| 0 comments ]

Microsoft Outlook

Add a note hereMicrosoft Outlook fits into several application categories. It is a personal information manager (PIM) because it functions as a personal calendar, scheduler, contact manager, and task manager. It is also a messaging application because it includes a powerful e-mail program and forms program. And finally, it is a groupware application because it can access Exchange Server public folders and enables calendars, schedules, contact information, and task information to be used in a group context. All of this functionality exists through a single, integrated, desktop environment.

Add a note hereOutlook 2003 is part of the Microsoft Office 2003 suite and as such is tightly integrated with the other Office applications, though it can also be purchased as a stand-alone product. Outlook is fully MAPI compliant.


Note

Add a note hereRecall that each client, whether it be an Outlook client or any other client, will require a Microsoft Exchange Client Access License (CAL) to legally access Exchange Server. This CAL is over and above the server license you need to install Exchange Server 2003 in the first place.

Add a note hereSome of the improvements in Outlook 2003 over previous versions of the Outlook client include:

Add a note here Cache mode operation When configured, allows Outlook 2003 to work from a local cache of the user’s Exchange mailbox, which is stored in an OST file on the local computer. The Offline Address List is also made available. The local cache is refreshed periodically from the Exchange server.

Add a note here RPC over HTTP Provides a means for Outlook 2003 users to make secure connections over the Internet to an Exchange organization without the need for a VPN.

Add a note here Smart change synchronization Allows for changes to an item to require only synchronization of the changes, versus the entire item as with previous versions of Outlook.

Add a note here Incremental Change Synchronization (ICS) check-pointing Using this method of synchronization prevents the resending of data that was successfully sent if network connectivity is interrupted during a synchronization event. In this event, Outlook 2003 will simply continue the synchronization event where it left off once connectivity is restored.

Add a note here Skip Bad Items To prevent the failure of the synchronization process, as occurred in previous versions of Outlook, Outlook 2003 will skip and log all bad or malformed items that are found on the server during a synchronization event. Items that are marked as infected by a virus scanner that integrates with Exchange Server 2003 will also be skipped.

Add a note here Pre-synchronization reporting MAPI compression Using MAPI compression allows for much faster communication between server and client. This compression is applied to the message header, message body, and any attachments.

Add a note here PST/OST enhancements As mentioned previously, PST and OST files now use the Unicode format and can exceed the previous size limit of 2 GB.

Add a note here Send/Receive groups improvements Additional configuration and customization options have been provided for users using Send/Receive groups to enhance their Outlook experience.

Add a note here Architectural Design

Add a note hereMicrosoft Outlook is designed to be a desktop information manager. This means it integrates personal and groupware tools, as well as their information, in a unified manner. This goal was achieved by including the following design features:

Add a note here Single application, multiple functionality From a single interface, users can execute numerous programs such as e-mail, calendar, contact list, and task list.

Add a note here Integrated user interface All the tools in Outlook are seamlessly integrated. For example, Outlook includes a feature called the Outlook Bar. This is a navigation tool that creates shortcuts to a user’s e-mail Inbox, calendar, contacts, tasks, and folders. Outlook, as a MAPI program, provides a single address book that can be used for e-mail, phone dialing, faxing, and other functions. The Outlook interface permits users to access both local file folders and Exchange public folders.

Add a note here Custom forms using Office 2003 One example of Outlook’s tight integration with Office 2003 is its ability to create and send forms that include objects created in any of the Office 2003 applications. For instance, an expense report form that includes an Excel spreadsheet can be created. Because of Microsoft object technology (see note below), the spreadsheet contained in the form will not be merely rows and columns but will include the Excel code to execute the functions of the spreadsheet. The form’s users can enter their numbers, have the spreadsheet calculate them, and then have the form automatically sent to a designated person. Outlook, along with Microsoft Office 2003, enables the creation of instant groupware applications.


Note

Add a note hereActiveX is an object technology developed by Microsoft. It is an extension of the earlier OLE technology. ActiveX allows programs to exchange objects that include both presentation data (i.e., what you see on the screen) and native data (i.e., the executable code to manipulate the presentation data).

