Professional Documents
Culture Documents
Designing a Messaging
Infrastructure Using Microsoft®
Exchange Server 2007
Information in this document, including URL and other Internet Web site references, is subject to change without notice.
Unless otherwise noted, the example companies, organizations, products, domain names,
e-mail addresses, logos, people, places, and events depicted herein are fictitious, and no association with any real
company, organization, product, domain name, e-mail address, logo, person, place, or event is intended or should be
inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under
copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in
any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the
express written permission of Microsoft Corporation.
The names of manufacturers, products, or URLs are provided for informational purposes only and Microsoft makes no
representations and warranties, either expressed, implied, or statutory, regarding these manufacturers or the use of the
products with any Microsoft technologies. The inclusion of a manufacturer or product does not imply endorsement of
Microsoft of the manufacturer or product. Links are provided to third party sites. Such sites are not under the control of
Microsoft and Microsoft is not responsible for the contents of any linked site or any link contained in a linked site, or any
changes or updates to such sites. Microsoft is not responsible for webcasting or any other form of transmission received
from any linked site. Microsoft is providing these links to you only as a convenience, and the inclusion of any link does not
imply endorsement of Microsoft of the site or the products contained therein.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering
subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the
furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual
property.
© 2007 Microsoft Corporation. All rights reserved.
Microsoft, Active Directory, ActiveSync, BizTalk, ForeFront, Internet Explorer, MSN, Outlook, PowerPoint, SharePoint,
SmartScreen, SQL Server, Visual Basic, Visual Studio, Windows, Windows Media, Windows Mobile, Windows
PowerShell, Windows Server, and Windows Vista are either registered trademarks or trademarks of Microsoft Corporation
in the United States and/or other countries.
Released: 04/2007
Version 1.2
MICROSOFT LICENSE TERMS
OFFICIAL MICROSOFT LEARNING PRODUCTS - TRAINER EDITION
These license terms are an agreement between Microsoft Corporation and you. Please read them. They apply
to the Licensed Content named above, which includes the media on which you received it, if any. The terms
also apply to any Microsoft
• updates,
• supplements,
• Internet-based services, and
• support services
for this Licensed Content, unless other terms accompany those items. If so, those terms apply.
By using the Licensed Content, you accept these terms. If you do not accept them, do not use the
Licensed Content.
If you comply with these license terms, you have the rights below.
1. DEFINITIONS.
a. “Academic Materials” means the printed or electronic documentation such as manuals, workbooks,
white papers, press releases, datasheets, and FAQs which may be included in the Licensed Content.
b. “Authorized Learning Center(s)” means a Microsoft Certified Partner for Learning Solutions
location, an IT Academy location, or such other entity as Microsoft may designate from time to time.
c. “Authorized Training Session(s)” means those training sessions authorized by Microsoft and
conducted at or through Authorized Learning Centers by a Trainer providing training to Students
solely on Official Microsoft Learning Products (formerly known as Microsoft Official Curriculum or
“MOC”) and Microsoft Dynamics Learning Products (formerly know as Microsoft Business Solutions
Courseware). Each Authorized Training Session will provide training on the subject matter of one (1)
Course.
d. “Course” means one of the courses using Licensed Content offered by an Authorized Learning Center
during an Authorized Training Session, each of which provides training on a particular Microsoft
technology subject matter.
e. “Device(s)” means a single computer, device, workstation, terminal, or other digital electronic or
analog device.
f. “Licensed Content” means the materials accompanying these license terms. The Licensed Content
may include, but is not limited to, the following elements: (i) Trainer Content, (ii) Student Content,
(iii) classroom setup guide, and (iv) Software. There are different and separate components of the
Licensed Content for each Course.
g. “Software” means the Virtual Machines and Virtual Hard Disks, or other software applications that
may be included with the Licensed Content.
h. “Student(s)” means a student duly enrolled for an Authorized Training Session at your location.
i. “Student Content” means the learning materials accompanying these license terms that are for use
by Students and Trainers during an Authorized Training Session. Student Content may include labs,
simulations, and courseware files for a Course.
j. “Trainer(s)” means a) a person who is duly certified by Microsoft as a Microsoft Certified Trainer and
b) such other individual as authorized in writing by Microsoft and has been engaged by an Authorized
Learning Center to teach or instruct an Authorized Training Session to Students on its behalf.
k. “Trainer Content” means the materials accompanying these license terms that are for use by
Trainers and Students, as applicable, solely during an Authorized Training Session. Trainer Content
may include Virtual Machines, Virtual Hard Disks, Microsoft PowerPoint files, instructor notes, and
demonstration guides and script files for a Course.
l. “Virtual Hard Disks” means Microsoft Software that is comprised of virtualized hard disks (such as a
base virtual hard disk or differencing disks) for a Virtual Machine that can be loaded onto a single
computer or other device in order to allow end-users to run multiple operating systems concurrently.
For the purposes of these license terms, Virtual Hard Disks will be considered “Trainer Content”.
m. “Virtual Machine” means a virtualized computing experience, created and accessed using
Microsoft® Virtual PC or Microsoft® Virtual Server software that consists of a virtualized hardware
environment, one or more Virtual Hard Disks, and a configuration file setting the parameters of the
virtualized hardware environment (e.g., RAM). For the purposes of these license terms, Virtual Hard
Disks will be considered “Trainer Content”.
n. “you” means the Authorized Learning Center or Trainer, as applicable, that has agreed to these
license terms.
2. OVERVIEW.
Licensed Content. The Licensed Content includes Software, Academic Materials (online and electronic),
Trainer Content, Student Content, classroom setup guide, and associated media.
License Model. The Licensed Content is licensed on a per copy per Authorized Learning Center location
or per Trainer basis.
3. INSTALLATION AND USE RIGHTS.
a. Authorized Learning Centers and Trainers: For each Authorized Training Session, you
may:
i. either install individual copies of the relevant Licensed Content on classroom Devices only for use
by Students enrolled in and the Trainer delivering the Authorized Training Session, provided that
the number of copies in use does not exceed the number of Students enrolled in and the Trainer
delivering the Authorized Training Session, OR
ii. install one copy of the relevant Licensed Content on a network server only for access by
classroom Devices and only for use by Students enrolled in and the Trainer delivering the
Authorized Training Session, provided that the number of Devices accessing the Licensed Content
on such server does not exceed the number of Students enrolled in and the Trainer delivering the
Authorized Training Session.
iii. and allow the Students enrolled in and the Trainer delivering the Authorized Training Session to
use the Licensed Content that you install in accordance with (ii) or (ii) above during such
Authorized Training Session in accordance with these license terms.
iv. Separation of Components. The components of the Licensed Content are licensed as a single unit.
You may not separate the components and install them on different Devices.
v. Third Party Programs. The Licensed Content may contain third party programs. These license
terms will apply to the use of those third party programs, unless other terms accompany those
programs.
b. Trainers:
i. Trainers may Use the Licensed Content that you install or that is installed by an Authorized
Learning Center on a classroom Device to deliver an Authorized Training Session.
ii. Trainers may also Use a copy of the Licensed Content as follows:
A. Licensed Device. The licensed Device is the Device on which you Use the Licensed Content.
You may install and Use one copy of the Licensed Content on the licensed Device solely for
your own personal training Use and for preparation of an Authorized Training Session.
B. Portable Device. You may install another copy on a portable device solely for your own
personal training Use and for preparation of an Authorized Training Session.
4. ADDITIONAL LICENSING REQUIREMENTS AND/OR USE RIGHTS.
a. Authorized Learning Centers and Trainers:
i. Software.
Virtual Hard Disks. The Licensed Content may contain versions of Microsoft Windows XP,
Windows Server 2003, and Windows 2000 Advanced Server and/or other Microsoft products which
are provided in Virtual Hard Disks.
A. If the Virtual Hard Disks and the labs are launched through the Microsoft Learning
Lab Launcher, then these terms apply:
TIME-SENSITIVE SOFTWARE. If the Software is not re-launched, it will stop running one
hundred eighty days after you install it. You will not receive notice before it stops running.
You may not be able to access data used or information stored with the Software when it
stops running and/or when it is re-launched. You must remove the Software from the Devices
at the end of each Authorized Training Session and reinstall and launch it prior to the
beginning of the next Authorized Training Session.
B. If the Virtual Hard Disks require a product key to launch, then these terms apply:
Microsoft will deactivate the operating system associated with each Virtual Hard Disk. Before
installing any Virtual Hard Disks on classroom Devices for use during an Authorized Training
Session, you will obtain from Microsoft a product key for the operating system software for
the Virtual Hard Disks and will activate such Software with Microsoft using such product key.
C. These terms apply to all Virtual Machines and Virtual Hard Disks:
You may only use the Virtual Machines and Virtual Hard Disks if you comply with
the terms and conditions of this agreement and the following security
requirements:
o You may not install Virtual Machines and Virtual Hard Disks on portable Devices or
Devices that are accessible to other networks.
o You must remove Virtual Machines and Virtual Hard Disks from all classroom Devices at
the end of each Authorized Training Session, except those held at Microsoft Certified
Partners for Learning Solutions locations.
o You must remove the differencing drive portions of the Virtual Hard Disks from all
classroom Devices at the end of each Authorized Training Session at Microsoft Certified
Partners for Learning Solutions locations.
o You will ensure that the Virtual Machines and Virtual Hard Disks are not copied or
downloaded from Devices on which you installed them.
o You will strictly comply with all Microsoft instructions relating to installation, use,
activation and deactivation, and security of Virtual Machines and Virtual Hard Disks.
o You may not modify the Virtual Machines and Virtual Hard Disks or any contents thereof.
o You may not reproduce or redistribute the Virtual Machines or Virtual Hard Disks.
ii. Classroom Setup Guide. You will assure any Licensed Content installed for use during an
Authorized Training Session will be done in accordance with the classroom set-up guide for the
Course.
iii. Media Elements and Templates. You may allow Trainers and Students to use images, clip art,
animations, sounds, music, shapes, video clips and templates provided with the Licensed Content
solely in an Authorized Training Session. If Trainers have their own copy of the Licensed Content,
they may use Media Elements for their personal training use.
iv Evaluation Software. Any Software that is included in the Student Content designated as
“Evaluation Software” may be used by Students solely for their personal training outside of the
Authorized Training Session.
b. Trainers Only:
i. Use of PowerPoint Slide Deck Templates. The Trainer Content may include Microsoft
PowerPoint slide decks. Trainers may use, copy and modify the PowerPoint slide decks only for
providing an Authorized Training Session. If you elect to exercise the foregoing, you will agree or
ensure Trainer agrees: (a) that modification of the slide decks will not constitute creation of
obscene or scandalous works, as defined by federal law at the time the work is created; and
(b) to comply with all other terms and conditions of this agreement.
ii. Use of Instructional Components in Trainer Content. For each Authorized Training Session,
Trainers may customize and reproduce, in accordance with the MCT Agreement, those portions of
the Licensed Content that are logically associated with instruction of the Authorized Training
Session. If you elect to exercise the foregoing rights, you agree or ensure the Trainer agrees: (a)
that any of these customizations or reproductions will only be used for providing an Authorized
Training Session and (b) to comply with all other terms and conditions of this agreement.
iii. Academic Materials. If the Licensed Content contains Academic Materials, you may
copy and use the Academic Materials. You may not make any modifications to the Academic
Materials and you may not print any book (either electronic or print version) in its entirety. If you
reproduce any Academic Materials, you agree that:
• The use of the Academic Materials will be only for your personal reference or
training use
• You will not republish or post the Academic Materials on any network computer or
broadcast in any media;
• You will include the Academic Material’s original copyright notice, or a copyright
notice to Microsoft’s benefit in the format provided below:
Form of Notice:
© 2007 Reprinted for personal reference use only with permission by Microsoft
Corporation. All rights reserved.
Microsoft, Windows, and Windows Server are either registered trademarks or
trademarks of Microsoft Corporation in the US and/or other countries. Other
product and company names mentioned herein may be the trademarks of their
respective owners.
iv. Distributable Code. The Licensed Content may contain code that you are permitted to
distribute in programs you develop if you comply with the terms below.
A. Right to use and Distribute. The code and text files listed below are “Distributable Code.”
• REDIST.TXT Files. You may copy and distribute the object code form of code listed in
REDIST.TXT files.
• Sample Code. You may modify, copy, and distribute the source and object code form of
code marked as “sample.”
• OTHER-DIST.TXT Files. You may copy and distribute the object code form of code listed
in
OTHER-DIST.TXT files.
• Third Party Distribution. You may permit distributors of your programs to copy and
distribute the Distributable Code as part of those programs.
B. Distribution Requirements. For any Distributable Code you distribute, you must
• add significant primary functionality to it in your programs;
• require distributors and external end users to agree to terms that protect it at least as
much as this agreement;
• display your valid copyright notice on your programs; and
• indemnify, defend, and hold harmless Microsoft from any claims, including attorneys’
fees, related to the distribution or use of your programs.
C. Distribution Restrictions. You may not
• alter any copyright, trademark or patent notice in the Distributable Code;
• use Microsoft’s trademarks in your programs’ names or in a way that suggests your
programs come from or are endorsed by Microsoft;
• distribute Distributable Code to run on a platform other than the Windows platform;
• include Distributable Code in malicious, deceptive or unlawful programs; or
• modify or distribute the source code of any Distributable Code so that any part of it
becomes subject to an Excluded License. An Excluded License is one that requires, as a
condition of use, modification or distribution, that
• the code be disclosed or distributed in source code form; or
• others have the right to modify it.
5. INTERNET-BASED SERVICES. Microsoft may provide Internet-based services with the Licensed
Content. It may change or cancel them at any time. You may not use these services in any way that
could harm them or impair anyone else’s use of them. You may not use the services to try to gain
unauthorized access to any service, data, account or network by any means.
6. Scope of License. The Licensed Content is licensed, not sold. This agreement only gives you some rights
to use the Licensed Content. Microsoft reserves all other rights. Unless applicable law gives you more
rights despite this limitation, you may use the Licensed Content only as expressly permitted in this
agreement. In doing so, you must comply with any technical limitations in the Licensed Content that only
allow you to use it in certain ways. You may not
• install more copies of the Licensed Content on classroom Devices than the number of Students and
the Trainer in the Authorized Training Session;
• allow more classroom Devices to access the server than the number of Students enrolled in and the
Trainer delivering the Authorized Training Session if the Licensed Content is installed on a network
server;
• copy or reproduce the Licensed Content to any server or location for further reproduction or
distribution;
• disclose the results of any benchmark tests of the Licensed Content to any third party without
Microsoft’s prior written approval;
• work around any technical limitations in the Licensed Content;
• reverse engineer, decompile or disassemble the Licensed Content, except and only to the extent that
applicable law expressly permits, despite this limitation;
• make more copies of the Licensed Content than specified in this agreement or allowed by applicable
law, despite this limitation;
• publish the Licensed Content for others to copy;
• transfer the Licensed Content, in whole or in part, to a third party;
• access or use any Licensed Content for which you (i) are not providing a Course and/or (ii) have not
been authorized by Microsoft to access and use;
• rent, lease or lend the Licensed Content; or
• use the Licensed Content for commercial hosting services or general business purposes.
• Rights to access the server software that may be included with the Licensed Content, including the
Virtual Hard Disks does not give you any right to implement Microsoft patents or other Microsoft
intellectual property in software or devices that may access the server.
7. EXPORT RESTRICTIONS. The Licensed Content is subject to United States export laws and regulations.
You must comply with all domestic and international export laws and regulations that apply to the Licensed
Content. These laws include restrictions on destinations, end users and end use. For additional
information, see www.microsoft.com/exporting.
8. NOT FOR RESALE SOFTWARE/LICENSED CONTENT. You may not sell software or Licensed Content
marked as “NFR” or “Not for Resale.”
9. ACADEMIC EDITION. You must be a “Qualified Educational User” to use Licensed Content marked as
“Academic Edition” or “AE.” If you do not know whether you are a Qualified Educational User, visit
www.microsoft.com/education or contact the Microsoft affiliate serving your country.
10. TERMINATION. Without prejudice to any other rights, Microsoft may terminate this agreement if you fail
to comply with the terms and conditions of these license terms. In the event your status as an Authorized
Learning Center or Trainer a) expires, b) is voluntarily terminated by you, and/or c) is terminated by
Microsoft, this agreement shall automatically terminate. Upon any termination of this agreement, you must
destroy all copies of the Licensed Content and all of its component parts.
11. ENTIRE AGREEMENT. This agreement, and the terms for supplements, updates, Internet-
based services and support services that you use, are the entire agreement for the Licensed
Content and support services.
12. APPLICABLE LAW.
a. United States. If you acquired the Licensed Content in the United States, Washington state law
governs the interpretation of this agreement and applies to claims for breach of it, regardless of
conflict of laws principles. The laws of the state where you live govern all other claims, including
claims under state consumer protection laws, unfair competition laws, and in tort.
b. Outside the United States. If you acquired the Licensed Content in any other country, the laws of
that country apply.
13. LEGAL EFFECT. This agreement describes certain legal rights. You may have other rights under the laws
of your country. You may also have rights with respect to the party from whom you acquired the Licensed
Content. This agreement does not change your rights under the laws of your country if the laws of your
country do not permit it to do so.
14. Disclaimer of Warranty. The Licensed Content is licensed “as-is.” You bear the risk of using
it. Microsoft gives no express warranties, guarantees or conditions. You may have additional
consumer rights under your local laws which this agreement cannot change. To the extent
permitted under your local laws, Microsoft excludes the implied warranties of
merchantability, fitness for a particular purpose and non-infringement.
15. LIMITATION ON AND EXCLUSION OF REMEDIES AND DAMAGES. YOU CAN RECOVER FROM
MICROSOFT AND ITS SUPPLIERS ONLY DIRECT DAMAGES UP TO U.S. $5.00. YOU CANNOT
RECOVER ANY OTHER DAMAGES, INCLUDING CONSEQUENTIAL, LOST PROFITS, SPECIAL,
INDIRECT OR INCIDENTAL DAMAGES.
This limitation applies to
• anything related to the Licensed Content, software, services, content (including code) on third party
Internet sites, or third party programs; and
• claims for breach of contract, breach of warranty, guarantee or condition, strict liability, negligence, or
other tort to the extent permitted by applicable law.
It also applies even if Microsoft knew or should have known about the possibility of the damages. The
above limitation or exclusion may not apply to you because your country may not allow the exclusion or
limitation of incidental, consequential or other damages.
Please note: As this Licensed Content is distributed in Quebec, Canada, some of the clauses in this
agreement are provided below in French.
Remarque : Ce le contenu sous licence étant distribué au Québec, Canada, certaines des clauses
dans ce contrat sont fournies ci-dessous en français.
EXONÉRATION DE GARANTIE. Le contenu sous licence visé par une licence est offert « tel quel ». Toute
utilisation de ce contenu sous licence est à votre seule risque et péril. Microsoft n’accorde aucune autre
garantie expresse. Vous pouvez bénéficier de droits additionnels en vertu du droit local sur la protection dues
consommateurs, que ce contrat ne peut modifier. La ou elles sont permises par le droit locale, les garanties
implicites de qualité marchande, d’adéquation à un usage particulier et d’absence de contrefaçon sont exclues.
LIMITATION DES DOMMAGES-INTÉRÊTS ET EXCLUSION DE RESPONSABILITÉ POUR LES
DOMMAGES. Vous pouvez obtenir de Microsoft et de ses fournisseurs une indemnisation en cas de
dommages directs uniquement à hauteur de 5,00 $ US. Vous ne pouvez prétendre à aucune indemnisation
pour les autres dommages, y compris les dommages spéciaux, indirects ou accessoires et pertes de bénéfices.
Cette limitation concerne:
• tout ce qui est relié au le contenu sous licence , aux services ou au contenu (y compris le code)
figurant sur des sites Internet tiers ou dans des programmes tiers ; et
• les réclamations au titre de violation de contrat ou de garantie, ou au titre de responsabilité stricte, de
négligence ou d’une autre faute dans la limite autorisée par la loi en vigueur.
Elle s’applique également, même si Microsoft connaissait ou devrait connaître l’éventualité d’un tel dommage.
Si votre pays n’autorise pas l’exclusion ou la limitation de responsabilité pour les dommages indirects,
accessoires ou de quelque nature que ce soit, il se peut que la limitation ou l’exclusion ci-dessus ne
s’appliquera pas à votre égard.
EFFET JURIDIQUE. Le présent contrat décrit certains droits juridiques. Vous pourriez avoir d’autres droits
prévus par les lois de votre pays. Le présent contrat ne modifie pas les droits que vous confèrent les lois de
votre pays si celles-ci ne le permettent pas.
Contents xi
Table of Contents
Introduction
Introduction ...................................................................................................................................... iii
Course Materials.............................................................................................................................. iv
Microsoft Learning Product Types................................................................................................... vi
Microsoft Learning ........................................................................................................................... ix
Microsoft Certification Program ........................................................................................................x
Facilities......................................................................................................................................... xiv
About This Course .......................................................................................................................... xv
Prerequisites................................................................................................................................. xvii
Process for Designing a Messaging Infrastructure Using Microsoft Exchange Server 2007........ xix
Course Outline................................................................................................................................ xx
Virtual Machine Environment........................................................................................................ xxii
Demonstration: Using Microsoft Virtual Server ........................................................................... xxiv
Appendices
Active Directory and Routing Interview Notes
Trey Research Policy Requirements
Requirements Interview Notes
Messaging Security Requirements
Server Design Interview Notes
Trey Research Current Active Directory Site Design
Trey Research Current Perimeter Design
Trey Research Information
Trey Research Organization Chart
Trey Research Proposed Active Directory Site Design
Trey Research Proposed Perimeter Design
Trey Research Routing Groups
Index ..................................................................................................................I-1
Introduction
Table of Contents
Introduction iii
Course Materials iv
Microsoft Learning Product Types vi
Microsoft Learning ix
Microsoft Certification Program x
Facilities xiv
About This Course xv
Prerequisites xvii
Process for Designing a Messaging Infrastructure
Using Microsoft Exchange Server 2007 xix
Course Outline xx
Virtual Machine Environment xxii
Demonstration: Using Microsoft Virtual Server xxiv
Information in this document, including URL and other Internet Web site references, is subject to change
without notice. Unless otherwise noted, the example companies, organizations, products, domain names, e-
mail addresses, logos, people, places, and events depicted herein are fictitious, and no association with any
real company, organization, product, domain name, e-mail address, logo, person, place, or event is intended or
should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting
the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval
system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or
otherwise), or for any purpose, without the express written permission of Microsoft Corporation.
The names of manufacturers, products, or URLs are provided for informational purposes only and Microsoft
makes no representations and warranties, either expressed, implied, or statutory, regarding these
manufacturers or the use of the products with any Microsoft technologies. The inclusion of a manufacturer or
product does not imply endorsement of Microsoft of the manufacturer or product. Links are provided to third
party sites. Such sites are not under the control of Microsoft and Microsoft is not responsible for the contents of
any linked site or any link contained in a linked site, or any changes or updates to such sites. Microsoft is not
responsible for webcasting or any other form of transmission received from any linked site. Microsoft is
providing these links to you only as a convenience, and the inclusion of any link does not imply endorsement of
Microsoft of the site or the products contained therein.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights
covering subject matter in this document. Except as expressly provided in any written license agreement from
Microsoft, the furnishing of this document does not give you any license to these patents, trademarks,
copyrights, or other intellectual property.
Microsoft, Active Directory, ActiveSync, BizTalk, ForeFront, Internet Explorer, MSN, Outlook, PowerPoint,
SharePoint, SmartScreen, SQL Server, Visual Basic, Visual Studio, Windows, Windows Media, Windows
Mobile, Windows PowerShell, Windows Server, and Windows Vista are either registered trademarks or
trademarks of Microsoft Corporation in the United States and/or other countries.
Version 1.2
Introduction iii
Introduction
iv Introduction
Course Materials
Note: To open the Web page, insert the Student Materials CD into the CD-ROM
drive, and then in the root directory of the CD, double-click StartCD.exe.
• Course evaluation. At the end of the course, you will have the opportunity to
complete an online evaluation to provide feedback on the course, training facility,
and instructor.
Document Conventions
The following conventions are used in course materials to distinguish elements of the text.
Convention Use
Bold Represents commands, command options, and syntax that must be
typed exactly as shown. It also indicates commands on menus and
buttons, dialog box titles and options, and icon and menu names.
Italic In syntax statements or descriptive text, indicates argument names or
placeholders for variable information. Italic is also used for introducing
new terms, for book titles, and for emphasis in the text.
Title Capitals Indicate domain names, user names, computer names, directory names,
and folder and file names, except when specifically referring to case-
sensitive names. Unless otherwise indicated, you can use lowercase
letters when you type a directory name or file name in a dialog box or at
a command prompt.
ALL CAPITALS Indicate the names of keys, key sequences, and key combinations—for
example, ALT+SPACEBAR.
monospace Represents code samples or examples of screen text.
[] In syntax statements, enclose optional items. For example, [filename] in
command syntax indicates that you can choose to type a file name with
the command. Type only the information within the brackets, not the
brackets themselves.
{} In syntax statements, enclose required items. Type only the information
within the braces, not the braces themselves.
| In syntax statements, separates an either/or choice.
X Indicates a procedure with sequential steps.
... In syntax statements, specifies that the preceding item may be repeated.
. Represents an omitted portion of a code sample.
.
.
vi Introduction
• Clinics are for IT professionals, developers and technical decision makers. Clinics
offer a detailed “how to” presentation that describes the features and functionality
of an existing or new Microsoft product or technology, and that showcases product
demonstrations and solutions. Clinics focus on how specific features will solve
business problems.
• First-look Clinics are products specifically designed to deliver early content
or critical information that Product Groups or other internal customers need
communicated quickly and broadly. The First Look products convey knowledge-
based (not skills-based) information to an audience profile identified as high-level
Business Decision Makers.
• Hands-on Labs provide IT professionals and developers with hands-on experience
with an existing or new Microsoft product or technology. Hands-on labs provide a
realistic and safe environment to encourage knowledge transfer by learning through
doing. The labs provided are completely prescriptive so that no lab answer keys are
required. There is very little lecture or text content provided in hands-on labs, aside
from lab introductions, context setting, and lab reviews.
Introduction ix
Microsoft Learning
Other related learning products may become available in the future, so for up-to-date
information about recommended learning products, visit the Microsoft Learning Web site.
MCP Certifications
The MCP program includes the following certifications.
MCITP
The new Microsoft Certified IT Professional (MCITP) credential allows IT professionals
to distinguish themselves as experts in their specific area of focus. There is a
straightforward upgrade path from the MCDBA certification to the new MCITP
credentials. There are currently three IT Professional certifications—in database
development, database administration, and business intelligence:
• Microsoft Certified IT Professional: Database Developer
• Microsoft Certified IT Professional: Database Administrator
• Microsoft Certified IT Professional: Business Intelligence Developer
Introduction xi
MCPD
The Microsoft Certified Professional Developer (MCPD) credential highlights developer
job roles, featuring specific areas of expertise. There is a straightforward upgrade path
from the MCAD and MCSD for Microsoft .NET certifications to the new MCPD
credentials. There are three MCPD certification paths—in Web application development,
Windows development, and enterprise applications development:
• Microsoft Certified Professional Developer: Web Developer
• Microsoft Certified Professional Developer: Windows Developer
• Microsoft Certified Professional Developer: Enterprise Applications Developer
MCTS
The Microsoft Certified Technology Specialist (MCTS) credential enables professionals
to target specific technologies and distinguish themselves by demonstrating in-depth
knowledge of and expertise in the technologies with which they work. There are currently
five MCTS certifications:
• Microsoft Certified Technology Specialist: .NET Framework 2.0 Web Applications
• Microsoft Certified Technology Specialist: .NET Framework 2.0 Windows
Applications
• Microsoft Certified Technology Specialist: .NET Framework 2.0 Distributed
Applications
• Microsoft Certified Technology Specialist: SQL Server™ 2005
• Microsoft Certified Technology Specialist: BizTalk® Server
Exam 70-237 and exam 70-238 are core exams for the MCITP: Messaging Engineer
certification.
MCDST on Microsoft Windows®
The Microsoft Certified Desktop Support Technician (MCDST) certification is designed
for professionals who successfully support and educate end users and troubleshoot
operating system and application issues on desktop computers running the Windows
operating system.
xii Introduction
MCT
Microsoft Certified Trainers (MCTs) demonstrate the instructional and technical skills
that qualify them to deliver Official Microsoft Learning Products through a Microsoft
Certified Partner for Learning Solutions (CPLS).
Certification Requirements
Certification requirements differ for each certification category and are specific to the
products and job functions addressed by the certification. To earn a certification
credential, you must pass rigorous certification exams that provide a valid and reliable
measure of technical proficiency and expertise.
Facilities
Introduction xv
This section provides you with a brief description of the course, objectives, and target
audience.
Description
This course teaches messaging engineers to design a messaging infrastructure. Students
will assess an existing infrastructure and determine technical and business requirements
for new Exchange Server 2007 deployments and migrations. They will create a design
that addresses security, architecture, scalability, coexistence, and client access needs.
Students also will learn strategies for gaining design approval from stakeholders.
Objectives
After completing this course, you will be able to:
• Gather business and technical requirements for a messaging infrastructure.
• Design an Active Directory® directory service and message routing infrastructure.
• Design the hardware and system configuration for Exchange servers.
• Design security for the messaging environment.
• Design strategies for coexistence and interoperability.
• Design a strategy for upgrading to Exchange Server 2007.
• Design messaging policies.
• Obtain approval for a messaging infrastructure design.
xvi Introduction
Audience
The audience for this course includes people with three or more years experience
working with previous Exchange Server versions and experience implementing
Exchange Server 2007. Most students will have managed enterprise-level Exchange
Server organizations. Students are expected to be new to participating in designing
Exchange Server 2007 deployments on the job, or should be planning to design Exchange
Server 2007 deployments in the near future. Students may have done some design for
Exchange 2000 Server or Exchange Server 2003 deployments, but want to learn how to
design Exchange Server 2007 environments. Students will have experience in designing
and managing Active Directory and network infrastructure deployments.
Introduction xvii
Prerequisites
Important: This learning product will be most useful to people who intend to use
their new skills and knowledge on the job immediately after training.
Introduction xix
Course Outline
This section provides the information for setting up the classroom environment to support
the course’s business scenario.
Important: At the end of each lab, you must close the virtual machine and must
not save any changes. To close a virtual machine without saving the changes,
perform the following steps:
1. On the host computer, click Start, point to All Programs, point to Microsoft
Virtual Server, and then click Virtual Server Administration Website.
2. Under Navigation, click Master Status. For each virtual machine that is
running, point to the virtual machine name, and, in the context menu, click Turn off
Virtual Machine and Discard Undo Disks. Click OK
The following table shows the role of each virtual machine used in this course:
Virtual machine Role
The domain controller for the treyresearch.net domain. It has a
LON-DC1
standard Exchange Server 2007 installation.
A stand-alone server that has the Exchange Server 2007 Edge
LON-Edge1
Transport Server role installed on it.
LON-CL1 A member of the treyresearch.net domain.
Introduction xxiii
Software Configuration
The following software is installed on the VMs:
• Windows Server 2003, Service Pack 1, or Windows XP, Service Pack 2
• Exchange Server 2007
• Microsoft Office Outlook 2007
Classroom Setup
Each classroom computer will have the same virtual machine configured in the same way.
Keyboard Shortcuts
While working in the Virtual Machine Remote Control Client environment, you might
find it helpful to use keyboard shortcuts. All Virtual Server shortcuts include a key that is
referred to as the HOST key or the RIGHT-ALT key. By default, the HOST key is the
ALT key on the right side of your keyboard. Some useful shortcuts include:
• RIGHT-ALT+DELETE to log on to the Virtual PC.
• RIGHT-ALT+ENTER to switch between full-screen and window modes.
For more information about using Virtual Server, see Virtual Server Help.
Module 1: Gathering Requirements for a
Messaging Infrastructure
Table of Contents
Overview 1-1
Lesson 1: Gathering Business Requirements 1-2
Lesson 2: Identifying Additional Requirements 1-15
Lesson 3: Analyzing the Current Messaging
Environment 1-28
Lesson 4: Creating a Requirements Document 1-48
Lab: Gathering Requirements for a Messaging
Infrastructure 1-53
Information in this document, including URL and other Internet Web site references, is subject to change
without notice. Unless otherwise noted, the example companies, organizations, products, domain names,
e-mail addresses, logos, people, places, and events depicted herein are fictitious, and no association with any
real company, organization, product, domain name, e-mail address, logo, person, place, or event is intended or
should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting
the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval
system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or
otherwise), or for any purpose, without the express written permission of Microsoft Corporation.
