This document provides an overview of configuring mailbox servers in Exchange Server 2010, including:
1) Configuring mailbox database roles and public folders using the Exchange Management Console and Exchange Management Shell.
2) Topics on mailbox and public folder databases, storage options, managing mailbox size limits, and considerations for implementing databases.
3) Configuring public folders, how clients access public folders, and when to use SharePoint instead.
4) A lab scenario on configuring mailbox databases and public folders.
Develop skills to prepare for installing, configuring and performing ongoing maintenance of a Microsoft Exchange Server 2013 infrastructure.
Help prepare for certification exam 70-341.
Learn best practices.
Develop skills to prepare for installing, configuring and performing ongoing maintenance of a Microsoft Exchange Server 2013 infrastructure.
Help prepare for certification exam 70-341.
Learn best practices.
Develop skills to prepare for installing, configuring and performing ongoing maintenance of a Microsoft Exchange Server 2013 infrastructure.
Help prepare for certification exam 70-341.
Learn best practices.
Develop skills to prepare for installing, configuring and performing ongoing maintenance of a Microsoft Exchange Server 2013 infrastructure.
Help prepare for certification exam 70-341.
Learn best practices.
Develop skills to prepare for installing, configuring and performing ongoing maintenance of a Microsoft Exchange Server 2013 infrastructure.
Help prepare for certification exam 70-341.
Learn best practices.
Develop skills to prepare for installing, configuring and performing ongoing maintenance of a Microsoft Exchange Server 2013 infrastructure.
Help prepare for certification exam 70-341.
Learn best practices.
You may be a pro at administering a Domino server, but that doesn't mean you understand everything under the hood. Learn the no-fuss, no-frills, simple explanations of the most common Domino concepts and find out exactly how they work, and how to apply this knowledge to help avoid problems and improve performance. You'll learn how reader fields work, how replication and cluster replication works, mail routing including SMTP, the secrets of ACLs, ID file details, Adminp, busytime, cross-certification, recertifying, Domino domains, transaction logging, view indexes, and more. Learning the entire concept behind the "stuff" that's in Domino will make you a better troubleshooter, a faster problem-solver, and an all-around great admin!
BP108 Admin for the Developer -- Build and Secure Your Own IBM Lotus Domino S...NerdGirlJess
Are you a developer who has only worked with a Domino server already in place? Would you like to learn how to start from scratch and make sure you still end up secure? This session will teach developers who have no prior admin experience get a Domino server up and running. In one hour, learn to create your own development playground by walking through a complete install and basic configuration of a Domino server. You’ll use the Administrator client to create user IDs, and configure and secure Domino as both an SMTP and web server. Learn how to set up your firewall or router to access your server from the Internet. Finally, keep your server running smoothly by providing regular maintenance!
Are your servers running out of disk space? Do you have more than one bit like attachment stored in your databases? Does a standard task like fixup lasts for ages or does your backup still runs during working hours? Do you have quota enabled and your users are asking for more space?
If you can answer one or more of these questions with YES, than this session is for you.
Maximize the disk space savings provided by Domino Attachment and Object Service (DAOS) and ensure that your environment is properly configured for best performance with this feature. Save more space by simply enabling design and document compression. Make sure that your attachments use best compression too. Reduce network bandwidth when replicating databases between servers and increase mail quotas without using more disk space.
Target audience is administrators or decision makers who want to know more about some older but not yet used space savers and especially about DAOS.
Presentation held on 30-Mar-2010 at the BLUG conference in Brussels.
24 Hours Of Exchange Server 2007 ( Part 7 Of 24)guestef2a2b
Configuring Exchange Server 2007 Part 2
[There may be some inconsistencies as I have not had a chance to go through and clean up. This usually involves terminology].
You may be a pro at administering a Domino server, but that doesn't mean you understand everything under the hood. Learn the no-fuss, no-frills, simple explanations of the most common Domino concepts and find out exactly how they work, and how to apply this knowledge to help avoid problems and improve performance. You'll learn how reader fields work, how replication and cluster replication works, mail routing including SMTP, the secrets of ACLs, ID file details, Adminp, busytime, cross-certification, recertifying, Domino domains, transaction logging, view indexes, and more. Learning the entire concept behind the "stuff" that's in Domino will make you a better troubleshooter, a faster problem-solver, and an all-around great admin!
BP108 Admin for the Developer -- Build and Secure Your Own IBM Lotus Domino S...NerdGirlJess
Are you a developer who has only worked with a Domino server already in place? Would you like to learn how to start from scratch and make sure you still end up secure? This session will teach developers who have no prior admin experience get a Domino server up and running. In one hour, learn to create your own development playground by walking through a complete install and basic configuration of a Domino server. You’ll use the Administrator client to create user IDs, and configure and secure Domino as both an SMTP and web server. Learn how to set up your firewall or router to access your server from the Internet. Finally, keep your server running smoothly by providing regular maintenance!
Are your servers running out of disk space? Do you have more than one bit like attachment stored in your databases? Does a standard task like fixup lasts for ages or does your backup still runs during working hours? Do you have quota enabled and your users are asking for more space?
If you can answer one or more of these questions with YES, than this session is for you.
Maximize the disk space savings provided by Domino Attachment and Object Service (DAOS) and ensure that your environment is properly configured for best performance with this feature. Save more space by simply enabling design and document compression. Make sure that your attachments use best compression too. Reduce network bandwidth when replicating databases between servers and increase mail quotas without using more disk space.
Target audience is administrators or decision makers who want to know more about some older but not yet used space savers and especially about DAOS.
Presentation held on 30-Mar-2010 at the BLUG conference in Brussels.
24 Hours Of Exchange Server 2007 ( Part 7 Of 24)guestef2a2b
Configuring Exchange Server 2007 Part 2
[There may be some inconsistencies as I have not had a chance to go through and clean up. This usually involves terminology].