Add a note here Features of Microsoft Outlook

Add a note hereMicrosoft Outlook includes some very powerful messaging, groupware, and personal productivity features. Tables 7.1, 7.2, and 7.3 describe many of those features.

Add a note here Table 7.1: Messaging Features of Microsoft Outlook

Add a note hereMain Function

Add a note hereFeatures

Add a note hereDescription

Add a note hereE-mail

Add a note hereAutoNameCheck

Add a note hereOutlook checks the name typed in message headers against the address book as soon as the user tabs out of the entry fields.

Add a note hereMessage recall

Add a note hereA user can recall a sent message, assuming the recipient has not already opened it.

Add a note hereVoting

Add a note hereUsers can create messages that include voting buttons in the message when received.

Add a note hereRecipients can click one of the button choices and submit their choice back to the sender. The sender can automatically track responses to a question or issue.

Add a note hereDelegate access

Add a note hereUsers can grant other users the right to send and receive messages using their mailbox.

Add a note hereMessage tracking

Add a note hereAll the information about delivery, receipt, recall, and voting notifications is tabulated on the original message in the sender’s mailbox.

Add a note hereAutoPreview

Add a note hereThe first few lines of each message can be displayed without requiring the user to open the message in a separate window. This allows users to quickly view the contents of messages.

Add a note hereMessageFlags

Add a note hereUsers can place flags (i.e., notices) on messages to aid in sorting and prioritizing messages. Flags include reply, read, “for your information,” or any custom text.

Add a note hereHyperlinks to URLs

Add a note hereIf a message includes a web URL (Uniform Resource Locator) address, Outlook will recognize that address. If the user clicks the address, Outlook will start the user’s web browser and connect to that location.

Add a note hereRetrieve deleted items

Add a note hereUsers can retrieve deleted items from their mailboxes through the Recover Deleted Items command. Recovered mailbox items are placed in the Deleted Items folder.

Add a note hereThis functionality is made possible by the Exchange Information Store and is configured through the private folder store and individual mailboxes.

Add a note here Table 7.2: Groupware Features of Microsoft Outlook

Add a note hereMain Function

Add a note hereFeatures

Add a note hereDescription

Add a note hereGroup scheduling

Add a note hereBrowsing free/busy information Meeting request processing Delegate access

Add a note hereUsers can browse other users’ free/busy schedule information. If a user sends another user a meeting request, that request is automatically copied from the Inbox to the calendar as a tentative meeting.

Add a note hereUsers can grant other users the right to read and modify their schedules.

Add a note hereGroup calendars, contact lists, and task lists

Add a note herePublic folder use

Add a note hereCalendars, contact lists, and task lists can all be published to public folders to allow group access to that information.

Add a note hereGroup task management

Add a note hereTask tracking

Add a note hereUsers can send tasks to other users, and the status of those tasks can be automatically tracked.

Add a note hereStatus reports

Add a note hereAn automatic status report on a task (containing details such as whether the task has been started, the percentage completed, the hours spent working on the task, and the task owner’s name) can be sent as a mail message.

Add a note hereForms and Office 2003 objects

Add a note hereInclusion of Office 2003 objects

Add a note hereMicrosoft Office 2003 applications can be used to create both presentation material and executable material for Outlook forms. For instance, Microsoft Word can compose the text of a form, and Microsoft Excel can add a spreadsheet to a form.

Add a note here Table 7.3: PIM (Personal Information Manager) Features of Microsoft Outlook

Add a note hereMain Function

Add a note hereFeatures

Add a note hereDescription

Add a note hereFunctional integration within Outlook

Add a note hereOutlook Bar

Add a note hereThis navigation tool permits the creation of shortcuts to a user’s e-mail Inbox, calendar, contacts, tasks, and folders.

Add a note hereAutoCreate

Add a note hereOutlook can automatically convert one Outlook item into another. For example, if an e-mail message represents a task a user needs to complete, the user can drag and drop the e-mail message into the Task folder, and Outlook will automatically convert it to a task.

Add a note hereDocument browsing and retrieval

Add a note hereOutlook Journal

Add a note hereThis feature maintains a log of users’ actions, what they did, and when they did it. Users can then search for items based on when they were created, not just on what they are named or where they were saved.

