exchange 2003 is the latest version of the extremely powerful

Upload: vishnu-madhavan-nair

Post on 07-Apr-2018

218 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/4/2019 Exchange 2003 is the Latest Version of the Extremely Powerful

    1/24

    Exchange 2003 is the latest version of the extremely powerful, feature-rich, and popular client-server messagingapplication from Microsoft. As Microsoft Windows networks and messaging requirements have evolved over time, so hasMicrosoft's flagship messaging and groupware product. With Exchange 2003, Microsoft has raised the bar by which anyserious enterprise-level messaging and groupware application are measured.

    Exchange 2003 provides the following features to an organization:

    E-mail messaging using Microsoft Outlook 2003 and other POP3 (Post Office Protocol version 3) and IMAP4(Internet Message Access Protocol version 4) clients.

    OWA (Outlook Web Access), which closely mimics the user experience of Outlook 2003 when Microsoft InternetExplorer 5.0 or later is used.

    Outlook Mobile Access, which replaces MIS (Mobile Information Server), and provides seamless Exchangeaccess to mobile clients.

    Public folders, which support document sharing and collaboration and numerous third-party applications.

    Integrated administration and management capabilities that allow an entire enterprise Exchange organization tobe easily managed from a single location or numerous locations as business requirements dictate.

    Delegated administrative responsibility, allowing the senior Exchange administrator to delegate responsibility for

    discrete portions of the Exchange organization to other administrators by job function or geographical location.

    Tight integration with Active Directory for increased security and reliability, simpler management and scalability.

    Multiple address lists that can be created and managed to fulfill specific business or security requirements withinthe organization.

    Highly available and redundant messaging system access through the use of NLB (Network Load Balancing)front-end clusters and MSCS (Microsoft Clustering Service) back-end clusters.

    Increased messaging security using RPC (Remote Procedure Call) over HTTP (Hypertext Transfer Protocol) forremote Outlook access, HTTP with SSL (Secure Sockets Layer) for remote OWA access and POP3 and IMAP4

    with SSL for remote client access.

    Interoperability with foreign messaging systems, such as Lotus Notes, Novell GroupWise, X.400 systems, andInternet mail.

    Migration paths from numerous legacy and foreign messaging systems, such as Lotus Notes, Lotus cc:Mail,Novell GroupWise, X.400 systems, MS Mail, and previous versions of Exchange Server.

    Exchange 2003 is more than just a fresh face and an updated name over its predecessor; it has a host of new andimproved features that you'll find out about in this course. The changes in Exchange 2003 since the Exchange 2000Server version can be broken down into three areas for easier digestion:

    What's new in Exchange 2003? What's improved in Exchange 2003?

    What's no longer supported in Exchange 2003?

    Bear in mind, however, that this is just the tip of the iceberg. If you'd like to get a complete listing of what's new inExchange 2003, be sure to visit the Microsoft Exchange Server Web site.

    This section covers the new features that Exchange 2003 offers over Exchange 2000 Server.

    http://www.microsoft.com/exchangehttp://www.microsoft.com/exchange
  • 8/4/2019 Exchange 2003 is the Latest Version of the Extremely Powerful

    2/24

    Query-based distribution groups

    One of the most time-consuming responsibilities an Exchange administrator faces daily is managing and maintainingdistribution groups so their membership is always accurate. When users join or leave the organization or move to adifferent business unit or department, one or more distribution lists must be updated to reflect the changes. Thisdistribution list management is expensive -- in both administrative time and effort, as well as the network traffic thatensues after a change has been made.Distribution and security groups are covered in more detail in Lesson 4.To help alleviate this problem, Exchange 2003 features an entirely new type of distribution group: the query-baseddistribution group. Query-based distribution groups have their group membership dynamically determined each time a

    message is sent to the group through the results of an LDAP (Lightweight Directory Access Protocol) query that'sperformed against Active Directory. Only those recipient objects that match the query parameters are returned; therefore,only those recipients receive a copy of the message that is sent to that distribution group. If a malformed LDAP query isspecified, a user who sends a message to the query-based distribution group receives an NDR (Non Delivery Report);however, if the LDAP query returns an empty group (no matches made), no NDR is generated.More specifically, the query is performed against a Global Catalog server. This is important because not every attribute ofan object is replicated to the Global Catalog; therefore, the LDAP query used to create a query-based distribution groupmust be created with this fact in mind.Although query-based distribution groups may sound like the end-all solution for distribution group management, note thatthe power and flexibility they provide does come with a price. Each time a message is sent to the group, the specifiedLDAP query must be run. This can potentially place a large demand on your Global Catalog servers and your network'sdata throughput capability. Proper design and forethought, however, can usually prevent these problems from becomingsignificantly detrimental.

    Recovery storage group

    As powerful and robust as Exchange Server is, data backup and recovery has consistently been one of its weak points.The new recovery storage group feature of Exchange 2003 aims to take a large bite out of that problem. Traditionally,when you needed to recover one or more stores within a single storage group, you had to dismount all stores within thatstorage group. When using the recovery storage group method of store restoration, the store is only dismounted for ashort period of time (a few minutes or less typically) as the recovered store is mounted and made accessible to users.Compare this with the 30 or more minutes that you might spend performing a restoration of a store (depending on its sizeand how many backup tapes you need to use) and the benefits are very easy to see.The recovery storage group does have some usage limitations that you should be aware of:

    Public folder stores cannot be restored using the recovery storage group. The recovery storage group can only be

    used to recover mailbox stores.

    The server hosting the recovery storage group must be located in the same administrative group as the serverfrom which the mailbox store was backed up.

    The storage group from which the mailbox store was backed up must be located on an Exchange 2000 ServerService Pack 3 (SP3) or later Exchange Server computer.

    Only one storage group may be restored at a time, although multiple mailbox stores within that storage may berestored simultaneously.

    Backups made using volume shadow copy (discussed next) cannot be restored using the recovery storage group.

    Volume shadow copy

    One of the improvements in Microsoft Windows Server 2003 is support for the volume shadow copy technology, whichwas first introduced in Microsoft Windows XP. When performing backups using volume shadow copy, open files can bebacked up as if they were closed, with their content current as of the time of the backup process. This allows for greaterflexibility with scheduled backups and ensures that a higher percentage of your desired backup items are actually backedup. The volume shadow copy process, like the Windows Backup Utility itself, is extended when Exchange 2003 or theExchange System Manager is installed on a computer -- be it a server or workstation.As nice as volume shadow copy is, it too has its limitations when used with Exchange 2003. For example, if your systemfiles and Exchange databases are located on the same volume, you cannot backup both items at the same time.

  • 8/4/2019 Exchange 2003 is the Latest Version of the Extremely Powerful

    3/24

    Additionally, you cannot use volume shadow copy to create backups that you'll later want to restore using the recoverystorage group.

    RPC over HTTP

    As good as Outlook Web Access is (and it's even better in Exchange 2003), there are many times when you'd still like tobe able to connect remotely to the Exchange organization using Microsoft Outlook. In the past, this has been done usingMicrosoft or third-party created VPNs because there was no inherent security in this setup. When Exchange 2003 is usedon the back-end with Outlook 2003, clients can now connect securely to the Exchange 2003 organization without the needfor a VPN connection using RPC over HTTP.

    Standard RPC communications are not designed for use on the Internet and do not work very well with firewalls; however,when you tunnel RPC over HTTP, the remote user can easily create connections to a front-end server running IIS(Internet Information Services) via HTTP, and then connect to the Exchange servers using RPC. This scenario issupported regardless of how the client and server are located, even if they're both behind different firewalls on differentnetworks. The only requirement is that RPC over HTTP must be configured on the client and server side in the Exchangeorganization and HTTP must be available for use.When RPC over HTTP is used to connect Outlook 2003 clients to Exchange 2003, use SSL for security because allauthentication is done using basic authentication (which submits user's credentials in clear text).The complexity of setting up and maintaining an RPC over HTTP solution may not be right for every organization,especially those that already have mature, stable, VPN solutions in place, but it does provide another low-cost solution tothis problem

    What's improved in Exchange 2003

    Many improvements are found in Exchange 2003 over Exchange 2000 Server, including the removal of the KMS (KeyManagement System), which is discussed in the following section, increased security, better performance, and easiermanagement. In this section, you briefly examine one of the more predominant improvements that your users willappreciate.

