This action might not be possible to undo. Are you sure you want to continue?
1. What is Exchange Server? Exchange Server is a Microsoft’s Messaging system which provides Industry leading Email, calendaring and unified Messaging 2. Tell me a bit about the capabilities of Exchange Server. 1. 2. 3. 4. Outlook Anywhere (OWA) Mailbox can sync with Blackberry Device. Calendar Sharing. MAPI & POP3 Client support
3. What are the different Exchange 2003 versions?
• • • • •
Exchange server 5.5 Exchange Server 2000 Exchange Server 2003 Exchange Server 2007 Exchange Server 2010
4. What are the differences between Exchange Sever 2003 Standard and Enterprise Editions? Following are the difference between Exchange server 2003 Standard and Enterprise Edition. Feature Storage groups support Number of databases per storage group Individual database size Standard Edition 1 storage group 2 databases Enterprise Edition 4 storage groups 5 databases
16 gigabytes (GB)
Maximum 16 terabytes, limited only by hardware Supported Included
Exchange Clustering X.400 connector
Not supported Not included
5. What are the main differences between Exchange 5.5 and Exchange 2000/2003?
Exchange 2000 does not have its own directory or directory service; it uses Active Directory instead.
• • • • •
Exchange 2000 uses native components of Windows 2000 (namely, IIS and its SMTP, NNTP, W3SVC and other components, Kerberos and others) for many core functions. SMTP is now a full peer to RPC, and is it the default transport protocol between Exchange 2000 servers. Exchange 2000 supports Active/Active clustering and was recently certified for Windows 2000 Datacenter. Exchange 2000 scales much higher. It boasts conferencing services and instant messaging.
6. What are the minimum hardware requirements for Exchange Server 2003?
• • • • •
Processor – Pentium 133 MHz Operating System – Windows 2000 SP3 Memory – 256 MB Disk Space – 200 MB for system files and 500 MB where Exchange Server installation. File System – NTFS
7. What are the steps involved in Exchange Server installation? 1. 2. 3. 4. Prerequisites Installation – ASP .Net, IIS, SMTP, NNTP and WWW services Installation Forest Preparation Domain Preparation Exchange Server 2003 Installation
8. Why not install Exchange on the same machine as a DC? The main reason behind not to install Exchange Server is, when we used to restart the Exchange server for any reason it will take lot of time to shut down the Exchange Server services. 9. Which Services must be installed and running for Exchange Server installation? Following are the services that should be installed before installing Exchange Server 2003 1. 2. 3. 4. 5. ASP .Net Internet Information Service SMTP NNTP WWW
10. What can you do and what will be the effect if ASP.NET service is not available while installing Exchange Server 2003?
ASP .Net files are important for authentication, delegation and securing the web publication. Before installing exchange Server 2003 ASP .Net should be installed 11. What are Exchange Server 2003 deployment tools? The Exchange Server 2003 Deployment Tools are a compilation of old and new Microsoft Product Support Services (PSS) support tools that you can use to prepare Microsoft Exchange Server 5.5 and the Microsoft Active Directory, directory service infrastructure for the installation of Microsoft Exchange Server 2003.
• • • • • •
Installation and Upgrade Prerequisites Enabling Windows Services DCDiag Tool NetDiag Tool ForestPrep DomainPrep
12. What are the Windows versions supported by Exchange Server 2003? 1. Windows 2000 Service pack 3 ( Standard, Enterprise and Datacenter Edition)
2. Windows 2003 Service pack 1/2 ( Standard, Enterprise and Datacenter Edition)
13. In which domains domainprep must be run? 1. 2. 3. The Forest root Domain All domain that will contain Exchange Server 2003 All Domain that will contain Exchange Mailbox enable objects.
14. What is ForestPrep? Forest prep updates the schema and configuration partition in Active directory. Extend the schema to include Exchange server 2003 specific classes and attributes To run the Forest Prep, Administrator should have Schema and Enterprise Admin permission over the Domain 15. What is DomainPrep? Domain Prep prepares the Domain partion in Active Directory. Forest prep should be run only once in forest where Domain Prep should be run in following Servers. 1. The Forest root Domain
All domain that will contain Exchange Server 2003 All Domain that will contain Exchange Mailbox enable objects
16. Which two groups are created by DomainPrep? The domain prep switch creates the groups and permissions required by exchange Server 2003. Two security groups created 1. 2. Exchange Enterprise Servers – Domain Local group contains all Exchange Server in a forest Exchange Domain Server – Global Group that contains all Exchange servers running in the Domain that you have selected. 17. What DomainPrep does? Domain Prep Updates the Domain partition and Creates a Two New Security Groups for Exchange Server 2003 1. 2. Exchange Enterprise Servers Exchange Domain Servers
18. Which of the servers does the system that will host the first Exchange Server 2003 server in a forest need to be able to contact during installation?
The Exchange domain servers group is a domain global security group and the Exchange enterprise servers group is a domain local security group.
19. How to run ForestPrep? Go to the Command prompt and Type the following D:\setup\i386\setup.exe /forestprep Where D drive represents the CD drive. Note: it will ask for the Administrator Account that has the required permission to run the Setup. 20. How to run DomainPrep? Go to the Command prompt and Type the following D:\setup\i386\setup.exe /domainprep – Where D drive represents the CD drive. 21. Which service pack is needed for Windows 2000 for installing Exchange Server 2003?
edb in the MDBDATA folder.Windows 2000 service pack 3 in needed to install Exchange Server 2003 22. For example look in C:\ or D:\.log and Exchange Server Setup Progress. Which permissions are required to install Exchange server 2003 on the first server in a domain or on other systems within the domain? The administrator Account should have the following permission to install the Exchange Server 2003 • • • • Schema Administrator Enterprise Administrator Domain Administrator Local Machine Administrator 25. or problems overwriting priv1. What is location of Exchange Server Setup Progress? C:\Program Files\Exchangesvr 27. 26.These files give valuable reasons why setup failed.log. These files are created in the root of the drive where the Exchange 2003 binaries are installed. What is name of log file that Exchange Server 2003 setup creates during installation? Setup. choosing whether to create a new . Which permissions are required to run ForestPrep? Schema Administrator Enterprise Administrator Local Machine Administrator 23. Exchange even has two setup logs to help you troubleshoot install programs. Could not extend the schema. The process of creating the file is essentially the same as the process for a manual setup selecting the component you want to install and the installation path. Which permissions are required to run DomainPrep? Domain Administrator and Local Machine Administrator 24. How unattended installation of Exchange Server 2003 works? Unattended installations are useful for rapidly deploying subsequent Exchange Server 2003 installation into an existing organization.
Which account must be use to perform first Exchange installation? A new dedicated service account specifically for Exchange server installation has to be created in Active Directory and the following permission are to be assigned the newly created user.exe /createunattend c:\unattend. we can able to specify the administrative permission for particular user..ini file that is used to create an organization cannot be used for subsequent installation.ini file. It’s also useful when you are deploying number of New Exchange Server in Existing Organization. When you can use the unattended installation of Exchange Server 2003? 1. We can save time deploying multiple servers by automating the Entire installation procedure 29. When you cannot use unattended installation of Exchange Server 2003? An Active Directory Forest can support only a single Exchange Server 2003 organization.ini Where D represents the CD ROM drive that holds the Exchange Server and C drive represent the created unattended file for installation 32. When you can specify the User account that will receive the Exchange Full Administrator permission? After installing the exchange Server 2003. What is the command to start the unattended installation of Exchange Server 2003? D:\setup\i386\setup.organization or to join existing one. 2. . 28.exe /UnattendFile c:\unattend. Instead of doing manual installation the Exchange installation wizard writes the configuration file to . We can delegate administrative permission by right click the Exchange organization and select delegate Administration permission. Unattended Installation of Exchange Server 2003 is very useful when you are going to install Exchange Server remotely. so an un attended. 33. agreeing the license and so on. 30.ini Where D represents the CD ROM drive that holds the Exchange Server and C drive represent the created unattended file for installation 31. specifically for use with the /unattendfile setup switch to start the installation. What is the command to create an answer file for unattended installation of Exchange Server 2003? D:\setup\i386\setup.
How to move users from Coexistence of Exchange 5. which services are not supported and hence. 37. you will need to upgrade your Exchange environment to Exchange Server 2003 prior to upgrading the Windows Server Operating System to Windows server 2003.• • • • Schema Administrator Enterprise Administrator Domain Administrator Local Machine Administrator 34. How to migrate from an old Exchange 2000 Server organization to a new Exchange Server 2003 organization? Exchange Migration wizard is the process to Migrate Exchange 2000 organization to Exchange server 2003 organization. Similar to migrating Organization from Exchange 5. 35.5 38. Can Exchange 2000 servers run on Windows Server 2003? No.5 to Exchange Server 2003 .5 to Exchange Server 2003? Active Directory Migration Tool and the Exchange Migration wizard will perform the complete moving of users from Coexistence of Exchange 5. the only version of Exchange server that will run on Windows server 2003 is Exchange Server 2003. While upgrading from Exchange 2000 to Exchange 2003 which servers must be upgraded first? Front-end server or back end server? You must upgrade the front end servers prior to upgrading the corresponding back end server while upgrading from Exchange 2000 to Exchange 2003. need to be removed from an Exchange 2000 Server before performing an upgrade to Exchange Server 2003? Following are the Exchange Server 2000 functionality that isn’t supported by Exchange Server 2003 • • • • Instance for Messaging Service Microsoft Chat Service Key management Service And connectors for Microsoft Mail and Lotus CC:Mail Above Service has to uninstalled while upgrading from Exchange Server 2000 to Exchange Server 2003 36.
39. How to migrate from an old Exchange Server 5.5 organization to a new Exchange Server 2003 organization? There is no in place upgrade, first we have to update Exchange 5.5 to Exchange 2000 and from there we have to migrate it to Server Exchange 2003. The existing users Source Domain has to be first migrated to the new target domain in another Active Directory forest. After that you can begin the Exchange 5.5 to Exchange server 2003. Exchange Migration wizard is the process to Migrate Exchange 5.5 organization to Exchange server 2003 organization. 40. Which messaging systems does the Exchange Server 2003 Migration Wizard support?
• • • • • • • •
Ms Mail for PC Networks CC:Mail Microsoft Exchange 5.5 Lotus Notes Novel GroupWise 4.x Novel GroupWise 5.x Internet Directory (LDAP via ADSI) Internet Mail (IMAP4)
41. How can Exchange Server 2003 share calendar/address list with Novell GroupWise? The connectors for Lotus notes and Novel GroupWise only synchronize mailbox and user account data. You must use calendar connector in conjunction with the other connectors to synchronize calendar data. 42. What are the requirements for Novell Group Wise connector? The following list is the configuration requirements needed on the Exchange Server side:
• • • •
Configure a working Novell GroupWise environment with API Gateway version Configure a working Exchange Server 2003 connector server Make sure Exchange Server can resolve the name and access the Novell Enable Exchange Server to Novell Netware server connectivity by using
4.1 or later
Netware server that is running API Gateway Gateway Services for NetWare (GSNW) or Novell NetWare Client for Windows. NDS authentication is needed to access NetWare Volumes (shares).
Activate GroupWise address type on the Exchange Server 2003 recipient
43. What are the tools to validate Exchange Server 5.5/Exchange Server 2003 coexistence?
• • • •
ADCConfigCheck – It checks that Exchange Server 5.5 directory config ConfigDSInteg – checks objects in AD to ensure that no problems have ReceipientDSInteg – checks all recipient objects in AD looking for problems. PrivFoldCheck – uses exchange 5.5 directory service/Information store
objects have been copied to Active Directory. Writes outputs to Exdeploy.log arisen since the last installation of ADC. Writes outputs to Exdeploy.log Recipient includes users, groups, contacts or public folders consistent adjuster to ascertain the Information store and directory are in sync 44. What is DSScopeScan Tool Group? DSScopeScan Tool Group used to find out information about the exchange server 5.5 organizations prior to setting up connection between exchange server 5.5 and new Exchange server 2003. Tool should be run with the account that has administrative permission. 45. Which tools are included in DSScopeScan Tool Group? This includes four important tools
• • • •
DSconfigsum – reports the number of exchange server 5.5 sites and server DSObjectsum – reports the number of public folders. Distribution list and Useraccount – exports the number of users in the exchange server 5.5 site Vercheck – check if a server exists with exchange server 5.5 sp3.
per sites. contact object and in the directory
46. Before upgrading from Exchange 2000 server to Exchange Server 2003 which service pack must be applied to Exchange 2000 server? Before upgrading from Exchange server 2000 to Exchange Server 2003 update the windows 2000 server with SP3 or later. And also with Exchange 2003 server sp3 or later 47. How to upgrade from Exchange 5.5 to Exchange server 2003? Exchange 5.5 cannot be upgraded in-place, you must first upgrade to Exchange 2000 server and then to Exchange Server 2003. Or install Exchange Server 2003 on a different server and move the Exchange server 5.5 resources to the new server. 48. What are the steps involved creating coexistence between Exchange Server 5.5 and Exchange Server 2003? Install the Basic prerequisites like SMTP, NNTP and WWW services
• • • • • •
Start the Exchange Deployment tools wizard, select co existence with mixed Select the option to install upgrade the first Exchange Server On the next deployment tools wizard, check all the steps are done and start Install Exchange server 5.5 administrator Select the option to create a new organization or existing one. Finish the setup
mode Exchange 2000 and exchange server 5.5
the setup. On the setup installation perform the following option
49. Which services must be configured to automatically start to start a Lotus Notes Connector? To start a connector, u must enable the specific services that the connector relies on.
