10233BD ENU TrainerHandbook
10233BD ENU TrainerHandbook
M I CRO S O F T
L EA RN I N G
PRO DU C T
10233B
Designing and Deploying Messaging
Solutions with Microsoft Exchange
Server 2010 SP2
ii
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2
Information in this document, including URL and other Internet Web site references, is subject to change
without notice. Unless otherwise noted, the example companies, organizations, products, domain names,
e-mail addresses, logos, people, places, and events depicted herein are fictitious, and no association with
any real company, organization, product, domain name, e-mail address, logo, person, place or event is
intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the
user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in
or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical,
photocopying, recording, or otherwise), or for any purpose, without the express written permission of
Microsoft Corporation.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property
rights covering subject matter in this document. Except as expressly provided in any written license
agreement from Microsoft, the furnishing of this document does not give you any license to these
patents, trademarks, copyrights, or other intellectual property.
The names of manufacturers, products, or URLs are provided for informational purposes only and
Microsoft makes no representations and warranties, either expressed, implied, or statutory, regarding
these manufacturers or the use of the products with any Microsoft technologies. The inclusion of a
manufacturer or product does not imply endorsement of Microsoft of the manufacturer or product. Links
may be provided to third party sites. Such sites are not under the control of Microsoft and Microsoft is not
responsible for the contents of any linked site or any link contained in a linked site, or any changes or
updates to such sites. Microsoft is not responsible for webcasting or any other form of transmission
received from any linked site. Microsoft is providing these links to you only as a convenience, and the
inclusion of any link does not imply endorsement of Microsoft of the site or the products contained
therein.
2012 Microsoft Corporation. All rights reserved.
Microsoft and the trademarks listed at http://www.microsoft.com/about/legal/en/us/IntellectualProperty
/Trademarks/EN-US.aspx are trademarks of the Microsoft group of companies. All other trademarks are
property of their respective owners
These license terms are an agreement between Microsoft Corporation and you. Please read them. They apply to
the Licensed Content named above, which includes the media on which you received it, if any. These license
terms also apply to any updates, supplements, internet based services and support services for the Licensed
Content, unless other terms accompany those items. If so, those terms apply.
BY DOWNLOADING OR USING THE LICENSED CONTENT, YOU ACCEPT THESE TERMS. IF YOU DO NOT ACCEPT
THEM, DO NOT DOWNLOAD OR USE THE LICENSED CONTENT.
If you comply with these license terms, you have the rights below.
1.
DEFINITIONS.
a. Authorized Learning Center means a Microsoft Learning Competency Member, Microsoft IT Academy
Program Member, or such other entity as Microsoft may designate from time to time.
b. Authorized Training Session means the Microsoft-authorized instructor-led training class using only
MOC Courses that are conducted by a MCT at or through an Authorized Learning Center.
c. Classroom Device means one (1) dedicated, secure computer that you own or control that meets or
exceeds the hardware level specified for the particular MOC Course located at your training facilities or
primary business location.
d. End User means an individual who is (i) duly enrolled for an Authorized Training Session or Private
Training Session, (ii) an employee of a MPN Member, or (iii) a Microsoft full-time employee.
e. Licensed Content means the MOC Course and any other content accompanying this agreement.
Licensed Content may include (i) Trainer Content, (ii) software, and (iii) associated media.
f.
Microsoft Certified Trainer or MCT means an individual who is (i) engaged to teach a training session
to End Users on behalf of an Authorized Learning Center or MPN Member, (ii) currently certified as a
Microsoft Certified Trainer under the Microsoft Certification Program, and (iii) holds a Microsoft
Certification in the technology that is the subject of the training session.
g. Microsoft IT Academy Member means a current, active member of the Microsoft IT Academy
Program.
h. Microsoft Learning Competency Member means a Microsoft Partner Network Program Member in
good standing that currently holds the Learning Competency status.
i.
Microsoft Official Course or MOC Course means the Official Microsoft Learning Product instructorled courseware that educates IT professionals or developers on Microsoft technologies.
j.
Microsoft Partner Network Member or MPN Member means a silver or gold-level Microsoft Partner
Network program member in good standing.
k. Personal Device means one (1) device, workstation or other digital electronic device that you
personally own or control that meets or exceeds the hardware level specified for the particular MOC
Course.
l. Private Training Session means the instructor-led training classes provided by MPN Members for
corporate customers to teach a predefined learning objective. These classes are not advertised or
promoted to the general public and class attendance is restricted to individuals employed by or
contracted by the corporate customer.
m. Trainer Content means the trainer version of the MOC Course and additional content designated
solely for trainers to use to teach a training session using a MOC Course. Trainer Content may include
Microsoft PowerPoint presentations, instructor notes, lab setup guide, demonstration guides, beta
feedback form and trainer preparation guide for the MOC Course. To clarify, Trainer Content does not
include virtual hard disks or virtual machines.
2.
INSTALLATION AND USE RIGHTS. The Licensed Content is licensed not sold. The Licensed Content is
licensed on a one copy per user basis, such that you must acquire a license for each individual that
accesses or uses the Licensed Content.
2.1
Below are four separate sets of installation and use rights. Only one set of rights apply to you.
5. you will remove and irretrievably delete all Licensed Content from all Classroom Devices and
servers at the end of the Authorized Training Session,
6. you will only provide access to the Licensed Content to End Users and MCTs,
7. you will only provide access to the Trainer Content to MCTs, and
8. any Licensed Content installed for use during a training session will be done in accordance
with the applicable classroom set-up guide.
b. If you are a MPN Member.
i. If the Licensed Content is in digital format for each license you acquire you may either:
1. install one (1) copy of the Licensed Content in the form provided to you on (A) one (1)
Classroom Device, or (B) one (1) dedicated, secure server located at your premises where
the training session is held for use by one (1) of your employees attending a training session
provided by you, or by one (1) MCT that is teaching the training session, or
2. install one (1) copy of the Licensed Content in the form provided to you on one (1)
Classroom Device for use by one (1) End User attending a Private Training Session, or one (1)
MCT that is teaching the Private Training Session.
ii. You agree that:
1. you will acquire a license for each End User and MCT that accesses the Licensed Content,
2. each End User and MCT will be presented with a copy of this agreement and each individual
will agree that their use of the Licensed Content will be subject to these license terms prior
to their accessing the Licensed Content. Each individual will be required to denote their
acceptance of the EULA in a manner that is enforceable under local law prior to their
accessing the Licensed Content,
3. for all training sessions, you will only use qualified MCTs who hold the applicable
competency to teach the particular MOC Course that is the subject of the training session,
4. you will not alter or remove any copyright or other protective notices contained in the
Licensed Content,
5. you will remove and irretrievably delete all Licensed Content from all Classroom Devices and
servers at the end of each training session,
6. you will only provide access to the Licensed Content to End Users and MCTs,
7. you will only provide access to the Trainer Content to MCTs, and
8. any Licensed Content installed for use during a training session will be done in accordance
with the applicable classroom set-up guide.
c. If you are an End User:
You may use the Licensed Content solely for your personal training use. If the Licensed Content is in
digital format, for each license you acquire you may (i) install one (1) copy of the Licensed Content in
the form provided to you on one (1) Personal Device and install another copy on another Personal
Device as a backup copy, which may be used only to reinstall the Licensed Content; or (ii) print one (1)
copy of the Licensed Content. You may not install or use a copy of the Licensed Content on a device
you do not own or control.
Use of Instructional Components in Trainer Content. You may customize, in accordance with the
most recent version of the MCT Agreement, those portions of the Trainer Content that are logically
associated with instruction of a training session. If you elect to exercise the foregoing rights, you
agree: (a) that any of these customizations will only be used for providing a training session, (b) any
customizations will comply with the terms and conditions for Modified Training Sessions and
Supplemental Materials in the most recent version of the MCT agreement and with this agreement.
For clarity, any use of customize refers only to changing the order of slides and content, and/or
not using all the slides or content, it does not mean changing or modifying any slide or content.
2.2 Separation of Components. The Licensed Content components are licensed as a single unit and you
may not separate the components and install them on different devices.
2.3 Reproduction/Redistribution Licensed Content. Except as expressly provided in the applicable
installation and use rights above, you may not reproduce or distribute the Licensed Content or any portion
thereof (including any permitted modifications) to any third parties without the express written permission
of Microsoft.
2.4 Third Party Programs. The Licensed Content may contain third party programs or services. These
license terms will apply to your use of those third party programs or services, unless other terms accompany
those programs and services.
2.5 Additional Terms. Some Licensed Content may contain components with additional terms,
conditions, and licenses regarding its use. Any non-conflicting terms in those conditions and licenses also
apply to that respective component and supplements the terms described in this Agreement.
3.
PRE-RELEASE VERSIONS. If the Licensed Content is a pre-release (beta) version, in addition to the other
provisions in this agreement, then these terms also apply:
a. Pre-Release Licensed Content. This Licensed Content is a pre-release version. It may not contain the
same information and/or work the way a final version of the Licensed Content will. We may change it
for the final version. We also may not release a final version. Microsoft is under no obligation to
provide you with any further content, including the final release version of the Licensed Content.
b. Feedback. If you agree to give feedback about the Licensed Content to Microsoft, either directly or
through its third party designee, you give to Microsoft without charge, the right to use, share and
commercialize your feedback in any way and for any purpose. You also give to third parties, without
charge, any patent rights needed for their products, technologies and services to use or interface with
any specific parts of a Microsoft software, Microsoft product, or service that includes the feedback. You
will not give feedback that is subject to a license that requires Microsoft to license its software,
technologies, or products to third parties because we include your feedback in them. These rights
INTERNET-BASED SERVICES. Microsoft may provide Internet-based services with the Licensed Content,
which may change or be canceled at any time.
a. Consent for Internet-Based Services. The Licensed Content may connect to computer systems over an
Internet-based wireless network. In some cases, you will not receive a separate notice when they
connect. Using the Licensed Content operates as your consent to the transmission of standard device
information (including but not limited to technical information about your device, system and
application software, and peripherals) for internet-based services.
b. Misuse of Internet-based Services. You may not use any Internet-based service in any way that could
harm it or impair anyone elses use of it. You may not use the service to try to gain unauthorized access
to any service, data, account or network by any means.
5.
SCOPE OF LICENSE. The Licensed Content is licensed, not sold. This agreement only gives you some rights
to use the Licensed Content. Microsoft reserves all other rights. Unless applicable law gives you more
rights despite this limitation, you may use the Licensed Content only as expressly permitted in this
agreement. In doing so, you must comply with any technical limitations in the Licensed Content that only
allows you to use it in certain ways. Except as expressly permitted in this agreement, you may not:
install more copies of the Licensed Content on devices than the number of licenses you acquired;
allow more individuals to access the Licensed Content than the number of licenses you acquired;
publicly display, or make the Licensed Content available for others to access or use;
install, sell, publish, transmit, encumber, pledge, lend, copy, adapt, link to, post, rent, lease or lend,
make available or distribute the Licensed Content to any third party, except as expressly permitted
by this Agreement.
reverse engineer, decompile, remove or otherwise thwart any protections or disassemble the
Licensed Content except and only to the extent that applicable law expressly permits, despite this
limitation;
access or use any Licensed Content for which you are not providing a training session to End Users
using the Licensed Content;
access or use any Licensed Content that you have not been authorized by Microsoft to access and
use; or
transfer the Licensed Content, in whole or in part, or assign this agreement to any third party.
6.
RESERVATION OF RIGHTS AND OWNERSHIP. Microsoft reserves all rights not expressly granted to you in
this agreement. The Licensed Content is protected by copyright and other intellectual property laws and
treaties. Microsoft or its suppliers own the title, copyright, and other intellectual property rights in the
Licensed Content. You may not remove or obscure any copyright, trademark or patent notices that
appear on the Licensed Content or any components thereof, as delivered to you.
7.
EXPORT RESTRICTIONS. The Licensed Content is subject to United States export laws and regulations. You
must comply with all domestic and international export laws and regulations that apply to the Licensed
Content. These laws include restrictions on destinations, End Users and end use. For additional
information, see www.microsoft.com/exporting.
8.
LIMITATIONS ON SALE, RENTAL, ETC. AND CERTAIN ASSIGNMENTS. You may not sell, rent, lease, lend or
sublicense the Licensed Content or any portion thereof, or transfer or assign this agreement.
9.
SUPPORT SERVICES. Because the Licensed Content is as is, we may not provide support services for it.
10.
TERMINATION. Without prejudice to any other rights, Microsoft may terminate this agreement if you fail
to comply with the terms and conditions of this agreement. Upon any termination of this agreement, you
agree to immediately stop all use of and to irretrievable delete and destroy all copies of the Licensed
Content in your possession or under your control.
11.
LINKS TO THIRD PARTY SITES. You may link to third party sites through the use of the Licensed Content.
The third party sites are not under the control of Microsoft, and Microsoft is not responsible for the
contents of any third party sites, any links contained in third party sites, or any changes or updates to third
party sites. Microsoft is not responsible for webcasting or any other form of transmission received from
any third party sites. Microsoft is providing these links to third party sites to you only as a convenience,
and the inclusion of any link does not imply an endorsement by Microsoft of the third party site.
12.
ENTIRE AGREEMENT. This agreement, and the terms for supplements, updates and support services are
the entire agreement for the Licensed Content.
13.
APPLICABLE LAW.
a. United States. If you acquired the Licensed Content in the United States, Washington state law governs
the interpretation of this agreement and applies to claims for breach of it, regardless of conflict of laws
principles. The laws of the state where you live govern all other claims, including claims under state
consumer protection laws, unfair competition laws, and in tort.
b. Outside the United States. If you acquired the Licensed Content in any other country, the laws of that
country apply.
14.
LEGAL EFFECT. This agreement describes certain legal rights. You may have other rights under the laws of
your country. You may also have rights with respect to the party from whom you acquired the Licensed
Content. This agreement does not change your rights under the laws of your country if the laws of your
country do not permit it to do so.
15.
DISCLAIMER OF WARRANTY. THE LICENSED CONTENT IS LICENSED "AS-IS," "WITH ALL FAULTS," AND "AS
AVAILABLE." YOU BEAR THE RISK OF USING IT. MICROSOFT CORPORATION AND ITS RESPECTIVE
AFFILIATES GIVE NO EXPRESS WARRANTIES, GUARANTEES, OR CONDITIONS UNDER OR IN RELATION TO
THE LICENSED CONTENT. YOU MAY HAVE ADDITIONAL CONSUMER RIGHTS UNDER YOUR LOCAL LAWS
WHICH THIS AGREEMENT CANNOT CHANGE. TO THE EXTENT PERMITTED UNDER YOUR LOCAL LAWS,
MICROSOFT CORPORATION AND ITS RESPECTIVE AFFILIATES EXCLUDE ANY IMPLIED WARRANTIES OR
CONDITIONS, INCLUDING THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
NON-INFRINGEMENT.
16.
LIMITATION ON AND EXCLUSION OF REMEDIES AND DAMAGES. TO THE EXTENT NOT PROHIBITED BY
LAW, YOU CAN RECOVER FROM MICROSOFT CORPORATION AND ITS SUPPLIERS ONLY DIRECT
DAMAGES UP TO USD$5.00. YOU AGREE NOT TO SEEK TO RECOVER ANY OTHER DAMAGES, INCLUDING
CONSEQUENTIAL, LOST PROFITS, SPECIAL, INDIRECT OR INCIDENTAL DAMAGES FROM MICROSOFT
CORPORATION AND ITS RESPECTIVE SUPPLIERS.
This limitation applies to
o
anything related to the Licensed Content, services made available through the Licensed Content, or
content (including code) on third party Internet sites or third-party programs; and
o
claims for breach of contract, breach of warranty, guarantee or condition, strict liability, negligence,
or other tort to the extent permitted by applicable law.
It also applies even if Microsoft knew or should have known about the possibility of the damages. The
above limitation or exclusion may not apply to you because your country may not allow the exclusion or
limitation of incidental, consequential or other damages.
Please note: As this Licensed Content is distributed in Quebec, Canada, some of the clauses in this agreement
are provided below in French.
Remarque : Ce le contenu sous licence tant distribu au Qubec, Canada, certaines des clauses dans ce
contrat sont fournies ci-dessous en franais.
EXONRATION DE GARANTIE. Le contenu sous licence vis par une licence est offert tel quel . Toute
utilisation de ce contenu sous licence est votre seule risque et pril. Microsoft naccorde aucune autre garantie
expresse. Vous pouvez bnficier de droits additionnels en vertu du droit local sur la protection dues
consommateurs, que ce contrat ne peut modifier. La ou elles sont permises par le droit locale, les garanties
implicites de qualit marchande, dadquation un usage particulier et dabsence de contrefaon sont exclues.
LIMITATION DES DOMMAGES-INTRTS ET EXCLUSION DE RESPONSABILIT POUR LES DOMMAGES. Vous
pouvez obtenir de Microsoft et de ses fournisseurs une indemnisation en cas de dommages directs uniquement
hauteur de 5,00 $ US. Vous ne pouvez prtendre aucune indemnisation pour les autres dommages, y
compris les dommages spciaux, indirects ou accessoires et pertes de bnfices.
Cette limitation concerne:
tout ce qui est reli au le contenu sous licence , aux services ou au contenu (y compris le code)
figurant sur des sites Internet tiers ou dans des programmes tiers ; et
les rclamations au titre de violation de contrat ou de garantie, ou au titre de responsabilit
stricte, de ngligence ou dune autre faute dans la limite autorise par la loi en vigueur.
Elle sapplique galement, mme si Microsoft connaissait ou devrait connatre lventualit dun tel dommage.
Si votre pays nautorise pas lexclusion ou la limitation de responsabilit pour les dommages indirects,
accessoires ou de quelque nature que ce soit, il se peut que la limitation ou lexclusion ci-dessus ne sappliquera
pas votre gard.
EFFET JURIDIQUE. Le prsent contrat dcrit certains droits juridiques. Vous pourriez avoir dautres droits prvus
par les lois de votre pays. Le prsent contrat ne modifie pas les droits que vous confrent les lois de votre pays
si celles-ci ne le permettent pas.
Revised December 2011
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2
xi
Acknowledgments
Microsoft Learning would like to acknowledge and thank the following for their contribution towards
developing this title. Their effort at various stages in the development has ensured that you have a good
classroom experience.
xii
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2
Contents
Module 1: Introduction to Designing a Microsoft Exchange Server 2010 Deployment
Lesson 1: Gathering Business Requirements
Lesson 2: Identifying Additional Requirements
Lesson 3: Introduction to Service Level Management
Lesson 4: Analyzing the Current Messaging Environment
Lesson 5: Overview of Microsoft Office 365
Lab: Introduction to Designing an Exchange Server 2010 Deployment
1-3
1-12
1-24
1-36
1-52
1-59
Module 2: Designing Microsoft Exchange Server 2010 Integration with the Current
Infrastructure
Lesson 1: Designing the Network Infrastructure
Lesson 2: Designing the AD DS Infrastructure
Lesson 3: Designing the DNS Infrastructure
Lesson 4: Planning Exchange Server Administration
Lab: Designing Exchange Server Integration with the
Current Infrastructure
2-3
2-16
2-32
2-40
2-55
3-3
3-8
3-21
3-37
3-51
Module 4: Planning and Deploying Client Access Services in Microsoft Exchange Server 2010
Lesson 1: Overview of the Client Access Server Role
Lesson 2: Designing Client Access Server Deployment
Lesson 3: Designing Client Access
Lesson 4: Designing Client Access Policies
Lab: Planning and Deploying Client Access Services in
Exchange Server 2010
4-3
4-14
4-34
4-48
4-57
5-3
5-13
5-29
5-44
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2
6-3
6-16
6-32
7-3
7-12
7-20
7-30
7-37
8-3
8-14
8-25
8-32
8-45
9-3
9-17
9-27
9-41
Module 10: Planning Microsoft Exchange Server 2010 Monitoring and Troubleshooting
Lesson 1: Planning Exchange Server Monitoring
Lesson 2: Planning Exchange Server Troubleshooting
Lab: Planning Exchange Server 2010 Monitoring and Troubleshooting
10-3
10-19
10-27
11-3
11-12
11-28
11-41
xiii
xiv
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2
Module 12: Integrating Microsoft Exchange Server 2010 with Other Messaging Systems
Lesson 1: Designing Exchange Server 2010 Integration with Other
Messaging Systems
Lesson 2: Designing Exchange Server 2010 Integration with
Federated Partners
Lesson 3: Designing Exchange Server 2010 Integration with
Office 365
Lesson 4: Designing Single Sign-On for Office 365
Lab: Integrating Exchange Server 2010 with Other Messaging Systems
12-3
12-15
12-22
12-35
12-40
A-3
A-17
A-29
L1-1
L2-11
L3-19
L4-35
L5-45
L6-55
L7-65
L8-75
L9-93
L10-91
L11-99
L12-103
xv
Course Description
This course teaches you how to design and deploy an Exchange Server 2010 messaging system. You will
learn how to identify business and technical requirements for the design and then translate those needs
into specific Exchange Server 2010 configuration options. This course discusses how to design various
features of Mailbox, Hub Transport, and Client Access server roles. Some features that are discusses
include message transport, security, high availability, disaster recovery, upgrades, and coexistence with
other messaging systems.
Audience
This course is intended for the IT Pro audience who is responsible for the Exchange Server messaging
environment in an enterprise. He or she is the senior administrator, or engineer who acts as a technical
lead over a team of administrators. This person is a third level of support in addition to the Exchange
Recipient Administrator, which is the first level and the Exchange Server Administrator, which is the
second level. In an effort to ensure that end users have the best possible messaging experience, this
person also evaluates new technologies and tools.
The candidate is responsible for the planning and deployment of the Exchange Servers in an enterprise
environment. He or she should have a minimum of two years of experience administering, deploying,
managing, monitoring, upgrading, migrating, and designing Exchange Server.
Student Prerequisites
This course requires that you meet the following prerequisites:
At least six months of experience working with Exchange Server 2010 or Exchange Server 2007
At least two years of experience administering Windows Server, including Windows Server 2008
At least two years of experience working with Active Directory Domain Services (AD DS)
At least two years of experience working with name resolution, including Domain Name Service (DNS)
Experience working with certificates, including Public Key Infrastructure (PKI) certificates
Course Objectives
After completing this course, students will be able to:
Design the deployment of the Mailbox server services in Exchange Server 2010.
Design the Hub Transport server and Edge Transport server deployments.
xvi
Develop a plan for monitoring and troubleshooting the Exchange Server environment.
Plan and implement a transition from Exchange Server 2003 or Exchange Server 2007 to Exchange
Server 2010.
Integrate Exchange Server 2010 with other messaging systems and with federated partners.
Course Outline
This section provides an outline of the course:
Module 1, Introduction to Designing a Microsoft Exchange Server 2010 Deployment. Before you can
begin designing your organizations new messaging system, you must first understand why your
organization plans to deploy the messaging system and the state of the current messaging system. Most
organizations need an information technology (IT) infrastructure to ensure business tasks are performed
correctly. Before you deploy new IT technologies, administrators must understand and be able to present
clearly to decision makers the way in which these new technologies will address existing and new business
requirements. By understanding this, you will learn how to begin designing your organizations new
messaging system.
Module 2, Designing Exchange Server 2010 Integration with the Current Infrastructure teaches you
what networking components must be in place, and how they must be configured to properly support
Exchange Server 2010.
Module 3, Planning and Deploying Mailbox Services explains how the mailbox services design includes
the physical design of the Mailbox servers, including the storage system. You will also learn how it
includes the design of recipient management and public folder architecture.
Module 4, Planning and Deploying Client Access Services in Microsoft Exchange Server 2010. The
messaging clients access the Exchange Server mailboxes through the Client Access server role. Because of
the importance of this server role, you must understand how it works, and how to design the Client Access
server deployment. This module describes how to design the Client Access server role deployment in
Exchange Server 2010
Module 5, Planning and Deploying Message Transport in Microsoft Exchange Server 2010. After you
have defined the business requirements of your organization and have a good understanding of the
current network environment, the next step is to design message routingboth within the organization,
and between the organization and other organizations connected to the Internet. This module describes
how to design message routing.
Module 6, Planning and Deploying Messaging Security. In this module you will learn about ensuring
that the messaging system is as secure as possible. This includes planning for message security, which
ensures that messages sent within the organization, and to and from the Internet, meet the organizations
compliance and security requirements. A second consideration for planning the security is implementing
an antivirus and anti-spam solution that prevents malicious e-mails from entering the Exchange Server
organization.
Module 7, Planning and Deploying Messaging Compliance teaches you how Microsoft Exchange Server
2010 provides a wide range of messaging compliance features that you can use for more than just simple
messaging and calendaring. You will also learn how you can use messaging compliance features to
control message transport, apply Rights Management Services (RMS), implement journaling and archiving,
and manage messages.
xvii
Module 8, Planning and Deploying High Availability describes how high availability ensures that
messaging systems built on Exchange Server 2010 can survive the failure of a single server, or even
multiple servers.
Module 9, Planning a Disaster Recovery Solution explains how to ensure that you meet SLA
requirements by planning how Microsoft Exchange Server 2010 will be backed up and restored.
Module 10, Planning Microsoft Exchange Server 2010 Monitoring and Troubleshooting describes how
to perform routine monitoring, and where necessary, make adjustments to your Microsoft Exchange
Server 2010 servers. By understanding how to implement a monitoring program and knowing what and
how to monitor, you can optimize your Exchange servers.
You will also learn how to troubleshoot problems with Exchange Server 2010. Planning an effective
troubleshooting methodology and familiarization with the troubleshooting tools helps you to quickly and
efficiently resolve even complex problems.
Module 11, Upgrading to Microsoft Exchange Server 2010 provides an overview of the options that
organizations have when choosing to implement Exchange Server 2010, and provides details on how to
upgrade an existing Microsoft Exchange Server 2003 or Exchange Server 2007 organization to Exchange
Server 2010.
Module 12, Integrating Microsoft Exchange Server 2010 with Other Messaging Systems. Integration
with other messaging systems is useful when you are migrating from a legacy messaging system to
Exchange Server 2010. Integration with federated partners that are also using Exchange Server 2010
allows you share information with partner organizations. Integration with Exchange Online allows you to
expand the messaging system in your organization without adding additional servers. In this module you
will learn about how to integrate Exchange Server 2010 with other messaging systems.
Appendix A, Unified Messaging in Microsoft Exchange Server 2010 describes how to plan the Unified
Messaging 2010 infrastructure, configuration, and integration with Office Communications Server 2007.
xviii
Course Materials
The following materials are included with your kit:
Course Handbook A succinct classroom learning guide that provides all the critical technical
information in a crisp, tightly-focused format, which is just right for an effective in-class learning
experience.
Lessons: Guide you through the learning objectives and provide the key points that are critical to
the success of the in-class learning experience.
Labs: Provide a real-world, hands-on platform for you to apply the knowledge and skills learned
in the module.
Module Reviews and Takeaways: Provide improved on-the-job reference material to boost
knowledge and skills retention.
Lab Answer Keys: Provide step-by-step lab solution guidance at your finger tips when its
needed.
Modules: Include companion content, such as questions and answers, detailed demo steps and
additional reading links, for each lesson. Additionally, they include Lab Review questions and answers
and Module Reviews and Takeaways sections, which contain the review questions and answers, best
practices, common issues and troubleshooting tips with answers, and real-world issues and scenarios
with answers.
Resources: Include well-categorized additional resources that give you immediate access to the most
up-to-date premium content on TechNet, MSDN, Microsoft Press
Course evaluation At the end of the course, you will have the opportunity to complete an online
evaluation to provide feedback on the course, training facility, and instructor.
The following table shows the role of each virtual machine used in this course:
Virtual machine
Role
10233B-VAN-DC1
10233B-VAN-EX1
10233B-VAN-EX2
10233B-VAN-EX3
10233B-VAN-EDG
10233B-VAN-CL1
10233B-NYC-DC1
10233B-NYC-SVR2
Software Configuration
The following software is installed on each VM:
Windows 7
Classroom Setup
Each classroom computer will have the same virtual machine configured in the same way. All of the
aforementioned virtual machines are deployed in each student computer.
xix
xx
8 GB RAM
DVD drive
Network adapter
*Striped
In addition, the instructor computer must be connected to a projection display device that supports SVGA
1024 x 768 pixels, 16-bit colors.
1-1
Module 1
Introduction to Designing a Microsoft
Exchange Server 2010 Deployment
Contents
Lesson 1: Gathering Business Requirements
1-3
1-12
1-24
1-36
1-52
1-59
Module Overview
Before you can begin designing your organizations new messaging system, you must first understand
why your organization plans to deploy the messaging system, and understand the state of the current
messaging system. Most organizations need an information technology (IT) infrastructure to ensure
business tasks are performed correctly. Before you deploy new IT technologies, administrators must
understand and be able to present clearly to decision makers the way in which these new technologies
will address existing and new business requirements.
After completing this module, you will be able to:
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 1-3
Lesson 1
In this lesson, you will gather business requirements for a Microsoft Exchange Server 2010 deployment.
Identifying business requirements helps determine the benefits of, and rationale for, the deployment
project.
After completing this lesson, you will be able to:
Organizations invest in technology to solve business problems, or to provide new opportunities. Business
requirements typically dictate reasons for an organizations proposed new technology implementation.
Business Requirements
To operate more effectively, an organization must address its many needs, or business requirements.
Business requirements can take many different forms. For example, an organization may need to:
Become more efficient. Most businesses are very competitive, and strive to be more efficient than
their competitors. When evaluating new technologies, these organizations typically will invest in the
technology if it will improve efficiency.
Avoid disruptions to business processes. A current technology may meet most business requirements.
However, if the current technology is unreliable, an organization may invest in a new technology that
provides the requisite reliability and availability.
Explore new business areas or solutions. Organizations sometimes use technologies to pursue new
business opportunities. For example, deploying web-based tools for selling products and services has
significantly increased the business potential for many organizations.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 1-5
Functional Specification
Functional requirements help create the functional specificationwhich serves as a contract between the
customer and the design teamdescribes the proposed solution in exacting detail, and forms the basis
for project plans and schedules. The customer is the technology consumer, and is usually the business
sponsor and user.
Establishes an agreement between the team and the customer. This enables the team to determine
the correct solution to meet the customers expectations.
Provides in-depth project details to help the team determine if it is building the correct solution. This,
in turn, makes the solution easier to validate and verify.
Enables the team to estimate budgets and schedules. The quantity of resources and their respective
skill sets are difficult to determine without the specific detail that a functional specification provides.
Note In addition to functional specifications, every design has nonfunctional
specifications. Nonfunctional specifications do not define what the system does, but rather
how the system will perform and/or the quality of service it will provide. Common
nonfunctional specifications include system availability, maintainability, performance,
reliability, and scalability.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 1-7
Service level agreements (SLAs) are understandings reached between an organization and its IT
department that define expected infrastructure performance levels. It is important to define an SLA,
because it documents the service expectations and requirements that an organization expects the IT
department to deliver. SLAs may define several categories of expected performance, including:
Availability. For example, an SLA may require that all users can access their mailboxes on the
Exchange servers 99.99 percent of the time during business hours, and 99.9 percent of the time
during nonbusiness hours.
Performance. For example, an SLA may specify that all messages sent between company locations are
received within 60 seconds, 99 percent of the time.
Recovery. For example, an SLA may stipulate that if a mailbox server fails, all mailboxes on that server
will be restored within eight hours.
Types of SLAs
The SLAs that organizations use can vary from informal to very structured:
Informal SLAs often are not documented, but rather are general expectations for system performance
that are well known. For example, an organization may have an internal, unwritten policy that certain
servers are never restarted during business hours.
Formal SLAs typically are documented extensively, and detail expectations determined from
negotiations between service providers and business customers. These SLAs may define exact
expectations for each system component, and may include penalties if expectations are not met.
Often, the most formal SLAs are negotiated between business customers and outsourced IT providers.
Best Practice: If an organization does not have any written SLAs, it is very important when beginning any
deployment project to identify and document informal SLAs. Clearly identifying the expected system
performance enables future validation of the projects success.
Negotiating SLAs
SLAs have a significant impact on a projects scope and budget, so it is important to define them at the
projects inception.
Business requirements, plus functional and nonfunctional requirements, typically are the basis for initial
SLA negotiations. In most cases, the project team and business sponsors negotiate the final SLA details.
Initial requirements may set very high expectations. However, meeting those high expectations can be
quite expensive. For example, say an SLA requires that messages are delivered between company
locations within 60 seconds, 100 percent of the time. The only way to meet this expectation may be to
deploy fully redundant systems throughout the organization. The cost of this would likely be prohibitive.
Thus, the organization may negotiate a more acceptable performance level at a more reasonable cost.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 1-9
Email is often used to communicate significant amounts of business information, including confidential
materials such as customer data or business intelligence. In many countries, governments have imposed
compliance requirements that mandate how organizations ensure data confidentiality.
Discussion Questions
Based on your experience, consider the following questions:
Question: In what type of business does your organization participate? What are the
legislated compliance requirements for your organization?
Question: What issues do regulatory and organizational compliance requirements raise for
your organization? How are you addressing these issues? What are the gaps between the
requirements and the solutions?
Question: Are the compliance solutions based on policy or technology? In other words, does
your organization only have written policies that define what users can do, or is there a
technological solution in place to enforce some or all of the requirements? If you are using a
policy-based solution, how do you enforce policies?
1-10
Project constraints define the projects parameters. Project constraints often set limits on what you can
accomplish. For example, if the project has a fixed budget, the budget becomes a constraint that defines
parameters for what you can accomplish.
Resource constraints. A projects budget is a common resource constraint. If the proposed budget
cannot meet the projected personnel costs, equipment costs, and software costs, the project cannot
continue. Additionally, a project may have additional resource constraints:
The appropriate personnel may not be available, or their training may not be sufficient to
complete the project.
Schedule constraints. A project schedule also may restrict what the project can accomplish. For
example, many organizations do not allow changes to the IT environment during specific times,
such as during the end of the corporate fiscal year, or peak business cycles. If a project is due for
completion during one of these periods, the project scope may require modification. In large
organizations, a project may be constrained by the schedule of other projects.
Feature constraints. Organizations may restrict features that are included in a project. For example,
a requirement may exist to provide users with mobile device access to Exchange Server mailboxes.
However, if the proposed solution cannot address this requirement, the project might be canceled.
Additionally, requiring email encryption might necessitate issuing a smart card to all mobile users.
However, the organization might not have the organizational maturity, necessary infrastructure, or
budget to do so.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 1-11
1-12
Lesson 2
Business requirements are not the only factors to consider when designing a messaging system.
Additional needs can add to the project design, or constrain a projects design by limiting or strictly
defining which business requirements the project can address.
After completing this lesson, you will be able to:
Identify IT requirements.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 1-13
Typical Stakeholders
Provides new opportunities. For example, if a project provides new offerings to customers, they may
be important stakeholders.
Increases workload. A stakeholder may be involved in the products deployment or future support.
A project such as an Exchange Server 2010 deployment can have several additional stakeholders besides
the project sponsor, including:
IT personnel. The Exchange Server 2010 deployment will affect almost all aspects of IT administration.
Therefore, IT personnel have an interest in the technical design. The specific roles that will be affected
include: network administrators, storage area network (SAN) administrators, Active Directory
Domain Services (AD DS) administrators, administrators for network services such as Domain Name
System (DNS), and messaging administrators.
Security and compliance officers. These people typically are important stakeholders because of the
data types being sent via email, and the integration of email into many business processes.
Messaging users. A new technology often affects users directly, and they may have different
requirements than a business sponsor.
1-14
Identifying Stakeholders
Use the following process to determine which stakeholders should be consulted regarding a messaging
system deployment:
1.
Identify a small group of the most critical and obvious stakeholders, and the personnel who have the
highest level of IT infrastructure understanding.
2.
Present this group with a high-level description document of the project scope and business
requirements. The description document does not need to be detailed, but should include the parts
of the organization that the project may impact.
3.
Allow this group to identify all other organizational parties or groups that the new technologys
deployment will affect.
4.
Gather additional information, if necessary, to verify the description documents accuracy. For each
group that is listed, briefly describe its contribution to the project.
5.
Select one or more group members to act as stakeholders and the groups representatives.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 1-15
IT personnel are one of the most important stakeholder groups in an Exchange Server 2010 deployment.
Typically, they have a thorough understanding of the current technology environment. This means that
they understand the current environments limitations, and can detail the projects necessary
technological requirements.
Server room equipment. This includes infrastructure such as air conditioning, uninterruptible power
supply (UPS), redundant power sources, and fire-suppression equipment. Server room equipment also
may include physical security to ensure that only authorized personnel enter the room. In most cases,
modifications to server room equipment are not included in the Exchange Server 2010 deployment
project or budget. Therefore, available equipment may impact deployment.
2.
Storage technologies. Most large organizations have implemented SANs for applications such as
Exchange Server, which stores a large amount of data. If an organization has a significant monetary
investment in this solution, the Exchange Server 2010 deployment likely will have to use the SAN
solution, regardless of whether an alternative solution provides more benefits. On the other hand, if
the SAN is operating at maximum capacity, the Exchange Server 2010 project must implement
alternative storage solutions. Exchange Server 2010 provides options such as continuous cluster
replication (CCR) for providing data redundancy, and supports new technologies such as Internet
small computer system interface (iSCSI).
1-16
3.
Backup and recovery solutions. The Exchange servers must be included in the regular backup process.
If an organization has an existing corporate backup solution, the Exchange servers must use that
solution. This may constrain the projects design for backing up Exchange servers. For example, the
backup solution may have limited capacity, which may require a small backup window for the
Exchange Server environment. You also will need to consider the changes made to Exchange
Server 2010 to support Volume Shadow Copy Service (VSS) backups and features (such as CCR)
when planning the Exchange Server integration into the current backup solution.
4.
Network infrastructure. The Exchange Server 2010 deployment must integrate with the current
network infrastructure. The local area network (LAN) or wide area network (WAN) environments may
constrain the available messaging bandwidth, which in turn may impact whether SLA-mandated
message delivery times can be met. As part of the project design, you must consider whether to
include network upgrades, or renegotiate the SLA.
5.
Active Directory infrastructure. Exchange Server 2010 is integrated tightly with AD DS, but it can
operate in almost any Windows Server 2008 Active Directory environment. However, the Active
Directory configurationsuch as the site configurationand the locations of the domain controller
and global catalog server can impact Exchange Server 2010 performance significantly. If the Active
Directory environment is not designed for optimal performance, redesigning the Active Directory
configuration or modifying an optimal Exchange Server design may be necessary.
6.
Data center configuration and location. Some organizations place all their servers in a single location,
or data center, while other organizations may choose to distribute servers across multiple data
centers. This may be for a variety of reasons, including: to provide primary data center redundancy to
take advantage of potential cost-savings of operating the data center in a low-cost region, or because
the original data center is no longer large enough to house the required servers. To some extent,
branch offices that include one or more servers can also be considered data centers. If your
organization has multiple data centers or larger branch offices, this will impact your Exchange Server
deployment plan.
7.
User distribution. In small organizations, the design of your Exchange Server infrastructure does not
need to consider user distribution; they are all probably located in a single office. However, if you are
planning to implement Exchange Server in an organization that supports thousands of users, the
chances are that they will be distributed across multiple locations. In addition, even in small
organizations, users need to access their email and related services from home, or from a remote
network. It is important that when you plan your Exchange Server implementation, you consider
carefully how your users are distributed, and from where they typically access email. These
considerations have an impact on the location and number of Exchange Server roles that you must
deploy.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 1-17
Identifying IT Requirements
What are the IT concerns about the project? Introduction of any new technology likely will raise IT
concerns, which may include potential disruptions to other IT systems, the training needs for IT
personnel who have to manage a new technology, or the impact to current IT processes of a new
solution.
2.
What are the current IT pain points that the project may address? IT departments often have longstanding concerns or issues with organizational processes. Sometimes these issues result from a
limitation in the current technology. By exploring messaging-related issues with the IT department,
you may be able to incorporate a solution into the Exchange Server 2010 design.
3.
What are the IT requirements for accepting a new technology? Many organizations have very detailed
transition-to-production requirements that must be addressed before the IT department can accept a
new technology. These requirements may include detailed documentation on deploying and
managing new technologies, and training for those who have to manage new technologies.
1-18
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 1-19
Another essential stakeholder group consists of those who create and enforce an organizations security
policies. Messaging is an integral part of most organizations business processes, so it is imperative to
identify any security issues early, and include their solutions in the projects design.
What are the organizations security risks? There are many possible answers to this question,
including:
Email clients are at risk from viruses and other malware that may be spread through the email
system.
Authentication traffic and message-access traffic are at risk for capture when users access their
mailboxes with Microsoft Office Outlook Web App for Exchange Server 2010. A security risk
also occurs if users save confidential attachments on unsecured client computers.
Mobile client computers are difficult to secure and frequently are lost or stolen.
Internet-facing Simple Mail Transfer Protocol (SMTP) servers must accept anonymous and
unauthenticated connections, and must be able to send email using the same connection types;
this does not provide security for messages, and may expose potentially private or confidential
information. Additionally, the server is exposed to Internet attacks.
1-20
Messages on mailbox servers may contain private or confidential information that is at risk if
unauthorized users access the data, or if the server is compromised.
How are the security requirements currently addressed? Almost all organizations have addressed at
least some security requirements. For example, virtually all organizations have implemented antivirus
and anti-spam solutions. Most organizations use Secure Sockets Layer (SSL) to secure Outlook Web
App traffic.
What gaps exist between security requirements and current solutions? One of the most difficult
security gaps to address is with SMTP email. Virtually all SMTP email is sent in clear text, or is
Multipurpose Internet Mail Extensions (MIME) encoded. Organizations can implement features such
as Secure MIME (S/MIME) or Transport Layer Security (TLS), but the functionality is limited and may
be difficult to implement or manage.
What general security requirements or guidelines must the messaging project follow? Most
organizations have general security requirements that apply to all projects and may require that:
All servers are located in a locked facility that limits access to authorized personnel.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 1-21
Another important stakeholder group in an Exchange Server 2010 deployment is the messaging system
users.
Is there email functionality that users would like to have, that the current system does not make
available?
What problems do users experience with the current messaging system? Why are users experiencing
the issues? Is the problem due to technology limitations, or a lack of user knowledge or training? Is
the problem due to a policy limitation, such as mailbox size restrictions?
What user training will be required when you implement the new system?
How much do users utilize the messaging system? Can you characterize the activity level of users as
light, medium, or heavy? How many users fall into each category?
Are there groups of users with special security needs, performance requirements, or functionality
concerns?
1-22
Note User requirements are very important to a messaging systems ultimate success or
failure. If the first user experience with a new system is negative (possibly because the
system is difficult to use or does not meet expectations) it is very difficult to achieve broad
user acceptance of the system. As much as possible, ensure that your solution addresses
user requirements, and that users receive the required training for the new system.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 1-23
As you gather all of the requirements for the Exchange Server 2010 deployment, it is likely that you will
identify conflicting requirements. For example, certain business requirementssuch as the budgetmay
conflict with other business requirements, such as security requirements. In this example, the IT
department may have security requirements that add significant cost to a project, thereby exceeding the
budget that the business sponsor set.
Discussion Questions
Based on your experience, consider the following questions:
Question: What examples have you seen where requirements conflicted?
Question: One of the most common scenarios for incompatible requirements occurs
between security and business requirements. How can security requirements be balanced
with other requirements?
Question: What guidelines would you suggest for addressing conflicting requirements?
1-24
Lesson 3
Service level management is the process of defining and monitoring service levels. This is an essential tool
to ensure that an organizations IT provider meets business needs. Availability is one of the most
commonly monitored services within an organization. An SLA defines the requirements for service
availability and other service characteristics. You should base all of the objectives that an SLA lists and that
service level management monitors, on business requirements. As you devise SLAs, you should consider
disaster recovery.
After completing this lesson, you will be able to:
Describe SLAs.
Create SLAs.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 1-25
Internal SLAs
An internal SLA is between the IT department and other departments in the same organization.
An internal SLA between two departments within one organization rarely has legal consequences, but
does describe the relationship, expectations, and timescale for service deliveries. Thus, it is binding
because it represents an agreement between two parties who should make every attempt to meet the
documented service levels.
1-26
The internal parties are accountable for what they do and do not achieve as outlined in the SLA. There
may be repercussions within the organization when an agreed-upon service is not fulfilled, even though
the document is not a legal contract. ITs status may suffer, for example, if there are issues on chargeable
services, or if the costs of providing an agreed-upon service cannot be justified.
Note: The IT Infrastructure Library (ITIL) refers to an internal SLA agreement as an operational level
agreement (OLA).
External SLA
External SLAs are more formal, legally-binding contracts than internal SLAs. An external SLA may have
more structure because it usually includes cost and bonus clauses, and sometimes includes penalty
clauses. However, an external SLA always includes the services specific cost and deliverables, which often
include availability and security services.
Additionally, an external SLA typically involves a stated cost that will apply if changes in service criteria
occur. For example, if support hours from a service desk outsourced under an SLA increase, then costs for
the increased availability of staff and services are incurred. These costs typically pass on to the contracting
organization. However, such costs likely are justifiable, because business revenues will most likely have
increased as a result of longer service hours.
If an external SLA must be legally binding, it should be checked by a qualified legal professional, either
from an internal legal department or an external legal counsel. In other words, you should not enter into
an SLA contract without confirming the contracts legal implications, including the definition and
description of costs, bonuses, penalties, and the reasons for contract termination.
Informal SLA
Not all SLAs are contracts with formal terms and conditions. In some cases, service level expectations are
based on a verbal agreement between the IT provider and the organization. This is an informal SLA, and
often these types of agreements develop over time through casual conversations with the IT provider. An
internal agreement is usually informal.
While an informal SLA avoids the negotiation process that a formal SLA requires, the undocumented
nature of an informal SLA can lead to the customer misunderstanding the SLA terms and conditions. The
IT provider can publish an informal SLA to the entire organization to help minimize misunderstandings.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 1-27
Service level management is the process of defining and managingvia monitoring, reporting, and
reviewingan organizations required and expected service levels. It aligns business needs with delivery of
IT services. The goal of service level management is to successfully deliver, maintain, and improve IT
services in a cost-effective manner.
Description
Create a service
catalog
Written in business language, a service catalog is the definitive guide to the services
available to the business. It provides end-to-end descriptions of the service
components used to deliver services, and the IT functionality that the business uses.
This information creates and defines the SLA within each area, since the SLA is
developed according to the priority and business requirements of the service.
Negotiate SLAs
Monitor the
service levels
1-28
(continued)
Task
Description
Report the
service level
Using the service catalog and the SLA, reports should be designed and scheduled. If
required, real-time SLA criteria monitoring should be conducted. The thresholds,
alerts, notifications, and actions for real-time criteria monitoring should be
considered, and service performance measured against them. You can complete a
service-level review at required intervals with the customer department
representative, using reports produced from historical data and the monitoring
function.
Review the
service level
agreement
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 1-29
What Is Availability?
Availability refers to a level of service that applications, services, or systems provide, and is expressed
as the percentage of time that a service or system is available. Highly available systems have minimal
downtime, whether planned or unplanned, and are available more than 99 percent of the time,
depending on the needs and the budget of the organization. For example, a system that is unavailable
for 8.75 hours per year would have a 99.9 percent availability rating.
To improve availability, you must implement fault-tolerance mechanisms that mask or minimize how
service component failures and dependencies impact the system. You can achieve fault tolerance by
implementing redundancy to single points of failure.
If all hardware and software on the primary server are functioning correctly and the application is
ready to accept all user connections, then does the solution provide 100 percent availability?
1-30
If there are 100 users, but 25 cannot connect because of a local network failure, then does the
solution still provide 100 percent availability? In this situation, the solution meets the 100 percent
availability expectations of 75 percent of the users, but for the rest of the users, it does not. How do
we consider this as part of the availability since all of the users are not affected?
If only one user out of 100 can connect and process work, is only 1 percent available?
If all 100 users can connect, but the service is degraded with only two out of three customer
transactions being available, or performance is poor, how does this affect availability measurements?
The availability measurement period also can have a significant effect on the definition of availability. For
example, a requirement for 99.9 percent availability over a one-year period allows 8.75 hours of
downtime, whereas a requirement for 99.9 percent availability over a rolling four-week window allows
only 40 minutes of downtime per period.
Outages
It also is necessary to identify and negotiate downtime periods for planned maintenance activities,
service pack updates, and software updates. These are scheduled outages, and typically not included as
downtime when calculating the systems availability. You typically calculate availability based on
unplanned outages, such as a system crash. However, you have to negotiate exactly which outages you
consider to be downtime.
For example: Service Availability of 99.9%:
Contoso, Ltd has 100 databases. Over a four week period, 100 databases are down for 1 hour each.
Thats a total downtime of 60*100=6,000 database minutes of downtime. Given that four weeks
consist of 40,320 minutes, the total number of database minutes in Contoso during the period was
100*40,320=4,032,000 database minutes. If we divide 6,000 by 4,032,000 we get .0015 downtime, which
is a database availability of 99.85 percent.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 1-31
Business requirements help IT providers understand business processes. IT systems exist to support
business processes. However, many times the IT provider is isolated from the business processes that need
support. If the IT provider understands the processes that various business units use, then the provider is
better able to anticipate and meet the organizations business requirements. Service level management
provides the interface between the organization and the IT provider, so that the IT provider can deliver
solutions in line with the business requirements at an acceptable cost.
You should interview stakeholders and other key positions within the organization to determine business
requirements, which should include: requirements for usage, business processes, mission-critical
applications, and plans for growth.
Priority Definition
You can effectively support business requirements by negotiating each services priority. This identifies
where to target resources.
Some measures that can help you define the services priorities are:
The number of impacted external customers of the organization, and the impacts severity.
For example, consider the loss of an internal messaging system. This would be considered a major
problem for many users. Furthermore, if the organizations business processes use the messaging system
to communicate extensively with external customers, it likely is an even higher priority than if only internal
users are affected.
1-32
Budget Negotiation
It is important to set the correct expectations for all stakeholders when discussing service level
management. Stakeholders might have unrealistic expectations for availability, and must be prepared to
provide the budget to ensure desired availability levels.
In many cases, the first draft of availability requirements that you present includes almost no downtime.
The costs to provide high availability can be significant. And the costs tend to increase for systems with
very high availability. For example, it is relatively inexpensive to update a system from 99.9 percent
availability to 99.99 percent availability. It is much more expensive to update a system from 99.99 percent
availability to 99.999 percent availability.
You must include the cost of availability requirements as part of negotiating an SLA. In many cases, a
lower level of availability is acceptable when the actual cost of availability is known.
However, you may be able to negotiate increased budget levels if a potential service outage is more costly
than the budget change required for increased availability.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 1-33
In addition to accepted availability levels, an SLA must include acceptable recovery times after a disaster
occurs. A disaster can be the loss of any IT system, and can range from hardware and software failures, to
data corruption, to the loss of an entire data center.
To plan for recovery from a disaster, prepare a disaster recovery plan. This plan contains detailed steps
that will help you recover from a disaster. In most cases, there are multiple methods to recover from
disaster. The acceptable recovery time that is defined in the SLA for each system involved determines the
methods you include in the disaster recovery plan. The SLA describes how to recover all necessary data
and services, and the maximum acceptable time that recovery should take.
1-34
When developing an SLA, it is important to start by examining the documented services that the service
catalog makes available, as well as any existing performance metrics you gather when establishing the
baseline setup. When you complete baseline setting, the discussion can focus on whether the services are
adequate, or if they need improvement. You also can clarify the businesss service level priorities.
An SLA must include:
Responsiveness requirements
Data-loss tolerance
Security requirements
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 1-35
Reason
Support business
objectives
If an SLA does not map to the business objectives, it can work against the
organizations plans for the future by using scarce resources on unnecessary
tasks. One example of a business objective matching an SLA requirement is:
recovery of all customer support applications within one day to support the
business objective of 95 percent customer retention for each year.
Be specific and
measurable
Be attainable
1-36
Lesson 4
Once you have gathered the messaging infrastructure requirements, the next step is to analyze the
current network and messaging environment. Analyzing the current environment helps determine the
gaps between the current messaging infrastructure, and the requirements and goals of the intended
messaging infrastructure. This information provides a starting point for determining the appropriate
design and implementation plan for the Exchange Server 2010 deployment.
After completing this lesson, you will be able to:
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 1-37
To determine how your existing network will support an Exchange Server 2010 messaging environment,
build a complete picture of your network infrastructureincluding site locations, connection types, and
router and switch configuration details.
Important As you collect information about the current network infrastructure or any
other component in the current environment, you also should ensure that you collect
information about any planned environment changes. These changes may interfere with the
Exchange Server 2010 deployment, or may result in changes to your design.
The number, geographic locations, and link speed of all sites where network services exist. It is
important to identify all locations that make up the network infrastructure, such as buildings,
campuses, and branch offices. You also must determine the connection types and network speed for
each location.
A routing topology map that illustrates the physical sites and the IP subnets in use at those sites. This
map is useful in planning or integrating with the Active Directory site design, which in turn has a
profound impact on Active Directory replication and message routing.
Bandwidth, latency, and current usage. Bandwidth is the transmission speed over a network
connection in kilobits per second (Kbps). Latency refers to the time it takes (in milliseconds) to
transfer data between two points. Both of these factors combine to determine how much data can be
transmitted in a set time period over the network. You can use this information, the current
applications using the network, and the number of users at various sites and their use patterns, to
create a design for your Exchange Server organization that provides a satisfactory user experience.
When mapping site locations and connections, determine the type and speed of network
1-38
connectivity, and factor in the latency introduced by the distances between sites. The project may
need to include network upgrades to provide Exchange servers with adequate bandwidth for the
messaging service.
Use of virtual local area networks (VLANs). Determine the current use of any VLAN configurations
within your networking infrastructure. If required, ensure that you configure these VLANs, or have the
ability to configure them, to pass the traffic that the existing and intended messaging system is
expected to generate.
Firewall configuration requirements. Depending on your deployment plan, you should determine any
firewall configuration requirements for the implementation and synchronization of an Edge Transport
server, which you should place within a secured perimeter network.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 1-39
Name resolution services translate network addresses to computer names, and vice versa. The DNS
provides the required name resolution services for AD DS, and for internal and external name resolution.
Exchange Server 2010 depends upon DNS for locating Active Directory domain controllers, global catalog
servers, other Exchange servers, and remote domains. All SMTP servers also use DNS mail exchanger (MX)
resource records for routing outbound mail.
What type of DNS software do you currently use? Is it able to handle service (SRV) resource records?
Who maintains and administers the organizations internal and external DNS servers and zone
information? What are the IP addresses of all DNS servers?
Who assigns DNS names and domains within the organization? Is there a centralized authority for
DNS namespace planning and control?
How many DNS zones are currently managed within the environment? Are the DNS zones Active
Directoryintegrated?
What resource records are stored in DNS? For example, have the Sender ID records been configured?
How are the mail exchanger (MX) resource records configured? Have the pointer (PTR) resource
records been configured for internal and external zones?
1-40
AD DS planning and administration is tied closely with messaging service delivery. In many organizations,
the same team is responsible for both. For messaging systems, AD DS is important because it is the
mechanism by which the mail transport agent decides which recipients are local, and where their
mailboxes are stored. Many organizations have already migrated to AD DS, which means that the most
important design and service decisions have already been made.
Active Directory Site Configuration. Unlike Exchange 2000 Server and Exchange Server 2003,
Exchange Server 2010 does not require configuration of a separate routing topology. Exchange
Server 2010 uses the Active Directory site topology to determine where messages are routed in the
organization. Because of this new dependency, it is important to have a solid understanding of the
current Active Directory site topology, including:
Active Directory forest and domain topology. To effectively integrate Exchange Server 2010 into your
current Active Directory structure, you must understand the following:
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 1-41
Does your organization consist of a single forest or multiple forests? The complexity of the
Exchange deployment depends on the complexity of the Active Directory forest topology. A
single forest provides the richest set of mail system features, and provides effective
administration. You can create multiple forests to address specific situations, such as when a
merger or acquisition takes place.
How many domains exist? Are there explicit trust relationships between them? What trust
relationships exist with external domains? If you have a resource forest or multiple forests in your
organization, a trust relationship may be required. If your topology includes multiple forests that
contain Exchange Server 2010, or if your implementation requires a forest-to-forest trust
between forests containing Exchange Server 2010, the minimum Active Directory forest
functional level for each forest must be Windows Server 2003. The Active Directory domain
functional level must be the Microsoft Windows 2000 Server native or Windows Server 2003 for
all domains in the Active Directory forest in which you will install Exchange Server 2010.
Domain controller and global catalog server configuration. As you analyze each Active Directory site,
document the configuration and location of each domain controller and global catalog server. A Hub
Transport server must be able to communicate directly with a global catalog server to perform Active
Directory lookups. You may have to add a global catalog server to each site to ensure availability.
Also, at least one domain controller in each Active Directory site that contains Exchange Server 2010
must be running either the latest 32-bit or 64-bit edition of Windows Server 2003, or the latest 32-bit
or 64-bit edition of Windows Server 2008.
Group Policy configuration. Many organizations use Active Directory Group Policy to provide
centralized management and security of users, groups, computers, and other directory objects.
Document the organization of servers in AD DS and how Group Policy is applied to the organizational
units that contain server computer accounts.
Schema master configuration. Because Exchange Server 2010 requires an update to the Active
Directory schema, it is important to document who controls both the schema master and the
associated rights to make schema modifications. To support Exchange Server 2010, the domain
controller that is the schema master must be running either the latest 32-bit or 64-bit edition of
Windows Server 2003, or the latest 32-bit or 64-bit edition of Windows Server 2008.
Migrating to AD DS
If your organization is migrating to AD DS during the messaging deployment, evaluate the following
factors when assessing the current directory:
What directory service do you use currently? What are the revision and update levels installed on the
servers?
What is the location of the existing directory servers? For performance reasons, it may be desirable to
install new directory servers in the same locations.
What metadirectory, connector, or directory-synchronization tools are in use? Will any such tools be
installed during the messaging deployment?
How is directory data partitioned? Is data for different applications kept separately in the directory?
Are there existing directory access controls? If so, who controls and maintains them?
Who owns the directory schema definition? How are changes managed?
What physical sites and IP subnets exist? Will the number or location of these entities change because
of the messaging deployment?
1-42
If your network contains an existing Exchange messaging environment, it is critical to assess and
document the specific functionality and configuration parameters before proceeding with the Exchange
Server 2010 deployment. The following sections discuss what information you should gather when
analyzing the current messaging infrastructure.
Exchange Server hardware and software version. This includes data related to the processors, memory,
and disk storage. Additionally, it is important to document the version and service pack level of the
current Exchange Server software.
Exchange Server configuration. This consists of data related to server rolessuch as front-end servers
or SMTP gateway configurationsdedicated bridgehead servers, mailbox servers, and public folder
servers.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 1-43
Administrative roles. Document all Exchange administrators and administrative groups, and any
delegated permissions that have been performed.
Routing group configuration. Include data that indicates each groups routing master, names and
locations of servers, and detailed information about the connectors used between routing groups.
This information helps determine how you will transition this configuration to the Active Directory site
structure.
Storage group and mailbox store configuration. This consists of the current mailbox store
configuration, database and log-file locations, and any policies that apply to the current mailbox
stores. Also take note of the current backup and restore plan for data recovery.
SMTP namespaces. Document SMTP namespace for all domains for which your Exchange
organization has authority.
Global settings for message delivery. Consists of a number of configuration settings that control
message delivery, including:
Address filters
Anti-spam and antivirus settings. This includes information related to antivirus software installed
currently, and specific settings related to content filtering or the Intelligent Message Filter, IP Block
lists, IP Allow lists, and attachment blocking settings.
Message security settings. This may include information related to the virtual server settings,
authentication and encryption settings, and secure relationships with other SMTP email domains.
Load-balancing configuration. If you currently implement Network Load Balancing (NLB), document
the configuration so that you can easily migrate the settings to the new messaging infrastructure.
Third-party add-on services. Be sure to document any third-party add-on services, including fax
solutions or voicemail systems. You must determine if the new system will need these services, and
develop plans to decommission these services when they become unnecessary.
Integration Considerations
When integrating with an existing messaging environment, consider the following:
Exchange Server 2010 does not support an in-place upgrade from any earlier Exchange version.
The Exchange organization must be operating in native mode before you can introduce Exchange
Server 2010 servers into the environment. This means that only servers running Exchange Server 2003
or Exchange Server 2007 can exist in the organization.
If your organization includes Exchange Server version 5.5, you must perform an upgrade to Exchange
Server 2003 before moving to Exchange Server 2010. To move messaging services and data from
Exchange Server 2003 to Exchange Server 2010, you must use the move mailbox functionality in
Exchange Server 2010.
1-44
Transitioning to a new messaging system requires a thorough understanding of current usage statistics for
your existing messaging system. This aids in estimating how the new messaging environment will perform,
and if any hardware upgrades are necessary to meet user demands.
The following sections provide information to help you identify messaging system usage within your
network environment.
Client environment. Updating to a new messaging system often requires careful consideration of how
users will access their messages and other mailbox information. You may need to provide specific
connection methods based upon a users requirements or location. Consider the following when
determining the client environment:
What operating system are the clients running? Some Office Outlook features are only available
on Windows Vista. Older clients or Macintosh systems may provide lower functionality. For
using the messaging system, UNIX and Linux clients may be restricted to Internet message access
protocol version 4 (IMAP4), Post Office Protocol version 3 (POP3), or Office Outlook Web App.
How many client computers exist, and where are they located on the network? These two factors
have a profound influence on the users messaging access experience, because slow networks or
heavy server loads are common causes of reported dissatisfaction. By understanding where users
are located, you can better determine client access bottlenecks within the messaging
environment.
Are there plans to redeploy, update, or replace clients? These efforts may happen before, during,
or after the new messaging system deploys, and you can plan the deployment accordingly.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 1-45
Depending upon user requirements, many organizations deploy one or more of the following
client protocols:
POP3/IMAP4
Outlook Anywhere (formerly known as remote procedure call (RPC) over HTTPS)
Size of all messages in specific folders, such as the Deleted Items or Sent Items folders
Determine an extensive client user profile by using the Microsoft Exchange Server Profile Analyzer or
other third-party tools.
For more information: For additional documentation about the Microsoft Exchange Server Profile
Analyzer, see the Microsoft Exchange Server Profile Analyzer (32 bit) page on the Microsoft Download
Center website.
You can use Microsoft Windows Performance Monitor to obtain current usage patterns and statistics.
Exchange Server installs many of its own performance objects and counters to provide information about
Exchange Server services and resources. Specific objects and counters related to user statistics are listed in
the following table.
Object
Counter
MSExchangeIS
User Count
RPC Requests
MSExchange IS Mailbox
Messages Sent/min
Messages Delivered/min
SMTP Server
1-46
You may need to consider a number of additional components when documenting your current
messaging environment. If you understand the use of these additional components, you can determine
the new messaging environments requirements and provide insight on whether updated third-party
components are necessary.
Many of the currently deployed messaging systems use direct attached storage (DAS). However,
many organizations are adopting network attached storage (NAS) and SAN devices because of
their growing capabilities and decreasing storage cost per gigabyte.
The 64-bit architecture of Exchange Server 2010 provides new performance and scalability
opportunities. The increased memory that 64-bit makes available means that Exchange Server
2010 has tremendously different performance characteristics than Exchange Server 2003. 64-bit
code also reduces substantially the disk input/output (I/O) required for Exchange Server 2010.
Have you integrated Windows Clustering services? It is important to document how you have
implemented Windows Clustering services within your messaging environment. There have been
changes and improvements related to high availability and clustering in Exchange Server 2010.
What additional software has been integrated into the current messaging system? Examples of
additional software or services that may have been implemented include: archiving solutions, antispam and antivirus solutions, backup solutions, and third-party high-availability solutions.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 1-47
Have you implemented a specific backup and disaster-recovery infrastructure? Many organizations
use a separate, high-speed network solution for backup and disaster-recovery purposes. It is
important to document this structures use and configuration to ensure that it is adequate for the
new Exchange Server 2010 infrastructure.
How does your current messaging environment integrate with other systems? Be sure to document
this integration, such as with other messaging environments or network services. For example, do you
need to integrate or synchronize information with a Lotus Domino environment? Many organizations
also purchase solutions to provide integration into existing telephone messaging systems. All external
integration solutions need to be documented and evaluated to ensure functionality with Exchange
Server 2010.
Create an inventory of the products used in your environment, including: antivirus and anti-spam
solutions, storage management software, fax or unified messaging connectors, and system management
and monitoring tools.
1-48
Your organizations administrative structure and processes have great influence over the IT infrastructure
design. Understanding the constraints inherent in a particular organization is a crucial part of assessing
the environment before you deploy the new messaging system. Areas to investigate include:
Business unit structure. It is not necessary to explore exhaustively the interrelationships between an
organizations business units or divisions. However, it is useful to examine some aspects of these
relationships. For example:
Do separate business units or divisions require security boundaries between them? If so, you may
need a multiple-forest design, but this has implications for directory synchronization and
message interchange.
What are the requirements for communication between different business units? For example, is
a unified directory or address list necessary for the entire organization? Do different business
units need to be able to schedule appointments or otherwise collaborate? If so, you must
accommodate this with your messaging system design.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 1-49
How is cross-unit communication controlled? In other words, which group is responsible for
locating and resolving authentication, network, or protocol problems that hinder communication
between users and resources in different units?
How is the messaging system funded? While this question might seem to be irrelevant from a
design standpoint, the answer is important. In many organizations, the business units that fund
the messaging systems want the initial design to specify accounting, chargeback, quota, and
tracking features.
1-50
The change control process varies greatly between organizations. Some organizations have not
implemented a formal change control process, while others implement strict change requests, approval,
and notification processes. It is important to understand how your organization manages changes to
ensure that all users and stakeholders are aware of and approve changes made to your messaging
environment.
How does the organization implement IT changes? You need to identify specific processes that take
place when you implement changes. These processes may include:
IT infrastructure change approvals. Before you make changes, IT managers, architects, or security
personnel may have to provide approval. You need to document who the decision makers are,
and how they affect the change-approval process.
Change notification. Before the change takes place, all affected users must be notified of the
change and any impact it may cause. It is important to document all current change-notification
processes, and the requirements specifying when change notifications are required.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 1-51
What are the time frames for making changes that may impact availability? Many organizations
implement SLAs with their internal users or customers. An SLA provides a guarantee that specific
network services will be available, and outlines acceptable outage time frames should an upgrade or
failure occur. Document all current SLAs that the organization uses to ensure that changes do not
impact legal requirements to users.
What are the risk management processes related to change management? A complete change
control process includes a risk analysis and processes for mitigating risks.
1-52
Lesson 5
Microsoft Office 365 delivers the same office productivity and collaboration tools found in Microsoft
Officebut through the cloud. When designing your Exchange Server 2010 deployment, it is important to
consider whether you can use all or part of Office 365 to enhance your messaging infrastructure.
After completing this lesson, you will be able to:
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 1-53
Microsoft Office 365 provides your users with the tools to email, communicate, and share documents
through the Internet (or in a Cloud) without the requirement for your organization to purchase servers.
It provides your users with virtually anywhere-access to your their productivity applications and
collaboration tools. On the users client devices, Office 365 is implemented with software with which your
users are familiar: Office Word, Excel, OneNote, and PowerPoint. In addition, Office 365 provides email
and related services with Exchange Online.
For administrators, a cloud-based administrative console enables you to configure user accounts, grant
rights, manage permissions, and manage your Office 365 deployment.
Note Microsoft Office 365 replaces the Business Productivity Online Suite (BPOS). Existing
BPOS customers can transition to Office 365.
Office 365 consists of the following online services:
Microsoft Office Professional Plus. Provides users with access to the latest versions of all the Office
desktop applications. Combined with Office Web Apps, users can access their content from almost
anywhere.
Microsoft Exchange Online. Provides email, calendar, and contacts. Users can connect with a variety of
mobile devices, or use either Microsoft Office Outlook 2007 or Office Outlook 2010. Exchange Online
also helps to provide for improved message hygiene through the use of anti-spam and antivirus
software.
Microsoft Lync Online. Enables your users to connect to their contacts with instant messaging (IM),
video calls, and online meetings.
1-54
Microsoft Office Web Apps. Enables users to create, view, share, and edit their Microsoft Office
documents on the web. Users can use a wide variety of computing devices to access their content.
Note Devices require an Internet connection and a supported browsers such as Internet
Explorer.
Office 365 is available in a number of subscription plans for different types and sizes of organizations.
These are:
Microsoft Office 365 for professionals and small businesses. Designed for organizations with no more
than 25 users and provides the foundation Office 365 services: email, calendar, and website services.
Microsoft Office 365 for midsize businesses and enterprises. Designed for any size organization that
requires the more advanced features of Office 365, such as:
AD DS
Advanced archiving
Microsoft Office 365 for education. Provides a similar user experience to that of Office 365 for midsize
businesses and enterprises, but tailored for educational establishments.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 1-55
With Exchange Online, your users can access their email and related content from either Microsoft Office
Outlook, a supported web browser, or from a range of mobile devices.
Exchange Online has the following features:
Extensive client support. Users can access Exchange Online content by using Microsoft Office Outlook,
including Outlook Anywhere, compatible web-browsers, or from POP client devices.
Mobile device security policies, including PIN lock and remove device wipe
The ability to federate with other Exchange Online organizations to share free/busy calendar data
Voicemail. Exchange Online voicemail is compatible with both on-premises PBX phone systems and
Lync Server 2010. In addition, Exchange Online provides voicemail preview, call answering rules, and
company auto-attendant.
Data protection. Exchange Online is backed by an SLA that guarantees 99.9% uptime. In addition,
continuous data backup between is provided between globally-redundant datacenters. At the more
local level, deleted item retention and deleted mailbox recovery are both provided.
1-56
Security. To help to provide for message hygiene, Microsoft Forefront Online Security for Exchange is
used to help to protect against virus and spam. In addition, continuous intrusion monitoring and
detection is provided, and all connections to the Exchange Online environment are implemented over
HTTPS to help keep access more secure.
Archiving and compliance. Exchange Online has built-in email archiving and provides you with the
ability to search multiple user mailboxes at once. Exchange Online provides policies to automatically
expire email data or to preserve it for compliance purposes. In addition, flexible transport rules can be
used for applying disclaimers and other policies to email in transit.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 1-57
If your organization has decided to implement Exchange Online, this will impact the design of your
Exchange Server deployment.
For example, you must consider whether you will implement Exchange Online only, or whether you intend
to deploy a hybrid solution in which both Exchange Online and an on-premises Exchange Server
environment will coexist; this is an important decision as it greatly impacts the other design decisions that
you make.
Note Even if you intend to implement Exchange Online only, but have an existing onpremise Exchange Server environment from which you plan to migrate, this will require a
hybrid solution during the migration phase of the deployment project.
Deploying a hybrid solution requires additional design considerations and deployment steps. For example,
a hybrid solution requires:
At least one Exchange Server 2010 server in your existing messaging infrastructure.
Note If you currently have either Exchange Server 2003 or Exchange Server 2007 servers,
get an Exchange Server 2010 Hybrid Edition license key from Microsoft support; this key
enables you to install Exchange Server 2010, and is used only to connect your Exchange
Server 2003 and Exchange Server 2007 servers to Exchange Online.
Optionally, single sign-on. This enables your users to use their company network credentials to access
their online mailboxes. To enable single sign-on, you must deploy Active Directory Federation
Services (AD FS) version 2.0.
1-58
Directory synchronization. This enables AD DS to replicate with the directory services within Exchange
Online. The directory synchronization tool has certain limitations:
A suitable transport pipe. You must configure the necessary send and receive connectors to enable
messages to flow between the Exchange Online and on-premise Exchange environments.
Digital certificates. Self-signed certificates can be used to help to secure communication between
client-side applications and the Exchange Online environment, but for some purposes, you must
implement public certificates.
Note Module 12 expands on these concepts.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 1-59
Lab Setup
For this lab, you do not require any virtual machines.
Lab Scenario
You are a messaging engineer for A. Datum Corporation, an enterprise-level organization with multiple
locations. A. Datum is an international corporation involved in technology research and investment, and is
planning to upgrade from Exchange Server 2003 to Exchange Server 2010. A. Datum currently has three
remote sites, and their headquarters. The company is pursuing an aggressive expansion plan, and will be
adding two new office locations during the upgrade project.
Location
Internal users
Mobile users
London
Corporate
Headquarters
12,000 currently
10,000 after the new
London office is ready
London (new
office)
4,000 (anticipated)
San Diego
Former head
office of
Trey Research
500
Vancouver
6,000
1-60
(continued)
Location
Internal users
Mobile users
Tokyo
5,000
Chennai (new
office)
800 (anticipated)
A. Datum has deployed a single Active Directory forest with a dedicated root domain named
Adatum.com, and three child domains in the same tree. These domains are:
EU.Adatum.com
NA.Adatum.com
AS.Adatum.com
Additionally, the organization has deployed a domain named TreyResearch.net in the San Diego location.
This domain is configured as a separate tree in the Adatum.com forest.
Adatum_Info.vsd
Domains:
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 1-61
1-62
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 1-63
1-64
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 1-65
2.
Complete the appropriate sections in the Current Network Infrastructure Analysis document.
3.
Complete the appropriate sections in the Current Messaging Infrastructure Analysis document.
Note
You may not be able to fill in all of the information in the documents.
Adatum_Info.vsd
1-66
Jason Carlson
31st January 2010
LondonSite
RD-LON-DC1
RD-LON-DC1
EU-LON-DC1
EU-LON-DC2
Additional notes
Additional notes
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 1-67
Jason Carlson
31st January 2010
Exchange
version and
SP level
Server
role
Location
LON-MSG-FE1
Exchange
Server 2003
Frontend
server
London
1-68
(continued)
A. Datum Current Messaging Infrastructure Analysis
Exchange Server Configuration
Additional notes
Settings
Administrative
groups
Administrator
groups
Routing
groups
SMTP
namespaces
Additional notes
Results: After this exercise, you should have completed the appropriate sections in the Current Messaging
Infrastructure Analysis document.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 1-69
2.
3.
Discuss the components that you will need to include in the Exchange Server design to meet the
company requirements.
Note
You may not be able to fill in all of the information in the documents.
2.
Jason Carlson
31st January 2010
1-70
(continued)
A. Datum Project Requirements Analysis
Summary of additional requirements
This section lists the additional requirements identified during the requirements analysis task.
Additional requirements may include data related to additional stakeholders, required technology,
and user requirements:
Task 3: Discuss the components that you will need to include in the Exchange Server
design to meet the company requirements
You will complete these sections as a group.
What components will you need to include in the Exchange Server 2010 deployment to meet the
business requirements?
2.
What components will you need to include in the Exchange Server 2010 deployment to meet the
technical and additional requirements?
Results: After this exercise, you should have completed the A. Datum Project Requirements documents.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 1-71
Question: How do you resolve scenarios where addressing all of the requirements will cost
significantly more than the proposed budget?
Results: After this exercise, you should have answered the preceding questions.
1-72
Users must be able to send and receive email from the Internet at all times.
If an Exchange Server fails, users should experience very little disruption in service, and no mail
messages should be lost.
Requests for restored mailboxes and messages must be processed as soon as possible.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 1-73
Review the high availability requirements document that the CIO and COO have created.
2.
3.
Task 1: Review the high availability requirements document that the CIO and COO
have created
Working with group members, brainstorm a list of other information that is required to create the
SLA.
2.
Jason Carlson
31st January 2010
Questions
Results: After this exercise, you should have completed the High Availability Information document.
1-74
On the host computer, click Start, point to Administrative Tools, and then click Hyper-V Manager.
2.
In Hyper-V Manager, click 10233B-NYC-DC1, and in the Actions pane, click Start.
3.
In the Actions pane, click Connect. Wait until the virtual machine starts.
4.
5.
Password: Pa$$w0rd
Domain: Contoso
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 1-75
Review Questions
1.
2.
3.
4.
A. Datum has 50 databases. In a five week period, each database is unavailable for 30 minutes each.
What is the percent service availability as measured by the proportional uptime of the databases?
5.
What would the database unavailability need to drop toper databaseto achieve 99.99% uptime?
Best Practices
Supplement or modify the following best practices for your own work situations:
If an organization does not have any written SLAs, it is very important when beginning any
deployment project to identify and document informal SLAs. Clearly identifying the expected system
performance enables future validation of the projects success.
As much as possible, ensure that your messaging solution addresses the needs of your usersif the
first user experience of a new system is positive, the system is more likely to be accepted.
1-76
It is critical that the monitoring, reporting, and reviewing tasks in the service level management
process are performed; without these tasks, the value of an SLA is reduced significantly
Ensure that the information you collect that relates to your existing infrastructure remains current;
that is, it includes any planned changes to the environment that may impact the Exchange Server
2010 deployment.
2-1
Module 2
Designing Microsoft Exchange Server 2010 Integration
with the Current Infrastructure
Contents
Lesson 1: Designing the Network Infrastructure
2-3
2-16
2-32
2-40
2-55
2-2 Designing Microsoft Exchange Server 2010 Integration with the Current Infrastructure
Module Overview
You will seldom deploy Microsoft Exchange Server 2010 into an organization with no pre-existing IT
infrastructure. Consequently, it is important that you understand what networking components must be in
place, and how they must be configured in order to properly support Exchange Server 2010.
After completing this module, you will be able to:
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 2-3
Lesson 1
2-4 Designing Microsoft Exchange Server 2010 Integration with the Current Infrastructure
The four network cornerstones of a successful Exchange Server 2010 deployment are: Active Directory
Domain Services (AD DS), DNS, an appropriately configured routing infrastructure, and Internet
connectivity.
AD DS
Exchange Server 2010 uses AD DS to store configuration information, and to share directory data with
Windows servers.
If your organization already has AD DS implemented, you must understand the changes that you must
make to AD DS to support Exchange Server 2010.
If your organization does not currently have AD DS implemented, then you can consider making less
constrained design decisions when planning your Exchange Server 2010 deployment; however, you must
consider how best to migrate from your existing directory service.
When you begin planning your Exchange Server 2010 deployment, consider the following facts relating to
AD DS:
Schema and related changes. When you deploy Exchange Server 2010, you must make certain
schema and configuration changes to AD DS. In larger organizations, you must plan for these
changes carefully. For example: support teams that are involved in the process of making schema
changes may differ from support teams involved in deploying and maintaining the messaging
infrastructure. There may also be applications deployed within the organization that will be impacted
by the required schema changes. In smaller organizations, these changes may have a less significant
impact on users or installed applications. In addition, smaller organizations often use a single team of
support staff for all infrastructure projects.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 2-5
Site configuration. Exchange 2000 Server and Exchange Server 2003 both used routing groups as a
means for determining the optimum delivery path for messages within an organization. Exchange
Server 2010 uses the AD DS site configuration. The current site configuration might be entirely
suitable for optimizing message delivery, but it may also not be. You may need to reconfigure the
existing site configuration to better support the Exchange Server 2010s needs. This may involve
modifying the AD DS site configuration directly, or overlaying an Exchange Server 2010 specific site
configuration.
Placement of domain controllers and global catalog servers. Exchange Server 2010 requires access to
both domain controllers and global catalog servers in order to perform various functions, including
message routing and delivery, distribution list expansion, and accessing address lists and email
address policies. You must ensure that you deploy sufficient domain controllers and global catalog
servers in each site.
DNS
DNS supports a number of critical functions in any messaging solution. For example, DNS is responsible
for:
Enabling messaging servers in remote organizations to resolve the name and IP address of servers
within your organization that are responsible for handling inbound Simple Mail Transfer Protocol
(SMTP) email.
Enabling messaging servers in your organizations to resolve the name and IP address of servers within
other organizations that are responsible for handling their inbound SMTP email.
Supporting the resolution of names to IP addresses for internal SMTP communications between Hub
Transport servers within your organization.
Supporting the resolution of names to Edge Transport server IP addresses, or other SMTP relays, for
Hub Transport servers within your organization.
Supporting the resolution of names to Hub Transport server IP addresses, for the Edge Transport
servers or other SMTP relays within your organization.
Providing site location information about Exchange Server 2010 services. This also requires AD DS.
Routing Topology
The purpose of an AD DS site is to define a geographic boundary that represents a collection of servers
and services that are connected with high-speed, low-latency network devices. Typically computers within
an AD DS site need not be too concerned about the availability of network bandwidth. When computers
in a different geographic location are connected to the first location, if the devices that interconnect them
introduce too much latency, or do not provide sufficient bandwidth, the AD DS administrators create a
new AD DS site for the new location. The administrators also configure the site connections between the
two sites. These site connectors are a logical representation of the underlying network devices that
interconnect the two locations. They define a cost and an AD DS replication interval and schedule.
Both Exchange Server 2007 and Exchange Server 2010 use the existing AD DS site configuration to make
message routing decisions. Therefore it is important that the existing site configuration is properly
configured, and that the necessary Exchange Server 2010 services are deployed to each site. The existing
routing topology and the AD DS site configuration that maps to it may not be ideally suited to supporting
your Exchange Server 2010 deployment.
2-6 Designing Microsoft Exchange Server 2010 Integration with the Current Infrastructure
Internet Connectivity
Email is a critical communications tool. Without email, an organizations functionality is impaired. Most
organizations use email as a primary external communications mechanism. The Internet provides the
mechanism through which this communication is routed. Your organization probably already has a
connection to the Internet, and you must consider the current configuration when planning the Exchange
Server 2010 deployment.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 2-7
Many organizations allow their employees to access their email and related data from locations other
than the corporate intranet. However, often there is no single way in which employees access this data.
For example, some users may choose to use a web browser to access their email, while others use mobile
devices such as a mobile phone installed with Windows Mobile. In addition, the computers with which
users access their data might not be managed computers, and consequently, security issues might be
more of a concern.
When planning client access from the Internet, you must consider the following factors:
Device types. The type of device with which a user accesses their remote messaging data will vary.
Some users will use a web browser, others will use Windows Mobile devices, while others will use an
email client that supports protocols such as Post Office Protocol 3 (POP3) or Internet Message Access
Protocol 4 (IMAP4). You must understand the security implications and protocols used by each of
these devices, and these implications on your organization.
DNS configuration. It is important that remote client computers and devices are able to resolve
designated names, in order to access messaging services. For example, the external URL name of the
Client Access server role for a remote user must resolve to the appropriate reverse proxy interface in
the corporate perimeter network. Likewise, since an email program is configured with the name of a
remote POP3 server for mail retrieval, the client computer must have a mechanism for resolving the
name to the appropriate IP address.
Note It is tempting to use IP addresses when configuring email clients, rather than using
server fully qualified domain names (FQDNs). Avoid this practice, as it creates additional
management issues. For example, if the server providing an email client service changes,
you must update the configuration of all affected client computers. Additionally, digital
certificates that are provided to enable authentication and encryption between clients and
servers are configured with a subject name that matches the designated servers published
FQDN; if an IP address is used, this will at best raise an error on the client, and at worst,
prevent email retrieval.
2-8 Designing Microsoft Exchange Server 2010 Integration with the Current Infrastructure
Firewall ports. Understanding the type of device and the protocol being used by the client enables
you to configure the firewalls that separate the clients from the Exchange Server 2010 server. Your
aim should always be to open a port only if its use is unavoidable. Remember that in addition to the
external Internet-facing firewall and the internal perimeter network firewall, you must consider the
Windows firewall configuration. The following table describes the common clients and their
respective protocols and the ports used.
Client type
Microsoft Outlook
Web App
Microsoft Exchange
ActiveSync
POP
POP3; TCP port 110 (or port 995 for Secure Sockets Layer (SSL))
IMAP
Outlook Anywhere
Certificates. Because of the importance of using SSL secure network traffic between Client Access
servers and messaging clients, you must ensure that you deploy the appropriate certificates on the
Client Access servers. You can secure all client connections to the Client Access server using SSL.
Note By default, the Client Access server is configured with a self-signed certificate that is
not trusted by clients. You should remove this certificate, and install a certificate from a
trusted certification authority (CA).
An important consideration when planning the use of certificates is identifying the source of the
certificates. Exchange Server 2010 can use self-signed certificates, or certificates issued by either a
public or private CA. Each type of certificate has benefits and disadvantages. In Exchange Server 2010,
although you can use the self-signed certificates for internal communicationsuch as for securing
SMTP connections between Hub Transport serverswe do not recommend this. Similarly, you also
can use these self-signed certificates to secure client connections to Client Access servers, but because
none of the client computers trust this certificate, we do not recommend this solution either. Rather,
you should consider obtaining a certificate from a public CA or internal CA for all Client Access
servers.
For clients to connect to the Client Access server using SSL without receiving an error message, the
names on the certificate must match the names that the clients use to connect to the server. For
example, if your users connect to the Outlook Web App site using a URL such as
https://mail.contoso.com, and they connect to the IMAP4 server using a name such as
IMAP.contoso.com, you need to ensure that the certificates you use support both server names.
Additionally, if you enable Autodiscover access from the Internet, your certificate also must support a
name such as Autodiscover.contoso.com.
