Browse Definitions:

SearchExchange

SearchExchange provides the Exchange community with the practical advice they need to help them select Exchange-related products and services, configure and install Exchange and Outlook, and optimize performance of the software in a cost-effective way. The site provides targeted news, expert advice, tips, search, webcasts, and research that cover all aspects of the Exchange world and the issues that are important to the IT professionals responsible for Exchange.

View the complete archive of Microsoft Exchange Server Management news, research and expert advice.

Go to:  SearchExchange

Recently on  SearchExchange

Migrate to Exchange 2016 with all the facts

When the time comes for a business to update its messaging platform, an Exchange 2016 migration can make sense. These four expert tips can usher you past pitfalls.

More Highlights
Definitions
  • Microsoft Office 365 admin roles

    Microsoft Office 365 admin roles give users authorization to perform certain tasks in the Office 365 admin center. Only the global administrator can assign or modify an admin role, which grants the permissions required to control certain functions in Office 365.

  • MAPI over HTTP (Messaging Application Programming Interface over HTTP)

    MAPI over HTTP is the default transport protocol to connect clients to Microsoft Exchange and Exchange Online.

  • discovery mailbox

    A discovery mailbox is used to perform e-discovery searches for Exchange Server and Exchange Online environments.

Browse Exchange Topics

Email, Messaging and Collaboration Clients

Users must access Exchange Server email through clients like Microsoft Outlook, Outlook Web Access (OWA), instant messaging and unified messaging programs or mobile devices. Get tips and tutorials to help you install, configure, manage and troubleshoot email and messaging clients in an Exchange Server environment.

Recent Definitions

  • Microsoft Office 365 admin roles

    Microsoft Office 365 admin roles give users authorization to perform certain tasks in the Office 365 admin center. Only the global administrator can assign or modify an admin role, which grants the permissions required to control certain functions in Office 365.

  • IMAP (Internet Message Access Protocol)

    IMAP (Internet Message Access Protocol) is a standard email protocol that stores email messages on a mail server, but allows the end user to view and manipulate the messages as though they were stored locally on the end user's computing device(s).

  • Microsoft Office 2016

    Microsoft Office 2016 is a suite of productivity applications that includes Microsoft Word, Microsoft Excel, Microsoft PowerPoint and Microsoft Outlook.

Highlights

More Email, Messaging and Collaboration Clients Topics

Back to Top

Email, Messaging and Collaboration Servers

How you deploy, manage and troubleshoot your email, messaging and collaboration servers depends greatly on which version or versions you're running and in what combination. These tips and tutorials are sorted by server type and version to help you target your administration efforts to Exchange 2007, Exchange 2003, Exchange 2000, Exchange 5.5 or Microsoft Office SharePoint Server (MOSS).

Recent Definitions

  • application program interface (API)

    An application program interface (API) is code that allows two software programs to communicate with each other.

  • Microsoft Exchange Server 2013 Managed Availability

    Microsoft Exchange Server 2013 Managed Availability is a built-in monitoring and recovery platform in Exchange 2013.

  • Microsoft Outlook MailTips

    Microsoft Outlook MailTips is an opt-in tool for Exchange Server 2013 that will send alerts to end users when they are about about to click "reply all" to a large distribution list, send sensitive information to someone outside the organization or send a message to someone who is out of the office.

Highlights

More Email, Messaging and Collaboration Servers Topics

Back to Top

Exchange Security

Constant threats from spam, phishing, and viruses and the increase in email compliance and e-discovery requirements mean messaging administrators need to be well-versed on a variety of email security issues. Discover tools, tips and tutorials that will help secure and protect email in a Microsoft Exchange Server environment. You'll learn how to configure policies and encyption, set up a VPN or firewall, manage user passwords and permissions, and more.

Recent Definitions

  • business email compromise (BEC, man-in-the-email attack)

    A business email compromise (BEC) is an exploit in which the attacker gains access to a corporate email account and spoofs the owner’s identity to defraud the company or its employees, customers or partners of money.

  • discovery mailbox

    A discovery mailbox is used to perform e-discovery searches for Exchange Server and Exchange Online environments.

  • email security gateway

    An email security gateway is a product or service that is designed to prevent the transmission of emails that break company policy, send malware or transfer information with malicious intent.

Highlights

More Exchange Security Topics

Back to Top

Exchange Administration

Microsoft Exchange Server administration involves a lot of moving parts and components. Find the resources and references you need to manage and troubleshoot Exchange Server efficiently and effectively, including tips, tutorials and tools to help you address common errors, performance issues, monitoring and log analysis, DNS and Active Directory configuration, and much more.

Recent Definitions

Highlights

More Exchange Administration Topics

Back to Top

Exchange Deployment and Migration

It is important to have a solid grasp on best practices, processes and gotchas before beginning an email upgrade or migration. Discover the architecture considerations, hardware requirements and configuration planning processes you need to do before deploying a new version of Microsoft Exchange Server.

Recent Definitions

  • IMAP migration (Internet Message Access Protocol migration)

    IMAP migration transfers mailbox content from an existing Exchange server to later versions of Exchange, Exchange Online and Office 365.

  • Exchange staged migration

    The staged Exchange migration process transfers data and mailboxes from one Exchange server to another, either on-premises or in the cloud.

  • cutover migration

    The cutover Exchange migration process transfers data and mailboxes from one Exchange server to another in a single batch. Related user accounts are then administered in Office 365.

Highlights

More Exchange Deployment and Migration Topics

Back to Top

Exchange Storage and Data Management

Records retention requirements have created exponential Microsoft Exchange Server storage and data management growth. Get the resources you need to successfully set up and manage Exchange data like mail stores, transaction log files and .PST files, and learn archiving, backup and disaster recovery best practices to keep your email and databases secure and accessible.

Recent Definitions

Highlights

More Exchange Storage and Data Management Topics

Back to Top

-ADS BY GOOGLE

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

  • computer worm

    A computer worm is a type of malicious software program whose primary function is to infect other computers while remaining ...

  • black hat

    Black hat refers to a hacker who breaks into a computer system or network with malicious intent.

  • copyright

    Copyright is a legal term describing ownership of control of the rights to the use and distribution of certain works of creative ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

SearchSolidStateStorage

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close