1. Exchange Server 2013 improves mailbox server availability by consolidating previously separate roles onto single mailbox servers and replicating mailbox databases across multiple servers in a database availability group (DAG).
2. The mailbox transport service was redesigned with separate submission and delivery components to improve mail flow, and transport is now located on mailbox servers rather than front-end servers.
3. Exchange 2013 provides increased mailbox sizes up to 100GB, modernized public folders based on the mailbox model, and improved search capabilities with a new search foundation.
Exchange Server 2013 introduced new server roles that simplified the architecture. The Client Access server role became a thin, stateless proxy server that routes client protocol requests. The Mailbox server role consolidated functionality into a single server that processes, renders, and stores Exchange data. This evolution improved hardware efficiency, simplified deployments, and enabled cross-version interoperability. The Front End Transport service acts as a load-balanced ingress/egress point that determines the optimal Mailbox server for delivering messages to avoid unnecessary hops.
Skype for business and lync troubleshooting guide (Version 1.0 )Thomas Poett
The free ebook is about troubleshooting Skype for Business and Lync.
A complex solution in unified communication marking people's life more simpler, connecting to others at any point of time, staying in contact with fellow friends and family members. Developing a set of skills, supporting and analyzing issues in this environment is an advanced task. I describe the troubleshooting work flow from general understanding of Skype for Business and Lync Server and Services.
In the Troubleshooting Guide the following areas are covered:
- General Approach to troubleshooting
- Logging, Tracing and CLS
- TCP and SIP Protocol
- SIP Session Establishment
- Lync/ Skype for Business Call Setup (entire process)
- Troubleshooting IM
- Troubleshooting Call with A/V
- Diagnostic Headers
- Monitoring
- Troubleshooting Voice
- Troubleshooting Conferencing
- Troubleshooting Web Services
- Troubleshooting Edge (external/ remote)
- Health Monitoring
- Troubleshooting Exchange Integration
(Autodiscover, Exchange Web Service EWS, IM Integration in OWA, Unified Contact Store UCS, Unified Messaging)
- Troubleshooting Mobility Services
- Troubleshooting Mobile Clients
- Troubleshooting Office Web App Server (OWA)
Troubleshooting Enterprise Voice will be released during a future update of this document (Version 2.0)
This document summarizes a Microsoft webinar on Azure Site Recovery. The webinar will cover replicating Hyper-V VMs, Azure VMs between regions, and VMware VMs to Azure. It also advertises upcoming webinars on related Azure topics and notes that Azure vouchers of €85 are available for 30 days. The document provides an outline of the Site Recovery webinar content which will last 1 hour and cover Azure Site Recovery, replicating VMs between locations, and recovery scenarios.
Azure AD Connect allows syncing of local Active Directory accounts to Azure Active Directory. It requires an Azure AD global administrator account, an enterprise administrator account for the local AD, a SQL Server database, and meeting server and hardware requirements. The setup process involves creating a global administrator account, installing Azure AD Connect, and configuring it for initial or subsequent synchronization of users and groups between the local and cloud directories.
Azure Storage is a cloud storage solution that provides four main services - Blob storage, Table storage, Queue storage, and File storage. It allows storing and processing large amounts of unstructured and structured data. Data is stored durably with different replication options for high availability. The storage services can be accessed from various applications and platforms using SDKs and tools.
This document summarizes Microsoft's Windows Virtual Desktop service, which provides virtual desktop experiences running on Azure. It offers the best Windows 10 and Office 365 experience when virtualized in the cloud at scale. Key capabilities include delivering multi-session Windows 10, optimizing Office 365 ProPlus for virtual scenarios, migrating existing Windows Server desktops and apps, and quickly deploying and scaling virtual desktops on Azure.
Exchange Server 2013 introduced new server roles that simplified the architecture. The Client Access server role became a thin, stateless proxy server that routes client protocol requests. The Mailbox server role consolidated functionality into a single server that processes, renders, and stores Exchange data. This evolution improved hardware efficiency, simplified deployments, and enabled cross-version interoperability. The Front End Transport service acts as a load-balanced ingress/egress point that determines the optimal Mailbox server for delivering messages to avoid unnecessary hops.
Skype for business and lync troubleshooting guide (Version 1.0 )Thomas Poett
The free ebook is about troubleshooting Skype for Business and Lync.
A complex solution in unified communication marking people's life more simpler, connecting to others at any point of time, staying in contact with fellow friends and family members. Developing a set of skills, supporting and analyzing issues in this environment is an advanced task. I describe the troubleshooting work flow from general understanding of Skype for Business and Lync Server and Services.
In the Troubleshooting Guide the following areas are covered:
- General Approach to troubleshooting
- Logging, Tracing and CLS
- TCP and SIP Protocol
- SIP Session Establishment
- Lync/ Skype for Business Call Setup (entire process)
- Troubleshooting IM
- Troubleshooting Call with A/V
- Diagnostic Headers
- Monitoring
- Troubleshooting Voice
- Troubleshooting Conferencing
- Troubleshooting Web Services
- Troubleshooting Edge (external/ remote)
- Health Monitoring
- Troubleshooting Exchange Integration
(Autodiscover, Exchange Web Service EWS, IM Integration in OWA, Unified Contact Store UCS, Unified Messaging)
- Troubleshooting Mobility Services
- Troubleshooting Mobile Clients
- Troubleshooting Office Web App Server (OWA)
Troubleshooting Enterprise Voice will be released during a future update of this document (Version 2.0)
This document summarizes a Microsoft webinar on Azure Site Recovery. The webinar will cover replicating Hyper-V VMs, Azure VMs between regions, and VMware VMs to Azure. It also advertises upcoming webinars on related Azure topics and notes that Azure vouchers of €85 are available for 30 days. The document provides an outline of the Site Recovery webinar content which will last 1 hour and cover Azure Site Recovery, replicating VMs between locations, and recovery scenarios.