You can implement this configuration by using the following options:
Obtain a separate certificate for each client protocol that requires a unique name. This may
require multiple certificates for all Client Access servers. This may also require multiple websites in
Internet Information Services (IIS). This is the most complicated option to configure.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 2-9
Configure all clients to use the same server name. For example, you could configure all clients to
use the server name mail.contoso.com, and obtain a certificate for just that one name.
Obtain a certificate with multiple subject alternative names. Most public CAs support the use of
multiple names in the certificates subject alternative name extension. When you use one of these
certificates, clients can connect to the Client Access server using any of the names listed in the
subject alternative name.
Use a certificate with a wildcard name. Most public CAs also support the use of wildcards in the
certificate request. For example, you could request a certificate using the subject of
*.contoso.com, and use that certificate for client connections.
Note Not all clients support wildcard certificates. Microsoft Office Outlook, Windows
Internet Explorer, and Window Mobile 6 or newer clients support wildcard certificates, but
you need to verify this functionality for all messaging clients that are used in your
organization before deploying these certificates.
Public computer access. It is possible that users will use public computers to access their messaging
data. For example, a user might use a computer located in an Internet caf to read their email.
Because public computers are unmanaged, they are unmanageable. You must plan carefully for what
type of access you will allow from public computers. For example, if users are using Outlook Web
Access to access their email and any attachments, you can impose limitations on how message
attachments are handled.
Mobile device security. Mobile devicesespecially mobile phonesare prone to becoming lost or
stolen. If these devices contain sensitive corporate or private information and data, there is a
corresponding security risk posed by these devices. You must configure client access to mitigate the
security risks.
High availability. Your users rely on your messaging environments so that they can perform critical
business tasks, and it is extremely important for your messaging solution to be available when
required. High availability is a commonly used term that refers to a specific technology or
configuration that helps to ensure service availability. In Exchange Server 2010, all client access to the
Mailbox role is handled by the Client Access roleeven Messaging Application Programming
Interface (MAPI)-based client communication. Consequently, it is more important than ever that the
Client Access server role is highly available to your Internet-based clients. Exchange Server 2010 uses
client access arrays to provide for this high availability. A client access array is a load-balanced
collection of Client Access servers that are contained in a single site.
To create a client access array, you first must deploy multiple Client Access servers. Next, you need to
use either hardware or software-based network load balancing (NLB) to create a cluster. Then, add
the name for the network load-balanced cluster into DNS. After adding the DNS record, you can
create the client access array and assign it to an AD DS site using the New-ClientAccessArray
cmdlet. Finally, you must assign the client access array to each of the mailbox databases in the site
using the Set-MailboxDatabase cmdlet with the RpcClientAccess parameter to specify the name
of the client access array.
A client access array can exist only in a single AD DS site. Therefore, you would need to create a client
access array in each AD DS site that needs to load balance Client Access servers.
2-10
Designing Microsoft Exchange Server 2010 Integration with the Current Infrastructure
Load balancing. It is important that client access requests are serviced in a timely manner. The
provision of multiple Client Access servers in a client access array not only improves high availability
of the client access role, but also distributes the workload amongst the Client Access servers in the
array.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 2-11
Many of the considerations of providing Internet-based client access apply equally to the local network
environment. Firewall configuration, certificates, load-balancing, and high availability all remain factors in
your design, whether the client is local or remote. However, it is important to understand how the Client
Access role fits within the context of your existing network infrastructure, and to consider any changes
that you might need to make to that infrastructure to better support the role.
Note Implementing Exchange Online may introduce additional Client Access Server
configuration changes. It is important that you consider your Exchange Online
implementation when designing your Client Access Server network configuration. For
further information about the changes that may be introduced by Exchange Online
deployments, refer to Module 12.
AD DS
The Client Access server role uses AD DS, and specifically the global catalog service, to locate the site that
contains a users mailbox. Consequently, you must ensure that each Client Access server has local access
to a global catalog server.
Site Design
In Exchange Server 2010, all messaging clients accessing an Exchange Server 2010 mailbox connect to a
Client Access server. For users to access their mailbox, you must deploy a Client Access server in the same
site as the Mailbox server.
2-12
Designing Microsoft Exchange Server 2010 Integration with the Current Infrastructure
Note Client access to public folder content is handled by the Mailbox server rather than
the Client Access server role.
Note In Exchange Server 2007 or earlier Exchange Server versions, MAPI clients such as
Office Outlook connect directly to Mailbox servers. In Exchange Server 2010, with the
introduction of the Remote Procedure Call (RPC) Client Access service, MAPI clients no
longer connect directly to the Mailbox servers for mailbox access.
Deploying Client Access servers in an environment with multiple AD DS sites adds complexity to
deployment planning, particularly when you consider the options for providing Internet access to those
Client Access servers.
In a single-site scenario, the Client Access server communicates directly with Mailbox servers. In a
multiple-site scenario, clients are directed to a Client Access server located in the same site as the Mailbox
server, or a Client Access server in a remote site might proxy a request to a Client Access server in the
same site as the Mailbox server. The option you select for a multiple-site scenario depends on whether
clients can connect directly to a Client Access server in the same site as their mailbox.
If you have multiple AD DS sites, you can provide Internet access to each sites Client Access server. To
enable this option, you must configure an external URL for each Client Access server. You also must
ensure that clients can resolve the URL name in DNS, and can connect to the Client Access server using
the appropriate protocol.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 2-13
When you begin to plan your message routing infrastructure, there are a number of important factors
regarding the existing network infrastructure that you must consider.
Routing Topology
By default, Hub Transport servers use direct relay to other Hub Transport servers for messages that must
be routed to other AD DS sites. That is, they establish a direct connection using SMTP over Transmission
Control Protocol (TCP) port 25 to the target Hub Transport server. To facilitate this, it is important that an
efficient Transmission Control Protocol/Internet Protocol (TCP/IP) routed infrastructure exists between
geographic locations represented by site objects in AD DS.
Site Design
The Hub Transport server uses the site-link cost assignment to determine a routing; the originating Hub
Transport server uses IP site-link costs to determine the lowest cost path to the destination site. It is
therefore important that the AD DS site configurationincluding the site-link costsare configured
appropriately to support efficient message routing. If they are not, and you are unable to reconfigure
them due to other AD DS-aware applications having different needs than Exchange Server 2010, you can
do one of the following:
Configure one or more AD DS sites in your organization as Exchange Server 2010 hub sites. When a
hub site exists along the least-cost routing path between two Hub Transport servers, the messages
are routed to a Hub Transport server in the hub site for processing before they are relayed to the
destination server. The Hub Transport server routes a message through a hub site only if it exists
along the least-cost routing path. The originating Hub Transport server always calculates the lowestcost route first, and then checks if any of the sites on the route are hub sites. If the lowest-cost route
does not include a hub site, the Hub Transport server will attempt a direct connection.
2-14
Designing Microsoft Exchange Server 2010 Integration with the Current Infrastructure
Note Use the Set-ADSite Identity sitename HubSiteEnabled $true cmdlet to configure a
site as hub site.
Configure Exchange-specific routing costs. You also can modify the default message routing topology
by configuring an Exchange-specific cost to an AD DS IP site link. If you assign an Exchange serverspecific cost to the site link, the Hub Transport server uses this attribute instead of the AD DSassigned cost to determine the least-cost routing path.
Note Use the Set-AdSiteLink Identity ADsitelinkname ExchangeCost value cmdlet to
assign Exchange specific routing costs. You also can use the Set-AdSiteLink Identity
ADsitelinkname MaxMessageSize value cmdlet to assign a maximum message size limit
for messages sent between AD DS sites.
Edge Configuration
In Exchange Server 2010, internal message routing is handled by the Hub Transport server role. In typical
deployments, we recommend that you deploy one or more Edge Transport servers in your perimeter
network to handle external message routing to and from the Internet. If you are not deploying an Edge
Transport server, you will need to configure the Hub Transport server to enable inbound and outbound
mail flow.
Note To enable inbound mail flow, configure an SMTP Receive connector to accept
anonymous connections on port 25 using a network interface that is accessible from the
Internet. To enable outbound email flow, configure an SMTP Send connector with an
address space of *that can use DNS or a smart host to send messages to the Internet.
If you are using the Hub Transport server to send and receive email from the Internet, you should
configure antivirus and anti-spam agents on the Hub Transport server.
We strongly recommend that you use an Edge Transport server role or some other SMTP relay server to
send and receive messages from the Internet. If you are using an SMTP gateway server other than an
Exchange Server 2010 Edge Transport server role, you still will need to configure the SMTP Send
connector and SMTP Receive connector. The only difference is that you should configure the SMTP
gateway server as the smart host on the SMTP Send connector, and accept only connections from the
SMTP gateway server on the SMTP Receive connector. As an alternative to managing your own Edge
Transport server role, you should also consider Exchange Hosted Services.
Once you have established the precise mechanism that you will use to handle external message routing,
you must consider the firewall settings between the corporate network, the perimeter network, and the
Internet. Server-to-server communications between the internal and perimeter network is over
Transmission Control Protocol (TCP) port 25. Likewise, communication between SMTP hosts on the
Internet is over TCP port 25. If you intend supporting remote clients that use POP or IMAP for mail
retrieval, you must consider providing SMTP connectivity to enable those clients to send email. It is
convention to use TCP port 587 to support client SMTP relaying; this port must be open on the external
firewall.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 2-15
Global Catalog
Routing decisions made by the Hub Transport server are based on information stored in AD DS.
Consequently, you must ensure that each Hub Transport server has local access to a global catalog server
to ensure that it can perform the necessary routing queries.
Note Routing decisions made by Edge Transport servers are based on information stored
in AD DS Lightweight Directory Services (AD LDS).
Exchange Online
If you rely solely on an Exchange Online messaging solution within your organization, then there is no
message routing within your organization. However, in hybrid deployment, in which both an on-premises
and an Online Exchange environment will coexist, messages flow from the Internet to your on-premises
Exchange servers. Where applicable, messages then flow from your on-premises Exchange servers to the
recipients mailboxes in the cloud. Consequently, implementing Exchange Online may introduce
additional message routing considerations. For example, you must deploy at least one Exchange Server
2010 SP1 Hub transport in your organization.
Note For further information about the changes that may be introduced by Exchange
Online deployments, refer to Module 12.
2-16
Designing Microsoft Exchange Server 2010 Integration with the Current Infrastructure
Lesson 2
Exchange Server 2010 depends on AD DS to store the Exchange Server 2010 specific configuration and
recipient information. This means that the AD DS design can have a significant impact on the Exchange
Server 2010 design, and on the performance of the Exchange Servers and messaging clients. This lesson
describes the AD DS requirements for Exchange Server 2010, and the implications that the AD DS design
has on the Exchange Server 2010 design.
After completing this lesson, you will be able to:
List the considerations for deploying Exchange Server 2010 servers in AD DS sites.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 2-17
In most small or medium-sized organizations, the same administrator or administrator group is likely
responsible for the AD DS and Exchange Server 2010 infrastructure. Larger organizations often split these
roles between two different teams, who must work together because of the inter-relationship between the
AD DS and Exchange Server 2010 designs.
Note Exchange Server 2010 uses a split permissions model, which distinguishes between
AD DS permissions and Exchange Server 2010 permissions. This makes it easier to separate
the administrative tasks between the two services. However, during the design phase, the
AD DS and Exchange Server 2010 design teams must work together to ensure an optimal
AD DS and Exchange Server 2010 design.
2-18
Designing Microsoft Exchange Server 2010 Integration with the Current Infrastructure
Some organizations may have multiple teams of AD DS design owners. These organizations typically have
multiple AD DS forests. In most cases, the organization created these forests to establish security
boundaries between its different parts. Thus, each forest is likely to have a different group of owners.
If an organization has multiple teams of AD DS design owners, you may need to negotiate with all teams
during the Exchange Server 2010 design.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 2-19
The AD DS forest design can impact the Exchange Server 2010 design significantly. The Exchange Server
2010 organization boundary is always the same as the AD DS forest boundary. Although you can deploy
Exchange Server 2010 in a multiple forest environment, it is complicated to design this type of Exchange
Server 2010 deployment.
AD DS Forest Options
Exchange Server 2010 supports a variety of AD DS forest options, including:
No forest. If you do not deploy AD DS, you still can deploy an Exchange Server 2010 computer
running the Edge Transport server role. The Edge Transport server role stores server configuration
information in Active Directory Lightweight Directory Services (AD LDS), rather than AD DS.
Single forest. In this topology, you install Exchange Server in a single AD DS forest that spans the
entire organization. The same forest contains all user and group accounts, and all of the Exchange
Server 2010 configuration information.
Resource forest. In this topology, you install Exchange Server 2010 in an AD DS forest that does not
contain the user and group accounts. Organizations that require a secure boundary between the
administration of AD DS and Exchange Server 2010 use this design. In a resource forest, you
designate one forest for accounts and authentication, and another for Exchange Server.
Cross-forest. In this topology, you install Exchange Server 2010 into multiple, different AD DS forests.
Organizations that are highly distributed typically deploy this topology, as it enables different
organizational groups to retain management ownership of a forest. In this topology, each forest has a
complete Exchange Server 2010 deployment, and a unique Exchange Server organization object.
2-20
Designing Microsoft Exchange Server 2010 Integration with the Current Infrastructure
Provides the richest set of email system features with the simplest deployment. In a single forest, you
do not need to complete any additional actions to enable features such as calendar access, public
folder access, or a common Global Address List (GAL).
Provides a streamlined administrative model. In a single forest, you do not need to configure trust
relationships or manage multiple Exchange Server 2010 administrative groups.
Takes advantage of an existing AD DS structure. If you have already deployed AD DS, you can use the
existing structure, domain controllers, and the Global Catalog servers. Thus, you do not have to
deploy new servers.
A single forest has one disadvantageadministrators must determine how to share or divide
management responsibilities for AD DS and Exchange Server 2010 objects.
Best Practice A single forest means that the Exchange Server 2010 design and
deployment is significantly simpler than any other option. Therefore, you should always use
a single forest unless there are highly compelling reasons to use multiple forests.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 2-21
Distribution groups from one forest are represented as a contact in the other forests, so you cannot
view the groups members. Group membership does not expand until mail is sent to the forest
containing the group that the contact represents.
Exchange Online
Implementing Exchange Online may introduce a number of design changes, depending upon your
intended messaging configuration. If you plan to implement an Exchange hybrid deployment, consider
the following factors:
Exchange hybrid deployments currently support single sign-on with only a single AD DS forest in
your on-premises AD DS. If you intend to implement a hybrid deployment, plan to implement a
single AD DS forest.
Single label SMTP domain names are not supported. For example, although Contoso.com is
acceptable, Contoso is not. When planning your AD DS forest name, ensure that you avoid using
single label SMTP domain names.
The Exchange Server 2010 SP1 (or higher) AD DS schema must be implemented to support hybrid
deployments.
To implement Active Directory Federation Services (AD FS) and single sign-on within your hybrid
deployment, the user principal name (UPN) of the forest root must be Internet-routable.
Consequently, you must give careful consideration to the internal AD DS forest domain name. For
example, Contoso.local or Contoso.Priv are not Internet-routable, while Contoso.com is. If your
current AD DS forest root UPN is not Internet-routable, it might be sufficient to change the UPN
suffix of all your existing users to a valid, registered, and routable domain suffix; this is a minor
change.
2-22
Designing Microsoft Exchange Server 2010 Integration with the Current Infrastructure
You can deploy Exchange Server 2010 in several different domain configurations. Although deploying
Exchange Server 2010 in a single domain environment may be the simplest design, there is very little
difference between deploying Exchange Server 2010 in a single domain, or in a single forest with multiple
domains.
Single domain
Multiple domains in the same AD DS tree. In this configuration, there is a single, top-level parent
domain, and all of the domains share a contiguous DNS namespace with that parent domain.
Multiple domains in multiple AD DS trees. In this configuration, there are multiple top-level parent
domains with multiple DNS namespaces.
Note Regardless of how many domains and trees are in a forest, the first domain you
deploy in the forest always is the forest root domain. By default, this domain contains the
Schema Master and Domain Naming Master roles, and the Schema Admins and Enterprise
Admins security groups. Exchange Server uses the forest root as a location for its security
groups.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 2-23
Create a dedicated domain for the Exchange Server 2010 servers. Some organizations may choose to
deploy a separate domain for all Exchange Servers and Exchange Server administrators.
One advantage of this is that the Exchange Server administrators also can be the dedicated domain
administrators. This means that the administrators can perform all administrative tasks on the
Exchange Server 2010 servers without requiring any administrative rights in other AD DS domains. To
manage recipients in other domains, you must add the Exchange administrators to the Exchange
Recipient Administrators group.
A primary disadvantage of deploying a dedicated Exchange Server 2010 domain is the extra cost that
results from deploying and managing an additional domain. You should deploy at least two domain
controllers for the Exchange Server 2010 domain, and this configuration may require additional
domain controllers for the domain in other locations.
Instead of deploying a dedicated domain for the Exchange Server 2010 servers, consider using the
Exchange Server 2010 Administrator role to delegate Exchange Server 2010 permissions. Users or
groups that you assign to this role receive full administrative permissions to the specific Exchange
Server 2010 computer.
Deploy Exchange Server 2010 in a multi-tree forest. The main reason for deploying multiple trees in a
forest is to create separate namespaces for different organizational business units. This configuration
often requires separate SMTP addresses for the different business units users. By default, Exchange
Server 2010 creates SMTP addresses for all users based on the domain name of the forest root
domain. You can easily modify the default SMTP address assignment by creating additional accepted
domains, and then configuring email address policies to assign the required email addresses to the
different business units users.
2-24
Designing Microsoft Exchange Server 2010 Integration with the Current Infrastructure
In an organization with multiple locations, the AD DS site design has a significant impact on the Exchange
Server 2010 design. Exchange Server 2010 and messaging clients use AD DS sites to locate domain
controllers, and to define message routing.
The Mailbox server role uses AD DS site membership information to determine which Hub Transport
servers are located in the same AD DS site as the Mailbox server. The Mailbox server then submits
messages for routing and transport to a Hub Transport server that is in the same site.The Client
Access server role uses AD DS site information to provide efficient access to user mailboxes. When the
Client Access server role receives a user connection request, it queries AD DS to determine which
Mailbox server is hosting both the users mailbox and the servers site membership. If the Client
Access server that received the initial user connection is not in the same site as the users Mailbox
server, then the connection is redirected or proxied to a Client Access server in the same site as the
Mailbox server.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 2-25
The Hub Transport server role retrieves information from AD DS to determine the organizations
internal and external mail routing. When a message is submitted to the Exchange Transport service,
the categorizer queries AD DS for information about where the message must be delivered. If
the recipients mailbox is on a Mailbox server in the same AD DS site as the Hub Transport server, it
delivers the message directly to that mailbox. If the recipients mailbox is on a Mailbox server in a
different AD DS site, then the message is relayed to a Hub Transport server in that site, which then
delivers it to the Mailbox server.The Unified Messaging server role uses AD DS site membership
information to determine which Hub Transport servers are located in the same AD DS site as the
Unified Messaging server. The Unified Messaging server submits messages for routing and transport
to a Hub Transport server in the same site as the Unified Messaging server. The Hub Transport server
also queries AD DS to match a telephone numberor other UM property such as the users Mailbox
serverto a recipient account. The Hub Transport server delivers the message to a Mailbox server
within its same AD DS site, or relays the message to another Hub Transport server, which then delivers
it to a Mailbox server that is outside the AD DS site.
Understand the rationale for the current AD DS site design. Organizations that have deployed AD DS
will already have implemented a site design that likely is based on AD DS design best practices. AD
DS sites are designed to decrease replication traffic between company locations and client logon
traffic across slow network connections, and to optimize site-aware applications, such as Distributed
File System (DFS).
Consider using a centralized Exchange Server 2010 deployment. You do not have to deploy Exchange
Server 2010 servers in each AD DS site. If high bandwidth and reliable network connections link all of
your organizations locationsregardless of the distance between officesyou should consider
implementing a centralized messaging system in which all Exchange Server 2010 servers are in one
central location. Because all Exchange Server 2010 serversand other required services such as
domain controllers and DNS serversare on the same fast network, this design will produce the best
Exchange Server 2010 performance. However, note that the most important reason not to implement
a centralized design is if the network bandwidth between company locations cannot support it. If the
requirements for user experience and availability cannot be met by connecting to a central location,
you may have no choice but to position servers in the remote sites.
Consider creating a dedicated AD DS site for Exchange Server 2010 servers. If you use a centralized
design for Exchange Server 2010 servers, or if you deploy several Exchange Server 2010 servers in a
data center, you should consider creating a dedicated AD DS site that contains all of the Exchange
Server 2010 servers in the location. You should also consider including domain controllers and Global
Catalog servers that are dedicated to providing directory services for the Exchange Server 2010
servers in that dedicated AD DS site. This design enables more predictable Exchange Server 2010
performance, because other clients are not using the domain controllers for authentication.Consider
modifying the AD DS site design. If the AD DS site configuration results in an inefficient Exchange
Server 2010 design, you may need to modify it. For example, you may configure two company
locations as a single site. If you need to deploy Exchange Server 2010 servers in both locations, you
should consider configuring separate sites to optimize domain controller access for Exchange Server
2010 servers and messaging clients.
2-26
Designing Microsoft Exchange Server 2010 Integration with the Current Infrastructure
Exchange Server 2010 has a much stronger reliance on AD DS sites than previous Exchange Server
versions. Therefore, you must consider the AD DS site configuration when you design the Exchange Server
2010 deployment.
The first decision you must make when designing the Exchange Server 2010 deployment is whether
to place a server running the Mailbox server role in the AD DS site. If there are a sufficient number of
users in the company location, and you do not want their client access traffic to cross a network link
to another location, then you must place one or more Mailbox servers in the site.
If you place a Mailbox server in the site, you also must place a Hub Transport server role and Client
Access server role in the site. At least one Hub Transport server must be available in the site to route
messages to the sites Mailbox server. You also must deploy a Client Access server in the site to enable
users to access Office Outlook 2007 or Office Outlook 2010 client features, including Autodiscover
and Availability services, or to access their mailboxes via Outlook Web App or Outlook Anywhere.
You should deploy a Unified Messaging server in the site if you are using the Unified Messaging
features, and if you deploy a supported Voice over IP (VoIP) gateway in the site.
Note You can deploy all Exchange Server 2010 server rolesexcept the Edge Transport
server and clustered mailbox serverson the same server. This means that in a small site, a
single computer can hold all of the required server roles.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 2-27
As part of the AD DS site design, you must also consider the domain controller and global catalog server
placement. The location and capacity of these domain controllers can impact Exchange Server 2010 and
messaging client performance significantly.
Deploy at least one domain controller and global catalog server in each site that contains an
Exchange Server 2010 server. To ensure a positive user experience, all Exchange Server servers and
Office Outlook users must have fast access to a global catalog server.
2-28
Designing Microsoft Exchange Server 2010 Integration with the Current Infrastructure
Note The Windows Server 2008 operating system provides a new type of domain
controllera read-only domain controller (RODC). Exchange Server 2010 does not use
RODCs, or RODCs that you configure as read-only global catalog (ROGC) servers. This
means that you should not deploy an Exchange 2010 server in any site that contains only
RODCs or ROGC servers.
For security and performance reasons, you should not run Exchange Server 2010 on computers that
also function as Windows domain controllers, as this configuration may cause performance issues in
all but the smallest deployments.
Note You cannot promote a member server running Exchange Server 2010 to become a
domain controller. Once you install Exchange Server 2010, changing its role from a member
server to a domain controller, or vice versa, is not supported.
As a general guideline, you should implement Exchange processors to global catalog server
processors in an 8:1 ratio in each site, assuming that the processors are similar models and speeds. In
some situations, however, if AD DS includes a large number of users or you have large distribution
lists, you may need more global catalog servers.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 2-29
The Exchange design may require some AD DS changes. However, it can be difficult to modify the AD DS
design in a large, complex organization.
Discussion Questions
Based on your experience, consider the following questions:
Question: What impact might result from changing the AD DS design in a large, complex
company?
Question: How can you balance the complications of modifying the current AD DS design
with the optimal Exchange Server-based design?
Question: How can you help an organization determine whether to modify the AD DS
design?
2-30
Designing Microsoft Exchange Server 2010 Integration with the Current Infrastructure
To install Exchange Server 2010, you must run the Exchange Server 2010 setup command to prepare the
AD DS forest for the installation. In smaller organizations, it is quite probable that a single individual will
prepare AD DS to support Exchange Server when deploying the first Exchange Server. In larger
organizations, different teams of support staff may be involved in the various stages of the preparation
process.
You can use the setup command with the following switches:
Setup switch
Explanation
/PrepareAD
/OrganizationName:
organizationname
/PrepareLegacy
ExchangePermissions
/PrepareSchema
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 2-31
(continued)
Setup switch
/PrepareDomain
/PrepareDomain
domainname
/PrepareAllDomains
Explanation
Prepares the domain for Exchange Server 2010 by creating a new global
group in the Microsoft Exchange System Objects container called
Exchange Install Domain Servers.
Is not required in the domain where /PrepareAD is run.
Can prepare specific domains by adding the domains FQDN, or prepare
all domains in the forest.
Must be run by a member of the Enterprise Admins and Domain Admins
groups.
Note You must prepare the AD DS forest in the same domain and the same site as the
domain controller that hosts the Schema Master role.
In an organization that is not running an earlier Exchange Server version, and which has a single
domain in the AD DS forest, you do not need to prepare AD DS before installing the first Exchange
Server. In this scenario, you can just install Exchange Server 2010, and all of the AD DS schema
changes are implemented during the installation.
If the user account that you are using to update the schema is a member of the Schema Admins and
the Enterprise Admins group, you do not need to run /PrepareLegacyExchangePermissions and
/PrepareSchema before running /PrepareAD. If your account has the necessary permissions, the
/PrepareAD process also configures the legacy permissions and makes the required schema changes.
Running setup with the /PrepareAD parameter performs the following actions:
Prepares the schema if /PrepareSchema has not been run, and the command is run by a Schema
Admins group member.
Prepares the permissions if /PrepareLegacyExchangePermissions has not been run, and the command
is run by an Enterprise Admins group member.
Creates the Microsoft Exchange container in the Configuration partition in AD DS, and populates the
container with all the child containers required to install Exchange Server 2010 computers.
Creates a new organizational unit (OU) in the AD DS domain named Microsoft Exchange Security
Groups, and then creates the security groups that are used to assign permissions in the Exchange
organization.
Note The security groups that are created in the Microsoft Exchange Security Groups OU
are management role groups that use role-based access control (RBAC) to assign
permissions in the Exchange organization.
2-32
Designing Microsoft Exchange Server 2010 Integration with the Current Infrastructure
Lesson 3
Name resolution is an important foundation network service. Without it, many applications would be
unable to function correctly. This is true of Exchange Server 2010, which uses DNS in many ways. This
lesson explores the considerations surrounding DNS when you are planning to implement Exchange
Server 2010.
After completing this lesson, you will be able to:
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 2-33
Without a correctly configured DNS infrastructure, Exchange Server cannot function correctly.
Ensure that all host records are correctly registered. Use of a dynamic name servicesuch as
Windows DNSensures this is achieved. If Exchange Server 2010 servers do not correctly register
their names and the services that they are running, they will not be contactable. By default, Exchange
Server 2010 registers with and performs queries against the DNS server configured on the TCP/IP
properties of the installed network adapter. You can change this default behavior by modifying the
Internal DNS Lookups and External DNS Lookups settings on the Exchange Server 2010 property
sheet by using the Exchange Management Console.
Configure the DNS suffix for each Exchange Server. Exchange servers supporting the Mailbox, Hub
Transport, Client Access, or Unified Messaging roles must be members of an AD DS domain; their
FQDN is automatically derived from the local hostname appended with the AD DS domain name.
However, it is important to remember you must manually configure the primary DNS suffix of the
Edge Transport servers in your perimeter network to match your currently configured default
authoritative accepted domain.
Configure Edge Transport server DNS resolver settings. The Edge Transport server sits in the
perimeter network and may be installed with two network interface cards (NICs), one of which is
Internet-facing, the other of which is internally connected. You must configure the network interface
that is connected to the external network to use a public DNS server for name resolution. This enables
the Edge server to resolve SMTP domain names to mail exchanger (MX) resource records, and route
mail to the Internet. You must configure the internal NIC to use a DNS server in the perimeter
network.
2-34
Designing Microsoft Exchange Server 2010 Integration with the Current Infrastructure
If your Edge Transport server has a single NIC, use the Internal DNS Lookups tab and the External
DNS Lookups tab to configure the appropriate DNS settings to enable appropriate name resolution.
You can access the DNS settings for your Edge Transport server by using the Exchange Management
Console, and then viewing the properties of your Edge Transport server.
Ensure that the Edge Transport servers and the Hub Transport servers are able to use DNS host
resolution to locate each other. You must manually create host records for the Hub Transport servers
in a forward lookup zone on the DNS server in the perimeter network. Additionally, you must create
host records for Edge Transport servers in a forward lookup zone on the internal DNS servers.
Avoid using single label domains. As discussed previously, this has long been a recommendation from
Microsoft, but with Exchange hybrid deployments, single label domain names are not supported.
Note In earlier Exchange Server versions, the Windows Internet Name Service (WINS) was
required in order to support multi-domain environments. This is no longer a requirement in
Exchange Server 2010.
Disjoint Namespace
In addition to ensuring the preceding steps have been performed, you must also consider the impact of a
disjoint DNS namespace on the Exchange organization. Typically, the primary DNS suffix of the computers
in an AD DS domain is the same as the DNS domain name. For example, in the domain Adatum.com,
computers will typically have a primary DNS suffix of Adatum.com. However, you may require the domain
name and the primary DNS suffix to be different from one another; this is called a disjointed namespace.
For instance, following a merger or acquisition, you may have a topology with a disjointed namespace.
In Exchange Server, there are two supported disjointed namespace scenarios:
The domain controller is disjointed. Computers that are members of this domain can be either
disjointed, or not disjointed. In this scenario, the primary DNS suffix of the domain controller is not
the same as the DNS domain name, but computers in the domainincluding Exchange servers and
Office Outlook client computerscan have a primary DNS suffix that either matches the primary DNS
suffix of the domain controller, or matches the DNS domain name.
A member computer in an AD DS domain is disjointed, even though the domain controller is not. In
this scenario, the primary DNS suffix of a computer on which Exchange Server 2010 is installed does
not match the DNS domain name; thus the member computer is disjointed. Member computers that
are running Office Outlook can have a primary DNS suffix that either matches the primary DNS suffix
of the disjointed Exchange server, or matches the DNS domain name.
Note To support either of these scenarios, you must modify the msDSAllowedDNSSuffixes AD DS attribute on the domain object container. You must add all of
the DNS suffixes to the attribute. In addition, to make sure that the DNS suffix search list
contains all DNS namespaces that are deployed within the organization, you must configure
the search list for each computer in the domain that is disjointed.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 2-35
The internal namespace supports internal name resolution, and resolution to and from the perimeter
network.
The external namespace is used by third parties on the Internet to locate your servers so that they
may route messages to your organization.
To enable Internet messaging functionality, you must make a number of configuration changes to your
external DNS zone. These changes include:
Adding appropriate MX and host (A or AAAA) resource records to your external DNS zone for your
SMTP hosts.
Adding a Sender Policy Framework (SPF) resource record in the external DNS zone that defines which
of your SMTP hosts is allowed to send email on behalf of your organization.
2-36
Designing Microsoft Exchange Server 2010 Integration with the Current Infrastructure
If you want to have a matching internal and external DNS namespace, that can pose certain problems;
however, split DNS can provide a solution to these problems. For example, in a non-split DNS
configuration for the domain Adatum.com, you might have a DNS zone that looks like the following
example:
Host
Record type
IP address
www
131.107.1.200
Relay
131.107.1.201
Webserver1
192.168.1.200
Exchange1
192.168.0.201
When a client computer on the Internet wants to access the SMTP relay using the published name of
relay.adatum.com, it queries the DNS server that returns the result 131.107.1.201. The client then
establishes a connection over SMTP to that IP address.
However, the client computers on the corporate intranet also use the published name of
relay.adatum.com. The DNS server returns the same resulta public IP address of 131.107.1.201. The
client now attempts to establish a connection to the returned IP address by using the external interface of
the publishing computer. Depending upon the client configuration, this may or may not be successful.
By configuring two zones for the same domain nameone on each of two DNS serversyou can avoid
this problem.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 2-37
The internal zone for adatum.com would now look like the following table:
Host
Record type
IP address
www
CNAME
Webserver1.adatum.com
Relay
CNAME
Exchange1.adatum.com
Webserver1
192.168.1.200
Exchange1
192.168.0.201
While the external zone for adatum.com would look like the following table:
Host
Record type
IP address
www
131.107.1.200
Relay
131.107.1.201
MX
Relay.adatum.com
Now client computers in the internal and external networks can resolve the name relay.adatum.com to
the appropriate internal or external IP address.
2-38
Designing Microsoft Exchange Server 2010 Integration with the Current Infrastructure
Your DNS infrastructure must be capable of meeting your Exchange Server organizations needs. These
needs include:
Server-to-server resolution. When any Exchange Server needs to communicate with any other
Exchange Server, they must be able to determine the appropriate IP address for a specific host name.
For example, if a Hub Transport server wishes to route mail to another Hub Transport server in
another site, it must first determine which computer is providing the Hub Transport server role in the
remote site. Then, it must resolve the returned name into the appropriate IP address.
Outbound delivery from the Hub Transport server to the Edge Transport server. To ensure proper
routing of messages from the internal network to the Edge Transport server in the perimeter network,
the Hub Transport servers must be able to resolve the FQDNs of the Edge Transport servers as
defined in the Edge Subscription, to the appropriate IP address in the perimeter network. You must
add these records to the internal DNS zone.
Outbound delivery from the Edge Transport Server to the Internet. To ensure delivery of email from
the Edge Transport Server to the Internet, you must configure name resolution on the Edge Transport
servers. Configure the use of either a public DNS server, or configure an internal DNS server with
appropriately configured forwarding.
Inbound delivery to the Edge Transport Server from the Internet. To ensure successful delivery of
email from the Internet to the Edge Transport servers, you must configure appropriate MX and host
(A or AAAA) resource records in a publicly accessible DNS server. This enables third-party
organizations to locate your Edge Transport servers.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 2-39
Inbound delivery from the Edge Transport Server to the Hub transport server. In order to ensure
successful delivery of email from the Edge Transport servers to the Hub Transport servers, you must
configure the Edge Transport servers internal NIC to use a DNS server on the perimeter network that
hosts a zone to which you have added the necessary Hub Transport server host records.
Note By default, in Exchange hybrid deployments, messages are routed to the onpremises Exchange servers and then, where necessary, routed onwards to the Exchange
Online environment for those users whose mailboxes are hosted online. However, if you
wish to have email routed primarily to the Exchange Online environment, perhaps to take
advantage of the message hygiene services provided by Forefront Online Protection for
Exchange (FOPE), you can configure this behavior in the Online Portal, or in your DNS MX
records, or within FOPE.
2-40
Designing Microsoft Exchange Server 2010 Integration with the Current Infrastructure
Lesson 4
To ensure that your Exchange organization functions optimally, you must secure the organization
properly. Part of the process of securing the Exchange organization involves planning and implementing
an appropriate administrative model. This enables you to determine which users can perform specific
administrative tasks.
After completing this lesson, you will be able to:
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 2-41
Exchange Server 2010 implements a permissions model known as Role Based Access Control (RBAC). The
RBAC permissions model defines which administrative tasks specific users can perform. With RBAC, you no
longer have to modify and manage access control lists (ACLs) on Exchange Server or AD DS objects. In
Exchange Server 2010, RBAC controls the administrative tasks that users can perform, and the extent to
which they can administer their own mailbox and distribution groups.
RBAC assigns permissions to users in two primary ways, depending on whether the user is an
administrator or end user:
Management role groups. RBAC uses management role groups to assign permissions to
administrators. These administrators may require permissions to manage the Exchange Server
organization or some part of it. Some administrators may require limited permissions to manage
specific Exchange Server features, such as compliance or specific recipients. To use management role
groups, add users to the appropriate built-in role group, or to a custom role group. RBAC assigns
each role group one or more management roles that define the precise permissions that RBAC grants
to the group. Management role groups use several underlying components to define how RBAC
assigns permissions:
Role holder. A role holder is a user that you can add to a role group. When a mailbox becomes a
role-group member, RBAC grants it all of the permissions that the management roles provide. To
add mailboxes to a role group, you can either add the user account to the group in AD DS, or use
the Add-RoleGroupMember cmdlet.
Management role group. The management role group is a universal security group that contains
mailboxes that are role group members. Management role groups are assigned to management
roles. The combination of all the roles assigned to a role group defines everything that users
added to that role group can manage in the Exchange Server organization.
2-42
Designing Microsoft Exchange Server 2010 Integration with the Current Infrastructure
Management role. A management role is a container for a group of management role entries.
These entries define the tasks that users can perform if RBAC assigns them the role using
management role assignments.
Management role scope. A management role scope is the scope of influence or impact that the
role holder has once RBAC assigns a management role. When assigning a management role, use
management scopes to target which objects that role controls. Scopes can include servers, OUs,
recipient objects, databases, and more.
Note Database scopes were introduced in Exchange Server 2010 SP1 enabling you to
target specific databases based on database lists or filterable database properties.
Management role assignment policies. Management role assignment policies are used to assign enduser management roles. Role assignment policies consist of roles that control what users can do with
their mailboxes or distribution groups. These roles do not allow management of features with which
users are not associated directly. When you create a role assignment policy, you define everything
users can do with their mailboxes. For example, a role assignment policy may allow users to set
display names, set up voice mail, and configure Inbox rules. Another role assignment policy might
allow users to change their company information, such as addresses or phone numbers, use text
messaging, and set up distribution groups. Every user with an Exchange Server 2010 mailbox
including administratorsreceives a role assignment policy by default.
Direct User Role Assignment. You also can use Direct User Role Assignment to assign permissions.
Direct User Role Assignment is an advanced method for assigning management roles directly to a
user or Universal Security Group, without the need to use a role group or role assignment policy.
Direct User Role Assignment is useful when you need to provide a granular set of permissions to a
specific user only. However, we recommend that you avoid using Direct User Role Assignment, as it is
significantly more complicated to configure and manage.
Question: What requirements does your organization have for assigning Exchange Server
permissions? Does your organization use a centralized or decentralized administration
model? What special permissions will you need to configure?
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 2-43
In small organizations, it is often the case that the same group of people is responsible for administering
AD DS and Exchange Server. In larger organizations, it is usual to separate the management of AD DS
from other applications, including Exchange Server.
To help address this need for administrative separation, Exchange Server 2010 introduced split
permissions, enabling a degree of separation for the administration of these two facets of your messaging
infrastructure.
Role Based Access Control (RBAC) split permissions. Permissions to create security principals in the
AD DS domain partition are controlled by RBAC. Only those administrators who are members of the
appropriate role groups can create security principals.
Active Directory split permissions. Permissions to create security principals in the AD DS domain
partition are completely removed from any Exchange Server user, service, or server. No option is
provided in RBAC to create security principals. Creation of security principals in AD DS must be
performed using AD DS management tools. You can choose to implement Active Directory split
permissions during Setup.
Note Active Directory split permissions was introduced in Exchange Server 2010 SP1. You
must run setup to enable Active Directory split permissions.
If your organization requires a split permissions model, use the RBAC split permissions model; this model
provides more flexibility while providing almost the same administrative separation as Active Directory
split permissions.
Note Exchange servers and services can create security principals in the RBAC split
permissions model; this is not true with Active Directory split permissions.
2-44
Designing Microsoft Exchange Server 2010 Integration with the Current Infrastructure
Active Directory split permissions are appropriate if the following are true:
Your organization requires that security principals, such as users and groups, be created using only
the AD DS management tools or only by users who are granted specific permissions in AD DS.
You want to completely separate the ability to create security principals from those who manage the
Exchange organization.
You want to perform all distribution group management, including creation of distribution groups
and adding and removing members of those groups, using AD DS management tools.
You don't want Exchange servers, or third-party programs that use Exchange on their behalf, to
create security principals.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 2-45
Exchange Server 2010 includes several built-in role groups that you can use to provide varying levels of
administrative permissions to user groups.
Description
Organization
Management
Role holders have access to the entire Exchange Server 2010 organization,
and can perform almost any task against any Exchange Server object.
View-Only Organization
Management
Role holders can view the properties of any object in the organization.
Recipient Management
UM Management
Role holders can manage the Unified Messaging features within the
organization, such as Unified Messaging server configuration, mailbox
properties, prompts, and auto-attendant configuration.
Discovery Management
Records Management
Server Management
Role holders have access to Exchange server configuration. They do not have
access to administer recipient configuration.
2-46
Designing Microsoft Exchange Server 2010 Integration with the Current Infrastructure
(continued)
Role group
Description
Help Desk
Public Folder
Management
Role holders can manage public folders and databases on Exchange servers.
Delegated Setup
Note All of these role groups are located in the Microsoft Exchange Security Groups OU in
AD DS. This OU contains several other universal security groups that grant permissions to
the Exchange Server computer accounts.
Mailbox. Mailboxes are assigned a single role assignment policy. When a mailbox is assigned a role
assignment policy, the policy is applied to the mailbox. This grants the mailbox all of the permissions
that the management roles provide.
Management role assignment policy. The management role assignment policy is an object in
Exchange Server 2010. Users are associated with a role assignment policy when you create their
mailboxes or change the role assignment policy on their mailboxes. The combination of all the roles
included in a role assignment policy defines everything that associated users can manage on their
mailboxes or distribution groups.
Management role assignment. Management role assignments link management roles and role
assignment policies. Assigning a management role to a role assignment policy grants users the ability
to use the cmdlets in the management role. When you create a role assignment, you cannot specify a
scope. The scope that the assignment applies is based on the management role, and is either Self or
MyGAL.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 2-47
Management role. A management role is a container for a group of management role entries. Roles
define the specific tasks that users can do with their mailboxes or distribution groups.
Management role entry. A management role entry is a cmdlet, script, or special permission that
enables users to perform a specific task. Each role entry consists of a single cmdlet, and the
parameters that the management role can access.
2-48
Designing Microsoft Exchange Server 2010 Integration with the Current Infrastructure
Exchange Server 2010 includes a Default Role Assignment Policy that provides end users with the most
commonly used permissions. For most organizations, you do not need to modify the configuration.
However, you can change the management role assignment policy if your organization has specific
requirements regarding how users can interact with their mailboxes or groups.
Change the default permissions on the Default Role Assignment Policy by adding or removing
management roles. For example, if you want to enable users to perform additional tasks on their
mailboxes, you can identify the management role that grants them the necessary permissions, and
add the role to the Default Role Assignment Policy.
Define a new role assignment, and then configure that role assignment to be the default for all
mailboxes. Use the Set-RoleAssignmentPolicy cmdlet to replace the built-in Default Role Assignment
Policy with your own. When you do this, RBAC assigns the role assignment policy that you specify to
new mailboxes, by default.
Note When you change the Default Role Assignment Policy, RBAC does not assign the
new Default Role Assignment Policy automatically. You will need to use the Set-Mailbox
cmdlet to update previously created mailboxes to the new Default Role Assignment Policy.
Configure additional role assignment policies, and assign the policies to a mailbox manually. Use the
RoleAssignmentPolicy parameter on the New-Mailbox, Set-Mailbox, or Enablemailbox cmdlets. When
you assign an explicit role assignment policy, the new policy takes effect immediately and replaces
the previously assigned explicit role assignment policy. If you have many different user groups with
special needs, you can create role assignment policies for each group.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 2-49
Create a new role group, and then add the branch office administrators to the role group. You can
use the New-RoleGroup cmdlet to create the group. When you create the group, you must specify
the management roles. Additionally, you also can specify the management scope for the role.
2.
Assign management roles to the branch office administrators. To delegate permissions to a custom
role group, you can use one or more of the default built-in management roles, or you can create a
custom management role that is based on one of the built-in management roles. Exchange Server
2010 includes approximately 70 built-in management roles that provide granular levels of
permissions. To view a complete list of all the management roles, use the get-managementrole
cmdlet. To view detailed information about a management role, type get-managementrole rolename
| FL, and then press Enter.
Note You also can configure a new management role rather than use one of the existing
management roles. To do this, use the New-ManagementRole cmdlet to create a custom
management role based on one of the existing management roles. You can then add and
remove management role entries as needed. By default, the new management role inherits
all of the permissions assigned to the parent role. You can remove permissions from the role
as necessary, by using the Remove-managementroleentry cmdlet. However, it can be
complicated to create a new management role or remove unnecessary management role
entries, so we recommend that you use one of the existing roles whenever possible.
3.
Identify the management scope for the management role. For example, in the branch office scenario,
you could create a role assignment with an OU scope that is specific to the branch office OU.
4.
Create the management role group using the information that you collect. Use the New-RoleGroup
cmdlet to create the link between the role group, the management roles, and the management
scope. For example, consider the following cmdlet:
Assigns the Mail Recipients, Distribution Groups, Move Mailboxes, Reset Password, and Mail
Recipient Creation management roles to the BranchOfficeAdmins role group.
2-50
Designing Microsoft Exchange Server 2010 Integration with the Current Infrastructure
All Exchange Server administration tools, including Exchange Management Console, Exchange
Management Shell, and Exchange Control Panel, use RBAC to determine user permissions. Therefore,
permissions are consistent regardless of which tool you use; this is because when you define RBAC
permissions, you can define precisely which Exchange Management Shell cmdlets a user can run, and
which objects the user can modify.
The Organization Configuration node contains all configuration options for each Exchange Server role
that affects the messaging systems functionality. This node allows you to configure database
management, ActiveSync policies, journal and transport rules, message-formatting options, and email
domain management.
The Server Configuration node contains the configuration options for each Exchange Server in the
organization. Settings that you can manipulate include: server diagnostic-logging settings, productkey management, and per-server Outlook Web App configuration.
The Recipient Configuration node contains the configuration and creation tasks for mailboxes,
distribution groups, and contacts. You also can use it to move or reconnect mailboxes.
The Toolbox node contains 12 utilities and tools that you can use to monitor, troubleshoot, and
manage Exchange Server. These tools include Exchange Best Practices Analyzer, Public Folder
Management Console, Messaging Tracking, and Database Recovery Management.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 2-51
You also can use the Exchange Management Console to manage both onsite and hosted Exchange Online
environments.
Note The root node of the console tree now also includes two tabs in the Content pane.
The Organizational Health tab displays a report on the overall status of the Exchange
organization with information on the number of databases, servers and Client Access
Licenses that have been deployed. The Customer Feedback tab is where both the Customer
Experience Improvement Program can be enabled, and links to Exchange documentation
can be found.
End users
Email subscriptions
Group management
2-52
Designing Microsoft Exchange Server 2010 Integration with the Current Infrastructure
Legal discovery
Message tracking
Note Exchange Server 2010 SP1 provides ECP improvements that enable you to create
and manage management role groups and management role assignment policies in the
ECP, including the ability to: add and remove management roles to role groups and role
assignment policies; add and remove members to and from role groups; and assign users to
role assignment policies.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 2-53
In this demonstration, you will review how to navigate the Exchange Management Console, and use it to
manage Exchange Server. You will also review how to create a mailbox, and how to use Windows
PowerShell command-line interface scripting and pipelining to change the address on multiple mailboxes.
The instructor also will describe basic cmdlet aliases. Finally, your instructor will demonstrate the Exchange
Control Panel.
2.
Note the consoles layout: console tree on the left, content pane in the middle, and actions pane on
the right.
3.
Notice that the console tree has four nodes: Organization Configuration, Server Configuration,
Recipient Configuration, and Toolbox.
4.
5.
In the console tree, expand Organization Configuration, click Mailbox, and then view the
information available in the Content pane.
6.
In the console tree, expand Server Configuration, click Mailbox, and then view the information in
the Content pane.
7.
In the console tree, expand Recipient Configuration, click Mailbox, and then view the information
in the Content pane.
2-54
Designing Microsoft Exchange Server 2010 Integration with the Current Infrastructure
Get-Mailbox
Get-Mailbox | Format-List
Get-Mailbox | fl
Get-Mailbox | Format-Table
Get-Help New-Mailbox
$Temp = "Text"
$Temp
2.
Open Exchange Control Panel as an administrator, and review and compare the settings.
Question: Does the Exchange Management Console organization seem logical to you? Why
or why not?
Question: Does the Exchange Management Console have the same functionality as it did in
previous Exchange Server versions? What is different about this version?
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 2-55
Lab Setup
For this lab, you will use the available virtual machine environment. Before beginning the lab, you must
complete the following steps:
1.
On the host computer, click Start, point to Administrative Tools, and then click Hyper-V Manager.
2.
Ensure that the 10233B-NYC-DC1 and 10233B-NYC-SVR1 virtual machines are running.
3.
Lab Scenario
Contoso, Ltd is planning to deploy Exchange Server 2010. You are a messaging consultant from A. Datum
Corporation, and have been tasked with verifying that the existing network infrastructure is suitable to
support Exchange Server 2010.
Once you have determined that the prerequisites are met, you will prepare the AD DS forest so that the
server deployment team can begin the Exchange Server 2010 deployment.
Note Your instructor may choose to perform this lab as a group discussion rather than an
individual activity.
2-56
Designing Microsoft Exchange Server 2010 Integration with the Current Infrastructure
2.
3.
Complete a report that provides information about necessary changes required to the network and
AD DS infrastructure, to enable support for Exchange Server 2010.
Sites
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 2-57
Supporting Documentation
Email thread of correspondence with Ed Meadows:
Ed Meadows
From:
Jason Carlson [[email protected]]
Sent:
1 February 2010 14:00
To:
[email protected]
Subject: Re: Contoso Exchange Server 2010 project
Thanks; thats really helpful.
Yes, we can delegate tasks to specified individuals. Well discuss what you need when I get there. See you
next week.
Jason.
----- Original Message ----From:
Ed Meadows [[email protected]]
Sent:
31 January 2010 13:30
To:
[email protected]
Subject: Contoso Exchange Server 2010 project
Attachments:
Contoso.vsd
Jason,
Please find attached the Visio diagram of our three AD DS sites. All three sites are connected, logically,
with the DefaultIPSiteLink site link, and with default values.
The New York City office is our head office, and supports around 500 users. Branch Office 1 has 100 users,
while the other branch has only 30 users hence the RODC. Our only Internet connection is from the NYC
offices. We have a couple of DCs there.
Our namespace is pretty straightforward; Contoso.com is the only domain.
Wed like to be able to delegate administration of specified Exchange administration tasks to couple of
individuals out at Branch Office 1. Is that easy to do? I hope all this helps, and see you here in New York
next week.
Ed
2-58
Designing Microsoft Exchange Server 2010 Integration with the Current Infrastructure
Question: What else do you need to know before you can begin deploying Exchange Server
2010?
Task 3: Complete a report that provides information about necessary changes required
to the network and AD DS infrastructure to enable support for Exchange Server 2010
Jason Carlson
11th February 2010
Requirement Overview
To determine what changes, if any, are required to the existing network and AD DS infrastructure to
support Exchange Server 2010.
Proposals
Question: The internal and external DNS zone names are the same for Contosoi.e. Contoso.com.
What issue does this raise for clients connecting to their mailboxes using Outlook Web App from
their home computers?
Question: What DNS records must you configure in the external Contoso.com DNS zone?
Question: How do you propose to support the messaging needs of users in Branch Office 2?
Question: What messaging client will you deploy to Branch Office 2?
Question: What server role must you consider deploying in the head office to facilitate inbound
and outbound messaging to and from the Internet?
Question: How many Client Access servers do you envisage needing?
Question: How many Hub Transport servers are required?
Question: Ed Meadows has explained that the administrators at the Branch Office 1 site needs to
be able to perform limited recipient management tasks. To which built-in role group should you
assign these branch administrators?
Note
Results: After this exercise, you should have completed the Contoso Exchange Server network
infrastructure report.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 2-59
Achieved?
Yes or No
Yes or No
DNS requirements
Yes or No
Yes or No
AD DS management tools
Yes or No
Yes or No
Yes or No
Yes or No
Yes or No
Yes or No
Yes or No
2.
3.
2.
Evaluate whether the domain and forest functional level requirements are met.
3.
Use Adsiedit.msc to evaluate whether the Exchange schema changes are applied.
2-60
Designing Microsoft Exchange Server 2010 Integration with the Current Infrastructure
On NYC-SVR1, use Ipconfig, Ping, and NSLookup to evaluate DNS name resolution functionality.
On NYC-SVR1, evaluate whether the required Windows Server 2008 featuresincluding the required
AD DS administration toolsare installed.
2.
3.
Results: After this exercise, you should have evaluated whether your organization meets the AD DS, DNS,
and server requirements for installing Exchange Server 2010. You should have identified the additional
components that need to be installed or configured to meet the requirements.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 2-61
2.
Task 1: Install the Windows Server 2008 server roles and features
1.
2.
On NYC-SVR1, in Server Manager, install the prerequisite server roles and features for Exchange
Server 2010:
For IIS:
Digest Authentication
In the 10233B-NYC-SVR1 on localhost Virtual Machine Connection window, on the File menu,
click Settings.
2.
3.
4.
5.
On NYC-SVR1, from a command prompt, run the Exchange Server setup program with the
setup /PrepareAD parameter. Configure an Exchange organization name of Contoso.
Results: After this exercise, you should have prepared the AD DS and server configuration for the
Exchange Server 2010 installation.
2-62
Designing Microsoft Exchange Server 2010 Integration with the Current Infrastructure
2.
Create a new user in the Users folder in Active Directory Users and Computers:
Password: Pa$$w0rd
On NYC-SVR1, in AD DS Users and Computers, add Adam Carter to the Help Desk group.
2.
Right-click 10233B-NYC-DC1 in the Virtual Machines list, and then click Revert.
3.
4.
5.
In the Virtual Machines pane, click 10233B-VAN-DC1, and then in the Actions pane, click Start.
Note Start the 10233B-VAN-DC1 virtual machine first, and ensure that it is fully started
before starting the other virtual machines.
6.
Wait for 10233B-VAN-DC1 to start, and then start 10233B-VAN-EX1. Connect to the virtual machine.
7.
Wait for 10233B-VAN-EX1 to start, and then start 10233B-VAN-EX2. Connect to the virtual machine.
8.
Wait for 10233B-VAN-EX2 to start, and then start 10233B-VAN-CL1. Connect to the virtual machine.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 2-63
Review Questions
1.
If you determine that your current site configuration does not support your Exchange Server routing
requirements, what options do you have?
2.
3.
What is the main reason for deploying Exchange Server in a multi-tree forest?
4.
Best Practices
Supplement or modify the following best practices for your own work situations:
Avoid using IP addresses to define servers on clients. If the server providing an email client service
changes, you must update the configuration of all affected client computers to match the new IP
address. Additionally, digital certificates that are provided to enable authentication and encryption
between clients and servers are configured with a subject name that matches the designated servers
published FQDN. If an IP address is used, this will at best raise an error on the client, and at worst,
prevent email retrieval.
Only open required ports on your firewalls. Aim to minimize the open ports by being selective about
what client types you will support.
2-64
Designing Microsoft Exchange Server 2010 Integration with the Current Infrastructure
Use a self-signed certificate only for small deployments, or for testing purposes. Replace the selfsigned certificate as soon as possible after deployment.
A single forest means that the Exchange Server 2010 design and deployment is significantly simpler
than any other option. Therefore, you should always use a single forest unless there are highly
compelling reasons to use multiple forests.
3-1
Module 3
Planning and Deploying Mailbox Services
Contents:
Lesson 1: Overview of Mailbox Services in Exchange Server 2010
3-3
3-8
3-21
3-37
3-51
Module Overview
Microsoft Exchange Server 2010 includes some major improvements to mailbox services when
compared to previous versions of Exchange Server. For example, the disk input/output (I/O) requirement
for Exchange Server 2010 is approximately 70 percent less than what is required for Exchange Server 2007.
To optimize your mailbox services performance in Exchange Server 2010, you must consider these
improvements when designing your mailbox services.
The mailbox services design includes the physical design of the Mailbox servers, including the storage
system. It also includes the design of recipient management and public folder architecture.
After completing this module, you will be able to:
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
3-3
Lesson 1
The improvements in mailbox services in Exchange Server 2010 include improved resource scheduling,
user-managed distribution groups, and the ability to move mailboxes between databases while users are
logged on. One particularly important area of improvement is disk performance, which is enabled by
changes in the database structure.
After completing this lesson, you will be able to:
Identify considerations for designing Exchange Server 2010 storage for large mailboxes.
Key Points
Exchange Server 2010 includes many new features for mailbox services. You need to be aware of these
features when designing the implementation of mailbox services, because they may have special
requirements that increase the resource load on Mailbox servers.
Some new mailbox services features in Exchange Server 2010 are:
Personal archives. You can enable personal archives for each user with a mailbox on an Exchange
Server 2010 Mailbox server. The personal archives are an alternative to personal folders (PST) files,
which are stored locally.
Calendar repair. Each Exchange Server 2010 Mailbox server runs the Calendar Repair Assistant on a
configurable schedule. The Calendar Repair Assistant corrects calendar inconsistencies.
Resource configuration in the Exchange Management Console. Resource mailboxes were introduced
in Exchange Server 2007, but you could manage them only in the Exchange Management Shell. In
Exchange Server 2010, you can use the Exchange Management Console to manage the most
common settings for resource mailboxes.
Live mailbox moves. In Exchange Server 2010, you can move mailboxes from one database to another
while users are logged on and using their mailbox. Previous versions of Exchange Server required
users to be logged out of their mailboxes during a move.
User-managed distribution groups. It is now possible for users to create their own distribution groups
by using Microsoft Office Outlook 2010 or Outlook Web App. This decreases the workload of
Exchange administrators.
Bulk management. You can perform more bulk management tasks from within the Exchange
Management Console than in previous versions of Exchange Server. Now, you can edit recipient
properties and send email to recipients.
Question: Do you expect that these new features will have an impact on your organization?
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
3-5
Key Points
Exchange Server 2010 includes many changes to the way storage is used. The improvements in storage
utilization in Exchange Server 2010 allow you to take advantage of new trends in storage, such as large
slower and inexpensive disks instead of small fast expensive disks..Some of the changes to storage include:
Removal of storage groups. Previous versions of Exchange Server allowed you to place multiple
databases that shared a single set of transaction logs, into a storage group. In Exchange Server 2010,
each database exists independently, and has its own set of transaction logs.
Removal of single instance storage. Previous versions of Exchange Server stored a message only once
in the database, if the message was addressed to multiple recipients in the same mailbox database.
Exchange Server 2010 stores a message copy in each users mailbox when the message is addressed
to multiple recipients in the same mailbox database. This makes disk access more sequential, and
improves read performance. The addition of database compression prevents the mailbox database
from increasing in size when compared to previous versions of Exchange Server.
Database is a peer to the server. Previous versions of Exchange Server managed a database as a
subcomponent of a server. In Exchange Server 2010, databases are managed at the organization level.
A database is linked to a server, but is not a subset of a server. This is an important concept for
Database Availability Groups (DAGs), where multiple copies of a database can exist on multiple
servers.
Disk I/O is optimized for commodity storage. Exchange Server 2010 reduces disk Input/Output
Operations Per Second (IOPS) by up to 70% over Exchange Server 2007. This is done primarily by
making as many disk operations as possible sequential rather than random. Mailbox databases have
been restructured in Exchange Server 2010 to support this. As a consequence, you can consider using
cheaper and larger disks for data storage, such as SATA disks. You can also consider using just a
bunch of disks (JBOD) rather than Redundant Array of Independents Disks (RAID).
Question: How will changes to storage in Exchange Server 2010 affect your organization?
For many users, access to email is critical for them to perform their jobs. Email is used for communication
internally with colleagues and externally with partners and customers. The amount of data kept in
mailboxes continues to grow, and all of this data must be searchable.
New generations of hard disks are getting larger, but spin rates and seek times are not improving.
Sequential read rates are increasing as a result of greater data density, but random access read rates are
the same. Exchange Server 2010 takes advantage of the increasing disk size, so that you can offer larger
mailboxes to users without increasing cost or decreasing performance. With the I/O improvements in
Exchange Server 2010, you can use larger and less expensive disks in many scenarios. Disk I/O relates to
the number of mailboxes stored on a disk rather than the volume of mailbox data stored on the disk.
Large mailboxes reduce the disk I/O requirements for a Mailbox server because they reduce the number
of mailboxes that are stored on a disk. Fewer mailboxes on a disk results in lower disk I/O.
As a result of lower disk I/O, you can consider using large 7200 RPM disks rather than smaller, faster
15000 RPM disks. A typical 7200 RPM disk stores between 1 and 3 terabytes. A typical 15000 RPM disk
stores less than 1 terabyte. The 7200 RPM disks are significantly less expensive per gigabyte (GB).
Many Exchange administrators initially assume that mailboxes should be kept on one set of fast disks and
personal archives should be kept on another set of slower disks. However, if personal archives are kept on
the same set of disks as the mailboxes, then fewer mailboxes and archives are kept on the same set of
disks. Reducing the number of active mailboxes on the disk behaves similarly to having large mailboxes
on the disk. Overall disk I/O is reduced for the disk, and slower disks can be used for all data.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
3-7
Key Points
To design mailbox services, you must identify the information required for both mailboxes and public
folders. Typically, the information you gather helps you to determine the size of databases that need to be
accommodated, and the processing load that those databases will place on the mailbox servers.
To design mailbox databases, you must consider the following factors related to mailboxes:
Size of mailboxes. Larger mailboxes combined with a higher number of users increases overall
database size.
Service level agreements (SLAs). To meet the recovery requirements, you may need to keep databases
small so that restore times are reduced.
To design public folder databases, you must consider the following factors:
Size of public folders. Larger public folders combined with a greater number of public folders
increases overall database size.
Replication requirements. If you need to replicate public folders, at least two public folder databases
are required.
Type of client. Office Outlook 2003 requires public folders for performing free/busy searches, and
downloading offline address books.
Question: What other information would you want to gather before designing mailbox
servers?
Lesson 2
In Exchange Server 2010, a Mailbox server manages and maintains mailbox databases and public folder
databases. When you design a Mailbox server, a primary consideration is storage configuration. However,
you also need to consider processor and memory requirements. And you need to consider high
availability as an option for mailbox databases through the use of DAGs.
After completing this lesson, you will be able to:
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
3-9
Key Points
To design mailbox size, you must first understand the business needs that drive mailbox size. The business
needs for mailbox storage vary depending on the type of users. For example, a sales person who is forced
to delete older messages may lose valuable information, which results in lost sales, while general office
staff may have no need to keep a larger volume of mail for a longer term.
To select an appropriate mailbox size, you should consider:
What types of messages do users need to keep for an extended period of time?
What is the cost of increasing storage size versus the cost of not having content easily available?
3-10
Personal Archives
Personal archives are a new feature in Exchange Server 2010. Personal archives address problems that you
might encounter if you archive data to PST files. PST files are problematic because they are difficult to
manage and because they might be stored in a location that is not backed up. This increases the risk of
losing messages.
The intent behind personal archives is to replace PST files. Messages are archived to the personal archive
rather than to a PST file. The personal archive can be located either in the same mailbox database as the
associated mailbox or in a different mailbox database. Therefore, a personal archive decreases the size of a
user mailbox, but not the size of Exchange data. In fact, if PST files are imported, the overall size of
Exchange data might increase.
When you use Cached Exchange Mode and personal archives simultaneously, you reduce the amount of
data that is cached on the client. Only the content in the user mailbox is cached locally on the client, and
the content in the personal archive is not cached. This can improve overall client performance, while still
providing access to archived data as needed.
Additional Considerations
Some additional considerations are:
Do not assume that the mailbox quota size is the amount of disk space that is used for each mailbox.
Many mailboxes might not be filled to capacity. Find out what the actual usage is for mailboxes, and
then be prepared for the possibility that mailboxes will grow to the maximum size of the quota.
Databases never shrink automatically. If you have a large mailbox database that you remove users
from, the mailbox database does not shrink automatically. Instead, empty white space remains inside
the database file. To physically shrink the database on the disk, you must perform an offline
defragmentation. Alternatively, you can create a new mailbox database, move mailboxes into the new
mailbox database, and the delete the old mailbox database.
Deleted item retention affects mailbox database size. If you increase the deleted item retention limit
from the default value of 14 days, you need to plan for larger mailbox databases. The affect of
deleted item retention on mailbox size varies depending on the volume and size of messages
received by your users. Deleted items in the dumpster are not included when quotas are calculated
for a users mailbox. The deleted items in the dumpster are also not included when viewing the size of
the mailbox in the Exchange Management Console.
A litigation hold increases mailbox size. When a litigation hold is enabled for a mailbox, no messages
are ever purged from the mailbox. In addition, all changes to mailbox items are tracked. If a litigation
hold is left on for an extended period of time, the mailbox increases in size significantly.
Deleted mailbox retention affects mailbox database size. If you increase the deleted mailbox retention
limit from the default of 30 days, the size of the mailbox database increases.
Clients running the Post Office Protocol (POP3) may remove messages immediately. Unlike clients
running Messaging Application Programming Interface (MAPI) and Outlook Web App, clients running
POP3 are sometimes configured to delete messages from the mailbox after the messages are
downloaded to the client. If you configure the POP3 clients in this way, mailboxes are much smaller
than those that the MAPI and Outlook Web App clients use.
Question: How many clients in your organization use Cached Exchange Mode?
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
3-11
Key Points
In previous versions of Exchange Server, it is recommended that you keep the log files and database on
separate disks. That way, if the disk fails and the database is lost, you still have the log files available after
a restore and you can replay them to recover messages received since the last backup. In Exchange
Server 2010, the same recommendation still applies in small environments that do not use DAGs.
However, if there are multiple replicated copies of a database, you do not need to keep the transaction
logs and database separate, because a different replica is used for recovery instead of recovering from a
backup.
In Exchange Server 2010, it is a best practice to locate multiple databases on a single logical unit number
(LUN), because the disk I/O is random. You can separate transaction logs onto different physical disks to
increase performance, but this is not typically necessary. In most cases, because Exchange Server 2010 has
lower I/O requirements, you can keep transaction log files and database files on the same volume without
impacting performance.
You can separate log files from database file for recoverability when using backups. By storing database
files on log files on separate volumes or disks, you can replay transaction logs after a database restore
when the database was lost due to a failed volume or disk.
3-12
Previous versions of Exchange Server do not include personal archives. A personal archive is typically used
for longer term retention of mailbox content. If you enable personal archives, the database size may
increase.
You can use a recovery database in a variety of recovery scenarios to extract mailbox data. To use a
recovery database, you must have sufficient disk space available to restore the database and transaction
logs.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
3-13
Key Points
Because of the storage improvements in Exchange Serve 2010, you can consider using less expensive and
slower types of disk storage, which you might not have been able to consider for previous versions of
Exchange Server. However, ultimately you need to test the storage configuration that you select to ensure
it meets your needs.
Consider the following:
Replicated database copies increase the amount of storage space required. If your organization uses
DAGs to replicate mailbox databases for high availability, consider the number of database copies
when you calculate how much disk space you need and what it costs.
Slower disks have a significantly lower cost per GB than faster disks. The reduced disk I/O
requirements of Exchange Server 2010 mean that large capacity 7200 RPM disks are suitable for many
organizations. You can obtain 7200 RPM disks of equal size with the SATA or SAS interface. SAS disks
cost slightly more than SATA disks, but, in testing at Microsoft, SAS disks had a 50 percent lower
failure rate than SATA disks.
Direct attached storage (DAS) is significantly cheaper than a storage area network (SAN). As a result,
DAS is preferable if you use DAGs to create multiple replicated copies of data. You can purchase
external drive arrays and use them to connect a large number of disks to a single server. The lower
reliability of DAS is mitigated by the multiple database copies in the DAG. If you have a SAN with
available space then you might prefer to use the SAN for the higher reliability it provides.
You can consider JBOD if you have three or more replicas of a database in a DAG. JBOD provides no
redundancy, but this is acceptable because the DAG has multiple database copies. JBOD is used with
DAS.
3-14
Some organizations have a significant investment in SANs for all server storage. If you use a SAN, the
increased reliability may mean that you choose to implement fewer database copies in a DAG. You
can also keep some database copies on a SAN and others on DAS. Even when a SAN is used, having
two database copies is recommended.
An Internet small computer system interface (iSCSI) SAN typically has lower performance than a Fibre
Channel SAN, but it is also significantly less expensive. If you use a SAN, the lower I/O requirements in
Exchange Server 2010 make iSCSI an option over Fibre Channel in a wide range of scenarios.
Use RAID to increase the redundancy of the disk system if there are less than three database copies in
a DAG. A variety of RAID types are available to increase the performance and redundancy of the disk
system. RAID 10 is the best-performing RAID option, because it has the speed of a striped set and the
redundancy of mirroring. However, it is fairly expensive, because 50 percent of the disk space is used
for redundant data. You can use the Exchange 2010 Mailbox Server Role Requirements Calculator to
help you plan the storage configuration of Mailbox servers. This spreadsheet contains many
calculations to help you accurately estimate the hardware requirements to support a specific number
of users with a specific storage configuration. You can download this tool from the Microsoft website,
and it is updated regularly.
Question: Which disk configuration do you use in most of your servers?
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
3-15
Key Points
Exchange Server 2010 requires a 64-bit processor and operating system. Exchange Server 2010 supports
two specific processor architectures: AMD64 and Intel Extended Memory 64 Technology. It does not
support Itanium processors.
Exchange Server 2010 can take advantage of multicore processors. A multicore processor can process
multiple tasks at the same time. A typical server processor has four or more cores. If the processor
supports hyper-threading, Microsoft recommends that you disable hyper-threading. Hyper-threading
causes problems in capacity planning and offers little performance improvement.
The number of processor cores required for a Mailbox server varies, depending on the number of
mailboxes and how intensely they are used. For average usage, a single processor core can support
approximately 1,000 active mailboxes. Average usage is defined as a user who sends 10 messages a day
and receives 40 messages a day.
If the Mailbox server role is combined with other server roles, you must account for the processor
requirements of those other server roles. For average usage, a single server with the Mailbox, Client
Access, and Hub Transport server roles installed can support approximately 500 mailboxes.
Note The maximum recommended number of processor sockets is two per Mailbox
server. Up to four processor sockets are recommended for multi-role servers.
Memory Requirements
The memory requirements for Exchange Server 2010 vary depending on the number of mailboxes and
how intensely they are used. The minimum recommended RAM for a Mailbox server is 4 GB. A server that
combines multiple roles should have a minimum of 8 GB of RAM.
3-16
When calculating the memory required for your Mailbox server, take the minimum require and add
additional memory for each user based on their messaging volume. For each 50 messages per day sent or
received, you should allocate 3 megabytes (MB) per user. For example, if the average user in your
organization sends and receives 100 messages per day then you should allocate 6 MB per user in addition
to the minimum RAM for your Mailbox server configuration.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
3-17
Key Points
To implement high availability of mailbox databases, you use a DAG. A DAG allows you to replicate
mailbox databases to multiple servers. If the server that is servicing clients fails, a replica on another server
in the DAG begins to service client requests.
Note The high availability methods available in previous versions of Exchange Server are
not available in Exchange Server 2010.
Some considerations for implementing DAGs are:
Mailbox database names must be unique in the Exchange Server organization. This may require you
to develop a naming convention. This naming convention should not include the server name,
because the database can move between DAG members.
The storage path must be identical for all copies of a database. This means that all members of a DAG
should have the same disk configuration with the same drive letters. For increased flexibility, you can
use mount points instead of various drive letters, but this is not required.
DAG implementation uses the Windows Server 2008 operating system failover clustering feature.
This is only available in the Windows Server 2008 Enterprise and Datacenter operating system
editions. However, DAGs are supported for both the Exchange Server 2010 Standard and Enterprise
editions.
DAGs can be managed completely from within Exchange Server 2010 management tools. This
simplifies the process of DAG configuration, and masks the complexity of failover clustering from
administrators.
3-18
A DAG cannot make public folder databases highly available. Public folders should use public folder
replication for high availability. However, public folder databases can exist on a server that is a
member of a DAG. Public folder replication can be used to make a public folder highly available.
A server that is a member of a DAG can have additional server roles installed. For example, a server
that is a member of a DAG can have the Client Access and Hub Transport server roles installed.
Question: Will you consider implementing a DAG for your organization?
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
3-19
All Exchange Server 2010 server roles can be virtualized. A virtualized implementation of Exchange
Server 2010 is supported when running on the Microsoft Hyper-V technology or on any other
hypervisor that is validated in the Windows Server Virtualization Validation Program.
Some considerations for hardware requirements are:
In general, when Exchange Server 2010 is running in a virtual machine, it has the same hardware
performance requirements as when it is not virtualized. The requirements for memory and processing
power are the same. For example, if your planning indicates that a server running Exchange
Server 2010 requires 16 GB of memory, a virtualized version of that server also requires 16 GB of
memory.
Memory should not be oversubscribed. Exchange Server 2010 uses caching in memory to improve
performance. If memory is oversubscribed, Exchange Server 2010 does not have full control over
memory allocation in the virtual machine, which can reduce performance.
Do not allocate virtual processors to virtual machines at a ratio higher than two virtual processors per
processor core. For example, if the physical host has two processors with six cores each, you should
not allocate more than 24 virtual processors.
Dynamically expanding virtual disks are not supported. This is because of performance concerns as
the disks expand.
Differencing or delta mechanisms such as snapshots are not supported. This is because the snapshot
mechanisms are not application-aware and, as a consequence, recovery to the snapshot is
unpredictable.
Test virtual disk performance to be sure that it meets your needs. Virtual disk performance is typically
slightly lower than physical disk performance.
3-20
Pass-through storage and iSCSI storage are both supported. However, iSCSI storage has reduced
performance if the network stack of the virtualization environment does not support jumbo frames.
Jumbo frames are supporting in Hyper-V on Windows Server 2008 R2, but they must be enabled in
the parent partition and the virtual machine.
You can use the virtual machine high availability that is provided by your virtualization environment with
Exchange Server 2010. This is supported even for servers that are part of a DAG. Some considerations for
virtual machine high availability are:
The virtual machines must not save and then restore state when moved. All migration between hosts
must be an online migration, such as Hyper-V Live Migration, or else the virtual machines can be shut
down and restarted.
If a virtual machine or host fails, the virtual machine must be restarted on an alternate host with a full
boot process.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
3-21
Key Points
To design a test plan for Mailbox server performance, you need to accurately understand how the server
will be used. This includes factors such as the number of mailboxes, the number of messages users will
send, and the type of clients that will be accessing mailboxes. If you do not accurately understand the
load that will be placed on the server, it is impossible to ensure that server performance will meet your
needs.
When you create your test environment, you should ensure that it replicates the conditions in your
production environment as closely as possible. This means that you should be using identical hardware,
software, and drivers on the test system and production system.
To test server performance, it is impossible to completely replicate the users in a production environment.
However, Microsoft provides two tools that you can use to generate simulated loads on the server:
Exchange Load Generator (Loadgen). You can use this tool to create a simulated load of MAPI,
Outlook Web App, the Microsoft Exchange ActiveSync technology, Internet Message Access
Protocol (IMAP), POP3, and Simple Mail Transfer Protocol (SMTP) clients on Exchange servers. You
can configure this tool based on the usage data you have gathered to determine whether the
performance is acceptable.
Jetstress. You can use this tool to verify disk performance by simulating the Exchange Server database
and the log file loads that a specific number of users produce. It is also capable of simulating the load
generated by database replication in a DAG.
Note In many cases, you can use virtualization to test the functionality of proposed
configurations, including Exchange Server 2010. However, virtualization is not appropriate
for testing server performance unless the production Exchange server is also virtualized.
Question: Do you test server performance before implementation?
3-22
Lesson 3
In many ways, recipients are the focus of Exchange Server management, because they are the system
users. Exchange Server 2010 provides some new opportunities to improve recipient management over
previous versions of Exchange Server, such as more fine-grained control over recipient management for
administrators, and delegation of distribution group management. Other aspects of recipient
management include address lists, email address policies, system messages, resource mailboxes, and
mailbox moves.
After completing this lesson, you will be able to:
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
3-23
Key Points
Exchange Server 2010 provides a much greater level of flexibility in defining management permissions for
all aspects of Exchange Server 2010, including the management of recipients. By default, a number of
management role groups are created, which allow you to delegate management of specific tasks. For
example, the Recipient Management role group allows you to delegate recipient management tasks.
However, this management role group provides the ability to manage recipients for the entire
organization.
You can perform more customized delegation of management permissions by using management roles
and scopes. A management role defines the management tasks that can be performed, and the scope
defines the objects that the management role can be applied to. The scope can be defined based on
filters that use almost any recipient property or organizational unit (OU).
To delegate recipient management, you must:
1.
2.
Management Tools
When you design recipient management processes, you need to consider which management tool is the
most appropriate for different management users.
The Exchange Management Console is best suited for general management tasks, because it provides
a graphical interface that is easy to use. However some less commonly used optionssuch as creating
a recovery databaseare not available.
The Exchange Management Shell provides access to all management options. The scripting
capabilities make it well-suited for performing repetitive tasks. The Exchange Management Console
also has the ability to pipe output from one cmdlet as input to another cmdlet, which enables it to
support bulk operations such a creating many new user accounts simultaneously.
3-24
The Exchange Control Panel provides access to a limited set of recipient management tasks. It is wellsuited for users who only need to perform those limited tasks. Because it is a web-based
administrative tool, users do not need to install an administrative application on a client computer.
Therefore, you can use this tool for performing remote administration. Tasks performed in the
Exchange Control Panel include multi-mailbox search, some recipient management tasks,
configuration of role-based access control (RBAC), and mobile device management.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
3-25
Key Points
Address lists are lists of recipients based on a Lightweight Directory Access Protocol (LDAP) query. The
purpose of an address list is to make it easier for users to select a recipient for a message or a meeting
request. Several address lists are created by default in Exchange Server 2010.
The default address lists are:
Global Address List (GAL). This list contains all recipients in the Exchange Server organization.
All Users. This list contains mailbox users, mail-enabled users, room mailboxes, and equipment
mailboxes.
All Contacts. This list contains all mail-enabled contacts, but it does not contain mail-enabled users.
In larger organizations, the default address lists may not entirely meet the needs of the organization. You
might want to create additional address lists that are specific to workgroups or regions. Creating
additional lists can make it easier to find appropriate recipients by providing smaller lists to look through.
You also can include the smaller lists in offline address books.
The default address lists are all automatically updated when new recipients are created. If you create
customized address lists, those address lists may not be automatically updated depending on the criteria
used to define them. Use the Update-AddressList cmdlet to force an address list to update when
required. Consider running a script as a scheduled task to automatically update customized address lists at
least once a day.
3-26
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
3-27
Many organizations need only a single set of address lists, which all users share. However, if an
organization needs multiple GALs or different address lists for different groups of users, ABPs simplify the
management of those address lists. Individual mailboxes are associated with an ABP and receive the lists
specified in the ABP. ABPs are introduced in SP2 for Exchange Server 2010.
Each ABP contains:
A GAL
A room list
When you create the address lists for ABPs, consider which attributes should be used to identify the
address list and the GAL members. You should consider using custom attributes for this purpose, because
they can be configured on all recipient types. Some other attributes, such as Company, are not present for
all recipient types.
Differing address lists for multiple related companies that share a single Exchange organization. Each
organization has a separate set of address lists, including separate GALs.
Differing address lists for departments in a single organization. A common GAL is used for all ABPs,
but each department can have different departmental address lists for internal use.
Differing address lists for user groups in a school. Students can be assigned a GAL that includes only
their teacher and other students in their class, while teachers are assigned a GAL that includes all
addresses in the school.
3-28
Mailboxes associated with an ABP must be hosted on a Mailbox server running Exchange Server 2010
with SP2.
Hierarchical address books and ABPs cannot be used at the same time.
A GAL in an ABP must contain, at a minimum, the objects defined in the other address lists that are
part of the ABP. The GAL should also contain the user that the ABP is assigned to.
ABPs do not separate mailboxes in an Exchange organization. ABPs create separate address lists, but
they do not prevent users who have differing ABPs from sending messages to each other.
To use ABPs, users must connect through either Exchange Web Services (EWS) or the Address Book
Service on a Client Access server. Outlook 2011 for Mac and Entourage 2008 clients query global
catalog servers directly to obtain address lists and do not use ABPs. If Outlook 2011 for Mac connects
from the Internet, you can configure it to use EWS instead of querying directly.
Any address list except a GAL can be used as the room list in an ABP. This means that you can use an
empty address list in scenarios where users assigned an ABP do not need to book rooms.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
3-29
Key Points
You can use email address policies to apply email addresses to recipients. A single email address policy
can include multiple email addresses. This allows you to have multiple variations in user name or domain
name for each recipient.
The Default Policy applies to all recipients. In many organizations, the Default Policy is the only one
required, because all users have the same email address format. Larger organizations may need multiple
email address policies to provide varying address formats or domain names for some users. For example, a
recently purchased subsidiary may need to retain older email addresses to ensure that they receive
messages from clients that have not updated their address books with the companys new email address.
When you create an email address policy with multiple email addresses, you must define one of the
addresses as the primary address. The recipient can receive messages at all defined email addresses, but
outgoing messages use the primary address as the Reply To address. When you change domain names or
email address formats for the organization, you should retain the old email addresses and add the new
email addresses as the primary address. Then as recipients outside your organization reply to messages,
they can add the new email addresses to their address books.
When you modify email address policies or create new ones, you can apply the changes immediately, or
schedule them to occur at a later time. By scheduling the policy application to occur outside of regular
business hours, you minimize the impact on the system.
Question: Do you see a need for multiple email address policies in your organization?
3-30
Key Points
Exchange Server 2010 allows you to customize system messages. You can use delivery status notifications
(DSNs) to notify internal and external senders about message delivery status. You can use quota messages
to inform users when their mailboxes are above the defined quota levels.
You can customize a DSN to add additional information, or to provide a better explanation of why the
error occurred. You could also modify a DSN to provide contact information for the person who can help
resolve the problem. You can format the custom DSN by using Hypertext Markup Language (HTML).
If you choose to customize DSN messages, you can customize them separately for internal and external
senders. When you provide contact information in a DSN, it may only be appropriate for internal senders.
You can customize quota messages to make the messages more user-friendly, or to provide contact
information. For example, in a warning message about a mailbox that is too large, you could provide
some information about how to request a larger mailbox quota.
Question: Will you customize quota messages for your organization?
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
3-31
Key Points
When you create a new distribution group in Exchange Server 2010, it is created as a universal group. This
ensures that there are no problems with groups containing members from multiple domains. Distribution
groups that are upgraded from previous versions of Exchange Server may be Global groups and function
properly with Exchange Server 2010.
When designing distribution groups, you can perform the following tasks:
Designate an expansion server for a group. The expansion server is responsible for expanding the
group membership list for delivery. This server is not required in Exchange Server 2010, but you can
use it to control processing load. If you do not specify an expansion server, then the first Hub
Transport server processing the message functions as the expansion server.
Designate a group manager. Use this for delegating group membership management to a user in a
department or workgroup that is responsible for the group. The group manager can then manage
the membership of the group, which reduces the workload for Exchange Server administrators. In
many cases, a group manager is more responsive to requests for group membership changes than
Exchange Server administrators.
Enable moderation. When you enable moderation, messages sent to the group must be approved by
a moderator before they are delivered to the group. This can be useful for ensuring that only
appropriate content is sent to a group. For example, a moderator could ensure that an All Users
group is not used by enthusiastic parents attempting to sell fund-raising chocolates for their children.
Reuse security groups as distribution groups. If a security group is already configured with the
members that you want to use for a distribution group, then you can mail-enable an existing security
group. This avoids the need to maintain two separate membership lists. However, you must consider
who will manage the group membership, as often the task of managing distribution groups is
separate from managing security group membership.
3-32
Allow users to join and leave distribution groups when appropriate. You can configure distribution
groups to allow users to join and leave distribution groups rather than requiring an Exchange Server
administrator to maintain the group membership. This allows users to join distribution groups that
receive information that is of interest to them. For example, in a research and development
department, there could distribution groups for various subject areas. You can also configure groups
to require manager approval for joining. Users cannot join and leave security groups. Security groups
have closed membership.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
3-33
Key Points
You can use resource mailboxes for booking rooms and equipment. The main benefit of using resource
mailboxes is to provide a centrally accessible schedule for the resource so that users can see when it is
available. You have the option to automate the booking process, or designate a delegate to manage all
bookings.
When you configure a resource mailbox to automatically accept bookings, it reduces the delegates
management workload. It also makes it faster for users to confirm that the resource is booked. You can
define rules for when a resource mailbox will automatically accept a booking.
Allow conflicting meeting requests. When this option is enabled, multiple users can book a resource
at the same time. In most cases, this is not appropriate.
Allow repeating meetings. Some organizations choose not to allow this option, in order to prevent
users from booking resources unnecessarily.
Allow scheduling only during working hours. Use of this option is often appropriate inside a building
that will not generally be available outside of work hours. However, it would not be appropriate to
use this option for a resource such as projectors or laptops that are used outside the organization.
