SlideShare ist ein Scribd-Unternehmen logo
1 von 41
Downloaden Sie, um offline zu lesen
Module 2 Configuring Mailbox Servers
Module Overview ,[object Object],[object Object],[object Object]
Lesson 1: Overview of Exchange Server 2010 Administrative Tools ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Demonstration: What Is the Exchange Management Console? ,[object Object]
Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
What Are the Exchange Management Shell and Windows PowerShell? ,[object Object],[object Object],[object Object],[object Object],[object Object]
The Benefits of Remote Windows PowerShell  Remote Windows PowerShell 2.0 enables: ,[object Object],[object Object],[object Object]
Exchange Management Shell Cmdlets All Exchange Management Shell cmdlets use the same syntax Cmdlets can be pipelined to other cmdlets: ,[object Object],[object Object],Verb Noun Parameters Example Get User Get-User Get User -Identify -ExternalEmailAddress Enable-Mailuser –Identify Tom – ExternalEmailAddress [email_address]
Demonstration: Working with the Exchange Management Shell ,[object Object],[object Object],[object Object],[object Object]
Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
Exchange Management Shell Examples Get-User | Where-Object {$_.distinguishedname –ilike "*ou=sales,dc=contoso,dc=com"} | Enable-Mailbox  –database “Mailbox Database 1" Get-DistributionGroup "RemoteUsers" | Get-DistributionGroupMember | Set-Mailbox –MaxReceiveSize 10MB Get-Mailbox –server NYC-EX1 | New-MoveRequest –Local –targetDatabase “Mailbox Database 2" Get-Message -Filter {FromAddress -like "Tom*"} | Remove-Message Get-MailboxDatabaseCopyStatus
Introducing the Exchange Control Panel ECP provides Web-based user access to self-manage: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Lesson 2: Configuring Mailbox Server Roles ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Initial Mailbox Configuration Tasks The initial Mailbox server role tasks are: Secure the server  Configure public folders  Create and configure databases  Configure the offline address book  Configure recipients 
Demonstration: How to Configure Mailbox Server Role Configuration Options   ,[object Object]
What Are Mailbox and Public Folder Databases? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What Are the Database File Types? A database consists of a collection of file types, each of which performs a different function File Type Purpose <Log Prefix>.chk Checkpoint file <Log Prefix>.log Current transaction log file <Log Prefix>xxxxxxxx.log Transaction log file that was already renamed and filed <Log Prefix>res00001.jrs Reserved transaction logs <Log Prefix>res00002.jrs Reserved transaction logs Tmp.edb Temporary workspace for processing transactions <Log Prefix>tmp.log Transaction log file for the temporary workspace <File Name>.edb Rich text database files that stores content for mailbox and public folder databases
Mailbox Database Update Process Receive message 1 Write message 2 3 Write to DB 4 Update 5 Client access
Demonstration: Configuring Database Options ,[object Object],[object Object],[object Object],[object Object]
Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
Exchange Server 2010 Storage Improvements ,[object Object],Make sure your storage solution meets: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Options for Database Storage RAID options: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Disk storage options: ,[object Object],[object Object],[object Object]
Data Storage Options: Direct Attached Storage ,[object Object],Direct Attached Storage ,[object Object],[object Object],[object Object]
Data Storage Options: Storage Area Networks Storage Area Network Benefits of storage area networks are: ,[object Object],[object Object],[object Object],[object Object],SAN
Demonstration: How to Manage Mailbox Size Limits ,[object Object],[object Object],[object Object],[object Object]
Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
Discussion: Considerations for Implementing Databases ,[object Object],[object Object],[object Object],[object Object]
Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
Lesson 3: Configuring Public Folders ,[object Object],[object Object],[object Object],[object Object],[object Object]
What Are Public Folders? A public folder is a repository for different information types All Public Folders Public Folders Internet Newsgroups HR Business Handbook Personnel Forms Marketing Products Public folder tree
Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
Configuring Public Folder Replication The messaging administrator controls the destination frequency of the folder   Service Replication Component AD DS and Active Directory Public folder directory objects Microsoft Exchange Information Store service Public folder trees Public folder contents
How Clients Access Public Folders Server 5 Server 4 Site Z Site Y Site X Site W Cost=10 User Server 1 Server 2 Server 3 Cost=30 Cost=50 Public Folder Server Server 1 Server 2 Server 3 Server 4 Server 5 Connector Cost N/A N/A N/A N/A Site Link A 10 Site Link C 30 Site Link B 50
Demonstration: How to Configure Public Folders ,[object Object],[object Object],[object Object],[object Object]
Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
When to Use SharePoint Instead of Public Folders Scenario Using Public Folders? New to Public Folders? Document Sharing SharePoint may be a better option SharePoint is a better option Calendar Sharing No need to move Use either Contact Sharing No need to move Use either Discussion Forum No need to move Use either Distribution Group Archive No need to move Use either Custom Applications SharePoint may be a better option SharePoint may be a better option Organizational Forms No need to move Use InfoPath
Lab: Configuring Mailbox Servers ,[object Object],[object Object],Logon information Estimated time:  45  minutes Virtual machines 10135A-VAN-DC1 10135A-VAN-EX1 10135A-VAN-EX3 User name Administrator   Password Pa$$w0rd
Lab Scenario ,[object Object]
Lab Review ,[object Object],[object Object]
Module Review and Takeaways ,[object Object],[object Object],[object Object],[object Object],[object Object]
Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.

Weitere ähnliche Inhalte

Was ist angesagt?

JMP105 - "How Stuff Works" - Domino Style!
JMP105 - "How Stuff Works" - Domino Style!JMP105 - "How Stuff Works" - Domino Style!
JMP105 - "How Stuff Works" - Domino Style!NerdGirlJess
 
Red Gate Exchange E Book
Red Gate Exchange E BookRed Gate Exchange E Book
Red Gate Exchange E BookLiquidHub
 
Exchange 2010 High Availability And Storage
Exchange 2010 High Availability And StorageExchange 2010 High Availability And Storage
Exchange 2010 High Availability And StorageHarold Wong
 
Windows Server 2008 R2 Active Directory ADFS Claims Base Identity for Windows...
Windows Server 2008 R2 Active Directory ADFS Claims Base Identity for Windows...Windows Server 2008 R2 Active Directory ADFS Claims Base Identity for Windows...
Windows Server 2008 R2 Active Directory ADFS Claims Base Identity for Windows...Tũi Wichets
 
Compact, Compress, De-Duplicate (DAOS)
Compact, Compress, De-Duplicate (DAOS)Compact, Compress, De-Duplicate (DAOS)
Compact, Compress, De-Duplicate (DAOS)Ulrich Krause
 
BP108 Admin for the Developer -- Build and Secure Your Own IBM Lotus Domino S...
BP108 Admin for the Developer -- Build and Secure Your Own IBM Lotus Domino S...BP108 Admin for the Developer -- Build and Secure Your Own IBM Lotus Domino S...
BP108 Admin for the Developer -- Build and Secure Your Own IBM Lotus Domino S...NerdGirlJess
 
10135 a 01
10135 a 0110135 a 01
10135 a 01Bố Su
 
New Features Lotus Domino Administration 8.5
New Features Lotus Domino Administration 8.5New Features Lotus Domino Administration 8.5
New Features Lotus Domino Administration 8.5Rolf Kremer
 
Inform2015 - What's New in Domino 9 & 9.0.1 for Admins
Inform2015 - What's New in Domino 9 & 9.0.1 for AdminsInform2015 - What's New in Domino 9 & 9.0.1 for Admins
Inform2015 - What's New in Domino 9 & 9.0.1 for AdminsJared Roberts
 
A Guide to your Tagadab Shared Hosting Control Panel
A Guide to your Tagadab Shared Hosting Control PanelA Guide to your Tagadab Shared Hosting Control Panel
A Guide to your Tagadab Shared Hosting Control Panelwebhostingguy
 
Open writing-cloud-collab
Open writing-cloud-collabOpen writing-cloud-collab
Open writing-cloud-collabKaren Vuong
 
Open Writing! Collaborative Authoring for CloudStack Documentation by Jessica...
Open Writing! Collaborative Authoring for CloudStack Documentation by Jessica...Open Writing! Collaborative Authoring for CloudStack Documentation by Jessica...
Open Writing! Collaborative Authoring for CloudStack Documentation by Jessica...buildacloud
 
Windows server 2012 R2 private cloud virtualization and storage
Windows server 2012 R2 private cloud virtualization and storageWindows server 2012 R2 private cloud virtualization and storage
Windows server 2012 R2 private cloud virtualization and storageSathishkumar A
 

Was ist angesagt? (18)

JMP105 - "How Stuff Works" - Domino Style!
JMP105 - "How Stuff Works" - Domino Style!JMP105 - "How Stuff Works" - Domino Style!
JMP105 - "How Stuff Works" - Domino Style!
 
