mcts training kit 70 - 652 70-622 Configuring Microsoft Exchange Server 2010 phần 10 doc

100 425 0
mcts training kit 70 - 652 70-622 Configuring Microsoft Exchange Server 2010 phần 10 doc

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

Chapter 5: Lesson Review Answers Answers 801 B. Correct: You use the Test-OutlookConnectivity cmdlet to test Outlook Anywhere connectivity. C. Incorrect: The Test-OutlookWebServices cmdlet allows you to verify that the Autodiscover settings, rather than the Outlook Anywhere settings, are correctly congured. D. Incorrect: The Test-OwaConnectivity cmdlet allows you to test that OWA is running as expected but does not allow you to test the Outlook Anywhere settings. 2. Correct Answer: C A. Incorrect: The Set-ActiveSyncOrganizationSettings cmdlet allows you to congure ActiveSync organization settings but does not allow you to specify the Outlook Anywhere external host name. B. Incorrect: The Set-ActiveSyncVirtualDirectory cmdlet allows you to congure the ActiveSync virtual directory settings but does not allow you to specify the Outlook Anywhere external host name. C. Correct: You use the Set-OutlookAnywhere cmdlet to congure the external host name for Outlook Anywhere, whether it uses a single Client Access server or a client access array. D. Incorrect: The Set-OwaVirtualDirectory cmdlet allows you to congure the Outlook Web App virtual directory but does not allow you to set the external host name for Outlook Anywhere. 3. Correct Answer: B A. Incorrect: While the Set-ClientAccessServer cmdlet can be used to congure properties on a specic Client Access server, it cannot be used to create a new client access array for a specic Active Directory site. B. Correct: The New-ClientAccessArray cmdlet is used to create a new client access array for a specic Active Directory site. C. Incorrect: The Set-CASMailbox cmdlet allows you to set attributes related to client access for a specic user, but this command cannot be used to create a new client access array for a specic Active Directory site. D. Incorrect: The Set-RpcClientAccess cmdlet manages settings for the Exchange RPC Client Access Service but cannot be used to create a new client access array for a specic Active Directory site. 4. Correct Answer: D A. Incorrect: You use the Set-ClientAccessArray cmdlet to congure a client access array; you use the Set-OutlookAnywhere cmdlet to congure Outlook Anywhere client authentication methods. B. Incorrect: You use Set-ActiveSyncOrganizationSettings to congure organizational ActiveSync settings; you use the Set-OutlookAnywhere cmdlet to congure Outlook Anywhere client authentication methods. 802 Answers C. Incorrect: The Set-OutlookProvider cmdlet allows you to congure the Autodiscover service but does not allow you to congure Outlook Anywhere. You use the Set- OutlookAnywhere cmdlet to congure Outlook Anywhere client authentication methods. D. Correct: You use the Set-OutlookAnywhere cmdlet to congure the client authentication method for Outlook Anywhere. The options available include Basic, Digest, NTML, forms-based authentication, Windows Integrated, and Certicate. 5. Correct Answer: C A. Incorrect: The Message Queuing component provides message delivery between applications. Although this component has a name that sounds as though it is related to Exchange, it is unnecessary on a computer Windows Server 2008 R2, where you want to install the client access role with the Outlook Anywhere component. B. Incorrect: The Peer Name Resolution Protocol is a name resolution protocol that allows clients to nd computers on the network using a simplied addressing scheme. This component is not necessary to support the Client Access server role. C. Correct: You must install the RPC over HTTP Proxy feature on a Windows Server 2008 R2 computer if that computer is going to support the Client Access server role with the Outlook Anywhere component. D. Incorrect: Remote Differential Compression is a feature that assists in the transfers of les across a network but is not a component that is necessary to support the Exchange Client Access server role with the Outlook Anywhere component. Lesson 3 1. Correct Answers: A and B A. Correct: You can use the Set-OwaMailboxPolicy cmdlet to congure an OWA mailbox policy for a group of