxes from One Exchange Virtual Server to Another Server"
405
By default, Exchange System Manager displays public folders instead of system folders.
Under normal operating conditions, you do not have to interact with system folders frequently. In Exchange System Manager, you can view the system folders for a specific public folder tree by right-clicking the public folder tree node and clicking View System folders.
407 Folders node in Exchange System Manager that displays the system folders
System folders include the following: EFORMS REGISTRY and Events Root By default, one content replica of each of these folders resides in the default public folder store on the first Exchange 2003 or Exchange 2000 server that is installed in the first administrative group. Site folders (OFFLINE ADDRESS BOOK and SCHEDULE+ FREE BUSY) In most respects, these folders function in the same manner as other public folders, with the following additions: Site folders exist only in the Public Folders tree. The OFFLINE ADDRESS BOOK folder and the SCHEDULE+ FREE BUSY folder automatically contain a subfolder for each administrative group (or site) in your topology. By default, a content replica of a specific administrative group folder resides on the first server that is installed in the administrative group. Each administrative group has a Site Folder Server, identified in the administrative group's object in Active Directory. By default, the first server in the site is a Site Folder Server. This server is responsible for making sure that site
408 folders exist. If you have to remove the Site Folder Server from the site, first make sure that the site folders have been replicated to a new server that can take over as the Site Folder Server. OWAScratchPad folders Each public folder store has an OWAScratchPad folder, which is used to temporarily store attachments that are being accessed with Outlook Web Access. Do not modify these folders. StoreEvents folders Each public folder store has a StoreEvents folder, which holds registration information for custom store events. Do not modify these folders. Other folders To support internal store operations, a tree may contain several other system folders. Do not modify these folders.
Content The messages that form the content of the folders. To replicate content, you must configure a folder to replicate its content to a specific public folder store or list of stores. Only the stores that you specify will have copies of the content. A copy of the folder that includes content is named a content replica.
When a client such as Outlook connects to a store and requests a folder (for example, when an Outlook user opens a folder): 1. The store checks that the client has the correct permissions to access the folder.
409 2. If the client has sufficient permissions, the store determines whether it has a content replica of the folder that it can connect the client to. 3. If the store has only the folder properties, it uses the properties to identify another public folder store that has a content replica, and then refers the client to that store. 4. The new public folder store checks that the client has correct permissions to access the folder, and then locates the content replica. Additional permissions checks occur when the client accesses individual content items. The previous scenario is simplified. For more information about how Exchange routes clients among the public folder stores, see Understanding Public Folder Referrals. For more information about permissions and access checks, see Working with Permissions for Public Folders and Mailboxes.
Not mail-enabled. Can be mail-enabled, and is visible to Address Book by default. Not mail-enabled. Can be mail-enabled, and is visible to Address Book by default.
General-purpose trees
Note The mixed-mode defaults for the Public Folders tree support backward compatibility with Exchange 5.5. The Exchange 5.5 Administrator program requires a directory object for each public folder, and without one you cannot administer the folder from Exchange 5.5. If you mail-disable a folder in this tree, or if the Active Directory object is accidentally deleted or damaged, you will not be able to view the folder with Exchange 5.5 Administrator. You can mail-enable the folder again. Because mail goes directly to the public folder store instead of to a mailbox in the mailbox store, Exchange routes e-mail messages using a method that is slightly different from the method that it uses for e-mail messages that go to a regular mailbox. When it is choosing an initial public folder store, Exchange tries to determine which public folder store is "closest" to the server that has the incoming message. Exchange determines which public folder store is the "closest," based on the following order of preference: 1. The store on the local server. 2. A store on an Exchange 2003 or Exchange 2000 server in the local routing group. 3. A store on an Exchange 2003 or Exchange 2000 server in the local administrative group. 4. If the folder is in the Public Folders tree, a store on an Exchange 5.5 server in the local administrative group or site. 5. The store on the Exchange 2003 or Exchange 2000 server that appears first in the tree's list of servers. This will probably be the server that was added most recently.
411 6. If the folder is in the Public Folders tree, the store on the Exchange 5.5 server that appears first in the tree's list of servers. This situation is rare, and would only occur in a newly configured mixed-mode topology where configuration information may not have replicated completely. Note When it is selecting a public folder store, Exchange avoids selecting a public folder store that is less than two days old unless no other public folder store is available. In this way, Exchange avoids using a store to which all the hierarchy or content information has not yet replicated. This feature is new in Exchange 2003. If Exchange cannot locate an appropriate public folder store, it sends a non-delivery report (NDR) to the sender of the message. After the e-mail message has been delivered to a public folder store and the public folder store has retrieved the hierarchy information for the folder, Exchange determines the closest content replica using the following order of preference: 1. The content replica in the local public folder store. 2. A content replica in a store in the same routing group. 3. A content replica in a store with the lowest routing cost (as determined by the routing engine). If Exchange must use a store outside the local routing group, it also takes into account other routing properties, such as link state information. This feature is new in Exchange 2003. The closest content replica is the final destination of the message. If Exchange cannot locate a content replica of the folder, it sends an NDR to the sender of the message. The following figure provides an overview of how Exchange delivers e-mail messages to public folders.
412 A simplified example of how Exchange routes an e-mail message to a public folder
The following process occurs: 1. A message addressed to a public folder is submitted to Exchange. The message arrives first at ExFront01. 2. ExFront01 looks up recipients in Active Directory and finds the mail-enabled folder object for the public folder. 3. From the mail-enabled folder object's attributes, ExFront01 identifies the public folder tree to which the folder belongs. 4. ExFront01 looks up the public folder tree object in Active Directory, and identifies the public folder stores that support the tree. 5. ExFront01 selects a public folder store from the list, and sends the message to that store. 6. ExPF01 looks up the hierarchy information for the requested folder in its local public folder store.
413 7. Using the hierarchy information, ExPF01 determines that its public folder store does not contain a content replica of the requested folder, but that the public folder store on ExPF02 does. 8. ExPF01 sends the message to ExPF02. 9. ExPF02 looks up the hierarchy information for the requested folder in its local public folder store. 10. ExPF02 identifies the content replica of the requested folder and delivers the message to it.
414 For detailed steps about how to configure an Exchange 2003 server to use a specific list of servers and costs for referrals, see "How to Configure an Exchange 2003 Server to Use a Specific List of Servers and Costs for Referrals."
How to Configure a Connector to Allow or Block Referrals from One Routing Group to Another
To control client public folder redirection traffic by configuring public folder referrals, perform the following procedure.
Procedure
To configure a connector to allow or block referrals from one routing group to another 1. In Exchange System Manager, in the Connectors container, right-click the connector that you want to configure, and then click Properties. 2. In Routing Group Connector Properties, select or clear the Do not allow public folder referrals option (see the following figure) according to the following criteria: For a connector between Exchange 2003 or Exchange 2000 routing groups, the Do not allow public folder referrals option is not selected by default. You may want to select this option if the connector uses a slow network connection, or if one of the connected routing groups does not have public folder information.
415 For a connector between an Exchange 2003 or Exchange 2000 routing group, and a routing group that contains Exchange 5.5 servers, the Do not allow public folder referrals option is selected by default. The default setting is appropriate for such a connector if users access public folders primarily with Outlook Web Access. Outlook Web Access users cannot view public folder content that resides on Exchange 5.5 servers, so allowing referrals serves almost no purpose. However, if users access public folders primarily with Outlook, you can allow referrals to distribute user traffic to the Exchange 5.5 servers. The General properties tab for a routing group connector
416
How to Configure an Exchange 2003 Server to Use a Specific List of Servers and Costs for Referrals
To control this client public folder redirection traffic by configuring preferred public folder servers and costs, perform the following procedure.
Procedure
To configure an Exchange 2003 server to use a specific list of servers and costs for referrals 1. In Exchange System Manager, right-click the server, and then click Properties. 2. Use the Public Folder Referrals tab to set up your referral list. The Public Folder Referrals properties tab for a server (Exchange 2003 only)
417
418
419
420 An example of how Exchange routes an Outlook Web Access user to a public folder in the Public Folders tree
The details of this process are as follows: 1. An authenticated user who has a mailbox in this Exchange organization tries to view the contents of a public folder in the Public Folders tree. Outlook Web Access sends the following request:
HTTP GET "http://<virtdir_front>/public/<folder>"
2. The front-end server ExFront01 receives the GET request, and contacts the global catalog server. ExFront01 looks up the user in Active Directory and retrieves the value of the user's msExchHomePublicMDB attribute. This value identifies the default public folder store that is associated with the user's mailbox store. In the example shown in Figure 1, this store is on the server ExBack01. This example depicts a specific case. Under other circumstances (for example, a server is down, the user is anonymous, or the requested folder is not in the Public Folders tree), ExFront01 would perform one of the following actions in Step 2 instead of the action described: If the server with the user's associated public folder store is not available or is an Exchange 5.5 server, the front-end server sends a GET request to another server in the local routing group. The store on that server follows the basic referral process, outlined earlier in this section, to locate a content replica.
421 If the user is anonymous (using the IIS Anonymous account), the front-end server uses a hashing algorithm to select a server in the local routing group, and sends a GET request to that server. Because anonymous users have a single account, in this step they will always be sent to the same server. If the public folder is in a general-purpose public folder tree, the front-end server uses a hashing algorithm to select a server in the local routing group, and sends a GET request to that server. The store on that server follows the basic referral process, outlined earlier in this section.
GET "HTTP://ExBack01/public/<folder>"
to
4. ExBack01 accesses its hierarchy information for the Public Folders tree, and finds that the closest available content replica is on the server ExBack02. ExBack01 sends the location of the content replica to ExFront01 in the form of the message:
HTTP 305 "HTTP://ExBack02/public/<folder>"
GET "HTTP://ExBack02/public/<folder>"
to
6. ExBack02 returns the requested content and an HTTP 200 OK message to ExFront01. 7. ExFront01 forwards the content and an HTTP 200 OK message to Outlook Web Access. Using this process, the Outlook Web Access user remains unaware of the topology behind the front-end server. If you do not use a front-end server, users would have to know the name of at least one of your public folder servers to use Outlook Web Access with public folders. To speed up repeated client access to folders while minimizing network traffic, Exchange caches much of the information that it needs during the process. This information, including routing costs, replica locations, and server-down status, is cached for 10 minutes.
422
Important Because Exchange regards public folder administration and public folder store administration as separate tasks, you can configure your administrative group topology so that some Exchange administrators have access to the public folder stores, but not to the public folders.