Add a note hereOutlook Views

Add a note hereOutlook comes with dozens of standard views of information, and users can create their own customized views.

Add a note hereCalendar/Schedule features

Add a note hereAutoDate

Add a note hereOutlook understands natural language input for dates and can convert loosely worded dates into discrete calendar dates. For example, if a user types “the third Wednesday of November at 5:00 p.m.,” Outlook will automatically convert that to “Wednesday 11/17/04 5:00 PM.”

Add a note hereContact Manager features

Add a note hereSingle address book

Add a note hereThe lists of contacts in Contact Manager can be used to address e-mail or a fax and even jump to a website or dial a phone.

Add a note hereFunctions for portable computer users

Add a note hereLocal replication

Add a note hereInformation that users enter into Outlook while on the road with the portable computer can later be replicated back to their Exchange server.

Add a note hereTime switching

Add a note hereOutlook can change the system time and time zone as mobile users move from one location to another.

Add a note hereMicrosoft Office 2003 integration

Add a note hereOffice 2003 interface

Add a note hereOutlook shares many user interface elements with the other Office 2003 applications, such as command bars, menus, shortcut menus, tabbed dialog boxes, and toolbars.

Add a note hereSingle address book

Add a note hereThe other Office 2003 applications can use the Outlook Contact Manager address book.

Add a note hereAttachments

Add a note hereUsers can attach any Office 2003 document to any Outlook item, such as an e-mail, contact, or task.

Add a note hereMail merge

Add a note hereUsers can perform a mail merge between the Outlook Contact Manager and Microsoft Word.

Add a note hereWord 2003 and e-mail

Add a note hereWord can be used as the text editor for creating e-mail content.

Add a note hereDrag-and-drop

Add a note hereUsers can drag and drop information between Office 2003 applications and Outlook modules.

Add a note hereOutlook Journal

Add a note hereOffice files can be located using Outlook Journal.

Add a note hereOffice 2003 objects

Add a note hereAs stated earlier, objects created in Office 2003

Add a note hereand forms

Add a note hereapplications can be included in Outlook forms.

Add a note hereImporting and exporting data

Add a note hereImport and export of data

Add a note hereMicrosoft Outlook can import and export data from and to all Microsoft calendar and mail products, as well as many third-party PIM and messaging products.

Add a note hereVisual Basic for Applications (VBA)

Add a note hereVBA integration

Add a note hereOutlook includes Microsoft object technology and therefore can be used with Microsoft’s Visual Basic for Applications to create compound applications.

Add a note here Installing and Configuring Outlook 2003

Add a note hereAs with most other Windows programs, Outlook 2003 is installed using a fairly intuitive wizard that lets you choose the specific components of the program that you want installed (see Figure 7.14).

Click to collapse
Add a note hereFigure 7.14: Choosing components in an Outlook 2003 installation

Add a note hereIn addition to the new look that Outlook 2003 sports (seen in Figure 7.15), it has some nice new features that you will need to be aware of. First and foremost is the ability of Outlook 2003 to operation in a cache mode, where the Outlook client does not require constant connectivity to its Exchange server. While you may, at first, be tempted to think this is nothing new and is in fact just a new name for the familiar offline mode of operation, this is not the case. The plot thickens when you learn that both cache mode and offline mode use OST (offline storage files) to facilitate their operation.

Click to collapse
Add a note hereFigure 7.15: The new Outlook 2003 interface

Add a note hereThe difference between the new cache mode and the existing offline mode is that users who are working in cache mode automatically have their OST file updated through a synchronization process to the user’s mailbox server. As well, all standard Exchange features, such as mail, calendaring, free/busy information, and address lists, are available to a user when the user is using cache mode. A status indicator in the bottom of the Outlook window shows the current status of Outlook, as seen in Figure 7.15. By clicking on the status, you can configure the mode of operation that Outlook will use, as seen in Figure 7.16.

Image from book
Add a note hereFigure 7.16: Configuring the Outlook operational mode

Note

Add a note hereYou must be using Outlook 2003 with Exchange Server 2003 in order to configure and use cache mode.