Azure AD Connect allows syncing of local Active Directory accounts to Azure Active Directory. It requires an Azure AD global administrator account, an enterprise administrator account for the local AD, a SQL Server database, and meeting server and hardware requirements. The setup process involves creating a global administrator account, installing Azure AD Connect, and configuring it for initial or subsequent synchronization of users and groups between the local and cloud directories.
Azure Storage is a cloud storage solution that provides four main services - Blob storage, Table storage, Queue storage, and File storage. It allows storing and processing large amounts of unstructured and structured data. Data is stored durably with different replication options for high availability. The storage services can be accessed from various applications and platforms using SDKs and tools.
This document summarizes Microsoft's Windows Virtual Desktop service, which provides virtual desktop experiences running on Azure. It offers the best Windows 10 and Office 365 experience when virtualized in the cloud at scale. Key capabilities include delivering multi-session Windows 10, optimizing Office 365 ProPlus for virtual scenarios, migrating existing Windows Server desktops and apps, and quickly deploying and scaling virtual desktops on Azure.
VMware introduced their Tanzu portfolio for building, running, and managing modern applications on Kubernetes. The presentation included an overview of Tanzu and its components, including how vSphere 7 integrates Kubernetes and Tanzu Kubernetes Grid for deploying and managing Kubernetes clusters. It also described Tanzu Mission Control for centralized management of multiple Kubernetes clusters across different platforms and clouds through consistent policies, visibility, and control.
Conditional access policies in Azure Active Directory control who has access to what resources and from where based on conditions. Policies consist of assignments determining scope, conditions regarding platforms/locations/apps, and controls for authentication and session behavior. Risk-based access can be configured to require multifactor authentication at certain risk levels. Policies grant or block access and optionally enforce device compliance, password strength, and other requirements. Admins create policies by defining these components and preview the access statements that will be implemented.
The Event Mesh: real-time, event-driven, responsive APIs and beyondSolace
Phil Scanlon, Head of Technology in Asia Pacific & Japan for Solace, describes "The Event Mesh" at API Days Melbourne in September 2018. Scanlon explains the complexities of the Event Mesh using the evolution to event-driven, the anatomy of an event, and real world examples.
Core Archive for SAP Solutions is a fully-featured archiving and document viewing solution that allows customers to archive content from the main SAP database yet still view and interact with the content directly from the Archive. Core Archive supports the archiving of all content and data from SAP and can leverage SAP ILM disciplines. Content is stored in a compliant manner ensuring that GDPR, CCPA and other standards can be met. Core Archive is entirely cloud-based, reducing the IT footprint and offering rapid time to value.
This document provides an overview of Virtual SAN design and architecture. It discusses Virtual SAN components such as disk groups, datastores, and objects. It describes how data is distributed across disks groups and hosts using techniques like striping and mirroring. It also covers storage policies and how they determine the layout and number of components for distributed objects. Use cases like all-flash configurations, ROBO solutions, and stretched clusters are explained at a high level.
Microsoft OneDrive - Part of Office 365
OneDrive lets you get to all your files on any device
Collaborate with deep Office integration
Share with colleagues inside and outside your organization
Virtualization helps companies address address specific business needs:
More secure access to data/organizational resources
Compliance with industry regulations (i.e. FSI, healthcare, government)
An increasingly elastic workforce (i.e. mergers/acquisitions, short-term employees, contractor/partner access)
Employee-specific needs (i.e. BYOD or mobile staff, call centers, branch workers)
Specialized workloads (i.e. design/engineering, legacy apps, software dev test)
Windows Virtual Desktop helps:
Employees stay as productive with a virtualized experience on a PC, phone, tablet, or browser as they are with a physical PC sitting right in front of them
Simplify management, provisioning, and access to corporate data and apps
Support customers as they migrate to the cloud
Reduce the costs and resources associated with managing on-premises infrastructure
Empower IT to transform the workplace
What is New in Teams Meetings and Meeting Rooms July 2021David J Rosenthal
Chat
Share your opinion, and your personality. Send gifs, stickers, and emojis in a group chat or in one-to-one messages.
Instant messaging
Meet
Instantly go from group chat to video conference with the touch of a button. Teams of 2 or 10,000 can meet in one place, no matter how many places they’re in.
Online meetings
Call
Make and receive calls with internal and external groups using Microsoft Teams Phone, Operator Connect, or Direct Routing.
Voice calling
Collaborate
Easily find, share, and edit files in real time using familiar apps like Word, PowerPoint, and Excel in Teams.
Video conferencing
Make meetings more personal and increase your productivity by collaborating in real time.
Screen sharing
Keep everyone on the same page by sharing your screen so they can see the same content.
Custom backgrounds
Create the perfect virtual setting by choosing, uploading, or blurring your background.
Together mode
Digitally sit in a shared background, making it feel like you’re in the same room with everyone else.1
File sharing
Co-author files in real time. Securely store, access, share, and collaborate on files from anywhere.
Apps and workflows
Streamline tasks and critical business processes by integrating apps and workflows.
Market availability
Available in 53 languages and 181 markets. Connect across Windows, Mac, iOS, and Android.
Privacy and security
Meet regulatory, legal, and organizational needs with industry-leading compliance offerings.
The session theme is "Enabling Business Continuity During Challenging Times With Virtual Desktops". The session will be conducted by Microsoft..
In the last few weeks, thelives of people around the world have been impacted. Daily working has gotcompromised, particularly with regard to business continuity. Remote working,in the best interest of organizations, is becoming a necessity.
Travel restrictions and new rules on large public gatherings have changed the daily routines of millions. Many organizations are quickly moving to remote working environments. If your customers are thinking of similar options, we at Microsoft are here to support you in this endeavor.
The document provides an overview of Active Directory Domain Services (ADDS). It discusses the key components and concepts of ADDS including physical/logical blocks, folders created during installation, protocols used, partitions, forest/tree/domain structure, objects, replication, roles, trusts, and the process for installing and configuring ADDS. The installation process involves adding the AD DS role, selecting features, promoting the server, and configuring options including DNS, database paths, and sysvol folder.