Microsoft Exchange connectivity controller Microsoft Exchange connector for lotus notes
50. Which services must be configured to automatically start to start a Novell GroupWise Connector? First a server running Exchange 2003 as a Bridge head server And the following services are to be set to automatically start
Microsoft Exchange connectivity controller Microsoft Exchange connector for lotus notes
51. Which steps are involved in removing a connector to install it on another Exchange Server 2003 computer? First you need to stop the connector services
• • •
Remove the connector Use the Active directory user and computers console to delete the contacts You can reinstall lotus or Novel GroupWise connector
that the connector has imported in the directory
52. What is Active Directory Connector (ADC)? ADC it’s a Microsoft Exchange Server 2003 Service that allows for the replication of information from Active directory and a Microsoft Exchange 5.5 directory
53. What is Connection Agreement? It is used by Active directory connector to control replication between Active directory and Exchange 5.5 directory. Connection agreements can be used to replicate from exchange 5.5 to Active directory and vice versa. 54. What types of permissions are configurable for Exchange?
• • •
Exchange full admin – full control over the exchange organization including Exchange Admin – Manage everything within the organization except org Exchange view only administrator – read only administrative access to
permission permission. Exchange organization 55. Which of the privileges does the Exchange Administrator role have? This Role has the ability to administer all configuration details of the Exchange organization and ability to modify permission 56. What are the modes of Exchange Server 2003? There are two modes in Exchange server 2003 1. Mixed Mode – If Exchange 5.5 exists and in future gain to have Exchange 5.5 2. Native Mode – if only Exchange server 2003 running in your organization 57. What are the benefits of running Exchange Server 2003 in native, rather than mixed mode? There are lot of benefits which includes, 1. 2. 3. 4. Greater flexibility for defining routing groups and Administrative groups Ability to move mailboxes Configure both routing and administrative groups independent of each other We can create query base distribution group
58. When Exchange Server 2003 Mixed mode is used?
What is Clustering? It’s a technique for providing hardware and software redundancy for an application like exchange server 2003. Mixed modes are used to have backward compatibility with Exchange server 5. 63. How to switch Exchange Organization from mixed mode to native mode? We can accomplish this by Exchange system Manager. the cluster is seen as a single resource and is address by a single IP 64. Can you switch Exchange Organization from native mode to mixed mode? yes we can change Exchange organization from Mixed mode to Native mode and changing the mode form Mixed to Native is onetime. What is Network Load balancing? It is a resource (server-aware) clustering technology.5 situated in our Exchange organization. What are the advantages and disadvantages of Network Load Balancing? Advantages • • • No special hardware required Cluster can use different operating system Clusters are to be member of domain or perimeter . 62. On the New window click the change Mode option.5 present in our Exchange organization and make sure that all the exchange servers are Exchange server 2000 and Exchange server 2003. by right clicking the Exchange organization name at the top of the window and click properties. This changed mode option will be unavailable if you are already in Native mode. Native mode allows administrative groups and Routing Groups to be configured independent of each other 60. To client computers. one way process and it cannot be reversed 61. Primary purpose to load balance by distributing the TCP/IP traffic among each server node in cluster. When Exchange Server 2003 Native mode is used? We can choose this option if No Exchange server 5. with clustering you can ensure there is no single point of failure with your server hardware that would results in email services going offline. we can have mixed mode in situation where Exchange server 5.5 and sites 59.By default exchange server in Mixed mode. Clustering allows you to bring one node for maintenance by allowing other nodes to continue functioning.
What is Failover? Work only with TCP/IP.Disadvantages • NLB uses hear beat to communicate between cluster. How Failback occurs? By default. this failback automatically process the service request to secondary servers which is already clustered. What is Failback? Fail back defines how failed over application services are moved back to original server node. once the node is back online 68. Cluster service – application or service aware clustering technology. cluster groups that failover to another node do not automatically failback. load balance by distributing the TCP/IP traffic among each server node in cluster. we have to create a failback policy to occur immediately or over a certain period 69. To client computers. It sent 5 heart beats and if no response and if a client is requesting a request then it neglect the request • 65. When Failover occurs? Failover occurs when a primary server fails to function. 67. Network Load balancing – server aware clustering technology. Name the exchange server 2003 clustering configuring option . In Failback policy we can configure the allow failback option to take place immediately or over a certain period To make a failback occur. It will not consider network link protocol It’s related to cluster servers. it refers to the ability to of a backup server to immediate begin servicing requests if a primary server fails. What are the different clustering options in Exchange 2003? Exchange server 2003 supports two types of clustering option which is already supported by windows server 2003 1. provides continual application service availability through failover and failback 70. if a server goes offline. without an interruption in servicing user request 66. the cluster is seen as a single resource and is address by a single IP 2.
known as quorum device. 2. For this clusters without an external storage device. Disk Components 1. 1 megabyte (MB) or 2 MB L2 cache processors . Which service pack is required for installing Exchange Server 2003 Clustering on Windows 2000 Server? Windows 2000 server SP4 is needed 20. please help to Me publish 21. the local disk in configured as the clustered storage device Single Quorum device server cluster – have two or more nodes and are configured so that every node is shared to one or more shared devices. How many nodes are supported with Exchange Server 2003 clusters? Exchange Server 2003 supports Two Node active/active clusters and up to eight-node active/passive clusters with at least one passive node 22. For Example: For a 4 Node cluster Server hardware Each server node the cluster has two static IP address ( public or private) with The cluster itself has a primary static IP and NETBIOS Name Each exchange virtual servers have a static IP and NETBIOS Name one net bios name • Four 1 gigahertz (GHz). Cluster configuration data is stored on multiple disks across the cluster 19. Majority node set server cluster – have two or more node and are may or may not be attached to one or more cluster storage devices. Why SP4 is needed for Windows 2000 server for Exchange Clustering? If you Know the answer.Single node server cluster – can be configured with or without external cluster storage device. Quorum Disk resource – maintains configuration data. What are the hardware requirements for a cluster server configuration? Network components 1. 3. Cluster configuration is stored in single cluster storage device.
What is the version of Windows Server 2003 required for Exchange Server 2003 Clustering? The cluster service requires windows server 2003 enterprise edition or windows server 2003 Datacenter edition.000 RPM or 256 MB or more read/write cache memory • Storage groups and databases • • Three storage groups per Exchange Virtual Server Five databases per storage group 23. Up to eight node clusters are supported 25. Server nodes that do not respond to heart beat packets for a configurable period of time are marked a inactive 26. What is purpose of Exchange Server Clustering? The purpose of Exchange Server Clustering is to prevent the Exchange server from going offline. What is Heartbeat? Heart beat is a special type of network packet that is sent out to each server node participating in a cluster to determine the responsiveness of a node.• • • • 4 gigabytes (GB) of Error Correction Code (ECC) RAM Two 100 megabits per second (Mbps) or 1000 Mbps network interface cards RAID-1 array with two internal disks for the Windows Server 2003 and Two redundant 64-bit fiber Host Bus Adapters (HBAs) to connect to the Exchange Server 2003 program files Storage Area Network Local area network hardware • Two 100 Mbps or 1000 Mbps network switches (full duplex) Storage Area Network hardware • • greater Redundant fiber switches 106 disk spindles (Ultra Wide SCSI) with spindle speeds of 10. What are the different numbers of nodes with different type of operating system for Exchange Server 2003? Windows server 2003 standard edition supports 4 nodes . 24.
Active/Active – limited to two nodes and both the nodes are active at the same Active/Passive – supports more than two nodes and highly reliable. In Failback policy we can configure the allow failback option to take place immediately or over a certain period . Which settings must be configured for failback policies? By default. cluster groups that failover to another node do not automatically failback.Windows server 2003 enterprise edition or windows server 2003 Datacenter edition supports up to eight node clusters 27. Which are the Cluster operations modes? N-Node failover server pairs – applications are configured to failover only between two specified server pairs N+I Hot-Standby Server – commonly referred to as active/passive mode. which is defined in hours 31. Which settings must be configured for failover policies? We can configure the number the times the node to failover (Threshold) during the period. where N – Active node. What is teaming? Teaming is the process included in clustering service. limited to 1900 concurrent client connection at a time Recommended by Microsoft. The Administrative burden of having a define failover is removed 29. 28. What are the different cluster models? Two types of cluster models are there 1. failover the cluster to another active node. I – Passive Node Fail over Ring – Active/Active – all servers are active and process the client request. one node process the client request and the second node monitors the first node. with a single MAC address and single IP address 30. Administrator has to define the failover Random Failover – similar to failover ring. on two node cluster. where multiple adapters are joined through software to function as a single unit. when one node fails the cluster. 2. time. if a node fails the failover is randomly changed to active node.
Following are the default address lists • All contacts . the default address list are created by sending LDAP queries to Active directory users and groups and filters the users that are mailbox enabled and mail enabled. more manageable grouping. What are Address lists? A list used to organize the Global Address list into small. 4. Recipient Update Service and groups. Address list in Microsoft Exchange server 2003 are formed through administrator-defined Light weight Directory Access Protocol queries 2. 6. The GAL retrieved from the Global catalog servers. The default address lists are automatically created when Exchange Server is installed and there is no administration required. What are the Default Address lists? There are five Default Address lists. What is Custom Address list? Custom address list are the address list that we are creating by providing LDAP queries that filter and display the Address list with respect to users or departments 5. What is Global Address List (GAL)? Global Address List is the Primary Address list that contains all Exchange objects in the entire organization and mail-enabled objects in the Microsoft Exchange server organization 3. 1.Exchange Server 2003 Interview Questions and Answers – 4 This part of Microsoft Exchange Server 2003 technical interview questions contains interview questions on Exchange 2003 address lists. Where from the GAL retrieved? Global address list are formed through LDAP queries that filters the Mailbox enabled and mail enabled objects from the Active Directory. What is Default Address list? Default Address list are similar to Global Address List. How default GAL is created? When we are installing exchange server 2003. but in a distilled manner.
What is Offline Address List? Offline Address list are not unique. How to view the address list preview? Right click an address list from the address list container. browse next to offline address list.• • • • All groups All users Public folders Default Global Address List 7. Click ok to apply the offline address list to mailbox store 12. By default. Global address list is made to be default Offline Address List 8. go to properties. How to associate an offline address list to their mailbox store? Right click a mailbox store. How many GAL can appear in user’s Outlook Address book? Only one GAL appears in users outlook address Book 13. If you are creating a mailbox to receive updates form antivirus and you don’t want to show the Email address in GAL or preventing internal users to send any mail to that particular mailbox from GAL 9. Offline Address list are used to make address list available to the users who are all not connected to network. Where all the Exchange Address lists created and stored? Exchange Address lists are created and stored in Active Directory container 10. What is the use of hiding a mailbox? Hiding a mailbox is to prevent the E-mail address to appear in Global address List. select the offline address list that u want to assign to the mailbox store. go the properties of the address list and select preview . that is they are not different address list than the regular online address list. What needs to be done so that the users on a mailbox store to be able to use an offline address list? We have to assign a offline address list to a mailbox store on the properties of the Mailbox store 11.
right click all Address list. How to hide a User address from address list? Go to active directory user and computers.14. How to create Custom Address list? • • • • • • • Start Exchange system manger. How to create a new offline address list? • • • • Right click the Address list from the recipient container. right click the all global address list and point to new global address list 15. How to hide Address list from users . click filter rules and then click advance tab From the field menu point to users and then department On the condition field. select is exactly from the menu Give the custom name. Expand the recipient container. Go to the properties of the user that you want to hide from Address list. expand the recipient container. point to new and then click offline address list Type a name for the new offline Address list and then click browse to select a server to host the offline Address list After clicking next remove the default Global Address list form the list and if u want to add a particular address list add it to the list Click next and click finish 18. What is the difference between additional Global Address List and Custom Address List? Global Address list contains the full address list for the Exchange organization and the Custom address list are the address list that are created respect to that of our requirement 17. click add Click ok and click finish 16. How to create additional Global Address List? Start Exchange system manger. Navigate to Exchange Advanced Tab Select the option to hide from Address list 19. point to new and then click Address list For the custom Address list type a name.
we are looking for the events that originated from the MSExchangeAL service. Start System Manager 2. Besides keeping the Exchange address lists up to date. 3. double-click Recipients. 24. point to security tab and select advanced button to open the advanced setting Browse the users or group and set deny permission to open the Address list 20. We need to check and see if the “showInAddressBook” attribute is populated If the “showInAddressBook” attribute is not populated. like most other services is to check the Event Log. In the console tree. . point to Microsoft Exchange. How to access the RUS? 1. in most cases manually forcing the Recipient Update Service to run will resolve the problems. On the Start menu. Which service is responsible for keeping the Exchange address lists up to date? Recipient Update service is responsible for keeping the exchange Address list up to date 21. point to Programs.Go to the properties of the Address list. What is Recipient Update Service? Recipient update service updates the email address and distribution list membership and replicates this information on a schedule to other Microsoft Exchange Servers in the Domain 22. what other desirable function does the Recipient Update Service perform in the Exchange organization? It also updates the distribution list membership to other Exchange Servers inside the domain 23. What are the basic steps to troubleshoot RUS? The first step in troubleshooting the Recipient Update Service. then click System Manager. the Recipient Update Service may not yet have run. 4. The next step in troubleshooting the Recipient Update Service is to use ADSI Edit to check a mailbox that should appear in the Global Address List.