The names of manufacturers, products, or URLs are provided for informational purposes only and Microsoft
makes no representations and warranties, either expressed, implied, or statutory, regarding these
manufacturers or the use of the products with any Microsoft technologies. The inclusion of a manufacturer or
product does not imply endorsement of Microsoft of the manufacturer or product. Links are provided to third
party sites. Such sites are not under the control of Microsoft and Microsoft is not responsible for the contents of
any linked site or any link contained in a linked site, or any changes or updates to such sites. Microsoft is not
responsible for webcasting or any other form of transmission received from any linked site. Microsoft is
providing these links to you only as a convenience, and the inclusion of any link does not imply endorsement of
Microsoft of the site or the products contained therein.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights
covering subject matter in this document. Except as expressly provided in any written license agreement from
Microsoft, the furnishing of this document does not give you any license to these patents, trademarks,
copyrights, or other intellectual property.
Microsoft, Active Directory, ActiveSync, BizTalk, ForeFront, Internet Explorer, MSN, Outlook, PowerPoint,
SharePoint, SmartScreen, SQL Server, Visual Basic, Visual Studio, Windows, Windows Media, Windows
Mobile, Windows PowerShell, Windows Server, and Windows Vista are either registered trademarks or
trademarks of Microsoft Corporation in the United States and/or other countries.
Version 1.2
Module 1: Gathering Requirements for a Messaging Infrastructure 1-1
Overview
Before you can begin designing your organization’s new messaging system, you
must first understand why your organization plans to deploy the messaging system
and the state of the current messaging system. Most organizations need an information
technology (IT) infrastructure to ensure business tasks are performed correctly. Before
you deploy new IT technologies, administrators must understand and be able to present
clearly to decision makers the way in which these new technologies will address existing
and new business requirements.
Objectives
After completing this module, you will be able to:
• Gather business requirements for a Microsoft® Exchange Server 2007 deployment.
• Identify project stakeholders and non-business requirements.
• Analyze the current messaging environment.
• Create a requirements document.
1-2 Module 1: Gathering Requirements for a Messaging Infrastructure
In this lesson, you will gather business requirements for an Exchange Server 2007
deployment. Identifying business requirements helps determine the benefits of, and
rationale for, the deployment project.
Objectives
After completing this lesson, you will be able to:
• Describe the importance of business requirements.
• Define a project’s functional business requirements.
• Define service level agreements (SLAs).
• Identify types of regulatory and organizational compliance requirements.
• Identify project constraints.
• Gather business requirements.
Module 1: Gathering Requirements for a Messaging Infrastructure 1-3
Business Requirements
To operate more effectively, an organization must address its many needs, or business
requirements. Business requirements can take many different forms. For example, an
organization may need to:
• Become more efficient. Most businesses are very competitive and strive to be
more efficient than are their competitors. When evaluating new technologies, these
organizations typically will invest in the technology if it will improve efficiency.
• Meet an external requirement. Forces outside an organization, such as the
government or business partners, may impose requirements. For example,
government regulations may require archival of certain e-mail messages for a
specified time or business partners may enforce specific security requirements for
e-mail communication between locations.
• Avoid disruptions to business processes. A current technology may meet most
business requirements. However, if it is unreliable, an organization may invest in a
new technology that provides the requisite reliability and availability.
• Explore new business areas or solutions. Organizations sometimes use technologies
to pursue new business opportunities. For example, deploying Web-based tools for
selling products and services has increased the business potential for many
organizations significantly.
1-4 Module 1: Gathering Requirements for a Messaging Infrastructure
Functional Specification
Functional requirements help create the functional specification, which serves as a
contract between the customer and the team, describes the proposed solution in exacting
detail, and forms the basis for project plans and schedules. The customer is the consumer
of the technology, and usually are the business sponsors and users.
The functional specification is important because it:
• Establishes an agreement between the team and the customer. This enables the team
to determine the correct solution to meet the customer’s expectations.
• Provides in-depth project details to help the team determine if it is building the
solution correctly. This, in turn, makes the solution easier to validate and verify.
• Enables the team to estimate budgets and schedules. The quantity of resources and
their respective skill sets are difficult to determine without the specific detail that a
functional specification provides.
Types of SLAs
The SLAs that organizations use can vary from informal to very structured:
• Informal SLAs often are not documented, but rather are general expectations for
system performance that are well known. For example, an organization may have an
internal, unwritten policy that certain servers never are restarted during business
hours.
• Formal SLAs typically are documented extensively and detail expectations
determined from negotiations between service providers and business customers.
These SLAs may define exact expectations for each system component and may
include penalties if expectations are not met. Often, the most formal SLAs are
negotiated between business customers and outsourced IT providers.
Best Practice: If an organization does not have any written SLAs, it is very
important when beginning any deployment project to identify and document
informal SLAs. Clearly identifying the expected system performance enables future
validation of the project’s success.
Negotiating SLAs
SLAs have a significant impact on a project’s scope and budget, so it is important to
define them at the project’s inception.
Business requirements, plus functional and nonfunctional requirements, typically are the
basis for initial SLA negotiations. In most cases, the project team and business sponsors
negotiate the final SLA details. Initial requirements may set very high expectations.
However, meeting those high expectations can be very expensive. For example, say an
SLA requires that messages are delivered between company locations within 60 seconds,
100 percent of the time. The only way to meet this expectation may be to deploy fully
redundant systems throughout the organization. The cost of this likely would be
prohibitive. Thus, the organization may negotiate a more acceptable performance level
at a more reasonable cost.
Module 1: Gathering Requirements for a Messaging Infrastructure 1-9
Discussion Questions
Based on your experience, consider the following questions:
Q In what type of business does your organization participate? What are the legislated
compliance requirements for your organization?
A Answers will vary depending on the type of business in which your organization
participates. Examples of legislation restricting how organizations manage
information include:
• United States:
Q What issues do regulatory and organizational compliance requirements raise for your
organization? How are you addressing these issues? What are the gaps between the
requirements and the solutions?
A Answers will vary. Traditionally, it is difficult to address regulatory and
organizational compliance requirements. Answers may include:
• Archiving all messages using a third-party tool.
• Specifying policies to regulate the types of information sent via e-mail.
• Enforcing policies through auditing.
• Scanning messages for content and applying necessary disclaimers.
Q Are the compliance solutions based on policy or technology? In other words, does
your organization only have written policies that define what users can do, or is there
a technological solution in place to enforce some or all of the requirements? If you
are using a policy-based solution, how do you enforce policies?
A Answers will vary. Typically, organizations have policy-based solutions for cases
where a technology-based solution does not exist. Additionally, policy-based
solutions are difficult to enforce and policy violators often are detected only through
difficult investigation.
Module 1: Gathering Requirements for a Messaging Infrastructure 1-11
Project constraints define the project’s parameters. Project constraints often set limits on
what you can accomplish. For example, if the project has a fixed budget, the budget
becomes a constraint that defines parameters for what you can accomplish.
• Feature constraints. Organizations may restrict features that are included in a project.
For example, a requirement may exist to provide users with cell phone-based mobile
devices access to Exchange server mailboxes. However, if the proposed solution
cannot address this requirement, the project might be canceled. Additionally,
requiring e-mail encryption might necessitate issuing a smart card to all mobile users.
However, the organization might not have the organizational maturity, necessary
infrastructure, or budget to do so.
Assessing the company’s business needs is a key strategy for gaining approval to deploy
Exchange Server 2007. Typically, a business justification for investing in the new
technology is required. You need to collect information from many sources to define
business requirements. The most common methods for collecting this data include:
• Interviewing or holding focus groups for stakeholders and users.
• Observing users as they perform tasks, or asking users to demonstrate the tasks they
perform.
• Reviewing existing documentation, including business and technical documentation.
• Developing a solution prototype (often referred to as a “proof-of-concept”) or
demonstrating the available functionality that a product provides.
• Implementing user surveys.
• Talking with help-desk personnel to identify common issues that users experience.
Business requirements also may include additional relevant information, such as market
data, competitive analysis, and customer feedback. You may collect this information
from existing documentation or through additional surveys or interviews.
1-14 Module 1: Gathering Requirements for a Messaging Infrastructure
Business requirements are not the only factors to consider when designing a messaging
system. Additional needs can add to the project design or constrain a project’s design by
limiting or strictly defining which business requirements the project can address.
Objectives
After completing this lesson, you will be able to:
• Identify additional project stakeholders.
• Define technology requirements.
• Identify IT needs.
• Identify security mandates.
• Define user demands.
• Resolve conflicting requirements.
1-16 Module 1: Gathering Requirements for a Messaging Infrastructure
Typical Stakeholders
The business sponsor is one of the most important stakeholders for most projects. The
business sponsor typically provides the project’s business requirements and budget.
However, a large project, such as deploying a new messaging system, will impact an
entire organization significantly and many people throughout the organization must have
input into the project’s design.
A project such as an Exchange Server 2007 deployment can have several additional
stakeholders besides the project sponsor, including:
• IT personnel. The Exchange Server 2007 deployment will affect almost all aspects of
IT administration. Therefore, IT personnel have an interest in the technical design.
The specific roles that will be affected include network administrators, storage area
network (SAN) administrators, Active Directory® directory service administrators,
administrators for network services such as Domain Name System (DNS), and
messaging administrators.
• Security and compliance officers. These people typically are important stakeholders
because of the data types being sent via e-mail and the integration of e-mail into
many business processes.
• Messaging users. A new technology often affects users directly, so they may have
different requirements than a business sponsor.
Identifying Stakeholders
Use the following process to determine which stakeholders should be consulted regarding
a messaging system deployment:
1. Identify a small group of the most critical and obvious stakeholders, and the
personnel who have the highest level of IT infrastructure understanding.
2. Present this group with a high-level description document of the project scope and
business requirements. The description document does not need to be detailed, but
should include the parts of the organization that the project may impact.
3. Allow this group to identify all other organizational parties or groups that the new
technology’s deployment will affect.
4. Gather additional information, if necessary, to verify the description document’s
accuracy. For each group that is listed, briefly describe its contribution to the project.
5. Select one or more group members to act as stakeholders and the group’s
representatives.
1-18 Module 1: Gathering Requirements for a Messaging Infrastructure
Identifying IT Requirements
Another essential stakeholder group consists of those who create and enforce an
organization’s security policies. Messaging is an integral part of most organizations’
business processes, so it is imperative to identify any security issues early and include
their solutions in the project’s design.
Another important stakeholder group in an Exchange Server 2007 deployment are the
messaging system’s users.
• What user training will be required when you implement the new system?
• What security requirements exist for client access to user mailboxes?
• How much do users utilize the messaging system? Can you characterize the activity
level of users as light, medium, or heavy? How many users fall into each category?
• Are there groups of users with special security needs, performance requirements, or
functionality concerns?
As you gather all of the requirements for the Exchange Server 2007 deployment, it is
likely that you will identify conflicting requirements. For example, certain business
requirements, such as the budget, may conflict with other business requirements, such as
security requirements. In this example, the IT department may have security requirements
that add significant cost to a project, thereby exceeding the budget that the business
sponsor set.
Discussion Questions
Based on your experience, consider the following questions:
Q What examples have you seen where requirements conflicted?
A There are many possible answers. In some cases, business requirements may conflict
with the IT requirements. For example, the business requirement may state that all
users have full access to their mailboxes via mobile clients, while the IT requirements
may state that only approved mobile devices should be used by a small user subset.
Module 1: Gathering Requirements for a Messaging Infrastructure 1-27
Q One of the most common scenarios for incompatible requirements occurs between
security and business requirements. How can security requirements be balanced with
other requirements?
A These types of conflicting requirements typically are the most difficult to resolve. It
is hard to assign a dollar value to a security breach, so business sponsors may view
security requirements as a project cost that adds no value. Some general guidelines
for addressing security requirements include:
• Express security requirements in business terms. For example, the business
sponsor may not understand when you state that all messages must be encrypted
using at least 128-bit encryption. However, you can explain that sending
messages over the Internet is similar to sending a post card, rather than a letter in
a sealed envelope. Ask what types of business data are sent via e-mail to Internet
clients, and discuss the implications of someone being able to capture and read
that e-mail.
• Be clear about which security requirements are non-negotiable and which are
open to discussion. Every organization typically has non-negotiable security
requirements, such as the mandates for secure authentication traffic on the
Internet or that prohibit sending of private customer information in a format that
others can read easily. Other security requirements may be negotiable, or there
may be available options that partially address both security and business
requirements.
Once you have gathered the messaging infrastructure requirements, the next step is
to analyze the current network and messaging environment. Analyzing the current
environment helps determine the gaps between the current messaging infrastructure and
the requirements and goals of the intended messaging infrastructure. This information
provides a starting point for determining the appropriate design and implementation plan
for the Exchange Server 2007 deployment.
Objectives
After completing this lesson, you will be able to:
• Analyze the physical network infrastructure.
• Analyze the name resolution services infrastructure.
• Analyze the Active Directory infrastructure.
• Analyze an existing messaging infrastructure.
• Identify usage statistics for a messaging system.
• Identify additional infrastructure requirements.
• Analyze administrative models and processes.
• Analyze a change-control process.
Module 1: Gathering Requirements for a Messaging Infrastructure 1-29
To determine how your existing network will support an Exchange Server 2007
messaging environment, build a complete picture of your network infrastructure,
including site locations, connection types, and router and switch configuration details.
• Bandwidth, latency, and current usage. Bandwidth is the transmission speed over a
network connection in kilobits per second (Kpbs). Latency refers to the time it takes,
in milliseconds, to transfer data between two points. Both of these factors combine
to determine how much data that can be transmitted in a set time period over the
network. This information, as well as the current applications using the network and
the number of users at various sites, and their use patterns, can be used to create a
design for your Exchange Server organization that provides a satisfactory user
experience. When mapping site locations and connections, determine the type and
speed of network connectivity and factor in the latency that distances between sites
introduces. The project may need to include network upgrades to provide Exchange
servers with adequate bandwidth for the messaging service.
• Use of virtual local area networks (VLANs). Determine the current use of any VLAN
configurations within your networking infrastructure. If required, ensure that you
configure these VLANs, or have the ability to configure them, to pass the traffic that
the existing and intended messaging system generates.
• Firewall configuration requirements. Depending on your deployment plan, you
should determine any firewall configuration requirements for implementation and
synchronization of an Edge Transport server, which you should place within a
secured perimeter network.
• Nontechnical constraints. These include geographical, political, or cost-related
restrictions resulting from a change or upgrade of network links between sites.
Note: Refer to the Existing Network Infrastructure Analysis job aid located on the
Student Materials CD.
Module 1: Gathering Requirements for a Messaging Infrastructure 1-31
Name resolution services translate network addresses to computer names and vice versa.
The Domain Name System (DNS) provides the required name resolution services for the
Active Directory directory service, as well as for internal and external name resolution.
Exchange Server 2007 depends upon DNS for locating Active Directory domain
controllers, global catalog servers, other Exchange servers and remote domains. All
SMTP servers also use DNS Mail Exchange (MX) records for routing outbound mail.
Note: Refer to the Existing Network Infrastructure Analysis job aid located on the
Student Materials CD.
Module 1: Gathering Requirements for a Messaging Infrastructure 1-33
Active Directory directory service planning and administration is tied closely with
messaging-service delivery. In many organizations, the same team is responsible
for both. For messaging systems, the Active Directory is important because it is the
mechanism by which the mail transport agent decides which recipients are local and
where their mailboxes are stored. Many organizations have already migrated to
Active Directory, which means that the most important design and service decisions
have been made.
Note: Refer to the Existing Network Infrastructure Analysis job aid located on the
Student Materials CD.
1-36 Module 1: Gathering Requirements for a Messaging Infrastructure
Integration Considerations
When integrating with an existing messaging environment, consider the following:
• Exchange Server 2007 does not support an in-place upgrade from any earlier
Exchange version.
• The Exchange organization must be operating in native mode before you can
introduce Exchange 2007 servers into the environment. This means that only servers
running Exchange Server 2003 and Exchange 2000 Server can exist in the
organization.
• If your organization includes Exchange Server version 5.5, you must perform an
upgrade to Exchange Server 2003 or Exchange 2000 Server before moving to
Exchange Server 2007. To move messaging services and data from Exchange
Server 2003 or Exchange 2000 Server to Exchange Server 2007, you must use the
move mailbox functionality in Exchange Server 2007.
Note: Refer to the Current Messaging Infrastructure Analysis job aid located on the
Student Materials CD.
Module 1: Gathering Requirements for a Messaging Infrastructure 1-39
• How many client computers exist and where are they located on the network?
These two factors have a profound influence on the user’s messaging access
experience because slow networks or heavy server loads are common causes of
reported dissatisfaction. By understanding where users are located, you can better
determine client access bottlenecks within the messaging environment.
• Are there plans to redeploy, update, or replace clients? These efforts may happen
before, during, or after deployment of the new messaging system, and you can
plan the deployment accordingly.
• Which client protocols are used to access e-mail? Depending upon user
requirements, many organizations deploy one or more of the following client
protocols:
• MAPI clients
• HTTPS (Outlook Web Access)
• POP3/IMAP4
• Outlook Anywhere (formerly known as remote procedure call (RPC) over
HTTPS)
• Microsoft Exchange ActiveSync® or other mobile messaging clients
• WebDAV (Entourage clients)
Determine an extensive client user profile by using the Microsoft Exchange Server
Profile Analyzer or other third-party tools.
You can use Microsoft Windows Performance Monitor to obtain current usage patterns
and statistics. Exchange Server installs many of its own performance objects and counters
to provide information about Exchange Server services and resources. Specific objects
and counters related to user statistics include the following:
Object Counter
MSExchangeIS • User Count
• RPC Requests
MSExchange IS Mailbox • Messages Sent/min
• Messages Delivered/min
SMTP Server • Inbound Connections Current
• Message Bytes Sent/sec
• Message Bytes Received/sec
1-42 Module 1: Gathering Requirements for a Messaging Infrastructure
You may need to consider a number of additional components when documenting your
current messaging environment. If you understand the use of these additional components,
you can determine the new messaging environment’s requirements and provide insight on
whether updated third-party components are necessary.
For more information: When selecting a storage solution, choose a solution that
the Microsoft Exchange Solution Reviewed Program (ESRP) has reviewed. For
more information about ESRP, see the “Microsoft Exchange Solution Reviewed
Program (ESRP) – Storage” page on the Microsoft TechNet Web site.
Create an inventory of the products used in your environment, including antivirus and
anti-spam solutions, storage management software, fax or unified messaging connectors,
and system management and monitoring tools.
1-44 Module 1: Gathering Requirements for a Messaging Infrastructure
Your organization’s administrative structure and processes have great influence over
the IT infrastructure design. Understanding the constraints inherent in a particular
organization is a crucial part of assessing the environment before you deploy the new
messaging system. Areas to investigate include:
• Current organizational administrative model. In some organizations, IT management
may be centralized, while in other organizations, the responsibilities may be
delegated to regional areas or individual business units. The most common approach
is a combination of the two, in which some IT functions are centralized, such as
network provisioning and security, while others, such as user account management
and mail administration, are delegated to geographic or business subdivisions.
• User account administrative model. In a centralized environment, a single group of
administrators may perform these tasks for all organizational users. In a decentralized
environment, this responsibility may lie with the messaging team or another team,
such as the human resources or corporate security departments.
The Exchange Server 2007 administrative model has changed significantly from
previous Exchange versions. Mailbox attributes and recipient information are no
longer managed with the Active Directory Users and Computers snap-in. This change
provides a simplified model for delegating Active Directory tasks versus Exchange-
related tasks.
Module 1: Gathering Requirements for a Messaging Infrastructure 1-45
The change control process varies greatly between organizations. Some organizations
have not implemented a formal change control process, while others implement strict
change requests, approval, and notification processes. It is important to understand how
your organization manages changes to ensure that all users and stakeholders are aware
and approve of changes made to your messaging environment.
• What are the time frames for making changes that may impact availability? Many
organizations implement SLAs with their internal users or customers. An SLA
provides a guarantee that specific network services will be available and outlines
acceptable outage time frames should an upgrade or failure occur. Document all
current SLAs that the organization uses to ensure that changes do not impact legal
requirements to users.
• What are the risk management processes related to change management? A complete
change control process includes a risk analysis and processes for mitigating risks.
Note: For more information on change control processes and risk analysis, see
Course 5054: Designing a High Availability Messaging Solution Using Microsoft®
Exchange Server 2007.
1-48 Module 1: Gathering Requirements for a Messaging Infrastructure
After you have gathered the business requirements and current environment data, you are
ready to create a requirements document. A requirements document summarizes all of the
information that you gather and provides a basis for the new messaging infrastructure’s
design and implementation plans. This lesson describes the components of a requirements
document and discusses how to evaluate priorities and constraints when determining the
project’s business and technical goals.
Objectives
After completing this lesson, you will be able to:
• Describe the components of a requirements document.
• Define project priorities and constraints.
Module 1: Gathering Requirements for a Messaging Infrastructure 1-49
A formal requirements document may vary depending upon a project’s complexity and
the organization that is implementing the project. However, there are many common
sections that should be included in all requirements documents to ensure effective
decision making and provide a foundation for subsequent design and implementation
documentation.
Important: All project stakeholders should review and sign off on the project vision
and scope. This ensures that there is an understanding of project goals and
boundaries.
Discussion Questions
Q What tradeoff decisions must be made during a project design?
A Tradeoff decisions that you need to consider are Resource, Schedule, and Features.
The Resource tradeoff includes factors such as personnel and budget. For example,
the messaging engineers may be engaged on several projects and may not be
available full-time for the deployment project. The Schedule indicates the time
needed to complete the project. The Features tradeoff indicates the functional
specifications that are both part of, and not part of, the project’s scope. Exchange
Server 2007 provides many new features related to client access to e-mail and
messaging policies. Resource or schedule constraints may limit which of these
features you can implement.
Q How can the Tradeoffs Triangle and Project Tradeoff Matrix help to make tradeoff or
priority decisions?
A Both tools provide a visual reference of the impact of prioritizing one element over
another.
Lab Setup
For this lab, you will use the available virtual machine environment. Before you begin the
lab, you must:
• Start the 5053A-LON-CL1 virtual machine.
• Log on to the virtual machine as TreyResearch\Administrator with a password of
Pa$$w0rd.
Note: Two additional virtual machines are provided with this course. 5053A-LON-
DC1 is configured as a domain controller in the treyresearch.net domain and has a
standard Exchange Server 2007 installation. 5053A-LON-Edge1 is a stand-alone
server and has the Exchange Server 2007 Edge Transport Server role installed on
it. The 5053A-LON-CL1 computer is a member of the treyresearch.net domain.
These additional virtual machines are provided for your reference. You will not be
performing any lab steps on the computers, but you can use them to investigate
Exchange Server 2007 configuration options when required.
1-54 Module 1: Gathering Requirements for a Messaging Infrastructure
Lab Scenario
You are a messaging engineer for Trey Research, an enterprise-level organization with
multiple locations. Trey Research is an international corporation involved in technology
research and investment, and is planning to upgrade from Exchange 2000 Server to
Exchange Server 2007. Trey Research currently has three remote sites and their
headquarters. The company is pursuing an aggressive expansion plan and will be adding
two new office locations during the upgrade project.
Location Internal Users Mobile Users
London 12,000 currently • 1000 – Outlook Web Access users
Corporate Headquarters 10,000 after the new • 500 – Outlook Anywhere and mobile client users
London office is ready • 800 – Outlook users connecting through a VPN
London (new office) 4,000 (anticipated) • 200 – Outlook Web Access users
• 50 – Outlook Anywhere and mobile client users
San Diego 500 • 50 – POP3 client users
Former head office of
A. Datum Corporation
Toronto 6,000 • 800 – Outlook Web Access users
• 100 – Outlook Anywhere and mobile client users
Tokyo 5,000 • 1000 – Outlook Web Access users
• 200 – Outlook Anywhere and mobile client users
• 200 – Outlook users connecting through a VPN
Chennai (new office) 800 (anticipated) • 200 – Outlook Web Access users
• 50 – Outlook users connecting through a VPN
TreyResearch has deployed a single Active Directory forest with a dedicated root domain
named TreyResearch.net and three child domains in the same tree. These domains are:
• EU.TreyResearch.net
• NA.TreyResearch.net
• AS.TreyResearch.net
Additionally, the organization has deployed a domain named Adatum.com in the San
Diego location. This domain is configured as a separate tree in the TreyResearch.net
forest.
Module 1: Gathering Requirements for a Messaging Infrastructure 1-55
Note: The documents in the LabResource folder on the LON-CL1 are also
available in the Appendix in the student workbook.
1. Review the Trey Research • Review the following sources of information located in the
documentation. D:\LabResources folder:
• TR_Info.vsd
• TR_Orgchart.vsd
• Requirements Interview Notes.doc
2. Complete the appropriate • The Current Network Infrastructure Analysis.doc file is located in
sections in the Current the D:\Mod01\Labfiles\LabInputs folder.
Network Infrastructure • Complete the following sections in the document:
Analysis document.
• Active Directory Infrastructure – Sites
• Active Directory Infrastructure – Forest and domain
topology
Note: Only fill in the details in these two sections. You may not
be able to fill in all of the information in these sections.
3. Complete the appropriate • The Current Messaging Infrastructure Analysis.doc file is located
sections in the Current in the D:\Mod01\Labfiles\LabInputs folder.
Messaging Infrastructure • Complete the following sections in the document:
Analysis document.
• Exchange Server Configuration
• Exchange Organization Information
Note: Only fill in the details in these two sections. You may not
be able to fill in all of the information in these sections.
Discussion Questions
Q What additional information may be required to complete a design for the Trey
Research messaging infrastructure?
A Answers will vary. Additional requirements might include storage groups and stores
information, including the storage mechanism used to store the databases, message
flow statistics, message security settings, and antivirus and anti-spam settings.
Note: The answers to the labs are on the Student Materials CD.
Module 1: Gathering Requirements for a Messaging Infrastructure 1-57
1. As a group, discuss the • What are Trey Research’s requirements and pain points?
questions. You will • How can Exchange Server 2007 help address the requirements?
incorporate your answers
• Which requirements have the potential to cause conflicts? What
in to the requirements
solutions would you propose to resolve these conflicts?
documentation.
2. As a group, complete the • The Project Requirements Analysis.doc file is located in the
appropriate sections in the D:\Mod01\Labfiles\LabInputs folder.
Project Requirements • Complete the following sections in the document:
Analysis document.
• Summary of Business Requirements
• Summary of Functional Requirements
• Summary of Additional Requirements
• Project Priorities and Constraints
Note: Only fill in the details in these four sections. You may not be
able to fill in all of the information in these sections.
Note: The answers to the labs are on the Student Materials CD.
1-58 Module 1: Gathering Requirements for a Messaging Infrastructure
Discussion Questions
Q What information is required to set the preliminary budget?
A Answers include:
• Project vision and scope
• Business requirements—what business problems is this project expected to solve
• Functional requirements
• Project constraints
Q How do you resolve scenarios where addressing all of the requirements will cost
significantly more than the proposed budget?
A This can be very complicated. In the project’s early stage, the most important step is
to alert business sponsors that there may be budget issues. This enables them to
prepare for a future tradeoff discussion or consider increasing the budget. You also
may need to provide the business sponsor with an initial proposal identifying the
project components that will cost the most money.
Note: The answers to the labs are on the Student Materials CD.
Note: If you shut down the virtual machines without saving changes, the files that
you created during the lab will not be saved. To retain those files, you can leave
the virtual machines running, or you can shut down 5053A-LON-CL1 and commit
the changes.
Module 1: Gathering Requirements for a Messaging Infrastructure 1-59
Lab Shutdown
1. On the host computer, click Start, point to All Programs, point to Microsoft
Virtual Server, and then click Virtual Server Administration Website.
2. Under Navigation, click Master Status. For each virtual machine that is running,
click the Virtual Machine Name, and, in the context menu, click Turn off Virtual
Machine and Discard Undo Disks. Click OK.
3. Start the 5053A-LON-CL1 virtual machine. Additionally, you can also start the
5047A-LON-DC1 and the 5047A-LON-Edge1 virtual machines.
Module 2: Designing Active Directory
and Message Routing
Table of Contents
Overview 2-1
Lesson 1: Designing an Active Directory
Infrastructure 2-2
Lesson 2: Designing Message Routing 2-23
Lesson 3: Designing the Message Routing
Perimeter 2-31
Lab: Designing Active Directory and Message
Routing 2-44
Information in this document, including URL and other Internet Web site references, is subject to change
without notice. Unless otherwise noted, the example companies, organizations, products, domain names,
e-mail addresses, logos, people, places, and events depicted herein are fictitious, and no association with any
real company, organization, product, domain name, e-mail address, logo, person, place, or event is intended or
should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting
the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval
system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or
otherwise), or for any purpose, without the express written permission of Microsoft Corporation.
The names of manufacturers, products, or URLs are provided for informational purposes only and Microsoft
makes no representations and warranties, either expressed, implied, or statutory, regarding these
manufacturers or the use of the products with any Microsoft technologies. The inclusion of a manufacturer or
product does not imply endorsement of Microsoft of the manufacturer or product. Links are provided to third
party sites. Such sites are not under the control of Microsoft and Microsoft is not responsible for the contents of
any linked site or any link contained in a linked site, or any changes or updates to such sites. Microsoft is not
responsible for webcasting or any other form of transmission received from any linked site. Microsoft is
providing these links to you only as a convenience, and the inclusion of any link does not imply endorsement of
Microsoft of the site or the products contained therein.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights
covering subject matter in this document. Except as expressly provided in any written license agreement from
Microsoft, the furnishing of this document does not give you any license to these patents, trademarks,
copyrights, or other intellectual property.
Microsoft, Active Directory, ActiveSync, BizTalk, ForeFront, Internet Explorer, MSN, Outlook, PowerPoint,
SharePoint, SmartScreen, SQL Server, Visual Basic, Visual Studio, Windows, Windows Media, Windows
Mobile, Windows PowerShell, Windows Server, and Windows Vista are either registered trademarks or
trademarks of Microsoft Corporation in the United States and/or other countries.
All other trademarks are property of their respective owners.
Version 1.2
Module 2: Designing Active Directory and Message Routing 2-1
Overview
You can begin designing the Microsoft® Exchange Server 2007 messaging environment
after you define business requirements and have a good understanding of the current
environment. The Active Directory® directory service and Exchange Server 2007
integrate tightly, so you should start by reviewing the Active Directory design to
determine if any changes are necessary to optimize the Exchange Server 2007 design.
The logical next step is to design message routing, because Exchange Server 2007
depends on the Active Directory site topology to define the routing configuration.
Another design component you must define is the message routing perimeter.
Objectives
After completing this module, you will be able to design:
• An Active Directory infrastructure that is optimized for Exchange Server 2007
• Message routing
• The message routing perimeter
2-2 Module 2: Designing Active Directory and Message Routing
Objectives
After completing this lesson, you will be able to:
• Identify the Active Directory design owners.
• Design the Active Directory forest.
• Design the Active Directory domain.
• Design the Active Directory sites for Exchange Server.
• Deploy Exchange servers in Active Directory sites.
• Design Internet access for Microsoft Office Outlook® Web Access.
• Design the Active Directory domain controller strategy.
• Apply considerations for modifying the Active Directory design.
Module 2: Designing Active Directory and Message Routing 2-3
Note: Exchange Server 2007 uses a split permissions model, which distinguishes
between Active Directory and Exchange Server permissions. This makes it easier
to separate the administrative tasks between the two services. However, during the
design phase, the Active Directory and Exchange Server design teams must work
together to ensure an optimal Active Directory and Exchange Server design.
Note: From an administrative point of view, the members of the forest Schema
Admins and Enterprise Admins groups can be considered the Active Directory
design owners. However, these groups should be used only to implement
decisions that the actual design owners make.