VMware HCX provides infrastructure hybridity and workload mobility between on-premises and cloud environments. It uses components like the HCX Manager, interconnects, and network extensions to optimize WAN traffic, extend networks between sites, and enable live migration of workloads without disruption. HCX addresses challenges customers face when moving workloads to hybrid and multi-cloud environments like application dependencies, cross-site networking issues, and business disruption.
Virtual Desktop Infrastructure (VDI) provides virtual desktop environments hosted on a central server rather than physical desktops. Vmware Horizon View is a VDI solution that leverages VMware vSphere virtualization capabilities to deliver desktop services from the cloud. It allows IT to simplify and automate management of thousands of desktops while providing users access to their desktops from any location or device.
End to End Guide Windows AutoPilot Process via IntuneAnoop Nair
I had an opportunity to present end to end Windows AutoPilot process flow at Bangalore IT Pro user group meeting. I covered end to end process to provision Windows 10 devices via Windows AutoPilot service with Intune.
This document provides an overview and guidance for deploying Azure Virtual Desktop. It introduces AVD and discusses deployment options, identity management, image management, and other implementation details. Key points covered include recommended VM sizing, profile management using FSLogix containers, and video/graphics optimizations in AVD. The document provides guidance on infrastructure management best practices for AVD deployments.
This document provides an overview of managing message transport in Exchange Server. It covers configuring hub transport servers, accepted and remote domains, SMTP connectors, and back pressure. The lab exercises troubleshoot message transport issues and configure routing to ensure all internet messages flow through the main Vancouver site.
Plongée en eaux profondes dans l'architecture du nouvel Exchange 2013Microsoft Décideurs IT
Attention, session en anglais. Animée par Scott Schnoll, Principal Technical Writer dans l'équipe Exchange à Microsoft corp. Découvrez la nouvelle architecture des serveurs Exchange 2013. Cette nouvelle version apporte des nouveautés fondamentales et bénéficie de l'expérience de gestion du Cloud O365 par les équipes online. Des évolutions de l'architecture fondamentale d'Exchange découlent directement de ce retour d'expérience et ont été intégrées au produit. Venez découvrir celles-ci par l'expert mondial sur le sujet.
VMware introduced their Tanzu portfolio for building, running, and managing modern applications on Kubernetes. The presentation included an overview of Tanzu and its components, including how vSphere 7 integrates Kubernetes and Tanzu Kubernetes Grid for deploying and managing Kubernetes clusters. It also described Tanzu Mission Control for centralized management of multiple Kubernetes clusters across different platforms and clouds through consistent policies, visibility, and control.
Conditional access policies in Azure Active Directory control who has access to what resources and from where based on conditions. Policies consist of assignments determining scope, conditions regarding platforms/locations/apps, and controls for authentication and session behavior. Risk-based access can be configured to require multifactor authentication at certain risk levels. Policies grant or block access and optionally enforce device compliance, password strength, and other requirements. Admins create policies by defining these components and preview the access statements that will be implemented.
The Event Mesh: real-time, event-driven, responsive APIs and beyondSolace
Phil Scanlon, Head of Technology in Asia Pacific & Japan for Solace, describes "The Event Mesh" at API Days Melbourne in September 2018. Scanlon explains the complexities of the Event Mesh using the evolution to event-driven, the anatomy of an event, and real world examples.
Core Archive for SAP Solutions is a fully-featured archiving and document viewing solution that allows customers to archive content from the main SAP database yet still view and interact with the content directly from the Archive. Core Archive supports the archiving of all content and data from SAP and can leverage SAP ILM disciplines. Content is stored in a compliant manner ensuring that GDPR, CCPA and other standards can be met. Core Archive is entirely cloud-based, reducing the IT footprint and offering rapid time to value.
This document provides an overview of Virtual SAN design and architecture. It discusses Virtual SAN components such as disk groups, datastores, and objects. It describes how data is distributed across disks groups and hosts using techniques like striping and mirroring. It also covers storage policies and how they determine the layout and number of components for distributed objects. Use cases like all-flash configurations, ROBO solutions, and stretched clusters are explained at a high level.
Microsoft OneDrive - Part of Office 365
OneDrive lets you get to all your files on any device
Collaborate with deep Office integration
Share with colleagues inside and outside your organization
Virtualization helps companies address address specific business needs:
More secure access to data/organizational resources
Compliance with industry regulations (i.e. FSI, healthcare, government)
An increasingly elastic workforce (i.e. mergers/acquisitions, short-term employees, contractor/partner access)
Employee-specific needs (i.e. BYOD or mobile staff, call centers, branch workers)
Specialized workloads (i.e. design/engineering, legacy apps, software dev test)
Windows Virtual Desktop helps:
Employees stay as productive with a virtualized experience on a PC, phone, tablet, or browser as they are with a physical PC sitting right in front of them
Simplify management, provisioning, and access to corporate data and apps
Support customers as they migrate to the cloud
Reduce the costs and resources associated with managing on-premises infrastructure
Empower IT to transform the workplace
What is New in Teams Meetings and Meeting Rooms July 2021David J Rosenthal
Chat
Share your opinion, and your personality. Send gifs, stickers, and emojis in a group chat or in one-to-one messages.
Instant messaging
Meet
Instantly go from group chat to video conference with the touch of a button. Teams of 2 or 10,000 can meet in one place, no matter how many places they’re in.
Online meetings
Call
Make and receive calls with internal and external groups using Microsoft Teams Phone, Operator Connect, or Direct Routing.
Voice calling
Collaborate
Easily find, share, and edit files in real time using familiar apps like Word, PowerPoint, and Excel in Teams.
Video conferencing
Make meetings more personal and increase your productivity by collaborating in real time.
Screen sharing
Keep everyone on the same page by sharing your screen so they can see the same content.
Custom backgrounds
Create the perfect virtual setting by choosing, uploading, or blurring your background.