What is Recipient Update Service (Enterprise Configuration)? The Enterprise recipient update service is responsible for updating Email address of the recipients objects located in configuration partition of the domain controller 28. In the console tree. but they are useful for grouping users that share a common purpose. 25. Which two different instances are created of the Recipient Update Service? The following are the two instances created in Recipient Update service Recipient Update Service (Enterprise Configuration) Recipient Update Service (Active Directory Domain) 27. What is Recipient Update Service (Active Directory Domain)? The Domain Recipient Update Service is responsible for updating recipient objects located in the Active directory 29. Distribution Group has no security context and cannot be used to grant permission to resources.5. What is the default preconfigured schedule for RUS? Always Run schedule is the preconfigured option for RUS 26. What are the group types? Two types of groups are the • • Security Group Distribution Group 30. What is Distribution Group? A type of Microsoft Windows Server 2003 Active Directory group that is used to define e-mail distribution lists. right-click Recipient Update Services. . But security groups can be used to assign permission on resources. How Distribution groups differ from Security groups? Distribution Group has no security context and cannot be used to grant permission to resources. such as all employees at a branch location 31.
email is possibly the most used method of communication. What is Security Group? Security groups are the Microsoft windows Server 2003 Active Directory Group. reducing the amount of administration required to manage distribution list 35. 2. What are the types of Exchange Backup? • • • • Full (Normal) Daily Backup Copy Backup Incremental backup . such as department. What is Query-based distribution group? This group enables you to use a LDAP query to specify membership in a distribution group dynamically. we can assign permission on a resource. This result is that membership is automatically determined by attributes of a user account. What are the types of Group Scopes? Following are the types of group scopes • • • Domain Local Global Group Universal Exchange Server 2003 Interview Questions and Answers – 5 Filed under: Interview Questions and Answers — exchange2k10 @ 3:53 pm This chapter includes interview questions and Answers on Exchange Backup and Restore 1. Why Exchange data should be backed up? In today’s business environment. 33. and private and public stores contain large volume of valuable information. Can Security groups be used to distribute messages? Security Groups can be mail enabled and also used as a Distribution group to distribute messages 34.32. with this group. In order to have safety and stability on this valuable information we have to take back up the exchange data.
What is Copy backup? Copy backup same as the full Backup. So when you performing differential back up on the next day. . If you see a page read error. It removes the archive bit. 9. transactional logs that are committed to the database are deleted from the server. . the . At the completion of full backup. This allows continuing to access their mailboxes during backup process. informs that backup has done on this 6. except no file marling is performed. which are created or modified on daily basis. What is Incremental backup? Incremental backup performs backup on all selected data which are modifired after last backup. What is Normal backup? Full backup copies both the database and transactional log files. there may be problem with the Database. if will back up the whole thing from the last backup 7. After the online backup done it will check for corruption at the file system level. continue to run normally throughout the backup process. Perform everyday 4.edb. What is Differential backup? Differential Backup backups all the selected data created or modified after the last backup. Copy backups are used to archived data that can be stored offsite 5. What is Online Backup? When performing Exchange Server 2003 online backup.3. It does not remove the archive bit. whether the backup process is incremental.stm and log files that comprise the exchange stored. What is Daily backup? Backup all the selected data. 8. all services. After performing an online backup which tool you should use to determine whether the Exchange store is corrupt? Event viewer is the tool to use to determine whether the exchange store is corrupt. 10. differential or full backup. including the exchange store. Which files are backed up with Online backup? Following are the files that are copied during the online backup.
4. To perform a offline backup you must dismount the mailbox and public folder stores and then backup the database and transactional logs manually. 6. 2. click finish 15. on the backup and restore wizard click next Select backup all files and settings and click next On what to backup page. 2. How to perform an online backup of a storage group? 1. 3. 4. 5. 3. browse the Microsoft Exchange server and choose the Storage Group that you want to backup Navigate the particular Mailbox store from the Storage Group and click next On the Backup type. After performing an offline backup of your Exchange Server. destination and name click browse and enter the required information On the completing backup page. However you may to perform offline back if online backup fails 13. Opening the Backup utility.11. 5. What is the advantage of performing an online backup? 1. on the backup and restore wizard click next Select backup all files and settings and click next On what to backup page. click finish . On the properties window it will show the recent backup time 12. How to find out the most recent backup time? Go to the properties of the Database in which you want to know the most recent backup time. browse the Microsoft Exchange server and choose the Storage Group that you want to backup On the Backup type. Opening the Backup utility. How to backup the Exchange Store? 1. destination and name click browse and enter the required information On the completing backup page. 4. which utility must you use to check for corruption? We can use backup logs 14. No need to stop database services Users can access their mailbox during backup process The database corruption is checked during the offline backup The change of data loss is very less 16. 3. What is Offline Backup? Offline back up is not a recommended solution. 2.
Can you perform differential or incremental backups on the databases with circular logging enabled? We have to take full backup if circular logging is enabled. What are the methods for Exchange restoration? Exchange 2003 has some nice features to prevent damage from a disaster or to recover Mailbox items and mailboxes. To perform restoration by using the point-in-time method. . not all files required to update the database are available. What are the components of system state data? System state holds the Active directory data. What are the methods of restoring an offline backup of exchange Database? There are two methods to restore an offline backup of Exchange databases: a point-in-time restoration and a roll-forward restoration. The point-in-time method is used when a database is restored but no log files are replayed into the database. What is recovery storage group? You can restore Mailbox stores and individual mailboxes to a recovery storage group and then merge them with the contents of the original stores are mailboxes. Some of these features are: • • • • Deleted item Recovery in Outlook Mailbox Recovery through Mailbox Recovery Storage Group Mailbox Recovery through Keep Deleted Mailbox for XX days Mailbox Recovery Center 20. site replication services etc 18. All the data created after the backup is lost. What is Mailbox Recovery Center The Mailbox Recovery Center is the weapon of choice when you accidentally delete a lot of Mailboxes. an administrator must ensure that the databases to be restored are dismounted and consistent 21. This method is used to restore from an offline backup when circular logging is enabled on the Exchange server.17. As circular logging reuses the log files. You cannot restore a public folder to a recovery storage group 22. Because circular logging periodically deletes the transactional logs 19. Microsoft certificate cervices.
How to restore a mailbox store? We can restore a Mailbox store in 3 methods Restoring Mailbox store by using Exchange System Manager Make sure Mailbox deletion settings are already done. This server can be on the same physical network as your production Exchange Server 2003 computer.exe tool to move the recovered mailbox data from the recovery storage group to the regular storage group. Expand the Mailbox store go to the Mailboxes and run cleanup agent. Mailbox Recovery Center 23. you must have a recovery server that has sufficient storage capacity to install Exchange Server 2003 and to restore the private information store database. 25. Restoring Mailbox store from backup to a recovery server To recover a mailbox from backup. Right click the mailbox u want to recover and click reconnect Restoring Mailbox store by recovery storage Group The recovery storage group is a specialized storage group in Exchange 2003. After you restore a mailbox store to the recovery storage group. you can see the deleted Mailboxes.You simply add the Mailbox store in which you have deleted the mailboxes to the Mailbox Recovery Center and after the process has finished. How to create a recovery storage group and add the database to restore? Use the context menu of the server object to setup the recover storage group Specify the transactional log and system path location Add the database to be recovered to the recovery storage group by using the context menu of the recovery storage group . use the Exmerge. Can you restore Public folder store using recovery storage group? Public folders cannot be restored with the use of a recovery storage group 24.
pst file Open the . so you cannot easily restore individual messages in a mailbox from a backup. User has to point to the deleted items folder and use the recover deleted items option from the tools menu in outlook or in OWA Exchange Server 2003 Interview Questions and Answers – 6 Filed under: Interview Questions and Answers — exchange2k10 @ 3:58 pm . You can allow users to retrieve messages from the delete items folder in outlook or OWA. How to restore individual mailboxes and messages? Recovering individual mailboxes Individual mailbox can be restored with the help of mail box retention period enabled on the mailbox store. to do so you have to set the keep deleted items for certain days in individual user account setting from the Active directory users and computers Alternative you can create new mailbox policy using exchange system Manager.pst file and move all data that you need to recover in to the . And if a mailbox is deleted and if restoration is requested within 30 days retention period then you can recover and reconnect that mailbox without restoring the entire mailbox store If the retention period has expired you have to restore by creating a recover server.26.pst file on the original server and move the data back to appropriate location Recovering messages Exchange server 2003 performs backup and restore in page level rather than in mailbox level. By default mailbox retention period is set to 30 days. To recover deleted mails. You need to perform the following tasks Install recovery server in different active directory forest from the forest where original server is located Install exchange server on a recovery server by using the same organization name Recover the database to an administrative group in which legacy exchange Dn value matches the original server Name the restore storage group and the restore logical database so that their name match the original storage group and logical database names Create a .
mailbox stores. 2. Mailbox store policies Public store policies Server policies 4. Like storage limits etc 5. 2. What is Public folder store policy? Public folder store policies allow you to configure settings across public folder stores. What is Recipient Policy? Recipient policy is the quick and effective way of defining different email address for users in your organization 8. 7. Recipient policies System policies 2. to enable storage limits for your mailbox stores. Like setting storage limits on public folder store or individual public folder 6. 3. What are the types of Exchange policies? There are two types of Exchange policies: 1. What is Server policy? Server policies allow you to enable message tracking options on servers. You can create and apply three types of system policies: 1. System policies reside in the System Policies container. 3. What are the types of System Policies? System policies are policies that control the configuration settings for Exchange server and information store objects. or public folder stores. you can define a single policy and apply them to all mailbox stores in your administrative group. What are the types of Recipient Policies? . What is Mailbox Store Policy? Mail box store policies allow you to configure settings across mailbox stores. For example. What is System Policy? A system policy is a collection of configuration settings that you apply to one or more servers.1.
How to create the System Policy container? . Does the mailbox store policy override any mailbox storage limits that have been directly configured on the mailbox stores? Yes. the controls for individual user’s storage limits will be disabled like this figure 12. 2. What are the ways to apply mailbox storage limits? We can create a Mailbox storage limits settings by 1. Can we manually configure mailbox store limits directly on an individual mailbox if mailbox store policy is applied? No we can’t do this. What is Email Addresses Policy? Email Address Policy is to change the Email Address for a particular user or a group or the whole exchange organization. Mailbox Management policy and Email Address policy 9.There are two types of Recipient policies. If we apply the mailbox store policy. Setting storage limits on individual mailbox stores Setting storage limits by using mailbox store policies 10. the mailbox store policies override any mailbox storage limits that have been directly configured on the mailbox stores 11. This policy will be used when two companies are merging and they want to have different E-mail ID for some reasons 13.
Public Folder Store Policy or Server Policy? Create a system policy container on the Administrative group Point to the system policy container. Which mailbox store properties can be controlled using mailbox store policy? We can control the below properties • • • • • • Default offline Address list Default public folder Enable or disable S\MIME setting Storage limits Deletion settings Database maintenance setting . from here we can create a New Mailbox store policy. How to create the Mailbox Store Policy. public folder policy or server policy 15. right click and select new to create a New System policy container 14.First we have to enable the Display administrative group from the properties of Exchange organization Point to the Administrative Group.
How to access the Recipient Policies? On the Exchange System Manager. Which options are available with Mailbox Manager Settings (Policy)? Following figure shows the available options for Mailbox Manager setting policy . Which server properties can be controlled using server policy? We can control subject logging and message tracking in server policy properties window 18. point to the recipient container and from there point to Recipient policies 19.16. Which public folder store properties can be controlled using public folder store policy? We can also have control on • • • • Enable or disable S\MIME setting Storage limits Deletion settings Database maintenance setting 17.
you can no longer use the property pages of the object to modify the settings controlled by the policy. What is Public Folder? Public folder is a collaboration feature of Microsoft Exchange Server that creates a repository of information that is accessible to any user who has been granted permission to the folder. task items or custom forms 2. To override a mailbox store policy. How to remove the system policy from an object? After the mailbox store policy is applied to the mailbox stores. right-click the object that you want to remove from the system policy. To change the settings on the object. Select “Remove from policy” Removing a system policy from an object doesn’t remove the applied settings to the object.20. In the properties of the system policy object. To remove the mailbox store policy from a mailbox store: 1. 3. Exchange Server 2003 Interview Questions and Answers – 7 Filed under: Interview Questions and Answers — exchange2k10 @ 4:00 pm This chapter discuss the interview questions and answers on Public Folders 1. A public folder can contain mail items calendar item. What is Default Public Folder Tree? . you can override policy settings manually on each mailbox or move the users to a different mailbox store that has the other settings applied to it. Use Exchange System Manager and navigate to the system policy object in the system policy container. 2. you must either modify the policy or remove the policy.
The default public folder tree is automatically created by the setup program when you install the first exchange server 2003 and create your organization. 6. What protocols can clients use to access the default public folder tree in Exchange Server 2003? Client can use MAPI clients or NNTP or HTTP protocols to access the default public folder tree 5. you associate the public folder store with public folder tree. Access only by NNTP or HTTP protocols 8. What is General-purpose public folder tree? General-Purpose public folder trees are additional public folders that you can create. What protocols can clients use to access the General-purpose public folder tree in Exchange Server 2003? This did not support MAPI clients. What are the steps involved in configuring Public Folder replication? In order to setup replication for the additional public folder. It is listed as public folders in Exchange system Manager as public folder and it is displayed as all public folders in outlook 3. . When you configure the public store. Even though you associate the public folder store to existing public folder tree. this by itself it won’t enable replication. the general purpose public folder tree is replicated to each exchange server running Exchange 2000 or later that contains public folder store that associated with that tree. Similar to default public folder tree. So it is not accessible to outlook users. What is the use of general purpose public folder store? The general purpose of public folder tree is to store custom application Another purpose of general public folder tree is to make the public folder available to users outside the exchange organization 7. First you have to create a public store on the destination server that holds the replica. How the Default Public Folder Tree is listed in Exchange System Manager and Outlook? Default Public Folder is listed as public folders in Exchange system Manager as public folder and it is displayed as all public folders in outlook 4.
What are the Exchange Public folder permission types? Following are the Exchange server public folder permissions Client permission – enables you to control the permission of users who are accessing the public folder Directory rights – enables you to control which user can manipulate a mail enabled public folder object that is stored in AD Administrative rights – enables you to assign administrative permission to administrator to run administrative utilities 12. Active Directory uses a replication method of its own to keep domain controllers synchronized with each other. Exchange Information Store service is the primary mechanism used for public folder replication. Active Directory uses a replication method of its own to keep domain controllers synchronized with each other. which means modifications to one replica will be replicated to other replicas equally. Can Public folder be accessed using a uniform resource locator (URL)? Yes we can access public folder via URL. example http://servername/virtualdirectory 11. Active Directory replication occurs even if Exchange Server is not installed on the forest . Which services control the Public folder replication process? Exchange Information Store service is the primary mechanism used for public folder replication Recipient update service controls the recipient replication process Note: Although the Exchange Information Store service is the primary mechanism used for public folder replication. 10. A replica copied from one server to another will be a separate instance of public folder and its content.Once you have public store on the destination server. This replication occurs at the Windows operating system level and is completely independent of Exchange Server. This replication occurs at the Windows operating system level and is completely independent of Exchange Server. which means that all replicas of the public folder are equal and contain the same content. because of this there is no master replica. you can configure public folder to replicate to other server 9. How does Public folder replication occur? Exchange server 2003 uses multi master replication model. it is not the only mechanism at work. it is not the only mechanism at work.
