Preview

Guide to Exchange 2007 Setup

Powerful Essays
Open Document
Open Document
3401 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Guide to Exchange 2007 Setup
How to Setup Exchange Server 2007 SP1
Follow the steps below to correctly configure your Exchange Server 2007 SP1 email server for general use. Note that for this document we are assuming you are installing Exchange 2007 SP1 on Windows Server 2008 64-Bit. * Pre-Installation Checklist * Install Windows Server 2008 64-bit version * Configure your static IP address * Activate Auto Updates * Add role - Active Directory Services * Add role - Active Directory Lightweight Services * Add feature - Windows Process Activation Service * Add role - Web Server (IIS) * Add feature - PowerShell * Roles / Features NOT to install * Installing Exchange Server 2007 * Allow access to your Exchange Server * Adding E-Mail Users * Add your own internet domain to the “Accepted Domains” list * Configure a send connector for outgoing emails * Assign email addresses to users in the active directory * Configure Transport Settings under Global Settings

Pre-Installation Checklist
Make sure you have all of the following steps in place before you setup Exchange Server 2007 on Windows Server 2008 64-Bit.
For simplicity we are assuming you are setting up a small office where one machine will be used for both the Active Directory and the Exchange Server. This setup works just fine and reduces the number of machines to maintain. If you have a larger office you may want to consider separating the Active Directory machine and the Exchange 2007 Server.
Install Windows Server 2008 64-bit version
Exchange 2007 is a 64-bit application and requires 64-bit versions of Windows Server 2003 or Windows Server 2008. You should select a computer that is capable of running the 64-bit version of Windows Server 2003 or 2008. For this example we will start with a clean installation of Windows Server 2008 64-bit version that has not had any roles installed.
After installing Windows Server 2008, we

You May Also Find These Documents Helpful

  • Satisfactory Essays

    After reviewing the clients standard needs to upgrade the businesses operating systems and their current computer specifications as provided I have to come to two conclusions. The first thing I would like to say is that with 1 GB ram, 1.8 GHz processor and a DirectX 9 graphics adapter with WDDM it will be possible at minimum to upgrade to a windows 7 operating system. The version that I would recommend for the company is Windows 7 professional because it provides data protection with advanced network backup and EFS. This edition was designed for a business environment and can be centrally managed by a domain controller which would be perfect for the main office at the same time supporting the external computers running at the warehouse across town.…

    • 283 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Wiley, J. (2012). Windows Server 2008 Active Directory Configuration. Hoboken: John Wiley and Sons, Inc.…

    • 1426 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Nt1330 Unit 4 Paper

    • 567 Words
    • 3 Pages

    Emails provide stability to the organizations. Emails are the backbone that forms the base for the organization structure. Organization has different department for a different purpose. In order to communicate with the environment. Organizations use MS Outlook for maintaining a healthy communication environment in different departments. Every user mailbox data is stored in on exchange server in the form of edb files. In the presence of certain conditions EDB files of MS Outlook get corrupt and are not accessible.…

    • 567 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The reason an Exchange server must be assigned a static IP address is that the server’s host name must be associated with the server’s IP address in the Internet’s various DNS servers. Without this mapping, it is impossible for mail to be routed to the domain(s) managed by the mail server. That being said however, it IS possible to configure by using a third party POP3 client. It is much easier to just assign a static IP though.…

    • 868 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The DHCP server can be configured with Active Directory Explorer and DHCP Server for Windows. We can also include Internet Printing Client and Storage Manager for SANs to the file sharing and printing server. The email server can also be configured with the SMTP Server tool.…

    • 247 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Nt2670 Final Exam Paper

    • 408 Words
    • 2 Pages

    2) Microsoft Outlook and Entourage typically connect to Exchange Server 2007 using RPC-based connections and IMAP.…

    • 408 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It-260 Worksheet

    • 512 Words
    • 3 Pages

    Install the File Services role by using the Server Manager console. This enables you to deploy this computer as a file server and implement the various storage-related technologies supplied with Windows Server 2008.…

    • 512 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    NT2670 Midtern Questions

    • 842 Words
    • 3 Pages

    The Add Roles Wizard provides roles that fall into three basic categories: directory services, Application services, and what else?…