Reject repeating meetings that have an end date beyond the booking window. Use this option to
ensure that repeating meetings are not booked too far in the future.
3-34
Booking window. This option defines how far in the future meeting requests can be scheduled. If this
window is too large, then a resource may be booked far in the future, but the person that booked the
resource may not actually require the resource by the time the distant meeting date arrives.
Maximum duration. This option defines how long a given meeting can last.
Maximum conflict instances. When a repeating meeting is being scheduled, a certain number of
conflicts can be allowed so that the entire meeting request is not rejected.
Conflict percentage allowed. When a repeating meeting is scheduled, you can use this option to allow
a certain percentage of conflicts, so that the entire meeting request is not rejected.
Out-of-policy requests are those that do not meet the standard booking rules for the resource. Out-ofpolicy requests must always be approved by a delegate. However, you can specify the users that can
submit out-of-policy requests. If a user is not allowed to submit out-of-policy requests, any out-of-policy
requests submitted by that user will be rejected, rather than waiting for delegate approval.
You need to decide the appropriate policy settings for each resource, who can book in-policy requests,
and who can book out-of-policy requests.
Delegates
In addition to determining booking policies, you also need to decide which user or users should be the
delegate for a resource. The resource delegate is responsible for approving meeting requests that are not
automatically accepted, and for arbitrating conflicting requests. The delegate for a resource should be the
person responsible for managing that resource within the organization.
Question: Does your organization need to implement resource mailboxes?
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
3-35
Key Points
You can move mailboxes between mailbox databases and mailbox servers. Some of the reasons you might
want to move mailboxes are:
Migration to a new server. When you purchase a new server, you will need to move mailboxes to the
new server before decommissioning the old server.
Load balancing between servers. If one server is performing poorly because it is overloaded, you may
want to move some mailboxes to another server with sufficient resources to handle additional
mailboxes.
Reduce database size. If a mailbox database becomes too large in size, it may be difficult to restore
during disaster recovery. You can create multiple smaller mailbox databases, and then move
mailboxes onto those databases.
User moves between locations or departments. Often a mailbox database or mailbox server is
dedicated to a department or location. When a user moves to a different location or department, you
should also move the user mailbox to the appropriate mailbox database.
3-36
Question: Do you see a need for online mailbox moves in your organization?
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
3-37
Lesson 4
You can use public folders as a repository for data in collaboration scenarios. You can also use them as a
central mailbox for a group of users, and as centralized calendars. Although Exchange Server 2010 deemphasizes public folders, they are still fully supported, and some organizations use them extensively.
After completing this lesson, you will be able to:
3-38
Key Points
Some organizations make little use of public folders, while others use them extensively, and may have
developed manual or automated business processes that require public folders. Because of the variation
in public folder use, you should start your public folder design by analyzing your organizations business
requirements for public folders.
What versions of Office Outlook does your organization use? If you use Office Outlook 2003 or earlier
versions, you still require public folders to store the offline address book and free/busy information.
How many public folders has your organization implemented, and how much data does each public
folder store?
How often are public folders used? Calculate how frequently public folders are accessed, and the
number of users who access them. Understanding public folder usage helps you plan the location and
capacity of the public folder servers. For example, high public folder usage may require you to use a
dedicated public folder server.
How are users of public folders distributed within the organization? Are the public folder users
primarily in one location, or are they distributed across the organizations locations? Do users from
the Internet need access to public folders?
What function do the public folders serve? Some organizations use public folders only for basic
functionssuch as storing company datawhile other organizations use public folders for more
advanced functionssuch as creating customized applications.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
3-39
Do the public folders support strategic business applications? Analyze the organizations primary
business applications, and decide whether they are using public folders as a front-end system for
form-based and event-based applications.
What are the plans for sharing the types of information that may be stored in public folders? For
example, is the organization considering deploying an intranet that uses the Microsoft SharePoint
services or another kind of web server for sharing some types of company information?
Question: Does your organization use public folders, and if it does, what is the purpose?
3-40
Key Points
Public folders are stored in public folder databases on Exchange Server 2010 Mailbox servers. By default, if
you specify that your organization includes Office Outlook 2003 or earlier clients when you install your
organizations first Mailbox server, a public folder database is created on this first Mailbox server. No other
public folder databases are installed; however, you can create a public folder store on any other Mailbox
server in the organization.
Default maximum item storage time for the public folder database
If your organization currently uses public folders, you can determine this information easily. If your
organization would like to use public folders now, but has not used them previously, you might need to
spend more time gathering the business requirements to determine how much space to dedicate to a
public folder database.
The processor and memory requirements for servers hosting a public folder database are the same as for
other Mailbox servers. If the server hosts both mailboxes and public folders, then each MAPI connection
requires the same amount of resources, whether connecting to the mailbox database or the public folder
database. If public folder data changes frequently, then the disk I/O, memory, and processing
requirements increase.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
3-41
If your organization uses public folders extensively, you might choose to deploy one or more dedicated
public folder servers. Dedicated public folder servers may have different hardware requirements than
servers that are both Mailbox and public folder servers, depending on the number of users using the
public folders and the size of the public folder store. Because a Mailbox server can host only one public
folder database, the hardware requirements for the dedicated public folder server are likely to be
significantly less than a Mailbox server that has multiple mailbox databases.
3-42
Key Points
Organizations that use public folders extensively also frequently use public folder replication to provide
fault tolerance and better access for users in different locations. When you enable public folder
replication, the data in a public folder is synchronized between two or more servers. If one server is
unavailable, users can access the data from one of the remaining replicas. A public folder database can
exist on a Mailbox server that is part of a DAG, but the public folder database cannot be replicated by the
DAG.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
3-43
If network bandwidth is limited between company locations, optimize network usage by calculating
the relative impact of public folder referrals and replication. The network utilization for public folder
referrals is easy to calculate. Simply calculate how much new content is added to the public folder on
a daily basis, and that is the network traffic that is created if you enable public folder replication. The
network traffic created by public folder referrals is more difficult to measure. You must determine
how many times a day users access the public folder contents, and what the average message size is
in the folder. To optimize replication, you should:
Configure public folder replication only for public folders that do not change frequently and that
contain large messages.
Use public folder referrals for public folders that change frequently and to which users must
always have access to the latest content.
Schedule public folder replication during non-peak hours. In cases of limited bandwidth, and if
users do not need access to a current copy of the public folder contents, you can schedule public
folder replication to occur during non-business hours.
Note You can modify public folder referrals by using the Set-PublicFolderDatabase id
databasename PublicFolderReferralServerList Servername:Cost
-UseCustomReferralServerList $True command in the Exchange Management Shell. This
command enables public folder referrals to the specified servers in different Active Directory
sites, and assigns a cost to each server. If you set the UseCustomReferralServerList
parameter to True, and you do not add servers to the PublicFolderReferralServerList
parameter, public folder referrals are disabled.
If the network bandwidth between company locations is not a significant issue, then the primary
considerations for using replication or referrals is server capacity and client performance. If you have a
Mailbox server in a remote site, or if you are deploying a dedicated public folder server, you should
enable public folder replication. This provides users with a more positive experience compared to
accessing public folders across a wide area network (WAN) connection. If you do not have a Mailbox
server capacity in the remote site, then use public folder referrals.
If you have Office Outlook 2003 or earlier MAPI clients, you should enable replication for the system
folders that these clients require. These folders include the Schedule+ free/busy folders and the
offline address book folders. The offline address book folder includes up to three different versions of
the offline address book. Only replicate the offline address book versions that the Office Outlook
clients in your organization require.
Question: Why would you replicate the content of public folder?
3-44
Key Points
When designing public folder deployment in your organization, you also should plan for client access.
This includes two components: designing access to the public folder contents based on the messaging
client that users utilize, and designing the public folder hierarchy to ensure that user access to public
folders is as efficient as possible.
You can configure Outlook clients that connect from outside the network to use Outlook Anywhere.
Outlook Anywhere uses remote procedure call (RPC) over Hypertext Transfer Protocol Secure (HTTPS)
to connect to the Client Access server.
You can provide access to the mailboxes and public folders through Outlook Web App. Earlier
versions of Outlook Web Access opened a new window to view public folders. Outlook Web App in
Exchange Server 2010 integrates public folders into the same interface as the mailbox.
To provide access to public folders for IMAP4 and NNTP clients, you must leave the public folders on
an earlier Exchange Server version. Next, you must configure the clients and the network
infrastructure to enable the clients to connect to the Exchange server that is hosting the public folder.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
3-45
If users use IMAP4 and NNTP primarily to post messages to public folders, consider mail-enabling the
public folder. When you mail-enable a public folder, this assigns an email address to the public folder
that enables users to send messages to the folder using any email client.
Note If web access to public folders is important in your organization, consider moving
the public folder content to a server running SharePoint.
3-46
Key Points
Exchange Server displays public folders as a hierarchy or tree. If you do not plan this hierarchy carefully,
the public folder structure can become complicated and inconsistent, making it difficult for users to locate
the information they need, and making public folder administration more complicated.
The following table lists the guidelines that you must consider when designing the public folder hierarchy.
Guideline
Reason
Users should be able to identify the contents of a public folder from the
public folder name.
You can manage public folder settings such as permissions, folder size,
and replication. Whenever possible, group public folders that require the
same configuration under a top-level folder, so that you can apply the
required settings to all of the folders in the hierarchy at the same time.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
3-47
Key Points
To ensure the simplified management of public folder infrastructure while providing users with effective
use of public folders, you need to plan the public folder permissions. When planning public folder
permissions, you need to consider administrative and client permissions.
Reason
Identify a group of
administrators who will
administer public
folders.
Plan to delegate
administrative
permissions for lowerlevel folders.
In most cases, the public folder users understand the public folder
requirements better than the messaging administrators. This means you can
delegate the public folder administration taskssuch as creating new public
folders and assigning client permissionsto advanced users. In many
organizations, each department assigns a user or group of users the
responsibility of managing the departments public folder.
Note If you want to provide users administrative access to public folders, use the public
folder permission roles. The folder owner role allows users to create new folders and to
assign permissions to lower-level folders, but it does not allow them to modify other public
folder settings, such as replication or folder size.
3-48
If the user is explicitly granted permission to the public folder, only those clients that have been
granted permission are applied to the user.
If the user is a member of a distribution group that has permission to the public folder, the users
permissions are the least restrictive of either the group permissions or the default permissions for the
public folder.
If the user is a member of multiple distribution groups, the users permissions are the least restrictive
of any distribution group or the default permissions for the public folder.
The following table lists the guidelines that you must consider when designing client permissions.
Guideline
Reason
Create mail-enabled
universal groups to
enable public folder
permissions.
You can grant access to public folders for individual users, but managing
groups is more efficient than managing individual users. Start by determining
the users who require access to public folders, which folders they require
access to, and the level of access required to the public folders. Then create
groups for each unique set of permissions, assign permission roles to the
groups, and add users to the groups.
Limit permissions at
higher levels of the
hierarchy.
When you create a new public folder, it inherits the permissions from the
parent public folder. Limiting permissions in the parent folder ensures that
unnecessary permissions are not given to lower-level folders.
Note When permissions are modified on a parent folder, they are not inherited by the
child folders. However, you can propagate permissions from the parent folder to child
folders.
Question: Which users in your organization have permission to create new public folders?
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
3-49
Key Points
Public folders are still supported by Microsoft, and will be supported at least as long as Exchange Server
2010 is supported. However, public folders are deprecated. This means that you should be exploring
alternatives to public folders before creating additional public folders.
One of the most commonly used alternatives to public folders is SharePoint Server 2010 and SharePoint
Foundation 2010. SharePoint Server 2010 and SharePoint Foundation 2010 share a common core set of
features, but SharePoint Server 2010 has additional advanced features. Both are web-based platforms for
collaboration.
Some of the commonly used features in SharePoint are:
Document libraries. Used to store documents that can be checked in and out, and tracked with
version control.
Discussion groups. Used to provide a forum for communication, similar to postings in a public folder.
Shared calendars. Can be used as a direct replacement for shared calendars in a public folder.
Contacts. Can be linked with Office Outlook to provide a shared location for creating contacts.
SharePoint can also be integrated with Exchange Server 2010 to provide meeting workspaces. Meeting
workspaces are created as a site to support a meeting and are created automatically as part of the
meeting request. You can use the meeting workspace to store documents related to the meeting and to
have preliminary discussions.
3-50
Other Alternatives
If you do not require the advanced functionality in SharePoint, you can also consider using:
Web-based discussion forums. If your only requirement is to provide discussion forums, there are a
wide variety of web-based discussion products available that you can use. Because the interface is
web-based, you do not need for special client software.
NNTP servers. If your only requirement is to provide discussion forums, you also can consider using
an NNTP server. However, many users might not understand what an NNTP client is, which may lead
to increased user support requirements.
Question: Does your organization use SharePoint?
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
3-51
Lab Setup
For this lab, you will use the available virtual machine environment. Before you begin the lab, do the
following:
1.
On the host computer, click Start, point to Administrative Tools, and then click Hyper-V Manager.
2.
3.
Lab Scenario
You are a messaging engineer for the A. Datum Corporation, an enterprise-level organization with
multiple locations. A. Datum Corporation is an international organization involved in technology research
and investment, and it is planning to upgrade from Exchange Server 2003 to Exchange Server 2010.
You have been tasked with reviewing the current messaging infrastructure and network topology, with a
goal of planning the deployment and configuration of mailbox services. You need to make proposals
about how best to address the needs of the various stakeholders in the organization.
Finally, you need to implement part of your proposed mailbox services design.
Note Your instructor may choose to perform this lab as a group discussion rather than as
an individual activity.
3-52
2.
3.
4.
Use the Exchange 2010 Mailbox Server Role Requirements Calculator spreadsheet to determine the
configuration.
5.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
3-53
Her plan to use the SAN will also not result in high availability for Mailbox servers. The server itself will be
a single point of failure. Exchange Server 2010 does not support the use of single copy clusters like
Exchange Server 2007. A DAG will be required for high availability, and each server in the DAG maintains
a copy of the database. It would be incredibly inefficient to store multiple copies of the same data on the
same SAN.
For initial planning purposes, we need to assume that well use a DAG with at least three database copies.
Two copies will be located in the location with users, and one copy will be offsite for disaster recovery.
We currently have a mailbox size limit of 50 MB for all users. However, this limit is much too small, and
many people have been able to convince their managers to approve a size increase. Almost half of the
people in the company currently have an exception on their mailbox limits, with the limit at 200 MB or
more. During a meeting last week, the CIO mentioned that when we get to Exchange Server 2010, we
would set up a mailbox size limit of 500 MB for all users and a 1 GB limit for executives or other
exceptional cases. About 25 percent of the users will fall into the exceptional category. In addition, we
want to create personal archives for the users that are double the size of the mailbox to eliminate the use
of PST files.
I have some concerns with increasing the mailbox size to this limit. The back-up system in all of our offices
doesnt have as much capacity as we would like. In some offices, we are still backing up to tape. Some of
the tape backup systems can restore at only 50 GB per hour. According to the SLA that we have in place,
we are supposed to restore any failed database within an hour of failure.
Disks: 2000 GB, 7.2K revolutions per minute (RPM) SAS 3.5
3-54
Question: In the Server Design Statistics, what information is relevant to determining server
design, and why?
Task 3: Perform high level planning for Mailbox server storage in London
Jason Carlson
2nd April 2010
Requirement Overview
Create a high level plan for Mailbox server storage in London.
Additional Information
N/A
Question: Assuming that there are 12,000 users in London, how much disk space is required for
mailbox databases?
Question: Should the disk space for Mailbox servers be SAN or DAS?
Question: If DAS is used, will the disk space use RAID or JBOD?
Question: Should transaction logs be stored on a separate LUN from database files?
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
3-55
Task 4: Use the Exchange 2010 Mailbox Server Role Requirements Calculator
spreadsheet to determine the configuration
1.
2.
Total Number of HA Database Copy Instances (Includes Active Copy) within DAG: 3
Database Configuration
3-56
Total Number of Tier 1 User Mailboxes: Use the data from Task 2
Projected Mailbox Number Growth Percentage: Use the data from Task 2
Total Send/Receive Capability / Mailbox / Day: Use the data from Task 2
Personal Archive Mailbox Size Limit (MB): Use the data from Task 2
Total Number of Tier 2 User Mailboxes: Use the data from Task 2
Projected Mailbox Number Growth Percentage: Use the data from Task 2
Total Send/Receive Capability / Mailbox / Day: Use the data from Task 2
Personal Archive Mailbox Size Limit (MB): Use the data from Task 2
Backup Configuration
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
Storage Options
3.
Server Configuration
Network Configuration:
Jason Carlson
2nd April 2010
Requirement Overview
Determine the hardware configuration for large Mailbox servers that use DAS.
Additional Information
N/A
Proposals
Question: What is the processor configuration for each server?
3-57
3-58
(continued)
A. Datum Large Mailbox server design
Question: How many databases are recommended?
Question: How many database disks are recommended for the primary datacenter servers?
Question: How many database disks are recommended for the secondary datacenter server?
Results: After this exercise, you should have determined the configuration for London mailbox servers.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
3-59
2.
3.
3-60
Jason Carlson
2nd April 2010
Requirement Overview
Determine the configuration required to meet recipient management needs.
A. Datum recipient management configuration
Proposals
Question: How will you ensure that recipients are assigned the correct email addresses?
Question: How will you enable the IT Client Services staff to perform recipient management?
Question: How will you meet the needs for meeting room bookings?
Question: How will you address the needs for distribution group management?
Question: How will you address the need for separating the address books for A. Datum and Trey
Research?
Results: After this exercise, you should have designed the appropriate configuration for recipient
management.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
3-61
2.
3.
Question: In the Server Design Interview, what points are raised that impact your public folder
deployment plan, and how do they impact it?
3-62
Jason Carlson
2nd April 2010
Requirement Overview
Determine the configuration required to meet public folder needs.
Proposals
Question: How will you address the executives desire for public folders?
Question: How will you address the IT Client Services request for a public folder?
Question: Other than the public folder for executives, which other public folders are required?
Results: After this exercise, you should have designed the appropriate configuration for public folders.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
3-63
2.
3.
4.
5.
On VAN-EX1, use the Active Directory Users and Computers administrative tool to create a new
organizational unit in the root of adatum.com.
Name: Trey
2.
Open the Exchange Management Console and browse to the Mailbox node under Organization.
3.
4.
Container: \
Conditions: None
Schedule: Immediately
Container: \
Conditions: None
Schedule: Immediately
5.
6.
Create a new GAL for Trey Research by using the following command:
New-GlobalAddressList TreyGAL RecipientContainer ou=Trey,dc=adatum,dc=com
3-64
7.
Create a new OAB for Trey Research by using the following command:
New-OfflineAddressBook TreyOAB AddressLists TreyGAL
8.
9.
In the Exchange Management Console, create a new address book policy with the following settings:
Name: TreyABP
In the Exchange Management Shell, assign TreyABP to all users in the Trey organizational unit by
using the following command:
Get-Mailbox OrganizationalUnit Trey | Set-Mailbox AddressBookPolicy TreyABP
2.
On VAN-EX1, open the Exchange Management Console and create a new resource mailbox with the
following options:
Alias: Room100
2.
3.
Create and send a new meeting request with the following settings:
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
4.
Notice that an automatic response is received indicating that the booking was accepted by Room
100, because the request is in-policy. The response may take a minute or so to appear.
5.
Create and send a new meeting request with the following settings:
6.
Open the Microsoft Internet Explorer browser, and then connect to https://vanex1.adatum.com/owa.
7.
8.
9.
In Outlook, verify that Room 100 has accepted the meeting request.
3-65
On VAN-EX1, use the Exchange Management Console to open the Properties of the Executives
distribution group.
2.
3.
4.
Enable moderation.
Add the Executives distribution group as a sender that does not require approval.
On VAN-CL1, send a message in Outlook Web App from Andreas with the following settings:
To: Executives
Body: The Executives public folder has been created for you.
2.
View the delivery report for the New Public Folder sent item.
3.
4.
In Outlook Web App, view the delivery report for the New Public Folder sent item, and then verify its
delivery.
Results: After this exercise, you should have created and tested a public folder, a resource mailbox, and a
distribution group.
3-66
2.
Right-click 10233B-VAN-DC1 in the Virtual Machines list, and then click Revert.
3.
4.
Repeat these steps for 10233B-VAN-EX1, 10233B-VAN-EX2, and 10233B-VAN-CL1. Close the virtual
machine connection windows
5.
In the Virtual Machines pane, click 10233B-VAN-DC1, and then in the Actions pane, click Start.
6.
To connect to the virtual machine for the next modules lab, click 10233B-VAN-DC1, and then in the
Actions pane, click Connect.
Important: Start the 10233B-VAN-DC1 virtual machine first, and ensure that it is fully
started before starting the other virtual machines.
7.
Wait for 10233B-VAN-DC1 to start, and then start 10233B-VAN-EX1. Connect to the virtual machine.
8.
Wait for 10233B-VAN-EX1 to start, and then start 10233B-VAN-EX2. Connect to the virtual machine.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
3-67
Review Questions
1.
Why might you choose to use SATA drives instead of a SAN or SCSI drives for your Mailbox servers?
2.
When deciding between editions of Exchange Server, you need to consider the number of databases
you require. How many databases does the Standard edition of Exchange Server 2010 support?
3.
Which administrative tool should be used by a user that has been configured as a group manager?
4.
Use Cached Exchange Mode to increase client performance over slow connections.
Do not use Cached Exchange Mode to increase Mailbox server performance. In Exchange Server 2010,
the use of Cached Exchange Mode by clients does not affect Mailbox server performance.
Use personal archives to reduce the size of the cached mailbox when using Cached Exchange Mode.
3-68
4-1
Module 4
Planning and Deploying Client Access Services in Microsoft
Exchange Server 2010
Contents
Lesson 1: Overview of the Client Access Server Role
4-3
4-14
4-34
4-48
4-57
4-2 Planning and Deploying Client Access Services in Microsoft Exchange Server 2010
Module Overview
Microsoft Exchange Server 2010 provides access to user mailboxes for most types of messaging clients
that can connect from almost anywhere. The messaging clients access the Exchange Server mailboxes
through the Client Access server role. Because of the importance of this server role, you must understand
how it works, and how to design the Client Access server deployment. This module describes how to
design the Client Access server role deployment in Exchange Server 2010.
After completing this module, you will be able to:
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 4-3
Lesson 1
1
The Client Access server role provides access to Exchange Server 2010 mailboxes for all messaging clients.
Because all users connect to Client Access servers, you need to ensure that you design and deploy these
servers correctly. To do this, you must understand the services provided by the Client Access server role,
and how this role interacts with other Exchange Server 2010 server roles. This lesson provides a summary
of how the Client Access server role works in an Exchange Server 2010 deployment.
After completing this lesson, you will be able to:
Describe the client access business requirements that might impact your Client Access server design.
Describe how the remote procedure call (RPC) Client Access service works.
Describe the requirements for accessing Client Access servers from the Internet.
4-4 Planning and Deploying Client Access Services in Microsoft Exchange Server 2010
The Client Access servers design can have a significant impact on how satisfied users are with the
messaging system. All clientsincluding Messaging Application Programming Interface (MAPI) clients
such as Microsoft Office Outlook 2010connect to a Client Access server to access a mailbox on an
Exchange Server 2010 Mailbox server. Office Outlook 2010 or newer clients also connect to Client Access
servers to download offline address books (OABs), to access the Availability services, and to use the
Autodiscover feature. This means that substandard Client Access server performance directly affects users.
Total number and type of client connections. The total number of clients affects the Client Access
server design. Although the Client Access server can handle thousands of client connections
simultaneously, the number of connections is still an important consideration when you are planning
the server hardware and the number of servers to deploy. Additionally, the types of clients you deploy
are important, because each client access type may have unique requirements.
Client usage profiles. Along with the total number of clients, you also need to consider how the
clients use the messaging system. This information should include a typical client profile that lists the
number of messages read and sent, and the average size of messages and attachments.
Client locations. Consider the client locations when designing the Client Access server deployment.
Collect information that includes whether all clients are located on an internal network only, whether
clients are also connecting from the Internet, and whether clients will be connecting from branch
offices.
Security requirements. All organizations should be using a Secure Sockets Layer (SSL) to secure client
connections to the Client Access servers. SSL encryption and decryption requires additional resources
on the Client Access server, so you may need to increase the server hardware resources if most clients
are connecting using Outlook Anywhere or Outlook Web App.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 4-5
Availability requirements. In addition to planning the Client Access server deployment from a capacity
perspective, also consider the availability requirements for the organization. If your organization
requires that all services continue to be available during a single-server failure, then you need to
deploy at least two Client Access servers in a Client Access server array.
Performance requirements. Performance requirements may be harder to define objectively than some
of the other requirements, but most users will have minimum levels of performance expectations
when they access their mailboxes. Understanding the performance expectations will help you to
design an appropriately sized Client Access server deployment.
4-6 Planning and Deploying Client Access Services in Microsoft Exchange Server 2010
The Client Access server role in Exchange Server 2010 provides support for multiple types of messaging
clients, and provides several additional services for these clients. As you design your Client Access server
deployment, consider these clients and services.
Description
Office Outlook 2003 SP1 and newer clients can connect to Exchange Server
2010 mailboxes through the Client Access server role. MAPI clients require
RPC connectivity to the Client Access server.
Outlook Anywhere
Outlook Web App in Exchange Server 2010 lets you access your email from
any web browser. Exchange Server 2010 provides a complete set of features
for the following browsers on a computer running Windows XP, Windows
Server 2003, Windows Vista, or Linux:
Windows Internet Explorer 7 and later versions.
Firefox 3.0.1 and later versions.
Chrome and later versions.
On a computer running Max OS X, you can use:
Safari 3.1 and later versions.
Firefox 3.0.1 and later versions.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 4-7
(continued)
Client
Description
Microsoft Exchange
ActiveSync
Exchange ActiveSync lets you synchronize data between your mobile phone
and Exchange Server 2010. You can synchronize email, Contacts, Calendar
information, and Tasks. Devices that run Windows Mobileincluding
Windows Mobile 5.0 and Windows Mobile 6 or newerare all supported.
Devices running Windows Mobile 6.1 or newer support Autodiscover.
Exchange ActiveSync is licensed to other mobile device manufacturers, and is
available on a large variety of mobile devices.
Besides supporting MAPI and HTTP clients, Exchange Server 2010 supports
Post Office Protocol version 3 (POP3) and Internet message access protocol
version 4 (IMAP4) clients. By default, POP3 and IMAP4 install at the same time
you install the Client Access server role. However, the services needed to
support POP3 and IMAP4 require a manual start. To use POP3 and IMAP4,
you must first start the POP3 and IMAP4 services.
Entourage 2008, Web Services Edition, uses Exchange Web Services instead of
Web Distributed Authoring and Versioning (WebDAV) to provide access to
the user mailboxes, which provides support for Autodiscover. You can use
Autodiscover to automatically configure the client profile.
Note: Office Outlook 2011 for Mac also uses EWS to connect to
Exchange Server.
Description
Autodiscover
The Autodiscover service configures client computers that are running Office
Outlook 2007 or newer, or supported mobile devices. The Autodiscover
process configures the Office Outlook client profile, including the Mailbox
server, Availability service, and OAB download locations.
Availability
Address Book
The Client Access server makes OABs available through a web service. Only
Office Outlook 2007 or later clients are capable of retrieving OABs from a web
service.
4-8 Planning and Deploying Client Access Services in Microsoft Exchange Server 2010
(continued)
Service
Description
Exchange Web
Services
MailTips
The MailTips feature provides notifications for users regarding potential issues
with sending messages, before they send the messages.
Exchange Control
Panel
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 4-9
The introduction of the RPC Client Access service is one of the most significant architectural changes in
Exchange Server 2010. In previous Exchange Server versions, Office Outlook configured as a MAPI client
always connected to the Mailbox server directly, rather than connecting to a front-end or Client Access
server. In Exchange Server 2010, all clients connect to the Client Access server role, regardless of the client
protocol used.
When a MAPI client starts, it connects to a Client Access server. The client protocol has not changed,
and it is still backwards-compatible with older Office Outlook versions.
When the client connects to the Client Access server, the Client Access server uses a MAPI RPC
connection to communicate with the Mailbox server.
When a client such as Office Outlook 2010 or Outlook Web App requests the global address list
(GAL), the Client Access server role provides a Name Service Provider Interface (NSPI) service, and it
queries the GAL on behalf of the client. This means that all client connections for address book
lookups are now sent to the Client Access server rather than a global catalog server.
Organizations that deploy highly available Mailbox servers experience fewer client outages due to
mailbox databases that fail over to other servers. When a mailbox fails over to another server,
Exchange Server notifies the Client Access server, and redirects the client connections to a new server
within seconds. In a failover scenario, Exchange Server 2007 clients are disconnected for between 1
and 15 minutes. In Exchange Server 2010, if one Client Access server in a Client Access server array
4-10
Planning and Deploying Client Access Services in Microsoft Exchange Server 2010
fails, the client immediately reconnects to another Client Access server in the array. If a Mailbox server
fails, the client disconnects for 30 seconds.
You can move mailboxes from one Mailbox server to another, even while the user is online and
connected to the mailbox.
The new architecture supports more concurrent client connections to the Mailbox server. In Exchange
Server 2007, each Mailbox server handles up to 64,000 connections. In Exchange Server 2010, that
number increases to 250,000 connections.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 4-11
In Exchange Server 2010, all messaging clients connect to a Client Access server when they access their
Exchange Server mailboxes. You must deploy a Client Access server in the same site as the Mailbox server
so users can access their mailboxes.
If the client connects from the Internet using a non-MAPI connection, then the client connects to the
Client Access server using the client protocol. Only the client connection protocol ports must be
available on the external firewall.
2.
If the client connects from the internal network using Office Outlook configured as a MAPI client,
then the client connects to the Client Access server using MAPI RPC connections.
3.
The Client Access server connects to an Active Directory Domain Services (AD DS) domain controller
using Kerberos to authenticate the user. Internet Information Services (IIS) or the RPC Client Access
service on the Client Access server performs the authentication. The Client Access server also provides
a directory lookup service for all clients. When the client requests the GAL, or searches the GAL for a
specific recipient, the Client Access server performs the AD DS lookup for the client.
4.
The Client Access server connects to the Mailbox server using a MAPI RPC to submit messages to the
mailbox database, or to read messages.
4-12
Planning and Deploying Client Access Services in Microsoft Exchange Server 2010
If the users mailbox is located in the same site as the Client Access server, then the Client Access
server connects to the Mailbox server to fulfill the client request.
If the users mailbox is located in a different site from the Client Access server, the Client Access server
contacts a domain controller to locate the Client Access server in the site where the user mailbox is
located. If the Client Access server uses an external URL, then the Client Access server redirects the
client request to the Client Access server in the site that contains the user mailbox by presenting the
user with a page that provides the correct URL for the Client Access server, so the user can connect to
the appropriate Client Access server within the home site.
Note With Exchange Server 2010 SP2, you can configure cross-site silent redirection to
enable this redirection process to happen without presenting the user with a webpage
containing the correct URL. When you enable this feature, a user with a mailbox in AD DS
site A who accesses the Outlook Web App URL in AD DS site B will be silently redirected to
the Outlook Web App URL for AD DS site A. To enable cross-site silent redirection, you must
use the new CrossSiteRedirectType parameter from the Set-OWAVirtualDirectory
cmdlet. The parameter has two possible settings, Silent and Manual. The default setting is
Manual.
If you do not configure an external URL for the Client Access server in the site that contains the user
mailbox, then the Client Access server receiving the request proxies the client request to the Client
Access server in the appropriate site.
Note Exchange Server 2010 can redirect only Outlook Web App and Outlook Anywhere
clients to another Client Access server in a different site. All other Client Access server client
requests are proxied to a Client Access server in the same site as the user mailbox. To
optimize access for non-Outlook Web App clients, you must configure the clients to
connect directly to a Client Access server in the users home site.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 4-13
Requirements for Accessing the Client Access Server from the Internet
To enable access to the Client Access server from the Internet, complete the following steps:
1.
Enable access from the Internet to the Client Access servers using the client access protocols. To
connect to the Client Access server, clients must be able to access the server using HTTPS, POP3 or
IMAP4. Configure the Internet firewalls or reverse proxy to enable this access.
2.
Configure the external URLs for each of the required client options. You can configure all of the Client
Access server web server-based features with an external URL. By default, the external URL is blank.
3.
Configure an external Domain Name System (DNS) name resolution. For each Client Access server
that you expose to the Internet, verify that the servers host name can be resolved on the Internet. To
do this, add a host record for the Client Access server to the DNS zone on the DNS server that is
hosting the Internet DNS zone for your organization. If you are using different host names for each
Client Access server, then configure a host record for each host. If you are using the same domain
name internally and externally, then configure the host records on both the internal and external DNS
servers.
4.
Implement SSL certificates with multiple subject alternative names. If you are using multiple host
names for the Client Access services, or if you are publishing Autodiscover to the Internet, then ensure
that the SSL certificates that you deploy on each Client Access server have the required server names
listed in the subject alternative name extension.
5.
Configure Autodiscover for the Outlook Anywhere and Exchange ActiveSync clients. To enable access
to Autodiscover, you must enable access through the firewall to the Autodiscover virtual directory on
the Client Access server. Additionally, you must configure an external URL on the virtual directory,
and configure the required DNS records for clients to locate the Autodiscover service from the
Internet.
Note You have numerous design decisions to make when configuring Internet access to
the Client Access servers. Later lessons in this module address these design decisions in
depth.
4-14
Planning and Deploying Client Access Services in Microsoft Exchange Server 2010
Lesson 2
The first step in designing client access to Exchange Server mailboxes is designing the Client Access server
deployment and configuration. You must consider several factors when designing deployment, including
the hardware configuration, and how you will provide access to the services enabled on the Client Access
server. This lesson describes how to design Client Access server deployment.
After completing this lesson, you will be able to:
Design Client Access server deployments for organizations with multiple namespaces.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 4-15
The Client Access server in Exchange Server 2010 provides significantly more services than the front-end
server provides in Exchange Server 2003, or that the Client Access server provides in Exchange Server
2007. In particular, the RPC Client Access service requires significantly more resources on the Client Access
server than was required in previous versions of Exchange Server.
There is currently no specific recommended processor configuration for Client Access servers.
However, we recommend that you use a minimum of 2 processor cores, and a maximum of 12
processor cores.
The recommended memory configuration is dependent on the number of client connections and the
transaction rate for a Client Access server. The recommended random access memory (RAM) for
Client Access servers is 2 gigabytes (GB) of RAM per processor core, with a minimum of 8 GB of RAM.
The Client Access server is not a hard-disk intensive application. The following table describes Client
Access server role activities, and how each activity affects disk input/output (I/O).
Activity
Protocol logging
4-16
Planning and Deploying Client Access Services in Microsoft Exchange Server 2010
(continued)
Activity
Content
conversion
Content conversion for all Exchange Server 2010 protocols occurs on the
Client Access server. Disk access can become an issue for Client Access servers
if you have a large number of Internet clients that access mailbox data
through either POP3 or IMAP4. The POP3 and IMAP4 client requires that the
content be converted into Multipurpose Internet Mail Extensions (MIMEs)
before sending it to the client. This conversion occurs on the Client Access
server, and if the message is larger than 64 kilobyte (KB), the conversion
occurs on disk. If a large percentage of the user base is using POP3 or IMAP4,
the temporary folder where conversion occurs should be placed on a
dedicated fast disk.
Paging
The Client Access server requires a fast network connection to Mailbox servers and global catalog
servers. If you have a large number of internal MAPI clients, the network connection may become a
bottleneck. To reduce the network bottleneck, configure the Client Access server with multiple 1
gigabits per second (Gbps) network cards.
As a general guideline, you should deploy three Client Access server processor cores in an AD DS site
for every four Mailbox server processor cores. This is a significant change from previous Exchange
Server versions, primarily due to the increased processor load required for the RPC Client Access
service.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 4-17
In many organizations, the Client Access server is accessible from the Internet for Outlook Anywhere,
Outlook Web App, and Exchange ActiveSync clients. Therefore, always ensure that the Client Access server
that faces the Internet is as secure as possible.
Important In previous Exchange Server versions, we recommended that you run the
Security Configuration Wizard (SCW) to disable services and configure the Windows Firewall
settings on Client Access servers. To enable this option, you needed to register Exchange
Server-specific SCW configuration files before running the SCW. Exchange Server 2010,
however, is designed to be secure by default, and during installation, only configures
required services and firewall settings. Exchange Server 2010 does not provide the SCW
configuration files. Running the SCW on an Exchange 2010 server is not recommended.
Obtain and install a server certificate on the Client Access server. Ensure that the certificate name
matches exactly the server name that users will use to access the Client Access server. Additionally,
ensure that all the client computers and mobile devices that will access the server trust the certificate
issued by a certification authority (CA).
2.
Configure the Client Access server virtual directories in IIS to require SSL. Secure the following virtual
directories:
Autodiscover
ecp
EWS
4-18
Planning and Deploying Client Access Services in Microsoft Exchange Server 2010
Microsoft-Server-ActiveSync
OAB
owa
RPC
RPCWithCert
Integrated Windows authentication. Integrated Windows authentication is the most secure standard
authentication option. When users log on with a domain account, they are not prompted for a user
name or password. Instead, the server negotiates with the Windows security packages installed on the
client computer to obtain the user name and password of the logged-on user. Unencrypted
authentication information is not transferred across the network.
Important When using a single Internet-accessible Client Access server for all sites, you
must enable Integrated Windows authentication on all of the Client Access servers that are
not Internet accessible. For example, the outward-facing Outlook Web App server can use
forms-based authentication, but the internal Client Access servers must be configured to
allow Integrated Windows authentication. This is changed from Exchange Server 2007.
Digest authentication. Digest authentication secures the password by transmitting it as a hash value
over the network. To use Digest authentication, users must have an account stored in AD DS.
Basic authentication. Basic authentication transmits passwords in clear text over the network.
Therefore, you should always secure basic authentication with SSL encryption. Basic authentication is
the authentication option that is most widely supported by clients. Single sign-on is not supported, so
workstation credentials are never automatically passed over basic authentication.
Forms-Based Authentication
Forms-based authentication is available only for Outlook Web App and Exchange Control Panel, and
when you use this option, it replaces the other authentication methods. This is the preferred
authentication option for Outlook Web App, because it provides enhanced security. With forms-based
authentication, Exchange Server uses cookies to encrypt the user logon credentials in the client
computer's web browser. Tracking the use of this cookie allows Exchange Server to time-out inactive
sessions.
The amount of time required before an inactive session times out varies depending on the computer type
selected during logon. If you choose a public or shared computer, the session times out after 15 minutes
of inactivity. If you choose a private computer, the session times out after 12 hours of inactivity.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 4-19
Note You can configure the time-out values for public and private computers by
modifying the Client Access server registry. Use the Regedit utility, or the Set-ItemProperty
cmdlet. For more information about how to configure these settings, see the "Set the
Forms-Based Authentication Private Computer Cookie Time-Out Value" topic in Exchange
Server 2010 Help.
Forms-based authentication is enabled by default for Outlook Web App and Exchange Control Panel.
Note In Exchange Server 2010 SP2, if you have enabled cross-site silent redirection, and if
the authentication method for the Outlook Web App virtual directory on both the initial
and redirected Client Access servers is set to forms-based authentication, the user must
enter their credentials only once. However, if the authentication methods differ, the users
may be required to enter their credentials a second time.
You can configure the firewall as the endpoint for the client SSL connection. The firewall can decrypt
the client traffic, apply application layer filtering, and then re-encrypt the traffic before sending it to
the Client Access server.
You can offload SSL decryption to the firewall. If you do not require all connections on your internal
network to be secure, you can configure the firewall to decrypt the SSL traffic, but not re-encrypt it
before sending the traffic to the Client Access server. This means that Client Access server resources
are not used to perform SSL decryption and encryption.
If you use Forefront Threat Management Gateway or Forefront Unified Access Gateway as the
application layer firewall, you can configure the firewall to pre-authenticate all client connections
using forms-based authentication. This means that only authenticated connections are allowed into
the internal network.
Note If you are using certificate-based authentication for Exchange ActiveSync, you must
configure a server-publishing rule that forwards the client traffic to the Exchange Server
computer without decrypting the packets on the Microsoft Internet Security and
Acceleration (ISA) Server.
4-20
Planning and Deploying Client Access Services in Microsoft Exchange Server 2010
Because of the importance of using SSL secure network traffic between Client Access servers and
messaging clients, you must ensure that you deploy the appropriate certificates on the Client Access
servers. You can secure all client connections to the Client Access server using SSL.
Note By default, the Client Access server is configured with a self-signed certificate that is
not trusted by clients. You should remove this certificate and install a certificate from a
trusted CA. Exchange Server 2010 provides a certificate wizard that enables you to install
and manage certificates without having to use the Exchange Management Shell, as was the
case in Exchange Server 2007.
Explanation
Advantages:
Client computers already trust the root CA, so you can chain certificates to the
root without further configuration.
The public CA provides full certificate and certificate revocation management
services.
Disadvantage:
The certificates issued by public CAs are more expensive than self-signed
certificates, or certificates issued by internal CAs.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 4-21
(continued)
Certificate
type
Explanation
Internal CA
Advantages:
Revocation is managed internally, so you can centrally revoke certificates if a
private key is compromised.
By managing your own CA, you have more flexibility in how you manage
certificate distribution.
Disadvantages:
Implementing an internal CA can be complicated, and the complexity may cause
security problems if incorrectly managed.
While the certificates issued by internal CAs are free, the cost of implementing
and managing a CA implementation can be higher than buying certificates from
a public CA.
Client computers that are not members of an internal AD DS domain do not
automatically trust the root CA, so you must add certificates for the trusted rootto-client machines, where necessary.
Self-signed
certificates
Advantage:
You can deploy self-signed certificates without a Public Key Infrastructure (PKI).
When you install Exchange Server 2010, it automatically creates a self-signed
certificate for each computer.
Disadvantages:
No centralized revocation lists. If the certificates private key is compromised,
each associated party must be notified manually to change to a new certificate
and stop relying on the existing one.
Client computers do not automatically trust the self-signed certificate, so you
must add certificates for the trusted root-to-client machines where necessary.
You can use self-signed certificates for internal communication, such as for securing Simple Mail Transfer
Protocol (SMTP) connections between Hub Transport servers. You also can use them to secure client
connections to Client Access servers, but because none of the client computers trust these certificates, we
do not recommend this solution. Rather, you should consider obtaining a certificate from a public CA or
internal CA for all Client Access servers.
In most cases, you should deploy a certificate issued by a public CA if users access the Client Access server
from the Internet, to ensure that the clients trust the certificate, and that they have access to certificate
revocation lists from any location.
If only computers that are members of the internal domain access the Client Access server, consider using
an internal, or private CA. By deploying an enterprise CA, you can automate the process of distributing
and managing certificates and certificate revocation lists.
Federation Certificates
The Microsoft Federation Gateway is a free cloud-based service offered by Microsoft and acts as a trust
broker between your on-premises Exchange Server 2010 organization and other federated Exchange 2010
organizations.
If you want to configure federation in your Exchange organization, you must establish a one-time
federation trust with the Microsoft Federation Gateway, so that it can become a federation partner with
your organization.
4-22
Planning and Deploying Client Access Services in Microsoft Exchange Server 2010
With this trust in place, users authenticated by AD DS are issued Security Assertion Markup Language
(SAML) delegation tokens by the Microsoft Federation Gateway. These tokens enable users from one
federated organization to be trusted by another federated organization.
If you intend to implement a federation trust with the Microsoft Federation Gateway, with Exchange
Server 2010 SP1, you automatically use a self-signed certificate to create this trust. The self-signed
certificate for this purpose is created automatically and installed on Exchange servers in your organization
when you use the New Federation Trust wizard in the Exchange Management Console.
Obtain a separate certificate for each client protocol that requires a unique name. This may require
multiple certificates for all Client Access servers. This may also require multiple websites in IIS. This is
the most complicated option to configure.
Configure all clients to use the same server name. For example, you could configure all clients to use
the server name mail.contoso.com, and obtain a certificate for just that one name.
Obtain a certificate with multiple subject alternative names. Most public CAs support multiple names
in the certificates subject alternative name extension. When you use one of these certificates, clients
can connect to the Client Access server using any of the names listed in the subject alternative name.
Use a certificate with a wildcard name. Most public CAs also support the use of wildcards in the
certificate request. For example, you could request a certificate using the subject of *.contoso.com,
and use that certificate for client connections.
Note Not all clients support wildcard certificates. Office Outlook, Internet Explorer, and
Windows Mobile 6 or newer clients support wildcard certificates, but you need to verify this
functionality for all messaging clients that are used in your organization before deploying
these certificates. Deploying wildcard certificates is also considered a security risk in many
organizations, because the certificate applies to any server name in the domain. If this
certificate is compromised, all host names for the organization are also compromised.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 4-23
Designing Autodiscover
The Autodiscover service in Exchange Server 2010 simplifies configuration of Office Outlook 2007 or
newer clients and Windows Mobile. Autodiscover provides configuration information that Office Outlook
requires to create a profile for the client. Office Outlook clients use the Autodiscover service to repair
Exchange Server connection settings for corrupted profiles, and for user mailboxes that are moved to
different servers. The Autodiscover service uses email addresses and passwords to provide profile settings
to Office Outlook 2007 or newer clients, and supported mobile devices.
When creating a profile, Autodiscover provides information so that the client can locate various web
services, such as the Availability service, Unified Messaging settings, and OABs.
4-24
Planning and Deploying Client Access Services in Microsoft Exchange Server 2010
When you start Office Outlook 2010 on a client that is not connected to the domain, it tries to locate the
Autodiscover service by using DNS. Office Outlook determines the email address suffix of the userfor
example, adatum.comand checks DNS for two predefined URLs. For example, if your SMTP domain is
adatum.com, Office Outlook attempts to connect to the Autodiscover service with the following two URLs:
https://adatum.com/autodiscover/autodiscover.xml
https://autodiscover.adatum.com/autodiscover/autodiscover.xml
Because the behavior for internal and external clients differs, you may decide that you want to use a
single URL for both your internal and external clients.
To modify the internal Autodiscover URL, use the Exchange Management Shell. Type the following
command, and then press Enter:
Set-ClientAccessServer -Identity ServerName -AutodiscoverServiceInternalURI
https://mail.adatum.com/autodiscover/autodiscover.xml
This cmdlet configures the Autodiscover service URL in the HeadOffice site to use the VAN-EX1 server.
Configure DNS
You must configure DNS with the correct information so that external clients can locate the appropriate
Client Access servers. When the Office Outlook client attempts to locate the Client Access server, it first
tries to locate the server connection point information in AD DS. If the client is outside the network, AD
DS is not available, so the client queries DNS for a server name based on the SMTP address that the user
provides. Office Outlook queries DNS for the following URLs:
https://autodiscover.<emaildomain>/autodiscover/autodiscover.xml
https://<emaildomain>/autodiscover/autodiscover.xml
To enable Autodiscover functionality for external clients, you must configure a DNS record on the DNS
server that the client uses to provide name resolution for that request. The DNS record should point to a
Client Access server that is accessible from the Internet.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 4-25
Outlook Anywhere
Unified Messaging
If you do not configure the external URL values, the Autodiscover service information that is provided to
the Office Outlook 2010 client may be incorrect for clients that are connecting from outside your network.
Note Users may be able to connect to their Exchange Server mailboxes; however, they will
be unable to use Exchange Server features such as Out of Office functionality, the
Availability service, Unified Messaging, and OAB downloads.
Additionally, certificates used to provide security when accessing these services must be correctly
configured with the appropriate hostnames. If multiple URLs are required, the certificate must support
multiple names.
Open Office Outlook 2010 using a profile that can connect to a Mailbox server.
2.
Press and hold the Ctrl key, click the Office Outlook icon in the notification area of the Windows task
bar, and then click Test E-mail AutoConfiguration.
3.
Enter your email address and password in the respective text boxes.
4.
Clear the Use Guessmart and Secure Guessmart Authentication check boxes. Guessmart automates
the process of configuring Outlook 2010 as an IMAP4 or POP3 client.
5.
Click AutoConfigure, and then click the Log tab to view detailed information on how the client
attempts to complete the autoconfiguration.
4-26
Planning and Deploying Client Access Services in Microsoft Exchange Server 2010
The Availability service enables Outlook Web App and MAPI clients to access free/busy information. These
clients use Autodiscover to obtain the URL for the Availability service. By default, the Availability service
uses the URL http://servername/EWS.
By default, the Availability service deploys on all Client Access servers, and you do not usually need to
configure it except in scenarios in which you are integrating the free/busy information from multiple
forests.
Legacy clients. Office Outlook 2003 and earlier clients do not use the Availability service for accessing
free/busy information. These clients must use system public folders to determine availability.
Exchange Server 2003 uses a public folder called SCHEDULE+FREE BUSY to disseminate availability
information. If you have only Office Outlook 2007 or newer clients, then you do not need to use this
public folder-based mechanism for sharing and determining availability information.
Cross-forest configurations. In Exchange Server 2003, sharing availability information between forests
is complex, and requires directory synchronization and additional tools such as the Inter-organization
Replication (IORepl) tool. Exchange Server 2010 supports cross-forest availability features without
these requirements.
You can select the granularity of free/busy information between forests when you configure crossforest availability. Choose between per-user and organization-wide granularity.
Per-user free/busy information is only supported in a trusted cross-forest topology. It enables the
Availability service to make cross-forest requests on behalf of a particular user, and it also enables
users in a remote forest to grant detailed free/busy information to other cross-forest users.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 4-27
With organization-wide free/busy data, the Availability service makes cross-forest requests only on
behalf of particular organizations. It returns users default free/busy information, and you cannot
control the level of free/busy information that it returns to users in other forests.
To ensure proper cross-forest availability, you must:
Synchronize the GAL between forests. You can use the GAL Synchronization (GALSync) tool for
this requirement.
Ensure that the Autodiscover service is working between forests. In cross-forest scenarios, the
Autodiscover service provides information to the Availability service by locating and providing
the external and internal URLs for the Office Outlook client and the Client Access server, for
cross-forest availability. Consequently, Client Access servers must be able to connect to the
Autodiscover service on the target forest to determine the target forests Availability URL.
When configuring your Autodiscover service to support cross-forest availability scenarios, select
from between two options:
If the forests trust each other, then export the server connection point from the target to the
source forest.
Ensure that all Client Access servers can validate the certificate on the target forest. We recommend
that you use a third-party certificate from an authority that both parties trust.
Note Because the Availability service is the only method for sharing cross-forest
availability information, and because Office Outlook 2003 clients do not use the Availability
service, legacy clients cannot access free/busy information from a remote forest unless you
replicate the content of the SCHEDULE+FREE BUSY public folder between forests. Use
IORepl to synchronize free/busy data across multiple forests.
4-28
Planning and Deploying Client Access Services in Microsoft Exchange Server 2010
Designing MailTips
MailTips inform users about issues or limitations with their outgoing messages. Exchange Server 2010
analyzes the messagesincluding the list of recipients to which they are addressedand if it detects
potential problems, notifies users with MailTips. Senders can use the MailTips feedback to adjust their
message, and thus avoid undesirable situations or non-delivery reports (NDRs).
AD DS
Recipient mailboxes
To ensure MailTips is optimized, you should understand how the Client Access server role interacts with
these services.
Number of members
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 4-29
The Client Access server role uses group metrics data when deciding whether to display the following
MailTips:
Large Audience. Displays when a sender adds a distribution group with a large membership count as
defined by your organization.
Note By default, any message addressed to more than 25 recipients is considered a large
audience.
External Recipients. Displays when a sender adds a distribution group that contains members who are
external to your organization.
Exchange Server evaluates MailTips each time senders add recipients to their messages, but it does not
calculate group metrics data as users compose their messages, because this could have an adverse impact
on performance. Instead, Exchange Server calculates group metrics data as a background process that you
can schedule to run during non-business hours.
Note By default, the Mailbox server that generates the OAB also generates the group
metrics data.
The Microsoft Exchange File Distribution Service distributes group metrics data. The service queries AD DS
for a list of Mailbox servers that are enabled for group metrics generation, and then copies the group
metrics data from the closest Mailbox server every eight hours.
The mail client queries the web service on the Client Access server for MailTips that apply to the
recipients in the message.
2.
3.
The Client Access server queries AD DS, and reads group metrics data.
The Client Access server queries the Mailbox server to gather the Recipient Out-of-Office and
Mailbox Full MailTips. If the recipient's mailbox is on another site, then the Client Access server
requests MailTips information from the Client Access server in the remote site.
The Client Access server returns MailTips data back to the client.
For best performance, the Client Access server must have high-speed and reliable connectivity to both the
AD DS site and the Mailbox servers.
Note You can enable MailTips over an organization relationship between your Exchange
Server environment and Exchange Online, or another organization. With Exchange Server
2010 SP1, you have granular control over which MailTip types are returned over the
organization relationship in addition to just allowing or preventing returning MailTips.
4-30
Planning and Deploying Client Access Services in Microsoft Exchange Server 2010
Client throttling is a technology designed to ensure that users do not overload the Exchange Server
messaging system. It also helps to ensure that users connected to Exchange Server from a variety of
client-types, share system resources equitably.
Exchange Server provides a default client throttling policy that may be sufficient for most organizations.
However, you can create additional client throttling policies or modify the default policy as your
organizational needs dictate.
Client throttling tracks resource consumption on a per-user basis, which enables you to createif
necessarya per-user throttling policy. Additionally, if you are hosting multiple tenants within your
Exchange Server organization, you can configure a per-tenant client throttling policy.
You can configure the following components to adhere to a client throttling policy:
Exchange ActiveSync
IMAP4
POP3
Windows PowerShell
For each of these components, you can configure the following client throttling policy parameters:
MaxConcurrency. Indicates how many concurrent connections a user can have against an Exchange
server. If a user tries to make more connections than allowed by the policy, the new connection
attempts fail. Use a value between 0 and 100. To unthrottle this component, specify the value $NULL.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 4-31
PowerShellMaxConcurrency. Defines the maximum number of remote shell sessions that a user can
have open at one time.
PowerShellMaxCmdlets. Defines the maximum number of cmdlets that a user can run over the time
period.
PowerShellMaxCmdletsTimePeriod. Defines the time period, in seconds, that the user can run the
maximum number of cmdlets as defined by the PowerShellMaxCmdlets parameter.
PowerShellMaxCmdletQueueDepth. Defines the number of operations that a user can run at the same
time.
Note The PowerShellMaxCmdletQueueDepth parameter directly affects the behavior of
the PowerShellMaxCmdlets and PowerShellMaxConcurrency parameters. For example, the
PowerShellMaxConcurrency parameter consumes at least two of the operations defined by
the PowerShellMaxCmdletQueueDepth parameter, but additional operations are also
counted against the throttling limit each time you run the cmdlet. The number of
operations that count toward the throttling limit depends on the cmdlets that you run.
Configure the PowerShellMaxCmdletQueueDepth parameter to at least three times larger
than the value of the PowerShellMaxConcurrency parameter.
You can use the performance monitor to examine how throttling governs the overall usage of system
resources.
Note Exchange Server 2010 SP1 introduced a number of client throttling behavioral
changes. For example, in Exchange Server 2010 SP1, all client throttling policies are enabled
by default. For further information about this and other client throttling changes introduced
by Exchange Server 2010 SP1, see the Microsoft TechNet website.
4-32
Planning and Deploying Client Access Services in Microsoft Exchange Server 2010
Before deploying Exchange Server 2010, you must consider how you will implement your external
namespaces. A namespace is a logical structure represented by a DNS domain name, such as adatum.com.
The decisions you make about your DNS namespace impact:
DNS configurations
Digital certificates
Client configurations
Centralized data center. All servers are located within one physical site with a single namespace, such
as mail.adatum.com. With this model, there are few DNS records to configure, fewer certificates to
manage, and only one URL for client computers. However, this model does not support multiple data
centers.
Single namespace with proxy sites. Only one site contains an Internet-facing Client Access server.
Consequently, this model uses only one namespace. With this model, you must configure fewer DNS
records, manage fewer certificates, and client computers use only one external URL. However,
because there are potentially many sites that do not contain an Internet-facing Client Access server,
many users will access their mailboxes using a proxy.
Single namespace and multiple sites. Each site may have an Internet-facing Client Access server, or
there may be only one site that contains Internet-facing Client Access servers. In this model, the sites
use one namespace. Again, because there is a single namespace, DNS and certificates are easier to
manage, and client computers use a single external URL. However, this model also suffers from the
same disadvantages as those of the single namespace with proxy sites.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 4-33
Regional namespaces. This model consists of multiple physical sites and multiple namespaces. For
example, a site located in Seattle might have the namespace mail.usa.adatum.com, while a Vancouver
site might have the namespace mail.canada.adatum.com. This model reduces proxying, but there are
more DNS records and certificates to manage. Additionally, client computers must be configured with
the appropriate external URL.
Multiple forests. This model consists of multiple forests that have multiple namespaces. An
organization that uses this model could be made up of two partner companies. Namespaces might
include mail.usa.adatum.com, and mail.europe.contoso.com.
4-34
Planning and Deploying Client Access Services in Microsoft Exchange Server 2010
Lesson 3
The type and version of client that you implement affects the deployment and configuration choices that
you make. This lesson explores the particular considerations for each client-type.
After completing this lesson, you will be able to:
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 4-35
The Client Access server role supports connections from RPC and MAPI clients such as Office Outlook
2007 and Office Outlook 2010; this was not the case with Exchange Server 2007, where MAPI clients
connected directly to the Mailbox server role. The MAPI client access change in Exchange Server 2010
provides consistency and improved failover scenarios for MAPI clients.
Consistency. All clients now use the Client Access server to access their mailbox.
Availability. If you deploy highly available Mailbox servers, clients can fail over more quickly to an
alternate Mailbox server. When the failover occurs, the Mailbox server notifies the Client Access
server, and the clients are redirected to the alternate Mailbox server within seconds.
Convenience. You can move user mailboxes between Mailbox servers even when the client is online
and connected.
You do not need to change your configuration if your users run Office Outlook 2007 or Office Outlook
2010. However, if your users use Office Outlook 2003 SP1 or earlier, you must adjust the Office Outlook
client configuration changes to support MAPI client access. Specifically, you must enable RPC encryption
on the client by either changing the Exchange Server account settings in Office Outlook, or by using a
Group Policy object to deploy the configuration change.
4-36
Planning and Deploying Client Access Services in Microsoft Exchange Server 2010
You can disable a specific MAPI client version by entering its version number. You can also specify a range
of version numbers.
You can disable MAPI access for a specific user, mailbox, or for all mailboxes on a specific server. Use the
Exchange Management Console or the Exchange Management Shell to perform this task.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 4-37
You may decide to implement a single Office Outlook client within your organization so that users
whether they are internal or externaluse a single interface to access their email and related content.
Outlook Anywhere uses RPC over HTTPS to enable users connected to the Internet to access Exchange
Server with Office Outlook 2007 or Office Outlook 2010. To support Outlook Anywhere within your
organization, note the following:
Configure Autodiscover. Autodiscover provides the necessary URLs for Outlook Anywhere clients. If
you do not configure Autodiscover settings correctly, Outlook Anywhere clients may fail to connect
to users mailboxes, or else may connect but provide limited or reduced functionality.
Remember that Client Access redirection is not supported. In a multi-site environment, you may need
to configure an Internet-facing Client Access server in each site that supports Outlook Anywhere
clients. Alternatively, configure Client Access proxying.
Enable Outlook Anywhere on at least one Client Access server per site. Users connect to the Client
Access server that is in the site that also hosts the Mailbox server containing their mailboxes.
Plan certificates carefully. You can use the same SSL server certificate that you use for both Outlook
Web App and Exchange ActiveSync to secure Outlook Anywhere. During installation, Exchange Server
2010 creates a default virtual directory named Rpc on the default IIS website on the Client Access
server. The Rpc virtual directory uses SSL to manage security for Outlook Anywhere and external
client access.
Note Bear in mind that if you use multiple Client Access serverseach in a different site
and each with different namesyou should obtain a certificate that can support multiple
names. You may use a single certificate if you add all the possible DNS name values to the
certificate Subject Alternative Name property on the certificate request. Some CAs support
wildcard names for a particular domain suffixfor example, *.adatum.com.
4-38
Planning and Deploying Client Access Services in Microsoft Exchange Server 2010
Configure firewall. Outlook Anywhere uses TCP port 443 for communication. To ensure proper
functionality, this port must be open on all firewalls through which Outlook Anywhere traffic passes.
This is the same Transmission Control Protocol (TCP) port used by Outlook Web App and many other
common web-based applications.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 4-39
Exchange Server 2010 uses Outlook Web App to provide users with web browser access to their
mailboxes. The Outlook Web App feature set is similar to those available in Office Outlook 2010.
Note Exchange Server 2010 SP2 provides a mini version of Outlook Web App. The mini
version of Outlook Web App is a lightweight, browser-based client, similar to the Outlook
Mobile Access client in Exchange 2003. It is designed to be used on a mobile operating
system. The mini version of Outlook Web App provides users with basic messaging and
calendaring functionality.
Outlook Web App in Exchange Server 2010 includes features such as chat, text messaging, mobile phone
integration, and enhanced conversation view. You can access these features from an expanded set of web
browsers, including Internet Explorer 6.0 or later, Firefox, Safari, and Chrome.
Outlook Web App provides many important benefits for an organization, including:
Communication through HTTP. You can easily secure the connection using SSL. Additionally, you will
probably not need to reconfigure your firewalls, because HTTP is a widely implemented protocol.
No need to deploy client software. All client computersincluding computers that run Linux or
Macintoshprovide a web browser. Consequently, users can access their mailboxes from any client
that can access the Client Access servers URL.
Direct access to unique features. You can access features such as the archive mailbox or conversation
view through Outlook Web App, without deploying Office Outlook 2010.
Outlook Web App cannot provide offline access to mailboxes. If the Exchange server hosting Outlook
Web App is offline, users cannot read or send messages. If offline access to files is required, you must
select another remote access method to the Exchange server. Outlook clients using Outlook Anywhere,
ActiveSync, POP3, and IMAP4 clients can cache messages to provide offline access.
4-40
Planning and Deploying Client Access Services in Microsoft Exchange Server 2010
The Exchange Control Panel is a webbased management interface that you can use to enable selfservice
for mailbox users. Users can perform specific management tasks without having access to the entire
Exchange Management interface.
Design Considerations for Outlook Web App and Exchange Control Panel
When planning the deployment for Outlook Web App and Exchange Control Panel, consider the
following:
Authentication. Select a suitable authentication method. The Outlook Web App and Exchange
Control Panel virtual directories support the following authentication methods:
Digest authentication
Basic authentication
Forms-based authentication
Virtual directory segmentation. Segmentation lets you enable and disable features that are available
to users in Outlook Web App. By default, all mail-enabled users in your Exchange organization can
access their mailboxes by using Outlook Web App. Depending on the needs of your organization, you
can use segmentation to configure the following restrictions for user access:
Control access to certain Outlook Web App features for specific users.
Advanced security options. Aside from the standard security measures that you must implement
such as configuring SSL on both the Outlook Web App and Exchange Control Panel virtual
directoriesalso consider configuring Outlook Web App to support secure MIME (S/MIME).
S/MIME lets users encrypt outgoing messages and attachments so that only intended recipients who
have a digital identifier (ID) can read them. With S/MIME, users can digitally sign a message, which
allows recipients to verify both the senders identity, and that no one has tampered with the message.
S/MIME requires users to sign in to Outlook Web App using either Internet Explorer 7 or Internet
Explorer 8. Users must have a digital ID, and must install the S/MIME control for Outlook Web App
before they can send encrypted and digitally-signed messages through Outlook Web App. They must
also have both a digital ID and the S/MIME control to read encrypted messages in Outlook Web App.
The S/MIME control is necessary for signature verification on a digitally signed message. Use the
SMIME tab in the Options menu to install the S/MIME control for Outlook Web App on a users
computer.
Outlook Web App virtual directory options. When deploying Outlook Web App and Exchange
Control Panel, consider the following virtual directory options:
Simplify the Outlook Web App URL. You can use the IIS Manager to simplify the Outlook Web
App URL that users use to access their mailboxes.
Configure the default website to redirect clients to the Outlook Web App virtual directory.
For example, when a user types https://servername/, IIS redirects them to
https://servername/owa.
Alternatively, redirect users that use the form http:/servername/ to use SSL, and connect to
the Outlook Web App virtual directory. For example, when a user types http://servername/,
IIS redirects them to https://servername/owa.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 4-41
Redirect requests. If you have multiple AD DS sites that have Internet-facing Client Access servers,
use redirection to route users to the Client Access server that gives them the best Outlook Web
App experience. If you have multiple Client Access servers in different AD DS sites in an
organization, but only one Internet-facing server, use Client Access server-to-Client Access server
proxying to direct users to the Client Access server that will give them the best Outlook Web App
experience.
Create new Outlook Web App virtual directories. For most organizations, the default Outlook
Web App virtual directory that Exchange Server creates during Client Access server role
installation is sufficient. Businesses that provide hosting services may choose to create new
Outlook Web App virtual directories.
4-42
Planning and Deploying Client Access Services in Microsoft Exchange Server 2010
Exchange Server 2010 supports mobile devices used as messaging clients. You can synchronize mailbox
content and perform most of the same tasks with mobile devices as you can with other messaging clients.
Note Exchange Server 2010 SP1 enables mobile device users to synchronize their text
messages with their Exchange Server mailbox. The Short Message Service (SMS) Sync
feature works with Windows Mobile 6.1 with the Outlook Mobile Update and with Windows
Mobile 6.5. When synchronizing text messages, users are able to send and receive text
messages from their Inbox; this feature is dependent on the user's mobile phones or devices
supporting this feature.
Consider the following factors when designing access to Exchange ActiveSync.
Verify that SSL is enabled for mobile device connections. To ensure that the communication between
the mobile device and the Client Access server is secure, ensure that you configure the MicrosoftServer-ActiveSync virtual directory to require SSL.
Install certificates on mobile devices. Just like desktop computers, mobile devices are configured to
trust the root certificates for most public CAs. If you use an SSL certificate from a trusted commercial
CA, you might not have to install the certificate on your device; most devices have certificates from
several trusted commercial CAs preinstalled in the devices root store. However, if you choose to use
an internal CA to provide certificates for your Client Access servers, you must configure the mobile
devices to trust the root CAs by installing the root certificates on the device.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 4-43
Implement Exchange ActiveSync policies. Exchange ActiveSync policies provide one option for
securing mobile devices. When you apply the policy to a user, the mobile device automatically
downloads the policy the next time the device connects to the Client Access server. To ensure that
mobile devices are as secure as possible, configure Exchange ActiveSync policies that require device
passwords, and encrypt the data stored on the mobile device.
Note All users are initially assigned to the default ActiveSync policy.
Configure your firewall to support Direct Push. Direct Push provides notification to the mobile phone
when new content is ready to be synchronized to the device. For Direct Push to work through your
firewall, you must open TCP port 443 between the Internet and the Client Access server. In addition to
opening ports on your firewall, for optimal Direct Push performance, increase the time-out value on
your firewall from the default to 15 to 30 minutes.
Note It is possible to disable Direct Push for users that are roaming.
Consider data plans when configuring client settings. Select an appropriate data plan for your mobile
devices that provides sufficient bandwidth for the desired services. Alternatively, tailor the services
that you provide to mobile device users based on the characteristics of their device data plan.
4-44
Planning and Deploying Client Access Services in Microsoft Exchange Server 2010
Previous email solutions often used POP3, and later IMAP4, for email retrieval. Various Microsoft products,
including Office Outlook Express and Windows Mail, still support these mail retrieval protocols.
Be sure to consider whether support for these protocols is relevant for your organization. Exchange server
does support many client types, and perhaps these other client types might be more relevant to your
users.
By default, Exchange Server 2010 supports POP3 and IMAP4 client connections, but you must start the
services manually. To enable user access for these protocols, start the services, and then configure them to
start automatically.
Configuration Options
You can configure the following settings for POP3 and IMAP4.
Option
Description
Bindings
Configures the local server addresses that will be used for unencrypted Transport
Layer Security (TLS) or SSL connections.
Authentication
Connection
settings
Configures server settings, such as time-out settings, connection limits, and the
command relay or proxy target port (used for connections to an Exchange Server
2003 back-end server).
Retrieval settings
Configures the message formats used for the protocols, and configures how clients
will retrieve calendar requests.
User access
Enables or disables access for the POP3 and IMAP4 protocols for each user account.
By default, all users are access-enabled.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 4-45
In addition to configuring the POP3 and IMAP4 services to automatically start, you must open the
required ports on your firewall. These ports are:
Enable TLS for SMTP client connections. Configure the SMTP Receive connector on the Hub Transport
server to either require TLS security, or to enable basic authentication, but only after you initiate a TLS
session. If your SMTP service has a trusted certificate, you should enable these options, and then
configure all clients to use TLS.
2.
Use the Client Receive connector (port 587), and configure the Hub Transport servers with two
Receive connectors. The default Receive connector uses port 25, while the Client Receive connector
uses port 587. By default, both connectors require TLS security, and allow users to connect to the
connector. However, by using the Client Receive connector, you can avoid using the default SMTP
port for client connections. As described in RFC 2476, port 587 was proposed only for message
submission use from email clients that require message relay.
3.
Ensure that anonymous relay is disabled. Both of the default Receive connectors block anonymous
relays. Do not modify this option on any Receive connector that is accessible from the Internet. If you
enable anonymous relay, anyone can use your server to relay spam.
4.
Enable POP3 and IMAP4 selectively. If only some users in your organization require POP3 and IMAP4
access, then disable this option on all other mailboxes.
4-46
Planning and Deploying Client Access Services in Microsoft Exchange Server 2010
Most organizations have firewalls that protect their internal networks from unwanted Internet access. You
can configure these firewalls to enable users to connect to the required virtual directories and services on
the Client Access server, and to provide access to an SMTP server for IMAP4 and POP3 clients.
Implementing a firewall solution means that you need to configure the messaging clients to use a server
name that resolves to an external IP address on the firewall. Users that are connected to the Exchange
servers from both inside and outside the organization can complicate the messaging client configuration.
For example, users may connect to the Exchange servers from the internal network using the actual server
name, but may need to use a more generic namesuch as mail.contoso.comwhen connecting to the
server from the Internet. You may need to instruct users to use the two server names, or you may need to
configure the internal DNS zone to provide name resolution to the more generic name.
Configuring firewalls to provide access to the Exchange servers is fairly easy, but does raise potential
security issues. Standard firewalls filter network traffic based on source and destination IP addresses and
ports, but cannot analyze the contents of network packets. A standard firewall may use reverse Network
Address Translation (NAT), but still forward the packets directly to the Client Access server. This means
that the traffic that the firewall forwards to the internal Exchange servers may contain malicious code that
it did not detect.
As an alternative to the standard firewall, you can use a reverse proxy or an application layer firewall to
enable access to the internal Exchange servers. Reverse proxies provide an additional layer of security for
network traffic, and protect the Client Access servers. They terminate all client connections, and scan all
network packets for malicious code. The reverse proxy then initiates a new connection to the Client Access
server, and forwards the traffic to the internal network.
To use a reverse proxy, you must configure messaging clients to use a server name that resolves to an
external IP address on the firewall.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 4-47
Reverse proxiessuch as Microsoft Internet Security and Acceleration (ISA) Server 2006 or Forefront
Threat Management Gatewayprovide the following benefits:
You can configure the firewall as the endpoint for the client SSL connection. The firewall decrypts the
client traffic, applies application-layer filtering, and then re-encrypts the traffic before sending it to
the Client Access server.
You can offload SSL decryption to the firewall. If you do not require all connections on your internal
network to be secure, you can configure the firewall to decrypt the SSL traffic, but not re-encrypt it
before sending the traffic to the Client Access server. This means that the Client Access server
resources are not used to perform SSL decryption and encryption.
You can use ISA Server or Forefront TMG forms-based authentication. If you use ISA Server 2006 or
Forefront TMG as the application layer firewall, you can configure the firewall to pre-authenticate all
client connections using forms-based authentication. This means that only authenticated connections
are allowed into the internal network.
Note If you use certificate-based authentication for Exchange ActiveSync, you must
configure a server-publishing rule that forwards the client traffic to the Exchange Server
computer without decrypting the packets on the ISA Server computer.
In addition to using ISA Server or Forefront TMG to configure forms-based authentication, you also can
use these tools to publish Outlook Web App servers by using mail-server publishing rules, and to control
email attachment availability to protect your organizations resources when users access them through
Outlook Web App. Configuring authentication on the reverse proxy ensures that network traffic enters
your internal network only after user authentication.
4-48
Planning and Deploying Client Access Services in Microsoft Exchange Server 2010
Lesson 4
Many organizations provide employees with the option to access their Exchange Server mailboxes with
mobile devices. However, this can raise security concerns, because mobile devices may contain a large
amount of confidential information, and they are easily lost or stolen. Therefore, it is essential to define
security policies for mobile device management.
After completing this lesson, you will be able to:
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 4-49
After analyzing your organizations business needs, modify the Outlook Web App virtual directory settings
to address most users requirements. These settings include:
Authentication
Segmentation
Once you have configured most users settings, consider modifying the properties of the default Outlook
Web App Mailbox policy. Outlook Web App mailbox policies enable you to configure the following
settings:
Segmentation
Finally, after modifying the default Outlook Web App Mailbox policy, create additional policies to address
the needs of specific users or groups of users. You can assign the policy through the Exchange
Management Console using the Exchange Management Shell. For example, if you wish to configure users
in the Executives organizational unit (OU) with the Executive Policy Outlook Web App Mailbox Policy, use
the following command:
Get-Mailbox -OrganizationalUnit Executives | Set-CASMailbox -owamailboxpolicy "Executive
Policy"
4-50
Planning and Deploying Client Access Services in Microsoft Exchange Server 2010
Configuring SSL for secure communication. By default, the Outlook Web App virtual directory
requires SSL for all connections. The default certificate installed on the Client Access server is a selfsigned certificate. Remove the default certificate and install a certificate from a trusted CA to ensure
that users can access the site without being prompted to accept the security certificate. When you
request the certificate from the CA, ensure that you use a FQDN for the certificate that matches the
FQDN that users will connect to when accessing Outlook Web App.
Configuring authentication. The Client Access server supports several types of authentication for
Outlook Web App. The most secure option is forms-based authentication, which uses a cookie-based
authentication system. This cookie is configured to time out after a specified period of client
inactivity, so that the user credentials do not remain valid on the client computer. The user can log
out of Outlook Web App at any point, which removes the cookie from the computer memory.
Configuring access to attachments. You can configure the types of attachments that users can
download with Outlook Web App. You also can block access to attachments based on file extension
or MIME type. If you allow users to download and view attachments, be aware that the attachments
will be stored on the local computer.
As an alternative to allowing users to download attachments, consider configuring WebReady
Document Viewing as a requirement. This feature converts attachments with supported file
extensions or MIME types to HTML, and displays them so that users can read them but not download
or edit them. If your organization requires a high level of security for message attachments, consider
implementing WebReady Document Viewing.
Note To prevent users from directly accessing files, in addition to enabling the Force
WebReady Document Viewing option, you also must clear the Enable direct file access
option.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 4-51
One of the most common ways users access their mailboxes is with mobile devices, such as cell phones
and personal digital assistants (PDAs). However, these mobile devices present a serious security risk.
Exchange Server 2010 provides several options for managing these devices.
4-52
Planning and Deploying Client Access Services in Microsoft Exchange Server 2010
Send a remote wipe command to the mobile device, which removes all data on the mobile device
and sets the device back to the factory default settings.
You also can manage other settings to ensure that the connections are secure from the mobile device to
the Client Access server. At a minimum, you should configure a server certificate from a trusted CA on the
Client Access server, and configure ActiveSync to require SSL for all connections. Additionally, you can
configure the virtual directory to require client certificates for authentication. When you enable this
option, only clients with approved certificates can connect to the Client Access server using Exchange
ActiveSync.
You can manage which device types can connect to the Client Access server. To support features such as
Exchange ActiveSync mailbox policies, the mobile client must be running Windows Mobile 5.0 with the
Messaging and Security Feature Pack, or a newer version of Windows Mobile. To ensure that the policies
apply to all mobile clients, you can prevent connections from all devices that do not meet this minimum
requirement.
You also can manage Exchange ActiveSync access for individual user accounts. By default, all users are
enabled for Exchange ActiveSync, but you can disable this setting on each user mailbox.
Note From Exchange Server 2010 SP1, you can manage Exchange ActiveSync devices
using the Exchange Control Panel (ECP).
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 4-53
Exchange ActiveSync policies are one of the most important ways to implement mobile device security in
Exchange Server 2010. You can configure password policies for mobile devices by configuring Exchange
ActiveSync policies.
Password complexity requirements, password length, password expiration, and the time-out value
before users must re-enter their password.
The number of times users can enter the wrong passwords before their devices are locked or wiped.
Storage of the devices recovery password on an Exchange server. If you select this option, you can
view the password from either Outlook Web App or the Exchange Management Console.
4-54
Planning and Deploying Client Access Services in Microsoft Exchange Server 2010
Consider configuring different policies for different users. For example, consider configuring a policy with
higher security settings for user groups that carry highly confidential information on their mobile devices,
or have access to highly confidential email. Create as many policies as required, and use the Exchange
Management Shell to assign the policies to multiple users simultaneously.
Also consider enabling remote file access through Exchange ActiveSync, rather than allowing users to
download attachments. Users with compatible mobile devices can view files from an internal file share
rather than downloading the files to their mobile devices.
In addition to setting Exchange ActiveSync policies, you also may need to define other policies regarding
the data that users can store on mobile devices. For example, you can block users from receiving email
attachments, but allow them to transfer data to the devices through a cradle or a USB connection. As part
of managing mobile devices, you should define corporate policies that determine the data that users can
store on their devices.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 4-55
Exchange Server 2010 provides the option to wipe a mobile device remotely if it appears to be a security
issue. For example, for lost or stolen devices, you may choose to wipe the device to ensure that
unauthorized users cannot access corporate data via the device. Both the Exchange administrator and the
device user can initiate the remote wipe.
Define a policy so that Exchange administrators can wipe devices remotely. This policy should identify
who can perform the remote wipe, and under what circumstances. For example, you may develop a
policy that allows Help Desk personnel to wipe a mobile device remotely, but only with the approval
of a Help Desk manager or an Exchange administrator. You also should develop a reporting
procedure for users with lost or stolen devices, so they know how to report missing devices.
Develop policies and procedures for rebuilding wiped devices or rebuilding new devices. It is easy to
wipe a mobile device, but more difficult to rebuild the device and restore lost data. To improve
efficiency, create procedures so that users can back up and restore their data and configuration
information. Also provide training to Help Desk personnel to support users during this process.
4-56
Planning and Deploying Client Access Services in Microsoft Exchange Server 2010
Develop policies for allowing users to wipe their own devices. Exchange Server 2010 also allows users
to wipe their own devices, or to remove the partnership between a device and their Exchange
mailbox. This option is available on the Outlook Web App Options page. Allowing users to wipe
their own devices can decrease the time required for administrators to manage mobile devices,
because users can remove associations with devices they no longer use. If your organization
implements a policy that prevents users from managing their own devices, remove this option in the
Outlook Web App segmentation settings.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 4-57
Lab Setup
For this lab, you will use the available virtual machine environment. Before you begin the lab, you must:
1.
On the host computer, click Start, point to Administrative Tools, and then click Hyper-V Manager.
2.
Ensure that the 10233B-VAN-DC1, 10233B-VAN-EX1, and 10233B-VAN-EX2 virtual machines are
running.
3.
Lab Scenario
You are a messaging engineer for the A. Datum Corporation, an enterprise-level organization with
multiple locations. A. Datum Corporation is an international corporation involved in technology research
and investment, and is planning to upgrade from Exchange Server 2003 to Exchange Server 2010.
You have been tasked with reviewing the current messaging infrastructure and network topology, and
planning the deployment and configuration of Client Access servers. You are required to make proposals
about how best to address the needs of the various stakeholders in the organization.
Finally, you are required to implement part of your proposed Client Access design.
Note Your instructor may choose to perform parts of this lab as a group discussion, rather
than an individual activity.
4-58
Planning and Deploying Client Access Services in Microsoft Exchange Server 2010
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 4-59
I have some concerns with increasing the mailbox size to this limit. The back-up system in all of our offices
does not have as much capacity as we would like. In some offices, we are still backing up to tape. Some of
the tape backup systems can restore at only 50 GB per hour. According to the service level agreement
that we have in place, we are supposed to restore any failed database within an hour of failure.
4-60
Planning and Deploying Client Access Services in Microsoft Exchange Server 2010
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 4-61
4-62
Planning and Deploying Client Access Services in Microsoft Exchange Server 2010
Adatum_CurrentPerimeterDesign.vsd
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 4-63
Adatum_CurrentADSiteDesign.vsd
4-64
Planning and Deploying Client Access Services in Microsoft Exchange Server 2010
Policy Requirements.doc
As part of the Exchange Server 2010 design process, the analysts assigned to the project have identified
the following policy requirements.
The available network bandwidth between company locations is limited. The largest message sent by
most users in the organization is 5 MB.
The graphics department regularly sent messages with 10 MB attachments. The graphics personnel
are located in London, Vancouver, and Tokyo. These messages must be delivered within the
organization.
The current limit for sending and receiving email to the Internet is 2 MB. Many users in the
organization have concerns about this limit, and would like to at least double this limit. With the
changes made to the delivery of messages to and from the Internet, the organization has agreed to
meet this expectation.
As a general rule, the design should allow for 20 percent buffer when designing message size policies.
All users must have a maximum mailbox size of 250 MB. Executives and managers must have a
maximum mailbox size of 500 MB. Each user will also have an archive mailbox that is twice the size of
the mailbox.
All users should receive a warning when their mailbox reaches 80 percent of the maximum mailbox
size, and should be prevented from sending email when their mailbox reaches 90 percent of the
maximum size.
Users should be able to recover items in their mailboxes for 7 days after the message has been
deleted from the deleted items folders. Executives should be able to recover these types of messages
for 21 days.
All users in the entire organization should be able to book meetings using any resource mailboxes,
such as meeting rooms and equipment mailboxes. When users book a meeting, they should get an
email back saying that the meeting has been accepted. No duplicate meetings should be accepted by
a meeting room. The only exceptions to this policy are two meeting rooms in London that are used
for video conferences. Any member of the Sales team in the entire organization should be able to
book the meeting room, but the meeting requests much be accepted by a member of the Sales
Support team in London.
All executives and many managers would like to use mobile devices to access the Exchange
mailboxes. Up to this point, users have not been able to access their email using mobile devices.
There is a very strong demand to make this feature available. Many executives see this as the primary
benefit of implementing the new email system.
As access to email from mobile devices becomes available, the business departments are expecting
many users will want to have the same level of access. Providing this access is a high priority for most
business departments.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 4-65
The security officer is concerned about making mobile device access available for all users. He has
specified the following security requirements:
All users who will be accessing email on the Exchange server must be required to have an
alphanumeric password that is at least 6 characters long.
Users who want to download attachments to the device must have encryption enabled on the
device, and the device must be configured to lock after five failed logon attempts.
All executives and managers must be able to download attachments to their mobile devices.
Other users do not require this functionality.
The Exchange administrators do not want to be involved every time a user gets a new mobile
device, but they also do not want users to have many mobile devices associated with their
mailbox.
Compliance Requirements
The corporation reviews its sales and marketing approach every six months. All members of the Sales
and Marketing teams are involved in the reviews. During the review process, a significant amount of
email is sent between team members. Retaining this email for historical data is important, but these
emails should not be retained in user mailboxes for more than nine months. When the messages are
removed from the user mailboxes, they should easily be accessible to all members of the Sales and
Marketing teams, but should not be accessible to other users in the organization.
All messages sent to and from the Legal team must be retained in a secure location.
In order to decrease the size of user mailboxes, all messages in user mailboxes that are more than 12
months old should be deleted and placed in the deleted items folder. All messages more than six
months old in the Deleted Items folder and Sent Items folder should be deleted. This policy should
apply to all users.
Members of the Executive group should have the option of saving messages in their mailbox
indefinitely.
4-66
Planning and Deploying Client Access Services in Microsoft Exchange Server 2010
Internal users
Mobile users
London
Corporate
Headquarters
12,000 currently
10,000 after the new
London office is ready
London (new
office)
4,000 (anticipated)
San Diego
Former head
office of
Trey Research
500
Vancouver
6,000
Tokyo
5,000
Chennai (new
office)
800 (anticipated)
A. Datum has deployed a single AD DS forest with a dedicated root domain named Adatum.com, and
three child domains in the same tree. These domains are:
EU.Adatum.com
NA.Adatum.com
AS.Adatum.com
Additionally, the organization has deployed a domain named TreyResearch.net in the San Diego location.
This domain is configured as a separate tree in the Adatum.com forest.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 4-67
2.
3.
