You are on page 1of 59

Exchange Server

1. What are the new features introduced in Exchange Server 2010 on overview perspective?
Protection and compliance
Anywhere Access
Flexible and reliable

2. What’s new in Protection and compliance?


Email Archiving
Protect Communication
Advanced Security

3. What’s new in anywhere Access?


Manage Inbox Overload
Enhanced Voice Mail
Collaborate efficiently

4. What’s new in Flexibility and reliability?


Continuous Availability
Simplified Administration
Flexible deployment of Exchange Server 2010

5. Explain the E-Mail Archiving feature in Compliance?


We can set email retention mail policy from end user level Message expiration
We can search for individual or Multi user mailboxes from compliance officer perspective

6. Exchange the protection features in Exchange Server 2010?


Hub Transport Server provides
Automatically protect Messages with the centralized Rights Management Service
Automatic Content Based Protection
Transport rule action to apply template to E-Mail or Voice Mail
Support for scanning of attachment
Internet confidential and DO NOT Forward E-Mail Polices
Information Protection Cross PC, Web and Mobile devices

7. What are the Advanced Security features in Exchange Server 2007?


Exchange server 2010 comes up with the advance security feature of stopping malicious software and spam
from enter into the message environment
We can have Forefront Security to have this advance security, which has
Multiple scan engines throughout the corporate infrastructure
Easy to use management console provides central configuration and operation

8. What’s New in Anywhere Access?


Manage inbox overload using enhanced conversation view and filtering the messages
Mail Tips – if no permission to send mail, popup will show mail tips to reduce NDRS
Can access Voice Mailbox with features like
Audio play back
Text preview
Quick option to add the user to contacts and phone number
Auto attend – we can manage auto attend, define personalized voice menu

9. What are the supportable clients for Exchange Server 2010?


Desktop – office 2007 and entourage MAC
WEB – OWA, OFFICE outlook web access, IE, Firefox and safari
Mobile – office outlook mobile, windows mobile, and Exchange active sync for third party’s

10. What are the outlook features now introduced to mobile devices?
Auto complete cache – used email address in OWA in cache will be shared mobile
Conversation view – if any change in messages on outlook that will be applied to Mobile
Contact to see the availability of the users
Voice Mail Preview – see voice mail
Send and receive text message in OWA and mobile

Page 1 of 59
Exchange Server

Admin can control which mobile devices can connect


Downloadable mobile devices

11. What is universal Inbox In OWA?


Its provides a solution to have one E-Mail inbox for E—Mail, Text messages and Voice messages
Can have multiple E-Mail accounts in one OWA window

12. What is federation?


Federation is new feature in Exchange server 2010 to share the company users calendars to the partners. A trust
relationship to be made to have this feature

13. What is continuous availability feature in Exchange Server 2010?


In Exchange Server 2007, we have server to server failover scenarios, and we need to use failover clustering to
configure the HA options which is very difficult to manage
In Exchange Server 2010 HA modified to Database level which provides quick recoverability in disk and
database failures. We can have multiple database copies up to 16 mailbox copies in a database availability
group. Admin have replicate mailbox copies up to 16 replicated copies. Capabilities of having CCR and SCR
into single platform

14. Continuous availability in user level?


If a mailbox move is happening, the users will be stay online and there wont be be any discontinuity in sending
or receiving mails

15. Explain the administration option in Exchange Server 2010?


Exchange Server 2010 provides simplified administration by providing options like
Compliance office can easily search for mailboxes
HR can easily update the user information
Help desk can easily manage mailbox quotas
User can easily track the status of the message easily
User can easily create own Distribution group
User can modify the contact information

16. What are the storage options supported in Exchange Server 2010?
Exchange Server 2010 can support the DAS and Also JBOD disks its because of the HA option depends only on
the Database level

1. What are the same between Exchange 2000/2003 and Exchange Server 2007?
Core infrastructure of exchange 2000/2003 versus Exchange Server 2007 is same, both are using the same JET
EDB database as the database store
Exchange 2007 still has the concept of a Mailbox server where EDBs are stored; Storage groups remain the
same where databases are created.
Users can use the Microsoft Outlook client and can access Exchange using OWA.
Exchange 2007 still uses the VSS Backup application programming interface (API) to freeze the state of the
Exchange database to perform a backup of the Exchange database.

2. What’s missing in Exchange Server 2007 That Was in Previous Versions?


Recovery Storage Group has been removed. Exchange 2007 comes with the high reliable and recoverable
solution
The STM database introduced in Exchange 2000 has been removed; Microsoft incorporated the streaming
database into a new single EDB database file.
From administration point, Administrative group and Routing Group introduced in Exchange 2000 have
removed.
Microsoft noted that Public Folder is deemphasized in Exchange 2007. Not completely removed. Replaced by
SharePoint server 2007
New Exchange Administration Tool
Exchange Scripting Language
Removal of Front end and Bridgehead Severs with new Server roles
Runs on X64 bit platform

Page 2 of 59
Exchange Server

3. What’s new in Exchange Management console?


EMC looks similar to Exchange System Manager; Exchange 2007 now organizes objects as a whole.
Administrator can see all users, all servers, and all resources in the Exchange organization in a single view. The
Exchange administrator can regroup users, computers, and resources into smaller delegation groups.

4. What are the security features introduced in exchange server 2007?


Edge Transport Server – placed on the Edge of the Network replaced the frontend server, functionalities
includes virus and spam blocking, perform antivirus and anti-spam filtering, and route the messages internal to
the organization.
Hub Transport Server – replaced the bridgehead server act as a policy compliance server,
TLS – includes server to server Transport Layer Security for server – server message transport with a secured
manner. It’s an Encryption technology.
Encryption – by default Exchange 2007 encrypts the content between exchange server 2007 and outlook 2007
client. Provides full support for certificate based PKI.

5. Name the reliable and recoverable features in Exchange server 2007?


Exchange 2007 holds to copies of user information in the network with the help of reliable and recoverability
features introduced.
Local Continuous Replication – Two copies of user information in another drive (same server)
Cluster continuous Replication – holds the replication of information across the server
Single Copy Cluster – configured in SAN, DAS, and ISCSI etc. NAS not supported
Snapshot Backup – supported by third party vendors

6. What is Exchange Management Shell?


It is a command line utility introduced in Exchange server 2007, which provides an administrator the ability to
configure, administer, and manage an Exchange 2007 server environment using text commands instead of solely
a graphical user interface (GUI).

7. Name the Exchange server 2007 Roles?


Edge Transport Server Role – replaced the frontend server, function as firewall
Hub Transport Server Role – replaced the bridgehead server, handles message routing
Client Access Server Role – introduced newly, handles the client connection
Mailbox Server Role – replaced the Backend server, holds the mailbox
Unified Messaging Server Role – messaging solution for mobile devices, OVA etc

8. Explain Edge Transport Role?


The Edge Transport Server Role is to transfer mails from inside of your organization to the outside world. This
role installed on the edge of your network (perimeter Network). Main purpose is to prevent your exchange
server from all kinds of Attack. Must have ports 25 (SMTP) and 50636 (LDAPS) open from it to the hub
transport server on the internal LAN. Port 25 is to send mail in. Port 50636 is to replicate the Exchange
information that it needs, such as changes to users’ safe and blocked senders lists

9. Explain Hub Transport Role?


The Main Purpose of the Hub Transport Server Role is to transfer the mails throughout you exchange, This
server role is responsible for internal mail flow, This Server role replace the bridge head servers of Exchange
server 2003. This can be used as an edge transport server in Smaller Organization. This must be the first role
installed in Exchange 2007. You can install the client access server role and the mailbox server role at the same
time as the hub transport role, but not before.

10. Explain Client Access Server Role?


The role that handles client requests for OWA, Outlook Anywhere, ActiveSync, OVA and offline address book
distribution. This role must be installed after the hub transport role and before the mailbox server role. You can
install the mailbox server role at the same time as the client access role, but not before.

11. Explain Mailbox Server Role?


Mailbox Server holds the Mailbox database and Public folder databases for your organization. It only retains the
mailbox and it won’t transfer your mails. Transferring mails between your mailbox server are handled by Hub
Transport servers. The mailbox server roles will be introduced only after the installation of Hub Transport
Server and Client Access Server Roles. If we are installing Mailbox server with the clustering options Like
CCR, SCC, or SCR, then no other server roles to be installed with this server role.

Page 3 of 59
Exchange Server

12. Explain Unified Messaging Server Role?


Functions as the interface point for the VOIP gateway or IP-PBX phone system. This Role uses the user
mailboxes to be the single point for storage and access of voice mail and fax messages, in addition to their
normal email.

13. Difference between Standard and Enterprise edition of Exchange server


If we choose Enterprise Edition, We can have
Exchange Server 2007
50 storage group / 5 Database in single storage group – Maximum of 50 Database, Recommended having 1
database per storage group
Exchange Server 2003
4 Storage Groups / 5 Database in single Storage group – Mailbox database and Public Folder Database can be
combined
If we choose Standard Edition, We can have
Exchange Server 2007
5 storage group / 5 Database in single storage group – Maximum of 50 Database, Recommended having 1
database per storage group
Exchange Server 2003
1 storage group / 2 Database (Mailbox & public folder database) in single storage group – In which contain 1
Mailbox Database and 1 Public Folder Database

14. What are the supportable client connections available in Client Access Server?
Outlook Web Access (OWA)
Exchange ActiveSync
Outlook Anywhere (formerly RPC over HTTP)
Post Office Protocol 3 (POP3)
Internet Message Access Protocol (IMAP4)

15. What are the two special services available in CAS?


Auto discover service—The Auto discover service allows clients to determine their Synchronization settings
(such as Mailbox server and so on) by entering in their SMTP address and their credentials. It is supported
across standard OWA connections.
Availability service—The Availability service is the replacement for Free/Busy functionality in Exchange
2000/2003. It is responsible for making a user’s calendar availability visible to other users making meeting
requests.

16. What is OWA?


OWA is to access the mail via browser from outside the corporate network. The Outlook Web Access (OWA)
client is now nearly indistinguishable from the full Outlook client. The one major component missing is offline
capability, but nearly every other Outlook functionality is part of OWA.

17. What is Exchange Active sync?


ActiveSync provides for synchronized access to email from a handheld device, such as a Pocket PC or other
Windows Mobile device. It allows for real-time send and receives functionality to and from the handheld,
through the use of push technology.

18. What is Outlook Anywhere?


Outlook Anywhere (previously known as RPC over HTTP) is a method by which a full Outlook client can
dynamically send and receive messages directly from an Exchange server over an HTTP or Hypertext Transfer
Protocol Secure (HTTPS) web connection. This allows for virtual private network (VPN)–free access to
Exchange data, over a secured HTTPS connection.

19. What is POP3?


The Post Office Protocol 3 (POP3) is a legacy protocol that is supported in Exchange 2007. POP3 enables
simple retrieval of mail data via applications that use the POP3 protocol. Mail messages, however, cannot be
sent with POP3 and must use the SMTP engine in Exchange. By default, POP3 is not turned on and must be
explicitly activated.

Page 4 of 59
Exchange Server

20. What is IMAP4?


Legacy Interactive Mail Access Protocol (IMAP) access to Exchange is also available, which can enable an
Exchange server to be accessed via IMAP applications, such as some UNIX mail clients. As with the POP3
protocol, IMAP support must be explicitly turned on.

21. How Messages Get to Exchange from the Internet?


To follow the flow of messages in an Exchange 2007 environment with all of the various
Server roles, the following flow occurs:
An incoming message from the Internet first goes to the Edge Transport server.
The Edge Transport server performs first-level recipient validation as well as spam and virus filtering. The
message is then passed on to the Hub Transport server.
The Hub Transport server performs compliance content assessment and then looks at the internal routing for
messages and forwards the message to another Hub Transport server or directly to a Mailbox server.
The Mailbox server places the incoming message into the user’s mailbox and notifies the user that a message
has arrived.
The user launches Outlook, OWA, their Windows Mobile device, or another client System and connects to the
Client Access server. The Client Access server confirms the destination point of the user’s mailbox and provides
the user access to their mailbox data.
In parallel, if a voice mail message comes in for a user, the Unified Messaging server processes the incoming
voice message, and then takes the message and places the voice message into the user’s mailbox residing on the
Mailbox server for the recipient.

22. What is Mail Exchange Record?


A mail exchange (MX) specifies a mail forwarder or delivery server for SMTP servers. MX records are the
cornerstone of a successful Internet mail routing strategy.

23. File structures in exchange server 2007?


.CHK – check point file, keeps track of which transactional logs moves into database files. Keep on check the
log file entering the database in a current order
.LOG - 2 types of transactional logs –
1. Current Transactional log – eoo.log file which write the current transactions into transactional logs. If it
reaches 1 MB, it will rename the log file into E00000001.log
2. Transactional log – If Current Transactional log reaches 1 MB , it will rename the log file into E00000001.log
.EDB – Stores the database files
Temp.EDB – Temporary database file, which will process the transactional logs that are to be to write in .EDB
Database file
.JRS – Reserved Log files – if the size of the disk is full and you can’t write any mails as transactional logs these
files will help into action

24. Explain the difference between Exchange Management shell and windows Power shell?
The Exchange Management Shell is based on Microsoft Power Shell, which provides access to all .NET objects
and classes. When the administrator installs Exchange Server 2007, the setup program automatically installs the
.NET Framework and Power Shell. It also installs all the Exchange 2007 specific cmdlets.
The cmdlets were written by the Exchange 2007 team to perform Exchange-specific tasks.
There are over 350 cmdlets unique to Exchange and each cmdlet has its own set of help.

25. What is Viruses or Trojan horse messages?


Viruses have existed in the computer world long before the first email message was sent. However, just as email
provides users with an easy method of communication, it also is an extremely efficient method of spreading
malicious or troublesome code. Once considered the largest problem that email administrators had to face,
viruses have been combated by an entire industry devoted to their prevention.

25. What is Spam?


The proliferation of unsolicited messages, often referred to as “spam” mail, has truly become the bane of the
messaging world with recent estimates stating that spam accounts for 85%–90% of the messaging traffic on the
Internet today. These unsolicited, usually unwanted, and often offensive advertisements cost companies and
users billions of dollars annually in lost time and productivity. Unfortunately, because sending bulk messages to
thousands (or millions) of recipients can be accomplished with very little expense, offending companies do not
need a large response to maintain profitability. It is sad to note that as long as this method of advertising is

Page 5 of 59
Exchange Server

profitable and effective, spam will be with us to stay. Fortunately, Exchange 2007 has several features to help
alleviate the problem.

27. What is Address spoofing?


One tool that is commonly used by the distributors of both viruses and spam is known as address spoofing. By
changing the From line in a Simple Mail Transfer Protocol (SMTP) message, users can often be fooled into
opening a message that they think is from a friend or co-worker, only to find that the message originated
somewhere else entirely. This method has been especially effective in the distribution of email worms. Because
the message appears to come from a known associate, and often has an intriguing Subject line, the unwitting
recipient opens the message and, if not properly protected, becomes a distributor of the virus to others.

28. What is Phishing?


Over the past several years, a relatively new type of fraudulent email has emerged. Known as phishing, this
attack comes in the form of an official looking email message, often appearing to be from a reputable
organization, such as a credit card company or a large electronics retailer. The message usually contains a link
that, once clicked, brings up an official looking website—often an exact replica of the official site that is being
mimicked. However, the fraudulent site has one purpose, to fool you into giving away personal information,
such as passwords, credit card numbers, or Social Security numbers. With this information in hand, the
offending party can steal your identity, make charges to your credit card, or otherwise profit from your loss.

29. What are the planning considerations in installing Edge transport Server?
Edge Transport Should not be included in Active Directory
Should be installed in a Standalone Server
Edge Transport Should not be Part of the domain
ADAM Should be installed
Pre requisites .Net framework, Windows Management Shell, MMC 3.0 to be installed
Two networks cards

30. What are the options available in Edge transport Server to configure?
Anti Spam / Anti Virus
Transport Rules and Accepted Domain
Address Rewriting

31. What is Edge Sync in Exchange Server 2007?


Edge Sync – it’s a one way replication from Hub Transport Server to Edge Transport Server, while Edge Sync
happens the recipient configuration will be replicated from Active Directory to ADAM in Edge Transport
Server

32. What is Address Rewriting?


Address Rewriting Agent runs in Edge Transport Server. The main purpose of Edge Transport Server is to
rewrite the Address the address to some other address. This plays an important role, consider if there are 5 Sub
domain inside a forest and the entire sub domain want send mail outside with a unique address space.

33. What happen if mails come into exchange server?


Once the mail comes into the exchange server it writes the mails as transactional logs and also the same in
system memory simultaneously. What the transactional log will do in the sense, it will hold the mails for a while
until the mailbox database is freed up. The transactional logs are 1 MB in size and if the mail comes with size of
5 MB, the transaction log will first write the 1Mb log and creates a another transactional log, it will write the log
files until the mails have completed.

34. Suggest a good Storage solution for Exchange Server?


Operating System: System files to be backed up. RAID 0 or RAID1
Database Files: if we move the database to different disk and if you are making backup the transactional logs
will be added into the Backup. Provides better recoverability, RAID5 (Stripe set with Parity)
Transactional Log Files: in order to handle load, it’s good to have Transactional log files in different disk. If
both the log file and database file are in same disk, increase performance and reliability. RAID1 (Mirroring)

35. What are the preparation switches used in while installing exchange Server 2007? Why?
/prepare legacy exchange permissions – when we are having exchange 2000 or 2003 in our existing
environment

Page 6 of 59
Exchange Server

/prepare schema – this will add various objects and attributes related to that object
/prepare AD – prepare the current domain and prepare a universal security group for the new exchange 2007
installation
/prepare domain “domain name”– only in the domain on the remote sites, or in the different domain going to
have Exchange Server 2007

1. What is Exchange Server?


Exchange Server is a Microsoft’s Messaging system which provides Industry leading Email, calendaring and
unified Messaging

2. Tell me a bit about the capabilities of Exchange Server.


Outlook Anywhere (OWA)
Mailbox can sync with Blackberry Device.
Calendar Sharing.
MAPI & POP3 Client support

3. What are the different Exchange 2003 versions?


Exchange server 5.5
Exchange Server 2000
Exchange Server 2003
Exchange Server 2007
Exchange Server 2010

4. What are the differences between Exchange Sever 2003 Standard and Enterprise Editions?
Following are the difference between Exchange server 2003 Standard and Enterprise Edition.
Feature Standard Edition Enterprise Edition
Storage groups support 1 storage group 4 storage groups
Number of databases per storage 2 databases 5 databases
group
Individual database size 16 gigabytes (GB) Maximum 16 terabytes, limited only by
hardware
Exchange Clustering Not supported Supported
X.400 connector Not included Included

5. What are the main differences between Exchange 5.5 and Exchange 2000/2003?
Exchange 2000 does not have its own directory or directory service; it uses Active Directory instead.
Exchange 2000 uses native components of Windows 2000 (namely, IIS and its SMTP, NNTP, W3SVC and
other components, Kerberos and others) for many core functions.
SMTP is now a full peer to RPC, and is it the default transport protocol between Exchange 2000 servers.
Exchange 2000 supports Active/Active clustering and was recently certified for Windows 2000 Datacenter.
Exchange 2000 scales much higher.
It boasts conferencing services and instant messaging.

6. What are the minimum hardware requirements for Exchange Server 2003?
Processor – Pentium 133 MHz
Operating System – Windows 2000 SP3
Memory – 256 MB
Disk Space – 200 MB for system files and 500 MB where Exchange Server installation.
File System – NTFS

7. What are the steps involved in Exchange Server installation?


Prerequisites Installation – ASP .Net, IIS, SMTP, NNTP and WWW services Installation
Forest Preparation
Domain Preparation
Exchange Server 2003 Installation

8. Why not install Exchange on the same machine as a DC?


The main reason behind not to install Exchange Server is, when we used to restart the Exchange server for any
reason it will take lot of time to shut down the Exchange Server services.