    Outlook Web Access

    On the client side, next to Outlook 2003, OWA in Exchange 2003 has seen the biggest improvement over its counterpartin Exchange 2000 Server. OWA is provided in two modes, Premium and Basic, depending on the user's browser andpersonal preferences.OWA Premium is available for use when clients connect to the OWA server using Microsoft Internet Explorer 5.01 or laterand provides almost every feature available in OWA under Exchange 2003. Microsoft Internet Explorer 6.0 or later is stillrequired for some of the most advanced features, such as automatic credential cache clearing upon logoff. Users usingthese browsers can select either Premium or Basic OWA, depending on their preferences and connection speeds.OWA Basic is available for users using all other browsers that do not meet the requirements for use with OWA Premium.It still provides the basic messaging functionality that users expect when connecting to OWA.The actual improvements that have been made to OWA are too numerous to discuss. The bottom line is that when usersuse OWA Premium, their experiences will almost exactly match those provided by Outlook 2003, including features suchas rules, address books, spell checking, message flagging, and public folders.

    What's no longer supported in Exchange 2003

    As with any new release, some features of previous versions of Exchange Server are no longer supported in Exchange2003. The following are some of the more important areas that you need to be cognizant of if your future plans includeupgrades or migrations to Exchange 2003 from other messaging systems, including Exchange 2000 Server.

    Lotus cc:Mail and MS Mail connectors

    Exchange 2000 Server shipped with the Lotus cc:Mail and MS Mail connectors to allow interoperability with these legacymessaging systems -- Exchange 2003 does not, and furthermore, no longer supports these connectors. You cannotupgrade any Exchange 2000 server that's running these connectors, or manage any Exchange 2000 servers runningthese connectors with the Exchange 2003 version of the Exchange System Manager. Should your organization still havea need to use connectors, you need to retain one or more Exchange 2000 Server SP3 (or better) servers on yournetwork.

  • 8/4/2019 Exchange 2003 is the Latest Version of the Extremely Powerful

    4/24

    Exchange 2000 Server KMS

    Exchange 2000 Server provided a giant leap forward in integrated messaging security management with its KMS. KMSworked with the Windows 2000 Server Certificate Services to create and manage a PKI (public key infrastructure) toallow secure messaging, including key archival and recovery functionality. As nice a feature as KMS was, it wascumbersome to administrate.With the improvements in Windows Server 2003 Certificate Services, the KMS is no longer part of Exchange Server.Exchange 2003 now supports any standard X.509v3 PKI implementation, including the one provided by Windows Server2003. Furthermore, the PKI provided in Windows Server 2003 now provides advanced functionality, such as key archival

    and recovery.The KMS must be removed from any server that will be upgraded from Exchange 2000 Server.

    Chat and Instant Messaging

    Exchange 2000 Server supported a number of realtime communications features, such as chat and instant messagingnatively, and offered support for additional features via the add-on Exchange Conferencing Server. All of these featureshave been removed from Exchange 2003 to provide a simpler and more manageable solution for the majority oforganizations running Exchange as their messaging system. Functionality for realtime communications is now providedvia Office Live Communications Server.You must remove all realtime communications-related features from any server that will be upgraded from Exchange2000 Server.

    The M: drive

    Exchange 2000 Server mapped the M: drive to the network to the Exchange store located at \\.\BackOfficeStorage\. InExchange 2003, this mapping is no longer created (by default), although you can still interact with the Exchange storeusing the UNC (Universal Naming Convention) path. Many cases of database corruption occurred with the mapping inplace due to file system operations, such as virus scanning or backups, being performed directly against the M: drive. Inresponse to this problem, Microsoft removed this dangerous functionality in Exchange 2003 and strongly recommendsthat any remaining Exchange 2000 servers remove it as well.

    E

    Like most products, Exchange 2003 comes in more than one version. Two different versions of Exchange 2003 exist:Exchange 2003 Standard Edition and Exchange 2003 Enterprise Edition. How large your budget is and what exactly youneed or plan to do with Exchange 2003 determines which version you need to purchase. The following table illustrates thedifferences between the two versions of Exchange 2003.

    Feature StandardEdition

    EnterpriseEdition

    Maximum number of storage groups One Four

    Maximum number of databases perstorage group

    Two Five

    Maximum database size 16 GB No set limit

    Number of storage groups supported One Four

    Recovery storage group available? Yes Yes

    Can be used in a cluster? No Yes

    Can be used as a front-end server? Yes Yes

    Utilizes Volume Shadow Copy? Yes Yes

    Includes the X.400 connector? No Yes

    Includes the GroupWise connector? Yes Yes

  • 8/4/2019 Exchange 2003 is the Latest Version of the Extremely Powerful

    5/24

    Includes the Notes connector? Yes Yes

    Table 1-1: A feature comparison of Exchange 2003 Standard Edition versus Exchange 2003 Enterprise Edition.

    This course focuses on the Standard Edition.

    Moving on

    In this lesson, you learned the basics of Exchange 2003, as well as the differences between it and Exchange 2000 Server

    In Lesson 2, you find out why Exchange 2003 depends on Active Directory. Before you move on, do the assignment andtackle the quiz. If you have any questions, post them on the Message Board. Even if you don't have questions, it's worthvisiting the Message Board to touch base with your instructor and see what your fellow students are up toActive Directory overview

    It's easy to get confused when you hear the term Active Directory and then people start talking about Active Directory andit's components as if they were living entities. In a way, Active Directory is a living entity -- at least from the standpoint thatit's perhaps the single most important part of any medium- to large-sized network. Although it's true that you can operateeven the largest of networks without ever using Active Directory (as versions of Microsoft Windows prior to MicrosoftWindows 2000 Server did for years), to truly have a network operating system that can provide the robust features andsecurity controls that are required today, Active Directory must be used.

    Like any complex machine -- and that is what Active Directory is when you get right down to it -- many parts and

    processes must all interact with each other to achieve the final result. Active Directory may be the heart of the WindowsServer 2003 network, but it's supported by (and requires) several other key network services. That discussion, however, isbeyond the scope of what you examine in this lesson. In the next few sections, you get an overview of Active Directory byexamining it from dynamically different viewpoints: Active Directory as a logical entity and Active Directory as a physicalentity. When you're done, you'll have a better understanding of how Active Directory works to provide streamlinedmanagement and control over even the largest of networks.

    Active Directory architecture

    Unlike Microsoft Windows NT, Microsoft Windows 2000 and Windows Server 2003 do not require you to create a domaincontroller during the initial installation of the operating systems. As such, Active Directory is not automatically part of theoperating system on a newly installed Windows Server 2003 machine -- although you can certainly change this fact atany time as needed. Newly installed Windows Server 2003 machines are, by default, created as member servers --either a workgroup or a domain. When member servers (and workstations) are part of a workgroup, they use a securityarchitecture that resides locally on the computer. When member servers (and workstations) are joined to an ActiveDirectory domain, they use a centralized security and directory architecture that's maintained by Active Directory. Evenafter a server (or workstation) is joined to a domain, however, it still maintains its local security database -- only when aserver is turned in into a domain controller does the local security database cease to exist. To that end, there's no localAdministrative account on any Windows Server 2003 domain controller -- an important fact to bear in mind.

    Active Directory uses an organizational model that's based tightly on the DNS (Domain Name System) model. In fact,Active Directory naming is in many cases identical to DNS naming within an organization. A tree contains domains andeach tree has one or more root domains, in which all other domains are created. All domains under a root domain sharea common, contiguous DNS namespace. Organizational units and containers exist internally to each domain. They areused by Active Directory to create a more defined tree structure. Organizational units and containers can be nestedwithin one another, although only organizational units can be used to assign configuration and security settings toobjects within them. Containers are merely a construct used to organize objects. Objects can be created to representboth logical and physical components of the network, such as users, computers, and sites. The resulting product is adirectory service that can be scaled up or down for an organization of any size or geographical organization. Figure 2-1illustrates how an Active Directory organization might be created using two root domains, each with several layers ofchild domains below them.