users so that those users are unable to change their passwords when connected to OWA. B. Correct: You can use the Set-OwaVirtualDirectory cmdlet to block all users from changing their password when connected to OWA, but you must use OWA mailbox policies, applied to users, to block this functionality from only some users. When you need to congure a setting for all users, do it at the OWA virtual directory level, but if you want to congure different settings based on group or department membership, do this through OWA mailbox policies. C. Incorrect: The Get-OwaMailboxPolicy cmdlet provides details of an OWA mailbox policy but cannot be used to congure policy settings. D. Incorrect: The Get-OwaVirtualDirectory cmdlet allows you to view the properties of a virtual directory but does not allow you to alter settings applied to that virtual directory. 2. Correct Answer: C A. Incorrect: The Test-OutlookConnectivity cmdlet allows you to verify that services that support Outlook, such as Outlook Anywhere, are functioning. This cmdlet does not allow you to test OWA functionality. Chapter 5: Lesson Review Answers Answers 803 B. Incorrect: The Test-ActiveSync cmdlet allows you to verify that ActiveSync is functioning correctly. C. Correct: The Test-OwaConnectivity cmdlet can be used to verify that OWA is functional. D. Incorrect:. The Test-PopConnectivity cmdlet can be used to test POP3 functionality. This cmdlet does not allow you to test OWA functionality. 3. Correct Answer: D A. Incorrect: You need to obtain a certicate that supports SANs, as users need to access OWA using both the address https://owa.tailspintoys.com and the address https://owa .wingtiptoys.com. B. Incorrect: You need to obtain a certicate that supports SANs, as users need to access OWA using both the address https://owa.tailspintoys.com and the address https://owa .wingtiptoys.com. C. Incorrect: While you do need a certicate that supports SANs, you should not choose to obtain this certicate from an internal CA, as this will not minimize the effort required to congure the home computers of the users accessing OWA. D. Correct: You need to obtain a certicate that supports SANs, as you want to support the address https://owa.tailspintoys.com and the address https://owa.wingtiptoys.com. You need to obtain a certicate from a trusted third-party CA, as you want to minimize the effort required to congure the home computers of the users accessing OWA. 4. Correct Answer: A A. Correct: You can use the Set-OwaMailboxPolicy cmdlet to allow and block attachments on the basis of le type. B. Incorrect: Although you can enable and disable OWA for a user using the Set- CASMailbox cmdlet as well as specify an OWA mailbox policy, you cannot specically allow or block attachment types using this cmdlet. C. Incorrect: The Set-RpcClientAccess cmdlet allows you to congure the RPC Client Access service but cannot be used to allow and block attachment types for OWA. D. Incorrect: The Set-ActiveSyncMailboxPolicy cmdlet allows you to congure synchronization between Exchange and mobile devices but does not allow you to congure which attachment types are blocked and allowed in OWA. 5. Correct Answer: C A. Incorrect: Although Set-OwaMailboxPolicy can be used to congure per-user OWA settings, you cannot use Set-OwaMailboxPolicy to congure the authentication method used by OWA. B. Incorrect: While the Set-ClientAccessServer cmdlet is used to congure some Client Access server properties, this cmdlet cannot be used to congure the authentication method used by OWA. C. Correct: You use the Set-OwaVirtualDirectory cmdlet to congure the authentication method used by OWA. 804 Answers D. Incorrect: The Set-OutlookAnywhere cmdlet is used to congure the properties of Outlook Anywhere. You cannot use this cmdlet to congure the properties of OWA. Chapter 5: Case Scenario Answers Case Scenario 1: Fabrikam Client Access 1. Congure the IMAP4 service on CAS-1 so that it starts automatically. 2. You need to install the RPC over HTTP Proxy feature to support Outlook Anywhere. 