SlideShare a Scribd company logo
1 of 44
Vu Nguyen Cao Son Technology Specialist Microsoft Vietnam [email_address] www.CaoSonBlog.com
Today’s Business Environment What customers tell us ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],IT Decision Makers Employees IT Pros
Today’s Business Environment Investment Themes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Built-in  Protection Anywhere  Access Operational  Efficiency
1. Built-in Protection Anti-spam & Anti-Virus ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],June 5, 2009  | Page
June 5, 2009  | Page    ,[object Object],[object Object],[object Object],1. Built-in Protection Anti-spam & Anti-Virus – Option 1: On-site protection Firewall Mailbox Server Hub Transport  Server Edge Transport Server  Client Access Server DMZ SMTP Internet
1. Built-in Protection Anti-spam & Anti-Virus –  Option 1: On-site protection
June 5, 2009  | Page    ,[object Object],[object Object],[object Object],Mailbox Server Hub Transport Server Client Access Server SMTP  Internet 1. Built-in Protection Anti-spam & Anti-Virus – Option 2: Off-site protection Firewall
1. Built-in Protection Compliance June 5, 2009  | Page    ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1. Built-in Protection Compliance via Transport Rules
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Properties of folder selected 1. Built-in Protection Compliance via Managed Folders
1. Built-in Protection Confidential Messaging ,[object Object],[object Object],[object Object],[object Object]
1. Built-in Protection Business Continuity Exchange 2007 CCR Clustered Continuous Replication Exchange 2007 LCR Local Continuous Replication ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1. Built-in Protection Protection with Hosted Services
2. Anywhere Access Enhanced OWA:  Search Triage with Outlook  flags & categories Search Inbox Search Global Address List
2. Anywhere Access Enhanced OWA:  Pwd change
2. Anywhere Access Enhanced OWA:  SharePoint & FileShare Access
2. Anywhere Access Enhanced OWA:  VPN-less SharePoint & FileShare Access
2. Anywhere Access Enhanced OWA:  Scheduling Int/Ext OOF Set start and end times Unique internal and  external OOF messages Rich HTML Out of Office messages
2. Anywhere Access Enhanced OWA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
2. Anywhere Access Mobile Messaging ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
2. Anywhere Access Calendaring:  Calendar Attendant & Scheduling Assistant ,[object Object],[object Object],[object Object],[object Object]
2. Anywhere Access Calendaring:  Resource Booking Attendant
2. Anywhere Access Calendaring:  Resource Booking Attendant
2. Anywhere Access Calendaring:  Resource Booking Attendant
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Search in Outlook 2007  2. Anywhere Access Improved Outlook Search
2. Anywhere Access Unified Messaging ,[object Object],[object Object],[object Object]
2. Anywhere Access Unified Messaging – Outlook Voice Access ,[object Object],[object Object],[object Object],[object Object]
3. Operational Efficiency Performance and Scalability ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],64-bit by the numbers 32-bit = 2 32  or 4 gigabytes of addressable memory 64-bit = 2 64  or 16 exabytes of addressable memory
3. Operational Efficiency Deployment: Server Roles Internet
[object Object],[object Object],[object Object],[object Object],[object Object],3. Operational Efficiency Deployment: Auto Discover
3. Operational Efficiency Admin and Automation ,[object Object],[object Object],[object Object],Exchange  Management Shell Exchange  Management Console
3. Operational Efficiency Admin and Automation
3. Operational Efficiency Admin and Automation
3. Operational Efficiency Admin and Automation
Savings Potential in Summary Assessing the Impact of Exchange Server 2007 Current Activity  or Cost Voicemail, corp. operator/directory How Resources Required Mobile messaging Backup & restore Server hardware Compliance Storage hardware Client/server setup Administration Unified Messaging and auto attendant with  AD integration Reduced time to backup/restore;  storage flexibility Journaling per user, archiving; retention integration with Outlook IO optimization; Direct attach storage support for HA Outlook/mobile device setup; reduced help desk calls Scripting and command line interface 64-bit enabled server consolidation Integrated; no additional servers or services $$$$ $$$$ $$$ $$$ $$ $$ $$ $ Savings Impact
Exchange Server 2007 in Summary ,[object Object],With the  Anywhere Access  employees want And the  Operational Efficiency  IT needs
Edition Comparison ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Exchange 2003 Server Editions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Exchange 2007 Server Editions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Customer
Exchange Server 2007 SKU Overview CALs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Exchange Server 2007 SKUs Packaged CAL Offers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Servers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],L&SA  $38* L  $74 L  $772 L  $4,419
Built-in Protection Exchange 2000 versus Exchange 2007 Exchange 2000 Exchange  2007 Compliance ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],AV/AS protection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Confidential Messaging ,[object Object],[object Object],[object Object],Business Continuity ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Anywhere Access Exchange 2000 versus Exchange 2007 Exchange 2000 Exchange  2007 Unified Messaging ,[object Object],[object Object],[object Object],[object Object],Mobile Access ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Remote Access ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Collaboration & Productivity ,[object Object],[object Object],[object Object],[object Object],[object Object]
Outlook Web Access Exchange 2000 versus Exchange 2007
Operational Efficiency Exchange 2000 versus Exchange 2007 Exchange  2000 Exchange  2007 Deployment ,[object Object],[object Object],[object Object],[object Object],[object Object],Scalability ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Administrative Productivity ,[object Object],[object Object],[object Object],[object Object],Extensibility ,[object Object],[object Object],[object Object],[object Object],[object Object]
Additional Resources ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
© 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.