Which processes are involved in Public Folder Replication? Exchange Information Store service is the primary mechanism used for public folder replication. navigate through server. Active Directory uses a replication method of its own to keep domain controllers synchronized with each other. through and individual public store. Usually the public folder referrals with takes place within the routing groups Exchange Server 2003 Interview Questions and Answers – 8 Filed under: Interview Questions and Answers — exchange2k10 @ 4:03 pm . How to create the General Purpose Public folder tree? You can have as many General Purpose Public Folder tree as necessary though you must associate the public folder tree with the public folder store in order to use it First you have to create a public folder tree using exchange system manger Second you have to create a public folder store Third you have to associate the store with the public folder tree. What is public folder referral? When a user connects to a public folder store and the store does not contain the copy of the contentment the user is requesting exchange server 2003 automatically redirects the user to the server where the original content resides. How to create a full-text indexing on a public folder? Expand the First administrative Group. What is the use of public store policy? Storage limits and public folder replication settings can be configured through public store policy. or through individual public folders 17.13. first 16. Active Directory replication occurs even if Exchange Server is not installed on the forest 14. This replication occurs at the Windows operating system level and is completely independent of Exchange Server. This is known as Public folder referral. 15. it is not the only mechanism at work.
remove the Recipient update service and default offline Address list. 3. Which services must be disabled to increase the security of front-end servers? Recipient Update services. Which is the best clustering Technology for frontend and backend server? Front-end best work with Network load balancing and Backend best works with the cluster services 8. 2. Which server can be used in place of a front-end server? ISA server can be used in place of a Front End Server 7. Does Exchange Server 2003 front-end server support Exchange 2000 back-end server? . What is Front-end Server? A Front-End server is a Microsoft Exchange server 2003 configuration where servers are used for authentication and fault tolerance. and the free busy services are not supported on front end server 6. 3. How to configure Exchange Server 2003 to run as a front end server? In the Exchange server. Click ok and finish 9. Unified Name Space can have single name space for multiple exchange servers Reduced over head for SSL Firewall – place the Back-end behind the firewall and allow only traffic from frontend 4. How to increase security of the communications between your front. 2. What are the advantages of Front End and Backend architecture? 1.and back-end Exchange servers? We can increase the security of communication between your frontend and Back-end Exchange Server by placing the Backend behind the firewall and allow only traffic from Front End 5.1. the mailbox management service. There is no special configuration to designate a server as a Backend server. What is Back-end Server? A Back-End server is a Microsoft Exchange server 2003 configuration where servers are used to hold the users data. offline address lists. On the server container right click the server which you want to designate as a Front end server and go to properties and designate the server by selecting this is a front end server.
verify that the front-end can reach each of those servers exactly as specified in the registry entry. If you have a perimeter network. 7. What are the steps involved in troubleshooting front-end and back-end servers? 1. Make sure that all the appropriate services are started on the front-end and back-end servers. make sure that the appropriate ports are opened 3. However. try to use the IP address. Exchange 2000 Enterprise Server can be used as a front-end server or a back-end server in a front-end and back-end configuration 11. verify that you can connect to the DNS server the front-end server is using. 5. Make sure that the combination of IP address and host header is unique for each virtual server. make sure that the shared IP can be reached from client computers. If you have a load balancing solution for the front-end servers. If the front-end server is configured with the list of domain controllers and global catalog servers in the registry.Yes. Exchange Server 2003 front-end server support Exchange 2000 back-end server 10. 6. Ensure that the front-end server can successfully connect to the global catalog servers and DNS server. If this works. If you cannot connect to the back-end server from the front-end server using the hostname with any protocol. 4. What all ports are required by front-end server to communicate with back-end servers? • • • • 443 for HTTPS 993 for SSL-enabled IMAP 995 for SSL-enabled POP 25 for SMTP (including TLS) 12. Also verify that the name to IP mapping is correct in DNS. Does Exchange 2000 front-end server support an Exchange Server 2003 back-end server? Exchange 2000 Server can be used only as a back-end server in a front-end and back-end configuration. 2. This includes the relevant Exchange services in addition to the World Wide Web Publishing service and SMTP service. .
Additionally. 9. Users who try to anonymously submit e-mail to external domains receive an error. To install SMTP on the front-end server. If users complain that the state of read and unread messages in public folders fluctuates. configure SMTP for internal and external domains Mail for Internal Domains For the front-end server to accept mail that is inbound from the Internet. 15. such as “550 5. you must enable anonymous access for other SMTP servers on the Internet to successfully route mail to your organization (this is the default setting). consider the following: • • • Was a back-end public folder server added or removed? Is authentication enabled on the front-end? Are any back-ends that host the folder down? 13. What needs to be created on Exchange front-end server for SMTP access to the Exchange organization? SMTP must be available on the front-end server to allow POP and IMAP clients to submit e-mail messages. Administration: If you want to use Exchange System Manager. regardless of the port used for communication between the client computer and the front end server 220.127.116.11 Unable to relay for suzan@adatum. This occurs because relaying is turned off for all anonymous access (however. any SMTP mail that is submitted to your server and addressed to external domains is denied. You can install SMTP on the front-end server or set up a separate SMTP server. Adding recipient policies for each of your domains tells all servers in the Exchange organization to accept mail for those domains. Mail for External Domains In the default configuration. What are the important Services that should run on Frontend server? It depends on the services that we want the frontend server to function . the front-end server needs to know the domains for which it should accept mail. authenticated users can still send e-mail to any external domain).” The clients must be configured to use SMTP authentication. Also recall that you cannot use the Internet Services Manager after deleting the stores on the front-end server. ensure that the System Attendant service is running.com. Which port is used by front-end server to communicate with back-end server? All communication between the Front-end and Back-end server are TCP port 80.
What are the considerations for deploying front end and backend server? • • • • Do not cluster Frontend servers One front-end server is reasonable for every four back-end servers. Typical use of a smart host involves relaying outbound SMTP email to a Non-Exchange SMTP host in perimeter networks. . What is Smart Host? A Smart host is a common term for a server that accepts outbound mail and passes it on to a recipient Smart host are used to connect Exchange Server to an external messaging system. What is the tool to diagnose queue problems? Queue viewer is the Tool to diagnose queue problems. The queue viewer shows the protocol. and the number of messages in the queue. What are the tools to monitor Exchange Server 2003? Following are the Tools to Monitor Exchange Server 2003 • • • • • • • Event Viewer – Exchange Specific events are logged in application logs Performance Monitor – view real-time Exchange server statistics Exchange System Manager – enable Protocol logging for virtual server instance Message Tracking center – view the message flow Monitoring and status tool – monitor servers and connectors Message queue viewer – view messages waiting to be delivered MBSA – analyze security settings 2. queue state.• • • • • WWW POP3 Exchange system attend Exchange Information store IMAP4 16. this number is provided only as a suggested ratio and starting point Load balancing is suitable for front end servers Encrypt the communication between Frontend and Backend by IPSec Exchange Server 2003 Interview Questions and Answers – 9 Filed under: Interview Questions and Answers — exchange2k10 @ 4:07 pm 1. or to ISP or hosted service that may offer functionality like mail relaying and spam and virus scanning 17. However.
following figure shows the diagram 4. such as creating. or service Success Audit – audited security access attempt that succeeds Failure Audit – audited security access attempt that fails 6.3. Where is Queue viewer located? Queue viewer located at the Server container. but may indicate a possible future problem Information – event that describes the successful operation of an application.significant problem. or deleting files. Where are Exchange Monitors located? Following figure shows the location of Exchange Monitor . such as loss of data or loss of functionality Warning – not necessarily significant. An administrator can specify what events are recorded in the Security log. opening. What are the types of Events? • • • • • Error . What are the types of logs provided in the Event Viewer? • • • • • • Application Log – events logged by applications or programs System Log – events logged by the Windows operating system components Security log – security events such as valid and invalid logon attempts Directory Service log – Server directory service logs events File replication service log – logs replication of files DNS Server service log – events related to the Domain Name System (DNS) Server service 5. What are the types of events for Security log? The Security log can record security events such as valid and invalid logon attempts as well as events related to resource use. 7. driver.
and client actions. How to configure the Exchange Diagnostics logging? 1. When troubleshooting. Select the appropriate entry in the Category area of the tab. Open Exchange System Manager. 4. • • • Enable diagnostic logging to log events related to authentication. 3.8. activate the category specific to the problem at a medium or maximum level. Use Event Viewer to view the logged information. In the Services area of the tab. Where is Exchange Notification located? Exchange Notifications are located at Monitoring and Status tool on the Tools container in Exchange System Manager 10. 6. . Locate the Exchange server that you want to configure. click service. 2. What is Exchange Diagnostics logging? Enable diagnostic logging for a server in Exchange System Manager to send Exchange event information to the Event Viewer. connections. Disable logging when not needed to improve performance and reduce the amount of information sent to the Event Viewer 12. Right click the Exchange server and select Properties from the shortcut menu. 5. Click the Diagnostics Logging tab. they are • • E-Mail Notification Script Notification 11. What are the types of notifications? Two types of Notification we can configure. Which additional items can be added for monitoring in Exchange Monitors? We can configure Notifications and also we can see the status of the exchange servers that are running by using the Monitoring and status tool 9.
for each action needed to execute a task. This is due to the impact this logging level has on server performance. or log data. What are the Useful Processor Counters to Monitor in System Monitor? .only critical events and error events are recorded. Maximum – entries are logged for each line of code. What are the four levels of logging available in Exchange Diagnostics Logging? • • • • None . entries are logged. System Monitor uses objects. You can determine resource usage by monitoring trends. histogram. The utility uses a graphical display that you can use to view current. System Monitor can be displayed in a graph. Where is System Monitor located? System Monitor: The System Monitor utility is the main tool for monitoring system performance.one entry is logged for each key task performed by the service. The Maximum logging level should be enabled only when you need comprehensive debugging information. counters and instances to monitor the system.13. 14. System Monitor can track various processes on your Windows system in real time. Medium. What are the Useful Memory Counters to Monitor in System Monitor? • • • • • Pages/sec Page faults/sec Page inputs/sec Page outputs/sec Write copies/sec 16. Minimum . Located in Performance Monitor on Administrative Tools container 15. or report format.
trace logs. What is the use of Nslookup? NSLookup is to Query a DNS domain name server to lookup and find IP address information of computers in the internet. you can specify that the following actions occur when an alert condition is met: 18. · Trace Logs: Trace logs differ to counter logs in that trace logs monitors data constantly and then records performance data when a specific event occurs. A few features of counter logs are listed below: • • • Collect performance data on the activities of system services. like MX record details 19.• • • • Process total Process Interrupt %Idle Time % user Time 17. · Alerts: You can configure alerts to be generated when a predefined counter reaches. you can track the performance of the server by creating counter logs. and defining alerts. exceeds or falls beneath a defined threshold or value. The collected data is written to a trace log file. Manually log data. How to identify if the problem is with smart host or exchange server? . When you configure alerts. What are Performance logs and alerts? Performance Logs and Alerts: By using the Performance Logs And Alerts tool included in the Performance console. What is the command to locate a SMTP server for a particular domain or to determine if the MX records have been configured properly in DNS To verify this use the below commands NSLOOKUP Set q =MX 20. Collect performance data on hardware usage. · Counter Logs: Counter logs collect data on the selected counters once a predefined interval has passed.
26. Users report corruption within their mailboxes. 22. What is ISinteg ? Isinteg is a command-line tool that analyzes and makes some repairs to the Exchange databases. or an Internet connection that may be down. When using Eseutil: · Dismount the stores you want to analyze. if any problem in sending mails outside and we can send mails within the organization then there is problem with smart host. . a lot of spam that is leaving the server. What is ESutil ? Eseutil is more powerful than Isinteg for repairing problems in the database. and performs initial diagnosis of the problems. 25. What is command to run dcdiag from another member server to check domain controller diagnosis? Dcdiag /test:DNS /s:TargetDCName /v /f:LogFileName 24. The Information Store must still be running. What could be the problem if incoming mail queue is becoming unmanageably large? A large number of SMTP queues may indicate that there is either a denial of service attack. Users report error messages that are associated with the database not being able to be mounted. Use Isinteg for problems similar to the following: • • Users are continuously connecting to their mailboxes and keep getting disconnected. Which tests are performed by dcdiag? DNS: Checks the health of Domain Name System (DNS) settings for the enterprise.Smart host are used to relay the mails outside of your exchange organization. 21. What are the counters to diagnose whether a global catalog server is the cause of a lengthening incoming mail queue? MSExchangeDSAccess Processes is the counters to diagnose whether a global catalog server is the cause of a lengthening incoming mail queue 23. CheckSecurityError: Locates security errors or errors that might be related to security problems.
such as the following Access .· Common options with Eseutil include: • • • • /d to perform an offline defragmentation. What is the use of Ping? You can use the Ping command to perform several useful Internet network diagnostic tests.You can use Ping to see if you can reach another computer Distance & Time – You can use the Ping command to determine how long it takes to bounce a packet off of another site. Which tests are performed by netdiag? Gathers static network information and tests the network driver. 28. What is the use of Telnet? Telnet is a program to let you login to another computer on the Internet in order to use typed commands 31. What is the use of Pathping? Path PING it’s same as that of trace route which determine how packets travel between your computer and the destination. it helpfully displays the corresponding IP address in the response. 30. which tells you it’s Internet distance in network terms Domain IP Address – You can use the Ping command to probe either a domain name or an IP address. If you ping a domain name. and well-known target accessibility. 27. What is the use of Tracert? Trace route command determine how packets are travel between your computer and the destination. /p to repair a database. /g to check database integrity. Path ping provides a more detailed and reliable analysis of network performance. to generate reports at regularly scheduled intervals . Trace provides a quick response 29. /r to perform a database recovery. send/receive capability. Can be used by network administrators in conjunction with the Scheduler Service. protocol driver.
