Windows Vista
Windows 7
Windows Azure
Windows Server
Windows Phone
Windows Server

Deploy Exchange Server 2010 Roles (part 2)

3/22/2011 9:28:04 PM

2. Exchange Server 2010 Editions

Exchange Server 2010 comes in two editions: Standard edition and Enterprise edition. Standard edition supports five databases on each server, and Enterprise edition supports up to 100 databases on each server. Both editions support high availability through database availability groups on the Enterprise edition of Windows Server 2008 and Windows Server 2008 R2. You select an edition of Exchange Server 2010 when you enter the license key as a postinstallation task. You do not select an edition of Exchange Server 2010 during the installation process. You should choose to deploy the Enterprise edition of Exchange Server 2010 when you want to host more than five databases on a server.

Although the 70-662 exam does not cover licensing, each user or device that accesses Exchange requires a standard Client Access License (CAL). A standard CAL gives access to the majority of Exchange Server 2010 features such as Outlook Web App, Federated Calendar Sharing, and standard email functionality. If a user needs advanced Exchange Server 2010 functionality, such as custom retention policies, voicemail with Unified Messaging, and Multi-Mailbox Search and Legal Hold, it is necessary to have both a Standard user CAL and an Enterprise CAL. The Enterprise CAL is a license that is obtained in addition to the Standard CAL and is not a replacement for the Standard CAL.



To find out more about the editions of Exchange and licensing, consult the following article: http://www.microsoft.com/exchange/2010/en/us/Licensing.aspx.

3. Postinstallation Tasks

When a graphical installation completes, the Exchange Management Console automatically opens. The console will display the information shown in Figure 5, reminding you to complete postinstallation tasks. Clicking on the Finalize Deployment Tasks item launches a browser session to a page on Microsoft that provides postdeployment advice. It is possible to view this page only if the Exchange Server is able to establish a browsing session to the Internet, either directly or through a proxy.

Figure 5. Postinstallation tasks

This TechNet page instructs you to perform the following tasks:

  • Enter the product key for Exchange Server 2010. You can do this using the Set-ExchangeServer cmdlet or by navigating to Server Configuration in the Exchange Management Console and clicking on Enter Product Key Group in the Action pane. You must enter a product key within 120 days of deploying Exchange Server 2010.

  • Install a product to protect Exchange Server 2010 from malware. This includes but is not limited to Forefront Security 2010 for Exchange Server. 

  • If you have deployed the Mailbox server role:

    • Configure an Offline Address Book and Offline Address Book distribution for Outlook clients. 

    • Configure High Availability and Site Resilience. 

  • If you have deployed the Client Access server role, configure secure access for the Client Access server role and configure Exchange ActiveSync security, authentication, and policies. 

  • If you have deployed the Hub Transport server role, configure domains for which you will accept email messages and configure Internet mail flow.

  • If you have deployed the Edge Transport server role, you need to configure an EdgeSync between this server and the Hub Transport servers. 



You can review the document that is launched when you click on the Finalize Deployment Tasks item in Exchange Management Console by navigating to the following TechNet link: http://technet.microsoft.com/en-us/library/bb125262.aspx.

4. Firewall Configuration

The Exchange Server 2010 setup process configures Windows Firewall with Advanced Security so that all necessary ports required to support the roles that you deploy are open for server and client communication. As this process occurs automatically, it is not necessary to use the Security Configuration Wizard tool to configure these settings.

In some cases, it will be necessary to configure the ports on a separate hardware-based firewall to allow traffic to or from a server running Exchange Server 2010, such as if you have a hardware firewall separating subnets on your organization’s internal network. The most commonly used ports for each role are as follows:

  • 25 Hub Transport, Edge Transport server SMTP traffic

  • 135 Mailbox server MAPI access

  • 80 Client Access server Autodiscover, availability, Outlook Web App, Outlook Anywhere, Exchange ActiveSync

  • 443 Client Access server secure (SSL) Autodiscover, availability, Outlook Web App, Outlook Anywhere, Exchange ActiveSync



To learn more about the network ports that are used by Exchange Server 2010, consult the following article on TechNet: http://technet.microsoft.com/en-us/library/bb331973.aspx.

