© 2006 Global Knowledge Training LLC All rights reserved. Query-Based Distribution Groups Built-In Address Lists Building Custom Address Lists Controlling.

Slides:



Advertisements
Similar presentations
Managing User, Computer and Group Accounts
Advertisements

UAG Authentication and Authorization- part1
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
Introduction to Active Directory
11 WORKING WITH GROUPS Chapter 7. Chapter 7: WORKING WITH GROUPS2 CHAPTER OVERVIEW  Understand the functions of groups and how to use them.  Understand.
Staff Computer Training Exchange 2003: More User Friendly Vicki Hecht Cherry Delaney ITaP Luncheon October 14, 2003.
10.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
Administering Active Directory
Hands-On Microsoft Windows Server 2003 Administration Chapter 3 Administering Active Directory.
1 of 7 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
5.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 5: Working with File Systems.
7.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 7: Introducing Group Accounts.
1 of 5 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
Domain Name Server © N. Ganesan, Ph.D.. Reference.
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
Outlook 2007 Tips, Tricks, and Tools. Overview Main Screen Navigation Pane View Pane Reading Pane To–Do Bar Create a New Message Contacts Create a Signature.
Working with Mail Merge
HalFILE 3.0 Active Directory Integration. halFILE 3.0 AD – What is it? Centralized organization of network objects and security – servers, computers,
Chapter 7 WORKING WITH GROUPS.
Chapter 7 Managing OUs and Active Directory Accounts
03/07/08 © 2008 DSR and LDAP Authentication Avocent Technical Support.
© 2008 The McGraw-Hill Companies, Inc. All rights reserved. M I C R O S O F T ® Preparing for Electronic Distribution Lesson 14.
Active Directory Administration Lesson 5. Skills Matrix Technology SkillObjective DomainObjective # Creating Users, Computers, and Groups Automate creation.
© 2006 Global Knowledge Training LLC All rights reserved. Deploying Outlook 2003 Configuring Clients Outlook 2003 Security and Performance New Outlook.
1 Group Account Administration Introduction to Groups Planning a Group Strategy Creating Groups Understanding Default Groups Groups for Administrators.
MIGRATING FROM MICROSOFT EXCHANGE SERVER AND OTHER MAIL SYSTEMS Appendix B.
Section 2: Using Group Policy Management Tools Local vs. Domain Policies Editing Local Policies Managing Domain Policies Understanding Group Policy Refresh.
Windows Server 2003 Overview 1 Windows 2003 Server Overview Ayaz
Copyright 2000 eMation SECURITY - Controlling Data Access with
Section 10: Assigning and Publishing Software Packages Using MSI Packages to Distribute Software Using Group Policy as a Software Deployment Method Deploying.
© FPT Software Code Review with VS © FPT Software Agenda What is Code review? Run Code analysis in VS 2012 Configuring Code Analysis rule set.
7.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 7: Introducing Group Accounts.
Course ILT Internet/intranet support Unit objectives Use the Internet Information Services snap-in to manage IIS, Web sites, virtual directories, and WebDAV.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Two Installing and Configuring Exchange Server 2003.
Module 7 Active Directory and Account Management.
© Wiley Inc All Rights Reserved. MCSE: Windows Server 2003 Active Directory Planning, Implementation, and Maintenance Study Guide, Second Edition.
Section 13: Configuring Group Policy Preferences Introducing Group Policy Preferences Comparing Preferences and Policy Settings Configuring Preferences.
Section 9: Configuring Roaming Profiles and Folder Redirection Managing User Profiles Configuring Folder Redirection Using Folder Redirection and Roaming.
Section 5: Troubleshooting and Backing Up GPOs Using Group Policy Troubleshooting Tools Integration of RSoP Functionality Using Logging Options Backing.
Welcome to our very first Cooperative Conversations! Please open your Outlook program and minimize it, there will be an opportunity for you to try things.
Section 11: Implementing Software Restriction Policies and AppLocker What Is a Software Restriction Policy? Creating a Software Restriction Policy Using.
Module 3 Managing Recipient Objects. Module Overview Managing Mailboxes Managing Other Recipients Configuring Address Policies Configuring Address.
Module 4: Managing Recipients. Overview Introduction to Exchange Recipients Creating, Deleting, and Modifying Users and Contacts Managing Mailboxes Managing.
Chapter 10: Rights, User, and Group Administration.
Troubleshooting Security Issues Lesson 6. Skills Matrix Technology SkillObjective Domain SkillDomain # Monitoring and Troubleshooting with Event Viewer.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Five Managing Addresses.
Section 4: Understanding the Architecture of Group Policy Processing Group Policy Components in AD DS Understanding the Group Policy Processing Sequence.
Security Planning and Administrative Delegation Lesson 6.
Administering Groups Chapter Eight. Exam Objectives In this Chapter:  Plan a security group hierarchy based upon delegation requirements  Plan a security.
Staff Module and Summary of Changes 1. Icon Changes: Page 3 Signing In and Password/Pin Changes: Page 4 Logging Out: Page 8 Staff Module Changes: Page.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Three Managing Recipients.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Module 5: Managing Addresses and Address Lists.
Staff Module and Summary of Changes 1. Icon Changes: Page 3 Signing In and Password/Pin Changes: Page 4 Logging Out: Page 8 Staff Module Changes: Page.
1 Chapter Overview Using Group Objects Understanding Default Groups Creating Group Objects Managing Administrative Access.
Microsoft Windows Small Business Server 2003 Technical Overview Byron Hynes Microsoft Corporation
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
29 Copyright © 2009, Oracle. All rights reserved. Administering the Oracle Business Intelligence Presentation Catalog.
10.1 © 2004 Pearson Education, Inc. Lesson 10: Specifying Group Policy Settings Exam Microsoft® Windows® 2000 Directory Services Infrastructure.
6/19/2016 أساسيات الأتصال و الشبكات Communication & Networks Fundamentals lab 4.
Configuring the User and Computer Environment Using Group Policy Lesson 8.
COEXISTENCE WITH MICROSOFT EXCHANGE SERVER 5.5 Appendix A.
19 Copyright © 2008, Oracle. All rights reserved. Security.
Project Management: Messages
ACTIVE DIRECTORY ADMINISTRATION
Self Service Group Management (SSGM)
Unit 7 NT1330 Client-Server Networking II Date: 7/26/2016
IIS.
Chapter 9: Managing Groups, Folders, Files, and Object Security
Planning a Group Policy Management and Implementation Strategy
Presentation transcript:

© 2006 Global Knowledge Training LLC All rights reserved. Query-Based Distribution Groups Built-In Address Lists Building Custom Address Lists Controlling Access Section 8: Query Groups and Address Lists Microsoft Exchange Server 2003

© 2006 Global Knowledge Training LLC All rights reserved. Section Objectives After completing this section, you will be able to: Describe how query-based distribution groups work List the built-in address lists Create a custom filter Describe the function of the details templates Set restrictions on distribution groups Set restriction on address lists Give examples of query-based distribution groups and address lists 8-2

© 2006 Global Knowledge Training LLC All rights reserved. A New Type of Group 8-3

© 2006 Global Knowledge Training LLC All rights reserved. Requirements Exchange Server 2003 Exchange 2000 Server with SP3 Exchange Server 2003 System management extensions to ADUC Native Mode Organization 8-4

© 2006 Global Knowledge Training LLC All rights reserved. Dynamic Membership Red Green User 1 Red Green User 2 Red Blue User 3 Red query group Green query groupBlue query group 8-5

© 2006 Global Knowledge Training LLC All rights reserved. Expansion Servers 8-6

© 2006 Global Knowledge Training LLC All rights reserved. Creating a Query-Based Distribution Group 8-7

© 2006 Global Knowledge Training LLC All rights reserved. Configure the Query 8-8

© 2006 Global Knowledge Training LLC All rights reserved. Confirm the Configuration 8-9

© 2006 Global Knowledge Training LLC All rights reserved. Best Practices Use query-based distribution groups in an Exchange Server 2003 Native Mode Nest query-based distribution groups into Universal Distribution groups in multi-domain forests For large query-based distribution groups: Aggregate smaller query-based distribution groups Designate Expansions servers Index queried attributes User Exchange server level permission when creating query-based distribution groups 8-10