3. You should obtain a certicate that supports SANs. The certicate should map to the names owa.fabrikam.com and owa.adatum.com. Case Scenario 2: OWA at Tailspin Toys 1. You can use Set-OwaVirtualDirectory to block users from changing their password through OWA. It is also possible to block access to this feature through individual OWA mailbox policies, though the question stated that this should apply to all users regardless of policy, which is why you should apply it using the Set-OwaVirtualDirectory cmdlet. 2. Congure an OWA mailbox policy for members of the Accounting Department that blocks access to attachments in ZIP format but allows access to attachments in XLS format. Congure a separate OWA mailbox policy to ensure that users in other departments have access to attachments in ZIP format. 3. The Test-OwaConnectivity cmdlet can be used to test OWA connectivity. Chapter 6: Lesson Review Answers Lesson 1 1. Correct Answer: C A. Incorrect. The New-ManagementScope cmdlet creates a management scope. However, the HubTransport Scope management scope already exists. B. Incorrect. The New-ManagementScope cmdlet creates a management scope. However, the HubTransport Scope management scope already exists. C. Correct: This command congures the management scope to include Hub Transport servers Hub01, Hub02, Hub03, and Hub04. D. Incorrect: This command congures the management scope to include only Hub Transport server Hub04. Chapter 6: Lesson Review Answers Answers 805 2. Correct Answers: D and E A. Incorrect: Jeff cannot congure settings that are unavailable in Outlook Web App options, such as mailbox size. B. Incorrect: Jeff cannot congure settings that are unavailable in Outlook Web App options, such as mailbox database conguration settings. C. Incorrect: Jeff can modify only the Outlook Web App options that the user himself or herself can modify. He cannot modify a user’s display name when that user is not permitted to modify it. D. Correct: Jeff is a delegate and can manage membership of the role group. E. Correct: Jeff can view and modify the Microsoft Ofce Outlook Web App options of any user in the organization. These might include display name, address, phone number, and so on. Note that, by denition, a user can congure his or her own Microsoft Ofce Outlook Web App options. If a user cannot congure, for example, the display name, this is not a Microsoft Ofce Outlook Web App option for that user, and Jeff cannot modify it either. 3. Correct Answers: B and E A. Incorrect: You can use the Add-ManagementRoleEntry cmdlet to add management role entries to an existing management role. The question requires you to remove management role entries, not add them. B. Correct: The Remove-ManagementRoleEntry cmdlet removes a management role entry (or permission) from a management role. However, in order to use this cmdlet, you rst need to obtain the permission you want to remove by using the Get-ManagementRole cmdlet with a lter (Where) condition. C. Incorrect: You can use the New-ManagementRoleAssignment cmdlet to assign a management role to a management role group, management role assignment policy, user, or universal security group. You cannot use it to remove a management role entry. D. Incorrect: You can use the New-ManagementRole cmdlet to create a custom management role. You cannot use it to remove a management role entry from an existing management role. E. Correct: Although the Remove-ManagementRoleEntry cmdlet removes a management role entry (or permission) from a management role, you rst need to use the Get-ManagementRole cmdlet with a lter (Where) condition to obtain the entry you want to remove. 4. Correct Answer: A A. Correct: This command creates a new management role named MyManagementRole based on the Journaling management role. B. Incorrect: This command attempts to create a new management role named Journaling based on the management role MyManagementRole. This is not possible because a built-in management role called Journaling already exists. 