5. Verifying Setup

When you install Exchange Server 2010 using the graphical setup tool, you are presented with a setup summary detailing whether each step of the setup process has completed successfully. This summary is shown in Figure 6 and allows you to quickly determine whether all components have installed correctly. The completion summary will detail steps that do not complete correctly should problems occur during the installation.

Figure 6. Successful setup

When setup completes, you can also view the setup log by clicking on View Setup Log from the completion page of the setup wizard. This file can also be opened directly using Notepad.exe and is stored at C:\ExchangeSetupLogs\ExchangeSetup.log. This log is available whether the setup fails or succeeds. This log is created and updated during the Exchange installation process, and you can examine it using notepad.exe to diagnose why a specific Exchange Server 2010 deployment has failed.

Another tool that you can use to verify that Exchange Server 2010 has been deployed successfully is the Get-Exchange Server cmdlet. Executing the Get-ExchangeServer cmdlet provides information about a specific Exchange Server. You can use the following command to view information about Exchange Server VAN-EX1:

Get-ExchangeServer -Identity VAN-EX1 | Format-List

The output of this command will inform you of which roles have been deployed, the path where Exchange files have been installed, the network name of the Exchange server, and the location of the Exchange Server’s Active Directory object.



To learn more about verifying an Exchange Server 2010 installation, consult the following TechNet link: http://technet.microsoft.com/en-us/library/bb125254.aspx.

Other -----------------
- Installing Exchange Server 2010 : Configure the Server to Host Exchange Server 2010
- Configure the Environment for Exchange Server 2010 (part 2) - Preparing for Coexistence and Migration
- Configure the Environment for Exchange Server 2010 (part 1) - Preparing a New Environment for Exchange 2010
- SharePoint Disaster Recovery Design and Implementation : Defining Scope
- SharePoint Disaster Recovery Planning and Key Concepts : Assessment and Planning
- SharePoint Disaster Recovery Planning and Key Concepts : Key Concepts and Terms
- Windows Server 2003 : Implementing VPNs (part 2) - Configuring VPN Types
- Windows Server 2003 : Implementing VPNs (part 1) - Understanding Virtual Private Networks
- Installing Microsoft SharePoint Server 2010 and Configuring PerformancePoint Services : Configuring PPS (part 5) - Activating the Feature in the Web Application
- Installing Microsoft SharePoint Server 2010 and Configuring PerformancePoint Services : Configuring PPS (part 4) - Set the Unattended Service Account & Associating the Service Application Proxy with a
Top 10
- Sharepoint 2013 : New Installation and Configuration - Configuring Your SharePoint Farm
- Microsoft Dynamics CRM 4.0 : SharePoint Integration - Store Attachments in SharePoint Using a Custom Solution
- Migrating to Exchange Server 2007 : Migrating from Exchange 2000 Server or Exchange Server 2003 to Exchange Server 2007 (part 2)
- Maintaining Windows 7 : Check Your Hard Drive for Errors
- Personalizing and Configuring Windows 7 : The Windows 7 User Interface (part 3) - Branding Windows 7 like a PC Maker
- Duplicating and Copying DVDs (part 2) - Ripping DVDs to the PC
- Windows Phone 8 : Configuring Basic Device Settings - Wi-Fi Networking (part 2) - Removing Known Networks
- Client Access to Exchange Server 2007 : Using Outlook 2007 Collaboratively (part 1)
- Windows Phone 7 : AlienShooter Enhancements (part 2) - Tombstone Support, Particle System
- Microsoft Exchange Server 2007 : Single Copy Clusters (part 2) - Installing Exchange Server 2007 on the Active Node
Popular tags
Microsoft Access Microsoft Excel Microsoft OneNote Microsoft PowerPoint Microsoft Project Microsoft Visio Microsoft Word Active Directory Biztalk Exchange Server Microsoft LynC Server Microsoft Dynamic Sharepoint Sql Server Windows Server 2008 Windows Server 2012 Windows 7 Windows 8 windows Phone 7 windows Phone 8
programming4us programming4us
Popular keywords
HOW TO Swimlane in Visio Visio sort key Pen and Touch Creating groups in Windows Server Raid in Windows Server Exchange 2010 maintenance Exchange server mail enabled groups Debugging Tools Collaborating
programming4us programming4us
PS4 game trailer XBox One game trailer
WiiU game trailer 3ds game trailer
Natural Miscarriage
Windows Vista
Windows 7
Windows Azure
Windows Server
Game Trailer