You can also use the SMS version of Network Monitor to determine which protocols are using the most bandwidth on the network. Select the Management and Monitoring Tools option and click the Details button. Which switch is used with netdiag to display only errors and warnings? To run the tool. click the Add / Remove Windows Components button to launch the Windows Components wizard. 4. 34. 5. 2. Netdiag /q – show the quiet output (error and warnings only) 33. edit. What is NetDiag? . change to the folder containing the extracted files and run the tool from there. you must • • • Open a command prompt. Select the Network Monitor Tools option and click Next. Windows will now begin the installation process. 7. locate network routers. 35. All these diagnostic tools run from a command prompt. What is DcDiag? DCDiag command-line tool analyzes the state of domain controllers in a forest or enterprise and reports any problems to assist in troubleshooting 36. Scroll through the list of components until you locate the Management and Monitoring Tools option. Next. and resolve device names into MAC addresses. This functionality is used by hackers when performing a replay attack. and retransmit a packet. You may be prompted to insert your Windows installation CD. Ability to capture. Open the Control Panel and select the Add / Remove Programs option. Click Finish to complete the installation process. 6. What is the use of Network Monitor? It allows you to monitor any machine on your network and to determine which users are consuming the most bandwidth. you can’t just double-click them. 3.32. How to install the Network Monitor tool? To install the Windows version of Network Monitor. 1.
Moreover. Name some Exchange Server 2003 clients • • • • Outlook 2000/2003 Outlook Web Access. Exchange Server 2003 Interview Questions and Answers – 10 Filed under: Interview Questions and Answers — exchange2k10 @ 4:11 pm 1. so when a request is received byHTTP client IIS redirect the request to application. What is Outlook Web Access (OWA)? Outlook Web Access 2003 (known as OWA 2003) allows you to gain access to your messages. Exchange also registersDavex. The DNS resolves the request and forward to the IIS server. 3. 2. 2. tasks and public folders from any computer with internet access. 3. support personnel and network administrators can focus on analyzing the output rather than on training users how to use the tool. Outlook Mobile Access. The HTTP request flows across the network to the IIS server. better security and a fresh new look. How OWA works? 1.This is a command-line diagnostic tool helps to isolate networking and connectivity problems by performing a series of tests to determine the state of your network client. because this tool does not require parameters or switches to be specified. . These tests and the key network status information they expose give network administrators and support personnel a more direct means of identifying and isolating network problems.dll is an ISAPI extension thatincludes the functions necessary to communicate with the Store.dll with IIS as the component to handle all incoming requests for the Exchange application. calendars. The client issues a HTTP request using browser using URL. How to access OWA? Open your browser and type in the following address: https://DomainName/exchange In Exchange Server 2007 – https:\\domainname\owa 4. contacts. OWA 2003 has many added features which allow for improved performance. 4. RPC over Http/Https. Davex. Exchange registers itself with IIS as a valid application.
dll to get the necessary information from the Store. After getting information from Store the reverse path is followed and client gets itsmailbox on browser. Users who are running Outlook 2003 on client computers can connect to an Exchange server in a corporate environment from the Internet. Communication goes to the HTTP epoxy stub. What are the requirements to use RPC over HTTP? Server Requirement RPC over HTTP/S requires Windows Server 2003 and Exchange Server 2003. 8. 7. Adding recipients when sending an E-mail is a pain. The Windows RPC over HTTP feature enables an RPC client such as Outlook 2003 to establish connections across the Internet by tunneling the RPC traffic over HTTP. What are the limitations of OWA? • • • • We can’t access offline address list A lot of attachments have to be saved to the local drive first. users no longer have to use a virtual private network (VPN) connection to connect to Exchange mailboxes. The HTTP epoxy stub communicates with Store using exoledb. RPC over HTTP/S also requires Windows Server 2003 in a Global Catalog role. You cannot work offline. 6. Davex. in order to be able to open them. Client Requirement The client computer must be running Microsoft Windows XP Professional Service Pack 1 (SP1) or later. This solves the problem remote Outlook 2003 users have when located behind restrictive firewalls. What is RPC over HTTP? The RPC over HTTP protocol allows your full Outlook 2003 MAPI clients to connect to Exchange 2003 Servers using HTTP/HTTPS.5. Eproxy does notuse RPC.dll checks the request and contacts the Store through the epoxy inter process communication channel. 7. What is the procedure to configure RPC over HTTP? . 6. By using RPC over HTTP. 5. The client computer must be running Microsoft Office Outlook 2003.
Mailbox-enabled users can send and receive messages and store messages on their Exchange server. What are the types of Exchange recipient objects? 1. and store messages. the term recipient refers to an Active Directory object that is mailbox-enabled or mailenabled. How to prepare an Exchange Server 2003 computer to support RPC over HTTP? Configure Exchange to use RPC over HTTPS. Configure the RPC proxy server to use specific ports. These settings enable SSL communication with Basic Authentication. What is a mailbox-enabled object? Users can log on to networks and access domain resources. Configure the RPC virtual directory in Internet Information Services. 2.Verify that your server computer and your client computer meet the requirements to use RPC over HTTP/S. 14. 3. What is mail-enabled object? . Configure the RPC virtual directory in Internet Information Services. they must create an outlook profile that uses the required RPC over HTTP settings. which is required when using RPC over HTTP 10. Mailbox-enabled recipients Mail-enabled Contacts Resource mailbox 13. receive. Mailbox-enabled recipients can send. Configure the RPC proxy server to use specific ports. What is Exchange recipient? In Exchange. Mail-enabled recipients can only receive messages. Configure your client computers to use RPC over HTTP/S 9. Why you must create an additional Outlook profile for RPC over HTTP connections? For users to use RPC over HTTP from their client computer. 4. • • • • Configure Exchange to use RPC over HTTP/S. Users can be added to groups and appear in the global address list (GAL). 12. 11.
What is Encryption? Encryption refers to algorithmic schemes that encode plain text into non-readable form or cyphertext. and then click Properties. verify that the Clients support S/MIME signatures check box is selected. A Key Recovery Agent is a highly trusted person which is responsible for recovering lost or damaged archived certificates for users. Click Administrative Group. Start the Windows 2003 CA console Issue a new template named Key Recovery Agent Request this certificate for the user who becomes the Key Recovery Agent Manually Issue the Key Recovery Agent Certificate at the CA 2. Click Start. They cannot send or store messages on Exchange. click servername.Mail-enabled users can receive messages at an external e-mail address only. The receiver of the encrypted text uses a “key” to decrypt the message. returning it to its original plain text form. point to Microsoft Exchange. providing privacy. 18. What is the use of Key Recovery Agent? We need to enable a Key Recovery Agent. Right click either the Mailbox Store or the Public Folder Store. Click Storage Group. What is the purpose of Digital Signatures? Digital signatures are used to digitally sign the messages and encrypt them. 3. 4. 7. 4. Click Servers. We must issue a Key Recovery Agent certificate for this user. The key is the trigger mechanism to the algorithm. How to configure Outlook to enable Digital Signatures and Encryption? . 3. How to verify that S/MIME is supported by mailbox store so that users are able to store encrypted or digitally signed messages? 1. Click Administrative Groups. To do this: 1. and then click System Manager. point to All Programs. 5. non repudiation and data integrity. 6. Digital signatures provide authentication. 2. On the properties page. 15. 16. 19. Encryption keeps message contents confidential 17.
routing groups and Public Folder trees. 4. What is Administrative Group? In Exchange 5. Click Tools. 20. VeriSign GeoTrust Global Sign Digicert Digi-sign Exchange Server 2003 Inteview Questions and Answers – 11 Filed under: Interview Questions and Answers — exchange2k10 @ 4:13 pm 1.5. and then click Options. 3. What are the components of PKI? Certification Authorities – Provide services that authenticate the identity of individuals. Outlook populates the Change Security Settings dialog box with default information. and other entities in a network. policies. Click on the Security tab and click Settings. Click OK to accept the defaults. 2. Key Recovery Server – Saves encrypted private keys in the certificate database for recovery after loss. Name a few 3rd party CAs ? 1.Click Start. 5. 21. Under administrative groups it contains servers. Three administrative models are present • Centralized – adding all the exchange servers to the same administrative groups to have centralized administration . site concept is divided into two groups in Exchange 2003 named Administrative Groups and Routing Groups Administrative Group are used to provide administrative tasks. point to Microsoft Office. point to All Programs. and then click Microsoft Office Outlook 2003. computers. This encompasses both root certification authorities and subordinate authorities. Certificate Directory – Saves certificate requests and issued and revoked certificates and certificate requests.
What are Routing Groups? Routing Groups are related to physical layout.log. the server could send the update to the local bridgehead server. in this model it will have different administrative group in a forest Mixed – Combination of centralized and de centralized model. It reduces disk storage space requirements 5. In fact. The remote bridgehead server would distribute the update to the machines at the remote office.) Let’s say that an Exchange server in your main office has been updated.LOG. Routing groups comes in to play when you have multiple physical locations 3. 2. What is Circular logging? All transactions are first logged to the current log file E00. The way the current log file is rolled over depends on the logging mechanism used. you may not be able to recover to a point of failure by roll forward through the transaction log files—one or more may be missing. The local bridgehead would then send the update to the remote bridgehead server. and that update needs to be replicated to 10 servers at a remote office. For this reason it is a good idea to disable circular logging on all Storage Groups . What is the downside of Circular logging? It prevents you from using differential or incremental backups. you can have one routing group at the corporate office and a separate routing group at a remote office. Circular logging automatically overwrites transaction log files after the data they contain has been committed to the database. The routing groups would be joined by a routing group connector. This process is called transaction log rollover. rather than sending 10 copies of the update across the WAN link. It is like AD sites used to group servers that share reliable well connected bandwidth. because circular logging purges some transaction log files. That connector would designate one server in each routing group as a bridgehead server. because they require the past transaction log files. How Routing Groups works? If you have routing groups implemented. 4.• • De centralized – it’s for large organization. With routing groups set up. (Exchange traffic flowing between routing groups can only be sent between bridgehead servers. Microsoft Exchange provides circular and sequential logging mechanisms. If it gets full it will be saved to a file of the log generation E00xxxxx.
if circular logging is enabled. along with the requested email attributes. go to the Properties window of a Storage Group and choose the General tab. Send As Permission – means user A will be able to access the mail box of user B and reply back to those mail. 8. The process of finding those mail-enabled group members is called expansion The Global Catalog server obtains the names of the ultimate recipients from its copy of Active Directory. 9. It reduces disk storage space requirements. How Circular logging works? Circular logging automatically overwrites transaction log files after the data they contain has been committed to the database. Circular logging (disabled by default) uses transaction log technology but does not maintain previous transaction log files. the Exchange server sends a copy of the message to each mail-enabled user and contact in the group. Instead. . Even though user A has replied to the mail. if we configure the circular logging option. the Global Catalog server expands the membership of each of those groups and repeats the process recursively until it has assembled a full list of all ultimate recipients in each of the nested groups. What is difference between Send on Behalf permission and Send As permission? Send on Behalf permission – Send on Behalf Of” allows one user to be able to send emails on behalf of another. If the list includes any mail-enabled groups. however. then removes the existing log files and discards the previous transactions after the transactions in the transaction log files have been committed to the database. you cannot perform incremental backups 7. Where does the expansion of mail sent to mail-enabled groups occur? When you send a message to a mail-enabled group. The message will show the recipient who the message was sent on behalf of and who actually sent the message. the send address will display user b email. it maintains a window of a few log files. Which service needs to be stop and restart to take effect of changes made to circular logging? Microsoft Exchange Information Store service has to be restarted.6. How to enable Circular logging? To enable circular logging. It returns this list to the Exchange server. 10.
7. servers can be moved between Routing groups. Click Next and then click Finish. How to delegate the control of Administrative Group to users? 1. select the Display routing groups checkbox on the General tab. Select the Exchange role which should be assigned. Navigate to the Administrative Group. Open the Exchange Systems Manager. 9. Click OK 15. 8. How you can configure HTTP virtual server logging? Logging is only available for SMTP and NNTP protocols. Click Add. How can you prevent your users and groups from viewing the contents of a custom address list? Go to the properties of the Custom Address list. but we can’t move the servers between Administrative Groups. All Programs. Microsoft Exchange.11. 5. Use IIS to configure logging for HTTP 13. Right-click the Exchange organization and the select Properties from the shortcut menu When the Exchange organization Properties dialog box opens. Click the Action menu and select Delegate Control options. Exchange System Manager opens next. 6. 2. . The Exchange Administration Delegation Wizard launches. Click Next on the Welcome to the Exchange Administration Delegation Wizard screen. Click OK. point to security tab and select advanced button to open the advanced setting Browse the users or group and set deny permission to open the Address list 12. and then select Exchange System Manager. How to enable the Administrative Group in native-mode Exchange Organization? Click Start. 3. 4. Provide the details of the Active Directory user account or group that you are delegating control over the Administrative Group to. 14. Can Exchange Servers move between administrative groups? With Exchange Server 2003.