More Related Content

What's hot

C:\fakepath\blewis tech deck_overview_sp1
C:\fakepath\blewis tech deck_overview_sp1C:\fakepath\blewis tech deck_overview_sp1
C:\fakepath\blewis tech deck_overview_sp1Brian Lewis
 
Exchange Server 2010 Overview - Denver Presentation
Exchange Server 2010 Overview - Denver PresentationExchange Server 2010 Overview - Denver Presentation
Exchange Server 2010 Overview - Denver PresentationHarold Wong
 
Web Server Technologies II: Web Applications & Server Maintenance
Web Server Technologies II: Web Applications & Server MaintenanceWeb Server Technologies II: Web Applications & Server Maintenance
Web Server Technologies II: Web Applications & Server MaintenancePort80 Software
 
200308 Active Directory Security
200308 Active Directory Security200308 Active Directory Security
200308 Active Directory SecurityArmando Leon
 
Web Server Hardware and Software
Web Server Hardware and SoftwareWeb Server Hardware and Software
Web Server Hardware and Softwarewebhostingguy
 
10135 a xb
10135 a xb10135 a xb
10135 a xbBố Su
 
Windows 2008 R2 Security
Windows 2008 R2 SecurityWindows 2008 R2 Security
Windows 2008 R2 SecurityAmit Gatenyo
 
Secure erasure code based cloud storage system with secure data forwarding
Secure erasure code based cloud storage system with secure data forwardingSecure erasure code based cloud storage system with secure data forwarding
Secure erasure code based cloud storage system with secure data forwardingPriyank Rupera
 
Web Server Technologies I: HTTP & Getting Started
Web Server Technologies I: HTTP & Getting StartedWeb Server Technologies I: HTTP & Getting Started
Web Server Technologies I: HTTP & Getting StartedPort80 Software
 
Migrating 3000 users and 1100 applications from Lotus Notes to Office 365
Migrating 3000 users and 1100 applications from Lotus Notes to Office 365Migrating 3000 users and 1100 applications from Lotus Notes to Office 365
Migrating 3000 users and 1100 applications from Lotus Notes to Office 365Arno Flapper
 
10135 a 11
10135 a 1110135 a 11
10135 a 11Bố Su
 
Web server administration
Web server administrationWeb server administration
Web server administrationsawsan slii
 
10135 a 10
10135 a 1010135 a 10
10135 a 10Bố Su
 
Secure Data Storage and Forwarding in Cloud Using AES and HMAC
Secure Data Storage and Forwarding in Cloud Using AES and HMACSecure Data Storage and Forwarding in Cloud Using AES and HMAC
Secure Data Storage and Forwarding in Cloud Using AES and HMACIRJET Journal
 
Web server hardware and software
Web server hardware and softwareWeb server hardware and software
Web server hardware and softwareHumma Rashid
 
Windows Server 2008 Management
Windows Server 2008 ManagementWindows Server 2008 Management
Windows Server 2008 ManagementHi-Techpoint
 

What's hot (19)

C:\fakepath\blewis tech deck_overview_sp1
C:\fakepath\blewis tech deck_overview_sp1C:\fakepath\blewis tech deck_overview_sp1
C:\fakepath\blewis tech deck_overview_sp1
 
Exchange Server 2010 Overview - Denver Presentation
Exchange Server 2010 Overview - Denver PresentationExchange Server 2010 Overview - Denver Presentation
Exchange Server 2010 Overview - Denver Presentation
 