Red Gate Exchange E Book
Red Gate Exchange E BookRed Gate Exchange E Book
Red Gate Exchange E Book
 
Exchange 2010 High Availability And Storage
Exchange 2010 High Availability And StorageExchange 2010 High Availability And Storage
Exchange 2010 High Availability And Storage
 
Windows Server 2008 R2 Active Directory ADFS Claims Base Identity for Windows...
Windows Server 2008 R2 Active Directory ADFS Claims Base Identity for Windows...Windows Server 2008 R2 Active Directory ADFS Claims Base Identity for Windows...
Windows Server 2008 R2 Active Directory ADFS Claims Base Identity for Windows...
 
Compact, Compress, De-Duplicate (DAOS)
Compact, Compress, De-Duplicate (DAOS)Compact, Compress, De-Duplicate (DAOS)
Compact, Compress, De-Duplicate (DAOS)
 
BP108 Admin for the Developer -- Build and Secure Your Own IBM Lotus Domino S...
BP108 Admin for the Developer -- Build and Secure Your Own IBM Lotus Domino S...BP108 Admin for the Developer -- Build and Secure Your Own IBM Lotus Domino S...
BP108 Admin for the Developer -- Build and Secure Your Own IBM Lotus Domino S...
 
10135 b 08
10135 b 0810135 b 08
10135 b 08
 
10135 a 01
10135 a 0110135 a 01
10135 a 01
 
New Features Lotus Domino Administration 8.5
New Features Lotus Domino Administration 8.5New Features Lotus Domino Administration 8.5
New Features Lotus Domino Administration 8.5
 
Adminblast 2013
Adminblast 2013Adminblast 2013
Adminblast 2013
 
Inform2015 - What's New in Domino 9 & 9.0.1 for Admins
Inform2015 - What's New in Domino 9 & 9.0.1 for AdminsInform2015 - What's New in Domino 9 & 9.0.1 for Admins
Inform2015 - What's New in Domino 9 & 9.0.1 for Admins
 
A Guide to your Tagadab Shared Hosting Control Panel
A Guide to your Tagadab Shared Hosting Control PanelA Guide to your Tagadab Shared Hosting Control Panel
A Guide to your Tagadab Shared Hosting Control Panel
 
Daos
DaosDaos
Daos
 
1
11
1
 
Open writing-cloud-collab
Open writing-cloud-collabOpen writing-cloud-collab
Open writing-cloud-collab
 
Open Writing! Collaborative Authoring for CloudStack Documentation by Jessica...
Open Writing! Collaborative Authoring for CloudStack Documentation by Jessica...Open Writing! Collaborative Authoring for CloudStack Documentation by Jessica...
Open Writing! Collaborative Authoring for CloudStack Documentation by Jessica...
 
Scaling your website
Scaling your websiteScaling your website
Scaling your website
 
Windows server 2012 R2 private cloud virtualization and storage
Windows server 2012 R2 private cloud virtualization and storageWindows server 2012 R2 private cloud virtualization and storage
Windows server 2012 R2 private cloud virtualization and storage
 

Ähnlich wie Configure Exchange Mailbox Servers

24 Hours Of Exchange Server 2007 (Part 7 Of 24)
24 Hours Of Exchange Server 2007 (Part 7 Of 24)24 Hours Of Exchange Server 2007 (Part 7 Of 24)
24 Hours Of Exchange Server 2007 (Part 7 Of 24)Harold Wong
 
24 Hours Of Exchange Server 2007 ( Part 7 Of 24)
24  Hours Of  Exchange  Server 2007 ( Part 7 Of 24)24  Hours Of  Exchange  Server 2007 ( Part 7 Of 24)
24 Hours Of Exchange Server 2007 ( Part 7 Of 24)guestef2a2b
 
10135 a 07
10135 a 0710135 a 07
10135 a 07Bố Su
 
Exchang Server 2013 chapter 2
Exchang Server 2013 chapter 2Exchang Server 2013 chapter 2
Exchang Server 2013 chapter 2Osama Mohammed
 
Deploying DAOS and ID Vault
Deploying DAOS and ID VaultDeploying DAOS and ID Vault
Deploying DAOS and ID VaultLuis Guirigay
 
Corporate-informatica-training-in-mumbai
Corporate-informatica-training-in-mumbaiCorporate-informatica-training-in-mumbai
Corporate-informatica-training-in-mumbaiUnmesh Baile
 
Corporate-informatica-training-in-mumbai
Corporate-informatica-training-in-mumbaiCorporate-informatica-training-in-mumbai
Corporate-informatica-training-in-mumbaiUnmesh Baile
 
Sql And Storage Considerations For Share Point Server 2010
Sql And Storage Considerations For Share Point Server 2010Sql And Storage Considerations For Share Point Server 2010
Sql And Storage Considerations For Share Point Server 2010Mike Watson
 
24 Hours Of Exchange Server 2007 (Part 8 Of 24)
24 Hours Of Exchange Server 2007 (Part 8 Of 24)24 Hours Of Exchange Server 2007 (Part 8 Of 24)
24 Hours Of Exchange Server 2007 (Part 8 Of 24)Harold Wong
 
Developing a Struts & Tiles application using WebSphere Studio
Developing a Struts & Tiles application using WebSphere StudioDeveloping a Struts & Tiles application using WebSphere Studio
Developing a Struts & Tiles application using WebSphere Studioelliando dias
 
Solve Todays Problems with 10 New SharePoint 2010 Features
Solve Todays Problems with 10 New SharePoint 2010 FeaturesSolve Todays Problems with 10 New SharePoint 2010 Features
Solve Todays Problems with 10 New SharePoint 2010 FeaturesCory Peters
 
Building the Perfect SharePoint 2010 Farm - SharePoint Saturday NYC 2011
Building the Perfect SharePoint 2010 Farm - SharePoint Saturday NYC 2011Building the Perfect SharePoint 2010 Farm - SharePoint Saturday NYC 2011
Building the Perfect SharePoint 2010 Farm - SharePoint Saturday NYC 2011Michael Noel
 
Managing SQLserver for the reluctant DBA
Managing SQLserver for the reluctant DBAManaging SQLserver for the reluctant DBA
Managing SQLserver for the reluctant DBAConcentrated Technology
 
1-informatica-training
1-informatica-training1-informatica-training
1-informatica-trainingKrishna Sujeer
 
Microsoft Azure, door Rob Brommer op de 4DotNet Developers Day
Microsoft Azure, door Rob Brommer op de 4DotNet Developers DayMicrosoft Azure, door Rob Brommer op de 4DotNet Developers Day
Microsoft Azure, door Rob Brommer op de 4DotNet Developers DayHanneke Dotnet
 
Sharepoint designer workflow by quontra us
Sharepoint designer workflow by quontra usSharepoint designer workflow by quontra us
Sharepoint designer workflow by quontra usQUONTRASOLUTIONS
 

Ähnlich wie Configure Exchange Mailbox Servers (20)

24 Hours Of Exchange Server 2007 (Part 7 Of 24)
24 Hours Of Exchange Server 2007 (Part 7 Of 24)24 Hours Of Exchange Server 2007 (Part 7 Of 24)
24 Hours Of Exchange Server 2007 (Part 7 Of 24)
 