Some organizations may have multiple teams of Active Directory design owners. These
organizations typically have more multiple Active Directory forests. In most cases, the
organization created these forests to establish security boundaries between its different
parts. Thus, each forest is likely to have a different group of owners. If an organization
has multiple teams of Active Directory design owners, you may need to negotiate with all
teams during the Exchange Server 2007 design.
The Active Directory forest design can impact the Exchange Server 2007 design
significantly. The Exchange Server 2007 organization boundary is always the same as
the Active Directory forest boundary. Although you can deploy Exchange Server 2007
in a multiple forest environment, it is complicated to design this type of Exchange
Server 2007 deployment.
• Cross-forest. In this topology, you install Exchange into multiple, different Active
Directory forests. Organizations that are highly distributed typically deploy this
topology, as it enables different organizational groups to retain management
ownership of a forest. In this topology, each forest has a complete Exchange
deployment and a unique Exchange organization object.
Best Practice: A single forest means that the Exchange Server 2007 design and
deployment is significantly simpler than any other option. Therefore, you should
always use a single forest unless there are highly compelling reasons to use
multiple forests.
In a resource forest environment, the GAL is created in the resource forest. You may not
need to configure directory synchronization between the two forests if you configure all
of the required user properties in the resource forest. However, you will need to configure
synchronization between the forests if the accounts forest manages account attributes or if
you want to automate configuration of the resource forest’s accounts and mailboxes.
You can deploy Exchange Server 2007 in several different domain configurations.
Although deploying Exchange Server 2007 in a single domain environment may be the
simplest design, there is very little difference between deploying Exchange Server 2007
in a single domain or in a single forest with multiple domains.
Note: Regardless of how many domains and trees are in a forest, the first domain
you deploy in the forest always is the forest root domain. By default, this domain
contains the Schema Master and Domain Naming Master roles, and the Schema
Admins and Enterprise Admins security groups.
Module 2: Designing Active Directory and Message Routing 2-9
Note: The functional level for all Active Directory forest domains in which you
deploy Exchange Server 2007 must be Windows 2000 native mode or higher.
One reason is that Exchange Server 2007 allows only universal security groups or
universal distribution groups to be mail-enabled. Additionally, when you prepare
the Active Directory forest for the Exchange Server 2007 installation, several
Exchange universal security groups are created that are used to set permissions
on Exchange configuration objects. You can create universal security groups only
in a domain that is in Windows 2000 native mode or higher.
There are two domain options that may impact the Exchange Server 2007 design in a
multiple domain environment:
• Creating a dedicated domain for the Exchange servers. Some organizations may
choose to deploy a separate domain for all Exchange servers and Exchange Server
administrators.
One advantage of this is that the Exchange administrators also can be the dedicated
domain’s administrators. This means that they can perform all administrative tasks on
the Exchange servers without requiring any administrative rights in other Active
Directory domains. To manage recipients in other domains, you must add the
Exchange administrators to the Exchange Recipient Administrators group.
A primary disadvantage of deploying a dedicated Exchange Server domain is the
extra cost that results from deploying and managing an additional domain. You
should deploy at least two domain controllers for the Exchange Server domain, and
this configuration may require additional domain controllers for the domain in other
locations.
Instead of deploying a dedicated domain for the Exchange servers, consider using the
Exchange Server Administrator role to delegate Exchange Server permissions. Users
or groups that you assign to this role receive full administrative permissions to the
specific Exchange Server computer.
2-10 Module 2: Designing Active Directory and Message Routing
• Deploying Exchange Server 2007 in a multi-tree forest. The main reason for
deploying multiple trees in a forest is to create separate namespaces for different
organizational business units. This configuration often requires separate Simple Mail
Transfer Protocol (SMTP) addresses for the different business units’ users. By
default, Exchange Server 2007 creates SMTP addresses for all users based on the
domain name of the forest root domain. You can easily modify the default SMTP
address assignment by creating additional accepted domains and then configuring
e-mail address policies to assign the required e-mail addresses to the different
business units’ users.
Module 2: Designing Active Directory and Message Routing 2-11
In an organization with multiple locations, the Active Directory site design will have
a significant impact on the Exchange Server 2007 design. Exchange Server 2007 and
messaging clients use Active Directory sites to locate domain controllers and to define
message routing.
• The Hub Transport server role retrieves information from Active Directory to
determine the organization’s internal and external mail routing. When a message
is submitted to the Microsoft Exchange Transport service, the categorizer queries
Active Directory for information about where the message must be delivered. If
the recipient’s mailbox is on a Mailbox server in the same Active Directory site as
the Hub Transport server, it delivers the message directly to that mailbox. If the
recipient’s mailbox is on a Mailbox server in a different Active Directory site, the
message is relayed to a Hub Transport server in that site, which then delivers it to the
Mailbox server.
• The Unified Messaging server role uses Active Directory site membership
information to determine which Hub Transport servers are located in the same Active
Directory site as the Unified Messaging server. The Unified Messaging (UM) server
submits messages for routing and transport to a Hub Transport server in the same site
as the Unified Messaging server. The Hub Transport server also queries Active
Directory to match a telephone number, or other UM property such as the user’s
Mailbox server, to a recipient account. The Hub Transport server delivers the
message to a Mailbox server within its same Active Directory site or relays the
message to another Hub Transport server, which then delivers it to a Mailbox server
that is outside the Active Directory site.
Module 2: Designing Active Directory and Message Routing 2-13
Exchange Server 2007 has a much stronger reliance on Active Directory sites than
previous Exchange Server versions. Therefore, you must consider the Active Directory
site configuration when you design the Exchange Server 2007 deployment.
• You should deploy a Unified Messaging server in the site if you are using the Unified
Messaging features and if you deploy a supported Voice over IP (VoIP) gateway in
the site.
Note: You can deploy all Exchange Server 2007 server roles, except the Edge
Transport server and clustered mailbox servers, on the same server. This means
that in a small site, a single computer can hold all of the required server roles.
2-16 Module 2: Designing Active Directory and Message Routing
If you have multiple Active Directory sites, there are two options for designing Outlook
Web Access from the Internet:
• You can restrict all Internet client access to a single Client Access server in one of
the sites. If you choose this option, the Internet-accessible Client Access server
proxies all Outlook Web Access client access requests to a Client Access server in
the site that contains the Mailbox server that hosts the user mailbox.
• You can enable Internet client access to Client Access servers in each Active
Directory site. If you choose this option, Outlook Web Access client access requests
to a Client Access server in a site other than that containing the user mailbox are
redirected to the Client Access server in the site where the user mailbox resides.
Note: All Client Access server client connections, other than Outlook Web Access,
always are proxied to a Client Access server in the same site as the user mailbox.
Only Outlook Web Access allows redirection.
Module 2: Designing Active Directory and Message Routing 2-17
Note: By default, the Outlook Web Access virtual directory is configured to use
forms-based authentication. You should leave forms-based authentication enabled
on the Client Access server that is accessible from the Internet. However, you must
configure the other Client Access servers to use Integrated Windows
authentication.
2-18 Module 2: Designing Active Directory and Message Routing
As part of the Active Directory site design, you must also consider the domain controller
and global catalog server placement. The location and capacity of these domain
controllers can impact Exchange Server and messaging-client performance significantly.
Note: You cannot promote a member server running Exchange Server 2007 to
become a domain controller. Once you install Exchange 2007, changing its role
from a member server to a domain controller, or vice versa, is not supported
• For the best performance, when an Active Directory organization contains more than
20,000 objects, you should upgrade the domain controllers and global catalog servers
to 64-bit hardware. This improves your Exchange Server 2007 environment’s overall
performance and scalability. However, Exchange Server 2007 still supports 32-bit
domain controllers.
• As a general guideline, you should implement Exchange processors to global catalog
server processors in a 4:1 ratio in each site, assuming that the processors are similar
models and speeds. In some situations, however, if Active Directory includes a large
number of users or you have large distribution lists, you may need more global
catalog servers.
Module 2: Designing Active Directory and Message Routing 2-21
The Exchange design may require some Active Directory changes. However, it can be
difficult to modify the Active Directory design in a large, complex organization.
Discussion Questions
Based on your experience, consider the following questions:
Q What impact might result from changing the Active Directory design in a large,
complex company?
A Answers will vary. In some cases, modifying the Active Directory design may be
fairly simple. For example, it may be easy to create a new Active Directory site or
remove one in an organization that does not have many deployed site-aware
applications. In other cases, it can be very difficult to modify the Active Directory
design, such as adding or removing domains or forests.
2-22 Module 2: Designing Active Directory and Message Routing
Q How can you balance the complications of modifying the current Active Directory
design with the optimal Exchange Server-based design?
A Answers will vary. The optimal Active Directory design for Exchange Server 2007
may be different than the current Active Directory design. However, there may be
many good reasons for the current design, and it may take a lot of effort to modify
the current Active Directory infrastructure. If the current Active Directory design is
optimized for another reason, or if the necessary change is too difficult, modifying
the current design may not be an option. In some cases, the maintenance costs of, or
functionality loss from, the current Active Directory design, may make it feasible
to modify the design. For example, if you have multiple forests that contain your
organization’s user accounts, it will be very difficult to merge the forests into a single
forest. However, Exchange Server 2007 provides the most functionality in a single
forest, so the effort required to merge the forests may be worth it.
Q How can you help an organization determine whether to modify the Active Directory
design?
A When addressing this question, you must first decide what to change in the Active
Directory design to make Exchange Server 2007 more efficient. Then you must
determine the difficulty associated with making the changes and determine whether
the benefits that result are worth the effort. Present this information to the appropriate
stakeholders to help them make the decision.
Module 2: Designing Active Directory and Message Routing 2-23
Objectives
After completing this lesson, you will be able to:
• Describe Exchange Server 2007 default message routing configuration.
• Design hub sites to manage message routing.
• Design message routing to deal with message routing failure.
2-24 Module 2: Designing Active Directory and Message Routing
Many organizations create Active Directory sites to control Active Directory replication
and client authentication network traffic. Exchange Server 2007 uses Active Directory
sites and Active Directory site links to define an organization’s internal and external
message routing.
3. The Hub Transport server uses Active Directory site link information to determine
the lowest cost route to the destination Active Directory site. In a default
configuration, the Hub Transport server opens an SMTP connection to the Hub
Transport server in the destination site and delivers the message.
4. After a Hub Transport server in the destination Active Directory site receives a
message, the Hub Transport server forwards the message to the appropriate Mailbox
server in the destination Active Directory site.
5. If the message has multiple recipients whose mailboxes are in different Active
Directory sites, Exchange Server uses delayed fan-out to optimize message delivery.
If the recipients share part of, or the entire path, Exchange Server sends a single
copy of the message with these recipients until the bifurcation point. When the mail
reaches the bifurcation point, the message is bifurcated and a separate copy is sent to
each recipient. For example, if the least-cost route from Site1 to Site3 and Site4 both
pass through Site2, then a single copy of a message intended for recipients in Site3
and Site4 is sent to a Hub Transport server in Site2. The Hub Transport server in
Site2 then sends two copies of the message, one each to a Hub Transport server in
Site3 and Site4.
Note: If you are deploying Exchange Server 2007 in an Exchange 2000 Server or
Exchange Server 2003 environment, the organization’s message routing will vary
if the messages are routed to, or from, previous Exchange Server versions. This
scenario will be covered in Module 5, “Designing Co-Existence and Interoperability
Strategies,” in this course.
Important: Exchange Servers do not use the underlying network topology to make
message routing decisions. A single site link may actually cross multiple network
segments, but the Exchange Server will evaluate only the site link. Therefore, it is
important that the site links logically reflect the underlying network topology.
2-26 Module 2: Designing Active Directory and Message Routing
Note: Each Exchange transport server calculates a set of routing tables that
determine how to route messages to recipients. Whenever the Exchange server
calculates the routing table, it logs the result. By default, these logs are located in
the %Program Files%\Microsoft\Exchange Server\Transport\Logs\Routing
folder. The Exchange transport server recalculates the routing tables when the
transport services begin, when the server receives a notification of an Active
Directory change, and every six hours.
Module 2: Designing Active Directory and Message Routing 2-27
In some cases, you may want modify the default message routing configuration by
configuring specific Active Directory sites as Hub sites, and by assigning Exchange-
specific routing costs to Active Directory site links.
• Configure Exchange-specific routing costs. You also can modify the default
message-routing topology by configuring an Exchange-specific cost to an Active
Directory IP site link. If you assign an Exchange-specific cost to the site link, the
Hub Transport server uses this attribute rather than the Active Directory-assigned
cost to determine the least-cost routing path.
• Configure expansion servers for distribution groups. You also can modify the default
routing topology by assigning expansion servers for distribution groups. By default,
when a message is sent to distribution group, the first Hub Transport server that
receives the message expands the distribution list and calculates how to route the
messages to each recipient. If you configure an expansion server for the distribution
list, all messages sent to the distribution list are sent to the specified Hub Transport
server, which expands the list and distributes the messages.
Note: Configuring hub sites does not decrease the network traffic as Exchange
Server 2007 uses delayed fan out, regardless of whether you configure hub sites.
• Consider configuring an Exchange-specific cost to an IP site link if the cost does not
result in an optimal Exchange message routing topology and if you cannot modify the
Active Directory parameter.
• Consider site link costs when configuring hub sites. Hub sites are used only if the hub
site is along the least-cost routing path between two Hub Transport servers. The Hub
Transport server first calculates the least-cost route between two sites, then checks to
see if that route has any hub sites.
• Consider using expansion servers for very large distribution lists. Expanding large
distribution groups is a resource-intensive process for the Hub Transport server and a
global catalog server. If your organization has a central location with more powerful
Hub Transport servers or more global catalog server capacity, you may want to
configure one of the Hub Transport servers in the site as the expansion server for
large distribution lists. Ensure that this server is highly available, because it is not
possible to assign more than one expansion server to a distribution list.
Module 2: Designing Active Directory and Message Routing 2-29
When designing the message routing topology, you also should consider how Exchange
Server 2007 deals with situations where message routing between sites fails.
Note: Deploying multiple Hub Transport servers in a site also provides load
balancing. If there are multiple Hub Transport servers available in the destination
site, message delivery is distributed across all available servers.
Module 2: Designing Active Directory and Message Routing 2-31
Objectives
After completing this lesson, you will be able to:
• Deploy and secure Edge Transport servers.
• Design edge subscriptions.
• Design outbound message flow to the Internet.
• Design inbound message flow from the Internet.
• Design message routing from the internal network to the network perimeter.
2-32 Module 2: Designing Active Directory and Message Routing
The Edge Transport server design and deployment is a critical component when you
create a network perimeter message-routing solution. The Edge Transport server role
provides a secure SMTP gateway server that handles all messages sent to and from the
organization.
Note: The Edge Transport server role provides messaging security by enabling
SMTP connector security, transport rules, and anti-spam and antivirus scanning.
Module 4, “Designing Security for a Messaging Environment,” in this course
discusses these topics in more detail.
• Reduce the attack surface on the Edge Transport server. As a best practice,
implement a dedicated server to operate as the Edge Transport server. This means
that the server will have no other running applications, and you can use a host-based
firewall to block all network traffic except for the port that the server role specifically
requires. Use the Security Configuration Wizard that Windows Server 2003 SP1
includes to disable all services that the server does not require and to configure
Windows Firewall.
• Open as few ports as possible on the internal and external firewalls. The following
table describes the firewall rules that you need to configure:
• Configure administrative permissions. If you deploy the Edge Transport server role
on a stand-alone server, you must use local user accounts to administer the Edge
Transport server. The local administrators group is granted full control of the Edge
Transport server, including the Active Directory Application Mode (ADAM)
instance on the Edge Transport server. In most cases, you will use Remote Desktop
to perform remote Edge Transport server administration. The local administrators
group is granted remote logon permissions automatically. If you want to assign Edge
Transport server administrative permissions to other accounts, create a user account
on the local computer and add the user account to the local administrators group to
ensure that the correct access level is granted.
Note: If you are going to use Remote Desktop from the internal network to
administer the Edge Transport server, configure the internal firewall to allow port
3389 for Remote Desktop Protocol (RDP) from the internal network to the Edge
Transport server.
2-34 Module 2: Designing Active Directory and Message Routing
You can subscribe an Edge Transport server to an Active Directory site. This associates
the Edge Transport server with the Exchange organization. A subscribed Edge Transport
server is stamped with an Active Directory site attribute, which means that you can
configure the edge subscription as a source server for Send connectors that you create in
the Exchange organization.
When you configure an edge subscription, Exchange-organization and Edge Transport
server configuration occurs automatically to enable Internet message flow. After you
configure the edge subscription, the edge synchronization process replicates the
following data from Active Directory to ADAM:
• Accepted and remote domains.
• Recipients (Hashed). A one-way hash is used on the recipient information so that an
attacker cannot retrieve it from the Edge Transport server.
• Safe senders (Hashed).
• Send connectors.
• Hub Transport server list (for dynamic connector generation).
2-36 Module 2: Designing Active Directory and Message Routing
To enable message flow to the Internet, you must configure the Exchange organization
with at least one SMTP send connector that has an SMTP address space that includes
Internet SMTP domains. Depending on your organization’s requirements, you can
deploy multiple Edge Transport servers with multiple SMTP send connectors to send
Internet e-mail.
Important: Exchange Server 2007 does not fail over automatically to use an
alternate connector if one connector is unavailable. Each Exchange Server 2007
chooses a single route for delivering messages to a specified recipient. If a
connector will be unavailable for an extended period of time, and you need to force
the Exchange Servers to use an alternate connection, remove the connector from
the Exchange organization, wait for Active Directory replication to update all
organizational domain controllers, and restart the Microsoft Exchange Transport
service to force the Hub Transport servers to recalculate routing.
• How will you configure the SMTP send connectors? To enable outbound message
flow, you must configure at least one SMTP send connector to send e-mail to the
Internet. You can use the following options to configure SMTP send connectors:
• Use edge synchronization to configure the SMTP send connectors. When you
configure an edge subscription, edge synchronization automatically configures a
send connector for the Active Directory site to enable message delivery between
the local Hub Transport servers and the Edge Transport server. Additionally,
edge synchronization configures a send connector to enable message delivery
from the Edge Transport server to the Internet.
• Create additional SMTP send connectors. You may have additional requirements
for send connectors. For example, you may need to configure unique message
routing or message security for a partner organization. You can configure an
additional send connector using the organization’s SMTP domain as the address
space and then configure the other send connector properties.
• Manually configure send connectors for Internet e-mail. If you are not using
an Edge Transport server or if you do not want to use edge synchronization,
you must configure the send connectors manually. You can configure send
connectors in the Hub Transport servers to route e-mail directly to the Internet or
to an SMTP gateway server or other smart host.
• How will you configure DNS lookups? By default, the Hub Transport server and
Edge Transport server perform DNS lookups for Internet message delivery by using
the DNS server that is configured on the network connection. Configure the settings
on the Exchange Server properties to configure other DNS servers for message
delivery. Consider this option if you want to use external DNS servers to perform
name-resolution services for the Edge Transport servers rather than use internal DNS
servers.
Module 2: Designing Active Directory and Message Routing 2-39
To enable message flow from the Internet, you must configure the Exchange organization
with at least one SMTP receive connector that will accept anonymous SMTP connections
from Internet SMTP servers. Depending on your organization’s requirements, you can
deploy multiple Edge Transport servers with multiple SMTP receive connectors to
receive Internet e-mail.
• How will you configure SMTP receive connectors? By default, an Edge Transport
server is configured with an SMTP receive connector that accepts anonymous
connections from all IP addresses. You can use this receive connector to accept
incoming e-mail. All Hub Transport servers also are configured with a receive
connector. However, this connector only accepts authentication connections.
If you configure an edge subscription, this creates a send connector on the Edge
Transport server to send messages to the internal Hub Transport servers. The edge
subscription also configures an account that authenticates the connection to the Hub
Transport server and provides an encryption key that can encrypt messages sent
between the two servers.
You can create additional SMTP receive connectors to address specific business
requirements. For example, you may want to configure a receive connector that
requires authentication or TLS encryption to ensure that messages are secured from a
partner organization. Each receive connector must use a unique combination of IP
address bindings, port-number assignments, and the remote IP address ranges from
which the connector will accept mail.
Module 2: Designing Active Directory and Message Routing 2-41
In addition to planning a message routing topology inside the Exchange organization, you
also need to plan one for messages sent to recipients outside the Exchange organization.
To do this, you must understand how Exchange Server 2007 selects a route for outbound
messages and how to optimize this configuration.
Note: You also can configure a send connector on one or more Hub Transport
servers to enable message flow outside the organization.
2-42 Module 2: Designing Active Directory and Message Routing
If you configure more than one Send connector with a name space that meets the routing
requirements for an external recipient, Exchange Server 2007 routing will select a single
connector through which to route the message using the following algorithm:
• Select the connectors that do not have restrictions that prevent message delivery. If
you configure a send connector with a 3MB size limit, it will not be considered for
sending a message with a 4MB attachment. A disabled connector is not selected for
sending messages.
• From the remaining connectors, select the connectors with the most specific address
space match. For example, if one Send connector is configured with the address
space *.contoso.com and a second connector is configured with the address space *,
a message that is addressed to a recipient with an SMTP address @contoso.com is
routed through the first connector.
• From the remaining connectors, select the connector with the lowest aggregate cost.
The connector’s cost is determined by adding the cost of the IP site links between the
source site and the Active Directory site that contains the source servers for the Send
connector, and the cost assigned to the connector.
• From the remaining connectors, select the connector with the closest proximity.
The local server is chosen over another Hub Transport server in the same Active
Directory site, while a server in the local Active Directory site is chosen over a
source server in a remote Active Directory site.
• From the remaining connectors, select the connector with the lowest alphanumeric
connector name.
Note: After selecting the SMTP send connector to use to send the message
outside the organization, the Hub Transport server in the source site routes the
message to a Hub Transport server in the site where you have configured the send
connector. Exchange Server 2007 uses deterministic routing for message sent
outside the organization. Exchange Server 2007 chooses a single route through
which to send messages outside the organization, and it will not use an alternate
route unless you change the underlying routing configuration.
Module 2: Designing Active Directory and Message Routing 2-43
Note: Assign limited scope to a connector by adding the Local: prefix to the
address space. Do this with the Set-SendConnector cmdlet. For example, to limit
a Send connector’s scope to an Active Directory site, you run the following
command: Set-SendConnector -identity Connectorname -AddressSpaces
local:*
Lab Setup
For this lab, you will use the available virtual machine environment. Before you begin the
lab, you must:
• Start the 5053A-LON-CL1 virtual machine.
• Log on to the virtual machine as TreyResearch\Administrator with a password of
Pa$$w0rd.
Note: Two additional virtual machines are provided with this course. 5053A-LON-
DC1 is configured as a domain controller in the TreyResearch.net domain and has
a standard Exchange Server 2007 installation. 5053A-LON-Edge1 is a stand-alone
server and has the Exchange Server 2007 Edge Transport Server role installed.
The 5053A-LON-CL1 computer is a member of the Treyresearch.net domain.
Module 2: Designing Active Directory and Message Routing 2-45
Lab Scenario
You are a messaging engineer for Trey Research, an enterprise-level organization with
multiple locations. Trey Research is an international corporation involved in technology
research and investment, and is planning to upgrade from Exchange 2000 Server to
Exchange Server 2007. Trey Research currently has three remote sites and their
headquarters. The company is pursuing an aggressive expansion plan and will be adding
two new office locations during the upgrade project.
Location Internal Users Mobile Users
London 12,000 currently • 1000 – Outlook Web Access users
Corporate Headquarters 10,000 after the • 500 – Outlook Anywhere and mobile client users
new London • 800 – Outlook users connecting through a VPN
office is ready
London (new office) 4,000 • 200 – Outlook Web Access users
(anticipated) • 50 – Outlook Anywhere and mobile client users
San Diego 500 • 50 – POP3 client users
Former head office of
A. Datum Corporation
Toronto 6,000 • 800 – Outlook Web Access users
• 100 – Outlook Anywhere and mobile client users
Tokyo 5,000 • 1000 – Outlook Web Access users
• 200 – Outlook Anywhere and mobile client users
• 200 – Outlook users connecting through a VPN
Chennai (new office) 800 (anticipated) • 200 – Outlook Web Access users
• 50 – Outlook users connecting through a VPN
You can review the Trey Research Active Directory infrastructure, network infrastructure,
or the messaging-system requirements in the following documents in the
D:\Mod01\Labfiles\LabAnswers folder.
• Trey Research Project Requirements Analysis.doc
• Trey Research Messaging Infrastructure.doc
• Trey Research Network Infrastructure.doc
2-46 Module 2: Designing Active Directory and Message Routing
1. Review the Trey Research • Review the following sources of information located in the
documentation. D:\LabResources folder:
• AD and Routing Interview Notes.doc
• TR_CurrentADSiteDesign.vsd
Note: You may need to review files such as the TR_Info.vsd file in
the LabResources folder to review the information discussed in the
previous lab. You may also need to review the answer files from
the previous module.
2. Modify the • Use callouts in the Visio file to document proposed changes to the
TR_CurrentADSiteDesign. site design. For each proposed change, provide:
vsd file with proposed • The proposed change
changes to the site design.
• A rationale for the proposed change
• Indicate which server roles need to be deployed in each Active
Directory site.
• Document message flow within the organization. Document the
changes that you will need to make to the Active Directory
configuration to enable optimal message flow.
• Save the file as D:\Mod02\Labfiles\LabOutputs\
TR_ProposedADSiteDesign.vsd
1. Review the Trey Research • Review the following sources of information located in the
documentation. D:\Mod02\Labfiles\LabInputs folder:
• AD and Routing Interview Notes.doc
• TR_CurrentPerimeterDesign.vsd
2. Modify the • Use callouts in the Visio file to document proposed changes
TR_CurrentPerimeterDesign.vsd to the perimeter design. For each proposed change, provide:
file with proposed changes to the • The proposed change
site design.
• A rationale for the proposed change
• Indicate whether you need to deploy any additional server
roles in each Active Directory site.
• Indicate the required firewall changes to meet your design
requirements.
• Indicate any other infrastructure changes that you must
implement to meet your design requirements.
• For each company location, document how messages are
delivered to the Internet and how inbound messages are
delivered to internal recipients.
• Save the file as D:\Mod02\Labfiles\LabOutputs\
TR_ProposedPerimeterDesign.vsd
Discussion Questions:
Q What changes did you make to the Active Directory site configuration and the
organization’s message routing?
A Answers should include:
• The current site link setting will create very inefficient message routing. By
default, the DefaultIPSiteLink site link has a cost of 100, which means that all
messages will be routed directly to the site with the closest proximity. To use the
network connections with the highest bandwidth and ensure that messages are
queued outside the main offices if a destination server is unavailable, you must
make the following changes:
• The LondonSite to SanDiegoSite connection must have a higher cost than the
LondonSite-TorontoSite-SanDiegoSite connection.
• The LondonSite to ChennaiSite connection must have a higher cost than the
LondonSite-TokyoSite-ChennaiSite connection.
• The TorontoSite to TokyoSite connection must have a higher cost than the
TorontoSite-LondonSite-TokyoSite connection.
• You must create new site links to implement these changes. At a minimum, you
will need new three new site links:
• LondonSite to SanDiegoSite
• LondonSite to ChennaiSite
• TorontoSite to TokyoSite
• The cost for the new site links must be 201 or higher, or the route’s Exchange
cost must be assigned at 201 or higher.
• You should merge LondonSite and LondonSite2 to address the issues of
messages remaining in the categorizer queue and with the global address list
(GAL) lookups for clients. This enables the LondonSite clients to access the
global catalog server in the LondonSite2 location and does not require
deployment of an additional domain controller.
Module 2: Designing Active Directory and Message Routing 2-49
• You must deploy at least one Mailbox server role, one Hub Transport server role,
and one Client Access server role in each site.
• Recommendation: Retain the domain controller in Chennai and build the secure
server room. If this is not done, the users in Chennai will have a very poor
experience as the logon process and access to any e-mail services will be very
slow. As an alternative, you could propose upgrading the network connection
between Chennai and London, or between Chennai and Tokyo.
Q If your recommended changes are implemented, how will messages flow between the
Active Directory sites? Where will messages be queued in the event of a server or
network connection failure?
A Message routing will flow as follows:
• From San Diego: San Diego-Toronto-London-Tokyo-Chennai
• From Toronto: Toronto-London-Tokyo-Chennai, and Toronto-San Diego
• From London: London-Tokyo-Chennai, and London-Toronto-San Diego
• From Tokyo: Tokyo-London-Toronto-San Diego, and Tokyo-Chennai
• From Chennai: Chennai-Tokyo-London-Toronto-San Diego
In each case, the messages are queued on an available Hub Transport server in the
Active Directory site that is closest to the destination site.
To ensure that inbound messages are distributed evenly between the three Edge
Transport servers, you should create three MX records in the TreyResearch.net zone
with equal priorities. One MX record should be created for the Adatum.com domain
and should use the Edge Transport server in Toronto.
2-50 Module 2: Designing Active Directory and Message Routing
Q What conflicting requirements were presented in the scenario? How did you resolve
conflicting requirements?
A Conflict may result from resistance to changing the Active Directory structure. If
this arises, emphasize that creating the additional site links is the only way to meet
message-routing requirements. Thus, you have to change the requirements or modify
the Active Directory structure. Suggest that if you do not change the Active Directory
site link costs, Active Directory replication remains unaffected. You can still control
message flow by configuring Exchange costs to the site links.
The requirement for creating a positive experience for Outlook Web Access users
conflicts with the network administrators’ requirement to reduce firewall changes.
In particular, this will create a problem in Chennai. If Outlook Web Access users
connect to a Client Access server in Tokyo or London, the Client Access server will
proxy the client request to the Client Access server in Chennai across a very slow
network connection. To resolve this issue, you can:
• Enable Internet access to the Client Access server in Chennai.
• Move the mailboxes for Outlook Web Access users from Chennai to London or
Tokyo.
• Significantly increase the bandwidth between Tokyo and Chennai, or between
London and Chennai.
Q What additional information should you consider when designing message routing in
this scenario?
A In a real-world scenario, an important additional piece of information that you need is
how many messages actually are sent between company locations. This may affect
the design and, in particular, this information may help to resolve some of the
conflicting requirements.
Note: If you shut down the virtual machines without saving changes, the files that
you created during the lab will not be saved. To retain those files, you can leave
the virtual machines running, or you can shut down 5053A-LON-CL1 and commit
the changes.
Lab Shutdown
1. On the host computer, click Start, point to All Programs, point to Microsoft
Virtual Server, and then click Virtual Server Administration Website.
2. Under Navigation, click Master Status. For each virtual machine that is running,
click the Virtual Machine Name, and, in the context menu, click Turn off Virtual
Machine and Discard Undo Disks. Click OK.
3. Start the 5053A-LON-CL1 virtual machine. Additionally, you can also start the
5047A-LON-DC1 and the 5047A-LON-Edge1 virtual machines.
Module 3: Designing Exchange Servers
Table of Contents
Overview 3-1
Lesson 1: Designing Mailbox Servers 3-2
Lesson 2: Designing Non-Mailbox Servers 3-21
Lesson 3: Designing a Public Folder Architecture 3-40
Lesson 4: Designing a Lab Environment 3-54
Lab: Designing Exchange Servers 3-59
Information in this document, including URL and other Internet Web site references, is subject to change
without notice. Unless otherwise noted, the example companies, organizations, products, domain names,
e-mail addresses, logos, people, places, and events depicted herein are fictitious, and no association with any
real company, organization, product, domain name, e-mail address, logo, person, place, or event is intended or
should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting
the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval
system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or
otherwise), or for any purpose, without the express written permission of Microsoft Corporation.
The names of manufacturers, products, or URLs are provided for informational purposes only and Microsoft
makes no representations and warranties, either expressed, implied, or statutory, regarding these
manufacturers or the use of the products with any Microsoft technologies. The inclusion of a manufacturer or
product does not imply endorsement of Microsoft of the manufacturer or product. Links are provided to third
party sites. Such sites are not under the control of Microsoft and Microsoft is not responsible for the contents of
any linked site or any link contained in a linked site, or any changes or updates to such sites. Microsoft is not
responsible for webcasting or any other form of transmission received from any linked site. Microsoft is
providing these links to you only as a convenience, and the inclusion of any link does not imply endorsement of
Microsoft of the site or the products contained therein.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights
covering subject matter in this document. Except as expressly provided in any written license agreement from
Microsoft, the furnishing of this document does not give you any license to these patents, trademarks,
copyrights, or other intellectual property.