  • 8/4/2019 Exchange 2003 is the Latest Version of the Extremely Powerful

    6/24

    Figure 2-1: A Windows Server 2003 forest.

    Enlarge image

    All domains within the same root domain trust each other transitively, which is a major departure from the way thatWindows NT domains were created. Additionally, all root domains within the same forest also automatically transitivelytrust each other. Trusts can be manually created directly between different domains within a forest at any level (shortcut

    trusts), externally to other organizations and in Windows Server 2003 between forests provided that certain prerequisitesare met. When two domains or forests trust each other, objects in either domain are allowed access to all resources,limited only by their configured permissions and the configuration of the trust itself. Figure 2-2 shows how the varioustrusts within an Active Directory organization might look.

    Figure 2-2: A Windows Server 2003 forest with various trusts.

    Enlarge image

    T

    As you've already seen, the logical structure of Active Directory is based on the DNS model. Forests contain rootdomains, root domains contain child domains, and within each child domain (or root domain if no children exist) are theactual objects that form the reason why the network exists in the first place. Organizational units, containers, andvarious objects exist within each domain and are managed by Active Directory. The schema determines whichproperties each of these objects is allowed to have so the entire directory service structure that Active Directoryprovides can be maintained in an orderly and predictable fashion. In the following sections, you'll examine thecomponents that make up the logical structure of Active Directory.

    Forests

    The forest is the top of the Active Directory organization and serves as the administrative and security boundary for an

    http://h30187.www3.hp.com/media/content/course/2685/resources/ExchServHP02fg01_large.gifhttp://h30187.www3.hp.com/media/content/course/2685/resources/ExchServHP02fg02_large.gifhttp://h30187.www3.hp.com/media/content/course/2685/resources/ExchServHP02fg01_large.gifhttp://h30187.www3.hp.com/media/content/course/2685/resources/ExchServHP02fg02_large.gif
  • 8/4/2019 Exchange 2003 is the Latest Version of the Extremely Powerful

    7/24

    organization. All objects within the forest share a common schema, configuration, and global catalog. The forest istypically referred to by the name of its root domain (if only one root domain exists) or by the name of the first rootdomain (if multiple root domains exist). As you've already seen, within the forest exists one or more groups of domaintrees that trust each other using transitive and hierarchical trust relations that are automatically created and managedusing the default Kerberos security trust model of Active Directory. Looking back at Figure 2-1, you can see a forest withtwo domain trees in it. These two domain trees, although largely independent of each other, are still tied to each otherbecause of their membership within the same forest.In the Exchange 2003 organization, the forest forms an organizational boundary, which cannot be crossed by a singleExchange organization. Microsoft Exchange Server 5.5 was not limited in this way because it maintained it's owndirectory service; however, the tight integration with Active Directory in Exchange 2003 imposes this limitation. SMTP

    and X.400 connectors can be used to link Exchange 2003 organizations that span multiple forests.

    Trees

    Within forests exist trees, and trees provide the hierarchical organization of domains. A tree can have multiple branchesand nested containers, much like the file system on a computer. If you compare the top of a tree to the root of a harddisk, the similarities start to become apparent. Nested containers in the tree are similar to folders in a file system. Withinthese containers are users, objects and other resources on the network. Within a folder on your hardware are files andapplications.A domain tree is a group of one or more contiguous domains that all share the same namespace and are tied toeach other by a default transitive trust between parent and child. The contoso.com domain, shown in Figure 2-1,consists of five domains at three levels that are all tied to each other by namespace and trust.

    Domains

    A domain is branch, or node, of the forest and is typically created to satisfy organizational or geographical needsfor distribution objects below it. A domain can span a LAN (local area network) or WAN (wide area network) asdesired, depending on the network design and subsequent implementation and changes. As shown in Figure 2-1,multiple domains can exist within a single LAN or can be separated by WAN links. All domains under a rootdomain share a common namespace and trust each other through a series of transitive trusts. Additionally, alldomains under a root domain share a common global catalog that lists users, resources, and other objects.Within each domain, you start to deal with the physical components of Active Directory, such as user objects,computer objects, and other objects. In addition, domains house the more granular logical components of ActiveDirectory, such as organizational units, containers, and groups.Certain Group Policy settings, such as password settings can only be configured at the domain level.

    Schema

    If the forest is the container within which Active Directory is housed, the schema is the set of instructions andspecifications by which Active Directory operates. The schema defines which types of objects can exist withinActive Directory and which properties these objects should have. A very simple schema might only allow for threeobjects: a server, an organizational unit, and a user. Each of these three objects then has a set of attributes thatare specified by the schema that are used to define and describe it, for example:

    The server might have attributes of host name and IP (Internet Protocol) address

    The organizational unit might have attributes of name and objects allowed within it

    The user might have attributes of first name, last name, and e-mail address

    When Active Directory is installed for the first time in an organization, the default schema is created. The defaultschema is extensively vast and contains tens of thousands of entries that define all manner of things related toActive Directory -- the vast majority of which is beyond the scope of this course. The schema can be extended byother applications after it's initially created, such as by Exchange 2003. The default schema configuration of a userobject in Active Directory makes no allowance for a mailbox. Exchange 2003 extends the schema and makes themailbox (and other related attributes) an attribute of users and groups. Additionally, other objects that the schemadefines have their attributes extended (added to) by Exchange 2003.The schema is an integral part of Active Directory and is stored within the Active Directory database along withobjects and all other items related to Active Directory. NTFS (New Technology File System) permissions and ACLs(Access Control Lists) are used to control who has access to manage the schema. In addition, a special domaincontroller that has the Operations Master role of Schema Master must be contacted before any change can bemade to the schema. It goes without saying that the schema is absolutely critical to the proper operation of ActiveDirectory.

  • 8/4/2019 Exchange 2003 is the Latest Version of the Extremely Powerful

    8/24

    Although the schema can be extended (added to), items can never be removed from the schema. You can,however, turn off items in the schema, which makes them effectively unavailable for use.

    Global catalog

    Just as the schema is the set of instructions and specifications by which Active Directory operates, the globalcatalog is the phone book that lists all objects within Active Directory. Just like a phone book, the global catalog isa simple index of objects and, therefore, does not contain every possible attribute for an object. A phone bookmight list first name, last name, street address, and phone number, but does not list where the individual works,what his e-mail address is, and what type of car he drives. Just the same, the global catalog only indexes the more

    common attributes of objects within Active Directory and makes them available for querying. Although this mayseem like a disadvantage, consider the fact that even if a desired attribute is not contained with the global catalog,enough information exists about the object to pass the query to a domain controller that has a replica of the ActiveDirectory partition. As a result, it has a complete and detailed listing of all attributes of the desired object.Global catalogs purpose within the Active Directory organization is to speed up queries that are performed againstActive Directory and to alleviate domain controllers of this additional responsibility when possible. Global catalogsare hosted on global catalog servers, of which only one is created by default. The first domain controller in anorganization is automatically configured as a global catalog server. After that, an administrator must manuallyconfigure additional global catalog servers.Global catalogs are crucial to the success of Exchange 2003 in an organization because they're used to processthe numerous LDAP queries required to efficiently provide enterprise messaging services. The failure of anExchange 2003 machine to contact a global catalog server will cause many problems, including failure of theExchange Server to perform its function.