Page 7 of 59
Exchange Server

9. Which Services must be installed and running for Exchange Server installation?
Following are the services that should be installed before installing Exchange Server 2003
ASP .Net
Internet Information Service
SMTP
NNTP
WWW

10. What can you do and what will be the effect if ASP.NET service is not available while installing Exchange
Server 2003?
ASP .Net files are important for authentication, delegation and securing the web publication. Before installing
exchange Server 2003 ASP .Net should be installed

11. What are Exchange Server 2003 deployment tools?


The Exchange Server 2003 Deployment Tools are a compilation of old and new Microsoft Product Support
Services (PSS) support tools that you can use to prepare Microsoft Exchange Server 5.5 and the Microsoft
Active Directory directory service infrastructure for the installation of Microsoft Exchange Server 2003.
Installation and Upgrade Prerequisites
Enabling Windows Services
DCDiag Tool
NetDiag Tool
ForestPrep
DomainPrep

12. What are the Windows versions supported by Exchange Server 2003?
Windows 2000 Service pack 3 ( Standard, Enterprise and Datacenter Edition)
Windows 2003 Service pack 1 ( Standard, Enterprise and Datacenter Edition)

13. In which domains domainprep must be run?


The Forest root Domain
All domain that will contain Exchange Server 2003
All Domain that will contain Exchange Mailbox enable objects.

14. What is ForestPrep?


Forest prep updates the schema and configuration partition in Active directory. Extend the schema to include
Exchange server 2003 specific classes and attributes
To run the Forest Prep, Administrator should have Schema and Enterprise Admin permission over the Domain

15. What is DomainPrep?


Domain Prep prepares the Domain partion in Active Directory. Forest prep should be run only once in forest
where Domain Prep should be run in following Servers.
The Forest root Domain
All domain that will contain Exchange Server 2003
All Domain that will contain Exchange Mailbox enable objects

16. Which two groups are created by DomainPrep?


The domain prep switch creates the groups and permissions required by exchange Server 2003. Two security
groups created
Exchange Enterprise Servers – Domain Local group contains all Exchange Server in a forest
Exchange Domain Server – Global Group that contains all Exchange servers running in the Domain that you
have selected.

17. What DomainPrep does?


Domain Prep Updates the Domain partition and Creates a Two New Security Groups for Exchange Server 2003
Exchange Enterprise Servers
Exchange Domain Servers

19. How to run ForestPrep?


Go to the Command prompt and Type the following
D:\setup\i386\setup.exe /forestprep

Page 8 of 59
Exchange Server

Where D drive represents the CD drive.


Note: it will ask for the Administrator Account that has the required permission to run the Setup.

20. How to run DomainPrep?


Go to the Command prompt and Type the following
D:\setup\i386\setup.exe /domainprep – Where D drive represents the CD drive.

21. Which service pack is needed for Windows 2000 for installing Exchange Server 2003?
Windows 2000 service pack 3 in needed to install Exchange Server 2003

22. Which permissions are required to run ForestPrep?


Schema Administrator
Enterprise Administrator
Local Machine Administrator

23. Which permissions are required to run DomainPrep?


Domain Administrator and Local Machine Administrator

24. Which permissions are required to install Exchange server 2003 on the first server in a domain or on other
systems within the domain?
The administrator Account should have the following permission to install the Exchange Server 2003
Schema Administrator
Enterprise Administrator
Domain Administrator
Local Machine Administrator

27. What is location of Exchange Server Setup Progress?


C:\Program Files\Exchangesvr

28. How unattended installation of Exchange Server 2003 works?


Unattended installation are useful for rapidly deploying subsequent Exchange Server 2003 installation into an
existing organization.
The process of creating the file is essentially the same as the process for a manual setup selecting the component
you want to install and the installation path, choosing whether to create a new organization or to join existing
one; agreeing the license and so on.. Instead of doing manual installation the Exchange installation wizard
writes the configuration file to .ini file. specifically for use with the /unattendfile setup switch to start the
installation.

29. When you can use the unattended installation of Exchange Server 2003?
1. Unattended Installation of Exchange Server 2003 is very useful when you are going to install Exchange
Server remotely.
2. It’s also useful when you are deploying number of New Exchange Server in Existing Organization. We can
save time deploying multiple servers by automating the Entire installation procedure

30. When you cannot use unattended installation of Exchange Server 2003?
An Active Directory Forest can support only a single Exchange Server 2003 organization, so an un attended.ini
file that is used to create an organization cannot be used for subsequent installation.

31. What is the command to create an answer file for unattended installation of Exchange Server 2003?
D:\setup\i386\setup.exe /createunattend c:\unattend.ini
Where D represents the CD ROM drive that holds the Exchange Server and C drive represent the created
unattended file for installation

32. What is the command to start the unattended installation of Exchange Server 2003?
D:\setup\i386\setup.exe /UnattendFile c:\unattend.ini
Where D represents the CD ROM drive that holds the Exchange Server and C drive represent the created
unattended file for installation

Page 9 of 59
Exchange Server

33. When you can specify the User account that will receive the Exchange Full Administrator permission?
After installing the exchange Server 2003, we can able to specify the administrative permission for particular
user. We can delegate administrative permission by right click the Exchange organization and select delegate
Administration permission.

34. Which account must be use to perform first Exchange installation?


A new dedicated service account specifically for Exchange server installation has to be created in Active
Directory and the following permission are to be assigned the newly created user.
Schema Administrator
Enterprise Administrator
Domain Administrator
Local Machine Administrator

35. Can Exchange 2000 servers run on Windows Server 2003?


No, the only version of Exchange server that will run on Windows server 2003 is Exchange Server 2003, you
will need to upgrade your Exchange environment to Exchange Server 2003 prior to upgrading the Windows
Server Operating System to Windows server 2003

1. Which services are not supported and hence, need to be removed from an Exchange 2000 Server before
performing an upgrade to Exchange Server 2003?
Following are the Exchange Server 2000 functionality that isn’t supported by Exchange Server 2003
Instance for Messaging Service
Microsoft Chat Service
Key management Service
And connectors for Microsoft Mail and Lotus CC:Mail
Above Service has to uninstalled while upgrading from Exchange Server 2000 to Exchange Server 2003

2. While upgrading from Exchange 2000 to Exchange 2003 which servers must be upgraded first? Front-end
server or back end server?
You must upgrade the front end servers prior to upgrading the corresponding back end server while upgrading
from Exchange 2000 to Exchange 2003.

3. How to migrate from an old Exchange 2000 Server organization to a new Exchange Server 2003
organization?
Exchange Migration wizard is the process to Migrate Exchange 2000 organization to Exchange server 2003
organization. Similar to migrating Organization from Exchange 5.5

4. How to move users from Coexistence of Exchange 5.5 to Exchange Server 2003?
Active Directory Migration Tool and the Exchange Migration wizard will perform the complete moving of users
from Coexistence of Exchange 5.5 to Exchange Server 2003

5. How to migrate from an old Exchange Server 5.5 organization to a new Exchange Server 2003 organization?
There is no in place upgrade, first we have to update Exchange 5.5 to Exchange 2000 and from there we have to
migrate it to Server Exchange 2003. The existing users Source Domain has to be first migrated to the new target
domain in another Active Directory forest. After that you can begin the Exchange 5.5 to Exchange server 2003.
Exchange Migration wizard is the process to Migrate Exchange 5.5 organization to Exchange server 2003
organization.

6. Which messaging systems does the Exchange Server 2003 Migration Wizard support?
Ms Mail for PC Networks
CC:Mail
Microsoft Exchange 5.5
Lotus Notes
Novel GroupWise 4.x
Novel GroupWise 5.x
Internet Directory (LDAP via ADSI)
Internet Mail (IMAP4)

Page 10 of 59
Exchange Server

9. How can Exchange Server 2003 share calendar/address lists with Novell GroupWise?
The connectors for Lotus notes and Novel GroupWise only synchronize mailbox and user account data. You
must use calendar connector in conjunction with the other connectors to synchronize calendar data.

10. What are the requirements for Novell Group Wise connector?
The following list is the configuration requirements needed on the Exchange Server side:
Configure a working Novell GroupWise environment with API Gateway version 4.1 or later
Configure a working Exchange Server 2003 connector server
Make sure Exchange Server can resolve the name and access the Novell Netware server that is running API
Gateway
Enable Exchange Server to Novell Netware server connectivity by using Gateway Services for NetWare
(GSNW) or Novell NetWare Client for Windows. NDS authentication is needed to access NetWare Volumes
(shares).
Activate GroupWise address type on the Exchange Server 2003 recipient policy.

11. What are the tools to validate Exchange Server 5.5/Exchange Server 2003 coexistence?
ADCConfigCheck – It checks that Exchange Server 5.5 directory config objects have been copied to Active
Directory. Writes outputs to Exdeploy.log
ConfigDSInteg – checks objects in AD to ensure that no problems have arisen since the last installation of ADC.
Writes outputs to Exdeploy.log
ReceipientDSInteg – checks all recipient objects in AD looking for problems. Recipient includes users, groups,
contacts or public folders
PrivFoldCheck – uses exchange 5.5 directory service/Information store consistent adjuster to ascertain the
Information store and directory are in sync

12. What is DSScopeScan Tool Group?


DSScopeScan Tool Group used to find out information about the exchange server 5.5 organizations prior to
setting up connection between exchange server 5.5 and new Exchange server 2003. Tool should be run with the
account that has administrative permission.

13. Which tools are included in DSScopeScan Tool Group?


This includes four important tools
DSconfigsum – reports the number of exchange server 5.5 sites and server per sites.
DSObjectsum – reports the number of public folders. Distribution list and contact object
Useraccount – exports the number of users in the exchange server 5.5 site and in the directory
Vercheck – check if a server exists with exchange server 5.5 sp3.

14. Before upgrading from Exchange 2000 server to Exchange Server 2003 which service pack must be applied
to Exchange 2000 server?
Before upgrading from Exchange server 2000 to Exchange Server 2003 update the windows 2000 server with
SP3 or later. And also with Exchange 2003 server sp3 or later
15. How to upgrade from Exchange 5.5 to Exchange server 2003?
Exchange 5.5 cannot be upgraded in-place, you must first upgrade to Exchange 2000 server and then to
Exchange Server 2003. Or install Exchange Server 2003 on a different server and move the Exchange server 5.5
resources to the new server.

16. What are the steps involved creating coexistence between Exchange Server 5.5 and Exchange Server 2003?
Install the Basic prerequisites like SMTP, NNTP and WWW services
Start the Exchange Deployment tools wizard, select co existence with mixed mode Exchange 2000 and
exchange server 5.5
Select the option to install upgrade the first Exchange Server
On the next deployment tools wizard, check all the steps are done and start the setup. On the setup installation
perform the following option
Install Exchange server 5.5 administrator
Select the option to create a new organization or existing one.
Finish the setup

21. Which steps are involved in removing a connector to install it on another Exchange Server 2003 computer?
First you need to stop the connector services
Remove the connector

Page 11 of 59
Exchange Server

Use the Active directory user and computers console to delete the contacts that the connector has imported in
the directory
You can reinstall lotus or Novel GroupWise connector

21. What is Active Directory Connector (ADC)?


ADC it’s a Microsoft Exchange Server 2003 Service that allows for the replication of information from Active
directory and a Microsoft Exchange 5.5 directory

22. What is Connection Agreement?


It is used by Active directory connector to control replication between Active directory and Exchange 5.5
directory. Connection agreements can be used to replicate from exchange 5.5 to Active directory and vice versa.

1. What types of permissions are configurable for Exchange?


Exchange full admin – full control over the exchange organization including permission
Exchange Admin – Manage everything within the organization except org permission.
Exchange view only administrator – read only administrative access to Exchange organization

2. Which of the privileges does the Exchange Administrator role have?


This Role has the ability to administer all configuration details of the Exchange organization and ability to
modify permission

3. What are the modes of Exchange Server 2003?


There are two modes in Exchange server 2003
1. Mixed Mode – If Exchange 5.5 exists and in future gain to have Exchange 5.5
2. Native Mode – if only Exchange server 2003 running in your organization

4. What are the benefits of running Exchange Server 2003 in native, rather than mixed mode?
There are lot of benefits which includes,
Greater flexibility for defining routing groups and Administrative \groups
Ability to move mailboxes
Configure both routing and administrative groups independent of each other
We can create query base distribution group

5. When Exchange Server 2003 Mixed mode is used?


By default exchange server in Mixed mode, we can have mixed mode in situation where Exchange server 5.5
situated in our Exchange organization. Mixed modes are used to have backward compatibility with Exchange
server 5.5 and sites

6. When Exchange Server 2003 Native mode is used?


We can choose this option if No Exchange server 5.5 present in our Exchange organization and make sure that
all the exchange servers are Exchange server 2000 and Exchange server 2003. Native mode allows
administrative groups and Routing Groups to be configured independent of each other

7. Can you switch Exchange Organization from native mode to mixed mode?
yes we can change Exchange organization from Mixed mode to Native mode and changing the mode form
Mixed to Native is onetime, one way process and it cannot be reversed

8. How to switch Exchange Organization from mixed mode to native mode?


We can accomplish this by Exchange system Manager, by right clicking the Exchange organization name at the
top of the window and click properties. On the New window click the change Mode option. This changed mode
option will be unavailable if you are already in Native mode.

10. What is Clustering?


It’s a technique for providing hardware and software redundancy for an application like exchange server 2003,
with clustering you can ensure there is no single point of failure with your server hardware that would results in
email services going offline. Clustering allows you to bring one node for maintenance by allowing other nodes
to continue functioning.

11. What is Network Load balancing?

Page 12 of 59
Exchange Server

It is a resource (server-aware) clustering technology. Primary purpose to load balance by distributing the TCP/IP
traffic among each server node in cluster. To client computers, the cluster is seen as a single resource and is
address by a single IP

12. What are the advantages and disadvantages of Network Load Balancing?
Advantages
No special hardware required
Cluster can use different operating system
Clusters are to be member of domain or perimeter
Disadvantages
NLB uses hear beat to communicate between cluster, if a server goes offline. It sent 5 heart beats and if no
response and if client if a client is requesting a request then it neglect the request
Work only with TCP/IP. It will not consider network link protocol

13. What is Failover?


Its related to cluster servers, it refers to the ability to of a backup server to immediate begin servicing requests if
a primary server fails, without an interruption in servicing user request

14. When Failover occurs?


Failover occurs when a primary server fails to function, this failback automatically process the service request to
secondary servers which is already clustered.

15. What is Failback?


Fail back defines how failed over application services are moved back to original server node, once the node is
back online

16. How Failback occurs?


By default, cluster groups that failover to another node do not automatically failback. In Failback policy we can
configure the allow failback option to take place immediately or over a certain period
To make a failback occur, we have to create a failback policy to occur immediately or over a certain period

17. What are the different clustering options in Exchange 2003?


Exchange server 2003 supports two types of clustering option which is already supported by windows server
2003
1. Network Load balancing – server aware clustering technology , load balance by distributing the TCP/IP
traffic among each server node in cluster. To client computers, the cluster is seen as a single resource and is
address by a single IP
2. Cluster service – application or service aware clustering technology, provides continual application service
availability through failover and failback

18. Name the exchange server 2003 clustering configuring option


Single node server cluster – can be configured with or without external cluster storage device. For this clusters
without an external storage device, the local disk in configured as the clustered storage device
Single Quorum device server cluster – have two or more nodes and are configured so that every node is
shared to one or more shared devices. Cluster configuration is stored in single cluster storage device, known as
quorum device.
Majority node set server cluster – have two or more node and are may or may not be attached to one or more
cluster storage devices. Cluster configuration data is stored on multiple disks across the cluster

19. Which service pack is required for installing Exchange Server 2003 Clustering on Windows 2000
Server?
Windows 2000 server SP4 is needed

20. Why SP4 is needed for Windows 2000 server for Exchange Clustering?
If you Know the answer, please help to Me publish

21. How many nodes are supported with Exchange Server 2003 clusters?
Exchange Server 2003 supports Two Node active/active clusters and up to eight-node active/passive clusters
with at least one passive node

Page 13 of 59
Exchange Server

22. What are the hardware requirements for a cluster server configuration?
Network components
Each server node the cluster has two static IP address ( public or private) with one net bios name
The cluster itself has a primary static IP and NETBIOS Name
Each exchange virtual servers have a static IP and NETBIOS Name
Disk Components
1. Quorum Disk resource – maintains configuration data.
For Example: For a 4 Node cluster
Server hardware
Four 1 gigahertz (GHz), 1 megabyte (MB) or 2 MB L2 cache processors
4 gigabytes (GB) of Error Correction Code (ECC) RAM
Two 100 megabits per second (Mbps) or 1000 Mbps network interface cards
RAID-1 array with two internal disks for the Windows Server 2003 and Exchange Server 2003 program files
Two redundant 64-bit fiber Host Bus Adapters (HBAs) to connect to the Storage Area Network
Local area network hardware
Two 100 Mbps or 1000 Mbps network switches (full duplex)
Storage Area Network hardware
Redundant fiber switches
106 disk spindles (Ultra Wide SCSI) with spindle speeds of 10,000 RPM or greater
256 MB or more read/write cache memory
Storage groups and databases
Three storage groups per Exchange Virtual Server
Five databases per storage group

23. What is purpose of Exchange Server Clustering?


The purpose of Exchange Server Clustering is to prevent the Exchange server from going offline.

24. What is the version of Windows Server 2003 required for Exchange Server 2003 Clustering?
The cluster service requires windows server 2003 enterprise edition or windows server 2003 Datacenter edition.
Up to eight node clusters are supported

25. What is Heartbeat?


Heart beat is a special type of network packet that is sent out to each server node participating in a cluster to
determine the responsiveness of a node. Server nodes that do not respond to heart beat packets for a
configurable period of time are marked a inactive

26. What are the different numbers of nodes with different type of operating system for Exchange Server
2003?
Windows server 2003 standard edition supports 4 nodes
Windows server 2003 enterprise edition or windows server 2003 Datacenter edition supports up to eight node
clusters

27. What are the different cluster models?


Two types of cluster models are there
Active/Active – limited to two nodes and both the nodes are active at the same time, limited to 1900 concurrent
client connection at a time
Active/Passive – supports more than two nodes and highly reliable. Recommended by Microsoft.

28. Which are the Cluster operations modes?


N-Node failover server pairs – applications are configured to failover only between two specified server pairs
N+I Hot-Standby Server – commonly referred to as active/passive mode, on two node cluster, one node
process the client request and the second node monitors the first node. where N – Active node, I – Passive Node
Fail over Ring – Active/Active – all servers are active and process the client request, when one node fails the
cluster, failover the cluster to another active node. Administrator has to define the failover
Random Failover – similar to failover ring, if a node fails the failover is randomly changed to active node. The
Administrative burden of having a define failover is removed

29. What is teaming?


Teaming is the process included in clustering service, where multiple adapters are joined through software to
function as a single unit, with a single MAC address and single IP address

Page 14 of 59
Exchange Server

30. Which settings must be configured for failover policies?


We can configure the number the times the node to failover (Threshold) during the period, which is defined in
hours

31. Which settings must be configured for failback policies?


By default, cluster groups that failover to another node do not automatically failback. In Failback policy we can
configure the allow failback option to take place immediately or over a certain period

1. What are Address lists?


A list used to organize the Global Address list into small, more manageable grouping. Address list in Microsoft
Exchange server 2003 are formed through administrator-defined Light weight Directory Access Protocol queries

2. What is Global Address List (GAL)?


Global Address List is the Primary Address list that contains all Exchange objects in the entire organization and
mail-enabled objects in the Microsoft Exchange server organization

3. Where from the GAL retrieved?


Global address list are formed through LDAP queries that filters the Mailbox enabled and mail enabled objects
from the Active Directory. The GAL retrieved from the Global catalog servers.

4. How default GAL is created?


When we are installing exchange server 2003, the default address list are created by sending LDAP queries to
Active directory users and groups and filters the users that are mailbox enabled and mail enabled.

