access control
The security mechanism in Windows Server™ 2003 that limits access to information, objects, or controls for designated users and groups.
access control entry
(ACE) An entry in an object's discretionary access control list (DACL) that grants permissions to a user or group. An ACE is also an entry in an object's system access control list (SACL) that specifies the security events to be audited for a user or group.
access control list
(ACL) A list of security protections that apply to an entire object, or a set of the object's properties, or an individual property of an object. There are two types of access control lists: discretionary and system.
ACE
See definition for: access control entry
ACL
See definition for: access control list
Active Directory
The Windows-based directory service. Microsoft® Active Directory® directory service stores information about objects on a network and makes this information available to users and network administrators. Active Directory gives network users access to permitted resources anywhere on the network using a single logon process. It provides network administrators with an intuitive, hierarchical view of the network and a single point of administration for all network objects.
Active Directory Service Interfaces
(ADSI) A directory service model and a set of Component Object Model (COM) interfaces. ADSI enables Windows applications and Active Directory clients to access several network directory services, including Active Directory. ADSI is supplied as a software development kit (SDK).
Active Directory Users and Computers
An administrative tool used by administrators to perform day-to-day Active Directory administrative tasks. The tasks that can be performed with this tool include creating, deleting, modifying, moving, and setting permissions on objects stored in the directory. Examples of objects in Active Directory are organizational units, users, contacts, groups, computers, printers, and shared file objects.
address
A recipient address is a collection of information that identifies a specific message recipient. It must be unique and complete to properly identify an e-mail recipient.
address book
A directory of address lists available to Exchange users that enables them to address e-mail messages, and select conferencing resources. Exchange administrators determine which address lists are available to their e-mail users.
address list
A collection of recipient and other Active Directory objects. Each address list can contain one or more types of objects (for example, users, contacts, groups, public folders, conferencing, and other resources). Microsoft Exchange Server 2003 and Exchange 2000 Server address lists also provide a mechanism to partition mail-enabled objects in Active Directory for the benefit of specific groups of users.
Address Rewrite
A tool that can be used to rewrite return e-mail addresses on outgoing e-mail messages sent from a third party mail system to Exchange and destined for external or Internet addresses. Address Rewrite is useful in merger or acquisition scenarios in which you want all e-mail addresses to reflect the new organization's name.
ADMD
See definition for: administrative management domain
administrative management domain
(ADMD) Part of a management domain that is a set of messaging systems managed by an organization that contains at least one message transfer agent (MTA). An ADMD is managed by a public service provider, and is the highest level management domain that transmits third-party message traffic.
ADSI
See definition for: Active Directory Service Interfaces
anonymous user
A non-validated user who is not recognized by the server, and who can access only published folders and address lists.
ArchiveSink
A diagnostic tool that can be used to log all message and recipient details of an e-mail message for incoming and outgoing messages on an Exchange server. When message logging is enabled, ArchiveSink creates an .xml for each message that is archived, in addition to the .eml file that is created when messages are archived.
attribute
A characteristic of an object; for example, a network printer is an object and its attributes include its location, whether it can print in color, and its print job capacity.
authentication
The process for verifying that an entity or object is who or what it claims to be. Examples include confirming the source and integrity of information, such as verifying a digital signature or verifying the identity of a user or computer.
BadMail folder
The BadMail folder contains messages that cannot be delivered to your organization, and also cannot be returned to the sender. Therefore, the folder typically contains unsolicited commercial e-mail (also known as spam), and the files within the folder can usually be deleted.
bridgehead server
A computer that connects servers using the same communications protocols so information can be passed from one server to another. In Exchange Server 2003 and Exchange 2000 Server, a bridgehead server is a connection point from a routing group to another routing group, remote system, or other external system.