Together mode
Digitally sit in a shared background, making it feel like you’re in the same room with everyone else.1
File sharing
Co-author files in real time. Securely store, access, share, and collaborate on files from anywhere.
Apps and workflows
Streamline tasks and critical business processes by integrating apps and workflows.
Market availability
Available in 53 languages and 181 markets. Connect across Windows, Mac, iOS, and Android.
Privacy and security
Meet regulatory, legal, and organizational needs with industry-leading compliance offerings.
The session theme is "Enabling Business Continuity During Challenging Times With Virtual Desktops". The session will be conducted by Microsoft..
In the last few weeks, thelives of people around the world have been impacted. Daily working has gotcompromised, particularly with regard to business continuity. Remote working,in the best interest of organizations, is becoming a necessity.
Travel restrictions and new rules on large public gatherings have changed the daily routines of millions. Many organizations are quickly moving to remote working environments. If your customers are thinking of similar options, we at Microsoft are here to support you in this endeavor.
The document provides an overview of Active Directory Domain Services (ADDS). It discusses the key components and concepts of ADDS including physical/logical blocks, folders created during installation, protocols used, partitions, forest/tree/domain structure, objects, replication, roles, trusts, and the process for installing and configuring ADDS. The installation process involves adding the AD DS role, selecting features, promoting the server, and configuring options including DNS, database paths, and sysvol folder.
VMware HCX provides infrastructure hybridity and workload mobility between on-premises and cloud environments. It uses components like the HCX Manager, interconnects, and network extensions to optimize WAN traffic, extend networks between sites, and enable live migration of workloads without disruption. HCX addresses challenges customers face when moving workloads to hybrid and multi-cloud environments like application dependencies, cross-site networking issues, and business disruption.
Virtual Desktop Infrastructure (VDI) provides virtual desktop environments hosted on a central server rather than physical desktops. Vmware Horizon View is a VDI solution that leverages VMware vSphere virtualization capabilities to deliver desktop services from the cloud. It allows IT to simplify and automate management of thousands of desktops while providing users access to their desktops from any location or device.
End to End Guide Windows AutoPilot Process via IntuneAnoop Nair
I had an opportunity to present end to end Windows AutoPilot process flow at Bangalore IT Pro user group meeting. I covered end to end process to provision Windows 10 devices via Windows AutoPilot service with Intune.
This document provides an overview and guidance for deploying Azure Virtual Desktop. It introduces AVD and discusses deployment options, identity management, image management, and other implementation details. Key points covered include recommended VM sizing, profile management using FSLogix containers, and video/graphics optimizations in AVD. The document provides guidance on infrastructure management best practices for AVD deployments.
This document provides an overview of managing message transport in Exchange Server. It covers configuring hub transport servers, accepted and remote domains, SMTP connectors, and back pressure. The lab exercises troubleshoot message transport issues and configure routing to ensure all internet messages flow through the main Vancouver site.
Plongée en eaux profondes dans l'architecture du nouvel Exchange 2013Microsoft Décideurs IT
Attention, session en anglais. Animée par Scott Schnoll, Principal Technical Writer dans l'équipe Exchange à Microsoft corp. Découvrez la nouvelle architecture des serveurs Exchange 2013. Cette nouvelle version apporte des nouveautés fondamentales et bénéficie de l'expérience de gestion du Cloud O365 par les équipes online. Des évolutions de l'architecture fondamentale d'Exchange découlent directement de ce retour d'expérience et ont été intégrées au produit. Venez découvrir celles-ci par l'expert mondial sur le sujet.
The document discusses the architecture of Microsoft Exchange 2013. Exchange 2013 uses a building block approach to facilitate deployments at any scale. It utilizes server role evolution, network layer improvements, and versioning/interoperability principles. The architecture features load balancing at the network and client access layers. Exchange 2013 also includes a new managed store that reduces database IOPS and supports larger mailboxes and modern public folders with improved search capabilities.
Scott Schnoll discusses Exchange Server 2010 topology changes including consolidating client access paths through the new Client Access service and introducing shadow redundancy for improved transport resiliency. The document also provides guidance on scaling out Exchange 2010 servers rather than scaling up single servers and recommends processor core limits for different server roles in the beta/RC versions.
This document discusses various Azure Platform Services including storage, caching, relaying, queuing, and topics. Storage in Azure provides blobs, drives, tables and queues for structured storage needs. Caching services improve application performance. Service Bus provides relaying for connectivity between applications and queuing/topics for messaging with publish/subscribe capabilities. Platform as a Service (PaaS) allows building and hosting applications on Azure's scalable infrastructure.
PathFinder EDI, middleware and document solutionlvanroy
Orion, formed in 1998, is a focused company specialized in Electronic Data Interchange (EDI) and electronic commerce (EC). The PathFinder product range is a complete data exchange system that can be used for traditional EDI purposes, more complex managed file transfer exchanges between partners, internally as a middleware tool for interfacing between applications or just as a document creation tool. PathFinder is supported by consultancy services and training courses to allow users to get the fullest value from their product. It won’t transform your life - but it will give you complete control over your data exchange traffic and handle your future requirements.
Orion, formed in 1998, is a focused company specialized in Electronic Data Interchange (EDI) and electronic commerce (EC). The PathFinder product range is a complete data exchange system that can be used for traditional EDI purposes, more complex managed file transfer exchanges between partners, internally as a middleware tool for interfacing between applications or just as a document creation tool. PathFinder is supported by consultancy services and training courses to allow users to get the fullest value from their product. It won’t transform your life - but it will give you complete control over your data exchange traffic and handle your future requirements.
The document discusses the Open Data Protocol (OData), which is an open specification that allows the creation of REST-based data services that support built-in operations like CRUD (Create, Read, Update, Delete) and querying capabilities. OData builds on fundamental web standards like HTTP, URI conventions, and XML or JSON for payloads to define a protocol that can be used for exposing and consuming data across systems via REST. The specification also covers addressing schemes, payloads, metadata, batching requests, and how OData can be implemented using technologies like WCF Data Services.