What is Custom Address list?


Custom address list are the address list that we are creating by providing LDAP queries that filter and display
the Address list with respect to users or departments

5. What is Default Address list?


Default Address list are similar to Global Address List, but in a distilled manner.
The default address lists are automatically created when Exchange Server is installed and there is no
administration required.

6. What are the Default Address lists?


There are five Default Address lists. Following are the default address lists
All contacts
All groups
All users
Public folders
Default Global Address List

7. What is Offline Address List?


Offline Address list are not unique, that is they are not different address list than the regular online address list.
Offline Address list are used to make address list available to the users who are all not connected to network.
By default, Global address list is made to be default Offline Address List

8. What is the use of hiding a mailbox?


Hiding a mailbox is to prevent the E-mail address to appear in Global address List. If you are creating a mailbox
to receive updates form antivirus and you don’t want to show the Email address in GAL or preventing internal
users to send any mail to that particular mailbox from GAL

9. Where all the Exchange Address lists created and stored?


Exchange Address lists are created and stored in Active Directory container

10. What needs to be done so that the users on a mailbox store to be able to use an offline address list?
We have to assign a offline address list to a mailbox store on the properties of the Mailbox store

11. How to associate an offline address list to their mailbox store?


Right click a mailbox store, go to properties, browse next to offline address list, select the offline address list
that u want to assign to the mailbox store. Click ok to apply the offline address list to mailbox store

Page 15 of 59
Exchange Server

12. How many GAL can appear in user’s Outlook Address book?
Only one GAL appears in users outlook address Book

13. How to view the address list preview?


Right click an address list from the address list container, go the properties of the address list and select preview

14. How to create additional Global Address List?


Start Exchange system manger, expand the recipient container, right click the all global address list and point to
new global address list

15. How to create Custom Address list?


Start Exchange system manger,
Expand the recipient container, right click all Address list, point to new and then click Address list
For the custom Address list type a name, click filter rules and then click advance tab
From the field menu point to users and then department
On the condition field, select is exactly from the menu
Give the custom name, click add
Click ok and click finish

16. What is the difference between additional Global Address List and Custom Address List?
Global Address list contains the full address list for the Exchange organization and the Custom address list are
the address list that are created respect to that of our requirement

17. How to create a new offline address list?


Right click the Address list from the recipient container, point to new and then click offline address list
Type a name for the new offline Address list and then click browse to select a server to host the offline Address
list
After clicking next remove the default Global Address list form the list and if u want to add a particular address
list add it to the list
Click next and click finish

18. How to hide a User address from address list?


Go to active directory user and computers,
Go to the properties of the user that you want to hide from Address list. Navigate to Exchange Advanced Tab
Select the option to hide from Address list

19. How to hide Address list from users


Go to the properties of the Address list, point to security tab and select advanced button to open the advanced
setting
Browse the users or group and set deny permission to open the Address list

20. Which service is responsible for keeping the Exchange address lists up to date?
Recipient Update service is responsible for keeping the exchange Address list up to date

21. What is Recipient Update Service?


Recipient update service updates the email address and distribution list membership and replicates this
information on a schedule to other Microsoft Exchange Servers in the Domain

22. Besides keeping the Exchange address lists up to date, what other desirable function does the Recipient
Update Service perform in the Exchange organization?
It also updates the distribution list membership to other Exchange Servers inside the domain

23. What are the basic steps to troubleshoot RUS?


The first step in troubleshooting the Recipient Update Service, like most other services is to check the Event
Log, we are looking for the events that originated from the MSExchangeAL service.
The next step in troubleshooting the Recipient Update Service is to use ADSI Edit to check a mailbox that
should appear in the Global Address List. We need to check and see if the “showInAddressBook” attribute is
populated
If the “showInAddressBook” attribute is not populated, the Recipient Update Service may not yet have run, in
most cases manually forcing the Recipient Update Service to run will resolve the problems.

Page 16 of 59
Exchange Server

24. How to access the RUS?


1. Start System Manager
2. On the Start menu, point to Programs,
3. point to Microsoft Exchange, then click System Manager.
4. In the console tree, double-click Recipients.
5. In the console tree, right-click Recipient Update Services,

25. What is the default preconfigured schedule for RUS?


Always Run schedule is the preconfigured option for RUS

26. Which two different instances are created of the Recipient Update Service?
The following are the two instances created in Recipient Update service
Recipient Update Service (Enterprise Configuration)
Recipient Update Service (Active Directory Domain)

27. What is Recipient Update Service (Enterprise Configuration)?


The Enterprise recipient update service is responsible for updating Email address of the recipients objects
located in configuration partition of the domain controller

28. What is Recipient Update Service (Active Directory Domain)?


The Domain Recipient Update Service is responsible for updating recipient objects located in the Active
directory

29. What are the group types?


Two types of groups are the
Security Group
Distribution Group

30. What is Distribution Group?


A type of Microsoft Windows Server 2003 Active Directory group that is used to define e-mail distribution lists.
Distribution Group has no security context and cannot be used to grant permission to resources, but they are
useful for grouping users that share a common purpose, such as all employees at a branch location

31. How Distribution groups differ from Security groups?


Distribution Group has no security context and cannot be used to grant permission to resources. But security
groups can be used to assign permission on resources.

32. What is Security Group?


Security groups are the Microsoft windows Server 2003 Active Directory Group, with this group; we can assign
permission on a resource.

33. Can Security groups be used to distribute messages?


Security Groups can be mail enabled and also used as a Distribution group to distribute messages

34. What is Query-based distribution group?


This group enables you to use a LDAP query to specify membership in a distribution group dynamically. This
result is that membership is automatically determined by attributes of a user account, such as department,
reducing the amount of administration required to manage distribution list

35. What are the types of Group Scopes?


Following are the types of group scopes
Domain Local
Global Group
Universal

1. Why Exchange data should be backed up?


In today’s business environment, email is possibly the most used method of communication, and private and
public stores contain large volume of valuable information. In order to have safety and stability on this valuable
information we have to take back up the exchange data.

Page 17 of 59
Exchange Server

2. What are the types of Exchange Backup?


Full (Normal)
Daily Backup
Copy Backup
Incremental backup

3. What is Normal backup?


Full backup copies both the database and transactional log files. At the completion of full backup, transactional
logs that are committed to the database are deleted from the server. Perform everyday

4. What is Copy backup?


Copy backup same as the full Backup, except no file marling is performed. Copy backups are used to archived
data that can be stored offsite

5. What is Incremental backup?


Incremental backup performs backup on all selected data which are modifired after last backup. It removes the
archive bit, informs that backup has done on this

6. What is Differential backup?


Differential Backup backups all the selected data created or modified after the last backup. It does not remove
the archive bit. So when you performing differential back up on the next day, if will back up the whole thing
from the last backup

7. What is Daily backup?


Backup all the selected data, which are created or modified on daily basis.

8. What is Online Backup?


When performing Exchange Server 2003 online backup, all services, including the exchange store, continue to
run normally throughout the backup process. This allows continuing to access their mailboxes during backup
process, whether the backup process is incremental, differential or full backup.

9. Which files are backed up with Online backup?


Following are the files that are copied during the online backup, the .edb, .stm and log files that comprise the
exchange stored. After the online backup done it will check for corruption at the file system level.

10. After performing an online backup which tool you should use to determine whether the Exchange store is
corrupt?
Event viewer is the tool to use to determine whether the exchange store is corrupt. If you see a page read error,
there may be problem with the Database.

11. How to find out the most recent backup time?


Go to the properties of the Database in which you want to know the most recent backup time. On the properties
window it will show the recent backup time

12. What is Offline Backup?


Offline back up is not a recommended solution. To perform a offline backup you must dismount the mailbox
and public folder stores and then backup the database and transactional logs manually. However you may to
perform offline back if online backup fails

13. After performing an offline backup of your Exchange Server, which utility must you use to check for
corruption?
We can use backup logs

14. How to perform an online backup of a storage group?


Opening the Backup utility, on the backup and restore wizard click next
Select backup all files and settings and click next
On what to backup page, browse the Microsoft Exchange server and choose the Storage Group that you want to
backup
On the Backup type, destination and name click browse and enter the required information
On the completing backup page, click finish

Page 18 of 59
Exchange Server

15. What is the advantage of performing an online backup?


No need to stop database services
Users can access their mailbox during backup process
The database corruption is checked during the offline backup
The change of data loss is very less

16. How to backup the Exchange Store?


Opening the Backup utility, on the backup and restore wizard click next
Select backup all files and settings and click next
On what to backup page, browse the Microsoft Exchange server and choose the Storage Group that you want to
backup
Navigate the particular Mailbox store from the Storage Group and click next
On the Backup type, destination and name click browse and enter the required information
On the completing backup page, click finish

17. What are the components of system state data?


System state holds the Active directory data, Microsoft certificate cervices, site replication services etc

18. Can you perform differential or incremental backups on the databases with circular logging enabled?
We have to take full backup if circular logging is enabled. Because circular logging periodically deletes the
transactional logs

19. What are the methods for Exchange restoration?


Exchange 2003 has some nice features to prevent damage from a disaster or to recover Mailbox items and
mailboxes. Some of these features are:
Deleted item Recovery in Outlook
Mailbox Recovery through Mailbox Recovery Storage Group
Mailbox Recovery through Keep Deleted Mailbox for XX days
Mailbox Recovery Center

20. What are the methods of restoring an offline backup of exchange Database?
There are two methods to restore an offline backup of Exchange databases: a point-in-time restoration and a
roll-forward restoration.
The point-in-time method is used when a database is restored but no log files are replayed into the database. All
the data created after the backup is lost. This method is used to restore from an offline backup when circular
logging is enabled on the Exchange server. As circular logging reuses the log files, not all files required to
update the database are available. To perform restoration by using the point-in-time method, an administrator
must ensure that the databases to be restored are dismounted and consistent

21. What is recovery storage group?


You can restore Mailbox stores and individual mailboxes to a recovery storage group and then merge them with
the contents of the original stores are mailboxes. You cannot restore a public folder to a recovery storage group

22. What is Mailbox Recovery Center


The Mailbox Recovery Center is the weapon of choice when you accidentally delete a lot of Mailboxes.
You simply add the Mailbox store in which you have deleted the mailboxes to the Mailbox Recovery Center and
after the process has finished, you can see the deleted Mailboxes.
Mailbox Recovery Center

23. Can you restore Public folder store using recovery storage group?
Public folders cannot be restored with the use of a recovery storage group

24. How to restore a mailbox store?


We can restore a Mailbox store in 3 methods
Restoring Mailbox store by using Exchange System Manager
Make sure Mailbox deletion settings are already done.
Expand the Mailbox store go to the Mailboxes and run cleanup agent.
Right click the mailbox u want to recover and click reconnect
Restoring Mailbox store by recovery storage Group

Page 19 of 59
Exchange Server

The recovery storage group is a specialized storage group in Exchange 2003. After you restore a mailbox store
to the recovery storage group, use the Exmerge.exe tool to move the recovered mailbox data from the recovery
storage group to the regular storage group.
Restoring Mailbox store from backup to a recovery server
To recover a mailbox from backup, you must have a recovery server that has sufficient storage capacity to
install Exchange Server 2003 and to restore the private information store database. This server can be on the
same physical network as your production Exchange Server 2003 computer.

25. How to create a recovery storage group and add the database to restore?
Use the context menu of the server object to setup the recover storage group
Specify the transactional log and system path location
Add the database to be recovered to the recovery storage group by using the context menu of the recovery
storage group

26. How to restore individual mailboxes and messages?


Recovering individual mailboxes
Individual mailbox can be restored with the help of mail box retention period enabled on the mailbox store. By
default mailbox retention period is set to 30 days. And if a mailbox is deleted and if restoration is requested
within 30 days retention period then you can recover and reconnect that mailbox without restoring the entire
mailbox store
If the retention period has expired you have to restore by creating a recover server. You need to perform the
following tasks
Install recovery server in different active directory forest from the forest where original server is located
Install exchange server on a recovery server by using the same organization name
Recover the database to an administrative group in which legacy exchange Dn value matches the original server
Name the restore storage group and the restore logical database so that their name match the original storage
group and logical database names
Create a .pst file and move all data that you need to recover in to the .pst file
Open the .pst file on the original server and move the data back to appropriate location
Recovering messages
Exchange server 2003 performs backup and restore in page level rather than in mailbox level, so you cannot
easily restore individual messages in a mailbox from a backup.
You can allow users to retrieve messages from the delete items folder in outlook or OWA, to do so you have to
set the keep deleted items for certain days in individual user account setting from the Active directory users and
computers
Alternative you can create new mailbox policy using exchange system Manager. To recover deleted mails. User
has to point to the deleted items folder and use the recover deleted items option from the tools menu in outlook
or in OWA

1. What are the types of Exchange policies?


There are two types of Exchange policies:
Recipient policies
System policies

2. What is System Policy?


A system policy is a collection of configuration settings that you apply to one or more servers, mailbox stores,
or public folder stores. For example, to enable storage limits for your mailbox stores, you can define a single
policy and apply them to all mailbox stores in your administrative group.

3. What are the types of System Policies?


System policies are policies that control the configuration settings for Exchange server and information store
objects. System policies reside in the System Policies container. You can create and apply three types of system
policies:
Mailbox store policies
Public store policies
Server policies

4. What is Mailbox Store Policy?


Mail box store policies allow you to configure settings across mailbox stores. Like storage limits etc

Page 20 of 59
Exchange Server

5. What is Public folder store policy?


Public folder store policies allow you to configure settings across public folder stores. Like setting storage limits
on public folder store or individual public folder

6. What is Server policy?


Server policies allow you to enable message tracking options on servers.

7. What is Recipient Policy?


Recipient policy is the quick and effective way of defining different email address for users in your organization

8. What are the types of Recipient Policies?


There are two types of Recipient policies, Mailbox Management policy and Email Address policy

9. What are the ways to apply mailbox storage limits?


We can create a Mailbox storage limits settings by
Setting storage limits on individual mailbox stores
Setting storage limits by using mailbox store policies

10. Does the mailbox store policy override any mailbox storage limits that have been directly configured on the
mailbox stores?
Yes, the mailbox store policies override any mailbox storage limits that have been directly configured on the
mailbox stores

11. Can we manually configure mailbox store limits directly on an individual mailbox if mailbox store policy is
applied?
No we can’t do this. If we apply the mailbox store policy, the controls for individual user’s storage limits will be
disabled like this figure

12. What is Email Addresses Policy?


Email Address Policy is to change the Email Address for a particular user or a group or the whole exchange
organization.
This policy will be used when two companies are merging and they want to have different E-mail ID for some
reasons

13. How to create the System Policy container?


First we have to enable the Display administrative group from the properties of Exchange organization
Point to the Administrative Group, right click and select new to create a New System policy container

14. How to create the Mailbox Store Policy, Public Folder Store Policy or Server Policy?
Create a system policy container on the Administrative group

Page 21 of 59
Exchange Server

Point to the system policy container, from here we can create a New Mailbox store policy, public folder policy
or server policy

15. Which mailbox store properties can be controlled using mailbox store policy?
We can control the below properties

Default offline Address list


Default public folder
Enable or disable S\MIME setting
Storage limits
Deletion settings
Database maintenance setting

16. Which public folder store properties can be controlled using public folder store policy?

We can also have control on


Enable or disable S\MIME setting
Storage limits
Deletion settings
Database maintenance setting

17. Which server properties can be controlled using server policy?

Page 22 of 59
Exchange Server

We can control subject logging and message tracking in server policy properties window

18. How to access the Recipient Policies?


On the Exchange System Manager, point to the recipient container and from there point to Recipient policies

19. Which options are available with Mailbox Manager Settings (Policy)?
Following figure shows the available options for Mailbox Manager setting policy

20. How to remove the system policy from an object?


After the mailbox store policy is applied to the mailbox stores, you can no longer use the property pages of the
object to modify the settings controlled by the policy. To change the settings on the object, you must either
modify the policy or remove the policy.
To remove the mailbox store policy from a mailbox store:
Use Exchange System Manager and navigate to the system policy object in the system policy container.
In the properties of the system policy object, right-click the object that you want to remove from the system
policy.
Select “Remove from policy”
Removing a system policy from an object doesn’t remove the applied settings to the object. To override a
mailbox store policy, you can override policy settings manually on each mailbox or move the users to a different
mailbox store that has the other settings applied to it.

1. What is Public Folder?


Public folder is a collaboration feature of Microsoft Exchange Server that creates a repository of information
that is accessible to any user who has been granted permission to the folder. A public folder can contain mail
items calendar item, task items or custom forms

2. What is Default Public Folder Tree?


The default public folder tree is automatically created by the setup program when you install the first exchange
server 2003 and create your organization. It is listed as public folders in Exchange system Manager as public
folder and it is displayed as all public folders in outlook

3. How the Default Public Folder Tree is listed in Exchange System Manager and Outlook?
Default Public Folder is listed as public folders in Exchange system Manager as public folder and it is displayed
as all public folders in outlook

4. What protocols can clients use to access the default public folder tree in Exchange Server 2003?
Client can use MAPI clients or NNTP or HTTP protocols to access the default public folder tree

5. What is General-purpose public folder tree?

Page 23 of 59
Exchange Server

General-Purpose public folder trees are additional public folders that you can create. Similar to default public
folder tree, the general purpose public folder tree is replicated to each exchange server running Exchange 2000
or later that contains public folder store that associated with that tree.

6. What is the use of general purpose public folder store?


The general purpose of public folder tree is to store custom application
Another purpose of general public folder tree is to make the public folder available to users outside the
exchange organization

7. What protocols can clients use to access the General-purpose public folder tree in Exchange Server 2003?
This did not support MAPI clients. So it is not accessible to outlook users. Access only by NNTP or HTTP
protocols

8. What are the steps involved in configuring Public Folder replication?


In order to setup replication for the additional public folder,
First you have to create a public store on the destination server that holds the replica.
When you configure the public store, you associate the public folder store with public folder tree.
Even though you associate the public folder store to existing public folder tree, this by itself it won’t enable
replication.
Once you have public store on the destination server, you can configure public folder to replicate to other server

9. How does Public folder replication occur?


Exchange server 2003 uses multi master replication model, which means that all replicas of the public folder are
equal and contain the same content. A replica copied from one server to another will be a separate instance of
public folder and its content, because of this there is no master replica, which means modifications to one
replica will be replicated to other replicas equally.
Exchange Information Store service is the primary mechanism used for public folder replication; it is not the
only mechanism at work. Active Directory uses a replication method of its own to keep domain controllers
synchronized with each other. This replication occurs at the Windows operating system level and is completely
independent of Exchange Server.

10. Can Public folder be accessed using a uniform resource locator (URL)?
Yes we can access public folder via URL, example http://servername/virtualdirectory

11. What are the Exchange Public folder permission types?


Following are the Exchange server public folder permissions
Client permission – enables you to control the permission of users who are accessing the public folder
Directory rights – enables you to control which user can manipulate a mail enabled public folder object that is
stored in AD
Administrative rights – enables you to assign administrative permission to administrator to run administrative
utilities

12. Which services control the Public folder replication process?


Exchange Information Store service is the primary mechanism used for public folder replication Recipient
update service controls the recipient replication process
Note: Although the Exchange Information Store service is the primary mechanism used for public folder
replication, it is not the only mechanism at work. Active Directory uses a replication method of its own to keep
domain controllers synchronized with each other. This replication occurs at the Windows operating system level
and is completely independent of Exchange Server. Active Directory replication occurs even if Exchange Server
is not installed on the forest

13. Which processes are involved in Public Folder Replication?


Exchange Information Store service is the primary mechanism used for public folder replication; it is not the
only mechanism at work. Active Directory uses a replication method of its own to keep domain controllers
synchronized with each other. This replication occurs at the Windows operating system level and is completely
independent of Exchange Server. Active Directory replication occurs even if Exchange Server is not installed on
the forest

14. How to create the General Purpose Public folder tree?

Page 24 of 59
Exchange Server

You can have as many General Purpose Public Folder tree as necessary though you must associate the public
folder tree with the public folder store in order to use it
First you have to create a public folder tree using exchange system manger
Second you have to create a public folder store
Third you have to associate the store with the public folder tree.