16. Which functions are available with Exchange General Tab? Explanation of Exchange General TAB We can do the following options in this Exchange General TAB Delivery Restriction – set maximum size of outgoing and incoming messages Delivery option – set delegating privileges. • • • • Move a mailbox Delete Mailbox Configure Exchange Features Remove Exchange Attributes 19. Exchange Tasks will be availble 18. How to access the Exchange Tasks? Right click a user object from the Active Directory user and computer console. Which functions are provided by Exchange Tasks for a User? we can. set a forwarding address Storage Limits – specify storage Limits for the mailbox enabled user . How many Exchange Organizations can exist per forest? We can have only one Exchange Organization to exists per forest 17. Which options are added to the Mailbox-enabled User properties for Exchange? • • • • Exchange General Exchange Advanced Exchange Features Exchange E-Mail Address 21. Which functions are provided by Exchange Tasks for a contact? we can • • Delete Email Address Modify Exchange Attributes 20.
Which functions are available with Exchange Advanced Tab for a Group? We can do the following option • • • • • New alias name Choose an expansion server Hide group from address list Send out of office message to originator Send delivery reports 25. Which functions are available with Exchange Advanced Tab for a mailbox-enabled User? We can do the following options • • • Hide the user from global Address list We can set mailbox rights We can set custom attributes 24. What are the options for a group once Exchange Server is installed? Exchange General Exchange Features Exchange E-Mail Address 26.22. for example if a user is restricted to allow OWA you can disable the feature Features we can enable/disable • • • • Mobile Features OWA POP3 IMAP4 23. Which functions are available with Exchange Features Tab for a Mailbox-enabled User? We can have enable or disable the following features respect to that of user permission. Which functions are available with Exchange Tasks for a group? We can • • Delete email address Hide membership .
5. Click [OK] to close the account properties dialog. Click [OK] to close the account properties dialog. 28. Click [OK] to close the “Delivery Options” dialog. 2. highlight the account under “Group or user names” and in the “Permissions for …” window grant the account “Send As” permission. . Find the user’s account that you want to be able to send as. Under the “View” menu ensure that “Advanced Features” is ticked. 4. select the “Delegates” tab 29.. What is the other way to configure Send on Behalf permission? We can configure this option by using outlook 2003.. Click [OK] to close the “Options” dialog.. Select the “Exchange General” tab. Log onto the server running Exchange..] Click [Add . and open up the account properties. and open up the account properties. then click [OK] 6.] Add the user or users that you want to grant the send-on-behalf-of permission to. How to configure the Send as Permission? 1. 3. 7. 2. 4. 2. 8. For each account added. How to configure the Send on Behalf permission? 1. Click [Add ... Select the “Security” tab. To allow sendon-behalf-of. 7. Run Active Directory Users and Computers.] (under “Group or user names”) and add the user (users or group) that is to be granted permission to send-as this account.. Tools → Options. 6. 5. Click [Delivery Options. then click [OK] The next window will allow you to specify which permissions you are granting. Log onto the server running Exchange Run Active Directory Users and Computers..] and add the user (or users) that are to be granted permission to send on behalf of this account. to configure this 1. you need to grant permissions on the “Inbox” to either “Author” or “Editor”. 3. 6. 8. 3. 5..• Remove exchange attributes 27. 4. Start Outlook Click on [Add . Find the user’s account that you want to be able to send on behalf of.
. In the Forwarding Address section. To close Delivery Options and to close Properties. Read and Execute. Note: This is not necessary on Exchange Server 2003 because of the fact that the Exchange Advanced tab is exposed by default. 2. 5. 4. the send address will display user b email.Read. and then click Properties. 7.Write Full Control To configure the mailbox permissions 1. Even though user A has replied to the mail. click Forward to. In Active Directory Users and Computers. Click the Exchange General tab. Note If you want e-mail to be delivered to the original mailbox as well as the forwarding address. Send As Permission means user A will be able to access the mail box of user B and reply back to those mail. Under Active Directory Users and Computers. Right-click the mail-enabled user. click OK two times. How to configure a forwarding address? 1. 2. click the account. and Read None Modify. and then click Mailbox Rights. Start the Active Directory Users and Computers snap-in. 6. How to configure the mailbox permissions? We can assign the following permission to a mailbox • • • • • Administrators group: Authenticated Users group: Creator Owner: Server Operators group: System account: Full Control Read and Execute. select the Deliver messages to both forwarding address and mailbox check box. 31. List Folder Contents. and then click Modify. Click Delivery Options. Then. click the Exchange Advanced tab. 3. 32. The rights are displayed in the Permissions for account name dialog box.9. List Folder Contents. click Advanced Features on the View menu. Click the mail-enabled user or the mail-enabled contact. 3. click OK.
You can use the Filter option to define group membership for the query-based distribution group. click Change to select another container. in the console tree. right-click the container where you want to create the query-based distribution group. Querybased distribution groups are only supported when running in Exchange Server 2003 Native Mode. The Recipient Update Service (RUS) does not stamp the inherited permissions when the mailbox is created. type a name for the query-based distribution group. and then select from the following criteria: . the store calculates inherited mailbox rights. Under Apply filter to recipients in and below. point to New. If this is not the correct container. and then click Next. select one of the following options: To filter the query based on a set of predefined criteria. 7. Then. and then click Querybased Distribution Group. 1. What is a Query-based distribution group? A query-based distribution group works much like a standard distribution group. 4. 2. In Query-based Distribution Group name. The difference being that the query-based Distribution Groups assign group membership based on LDAP queries.This behavior occurs because the mailbox security descriptor is not read from the Active Directory account object until the user logs on or gets mail. Under Filter. 2. when new account objects are created. 4. 33. The main advantage of creating a query-based distribution group is that administrators can dynamically assign members to the group – you do not have to manually add/remove accounts from the querybased distribution group.Users with Exchange mailboxes . After the mailbox is created in the store. In Active Directory Users and Computers. How to create a Query-based distribution group? 1. click Include in this query-based distribution group. 6. 3. these objects too are added to the group when they defined as being mail-enabled in Active Directory. 3. The different Filter options for defining a query-based distribution group are listed here: Users with Exchange Mailboxes Users with External Mail Addresses Mail-Enabled Groups Contacts with External Email Addresses Mail-Enabled Public Folders Customer Filters 34. 5. verify that the parent container shown is the one that you want the query-based distribution group to be run against.
Users with external e-mail addresses . Click Yes to dismount the database automatically and move the location. When a user sends a message to a group. 7. and then click Customize 6. What is Expansion server? Expansion servers route messages that are sent to a single distribution list or group for each of the recipient objects in that list or group. remount the databases manually. click Customize filter. How to move the database of a store? 1. 36. We can configure expansion server here 37. Next to the database that you want to change. change. Open the administrative group that contains the database that you want to change.Public folders that are mail-enabled 5. 7. Click the Exchange Advanced tab. and then click Properties 3.Contacts with external e-mail addresses . the Exchange server that is acting as the expansion server expands the group to its individual members. 35. and then specify a new drive or folder location for the files. click Browse. When you finish moving the databases. and look in the value under Expansion server. This expansion permits members of the distribution list or group to receive the message. Click the Database tab. Under Storage Group.Groups that are mail-enabled . right-click the mailbox store or the public folder store that you want to 4. An expansion server also resolves the names of all recipients in the distribution list or group. Start Exchange System Manager. and then determines the most efficient path for routing the message. 5. To create your own criteria for the query. right-click the distribution group and then click Properties.. 2. Click Next to see a summary of the query-based distribution group that you are about to create. How to configure an expansion server for a mail-enabled group? In Active Directory Users and Computers. Click Finish to create the query-based distribution group. 6. .
If you cant find answers for your Questions 1. protected by a Firewall and separated from both the internal LAN and the Internet. which a dedicated network. Four domain functional levels are available: Windows 2000 mixed (default). What are the Exchange Server clients? • • • • • • Microsoft outlook Outlook web access Outlook Mobile Access RPC over HTTP POP3 IMAP4 2. and Windows Server 2003. What is mail relay? The first mechanism to be used against attacks is a mail relay. You can raise the forest functional level to Windows Server 2003.38. What is a Forest and Domain functional level? Domain functionality enables features that will affect the entire domain and that domain only. . Windows Server 2003 interim. forests operate at the Windows 2000 functional level. You would definitely want one of those so that your Exchange server will not be directly connected to the Internet for inbound connections. By default. Three forest functional levels are available: Windows 2000 (default). and Windows Server 2003. Windows 2000 native. This allows the Firewall administrator to determine who is trying to get into the mail relay and what is passing from the mail relay to the internal LAN Exchange Server 2003 Interview Questions and Answers – 12 Filed under: Interview Questions and Answers — exchange2k10 @ 4:16 pm This Chapter holds the Exchange Server 2003 Inerview Questions and Answers which are not covered in the Previous 11 Posts Leave your comments. A mail relay is basically just a simple mail server that accepts e-mails. A mail relay could also filter out viruses and junk e-mail if you install the right software package for it. filters it according to pre-defined criteria and then delivers them to another server. A mail relay is typically placed in a DMZ. Your mail relay will only allow mails that are destined to user in your SMTP domain to be relayed to the internal server. Windows Server 2003 interim. domains operate at the Windows 2000 mixed functional level Forest functionality enables features across all the domains within your forest. By default.
What is cache mode in Outlook 2003? When an Outlook account is configured to use Cached Exchange Mode. message text is specified along with the recipients of the message. (If a user is already configured for offline use with an OST and an OAB. Outlook can typically download just the new information from the server.3. they are IP version 4 – 32 bit addressing IP version 6 – 128 bit addressing 5.) 4. and their priority relative to each other. What is Simple Mail Transfer Protocol (SMTP)? SMTP is a short for Simple Mail Transfer Protocol and it is used to transfer e-mail messages between computers. and creating an OAB. along with the Offline Address Book (OAB). so that the collection of MX records for a given domain name point to the servers that should receive e-mail for that domain. It is a text based protocol and in this. Simple Mail Transfer Protocol is a ‘push’ protocol and it cannot be used to ‘pull’ the messages from the server. synchronizing the OST with the user’s mailbox on the Exchange server. Each MX record contains a preference and a host name. The cached mailbox and OAB are updated periodically from the Exchange server. What is Network News Transport Protocol (NNTP)? . When a user starts Outlook for the first time with Cached Exchange Mode configured. What is MX record? An MX record or Mail exchanger record is a type of resource record in the Domain Name System (DNS) specifying how Internet e-mail should be routed using the Simple Mail Transfer Protocol (SMTP). 7. Outlook works from a local copy of a user’s Exchange mailbox stored in an Offline Folder file (OST file) on the user’s computer. 6. Outlook creates a local copy of the user’s mailbox by creating an OST file (unless one already exists). What is IP address? An Internet Protocol (IP) address is a numerical identification and logical address that is assigned to devices participating in a computer network utilizing the Internet Protocol for communication between its nodes. Two IP versions are currently in use. not the whole mailbox and OAB.
What is five nines availability? 99. Internet Explorer. What are important Ports for firewall configuration? • • • • • SMTP – 25 DNS – 53 HTTP – 80 Kerberos – 88 NNTP – 119 12.NNTP (Network News Transfer Protocol) is the predominant protocol used by computer clients and servers for managing the notes posted on Usenet newsgroups. NNTP utilizes TCP port 119. Opera. Which utility can you use to verify that port 25 is open on a remote SMTP server? Telnet is the utility to verify the port 25 11. What is MBSA? Microsoft Baseline Security Analyzer (MBSA) 2. 13. What is Workgroup? In workgroup. NNTP servers manage the global network of collected Usenet newsgroups and include the server at your Internet access provider. To use any computer in the workgroup. NNTP replaced the original Usenet protocol. An NNTP client is included as part of a Netscape. you must have an account on that computer All computers must be on the same local network or subnet 9. To run MBSA your account must be a member of which group? . no computer has control over another computer Each computer has a set of user accounts. 8. UNIX-to-UNIX Copy Protocol (UUCP) some time ago.1 is an easy to use tool that helps small and medium businesses determine their security state in accordance with Microsoft security recommendations and offers specific remediation guidance.999 availability – not sure on this 10. all the computers are peers. or other Web browser or you may use a separate client program called a newsreader. Improve your security management process by using MBSA to detect common administrative vulnerabilities and missing security updates on your computer systems. NNTP with SSL utilizes TCP port 563.
· Common options with Eseutil include: • • • • /d to perform an offline defragmentation. 16. What is ESEUTIL? Eseutil is more powerful than Isinteg for repairing problems in the database. 15. has 1 GB or more of physical memory. to perform memory optimization we have to set the /3GB switch to the Boot.ini 18.User account should me member of the administrator group on the targeted host 14. What is open relay? . a DMZ (demilitarized zone) is a computer host or small network inserted as a “neutral zone” between a company’s private network and the outside public network. Microsoft Windows Server 2003 Enterprise Edition or Microsoft Windows Server 2003 Datacenter Edition.ini file if Your Exchange Server 2003 computer has more than 1 GB of RAM installed? Add /3Gb switch to boot. It prevents outside users from getting direct access to a server that has company data. /p to repair a database. The Information Store must still be running. (The term comes from the geographic buffer zone that was set up between North Korea and South Korea following the UN “police action” in the early 1950s. When using Eseutil: · Dismount the stores you want to analyze. What is DMZ? In computer networks. /g to check database integrity. What type of memory optimization changes could you do for Exchange 2003? The server is running Microsoft Windows Server 2003 Standard Edition. What size is each page of data in the database? The pages are 4KB in size (for Exchange 2003) and include not only data but also a checksum and pointers to other page AD uses a page size of 8 kb 17.) A DMZ is an optional and more secure approach to a firewall and effectively acts as a proxy server as well. /r to perform a database recovery.ini 19. Which parameters needs to added in boot.