This document provides an overview of Oracle Service Bus. It discusses key SOA concepts like service enablement, mediation, and orchestration that can be addressed using a service bus. It describes the target audience for learning about OSB and provides a roadmap for the course content, which will cover the OSB architecture, proxy service development, and service management and monitoring capabilities. It also gives examples of how a service bus can provide location transparency, backwards compatibility, message enrichment, and service orchestration.
Postfix is a free and open-source mail transfer agent (MTA) that is commonly used on Linux systems. It handles receiving and delivering email by using several server processes and queues. When receiving mail, Postfix uses smtpd, qmqpd, pickup, and cleanup servers to validate messages and add them to the incoming queue. For delivery, it uses qmgr to route messages from the incoming queue through active delivery agents like smtp, lmtp, local, and virtual to recipients or deferred queue if delivery fails. Postfix prioritizes stability, scalability and security in its flexible and modular design.
The document discusses service oriented architecture (SOA) and enterprise service buses (ESBs). It defines SOA as using well-defined interactions between loosely coupled systems. ESBs are defined as providing "any to any" connectivity and transformation of data, including web services, using a proven middleware infrastructure. The document discusses how ESBs can help simplify SOA deployment by providing features like virtualization, transport matching, message transformation and an integrated registry. It also covers ESB patterns, such as the concentrator and federated patterns, and anti-patterns to avoid when using an ESB.
This document provides an overview of secure mail relay using Microsoft products. It discusses the threats posed by email such as spam and malware. The solution presented uses Forefront Threat Management Gateway and Forefront Protection for Exchange Server to filter email at the network edge for unwanted content. Key components include the EdgeSync service to synchronize data between Exchange Server and Forefront TMG. The document outlines the installation and configuration steps for SMTP protection which includes defining email policies and routes, as well as configuring spam, virus, and content filtering.
The document provides an overview of Exchange Server 2010 including key benefits around protection and compliance, anywhere access, and flexible and reliable deployment. It summarizes new features for archiving, rights management, inbox management, voice mail enhancements, high availability improvements through database availability groups, and simplified deployment of high availability solutions. The presentation concludes with next steps around Exchange 2010 architecture and achieving high availability with database availability groups.
Microsoft Exchange 2010 Upgrade Seminar March 2010hagestadwt
This document provides an overview of installing and deploying Exchange Server 2010. It discusses hardware and software requirements, new features in Exchange 2010, installation prerequisites and order, and routing and topology considerations. The key points covered are:
- Hardware and software requirements for Exchange 2010 roles
- New features like Database Availability Groups and the Exchange Management Console
- Permissions and prerequisites needed for installation
- The order of installing roles like Client Access and Mailbox servers
- How Exchange 2010 routing is based on Active Directory sites
- Edge Transport role functionality for routing to external systems
The document provides an overview of implementing messaging security in Exchange Server 2010. It discusses deploying Edge Transport servers and configuring them for secure SMTP messaging. It also covers deploying an antivirus solution like Forefront Protection 2010 and configuring anti-spam options. The lessons include demonstrations of configuring Edge Transport servers, Forefront Protection 2010, and anti-spam options to filter spam messages.
This document provides an overview of Mule, an open source lightweight messaging framework and object broker. It discusses that Mule can be deployed as an ESB but is not limited to that topology. The document then covers Mule's origins, architecture based on Enterprise Integration Patterns and Staged Event-Driven Architecture, and its dual nature as both a messaging framework and distributed object broker.
Kunal Mahajan is a Microsoft Corporation executive. Microsoft provides email services for over 95 million customer and partner mailboxes. The document discusses Microsoft's Exchange email services and how they help businesses by increasing productivity, enabling remote work, reducing costs, and maintaining security and compliance. It summarizes features of Exchange Server 2010 like email archiving, inbox management, enhanced voice mail, mobile access, continuous availability, simplified administration, and deployment flexibility.
During this session we will look into Windows 10 for the Enterprise.
Let’s explore the new management capabilities and choices.
Let’s understand the Windows 10 deployment infrastructure and mechanisms.
Let’s discover new Windows 10 features and improvements.
You are eager to learn about Windows 10 and want to gather early-stage info about this exciting Operating System… ?
Well you know what to do! See you there!
Compliance settings, formerly known as DCM, remains one of the often unexplored features in Configuration Manager. During this session we will walk through the new capabilities and improvements of this feature in ConfigMgr 2012, discuss implementation details, and demonstrate how you can start using it to fulfill actual business requirements.
Discover what’s new in Windows 8.1 regarding interface, settings, deployment, security, … How will Windows 8.1 fit in your enterprise? How do you upgrade? All answers are here!
The document discusses how to get started with monitoring after a successful installation of System Center Operations Manager (SCOM). It recommends doing an initial health check of the SCOM management server and database. It also covers installing SCOM agents, selecting appropriate management packs to monitor key components, and defining a phased approach for starting monitoring. The presentation provides tips on leveraging the community, backing up the SCOM environment, and finding quick wins to show management.
RMS, EFS, and BitLocker are Microsoft data protection technologies that can help prevent data leakage. RMS allows users to apply usage policies to files and encrypts files to control access. EFS transparently encrypts files stored locally on a computer. BitLocker encrypts fixed and removable drives to protect data at rest. The technologies provide different levels of protection and have varying capabilities for controlling access to data inside and outside an organization.
The document discusses Configuration Manager client deployment and health. It covers supported platforms for Windows, Linux, and Mac clients. Deployment methods include SUP, Group Policy, scripts, and manual installation. Client health is monitored from the server and client. Components include Client Check for prerequisites, dependencies and remediation, and Client Activity for tracking server interactions and status. Dashboards and reports provide visibility into client health and alerts surface issues.
This document discusses the history and evolution of self-service business intelligence (BI) tools from the 1980s to the present. It traces how BI tools have shifted from being developed primarily by IT to being user-focused end tools. It highlights key Microsoft products at different stages, from Excel in the 1980s to the addition of new apps like GeoFlow and Data Explorer in 2013. The document also demos some new self-service BI capabilities and resources.