CDO
See definition for: Collaboration Data Objects
certificate
An electronic credential that authenticates a user on the Internet and on intranets. Certificates ensure the legitimate online transfer of confidential information or other sensitive material by means of public encryption technology. In Exchange, certificates contain information used for digital signatures and encryption that binds the user's public key to the mailbox.
certificate trust list
(CTL) A signed list of root certification authority certificates that an administrator considers reputable for designated purposes, such as client authentication or secure e-mail.
certification authority
An entity responsible for establishing and vouching for the authenticity of public keys belonging to subjects (usually users or computers) or other certification authorities. Activities of a certification authority can include binding public keys to distinguished names through signed certificates, managing certificate serial numbers, and certificate revocation.
code page
A means of providing support for character sets and keyboard layouts for different countries or regions. A code page is a table that relates the binary character codes used by a program to keys on the keyboard or to characters on the display.
coexistence
When you connect Exchange Server 2003 to another messaging system, including an earlier version of Exchange, the two systems coexist. A coexistence period can be short-term (enough time to migrate users from an existing messaging system to Exchange 2003), or it can be long-term (a permanent connection to the messaging system of another department that is not moving to Exchange 2003).
Collaboration Data Objects
(CDO) An application programming interface (API) that enables users and applications to have high-level access to data objects within Exchange. CDO defines the concept of different object classes, including messages, posts, appointments, and tasks.
connector
A software component designed to support connections between products.
contact
An Active Directory object that represents a user who is outside of the Exchange organization. For example, a contact may represent a user outside of the organization. A contact in Windows Server 2003 or Windows 2000 is equivalent to a custom recipient in earlier versions of Exchange.
CTL
See definition for: certificate trust list
custom address list
An address list created to help users who need a custom view of recipients within an Exchange organization. For example, you can create an address list that includes only employees in
custom recipient
In Exchange 5.5 and earlier, a custom recipient is a user who is not hosted by Exchange. In Exchange Server 2003, such users can be added to Active Directory as contacts, Windows users, or users whose Windows accounts are disabled. In any case, they are mail-enabled, but not mailbox-enabled, because their mailboxes are hosted on another messaging system.
DACL
See definition for: discretionary access control list
default address list
An address list that is automatically created based on the values of specific attributes of Active Directory objects. These address lists are available to Exchange users without any administrator action.
delegation
An assignment of administrative responsibility to a user, computer, group, or organization.
device credentials
Authentication information provided from a device to gain access to the enterprise network.
directory synchronization
The process of synchronizing directory information about Exchange users from Active Directory with the directory of another messaging system. With directory synchronization, users can send e-mail messages to users on a different messaging system using an alias or short name. In addition, address or other directory changes are updated automatically between systems.
discretionary access control list
(DACL) The part of an object's security descriptor that grants or denies specific users and groups permission to access the object. Only the owner of an object can change permissions granted or denied in a DACL, thus access to the object is at the owner's discretion.
display name
A descriptive name that is assigned to a directory object when it is created. The display name is predominantly used in user interfaces such as client address lists. The display name can be changed after the object is created.
distinguished name
A name that uniquely identifies an object by using the relative distinguished name for the object, plus the names of container objects and domains that contain the object. The distinguished name identifies the object as well as its location in a tree. Every object in Active Directory has a distinguished name.
distribution group
A group of recipients created to expedite mass mailing of messages and other information. When e-mail is sent to a distribution list, all members of that list receive a copy of the message.
distribution list
A group of recipients addressed as a single recipient. Administrators can create distribution lists that are available in the Address Book. Users can create distribution lists and add them to their personal address books.
DNS
See definition for: Domain Name System
domain controller
In an Active Directory forest, a server that contains a writable copy of the Active Directory database, participates in Active Directory replication, and controls access to network resources. Administrators can manager user accounts, network access, shared resources, site topology, and other directory objects from any domain controller in the forest.
Domain Name System
(DNS) A hierarchical, distributed database that contains mappings of DNS domain names to various types of data, such as IP addresses. DNS enables the location of computers and services by user-friendly names, and it also enables the discovery of other information stored in the database.
DomainPrep
A tool that is used during deployment to create the groups and permissions that are required for Exchange servers to read and modify user attributes. DomainPrep is run after ForestPrep completes, and after enough time for replication has elapsed. As with ForestPrep, it is available on the Exchange Server 2003 CD.