Corporate-informatica-training-in-mumbaiUnmesh Baile
Vibrant Technologies is headquarted in Mumbai,India.We are the best Informatica training provider in Navi Mumbai who provides Live Projects to students.We provide Corporate Training also.We are Best Informatica classes in Mumbai according to our students and corporates
Corporate-informatica-training-in-mumbaiUnmesh Baile
Vibrant Technologies is headquarted in Mumbai,India.We are the best Informatica training provider in Navi Mumbai who provides Live Projects to students.We provide Corporate Training also.We are Best Informatica classes in Mumbai according to our students and corporates
Informatica Online Training By Keylabstraining.com with Real time and certified consultants. In this Informatica Training we will teach you basic Data base training and also we will cover some Unix concepts . And also we can provide you Video recordings.
Contact: info@keylabstraining.com , +91- 9550645679(IND) , +1-908-366-7933( USA).
SharePoint online training offered by Quontra Solutions with special features having Extensive Training will be in both SharePoint Online Training and Placement. We help you in resume preparation and conducting Mock Interviews.
Emphasis is given on important topics that were required and mostly used in real time projects. Quontra Solutions is an Online Training Leader when it comes to high-end effective and efficient IT Training. We have always been and still are focusing on the key aspect which is providing utmost effective and competent training to both students and professionals who are eager to enrich their technical skills.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
14. Initial Mailbox Configuration Tasks The initial Mailbox server role tasks are: Secure the server Configure public folders Create and configure databases Configure the offline address book Configure recipients
15.
16.
17. What Are the Database File Types? A database consists of a collection of file types, each of which performs a different function File Type Purpose <Log Prefix>.chk Checkpoint file <Log Prefix>.log Current transaction log file <Log Prefix>xxxxxxxx.log Transaction log file that was already renamed and filed <Log Prefix>res00001.jrs Reserved transaction logs <Log Prefix>res00002.jrs Reserved transaction logs Tmp.edb Temporary workspace for processing transactions <Log Prefix>tmp.log Transaction log file for the temporary workspace <File Name>.edb Rich text database files that stores content for mailbox and public folder databases
18. Mailbox Database Update Process Receive message 1 Write message 2 3 Write to DB 4 Update 5 Client access
30. What Are Public Folders? A public folder is a repository for different information types All Public Folders Public Folders Internet Newsgroups HR Business Handbook Personnel Forms Marketing Products Public folder tree
32. Configuring Public Folder Replication The messaging administrator controls the destination frequency of the folder Service Replication Component AD DS and Active Directory Public folder directory objects Microsoft Exchange Information Store service Public folder trees Public folder contents
33. How Clients Access Public Folders Server 5 Server 4 Site Z Site Y Site X Site W Cost=10 User Server 1 Server 2 Server 3 Cost=30 Cost=50 Public Folder Server Server 1 Server 2 Server 3 Server 4 Server 5 Connector Cost N/A N/A N/A N/A Site Link A 10 Site Link C 30 Site Link B 50
36. When to Use SharePoint Instead of Public Folders Scenario Using Public Folders? New to Public Folders? Document Sharing SharePoint may be a better option SharePoint is a better option Calendar Sharing No need to move Use either Contact Sharing No need to move Use either Discussion Forum No need to move Use either Distribution Group Archive No need to move Use either Custom Applications SharePoint may be a better option SharePoint may be a better option Organizational Forms No need to move Use InfoPath
Module 2: Configuring Mailbox Servers Course 10135A Presentation: 50 minutes Lab: 45 minutes After completing this module, students will be able to: Configure Mailbox servers. Configure Mailbox server components. Required materials To teach this module, you need the Microsoft® Office PowerPoint® file 10135A_02.ppt. Important: We recommend that you use PowerPoint 2002 or a later version to display the slides for this course. If you use PowerPoint Viewer or an earlier version of PowerPoint, all the features of the slides might not be display correctly. Preparation tasks To prepare for this module: Read all of the materials for this module. Practice performing the demonstrations and the lab exercises. Work through the Module Review and Takeaways section, and determine how you will use this section to reinforce student learning and promote knowledge transfer to on-the-job performance. Note about the demonstrations : To prepare for the demonstrations, start the 10135A-VAN-DC1 virtual machine and log on to the server before starting the other virtual machines. To save time during the demonstrations, log on to the Exchange servers and open the Exchange Server management tools before starting the demonstrations. Additionally, connect to the Microsoft Outlook® Web App site on the Exchange servers, and then log on as Administrator. It can take more than a minute to open the management tools and Outlook Web App for the first time. Make sure that students are aware that the Course Companion CD contains additional module information and resources.