15. How to create a full-text indexing on a public folder?


Expand the First administrative Group, navigate through server, first

16. What is the use of public store policy?


Storage limits and public folder replication settings can be configured through public store policy, through and
individual public store, or through individual public folders

17. What is public folder referral?


When a user connects to a public folder store and the store does not contain the copy of the contentment the user
is requesting exchange server 2003 automatically redirects the user to the server where the original content
resides. This is known as Public folder referral. Usually the public folder referrals with takes place within the
routing groups

1. What is Front-end Server?


A Front-End server is a Microsoft Exchange server 2003 configuration where servers are used for authentication
and fault tolerance.

2. What is Back-end Server?


A Back-End server is a Microsoft Exchange server 2003 configuration where servers are used to hold the users
data. There is no special configuration to designate a server as a Backend server.

3. What are the advantages of Front End and Backend architecture?


Unified Name Space can have single name space for multiple exchange servers
Reduced over head for SSL
Firewall – place the Back-end behind the firewall and allow only traffic from frontend

4. How to increase security of the communications between your front- and back-end Exchange servers?
We can increase the security of communication between your frontend and Back-end Exchange Server by
placing the Backend behind the firewall and allow only traffic from Front End

5. Which services must be disabled to increase the security of front-end servers?


Recipient Update services, offline address lists, the mailbox management service, and the free busy services are
not supported on front end server

6. Which server can be used in place of a front-end server?


ISA server can be used in place of a Front End Server

7. Which is the best clustering Technology for frontend and backend server?
Front-end best work with Network load balancing and Backend best works with the cluster services

8. How to configure Exchange Server 2003 to run as a front end server?


In the Exchange server, remove the Recipient update service and default offline Address list. On the server
container right click the server which you want to designate as a Front end server and go to properties and
designate the server by selecting this is a front end server. Click ok and finish

9. Does Exchange Server 2003 front-end server support Exchange 2000 back-end server?
Yes, Exchange Server 2003 front-end server support Exchange 2000 back-end server

Page 25 of 59
Exchange Server

10. Does Exchange 2000 front-end server support an Exchange Server 2003 back-end server?
Exchange 2000 Server can be used only as a back-end server in a front-end and back-end configuration.
However, Exchange 2000 Enterprise Server can be used as a front-end server or a back-end server in a front-end
and back-end configuration

11. What all ports are required by front-end server to communicate with back-end servers?
443 for HTTPS
993 for SSL-enabled IMAP
995 for SSL-enabled POP
25 for SMTP (including TLS)

12. What are the steps involved in troubleshooting front-end and back-end servers?
1. Make sure that all the appropriate services are started on the front-end and back-end servers. This includes the
relevant Exchange services in addition to the World Wide Web Publishing service and SMTP service,
2. If you have a perimeter network, make sure that the appropriate ports are opened
3. Ensure that the front-end server can successfully connect to the global catalog servers and DNS server.
4. If you cannot connect to the back-end server from the front-end server using the hostname with any protocol,
try to use the IP address. If this works, verify that you can connect to the DNS server the front-end server is
using. Also verify that the name to IP mapping is correct in DNS.
5. If the front-end server is configured with the list of domain controllers and global catalog servers in the
registry, verify that the front-end can reach each of those servers exactly as specified in the registry entry.
6. Make sure that the combination of IP address and host header is unique for each virtual server.
7. If you have a load balancing solution for the front-end servers, make sure that the shared IP can be reached
from client computers.
8. Administration: If you want to use Exchange System Manager, ensure that the System Attendant service is
running. Also recall that you cannot use the Internet Services Manager after deleting the stores on the front-end
server.
9. If users complain that the state of read and unread messages in public folders fluctuates, consider the
following:
Was a back-end public folder server added or removed?
Is authentication enabled on the front-end?
Are any back-ends that host the folder down?

13. Which port is used by front-end server to communicate with back-end server?
All communication between the Front-end and Back-end server are TCP port 80, regardless of the port used for
communication between the client computer and the front end server

14. What needs to be created on Exchange front-end server for SMTP access to the Exchange organization?
SMTP must be available on the front-end server to allow POP and IMAP clients to submit e-mail messages.
You can install SMTP on the front-end server or set up a separate SMTP server. To install SMTP on the front-
end server, configure SMTP for internal and external domains
Mail for Internal Domains
For the front-end server to accept mail that is inbound from the Internet, the front-end server needs to know the
domains for which it should accept mail. Adding recipient policies for each of your domains tells all servers in
the Exchange organization to accept mail for those domains. Additionally, you must enable anonymous access
for other SMTP servers on the Internet to successfully route mail to your organization (this is the default
setting).
Mail for External Domains
In the default configuration, any SMTP mail that is submitted to your server and addressed to external domains
is denied. This occurs because relaying is turned off for all anonymous access (however, authenticated users can
still send e-mail to any external domain). Users who try to anonymously submit e-mail to external domains
receive an error, such as “550 5.7.1 Unable to relay for suzan@adatum.com.” The clients must be configured to
use SMTP authentication.

15. What are the important Services that should run on Frontend server?
It depends on the services that we want the frontend server to function
WWW
POP3
Exchange system attend
Exchange Information store

Page 26 of 59
Exchange Server

IMAP4

16. What is Smart Host?


A Smart host is a common term for a server that accepts outbound mail and passes it on to a recipient
Smart host are used to connect Exchange Server to an external messaging system. Typical use of a smart host
involves relaying outbound SMTP email to a Non-Exchange SMTP host in perimeter networks, or to ISP or
hosted service that may offer functionality like mail relaying and spam and virus scanning

17. What are the considerations for deploying front end and backend server?
Do not cluster Frontend servers
One front-end server is reasonable for every four back-end servers. However, this number is provided only as a
suggested ratio and starting point
Load balancing is suitable for front end servers
Encrypt the communication between Frontend and Backend by IPSec

1. What are the tools to monitor Exchange Server 2003?


Following are the Tools to Monitor Exchange Server 2003
Event Viewer – Exchange Specific events are logged in application logs
Performance Monitor – view real-time Exchange server statistics
Exchange System Manager – enable Protocol logging for virtual server instance
Message Tracking center – view the message flow
Monitoring and status tool – monitor servers and connectors
Message queue viewer – view messages waiting to be delivered
MBSA – analyze security settings

2. What is the tool to diagnose queue problems?


Queue viewer is the Tool to diagnose queue problems. The queue viewer shows the protocol, queue state, and
the number of messages in the queue.

3. Where is Queue viewer located?


Queue viewer located at the Server container, following figure shows the diagram

4. What are the types of logs provided in the Event Viewer?


Application Log – events logged by applications or programs
System Log – events logged by the Windows operating system components
Security log – security events such as valid and invalid logon attempts
Directory Service log – Server directory service logs events
File replication service log – logs replication of files
DNS Server service log – events related to the Domain Name System (DNS) Server service

5. What are the types of Events?


Error - significant problem, such as loss of data or loss of functionality
Warning – not necessarily significant, but may indicate a possible future problem
Information – event that describes the successful operation of an application, driver, or service
Success Audit – audited security access attempt that succeeds
Failure Audit – audited security access attempt that fails

6. What are the types of events for Security log?


The Security log can record security events such as valid and invalid logon attempts as well as events related to
resource use, such as creating, opening, or deleting files. An administrator can specify what events are recorded
in the Security log.

7. Where are Exchange Monitors located?


Following figure shows the location of Exchange Monitor

Page 27 of 59
Exchange Server

8. Which additional items can be added for monitoring in Exchange Monitors?


We can configure Notifications and also we can see the status of the exchange servers that are running by using
the Monitoring and status tool

9. Where is Exchange Notification located?


Exchange Notifications are located at Monitoring and Status tool on the Tools container in Exchange System
Manager

10. What are the types of notifications?


Two types of Notification we can configure, they are
E-Mail Notification
Script Notification

11. What is Exchange Diagnostics logging?


Enable diagnostic logging for a server in Exchange System Manager to send Exchange event information to the
Event Viewer.
Enable diagnostic logging to log events related to authentication, connections, and client actions.
When troubleshooting, activate the category specific to the problem at a medium or maximum level.
Use Event Viewer to view the logged information.
Disable logging when not needed to improve performance and reduce the amount of information sent to the
Event Viewer

12. How to configure the Exchange Diagnostics logging?


Open Exchange System Manager.
Locate the Exchange server that you want to configure.
Right click the Exchange server and select Properties from the shortcut menu.
Click the Diagnostics Logging tab.
In the Services area of the tab, click service.
Select the appropriate entry in the Category area of the tab.

13. What are the four levels of logging available in Exchange Diagnostics Logging?
None - only critical events and error events are recorded.
Minimum - one entry is logged for each key task performed by the service.
Medium- for each action needed to execute a task, entries are logged.

Page 28 of 59
Exchange Server

Maximum – entries are logged for each line of code. The Maximum logging level should be enabled only when
you need comprehensive debugging information. This is due to the impact this logging level has on server
performance.

14. Where is System Monitor located?


System Monitor: The System Monitor utility is the main tool for monitoring system performance. System
Monitor can track various processes on your Windows system in real time. The utility uses a graphical display
that you can use to view current, or log data. You can determine resource usage by monitoring trends. System
Monitor can be displayed in a graph, histogram, or report format. System Monitor uses objects, counters and
instances to monitor the system.
Located in Performance Monitor on Administrative Tools container

15. What are the Useful Memory Counters to Monitor in System Monitor?
Pages/sec
Page faults/sec
Page inputs/sec
Page outputs/sec
Write copies/sec

16. What are the Useful Processor Counters to Monitor in System Monitor?
Process total
Process Interrupt
%Idle Time
% user Time

17. What are Performance logs and alerts?


Performance Logs and Alerts: By using the Performance Logs And Alerts tool included in the Performance
console, you can track the performance of the server by creating counter logs, trace logs, and defining alerts.
· Counter Logs: Counter logs collect data on the selected counters once a predefined interval has passed. A few
features of counter logs are listed below:
Collect performance data on the activities of system services.
Collect performance data on hardware usage.
Manually log data.
· Trace Logs: Trace logs differ to counter logs in that trace logs monitors data constantly and then records
performance data when a specific event occurs. The collected data is written to a trace log file.
· Alerts: You can configure alerts to be generated when a predefined counter reaches, exceeds or falls beneath a
defined threshold or value. When you configure alerts, you can specify that the following actions occur when an
alert condition is met:

18. What is the use of Nslookup?


NSLookup is to Query a DNS domain name server to lookup and find IP address information of computers in
the internet, like MX record details

19. What is the command to locate a SMTP server for a particular domain or to determine if the MX records
have been configured properly in DNS
To verify this use the below commands
NSLOOKUP
Set q =MX

20. How to identify if the problem is with smart host or exchange server?
Smart host are used to relay the mails outside of your exchange organization, if any problem in sending mails
outside and we can send mails within the organization then there is problem with smart host.

21. What could be the problem if incoming mail queue is becoming unmanageably large?
A large number of SMTP queues may indicate that there is either a denial of service attack, a lot of spam that is
leaving the server, or an Internet connection that may be down.

22. What are the counters to diagnose whether a global catalog server is the cause of a lengthening incoming
mail queue?

Page 29 of 59
Exchange Server

MSExchangeDSAccess Processes is the counters to diagnose whether a global catalog server is the cause of a
lengthening incoming mail queue

23. What is command to run dcdiag from another member server to check domain controller diagnosis?
Dcdiag /test:DNS /s:TargetDCName /v /f:LogFileName

24. Which tests are performed by dcdiag?


DNS: Checks the health of Domain Name System (DNS) settings for the enterprise.
CheckSecurityError: Locates security errors or errors that might be related to security problems, and performs
initial diagnosis of the problems.

25. What is ISinteg ?


Isinteg is a command-line tool that analyzes and makes some repairs to the Exchange databases. Use Isinteg for
problems similar to the following:
Users are continuously connecting to their mailboxes and keep getting disconnected.
Users report corruption within their mailboxes.
Users report error messages that are associated with the database not being able to be mounted.

26. What is ESutil ?


Eseutil is more powerful than Isinteg for repairing problems in the database. When using Eseutil:
· Dismount the stores you want to analyze. The Information Store must still be running.
· Common options with Eseutil include:
/d to perform an offline defragmentation.
/r to perform a database recovery.
/g to check database integrity.
/p to repair a database.

27. What is the use of Ping?


You can use the Ping command to perform several useful Internet network diagnostic tests, such as the
following
Access - You can use Ping to see if you can reach another computer
Distance & Time – You can use the Ping command to determine how long it takes to bounce a packet off of
another site, which tells you it’s Internet distance in network terms
Domain IP Address – You can use the Ping command to probe either a domain name or an IP address. If you
ping a domain name, it helpfully displays the corresponding IP address in the response.

28. What is the use of Tracert?


Trace route command determine how packets are travel between your computer and the destination. Trace
provides a quick response

29. What is the use of Pathping?


Path PING it’s same as that of trace route which determine how packets travel between your computer and the
destination. Path ping provides a more detailed and reliable analysis of network performance.

30. What is the use of Telnet?


Telnet is a program to let you login to another computer on the Internet in order to use typed commands

31. Which tests are performed by netdiag?


Gathers static network information and tests the network driver, protocol driver, send/receive capability, and
well-known target accessibility.
Can be used by network administrators in conjunction with the Scheduler Service, to generate reports at
regularly scheduled intervals

32. Which switch is used with netdiag to display only errors and warnings?
To run the tool, you must
Open a command prompt, change to the folder containing the extracted files and run the tool from there.
All these diagnostic tools run from a command prompt,
you can’t just double-click them.
Netdiag /q – show the quiet output (error and warnings only)

Page 30 of 59
Exchange Server

33. How to install the Network Monitor tool?


To install the Windows version of Network Monitor,
Open the Control Panel and select the Add / Remove Programs option. Next, click the Add / Remove Windows
Components button to launch the Windows Components wizard.
Scroll through the list of components until you locate the Management and Monitoring Tools option.
Select the Management and Monitoring Tools option and click the Details button.
Select the Network Monitor Tools option and click Next.
Windows will now begin the installation process.
You may be prompted to insert your Windows installation CD.
Click Finish to complete the installation process.

34. What is the use of Network Monitor?


It allows you to monitor any machine on your network and to determine which users are consuming the most
bandwidth. You can also use the SMS version of Network Monitor to determine which protocols are using the
most bandwidth on the network, locate network routers, and resolve device names into MAC addresses.
Ability to capture, edit, and retransmit a packet. This functionality is used by hackers when performing a replay
attack.

35. What is DcDiag?


DCDiag command-line tool analyzes the state of domain controllers in a forest or enterprise and reports any
problems to assist in troubleshooting

36. What is NetDiag?


This is a command-line diagnostic tool helps to isolate networking and connectivity problems by performing a
series of tests to determine the state of your network client. These tests and the key network status information
they expose give network administrators and support personnel a more direct means of identifying and isolating
network problems. Moreover, because this tool does not require parameters or switches to be specified, support
personnel and network administrators can focus on analyzing the output rather than on training users how to use
the tool.

1. Name some Exchange Server 2003 clients


Outlook 2000/2003
Outlook Web Access.
Outlook Mobile Access.
RPC over Http/Https.

2. What is Outlook Web Access (OWA)?


Outlook Web Access 2003 (known as OWA 2003) allows you to gain access to your messages, calendars,
contacts, tasks and public folders from any computer with internet access. OWA 2003 has many added features
which allow for improved performance, better security and a fresh new look.

3. How to access OWA?


Open your browser and type in the following address:
https://DomainName/exchange
In Exchange Server 2007 – https:\\domainname\owa

4. How OWA works?


The client issues a HTTP request using browser using URL.
The DNS resolves the request and forward to the IIS server.
The HTTP request flows across the network to the IIS server.
Exchange registers itself with IIS as a valid application, so when a request is received byHTTP client IIS
redirect the request to application. Davex.dll is an ISAPI extension thatincludes the functions necessary to
communicate with the Store. Exchange also registersDavex.dll with IIS as the component to handle all incoming
requests for the Exchange application.
Davex.dll checks the request and contacts the Store through the epoxy inter process communication channel.
Communication goes to the HTTP epoxy stub. Eproxy does notuse RPC.
The HTTP epoxy stub communicates with Store using exoledb.dll to get the necessary information from the
Store.
After getting information from Store the reverse path is followed and client gets itsmailbox on browser.

Page 31 of 59
Exchange Server

5. What are the limitations of OWA?


We can’t access offline address list
A lot of attachments have to be saved to the local drive first, in order to be able to open them.
Adding recipients when sending an E-mail is a pain.
You cannot work offline.

6. What is RPC over HTTP?


The RPC over HTTP protocol allows your full Outlook 2003 MAPI clients to connect to Exchange 2003
Servers using HTTP/HTTPS. This solves the problem remote Outlook 2003 users have when located behind
restrictive firewalls.
By using RPC over HTTP, users no longer have to use a virtual private network (VPN) connection to connect to
Exchange mailboxes. Users who are running Outlook 2003 on client computers can connect to an Exchange
server in a corporate environment from the Internet. The Windows RPC over HTTP feature enables an RPC
client such as Outlook 2003 to establish connections across the Internet by tunneling the RPC traffic over
HTTP.

7. What are the requirements to use RPC over HTTP?


Server Requirement
RPC over HTTP/S requires Windows Server 2003 and Exchange Server 2003. RPC over HTTP/S also requires
Windows Server 2003 in a Global Catalog role.
Client Requirement
The client computer must be running Microsoft Windows XP Professional Service Pack 1 (SP1) or later.
The client computer must be running Microsoft Office Outlook 2003.

8. What is the procedure to configure RPC over HTTP?


Verify that your server computer and your client computer meet the requirements to use RPC over HTTP/S.
Configure Exchange to use RPC over HTTP/S.
Configure the RPC virtual directory in Internet Information Services.
Configure the RPC proxy server to use specific ports.
Configure your client computers to use RPC over HTTP/S

9. Why you must create an additional Outlook profile for RPC over HTTP connections?
For users to use RPC over HTTP from their client computer, they must create an outlook profile that uses the
required RPC over HTTP settings. These settings enable SSL communication with Basic Authentication, which
is required when using RPC over HTTP

10. How to prepare an Exchange Server 2003 computer to support RPC over HTTP?
Configure Exchange to use RPC over HTTPS.
Configure the RPC virtual directory in Internet Information Services.
Configure the RPC proxy server to use specific ports.

11. What is Exchange recipient?


In Exchange, the term recipient refers to an Active Directory object that is mailbox-enabled or mail-enabled.
Mailbox-enabled recipients can send, receive, and store messages. Mail-enabled recipients can only receive
messages.

12. What are the types of Exchange recipient objects?


Mailbox-enabled recipients
Mail-enabled
Contacts
Resource mailbox

13. What is a mailbox-enabled object?


Users can log on to networks and access domain resources. Users can be added to groups and appear in the
global address list (GAL).
Mailbox-enabled users can send and receive messages and store messages on their Exchange server.

14. What is mail-enabled object?


Mail-enabled users can receive messages at an external e-mail address only. They cannot send or store messages
on Exchange.

Page 32 of 59
Exchange Server

15. What is Encryption?


Encryption refers to algorithmic schemes that encode plain text into non-readable form or cyphertext, providing
privacy. The receiver of the encrypted text uses a “key” to decrypt the message, returning it to its original plain
text form. The key is the trigger mechanism to the algorithm.

