Go Premium for a chance to win a PS4. Enter to Win


Exchange 2010 transition steps

Posted on 2010-08-29
Medium Priority
Last Modified: 2012-06-27
I am about to transition a 2003 exchange organisation to  Exchange 2010 with a period of coexistence and would like to ensure I have the steps right. Here is a high level step by step overview I have planned (assume I know how to perform each step).

Have I missed a step or is there anything anyone would like to add.

Scenario overview

Small Company approx 100 mailboxes so am installing CAS Hub and Mailbox onto 1 server (no edge transport yet) Company uses company.local for internal and company.com for external

Steps (High Level)

1.      Provision 64bit VM (assume installed all pre reqs and updates) and add to AD
2.      Prepare AD for exchange 2010 with coexistence (legacypermissions)
3.      Install Exchange 2010 (3 roles as above)
4.      Replicate Public Folders to Exchange 2010 Box
5.      Obtain SAN Certificate with following
a.      Legacy.company.com
b.      Autodiscover.company.com
c.      Mail.company.com
d.      Servername.company.local
6.      Install certificate to exchange 2010 box
7.      Assign IIS Service to new certificate
8.      Export and import certificate to 2003 box
9.      Configure Web Services
a.      Offline Address Book Generation
b.      Configure OWA for use with Exchange 2003
c.      Configure/ check settings on Virtual Directories
d.      Configure Active Sync Authentication
10.       Move databases from default to new locations as per my storage plan
11.       Move mailboxes from 2003 to 2010
12.       Create Send connector and configure
13.       Delete SMTP Connector from Exchange 2003 (uses smarthost to add disclaimer)
14.       Create receive connector and configure
15.       Perform address list conversion for recipient policies

I think I have covered everything
Question by:PACSAdmin
  • 3
  • 2

Expert Comment

ID: 33555817
Hi PACSAdmin,

Here is the definitive process from the horses mouth (the Exchange product team blog): http://msexchangeteam.com/archive/2009/11/20/453272.aspx

Author Comment

ID: 33555926
Like most of the articles i have read it only covers part of the picture. I just want someone to confirm if there is any blatently obvious ommisions in my high level steps above.

Thanks for the input anyway

Accepted Solution

craig_j_Lawrence earned 2000 total points
ID: 33555963
I have had another read of your list, other explicity calling out configuring autodiscover (assume you would cover that off in the 'configure web services' step). all looks good

For a real world how to, take a look at the following article: http://msexchangegeek.com/2010/01/30/rapid-transition-guide-from-exchange-2003-to-exchange-2010/, it even includes check lists.

One of the only difficulties I found was having to disable Forms based authentication on the Exchange 2003 server, and remembering to change the certificate over as well.



Author Comment

ID: 33556065
That last link is gold.

Has exactly what i need without doing the coexistance thing.


Author Closing Comment

ID: 33556072

Featured Post

Creating Active Directory Users from a Text File

If your organization has a need to mass-create AD user accounts, watch this video to see how its done without the need for scripting or other unnecessary complexities.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

As much as Microsoft wants to kill off PST file support, just as they tried to do with public folders, there are still times when it is useful or downright necessary to export Exchange mailboxes to PST files. Thankfully, it is still possible to e…
Transferring FSMO roles is done when an admin wants to split roles between certain Domain Controllers or the Domain Controller holding the Roles has been forcefully demoted using dcpromo / forceremoval
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.
Suggested Courses

926 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question