Logo
Windows XP
Windows Vista
Windows 7
Windows Azure
Windows Server
Windows Phone
EPL Standings
 
 
Windows Server

Deploy Exchange Server 2010 Roles (part 2)

3/22/2011 9:28:04 PM

2. Exchange Server 2010 Editions

Exchange Server 2010 comes in two editions: Standard edition and Enterprise edition. Standard edition supports five databases on each server, and Enterprise edition supports up to 100 databases on each server. Both editions support high availability through database availability groups on the Enterprise edition of Windows Server 2008 and Windows Server 2008 R2. You select an edition of Exchange Server 2010 when you enter the license key as a postinstallation task. You do not select an edition of Exchange Server 2010 during the installation process. You should choose to deploy the Enterprise edition of Exchange Server 2010 when you want to host more than five databases on a server.

Although the 70-662 exam does not cover licensing, each user or device that accesses Exchange requires a standard Client Access License (CAL). A standard CAL gives access to the majority of Exchange Server 2010 features such as Outlook Web App, Federated Calendar Sharing, and standard email functionality. If a user needs advanced Exchange Server 2010 functionality, such as custom retention policies, voicemail with Unified Messaging, and Multi-Mailbox Search and Legal Hold, it is necessary to have both a Standard user CAL and an Enterprise CAL. The Enterprise CAL is a license that is obtained in addition to the Standard CAL and is not a replacement for the Standard CAL.


Note:

EXCHANGE SERVER EDITIONS AND CALs

To find out more about the editions of Exchange and licensing, consult the following article: http://www.microsoft.com/exchange/2010/en/us/Licensing.aspx.


3. Postinstallation Tasks

When a graphical installation completes, the Exchange Management Console automatically opens. The console will display the information shown in Figure 5, reminding you to complete postinstallation tasks. Clicking on the Finalize Deployment Tasks item launches a browser session to a page on Microsoft that provides postdeployment advice. It is possible to view this page only if the Exchange Server is able to establish a browsing session to the Internet, either directly or through a proxy.

Figure 5. Postinstallation tasks


This TechNet page instructs you to perform the following tasks:

  • Enter the product key for Exchange Server 2010. You can do this using the Set-ExchangeServer cmdlet or by navigating to Server Configuration in the Exchange Management Console and clicking on Enter Product Key Group in the Action pane. You must enter a product key within 120 days of deploying Exchange Server 2010.

  • Install a product to protect Exchange Server 2010 from malware. This includes but is not limited to Forefront Security 2010 for Exchange Server. 

  • If you have deployed the Mailbox server role:

    • Configure an Offline Address Book and Offline Address Book distribution for Outlook clients. 

    • Configure High Availability and Site Resilience. 

  • If you have deployed the Client Access server role, configure secure access for the Client Access server role and configure Exchange ActiveSync security, authentication, and policies. 

  • If you have deployed the Hub Transport server role, configure domains for which you will accept email messages and configure Internet mail flow.

  • If you have deployed the Edge Transport server role, you need to configure an EdgeSync between this server and the Hub Transport servers. 


Note:

FINALIZE EXCHANGE DEPLOYMENT TASKS

You can review the document that is launched when you click on the Finalize Deployment Tasks item in Exchange Management Console by navigating to the following TechNet link: http://technet.microsoft.com/en-us/library/bb125262.aspx.


4. Firewall Configuration

The Exchange Server 2010 setup process configures Windows Firewall with Advanced Security so that all necessary ports required to support the roles that you deploy are open for server and client communication. As this process occurs automatically, it is not necessary to use the Security Configuration Wizard tool to configure these settings.

In some cases, it will be necessary to configure the ports on a separate hardware-based firewall to allow traffic to or from a server running Exchange Server 2010, such as if you have a hardware firewall separating subnets on your organization’s internal network. The most commonly used ports for each role are as follows:

  • 25 Hub Transport, Edge Transport server SMTP traffic

  • 135 Mailbox server MAPI access

  • 80 Client Access server Autodiscover, availability, Outlook Web App, Outlook Anywhere, Exchange ActiveSync

  • 443 Client Access server secure (SSL) Autodiscover, availability, Outlook Web App, Outlook Anywhere, Exchange ActiveSync


Note:

EXCHANGE NETWORK PORT REFERENCE

To learn more about the network ports that are used by Exchange Server 2010, consult the following article on TechNet: http://technet.microsoft.com/en-us/library/bb331973.aspx.


5. Verifying Setup

When you install Exchange Server 2010 using the graphical setup tool, you are presented with a setup summary detailing whether each step of the setup process has completed successfully. This summary is shown in Figure 6 and allows you to quickly determine whether all components have installed correctly. The completion summary will detail steps that do not complete correctly should problems occur during the installation.

Figure 6. Successful setup


When setup completes, you can also view the setup log by clicking on View Setup Log from the completion page of the setup wizard. This file can also be opened directly using Notepad.exe and is stored at C:\ExchangeSetupLogs\ExchangeSetup.log. This log is available whether the setup fails or succeeds. This log is created and updated during the Exchange installation process, and you can examine it using notepad.exe to diagnose why a specific Exchange Server 2010 deployment has failed.