423 Note For example, consider a topology with public folder servers grouped into two administrative groups, each of which has its own Exchange Administrator. Martin is the Exchange Administrator for AG1, and Sam is the Exchange Administrator for AG2. Each of the public folder servers has a default public folder store, which supports the Public Folders tree. As expected, Martin can administer the default public folder stores on the servers in AG1, and Sam can administer the default public folder stores on the servers in AG2. However, note that the Public Folders tree was created in AG1, which was the first administrative group in the topology. Therefore, only Martin can administer folders in the Public Folders tree. As the AG2 administrator, Sam can administer only public folder trees created in AG2. Note For more information about this and other permissions issues, see Using Exchange Administrative Roles with Exchange Store Components.
424 Tip After creating a public folder store, you may have to refresh the information in Exchange System Manager to enable the Connect to command.
425
You can use the Limits tab of the public folder Properties dialog box to control the maximum size of folders, set the length of time that deleted messages will be retained, and set message age limits. Setting age limits on message storage can help you conserve disk space. Unless you set limits at the folder level, all settings use the limits that are set on the public folder store. Clear the Use public store defaults check box to set folder-level limits. The following table describes the possible limits that can be set for a public folder. By default, if no limits are set on the folder, any limits that have been set on the public folder store will be used.
When this option is selected, the options in the respective group (Storage limits, Deletion settings, and Age limits) use the values that are set in the public folder store, and cannot be configured for individual folders. You can set this option separately for each option group. The first size limit on a public folder. When the public folder reaches this size, a warning is sent to the administrator automatically. You can type a number from 0 to 2097151. The second size limit on a public folder. When the public folder reaches this size, users can no longer post items to the public folder. You can type a number from 0 to 2097151. The maximum size of any individual item that is posted to a public folder. You can type a number from 0 to 2097151. The number of days before deleted items are removed from the public folder permanently. The value can range from 1 to 24855. The number of days that replicated items can remain on the server. The value can range from 1 to 24855. Replicated items are tracked separately from items that are posted to this public folder. When an item is posted to this public folder, the age limit does not apply until the item has been replicated.
428
429 display name. For more information about configuring specific settings for mail-enabled public folders, see the sections that follow. For information about configuring permissions for a mail-enabled public folder, including how to specify a user who can send mail on behalf of a public folder, see Using Public Folder Permissions.
Select one of the following options for Address list name: Same as folder name Displays the folder in Address Book as it is displayed in Exchange System Manager. Use this name Displays the folder in Address Book using the name that you enter.
You can configure the alias using the Exchange General tab of the public folder's Properties dialog box.
If the public folder name contains non-ANSI characters, you can also provide a simple display name for Address Book to use. This name can only include ANSI characters, which can be read by any computer. You can configure the simple display name using the Exchange Advanced tab of the public folder's Properties dialog box.
When the Hide from Exchange address lists check box is selected, the public folder is not visible in Address Book. In mixed mode, this check box is selected by default for folders in the Public Folders tree. To create custom attributes for the public folder, click Custom Attributes. A standard dialog box for creating attributes in Active Directory will appear. You can define up to 15 custom attributes. Note If a particular folder in Address Book is hidden, users can still post messages to the folder if they know its address and type it in the To box of a message. However, if you designate a delegate for the public folder who can send mail on
433 the folder's behalf, the folder must not be hidden. If the folder is hidden, the delegate will not be able to send mail on the folder's behalf. Note For more information about sending mail on behalf of a public folder, see Designating a User as a Mailbox Delegate.
By default, the Automatically update e-mail addresses based on recipient policy check box is selected. This allows recipient policies to override explicitly configured addresses that are set on individual folders. If you must modify the list of e-mail addresses for a folder, for detailed instructions, see the Exchange Server 2003 Help. Note The folder's primary e-mail address is the address to which replies will be sent when an e-mail message is sent on behalf of the public folder.
435
436 The Delivery Restrictions dialog box for a mail-enabled public folder
In the Delivery Restrictions dialog box, you can set the following options: Sending message size Limits the size of messages that are sent using the e-mail alias of the public folder. You can use the default size limit, or you can type a maximum message size in the Maximum KB box. The maximum message size for outgoing messages can be a value from 1 to 2097151. Note Specifying too large a value for Sending message size can increase traffic on your network. Additionally, large messages can take a long time to download over slower network connections. Use a value that is appropriate for your network's usage pattern. Receiving message size Limits the size of messages that are sent to the public folder. You can use the default size limit, or you can type a maximum message size
437 in the Maximum KB box. The maximum message size for incoming messages can be a value from 1 to 2097151. Note Specifying too large a value for Receiving message size can increase traffic on your network. Additionally, large messages can take a long time to download over slower network connections. Use a value that is appropriate for your network's usage pattern. Message restrictions Specifies who can and cannot send e-mail to the folder. Choose from the following options: From authenticated users only Regardless of the type of restriction that you apply (From everyone, Only from, or From everyone except), the public folder will only accept e-mail messages from authenticated users. From everyone The public folder will accept all incoming e-mail messages. Important If you select the From everyone message restriction, any user will be able to send e-mail messages to the public folder. Use this option only when no security restrictions are required. Only from The public folder will only accept e-mail messages from the specified users. Click Add to specify a list of users. From everyone except The public folder will refuse to accept e-mail messages from the specified users. Click Add to specify a list of users.
To configure a forwarding address for a public folder, click Delivery Options on the Exchange General tab of the public folder's Properties dialog box. The Delivery Options dialog box appears.
439 The Delivery Options dialog box for a mail-enabled public folder
In the Delivery Options dialog box, you can set up a forwarding address by configuring the following options: Forwarding address Specifies an e-mail address (other than that of the public folder) where messages that are addressed to the public folder will be delivered. Specify one of the following: None Messages will only be delivered to the public folder. This is the default setting. Forward to Forwards all e-mail messages that are addressed to the public folder to a designated user. To create a list of users, click Modify.
Deliver messages to both forwarding address and folder When this check box is selected, all e-mail messages that are addressed to this public folder are delivered
440 to both the public folder and a user who you specify. If this check box is not selected, only the user will receive the e-mail messages.
For actively updated information about public folders, use the Status tab. The Status tab lists all the content replicas of the folder, the servers and where they reside, and statistics about the folder content.
443 that you have created a virtual directory for that tree. For more information about IIS and the World Wide Web Service, see the Windows Help. Note Depending on your security settings, you may have to provide credentials to view the content of the folder. Exchange View Only Administrators can access this information. Content tab of a public folder
You can specify a variety of search criteria, such as the folder name or age. The following table lists the different options and criteria that you can use when searching. Options you can use when searching for a public folder
Option Description
All or part of the folder name. Permissions for a specific user or group. The name of the server that holds a replica of the folder. The folder was created or modified in a certain date range. Select either Modified or Created, and then use the Begin date and End date lists to specify the date range. The age of the folder, in a certain range. Click days or older, days or newer, or days, and then specify the age in days.
Specify folder
Folder age
445
446 Tip For more information about creating a form, see the documentation that included in Microsoft Outlook. An organizational forms library is a special type of public folder that is listed only with system folders. When you create an organizational forms library, you assign a language to it. By default, clients logged on to Exchange search for forms in the library that matches their language. Therefore, you must create individual libraries to hold forms that you want to be available to non-English language clients. If there is no language-specific organizational forms library, the client defaults to the library on the server. You can have only one organizational forms library for each language. Exchange stores these libraries in the EFORMS REGISTRY system folder. Note You can only create organizational forms libraries in the system folders subtree of the Public Folders tree. Even if you have created new public folder hierarchies to work with the organizational forms libraries, only the Public Folders tree supports the EFORMS REGISTRY system folder. For instructions about how to create and modify organizational forms libraries, see "Maintain the Organizational Forms Library" in the Exchange Server 2003 Help.
447 Windows Server 2003 or Windows 2000 Server, Exchange extends SMTP to support additional SMTP commands for additional functionality. This functionality includes the ability to communicate the link state status, available messaging routes status, and other Exchange functionality.
448 Note If you are operating Exchange on a single server, most of the topics about routing groups do not apply to your organization. However, you may find these topics useful if you plan to expand your messaging system to support multiple servers. For detailed instructions, see How to Disable Outbound Mail. For detailed instructions, see How to Disable a Connector. For detailed instructions, see How to Remove a Connector.
Procedure
To disable outbound mail In Queue Viewer, click Disable Outbound Mail. If you want to prevent outbound mail from a particular remote queue, instead of disabling all SMTP queues, you can freeze messages in a particular queue: To freeze all the messages in a particular queue, in Queue Viewer, right-click the queue, and then click Freeze.
449 To unfreeze a queue, in Queue Viewer, right-click the queue, and then click Unfreeze.
Procedure
To disable a connector 1. In Exchange System Manager, right-click a connector, and then click Properties. 2. Select one of the following options: For an X.400 connector, click the Schedule tab, and then click Never. For an SMTP connector or a routing group connector, click the Delivery Options tab. Under Specify when messages are sent through this connector, in Connection time, select Never run from the drop-down list.
450
Procedure
To remove a connector In Exchange System Manager, right-click the connector that you want to remove, and then click Delete.
Although all servers communicate with each other directly in a routing group, this is not the case when a server in one routing group must communicate with a server in another routing group. To allow servers to communicate with servers in other routing groups, you must create a routing group connector. Although you can use an X.400 connector or an SMTP connector to connect routing groups, the routing group connector is specifically designed for this purpose and is the preferred method of connecting routing groups.
451 By default, all servers in a routing group can send mail over the routing group connector. Servers that can send mail over a routing group connector are bridgehead servers. These bridgehead servers are each a combination of an SMTP virtual server and an Exchange server responsible for delivering all messages through a connector. When creating a routing group connector, you have the option of keeping all the servers as bridgehead servers for that connector or of specifying that only a selected set of servers act as bridgehead servers for that connector. The following table compares the advantages of each approach. Number of bridgehead servers in a routing group
Number of bridgehead servers Advantages
Provides more efficient message flow because all the servers in the routing group can directly deliver messages to other routing groups. Takes advantage of those configurations where all the servers in a routing group have the same network connectivity to the servers in other routing groups. Makes troubleshooting message flow easier because there are limited points of contact between routing groups. Distributes messaging if you anticipate heavy message flow between routing groups. Makes mail flow more reliable and efficient in those configurations where some servers have better network connectivity than others.
The following figure illustrates the basic components of routing discussed thus far. This figure shows message flow between servers in a routing group and between routing groups. It also illustrates a topology that uses only a single bridgehead server in each routing group.
