This video describes the supported namespaces—contiguous, noncontiguous, disjointed, and single-label—and demonstrates DNS configuration for large environments.
- [Instructor] The design of the…Active Directory Topology is the first step…in preparing to set up an exchange organization.…The second is to make sure that DNS is properly configured…to find all of that directory service information.…In small organizations with a single domain,…things are quite simple.…Just make sure that you're using…Active Directory-integrated DNS…and that you're exchange server will have…reliable access to it over Port 53.…
In a multiple domain environment,…things get a little more involved.…The most common type of multiple domain environment…uses contiguous namespace.…This is where all branches of the Active Directory…tree simply add on to the parent branch.…For example, if Landon Hotels were at the top…of our Active Directory tree,…a child domain might be named corp.landonhotels.com,…or southwest.landonhotels.com.…
From the southwest domain,…we could have additional child domains,…pheonix.southwest.landonhotels.com…and slc.southwest.landonhotels.com…and so on.…This is contiguous namespace.…
AuthorScott M Burrell
- Planning and configuring Active Directory (AD)
- Creating and configuring mailboxes
- Delegating mailboxes
- Mailbox and mailbox folder permissions
- Mail-enabled users
- Send as versus Send on Behalf
- Using public folders
- Managing public folder permissions
- RBAC versus AD split permissions
- Configuring user assignment policies
- Protecting Exchange content
- Message signing and encryption
- Troubleshooting IRM failure
Skill Level Intermediate
Deploying Exchange Server 2016with Robert McMillen3h 1m Intermediate
Exchange 2016: Client Access Serviceswith Scott M Burrell1h 50m Intermediate
Exchange 2016: Mailbox Databaseswith Scott M Burrell2h 30m Intermediate
Exchange 2016: Transport Serviceswith Scott M Burrell2h 24m Intermediate
1. Plan and Configure Active Directory (AD)
3. Other Mail-Enabled Objects
4. Role-Based Access Control
5. Protecting Exchange Content
Next steps1m 51s
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.