16. What is the purpose of Digital Signatures?


Digital signatures are used to digitally sign the messages and encrypt them. Digital signatures provide
authentication, non repudiation and data integrity. Encryption keeps message contents confidential

17. How to verify that S/MIME is supported by mailbox store so that users are able to store encrypted or
digitally signed messages?
Click Start, point to All Programs, point to Microsoft Exchange, and then click System Manager.
Click Administrative Groups,
Click Administrative Group,
Click Servers, click servername,
Click Storage Group,
Right click either the Mailbox Store or the Public Folder Store, and then click Properties.
On the properties page, verify that the Clients support S/MIME signatures check box is selected.

18. What is the use of Key Recovery Agent?


We need to enable a Key Recovery Agent. A Key Recovery Agent is a highly trusted person which is
responsible for recovering lost or damaged archived certificates for users.
We must issue a Key Recovery Agent certificate for this user. To do this:
Start the Windows 2003 CA console
Issue a new template named Key Recovery Agent
Request this certificate for the user who becomes the Key Recovery Agent
Manually Issue the Key Recovery Agent Certificate at the CA

19. How to configure Outlook to enable Digital Signatures and Encryption?


Click Start, point to All Programs, point to Microsoft Office, and then click Microsoft Office Outlook 2003.
Click Tools, and then click Options.
Click on the Security tab and click Settings.
Outlook populates the Change Security Settings dialog box with default information. Click OK to accept the
defaults.

20. What are the components of PKI?


Certification Authorities – Provide services that authenticate the identity of individuals, computers, and other
entities in a network. This encompasses both root certification authorities and subordinate authorities.
Certificate Directory – Saves certificate requests and issued and revoked certificates and certificate requests.
Key Recovery Server – Saves encrypted private keys in the certificate database for recovery after loss.

21. Name a few 3rd party CAs ?


VeriSign
GeoTrust
Global Sign
Digicert
Digi-sign

1. What are the Exchange Server clients?


Microsoft outlook
Outlook web access
Outlook Mobile Access
RPC over HTTP
POP3
IMAP4

2. What is a Forest and Domain functional level?


Domain functionality enables features that will affect the entire domain and that domain only. Four domain
functional levels are available: Windows 2000 mixed (default), Windows 2000 native, Windows Server 2003
interim, and Windows Server 2003. By default, domains operate at the Windows 2000 mixed functional level

Page 33 of 59
Exchange Server

Forest functionality enables features across all the domains within your forest. Three forest functional levels are
available: Windows 2000 (default), Windows Server 2003 interim, and Windows Server 2003. By default,
forests operate at the Windows 2000 functional level. You can raise the forest functional level to Windows
Server 2003.

3. What is cache mode in Outlook 2003?


When an Outlook account is configured to use Cached Exchange Mode, Outlook works from a local copy of a
user’s Exchange mailbox stored in an Offline Folder file (OST file) on the user’s computer, along with the
Offline Address Book (OAB). The cached mailbox and OAB are updated periodically from the Exchange
server.
When a user starts Outlook for the first time with Cached Exchange Mode configured, Outlook creates a local
copy of the user’s mailbox by creating an OST file (unless one already exists), synchronizing the OST with the
user’s mailbox on the Exchange server, and creating an OAB. (If a user is already configured for offline use
with an OST and an OAB, Outlook can typically download just the new information from the server, not the
whole mailbox and OAB.)

4. What is IP address?
An Internet Protocol (IP) address is a numerical identification and logical address that is assigned to devices
participating in a computer network utilizing the Internet Protocol for communication between its nodes.
Two IP versions are currently in use, they are
IP version 4 – 32 bit addressing
IP version 6 – 128 bit addressing

5. What is MX record?
An MX record or Mail exchanger record is a type of resource record in the Domain Name System (DNS)
specifying how Internet e-mail should be routed using the Simple Mail Transfer Protocol (SMTP). Each MX
record contains a preference and a host name, so that the collection of MX records for a given domain name
point to the servers that should receive e-mail for that domain, and their priority relative to each other.

6. What is Simple Mail Transfer Protocol (SMTP)?


SMTP is a short for Simple Mail Transfer Protocol and it is used to transfer e-mail messages between
computers. It is a text based protocol and in this, message text is specified along with the recipients of the
message. Simple Mail Transfer Protocol is a ‘push’ protocol and it cannot be used to ‘pull’ the messages from
the server.

7. What is Network News Transport Protocol (NNTP)?


NNTP (Network News Transfer Protocol) is the predominant protocol used by computer clients and servers for
managing the notes posted on Usenet newsgroups. NNTP replaced the original Usenet protocol, UNIX-to-UNIX
Copy Protocol (UUCP) some time ago. NNTP servers manage the global network of collected Usenet
newsgroups and include the server at your Internet access provider. An NNTP client is included as part of a
Netscape, Internet Explorer, Opera, or other Web browser or you may use a separate client program called a
newsreader.
NNTP utilizes TCP port 119; NNTP with SSL utilizes TCP port 563.

8. What is Workgroup?
In workgroup, all the computers are peers; no computer has control over another computer
Each computer has a set of user accounts. To use any computer in the workgroup, you must have an account on
that computer
All computers must be on the same local network or subnet

9. What is five nines availability?


99.999 availability – not sure on this

10. Which utility can you use to verify that port 25 is open on a remote SMTP server?
Telnet is the utility to verify the port 25

11. What are important Ports for firewall configuration?


SMTP – 25
DNS – 53
HTTP – 80

Page 34 of 59
Exchange Server

Kerberos – 88
NNTP – 119

12. What is MBSA?


Microsoft Baseline Security Analyzer (MBSA) 2.1 is an easy to use tool that helps small and medium
businesses determine their security state in accordance with Microsoft security recommendations and offers
specific remediation guidance. Improve your security management process by using MBSA to detect common
administrative vulnerabilities and missing security updates on your computer systems.

13. To run MBSA your account must be a member of which group?


User account should me member of the administrator group on the targeted host

14. What is DMZ?


In computer networks, a DMZ (demilitarized zone) is a computer host or small network inserted as a “neutral
zone” between a company’s private network and the outside public network. It prevents outside users from
getting direct access to a server that has company data. (The term comes from the geographic buffer zone that
was set up between North Korea and South Korea following the UN “police action” in the early 1950s.) A DMZ
is an optional and more secure approach to a firewall and effectively acts as a proxy server as well.

15. What is ESEUTIL?


Eseutil is more powerful than Isinteg for repairing problems in the database. When using Eseutil:
· Dismount the stores you want to analyze. The Information Store must still be running.
· Common options with Eseutil include:
/d to perform an offline defragmentation.
/r to perform a database recovery.
/g to check database integrity.
/p to repair a database.

16. What size is each page of data in the database?


The pages are 4KB in size (for Exchange 2003) and include not only data but also a checksum and pointers to
other page
AD uses a page size of 8 kb

17. What type of memory optimization changes could you do for Exchange 2003?
The server is running Microsoft Windows Server 2003 Standard Edition, Microsoft Windows Server 2003
Enterprise Edition or Microsoft Windows Server 2003 Datacenter Edition, has 1 GB or more of physical
memory, to perform memory optimization we have to set the /3GB switch to the Boot.ini

18. Which parameters needs to added in boot.ini file if Your Exchange Server 2003 computer has more than 1
GB of RAM installed?
Add /3Gb switch to boot.ini

19. What is open relay?


An open relay (sometimes called an insecure relay or a third-party relay) is an SMTP e-mail server that allows
third-party relay of e-mail messages. By processing mail that is neither for nor from a local user, an open relay
makes it possible for an unscrupulous sender to route large volumes of spam. In effect, the owner of the server
— who is typically unaware of the problem — donates network and computer resources to the sender’s purpose.
In addition to the financial costs incurred when a spammer hijacks a server, an organization may also suffer
system crashes, equipment damage, and loss of business.

20. What is Active Directory Schema?


The Microsoft Active Directory schema contains formal definitions of every object class that can be created in
an Active Directory forest. The schema also contains formal definitions of every attribute that can exist in an
Active Directory object. This section provides the reference for each schema object and provides a brief
explanation of the attributes, classes, and other objects that comprise the Active Directory schema.

21. What is X 400 Connector?


X.400 connectors Although you can use X.400 connectors to connect routing groups, X.400 connectors are
designed to connect servers running Exchange with other X.400 systems or to servers running Exchange Server

Page 35 of 59
Exchange Server

5.5 outside an Exchange organization. A server running Exchange Server 2003 can then send messages over this
connector using the X.400 protocol.

22. What is a storage group?


Storage groups
An Exchange storage group is a logical container for Exchange databases and their associated system and
transaction log files.
Storage groups are the basic unit for backing up and restoring data in Microsoft Exchange (although you can
restore a single database). All databases in a storage group share a single backup schedule and a single set of
transaction log files.
Exchange Server 2007 Enterprise Edition supports up to 50 storage groups. Exchange 2007 Standard Edition
supports up to five storage groups.

23. What are the advantages of implementing multiple Exchange databases (mailbox store & public folder
store)?
You can place each database on a different physical disk, which will likely improve performance.
You can set database-level quota policies, so that by grouping users into different databases, you can assign
different policies (e.g., mailbox quotas) to particular user groups.
By separating users into multiple databases, you minimize the scope of any database corruption.
In the event of a database restore, you must restore the data in only one database, which enables faster
recoverability.
By dividing user accounts over multiple databases, you can prioritize the database-restoration order in the event
of a total disaster. For example, if all managers are in one database, you could restore that database first. (Of
course, when you put all managers in one database, if a database becomes corrupt, it’s bound to be that one!)
Multiple databases let you keep database size to a manageable level (typically less than 40GB

24. What is Volume Shadow Copy service?


The Volume Shadow Copy Service provides the backup infrastructure for the Microsoft Windows XP and
Microsoft Windows Server 2003 operating systems, as well as a mechanism for creating consistent point-in-time
copies of data known as shadow copies.
The Volume Shadow Copy Service has native support for creating consistent shadow copies across multiple
volumes, regardless of the snapshot technology or application

25. How to enable Volume Shadow Copy service?


Open Windows Explorer or the Microsoft Management Console (MMC) Disk Management snap-in, then right-
click the drive.
Select Properties from the context menu.
Select the Shadow Copies tab.
Under “Select a volume,” select the volume for which you want to enable Shadow Copies.
Click Settings to configure VSS. (If you don’t configure the default settings, Windows 2003 will use a default
configuration that creates a Shadow Copy on the selected drive at 07:00 a.m. and 12:00 p.m. every weekday).
In the displayed dialog box, configure the settings to tell Windows 2003 where you want VSS to store the
Shadow Copies (you can specify only the drive–you can’t specify a folder) and the maximum amount of space
to use for the Shadow Copies (at least 100MB), then click Schedule.
From the drop-down list in the Schedule dialog box, select a time to make a scheduled Shadow Copy. After you
select a time, you can use the options in the dialog box to specify when VSS runs (i.e., the date and time). You
can also click New to create a new schedule. For example, you might want to schedule the system to make a
Volume Copy on Saturday at 7:00 a.m. and on Sunday at 7:00 a.m. Click OK after you finishes selecting the
scheduling options.
Click OK to exit the main Settings dialog box.

26. What is the Size of Exchange log file?


5 MB for 2003 and 1 MB for 2007

27. For how many days deleted mailboxes are not permanently purged by default?
By default Exchange Server 2003 set to 30 days
Mail items deletion retention period is set to 7 days for Exchange server 2003 and 14 days for Exchange Server
2007

28. What is use of Full-text indexing?

Page 36 of 59
Exchange Server

Mailboxes are repositories for messages, documents, calendar items, and task lists for all the users in your
organization. Exchange Server 2003 has the capacity to index the full text of all messages in any mailbox store.
If you configure full-text indexing, users can quickly search for any word or phrase that occurs in the body of
any item in their own mailbox.

29. What is Incremental Population?


An incremental population event causes only new and modified items to be indexed

30. What is Full Population?


A full population event causes all items in the public folder store to be indexed or reindexed, regardless of their
current state of modification.

31. Which are the Exchange virtual servers?


Windows Exchange Servers use the word ‘Virtual’ in many contexts. To begin with, one physical machine can
act as a server for several Virtual SMTP domains, for example ourcomp.com and mergecomp.net. Moreover, in
addition to SMTP, one Exchange Server can also control Virtual servers for IMAP4, NNTP and POP3. From
another point of view, you could interpret these Exchange Virtual servers as aliases for physical folders in
Microsoft’s IIS.
In a completely different context, the term Virtual Server is used in clustering. The Outlook clients connect not
to the individual Exchange 2003 nodes, but to a Virtual server with a virtual IP address.

32. Which virtual servers are operational by default?


In a default Exchange organization, only the HTTP and SMTP virtual servers are operational. You can opt to
enable the POP3, NNTP, and IMAP4 virtual servers as needed

33. Which messaging protocols are supported by Exchange Server 2003?


HTTP
IMAP4
NNTP
POP3
SMTP

34. How to create a new Virtual server?


In Exchange System Manager, expand the First Administrative Group, expand the Servers node, and then
expand the Exchange server where you want to create a new HTTP virtual directory.
Expand the Protocols node, right-click the SMTP protocol, select New and then click SMTP Virtual Server.
In the Properties dialog box for the new SMTP virtual server, configure the settings for your new Exchange
virtual directory.

35. How to limit the inbound connections to Virtual servers?


A virtual server can accept an unlimited number of inbound connections and is limited only by the resources of
the computer where the virtual server is running. To prevent a computer from becoming overloaded, you can
limit the number of connections that can be made to the virtual server at the same time. By default, Microsoft®
Exchange does not limit the number of incoming connections.
1. Log on to the Exchange server where the virtual server is running using the Exchange administrator account
that has local Administrator permissions and Exchange Full Administrator permissions.
2. In Exchange System Manager, expand Protocols, right-click the protocol for which you want to change
connection limits, and then click Properties.
3. On the General tab, set the appropriate connection limits.

36. How to configure the SMTP Relay settings?


SMTP relay setting can be configure by navigating through Exchange System
Manager>Servers>protocols>SMTP Virtual Server, go to the properties and select the relay option to configure
which server is to relay the mails for the Exchange Organization

37. How to configure External DNS servers for external name resolution in Exchange Server 2003?
When you configure external DNS servers, you specify a different DNS server than the server that is configured
in the TCP/IP properties of the computer running Exchange Server. This DNS server is used by SMTP to
resolve external DNS names and deliver mail.
1. Click Start, point to All Programs, point to Microsoft Exchange, and then click System Manager.

Page 37 of 59
Exchange Server

2. In the console tree, expand Servers, expand <Server Name>, expand Protocols, and then expand SMTP.
3. Right-click <Your Outgoing SMTP Virtual Server>, and then click Properties.
4. Click the Delivery tab, and then click Advanced. The Advanced Delivery dialog box appears.
5. In Advanced Delivery, click Configure. The Configure dialog box appears.
6. In Configure, click Add, type the IP address of the external DNS server that you want to use, and then click
OK.
7. In Configure, under External DNS, verify that the IP address is correct, and then click OK twice to apply the
settings.
Configure your DNS server to include forwarders to external (Internet) DNS servers. This setting allows your
DNS server to receive a query for external names, forward the query to the remote server, and deliver the
response to the requestor. To configure this setting, open the DNS console, right-click your DNS server, click
Properties, click the Forwarders tab, and then configure forwarders to external DNS servers.

38. How to configure auditing in Exchange?


Auditing lets you track what’s happening with Exchange Server. You can use auditing to collect information
related to information logons and logoffs, permission use, and much more. Any time an action that you’ve
configured for auditing occurs, this action is written to the system’s security log. You can then access the
security log from Event Viewer. You enable auditing in the domain through Group Policy.
To enable Exchange auditing, follow these steps:
1. Start the Group Policy Management Console by clicking Start, All Programs, Administrative Tools, Group
Policy Management. You can now navigate through the forest and domains in the organization to view
individual Group Policy Objects.
2. To specifically audit users’ actions on Exchange Server, you should consider creating an organizational unit
(OU) for Exchange servers and then define auditing policy for a Group Policy Object applied to the OU. After
you’ve created the OU or if you have an existing OU for Exchange servers, right-click the related policy object,
and then select Edit to open the policy object for editing in Group Policy Management Editor.
3. Access the Audit Policy node by working your way down through the console tree. Expand Computer
Configuration, Policies, Windows Settings, Security Settings, and Local Policies. Then select Audit Policy.
4. You should now see the following auditing options:
Audit Account Logon Events Tracks user account authentication during logon. Account logon events are
generated on the authenticating computer when a user is authenticated.
Audit Account Management Tracks account management by means of Active Directory Users And Computers.
Events are generated any time user, computer, or group accounts are created, modified, or deleted.
Audit Directory Service Access Tracks access to Active Directory. Events are generated any time users or
computers access the directory.
Audit Logon Events Tracks local logon events for a server or workstation.
Audit Object Access Tracks system resource usage for mailboxes, information stores, and other types of objects.
Audit Policy Change Tracks changes to user rights, auditing, and trust relationships.
Audit Privilege Use Tracks the use of user rights and privileges, such as the right to create mailboxes.
Audit Process Tracking Tracks system processes and the resources they use.
Audit System Events Tracks system startup, shutdown, and restart, as well as actions that affect system security
or the security log.
5. To configure an auditing policy, double-click or right-click its entry, and then select Security. This opens a
Properties dialog box for the policy.
6. Select the Define These Policy Settings check box, and then select the Success check box, the Failure check
box, or both. Success logs successful events, such as successful logon attempts. Failure logs failed events, such
as failed logon attempts. 7. Repeat steps 5 and 6 to enable other auditing policies. The policy changes won’t be
applied until the next time you start the Exchange server.

39. What is the purpose of Logging in Microsoft Exchange?


Microsoft® Exchange Server transaction logging is a robust disaster recovery mechanism that is designed to
reliably restore an Exchange database to a consistent state after any sudden stop of the database. The logging
mechanism is also used when restoring online backups.
Before changes are actually made to an Exchange database file, Exchange writes the changes to a transaction
log file. After a change has been safely logged, it can then be written to the database file.

40. How to enable Logging?


Protocol Logging

Page 38 of 59
Exchange Server

If you want to troubleshoot mail system protocol issues then you should enable and configure protocol logging.
Protocol logging provides information on the message commands that a user sends to an Exchange Server 2003
server
· Open Exchange System Manager.
· Expand the Administrative Groups node, the administrative group, the Servers node, Server Name, Protocols.
· Expand the SMTP folder.
· Right-click Default SMTP Virtual Server and then select Properties.
· The Default SMTP Virtual Server Properties dialog box opens.
· Select the Enable logging checkbox on the General tab.
· Choose either of the following logging format options available in the Active Log Format drop-down list:
Microsoft IIS Log File Format
NCSA Common Log File Format
ODBC Logging
W3C Extended Log File Format
· Click Properties.
· The Logging Properties dialog box opens.
· In the New Log Schedule area of the General tab, choose either of the following options:
Hourly
Daily
Weekly
Monthly
Unlimited File Size
When File Size Reaches, and set the size setting.
· In the Log File Directory box of the General tab, set the log file location.
· If you have selected the W3C Extended Log File Format option, then you can click the Advanced tab to
configure the items which should be tracked.
· Click OK in the Logging Properties dialog box.
· Click OK in the Default SMTP Virtual Server Properties dialog box.

41. What are the log file formats are available with Logging?
You can configure the logging format that should be used for logging the information
ASCII-based format
Open Database Connectivity (ODBC) format
The different ASCII format options which you can choose between are:
Microsoft IIS log file format
NCSA log file format
W3C Extended log file format
For the ODBC format, you have to configure which ODBC database to use, and then configure the database to
receive protocol logging information. You can use Access or SQL Server to create an ODBC database.

42. What is the location of log files for Logging?


By default logs are stored in C:\WINNT\System32\LogFiles directory

43. How to enable Logging on HTTP virtual server?


Open the IIS Manager console.
Expand the Web Sites node.
Right-click Default Web Site and then select Properties from the shortcut menu.
Click the Web Site tab.
Check the Enable Logging checkbox.
Select the log file format from the Active Log Format drop-down list. The default format specified is W3C
Extended Log File Format.
Click Properties.
The Logging Properties dialog box opens.
On the General tab, set the following:
Specify when information should be saved to the log file.
Specify the log file size.
Specify the log file location.
Click the Advanced tab if you have selected the W3C Extended Log File Format. This is where you can
configure Extended Logging Options.
Click OK in the Logging Properties dialog box.