24 Hours Of Exchange Server 2007 ( Part 7 Of 24)
24  Hours Of  Exchange  Server 2007 ( Part 7 Of 24)24  Hours Of  Exchange  Server 2007 ( Part 7 Of 24)
24 Hours Of Exchange Server 2007 ( Part 7 Of 24)
 
10135 a 07
10135 a 0710135 a 07
10135 a 07
 
Exchang Server 2013 chapter 2
Exchang Server 2013 chapter 2Exchang Server 2013 chapter 2
Exchang Server 2013 chapter 2
 
Deploying DAOS and ID Vault
Deploying DAOS and ID VaultDeploying DAOS and ID Vault
Deploying DAOS and ID Vault
 
Lotus Domino 8.5
Lotus Domino 8.5Lotus Domino 8.5
Lotus Domino 8.5
 
Corporate-informatica-training-in-mumbai
Corporate-informatica-training-in-mumbaiCorporate-informatica-training-in-mumbai
Corporate-informatica-training-in-mumbai
 
Corporate-informatica-training-in-mumbai
Corporate-informatica-training-in-mumbaiCorporate-informatica-training-in-mumbai
Corporate-informatica-training-in-mumbai
 
Sqllite
SqlliteSqllite
Sqllite
 
Informatica training
Informatica trainingInformatica training
Informatica training
 
Managing SQLserver
Managing SQLserverManaging SQLserver
Managing SQLserver
 
Sql And Storage Considerations For Share Point Server 2010
Sql And Storage Considerations For Share Point Server 2010Sql And Storage Considerations For Share Point Server 2010
Sql And Storage Considerations For Share Point Server 2010
 
24 Hours Of Exchange Server 2007 (Part 8 Of 24)
24 Hours Of Exchange Server 2007 (Part 8 Of 24)24 Hours Of Exchange Server 2007 (Part 8 Of 24)
24 Hours Of Exchange Server 2007 (Part 8 Of 24)
 
Developing a Struts & Tiles application using WebSphere Studio
Developing a Struts & Tiles application using WebSphere StudioDeveloping a Struts & Tiles application using WebSphere Studio
Developing a Struts & Tiles application using WebSphere Studio
 
Solve Todays Problems with 10 New SharePoint 2010 Features
Solve Todays Problems with 10 New SharePoint 2010 FeaturesSolve Todays Problems with 10 New SharePoint 2010 Features
Solve Todays Problems with 10 New SharePoint 2010 Features
 
Building the Perfect SharePoint 2010 Farm - SharePoint Saturday NYC 2011
Building the Perfect SharePoint 2010 Farm - SharePoint Saturday NYC 2011Building the Perfect SharePoint 2010 Farm - SharePoint Saturday NYC 2011
Building the Perfect SharePoint 2010 Farm - SharePoint Saturday NYC 2011
 
Managing SQLserver for the reluctant DBA
Managing SQLserver for the reluctant DBAManaging SQLserver for the reluctant DBA
Managing SQLserver for the reluctant DBA
 
1-informatica-training
1-informatica-training1-informatica-training
1-informatica-training
 
Microsoft Azure, door Rob Brommer op de 4DotNet Developers Day
Microsoft Azure, door Rob Brommer op de 4DotNet Developers DayMicrosoft Azure, door Rob Brommer op de 4DotNet Developers Day
Microsoft Azure, door Rob Brommer op de 4DotNet Developers Day
 
Sharepoint designer workflow by quontra us
Sharepoint designer workflow by quontra usSharepoint designer workflow by quontra us
Sharepoint designer workflow by quontra us
 

Mehr von Bố Su

10135 a xb
10135 a xb10135 a xb
10135 a xbBố Su
 
10135 a xa
10135 a xa10135 a xa
10135 a xaBố Su
 
10135 a 11
10135 a 1110135 a 11
10135 a 11Bố Su
 
10135 a 10
10135 a 1010135 a 10
10135 a 10Bố Su
 
10135 a 09
10135 a 0910135 a 09
10135 a 09Bố Su
 
10135 a 06
10135 a 0610135 a 06
10135 a 06Bố Su
 
10135 a 05
10135 a 0510135 a 05
10135 a 05Bố Su
 
10135 a 04
10135 a 0410135 a 04
10135 a 04Bố Su
 
10135 a 03
10135 a 0310135 a 03
10135 a 03Bố Su
 
10135 a 00
10135 a 0010135 a 00
10135 a 00Bố Su
 
10135 a 12
10135 a 1210135 a 12
10135 a 12Bố Su
 
50357 a enu-module05
50357 a enu-module0550357 a enu-module05
50357 a enu-module05Bố Su
 
50357 a enu-module03
50357 a enu-module0350357 a enu-module03
50357 a enu-module03Bố Su
 
50357 a enu-module02
50357 a enu-module0250357 a enu-module02
50357 a enu-module02Bố Su
 
50357 a enu-module01
50357 a enu-module0150357 a enu-module01
50357 a enu-module01Bố Su
 
50357 a enu-module00
50357 a enu-module0050357 a enu-module00
50357 a enu-module00Bố Su
 
50357 a enu-module04
50357 a enu-module0450357 a enu-module04
50357 a enu-module04Bố Su
 

Mehr von Bố Su (17)

10135 a xb
10135 a xb10135 a xb
10135 a xb
 
10135 a xa
10135 a xa10135 a xa
10135 a xa
 
10135 a 11
10135 a 1110135 a 11
10135 a 11
 
10135 a 10
10135 a 1010135 a 10
10135 a 10
 
10135 a 09
10135 a 0910135 a 09
10135 a 09
 
10135 a 06
10135 a 0610135 a 06
10135 a 06
 
10135 a 05
10135 a 0510135 a 05
10135 a 05
 
10135 a 04
10135 a 0410135 a 04
10135 a 04
 
10135 a 03
10135 a 0310135 a 03
10135 a 03
 
10135 a 00
10135 a 0010135 a 00
10135 a 00
 
10135 a 12
10135 a 1210135 a 12
10135 a 12
 
50357 a enu-module05
50357 a enu-module0550357 a enu-module05
50357 a enu-module05
 
50357 a enu-module03
50357 a enu-module0350357 a enu-module03
50357 a enu-module03
 
50357 a enu-module02
50357 a enu-module0250357 a enu-module02
50357 a enu-module02
 
50357 a enu-module01
50357 a enu-module0150357 a enu-module01
50357 a enu-module01
 
50357 a enu-module00
50357 a enu-module0050357 a enu-module00
50357 a enu-module00
 
50357 a enu-module04
50357 a enu-module0450357 a enu-module04
50357 a enu-module04
 

Kürzlich hochgeladen

A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sectoritnewsafrica
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 

Kürzlich hochgeladen (20)