Microsoft, Active Directory, ActiveSync, BizTalk, ForeFront, Internet Explorer, MSN, Outlook, PowerPoint,
SharePoint, SmartScreen, SQL Server, Visual Basic, Visual Studio, Windows, Windows Media, Windows
Mobile, Windows PowerShell, Windows Server, and Windows Vista are either registered trademarks or
trademarks of Microsoft Corporation in the United States and/or other countries.
All other trademarks are property of their respective owners.
Version 1.2
Module 3: Designing Exchange Servers 3-1
Overview
Objectives
After completing this module, you will be able to:
• Design Mailbox servers configurations
• Design configurations for other servers running Exchange Server 2007
• Design a public folder architecture
• Design a test lab
3-2 Module 3: Designing Exchange Servers
In an Exchange Server 2007 environment, the Mailbox server role manages access to all
user mailboxes and public folders. In this role, the Exchange server may host dozens of
databases containing hundreds of megabytes of data. It also may support connections for
thousands of concurrent users. To provide a positive experience for messaging system
users, you need to plan the Mailbox server configuration carefully.
Objectives
After completing this lesson, you will be able to:
• List the information needed to design mailbox servers.
• Design mailbox sizing.
• Design mailbox server database configurations.
• Design mailbox server disk storage.
• Design mailbox server hardware requirements.
• Design mailbox servers for high availability.
Module 3: Designing Exchange Servers 3-3
Before starting the design of your organization’s Mailbox servers, make sure you have
collected all the information you need to ensure the design meets the organization’s
requirements.
Discussion Questions:
Q What information do you need to design a mailbox server?
A Answers should include:
• The total number of mailboxes in the organization and in each location.
• The types of messaging clients that the organization uses.
• The total number of public folders and data on the public folder usage.
• Information on mailbox size limitations and on exceptions to the size limits.
• Message retention requirements.
• Mailbox retention requirements.
• Whether any current requirements will change when you deploy Exchange
Server 2007.
• Budget restrictions. For example, you may need to decide whether you have the
budget to allow dedicated server roles for mailboxes and public folder servers.
• Service level agreements (SLA), including the acceptable availability
expectations and recovery times.
• Storage technologies. Does the organization have a storage area network (SAN)
or is it planning to deploy one? Are they using directly attached storage (DAS)?
3-4 Module 3: Designing Exchange Servers
When designing the Mailbox server configuration and performance, you first need to
understand the organization’s mailbox storage requirements.
Tip: You must balance the business requirements for mailbox size with the cost
and the server design required to meet those requirements. Almost any mailbox
size can be accommodated, but the cost may be prohibitive.
3-6 Module 3: Designing Exchange Servers
• The database dumpster also stores the mailboxes that are deleted but have not
reached their retention time limit. By default, the retention time limit is 30 days.
• If most of your organization’s users are using Post Office Protocol version 3
(POP3) clients, the mailbox size may be significantly smaller than if they are
using MAPI clients. By default, POP3 clients download all e-mail from the
Mailbox servers and delete the server copy.
3-8 Module 3: Designing Exchange Servers
Exchange Server 2007 provides some important enhancements influencing how data
storage is designed for the server. These enhancements mean that the optimal database
and storage group designs for Exchange Server 2007 are different from earlier Exchange
Server versions.
Note: Exchange Server 2007 Standard Edition supports only five storage groups
and a total of five databases.
Note: A LUN is the physical disk that the operating system recognizes. For most
storage solutions, other than internal disks, a LUN does not represent the actual
hard disks that store data. A LUN may refer to multiple disks in a redundant array
of independent disks (RAID) configuration on a storage device. A drive letter in the
operating system may not represent the LUN. However, you can use volume
mount points.
• Use volume mount points rather than drive letters to represent LUNs. If you are
deploying more than 11 storage groups and using two LUNs per storage group, you
will run out of drive letters to assign to the LUNS. By using volume mount points,
you can increase the number of available LUNs.
• Each storage group should contain only a single database. If you are using local
continuous replication (LCR) or continuous cluster replication (CCR), you can only
have one database per storage group. This best practice means that to determine the
number of storage groups on a Mailbox server, you must first determine how many
mailbox databases the server requires.
• When planning storage groups, you also should plan for transaction log storage. The
transaction log files are a record of physical changes made to the database. When
planning transaction log storage, consider the following:
• Consider the mailbox storage needed. Determine how much e-mail is sent to
mailboxes in each storage group on a daily basis. One or more transaction logs
save all data sent to mailboxes in the storage group.
• Consider the backup design. Full backups and incremental backups delete the
transaction log files after a successful backup. You must have enough hard drive
space to store all of the transaction logs accumulating between each of these
backups.
3-10 Module 3: Designing Exchange Servers
• Account for backup failures. If the backup fails, the transaction logs are not
deleted. When planning for hard disk space, ensure that you have adequate
storage to accommodate multiple failures. You must determine the number
of failed backups your organization will accept, and then ensure that there is
sufficient hard disk space to store the transaction logs for each storage group for
the specified time. If you perform weekly full backups and daily differential
backups, you may need space for two weeks of transaction logs to accommodate
a full backup failure.
• Account for move mailbox operations. When you move a mailbox to a server, the
target server must write all transferred data to the transaction logs. If you are
moving mailboxes during a migration or just as regular practice, ensure that you
account for this additional data.
Note: In the Standard Edition, there is a soft database limit of 50 GB. As the
database size approaches 50 GB, events are logged in the application log file, and
the database will be dismounted when it reaches 50 GB. You can override this soft
limit using a registry value.
Note: If you are using hardware-based snapshot backups and restores on a SAN,
the mailbox backup and restore requirements are not as critical in determining the
maximum database size.
As part of planning the database and storage group requirements, you also need to
consider the hard disk design of where you store the data.
The best RAID type from a performance perspective is RAID 10. However, in a RAID
10 configuration, the storage capacity is only 50 percent of the total disk space. Because
transaction logs are the most important data set, and good write latency is critical for
server performance, you should place transaction logs on RAID 1 (mirrored) or RAID 10
arrays with write cache that includes a battery backup.
RAID 10 is also the ideal database configuration, and it works well with large capacity
disks. However, RAID 5 is much more efficient in terms of capacity utilization and
provides enough speed for most deployments, particularly if you configure the Outlook
clients to use Cached Exchange Mode. We do not recommend RAID 6 for Exchange
Servers because of its poor performance when you compare it to other RAID solutions
and because it is not as efficient in utilizing disk capacity as RAID 5.
• Exchange Server Stress and Performance (ESP) tool. ESP simulates large numbers of
client sessions by concurrently accessing one or more protocol servers. ESP includes
multiple modules that simulate a variety of protocols and loads. You can run modules
concurrently from multiple hosts, thereby more realistically simulating physically
separate client machines. There is no limit to the number of computers on your
network that can host ESP modules.
• Microsoft Exchange Server Jetstress tool. Jetstress helps verify disk performance by
simulating Exchange Server database and log file loads that a specific number of
users produce. Use System Monitor, Event Viewer, and Extensible Storage Engine
Utility (ESEUTIL) in conjunction with Jetstress to verify that your disk subsystem
meets or exceeds the performance criteria you establish.
Note: You can download all of these tools from the “Tools for Exchange
Server 2007” page on the Microsoft TechNet Web site.
Module 3: Designing Exchange Servers 3-15
The primary hardware difference between earlier Exchange Server versions and
Exchange 2007 is the move from a 32-bit to a 64-bit platform. This means significant
changes to the way you design processor and memory configurations for Exchange
Server 2007.
Note: You cannot use Intel Itanium processors with x64-based versions of
Windows Server 2003.
Exchange Server 2007 benefits from using multicore processors, which provide a good
price-to-performance ratio. Therefore, you should consider using them in your Exchange
Server 2007 servers.
3-16 Module 3: Designing Exchange Servers
The recommended processor configuration for the Mailbox server role is based
predominantly on the number of mailboxes on the server and the user profile. To
determine the average user profile on the server, use the Microsoft Exchange Server
Profile Analyzer or a third-party tool. The following table lists generic and common
knowledge worker profiles for Microsoft Outlook clients:
Send/receive per day approximately 50 kilobyte (KB)
User type (usage profile)
message size
Light Five sent/20 received
Average 10 sent/40 received
Heavy 20 sent/80 received
Very heavy 30 sent/120 received
In addition to the number of mailboxes and the user profile, also consider other factors,
such as:
• Whether the server is configured to use LCR.
• Whether the server is running Microsoft Forefront Security for Exchange Server or
other antivirus software.
• Which third-party applications are running on the server.
• Whether Outlook clients are using online or Cached Exchange Mode.
• Which other clients are used to access Exchange data.
As a general guideline, plan for one processor core on the server for every 1,000
mailboxes with an average user profile. If most of the users have a heavy usage profile,
you need to double the number of processor cores.
A Mailbox server’s recommended processor configuration is four processor cores. The
recommended maximum number of processor cores for Mailbox servers is eight, which
is the upper boundary of viable processor and memory configurations based on price
and performance. The recommended maximum configuration is a guideline, not a
support criterion. It does not take into account the resource requirements of third-party
applications that might be installed on or access the server. The recommended maximum
configuration may change over time based on price changes and technological
advancements.
For more information: See the Exchange Server 2007 TechCenter Web site for
detailed information and additional links on choosing the appropriate processor
configuration for your Exchange servers.
Module 3: Designing Exchange Servers 3-17
Note: 32 GB is not a physical limitation, but rather it is currently the most cost-
efficient maximum memory configuration. Depending upon the number of memory
slots in a server, the most cost-efficient maximum memory configuration might be
less than 32 GB (for example, 16 GB). Consider this when choosing server
hardware.
The Mailbox server role’s memory configuration design is more complex than that of
the other server roles because the optimal Mailbox server role memory configuration
depends upon the number of mailboxes and the mailbox client profile. Memory sizing for
the Mailbox server role is critical to reducing disk I/O on the server. The more memory
you add to the Mailbox server, the less disk I/O Exchange generates. Diminishing returns
may occur, however, when adding memory to the server is no longer justifiable based on
price and performance.
Use the following table to estimate memory requirements for a specific Mailbox server
with a specific number of hosted mailboxes and profile type:
Usage profile Mailbox memory recommendation
Light 2 GB plus 2 MB per mailbox
Average 2 GB plus 3.5 MB per mailbox
Heavy 2 GB plus 5 MB per mailbox
You also need to consider the number of Exchange Server storage groups when
calculating memory requirements. Increasing the number of storage groups increases the
database cache used for write activity. This increased cache has a positive impact of
reducing database write I/O, but configuring too many storage groups on a server with
insufficient physical memory may reduce the effectiveness of the database read cache.
This reduced cache can have an overall negative effect on the server’s performance.
3-18 Module 3: Designing Exchange Servers
The following table identifies the specific minimum memory requirements per server,
based on the number of server storage groups:
Number of storage groups Minimum required physical RAM
1-4 2 GB
5-8 4 GB
9-12 6 GB
13-16 8 GB
17-20 10 GB
21-24 12 GB
25-28 14 GB
29-32 16 GB
33-36 18 GB
37-40 20 GB
41-44 22 GB
45-48 24 GB
49-50 26 GB
Note: This table lists the amount of RAM that each storage group requires. Add the
memory used for each mailbox to this amount. For example, if you have 10 storage
groups on a server and the user profile is average, you will need 6 GB of memory,
plus 3.5 MB for each mailbox.
Module 3: Designing Exchange Servers 3-19
Server performance may be only one of several criteria to include when designing a
Mailbox server configuration. For example, many organizations have, or are introducing,
service level agreements (SLAs) that define acceptable availability levels for user
mailboxes and standards for database recovery if a disaster occurs. In these organizations,
the requirements related to disaster recovery and availability may be just as important as
server performance when designing the mailbox servers.
These organizations should consider using Exchange Server 2007 features such as LCR,
CCR, and single copy clusters (SCC) to provide high availability.
For more information: For detailed information on how to design mailbox servers
for LCR, CCR, and SCC, see Course 5054: Designing a High Availability
Messaging Solution Using Microsoft Exchange Server 2007.
Module 3: Designing Exchange Servers 3-21
In addition to designing the Mailbox server configuration, you need to design the server
configurations for the other Exchange Server 2007 server roles. Because these other
server roles do not store data like the mailbox server role does, the considerations for
designing their server roles are quite different.
Objectives
After completing this lesson, you will be able to:
• Design Transport server configurations.
• Describe the back pressure feature.
• Design Client Access server configurations.
• Design Client Access server deployments.
• Design Unified Messaging server configurations.
• Design hardware configurations for Exchange servers that run multiple roles.
• Plan Exchange Server hardware requirements.
3-22 Module 3: Designing Exchange Servers
All messages in the Exchange Server 2007 organization must pass through a Hub
Transport server. Additionally, you can deploy an Edge Transport server so all messages
sent to and from the Internet pass through this server. This means that the primary goal
for the server configuration design for the Hub Transport server and the Edge Transport
server is to optimize message throughput.
• Edge Transport servers and Hub Transport servers use hard disk storage for storing
messages in a queue, for storing transaction logs, for content conversion, and for
storing protocol logging and message tracking logs.
The following table lists how these activities affect hard disk I/O and provides
recommendations for hard disk configuration:
Activity Description and recommendations
ESE database Both the Exchange 2007 Edge Transport server and Hub Transport
(mail.que file) server store all queued mail in an ESE database. For reliability and
performance reasons, the database should be kept on separate disks
from the transaction logs.
Transaction log All changes made to the database are first committed to the transaction
files (.log files) log, which is a sequential write to the disk. The transaction logs use
circular logging so they can be deleted without being backed up.
Protocol logging Message tracking and protocol logging are sequential writes that, if
and message enabled, cause a disk performance issue and consume disk space to
tracking logs store the logs. Message tracking is enabled with a default maximum size
and time limit for storing logs. On a server that handles a large number
of messages, consider moving these log files to a dedicated disk.
Content On the Hub Transport server, incoming mail from the Internet is
conversion converted to MAPI prior to being delivered. This content conversion
process occurs in the TMP folder. To improve performance, the TMP
folder should not be on the same LUN as the paging file and the
operating system.
Agents The transport servers use agents to monitor messages and modify
messages in transit. Some agents log data, which requires disk space
and may have an impact on disk performance.
Paging If a process requests a page in memory and the system cannot find the
page at the requested location, a page fault occurs. If the page is
elsewhere in memory, the fault is a soft page fault. If the page must be
retrieved from disk, the fault is a hard page fault. Most processors can
handle large numbers of soft page faults without consequence. However,
hard page faults can cause significant delays. Continuous high rates of
disk paging indicate a memory shortage.
Module 3: Designing Exchange Servers 3-25
Note: You should modify the default values only if you clearly understand your
normal server performance parameters. For detailed information on other options
that you can configure, see Exchange Help.
Important: Changes that you save to the EdgeTransport.exe.config file are applied
after you restart the Microsoft Exchange Transport service.
3-28 Module 3: Designing Exchange Servers
The Client Access server’s design can have a significant impact on how satisfied users
are with the messaging system. All clients other than MAPI clients must connect to a
Client Access server to access a mailbox on an Exchange Server 2007 Mailbox server.
Outlook 2007 clients also connect to Client Access servers to download the offline
address book, and to access the Availability services and to use the Autodiscover feature.
This means that poor Client Access server performance directly affects users.
• The Client Access server is not a hard disk intensive application. The following table
describes Client Access server role activities and how each activity affects disk I/O:
• The network connection is the bottleneck on a server that you configure with
recommended memory and processor combination. To reduce the network bottleneck,
configure the Client Access server with multiple 1 Gbps network cards.
Module 3: Designing Exchange Servers 3-31
In addition to planning the Client Access server hardware configuration, you also need to
design the Client Access server deployment. Clients outside the organization frequently
access the Client Access server, so you need to ensure that its deployment is secure while
providing all required functionality.
When you deploy the Client Access server on the internal network, you need to allow
access through the external and internal firewall only for the specific protocols that the
Client Access server clients use. For each of these protocols, you should require that all
traffic be encrypted using Secure Sockets Layer (SSL).
As a best practice, you should protect the Client Access server on the internal network by
deploying an advanced firewall, such as Microsoft Internet Security and Acceleration
(ISA) Server 2006. ISA Server provides the following benefits:
Configuration Benefit Description
ISA Server can authenticate all No unauthenticated traffic enters the internal network. ISA
client connections Server supports the use of forms-based authentication.
ISA Server can load balance client ISA Server randomly selects a Client Access server and then
requests and send them to an array sends the name of the Client Access server back for the
of Client Access servers client application to use.
ISA Server can use SSL bridging ISA Server acts as an end point to the SSL connection from
the client. ISA Server can decrypt the client traffic, filter the
network traffic using content level analysis, and then re-
encrypt the traffic before sending to the Client Access server.
Unified Messaging combines voice messaging, fax, and e-mail messaging into one store
that is accessible via a telephone or computer. When you integrate Exchange Server 2007
into your voice system, availability becomes critical. User expectations are high for
telephone systems and their associated components.
The following table lists some of the Unified Messaging server features:
Feature Description
Call Answering Includes answering an incoming call on behalf of a user, playing their
personal greeting, recording a message, and submitting it for delivery to
their inbox as an e-mail message.
Fax Receiving Lets users receive fax messages in their Inbox.
Subscriber Access Enables dial-in access for company users. Company users or subscribers
who are dialing into the Unified Messaging system can access their mailbox
using Outlook Voice Access.
Auto Attendant Lets users place a call to another user, or locate another user and then
place a call to that user.
Note: For more information on the Unified Messaging server, see the following
eLRNing courses: Clinic 5091AE: Introduction to Microsoft® Exchange Server
2007 Unified Messaging and Course 5092AE: Implementing Microsoft® Exchange
Server 2007 Unified Messaging.
3-34 Module 3: Designing Exchange Servers
Small and medium-sized companies, and large organizations that have a small number of
users in a single location, may choose to combine multiple Exchange Server 2007 server
roles on a single computer.
• You cannot use CCR or SCC on a server also running the Hub Transport or Client
Access server roles. If you need the high availability options that these clustering
solutions provide, you need to deploy dedicated mailbox servers. The only way you
can increase the availability for the Hub Transport and Client Access server roles is
to deploy multiple servers, so you may choose to deploy multiple servers with these
two roles installed.
Module 3: Designing Exchange Servers 3-37
In this practice, you will define the hardware specifications for Exchange Server
configurations. You will use the Exchange Server 2007 Help files to provide information
on server sizing including memory, processor, and disk space.
Note: The most recent version of the Exchange Server 2007 Help files are on the
“Microsoft Exchange Server TechCenter” page of the Microsoft TechNet Web site.
For this exercise, you will use an offline version of the Help files.
Objectives
In this practice, you will define hardware specifications for Exchange Servers.
Instructions
• Start the 5053A-LON-CL1 virtual machine.
• Log on to the virtual machine as TreyResearch\Administrator with a password of
Pa$$w0rd.
3. Use the Planning Processor and Memory Configurations and the Planning Disk
Storage topics to fill in the following table:
Processor Memory Disk space
Server role Comment
requirement requirement requirement
Large Mailbox • 3,000 - 3,500 mailboxes
server • 80 MB average mailbox
size
• Average to heavy usage
profile
Medium Mailbox • 1,500 - 2,000 mailboxes
server • 80 MB average mailbox
size
• Average to heavy usage
profile
Client Access • Maximum of 14,000 users
server per Active Directory site
• 50 percent of users are
using Outlook 2007
• 10 percent of users are
using Outlook Anywhere
or Exchange ActiveSync
Hub Transport • 70 percent of e-mail sent
server in the organization is sent
between Active Directory
sites
• 30 percent of e-mail is
sent to the Internet
• Maximum of 750,000
messages sent per day in
any Active Directory site
Edge Transport • 50 percent of Internet
server e-mail is inbound, 50
percent is outbound
• All incoming messages are
scanned for spam and
viruses
Unified Messaging • Maximum of 14,000 users
server per Active Directory site
Mailbox server, • 700-1000 mailboxes
Client Access • 80 MB average mailbox
server, and Hub size
Transport server
• Average usage profile
• Maximum of 1,000 users
in the Active Directory site
Module 3: Designing Exchange Servers 3-39
Tip: To calculate the amount of hard disk space that a Mailbox server requires, use
the following information:
Discussion Questions:
Q What additional factors should you consider when calculating the server
requirements?
A There are many other factors that you should consider, including:
• How many servers of each server role will you deploy? This is particularly
important for Client Access servers, Hub Transport servers, and Edge Transport
servers. With these server roles, you may choose to deploy multiple servers and
use less hardware per server.
• Will the computer store any public folder databases for Mailbox servers?
• What additional software is installed on the computer, or what additional
functionality does the computer provide? For example, if the server is running
antivirus software, you will need to increase the memory and processor
requirement. In a small office, the Exchange Server may also function as DNS,
Active Directory domain controller, or a file server.
• What are the growth projections? Most organizations include some growth
projection in their planning.
Best practice: After you calculate the hardware requirements for each server, you
should plan for some excess capacity. We recommend planning for at least 20
percent excess capacity.
3-40 Module 3: Designing Exchange Servers
As part of the Exchange Server 2007 deployment, you also may need to design the
organization’s public folder architecture. Although Exchange Server 2007 de-emphasizes
public folders, they remain fully supported and some organizations use them extensively.
Objectives
After completing this lesson, you will be able to:
• Analyze business requirements for public folders.
• Design mailbox servers for storing public folders.
• Design public folder replication.
• Design client access to public folders.
• Design public folder permissions.
• Describe options for transitioning away from public folders.
Module 3: Designing Exchange Servers 3-41
Some organizations make little use of public folders. Others use them extensively and
may have developed manual or automated business processes that require public folders.
Because of the variation in public folder use, you should start your public folder design
by analyzing your organization’s business requirements for public folders.
• What function do the public folders serve? Some organizations use public folders
only for basic functions, such as storing company data, while other organizations use
public folders for more advanced functions, such as creating customized applications.
• Do the public folders support strategic business applications? Analyze the
organization’s primary business applications and decide whether they are using
public folders as a front-end system for form-based and event-based applications.
• What are the plans for sharing the types of information that may be stored in public
folders? For example, is the organization considering deploying an intranet on
Windows SharePoint Services or another Web server for sharing some types of
company information?
Module 3: Designing Exchange Servers 3-43
Public folders are stored in public folder databases on Exchange Server 2007 Mailbox
servers. By default, if you specify that your organization includes Outlook 2003 or earlier
clients when you install your organization’s first Mailbox server, a public folder database
is created on this first Mailbox server. No other public folder databases are installed, but
you can create a public folder store on any other Mailbox server in the organization.
If your organization currently uses public folders, you may determine this information
easily. If your organization would like to use public folders now, but has not used them
previously, you might need to spend more time gathering the business requirements to
determine the space to dedicate to a public folder database.
3-44 Module 3: Designing Exchange Servers
The processor and memory requirements for servers hosting a public folders database are
the same as for other Mailbox servers. If the server is hosting both mailboxes and public
folders, then each MAPI connection requires the same amount of resources whether
connecting to the mailbox database or the public folder database. Because the public
folder database is in its own storage group, you must plan for the extra memory that the
storage group is using.
If your organization uses public folders extensively, you might choose to deploy one or
more dedicated public folder servers. Dedicated public folder servers may have different
hardware requirements than servers that are both mailbox and public folder servers,
depending on the number of user using the public folders and the size of the public folder
store. Because a Mailbox server can host only one public folder database, the hardware
requirements for the dedicated public folder server are likely to be significantly less than
a Mailbox server that has multiple storage groups for mailbox databases.
Organizations that use public folders extensively also frequently use public folder
replication to provide fault tolerance for the public folders and better access to public
folders for users in different locations.
Note: You can modify public folder referrals by using the Set-
PublicFolderDatabase –id databasename –PublicFolderReferralServerList
‘Servername:Cost’ – UseCustomReferralServerList $True command in the
Exchange Management Shell. This command enables public folder referrals to the
specified servers in different Active Directory sites and assigns a cost to each
server. If you set the UseCustomReferralServerList parameter to true, and do not
add servers to the PublicFolderReferralServerList parameter, public folder
referrals are disabled.
Module 3: Designing Exchange Servers 3-47
• If the network bandwidth between company locations is not a significant issue, then
the primary considerations for using replication or referrals is server capacity and
client performance. If you have a Mailbox server in a remote site, or if you are
deploying a dedicated public folder server, then you should enable public folder
replication. This provides users with a more positive experience compared to
accessing public folders across a WAN connection. If you do not have a Mailbox
server capacity in the remote site, then use public folder referrals.
• If you have Outlook 2003 or earlier MAPI clients, you should enable replications for
the system folders that these clients require. These folders include the Schedule+
free/busy folders and the offline address book folders. The offline address book
folder includes up to three different versions of the offline address book. Only
replicate the offline address book versions that the Outlook clients in your
organization require.
3-48 Module 3: Designing Exchange Servers
When designing public folder deployment in your organization, you also should plan
for client access. This includes two components: designing access to the public folder
contents based on the messaging client that users utilize, and designing the public folder
hierarchy to ensure that user access to public folders is as efficient as possible.
• To provide access to public folders for IMAP4 and NNTP clients, you must leave the
public folders on an earlier Exchange Server version and configure the clients and the
network infrastructure to enable the clients to connect to the Exchange Server hosting
the public folder.
If users are using Microsoft Outlook Web Access, IMAP4, and NNTP primarily to
post messages to public folders, consider mail-enabling the public folder. When you
mail-enable a public folder, this assigns an e-mail address to the folder that enables
users to send messages to the folder using any e-mail client.
Note: Exchange Server 2007 includes several scripts that you can use
to manage public folders. By default, these scripts are located in
the %programfiles%\Microsoft\Exchange Server\Scripts folder.
3-50 Module 3: Designing Exchange Servers
To ensure that public folder infrastructure is easy to manage while providing users with
effective use of public folders, you need to plan the public folder permissions. When
planning public folder permissions, you need to consider administrative and client
permissions.
Note: If you want to provide users administrative access to public folders, use the
public folder permission roles. The folder owner role allows users to create new
folders and assign permissions to lower-level folders, but does not allow them to
modify other public folder settings, such as replication or folder size.
Module 3: Designing Exchange Servers 3-51
Exchange Server 2007 de-emphasizes public folders, especially for organizations with
only Outlook 2007 or later clients. For organizations that currently are not using public
folders extensively, this does not result in any disruption. However, some organizations
make extensive use of public folders. These organizations must carefully plan their
migration away from public folders.
Discussion Questions
Q What types of issues will the public folder changes in Exchange Server 2007 create
for your organization?
A Answers will vary. For those organizations that do not use public folders, the changes
will have no impact. If organizations currently only allow access to public folders for
MAPI clients, users are not affected. If organizations provide access to public folders
for Microsoft Outlook Web Access, IMAP4, or NNTP clients, they need to plan for
an alternative way to provide content access.
Exchange administrators are affected because they can no longer administer public
folders using a tool like Exchange System Manager. Public folders can be
administered only by using Exchange Management Shell in Exchange Server 2007.
Organizations with written applications that use public folders are not immediately
affected unless the applications use IMAP4 or NNTP to communicate with the public
folder.
Module 3: Designing Exchange Servers 3-53
Q What options will you explore for migrating content away from public folders?
A The recommended solution for replacing public folders is Windows SharePoint
Services. Windows SharePoint Services provides document libraries that can store
many different types of contents, including messages. Windows SharePoint Services
document libraries enable users to access content using any Web browser, and offer
an intuitive user interface for accessing content and features such as indexing and
filtering to locate information rapidly.
Q What are the implications of using these options for providing access to content that
public folders store currently?
A If your organization has significant amounts of data in public folders, migrating the
content from the public folders to Windows SharePoint Services requires significant
effort. This is particularly true if the public folders have a complicated permissions
structure and you need to replicate the permissions in Windows SharePoint Services.
Additionally, you need to provide some Windows SharePoint Services training for
end users if they have not used it before.
Note: Third-party vendors have created migration tools that allow you to migrate
public folder content to Windows SharePoint Services.
3-54 Module 3: Designing Exchange Servers
As part of the server design process, you need to design a test lab environment. This test
lab environment can serve many different purposes, including testing proof-of-concept,
functionality, integration, and scalability. For these tests to provide valid results, you
must ensure that you design the test lab environment correctly.
Objectives
After completing this lesson, you will be able to:
• Design a test lab environment.
• Design a pre-production test lab environment.
Module 3: Designing Exchange Servers 3-55
• If you are not doing performance testing, consider using virtualization technology,
such as Microsoft Virtual PC or Microsoft Virtual Server. Running your test lab in a
virtual environment means that you can run multiple test servers on limited hardware.
You can save the virtual machines at any phase in the process or shut down the
virtual machines at any point without saving changes. This means that you can run
multiple tests efficiently in the environment. Note that when using Virtual Server or
Virtual PC, your testing will be limited to the 32-bit version of Exchange 2007.
Module 3: Designing Exchange Servers 3-57
As you progress with the Exchange Server 2007 design, the test lab’s focus changes from
proof-of-concept and functionality testing to testing that provides information on system
scalability and that prepares Exchange administrators to manage the new environment.
Tip: Because the pre-production lab environment must replicate the hardware that
the production environment uses, many organizations order some of the production
hardware early in the design phase to ensure that it is available for testing.
Module 3: Designing Exchange Servers 3-59
Lab Setup
For this lab, you will use the available virtual machine environment. Before you begin the
lab, you must:
• Start the 5053A-LON-CL1 virtual machine.
• Log on to the virtual machine as TreyResearch\Administrator with a password of
Pa$$w0rd.
Note: Two additional virtual machines are provided with this course. 5053A-LON-
DC1 is configured as a domain controller in the TreyResearch.net domain and has
a standard Exchange Server 2007 installation. 5053A-LON-Edge1 is a stand-alone
server and has the Exchange Server 2007 Edge Transport Server role installed on
it. The 5053A-LON-CL1 computer is a member of the Treyresearch.net domain.
3-60 Module 3: Designing Exchange Servers
Lab Scenario
You are a messaging engineer for Trey Research, an enterprise-level organization with
multiple locations. Trey Research is an international corporation involved in technology
research and investment, and is planning to upgrade from Exchange 2000 Server to
Exchange Server 2007. Trey Research currently has three remote sites in addition to their
headquarters. The company is pursuing an aggressive expansion plan and will be adding
two new office locations during the upgrade project.
Location Internal Users Mobile Users
London 12,000 currently • 1000 – Outlook Web Access users
Corporate Headquarters 10,000 after the • 500 – Outlook Anywhere and mobile client users
new London • 800 – Outlook users connecting through a VPN
office is ready
London (new office) 4,000 • 200 – Outlook Web Access users
(anticipated) • 50 – Outlook Anywhere and mobile client users
San Diego 500 • 50 – POP3 client users
Former head office of
A. Datum Corporation
Toronto 6,000 • 800 – Outlook Web Access users
• 100 – Outlook Anywhere and mobile client users
Tokyo 5,000 • 1000 – Outlook Web Access users
• 200 – Outlook Anywhere and mobile client users
• 200 – Outlook users connecting through a VPN
Chennai (new office) 800 (anticipated) • 200 – Outlook Web Access users
• 50 – Outlook users connecting through a VPN
If you need to review the Trey Research Active Directory site design and the Trey
Research network perimeter design, review the following documents in the
D:\LabResources folder.
• TR_ProposedADSiteDesign.vsd
• TR_ProposedPerimeterDesign.vsd
Note: The documents in the LabResource folder on LON-CL1 also are available in
the Student workbook appendix.
Module 3: Designing Exchange Servers 3-61
1. Review the Trey • Review the following sources of information located in the
Research documentation. D:\LabResources folder:
• Server Design Interview Notes.doc
• Review the table from the Practice in this lesson to identify the
standard server configurations.
Note: Use the information that was gathered in the Practice for
this module to determine the hardware levels that will be
required for each Exchange Server. Be prepared to discuss your
proposed design with the class.
3-62 Module 3: Designing Exchange Servers
Discussion Question
After completing the exercise, answer the following:
Q What additional considerations may you need to include in designing the server
deployment?
A Additional information that may be required includes:
• What is the version of Office Outlook client that is deployed in each location?