Add a note hereBecause the cache mode of operation is new to Outlook 2003 when paired up with Exchange Server 2003, your users will likely want some help in getting it set up correctly on their client workstations. The default state for all newly created Outlook 2003 accounts is the cache mode of operation, thus improving the user’s experience and reducing the load placed on the Exchange servers. Messages are still available on the Exchange server, but they are cached locally for the user. You do, however, when creating the account to connect to the Exchange server, have the option to configure how Outlook is initially configured, as seen in Figure 7.17.

Click to collapse
Add a note hereFigure 7.17: Configuring Outlook for cache mode during account creation

Note

Add a note hereThe OST file used for the local cache is located in the C:\Documents and Settings\%USER%\Local Settings\Application Data\Microsoft\Outlook directory, assuming that your operating system is installed on Volume C.

Add a note hereThe configuration options available when using Outlook 2003 in cache mode are explained in Table 7.4.

Add a note here Table 7.4: The Outlook 2003 Cache Mode Settings

Add a note hereOption

Add a note hereDescription

Add a note hereDownload Headers And Then Full Items

Add a note hereWhen this option is selected, all message headers are downloaded first, followed by all message bodies and any attachments. This is the default selection when cache mode is used.

Add a note hereDownload Full Items

Add a note hereWhen this option is selected, Outlook downloads the header, body, and any attachments of each message sequentially. This option is typically used when the client has a good connection to the Exchange server, such as when the client resides on the same internal network as the Exchange server.

Add a note hereDownload Headers

Add a note hereWhen this option is selected, Outlook downloads only the headers for new messages. When a message is selected for viewing, Outlook then downloads the message body and any attachments to the message. Since this setting uses the least amount of bandwidth, it is typically recommended when connectivity between client and server is poor or slow.

Add a note hereOn Slow Connections Download Headers Only

Add a note hereWhen this option is selected, Outlook controls its behavior depending on the network connection status it detects.

Add a note hereThis option causes the Offline Address List (OAL) to not be downloaded to the client.

Add a note here Configuring RPC over HTTP

Add a note hereAnother of the new features of Outlook 2003 when combined with Exchange Server 2003 is RPC over HTTP, which allows Outlook 2003 clients to connect securely to an Exchange Server 2003 organization over the Internet, which was previously impossible without the creation of a VPN tunnel before making the Outlook-to-Exchange connection. By configuring Outlook 2003 and Exchange Server 2003 to use RPC over HTTP, you allow users to connect to the Exchange organization over the Internet using Outlook instead of Outlook Web Access. As part of the configuration, you configure SSL for the HTTP connection to the front-end server. SSL is required because RPC over HTTP uses Basic authentication to authenticate users.

Add a note hereAlthough RPC over HTTP is a powerful new feature, it is not without cost and burden. Unlike most configurations in Exchange Server 2003, configuring RPC over HTTP is not necessarily a simple process, because you will need to configure both the Exchange servers and the Outlook clients to make it work properly. In order to use RPC over HTTP, you must meet the following requirements:

  • Add a note hereClient computers must have Outlook 2003 installed.

  • Add a note hereClient computers must be running Windows XP with Service Pack 1 and hot fix Q331320.

  • Add a note hereFront-end servers must be running Exchange Server 2003 on Windows Server 2003.

  • Add a note hereBack-end servers must be running Exchange Server 2003 on Windows Server 2003.

  • Add a note herePublic folder servers must be running Exchange Server 2003 on Windows Server 2003.

  • Add a note hereAll Global Catalog servers must be running Windows Server 2003.

Add a note hereIf your network meets these stringent requirements and you have a need for RPC over HTTP, you can configure it by performing the following basic steps:

  1. Add a note hereConfigure the Exchange computer to use RPC over HTTP.

  2. Add a note hereConfigure the RPC virtual directory in Internet Information Services.

  3. Add a note hereConfigure the RPC proxy server to use specific ports.

  4. Add a note hereConfigure the Outlook 2003 computer to use RPC over HTTP.

  5. Add a note hereVerify that the connection can be made using RPC over HTTP.


    Note

    Add a note hereUsers will likely ask why it is necessary to create an additional Outlook profile to use RPC over HTTP. This is done so that users can quickly choose between connection methods when starting up Outlook, depending on how they will be connecting to the Exchange organization. By configuring the profile ahead of time, you can prevent users from making the complicated configuration changes in Outlook and save some calls to the help desk.