DSAccess
An Exchange Server 2003 component that provides directory lookup services for components such as Simple Mail Transfer Protocol (SMTP), message transfer agent (MTA), and the Exchange store. Client requests use the DSProxy service for directory access.
Dynamic Distribution List
A collection of recipients, based on a Lightweight Directory Access Protocol (LDAP) query that an e-mail message can be sent to.
Error Code Lookup
A tool that can help to determine error values from decimal and hexadecimal error codes in Microsoft Windows operating systems. All values on the command line, as well as any associated information, are in internal tables in Exchange.
event
Any significant occurrence in the system or in an application that requires users to be notified, or an entry to be added to a log.
Exchange ActiveSync
A Microsoft program that manages synchronization of information, including e-mail, schedules, and application files, between a handheld PC and a desktop computer.
Exchange Profile Update
A tool that can be used to update Outlook profiles after mailboxes have been moved across Exchange organizations or administrative groups. The tool modifies the default Outlook profile so that users can successfully log on to their mailboxes after the move. As a result, users can continue to use the same profile after a cross-administrative group or cross-organizational move.
Exchange Stress and Performance 2003
A tool that you can use to simulate a large number of client sessions by concurrently accessing one or more protocol servers. ESP 2003 includes multiple modules that you can use to simulate several protocols and loads.
Exchange-enabled object
An object in Active Directory that has one or more Exchange-specific attributes enabled.
extended permission
A permission that is specific to an object added to the standard Active Directory object schema by Exchange.
extended rights
Rights added by Exchange to Active Directory for controlling access to Exchange objects.
Extensible Storage Engine
Formerly known as JET, Extensible Storage Engine is a method that defines a low-level application programming interface (API) to the underlying database structures in Exchange. Extensible Storage Engine is also used by other databases, such as the Active Directory database.
folder tree
A hierarchy of folders in the Exchange store very similar in structure to the standard file system. A single folder can contain child folders, which, in turn, can contain other child folders.
forest
One or more Active Directory domains that share the same class and attribute definitions (schema), site and replication information (configuration), and forest-wide search capabilities (global catalog). Domains in the same forest are linked with two-way, transitive trust relationships.
ForestPrep
A tool that is used during deployment to extend the Active Directory schema to include Exchange-specific classes and attributes. It creates the container object for the Exchange organization in Active Directory. ForestPrep is included in the Exchange Server Deployment Tools available on the Exchange Server 2003 CD.
FQDN
See definition for: fully qualified domain name
free/busy status
The availability of a person. In addition to free and busy, the status can also be out-of-office (OOF) or tentative.
front-end/back-end architecture
An Exchange configuration where clients access a bank of protocol servers (the front-end) for collaboration information, and then these servers communicate with the data stores on separate servers (the back-end) to retrieve the physical data. A front-end/back-end configuration allows for a scalable, single point of contact for all Exchange-related data.
fully qualified domain name
(FQDN) A Domain Name System (DNS) that has been stated unambiguously to indicate with certainty its location in the domain namespace tree. Fully qualified domain names differ from relative names in that they typically are stated with a trailing period (.), for example, "host.example.microsoft.com.", to qualify their position to the root of the namespace.
G
GAL
See definition for: global address list
global address list
(GAL) A list that contains all Exchange users, contacts, groups, conferencing resources, and public folders in an organization. This list is retrieved from the global catalog servers in Active Directory and is used by Outlook clients to address messages or find information about recipients within the organization.
global catalog
A directory database that applications and clients can query to locate any object in a forest. The global catalog is hosted on one or more domain controllers in the forest. It contains a partial replica of every domain directory partition in the forest. These partial replicas include replicas of every object in the forest, as follows: the attributes most frequently used in search operations and the attributes required to locate a full replica of the object.
globally unique identifier
(GUID) A 16-byte value generated from the unique identifier on a device, the current date and time, and a sequence number. A GUID is used to identify a particular device or component. In Active Directory, GUIDs are automatically generated for every object (for example, user, group, computer, and so on), and that value is guaranteed to never change. In Exchange, the Recipient Update Service automatically generates GUIDs for every mailbox. Also referred to as a Universally Unique Identifier (UUI).
group
A collection of users, groups, and contacts. There are two types of groups: distribution groups and security groups. Distribution groups are used for e-mail only. Security groups are used to grant access to resources.