Another tool that you can use to verify that Exchange Server 2010 has been deployed successfully is the Get-Exchange Server cmdlet. Executing the Get-ExchangeServer cmdlet provides information about a specific Exchange Server. You can use the following command to view information about Exchange Server VAN-EX1:

Get-ExchangeServer -Identity VAN-EX1 | Format-List

The output of this command will inform you of which roles have been deployed, the path where Exchange files have been installed, the network name of the Exchange server, and the location of the Exchange Server’s Active Directory object.


Note:

VERIFY AND INSTALLATION

To learn more about verifying an Exchange Server 2010 installation, consult the following TechNet link: http://technet.microsoft.com/en-us/library/bb125254.aspx.

Other -----------------
- Installing Exchange Server 2010 : Configure the Server to Host Exchange Server 2010
- Configure the Environment for Exchange Server 2010 (part 2) - Preparing for Coexistence and Migration
- Configure the Environment for Exchange Server 2010 (part 1) - Preparing a New Environment for Exchange 2010
- SharePoint Disaster Recovery Design and Implementation : Defining Scope
- SharePoint Disaster Recovery Planning and Key Concepts : Assessment and Planning
- SharePoint Disaster Recovery Planning and Key Concepts : Key Concepts and Terms
- Windows Server 2003 : Implementing VPNs (part 2) - Configuring VPN Types
- Windows Server 2003 : Implementing VPNs (part 1) - Understanding Virtual Private Networks
- Installing Microsoft SharePoint Server 2010 and Configuring PerformancePoint Services : Configuring PPS (part 5) - Activating the Feature in the Web Application
- Installing Microsoft SharePoint Server 2010 and Configuring PerformancePoint Services : Configuring PPS (part 4) - Set the Unattended Service Account & Associating the Service Application Proxy with a
- Installing Microsoft SharePoint Server 2010 and Configuring PerformancePoint Services : Configuring PPS (part 3) - Creating the PerformancePoint Service Application
- Installing Microsoft SharePoint Server 2010 and Configuring PerformancePoint Services : Configuring PPS (part 2)
- Installing Microsoft SharePoint Server 2010 and Configuring PerformancePoint Services : Configuring PPS (part 1) - Configuring the Secure Store Service
- Manage the Active Directory Domain Services Schema : Add Attributes to Ambiguous Name Resolution Filter
- Manage the Active Directory Domain Services Schema : Remove Attributes from the Index
- Manage the Active Directory Domain Services Schema : Index Attributes
- Windows Communication Foundation Primer : Implementing contracts in services
- Windows Communication Foundation Primer : Defining the contract
- Implementing Edge Services for an Exchange 2010 Environment : Implementing Safelist Aggregation for Outlook 2003 and Outlook 2007
- Implementing Edge Services for an Exchange 2010 Environment : Using EdgeSync to Synchronize Active Directory Information to the Edge Transport Server
 
 
Most view of day
- Microsoft Dynamic CRM 4 : Data Migration (part 4) - Creating a Data Migration
- Microsoft Dynamic GP 2010 : Providing clean vendor information by properly closing Purchase Orders, Protecting against information loss by printing Fixed Asset Reports
- Windows Server 2012 Administration : Configuring Sites (part 2) - Creating a Site - Adding Domain Controllers to Sites
- Windows Phone 7 Programming Model : Application Data Persistence
- Microsoft OneNote 2010 : Doing Research with Linked Notes (part 2) - Ending a Linked Notes Session, Viewing Linked Notes
- Working with the User State Migration Tool (part 5) - Getting Extra Mileage Out of the USMT
- Maintaining Desktop Health : Using Task Scheduler (part 1) - Task Scheduler Architecture
- Microsoft OneNote 2010 : Using the Research and Translate Tools (part 3) - Translating Text with the Mini Translator
- Sharepoint 2013 : Backup and Restore (part 5) - Farm Backup and Restore - Performing a Backup
- Maintaining Security : Setting Your Password, Changing Your Password, Resetting Your Password
Top 10
- Creating an XPS Document,Scanning a Picture, Scanning Anything
- Printing Your Photographs, Printing Web Pages - Print the Pictures, Fix the Layout
- Specifying a Default Printer, Controlling Your Printing - Change the Default Printer, View the Queue, Stop the Presses
- Printing from a Program, Printing a Document - Print a Document Using the Default Printer, Print a Document Using a Specific Printer
- Microsoft Excel 2010 : Protecting and Securing a Workbook - Setting Macro Security Options
- Microsoft Excel 2010 : Protecting and Securing a Workbook - Setting ActiveX Security Options
- Microsoft Excel 2010 : Protecting and Securing a Workbook - Setting Add-in Security Options
- Microsoft Excel 2010 : Protecting and Securing a Workbook - Setting Document Related Security Options
- Microsoft Excel 2010 : Protecting and Securing a Workbook - Selecting Trusted Publishers and Locations
- Windows Phone 8 : The Multimedia Experience - Xbox Music Pass (part 2) - Playing Music from the Xbox Music Pass
 
 
Windows XP
Windows Vista
Windows 7
Windows Azure
Windows Server
Windows Phone
2015 Camaro