    Organizational units

    Within a domain, organizational units can be used to organize objects, such as users and computers, into logicalgroups that can be effectively and intelligently managed and assigned permissions and privileges. Organizationalunits in Windows Server 2003 completely replace the complicated and difficult to maintain resource domain modelused in Microsoft Windows NT 4.0. You can nest organizational units, like domains, and configurations made atthe parent level can inherit (by default) all child-level organizational units. When applying Group Policy settings inActive Directory, organizational units are the most granular level at which Group Policy can be applied; therefore,you can configure very specific settings for each organizational unit on an as needed basis. Althoughorganizational units can contain security groups, which can have permissions and rights configured on them,security groups cannot directly receive Group Policy settings. Figure 2-3 illustrates how you might useorganizational units to intelligently segregate your users and computers for easier administration and granular

    configuration.

    Figure 2-3: Using organizational units to apply different Group Policy settings.

    Containers

    Containers perform one of the functions of organizational units, and one function only. A container can be used tosegregate objects into easier to manage groups, but it cannot be used to apply permissions or Group Policysettings. Several default containers are created during the creation of Active Directory, such as the User containerand the Computers container. By default, all users and computers created are placed in their respective

  • 8/4/2019 Exchange 2003 is the Latest Version of the Extremely Powerful

    9/24

    containers.

    Security groups

    Whereas the organizational unit is the lowest level at which you can apply Group Policy settings, security groupscan still be used to apply permissions and rights to multiple objects at a time. Groups can contain users,computers, and even other groups within them, and then be configured with the desired permissions and rights.Groups are typically placed within an appropriate organizational unit so that all members of the group can receivethe Group Policy settings that are applied to the organizational unit. Several default groups are created whenWindows Server 2003 is installed and many others are created when Active Directory is installed. As an example,

    all users who require no other special permissions other than being able to perform backups and restorations arepart of the Backup Operators group. You can use the default groups or create groups of your own to meet yourneeds.

    Distribution groups

    In all actuality, two types of groups exist: security and distribution. Up to this point I've been talking exclusivelyabout security groups. Distribution groups are used by an application to send e-mail messages quickly to allmembers of the group that have been configured with an e-mail address. Distribution groups cannot be used toconfigure permissions and rights on their members as security groups can; however, security groups can also beconfigured with an e-mail address that allows applications, such as Exchange 2003, to send messages to allmembers of the security group as well.

    T

    Unlike the previous discussion about the logical structure of Active Directory, the following discussion on the physicalstructure of Active Directory discusses items that you can actually put your hands on and see outside of the confines ofusing a management console on your workstation or server. Items such as sites, domain controllers, servers,workstations, users, printers, and other objects are all physical entities that have a key role in the operation of ActiveDirectory. In reality, the physical components of Active Directory necessitate the logical components. After all, the entirefunction of the network (and hence Active Directory) is to allow users to perform their tasks so that the business of theorganization can be carried in an efficient and productive manner.

    Sites

    The official definition of a site is "one or more IP subnets that are connected to each other by a fast and reliableconnection." You will, in most cases, consider sites to be geographically different locations in which users and serversare located. Sites are typically made of one of more IP subnets that share a fast and reliable connection, such as astandard Ethernet or Gigabit Ethernet backbone common to most organizations. Sites are then connected to oneanother by WAN links of various speeds and reliabilities. Although a site can span a WAN link, the WAN link typicallybecomes a severely limiting part of the site design. Domain controllers within a site are automatically configured toperform replication with each other.When users log on to the network, the authentication process is also affected by site design. By default, authentication isattempted on a global catalog (or domain controller) in the same site as the client. If no domain controllers or globalcatalog servers can be found in the local site, the client is forced to perform authentication across a potentially slowerWAN link. By having authentication performed local to the client, the client (and the entire network) experience better

    performance with less latency.

    Domain controllers

    You've encountered the term domain controller many times up to this point, but don't yet know what its function is inrelation to Active Directory as a whole. As its name implies, the domain controller is in control of the domain more orless. Domain controllers are responsible for managing and maintaining network services, resources, and access. InWindows NT, there were two types of domain controllers: PDC (Primary Domain Controller) and BDC (Backup DomainController). Only the PDC had a writeable copy of the domain database. In Active Directory, all domain controllers arecreated equal (more or less, you'll see why later) and operate in the multimaster mode. This is where any one domaincontroller can make changes to the Active Directory data, such as updating an attribute on a user account or creating anew shared resource, such as a printer.

  • 8/4/2019 Exchange 2003 is the Latest Version of the Extremely Powerful

    10/24

    As mentioned earlier, the first domain controller in an organization is automatically assigned the global catalog serverrole. There are five other Operations Masters roles that are also assigned to this domain controller that later should bereassigned (for reliability) to other domain controllers:

    Domain naming master: Only one domain naming master exists per Active Directory forest. The domain namingmaster has control over the addition or removal of domains in the forest.

    Schema master: Only one schema master exists per Active Directory forest. The schema master is responsiblefor all updates and modifications to the schema. Updates to the schema cannot be made without contacting theschema master.

    PDC emulator master: Only one PDC emulator exists per domain. The PDC emulator performs a few differentroles depending on the nature of the network. In networks that still have Windows NT BDCs, the PDC emulatorfunctions as a PDC, allowing normal communications between the legacy BDCs and Active Directory. The PDCemulator also maintains time synchronization within the domain and receives preferential notification of anypassword change made within the domain. Should a logon attempt fail due to a bad password, the PDCemulator is asked to authenticate the logon because it would likely know of any recent changes to the password.

    RID (relative identifier) master: Only one RID master exists per domain. Each object created within ActiveDirectory has a unique SID (Security Identifier). The SID consists of a domain SID, which is the same for allobjects created within that domain and a RID, which is unique for all objects in that domain. The RID masterensures that each RID is unique.

    Infrastructure master: Only one infrastructure master exists per domain. The infrastructure master compares itsdomain's data with that of the global catalog. Global catalogs contain information about all domains throughreplication events, so the global catalog is considered to always be up to date. If the infrastructure master findsdata within its domain that is out of date, it requests an update from the global catalog, and then replicates thisdata to the remaining domain controllers in its domain.

    Unless only one domain controller exists within the domain, the domain controller that holds the Infrastructure Masterrole should never also hold the Global Catalog server role. If the same server holds both roles, the infrastructure masterwill never find any data that is out of date and will cease to perform its intended function. Therefore, changes will neverbe replicated to other domain controllers in the domain. The only exception to this is when all domain controllers are alsoacting as global catalog servers. In this case, all domain controllers will already have the current data set and it does notmatter which domain controller holds the infrastructure master role.

    Servers and workstations

    Servers and workstations are among the easiest of all objects to comprehend. Users use workstations, which interactwith servers to perform tasks required of the organization. All computers, like users, have accounts within ActiveDirectory that allow them to participate in the Active Directory organization. In addition, computers can receive GroupPolicy settings to configure their settings and behaviors.

    Users

    Users, while not always easy to comprehend, are certainly easy enough to envision as a physical component of yournetwork and therefore of Active Directory. The entire network exists to serve the users to allow them to perform theirintended tasks, all of which typically contribute to the bottom line of the organization. Exchange 2003, for example, can

    be installed into the organization to extend the functionality of users by providing them a messaging and collaborationplatform to increase productivity.Many other objects exist within Active Directory that are beyond the scope of this course. Some of them include printers,shares, services, and even groups, which you've already examined.

    H

    By now, it should be fairly evident that Active Directory is the very heart and soul of a Windows Server 2003 network. Tothat same end, Active Directory is what allows Exchange 2003 to be such a powerful messaging and collaborationplatform. In Exchange Server 5.5, Exchange recipient objects (contacts and users for example) were maintained in theirown directory service. There was absolutely no correlation between Windows NT 4.0 domain accounts and Exchange

  • 8/4/2019 Exchange 2003 is the Latest Version of the Extremely Powerful

    11/24

    Server 5.5 mailboxes. A single user could have multiple mailboxes assigned (often referred to as resource mailboxes) andoftentimes did.

