Download presentation
Presentation is loading. Please wait.
1
Managing Recipient Objects
Presentation: 75 minutes Lab: 75 minutes After completing this module, the students will be able to: Describe the different types of Exchange Server 2013 mailboxes. Create and configure distribution groups. Create and manage public folders. Configure address policies and address lists. Required materials To teach this module, you need the Microsoft® Office PowerPoint® file 20341B_03.pptx. Important: We recommend that you use Office PowerPoint® 2007 or newer to display the slides for this course. If you use PowerPoint Viewer or an older version of Office PowerPoint, some features of the slides might not display correctly. Preparation tasks To prepare for this module: Read all of the materials for this module. Practice performing the demonstrations. Practice performing the labs. Work through the Module Review and Takeaways section, and determine how you will use this section to reinforce student learning and promote knowledge transfer to on-the-job performance. As you prepare for this class, it is imperative that you complete the labs yourself so that you understand how they work and the concepts that are covered in each. This will allow you to provide meaningful hints to students who may get stuck in a lab, and it also will help guide your lecture to ensure that you cover the concepts that the labs cover. Module 3 Managing Recipient Objects
2
Managing Address Lists and Policies
20341B Module Overview 3: Managing Recipient Objects Managing Address Lists and Policies
3
Lesson 1: Managing Exchange Server 2013 Mailboxes
3: Managing Recipient Objects What Are Linked Mailboxes?
4
Types of Exchange Server Recipients
20341B Types of Exchange Server Recipients 3: Managing Recipient Objects Exchange Server recipients include: User mailboxes Mail contacts Mail users Resource mailboxes Shared mailboxes Mail-enabled security and distribution groups Dynamic distribution groups Linked mailboxes Remote mailboxes Site mailboxes Explain the different types of Exchange recipients. It is important that the students understand each recipient type, because creating and configuring recipients are common and fundamental tasks that Exchange administrators perform. Consider presenting this topic in a question-and-answer format, in which you ask the students to define each type of recipient. This will help you to evaluate student knowledge, and will encourage the students to interact.
5
Managing Mailboxes 20341B 3: Managing Recipient Objects
Do not spend too much time on this slide. Instead, move on to the next topic, which is a demonstration that covers many of the configuration options mentioned in this topic.
6
Demonstration: Creating and Configuring Mailboxes
3: Managing Recipient Objects In this demonstration, you will see how to: Create a user mailbox Configure user mailbox settings Delete and disable user mailboxes Create mailboxes using the Exchange Management Shell Leave the virtual machines running for subsequent demonstrations. Preparation Steps To perform this demonstration, ensure that the 20341B-LON-DC1, 20341B-LON-MBX1, and 20341B-LON- CAS1 virtual machines are running. Start each machine and sign in to it before starting the next virtual machine. Sign into all virtual machines using the Adatum\Administrator account with the password Pa$$w0rd. Important: Ensure that you start your virtual machines at least ten minutes prior to conducting the demonstration. Demonstration Steps On LON-CAS1, in Start, click Internet Explorer and connect to Sign in as Adatum\administrator using the password Pa$$w0rd. In the Feature pane, click recipients. In the toolbar, click New, and then click User mailbox. In the new user mailbox dialog box, fill in the following information: Alias: Alice Click New user First name: Alice Last name: Ciccu Organizational unit: click browse, click Research, and then click ok. User logon name: Alice New password and Confirm password: Pa$$w0rd (More notes on the next slide)
7
3: Managing Recipient Objects
Click more options. Click browse, click Research, and click ok. Click save. In the List view, click Alice Ciccu. Review the options displayed in the Details pane. Double-click Alice Ciccu. In the User Mailbox window, click on the tabs and describe the settings available for the user account. On the tabs where the More options link appears, click the link. In the List view, click Alice Ciccu. Then, on the toolbar, click the Delete icon, and then click yes. In the List view, click Anil Elson. On the toolbar, click the More icon, then click Disable, and then click yes. On LON-DC1, open Server Manager. Click Tools, and then click Active Directory Users and Computers. Click the Research organizational unit (OU). Verify that Alice Ciccu’s account has been deleted and that Anil Elson’s account is still listed. On LON-CAS1, on the Start page, click Exchange Management Shell. Type the following command, and then press Enter. Enabl box –id Anil –Database Research Get-User –OrganizationalUnit Development | Enabl box –Database “Mailbox Database 1”
8
Demonstration: Moving Mailboxes
3: Managing Recipient Objects In this demonstration, you will see how to: Move a mailbox Create and monitor a migration batch Leave all virtual machines running for the subsequent demonstration. Preparation Steps To perform this demonstration, ensure that the 20341B-LON-DC1, 20341B-LON-MBX1, and 20341B-LON- CAS1 virtual machines are running. If required, sign into all virtual machines using the Adatum\Administrator account with the password Pa$$w0rd. To perform this demonstration, you must also have completed the previous demonstration. Demonstration Steps On LON-CAS1, switch to the EAC. In the Features pane, click recipients, and then click mailboxes. Click April Reagan, and in the Details pane, under Move Mailbox, click To another database. In the New Migration Batch window, in the New migration batch name box, type Move April’s mailbox. Under Target database, click browse, click Research, click add, and then click ok. Click next, and then click new. In the Information dialog box, click yes. In the EAC, on the migration tab, click New, and then click Move to a different database. In the new local mailbox move window, under Select the users that you want to move, click Add. In the Select Mailbox window, sort the view by clicking the Database column. Press the Shift key, then select all mailboxes in the Mailbox Database 1 database. Click add, and then click ok. Click next. In the New Migration Batch window, in the New migration batch name box, type Move Mailbox Database 1 mailboxes. (More notes on the next slide)
9
3: Managing Recipient Objects
Under Target database, click browse, click Research, click add, and then click ok. Click next, and then click new. On the migration tab, click Status For All Batches. In the Status for All Batches window, click Close.