When a topology is as simple as that shown in Figure 5.1, you do not have to consider how to best route messages between routing groups. As topologies become more complex, with large numbers of routing groups spread over varying geographical distances, message routing among groups becomes critical. You configure routing among routing groups by assigning costs to the routing group connectors that are used by these groups. When a user on a server in one routing group sends mail to a user on a server in another routing group, Exchange uses these costs (part of the link state information maintained by Exchange) to determine the most efficient route. Exchange always uses the route with the lowest cost unless a connector or server in that route is unavailable. So that every routing group knows what the various costs are for each connector and the status of those connectors, each routing group has a routing group master that updates and coordinates this information with all the other servers in a routing group. For detailed instructions about working with routing groups, see the following procedures: "How to Create a Routing Group" in the Exchange Server 2003 Transport and Routing Guide How to Move a Server Between Routing Groups How to Rename a Routing Group How to Delete a Routing Group How to Configure the Options for a Routing Group How to Specify a Remote Bridgehead Server for a Routing Group
453
454
Procedure
To create a routing group 1. In Exchange System Manager, right-click Routing Groups, point to New, and then select Routing Group. 2. On the General tab (see the following figure), in the Name box, enter a name for the routing group, and then click OK. General tab for routing group
455
Procedure
To move servers between routing groups 1. In Exchange System Manager, expand the routing group that currently has the server to be moved, and then expand the Members folder in that routing group. 2. Expand the routing group that will be the new location for the server, and then expand the Members folder in that routing group. 3. In the Members folder of the routing group that currently has the server to be moved, use one of the following methods: Select the server and drag it to the Members folder of the routing group that will be the new location for the server. or Right-click the server, and then click Cut. In the Members folder of the
456 routing group that will be the new location for the server, right-click, and then click Paste.
457
Procedure
To rename a routing group In Exchange System Manager, right-click the routing group, click Rename, and then type a new name for the group.
Procedure
To delete a routing group In Exchange System Manager, right-click the routing group, and then click Delete.
458 Whether any or all servers in the routing group will function as bridgehead servers Whether public folders can be accessed locally by users of the routing group
Procedure
Before you begin, read Understanding and Configuring Message Routing and Transport.
Procedure
To configure the options for a routing group connector 1. In Exchange System Manager, expand the routing group, right-click Connectors, point to New, and then click Routing Group Connector. 2. On the General tab (see the following figure), select from the following options: For the name of the routing group connector, it is a common practice to use the two routing groups it connects. For example, you can use the name ParisToSeattle to define a connector connecting your Paris routing group to your Seattle routing group. In Connects this routing group with, select the routing groups to which you want to connect. In Cost, assign a cost for the connector. To have all servers in the local routing group function as bridgehead servers, select Any local server can send mail over this connector. To specify which servers in the local routing group can function as bridgehead servers for this connector, select These servers can send mail over this connector, and then click Add to add the appropriate servers to the list. To prevent users from accessing public folders that are not available locally using this connector, select Do not allow public folder referrals. General tab of the Routing Group Connector Properties dialog box
459
460
Procedure
To specify a remote bridgehead server for a routing group connector 1. In the Routing Group Connector Properties dialog box, on the Remote Bridgehead tab (see the following figure), click Add, and then select the remote bridgehead server from the list of servers in the routing group to which you are connecting. Note You must specify a remote bridgehead server. For redundancy, specify more than one remote bridgehead server, if you can. Remote Bridgehead tab in the Routing Group Connector Properties dialog box
461
2. If you are creating a routing group connector between routing groups that includes Exchange 5.5 servers, in Override connection credentials for Exchange 5.x, click Modify, and then enter the Exchange 5.5 service account credentials for the Exchange 5.5 server to which you are connecting. 3. Click Apply to create the connector. 4. When a message appears that prompts you with the question of whether you want to create a routing group connector in the remote routing group, click Yes. After you click Yes, Exchange creates a routing group connector in the remote routing group. This new routing group connector permits the remote routing group to send messages to the local routing group. When creating this new routing group connector, Exchange does the following: Exchange designates the bridgehead servers for the remote routing group
462 connector as those servers listed on the Remote Bridgehead tab of the local routing group connector. Note When Exchange designates servers in this way, only those servers listed on the Remote Bridgehead tab become bridgehead servers for the new connector. If you would rather have all the servers in the remote routing group (not just those listed) function as bridgehead servers for the new connector, you must manually select the Any local server can send mail over this connector option on the General tab of the new connector. Exchange designates the remote bridgehead servers for the remote routing group connector as those servers listed as bridgehead servers on the General tab of the local routing group.
If all connections between the routing groups are available, a server in the Seattle routing group always sends a message to the Brussels routing group by sending the message first through the London routing group. This route has a cost of 20, the lowest cost route available. But, if the bridgehead server in London is unavailable, messages originating in Seattle and destined for Brussels travel over the higher cost route, the one that goes through the Tokyo routing group.
464 sends the link state information to the group's bridgehead server over TCP/IP port 691. The bridgehead server then forwards this information (over TCP/IP port 25 using SMTP) to the bridgehead servers of other routing groups. If you do not want the first server installed in the routing group to be the routing group master (the default setting), you can change the routing group master to another server. For detailed information about changing the routing group master, see "How to Change Which Server Is the Routing Group Master" in the Exchange Server 2003 Transport and Routing Guide. Important There is no automatic failover for routing group masters. If a routing group master fails, you must manually configure a new routing group master in Exchange System Manager. If a routing group master fails, the other servers in the routing group use the last known link state information until a routing group master becomes available or another routing group master is designated.
If your Exchange organization is in native mode, where all servers are running Exchange 2000 or later, this split between administrative groups and routing groups helps you to create routing groups that span administrative groups, and move servers between routing groups that exist in different administrative groups. This functionality also helps you to separate routing and administrative functions. For example, you can administer servers in two central administrative groups, placing servers from each administrative group in different routing groups, based on your network topology.
465 However, the functionality of routing groups in mixed mode, where some servers are running Exchange 2003 or Exchange 2000 while others are running Exchange 5.5, is different from native mode. In mixed mode, you: Cannot have a routing group that spans multiple administrative groups. Cannot move servers between routing groups that exist in different administrative groups.
This is because the routing topology in Exchange 5.5 is defined by siteslogical combinations of servers connected by a high-bandwidth reliable network. Sites provide the functionality of both the administrative group and routing group in Exchange 2003 and Exchange 2000. This difference in routing topology limits routing groups in mixed mode. Note For more information about native and mixed mode Exchange organizations, see "Managing an Exchange Server 2003 Organization."
466 Before you create and configure a routing group connector, think about the following questions: To which routing group does this connector deliver messages? This information is critical. Identifying the routing group to which the connector delivers messages establishes the relationship between the sending and receiving routing groups and the rest of your topology. You must know how the sending and receiving routing groups fit into your topology to intelligently assign a cost for the associated connector. What cost should this connector have? Cost is the variable Exchange uses to determine the most efficient messaging route. Exchange considers the lowest cost route the most efficient. Exchange uses a more expensive route only if a server or connector is unavailable on the route with the lowest cost. Assign the lowest costs to the routes with the highest available network bandwidth. Which servers in the routing group can act as bridgehead servers? Only designated bridgehead servers can send messages across the connector to the connected routing group. The default and preferred setting is to have any of the servers in the local routing group send mail using this connector. Use this default option when all servers in the routing group can connect directly over the network to the remote bridgehead server. Connecting directly to the remote bridgehead servers provides more efficient message flow. However, you may have better direct network connectivity between specific servers in the local routing group and the designated remote bridgehead server. For example, Server A has a direct connection of 56 kilobits per second (Kbps) to a remote bridgehead server, while Server B and Server C each have a direct connection of 10 megabits per second (Mbps) to the same remote bridgehead server. In this case, you would want to specify the servers that have the better direct network connectivity (that is, Server B and Server C) as the bridgehead servers, and you would add those specific servers to a list of permitted bridgehead servers. Should users access public folders that are not available locally using this connector? By default, public folder referrals are enabled across connectors connecting routing groups. However, network traffic increases when users access a public folder in a remote routing group. If your routing groups are connected by slow network connectivity or if your network may not be able to handle the additional traffic, disable public folder referrals. For more information about public folder referrals, see "Understanding Public Folder Referrals." What are the remote bridgehead servers to which this connector can send messages? The remote bridgehead servers are the servers in the connected
467 routing group that receive all messages destined for this routing group. The remote bridgehead servers also send link state information to the bridgehead servers for the connector. After considering these questions, you answer the first four by setting the configurations options on the General tab in the Routing Group Connector Properties dialog box. You can answer the last question by specifying remote bridgehead servers on the Remote Bridgehead tab. For detailed instructions about working with connectors, see the following topics: How to Create an SMTP Connector for Internet Mail Delivery How to Create an X.400 Connector How to Disable a Connector How to Remove a Connector
468
Procedure
To configure a connector for Internet mail delivery 1. In Exchange System Manager, expand the routing group, right-click Connectors, point to New, and then click SMTP Connector. The Properties dialog box for the new connector appears. See the following figure. Properties dialog box for a newly created SMTP connector
2. On the General tab, select one of the following options: To use the DNS settings configured on the SMTP virtual server that is
469 hosting the connector, select Use DNS to route to each address space on this connector. The SMTP connector uses DNS to resolve the IP address of the remote SMTP server, and then it delivers the mail. To route mail to a Windows SMTP server or another server in your perimeter network (also known as a screened subnet), select Forward all mail through this connector to the following smart hosts. The SMTP connector then routes mail to the selected server, which handles DNS resolution and delivers the mail. 3. On the General tab, click Add, and add at least one bridgehead server and one SMTP virtual server. The servers that you add appear in the Local bridgeheads list on the General tab. 4. Click the Address Space tab. 5. On the Address Space tab, click Add. 6. In the Add Address Space dialog box, in the Select an address type list, click SMTP, and then click OK. See the following figure. Add Address Space dialog box
7. In the Internet Address Space Properties dialog box (see the following figure),
470 select the following options: In the E-mail domain box, type an e-mail domain for the connector. Important In the E-mail domain box, there is a default value of * that represents all addresses. At least one connector in your organization must have this address space to make sure that all external domains are routed to the Internet. In the Cost box, assign an appropriate cost. By default, the cost is 1. Internet Address Space Properties dialog box
8. Click OK to return to the Address Space tab. See the following figure.
471
9. On the Address Space tab, under Connector scope, select one of the following options: To allow all servers in your Exchange organization to use this connector, select Entire organization. To allow only servers in the routing group to use this connector to send Internet mail, select Routing group. Note If you select Routing group, make sure that you have another way
Procedure
To create an X.400 connector 1. In Exchange System Manager, right-click Connectors, point to New, and then click X.25 X.400 Connector or TCP X.400 Connector. 2. On the General tab (see the following figure), in the Name box, type the connector name. General tab of the Properties dialog box for an X.400 connector
473
3. On the General tab, under Remote X.400 name, click Modify. 4. In Remote Connection Credentials, in Remote X.400 name, type the name of the remote X.400 connector on the remote server. (The remote connector name defaults to the remote server name.) In the Password box, type the password for the remote X.400 connector. In the Confirm password box, type the password again. 5. Select one of the following options: On the Address Space tab, click Add, select an address type, and then, in the Address Properties box, type all required information, including cost. On the Connected Routing Groups tab, click Add. On the General tab, in the Organization box, type the name of the organization that contains the
474 routing group to which you want to connect, and then in the Routing Group box, type the name of the routing group to which you want to connect. Note The organization must exist on an Exchange server so that the naming conventions are known. Optionally, you can type address space information and cost on the Routing Address tab. By default, the address space is created from the organization and routing group names, and the cost is 1. 6. If the remote system is not an Exchange server, on the Advanced tab, clear the Allow Exchange contents check box. If you do not clear the check box, addresses on messages are in domain name form and not in X.400 form, and replies are not possible. 7. On the Stack tab for an X.25 X.400 connector, in the X.121 address box, type the X.121 address of the remote server as specified in the X.25 network service setup. or On the Stack tab for a TCP X.400 connector, choose one of the following options: Select Remote host name, and then, in the Address box, type the fully qualified domain name (FQDN). Select IP Address, and then, in the Address box, type the remote server's IP address.