    In Active Directory, this separation is no longer available, which is largely a very good change. Existing Exchange recipienobjects in Active Directory simply have their schema extended, allowing them to directly interact with Exchange Server. Amailbox is now a property that can be configured for a user by making the user mailbox enabled. To the same end, a usercan be mail-enabled by entering an external e-mail address. The need for Exchange to maintain its own directory serviceno longer exists -- all messaging attributes that a recipient object might posses are now simply extensions to the schema.Although this all might sound confusing, the payoff comes in simpler management and implementation. A singleadministrator can easily manage the network, including both typical user account issues, such as forgotten passwords and

    network share usage as well as Exchange-related tasks such as mailbox creation and management.

    The secret behind this tight integration, as you've already guessed, is extension of the schema to facilitate Exchangesimply dropping into place in an existing Active Directory network. To that end, you must know that you cannot installExchange 2003 into a network that does not have Active Directory configured and operating normally. Additionally, youcannot install Exchange 2003 onto a member server that's not already joined to the domain.

    Management of Exchange 2003 is accomplished primarily through two different consoles: Exchange System Manager andADUC (Active Directory User and Computers). After an installation of Exchange (or simply the Exchange System Manageron a workstation), ADUC is modified such that Exchange-related tasks can be performed using the Exchange TasksWizard. Additionally, several new tabs are present on user account Properties that are Exchange specific. With littleexception, everything you do in Exchange 2003 is directly dependant on Active Directory or one of its supporting services.

    Moving on

    In this lesson, you learned about Active Directory and how it works with Exchange 2003. In Lesson 3, you find out how toplan for an Exchange 2003 server. Before you move on, do the assignment and tackle the quiz. If you have any questionspost them on the Message Board. Even if you don't have questions, it's worth visiting the Message Board to touch basewith your instructor and see what your fellow students are up to.

    Hardware requirements to install Exchange 2003

    When it comes to installing Exchange2003, you certainly don't have to have top- of-the-line equipment with the fastestprocessors and the most RAM (random access memory) possible, but it certainly doesn't hurt. Exchange, like anyenterprise quality application, can be very demanding on hardware resources, especially as an organization grows andthe number of users increases.

    Although Microsoft Windows Server 2003 has its own hardware requirements that must be met prior to its installation, youneed to be specifically concerned with what Exchange2003 requires. As with any hardware requirements listing you'll dealwith, you should always strive to exceed the minimum requirements. Furthermore, a well-planned and designed solutionexceeds the recommended requirements. Ample forethought ensures that you can implement a solution that will last forseveral years.

    In regards to your Exchange2003 installation, you should not plan to meet your needs for today. Instead, forecast whatyour needs will be three, four, or even five years from now. It's unlikely that your solution will stand unmodified for fiveyears, but in some cases it might. Either way, by planning for the future, your solution will be ready to deliver the requiredservices to your users today.

    The following table outlines the minimum and recommended hardware configuration that you should have in place before

    installing Exchange2003 onto a computer.

    Item Minimum Recommended

    CPU (centralprocessingunit)

    133 MHzPentium

    733 MHz Pentium

    RAM 256 MB 512 MB

    Disk space 500 MBavailable on the

    500 MB available on theExchange drive *200 MB

  • 8/4/2019 Exchange 2003 is the Latest Version of the Extremely Powerful

    12/24

    Exchangedrive200 MBavailable on thesystem drive

    available on the system drive*Space above this value asrequired, with the databaseskept on fault tolerant drive sets

    CD-ROM Required Required

    VideoDisplay

    VGA (VideoGraphicsAdapter) orbetter

    VGA or better

    Table 3-1: The minimum and recommended hardware specifications to install Exchange 2003.

    Software requirements to install Exchange2003

    Just as Exchange2003 has specific hardware requirements to support its installation, it also has a set of softwarerequirements that must be in place to support its installation. The requirements outlined here are all encompassing withinthe Windows Server 2003 operating system, both to the local computer and on the network itself.

    Operating system

    Exchange2003 only supports installations on the following versions of Microsoft Windows:

    Windows Server 2003 Standard Edition

    Windows Server 2003 Enterprise Edition

    Windows Server 2003 Datacenter Edition

    Windows 2000 Server SP3 or later

    Windows 2000 Advanced Server SP3 or later

    Windows 2000 Datacenter Server SP3 or later

    File system

    You must format the following partitions (or volumes) with the NTFS file system to support installation of Exchange2003:

    System partition Partition or volume that where the Exchange binaries will be installed

    Partitions or volumes that will house the transaction log files

    Partitions or volumes that will house the database files

    Partitions containing other Exchange files

    Active Directory

    Active Directory must be on the network to support the installation of Exchange2003. Any domain controller or globalcatalog server that Exchange2003 may contact must be running Windows Server 2003 or Windows 2000 Server SP3 orlater. Additionally, there must be at least one global catalog server in each Active Directory site in which anExchange2003 will be installed.

    The server on which Exchange 2003 will be installed must already be joined to the Active Directory domain and have afunctional computer account prior to the installation of Exchange 2003.

    IIS

    Exchange 2003 relies on several core IIS services provided by Windows Server 2003. Before you can install Exchange2003 onto a Windows Server 2003 computer, it must have the following IIS components installed and operational:

    The World Wide Web Publishing service

    The NNTP (Network News Transport Protocol) service

  • 8/4/2019 Exchange 2003 is the Latest Version of the Extremely Powerful

    13/24

    The SMTP (Simple Mail Transfer Protocol) service

    The ASP.NET components

    Before you can install Exchange 2003 onto a Windows 2000 Server SP3 or later server, you must have installed the firstthree IIS services listed previously. The Exchange setup routine installs and configures ASP.NET as part of its installation

    DNS and TCP/IP

    DNS is required to support Active Directory and is highly utilized by Exchange 2003. Active Directory integrated zones arepreferred due to their superior security, redundancy, and elimination of zone transfer traffic, but any standard DNS zonesolution that meets the requirements to support the installation of Active Directory will suffice.In addition, any computer that will host an installation of Exchange 2003 or be used to connect to an Exchange 2003computer must have TCP/IP (Transmission Control Protocol/Internet Protocol) installed and properly configured to supporreliable network connectivity. Servers should have manually configured static IP addresses or DHCP (Dynamic HostConfiguration Protocol) server reservations. Clients can use either DHCP leases or manually configured static IPaddresses depending on your organizations specifications.

    Exchange 2003 licensing issues

    One of the most complicated parts of planning for an Exchange 2003 deployment is licensing it. This sad fact, however,does not have to be true if you take the time to understand the specific licensing issues that surround Exchange 2003.When discussing licensing and Exchange, there are three different licenses you must have purchased (and in an

    adequate quantity) before you can legally install and connect clients to your Exchange 2003 organization.

    Server licenses

    Each server licensed you own grants you the legal right to install Exchange 2003 on a single server. Additionally, you caninstall the Exchange System Manager to allow for remote administration or backup of the Exchange store on as manyadditional computers as desired with no additional licensing fees.

    User CAL

    CALs (client access licenses) can be purchased in one of two ways: per user or per device. A per-user CAL is purchasedto allow a single user to access any Exchange server in the organization from any location inside or outside of theorganization. A per-device CAL is purchased to allow any number of users to access any Exchange server in the

    organization from a single computer, such as a kiosk. Both types of CALs cost approximately the same, although yourfinal cost is determined by many factors, including geographic location, number of CALs purchased, and licensingprograms in which you're participating.CALs for Exchange Server are not provided in any version of Windows or Microsoft Office, and must be specificallypurchased to legally allow client connections to Exchange servers.

    Client License

    A client license is required to allow an instance of an application, such as Microsoft Outlook 2003, to be installed on aclient computer. This client license is needed for the installation of the application only and is not related to needing a CALto connect that client to the Exchange organization. Having a client license to install an application does not automaticallygrant you a CAL; you must purchase each type of required license separately

    Going above the minimums

    As alluded to previously, even though you can successfully install and operate Exchange using the minimum or even therecommended requirements, you cannot guarantee an optimal environment for your users unless you seek to exceed theminimum and recommendation hardware values detailed in the previous table. There are many things that you can do toimprove the user's experience in your Exchange organization. You'll examine some of the more common actions in thenext few sections.