This document discusses Cluster-Aware Updating (CAU) in Windows Server 2012. It provides an overview of how CAU works to update nodes in a failover cluster. The CAU update coordinator manages the updating process, pausing nodes, draining virtual machines, updating nodes, and failing back virtual machines in a coordinated manner. The document also provides links to Microsoft articles about CAU and integrating it with Dell server update tools.
The document discusses Microsoft's antimalware management platform which provides a common antimalware platform across Microsoft clients with proactive protection against known and unknown threats while reducing complexity. It integrates features such as early-launch antimalware, measured boot, and secure boot through UEFI to prevent malware from bypassing antimalware inspection during the boot process. The platform also provides simplified administration through a single console experience for endpoint protection and management.
This LiveMeeting presentation introduces Application Performance Monitoring (APM) in System Center Operations Manager 2012. APM allows monitoring of .NET and WCF applications to identify performance issues. It requires SCOM 2012 or later with the IIS management pack installed. APM bridges the gap between development and operations teams by integrating with Team Foundation Server and collecting traces in an IntelliTrace format. It provides various tools for client-side monitoring, server-side monitoring, and analyzing application diagnostics and advisors to help answer common support questions about application slowdowns and errors.
This document discusses Microsoft Lync Server 2013's persistent chat feature. It provides an overview of persistent chat's history and integration within Microsoft products. It also describes Lync 2013's unified client, improved server infrastructure and manageability, rich platform capabilities, and tools to easily migrate from previous versions. Configuration and management of persistent chat policies, categories, rooms and add-ins are examined. The document concludes with a section on licensing requirements for persistent chat.
The document discusses desktop virtualization and remote desktop services. It explains that with these services, the desktop workload is centralized on a virtual machine in the datacenter while the presentation of the UI is managed remotely via protocols like RDP. It also discusses mobility options that allow Lync to work across devices like PCs, Macs, smartphones and tablets through different applications. Finally, it provides a table comparing Lync support and requirements for various Windows Phone models.
Office 365 ProPlus can be deployed using Click-to-Run installation, which uses an App-V foundation for a streaming installation. This allows deploying Office fast without sacrificing control. The Office Deployment Tool can be used to download Click-to-Run packages, customize configurations, and deploy the packages across an organization. Telemetry data is collected to help optimize the user experience and identify issues, and a Telemetry Dashboard provides tools to manage data collection and settings.
This document discusses identity and authentication options for Office 365. It covers Directory Synchronization (DirSync) which synchronizes on-premises Active Directory with Azure Active Directory. It also discusses Active Directory Federation Services (ADFS) which provides single sign-on for federated identities and different ADFS topologies including on-premises, hybrid and cloud. Additionally, it covers Windows Azure Active Directory and how it can be used to provide identity services for cloud applications. The key takeaways are to check Active Directory health before using DirSync, understand the different Office 365 authentication flows with ADFS, and that WAAD can extend identity functionality to websites.
This document discusses options for upgrading a SharePoint environment from 2010 to 2013. It outlines the upgrade process which involves learning about the options, validating the environment, preparing by cleaning up and managing customizations, implementing the upgrade by building servers and upgrading content and services, and testing the upgraded environment. The key aspects are performing the upgrade on a new farm by attaching content databases to avoid downtime, allowing site collections to upgrade individually to minimize disruption, and thoroughly testing the upgraded environment.
This document discusses System Center Configuration Manager 2012's application model. It provides an overview of the application model, including the vision behind it of lifecycle management and user-centric deployment. Key concepts covered include requirement rules, detection methods, the application evaluation flow, application supersedence, and application uninstalls. Challenges and potential workarounds are also mentioned.
This document discusses FlexPod for Microsoft Private Cloud, an integrated solution from NetApp and Cisco for implementing a Microsoft Private Cloud using their technologies. It is a pre-validated reference implementation that is fully integrated with Microsoft System Center 2012 and provides a scalable Hyper-V platform. It accelerates private cloud deployments with reduced risk. Key components include Cisco UCS blade servers and switches, NetApp FAS storage, and tight integration and management capabilities through Cisco UCS Manager and NetApp OnCommand with Microsoft System Center.
Windows RT devices can be used in corporate environments if managed properly. Windows RT provides limited management capabilities compared to full Windows devices, but supports application deployment and some policy enforcement through Intune and ConfigMgr. Key challenges include application delivery restrictions, limited VPN configuration options, and lack of remote control and software metering capabilities. Proper infrastructure like Intune, ConfigMgr and VPN servers is required to securely connect and manage Windows RT devices in an enterprise.
The document discusses the evolution from device-centric management to user-centric management. Device-centric management involved managing individual devices, but user-centric management focuses on managing all of a user's devices through a single interface. The document outlines how Microsoft System Center Configuration Manager 2012 and Microsoft Intune can be used to implement user-centric management, including managing applications, settings, and security across devices. A hybrid approach using both Configuration Manager and Intune is also presented.
The document discusses steps for deploying a successful virtual network, including designing the network, building and configuring hardware, and configuring the virtual machine manager. It covers providing isolation through techniques like VLANs and software defined networking. Topics include logical network addressing, host configuration options, and creating logical switches. Tenant configuration using network virtualization is described for isolation.
