Getting Started with Microsoft Exchange 2000
To increase the benefits and reduce the risk of data loss during
the deployment of Exchange 2000, you should have a thorough
understanding of the following features and the use of the
Exchange Key Concepts. In these
sections you learn about Exchange 2000 architecture and components.
You learn how Exchange 2000 uses Microsoft Windows 2000 Server
technology and how you can take advantage of multiple databases now
supported on each server. You learn how Exchange 5.5 sites map to
Exchange 2000 administrative and routing groups and how Active
Directory Connector allows Exchange 2000 to coexist with previous
versions of Exchange. In these sections, you also learn how to
connect to other messaging systems using the various connectors
included with Exchange 2000. More...
Implementing Your Administrative
Model. In these sections you learn how to
organize your topology by creating administrative groups and
routing groups to address organizational and process-related
requirements. You learn how to create policies to control
configuration settings across multiple servers. And if you want to
control access to the Exchange objects contained within the
organization or administrative group, these sections show you how
to use the Exchange Administration Delegation Wizard. More...
Coexisting with Previous Versions. In
these sections you learn how to create and maintain connections to
previous versions of Exchange and Microsoft Windows NT in your
Exchange 2000 organization. More...
Migrating to Exchange. In these
sections you learn how to move an existing messaging system to
Exchange 2000 in one or two steps. A one-step migration extracts
mail and directory data from the existing messaging system server
and imports it directly to Exchange and Active Directory. A
two-step migration first extracts the migration files from the
existing messaging system server, and then imports the migration
files to Exchange. More...
Configuring Security. In these sections
you learn how to protect your Exchange 2000 organization by
restricting communication between your intranet and the Internet.
You learn how to use the Exchange Administration Delegation Wizard
to assign administrative permissions, how to protect your
organization from viruses, and how to use other system-wide
security measures to guard your resources from unauthorized users.
For increased security, these sections show you how to use Key
Management Service to protect data integrity through message
encryption and digital signatures. More...