In this demonstration, you will discuss the main features of the Exchange Management Console and identify where the user can find information for each of its major sections. Be sure to discuss the Actions pane, and how you can use it to explore management functionality. Since this will be the first time many of the students will have seen the console, be sure to point out each work area, and the major functions and tasks that they can accomplish in each. Preparation Ensure that the 10135A-VAN-DC1 and the 10135A-VAN-EX1 virtual machines are running. Log on to the virtual machines as Administrator with the password of Pa$$w0rd . Demonstration On VAN-EX1, click Start , click All Programs , click Exchange Server 2010 , and then click Exchange Management Console . Expand Microsoft Exchange On-Premises . Describe the console’s layout: The Console Tree on the left, the Content pane in the middle, and the Actions pane on the right. Point out that the Console Tree has four nodes: Organization Configuration, Server Configuration, Recipient Configuration, and Toolbox. Expand each of the nodes to view the available information. In the Console Tree, expand Organization Configuration , click Mailbox , and then view the available information in the Content pane. In the Console Tree, expand Server Configuration , click Mailbox , and then view the available information in the Content pane. In the Console Tree, expand Recipient Configuration , click Mailbox , and then view the available information in the Content pane. Module 2: Configure Mailbox Servers Course 10135A
Question: Does the Exchange Management Console have the same functionality as it did in previous Exchange Server versions? What is different about this version? Answer: In Exchange Server 2010, you use the Exchange Management Console to configure computers running Exchange Server. Exchange Server organizes all configuration options in the Exchange Management Console logically into role-based settings. In versions previous to Exchange Server 2007, users could configure Exchange Server with the Exchange System Manager. In Exchange System Manager, all options are available in the properties dialog box of the server or the organization. Therefore, the Exchange System Manager is not role-oriented. Question: Does the Exchange Management Console organization seem logical to you? Why? Answer: Depending on student experience, answers will vary. However, students should see that the management structure correlates to the server roles. References Microsoft® Exchange Server 2010 Help file Module 2: Configuring Mailbox Servers Course 10135A
Lead a class discussion about the Exchange Management Shell. Discuss how Exchange Management Shell and Exchange Management Console runs on top of Microsoft Windows® PowerShell™ 2.0, and how it uses Windows PowerShell remoting. Discuss that c mdlets typically are designed around a repetitive administrative task, and that the shell provides more than 600 cmdlets for Exchange-specific management tasks. These are available in addition to the non-Exchange Server system cmdlets included in the basic Windows PowerShell shell design. Ensure that the students understand that Windows PowerShell is more than just a command-line interface, in that it also provides a comprehensive scripting engine that you can automate with programs. References Exchange Server 2010 Help: Open the Shell and Understanding Role Based Access Control Module 2: Configuring Mailbox Servers Course 10135A
Lead a class discussion about the benefits for Remote Window PowerShell. Since this is a change from Exchange Server 2007, many students will be unfamiliar with Remote Windows PowerShell and that Exchange Server 2010 builds on the success of Exchange Server 2007’s usage of Windows PowerShell 1.0 by leveraging its remote functionality within Windows PowerShell 2.0. Remote Windows PowerShell 2.0 enables the following main benefits: Role Base Access Control (RBAC). RBAC provides a more manageable way to assign granular permissions to administrators. RBAC enables you to align the roles you assign users and administrators more closely to their actual roles in your organization. Whereas, in Exchange Server 2007, the server permissions model applied only to the administrators that managed the Exchange Server 2007 infrastructure, RBAC now controls both the administrative tasks that you can perform and the extent to which users can conduct self-administration tasks. RBAC controls who can access what, and where, through management roles, assignments, and scopes. Using remote Windows PowerShell allows you to run the cmdlets on the server while controlling how they are executed. Client/server management model . Cmdlets run remotely from the server rather than on the management server. This allows the server to process the client requests, thereby reducing their impact. Since the cmdlets are run on the remote server, not the client, you only need to install Windows PowerShell 2.0 on the management machine if you do not need to use the graphical user interface (GUI) tools. Standard protocols allow easier management through firewalls . Remote Windows PowerShell leverages Windows Remote Management (WinRM) for connectivity through standard HTTPS connections, which is often open on many corporate firewalls. If time permits discuss some of the scenarios that Remote Windows PowerShell enables, such as simplified cross-domain management, management from workstations that do not have installed management tools, management through firewalls, and the ability to throttle resources that management tasks consume. Module 2: Configuring Mailbox Servers Course 10135A
Mention that each cmdlet is formed with a verb and a noun. Mention some of the common verbs. Then discuss how pipelining works to send data between cmdlets. This may be a good time to see if any students have had experience with other shells. References: Cmdlet verb names:http://go.microsoft.com/fwlink/?LinkId=179883 Module 2: Configuring Mailbox Servers Course 10135A
In this demonstration, you will discuss Exchange Management Shell dependency on Windows PowerShell 2.0, and describe Exchange Management Console cmdlets. You will demonstrate how to create a mailbox, and how to use Windows PowerShell scripting and pipelining to change the address on multiple mailboxes. You also will describe basic cmdlet aliases. Mention that each cmdlet is formed with a verb and a noun. Review a list of cmdlets by running Get-Command . During the demonstration, discuss how to use Windows PowerShell scripting and pipelining to change the address on multiple mailboxes. Mention aliases such as FL for Format-List . Preparation Ensure that the 10135A-VAN-DC1 and the 10135A-VAN-EX1 virtual machines are running. Log on to the virtual machines as Administrator with the password of Pa$$w0rd . Demonstration Steps 1. On VAN-EX1, click Start , click All Programs , click Exchange Server 2010 , and then click Exchange Management Shell . 2. Run Get-Mailbox , and then view the output. 3. Run Get-Mailbox | Format-List , and then view the output. 4. Run Get-Mailbox | fl , and then verify that it is identical to the previous output, since fl is an alias for Format-List . 5. Run Get-Mailbox | Format-Table , and then view the output. Explain that the format is different from the previous output. 6. Run Get-Mailbox | ft Name, Database, IssueWarningQuota . Explain that the table output shows only the fields you specify. 7. Run Get-Help New-Mailbox to view the basic help for New-Mailbox. 8. Run Get-Help New-Mailbox -detailed to view the detailed help for New-Mailbox. 9. Run Get-Help New-Mailbox -examples to view just the examples that the help provides. 10. Create a variable by running $Temp = “Text” Module 2: Configuring Mailbox Servers Course 10135A