A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 

Configure Exchange Mailbox Servers

  • 1. Module 2 Configuring Mailbox Servers
  • 2.
  • 3.
  • 4.
  • 5. Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10. Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
  • 11. Exchange Management Shell Examples Get-User | Where-Object {$_.distinguishedname –ilike &quot;*ou=sales,dc=contoso,dc=com&quot;} | Enable-Mailbox –database “Mailbox Database 1&quot; Get-DistributionGroup &quot;RemoteUsers&quot; | Get-DistributionGroupMember | Set-Mailbox –MaxReceiveSize 10MB Get-Mailbox –server NYC-EX1 | New-MoveRequest –Local –targetDatabase “Mailbox Database 2&quot; Get-Message -Filter {FromAddress -like &quot;Tom*&quot;} | Remove-Message Get-MailboxDatabaseCopyStatus
  • 12.
  • 13.
  • 14. Initial Mailbox Configuration Tasks The initial Mailbox server role tasks are: Secure the server  Configure public folders  Create and configure databases  Configure the offline address book  Configure recipients 
  • 15.
  • 16.
  • 17. What Are the Database File Types? A database consists of a collection of file types, each of which performs a different function File Type Purpose <Log Prefix>.chk Checkpoint file <Log Prefix>.log Current transaction log file <Log Prefix>xxxxxxxx.log Transaction log file that was already renamed and filed <Log Prefix>res00001.jrs Reserved transaction logs <Log Prefix>res00002.jrs Reserved transaction logs Tmp.edb Temporary workspace for processing transactions <Log Prefix>tmp.log Transaction log file for the temporary workspace <File Name>.edb Rich text database files that stores content for mailbox and public folder databases
  • 18. Mailbox Database Update Process Receive message 1 Write message 2 3 Write to DB 4 Update 5 Client access
  • 19.
  • 20. Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26. Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
  • 27.
  • 28. Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
  • 29.
  • 30. What Are Public Folders? A public folder is a repository for different information types All Public Folders Public Folders Internet Newsgroups HR Business Handbook Personnel Forms Marketing Products Public folder tree
  • 31. Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
  • 32. Configuring Public Folder Replication The messaging administrator controls the destination frequency of the folder Service Replication Component AD DS and Active Directory Public folder directory objects Microsoft Exchange Information Store service Public folder trees Public folder contents
  • 33. How Clients Access Public Folders Server 5 Server 4 Site Z Site Y Site X Site W Cost=10 User Server 1 Server 2 Server 3 Cost=30 Cost=50 Public Folder Server Server 1 Server 2 Server 3 Server 4 Server 5 Connector Cost N/A N/A N/A N/A Site Link A 10 Site Link C 30 Site Link B 50
  • 34.
  • 35. Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
  • 36. When to Use SharePoint Instead of Public Folders Scenario Using Public Folders? New to Public Folders? Document Sharing SharePoint may be a better option SharePoint is a better option Calendar Sharing No need to move Use either Contact Sharing No need to move Use either Discussion Forum No need to move Use either Distribution Group Archive No need to move Use either Custom Applications SharePoint may be a better option SharePoint may be a better option Organizational Forms No need to move Use InfoPath
  • 37.
  • 38.
  • 39.
  • 40.
  • 41. Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.