    Fast SCSI hard disks

    Exchange 2003 is extremely demanding of all physical resources, but perhaps most demanding of the disk subsystems inthe servers on which it runs and the arrays and external storage devices used to support it. Unlike processors, memory, onetwork interface adapters that can be fairly easily upgraded after the Exchange installation has occurred, disks are a

  • 8/4/2019 Exchange 2003 is the Latest Version of the Extremely Powerful

    14/24

    more complex problem. Taking the time -- and spending the money -- ahead of time to ensure that you're getting the bestperforming disks that your company can afford will go a long way towards making your Exchange organization perform atits best.In all but the very smallest companies, you'll do well to stay away from using IDE (Integrated Drive Electronics) disks foryour Exchange organization. Fast 10,000 or 15,000 RPM SCSI (Small Computer System Interface) disks with fastcontrollers and cabling will go a long ways towards ensuring that the disk subsystem does not become an irreparablebottleneck in your Exchange organization's performance.Microsoft provides theJetstress tool to test and verify disk performance by simulating an actual Exchange Server disk I/O(input/output) load by simulating the database and transaction log loading that can be expected to result from a specificnumber of users. By monitoring the disk system with the System Monitor, you can collect data about the performance of

    the disk subsystem during the Jetstress test to determine if it meets or exceeds the performance criteria you'veestablished.

    RAID-1 arrays

    RAID-1 (redundant array of independent, or inexpensive, disks) otherwise known as mirroring, can be inexpensivelyimplemented and used to create a basic level of redundancy for disks that contain items of some importance, such as theoperating system files. Should a single disk in the mirror set fail, you can restart the computer on the other disk from theset and recreate the mirror once a new disk has been installed. There's no true data redundancy with RAID-1 like youhave with RAID-5, but then again, it should only be used where the costs and complexities of implementing RAID-5cannot be justified.RAID-1 can be easily implemented within Windows itself or can be implemented through specialized hardware devicesthat have been optimized for this purpose alone.

    RAID-5 arrays

    For mission-critical data, RAID-5 provides an ideal solution for both accessibility and recoverability. Critical Exchangeinformation, such as the Exchange databases and the transaction logs, should be placed on RAID-5 arrays whenpossible. Should a single disk in a RAID-5 array fail, its contents can be recovered dynamically from the other remainingdisks after it's been physically replaced. If two or more disks in a RAID-5 array fail at the same time or a second disk failsbefore the data set has been restored from a previously failed disk, you won't be able to recover any data from the set andthe array is lost. Thus, the necessity for a well-conceived disaster recovery plan as you'll see later.

    Clustering

    Clustering provides an even higher level of redundancy and availability than RAID-1 and RAID-5 solutions alone do.Clustering is the process of configuring two or more physical servers to act as a single logical entity that responds toinbound client requests for service. Exchange 2003 supports two types of clustering, as compared to previous versions ofExchange Server that only supported one type of clustering or the other, but never both. You can create active/activeclusters or active/passive clusters in Exchange 2003.Clustering is managed by the MCSC (Microsoft Clustering Service) and has exceptionally high hardware requirementsthat go far above those required to install Exchange 2003 in a nonclustered environment. An external Fiber Channel orSCSI device that can be reliably contacted by all clusters nodes must be used to hold the quorum disk, which is the diskthat holds the definitive information about the cluster's configuration and its operational status. The quorum disk should becreated on a RAID-5 array of disks to ensure its redundancy because without this information the cluster cannot function.The high cost of the shared external storage device, along with the hardware required to connect servers to it, is enough,in many cases, to force a smaller organization to avoid clustering as a means to ensure messaging availability. Ifmessaging is critical to your company's business, then clustering can usually be justified as a necessary addition to yourExchange organization. For example, you might purchase a 2U rack-mounted SCSI disk array that's capable of holding 14

    disks. You install and configure three disks in a RAID-5 array for the quorum disk, another three disks in a RAID-5 arrayfor the transaction logs, and the remaining eight disks in a RAID-5 array for the Exchange databases.

    Active/active clustering

    An active/active cluster uses two physical Exchange 2003 servers that are configured as a single logical server. Bothservers actively respond to client requests and both servers are typically (ideally) configured to hold 50 percent of the totalExchange organization load that they're clustering.The largest drawback to active/active clustering is that it's significantly limited in the amount of storage groups and usersthat it can support. Because a single Exchange 2003 server can only mount four storage groups, no more than four totalstorage groups should exist between both nodes of an active/active cluster. In addition, a single Exchange 2003 server in

    http://www.microsoft.com/downloads/details.aspx?FamilyId=94B9810B-670E-433A-B5EF-B47054595E9C&displaylang=enhttp://www.microsoft.com/downloads/details.aspx?FamilyId=94B9810B-670E-433A-B5EF-B47054595E9C&displaylang=enhttp://www.microsoft.com/downloads/details.aspx?FamilyId=94B9810B-670E-433A-B5EF-B47054595E9C&displaylang=en
  • 8/4/2019 Exchange 2003 is the Latest Version of the Extremely Powerful

    15/24

    an active/active cluster should not hold mailboxes for more than 1,900 users or a performance decrease can be expectedto occur.

    Active/passive clustering

    An active/passive cluster uses between two and eight physical Exchange 2003 servers to create a single logical server. Atleast one server must be active (actively responding to client requests for service) and at least one server must bepassive (in standby waiting for resources to be failed over to it), although you can configure the cluster in any

    arrangement you wish above these minimums. You could, for example, have a six-node active/passive cluster with fouractive nodes and two passive nodes.The passive nodes in an active/passive cluster can perform no other tasks and must sit idly by waiting for the MCSC to faiover the resources from an active node. This is oftentimes the hardest selling point about active/passive clustering asthese passive nodes are seen as a waste because in most cases, they never actually do anything. That myth is quicklydispelled, however, when active nodes start to fail for whatever reason and the operation of the messaging organizationcontinues with barely a hiccup.As an offset to the increased cost, and complexity, of configuring active/passive clusters both performance and scalabilityare increased. A single Exchange server can once again hold four full storage groups and a number of users that limitedonly by performance. Should this node fail, an identically configured (both in hardware and software) node is waiting toreceive its resources and continue to serve client requests. Active/passive clusters also provide a simplified way toperform hardware and software upgrades and replacements as compared to active/active clusters.

    Disaster recovery

    No matter what else you do in planning for your Exchange organization, no matter how redundant and reliable you think itis -- disaster will find you one day. Whether they are natural or man-made, disasters are a fact of life that must be plannedfor and mitigated as much as practical. A disaster is, in simple terms, any event that precludes your company fromcarrying out its normal business operations. By that definition, disaster might come in the form of two failed disks in aRAID-5 array, a fire that causes your server room to receive smoke and water damage, or perhaps it might come in theform of intentional sabotage.The best thing you can do is to realize that a disaster will happen and plan ahead of time to mitigate its effects. A soliddata backup and restoration plan should be a key part of your disaster recovery plan. Of course, there are many otherparts of a disaster recovery plan outside of just making backups and being able to restore them on demand. This is thereason why you must take adequate time to plan, document, and prove your disaster recovery plan. Disaster recovery is atopic that could fill an entire book; therefore, it's not discussed further in this lesson. The following are some resources on

    the Microsoft Web site that will provide you with more information:

    Exchange 2003 Disaster Recovery, from the TechNet briefings

    Planning for Disaster Recovery, from the Windows Server 2003 Deployment Kit.