806 Answers C. Incorrect: The New-ManagementRoleAssignment cmdlet assigns a management role to a management role group, management role assignment policy, user, or universal security group. It does not create a new management role. D. Incorrect: The New-ManagementRoleAssignment cmdlet assigns a management role to a management role group, management role assignment policy, user, or universal security group. It does not create a new management role. 5. Correct Answers: A and E A. Correct: Membership of the Recipient Management role group enables Kim to create or modify recipients within the Exchange organization. B. Incorrect: Membership of the Organization Management provides access to the entire Exchange Server 2010 organization. Kim would be able to carry out all the tasks listed but would have more administrative permissions than the question species. C. Incorrect: Membership of the Public Folder Management role group permits Kim to manage public folders and databases on Exchange Server 2010 servers. It does not enable her to create or modify recipients within the Exchange organization and to congure compliance features. D. Incorrect: Membership of the Server Management role group permits Kim to perform Exchange server conguration. It does not enable her to create or modify recipients within the Exchange organization and to congure compliance features. E. Correct: Membership of the Records Management role group enables Kim to congure compliance features, including retention policy tags, message classications, and transport rules. Lesson 2 1. Correct Answer: D A. Incorrect: Provided that an X.509 certicate is trusted by Windows Live Domain Services, it can be used to verify a federation trust, even if it is also being used for other purposes. B. Incorrect: When you use the EMC to create a federation trust, that trust must be named Microsoft Federation Gateway. However, when you use the EMS, you can specify any name that is syntactically correct, including Microsoft Federation Gateway. C. Incorrect: You can create a federation trust on a Client Access server. You cannot create it on a domain controller unless that domain controller is also an Exchange Server 2010 server (which would be bad practice). D. Correct: You have chosen the thumbprint of a certicate that is not exportable and not trusted by Windows Live Domain. It is likely that you have chosen a self-signed certicate. 2. Correct Answer: A A. Correct: Your network is isolated from any other network, which would include the Internet. An Internet connection is necessary to create a federation trust. Chapter 6: Lesson Review Answers Answers 807 B. Incorrect: Certicates are frequently exported using removable media. Provided that the certicate is an X.509 certicate trusted by Windows Live Domain Services, it can be used to verify a federation trust. C. Incorrect: You are testing Exchange Server 2010 conguration, and therefore the EMS is available on your network. D. Incorrect: A trusted third-party CA is by denition trusted by everyone, including Windows Live Domain Services. 3. Correct Answer: B A. Incorrect: You use Get-Mailbox to obtain the Marketing mailboxes and Set-Mailbox to apply the Adatum Marketing sharing policy. This answer has the cmdlets the wrong way around. B. Correct: This command uses Get-Mailbox to obtain the Marketing mailboxes and Set-Mailbox to apply the Adatum Marketing sharing policy. C. Incorrect: The Organization parameter is reserved for Microsoft use and does not in any event specify a department. Also, the cmdlets are the wrong way around. D. Incorrect: The Organization parameter is reserved for Microsoft use and does not in any event specify a department. 4. Correct Answer: D A. Incorrect: You use the New-OrganizationRelationship cmdlet to create a relationship with an external Microsoft Exchange Server 2010 organization. The cmdlet does not create an account namespace for your Exchange organization with the Federation Gateway and enable federation. B. Incorrect: You use the Get-FederatedOrganizationIdentier EMS cmdlet to retrieve your Microsoft Exchange Server 2010 organization’s federated organization identier and related details, such as federated domains, organization contact, and status. The cmdlet does not create an account namespace for your Exchange organization with the Federation Gateway and enable federation. C. Incorrect: You use the Set-OrganizationRelationship cmdlet to modify a relationship with an external Microsoft Exchange Server 2010 organization for the purposes of, for example, accessing free or busy information. The cmdlet does not create an account namespace for your Exchange organization with the Federation Gateway and enable federation. D. Correct: You can use the Set-FederatedOrganizationIdentier EMS cmdlet to congure the federated organization identier for your Exchange organization. You congure a federated organization identier to create an account namespace for your Exchange organization with the Federation Gateway and enable federation. 