GUID
See definition for: globally unique identifier
IIS
See definition for: Internet Information Services
inbound recipient filtering
A recipient filter that reduces unsolicited e-mail by filtering inbound information based on the recipient, and applicable only to e-mail messages sent by anonymous authenticated users.
InetOrgPerson
An Active Directory object that is similar to the Windows user object, but has extended attributes to improve compatibility with directory services that use the InetOrgPerson object.
Information Store Viewer
A tool that shows the properties available for each message, how you can use them, and in what format they appear. Use this tool to view or set details about a user's message storage files, which consist of the private information store, the personal file folder, the public store, and the offline file. An example of its use is to determine why a message can be saved but not sent. Also know as MDBVu32.
Internet Information Services
(IIS) The Microsoft Web service for publishing information on an intranet or the Internet, and for building server-based Web applications. Upon installation, Exchange Server 2003 extends the messaging capabilities of IIS and incorporates them into the Exchange message routing architecture.
Internet Key Exchange
A protocol that establishes the security association and shared keys necessary for two parties to communicate with Internet Protocol security (IPSec).
IP address/TCP port combination
A combination of attributes that uniquely identifies Simple Mail Transfer Protocol (SMTP), Network News Transfer Protocol (NNTP), Internet Message Access Protocol (IMAP), and Post Office Protocol (POP) virtual servers in Exchange Server 2003. Virtual servers can share an Internet Protocol (IP) address, provided their TCP ports are different; if they share a TCP port, their IP addresses must be different. The combination must be unique on all virtual servers. This is also true for Hypertext Transfer Protocol (HTTP) virtual servers, except that they have a third unique identifying characteristic: a host name.
Jetstress
A tool that can be used to verify the performance and stability of a disk subsystem before putting an Exchange server into production. Use Performance Monitor, Event Viewer, and Eseutil.exe with Jetstress to verify that your disk subsystem meets or exceeds established performance criteria.
link state information
Information about the state of messaging routes (links) in an Exchange Server 2003 messaging system that is determined using the link state algorithm to quickly and frequently calculate the state of system links for up-to-date status about routes. Exchange 2003 servers use link state information to make the best routing choice at the source rather than sending a message down a path where a downstream link may be unavailable. Choosing the best route at the source eliminates message bounce and looping.
link state table
The database used on each Exchange Server 2003 server to store link state information propagated by the link state algorithm. The link state table is used to evaluate the most suitable route for a message, given cost and availability information.
mailbox store
A database for storing mailboxes in Exchange. Mailbox stores store data that is private to an individual and contain mailbox folders generated when a new mailbox is created for an individual. A mailbox store consists of a rich-text, .edb file, as well as a streaming native Internet content .stm file.
mailbox-enabled
An Active Directory object that has an Exchange mailbox associated with it; therefore it can both send and receive messages within the Exchange system.
mail-enabled
An Active Directory object that has at least one e-mail address defined. If the user is mail-enabled, the user has an associated e-mail address, but does not have an associated Exchange mailbox.
MAPI
See definition for: Messaging Application Programming Interface
MAPI profiles
The set of MAPI configuration settings, stored in the registry, that enable MAPI clients, such as Microsoft Outlook®, to connect to various messaging services, such as Exchange.
MDB
See definition for: message database
message database
(MDB) An instance of a database implemented in Exchange. A single MDB is identified as a mailbox store or public folder store, depending on the type of data that it stores.
message transfer agent
(MTA) An Exchange component that routes messages to other Exchange MTAs, information stores, connectors, and third-party gateways. Also referred to as X.400 protocol in Exchange System Manager.