• If Outlook 2003 or Outlook 2007 is being used, will the clients be configured to
use Exchange Cached Mode or online mode?
• Are public folders used in the organization? If yes, are the public folders being
replicated to all locations? This means that each location will require at least one
additional storage group and database.
• How many Client Access Server clients are connecting concurrently?
• How many e-mail messages are being sent through the Hub Transport servers
between sites, and what is the average message size? How many transport rules
are configured on the Hub Transport servers?
• How many e-mail messages are being sent through the Edge Transport servers to
and from the Internet, and what is the average message size? How much spam do
the Edge Transport servers filter on a daily or hourly basis?
Module 3: Designing Exchange Servers 3-63
Note: The test lab design should include only the components that you need to test
Exchange Server 2007 functionality and capacity. The test lab does not need to
include the current messaging system.
1. Review the Trey • Review the files located in the D:\LabResources folder to get a
Research clear understanding of the Trey Research current environment.
documentation. • Review the TR_ProposedServerDesign.doc document that you
created in the previous exercise to understand the target state
environment.
Note: The answers to the labs are on the Student Materials CD.
Discussion Questions
After completing the exercise, answer the following:
Q What were the critical services that you had to include in the test lab?
A Answers include:
• Deploy domain controllers in the forest root domain and in two child domains.
• Deploy at least two mailbox servers, one of which is running on production level
hardware to perform scalability testing.
• Deploy two Client Access servers, a Hub Transport server, and an Edge
Transport server to test redundancy. At least one server of each server role should
be running on production-level hardware to test scalability.
• Deploy at least one server running multiple Exchange Server roles.
3-64 Module 3: Designing Exchange Servers
Q How did you deal with not being able to replicate the entire production environment?
A Answers include:
• Include only a sample of the servers that you will deploy in the production
environment.
• Use Virtual Server to run some of the servers that you are not using for
scalability testing.
• Use a single site rather than multiple locations.
Note: If you shut down the virtual machines without saving changes, the files that
you created during the lab will not be saved. To retain those files, you can leave
the virtual machines running, or you can shut down 5053A-LON-CL1 and commit
the changes.
Lab Shutdown
1. On the host computer, click Start, point to All Programs, point to Microsoft
Virtual Server, and then click Virtual Server Administration Website.
2. Under Navigation, click Master Status. For each virtual machine that is running,
click the Virtual Machine Name, and, in the context menu, click Turn off Virtual
Machine and Discard Undo Disks. Click OK.
3. Start the 5053A-LON-CL1 virtual machine. Additionally, you also can start the
5053A-LON-DC1 and the 5053A-LON-Edge1 virtual machines.
Module 4: Designing Security for a
Messaging Environment
Table of Contents
Overview 4-1
Lesson 1: Designing an Administrative Model 4-2
Lesson 2: Designing Message Security 4-9
Lesson 3: Designing Antivirus and Anti-spam
Solutions 4-24
Lab: Designing Security for a Messaging
Environment 4-40
Information in this document, including URL and other Internet Web site references, is subject to change
without notice. Unless otherwise noted, the example companies, organizations, products, domain names,
e-mail addresses, logos, people, places, and events depicted herein are fictitious, and no association with any
real company, organization, product, domain name, e-mail address, logo, person, place, or event is intended or
should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting
the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval
system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or
otherwise), or for any purpose, without the express written permission of Microsoft Corporation.
The names of manufacturers, products, or URLs are provided for informational purposes only and Microsoft
makes no representations and warranties, either expressed, implied, or statutory, regarding these
manufacturers or the use of the products with any Microsoft technologies. The inclusion of a manufacturer or
product does not imply endorsement of Microsoft of the manufacturer or product. Links are provided to third
party sites. Such sites are not under the control of Microsoft and Microsoft is not responsible for the contents of
any linked site or any link contained in a linked site, or any changes or updates to such sites. Microsoft is not
responsible for webcasting or any other form of transmission received from any linked site. Microsoft is
providing these links to you only as a convenience, and the inclusion of any link does not imply endorsement of
Microsoft of the site or the products contained therein.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights
covering subject matter in this document. Except as expressly provided in any written license agreement from
Microsoft, the furnishing of this document does not give you any license to these patents, trademarks,
copyrights, or other intellectual property.
Microsoft, Active Directory, ActiveSync, BizTalk, ForeFront, Internet Explorer, MSN, Outlook, PowerPoint,
SharePoint, SmartScreen, SQL Server, Visual Basic, Visual Studio, Windows, Windows Media, Windows
Mobile, Windows PowerShell, Windows Server, and Windows Vista are either registered trademarks or
trademarks of Microsoft Corporation in the United States and/or other countries.
Version 1.2
Module 4: Designing Security for a Messaging Environment 4-1
Overview
Objectives
After completing this module, you will be able to:
• Design an administrative model for Exchange Server 2007.
• Design message security.
• Design antivirus and anti-spam solutions.
4-2 Module 4: Designing Security for a Messaging Environment
Exchange Server 2007 provides several options for designing an administrative model
that will provide administrative security in your organization. Exchange Server 2007
separates permissions for the Exchange organization and Active Directory® directory
service more than in previous Exchange Server versions.
Objectives
After completing this lesson, you will be able to:
• Describe the relationship between Exchange Server 2007 and Active Directory
permissions.
• Describe options for planning Active Directory and Exchange permissions.
• Design the administrative security model.
Module 4: Designing Security for a Messaging Environment 4-3
When designing an administration model for your organization, you must ensure that
all administrators have only those permissions necessary to perform tasks that are
required for their job. Because Exchange permissions are separate from Active Directory
permissions, Exchange Server 2007 ensures that Active Directory administrators cannot
by default modify Exchange settings and vice versa without being granted explicit
permission to do so.
Note: The separation of permissions is reflected in how you use the administration
tools in an Exchange Server 2007 environment. While you can create user
accounts using the Active Directory Users and Computers snap-in, you only can
view and modify Exchange attributes using Exchange management tools.
Module 4: Designing Security for a Messaging Environment 4-5
To design an Exchange Server 2007 administrative model, you must understand the
requirements for configuring an organization’s administrative permissions and the
associated configuration options that Exchange Server 2007 provides.
Discussion Questions
Based on your experience, consider the following questions:
Q How has your organization configured Exchange and Active Directory permissions?
A Answers will vary, but there are three models that organizations generally use:
• Unified permissions. A single administrator or group of administrators who
are responsible for administering both Active Directory and the Exchange
organization. This is the most common scenario in small to medium
organizations where one administrator or small administrative team manages
the entire information technology (IT) infrastructure.
• Split permissions. A separation of administrative responsibilities between
Active Directory and Exchange administrators. However, both groups remain
responsible for their administrative area’s entire scope. In this scenario, the
domain administrators have full control of the Active Directory environment
and the Exchange administrators have full control over the entire Exchange
organization. This is a common scenario in larger organizations, which have
separate administrative groups for managing Active Directory and Exchange.
4-6 Module 4: Designing Security for a Messaging Environment
Q If you are running a previous Exchange Server version, how does your organization
have Exchange administrative permissions configured? Will you retain that
configuration when you migrate to Exchange Server 2007?
A In Exchange 2000 Server and Exchange Server 2003, you could assign administrative
permissions using the Exchange Full Administrator role, the Exchange Administrator
role, and the Exchange View-Only Administrator role. You could delegate
permissions for each role at the organizational or administrative group level.
Answers will vary on whether organizations will retain the configuration. Very few
organizations used administrative groups to assign Exchange server permissions, but
because Exchange Server 2007 does not use them, users will need to use server level
permissions if they used administrative groups previously.
Module 4: Designing Security for a Messaging Environment 4-7
Once you understand the best model for your Exchange organization, you can design the
administrative groups required to implement the security design.
Note: Whenever possible, use the default Active Directory groups that are pre-
assigned to the Exchange Administrator roles. For example, the Exchange
Organization Administrators group in Active Directory is assigned automatically
to the Exchange Organization Administrator role in Exchange Server. Likewise,
the Exchange Recipient Administrators group in Active Directory is assigned
automatically to the Exchange Recipient Administrator role in Exchange Server.
If you do not use delegated permissions, you should use these default groups.
Designing message security is an essential part of designing security for your Exchange
Server 2007 organization. Exchange Server 2007 provides several features such as
transport rules, Simple Mail Transfer Protocol (SMTP) connector security, and Domain
Security to provide message-level security.
Objectives
After completing this lesson, you will be able to:
• Define message security requirements.
• Design restrictions to message flow.
• Design SMTP connector security.
• Design secure message routing between partner organizations.
• Design client-based messaging security.
4-10 Module 4: Designing Security for a Messaging Environment
In most organizations, e-mail is a primary tool for exchanging business information, and
many business processes depend upon it. However, SMTP e-mail inherently is not secure
because SMTP message contents are not encrypted or validated. This means that your
confidential information potentially may be exposed through e-mail.
To plan for your organization’s messaging security, you first need to understand what
types of data your organization is sending via e-mail and how you are securing those
messages currently.
If the current security efforts are not effective, then investigate why they are not meeting
the organization’s needs.
4-12 Module 4: Designing Security for a Messaging Environment
One of the options for providing message security is to implement restrictions on what
messages users can send into, and out of, the organization. Exchange Server 2007
provides transport rules that you can use to restrict message flow or to modify messages
in transit by attaching disclaimers or headers to them.
One option for using message classifications is the Attorney/Client Privilege (A/C
Privileged) message classification. The A/C Privileged message classification is one of
five default message classifications that Exchange 2007 includes. By default, when a user
assigns the A/C Privileged classification to a message, the classification displays for all
organizational recipients, but no transport rule is applied to the message.
However, you can create a Hub Transport rule that enforces the A/C Privileged
classification. For example, if your organization groups all of its attorneys into an
organizational unit called “Legal,” you can configure a transport rule that returns
messages classified as A/C Privileged to the sender if the sender or at least one recipient
on the To or Cc line is not in the Legal group.
You can use message classifications in two ways:
• The message sender can add a message classification manually. A Hub Transport rule
then will apply an action based on this classification.
• A transport rule can add a message classification. For example, if you want to filter
messages that contain customer information, you can configure the transport rule to
scan the message for this information and then have the transport rule apply the
classification.
Exchange 2007 includes five default message classifications, but you can configure
additional ones. Before Outlook 2007 users can set and view message classifications, you
must deploy the message classification configuration files and create an Outlook registry
key on the end users’ computers. The Outlook message classification templates are .xml
files that you must generate after you create and configure the message classifications.
Another option for securing e-mail messages is to modify the default configuration
for SMTP send and receive connectors or create new connectors with more secure
configurations. By default, the SMTP connectors that you use to send Internet e-mail
accept anonymous connections and do not require message encryption.
• Before you enable either authentication or TLS encryption, you must communicate
with the organizations that will be sending e-mail over the secure connection to
ensure that they configure their SMTP servers to comply with your policies.
• If you deploy an Edge Transport server and implement edge subscriptions, you
should not need to modify the receive connectors on Hub Transport servers. By
default, when you install the Hub Transport server role, two receive connectors exist,
one which will accept only authenticated connections on TCP port 25, and the other
that will accept only authentication connections on TCP port 587. If you enable edge
subscriptions, the connection between the Edge Transport server and the Hub
Transport server are authenticated and all messages are encrypted.
4-18 Module 4: Designing Security for a Messaging Environment
Note: When an SMTP server establishes a TLS session with an Edge Transport
server, the SMTP server validates the Domain Name System (DNS) name in the
server certificate on the Edge Transport server against the DNS name of the e-mail
recipient domain. When you generate the request for the Edge Transport server
certificate, ensure that you include all possible domain names that clients can use
to connect to the server. For example, if you are hosting multiple SMTP domains
that need to be accessible through this connector, you must include all of the
hosted domain names in the certificate request. The Subject Alternative Names
value on the certificate stores the domain name information. You can create a
certificate that contains multiple Subject Alternative Names by using the
DomainName parameter of the New-ExchangeCertificate cmdlet.
2. Import and enable the certificate on the Edge Transport server. After you request the
certificate, you must import the certificate on the Edge Transport server and enable
the certificate for use by the SMTP connectors that send and receive domain-secured
e-mail.
3. Configure outbound Domain Security. To configure outbound Domain Security, use
Exchange Management Shell commands to specify the domains to which you will
send domain-secured e-mail, and then configure the SMTP Send connector to use
domain-secured e-mail.
4. Configure inbound Domain Security. To configure inbound Domain Security, use
Exchange Management Shell commands to specify the domains to which you will
receive domain-secured e-mail, and then configure the SMTP Receive connector to
use domain-secured e-mail.
4-20 Module 4: Designing Security for a Messaging Environment
5. Test domain-secured mail flow. After you configure domain-secured e-mail, you can
test the connection by reviewing the performance and protocol logs. The Domain
Security feature includes the following performance counters under MSExchange
Secure Mail Transport:
• Domain Secure Messages Received
• Domain Secure Messages Sent
• Domain Secure Outbound Session Failures
You can create a new counter log file that contains these performance counters to
monitor the messages sent and received and the failed mutual TLS sessions.
For More Information: For more information on the Domain Security feature, see
the “Domain Security in Exchange 2007” white paper located on the Microsoft
TechNet Web site.
Module 4: Designing Security for a Messaging Environment 4-21
Exchange Server 2007 supports client-based solutions for providing messaging security.
Exchange Server 2007 supports both S/MIME and Rights Management Services.
• Certificate and private key backups. If a user ever loses the private key associated
with their computer’s certificate, the user will not be able to decrypt messages
that were encrypted with the public key associated with the certificate. The local
computer stores the private key, which means it could be lost due to hard-disk
failure or profile corruption. Thus, you must export the private key from each
client computer and save it in safe place.
• You can address many of these certificate issues by implementing a private CA
on a computer running Windows Server 2003, and integrating the CA with Active
Directory. This solution enables automation of many certification management tasks
for internal users. However, unless you configure the private CA as a subordinate CA,
to a trusted public root CA, external clients will not trust the certificates that your CA
issues.
• Another issue with using S/MIME to provide message level security is that it is a
user-based security model. When sending a message, the user must sign or encrypt
the message manually. However, there is no guarantee that users will do this, even if
the message contains confidential information.
• A final issue with using S/MIME to secure messages is that because the messages
entering or leaving the organization are encrypted, and the messages remain
encrypted in the user mailbox, scanning the messages for policy compliance, viruses,
or spam is not possible.
Despite the limitations, S/MIME is the best option for securing e-mail messages sent
from one individual to recipients in other organizations. Most organizations will not want
to set up server-level security for one or two users, so you may need to use S/MIME for
these situations.
Note: Exchange Server 2003 supported S/MIME integration with Outlook Web
Access, where a user could use S/MIME to secure e-mail sent through Outlook
Web Access. Exchange Server 2007 does not have this feature, but it will be
available in Exchange Server 2007 Service Pack 1.
To implement an RMS solution, you must install and configure the Windows Rights
Management Services add-on on a computer running Windows Server 2003. All RMS
clients must use RMS aware applications, such as Outlook 2003 or a later version.
RMS is a useful solution for implementing message security for internal users where
users use Outlook 2003 or a later version to read e-mail. However, implementing RMS
for external users and external customers is more difficult because the client computers
must be able to connect to the RMS server to obtain a certificate to enable reading RMS-
protected content. Therefore, Outlook Anywhere users will not be able to access RMS-
protected e-mails while offline, and Outlook Web Access and external users will be able
to access these e-mails only if you make an RMS server Internet accessible.
For more information: Exchange Server 2007 accepts and sends RMS-protected
messages like any other messages but it does not provide any other functionality
directly related to RMS. For technical information about RMS, see the “Technical
Overview of Windows Rights Management Services” white paper.
4-24 Module 4: Designing Security for a Messaging Environment
Objectives
After completing this lesson, you will be able to:
• Describe the requirements for an antivirus and anti-spam solution.
• Design an anti-spam solution.
• Apply recommendations for monitoring an anti-spam solution.
• Design antivirus solutions.
• Describe how to integrate Exchange Server 2007 antivirus and anti-spam filtering
using Microsoft Exchange Hosted Services.
• Manage antivirus solutions.
• Design an anti-spam and antivirus solution.
Module 4: Designing Security for a Messaging Environment 4-25
One of the most important issues for any Exchange Server administrator is managing
virus and spam filtering solutions. As an Exchange administrator, you must have constant
awareness of attempts by malicious e-mails to enter your organization. This awareness
includes learning about new techniques that spammers and virus writers use.
Requirements
Many organizations have standard requirements for spam and virus filtering solutions.
Critical factors that you should consider when evaluating these solutions include:
• How often are the antivirus and anti-spam filters updated and are the processes
automated? When a new virus is released on the Internet, it is critical that your
antivirus software is updated before the virus enters your organization. If you
discover a new phishing scheme, it is important that your anti-spam filters are
updated to block the phishing e-mails.
When evaluating an antivirus or anti-spam solution, monitor the speed with which
the vendor provides updates, and ensure that their automated process for distributing
updates works effectively. As a best practice, consider implementing an antivirus
solution that can use multiple scan engines, from multiple vendors, to maximize your
changes of obtaining updates as quickly as possible.
4-26 Module 4: Designing Security for a Messaging Environment
• How does the anti-spam solution provide a balance between false positives and
reducing as much spam as possible? A false positive is a legitimate e-mail message
that the spam-filtering solution incorrectly identifies as spam. One of the most critical
issues in managing an anti-spam solution is the ability to eliminate false positives
while still blocking as much spam as possible. Many anti-spam solutions provide
features such as safe-senders lists or other lists that allow users to define senders
whose messages should not be blocked.
• What options does the solution provide for quarantining potentially malicious
messages? This is particularly important for anti-spam solutions, because this is a
primary method of detecting false positives. At a minimum, the anti-spam solution
should provide a quarantine location that the administrator can monitor for messages
that do not appear to be spam. Some solutions also provide quarantine locations that
users can access to review all messages that were intended for their mailboxes but
which the spam solution filtered instead. Exchange Server 2007 provides a
quarantine mailbox for messages filtered by the content filter, and enables
administrators to resubmit messages from the quarantine mailbox.
• What management and monitoring tools does the solution provide? Antivirus or
anti-spam solutions often include components that run on different computers. The
management tools should provide an efficient means to manage all of these systems.
The solution also should provide an effective monitoring system that can provide
real-time statistics for the messaging administrators, and it should provide alerts
when it detects outbreaks or attacks.
• How well does the solution integrate with your current system? The obvious
requirement is that the anti-spam and antivirus solution work with your messaging
system, but you also should consider additional integration factors. For example,
does the solution provide user-level integration so that you can configure filtering
rules based on your organization’s individual recipients, without necessitating
management of two separate directories? Does the solution integrate with your
administrative model so that you can assign permissions easily to manage and
monitor the system using existing administrative groups?
You also should also document any unique requirements that your organization may have.
For example, if users are using S/MIME frequently to send encrypted e-mail that spam or
virus filters cannot scan, you may need to explore other options for securing this content.
Other organizations may want to ensure that spam filters scan all messages from a partner
organization for viruses, but do not block them.
Module 4: Designing Security for a Messaging Environment 4-27
Designing an anti-spam solution is difficult because if you set all anti-spam features
filters to their most aggressive levels and configure all anti-spam features to reject all
suspicious messages, you are more likely to reject legitimate messages that are not spam.
On the other hand, if you do not set the anti-spam filters at a sufficiently aggressive level
and do not set the spam confidence level (SCL) threshold appropriately for your
organization, you probably will not notice a reduction in spam.
Note: See the Job Aid “Spam Filtering on Edge Transport Servers” located on the
Student Materials CD for a description of spam filtering options and the order in
which spam filters are applied on Edge Transport servers.
• Configure the connection filter agent, recipient filter agent, and sender filter agent
to reject messages. This approach is better than quarantining filtered messages or
assigning metadata, such as anti-spam stamps, to the messages. The connection filter
agent and recipient filter agent automatically block messages that the respective
filters identify. You can configure the action that the Sender Filter agent takes on
inbound e-mail messages. You also should reject messages filtered by real-time block
list (RBL) services and recipient filtering, although the underlying confidence is not
as high as the IP Block list.
• Consider implementing Edge Transport servers as SMTP gateway servers. There are
many third-party, anti-spam solutions available, but Edge Transport servers provide
additional integration with the internal Exchange organization when you enable Edge
Synchronization. For example, if you enable Edge Synchronization, the recipients
and safelist aggregation lists from inside the organization are replicated to ADAM on
the Edge Transport server, which then uses the information to filter spam.
• Implement safelist aggregation. Safelist aggregation enables the Edge Transport
server to make spam-filtering decisions by using the data from the Safe Recipients
Lists or Safe Senders Lists and contact data that Outlook users configure. Safelist
aggregation can reduce the instances of false-positives in anti-spam filtering. When
an Exchange administrator enables and configures safelist aggregation, the Content
Filter agent passes e-mail messages from the safe senders, recipients, or contacts to
the user mailbox without additional processing.
Note: Safelist aggregation data contains both the user’s Safe Senders list and the
user’s Safe Recipients list. When you use the Update-Safelist cmdlet, you can
specify whether to update the Safe Senders List or the Safe recipients list, or both.
However, the safelist aggregation feature only uses Safe Senders list data, and
does not act on Safe Recipients List Data. Therefore, to reduce Active Directory
storage and replication issues, you should not run the Update-Safelist cmdlet with
the Type parameter set to the SafeRecipients or Both values. The default value for
the Type parameter is SafeSenders.
• Implement automatic anti-spam updates. Exchange Server 2007 includes many anti-
spam features that depend on downloaded data to determine whether a message is, or
is not, spam. You must continually update this data, which includes content filter
updates, Microsoft IP Reputation Service data, and spam signature data, to ensure
that the anti-spam features function optimally.
Module 4: Designing Security for a Messaging Environment 4-29
The Exchange Server 2007 Edge Transport server support manual is updated by
default. To enable updates, the administrator must access the Microsoft Update site
to download and install the content filter updates. The content filter update data
is updated and available for download every two weeks. Automatic updates are
available if you have an Exchange Enterprise client access license (CAL) for each
user mailbox or a Forefront Security for Exchange Server license. Manual updates
from Microsoft Update do not include the Microsoft IP Reputation Service or spam
signature data. The Microsoft IP Reputation Service and spam signature data is only
available with Automatic Updates.
• Increase the filtering level over time. When you first implement the anti-spam
solution, you should plan a fairly non-aggressive configuration of the anti-spam
features. This approach lets you minimize the number of false positives. As you
monitor and adjust the anti-spam features, you can become more aggressive about the
type of spam and spam attacks that your organization experiences.
4-30 Module 4: Designing Security for a Messaging Environment
You can view a message’s anti-spam stamp by opening the message in Outlook 2007 and
viewing the Internet headers section in the message options.
4-32 Module 4: Designing Security for a Messaging Environment
One of the most common ways in which viruses spread from one organization to
another is through e-mail. Thus, one of the primary means of protecting the Exchange
organization is to ensure that you stop all messages containing viruses at the messaging
environment’s perimeter.
• Internet edge-based solutions. You also should deploy antivirus and anti-spam
software on the SMTP server, or Edge Transport server, that is accessible directly
from the Internet. This software scans files as they enter the organization, thereby
stopping the viruses and spam before they get into, or out of, the network.
• Delete, rather than clean, infected messages. Although it is possible for some
antivirus solutions to remove a detected virus from a message and preserve its
contents, such attempts may not be completely effective. Therefore, sending these
messages through the system presents a potential liability. For this reason, you should
delete infected messages.
• Strip attachments of certain file types. By stripping all attachments that contain
executable content, you can help protect an environment from unknown or recently
released malware that e-mail attachments transmit and for which signature files are
not yet available or deployed. A best practice is to implement attachment stripping at
the e-mail gateway layer and to match the gateway-layer attachment stripping policy
with the attachment blocking policy that the client enforces.
• Scan both incoming and outgoing e-mail for viruses. Although scanning incoming
e-mail is a primary method for keeping a messaging environment free of viruses, you
must also ensure that internal users do not send viruses in outgoing e-mail.
• Implement an antivirus solution that can take advantage of new Exchange
Server 2007 features, including two new ones that antivirus vendors can use to
optimize antivirus solutions:
• Transport agents for antivirus scanning. In an Exchange Server 2007
environment, all messages must pass through a Hub Transport server, and
inbound and outbound messages will pass through an Edge Transport server, if
you deploy one. On the transport servers, you can use transport agents to scan
messages and apply policies to them. This also applies to antivirus scanning.
Antivirus vendors can create transport agents that specifically scan for viruses.
• Antivirus stamping. Antivirus stamping helps reduce the number of times a
message is scanned as it is sent through an organization. This feature works by
stamping messages that an antivirus solution scans with the name and version of
the antivirus engine that performed the scan and the scan’s results. The antivirus
stamp travels with the message as it proceeds through the organization, and other
Exchange servers use it to determine if virus scanning is necessary for a message.
By reducing the number of times a virus needs scanning, you can reduce the use
of server resources that scanning requires.
4-34 Module 4: Designing Security for a Messaging Environment
For more information: For additional information on the Forefront Security for
Exchange Server features, see the Microsoft Forefront Security for Exchange
Server: Features Web site.
Module 4: Designing Security for a Messaging Environment 4-35
• Monitor daily statistics for the volume of processed e-mail, and the number of
detected viruses. A sharp increase in the number of infected messages may indicate
that a new virus has been released, which may require extra vigilance.
• Develop a user education process. Most viruses require user action to initiate an
attack. Therefore, your antivirus management strategy should include a user
education plan that will teach them about viruses and how to deal with suspicious
e-mails. Educating users includes making them aware of current threats, as well as
the importance of keeping their computer systems up-to-date with the latest signature
files and security updates. If you educate users, they may help prevent a virus from
spreading if it infects their system.
• Consider using a solution such as Microsoft Exchange Hosted Services, which offers
the advantage of enabling anti-spam and antivirus solution management from outside
the organization by a group of administrators dedicated to this task. In most
organizations, messaging administrators are busy and it is easy to delay the daily task
of monitoring the antivirus system, especially if they have identified no new viruses
for some time.
Module 4: Designing Security for a Messaging Environment 4-39
Exchange Server 2007 provides new features and tools to deal with spam and viruses. As
you design your Exchange Server 2007 deployment, you must consider how you will
integrate these features into your design.
Discussion Questions
Q Will you be deploying anti-spam filtering using an Edge Transport server in
Exchange Server 2007? What is the reasoning behind your decision?
A Answers will vary. Many organizations already have a very good anti-spam solution
in place and may be hesitant to change to a different system. Edge Transport servers
may provide some features that other spam filtering solutions do not support.
However, other solutions also provide features that are not available with an Edge
Transport server. In some cases, organizations may consider maintaining the current
system and adding an Edge Transport server to take advantage of the ways that the
Edge Transport server can integrate with Active Directory through edge
synchronization.
Q How will you modify your antivirus solution when you deploy Exchange
Server 2007?
A Answers will vary. When you deploy an antivirus solution in Exchange Server 2007,
you should consider replacing or supplementing the Microsoft Virus Scanning API
(VSAPI)-based scanning on Mailbox servers with transport agent-based scanning on
Hub Transport and Edge Transport servers.
4-40 Module 4: Designing Security for a Messaging Environment
Lab Setup
For this lab, you will use the available virtual machine environment. Before you begin the
lab, you must:
• Start the 5053A-LON-CL1 virtual machine.
• Log on to the virtual machine as TreyResearch\Administrator with a password
of Pa$$w0rd.
Lab Scenario
You are a messaging engineer for Trey Research, an enterprise-level organization with
multiple locations. Trey Research is an international corporation involved in technology
research and investment and is planning to upgrade from Microsoft Exchange 2000
Server to Exchange Server 2007. Trey Research currently has three remote sites and their
headquarters. The company is pursuing an aggressive expansion plan and will be adding
two new office locations during the upgrade project.
4-42 Module 4: Designing Security for a Messaging Environment
1. Review the Trey Research • Review the following sources of information located in the
documentation. D:\LabResources folder:
• Administrative Requirements section in the Security
Requirements.doc
• TR_Info.vsd
Discussion Questions
After completing the exercise, answer the following:
Q What are the complications of designing an organization’s administrative model with
multiple levels and groups of Exchange and Active Directory administrators?
A One of the potential complications is that it can be very difficult to assign the exact
permissions for each group of administrators. In Active Directory, you can assign
permissions based on organizational units. In Exchange Server 2007, you can assign
permissions at the organization level and at the server level, but you need to ensure
that the OU configuration corresponds to the Exchange Server deployment.
Q How does the proposed Trey Research design vary from your organization’s
administrative design?
A Answers will vary. Small organizations are likely to have a single group of
administrators responsible for Active Directory and Exchange Server 2007. Large
organizations may have a much more complicated administrative structure.
Module 4: Designing Security for a Messaging Environment 4-43
1. Review the Trey • Review the following sources of information located in the
Research documentation. D:\LabResources folder:
• Message Security Requirements section in the Security
Requirements.doc
• TR_Info.vsd
Note: The answers to the practices and labs are on the Student Materials CD.
Discussion Questions
After completing the exercise, answer the following:
Q How did you address the need to exchange secure e-mail between Trey Research and
Contoso Ltd.?
A The design calls for the Domain Security solution to ensure that all e-mail messages
are encrypted and connections are authenticated.
Q Does your organization have a requirement for the domain security solution? What
barriers will there be to adopting this solution?
A The Domain Security solution requires that you negotiate with the partner
organization to ensure that their Exchange Servers also are configured to support
Domain Security. This may be an issue in some organizations.
4-44 Module 4: Designing Security for a Messaging Environment
1. Review the Trey • Review the following sources of information located in the
Research documentation. D:\LabResources folder:
• Virus and Spam Filtering Requirements in the Security
Requirements.doc
• TR_Info.vsd
Note: The answers to the practices and labs are on the Student Materials CD.
Discussion Question
After completing the exercise, answer the following:
Q How did you design the antivirus and anti-spam solution for Trey Research? How
does this compare to the solution you would implement for your organization?
A Answers for the Trey Research design are in the TR_ProposedSecurityPolicies.doc
file in the LabAnswers folder. Organizations will have varying requirements for
designing the antivirus and anti-spam solutions.
Note: If you shut down the virtual machines without saving changes, the files that
you created during the lab will not be saved. To retain those files, you can leave
the virtual machines running, or you can shut down 5053A-LON-CL1 and commit
the changes.
Module 4: Designing Security for a Messaging Environment 4-45
Lab Shutdown
1. On the host computer, click Start, point to All Programs, point to Microsoft
Virtual Server, and then click Virtual Server Administration Website.
2. Under Navigation, click Master Status. For each virtual machine that is running,
click the Virtual Machine Name, and, in the context menu, click Turn off Virtual
Machine and Discard Undo Disks. Click OK.
3. Start the 5053A-LON-CL1 virtual machine. Additionally, you also can start the
5047A-LON-DC1 and the 5047A-LON-Edge1 virtual machines.
Module 5: Designing Messaging Policies
Table of Contents
Overview 5-1
Lesson 1: Designing Exchange Recipient and
Message Policies 5-2
Lesson 2: Designing Mobile Device Policies 5-18
Lesson 3: Designing Messaging Policies for
Compliance 5-25
Lab: Designing Messaging Policies 5-39
Information in this document, including URL and other Internet Web site references, is subject to change
without notice. Unless otherwise noted, the example companies, organizations, products, domain names,
e-mail addresses, logos, people, places, and events depicted herein are fictitious, and no association with any
real company, organization, product, domain name, e-mail address, logo, person, place, or event is intended or
should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting
the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval
system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or
otherwise), or for any purpose, without the express written permission of Microsoft Corporation.
The names of manufacturers, products, or URLs are provided for informational purposes only and Microsoft
makes no representations and warranties, either expressed, implied, or statutory, regarding these
manufacturers or the use of the products with any Microsoft technologies. The inclusion of a manufacturer or
product does not imply endorsement of Microsoft of the manufacturer or product. Links are provided to third
party sites. Such sites are not under the control of Microsoft and Microsoft is not responsible for the contents of
any linked site or any link contained in a linked site, or any changes or updates to such sites. Microsoft is not
responsible for webcasting or any other form of transmission received from any linked site. Microsoft is
providing these links to you only as a convenience, and the inclusion of any link does not imply endorsement of
Microsoft of the site or the products contained therein.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights
covering subject matter in this document. Except as expressly provided in any written license agreement from
Microsoft, the furnishing of this document does not give you any license to these patents, trademarks,
copyrights, or other intellectual property.