5. Correct Answers: B, C, and D A. Incorrect: The Blue Sky airlines organization cannot access the Consolidated Messenger organization until the sharing relationship has been veried and a token issued. No Consolidated Messenger servers are involved in the rst three steps of this process. 808 Answers B. Correct: The domain controller in the originating organization needs to verify the sharing relationship. This is the second step of the process. C. Correct: When the sharing relationship is veried, a token is requested from the Federation Gateway. This permits access to the Consolidated Messenger organization. This is the third step of the process. D. Correct: The message is sent from a Mailbox server to a Hub Transport server in the originating organization. This is the rst step of the process. E. Incorrect: The sending organization requests the token, and a Consolidated Messenger Hub Transport server cannot request a security token for the Blue Sky Airlines user. No Consolidated Messenger servers are involved in the rst three steps of this process. F. Incorrect: The message is initially sent internally to a Hub Transport server in the originating organization. No Consolidated Messenger servers are involved in the rst three steps of this process. Chapter 6: Case Scenario Answers Case Scenario 1: Adding a Delegate to a Role Group 1. Kim stores the role group delegate list in a variable. For example, the following command stores the delegates in the Recipient Managers role group in the variable $RecManRoleGroup: $RecManRoleGroup = Get-RoleGroup "Recipient Managers" 2. Kim adds Don to the role group stored in the variable by entering the following command: $RecManRoleGroup.ManagedBy += (Get-User "Don Hall").Identity 3. Kim applies the revised delegate list variable to the role group. She enters the following command: Set-RoleGroup "Recipient Managers" -ManagedBy $RecManRoleGroup.ManagedBy 4. To remove Don from the delegate list, Kim would use an almost identical procedure except that at the second step she would remove Don from the delegate list in the variable by entering the following command: $RecManRoleGroup.ManagedBy -= (Get-User "Don Hall").Identity Case Scenario 2: Replacing an X.509 Certicate in a Federation Trust 1. Jeff needs to obtain the certicate’s thumbprint, which is a digest of all the information that the certicate contains. To do this, he uses the Get-ExchangeCerticate EMS cmdlet without parameters to list the thumbprints of all certicates installed in the Fabrikam organization. Chapter 7: Lesson Review Answers Answers 809 2. Jeff uses the Set-FederationTrust EMS cmdlet and the certicate thumbprint to congure the certicate as the next certicate to be used to verify the federation trust. For example, if the certicate had the thumbprint AC00F12CBA8358253F412FD0984B5CCAF2AF4F27, he would enter the following command in the EMS: Set-FederationTrust -Identity "Microsoft Federation Gateway" -Thumbprint AC00F12CBA8358253F412FD0984B5CCAF2AF4F27 3. Don then needs to verify that the certicate is available on all Hub Transport and Client Access servers. On each of these servers, he enters the Test-FederationTrust EMS cmdlet without parameters. This checks that certicates, including the next certicate, are valid and can be used with the Federation Gateway. 4. Finally, Don congures the trust to use the next certicate as the current certicate. To do this, he enters the following command: Set-FederationTrust -Identity "Microsoft Federation Gateway" – PublishFederationCertificate Chapter 7: Lesson Review Answers Lesson 1 1. Correct Answer: B A. Incorrect: This creates a rule that adds Paul West to the recipients whenever an email message is sent to Don Hall, except when the either the message subject or the message body includes the word “holiday.” The requirement is that the rule is not applied only when the message subject includes the word “holiday.” B. Correct: This creates a rule that adds Paul West to the recipients whenever an email message is sent to Don Hall, except when the message subject includes the word “holiday.” C. Incorrect: This creates a rule that adds Don Hall to the recipients whenever an email message is sent to Paul West, except when the message subject includes the word “holiday.” This is not what is required. D. Incorrect: This creates a rule that adds Don Hall to the recipients whenever an email message is sent to Paul West, except when the message subject or the message body includes the word “holiday.” This is not what is required. 