11. Run $Temp to view the variable’s contents . 12. Run $password = Read-Host &quot;Enter password&quot; –AsSecureString to prompt the user for a password. Emphasize that to assign a password to a new user, you must specify the Read-Host command with the –AsSecureString switch, because you cannot store passwords as simple strings. Type Pa$$W0rd and press ENTER. 13. Run New-Mailbox -UserPrincipalName chris@contoso.com -Alias Chris -Database &quot;Mailbox Database 1&quot; -Name ChrisAshton -OrganizationalUnit Users -Password $password -FirstName Chris -LastName Ashton -DisplayName &quot;Chris Ashton&quot; -ResetPasswordOnNextLogon $true to create a new and secure mailbox for user Chris Ashton. Module 2: Configuring Mailbox Servers Course 10135A
Use these examples to illustrate the power of the Exchange Management Shell. When you discuss each example, break down each command’s individual components, and explain each piece. Focus less on the cmdlet function and more on the cmdlet’s syntax and construction. Module 2: Configuring Mailbox Servers Course 10135A
Lead a class discussion on the Exchange Control Panel (ECP), which is a new feature in Exchange Server 2010 that builds on the Outlook Web App options by adding many functions that empower users to manage their own information when they have access granted through RBAC. The ECP is available through a link in Outlook Web App. Although the ECP is used to empower users to manage their own mailbox, it also allows authorized users to view e-discovery information and perform some administrative tasks. When discussing the Exchange Control Panel, it may be beneficial to show the students an ECP example. Module 2: Configuring Mailbox Servers Course 10135A
Discuss the steps that you need to complete after you deploy the Mailbox server role. Use this topic to set the ground work for the remainder of the lesson. Additionally, use this opportunity to ask the students what they think each of the configuration tasks entail. Also, ask if any have had experience completing these tasks with either Exchange Server 2010 or a previous Exchange Server version. Module 2: Configuring Mailbox Servers Course 10135A
In this demonstration, you will show how to configure the Mailbox server role. The Mailbox server role has few properties that you configure at the Exchange server level. In the Exchange Management Console, you can view the domain controller and global catalog server that the server uses. Preparation Ensure that the 10135A-VAN-EX1 virtual machine is running. Log on to the virtual machine as Administrator with the password of Pa$$w0rd . Demonstration Steps 1. On VAN-EX1, click Start , click All Program , click Exchange Server 2010 , and then click Exchange Management Console . 2. In the Console Tree, expand Microsoft Exchange On-Premises , expand Server Configuration , and then click Mailbox . 3. In the Mailbox pane, select VAN-EX1 . Describe the available options in the Actions pane: Manage Diagnostic Logging Properties , Switchover Server, and Properties . 4. In the Actions pane, under VAN-EX1 , click Properties . 5. View the properties on the General tab, and then select System Settings . 6. View the options on the System Settings tab, and then select Messaging Records Management . 7. View the options on the Messaging Records Management tab, and then close the Properties dialog box. 8. Click Manage Diagnostic Logging in the Actions pane, and then view the logging options. Question: What additional tasks do you need to perform on the Mailbox server role after the Exchange Server 2010 installation occurs? Answer: You must complete all of the post-installation steps, including creating and configuring databases, securing the server, and configuring recipients and the offline address book. Module 2: Configuring Mailbox Servers Course 10135A
To properly manage Mailbox servers, students should know how Mailbox servers store mailbox and public folder contents. Exchange Server 2010 stores mailbox and public folder contents in databases to enhance performance and reduce storage utilization. Discuss the structure and function of Exchange Server databases: Each database consists of a single rich text database (.edb) file. All messages are stored in this database regardless of what type of client sends or reads the messages. In Exchange Server 2010, each database has a single set of transaction logs. The transaction log stores the data changes for a database. Data changes include all messages sent to or from the database. Transaction logs are an essential during disaster recovery if you need to restore a mailbox or public folder database. Note that t he Exchange Server 2010 database schema was changed significantly to improve its performance over previous Exchange Server versions. Discuss the importance of database and transaction log file location. By default, all databases and transaction logs for a single database are stored in one folder within the Exchange Server directory (C:\\Program Files\\Microsoft\\Exchange Server\\v14\\Mailbox). Each database has its own folder. Although Exchange Server does not require separating databases and transaction logs, given the appropriate redundancy, this separation does increase recoverability, and you should consider it if your organization does not employ other availability options. If the disk holding a database fails, the transaction logs are required to recover recent activity since the last backup. You can recover only to the point of the last back up, if the transaction logs are stored on the same disk as the database files. In Exchange 2000 Server and Exchange Server 2003, there was an option to create multiple databases and have them share a set of transaction logs. This was called a storage group. In Exchange Server 2007, having multiple databases in a storage group was available only for databases that did not have high availability features enabled. In Exchange Server 2010, there is no option to have multiple databases to share a single set of transaction logs. Module 2: Configuring Mailbox Servers Course 10135A
Explain that a database consists of a collection of file types, each of which performs a different functions. Use the following notes to discuss the database file types. If necessary, write the list of files on the board to use while discussing the next topic: <Log Prefix>.chk . This is the checkpoint file that determines which transactions require processing to move the checkpoint file from the transaction log file to the database. An example is E00.chk. This checkpoint file is several kilobytes in size and does not grow. <Log Prefix>.log . This is the database’s current transaction log file. An example is E00.log. The maximum amount of data storage for this file is 1 megabyte (MB). When this file reaches its maximum storage of 1 MB, Exchange Server renames it and creates a new current transaction log. <Log Prefix>xxxxxxxx.log . This is a transaction log file that has been renamed and filed. An example is E000000000001.log. Each transaction log file is always 1 MB. <Log Prefix>res00001.jrs and <Log Prefix>res00002.jrs . These are the reserved transaction logs for the database. Exchange Server 2010 uses these only as emergency storage when the disk becomes full and it can write no new transactions to disk. When Exchange Server 2010 runs out of disk space, it writes the current transaction to disk, and then dismounts the database. The reserved transaction logs ensure minimal loss of data that is in transit to the database. The reserved transaction logs always are 1 MB each. Tmp.edb . This is a temporary workspace for processing transactions. Exchange Server 2010 deletes the contents of this file when the it dismounts the database or when the Microsoft Exchange Information Store service stops. This file typically is a few megabytes in size. <Log Prefix>tmp.log . This is the transaction log file for the temporary workspace. An example is E00tmp.log. This file does not exceed 1 MB. <File Name>.edb . This is the rich-text database file that stores content for mailbox and public folder databases. An example is Mailbox Database.edb. Each mailbox or public folder database is contained in a single file. Database files can grow very large, depending on the content that the database stores. Module 2: Configuring Mailbox Servers Course 10135A