Microsoft, Active Directory, ActiveSync, BizTalk, ForeFront, Internet Explorer, MSN, Outlook, PowerPoint,
SharePoint, SmartScreen, SQL Server, Visual Basic, Visual Studio, Windows, Windows Media, Windows
Mobile, Windows PowerShell, Windows Server, and Windows Vista are either registered trademarks or
trademarks of Microsoft Corporation in the United States and/or other countries.
Version 1.2
Module 5: Designing Messaging Policies 5-1
Overview
One of the components in your Microsoft® Exchange Server 2007 design is designing
messaging policies for your organization. Policies that you can create include those
related to the administration of Exchange management objects and to managing message
delivery. In many organizations, some of the most important policies that you develop
will relate to managing messaging compliance.
Objectives
After completing this module, you will be able to:
• Design policies for Exchange recipients and message delivery.
• Design policies for mobile devices.
• Design messaging policies for compliance.
5-2 Module 5: Designing Messaging Policies
When you design the Exchange Server 2007 messaging solution, you may have to design
policies for managing a variety of Exchange objects. For example, you may need to
define policies for naming servers that are running Exchange Server and for naming
management objects, to ensure consistent messaging system administration. You also
may need to specify the maximum storage limits for mailbox databases and policies
related to scheduling meetings or to maximum message size. Additionally, you may need
to plan for exceptions to your policies.
Objectives
After completing this lesson, you will be able to:
• Design a naming convention for Exchange objects.
• Design a calendar and resource management strategy.
• Design mailbox size policies.
• Design message delivery policies.
• Design client access policies.
• Design a process for dealing with policy exceptions.
Module 5: Designing Messaging Policies 5-3
The naming conventions that organizations use vary greatly, and there are no standards
for naming Exchange objects. Your goal should be to create effective and consistent
naming conventions that work well for your organization.
5-4 Module 5: Designing Messaging Policies
Discussion Questions
Q What are the naming conventions for your organization’s Exchange objects?
A The naming conventions for Exchange objects will vary greatly between
organizations. Some general suggestions include:
• Considerations for naming Exchange Servers. Develop a consistent and
descriptive naming scheme that clearly identifies the server location and role,
and which includes a unique identifier. For example, for the first Hub Transport
server you deploy in London, consider using a name like LON-Hub-01. This
name identifies the location (London), the server role (Hub Transport server),
and includes a sequential number for identifying additional servers that have the
same role in the same location.
• Considerations for designing alias and Simple Mail Transfer Protocol (SMTP)
domain names. All users’ e-mail addresses are comprised of an alias and SMTP
domain names.
By default, when you install Exchange Server 2007, the only accepted SMTP
domain for the organization is the forest root’s domain name. In some
organizations, you do not need to modify the default configuration.
However, some organizations do not use the forest root domain name as their
SMTP domain. These organizations may have an external Internet presence using
an SMTP domain name that is different from the internal forest name. For these
organizations, the user’s SMTP address should be the same as the company’s
SMTP domain.
To modify the domain name component for a user’s e-mail address, you need to
add the required SMTP domain name as an accepted domain and then manually
configure the user’s e-mail address or configure an e-mail address policy to
assign an e-mail address to some or all users.
When designing the alias part of the user name, you need to choose whether you
will use the same name with which users log on. Both the user logon name and
the alias must be unique in the organization and this name should be easy for
users to remember. However, some organizations also consider using the logon
name as the SMTP alias to be a security risk.
By default, the user logon name is assigned as the alias when you create a user’s
SMTP address. If you need to modify the default setting, you can modify the
default e-mail address policy or create a new e-mail address policy. In the policy,
you can specify any combination of the user’s first and last names as the alias.
For example, you can configure a policy that specifies Firstname.Lastname, or
FirstinitialofFirstnameLastname as the alias.
Module 5: Designing Messaging Policies 5-5
Q Will you change the naming convention during the migration to Exchange Server
2007? What issues do you expect to encounter if you change the naming convention?
A Answers will vary. Naming conventions that include these features may need to be
changed because some features, such as routing and administrative groups, are no
longer relevant in Exchange Server 2007.
5-6 Module 5: Designing Messaging Policies
Exchange Server 2007 provides various resource mailboxes, such as meeting rooms and
equipment. You can invite these resources to meetings as a way of reserving the meeting
room or equipment. Exchange Server 2007 provides several options for managing those
users who can book meetings using resource mailboxes.
(continued)
Setting Description
AllRequestOutOfPolicy Specifies whether to allow all users to submit out-of-policy
requests. The default is false, which prevents all users from
requesting appointments that do not meet specified requirements,
such as no conflicts.
BookInPolicy Specifies a list of users for whom requests that meet the specified
requirements are booked automatically without approval from a
resource mailbox delegate.
RequestOutOfPolicy Specifies a list of users who can submit appointment requests
that do not meet specified requirements, such as no conflicts. A
resource mailbox delegate still must approve all requests.
TentativePendingApproval Specifies whether to mark pending requests as tentative on the
calendar. The default is true, which marks appointment requests
as tentative until they are approved. When this value is false,
pending appointments are not displayed on the calendar.
MaximumDurationInMinutes Specifies the maximum length of the appointment that the
resource will accept.
Tip: You can use Microsoft® Office Outlook® Web Access to modify the auto
accept settings for a resource mailbox. To do this, open the resource mailbox using
an account that has full access to the mailbox, and then access the Resource
Settings option on the Options page.
One of the important policies that you must define for an Exchange Server 2007
organization is the mailbox size policy. To design an organization’s mailbox sizes, you
must understand the business requirements and the constraints for mailbox size limits.
Note: If the organization requires that users store messages for an extended time,
consider implementing an archiving solution. An archiving solution provides a
location outside the user mailbox in which to store e-mail messages where users
can still access them. The archive solution can prevent users from accidentally
deleting important messages.
Module 5: Designing Messaging Policies 5-9
Note: For detailed information on the actual disk space used for mailbox
databases, see Module 3: “Designing Exchange Servers,” in this course.
In most organizations, hard disk capacity is not the most important factor in determining
the maximum mailbox size. In most cases, the backup and restore capacity for the
Mailbox servers is more important when designing the mailbox size policy. The total
available hard-disk space does not determine the maximum mailbox size, but rather, how
fast you can back up and restore the mailbox, and the recovery requirements that your
organization’s service level agreement (SLA) specifies.
For example, if the SLA specifies that you should restore any failed mailbox database
within two hours, and if your backup system can restore only 50 gigabytes (GB) of data
per hour, you should have a maximum database size of 100 GB.
Note: You also should consider the time it will take to initiate the backup procedure
when designing the database size based on the time it takes to recover the
database. For example, you need to consider the time it takes to locate and load
the backup tape and the time it will take to repair any failed hardware components
that caused the database failure.
Note: You can modify the Exchange Server 2007 quota messages using the Set-
SystemMessage command. For more information, see “How to Manage Quota
Messages” on the Microsoft TechNet Web site.
5-10 Module 5: Designing Messaging Policies
In addition to mailbox sizes, you also should plan the size limits for messages sent within
your organization and to external users.
For a message to be delivered, the message size must not exceed the message size
restriction for all Exchange 2007 components that will handle the message during
message transfer. For example, a message that an internal user sends to a recipient on the
Internet must be smaller than: the organizational limit; the limit set on any Hub Transport
or Edge Transport server that may handle the message; the connector limit set for the
SMTP send connector that delivers the message from the Hub Transport server to the
Edge Transport server, and from the Edge Transport server to the Internet SMTP server;
and the message size limit for the individual user’s mailbox.
• If you have an office location that has a very slow network connection to other
locations, consider setting the office’s maximum message size limit on the Hub
Transport server to a lower value than you have in the rest of the organization. Be
aware that this may increase user dissatisfaction, because that location’s users will
not receive some messages delivered to users in other offices.
• Ensure that the maximum message size limit for the SMTP connector that receives
inbound Internet e-mail does not exceed the organization’s internal message size
limit. Messages that exceed the size limit should be dropped at the organization’s
initial entry point so that the message delivery does not consume system resources.
Module 5: Designing Messaging Policies 5-13
Exchange Server 2007 provides a wide variety of client access options including Post
Office Protocol version 3 (POP3), Internet Message Access Protocol version 4rev1
(IMAP4), Microsoft Office Outlook® Web Access, Outlook Anywhere, and Exchange
ActiveSync. All of these clients access the Exchange mailboxes through the Client
Access server role. As part of your design, you need to consider which client access
options you will allow and how you will configure them.
Both Outlook Web Access and Outlook Anywhere provide complementary features, and
many organizations deploy both options. As part of designing your organization’s client
access strategy, you will need to consider whether to enable access for both types of
clients and determine configuration settings for each.
Valid exceptions will exist for almost every policy. Most organizations allow exceptions
for personnel for whom a policy limits their ability to do their job. For example, if a user
needs to send and store large attachments as part of their job, the organization likely will
approve an exception to this user’s message size and mailbox size policies.
Once you determine who the approver will be, you need to develop a process for users
to follow to get their requests approved. If the organization has an intranet site that most
users utilize, you may choose to create a Web page from which users can make their
requests. If you use a Web page, you can automate the sending of the request to the
exception approver. To ensure prompt resolution of all exception requests, make certain
that users are aware of how to request a policy exception.
As the final step in enabling policy exceptions, design a process for implementing the
policy after approval. Ensure that only properly authorized personnel can make the
changes. Normally, the Exchange administrators will implement the change, but ensure
that they are aware of the process for exception approval and how to confirm that an
exception was approved.
5-18 Module 5: Designing Messaging Policies
Many organizations provide their employees with the option to access their Exchange
mailboxes with mobile devices. However, this can raise security concerns because mobile
devices may contain a large amount of confidential information, and also can be lost or
stolen easily. Therefore, it is essential to define some security policies for managing
mobile devices.
Objectives
After completing this lesson, you will be able to:
• Describe the options for managing mobile devices.
• Design security policies for mobile devices.
• Design policies for device management.
Module 5: Designing Messaging Policies 5-19
One of the most common ways for users to access their Exchange mailboxes is with
mobile devices, such as a cell phone or personal digital assistants (PDAs). However,
these mobile devices can present a serious security risk. Exchange Server 2007 provides
several options for managing these devices.
You also can manage other settings to ensure that the connections are secure from the
mobile device to the Client Access server. At a minimum, you should configure a server
certificate from a trusted CA on the Client Access server and configure Microsoft Server
ActiveSync to require SSL for all connections. Additionally, you can configure the
virtual directory to require client certificates for authentication. When you enable this
option, only clients with approved certificates will be able to connect to the Client Access
server using Exchange ActiveSync.
You can manage which types of devices can connect to the Client Access server. To
support features such as Exchange ActiveSync mailbox policies, the mobile client must
be running Microsoft® Windows® Mobile 5.0 with the Messaging and Security Feature
Pack, or a later version of Windows Mobile. If you want to ensure that the policies are
applied to all mobile clients, you can prevent connections from all devices that do not
meet this minimum requirement.
You also can manage Exchange ActiveSync access for individual user accounts. By
default, all users are enabled for Exchange ActiveSync, but you can disable this setting
on each user mailbox.
Module 5: Designing Messaging Policies 5-21
One of the most important ways to implement mobile device security in Exchange
Server 2007 is to use Exchange ActiveSync policies. You can configure password
policies for mobile devices by configuring Exchange ActiveSync policies.
Exchange Server 2007 also provides the option to wipe a mobile device remotely if it
appears to be a security issue. For example, if a device is lost or stolen, you may choose
to wipe the device to ensure that unauthorized users cannot access corporate data via the
device. Both the Exchange administrator and the device user can initiate the remote wipe.
Note: The remote wipe does not delete the data that is stored on a memory card in
the computer. To protect this data, you should require encryption for all data that is
stored on the mobile device.
However, remotely wiping a device that has been temporarily lost can cause user
dissatisfaction. This means that you need to design policies for when an administrator
will wipe a mobile device or for when users can wipe their own devices.
5-24 Module 5: Designing Messaging Policies
Objectives
After completing this lesson, you will be able to:
• Describe how Exchange Server 2007 can address corporate requirements for
messaging policies and compliance.
• Design policies for messaging records management.
• Design policies for message journaling.
• Manage the Journal mailbox.
• Design message archiving policies.
• Design a user communication plan for messaging policies.
5-26 Module 5: Designing Messaging Policies
Governments all over the world have passed legislation to regulate and protect the
disclosure of personal information, financial information, and organizational security.
For example, the United States has passed several laws, such as the Sarbanes-Oxley Act
of 2002 (SOX) and the Gramm-Leach-Bliley Act (Financial Modernization Act), which
focus on securing and protecting the privacy of financial and personal information.
The Europe Commission has implemented several directives that define protection
requirements for personal data. Most other countries have passed similar laws to secure
personal information and electronic documents that organizations collect and use.
Corporate Policies
In addition to complying with government legislation, many organizations maintain
internal corporate policies to protect information within the company. For example, an
investment organization may not allow e-mail communication between two specific
organizational departments. Organizations also may define requirements for policies such
as e-mail deletion or disclaimer text.
Exchange Server 2007 provides several tools and features, such as Messaging Records
Management, Transport Rules, and Journaling Policies that organizations can use to
address many of the legal and corporate requirements for managing information security.
5-28 Module 5: Designing Messaging Policies
Messaging records management policies deal primarily with other message retention
issues. By implementing messaging records management policies, you can ensure that
certain messages are deleted in user mailboxes and that certain messages are retained for
an extended period.
Note: You can apply multiple content settings to a managed folder, but only if the
content settings apply to different message types. For example, you can configure
a content setting that applies to messages and another that applies to calendar
items on the same folder.
Note: When you implement managed custom folders, users must move messages
into the managed e-mail folders for the content settings to apply. This means that
you must provide user training to educate users about why they need to move
messages into these folders. You also may need to provide training on how to
configure Outlook rules to move messages automatically into the correct folders.
Module 5: Designing Messaging Policies 5-31
Exchange Server 2007 provides two types of messaging journaling: premium and
standard. With premium message journaling, you can save a copy of every message sent
by, or to, specific users. With standard journaling, you can save a copy of every message
sent to, or from, a specific mailbox store. Premium journaling is available only if you
have purchased Exchange Enterprise Client Access Licenses (CALs). Standard journaling
is available with Standard CALs.
Note: If you do not want journal rules to be applied to a specific Hub Transport
server, you can disable that server’s journaling agent.
Module 5: Designing Messaging Policies 5-33
In a large organization or if you configure journaling for a large number of users, the
journal mailbox can grow very rapidly. Additionally, the journal mailbox may contain
highly confidential information that should not be accessible to most users. This means
that you will need to develop policies for managing the journal mailbox.
Tip: If you set limits on the journal mailbox, you also can set an alternative
journaling mailbox. When you do this and the journal mailbox reaches the
maximum size, the NDRs for failed messages are sent to the alternative
journal mailbox. To configure the alternative journal mailbox, use the
Set-TransportConfig –JournalingReportNdrTo alternateSMTPAddress cmdlet.
Message archiving is when you save a copy of a message in a location outside the
Exchange messaging system. Archiving may be part of your organization’s security
requirement for business or forensic purposes. Your organization also may require it to
maintain a history of messages while not enlarging user mailboxes.
Exchange Server 2007 does not provide a message archiving solution, but provides
several features that you can use to implement message archiving.
• Implement archiving by using transport rules that will send copies of messages to an
archive location. You can configure transport rules to send messages to the location
based on criteria such as sender or recipient, message classification, or message
contents.
The third step for implementing archiving is to enable access to the message archive after
the message is removed from the user mailbox. If you are using a Windows SharePoint
Services document library as the archive location, users can access the archive through a
Web browser. When planning for access to the messages, ensure that appropriate security
is applied to all messages to prevent unauthorized access.
The final step in implementing an archive solution is to remove messages from the user
mailboxes. One of the primary purposes for implementing an archive solution is to reduce
the storage space requirements on Exchange mailbox servers. Therefore, you must ensure
that messages are deleted in the databases over time. You can use messaging records
management rules to implement this part of the solution.
Your organization’s users will be affected when you implement messaging policies.
Implementing some messaging policies, such as messaging records management or
mobile devices polices, will have an immediate impact on users as they see new folders
appear in their inboxes or as they are required to use a password to access their mobile
devices. Other policies, such as those implementing message journaling, may be more
transparent to users. However, users should be aware of the policies that you are applying.
To ensure compliance and provide users with the rationale for messaging policies, you
need to develop a communication plan that communicates messaging environment
changes to users.
Discussion Questions
Q How do you communicate changes to the IT environment to users?
A Answers will vary. Some organizations have very formal processes for informing and
training users, while other organizations have informal processes. Depending on the
type of policy you are implementing, you should design a user communication plan
that will identify and inform the appropriate users.
5-38 Module 5: Designing Messaging Policies
Q How will you ensure that users follow messaging policies? For example, messaging
records management policies that use managed custom folders require that all users
move messages into the correct folders.
A If you are implementing the policies for regulatory or legal reasons, it is essential that
all users comply with the policies. As part of the communication plan, include
information on how you are monitoring compliance and indicate the results of non-
compliance.
Module 5: Designing Messaging Policies 5-39
After completing this lab, you will be able to design messaging policies.
Estimated time to complete this lab: 60 minutes
Lab Setup
For this lab, you will use the available virtual machine environment. Before you begin the
lab, you must:
• Start the 5053A-LON-CL1 virtual machine.
• Log on to the virtual machine as TreyResearch\Administrator with a password
of Pa$$w0rd.
Note: Two additional virtual machines are provided with this course. 5053A-LON-
DC1 is configured as a domain controller in the TreyResearch.net domain and has
a standard Exchange Server 2007 installation. 5053A-LON-Edge1 is a stand-alone
server and has the Exchange Server 2007 Edge Transport Server role installed on
it. The 5053A-LON-CL1 computer is a member of the Treyresearch.net domain.
Lab Scenario
Now that you know the target state for the Trey Research Exchange Server 2007
organization, you need to complete the design by developing messaging policies. This
happens late in the design process to ensure that the policies you design match the
Exchange Server 2007 organizational design.
5-40 Module 5: Designing Messaging Policies
Scenario
To prepare for this exercise, review the Trey Research requirements for implementing the
Exchange 2007 organization
1. Review the Trey Research • Review the following document located in the D:\LabResources
documentation. folder:
• Policy_Requirements.doc
3. Modify the TR_Policies.doc • In the TR_Proposed_Policies.doc file, fill in the Mailbox and
file with proposed mobile Message Policies table. In the table, provide:
client policies. • The type of policy you are configuring
• Policy settings
• Additional comments
• Save the file as: D:\Mod05\Labfiles\LabOutputs\
TR_ProposedPolicies.doc.
Discussion Questions
Q How did you design the messaging policies for the Trey Research organization?
A Use the TR_Proposed_Policies in the D:\Mod05\Labfiles\LabAnswers folder to
discuss the answers.
Q Will the Exchange Server 2007 features address all of the requirements?
A Answers will vary. For organizations with simple requirements, Exchange Server
2007 is likely to provide all required functionality. Organizations with very complex
requirements likely will need to add third-party products to the environment.
Q How will you address policy requirements that Exchange Server 2007 features do not
meet?
A Answers will vary. Students should explore third-party products, especially when
addressing archiving and providing options that are more complex for message
journaling or applying transport rules. Additionally, a technical solution might not
address some requirements and organizations will need to explore the use of written
corporate policies to enforce these requirements.
Lab Shutdown
After you complete the lab, you must shut down the 5053A-LON-CL1 virtual machine
and discard any changes.
Important: If the Close dialog box appears, ensure that Turn off and delete
changes is selected, and then click OK.
Module 6: Designing Coexistence and
Interoperability Strategies with Other
Messaging Systems
Table of Contents
Overview 6-1
Lesson 1: Overview of Coexistence and
Interoperability with Other Messaging Systems 6-2
Lesson 2: Designing a Coexistence Strategy with
Previous Exchange Versions 6-7
Lesson 3: Designing an Interoperability Strategy
with Other Messaging Systems 6-22
Lab: Designing Coexistence and Interoperability
Strategies with Other Messaging Systems 6-33
Information in this document, including URL and other Internet Web site references, is subject to change
without notice. Unless otherwise noted, the example companies, organizations, products, domain names,
e-mail addresses, logos, people, places, and events depicted herein are fictitious, and no association with any
real company, organization, product, domain name, e-mail address, logo, person, place, or event is intended or
should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting
the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval
system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or
otherwise), or for any purpose, without the express written permission of Microsoft Corporation.
The names of manufacturers, products, or URLs are provided for informational purposes only and Microsoft
makes no representations and warranties, either expressed, implied, or statutory, regarding these
manufacturers or the use of the products with any Microsoft technologies. The inclusion of a manufacturer or
product does not imply endorsement of Microsoft of the manufacturer or product. Links are provided to third
party sites. Such sites are not under the control of Microsoft and Microsoft is not responsible for the contents of
any linked site or any link contained in a linked site, or any changes or updates to such sites. Microsoft is not
responsible for webcasting or any other form of transmission received from any linked site. Microsoft is
providing these links to you only as a convenience, and the inclusion of any link does not imply endorsement of
Microsoft of the site or the products contained therein.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights
covering subject matter in this document. Except as expressly provided in any written license agreement from
Microsoft, the furnishing of this document does not give you any license to these patents, trademarks,
copyrights, or other intellectual property.
Microsoft, Active Directory, ActiveSync, BizTalk, ForeFront, Internet Explorer, MSN, Outlook, PowerPoint,
SharePoint, SmartScreen, SQL Server, Visual Basic, Visual Studio, Windows, Windows Media, Windows
Mobile, Windows PowerShell, Windows Server, and Windows Vista are either registered trademarks or
trademarks of Microsoft Corporation in the United States and/or other countries.
Version 1.2
Module 6: Designing Coexistence and Interoperability Strategies with Other Messaging Systems 6-1
Overview
Almost all companies are using a messaging system currently. Some companies use
a previous Microsoft® Exchange Server version, some use non-Exchange systems,
and some use hosted messaging services that third parties provide. When you deploy
Exchange Server 2007 in an organization that hosts its own messaging systems, you will
be replacing the current messaging system with Exchange Server 2007.
In all but the smallest organizations, you most likely will implement Exchange
Server 2007 over a period of time. Therefore, while you are implementing Exchange
Server 2007, you must plan a strategy for coexisting with the organization’s current
messaging system.
Objectives
After completing this module, you will be able to:
• Describe the Exchange coexistence and interoperability scenarios and terminology.
• Design a coexistence strategy with previous Exchange Server versions.
• Design an interoperability strategy with other messaging systems.
6-2 Module 6: Designing Coexistence and Interoperability Strategies with Other Messaging Systems
When you decide to implement an Exchange Server 2007 messaging system in your
organization, you may need to maintain both your previous messaging system and
Exchange Server 2007 for some time. While you are upgrading the system, users still
need to send e-mail and schedule meetings. The Exchange Server 2007 implementation
should disrupt normal business processes minimally, if at all.
Objectives
After completing this lesson, you will be able to:
• Describe the coexistence and interoperability scenarios.
• Describe a coexistence and interoperability strategy.
Module 6: Designing Coexistence and Interoperability Strategies with Other Messaging Systems 6-3
When designing a coexistence and interoperability strategy, you must first understand the
available options. Your choices depend on your current environment and the timeline that
your migration requires.
Note: If you have Exchange Server 5.5 servers installed in your Exchange
organization currently, you have the option of upgrading to Exchange 2000 Server
or Exchange Server 2003 and then installing Exchange Server 2007 into the
organization. Alternatively, you can create a new Exchange Server 2007
organization and configure interoperability between the organizations.
Module 6: Designing Coexistence and Interoperability Strategies with Other Messaging Systems 6-5
When you deploy two messaging systems in your organization, you must ensure that you
disrupt users as little as possible. All users should be able to exchange messages with
users on both messaging systems and all users should have access to the same directory
information.
Discussion Questions
Q What functionality or information do messaging systems need to share when both are
in use?
A In most coexistence or interoperability scenarios, you must configure integration for
at least the following information:
• E-mail message flow. While you are running two messaging systems, users must
be able to send e-mail to other organizational users, and to and from users on the
Internet. Message flow should be transparent to users—they should not need to
know, nor should it matter, on which messaging system the recipient’s mailbox is
located.
• Global Address List (GAL).To simplify the process of sending messages
between messaging systems, you must ensure that the GAL is synchronized
between the messaging systems.
6-6 Module 6: Designing Coexistence and Interoperability Strategies with Other Messaging Systems
You can use a coexistence strategy only when you install Exchange Server 2007 servers
into an existing Exchange 2000 Server or Exchange Server 2003 organization. The most
complicated part of designing a coexistence strategy is creating a message routing
topology between the messaging systems. As part of the coexistence strategy, you also
will need to design a system for integrating calendar information, offline address-book
information, and public folder information between the messaging systems.
Objectives
After completing this lesson, you will be able to:
• Design message flow in a coexistence scenario.
• Design calendar availability between Exchange Server versions.
• Design a solution for offline address book access.
• Design a solution for providing public folder access.
• Design an Exchange Server administration plan in a coexistence scenario.
• Design a coexistence implementation plan.
6-8 Module 6: Designing Coexistence and Interoperability Strategies with Other Messaging Systems
Important: You should never modify the default configuration for the Exchange
Server 2007 routing group. It is not supported to move servers from this routing
group to another routing group, rename the Exchange Server 2007 routing group,
or manually add Exchange 2003/2000 Servers to the Exchange Server 2007
routing group.
When you install the first Exchange Server 2007 Hub Transport server in an existing
Exchange organization, you must specify an Exchange 2000 Server or Exchange
Server 2003 bridgehead server that will operate as the first routing group connector’s
bridgehead server. The routing group connector links the routing group where the
Exchange 2000 Server or Exchange Server 2003 resides with the Exchange Server 2007
routing group.
The Hub Transport server that you are installing, and the Exchange 2000 or
Exchange 2003 bridgehead that you select, are configured as the source and target servers
on two reciprocal routing group connectors. The selected bridgehead server is added
automatically to the membership of the ExchangeLegacyInterop universal security group,
and is granted the permissions that are required to send e-mail to, and receive e-mail from,
Exchange Server 2007. This routing group connector creates a single connection point
between Exchange Server 2003 and Exchange Server 2007.
• If your organization has multiple locations and multiple routing groups, you should
create additional routing group connectors to optimize message routing. If you use
only the default routing group connector that is created during the Hub Transport
server installation, it routes all messages from Exchange Server 2007 recipients to
Exchange 2000 or 2003 recipients through the Active Directory site where the Hub
Transport bridgehead server is located. The messages then go across the routing
group connector and through the Exchange 2000 or 2003 routing group connectors to
recipients on Exchange 2000 or 2003 servers.
To optimize message routing, consider creating a new routing group connector in
each routing group as you deploy a Hub Transport server in the corresponding Active
Directory sites. In this way, you can send messages between the messaging systems
without routing them to another company location. You must use Exchange
Management Shell to manage routing group connectors.
• If you implement multiple routing group connectors between the two Exchange
versions, you also must suppress link state updates on Exchange 2000 Server or
Exchange Server 2003. Servers running Exchange Server 2003 and Exchange 2000
Server maintain a link state routing table that determines how a message is routed
inside the organization. If a particular routing group is inaccessible by using the
lowest cost route, the routing group master updates the link state table to show the
link’s state as down.
Exchange Server 2007 Hub Transport servers do not use link state routing, and
Exchange Server 2007 cannot propagate link state updates. When no Hub Transport
server in a site is available, the Hub Transport server does not recalculate the route.
If multiple paths exist between the Exchange Server 2007 routing group and any
Exchange Server 2003 routing group, minor link state updates must be suppressed to
make sure that message looping does not occur when a route is recalculated.
We recommend that you suppress minor link state updates for each server running
Exchange Server 2003 or Exchange 2000 Server. This enables the servers that are
running Exchange Server 2003 or Exchange 2000 Server to queue at the failure point
rather than recalculating the route.
Note: For more information on configuring minor link state updates, see the “How
to Suppress Link State Updates” page of the Microsoft TechNet Web site.
Module 6: Designing Coexistence and Interoperability Strategies with Other Messaging Systems 6-11
Exchange Server 2007 uses the Availability service to provide availability information
for Microsoft Office Outlook 2007 and Outlook Web Access users. Previous Exchange
Server versions used system folders to provide this functionality. You must ensure that
your design addresses this difference when planning the coexistence between your two
messaging systems.
4. If the mailbox for one of the invited users is on a computer running Exchange 2000
Server or Exchange Server 2003, the Availability service queries the system folder
that contains the user’s Free/Busy information.
5. The Availability service combines the Free/Busy information for all invited users and
presents it to the Office Outlook 2007 or Outlook Web Access client.
Another difference between Exchange 2000 Server, Exchange Server 2003 and Exchange
Server 2007 is how the offline address book is distributed to Outlook 2007 clients. In
Exchange 2000 Server and Exchange Server 2003, a system folder stores the offline
address book and clients must connect to the folder to download it. Outlook 2007 clients
connecting to an Exchange Server 2007 Client Access server will use a Web service to
download the offline address book.
3. Office Outlook 2007 will locate the closest Client Access server with an offline
address book copy during Autodiscover. The offline address book is distributed to
Office Outlook 2007 by using HTTPS and the Background Intelligent Transfer
Service (BITS) protocol. BITS enables resumable downloads and the ability to
download the offline address book without Office Outlook running.
Offline address book Web publishing integrates seamlessly with the offline address book
in previous Exchange Server versions. Outlook 2007 downloads the offline address book
from the Web service and all other clients download the offline address book from the
system folder.
In an Exchange 2000 Server or Exchange Server 2003 organization, one of the Exchange
servers performs daily updates of the offline address book. When you deploy an
Exchange Server 2007 Mailbox server in your organization, you can use the Exchange
Server 2007 management tools to move this role to a server running Exchange
Server 2007.
Another issue that may arise in a coexistence scenario is public folder access. You must
consider how users access public folders and provide access between Active Directory
sites when designing the public folder access solution.
In most cases, users utilize Outlook Web Access, IMAP4, or NNTP clients to access
public folders from outside the organization. You also may consider other options to
enable users to access this content in an Exchange Server 2007 environment. You should
consider:
• Providing users with an Outlook client that is configured to use Outlook Anywhere,
as the MAPI requests and data are tunneled through a HTTPS connection so the
client connection from the Internet remains secure while still enabling access to
public folders.
• Migrating the public folder data to another system, such as Windows SharePoint
Services. If you move the public folder data to Windows SharePoint Services, you
can make the Windows SharePoint Services server accessible to the Internet, and
users can access the data using any Web browser. You can also enable users to access
the information on a Windows SharePoint Services site by using Outlook Web
Access if you enable WebReady Document viewing or direct file access to the
Windows SharePoint Services site.
For more information: For detailed information on which settings you can
configure using either the Exchange 2000 or Exchange 2003 Exchange System
Manager or the Exchange Server 2007 administration tools, see the “Microsoft
Exchange Server TechCenter” page of the Microsoft TechNet Web site.
6-20 Module 6: Designing Coexistence and Interoperability Strategies with Other Messaging Systems
In a transition upgrade, you will install Exchange Server 2007 servers into an existing
Exchange 2000 Server or Exchange Server 2003 organization, and then gradually move
all data and functionality from the current messaging system to Exchange Server 2007.
Implementation steps
When installing Exchange Server 2007 into an existing Exchange 2000 Server or
Exchange Server 2003 organization, complete the following steps:
1. Document the configuration for the existing messaging environment before you
start the transition process. The easiest way to capture most information about your
Exchange organization, Active Directory, and other settings and configuration
information is to scan the organization using the Microsoft Exchange Server Best
Practices Analyzer Tool (ExBPA). ExBPA versions 2.7 and later include an
Exchange Server 2007 Readiness Check scan that you can use to assess your
organization’s Exchange Server 2007 readiness.
2. Prepare the Active Directory forest for the installation of servers running
Exchange Server 2007. To do this, run Exchange Server 2007 setup with the
/PrepareLegacyExchangePermissions switch. This step is required so that the
Exchange 2003 or Exchange 2000 Recipient Update Service functions correctly after
you update the Active Directory schema for Exchange Server 2007. Additionally,
run setup with the /PrepareAD switch. This applies the Exchange Server 2007
modifications to the Active Directory schema and creates the administrative groups
that Exchange Server 2007 uses.
