Free ebooks from Microsoft Press
Errata, updates, & book support
Chapter 1 Install, configure, and manage the mailbox role
Objective 1.1: Plan the mailbox role
Planning for storage requirements
Planning mailbox role capacity and placement
Designing public folder placement strategy
Validating storage by running Jetstress
Objective 1.2: Configure and manage the mailbox role
Deploying mailbox server roles
Creating and configuring Offline Address Book
Designing and creating hierarchical address lists
Creating and configuring public folders
Objective 1.3: Deploy and manage high availability solutions for the mailbox role
Creating and configuring a Database Availability Group
Managing mailbox database copies
Objective 1.4: Monitor and troubleshoot the mailbox role
Troubleshooting database replication and replay
Troubleshooting database copy activation
Troubleshooting mailbox role performance
Monitoring database replication
Objective 1.5: Develop backup and recovery solutions for the mailbox role and public folders
Determining the most appropriate backup solution/strategy
Performing a dial tone restore
Performing item-level recovery
Recovering the public folder hierarchy
Recovering a mailbox server role
Objective 1.6: Create and configure mail-enabled objects
Configuring resource mailboxes and scheduling
Configuring distribution lists
Objective 1.7: Manage mail-enabled object permissions
Configuring mailbox permissions
Setting up room mailbox delegates
Objective 1.1: Thought experiment
Objective 1.2: Thought experiment
Objective 1.3: Thought experiment
Objective 1.4: Thought experiment
Objective 1.5: Thought experiment
Objective 1.6: Thought experiment
Objective 1.7: Thought experiment
Chapter 2 Plan, install, configure, and manage client access
Objective 2.1: Plan, deploy, and manage a Client Access Server (CAS)
Designing to account for differences between legacy CAS and Exchange 2013 CAS
Configuring Office Web Apps server
Objective 2.2: Plan and configure namespaces and client services
Designing namespaces for client connectivity
Configuring authentication methods
Objective 2.3: Deploy and manage mobility solutions
Configuring Exchange ActiveSync Policies
Mobile device mailbox policies
Configuring allow/block/quarantine policies
Deploying and manage Office Apps
Objective 2.4: Implement load balancing
Configuring namespace load balancing
Configuring Session Initiation Protocol (SIP) load balancing
Configuring Windows Network Load Balancing (WNLB)
Objective 2.5: Troubleshoot client connectivity
Troubleshooting Outlook Anywhere connectivity
Troubleshooting mobile devices
Objective 2.1: Thought experiment
Objective 2.2: Thought experiment
Objective 2.3: Thought experiment
Objective 2.4: Thought experiment
Objective 2.5: Thought experiment
Chapter 3 Plan, install, configure, and manage transport
Objective 3.1: Plan a high availability solution for common scenarios
Understanding transport high availability and message routing
Planning for shadow redundancy
Planning for redundant MX records
Objective 3.2: Design a transport solution
Plan for Domain Secure and TLS
Design message hygiene solutions
Design shared namespace scenarios
Objective 3.3: Configure and manage transport
Configuring Send and Receive connectors
Objective 3.4: Troubleshoot and monitor transport
Interpreting message tracking and protocol logs
Troubleshooting SMTP message flow
Troubleshooting Domain Secure and TLS
Troubleshooting shared namespaces
Objective 3.5: Configure and manage hygiene
Objective 3.1: Thought experiment
Objective 3.2: Thought experiment
Objective 3.3: Thought experiment
Objective 3.4: Thought experiment
Objective 3.5: Thought experiment
Chapter 4 Design and manage an Exchange infrastructure
Objective 4.1: Plan for impact of Exchange on Active Directory services
Planning Active Directory deployment
Determining DNS changes required for Exchange
Preparing Active Directory for Exchange
Objective 4.2: Administer Exchange workload management
Monitoring system and user workload events
Managing workload throttling settings
Objective 4.3: Plan and manage role based access control
Determine appropriate RBAC roles and cmdlets
Limit administration using existing role groups
Evaluate differences between RBAC and Active Directory split permissions
Configure a custom-scoped role group
Objective 4.4: Design an appropriate Exchange solution for a given SLA
Plan for change management and updates
Design a solution that meets SLA requirements around scheduled downtime
Design a solution that meets SLA requirements around message delivery
Objective 4.1: Thought experiment
Objective 4.2: Thought experiment
Objective 4.3: Thought experiment
Objective 4.4: Thought experiment
What do you think of this book? We want to hear from you!
Microsoft is interested in hearing your feedback so we can continually improve our books and learning resources for you. To participate in a brief online survey, please visit:
18.223.0.53