Discuss the process that the Mailbox server uses when it receives data, as follows: The Mailbox server receives the message. The Mailbox server writes the message to the current transaction log and memory cache simultaneously. Note: If the current transaction log reaches 1 megabyte (MB) of storage, Exchange Server 2010 renames it and creates a new current transaction log. 3. The Mailbox server writes the transaction from memory cache to the appropriate database. 4. The Mailbox server updates the checkpoint file to indicate that the transaction was committed successfully to the database. 5. Clients can access and read the message in the database. When time permits, identify the files from the previous slide that each step of this process affect. Module 2: Configuring Mailbox Servers Course 10135A
After planning the appropriate location for your databases and transaction logs, you must implement the plan. In this demonstration, you will show how to move databases and transaction logs. You will discuss other options available for databases, such as circular logging and the maintenance schedule. Mention that online maintenance in Exchange 2010 performs database and mailbox cleanup. However, defragmentation now occurs continuously, and you cannot schedule it. Preparation Ensure that the 10135A-VAN-EX1 virtual machine is running. Log on to the virtual machine as Administrator with the password of Pa$$w0rd . Demonstration Steps 1. On VAN-EX1, if required, click Start , click All Programs , click Exchange Server 2010 , and then open Exchange Management Console . 2. In the Console Tree, expand Microsoft Exchange On-Premises , expand Organization Configuration , and then click Mailbox . 3. Select the Database Management tab, right-click on Mailbox Database 1 , and then choose Properties . 4. View the properties on the General tab, and then select the Maintenance tab. 5. View the properties on the Maintenance tab, and then select the Limits tab. 6. View the properties on the Limits tab, and then select the Client Settings tab . 7. Close the Properties dialog box. 8. Select Mailbox Database 1 , and then click Move Database Path in the Actions pane. 9. In the Move Database Path wizard, type a new database file path ( C:\\NewFolder1\\DB\\Mailbox Database 1.edb ) and log folder path ( C:\\NewFolder1\\Logs\\ ), and then click Move . 10. Confirm and complete the move process. Module 2: Configuring Mailbox Servers Course 10135A
If time permits, demonstrate moving the database files using the Exchange Management Shell: 1. Logon to VAN-EX1 with you administrator account, and then open the Exchange Management Shell. 2. Run Move-DatabasePath -id ‘Mailbox Database 1’ -LogFolderPath ‘C:\\NewFolder2\\Logs\\’ . 3. Run Move-DatabasePath -Id ‘Mailbox Database 1’ -EdbFilePath ‘C:\\NewFolder2\\DB\\Mailbox Database 2.edb’ . Question: When would you need to move the path of the transaction logs or databases? Answer: You may need to move the database files during the initial configuration to ensure that the files are on the appropriately configured disks. Question: When might you use circular logging? Answer: Enabling circular logging allows transaction logs to be overwritten after they are committed to the database. Since Exchange Server does note maintain transaction logs, they are not available for use in recovery. You would use this option when you do not require the need to recover data between full backups. However, we never recommend this option in a single-server production environment. Module 2: Configuring Mailbox Servers Course 10135A
Discuss how the storage performance changes made in Exchange Server 2007 extend to Exchange Server 2010. These features help reduce hardware costs. When choosing storage for Mailbox servers, you need to ensure that the storage meets your organization’s business and technical requirements. Organizations typically separate disk requirements into performance and redundancy requirements. Question: How can storage improvements decrease hardware costs? Answer: Reducing the input/output (I/O) requirements reduces the performance that an organization requires from storage. This in turn reduces the number of disks and disk usage, which in turn reduces the cost of the storage system. Module 2: Configuring Mailbox Servers Course 10135A
Lead a discussion about disk storage options and about Redundant Array of Independent Disks (RAID) technologies. The students should understand the general pros and cons for each major technology. Although there are very few hard and fast rules, the basic concepts are the same across all implementations of these technologies. Stress that since the Exchange Server 2010 disk I/O requirements are lower than in previous Exchange Server versions, more storage options are available. Explain that an organization should take care in ensuring that the storage option it selects meets its business and technical requirements for the Exchange Server deployment. Tools are available to approximate usage patterns, such as Load Simulator and JetStress. Explain that you can use these tools to test the suitability of various hardware configurations in your environment. RAID Options RAID increases disk-access performance and fault tolerance. Mention that JBOD—or Just a Bunch of Disks—is a collection of disks that have no redundancy or fault tolerance. Usually, JBOD solutions cost less than RAID-based solutions. You can add fault tolerance by using multiple copies of the databases on separate disks. The most common RAID options are: RAID 0 (striping). Increases read and write performance by spreading data across multiple disks. However, it offers no fault tolerance. Performance increases as you add more disks. You add fault tolerance by using multiple copies of the databases on separate RAID sets. RAID 1 (mirroring). Read performance is faster than a single disk, but write performance is slower than RAID 0. Half of the disks are used for data redundancy. RAID 0+1 (mirrored striped sets). Provides very fast read and write performance with excellent fault tolerance. Half of the disks are used for redundancy. RAID 5 (striping with parity). If any one disk fails, the missing data is calculated based on the remaining disks. Read and write performance for RAID 5 is slower than RAID 0, but faster than RAID 1. At most, only one third of the disks are used to store parity information. RAID 6 (striping with double parity). If up to two disks fail, RAID 6 calculates the missing data based on data and parity information stored on the remaining disks. Read and write performance for RAID 6 is typically slower than RAID 0. RAID 6 does not have a read penalty. The main benefit of RAID 6 is the ability to rebuild missing data if you have up to two failures per RAID group, and to reduce the impact of rebuilding the RAID set when a disk fails. RAID 1+0 or RAID 10 (mirrored sets in a striped set). The difference between RAID 0+1 and RAID 1+0 is that RAID 1+0 creates a striped set from a series of mirrored drives. In a failed disk situation, RAID 1+0 performs better and is more fault tolerant than RAID 0+1. Module 2: Configuring Mailbox Servers Course 10135A