10
What Are Resource Mailboxes?
3: Managing Recipient Objects Mailboxes that represent meeting rooms or shared equipment, and that you can include as resources in meeting requests To create a resource mailbox: Create a new mailbox as a room or equipment mailbox Configure the resource properties Configure how the resource mailbox will accept meeting requests Resource mailboxes are specific types of mailboxes that can represent meeting rooms or shared equipment, and that you can include as resources in meeting requests. Resource mailboxes have different properties associated with the mailbox than regular user mailboxes do. In addition, the Active Directory user that is associated with a resource mailbox is a disabled account. Ask the students whether they will need to change the default settings for how resource mailboxes respond to meeting requests. In most organizations, the default settings will be acceptable for most meeting rooms, but most organizations have a few meeting rooms that have special requirements. Ask the students to provide some examples, and then consider showing the students how you could configure room mailboxes to address their scenario in the next demonstration.
11
Demonstration: Creating and Managing Resource Mailboxes
3: Managing Recipient Objects In this demonstration, you will see how to: Create and configure a resource mailbox Configure a resource mailbox with delegates Leave the virtual machines running for the subsequent demonstration. Preparation Steps To perform this demonstration, ensure that the 20341B-LON-DC1, 20341B-LON-MBX1, and 20341B-LON- CAS1. These should be running from the preceding demonstration. You will also need to start 20341B- LON-CL1. If necessary, sign into all servers using the Adatum\Administrator account with the password Pa$$w0rd. Do not log on to LON-CL1 until directed to do so. Demonstration Steps On LON-CAS1, in the EAC, on recipients, click the resources tab. Click the drop down arrow next to New, and then click Room mailbox. Fill in the following information: Room name: Conference Room 1 address: ConferenceRoom1 Organizational unit: Click browse, click Sales, and then click ok. Location: London Capacity: 20 Click more options, under Mailbox database click browse, click Mailbox Database 1, and then click ok. Click save. On the resources tab, click Conference Room 1, and then click Edit. Click booking options. Change the Maximum booking lead time (days) setting to 365. (More notes on the next slide)
12
3: Managing Recipient Objects
In the If you want the meeting organizer to receive a reply, enter the text below field, type You have successfully booked Conference Room 1. Click save. On LON-CL1, sign in as Adatam\Aidan with the password Pa$$w0rd. Right-click the Start screen and click All apps. From the Start screen, click Outlook 2013. In the Welcome to Microsoft Outlook 2013 Wizard, click Next. On the Add an Account page, click Next. On the Account page, click Next. On the Configuring page, click Finish. In Outlook, in the First things first dialog box, click Ask me later and then click Accept. In Outlook, click the down arrow next to New Items, and then click Meeting. In the Untitled - Meeting window, type Sales Meeting as the subject, then type Administrator in the To field. Click Scheduling Assistant. Select a Start time and an End time. Click Add Rooms, click Conference Room 1, click Rooms, and then click OK. Click Appointment, and then click Send. In Outlook, verify that Aidan receives a message that the meeting has been accepted by Conference Room 1, and that the acceptance includes the custom text that you assigned to the room. On LON-CAS1, in the EAC, on the resources tab, click Conference Room 1, and then click Edit. (More notes on the next slide)
13
3: Managing Recipient Objects
Click booking delegates, and then click Select delegates who can accept or decline booking requests. Click Add, click Amr Zaki, click Add, and then click ok. Click save. On LON-CL1, in Outlook, click the down arrow next to New Items, and then click Meeting. In the Untitled - Meeting window, type IT Meeting as the subject, then type Administrator in the To field. Click Scheduling Assistant. Select a Start time and an End time that does not conflict with any other meetings. Click Add Rooms, click Conference Room 1, click Rooms, and then click OK. Click Appointment, and then click Send. Review the response received from the meeting room. On the taskbar, click Internet Explorer and connect to Sign in as Adatum\amr, using the password Pa$$w0rd. Click save. Click the meeting request sent by Aidan, click Accept, and then click send the response now. Close Internet Explorer. In Outlook, verify that the meeting response was received from Amr. Close Outlook.