    Note

    Add a note hereThe process to configure and implement RPC over HTTP is not likely to be an exam item and is also very lengthy and complex. For these reasons it is not discussed in its entirety here. If you need the complete procedure to configure RPC over HTTP, be sure to see Knowledge Base article 833401, located at http://support.microsoft.com/default.aspx?scid=kb;en-us;833401.

Add a note here The Office Custom Installation Wizard

Add a note here As an administrator, you can customize the setup of Outlook in a few ways, including running the setup program with command-line options or using a settings file to answer various setup questions automatically instead of making the user answer them. However, the easiest and most powerful way to customize an installation of Outlook is with the Office Custom Installation Wizard, shown in Figure 7.18. This wizard is available as part of the Office 2003 Resource Kit, but it can also be freely downloaded from the Microsoft website as part of the Office 2003 Resource Kit Tools.

Click to collapse
Add a note hereFigure 7.18: Using the Office Custom Installation Wizard

Add a note hereThe Office Custom Installation Wizard works with Windows Installer to let you tweak almost every detail of the installation process. You can do the following:

  • Add a note hereDefine the path where Outlook is installed on client computers.

  • Add a note hereSet the installation options (Run From Hard Drive, Install On First Use, Don’t Install) for individual features of Outlook 2003.

  • Add a note hereDefine a list of network servers for Windows Installer to use if the primary installation server is unavailable.

  • Add a note hereSpecify other products to install or other programs to run on the user’s computer when the Outlook installation is done.

  • Add a note hereHide selected options from users during setup.

  • Add a note hereAdd custom files and Windows Registry settings to the installation.

  • Add a note hereCustomize Desktop shortcuts for Outlook 2003.

  • Add a note hereSet user default options.

  • Add a note hereUse Office Profile settings created with the Profile Wizard for Office 2003 to preset user options.

Add a note hereTo accomplish all of this, the Windows Installer uses two types of files to install Outlook: an installer package (MSI) file and an installer transform (MST) file. The package contains a database that describes the configuration information. The transform file contains modifications that are to be made as Windows Installer installs Outlook. The package file never changes; it is essentially a database that helps Windows Installer relate various features to actual installation files. The transform file is what the Custom Installation Wizard helps you create. This means that you can create unique setup scenarios that all use the same installation files. In other words, you could create different installation routines for different departments but use only one network installation point for everyone to share.


Virtual Servers in Exchange Server 2003

Add a note hereAs you learned in Chapter 2, “Microsoft Exchange Architecture,” Exchange Server 2003 relies heavily on Internet Information Services (IIS) to support access via Internet protocols. This integration with IIS also provides Exchange with the ability to configure virtual servers for Internet protocols. A virtual server enables you to host different protocols on the same physical server. The use of virtual servers provides added functionality and scalability. From the client perspective, there is no difference in connecting to a physical server or a virtual server. From the administrative perspective, virtual servers allow much greater flexibility and control than do individual physical servers that have to be created to support Internet protocols.

Add a note hereWhen Exchange Server 2003 is installed, a virtual server is created by default for each Internet protocol, including SMTP, NNTP, HTTP, IMAP4, and POP3. Virtual servers are managed using the System Manager snap-in, as shown in Figure 7.19.

Click to collapse
Add a note hereFigure 7.19: Viewing virtual protocol servers in System Manager

Add a note hereFor the most part, the management of each type of virtual server is the same. You can right-click a virtual server and use the Pause, Stop, and Start commands to control the state of the service. Pausing a virtual server simply prevents new connections from being made to that server while the server itself remains running. Current connections are not disconnected. This is a graceful way of shutting down a virtual server that may be in use. When all users are finished, you can stop the server. Stopping the server will forcibly disconnect all connected users. If you want to disable certain protocols on a server-wide basis, stopping the virtual server for that protocol is usually the best way to go.