    • 842 Words
    • 3 Pages
    Powerful Essays
  • Powerful Essays

    POS 421 Week 1

    • 1116 Words
    • 5 Pages

    When it comes to installing Microsoft Windows Server 2008 R2, there are many different server roles that this software operating system has to offer. The first one is Active Directory Certificate Services and Active Directory Domain Services. Active Directory is a huge component when it comes to a server. This service has all the information about all of the users, the computers, and any other device that is connected to the network. The Active Directory assists IT professionals with being able to manage all of this information, and allows them to be able to facilitate any sharing that is going on between any end user in the company. Another role is the Active Directory Federation Services. This lets users have a web sign in capability, that lets users authenticate to different web applications by just logging in with one single user account. Another role that this has is the application server. This is a major role because the server can be used to hose and manage all of the critical business applications that the company needs to use. One major component also is the DHCP server, which the Windows Server does play a huge role in. The DHCP server is what assigns an IP address to any machine that is connecting to the network. This is critical because if the machine can’t get an IP address, then they won’t be able to communicate with the network. Along with the DHCP server, another role is the capability of being the fax server. This is self-explanatory, the fax server allows the company to send and receive faxes, and also allows IT personnel to be able to manage these jobs, or any settings or reports that are needed to be shown. Another major role is file services. The server basically holds all of the companies information, or software shares, so that when there is the need for a new install, or an employee needs a new piece…

    • 1116 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Unit 8 Assignment 2

    • 1088 Words
    • 3 Pages

    The Active Directory domain structure is handy to have whether your client’s network is big or small. As you may recall, in Windows NT, each domain had its own Administrator account and its own Domain Admin group that was responsible for managing that domain. In Windows 2000 and 2003 Server, the domain Administrator account and the Domain Admin group still exist and can be used the same way that you were used to using them in Windows NT. There is also an Enterprise Admin group. Members of this group can manage any object within the entire Active Directory, regardless of what domain it exists within.…

    • 1088 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    We have recently installed Windows 7 Professional onto a new primary HDD. We have installed the Windows 7 RC as a secondary HDD on the same computer. We have booted the RC version of Windows 7 to run the Microsoft Outlook 2007 and exported the messages rules. And for that purpose, we have saved the file to the new Windows 7…

    • 552 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Log files would be the first place one would look to check for suspicious activity in the event of a crime. They can help you understand where something went wrong. Creating a timeline, of before and after the performance problem or incident. The way traffic moves through a network, especially when the computers are only used for certain things, creates baseline behavior. When something is out of place, such anomalies seem suspicious; but legitimate traffic could be used in illegitimate ways and legitimate traffic can at times seem illegitimate. By consistently monitoring the network, and observing all the possibilities, the anomalies of legitimate traffic wont seem that abnormal and one can focus on the real problems. Predictable passwords that meet minimum length requirements but remain easily guessable is a hazard that could affect a network with a weak password. If that is a problem, one should probably change the password every so often. It would be in everyone’s best interest if the password security level was increased, and that they would expire after a certain amount of time. Removable storage devices that might contain malware, filtered only when passing through the network could be a problem but by limiting the privileges of users, adapted to the duties assigned to the individual. Making it clear that no removable storage devices are to be brought into the network under no circumstance unless necessary and properly screened first. If an unencrypted laptop with sensitive information was to fall in the wrong hands, it would be likely that there would be some sort of damage. To prevent that from happening it is important to encrypt the drives and other sensitive information, have a lockout procedure where you had to put the password in again after a certain amount of time or to view critical data, and to make sure that the device could be potentially monitored.…

    • 322 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Quiz 1

    • 308 Words
    • 2 Pages

    1. Which among the following is the process of process of proving that provided identity credentials are valid and correct?…

    • 308 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    70-680

    • 79519 Words
    • 319 Pages

    QUESTION 1 Your network consists of an Active Directory domain and a DirectAccess infrastructure. You install Windows 7 on a new portable computer and join the computer to the domain. You need to ensure that the computer can establish DirectAccess connections. What should you do? A. B. C. D. Install a computer certificate. Create a new network connection. Enable the Network Discovery firewall exception. Add the computer account to the Network Configuration Operators group.…

    • 79519 Words
    • 319 Pages
    Powerful Essays
  • Satisfactory Essays

    2. Under System, you can view the system type. If your computer is running Windows XP, do the following: 1. Click Start. 2. Right-click My Computer, and then click Properties. If you don't see "x64 Edition" listed, then you're running the 32-bit version of Windows XP. If "x64 Edition" is listed under System, you're running the 64-bit version of Windows XP. Which version of Windows 7 should I install: the 32-bit version or the 64-bit version? To install a 64-bit version of Windows 7, you need a CPU that's capable of running a 64-bit version of Windows. The benefits of using a 64-bit operating system are most apparent when you have a large amount of random access memory (RAM) installed on your computer, typically 4 GB of RAM or more. In such cases, because a 64-bit operating system can handle large amounts of memory more efficiently than a 32-bit operating system, a 64-bit system can be more responsive when running several programs at the same time and switching between them frequently. For more information, see Installing and…

    • 550 Words
    • 3 Pages
    Satisfactory Essays