Adatum_CurrentPerimeterDesign.vsd
Adatum_CurrentADSiteDesign.vsd
Question: In the Requirements Interview Notes document, what points are raised that impact
your Client Access server deployment plan, and why do they impact the plan?
Question: In the AD DS and Routing Interview Notes document, what points are raised that
impact your Client Access server deployment plan, and why do they impact the plan?
4-68
Planning and Deploying Client Access Services in Microsoft Exchange Server 2010
Task 3: Update the A. Datum Client Access server deployment plan document
Jason Carlson
4th April 2010
Requirement Overview
Determine the number and placement of Client Access servers within the existing network
infrastructure.
Additional Information
Identify infrastructure changes that may be required due to the proposed deployment.
Proposals
Question: With reference to the Adatum_CurrentADSiteDesign diagram, how many Client Access
servers do you propose to deploy in each site?
Question: Do you have sufficient information from the documents reviewed so far, to determine
whether some sites require additional Client Access servers?
Question: Based on the documentation you have reviewed, what client types must you support?
Question: Is it clear from the documentation that you have reviewed which sites support which
client types?
Question: While maintaining compliance with the requirements mentioned in the documentation,
can you propose changes to the client types that will simplify the configuration?
Question: Which Client Access servers do you propose to make Internet-facing?
Question: How will you configure Autodiscover to support your Client Access server model?
Note
Results: After this exercise, you should have completed the A. Datum Client Access server deployment
plan document.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 4-69
2.
3.
Policy Requirements.doc
Question: In the A. Datum User Distribution Summary document, what points are raised that
impact your Client Access server deployment plan and why?
Jason Carlson
4th April 2010
Requirement Overview
Determine the feature configuration for Client Access servers in the A. Datum Exchange Server 2010
upgrade.
Proposals
Question: Based on the information in the A. Datum User Distribution Summary document, do you
envisage deploying additional Client Access servers in any sites?
Question: Which features must you enable on the Client Access servers to support the current
client-types?
Question: Which client protocols must you enable through the firewalls?
4-70
Planning and Deploying Client Access Services in Microsoft Exchange Server 2010
Note
Results: After this exercise, you should have completed the A. Datum Client Access server configuration
document.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 4-71
2.
3.
In the Exchange Management Console, review the configuration for the Microsoft-Server-ActiveSync
virtual directory. The virtual directory configuration can be viewed for each Client Access server in the
Client Access node.
On VAN-EX2, in the Exchange Management Console, create a new Exchange ActiveSync Mailbox
policy with the following configuration:
Require passwords
Note
You must create and then modify the policy to configure the following two settings.
2.
3.
Apply the Exchange ActiveSync Mailbox policy to users in the Executives OU. Open Exchange
Management Shell, and then execute the following command:
Get-Mailbox -OrganizationalUnit Executives | Set-CASMailbox
-activesyncmailboxpolicy "Executive Policy"
2.
4-72
Planning and Deploying Client Access Services in Microsoft Exchange Server 2010
3.
From Phone & Voice, from within the ActiveSync Device Policy, review the Executive Policy.
Notice that text messages can be synchronized by default.
4.
All families
You will not be able to save the settings as there are no devices currently in use within the
Adatum organization. Cancel the policy creation and close all open windows.
Results: After this exercise, you should have deployed and configured Exchange ActiveSync for members
of the Executives group.
2.
Right-click 10233B-VAN-DC1 in the Virtual Machines list, and then click Revert.
3.
4.
Repeat these steps for 10233B-VAN-EX1, 10233B-VAN-EX2. Close the virtual machine connection
windows.
5.
In the Virtual Machines pane, click 10233B-VAN-DC1, and then in the Actions pane, click Start.
6.
To connect to the virtual machine for the next modules lab, click 10233B-VAN-DC1, and then in the
Actions pane, click Connect.
Important Start the 10233B-VAN-DC1 virtual machine first, and ensure that it is fully
started before starting the other virtual machines.
7.
Wait for 10233B-VAN-DC1 to start, and then start 10223A-VAN-EX1. Connect to the virtual
machine.
8.
Wait for 10233B-VAN-EX1 to start, and then start 10223A-VAN-EX2. Connect to the virtual machine.
9.
Wait for 10233B-VAN-EX2 to start, and then start 10223A-VAN-EDG. Connect to the virtual
machine.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 4-73
Review Questions
1.
When a user attempts to connect to an Internet-facing client access server, the petitioned server
determines that the users mailbox is located in another site. The Client Access server in the other site
is not configured with an external URL. What happens next?
2.
You have deployed a single Internet-facing Client Access server to support all sites in your
organization. Which authentication method must you configure on all other Client Access servers?
3.
Your users seem to be experiencing problems when trying to access their mailboxes using Outlook
Web App. You realize they are typing the incorrect URL, and are forgetting the https prefix. What can
you do to assist?
Best Practices
Supplement or modify the following best practices for your own work situations:
As a general guideline, deploy three Client Access server processor cores in an AD DS site for every
four Mailbox server processor cores.
4-74
Planning and Deploying Client Access Services in Microsoft Exchange Server 2010
Do not run the Security Configuration Wizard on servers that support Exchange Server 2010 server
roles.
If your organization has deployed Exchange servers in multiple AD DS sites, consider configuring site
affinity for the Autodiscover service.
If you have multiple Client Access serverseach in a different site and with different namesbe sure
to obtain a certificate that can support multiple names.
5-1
Module 5
Planning and Deploying Message Transport in Microsoft
Exchange Server 2010
Contents
Lesson 1: Designing Message Routing for Exchange Server 2010
5-3
5-13
5-29
5-44
5-2 Planning and Deploying Message Transport in Microsoft Exchange Server 2010
Module Overview
After you have defined the business requirements of your organization and have a good understanding of
the current network environment, the next step is to design message routingboth within the
organization, and between your organization and other organizations that are connected to the Internet.
Objectives
After completing this module, you will be able to:
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 5-3
Lesson 1
One of the Exchange Server 2010 infrastructures most important design components is the message
routing topology for messages sent within the organization, and those sent to and from the Internet. In
Exchange Server 2010, the routing topology integrates tightly with the Active Directory Domain Services
(AD DS) site configuration.
Objectives
After completing this lesson, you will be able to:
Explain how to design message routing to mitigate the effects of message routing failure.
5-4 Planning and Deploying Message Transport in Microsoft Exchange Server 2010
The message transport pipeline in Exchange Server 2010 consists of several components that work
together to route messages. Messages from outside the organization enter this pipeline through a Simple
Mail Transfer Protocol (SMTP) Receive connector on an Edge Transport server, a Hub Transport server, or
another non-Exchange SMTP server. Messages inside the organization enter the transport pipeline
through the SMTP connector on a Hub Transport server, through agent submission, from the Pickup or
Replay directory, or by direct placement by the store driver in the Submission queue.
Submission Queue
When the Microsoft Exchange Transport service starts, the categorizer creates one Submission queue on
each Edge Transport server and Hub Transport server. The Submission queue stores all messages on a disk
until the categorizer processes them for further delivery. No message can be categorized without being
submitted to the Submission queue. While the categorizer processes a message, it remains in the
Submission queue. After the categorizer categorizes a message successfully, it removes it from the
Submission queue.
Messages can enter the Submission queue in several ways:
Messages received by an SMTP Receive connector. Use this for messages inbound from the Internet
or from a client using Post Office Protocol version 3 (POP3) or Internet Message Access Protocol
(IMAP).
Messages placed in the Pickup directory. Use this method for troubleshooting and for legacy
applications.
Messages submitted by the store driver. Use this method to retrieve messages from a senders
Outbox.
Messages resubmitted after failed delivery. The categorizer resubmits messages that were not
delivered on the first attempt. You also can resubmit messages manually.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 5-5
Store Driver
Messages sent by mailbox users enter the message-transport pipeline from the senders Outbox. The store
driver on the Hub Transport server retrieves messages from the senders Outbox, and submits them to a
Submission queue.
The store driver can place messages into the Submission queue on any Hub Transport server that is on the
same AD DS site as the Mailbox server from which it retrieves the message. After the store driver adds the
message successfully to the Submission queue, it moves the message from the senders Outbox to the
senders Sent Items folder.
Messages in the Outbox are stored in MAPI format, and the store driver must convert them to Summary
Transport Neutral Encoding Format (STNEF) before placing them in the Submission queue. If the store
driver is unable to convert the content, it generates a non-delivery report (NDR).
Categorizer
The categorizer retrieves one message at a time from the Submission queue, and always picks the oldest
message first. On an Edge Transport server, categorization of an inbound message is a short process in
which the categorizer verifies the recipient SMTP address, and places the message directly into the
delivery queue. From the delivery queue, it routes the message to a Hub Transport server.
On a Hub Transport server, the categorizer performs the following tasks:
Identifies and verifies recipients. All messages must have a valid SMTP address.
Bifurcates messages that have multiple recipients. The expansion of distribution lists enables
identification of individual recipients who belong to the distribution list. Additionally, the categorizer
processes the return path for distribution-list delivery status notifications (DSNs), and it determines
whether Out-of-Office messages or automatically generated replies are sent to the original messages
sender.
Determines routing paths. As part of determining the routing path, the categorizer identifies the
destination. The destination must be a users mailbox, a public folder, or an expansion server for
distribution groups. If it cannot determine a valid destination, an NDR is generated.
Converts content format. Various recipients require messages in different formats. The categorizer
converts the message to an appropriate format for the recipient. Inside the Exchange Server
organization, the recipient format is stored in AD DS. Messages routed to the Internet are sent in the
Multipurpose Internet Mail Extensions (MIME) or Secure/Multipurpose Internet Mail Extensions
(S/MIME) format.
Applies organizational message policies. You can use organizational policies to control messaging
aspects such as size, permission to send messages to specific users, the number of message recipients,
and other characteristics.
5-6 Planning and Deploying Message Transport in Microsoft Exchange Server 2010
Pickup Directory
Most messages enter the message transport pipeline through SMTP Receive connectors, or by submission
through the store driver. However, messages also can enter the message transport pipeline by being
placed in the Pickup directory on either a Hub Transport server or an Edge Transport server.
The store driver submits messages that the categorizer places in the Pickup directory to the Submission
queue. The store driver deletes messages from the Pickup directory after it submits them to the
categorizer from the Submission queue. Messages that the categorizer places in the Pickup directory must
be in the appropriate format and have read/write permissions configured.
The Pickup directory allows you to take a properly formatted text file, and have the Hub Transport server
process and deliver it. This can be useful for validating mail flow in an organization, replaying specific
messages, or returning recovered email to the message transport pipeline. Additionally, some legacy
applications may place messages in the Pickup directory for delivery, rather than communicate directly
with Exchange Server SMTP Receive connectors.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 5-7
Many organizations create AD DS sites to control AD DS replication and client authentication network
traffic. Exchange Server 2010 uses AD DS sites and AD DS site links to define an organizations internal
and external message routing.
The Mailbox server uses AD DS site membership information to determine which Hub Transport
servers are in the same AD DS site as the Mailbox server. The Mailbox server submits the message to
the Hub Transport server. If more than one Hub Transport server exists in the site, the Mailbox server
uses the Hub Transport servers by using the round-robin algorithm.
2.
The Hub Transport server performs recipient resolution, and queries AD DS to match the recipient
email address to a recipient account. The recipient account information includes the fully qualified
domain name (FQDN) of the users Mailbox server. The FQDN determines the AD DS site of the users
Mailbox server.
3.
The Hub Transport server uses AD DS site link information to determine the lowest cost route to the
destination AD DS site. In a default configuration, the Hub Transport server opens an SMTP
connection to the Hub Transport server in the destination site, and delivers the message.
4.
After a Hub Transport server in the destination AD DS site receives a message, the Hub Transport
server forwards the message to the appropriate Mailbox server in the destination AD DS site.
5-8 Planning and Deploying Message Transport in Microsoft Exchange Server 2010
5.
If the message has multiple recipients whose mailboxes are in different AD DS sites, Exchange Server
uses delayed fan-out (or bifurcation) to optimize message delivery. If the recipients share part of, or
the entire path, Exchange Server sends a single copy of the message with these recipients until the
bifurcation point. When the mail reaches the bifurcation point, the message is bifurcated and a
separate copy is sent to each recipient. For example, if the least-cost route from Site 1 to Site 3 and
Site 4 both pass through Site 2, then a single copy of a message intended for recipients in Site 3 and
Site 4 is sent to a Hub Transport server in Site 2. The Hub Transport server in Site 2 then sends two
copies of the message, one each to a Hub Transport server in Site 3 and Site 4.
Note If you deploy Exchange Server 2010 in an existing legacy Exchange Server
environment, the organizations message routing will vary if the messages are routed to, or
from, previous Exchange Server versions. For example, in Exchange Server 2003, you can use
routing groups to group Exchange Servers into location contexts. These routing groups
may, or may not, match up with the AD DS site configuration. All Exchange Server 2010
servers are grouped into a single routing group for backwards compatibility with Exchange
Server 2003.
The path with the lowest cost from source to destination site. The lowest-cost route is calculated by
aggregating all AD DS IP site link costs, or the Exchange Server cost assigned to the site links between
the source and destination sites.
The path with the least number of segments. If the aggregated costs for the site links are the same for
more multiple paths, then Exchange Server chooses the path with the fewest site links between the
source and destination sites.
Note Exchange Servers do not use the underlying network topology to make message
routing decisions. A single site link may actually cross multiple network segments, but the
Exchange Server evaluates only the site link. Therefore, it is important that the site links
logically reflect the underlying network topology.
Alphanumerically lower preceding AD DS site name. If the previous criteria do not result in a single
path, the Exchange Server selects the route that passes through the intervening site with the lowest
alphanumeric name. The Exchange Server uses the site closest to the destination site to make the
selection. If the paths pass through the same site before reaching the destination site, the Exchange
Server backs along the routing path until a unique site name is available.
Note Each Exchange transport server calculates a set of routing tables that determine how
to route messages to recipients. Whenever the Exchange server calculates the routing table,
it logs the result. By default, these logs are located in the %Program
Files%\Microsoft\Exchange Server\V14\Transport\Logs\Routing folder. The Exchange
Transport server recalculates the routing tables when the transport services begin, or when
changes to the routing topology are made.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 5-9
In some cases, you may want modify the default message routing configuration by configuring specific
AD DS sites as hub sites, and by assigning Exchange-specific routing costs to AD DS site links.
Configure hub sites. You can configure one or more AD DS sites in your organization as hub sites.
When a hub site exists along the least-cost routing path between two Hub Transport servers, the
messages are routed to and processed in a Hub Transport server in the hub site before they are
relayed to the destination server.
Configure Exchange Server-specific routing costs. You also can modify the default message routing
topology by configuring an Exchange Server-specific cost to an AD DS IP site link. If you assign an
Exchange Server-specific cost to the site link, the Hub Transport server uses this attribute rather than
the AD DS-assigned cost to determine the least-cost routing path.
Configure expansion servers for distribution groups. You also can modify the default routing
topology by assigning expansion servers for distribution groups. By default, when a message is sent to
a distribution group, the first Hub Transport server that receives the message expands the distribution
list and calculates how to route the messages to each recipient. If you configure an expansion server
for the distribution list, all messages sent to the distribution list are sent to the specified Hub
Transport server, which expands the list and then distributes the messages.
5-10
Use hub sites when the network topology does not support direct connections between Hub
Transport servers in different sites. For example, use hub sites when firewalls that exist between AD DS
sites prevent direct SMTP communications.
Note Configuring hub sites does not decrease the network traffic, as Exchange Server
2010 uses delayed fan out, regardless of whether you configure hub sites or not.
Consider configuring an Exchange Server-specific cost to an IP site link if the cost does not result in
an optimal Exchange Server message routing topology, and if you cannot modify the AD DS
parameter.
Consider site link costs when configuring hub sites. Hub sites are used only if the hub site is along the
least-cost routing path between two Hub Transport servers. The Hub Transport server first calculates
the least-cost route between two sites, then checks to see if that route has any hub sites.
Consider using expansion servers for very large distribution lists. Expanding large distribution groups
is a resource-intensive process for the Hub Transport server and a global catalog server. If your
organization has a central location with more powerful Hub Transport servers or more global catalog
server capacity, you may want to configure one of the Hub Transport servers in the site as the
expansion server for large distribution lists. Ensure that this server is highly available, because it is not
possible to assign more than one expansion server to a distribution list.
Note If you nest groupsthat is, some of your groups contain groups as members
consider configuring the second-tier groups with expansion servers. This is especially
relevant if these groups are representative of users distributed regionally. For example, if A.
Datum Corporation had a worldwide sales team, a regional sales team for each continent,
and a sales team in each country within each continent, you might consider configuring the
top-level World-Wide Sales group with no expansion server. However, it might prove
efficient to configure the Americas-Sales, Asia-Sales, and Europe-Sales groups with
expansion servers in the relevant region. For example, Europe-Sales might be configured
with an expansion server in Paris, France. You might decide to continue this approach with
the next group level. For example, the London-Sales group has an expansion server that is
located in Canary Wharf, the head offices for A. Datum Corporation in London.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 5-11
When designing the message routing topology, you also should consider how Exchange Server 2010 deals
with situations where message routing between sites fails.
5-12
For each of your organizations possible routing paths, consider where you will queue messages that
cannot be delivered to a destination hub site.
Deploy multiple Hub Transport servers in the AD DS sites where messages will be queued for multiple
destination sites. For example, if your organization uses a hub and spoke topology for the AD DS site
links, messages are queued in the hub AD DS site. Ensure that you have multiple Hub Transport
servers in the site to ensure availability and performance scalability.
To reduce the chance of message-routing failure, deploy multiple Hub Transport servers in each AD
DS site. If one of the Hub Transport servers is not available in a site, the source Hub Transport server
attempts to connect to the sites other Hub Transport servers before queuing to the failure point.
Note Deploying multiple Hub Transport servers in a site also provides load balancing. If
there are multiple Hub Transport servers available in the destination site, message delivery
is distributed across all available servers. For example, when more than one Hub Transport
server exists in a remote AD DS site, round-robin load balancing determines the routing
path. Fault tolerance is achieved by connecting to the next available server in a prioritized
list of servers when the selected server is unavailable.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 5-13
Lesson 2
Hub Transport servers provide the message-routing backbone in any Exchange Server organization.
Therefore, it is important for you to plan the configuration and placement of your Hub Transport servers
with care, as a poor routing design may lead to degraded performance.
Objectives
After completing this lesson, you will be able to:
5-14
Optimizing a messaging system is a question of optimizing all the elements within the system. In
Exchange Server 2010, by ensuring that your Hub Transport servers meet the recommended hardware
requirements, you can ensure an optimal routing infrastructure.
Note The hardware requirements of an Edge Transport server do not differ greatly from
that of a Hub Transport server.
Processor Requirements
Exchange Server 2010 is a 64-bit application, and must therefore run on a 64-bit processor. You can select
processors from Intel that support Intel Extended Memory 64 Technology, or processors from AMD that
support AMD64.
Note For more information about these processor options, see the Intel 64 Architecture
website at http://www.intel.com/technology/intel64/, or the AMD Opteron Processor
Family website at http://www.amd.com/us/products/server/processors/Pages
/server-processors.aspx.
After you have selected a 64-bit processor-based server computer, you should configure your Hub
Transport server role with an appropriate number of processor cores. You will need more cores for
organizations where you deploy Hub Transport servers with several Mailbox servers and thousands of
mailboxes.
You can efficiently use eight processor core Hub Transport servers when you also configure the Hub
Transport to use antivirus and anti-spam. Consider either one or two core processors configurations if
your organization does not support many mailboxes, or you have insufficient message traffic to warrant
using more processor cores. A maximum of 12 processor cores is recommended.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 5-15
Note Processor utilization is based on several factors, such as message rate, average
message size, number of enabled transport agents, antivirus configuration, and third-party
applications.
Memory Requirements
When planning memory for your Hub Transport server, consider:
Memory speed. To support greater amounts of installed memory, some servers require slower
memory. For example, using PC3200 memory may enable you to scale your server to only 16
gigabytes (GB) of memory, while using PC2700 memory enables support for 32 GB of memory.
Module size. Ensure that the maximum memory module size enables you to meet your target
memory.
Number of memory slots. Linked to the module size, the number of slots determines the maximum
installable memory.
Total memory. The Hub Transport server role does not require substantial quantities of memory to
perform well in typical conditions. Generally, 1 gigabyte (GB) of random access memory (RAM) per
processor core, with a minimum of 4 GB per server, is sufficient to handle all but the most demanding
loads.
Disk Configuration
The performance of disk resources is also important in the Hub Transport server role as it processes email
from memory into the queue database. For optimal performance, consider placing the mail queue
database on a different disk spindle than that which hosts the related transaction logs. Additionally, you
must ensure that sufficient free-space is available to avoid back pressurea system resource monitoring
feature of the Microsoft Exchange Server 2010 transport service.
Network Configuration
Much of the network interface subsystem is tuned automatically. Server-based network adapters are
capable of detecting the type and level of traffic passing through the network interface, and they selftune to reflect this information. You should have operational practices in place to ensure that the latest
device drivers are maintained on the server for installed network interface cards (NICs).
Server Ratios
You should plan to deploy seven mailbox servers to each Hub Transport server, if the Hub Transport
server does not provide antivirus scanning. If your Hub Transport servers perform antivirus scanning, then
the Mailbox server to Hub Transport server ratio should be 5:1.
5-16
The fundamental building block of Exchange Server 2010s transport architecture is the Hub Transport
server. This role is responsible for all internal message routing, relaying of messages to and from the
perimeter network, and optionally, routing of messages to and from the Internet, depending upon
configuration. To design an optimal routing infrastructure, you might need to consider reconfiguring your
Hub Transport servers. It is therefore important to understand the default configuration.
Accepted Domains
Accepted domains configured at the organization level define the SMTP namespaces for which your
organization receives email. By default, your Exchange Server organization accepts email for the AD DS
forest root domain.
Remote Domains
Remote Domains enable you to configure message settings between your organization and other external
organizations. For example, you can configure out-of-office messages, and message format settings. By
default, the remote domain * is configured. This wildcard setting affects all messages sent to all other
domains.
Receive Connectors
Receive connectors handle inbound emailthat is, inbound to a specific Hub Transport server. Each Hub
Transport server hosts two SMTP receive connectors:
The Default <server name> connector is configured to accept inbound connections from any IP
address over all locally configured IP addresses using Transmission Control Protocol (TCP) port 25.
This connector is used to support connections from other Hub Transport servers. By default, the
following authentication mechanisms are enabled: Transport Layer Security (TLS) Basic authentication
(offer Basic authentication only after starting TLS), Exchange Server authentication, and Integrated
Windows authentication. Exchange Server users, Exchange servers, and legacy Exchange servers are
permitted to use the connector by default.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 5-17
The Client <server name> connector is provided to support inbound connections from SMTP clients.
It supports inbound connections on all connected NICs, and from any IP address over TCP port 587.
By default, the following authentication mechanisms are enabled: TLS, Basic authentication (offer
Basic authentication only after starting TLS), and Integrated Windows authentication. Only Exchange
Server users are permitted to use the connector by default.
There are no default Send connectors configured on each Hub Transport server.
Transport Agents
Transport agents process email messages that pass through the transport pipeline on a Hub Transport
server or Edge Transport server. Custom transport agents provide additional functionality to Exchange
Server 2010, such as anti-spam or antivirus programs, or any transport function that your organization
may require.
Exchange Server 2010 includes several default transport agents that enable it to provide features such as
transport rules and journaling. By default, the following transport agents are installed on Hub Transport
servers.
Transport Rule agent. The Transport Rule agent processes transport rules on Hub Transport servers. It
fires on the OnRoutedMessage transport event. Transport rules configured on Hub Transport servers
are stored in AD DS, making them accessible to all Hub Transport servers in the Exchange
organization. This allows Exchange Server to apply consistently a single set of rules across the entire
organization.
Journaling agent. The Journaling agent is a compliance-focused transport agent that processes
messages on Hub Transport servers. It fires on the OnSubmittedMessage and OnRoutedMessage
transport events. When you enable standard journaling on a Mailbox database, this information is
saved in AD DS, and is read by the Journaling agent.
Active Directory Rights Management Services Prelicensing agent. You can use the Active Directory
Rights Management Services (AD RMS) Prelicensing agent to certify the Microsoft Office Outlook
recipient's authenticity, so that the recipient can open messages without receiving a credential
prompt on every attempt. It fires on the OnRoutedMessage transport event.
Note Transport agents have full access to all messages that they process; Exchange puts
no restrictions on a transport agent's behavior. Consequently, transport agents that are
unstable or contain security flaws may affect the stability and security of Exchange Server
2010.
5-18
An SMTP connector is an Exchange Server component that supports one-way SMTP connections, which
route mail between Hub Transport and Edge Transport servers, or between the transport servers and the
Internet. Exchange Server 2010 provides two types of SMTP connectors: SMTP Receive connectors, and
SMTP Send connectors.
Note Exchange Server 2010 automatically creates the Send and Receive connectors that
are required by intra-organization mail flow. These are implicit connectors that are not
visible in the Exchange Server management tools, and you cannot modify them.
An SMTP Receive connector is required for an Exchange Server 2010 computer to accept any SMTP email.
An SMTP Receive connector enables an Exchange Hub Transport or Edge Transport server to receive mail
from any other SMTP sources, including: SMTP mail programs such as Office Outlook Express, and SMTP
servers on the Internet, Edge Transport servers, or other Exchange Server SMTP servers.
Two default SMTP Receive connectors are created on each server running the Hub Transport server role.
An Exchange Server 2010 computer requires an SMTP Send connector to send any SMTP email.
Additionally, SMTP Send connectors are required to send email to any SMTP server on the Internet, or to
any SMTP servers in the same Exchange Server organization.
Note By default, no SMTP Send connectors are configured on Hub Transport servers,
except for the implicit SMTP Send connectors that are created dynamically to communicate
with Hub Transport servers in other sites.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 5-19
Configure an Edge Subscription. Perhaps the easiest option is to deploy an Edge Server in your
perimeter network, and then create an Edge subscription between your internal Exchange
organization and the Edge Server in the perimeter network. This option results in the automatic
creation of the required Send and Receive connectorsbetween the organization and the perimeter,
and at the perimeter, to and from the Internet.
Configure Internet connectivity to and from the Hub Transport servers. If you do not deploy an Edge
Transport server, you must configure the Hub Transport server to enable inbound and outbound mail
flow. To enable inbound mail flow, you must configure an SMTP Receive connector to accept
anonymous connections on port 25 using a network interface that is accessible from the Internet. To
enable outbound email flow, you must configure an SMTP Send connector with an address space of
*that uses Domain Name System (DNS) to send messages to the Internet.
Note If you use the Hub Transport server to send and receive email from the Internet, you
should configure antivirus and anti-spam agents on the Hub Transport server.
Configure external SMTP relay. Smaller organizations often configure an SMTP relay agent, perhaps
hosted by an Internet Service Provider (ISP), to handle their Internet mail flow. To support this
configuration, you must configure your Hub Transport server. To enable inbound mail flow, you must
configure an SMTP Receive connector to accept anonymous connections on port 25 using a network
interface that is accessible from the Internet. To enable outbound email flow, you must configure an
SMTP Send connector with an address space of *that can use a smart host to send messages to the
Internet. You must ensure that the authentication configuration of this connector matches the details
provided by your ISP.
Configure internal SMTP relay. If your Exchange organization is responsible for handling email for
another AD DS forest, you will need to configure internal SMTP relaying. This option is discussed in
more detail in the following topic.
Configure mail flow through Exchange Online or a third-party gateway. To establish Internet mail
flow through Exchange Online (or an external SMTP gateway), you must create a Send connector and
a Receive connector between the Hub Transport servers in your Exchange Server organization and the
external SMTP servers that process and route Internet email. The precise details of the configuration
of these connectors vary.
Note You can configure multiple SMTP Receive connectors with different parameters on a
single Exchange server. However, you must configure each SMTP Receive connector with
the following: a port on which the connector can receive connections; local IP addresses
that can be used for incoming connections; and a remote IP subnet that can send mail to
this SMTP Receive connector. The combination of these three properties must be unique
across every SMTP Receive connector in the organization. In large organizations, there can
be multiple SMTP Receive connectors on a single server, or on multiple servers. In small to
medium-sized organizations, as few as two connectors (a Send and a Receive connector)
could serve the entire organization.
5-20
SMTP failover and load balancing improvements. Exchange Server 2010 SP1 improves the way
Transport servers detect unhealthy servers and use enhanced DNS.
When all servers are healthy, enhanced DNS helps to distribute the load evenly, but when one or
more servers have become unavailable, the load distribution among the remaining healthy servers
may not be evenly balanced.
To help to address this, all Exchange Server 2010 SP1 Transport servers maintain a list of unavailable
servers. When routing a message, servers use this list to filter out the unavailable servers from the set
of target servers. Consequently, Exchange Server 2010 SP1 Transport servers always distribute the
load evenly between healthy servers and avoid any servers that are unavailable for any reason.
Send connectors over reliable connections improvements. Exchange Server 2010 SP1 provides the
ability to downgrade connection failures in Send connectors.
Within your Exchange organization, you may implement dedicated Send connectors that are used for
routing messages over well-defined, reliable communication channels, for example, a send connector
dedicated to sending messages to Exchange Online.
Because these communication channels are expected to be reliable, you might not expect to see so
many of the typical errors that occur on ordinary destinations over the Internet; consequently, you
might want to treat any such communication errors as transient instead of immediately resulting in
the generation of a non-delivery report (NDR).
With Exchange Server 2010 SP1, you can configure a send connector to downgrade authentication
and name resolution errors that normally result in an NDR, to transient errors. In these instances,
Exchange Server attempts delivery again, instead of immediately issuing an NDR.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 5-21
Internal SMTP relay occurs when you configure your Exchange Server organization to route email that is
addressed to recipients that do not exist within your AD DS forest, to another SMTP host. A possible
scenario might arise if your organization has two AD DS forestsperhaps following a merger or
acquisition. Each forest has its own Exchange Server organization, and you decide to configure one
organization to handle all inbound message routing for both organizations.
To demonstrate this point, consider two AD DS forests: A. Datum, and Contoso. A. Datum Corporation
recently acquired Contoso, Ltd. Both organizations have implemented Exchange Server 2010 in their AD
DS forests; however, following the acquisition, it is decided that the Exchange Server organization A.
Datum will route all inbound email for both organizations. To facilitate this, you must complete the
following steps:
1.
Configure external DNS records for both organizations to point to the A. Datum Edge Transport
servers.
2.
3.
4.
5.
Configure the reciprocal Receive connectors with settings that match the Send connectors in terms of
authentication and IP configuration.
6.
Configure a mechanism to synchronize the address lists between the two organizations. For example,
consider deploying Identity Integration Feature Pack (IIFP) or Microsoft Identity Integration Server
(MIIS) to propagate the mailbox users from Contoso to A. Datum as contacts.
5-22
As part of the Hub Transport server configuration process, you should configure the domains for which
the Hub Transport server will accept email, and configure users with alternate email addresses.
Accepted Domains
When you create a new accepted domain, you have three options for the domain type you want to
create:
Authoritative Domain. Select this option if the recipients using this domain name have mailboxes in
the Exchange Server organization.
Internal Relay Domain. Select this option if the Hub Transport or Edge Transport server should
accept the email, but relay it to another messaging organization in another AD DS forest. The
recipients in internal relay domain do not have mailboxes in this Exchange organization, but do have
contacts in the global address list (GAL). When messages are sent to the contacts, the Hub Transport
server or Edge Transport server forwards them to another SMTP server.
External Relay Domain. Select this option if the Hub Transport or Edge Transport server should
accept the email, but relay it to an alternate SMTP server. In this scenario, the transport server
receives the messages for recipients in the external relay domain, and then routes the messages to
the email system for the external relay domain. This requires a Send connector from the transport
server to the external relay domain.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 5-23
By default, only the forest root domain is established as an accepted domain. There are a number of
situations in which you may consider adding additional accepted domains. These include:
Additional namespaces. If you have additional domains within your forest, or more particularly,
additional treeswhich represent different namespacesyou may consider adding authoritative
domains for them. If you add an authoritative domain for an additional tree or domain within your
AD DS forest, you must also create an email address policy to support the domain.
Mergers and acquisitions. When your organization acquires another organization, you may decide to
configure an accepted domain to facilitate internal relay to the acquired organization.
External relay. You must configure an accepted domain to support external SMTP relay. Unlike
internal relay, where your Exchange Server organization routes messages to a Hub Transport server in
another AD DS forest, an external relay is to any SMTP host outside your organization. An ISP might
configure external relay for a customer.
Remote Domains
Remote domains define SMTP domains that are external to your Exchange Server organization. You can
create remote domain entries to define the settings for message transfer between the Exchange Server
2010 organization and domains outside your AD DS forest. When you create a remote domain entry, you
control the types of messages that are sent to that domain. You also can apply message format policies
and acceptable character sets for messages that are sent from your organizations users to the remote
domain. The settings for remote domains determine the Exchange Server organizations global
configuration settings.
You can create remote domain entries to define the mail transfer settings between the Exchange Server
2010 organization and a domain that is outside your AD DS forest. When you create a domain entry, you
provide a name to help the administrator identify the entrys purpose when they view configuration
settings.
The domain name is limited to 64 characters. You also provide the domain name to which this entry and
the associated settings will apply. You can use a wildcard character in the domain name to include all subdomains. The wildcard character must appear at the start of the domain name entry. The SMTP domain
name is limited to 256 characters.
The default settings may be suitable for most situations, but when you work with a partner organization,
you may choose to create a remote domain for their SMTP namespace, and configure specific settings
accordingly.
5-24
Under certain situations, it might be beneficial to configure a number of Exchange Server features that
enable you to more accurately control message flow within your organization. These features are:
Message throttling. Message throttling is a group of limits that you can impose on the number of
messages and connections that a Hub Transport server or Edge Transport server can process. This
helps to prevent the accidental inundation of the system resources on the transport server.
Back pressure. Back pressure is a system resource monitoring feature of the transport service that
exists on Hub Transport and Edge Transport servers. Transport servers detect when vital resources
such as available disk spaceare under pressure, and take configured action to help to avoid service
unavailability.
Message size limits. Message size limits enable you to restrict the total size of a message, or the size of
the individual components of a messagesuch as the message header or message attachmentsand
the number of recipients. You can apply limits globally for the whole Exchange Server 2010
organization, or specifically for a particular connector or user object.
Message Throttling
Message throttling involves a variety of limits on message processing rates, SMTP connection rates, and
SMTP session time-outs. These limits combine to prevent the Hub Transport server or Edge Transport
server from being overwhelmed by accepting and delivering messages. Although a large backlog of
messages and connections may be waiting to be processed, the message throttling limits enable the
transport server to process the messages and connections in an orderly manner.
You can set the message throttling options on:
The transport server. Configuring message throttling options on the transport server affects only
those messages transiting that particular transport server.
A Send connector. This enables you to control message throttling for a specific Send connectorfor
example, to control message throttling to an internal relay domain.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 5-25
A Receive connector. This enables you to control message throttling for a specific Receive
connectorfor example, to control message flow from a partner organization.
Note In Exchange Server 2010 SP1, a running average delivery cost of messages sent by
specific users is maintained by transport servers. The delivery cost of a message is
determined by factors including to how many recipients it is addressed, and whether it has
large attachments. If a user often sends costly messages, Transport servers can give priority
to other messages with lower costs before processing messages from that user.
Transport servers also track the Remote Procedure Call (RPC) utilization of mailbox servers.
RPC sessions are established with mailbox servers when transport servers deliver messages
and when interactive client sessions occur. Excessive RPC utilization can result in a
downgraded client experience. If a Hub Transport server determines that a mailbox server is
under RPC resource pressure, it can reduce the RPC sessions that it opens to that mailbox
server. This can help to improve interactive client sessions on the mailbox server.
Back Pressure
In Exchange Server 2010, when a transport server is in back pressure, incoming connections are accepted;
however, the incoming messages over those connections are either accepted at a slower rate, or are
rejected. This differs from Exchange Server 2007. When an Exchange Server 2007 Hub or Edge Transport
server is under resource pressure, it rejects incoming connections.
For each monitored system resource on a Hub Transport server or Edge Transport server, the following
three levels of resource utilization are applied:
Medium. The resource is slightly overused, and back pressure is applied to the server in a limited
manner. Mail from senders in the authoritative domain can flow. However, depending on the specific
resource under pressure, the server uses tar-pitting to delay server response, or rejects incoming MAIL
FROM commands from other sources.
High. The resource is severely overused, and full back-pressure is applied. All message flow stops, and
the server rejects all new incoming MAIL FROM commands.
Free space on the message queue database hard disk drive. The high level of hard disk space
utilization is calculated by using the following formula:
100 * (hard disk size fixed constant) / hard disk size
In this formula, the fixed constant defaults to 500 megabytes (MB).
Free space on the message queue database transaction logs hard disk drive. By default, the high level
of hard disk utilization is calculated by using the following formula:
100 * (hard disk size - Max(5 GB, 3*DatabaseCheckPointDepthMax) / hard disk size
In this formula, DatabaseCheckPointDepthMax defaults to 512 MB.
5-26
The memory that is used by the EdgeTransport.exe process. By default, the high level of memory
utilization by the EdgeTransport.exe process is calculated by using the following formula:
75 percent of the total physical memory or 1 terabyte, whichever is less
The memory that is used by all processes. By default, the high level of memory utilization by all
processes is 94 percent of total physical memory.
Organizational limits. These limits apply to all Exchange Server 2010 and Exchange Server 2007
servers that exist in your organization.
Global limits. These limits apply to all Exchange Server 2010, Exchange Server 2007, and Exchange
Server 2003 servers that exist in your organization.
Connector limits. These limits apply to any messages that use the specified Send, Receive, or Foreign
connector for message delivery.
AD DS site links. Any messages that exceed the maximum message size limit on any AD DS site link
included in the least cost routing path are not delivered, and generate a delivery status notification
(DSN) that has the value 5.3.4.
Routing group connectors. Any messages that exceed the maximum message size limit on any routing
group connector in the least cost routing path will not be delivered; they will generate a DSN that has
the value 5.3.4.
Server limits. These limits apply to a specific Hub Transport server or Edge Transport server.
User limits. These limits apply to a specific user object, such as a mailbox, contact, distribution group,
or public folder.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 5-27
Exchange Server 2010 provides several tools for troubleshooting SMTP message delivery.
Submission queue. This queue contains messages that the Categorizer is processing.
Remote delivery queue. There is one queue for each outbound SMTP domain to which mail is routed.
Poison message queue. This queue contains messages that might have caused the server to crash.
5-28
Mailbox delivery queue. There is one queue for each Mailbox server to which the Hub Transport server
can deliver messages.
Unreachable queue. This queue contains messages that cannot be routed to their destinations.
Improved error messages for delivery reports. If a user attempts to access delivery reports for a
message immediately after sending it, it is possible that the tracking information for that message has
not yet been inserted into the logs with the result that the user cannot view the report. In this type of
situation, Exchange Server 2010 SP1 improves the message displayed to the user, providing specific
explanations as to why the requested information is not available.
Message tracking, monitoring, and troubleshooting. Exchange Server 2010 SP1 adds several new
monitoring capabilities for message tracking, including new event log entries, alerts, and performance
monitor counters.
Message tracking trace levels. You can now request complete logs of every operation that was
executed by a Client Access server processing a delivery report request. The additional logging detail
may be beneficial when troubleshooting message flow.
Using Telnet
You can use Telnet to check if the SMTP port responds, or to directly send an SMTP mail to a connector to
see if the connector accepts it. Telnet is a Windows Server 2008 feature, and you use it from the
command line using the following syntax: telnet <servername> SMTP or Port #.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 5-29
Lesson 3
Another important component in designing an Exchange Server 2010 organizations message routing is to
plan how messages pass through the network perimeter. The network perimeter requires special
consideration because of issues related to connecting an internal network to the Internet. As you plan the
message routing perimeter, you must consider all possible ways that messages may be sent outside the
Exchange Server organization.
Objectives
After completing this lesson, you will be able to:
Design message routing from the internal network to the network perimeter.
5-30
It is important that you are familiar with the default configuration of Edge Transport servers. This enables
you to make an informed choice about whether you must reconfigure the Edge Transport server to
support the needs of your organization.
Transport Agents
The Edge Transport server supports the following transport agents:
Connection Filtering agent. This is an anti-spam agent that is enabled on Edge Transport servers.
Address Rewriting Inbound agent. This agent rewrites inbound email addresses.
Edge Rule agent. This agent provides compliance at the Edge Transport server.
Content Filter agent. This agent evaluates inbound email messages, and assesses the probability that
an inbound message is legitimate or spam.
Sender ID agent. This is an anti-spam agent that is enabled on Edge Transport servers. Sender ID helps
to combat the impersonation of a sender and a domain, a practice that is known as spoofing; a
spoofed mail is an email message that has a sending address that is modified to appear as if it
originates from a sender other than the actual sender of the message.
Sender Filter agent. This is an anti-spam agent that is enabled on Edge Transport servers. The Sender
Filter agent acts on messages from specific senders outside the organization. You can maintain a list
of senders that are blocked from sending messages to your organization. You can block single
senders ([email protected]), whole domains (*@.adatum.com), or domains and all subdomains
*@*.adatum.com).
Recipient Filter agent. This is an anti-spam agent that is enabled on Edge Transport servers. The
Recipient Filter agent blocks messages according to the characteristics of the intended recipient in the
organization.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 5-31
Protocol Analysis agent. Protocol logging records the SMTP conversations that occur between email
servers as part of message delivery.
Attachment Filtering agent. This agent lets you apply filters at the Edge Transport server to control the
attachments that users receive.
Address Rewriting Outbound agent. This agent rewrites addresses for outbound email.
Connectors
By default, until you establish an Edge subscription, there are no Send or Receive connectors on the Edge
Transport server. If you decide to create an Edge subscription, the necessary Send and Receive connectors
are created. This is discussed in more detail in the following topic.
Accepted Domains
There are no accepted domains configured by default. After you have established an Edge subscription,
you must configure accepted domains for your organization. These settings are synchronized with the
Edge Transport servers through the Edge subscription process. This is discussed in more detail in the
following topic.
5-32
You can subscribe an Edge Transport server to an AD DS site. This associates the Edge Transport server
with the Exchange Server organization. A subscribed Edge Transport server is stamped with an AD DS site
attribute, which means that you can configure the Edge subscription as a source server for Send
connectors that you create in the Exchange Server organization.
When you configure an Edge subscription, the configuration between the Exchange Server organization
and the Edge Transport server occurs automatically, and enables Internet message flow. After you
configure the Edge Subscription, the Edge synchronization process replicates the following data from AD
DS to Active Directory Lightweight Directory Service (AD LDS):
Recipients (Hashed)
Send connectors
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 5-33
You can subscribe an Edge Transport server only to a single AD DS site. If you have multiple AD DS
sites through which you want to route Internet email, you must configure a separate Edge
subscription for each site.
An Edge subscription is specific to each Edge Transport server. If you deploy multiple Edge Transport
servers in a perimeter network, you must configure an Edge subscription for each Edge Transport
server. After you deploy each servers Edge subscription, Edge synchronization configures many of the
Edge Transport server settings. You also can use Edge cloning to duplicate other configuration
settings, such as the anti-spam filters.
When you configure the Edge subscription, it sets up secure message transfer between the Edge
Transport server and all Hub Transport servers in the subscribed AD DS site. If you deploy new Hub
Transport servers in the site after you configure the Edge subscription, you must remove the existing
Edge subscription, and then add a new one so that the new Hub Transport servers will use the Edge
Transport server for message routing.
Deploy multiple Edge Transport servers to enable high availability and load balancing. If you are
deploying multiple Edge Transport servers, then configure a mail exchanger (MX) resource record for
each Edge Transport server in the DNS zone that is accessible from the Internet. Internet SMTP hosts
use DNS round-robin to distribute the load for incoming email. Additionally, the internal Hub
Transport servers distribute message flow between all available Edge Transport servers to loadbalance outbound message delivery. If one of the Edge Transport servers is not available, both
inbound and outbound email is sent through the available servers.
5-34
To enable message flow to the Internet, you must configure the Exchange organization with at least one
SMTP Send connector that has an SMTP address space that includes Internet SMTP domains. Depending
on your organizations requirements, you can deploy multiple Edge Transport servers with multiple SMTP
Send connectors to send Internet email.
Using a single location for routing all messages to the Internet, or enabling message routing through
multiple locations. If your organization has more than one location with an Internet connection, you
can enable message routing through each. To do this, you can choose one of the following options:
Install an Edge Transport server in each location, and configure Edge subscriptions between the
Edge Transport servers and the local AD DS sites.
Manually configure Send connectors on the Hub Transport or Edge Transport servers.
Load balancing and availability are the primary advantages of using multiple connections.
Note Exchange Server 2010 does not fail over automatically to use an alternate connector
if one connector is unavailable. Each server running Exchange Server 2010 chooses a single
route for delivering messages to a specified recipient. If a connector is unavailable for an
extended period of time, and you need to force the Exchange Servers to use an alternate
connection, remove the connector from the Exchange Server organization, wait for AD DS
replication to update all organizational domain controllers, and restart the Microsoft
Exchange Transport service to force the Hub Transport servers to recalculate routing.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 5-35
Configuring the SMTP Send connectors. To enable outbound message flow, you must configure at
least one SMTP Send connector to send email to the Internet. You can use the following options to
configure SMTP Send connectors:
Use Edge synchronization to configure the SMTP Send connectors. When you configure an Edge
subscription, Edge synchronization automatically configures a Send connector for the AD DS site
to enable message delivery between the local Hub Transport servers and the Edge Transport
server. Additionally, Edge synchronization configures a Send connector to enable message
delivery from the Edge Transport server to the Internet.
Create additional SMTP Send connectors. You might have additional requirements for Send
connectors. For example, you might need to configure unique message routing or message
security for a partner organization. You can configure an additional Send connector using the
organizations SMTP domain as the address space, and then configure the other Send connectors
properties.
Manually configure Send connectors for Internet email. If you do not use an Edge Transport
server, or if you do not want to use Edge synchronization, you must manually configure the Send
connectors. You can configure Send connectors in the Hub Transport servers to route email
directly to the Internet, to an SMTP gateway server, or to other smart hosts.
Configure DNS lookups. By default, the Hub Transport server and Edge Transport server perform DNS
lookups for Internet message delivery by using the DNS server that is configured on the network
connection. Configure the settings on the Exchange Server properties to configure other DNS servers
for message delivery. Consider this option if you want to use external DNS servers to perform nameresolution services for the Edge Transport servers, rather than using internal DNS servers.
5-36
To enable message flow from the Internet, you must configure the Exchange Server organization with at
least one SMTP Receive connector that will accept anonymous SMTP connections from Internet SMTP
servers. Depending on your organizations requirements, you can deploy multiple Edge Transport servers
with multiple SMTP Receive connectors to receive Internet email.
Will you use a single location for inbound routing from the Internet, or will you enable message
routing through multiple locations? If your organization has more than one location with an Internet
connection, you can enable inbound message routing through each location. To do this, you can
either install an Edge Transport server in each location, and then configure Edge subscriptions
between the Edge Transport servers and the local AD DS sites, or you can configure receive
connectors manually on the Hub Transport or Edge Transport servers. Load balancing and availability
are the primary advantages of using multiple connections.
If you are going to implement multiple inbound routing points, how do you plan to design the MX
records? If you configure MX records for each inbound SMTP server with equal priorities, the inbound
messages are load-balanced between the two servers. If you configure MX records with different
priorities, the SMTP servers with the lowest priority MX record references are used for all inbound
message flow, and those that the higher priority MX record references are used only when the first
SMTP servers are not available.
How will you configure SMTP Receive connectors? By default, an Edge Transport server is configured
with an SMTP Receive connector that accepts anonymous connections from all IP addresses. You can
use this Receive connector to accept incoming email. All Hub Transport servers also are configured
with a Receive connector. However, this connector only accepts authentication connections.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 5-37
If you configure Edge subscription, this creates a Send connector on the Edge Transport server to
send messages to the internal Hub Transport servers. The Edge subscription also configures an
account that authenticates the connection to the Hub Transport server and provides an encryption
key that can encrypt messages sent between the two servers.
You can create additional SMTP Receive connectors to address specific business requirements. For
example, you may want to configure a Receive connector that requires authentication or TLS
encryption to ensure that messages are secured from a partner organization. Each Receive connector
must use a unique combination of IP address bindings, port number assignments, and the remote IP
address ranges from which the connector will accept mail.
5-38
In addition to planning a message routing topology inside the Exchange Server organization, you also
need to plan a message routing topology for messages sent to recipients outside the Exchange Server
organization. To do this, you must understand how Exchange Server 2010 selects a route for outbound
messages, and how to optimize this configuration.
Select the connectors that do not have restrictions that prevent message delivery. If you configure a
Send connector with a 3 MB size limit, it will not be considered for sending a message with a 4 MB
attachment. A disabled connector is not selected for sending messages.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 5-39
From the remaining connectors, select the connectors with the most specific address space match. For
example, if you configure one Send connector with the address space *.contoso.com, and a second
connector with the address space *, a message that is addressed to a recipient with an SMTP address
@contoso.com is routed through the first connector.
From the remaining connectors, select the connector with the lowest aggregate cost. The connectors
cost is determined by adding the cost of the IP site links between the source site and the AD DS site
that contains the source servers for the Send connector, and the cost assigned to the connector.
From the remaining connectors, select the connector with the closest proximity. The local server is
chosen over another Hub Transport server in the same AD DS site, while a server in the local AD DS
site is chosen over a source server in a remote AD DS site.
From the remaining connectors, select the connector with the lowest alphanumeric connector name.
Note After selecting the SMTP Send connector to use to send the message outside the
organization, the Hub Transport server in the source site routes the message to a Hub
Transport server in the site where you have configured the Send connector. Exchange Server
2010 uses deterministic routing for messages sent outside the organization. Exchange
Server 2010 chooses a single route through which to send messages outside the
organization, and it will not use an alternate route unless you change the underlying
routing configuration.
Whether to use an Edge Transport server to route messages to and from the Internet.
Whether to configure Edge subscriptions between the Edge Transport server and the AD DS site.
Both of these options are highly recommended to provide maximum security and administrative ease.
If your organization has multiple AD DS sites, you also should consider the following factors:
Consider whether you want to implement a single path for routing messages to the Internet, or
whether you want to implement multiple paths. The greatest advantage of a single route is security.
You need to be concerned only with a single connection, from the internal network to the Internet.
Redundancy and load balancing are the greatest advantages of multiple routes.
5-40
If you implement multiple paths to the Internet, you also must plan the internal message routing for
messages being sent to the Internet. By default, each Exchange Server 2010 server considers all SMTP
Send connectors with the correct external address space, when choosing a route over which to
send messages to the Internet. When you plan message routing to the AD DS site that can route
messages to the Internet, use the same considerations that you used for planning internal message
routing between AD DS sites.
Use the connector scope to control whether messages sent to recipients outside the organization are
sent between AD DS sites. For example, if you have two company locations that have Internet
connections, but are connected by a wide area network (WAN) link with limited available bandwidth,
you can define the Send connector scope in both locations as local, so that messages bound for the
Internet are never routed across the WAN link.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 5-41
Address rewriting enables you to modify the addresses of originators or recipients in your Exchange
Server organization. Generally, you use address rewriting to present a consistent interface to
correspondents that are external to your organization.
There are a number of specific reasons why you might consider address rewriting.
Group consolidation. If your organization segments its internal business into separate domainsfor
technical or business reasonsthis would typically cause email to appear to originate from separate
organizations. For example, in the domains Asia.Adatum.com, Europe.Adatum.com, and
Americas.Adatum.com, address rewriting could be used to ensure that email appears to come from a
single domainAdatum.com.
Mergers and acquisitions. If you recently acquired a new company, it will have a different namespace
from your current organization. If you want email that originates in the acquired organization to
appear to come from your own organization, you could implement address rewriting.
Partners. If you use partner organizations to provide services or to manage projects, you can use
address rewriting. For example, if you outsource the launch of a new product to a marketing
company, it may be useful to implement address rewriting so that messages originating in the partner
organization have addresses from your own organization.
Outbound-only address rewriting. When an email message is outbound from your Exchange
organization, outbound-only address rewriting involves modification of only the sender SMTP
address. You can configure the Address Rewriting agent only on the Send connector on the Edge
Transport server. The following list shows the conditions that are required to configure an outboundonly Address Rewriting agent:
5-42
The resulting addresses must be unique across the organization. For example, if you include the
unique email addresses [email protected] [email protected] in a rule to rewrite all
addresses to adatum.com, the Address Rewriting agent rewrites both addresses to
[email protected], and causes a conflict. When such a conflict occurs, you must change the email
address of one of the recipient mailboxes to an address that does not conflict with the email
address in any other subdomain.
You must configure a proxy address on each mailbox that matches the rewritten email address.
This enables those mailboxes to receive replies to email messages in which headers are rewritten.
When you use wildcard characters, there must be a period between the wildcard character and
the domain name.
Outbound-only address rewriting cannot affect the part of the address with the user name or
display name.
Bidirectional address rewriting. Bidirectional address rewriting modifies both the sender SMTP address
on email messages that leave your Exchange Server organization, and the recipient SMTP address on
email messages that enter your Exchange Server organization. To do this, you configure the Address
Rewriting agent on both the Send connector and Receive connector on the Edge Transport server.
The following list shows the conditions that are required when you create a bidirectional Address
Rewriting agent:
You must use full SMTP addresses when you configure a bidirectional address rewriting rule. For
example, the internal address is [email protected], and the external address is
[email protected].
Priority of address rewriting entries. The rule that best matches the internal and external domain pair is
applied. The following prioritization is the exact order of address rewriting entries from highest
priority to lowest priority:
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 5-43
Digitally signed, encrypted, or rights-protected email. Address rewriting should not affect most signed,
encrypted, or rights-protected messages. If address rewriting were to invalidate a signature, make an
encrypted or rights-protected message unreadable, or otherwise change the security status of such
messages in any way, address rewriting is not applied. Addresses and information in the following
message sections can be rewritten, because information in these sections is not part of message
signing, encryption, or rights protection:
Addresses and information in the following message sections is not rewritten, because information in
these sections is part of message signing, encryption, or rights protection:
5-44
Lab Setup
For this lab, you will use the available virtual machine environment. Before you begin the lab, you must:
1.
On the host computer, click Start, point to Administrative Tools, and then click Hyper-V Manager.
2.
3.
4.
Lab Scenario
You are a messaging engineer for A. Datum Corporation, an enterprise-level organization with multiple
locations.
You have been tasked with designing the new routing infrastructure for your organization. You must
examine the documentation that details the existing infrastructure, and then make proposals regarding
any changes you might need to make to address the organizations needs. You must also document your
proposals.
Finally, use various Exchange Server management tools to investigate the current routing topology, and
make some changes.
Note Your instructor may choose to perform this lab as a group discussion rather than an
individual activity.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 5-45
5-46
Adatum_CurrentADSiteDesign.vsd
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 5-47
Adatum_CurrentPerimeterDesign.vsd
5-48
Microsoft Office Visio diagrams describing the A. Datum Corporation site topology.
2.
Modify the A. Datum Current AD DS Site Design diagram with proposed changes to the site design.
Adatum_CurrentADSiteDesign.vsd
Adatum_Info.vsd
Task 2: Modify the A. Datum current AD DS site design diagram with proposed
changes to the site design
1.
Use callouts in the following diagram to document proposed changes to the site design. For each
proposed change, provide:
2.
3.
Document message flow within the organization. Document the changes that you will need to make
to the AD DS configuration to enable optimal message flow.
Note
Results: After this exercise, you should have successfully modified the A. Datum AD DS site design.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 5-49
2.
Modify the A. Datum Current Perimeter Design diagram with proposed changes to the site design.
Adatum_CurrentPerimeterDesign.vsd
Adatum_Info.vsd
Task 2: Modify the A. Datum current perimeter design diagram with proposed
changes to the site design
1.
Use callouts in the following diagram to document proposed changes to the perimeter design. For
each proposed change, provide:
2.
Indicate whether you need to deploy any additional server roles in each AD DS site.
3.
4.
Indicate any other infrastructure changes that you must implement to meet your design
requirements.
5.
For each company location, document how messages are delivered to the Internet, and how inbound
messages are delivered to internal recipients.
Note
Results: After this exercise, you should have successfully designed the A. Datum messaging perimeter.
5-50
Question: If your recommended changes are implemented, how will messages flow between
the AD DS sites? Where will messages be queued in the event of a server or network
connection failure?
Question: What conflicting requirements were presented in the scenario? How did you
resolve conflicting requirements?
Question: What additional information should you consider when designing message
routing in this scenario?
Results: After this exercise, you should have successfully improved the A. Datum AD DS and message
routing design.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 5-51
2.
3.
4.
5.
6.
7.
2.
Browse to the Organization Configuration, and view the Send Connectors tab in the Hub
Transport node.
Question: Have any connectors been configured?
2.
Use the File menu to open the most recent routing table file.
3.
4.
5-52
From Organization Configuration, in the Hub Transport node, create a new Accepted Domain with
the following properties:
Name: Contoso
From Organization Configuration, in the Hub Transport node, create a new Send Connector with the
following properties:
Address: Contoso.com
Cost: 10
Task 5: Update the default site configuration with Exchange Server-specific values
1.
2.
At the Shell, type the following command, and then press Enter.
set-AdSite id Default-First-Site-Name HubSiteEnabled $true
3.
At the Shell, type the following command, and then press Enter.
set-AdSiteLink id DEFAULTIPSITELINK ExchangeCost 25
4.
Switch to VAN-EDG.
2.
3.
At the Exchange Management Shell, type the following command, and then press Enter
new-edgesubscription filename C:\EdgeSubscriptionExport.xml.
4.
5.
At the Exchange Management Shell, type the following command, and then press Enter.
copy c:\EdgeSubscriptionExport.xml \\VAN-EX1\c$
6.
Switch to VAN-EX1.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 5-53
7.
Site: Default-First-Site-Name
Note
2.
Use the File menu to open the most recent routing table file.
3.
4.
Results: After this exercise, you should have modified the message routing topology.
2.
Right-click 10233B-VAN-DC1 in the Virtual Machines list, and then click Revert.
3.
4.
Repeat these steps for 10233B-VAN-EX1, 10233B-VAN-EX2, and 10233B-VAN-EDG. Close the virtual
machine connection windows.
5.
In the Virtual Machines pane, click 10233B-VAN-DC1, and then in the Actions pane, click Start.
5-54
6.
To connect to the virtual machine for the next modules lab, click 10233B-VAN-DC1, and then in the
Actions pane, click Connect.
Important Start the 10233B-VAN-DC1 virtual machine first, and ensure that it is fully
started before starting the other virtual machines.
7.
Wait for 10233B-VAN-DC1 to start, and then start 10233B-VAN-EX1. Connect to the virtual machine.
8.
Wait for 10233B-VAN-EX1 to start, and then start 10233B-VAN-CL1. Connect to the virtual machine.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 5-55
Review Questions
1.
2.
3.
When you add an accepted domain for other than your forest root domain, what else must you
configure in order for recipients within your organization to receive email using the new accepted
domain?
5-56
6-1
Module 6
Planning and Deploying Messaging Security
Contents
Lesson 1: Designing Message Security
6-3
6-16
6-32
6-2
Module Overview
A critical consideration when designing a Microsoft Exchange Server 2010 messaging solution is
ensuring that the messaging system is as secure as possible. This includes planning for message security,
which ensures that messages sent within the organization, and to and from the Internet, meet the
organizations compliance and security requirements. A second consideration for planning the security is
implementing an antivirus and anti-spam solution that prevents malicious emails from entering the
Exchange Server organization.
Objectives
After completing this module, you will be able to:
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 6-3
Lesson 1
Designing message security is an essential part of designing security for your Exchange Server 2010
organization. Exchange Server 2010 provides several features, such as transport rules, Simple Mail Transfer
Protocol (SMTP) connector security, and Domain Security to provide message-level security.
Objectives
After completing this lesson, you will be able to:
6-4
In most organizations, email is a primary tool for exchanging business information, and many business
processes depend upon it. However, SMTP email is not secure because SMTP message contents are not
encrypted or validated. This means that your confidential information potentially may be exposed
through email.
To plan for your organizations messaging security, you first need to understand what types of data your
organization is sending through email, and how you are currently securing those messages.
Is confidential business information sent via email? This information may include confidential
corporate documentation such as sales projections, salary information, trade secrets, or intellectual
property.
Is private customer information sent by email? If your organization uses email to exchange
information with customers, you need to analyze the type of information that you are exchanging.
Some informationsuch as customer queries or ordersmay be confidential. If this information
becomes public, the organizations reputation may suffer. Additionally, if the customer information
includes private information such as social security numbers or transactional information, your
organization may be legally liable.
Note It might also be important that recipients of messages can ensure that messages
were not tampered with during transit.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 6-5
Are both recipients and senders internal to the organization, or is the email sent externally? In most
cases, confidential corporate information is sent to other internal users. However, those users may be
forwarding the information to external email addresses. In some organizations where users do not
have external email access, they may send email to an external email addresssuch as to personal
accountto enable them to work outside the office. Customer information is almost always sent
outside the organization.
Are confidential emails sent primarily to a limited number of external organizations, or to a variety of
recipients? If confidential emails are sent to external recipients, you need to understand where those
messages are going. In some cases, confidential email may be sent primarily to one or two partner
organizations. For example, a law firm may exchange confidential emails with large corporate clients.
In other cases, the confidential emails may be sent to thousands of recipients in many different
locations.
If the organization policy requires that all customer emails with confidential information be secured
using Secure/Multipurpose Internet Mail Extensions (S/MIME), are all users complying with the policy?
If the current security efforts are not effective, then investigate why they are not meeting the
organizations needs.
6-6
One of the options for providing message security is to implement restrictions on what messages users
can receive and send out of the organization. Exchange Server 2010 provides transport rules that you can
use to restrict message flow, or to modify messages in transit by attaching disclaimers or headers to them.
Implementing Hub Transport rules. The Transport Rules agent on the Hub Transport server applies
Hub Transport rules, which Active Directory Domain Services (AD DS) stores, and which are applied
on all Hub Transport servers in the Exchange Server organization. You can use Hub Transport rules to
enforce message flow restrictions, such as:
Preventing inappropriate content from entering or leaving the organization through the
messaging system.
Filtering the organizations confidential information that exists within the messaging system.
When designing the Hub Transport rule implementation, you must define precisely the messages to which
the policies need to apply. In some cases, this may be easy, such as when you want to apply a transport
rule to all messages that a particular user or group sends.
In other cases, you might be required to use multiple criteria. You can use many different criteria when
selecting conditions and exceptions. For example, to filter messages for confidential customer information,
you can define the criteria that the transport rule should use to evaluate whether the message contains
customer information. As a best practice, begin your Hub Transport rule deployment by implementing a
few rules at a time, and testing them thoroughly.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 6-7
Implementing Edge Transport rules. Edge Transport rules are similar to Hub Transport rules except
that the Edge Rules agentwhich runs on the Edge Transport serverenforces them. Because Edge
Transport rules are applied at the network perimeter, you can use them to restrict messages from
entering your organization, or to apply policies to messages as they leave your organization.
Active Directory Lightweight Directory Services (AD LDS) stores all Edge Transport rules so they do
not replicate automatically to all Edge Transport servers in your organization. You can use the cloned
configuration feature to duplicate the Edge Transport rule configuration between servers.
Display name. This field appears in Office Outlook 2007, Office Outlook 2010, and Outlook Web
App. Users can use the field to select the appropriate message classification before they send a
message.
Sender description. This field explains to the sender what the message classification intends to
achieve.
Recipient description. This field explains to the recipient what the message classification intends to
achieve.
Locale. This field specifies a culture code to create a locale-specific version of the message
classification.
One of the message classification options is the Attorney-Client Privileged (A/C Privileged) message
classification. The A/C Privileged message classification is one of two default message classifications that
Exchange Server 2010 includes. By default, when a user assigns the A/C Privileged classification to a
message, the classification displays for all organizational recipients, but no transport rule is applied to the
message.
However, you can create a Hub Transport rule that enforces the A/C Privileged classification. For example,
if your organization groups all of its attorneys into an organizational unit called Legal, you can configure
a transport rule that returns messages classified as A/C Privileged to the sender if the sender or at least
one recipient on the To or CC line is not in the Legal group.
You can use message classifications in two ways:
The message sender can add a message classification manually. A Hub Transport rule can then apply
an action based on this classification.
A transport rule can add a message classification. For example, if you want to filter messages that
contain customer information, you can configure the transport rule to scan the message for this
information, and then have the transport rule apply the classification.
6-8
Exchange Server 2010 includes two default message classifications, but you can configure additional ones.
Before Office Outlook users can set and view message classifications, you must deploy the message
classification configuration files and create an Office Outlook registry key on the end users computers.
The Office Outlook message classification templates are XML files that you must generate after you create
and configure the message classifications.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 6-9
Another option for securing email messages is to modify the default configuration for SMTP Send and
Receive connectors, or create new connectors with more secure configurations. By default, the SMTP
connectors that you use to send Internet email accept anonymous connections, and do not require
message encryption.
Configure authentication for SMTP receive connectors. If you enable authentication for Receive
connectors, you can restrict the users or other SMTP servers that can establish an SMTP connection to
the Receive connectors for sending email.
Note Bear in-mind that enabling authentication on a receive connector could disrupt
normal SMTP email communications if that connector is used to accept email from the
Internet.
Configure authentication for SMTP send connectors. When you configure authentication on a Send
connector, you configure your SMTP server to use authentication when sending messages to another
server. If the authentication fails, the message is not delivered.
When configuring SMTP Send connectors that use a smart host, you must configure authentication to
match the method used by the smart host. You can select between the following authentication
mechanisms:
None. Select this option if you want an anonymous connection. This is quite common for
connectors used to support mail flow to and from the Internet.
6-10
Basic Authentication. Basic authentication requires that you provide a user name and password.
We strongly recommend that you use an encrypted connection if you use basic authentication,
because the user name and password are sent in clear text. Select the Basic Authentication over
TLS check box to enable encryption on the connection.
Externally Secured. Select this option if the connection is secured by external means, such as
being physically secured over a private network, or secured using Internet Protocol security
(IPsec).
When configuring SMTP Receive connectors, you can select between the following authentication
mechanisms:
TLS. When you select this option, the STARTTLS keyword is advertised in the EHLO response to
connecting SMTP servers, and TLS authentication is accepted.
Domain Security. There are additional configuration steps required before you can enable
mutual TLS, which is required for Domain Security.
Basic Authentication. When you select Basic Authentication, the AUTH keyword is advertised in
the EHLO response to connecting SMTP servers, and Basic authentication is accepted. Because
the user name and password are sent in clear text when Basic authentication is used, you should
not use Basic authentication without encryption.
Offer Basic Authentication only after starting TLS. When you select this option, the connector
starts TLS first, and then after TLS encryption completes, the connector offers Basic
authentication.
Exchange Server authentication. Select this option to authenticate by using an Exchange Server
authentication mechanism, such as TLS direct trust or Kerberos through TLS.
Externally Secured. Use this option if the incoming connections to this Receive connector are
secured by external means. When you select this option, you make an assertion of external
security that cannot be programmatically verified by Exchange Server. Before you select this
authentication method, you must first select the Exchange Server permissions group on the
Permission Groups tab.
Use the Permission Groups tab to select the permission groups assigned to the Receive connector. A
permission group is a predefined set of permissions granted to well-known groups of users,
computers, or security groups. Members of the selected permission groups on this tab are allowed to
submit messages to this Receive connector.
The following options are available on the Permission Groups tab:
Anonymous users
Exchange users
Exchange
Partners
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 6-11
If you configure authentication on a receive connector, you ensure that only authenticated users or
servers can send email to the connector. This option is useful for scenarios in which you want to
configure a connector to accept connections only from a particular partner organization. You can
configure the Receive connector to accept connections only from the IP address of the partner
organizations SMTP server, and require authentication. If you use basic or Integrated Windows
authentication, you must provide the sending organization with the user credentials that the SMTP
server will accept. As a best practice, you should combine authentication with TLS to ensure that the
user credentials are authenticated, and that data is encrypted.
You might need to configure authentication on a Send connector to meet another organizations
security requirements. If the other organization requires authentication, configure the Send connector
to use the other organizations SMTP server as a smart host, and then use the user credentials
provided by the other organization or TLS to authenticate the SMTP session.
TLS encryption ensures that authentication credentials and email messages cannot be read while in
transit. Use this option to provide a level of security beyond authentication. Before you configure TLS
security for SMTP Receive connectors, you must configure the SMTP service with an X.509 certificate
trusted by the SMTP server that sends email to your organization. Normally, this requires that you
obtain a server certificate from a public certification authority (CA). When configuring an SMTP Send
connector to use TLS, your SMTP server must trust the certificate issued to the destination SMTP
server.
For both SMTP Send and Receive connectors, you can select the Externally Secured authentication
option if you are certain that there is a trusted network connection between the servers. For example,
you could use a virtual private network (VPN) or a dedicated network connection between two
companies, or you could use IPsec to secure the message transfer. This option treats all email
messages sent through this connection as authenticated, rather than anonymous.
In most cases, you need to configure new SMTP connectors to support authentication and encryption.
To send and receive email in most organizations, you must configure the default SMTP connectors to
use anonymous and unencrypted connections. This is the default configuration for connectors on an
Edge Transport server when you enable Edge synchronization. Create a new connector if you are
going to require authentication and encryption for messages from a partner organization.
Before you enable either authentication or TLS encryption, you must communicate with the
organizations that will be sending email over the secure connection to ensure that they configure
their SMTP servers to comply with your policies.
If you deploy an Edge Transport server and implement Edge subscriptions, you should not need to
modify the Receive connectors on Hub Transport servers. By default, when you install the Hub
Transport server role, two receive connectors exist: one which will accept only authenticated
connections on TCP port 25, and the other that will accept only authentication connections on TCP
port 587. If you enable Edge subscriptions, the connection between the Edge Transport server and
the Hub Transport server are authenticated, and all messages are encrypted.
6-12
In addition to configuring the SMTP connectors to enhance message security between partner
organizations, you can use the Domain Security feature in Exchange Server 2010 to provide extra security
and functionality.
On the Edge Transport server, generate a TLS certificates request. You can request the certificate from
an internal, private CA that your organization owns and manages, or from a commercial CA.
Regardless of the CA you choose, the SMTP servers in the partner organization that you exchange
messages with must trust the certificate. When you request the certificate, ensure that the certificate
request includes the domain name for all internal SMTP domains in your organization.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 6-13
Note When an SMTP server establishes a TLS session with an Edge Transport server, the
SMTP server validates the Domain Name System (DNS) name in the server certificate on the
Edge Transport server against the DNS name of the email recipient domain. When you
generate the request for the Edge Transport server certificate, ensure that you include all
possible domain names that clients can use to connect to the server. For example, if you
host multiple SMTP domains that need to be accessible through this connector, you must
include all of the hosted domain names in the certificate request. The Subject Alternative
Names value on the certificate stores the domain name information. You can create a
certificate that contains multiple Subject Alternative Names by using the DomainName
parameter of the New-ExchangeCertificate cmdlet.
2.
Import and enable the certificate on the Edge Transport server. After you request the certificate, you
must import the certificate on the Edge Transport server, and enable the certificate for use by the
SMTP connectors that send and receive domain-secured email.
3.
Configure outbound Domain Security. To configure outbound Domain Security, use Exchange
Management Shell commands to specify the domains to which you send domain-secured email, and
then configure the SMTP Send connector to use domain-secured email.
4.
Configure inbound Domain Security. To configure inbound Domain Security, use Exchange
Management Shell commands to specify the domains from which you receive domain-secured email,
and then configure the SMTP Receive connector to use domain-secured email.
5.
Test domain-secured mail flow. After you configure domain-secured email, you can test the
connection by reviewing the performance and protocol logs. The Domain Security feature includes
the following performance counters under MSExchange Secure Mail Transport:
You can create a new counter log file that contains these performance counters to monitor the
messages sent and received, and the failed mutual TLS sessions.
6-14
Exchange Server 2010 supports client-based solutions for providing messaging security. Exchange Server
2010 supports both S/MIME and Rights Management Service (RMS).
You must install a certificate on each client computer to enable email security. You need to plan for
certificates due to the following factors:
Certificate distribution. Because each client computer that sends or receives email by using
S/MIME must have a certificate, you must develop a plan for distributing certificates.
Certificate trust. You typically use S/MIME to secure email that is sent to external recipients. The
recipients must trust the certificates that you assign to each computer.
Public key distribution. To send an encrypted message, the message sender must have a copy of
the recipients public key. This means that the message recipient must have a digital certificate,
and must provide the certificate with the senders public key. One method of distributing the
public key is to send a digitally signed email. This manual process of distributing public keys
makes the entire process cumbersome.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 6-15
Certificate and private key backups. If a user ever loses the private key associated with their
computers certificate, the user will not be able to decrypt messages that were encrypted with the
public key that is associated with the certificate. The local computer stores the private key, which
means it could be lost due to hard-disk failure or profile corruption. Thus, you must export the
private key from each client computer, and save it in safe place.
You can address many of these certificate issues by implementing a private CA on a computer
running Windows Server 2008, and integrating the CA with AD DS. This solution enables
automation of many certification management tasks for internal users. However, unless you configure
the private CA as a subordinate CA to a trusted public root CA, external clients will not trust the
certificates that your CA issues.
Another issue with using S/MIME to provide message-level security is that it is a user-based security
model. When sending a message, the user must sign or encrypt the message manually. However,
there is no guarantee that users will do this, even if the message contains confidential information.
A final issue with using S/MIME to secure messages is that because the messages entering or leaving
the organization are encrypted, and the messages remain encrypted in the user mailbox, it is not
possible to scan the messages for policy compliance, viruses, or spam.
Despite the limitations, S/MIME is the best option for securing email messages sent from one individual to
recipients in other organizations. Most organizations will not want to set up server-level security for one
or two users, so you may need to use S/MIME for these situations.
6-16
Lesson 2
Viruses and spam can inflict significant damage on an organization. Therefore, the spam and virus filtering
solution you design is a critical component to consider when you are designing message security for an
Exchange organization.
Objectives
After completing this lesson, you will be able to:
Identify the options for implementing antivirus and anti-spam solutions in Exchange Server 2010.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 6-17
One of the most important issues for any Exchange Server administrator is managing virus and spam
filtering solutions. As an Exchange Server administrator, you must be constantly aware of attempts to have
malicious email enter your organization. To design an effective anti-spam and antivirus solution, you
should be familiar with the new techniques that spammers and malicious virus writers use.
How often are the antivirus and anti-spam filters updated, and are the processes automated? When a
new virus is released on the Internet, it is critical that you update your antivirus software before the
virus enters your organization. If you discover a new phishing scheme, it is important that you update
your anti-spam filters to block the phishing emails.
When evaluating an antivirus or anti-spam solution, monitor the speed with which the vendor
provides updates, and ensure that their automated process for distributing updates works effectively.
As a best practice, consider implementing an antivirus solution that can use multiple scan engines
from multiple vendors to maximize your chances of obtaining updates as quickly as possible.
How does the anti-spam solution provide a balance between false positives and reducing as much
spam as possible? A false positive is a legitimate email message that the spam-filtering solution
incorrectly identifies as spam. One of the most critical issues in managing an anti-spam solution is the
ability to eliminate false positives while still blocking as much spam as possible. Many anti-spam
solutions provide features such as safe-senders lists or other lists that allow users to define senders
whose messages should not be blocked.
6-18
What options does the solution provide for quarantining potentially malicious messages? This is
particularly important for anti-spam solutions, because this is the primary method of detecting false
positives. At a minimum, the anti-spam solution should provide a quarantine location that the
administrator can monitor for messages that do not appear to be spam. Some solutions also provide
quarantine locations that users can access to review all messages that were intended for their
mailboxes, but which the spam solution filtered instead. Exchange Server 2010 provides a quarantine
mailbox for messages filtered by the content filter, and enables administrators to resubmit messages
from the quarantine mailbox.
What management and monitoring tools does the solution provide? Antivirus or anti-spam solutions
often include components that run on different computers. The management tools should provide an
efficient means to manage all of these systems. The solution also should provide an effective
monitoring system that can provide real-time statistics for the messaging administrators, and it
should provide alerts when it detects outbreaks or attacks.
How well does the solution integrate with your current system? The obvious requirement is that the
anti-spam and antivirus solution work with your messaging system, but you also should consider
additional integration factors. For example, does the solution provide user-level integration so that
you can configure filtering rules based on your organizations individual recipients without
necessitating management of two separate directories? Does the solution integrate with your
administrative model so that you can assign permissions easily using existing administrative groups to
manage and monitor the system?
You also should document any unique requirements that your organization may have. For example, if
users are using S/MIME frequently to send encrypted email that spam or virus filters cannot scan, you may
need to explore other options for scanning this content. Other organizations may want to ensure that
spam filters scan all messages from a partner organization for viruses, but do not block them.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 6-19
Malicious senders or spammers may use a variety of methods to attempt to send malicious email or spam
into your organization. Therefore, no single tool or process can eliminate all malicious email or spam.
Exchange Server 2010 includes a variety of anti-spam and antivirus features that are designed to work
cumulatively to reduce the spam that enters your organization.
You can reduce the number of virus outbreaks and attacks by malicious software in your organization if
you are able to preventor at least reduce the quantity ofspam messages entering your organization.
By implementing antivirus and anti-spam tools at the perimeter network on the server configured with
the Edge Transport role, you can ensure a healthy message stream from the Internet.
Exchange Server 2010s transport architecture provides a number of antivirus and anti-spam solutions that
are implemented as a series of layers. The anti-spam and antivirus filters are applied in the following
order:
Connection filtering. The Connection filter inspects the IP address of the remote server that is trying
to send the message, to determine what action to take on an inbound message. Connection filtering
uses a variety of IP Block lists, IP Allow lists, and IP Block Providers services or IP Allow Provider
services to determine whether the connection from the specific IP should be blocked or allowed in
the organization.
Sender filtering. The Sender filter compares the sender on the MAIL FROM: SMTP command to an
administrator-defined list of senders or sender domains that are prohibited from sending messages to
the organization, to determine what action to take on an inbound message.
Recipient filtering. The Recipient filter compares the message recipients on the RCPT TO: SMTP
command to an administrator-defined Recipient Block list. If a match is found, the message is
not permitted to enter the organization. The recipient filter also compares recipients on inbound
messages to the local recipient directory to determine whether the message is addressed to valid
6-20
recipients. When a message is not addressed to valid recipients, the message can be rejected at the
organization's network perimeter.
Sender ID. Sender ID is intended to combat the impersonation of a sender and a domain, a practice
that's frequently called spoofing. A spoofed mail is an email message with a sending address that was
modified to appear as if it originates from a sender other than the actual sender of the message.
Spoofed mails typically contain a From: address that appears to be from a certain organization. In the
past, it was relatively easy to spoof the From: address, in both the SMTP session, such as the MAIL
FROM: header, and in the RFC 822 message data, such as From: "Jo Berry" [email protected], because
the headers were not validated.
In Exchange Server 2010, Sender ID makes spoofing more difficult. When you enable Sender ID, each
message contains a Sender ID status in the metadata of the message. When an email message is
received, the Edge Transport server queries the sender's DNS server to verify that the IP address from
which the message was received is authorized to send messages for the domain that is specified in
the message headers. The IP address of the authorized sending server is referred to as the purported
responsible address (PRA).
Domain administrators publish sender policy framework (SPF) records on their DNS servers. SPF
records identify authorized outbound email servers. If an SPF record is configured on the sender's
DNS server, the Edge Transport server parses the SPF record and determines whether the IP address
from which the message was received is authorized to send email on behalf of the domain that is
specified in the message.
The Edge Transport server updates the message metadata with the Sender ID status based on the SPF
record. After the Edge Transport server updates the message metadata, the Edge Transport server
delivers the message as it ordinarily would. PRA is calculated based on the following message
headers:
Resent-Sender:
Resent-From:
Sender:
From:
Content filtering. The Content filter uses Microsoft SmartScreen technology to assess the contents
of a message. Based on the characteristics of millions of messages, Intelligent Message Filterthe
underlying technology in content filteringrecognizes indicators of both legitimate messages and
spam messages. Intelligent Message Filter can accurately assess the probability that an inbound email
message is either a legitimate message or spam.
Note Content filtering also acts on the safelist aggregation feature. Safelist aggregation
collects data from the anti-spam safe lists that Office Outlook and Outlook Web App users
configure, and makes this data available to the Content Filter agent on the computer that
has the Exchange Server 2010 Edge Transport server role installed. When an Exchange
Server 2010 administrator enables and correctly configures safelist aggregation, the Content
Filter agent passes safe email messages to the enterprise mailbox without additional
processing. Email messages that Office Outlook users receive from contacts, or contacts
added to their Outlook Safe Senders List, or have trusted, are identified by the Content
Filter agent as safe. The result is that messages that are identified as safe are not classified as
spam and unintentionally filtered out of the messaging system.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 6-21
Sender reputation. The Sender Reputation filter relies on persisted data about the IP address of the
sending server to determine what actionif anyto take on an inbound message. The Protocol
Analysis agent is the underlying agent that implements the sender reputation functionality. A sender
reputation level (SRL) is calculated from several sender characteristics that are derived from message
analysis and external tests. Senders whose SRL exceeds a configurable threshold are temporarily
blocked, and all their future connections are rejected for up to 48 hours.
In addition to the locally calculated IP reputation, Exchange Server 2010 also takes advantage of the
IP Reputation Service anti-spam updates, which are available through Microsoft Update. These
updates provide sender reputation information about IP addresses that are known to send spam.
Attachment filtering. The Attachment filter filters messages based on the attachment file name, file
name extension, or file Multipurpose Internet Mail Extension (MIME) content type. You can configure
attachment filtering to block a message and its attachment, to strip the attachment and allow the
message to pass through, or to delete the message and its attachment without notifying the
recipient.
Forefront Protection 2010 for Exchange Server. Microsoft Forefront Protection for Exchange Server
is an antivirus software package that is tightly integrated with Exchange Server 2010, and offers
antivirus protection for the Exchange Server environment.
Outlook Junk Email filtering. The Outlook Junk Email filter uses state-of-the-art technology to
evaluate whether a message should be treated as a junk email message based on several factors.
These factors include: time that the message was sent; content and structure of the message; and
metadata collected by the Exchange Server anti-spam filters. Messages caught by the filter are moved
to a special Junk Email folder where the recipient can access them later.
The messages that can reach a users Outlook Junk Email folder is determined by the spam
confidence level (SCL) threshold configured at the Exchange organizational level. By adjusting the SCL
threshold configuration, you can minimize:
Number of legitimate email messages that reach the Microsoft Outlook user's Junk Email folder.
Number of offensive spam email messages that reach the Outlook user's Inbox or Junk Email
folder.
Number of spam email messages that reach the Outlook user's Inbox.
You can escalate the content filtering action taken on messages that have a greater risk of being
spam. To understand this functionality, it is important to understand the different SCL threshold
actions, and how you can configure them:
SCL delete threshold. When the SCL value for a specific message is equal to or higher than the
SCL delete threshold, the Content Filter agent deletes the message. If the SCL value for a message
is lower than the SCL delete threshold value, instead of deleting the message, the Content Filter
agent compares the SCL value to the SCL reject threshold.
SCL reject threshold. When the SCL value for a specific message is equal to or higher than the SCL
reject threshold, the Content Filter agent deletes the message. If the SCL value for a message is
lower than the SCL delete and SCL reject threshold values, instead of deleting or rejecting the
message, the Content Filter agent compares the SCL value to the SCL quarantine threshold.
6-22
SCL quarantine threshold. When the SCL value for a specific message is equal to or higher than
the SCL quarantine threshold, the Content Filter agent sends the message to a quarantine
mailbox. You must periodically review the quarantine mailbox. If the SCL value for a message is
lower than the SCL delete, reject, and quarantine threshold values, the Content Filter agent sends
the message to the appropriate Mailbox server, where the per-recipient SCL Junk Email folder
threshold value of the message is evaluated.
SCL Junk Email folder threshold. If the SCL value for a specific message exceeds the SCL Junk
Email folder threshold, the Mailbox server puts the message in the Outlook user's Junk Email
folder. If the SCL value for a message is lower than the SCL delete, reject, quarantine, and Junk
Email folder threshold values, the Mailbox server puts the message in the user's Inbox.
For example, if you set the SCL delete threshold to 8, the SCL reject threshold to 7, the SCL quarantine
threshold to 6, and the SCL Junk Email folder threshold to 5, all email with an SCL of 5 or lower will be
delivered to the user's Inbox.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 6-23
Designing an anti-spam solution is difficult because if you set all anti-spam feature filters to their most
aggressive levels and configure all anti-spam features to reject all suspicious messages, you are more likely
to reject legitimate messages that are not spam. On the other hand, if you do not set the anti-spam filters
at a sufficiently aggressive level, and do not set the SCL threshold appropriately for your organization, you
probably will not notice a reduction in spam.
