Browse Definitions:

SearchExchange

SearchExchange provides the Exchange community with the practical advice they need to help them select Exchange-related products and services, configure and install Exchange and Outlook, and optimize performance of the software in a cost-effective way. The site provides targeted news, expert advice, tips, search, webcasts, and research that cover all aspects of the Exchange world and the issues that are important to the IT professionals responsible for Exchange.

View the complete archive of Microsoft Exchange Server Management news, research and expert advice.

Go to:  SearchExchange

Recently on  SearchExchange

Learn how to manage Exchange outages with four expert tips

Exchange's automated maintenance routines only go so far. Administrators need a repertoire of troubleshooting tools and techniques to unclog problems and get messages moving.

More Highlights
Definitions
  • discovery mailbox

    A discovery mailbox is used to perform e-discovery searches for Exchange Server and Exchange Online environments.

  • poison mailbox

    A poison mailbox is a corrupted mailbox on the Exchange Server that causes disruptions on the Exchange database store.

  • IMAP (Internet Message Access Protocol)

    IMAP (Internet Message Access Protocol) is a standard email protocol that stores email messages on a mail server, but allows the end user to view and manipulate the messages as though they were stored locally on the end user's computing device(s).

Browse Exchange Topics

Email, Messaging and Collaboration Clients

Users must access Exchange Server email through clients like Microsoft Outlook, Outlook Web Access (OWA), instant messaging and unified messaging programs or mobile devices. Get tips and tutorials to help you install, configure, manage and troubleshoot email and messaging clients in an Exchange Server environment.

Recent Definitions

  • IMAP (Internet Message Access Protocol)

    IMAP (Internet Message Access Protocol) is a standard email protocol that stores email messages on a mail server, but allows the end user to view and manipulate the messages as though they were stored locally on the end user's computing device(s).

  • Microsoft Office 2016

    Microsoft Office 2016 is a suite of productivity applications that includes Microsoft Word, Microsoft Excel, Microsoft PowerPoint and Microsoft Outlook.

  • Microsoft Outlook MailTips

    Microsoft Outlook MailTips is an opt-in tool for Exchange Server 2013 that will send alerts to end users when they are about about to click "reply all" to a large distribution list, send sensitive information to someone outside the organization or send a message to someone who is out of the office.

Highlights

More Email, Messaging and Collaboration Clients Topics

Back to Top

Email, Messaging and Collaboration Servers

How you deploy, manage and troubleshoot your email, messaging and collaboration servers depends greatly on which version or versions you're running and in what combination. These tips and tutorials are sorted by server type and version to help you target your administration efforts to Exchange 2007, Exchange 2003, Exchange 2000, Exchange 5.5 or Microsoft Office SharePoint Server (MOSS).

Recent Definitions

  • Microsoft Exchange Server 2013 Managed Availability

    Microsoft Exchange Server 2013 Managed Availability is a built-in monitoring and recovery platform in Exchange 2013.

  • application program interface (API)

    An application program interface (API) is code that allows two software programs to communicate with each other. Typically, APIs are released for third-party development as part of a software development kit (SDK) or as an open API published on the Internet.

  • Microsoft Outlook MailTips

    Microsoft Outlook MailTips is an opt-in tool for Exchange Server 2013 that will send alerts to end users when they are about about to click "reply all" to a large distribution list, send sensitive information to someone outside the organization or send a message to someone who is out of the office.

Highlights

More Email, Messaging and Collaboration Servers Topics

Back to Top

Exchange Security

Constant threats from spam, phishing, and viruses and the increase in email compliance and e-discovery requirements mean messaging administrators need to be well-versed on a variety of email security issues. Discover tools, tips and tutorials that will help secure and protect email in a Microsoft Exchange Server environment. You'll learn how to configure policies and encyption, set up a VPN or firewall, manage user passwords and permissions, and more.

Recent Definitions

  • business email compromise (BEC, man-in-the-email attack)

    A business email compromise (BEC) is an exploit in which the attacker gains access to a corporate email account and spoofs the owner’s identity to defraud the company or its employees, customers or partners of money.