Add a note hereAside from these basic commands, you can also open property pages for each kind of virtual server. These pages are covered in the sections later in this chapter that deal with the individual protocols themselves.


Note

Add a note hereIt is possible to configure virtual servers directly using IIS, but this is not recommended. When virtual servers are managed using the Exchange System Manager, the Exchange System Attendant writes the configuration information to Active Directory. From there, the information is written to the IIS metabase. If you configure virtual servers directly in IIS, it is possible that the information you configure will be overwritten by older information configured in the Exchange System Manager or Active Directory. The one exception to this rule is that the HTTP virtual server must be managed using the IIS Manager and cannot be accessed using the Exchange System Manager.


Microsoft Outlook Web Access

Add a note here Outlook Web Access (OWA) was first introduced to Exchange Server in version 5 and provides a way to access Exchange-based folders using a web browser such as Internet Explorer. OWA can be used to access e-mail, public folders, contact information, and calendar information. Since its introduction, OWA has become very popular, and its architecture has once again been completely overhauled with the introduction of Exchange Server 2003 Server. It has been redesigned to provide improved performance and a streamlined user interface.

Add a note hereWhen using OWA, the only thing required on the client computers is Internet Explorer. This is also what makes OWA a good tool for cross-platform support, since versions of most web browsers exist for Windows, Macintosh, and Unix. In fact, OWA is the primary Exchange Server access method for users of Unix.


Note

Add a note hereOutlook Web Access is designed to work with any browser that supports HTML version 3.2 and JavaScript. This includes the latest versions of Internet Explorer and Netscape Navigator, as well as many other browsers. However, OWA is also designed to take advantage of a number of features provided in Internet Explorer 5 and higher that are not supported by other browsers at this time, such as Dynamic HTML (DHTML) and Extensible Markup Language (XML). Such features help provide many advanced collaborative functions.

Add a note here OWA Features and Restraints

Add a note hereOWA is installed by default when you install Exchange Server 2003. Taking advantage of the ASP.NET service of Windows Server 2003, an OWA user can access many of the functions available through Outlook, including functionality for e-mail, calendar and group scheduling, public folders, and collaborative applications (when the forms have been developed with Microsoft Visual InterDev). Although OWA in Exchange Server 2003 is an almost perfect replacement for Outlook 2003, the following are some of the items that are not available when using OWA:

  • Add a note herePersonal address books (because they are stored on your workstation)

  • Add a note herePersonal folders (PST files)

  • Add a note hereWordMail and Microsoft Office integration

  • Add a note hereElectronic forms creation

  • Add a note hereSynchronizing local offline folders with server folders

Add a note hereOutlook Web Access simulates the look and feel of Outlook 2003, as shown in Figure 7.20. The ubiquity of the browser client makes OWA an attractive choice in environments that have a widespread mix of client platforms (such as Windows, Macintosh, and Unix) and that require shared client computers. Outlook Web Access is extremely useful for users who frequently move around among different workstations during the day and users who must access the Exchange server remotely via the Internet.

Click to collapse
Add a note hereFigure 7.20: Accessing Exchange via OWA

Add a note here The OWA Process

Add a note hereThe OWA process in Exchange Server 2003 is quite different from that of previous versions. OWA 5.x used Active Server Pages (ASP) to communicate with Exchange Server 5.5, which in turn used Collaboration Data Objects (CDO) 1.2 and MAPI. The effective number of users per server was limited by the overhead needed to support ASP and to run MAPI sessions within ASP. OWA was actually a part of IIS.

Add a note hereThe new version of OWA does not use MAPI to communicate with the mailbox store and no longer uses ASP for client access. Instead, OWA is built into Exchange Server 2003’s new web store and uses IIS only to receive requests and pass them to the web store. Thus, IIS acts as an intermediary between the browser and OWA. IIS receives a client request, looks at the URL, and passes the appropriate information for the URL back to the web browser. If the server houses the Exchange Server 2003 database, OWA uses a high-speed channel to access the mailbox store. If the server is a front-end server, OWA redirects the request to a back-end server using HTTP.