© 2006 Global Knowledge Training LLC All rights reserved. Verification 8-12

© 2006 Global Knowledge Training LLC All rights reserved. The Address Book 8-13

© 2006 Global Knowledge Training LLC All rights reserved. Global Address List 8-14

© 2006 Global Knowledge Training LLC All rights reserved. Offline Address List 8-15

© 2006 Global Knowledge Training LLC All rights reserved. All Address Lists 8-16

© 2006 Global Knowledge Training LLC All rights reserved. Address Book Views vs. Address Lists 8-17

© 2006 Global Knowledge Training LLC All rights reserved. Address List Filters 8-19

© 2006 Global Knowledge Training LLC All rights reserved. Creating an Address List 8-20

© 2006 Global Knowledge Training LLC All rights reserved. Address List Name 8-21

© 2006 Global Knowledge Training LLC All rights reserved. Configure the Filter Rules 8-22

© 2006 Global Knowledge Training LLC All rights reserved. Address List Structure 8-23

© 2006 Global Knowledge Training LLC All rights reserved. Details Templates 8-24

© 2006 Global Knowledge Training LLC All rights reserved. Edit Control 8-25

© 2006 Global Knowledge Training LLC All rights reserved. Custom Attributes 8-26

© 2006 Global Knowledge Training LLC All rights reserved. Who Can See and Do What? Distribution group Address list Figure 274: Distribution Group Security Settings Figure 275: Address List Security Settings 8-28

© 2006 Global Knowledge Training LLC All rights reserved. Restricting Address Lists 8-31

© 2006 Global Knowledge Training LLC All rights reserved. Restricting Query-Based Distribution Groups 8-33

© 2006 Global Knowledge Training LLC All rights reserved. Read All Properties Permission 8-35

© 2006 Global Knowledge Training LLC All rights reserved. 1.What is the difference between query-based distribution groups and standard distribution groups? 2.The amount of memory consumed by query-based distribution group is only a concern if you don’t have sufficient memory on your Exchange servers. a.True b.False Section Review The end result of using a query-based distribution group is the same as if you had used a standard distribution group. The difference is in how the members are added to the group. With a standard distribution group, members are statically added to the list. When a user needs to be added or removed from the group, an administrator must perform the task. Query-based groups use LDAP queries against Active Directory to determine who is a member of the list. This query need only be defined once and then left alone. 8-36

© 2006 Global Knowledge Training LLC All rights reserved. 3.Even when you have a new query-based distribution group created and you have tested it to make sure it is working your users might not see it when they open their address book. a.True b.False 4.List the three lists containers that are built-in to Exchange Section Review (cont.) All Global Address Lists All Offline Address Lists All Address Lists 8-36

© 2006 Global Knowledge Training LLC All rights reserved. 5. Describe the All Global Address List. 6. When will you use the offline address list? 7. What is the function of the View Consistency Checker? Section Review (cont.) This list is designed to show absolutely every mailbox and mail- enabled object in the Exchange organization. It is able to do this because the default filter is set to look for any type of recipient. If you support a mobile workforce. It scans the directory every five minutes looking for matches to the defined ABVs. 8-37

© 2006 Global Knowledge Training LLC All rights reserved. 8. How do you create a new address list? 9. What are details templates? Section Review (cont.) 1.Open the Exchange System Manager. 2.Navigate to the All Address Lists container. 3.Right-click the container and select New Address List. 4.Give the address list a name that describes the recipients that can be found by viewing the list. 5.Configure the filter rules. They control what a user sees when they open the properties for a recipient in the address book. 8-37

© 2006 Global Knowledge Training LLC All rights reserved. 10.How do you set a custom attribute? 11.Authenticated users groups can see and use the address lists and query-based groups. a.True b.False Section Review (cont.) 1.Open the properties for a recipient object that has been either mail or mailbox-enabled. 2.Select the Exchange Advanced tab and click the Custom Attributes button. 3.Choose one of the available extensionAttribute# objects. 4.Click Edit. 5.Type in a value. 8-38

© 2006 Global Knowledge Training LLC All rights reserved. 12. How do you set restrictions on address lists? 13. Who is no longer a member of the group Everyone on Windows Server 2003? Section Review (cont.) Restricting the Authenticated Users group from being able to open the address list is the easiest way to control access. Anonymous Logon. 8-38