21. What is Active Directory Schema? The Microsoft Active Directory schema contains formal definitions of every object class that can be created in an Active Directory forest. which will likely improve performance. an open relay makes it possible for an unscrupulous sender to route large volumes of spam. What is X 400 Connector? X.400 protocol. 20. 23. By processing mail that is neither for nor from a local user. 22.An open relay (sometimes called an insecure relay or a third-party relay) is an SMTP e-mail server that allows third-party relay of e-mail messages. . This section provides the reference for each schema object and provides a brief explanation of the attributes. the owner of the server — who is typically unaware of the problem — donates network and computer resources to the sender’s purpose. All databases in a storage group share a single backup schedule and a single set of transaction log files. X.400 connectors are designed to connect servers running Exchange with other X. In addition to the financial costs incurred when a spammer hijacks a server.400 systems or to servers running Exchange Server 5. and loss of business. What are the advantages of implementing multiple Exchange databases (mailbox store & public folder store)? • You can place each database on a different physical disk. A server running Exchange Server 2003 can then send messages over this connector using the X. Exchange 2007 Standard Edition supports up to five storage groups. Storage groups are the basic unit for backing up and restoring data in Microsoft Exchange (although you can restore a single database). Exchange Server 2007 Enterprise Edition supports up to 50 storage groups. What is a storage group? Storage groups An Exchange storage group is a logical container for Exchange databases and their associated system and transaction log files. In effect.400 connectors to connect routing groups. classes. The schema also contains formal definitions of every attribute that can exist in an Active Directory object. equipment damage.5 outside an Exchange organization.400 connectors Although you can use X. and other objects that comprise the Active Directory schema. an organization may also suffer system crashes.
What is Volume Shadow Copy service? The Volume Shadow Copy Service provides the backup infrastructure for the Microsoft Windows XP and Microsoft Windows Server 2003 operating systems. Select Properties from the context menu. if a database becomes corrupt. select a time to make a scheduled Shadow Copy. then right-click the drive. In the displayed dialog box.m. For example. 2.m. mailbox quotas) to particular user groups. . regardless of the snapshot technology or application 25. 8. Select the Shadow Copies tab. You can also click New to create a new schedule. How to enable Volume Shadow Copy service? 1. you must restore the data in only one database.” select the volume for which you want to enable Shadow Copies. 4. By dividing user accounts over multiple databases. you can prioritize the database-restoration order in the event of a total disaster. Click Settings to configure VSS. every weekday). By separating users into multiple databases. (Of course. when you put all managers in one database. if all managers are in one database.m.g. From the drop-down list in the Schedule dialog box.. Click OK after you finishes selecting the scheduling options.m.• • • • You can set database-level quota policies. and 12:00 p. as well as a mechanism for creating consistent point-in-time copies of data known as shadow copies. 7.. then click Schedule. you can assign different policies (e. you can use the options in the dialog box to specify when VSS runs (i. it’s bound to be that one!) • Multiple databases let you keep database size to a manageable level (typically less than 40GB 24. 5. Under “Select a volume. you could restore that database first.e. In the event of a database restore. Open Windows Explorer or the Microsoft Management Console (MMC) Disk Management snapin. the date and time). 3. After you select a time. For example. Click OK to exit the main Settings dialog box. The Volume Shadow Copy Service has native support for creating consistent shadow copies across multiple volumes. you minimize the scope of any database corruption. you might want to schedule the system to make a Volume Copy on Saturday at 7:00 a. so that by grouping users into different databases. configure the settings to tell Windows 2003 where you want VSS to store the Shadow Copies (you can specify only the drive–you can’t specify a folder) and the maximum amount of space to use for the Shadow Copies (at least 100MB). Windows 2003 will use a default configuration that creates a Shadow Copy on the selected drive at 07:00 a. and on Sunday at 7:00 a. (If you don’t configure the default settings. which enables faster recoverability. 6.
What is the Size of Exchange log file? 5 MB for 2003 and 1 MB for 2007 27. one Exchange Server can also control Virtual servers for IMAP4. NNTP and POP3. What is Incremental Population? An incremental population event causes only new and modified items to be indexed 30. What is Full Population? A full population event causes all items in the public folder store to be indexed or reindexed. You can opt to enable the POP3. Exchange Server 2003 has the capacity to index the full text of all messages in any mailbox store. The Outlook clients connect not to the individual Exchange 2003 nodes. and IMAP4 virtual servers as needed . NNTP. but to a Virtual server with a virtual IP address. in addition to SMTP. 32. users can quickly search for any word or phrase that occurs in the body of any item in their own mailbox. In a completely different context. From another point of view. calendar items. 29. Which virtual servers are operational by default? In a default Exchange organization. Moreover. To begin with. regardless of their current state of modification. 31. the term Virtual Server is used in clustering. For how many days deleted mailboxes are not permanently purged by default? By default Exchange Server 2003 set to 30 days Mail items deletion retention period is set to 7 days for Exchange server 2003 and 14 days for Exchange Server 2007 28.26. only the HTTP and SMTP virtual servers are operational. for example ourcomp.net. What is use of Full-text indexing? Mailboxes are repositories for messages. you could interpret these Exchange Virtual servers as aliases for physical folders in Microsoft’s IIS. and task lists for all the users in your organization. Which are the Exchange virtual servers? Windows Exchange Servers use the word ‘Virtual’ in many contexts. documents. one physical machine can act as a server for several Virtual SMTP domains. If you configure full-text indexing.com and mergecomp.
33. In the Properties dialog box for the new SMTP virtual server. select New and then click SMTP Virtual Server. In Exchange System Manager. and then click Properties. How to configure External DNS servers for external name resolution in Exchange Server 2003? . expand the First Administrative Group. Which messaging protocols are supported by Exchange Server 2003? • • • • • HTTP IMAP4 NNTP POP3 SMTP 34. you can limit the number of connections that can be made to the virtual server at the same time. 1. 36. On the General tab. right-click the SMTP protocol. and then expand the Exchange server where you want to create a new HTTP virtual directory. set the appropriate connection limits. Expand the Protocols node. How to limit the inbound connections to Virtual servers? A virtual server can accept an unlimited number of inbound connections and is limited only by the resources of the computer where the virtual server is running. Log on to the Exchange server where the virtual server is running using the Exchange administrator account that has local Administrator permissions and Exchange Full Administrator permissions. To prevent a computer from becoming overloaded. go to the properties and select the relay option to configure which server is to relay the mails for the Exchange Organization 37. How to create a new Virtual server? In Exchange System Manager. By default. right-click the protocol for which you want to change connection limits. configure the settings for your new Exchange virtual directory. 3. 2. expand the Servers node. Microsoft® Exchange does not limit the number of incoming connections. expand Protocols. How to configure the SMTP Relay settings? SMTP relay setting can be configure by navigating through Exchange System Manager>Servers>protocols>SMTP Virtual Server. 35.
right-click your DNS server. In Advanced Delivery. How to configure auditing in Exchange? Auditing lets you track what’s happening with Exchange Server. expand <Server Name>. type the IP address of the external DNS server that you want to use. Click Start. forward the query to the remote server. 4. 2. this action is written to the system’s security log. click Properties. point to Microsoft Exchange. 6. Administrative Tools. You can use auditing to collect information related to information logons and logoffs. The Configure dialog box appears. and then click System Manager. click Configure. follow these steps: 1. 3. Right-click <Your Outgoing SMTP Virtual Server>. you specify a different DNS server than the server that is configured in the TCP/IP properties of the computer running Exchange Server. Start the Group Policy Management Console by clicking Start. 7. and then configure forwarders to external DNS servers. To enable Exchange auditing. Group Policy Management. under External DNS. 1. To configure this setting. and then click Properties. You enable auditing in the domain through Group Policy. You can now navigate through the forest and domains in the organization to view individual Group Policy Objects. 5. click the Forwarders tab. and then expand SMTP. open the DNS console. In Configure. and much more. The Advanced Delivery dialog box appears. In the console tree. and then click OK twice to apply the settings. permission use. and deliver the response to the requestor. . expand Servers. Configure your DNS server to include forwarders to external (Internet) DNS servers. and then click OK. point to All Programs. Any time an action that you’ve configured for auditing occurs. Click the Delivery tab.When you configure external DNS servers. In Configure. All Programs. and then click Advanced. This setting allows your DNS server to receive a query for external names. You can then access the security log from Event Viewer. verify that the IP address is correct. click Add. This DNS server is used by SMTP to resolve external DNS names and deliver mail. 38. expand Protocols.
such as the right to create mailboxes. 3. computer. What is the purpose of Logging in Microsoft Exchange? Microsoft® Exchange Server transaction logging is a robust disaster recovery mechanism that is designed to reliably restore an Exchange database to a consistent state after any sudden stop of the database. Success logs successful events. Policies. information stores. The logging mechanism is also used when restoring online backups. as well as actions that affect system security or the security log. Audit Process Tracking Tracks system processes and the resources they use. Repeat steps 5 and 6 to enable other auditing policies. the Failure check box. and then select Security. To specifically audit users’ actions on Exchange Server. Access the Audit Policy node by working your way down through the console tree. and Local Policies. • • • • • • • Audit Directory Service Access Tracks access to Active Directory. or both. Audit Policy Change Tracks changes to user rights. Windows Settings.2. or group accounts are created. You should now see the following auditing options: • • Audit Account Logon Events Tracks user account authentication during logon. Audit Privilege Use Tracks the use of user rights and privileges. and then select Edit to open the policy object for editing in Group Policy Management Editor. Events are generated any time user. such as successful logon attempts. shutdown. you should consider creating an organizational unit (OU) for Exchange servers and then define auditing policy for a Group Policy Object applied to the OU. Audit System Events Tracks system startup. Audit Account Management Tracks account management by means of Active Directory Users And Computers. modified. The policy changes won’t be applied until the next time you start the Exchange server. and trust relationships. This opens a Properties dialog box for the policy. Account logon events are generated on the authenticating computer when a user is authenticated. and other types of objects. 39. and then select the Success check box. auditing. Security Settings. Expand Computer Configuration. and restart. 7. Then select Audit Policy. Events are generated any time users or computers access the directory. double-click or right-click its entry. or deleted. . Audit Logon Events Tracks local logon events for a server or workstation. 4. Select the Define These Policy Settings check box. Failure logs failed events. To configure an auditing policy. 6. After you’ve created the OU or if you have an existing OU for Exchange servers. 5. such as failed logon attempts. Audit Object Access Tracks system resource usage for mailboxes. right-click the related policy object.
4. · Expand the Administrative Groups node. Exchange writes the changes to a transaction log file. · Open Exchange System Manager. 5. Protocols. 7. it can then be written to the database file. Protocol logging provides information on the message commands that a user sends to an Exchange Server 2003 server 1. 3. and set the size setting. set the log file location. · Select the Enable logging checkbox on the General tab. 40. Server Name. the Servers node. · In the Log File Directory box of the General tab. · Expand the SMTP folder. . choose either of the following options: • • • • • • Hourly Daily Weekly Monthly Unlimited File Size When File Size Reaches. · Right-click Default SMTP Virtual Server and then select Properties.Before changes are actually made to an Exchange database file. 2. · Choose either of the following logging format options available in the Active Log Format drop-down list: • • • • Microsoft IIS Log File Format NCSA Common Log File Format ODBC Logging W3C Extended Log File Format · Click Properties. · In the New Log Schedule area of the General tab. 6. How to enable Logging? Protocol Logging If you want to troubleshoot mail system protocol issues then you should enable and configure protocol logging. the administrative group. After a change has been safely logged. · The Logging Properties dialog box opens. · The Default SMTP Virtual Server Properties dialog box opens.
8. The default format specified is W3C Extended Log File Format. Open the IIS Manager console. Click the Web Site tab. What are the log file formats are available with Logging? You can configure the logging format that should be used for logging the information • • ASCII-based format Open Database Connectivity (ODBC) format The different ASCII format options which you can choose between are: • • • Microsoft IIS log file format NCSA log file format W3C Extended log file format For the ODBC format. 7. then you can click the Advanced tab to configure the items which should be tracked. set the following: Specify when information should be saved to the log file. · Click OK in the Default SMTP Virtual Server Properties dialog box. Right-click Default Web Site and then select Properties from the shortcut menu.· If you have selected the W3C Extended Log File Format option. The Logging Properties dialog box opens. You can use Access or SQL Server to create an ODBC database. you have to configure which ODBC database to use. How to enable Logging on HTTP virtual server? 1. Check the Enable Logging checkbox. 3. 42. • . 5. and then configure the database to receive protocol logging information. · Click OK in the Logging Properties dialog box. 4. Expand the Web Sites node. 41. 2. 9. 6. Select the log file format from the Active Log Format drop-down list. Click Properties. What is the location of log files for Logging? By default logs are stored in C:\WINNT\System32\LogFiles directory 43. On the General tab.
49. What is OWA? OWA is to access the mail via browser from outside the corporate network. The Outlook Web Access (OWA) client is now nearly indistinguishable from the full Outlook client. This allows for virtual private network (VPN)–free access to Exchange data. What is Outlook Anywhere? Outlook Anywhere (previously known as RPC over HTTP) is a method by which a full Outlook client can dynamically send and receive messages directly from an Exchange server over an HTTP or Hypertext Transfer Protocol Secure (HTTPS) web connection. through the use of push technology. cannot be sent with POP3 and must use the SMTP engine in Exchange. which can enable an Exchange server to be accessed via IMAP applications. This is where you can configure Extended Logging Options. 47. It allows for real-time send and receives functionality to and from the handheld. 46. POP3 is not turned on and must be explicitly activated. As with the POP3 protocol. Click OK in the Default Web Site Properties dialog box. Click the Advanced tab if you have selected the W3C Extended Log File Format. 45. By default. What is Exchange Active sync? ActiveSync provides for synchronized access to email from a handheld device.• • • • • Specify the log file size. What is POP3? The Post Office Protocol 3 (POP3) is a legacy protocol that is supported in Exchange 2007. however. such as a Pocket PC or other Windows Mobile device. What is IMAP4? Legacy Interactive Mail Access Protocol (IMAP) access to Exchange is also available. over a secured HTTPS connection. 48. What is an IPSec policy? . The one major component missing is offline capability. such as some UNIX mail clients. Specify the log file location. Click OK in the Logging Properties dialog box. IMAP support must be explicitly turned on. Mail messages. 44. but nearly every other Outlook functionality is part of OWA. POP3 enables simple retrieval of mail data via applications that use the POP3 protocol.