Hinweis der Redaktion

  1. Module 2: Configuring Mailbox Servers Course 10135A Presentation: 50 minutes Lab: 45 minutes After completing this module, students will be able to: Configure Mailbox servers. Configure Mailbox server components. Required materials To teach this module, you need the Microsoft® Office PowerPoint® file 10135A_02.ppt. Important: We recommend that you use PowerPoint 2002 or a later version to display the slides for this course. If you use PowerPoint Viewer or an earlier version of PowerPoint, all the features of the slides might not be display correctly. Preparation tasks To prepare for this module: Read all of the materials for this module. Practice performing the demonstrations and the lab exercises. Work through the Module Review and Takeaways section, and determine how you will use this section to reinforce student learning and promote knowledge transfer to on-the-job performance. Note about the demonstrations : To prepare for the demonstrations, start the 10135A-VAN-DC1 virtual machine and log on to the server before starting the other virtual machines. To save time during the demonstrations, log on to the Exchange servers and open the Exchange Server management tools before starting the demonstrations. Additionally, connect to the Microsoft Outlook® Web App site on the Exchange servers, and then log on as Administrator. It can take more than a minute to open the management tools and Outlook Web App for the first time. Make sure that students are aware that the Course Companion CD contains additional module information and resources.
  2. Module 2: Configuring Mailbox Servers Course 10135A
  3. Module 2: Configuring Mailbox Servers Course 10135A
  4. In this demonstration, you will discuss the main features of the Exchange Management Console and identify where the user can find information for each of its major sections. Be sure to discuss the Actions pane, and how you can use it to explore management functionality. Since this will be the first time many of the students will have seen the console, be sure to point out each work area, and the major functions and tasks that they can accomplish in each. Preparation Ensure that the 10135A-VAN-DC1 and the 10135A-VAN-EX1 virtual machines are running. Log on to the virtual machines as Administrator with the password of Pa$$w0rd . Demonstration On VAN-EX1, click Start , click All Programs , click Exchange Server 2010 , and then click Exchange Management Console . Expand Microsoft Exchange On-Premises . Describe the console’s layout: The Console Tree on the left, the Content pane in the middle, and the Actions pane on the right. Point out that the Console Tree has four nodes: Organization Configuration, Server Configuration, Recipient Configuration, and Toolbox. Expand each of the nodes to view the available information. In the Console Tree, expand Organization Configuration , click Mailbox , and then view the available information in the Content pane. In the Console Tree, expand Server Configuration , click Mailbox , and then view the available information in the Content pane. In the Console Tree, expand Recipient Configuration , click Mailbox , and then view the available information in the Content pane. Module 2: Configure Mailbox Servers Course 10135A
  5. Question: Does the Exchange Management Console have the same functionality as it did in previous Exchange Server versions? What is different about this version? Answer: In Exchange Server 2010, you use the Exchange Management Console to configure computers running Exchange Server. Exchange Server organizes all configuration options in the Exchange Management Console logically into role-based settings. In versions previous to Exchange Server 2007, users could configure Exchange Server with the Exchange System Manager. In Exchange System Manager, all options are available in the properties dialog box of the server or the organization. Therefore, the Exchange System Manager is not role-oriented. Question: Does the Exchange Management Console organization seem logical to you? Why? Answer: Depending on student experience, answers will vary. However, students should see that the management structure correlates to the server roles. References Microsoft® Exchange Server 2010 Help file Module 2: Configuring Mailbox Servers Course 10135A
  6. Lead a class discussion about the Exchange Management Shell. Discuss how Exchange Management Shell and Exchange Management Console runs on top of Microsoft Windows® PowerShell™ 2.0, and how it uses Windows PowerShell remoting. Discuss that c mdlets typically are designed around a repetitive administrative task, and that the shell provides more than 600 cmdlets for Exchange-specific management tasks. These are available in addition to the non-Exchange Server system cmdlets included in the basic Windows PowerShell shell design. Ensure that the students understand that Windows PowerShell is more than just a command-line interface, in that it also provides a comprehensive scripting engine that you can automate with programs. References Exchange Server 2010 Help: Open the Shell and Understanding Role Based Access Control Module 2: Configuring Mailbox Servers Course 10135A
  7. Lead a class discussion about the benefits for Remote Window PowerShell. Since this is a change from Exchange Server 2007, many students will be unfamiliar with Remote Windows PowerShell and that Exchange Server 2010 builds on the success of Exchange Server 2007’s usage of Windows PowerShell 1.0 by leveraging its remote functionality within Windows PowerShell 2.0. Remote Windows PowerShell 2.0 enables the following main benefits: Role Base Access Control (RBAC). RBAC provides a more manageable way to assign granular permissions to administrators. RBAC enables you to align the roles you assign users and administrators more closely to their actual roles in your organization. Whereas, in Exchange Server 2007, the server permissions model applied only to the administrators that managed the Exchange Server 2007 infrastructure, RBAC now controls both the administrative tasks that you can perform and the extent to which users can conduct self-administration tasks. RBAC controls who can access what, and where, through management roles, assignments, and scopes. Using remote Windows PowerShell allows you to run the cmdlets on the server while controlling how they are executed. Client/server management model . Cmdlets run remotely from the server rather than on the management server. This allows the server to process the client requests, thereby reducing their impact. Since the cmdlets are run on the remote server, not the client, you only need to install Windows PowerShell 2.0 on the management machine if you do not need to use the graphical user interface (GUI) tools. Standard protocols allow easier management through firewalls . Remote Windows PowerShell leverages Windows Remote Management (WinRM) for connectivity through standard HTTPS connections, which is often open on many corporate firewalls. If time permits discuss some of the scenarios that Remote Windows PowerShell enables, such as simplified cross-domain management, management from workstations that do not have installed management tools, management through firewalls, and the ability to throttle resources that management tasks consume. Module 2: Configuring Mailbox Servers Course 10135A
  8. Mention that each cmdlet is formed with a verb and a noun. Mention some of the common verbs. Then discuss how pipelining works to send data between cmdlets. This may be a good time to see if any students have had experience with other shells. References: Cmdlet verb names:http://go.microsoft.com/fwlink/?LinkId=179883 Module 2: Configuring Mailbox Servers Course 10135A
  9. In this demonstration, you will discuss Exchange Management Shell dependency on Windows PowerShell 2.0, and describe Exchange Management Console cmdlets. You will demonstrate how to create a mailbox, and how to use Windows PowerShell scripting and pipelining to change the address on multiple mailboxes. You also will describe basic cmdlet aliases. Mention that each cmdlet is formed with a verb and a noun. Review a list of cmdlets by running Get-Command . During the demonstration, discuss how to use Windows PowerShell scripting and pipelining to change the address on multiple mailboxes. Mention aliases such as FL for Format-List . Preparation Ensure that the 10135A-VAN-DC1 and the 10135A-VAN-EX1 virtual machines are running. Log on to the virtual machines as Administrator with the password of Pa$$w0rd . Demonstration Steps 1. On VAN-EX1, click Start , click All Programs , click Exchange Server 2010 , and then click Exchange Management Shell . 2. Run Get-Mailbox , and then view the output. 3. Run Get-Mailbox | Format-List , and then view the output. 4. Run Get-Mailbox | fl , and then verify that it is identical to the previous output, since fl is an alias for Format-List . 5. Run Get-Mailbox | Format-Table , and then view the output. Explain that the format is different from the previous output. 6. Run Get-Mailbox | ft Name, Database, IssueWarningQuota . Explain that the table output shows only the fields you specify. 7. Run Get-Help New-Mailbox to view the basic help for New-Mailbox. 8. Run Get-Help New-Mailbox -detailed to view the detailed help for New-Mailbox. 9. Run Get-Help New-Mailbox -examples to view just the examples that the help provides. 10. Create a variable by running $Temp = “Text” Module 2: Configuring Mailbox Servers Course 10135A
  10. 11. Run $Temp to view the variable’s contents . 12. Run $password = Read-Host &amp;quot;Enter password&amp;quot; –AsSecureString to prompt the user for a password. Emphasize that to assign a password to a new user, you must specify the Read-Host command with the –AsSecureString switch, because you cannot store passwords as simple strings. Type Pa$$W0rd and press ENTER. 13. Run New-Mailbox -UserPrincipalName chris@contoso.com -Alias Chris -Database &amp;quot;Mailbox Database 1&amp;quot; -Name ChrisAshton -OrganizationalUnit Users -Password $password -FirstName Chris -LastName Ashton -DisplayName &amp;quot;Chris Ashton&amp;quot; -ResetPasswordOnNextLogon $true to create a new and secure mailbox for user Chris Ashton. Module 2: Configuring Mailbox Servers Course 10135A
  11. Use these examples to illustrate the power of the Exchange Management Shell. When you discuss each example, break down each command’s individual components, and explain each piece. Focus less on the cmdlet function and more on the cmdlet’s syntax and construction. Module 2: Configuring Mailbox Servers Course 10135A
  12. Lead a class discussion on the Exchange Control Panel (ECP), which is a new feature in Exchange Server 2010 that builds on the Outlook Web App options by adding many functions that empower users to manage their own information when they have access granted through RBAC. The ECP is available through a link in Outlook Web App. Although the ECP is used to empower users to manage their own mailbox, it also allows authorized users to view e-discovery information and perform some administrative tasks. When discussing the Exchange Control Panel, it may be beneficial to show the students an ECP example. Module 2: Configuring Mailbox Servers Course 10135A
  13. Module 2: Configuring Mailbox Servers Course 10135A
  14. Discuss the steps that you need to complete after you deploy the Mailbox server role. Use this topic to set the ground work for the remainder of the lesson. Additionally, use this opportunity to ask the students what they think each of the configuration tasks entail. Also, ask if any have had experience completing these tasks with either Exchange Server 2010 or a previous Exchange Server version. Module 2: Configuring Mailbox Servers Course 10135A