475 configured because DNS is responsible for locating mail servers outside the organization, so that SMTP can deliver mail to them. Note Before connecting to the Internet, configure your Exchange server in accordance with your company's security policy. After you install Exchange, you can send and receive mail using the default configuration of an SMTP virtual server on an Exchange server if the following conditions are true: You have a direct connection to the Internet. Note Dial-up connectivity requires some additional configuration. For more information, see Configuring SMTP in Microsoft Exchange 2000 Server. You have DNS configured correctly to resolve Internet names and to send mail to your Exchange server. Specific DNS settings are discussed later in this section.
This section describes how to configure Internet mail delivery. It includes: Understanding SMTP dependencies and how to configure SMTP Exchange relies on SMTP to deliver mail internally and externally. Because of this reliance, you must understand on which components SMTP depends and correctly configure them to support SMTP. After you have set up these components correctly, you must know how to control the configuration of SMTP. Using a wizard to configure Internet mail delivery Internet Mail Wizard is intended primarily for small and medium companies with less complex environments than large or enterprise companies. Manually configuring Internet mail delivery In large or enterprise environments, you may have to manually configure Internet mail delivery, in accordance with your organization's policies. When manually configuring Internet mail, there is a separate set of tasks associated with configuring Exchange to send Internet mail and to receive Internet mail. Controlling junk mail using filters Exchange supports connection, recipient, and sender filtering. Using these various filtering options helps you control the junk mail your users receive. Note For detailed information about large or enterprise environments and common deployment scenarios for those environments, see Configuring SMTP in Microsoft Exchange 2000 Server.
476 For detailed instructions, see How to Use a Wizard to Configure Internet Mail.
Procedure
To start Internet Mail Wizard 1. In Exchange System Manager, right-click your Exchange organization, and then click Internet Mail Wizard.
477 Note To run Internet Mail Wizard, you must use the version of Exchange System Manager that is included in Exchange Server2003. 2. Follow the instructions in the wizard to perform the configuration tasks (see the following tables) required to configure Internet mail delivery. Using Internet Mail Wizard to configure the sending of mail
Task Description
Select an Exchange server in your organization that will send Internet mail
You cannot run the wizard on a server on which you have already set up SMTP connectors or created additional SMTP virtual servers. You can only use the wizard to designate Exchange 2000 or later servers. This is both the Exchange server and the SMTP virtual server on this server. The wizard creates an SMTP connector on the selected SMTP virtual server and Exchange server. The outbound bridgehead server handles all mail sent through this connector.
478 Configure an SMTP connector to send Internet mail Internet Mail Wizard guides you through the process of configuring your SMTP connector. You can allow Internet mail delivery to all external domains, or you can restrict Internet mail delivery to specific domains. You can specify whether the SMTP connector sends outbound mail using DNS to resolve external domain names, or whether it uses a smart host that assumes responsibility for resolving external names and delivering mail.
Verify that your SMTP virtual server is With open relaying, external users can not open for relaying use your server to send unsolicited commercial e-mail, which might cause other legitimate servers blocking mail from your Exchange server. If your server is secured for relay, only authenticated users can send mail to the Internet using your server.
Select an Exchange server in your organization that will receive Internet mail
You cannot run the wizard on a server on which you have already set up SMTP connectors or created additional SMTP virtual servers. You can only use the wizard to designate Exchange 2000 or later servers.
479 Configure your SMTP server to receive Internet mail To receive incoming Internet e-mail messages, the server must have only one SMTP virtual server, and that virtual server must have a default IP address of All Unassigned and an assigned TCP port of 25. If more than one SMTP virtual server exists on the Exchange server, or if the IP address or the port assignment is different from the default settings, the wizard will not continue. You can then either restore the Exchange server to its default configuration and rerun the wizard, or you can use Exchange System Manager to configure Exchange manually. Other servers on the Internet expect to connect anonymously to your SMTP virtual server. Therefore, anonymous access must be permitted on your SMTP virtual server. If anonymous access is not configured, the wizard guides you through enabling anonymous access.
480 Configure your recipient policies with the SMTP domains for which you want to receive inbound mail The SMTP domains for which you want to receive Internet mail are configured in Exchange System Manager in Recipient Policies. You must have a recipient policy configured for every SMTP domain for which you want to accept Internet mail, and Exchange must be authoritative for this domain. If your default recipient policy contains the correct mail domain for your organization, use this policy. If you have created multiple recipient policies in Exchange System Manager, you cannot use the wizard to create additional recipient policies. In this case, to add or modify your recipient policies, you must use Exchange System Manager. To configure recipient policies manually, see Configuring Recipient Policies. You must configure MX records in DNS for all mail domains. If you do not have an MX record for your mail domain, DNS cannot accept messages for your domain.
481 As mentioned earlier, the SMTP service is installed as part of the Windows Server 2003 or Windows 2000 Server operating system. SMTP is a component of IIS and runs under a process named Inetinfo.exe. If you remove IIS from a server running Exchange, mail flow stops working. IIS provides a framework process for Internet services such as HTTP, SMTP, and Network News Transfer Protocol (NNTP). Do not confuse IIS with HTTP because several other services, such as SMTP, depend on IIS to function. After you install Exchange, the management of SMTP virtual servers moves to Exchange System Manager, even though the service itself continues to run in IIS. Because of this integration between Exchange and IIS, both the IIS component and the SMTP service that runs in IIS are required for Exchange and SMTP to function correctly. Active Directory Exchange Server 2003 is tightly integrated with the Microsoft Active Directory directory service. Exchange stores all its configuration information in Active Directory, including information about recipient policies, SMTP virtual server configuration, and user mailboxes. However, SMTP reads its settings from the IIS metabase. Therefore, to supply IIS with the information it requires for SMTP functionality, Exchange System Attendant, using a component named DS2MB (directory service to metabase), replicates the configuration information from Active Directory to the IIS metabase. DNS SMTP depends on DNS to determine the Internet protocol (IP) address of its next internal or external destination server. Typically, internal DNS names are not published on the Internet. Therefore, SMTP must be able to contact a DNS server that can resolve external DNS names to send Internet mail, and also a DNS server that can resolve internal DNS names for delivery in the organization. Additionally, for your Exchange servers to receive Internet mail, your DNS server must contain a mail exchange (MX) resource record that points to the A record with the IP address of the SMTP virtual server on your Exchange server that receives Internet mail for your organization. If you are supporting multiple domains, an MX record must exist for each of these domains for DNS to accept mail for the domain. Recipient Policies Recipient policies establish the default e-mail addresses that use a specific protocol (such as SMTP) for a set of users. E-mail addresses define the valid formats for addressing inbound e-mail messages to the Exchange system. The default recipient policy sets the mail domain for which the virtual server accepts incoming e-mail messages. It specifies the default SMTP and X.400 addresses for all Exchange-
482 based mailbox-enabled objects. You can also create additional recipient policies if your organization receives mail for multiple domains, or if your default domain is used strictly for internal purposes and you use a different external mail domain. Any SMTP domain specified in the recipient policies is replicated into the IIS metabase and set as authoritative local domains. Setting these domains as authoritative local domains means that SMTP accepts inbound mail for these domains and is responsible for sending all non-delivery reports for this domain. The only time an SMTP address is not considered local is when you add the address to the recipient policy because you clear the This Exchange Organization is responsible for all mail delivery to this address check box in the SMTP Address Properties dialog box. Installing and correctly configuring the previous components ensures that SMTP functions correctly with Exchange. With SMTP functioning correctly, you can focus on configuring SMTP to meet your organization's needs.
Configuring SMTP
In Exchange, you use SMTP virtual servers and SMTP connectors to control the configuration of SMTP. SMTP virtual servers Essentially, an SMTP virtual server is an SMTP stack (a process or server that both receives e-mail messages and acts as a client for sending e-mail). Each SMTP virtual server represents an instance of the SMTP service on a server. Therefore, a single physical server can host many virtual servers. An SMTP virtual server is defined by a unique combination of an IP address and port number. The IP address is the address on which the SMTP virtual server listens for incoming SMTP connections. The default IP address is All Unassigned, which means that the SMTP virtual server listens on any of the available IP addresses. The port number is the port through which the SMTP virtual server receives communications. The default port number for inbound connections to an SMTP virtual server is port 25.
483 You use Exchange System Manager to control most of the SMTP settings. The property settings of the SMTP virtual server control inbound mail and, to a lesser degree, outbound mail settings. SMTP connectors An SMTP connector designates an isolated route for mail. You can use SMTP connectors to establish a gateway for Internet mail or to connect to a specific domain or mail system. Connectors help you to define specific options for the designated mail route. Although you can send and receive Internet mail using an SMTP virtual server, most companies configure an SMTP connector to route Internet mail. Using an SMTP connector is recommended because it provides an isolated route for mail destined to the Internet. Additionally, more configuration options are available on an SMTP connector than on the SMTP virtual server. Because of the benefits of an SMTP connector, the following sections that describe both the Internet Mail Wizard and the manual procedure for configuring Exchange to send Internet mail include information about creating and configuring an SMTP connector to route Internet mail.
484 assign an Internet IP address to this virtual server because external servers must be able to connect to this SMTP virtual server to send Internet mail. Additionally, you must have an MX record on your DNS server that references this server and the IP address of the Internet SMTP virtual server. Important To increase the security on a dual-homed server, use Internet Protocol security (IPSec) policies to filter ports on the Internet network interface card and strictly limit the users who you permit to log on to this server. For more information about IPSec, see your Windows documentation.
