Deploying the Client Access Role

Points (10)

 


Plan for MAPI over HTTP and Outlook Anywhere. Lynda.com link.

Brief overview of using Microsoft Outlook outside of the network using various supported protocols such as RPC (Remote Procedure Call) over HTTP (older technology, supported only up through Exchange 2010), Outlook Anywhere (newer, quicker technology, supported by Exchange 2010, 2013 and 2016), and finally MAPI (Messaging Application Programming Interface) over HTTP (which is yet another improvement over the previous technologies, and supported only by 2013 and 2016). The later verson will require a specific Outlook that supports it, but there is a means by which you can use both Outlook Anywhere and MAPI over HTTP with custom user specific settings. Both of the later versions are also secured using certificates.

 


Configure an Address List. Lynda.com link.

Address lists are specfic groups of email users that can be seen and used within Outlook to make it much easier to send to a group of people with a single reference to just the group vs. to each individual user address.

Your task after viewing this video is to do the following:

  1. Modify the Department property of the users in your ViaMonstra\Users OU by assigning the users to 3 different departments of your choosing. Hint: you can change the department on multiple users at one time by selecting a group of users and then by selecting Properties.
  2. Create address lists specific to each of the departments that you created. Use the name of the department to name the address list. Include mailbox users and departments specific to the address list. Use the PowerShell cmdlet new-addresslist from the Exchange PowerShell to perform this task.
  3. Update the address lists as shown in the video.
  4. Open the browser based Outlook and view these address lists.

 

 

 


Order and install certificates. Lynda.com link. (Review only)

Microsoft Exchange Server uses Secure Sockets Layer (SSL) to encrypt the network traffic between the server, clients, and applications. Whenever you are prompted to login, SSL is needed to secure this transaction. When Exchange Server 2016 is first installed it generates a self-signed SSL certificate that is then enabled for IIS (HTTPS services like Outlook Web Access (OWA), Exchange Web Services (EWS) and ActiveSync which is used by mobile devices), Simple Mail Transport Protocol (SMTP), Post Office Protocol (POP), and Internet Message Access Protocol (IMAP). You may recall the warning that you get when you access the web administration tool, this indicates that the certicate is not trusted, this is true because it is self-signed. The self-signed certicate is meant to be used temporarily until you purchase a 3rd-Party trusted certificate from places like GoDaddy, DigiCert, etc. We will not be purchasing a certificate for this lab, therefore will will use the default, self-signed certificate and thus tolerate the Certificate error shown in the image below.

 


Configure authentication methods. Lynda.com link.

This video reviews the supported authentication types. We will use the defaults for now.

 


Plan the namespace model.

A namespace represents the domain naming heirarchy. The namespace used by Exchange Server 2016 utilizes just one domain name versus a more complex namespace heirachy used by prevoius Exchange servers. The namespace that I had established is defined in both DNS and within Exchange.

Configure your DNS to match the following settings:

Configure Exchange to match the following settings:

Configure DNS references on clients and servers.

I had a few connectivity problems between the client and Exchange server. Based on the research that I had found I had to make a number of changes to make it work. Here they are:

 

Configure the scope on the Default Frontend EX01

Test your connectivity

telnet ex01 25

 

 


Install and test Outlook 2016. Lynda.com link.

First, install Outlook 2016 by installing Office 365 onto your PC0001 virtual machine. You must login to Office 365 and install from there.

After you watch the video, demonstrate to me that you can successfully perform the following:

 


Test the endpoint protection alert.

During the Endpoint Protection lab you had created an alert email. With that email do the following:

HINT: Remember, within the Email notification properties you can test the SMTP server. See page 390-391.