  15. In this demonstration, you will show how to configure the Mailbox server role. The Mailbox server role has few properties that you configure at the Exchange server level. In the Exchange Management Console, you can view the domain controller and global catalog server that the server uses. Preparation Ensure that the 10135A-VAN-EX1 virtual machine is running. Log on to the virtual machine as Administrator with the password of Pa$$w0rd . Demonstration Steps 1. On VAN-EX1, click Start , click All Program , click Exchange Server 2010 , and then click Exchange Management Console . 2. In the Console Tree, expand Microsoft Exchange On-Premises , expand Server Configuration , and then click Mailbox . 3. In the Mailbox pane, select VAN-EX1 . Describe the available options in the Actions pane: Manage Diagnostic Logging Properties , Switchover Server, and Properties . 4. In the Actions pane, under VAN-EX1 , click Properties . 5. View the properties on the General tab, and then select System Settings . 6. View the options on the System Settings tab, and then select Messaging Records Management . 7. View the options on the Messaging Records Management tab, and then close the Properties dialog box. 8. Click Manage Diagnostic Logging in the Actions pane, and then view the logging options. Question: What additional tasks do you need to perform on the Mailbox server role after the Exchange Server 2010 installation occurs? Answer: You must complete all of the post-installation steps, including creating and configuring databases, securing the server, and configuring recipients and the offline address book. Module 2: Configuring Mailbox Servers Course 10135A
  16. To properly manage Mailbox servers, students should know how Mailbox servers store mailbox and public folder contents. Exchange Server 2010 stores mailbox and public folder contents in databases to enhance performance and reduce storage utilization. Discuss the structure and function of Exchange Server databases: Each database consists of a single rich text database (.edb) file. All messages are stored in this database regardless of what type of client sends or reads the messages. In Exchange Server 2010, each database has a single set of transaction logs. The transaction log stores the data changes for a database. Data changes include all messages sent to or from the database. Transaction logs are an essential during disaster recovery if you need to restore a mailbox or public folder database. Note that t he Exchange Server 2010 database schema was changed significantly to improve its performance over previous Exchange Server versions. Discuss the importance of database and transaction log file location. By default, all databases and transaction logs for a single database are stored in one folder within the Exchange Server directory (C:\\Program Files\\Microsoft\\Exchange Server\\v14\\Mailbox). Each database has its own folder. Although Exchange Server does not require separating databases and transaction logs, given the appropriate redundancy, this separation does increase recoverability, and you should consider it if your organization does not employ other availability options. If the disk holding a database fails, the transaction logs are required to recover recent activity since the last backup. You can recover only to the point of the last back up, if the transaction logs are stored on the same disk as the database files. In Exchange 2000 Server and Exchange Server 2003, there was an option to create multiple databases and have them share a set of transaction logs. This was called a storage group. In Exchange Server 2007, having multiple databases in a storage group was available only for databases that did not have high availability features enabled. In Exchange Server 2010, there is no option to have multiple databases to share a single set of transaction logs. Module 2: Configuring Mailbox Servers Course 10135A
  17. Explain that a database consists of a collection of file types, each of which performs a different functions. Use the following notes to discuss the database file types. If necessary, write the list of files on the board to use while discussing the next topic: &lt;Log Prefix&gt;.chk . This is the checkpoint file that determines which transactions require processing to move the checkpoint file from the transaction log file to the database. An example is E00.chk. This checkpoint file is several kilobytes in size and does not grow. &lt;Log Prefix&gt;.log . This is the database’s current transaction log file. An example is E00.log. The maximum amount of data storage for this file is 1 megabyte (MB). When this file reaches its maximum storage of 1 MB, Exchange Server renames it and creates a new current transaction log. &lt;Log Prefix&gt;xxxxxxxx.log . This is a transaction log file that has been renamed and filed. An example is E000000000001.log. Each transaction log file is always 1 MB. &lt;Log Prefix&gt;res00001.jrs and &lt;Log Prefix&gt;res00002.jrs . These are the reserved transaction logs for the database. Exchange Server 2010 uses these only as emergency storage when the disk becomes full and it can write no new transactions to disk. When Exchange Server 2010 runs out of disk space, it writes the current transaction to disk, and then dismounts the database. The reserved transaction logs ensure minimal loss of data that is in transit to the database. The reserved transaction logs always are 1 MB each. Tmp.edb . This is a temporary workspace for processing transactions. Exchange Server 2010 deletes the contents of this file when the it dismounts the database or when the Microsoft Exchange Information Store service stops. This file typically is a few megabytes in size. &lt;Log Prefix&gt;tmp.log . This is the transaction log file for the temporary workspace. An example is E00tmp.log. This file does not exceed 1 MB. &lt;File Name&gt;.edb . This is the rich-text database file that stores content for mailbox and public folder databases. An example is Mailbox Database.edb. Each mailbox or public folder database is contained in a single file. Database files can grow very large, depending on the content that the database stores. Module 2: Configuring Mailbox Servers Course 10135A
  18. Discuss the process that the Mailbox server uses when it receives data, as follows: The Mailbox server receives the message. The Mailbox server writes the message to the current transaction log and memory cache simultaneously. Note: If the current transaction log reaches 1 megabyte (MB) of storage, Exchange Server 2010 renames it and creates a new current transaction log. 3. The Mailbox server writes the transaction from memory cache to the appropriate database. 4. The Mailbox server updates the checkpoint file to indicate that the transaction was committed successfully to the database. 5. Clients can access and read the message in the database. When time permits, identify the files from the previous slide that each step of this process affect. Module 2: Configuring Mailbox Servers Course 10135A
  19. After planning the appropriate location for your databases and transaction logs, you must implement the plan. In this demonstration, you will show how to move databases and transaction logs. You will discuss other options available for databases, such as circular logging and the maintenance schedule. Mention that online maintenance in Exchange 2010 performs database and mailbox cleanup. However, defragmentation now occurs continuously, and you cannot schedule it. Preparation Ensure that the 10135A-VAN-EX1 virtual machine is running. Log on to the virtual machine as Administrator with the password of Pa$$w0rd . Demonstration Steps 1. On VAN-EX1, if required, click Start , click All Programs , click Exchange Server 2010 , and then open Exchange Management Console . 2. In the Console Tree, expand Microsoft Exchange On-Premises , expand Organization Configuration , and then click Mailbox . 3. Select the Database Management tab, right-click on Mailbox Database 1 , and then choose Properties . 4. View the properties on the General tab, and then select the Maintenance tab. 5. View the properties on the Maintenance tab, and then select the Limits tab. 6. View the properties on the Limits tab, and then select the Client Settings tab . 7. Close the Properties dialog box. 8. Select Mailbox Database 1 , and then click Move Database Path in the Actions pane. 9. In the Move Database Path wizard, type a new database file path ( C:\\NewFolder1\\DB\\Mailbox Database 1.edb ) and log folder path ( C:\\NewFolder1\\Logs\\ ), and then click Move . 10. Confirm and complete the move process. Module 2: Configuring Mailbox Servers Course 10135A
  20. If time permits, demonstrate moving the database files using the Exchange Management Shell: 1. Logon to VAN-EX1 with you administrator account, and then open the Exchange Management Shell. 2. Run Move-DatabasePath -id ‘Mailbox Database 1’ -LogFolderPath ‘C:\\NewFolder2\\Logs\\’ . 3. Run Move-DatabasePath -Id ‘Mailbox Database 1’ -EdbFilePath ‘C:\\NewFolder2\\DB\\Mailbox Database 2.edb’ . Question: When would you need to move the path of the transaction logs or databases? Answer: You may need to move the database files during the initial configuration to ensure that the files are on the appropriately configured disks. Question: When might you use circular logging? Answer: Enabling circular logging allows transaction logs to be overwritten after they are committed to the database. Since Exchange Server does note maintain transaction logs, they are not available for use in recovery. You would use this option when you do not require the need to recover data between full backups. However, we never recommend this option in a single-server production environment. Module 2: Configuring Mailbox Servers Course 10135A
  21. Discuss how the storage performance changes made in Exchange Server 2007 extend to Exchange Server 2010. These features help reduce hardware costs. When choosing storage for Mailbox servers, you need to ensure that the storage meets your organization’s business and technical requirements. Organizations typically separate disk requirements into performance and redundancy requirements. Question: How can storage improvements decrease hardware costs? Answer: Reducing the input/output (I/O) requirements reduces the performance that an organization requires from storage. This in turn reduces the number of disks and disk usage, which in turn reduces the cost of the storage system. Module 2: Configuring Mailbox Servers Course 10135A
  22. Lead a discussion about disk storage options and about Redundant Array of Independent Disks (RAID) technologies. The students should understand the general pros and cons for each major technology. Although there are very few hard and fast rules, the basic concepts are the same across all implementations of these technologies. Stress that since the Exchange Server 2010 disk I/O requirements are lower than in previous Exchange Server versions, more storage options are available. Explain that an organization should take care in ensuring that the storage option it selects meets its business and technical requirements for the Exchange Server deployment. Tools are available to approximate usage patterns, such as Load Simulator and JetStress. Explain that you can use these tools to test the suitability of various hardware configurations in your environment. RAID Options RAID increases disk-access performance and fault tolerance. Mention that JBOD—or Just a Bunch of Disks—is a collection of disks that have no redundancy or fault tolerance. Usually, JBOD solutions cost less than RAID-based solutions. You can add fault tolerance by using multiple copies of the databases on separate disks. The most common RAID options are: RAID 0 (striping). Increases read and write performance by spreading data across multiple disks. However, it offers no fault tolerance. Performance increases as you add more disks. You add fault tolerance by using multiple copies of the databases on separate RAID sets. RAID 1 (mirroring). Read performance is faster than a single disk, but write performance is slower than RAID 0. Half of the disks are used for data redundancy. RAID 0+1 (mirrored striped sets). Provides very fast read and write performance with excellent fault tolerance. Half of the disks are used for redundancy. RAID 5 (striping with parity). If any one disk fails, the missing data is calculated based on the remaining disks. Read and write performance for RAID 5 is slower than RAID 0, but faster than RAID 1. At most, only one third of the disks are used to store parity information. RAID 6 (striping with double parity). If up to two disks fail, RAID 6 calculates the missing data based on data and parity information stored on the remaining disks. Read and write performance for RAID 6 is typically slower than RAID 0. RAID 6 does not have a read penalty. The main benefit of RAID 6 is the ability to rebuild missing data if you have up to two failures per RAID group, and to reduce the impact of rebuilding the RAID set when a disk fails. RAID 1+0 or RAID 10 (mirrored sets in a striped set). The difference between RAID 0+1 and RAID 1+0 is that RAID 1+0 creates a striped set from a series of mirrored drives. In a failed disk situation, RAID 1+0 performs better and is more fault tolerant than RAID 0+1. Module 2: Configuring Mailbox Servers Course 10135A