485 addresses through which Exchange sends outbound mail. To control these ports and IP addresses, you must configure the SMTP virtual server. SMTP connectors configured on the virtual server inherit these settings. Two of the SMTP virtual server properties relate directly to configuring Exchange to send Internet mail: The outbound TCP port You make sure that the outbound port is set to port 25 (the default setting). Of the two settings related to sending Internet mail, this is the setting that you must verify. For detailed instructions, see How to Verify an Outbound Port for Mail Delivery Is set to Port 25. Note Changing the default settings on your default SMTP virtual server can cause mail flow problems. The use of an external DNS server To send Internet mail, the DNS server Exchange uses must be able to resolve external (Internet) names. Two common methods for configuring DNS to resolve external names include: Configuring Exchange to point to an internal DNS server that uses forwarders to an external DNS server (this is the easiest and most common method). Configuring Exchange to point to an internal DNS server that does not have a forwarder to an external DNS server, and then configuring an external DNS server on the SMTP virtual server that is responsible for sending external mail.
For detailed instructions, see How to Specify an External DNS Server That Is Used by the SMTP Virtual Server.
486 The outbound TCP port Make sure that the outbound port is set to port 25 (the default setting). Of the two settings related to sending Internet mail, this is the setting that you must verify. The following procedure describes how to verify that the outbound TCP port is set to 25. Note Changing the default settings on your default SMTP virtual server can cause mail flow problems. The use of an external DNS server To send Internet mail, the DNS server Exchange uses must be able to resolve external (Internet) names. For detailed instructions, see How to Specify an External DNS Server That Is Used by the SMTP Virtual Server.
Procedure
To verify that the outbound port used to deliver mail is set to 25 1. In Exchange System Manager, expand Servers, expand <server_name>, expand Protocols, expand SMTP, right-click Default SMTP Virtual Server, and then click Properties. 2. On the Delivery tab, click Outbound connections. 3. In the Outbound Connections dialog box, verify that the TCP port is set to 25. See the following figure. Outbound Connections dialog box
487 Note Remote servers on the Internet expect your server to use TCP port25. Changing this setting is not recommended because other SMTP servers typically accept connections on port25 only.
How to Specify an External DNS Server That Is Used by the SMTP Virtual Server
To control the ports and IP addresses through which Exchange sends outbound mail, you must configure the SMTP virtual server. SMTP connectors configured on the virtual server inherit these settings. Two of the SMTP virtual server properties relate directly to configuring Exchange to send Internet mail: The outbound TCP port Verify that the outbound port is set to port 25, which is the default setting. For detailed instructions, see How to Verify an Outbound Port for Mail Delivery Is set to Port 25. The use of an external DNS server To send Internet mail, the DNS server Exchange uses must be able to resolve external (Internet) names. Two common methods for configuring DNS to resolve external names include: Configuring Exchange to point to an internal DNS server that uses forwarders to an external DNS server. This method is the easiest and most common approach, and it is outlined in the following procedure. Configuring Exchange to point to an internal DNS server that does not have a forwarder to an external DNS server, and then configuring an external DNS server on the SMTP virtual server that is responsible for sending external mail.
Procedure
To specify an external DNS server that is used by the SMTP virtual server 1. In the Default SMTP Virtual Server Properties dialog box, on the Delivery tab,
488 click Advanced. 2. In the Advanced Delivery dialog box, click Configure. 3. In the Configure dialog box (see the following figure), click Add to enter the IP address of an external DNS server. If you are using more than one external DNS server, use the Move Up and Move Down buttons to set the order of preference for the DNS servers. Configure dialog box for external DNS servers
489 This section focuses on the connector's use as a connection method to deliver Internet mail. To configure an SMTP connector to deliver Internet mail, you first must consider the following configuration requirements.
Specifying a smart host The smart host handles DNS resolution and delivers the mail. Although you can specify a smart host on an SMTP virtual server, it is a good idea to set the smart host on the connector itself. The smart host setting on the SMTP connector overrides any smart hosts configured on the SMTP virtual server. If you select this routing method, you specify an IP address or name for the smart host. The IP address and name for the smart host must meet the following requirements: If you specify an IP address for the smart host Enclose the IP address in brackets (for example, [10.0.0.1]), and make sure that the IP address is not the IP address of the Exchange server. If you specify a name for the smart host Ensure that the name is a fully qualified domain name (FQDN). (For example, "Server Name" is not an FQDN. However, servername.contoso.com is an FQDN.) Also, make sure that the name is not the FQDN of the Exchange server.
If you do not have a smart host in your network, contact your Internet service provider (ISP) to determine what IP address or FQDN to use for the smart host. After you have the
490 IP address or FQDN, make sure that the IP address or FQDN meets the previous requirements.
491 Exchange always sends messages through that connector because it has the lowest cost. If Connector1 becomes unavailable, Exchange uses the connector with the next lowest cost, Connector2. Important Do not list your inbound domains on an SMTP address space for a connector. Your inbound domains are listed in your recipient policies. (For more information, see "Configuring Recipient Policies.") If you list some or all your inbound domains in the SMTP address space, you may receive non-delivery reports (NDRs) that indicate a mail loop. (These NDRs may have the diagnostic code 5.3.5.) By specifying domains on the Address Space tab in the connector's Properties dialog box, you can configure these domains as routable domains.
492
Procedure
To enable anonymous access 1. In the Properties dialog box for your SMTP connector, on the Advanced tab, click Outbound Security. 2. In the Outbound Security dialog box, select Anonymous access. See the following figure. Outbound Security dialog box
493
Delivery restrictions
Restricts who can send mail through a connector. By default, the connector accepts mail from everyone. You configure these settings on the DeliveryRestrictions tab of the SMTP connector's Properties dialog box.
Content restrictions
Specifies what types of messages are delivered through a connector. You configure these settings on the Content Restrictions tab of the SMTP connector's Properties dialog box.
Delivery options
If you connect to a network service provider to retrieve your mail, configure a connector to run on a specified schedule, and implement advanced queuing and dequeuing features. You configure these settings on the Delivery Options tab of the SMTP connector's Properties dialog box.
SMTP communication
Controls how the connector uses SMTP to communicate with other SMTP servers. Specifically, you can specify whether the connector uses SMTP or Extended Simple Mail Transfer Protocol (ESMTP) commands to initiate a conversation with another server and control the use of the ERTN and TURN commands. (These commands request that another SMTP server sends the e-mail messages that it has.) You configure these settings on the Advanced tab of the SMTP connector's Properties dialog box.
495
Settings Description
Outbound security
Ensures that any mail flowing through the connector is authenticated. This setting is useful if you want to establish a more secure route for communicating with a partner company. With this setting, you can establish an authentication method and require Transport Layer Security (TLS) encryption. You configure these settings on the Advanced tab of the SMTP connector's Properties dialog box.
For more information about how to configure and verify your DNS configuration, see Configuring SMTP in Microsoft Exchange 2000 Server.
496
Procedure
To enable filtering 1. On the General tab of the SMTP virtual Properties dialog box, click Advanced. 2. Select an IP address, and then click Edit. 3. In the Identification dialog box, enable the filters that you want applied on this virtual server. The following figure shows a virtual server with sender, recipient, and connection filtering enabled. Identification dialog box
497
498
For more information about recipient policies, see "Managing Recipients and Recipient Policies in Exchange Server 2003."
499
To make sure that your MX records are configured correctly, you can use the Nslookup utility. To verify that your server is accessible on port 25 to other servers on the Internet, you can use Telnet. Note For more information about how to configure and verify your DNS configuration, see Configuring SMTP in Microsoft Exchange 2000 Server and your Windows documentation. For detailed instructions, see How to Verify the Inbound Port and IP Address.
500 Configure the inbound port as 25 and specify the IP address Other servers on the Internet expect to connect to your SMTP virtual server on port 25. By default, all SMTP virtual servers use this port. For detailed instructions, see the procedure below. Verify that your SMTP virtual server allows anonymous access To receive Internet mail, your SMTP virtual server must permit anonymous access. Other servers on the Internet expect to communicate anonymously with your SMTP virtual server to send Internet mail to your users. For detailed instructions, see How to Verify an SMTP Virtual Server Is Configured to Allow Anonymous Access. Verify that default relay restrictions are configured on your SMTP virtual server By default, the SMTP virtual server allows only authenticated users to relay e-mail messages. This setting prevents unauthorized users from using your Exchange server to send e-mail messages to external domains. For detailed instructions, see How to Verify an SMTP Virtual Server Is Not Set to Open Relay.
Procedure
To configure or verify the inbound port and IP address In Exchange System Manager, in the Properties dialog box of the SMTP virtual server, on the General tab, click Advanced. The Advanced dialog box appears (see the following figure). By default, your SMTP virtual server uses an IP address of All Unassigned, which means that the virtual server listens for requests on all available IP addresses. You can keep the default IP address, or click Edit to change the address. By default, your SMTP virtual server uses TCP port 25. It is recommended that you do not modify the default port assignment. Advanced dialog box
501
502 running Exchange. Each X.400 connector requires a transport stack on which to run and communicates using the configuration information in that stack. You can create either an X.400 TCP transport stack or an X.400 X.25 transport stack. X.400 connectors X.400 connectors provide a mechanism for connecting Exchange servers with other X.400 systems or Exchange 5.5 servers outside the Exchange organization. An Exchange 2003 server can then send messages using the X.400 protocol over this connector. Important X.400 connectors are only available in ExchangeServer2003 Enterprise Edition. For detailed instructions, see How to Create an X.400 Connector. For detailed instructions, see How to Create an X.400 Protocol Stack.
Procedure
To create a transport stack 1. In Exchange System Manager, expand Protocols, right-click X.400, point to New, and then select either TCP/IP X.400 Service Transport Stack or X.25 X.400 Service Transport Stack. 2. On the General tab, type a name for this transport stack. The following names are the default names: X.25<server name> TCP <server name>
503 3. (Optional) Under OSI address information, select the character set and the selector information if other applications use this transport stack. The following figure shows the General tab of the Properties dialog box for a TCP/IP X.400 transport stack. On this tab, you can configure the transport stack. Any connectors that you configure to use this transport stack appear on the Connectors tab. Note When you first create the connector, the Connectors tab does not list any connectors. General tab of the Properties dialog box for a TCP/IP X.400 transport stack
4.