Module 6: Designing Coexistence and Interoperability Strategies with Other Messaging Systems 6-21
3. Deploy the Client Access server role. You must deploy the Client Access server
role in each Active Directory site that contains or will contain a Mailbox server.
When you deploy the Client Access server role, all non-MAPI clients, including
clients accessing mailboxes on servers running Exchange 2000 Server or Exchange
Server 2003, can use the Client Access server.
4. Because the Exchange Server 2007 routing topology is very different from those in
Exchange Server 2003 and Exchange 2000 Server, you should transition all of a
routing group’s servers to Exchange Server 2007 simultaneously in the following
order:
a. Deploy and configure Hub Transport servers. You must install and configure a
Hub Transport server before you can establish mail flow. A Hub Transport server
can coexist with servers running Exchange 2000 Server or Exchange 2003 Server
that are designated as their routing group’s bridgehead servers. However, the
Exchange Server 2007 Hub Transport server cannot operate as a bridgehead
server for routing group connectors between Exchange 2000 Server or
Exchange Server 2003 routing groups, so you must retain the previous
bridgehead servers as long as there are mailboxes or public folders
Exchange 2000 or Exchange 2003 servers in the routing group.
b. Deploy and configure Mailbox servers. When you deploy Mailbox servers, you
can move mailboxes from Exchange Server 2003 and Exchange 2000 Server to
Exchange Server 2007. To move mailboxes to Exchange Server 2007, you can
use either the Move-Mailbox cmdlet or the Move Mailbox Wizard. Also, you
must move public folders and system folders to the Exchange Server 2007
Mailbox servers.
5. Deploy and configure Unified Messaging servers. You can install and configure a
Unified Messaging server after you deploy and configure a Client Access server, Hub
Transport server, and Mailbox server.
You can deploy and configure Edge Transport servers at any point during the
upgrade. You deploy the Edge Transport server outside the Exchange organization in
a perimeter network. You can install the Edge Transport server to provide spam and
virus filtering for an existing Exchange organization without upgrading any
Exchange servers. However, functionality such as edge synchronization requires
Exchange Server 2007 Hub Transport servers.
6-22 Module 6: Designing Coexistence and Interoperability Strategies with Other Messaging Systems
You may need to devise a strategy for integrating Exchange Server 2007 with other
Exchange Server messaging systems, or for deploying Exchange Server 2007 in a new
Exchange organization while retaining the current Exchange organization. In these
scenarios, you must configure the message routing between the existing system and
Exchange Server 2007. You can do this by using Simple Mail Transfer Protocol (SMTP)
connectors. To synchronize the Global Address List (GAL) between the two messaging
systems, you can use tools such Lightweight Directory Access Protocol (LDAP) and
Microsoft Identity Integration Server (MIIS). Exchange Server 2007 also supports a
connector that you can use for interoperability with Lotus Notes.
Objectives
After completing this lesson, you will be able to:
• Design message flow strategy with unique SMTP namespaces.
• Design message flow strategy with the same SMTP namespace.
• Design for global address list coexistence between messaging systems.
• Design a strategy for calendar coexistence between organizations.
• Design a coexistence strategy by using connectors.
Module 6: Designing Coexistence and Interoperability Strategies with Other Messaging Systems 6-23
3. On the non-Exchange Server 2007 messaging system, configure the SMTP servers to
send all messages with the Exchange Server 2007 organization’s SMTP address
space to the Hub Transport server with the appropriate receive connector. Configure
the SMTP server to use authentication.
Note: You must add the account that you will use to authenticate the connection to
the Hub Transport server to the ExchangeLegacyInterop security group in the
Exchange Server 2007 organization.
Depending on the network topology, you can deploy a single SMTP connector or
multiple ones. In a small company or a company with a single location, a single
connector will provide the required functionality and is easier to manage. In a company
with multiple locations, configure multiple connectors so that messages can be sent from
one messaging system to another without having to cross a WAN connection.
The message routing scenario can be more complicated if both messaging systems share
a common SMTP namespace. This is a common scenario because an organization likely
will use the same namespace in Exchange Server 2007 as in the previous messaging
system.
3. Configure all inbound and outbound Internet messages to flow through the Exchange
Server 2007 messaging system. To do this, configure an Edge Transport server using
an edge subscription. On the legacy messaging system, configure the SMTP server
that is responsible for outbound routing to use a Hub Transport server as its smart
host, and configure the server to use authentication when connecting to the Hub
Transport server. If the connection is authenticated, the Hub Transport server
will accept messages from the internal relay domain and deliver the messages to
Exchange Server 2007 mailbox users, or relay messages for Internet recipients to the
Edge Transport server for delivery.
Module 6: Designing Coexistence and Interoperability Strategies with Other Messaging Systems 6-27
Note: You can use the IORepl tool to replicate contacts and public folder
information between disjointed Exchange organizations. You cannot install a server
running Exchange Server 2003 into an existing Exchange 2007 organization. If
you plan to use the IORepl tool to replicate Free/Busy information, you must
install Exchange Server 2003 and then upgrade the organization to Exchange
Server 2007.
Lab Setup
For this lab, you will use the available virtual machine environment. Before you begin the
lab, you must:
• Start the 5053A-LON-CL1 virtual machine.
• Log on to the virtual machine as LON-CL1\Administrator with a password of
Pa$$w0rd.
Note: Two additional virtual machines are provided with this course. 5053A-LON-
DC1 is configured as a domain controller in the TreyResearch.net domain and has
a standard Exchange Server 2007 installation. 5053A-LON-Edge1 is a stand-alone
server and has the Exchange Server 2007 Edge Transport Server role installed.
The 5053A-LON-CL1 computer is a member of the Treyresearch.net domain.
6-34 Module 6: Designing Coexistence and Interoperability Strategies with Other Messaging Systems
Lab Scenario
You are a messaging engineer for Trey Research, an enterprise-level organization
with multiple locations. Trey Research is an international corporation involved in
technology research and investment, and is planning to upgrade from Exchange 2000
Server to Exchange Server 2007. Trey Research currently has three remote sites and their
headquarters. The company is pursuing an aggressive expansion plan and will be adding
two new office locations during the upgrade.
Location Internal Users Mobile Users
London 12,000 currently • 1000 – Outlook Web Access users
Corporate 10,000 after the new • 500 – Outlook Anywhere and mobile client users
Headquarters London office is ready • 800 – Outlook users connecting through a VPN
London (new office) 4,000 (anticipated) • 200 – Outlook Web Access users
• 50 – Outlook Anywhere and mobile client users
San Diego 500 • 50 – External POP3 client users
Former head office
of A. Datum
Corporation
Toronto 6,000 • 800 – Outlook Web Access users
• 100 – Outlook Anywhere and mobile client users
Tokyo 5,000 • 1000 – Outlook Web Access users
• 200 – Outlook Anywhere and mobile client users
• 200 –Outlook users connecting through a VPN
Chennai (new office) 800 (anticipated) • 200 – Outlook Web Access users
• 50 – Outlook users connecting through a VPN
Trey Research will implement a phased Exchange Server 2007 deployment over several
months, which means that the Exchange Server 2007 servers must coexist with the
Exchange 2000 Servers during the deployment. The first Exchange Server 2007 servers
will be deployed in London, followed one month later by a server deployment in Toronto.
As soon as you deploy the Exchange Server 2007 servers, you should move all possible
functionality to them. Additionally, you should optimize message routing between the
two messaging systems.
The Exchange Server 2007 deployment in Tokyo will start about two months after the
Exchange Server 2007 server deployment in London and Toronto.
Users in London and Tokyo use public folders extensively. Approximately 100 public
folders are configured with replicas on Exchange 2000 servers in both offices. Other Trey
Research offices very rarely access the public folders’ information.
Module 6: Designing Coexistence and Interoperability Strategies with Other Messaging Systems 6-35
The company office in San Diego is the former head office of A. Datum Corporation,
which Trey Research purchased six months ago. The San Diego office is running a
POP3/SMTP based messaging system. Currently, all messages between the A. Datum
office and the rest of Trey Research are sent through the Internet. The companies send
confidential e-mails back and forth, so you must change this traffic routing as soon as
you deploy the Exchange 2007 servers in Toronto so that all messages are sent across
the WAN connection between the company locations rather than through the Internet.
Additionally, you should not allow any inbound or outbound SMTP e-mail directly from
the San Diego office to and from the Internet. You should route all Internet SMTP traffic
to and from A. Datum through Toronto. The A. Datum location will be one of the last
offices to migrate to Exchange Server 2007. However, the migration must not disrupt
e-mail flow between the A. Datum location and the rest of Trey Research.
All of the users at A. Datum have an e-mail address of alias@Adatum.com. Users
need to maintain the A. Datum addresses while also getting new addresses of
alias@TreyResearch.net. You must implement this address change early in the migration,
before you deploy any Exchange Server 2007 servers in San Diego. Additionally, some
of the A. Datum employees are going to move to London or Toronto and must maintain
both e-mail addresses.
Another project is deploying Outlook 2007 clients to users in all company locations. You
must optimize any coexistence strategies for the new Outlook version. The project to
deploy Outlook 2007 to all desktops is expected to take about 18 months.
Within the next 12 months, the organization plans to migrate all existing users to
Exchange Server 2007.
6-36 Module 6: Designing Coexistence and Interoperability Strategies with Other Messaging Systems
Discussion Questions
After completing the exercise, answer the following:
Q If you implemented this design, what messaging services, if any, would it disrupt? At
what point would the disruption occur?
A This design should result in no disruptions in messaging services.
Q How would the user experience change during this period of coexistence? How
would you communicate changes to users?
A The only change users should experience is when they are upgraded from
Outlook 2003 to Outlook 2007, or when they access their user mailboxes through
Outlook Web Access and the mailbox has moved to an Exchange 2007 server.
Depending on the organization, you may consider providing some user training on
the Outlook version, or providing some documentation that highlights the differences
between the two Outlook versions.
6-38 Module 6: Designing Coexistence and Interoperability Strategies with Other Messaging Systems
Discussion Questions
After completing the exercise, answer the following:
Q What functionality will not be available between the two messaging systems? What
options would you suggest for dealing with this?
A The scenario does not provide any option for automating the GAL synchronization
between the messaging systems. This will be a significant task because of the large
number of Trey Research users that you must add to the legacy messaging system’s
GAL. You may consider only adding users from the Trey Research to whom users in
A. Datum are likely to send e-mail.
Note: The answers to the practices and labs are on the Student Materials CD.
Module 6: Designing Coexistence and Interoperability Strategies with Other Messaging Systems 6-39
Note: If you shut down the virtual machines without saving changes, the files that
you created during the lab will not be saved. To retain those files, you can leave
the virtual machines running, or you can shut down 5053A-LON-CL1 and commit
the changes.
Lab Shutdown
1. On the host computer, click Start, point to All Programs, point to Microsoft
Virtual Server, and then click Virtual Server Administration Website.
2. Under Navigation, click Master Status. For each virtual machine that is running,
click the Virtual Machine Name, and, in the context menu, click Turn off Virtual
Machine and Discard Undo Disks. Click OK.
3. Start the 5053A-LON-CL1 virtual machine. Additionally, you also can start the
5047A-LON-DC1 and the 5047A-LON-Edge1 virtual machines.
Module 7: Designing an Exchange
Server 2007 Upgrade Strategy
Table of Contents
Overview 7-1
Lesson 1: Overview of Available Upgrade Strategies 7-2
Lesson 2: Designing a Transition from Previous
Versions of Exchange 7-7
Lesson 3: Designing a Migration from Other
Messaging Systems 7-22
Lab: Designing an Upgrade Strategy 7-31
Information in this document, including URL and other Internet Web site references, is subject to change
without notice. Unless otherwise noted, the example companies, organizations, products, domain names,
e-mail addresses, logos, people, places, and events depicted herein are fictitious, and no association with any
real company, organization, product, domain name, e-mail address, logo, person, place, or event is intended or
should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting
the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval
system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or
otherwise), or for any purpose, without the express written permission of Microsoft Corporation.
The names of manufacturers, products, or URLs are provided for informational purposes only and Microsoft
makes no representations and warranties, either expressed, implied, or statutory, regarding these
manufacturers or the use of the products with any Microsoft technologies. The inclusion of a manufacturer or
product does not imply endorsement of Microsoft of the manufacturer or product. Links are provided to third
party sites. Such sites are not under the control of Microsoft and Microsoft is not responsible for the contents of
any linked site or any link contained in a linked site, or any changes or updates to such sites. Microsoft is not
responsible for webcasting or any other form of transmission received from any linked site. Microsoft is
providing these links to you only as a convenience, and the inclusion of any link does not imply endorsement of
Microsoft of the site or the products contained therein.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights
covering subject matter in this document. Except as expressly provided in any written license agreement from
Microsoft, the furnishing of this document does not give you any license to these patents, trademarks,
copyrights, or other intellectual property.
Microsoft, Active Directory, ActiveSync, BizTalk, ForeFront, Internet Explorer, MSN, Outlook, PowerPoint,
SharePoint, SmartScreen, SQL Server, Visual Basic, Visual Studio, Windows, Windows Media, Windows
Mobile, Windows PowerShell, Windows Server, and Windows Vista are either registered trademarks or
trademarks of Microsoft Corporation in the United States and/or other countries.
Version 1.2
Module 7: Designing an Exchange Server 2007 Upgrade Strategy 7-1
Overview
In most upgrade scenarios, you must plan for a period of coexistence between
Microsoft® Exchange Server 2007 and an existing messaging system. However, the
goal at most upgrade projects’ end is to move all services and data from the previous
messaging system to Exchange Server 2007, and to remove the existing messaging
system. This module details on how to complete an existing messaging system’s upgrade
to Exchange Server 2007.
Objectives
After completing this module, you will be able to:
• Describe the Exchange upgrade terminology and strategies.
• Design a transition strategy for upgrading from previous Exchange Server versions.
• Design a migration strategy for upgrading from other messaging systems.
7-2 Module 7: Designing an Exchange Server 2007 Upgrade Strategy
When planning an upgrade strategy, you will have many decisions to make regarding
moving services and data from the current messaging system to Exchange Server 2007.
The available options for performing these actions vary depending on your current
messaging environment and your project’s goals.
Objectives
After completing this lesson, you will be able to:
• Define the upgrade terminology.
• Describe the upgrade strategies.
Module 7: Designing an Exchange Server 2007 Upgrade Strategy 7-3
Upgrade Terminology
Before starting your Exchange upgrade design, you must understand the terminology
associated with the various upgrades.
The following terminology describes the various upgrade scenarios:
• Upgrade. An upgrade is an implementation of a newer Microsoft Exchange version
that replaces a current messaging system. You perform an upgrade anytime you
implement Exchange Server 2007 and move content from a previous messaging
system.
• Transition. In this scenario, you upgrade an existing Microsoft Exchange
organization to Exchange Server 2007. To perform the transition, install Exchange
Server 2007 servers into an existing Microsoft Exchange 2000 Server or Microsoft
Exchange Server 2003 organization, and move data and functionality from the
existing Exchange servers to new Exchange Server 2007 servers. Microsoft supports
a transition upgrade only from Exchange 2000 Server and Exchange Server 2003 to
Exchange Server 2007.
7-4 Module 7: Designing an Exchange Server 2007 Upgrade Strategy
Upgrade Strategies
When planning an Exchange Server 2007 upgrade, you can choose between several
options for the upgrade process. Choosing the best option for your organization depends
on your current environment, your organization’s requirements for migrating data to the
new system, and your project timeline.
You can use a transition upgrade strategy only when you install servers running
Exchange Server 2007 into an existing Exchange 2000 Server or Exchange Server 2003
organization. In a transition upgrade, you gradually replace all of the services that the
current Exchange servers provide with the same or similar functionality offered by
Exchange 2007 servers.
Objectives
After completing this lesson, you will be able to:
• Prepare an existing organization for Exchange Server 2007.
• Design a plan to maintain features that Exchange Server 2007 does not support.
• Prepare Active Directory for Exchange Server 2007.
• Design a Client Access server role deployment in a transition.
• Design a Hub Transport server role deployment in a transition.
• Design a Mailbox server role deployment in a transition.
• Design an Edge Transport server role deployment in a transition.
7-8 Module 7: Designing an Exchange Server 2007 Upgrade Strategy
You must assess and document your existing environment before you start upgrading
your organization to Exchange Server 2007. You should document existing settings and
configuration information for your Exchange organization, the Active Directory®
directory service, and your network.
Note: You can download the latest version of the EXBPA from the “Microsoft
Exchange Best Practices Analyzer v2.7” page of the Microsoft Download Center
Web site. By default, the EXBPA also always checks for updates to the EXBPA
whenever you start the tool.
The checks that ExBPA scan performs are similar to the prerequisite checks that the
Exchange Server 2007 Setup program implements. However, ExBPA scan examines
Active Directory and the existing Exchange organization rather than just the local
computer. The scan also performs a deep analysis of each existing Exchange 2000 Server
and Exchange Server 2003 server to verify that they have the necessary updates and
configuration in place to support Exchange Server 2007.
Module 7: Designing an Exchange Server 2007 Upgrade Strategy 7-9
The following table lists some issues that ExBPA may identify that you need to resolve
before starting the Exchange upgrade:
Issue Suggested resolution
The Schema Master is not running Upgrade the schema master to the correct operating
Windows 2003 SP1 or later. system version.
One or more Active Directory domains are Resolve any issues related to why the domain
not in native mode. functional level has not been raised to the required
level, and then raise the domain functional level.
One or more Active Directory sites do not Upgrade at least one global catalog server in each
have a global catalog server running site to the correct operating system version.
Windows 2003 SP1 or later.
One or more Active Directory Connectors The Active Directory Connector is used to replicate
exist in the organization. information between Exchange 5.5 and Active
Directory. Ensure that this connector is no longer
required and remove it from the server.
7-10 Module 7: Designing an Exchange Server 2007 Upgrade Strategy
Exchange Server 2007 does not support some features that were available in previous
Exchange Server versions.
Note: In addition to these Exchange features, your organization also may have
installed third-party software or services that integrate with Exchange. Ensure that
these services are compatible with Exchange Server 2007 or update them to
versions that are compatible with Exchange Server 2007, or retain a previous
Exchange version that is compatible.
7-12 Module 7: Designing an Exchange Server 2007 Upgrade Strategy
Before you can start the upgrade process, you must prepare Active Directory for the
Exchange Server 2007 deployment. To do this, you must run Exchange Server 2007
setup using the /PrepareLegacyExchangePermissions command and the /PrepareAD
command.
Note: You must install the prerequisite software on the computer where you run
setup. The prerequisite tools are Microsoft .NET Framework 2.0, Microsoft
Management Console 3.0, Microsoft Windows PowerShell, and the .NET
Framework 2.0 hotfix described in Knowledge Base article 926776 on the Microsoft
Help and Support Web site.
Note: You can use a 32-bit operating system and the 32-bit version of
Exchange Server 2007 installation files to prepare your organization for Exchange
Server 2007.
7-14 Module 7: Designing an Exchange Server 2007 Upgrade Strategy
The Client Access server role provides similar functionality to that which a front-end
server in Exchange 2000 Server and Exchange Server 2003 provides. You must deploy
the Client Access server role in every Active Directory site that includes an Exchange
Server 2007 Mailbox server.
Note: You cannot use an Exchange Server 2003 or Exchange 2000 Server
front-end server to access mailboxes on Exchange Server 2007 Mailbox server.
Additionally, because Exchange Server 2007 does not support Microsoft Outlook®
Mobile Access, users will not able to access their mailboxes through the Client
Access server.
Each user’s Outlook Web Access experience depends on their mailbox’s location.
For example, if the user’s mailbox is located on an Exchange Server 2003 back-end
server and they access the mailbox through a Client Access server, they will see
the Exchange 2003 version of Outlook Web Access. Users will see the Exchange
Server 2007 version of Outlook Web Access only if their mailbox has been moved to
an Exchange Server 2007 Mailbox server.
Module 7: Designing an Exchange Server 2007 Upgrade Strategy 7-15
The Outlook Web Access URL used to access Outlook Web Access depends whether
the user’s mailbox is located on an Exchange 2003 back-end server or on an Exchange
Server 2007 Mailbox server. If the mailbox is located on an Exchange 2003 back-end
server, the URL is typically https://<servername or FQDN>/Exchange. If the mailbox
is located on an Exchange Server 2007 Mailbox server, the URL is typically
https://<servername or FQDN>/owa. If the users connect to the /Exchange virtual
directory and their mailbox is located on an Exchange 2007 server, their Web browser
will be redirected automatically to the /owa virtual directory.
Users will be able to access public folders through Outlook Web Access only if a replica
of the public folder remains on an Exchange 2000 or Exchange 2003 server. To access
the public folders, users must connect to the /public virtual directory.
The Exchange Server 2007 Hub Transport server role replaces the functionality that
the bridgehead servers provide in an Exchange 2000 Server or Exchange Server 2003
organization. However, because of significant changes to the transport and routing in
Exchange Server 2007, you cannot simply replace each bridgehead server with a Hub
Transport server.
The link between the parallel message routing paths is a routing group connector that you
create between the two Exchange versions. When you deploy the first Hub Transport
server in an Exchange 2000 Server or Exchange Server 2003 organization, this creates a
routing-group connector automatically that routes messages between the two Exchange
versions. When you deploy a Hub Transport server in another site, you also may
configure additional connectors to provide more efficient message routing. If you create
an additional routing group connector, also disable minor link state updates to prevent
message looping.
Because the message routing topologies are separate in Exchange Server 2007 and in
previous Exchange Server versions, you cannot remove the last Exchange 2000 or
Exchange 2003 bridgehead servers from a routing group until you remove all of its
mailboxes and public folders from the back-end servers. When you are not storing
any more data on the previous Exchange versions, you can delete the routing group
connectors for the routing group, uninstall Exchange server on the bridgehead servers,
and delete the routing groups.
7-18 Module 7: Designing an Exchange Server 2007 Upgrade Strategy
In Exchange Server 2007, you have the option of not using public folders. You only
can remove all public folder databases from the organization if you do not have any
Outlook 2003 or older clients and if interoperability with Lotus Notes is not required.
Additionally, if you configure any offline address books for public folder distribution,
you cannot remove the last public folder database. If your organization meets all of these
prerequisites, you can delete all public folder databases on the Exchange Server 2007
servers after you remove the last Exchange 2000 Server or Exchange Server 2003 servers.
After you have moved all data from the Exchange 2000 or Exchange 2003 Mailbox
servers to Exchange Server 2007 Mailbox servers, you can remove the previous
Exchange versions by uninstalling them.
For more information: For detailed steps on removing Exchange Server 2003 and
Exchange 2000 Server computers from an Exchange Server 2007 organization,
see the Release Notes for Exchange Server 2007 Web site.
7-20 Module 7: Designing an Exchange Server 2007 Upgrade Strategy
You can deploy the Edge Transport server role at any point during the transition process.
You can deploy the Edge Transport server role before deploying any other Exchange
Server 2007 servers or after you deploy other Exchange Server 2007 servers.
In a migration scenario, you first deploy the Exchange Server 2007 messaging
environment. You then move relevant data and configuration information from the
existing messaging system to Exchange Server 2007. The migration may be from
previous Exchange Server versions in a different organization or from another
messaging system.
Objectives
After completing this lesson, you will be able to:
• Design a solution for migrating message routing to Exchange Server 2007.
• Design a solution for migrating directory information to Exchange Server 2007.
• Design a solution for migrating data from another messaging system to Exchange
Server 2007.
• Design a solution for migrating away from Lotus Domino to Exchange Server 2007.
Module 7: Designing an Exchange Server 2007 Upgrade Strategy 7-23
The first step to migrate to Exchange Server 2007 typically involves moving all message
routing functionality from the current messaging system to Exchange Server 2007. This
may include Internet message routing, spam and virus filtering, secure e-mail for specific
recipients, and message routing between company locations.
3. When you are sure that message routing on the Exchange Server 2007 system is
configured correctly, configure message routing between the Exchange Server 2007
organization and the existing messaging system. To do this, you must configure
SMTP send connectors to send messages from one or more Hub Transport servers or
Edge Transport servers to the existing messaging system, and SMTP receive
connectors to accept messages from the non-Exchange Server 2007 messaging
system. On the non-Exchange Server 2007 messaging system, configure the SMTP
servers to forward all messages to the Exchange Server 2007 Hub Transport server or
Edge Transport servers. Test message flow between the messaging systems.
Note: If the two messaging systems share the same SMTP address space, you will
need to configure the accepted domains and SMTP connectors as described in
Module 6, “Designing Co-Existence and Interoperability Strategies with Other
Messaging Systems,” in this course.
4. When you are sure that messages will flow between the two messaging systems,
modify the Internet message routing configuration so that all inbound and outbound
Internet messages are sent through the Exchange Server 2007 system. To ensure that
all inbound messages flow through the Exchange Server 2007 system, configure
the MX records on the Internet Domain Name System (DNS) servers to use the
Exchange Server 2007 Edge Transport servers. To ensure that all outbound messages
are sent through the Exchange Server 2007 servers, configure the internal message
routing to send all outbound messages from the non-Exchange messaging system to
the Edge Transport server.
5. As you remove the non-Exchange Server 2007 messaging servers, remove any
affected message routing functionality from the existing messaging system.
Module 7: Designing an Exchange Server 2007 Upgrade Strategy 7-25
In a migration scenario, one of the first issues that you must address is how to migrate the
existing messaging system’s directory information to Exchange Server 2007. The two
messaging systems do not share directory information by default.
Migrating data, such as mailbox data and public folder data, in a migration scenario is
significantly more difficult than in a transition scenario because you are moving data
between Exchange organizations or between messaging systems. As a best practice, you
should consider using third-party tools to migrate this data.
Note: For detailed information on how to configure the Move-Mailbox cmdlet to use
credentials from another forest, see Exchange Server Help.
7-28 Module 7: Designing an Exchange Server 2007 Upgrade Strategy
If you need to migrate public folder data from a source Exchange organization to the
Exchange Server 2007 organization, you must use the Inter-Organization Replication tool.
However, Exchange Server 2007 does not support the Inter-Organization Replication tool,
so you must have an Exchange Server 2003 server in each forest in order to use it. If this
is not an option, you can export the data manually in the source organization’s public
folders and import it into public folders on the Exchange Server 2007 organization.
To migrate Free/Busy information between the two forests, you have two options:
• If you are using any Outlook version other than Outlook 2007, you must use the
Inter-Organization Replication tool to synchronize the system folder containing the
free/busy data between the Exchange organizations. This requires at least one
Exchange Server 2003 server in the Exchange Server 2007 organization.
• If you are running only Outlook 2007 clients, you can configure the Availability
service to request Free/Busy information across Exchange organizations. However, in
this scenario, both organizations must be running Exchange Server 2007.
Note: At product release, Exchange Server 2007 only provides the Transporter
Suite for Domino for migrating data from non-Exchange messaging systems to
Exchange Server 2007. Because of the complication of moving data in this
migration scenario, you should consider using third-party migration tools to simplify
the process.
Module 7: Designing an Exchange Server 2007 Upgrade Strategy 7-29
Note: For more information on Microsoft Transporter Suite for Lotus Domino, see
the “Resources for Interoperability and Migration from Lotus Domino” page of the
Microsoft TechNet Web site.
Microsoft Transporter Suite for Lotus Domino includes the following components:
• Directory Connector. Synchronizes users, groups, and Domino mail-in database
information between Active Directory® directory service and the Domino Directory.
• Free/Busy Connector. Allows IBM Lotus Notes and Microsoft Office Outlook users
to perform free/busy lookups against both Lotus Domino and Microsoft Exchange
Server 2007 servers when scheduling meetings.
• Directory Migration. Creates Active Directory accounts for Domino Directory users.
• Mailbox Migration. Migrates mail, calendar, and task information from Lotus
Domino mail databases to Exchange Server 2007 mailboxes.
• Application Migration. Migrates Lotus Domino application information to Microsoft
Windows SharePoint Services and SharePoint Server 2007.
7-30 Module 7: Designing an Exchange Server 2007 Upgrade Strategy
Note: Exchange Server 2007 does not install any MAPI client components by
default. You can download the Microsoft Exchange Server MAPI Client and
Collaboration Data Objects 1.2.1 from the “Microsoft Exchange Server MAPI Client
and Collaboration Data Objects 1.2.1” page of the Microsoft Download Center Web
site.
You can use Transporter Suite to configure interoperability between Lotus Domino 6.x
and 7.x and Exchange Server 2007, and to migrate users, data, and applications from
Lotus Domino 5.x, 6.x, and 7.x to Exchange Server 2007.
Note: One important difference between Transporter Suite for Lotus Domino and
the Connector for Lotus Notes that Exchange Server 2003 provided is that the
current versions uses SMTP for message routing between the messaging systems.
In previous versions, all messages were routed through the Lotus Notes client
installed on the migration server.
Transporter Suite includes a user interface that is similar to the Exchange Management
Console and that adds several additional Windows Powershell cmdlets. You can use both
tools to view information about Lotus Domino objects, to configure synchronization
between the messaging systems, and to complete the migration from Lotus Domino to
Exchange Server 2007.
Module 7: Designing an Exchange Server 2007 Upgrade Strategy 7-31
Lab Setup
For this lab, you will use the available virtual machine environment. Before you begin the
lab, you must:
• Start the 5053A-LON-CL1 virtual machine.
• Log on to the virtual machine as TreyResearch\Administrator with a password of
Pa$$w0rd.
Note: Two additional virtual machines are provided with this course. 5053A-LON-
DC1 is configured as a domain controller in the TreyResearch.net domain and has
a standard Exchange Server 2007 installation. 5053A-LON-Edge1 is a stand-alone
server and has the Exchange Server 2007 Edge Transport Server role installed on
it. The 5053A-LON-CL1 computer is a member of the Treyresearch.net domain.
7-32 Module 7: Designing an Exchange Server 2007 Upgrade Strategy
Lab Scenario
The Trey Research headquarters and two remote locations are running Exchange 2000
Server and Outlook 2000. Trey Research will be adding two new locations, and within
the next six months, plans to migrate all existing users to Exchange Server 2007 and
Outlook 2007. Much of the Exchange Server 2007 messaging system design is complete.
The A. Datum location continues to run a POP3/SMTP messaging system, which you
need to migrate to Exchange Server 2007 and integrate with the rest of the Exchange
organization. The A. Datum domain already has been deployed as a separate tree in the
Trey Research forest.
Module 7: Designing an Exchange Server 2007 Upgrade Strategy 7-33
Note: You can review the documents in the LabAnswers folder for each module.
Alternatively, you can review the lab answers that you created during the labs.
Discussion Questions
Q Is the design missing any components?
A Answers may vary. Most of the important design decisions have been considered in
the labs so far, but students may identify additional factors or components that they
feel should be considered.
Q Are there any design decisions that you would like to reconsider?
A Answers may vary. All of the labs so far have focused on individual design
components, and this exercise provides a high-level view of the decisions made thus
far. By reviewing the integration of various components, students may decide to
modify their designs.
7-34 Module 7: Designing an Exchange Server 2007 Upgrade Strategy
Note: The answers to the practices and labs are on the Student Materials CD.
Discussion Questions:
Q Based on what you know about the Trey Research organization, what would be a
reasonable time line for completing this migration?
A Answers will vary. Because this upgrade does not require any client reconfigurations
for users, except in San Diego, the organization could pursue a fairly aggressive time
line. Estimates for completing the upgrade should range from three to 12 months.
Q What are the factors that will affect the time line?
A Factors that will impact the upgrade time line include:
• Project budget
• Resource availability (both personnel and hardware)
• Test requirements
Module 7: Designing an Exchange Server 2007 Upgrade Strategy 7-35
Note: If you shut down the virtual machines without saving changes, the files that
you created during the lab will not be saved. To retain those files, you can leave
the virtual machines running, or you can shut down 5053A-LON-CL1 and commit
the changes.
Lab Shutdown
1. On the host computer, click Start, point to All Programs, point to Microsoft
Virtual Server, and then click Virtual Server Administration Website.
2. Under Navigation, click Master Status. For each virtual machine that is running,
click the Virtual Machine Name, and, in the context menu, click Turn off Virtual
Machine and Discard Undo Disks. Click OK.