  23. Describe direct attached storage as any disk system that connects physically to your server. This includes hard disks inside the server or those that connect by using an external enclosure . Some external enclosures include hardware-based RAID. For example, external disk enclosures can combine multiple disks in a RAID 5 set that appears to the server as a single large disk. In general, direct attached storage provides good performance, but suffers from limited scalability because of the unit’s physical size. You must manage direct attached storage on a per-server basis. Exchange Server 2010 is designed to perform well with the scalability and performance characteristics of direct attached storage. Explain that direct attached storage provides the following benefits: Lower cost Exchange Server solution . Direct attached storage usually provides a substantially lower purchase cost than other technologies. Easy to implement . Often direct attached storage is easy to manage and requires very little training. Distributed failure points . With separate disk systems for each Exchange server, failure of a single system will not negatively impact the entire Exchange messaging system, assuming that you configure the Exchange servers for high availability. Module 2: Configuring Mailbox Servers Course 10135A
  24. Describe storage area network (SAN) as a network dedicated to providing servers with access to storage devices. A SAN provides advanced storage and management capabilities, such as data snapshots, in addition to high performance. SANs use either Fibre Channel switching or Internet SCSI (iSCSI) to provide fast and reliable connectivity between storage and applications. Fibre Channel switching or iSCSI allows many servers to connect to a single SAN. Fibre Channel is a standard SAN architecture that runs on fiber optic cabling. Because Fibre Channel is designed specifically for SANs, it is the fastest architecture available, and most SANs use it. SANs are complex and require specialized knowledge to design, operate, and maintain. Most SANs are also more expensive than direct attached storage. For cost-conscious SAN implementations, iSCSI may be a viable option. An iSCSI network encapsulates SCSI commands in TCP/IP packets over standard Ethernet cabling and switches. You should implement this technology only on dedicated storage networks that are 1 gigabit per second (Gbps) or faster. Module 2: Configuring Mailbox Servers Course 10135A
  25. In this demonstration, you will discuss best practices for restricting user mailbox sizes on Mailbox servers. You will show students how to use the Exchange Management Console to configure storage quotas and use the Exchange Management Shell to bulk configure storage quotas. If many users store large amounts of e-mail in their mailboxes, your Mailbox servers will require significant storage space, or mailbox databases. Additionally, large mailbox databases require longer back-up and restore times, which affect the availability and reliability of your Exchange Server organization. Discuss the reasons for having proper limits set. Demonstrate how to set the following storage-limit thresholds: Issue warning at (KB) . When a mailbox reaches the size you specify, at a predetermined schedule (daily by default), mailbox-enabled users receive a message indicating that their mailboxes have become too large. Prohibit send at (KB) . When a mailbox reaches the size you specify, the user no longer can send messages and receives a warning message that the mailbox is too large. The mailbox can still receive messages. Prohibit send and receive at (KB) . When a mailbox reaches the size you specify, the user can no longer send or receive messages, and receives a warning message that the mailbox is too large. If the organization uses a Unified Messaging server, prohibiting e-mail reception can result in lost e-mail messages, voice-mail messages, and faxes. Most organizations elect not to use this option. You can also use Windows PowerShell to manage multiple databases at the same time. Preparation Ensure that the 10135A-VAN-DC1 and 10135A-VAN-EX1 virtual machines are running. Log on to the virtual machines as Administrator with the password of Pa$$w0rd . Demonstration Steps On VAN-EX1, if required, click Start , click All Program Files , click Exchange Server 2010 , and then click Exchange Management Console . In the Console Tree, expand Microsoft Exchange On-Premises , expand Recipient Configuration , and then click Mailbox. In the Content pane, right-click Luca Dellamore , and then choose Properties . Select the Mailbox Settings tab, and then double-click on Storage Quotas . Module 2: Configuring Mailbox Servers Course 10135A
  26. Clear the Use mailbox database defaults check box Select the Prohibit send and receive at (MB) check box, and in the text box, type 10 . Click OK twice. Open the Exchange Management Shell. To configure the database limits with Exchange Management Shell, run Get-MailboxDatabase -Server VAN-EX1 | Set-MailboxDatabase -IssueWarningQuota 50MB . To configure just the user mailboxes that are contained in the Marketing organizational unit, run Get-Mailbox -OrganizationalUnit Marketing | Set-Mailbox -ProhibitSendQuota 75MB . Module 2: Configuring Mailbox Servers Course 10135A
  27. Lead a discussion about the considerations for implementing Exchange Server storage consistently across organizations. Note that the storage-implementation details vary depending on organizational needs and size. In this discussion, you will review considerations for implementing Exchange Server storage, and how best to plan its implementation for your organization. Question: What should you consider when naming databases? Answer: Beginning with Exchange Server 2010, databases are no longer children of server objects, and a database can replicate to multiple Mailbox servers if you configure them for high availability. Therefore, as a best practice, you should not leverage the following with regards to database-naming conventions: The server name The Active Directory ® Domain Service (AD DS) or Active Directory directory service site name (for the site resilience case) The physical data center name (for the site resilience case) The Exchange Server organization name Question: When would you want or need to create multiple databases? Answer: You may discuss a number of reasons, depending on the students. Often, organizations create databases to separate users in different departments or geographical regions, or users that require different service levels. Maintaining a database at a manageable size also is important. You should size databases to fit on the available storage, yet still have enough room for growth. Additionally, their size should coincide with the backup and recovery times that you define for the messaging system. Question: Why would you want to reduce the number of databases? Answer: You may discuss several reasons, depending on the students. An organization may want to reduce the number of databases it has to reduce licensing needs and the amount of administration overhead that comes with having multiple databases. Additionally, each mounted database consumes additional memory on the server, so in some instances, it may be beneficial to limit how many databases you have. Question: What should you consider when planning to build additional Mailbox servers? Answer: You may need to place Mailbox servers in locations closer to the users to improve performance or reduce bandwidth charges. Adding additional Mailbox servers to the same site may be required to handle additional users or to handle increased usage from current users. Module 2: Configuring Mailbox Servers Course 10135A
  28. Considerations Consider the following when implementing databases: Give each set of transaction logs its own hard disk . You may achieve the best performance when transaction logs do not share disks with any other data. However, if performance is not a consideration, and there are enough copies of the data, your organization may not require this. Use RAID 5 to enhance performance and fault tolerance for databases . RAID 5 increases read and write performance for random disk access and fault tolerance. Use RAID 1 to provide fault tolerance for transaction logs . RAID 1 keeps two complete copies of transaction logs for fault tolerance. and provides good write performance for serially written data. Use a SAN, which provides excellent scalability and manageability for storage in large Exchange Server organizations . A Fibre Channel SAN provides the best performance. However, this high level of performance may be more than you require to support organizational requirements. SANs also add considerable cost and complexity. Use the prohibit send at storage limit to manage storage growth . This storage limit forces users to address the size of their mailbox before sending additional messages. Halting message reception is risky, because important business data might get lost. However, a warning may not be enough encouragement for users to lower their mailbox size. Module 2: Configuring Mailbox Servers Course 10135A
  29. Module 2: Configuring Mailbox Servers Course 10135A
  30. Describe public folders and what you use them for. You can explain to the students that a public folder is a repository for different information types, such as e-mail messages, text documents, and multimedia files. A public folder database stores public folder contents, which you can share with Exchange Server organization users. Organizations typically use public folders as: A location to store contacts for the entire organization. Centralized calendars for tracking events. Discussion groups. A location in which to receive and store messages for a workgroup, such as the Help desk. A storage location for custom applications. Additionally, system public folders are used to support legacy Office Outlook versions for free/busy information, custom forms, and offline address books. One alternative to public folders is Windows SharePoint® Services, which is a Web-based platform used to centrally store data for the enterprise, workgroups, and individuals. You can create multiple SharePoint sites for specific task such as: Team collaboration. Project management. Help-desk management. Expense reimbursement. Vacation scheduling. Module 2: Configuring Mailbox Servers Course 10135A