(Optional) On the General tab of an X.25 transport stack (see the following
504 figure ), set the following X.25-specific configuration options: Based on the information supplied by your X.400 service provider, type the appropriate values for Call user data, Facilities data, and the X.121 address of the remote X.25 provider. For I/O port, type the port number that is used by the X.25 adaptor. (If you have multiple X.25 X.400 transport stacks on a single server, each stack must use a different port number.) General tab of the Properties dialog box for an X.25 protocol stack
505
The following general properties can be set on the X.400 protocol. The entry in the LocalX.400 name box identifies the X.400 account that Exchange uses when it connects to the remote system. This name identifies the MTA to other mail systems. By default, this name is the name of the server where the X.400 service is installed. You can change the local X.400 name by using the Modify button. You can also set a local X.400 password. Third-party systems use this password when connecting to the X.400 service. The Expand remote distribution lists locally option makes a remote distribution list available to users in your organization. When this option is selected and a user sends a message to a remote distribution list, the distribution list expands locally (on the server to which the user is currently connected). Exchange finds the best routing for the message, based on the location of recipients in the list. This method ensures the
507 most efficient message handling. However, note that processing large distribution lists can affect server performance. The Convert incoming messages to Exchange contents option changes the address and contents of incoming messages to a format compatible with MAPI clients, such as Microsoft Outlook and Exchange. Do not select this option if your users do not use a MAPI client. The Modify button in Message queue directory allows you to change the location of the X.400 message queue directory. Note When you modify the location of the queue directory, you are modifying only the MTA database path and moving only the database (.dat) files. You are not moving any of the run files or the run directory. The database files are the core files that are required for starting the MTA, queue files, and message files.
509 General tab of the Properties dialog box for an X.400 connector
When you configure an X.400 connector, you must specify a valid account and password for the remote X.400 system to which you are connecting. You configure these settings on the General tab of the X.400 connector's Properties dialog box.
510
Settings Description
Address space
The address space defines the mail addresses or domains for the e-mail messages that you want routed through a connector. You can specify the X.400 address of a third-party X.400 system or an Exchange 5.5 server to which you are connecting, so that all mail destined to the specified X.400 system is routed through this connector. You configure these settings on the Address Space tab of the X.400 connector's Properties dialog box.
You must specify transport address information for the remote X.400 system to which you are connecting. You configure these settings on the Stack tab of the X.400 connector's Properties dialog box.
Content restrictions
You can specify what types of messages are delivered through a connector. You configure these settings on the Content Restrictions tab of the X.400 connector's Properties dialog box.
511
Settings Description
Scope
You can select either a whole organization or a routing group for the connector's scope. For example, if you create an X.400 connector to send mail to an X.400 system on a server in one routing group, and an X.400 connector exists on a server in another routing group, you may choose to specify a routing group scope for these connectors so that servers in each routing group are forced to use the connector. If an X.400 connector that is set to a routing group scope becomes unavailable, messages queue in the routing group until the connector becomes available. If your user requirements permit this, you can implement the connectors with a routing group scope. You configure these settings on the Address Space tab of the X.400 connector's Properties dialog box.
Override options
By default, the X.400 connector inherits the settings that are configured on the X.400 protocol. To override these settings, you use the Override tab of the X.400 connector's Properties dialog box.
Delivery restrictions
You can restrict who can send mail through a connector. By default, mail is accepted from everyone. You configure these settings on the Delivery Restrictions tab of the X.400 connector's Properties dialog box.
512
513 General tab of the Properties dialog box for an X.400 connector
The configuration options that are available on the Override tab are as follows: The name entered in the Local X.400 Service name box overrides the local X.400 name of the X.400 transport stack. Some X.400 systems do not support certain characters. If your local X.400 name contains characters that are not supported by the remote system to which you are connecting, use this option to connect to the remote X.400 service using a name that it can support. The Maximum open retries option sets the maximum number of times that the system tries to open a connection before it sends a non-delivery report (NDR). The default is 144.
515 The Maximum transfer retries option sets the maximum number of times that the system tries to transfer a message across an open connection. The default is 2. The Open interval (sec) option sets the number of seconds that the system waits after a message transfer fails. The default is 600. The Transfer interval (sec) option sets the number of seconds the system waits after a message transfer fails before resending a message across an open connection. The default is 120.
Tip To restore Exchange default values, click Reset Default Value. To set additional override values, you use the Additional Values dialog box. To open this dialog box, click the Additional Values button on the Override tab in the X.400 connector's Properties dialog box.
In the Additional Values dialog box, you can set these options: The options under RTS values set the Reliable Transfers Service (RTS) values. RTS values determine message reliability parameters, such as the checkpoints to include in data and the amount of unacknowledged data that can be sent. You can use the options on an X.400 connectors' Override tab to override the default X.400 service attributes, such as RTS values. The options under Association parameters determine the number and duration of connections to the remote system. Each X.400 connector uses the association parameters that are configured on the X.400 protocol, but you can configure association parameters on each connector to override the settings. The options under Transfer timeouts determine how long the X.400 connector waits before sending an NDR for urgent, normal, and not urgent messages. Each X.400
517 connector uses the transfer timeout values that are configured on the X.400 MTA, but you can configure specific transfer timeout values on each connector that override these settings.
In Exchange Server 2003, Queue Viewer is enhanced to improve the monitoring of message queues. In Exchange 2003, you can view all the messaging queues for a
518 specific server from the Queues node under each server. This is an improvement over Exchange 2000, where each protocol virtual server has its own Queues node, and you cannot view all queues on a server from a central location. For example, using Exchange 2003, you can now use Queue Viewer to view both the X.400 and SMTP queues on a server (as in Figure 5.24), rather than having to view each of these queues separately in each of their respective protocol nodes. Other enhancements to Queue Viewer in Exchange 2003 include: Disabling outbound mail You can use a new option named Disable Outbound Mail to disable outbound mail from all SMTP queues. Setting the refresh rate You can use the Settings option to set the refresh rate of Queue Viewer. Finding messages You can use Find Messages to search for messages based on the sender, recipient, and message state. This option is similar to enumerating messages in Queue Viewer in Exchange 2000. For detailed instructions, see How to Use the Find Messages Option. Viewing additional information You can click a specific queue to view additional information about that queue. Viewing previously hidden queues Queue Viewer in Exchange 2003 exposes three queues that were not visible in Exchange 2000: DSN messages pending submission, Failed message retry queue, and Messages queued for deferred delivery.
The remainder of this section highlights two of these new enhancements, disabling outbound mail and finding messages, and also provides guidelines for how to use the SMTP and X.400 queues shown in Queue Viewer to troubleshoot message flow.
519
Procedure
To search for messages by a particular sender (or recipient) In Queue Viewer, click Find Messages, click Sender (or Recipient), and then search by typing the name or using the search criteria.
To specify the number of messages that you want returned by a search In Queue Viewer, click Find Messages, click the Number of messages to be listed in the search list, and select the number of messages (for example, 500) that you want listed in the search.
To search for messages in a particular state 1. In Queue Viewer, click Find Messages, click the Show messages whose state is list, and select from the following options: All Messages This option shows all the messages in the list regardless of the state that they are in. Frozen This option shows the messages that are in a frozen state. Besides freezing all messages in a specific queue, a single message can also be frozen. If a single message or several messages in a queue are frozen, other messages can still flow into or out of this queue. The whole queue is not frozen. Retry This option shows the messages that are awaiting another delivery attempt. Messages in the retry state have failed one or more delivery attempts.
2. After you have specified your search criteria, click Find Now to start the search. The results of the search appear under Search Results.
520
Contains delivery status notifications, also known as non-delivery reports (NDRs), which are ready to be delivered by Exchange. Note The following operations are unavailable for this queue: Delete All Messages (no NDR) and Delete All Messages (NDR).
Messages can accumulate in this queue if the store service is unavailable or not running, or if problems exist with the IMAIL Exchange store component, which is the store component that performs message conversion. Check the event log for possible errors with the store service.
Contains messages that Exchange did not deliver, but that the serve try to send again. Note The following operations are unavailable for this queue: Delete All Messages (no NDR) and Delete All Messages (NDR).
Messages can accumulate in this queue if a problem exists with DNS or SMTP. Check the event log to determine whether an SMTP problem exists. Verify your DNS configuration using NSlookup or another utility. On rare occasions, a corrupted message can remain in this queue. To determine whether a message is corrupted, try to view its properties. If some properties are not accessible, this can indicate message corruption.
522
Queue name Description Causes of message accumulation
Contains messages queued for delivery later, including messages sent by earlier versions of Outlook clients. (You can set this option in Outlook clients.) Messages sent by earlier versions of Outlook treat deferred delivery slightly differently. Earlier versions of Outlook depend on the MTA for message delivery because SMTP, not the MTA, now handles message delivery. These messages remain in this queue until their scheduled delivery time.
Possible causes of message accumulation include: Messages are sent to a user's mailbox while the mailbox is being moved. The user does not yet have a mailbox created, and no master account security identifier (SID) exists for the user. For more information, see Microsoft Knowledge Base Article 316047, "XADM: Addressing Problems That Are Created When You Enable ADC-Generated Accounts." The message may be corrupted, or the recipient may not be valid.
To determine if a message is corrupted, verify its properties. If some properties are not accessible, this can indicate a corrupted message. Also, verify that the recipient is valid.
523
Queue name Description Causes of message accumulation
Local delivery
Contains messages that are queued on the Exchange server for local delivery to an Exchange mailbox.
Messages can accumulate in this queue if the Exchange server is not accepting messages for local delivery. Slow or sporadic message delivery can indicate a looping message or a performance problem. This queue is affected by the Exchange store. Increase diagnostic logging for the Exchange store as described in "Configuring Diagnostic Logging for SMTP."
Contains messages addressed to recipients who have not yet been resolved against Active Directory. Messages are also held here while distribution lists are expanded.
Typically, messages accumulate in this queue because the advanced queuing engine cannot categorize the message. The advanced queuing engine may not be able to access the global catalog servers and access recipient information, or the global catalog servers are unreachable or performing slowly. The categorizer affects this queue. Increase diagnostic logging for the categorizer as described in "Configuring Diagnostic Logging for SMTP."
524
Queue name Description Causes of message accumulation
Holds messages until their next-destination server is determined, and then moves them to their respective link queues.
Messages accumulate in this queue if Exchange routing problems exist. Message routing may be experiencing problems. Increase diagnostic logging for routing as described in "Configuring Diagnostic Logging for SMTP."
Holds messages destined for a remote delivery. The name of the queue matches the remote delivery destination, which may be a connector, a server, or a domain.
If messages accumulate in this queue, you must first identify the status of the queue. If the queue status is Retry, check the queue properties to determine the reason that it is in this state. For DNS issues, use Nslookup and Telnet to troubleshoot. If the host is unreachable, use Telnet to make sure that the remote server is responding.
525
Queue name Description Causes of message accumulation
Contains messages for which the final destination server cannot be reached. For example, Exchange cannot determine a network path of the final destination.