3. Start the 5053A-LON-CL1 virtual machine. Additionally, you also can start the
5047A-LON-DC1 and the 5047A-LON-Edge1 virtual machines.
Module 8: Obtaining Approval for a
Messaging Infrastructure Design
Table of Contents
Overview 8-1
Lesson 1: Preparing to Obtain Approval 8-2
Lesson 2: Presenting and Finalizing a Design 8-10
Lab: Obtaining Approval for a Messaging
Infrastructure Design 8-18
Course Evaluation 8-22
Information in this document, including URL and other Internet Web site references, is subject to change
without notice. Unless otherwise noted, the example companies, organizations, products, domain names,
e-mail addresses, logos, people, places, and events depicted herein are fictitious, and no association with any
real company, organization, product, domain name, e-mail address, logo, person, place, or event is intended or
should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting
the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval
system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or
otherwise), or for any purpose, without the express written permission of Microsoft Corporation.
The names of manufacturers, products, or URLs are provided for informational purposes only and Microsoft
makes no representations and warranties, either expressed, implied, or statutory, regarding these
manufacturers or the use of the products with any Microsoft technologies. The inclusion of a manufacturer or
product does not imply endorsement of Microsoft of the manufacturer or product. Links are provided to third
party sites. Such sites are not under the control of Microsoft and Microsoft is not responsible for the contents of
any linked site or any link contained in a linked site, or any changes or updates to such sites. Microsoft is not
responsible for webcasting or any other form of transmission received from any linked site. Microsoft is
providing these links to you only as a convenience, and the inclusion of any link does not imply endorsement of
Microsoft of the site or the products contained therein.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights
covering subject matter in this document. Except as expressly provided in any written license agreement from
Microsoft, the furnishing of this document does not give you any license to these patents, trademarks,
copyrights, or other intellectual property.
Microsoft, Active Directory, ActiveSync, BizTalk, ForeFront, Internet Explorer, MSN, Outlook, PowerPoint,
SharePoint, SmartScreen, SQL Server, Visual Basic, Visual Studio, Windows, Windows Media, Windows
Mobile, Windows PowerShell, Windows Server, and Windows Vista are either registered trademarks or
trademarks of Microsoft Corporation in the United States and/or other countries.
Version 1.2
Module 8: Obtaining Approval for a Messaging Infrastructure Design 8-1
Overview
After you finish the design of the Microsoft® Exchange Server 2007 messaging system,
the final step is to gain design approval. During this final step before implementation, you
must be prepared to manage final changes to the project requirements or to project
constraints. These changes also may require that you change your design.
Objectives
After completing this module, you will be able to:
• Prepare for the design approval meeting.
• Present and finalize an Exchange Server 2007 design.
8-2 Module 8: Obtaining Approval for a Messaging Infrastructure Design
In most organizations, the design approval process for a large project, such as a new
messaging system, will take a significant amount of time and may involve several
meetings with project stakeholders. At these meetings, you will present the system design,
and provide a plan for implementing the design. Your goal in these meetings is to provide
the stakeholders with the information that they need to make the decision to proceed with
the implementation.
Objectives
After completing this lesson, you will be able to:
• Create a design document.
• Create an implementation plan.
• Identify design reviewers.
Module 8: Obtaining Approval for a Messaging Infrastructure Design 8-3
Most organizations have different expectations for the format that is used for the
design document. Some organizations prefer to use a Microsoft® Office PowerPoint®
presentation that provides a fairly high-level overview of the design components. Other
organizations require detailed documents that provide complete information for the
configuration of all messaging system components. Most design documents include the
following components:
• Executive summary
• Summary of the current environment and requirements
• Target state design
• Tradeoff decisions
Executive Summary
The primary audience for the executive summary is usually information technology (IT)
management or the project sponsor. This audience typically is not interested in the
solution’s technical details, but is interested in whether the solution meets the business
and technical requirements defined at the project’s inception. This means that the
executive summary usually focuses on how the messaging system design will address
those business and technical requirements.
8-4 Module 8: Obtaining Approval for a Messaging Infrastructure Design
In some cases, IT management or business sponsors may need to make tradeoff decisions
during the design review process. If these decisions are required, the executive summary
should include an overview of the issues and include links to the location in the design
document where the issue is discussed in detail.
Tradeoff Decisions
In almost all design meetings, you will need to make tradeoff decisions or make decisions
that may not be acceptable to all stakeholders. For example, the project may be able to
meet all requirements, but only with a budget increase or by extending the schedule. In
some cases, there also may be conflicting requirements. For example, the business
sponsor may have a requirement that all users have access to their mailboxes by using a
mobile client, while the security officer may have significant security concerns with this
requirement.
Whenever possible, you should try to resolve these tradeoff decisions before the design
review meeting. Resolving these types of issues can take significant time and the meeting
time may be consumed with very detailed discussions with only some stakeholders. If
you have resolved these issues, you should highlight the design components that required
these decisions, and describe how the design resolves the issue.
In some cases, decisions may need to be made at the design review meeting. Your design
document should describe clearly the decisions that need to be made, the options that are
available when making the decisions, and the reasons for choosing each option. In most
cases, these decisions will require some level of requirement tradeoff or a project
constraint renegotiation. By providing the stakeholders with the information they need,
you can expedite the decision-making process.
8-6 Module 8: Obtaining Approval for a Messaging Infrastructure Design
As part of the design review meeting, you also may need to provide an implementation
plan. Usually, the detailed implementation plan is created after the design is accepted.
However, you may need to present a high-level overview of the implementation plan.
This is particularly necessary if the design decisions are going to disrupt regular business
processes.
The final step in preparing for the design review is identifying the project stakeholders
who will review and approve the design. The stakeholders on an Exchange Server 2007
implementation project include the following:
• Business sponsors. The business sponsor is responsible for delivering a messaging
system that meets the requirements designed for the organization. The sponsor also
usually is responsible for the project budget. This means that the sponsor must be part
of any design review meeting that has functionality or budget implications.
• Technical stakeholders. The implementation of an Exchange Server 2007 messaging
system will impact almost all of the organization’s network and server operations.
Thus, the people who are responsible for these operations are important stakeholders
in the design process. You should include the following administrators in the design
review:
• Network administrators
• Storage system administrators
• Security administrators
• Server administrators
• Desktop deployment and management administrators
Module 8: Obtaining Approval for a Messaging Infrastructure Design 8-9
The final step in preparing the design for an Exchange Server 2007 implementation
is presenting the design for approval. During this final step, you may need to make
modifications to the design in response to feedback that you collect during the design
review meetings.
Objectives
After completing this lesson, you will be able to:
• Present a design document for review.
• Describe strategies for overcoming obstacles to obtaining approval.
• Revise a design based on stakeholder feedback.
• Identify a process for changing the design after approval.
Module 8: Obtaining Approval for a Messaging Infrastructure Design 8-11
After the design and the high-level implementation plan are complete and you have
identified the stakeholders who will review the design, you are ready to present the
design for approval. For a small project, you may be able to complete the review process
in a single meeting. For a complex project, however, with many requirements and
constraints, this process may extend out several weeks.
• Additional design review meetings often are necessary to finalize the design’s details.
These meetings often focus on one part of the design or one aspect in the deployment
plan. For example, each technology group may require a separate meeting to discuss
the technical details relevant to that group.
• Document review. Because an Exchange Server 2007 design will include many
technical details, some of the design review likely will occur via document review.
Technical specialists usually take this approach because they need to validate the
design’s technical details. After the document review is complete, the technical
specialists may need to meet with the design team to review their findings.
Tip: For information on creating effective presentations, see the book “Beyond
Bullet Points: Using Microsoft® PowerPoint® to Create Presentations That Inform,
Motivate, and Inspire” published by MS Press.
Module 8: Obtaining Approval for a Messaging Infrastructure Design 8-13
During the design review process, one or more reviewers may raise issues with the design.
There are many possible reasons why they raise these issues, and you need to be prepared
to address them.
Discussion Questions
Q What factors may prevent a design from being accepted?
A There are many possible reasons why a design is not accepted initially. These
include:
• Budget issues. In some cases, the solution that meets all the business
requirements may exceed the project’s budget or the project’s budget may be cut
after project initiation.
• Technical issues. The design’s technical review may identify errors or raise new
issues that the design does not cover.
• Security issues. The security review may identify concerns with the solution’s
security or the solution may require additional security.
• Scheduling issues. The project timeline may interfere with other projects or
business processes. For example, many organizations have a year-end freeze
period, where you may not be able to make a significant change to the
infrastructure one month before and after the fiscal year ends.
8-14 Module 8: Obtaining Approval for a Messaging Infrastructure Design
Revising a Design
The design review meetings may require a design revision. As long as your design is
accurate technically, the most significant design revisions at this point are likely to
involve tradeoff discussions.
After all of the design reviews are complete and you have addressed all requests for plan
modifications, the design is ready for approval. This marks the end of the project’s design
phase. However, typically it does not mean the end of the changes to the design
document.
Lab Setup
For this lab, you will use the available virtual machine environment. Before you begin the
lab, you must:
• Start the 5053A-LON-CL1 virtual machine.
• Log on to the virtual machine as TreyResearch\Administrator with a password of
Pa$$w0rd.
Note: Two additional virtual machines are provided with this course. 5053A-LON-
DC1 is configured as a domain controller in the TreyResearch.net domain and has
a standard installation of Exchange Server 2007. 5053A-LON-Edge1 is a stand-
alone server and has the Exchange Server 2007 Edge Transport Server role
installed on it. The 5053A-LON-CL1 computer is a member of the Treyresearch.net
domain.
Module 8: Obtaining Approval for a Messaging Infrastructure Design 8-19
Lab Scenario
You have completed the design of the Trey Research Exchange Server 2007 deployment,
and you now are ready to present your proposed solution to the project’s business and
technical stakeholders. You should be prepared to negotiate changes to the messaging
infrastructure design.
8-20 Module 8: Obtaining Approval for a Messaging Infrastructure Design
Note: The instructor will assign students to act as each of the stakeholders and will
provide information on the perspective each stakeholder will take in the meeting.
Your presentation of the Exchange Server 2007 design should include the following four
components:
• Active Directory and message routing design
• Exchange Server 2007 server design and deployment
• Messaging system security and messaging policies
• Upgrade strategies for implementing Exchange Server 2007
Note: The instructor will assign one of the components to each group of students
or to individual students.
1. Prepare your presentation of • Review the documents located in the LabAnswers folder for the
the Exchange Server modules that correspond to the design component that has been
infrastructure design. assigned to you. Prepare a three-minute presentation that will
provide a high-level description of the component design.
2. Present the Exchange Server • Present the design for each of the four design components to the
design. stakeholders at the meeting.
3. Respond to stakeholder • After the design presentation, the stakeholders will be given a
questions. chance to respond and to ask questions. Respond to the
stakeholder questions and comments related to your part of the
design.
• Participate in the negotiations to address any design changes
that need to be made based on stakeholder comments or
questions.
Module 8: Obtaining Approval for a Messaging Infrastructure Design 8-21
Discussion Questions
Q Describe examples of design review processes that were effective. Provide examples
of design review processes that were not effective.
A Answers will vary depending on the student experience.
Q What are the characteristics of an effective design review process? What are the
characteristics of an ineffective design review process?
A Answers will vary. In general, design review processes are most effective when all of
the stakeholders are engaged throughout the process. If there are design or tradeoff
decisions that need to be made, the stakeholders involved in the decision should be
aware of the issues well before the final design review. If possible, you should have
resolved these issues prior to the meeting.
Q What strategies have you used or seen for dealing with stakeholder buyoff and
approval?
A Answers will vary depending on the student experience.
Q What strategies have you used or seen for dealing with design changes?
A Answers will vary depending on the student experience.
Note: The answers to the practices and labs are on the Student Materials CD.
Lab Shutdown
1. On the host computer, click Start, point to All Programs, point to Microsoft
Virtual Server, and then click Virtual Server Administration Website.
2. Under Navigation, click Master Status. For each virtual machine that is running,
click the Virtual Machine Name, and, in the context menu, click Turn off Virtual
Machine and Discard Undo Disks. Click OK.
8-22 Module 8: Obtaining Approval for a Messaging Infrastructure Design
Course Evaluation
Your evaluation of this course will help Microsoft understand the quality of your learning
experience.
Please work with your training provider to access the course evaluation form.
Microsoft will keep your answers to this survey private and confidential, and will use
your responses to improve your future learning experience. Your open and honest
feedback is valuable and appreciated.
Appendices
Table of Contents
Active Directory and Routing Interview Notes
Trey Research Policy Requirements
Requirements Interview Notes
Messaging Security Requirements
Server Design Interview Notes
Trey Research Current Active Directory Site Design
Trey Research Current Perimeter Design
Trey Research Information
Trey Research Organization Chart
Trey Research Proposed Active Directory Site Design
Trey Research Proposed Perimeter Design
Trey Research Routing Groups
Information in this document, including URL and other Internet Web site references, is subject to change
without notice. Unless otherwise noted, the example companies, organizations, products, domain names,
e-mail addresses, logos, people, places, and events depicted herein are fictitious, and no association with any
real company, organization, product, domain name, e-mail address, logo, person, place, or event is intended or
should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting
the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval
system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or
otherwise), or for any purpose, without the express written permission of Microsoft Corporation.
The names of manufacturers, products, or URLs are provided for informational purposes only and Microsoft
makes no representations and warranties, either expressed, implied, or statutory, regarding these
manufacturers or the use of the products with any Microsoft technologies. The inclusion of a manufacturer or
product does not imply endorsement of Microsoft of the manufacturer or product. Links are provided to third
party sites. Such sites are not under the control of Microsoft and Microsoft is not responsible for the contents of
any linked site or any link contained in a linked site, or any changes or updates to such sites. Microsoft is not
responsible for webcasting or any other form of transmission received from any linked site. Microsoft is
providing these links to you only as a convenience, and the inclusion of any link does not imply endorsement of
Microsoft of the site or the products contained therein.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights
covering subject matter in this document. Except as expressly provided in any written license agreement from
Microsoft, the furnishing of this document does not give you any license to these patents, trademarks,
copyrights, or other intellectual property.
Microsoft, Active Directory, ActiveSync, BizTalk, ForeFront, Internet Explorer, MSN, Outlook, PowerPoint,
SharePoint, SmartScreen, SQL Server, Visual Basic, Visual Studio, Windows, Windows Media, Windows
Mobile, Windows PowerShell, Windows Server, and Windows Vista are either registered trademarks or
trademarks of Microsoft Corporation in the United States and/or other countries.
Version 1.2
Active Directory and Routing Interview Notes
The company just finished upgrading all of the Active Directory® directory service
domain controllers to Windows Server® 2003, Service Pack 1. The company has
indicated that there is not budget for any further Active Directory changes, so any
modifications we make as part of this project must have no budget implications.
One change that we have been considering is removing the Chennai domain controller.
The office currently does not have a secure server room. There was a project in place to
build the server room, but that project’s budget is in jeopardy. Any input you could
provide to this decision would be appreciated greatly.
We currently are having some messaging problems at the London location. Quite often,
when I look at the server queues on the Exchange Servers, I see that there are many
messages in the categorizer queue. Users also complain that when they try to view the
global address list, it can take more than 10 seconds for it to appear. All of the other
network locations seem to be fine.
We have had some past problems with the bridgehead servers in London, Toronto, and
Tokyo. The problem shows up when there is a network outage to one of the other offices.
If the outage lasts for more than a few minutes, it seems like we get hundreds of
messages in the bridgehead server queues and then it can take a long time for the server
to deliver the messages once we restore the network connection. Compounding this
problem in London is the fact that this is the only location where we are accepting
inbound SMTP e-mail for the Trey Research Company. We need to make sure that
messages get sent out of these sites even if the final destination site is not available.
As you have already heard, we have many employees using Microsoft Office Outlook®
Web Access. We would really like to make sure that the experience for the Outlook Web
Access users is as positive as possible.
We have been monitoring network traffic by protocol for the last year and have noticed a
very big increase in the network bandwidth that Simple Mail Transfer Protocol (SMTP)
traffic uses. In your design, you need to make sure that e-mail messages always are sent
the network connections with the highest bandwidth. Also, make sure that you take
advantage of any other ways in which you can save on bandwidth that e-mail uses.
We are just taking over managing the San Diego network, so we are not sure what
network changes we will need to make there. From what I understand, we may need to
wait on some firewall changes until after we get rid of the current messaging system.
Our department is responsible for the company’s firewall configurations. With every
company location having its own Internet connection, this can be a real challenge. Right
now, we are allowing HTTPS access to some Exchange Servers in London, Toronto, and
Tokyo. This configuration is working okay, but we do not want to open up any more
messaging ports in any location. Additionally, we currently are allowing incoming and
outgoing SMTP traffic through our firewalls only in London, because that is the only
location where we have a spam-filtering solution in place. We would be open to changing
this, but would need to know that the e-mail messages are being scanned for viruses and
spam in all locations where we allow SMTP traffic.
Trey Research Policy Requirements
As part of the Exchange Server 2007 design process, the analysts assigned to the project
have identified the following policy requirements.
Compliance Requirements
• The corporation reviews its sales and marketing approach every six months. All
members of the Sales and Marketing teams are involved in the reviews. During
the review process, a significant amount of e-mail is sent between team members.
Retaining this e-mail for historical data is important, but these emails should not
be retained in user mailboxes for more than nine months. When the messages are
removed from the user mailboxes, they should be easily accessible to all members
of the Sales and Marketing teams, but should not be accessible to other users in
the organization.
• All messages sent to and from the Legal team must be retained in a secure
location.
• In order to decrease the size of user mailboxes, all messages in user mailboxes
that are more than 12 months old should be deleted and placed in the deleted
items folder. All messages more than six months old in the Deleted Items folder
and Sent Items folder should be deleted. This policy should apply to all users.
• Members of the Executive group should have the option of saving messages in
their mailbox indefinitely.
Requirements Interview Notes
We also have a routing group for each of the big company locations: the routing group in
Toronto is called TorontoRG, and then we have LondonRG and TokyoRG. I can send
you the Visio with all of the Exchange Servers in each location. We have a routing group
connector between TorontoRG and LondonRG and between LondonRG and TokyoRG.
Messaging Security Requirements
Administrative Requirements
The TreyResearch.net forest is made up of five domains – see TR_Info.vsd.
The TreyResearch.net domain is a dedicated root domain that contains only the
default domain objects.
The EU.TreyResearch.net domain includes all accounts for users, groups, and
computers in the London offices. The user and group accounts for the two
offices are grouped into organizational units (OUs) based on organizational
departments.
The AS.TreyResearch.net domain includes all accounts for users, groups, and
computers in the Tokyo and Chennai offices. All accounts for users, groups, and
computers in the Tokyo office are located in the Tokyo OU, and all accounts for
users, groups, and computers in the Chennai office are located in the Chennai
OU.
The NA.TreyResearch.net domain includes all accounts for users, groups, and
computers in the Toronto office.
The domain controllers for the Adatum.com domain are both located in San
Diego, and the domain includes all accounts for users, groups, and computers in
the San Diego office.
The Trey Research Active Directory and Exchange server configuration is configured
currently as follows:
The Toronto, Tokyo, and London locations are each configured as
administrative groups for Exchange 2000 Server.
A central team of messaging administrators in London belongs to a group named
ExOrgAdmins in the EU.TreyResearch.net domain. This team can modify
settings for the entire Exchange organization. This team also provides third-level
support for all messaging issues in the entire company. This team does not
require access to Active Directory® directory service beyond the permissions
needed to administer the Exchange organization.
Three experienced Active Directory administrators belong to a group named
ADAdmins in the TreyResearch.net domain. These administrators are the only
users that can make changes to the Active Directory configuration, such as
creating new domains or making schema changes.
In each domain, a central team of administrators is able to manage all objects in
the domain. Currently, the Toronto, London, and Tokyo locations have a group
of Exchange administrators that are responsible for managing the Exchange
Servers in their location. These groups are called ExTORAdmins,
ExLON1Admins, and ExTOKAdmins, respectively. These administrators have
full control over the Exchange servers in their offices. They are able to view the
properties for Exchange servers in other locations, but cannot modify any
settings on Exchange servers in other office locations. This group of
administrators should also have full control over all Active Directory objects for
the local domains. This model of delegating Exchange permissions should be
duplicated as Exchange Server 2007 is implemented in these locations and in the
second site in London, and then in San Diego and Chennai.
In each of London, Toronto, and Tokyo, one group of administrators is
responsible for managing user and group accounts. These administrators can
manage, create, and delete user accounts, and can manage user mailboxes and
mail-enabled groups. These administrators should only be able to manage user
accounts in these offices. The administrators belong to the ReLONAdmins,
ReTORAdmins, and the ReTOKAdmins groups, respectively.
As we deploy Exchange Servers are deployed in San Diego and Chennai, a
group of administrators in each office should be able to create and delete user
accounts, and manage user mailboxes and mail-enabled groups only for users in
those offices.
For the mailbox servers in the other offices, we are going to need to provide redundancy
for the mailbox databases. These servers all use Directly Attached Storage (DAS). Like I
said before, I am worried about the budget, so do whatever you can to provide high
availability without deploying too many additional servers.
Most of our organization’s users are using Microsoft® Office Outlook® 2002 or Outlook
2003. We have started a project to deploy Windows Vista™ with Office 2007, but it will
take at least 18 months to complete. Additionally, we will be deploying new client
computers in our future London and Chennai offices.
From LondonSite2
Tokyo
To
Toronto
TorontoSite
LondonSite
TokyoSite
SanDiegoSite
ChennaiSite
To LondonSite2
Tokyo
To
Toronto
TorontoSite
LondonSite
TokyoSite
SanDiegoSite
ChennaiSite
Firewall rules:
- Allow inbound and outbound SMTP
traffic and inbound POP3 traffic
Firewall rules:
- Allow outbound Web traffic only
Trey Research Information
TreyResearch.net
Adatum.com
Domains
LON-MSG-BE2 LON-MSG-BE3 LON-MSG-BE4 LON-MSG-BE5
Mailbox server Mailbox server Mailbox server LON-MSG-BE6
Mailbox server Mailbox server
1 Storage Group 1 Storage Group 1 Storage Group 1 Storage Group
5 Mailbox stores 5 Mailbox stores 5 Mailbox stores 1 Storage Group
5 Mailbox stores 5 Mailbox stores
Avg 25 GB per Avg 25 GB per Avg 25 GB per Avg 25 GB per
store store store Avg 25 GB per
store store
LON-MSG-BE1
Mailbox server LON-MSG-PF1
1 Storage Group Public folder server
5 Mailbox stores 1 Storage Group
Avg 25 GB per 1 Public folder store
store 110 GB
LON-MSG-BH1
LON-MSG-FE1 Bridgehead
Front-end server server
Front-end server Bridgehead server
LON-MSG-BH1
Bridgehead Server
TOR-MSG-BH1 TOK-MSG-BH1
LON -
LondonRG
10
T
or R
Cost
Cost GC
10
ok RG
Lon-T
C
TorontoRG TokyoRG
Index
designing, 4-3
A for Edge Transport server, configuring, 2-33
Active Directory for public folders, 3-50
forest and domain topology, 1-34 administrative roles, 4-4
global data, 4-3 documenting, 1-37
infrastructure, 1-33 to 1-34 anonymous permissions for public folders, 3-51
infrastructure, impact on deployment, 1-19 anti-spam solutions
inventorying, 7-9 designing, 4-27 to 4-29
messaging systems and, 1-33 determining appropriate level for, 4-27
migrating to, 1-35 false positives, 4-30
recipient data, 4-3 filtering level, increasing, 4-29
server data, 4-3 monitoring, 4-30 to 4-31
Active Directory design owners requirements for, 4-25 to 4-26
defined, 2-3 running before antivirus solutions, 4-27
multiple teams of, 2-4 stamping messages, 4-31
responsibilities of, 2-3 updating, 4-28
working with, 2-4 user feedback on, 4-30
Active Directory domains antivirus solutions
configurations for, 2-8 automating, 4-37
dedicated for Exchange servers, 2-9 cleaning vs. deleting messages, 4-33
defined, 2-8 designing, 4-32 to 4-33
Windows 2000 native mode as minimum level for, Forefront Security for Exchange Server, 4-34
2-9 monitoring, 4-38
Active Directory forests policies and processes, developing, 4-37
boundary of, 2-5 requirements for, 4-25 to 4-26
deploying Exchange Server without, 2-5 stripping e-mail attachments of executables, 4-33
design owners for, 2-4 transport agents, 4-33
domain configuration within, 2-8 user education and, 4-38
Free/Busy information, migrating, 7-28 with Exchange Hosted Services. See Exchange
multiple, 2-6 to 2-7 Hosted Services
multiple trees in, 2-10 archiving e-mail messages. See message archiving
resource, 2-5 to 2-7 attachments, e-mail. See e-mail attachments
single, 1-8, 2-6 Attorney/Client Privilege message classification, 4-14
Active Directory sites authentication, 2-19
as hub sites. See hub sites for Outlook Web Access (OWA), 5-15
Client Access servers and, 2-11 with Domain Security. See Domain Security
configuration, designing, 2-13 Availability service
dedicated for Exchange servers, 2-13 function of, 6-11 to 6-12
design, modifying, 2-13 in coexistence scenarios, 6-12
Exchange Server deployment in, 2-14 to 2-15
Hub Transport servers and, 2-12 B
Mailbox servers and, 2-11, 2-14 back pressure
Unified Messaging servers and, 2-12, 2-15 application of, 3-26
ActiveSync. See Exchange ActiveSync configuring, 3-26
administrative models, 1-44 defined, 3-25
implementing, 4-7 to 4-8 resources monitored by, 3-25
administrative permissions bandwidth, 1-30
delegation, in coexistence scenario, 6-17
I-2 Index
Best Practices Analyzer Tool. See ExBPA (Microsoft Outlook Web Access with, 2-17
Exchange Server Best Practices Analyzer Tool) Outlook Web Access with multiple, 2-18
bridgehead servers, 7-16 ports, locking down, 3-31
business requirements processors, recommended number of, 3-29
and service level agreements (SLAs), 1-8 redirecting users to, 2-18
communication and, 1-14 securing, 3-31 to 3-32
defined, 1-3 when to deploy, 7-15
examples of, 1-3 client environment, profiling, 1-39 to 1-40
exceptions to, by group, 1-14 client permissions for public folders, 3-51
external, 1-3 coexistence of messaging systems
for mailbox size limits, 5-8 administrative permissions, 6-17
for mailbox sizes, 3-5 calendar sharing, 6-12
for public folders, 3-41 to 3-42 implementing, 6-20 to 6-21
identifying, 1-13 to 1-14 message routing configuration, 6-8 to 6-10
importance of, 1-4 offline address books, 6-13 to 6-14
in design phase, possible changes to, 1-14 public folders, 6-15 to 6-16
summarizing, 1-50 scenario for, 6-3
business sponsors, 1-16. See also stakeholders compliance policies, 5-27
constraints. See project constraints
C content conversion, disk I/O impact of, 3-30
content indexing, effect on mailbox database size
Cached Exchange Mode, 3-6
limitations, 3-11
calendars
contract specifying function. See functional
in coexistence scenarios, 6-12 specification
in interoperability scenarios, 6-29 to 6-30 corporate policies, 5-27
CAs (certificate authorities), implementing, 4-22 cross-forests (Active Directory), 2-6 to 2-7
CCR for public folders, 3-44
cell phones. See mobile devices
certificate authorities (CAs). See CAs (certificate
D
authorities) defense-in-depth model for virus protection, 4-32 to
change control processes, 1-46 to 1-47 4-33
classifying e-mail messages, 4-13 to 4-14 delegated permissions, 4-6
Client Access servers implementing, 4-8
Active Directory sites and, 2-11 deploying
client connection proxies, 2-16 Client Access servers, 3-31, 7-14 to 7-15
combining with other server roles on single domain controllers, 2-20
computer, 3-35 to 3-36 domains, 2-8
defined, 7-14 Edge Transport servers, 2-32 to 2-34, 7-20
deploying, 7-14 to 7-15 Exchange Server, centralizing, 2-13
deployment design, 3-31 Exchange Server, in Active Directory sites, 2-14 to
design recommendations, 3-29 to 3-30 2-15
designing, information needed for, 3-28 Hub Transport servers, when upgrading Exchange
disk I/O impact of, 3-30 Server, 7-16 to 7-17
functions performed by, 3-29 Mailbox servers, 7-18 to 7-19
high availability for, 3-32 design change control process, 8-17
IMAP4/POP3 services on, 3-31 design documents
impact on user satisfaction, 3-28 business requirements, 8-4
Internet client access to, 2-16 components of, 8-3
legacy interaction, 7-14 to 7-15 executive summary, 8-3 to 8-4
memory configuration, 3-29 presenting for review, 8-11 to 8-12
mobile device policies, 5-20 reviewers, identifying, 8-8 to 8-9
on internal vs. perimeter network, 3-31 revising, 8-15 to 8-16
target state design, 8-4
Index I-3
design owners for Active Directory. See Active multiple, for availability, 2-36
Directory design owners processors, recommended number of, 3-23
design tradeoffs, 8-5 securing, 2-33 to 2-34
devices, mobile. See mobile devices subscriptions. See edge subscriptions
direct attached storage (DAS), 1-42 when to deploy, 7-20
directory information, migrating to Exchange Server EdgeTransport.exe.config file, 3-26
2007, 7-25 to 7-26 e-mail attachments
disk paging. See paging Outlook Web Access policies for, 5-15
distribution groups stripping of executables, 4-33
expansion servers for, 2-6, 2-28 e-mail clients. See also MAPI clients; also POP3 clients
message size limits on, 5-11 e-mail folders, managed. See managed e-mail folders
DNS (Domain Name System), 1-31 e-mail messages
infrastructure, 1-31 analyzing contents, for security purposes, 4-10
DNS Mail Exchange (MX) records, 1-31 anti-spam stamps, 4-31
domain controllers antivirus stamps, 4-33
configuration of, 1-34 classifications, setting, 4-13 to 4-14
Exchange Server location of, 2-19 encrypting, 4-36
planning deployment of, 2-20 filtering services, 4-36
upgrading to 64-bit hardware, 2-20 recipients, analyzing, 4-11
Domain Name System (DNS). See DNS (Domain Name restricting flow of. See message flow restrictions
System)
securing, with RMS, 4-22 to 4-23
Domain Security
securing, with S/MIME, 4-21 to 4-22
configuring, 4-19 to 4-20
size limits, 5-10 to 5-12
function of, 4-18
storage requirements, effect on mailbox size limits,
performance counters, 4-20 5-8
domains e-mail protocols, 1-40
Active Directory. See Active Directory domains encrypting
defined, 2-8 Client Access server traffic, 3-32
forest root. See forest root domain e-mail messages, 4-36
ESP (Exchange Server Stress and Performance) tool,
E 3-14
ExBPA (Microsoft Exchange Server Best Practices
edge subscriptions
Analyzer Tool), 1-36, 7-8 to 7-9
configuring, 2-34 to 2-35
Exchange 2000 Server, features not supported in
defined, 2-35 Exchange Server 2007, 7-11
designing, 2-36 Exchange ActiveSync
for Hub Transport servers, 2-36 disabling for individual mailboxes, 5-20
for multiple Active Directory sites, 2-36 mobile device management with, 5-19
SMTP send connectors and, 2-41 policy configuration, 5-22
Edge Transport rules, 4-13 policy options, 5-21
Edge Transport servers remote file access through, 5-22
administrative permission configuration, 2-33 usability issues with high-security policies, 5-22
as relay for Internet messages, 7-21 whether to enable, 5-14
as SMTP gateway servers, 4-28 Exchange Hosted Archive, 4-35
attack surface, reducing, 2-33 Exchange Hosted Continuity, 4-35
certificate requests, generating, 4-19 Exchange Hosted Encryption, 4-36
deploying, 2-32 to 2-34, 7-20 Exchange Hosted Filtering, 4-36
firewall rules for, 2-33 Exchange Hosted Services
function provided by, 2-32 defined, 4-35
hard disk configuration, 3-24 integrating with Exchange Server, 4-36
memory requirements, 3-23 services provided by, 4-35 to 4-36
message size limits on, 5-11 Exchange Organization Administrator role, 4-4
I-4 Index