  31. For collaboration, Windows SharePoint Services goes beyond the capabilities offered by public folders. Some of the features that a SharePoint site offers are: Document collaboration, including checking in, checking out, and version control . This feature allows you to track the changes to documents over time, and prevent edits to multiple versions of a single document. Alerts sent out when content changes . Alerts enable you to monitor content and act when that content changes. For example, a project team could receive alerts automatically when the project schedule changes. Extensibility by developers for building applications . In some cases, public folders are used for managing application data. SharePoint sites can perform many of the same tasks. In one area, SharePoint services does not match Exchange Server functionality. That is in multimaster replication. Because Windows SharePoint Services is tied to Microsoft SQL Server ® , only one writable copy of the data is available at a time, whereas public folders can have multiple readable and writable copies of a public folder available around the globe. Public folder replication is discussed in the next topic. Module 2: Configuring Mailbox Servers Course 10135A
  32. Discuss public folder replicas and replication. Be sure to mention that, by default, when you create a public folder, only one replica of that public folder exists within the Exchange Server organization. Using multiple replicas allows you to place public folder content in the physical server locations where users are located. This results in faster access to public folder content and reduces communication across wide area network (WAN) links between physical locations. Public folder replication also provides fault tolerance for public folders. Discuss public folder replication: Public folder replication is an e-mail-based process for copying public folder content between computers running Exchange Server . When data is changed on one public folder replica, those changes are made to all other replicas of that public folder. By default, public folder content is replicated every 15 minutes, and replication cannot be set to less than every minute. You also must replicate the public folder tree . Module 2: Configuring Mailbox Servers Course 10135A
  33. Discuss the connection process for Messaging Application Programming Interface (MAPI)-based clients: If the public folder is located on the user account’s default public folder database, Exchange Server directs the client to this database for the public folder contents. If the public folder contents are not stored in the user account’s default public folder database, Exchange Server redirects the client to the Active Directory site that stores the public folder database. The Active Directory site must include a computer that is running Exchange Server 2010. If no computer running Exchange Server 2010 or Exchange Server 2007 in the local Active Directory site has a copy of the public folder contents, Exchange Server redirects the client to the Active Directory site with the lowest cost-site link that does have a copy of the public folder contents. If no computer running Exchange Server 2010 or Exchange Server 2007 has a copy of the public folder contents, Exchange Server redirects the client to a computer running Exchange Server 2003 that has a copy of the public folder contents, using the cost assigned to the routing group connector(s). Exchange Server 2010 does not enable this functionality by default. Rather, you must enable it with the Set-RoutingGroupConnector cmdlet. If no public folder replica exists on the local Active Directory site, a remote Active Directory site, or on a computer running Exchange Server 2003, the client cannot access the contents of the requested public folder. Note: For Outlook Web App clients to view public folders, a replica of the public folder must be available on an Exchange Server 2010 mailbox server. Module 2: Configuring Mailbox Servers Course 10135A
  34. In this demonstration, you will use the Public Folder Management Console (PFMC), Exchange Management Shell, and Office Outlook to configure public folders. Demonstrate using the PFMC to add replicas and set permissions on a public folder. Demonstrate using Exchange Management Shell to add permissions to a public folder. Open Outlook and view the permissions assigned on the public folder via Exchange Management Shell. Preparation Ensure that the 10135A-VAN-DC1, 10135A-VAN-EX1 and the 10135A-VAN-CL1 virtual machines are running. Log on to the virtual machines as Administrator with the password of Pa$$w0rd . Demonstration Steps To use the PFMC to add replicas and set permissions on a public folder: 1. On VAN-EX1, if required, click Start , click All Program Files , click Exchange Server 2010 , and then open Exchange Management Console . 2. In the Console Tree, expand Microsoft Exchange On-Premises , and then expand Toolbox . 3. In the Content pane, double-click Public Folder Management Console . 4. If not already connected, in the Actions pane, click Connect to a Server , and then in the Connect to Server dialog box, click Browse . 5. In the Select Public Folder Servers dialog box, select VAN-EX1 , click OK , and then click Connect . 6. Select the Default Public Folders node in the Console Tree, and then click New Public Folder in the Actions pane. 7. In the New Public Folder Wizard , type Sales , click New , and then click Finish . 8. In the Content pane, right-click Sales , view the available options, and then click Properties . 9. View the information available on the General tab, and then select the Statistics tab. Module 2: Configuring Mailbox Servers Course 10135A
  35. 10.View the information available on the Statistics tab, and then select the Limits tab. 11. View the information available on the Limits tab, and then select the Replication tab. 12. Click Add , select PF2 on VAN-EX2, and then click OK . Click OK . To use the Exchange Management Shell to add permissions to a public folder: Open the Exchange Management Shell. Run Get-PublicFolderClientPermission \\Sales , and then view the results. Run Add-PublicFolderClientPermission \\Sales -AccessRights EditAllItems -User Jason . To use Outlook to view and edit public folder permissions: 1. On VAN-CL1, open Outlook. 2. Click Folder List in the Outlook bar. 3. Expand Public Folders , expand All Public Folders , right-click Sales , and then click Properties . 4. Select the Permissions tab, and then view the available options. Question: How is public folder management different in Exchange Server 2010 than in previous Exchange Server versions? Answer: Depending on the students’ experiences, they may talk about the lack of GUI-based management tools in the original release of Exchange Server 2007, or they may talk about the various tools, like PFAdmin, available in Exchange Server 2003. Module 2: Configuring Mailbox Servers Course 10135A
  36. Discuss the features that SharePoint provides that are similar to public folders. Then discuss when you would choose one versus the other. In regards to using calendar sharing, contact sharing, discussion forums or distribution group archives depending on scope of scenario, use Exchange Server public folders or SharePoint. Also, regards to custom applications, depending on the application’s scope, use Exchange Web Services and/or SharePoint. Question: For what does your company currently use public folders and SharePoint? Answer: Answers will vary considerably. Some companies many choose to use public folders for shared mail queues, calendars, document repositories or discussion groups. Other companies may choose to use SharePoint for the same reasons. References http://go.microsoft.com/fwlink/?LinkId=179884 Module 2: Configuring Mailbox Servers Course 10135A
  37. In this lab, students will configure mailbox databases and public folders. Exercise 1 In this exercise, students will configure mailbox databases. Exercise 2 In this exercise, students will configure public folders Before the students begin the lab, read the scenario associated with each exercise to the class. This will reinforce the broad issue that the students are troubleshooting, and will help to facilitate the lab discussion at the module’s end. Remind students to complete the discussion questions after the last lab exercise. Module 2: Configuring Mailbox Servers Course 10135A
  38. Module 2: Configuring Mailbox Servers Course 10135A
  39. Use the questions on the slide to guide the debriefing after students complete the lab exercises. Question: What happens to the database’s status when you move the database files? Answer: When you move database files, the database is taken offline. This causes the database to be unavailable, which means that end users cannot send and receive e-mail until the database is online again. Question: When you create a public folder, how many replicas does it have? Answer: When you create a public folder with the Public Folder Management Console in Outlook, only one replica is created. Therefore, to ensure that the data is redundant, you must add a replica. Module 2: Configuring Mailbox Servers Course 10135A
  40. Review Questions Question: Which tools can you use to manage Exchange Server 2010? Answer: The Exchange Management Shell and the Exchange Management Console are the two main tools for managing Exchange Server. Additionally, the Exchange Management Console has several other tools that you can use. Question: What customizations can you make on mailbox databases? Answer: Mailbox database-configuration options include mailbox limits, journaling recipients, default public folder databases, maintenance schedules, and circular logging. Question: When can you use public folders? Answer: Exchange Server 2010 supports public folders fully, so you can use a variety of solutions. There are several solutions that work within public folders, but other products and technologies may better server them. Common Issues and Troubleshooting Tips Point the students to possible troubleshooting tips for the issues that this section presents. Real-World Issues and Scenarios Question: Your organization needs to determine which storage solution to deploy for the new Exchange Server 2010 messaging environment. What information should you consider when selecting the hardware? Answer: You should consider many facts when choosing storage. Your main focus should be on providing enough disk space and throughput that to meet your needs. There are tools that you can use to approximate the requirements and help you make an informed decision. Module 2: Configuring Mailbox Servers Course 10135A
  41. Question: Your organization would like to automate creation of user mailboxes for employees based on their status in your organization’s human-resources system. What can you use to perform this automation? Answer: The Exchange Management Shell provides an interface for scripting administrative tasks, such as user creation and modification. You also can use Exchange Management Shell programmatically from inside other applications. Question: Your organization wants to reduce administrative costs. One suggestion is to give department heads and administrative assistants the necessary access to manage departmental and project-based groups. What can you use to accomplish this task? Answer: You can use the ECP and appropriate RBAC permissions to enable nontechnical personnel to manage groups. Best Practices Help the students understand the best practices that this section presents. Ask students to consider these best practices in the context of their own business situations. Tools Point out the location from which students can install each key tool. Let students review each tool’s function and usage on their own. Remind students that they can use this as a master list to help them gather all the tools required to facilitate their application-support work. Module 2: Configuring Mailbox Servers Course 10135A