Describe direct attached storage as any disk system that connects physically to your server. This includes hard disks inside the server or those that connect by using an external enclosure . Some external enclosures include hardware-based RAID. For example, external disk enclosures can combine multiple disks in a RAID 5 set that appears to the server as a single large disk. In general, direct attached storage provides good performance, but suffers from limited scalability because of the unit’s physical size. You must manage direct attached storage on a per-server basis. Exchange Server 2010 is designed to perform well with the scalability and performance characteristics of direct attached storage. Explain that direct attached storage provides the following benefits: Lower cost Exchange Server solution . Direct attached storage usually provides a substantially lower purchase cost than other technologies. Easy to implement . Often direct attached storage is easy to manage and requires very little training. Distributed failure points . With separate disk systems for each Exchange server, failure of a single system will not negatively impact the entire Exchange messaging system, assuming that you configure the Exchange servers for high availability. Module 2: Configuring Mailbox Servers Course 10135A
Describe storage area network (SAN) as a network dedicated to providing servers with access to storage devices. A SAN provides advanced storage and management capabilities, such as data snapshots, in addition to high performance. SANs use either Fibre Channel switching or Internet SCSI (iSCSI) to provide fast and reliable connectivity between storage and applications. Fibre Channel switching or iSCSI allows many servers to connect to a single SAN. Fibre Channel is a standard SAN architecture that runs on fiber optic cabling. Because Fibre Channel is designed specifically for SANs, it is the fastest architecture available, and most SANs use it. SANs are complex and require specialized knowledge to design, operate, and maintain. Most SANs are also more expensive than direct attached storage. For cost-conscious SAN implementations, iSCSI may be a viable option. An iSCSI network encapsulates SCSI commands in TCP/IP packets over standard Ethernet cabling and switches. You should implement this technology only on dedicated storage networks that are 1 gigabit per second (Gbps) or faster. Module 2: Configuring Mailbox Servers Course 10135A
In this demonstration, you will discuss best practices for restricting user mailbox sizes on Mailbox servers. You will show students how to use the Exchange Management Console to configure storage quotas and use the Exchange Management Shell to bulk configure storage quotas. If many users store large amounts of e-mail in their mailboxes, your Mailbox servers will require significant storage space, or mailbox databases. Additionally, large mailbox databases require longer back-up and restore times, which affect the availability and reliability of your Exchange Server organization. Discuss the reasons for having proper limits set. Demonstrate how to set the following storage-limit thresholds: Issue warning at (KB) . When a mailbox reaches the size you specify, at a predetermined schedule (daily by default), mailbox-enabled users receive a message indicating that their mailboxes have become too large. Prohibit send at (KB) . When a mailbox reaches the size you specify, the user no longer can send messages and receives a warning message that the mailbox is too large. The mailbox can still receive messages. Prohibit send and receive at (KB) . When a mailbox reaches the size you specify, the user can no longer send or receive messages, and receives a warning message that the mailbox is too large. If the organization uses a Unified Messaging server, prohibiting e-mail reception can result in lost e-mail messages, voice-mail messages, and faxes. Most organizations elect not to use this option. You can also use Windows PowerShell to manage multiple databases at the same time. Preparation Ensure that the 10135A-VAN-DC1 and 10135A-VAN-EX1 virtual machines are running. Log on to the virtual machines as Administrator with the password of Pa$$w0rd . Demonstration Steps On VAN-EX1, if required, click Start , click All Program Files , click Exchange Server 2010 , and then click Exchange Management Console . In the Console Tree, expand Microsoft Exchange On-Premises , expand Recipient Configuration , and then click Mailbox. In the Content pane, right-click Luca Dellamore , and then choose Properties . Select the Mailbox Settings tab, and then double-click on Storage Quotas . Module 2: Configuring Mailbox Servers Course 10135A
Clear the Use mailbox database defaults check box Select the Prohibit send and receive at (MB) check box, and in the text box, type 10 . Click OK twice. Open the Exchange Management Shell. To configure the database limits with Exchange Management Shell, run Get-MailboxDatabase -Server VAN-EX1 | Set-MailboxDatabase -IssueWarningQuota 50MB . To configure just the user mailboxes that are contained in the Marketing organizational unit, run Get-Mailbox -OrganizationalUnit Marketing | Set-Mailbox -ProhibitSendQuota 75MB . Module 2: Configuring Mailbox Servers Course 10135A
Lead a discussion about the considerations for implementing Exchange Server storage consistently across organizations. Note that the storage-implementation details vary depending on organizational needs and size. In this discussion, you will review considerations for implementing Exchange Server storage, and how best to plan its implementation for your organization. Question: What should you consider when naming databases? Answer: Beginning with Exchange Server 2010, databases are no longer children of server objects, and a database can replicate to multiple Mailbox servers if you configure them for high availability. Therefore, as a best practice, you should not leverage the following with regards to database-naming conventions: The server name The Active Directory ® Domain Service (AD DS) or Active Directory directory service site name (for the site resilience case) The physical data center name (for the site resilience case) The Exchange Server organization name Question: When would you want or need to create multiple databases? Answer: You may discuss a number of reasons, depending on the students. Often, organizations create databases to separate users in different departments or geographical regions, or users that require different service levels. Maintaining a database at a manageable size also is important. You should size databases to fit on the available storage, yet still have enough room for growth. Additionally, their size should coincide with the backup and recovery times that you define for the messaging system. Question: Why would you want to reduce the number of databases? Answer: You may discuss several reasons, depending on the students. An organization may want to reduce the number of databases it has to reduce licensing needs and the amount of administration overhead that comes with having multiple databases. Additionally, each mounted database consumes additional memory on the server, so in some instances, it may be beneficial to limit how many databases you have. Question: What should you consider when planning to build additional Mailbox servers? Answer: You may need to place Mailbox servers in locations closer to the users to improve performance or reduce bandwidth charges. Adding additional Mailbox servers to the same site may be required to handle additional users or to handle increased usage from current users. Module 2: Configuring Mailbox Servers Course 10135A
