Browse Definitions:

SearchExchange

SearchExchange provides the Exchange community with the practical advice they need to help them select Exchange-related products and services, configure and install Exchange and Outlook, and optimize performance of the software in a cost-effective way. The site provides targeted news, expert advice, tips, search, webcasts, and research that cover all aspects of the Exchange world and the issues that are important to the IT professionals responsible for Exchange.

View the complete archive of Microsoft Exchange Server Management news, research and expert advice.

Go to:  SearchExchange

Recently on  SearchExchange

Office 365 administrators must brush up on cloud skills

Are you prepared to shift from on-premises Exchange Server to Office 365? It's a different skill set, and admins must rethink how to deploy apps and protect end users.

More Highlights
Definitions
  • discovery mailbox

    A discovery mailbox is used to perform e-discovery searches for Exchange Server and Exchange Online environments.

  • poison mailbox

    A poison mailbox is a corrupted mailbox on the Exchange Server that causes disruptions on the Exchange database store.

  • IMAP (Internet Message Access Protocol)

    IMAP (Internet Message Access Protocol) is a standard email protocol that stores email messages on a mail server, but allows the end user to view and manipulate the messages as though they were stored locally on the end user's computing device(s).

Browse Exchange Topics

Email, Messaging and Collaboration Clients

Users must access Exchange Server email through clients like Microsoft Outlook, Outlook Web Access (OWA), instant messaging and unified messaging programs or mobile devices. Get tips and tutorials to help you install, configure, manage and troubleshoot email and messaging clients in an Exchange Server environment.

Recent Definitions

  • IMAP (Internet Message Access Protocol)

    IMAP (Internet Message Access Protocol) is a standard email protocol that stores email messages on a mail server, but allows the end user to view and manipulate the messages as though they were stored locally on the end user's computing device(s).

  • Microsoft Office 2016

    Microsoft Office 2016 is a suite of productivity applications that includes Microsoft Word, Microsoft Excel, Microsoft PowerPoint and Microsoft Outlook.

  • Microsoft Outlook MailTips

    Microsoft Outlook MailTips is an opt-in tool for Exchange Server 2013 that will send alerts to end users when they are about about to click "reply all" to a large distribution list, send sensitive information to someone outside the organization or send a message to someone who is out of the office.

Highlights

More Email, Messaging and Collaboration Clients Topics

Back to Top

Email, Messaging and Collaboration Servers

How you deploy, manage and troubleshoot your email, messaging and collaboration servers depends greatly on which version or versions you're running and in what combination. These tips and tutorials are sorted by server type and version to help you target your administration efforts to Exchange 2007, Exchange 2003, Exchange 2000, Exchange 5.5 or Microsoft Office SharePoint Server (MOSS).

Recent Definitions

  • Microsoft Exchange Server 2013 Managed Availability

    Microsoft Exchange Server 2013 Managed Availability is a built-in monitoring and recovery platform in Exchange 2013.

  • application program interface (API)

    An application program interface (API) is code that allows two software programs to communicate with each other. Typically, APIs are released for third-party development as part of a software development kit (SDK) or as an open API published on the Internet.

  • Microsoft Outlook MailTips

    Microsoft Outlook MailTips is an opt-in tool for Exchange Server 2013 that will send alerts to end users when they are about about to click "reply all" to a large distribution list, send sensitive information to someone outside the organization or send a message to someone who is out of the office.

Highlights

More Email, Messaging and Collaboration Servers Topics

Back to Top

Exchange Security

Constant threats from spam, phishing, and viruses and the increase in email compliance and e-discovery requirements mean messaging administrators need to be well-versed on a variety of email security issues. Discover tools, tips and tutorials that will help secure and protect email in a Microsoft Exchange Server environment. You'll learn how to configure policies and encyption, set up a VPN or firewall, manage user passwords and permissions, and more.