14
What Are Site Mailboxes?
3: Managing Recipient Objects Clients Compliance Make it clear to the students that most of the work in configuring site mailboxes is done in SharePoint Refer to the URL to provide details on how to configure the integration of Exchange Server 2013 and SharePoint 2013 to enable site mailboxes. Also stress that site mailboxes are only available with Outlook 2013, Exchange Server 2013, and SharePoint 2013. Owners Site Mailbox Members Outlook SharePoint Management Membership Shared Storage Owners Members Provisioning Lifecycle Exchange Site Mailbox SharePoint Site
15
What Is a Shared Mailbox?
3: Managing Recipient Objects Shared mailboxes are used to provide multiple users access to a common mailbox Shared mailboxes can be created in a single step in the EAC or Exchange Management Shell Users can be granted Full Access and Send As permissions Highlight the difference between how shared mailboxes are implemented in Exchange Server compared to previous versions of Exchange. In previous versions of Exchange, you could create a mailbox and grant other users Full Access, Send As, or Send on Behalf of permissions. You could even disable the user account associated with the mailbox. In Exchange Server 2013, the shared mailbox enables you to do exactly the same thing; the only difference is that now you can configure these settings automatically when you create the shared mailbox.
16
Demonstration: Creating a Shared Mailbox
3: Managing Recipient Objects In this demonstration, you will see how to create and configure a shared mailbox Leave all virtual machines running for subsequent demonstrations. Preparation Steps To perform this demonstration, ensure that the 20341B-LON-DC1, 20341B-LON-MBX1, 20341B-LON- CAS1, and 20341B-LON-CL1 virtual machines are running. If necessary, sign into all virtual machines using the Adatum\Administrator account with the password Pa$$w0rd. Demonstration Steps On LON-CAS1, switch to EAC. Click the shared tab. Click New. Fill in the following information: Display name: Sales Information address: salesInfo Under Full Access, click Add, click Aidan Delaney, and click add. Click Amr Zaki, click add, and click ok. Click more options. Under Mailbox database, click browse, click Mailbox Database 1, and click ok. Click save. In Internet Explorer, connect to Click new mail. Create a new message with the recipient Sales Information and the subject Information request. Send the message. On LON-CL1, ensure that you are logged in as Aidan. Open Outlook 2013. (More notes on the next slide)
17
3: Managing Recipient Objects
In Outlook, verify that the Sales Information folder is displayed. It can take a few minutes for the folder to appear. Under Sales Information, click Inbox, click the message from Administrator, and then click Reply. Type a message, and then click Send. Open Internet Explorer, and connect to Sign in as Adatum\amr, using the password Pa$$w0rd. Click the down arrow beside Amr Zaki, and then click Open another mailbox. Type click Search Contacts & Directory, and then click open. In the Outlook Web App window, click save. Verify that Amr has access to the mailbox. Close Internet Explorer.
18
What Are Linked Mailboxes?
3: Managing Recipient Objects Provide mailboxes for users in separate, trusted forests Mailboxes can be used in: Resource forest scenarios Merger and acquisition scenarios Requirements: The domain where Exchange Server is deployed must trust the user account domain The user account must exist in the user account domain A two-way trust is recommended to simplify administration Consider drawing a diagram of two AD DS forests with Exchange Server 2013 deployed in one of the forests. Show the user account in the forest that does not contain Exchange Server 2013, emphasizing that the user will sign in to that forest. Show how the user is then able to connect to the linked mailbox in Exchange Server 2013.
19
Lesson 2: Managing Other Exchange Recipients
20341B Lesson 2: Managing Other Exchange Recipients 3: Managing Recipient Objects Managing Mail Contacts and Mail Users
20
What Are Distribution Groups?
3: Managing Recipient Objects Distribution groups are mail-enabled groups that appear in the GAL Distribution groups are used to: Send messages to multiple users at one time Assign permissions to Exchange objects Distribution groups can be: Mail-enabled universal security groups Mail-enabled universal distribution groups Dynamic distribution groups are mail-enabled groups in which the membership list is calculated based on user attributes when a message is sent to the group Ask the students to describe the difference between security groups and distribution groups. Discuss the implications of mail-enabling security groups. For example, security groups can be used to provide access to network resources, so the membership of security groups is usually strictly controlled. The same groups might or might not have the right membership for distribution.