Messaging Application Programming Interface
(MAPI) The application programming interface (API) for which Active Directory provides support for backward compatibility with Microsoft Exchange applications. New applications should use Active Directory Service Interfaces (ADSI) for accessing Active Directory.
metabase
A store that contains metadata, such as that used by Internet Information Services (IIS). The metabase can be viewed through a tool such as MetaEdit.
metabase update service
A component in Exchange Server 2003 that reads data from Active Directory and transposes it into the local Internet Information Services (IIS) metabase. The metabase update service enables the administrator to make remote configuration changes to virtual servers without a permanent connection to each system.
Microsoft Management Console
(MMC) A management display framework that hosts administration tools and applications. Using MMC, you can create, save, and open collections of tools and applications. Saved collections of tools and applications are called consoles.
migration
The process of moving an existing messaging system to another system by copying the existing mailboxes, messages, and other data, and importing that information into a new messaging system.
mixed mode
The default operating mode of Exchange when it is installed. Mixed mode allows Exchange 2003 and Exchange 2000 servers and servers running earlier versions of Exchange to coexist in the same organization. Mixed mode allows interoperability between versions by limiting functionality to features that are shared by both products.
mixed-mode site
An Exchange 5.x site that also contains Exchange 2003 or Exchange 2000 servers.
MMC
See definition for: Microsoft Management Console
MTA
See definition for: message transfer agent
MTA Check
A command line tool that can be used to check the message transfer agent (MTA) database consistency of Exchange MTA, and to repair the MTA database if necessary.
namespace
A logical collection of properties in an Exchange store schema. A namespace serves to group related properties together for easy property discovery and, more importantly, to keep the property names unique. A Domain Name System (DNS) name creates a namespace; for example, microsoft.com.
native mode
An operating mode of Exchange Server 2003 when the Exchange organization consists of only Exchange 2003 or Exchange 2000 servers. Servers running Exchange 5.5 and earlier versions cannot join an organization running in native mode.
NDR
See definition for: non-delivery report
non-delivery report
(NDR) A notice that a message was not delivered to the recipient.
object
An entity such as a file, folder, shared folder, printer, or Active Directory object, described by a distinct, named set of attributes. For example, the attributes of a File object include its name, location, and size: the attributes of an Active Directory User object might include the user's first name, last name, and e-mail address.
offline address list
A collection of address lists available to Exchange Server 2003 users either when they are working offline, or when they are working remotely over a dial-up connection. Exchange administrators can choose which address lists are available for their users who work offline.
Organizational Forms Library
A system folder on an Exchange computer that stores forms commonly accessed by users within an organization. These forms are available to all Exchange users.
Outlook Web Access
Outlook Web Access for Exchange Server 2003 provides users access to e-mail, personal calendars, group scheduling, contacts, and collaboration applications using a Web browser. It can be used for UNIX and Macintosh users, users without access to an Outlook client, or users connecting from the Internet. Outlook Web Access offers cross-platform client access for roaming users, users with limited hardware resources, and users who do not have access to their own computers.
PAB
See definition for: Personal Address Book
PDL
See definition for: personal distribution list
permission
Authorization for a user to perform an action, such as sending e-mail for another user or posting items in a public folder.
Personal Address Book
(PAB) A customizable address list in which a user can add and delete names of users and personal distribution lists to which messages frequently are addressed. A user can either create the entries or copy them from another address list. Personal Address Book files have a .pab file extension and can be copied easily to a disk.
personal distribution list
(PDL) A distribution list that a user creates and adds to their Personal Address Book (PDL) A distribution list is a name assigned to a group of recipients. When a user addresses a message or form to a PDL, each user in the list receives the message. The administrator creates and maintains distribution lists in the global address list; users create and maintain their PDLs.
policy
A collection of configuration settings that are applied to one or more Exchange configuration objects. Policies simplify the administration of Exchange. You can define a policy that controls the configuration of some, or of all settings across a server or other objects in an Exchange organization. After policies are defined and implemented, editing the policy and then applying it changes the configuration of all servers and objects covered by the policy.