Page 39 of 59
Exchange Server

Click OK in the Default Web Site Properties dialog box.

44. What is OWA?


OWA is to access the mail via browser from outside the corporate network. The Outlook Web Access (OWA)
client is now nearly indistinguishable from the full Outlook client. The one major component missing is offline
capability, but nearly every other Outlook functionality is part of OWA.

45. What is Exchange Active sync?


ActiveSync provides for synchronized access to email from a handheld device, such as a Pocket PC or other
Windows Mobile device. It allows for real-time send and receives functionality to and from the handheld,
through the use of push technology.

46. What is Outlook Anywhere?


Outlook Anywhere (previously known as RPC over HTTP) is a method by which a full Outlook client can
dynamically send and receive messages directly from an Exchange server over an HTTP or Hypertext Transfer
Protocol Secure (HTTPS) web connection. This allows for virtual private network (VPN)–free access to
Exchange data, over a secured HTTPS connection.

47. What is POP3?


The Post Office Protocol 3 (POP3) is a legacy protocol that is supported in Exchange 2007. POP3 enables
simple retrieval of mail data via applications that use the POP3 protocol. Mail messages, however, cannot be
sent with POP3 and must use the SMTP engine in Exchange. By default, POP3 is not turned on and must be
explicitly activated.

48. What is IMAP4?


Legacy Interactive Mail Access Protocol (IMAP) access to Exchange is also available, which can enable an
Exchange server to be accessed via IMAP applications, such as some UNIX mail clients. As with the POP3
protocol, IMAP support must be explicitly turned on.

49. What is an IPSec policy?


An IPSec policy is nothing more than a set of rules that govern when and how Windows 2000 uses the IPSec
protocol. The IPSec policy interacts directly with the IPSec driver. The policy tells Windows such things as
which data to secure and which security method to use.

50. What are the preconfigured IPSec policies Windows Server 2003 comes with?
Client (Respond Only) Policy
Secure server policy (Require Security) policy
Server (request security) policy

51. Explain the preconfigured IPSec policies?


The first policy on the list is the Client (Respond Only) policy. This policy is designed to be run on client
machines that don’t normally need to worry about security. The policy is designed in such a way that the client
will never initiate secure communications on its own. However, if a server requests that the client go into secure
communications mode, the client will respond appropriately.
The next policy on the list is the Secure Server (Require Security) policy. This policy is only appropriate for
servers that require all communications to be secure. Once this policy has been applied, the server will either
send or accept insecure communications. Any client wanting to communicate with the server must use at least
the minimum level of security described by the policy.
The final policy on the list is the Server (Request Security) policy. Contrary to the name, this policy can be used
on both client and server PCs. This policy will use IPSec security for all outbound security. However, this
policy will accept insecure inbound communications. If a client requests a secure session, the policy will allow
the client to establish one.

52. What are the options for giving remote user access to Exchange?
Outlook web Access
POP3
IMAP4
Outlook Mobile Access
RPC over HTTP

Page 40 of 59
Exchange Server

53. What are the Exchange Server 2003 core services?


Exchange System Attendant
IIS admin Service
SMTP service
Exchange Information Store
Exchange Installable File System

54. What other services are associated with Exchange Server 2003?
Following are the important Exchange Services
MS Exchange Event – Monitors folders and files of Exchange 5.5
MS Exchange IMAP4 – provides IMAP4 services
MS Exchange Information Store – Manage Exchange Information store
MS Exchange Management – Exchange management using WMI
MS Exchange MTA Stack – provides X.400 service to connect Exchange 5.5
MS Exchange POP3 – provides POP3 Service
MS Exchange Routing Engine – provide topology and Routing Engine
MS Site Replication Service – Exchange 2003 co exist with Exchange 5.5
Exchange system Attendant – Provides monitoring, maintenance and AD lookup service

55. What is the default mailbox size in Exchange Server 2003?


For Exchange Server 2003 Standard Edition value between 1 and 75 (the default is 18 GB).
For Exchange Server 2003 Enterprise Edition value between 1 and 8000 (the default is 8000 GB). Click OK.

56. What is the maximum database size with Exchange Server 2003 standard edition?
16 GB if Exchange Server 2003 sp 1 is installed
75GB if it is upgraded to Server pack 2

57. What is ISINTEG, and where we have to use this?


Isinteg is a command-line tool that analyzes and makes some repairs to the Exchange databases. Use Isinteg for
problems similar to the following:
Users are continuously connecting to their mailboxes and keep getting disconnected.
Users report corruption within their mailboxes.
Users report error messages that are associated with the database not being able to be mounted

58. What is the use of ESEUTIL?


Users report corruption within their mailboxes.
Users report error messages that are associated with the database not being able to be mounted
Eseutil is more powerful than Isinteg for repairing problems in the database
Perform an offline defragmentation.
Perform a database recovery.
Check database integrity.
Repair a database.

59. Where is Eseutil located?


Located in windows 2003 support tools

60. What are the different Eseutil modes and switches associated with them?
/d to perform an offline defragmentation.
/r to perform a database recovery.
/g to check database integrity.
/p to repair a database.

61. How much free disk space is needed for defragmenting a database with ESEUTIL?
Because defragmentation copies the files to a temporary file and then copies the compressed file back to the
original file, the process needs a great deal of disk space to do this. To run defragmentation, you need about
110% of your file size available on your disk.

62. What is the command to run the Eseutil defragmentation on a specific database?
In Exchange System Manager, right-click the information store that you want to defragment, and then click
Dismount Store.

Page 41 of 59
Exchange Server

At the command prompt, change to the Exchsrvr\Bin folder, and then type the eseutil /d command, a database
switch, and any options that you want to use.
Use the following database switch to run Eseutil defragmentation on a specific database:
eseutil /d <database_name> [options]

63. What need to be done before performing the defragmentation with Eseutil?
It is recommended that you always perform a backup of your data before running Eseutil

64. How to run Eseutil on a computer without Exchange Server?


Create a new folder on the computer that does not have Exchange Server 2003 installed.
Copy the Eseutil.exe, Ese.dll, Jcb.dll, Exosal.dll, and Exchmem.dll files from the Exchange Server 2003
computer’s Drive:\Exchsrvr\Bin folder to the new folder that you created.
At a command prompt, change directory to the new folder.
Run the eseutil command from this folder against any databases that were copied from the Exchange Server
2003 computer.

65. Explain the Message flow in Exchange server 2003.


Message flow in Exchange 2003 is as follows:
An SMTP host connects to the SMTP transport engine on port 25, or an Outlook client places a message for
sending in the database, or an inbound message is received from the MTA.
Regardless of the origin, the message is transferred to the advanced queuing engine. If the message comes from
a remote SMTP host, the SMTP protocol engine transfers the message to the advanced queuing engine, whereas
if the message comes from a MAPI client, such as Outlook, or from MTA, the store driver transfers it to the
advanced queuing engine.
The advanced queuing engine then uses the categorizer to process received messages. The categorizer tries to
resolve the originator, resolve recipients, and enforce message restrictions. Received messages are placed in one
of two queues: a local queue with messages for recipients residing on the server, and an outbound pre-routing
queue.
From the local queue, the message transfers to the store driver, which is part of the Microsoft Exchange
Information Store service, and is placed in the destination mailbox.
To transfer messages from the pre-routing queue, the advanced queuing engine uses the routing engine to
determine where the SMTP service should send the message. The routing module passes the message to the
queue manager that finally places the message in a link queue to be sent through the SMTP service. The name of
the link queue corresponds to the name of the destination domain. From the outbound queue, messages are sent
to the next routing hop by the SMTP service.

66. What is WINROUTE?


WinRoute is an additional tool that shows the link state table for Exchange. Use WinRoute to query a server and
view its table, routing groups, connectors, master, address spaces, and member servers

67. What is address rewrite in Exchange Server?


Exchange Address Rewrite is the process of rewriting E-mail addresses for all outgoing messages in a special
SMTP Virtual servers. Exchange Address Rewrote is especially used in merger or acquisition scenarios where
two Exchange Organizations are to be merged into one but, until these two organization are completely merged,
every organization uses its own SMTP Namespace while for all outgoing SMTP Messages the new or unique
SMTP address space is used.

68. What is S/MIME?


Secure Multi-purpose Internet Mail Extension (S/MIME) protects the integrity and confidentiality of e-mail
messages. S/MIME protects the message itself, while other forms of protection, such as SSL, protect the
transmission channel. S/MIME requires the use of certificates issued through a public key infrastructure (PKI)

69. Where S/MIME supportable?


S/MIME is supported by Outlook, Outlook Web Access, or POP3 or IMAP4 clients. Use the following process
to use S/MIME for secure e-mail.
1. Obtain a certificate for each user.
2. Enable S/MIME in the e-mail client application.
Share and obtain public keys with other users. Users who will send you encrypted e-mail must have your public
key. You must have the public key for all users to whom you will send encrypted or digitally signed e-mails

Page 42 of 59
Exchange Server

70. What is white space, and how can it be reclaimed?


White space is nothing but free space.
When the 16 GB database size limit is reached on the Standard version of Exchange and white space must be
reclaimed in order to mount the database. If you are running Exchange Server 2003, then Service Pack 2 (SP2)
should be installed to raise the limit to 75 GB

71. What is DS2MB?


Directory Service\Metabase Synchronization process (DS2MB process), In short the DS2MB process overwrites
new configuration information in the local metabase (the metabase is kind of a registry for IIS) with
configuration information that was last set in Active Directory by using the Exchange System Manager snap-in.
DS2MB is short for Directory Service to Metabase and the purpose of this process is to transfer configuration
information from Active Directory to the IIS Metabase. The configuration is stored in the IIS Metabase instead
of the registry mainly for performance and scalability reasons. The DS2MB process is a one-way write from
Active Directory to the IIS Metabase, which means that the Metabase never writes back to Active Directory.

72. What is MIME & MAPI?


MIME = Multipurpose Internet Mail Extensions It defines non-ASCII message formats. It is a coding standard
that defines the structure of E-Mails and other Internet messages. MIME is also used for declaration of content
from other Internet protocols like HTTP, Desktop environments like KDE, Gnome or Mac OS X Aqua. The
standard is defined in RFC 2045.
With MIME it is possible to exchange information about the type of messages (the content type) between the
sender and the recipient of the message. MIME also defines the art of coding (Content-Transfer-Encoding).
MAPI = Messaging Application Programming Interface It’s the programming interface for email. It is a
Microsoft Windows program interface that enables you to send e-mail from within a Windows application and
attach the document you are working on to the e-mail note. Applications that take advantage of MAPI include
word processors, spreadsheets, and graphics applications. MAPI-compatible applications typically include a
Send Mail or Send in the File pulls down menu of the application. Selecting one of these sends a request to a
MAPI server

73. What are virtual servers? When would you use more than one?
An SMTP virtual server is an instance of the SMTP service running on an Exchange server. It is bound to a
particular IP address (or group of IP addresses) and port, usually the well-known TCP port 25.
Windows Exchange Servers use the word ‘Virtual’ in many contexts. To begin with, one physical machine can
act as a server for several Virtual SMTP domains, for example ourcomp.com and mergecomp.net. Moreover, in
addition to SMTP, one Exchange Server can also control Virtual servers for IMAP4, NNTP and POP3. From
another point of view, you could interpret these Exchange Virtual servers as aliases for physical folders in
Microsoft’s IIS.
In a completely different context, the term Virtual Server is used in clustering. The Outlook clients connect not
to the individual Exchange 2003 nodes, but to a Virtual server with a virtual IP address.

74. What is a Smart Host? Where would you configure it?


Smart hosts are used to connect Exchange Server to an external (to the organization) messaging system. Typical
use of a smart host involves relaying outbound SMTP email to a non-Exchange SMTP host in perimeter
networks; or to an ISP or hosted service provider that may offer functionality like mail relaying and spam and
virus scanning
A smart host is a common term for a server that accepts outbound mail and passes it on to the recipient.
A smart host is a type of mail relay server which allows an SMTP server to route e-mail to an intermediate mail
server rather than directly to the recipient’s server. Often this smart host requires authentication from the sender
to verify that the sender has privileges to have mail forwarded through the smart host. This is an important
distinction from an open relay that will forward mail from the sender without authentication. Common
authentication techniques inc Set Up Private Outbound DNS route mail to Outbound Services by setting up an
external DNS server.
Select the start Menu – > Programs -> Microsoft Exchange -> System Manager
Expand the Top Level Servers – > your mail server -> Protocols -> SMTP
Right click the default SMTP server and select properties

75. Explain Exchange transaction logs?


5 MB for 2003 and 1 MB for 2007
Before changes are actually made to an Exchange database file, Exchange writes the changes to a transaction
log file. After a change has been safely logged, it can then be written to the database file.

Page 43 of 59
Exchange Server

One of the most important components of Exchange server is the transaction logs. Exchange server was
designed to write all transactions to these log files and commit the changes to the databases when the system
allows. Users can send and receive messages without touching the database thanks to this write-ahead method of
logging.
When a message is sent, the transaction is first recorded in the transaction logs. Until the transaction is
committed to the Exchange database (EDB), the only existence of this data is in the system memory and the
transaction logs. In the event of a crash, you lose the contents of the memory and all you are left with is the
record in the transaction log. These transaction logs are crucial to the recovery of a failed Exchange server,
whether it was a minor crash that required a reboot, or a more catastrophic failure requiring the deployment of
your disaster recovery plans. The same goes for other transactions such as received messages, deleted items and
messages moved to different folders

76. Explain Exchange transaction logs?


5 MB for 2003 and 1 MB for 2007
Before changes are actually made to an Exchange database file, Exchange writes the changes to a transaction
log file. After a change has been safely logged, it can then be written to the database file.
One of the most important components of Exchange server is the transaction logs. Exchange server was
designed to write all transactions to these log files and commit the changes to the databases when the system
allows. Users can send and receive messages without touching the database thanks to this write-ahead method of
logging.
When a message is sent, the transaction is first recorded in the transaction logs. Until the transaction is
committed to the Exchange database (EDB), the only existence of this data is in the system memory and the
transaction logs. In the event of a crash, you lose the contents of the memory and all you are left with is the
record in the transaction log. These transaction logs are crucial to the recovery of a failed Exchange server,
whether it was a minor crash that required a reboot, or a more catastrophic failure requiring the deployment of
your disaster recovery plans. The same goes for other transactions such as received messages, deleted items and
messages moved to different folders

77. Which services are disabled in Exchange Server 2003 by default?


NNTP service
Microsoft Exchange IMAP4 service
Microsoft Exchange POP3

78. Which services are needed to enable Exchange Server 2003 to perform message routing functions?
Microsoft Exchange Routing Engine
SMTP service
IIS Admin Service

79. Which services are needed to maintain interoperability with previous versions of Exchange?
Microsoft Exchange Event Service
Exchange MTA Stacks
Microsoft Exchange Site Replication Service

80. What are the services required to run exchange server 2003 Front End Server?
Microsoft Exchange Routing Engine; needed to enable Exchange to route messages.
IIS Admin Service; needed to enable Exchange routing functionality. The IIS Admin Service is dependent on
the Microsoft Exchange Routing Engine.
IPSec services; these services are needed if you want to configure an IPSec filter on OWA servers. IPSec
services provide security between clients and servers on TCP/IP networks.
World Wide Web Publishing Service; needed if you want clients to be able to access OWA or Outlook Mobile
Access front-end servers

81. What is dumpster?


Dumpster is a storage location for the deleted items from mailbox database or Public folder Database. We can
set the dumpster setting by keeping the retention period of Mailbox deletion settings to certain number of days
By default it is 18 MB in size and can keep record of deleted items for 7 days.

1. Why Archive?
Growing E-Mail Volume – everyone wants to have more E-mail because of this the storage, Backup disk should
be increases

Page 44 of 59
Exchange Server

Performance and storage issue – increase in Storage costs


Mailbox quota – users are forced to manage quota
PSTs – quota management often results in growing PSTs – outlook Auto Archive
Discovery and Compliance issues – PSTs difficult to discovery centrally, regulatory retention schedules
contribute to further volume/storage issues

2. How Archiving improved in Exchange Server 2010?


Archiving improved by providing larger mailbox architecture, simple migration of PSTs back to server,
discovery options, retention policies and legal hold.
Large mailbox Architecture – maintains performance and provides option for DAS-SATA storage to reduce
costs
Archiving enables simple migration of PSTs back to server. If the archiving option sin enabled for a user, a new
Mailbox will be created to the user name archive in which the user can set retention policies to move the mails
to archive mailbox or the admin can set retention policies for the user mailbox.
Archiving simplifies discovery, retention and legal hold

3. What are the archiving options introduced in Exchange Server 2010?


Personal Archive – secondary Mailbox Node, they are the PST files of primary Mailbox
Retention Policies – folder/item level and archive/delete policies
Multi-Mailbox search – Role based GUI, admin can assign this permission to legal team
Legal Hold – monitor or control a user from delete a mail by legal hold and searchable with Multi Mailbox
Search
Journaling – Journal de-duplication (unwanted journaling on distributed mails). One copy of journal per
database and
Journal decryption – HT role will do the decryption and send the decrypted copy for journaling

4. What is personal archive in Exchange Server 2010 archiving?


It is a Secondary mailbox that is configured by the administrator, this appears along with user’s primary mailbox
in outlook or OWA, and the PST files can be dragged and dropped to personal archive Mailbox. Mails in
Primary mailbox can be moved automatically using Retention policies. Archive quota can be set separately from
primary mailbox

5. What are retention policies? And what we can do with retention policies in Exchange Server 2010?
Retention policy is an option to move/ delete certain mails by applying rules. We can set retention policies at
Item or Folder level. Policies can be applied directly within e-mail. We can set expiration date stamped directly
on e-mail. Policies can be applied to all email within a folder. We can configure delete policy to delete the mail
after certain period and Archive policies to move certain mails with the certain period to archive mailbox

6. What are the Retention Policies in Exchange Server 2010?


Move Policy – automatically moves messages to the messages to the archive Mailbox with the options of 6
months, 1 year, 2 years, 5 years and never – 2 years is default. Move mailbox policies helps keep mailbox under
quota. This works like outlook Auto Archive without creating PSTs
Delete Policy – automatically deletes messages. Delete policies are global. Removes unwanted items
Move + Delete policy – automatically moves messages to archive after X months and deletes from archive after
Y Months. We can set policy priority: Explicit policies over default policies; longer policies apply over shorted
policies

7. What is Multi Mailbox Search?


This option delegated access to search to HR, compliance, legal manager. Administrator has to provide access
permission on to use this feature, this will provide an option to search all mail items ( email, IM contacts,

Page 45 of 59
Exchange Server

calendar) across primary mailbox, archives. The filtering option in Multi Mailbox search includes sender,
receiver, expire policy, message size, send/receive date, cc/bcc, regular expressions, IRM protected Items

8. What are E-Discovery features?


Following are the E-Discovery features introduced in Exchange Server 2010
Search specific Mailboxes or DLS
Export search results to a mailbox or SMTP Address
Request email alert when search completes
Search results organized by per original hierarchy
Lot more will be added in the original release

9. What is Legal Hold and what are the features in Legal Hold?
New feature in Exchange Server 2010 to monitor or control a user from deleting a Mail or Mailbox, the features
available in Legal Hold are
Copy edited and deleted item – this option is in Exchange server 2007 to hold the auto deleted items
Set duration for auto delete – indefinite or specify time period
Auto alert notification – sends alerts to users that they are on hold, eliminates manual process
Search dumpster – use multi mailbox search to retrieve deleted/edited items indexed in dumpster folder

10. What is journaling and what are the journaling features in Exchange Server 2010?
Journaling is an option to track mails from particular user or from a group of users. The New Features in
Journaling for Exchange server 2010 are
Transport Journaling – ability to journal individual Mailboxes or SMTP address and also this gives a detailed
report per To/Cc//Bcc/Alt-Recipient and DL expansion
Journal report de duplication – reduces duplication of journal reports. Exchange server 2010 creates one report
per message

11. What is journal decryption?


Journal decryption is a new feature in Exchange Server 2010, if a user sends an encrypted message to recipient
and if journaling was enabled for that user, then the Hub transport Server decrypts the message and sends that
decrypted message for journaling. The intended recipient will receive the encrypted message

12. What is Set Quota in Archive management?


With Mailbox quota Management, we can assign mailbox size for a user. This option can be enabled from the
properties of the user account, and the default settings to Mailbox quota is 10 GB

Explain the Topology changes in Exchange servers?