21
Demonstration: Creating and Configuring Distribution Groups
3: Managing Recipient Objects In this demonstration, you will see how to: Configure mail-enabled universal distribution groups Configure mail-enabled universal security groups Configure dynamic distribution groups Leave all virtual machines running for subsequent demonstrations. Preparation Steps To perform this demonstration, ensure that the 20341B-LON-DC1, 20341B-LON-MBX1, 20341B-LON- CAS1, and 20341B-LON-CL1 virtual machines are running. If necessary, sign into all virtual machines using the Adatum\Administrator account with the password Pa$$w0rd. Demonstration Steps On LON-CAS1, switch to Internet Explorer and connect to Click the groups tab. Click the arrow next to New, and then click Distribution group. Fill in the following information: Display name: Sales Managers Alias: SalesManagers Organizational unit: Sales Members: Bonnie Kearney, Dennis Bye Owner approval is required: Closed Choose whether the group is open to leave: Closed Click save. Double-click the Sales Managers group. Click and describe the configuration options available on the delivery management and group delegation tabs. Click cancel. Click the drop down arrow next to New, and then click Security group. (More notes on the next slide)
22
3: Managing Recipient Objects
Fill in the following information: Display name: IT Managers Alias: ITManagers Organizational unit: IT Members: April Reagan, Magnus Hedlund Owner approval is required: Selected Click save. Double-click the IT Managers group. Click the message approval tab. Select the Messages sent to this group have to be approved by a moderator check box. Under Group moderators, click Add, and add Amr Zaki as the moderator. Under Senders who don’t require message approval, click Add, and add the IT group. Click the drop down arrow next to New, and then click Dynamic distribution group. Display name: Developers Alias: Developers Organizational unit: Development Owner: Administrator Under Members, click Only the following recipient types, and select the Users with Exchange mailboxes check box. Click add a rule. (More notes on the next slide)
23
3: Managing Recipient Objects
From the drop-down list, click department. In the specify words or phrases page, type development, click +, and then click ok. Click save.
24
Implementing Self-Service Distribution Group Management
3: Managing Recipient Objects To enable group self-service: Assign non-Exchange administrators as distribution group owners Enable open distribution group memberships Enable users to create and manage their own distribution groups Use group naming policies to manage the distribution group names Ask the students to provide examples of when they have implemented the delegation of group memberships. Ask them to describe the scenario, and then describe how this could be implemented by using the Exchange Server 2013 options.
25
Demonstration: Configuring Self-Service Distribution Group Management
3: Managing Recipient Objects In this demonstration, you will see how to: Configure and test open group membership Configure a group naming policy Configure user group management Leave all virtual machines running for subsequent demonstrations. Preparation Steps To perform this demonstration, ensure that the 20341B-LON-DC1, 20341B-LON-MBX1, 20341B-LON- CAS1, and 20341B-LON-CL1 virtual machines are running. If necessary, sign into all virtual machines using the Adatum\Administrator account with the password Pa$$w0rd. Demonstration Steps On LON-CAS1, switch to EAC. Click the groups tab. Click the drop down arrow next to New, and then click Distribution group. Fill in the following information: Display name: TechDiscussion Alias: TechDiscussion Organizational unit: IT Members: none Owner approval is required: Open Choose whether the group is open to leave: Open Click save. On LON-CL1, switch to OWA in Internet Explorer. Beside the user name, click Settings, and then click Options. On the Outlook Web App options page, click groups. In the all groups window, click the Join icon. (More notes on the next slide)
26
3: Managing Recipient Objects
Click TechDiscussion, and click Join. Click ok. Close Internet Explorer. On LON-CAS1, in the EAC on the groups tab, double-click TechDiscussion. Click membership, and verify that Amr Zaki is now a group member. Click cancel. On the groups tab, click more, and then click Configure group naming policy. In the Group Naming Policy section, in the prefix section, click the Select one, and then click Text. In the Enter text dialog box, type DL_, and then click ok. In the suffix section, click Select one, and then click Attribute. In the select an attribute dialog box, click the down arrow, and click Company. Click ok. Click save. In the EAC, click the permissions tab. Click user roles, and then click edit to edit the Default Role Assignment Policy. In the Default Role Assignment Role window, in the Distribution groups section, select the MyDistributionGroups check box. Click save, and then click yes. On LON-CL1, open Internet Explorer and connect to Sign in as Adatum\Aidan using the password Pa$$w0rd. Click save. Beside the user name, click Settings, and then click Options. On the Outlook Web App options page, click groups. Under distribution groups I own, click New. On the new distribution group page, type EXAdmins as the Display name and the Alias, and click save. (More notes on the next slide)
27
3: Managing Recipient Objects
Read the information dialog box that explains the group policy naming policy, and click ok. Close Internet Explorer.