privilege
A user's right to perform a specific task, usually one that affects an entire computer system rather than a particular object. Privileges are assigned by administrators to individual users or groups of users as part of the security settings for the computer.
profile
A set of information services used to configure the Microsoft Exchange client and other messaging applications. These services provide a variety of functions, such as access to mailbox address lists, sets of folders, and other features. Typically a user needs only one profile. A user who works occasionally with a different configuration may need to create an additional profile.
protocol
A set of rules and conventions for sending information over a network. These rules govern the content, format, timing, sequencing, and error control of messages exchanged among network devices.
proxy server
A firewall component that manages Internet traffic to and from a local area network (LAN) and that can provide other features, such as document caching and access control. A proxy server can improve performance by supplying frequently requested data, such as a popular Web page, and it can filter and discard requests that the owner does not consider appropriate, such as requests for unauthorized access to proprietary files.
public folder
A folder that coworkers can use to share a wide range of information, such as project and work information, discussions about a general subject, and classified ads. Access permissions determine who can view and use the folder. Public folders are stored on computers running Exchange.
public folder hierarchy
A tree or hierarchy of public folders with a single public folder store.
public folder replication
The process of keeping copies of public folders on other servers up-to-date and synchronized with each other.
public folder store
The part of the Exchange store that maintains information in public folders. A public folder store consists of a rich-text .edb file, as well as a streaming native Internet content .stm file.
query-based distribution group
A distribution group that uses a Lightweight Directory Access Protocol (LDAP) query to derive its membership at the time the message is sent. For example, a query-based distribution group might specify an LDAP query such as "Users homed on Exchange server X." When someone sends a message to this query-based distribution group, Exchange executes the associated LDAP query against Active Directory directory service, returns a list of all users currently homed on Exchange server X, and sends the message to that list of users.
real-time block list
A database of Internet Protocol (IP) addresses of sources that have been verified as being unsolicited commercial e-mail (also known as spam). E-mail messages from certain e-mail addresses or domains can be blocked by adding the sender to your Blocked Sender list in Microsoft® Office Outlook®.
recipient
An Active Directory object that is mail-enabled, mailbox-enabled, or that can receive e-mail messages. A recipient is an object within Active Directory that can take advantage of Exchange functionality.
recipient policy
A policy that is applied to mail-enabled objects to generate e-mail addresses. Recipient policies can be defined to apply to thousands of users, groups, and contacts in Microsoft Active Directory by using a Lightweight Directory Access Protocol (LDAP) query interface in a single operation.
Recipient Update Service
An Exchange Server 2003 service that updates the recipient objects within a domain with specific types of information. You can schedule appropriate intervals to update the recipient objects. For example, this service updates recipient objects with address list membership and e-mail addresses at intervals scheduled by the administrator.
relay host
See definition for: smart host
remote procedure call
(RPC) A message-passing facility that allows a distributed application to call services that are available on various computers on a network. Used during remote administration of computers.
replicas
A copy of a public folder that contains all of the folder's contents, permissions, and design elements, such as forms behavior and views. Replicas are useful for distributing user load on servers, distributing public folders geographically, and for backing up public folder data.
resource
Anything placed in the Exchange store. A resource can be an e-mail message, an appointment, another folder, a Web page, or any structured document, such as a Microsoft Excel spreadsheet.
reverse proxy server
A reverse proxy server is similar to a regular proxy server used for outbound network traffic except that it relays connection requests for inbound network traffic.
routing group
A collection of Exchange servers that have full-time, reliable connections. Messages sent between any two servers within a routing group go directly from source to destination. Routing groups are optional and are not visible in Exchange System Manager unless they are enabled.
routing service
An Exchange component that builds link state tables.