In Exchange server 2003, we have one two server roles that is front end and back-end server architecture
In Exchange server 2007, Exchange architecture changes and we have 5 key server roles that depend on the
functions it does. They are Edge Transport Server Role, Hub transport Server Role, Client Access Server Role,
Mailbox Server Role and Unified Messaging Server Role.
In Exchange Server 2010, there is no change in the topology, there is only changes in the key architecture
component in the Server role level
For example
Client Access Server, changes are
Storage access path
Introduction of RPC Client Access Service
Client RPC connection changes
Transport Server, changes are
Resiliency issues are removed
Shadow redundancy
Exchange Storage Engine changes
Increase in DB cache size and check point depth
Edge sync
Support for safe sender and blocked sender
Information leakage protection and control
Mailbox Server Role, changes are
Store schema changes
DB I/O size improvements
New message records management features

Page 46 of 59
Exchange Server

High Availability changes


Introduction of Database Availability Group
DAS supportable to reduce cost
Large mailbox support up to 10 GB
Support for Public Folders

What is your technical Experience in Exchange Server?


Are you able to give introduction in a way to show that you are Exchange Server Expert?
Do you know the current technologies that are introduced recently?
What are the technical issues that you faced and how you handled in your previous company?
What are your job role and any achievements in previous company and your expected salary?

If you fail to answers this question, definitely you are not eligible to attend the interview. If you want to know
the answers or how to present your answers for the above questions, please leave your comments on this blog
Note: The Notes what I’m giving, it’s very short and simple to understand and also I’m giving some tips which
will show you as an Exchange Server Expert.

And here we go for Top 50 interview Questions.


Try to answers these questions by own without referring anything. If you can’t answer, leave your comment, I’ll
give you the answers for these questions that you are in need.
Please know something on Migration, Transition and In-Place upgrade on Exchange servers. i dint cover any
interview question on these topics..
What is Exchange Server and what are the Exchange Servers versions released by Microsoft?
What are the supportable operating systems for the Exchange Servers releases?
What is the main difference between Exchange Server 5.5, 2000, 2003 and 2007?
Difference between standard and enterprise edition in Exchange Server 2003 and 2007?
Explain the AD partitions? What are DS Access and DS Proxy?
What are DNS server & WINS Server? Is there any manual process required to replicate zones?
What are the basic requirements to install Exchange Server 2003 and Exchange Server 2007?
What is forest prep and domain prep? What will happen if you run these two preparations?
Explain about Site Replication in AD? What is the meaning of cost in site replication?
What is storage groups in Exchange Server 2003 and Exchange Serve 2007?
What is front-end and Back-end server architecture in Exchange Server 2003?
What are the considerations in implementing front-end and back-end architecture?
Explain Network Load balancing and Clustering in Exchange Server 2003?
What is SMTP, NNTP, POP3, IMAP4, MAPI, OWA, OMA, Exchange Active Sync & RPC over HTTP?
Explain the Exchange Server 2003 Services?
What are Dumpster, DS2MB, Smart Host, Mail Relay, Send As and Send on Behalf permission?
What are the Exchange Server Administrative permission in Exchange Server 2003 & 2007?
What is Administrative group and what is Routing Group? What is Routing Group Master?
Explain Mixed Mode and Native Mode in Exchange Server 2003?
Explain the file structure in Exchange Server 2003 and Exchange Server 2007?
Explain the Transactional Log Mechanism in Exchange Server? What is circular logging?
What are Exchange Server recipients? And what are address lists? And what is cached mode?
What is distribution group and query based distribution group?
What is a Mail relay and Smart host? What is the default transactional log size and max DB size?
Explain the virtual Servers in Exchange Server 2003?
What is ESEUTIL, ISINTEG, S/MIME, White Space IMF and Address Rewrite?
What are public folders in Exchange Server? How to manually perform public folder replication?
Why not to install Exchange Server in Domain Controller?
What are the connectors available and what is Link State table in Exchange Server 2003?
What is Recipient update Service and Recipient update policies? How to manually update RUS?
Explain the backup options available in Exchange and differentiate online & offline backup?
Explain the recovery options available in Exchange Server 2003?
What is a bridgehead server and where we are using it?
What’s new in Exchange Server 2007?
What’s same with Exchange Server 2003 and Exchange Server 2007?
What options are missing in Exchange Server 2007 that is available in Exchange server 2003?
Explain the Exchange Server 2007 Roles?
What is EMS, EMC, UM Auto Attend, Remote Wipe, journaling, disclaimer and MRM?

Page 47 of 59
Exchange Server

What is the importance of Active directory in Exchange Server 2007?


Explain the mail flow in Exchange Server 2007?
What are the high availability options in Exchange Server 2007?
What is unified messaging, what are the new features included in Exchange Server 2007?
What are the security features introduced in Exchange Server 2007?
Explain the four New Services that are available in Exchange 2007 Client Access Server Role?
Explain the Administrative Roles and permissions in Exchange Server 2003 and 2007?
Suggest a Good Storage Solution for Exchange Servers?
What are the port setting considerations in Exchange Servers?
Explain the functions of High Availability options like LCR, CCR, SCC, and SCR?
What is Exchange Hosted Service? Explain the AV and AS feature in Edge Server role?
What you know about Exchange Server 2010?

1. Can’t able to run prepare switches in Exchange Server 2010 installation


Qns: I checked all the pre requisites to install Exchange Server 2010 both the software and hardware
Requirement, everything is correct but I can’t able to run the Prepare Switch
Ans: If you are trying to run the Prepare Switches in a Domain having Windows 2003 Server as a Domain
Controller, then you can’t run the prepare switch. Because Microsoft consider windows server 2003 is legacy
application for Exchange Server 2010. And the prerequisite to install Exchange Server 2010 in a Domain with
windows 2003 Native Mode, You can’t set windows 2003 to be in Windows 2003 native mode

2. DNS installation issue


Qns: If you leave the IPV6 to be enable and it has the automatic IP address, when configuring DNS it will warn
you with set a Static IP for your Network adapter or you plan to get the IP from DHCP server
Ans: remove the IPV6 option from Properties of the Network or assign a Static IP to the IPV6 protocol. If you
disable for this time, you will be end up in another issue when Hub transport Server installation

3. Hub transport Server installation fails


Qns: If you receive an error like this
“[The execution of: “$error.Clear(); if ($RoleStartTransportService) { start-SetupService -ServiceName
MSExchangeTransport }”, generated the following error: “Service ‘MSExchangeTransport’ failed to
reach status ‘Running’ on this server.”]”
Ans: This will be because of IPV6 disabled, to completely remove the IPV6 from server modify those setting in
Registry, to do this navigate to
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters
In the details pane, click New, and then click DWORD (32-bit) Value.
Type DisabledComponents, and then press ENTER.
Double-click DisabledComponents, and then type 0xffffffff in Hexadecimal or 4294967295 in Decimal.

4. Error when client access pre requisites check


Qns: I installed the pre requisites of Exchange 2010 but I received the following error message.
Unable to read the data from Metabase
Unable to access the default web site
Microsoft filter Pack was not installed – import for Mailbox server role
Ans: for the 1st and second error,
IIS has to be installed properly – following are the important features that have to be enabled under IIS services.
Initialize the below commands in windows power shell
ServerManagerCmd -i Web-Server
ServerManagerCmd -i Web-ISAPI-Ext
ServerManagerCmd -i Web-Metabase
ServerManagerCmd -i Web-Lgcy-Mgmt-Console
ServerManagerCmd -i Web-Basic-Auth
ServerManagerCmd -i Web-Digest-Auth
ServerManagerCmd -i Web-Windows-Auth
ServerManagerCmd -i Web-Dyn-Compression
ServerManagerCmd -i NET-HTTP-Activation
ServerManagerCmd -I RPC-over-HTTP-proxy
And for 3rd error we have download and install Microsoft filter pack

5. Cant able to expand the Organization Configuration in Exchange Management Shell

Page 48 of 59
Exchange Server

Qns: if I try to open or expand anything in Exchange Management Shell, I received an Error message like
Connecting to remote server failed with the following error message : The WinRM client received an HTTP
server error status (500), but the remote service did not include any other information about the cause of the
failure. It was running command ‘Discover-ExchangeServer -UseWIA $true’.
Ans: we have to
Disable “Anonymous Authentication” on PowerShell virtual directory of IIS.
Enable remote powershell for user with below cmdlet in “Exchange Management Shell (Local Powershell)”
Set-User “User Name” -RemotePowerShellEnabled $true

1. What is Administrative Group?


In Exchange 5.5, site concept is divided into two groups in Exchange 2003 named Administrative Groups and
Routing Groups
Administrative Group are used to provide administrative tasks. Under administrative groups it contains servers,
policies, routing groups and Public Folder trees. Three administrative models are present
Centralized – adding all the exchange servers to the same administrative groups to have centralized
administration
De centralized – it’s for large organization, in this model it will have different administrative group in a forest
Mixed - Combination of centralized and de centralized model.

2. What are Routing Groups?


Routing Groups are related to physical layout. It is like AD sites used to group servers that share reliable well
connected bandwidth. Routing groups comes in to play when you have multiple physical locations

3. How Routing Groups works?


If you have routing groups implemented, you can have one routing group at the corporate office and a separate
routing group at a remote office. The routing groups would be joined by a routing group connector.
That connector would designate one server in each routing group as a bridgehead server. (Exchange traffic
flowing between routing groups can only be sent between bridgehead servers.)
Let's say that an Exchange server in your main office has been updated, and that update needs to be replicated to
10 servers at a remote office. With routing groups set up, rather than sending 10 copies of the update across the
WAN link, the server could send the update to the local bridgehead server. The local bridgehead would then
send the update to the remote bridgehead server. The remote bridgehead server would distribute the update to
the machines at the remote office.

4. What is Circular logging?


All transactions are first logged to the current log file E00.LOG. If it gets full it will be saved to a file of the log
generation E00xxxxx.log. This process is called transaction log rollover. The way the current log file is rolled
over depends on the logging mechanism used. Microsoft Exchange provides circular and sequential logging
mechanisms.
Circular logging automatically overwrites transaction log files after the data they contain has been committed to
the database. It reduces disk storage space requirements

5. What is the downside of Circular logging?


It prevents you from using differential or incremental backups, because they require the past transaction log
files. In fact, because circular logging purges some transaction log files, you may not be able to recover to a
point of failure by roll forward through the transaction log files—one or more may be missing. For this reason it
is a good idea to disable circular logging on all Storage Groups

6. How Circular logging works?


Circular logging automatically overwrites transaction log files after the data they contain has been committed to
the database. It reduces disk storage space requirements; however, if circular logging is enabled, you cannot
perform incremental backups

7. How to enable Circular logging?


To enable circular logging, go to the Properties window of a Storage Group and choose the General tab.
Circular logging (disabled by default) uses transaction log technology but does not maintain previous
transaction log files. Instead, it maintains a window of a few log files, then removes the existing log files and
discards the previous transactions after the transactions in the transaction log files have been committed to the
database.

Page 49 of 59
Exchange Server

8. Which service needs to be stop and restart to take effect of changes made to circular logging?
Microsoft Exchange Information Store service has to be restarted, if we configure the circular logging option.

9. What is difference between Send on Behalf permission and Send As permission?


Send on Behalf permission - Send on Behalf Of" allows one user to be able to send emails on behalf of another.
The message will show the recipient who the message was sent on behalf of and who actually sent the message.
Send As Permission - means user A will be able to access the mail box of user B and reply back to those mail.
Even though user A has replied to the mail, the send address will display user b email.

10. Where does the expansion of mail sent to mail-enabled groups occur?
When you send a message to a mail-enabled group, the Exchange server sends a copy of the message to each
mail-enabled user and contact in the group. The process of finding those mail-enabled group members is called
expansion
The Global Catalog server obtains the names of the ultimate recipients from its copy of Active Directory, along
with the requested email attributes. If the list includes any mail-enabled groups, the Global Catalog server
expands the membership of each of those groups and repeats the process recursively until it has assembled a full
list of all ultimate recipients in each of the nested groups. It returns this list to the Exchange server.

11. How can you prevent your users and groups from viewing the contents of a custom address list?
Go to the properties of the Custom Address list, point to security tab and select advanced button to open the
advanced setting
Browse the users or group and set deny permission to open the Address list

12. How you can configure HTTP virtual server logging?


Logging is only available for SMTP and NNTP protocols. Use IIS to configure logging for HTTP

13. Can Exchange Servers move between administrative groups?


With Exchange Server 2003, servers can be moved between Routing groups, but we can’t move the servers
between Administrative Groups.

14. How to enable the Administrative Group in native-mode Exchange Organization?


Click Start, All Programs, Microsoft Exchange, and then select Exchange System Manager.
Exchange System Manager opens next.
Right-click the Exchange organization and the select Properties from the shortcut menu When the Exchange
organization Properties dialog box opens, select the Display routing groups checkbox on the General tab.
Click OK

15. How to delegate the control of Administrative Group to users?


Open the Exchange Systems Manager.
Navigate to the Administrative Group.
Click the Action menu and select Delegate Control options.
The Exchange Administration Delegation Wizard launches.
Click Next on the Welcome to the Exchange Administration Delegation Wizard screen.
Click Add.
Provide the details of the Active Directory user account or group that you are delegating control over the
Administrative Group to.
Select the Exchange role which should be assigned. Click OK.
Click Next and then click Finish.

16. How many Exchange Organizations can exist per forest?


We can have only one Exchange Organization to exists per forest

17. How to access the Exchange Tasks?


Right click a user object from the Active Directory user and computer console. Exchange Tasks will be availble

18. Which functions are provided by Exchange Tasks for a User?


we can.
Move a mailbox
Delete Mailbox
Configure Exchange Features

Page 50 of 59
Exchange Server

Remove Exchange Attributes

19. Which functions are provided by Exchange Tasks for a contact?


we can
Delete Email Address
Modify Exchange Attributes

20. Which options are added to the Mailbox-enabled User properties for Exchange?
Exchange General
Exchange Advanced
Exchange Features
Exchange E-Mail Address

21. Which functions are available with Exchange General Tab?


Explanation of Exchange General TAB
We can do the following options in this Exchange General TAB
Delivery Restriction – set maximum size of outgoing and incoming messages
Delivery option - set delegating privileges, set a forwarding address
Storage Limits – specify storage Limits for the mailbox enabled user

22. Which functions are available with Exchange Features Tab for a Mailbox-enabled User?
We can have enable or disable the following features respect to that of user permission, for example if a user is
restricted to allow OWA you can disable the feature
Features we can enable/disable
Mobile Features
OWA
POP3
IMAP4

23. Which functions are available with Exchange Advanced Tab for a mailbox-enabled User?
We can do the following options
Hide the user from global Address list
We can set mailbox rights
We can set custom attributes

24. Which functions are available with Exchange Advanced Tab for a Group?
We can do the following option
New alias name
Choose an expansion server
Hide group from address list
Send out of office message to originator
Send delivery reports

25. What are the options for a group once Exchange Server is installed?
Exchange General
Exchange Features
Exchange E-Mail Address

26. Which functions are available with Exchange Tasks for a group?
We can
Delete email address
Hide membership
Remove exchange attributes

27. How to configure the Send on Behalf permission?


Log onto the server running Exchange.
Run Active Directory Users and Computers.
Find the user's account that you want to be able to send on behalf of, and open up the account properties.
Select the "Exchange General" tab.
Click [Delivery Options...]

Page 51 of 59
Exchange Server

Click [Add ...] and add the user (or users) that are to be granted permission to send on behalf of this account.
Click [OK] to close the "Delivery Options" dialog.
Click [OK] to close the account properties dialog..

28. What is the other way to configure Send on Behalf permission?


We can configure this option by using outlook 2003, to configure this
Start Outlook
Tools → Options, select the "Delegates" tab
Click on [Add ...]
Add the user or users that you want to grant the send-on-behalf-of permission to, then click [OK]
The next window will allow you to specify which permissions you are granting. To allow send-on-behalf-of,
you need to grant permissions on the "Inbox" to either "Author" or "Editor", then click [OK]
Click [OK] to close the "Options" dialog.

29. How to configure the Send as Permission?


Log onto the server running Exchange
Run Active Directory Users and Computers.
Under the "View" menu ensure that "Advanced Features" is ticked.
Find the user's account that you want to be able to send as, and open up the account properties.
Select the "Security" tab.
Click [Add ...] (under "Group or user names") and add the user (users or group) that is to be granted permission
to send-as this account.
For each account added, highlight the account under "Group or user names" and in the "Permissions for ..."
window grant the account "Send As" permission.
Click [OK] to close the account properties dialog.
Send As Permission means user A will be able to access the mail box of user B and reply back to those mail.
Even though user A has replied to the mail, the send address will display user b email.

31. How to configure a forwarding address?


Start the Active Directory Users and Computers snap-in.
Right-click the mail-enabled user, and then click Properties.
Click the Exchange General tab.
Click Delivery Options.
In the Forwarding Address section, click Forward to, and then click Modify.
Click the mail-enabled user or the mail-enabled contact. Then, click OK.
Note If you want e-mail to be delivered to the original mailbox as well as the forwarding address, select the
Deliver messages to both forwarding address and mailbox check box.
To close Delivery Options and to close Properties, click OK two times.

32. How to configure the mailbox permissions?


We can assign the following permission to a mailbox
Administrators group: Full Control
Authenticated Users group: Read and Execute, List Folder Contents, and Read
Creator Owner: None
Server Operators group: Modify, Read and Execute, List Folder Contents,Read,Write
System account: Full Control
To configure the mailbox permissions
1. In Active Directory Users and Computers, click Advanced Features on the View menu.
Note: This is not necessary on Exchange Server 2003 because of the fact that the Exchange Advanced tab is
exposed by default.
2. Under Active Directory Users and Computers, click the account, click the Exchange Advanced tab, and then
click Mailbox Rights.
3. The rights are displayed in the Permissions for account name dialog box.
This behavior occurs because the mailbox security descriptor is not read from the Active Directory account
object until the user logs on or gets mail. The Recipient Update Service (RUS) does not stamp the inherited
permissions when the mailbox is created. After the mailbox is created in the store, the store calculates inherited
mailbox rights.

33. What is a Query-based distribution group?

Page 52 of 59
Exchange Server

A query-based distribution group works much like a standard distribution group. The difference being that the
query-based Distribution Groups assign group membership based on LDAP queries. Query-based distribution
groups are only supported when running in Exchange Server 2003 Native Mode. The main advantage of
creating a query-based distribution group is that administrators can dynamically assign members to the group –
you do not have to manually add/remove accounts from the query-based distribution group.
You can use the Filter option to define group membership for the query-based distribution group. Then, when
new account objects are created, these objects too are added to the group when they defined as being mail-
enabled in Active Directory.
The different Filter options for defining a query-based distribution group are listed here:
Users with Exchange Mailboxes
Users with External Mail Addresses
Mail-Enabled Groups
Contacts with External Email Addresses
Mail-Enabled Public Folders
Customer Filters

34. How to create a Query-based distribution group?


In Active Directory Users and Computers, in the console tree, right-click the container where you want to create
the query-based distribution group, point to New, and then click Query-based Distribution Group.
In Query-based Distribution Group name, type a name for the query-based distribution group, and then click
Next.
Under Apply filter to recipients in and below, verify that the parent container shown is the one that you want the
query-based distribution group to be run against. If this is not the correct container, click Change to select
another container.
Under Filter, select one of the following options:
To filter the query based on a set of predefined criteria, click Include in this query-based distribution group, and
then select from the following criteria:
- Users with Exchange mailboxes
- Users with external e-mail addresses
- Groups that are mail-enabled
- Contacts with external e-mail addresses
- Public folders that are mail-enabled
5. To create your own criteria for the query, click Customize filter, and then click Customize
6. Click Next to see a summary of the query-based distribution group that you are about to create.
7. Click Finish to create the query-based distribution group.