Web Server Technologies II: Web Applications & Server Maintenance
Web Server Technologies II: Web Applications & Server MaintenanceWeb Server Technologies II: Web Applications & Server Maintenance
Web Server Technologies II: Web Applications & Server Maintenance
 
200308 Active Directory Security
200308 Active Directory Security200308 Active Directory Security
200308 Active Directory Security
 
Web Server Hardware and Software
Web Server Hardware and SoftwareWeb Server Hardware and Software
Web Server Hardware and Software
 
10135 a xb
10135 a xb10135 a xb
10135 a xb
 
Windows 2008 R2 Security
Windows 2008 R2 SecurityWindows 2008 R2 Security
Windows 2008 R2 Security
 
Secure erasure code based cloud storage system with secure data forwarding
Secure erasure code based cloud storage system with secure data forwardingSecure erasure code based cloud storage system with secure data forwarding
Secure erasure code based cloud storage system with secure data forwarding
 
Web Server Technologies I: HTTP & Getting Started
Web Server Technologies I: HTTP & Getting StartedWeb Server Technologies I: HTTP & Getting Started
Web Server Technologies I: HTTP & Getting Started
 
Migrating 3000 users and 1100 applications from Lotus Notes to Office 365
Migrating 3000 users and 1100 applications from Lotus Notes to Office 365Migrating 3000 users and 1100 applications from Lotus Notes to Office 365
Migrating 3000 users and 1100 applications from Lotus Notes to Office 365
 
10135 a 11
10135 a 1110135 a 11
10135 a 11
 
Security_Measures_Rediff
Security_Measures_RediffSecurity_Measures_Rediff
Security_Measures_Rediff
 
Web server administration
Web server administrationWeb server administration
Web server administration
 
10135 a 10
10135 a 1010135 a 10
10135 a 10
 
Secure Data Storage and Forwarding in Cloud Using AES and HMAC
Secure Data Storage and Forwarding in Cloud Using AES and HMACSecure Data Storage and Forwarding in Cloud Using AES and HMAC
Secure Data Storage and Forwarding in Cloud Using AES and HMAC
 
Web server
Web serverWeb server
Web server
 
Web server hardware and software
Web server hardware and softwareWeb server hardware and software
Web server hardware and software
 
Exchange 2013
Exchange 2013Exchange 2013
Exchange 2013
 
Windows Server 2008 Management
Windows Server 2008 ManagementWindows Server 2008 Management
Windows Server 2008 Management
 

Similar to Exchange 2007 Overview Son Vu

Why Upgrade To Exchange 2007 Sp1 Son Vu
Why Upgrade To Exchange 2007 Sp1 Son VuWhy Upgrade To Exchange 2007 Sp1 Son Vu
Why Upgrade To Exchange 2007 Sp1 Son Vuguest05fee
 
Why Upgrade To Exchange 2007 Sp1 Son Vu
Why Upgrade To Exchange 2007 Sp1 Son VuWhy Upgrade To Exchange 2007 Sp1 Son Vu
Why Upgrade To Exchange 2007 Sp1 Son Vuvncson
 
Take a Leap into the Connected Cloud; 3 Trending Hybrid Cloud Scenarios
Take a Leap into the Connected Cloud; 3 Trending Hybrid Cloud ScenariosTake a Leap into the Connected Cloud; 3 Trending Hybrid Cloud Scenarios
Take a Leap into the Connected Cloud; 3 Trending Hybrid Cloud ScenariosGina Montgomery, V-TSP
 
Introducing Exchange Server 2010
Introducing Exchange Server 2010Introducing Exchange Server 2010
Introducing Exchange Server 2010Harold Wong
 
Webinar: Discover how Vaultastic integrates with your existing email infrastr...
Webinar: Discover how Vaultastic integrates with your existing email infrastr...Webinar: Discover how Vaultastic integrates with your existing email infrastr...
Webinar: Discover how Vaultastic integrates with your existing email infrastr...Vaultastic
 
Featured Webinar: Why Cloud Archiving is Best Suited for On Premise Mail Serv...
Featured Webinar: Why Cloud Archiving is Best Suited for On Premise Mail Serv...Featured Webinar: Why Cloud Archiving is Best Suited for On Premise Mail Serv...
Featured Webinar: Why Cloud Archiving is Best Suited for On Premise Mail Serv...Vaultastic
 