28
Managing Mail Contacts and Mail Users
20341B Managing Mail Contacts and Mail Users 3: Managing Recipient Objects Mail contacts: Mail-enabled AD DS contacts Listed in the GAL Provide addresses for users or groups that exist outside the Exchange organization Mail users: Similar to mail contacts, but mail users have AD DS security identifiers Can access resources in the local domain, but is sent to external messaging systems
29
Lesson 3: Planning and Implementing Public Folder Mailboxes
3: Managing Recipient Objects Considerations for Implementing Public Folders
30
Using Public Folders in Exchange Server 2013
3: Managing Recipient Objects In Exchange Server 2013: Public folders are stored in public folder mailboxes Public folder mailboxes are stored in regular mailbox databases Can be placed in mailbox databases that are in a DAG Public folder content can be spread across multiple public folder mailboxes Can be added as Favorites in Outlook Web App in Exchange Server 2013 CU1 The primary public folder mailbox contains the only writeable copy of the public folder hierarchy Highlight the differences between how public folders are implemented in Exchange Server 2013 compared to previous versions of Exchange Server. Point out that despite the many server architectural changes, the experience for public folder users has changed very little. Mention the update in Exchange Server 2013 CU1 that enables users to now add public folders as Favorites in Outlook Web App.
31
Managing Public Folders
3: Managing Recipient Objects Public folder management includes: Configuring public folder permissions Mail-enabling public folders Managing quota and retention settings Monitoring public folders Emphasize that most of the management tasks for public folders have not changed in Exchange Server You can still use Outlook to assign public folder permissions, and the permission options have not changed. You can still mail enable or disable public folders, and configure the quota and retention settings. The biggest change in managing public folders is that now you can perform most of the tasks in the EAC.
32
Demonstration: Creating and Configuring Public Folders
3: Managing Recipient Objects In this demonstration, you will see how to: Create a public folder mailbox Create a public folder Configure public folder permissions Leave all virtual machines running for subsequent demonstrations. Preparation Steps To perform this demonstration, ensure that the 20341B-LON-DC1, 20341B-LON-MBX1, 20341B-LON- CAS1, and 20341B-LON-CL1 virtual machines are running. If required, sign into all virtual machines using the Adatum\Administrator account with the password Pa$$w0rd. Demonstration Steps On LON-CAS1, switch to EAC. In the Feature pane, click public folders. Click the public folder mailboxes tab, and then click new public folder mailbox. On the new public folder mailbox page, type PFMBX1 in the Name field. Under Organizational unit, click browse, click IT, and then click ok. Under Mailbox database, click browse, click Mailbox Database 1 and then click ok. Click save. Perform steps 3 through 7 again, creating another public folder mailbox named PFMBX2. Click public folders, and then click New public folder. On the new Public Folder page, in the Name field, type Departments, and then click save. Click Departments, and then click New public folder. In the new Public Folder window, in the Name field, type IT, and then click save. From Start, click Exchange Management Shell. At the command prompt, type get-publicfolder –recurse | FL and then press Enter. Review the information displayed about each public folder. At the command prompt, type New-PublicFolder –Name Research –path \Departments –Mailbox PFMBX2, and then press Enter. (More notes on the next slide)
33
3: Managing Recipient Objects
In the EAC, on the public folders page, click refresh. Verify that the Research public folder is listed. Click Go to the parent folder. Ensure that the Departments public folder is selected, and then under Folder permissions, click Manage. Hint: do not click the Departments link. In the Departments window, click Add. In the public folder permissions window, next to User, click browse. In the Select Recipient window, click Administrator, and then click ok. Under Permission level, click Owner, and then click save. Select the Apply changes to this public folder and all its subfolders check box, and then click save. Click close.
34
Migrating Public Folders to Exchange Server 2013
3: Managing Recipient Objects Prepare the environment for the migration Prepare the public folder mapping file Create the public folder mailboxes on the Exchange 2013 server Start the migration request Lock down the public folders on the previous version of Exchange Server Finalize the public folder migration Spend some time on this topic because this process in Exchange Server 2013 is very different than migrating public folders in previous versions of Exchange Server. In previous versions of Exchange Server, you could just create a replica of a public folder on the newer Exchange Server version and then wait for public folder replication to copy the contents. Users could access public folders on either version of Exchange Server, and replication would keep both copies current. In an Exchange Server 2013 migration, you must copy all the public folder contents over to the Exchange Server 2013 servers, and then block access to the previous versions of Exchange Server public folders.
