End-to-End Scenario Tasks
Use this checklist to track your work to configure specific end-to-end scenarios after you install Exchange Server 2010. The tasks in this topic are optional for configuring features.
For information about other optional post-installation configuration tasks that aren't listed in this topic, but are recommended after you install Exchange 2010, see Additional Post-Installation Tasks.
For guidance about required tasks that you must perform after installing Exchange 2010, see Finalize Deployment Tasks.
All Server Roles
Done? | Task |
---|---|
|
Configure monitoring for your Exchange servers. For more information, see Monitoring Exchange 2010. |
Mailbox Server Role
Done? | Task |
---|---|
|
Configure messaging records management (MRM). For more information, see Messaging Records Management. |
Client Access Server Role
Done? | Task |
---|---|
|
Configure Microsoft Outlook Anywhere to provide access to Exchange using Office Outlook 2007 or Outlook 2010 clients from outside the corporate network. For more information, see Managing Outlook Anywhere. |
|
Verify that AutoDiscover is enabled and configured correctly. For more information, see Managing the Autodiscover Service. |
Hub Transport Server Role
Done? | Task |
---|---|
|
Replicate safelist aggregation data. For more information, see Configure Safelist Aggregation. |
Unified Messaging Server Role
Done? | Task |
---|---|
|
Enable outdialing. For more information, see Understanding Outdialing. |
|
Enable mutual-TLS between IP gateways or IP PBXs and an Exchange Unified Messaging (UM) server. For more information, see Understanding Unified Messaging VoIP Security. |
|
Create and configure a UM auto attendant. For more information, see Create a UM Auto Attendant. |
Edge Transport Server Role
Done? | Task |
---|---|
|
Enable the Microsoft Exchange Anti-spam Update Service. For more information, see Configure Anti-Spam Automatic Updates. |
|
Configure the list of internal SMTP servers. For more information, see Set-TransportConfig. |
|
Replicate safelist aggregation data. For more information, see Configure Safelist Aggregation.Understanding Safelist Aggregation |