Exchange Conference (Philadelphia) - Exchange 2007 Security
Exchange Conference (Philadelphia) - Exchange 2007 SecurityExchange Conference (Philadelphia) - Exchange 2007 Security
Exchange Conference (Philadelphia) - Exchange 2007 SecurityHarold Wong
 
Operations: Security Crash Course — Best Practices for Securing your Company
Operations: Security Crash Course — Best Practices for Securing your CompanyOperations: Security Crash Course — Best Practices for Securing your Company
Operations: Security Crash Course — Best Practices for Securing your CompanyAmazon Web Services
 
C:\fakepath\run 20 exchange 2010
C:\fakepath\run 20 exchange 2010C:\fakepath\run 20 exchange 2010
C:\fakepath\run 20 exchange 2010guest3559b8d
 
Run 20 exchange 2010
Run 20 exchange 2010Run 20 exchange 2010
Run 20 exchange 2010guest3559b8d
 
C:\fakepath\run 20 exchange 2010
C:\fakepath\run 20 exchange 2010C:\fakepath\run 20 exchange 2010
C:\fakepath\run 20 exchange 2010guest3559b8d
 
Exchange 2010 Archiving And Retention
Exchange 2010 Archiving And RetentionExchange 2010 Archiving And Retention
Exchange 2010 Archiving And RetentionHarold Wong
 
Sonasoft email archiving
Sonasoft email archivingSonasoft email archiving
Sonasoft email archivingkeesnielen
 
Start Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best PraticesStart Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best PraticesAmazon Web Services
 
Windows Server 2008 Security Enhancements
Windows Server 2008 Security EnhancementsWindows Server 2008 Security Enhancements
Windows Server 2008 Security EnhancementsPresentologics
 

Similar to Exchange 2007 Overview Son Vu (20)

Why Upgrade To Exchange 2007 Sp1 Son Vu
Why Upgrade To Exchange 2007 Sp1 Son VuWhy Upgrade To Exchange 2007 Sp1 Son Vu
Why Upgrade To Exchange 2007 Sp1 Son Vu
 
Why Upgrade To Exchange 2007 Sp1 Son Vu
Why Upgrade To Exchange 2007 Sp1 Son VuWhy Upgrade To Exchange 2007 Sp1 Son Vu
Why Upgrade To Exchange 2007 Sp1 Son Vu
 
Overview of Microsoft Exchange Online
Overview of Microsoft Exchange OnlineOverview of Microsoft Exchange Online
Overview of Microsoft Exchange Online
 
Take a Leap into the Connected Cloud; 3 Trending Hybrid Cloud Scenarios
Take a Leap into the Connected Cloud; 3 Trending Hybrid Cloud ScenariosTake a Leap into the Connected Cloud; 3 Trending Hybrid Cloud Scenarios
Take a Leap into the Connected Cloud; 3 Trending Hybrid Cloud Scenarios
 
Introducing Exchange Server 2010
Introducing Exchange Server 2010Introducing Exchange Server 2010
Introducing Exchange Server 2010
 
HMSC_AD Event V3
HMSC_AD Event V3HMSC_AD Event V3
HMSC_AD Event V3
 
Atelier Barracuda Bessage Archiver
Atelier Barracuda Bessage ArchiverAtelier Barracuda Bessage Archiver
Atelier Barracuda Bessage Archiver
 
Exchange Server 2010
Exchange Server 2010   Exchange Server 2010
Exchange Server 2010
 
Webinar: Discover how Vaultastic integrates with your existing email infrastr...
Webinar: Discover how Vaultastic integrates with your existing email infrastr...Webinar: Discover how Vaultastic integrates with your existing email infrastr...
Webinar: Discover how Vaultastic integrates with your existing email infrastr...
 
Featured Webinar: Why Cloud Archiving is Best Suited for On Premise Mail Serv...
Featured Webinar: Why Cloud Archiving is Best Suited for On Premise Mail Serv...Featured Webinar: Why Cloud Archiving is Best Suited for On Premise Mail Serv...
Featured Webinar: Why Cloud Archiving is Best Suited for On Premise Mail Serv...
 