More from Microsoft TechNet - Belgium and Luxembourg (20)
4. Mailbox Server Role
Server that hosts components that process, render and store Exchange
data
Includes components previously found in separate roles
Connectivity to a mailbox is always provided by the protocol instance on
the server hosting the active database copy
5. Database Availability Group
Collection of servers that form a unit of high availability
Boundary for replication and *over
DAG members can be in different sites
Can have a maximum of 16 Mailbox servers
6. Mailbox Server Role Changes
Managed Store and IOPS reductions
Transport-related Changes
Larger mailbox support
Modern public folders
New search infrastructure
9. Transport-related Changes
Transport on Mailbox server is comprised of three services:
• Microsoft Exchange Transport - Stateful and handles SMTP mail flow
for the organization and performs content inspection
• Microsoft Exchange Mailbox Transport Delivery - Receives mail from
the Transport service and deliveries to the mailbox database
• Microsoft Exchange Mailbox Transport Submission - Takes mail from
the mailbox databases and submits to the Transport service
10. Transport-related Changes
Transport has the following responsibilities
• Receives all inbound mail to the organization
• Submits all outbound mail from the organization
• Handles all internal message processing such as transport
rules, content filtering, and antivirus
• Performs mail flow routing
• Queue messages
• Supports SMTP extensibility
11. Transport Service Architecture
SMTP from FET or the Mailbox SMTP to FET or Mailbox
Transport service on other servers Transport service on other
servers
Transport Service
SMTP
Receive
Protocol
Agents
Categorizer
Routing SMTP Send
Agents
Submission Delivery
Queue Queue
Pickup/Repla
y Directory
SMTP from Mailbox Transport SMTP to Mailbox Transport
Submission service Delivery service
12. Mailbox Transport Service Architecture
SMTP from Transport SMTP to Transport
Service Service
Mailbox Transport
SMTP Receive service SMTP Send
Hub Selector
(Router)
Store Driver
Deliver
Mailbox Store Driver Submit
Deliver
Mailbox
Agents Mailbox Submit
Assistants Agents
Mailbox Transport Delivery Mailbox Transport Submission
MAPI MAPI
Mailbox Database
13. Mailbox Transport
Two separate services to handle mail submissions (from the store) and
mail delivery (from the Transport service)
Mailbox Assistant and Store Driver combined
Leverages SMTP (encrypted) for communication with the Transport
component and TCP465 for inbound traffic
Leverages local RPC for delivery to store
Is stateless and does not have a persistent storage mechanism
14. Mailbox Transport
When receiving a message, the Mailbox Transport component can either
deliver the message or not deliver the message
If non-delivery is chosen, then the Mailbox Transport component must
provide a response back to Transport
• Retry delivery
• Generate an NDR
• Reroute the message
15.
16. Larger Mailbox Support
Large Mailbox Size is 100 GB+ Time Items Mailbox Size
Aggregate Mailbox = Primary Mailbox + Archive Mailbox + Recoverable Items
1 Day 150 11 MB
1 Month 3300 242 MB
1-2 years of mail (minimum) 1 Year 39000 2.8 GB
Increase IW productivity
Eliminate or reduce PST files
2 Years 78000 5.6 GB
Eliminate or reduce third-party archive solutions 4 Years 156000 11.2 GB
OST size control with Outlook 2013
17.
18. Modern Public Folders
Public folders based on the mailbox architecture
Single-master model Privat
Public logon
Public logon
Hierarchy is stored in a PF mailbox (one writeable) e
logon
Content can be broken up and placed in multiple mailboxes
The hierarchy folder points to the target content mailbox CAS2013
Hierarchy
Mailbox Content
Because it’s a mailbox, it’s in a mailbox database…thus, MBX
Mailbox
High availability achieved through continuous replication
MBX MBX
No separate replication mechanism 2013 2013 2013
Similar administrative features to current PFs
No end-user changes
19. Modern Public Folders
1 - User connects to their home Public Folder
mailbox first, which should be located near their
primary mailbox.
2- Folder contents live in one specific mailbox for
that folder. All content operations are redirected
to the mailbox for that folder
3 – Folder hierarchy changes are intercepted and
written to writeable copy of Public Folder
hierarchy
4 – All Public Folder mailboxes listen for hierarchy
changes and update similar to Outlook clients
5 - When a Public Folder mailbox gets full, move
some folders to a new mailbox
26. Managed Availability
All core Exchange functionality for a given mailbox is served by the
Mailbox server where that mailbox’s database is currently active
Mailbox access fails over when a database fails over
Protocols shift to the server hosting the active database copy
Managed Availability
Internal monitoring and high availability are tied together and can be used
to detect and recover from problems as they occur and are discovered
Best copy selection now includes health of services when selecting best
copy (best copy and server selection)
27.
28. Exchange Monitoring History
Exchange historically has relied on external applications like System
Center Operations Manager for monitoring
SCOM uses rules to collect data and performs actions after the data is
collected
Type of Monitoring Exchange 2010
Service not running Health manifest event rule
Performance counter Health manifest counter rule
Exchange events Health manifest event rule
Non-Exchange events Health manifest event rule
Scripts, cmdlets Health manifest script rule
Test cmdlets Test Cmdlets
29. Service Health Landscape
Component based monitoring does not tell the story
Exchange Online service experience resulted in the need to change our
approach to monitoring
Scale drives automation
Exchange Server 2013 reflects these learnings
30. Learnings
External monitoring solution required significant development
investment for the service
Investments did not accrue to on-premises Exchange 2010 product
High availability components separate from the monitoring and
recovery infrastructure affect end-to-end service availability goals
Scalability issues with 1000s of servers and databases
Monitoring solution had separate failure modes
Database health is not a true indicator of end-to-end service
Existing monitoring solution was focused on system and components, not on end user experience
31. Exchange 2013 Monitoring
Recovery oriented
Bringing the Monitoring based Protect experience
learnings from on the end user’s through recovery
the service to experience oriented computing
the enterprise
32. Cloud Trained
5+ Years of Directly Operating the Service
Since 2007, the Exchange Team has been operating a cloud version of Exchange
Knowledge Is Put Back Into the Product
Engineers are on-call for service related issues
Drives accountability for awareness and motivates team toward auto-recovery
Scale, Auto-Deployment, Optics, High Availability are key tenets
Decentralized complex processing
Rollouts don’t require extra configuration
33. User Focused
If you can’t measure it, you cannot manage it
Customer Touch Point Framework
Availability - Can I access the service?
Latency - How is my experience?
Errors - Am I able to accomplish what I want?