  • discovery mailbox

    A discovery mailbox is used to perform e-discovery searches for Exchange Server and Exchange Online environments.

  • email security gateway

    An email security gateway is a product or service that is designed to prevent the transmission of emails that break company policy, send malware or transfer information with malicious intent.

Highlights

More Exchange Security Topics

Back to Top

Exchange Administration

Microsoft Exchange Server administration involves a lot of moving parts and components. Find the resources and references you need to manage and troubleshoot Exchange Server efficiently and effectively, including tips, tutorials and tools to help you address common errors, performance issues, monitoring and log analysis, DNS and Active Directory configuration, and much more.

Recent Definitions

  • poison mailbox

    A poison mailbox is a corrupted mailbox on the Exchange Server that causes disruptions on the Exchange database store.

  • IMAP (Internet Message Access Protocol)

    IMAP (Internet Message Access Protocol) is a standard email protocol that stores email messages on a mail server, but allows the end user to view and manipulate the messages as though they were stored locally on the end user's computing device(s).

  • Remote Access server role

    Remote Access is a server role in Microsoft Windows Server 2012 and Windows Server 2012 R2 and offers administrators a central point for administering, configuring and monitoring factors related to network access.

Highlights

More Exchange Administration Topics

Back to Top

Exchange Deployment and Migration

It is important to have a solid grasp on best practices, processes and gotchas before beginning an email upgrade or migration. Discover the architecture considerations, hardware requirements and configuration planning processes you need to do before deploying a new version of Microsoft Exchange Server.

Recent Definitions

  • IMAP migration (Internet Message Access Protocol migration)

    IMAP migration transfers mailbox content from an existing Exchange server to later versions of Exchange, Exchange Online and Office 365.

  • Exchange staged migration

    The staged Exchange migration process transfers data and mailboxes from one Exchange server to another, either on-premises or in the cloud.

  • cutover migration

    The cutover Exchange migration process transfers data and mailboxes from one Exchange server to another in a single batch. Related user accounts are then administered in Office 365.

Highlights

More Exchange Deployment and Migration Topics

Back to Top

Exchange Storage and Data Management

Records retention requirements have created exponential Microsoft Exchange Server storage and data management growth. Get the resources you need to successfully set up and manage Exchange data like mail stores, transaction log files and .PST files, and learn archiving, backup and disaster recovery best practices to keep your email and databases secure and accessible.

Recent Definitions

Highlights

More Exchange Storage and Data Management Topics

Back to Top

-ADS BY GOOGLE

SearchCompliance

  • PCAOB (Public Company Accounting Oversight Board)

    The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public ...

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

SearchSecurity

  • spear phishing

    Spear phishing is an email-spoofing attack that targets a specific organization or individual, seeking unauthorized access to ...

  • supercookie

    A supercookie is a type of tracking cookie inserted into an HTTP header by an internet service provider to collect data about a ...

  • email spam

    Email spam, or junk email, is unsolicited bulk messages sent through email with commercial, fraudulent or malicious intent.

SearchHealthIT

SearchDisasterRecovery

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

  • disaster recovery as a service (DRaaS)

    One approach to a strong disaster recovery plan is DRaaS, where companies offload data replication and restoration ...

SearchStorage

  • GlusterFS (Gluster File System)

    GlusterFS (Gluster File System) is an open source distributed file system that can scale out in building-block fashion to store ...

  • virtual memory

    Virtual memory is a memory management capability of an OS that allows a computer to compensate for physical memory shortages by ...

  • yottabyte (YB)

    A yottabyte is a measure of theoretical storage capacity and is 2 to the 80th power bytes, or, in decimal, approximately 1,000 ...

SearchSolidStateStorage

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • SSD caching

    SSD caching, also known as flash caching, is the temporary storage of data on NAND flash memory chips in a solid-state drive so ...

  • NVDIMM (Non-Volatile Dual In-line Memory Module)

    An NVDIMM (non-volatile dual in-line memory module) is hybrid computer memory that retains data during a service outage.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close