Exchange Conference (Philadelphia) - Exchange 2007 Security
Exchange Conference (Philadelphia) - Exchange 2007 SecurityExchange Conference (Philadelphia) - Exchange 2007 Security
Exchange Conference (Philadelphia) - Exchange 2007 Security
 
Operations: Security Crash Course — Best Practices for Securing your Company
Operations: Security Crash Course — Best Practices for Securing your CompanyOperations: Security Crash Course — Best Practices for Securing your Company
Operations: Security Crash Course — Best Practices for Securing your Company
 
Operations: Security
Operations: SecurityOperations: Security
Operations: Security
 
C:\fakepath\run 20 exchange 2010
C:\fakepath\run 20 exchange 2010C:\fakepath\run 20 exchange 2010
C:\fakepath\run 20 exchange 2010
 
Run 20 exchange 2010
Run 20 exchange 2010Run 20 exchange 2010
Run 20 exchange 2010
 
C:\fakepath\run 20 exchange 2010
C:\fakepath\run 20 exchange 2010C:\fakepath\run 20 exchange 2010
C:\fakepath\run 20 exchange 2010
 
Exchange 2010 Archiving And Retention
Exchange 2010 Archiving And RetentionExchange 2010 Archiving And Retention
Exchange 2010 Archiving And Retention
 
Sonasoft email archiving
Sonasoft email archivingSonasoft email archiving
Sonasoft email archiving
 
Start Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best PraticesStart Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best Pratices
 
Windows Server 2008 Security Enhancements
Windows Server 2008 Security EnhancementsWindows Server 2008 Security Enhancements
Windows Server 2008 Security Enhancements
 

More from vncson

Protecting exchange servers with dpm 2010 son vu
Protecting exchange servers with dpm 2010 son vuProtecting exchange servers with dpm 2010 son vu
Protecting exchange servers with dpm 2010 son vuvncson
 
Microsoft Private Cloud Computing
Microsoft Private Cloud ComputingMicrosoft Private Cloud Computing
Microsoft Private Cloud Computingvncson
 
Hyper V In Windows Server 2008 R2.Son Vu
Hyper V In Windows Server 2008 R2.Son VuHyper V In Windows Server 2008 R2.Son Vu
Hyper V In Windows Server 2008 R2.Son Vuvncson
 
Scvmm Technical Overview.Son Vu
Scvmm Technical Overview.Son VuScvmm Technical Overview.Son Vu
Scvmm Technical Overview.Son Vuvncson
 
Dpm4 Data Center
Dpm4 Data CenterDpm4 Data Center
Dpm4 Data Centervncson
 
Dpm Disaster Recovery Sonvu
Dpm Disaster Recovery SonvuDpm Disaster Recovery Sonvu
Dpm Disaster Recovery Sonvuvncson
 
Branch Office Solution Son Vu
Branch Office Solution   Son VuBranch Office Solution   Son Vu
Branch Office Solution Son Vuvncson
 
Dpm.2007.For.Sql Sonvu
Dpm.2007.For.Sql SonvuDpm.2007.For.Sql Sonvu
Dpm.2007.For.Sql Sonvuvncson
 
Data Protection Manager 2007 Technical Overview Son Vu
Data Protection Manager 2007 Technical Overview Son VuData Protection Manager 2007 Technical Overview Son Vu
Data Protection Manager 2007 Technical Overview Son Vuvncson
 
Data Center Optimization With Microsoft System Center Son Vu
Data Center Optimization With Microsoft System Center  Son VuData Center Optimization With Microsoft System Center  Son Vu
Data Center Optimization With Microsoft System Center Son Vuvncson
 
MS NAP - Security Day
MS NAP - Security DayMS NAP - Security Day
MS NAP - Security Dayvncson
 
IO ROI Example
IO ROI ExampleIO ROI Example
IO ROI Examplevncson
 
Microsoft IO 101 Training
Microsoft IO 101 TrainingMicrosoft IO 101 Training
Microsoft IO 101 Trainingvncson
 
Microsoft.Virtualization.Technologies Son Vu
Microsoft.Virtualization.Technologies Son VuMicrosoft.Virtualization.Technologies Son Vu
Microsoft.Virtualization.Technologies Son Vuvncson
 
Microsoft Hyper V Server 2008
Microsoft Hyper V Server 2008Microsoft Hyper V Server 2008
Microsoft Hyper V Server 2008vncson
 

More from vncson (15)

Protecting exchange servers with dpm 2010 son vu
Protecting exchange servers with dpm 2010 son vuProtecting exchange servers with dpm 2010 son vu
Protecting exchange servers with dpm 2010 son vu
 
Microsoft Private Cloud Computing
Microsoft Private Cloud ComputingMicrosoft Private Cloud Computing
Microsoft Private Cloud Computing
 
Hyper V In Windows Server 2008 R2.Son Vu
Hyper V In Windows Server 2008 R2.Son VuHyper V In Windows Server 2008 R2.Son Vu
Hyper V In Windows Server 2008 R2.Son Vu
 