35
Considerations for Implementing Public Folders
3: Managing Recipient Objects Plan the geographic distribution of public folder contents and mailboxes Plan for public folder mailbox size limits Note that user access to public folders has not changed significantly Place the primary hierarchy public folder mailbox in a mailbox database in a DAG Use this topic to emphasize how different the public folder architecture is, and how this will change the process for planning the public folder deployments. Provide your own suggestions, and ask the students how they think their public folder deployments will need to be changed in Exchange Server 2013.
36
Lesson 4: Managing Address Lists and Policies
20341B Lesson 4: Managing Address Lists and Policies 3: Managing Recipient Objects Demonstration: Configuring Address Policies
37
Default address lists include:
20341B What Are Address Lists? 3: Managing Recipient Objects Recipient objects that are grouped together based on an LDAP query for specific AD DS attributes Address lists can simplify the process of locating recipients in the GAL Default address lists include: All Contacts All Groups All Rooms All Users Public Folders Default Global Address List Explain that address lists are recipient objects that are grouped together based on an LDAP query for specific Active Directory attributes. Mention that address lists sort the GAL into multiple views, which makes it easier to locate recipients. This is especially helpful for very large or highly segmented organizations. Explain that address lists are configured with recipient filters that determine which objects belong in each address list, similar to the way that you configure address policies. The address lists are evaluated every time you modify a mail-enabled account to determine on which address lists it should appear.
38
Demonstration: Configuring Address Lists
20341B Demonstration: Configuring Address Lists 3: Managing Recipient Objects In this demonstration, you will see how to create and configure address lists Leave all virtual machines running for subsequent demonstrations. Preparation Steps To perform this demonstration, ensure that the 20341B-LON-DC1, 20341B-LON-MBX1, 20341B-LON- CAS1, and 20341B-LON-CL1 virtual machines are running. Sign into all virtual machines using the Adatum\Administrator account with the password Pa$$w0rd. Demonstration Steps On LON-CAS1, switch to EAC. In the Feature pane, click organization, and then click the address lists tab. Click New. In the new address list window, type AllDepartments in the Name box. Click only the following recipient types, select the Users with Exchange mailboxes check box, and then click save. Click ok. In the new address list window, type Research in the Name box. Next to the Address list path, click browse. In the Address List Picker window, click AllDepartments, and then click ok. Click Only the following recipient types, and then select the Users with Exchange mailboxes check box. Click add a rule. Click Select one, and then click Department. In the specify words or phrases dialog box, type Research, click Add, and then click ok. Click Preview recipients the address includes, and verify that only members of the Research department are listed. Click close. (More notes on the next slide)
39
3: Managing Recipient Objects
Click save, click ok, and then click Update. Click yes, and then click close. On LON-CL1, open Outlook 2013. On the SEND/RECEIVE tab, click Send/Receive Groups, and then click Download Address Book. Click OK. On the HOME tab, click Address Book. Under Address Book, double-click Research and verify that the address list contains the users in the Research department. Close the Address Book window, and then close Outlook.
40
Configuring Offline Address Books
3: Managing Recipient Objects The offline address book is cached on the local client so that users can search the GAL when disconnected from Exchange Server The default offline address book contains the entire GAL Can configure custom offline address books that contain smaller address lists The offline address book: Is generated on the Mailbox server that hosts the Organization mailbox Is distributed through web services using the OAB virtual directory Point out the significant differences in how the offline address books are generated and configured in Exchange Server 2013 compared to earlier versions of Exchange server. The main differences are: In previous versions of Exchange, you could modify the offline address book generation server using the Exchange administration tools. In Exchange Server 2013, the only way to change which server will generate the offline address book is to move the Organizational mailbox. In previous versions of Exchange, you could distribute the offline address book through the OAB virtual directories, or through public folders. You cannot configure Exchange Server 2013 to distribute the offline address book through public folders. In previous versions of Exchange, you could manage the offline address book by using the graphical administration tools. In Exchange Server 2013, you can only manage the offline address book by using the Exchange Management Shell.
41
What Are Address Book Policies?