Messages can accumulate in this queue if no route exists for delivery. Additionally, when a connector or a remote delivery queue is unavailable or in Retry for a while, and no alternative route exists to the connector or remote destination, new messages queue here. Messages can remain in this queue until an administrator fixes the problem or defines an alternative route. To get new messages to flow to their remote destination queue, helping you to force a connection and get a Network Monitor (NetMon) trace, restart the SMTP virtual server. Messages that are accumulating constantly may indicate a performance problem. Occasional peaks in performance can cause messages to appear in this queue intermittently. Message accumulation in this queue can also indicate problems with a custom event sink or a third-party event sink.
Pre-submission
Holds messages that have been acknowledged and accepted by the SMTP service. The processing of these messages has not begun.
526 For detailed instructions, see the following topics: How to Verify an SMTP Virtual Server Is Not Set to Open Relay How to Verify an SMTP Virtual Server Is Configured to Allow Anonymous Access How to Verify the Inbound Port and IP Address
Procedure
To verify that your SMTP virtual server is not set to open relay 1. In Exchange System Manager, in the Properties dialog box of the SMTP virtual server, on the Access tab, click Relay.
527 2. In the Relay Restrictions dialog box (see the following figure), select Only the list below (if it is not already selected), click Add, and follow the instructions to add only those hosts that you want to allow to relay mail to the list. Note If you select All except the list below, unauthorized users might access your server to distribute unsolicited e-mail messages on the Internet. Relay Restrictions dialog box
3. Select Allow all computers which successfully authenticate to relay, regardless of the list above (if it is not already selected). This setting allows you to deny relay permissions to all users who do not authenticate. Any remote Internet Message Access Protocol version 4 (IMAP4) and Post Office Protocol version 3 (POP3) users who access this server will authenticate to send mail. If you do not have users who access this server
528 through IMAP4 or POP3, you can clear this check box to prevent relaying completely, thereby increasing security. You can also designate a specific server for IMAP4 and POP3 users, and then clear this check box on all other Internet gateway servers.
Procedure
To verify that your SMTP virtual server is configured to allow anonymous access 1. In Exchange System Manager, in the Properties dialog box of the SMTP virtual server, on the Access tab, click Authentication. 2. In the Authentication dialog box, select the Anonymous access check box if it
529 is not already selected. See the following figure. Authentication dialog box
530 X.400 queues on the Exchange server. If you experience mail flow problems when sending mail to servers that are running Exchange 5.5 or earlier, it is a good idea to also check the MTA queues on those servers. For detailed instructions, see How to Configure Diagnostic Logging for the X.400 Service (MSExchangeMTA). The following table the X.400 queues, their descriptions, and troubleshooting information for message accumulation in each queue. X.400 queues
Queue name Description Causes of message accumulation
PendingRerouteQ
Contains messages that are waiting to be rerouted after a temporary link outage.
Messages can accumulate in this queue if a route to a connector, to a different mail system, or to an Exchange 5.5 server is unavailable. Messages can accumulate in this queue when Exchange 2003 experiences problems sending to another mail system, to an Exchange 5.5 server, or through an X.400 link. Increase diagnostic logging for the X.400 service as described in "How to Configure Diagnostic Logging for the X.400 Service (MSExchangeMTA)."
Contains messages destined to one of the following: Another gateway, such as a connector for Lotus Notes or Novell GroupWise. An X.400 link to an Exchange 5.5 site or a destination outside the organization. An Exchange MTA over the LANfor example, destined to an Exchange 5.5 server in a mixedmode environment.
531
Procedure
To configure logging for MSExchangeMTA 1. In the console tree, expand Servers, right-click <server name>, and then click Properties. 2. Click the Diagnostics Logging tab. 3. Under Services, click MSExchangeMTA. 4. Under Categories, click X.400 Service to troubleshoot delivery problems to servers running Exchange 5.5 and earlier, and other systems. 5. Under Logging level, click None, Minimum, Medium, or Maximum. Click Maximum for troubleshooting purposes.
532 control the amount of data that is logged in the application log. The more events that are logged, the more transport-related events that you can view in the application log. Therefore, you have a better chance of determining the cause of the message flow problem. The SMTP log file is located in the Exchsrvr\Server_name.log folder. As discussed in "Using SMTP Queues to Troubleshoot Message Flow" and "Using X.400 (MTA) Queues to Troubleshoot Message Flow," issues with specific routing and transport components can cause messages to accumulate in a queue. If you are having problems with a specific queue, increase the logging level for the component that is affecting the queue. For detailed instructions, see the following procedures: How to Enable Debug Level Logging How to Modify Logging Settings
533
Procedure
To enable logging at the debugging level 1. Start Registry Editor. 2. In Registry Editor, locate and then click the following registry key:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\ MSExchangeTransport\Diagnostics\SMTP Protocol
Procedure
To modify logging settings for MSExchangeTransport 1. In the console tree, expand Servers, right-click <server name>, and then click Properties. 2. Click the Diagnostics Logging tab. 3. Under Services, click MSExchangeTransport. 4. Under Categories, click the category for which you want to configure the logging level:
534 To troubleshoot routing issues, select Routing Engine/Service. Increase the logging level for this component if messages are accumulating in the Messages waiting to be routed SMTP queue. To troubleshoot problems with address resolution in Active Directory, distribution list expansion, and other categorizer issues, select Categorizer. Increase the logging level for this component if messages are accumulating in the Messages waiting to be routed SMTP queue. To troubleshoot issues with dial-up and virtual private network connectivity through Connection Manager, select Connection Manager. To troubleshoot problems with the queuing engine, select Queuing Engine. Increase the logging level for this component if you are experiencing mail flow problems, and mail is not accumulating in any of the queues. To troubleshoot issues with the Exchange store driver, select Exchange Store Driver. Increase the logging level for this component if messages are accumulating in the local delivery SMTP queue, the X.400 queues, or if you have problems receiving mail from Exchange 5.x servers or other mail systems. To troubleshoot general SMTP issues, select SMTP Protocol. Increase the logging level for this component if messages are accumulating in the Remote delivery SMTP queue to determine if SMTP errors are causing the bottleneck. To troubleshoot issues with the NTFS store driver, select NTFS Store Driver. Increase the logging level for this category if messages are accumulating in the local delivery SMTP queue.
5. Under Logging level, click None, Minimum, Medium, or Maximum. Click Maximum for troubleshooting purposes.
535 Some of these tools are installed with Microsoft Windows, some with Exchange, and others can be found at the "Downloads for Exchange 2003" Web site (http://go.microsoft.com/fwlink/?LinkId=25097). The following table lists these tools. However, be aware that not all tools are supported. Note Some tools can cause serious, sometimes irreversible, problems if used incorrectly. Before using tools in your production environment, always familiarize yourself with them on test servers first. Make sure to read the documentation associated with any tool and familiarize yourself with the risks involved. Exchange Tools
Tool name Description Run from Install from
Use to find and merge multiple accounts in Active Directory that refer to the same person.
Start | All Programs | Microsoft Exchange | Deployment | Active Directory Account Cleanup Wizard Start | All Programs | Microsoft Exchange | Active Directory Connector Start | All Programs | Microsoft Exchange | Active Directory Users and Computers
Use to replicate Exchange 5.5 directory objects to Active Directory. Use this MMC snap-in to manage mail recipients and other Active Directory objects.
Exchange CD <drive>:\ADC\i386\setup.e xe
536
Tool name Description Run from Install from
Use to rewrite return e-mail addresses on outgoing messages routed from non-Exchange mail systems to Exchange and destined outside the organization. Use for low level editing of Active Directory. Use to package and deploy Exchange store applications on the Exchange store.
Start | All Programs | Exchange SDK | Exchange SDK Development Tools | Application Deployment Wizard <drive>:\Program Files\Exchange SDK\SDK\Sample s\Security
Use to access and modify XML content provided by the security descriptor.
Download the Exchange 2003 SDK Documentation and Samples March 2004 at http://go.microsoft.com/fwli nk/?LinkId=28056
537
Tool name Description Run from Install from
Use to archive message and log information about messages sent to or received by an Exchange server. Use to force a restored directory database to replicate to other servers after restoring from a backup. Use this tool only when Microsoft Product Support Services asks you to do so. Use to configure, control, and monitor clusters.
In Windows Server 2003, installed by default In Windows 2000 Server, installed when Cluster Service component is selected during setup.
538
Tool name Description Run from Install from
Install and run on http://go.microsoft.com/fwli Use in test environments to the mobile device. nk/?LinkId=25097 disable certificate authentication for Microsoft Outlook Mobile Access. Use to troubleshoot Domain Name System (DNS) issues. The tool simulates the Simple Mail Transfer Protocol (SMTP) service's internal codepath and prints diagnostic messages that indicate how the DNS resolution is proceeding. Command prompt http://go.microsoft.com/fwli nk/?LinkId=25097 Must be installed to <drive>:\windows\ system32\inetsrv
539
Tool name Description Run from Install from
DSACLS (dsacls.exe)
DSACLS is a Command prompt Windows Server 2003 CD command-line <drive>:\support\tools\supt tool that you ools.msi can use to query and change permissions and security attributes of Active Directory objects. It is the command-line equivalent of the Security tab in the Windows 2000 Server Active Directory snapin tools such as Active Directory Users and Computers and Active Directory Sites and Services. For more information about DSACLS, see Microsoft Knowledge Base article 281146, "How to Use Dsacls.exe in Windows 2000" (http://go.micro soft.com/fwlink/ ?linkid=3052&k bid=281146)
540
Tool name Description Run from Install from
Error Code Look-up Use to determine error (Err.exe) values from decimal and hexadecimal error codes in Windows products. Event Viewer (eventvwr.msc) Use this MMC snap-in to view logged events, such as errors and warnings. Use to monitor the performance, availability, and security of Microsoft Exchange Server 2003, alerting you to events that have a direct effect on server availability, while filtering out events that require no action.
Start | All Programs | Administrative Tools | Event Viewer Microsoft Operations Manager
http://go.microsoft.com/fwli nk/?LinkId=25097 Requires Microsoft Operations Manager. For more information about Microsoft Operations Manager, see http://www.microsoft.com/ mom/
541
Tool name Description Run from Install from
Use to explore Exchange store folders, items, and their property values. Create property and content class definitions and configure their schema scope.
Start | All Programs | Exchange SDK | Exchange SDK Development Tools | Exchange Explorer
http://go.microsoft.com/fwli nk/?LinkId=18614
Use to perform <drive>:\Program offline database Files\Exchsrvr\bin procedures, such as defragmentatio n and integrity checking. Use this guide to review the recommended steps and tools that help you successfully install Exchange Server 2003. Use to migrate user accounts to Exchange 2003. Run from Exchange CD
542
Tool name Description Run from Install from
Use to create a Microsoft Visual Basic project for a Component Object Model (COM) class of correctly implemented event interfaces, and a module of functions and routines that use event sink support interfaces. Use to display a hierarchical list of node objects that corresponds to folders in the Exchange store.
http://go.microsoft.com/fwli nk/?LinkId=18614 (Use the Add-In Manager in Visual Basic to make the Event Sink Wizard available on the Visual Basic Add-Ins menu.)