Considerations Consider the following when implementing databases: Give each set of transaction logs its own hard disk . You may achieve the best performance when transaction logs do not share disks with any other data. However, if performance is not a consideration, and there are enough copies of the data, your organization may not require this. Use RAID 5 to enhance performance and fault tolerance for databases . RAID 5 increases read and write performance for random disk access and fault tolerance. Use RAID 1 to provide fault tolerance for transaction logs . RAID 1 keeps two complete copies of transaction logs for fault tolerance. and provides good write performance for serially written data. Use a SAN, which provides excellent scalability and manageability for storage in large Exchange Server organizations . A Fibre Channel SAN provides the best performance. However, this high level of performance may be more than you require to support organizational requirements. SANs also add considerable cost and complexity. Use the prohibit send at storage limit to manage storage growth . This storage limit forces users to address the size of their mailbox before sending additional messages. Halting message reception is risky, because important business data might get lost. However, a warning may not be enough encouragement for users to lower their mailbox size. Module 2: Configuring Mailbox Servers Course 10135A
Describe public folders and what you use them for. You can explain to the students that a public folder is a repository for different information types, such as e-mail messages, text documents, and multimedia files. A public folder database stores public folder contents, which you can share with Exchange Server organization users. Organizations typically use public folders as: A location to store contacts for the entire organization. Centralized calendars for tracking events. Discussion groups. A location in which to receive and store messages for a workgroup, such as the Help desk. A storage location for custom applications. Additionally, system public folders are used to support legacy Office Outlook versions for free/busy information, custom forms, and offline address books. One alternative to public folders is Windows SharePoint® Services, which is a Web-based platform used to centrally store data for the enterprise, workgroups, and individuals. You can create multiple SharePoint sites for specific task such as: Team collaboration. Project management. Help-desk management. Expense reimbursement. Vacation scheduling. Module 2: Configuring Mailbox Servers Course 10135A
For collaboration, Windows SharePoint Services goes beyond the capabilities offered by public folders. Some of the features that a SharePoint site offers are: Document collaboration, including checking in, checking out, and version control . This feature allows you to track the changes to documents over time, and prevent edits to multiple versions of a single document. Alerts sent out when content changes . Alerts enable you to monitor content and act when that content changes. For example, a project team could receive alerts automatically when the project schedule changes. Extensibility by developers for building applications . In some cases, public folders are used for managing application data. SharePoint sites can perform many of the same tasks. In one area, SharePoint services does not match Exchange Server functionality. That is in multimaster replication. Because Windows SharePoint Services is tied to Microsoft SQL Server ® , only one writable copy of the data is available at a time, whereas public folders can have multiple readable and writable copies of a public folder available around the globe. Public folder replication is discussed in the next topic. Module 2: Configuring Mailbox Servers Course 10135A
Discuss public folder replicas and replication. Be sure to mention that, by default, when you create a public folder, only one replica of that public folder exists within the Exchange Server organization. Using multiple replicas allows you to place public folder content in the physical server locations where users are located. This results in faster access to public folder content and reduces communication across wide area network (WAN) links between physical locations. Public folder replication also provides fault tolerance for public folders. Discuss public folder replication: Public folder replication is an e-mail-based process for copying public folder content between computers running Exchange Server . When data is changed on one public folder replica, those changes are made to all other replicas of that public folder. By default, public folder content is replicated every 15 minutes, and replication cannot be set to less than every minute. You also must replicate the public folder tree . Module 2: Configuring Mailbox Servers Course 10135A
Discuss the connection process for Messaging Application Programming Interface (MAPI)-based clients: If the public folder is located on the user account’s default public folder database, Exchange Server directs the client to this database for the public folder contents. If the public folder contents are not stored in the user account’s default public folder database, Exchange Server redirects the client to the Active Directory site that stores the public folder database. The Active Directory site must include a computer that is running Exchange Server 2010. If no computer running Exchange Server 2010 or Exchange Server 2007 in the local Active Directory site has a copy of the public folder contents, Exchange Server redirects the client to the Active Directory site with the lowest cost-site link that does have a copy of the public folder contents. If no computer running Exchange Server 2010 or Exchange Server 2007 has a copy of the public folder contents, Exchange Server redirects the client to a computer running Exchange Server 2003 that has a copy of the public folder contents, using the cost assigned to the routing group connector(s). Exchange Server 2010 does not enable this functionality by default. Rather, you must enable it with the Set-RoutingGroupConnector cmdlet. If no public folder replica exists on the local Active Directory site, a remote Active Directory site, or on a computer running Exchange Server 2003, the client cannot access the contents of the requested public folder. Note: For Outlook Web App clients to view public folders, a replica of the public folder must be available on an Exchange Server 2010 mailbox server. Module 2: Configuring Mailbox Servers Course 10135A