Scvmm Technical Overview.Son Vu
Scvmm Technical Overview.Son VuScvmm Technical Overview.Son Vu
Scvmm Technical Overview.Son Vu
 
Dpm4 Data Center
Dpm4 Data CenterDpm4 Data Center
Dpm4 Data Center
 
Dpm Disaster Recovery Sonvu
Dpm Disaster Recovery SonvuDpm Disaster Recovery Sonvu
Dpm Disaster Recovery Sonvu
 
Branch Office Solution Son Vu
Branch Office Solution   Son VuBranch Office Solution   Son Vu
Branch Office Solution Son Vu
 
Dpm.2007.For.Sql Sonvu
Dpm.2007.For.Sql SonvuDpm.2007.For.Sql Sonvu
Dpm.2007.For.Sql Sonvu
 
Data Protection Manager 2007 Technical Overview Son Vu
Data Protection Manager 2007 Technical Overview Son VuData Protection Manager 2007 Technical Overview Son Vu
Data Protection Manager 2007 Technical Overview Son Vu
 
Data Center Optimization With Microsoft System Center Son Vu
Data Center Optimization With Microsoft System Center  Son VuData Center Optimization With Microsoft System Center  Son Vu
Data Center Optimization With Microsoft System Center Son Vu
 
MS NAP - Security Day
MS NAP - Security DayMS NAP - Security Day
MS NAP - Security Day
 
IO ROI Example
IO ROI ExampleIO ROI Example
IO ROI Example
 
Microsoft IO 101 Training
Microsoft IO 101 TrainingMicrosoft IO 101 Training
Microsoft IO 101 Training
 
Microsoft.Virtualization.Technologies Son Vu
Microsoft.Virtualization.Technologies Son VuMicrosoft.Virtualization.Technologies Son Vu
Microsoft.Virtualization.Technologies Son Vu
 
Microsoft Hyper V Server 2008
Microsoft Hyper V Server 2008Microsoft Hyper V Server 2008
Microsoft Hyper V Server 2008
 

Recently uploaded

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 

Recently uploaded (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 

Exchange 2007 Overview Son Vu

  • 1. Vu Nguyen Cao Son Technology Specialist Microsoft Vietnam [email_address] www.CaoSonBlog.com
  • 2.
  • 3.
  • 4.
  • 5.
  • 6. 1. Built-in Protection Anti-spam & Anti-Virus – Option 1: On-site protection
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14. 2. Anywhere Access Enhanced OWA: Search Triage with Outlook flags & categories Search Inbox Search Global Address List
  • 15. 2. Anywhere Access Enhanced OWA: Pwd change
  • 16. 2. Anywhere Access Enhanced OWA: SharePoint & FileShare Access
  • 17. 2. Anywhere Access Enhanced OWA: VPN-less SharePoint & FileShare Access
  • 18. 2. Anywhere Access Enhanced OWA: Scheduling Int/Ext OOF Set start and end times Unique internal and external OOF messages Rich HTML Out of Office messages
  • 19.
  • 20.
  • 21.
  • 22. 2. Anywhere Access Calendaring: Resource Booking Attendant
  • 23. 2. Anywhere Access Calendaring: Resource Booking Attendant
  • 24. 2. Anywhere Access Calendaring: Resource Booking Attendant
  • 25.
  • 26.
  • 27.
  • 28.
  • 29. 3. Operational Efficiency Deployment: Server Roles Internet
  • 30.
  • 31.
  • 32. 3. Operational Efficiency Admin and Automation
  • 33. 3. Operational Efficiency Admin and Automation
  • 34. 3. Operational Efficiency Admin and Automation
  • 35. Savings Potential in Summary Assessing the Impact of Exchange Server 2007 Current Activity or Cost Voicemail, corp. operator/directory How Resources Required Mobile messaging Backup & restore Server hardware Compliance Storage hardware Client/server setup Administration Unified Messaging and auto attendant with AD integration Reduced time to backup/restore; storage flexibility Journaling per user, archiving; retention integration with Outlook IO optimization; Direct attach storage support for HA Outlook/mobile device setup; reduced help desk calls Scripting and command line interface 64-bit enabled server consolidation Integrated; no additional servers or services $$$$ $$$$ $$$ $$$ $$ $$ $$ $ Savings Impact
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41. Outlook Web Access Exchange 2000 versus Exchange 2007
  • 42.
  • 43.
  • 44. © 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.

Editor's Notes

  1. 06/05/09 18:22 © 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.