543
Tool name Description Run from Install from
Use to test stress and performance. This tool simulates large numbers of client sessions, by concurrently accessing one or more protocol servers.
Command prompt 2003 version: http://go.microsoft.com/fwli nk/?LinkId=25097 2000 version: http://go.microsoft.com/fwli nk/?LinkId=1709
Use this MMC snap-in to provide a graphical view of an Exchange organization where you can perform many administrative tasks.
Exchange Workflow Use Configuration wfsetup.vbs to Scripts configure the server for (wfsetup.vbs; correct addwfrole.vbs) workflow functionality. Use addwfrole.vbs to add users to workflow event sink security roles.
544
Tool name Description Run from Install from
GUIDGen (GUIDGEN.EXE)
Use to generate Command prompt http://go.microsoft.com/fwli globally unique nk/?LinkId=25097 identifiers (GUIDs). Use to find and remove errors in the public and private information store databases. Intended for disaster recovery situations and not for routine maintenance. Command prompt Exchange CD <drive>:\setup\i386\exchan ge\bin
545
Tool name Description Run from Install from
Use to view or set details about a user's message storage files. These files are the private information store, the personal folder file (.pst file), and the offline folder file (.ost file). This tool browses storage, address book, and other MAPI providers by executing MAPI calls specified by a user.
Internet Information Use to Services (IIS) configure Manager Outlook Web Access (iis.msc) settings.
Start | All Programs | Administrative Tools | Internet Information Services (IIS) Manager
546
Tool name Description Run from Install from
Use to replicate public folder information (including free/busy information) between Exchange organizations. Can be used between forests. Use for stress testing the Exchange database engine and storage subsytem. Use to perform Lightweight Directory Access Protocol (LDAP) searches against Active Directory. Use as a benchmarking tool to test the response of servers to mail loads.
Jetstress (JetStress.exe)
LDP (ldp.exe)
547
Tool name Description Run from Install from
Command prompt http://go.microsoft.com/fwli Use to extract data from nk/?LinkId=25097 mailboxes on an Exchange server, and then merge that data into mailboxes on another Exchange server. Use in managed Windows applications to display a hierarchical list of nodes that correspond to a mail or public folder hierarchy. Add, delete, and move folders in the Exchange store. Use to scan local or remote systems for common misconfiguratio ns and to verify security best practices. <drive>:\Program Files\Exchange SDK\Tools\ExchT reeViewControl http://go.microsoft.com/fwli nk/?LinkId=18614 To use this tool, you must add a reference to it in a Microsoft Visual Studio .NET project, and then add it to the toolbox in the project.
Microsoft Baseline Security Analyzer (MBSA) GUI: (MBSA.exe) Command Line: (mbsacli.exe)
548
Tool name Description Run from Install from
Command prompt http://go.microsoft.com/fwli Use to import Lotus cc:Mail nk/?LinkId=25097 archive files to folders in an Exchange 2003 mailbox store or to one or more .pst files. Use when MTA will not start, because of corruption or suspected corruption in the MTA database. This tool provides a soft recovery of a corrupted MTA database. Command prompt http://go.microsoft.com/fwli nk/?LinkId=25097
Use to diagnose issues with server connectivity. Use for establishing a baseline of performance and for troubleshooting performance issues.
Start | All Programs Administrative Tools | Network Monitor Start | All Programs | Administrative Tools | Performance
549
Tool name Description Run from Install from
PFMigrate (pfmigrate.wsf)
Use to migrate Command prompt Exchange CD public folders <drive>:\support\ExDeploy from Exchange 5.5 to Exchange 2003. Can also be used to move the offline address book, Schedule+ Free/Busy folder, and organization forms. Command prompt http://go.microsoft.com/fwli Use to confirm the RPC nk/?LinkId=18615 connectivity between the computer that is running Microsoft Exchange Server and any of the client workstations on the network.
550
Tool name Description Run from Install from
Use to programmaticall y set Internet Protocol (IP) restrictions on an SMTP virtual server. Programmatical ly add IP addresses on the global accept and deny lists for connection filtering. Use to troubleshoot Exchange mail flow.
Running exipsec.exe installs the required DLL so that you can access the COM object from the script you create.
http://go.microsoft.com/fwli nk/?LinkId=25097
Telnet (telnet.exe)
WinRoute (winroute.exe)
Use to connect Command prompt http://go.microsoft.com/fwli nk/?LinkId=25097 to the link state port (TCP/IP 691) on an Exchange server and extract the link state information for an organization.
551
Manual
Allows sharing of Lotus Notes and Novell GroupWise Free/Busy Information. Dependencies: Event Log, Microsoft Exchange Information Store, Microsoft Exchange Connectivity Controller
Manual
Provides support services for Microsoft Exchange connectors. Dependencies: Event Log
Allows sharing of mail traffic with Lotus Notes systems. Dependencies: Event Log, Microsoft Exchange Connectivity Controller
Allows sharing of mail traffic with Novell GroupWise systems. Dependencies: Event Log, Microsoft Exchange Connectivity Controller, Microsoft Exchange Router for Novell GroupWise
553
Service display name/abbreviation Default startup type Description and dependencies
Manual
Monitors folders and triggers events for server applications compatible with Exchange Server 5.5. Dependencies: Microsoft Exchange Information Store
Disabled
Provides Internet Message Access Protocol version 4 (IMAP4) services to clients. If this service is stopped, clients cannot connect to this computer using IMAP4. Dependencies: IIS Admin Service
Automatic
Manages the Exchange store. The service makes mailbox stores and public folder stores available. If this service is stopped, mailbox stores and public folder stores on this computer are unavailable. If this service is disabled, any services that explicitly depend on it cannot start. Dependencies: Microsoft Exchange System Attendant
554
Service display name/abbreviation Default startup type Description and dependencies
Automatic
Provides Exchange management information using Windows Management Instrumentation (WMI). If this service is stopped, WMI providers implemented to work in Microsoft Exchange Management, like message tracking and Directory Access, will not work. Dependencies: Remote procedure call (RPC), WMI
Automatic
Provides Exchange X.400 services. You use Exchange X.400 services to connect to Exchange 5.5 servers and other connectors (custom gateways). If this service is stopped, Exchange X.400 services are unavailable. Dependencies: Microsoft Exchange System Attendant
Disabled
Provides Post Office Protocol version 3 (POP3) services to clients. If this service is stopped, clients cannot connect to this computer using POP3. Dependencies: IIS Admin Service
555
Service display name/abbreviation Default startup type Description and dependencies
Manual
Provides support for scheduling collaboration with Novell GroupWise systems. Dependencies: None
Automatic
Provides topology and routing information to servers running Exchange 2003. If this service is stopped, optimal routing of messages will not be available. Dependencies: IIS Admin Service
556
Service display name/abbreviation Default startup type Description and dependencies
Disabled
Provides directory interoperability between Exchange 5.5 and Exchange 2000 Server or Exchange 2003. Site Replication Service (SRS) acts as a directory replication bridgehead server for an Exchange site. SRS runs on Exchange 2000 and serves as a modified Exchange 5.5 directory. SRS uses Lightweight Directory Access Protocol (LDAP) to communicate to both the Active Directory directory service and the Exchange 5.5 directory. To Exchange 5.5, SRS looks similar to another Exchange 5.5 configuration/recipients replication partner. Note Enabled by default on computers that have Active Directory Connector (ADC). Dependencies: Microsoft Exchange System Attendant
557
Service display name/abbreviation Default startup type Description and dependencies
Automatic
Provides monitoring, maintenance, and Active Directory lookup services (for example, monitoring of services and connectors, proxy generation, Active Directory to metabase replication, publication of free/busy information, offline address book generation, mailbox maintenance, and forwarding Active Directory lookups to a global catalog server). If this service is stopped, monitoring, maintenance, and lookup services are unavailable. If this service is disabled, any services that explicitly depend on it cannot start. Dependencies: Event Log, NTLM Security Support Provider, Remote Procedure Call (RPC), Server, Workstation
Note The following Exchange services are set to manual, if installed on a cluster: IMAP4Svc, MSExchangeMTA, MSExchangeSA, MSExchangeIS, SMTPsvc, NNTPsvc, REsvc, MSExchangeMGMT. You must enable the following Microsoft Windows services before you run Exchange Setup: World Wide Web service Simple Mail Transfer Protocol (SMTP) service Network News Transfer Protocol (NNTP) service
558
Note All four nodes of this cluster are running Microsoft Windows Server 2003 Enterprise Edition and Microsoft Exchange Server 2003 Enterprise Edition. The recommended four-node cluster can handle a single node failure at a time and maintain 100 percent availability after the failover has occurred. A second failure during
559 this period leaves the cluster in a partially up state. To illustrate this concept, here is an example: First failure If Node 1 fails, Node 2 still owns EVS2, Node 3 still owns EVS3, and Node 4 takes ownership of EVS1 with all the storage groups mounted after the failover. Second failure If another node fails while Node 1 is still recovering from the failure, the Exchange Virtual Server on the second failed node tries to fail over to a node not hosting an Exchange Virtual Server. Because failover is not possible, the second Exchange Virtual Server remains in a failed state.
The following tables list the recommended configuration settings for this four-node cluster. Exchange Virtual Server settings
Properties dialog box Tab Recommended settings
Preferred Owners Node 1 Preferred Owners Node 2 Preferred Owners Node 3 Prevent Failback This default option disables failback on each ESV. The administrator can move the server back at an appropriate time.
Exchange Resource
General
560
Properties dialog box Tab Recommended settings
Exchange Resource
Advanced
Restart This default option enables Cluster Service to try to restart the resource after the initial failure of the resources. To enable Restart, select the Affect the group check box with a threshold of 3 and a period of 900 seconds. Pending Timeout 3 minutes (default) As mentioned in "Setting Pending States," the Exchange store instance is not restricted by this setting when coming online.
Copyright
The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. This White Paper is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means
561 (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property. Unless otherwise noted, the companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted in examples herein are fictitious. No association with any real company, organization, product, domain name, e-mail address, logo, person, place, or event is intended or should be inferred. 2006 Microsoft Corporation. All rights reserved. Microsoft, MS-DOS, Windows, Windows Server, Windows Vista, Active Directory, ActiveSync, ActiveX, Entourage, Excel, FrontPage, Hotmail, JScript, Microsoft Press, MSDN, MSN, Outlook, SharePoint, Visual Basic, Visual C++, Visual Studio, Win32, Windows Mobile, Windows NT, and Windows Server System are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. All other trademarks are property of their respective owners.