In this demonstration, you will use the Public Folder Management Console (PFMC), Exchange Management Shell, and Office Outlook to configure public folders. Demonstrate using the PFMC to add replicas and set permissions on a public folder. Demonstrate using Exchange Management Shell to add permissions to a public folder. Open Outlook and view the permissions assigned on the public folder via Exchange Management Shell. Preparation Ensure that the 10135A-VAN-DC1, 10135A-VAN-EX1 and the 10135A-VAN-CL1 virtual machines are running. Log on to the virtual machines as Administrator with the password of Pa$$w0rd . Demonstration Steps To use the PFMC to add replicas and set permissions on a public folder: 1. On VAN-EX1, if required, click Start , click All Program Files , click Exchange Server 2010 , and then open Exchange Management Console . 2. In the Console Tree, expand Microsoft Exchange On-Premises , and then expand Toolbox . 3. In the Content pane, double-click Public Folder Management Console . 4. If not already connected, in the Actions pane, click Connect to a Server , and then in the Connect to Server dialog box, click Browse . 5. In the Select Public Folder Servers dialog box, select VAN-EX1 , click OK , and then click Connect . 6. Select the Default Public Folders node in the Console Tree, and then click New Public Folder in the Actions pane. 7. In the New Public Folder Wizard , type Sales , click New , and then click Finish . 8. In the Content pane, right-click Sales , view the available options, and then click Properties . 9. View the information available on the General tab, and then select the Statistics tab. Module 2: Configuring Mailbox Servers Course 10135A
10.View the information available on the Statistics tab, and then select the Limits tab. 11. View the information available on the Limits tab, and then select the Replication tab. 12. Click Add , select PF2 on VAN-EX2, and then click OK . Click OK . To use the Exchange Management Shell to add permissions to a public folder: Open the Exchange Management Shell. Run Get-PublicFolderClientPermission \\Sales , and then view the results. Run Add-PublicFolderClientPermission \\Sales -AccessRights EditAllItems -User Jason . To use Outlook to view and edit public folder permissions: 1. On VAN-CL1, open Outlook. 2. Click Folder List in the Outlook bar. 3. Expand Public Folders , expand All Public Folders , right-click Sales , and then click Properties . 4. Select the Permissions tab, and then view the available options. Question: How is public folder management different in Exchange Server 2010 than in previous Exchange Server versions? Answer: Depending on the students’ experiences, they may talk about the lack of GUI-based management tools in the original release of Exchange Server 2007, or they may talk about the various tools, like PFAdmin, available in Exchange Server 2003. Module 2: Configuring Mailbox Servers Course 10135A
Discuss the features that SharePoint provides that are similar to public folders. Then discuss when you would choose one versus the other. In regards to using calendar sharing, contact sharing, discussion forums or distribution group archives depending on scope of scenario, use Exchange Server public folders or SharePoint. Also, regards to custom applications, depending on the application’s scope, use Exchange Web Services and/or SharePoint. Question: For what does your company currently use public folders and SharePoint? Answer: Answers will vary considerably. Some companies many choose to use public folders for shared mail queues, calendars, document repositories or discussion groups. Other companies may choose to use SharePoint for the same reasons. References http://go.microsoft.com/fwlink/?LinkId=179884 Module 2: Configuring Mailbox Servers Course 10135A
In this lab, students will configure mailbox databases and public folders. Exercise 1 In this exercise, students will configure mailbox databases. Exercise 2 In this exercise, students will configure public folders Before the students begin the lab, read the scenario associated with each exercise to the class. This will reinforce the broad issue that the students are troubleshooting, and will help to facilitate the lab discussion at the module’s end. Remind students to complete the discussion questions after the last lab exercise. Module 2: Configuring Mailbox Servers Course 10135A
Use the questions on the slide to guide the debriefing after students complete the lab exercises. Question: What happens to the database’s status when you move the database files? Answer: When you move database files, the database is taken offline. This causes the database to be unavailable, which means that end users cannot send and receive e-mail until the database is online again. Question: When you create a public folder, how many replicas does it have? Answer: When you create a public folder with the Public Folder Management Console in Outlook, only one replica is created. Therefore, to ensure that the data is redundant, you must add a replica. Module 2: Configuring Mailbox Servers Course 10135A
Review Questions Question: Which tools can you use to manage Exchange Server 2010? Answer: The Exchange Management Shell and the Exchange Management Console are the two main tools for managing Exchange Server. Additionally, the Exchange Management Console has several other tools that you can use. Question: What customizations can you make on mailbox databases? Answer: Mailbox database-configuration options include mailbox limits, journaling recipients, default public folder databases, maintenance schedules, and circular logging. Question: When can you use public folders? Answer: Exchange Server 2010 supports public folders fully, so you can use a variety of solutions. There are several solutions that work within public folders, but other products and technologies may better server them. Common Issues and Troubleshooting Tips Point the students to possible troubleshooting tips for the issues that this section presents. Real-World Issues and Scenarios Question: Your organization needs to determine which storage solution to deploy for the new Exchange Server 2010 messaging environment. What information should you consider when selecting the hardware? Answer: You should consider many facts when choosing storage. Your main focus should be on providing enough disk space and throughput that to meet your needs. There are tools that you can use to approximate the requirements and help you make an informed decision. Module 2: Configuring Mailbox Servers Course 10135A
Question: Your organization would like to automate creation of user mailboxes for employees based on their status in your organization’s human-resources system. What can you use to perform this automation? Answer: The Exchange Management Shell provides an interface for scripting administrative tasks, such as user creation and modification. You also can use Exchange Management Shell programmatically from inside other applications. Question: Your organization wants to reduce administrative costs. One suggestion is to give department heads and administrative assistants the necessary access to manage departmental and project-based groups. What can you use to accomplish this task? Answer: You can use the ECP and appropriate RBAC permissions to enable nontechnical personnel to manage groups. Best Practices Help the students understand the best practices that this section presents. Ask students to consider these best practices in the context of their own business situations. Tools Point out the location from which students can install each key tool. Let students review each tool’s function and usage on their own. Remind students that they can use this as a master list to help them gather all the tools required to facilitate their application-support work. Module 2: Configuring Mailbox Servers Course 10135A