2. Correct Answer: C A. Incorrect: The Get-TransportRule cmdlet returns details about a specied transport rule, but you cannot use it to amend the rule. B. Incorrect: The New-TransportRule cmdlet creates a new transport rule. You cannot use it to amend an existing transport rule. 810 Answers C. Correct: You can use the Set-TransportRule cmdlet to amend the AddPaulWest transport rule. D. Incorrect: You can use the Get-TransportRulePredicate cmdlet to retrieve a list of all available rule predicates that you can use with the transport rules agent on a Hub Transport server or an Edge Transport server. You cannot use it to amend an existing transport rule. 3. Correct Answers: A, C, and E A. Correct: The rst two metacharacters are nonnumeric digits (not numbers and not symbols), and A and B t that specication. The next two metacharacters match any single character that is not a space, and C and A t that specication. The next four metacharacters match any single numeric digit, and 1, 2, 2, and 1 t that specication. The next three metacharacters match any single character (numeric, alphabetic, or symbol) that is not a space, and Y, Z, and z t that specication. The nal four metacharacters match any single numeric digit, and 3, 3, 3, and 3 t that specication. B. Incorrect: The rst two metacharacters specify nonnumeric digits (not numbers and not symbols), and the second digit, 1, does not match this specication. There is no point in further analysis. The pattern does not t the specication. C. Correct: The rst two metacharacters are nonnumeric digits (not numbers and not symbols), and A and B t that specication. The next two metacharacters match any single character that is not a space, and 9 and 8 t that specication. The next four metacharacters match any single numeric digit, and 6, 5, 5, and 6 t that specication. The next three metacharacters match any single character (numeric, alphabetic, or symbol) that is not a space, and +, +, and + t that specication. The nal four metacharacters match any single numeric digit, and 9, 6, 8, and 8 t that specication. D. Incorrect: The rst two metacharacters specify nonnumeric digits (not numbers and not symbols), and the rst digit, 1, does not match this specication. There is no point in further analysis. The pattern does not t the specication. E. Correct: The rst two metacharacters are nonnumeric digits (not numbers and not symbols), and G and o t that specication. The next two metacharacters match any single character that is not a space, and o and d t that specication. The next four metacharacters match any single numeric digit, and 4, 4, 4, and 4 t that specication. The next three metacharacters match any single character (numeric, alphabetic, or symbol) that is not a space, and b, a, and d t that specication. The nal four metacharacters match any single numeric digit, and 2, 2, 2, and 2 t that specication. F. Incorrect: The rst two metacharacters specify nonnumeric digits (not numbers and not symbols), and the rst digit, 4, does not match this specication. There is no point in further analysis. The pattern does not t the specication. 4. Correct Answer: B A. Incorrect: You would select the Append Disclaimer Text And Fallback Action If Unable To Apply check box if you were conguring a disclaimer. You do not need to select that check box when conguring a transport protection rule that IRM-protects email trafc. [...]... connector should have a usage type or partner because you are configuring MTLS-protected communication with a partner organization 3 New-SendConnector -Partner -Name TreySendConnector –AddressSpace *.treyresearch.com 4 New-ReceiveConnector -Name TreyReceiveConnector -Usage Partner -Bindings 192.168.20.6:25 -RemoteIPRanges 10. 100 .10. 1 5-1 0 .100 .10. 16 –MaxMessageSize 15MB Chapter 7: Case Scenario Answers... 