Scan for spam at the messaging gateway. To minimize the spam that enters the internal network, you
should try to filter most of it at the SMTP gateway server. By scanning messages at that server and
rejecting suspected spam messages, you can decrease costs by not delivering and storing suspected
spam on internal servers. The goal is to process and transport as little spam as possible through the
network.
Scan for spam on the hub transport server. In addition to scanning at the edge where messages enter
the organization, to help reduce the propagation of spam, also scan at the hub transport servers.
Scan messages for spam before scanning for viruses. Because anti-spam scanning blocks a high
percentage of incoming Internet messages, it makes sense to scan for spam before viruses. It is not
cost-effective to run a virus scan on messages that filters might later identify as spam, because filters
will block those messages eventually anyway. Moreover, spam filtering is less resource-intensive for
messaging servers compared to virus filtering.
6-24
Configure the connection filter agent, recipient filter agent, and sender filter agent to reject
messages. This approach is better than quarantining filtered messages or assigning metadatasuch
as anti-spam stampsto the messages. The connection filter agent and recipient filter agent
automatically block messages that the respective filters identify. You can configure the action that the
Sender Filter agent takes on inbound email messages. You also should reject messages filtered by
real-time block list (RBL) services and recipient filtering, although the underlying confidence is not as
high as the IP Block list.
Consider implementing Edge Transport servers as SMTP gateway servers. There are many third-party,
anti-spam solutions available, but Edge Transport servers provide additional integration with the
internal Exchange Server organization when you enable Edge synchronization. For example, if you
enable Edge synchronization, the recipients and safelist aggregation lists from inside the organization
are replicated to AD LDS on the Edge Transport server, which then uses the information to filter spam.
Implement safelist aggregation. Safelist aggregation enables the Edge Transport server to make
spam-filtering decisions by using the data from the Safe Recipients Lists or Safe Senders Lists, and
contact data that Office Outlook users configure. Safelist aggregation can reduce the instances of
false-positives in anti-spam filtering. When an Exchange Server administrator enables and configures
safelist aggregation, the Content Filter agent passes email messages from the Safe Senders, Safe
Recipients, or Contacts Lists to the user mailbox without additional processing.
Note Safelist aggregation data contains both the users Safe Senders List and the users
Safe Recipients List. When you use the Update-Safelist cmdlet, you can specify whether to
update the Safe Senders List or the Safe Recipients List, or both. However, the safelist
aggregation feature only uses Safe Senders List data, and does not act on Safe Recipients
List data. Therefore, to reduce Active Directory storage and replication issues, you should
not run the Update-Safelist cmdlet with the Type parameter set to the SafeRecipients or
Both values. The default value for the Type parameter is SafeSenders.
Implement automatic anti-spam updates. Exchange Server 2010 includes many anti-spam features
that depend on downloaded data to determine whether a message is, or is not, spam. You must
continually update this data, which includes content filter updates, Microsoft IP Reputation Service
data, and spam signature data, to ensure that the anti-spam features function optimally.
To enable updates, you must access the Microsoft Update website to download and install the
content filter updates. The content filter update data is updated and available for download every
two weeks. Automatic updates are available if you have an Exchange Enterprise client access license
(CAL) for each user mailbox, or a Forefront Security for Exchange Server license. Manual updates from
Microsoft Update do not include the Microsoft IP Reputation Service or spam signature data. The
Microsoft IP Reputation Service and spam signature data is only available with Automatic Updates.
Increase the filtering level over time. When you first implement the anti-spam solution, you should
plan a fairly non-aggressive configuration of the anti-spam features. This approach lets you minimize
the number of false positives. As you monitor and adjust the anti-spam features, you can become
more aggressive about the type of spam and spam attacks that your organization experiences.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 6-25
It is almost impossible to configure an anti-spam solution so that as soon as it is placed into production, it
functions optimally. When you first implement the solution, you are likely to either have too many false
positives, or too many spam messages getting through your defenses. Even if you optimize the
configuration, spammers are constantly trying new techniques to slip messages past your spam filters.
Monitor for false positives. This is probably the most important monitoring task, because messages
that you filter falsely as spam can disrupt business processes. Depending on how you configure your
anti-spam filters, users may not be aware that legitimate emails are being deleted.
Monitor for filtering effectiveness. You also should monitor anti-spam filters to determine whether
they are blocking most of the spam messages.
Monitor the quarantine mailbox. If you configure content filtering to send messages with a specific
SCL to a quarantine mailbox, you must monitor the quarantine mailbox on a regular basis. This is
particularly important when you first implement content filtering.
Collect user feedback on the spam filters effectiveness. Spam filters most directly affect users, and
they often can provide the most valuable feedback. To collect this feedback, ensure that the Help
Desk personnel track all calls pertaining to spam filtering, and distribute a user survey on a regular
basis. One option for collecting user feedback is to request that they forward all spam messages to a
spam collection alias.
6-26
Identify the administrators who are responsible for monitoring the spam solution, and provide them
with tools for monitoring it. Exchange Server 2010 provides several scripts in the
%programfiles%\Microsoft\Exchange Server\Scripts folder that enable collecting agent log
information. These scripts provide information such as the IP addresses or domain names with the
most blocked spam messages, or the recipients who receive the most spam messages.
Establish guidelines for how frequently administrators should monitor the system. Some anti-spam
solutions provide real-time monitoring, while others provide tools for verifying the solution status at
various points in time. You should ensure that administrators monitor the system frequently enough
to rapidly identify any issues.
Establish a change-control process for modifying spam filters. If the monitoring shows that the filters
are identifying too many messages as false positives, or if a new type of spam message is bypassing
your filters, you should have a change-control process in place to modify the spam filters. In some
scenarios, this may require immediate action. In other scenarios, you may have additional time to
implement a solution. You should include both scenarios in your change-control process.
Sender ID evaluation
Custom weight level that assigns a value based on whether the message contains words on the
approved or unapproved content filter list
Time stamps that indicate a significant delay between when the message was sent and received
You can view a messages anti-spam stamp by opening the message in Office Outlook, and viewing the
Internet headers section in the Message Options page.
Question: Will you be deploying anti-spam filtering using an Edge Transport server in
Exchange Server 2010? What is the reasoning behind your decision?
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 6-27
One of the most common ways in which viruses spread from one organization to another is through
email. Thus, one of the primary means of protecting your Exchange Server organization is to ensure that
you stop all messages containing viruses at the messaging environments perimeter.
Implement a defense-in-depth approach for dealing with viruses. Applying the defense-in-depth
model means that you implement defenses against viruses at multiple organizational levels, including:
Client computer-based solutions. Install and maintain client-side antivirus software on all client
computers that connect to your network, including remote clients. Additionally, you should
enable the anti-spam and anti-phishing features available in messaging clients such as Office
Outlook 2010, Outlook 2007, and Office Outlook 2003, and the anti-phishing features in
Windows Internet Explorer 7.
Exchange Server-based solutions. Install server-side antivirus software on every Hub Transport
server in your organization to scan all messages as they pass through. Many organizations also
deploy antivirus software on Mailbox servers to scan the mailbox databases. Antivirus software on
the Mailbox servers uses the Microsoft Virus Scanning application programming interface (VSAPI)
to scan mailbox databases. However, it is generally preferable to install antivirus software at the
entry point to your messaging infrastructure. Deploying antivirus components to the Edge and/or
Hub Transport servers enables you to reduce the risk of infection of a mailbox database.
Internet edge-based solutions. You also should deploy antivirus and anti-spam software on the
SMTP server, or the Edge Transport server that is accessible directly from the Internet. This
software scans files as they enter the organization, thereby stopping the viruses and spam before
they get into, or out of, the network.
6-28
Delete, rather than clean infected messages. Although it is possible for some antivirus solutions to
remove a detected virus from a message and preserve its contents, such attempts may not be
completely effective. Therefore, sending these messages through the system presents a potential
liability. For this reason, you should delete infected messages.
Strip attachments of certain file types. By stripping all attachments that contain executable content,
you can help protect an environment from unknown or recently released malicious software that
email attachments transmit, and for which signature files are not yet available or deployed. A best
practice is to implement attachment stripping at the email gateway layer, and to match the gatewaylayer attachment stripping policy with the attachment blocking policy that the client enforces.
Scan both incoming and outgoing email for viruses. Although scanning incoming email is the primary
method for keeping a messaging environment free of viruses, you must also ensure that internal users
do not send viruses in outgoing email.
Implement an antivirus solution that can take advantage of specific transport-related Exchange Server
2010 features, including those that antivirus vendors can use to optimize antivirus solutions:
Transport agents for antivirus scanning. In an Exchange Server 2010 environment, all messages
must pass through a Hub Transport server, and inbound and outbound messages pass through
an Edge Transport serverif you deploy one. On the transport servers, you can use transport
agents to scan messages and apply policies to them. This also applies to antivirus scanning.
Antivirus vendors can create transport agents that specifically scan for viruses.
Antivirus stamping. Antivirus stamping helps reduce the number of times a message is scanned as
it is sent through an organization. This feature works by stamping messages that an antivirus
solution scans with the name and version of the antivirus engine that performed the scan and the
scans results. The antivirus stamp travels with the message as it proceeds through the
organization, and other Exchange servers use it to determine if virus scanning is necessary for a
message. By reducing the number of times a virus needs scanning, you can reduce the use of
server resources that scanning requires.
Support for multiple antivirus engines. Forefront Protection 2010 for Exchange Server includes
industry-leading, antivirus engines from global security firms such as Kaspersky Labs, CA, and Sophos.
You can use as many as five scanning engines, at once, and in different combinations, across the
server system. Forefront Protection 2010 for Exchange Server automatically downloads the latest
signatures, and selects the optimal combination of engines that ensure a high protection level and
reduce exposure to any given threat.
Layered protection. Forefront Protection 2010 for Exchange Server provides protection at multiple
checkpoints in the messaging infrastructure, including Exchange Server 2010 Edge Transport servers,
Hub Transport servers, and Mailbox servers.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 6-29
Forefront Protection 2010 for Exchange Server utilizes the Exchange Server 2010 transport agents and
Microsoft VSAPI technologies.
Centralized management of remote installation, engine, and signature updating, reporting, and alerts
through the Microsoft Forefront Server Security Management Console.
Question: How will you modify your antivirus solution when you deploy Exchange Server
2010?
6-30
Managing an antivirus solution is a priority for messaging administrators. Virus writers are constantly
developing new viruses that exploit new vulnerabilities, or that use new techniques to bypass antivirus
solutions. Therefore, it is critical that you conduct daily monitoring and management of your antivirus
solution.
Develop clearly defined policies and processes for managing antivirus solutions. These policies and
processes should identify which administrators are responsible for daily monitoring tasks, and how
frequently they should perform these tasks. The policies and processes also should define the action
to take if a virus outbreak occurs.
Automate as many processes as possible. For example, one of the critical components in managing an
antivirus system is ensuring that antivirus software is up-to-date and running on all servers at all
times. Develop an automated process that verifies the version of the antivirus signature files and
scanning engines that you have deployed on the servers, and that updates the servers if the files are
not current. Ensure that the automated processes also include a means by which you can alert
messaging administrators if the processes fail. You should configure all antivirus systems to update
daily, and configure all critical systemssuch as the Internet Edge SMTP serversto update several
times daily.
Regularly monitor antivirus software sites for information on new viruses and virus outbreaks.
Monitor daily statistics for the volume of processed email, and the number of detected viruses. A
sharp increase in the number of infected messages may indicate that a new virus has been released,
which may require extra vigilance.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 6-31
Develop a user education process. Most viruses require user action to initiate an attack. Therefore,
your antivirus management strategy should include a user education plan that will teach users about
viruses, and how to deal with suspicious email. Educating users includes making them aware of
current threats, as well as the importance of keeping their computer systems up-to-date with the
latest signature files and security updates. If you educate users, they can help prevent a virus from
spreading if it infects their system.
Consider using a solution such as Exchange Online, which offers anti-spam and antivirus solution
management from outside your organization. In most organizations, messaging administrators are
busy, and it is easy to delay the daily task of monitoring the antivirus system, especially if they have
identified no new viruses for some time.
6-32
Lab Setup
For this lab, you will use the available virtual machine environment. Before you begin the lab, you must:
1.
On the host computer, click Start, point to Administrative Tools, and then click Hyper-V
Manager.
2.
Ensure that the 10233B-VAN-DC1, 10233B-VAN-EX1, and the 10233B-VAN-CL1 virtual machines are
running.
3.
Lab Scenario
You are a messaging engineer for the A. Datum Corporation, an enterprise-level organization with
multiple locations. You have been tasked with undertaking an analysis of the organizations message
security requirements. After you complete the analysis, you must update the necessary documentation.
After you have completed the message security analysis, you will investigate the organizations antivirus
and anti-spam requirements, and update the necessary documentation with your planned changes.
Finally, you will implement some of your proposals.
Note Your instructor may choose to perform this lab as a group discussion rather than an
individual activity.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 6-33
Security Requirements.doc
Message Security Requirements
Before any message is sent to a recipient on the Internet, a disclaimer that has been approved by the
Legal department must be added to the message.
Messages sent to Internet recipients from members of the Sales team must have a different disclaimer
added to the message.
Messages with a Company Internal classification must be blocked from being sent to the Internet. If a
user tries to send a message with this classification to the Internet, they should receive a response
indicating that they are not allowed to send messages with this classification to the Internet.
A small group of senior executives and a few board members make up a Strategic Acquisitions team.
These users should be able to send each other messages that are clearly marked as Acquisitions
Confidential, and the messages should not ever be sent to users who are not on this team.
A. Datum has formed a strategic partnership with Contoso, Ltd. The central office for Contoso, Ltd is
located in New York. Because much of the email send between A. Datum and Contoso contains
confidential email, all messages sent between the organizations must be as secure as possible. When
viewing an email sent between the companies, users should be able to determine that the message
has been secured while in transit.
A. Datum uses a law firm based in Brussels to deal with international regulations related to their
business. All network traffic between the two firms is sent through a VPN. A. Datum needs to ensure
that all messages sent to the law firm in Brussels are sent through the VPN, and that all messages
coming from the law firm through the VPN are accepted without spam filtering.
All users in the A. Datum organization should have the option of sending secure email to any
recipients on the Internet. However, the network administrators at A. Datum do not want to manually
deploy the certificates required to enable and manage secure email. At the same time, it is important
that the users can implement and use secure email with as few problems as possible.
All messages that are sent to A. Datum must be scanned for viruses and filtered for spam before the
messages enter the network.
The messaging administrators at A. Datum have identified two third-party organizations on the
Internet that provide lists of SMTP servers on the Internet that are known to send spam messages.
The messaging administrators have also identified one organization that provides a list of SMTP
servers that are known not to be spammers. The messaging administrators would like to use the lists
provided by these organizations when configuring their anti-spam filters.
Messages sent from partner organizations such as Contoso, Ltd and the law firm in Brussels should
never be identified as spam.
The messaging administrators are planning on using content filters to block spam messages, but are
concerned that too many false positives will be filtered if they enable content filtering.
A. Datum has several distribution lists that include over 200 recipients. Users from the Internet should
not be able to send email to any of these distribution lists.
The messaging administrators at A. Datum are concerned about the number of messages coming into
the organization with spoofed SMTP domain names. They want to reduce the quantity of these sorts
of messages.
6-34
Many users are using the Safe Senders list in Office Outlook to ensure that messages from the users
on the Safe Senders list are not identified as spam. The Exchange Servers should be able to use this
information to ensure that messages from these users are not blocked before they get to the user
mailboxes.
All messages sent between users in the Exchange organization or sent to the Internet should be
scanned for viruses when the message is sent. Messages should be scanned only once for viruses
inside the organization.
All messages being sent to the Internet should be scanned for viruses as the message leaves the
organization.
If users receive a virus from an external messaging system or by downloading the virus from a
website, the virus should be detected as soon as possible in order to avoid infecting other systems.
At a minimum, antivirus files on all systems should be updated daily, and the antivirus files on all
systems that receive email directly from the Internet should be updated four times per day. If the
antivirus files on any messaging server are more than two update cycles out of date, the messaging
administrators should receive an alert.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 6-35
Security Requirements.doc
2.
Modify the A. Datum Proposed Security Policies document with a proposed message security plan.
3.
Task 2: Modify the A. Datum Proposed Security Policies document with a proposed
message security plan
Complete the relevant sections of the following document. In the document, provide:
Jason Carlson
12th March 2010
Configuration details
6-36
(continued)
A. Datum Proposed Security Policies
Component
type
Configuration details
Additional notes
Note
Question: How did you address the need to exchange secure email between the A. Datum
Corporation and Contoso, Ltd?
Question: Does your organization have a requirement for the Domain Security solution?
What barriers will there be to adopting this solution?
Results: After this exercise, you should have successfully designed message security for A Datum.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 6-37
Security Requirements.doc
2.
Modify the A Datum security Proposed Policies Document with a proposed antivirus and anti-spam
solution.
3.
Task 2: Modify the A. Datum Proposed Security Policies document with a proposed
antivirus and anti-spam solution
Complete both the Anti-Spam and Antivirus Solution Components sections of the following
document. In the document, provide:
Jason Carlson
12th March 2010
6-38
(continued)
A. Datum Proposed Security Policies
Anti-Spam Solution Components
Component type Configuration details
Sender ID
filtering
Safelist
aggregation
Blocked recipient
lists
Antivirus Solution Components
Component type Configuration details
Antivirus software
Antivirus software
Antivirus
stamping
Antivirus update
Additional notes
Note
Question: How did you design the antivirus and anti-spam solution for A. Datum
Corporation? How does this compare to the solution you would implement for your
organization?
Results: After this exercise, you should have successfully designed an antivirus and anti-spam strategy for
A Datum.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 6-39
2.
3.
4.
5.
6.
7.
8.
9.
On VAN-DC1, open a new MMC, and add the Certificate Templates snap-in.
2.
3.
Configure the following properties for the duplicate template, and then close the Exchange
Management Console:
a.
b.
2.
3.
2.
3.
In Group Policy Management Editor, expand User Configuration, expand Policies, expand Windows
Settings, expand Security Settings, and then click Public Key Policies.
4.
Configure the Certificate Services Client Auto-Enrollment with the following options:
a.
b.
Renew expired certificates, update pending certificates, and remove revoked certificates:
Selected
6-40
c.
5.
Close the Group Policy Management Editor, and then close the Group Policy Management console.
Switch to VAN-CL1.
2.
Open a command prompt, and at the command prompt, type gpupdate /force, and then press
Enter.
3.
Password: Pa$$w0rd
Domain: Adatum
2.
3.
Verify the presence of a certificate based on the S/MIME Certificate template in the Current
User\Personal certificate store.
4.
2.
Accept all defaultsEXCEPT in the Welcome to the Microsoft Office 2010 wizard, click Dont make
changes and then click OK.
3.
Password: Pa$$w0rd
Domain: Adatum
2.
3.
Verify the presence of a certificate based on the S/MIME Certificate template in the Current
User\Personal certificate store.
4.
2.
Accept all defaultsEXCEPT in the Welcome to the Microsoft Office 2010 wizard, click Dont make
changes and then click OK.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 6-41
2.
3.
4.
5.
In the Security Properties dialog box, select the following check boxes, and then click OK:
6.
In the Properties dialog box, click Close, and then click Send.
7.
Password: Pa$$w0rd
Domain: Adatum
2.
3.
4.
In the message, click the padlock symbol. Read the information, and then click Close.
5.
In the message, click the symbol next to the padlock symbol. Read the information, and then click
Close.
Results: After this exercise, you should have successfully implemented some aspects of the messaging
security design for A Datum.
2.
Right-click 10233B-VAN-DC1 in the Virtual Machines list, and then click Revert.
3.
4.
Repeat these steps for 10233B-VAN-EX1 and 10233B-VAN-CL1. Close the virtual machine connection
windows.
5.
In the Virtual Machines pane, click 10233B-VAN-DC1, and then in the Actions pane, click Start.
6-42
6.
To connect to the virtual machine for the next modules lab, click 10233B-VAN-DC1, and then in the
Actions pane, click Connect.
Note Start the 10233B-VAN-DC1 virtual machine first, and ensure that it is fully started
before starting the other virtual machines.
7.
Wait for 10233B-VAN-DC1 to start, and then start 10233B-VAN-EX1. Connect to the virtual machine.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 6-43
Review Questions
1.
On the Edge Transport server, which service holds the Edge Transport rules?
2.
You have established the required Edge Transport rules on one of the Edge Transport servers in your
perimeter network. Now you wish to duplicate the configuration. What is one way to easily duplicate
the Edge Transport rules?
3.
When selecting Basic authentication on a receive connector, what additional option should you
select?
4.
6-44
Best Practices
Supplement or modify the following best practices for your own work situations:
Always consider implementing TLS when configuring Basic authentication on Send or Receive
connectors.
Deploy an Edge Server in your perimeter network to more easily secure your organization against the
threats posed by viruses and malicious software contained in email messages.
Consider implementing an antivirus solution that can use multiple scan engines from multiple
vendors to maximize your changes of obtaining updates as quickly as possible.
Implement attachment stripping at the email gateway layer, and match the gateway-layer attachment
stripping policy with the attachment blocking policy that the client enforces.
7-1
Module 7
Planning and Deploying Messaging Compliance
Contents:
Lesson 1: Designing Transport Compliance
7-3
7-12
7-20
7-30
7-37
7-2
Module Overview
Microsoft Exchange Server 2010 provides a wide range of messaging compliance features that you can
use for more than just simple messaging and calendaring. You can use messaging compliance features to
control message transport, apply Rights Management Services (RMS), implement journaling and archiving,
and manage messages.
After completing this module, you will be able to:
Design Active Directory Rights Management Services (AD RMS) integration with Exchange Server
2010.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
Lesson 1
Transport compliance allows you to control messages as they are transported through the Exchange
Server organization. To implement transport compliance, you can use transport rules, message
classifications, and message moderation. These features can be used to control which users can send
messages, which users receive messages, and whether messages are modified.
After completing this lesson, you will be able to:
7-3
7-4
Key Points
Many organizations enforce transport compliance by controlling the senders and recipients of messages.
Exchange Server 2010 contains features that you can use to implement transport compliance, including:
Transport rules. Transport rules help you manage messages while messages are in transport. Each Hub
Transport server is responsible for applying transport rules to the messages that pass through it, and
each transport rule defines conditions that must be met for a transport rule to apply. If the conditions
are met, then the Hub Transport server performs the actions specified in the rule, such as modifying
the message, adding or removing recipients, and even deleting the message.
Moderated recipients. Moderated recipients control which recipients receive messages from other
recipients. When you send a message to a moderated recipient, a designated moderator must
approve that message before the message is delivered. In most cases, the moderated recipient is a
distribution group.
AD RMS integration. AD RMS integration controls what recipients can do with email messages. For
example, you can prevent users from printing or forwarding messages, and prevent unauthorized
users from reading messages.
Add disclaimers to messages. Many organizations may require Exchange Server to add specific, prewritten text to all messages sent from the organizations to external recipients. Instead of relying on
individual users to add the disclaimer, you can centrally implement and enforce the use of disclaimers
by using transport rules.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
7-5
Restrict users from sending messages to other recipients. Use transport rules and moderated
recipients to control which users can send messages to other recipients. For example, a transport rule
could prevent a user from sending messages outside the organization. Or, you can restrict the
messages sent to a distribution group by implementing moderated recipients.
Block or retain messages with specific content. Use transport rules to block or retain messages with
specific content. For example, you can create a transport rule that deletes all messages with the text
string guaranteed return. Or, you could forward all messages with the text string guaranteed
return to a mailbox so that they can be reviewed.
Restrict what recipients can do with a message. Use AD RMS to limit what recipients can do with a
message. For example, you could create a message intended for the company lawyer, and prevent
that message from being forwarded to other recipients.
Block messages to a specific email domain. Use transport rules to block messages addressed to a
specific email domain. For example, you could use a transport rule to delete all messages addressed
to the contoso.com domain. Or, if there are multiple recipients, you could remove all recipients in the
contoso.com domain.
7-6
Key Points
Transport rules provide you with an almost limitless ability to control messaging in your Exchange Server
organization. Always carefully plan your transport rules to ensure that they behave as intended.
Otherwise, you could accidentally delete messages, or deliver messages to unintended recipients.
When planning transport rules, do the following:
Plan conditions and exceptions carefully. Transport rule conditions and exceptions define which
messages are affected by the transport rule. If you implement the rules incorrectly, you may
unintentionally modify or delete messages.
Use regular expressions to check message contents. Use regular expressions to simplify the list of
terms when you are including a text string in a condition. You can use one regular expression, rather
than a list of variations on the same word. For example, when searching for a phone-number pattern,
you can use the expression \d\d\d(-|.)\d\d\d\d, which denotes a pattern of 3 digits, then a dot or
dash, and then four digits.
Test application of transport rules. Test new transport rules to ensure they behave as intended. This is
important because a new transport rule could conflict with existing transport rules.
Plan for transport rule limitations on encrypted and digitally signed messages. AD RMS integration
with Exchange Server 2010 enables you to implement transport rules and messaging policies when
you are using AD RMS Information Rights Management encryption to protect messages. Encryption
through other mechanisms may prevent the application of transport rules or records management.
For example, Exchange Server may not be able to scan encrypted messages for the text string
specified in a transport rule. Additionally, antivirus scanners cannot scan messages with encrypted
attachments.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
7-7
Use transport rules on Edge Transport servers to apply outbound message policies for delivery to
external recipients. Hub Transport servers apply transport rules, which results in unnecessary
processing for outbound messages. You can offload this processing to Edge Transport servers instead.
Additionally, in some cases, messages from external organizations may be relayed through Edge
Transport servers directly to another messaging organization, and not be processed by Hub Transport
servers at all.
Consider transport rule recovery. Deleted transport rules are not easily recoverable. Transport rules
are stored in Active Directory Domain Services (AD DS), and restoring rules from AD DS is a complex
process. Alternatively, documented transport rules are easy to recreate, and you can export transport
rules to backup files by using the Export-TransportRuleCollection cmdlet. However, when you
import transport rules onto a Hub Transport server, the server replaces all of the existing transport
rules for the organization.
7-8
Key Points
Message classifications organize messages and provide additional information about those messages.
They also can trigger transport rules. Both users and transport rules can apply message classifications.
Message classifications are visible in Microsoft Office Outlook 2007 or later, and Outlook Web App.
These tools display classification information when users view classified messages.
The default message classifications are:
Attachment Removed
Partner Mail
Note Exchange Server 2010 retains message classifications when upgraded from
Exchange Server 2007.
Develop custom message classifications. In most cases, you need to create your own custom message
classifications to meet organizational needs. To do this, determine which classifications are required
to meet organizational needs, and define the sender and recipient descriptions that appear when the
message is classified.
Plan for localized versions of message classifications. Each message classification can include alternate
sender and recipient descriptions associated with different locales. For multilingual organizations,
create localized versions of message classification descriptions so that recipients can read the
message classification in their preferred languages.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
7-9
Configure client file distribution for Office Outlook 2007 and Office Outlook 2010. These clients do
not use message classifications by default, and must be configured to do so. To configure Office
Outlook 2007 and Office Outlook 2010, distribute an XML file that contains the message
classifications. This XML file needs to be redistributed each time you modify message classifications.
You also need to configure registry entries. Outlook Web App supports message classifications by
default.
Configure transport rules. You can use transport rules to control how Exchange Server transports
classified messages based on company polices. For example, you can create a transport rule that
prevents messages with the Company Internal classification from being delivered outside the
organization. Additionally, you can use transport rules to apply message classifications based on
message content, senders, or recipients. For example, you can automatically assign the Legal
classification to any message that arrives from an external lawyer.
7-10
Key Points
Use message moderation to control which messages are delivered to specific recipients. In previous
Exchange Server versions, you could prevent recipients from sending messages to specific recipients, but
could not approve individual messages.
When planning message moderation, do the following:
Consider using moderation for large or confidential distribution groups. Many users within an
organization use large distribution groups for unauthorized messages of a personal nature, such as
fundraising activities. Enabling moderation allows you to control which messages are delivered to
groups that can include an entire physical location or organization.
Select an appropriate moderator. Ideally, a moderator is someone with authority to determine which
messages to allow, and which messages to block. In general, Exchange Server administrators should
not be moderators, because they are not closely linked to business decisions related to moderating
messages. For example, the moderator for a departmental distribution group also should be a
messaging user within that department. Remember that a busy group may generate many messageapproval requests. The moderator must have sufficient time to evaluate the moderated messages.
Configure appropriate moderation exceptions for groups. To reduce the load on a group moderator,
configure moderation exceptions. These exceptions should include senders that can be trusted to
determine appropriate content for the group.
Consider the role of group owners. A group owner can modify the membership list of a distribution
group, or approve membership requests. However, a group owner is not a moderator, and cannot
automatically approve messages sent to a moderated group. If the group owner also needs to
approve messages sent to a moderated group, then you must configure the owner as moderator of
the group.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
7-11
Plan for message moderation during upgrades. Previous Exchange Server versions do not support
message moderation. This can lead to unexpected results for message moderation. To ensure proper
moderation, you must route messages that are moderated by transport rules through an Exchange
Server 2010 Hub Transport server. Additionally, you must expand distribution groups with an
Exchange Server 2010 Hub Transport server to ensure that Exchange Server moderates messages
addressed to the groups.
Consider using moderated groups and transport rules. In addition to moderated groups, you also can
use transport rules to moderate message transport. This allows you to moderate messages based on
senders, recipients, text patterns, and many other useful scenarios. For example, you could moderate
all messages sent to the email domain of a competitor.
7-12
Lesson 2
You can integrate Exchange Server 2010 with AD RMS to provide additional protection for messages. As
part of planning AD RMS integration, consider how to best protect messages, and how external recipients
can access AD RMS to decrypt and view messages.
After completing this lesson, you will be able to:
Describe the options for integrating AD RMS with Exchange Server 2010.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
7-13
Key Points
AD RMS is a role of the Windows Server 2008 operating system that allows integrated applications to
secure document content. By using AD RMS with Exchange Server 2010, you can limit the recipients who
can read certain messages, prevent messages from being forwarded, and even prevent messages from
being printed. For integration to work, the client application must support AD RMS. Office Outlook 2007
and Office Outlook 2010 both support AD RMS for message protection. Mobile clients running the
Windows Mobile 6 operating system also support AD RMS for message protection. However, extra
configuration is required to support mobile devicesboth in AD RMS, and on the mobile device.
The options for integrating AD RMS and Exchange Server 2010 are:
Transport protection rules. A transport protection rule is a transport rule that applies an AD RMS
template. The AD RMS template defines the restrictions that Exchange Server places on messages. Use
the conditions in the transport rule to determine which messages are protected.
Outlook protection rules. An Outlook protection rule is similar in structure to a transport protection
rule, except it is applied at the Outlook-client level. The only conditions you can base this rule on are
FromDepartment, SentTo, and SentToScope. Within the Outlook client, users receive notification
when Outlook protection rules are applied. You can allow users to override the rules, which can be
useful when there may be exceptions to the normal rule that applies AD RMS templates. Only
Outlook 2010 supports Outlook protection rules.
Transport decryption. The first Exchange Server 2010 Hub Transport server within an organization
that handles a protected message decrypts the message for inspection. This allows the Hub Transport
server to apply transport rules based on message content, and to perform anti-spam and antivirus
scanning. The message is encrypted again before delivery to the next Hub Transport server. You can
configure Exchange Server 2010 to reject messages that it cannot decrypt, decrypt messages
whenever possible, or disable transport decryption.
7-14
Journal report decryption. To ensure that journaled content is accessible for compliance purposes,
you must enable journal report decryption. When enabled, Exchange Server decrypts the message
before attaching it to the journal report. Journal report decryption is enabled by default.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
7-15
Key Points
AD RMS server implementation is the most basic requirement for AD RMS integration. The AD RMS server
generates the certificates that protect message content and specify restrictions.
After you have configured AD RMS, do the following:
Train users to use AD RMS functionality. Users have the option to apply AD RMS templates to
messages. However, they will most likely not use this functionality unless you train them on how to
use the templates.
Consider adding additional templates. Exchange Server 2010 comes with one template, the Do Not
Forward template. This template is useful, but you may need additional templates that prevent
message modification, printing, saving, and copying.
Define the boundaries for AD RMS-protected messages. To decrypt and view protected messages,
clients must be able to access the AD RMS server. Within your organization, it is easy to provide
clients with access to the AD RMS server. However, if you allow AD RMS-protected messages outside
of the organization, you also need to provide external users with access to your AD RMS server.
Use transport protection rules to protect messages regardless of the client. Depending on the client
software, users may not be able to apply AD RMS templates. For example, Outlook protection rules
are only applicable to Outlook 2010 clients. To ensure that messages are protected regardless of the
client software, implement transport protection rules that protect messages at the Hub Transport
server level.
7-16
Key Points
AD RMS integration with external organizations is more complex than simply restricting AD RMS
deployment to your own organization. Before selecting the option for AD RMS integration with external
organizations, consider the following:
Can you create external user accounts in your Active Directory forest?
Do you need to enable AD RMS integration for all users in the external organizations?
Have the external organizations deployed Active Directory Federation Services (AD FS)?
Deploy an AD RMS server that is accessible from the Internet. If your AD RMS server is accessible from
the Internet, then external users can communicate with the AD RMS server to obtain the necessary
license certificates. This does not require the external organization to implement AD RMS, but it does
require you to create external user accounts in your Active Directory forest, or create a separate forest
with an AD RMS trust.
Configure trusted user or publishing domains. You can use both trusted user and trusted publishing
domains when the external organization has enabled AD RMS. These two integration methods allow
users in one organization to access content protected by AD RMS in the other organization.
Configure AD RMS integration with the Windows Live ID network of Internet services. Configure a
trust with Windows Live ID to allow protected content to be sent to any user with a Windows Live ID.
However, this option is suitable only for a small number of users, and does not allow the external user
to create protected content.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
7-17
Configure a federated trust by using AD FS. With this option, external clients contact the AD RMS
server in your organization, but AD FS performs authentication. Configuring this option means that
you do not need to create external user accounts in your Active Directory forest.
7-18
Key Points
Consider the following when implementing AD RMS integration:
Provide Outlook Web App for external users. Outlook Web App allows external users to use a web
browser to view protected messages. You still need to create user accounts for the external users, but
you do not need to provide external access to your AD RMS server. The Client Access server hosting
Outlook Web App communicates with the AD RMS server instead. By contrast, Outlook Anywhere
requires the client to communicate directly with the AD RMS server.
Support for clients running Windows Mobile is not enabled by default. Mobile clients running
Windows Mobile 6 support AD RMS for message protection. You must enable AD RMS on the
Windows Mobile device by connecting it to a computer that has the AD RMS client and either the
Microsoft Exchange ActiveSync technology or Windows Mobile Device Center installed. Also, you
must configure security on the AD RMS server to allow mobile devices.
Develop a plan for distributing AD RMS templates. AD RMS templates must be distributed to the
clients so that the clients can use them. You can use the Windows Vista operating system with
Service Pack 1 (SP1) or later, and Windows Server 2008 to automate template distribution to clients.
By default, these tools distribute templates every 30 days. You can also copy AD RMS templates to
clients as part of a Group Policy Object (GPO).
Ensure that only trusted users have access to the journal mailbox. Exchange Server stores all journaled
content in an unencrypted format, when journal report decryption is disabled. This means that
anyone with access to the journal mailbox can read the messages. If encrypted messages contain
confidential information, then increase security on the journal mailbox.
Develop a communication plan for users. AD RMS is a powerful tool for managing message usage.
However, you must teach users how to use AD RMS.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
7-19
Monitor the performance impact of encryption on Hub Transport servers. Transport protection rules,
transport decryption, and journal report decryption require a Hub Transport server to encrypt or
decrypt messages. Encryption and decryption are processor-intensive tasks that may cause
performance issues on the Hub Transport server. This is particularly true when the server processes
many messages.
7-20
Lesson 3
Exchange Server 2010 includes many features that can help you design message journaling and archiving.
Message journaling stores copies of specified messages in dedicated mailboxes. Personal archives provide
users with a more convenient alternative to using personal folders (PST) files. A litigation hold prevents
message deletion until a time specified by an administrator. Multi-Mailbox Search can search the entire
Exchange Server organization for relevant messages.
After completing this lesson, you will be able to:
Identify the requirements and options for message journaling and archiving.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
7-21
Key Points
Exchange Server 2010 includes new and enhanced features to improve message journaling and archiving.
These features are:
Message journaling. When you implement message journaling, Exchange Server copies specified
messages to a dedicated mailbox where they are retained until an administrator reviews them.
Litigation hold. When you implement a litigation hold for a mailbox, Exchange Server never purges
the mailboxs deleted messages, so they remain searchable with Multi-Mailbox Search.
Multi-Mailbox Search. When implemented, Multi-Mailbox Search enables authorized users to search
all mailboxes in the organization. This includes content in litigation hold and single-item recovery.
Personal archives. When implemented, personal archives provide users with an alternative to using
PST files to store historical data. Exchange Server creates personal archives as additional mailboxes
that are linked to the original user mailbox. The personal archive can be in the same mailbox
database as the original user mailbox or in a different mailbox database.
Messages sent to or by members of a distribution group must be retained. You can create a transport
rule that journals messages sent to the distribution group or sent by members of the distribution
group.
Messages sent or received by specific users must be retained. You can enable a litigation hold on any
user mailbox, in order to retain all messages sent or received by that user indefinitely.
Messages must be searchable for specific types of content. You can use Multi-Mailbox Search to
search any mailbox in the Exchange Server organization.
7-22
Users must store all messages in an Exchange Server database. You can enable personal archives,
import PST contents into the archives, and then disable the ability to use PST files.
Messages sent by users in a specific mailbox database must be retained. You can enable message
journaling on a mailbox database to capture all of the messages sent or received by mailboxes in that
mailbox database.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
7-23
Key Points
You can implement message journaling at multiple levels to collect only the specific messages you
require. You can then copy these messages to a local mailbox or to any other valid Simple Mail Transfer
Protocol (SMTP) address.
You can configure message journaling as follows:
On a specific mailbox database. Exchange Server journals all messages that are sent to or from
mailboxes in the mailbox database. This is the only type of journaling that does not require a
Microsoft Enterprise client access license (CAL) for Exchange Server.
On a specific recipient. Exchange Server journals all messages that are sent to or from a specific
recipient, by using a journal rule.
As part of managed folder policies. You can use managed folder polices to journal messages before
they are removed from user mailboxes. However, managed folder policies cannot be combined with
retention policies. So, this option for journaling is not appropriate for many organizations. Retention
policies move expired messages to a personal archive instead of journaling them.
7-24
Key Points
When planning message journaling, do the following:
Identify which messages you should journal. Journal only the specific messages that are required. This
limits the storage space used by the journal mailbox.
Identify the type of message journaling to implement. After determining which messages to journal,
identify the journaling method required to journal those messages.
Identify the journal mailbox. Journal mailboxes receive all of an organizations journaled messages. In
most cases, the journal mailbox is located in a separate mailbox database or Mailbox server from the
source of the journaled messages. This prevents journaled content from affecting user mailbox
performance. You can also host a journal mailbox in a separate email system for security purposes.
Plan for multiple sites in large organizations. Large organizations can generate high levels of message
traffic. You can increase wide area network (WAN)-link utilization if you locate journal mailboxes
across a WAN-link from where the journaled messages are generated.
Consider a litigation hold as an alternative to journaling. A litigation hold retains messages and makes
them searchable without requiring message copies to be stored in another mailbox.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
7-25
Key Points
The journal mailbox contains journaled messages. Securing the journal mailbox and managing its size are
very important. Consider the following for the journal mailbox:
Plan for the maximum size of the journal mailbox. Allocate an appropriate amount of space for the
journal mailbox. Base the allocated space on the expected number of journaled messages and their
expected size. Use quotas to identify when the journal mailbox grows too large.
Define a process for addressing over-quota journal mailboxes. Determine how to address a journal
mailbox that grows past its quota. In some cases, you may have sufficient disk space to increase the
quota. In other cases, you may decide to remove content from the journal mailbox.
Use MRM to automate message removal. You can remove messages from the journal mailbox after
backing them up and ensuring they are recoverable from offsite storage. To simplify the process, use
MRM to automatically remove journaled messages after a specific time determined by your backup
schedule.
Place the journal mailbox in a separate database to provide backup flexibility. Exchange Server 2010
backups are performed at the database level. If you place the journal mailbox in a separate database,
you can back up the journal mailbox on a different schedule than user mailboxes.
Control who can access journal mailboxes. Most likely, your journal mailboxes contain confidential
information that should not be available to most users. Ensure that only authorized users can access
the contents of the journal mailboxes.
Ensure legal compliance. To ensure that your plan meets legal requirements, obtain approval from
legal representatives.
7-26
Key Points
You can enable personal archives for individual mailboxes that are hosted on an Exchange Server 2010
Mailbox server. Personal archives are additional mailboxes that are linked to a users primary mailbox.
These mailboxes appear and are accessible when users open Outlook 2007, Outlook 2010, or Outlook
Web App.
When planning personal archiving, do the following:
Consider the impact of personal archives on Mailbox server storage. Personal archives reduce user
mailbox size. However, they do not reduce the total storage utilization because the archived
messages are still stored in a mailbox database, Importing PST files into the archive results in higher
storage utilization. To reduce the impact on storage utilization, you can implement cloud-based
personal archives.
Consider which mailbox database to use for storing personal archives. If you keep personal archives in
the same mailbox database as the users primary mailbox, you reduce overall I/O because fewer
mailboxes are kept on a single disk. However, if you place personal archives in a different mailbox
database than the users primary mailbox, you can specify a different backup schedule for personal
archives.
Selectively enable personal archives. Not all users require them. Enable personal archives only for
users who need additional space for archiving messages, as determined by your organizational
policies.
Consider disabling access to PST files. PST files are difficult to manage because users create them,
sometimes in locations that are not backed up. If you provide personal archives, consider disabling
access to PST files to simplify management and to help ensure that all message data is backed up.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
7-27
Ensure that you have the correct versions of Outlook to support viewing personal archive contents.
Not all versions of Outlook support personal archives. The version of Outlook that is included in the
following editions of Microsoft Office do not provide access to personal archives:
Develop policies for managing personal archive contents and quotas. The personal archive is not
considered part of a user mailbox when quotas are calculated. However, you can define quotas that
are specific to the personal archive. As with primary mailboxes, the organization should establish
consistent company policies regarding what content should be stored in personal archives and
regarding personal archive quotas.
7-28
Key Points
Use a litigation hold to help ensure that messages are not purged from specified mailboxes. You typically
use this feature to ensure that all messages can be found in the case of potential or ongoing legal actions.
To enable a litigation hold, use the Set-Mailbox mailboxname LitigationHoldEnabled $true cmdlet.
When enabled, the litigation hold retains all versions of messages that have been modified.
Consider the following when implementing a litigation hold:
Enable a litigation hold only if required. If you implement a litigation hold for a large number of
mailboxes, the mailbox database size can grow quickly because messages cannot be deleted.
Messages in recoverable items (removed from Deleted Items) do not count toward the mailbox
quota. You do not need to do any special planning for user quotas when a litigation hold is enabled
for a mailbox.
There are quotas for recoverable items that can be set on a per-mailbox basis. The
RecoverableItemsWarningQuota is set to 20 GB by default, and an event is generated in the
Application log of the Mailbox server when the quota is reached. The RecoverableItemsQuota is set to
30 GB by default, and users cannot delete items when the quota is reached.
Note The RecoverableItemsQuota default configuration is derived from a setting on the
mailbox database that holds the mailbox.
Use the Legal Hold role to delegate management of litigation holds. In many cases, the manager
responsible for designating which users are subject to a litigation hold may not want to share that
information with Exchange Server administrators. You can delegate the ability to enable a litigation
hold by using the Legal Hold role.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
7-29
Key Points
In previous Exchange Server versions, you cannot easily search an organization to find messages with
specified content. Multi-Mailbox Search in Exchange Server 2010 provides efficient search capabilities
across entire Exchange Server organizations, because it uses the indexes already created for the feature,
Exchange Search. You can access items that are recoverable with single-item recovery, or with a litigation
hold, by using Multi-Mailbox Search.
Multi-mailbox searches are often referred to as discovery searches. Discovery search results are stored in a
discovery mailbox. By default, there is one discovery mailbox named Discovery Search Mailbox. You
should create additional discovery mailboxes for distinct users or groups that perform discovery searches.
This helps ensure that access to the results of the searches are limited to only those authorized to perform
the searches. For example, the team performing searches for legal purposes may have access to different
mailboxes than the help desk staff recovering deleted messages from mailboxes.
Members of the Discovery Management role group can perform discovery searches across the entire
Exchange Server organization. In many cases, you will want to limit the scope of discovery searches. You
can use the Mailbox Search role to configure limited scopes for users performing discovery searches.
Auditors are likely candidates for assignment to the Discovery Management role group or the Mailbox
Search role.
You can use the Advanced Query Syntax format to generate search queries that are more specific than the
options provided in the basic user interface. If you have users who perform many discovery searches,
provide them with information about Advanced Query Syntax to make their searching more efficient.
You can use mailbox audit logging to track the use of Multi-Mailbox Search. Mailbox audit logging was
introduced in SP1 for Exchange Server 2010, but it is not enabled by default. You must enable mailbox
audit logging on each mailbox.
7-30
Lesson 4
Use messaging records management (MRM) to control the lifetime of messages in an Exchange Server
organization. With MRM, you can define when to archive or delete messages in compliance with your
organizations messaging policies.
After completing this lesson, you will be able to:
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
7-31
Key Points
MRM automates messaging management. You can apply policies centrally at the server level, or users can
apply policies directly to messages and folders.
Exchange Server 2010 MRM options are:
Retention policies. You can combine multiple retention policy tags, multiple personal tags, and the
default policy tag into one retention policy. MRM applies the retention policy to mailboxes. The
retention tags in a retention policy can specify that messages are archived or deleted.
Retention policy tag. A method for applying retention settings to a specific folder and its
subfolders.
Personal tag. A method in which users manually apply retention settings to a folder or item. A
personal tag overrides a retention policy tag.
Default policy tag. The policy tag with retention settings that applies to any item that is not
tagged explicitly by the user and is not in a folder subject to a retention policy tag.
Managed folder policies. A managed folder policy combines the settings for both managed default
folders and managed custom folders into a single unit that MRM applies to user mailboxes. A
managed folder can contain content settings that move, delete, or journal messages in a specific
folder. Managed folders are provided primarily for compatibility with Exchange Server 2007.
Retention policies are the preferred method for implementing MRM.
Deleting messages in specified mailbox folders after a specified time. Apply retention settings to
managed default folders or to managed custom folders, if messages should be deleted from only a
few folders. Use a default policy tag if messages should be deleted from all folders without applying
another retention policy.
7-32
Allowing users to mark specific messages for retention. Use personal tags to allow users to manage
retention of their own folders and items.
Automatically moving messages to the personal archive at specified times. Use a retention policy with
the necessary retention tags to archive messages at the appropriate times.
Retaining messages related to specific projects. Configure managed content settings for custom
folders into which users move messages. Users can apply personal tags to manage messages that are
not stored in a custom folder.
Journaling messages when they are automatically deleted from user mailboxes. Use managed content
settings for the entire mailbox-managed default folder to journal messages if they are automatically
deleted. This can be overridden by managed content settings applied to a specific folder.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
7-33
Key Points
You can apply only one retention policy to a mailbox. This means that you need to carefully plan the
retention tags for that policy. You may create several retention policies with different combinations of
retention tags to meet the needs of different user categories.
Even after you create and apply retention policies, users still have control over the retention process. Users
can control the process by moving messages into a folder with appropriate retention settings, or by
assigning personal tags to individual messages or folders.
When planning retention policy deployment, do the following:
Plan retention policy tags for default folders such as Inbox. To manage default-folder content, create
retention policy tags, and then use them in retention policies that you apply to mailboxes.
Plan a default policy tag. To manage content in folders that are not assigned a retention policy tag,
create a default retention policy tag, and include it in the retention policy.
Minimize the number of personal tags. Limiting the number of personal tags simplifies the retention
system for users. Users are more likely to use a simple system and to make fewer mistakes in applying
personal tags.
Base retention policies on compliance requirements. To create retention policies that meet the needs
of the organization, understand the business and regulatory requirements for messaging compliance.
Provide training on how to use retention policies. In particular, show users how AutoTagging
simplifies message retention by learning from past tagging performed by the user. A minimum of 500
tagged messages are required to enable AutoTagging. AutoTagging is an Outlook 2010 feature.
Use a retention hold for users who are out of the office for extended periods of time. Retention holds
prevent retention policies from being applied to a mailbox. If a user is away for an extended period of
time, this prevents messages from being archived until the user returns and can read the messages.
7-34
Key Points
Managed folders provide interoperability with Exchange Server 2007, and are supported by Exchange
Server 2010. If you are implementing MRM and have completely upgraded to Exchange Server 2010, then
use retention policies rather than managed folders. If you have a mixed Exchange Server 2007 and
Exchange Server 2010 organization, you may want to use managed folders to provide a consistent way to
manage mailbox content.
When planning a managed folder deployment, do the following:
Plan managed folder policies based on departments or project groups. Create managed folder
policies for groups that have similar needs. In most cases, departments or project groups have similar
needs and use the same managed folder policy.
Use managed custom folders and journaling to assist with message retention. The managed content
settings that you apply to managed folders do not have an option for archiving messages. Instead,
you can journal messages when they expire.
Implement a default managed folder policy for all users, and also custom managed folder policies as
needed. You can create a managed folder policy that meets the needs of most users in your
organization, and apply that policy to all mailboxes as the default. Then, you can create custom
managed folder policies for groups with special needs.
Provide user training for default folders and custom folders. Train your users so that they understand
the actions that are performed on messages as they move them to different folders. This prevents
confusion when messages are automatically deleted from specific folders.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
7-35
Key Points
After you implement Exchange Server 2010 in your organization, you should migrate from using
managed folder policies to using retention policies. This way, you can take advantage of the new features
in retention policies, such as archiving messages to a personal archive.
Do the following when planning migration from managed folder policies to retention policies
Create retention policies based on the settings in your managed folder policies. If your organizational
needs remain the same for MRM, identify how you can get a similar effect from retention policies as
you did from managed folder policies. In some cases, you cannot replicate the same functionality. For
example, you cannot journal messages by using a retention policy.
Be aware that when you apply a retention policy to a mailbox, the managed folder policy is removed.
This ensures that there is no conflict between retention policies and managed folder policies.
Apply retention policies to mailboxes as you deploy Outlook 2010. Only users with Outlook 2010 or
Outlook Web App can apply personal tags to messages and folders. The mailboxes of users with
previous versions of Outlook are still affected by retention policy tags and default policy tags based
on folders.
Train users in the differences between retention policies and managed folder policies. Retention
policies do not require users to move messages to specific folders. Unlike managed folder policies,
retention policies do not require users to move messages to specific folders for the retention settings
to apply. Users can manually apply personal tags to individual messages or can use AutoTagging.
7-36
Key Points
Communicating with your users is an essential part of implementing messaging compliance. Users need to
understand which tasks Exchange Server 2010 performs automatically, and how they can customize the
process to meet their needs.
Question: How do you communicate IT environment changes to users?
Question: How do you pilot and implement significant changes to your environment?
Question: How will you ensure that users follow messaging policies?
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
7-37
Lab Setup
For this lab, you will use the available virtual machine environment. Before you begin the lab, you must do
the following:
1.
On the host computer, click Start, point to Administrative Tools, and then click Hyper-V Manager.
2.
Ensure that the 10233B-VAN-DC1 and 10233B-VAN-EX1 virtual machines are running.
3.
Lab Scenario
You are a messaging engineer for A. Datum Corporation, an enterprise-level organization with multiple
locations. A. Datum is an international corporation involved in technology research and investment, and it
is planning to upgrade from Exchange Server 2003 to Exchange Server 2010.
You are aware of the new messaging compliance features in Exchange Server 2010, and need to
determine how you will implement them to meet the needs of your organization.
7-38
Before Exchange Server 2010 sends messages to recipients on the Internet, it must add a disclaimer
that was approved by the Legal department.
Messages sent to Internet recipients from members of the Sales team must include a different
disclaimer with the messages.
Messages with a Company Internal classification must be blocked from being sent to the Internet.
When users try to send messages with this classification to the Internet, they should receive a
response stating that they are not allowed to send messages with this classification to the Internet.
A small group of senior executives and a few board members make up a Strategic Acquisitions team.
These users should be able to send each other messages that are clearly marked as Acquisitions
Confidential, and the messages should never be sent to users who are not on this team.
2.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
Jason Carlson
15th Apr 2010
Requirement Overview
Determine how you will manage message transport.
Proposals
Question: Are transport rules required? If so, how should you configure them?
Question: Is message moderation required? If so, how should you configure it?
Question: Are message classifications required? If so, how should you configure them?
Note
Results: After this exercise, you should have created a message transport plan.
7-39
7-40
I have also been speaking with our auditors. They need to be able to monitor and track some
communication in the organization. One item is that all messages sent to the Executives group need to be
monitored. Auditors will review these messages from time to time. In addition, auditors need to be able to
monitor communication for specific users when legal proceedings are initiated. The auditors need the
ability to initiate this process and review all messages. It is important that no messages are deleted for the
specified users.
The main tasks for this exercise are as follows:
1.
2.
3.
Question: In the Message Compliance Interview, what points are raised that impact your
journaling and archiving plan?
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
Jason Carlson
15th Apr 2010
Requirement Overview
Determine how you will configure journaling and archiving.
Proposals
Question: Are personal archives required?
Question: How can users access personal archives? Does this affect which users will receive
personal archives usage?
Note
Results: After this exercise, you should have created a journaling and archiving plan.
7-41
7-42
2.
3.
Question: In the Message Compliance Interview, what points are raised that impact your MRM
plan?
Jason Carlson
15th Apr 2010
Requirement Overview
Determine how you will implement MRM.
Proposals
Question: Will you use managed folder policies for MRM? If so, how should you configure them?
Question: Will you use retention policies for MRM? If so, how should you configure them?
Note
Results: After this exercise, you should have created an MRM plan.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
7-43
Prevent Company Internal classification messages from being sent to the Internet.
2.
3.
4.
5.
6.
Task 1: Prevent Company Internal classification messages from being sent to the
Internet
1.
2.
At the shell, type the following command, and then press ENTER:
New-MessageClassification -name Company Internal Displayname Company Internal
-DisplayPrecedence Highest -RetainClassificationEnabled $true
-senderdescription This message is for internal distribution only; it will not be
forwarded on to the Internet
3.
At the shell, type the following command, and then press ENTER:
new-systemmessage dsncode 5.7.999 text Internal recipients only
Internal $True language En
4.
In the Exchange Management Console, on the Hub Transport node under Organization
Configuration, create a new transport rule with the following properties:
Condition 1: sent to users that are inside or outside the organization, or partners = Outside
the organization
Exceptions: None
On VAN-EX1, open the Microsoft Internet Explorer browser, and then navigate to
https://van-ex1.adatum.com/owa.
2.
3.
7-44
4.
In the Password box, type Pa$$w0rd, and then click Sign in.
5.
6.
7.
On VAN-EX1, in the Exchange Management Console, filter the Mailboxes view to list only those in
Mailbox Database 1.
2.
Select all of the mailboxes, and then enable archives in Mailbox Database 1.
2.
On the Retention Policy tab, view the properties of the Default Archive and Retention Policy.
2.
On VAN-EX1, in the Exchange Management Console, create a new retention policy tag with the
following settings:
Action to take when the age limit is reached: Delete and Allow Recovery
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
3.
7-45
Retention policy tags: Default 1 year archive, Deleted Items 30 day removal
Mailboxes: none
2.
Add a the following expression to the existing filter that prevents the Discovery Mailbox from being
displayed:
3.
After applying the filter, select all of the mailboxes, and then open Properties.
4.
On the Mailbox Settings tab, apply the Standard Mailbox Retention Policy to all of the mailboxes.
5.
Verify that the Standard Mailbox Retention Policy is applied to Paul West by viewing the Messaging
Records Management properties for his mailbox.
Results: After this exercise, you should have prevented messages classified as Company Internal from
being sent to the Internet, created a retention policy, and applied it to all of the mailboxes in Mailbox
Database 1.
2.
Right-click 10233B-VAN-DC1 in the Virtual Machines list, and then click Revert.
3.
4.
Repeat these steps for 10233B-VAN-EX1, 10233B-VAN-EX2, and 10233B-VAN-EX3. Close the virtual
machine connection windows.
5.
In the Virtual Machines pane, click 10233B-VAN-DC1, and then, in the Actions pane, click Start.
6.
To connect to the virtual machine for the next modules lab, click 10233B-VAN-DC1, and then, in the
Actions pane, click Connect.
Important: Start the 10233B-VAN-DC1 virtual machine first, and ensure that it is fully
started before starting the other virtual machines.
7.
Wait for 10223B-VAN-DC1 to start, and then start 10223B-VAN-EX1. Connect to the virtual machine.
8.
Wait for 10233B-VAN-EX1 to start, and then start 10223B-VAN-EX2. Connect to the virtual machine.
9.
Wait for 10233B-VAN-EX2 to start, and then start 10223B-VAN-EX3. Connect to the virtual machine.
7-46
Review Questions
1.
What is the relationship between retention policy tags and retention policies?
2.
3.
Can you apply message moderation to recipients other than distribution groups?
4.
Can Exchange Server 2010 prevent messages that meet specific criteria from being forwarded to
other users?
Replace managed folder policies with retention policies as you migrate mailboxes to Exchange Server
2010 and Outlook 2010.
Provide users with training on how to apply personal tags and use AutoTagging.
8-1
Module 8
Planning and Deploying High Availability
Contents:
Lesson 1: Introduction to High Availability Planning in Exchange Server 2010
8-3
8-14
8-25
8-32
8-45
Module Overview
Messaging systems are considered a critical business tool in most organizations. Outages of even a few
hours reflect poorly upon the IT departments, and can result in lost sales or loss of business reputation.
High availability helps ensure that messaging systems built on Microsoft Exchange Server 2010 can
survive the failure of a single server, or even multiple servers. You can implement high availability for all
the server roles in Exchange Server 2010.
After completing this module, you will be able to:
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
8-3
Lesson 1
Before you can begin planning a highly available Exchange Server 2010 organization, you need to
understand the options for providing high availability for each server role. Then, you can select the
options that are most appropriate for your organization. In this lesson, you will learn what high availability
is, and how you can implement high availability for Exchange Server 2010 roles.
After completing this lesson, you will be able to:
Describe the components that must be highly available to help ensure Exchange Server availability.
Key Points
Availability refers to a level of service that applications, services, or systems provide, and is expressed as
the percentage of time that a service or system is available. Highly available systems have minimal
downtimewhether planned or unplannedand are available more than 99 percent of the time,
depending on the needs and the budget of the organization. For example, a system that is unavailable for
8.75 hours per year would have a 99.9 percent availability rating.
To improve availability, you must implement fault-tolerance mechanisms that mask or minimize how
failures of the services components and dependencies impact the system. You can achieve fault tolerance
by implementing redundancy for single points of failure.
If all hardware and software on the primary server are functioning correctly, and the application is
ready to accept all user connections, then does the solution provide 100 percent availability?
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
8-5
If there are 100 users, but 25 percent cannot connect because of a local network failure, does the
solution still provide 100 percent availability? In this situation, the solution meets the 100 percent
availability expectations of 75 percent of the users, but for the rest of the users, it does not. How do
we consider this as part of the availability, because not all of the users are affected?
If only one user out of 100 can connect and process work, is the solution only 1 percent available?
If all 100 users can connect, but the service is degraded with only two out of three customer
transactions being available, or performance is poor, how does this affect availability measurements?
The availability measurement period also can have a significant effect on the definition of availability.
For example, a requirement for 99.9 percent availability over a one-year period allows 8.75 hours of
downtime, whereas a requirement for 99.9 percent availability over a rolling four-week window allows
only 40 minutes of downtime per period.
Outages
It also is necessary to identify and negotiate downtime periods for planned maintenance activities, service
pack updates, and software updates. These are scheduled outages, and typically not included as
downtime when calculating the systems availability. You typically calculate availability based on
unplanned outages, such as a system crash. However, you have to negotiate exactly which outages you
consider to be downtime.
Question: How does your organization define high availability for services?
Key Points
When an application requires high availability, you need to consider more than just the application
components. All of the infrastructure and services that the application relies on also must be highly
available. This also applies to Exchange Server 2010.
Some of the additional components that you must consider include the following:
Data center infrastructure. The room that stores the server must have sufficient power and cooling
capacity, which must also be highly available. You can make power highly available by ensuring that
an alternate power sourcesuch as a battery or a generatoris available when the electrical utility
experiences outages. You can make cooling capacity highly available by using multiple cooling units
with sufficient capacity to keep the data center cool when one unit fails. In cases of a catastrophic
failure, you can use an alternate data center location.
Server hardware. To make server hardware highly available, there must be redundant components in
the server. Redundant components can include power supplies, network adapters, processors, and
memory. Error-correction code (ECC) memory helps to resolve minor errors in memory.
Storage. To make storage highly available on a single server, you can use a version of Redundant
Array of Independent Disks (RAID). RAID uses parity information to ensure that a server can survive
the loss of at least one hard drive without losing any data. If multiple servers are available, you can
replicate data between servers. This allows the data to survive the loss of an entire server, rather than
just a hard drive.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
8-7
Network infrastructure. To make a local area network (LAN) highly available, you must introduce
redundant components. Within a LAN, this typically means redundant switches. Even moderately
priced switches include redundant configurations. To make the network connectivity for any
individual computer fault-tolerant, you must configure redundant network interface cards on the
computer. This is a standard feature in most mid-level and higher servers. High availability for a wide
area network (WAN) is typically the responsibility of the WAN service provider. However, if you are
using private links for your WAN, you can create redundant paths through the WAN.
Internet connectivity. For highly available Internet access, you must have redundant Internet
connectivity. Ideally, you would use two different Internet service providers (ISPs), and two different
physical connectivity methods. For example, one ISP could be land-based, and the other wireless. If
you use these methods, it is unlikely that a problem affecting one ISP would affect the other. Many
firewalls and routers are capable of using one connection for Internet connectivity and failing over to
another if the primary service fails. For incoming email, you must use multiple mail exchange (MX)
resource records, with one record pointing at the IP address allocated by each ISP.
Network services. Active Directory Domain Services (AD DS) and Domain Name System (DNS) are
the two services that must be highly available to support highly available Exchange Server 2010
organizations. To make AD DS highly available, you should have multiple domain controllers and
global catalog servers. Depending on the size of a location, there may be multiple domain controllers
and global catalog servers in a single location. To make internal DNS highly available, you must have
multiple DNS servers with DNS information synchronized between them. By default, the DNS zones
for AD DS are Active Directoryintegrated, and replicated between all DNS servers in the forest.
Question: Which infrastructure is highly available in your organization?
Key Points
A Database Availability Group (DAG) is a logical grouping of servers that you can use to provide high
availability for mailbox databases. A DAG can contain up to 16 servers. A mailbox database has a single
active copy on one of the servers in the DAG. Client requests are serviced by the active database copy.
Each mailbox database in a DAG can have one or more passive copies. Continuous replication copies
transaction log data from the active database to the passive copies. The logs are played on passive copies
of the database to update them with the same information as the active copy of the database. Continuous
replication file mode, which copies full transaction log files, is used initially. When all transaction log files
are copied and up to date, continuous replication block mode is used. Continuous replication block
mode replicates each file write to the active transaction log. Continuous replication block mode reduces
synchronization latency between the active and passive copies of a database. It also removes the current
log file as a single point of failure during failover.
If passive database copies are using continuous replication file mode and a failover occurs, any missing
transaction logs are copied to a passive copy before activation. If the missing transaction logs cannot be
copied, nonreplicated messages are recovered from the transport dumpster on Hub Transport servers. The
transport dumpster keeps a copy of messages until they are replicated.
DAGs require the clustering feature in the Windows Server 2008 operating system. However, the Active
Manager component is responsible for directing Client Access servers to the active copy of the database.
The Active Manager runs on all Mailbox servers that are DAG members, and runs as either the primary
active manager or a standby active manager.
The primary active manager is the Active Manager in a DAG that decides which copies are active and
passive. It is also responsible for processing topology change notifications and for reacting to server
failures.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
8-9
The standby active manager provides information to other components of Exchange Server about which
server hosts the active copy of a mailbox database. For example, the RPC Client Access service on a Client
Access server communicates with the Active Manager to determine the location of a mailbox for a user.
The standby active manager also detects local database and local information store failures. It reacts to
failures by sending a request to the primary active manager to initiate a failover (if the database is
replicated).
Note As an administrator, you do not manage which servers are primary active manager
or passive active manager. The process is completely automatic.
A DAG protects against corruption of individual database pages. The most common type of database
corruption is caused by small physical errors on disks. This type of error can cause individual database
pages to be corrupted. When a request is made to an active database for a corrupted page in the
database, the corrupted page is retrieved from a passive database copy and the active database is
repaired.
8-10
Key Points
After you add a Mailbox server to a DAG, the mailbox database is not automatically replicated to other
nodes in the DAG. You control which servers in a DAG have a copy of a specific database. Not all
databases need to have the same number of copies. In a 16-node DAG, one database can have 16 copies,
while another database is not redundant and contains only the one active copy.
When you implement a database copy, you must configure the activation settings. The activation
preference number controls the order in which passive database copies are activated when all passive
copies are up to date. If not all database copies are up to date, an up-to-date database copy is preferred
regardless of the activation preference number.
You can disable activation for a specific database copy. If you are performing maintenance, you may want
to disable activation to prevent a database from failing over to an alternate server. You may also want to
disable activation for a database copy in a remote site that is used only for disaster recovery.
For each passive copy of a database, you have the option to set a replay lag. The replay lag controls how
far behind the transaction logs are in replaying compared to the original source. For example, the active
mailbox database plays the transaction logs immediately, to place the data into the database. The replay
of logs on a passive database copy is delayed by the time period that you specify. In cases where the
transaction logs contain data that causes a logical corruption of the database, you can prevent the bad
data from being replayed on the passive copy because of the replay lag.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
8-11
Truncation lag controls how long transaction logs are retained before they are deleted. In a DAG, with at
least three database copies, it is common to configure circular logging on the database because a
database restore will never be performed. If circular logging is enabled, the transaction logs are deleted
shortly after they are played into the database. If you configure a truncation lag on a database copy,
transaction logs are kept for recovery in case there are problems with the transaction logs on the active
database copy. If circular logging is not enabled, a transaction log file is not eligible for truncation until it
is backed up. A transaction log file is also not eligible for truncation until it is replicated to all database
copies and played on all database copies that are not lagged.
Question: Do you anticipate using replay lag in your organization?
8-12
Key Points
Exchange Server 2010 includes the shadow redundancy feature, which provides redundancy for messages
for the entire time they are in transit. This is in addition to the transport dumpster. With shadow
redundancy, the message deletion from the transport databases is delayed until the transport server
verifies that the next hop for that message has completed delivery. If the next hop fails before reporting
back successful delivery, the message is resubmitted for delivery to that next hop.
When messages are delivered externally, many SMTP servers on the Internet do not support discard
status. If discard status is not supported, the final transport server in the Exchange 2010 organization
marks the message as delivered after delivery to the external SMTP server. Shadow redundancy is not
used if the next hop does not support it.
Incoming messages from the Internet do use shadow redundancy. The first transport server in the
Exchange 2010 organization delays the acknowledgement of message receipt for up to 30 seconds while
it delivers the message to the next transport server. If the first transport server fails at this point, the SMTP
server on the Internet resends the message. If the first transport server cannot send the message to the
next transport server within 30 seconds, the acknowledgement is sent to the Internet SMTP server to
indicate successful message delivery, and the message remains queued for delivery on the first transport
server.
Shadow redundancy provides the following benefits:
Eliminates reliance on the state of any specific Hub Transport or Edge Transport server. As long as
redundant message paths exist in your routing topology, any transport server becomes disposable.
If a transport server fails, you can simply remove it from production without worrying about emptying
its queues or losing messages.
If you want to upgrade a Hub Transport or Edge Transport server, you can bring that server offline at
any time without the risk of losing messages.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
8-13
Eliminates the need for storage hardware redundancy for transport servers.
Consumes less bandwidth than duplicate copies of messages on multiple servers. The only additional
network traffic generated with shadow redundancy is the exchange of discard status between
transport servers. Discard status is the information each transport server maintains, indicating when
the transport database is ready to discard a message.
8-14
Key Points
A client access array is a load-balanced collection of Client Access servers that is in a single site. Because
all client connectionsincluding Messaging Application Programming Interface (MAPI)rely on
connections to Client Access servers, it is important to provide a redundant server array to improve
availability. To create a client access array, first deploy multiple Client Access servers. Next, use either
hardware-based or software-based Network Load Balancing (NLB) to create a cluster. Then, add the name
for the network load-balanced cluster into DNS. For example, you could add a host (A) resource record for
caa1.contoso.com that points to 10.10.10.25. After adding the DNS record, you can create the client
access array and assign it to an Active Directory site using the New-ClientAccessArray cmdlet. Finally,
assign the client access array to each of the mailbox databases in the site by using the SetMailboxDatabase cmdlet with the RpcClientAccess parameter.
A client access array can exist only in a single Active Directory site. Therefore, you need to create a client
access array in each Active Directory site that needs to load balance client access servers.
As a best practice, you should create the client access array before you create mailbox databases. When
new mailbox databases are created, the RpcClientAccess parameter is automatically configured to use a
client access array if one exists for that site. This avoids the need to update mailbox databases later.
Question: Why is high availability important for Client Access servers?
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
8-15
Lesson 2
You can implement high availability for mailbox databases by using a DAG. When you implement a DAG,
there are unique considerations that you must take into account. Proper design for a DAG ensures
sufficient performance and redundancy. A poorly designed DAG may not provide any redundancy for
mailbox databases, or may experience performance issues when one or more Mailbox servers fail.
After completing this lesson, you will be able to:
8-16
Key Points
When you implement a DAG, you must ensure that you meet a number of very specific requirements. You
need to consider the requirements related to general configuration, operating system version, network
configuration, and DAG configuration.
General Configuration
The general requirements for implementing a DAG are:
DNS must be implemented with a host record for each Exchange server. Dynamic updates for DNS
are preferred.
Each Mailbox server must be a member of the same domain. It is not possible to have Mailbox servers
in different Active Directory domains as members of the same DAG.
The Mailbox servers that are members of a DAG cannot also be domain controllers. This configuration
is not supported.
The computer name for the Mailbox server must be unique, and must be 15 characters or less.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
8-17
Network Configuration
The network configuration requirements include the following:
One network adapter is supported, but two network adapters are recommended. This allows you to
configure a MAPI network, and a separate replication network.
Latency between DAG members must be less than 250 milliseconds (ms). This is important when you
configure a DAG with members in multiple physical locations.
You can use Internet Protocol version 6 (IPv6) only if Internet Protocol version 4 (IPv4) is also
configured. IPv4 cannot be disabled.
Automatic Private Internet Protocol Addressing (APIPA) is not supported for DAG members.
DAG Configuration
In addition to the physical network and IP addressing requirements for the member servers of the DAG,
the DAG itself has certain other requirements:
The DAG must have at least one IP address on the MAPI network. This address can be static or
dynamic, although a static IP address is typically used in most environments.
If the DAG is expanded across multiple subnets, then the DAG must have an IP address on each
subnet.
The name of the DAGlike the name of each member of the DAGmust be 15 characters or less,
and must be unique.
Witness Server
Failover Clustering in Windows Server 2008 uses the concept of a quorum for decision making in the
cluster. In clusters with a shared disk, connectivity to the shared disk can be used to define which nodes
should potentially be active in the cluster. In a DAG, there is no central disk.
A DAG requires the use of a witness server for a node and file share majority quorum. The witness server
functions as an additional member of the DAG for determining the quorum, but is only used when there
is an even number of members in the DAG. The witness server is a file share located on a server that is not
a member of the DAG.
The quorum for a DAG is used to determine which members participate in replications, and which can
mount databases. For example, if one computer in a DAG loses network communication, it is not part of
the quorum, and cannot mount databases.
It is recommended that you configure the witness server on a Hub Transport server in the Exchange
Server organization. The additional load on the server is minimal, and it is already under the control of the
Exchange Server management group. The witness server does not need to run the same version of
Windows Server as the members of the DAG.
If the DAG witness server is not an Exchange server, then you need to add the Exchange Trusted
Subsystem group as a member of the local Administrators group on the witness server.
Note It is possible for a DAG member to host additional server roles.
Question: Can your organization meet all of the requirements for a DAG?
8-18
Key Points
The MAPI network is the network that other Exchange servers use to communicate with DAG members.
Additionally, you can configure replication networks that are used exclusively for log shipping between
the DAG members. If only a single network is available, it is used for all communication, including log
shipping. Although this is supported, it is not recommended. If you use only a single network, then you
should use gigabit Ethernet to ensure you have sufficient network capacity on the members.
By adding a replication network, you provide redundancy for log shipping. If the MAPI network fails for a
member with active databases, those databases fail over to another member. If the replication network
fails for a member, replication is performed over the MAPI network.
Each DAG member must have the same number of networks. If you determine that the DAG will have two
replication networks in addition to the MAPI network, all members in the DAG must have three network
adapters.
DAG networks cannot share the same subnet, or be routable between them. The MAPI network must be
separate from replication networks. Replication networks must be separate from each other.
A DAG network can span multiple subnets. This is typically used when a DAG spans multiple data centers
for geographic redundancy. When you use multiple subnets for a DAG network, you must configure
routing between the subnets. For example, the subnet used for the MAPI network in one location must be
routable from the MAPI network for another location.
Note If a DAG member hosts additional Mailbox server roles, those roles communicate by
using the MAPI network.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
Because a computer with a Windows operating system supports only a single default gateway, you
should not configure the replication network adapter with a default gateway. Instead, you should
configure static routes if routing is required on a replication network.
8-19
8-20
Key Points
The storage performance requirements for a DAG member vary depending on your organization. In
general, the storage for a DAG member must be sufficient to support all active databases and all passive
databases placed on the DAG member. Both active and passive databases generate disk activity. However,
passive databases generate less disk activity because they are not affected by users reading messages.
Failover Considerations
When designing the storage components for a DAG, you need to consider the results of DAG member
failure. When one DAG member fails, the active databases on that DAG member fail over to other DAG
members. If all of the active databases on a DAG member fail over to only one other DAG member, it
could potentially overload the target of the failover. You can design your DAG as follows:
Active/active. An active/active DAG has active mailbox databases on all nodes. When a node fails in
an active/active DAG, the active mailbox databases from the failed node should fan out to unaffected
members. This spreads the input/output (I/O) among several servers, and it prevents remaining
servers from performing poorly.
Active/passive. An active/passive DAG has at least one node dedicated to passive mailbox database
copies. By maintaining a passive server with sufficient capacity to become active, other active servers
are not affected by a failover.
Control the failover of mailbox databases by using the activation preference number. However, be aware
that the activation preference number is used to control failover only if all database copies are up to date.
Storage Selection
A DAG provides redundancy. As part of your design, you might select storage that is not redundant in
your servers. When you create three or more database copies, you should use just a bunch of disks (JBOD)
rather than RAID. This allows you to reduce your storage costs.
Question: Are you willing to consider using JBOD instead of RAID for database copies?
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
8-21
Key Points
When designing database copies, you need to consider how many database copies are required. There
are no specific rules for the number of databases you should have. More databases increase redundancy,
but they also increase the processing and storage load on the DAG members. If you are concerned about
network failure, you should design your database copies with at least one copy on a second network.
Replay Lag
You can configure a replay lag from passive copies of a database. This prevents shipped transaction logs
from being replayed on passive database copies for a specific timeframe.
The main purpose of configuring a replay lag is to avoid logical corruption of the passive database, based
on the transaction log data that has corrupted the active database. You need to consider how long this
replay lag should be. It needs to be long enough for you to identify the error and prevent the bad data
from being replayed on the passive copy. The replay lag is set for each database copy.
Using three database copies can provide fast recovery from database failure, and it prevents logical
corruption of the database by using transaction log replay. One copy is active, and a second copy is
passive with no replay lag. In case of a disk failure or server failure, the second copy can be configured to
activate automatically. The third copy is passive with a replay lag, and it is used to prevent logical
corruption based on transaction log data. If logical corruption occurs, the first two copies are corrupted,
but the third copy is not corrupted due to the replay lag. Then, during recovery, you can specify which
transaction logs should be replayed on the third copy.
The logical corruption that replay lag helps to recover from is quite rare. It is different from most common
database corruption that is caused by disk errors. The data in the transaction logs is based on valid MAPI
commands. Therefore, the logical corruption is more accurately described as unexpected data
manipulation than corruption. This can be caused by third-party applications that interact with Exchange
Server, such as archiving software.
8-22
Log Truncation
Typically, database logs are truncated when you perform a backup. Alternatively, when circular logging is
enabled, transaction logs are truncated after they are placed into the database. In a DAG, transaction logs
are never truncated until they are replicated to all passive database copies and played into the passive
databases. If a passive database is a lagged copy, transactions logs must be replicated to it, but the logs
do not need to be played before other database copies truncate the logs.
You can extend the time that transaction logs are retained by setting the log truncation time on a
database copy. The retained transaction logs can be used for recovery operations if there is a problem
with transaction logs on the active copy.
Site Resilience
A DAG can include members on multiple subnets and in multiple physical locations. This makes it possible
to provide site resiliency by placing DAG members in two separate data centers in two separate locations.
Note Site resiliency is discussed in Lesson 4: Designing Site Resilience.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
8-23
Key Points
In larger organizations, the management of DAGs is likely to be restricted to a relatively small group of
administrators. This group understands all of the design parameters that need to be taken into account
when creating and managing DAGs and database copies. You can delegate these permissions using Role
Based Access Control (RBAC).
To create and manage DAGs, you must be part of the Organization Management role group or Database
Availability Groups role group. To create and manage database copies, you must be part of the
Organization Management role group or Database Copies role group.
Monitoring
One of the unique challenges when managing DAGs is that, in a well-designed system, you may not
notice the failover of a database from one DAG member to another. One way you can monitor DAG
members is by using the Exchange Server 2010 monitoring management pack for System Center
Operations Manager 2007. The Exchange Server 2010 monitoring management pack proactively monitors
servers, and it can notify administrators when errors and events occur.
Exchange Server 2010 has some options for monitoring DAG status:
Test-ReplicationHealth. Use this cmdlet to perform a variety of tests, and to report back status for
various replication components.
Event logs. In addition to events in logs for the Windows operating system, there are also event logs
that are specific to Exchange Server. These logs are located in the Applications and Services node. The
two specific logs that are of interest for high availability are the High Availability and
MailboxDatabaseFailureItems logs.
8-24
CollectOverMetrics.ps1. This script collects statistics and information about switchovers and failovers.
The data reported is based on past events.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
8-25
Lesson 3
High availability for non-Mailbox servers varies depending on the server role. Each server role has a
unique method for providing high availability. Hub Transport servers require no configuration other than
the addition of a second Hub Transport server. Client Access servers require a client access array to be
created. Edge Transport servers require the proper configuration of MX records in DNS.
After completing this lesson, you will be able to:
Design a highly available deployment using multiple server roles per server.
8-26
Key Points
Each Active Directory site with an Exchange Server 2010 Mailbox server requires at least one Hub
Transport server to process the delivery of messages. If there is no Hub Transport server available in an
Active Directory site, Exchange Server users with mailboxes in that site will not be able to send or receive
messages.
High availability for message transport is particularly important for Hub sites. When a Hub site exists on a
routing path, all messages are forced to go through a Hub Transport server in that site. If no Hub
Transport servers are available in a Hub site, then messages cannot be delivered on that routing path.
To implement high availability for message transport in a site, you need to install multiple Hub Transport
servers in the site. No additional configuration is required. If one Hub Transport server in a site is
unavailable, Exchange services will automatically use the other Hub Transport server for message
transport.
Applications that use a Hub Transport server for message relaying will not automatically fail over to
another Hub Transport server unless the application can be configured with multiple destinations. To
provide high availability for applications, you must configure a load-balancing cluster for the Hub
Transport servers.
When a Hub Transport server fails, it may have messages in a queue waiting to be delivered. These
messages would be lost, but shadow redundancy ensures that messages are not lost. With shadow
redundancy, messages remain in the transport dumpster of other Hub Transport servers until they are
notified that the message has been delivered.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
8-27
You need to determine how many Hub Transport servers are justified for high availability. In branch
offices with a single server performing multiple roles, high availability for message transport may not be
important. For a main site with a large data center hosting mailboxes for thousands of users, you might
decide that three Hub Transport servers are necessary to provide the necessary level of redundancy. The
Hub Transport server role is commonly combined with the Client Access server role.
Question: Is high availability for Hub Transport more important for some sites than others?
8-28
Key Points
All clients use Client Access servers to access mailboxes. Even MAPI clients use a Client Access server to
access mailbox contents. If a Client Access server is not available in an Active Directory site, users cannot
access their mailbox contents.
Depending on the design of Internet access to Client Access servers, the failure of a Client Access server in
an Active Directory site can prevent users from multiple sites from accessing mailbox contents. If users on
the Internet connect to Client Access servers in a single main Active Directory site, and those requests are
proxied to other Active Directory sites, the failure of Client Access servers in the main sites prevents access
to those proxied sites. Consequently, high availability becomes critical for the main site that proxies the
requests.
To implement high availability for a Client Access server, you use load balancing between the Client
Access server and a client access array. You can use hardware-based load balancing or software-based
load balancing. Windows Server 2008 includes the NLB feature. Your organization can select the type of
load balancing that you are most comfortable with.
Load balancing spreads client requests between the Client Access servers. If one Client Access server
becomes unavailable, then requests are handled by the remaining Client Access servers. The client access
array directs clients to the host name used by the load-balanced cluster.
All Client Access servers in the array must be configured with the same Secure Sockets Layer (SSL)
certificate. This is because all Client Access servers use the name specified in the client access array.
Internet Users
For Internet users, you need to consider redundant Internet connections as part of your design. You can
have two separate ISPs, and allow access through both to the Client Access servers in your organization. If
one ISP experiences a failure, users can access their mailbox content by using the alternate ISP at a
different domain name.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
8-29
Alternatively, if you configure each Active Directory site to be available directly from the Internet, the
failure of a single Internet connection affects connectivity only to one Active Directory site. This mitigates
the damage caused by failure, but does not provide complete redundancy.
Question: Is high availability for Client Access servers more important for some sites than
others?
8-30
Key Points
The failure of an Edge Transport server can prevent an organization from receiving new Internet
messages. It can also prevent Exchange Server 2010 users from sending messages to Internet recipients. In
many cases, an interruption in Internet mail is considered a critical business event.
To make the Edge Transport server role highly available, you can install a second Edge Transport server.
For external message delivery, no additional configuration is required. For message reception, you must
configure an additional MX record for the second Edge Transport server. If both MX records have the
same priority, then incoming messages are load-balanced between the two Edge Transport servers.
To provide network redundancy for message delivery to the Internet, you can use two ISPs. Many firewalls
are capable of failing over to a second Internet connection when the primary connection fails. To receive
messages on the second Internet connection, you must create additional MX records.
If your Exchange Server organization has multiple points of contact with the Internet and multiple
locations with Edge Transport servers, this does not provide redundancy for outgoing messages. Messages
are delivered only on the lowest cost path. If the Edge Transport servers on the lowest cost path are
unavailable, the messages are queued on a Hub Transport server for delivery to the Edge Transport server.
Routing paths are not recalculated based on availability.
Question: Is high availability for Edge Transport servers important for your organization?
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
8-31
Key Points
Exchange Server 2010 allows you to combine multiple server roles on a single Exchange server. For
example, a branch office may have only a single Exchange server that performs the Mailbox, Client Access,
and Hub Transport server roles. Even in larger organizations, it is common to combine all three core server
roles on each Exchange server to simplify the overall design.
When combined on a single server, there is no conflict between the high availability methods used for the
different server roles. An Exchange server with multiple server roles can be a member of a DAG or of a
client access array. If you are using a DAG, the server that is a DAG member cannot also be a member of
an NLB cluster. However, you can use hardware-based load balancing instead.
Transport Modification
Message transport is modified when the Hub Transport and Mailbox server roles are installed on the same
server. The transport path is modified to force messages to be delivered through a second server. This
ensures that the message is in the transport dumpster and shadow queues of an alternate server in case of
a server failure.
When the Mailbox Submission Service contacts a Hub Transport server role, it gives preference to a Hub
Transport server role on a separate server. For example, VAN-EX1 and VAN-EX2 both have the Hub
Transport and Mailbox server roles installed. When a user with a mailbox on VAN-EX1 sends a message,
the Mailbox Submission Service on VAN-EX1 prefers to notify VAN-EX2 to pick up the message from the
outbox.
