Share via


End-to-End Scenario Tasks

Getting Started with Outlook on the Web Use this checklist to track your work to configure specific end-to-end scenarios after you install Exchange Server 2010. The tasks in this topic are optional for configuring features.

For information about other optional post-installation configuration tasks that aren't listed in this topic, but are recommended after you install Exchange 2010, see Additional Post-Installation Tasks.

For guidance about required tasks that you must perform after installing Exchange 2010, see Finalize Deployment Tasks.

All Server Roles

Done? Task

 

Configure monitoring for your Exchange servers. For more information, see Monitoring Exchange 2010.

Mailbox Server Role

Done? Task

 

Configure messaging records management (MRM). For more information, see Messaging Records Management.

Client Access Server Role

Done? Task

 

Configure Microsoft Outlook Anywhere to provide access to Exchange using Office Outlook 2007 or Outlook 2010 clients from outside the corporate network. For more information, see Managing Outlook Anywhere.

 

Verify that AutoDiscover is enabled and configured correctly. For more information, see Managing the Autodiscover Service.

Hub Transport Server Role

Done? Task

 

Replicate safelist aggregation data. For more information, see Configure Safelist Aggregation.

Unified Messaging Server Role

Done? Task

 

Enable outdialing. For more information, see Understanding Outdialing.

 

Enable mutual-TLS between IP gateways or IP PBXs and an Exchange Unified Messaging (UM) server. For more information, see Understanding Unified Messaging VoIP Security.

 

Create and configure a UM auto attendant. For more information, see Create a UM Auto Attendant.

Edge Transport Server Role

Done? Task

 

Enable the Microsoft Exchange Anti-spam Update Service. For more information, see Configure Anti-Spam Automatic Updates.

 

Configure the list of internal SMTP servers. For more information, see Set-TransportConfig.

 

Replicate safelist aggregation data. For more information, see Configure Safelist Aggregation.Understanding Safelist Aggregation