    Disaster Recovery for Microsoft Exchange 2000 Server(although for a previous version, it still provides manyvalid points of reference)

    Exchange 2003 Disaster Recovery Operations Guide, available in June, 2004 (scroll to the bottom of the Webpage)

    Moving on

    In this lesson, you learned the basic hardware and software requirements that must be met to install Exchange 2003. Youalso learned what you can do to go above these minimums and improve the reliability, availability, and usability of yourExchange organization. In Lesson 4, you'll actually get your hands dirty as we dive into working with Exchange 2003 byinstalling it and working with some recipient objects.Before you move on, do the assignment and tackle the quiz. If you have any questions, post them on the Message Board.Even if you don't have questions, it's worth visiting the Message Board to touch base with your instructor and see whatyour fellow students are up toPreparing the environment for the Exchange 2003 installation Page 1 of 4

    http://www.microsoft.com/technet/community/events/exchange2003/tnt1-101.mspxhttp://www.microsoft.com/resources/documentation/WindowsServ/2003/all/deployguide/en-us/Default.asp?url=/resources/documentation/WindowsServ/2003/all/deployguide/en-us/sdcbc_sto_gqda.asphttp://www.microsoft.com/resources/documentation/WindowsServ/2003/all/deployguide/en-us/welcome.asphttp://www.microsoft.com/technet/prodtechnol/exchange/2000/library/disrec00.mspxhttp://www.microsoft.com/technet/prodtechnol/exchange/2003/library/default.mspxhttp://www.microsoft.com/technet/community/events/exchange2003/tnt1-101.mspxhttp://www.microsoft.com/resources/documentation/WindowsServ/2003/all/deployguide/en-us/Default.asp?url=/resources/documentation/WindowsServ/2003/all/deployguide/en-us/sdcbc_sto_gqda.asphttp://www.microsoft.com/resources/documentation/WindowsServ/2003/all/deployguide/en-us/welcome.asphttp://www.microsoft.com/technet/prodtechnol/exchange/2000/library/disrec00.mspxhttp://www.microsoft.com/technet/prodtechnol/exchange/2003/library/default.mspx
  • 8/4/2019 Exchange 2003 is the Latest Version of the Extremely Powerful

    16/24

    Even after you've done all of the preparation discussed in the previous lessons, you're still not ready to perform the actualinstallation of Exchange 2003 in your organization. Before you install Exchange 2003, you must first prepare ActiveDirectory. In a small organization, you can actually skip the two steps discussed in this section, although you shouldconsider performing them because it gives you the opportunity to configure how your Exchange organization will becreated before you actually perform the first Exchange 2003 installation.

    There are two tools within the Exchange 2003 setup routine that help you prepare the Active Directory schema (and theforest itself), as well as the domains within that forest:

    ForestPrep: The ForestPrep tool must be run one time within a forest to prepare the forest and to extend the

    Active Directory schema with the objects necessary to run Exchange 2003.

    DomainPrep: The DomainPrep tool must be run one time in each domain that will have Exchange serversinstalled, has Exchange recipient objects, or has users who will be administering the Exchange organization.

    Although this might seem like a complex routine, especially for smaller organizations, it does provide you with someadvantages. In many networks, the administrative duties (and therefore abilities) of administering domains, the schema,and Exchange Server are divided among multiple groups. One group might be responsible for maintaining the schemaand the forest root, one group might be responsible for all child domains, and yet another group might be tasked with theadministration of the Exchange organization. By splitting the Exchange setup routine into distinct steps, each step can beperformed by the administrative group that holds the required permissions and privileges.

    Running ForestPrep

    As discussed previously, the ForestPrep tool must be run one time within an Active Directory forest that is to receive anExchange 2003 organization. ForestPrep performs the following tasks when it's run:

    Extends the schema with the required Exchange-related objects and attributes.

    It creates an Exchange organization in Active Directory.

    In a forest with no previous Exchange organization, it prompts you to specify the name of the new Exchangeorganization and creates the organization object within Active Directory. In a network with an existing MicrosoftExchange Server 5.5 organization, it creates the organization object within Active Directory.

    It assigns the role of Exchange Full Administrator to the Active Directory domain user account you specify.Subsequently, this account will have the ability to install and manage Exchange Server anywhere within theforest.

    To run the ForestPrep tool, your user account must belong to the following:

    llowing:

    The Schema Admins group

    The Enterprise Admins group

    The local Administrators group on the server on which ForestPrep is run

    To run the ForestPrep tool, follow these steps:

    1. Insert your Exchange Server 2003 CD in the server's CD-ROM drive. The Welcome Exchange Server 2003 Setup

    page opens as long as the CD-ROM is configured for Autoplay. If it does not start, you can start it by double-clicking the setup.exe file located in the root of the CD.

    2. Click the Exchange Deployment Tools link.

    3. The Exchange Server Deployment Tools screen, shown in Figure 4-1, appears. Click the Deploy the First

    Exchange 2003 Server.

  • 8/4/2019 Exchange 2003 is the Latest Version of the Extremely Powerful

    17/24

    Figure 4-1: The Exchange Server Deployment Tools screen.

    4. The Deploy the First Exchange Server 2003 screen appears. Click New Exchange Server 2003 Installation.

    5. The New Exchange Server 2003 Installation screen appears, as shown in Figure 4-2. Click the Run ForestPrepNow link, which appears in Step 6 (not shown in the figure).

    Steps 1 to 5 on this screen are all preliminary steps that must be done before you can continue, although they are notcovered here.

    Figure 4-2: The New Exchange Server 2003 Installation page.Enlarge image

    6. Accept the EULA (End-User License Agreement) when prompted. Click Next.

    7. Enter the 25-digit product key when prompted. Click Next.8. The Component Selection dialog box appears, as shown in Figure 4-3. Note that the ForestPrep option is already

    selected for you. Click Next to begin the ForestPrep process.

    http://h30187.www3.hp.com/media/content/course/2685/resources/ExchServHP04fg02_large.gifhttp://h30187.www3.hp.com/media/content/course/2685/resources/ExchServHP04fg02_large.gifhttp://h30187.www3.hp.com/media/content/course/2685/resources/ExchServHP04fg02_large.gif
  • 8/4/2019 Exchange 2003 is the Latest Version of the Extremely Powerful

    18/24

    Figure 4-3: Starting ForestPrep.Enlarge image

    9. The Microsoft Exchange Server Administrator Account dialog box appears. Designate the user account that will

    receive the Exchange Full Administrator role. Use the format of domain\user, as shown in Figure 4-4. Click Next.

    Figure 4-4: Specifying the Exchange Full Administrator account.

    10. ForestPrep now begins its update actions. In some cases, you may be prompted with a dialog box to verify the

    update. If this occurs, click OK.

    11. When the ForestPrep process is complete, the Completion screen appears. Click Finish.

    You can also run ForestPrep tool from the command line by entering f:\setup\i386\setup.exe /forestprep, assuming thatvolume F represents the correct location of the Exchange 2003 installation files.

    Running DomainPrep

    After you run the ForestPrep tool, you must then run the DomainPrep tool to prepare each domain in the forest that meetsthe following conditions:

    Will have an Exchange 2003 server installed.

    Will have ExchanExchange mailbox-enabled recipients in it.

    http://h30187.www3.hp.com/media/content/course/2685/resources/ExchServHP04fg03_large.gifhttp://h30187.www3.hp.com/media/content/course/2685/resources/ExchServHP04fg03_large.gifhttp://h30187.www3.hp.com/media/content/course/2685/resources/ExchServHP04fg03_large.gif
  • 8/4/2019 Exchange 2003 is the Latest Version of the Extremely Powerful

    19/24

    Will have a user account that's used to administer the Exchange 2003 organization in it.

    To run the DomainPrep tool, your user account must belong to the following:

    The Domain Admins group for that domain

    The local Administrators group on the server on which DomainPrep is run

    The DomainPrep tool performs the following tasks for the domain:

    It creates the Exchange Enterprise Servers local group.

    It creates the Exchange Domain Servers global group.

    It adds the Exchange Domain Servers group to the Exchange Enterprise Servers group.

    It creates the Exchange System Objects container within Active Directory, which is used for mail-enabled publicfolders.

    It adds the Exchange Domain Servers group to the pre-Microsoft Windows 2000 Compatible Access group.

    It configures permissions for the Exchange Enterprise Servers group at the root of the domain to allow theRecipient Update Service to function properly.

    It grants the required permissions to Exchange servers and administrators.

    To run the DomainPrep tool, follow these steps:

    1. Insert your Exchange Server 2003 CD. In the Welcome Exchange Server 2003 Setup page, click the Exchange

    Deployment Tools link.