When a Hub Transport server role has a message for delivery to a mailbox on the same server, the
message is first delivered to a Hub Transport server role on another server for delivery back to the
mailbox. For example, VAN-EX1 and VAN-EX2 both have the Hub Transport and Mailbox server roles
installed. When the Hub Transport server role on VAN-EX2 has a message for delivery to a mailbox on
VAN-EX2, it delivers the message to the Hub Transport server role on VAN-EX1 for delivery to the mailbox
on VAN-EX2.
8-32
Capacity Planning
When you are planning capacity and optimizing performance, you need to consider not only the roles
that are running on the server now, but the additional load that will be placed on the server if another
server fails. For example, a single server that is a member of a DAG and in a client access array experiences
a load increase if another server in the DAG or another server in the client access array fails. This makes
performance planning more complex.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
8-33
Lesson 4
Site resilience allows messaging services to survive the failure of a physical location. Exchange Server 2010
supports site resilience for mailbox databases protected in a DAG. However, you should be aware of the
several considerations that are specific to the design of site resilience.
After completing this lesson, you will be able to:
Describe the options for providing site resilience in Exchange Server 2010.
8-34
Key Points
Site resilience is the ability of the messaging system to survive a site failure, and to continue functioning
through the use of an alternate data center. In some cases, the alternate data center is a site that is
dedicated only to disaster recovery. In other cases, the alternate data center could be another company
site that is in use, but has sufficient capacity to handle services for the failed location.
A DAG is capable of existing across multiple subnets. This means that a DAG can exist across multiple
Active Directory sites. This is a major improvement over previous versions of Exchange Server that require
you to extend a subnet across a WAN link.
Site resilience exists only for Mailbox servers. Any other server roles that are required must already exist in
the site; they do not fail over. For example, Hub Transport servers and Client Access servers should already
exist in the alternate data center. Other servicessuch as DNS, domain controllers, and global catalog
serversmust also be available in the alternate data center.
Question: Does your organization plan for site resilience as part of its disaster recovery
planning?
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
8-35
Key Points
At the simplest level, site resilience allows for a database in a DAG to fail over to an alternate data center.
Clients can continue to access their mailbox contents and send messages. It is important to understand
how clients behave during this process, so that you can make appropriate design decisions.
When the primary data center fails, the database is activated in the alternate data center. Client
computers locate an appropriate Client Access server or array for a database by using the
RPCClientAccessServer property of the database. Unless a specific action is taken, the client computers
still use the client access array in the primary site. Clients continue to have access to mailboxes by using
the client access array in the primary site, if it is available. The client access array in the primary data
center communicates with the Mailbox server in the alternate data center.
It is more efficient from a network perspective to have clients access a client access array in the alternate
data center. In particular, when the WAN link has high latency, there is improved performance. The
simplest way to redirect clients to the client access array in the alternate datacenter is to modify the DNS
record of the local client access array to resolve as the IP address of the client access array in the alternate
datacenter. You may need to clear the DNS cache on client computers for the DNS change to take effect.
You also have the option to update the RPCClientAccessServer property of the database to direct clients
to a client access array in the alternate data center. The behavior of clients varies depending on the
version of the Microsoft Office Outlook messaging client. In all cases, clients first attempt to connect to
the client access array in the primary data center.
Note To update the RpcClientAccessServer property of a database, use the SetMailboxDatabase cmdlet.
8-36
Outlook 2010 clients perform an Autodiscover to get the updated Client Access server property,
update the local profile, and then begin communicating with the client access array in the alternate
data center. After a restart, Outlook 2010 clients can connect directly to the client access array in the
alternate data center. This behavior is the same whether the Client Access server in the primary data
center is available or not.
Outlook 2007 clients perform an Autodiscover to get the updated Client Access server property, and
then begin communicating with the client access array in the alternate data center. If the Client
Access server in the primary data center is available, the profile is not updated automatically, and the
client continues to connect to the client access array in the primary site before being redirected to the
alternate data center. If the Client Access server in the primary data center is not available, the profile
is updated, and the client must restart.
Outlook 2003 clients are never redirected to the new client access array. You must manually update
the profile to use the new client access array.
Question: Which version of Outlook does your organization use?
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
8-37
Key Points
To configure a DAG for site resilience, the DAG must have at least one member in an alternate data
center. Then databases can be replicated to the member in the alternate data center. No other specific
configuration is required on the Mailbox servers, or for databases.
A DAG supports having multiple subnets on the MAPI network, and multiple subnets on a replication
network. Therefore, subnets do not need to span a WAN link. However, there can be no routing between
the MAPI network and the replication network. The WAN link must support both networks.
In addition to the Mailbox server in the alternate data center, you also need to install a Client Access
server and a Hub Transport server. To reduce hardware requirements in the alternate data center, you can
place the Client Access server and Hub Transport server roles on the same computer as the Mailbox server
role. However, you should do so only if the computer has sufficient capacity.
An alternate witness server must be configured in the alternate data center. The alternate witness server is
used when recovery to the alternate data center begins. Until recovery to the alternate data center is
performed, the alternate witness server is not used.
Use Datacenter Activation Coordination (DAC) mode for DAGs with members that span two locations.
Previous versions of Exchange Server recommend the use of a third physical location for geographically
distributed clusters to prevent the split-brain syndrome. The split-brain syndrome occurs when more than
one DAG member mounts a database. This is a problem because there is no way to reconcile the different
content in the two mounted databases. In Exchange Server 2010, the DAG includes DAC to prevent the
split-brain syndrome.
Question: Why is the DAC mode important?
8-38
A DAG that does not use DAC mode relies only on a quorum to determine which members of the DAG
can activate a database. A quorum is achieved when a majority of members can communicate. A witness
server is considered to be one of the members for the purposes of calculating the quorum. For example, if
there is a three-member DAG, and one member loses connectivity, the two remaining members achieve a
quorum and are able to activate databases. The single node is not part of the quorum, and cannot
activate databases.
The default configuration of a DAG creates problems in creating a DAG with site resiliency. A threemember DAG with two members in the primary site and one member in an alternate data center can
experience split-brain syndrome when the servers cannot determine which servers should be active. If the
primary data center fails and you activate the alternate data center, split-brain syndrome arises when you
restart the primary data center without connectivity to the alternate data center. The two servers in the
primary data center have a quorum when they restart and activate their databases. The databases are
active in both the primary site and the alternate data center, with no method to resolve the data changes
between them.
You can use the DAC mode to avoid split-brain syndrome in a DAG that spans multiple locations. When
you activate the DAC mode, each DAG member stores a Datacenter Activation Coordination Protocol
(DACP) bit in memory that indicates whether that member is allowed to mount databases. Each time a
DAG member starts, the DACP bit is set to 0, which indicates that mounting is not allowed. The DAG
member communicates with other DAG members to find out their status. When the DAG member finds
another DAG member with the DACP bit set to 1, it sets its own DACP bit to 1, and can now mount
databases.
Note: To enable DAC mode for a DAG, use the command Set-DatabaseAvailabilityGroup
dagname DatacenterActivationMode DagOnly in the Exchange Management Shell.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
8-39
8-40
Key Points
For Mailbox servers, you can use a DAG across multiple physical locations to provide site resilience. For
other server roles, there is no special configuration to provide site resilience; those server roles must
already exist in the alternate data center.
Hub Transport
Message transport is performed based on Active Directory sites. Each Active Directory site with a Mailbox
server must have a Hub Transport server as well. When a database is activated in the alternate data center,
it uses the Hub Transport server in the alternate data center. No specific configuration is required for
message transport.
If you have applications that are configured to use a specific Hub Transport server for relaying messages,
you need to direct those applications to a new Hub Transport server. If the application is configured to
use the IP address of the Hub Transport server, you must reconfigure the application to use the IP address
of a Hub Transport server in the alternate data center. If the application is configured to use the hostname
of the Hub Transport server, you can modify the host record for the Hub Transport server to use the IP
address of the Hub Transport server in the alternate data center.
You should ensure that the Hub Transport servers in the alternate data center have sufficient capacity to
handle the volume of message processing that is expected when the alternate data center is used.
Client Access
It is not possible to span a client access array over multiple subnets. So, similar to a Hub Transport server,
you need to include a Client Access server in the Active Directory site in the alternate data center.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
8-41
If the client access array in the original site is still available, it can continue to provide services for clients,
and access the active database in the alternate data center. This is a good solution if the alternate data
center is going to be used for a short term. If the alternate data center is going to be used for a long term,
you should update the RPCClientAccessServer property on the database. This allows the redirection of
Outlook 2007 and Outlook 2010 clients to the Client Access server in the alternate data center.
If the client access array in the original site is not available, you should update the
RPCClientAccessServer property on the database. This allows Outlook 2007 and Outlook 2010 clients to
use Autodiscover to find the Client Access server in the alternate data center. You can also change the
DNS record for the original client access array to point to the IP address for the client access array in the
alternate data center.
Clients running Outlook Anywhere and the Microsoft Exchange ActiveSync technology locate a Client
Access server that is accessible on the Internet by using DNS records. If the original client access array is
unavailable, you need to change the host record for the external client access to point to the Client Access
server in the alternate data center.
A potential concern is the caching of DNS records. If the client computer caches the hostname of the
Client Access server, you can clear the cache on the client computer by using ipconfig /flushdns or by
restarting the client. However, many Internet DNS servers cache resolved hostnames for 24 hours. To
ensure that clients can access the Client Access servers in the alternate data center quickly, you must
provide clients with an alternate hostname to access services.
Edge Transport
To provide site resilience for Edge Transport servers, you must have a second Internet connection at the
alternate data center. The simplest way to configure site resiliency is by having the Edge Transport servers
already active and able to receive messages.
Incoming messages are directed to an Edge Transport based on MX records in DNS. The MX records are a
pointer to the hostname of the Edge Transport server. To have messages automatically redirected to the
alternate data center when the primary location is unavailable, you can configure multiple MX records.
The priority number for MX records determines the order in which they are used. An MX record with a
lower priority number is contacted first. The MX record for the alternate data center has a higher priority
number than the MX record for the primary data center. With this configuration, mail servers attempt
delivery to the primary data center first, and if the primary data center is unavailable, the messages are
delivered to the alternate data center.
Messages transported through the alternate data center automatically use the Edge Transport server in
the alternate data center for message delivery, because it is the closest Edge Transport server.
8-42
Key Points
Failover and failback for databases within a site can be automatic, and clients may not even notice them.
But failover and failback between sites is disruptive and can impact service. Consequently, failover and
failback between sites is considered a disaster recovery event, and must be performed manually.
Failover Considerations
When you design the failover process for a DAG, you should fail over to servers in the primary data center
before failing over to the alternate data center. The failover process to an alternate data center can be
disruptive. For example, a three-member DAG with two servers in the primary data center should only
activate a database in the alternate data center if both the servers in the primary data center are
unavailable.
When the primary data center fails, you should consider whether repair is possible before failing over to
the alternate data center. If the primary data center is going to be offline temporarily, it may cause a
greater interruption to fail over to the alternate data center, than to wait for the primary data center to
become available again. This decision is influenced by the Service Level Agreement (SLA) associated with
the mailbox databases.
Failback
Just as the failover process to an alternate data center is manual, so is the failback process. Before failing
back any databases to the primary data center, you should ensure that all necessary servicessuch as
DNS, domain controllers, and global catalog serversare functioning properly. Hub Transport and Client
Access servers in the primary data center also need to be functional.
When the DAG members in the primary data center and all necessary services are functioning again, you
can replicate the databases back to the primary data center. When replication is complete, you can
activate the databases in the original site. The activation of databases in the primary site does not need to
be done during off-hours.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
8-43
It is important to understand how a DAG with site resilience responds when a node fails. You can create
an appropriate recovery plan only if you understand the failover process.
In scenario 1, Site A has two Mailbox servers and a witness server. Site B has a single Mailbox server and
an alternate witness server. All active mailbox databases are on the Mailbox servers in Site A. Each Mailbox
server has database copies of all mailbox databases.
Question: If the WAN link between Site A and Site B fails, what impact does it have on the
active databases in Site A?
Question: How can you ensure that mailbox databases fail over between the Mailbox servers
in Site A rather than failing over to the Mailbox server in Site B?
In scenario 2, Site A has one Mailbox server and a witness server. Site B has a single Mailbox server and an
alternate witness server. All active mailbox databases are on the Mailbox server in Site A. A passive copy of
each mailbox database is on the Mailbox server in Site B.
Question: If the WAN link between Site A and Site B fails, what impact does it have on the
active databases in Site A?
Question: If there were active mailbox databases in Site B when the WAN link failed, how
would they be affected?
Question: If the Mailbox server in Site A fails, does the Mailbox server in Site B automatically
mount the databases?
8-44
Question: If all of the data center infrastructure in Site A fails, does the Mailbox server in
Site B automatically mount the databases?
Question: If you want two locations to have highly available mailbox databases, how many
DAGs should you have?
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
8-45
Lab Setup
For this lab, you will use the available virtual machine environment. Before you begin the lab, you must:
1.
On the host computer, click Start, point to Administrative Tools, and then click Hyper-V Manager.
2.
3.
Lab Scenario
You are a messaging engineer for the A. Datum Corporation, an enterprise-level organization with
multiple locations. A. Datum Corporation is an international corporation involved in technology research
and investment, and is planning to upgrade from Exchange Server 2003 to Exchange Server 2010.
Concerns have been raised about the availability of Exchange Server 2010. Messaging has been
designated as a critical service in the organization. The existing Exchange Server 2003 organization
experienced several outages, and you want to avoid these outages in the future. You need to create a
high availability design for Exchange Server 2010.
Finally, you are required to implement part of your proposed high availability design.
Note Your instructor may choose to do this lab as a group discussion rather than an
individual activity.
8-46
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
8-47
The smaller sites combine all server roles on a single physical server. The San Diego site has just one
Exchange server with all server roles in the current plan.
One other issue Im concerned about is logical corruption of database copies in a DAG. I know that this is
a very rare occurrence, but I think it makes sense to protect ourselves against the possibility. As I
understand it, we can configure a delay on a database copy so that a logical corruption in the transaction
logs wont be passed on to the database copy for a period of time. I think a delay of six hours would be
sufficient.
Internal users
Mobile users
London
Corporate Headquarters
12,000 currently
10,000 after the
new London
office is ready
4,000
(anticipated)
San Diego
500
Former head office
of Trey Research Corporation
Vancouver
6,000
Tokyo
5,000
800 (anticipated)
8-48
Network Configuration
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
2.
3.
4.
Network Configuration
Question: In the High Availability Interviews, what points are raised that impact your high
availability design, and how do they impact it?
Question: Is there anything in the User Distribution Summary that raises high availability issues?
If so, what is it?
Question: Is there anything in the Network Configuration that raises high availability issues? If so,
what is it?
8-49
8-50
Task 3: Document the required configuration for the San Diego site
Jason Carlson
24th April 2010
Requirement Overview
Determine how high availability will be provided for all server roles in San Diego.
Additional Information
Identify infrastructure changes that may be required due to the proposed deployment.
Proposals
Question: Will this site have offsite disaster recovery? If so, where should that site be located?
Question: How do you provide high availability for Client Access servers?
Question: Is high availability required for the Edge Transport server role?
Question: How many Exchange servers will be located in this site? Which roles will they host?
Question: How will load balancing be performed for the Client Access server role?
Question: Is any additional configuration required for the Hub Transport server role
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
Jason Carlson
24th April 2010
Requirement Overview
Determine how high availability will be provided for all server roles in Vancouver.
Additional Information
Identify infrastructure changes that may be required due to the proposed deployment.
Proposals
Question: Will this site have offsite disaster recovery? If so, where should that site be located?
Question: How do you provide high availability for Client Access servers?
Question: Is high availability required for the Edge Transport server role?
Question: How many Exchange servers will be located in this site? Which roles will they host?
Question: How will load balancing be performed for the Client Access server role?
Results: After this exercise, you should have created a high availability design for the San Diego and
Vancouver sites.
8-51
8-52
2.
3.
4.
5.
Recover VAN-EX1.
2.
2.
Under Organization Configuration, on the Mailbox node, select the Database Availability Groups
tab and create a new DAG with the following settings:
3.
Open the properties of VancouverDAG, and then add 10.10.0.200 as an IP address for the DAG.
Note Step 3 generates a warning, because the witness server is not an Exchange Server.
This does not indicate a problem. The necessary permissions were configured in Task 1.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
4.
8-53
Use the context menu of VancouverDAG to add VAN-EX1, VAN-EX2, and VAN-EX3 as DAG
members.
On VAN-EX3, in the Exchange Management Console, on the Database Management tab, add a copy
of Mailbox Database 1 to VAN-EX2.
2.
3.
In the Exchange Management Shell, use the following command to configure a replay lag time of six
hours for Mailbox Database 1 copy on VAN-EX3:
Set-MailboxDatabaseCopy Identity Mailbox Database 1\VAN-EX3 ReplayLagTime 0.6:0:0
4.
Use the following command to verify that the replay lag is configured correctly:
Get-MailboxDatabase Mailbox Database 1 | Format-List ReplayLagTimes
5.
Use the following command to view the status of the Mailbox Database 1 copy on VAN-EX3:
Get-MailboxDatabaseCopyStatus Identity Mailbox Database 1\VAN-EX3
2.
On VAN-EX3, refresh the Exchange Management Console to view the status of the Mailbox
Database 1 copies.
3.
If any database copy has a status of Disconnected, refresh the view again.
2.
On VAN-EX3, refresh the Exchange Management Console to view the status of the Mailbox
Database 1 copies.
Question: What is the status for Mailbox Database 1 on each server?
3.
If the status of Mailbox Database 1 on VAN-EX1 is initializing, wait a few minutes, and then click
Refresh again. You may need to select Mailbox Database 1 on VAN-EX1 to refresh its status.
Results: After this exercise, you should have implemented high availability for Mailbox Database 1 in
Vancouver.
8-54
2.
Right-click 10233B-VAN-DC1 in the Virtual Machines list, and then click Revert.
3.
4.
Repeat these steps for 10233B-VAN-EX1, 10233B-VAN-EX2, and 10233B-VAN-EX3. Close the virtual
machine connection windows.
5.
In the Virtual Machines pane, click 10233B-VAN-DC1, and then, in the Actions pane, click Start.
6.
To connect to the virtual machine for the next modules lab, click 10233B-VAN-DC1, and then, in the
Actions pane, click Connect.
Important: Start the 10233B-VAN-DC1 virtual machine first, and ensure that it is fully
started before starting the other virtual machines.
7.
Wait for 10233B-VAN-DC1 to start, and then start 10233B-VAN-EX1. Connect to the virtual machine.
8.
Wait for 10233B-VAN-EX1 to start, and then start 10233B-VAN-CL1. Connect to the virtual machine.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
Review Questions
1.
To make a highly available Exchange Server organization, which components must be highly
available?
2.
Which Exchange Server 2010 feature provides fault tolerance for message delivery?
3.
4.
Use a client access array and load balancing to make client access highly available.
If a Client Access server is also a member of a DAG, then use hardware-based load balancing.
Ensure that Internet-accessible sites that proxy Client Access for multiple sites are highly available,
because their outage will affect many users.
When a DAG fails over to an alternate site for a short period of time, allow the clients to continue
using the client access array in the original site.
When a DAG fails over to an alternate site for an extended period of time, reconfigure the
RPCClientAccessServer property of the databases to direct clients to a client access array in the
alternate site.
8-55
8-56
9-1
Module 9
Planning a Disaster Recovery Solution
Contents:
Lesson 1: Planning for Disaster Mitigation
9-3
9-17
9-27
9-41
Module Overview
Disaster recovery planning is an essential requirement for fulfilling service level agreements (SLAs). These
agreements define when a service needs to be available, and how quickly it must be recovered if it fails.
To ensure that you meet SLA requirements, you need to plan how Microsoft Exchange Server 2010 will
be backed up and restored.
After completing this module, you will be able to:
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 9-3
Lesson 1
Disaster mitigation avoids the need for disaster recovery, and it allows you to recover data much faster
than with a full restore. Exchange Server 2010 has improved the disaster mitigation methods that are
available to administrators, with features such as database availability groups (DAGs).
After completing this lesson, you will be able to:
List the Exchange Server 2010 features that can alleviate the impact of disaster or data loss scenarios.
Design an Exchange Server 2010 high availability solution for disaster mitigation.
Describe recovery time objective (RTO) and recovery point objective (RPO).
Key Points
To understand which type of disaster mitigation method is appropriate, first consider the potential data
loss scenarios. Each scenario requires different disaster mitigation methods.
Lost Item
A lost item from a mailbox often occurs because a user deleted that item. The item could be deleted by
accident, or the item could be deleted on purpose and the user may only realize later that the item was
required.
One lost mailbox item typically consists of a small amount of data. However, that small amount of data
can be very important. A lost item could be a mail message or a calendar item, and may include
attachments.
Lost Mailbox
A lost mailbox results in the entire contents of that mailbox being lost. A lost mailbox is typically the result
of deletion by an administrator. While this could occur accidentally, deletion is more commonly done
when a user leaves the organization. After the user account is deleted, a manager or former colleague
may need access to the mailbox to review what the user was working on.
Lost Database
A lost database results in a loss of all mailboxes in that database. Additionally, while the database is
missing, users with mailboxes in that database can no longer send or receive messages.
A lost database typically occurs because of a system malfunction, which can include disk failure or
database corruption. Lost database recovery is critical, because many users are affected by the outage.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 9-5
Lost Server
A lost server results in a loss of all databases on that server. A lost server typically occurs because of a
system or infrastructure failure. For example, the servers power supply could fail, or there could be a fire
in the server room. Lost server recovery is critical, because many users are affected.
Question: Can you think of any other ways that Exchange Server data can be lost?
Key Points
Exchange Server 2010 includes a number of features that you can use to mitigate data loss. These are
important, because when you mitigate data loss, you do not need to perform recovery from backup. It is
typically much faster to use these data loss mitigation methods than to recover from backup.
Deleted mailbox retention. Use deleted mailbox retention to recover deleted mailboxes and their
contents. By default, Exchange Server retains deleted mailboxes in the mailbox database for 30 days.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 9-7
DAG. Use a DAG in most scenarios to recover from a lost server or a lost database. When a server or
database fails, Exchange Server mounts a replicated copy of that database onto another member of
the DAG. This process is much faster than restoring a database from backup.
Shadow redundancy. Shadow redundancy is automatically enabled for all Exchange Server 2010 Hub
Transport and Edge Transport servers. Transport servers keep a copy of the message they are sending
until it is delivered to the next Hub Transport or Mailbox server. This ensures that messages are not
lost in transport due to a server failure.
Question: Which of these data loss mitigation features do you think you will use most often?
Key Points
The default Exchange Server configuration is sufficient for many organizations. However, consider the
following when planning your disaster mitigation strategy:
Increase deleted item retention so that the items are recoverable for a longer time period. However,
the default 14 days is normally a sufficient time period, and lowering this value has a minimal impact
on database size.
Increase the deleted item retention time period for specific users. By increasing the deleted item
retention time period for critical users or users most likely to require item recovery, you limit the
increase in database size, and meet the needs of users.
Enable single-item recovery to ensure that all items are recoverable. Single-item recovery prevents
users from hard-deleting items and purging them from the dumpster. The items are invisible to the
user, but they are recoverable by an administrator.
Increase deleted mailbox retention so that mailboxes are recoverable for a longer period of time. The
default 30 days is normally a long-enough time period, and lowering the value has a minimal impact
on database size.
Use DAGs to provide server-level redundancy and avoid data loss. You must have the Enterprise
version of the Windows Server 2008 operating system. However, unlike with previous Exchange
Server versions, the Enterprise version of Exchange Server is not required.
Use replay lag time to prevent database corruption. Database corruption can occur when a
transaction is placed in the transaction logs. In such cases, replay lag times may prevent corruption of
the passive copy, because you can prevent the offending transaction from being replayed on the
passive copy.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 9-9
Key Points
High availability provides fault tolerance for various parts of a system. Fault tolerance is typically provided
through redundant components. In servers, Redundant Array of Independent Disks (RAID) arrays provide
fault tolerance for hard drives. On a network, redundant routing paths provide fault tolerance. Exchange
Server 2010 enables you to make each server role highly available.
Disaster recovery is required when high availability fails. For example, a RAID 5 array can survive a singledisk failure. However, if multiple disks fail, then data loss occurs and you must perform disaster recovery
to retrieve the data.
You also need disaster recovery when high availability does not provide the required functionality. For
example, high availability does not provide for long-term data archiving. To recover historical data, you
must perform a restore from an archive. You typically use high availability to maintain the current state of
a system.
Key Points
Exchange Server 2010 provides methods to make each server role highly available. When properly
implemented, the need for disaster recovery is small.
Exchange Server 2010 supports the following high availability methods:
DAGs for mailbox databases. In a DAG mailbox, databases are replicated to multiple servers. If one
server or database fails, Exchange Server mounts a replica on another server and continues servicing
client requests. This avoids the need to recover a failed Mailbox server or corrupted mailbox database.
Replication for public folders. A public folder database cannot be replicated in a DAG. However, to
provide high availability, you can replicate individual public folders and their contents between public
folder databases on different servers, and between sites. This avoids the need to recover a failed
Mailbox server or corrupted public folder database.
Multiple Hub Transport servers for message transport. Message transport is automatically made
highly available when you have multiple Hub Transport servers in a site. If one Hub Transport server
fails, then the remaining Hub Transport servers service all requests. This avoids the need to recover a
failed Hub Transport server.
Client access arrays for client access. When you implement a client access array and configure load
balancing between Client Access servers, you make client access highly available. If one Client Access
server fails, then the remaining Client Access servers handle the client requests. This avoids the need
to recover a failed Client Access server.
Multiple Edge Transport servers for edge transport. To make edge transport highly available, you
need two Edge Transport servers in the perimeter network. Outgoing messages are automatically
load-balanced between the two Edge Transport servers, and if one fails, the other continues
delivering all messages. For inbound messages, you must either initiate load balancing, or configure
one mail exchanger (MX) resource record for each Edge Transport server. This avoids the need to
recover a failed Edge Transport server.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
9-11
When high availability is used for a server role, you are not required to recover a failed server. However, in
most cases you will replace the failed server with a new server that provides the same functionality. This is
required to continue providing the same level of high availability. For example, when a member if a DAG
fails, the databases will mount on other DAG members, and you will then add a new DAG member to
replace the functionality of the lost DAG member.
Question: Which of these high availability methods do you think your organization will
implement?
Key Points
Exchange native data protection is the combination of disaster mitigation technologies found in Exchange
Server 2010. When properly configured, you can use Exchange native data protection as an alternative to
traditional backups. To use Exchange native data protection as an alternative to traditional backups, at a
minimum you need a DAG and single-item recovery. You should also consider the use of personal
archives and litigation holds.
Database Copies
Exchange native data protection requires at least three database copies for each mailbox database. The
chance of all three database copies being lost is very small, and thus there is no need to perform a backup
for disaster recovery. If a Mailbox server fails, a database copy on another server is activated.
To mitigate the risk of a lost site due to a disaster such as a fire, you should have at least one database
copy in a remote site. This is the equivalent to having a backup tape stored offsite.
When using a traditional backup solution, the transaction logs for a mailbox database are truncated
during a full backup. Backups are not performed with Exchange native data protection, and transaction
logs are not truncated. You should enable circular logging on databases to prevent log files from taking
up unnecessary disk space. The DAG ensures that all log files are replicated before they are removed.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
9-13
Single-Item Recovery
To ensure that you can recover individual items after users have deleted them, you enable single-item
recovery on each Mailbox. Single-item recovery keeps copies of deleted items even when they were
deleted by the user. The administrator can then use Multi-Mailbox Search to find and recover the items.
Single-item recovery is not enabled on mailboxes by default.
You need to determine an appropriate length of time in which you can recover items. The default time
that items are available for recovery is 14 days. You may want to extend this time when using Exchange
native data protection because deleted item recovery is the only option for recovering deleted items;
there is no backup to restore. However, as you extend the retention period, additional disk space is
consumed by the mailbox databases. If required, you can vary the retention time for individual users.
Archiving
The biggest concern many organizations have when considering Exchange native data protection is the
lack of long-term archiving. When deleted items are no longer available through single-item recovery,
they are not recoverable. Carefully consider the policies your organization has in place for Exchange
Server data retention. Most organizations rarely need to recover archived Exchange Server data.
The storage improvements in Exchange Server 2010 allow you to consider using larger and less expensive
storage. This in turn allows you to increase the time the items are retained by single-item recovery.
One alternative to consider is occasional backups for archival purposes. If specific data needs to be
archived, you should implement messaging records management (MRM). It may be possible to locate all
mailboxes that need to be archived in a single mailbox database that is backed up.
Reduced Costs
Exchange native data protection reduces costs in the following ways:
Simplified management. After the initial configuration, Exchange native data protection is much
easier to manage than backups. There is no ongoing need to manage backup media.
No backup software or hardware. The cost to purchase backup software and hardware can be
significant. This is no longer required.
No RAID. When three or more database copies are implemented, the recommended disk
configuration is just a bunch of disks (JBOD). This disk configuration is less expensive to implement
than RAID.
Note Remember that to implement a DAG, you need to use the Enterprise version of
Windows Server and multiple servers. In smaller organizations, this may increase costs.
Exchange native data protection offers a number of advantages over traditional backups. Your
organization may have specific needs for implementing Exchange native data protection.
Question: When compared to traditional backups, how does Exchange native protection
affect recovery time?
Question: How does using Exchange native data protection affect the backup window?
Question: Does Exchange native data protection meet the archiving needs of your
organization?
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
9-15
Key Points
The timelines for disaster recovery are determined by the SLA. Each SLA should have an RTO and an RPO
that you use to determine how to perform backups and disaster recovery.
The RTO for a service defines how quickly you should recover the service. For example, after a Mailbox
server fails, the RTO for the Mailbox server might indicate that you need to recover the mailboxes stored
on that server within two hours.
In some cases, there may be an RTO for partial functionality. For example, after a Mailbox server fails, the
RTO for sending and receiving messages might be one hour, but the RTO for historical data in mailboxes
might be 12 hours.
The RPO for a service defines at what point in time you must recover the service. The RPO may indicate
that data from a specific timeframe can be lost, or that recovery must equal a certain point in time. For
example, the RPO for a Mailbox server may indicate that up to 12 hours of data may be lost, or that a
Mailbox server must be recovered to the backup at 02:00 the previous night.
Based on your RTO and RPO for Mailbox servers, you may choose to:
Keep transaction logs on separate drives from the databases to ensure that you can replay them after
a database restore.
Key Points
After implementing data loss mitigation and high availability for Mailbox servers, you will still encounter
scenarios that require backup and restore. Scenarios requiring backup and restore include:
Recovering a hard-deleted message when single-item recovery is not enabled. If single-item recovery
is not enabled on a Mailbox server and a user hard deletes an item, Exchange Server removes the
item from the database without placing it in the dumpster.
Recovering a message after the item retention period has passed. Even when you enable single-item
recovery, Exchange Server only retains deleted items for the specified time period. By default, this is
14 days for mail messages.
Recovering a public folder item after the item retention period has passed. Exchange Server only
retains a deleted item in a public folder for the specified time period. By default, this is 14 days.
Recovering a database when you are not using a DAG. You must recover failed mailbox databases
from backup when they are not replicated in a DAG. Alternatively, you can use database repair tools,
but it is typically faster to restore from backup than to repair a database.
Recovering from a server failure when you are not using a DAG. When a Mailbox server fails, all
mailbox databases on that server are lost if they are not replicated as part of a DAG. You must recover
the server from backup.
With a DAG in place, you may consider not backing up Mailbox servers regularly. With multiple database
copies and a replay lag time used to mitigate data corruption, you can avoid restoring a database.
Additionally, you can guarantee deleted-item recovery for a period of time by using single-item recovery.
You can extend the time period for single-item recovery to meet your organizational requirements.
Question: When did you last restore an Exchange server? Why did you need to restore it?
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
9-17
Lesson 2
When planning Exchange Server backup, consider which data you need to restore. You only need to back
up the data that needs restoring. Limiting the backup data size decreases the time it takes to perform the
backup, and allows you more flexibility in your backup schedule.
The software you use to perform backups can also influence your backup process. There are many thirdparty solutions for backing up Exchange Server 2010. You can also use Windows Server Backup in the
Windows operating system and Microsoft System Center Data Protection Manager.
After completing this lesson, you will be able to:
Key Points
To support disaster recovery for database and Mailbox server failures, maintain backups for the following:
Mailbox databases. To recover the contents of the mailboxes in a mailbox database, you must
maintain a mailbox database backup. You can restore this database to the same server or to another
Mailbox server.
Public folder databases: To recover the contents of the public folders in a public folder database, you
must maintain a public folder database backup. You can restore this database to the same server, or
to another Mailbox server.
Transaction logs. Transaction logs are an important part of an Exchange Server 2010 backup. After
restoring a database, Exchange Server 2010 replays the transaction logs to bring the database up to
the current state and make it consistent with the previous version of the database. If you perform an
incremental backup, then only transaction logs are backed up.
You do not have to back up Mailbox server configuration data. All configuration data for a Mailbox server
is stored in the configuration partition of Active Directory Domain Services (AD DS). You can retrieve
any necessary configuration data required for a server restore from AD DS.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
9-19
Key Points
Non-Mailbox servers contain little data that you need to back up. As with Mailbox servers, the AD DS
configuration partition stores all non-Mailbox server configuration data. You can retrieve any necessary
configuration data required for a server restore from AD DS. However, a server restore is seldom
necessary, because you can replace the functionality with a new server instead of restoring a failed server.
The following table lists the data you may want to back up for specific server roles.
Server role
Data to back up
Client Access
Hub Transport
Message transport logs. Backing up these logs may be useful for later
Edge Transport
Server configuration. This is stored locally rather than in AD DS. You should
Unified Messaging
Customized audio prompts. If not backed up, the prompts are lost when the
Question: Do you customize Microsoft Office Outlook Web App or Outlook Web Access
pages in your organization?
You can back up by using the built-in Windows Backup software, System Center Data Protection Manager
(DPM), or third-party software. Choose the software based on the features that you require. At a
minimum, use backup software that the vendor indicates works properly with Exchange Server 2010.
The backup software that you choose must support Volume Shadow Copy Service (VSS) backups. A VSS
backup takes a snapshot of the database rather than streaming the data from Exchange Server. On the
Exchange server, the VSS writer is responsible for triggering the snapshot and for making the Exchange
Server databases consistent before the snapshot is taken.
It must run locally on the server that has the Exchange Server data.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
9-21
Unlike Windows Backup, DPM requires only an agent to be installed on the computer running
Exchange Server 2010. So you can use DPM to centralize the backups of multiple servers.
You can restore databases or mailboxes. Recovering a mailbox is easier than restoring a database to a
recovery database and then extracting the mailbox contents.
You can back up passive database copies. This means that you can back up databases from a server
without determining whether the server has an active or passive database copy.
Individual item restore. Some third-party backup software can restore individual mail messages
directly from backup to a users mailbox. This is less complex than first recovering to a recovery
database and then extracting the required message.
Brick-level backup. Brick-level backups are backups of mailbox contents. To perform a brick-level
backup, the backup software creates a Messaging Application Programming Interface (MAPI)
connection to each mailbox that it is backing up. This can be useful for backing up specific mailboxes
more frequently. If you have implemented personal archives, you can use brick-level backups to back
up only the main mailboxes in a mailbox databases, and not the archive data.
Key Points
Tape backup is still a popular method of performing backups. Tapes are easy to transport, and very
durable. Tape capacity and speed have steadily grown as manufacturers bring out new products. If you
need to expand backup capacity beyond a single tape, you can use a tape changer that automatically
rotates several tapes in a single unit. In high-capacity environments, you can use a tape library. A tape
library is a cabinet with one or more tape backup units, and a robot arm that moves tapes in and out of
the tape backup units.
To increase backup performance, many organizations use disk-based backups instead of tapes. Disk
storage is often cheaper than tape storage when you use large capacity disks rather than faster
performing Small Computer System Interface (SCSI) disks.
The first backup to disk is a complete copy of the server. The second snapshot captures only changes and
writes them to disk. Multiple backup versions exist on the disk, but the tool uses only as much disk space
as the first backup plus changes. This is similar to VSS in that you can use it to store multiple versions of
files.
However, disk-based backups are not as well suited as tape-based backups for off-site storage. Disks tend
to be sensitive to physical movement, and become unreliable if you transport them regularly. Therefore,
many organizations use disks as a first backup tier, and then transfer backups to tape for off-site storage.
If your Exchange Server databases are located on a storage area network (SAN), then you can use SANbased snapshots to lessen backup traffic on the main network, and keep backup traffic on the SAN. The
backup is taken from the SAN snapshot rather than through the Exchange Server. To implement SANbased snapshots for Exchange Server backup, your backup application must support your specific SAN
hardware.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
9-23
Key Points
When determining an Exchange Server 2010 backup schedule, you must consider many factors, including
backup frequency, requirements for various server roles, the available backup window, and recovery
requirements.
Mailbox Servers
You must back up Mailbox servers more often than other Exchange Server roles. Mailbox servers contain
the messages that users receive each day, and therefore you must back them up regularly to ensure that
mailboxes and message are recoverable. One way to determine the backup frequency for Mailbox servers
is to determine the acceptable data loss if both the database and transaction logs are lost. If only 12 hours
of data loss is acceptable, you must back up every 12 hours, and then store the tapes off-site.
When you use tapes for backup, you typically keep enough tapes to maintain a recent data archive. For
example, you could have your daily backup tapes, but then also retain each Friday backup tape for one
month, and possibly each months last-Friday tape for a year. This is sometimes referred to as a
grandfather, father, son scheme.
When you use disks for backup, you can archive to tape at any time. In a similar way, you could create a
weekly tape each Friday, and then retain one weekly tape per month for a year.
Non-Mailbox Servers
Other server roles do not maintain user data, and you can back them up less often. Configuration data is
the main concern when backing up non-Mailbox servers. You may institute a policy in which you back up
non-Mailbox servers weekly, or only when you change your configuration.
Backup Window
You time window for performing backups may influence your backup schedule. For example, an
organization that operates 16 hours per day, five days per week, may not be able to perform a full backup
to tape each night. In this case, you can perform a weekly full backup on weekends, and incremental or
differential backups during the week. Incremental or differential backups to tape are much faster than full
backups. However, be aware that when you use differential backups, the transaction logs are not
truncated. On a busy Mailbox server, this can lead to large volumes of transaction logs.
The backup window is less of an issue when you back up to disk. VSS backups to disk capture only
changes since the last backup. Thus, VSS backups to disk effectively function like incremental backups,
because you are not backing up redundant data that was already backed up. You may choose to perform
VSS backups to disk frequently, because the backup sizes are small. In some cases, organizations perform
VSS backups multiple times a day.
You also can use passive database copies in a DAG to perform backups during normal production hours,
without affecting the Mailbox servers performance. By doing this, you can extend your backup window
beyond what is normally available. The ability to back up passive database copies is important when
selecting backup software.
Note
Recovery Requirements
Your SLA recovery requirements also influence how you perform backups. If recovery speed is the primary
concern, then you must perform full backups daily, because they are the fastest to restore. When you use
differential or incremental backups, you must replay many transaction logs after you restore the backup.
Depending on the amount of transaction logs, replaying the transaction logs can take a long time.
If you are doing frequent disk-based backups, each backup behaves as a full backup. This means that
recovery is fast. It is also generally faster to restore from disk backup than from tape.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
9-25
Key Points
Backup management solutions define how the organization manages and monitors backups, and
manages the backup media that it uses. These solutions may include how the organization performs
backups, backup frequency, backup media, and various other details related to the backup schedule and
process.
Monitoring
Ensure that daily backup monitoring occurs, and address backup failures immediately. Failed backups
increase the risk to data. For example, if you fail to back up three days in a row and the hard disks fail, you
could lose three days of data. In most cases, configure backup software to automatically send you the
backup completion status.
Media
Backup media must be stored off-site daily. This can prevent data loss, even if you lose an entire physical
location. When transporting data offsite, you should secure the backups. Using a trusted courier service is
one way to secure offsite backups. Also, ensure that you are using a secure offsite location. Many thirdparty vendors provide secure storage facilities.
Finally, consider encrypting your backup contents. This ensures that no one can access the contents if the
tapes are lost or stolen.
Media Rotation
Most organizations reuse tapes after a mandated time defined by the organizations data storage
requirements. For example, some organizations rotate tapes on a weekly basis so that each Friday a
backup tape is transported offsite and remains archived for six months or longer. In this scenario, the
organization reuses the daily backup tapes from Monday through Thursday, from one week to the next.
Be sure to keep track of the average failure time for backup media, and remove tapes from the rotation
before failure occurs. For example, some types of backup tapes only guarantee a years life expectancy
when used weekly. The average failure time varies depending on the media type and the medias storage
conditionssuch as humidity and temperature.
When using disk-based backup, closely monitor disk status in the backup server. If a disk in a RAID array
fails, replace it quickly. Ideally, you always have a spare disk available in the server.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
9-27
Lesson 3
To restore lost servers and data in the most efficient manner, you need to understand the options
available for recovering Exchange Server functionality and data. The recovery process varies depending on
the specific server roles. To ensure that everyone in your organization understands the recovery process,
you should create and maintain a disaster recovery plan.
After completing this lesson, you will be able to:
Key Points
You have two options when recovering Exchange Server functionality: replace the lost server roles or
restore the lost server. Both options allow you to recover full functionality.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
9-29
To avoid reconfiguring Outlook 2003 clients. Outlook 2003 clients do not support the Autodiscovery
feature. Therefore, these clients cannot reconfigure a profile and find the location of a new mailbox.
Recovering the server with same name means that you do not need to reconfigure the Outlook 2003
clients.
To avoid reconfiguring firewalls. Internet-accessible servers such as Outlook Web App and the
Microsoft Exchange ActiveSync technology are protected by firewalls and proxy servers. Recreating
the original configuration means that you do not need to reconfigure firewalls to direct traffic to a
new server. If the Client Access server is part of a client access array, firewall reconfiguration is not a
concern because the replacement server will be a new node in the existing client access array.
To avoid reconfiguring applications configured to use a specific server. Some applications are
configured to use a specific server. For example, an application may be using a specific Hub Transport
server as a mail relay. Recovering the server means that you do not need to reconfigure a new Hub
Transport server with an appropriate Simple Mail Transfer Protocol (SMTP) receive connector.
Key Points
If a database is intact, you can use single-item recovery to restore individual messages. If a database is lost
due to corruption or server failure, you need to recover the data that was stored in the lost database.
There are many options that you can use when performing a recovery. Each option is appropriate in
different circumstances. The available options are described in the following table.
Option
Description
Database restore
Recovery database
Use a recovery database if you need to recover data from inside a database,
instead of recovering the entire database. A recovery database is a database
that is mounted on a Mailbox server, but is not directly accessible to users. After
restoring a database in the recovery database, extract the messages or
mailboxes that you want to restore.
Database portability
You do not need to restore databases on the same servers that backed them up.
You can restore and mount databases on any Exchange Server 2010 Mailbox
server in the organization. This is useful when one of several Mailbox servers
fails, and you want to recover the database to a functional Mailbox server. You
can also restore to a recovery database located on a different server.
After restoring a database to an alternate server, you must use the Set-Mailbox
cmdlet with the Database parameter to link the mailboxes with the new
location.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
9-31
(continued)
Option
Description
Dial-tone recovery
When a mailbox database fails, users with mailboxes in that database can no
longer send and receive messages. You can create a dial-tone database by
creating and mounting an empty database for the mailboxes contained in the
failed database. This quickly allows users to send and receive messages again.
After the dial-tone database is functional, restore historical data to a recovery
database, and then merge the data into the dial-tone database.
If the dial-tone database is located on a different server than the failed
database, use the Set-Mailbox cmdlet with the Database parameter to link
the mailboxes with the new location.
DAG recovery
Performing a DAG recovery means that you do not need to perform a database
restore. Assuming you have multiple database copies in a DAG, then when one
database copy fails, Exchange Server automatically mounts and redirects users
to another database copy. To restore redundancy, create another database copy
on a different server.
Note When a user with a cached mailbox connects to a dial-tone recovery database for
the first time, Exchange Server deletes the contents of the cache.
Question: Which recovery method is preferable?
Key Points
When planning Mailbox server recovery, consider the following:
Using a DAG means you do not have to perform a recovery; Exchange Server uses a replica database
instead. This is much faster and easier than using other recovery methods, and improves the recovery
experience for users and administrators.
Place transaction logs and databases on physically separate disks if you do not use a DAG and if you
may need to restore from backup. This ensures that transaction logs will be available for replay if the
disks containing the database are lost.
Recover basic functionality as soon as possible if you do not use a DAG, and a Mailbox server or
database fails. Use a dial-tone recovery database to allow users to send and receive messages as
quickly as possible. This is much faster than waiting for a database to restore.
Ensure that you have enough free disk space to hold a restored database. Allocate enough free disk
space to hold any database from which you might need to recover data. You can allocate disk space
on each Mailbox server, or allocate one server to use for database recoveries.
Question: Will you allocate space for database recovery on each Mailbox server?
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
9-33
Key Points
Non-Mailbox servers provide various functions, and do not contain significant amounts of user or
configuration data. You can recover the basic functions of non-Mailbox servers without backing up
existing servers. Backups are required only if you are restoring additional configuration options that you
may have set after installation.
If you use a client access array, then you do not need to redirect clients to the new Client Access server.
The client access array continues to service user requests after a failure. You can add a new Client Access
server to the load-balancing cluster used for the client access array at any time. Configure a new Client
Access server in a client access array with the same customizations as other nodes in the client access
array. This includes the SSL certificate.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
9-35
Key Points
Unlike other server roles, Edge Transport servers store most configuration information locally in Active
Directory Lightweight Directory Services (AD LDS). AD LDS is used on Edge Transport servers, because
these servers are not members of the Exchange Server organizations domain.
Use a cloned configuration to recover an Edge Transport server. To create the cloned configuration, run
the ExportEdgeConfig.ps1 script in the C:\Program Files\Microsoft\Exchange Server\V14\Scripts folder.
When you run this script, Exchange Server writes the Edge Transport servers configuration information to
an XML file. Spam filtering settings are included in the cloned configuration.
Note
You must create the cloned configuration before the Edge Transport server fails.
The cloned configuration does not include the transport configuration object, which includes a few
settings, such as maximum message sizes and maximum number of recipients for a message. Exchange
Server configures the settings in the new servers transport configuration object with the default settings.
To restore customized settings, you must manually configure them according to your documentation.
Recovery Steps
To use a cloned configuration to recover an Edge Transport server, complete the following steps:
1.
Perform a clean installation of the Edge Transport server. Use the same server name as the server that
you are restoring. However, this server is not joined to a domain, so you do not need to reset a
computer account.
2.
Run the ImportEdgeConfig.ps1 script to validate the configuration. The script checks the existing
information in the XML file to verify that the settings are valid. If some settings in the XML file are not
valid, Exchange Server creates an answer file. The answer file specifies the server-specific information
necessary for the next step.
3.
Use the ImportEdgeConfig.ps1 script to import the configuration. The script validates the XML file,
and then uses the intermediate XML file and the answer file (if required) to restore the backed-up
configuration information.
4.
Run the Microsoft Exchange EdgeSync process to establish one-way recipient and configuration
information replication from AD DS to the AD LDS instance on an Edge Transport server. The cloned
configuration backup and restore process does not duplicate the Edge Subscription servers settings,
and does not clone the certificates that the Exchange EdgeSync service uses. You must run the
Exchange EdgeSync process separately for each Edge Transport server. The Exchange EdgeSync
service overwrites settings that are included in both the cloned configuration information and the
EdgeSync replication information. These settings include Send connectors, Receive connectors,
accepted domains, and remote domains.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
9-37
Key Points
A disaster recovery plan is a plan for restoring functionality when an event occurs that causes IT systems
to fail. It focuses on threats to servers and associated infrastructure, not on threats to business processes.
However, the order in which you restore components may be based on recovery of business processes.
Testing plan, which determines the feasibility and compatibility of backup facilities and procedures
Auditing plan, which provides a methodology for demonstrating to the organization that the disaster
recovery plan works as designed
Maintenance plan, which details how team members keep current the disaster recovery plan and the
change-control procedures that control plan modifications
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
9-39
Key Points
Disaster recovery plans are not static documents; they change as organizations change. You need to
update your disaster recovery plan when you add new servers or services to the organization. Also, as you
test the disaster recovery plan, you will find opportunities for improvement.
You typically test a disaster recovery plan during non-business hours to minimize the impact on users.
However, more ambitious testing could include testing during normal business hours to ensure that you
can perform recovery with minimal disruptions to the organizations overall operations.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
9-41
Lab Setup
For this lab, you will use the available virtual machine environment. Before you begin the lab, you must do
the following:
1.
On the host computer, click Start, point to Administrative Tools, and then click Hyper-V Manager.
2.
Ensure that the 10233B-VAN-DC1, 10233B-VAN-EX1, and 10233B-VAN-CL1 virtual machines are
running.
3.
Lab Scenario
You are a messaging engineer for A. Datum Corporation, an enterprise-level organization with multiple
locations. A. Datum Corporation is an international corporation involved in technology research and
investment, and it is planning to upgrade from Exchange Server 2003 to Exchange Server 2010.
High availability planning is complete, but the disaster recovery plan needs to be further developed.
Specifically, you need to consider the details of the messaging SLA to ensure that disaster recovery is
possible within the appropriate time frame.
Finally, you must implement part of your proposed disaster recovery plan.
Note Your instructor may choose to perform this lab as a group discussion rather than an
individual activity.
The failure of a single server should result in only minutes of downtime for users.
High availability can be considered a replacement for backup if there are at least two local copies of a
database, and a remote database copy in another site.
To consider high availability a replacement for backup, there must be one database copy that is
unaffected by logical corruption in another database copy for at least 12 hours.
Messaging functionality must be recoverable within one hour, while historical data can be recovered
up to 24 hours later.
When recovering data from a backup, there is a maximum data loss allowed of up to 4 hours.
Any location that is not configured with site resilience must archive weekly backups offsite.
2.
3.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
Jason Carlson
5th May 2010
Requirement Overview
Determine how disaster recovery will be provided for all server roles in Vancouver.
Proposals
Question: Does this site require backups?
Question: Do you need to make any changes to the DAG to meet the SLA requirements?
Question: Would your backup plan change if public folders were present in Vancouver?
Results: After this exercise, you should have created a disaster recovery plan for the Vancouver site.
9-43
2.
3.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
Task 3: Document the required configuration for the San Diego site
Jason Carlson
5th May 2010
Requirement Overview
Determine how disaster recovery will be provided for all server roles in San Diego.
Proposals
Question: Does this site require backups? If so, how will you perform backups?
Question: Do you need to make any changes to the DAG to meet the SLA requirements?
Question: How will you meet the recovery requirement of one hour?
Question: Would your backup plan change if public folders were present in San Diego?
Results: After this exercise, you should have created a disaster recovery plan for the San Diego site.
9-45
2.
3.
4.
5.
6.
Recover a message.
2.
Browse to the Organization Configuration node and click Mailbox. On the Database
Management tab, configure the following settings for Mailbox Database 1:
3.
4.
In the Exchange Management Shell, use the following command to enable single-item recovery for
Lucas mailbox:
Set-Mailbox Luca SingleItemRecoveryEnabled $true
On VAN-CL1, if necessary, log off, and then log on as Luca using the password Pa$$w0rd.
2.
Use the Microsoft Internet Explorer browser to connect to Outlook Web App at
https://van-ex1.adatum.com/owa.
3.
4.
5.
6.
In Roles & Auditing, go to the Administrator Roles tab, and then add Andreas Herbinger to the
Discovery Management role group.
7.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
9-47
On VAN-CL1, use Outlook 2010 to send a message with the following settings:
To: Luca
2.
3.
4.
On the Folder tab, use the Recover Deleted Items option to purge the Test of SIR message.
2.
3.
4.
5.
Go to Mail Control.
6.
Keywords: SIR
7.
8.
In the search results, click [open] to view the Discovery Search Mailbox.
9.
Expand the contents of the Lucas lost message folder until you see the Test of SIR message.
On VAN-EX1, in the Exchange Management Shell, use the following command to create a new role
group with permissions to export and import mailbox contents with Andreas as a member:
New-RoleGroup Name ExportMail Roles Mailbox Import Export Members Andreas
On VAN-EX1, log off as Administrator, and then log on as Adatum\Andreas using the password
Pa$$w0rd.
2.
3.
In the Exchange Management Shell, use the following command to export the message from the
Discovery Search Mailbox to Lucas mailbox:
Search-Mailbox Discovery Search Mailbox SearchQuery Subject:SIR TargetMailbox
Luca TargetFolder Recovered
4.
On VAN-CL1, in Outlook 2010, expand all of the folders in the Recovered folder to locate the
recovered message.
Results: After this exercise, you should have implemented single-item recovery and recovered a message.
2.
Right-click 10233B-VAN-DC1 in the Virtual Machines list, and then click Revert.
3.
4.
Repeat these steps for 10233B-VAN-EX1, 10233B-VAN-EX2, and 10233B-VAN-EX3. Close the
virtual machine connection windows.
5.
In the Virtual Machines pane, click 10233B-VAN-DC1, and then, in the Actions pane, click Start.
6.
To connect to the virtual machine for the next modules lab, click 10233B-VAN-DC1, and then, in the
Actions pane, click Connect.
Important Start the 10233B-VAN-DC1 virtual machine first, and ensure that it is fully
started before starting the other virtual machines.
7.
Wait for 10233B-VAN-DC1 to start, and then start 10223B-VAN-EX1. Connect to the virtual machine.
8.
Wait for 10233B-VAN-EX1 to start, and then start 10223B-VAN-EX2. Connect to the virtual machine.
9.
Wait for 10233B-VAN-EX2 to start, and then start 10223B-VAN-EX3. Connect to the virtual machine.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
9-49
Review Questions
1.
Why might older backup software not support Exchange Server 2010?
2.
3.
4.
Whenever possible, use a DAG to protect mailbox databases. DAG recovery is faster and easier than
backup recovery.
When you lose a database, use a dial-tone database to quickly recover basic messaging functionality.
Allocate disk space for a recovery database when designing server storage.
Use single-item recovery to prevent users from purging messages before they reach the itemretention limit.
10-1
Module 10
Planning Microsoft Exchange Server 2010 Monitoring and
Troubleshooting
Contents
Lesson 1: Planning Exchange Server Monitoring
10-3
10-19
10-27
10-2
Module Overview
To ensure that your messaging system runs efficiently, you must perform routine monitoring and, where
necessary, make adjustments to your Microsoft Exchange Server 2010 servers. By understanding how to
implement a monitoring program and knowing what and how to monitor, you can optimize your
Exchange servers.
Occasionally, problems may arise with your messaging system. Therefore, it is important to understand
how to troubleshoot problems with Exchange Server 2010. Planning an effective troubleshooting
methodology and having familiarization with the troubleshooting tools helps you to quickly and
efficiently resolve even complex problems.
After completing this module, you will be able to:
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 10-3
Lesson 1
Monitoring practices are commonly an afterthought, and are often implemented sometime after
Exchange Server is deployed. However, having a well-tuned and consistently used monitoring solution can
greatly improve your ability to identify, troubleshoot, and repair issues before they are noticed by end
users.
After completing this lesson, you will be able to:
10-4
There are several methods that you can use to collect performance data from Exchange servers in your
organization. You should use the method that best suits your requirements.
Real-time monitoring of Exchange servers is useful when you want to determine the effect of performing
a specific action or troubleshoot specific events. This type of monitoring can also help you to ensure that
you are meeting service level agreements (SLAs).
Analyzing historical data can be useful for tracking trends over time, determining when to relocate
resources, and deciding when to invest in new hardware to meet the changing requirements of your
business. You should use historical performance data to assist you when planning for future Exchange
Server requirements.
Exchange Server 2010 includes a range of tools to assist you in the monitoring of your Exchange Server
environment. The following table lists these tools.
Tool
Description
Collects information related to server operations. This data can help you to
identify performance issues on a server. You should search for specific
events in the event log file to locate and identify problems.
Windows System
Resource Manager
(WSRM)
By using WSRM, you can control how CPU resources are allocated to
applications, services, and processes. Managing these resources improves
system performance, and reduces the chance that these applications,
services, or processes interfere with the rest of the system.
WSRM is a feature of Windows Server 2008.
Network Monitor
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 10-5
(continued)
Tool
Description
Reliability and
Performance Monitor
You can use Windows Reliability and Performance Monitor to examine how
programs you run affect your computer's performance, both in real time,
and by collecting log data for later analysis. Windows Reliability and
Performance Monitor uses performance counters, event trace data, and
configuration information, which can be combined into Data Collector Sets.
Reliability and Performance Monitor is built in to Windows Server 2008.
Microsoft Exchange
Server 2010
Management Pack for
Microsoft System Center
Operations Manager
2010
Microsoft Exchange
Server 2010
Management Pack for
System Center Essentials
2010
Note The Exchange 2010 SP1 version of the Exchange 2010 Management Pack includes a
number of improvements, including cross-premises mail flow monitoring and reporting; this
enables you to use mail flow monitoring and reporting features for Exchange Online. For
further information about additional changes in the Management Pack, see the Microsoft
TechNet website: http://blogs.technet.com/b/kevinholman/archive/2011/04/07
/exchange-2010-sp1-management-pack-ships-version-14-02-0071-0.aspx.
You should consider the cost that monitoring events incurs. The cost that is incurred to monitor systems is
an investment in ensuring that your systems continue to run effectively and efficiently. You can measure
costs by using several metrics, including:
An alternative view is to consider the cost of not monitoring your systems by asking the following
questions:
What is the monetary cost of reduced user productivity for your organization?
What is the cost of system outage that is caused by not monitoring systems?
By using automated systems, you can monitor servers proactively, and possibly reduce the overall number
of staff who are required to perform monitoring. By using tools such as System Center Operations
Manager 2010, you can automatically monitor and fix certain server issues.
10-6
By providing an IT infrastructure that automatically responds to events, you create a server infrastructure
that is flexible and dynamic. Windows Server 2008 enables dynamic system responses through Task
Manager, other tools such as System Center Operations Manager 2010, and third-party offerings.
Since Exchange Server 2010 is complex, there are a number of aspects that you need to monitor.
Primarily, you should gather and monitor metrics from the processor, memory, disk, and the Exchange
services. You can monitor additional information depending on the Exchange Server roles that have been
installed.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 10-7
The maximum level of performance for an Exchange Server is determined by the component in the server
that performs least well; in other words, the server bottleneck. Each of the server roles makes different
demands on the operating system and installed hardware, and it is therefore important to consider each
role separately.
When collecting performance data about Mailbox servers, much of the focus is around disk response time,
and how quickly the server responds to requests. The average response time for reading data should be
under 20 milliseconds (ms), and the average write response time should be less than 100 ms. Another
indicator that the disk system is not keeping up with demand is when the disk queue length starts to
grow. All of these indicators may require that you purchase additional or faster disks, or modify the disk
configuration.
There are many Mailbox server performance counters that you may find beneficial to trend, depending on
your messaging environment. However, the following counters are crucial, and are a good place to begin
when collecting performance data for the Mailbox server.
Logical Disk
Logical Disk counters determine whether the disk performance is meeting demands. As disk latency
increases, database Read and Write operations take more time.
10-8
Monitor the following performance counters for Mailbox server logical disks.
Group
Counter
Description
Expected value
Logical
Disk
Avg. Disk
sec/Read
Avg. Disk
sec/Write
Avg. Disk
sec/Transfer
Counter
MSExchangeIS Messages
Mailbox and
Queued for
MSExchangeIS Submission
Public
Description
Expected value
MSExchangeIS
The Client Access and Transport servers use remote procedure call (RPC) to communicate with Mailbox
servers. Therefore, it is important to monitor the response time for RPC requests to ensure that the
Mailbox server responds quickly enough to support the load.
Group
Counter
Description
Expected value
MSExchangeIS
RPC
Requests
RPC
Averaged
Latency
RPC
Operations
/sec
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 10-9
(continued)
Group
Counter
Description
Expected value
MSExchangeIS
RPC Num.
Slow
Packets
10-10
The transport servers store message queue information to disk. The average response time for reading
data should be less than 20 ms, and the average write response time should be less than 100 ms. Another
indicator that the disk system is not keeping up with demand is when the disk queue length starts to
grow. All of these may require you to purchase additional or faster disks, or modify the disk configuration.
Logical Disk
Logical Disk counters determine whether disk performance is meeting demands. As disk latency increases,
database Read and Write operations take more time.
Monitor the following performance counters for transport server logical disks.
Group
Counter
Description
Expected value
Avg. Disk
sec/Write
Avg. Disk
Queue Length
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 10-11
Counter
Description
Expected value
MSExchange
Database
==>
Instances
Log
Generation
Checkpoint
Depth
Version
buckets
allocated
Log Record
Stalls/sec
Counter
Description
Expected value
Active Remote
Delivery Queue
Length
Active Mailbox
Delivery Queue
Length
Retry Mailbox
Delivery Queue
Length
Unreachable Queue
Length
Largest Delivery
Queue Length
Poison Queue
Length
10-12
The Client Access server role performs many of the key client connectivity functions for Exchange Server
clients. Disk performance is important for determining overall server health. Additionally, you should
monitor the response time for services used by Client Access servers to ensure proper performance.
Logical Disk
Logical Disk counters determine whether the disk performance is meeting demands. As disk latency
creases, database Read and Write operations take more time.Monitor the following performance counters
for the Client Access server logical disk.
Group
Counter
Description
Expected value
LogicalDisk
Avg. Disk
sec/Read
Should be below 20 ms on
average.
Avg. Disk
sec/Write
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 10-13
The following table lists the counters related to ASP.NET and ASP.NET applications.
Group
Counter
Description
Expected value
ASP.NET
Application
Restarts
Worker Process
Restarts
Requests
Current
Request Wait
Time
Requests in
Application
Queue
ASP.NET
Applications
Counter
Description
Expected value
MSExchange
OWA
Average Response
Time
Average Search
Time
Number of failed
back end
connection
attempts per
second
RPC/HTTP
Proxy
10-14
(continued)
Group
Counter
Description
Expected value
MSExchange
ActiveSync
Average Request
Time
MSExchangeFS:
OAB
Download Task
Queued
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 10-15
Exchange Server Hub Transport and Edge Transport servers generate transport logs, which provide useful
information about messages in transit through your messaging pipeline. You can configure your transport
servers to generate logs that relate to:
Connectivity. These logs record the connection activity of outbound message queues. Specifically,
they track the connection activity from the sending queue to the destination Mailbox server, smart
host, or domain. The default maximum log file size is 10 megabytes (MB) and circular logging is
selected by default. Connectivity logging is disabled by default.
Protocols. These logs record Simple Mail Transfer Protocol (SMTP) conversations between email
servers. In Exchange Server, these conversations occur at the servers hosting Send or Receive
connectors. As with connectivity logging, the default maximum log file size is 10 MB, and circular
logging is selected by default. Protocol logging is disabled by default.
Message tracking. These logs provide a detailed log of all message activity as messages flow between
the Hub Transport and Edge Transport servers, and between the transport servers and the Mailbox
server role. Message tracking is enabled by default. Circular logging is also enabled by default, and
the maximum log file size defaults to 10 MB.
Agent activity. These logs record the actions performed by specific anti-spam agents on the transport
servers. The following agents can write to the log:
Sender ID agent
10-16
As with the other logs, the default maximum log file size is 10 MB, and circular logging is enabled.
Agent logging is also enabled by default.
Routing tables. These logs record a snapshot of the Exchange Server routing tables on a periodic
basis. The default log file size is 50 MB. The routing log is updated when the following events occur:
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 10-17
You should give careful consideration to the value of performance data to ensure that it reflects the real
server environment. Additionally, you should consider performance analysis in addition to business plans.
By analyzing performance trends, you can predict when existing capacity is likely to be exhausted. You
should review historical analysis with consideration to your business, and use this to determine when
additional capacity is required. Some peaks are associated with one-time activities, such as very large
orders. Other peaks occur on a regular basissuch as a monthly payrolland these peaks may require
increased capacity to meet increasing numbers of employees.
Planning for future server capacity is a requirement for all organizations. Business planning often requires
additional server capacity to meet targets. By aligning your IT strategy with the strategy of the business,
you can support the business objectives.
The introduction of new services and applicationssuch as the deployment of Exchange Server 2010
can affect the performance of your IT infrastructure. These services may receive dedicated hardware,
although they often use the same local area network (LAN) and wide area network (WAN) network
infrastructure.
Planning for future capacity should include all hardware components, and how the new Exchange Servers
and related services and applications affect the existing infrastructure. Factors such as power, cooling, and
rack space are often overlooked during initial exercises to plan capacity expansion. You should consider
how your infrastructure can scale up and scale out to support an increased workload.
Tasks such as upgrading to Exchange Server 2010 and updating operating systems may affect your servers
and network. It is not unknown for an update to cause a problem with an application. Careful
performance monitoring before and after you apply updates can help you identify problems.
Expanding business requires you to provide support for more users. You should consider business
requirements when you purchase hardware. This consideration will ensure that you can meet future
business requirements by increasing the number of servers, or by adding capacity to existing hardware.
10-18
More servers.
Additional hardware.
Reducing users.
To determine which thresholds denote an existing problem, set a monitoring baseline by reviewing
monitoring data over a full business cycle. Business cycles vary for each company, and your cycle should
include both busy and slow periods. For some businesses, busy periods might correlate with the end-ofmonth accounting-close processes, or periods with notably high sales figures. Gathering a broad data set
will provide sufficient data to determine the appropriate operating thresholds.
To use the collected performance data:
1.
Create a monitoring baseline by averaging performance metrics from a properly operating system:
2.
3.
Adjust thresholds.
It is important that you review your thresholds periodically, so you can adjust the serversor the
thresholds themselvesto ensure proper monitoring.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 10-19
Lesson 2
Even in a well-maintained Exchange Server organization, problems can arise, which you must identify and
repair. Although general troubleshooting guidelines exist, often, experience and an analytical approach
provide the best tools for successfully discovering the problems source, and then fixing it.
After completing this lesson, you will be able to:
Describe Windows Server tools that can help you perform troubleshooting tasks.
Describe the Exchange Server tools that can help you perform troubleshooting tasks.
10-20
You can use many other toolsin addition to the Microsoft Management Console (MMC) snap-ins, the
Exchange Management Console, the Exchange Management Shell, and Active Directory Users and
Computersto manage and troubleshoot an Exchange Server 2010 organization.
The following table lists and describes additional Exchange Server 2010 troubleshooting tools.
Tool name
Description
ADSI Edit
(adsiedit.msc)
Use for low-level Active Directory Domain Services (AD DS) and Active
Directory editing. Install with the Remote Server Administration Tools.
DSACLS
(dsacls.exe)
Event Viewer
(eventvwr.msc)
Use this MMC snap-in to view logged events such as errors and
warnings.
LDP
(ldp.exe)
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 10-21
(continued)
Tool name
Description
Process Monitor
(procmon.exe)
10-22
Over the years, a number of useful Exchange Server troubleshooting tools have been introduced. Each
tool has a specific use, but they all use detailed product knowledge and information about your
environment to suggest potential problem solutions.
Exchange Best Practices Analyzer (ExBPA). This is an invaluable tool for identifying potential issues
based on deviations from best practices, and for gathering a great deal of information about the
Exchange Server organization, which you can then use for reference and for troubleshooting
problems.
Performance Troubleshooter. This tool helps you locate and identify performance-related issues that
could affect Exchange servers. You diagnose problems by selecting the symptoms observed. Based on
the symptoms, the tool walks you through the correct troubleshooting path. Performance
Troubleshooter identifies possible bottlenecks, and suggests corrective actions.
The Exchange Mail Flow Troubleshooter. This tool helps provide easy access to various data sources
that are required to troubleshoot problems with mail flow, such as non-delivery reports (NDRs),
queue backups, and slow deliveries. The tool then automatically diagnoses the retrieved data,
presents an analysis of the possible root causes, and suggests corrective actions.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 10-23
Other toolssuch as the Performance and Reliability Monitorcheck the health of the Exchange Server
processes. You can use the Queue Viewer to view the message status in transport queues. Tools such as
Network Monitor and Telnet can help you troubleshoot network issues and message tracking, and the
Routing Log Viewer can help you troubleshoot message delivery issues. The following table lists additional
tools.
Tool name
Description
Use this tool to find and remove errors in the public and private
information store databases. This tool is intended for disaster
recovery situations, and not for routine maintenance.
Inter-Organization Replication
(exscfg.exe; exssrv.exe)
Microsoft Baseline Security Analyzer Use this tool to scan local or remote systems for common
(MBSA)
configuration errors, and to verify security best practices.
GUI: MBSA.exe
Command line: mbsacli.exe
RPC Ping utility
(rpings.exe and rpingc.exe)
Telnet
(telnet.exe)
10-24
You can apply standard troubleshooting techniques to the unique problems that can occur with Hub and
Edge Transport servers. Use tools such as the Queue Viewer, message tracking system, and Mail Flow
Troubleshooter to identify the problem, and then work toward a resolution.
Discussion Question
Question: Users are reporting non-deliverable and slow-to-deliver outbound email. What
process can you use to troubleshoot the problem?
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 10-25
You can apply standard troubleshooting techniques to the unique problems that can occur with Client
Access servers. Use tools such as the Exchange Best Practices Analyzer and the Event Viewer to identify the
problem and work toward a resolution.
Discussion Question
Question: Office Outlook users can no longer connect to the system. What process can you use
to troubleshoot the problem?
10-26
You can apply standard troubleshooting techniques to the unique problems that can occur with Mailbox
servers. Use tools such as the Database Troubleshooter and the Event Viewer to identify the problem and
work toward a resolution.
Discussion Question
Question: A database has gone offline. What process can you use to troubleshoot the problem?
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 10-27
Lab Setup
For this lab, you will use the available virtual machine environment. Before you begin the lab, you must:
1.
On the host computer, click Start, point to Administrative Tools, and then click Hyper-V Manager.
2.
3.
Lab Scenario
You are a messaging engineer for A. Datum Corporation, an enterprise-level organization with multiple
locations. You have been tasked with creating a performance baseline for the new Exchange Server 2010
messaging system that your colleagues are about to deploy.
10-28
2.
Configure Load Generator with suitable values to simulate the required load.
3.
On VAN-EX1, open Exchange Management Console, and then load the Performance Monitor from
the Toolbox.
2.
Create a User Defined data collector set with the following properties:
3.
Name: Baseline
Counters:
Memory
MSExchangeIS
MSExchangeIS Mailbox
MSExchangeTransport Queues
MSExchangeTransport SmtpReceive
MSExchangeTransport SmtpSend
Physical Disk
Processor
Server
System
Sample interval: 1
Task 2: Configure Load Generator with suitable values to simulate the required load
1.
2.
Open Exchange Load Generator 2010 by clicking the Start menu, pointing to All Programs, and then
clicking the Microsoft Exchange folder.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 10-29
3.
b.
c.
On the Specify test settings page, under Define the total length of the simulation, in the
Hours box, type 0.
d.
Note
e.
f.
In the Mailbox Account Master Password box, type Pa$$w0rd, and then click Continue with
recipient management.
g.
On the User settings page, in the text box, type 12, and then click Distribute users evenly
across databases.
h.
Click Continue.
i.
On the Advanced recipient settings page, select the following check boxes.
Use contacts
j.
k.
On the Specify test user groups page, click the PLUS SIGN (+).
l.
In the resulting item, in the Client Type list, click Outlook 2007 Online.
m. On the Specify test user groups page, click the PLUS SIGN(+).
n.
In the resulting item, in the Client Type list, click Outlook 2007 Cached, and in the Action
Profile list, click Heavy.
o.
p.
On the Configuration summary page, click Save the configuration file as.
q.
In the Save As dialog box, in the File name box, type Baseline, and then click Save.
r.
s.
4.
5.
Start the Baseline data collector set, and switch back to VAN-DC1. Once the simulation has
completed, switch back to VAN-EX1.
Note
10-30
2.
3.
Click System Monitor. Click the red X in the toolbar repeatedly to remove all counters from the
display.
4.
Press CTRL+L.
5.
Click Log files, and then select the DataCollector01.blg log located in the Admin > Baseline > xxxx000001 folder.
6.
Counter
Memory
Pages/sec
MSExchangeIS
RPC Requests
MSExchangeIS
User Count
MSExchangeIS Mailbox
MSExchangeIS Mailbox
Messages Delivered/sec
MSExchangeIS Mailbox
MSExchangeIS Mailbox
Messages Sent/sec
MSExchangeTransport Queues
MSExchangeTransport Queues
MSExchangeTransport Queues
MSExchangeTransport SmtpReceive
Messages Received/sec
MSExchangeTransport SmtpSend
Messages Sent/sec
Physical Disk
% Disk Time
Physical Disk
Processor
% Processor Time
Server
Server
System
Note If Performance Monitor experiences problems, close and restart it. Then continue
from step 3.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 10-31
7.
8.
Average
Memory Pages/sec
MSExchangeIS - User Count
MSExchangeIS - RPC Requests
MSExchangeIS Mailbox - Local delivery rate
MSExchangeIS Mailbox - Messages Delivered/sec
MSExchangeIS Mailbox - Messages Queued For Submission
MSExchangeIS Mailbox - Messages Sent/sec
MSExchangeTransport Queues - Active Remote Delivery Queue
Length
MSExchangeTransport Queues - Retry Remote Delivery Queue
Length
MSExchangeTransport Queues - Submission Queue Length
MSExchangeTransport SmtpReceive - Messages Received/sec
MSExchangeTransport SmtpSend Messages Sent/sec
Physical Disk - % Disk Time
Physical Disk - Avg. Disk Queue length
Processor - % Processor Time
Server - Pool Nonpaged Failures
Server - Work Item Shortages
System - Processor Queue Length
Note
Results: After this exercise, you should have created an Exchange Server performance baseline.
10-32
Generate additional load with Load Generator to simulate the environment of heavier than planned
for usage.
2.
Task 1: Generate additional load with Load Generator to simulate the environment
of heavier than planned for usage
1.
Switch to VAN-DC1.
2.
3.
Click Use the following saved configuration file, and then click Browse.
b.
In the Please select a configuration file dialog box, double-click Baseline.xml, and then click
Continue.
c.
On the Specify test settings page, click Continue with recipient management.
d.
On the User settings page, in the text box, type 20, and then click Distribute users evenly
across databases.
e.
Click Continue.
f.
On the Advanced recipient settings page, select the following check boxes.
Use contacts
g.
h.
On the Specify test user groups page, click the PLUS SIGN (+).
i.
In the resulting item, in the Client Type list, click Outlook 2007 Online, and in the Action
Profile list, click Heavy.
j.
On the Specify test user groups page, click the PLUS SIGN (+).
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 10-33
k.
In the resulting item, in the Client Type list, click Owa2010Module, and in the Action Profile
list, accept the defaults.
l.
m. On the Configuration summary page, click Save the configuration file as.
n.
In the Save As dialog box, in the File name box, type Adatum, and then click Save.
o.
p.
4.
5.
Start the Baseline data collector set, and then switch back to VAN-DC1.
6.
2.
3.
In the Performance Monitor Properties dialog box, click the Source tab, and then click Remove.
4.
5.
In the Select Log File dialog box, click Up One Level, double-click the folder ending in 000002,
double-click DataCollector01.blg, and then click OK.
6.
View the counter values, and then complete the following table.
Counter
Memory Pages/sec
MSExchangeIS - User Count
MSExchangeIS - RPC Requests
MSExchangeIS Mailbox - Local delivery rate
MSExchangeIS Mailbox - Messages Delivered/sec
MSExchangeIS Mailbox - Messages Queued For
Submission
MSExchangeIS Mailbox - Messages Sent/sec
MSExchangeTransport Queues - Active Remote Delivery
Queue Length
MSExchangeTransport Queues - Retry Remote Delivery
Queue Length
MSExchangeTransport Queues - Submission Queue
Length
MSExchangeTransport SmtpReceive - Messages
Received/sec
Average
10-34
Counter
Average
Results: After this exercise, you should have determined which server resources are likely to become
bottlenecked if server load continues to increase.
2.
Right-click 10233B-VAN-DC1 in the Virtual Machines list, and then click Revert.
3.
4.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 10-35
Review Questions
1.
What is an advantage of using automated monitoring systems such as System Center Operations
Manager 2010?
2.
In terms of monitoring Mailbox server performance, what is the most likely performance bottleneck
you will encounter?
3.
Which components responsiveness can you monitor to ensure adequate performance of Outlook
Web App clients?
4.
Which transport logs should you enable in order to troubleshoot message flow?
5.
10-36
11-1
Module 11
Upgrading to Microsoft Exchange Server 2010
Contents:
Lesson 1: Overview of Upgrading to Exchange Server 2010
11-3
11-12
11-28
11-41
11-2
Module Overview
Microsoft Exchange Server is a popular messaging system, and many organizations have selected it as
the foundation for their messaging infrastructure.
When you decide to implement Exchange Server 2010, if you already have a previous Exchange Server
version installed in your organization, then you must plan the upgrade from your existing version of
Exchange Server. Depending on your current Exchange Server version, you can perform a coexistence
upgrade to Exchange Server 2010 by deploying Exchange Server 2010 servers into an existing Exchange
organization; for convenience, we shall refer to this method as an upgrade.
Alternatively, you might choose to deploy the new Exchange Server 2010 organization in parallel to your
existing Exchange Server organization; we shall refer to this method as a migration. To avoid disruption to
users, it is important that you understand the implications of choosing between a coexistence upgrade,
and a side-by-side migration.
This module provides an overview of the options that organizations have when choosing to implement
Exchange Server 2010, and provides details on how to upgrade an existing Microsoft Exchange Server
2003 or Exchange Server 2007 organization to Exchange Server 2010.
After completing this module, you will be able to:
Describe the general Exchange Server 2010 upgrade scenarios and strategies.
Plan the upgrade from Exchange Server 2003 to Exchange Server 2010.
Plan the upgrade from Exchange Server 2007 to Exchange Server 2010.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
11-3
Lesson 1
While you perform the upgrade to Exchange Server 2010, users should still be able to send and receive
email, and perform scheduling tasks with the existing messaging system with minimal disruption.
Consequently, it is important to select the appropriate upgrade strategy to minimize user disruption.
After completing this lesson, you will be able to:
Describe the upgrade scenarios that are supported in Exchange Server 2010.
11-4
Key Points
Note It is important to understand that the term upgrade refers to the upgrade of your
Exchange Server organization, rather than specific servers within your organization; you
cannot perform an upgrade of an individual Exchange server to Exchange Server 2010. You
can perform an upgrade of your Exchange organization by deploying new Exchange Server
2010 servers, and then migrating mailboxes and services to them. For brevity, we shall refer
to this process as an upgrade.
Upgrading an Exchange Server organization to Exchange Server 2010 is usually the easiest option.
Therefore, most organizations choose this path for upgrading their existing Exchange Server deployments;
however, this option has several prerequisites.
Your schema master must be running the Windows Server 2003 operating system with Service Pack
1 (SP1) or newer.
You must deploy at least one global catalog server in each site that is running Windows Server 2003
with SP1 or newer.
You must have configured your AD DS forest to be at least at the Windows Server 2003 forestfunctional level or higher.
You must deploy at least one domain controller and one global catalog server with a writeable AD DS
copy in each Active Directory site; Exchange Server 2010 cannot use read-only domain controllers
(RODCs) or read-only global catalog servers running Windows Server 2008.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
11-5
Exchange
organization
upgrade
Not supported
Supported
Supported
Mixed Exchange
Server 2007and Exchange
Server 2003 organization
Supported
Comments
After you deploy a new Exchange Server 2010 organization, you cannot add servers running earlier
Exchange Server versions to the organization; Exchange Server 2010 does not support the addition of
earlier Exchange Server versions to an Exchange organization that includes only Exchange Server 2010
servers.
11-6
Key Points
Exchange Server 2010 supports several different options for upgrading from other messaging systems.
Upgrade. In this scenario, you upgrade an existing Exchange Server organization to Exchange
Server 2010. To perform the upgrade, install Exchange Server 2010 servers into an existing Exchange
Server 2003 or Exchange Server 2007 organization, and then move data and functionality from the
existing Exchange servers to the new Exchange Server 2010 servers. This is the easiest and least
disruptive scenario for integrating Exchange Server-based messaging systems, because the different
Exchange Server versions share configuration and recipient information automatically.
Migration. In this scenario, you upgrade from either a non-Exchange Server messaging system or
from an existing Exchange Server organization, to a new Exchange Server 2010 organization, without
retaining any of the existing organizations Exchange server configuration data. This is more complex
to configure, because by default, the two messaging systems share no information, and consequently
you must configure all connections between the systems.
Note You must deploy a second AD DS forest when you perform a migration from one
Exchange Server organization to another. Then migrate all user accounts to the second
forest.
In-place upgrade. In this scenario, you upgrade a single computer that is running a previous
Exchange Server version to a newer Exchange Server version. Exchange Server 2010 does not support
in-place upgrades.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
11-7
Single-phase upgrade. In a single-phase upgrade, you replace your existing messaging system with
Exchange Server 2010, and move all required data and services to the new system. In a single-phase
upgrade, you do not need to plan for an extended period of coexistence between the two systems.
Typically, you perform this type of upgrade over a short period, perhaps a weekend. This enables you
to shut down the entire messaging system, and replace it with Exchange Server 2010, so that when
users return to work the new messaging system is operational. In this scenario, the period of
coexistence or interoperability is quite short.
While this upgrade is the fastest option, it also introduces a significant risk if the upgrade fails. This
scenario is feasible only for small organizations that must replace just a few servers, and there are only
a small number of users to migrate.
Multiphase upgrade with coexistence. In a multiphase upgrade, you upgrade one server or site at a
time to Exchange Server 2010. Because you spread this incremental upgrade over a longer period,
you decrease your organizations risk. However, in this scenario, you also must plan for coexistence or
interoperability. This is the best approach for medium to large organizations, because of their
complex messaging requirements.
11-8
Key Points
In most coexistence scenarios, you must ensure that users with mailboxes on both messaging systems
have access to the following:
Public folder contents. If the organization stores important information in public folders, you may
need to replicate the public folder contents between the messaging systems.
Email message flow. When you run two messaging systems, users must be able to send email to other
organizational users, and to and from users on the Internet. Message flow should be transparent to
users. Users do not need to knownor should it matterwhich messaging system contains the
recipients mailbox.
Global address list (GAL). To simplify the process of sending messages between messaging systems,
you must ensure that you synchronize the GAL between messaging systems.
Calendar information. To facilitate scheduling of meetings between the two messaging systems, you
must ensure that Free/Busy information replicates between the two messaging systems.
Administration of the system. It is important that during the upgrade you can continue to administer
the Exchange Server organization.
If you implement an upgrade to Exchange Server 2010, the design of the upgrade process ensures that
these coexistence components are maintained throughout the coexistence.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
11-9
Key Points
If your organization has multiple AD DS sites that contain Exchange servers, it is important to consider the
order in which you upgrade these sites.
When planning a multisite organization upgrade, remember that Exchange Server does not support the
upgrade of internal sites before you have upgraded Internet-facing sites; this is because Client Access
server-to-Client Access server proxying is only supported from Exchange Server 2010 to Exchange
Server 2007, and not the other way. Consequently, you must upgrade Internet-facing sites first.
Within the site, the recommended order in which you must upgrade the specific Exchange Server roles is
as follows:
1.
Client Access
2.
Hub Transport
3.
Mailbox
4.
Unified Messaging
Once you have upgraded all the Internet-facing sites, you can begin to upgrade the internal AD DS sites.
You should upgrade the server roles in the same order as your Internet-facing sites.
Exchange Server 2003 does not support AD DS sites for message routing; instead, all Exchange
Server 2010 servers are added as members of a single routing group called Exchange Routing Group
(DWBGZMFD01QNBJR). The implications of this are explored in the following lesson.
11-10
Key Points
Exchange Server 2010 does not implement certain features from earlier Exchange Server versions. It is
important to understand which features are affected, and to plan implementation of suitable alternatives
to these features.
The following Exchange Server 2003 features are not supported in Exchange Server 2010:
Novell GroupWise connector. This connector is a component of Exchange Server 2003, and enables
you to implement messaging coexistence between Exchange and Novell GroupWise organizations.
The connector provides mail flow connectivity, in addition to the ability to synchronize the two
directories. With directory synchronization in place, each GAL is updated with users from the other
organization. Exchange Server and Novell GroupWise users can send email to each other by selecting
the recipient from their address books. If you require this functionality, retain at least one Exchange
Server 2003 server.
Network News Transfer Protocol. The Network News Transfer Protocol (NNTP) retrieves newsgroup
content. If you require NNTP functionality, retain at least one Exchange Server 2003 server.
Microsoft Office Outlook Mobile Access. The Microsoft Exchange ActiveSync technology provides
much of this functionality.