1: Configuring Domain Security 1 You would run the following commands: $Data1 = New-ExchangeCertificate -GenerateRequest -FriendlyName "Internet certificate for TST-EX2" -SubjectName "DC=com,DC=Tailsintoys,CN=TST-EX2.adatum.com" -DomainName mail.tailspintoys.com Set-Content -Path "C:\Certificates\TST-EX2-request.req" -Value $Data1 2 You would run the following command: Import-ExchangeCertificate -FileData... 62 days” -RetentionEnabled $true -AgeLimitForRetention 62 -RetentionAction PermanentlyDelete 2 New-RetentionPolicyTag “MT-Default” -Type All -Comment “Items without a retention tag are deleted after 270 days.” -RetentionEnabled $true -AgeLimitForRetention 270 -RetentionAction MoveToDeletedItems 8 30 Answers 3 New-RetentionPolicyTag “MT-PersonalArchive” -Type Personal -Comment “Tagged messages are moved... -FileData ([Byte[]]$(Get-Content -Path C:\Certificates\ TST-EX2-certificate.pfx -Encoding Byte -ReadCount 0)) | Enable-ExchangeCertificate -Services SMTP 3 You would run the following command: Set-TransportConfig -TLSSendDomainSecureList treyresearch.com 4 You would run the following command: Set-SendConnector Internet -DomainSecureEnabled:$true Case Scenario 2: Configuring Anti-Spam Settings 1 Sender... Get-Queue Server BSA-Hub02 -Filter {MessageCount -gt 50} 2 Terry enters the following command to display the number of messages in queues on the Hub Transport server BSA-Hub02 where the next-hop destination is the Adatum.com domain: Get-Queue Server BSA-Hub02 –Filter {NextHopDomain –eq "adatum.com" 3 Terry enters the following command to resume all suspended queues on the Hub Transport server BSA-Hub02:... take the argument 10. 10.8. 1-1 0 .10. 8.127 In this a ­ nswer, these arguments are reversed Chapter 7: Case Scenario Answers Case Scenario 1: Configuring Moderation 1 Set-DistributionGroup –Identity Sales -ModerationEnabled $true -ModeratedBy “Kim Akers” -SendModerationNotifications Internal 2 Set-DistributionGroup –Identity Sales -ByPassModerationFromSendersOrMembers “Don Hall” 3 Set-DistributionGroup... You must export the configuration of server VAN-EX-A, which has the existing custom transport rules B Correct: You must import the configuration exported from VAN-EX-A onto server VAN-EX-B This will transfer the existing custom transport rules from the original server to the new server C Incorrect: You should not import the configuration onto VAN-EX-A, as this server already has the custom transport... the Mailbox server WWT-Mail01: Get-StoreUsageStatistics Server WWT-Mail01 4 Jeff enters the following command to test replication health on server WWT-Mail01and view failure information: Test-ReplicationHealth -Identity WWT-Mail01 -OutputObjects | FL 8 22 Answers Case Scenario 2: Managing Queues 1 Terry enters the following command to list all the queues on the Hub Transport server BSA-Hub02 that... moved to the archive after 1805 days.” -RetentionEnabled $true -AgeLimitForRetention 180 -RetentionAction MoveToArchive 4 Set-RetentionPolicyTag “RPT-DeletedItems” –AgeLimitForRetention 60 Case Scenario 2: Configuring MailTips 1 Set-OrganizationConfig -MailTipsAllTipsEnabled $true 2 Set-OrganizationConfig -MailTipsLargeAudienceThreshold 30 3 Set-OrganizationConfig -MailTipsExternalRecipientsTipsEnabled... ­nformation, about all the mailbox databases on the Mailbox server WWT-Mail01: Get-MailboxDatabase -Server WWT-Mail01 -Status | FL 2 Jeff enters the following command to obtain statistical information about all the mailboxes on all the databases, including recovery databases, on the Mailbox server WWT-Mail01: Get-MailboxStatistics Server WWT-Mail01 | FL 3 The following EMS command returns a list of . New-SendConnector -Partner -Name TreySendConnector –AddressSpace *.treyresearch.com 4. New-ReceiveConnector -Name TreyReceiveConnector -Usage Partner -Bindings 192.168.20.6:25 -RemoteIPRanges 10. 100 .10. 1 5-1 0 .100 .10. 16. Edge Transport server that sends email to a Hub Transport server, for a cross-forest Send connector on a Hub Transport server that sends email to an Exchange Server 2 010 or Exchange Server 2007. the conguration of server VAN-EX-A, which has the existing custom transport rules. B. Correct: You must import the conguration exported from VAN-EX-A onto server VAN-EX-B. This will transfer

Ngày đăng: 09/08/2014, 11:21

Từ khóa liên quan

Tài liệu cùng người dùng

Tài liệu liên quan