Add a note hereOWA is actually not a client itself but rather a set of Active Server Pages that run in the context of Microsoft’s IIS. Client web browsers access IIS using HTTP over TCP port 80, by default, and in turn IIS accesses the OWA component on behalf of the clients using an extended version of HTTP known as HTTP-DAV. HTTP-DAV adds several features to HTTP such as file locking, namespace management, and document property access.

Add a note hereMany components play an important role in the OWA process, including the following:

  • Add a note hereActive Directory

  • Add a note hereInformation Store

  • Add a note hereThe Exchange DSAccess component, which enables Exchange Server 2003 components to communicate with Active Directory (DSAccess uses the LDAP protocol to perform this communication)

  • Add a note hereOLE DB Provider for Exchange (ExOLEDB), which acts as the interface between DAVEx and EXIPC (both discussed a bit later)

  • Add a note hereDirectory Service to the IIS metabase (DS2MB), which provides a one-way synchronization of configuration information from Active Directory to the IIS metabase

  • Add a note hereEXIPC, a queuing engine that is used to pass information between the IIS and Information Store components

  • Add a note here IIS metabase, which is a Registry database for IIS configuration

  • Add a note here W3svc, the World Wide Web publishing service of IIS

  • Add a note here DAVEx, a component that passes client requests between W3svc and the Information Store

  • Add a note hereExProx, which acts as a protocol proxy on a front-end server if a front-end/back-end server configuration is being used

  • Add a note here Forms Registry, which stores the OWA forms rendered by IIS and passed to the client

Add a note hereAs you can see, the OWA process is fairly complicated and involves a number of components. The complexity of the process is basically designed to ensure that each major tool in use does what it is good at and that the client needs no special configuration. Since the client needs to be able to access Exchange using a standard web browser, its only responsibility must be to request a simple URL, such as http://owa.microsoft.com/exchange, from a web server (in this case IIS) and display the results in its window. Everything else must happen on the server end. For example, to open a user’s contacts, type the path to the user’s mailbox followed by /contacts, as in http://owa.microsoft.com/exchange/user/contacts, where user is the user’s mailbox name.

Add a note hereHere is the actual process that occurs when a client’s browser requests information from an Exchange server:

  1. Add a note hereW3svc in IIS receives the request and authenticates the user by querying Active Directory.

  2. Add a note hereOnce authentication is complete, W3svc relays the request to the DAVEx component.

  3. Add a note hereDAVEx transfers the request through the EXIPC queue to the Information Store.

  4. Add a note hereThe Information Store retrieves the appropriate data and returns it to DAVEx.

  5. Add a note hereDAVEx retrieves an appropriate form from the Forms Registry and merges it with the information from the Information Store, creating an HTML or XML document.

  6. Add a note hereDAVEx sends the formatted document back to W3svc.

  7. Add a note hereW3svc sends the information back the client, which displays it in the browser window.

Add a note here Installing and Configuring OWA

Add a note hereOWA is installed as part of the default setup of Exchange Server 2003, and it is configured by default to allow access to users’ mailboxes and the default public folder tree. However, you can configure the server to provide customized access for clients by specifying which users can access the server, which authentication method(s) to allow, and which public folders are exposed to users.

Add a note hereSince Outlook Web Access begins running when Exchange Server is installed, no special setup options are required other than a standard Exchange installation. The OWA client can offer your users much of the functionality offered by using Outlook 2003 from remote locations. Using a dedicated server for OWA can also increase network security by exposing only this dedicated server to the Internet.

Add a note hereWhen you install Exchange Server 2003, web access is installed and configured by default, and an Exchange virtual root and a Public virtual root are added to the IIS directory tree. These virtual roots point to their corresponding directories in Exchange Server 2003—the directories that hold the public store and the mailbox store.

Add a note hereTo access mail folders from within the corporate intranet, users will need to enter the following address in their web browser: http://servername/exchange/user/, where servername is the name of the Exchange server, exchange is the default private web folder, and userid is the alias of the user. For connecting via the Internet, the above URL must be appended by the Fully Qualified Domain Name of the domain on which Exchange is running, for example, http://servername.domain.com/exchange/user/.