3: Managing Recipient Objects Effective Filter = Div1 GAL Address Lists Offline Address Book Room Address List Default Address List Div1 Users Div1 DLs Div1 Contacts Div1 OAB Div1 Room AL Div1 GAL Division1 ABP Company scenario: Company has two divisions in the same Exchange organization Users should see only other users in their division in the GAL Address Book Policy A Address Book Policy Assignment User Discuss the process that the Mailbox server uses when it receives data, as follows: The Mailbox server receives the message. The Mailbox server writes the message to the current transaction log and memory cache simultaneously. Note: If the current transaction log reaches 1 megabyte (MB) of storage, Exchange Server renames it and creates a new current transaction log. The Mailbox server writes the transaction from memory cache to the appropriate database. The Mailbox server updates the checkpoint file to indicate that the transaction was committed successfully to the database. Clients can access and read the message in the database. When time permits, identify the files from the previous slide that each step of this process affect. Div2 Users Div2 DLs Div1 Contacts Div1 DLs Div2 Contacts Div1 Users Div1 OAB Div2 OAB Div1 GAL Div2 GAL Div1 Room AL Div2 Room AL Div1 OAB +Div1 Users +Div1 Contacts + Div2 Users Div2 OAB +Div1 Users + Div1 DLs +Div2 DLs + Div 2 Contacts + Div1 GAL Address Lists Offline Address Books Global Address Lists Room Address Lists 41
42
Demonstration: Configuring Address Book Policies
3: Managing Recipient Objects In this demonstration, you will see how to: Configure a GAL Configure an offline address list Configure an address book policy Leave the virtual machines running for the final demonstration. Preparation Steps To perform this demonstration, ensure that the 20341B-LON-DC1, 20341B-LON-MBX1, 20341B-LON- CAS1, and 20341B-LON-CL1 virtual machines are running. If required, sign into all virtual machines using the Adatum\Administrator account with the password Pa$$w0rd. Demonstration Steps On LON-CAS1, switch to Exchange Management Shell. At the command prompt, type the following command, and press Enter. New-GlobalAddressList -Name ResearchGAL -RecipientFilter {(Department –eq “Research”)} Update-GlobalAddressList -Identity ResearchGAL New-OfflineAddressBook -Name "ResearchOAB" -AddressLists "ResearchGAL" New-AddressBookPolicy -Name ResearchABP -AddressLists \AllDepartments\Research -OfflineAddressBook ResearchOAB -GlobalAddressList ResearchGAL -RoomList "\All Rooms" Get-Mailbox -OrganizationalUnit Research | Set-Mailbox -AddressBookPolicy ResearchABP On LON-CL1, sign out, and then sign in as Adatum\Allie using the password Pa$$w0rd. (More notes on the next slide)
43
3: Managing Recipient Objects
Open Outlook 2013. On the Welcome to Outlook 2013 page, click Next. On the Add an Account page, and click Next. On the Auto Account Setup page, click Next, and then click Finish. In the First things first dialog box, click Ask me later and then click Accept. When Outlook 2013 opens, click Address Book. Verify that only other members of the Research department are listed in the GAL.
44
What Are Email Address Policies?
20341B What Are Address Policies? 3: Managing Recipient Objects address policies automate the process of assigning addresses to recipients address policies define the format for the address Can assign SMTP and non-SMTP addresses Can configure both the local and domain components address policies define the recipients to whom the policy applies Can filter based on recipient scopes and custom attributes
45
Demonstration: Configuring Email Address Policies
20341B Demonstration: Configuring Address Policies 3: Managing Recipient Objects In this demonstration, you will see how to: Modify the default address policy Create a new address policy Revert all virtual machines. Preparation Steps To perform this demonstration, ensure that the 20341B-LON-DC1, 20341B-LON-MBX1, 20341B-LON- CAS1, and 20341B-LON-CL1 virtual machines are running. Sign into all virtual machines using the Adatum\Administrator account with the password Pa$$w0rd. Demonstration Steps On LON-CAS1, switch to EAC. In the Feature pane, click mail flow, and then click the address policies tab. Double-click Default Policy. In the Default Policy window, click address format, and then click Add. In the address format window, click and then select the Make this format the reply address check box. Click save twice. In the warning dialog box, click ok. In the Details pane, click Apply, and then click yes. Click Close. On the accepted domains tab, click New. In the new accepted domain window, type Sales as the Name, and sales.adatum.com as the Accepted domain, and then click save. On the address policies tab, click New. In the new address policy window, type Sales as the Policy name. Under address format, click Add. (More notes on the next slide)
46
3: Managing Recipient Objects
From the Select an accepted domain drop-down list, select sales.adatum.com. Click and then click save. In the new address policy window, click add a rule. Click Select one, and then click Recipient container. Click Sales, and then click ok. Click Save, and then click ok. In the Details pane, click Refresh, click Apply, and then click yes. Click Close. In the Feature pane, click recipients. Click mailboxes, and then double-click Adam Barr, and then click address. Verify that two addresses are assigned to Adam Barr, and then click cancel. Double-click Arlene Huff, and then click address. Verify that three addresses are assigned to Arlene Huff, and then click cancel.