If a client requests a secure session. However. What are the preconfigured IPSec policies Windows Server 2003 comes with? • • • Client (Respond Only) Policy Secure server policy (Require Security) policy Server (request security) policy 51. 5. The policy tells Windows such things as which data to secure and which security method to use. the client will respond appropriately. 52.An IPSec policy is nothing more than a set of rules that govern when and how Windows 2000 uses the IPSec protocol. 5. Contrary to the name. However. 3. 50. this policy will accept insecure inbound communications. This policy is only appropriate for servers that require all communications to be secure. 3. Once this policy has been applied. This policy is designed to be run on client machines that don’t normally need to worry about security. the server will either send or accept insecure communications. What are the Exchange Server 2003 core services? 1. Explain the preconfigured IPSec policies? The first policy on the list is the Client (Respond Only) policy. The IPSec policy interacts directly with the IPSec driver. this policy can be used on both client and server PCs. Any client wanting to communicate with the server must use at least the minimum level of security described by the policy. What are the options for giving remote user access to Exchange? 1. if a server requests that the client go into secure communications mode. 4. 4. The final policy on the list is the Server (Request Security) policy. Exchange System Attendant IIS admin Service SMTP service Exchange Information Store Exchange Installable File System . 2. The policy is designed in such a way that the client will never initiate secure communications on its own. 2. This policy will use IPSec security for all outbound security. the policy will allow the client to establish one. The next policy on the list is the Secure Server (Require Security) policy. Outlook web Access POP3 IMAP4 Outlook Mobile Access RPC over HTTP 53.
maintenance and AD lookup service 55. 56.5 MS Exchange IMAP4 – provides IMAP4 services MS Exchange Information Store – Manage Exchange Information store MS Exchange Management – Exchange management using WMI MS Exchange MTA Stack – provides X. 8. What is the use of ESEUTIL? Users report corruption within their mailboxes. 5. MS Exchange Event – Monitors folders and files of Exchange 5.54.5 MS Exchange POP3 – provides POP3 Service MS Exchange Routing Engine – provide topology and Routing Engine MS Site Replication Service – Exchange 2003 co exist with Exchange 5. Click OK. For Exchange Server 2003 Enterprise Edition value between 1 and 8000 (the default is 8000 GB). 7.5 Exchange system Attendant – Provides monitoring. 3. Users report error messages that are associated with the database not being able to be mounted .400 service to connect Exchange 5. What is ISINTEG. What is the default mailbox size in Exchange Server 2003? For Exchange Server 2003 Standard Edition value between 1 and 75 (the default is 18 GB). What is the maximum database size with Exchange Server 2003 standard edition? 16 GB if Exchange Server 2003 sp 1 is installed 75GB if it is upgraded to Server pack 2 57. Users report corruption within their mailboxes. What other services are associated with Exchange Server 2003? Following are the important Exchange Services 1. Users report error messages that are associated with the database not being able to be mounted 58. 4. Use Isinteg for problems similar to the following: • • Users are continuously connecting to their mailboxes and keep getting disconnected. 2. 9. and where we have to use this? Isinteg is a command-line tool that analyzes and makes some repairs to the Exchange databases. 6.
the process needs a great deal of disk space to do this. How to run Eseutil on a computer without Exchange Server? . /r to perform a database recovery. you need about 110% of your file size available on your disk. 59. a database switch. Where is Eseutil located? Located in windows 2003 support tools 60.Eseutil is more powerful than Isinteg for repairing problems in the database • o o o o Perform an offline defragmentation. /g to check database integrity. /d to perform an offline defragmentation. 61. 1. /p to repair a database. and then click Dismount Store. 3. 2. 4. Repair a database. At the command prompt. change to the Exchsrvr\Bin folder. What need to be done before performing the defragmentation with Eseutil? It is recommended that you always perform a backup of your data before running Eseutil 64. right-click the information store that you want to defragment. To run defragmentation. Check database integrity. Perform a database recovery. and any options that you want to use. How much free disk space is needed for defragmenting a database with ESEUTIL? Because defragmentation copies the files to a temporary file and then copies the compressed file back to the original file. Use the following database switch to run Eseutil defragmentation on a specific database: eseutil /d <database_name> [options] 63. 62. What is the command to run the Eseutil defragmentation on a specific database? In Exchange System Manager. What are the different Eseutil modes and switches associated with them? 1. and then type the eseutil /d command.
and enforce message restrictions. To transfer messages from the pre-routing queue. 2. From the outbound queue. 3. What is WINROUTE? WinRoute is an additional tool that shows the link state table for Exchange. Explain the Message flow in Exchange server 2003. Copy the Eseutil. the advanced queuing engine uses the routing engine to determine where the SMTP service should send the message. and an outbound pre-routing queue. which is part of the Microsoft Exchange Information Store service. whereas if the message comes from a MAPI client. Message flow in Exchange 2003 is as follows: 1. routing groups. The routing module passes the message to the queue manager that finally places the message in a link queue to be sent through the SMTP service. resolve recipients. address spaces.exe. If the message comes from a remote SMTP host. From the local queue. An SMTP host connects to the SMTP transport engine on port 25. The advanced queuing engine then uses the categorizer to process received messages. The categorizer tries to resolve the originator. 4. 66. the message is transferred to the advanced queuing engine. Jcb. 5. 65. messages are sent to the next routing hop by the SMTP service.dll files from the Exchange Server 2003 computer’s Drive:\Exchsrvr\Bin folder to the new folder that you created. Ese. Regardless of the origin. Use WinRoute to query a server and view its table. Run the eseutil command from this folder against any databases that were copied from the Exchange Server 2003 computer. master. the store driver transfers it to the advanced queuing engine. the SMTP protocol engine transfers the message to the advanced queuing engine. and member servers 67. and Exchmem. and is placed in the destination mailbox. What is address rewrite in Exchange Server? Exchange Address Rewrite is the process of rewriting E-mail addresses for all outgoing messages in a special SMTP Virtual servers.dll. such as Outlook. Received messages are placed in one of two queues: a local queue with messages for recipients residing on the server.Create a new folder on the computer that does not have Exchange Server 2003 installed. or from MTA.dll. The name of the link queue corresponds to the name of the destination domain. connectors. At a command prompt.dll. change directory to the new folder. or an inbound message is received from the MTA. or an Outlook client places a message for sending in the database. Exosal. the message transfers to the store driver. Exchange Address Rewrote is especially used in merger or acquisition .
If you are running Exchange Server 2003. Obtain a certificate for each user. Use the following process to use S/MIME for secure e-mail. Where S/MIME supportable? S/MIME is supported by Outlook. What is DS2MB? Directory Service\Metabase Synchronization process (DS2MB process). such as SSL. while other forms of protection. 2. 1. 68. Outlook Web Access. or POP3 or IMAP4 clients. Users who will send you encrypted e-mail must have your public key. What is S/MIME? Secure Multi-purpose Internet Mail Extension (S/MIME) protects the integrity and confidentiality of email messages. You must have the public key for all users to whom you will send encrypted or digitally signed e-mails 70.scenarios where two Exchange Organizations are to be merged into one but. When the 16 GB database size limit is reached on the Standard version of Exchange and white space must be reclaimed in order to mount the database. and how can it be reclaimed? White space is nothing but free space. every organization uses its own SMTP Namespace while for all outgoing SMTP Messages the new or unique SMTP address space is used. S/MIME requires the use of certificates issued through a public key infrastructure (PKI) 69. In short the DS2MB process overwrites new configuration information in the local metabase (the metabase is kind of a registry for IIS) with configuration information that was last set in Active Directory by using the Exchange System Manager snap-in. protect the transmission channel. DS2MB is short for Directory Service to Metabase and the purpose of this process is to transfer configuration information from Active Directory to the IIS Metabase. Share and obtain public keys with other users. Enable S/MIME in the e-mail client application. The configuration is stored in the IIS Metabase instead of the registry mainly for performance and scalability reasons. until these two organization are completely merged. then Service Pack 2 (SP2) should be installed to raise the limit to 75 GB 71. S/MIME protects the message itself. What is white space. The DS2MB .
net. but to a Virtual server with a virtual IP address. Selecting one of these sends a request to a MAPI server 73. The standard is defined in RFC 2045. Moreover. for example ourcomp. and graphics applications. one physical machine can act as a server for several Virtual SMTP domains. usually the well-known TCP port 25. spreadsheets. What is MIME & MAPI? MIME = Multipurpose Internet Mail Extensions It defines non-ASCII message formats. The Outlook clients connect not to the individual Exchange 2003 nodes.process is a one-way write from Active Directory to the IIS Metabase. Desktop environments like KDE. or to an ISP or hosted service provider that may offer functionality like mail relaying and spam and virus scanning . MIME is also used for declaration of content from other Internet protocols like HTTP. In a completely different context. MIME also defines the art of coding (ContentTransfer-Encoding). the term Virtual Server is used in clustering. one Exchange Server can also control Virtual servers for IMAP4. 74. From another point of view. you could interpret these Exchange Virtual servers as aliases for physical folders in Microsoft’s IIS. in addition to SMTP. Typical use of a smart host involves relaying outbound SMTP email to a non-Exchange SMTP host in perimeter networks. It is a coding standard that defines the structure of E-Mails and other Internet messages. It is bound to a particular IP address (or group of IP addresses) and port.com and mergecomp. What is a Smart Host? Where would you configure it? Smart hosts are used to connect Exchange Server to an external (to the organization) messaging system. With MIME it is possible to exchange information about the type of messages (the content type) between the sender and the recipient of the message. MAPI = Messaging Application Programming Interface It’s the programming interface for email. which means that the Metabase never writes back to Active Directory. It is a Microsoft Windows program interface that enables you to send e-mail from within a Windows application and attach the document you are working on to the e-mail note. 72. To begin with. MAPI-compatible applications typically include a Send Mail or Send in the File pulls down menu of the application. Applications that take advantage of MAPI include word processors. NNTP and POP3. Gnome or Mac OS X Aqua. Windows Exchange Servers use the word ‘Virtual’ in many contexts. What are virtual servers? When would you use more than one? An SMTP virtual server is an instance of the SMTP service running on an Exchange server.
These transaction logs are crucial to the recovery of a failed Exchange server. Exchange writes the changes to a transaction log file. the only existence of this data is in the system memory and the transaction logs. it can then be written to the database file. whether it was a minor crash that required a reboot. In the event of a crash. This is an important distinction from an open relay that will forward mail from the sender without authentication. Exchange server was designed to write all transactions to these log files and commit the changes to the databases when the system allows.A smart host is a common term for a server that accepts outbound mail and passes it on to the recipient. Select the start Menu – > Programs -> Microsoft Exchange -> System Manager Expand the Top Level Servers – > your mail server -> Protocols -> SMTP Right click the default SMTP server and select properties 75. Often this smart host requires authentication from the sender to verify that the sender has privileges to have mail forwarded through the smart host. Until the transaction is committed to the Exchange database (EDB). deleted items and messages moved to different folders 76. A smart host is a type of mail relay server which allows an SMTP server to route e-mail to an intermediate mail server rather than directly to the recipient’s server. Explain Exchange transaction logs? 5 MB for 2003 and 1 MB for 2007 Before changes are actually made to an Exchange database file. When a message is sent. . you lose the contents of the memory and all you are left with is the record in the transaction log. it can then be written to the database file. The same goes for other transactions such as received messages. the transaction is first recorded in the transaction logs. Common authentication techniques inc Set Up Private Outbound DNS route mail to Outbound Services by setting up an external DNS server. After a change has been safely logged. After a change has been safely logged. One of the most important components of Exchange server is the transaction logs. Exchange writes the changes to a transaction log file. Users can send and receive messages without touching the database thanks to this write-ahead method of logging. Explain Exchange transaction logs? 5 MB for 2003 and 1 MB for 2007 Before changes are actually made to an Exchange database file. or a more catastrophic failure requiring the deployment of your disaster recovery plans.
What are the services required to run exchange server 2003 Front End Server? 1. These transaction logs are crucial to the recovery of a failed Exchange server. Which services are needed to enable Exchange Server 2003 to perform message routing functions? • • • Microsoft Exchange Routing Engine SMTP service IIS Admin Service 79. IPSec services provide security between clients and servers on TCP/IP networks. Which services are needed to maintain interoperability with previous versions of Exchange? • • • Microsoft Exchange Event Service Exchange MTA Stacks Microsoft Exchange Site Replication Service 80. IIS Admin Service. Exchange server was designed to write all transactions to these log files and commit the changes to the databases when the system allows. deleted items and messages moved to different folders 77. Which services are disabled in Exchange Server 2003 by default? • • • NNTP service Microsoft Exchange IMAP4 service Microsoft Exchange POP3 78. The same goes for other transactions such as received messages. 3.One of the most important components of Exchange server is the transaction logs. Users can send and receive messages without touching the database thanks to this write-ahead method of logging. Until the transaction is committed to the Exchange database (EDB). these services are needed if you want to configure an IPSec filter on OWA servers. needed if you want clients to be able to access OWA or Outlook Mobile Access front-end servers . 4. In the event of a crash. IPSec services. the transaction is first recorded in the transaction logs. Microsoft Exchange Routing Engine. 2. whether it was a minor crash that required a reboot. you lose the contents of the memory and all you are left with is the record in the transaction log. the only existence of this data is in the system memory and the transaction logs. The IIS Admin Service is dependent on the Microsoft Exchange Routing Engine. or a more catastrophic failure requiring the deployment of your disaster recovery plans. When a message is sent. needed to enable Exchange to route messages. World Wide Web Publishing Service. needed to enable Exchange routing functionality.
What is dumpster? Dumpster is a storage location for the deleted items from mailbox database or Public folder Database. We can set the dumpster setting by keeping the retention period of Mailbox deletion settings to certain number of days By default it is 18 MB in size and can keep record of deleted items for 7 days. .81.
This action might not be possible to undo. Are you sure you want to continue?
We've moved you to where you read on your other device.
Get the full title to continue reading from where you left off, or restart the preview.