Recent Definitions

  • business email compromise (BEC, man-in-the-email attack)

    A business email compromise (BEC) is an exploit in which the attacker gains access to a corporate email account and spoofs the owner’s identity to defraud the company or its employees, customers or partners of money.

  • discovery mailbox

    A discovery mailbox is used to perform e-discovery searches for Exchange Server and Exchange Online environments.

  • email security gateway

    An email security gateway is a product or service that is designed to prevent the transmission of emails that break company policy, send malware or transfer information with malicious intent.

Highlights

More Exchange Security Topics

Back to Top

Exchange Administration

Microsoft Exchange Server administration involves a lot of moving parts and components. Find the resources and references you need to manage and troubleshoot Exchange Server efficiently and effectively, including tips, tutorials and tools to help you address common errors, performance issues, monitoring and log analysis, DNS and Active Directory configuration, and much more.

Recent Definitions

  • poison mailbox

    A poison mailbox is a corrupted mailbox on the Exchange Server that causes disruptions on the Exchange database store.

  • IMAP (Internet Message Access Protocol)

    IMAP (Internet Message Access Protocol) is a standard email protocol that stores email messages on a mail server, but allows the end user to view and manipulate the messages as though they were stored locally on the end user's computing device(s).

  • Remote Access server role

    Remote Access is a server role in Microsoft Windows Server 2012 and Windows Server 2012 R2 and offers administrators a central point for administering, configuring and monitoring factors related to network access.

Highlights

More Exchange Administration Topics

Back to Top

Exchange Deployment and Migration

It is important to have a solid grasp on best practices, processes and gotchas before beginning an email upgrade or migration. Discover the architecture considerations, hardware requirements and configuration planning processes you need to do before deploying a new version of Microsoft Exchange Server.

Recent Definitions

  • IMAP migration (Internet Message Access Protocol migration)

    IMAP migration transfers mailbox content from an existing Exchange server to later versions of Exchange, Exchange Online and Office 365.

  • Exchange staged migration

    The staged Exchange migration process transfers data and mailboxes from one Exchange server to another, either on-premises or in the cloud.

  • cutover migration

    The cutover Exchange migration process transfers data and mailboxes from one Exchange server to another in a single batch. Related user accounts are then administered in Office 365.

Highlights

More Exchange Deployment and Migration Topics

Back to Top

Exchange Storage and Data Management

Records retention requirements have created exponential Microsoft Exchange Server storage and data management growth. Get the resources you need to successfully set up and manage Exchange data like mail stores, transaction log files and .PST files, and learn archiving, backup and disaster recovery best practices to keep your email and databases secure and accessible.

Recent Definitions

Highlights

More Exchange Storage and Data Management Topics

Back to Top

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • Web application firewall (WAF)

    A Web application firewall (WAF) is a firewall that monitors, filters or blocks traffic to and from a Web application. WAFs are ...

  • MD5

    The MD5 hashing algorithm is a one-way cryptographic function that accepts a message of any length as input and returns as output...

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

SearchHealthIT

SearchDisasterRecovery

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

  • disaster recovery as a service (DRaaS)

    One approach to a strong disaster recovery plan is DRaaS, where companies offload data replication and restoration ...

SearchStorage

  • secondary storage

    Secondary storage is used to protect inactive data written from a primary storage array to a nonvolatile tier of disk, flash or ...

  • VRAM (video ram)

    VRAM (video RAM) is a reference to any type of random access memory (RAM) used to store image data for a computer display.

  • ZFS

    ZFS is a local file system and logical volume manager created by Sun Microsystems to control the placement, storage and retrieval...

SearchSolidStateStorage

  • SSD RAID (solid-state drive RAID)

    SSD RAID (solid-state drive RAID) is a methodology commonly used to protect data by distributing redundant data blocks across ...

  • Tier 0

    Tier 0 (tier zero) is a level of data storage that is faster, and perhaps more expensive, than any other level in the storage ...

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close