    2. In the Exchange Server Deployment Tools screen appears, click the Deploy the first Exchange 2003 server link,

    shown in Figure 4-1.

    3. The Deploy the First Exchange Server 2003 screen appears. Click the New Exchange Server 2003 Installation

    link.4. The New Exchange Server 2003 Installation screen appears. Click the Run DomainPrep Now link, which is in

    Step 7.

    5. Accept the EULA when prompted. Click Next.

    6. Enter the 25-digit product key when prompted. Click Next.

    7. The Component Selection dialog box appears. Note that the DomainPrep option is already selected. Click Next to

    begin the DomainPrep process.

    8. On the Completion screen, click Finish.

    You can also run DomainPrep tool from the command line by entering f:\setup\i386\setup.exe /domainprep, assuming thatvolume F represents the correct location of the Exchange 2003 installation files

    Installing the first Exchange 2003 computer

    With the ForestPrep and DomainPrep steps out of the way, and presuming that you've completed all of the other requiredprerequisite steps, you're ready to finally get down to business and install the first Exchange 2003 computer in your forest.The actual installation process is rather anticlimatic, assuming that you're not performing a cluster installation or aninstallation into an existing Exchange Server 5.5 organization, neither of which are discussed in this course.

    You have three options to select from in regards to the scope of the installation as detailed here:

    Typical: Installs the Messaging and Collaboration Services and the System Management Tools only.

  • 8/4/2019 Exchange 2003 is the Latest Version of the Extremely Powerful

    20/24

    Minimum: Installs the Messaging and Collaboration Services component only.

    Custom: Allows you to select only the components you want and is the only way to install all components.

    To install the first Exchange 2003 server, follow these steps:

    1. Insert your Exchange Server 2003 CD. In the Welcome Exchange Server 2003 Setup screen, click Exchange

    Deployment Tools.

    2. The Exchange Server Deployment Tools screen appears. Click the Deploy the first Exchange 2003 server link.

    3. The Deploy the First Exchange Server 2003 screen appears. Click the New Exchange Server 2003 Installationlink.

    4. The New Exchange Server 2003 Installation screen appears. Click the Run Setup Now link, which is in Step 8.

    5. Accept the EULA when prompted. Click Next.

    6. Enter the 25-digit product key when prompted. Click Next.

    7. The Component Selection screen appears, as shown in Figure 4-5. Select an installation type by clicking the

    arrow below the Action label. You can also change the installation path for the Exchange binaries if desired. ClickNext.

    Figure 4-5: Component Selection screen.Enlarge image

    9. The Installation Type screen appears, as shown in Figure 4-6. Select which type of installation you're performing.

    In this case, select Create a new Exchange Organization. Click Next.

    http://h30187.www3.hp.com/media/content/course/2685/resources/ExchServHP04fg05_large.gifhttp://h30187.www3.hp.com/media/content/course/2685/resources/ExchServHP04fg05_large.gifhttp://h30187.www3.hp.com/media/content/course/2685/resources/ExchServHP04fg05_large.gif
  • 8/4/2019 Exchange 2003 is the Latest Version of the Extremely Powerful

    21/24

    Figure 4-6: Installation Type screen.

    10. The Organization Name dialog screen appears, as shownin Figure 4-7. Pick the Exchange organization name

    carefully because you cannot change it later. This serves as the root of your Exchange organization. Click Next.

    Figure 4-7: Organization Name screen.

    11. The Licensing Agreement screen, shown in Figure 4-8, appears that explains how Exchange 2003 is licensed.

    You must select the I agree that I have read and will be bound by the license agreements for this product option tocomplete the installation. Click Next.

  • 8/4/2019 Exchange 2003 is the Latest Version of the Extremely Powerful

    22/24

    Figure 4-8: Licensing Agreement screen.

    12. The Installation Summary screen appears asking you to confirm your installation choices. When you're ready to

    complete the installation, click Next.

    13. When the installation is done, a Congratulations screen appears, informing you that the installation is complete.

    Click Finish.

    After you've completed the installation, you might want to open the Exchange System Manager (click Start > Programs >Exchange > System Manager) to examine your newly created Exchange organization, as shown in Figure 4-9.

    Figure 4-9: The Exchange System ManagerInstalling additional Exchange 2003 computers

    After you've completely installed the first Exchange 2003 computer in a domain, you can then easily install as manyadditional servers as you wish. The installation process for additional servers is virtually identical to that discussedpreviously for the first server, except that you'll be asked two additional questions during the installation process:

    Which administrative group do you want the new server to be a part of?

  • 8/4/2019 Exchange 2003 is the Latest Version of the Extremely Powerful

    23/24

    Which routing group within that administrative group do you want the new server to be a part of?

    You're only asked these two questions if you've configured additional administrative and routing groups in your Exchangeorganization. Administrative groups and routing groups are covered in Lesson 6.Introduction to recipient objects

    In an Exchange organization, any object that interacts with Exchange server, either to send or receive e-mail isconsidered a recipient object. There are four types of recipient objects that you need to be aware of and understand as anExchange administrator:

    Users

    Contacts

    Groups

    Public Folders

    As part of the installation routine, new objects are added to the Active Directory schema and pre-existing objects, such asusers, groups, and contacts, are modified by having their attributes changed and added to. You manage these objectsusing Active Directory Users and Computers just as you did before Exchange was installed. The only difference is thatActive Directory Users and Computers has some new capabilities that did not exist before.

    Users

    User recipient objects can exist in one of three different states of messaging capability:

    No Exchange abilities: The user object has no ability to send or receive e-mail using the Exchange organization orto use any other Exchange messaging functionality.

    Mailbox enabled: The user object has a mailbox defined on an Exchange server within the Exchange organizationand uses that mailbox to send and receive e-mail both internally and externally to the organization. The user islisted in the Global Address List, allowing other users to lookup the user's e-mail address and send e-mail to theuser's mailbox.

    Mail enabled: The user does not have a mailbox defined on an Exchange server, but does have an e-mailaddress configured that references a mailbox located on an external server, such as a POP3 account provided by

    an ISP (Internet Service Provider). All e-mail is sent and received using this external account, although the user islisted in the Global Address List.

    With the exception of the built-in Administrator account, all user objects that existed within the forest before the installationof Exchange 2003 are not mailbox-enabled or mail-enabled. After the installation is complete, you can configure one ofthese options if you want. User objects that are created after Exchange has been installed may be mailbox enabled aspart of the object creation process if desired. You cannot mail enable a user object during its creation, but you can after doso manually after the user object has been created.User mailboxes are located in mailbox stores, which are located within storage groups. You find out more about storesand storage groups in Lesson 5.As mentioned previously, administration of Exchange recipient objects takes place from within the Active Directory Usersand Computers console for the most part. Select a user object in Active Directory Users and Computers, right click, andthen select Exchange Tasks to open the Exchange Tasks Wizard, which can be used to perform many useful Exchange-related tasks, such as the following:

    Create a mailbox, which mailbox-enables the object

    Delete a mailbox

    Move a mailbox to a different server and mailbox store (or a different mailbox store on the same server)

    Establish an e-mail address, which mail-enables the user object

    Remove all Exchange attributes from the object

    Configure access to mobile services

    Configure access to protocols, such as HTTP, POP3, and IMAP4

    A user object cannot be mailbox enabled and mail enabled at the same time.

  • 8/4/2019 Exchange 2003 is the Latest Version of the Extremely Powerful

    24/24

    Moving on

    In this lesson you performed the required steps to prepare the forest and domain for the Exchange 2003 installation. Afterthat, you performed the installation of the first Exchange 2003 organization and got a brief introduction to Exchangerecipient objects. In Lesson 5, you'll examine and work with storage groups, stores, and policies.Before you move on, do the assignment and tackle the quiz. If you have any questions, post them on the Message Board.Even if you don't have questions, it's worth visiting the Message Board to touch base with your instructor and see whatyour fellow students are up to.