RPC
See definition for: remote procedure call
security context
The security attributes or rules that are currently in effect. For example, the rules that govern what a user can do to a protected object are determined by security information in the user's access token and in the object's security descriptor. Together, the access token and the security descriptor form a security context for the user's actions on the object.
security descriptor
A data structure that contains security information associated with a protected object. Security descriptors include information about who owns the object, who can access it, and in what way, and what types of access are audited.
server cluster
A group of computers, known as nodes, that work together as a single system to ensure that mission-critical applications and resources remain available to clients. A server cluster presents the appearance of a single server to a client.
service account
A Windows Server 2003 or Windows 2000 user account that is used to run some Exchange services.
Simple Mail Transfer Protocol
(SMTP) A member of the TCP/IP suite of protocols that governs the exchange of electronic mail between message transfer agents (MTA). SMTP is the default transport for Exchange Server 2003.
Site Replication Service
(SRS) A directory service (similar to the directory used in Exchange Server 5.x) implemented in Exchange 2000 Server to enable the integration with downstream Exchange 5.x sites that use both remote procedure call (RPC) and mail-based replication. SRS works with Active Directory Connector (ADC) to provide replication services from Active Directory to the Exchange 5.x Directory Service.
smart host
A designated server through which Exchange routes all outgoing messages. The smart host then makes the remote connection. If a smart host is designated, the Exchange server only needs to transmit to the smart host, instead of repeatedly contacting the domain until a connection is made. Also known as a relay host.
SMTP
See definition for: Simple Mail Transfer Protocol
snap-in
A type of tool that you can add to a console supported by Microsoft Management Console (MMC). A standalone snap-in can be added by itself; an extension snap-in can be added only to extend the function of another snap-in. A snap-in is used to manage services for a component or product. Exchange System Manager is an example of an MMC snap-in.
SRS
See definition for: Site Replication Service
storage group
A collection of mailbox stores and public folder stores that share a set of transaction log files. Exchange manages each storage group with a separate server process.
system attendant
A core maintenance service included with Exchange.
system policies
Policies that apply to server-side objects, such as mailbox stores, public folder stores, and servers.
trust relationship
A logical relationship established between domains to allow pass-through authentication, in which a trusting domain honors the logon authentications of a trusted domain. User accounts and global groups defined in a trusted domain can be given rights and permissions in a trusting domain, even though the user accounts or groups do not exist in the trusting domain's directory.
Universally Unique Identifier
See definition for: globally unique identifier
Volume Shadow Copy service
A service implemented in Windows Server 2003 and supported by Exchange Server 2003. With this service, a mirrored copy of the database exists at any time and can be used for purposes of restore, thereby providing near-instantaneous backup and restore.
W
WAP
See definition for: Wireless Application Protocol
Web Distributed Authoring and Versioning
(WebDAV) An extension of Hypertext Transfer Protocol (HTTP) 1.1 that allows clients to perform remote Web content authoring. Content that is stored on a server can be accessed by a client through HTTP by using WebDAV extensions. The client can perform tasks provided by HTTP, including reading e-mail and documents. If the client also supports WebDAV, the client can manipulate mail, change calendar appointments, modify and create new documents on the Exchange server, and create Web-based forms. WebDAV uses Extensible Markup Language (XML) as the format for transmitting data elements.
WebDAV
See definition for: Web Distributed Authoring and Versioning
Wireless Application Protocol
(WAP) An open, global specification that enables wireless devices to access and interact with information and services.
Wireless Application Protocol (WAP) gateway
A server or set of servers at the carrier that processes wireless-formatted data into Internet-standard formats.
X.400 connector
An Exchange component that is integrated with the message transfer agent (MTA) and can be configured to connect routing groups within Exchange, or to route messages to other X.400 systems. When handling communication between Exchange and other X.400 systems, it maps addresses and converts Exchange messages to native X.400 messages and vice versa.
Nice post good going ji
ReplyDeletevisit my sites its a very nice Site and link forward 2 all friends
http://www.discobhangra.com/shayari/
its a bollywood masla
http://www.discobhangra.com/recipes/
recipes is here
http://www.technewstime.com/
its a tech software and hardware news site
Visit plz
enjoy every time