Add a note hereWeb access to Exchange Server 2003 is enabled for all users by default. To change this configuration, use Active Directory Users and Computers. On the Exchange Features tab of the user Properties dialog box, seen in Figure 7.21, you can enable or disable HTTP, IMAP4, and POP3 access to the Exchange organization.

Click to collapse
Add a note hereFigure 7.21: Modifying protocol settings for a user

Add a note here User Authentication in OWA

Add a note hereUsers of OWA must be authenticated in some form before anything but Anonymous access is granted. A number of options are available for OWA authentication. Choosing the appropriate mechanism is usually a matter of the capabilities of the client operating system and specific security policies. In a single-server environment, the default authentication method for OWA is Anonymous authentication and Integrated Windows authentication (similar to NTLM). In a multi-server environment, the default authentication is Basic (clear-text) and NTLM. Authentication is set via the HTTP virtual servers configured for OWA. This configuration is actually set in Internet Information Server. Microsoft recommends configuring authentication on the back-end Exchange server only. The default authentication settings are the same on the front-end Exchange server, but securing the back-end server is much more important. In addition, authentication conflicts between the front end and back end could jeopardize user access. Exercise 7.1 outlines the steps for configuring OWA authentication. But first we must define the available types of authentication.

Add a note here Basic authentication Basic authentication, also referred to as plain-text or clear-text, is commonly used on intranets. Unlike the NTLM protocol, which accepts established users’ identification through the access token, Basic authentication relies on users to enter their username, domain, and password. Basic authentication is independent of the browser, which also makes it independent of the platform being used. Basic authentication results in the transmission of unencrypted passwords over the network, which makes it a relatively insecure method of authentication. Users must enter their username, domain, and password each time they log on.

Add a note here Integrated Windows authentication Integrated Windows authentication works differently depending upon the situation. The optimal authentication takes place when the client is running Windows 2000 (or later) and Internet Explorer 5 (or later), in which case Kerberos provides the best security available. With other pre–Windows 2000 clients, Integrated Windows authentication uses the NTLM protocol instead of Kerberos. Integrated Windows authentication always encrypts the client’s password, which provides excellent security. It also allows browser access without prompting the users for their user ID and password. Integrated Windows authentication does not work with browsers other than Internet Explorer 4 and 5, and it is not available in a front-end and back-end Exchange Server configuration.

Add a note here Anonymous authentication Anonymous authentication, which IIS also allows, provides limited access to specific public folders and directory information. All browsers support Anonymous authentication, making it an easy way to provide insecure access to public folder data. A single point of configuration makes administration simple. Anonymous authentication does not identify users uniquely. Consequently, you cannot track usage by user.

Add a note here Secure Sockets Layer authentication Secure Sockets Layer (SSL) provides the best level of security because the entire communications session is encrypted. SSL is not an authentication mechanism itself. Rather, SSL provides a secure channel for other authentication mechanisms. Although any authentication mechanism can be used with SSL, the most common implementation with SSL is Basic (clear-text). Most browsers support SSL communication. SSL creates a substantial amount of overhead in providing this security, so SSL communications tend to reduce the overall performance of an authenticating server and generate increased network traffic.

Add a note hereAll in all, Outlook Web Access is a powerful means of providing cross-platform and remote access to your Exchange server. Authenticated users can log on to their personal accounts to access e-mail, public folders, and collaborative tools. Using web-based public folder access, an organization could even build private and public discussion forums on the Internet or on private intranets.

Add a note here EXERCISE 7.1: Configuring Authentication for Outlook Web Access

  1. Add a note hereClick Start > Programs > Administrative Tools > Internet Information Services (IIS) Manager.

  2. Add a note hereExpand the container for the server running OWA.

  3. Add a note hereExpand the default website container.

  4. Add a note hereRight-click the Exchweb object and select Properties from the shortcut menu.

  5. Add a note hereClick the Directory Security tab.

  6. Add a note hereClick the Edit button in the Authentication And Access Control section at the top of the page.

  7. Add a note hereSelect the forms of access that you want to allow.

  8. Add a note hereClick OK twice to return to Internet Information Services (IIS) Manager.


0 comments

Post a Comment