Inter-Organization Replication Tool. In Exchange Server 2003, this utility is made up of two programs:
the Exchange Server Replication Configuration utility (Exscfg.exe), and the Exchange Server
Replication Service (Exssrv.exe). You can use these programs to coordinate meetings, appointments,
and contact information between members of two different legacy Exchange organizations. Exchange
Server 2010 uses the Microsoft Federation Gateway to establish and maintain federation between
Exchange Server organizations, so that users can share availability information, calendaring data, and
contacts.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
11-11
The following Exchange Server 2007 features are not supported in Exchange Server 2010:
Single copy clusters (SCC), local continuous replication (LCR), cluster continuous replication (CCR) and
standby continuous replication (SCR). In Exchange Server 2007, these Mailbox features are used to
provide for high availability of storage groups. In Exchange Server 2010, they are replaced by
database availability groups (DAGs) and mailbox database copies.
Microsoft Transporter Suite for Lotus Domino. Microsoft Transporter Suite is a set of interoperability
and migration tools that migrate content from Lotus Domino servers to Exchange Server. The suite
contains a set of tools for Directory and Free/Busy interoperability between Lotus Domino and
Exchange Server 2007, and AD DS. In addition, the suite contains migration tools to help migrate
users, groups, personal address lists, mailboxes, personal mail archives, and applications from Lotus
Domino to AD DS, Exchange Server 2007, and Windows SharePoint Services 3.0. If you require this
functionality, you must maintain an Exchange Server 2007 server in your Exchange organization.
Programmatic access to Exchange by using Exchange OLE DB Provider (ExOLEDB), Web Distributed
Authoring and Versioning (WebDAV) or CDO for Exchange 2000 Server (CDOEX). Replace the
ExOLEDB, WebDAV or CODEX functionality with Exchange Web Services (EWS) or EWS-Managed
application programming interface (API). Alternatively, maintain an Exchange Server 2007 server in
your organization for mailboxes of applications that use these technologies.
11-12
Lesson 2
Many organizations still use Exchange Server 2003 for their messaging system, and they might not have
any plans of upgrading to Exchange Server 2007. Microsoft supports an upgrade from Exchange Server
2003 directly to Exchange Server 2010, specifically for these organizations. This lesson describes how to
upgrade an Exchange Server 2003 organization to Exchange Server 2010.
After completing this lesson, you will be able to:
Determine whether your Exchange Server 2003 organization is ready to upgrade to Exchange
Server 2010.
Describe the process for installing Exchange Server 2010 in an Exchange Server 2003 organization.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
11-13
Key Points
Before you start the upgrade process, you must prepare AD DS for the Exchange Server 2010 deployment.
To do this, you must run Exchange Server 2010 setup using the /PrepareLegacyExchangePermissions
parameter and the /PrepareAD parameter. Additionally, your current infrastructure must meet the
following conditions:
The schema master and at least one global catalog server in each site must be running Windows
Server 2003 with SP1 or newer.
Both the domain and forest functional levels must be at least Windows Server 2003.
Your Exchange Server 2003 servers must be running Exchange Server 2003 with a minimum of SP2.
11-14
Creates the Active Directory universal security group, ExchangeLegacyInterop. This group receives
permissions that allow the Exchange Server 2003 servers to send email to the Exchange Server 2010
servers.
Creates the Exchange Server 2010 administrative group, which is called Exchange Administrative
Group (FYDIBOHF23SPDLT).
Creates the Exchange Server 2010 routing group, which is called Exchange Routing Group
(DWBGZMFD01QNBJR).
The PrepareAD command also extends the schema to include the Exchange Server 2010 schema objects
and attributes.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
11-15
Key Points
When deploying Exchange Server 2010 in a supported Exchange Server organization, you must follow a
specific process.
Install the Exchange Server 2010 Client Access server. After you install the Client Access server, you
should use this as the primary connection point for all client connections.
2.
Install the Exchange Server 2010 Hub Transport server. When you install the Hub Transport server in
an Exchange Server 2003 environment, it prompts you for the name of an Exchange Server 2003
computer that will be the routing-group bridgehead server between the Exchange Server 2003
routing group, and the Exchange Server 2010 routing group. Exchange Server 2010 no longer uses
routing groups to manage message routing, but you install all Exchange Server 2010 servers in a
routing group for backwards compatibility.
3.
Install the Exchange Server 2010 Mailbox servers. After the rest of the infrastructure is in place, you
can deploy the Exchange Server 2010 Mailbox servers, and start moving mailboxes and public folders
to the new servers.
Note If you deploy Exchange Server 2010 in a small or medium-size organization, and you
plan to deploy only one or two Exchange Server 2010 servers, you can perform a typical
installation and install simultaneously the Client Access server role, Hub Transport server
role, and the Mailbox server role.
11-16
4.
5.
For organizations with multiple sites, there are typically two types of Active Directory sites: Internetaccessible sites, and non-Internet accessible sites. A single Exchange Server organization may have
one or more Internet-accessible sites. When upgrading Active Directory sites, you should upgrade
Internet-accessible sites before non-Internet accessible sites.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
11-17
Key Points
After you deploy the Exchange Server 2010 Client Access and Mailbox servers, the process that nonMessaging Application Programming Interface (non-MAPI) clients use when accessing the user mailboxes
depends on the type of client you are using and the mailboxs location.
11-18
If your organization includes Outlook 2003 clients, you need to ensure that you create a replica on the
Exchange Server 2010 Mailbox server of the system folders for the offline address book.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
11-19
Client Access servers provide Internet users with access to their mailboxes by using Outlook Web App,
ActiveSync, and Outlook Anywhere. It is important to understand how each of these methods behave
during the upgrade process to ensure that user access is not interrupted.
The first step in the upgrade process is to add one or more Exchange Server 2010 Client Access servers to
the site being upgraded. Clients accessing their mailbox from the Internet connect to the Exchange 2010
Client Access server and are then redirected or proxied to the appropriate Exchange 2003 server.
Create a new DNS record for the legacy URL, such as legacy.contoso.com.
2.
Configure a new certificate on the Exchange Server 2003 front-end server that has a subject matching
the new DNS record for the legacy URL.
11-20
3.
Configure the Exchange2003URL value on the Exchange Server 2010 Client Access servers. The
parameter is the legacy URL, such as https://legacy.contoso.com/exchange.
4.
Update your firewall rules or reverse proxy to direct requests for the original Outlook Web Access
requests to the Exchange Server 2010 Client Access server.
After this process is complete, users who access the original URL (http://mail.contoso.com/exchange)
are serviced by the Exchange Server 2010 Client Access server. The Exchange Server 2010 Client Access
server handles requests for users who have Exchange Server 2010 mailboxes, and it redirects users who
have Exchange Server 2003 mailboxes to the legacy URL.
Considerations for using a legacy URL:
To support the use of a legacy URL, you need to have two valid Internet IP addresses available. Or,
you can use a single valid Internet IP address if your reverse proxy server supports redirection based
on host headers.
The Exchange Server 2003 front-end server must be configured to use forms-based authentication for
Outlook Web Access or authentication will fail.
When an Exchange ActiveSync client connects to the Client Access server and the user mailbox is
located on an Exchange Server 2003 back-end server, the Client Access server connects to the
Exchange Server 2003 server by using the Hypertext Transfer Protocol (HTTP) and provides access to
the user mailbox.
When an Outlook Anywhere client connects to the Client Access server and the user mailbox is
located on an Exchange Server 2003 back-end server, the Remote Procedure Call (RPC) proxy service
on the Client Access server connects to the back-end server by using RPC.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
11-21
Key Points
To support coexistence between different Exchange Server versions, all servers running Exchange
Server 2010 are added automatically to a single routing group when you install Exchange Server 2010.
The Exchange Server 2010 routing group includes all Exchange Server 2010 servers, regardless of the
Active Directory site in which they reside.
Integrating Exchange Server 2010 into Exchange Server 2003 Routing Groups
During the coexistence phase of your planned upgrade, the Exchange Server 2010 servers are presented
to Exchange Server 2003 servers as members of a single routing group called Exchange Routing Group
(DWBGZMFD01QNBJR). When planning your upgrade to Exchange Server 2010, it is important that you
consider these routing topology differences.
During your first Exchange Server 2010 Hub Transport server installation in an existing Exchange
organization, you must specify an Exchange 2003 bridgehead server to establish the first routing group
connector. You should select a bridgehead server that is located either in a hub routing group, or in a
routing group that has many mailboxes. The routing group connector links the routing group where the
Exchange Server 2003 server resides with the Exchange Server 2010 routing group. From the perspective
of the Exchange Server 2003 servers, the Exchange Server 2010 routing group includes all Exchange Server
2010 servers, regardless of the AD DS site in which they reside.
The Exchange Server 2010 Hub Transport server that you install and the Exchange Server 2003
bridgehead that you select are configured as the source and target servers on two reciprocal routing
group connectors. This routing group connector creates a single connection point between Exchange
Server 2003 and Exchange Server 2010.
11-22
Configure the Exchange Server 2003 bridgehead servers to use the Edge Transport server as a relay
for outbound Internet messages. To do this, configure the appropriate SMTP connector to send
messages to the Internet using the IP address of the Edge Transport server as a smart host.
For inbound Internet messages, ensure that your organizations mail exchanger (MX) resource records
reference the IP addresses of the Edge Transport servers.
Configure SMTP connectors to enable message routing between the Edge Transport servers and the
Exchange Server 2003 bridgehead servers, and between the Edge Transport servers and Internet
SMTP servers. At a minimum, you must configure an SMTP Send connector for sending email, and an
SMTP Receive connector for receiving email from the Exchange Server 2003 servers, and configure a
Send connector for sending email to Internet recipients. By default, a Receive connector is configured
on the Edge Transport server that accepts messages from the Internet SMTP servers.
Configure the accepted domains. The accepted domain setting specifies the SMTP domains that the
organization uses. You must configure these domains manually on the Edge Transport server if you
do not have the option of configuring an Edge Subscription.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
11-23
Key Points
As you upgrade to Exchange Server 2010, you also must plan for continued administration of the
organization.
11-24
(continued)
Exchange 2003 administrative assignment
options
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
11-25
Key Points
After you deploy the Exchange Server 2010 servers in the Exchange Server 2003 organization, you can
start moving the mailboxes and other resources from the existing servers to the Exchange Server 2010
servers. Then you can start removing the Exchange Server 2003 servers.
Remove back-end servers first. As you move mailboxes from Exchange Server 2003 servers to
Exchange Server 2010 Mailbox servers, you can start decommissioning the previous back-end servers.
2.
Remove the Exchange Server 2003 bridgehead servers. A bridgehead server is a back-end server that
is configured to route messages between routing groups. After you remove the last back-end server
in a routing group, you also can remove the routing groups bridgehead servers.
3.
To send email to the Exchange Server 2010 Mailbox servers, you must configure at least one
Exchange Server 2003 server as the routing group connectors bridgehead server between Exchange
Server 2003 and the Exchange Server 2010 routing group. Do not remove this server until the last
user and required system mailboxes are moved to the Exchange Server 2010 servers. If you plan to
remove this bridgehead server before moving all the mailboxes, you must configure another
Exchange Server 2003 server as the new bridgehead server.
4.
Remove the Exchange Server 2003 front-end servers. These are now redundant, as all clients are
connecting to Exchange Server 2010 Client Access servers.
11-26
Key Points
The installation of Exchange Server 2010 into an existing Exchange Server 2003 organization has a few
unique requirements that do not apply to a new installation of Exchange Server 2010. Some common
issues during installation include:
Incorrect forest or domain functional level. Both the forest and domain functional levels must be
Windows Server 2003. To resolve this problem, raise the forest or domain functional level to the
appropriate functional level.
Incorrect Exchange mode. Your existing Exchange Server 2003 organization must be in native mode;
if it is not, raise the Exchange Server 2003 organizational mode.
Insufficient AD DS permissions. When you upgrade to Exchange Server 2010, you need sufficient
permissions to update the Active Directory schema and modify the Active Directory configuration
partition. To perform the initial schema extension, you must be a member of the Enterprise Admins
and Schema Admins groups.
Insufficient Exchange permissions. To install Exchange Server 2010 into an existing organization, you
must be a member of the Exchange Admins group that has permissions to manage Exchange
Server 2003. You must also run Setup.exe with the /PrepareLegacyExchangePermissions switch.
Wait for replication throughout the Exchange Server organization before you continue.
Incorrect version of Exchange Server 2003. All computers running Exchange Server 2003 must have at
minimum SP2 installed.
In general, if there is a problem installing Exchange Server 2010 into an existing Exchange Server 2003
organization, there is no specific rollback mechanism required. Instead, use the error messages and setup
log to identify the source of the problem, resolve the issue, and then run the installation again.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
11-27
No message routing between Exchange Server 2003 and Exchange Server 2010. During installation
of the first Exchange Server 2010 Hub Transport server, a routing group connector should be
automatically created between a specified Exchange Server 2003 bridgehead server and the Exchange
Server 2010 Hub transport server. In some cases, this routing group connector is not automatically
created and you need to manually create it by using the New-RoutingGroupConnector cmdlet.
Inefficient message routing. Exchange Server 2003 identifies Exchange Server 2010 as one large
routing group. When you are upgrading a large organization with multiple routing groups, you may
need to create additional routing group connectors to ensure that message delivery is efficient. In
general, any site that has both Exchange Server 2010 and Exchange Server 2003 should have a local
routing group connector during coexistence.
Distribution groups not functional. As you remove computers running Exchange Server 2003, you
may find that some distribution groups cannot be expanded and messages to those groups fail. This
occurs if the distribution group is configured with an expansion server and the expansion server has
been removed. To resolve this issue, remove the expansion server from the distribution group.
Outlook 2003 clients cannot connect to mailboxes. The RTM release of Exchange Server 2010 requires
RPC encryption when connecting to a mailbox. Outlook 2003 does not support RPC encryption by
default. The solution is to enable RPC encryption in Outlook 2003 or to disable the requirement for
RPC encryption in Exchange Server 2010. New servers installed with media including SP1 or SP2 do
not require RPC encryption by default.
11-28
Lesson 3
If your organization is currently running Exchange Server 2007, the upgrade process to Exchange
Server 2010 is similar to upgrading from Exchange Server 2003; however, there are some important
differences.
After completing this lesson, you will be able to:
Determine whether your Exchange Server 2007 organization is ready for Exchange Server 2010.
Describe the process for installing Exchange Server 2010 in an Exchange Server 2007 organization.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
11-29
Key Points
Before beginning the upgrade, you must prepare AD DS for Exchange Server 2010. Prior to performing
this step, confirm that your current infrastructure meets the following conditions:
The schema master and at least one global catalog server in each site must be running Windows
Server 2003 with SP1 or newer.
Your Exchange Server 2007 servers must be running Exchange Server 2007 SP2.
11-30
Key Points
Exchange Server 2010 Setup checks the server versions of all Exchange servers; the requirement checks
will fail if a server is not upgraded to Exchange Server 2007 SP2. Exchange Server 2007 SP2 includes
several schema updates that are required for interoperability with Exchange Server 2010.
If an organization only has a single Active Directory site, use the following process for deploying Exchange
Server 2010.
1.
Install the Exchange Server 2010 Client Access server. After you complete this installation, you should
use this as the primary connection point for all client connections. This means that you should modify
the Autodiscover settingsboth internally and externallyto point to the Exchange Server 2010
Client Access server.
2.
Install the Exchange Server 2010 Hub Transport server. Both Exchange Server 2007 servers and
Exchange Server 2010 Mailbox servers must use a Hub Transport server that is the same version as the
Mailbox server for routing messages in the same site.
3.
Install the Exchange Server 2010 Mailbox servers. After the rest of the infrastructure is in place, you
can deploy the Exchange Server 2010 Mailbox servers, and start moving mailboxes and public folders
to the new servers.
4.
Install Exchange Server 2010 Unified Messaging servers. If you have deployed Unified Messaging in
Exchange Server 2007, add the Exchange Server 2010 Unified Messaging server to one of your
organizations dial plans.
5.
Install the Exchange Server 2010 Edge Transport servers. Exchange Server 2010 Edge Transport
servers can synchronize only with Exchange Server 2010 Hub Transport servers.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
11-31
For organizations with multiple sites, there typically are two types of Active Directory sites: Internetaccessible sites, and non-Internet accessible sites. A single Exchange Server organization may have one or
more Internet-accessible sites. When upgrading Active Directory sites, you must begin your upgrade by
upgrading Internet-accessible sites first, followed by non-Internet accessible sites.
You should follow the same process for deploying Exchange Server 2010 servers in both Internetaccessible and non-Internet accessible sites. Before deploying any Exchange Server 2010 Mailbox server in
any site, you must deploy Exchange Server 2010 Client Access and Hub Transport servers.
11-32
Key Points
During coexistence of Exchange Server 2007 and Exchange Server 2010, the Client Access server that
clients use is determined by where the users mailbox is located. Internal users with Exchange Server 2007
mailboxes and Outlook 2010 are unaffected by the addition of Exchange Server 2010 Client Access
servers. Outlook 2010 accesses their mailbox directly on the Exchange Server 2007 Mailbox servers
hosting their mailbox. Other Client Access services, such as free/busy searches and offline address book
downloads, continue to be accessed from an Exchange Server 2007 Client Access server.
When you move a mailbox from an Exchange Server 2007 Mailbox server to an Exchange Server 2010
Mailbox server, the client profile is configured automatically to use the Exchange Server 2010 Client
Access server for MAPI connectivity; you do not need to modify the client profile manually. Outlook 2007
and Outlook 2010 clients use Autodiscover to determine the new configuration. Outlook 2003 clients are
redirected to the new mailbox location by their previous server.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
11-33
Client Access servers provide Internet users with access to their mailboxes by using Outlook Web App,
ActiveSync and Outlook Anywhere. It is important to understand how each of these methods behave
during the upgrade process to help ensure that user access is not interrupted.
The first step in the upgrade process is to add one or more Exchange Server 2010 Client Access servers to
the site being upgraded. To implement coexistence, you must configure all clients to connect to the
Exchange Server 2010 Client Access server. If you have been using an external URLsuch as
https://mail.adatum.comto connect to an Exchange Server 2007 Client Access server, you should modify
the Domain Name Service (DNS) or firewall configuration to forward connections to the URL of the
Exchange Server 2010 Client Access server. Clients accessing their mailbox from the Internet connect to
the Exchange 2010 Client Access server and are then redirected or proxied to the appropriate Exchange
Server 2007 server.
Requests for an Exchange Server 2007 mailbox in the same site are redirected to the external URL of
the Exchange 2007 Client Access server in the same site. There is no option to proxy the connectivity
in the same site. Therefore, like the legacy URL for Exchange Server 2003, you must have two
externally accessible IP addresses for coexistence of Outlook Web Access and Outlook Web App.
Requests for an Exchange Server 2007 mailbox in a different site are redirected if an Exchange
Server 2007 Client Access server in the different site is configured with an external URL. This ensures
that existing externally accessible Exchange 2007 Client Access servers are still used.
11-34
Requests for an Exchange Server 2007 mailbox in a different site are proxied if the Exchange
Server 2007 Client Access servers in the different site are not configured with an external URL. The
Exchange Server 2007 Client Access servers in the different site access the mailbox on the Exchange
Server 2007 Mailbox server.
Use the following process to transition to using the Exchange Server 2010 Client Access server:
1.
Install and configure the Exchange Server 2010 Client Access server. Configure the external URL to
match the existing external URL on the Exchange Server 2007 Client Access server.
2.
Create a new DNS record for legacy access to the Exchange Server 2007 Client Access server. For
example, legacy.contoso.com.
3.
Update the external URL on the Exchange Server 2007 Client Access server to match the new DNS
record for legacy access.
4.
Update the certificate on the Exchange Server 2007 Client Access server with the new legacy name.
ActiveSync
The connectivity process for ActiveSync clients varies depending on the site the mailbox is located in and
whether the ActiveSync client supports Autodiscover. The connection process is as follows:
If the Exchange Server 2007 mailbox is in the same site and the client supports Autodiscover,
Autodiscover is used to redirect the client to the external URL of the Exchange Server 2007 Client
Access server.
If the Exchange Server 2007 mailbox is in the same site and the client does not support Autodiscover,
the Exchange Server 2010 Client Access server proxies the request to the Exchange Server 2007 Client
Access server.
If the Exchange Server 2007 mailbox is in a different site that does not have an external URL
configured on the Exchange Server 2007 Client Access server, the request is proxied to an Exchange
Server 2007 Client Access server in the different site hosting the Exchange Server 2007 mailbox.
Outlook Anywhere
The Outlook Anywhere connection process is consistent regardless of the site the mailbox is located in.
When the Exchange Server 2010 Client Access server receives the request, the Exchange Server 2007
Mailbox server is contacted directly.
The RPC over HTTP service on the Exchange Server 2007 Client Access server is not used after the
Exchange Server 2010 Client Access server is in place. So, you can disable Outlook Anywhere on the
Exchange Server 2007 Client Access server and uninstall the RPC over HTTP feature.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
11-35
Key Points
A second issue that coexists between the two Exchange Server versions is message transport. Message
transport coexistence is configured automatically, as long as the correct versions of Hub Transport servers
are available.
Each version of the Mailbox server must use an equivalent version of the Hub Transport server when
routing messages within the same site. Consequently, you must deploy the Exchange Server 2010
Hub Transport server before deploying the Exchange Server 2010 Mailbox servers. Additionally, you
must not remove the last Exchange Server 2007 Hub Transport server until you remove all of the
mailboxes from the Exchange Server 2007 Mailbox servers.
If you have both Exchange Server 2007 and Exchange Server 2010 servers deployed in a site,
messages flow from the Exchange Server 2010 Mailbox server to the Exchange Server 2010 Hub
Transport server, to the Exchange Server 2007 Hub Transport server, and then to the Exchange
Server 2007 Mailbox server. Messages sent from an Exchange Server 2007 mailbox follow the reverse
route.
Message routing between Active Directory sites can use Hub Transport servers on either Exchange
Server version. If you install an Exchange Server 2010 Hub Transport server in one site, it can send
messages to Exchange Server 2007 Hub Transport servers in another site.
11-36
Message routing to and from the Internet can use either Exchange Server 2007 or Exchange
Server 2010 Edge Transport servers. If your current deployment uses Exchange Server 2007 Edge
Transport servers for inbound email, you can continue to have the Edge Transport servers forward all
messages to the Exchange Server 2007 Hub Transport server. For outbound messages, you can add
Exchange Server 2010 Hub Transport servers to the SMTP Send connector that is responsible for
sending messages to the Internet. This enables outbound messages to be sent through either
Exchange Server 2007 or Exchange Server 2010 Hub Transport servers.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
11-37
Key Points
When implementing Exchange Server 2010 in an Exchange Server 2007 organization, you also need to
plan for administrative coexistence. In this scenario, you must consider how you will use the Exchange
Server management tools, and how you will delegate permissions.
You can perform actions that create new objectssuch as new mailboxes or a new offline address
bookon a version of the Exchange Management Console that is the same as the target object. For
example, you must create a new mailbox on an Exchange Server 2007 Mailbox server by using the
Management Console in Exchange Server 2007.
You can view Exchange Server 2007 Mailbox databases from the Exchange Server 2010 Management
Console, although you cannot manage these databases across the different versions.
You can perform actions that require management on Exchange Server 2007 objects from the
Exchange Management Console in Exchange Server 2010. You cannot perform these actions from the
Management Console in Exchange Server 2007 on Exchange Server 2010 objects.
You can use any Exchange Management Console version to perform actions that require viewing of
any version of Exchange Server objects, with the following exceptions:
You can view Exchange Server 2007 and Exchange Server 2010 transport rule objects only from
the corresponding version of the Exchange Management Console.
You can view Exchange Server 2007 and Exchange Server 2010 servers only from the
corresponding version of the Exchange Management Console.
11-38
The Queue Viewer tool in Exchange Server 2010 Management Console cannot connect to an
Exchange Server 2007 server to view queues or messages.
You cannot enable or disable Exchange Server 2007 Unified Messaging mailboxes from the Exchange
Server 2010 Management Console.
You cannot use the Exchange Server 2010 Management Console to manage mobile devices for users
who have mailboxes on an Exchange Server 2007 Mailbox server.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
11-39
Key Points
After deploying the Exchange Server 2010 servers, you can start moving resources to the Exchange
Server 2010 servers, and removing the Exchange Server 2007 servers.
Remove Mailbox servers first. As you move mailboxes from Exchange Server 2007 servers to Exchange
Server 2010 Mailbox servers, you can start decommissioning the Exchange Server 2007 Mailbox
servers.
2.
Remove the Exchange Server 2007 Unified Messaging server role. Once you have migrated all the
user mailboxes, you can replace and remove the Unified Messaging servers.
3.
Remove the Exchange Server 2007 Hub Transport servers. The Exchange Server 2007 Mailbox server
must be able to communicate with an Exchange Server 2007 Hub Transport server. As you remove
Mailbox servers, you also can begin removing the Hub Transport servers. Do not remove the last Hub
Transport server until the last mailboxes are moved from the Exchange Server 2007 servers.
4.
After you remove the last mailbox and public folder from the Exchange Server 2007 Mailbox server, you
may remove all other Exchange Server 2007 servers in the Active Directory site.
11-40
Key Points
As with the upgrade from Exchange Server 2003, the upgrade from Exchange Server 2007 should be
problem-free if you plan the upgrade carefully; however, unexpected problems can still occur.
Before you start your upgrade, you must ensure that your existing Exchange Server 2007 organization
meets the prerequisites for upgrading to Exchange Server 2010.
If your organization and the servers installed in it meet the specified requirements and you still encounter
problems when installing specific server roles, attempt to re-deploy any server role that fails.
Note For more information, see the topic Troubleshooting the Exchange Server 2010
Upgrade in Lesson 2: Planning the Upgrade from Exchange Server 2003 to Exchange Server
2010.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
11-41
Lab Setup
This lab does not require any virtual machines.
Lab Scenario
You are a messaging engineer for the A. Datum Corporation, an enterprise-level organization with
multiple locations. A. Datum Corporation is an international corporation involved in technology research
and investment, and is planning to upgrade from Exchange Server 2003 to Exchange Server 2010.
The A. Datum Corporation headquarters in London and two remote locations (Vancouver and Tokyo) are
running Exchange Server 2003 and Outlook 2003. A. Datum Corporation will be adding two new
locations, and within the next six months it plans to migrate all existing users to Exchange Server 2010 and
Outlook 2010. Much of the Exchange Server 2010 messaging system design is complete.
The Trey Research location continues to run a POP3/SMTP messaging system, which you need to migrate
to Exchange Server 2010 and integrate with the rest of the Exchange organization. The Trey Research
domain is already deployed as a separate tree in the A. Datum forest. This integration of Trey Research will
be completed after the current infrastructure is upgraded.
Use the references on the following pages for this lab.
Note Your instructor may choose to perform this lab as a group discussion rather than an
individual activity.
11-42
Adatum_ProposedADSiteDesign.vsd
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
Adatum_ProposedPerimeterDesign.vsd
11-43
11-44
Internal users
Mobile users
London
(corporate
headquarters)
12,000 currently
10,000 after the new
London office is ready
London
(new office)
4,000 (anticipated)
San Diego
(former head
office of Trey
Research)
500
Vancouver
6,000
Tokyo
5,000
Chennai
(new office)
800 (anticipated)
A. Datum has deployed a single AD DS forest with a dedicated root domain named Adatum.com, and
three child domains in the same tree. These domains are:
EU.Adatum.com
NA.Adatum.com
AS.Adatum.com
Additionally, the organization has deployed a domain named TreyResearch.net in the San Diego location.
This domain is configured as a separate tree in the Adatum.com forest.
Exchange_Server_2003_Configuration.doc
Location
Description
London
(corporate
headquarters)
Vancouver
Tokyo
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
11-45
2.
Adatum_ProposedADSiteDesign.vsd
Adatum_ProposedPerimeterDesign.vsd
Exchange_Server_2003_Configuration.doc
Answer the questions in the A. Datum Upgrade Design Questions document, and then complete the
A. Datum Upgrade Design document.
A. Datum Upgrade Design
Document Reference Number: JC060610/1
Document Author
Date
Jason Carlson
6th June 2010
Requirement Overview
Describe the upgrade strategy for the A. Datum organization.
Proposals
Question: Based on what you know about the A. Datum organization, what would be a reasonable
timeline for completing this migration?
Question: What are the factors that will affect the timeline?
Question: Where will you perform the schema upgrade?
Question: What is the process for preparing domains for Exchange Server 2010?
Question: How will you ensure that Exchange Server 2010 can coexist with Exchange Server 2003?
Question: Which site should be upgraded first?
Question: Which server role should be implemented first in that site?
11-46
(continued)
A. Datum Upgrade Design
Question: Should coexistence occur in multiple sites or a single location?
Question: How will client access be configured to allow coexistence in the first site?
Question: How will message transport be configured to allow coexistence in the first site?
Question: How will mailboxes be moved in the first site?
Question: How will you move Internet message delivery from Exchange Server 2003 to Exchange
Server 2010 and use Edge Transport servers?
Question: When you begin migrating the second site to Exchange Server 2010, what process will you
use?
Question: How will you remove Exchange Server 2003?
Note
Results: After this exercise, you should have completed the A. Datum Upgrade document.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
11-47
Review Questions
1.
Contoso, Ltd., currently utilizes servers running Exchange 2000 Server in their organization. They are
excited about the features available in Exchange Server 2010, and want to upgrade to the new
platform. How would you recommend that they proceed?
2.
A. Datum Corporation has recently acquired Trey Research, an organization that implements Novell
GroupWise for messaging. A. Datum Corporation has Exchange Server 2003 installed, and it
implements the Novell GroupWise connector to ensure directory synchronization and message flow
between the two organizations. As A. Datum Corporation is planning to upgrade to Exchange
Server 2010, how would you advise they proceed with handling the Trey Research GroupWise
messaging system?
11-48
Troubleshooting tip
If your Exchange Server 2003 organization has multiple routing groups, consider creating additional
routing group connectors between each of the routing groups, and an Exchange Server 2010 Hub
Transport server in each office location. By doing this, you can ensure that all messages are sent from
the Exchange Server 2003 servers to the Exchange Server 2010 servers without crossing the wide area
network (WAN) links between the routing groups.
Plan to increase the number of Client Access servers as you upgrade to Exchange Server 2010. For
Exchange Server 2003 and Exchange Server 2007 deployments, Microsoft recommends a 1:4 ratio of
Client Access server or front-end server processor cores to Mailbox server or back-end server cores. In
Exchange Server 2010, Microsoft recommends a 3:4 ratio.
12-1
Module 12
Integrating Microsoft Exchange Server 2010 with Other
Messaging Systems
Contents:
Lesson 1: Designing Exchange Server 2010 Integration with Other
Messaging Systems
12-3
12-15
12-22
12-35
12-40
12-2
Module Overview
Microsoft Exchange Server 2010 provides options to integrate with other messaging systems, with other
organizations using Exchange Server 2010, and with Microsoft Exchange Online. Integration with other
messaging systems is useful when you are migrating from a legacy messaging system to Exchange
Server 2010. Integration with federated partners that are also using Exchange Server 2010 allows you to
share information with partner organizations. Integration with Exchange Online allows you to expand the
messaging system in your organization without adding additional servers.
After completing this module, you will be able to:
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
12-3
Lesson 1
When you upgrade from a legacy messaging system to Exchange Server 2010, it might be necessary for
the legacy messaging system and Exchange Server 2010 to coexist. There are several configurations you
can use to accomplish this goal. When you plan the coexistence of the two messaging systems, you must
consider several factors, such as message routing, address list synchronization, and calendar
interoperability.
After completing this lesson, you will be able to:
Design the integration of Exchange Server 2010 with other Exchange Server organizations.
Design message routing with unique Simple Mail Transfer Protocol (SMTP) addresses during
coexistence.
Design message routing with the same SMTP addresses during coexistence.
12-4
Key Points
Typically, only very small organizations can perform a complete migration to a new messaging system as a
single event. Most migrations to a new messaging system require coexistence between the legacy
messaging system and Exchange Server 2010.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
12-5
In this scenario, address lists are not automatically synchronized between the two messaging systems.
Calendars are typically not shared, because most simple SMTP messaging systems do not support
calendars.
You can configure message delivery from Exchange Server 2010 to the SMTP messaging system by using
a Send connector.
12-6
Key Points
Each Active Directory forest can support only a single Exchange Server organization. But when you
upgrade an Exchange Server organization from a previous version to Exchange Server 2010, both
Exchange Server versions exist in the same organization at the same time. Having a single Exchange
Server organization allows for interoperability between the previous version of Exchange Server, and
Exchange Server 2010.
Typically, you need to plan for coexistence and integration with a second Exchange Server organization
after a merger between two organizations. For example, say a large company with an Exchange Server
messaging system buys another company that also has an Exchange Server messaging system. Until the
two messaging systems are merged together, the two Exchange Server organizations need to coexist.
Integration with another Exchange Organization can also occur between partner organizations.
When you integrate two Exchange Server organizations, you need to determine:
The namespace to use. If a smaller organization merges with the larger organization, typically the
users in the smaller organization need to be given an email address that is in the domain of the larger
organization. If the organizations will share a single namespace, you need to determine how
messages will be routed to the appropriate mailbox. Alternatively, the two organizations can use
completely separate domain names.
Whether to synchronize the GAL. In most cases, you should synchronize the GAL between the two
organizations. This makes it easier for users in each organization to address messages to the
appropriate people. However, if the integration is for a very short time period, you might not want to
make the effort required to configure GAL synchronization.
Whether to synchronize free/busy information. If your organization uses calendars extensively for
booking meetings, you might want to configure synchronizing free/busy information between the
two organizations.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
12-7
Key Points
By properly configuring message routing, you can ensure that messages are delivered to the intended
recipient. When each organization is assigned a unique SMTP namespace, the message routing is easier to
understand and implement. However, unique SMTP namespaces may not be desirable from a business
perspective, because it creates the appearance of unique organizations.
Note An Edge Transport server can perform address rewriting to make multiple
messaging systems with unique namespaces appear as a single namespace. To use address
rewriting, the email names for each email account must be unique across organizations.
If you use unique SMTP namespaces, the email address for a user changes when the users mailbox is
moved between the two messaging systems. This can be a problem, because the user will not receive
messages sent to the old address in the new mailbox. Users may not get important messages from
customers or internal staff, because they are unaware of the new email address. You can mitigate this
problem by forwarding messages from the old mailbox to the new Exchange Server 2010 mailbox.
You can create unique SMTP namespaces by using:
Two separate domain names. You can use two separate domain names when two organizations are
merging. For example, in a merger between Contoso, Ltd., and A. Datum Corporation, the two
domains could be contoso.com and adatum.com.
A domain and a subdomain. You can use a domain name and a subdomain name when one
organization is a subsidiary of another. For example, if Contoso, Ltd., is a subsidiary of A. Datum
Corporation, the domain names could be adatum.com and contoso.adatum.com.
The configuration of message routing varies depending on how you implement the physical infrastructure
for communication. If the two organizations have completely separate data centers and no direct link
between the two locations, you can use standard SMTP delivery over the Internet for messages.
12-8
If there are two data centers but there is a direct link between them, you can place messaging traffic on
the direct link instead of the Internet. To do this, create Send connectors in each organization to direct
messages to the appropriate IP address for delivery. Each Send connector is scoped with the domain
name for the other organization. If there are multiple locations with direct links, then you can create
multiple Send connectors to optimize delivery.
If there is a single physical location, you can configure both domains as accepted domains on the
Exchange Server 2010 organization. The second domain is configured as an external relay domain.
Exchange Server 2010 does not host any mailboxes for an external relay domain, but it does accept
messages for a forward relay domain. The messages for an external relay domain are forwarded from
Exchange Server 2010 to the external messaging system by using a Send connector. Centralizing message
delivery through Edge Transport servers simplifies antivirus scanning, and allows you to enforce
messaging policies, such as the application of a disclaimer.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
12-9
Key Points
You can use a single namespace for two messaging organizations. The second messaging organization
can be an Exchange Server organization, or a different SMTP messaging system.
You typically use a single namespace for two messaging systems temporarily, while two organizations are
merged. You should also configure the recipients of the smaller organization to accept email for both
their old domain and the new domain during the transition period.
To use the same namespace for multiple organizations, all messages are delivered first to the Exchange
Server 2010 organization. The Exchange Server 2010 organization is responsible for determining whether
the recipient is in the Exchange Server 2010 organization, or if the recipient is part of the second
messaging system. If the recipient is part of the second messaging system, the Exchange Server
organization forwards the message to that system for delivery.
To use a single namespace with two messaging organizations, you must perform the following
configuration steps:
1.
Configure connectivity between the two messaging systems. The connectivity can be a direct link
between the two systems, or over the Internet.
2.
Configure the shared namespace as an accepted internal relay domain. This allows Exchange
Server 2010 to relay messages for which there is no matching recipient in the Exchange Server 2010
organization.
3.
Configure a Send connector for the shared namespace. Exchange Server 2010 uses this Send
connector to forward messages to the other messaging system. This Send connector is only used
when there are no matching recipients in the Exchange Server 2010 organization.
4.
Configure mail exchanger (MX) resource records for the Exchange Server 2010 organization. Internet
messaging systems use the MX records to locate the Edge Transport servers of the Exchange
Server 2010 organization.
12-10 Integrating Microsoft Exchange Server 2010 with Other Messaging Systems
In addition to configuring the Exchange Server 2010 organization, you must also configure the other
messaging system to accept messages from the Exchange Server 2010 organization. In most cases,
outgoing messages from the other messaging system are also relayed through the Exchange Server 2010
Edge Transport servers to centralize management of external message delivery.
Question: When a namespace is shared between two messaging systems, is it possible for
one of the messaging systems to also have an additional domain name that is unique to that
messaging system?
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
12-11
Key Points
GAL synchronization is an important part of maintaining two separate messaging systems. If you do not
configure GAL synchronization, users in each messaging organization have only recipients from their own
messaging organization available in the GAL when they address messages. By synchronizing GALs, you
can ensure that all recipients are available for addressing in both organizations.
When you synchronize the GAL of an external messaging system into Exchange Server 2010, the external
recipients are created as contacts. If only a small number of recipients are required, you can create the
contacts manually in the Exchange Server 2010 organization.
When you migrate mailboxes from the external messaging system to the Exchange Server 2010
organization, you need to synchronize the address lists. Before you migrate each mailbox to the Exchange
Server 2010 organization, you need to remove the contact for that user. When you migrate the mailbox,
the mailbox replaces the contacts in the GAL. On the external messaging system, you must remove the
mailbox and replace it with a contact containing the email address for that user in the Exchange
Server 2010 organization. If you plan to move a large number of mailboxes, you should automate this
process.
To automate GAL synchronization, you can use:
Lightweight Directory Access Protocol (LDAP) replication scripts. To use LDAP replication scripts, the
external messaging system must support the use of LDAP to query mailbox information and create
contacts. Although this is possible for other Exchange Server organizations, it might not be possible
with other messaging systems. You must run LDAP replication scripts manually, or schedule them to
run periodically.
12-12 Integrating Microsoft Exchange Server 2010 with Other Messaging Systems
Microsoft Forefront Identity Manager 2010. This is a flexible tool for synchronizing information
between directories. Forefront Identity Manager has additional capabilities for synchronizing
information compared to LDAP, and can therefore synchronize data between a wider range of
systems. It can also perform dynamic updates based on events such as creation of new users, and
mailbox moves.
Note Previous versions of Forefront Identity Manager 2010 are called Microsoft Identity
Lifecycle Manager, and Microsoft Identity Integration Server.
Federated sharing is another alternative for sharing contact information between organizations. You can
implement federated sharing to allow specific users in your Exchange Server 2010 organization to share
contacts with specific users in another Exchange Server 2010 organization. This does not synchronize the
GAL between the two Exchange Server organizations, but can be useful for organizations where limited
integration is desired, such as for partners or subsidiaries.
Question: Which GAL synchronization methods should you use to migrate 5,000 users from
an external messaging system to Exchange Server 2010?
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
12-13
Key Points
By implementing calendar sharing between messaging systems, you can allow users to view the schedule
of users in the other organization when sending meeting requests. The level of importance for this
capability is based on how your organization uses meeting requests, and how long coexistence of the two
messaging systems will be in place. For example, calendar interoperability is important for your
organization if you configure all meeting rooms in your organization as resources, and users in both
messaging systems need to book those rooms. Typically, you configure calendar interoperability only
between Exchange Server organizations.
You have the following options for sharing calendar data:
The Availability service in Exchange Server 2010 or Exchange Server 2007. You can configure a Client
Access server in one Exchange Server organization to use the Exchange Server Availability service on
the Client Access server in the other Exchange Server organization. This gives the first organization
the ability to read calendar information of the second organization.
Federated sharing for Exchange Server 2010. This solution is designed for ongoing interoperability
between Exchange Server organizations. One feature of federated sharing is the ability to share
calendar information in a selective and controlled way. However, both organizations must be using
Exchange Server 2010.
The Inter-Organization Replication (IORepl) tool in Exchange Server 2003. The use of IORepl to
synchronize public folder data is supported for Exchange Server 2010 with Service Pack 1 (SP1) or
newer. However, IORepl must be run on the Windows Server 2003 operating system, and one of the
endpoints for replication must be Exchange Server 2003 with SP2. So, it is not possible to use IORepl
for replication between two Exchange Server 2010 organizations.
12-14 Integrating Microsoft Exchange Server 2010 with Other Messaging Systems
Sharing calendar information can be complex to implement. In some cases, it may be preferable to use an
alternative. Alternatives to sharing calendar information between Exchange Server organizations are:
Mailboxes in both systems. If only a few users need access to calendars in the second Exchange Server
organization, the simplest method may be to give those few users a second mailbox in the second
Exchange Server organization. The user now has two mailboxes that you need to maintain. However,
you can configure a forwarding address on one of the mailboxes to centralize all messages in a single
mailbox.
Shared calendar in the Microsoft SharePoint services. SharePoint is a web-based solution designed
for collaboration. One feature of SharePoint is calendars that multiple users can access. This can be
useful for shared events calendars, and for booking resources, such as meeting rooms.
Question: Can you think of an advantage for using federated sharing over the Exchange
Server Availability service between organizations?
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
12-15
Lesson 2
Integration with federated partners allows you to share calendaring information and contacts between
organizations. To configure federated partners, you must understand how to create a federated trust, and
then implement an organization relationship or a sharing policy.
After completing this lesson, you will be able to:
12-16 Integrating Microsoft Exchange Server 2010 with Other Messaging Systems
Key Points
If you implement a federation trust for your organization, you can implement federated sharing with
other organizations and external users. The external organization must also have configured a federation
trust.
Federated Sharing
You can use federated sharing to configure your Exchange Server 2010 organization to share information
with other Exchange Server 2010 organizations. This shared information can include availability
information, calendar information, and contacts.
To configure federated sharing, you must create a federation trust for your organization, and configure
organization relationships or sharing policies. This is a much simpler process than other methods for
sharing calendar and contact information between organizations. However, this method does not
synchronize all GAL information; only user contacts are shared.
To participate in federated sharing, user mailboxes must be on an Exchange Server 2010 Mailbox server.
Organization relationships or sharing policies define the information that is shared.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
12-17
Key Points
To perform federated sharing, you need to configure a federation trust. The Microsoft Federation
Gateway is used as a central point for federation trusts. You can create a single federation trust with the
Microsoft Federation Gateway, and have the other organizations do the same. You cannot create
federation trusts directly with other organizations.
To implement a federation trust with the Microsoft Federation Gateway, you need to obtain a certificate
from a trusted certification authority (CA). The certificate is used to sign and encrypt tokens, but not to
identify your organization. Therefore, the subject name in the certificate is not relevant.
After you create the federation trust, you are provided with an application identifier for your organization.
To identify ownership of your Domain Name System (DNS) domain, you must create a text (TXT) resource
record in your domain that contains the application identifier.
The specific requirements for a certificate are:
A trusted CA should issue the certificate. The accepted list of trusted CAs is provided in the Exchange
Server 2010 online help.
The certificate must contain the subject key identifier (SKI) field. This is typical in certificates from
third-party CAs.
You must create the certificate by using the CryptoAPI, and not by Cryptography Next Generation.
Both of these cryptography providers are available in Windows Server 2008. To ensure that you use
CryptoAPI, create the certificate request by using the New-ExchangeCertificate cmdlet, or by using
the New Certificate Wizard in the Exchange Management Console.
12-18 Integrating Microsoft Exchange Server 2010 with Other Messaging Systems
The certificate must use the RSA signature algorithm. Select this option during certificate creation.
The certificate must have an exportable private key. Select this option during certificate creation.
Question: How will you obtain the list of acceptable CAs?
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
12-19
Key Points
You can use organization relationships to enable federated sharing with an external Exchange Server
2010 organization. The external Exchange Server 2010 organization must also have a federation trust in
place with the Microsoft Federation Gateway. Each organization relationship is for a single external
organization identified by its domain name and application identity.
When you create an organization relationship, you can select the following options:
Enable this organization relationship. Use this option to toggle the organization relationship off and
on. If your organization no longer wants to share information with the external organization, you can
quickly disable the organization relationship to stop sharing information.
Enable free/busy information access. Use this option to specify that your organization will obtain
free/busy information from the external organization. Your access to free/busy information in the
external organization is determined by the configuration of the organization relationship in the
external organization. In most cases, this is enabled.
Specify free/busy data access level. Use this option to control the free/busy information that your
organization provides to the external organization. You can allow no access, access to times only, or
access to time, subject, and location. To preserve privacy for your organization, prevent access to
subject and location when only basic meeting bookings are required.
Specify a security distribution group that indicates what internal users free/busy data is accessible.
Use this option to limit the user calendars that are accessible to the external organization. This can be
useful if only one part of your organization is collaborating with a partner on a project.
Note: Even if an organization relationship specifies that all user calendars are shared, users
can override this. Users can configure the default permissions for their own calendars to
prevent sharing. However, changing the default permission also affects sharing with internal
users.
12-20 Integrating Microsoft Exchange Server 2010 with Other Messaging Systems
To identify the external organization when creating the organization relationship, you typically use the
domain name of the external organization to automatically populate the necessary information into the
organization relationship. When you specify the domain name, all of the necessary configuration
information is obtained from the Microsoft Federation Gateway.
When you use the Exchange Management Shell, you can still obtain the federation information for the
external organization, but you must use the Get-FederationInformation cmdlet. This information can be
piped to the New-OrganizationRelationship cmdlet when creating the organization relationship.
You can obtain the URL for the Availability Web Service of the external organization by using
Autodiscover. If the external organization has not configured Autodiscover for access from the Internet,
you can enter the URL manually.
Sharing of availability performs best when users are using Microsoft Office Outlook 2010 or Microsoft
Outlook Web App on an Exchange Server 2010 Client Access server. Office Outlook 2007 users can view
availability information for external users, but the users must be selected from the GAL, which means that
GAL synchronization must be in place. Users with mailboxes on Exchange Server 2007 with SP2 can use
Microsoft Outlook Web Access to view availability information for external users.
Question: Can you vary the users that share calendar information as part of each
organization relationship?
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
12-21
Key Points
For controlling federated sharing, sharing policies are an alternative to organization relationships. You can
assign a sharing policy to specific mailboxes, and to determine what information a user can share with
external users. Instead of information being automatically available for users in an external organization,
the user in your organization sends a sharing invitation to the external user to share the calendar or
contacts. Although the organization containing the external users mailbox does not need to have a
federation trust, you should configure a federation trust to enable a two-way sharing relationship.
When you create a sharing policy, you can control the calendar information that is shared. You can
choose if you want to allow sharing of only free/busy information, or if you want to include the subject
and location, or the body. You also have the option to allow sharing of contacts. The information that is
allowed to be shared is controlled on a per-domain basis.
For a sharing policy to take effect, you must apply it to mailboxes. You can do this by using the properties
of the sharing policy, or the properties of the recipient. You can apply only a single sharing policy in each
mailbox.
After installation, a sharing policy called the Default Sharing Policy is created. This policy is automatically
applied to all Exchange Server 2010 mailboxes, and allows sharing of free/busy information with all
domains. Because of this policy, users can share their free/busy information with external users
immediately after you create a federation trust.
Only Outlook 2010 and Outlook Web App are capable of creating sharing invitations. Also, an Exchange
Server 2010 Mailbox server must host the user mailbox.
Question: Can you create a sharing policy to enable GAL synchronization between two
users?
12-22 Integrating Microsoft Exchange Server 2010 with Other Messaging Systems
Lesson 3
Office 365 is a suite of cloud-based services that includes Exchange Online. You can integrate Exchange
Online with your on-premises implementation of Exchange Server 2010. When you use Office 365, you
can implement single sign-on and directory synchronization to support your use of Exchange Online.
When you plan your implementation of Office 365, you need ensure uninterrupted service for users. Part
of your planning process needs to include message routing and how mailbox moves will be performed.
After completing this lesson, you will be able to:
Describe the options available for identify management with Office 365.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
12-23
Office 365 is a suite of Microsoft could-based services. The services included in Office 365 are:
Exchange Online. A hosted version of Exchange Server 2010 with services that vary depending on the
service plan.
Microsoft Lync Online. A hosted version of Lync that provides instant messaging and presence,
online meetings, audio and video calling, and screen sharing.
SharePoint Online. A hosted version of SharePoint 2010 that you can use to host SharePoint sites in
the cloud.
Office Professional Plus 2010. A suite of Office desktop applications that includes on-demand peruser subscription licensing that is connected to the cloud.
Office Web Apps. Web-based versions of Microsoft Office applications that you can access by using a
web browser rather than by installing locally.
Note Documentation often uses the term Office 365 when referring to Exchange Online.
Any reference to Office 365 email features refers to Exchange Online.
Exchange Online
You can obtain Exchange Online as a standalone product or as part of Office 365. The features available
to users vary depending on the service plan. The service plans available for Exchange Online are:
Exchange Online Kiosk. This service plan limits mailboxes to 500 MB and allows only Outlook Web
App or a POP3 client to be used for accessing mail messages. Advanced features such as delegate
access or inbox rules are not supported.
12-24 Integrating Microsoft Exchange Server 2010 with Other Messaging Systems
Exchange Online Plan 1. This service plan limits mailboxes to a total of 25 GB for the mailbox and
associated archive. Additional client protocols such as Internet message access protocol 4 (IMAP4),
Outlook Anywhere, the ActiveSync technology, and Exchange Web Services are allowed. The
features supported by this plan are very similar to an on-premises implementation of Exchange
Server 2010.
Exchange Online Plan 2. This service plan limits mailboxes to a size of 25 GB but allows an unlimited
archive size. All of the features of Exchange Online Plan 1 are supported, and in addition, litigation
hold is available.
Anti-spam and antivirus scanning is provided by Forefront Online Protection for Exchange (FOPE).
In most cases, organizations use Outlook Anywhere to connect to Exchange Online. This provides the
same features as an on-premises implementation of Exchange Server 2010.
Potential concerns for using Exchange Online include:
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
12-25
You can use Exchange Online for all mailboxes in your organization, or you can implement a hybrid
deployment with some mailboxes hosted on-premises. Which option you select depends on your business
needs.
No local hardware.
Many Exchange Server 2010 management functions, such as performance monitoring and tuning, are
managed by Microsoft.
Hybrid Deployment
A hybrid deployment has a combination of mailboxes hosted in an on-premises deployment and in
Exchange Online. This allows for coexistence that includes the following functionality:
Mail routing between Exchange Online, the on-premises deployment, and the Internet for a single
namespace.
Management of all mailboxes can be performed by using the Exchange Management Console or
Exchange Management Shell in the on-premises location.
Mailboxes can be moved between Exchange Online and the on-premises deployment.
12-26 Integrating Microsoft Exchange Server 2010 with Other Messaging Systems
Calendars, including free/busy information, are shared between Exchange Online and the onpremises deployment.
GAL synchronization is performed between Exchange Online and the on-premises deployment.
Multi-mailbox search can be performed across mailboxes in Exchange Online and in the on-premises
deployment.
Note A hybrid deployment manages messaging between two separate Exchange
organizations. Consequently, some functions do not work across organizational boundaries.
For example, you cannot assign a Full Mailbox, Send As, or Send on Behalf of permissions
across organizations.
A hybrid deployment is often used when larger organizations are migrating to Exchange Online. The
hybrid deployment helps to ensure uninterrupted messaging functionality for users during the migration.
A hybrid deployment can also support mobile users. Mobile users may have faster or more reliable
connectivity to Exchange Online than they do to the on-premises implementation of Exchange Server.
You can also use Exchange Online to store only personal archives. In this scenario, user mailboxes are in
the on-premises implementation of Exchange Server 2010, but archives are stored in Exchange Online.
Messages can be moved to the personal archive manually by the users or automatically by using archive
policies.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
12-27
One of the important considerations for implementing Office 365 is how users log on. You can use either
non-federated identity or single sign-on.
Non-federated identity
If you use non-federated identity, you manage user accounts in Office 365 and your local Active Directory
Domain Services (AD DS) implementation separately. Users have two sets of credentials for accessing
resources, and passwords are not synchronized between the two accounts. This can result in user
confusion when passwords are changed.
Non-federated identity is easy to implement, but it generally requires more user training and additional
help desk resources.
Single sign-on
Single sign-on is more complex to implement than non-federated identity, but it allows users to access
their Office 365 mailbox by using the same username and password that they use for AD DS in your
location. Using the same username and password for authentication reduces user confusion and help desk
calls.
You enable single sign-on by installing Active Directory Federation Services (AD FS). AD FS is installed on a
server at your site and manages credentials in coordination with Office 365 servers. You must also be
using the Microsoft Online Services Directory Synchronization Tool.
For medium-sized and large organizations, the extra complexity of single sign-on is typically outweighed
by the benefit of lower support costs. In most
12-28 Integrating Microsoft Exchange Server 2010 with Other Messaging Systems
You can use the Microsoft Online Directory Synchronization tool to synchronize information between
Office 365 and your on-premises deployment of AD DS. To implement a hybrid deployment or single
sign-on, you must use this tool.
When all mailboxes are hosted in Office 365, use the Directory Synchronization tool to add user accounts
from AD DS to Office 365. When the accounts are synchronized from AD DS, the user information is the
same in Office 365 as it is in the on-premises deployment of AD DS. New users in AD DS are automatically
added to Office 365, where mailboxes can be created. The default configuration of Directory
Synchronization is one way.
In a hybrid deployment, you should enable two-way synchronization. This way, the GAL is properly
synchronized between Office 365 and the on-premises Exchange Server organization. For example, a
mailbox created in Office 365 is synchronized as a contact in the on-premises Exchange Server
organization.
Two-way synchronization is required for the following features:
Moving mailboxes from Office 365 to the on-premises Exchange Server organization.
Synchronizing Safe Sender and Blocked Sender lists from Office 365 to the on-premises Exchange
Server organization.
Synchronizing voice mail notifications from Office 365 to the on-premises Exchange Server
organization.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
12-29
For organizations with all mailboxes hosted in a single Exchange Server organization, message routing can
be as simple as configuring a single MX record for inbound messages and configuring a single Send
connector for outbound messages. If your organization has all mailboxes hosted in Office 365, configure
the MX record to deliver mail to the Office 365 servers.
12-30 Integrating Microsoft Exchange Server 2010 with Other Messaging Systems
Messages between the on-premises Exchange Server organization and Office 365 are treated as internal
email. This means features that differentiate internal and external messages such as out of office
messages, operate correctly for all users regardless of the mailbox location.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
12-31
If you have a hybrid deployment and you move mailboxes between Office 365 and the on-premises
Exchange Server organization, the moves are remote mailbox moves. To perform remote mailbox moves,
you need to enable the Mailbox Replication Proxy Service (MRSProxy) on your Client Access servers. The
MRSProxy is not enabled by default.
In the RTM version of Exchange Server 2010 and with SP1, you need to modify a web.config file located in
the ews folder to enable the MRSProxy. In Exchange Server 2010 with SP2, you enable the MRSProxy by
using the Set-WebServicesVirtualDirectory cmdlet with the MSRProxyEnabled $true parameter.
The speed of mailbox moves is limited by the speed and latency of your Internet connection. However,
you can move a mailbox much faster than you can copy a file of the same data size. You should perform
tests to determine the throughput of your move process to understand how quickly you can move
mailboxes.
You can move individual mailboxes from the on-premises Exchange Server organization to Office 365, but
you need to understand the impact of those moves:
The mailbox is soft deleted when the move is complete. If there are problems with the moved
mailbox, you can recover the soft deleted mailbox for the time period that is set in the deleted
mailbox retention limit for the mailbox database.
The user account becomes a mail-enabled user account after the mailbox is moved. This way, the
account remains in the GAL of the on-premises Exchange Server organization.
Distribution list memberships are not affected. In each Exchange Server organization, the user
account is already a member of the distribution list. In the on-premises Exchange Server organization,
the group member changes from being a mailbox user to being a mail-enabled user.
12-32 Integrating Microsoft Exchange Server 2010 with Other Messaging Systems
Delegate and folder permissions are migrated. When you move a resource mailbox, the delegates
for the mailbox are preserved. However, the permissions are not valid unless the delegate and the
resource mailbox are both migrated. If you move a resource mailbox first and the delegate later, the
delegate has proper permissions after the delegate mailbox move is complete.
Send As and full mailbox permissions are not migrated. When you move a mailbox, the Send As
and full mailbox permissions are not retained. Send As and full mailbox permissions are also not
supported for users outside of the Exchange Server organization.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
12-33
If you are not using a hybrid deployment, there are still several other methods for moving mailboxes from
an existing messaging system to Office 365. Which method you select depends on the source messaging
system, whether you want to maintain coexistence, and the number of mailboxes to be moved.
Cutover Migration
A cutover migration can be used to migrate mailboxes from Exchange Server 2010, Exchange Server 2007,
or Exchange Server 2003 to Office 365. In a cutover migration, there is no coexistence between the
existing messaging system and Office 365. When the cutover migration is complete, all mailboxes and
other messaging information are located exclusively in Office 365. This method is suitable only for
organizations of 1,000 mailboxes or less, because there is no coexistence.
During the migration, the following data is migrated:
Mailboxes
Distribution lists
Contacts
Staged Migration
A staged migration can be used to migrate mailboxes from Exchange Server 2007 or Exchange
Server 2003 to Office 365. In a staged migration, there is coexistence between the existing messaging
system and Office 365. You must configure coexistence and directory synchronization between the onpremises Exchange Server organization and Office 365 before you perform a staged migration.
During the migration, only user and resource mailboxes are migrated. Directory synchronization is used to
migrate user accounts, distribution lists, and contacts before mailboxes are migrated. While directory
synchronization is active, the on-premises AD DS is authoritative, and any changes to user properties
should be done in AD DS.
12-34 Integrating Microsoft Exchange Server 2010 with Other Messaging Systems
IMAP Migration
IMAP migration uses the IMAP protocol to copy mailbox contents from to mailboxes in Office 365. Like in
a cutover migration, there is no coexistence between the source messaging system and Office 365. After
IMAP migration is complete, all messages are delivered to Office 365.
In most cases, IMAP migration is used to non-Exchange Server messaging systems or Exchange 2000
Server. IMAP migration does not migrate calendar data. However, you can select which folders are
migrated, so you can avoid migrating deleted items and junk mail.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
12-35
Lesson 4
Single sign-on simplifies access to Office 365 resources. When it is implemented, users can log on by using
AD DS credentials, just as they would on-premises. To implement single sign-on, you need to understand
how to implement AD FS. This includes the AD FS topology and certificates.
After completing this lesson, you will be able to:
Design an AD FS topology.
12-36 Integrating Microsoft Exchange Server 2010 with Other Messaging Systems
Single sign-on allows a user to access a mailbox in Office 365 by using the credentials stored in the onpremises AD DS. This makes access to Office 365 mailboxes easy for users.
AD FS 2.0 is required to implement single sign-on for Office 365. You can use an existing deployment of
AD FS, or you can create a new deployment. AD FS 2.0 is a server role in Windows Server 2008 and
Windows Server 2008 R2.
A federated trust is also required to implement single-sign on. The federated trust allows authentication
tokens from AD FS to be securely passed between the on-premises environment and Office 365.
AD DS requirements for single sign-on are as follows:
You must configure a user principal name (UPN) suffix that matches the domain you are using for
single sign-on. This should match the users email address.
The Office 365 UPN for the user must match the UPN in the on-premises AD DS. If you modify the
UPN after configuring directory synchronization, you must use the Set-MsolUserPrincipalName
cmdlet in the Microsoft Online Service Module for the Windows PowerShell command-line
interface in order to modify the users UPN on Office 365.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
12-37
Designing an AD FS Topology
AD FS uses a trust relationship between organizations to allow users in one organization to access
resources in another organization. In the case of Office 365, users in the on-premises AD DS are allowed
to access Office 365 mailboxes. User authentication is performed by on-premises AD FS servers, and the
security tokens generated by AD FS are trusted by Office 365.
AD FS has the following server roles:
Federation server. A federation server issues security tokens that contain claims. Claims in a security
token can include a users name or role. The security token is provided to the trusting organization.
This role is placed on the internal network.
Federation server proxy. A federation server proxy is used to provide access to the federation server
from the Internet. To support any user that is not located on the internal network, you must
implement a federation server proxy. This role is placed in a perimeter network.
Note You can use a third-party reverse proxy, Microsoft Forefront Unified Access Gateway
(UAG), or Forefront Threat Management Gateway (TMG) as an alternative to using
federation server proxies.
To provide high availability, we recommend that you perform load balancing both for federation servers
and for federation server proxies. At least two federation servers and two federation server proxies should
be deployed.
The load balanced DNS names that are used to access the federation servers and the federation server
proxies must be the same. They must also be accessible from the Internet and must match the Federation
Service name that you configure. If these are not correct, the authentication request will fail.
12-38 Integrating Microsoft Exchange Server 2010 with Other Messaging Systems
Scalability
The number of federation servers and federation server proxies you require depends on the number of
users accessing Office 365. Use the guidelines in the following table.
Number of users
Recommendation
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
12-39
AD FS Certificate Requirements
Certificates are a critical part of implementing AD FS. You need to configure the certificates correctly on
both the federation servers and the federation server proxies.
SSL certificate. This certificate is configured on the Default Web Site in Internet Information Services
(IIS) to help to secure communication between the federation server, the clients, and the federation
server proxies. The subject in this certificate needs to match the DNS name that is configured as the
Federation Service name, which also matches the DNS name configured for load balancing. This
certificate should be issued by a third-party CA to ensure that it is trusted by all computers.
Token-signing certificate. This certificate is used to digitally sign security tokens for validation by
Office 365. The default configuration uses a self-signed certificate that is trusted within AD FS. We
recommend that you use the default certificate because AD FS manages this certificate automatically
and renews it as required. There is no need for this certificate to be issued by a CA.
SSL certificate. This certificate is configured on the Default Web Site in IIS to help to secure
communication between the federation server proxies, the Internet clients, and the federation servers.
The subject in this certificate needs to match the DNS name that is configured as the Federation
Service name, which also matches the DNS name configured for load balancing. This certificate
should be issued by a third-party CA to ensure that it is trusted by all computers. Use the same
certificate as the SSL certificate on the federation servers, because they use the same subject name.
12-40 Integrating Microsoft Exchange Server 2010 with Other Messaging Systems
Lab Scenario
You are a messaging engineer for A. Datum Corporation, an enterprise-level organization with multiple
locations. A. Datum Corporation is an international corporation involved in technology research and
investment, and has successfully implemented Exchange Server 2010 for messaging and collaboration.
As part of the growth strategy for A. Datum Corporation, your organization has purchased their
competitor company, Northwind Traders. You must design the integration of your Exchange Server 2010
organization, and the POP3/IMAP messaging system of Northwind Traders.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
12-41
Document the required configuration for migrating Northwind Traders email to Office 365.
Task 1: Document the required configuration for migrating Northwind Traders email to
Office 365
Jason Carlson
5th June 2010
Requirement Overview
Determine how to migrate Northwind Traders email to Office 365.
Proposals
Question: Does this scenario require a hybrid implementation of Office 365?
Question: Will inbound routing be to the on-premises Exchange Server organization or to
Office 365?
Question: Will outbound routing be centralized or decentralized?
Question: How will you configure MX records?
Question: How will you migrate mailboxes to Office 365?
Question: Will you configure single sign-on?
12-42 Integrating Microsoft Exchange Server 2010 with Other Messaging Systems
(continued)
A. Datum Corporation and Northwind Traders Integration Plan
Question: Do you need to configure a UPN to support single sign-on?
Question: What AD FS servers do you require to support single sign-on?
Question: What certificates do you need to support single sign-on?
Note
Results: After this exercise, you should have created a plan to migrate Northwind Traders email to
Office 365.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
12-43
Review Questions
1.
Does Exchange Server 2010 include specialized connectors for other messaging systems?
2.
How can Forefront Identity Manager help with GAL synchronization between two Exchange Server
organizations?
3.
Which option for sharing calendar information can you use for both Exchange Server 2010 and
Exchange Server 2007?
4.
Use organization relationships for a large number of users to share calendar information with an
external organization such as a partner or subsidiary.
Specify a security distribution group in an organization relationship to limit the sharing of calendar
data to specific users.
Use sharing policies to allow users to share information directly with external users, and control the
information that can be shared.
Provide users with Outlook 2010 or Outlook Web App to allow them to send sharing invitations.
12-44 Integrating Microsoft Exchange Server 2010 with Other Messaging Systems
Course Evaluation
Your evaluation of this course will help Microsoft understand the quality of your learning experience.
Please work with your training provider to access the course evaluation form.
Microsoft will keep your answers to this survey private and confidential, and will use your responses to
improve your future learning experience. Your open and honest feedback is valuable and appreciated.
A-1
Appendix A
Unified Messaging in Microsoft Exchange Server 2010
Contents:
Lesson 1: Planning the Unified Messaging Infrastructure
A-3
A-17
Lesson 3: Planning the Unified Messaging Integration with Lync Server 2010
A-29
A-2
Module Overview
Unified Messaging in Exchange Server 2010 enables the integration of email messaging and voice
messaging into a single infrastructure. Once you deploy Unified Messaging in Exchange Server 2010, the
Exchange servers can provide services to voice messaging clients. For example, your users can access the
email messages in their mailbox by using a phone, and access voice messages in their mailbox by using a
messaging client such as Outlook. With Unified Messaging, users can also use their mobile device, Lync
Server 2010 client or Lync Server 2010 integrated phones to access information in their mailboxes.
After completing this appendix, you will be able to:
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 A-3
Lesson 1
When you plan your Exchange Server 2010 Unified Messaging infrastructure deployment, you must
consider several design issues that may affect your ability to reach your organizational goals. These design
issues include:
A-4
Key Points
Understanding how the signal or messaging flow in Unified Messaging 2010 occurs is important in the
design phase. The architecture of the Unified Messaging environment determines the topology. The signal
flow in Unified Messaging is the process by which communications traffic that is received by a Unified
Messaging server is routed in an Exchange Server 2010 organization. Depending on the type of incoming
message or call that is received by a Unified Messaging server, various transport protocols are used.
Voice calls that come into an Exchange Server 2010 organization can be received from users who are
inside or outside the organization. When a caller places a call to a Unified Messaging-enabled user's
telephone extension, and the user is unavailable to answer the call, the Private Branch Exchange (PBX)
forwards or routes the incoming call to an IP gateway, and then to the Unified Messaging server.
IP PBX
In a Unified Messaging system that uses an IP PBX, the IP PBX forwards the incoming message to the
Unified Messaging server. Either the IP gateway or the IP PBX translates or converts the incoming stream
into a voice over Internet Protocol (VoIP) protocol, such as the Session Initiation Protocol (SIP) for
incoming voice messages. The stream of IP data is then passed on to the Unified Messaging server. After
the Unified Messaging server receives the call, the Unified Messaging server processes the message, and
determines how to route the message to determine the destination of the message.
Voice
In an incoming call scenario that includes incoming voice messages, a Hub Transport server uses the
Simple Mail Transfer Protocol (SMTP) transport to submit the voice mail message to the Mailbox server. In
a routing scenario that includes multiple Hub Transport servers, the incoming voice mail message is first
submitted to the closest Hub Transport server, and is then routed to the appropriate Mailbox server that
contains the Unified Messaging-enabled mailbox.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 A-5
Protocols
The Unified Messaging solution provides access to telephony systems by using the standard VoIP
protocols including SIP, and Real-Time Transport Protocol (RTP).
A-6
Infrastructure Requirements
Key Points
In each Unified Messaging deployment, there are required Exchange Server 2010 server roles that must be
deployed. These Exchange Server 2010 roles are in addition to other required infrastructure components
that must also be installed.
Hub Transport
The Unified Messaging server communicates with the Hub Transport server role to send messages to the
Mailbox server. When a caller leaves a voice mail for a Unified Messaging subscriber or sends a fax to a
Unified Messaging subscriber, the Unified Messaging server attaches the voice mail or fax to a message
and forwards it to the Hub Transport server using Simple Mail Transfer Protocol (SMTP).
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 A-7
Client Access
The Unified Messaging server communicates with the Client Access server role when a subscriber uses the
Play on Phone feature or when they reset their personal identification number (PIN) through Outlook
Web App. Using Play on Phone, a Unified Messaging subscriber can use Outlook 2007 or later, or Outlook
Web App to instruct the Unified Messaging server to send a voice mail to a telephone number. When the
user does this, the client communicates with Unified Messaging Web Services, which you install on a
Client Access server. Unified Messaging Web Services then uses SIP to communicate with the Unified
Messaging server, which instructs the VoIP gateway to place the phone call.
VoIP Phone
There are two types of VoIP phones available: software-based, and hardware-based. A software-based
phonesuch as the Microsoft Lync 2010is a communications program that runs from a computer. A
hardware-based phone is similar to the types of phones found currently on desktops, except that they
have added functionality. Lync Server 2010 supports several types of phones, including IP desk phones
and USM phones.
PBX
Exchange Server 2010 Unified Messaging relies on an IP gateway that can receive incoming calls from a
legacy PBX. Part of the planning process for PBX support is verifying that your PBX is supported by
Microsoft, and that there are configuration notes for the PBX.
The PBX configuration notes contain the configuration and other settings required to deploy a PBX with
Unified Messaging. The notes are organized based on manufacturer and model.
VoIP Gateway
If organizations have deployed a traditional PBX, they need to deploy a VoIP gateway. VoIP gateways are
located between your telephony network and data network. A VoIP gateway converts the protocols
coming from the telephony network to a protocol understood by the Unified Messaging Server, such as
Session Initiation Protocol over Transmission Control Protocol (SIP/TCP). When you deploy Unified
Messaging, you must configure a Unified Messaging IP gateway to provide the connection to the VoIP
gateway.
A-8
Business Requirements
Key Points
There are a number of questions that must be answered in the planning stages of a Unified Messaging
deployment, to ensure that business requirements are met. These requirements must be researched prior
to planning for the deployment of Unified Messaging.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 A-9
Deciding which codec to use is dependent on the advantages and disadvantages inherent with each.
Deciding which to use is dependent on bandwidth and compression.
The Effect That Concurrent Connections Have on Planning the Number of Servers
Remote users and the number of concurrent connections will influence the number of servers. A Unified
Messaging server can accept 100 concurrent voice messages by default. Single Unified Messaging servers
can be configured to accept a maximum of 200 concurrent voice messages.
In branch office scenarios or over wide area network (WAN) connections, use the G.723.1 codec instead of
the G.711 or G.711A codec to minimize the network traffic that is passed between your IP gateways and
your Unified Messaging servers.
A-10
The following table outlines codecs and how they can be used.
Codec
Description
G.723.1
G.711 -law
G.711 A-law
G.723.1
G.711
Requires very low processing, but does require 128Kbps for two-way
communication
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 A-11
Planning Considerations
Key Points
In most deployment scenarios, it is generally advisable to keep the Unified Messaging topology as simple
as possible. Large enterprises with complex network and telephony environments, multiple business units,
or other complexities, require more planning than smaller organizations with relatively straightforward
Unified Messaging needs. This is especially true when integrating Unified Messaging with a legacy PBX
system.
There are many areas that you must consider or evaluate to be able to successfully deploy the
infrastructure required by Exchange Server 2010 Unified Messaging. You must understand the different
aspects of Exchange Server 2010 Unified Messaging, and each component and feature, so that you can
plan your Unified Messaging infrastructure and deployment appropriately.
Typical Issues
Allocating time to plan and work through the following issues will make deployment more successful.
Telephony network and current voice mail system. What is your current telephony network, and can it
be used in a Unified Messaging environment? Is your PBX supported by Microsoft? Are there
configuration notes available?
Current data network design. What is your physical topology? Do you have multiple sites? How are
these sites connected? Are the multiple sites based on a Hub-Spoke method? Are the sites based on a
full-mesh method?
AD DS environment. What is your logical topology? Do have more than one forest? Do you have
multiple Active Directory sites? What are the links between the sites?
Are the PBXs networked? Are they centralized, or located in multiple locations? Placement of IP/VoIP
gateways, telephony equipment, and Unified Messaging servers is very important. In most design
scenarios, you must minimize the number of hops the packets must make between the PBX to the
VoIP gateway and telephony equipment.
A-12
Place the physical components in close proximity to each other. The connection point between the
phone system and the Unified Messaging server is the IP gateway. These means that both the PBX
and the Unified Messaging servers should be deployed on the same fast physical network as the IP
gateway.
Exchange Server roles and Unified Messaging servers. Are any roles collocated, and if so, does the
server have the capacity to run multiple roles at once?
WAN termination. This is important if you have multiple sites. You should consider terminating them
close to where your telephony equipment is located.
Codec. The higher the sampling rate, the more bandwidth used and the larger the attachments for
voicemail. The most highly compressed codec used is WMA, where a 5 minute voice mail would be
approximately 250 kilobytes (KB). If other codecs are used, that same 5 minute voice mail would easily
exceed 5 megabytes (MB) in size.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 A-13
Key Points
Properly configuring and deploying IP/VoIP gateways for your organization is a critical step. This must be
done correctly to successfully deploy Exchange Server 2010 Unified Messaging. Microsoft maintains a
website that lists compatible IP gateways, as well as the required configuration notes and files that you
must have to correctly deploy your organization's IP/VoIP gateways to work with Exchange Server 2010
Unified Messaging. It is equally important to match the number of IP/VoIP gateways that you have in your
environment, to the number of Unified Messaging servers that are available.
Multiple IP Gateways
IP gateways that are supported by Unified Messaging can be configured to route calls to Unified
Messaging servers in a round-robin (a local balancing mechanism used by Domain Name System (DNS)
servers to share and distribute network resource loads) manner. To enable an IP gateway, you must
configure each IP gateway with the IP address (or addresses) of your Unified Messaging servers that
answer calls from the IP gateway. These are the Unified Messaging servers that are associated with the
same dial plan as the Unified Messaging IP gateway object, which logically represents the IP/VoIP
A-14
gateway. This enables all the Unified Messaging IP gateways to forward incoming calls to the Unified
Messaging servers that are associated with the same dial plan. Then, if an IP gateway fails, the PBX will
send the call to another IP gateway, one that can answer the call. The IP gateway, in turn, forwards the call
to a Unified Messaging server within the same dial plan. If the call is sent to a Unified Messaging server
that is not available, the IP gateway tries a second time to contact the Unified Messaging server. If it is
once again unsuccessful, it then uses the next Unified Messaging server in the list to answer the call.
Multiple Locations
A company with multiple physical locations will most likely have the same number of logical sites. If this is
the case, then each of those sites would have their own PBX and IP gateway. Each site would also have to
configure one or more Unified Messaging Dial Plans, Unified Messaging Mailbox policies, and hunt
groups.
You must also consider site links between the physical sites. Ensure that the links have the necessary
bandwidth to support the required network traffic, and the increased Unified Messaging traffic. This is of
special concern if you deploy Lync Server 2010 to support voice calls and conferencing. Adding these two
new elements requires even more bandwidth.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 A-15
At a high level, there are two options for increasing the capacity of the Unified Messaging server
environment. One option is to deploy more powerful servers as Unified Messaging servers. For example,
you can increase the speed or number of processors on the servers, increase the RAM or increase the
network adapter capacity to enable a single server to handle more concurrent calls.
The second option for increasing capacity is to deploy more Unified Messaging servers. As a single server
reaches its capacity for concurrent calls, you can simply deploy another server and associate it with the
same dial plan as the existing server.
Choosing the best option for an organization will depend on several factors:
Exchange Server deployment. If the organization has a single data center and all Exchange servers are
deployed in that data center, then you will need to deploy all Unified Messaging servers in that data
center as well. This makes it more likely that you will increase the power of the Unified Messaging
server. If the organization has multiple locations with Exchange servers deployed, you are more likely
to deploy multiple Unified Messaging servers across the locations. If the number of users in an office
is low, you may choose to deploy a less powerful Unified Messaging server, or even collocate the
Unified Messaging server with other Exchange Server roles.
Availability requirements. If your Unified Messaging environment must be highly available, you may
choose to deploy multiple less powerful Unified Messaging servers in the same dial plan so that they
can provide redundancy for each other.
IP gateway deployment. There are many different capacity options available when choosing an IP
gateway. It is important to match the capacity of the IP gateways with the capacity of the Unified
Messaging servers that will use the IP gateways.
A-16
In most organizations, email messaging and the phone system are considered critical components that
must always be available. Because the Unified Messaging server role provides an integration point
between the two systems, it is important that this server role also be highly available. To implement high
availability, consider the following:
Configure the Unified Messaging servers with redundant hardware components. Like any other
Exchange Server role, you should begin the high availability design by ensuring that the server has
redundancy at the hardware level. This might include adding multiple network adapters to the server
and configuring network teaming or adding multiple power supplies to the server.
Deploy multiple Unified Messaging servers. To protect against a single server failure, you can deploy
multiple Unified Messaging servers and add them to the same dial plan. When you add multiple
servers to a single dial plan, the IP gateway will try to connect to the first Unified Messaging server. If
the Unified Messaging server is unavailable, the IP gateway will try to connect to the Unified
Messaging server again after 5 seconds. If there is no response from the server, the IP gateway will try
to connect to the next configured Unified Messaging server.
Deploy multiple IP gateways. The IP gateway must also be highly available to ensure that the
connections between the PBX and the Unified Messaging server are available.
Ensure the high availability of the other Exchange Server roles. The Unified Messaging server depends
on the other Exchange 2010 server roles to provide full functionality. As part of planning the Unified
Messaging server availability, you also need to make sure that the other server roles are also highly
available.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 A-17
Lesson 2:
Planning and deploying Exchange Server 2010 Unified Messaging requires the coordination of telephony,
IT, and Exchange Server administrators. This lesson discusses how to develop a plan to deploy and
configure Exchange Server 2010 Unified Messaging for your organization.
After completing this lesson, you will be able to:
A-18
Key Points
There are many factors to consider when selecting hardware for Exchange Server 2010. Three of the most
critical factors to consider are: choice of processor, amount of memory, and selection of storage.
Processors
For production environments, you must use a X64-bit processor. These include Intel processors that
support Intel Extended Memory 64 Technology, or AMD processors that support AMD64. Extensive
testing on dual-core processors shows that Exchange Server benefits significantly when using multi-core
processor technology, with four cores being optimal. The performance benefit for Exchange Server from
dual-core technology depends upon the specific processor.
Memory
Having enough memory is critical to ensure the best performance for Unified Messaging. The minimum
memory requirement for Unified Messaging is 4 gigabytes (GB), which is 2 GB per core with a minimum of
4 GB total. Having more than 8 GB is not shown to improve overall performance. You should also review
the physical memory specifications for the physical server, to verify the type and size of memory modules.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 A-19
Key Points
A dial plan object is a container object in AD DS that logically represents a set or grouping of PBXs that
share common user extension numbers. In practical terms, users' extensions hosted on PBXs share a
common extension number. Users can dial one anothers telephone extensions without appending a
special number to the extension, or dialing a full telephone number. A UM dial plan is a logical
representation of a telephony dial plan. All users within a dial plan have a unique extension number, and
the combination of dial plan and the user extension uniquely identifies each Unified Messaging user. After
creating the UM dial plan, you need to associate it with a UM server.
The UM dial plan is the basic administration unit in Unified Messaging. It is the telephony extension
numbering plan. Within Unified Messaging, the dial plan plus the extension number provides the unique
identifier for each Unified Messaging user. The dial plan controls the numbering scheme and the
outbound dialing plan. It also represents a logical link that establishes a connection between the users
within a UM dial plan and their telephony network.
Does the numbering plan denote the physical sites or departments? One option is to have a different
numbering plan for each physical location, similar to a Dynamic Host Configuration Protocol (DHCP)
address scheme.
What is the number of users, and is growth factored into the numbering plan? Basing a dial plan on
the current number of users may make your ability to expand the plan more difficult at a later time.
A-20
Numbering plans are determined by several factors: the number of employees in your organization,
the departments, and their physical structure. You may use a numbering plan that denotes not only
the extension, but where the extension is located or the department.
How are international sites numbered? You are likely limited in your ability to have a standardized
numbering plan with overseas offices.
Dial codes for dialing external phone numbers and international numbers. This is designed to limit
the range of calls a user can place. You might allow users to call only local numbers, and control this
by specifying the specific area codes that can be dialed. You can also use this to prohibit calls to a
specific area code, such as area code 900 numbers. You must remember that some metropolitan
areas have a number of area codes associated with them, or may border another state with differing
area codes. For example, Chicago, Illinois has seven area codes to encompass the downtown area, as
well as the suburbs.
Features such as whether subscribers can transfer callers to other users, and who callers can contact.
By default, the ability to transfer calls is enabled. If you need to disable this feature due to corporate
policy, you can disable it.
Time limits for calls, messages, and idle timeouts. You can limit the amount of time that an incoming
call can be connected to the system without being transferred to a valid extension. You can set this
timeout value from 10 to 120 minutes. Setting the time too short could cause a call to be dropped
before finally connecting. The usual setting for this value is 30 minutes.
Default language for voice prompts. If you are in a multi-language environment, you can install the
appropriate Unified Messaging language pack. A user can then access a second language to play
their personal greeting, use the text-to-speech engine, or play Calendar items.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 A-21
Key Points
A hunt group is an extension that is defined as a group or section, such as with a help desk or call center.
It is the means of forwarding calls from a single inbound number to a group or hunt group of extensions.
In most cases, a hunt group represents a set of identical resources shared by an application or a group.
This provides more efficient access to applications such as voice mail or an auto attendant, so callers will
not experience a busy signal; instead, the PBX hunts for an open line to which to connect them.
The UM hunt group object is a logical representation of an existing PBX or IP-PBX hunt group. When the
pilot number of a hunt group receives a call, the PBX or IP-PBX looks for the next available extension
number to which to deliver the call. When an incoming call is unanswered or busy, the PBX or IP-PBX
routes the call to the UM server. UM hunt group objects act as a connection or link between the UM IP
gateway and the UM dial plan. Therefore, you must associate a single UM hunt group with at least one
UM IP gateway and one UM dial plan.
UM hunt group objects locate the PBX hunt group from which the incoming call was received. A pilot
number that is specified for a hunt group in the PBX also must be specified within the UM hunt group.
The pilot number enables the UM server to interpret the call with the correct dial plan so that it can route
the call correctly.
A-22
You can have multiple UM servers associated with a single hunt group. A UM server can be configured to
support up to 200 simultaneous calls. If you estimate having more than that many simultaneous calls in
one group, then you would need to have multiple UM servers.
Pilot Number
A pilot number is the way the PBX identifies a hunt group. In other words, a pilot number is the address or
label for the hunt group. It is a dummy extension, one that does not have a person or phone associated
with it. It is the number to which a coverage path routes a call.
A PBX, when used with Exchange Server Unified Messaging, uses a pilot number to target a diverted ring,
no answer, or busy call to Exchange Server Unified Messaging so a message can be taken. This same pilot
numberor a different numbercan be used by subscribers to access the messages in their Exchange
Server mailbox. A pilot number is also used for top-level access to an Exchange Server UM auto attendant.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 A-23
Key Points
The UM server object performs directory lookups for recipient information in AD DS. Each Unified
Messaging-enabled user must be added to a dial plan, and must be assigned an extension number in AD
DS. This provides the user mailbox with a unique identifier.
To locate the Mailbox server hosting the user mailbox so the Unified Messaging server can send voice
messages to the mailbox, or to extract the users personal greeting from the mailbox server.
A-24
Key Points
UM mailbox policies are created in the Configuration container in AD DS by using the Exchange
Management Shell or the Exchange Management Console. By default, a single UM mailbox policy is
created every time you create a UM dial plan.
Dialing restrictions
For example, you can create a UM mailbox policy for a specific group of Unified Messaging-enabled
userssuch as executivesto increase the level of PIN security by reducing the maximum number of
logon failures before a user is locked out.
Creating additional UM mailbox policies, and applying a common set of mailbox policy settings for
other groups of users.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 A-25
Requiring that the mailbox of each Unified Messaging-enabled user is linked to a single UM mailbox
policy. After you create a UM mailbox policy, you link one or more UM-enabled mailboxes to the UM
mailbox policy. This lets you control PIN security settingssuch as the minimum number of digits in a
PIN, or the maximum number of logon attempts for the Unified Messaging-enabled users who are
associated with the UM mailbox policy.
Linking multiple Unified Messaging-enabled users to a single UM mailbox policy. A single user can be
associated with only one UM mailbox policy.