35. Recovery Oriented
NLB CAS-1 DAG
MBX-1
—OWA send
OWA DB1 DB2 —OWA failure
—OWA fast recovery
—OWA verified as healthy
MBX-2 —OWA send
OWA DB1 DB2 —OWA failure
CAS-2 —OWA fast recovery
—Failover server’s databases
MBX-3 —OWA verified as healthy
—Server becomes “good”
OWA DB1 DB2 failover target (again)
36. Managed Availability Framework
ESCALATE
“take human Exchange
driven action”
Server
Managed
Availability
CHECK MONITOR RECOVER
“state of the “restore service or
world” prevent failure”
NOTIFY
Managed Availability
37. Probe Engine
PROBES
Measure customer’s perception of service
Typically synthetic end-to-end client transactions
PROBE
CHECKS
Measure actual customer traffic and become aware when they
CHECK
are experiencing issues
Typically implemented as performance counters where
thresholds can be set to detect spikes in customer failures
NOTIFY NOTIFY
Take action immediately based on a critical event
Typically exceptions or conditions that can be detected without
a large sample set
38. Monitors
MONITORS
Query the data collected by the probes and determine if an action
needs to occur based on a rule set
ESCALATE
“take human driven
action”
Depending on the rule, a monitor can escalate or initiate a
responder
Monitors can be
Healthy, Degraded, Unhealthy, Repairing, Disabled, or
Unavailable
Defines the time from failure that a responder is executed
MONITOR
“state of the world”
39. Responders
RESPONDER
A “plug-in” that executes a response to an alert generated by a
monitor
ESCALATE
“take human driven
action”
Built-in sequencing mechanism to control recovery actions
Several Types of Responders
Restart Responder – Terminates and restarts service
Reset AppPool Responder – Cycles IIS application pool
Failover Responder – Takes a MBX server out of service
Bugcheck Responder – Initiates a bugcheck of the server
RECOVER Offline Responder- Takes a protocol on a server out of service
“restore service or
prevent failure” Online Responder – Places a machine back into service
Escalate Responder – Escalates an issue
Specialized Component Responders
40. Reporting
Reporting is structured into four health groups:
Customer Touch Points – components which effect the real time, customer facing interactions
(OWA, OLK, Mobile, UM, etc.)
Service Components – components without direct real time, customer interactions (MRS, OABGen)
Server Components – physical resources of the physical server (disk space, memory, network)
Dependency Availability – server’s ability to call out to dependencies (AD, DNS, etc.)
Health groups are exposed in SCOM
41. Health Sets
A health set is a group of monitors, probes and responders that
determine whether a component within the system is healthy
The health of the set will be evaluated by a “worst of” evaluation of the
monitors in the health set
For example, OWA has these types of health sets…
42. Health Sets
CTP Proxy
Health Set Health Set
OWA.Proxy
OWA Protocol
Health Set
OWA.Protocol
43. Viewing Health Set Data
Get-ServerHealth is used to see raw health data for a server or set of
servers
Get-HealthReport operates on raw health data and provides snapshot
report
Get-MonitoringItemIdentity can be used to determine the
probes, monitors and responders that are associated with a given health
set
44. Overrides
Admins can alter the thresholds and parameters used by the
probes, monitors and responders
Enables emergency actions
Enables fine tuning of thresholds specific to the environment
Can be deployed for specific servers or for the entire environment
Server related overrides are stored in the registry
Global overrides are stored in Active Directory
Can be set for a specified duration or to apply to a specific version of the
server
Are not immediately implemented; Exchange Health Service only reads
configuration every 10 minutes (and global changes depend on AD
replication)
Wildcards are not supported (cannot override entire health set in one
activity)
45. Overrides
See what overrides have been set
Get-ServerMonitoringOverride –Server <Server>
Get-GlobalMonitoringOverride
Create an override
Add-ServerMonitoringOverride <HealthSet><Name> -Server <Server> -ItemType <Monitor,Probe,Responder> [-
Duration <Time> -ApplyVersion <Version>] -PropertyName <Property> -PropertyValue <Value>
Add-GlobalMonitoringOverride <HealthSet><Name> -ItemType <Monitor,Probe,Responder> [-Duration <Time> -
ApplyVersion <Version>] -PropertyName <Property> -PropertyValue <Value>
Remove Override
Remove-ServerMonitoringOverride
Remove-GlobalMonitoringOverride
46.
47. Transport Availability Improvements
Every message is redundantly persisted before its receipt is
acknowledged to the sender
Delivered messages are kept redundant in transport, similar to active messages
Every DAG represents a transport HA boundary and owns its HA
implementation
If you have a stretched DAG, you also have transport site resilience
Resubmits due to transport DB loss or MDB *over are fully automatic and do not require any manual
involvement
48. Shadow Redundancy Improvements
Same fundamental concept as in Exchange 2010, with new
implementation in Exchange 2013
All mail is made redundant on a another server
Shadow messages are queued until Primary server successfully delivers the mail
Shadow server regularly heartbeats Primary server for status on the primary copy
On Primary server failure, Shadow server self-promotes itself as the Primary and delivers mail
49. Shadow Redundancy Improvements
Guaranteed Redundancy
New transport configuration – RejectOnShadowFailure ensures that no message is acknowledged
and accepted unless a shadow copy was first created
Messages are made redundant on other servers within a DAG or another site
Messages are tried for a configurable amount of time before giving up and rejecting the message
50. Safety Net
Introduced in Office 365 to redundantly store all mail for a configured time
span to protect against mailbox irrecoverable failures
SafetyNet retains data for a set period of time, regardless of whether the
message has been successfully replicated to all database copies or
delivered to final destination
Consolidates, improves and replaces Transport Dumpster
Processes replay requests from “primary” or “shadow” SafetyNet for
lossy mailbox failovers
51. Summary
Exchange Server 2013 uses Building Blocks to facilitate deployments
at all scales – from self-hosted, small organizations to Office 365
Exchange Server 2013 provides you with an architecture that is
Flexible, Scalable, and Simpler and helps customers reduce costs