47
Lab: Managing Recipient Objects
Exercise 3: Configure Public Folders for Trey Research Exercise 1: Configure Trey Research Recipients You have received a script and a .csv file that you will use to create the recipients for the Trey Research users. However, you also need to configure other recipient objects for the Trey Research users, such as distribution groups and resource mailboxes. The project team has requested that you create the following recipient objects: Create AD DS user accounts and mailboxes using a script provided by the project team. Create room mailboxes and configure the mailboxes so only Trey Research users can book meetings in the rooms. All other meeting requests must be approved by a Trey Research administrator. Configure a shared mailbox for the Sales department at Trey Research. Configure distribution groups that include different departments at Trey Research. Configure a dynamic distribution list that includes Trey Research and A. Datum users who are working on the Trey Research integration project. You have been provided with a list of the current members of this team, but the membership list is expected to change frequently. Exercise 2: Configure Address Lists and Policies for Trey Research Your second step in integrating Trey Research users into the A. Datum Exchange server environment is to create the address lists and policies required to ensure that the Trey Research users have the required functionality and separation of user information. To do this, you need to: Configure TreyResearch.net as an accepted domain. Create an address policy for Trey Research users. Create an address list for Trey Research users. Create an address book policy for Trey Research users. Validate the Trey Research deployment. Logon Information Virtual Machines B-LON-DC1 20341B-LON-CAS1 20341B-LON-MBX1 20341B-LON-CL1 User name Adatum\Administrator Password Pa$$w0rd Estimated Time: 60 minutes (More notes on the next slide)
48
3: Managing Recipient Objects
Exercise 3: Configure Public Folders for Trey Research A. Datum has not implemented public folders, but Trey Research users have used public folders in the past and would like to continue using them. You need to create a public folder infrastructure for Trey Research users, and ensure that only Trey Research users have access to the public folders.
49
20341B Lab Scenario 3: Managing Recipient Objects You are the messaging administrator for A. Datum Corporation. A. Datum has purchased a new company named Trey Research. The Trey Research mailboxes will be hosted on your Exchange Server environment, but they must maintain a unique identity within the organization. All Trey Research users should use the TreyResearch.net SMTP domain to send and receive . Trey Research users should be able to view only other users in the Trey Research business group. You need to implement the messaging environment for the Trey Research users.
50
20341B Lab Review 3: Managing Recipient Objects How would you give access to allow a user to send messages from another mailbox without giving the user access to the mailbox contents? Question How would you ensure that meeting requests to room mailboxes are validated manually before being approved? Answer Assign a delegate for the resource, and allow the delegated user to make the decision to approve or deny meeting requests that do not fit standard policies. How would you give access to allow a user to send messages from another mailbox without giving the user access to the mailbox contents? Assign the user Send As permissions to the mailbox.
51
Module Review and Takeaways
20341B Module Review and Takeaways 3: Managing Recipient Objects Best Practice Review Questions Question A company has two large divisions and one Exchange Server organization. Employees in the two divisions rarely communicate with each other. What can you do to reduce the number of recipients the employees of each division see when they open the Exchange address list? Answer To make it easier for employees to find recipients who exist only in their division, you can create two new custom address lists. When searching for recipients in their division, these custom address lists allow employees to select only the address list that is specific to their division. An organization has a large number of projects that leverage distribution groups. Managing group members takes considerable time. You need to reduce the time that the help desk staff spends managing groups so that they can work on other issues. What should you do? Allow end users to manage their own groups by using the Outlook Web App options or managing them through Outlook. End users may require some training up front, but this approach ultimately will result in time savings. You employ contractors who need an address from your company. The contractors should not be able to log onto your network, but you want the contractors to appear in the GAL. The company needs to enable the contractors to receive these messages in their current third-party mailboxes. What should you do? Create mail-enabled contacts for each of the contractors, and use the contractors’ third-party address as the destination address. (More notes on the next slide)
52
3: Managing Recipient Objects
Real-world Issues and Scenarios Supplement or modify the following best practices for your own work situations: Define clear naming conventions and adhere to them. Naming conventions help identify the location and purpose of recipient objects, and also help both end users and administrators locate recipients easily. Test global changes prior to making them in a production environment. Changes to global settings, such as address policies, should be tested in a lab environment before you make changes in production. This helps avoid configuration errors. Best Practice If you have a large number of users in your organization, spend some time learning how to manage recipients using the Exchange Management Shell and scripts. This will save you a significant amount of time once you are comfortable with using the commands. Instructor Note: Ensure that you cover the common issues and the corresponding troubleshooting tips listed in this section. Encourage students to share tips from their own work environments.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.