35. What is Expansion server?


Expansion servers route messages that are sent to a single distribution list or group for each of the recipient
objects in that list or group. When a user sends a message to a group, the Exchange server that is acting as the
expansion server expands the group to its individual members. This expansion permits members of the
distribution list or group to receive the message. An expansion server also resolves the names of all recipients in
the distribution list or group, and then determines the most efficient path for routing the message.

36. How to configure an expansion server for a mail-enabled group?


In Active Directory Users and Computers, right-click the distribution group and then click Properties.
Click the Exchange Advanced tab, and look in the value under Expansion server.
We can configure expansion server here

37. How to move the database of a store?


Start Exchange System Manager.
Open the administrative group that contains the database that you want to change.
Under Storage Group, right-click the mailbox store or the public folder store that you want to change, and then
click Properties
Click the Database tab.
Next to the database that you want to change, click Browse, and then specify a new drive or folder location for
the files.
Click Yes to dismount the database automatically and move the location.
When you finish moving the databases, remount the databases manually.

38. What is mail relay?

Page 53 of 59
Exchange Server

The first mechanism to be used against attacks is a mail relay. A mail relay is basically just a simple mail server
that accepts e-mails, filters it according to pre-defined criteria and then delivers them to another server. Your
mail relay will only allow mails that are destined to user in your SMTP domain to be relayed to the internal
server. A mail relay could also filter out viruses and junk e-mail if you install the right software package for it.
You would definitely want one of those so that your Exchange server will not be directly connected to the
Internet for inbound connections. A mail relay is typically placed in a DMZ, which a dedicated network,
protected by a Firewall and separated from both the internal LAN and the Internet. This allows the Firewall
administrator to determine who is trying to get into the mail relay and what is passing from the mail relay to the
internal LAN

1. What is Hub Transport Server Role?


Hub Transport server role handles all mail flow inside the organization, applies transport rules, applies
journaling policies, and delivers messages to a recipient's mailbox. Messages that are sent to the Internet are
relayed by the Hub Transport server to the Edge Transport server role that is deployed in the perimeter network.
Messages that are received from the Internet are processed by the Edge Transport server before they are relayed
to the Hub Transport server. If you do not have an Edge Transport server, you can configure the Hub Transport
server to relay Internet messages directly

2. Where Hub Transport Roles must be deployed?


The Hub Transport server role stores all its configuration information in Active Directory. This information
includes transport rules settings, journal rule settings, and connector configurations. Because this information is
stored in Active Directory, you can configure settings one time, and then those settings are applied by every
Hub Transport server in the organization.

3. What is categorizer?
The categorizer is a component of Exchange transport that processes all inbound messages and determines what
to do with the messages based on information about the intended recipients.

4. What are the processes involved in categorizer?


The Hub Transport server uses the categorizer to expand distribution lists and to identify alternative recipients
and forwarding addresses. After the categorizer retrieves full information about the recipients, it uses that
information to apply policies, route the message, and perform content conversion

5. What to do to use the Anti-Spam features on Hub Transport Server Role?


Although these Built-in Protection features are designed for use in the perimeter network on the Edge Transport
server role, the Edge Transport agents can also be configured on the Hub Transport server. By default, these
agents are not enabled on the Hub Transport server role. To use the anti-spam features on the Hub Transport
server, you must register the agents in a configuration file and enable the features that you want to use by
running a provided Exchange Management Shell script
You can install the anti-spam agents on the Hub Transport server role by using the provided Install-
AntiSpamAgents.ps1 script. The script is located in the %program files%\Microsoft\Exchange Server\Scripts
folder.

6. What is journaling Agent?


The Journaling agent is a compliance-focused agent that you can configure to journal e-mail messages that are
sent or received by departments or individuals in your Exchange 2007 organization, to and from recipients
outside your organization, or both, for use in the organization's e-mail retention or archival strategy

7. What are the types of Journaling Agent?


Exchange 2007 provides the following two journaling options to meet your organization's requirements:
Standard journaling Standard journaling enables the Journaling agent in Exchange 2007 to journal all messages
that are sent to and from recipients and senders that are located on a specific mailbox database on a computer
running the Mailbox server role. You must configure journaling individually on each mailbox database in your
organization if you want to journal all messages to and from all recipients and senders
Premium journaling Premium journaling enables the Journaling agent in Exchange 2007 to use rules that you
configure to match the specific needs of your organization. You can create journal rules for a single mailbox
recipient or for entire groups within your organization. To use premium journaling, you must have the Exchange
Enterprise Client Access License (CAL)

8. What are the features in premium journaling that won’t work with standard Journaling Agent?

Page 54 of 59
Exchange Server

Per-recipient or distribution list journaling: With standard journaling, you can only enable journaling on a per-
mailbox database basis. All recipients and senders on a journaling-enabled mailbox database will be journaled.
Journal rule scope: All messages to and from recipients and senders on a journaling-enabled mailbox database
are journaled.
Journal rule replication: Because standard journaling is applied on a per-mailbox database basis, this
configuration cannot be replicated throughout the organization.

9. What are the Transport rules?


Transport rules in Microsoft Exchange Server 2007 let you apply messaging policies to e-mail messages that
flow through an Exchange Server 2007 organization. In Exchange 2007, the following two transport rules agents
can act on messages
1. Transport Rules Agent
2. Edge transport Rules Agent

10. What is Transport Rules Agent?


The Transport Rules agent runs on all computers that have the Hub Transport server role installed. This agent
helps you apply compliance- and policy-based rules to all messages that flow through an Exchange 2007
organization.

11. What is Edge rules Agent?


Edge Rules agent The Edge Rules agent runs on all computers that have the Edge Transport server role
installed. This agent helps you manage antivirus problems.

12. What is Store Driver?


Messages that are sent by users in your organization are picked up from the sender's Outbox by the store driver
and are put in the Submission queue on a server that runs the Hub Transport server role

13. Explain Internal Message flow in Exchange Server 2007?


When messages are submitted to the Hub Transport server, they are processed by the categorizer. The
categorizer is a component of Exchange transport that processes all inbound messages and determines what to
do with the messages based on information about the intended recipients. In Exchange 2007, the Hub Transport
server uses the categorizer to expand distribution lists and to identify alternative recipients and forwarding
addresses. After the categorizer retrieves full information about the recipients, it uses that information to apply
policies, route the message, and perform content conversion. Messages are then delivered locally by the store
driver to a recipient's mailbox, or they are delivered remotely by using SMTP to send messages to another
transport server. Messages that are sent by users in your organization are picked up from the sender's Outbox by
the store driver and are put in the Submission queue on a server that runs the Hub Transport server role

14. What is the function of pickup and replay directory?


By default, the Pickup Directory and the Replay directory exists on every Microsoft Exchange Server 2007
computer that has the Hub Transport server role or the Edge Transport server role installed.
Pickup Directory: A Directory that receives RFC-822 compliant files from the file system for the purpose of
creating message objects that can be passed to the Submission queue.
Replay Directory: The Replay directory receives messages from foreign gateway servers and resubmits
messages that administrators export from the queues of Exchange 2007 servers.

15. What is mail submission queue?


A persistent queue that is used by the categorizer in Exchange Server 2007 to gather all messages that have to be
resolved, routed, and processed by transport agents. After categorization, the message is moved to a delivery
queue or to the Unreachable queue. Users cannot take actions on the Submission queue.

16. What is the function of Mail Delivery Queue?


A group of temporary queues that hold messages that are being delivered to a Mailbox server by using
encrypted Exchange RPC. Mailbox delivery queues exist on Hub Transport servers only. A different mailbox
delivery queue exists for each Mailbox server destination. The destination Mailbox server must exist in the same
Active Directory directory service site as the Hub Transport server. Mailbox delivery queues are dynamically
created as needed and are automatically removed.

17. What is the function of SMTP Receive connector?

Page 55 of 59
Exchange Server

A connector that is used to receive mail from remote mail systems based on administrator-defined address
spaces. Receive connectors apply a customized set of limits and other configuration options that apply only to
messages received from remote mail systems that match the address space that is configured on the send
connector

18. What is the function of SMTP send connector?


A connector used to send mail to remote mail systems based on administrator-defined address spaces. Send
connectors apply a customized set of limits and other configuration options that apply only to messages destined
for remote mail systems that match the address space configured on the Send connector.

19. What are Journaling and Archiving?


Journaling is the ability to record all communications, including e-mail communications, in an organization for
use in the organization's E-mail retention or archival strategy
Archiving refers to reducing the strain of storing data by backing up the data, removing it from its native
environment, and storing it elsewhere

20. What is disclaimer?


Microsoft Exchange Server 2007 includes the ability to add text disclaimers to e-mail messages that are
processed on a computer that has the Hub Transport server role installed. Disclaimers are typically used to
provide legal information, warnings about unknown or unverified e-mail senders, or for various other reasons as
determined by an organization

21. What is Message classification?


Message classifications are a Microsoft Exchange Server 2007 and Microsoft Office Outlook 2007 feature that
is intended to help organizations comply with their e-mail policies and regulatory responsibilities. When a
message is "classified," the message contains specific metadata that describes the intended use or audience of
the message. Outlook 2007 or OWA may act on this metadata by displaying a user-friendly description of the
classification to senders and receivers of a classified message. In Exchange 2007, the Microsoft Exchange
Transport service may act on the metadata if there is a transport rule that meets specific criteria that are
configured by the Exchange administrator.

22. What is policy in Hub Transport Server Role?


Organizations need an application-specific approach to coping with a growing number of legal, regulatory, and
internal policy and compliance requirements. Administrators must filter, process, and store e-mail that flows
between users in the organization, to or from the Internet, or between partner organizations. Microsoft Exchange
Server 2007 provides a broad set of e-mail policy and compliance features to address this increasing
requirement to protect and control the flow of information

23. Is it possible to install Forefront security in Exchange environment having only Hub Transport server for
mail flow?
Yes, we can install Forefront security in Exchange environment having only Hub Transport server for mail flow

24. What is the post installation tasks involved on Hub Transport Server?
After install the Microsoft Exchange Server 2007 Hub Transport server role, you must enable and configure the
agents that provide the messaging features that you want to deploy. An agent is a managed software component
that performs a task in response to an Exchange 2007 event. Transport agents in Exchange 2007 perform tasks
that support messaging policy and compliance and the Built-in Protection features that support anti-spam and
antivirus prevention and management.
You can install the anti-spam agents on the Hub Transport server role by using the provided Install-
AntiSpamAgents.ps1 script. The script is located in the %programfiles%\Microsoft\Exchange Server\Scripts
folder.

25. What is Message Records Management feature in Exchange Server 2007?


Administrators can use the MRM features in Exchange 2007 to help users and the organization retain the
messages that they need for business or legal reasons and delete message that they don’t need. You do this by
configuring managed folders, which are Inbox folders to which retention policies are applied.
Messaging records management (MRM) in Microsoft Exchange Server 2007 helps you:
Reduce the risks that are associated with e-mail and other communications by making it easier to keep what is
needed to comply with company policy, government regulations, or legal needs.
Remove content that has no legal or business value

Page 56 of 59
Exchange Server

26. Name the E-Mail Policy and Compliance features included in Exchange Server 2007?
Address Rewriting
Disclaimer
Journaling
Transport Rules
Message Records Management

27. What is Address Rewriting?


Address Rewriting Agent runs in Edge Transport Server. The main purpose of Edge Transport Server is to
rewrite the Address the address to some other address. This plays an important role, consider if there are 5 Sub
domain inside a forest and the entire sub domain want send mail outside with a unique address space
Exchange Server 2007 Interview Questions and Answers on Client Access Server Role

1. What is client Access Server Role?


The role that handles client requests for OWA, Outlook Anywhere, ActiveSync, OVA and offline address book
distribution. This role must be installed after the hub transport role and before the mailbox server role. You can
install the mailbox server role at the same time as the client access role, but not before.

2. What are the supportable clients?


Outlook
Outlook Web Access
Exchange Active Sync
POP3
IMAP4

3. What are services that are used by Client Access Server Role?
Following are the important services that Client Access Server depends to function properly
Exchange Data Services
Auto Discover Services
Synchronization and Data Services
Availability Service

4. What is Auto Discover Service?


The Auto Discover service allows clients to determine their Synchronization settings (such as Mailbox server
and so on) by entering in their SMTP address and their credentials. It is supported across standard OWA
connections.

5. What is Exchange Data Service?


Exchange Data Service provides the read/write access to mailbox and public folders mails, contacts, tasks and
calendar

6. What is Synchronization and Data Service?


Synchronization and Notification service alerts on changes in mailbox folders and public folders data and also it
provides mailbox and public folder synchronization

7. What is Availability Service?


The Availability service is the replacement for Free/Busy functionality in Exchange 2000/2003. It is responsible
for making a user’s calendar availability visible to other users making meeting requests, and also it retrieves the
published free/busy information from public folders and meeting time suggestions

8. What is POP3?
The Post Office Protocol 3 (POP3) is a legacy protocol that is supported in Exchange 2007. POP3 enables
simple retrieval of mail data via applications that use the POP3 protocol. Mail messages, however, cannot be
sent with POP3 and must use the SMTP engine in Exchange. By default, POP3 is not turned on and must be
explicitly activated.

9. What is IMAP4?

Page 57 of 59
Exchange Server

Legacy Interactive Mail Access Protocol (IMAP) access to Exchange is also available, which can enable an
Exchange server to be accessed via IMAP applications, such as some UNIX mail clients. As with the POP3
protocol, IMAP support must be explicitly turned on.

10. What is Exchange Active Sync?


ActiveSync provides for synchronized access to email from a handheld device, such as a Pocket PC or other
Windows Mobile device. It allows for real-time send and receives functionality to and from the handheld,
through the use of push technology.

11. What is Direct Push?


Direct Push is a Technology provides immediate message delivery to mobile devices. Mobile devices
incorporating Exchange ActiveSync maintain a secure connection with Exchange Server 2007, receiving new or
updated e-mail, calendar, contacts, and tasks as soon as they arrive on the server. This push method optimizes
bandwidth usage while keeping users up-to-date

12. What is Remote wipe?


If your device is lost, stolen, or otherwise compromised, you can issue a remote wipe command from the
Exchange Server computer or from any Web browser by using Microsoft Office Outlook Web Access. This
command erases all data from the mobile device.

13. What are the configurable tasks that are allowed when managing Exchange Active Sync?
You can perform the following Exchange ActiveSync tasks:
Enable and disable Exchange ActiveSync for users
Set policies such as minimum password length, device locking, and maximum failed password attempts
Initiate a remote wipe to clear all data off a lost or stolen device
Run a variety of reports for viewing or exporting into a reporting solution

14. What is outlook anywhere in Exchange Server 2007?


Outlook Anywhere (previously known as RPC over HTTP) is a method by which a full Outlook client can
dynamically send and receive messages directly from an Exchange server over an HTTP or Hypertext Transfer
Protocol Secure (HTTPS) web connection. This allows for virtual private network (VPN)–free access to
Exchange data, over a secured HTTPS connection.

15. What are the benefits of using Outlook Anywhere?


There are several benefits to using Outlook Anywhere to enable Outlook 2003 and Outlook 2007 clients to
access your Exchange messaging infrastructure. The benefits are as follows:
Remote access to Exchange servers from the Internet.
You can use the same URL and namespace that you use for Microsoft Exchange ActiveSync and Outlook Web
Access.
You can use the same Secure Sockets Layer (SSL) server certificate that you use for both Outlook Web Access
and Exchange ActiveSync.
Unauthenticated requests from Outlook cannot access Exchange servers.
Clients must trust the certification authority that issues the certificate.
You do not have to use a virtual private network (VPN) to access Exchange servers across the Internet.

16. What is Outlook Web Access?


Outlook Web Access in Exchange Server 2007 lets you access your e-mail from any Web browser. Outlook
Web Access has been redesigned in Exchange Server 2007 to enhance the user experience and productivity in
many ways. New features, such as smart meeting booking, Microsoft Windows SharePoint Services and
Universal Naming Convention (UNC) file share integration, and improvements in reminders and the address
book, give you a rich user experience from any computer that has a Web browser.

17. What are the virtual directories created when installing Exchange Server 2007 CAS?
Following are the virtual directories created when installing Exchange Server 2007 CAS
\OWA - used by Outlook Web Access to access mailboxes on Exchange 2007 mailbox servers.
\Public - used to access public folders by using the Outlook Web Access application
\Exchange - used by OWA when accessing mailboxes on computers that are running Exchange 2003 or
Exchange 2000
\Exchweb - used with the Outlook Web Access application for mailboxes on computers that are running
Exchange 2003 or Exchange 2000

Page 58 of 59
Exchange Server

\EXCHADMIN - An access the same folders that are available through other virtual directories and is used to
change administrative settings and properties, only users who have administrative permissions can access the
/exadmin virtual directory

18. What are the OWA Authentication options?


Standard Authentication (Basic, Digest and Windows Integrated)
Forms Based authentication
ISA Server Forms Based authentication
Smart card and certificate
RSA secure ID

19. What are the new features in OWA with Exchange Server 2007 sp1?
Users can create and edit personal distribution lists.
Users can create and edit server side rules.
WebReady Document Viewing has added support for some file formats of the 2007 Microsoft Office system.
Users will have access to the dumpster from Outlook Web Access and will be able to use the Recover Deleted
Items feature.
A monthly calendar view has been added.
Move and copy commands have been added to the Outlook Web Access user interface.
Public Folders are supported through the /owa virtual directory.
S/MIME support has been added.
· Additional customization features that have been added include the following:
· The ability to integrate with custom message types in the Exchange store so that they are displayed correctly in
Outlook Web Access.
· The ability to customize the Outlook Web Access user interface to seamlessly integrate custom applications
into Outlook Web Access.

20. Name the Two versions of OWA clients and explain them?
There are two versions of Outlook Web Access included in Exchange Server 2007: the full-featured Premium
Outlook Web Access client and the new Outlook Web Access Light client. Outlook Web Access Light is
designed to optimize your Outlook Web Access experience for mobile devices and slower connections.
Outlook Web Access Premium is designed especially for IE6 and IE7. It has the OWA full functionality

21. Where OWA configurations Settings are stored?


OWA configurations Settings are stored in Active Directory

23. What is CAS proxy?


CAS in user’s mailbox AD site not available on Internet, OWA will proxy user request to the CAS in the
Mailbox AD site

24. What is CAS redirection?


CAS in User’s Mailbox on the internet, but user accesses different OWA URL. OWA shows page telling user
the correct OWA URL for their home site

25. What is outlook Voice Mail Form?


The Outlook 2007 voice mail form resembles the default e-mail form, but gives users an interface for
performing actions such as playing, stopping, or pausing voice messages, playing voice messages on a
telephone, and adding and editing notes.
The voice mail form includes the embedded Windows Media Player and a notes field. The embedded Player and
notes field are displayed in either the preview pane when you are previewing a voice message or in a separate
window when the voice message is opened by the user. If a user is not enabled for Microsoft Exchange Server
2007 Unified Messaging or Outlook 2007 has not been installed on the client computer, they receive voice
messages only as attachments, and the voice mail form is not available

http://exchange2k10.wordpress.com/exchange-server-2010-interview-questions-and-answers/
http://rajkumar-systemadmin.spaces.live.com/blog/

Page 59 of 59

You might also like