I'm considering migrating to Exchange Server 2013. I understand that the Exchange server role structure has changed...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
to the point that now, only the client access server and mailbox server roles are left. I've done a bit of research and am curious to see if Exchange 2013 actually needs an edge transport server. Can you please advise?
You're right in that Microsoft simplified the concept of server roles in Exchange Server 2013. Where Exchange 2007 and Exchange 2010 had five server roles -- the client access server (CAS), unified messaging server, hub transport server, mailbox server and edge transport server -- Exchange Server 2013 only has two: the client access server role and the mailbox server role.
As you know, the edge transport server helps protect an Exchange organization from viruses and spam, so I can see why you're wary about Exchange 2013 lacking an edge. Depending on your configuration, you may still need to provide edge security to your Exchange 2013 deployment. It all depends on if your deployment consists solely of Exchange 2013 servers, or if you still plan on having Exchange 2007 or Exchange 2010 servers in your organization.
If you're planning on a pure Exchange 2013 deployment, external email enters the Exchange organization through a CAS. The CAS does preliminary filtering -- which was previously handled by the edge -- before routing the message to the transport service, which now runs on mailbox servers.
About the author
Brien Posey is a ten-time Microsoft MVP with two decades of IT experience. Before becoming a freelance technical writer, Brien worked as a chief information officer at a national chain of hospitals and health care facilities. He has also served as a network administrator for some of the nation's largest insurance companies and for the Department of Defense at Fort Knox.
Dig Deeper on Exchange Server Deployment and Migration Advice
Related Q&A from Brien Posey
Cloud-based backups can be secured via a variety of methods. Backup software and erasure coding may be just what is needed to improve your ...continue reading
Explore details regarding the growth of DR monitoring software from a focus on configuration validation to today's automated and more comprehensive ...continue reading
Through disk-based backup, continuous data protection enables backups to take place more often. Discover how to repair the technology's cost and ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.