UM mailbox policy settings are applied to the Unified Messaging-enabled users. The settings that are
defined on a UM dial plan and a UM mailbox policy are applied to all users who are associated with
the UM mailbox policy.
A-26
Key Points
This topic describes Unified Messaging client features that give Unified Messaging-enabled users access to
their email and messages in their Exchange Server 2010 mailbox. The Unified Messaging client capabilities
enable you to provide users with simplified voice mail and email access options, and an improved overall
user experience.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 A-27
Unified Messaging Integration with Office Outlook 2007 and Office Outlook 2010
Clients
Using Office Outlook 2007 or later, users can access their individual Exchange Server 2010 mailboxes and
view email messages in their Inbox, view and change calendar information, and listen to voice messages
using a Windows Media Player. The Windows Media Player is embedded inside the email messages on
their portable device or computer. Using the Outlook 2010 client, users gain additional features, such as
Play on Phone.
Note The advanced Unified Messaging features found in the Outlook Web App Premium
clientsuch as the voice mail configuration optionsare not available in Outlook Web App
Light.
A-28
Key Points
There are several steps involved in deploying Unified Messaging. First, you must decide upon a UM dial
plan configuration. To integrate with VoIP gateway, you must then configure a UM IP gateway. A hunt
group is created when you create an IP gateway. For users to have Unified Messaging capability, you must
enable them for Unified Messaging.
UM IP Gateway Object
You must create a UM IP gateway object. A UM IP gateway object represents a physical VoIP gateway
with an IP address, from which a Unified Messaging server can receive calls. The Unified Messaging server
requires this information to connect to the VoIP gateway and the PBX.
Enabling Users
User mailboxes must be UM-enabled to access Unified Messaging services. You must associate each user
mailbox with a UM mailbox policy, and a unique extension number. A UM mailbox policy specifies policy
properties, such as: the maximum greeting length, the number of unsuccessful login attempts before the
Unified Messaging server resets the password, the minimum digits that a PIN requires, and restrictions on
international calling.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 A-29
Lesson 3:
The integration of Lync Server 2010 and Unified Messaging is built around the concept of user presence.
Lync Server 2010 uses user availability, communication endpoints, and user relationships to connect
people using the most appropriate medium at any point in time. Since Lync Server 2010 ties together
voice, email, instant messaging (IM) and other communication paths, it can help you route messages in
the most productive way possible.
Note Lync Server 2010 is the newest version of Microsofts instant messaging,
conferencing and voice server. Lync Server 2010 replaces Office Communications Server
2007 R2, but many of the same Unified Messaging integration options are available in both
Lync Server 2010 and Office Communications Server 2007 R2.
After completing this lesson, you will be able to:
A-30
Key Points
Lync Server 2010 changes how users access network communications. A central feature in Lync Server
2010 is the concept of user presence. User presence displays information about the current state for the
user they may be online and available, online but in a meeting or busy, or offline. The users presence
follows them when they log on to a different computer, when they log on to their laptop at home, or
even when using a mobile device with a Lync client installed. Users are not denoted by a telephone
numberlike they would be in a traditional PBX system, although they do have a number associated for
their accountbut rather by their presence.
Instant messaging. The Lync 2010 client provides IM functionality that is hosted by Lync Server 2010.
The solution provides IM features such as group IM, and extends the internal IM infrastructure to
external IM providers.
Presence information. Lync Server 2010 tracks presence information for all Lync Server 2010 enabled
users. It provides this information to the Lync Server 2010 client and other applications, such as Office
Outlook 2007 or later, or within the Outlook Web App interface.
Web and audio/video conferencing. Lync Server 2010 can host on-premise conferences, which can be
scheduled or unscheduled. They can include IM, audio, video, application sharing, slide presentations,
and other forms of data collaboration.
VoIP telephony. Enterprise voice enables Lync Server 2010 users to place calls from their computers
by clicking an Office Outlook or Lync Server 2010 contact. Users receive calls simultaneously on all
their registered user endpoints, which may be a VoIP phone, mobile phone, or Lync 2010 client.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 A-31
Users can see if they have new voice mail either from the main Lync 2010 window or by looking at
the icon in the notification area at the bottom of the screen.
Users can click the Play button on the voice message to hear the audio portion of messages, or use
Exchange Server 2010 SP1 to open the message in Outlook 2010 and view the transcript.
Lync Server 2010 can divert calls to Exchange Unified Messaging, dynamically or on a static basis, as
well as allow users to connect to the Unified Messaging service to change their greetings or access
other voice functionality.
Lync Server 2010 presence features encourage instant communication when possible, but also
provide information about whether a user is in a meeting or out of the office, indicating that instant
communication is not possible.
A-32
Unified Contacts
In environments that integrate Lync Server 2010 with Exchange Server 2010 SP1 Unified Messaging,
Exchange Server maintains a single unified contact store for contacts across Lync 2010, the Outlook 2010
messaging and collaboration client, and other endpoints, eliminating the need to maintain multiple
contact lists, and provides a consistent experience across programs.
All contact identities between Lync Server 2010, Exchange Server 2010, and other endpoints are shared
and remain one identity, with Exchange Server acting as the single contact store. Users may also rename
contacts or add other details to their contacts cards for additional context or personal reference.
Unified Conferencing
Lync 2010 integrates with Outlook to make scheduling, joining, and facilitating meetings easier. Lync 2010
is the only client needed for all types of meetings, both scheduled and spontaneous.
Outlook 2010 calendar integration also reflects Lync 2010 presence settings; for example:
In a Meeting. The contacts Outlook calendar shows that the contact has a scheduled meeting.
Out of Office. The contacts Outlook calendar or Out of Office Assistant indicates that he or she is out
of the office.
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 SP2 A-33
If you want to integrate Exchange Unified Messaging with Lync Server 2010, you must perform the tasks
described in this section. This topic assumes that you have deployed Lync Server 2010 with a collocated
Mediation server and that you have enabled users for Lync Server 2010, but that you have not necessarily
performed all deployment and configuration steps to enable Enterprise Voice.
Step 2: Configure Security Settings for the Exchange UM SIP Dial Plan
To encrypt Enterprise Voice traffic, configure the security settings on the Exchange UM SIP dial plan as SIP
Secured or Secured. This is an especially important step if you have deployed or plan to deploy Lync 2010
Phone Edition devices in your environment. For Lync 2010 Phone Edition devices to function in an
environment with Exchange Unified Messaging integration, Lync Server 2010 encryption settings must
align with the Exchange Unified Messaging dial plan security settings.
A-34
Grants Lync Server 2010 permission to read Exchange UM AD DS objects; specifically, the SIP dial
plans created in the previous task.
Creates a UM IP gateway object in AD DS for each Lync Server 2010 Enterprise Edition pool or
Standard Edition server that hosts users who are enabled for Enterprise Voice.
Creates an Exchange UM hunt group for each gateway. The hunt group pilot identifier will be the
name of the dial plan that is associated with the corresponding gateway. These need to be mapped
one-to-one if there is more than one dial plan.
Validates that there is an Enterprise Voice dial plan with a name that matches the Exchange UM dial
plan FQDN.
If you are running Exchange Server 2010 (SP1), the dial plan names do not need to match, and you can
ignore the tools warning about this.
This utility works by scanning AD DS for Exchange Unified Messaging settings and allowing the
Lync Server 2010 administrator to view, create, and edit contact objects.
L1-1
Adatum_Info.vsd
Jason Carlson
31st January 2010
LondonSite
RD-LON-DC1
RD-LON-DC1
EU-LON-DC1
EU-LON-DC2
LondonSite2
EU-LON-DC3
VancouverSite
RD-TOR-DC1
NA-TOR-DC1
NA-TOR-DC2
SanDiegoSite
AD-SAN-DC1
AD-SAN-DC2
TokyoSite
RD-TOK-DC1
AS-TOK-DC1
AS-TOK-DC2
Chennai
AS-CHE-DC1
(continued)
A. Datum Current Network Infrastructure Analysis
Additional notes
Adatum.com Adatum.com
EU.Adatum.com
NA.Adatum.com
AS.Adatum.com
TreyResearch.net
Additional notes
Jason Carlson
31st January 2010
Server role
Location
LON-MSG-FE1
Front-end server
London
LON-MSG-BH1
Front-end server
London
LON-MSG-BE1
Back-end server
London
LON-MSG-BE2
Back-end server
London
LON-MSG-BE3
Back-end server
London
LON-MSG-BE4
Back-end server
London
LON-MSG-BE5
Back-end server
London
LON-MSG-BE6
Back-end server
London
(continued)
A Datum Current Messaging Infrastructure Analysis
Exchange Server Configuration
Exchange version and
SP level
Server name
Server role
Location
LON-MSG-PF1
London
VAN-MSG-FE1
Front-end server
Vancouver
VAN-MSG-BH1
Front-end server
Vancouver
VAN-MSG-BE1
Back-end server
Vancouver
VAN-MSG-BE2
Back-end server
Vancouver
VAN-MSG-BE3
Back-end server
Vancouver
VAN-MSG-PF1
Vancouver
TOK-MSG-FE1
Front-end server
Vancouver
TOK-MSG-BH1
Front-end server
Vancouver
TOK-MSG-BE1
Back-end server
Vancouver
TOK-MSG-BE2
Back-end server
Vancouver
TOK-MSG-BE3
Back-end server
Vancouver
TOK-MSG-PF1
Vancouver
Additional notes
Settings
Administrative
groups
Administrator groups
Routing groups
SMTP namespaces
Adatum.com, TreyResearch.net
Additional notes
L1-3
Results: After this exercise, you should have completed the appropriate sections in the Current Messaging
Infrastructure Analysis document.
2.
What are A. Datum Corporations requirements and pain points? Answers below:
Madeleine Kelly, the CEO, anticipates rapid growth and multiple acquisitions.
Karen Toh, VP Europe, says her Sales staff needs access to e-mail from anywhere.
Marcel Truempy, CIO, cited a period of unavailability that resulted in business lost; highavailability is important.
Scott MacDonald, VP North America, is concerned about legal and corporate regulatory
compliance issues.
Gareth Chan, VP Asia, needs a means of confidential communication with Contoso, Ltd.
Shane DeSeranno, Network Operations Manager, requires that all network traffic entering the
corporate network is encrypted.
Jason Carlson, Network Specialist, states that the wide area network (WAN) is pretty reliable, but
that it lacks bandwidth between some company locations.
Tzipi Butnaru, Directory Services Manager, explains that all domain controllers are running
Windows Server 2008 Service Pack 1 (SP1), and does not anticipate wanting to make additional
Active Directory Domain Services (AD DS) infrastructure changes.
Conor Cunningham, Messaging Services Manager, wants to make Outlook Web App available
to users currently using Post Office Protocol (POP) from home. Additionally, he states that many
users are requesting access to e-mail services from their mobile phones.
How can Exchange Server 2010 help address the requirements? Answers below:
Exchange Server 2010 is very scalable, and can easily support the anticipated mergers and
acquisitions.
Exchange Server 2010 supports e-mail from many devices, including web browsers and mobile
phones.
Exchange Server 2010 implements features that enable organizations to remain compliant with
legal and corporate messaging policies. Features include: messaging records management, Multimailbox search, legal hold, information rights management protection, personal archive, and
transport rules.
Exchange Server 2010 can support secure communication channels between partner
organizations.
Exchange Server 2010 supports a number of encryption methods so that only encrypted traffic
can enter the corporate network through the internal firewall.
L1-5
Exchange Server 2010 can be configured to use the existing site configuration, or to use an
Exchange-specific site configuration; this enables a network administrator to get the most out of
their WAN links.
Exchange Server 2010 supports the POP protocol. It also supports e-mail access from web
browsers and mobile phones. The users requirement for secure anywhere-access to their e-mail
is supported.
Jason Carlson
31st January 2010
(continued)
A Datum Project Requirements Analysis
Project priorities and constraints
This section outlines the identified project priorities and constraints. During the requirements
analysis task, specific priorities should have been identified related to the schedule, resources, or
features that must, or must not, be included in the project:
The budget may be a constraint on the project.
Unencrypted traffic can be allowed into the perimeter network, but not to the internal network.
There may be resistance to making any changes to the Active Directory configuration.
Task 3: Discuss the components that you will need to include in the Exchange Server
design to meet the company requirements
You will complete these sections as a group.
2.
What components will you need to include in the Exchange Server 2010 deployment to meet the
business requirements?
Answer: Configure the Client Access server role to provide users with e-mail access
anywhere in the world at any time.
Answer: Configure the Hub Transport server role to enforce compliance requirements.
Answer: Configure the Client Access server role to provide access to the mailbox servers for
more messaging clients, including clients with more functionality than POP3 and mobile
clients.
What components will you need to include in the Exchange Server 2010 deployment to meet the
technical and additional requirements?
Answer: Configure Database Availability Groups, Mailbox Database Copies, and Active
Manager to provide for high availability.
Answer: Configure the messaging transport to provide a high level of security for
exchanging e-mail with partner organizations.
Results: After this exercise, you should have completed the A. Datum Project Requirements documents.
L1-7
2.
Functional requirements
Project constraints
How do you resolve scenarios where addressing all of the requirements will cost significantly more
than the proposed budget?
Answer: This can be very complicated. In the projects early stage, the most important step is to alert
business sponsors that there may be budget issues. This enables them to prepare for a future tradeoff
discussion, or consider increasing the budget. You also may need to provide the business sponsor
with an initial proposal identifying the project components that will cost the most money.
Results: After this exercise, you should have answered the preceding questions.
Working with group members, brainstorm a list of other information that is required to create the
SLA.
2.
Jason Carlson
31st January 2010
Questions
L1-9
Results: After this exercise, you should have completed the High Availability Information document.
On the host computer, click Start, point to Administrative Tools, and then click Hyper-V Manager.
2.
In Hyper-V Manager, click 10233B-NYC-DC1, and in the Actions pane, click Start.
3.
In the Actions pane, click Connect. Wait until the virtual machine starts.
4.
5.
Password: Pa$$w0rd
Domain: Contoso
L1-10
L2-11
Whether there is an existing version of Exchange Server or other messaging system installed.
What the firewall configuration is (in terms of allowed ports) and both the Windows Firewall
settings and any firewalls that separate the corporate network from the Internet.
Whether the current Domain Name System (DNS) configuration is appropriate to support
Exchange Server 2010, and both the internal DNS and external DNS.
Whether there is a certification authority (CA) in place to provide the necessary certificates for
Exchange Server. In the early test phases, using the self-signed certificates is acceptable; however,
thereafter, commercial certificates should be sought in the absence of a suitable internal Public
Key Infrastructure (PKI).
L2-12
Module 2: Designing Microsoft Exchange Server Integration with the Current Infrastructure
Jason Carlson
11th February 2010
Requirement Overview
To determine what changes, if any, are required to the existing network and AD DS infrastructure to
support Exchange Server 2010.
Contoso Exchange Server network infrastructure
Proposals
Question: The internal and external DNS zone names are the same for Contosoi.e. Contoso.com.
What issue does this raise for clients connecting to their mailboxes using Outlook Web App from
their home computers?
Answer: You may need to configure split DNS to ensure host names are resolved the appropriate
internal or external IP address.
Question: What DNS records must you configure in the external Contoso.com DNS zone?
Answer: Host (A or AAAA) resource records, mail exchanger (MX) resource records, and Sender
Policy Framework (SPF) resource records are required.
Question: How do you propose to support the messaging needs of users in Branch Office 2?
Answer: As Exchange Server 2010 does not support deployment in sites that contain an RODC; the
RODC must either be removed and replaced with a full domain controller, or else the users must
use an Exchange Mailbox server in the head office site.
Question: What messaging client will you deploy to Branch Office 2?
Answer: That depends on how the RODC issue is resolved. If the RODC is removed, the users could
use Outlook Web App to ensure that the bandwidth of the connection to the head office is not
excessively consumed. If a full DC is deployed to the Branch Office 2 site, then any suitable client
including Microsoft Office Outlook 2007 or 2010could be deployed.
Question: What server role must you consider deploying in the head office to facilitate inbound
and outbound messaging to and from the Internet?
Answer: An Exchange Edge Transport server should be deployed in the perimeter network.
Question: How many Client Access servers do you envisage needing?
Answer: At least one per site where mailboxes reside; if Branch Office 2 does not host a Mailbox
server, then there is no need to provide a Client Access server there. For high availability, consider
deploying at least two Client Access servers per site.
L2-13
(continued)
Contoso Exchange Server network infrastructure
Question: How many Hub Transport servers are required?
Answer: At least one per site where mailboxes reside. If Branch Office 2 does not host a Mailbox
server, then there is no need to provide a Hub Transport server there. For high availability, consider
deploying at least two Hub Transport servers per site.
Question: Ed Meadows has explained that the administrators at the Branch Office 1 site needs to
be able to perform limited recipient management tasks. To which built-in role group should you
assign these branch administrators?
Answer: They should be assigned to the Help Desk role group.
Note
Results: After this exercise, you should have completed the Contoso Exchange Server network
infrastructure report.
L2-14
Module 2: Designing Microsoft Exchange Server Integration with the Current Infrastructure
2.
On the System page, in the Windows edition section, verify that the domain controller operating
system is compatible with Exchange Server 2010 requirements.
3.
4.
Click Start, point to Administrative Tools, and then click Active Directory Users and Computers.
5.
6.
In the Contoso.com Properties dialog box, verify that the domain and forest functional levels are
compatible with the Exchange Server 2010 requirements.
7.
Click OK, and then close Active Directory Users and Computers.
8.
Click Start, in the Search box, type adsiedit.msc, and then press Enter.
9.
10. In the Connection Settings dialog box, in the Connection Point section, in the Select a well known
Naming Context list, click Configuration, and then click OK.
11. In the left pane, expand Configuration[NYC-DC1.Contoso.com], and then click
CN=Configuration,DC=Contoso,DC=com.
12. Expand CN=Services, and verify that the CN=Microsoft Exchange has not been created.
13. Close ADSI Edit.
On NYC-SVR1, click Start, in the Search box, type cmd, and then press Enter.
2.
At the command prompt, type IPConfig /all, and then press Enter. Verify that the DNS server IP
address for the Local Area Connection is 10.10.10.10.
3.
At the command prompt, type Ping NYC-DC1.contoso.com. Verify that you have network
connectivity with the domain controller.
4.
5.
At the command prompt, type set type=all, and then press Enter.
6.
At the command prompt, type _ ldap._tcp.dc._msdcs.Contoso.com, and then press Enter. Verify that
an SRV record is returned.
7.
L2-15
On NYC-SVR1, click Start, point to Administrative Tools, and then click Server Manager.
2.
In the left pane, click Features. Verify that no Windows Server 2008 features are installed, including
the Active Directory Domain Services (AD DS) management tools.
3.
In the left pane, click Roles. Verify that no Windows Server 2008 roles are installed.
4.
Click Start, and point to Administrative Tools. Verify that Internet Information Services (IIS)
Management is not listed.
5.
Click Start, click All Programs, click Accessories, click Windows PowerShell, and then click
Windows PowerShell.
6.
At the Windows PowerShell prompt, type help about_windows_powershell, and then press Enter.
Verify that about_Windows_PowerShell_2.0 is listed. It is installed with Windows PowerShell 2.0.
7.
8.
9.
10. In the Programs and Features window, click Programs and Features. Verify that Microsoft Filter
Pack 2.0 is installed.
11. Close the Programs and Features window.
Results: After this exercise, you should have evaluated whether your organization meets the AD DS, DNS,
and server requirements for installing Exchange Server 2010. You should have identified the additional
components that need to be installed or configured to meet the requirements.
L2-16
Module 2: Designing Microsoft Exchange Server Integration with the Current Infrastructure
On NYC-SVR1, in Server Manager, click Features, and then click Add Features.
2.
In the Select Features page, expand Remote Server Administration Tools, expand Role
Administration Tools, expand AD DS and AD LDS Tools, expand AD DS Tools, and then select the
AD DS Snap-Ins and Command-Line Tools check box.
3.
Expand .NET Framework 3.5.1 Features, and then select the .NET Framework 3.5.1 check box.
4.
Expand WCF Activation, select the HTTP Activation check box, and then click Add Required Role
Services.
5.
Select the RPC over HTTP Proxy check box, click Add Required Role Services, and then click Next.
6.
7.
On the Select Role Services page, under Security, select the Digest Authentication check box.
8.
9.
Under IIS 6 Management Compatibility, select the IIS 6 Management Console check box.
In the 10233B-NYC-SVR1 on localhost Virtual Machine Connection window, on the File menu, click
Settings.
2.
3.
4.
5.
On NYC-SVR1, close the autoplay dialog box, and open a command prompt.
6.
7.
Results: After this exercise, you should have prepared the AD DS and server configuration for the
Exchange Server 2010 installation.
L2-17
2.
Expand Users, right-click Users, point to New and then click User.
3.
In the New Object User dialog box, in the Full Name box, type Adam Carter.
4.
In the User logon name box, type Adam, and then click Next.
5.
6.
7.
In Active Directory Users and Computers, click Microsoft Exchange Security Groups, and then
double-click Help Desk.
8.
9.
In the Enter the object names to select field, type Adam Carter, and then click OK twice.
2.
Right-click 10233B-NYC-DC1 in the Virtual Machines list, and then click Revert.
3.
4.
5.
In the Virtual Machines pane, click 10233B-VAN-DC1, and then in the Actions pane, click Start.
Note Start the 10233B-VAN-DC1 virtual machine first, and ensure that it is fully started
before starting the other virtual machines.
6.
Wait for 10233B-VAN-DC1 to start, and then start 10233B-VAN-EX1. Connect to the virtual machine.
7.
Wait for 10233B-VAN-EX1 to start, and then start 10233B-VAN-EX2. Connect to the virtual machine.
8.
Wait for 10233B-VAN-EX2 to start, and then start 10233B-VAN-CL1. Connect to the virtual machine.
L2-18
Module 2: Designing Microsoft Exchange Server Integration with the Current Infrastructure
L3-19
Question: In the Server Design Interviews, what points are raised that impact your Mailbox server
deployment plan, and how do they impact it?
Answer:
A single server or component failure cannot be the cause of messaging system unavailability. Multiple
Mailbox servers must be deployed in each site.
The system must be scalable to grow capacity by at least 30 percent over 3 years.
There is a Storage Area Network (SAN) in London, Tokyo, and Toronto. These will be high
performance, but expensive.
San Diego and Chennai do not have a SAN and need to use direct access storage (DAS).
Mailbox sizes are increasing to 500 megabytes (MB) for basic users, and a personal archive of 1 GB.
Exceptional usersabout 25 percent of userswill have a mailbox of 1 GB and a personal archive of
2 GB.
Question: In the Server Design Statistics, what information is relevant to determining a server design, and
why?
Answer: All of the information in this document is relevant to developing a server design. This document
describes the size of mailboxes and the amount of user activity.
L3-20
Task 3: Perform high level planning for Mailbox server storage in London
Jason Carlson
2nd April 2010
Requirement Overview
Create a high level plan for Mailbox server storage in London.
Additional Information
N/A
Question: Assuming that there are 12,000 users in London, how much disk space is required for
mailbox databases?
Answer: There will be 9,000 users with a 500 MB mailbox and a personal archive of 1 GB. There will
be 3,000 users with a 1 GB mailbox and a 2 GB personal archive. The total storage space potentially
required is 22.5 terabytes (TB).
The initial deployment will not require this much space because user mailboxes will not all be at
their limit, but this shows the maximum potential size.
Question: Should the disk space for Mailbox servers be SAN or DAS?
Answer: The SAN has only 10 TB free and cannot support holding even a single copy of all mailbox
data. Expanding the SAN will be very expensive. Therefore, DAS should be used.
Question: If DAS is used, will the disk space use RAID or JBOD?
Answer: Because there are three replicated copies of the data, consider using JBOD. From a
performance perspective, there is no reason to use RAID. If the final design includes more than
three data copies, JBOD should be used.
Question: What size and speed of disk do you think is appropriate?
Answer: To support the large volume of data, slower and less expensive disks such as 7200 RPM
SAS disks should be used. The 7200 RPM SAS disks are close to the same price as SATA drives but
are more reliable. You do not need disks with a higher RPM because Exchange Server 2010 has
lower I/O requirements.
Question: Should transaction logs be stored on a separate LUN from database files?
Answer: When there are multiple replicated copies, you do not need a separate LUN for
transaction logs. Recovery is performed by using an alternate copy of the database rather than by
restoring and then replaying transaction logs. In most cases, circular logging is used and there is no
option to replay transaction logs.
L3-21
Task 4: Use the Exchange 2010 Mailbox Server Role Requirements Calculator
spreadsheet to determine the configuration
1.
2.
Total Number of HA Database Copy Instances (Includes Active Copy) within DAG: 3
Database Configuration
L3-22
Backup Configuration
Storage Options
3.
Server Configuration
Primary Datacenter Mailbox Servers: 12 cores per server, SPECint2006 Rate of 400
Primary Datacenter Mailbox Servers: 12 cores per server, SPECint2006 Rate of 400
Network Configuration:
Jason Carlson
2nd April 2010
Requirement Overview
Determine the hardware configuration for large Mailbox servers that use DAS.
Additional Information
N/A
Proposals
Question: What is the processor configuration for each server?
Answer: 12 server cores with a SPECint2006 Rate value of 400
Question: What type of disks are being used?
Answer: 2000 GB, 7.2K RPM SAS
Question: How many databases are recommended?
Answer: The DAG requires 30 databases.
L3-23
L3-24
(continued)
A. Datum Large Mailbox server design
Question: How many mailboxes are recommended for each database?
Answer: 500 mailboxes are recommended for each database.
Question: What is the recommended RAM for this server?
Answer: 96 GB
Question: What is the expected CPU utilization for this server?
Answer: 33 percent
Question: What is the recommended number of LUNs on the server?
Answer: Total recommended LUNs for Exchange are 31:
30 LUNs for databases and logs
1 LUN for restores
Question: How many databases are recommended per LUN?
Answer: 1
Question: What is the total disk space required per server?
Answer: The total disk space required is approximately 53 TB (53118 GB):
51553 GB for database and log LUNs
1565 GB for a restore LUN
Question: What type of RAID is recommended?
Answer: JBOD is recommended for the primary datacenter because there are three database
copies. RAID 1/0 (also known as RAID 10) is recommended for the secondary datacenter LUNs that
hold database copies and logs. RAID 5 is recommended for the secondary datacenter restore LUN.
Question: How many database disks are recommended for the primary datacenter servers?
Answer: 31
Question: How many database disks are recommended for the secondary datacenter server?
Answer: 59
Note
L3-25
Question: In the Recipient Management Interviews, what points are raised that impact your Mailbox
server deployment plan, and how do they impact it?
Answer: This entire document is relevant to the planning of recipient management. However, the specific
points raised are:
When sending mail, users must use the email address associated with their business unit, but when
receiving email, all domains must be allowed.
Information Technology (IT) Client Services staff in each location must be able to manage recipients
in that location only. Team leaders must be able to manage recipients throughout the entire
organization.
Automated booking of meeting rooms is desired, with exceptions approved by a designated person.
Jason Carlson
2nd April 2010
Requirement Overview
Determine the configuration required to meet recipient management needs.
Proposals
Question: How will you ensure that recipients are assigned the correct email addresses?
Answer: Two email address policies need to be created:
The first e-mail address policy will have a condition that matches only A. Datum recipients.
The condition could be based on recipients in specific organizational units (OUs) or
recipients with the Company defined in Active Directory Domain Services.
The second e-mail address policy will have a condition that matches only Trey Research
recipients.
Each policy will be configured with both domains. The e-mail address policy for A. Datum
Corporation will use adatum.com as the Reply To address. The e-mail address policy for Trey
Research will use TreyResearch.net as the Reply To address.
L3-26
(continued)
A. Datum recipient management configuration
Question: How will you enable the IT Client Services staff to perform recipient management?
Answer: Team leaders can be made members of the Recipient Management role group. This group
has management permissions for the recipients in the entire Exchange Server organization.
New Recipient Management role groups should be created for each physical location. These role
groups will be scoped to limit management permissions to manage recipients only within a specific
OU that represents each physical location.
Question: How will you meet the needs for meeting room bookings?
Answer: Each meeting room will be created as a resource mailbox. You can then determine the inpolicy and out-of-policy settings for each meeting room. A delegate for each meeting room will be
configured to arbitrate conflicts, and approve or deny out-of-policy requests.
Question: How will you address the needs for distribution group management?
Answer: Exchange Server 2010 supports delegation of distribution group membership
management. The person that is configured as group manager is able to modify the distribution list
membership by using the Exchange Control Panel.
Question: How will you address the need for separating the address books for A. Datum and Trey
Research?
Answer: Create separate address lists for each organization and then distribute the appropriate
address lists by using address book policies. The appropriate address book policy must be
associated with each user. To simplify this you must have an identifying attribute that can be
queried when performing the assignment. You should also have an identifying attribute that can be
queried when specifying GAL members.
Note
L3-27
Question: In the Public Folder Interviews, what points are raised that impact your public folder
deployment plan, and how do they impact it?
Answer: This entire document is relevant to the planning of recipient management. However, the specific
points raised are:
The Executives want a new public folder for private communication that is available quickly from any
location, and is not impacted by a server failure.
Requests for new public folders are being encouraged to evaluate Microsoft SharePoint as an
alternative.
Question: In the Server Design Interview, what points are raised that impact your public folder
deployment plan, and how do they impact it?
Answer: Many clients still use Microsoft Office Outlook 2003. Office Outlook 2003 clients require public
folders to access free/busy information, and to download offline address books.
L3-28
Jason Carlson
2nd April 2010
Requirement Overview
Determine the configuration required to meet public folder needs.
Proposals
Question: How will you address the executives desire for public folders?
Answer: Since Erik has made it clear that he does not want to use SharePoint, a public folder
should be created. This public folder should be replicated to all locations in the organization for fast
access regardless of location. The replication also helps ensure high availability.
Question: How will you address the IT Client Services request for a public folder?
Answer: IT Client Services should be encouraged to use SharePoint instead of public folders. This
will provide them with many more options for collaboration.
Question: Other than the public folder for executives, which other public folders are required?
Answer: To support Office Outlook 2003 clients, the system public folders for free/busy searches
and offline address books must be available in all locations. This requires that you create at least
one public folder database in each physical location. Public folder databases will not exist in each
physical location by default.
Note
L3-29
On VAN-EX1, click Start, point to Administrative Tools, and click Active Directory Users and
Computers.
2.
In Active Directory Users and Computers, right-click Adatum.com, point to New, and click
Organizational Unit.
3.
In the New Object Organizational Unit window, in the Name box, type Trey, and click OK.
4.
In the left pane, click Marketing then click and drag Wei Yu to the Trey organizational unit.
5.
6.
7.
Click Start, point to All Programs, click Microsoft Exchange Server 2010, and then click Exchange
Management Console.
8.
9.
10. In the New Address List wizard, on the Introduction page, enter the following settings and click
Next.
Container: \
11. On the Filter Settings page, click Browse, click Trey, and click OK.
12. Click The following specific types, select the Users with Exchange mailboxes check box, and click
Next.
13. On the Conditions page, click Next.
14. On the Schedule page, click Next to apply all changes immediately.
15. On the New Address List page, click New.
16. On the Completion page, click Finish.
17. In the Actions pane, click New Address List.
18. In the New Address List wizard, on the Introduction page, enter the following settings and click
Next.
Container: \
19. On the Filter Settings page, click Browse, click Trey, and click OK.
20. Click The following specific types, select the Resource mailboxes check box, and click Next.
21. On the Conditions page, click Next.
L3-30
22. On the Schedule page, click Next to apply all changes immediately.
23. On the New Address List page, click New.
24. On the Completion page, click Finish.
25. Click Start, point to All Programs, click Microsoft Exchange Server 2010, and then click Exchange
Management Shell.
26. In the Exchange Management Shell, type the following command, and then press ENTER.
New-GlobalAddressList TreyGAL RecipientContainer ou=Trey,dc=adatum,dc=com
27. In the Exchange Management Shell, type the following command, and then press ENTER.
New-OfflineAddressBook TreyOAB AddressLists TreyGAL
28. In the Exchange Management Console, click New Address Book Policy.
29. In the New Address Book Policy wizard, in the Name box, type TreyABP.
30. Beside the Global address list box, click Browse, click TreyGAL, and click OK.
31. Beside the Offline address list box, click Browse, click TreyOAB, and click OK.
32. Beside the Room list box, click Browse, click Trey Rooms, and click OK.
33. Under Address lists, click Add, click Trey Users, and click OK.
34. Click New.
35. On the Completion page, click Finish.
36. Close the Exchange Management Console.
37. In the Exchange Management Shell, type the following command, and then press ENTER.
Get-Mailbox OrganizationalUnit Trey | Set-Mailbox AddressBookPolicy TreyABP
L3-31
On VAN-EX1, open the Exchange Management Console, browse to Recipient Configuration, and
then click Mailbox.
2.
3.
In the New Mailbox window, click Room Mailbox, and then click Next.
4.
On the User Type page, click New user, and then click Next.
5.
On the User Information page, enter the following information, and then click Next.
6.
On the Mailbox settings page, in the Alias box, type Room100, and then click Next.
7.
8.
9.
10. In the Room 100 Properties window, click the Resource General tab, and then select the Enable the
Resource Booking Attendant check box.
11. Click the Resource Policy tab. Under Specify delegates of this mailbox, click Add, click Andreas
Herbinger, and then click OK.
12. Click the Resource Out-of-Policy Requests tab, click Add, click Luca Dellamore, and then click OK.
13. In the Room 100 Properties window, click OK.
2.
Click Start, point to All Programs, click Microsoft Office, and then click Microsoft Outlook 2010.
3.
4.
In the Untitled Meeting window, enter the following, and then click the Check Names button.
5.
6.
Click Send.
Notice that an automatic response is received indicating that the booking was accepted by Room
100, because the request is in-policy. The response may take a minute or so to appear.
7.
L3-32
8.
9.
In the Untitled Meeting window, enter the following, and then click the Check Names button.
On VAN-EX1, in the Exchange Management Console, in the console tree, expand Recipient
Configuration, and then click Distribution Group.
2.
3.
4.
Under Managed by, click Add, click Conor Cunningham, and then click OK.
5.
Click the Membership Approval tab, and verify that group membership is closed.
6.
7.
8.
Select the Messages sent to this group have to be approved by a moderator check box.
9.
In the Message Moderation window, under Specify group moderators, click Add, click Luca
Dellamore, and then click OK.
10. Under Specify senders who dont require message approval, click Add, click Executives, and then
click OK.
11. In the Message Moderation window, click OK.
12. In the Executives Properties window, click OK.
L3-33
2.
In the Untitled Message window, enter the following information and then click Send.
To: Executives
Body: The Executives public folder has been created for you.
3.
In the left pane, click Sent Items, right-click New Public Folder, and then click Open Delivery
Report.
4.
5.
In the Delivery Report window, notice that the message has been sent to the moderator, and then
click Close.
6.
In Office Outlook, in the Inbox, click the Approval requested: New Public Folder message, and read
the contents.
7.
Click the New Public Folder message, and then click Approve.
8.
In Outlook Web App, right-click New Public Folder, and then click Open Delivery Report.
9.
10. In the Delivery Report window, notice that the message has been delivered to both group members,
and then click Close.
2.
Right-click 10233B-VAN-DC1 in the Virtual Machines list, and then click Revert.
3.
4.
Repeat these steps for 10233B-VAN-EX1, 10233B-VAN-EX2, and 10233B-VAN-CL1. Close the virtual
machine connection windows
5.
In the Virtual Machines pane, click 10233B-VAN-DC1, and then in the Actions pane, click Start.
6.
To connect to the virtual machine for the next modules lab, click 10233B-VAN-DC1, and then in the
Actions pane, click Connect.
Important Start the 10233B-VAN-DC1 virtual machine first, and ensure that it is fully
started before starting the other virtual machines.
7.
Wait for 10233B-VAN-DC1 to start, and then start 10233B-VAN-EX1. Connect to the virtual machine.
8.
Wait for 10233B-VAN-EX1 to start, and then start 10233B-VAN-EX2. Connect to the virtual machine.
L3-34
L4-35
Adatum_CurrentPerimeterDesign.vsd
Adatum_CurrentADSiteDesign.vsd
A single server or component failure cannot be the cause of messaging system unavailability.
Multiple Client Access servers must be deployed in each site that has a deployed Mailbox server.
Microsoft Office Outlook 2003 is still in use throughout the organization. Public folders are
required to support free/busy schedule information and offline address book distribution.
Question: In the Requirements Interview Notes document, what points are raised that
impact your Client Access server deployment plan, and why?
Answer:
The sales team requires anywhere access to their email, most likely by using their cell phones.
Microsoft Exchange ActiveSync addresses this need.
Various examples cite unavailable messaging and subsequent business losses because of this
unavailability. High availability is important.
The requirements allow unencrypted traffic into the perimeter network from the Internet, but not
into the corporate network. The inner firewalls block unencrypted network traffic. When planning
Client Access protocols, consider using Secure Sockets Layer (SSL) to secure traffic.
Question: In the AD DS and Routing Interview Notes document, what points are raised
that impact your Client Access server deployment plan, and why?
Answer:
There is currently widespread use of Outlook Web App in Exchange Server 2003, so ensure that
Outlook Web App makes a positive impact on users.
L4-36
Module 4: Planning and Deploying Client Access Services in Microsoft Exchange Server 2010
Simple Mail Transfer Protocol (SMTP) traffic for the Adatum.com organization currently passes to
and from the Internet through the London site.
Hypertext Transfer Protocol/Secure (HTTPS) traffic is allowed through most firewalls. Configure
Client Access servers to use SSL for services.
Only the firewall in the San Diego site allows Post Office Protocol version 3 (POP3) inbound
network traffic.
Only the London and San Diego sites allow for inbound and outbound SMTP traffic.
Task 3: Update the A. Datum Client Access server deployment plan document
Jason Carlson
4th April 2010
Requirement Overview
Determine the number and placement of Client Access servers within the existing network
infrastructure.
Additional Information
Identify infrastructure changes that may be required due to the proposed deployment.
Proposals
Question: With reference to the Adatum_CurrentADSiteDesign diagram, how many Client Access
servers do you propose to deploy in each site?
Answer: Deploy at least two in each site to address the high availability concerns raised in the
documentation.
Question: Do you have sufficient information from the documents reviewed so far, to determine
whether some sites require additional Client Access servers?
Answer: No. You also need information about the number of users connecting to the Client Access
servers. This information is provided in a supplemental document that you will review in the next
exercise.
Question: Based on the documentation you have reviewed, what client types must you support?
Answer: Messaging Application Programming Interface (MAPI), Microsoft Exchange ActiveSync,
POP3/SMTP, and Outlook Web App. Outlook Anywhere is not mentioned in this documentation.
Lab: Planning and Deploying Client Access Services in Exchange Server 2010
L4-37
(continued)
A Datum Client Access Server Deployment Plan
Question: Is it clear from the documentation that you have reviewed which sites support which
client types?
Answer: No. Additional information is supplied in the A. Datum User Distribution Summary
document that you will review in the next exercise.
Question: While maintaining compliance with the requirements mentioned in the documentation,
can you propose changes to the client types that will simplify the configuration?
Answer: Answers will vary, but might include:
Upgrading the Office Outlook 2003 clients to Outlook 2010 would mean that Public folders
are no longer required. Additionally, this would mean that free/busy information would be
provided to users more quickly.
Replacing POP3 clients with another client type would simply firewall configuration. By
using either Outlook Anywhere or Outlook Web App, only HTTPS traffic (already permitted)
would be configured through the firewalls.
Question: Which Client Access servers do you propose to make Internet-facing?
Answer: Answers will vary. There are two choices:
Deploy Internet-facing Client Access servers in one site, and rely on redirection and/or
proxying (depending on the client type) to enable clients to connect to the appropriate
Client Access server in other sites. With this approach, you only need to configure one
namespace, which simplifies certificate deployment. However, not all client types support
redirection and proxying. For example, POP3 clients do not support redirection and
proxying.
Deploy Internet-facing Client Access servers in each site, and provide users with the
necessary URLs for the servers in the site that hosts their mailboxes. This means you must
obtain a certificate for each Client Access server, or else use a certificate that supports
multiple host names.
Question: How will you configure Autodiscover to support your Client Access server model?
Answer: Register a server connection point for each Client Access server on the Active Directory
site. This server connection point is the fully qualified domain name (FQDN) of the server that hosts
the role and is used by domain-joined computers to locate the Autodiscover service. Domaindisjoined computers use Domain Name System (DNS) to locate the Autodiscover service. Consider
modifying both these values (the server connector point and the DNS records) to match.
Note
Results: After this exercise, you should have completed the A. Datum Client Access server deployment
plan document.
L4-38
Module 4: Planning and Deploying Client Access Services in Microsoft Exchange Server 2010
Policy Requirements.doc
All users who access email on the Exchange server must be required to have an alphanumeric
password that is at least six characters long.
Users who want to download attachments to the device must have encryption enabled on the
device, and the device must be configured to lock after five failed logon attempts.
All executives and managers must be able to download attachments to their mobile devices.
Other users do not require this functionality.
The Exchange administrators do not want to be involved every time a user gets a new mobile
device, but they also do not want users to have many mobile devices associated with their
mailboxes.
Question: In the A. Datum User Distribution Summary document, what points are raised
that impact your Client Access server deployment plan, and why?
Answer:
The number of internal users at each location will affect the number of required Client Access
servers.
There are a mix of remote client types at many locations, including Outlook Web App users,
Outlook Anywhere users, Office Outlook (over a virtual private network (VPN)) users, POP3 users,
and Exchange ActiveSync users.
Placement of Internet-facing Client Access servers in various sites raises the issue of the
namespace that you will use.
Using multiple Internet-facing Client Access servers means that you must carefully plan the
external URLs used on certificates. Certificates must support multiple computer names.
Lab: Planning and Deploying Client Access Services in Exchange Server 2010
L4-39
Jason Carlson
4th April 2010
Requirement Overview
Determine the feature configuration for Client Access servers in the A Datum Exchange Server 2010
upgrade.
Proposals
Question: Based on the information in the A. Datum User Distribution Summary document, do you
envisage deploying additional Client Access servers in any sites?
Answer: Answers will vary. However, London, Toronto, and Tokyo have large numbers of users.
Two Client Access servers are probably insufficient to support timely connections to user mailboxes
and features.
Question: Which features must you enable on the Client Access servers to support the current
client-types?
Answer: Enable MAPI, Exchange ActiveSync, POP3/SMTP, Outlook Web App, and Outlook
Anywhere.
Question: Which client protocols must you enable through the firewalls?
Answer: Enable HTTPS, POP3, and SMTP.
Question: What would you do to address the security concerns raised regarding mobile clients?
Answer: Configure the following settings in Exchange ActiveSync:
At the organizational level, configure two Exchange ActiveSync Mailbox policies, one for Managers
and Executives, and one for everyone else. Configure both with the following security settings:
Require passwords
Require minimum password length of 6
Require encryption on storage card
Require encryption on device
Disallow simple password
Restrict number of failed attempts to 5
To support attachment downloads for executives and managers only, in Sync Settings, configure
the Allow attachments to be downloaded to device only for the Managers and Executives
policy.
Use Exchange Management Shell to assign the appropriate Exchange ActiveSync Mailbox policy to
the appropriate users.
L4-40
Module 4: Planning and Deploying Client Access Services in Microsoft Exchange Server 2010
(continued)
A. Datum Client Access Server Configuration
Question: To support the other client types, what other configuration changes must you make?
Answer: You must:
Configure the external URLs for services that you want to make available across the
Internet. For example, to support Exchange ActiveSync, configure the external URL value on
servers providing this feature.
Start the POP3 service on Client Access servers that provide this service.
Configure a SMTP connector to support remote client relaying. Typically, you do this on the
Hub Transport server role, and then publish using a reverse proxy such as a Microsoft
Internet Security and Acceleration (ISA) Server.
Configure the required authentication settings on all services. For example, Outlook Web
App uses forms-based authentication by default.
Obtain and install the required certificates to enable SSL.
Question: While maintaining compliance with the requirements mentioned in the documentation,
can you propose changes to the client types that will simplify the configuration?
Answer: Aside from those mentioned already, you should migrate Office Outlook users that
implement a connection over a VPN to Outlook Anywhere. This avoids the need for VPNs.
Note
Results: After this exercise, you should have completed the A. Datum Client Access server configuration
document.
Lab: Planning and Deploying Client Access Services in Exchange Server 2010
L4-41
On VAN-EX2, click Start, point to All Programs, point to Microsoft Exchange Server 2010, and
then click Exchange Management Console.
2.
In the Exchange Management Console, expand Microsoft Exchange On-Premises, expand Server
Configuration, and then click Client Access.
3.
In the result pane, click VAN-EX2, and then in the work pane, click the Exchange ActiveSync tab.
4.
5.
6.
Click the Authentication tab. Notice that Basic authentication is enabled. This is acceptable, because
SSL will be used to secure the credentials in transit.
7.
Click OK.
2.
3.
4.
Select the Allow non-provisionable devices check box. Confirm that the Allow attachments to be
downloaded to device option is selected.
5.
6.
Select the Enable password recovery check box. This will enable users to recover their Windows
Mobile password through the Exchange Control Panel.
7.
8.
9.
Select the Minimum password length check box, and then in the Minimum password length box,
type 6.
L4-42
Module 4: Planning and Deploying Client Access Services in Microsoft Exchange Server 2010
Task 3: Configure Exchange ActiveSync settings from the Exchange Control Panel
(ECP)
1.
Click Start, point to All Programs, and then click Internet Explorer.
2.
3.
On the Outlook Web App webpage, in the Domain\user name box, type adatum\administrator.
4.
In the Password box, type Pa$$w0rd and then click Sign in.
5.
In the Exchange Control Panel, in the navigation pane on the left, click Phone & Voice.
6.
7.
In the results pane, click Executive Policy and then click Details.
8.
In the Executive Policy dialog box, expand Device Security. Review the settings.
9.
10. Expand Device Settings. Notice that text messaging is allowed. Click Cancel.
11. In the center pane, click ActiveSync Access.
12. Under Device Access Rules, click New.
13. In the New Device Access Rule dialog box, under Device family, click Browse.
14. Select All families and click OK.
15. Under When devices of the selected family or model try to connect, click Quarantine Let me
decide to block or allow later, and then click Save.
16. In the Error dialog box, click Close. There are currently no devices in use in the Adatum organization.
Click Cancel.
17. Close Internet Explorer.
Results: After this exercise, you should have deployed and configured Exchange ActiveSync for members
of the Executives group.
Lab: Planning and Deploying Client Access Services in Exchange Server 2010
L4-43
2.
Right-click 10233B-VAN-DC1 in the Virtual Machines list, and then click Revert.
3.
4.
Repeat these steps for 10233B-VAN-EX1, and 10233B-VAN-EX2. Close the virtual machine connection
windows.
5.
In the Virtual Machines pane, click 10233B-VAN-DC1, and then in the Actions pane, click Start.
6.
To connect to the virtual machine for the next modules lab, click 10233B-VAN-DC1, and then in the
Actions pane, click Connect.
Important Start the 10233B-VAN-DC1 virtual machine first, and ensure that it is fully
started before starting the other virtual machines.
7.
Wait for 10233B-VAN-DC1 to start, and then start 10223A-VAN-EX1. Connect to the virtual
machine.
8.
Wait for 10233B-VAN-EX1 to start, and then start 10223A-VAN-EX2. Connect to the virtual machine.
9.
Wait for 10233B-VAN-EX2 to start, and then start 10223A-VAN-EDG. Connect to the virtual
machine.
L4-44
Module 4: Planning and Deploying Client Access Services in Microsoft Exchange Server 2010
L5-45
Adatum_CurrentADSiteDesign.vsd
Adatum_Info.vsd
Task 2: Modify the A. Datum current AD DS site design diagram with proposed
changes to the site design
1.
Use callouts in the following diagram to document proposed changes to the site design. For each
proposed change, provide:
2.
3.
Document message flow within the organization. Document the changes that you will need to make
to the AD DS configuration to enable optimal message flow.
Note
L5-46
Module 5: Planning and Deploying Message Transport in Microsoft Exchange Server 2010
Adatum_ProposedADSiteDesign.vsd
Results: After this exercise, you should have successfully modified the A. Datum AD DS site design.
L5-47
Adatum_CurrentPerimeterDesign.vsd
Adatum_Info.vsd
Task 2: Modify the A. Datum current perimeter design diagram with proposed
changes to the site design
1.
Use callouts in the following diagram to document proposed changes to the perimeter design. For
each proposed change, provide:
2.
Indicate whether you need to deploy any additional server roles in each AD DS site.
3.
4.
Indicate any other infrastructure changes that you must implement to meet your design
requirements.
5.
For each company location, document how messages are delivered to the Internet, and how inbound
messages are delivered to internal recipients.
Note
L5-48
Module 5: Planning and Deploying Message Transport in Microsoft Exchange Server 2010
Adatum_ProposedPerimeterDesign.vsd
Results: After this exercise, you should have successfully designed the A. Datum messaging perimeter.
L5-49
The current site link setting will create very inefficient message routing. By default, the
DefaultIPSiteLink site link has a cost of 100, which means that all messages will be routed directly
to the site with the closest proximity. To use the network connections with the highest bandwidth
and ensure that messages are queued outside the main offices if a destination server is
unavailable, you must make the following changes:
The LondonSite to SanDiegoSite connection must have a higher cost than the LondonSiteVancouverSite-SanDiegoSite connection.
The LondonSite to ChennaiSite connection must have a higher cost than the LondonSiteTokyoSite-ChennaiSite connection.
The VancouverSite to TokyoSite connection must have a higher cost than the VancouverSiteLondonSite-TokyoSite connection.
You must create new site links to implement these changes. At a minimum, you will need new
three new site links:
LondonSite to SanDiegoSite
LondonSite to ChennaiSite
VancouverSite to TokyoSite
The cost for the new site links must be 201 or higher, or the routes Exchange cost must be
assigned at 201 or higher.
You should merge LondonSite and LondonSite2 to address the issues of messages remaining in
the categorizer queue, and with the global address list (GAL) lookups for clients. This enables the
LondonSite clients to access the global catalog server in the LondonSite2 location, and does not
require deployment of an additional domain controller.
You must deploy at least one Mailbox server role, one Hub Transport server role, and one Client
Access server role in each site.
Recommendation: Retain the domain controller in Chennai, and build the secure server room. If
this is not done, the users in Chennai will have a very poor experience, as the logon process and
access to any email services will be very slow. As an alternative, you could propose upgrading the
network connection between Chennai and London, or between Chennai and Tokyo.
Question: If your recommended changes are implemented, how will messages flow between
the AD DS sites? Where will messages be queued in the event of a server or network
connection failure?
Answer: Message routing will flow as follows:
L5-50
Module 5: Planning and Deploying Message Transport in Microsoft Exchange Server 2010
Move the mailboxes for Outlook Web App users from Chennai to London or Tokyo.
Significantly increase the bandwidth between Tokyo and Chennai, or between London and
Chennai.
Question: What additional information should you consider when designing message
routing in this scenario?
Answer: In a real-world scenario, an important additional piece of information that you need
is how many messages are sent between company locations. This may affect the design, and
in particular, this information may help to resolve some of the conflicting requirements.
Results: After this exercise, you should have successfully improved on the A. Datum AD DS and message
routing design.
L5-51
On VAN-EX1, click Start, point to All Programs, click Microsoft Exchange Server 2010, and then
click Exchange Management Console.
2.
3.
In Exchange Management Console, click Toolbox, and then double-click Routing Log Viewer.
2.
In Routing Log Viewer, click the File menu, and then click Open log file.
3.
In the Open Routing Table Log File dialog box, click Browse server files.
4.
In the Open dialog box, double-click the most recently created file in the list.
5.
In Routing Log Viewer, on the Active Directory Sites & Routing Groups tab, expand Active
Directory sites.
6.
Expand Default-First-Site-Name.
Question: Is Default-First-Site-Name a hub site?
Answer: No
7.
Expand Servers.
8.
9.
L5-52
Module 5: Planning and Deploying Message Transport in Microsoft Exchange Server 2010
In Exchange Management Console, and in the navigation pane, click Organization Configuration.
2.
In Organization Configuration, click Hub Transport, and in the results pane, click the Accepted
Domains tab.
3.
4.
In the New Accepted Domain Wizard, in the Name box, type Contoso.
5.
6.
7.
2.
In the New Send Connector Wizard, in the Name box, type Contoso Connector.
3.
In the Select the intended use for this Send Connector list, click Partner, and then click Next.
4.
5.
In the SMTP Address Space dialog box, in the Address box, type Contoso.com.
6.
Select the Include all subdomains check box, in the Cost box, type 10, and then click OK.
7.
8.
9.
Task 5: Update the default site configuration with Exchange Server-specific values
1.
Click Start, point to All Programs, click Microsoft Exchange Server 2010, and then click Exchange
Management Shell.
2.
At the Shell, type the following command, and then press Enter:
set-AdSite id Default-First-Site-Name HubSiteEnabled $true
3.
At the Shell, type the following command, and then press Enter:
set-AdSiteLink id DEFAULTIPSITELINK ExchangeCost 25
4.
Switch to VAN-EDG.
2.
Click Start, point to All Programs, click Microsoft Exchange Server 2010, and then click Exchange
Management Shell.
3.
L5-53
At the Exchange Management Shell, type the following command, and then press Enter:
new-edgesubscription filename C:\EdgeSubscriptionExport.xml
4.
5.
At the Exchange Management Shell, type the following command, and then press Enter:
copy c:\EdgeSubscriptionExport.xml \\VAN-EX1\c$
6.
7.
In the Exchange Management Console, in the Actions pane, click New Edge Subscription.
8.
In the New Edge Subscription Wizard, on the New Edge Subscription page, adjacent to the Active
Directory site box, click Browse.
9.
10. On the New Edge Subscription page, adjacent to the Subscription file box, click Browse.
11. In the File name box, type C:\EdgeSubscriptionExport.xml, and then click Open.
12. On the New Edge Subscription page, click New.
13. When prompted, click Finish.
Note
In Exchange Management Console, click Toolbox, and then double-click Routing Log Viewer.
2.
In Routing Log Viewer, click the File menu, and then click Open log file.
3.
In the Open Routing Table Log File dialog box, click Browse server files.
4.
In the Open dialog box, double-click the most recent file in the list.
5.
In Routing Log Viewer, on the Active Directory Sites & Routing Groups tab, expand Active
Directory sites.
6.
Expand Default-First-Site-Name.
Question: Is Default-First-Site-Name a hub site?
Answer: Yes.
7.
8.
9.
Contoso Connector
L5-54
Module 5: Planning and Deploying Message Transport in Microsoft Exchange Server 2010
2.
Right-click 10233B-VAN-DC1 in the Virtual Machines list, and then click Revert.
3.
4.
Repeat these steps for 10233B-VAN-EX1, 10233B-VAN-EX2, and 10233B-VAN-EDG. Close the virtual
machine connection windows.
5.
In the Virtual Machines pane, click 10233B-VAN-DC1, and then in the Actions pane, click Start.
6.
To connect to the virtual machine for the next modules lab, click 10233B-VAN-DC1, and then in the
Actions pane, click Connect.
Note Start the 10233B-VAN-DC1 virtual machine first, and ensure that it is fully started
before starting the other virtual machines.
7.
Wait for 10233B-VAN-DC1 to start, and then start 10233B-VAN-EX1. Connect to the virtual
machine.
8.
Wait for 10233B-VAN-EX1 to start, and then start 10233B-VAN-CL1. Connect to the virtual machine.
L6-55
Review the contents of the Message Security Requirements section in the Security Requirements.doc.
Task 2: Modify the A. Datum Proposed Security Policies document with a proposed
message security plan
Complete the relevant section of the following document. In the document, provide:
Jason Carlson
12th March 2010
Configuration details
Block all messages with a Company Internal classification from being sent
to the Internet.
Send a response to users indicating they are not allowed to send messages
with this classification to the Internet.
Classification
L6-56
(continued)
A. Datum Proposed Security Policies
Message Security Components
Component type
Configuration details
Configure a Receive connector that will accept connections only from the
Brussels law firms SMTP servers IP address.
Configure a Send connector that will use the law firms SMTP server as a
smart host.
Configure an address space on the SMTP Send connector that matches the
domain name of the law firm.
Configure the security on the Send and Receive connector as externally
secured.
S/MIME
configuration for
Office Outlook
Additional notes
Note
Question: How did you address the need to exchange secure email between A. Datum
Corporation and Contoso, Ltd.?
Answer: The design calls for the Domain Security solution to ensure that all email messages
are encrypted and connections are authenticated.
Question: Does your organization have a requirement for the Domain Security solution?
What barriers will there be to adopting this solution?
Answer: The Domain Security solution requires that you negotiate with the partner
organization to ensure that their Exchange Servers also are configured to support Domain
Security. This may be an issue in some organizations.
Results: After this exercise, you should have successfully designed message security for A Datum.
L6-57
L6-58
Review the contents of the Virus and Spam Filtering Requirements in the Security Requirements.doc.
Task 2: Modify the A. Datum Proposed Security Policies document with a proposed
antivirus and anti-spam solution
Complete both the Anti-Spam and Antivirus Solution Components section of the following
document. In the document, provide:
Jason Carlson
12th March 2010
Configuration details
Anti-spam software
Must be installed on each Edge Transport server that will accept incoming
email from the Internet.
Configure the IP Allow List setting on the Edge Transport server to use the
IP Allow List provider.
Configure the IP Block List setting on the Edge Transport server to use the
IP Block List providers.
SMTP connectors
The messages from Contoso, Ltd will not be scanned for spam, because the
messages are Domain Secured. The messages from the law firm will not be
scanned for spam, because the messages will be treated as authenticated.
In order to implement content filtering, but still ensure that not too many
false positives are filtered, configure a content filtering Quarantine mailbox,
and then regularly monitor the Quarantine mailbox for false positives.
Modify the content filter as required to reduce false positives.
Sender ID filtering
Safelist aggregation
Add the SMTP addresses for all distribution lists with more than 200
members to the blocked recipients list on the Edge Transport servers.
Note: You can also configure the distribution list properties to accept
messages from only authenticated users.
L6-59
(continued)
A. Datum Proposed Security Policies
Antivirus Solution Components
Component type
Configuration details
Antivirus software
Must be installed on each Edge Transport server that will accept incoming
email from the Internet, and on each Hub Transport server in the
organization.
Antivirus software
Antivirus stamping
Antivirus update
Additional notes
Note
Question: How did you design the antivirus and anti-spam solution for A. Datum
Corporation? How does this compare to the solution you would implement for your
organization?
Answer: Organizations will have varying requirements for designing the antivirus and antispam solutions.
Results: After this exercise, you should have successfully designed an antivirus and anti-spam strategy for
A Datum.
L6-60
On VAN-DC1, click Start, in the Search box, type mmc, and then press Enter.
2.
3.
In the Add or Remove Snap-ins dialog box, in the Available snap-ins list, double-click Certificate
Templates, and then click OK.
4.
5.
In the details pane, right-click the User template, and then click Duplicate Template.
6.
In the Duplicate Template dialog box, click Windows Server 2003 Enterprise, and then click OK.
7.
In Properties of New Template dialog box, on the General tab, in the Template display name box,
type S/MIME Certificate.
8.
9.
In the Group or user names list, click Domain Users (ADATUM\Domain Users).
10. In Permissions for Domain Users, under Allow, select the Enroll and Autoenroll check boxes, and
then click OK.
11. Close Console1, and do not save changes.
Click Start, point to Administrative Tools, and then click Certification Authority.
2.
In certsrv [Certification Authority (Local)], expand AdatumCA, and then click Certificate
Templates.
3.
Right-click Certificate Templates, point to New, and then click Certificate Template to Issue.
4.
In the Enable Certificate Templates dialog box, in the Name list, double-click S/MIME Certificate.
5.
Click Start, point to Administrative Tools, and then click Group Policy Management.
2.
If necessary, expand Forest: Adatum.com, expand Domains, expand Adatum.com, and then click
Default Domain Policy. Click OK to close the Group Policy Management Console prompt.
3.
4.
In Group Policy Management Editor, expand User Configuration, expand Policies, expand Windows
Settings, expand Security Settings, and then click Public Key Policies.
5.
6.
In the Certificate Services Client Auto-Enrollment Properties dialog box, in the Configuration
Model list, click Enabled.
L6-61
7.
In the Certificate Services Client Auto-Enrollment Properties dialog box, select both the Renew
expired certificates, update pending certificates, and remove revoked certificates and the
Update certificates that use certificate templates check boxes, and then click OK.
8.
Close Group Policy Management Editor, and then close Group Policy Management.
Switch to VAN-CL1.
2.
Click Start, in the Search box, type cmd, and then press Enter.
3.
At the command prompt, type gpupdate /force, and then press Enter.
4.
5.
Password: Pa$$w0rd
Domain: Adatum
2.
Click Start, in the Search box, type mmc, and then press Enter.
3.
4.
In the Add or Remove Snap-ins dialog box, in the Available snap-ins list, double-click Certificates,
and then click OK.
5.
In the console tree, expand Certificate Current User, expand Personal, and then click Certificates.
6.
Verify the presence of a certificate based on the Secure/Multipurpose Internet Mail Extensions
(S/MIME) Certificate template, and then close Console1. Do not save settings.
Click Start, point to All Programs, click Microsoft Office, and then click Microsoft Outlook 2010.
2.
3.
On the Email Accounts page, click Yes, and then click Next.
4.
5.
6.
7.
In the Welcome to the Microsoft Office 2010 wizard, click Dont make changes and then click OK.
8.
9.
Log off.
L6-62
Password: Pa$$w0rd
Domain: Adatum
2.
Click Start, in the Search box, type mmc, and then press Enter.
3.
4.
In the Add or Remove Snap-ins dialog box, in the Available snap-ins list, double-click Certificates,
and then click OK.
5.
In the console tree, expand Certificate Current User, expand Personal, and then click Certificates.
6.
Verify the presence of a certificate based on the S/MIME Certificate template, and then close
Console1. Do not save settings.
Click Start, point to All Programs, click Microsoft Office, and then click Microsoft Outlook 2010.
2.
3.
On the E-mail Accounts page, click Yes, and then click Next.
4.
5.
6.
7.
In the Welcome to the Microsoft Office 2010 wizard, click Dont make changes and then click OK.
2.
In the Untitled Message (HTML) dialog box, in the To box, type Scott, and then press the CTRL+K
keys.
3.
4.
5.
6.
7.
In the Security Properties dialog box, select the following check boxes, and then click OK:
8.
In the Properties dialog box, click Close, and then click Send.
9.
L6-63
Password: Pa$$w0rd
Domain: Adatum
2.
Click Start, point to All Programs, click Microsoft Office, and then click Microsoft Outlook 2010.
3.
4.
In the message, click the padlock symbol. Read the information, and then click Close.
5.
In the message, click the symbol next to the padlock symbol. Read the information, and then click
Close.
Results: After this exercise, you should have successfully implemented some aspects of the messaging
security design for A Datum.
2.
Right-click 10233B-VAN-DC1 in the Virtual Machines list, and then click Revert.
3.
4.
Repeat these steps for 10233B-VAN-EX1 and 10233B-VAN-CL1. Close the virtual machine connection
windows.
5.
In the Virtual Machines pane, click 10233B-VAN-DC1, and then in the Actions pane, click Start.
6.
To connect to the virtual machine for the next modules lab, click 10233B-VAN-DC1, and then in the
Actions pane, click Connect.
Note Start the 10233B-VAN-DC1 virtual machine first, and ensure that it is fully started
before starting the other virtual machines.
7.
Wait for 10233B-VAN-DC1 to start, and then start 10233B-VAN-EX1. Connect to the virtual machine.
L6-64
L7-65
Jason Carlson
15th Apr 2010
Requirement Overview
Determine how you will manage message transport.
Proposals
Question: Are transport rules required? If so, how should you configure them?
Answer: Yes. Four transport rules are required.
The first transport rule applies to Internet-delivered messages for the Sales group, and adds a
disclaimer to each email message.
The second transport rule applies to Internet-delivered messages for everyone except the Sales
group, and adds a disclaimer to each email message. An exception excludes members of the Sales
group.
The third transport rule applies to Internet-delivered messages with the Company Internal
classification, and blocks these messages.
The fourth transport rule applies to messages classified as Acquisitions Confidential. Exchange
Server blocks these messages if they are addressed to anyone other than the Strategic Acquisitions
team.
Question: Is message moderation required? If so, how should you configure it?
Answer: No. There are no requirements that indicate a need for message moderation.
Question: Are message classifications required? If so, how should you configure them?
Answer: Yes. You must create two classifications: Company Internal, and Strategic Acquisitions.
Note
Results: After this exercise, you should have created a message transport plan.
L7-66
Question: In the Message Compliance Interview, what points are raised that impact your message
journaling and archiving plan?
Answer:
You must create personal archives to replace personal folders (PST) files.
Auditors must be able to prevent specific users from deleting messages and must be able to review
the saved messages for those users.
Auditors need to monitor and review messages sent to the Executives group.
Jason Carlson
15th Apr 2010
Requirement Overview
Determine how you will configure journaling and archiving.
Proposals
Question: Are personal archives required?
Answer: Yes. That is an explicit requirement.
Question: Should you remove PST files?
Answer: Yes. PST files are a management problem. You should prevent users from creating new
PST files, and you should provide them with instructions about how to move the content from PST
files to personal archives.
Question: How can users access personal archives? Does this affect which users will receive
personal archives usage?
Answer: Users can access personal archives by using the Microsoft Office Outlook 2010
messaging client, Office Outlook 2007, or Microsoft Outlook Web App. You may want to enable
personal archives only after users upgrade to a version of Outlook that supports personal archives.
L7-67
(continued)
A. Datum Journaling and Archiving Plan
Question: Is journaling required? If so, how should you configure it?
Answer: Yes. The Executives group requires journaling. You can create a journal rule for messages
sent to this group.
Question: How can you prevent users from deleting messages?
Answer: Enable mailboxes with litigation holds to prevent the mailbox owners from deleting
messages.
Question: Can auditors prevent users from deleting messages?
Answer: Yes. You can assign auditors to the Legal Hold management role. The auditors can then
enable a litigation hold on a mailbox-by-mailbox basis.
Note
Results: After this exercise, you should have created a journaling and archiving plan.
L7-68
Question: In the Message Compliance Interview, what points are raised that impact your MRM plan?
Answer:
Jason Carlson
15th Apr 2010
Requirement Overview
Determine how you will implement MRM.
Proposals
Question: Will you use managed folder policies for MRM? If so, how should you configure them?
Answer: No, you will not use managed folder policies, because there are no requirements for them.
Managed folder policies cannot archive messages.
Question: Will you use retention policies for MRM? If so, how should you configure them?
Answer: Yes, you will use retention policies, because you can meet all of the requirements by using
them. The retention policies apply if a mailbox is on Exchange Server 2010.
Create one retention policy, in which the:
Default policy tag archives messages after one year.
Archive policy tag removes deleted items after 30 days.
Personal tag allows items to not be archived.
Apply the retention policy to all mailboxes on the Exchange Server 2010 Mailbox servers.
Note
Results: After this exercise, you should have created an MRM plan.
L7-69
On VAN-EX1, click Start, point to All Programs, click Microsoft Exchange Server 2010, and then
click Exchange Management Shell.
2.
At the shell, type the following command, and then press ENTER:
New-MessageClassification -name Company Internal DisplayName Company Internal
-DisplayPrecedence Highest -RetainClassificationEnabled $true
-SenderDescription This message is for internal distribution only; it will not be
forwarded on to the Internet
3.
At the shell, type the following command, and then press ENTER:
New-SystemMessage DsnCode 5.7.999 Text Internal recipients only
Internal $True Language En
4.
Click Start, point to All Programs, click Microsoft Exchange Server 2010, and then click Exchange
Management Console.
5.
6.
Click the Hub Transport node, and then, in the Actions pane, click New Transport Rule.
7.
In the New Transport Rule Wizard, on the Introduction page, in the Name box, type Company
Internal Rule, and then click Next.
8.
On the Conditions page, in the Step 1: Select condition(s) list, select the sent to users that are
inside or outside the organization, or partners check box.
9.
In the Step 2: Edit the rule description by clicking an underlined value box, click Inside the
organization.
10. In the Scope list, click Outside the organization, and then click OK.
11. In the Step 1: Select condition(s) list, select the marked with classification check box.
12. In the Step 2: Edit the rule description by clicking an underlined value box, click classification.
13. In the Select message classification window, click Company Internal, and then click OK.
14. On the Conditions page, click Next.
15. On the Actions page, in the Step 1: Select actions list, select the send rejection message to sender
with enhanced status code check box.
16. In the Step 2: Edit the rule description by clicking an underlined value box, click rejection
message.
17. In the Specify rejection message dialog box, in the Bounce message box, type Messages
classified as Company Internal cannot be sent to the Internet, and then click OK.
18. In the Step 2: Edit the rule description by clicking an underlined value box, click enhanced
status code.
19. In the Specify Enhanced Status Code dialog box, in the text box, type 5.7.999, and then click OK.
L7-70
On VAN-EX1, click Start, point to All Programs and then click Internet Explorer.
2.
In the address bar for the Microsoft Internet Explorer browser, type
https://van-ex1.adatum.com/owa, and then press ENTER.
3.
4.
5.
In the Password box, type Pa$$w0rd, and then click Sign in.
6.
7.
8.
9.
10. In the menu bar, click the Permission button, and then click Company Internal.
11. Click Send.
12. After a moment, click the new message.
Question: Was the delivery successful?
Answer: No.
13. Scroll through the message.
Question: What error do you see?
Answer: #550 5.7.999 Messages classified as Company Internal cannot be sent to the Internet # #
14. Close Internet Explorer.
ON VAN-EX1, in the Exchange Management Console, expand Recipient Configuration, and then
click Mailbox.
2.
3.
Configure the filter as Database Equals Mailbox Database 1, and then click Apply Filter.
4.
5.
6.
7.
Select the Select a specific mailbox database rather than having on selected automatically
check box.
8.
Click the Browse button, click Mailbox Database 1, and then click OK.
9.
L7-71
2.
Click the Retention Policy Tags tab, and then read the list of retention policy tags.
3.
Click the Retention Policies tab, and then double-click Default Archive and Retention Policy.
4.
In the Default Archive and Retention Policy Properties window, on the General tab, review the list
of retention policy tags that are part of this policy.
5.
Click the Mailboxes tab, and then review the list of mailboxes that this retention policy is applied to.
6.
Click Cancel.
On VAN-EX1, in the Exchange Management Console, in the Actions pane, click New Retention
Policy Tag.
2.
In the New Retention Policy Tag Wizard, on the Introduction page, enter the following, and then
click New:
3.
4.
5.
In the New Retention Policy Tag Wizard, on the Introduction page, enter the following, and then
click New:
Action to take when the age limit is reached: Delete and Allow Recovery
6.
7.
8.
In the New Retention Policy Wizard, on the Introduction page, in the Name box, type Standard
Mailbox Retention Policy.
9.
Click Add, click Default 1 year archive, and then click OK.
L7-72
10. Click Add, click Deleted Items 30 day removal, and then click OK.
11. Click Next.
12. On the Select Mailboxes page, click Next.
13. On the New Retention Policy page, click New.
14. On the Completion page, click Finish.
2.
3.
Configure the new expression as Recipient Details Does Not Equal Discovery Mailbox, and then
click Apply Filter.
4.
5.
6.
In the User Mailbox Properties window, click the Mailbox Settings tab.
7.
On the Mailbox Settings tab, click Messaging Records Management, and then click Properties.
8.
In the Messaging Records Management window, select the Apply Retention Policy check box.
9.
Click Browse, click Standard Mailbox Retention Policy, and then click OK.
2.
Right-click 10233B-VAN-DC1 in the Virtual Machines list, and then click Revert.
3.
L7-73
4.
Repeat these steps for 10233B-VAN-EX1, 10233B-VAN-EX2, and 10233B-VAN-EX3. Close the virtual
machine connection windows.
5.
In the Virtual Machines pane, click 10233B-VAN-DC1, and then, in the Actions pane, click Start.
6.
To connect to the virtual machine for the next modules lab, click 10233B-VAN-DC1, and then, in the
Actions pane, click Connect.
Important: Start the 10233B-VAN-DC1 virtual machine first, and ensure that it is fully
started before starting the other virtual machines.
7.
Wait for 10233B-VAN-DC1 to start, and then start 10223B-VAN-EX1. Connect to the virtual machine.
8.
Wait for 10233B-VAN-EX1 to start, and then start 10223B-VAN-EX2. Connect to the virtual machine.
9.
Wait for 10233B-VAN-EX2 to start, and then start 10223B-VAN-EX3. Connect to the virtual machine.
L7-74
L8-75
Network Configuration
Question: In the High Availability Interviews, what points are raised that impact your high availability
design, and how do they impact it?
Answer: The High Availability Interviews raises the following points:
The Chief Information Officer (CIO) wants all locations to be highly available. A single server failure
should not affect functionality. This means that all server roles in all locations must be highly
available.
There is limited bandwidth on the wide area network (WAN) links. The WAN links may need to be
upgraded if transaction logs are replicated across them.
The major sites with more than 3,000 users should be configured with an alternate site for disaster
recovery. The alternate site for disaster recovery should be in a different city, in case of a major
infrastructure problem.
The major sites are using dedicated mailbox servers. Any restrictions caused by combining roles do
not apply in the major sites.
Existing Mailbox servers are at capacity, and should not be used to host passive database copies. The
major sites require additional Mailbox servers specifically for hosting failed-over databases.
Smaller sites are currently supported by only a single server with combined roles. An additional server
must be added to support high availability.
Logical corruption should be prevented for 6 hours in each database availability group (DAG). There
should be one lagged copy in each DAG with a 6 hour delay.
L8-76
Question: Is there anything in the User Distribution Summary that raises high availability issues? If so,
what is it?
Answer: The User Distribution Summary raises the following points:
It provides information about the number of users in each site. These figures are used to determine
whether offsite disaster recovery is required.
Question: Is there anything in the Network Configuration that raises high availability issues? If so, what is
it?
Answer: The Network Configuration raises the following points:
All sites except for LondonSite2 have a connection to the Internet. All sites with a connection to the
Internet have Edge Transport servers.
SanDiegoSite does not allow inbound traffic to Client Access servers. Access to the SanDiego Client
Access servers will be proxied through other sites.
Task 3: Document the required configuration for the San Diego site
Jason Carlson
24th April 2010
Requirement Overview
Determine how high availability will be provided for all server roles in San Diego.
Additional Information
Identify infrastructure changes that may be required due to the proposed deployment.
Proposals
Question: Will this site have offsite disaster recovery? If so, where should that site be located?
Answer: No, this is a small site with only 500 users. Offsite disaster recovery is not part of the
requirements.
Question: How do you provide high availability for databases?
Answer: Provide high availability by creating a DAG.
Question: How do you provide high availability for Client Access servers?
Answer: Provide high availability by creating a client access array.
Question: How do you provide high availability for message transport?
Answer: Provide high availability by installing a second Hub Transport server.
Question: Is high availability required for the Edge Transport server role?
Answer: Yes, outgoing mail is routed through a local Edge Transport server. To make it highly
available, there should be two Edge Transport servers in the San Diego site.
L8-77
(continued)
A. Datum High Availability Design for San Diego
Question: How many Exchange servers will be located in this site? Which roles will they host?
Answer: There will be four servers, and in the perimeter network there will be two Edge Transport
servers.
On the internal network, there will be two Exchange servers. Each Exchange server on the internal
network will have the Mailbox, Hub Transport, and Client Access server roles.
Question: How will databases be configured on the DAG members?
Answer: Half of the active databases will be located on each server, with passive copies on the
other server. Even though a single server has the capacity to support all mailboxes, splitting the
load may improve performance.
Each passive database copy will be configured with a 6-hour replay lag to prevent logical
corruption of both databases.
Question: How will load balancing be performed for the Client Access server role?
Answer: Hardware load balancing must be used, because DAG members cannot be part of a
Network Load Balancing (NLB) cluster.
Question: Is any additional configuration required for the Hub Transport server role?
Answer: No, you can achieve high availability just by having two Hub Transport servers.
Jason Carlson
24th April 2010
Requirement Overview
Determine how high availability will be provided for all server roles in Vancouver.
Additional Information
Identify infrastructure changes that may be required due to the proposed deployment.
Proposals
Question: Will this site have offsite disaster recovery? If so, where should that site be located?
Answer: Yes, this is a large site with 5,000 users. Offsite disaster recovery is required.
To reduce the cost of network connectivity, the offsite disaster recovery should be located in North
America. The San Diego site can be used for offsite disaster recovery. Network links to San Diego
from Vancouver may need to be improved with increased bandwidth for communication.
Question: How do you provide high availability for databases?
Answer: Provide high availability by creating a DAG, which will include a server in San Diego for
offsite disaster recovery.
L8-78
(continued)
A. Datum High Availability Design for Vancouver
Question: How do you provide high availability for Client Access servers?
Answer: Provide high availability by creating a client access array in Vancouver. The client access
array in San Diego can be used when offsite disaster recovery is performed.
Question: How do you provide high availability for message transport?
Answer: Provide high availability by installing a second Hub Transport server in Vancouver. The
Hub Transport servers in San Diego will be used when offsite disaster recovery is performed.
Question: Is high availability required for the Edge Transport server role?
Answer: Yes, incoming and outgoing mail is routed through a local Edge Transport server. To make
it highly available, there should be two Edge Transport servers in the San Diego site.
Question: How many Exchange servers will be located in this site? Which roles will they host?
Answer: In the perimeter network, there will be two Edge Transport servers.
On the internal network there will be:
Two dedicated Hub Transport servers to provide high availability for message transport
within the site and between sites.
Three dedicated Client Access servers in a client access array. This ensures that even if a
Client Access server fails, there is sufficient capacity to support all users.
Three mailbox servers in Vancouver, and two additional Mailbox servers in San Diego. To
support the 6,000 users in Vancouver, two Mailbox servers are required. To provide high
availability in Vancouver, a third server is required. To provide site resilience, two Mailbox
servers are located in San Diego.
Question: How will databases be configured on the DAG members?
Answer: One third of the active databases will be located on each server, with passive copies on
another local server, and on a server in San Diego. Evenly spreading the load in Vancouver can
increase performance. In San Diego, two servers provide sufficient capacity to host all mailboxes, if
required.
Each passive database copy in San Diego will be configured with a 6-hour replay lag to prevent
logical corruption of the databases. Logical corruption is a very rare event. So, there will be no
replay lag for passive database copies in Vancouver.
Question: How will load balancing be performed for the Client Access server role?
Answer: The Client Access server role is not combined with the Mailbox server role. Therefore, NLB
can be used. It is also possible to use hardware load balancing, if desired.
Note
L8-79
On VAN-DC1, click Start, point to Administrative Tools, and then click Active Directory Users and
Computers.
2.
In Active Directory Users and Computers, expand Adatum.com, and then click Builtin.
3.
4.
5.
In the Enter the object names to select box, type Exchange Trusted Subsystem, and then click
OK.
6.
7.
On VAN-EX3, click Start, point to All Programs, click Microsoft Exchange Server 2010, and then
click Exchange Management Console.
2.
3.
4.
5.
In the New Database Availability Group window, in the Database availability group name box,
type VancouverDAG.
6.
Select the Witness Server check box, and then type VAN-DC1.
7.
Select the Witness Directory check box, type C:\VanDAGWitness, and then click New.
Note Step 7 will generate a warning, because the witness server is not an Exchange Server.
This does not indicate a problem. The necessary permissions were configured in Task 1.
8.
9.
In the Exchange Management Console, right-click VancouverDAG, and then click Properties.
L8-80
16. In the Exchange Management Console, right-click VancouverDAG, and then click Manage Database
Availability Group Membership.
17. In the Manage Database Availability Group Membership window, click Add.
18. In the Select Mailbox Server window, press the CTRL key while clicking to select VAN-EX1, VANEX2, and VAN-EX3, and then click OK.
19. In the Manage Database Availability Group Membership window, click Manage.
20. On the Completion page, click Finish.
On VAN-EX3, in the Exchange Management Console, click the Database Management tab, and then
click Mailbox Database 1.
2.
In the Actions pane, under Mailbox Database 1, click Add Mailbox Database Copy.
3.
In the Add Mailbox Database Copy window, click the Browse button.
4.
In the Select Mailbox Server window, click VAN-EX2, and then click OK.
5.
6.
7.
In the Actions pane, under Mailbox Database 1, click Add Mailbox Database Copy.
8.
In the Add Mailbox Database Copy window, click the Browse button.
9.
In the Select Mailbox Server window, click VAN-EX3, and then click OK.
14. In the Exchange Management Shell, type the following command, and then press ENTER:
Get-MailboxDatabase Mailbox Database 1 | Format-List ReplayLagTimes
15. In the Exchange Management Shell, type the following command, and then press ENTER:
Get-MailboxDatabaseCopyStatus Identity Mailbox Database 1\VAN-EX3
L8-81
On the host computer, in the 10233B-VAN-EX1 window, click the Action menu, and then click Turn
Off.
2.
3.
On VAN-EX3, in the Exchange Management Console, in the Actions menu, click Refresh.
4.
VAN-EX1: ServiceDown
VAN-EX2: Mounted
VAN-EX3: Healthy
On the host computer, in the 10233B-VAN-EX1 window, click the Action menu, and then click Start.
2.
3.
4.
On VAN-EX3, in the Exchange Management Console, in the Actions menu, click Refresh.
Question: What is the status for Mailbox Database 1 on each server?
Answer: The status for Mailbox Database 1 on each server is as follows:
5.
VAN-EX1: Healthy
VAN-EX2: Mounted
VAN-EX3: Healthy
If the status of Mailbox Database 1 on VAN-EX1 is initializing, wait a few minutes, and then click
Refresh again. You may need to select Mailbox Database 1 on VAN-EX1 to refresh its status.
L8-82
2.
Right-click 10233B-VAN-DC1 in the Virtual Machines list, and then click Revert.
3.
4.
Repeat these steps for 10233B-VAN-EX1, 10233B-VAN-EX2, and 10233B-VAN-EX3. Close the virtual
machine connection windows.
5.
In the Virtual Machines pane, click 10233B-VAN-DC1, and then, in the Actions pane, click Start.
6.
To connect to the virtual machine for the next modules lab, click 10233B-VAN-DC1, and then, in the
Actions pane, click Connect.
Important Start the 10233B-VAN-DC1 virtual machine first, and ensure that it is fully
started before starting the other virtual machines.
7.
Wait for 10233B-VAN-DC1 to start, and then start 10233B-VAN-EX1. Connect to the virtual machine.
8.
Wait for 10233B-VAN-EX1 to start, and then start 10233B-VAN-CL1. Connect to the virtual machine.
L9-83
The failure of a single server should result in only minutes of downtime for users.
You can consider high availability as a replacement for backup if there are at least two local
copies of a database, and a remote database copy in another site.
To consider high availability as a replacement for backup, you must have one database copy that
is unaffected by logical corruption in another database copy for at least 12 hours.
Jason Carlson
5th May 2010
Requirement Overview
Determine how disaster recovery will be provided for all server roles in Vancouver.
Proposals
Question: Does this site require backups?
Answer: No. According to the service level agreement (SLA) requirements, you do not need to back
up a database availability group (DAG) with three copies, including site resilience. A three-member
DAG meets the requirement for no data loss when a single server fails. It also meets the
requirement for only minutes of downtime.
Question: Do you need to make any changes to the DAG to meet the SLA requirements?
Answer: Yes. The database copies in San Diego have only a 6-hour replay lag. The SLA specifies
that to use a DAG as a replacement for backup, you must have at least a 12-hour replay lag. A
longer replay lag provides more time to discover a corruption, and to stop the replay process.
L9-84
(continued)
A. Datum Disaster Recovery Plan for Vancouver
Question: Are any changes required for deleted item retention?
Answer: Yes. The default retention time for deleted items is 14 days. The SLA specifies that you
must increase deleted-item retention to retain messages for 30 days. Also, you should enable
single-instance recovery on the Mailbox servers. This ensures that you can recover even harddeleted messages for the full 30 days.
Question: Are any changes required for deleted mailbox retention?
Answer: Yes. The default retention time for deleted mailboxes is 30 days. The SLA specifies that you
must increase deleted-mailbox retention to 60 days.
Question: Do you need to back up data on Client Access servers?
Answer: No, you do not need to back up each Client Access server. However, you do need to
document your configuration changes. If a Client Access server fails, you can replace it with a new
one, and then make the required configuration changes. You can copy customized webpages from
a remaining server, but it would be easier to have a copy of those pages stored elsewhere so that
you can easily restore them.
Question: Do you need to back up data on Hub Transport servers?
Answer: No. All Hub Transport configuration data is stored in Active Directory Domain Services
(AD DS), including the customized Receive connectors. When replacing a failed Hub Transport
server, reuse the same computer account to retain the configuration by installing in Recovery
mode.
Question: Do you need to back up data on Edge Transport servers?
Answer: No. There are two Edge Transport servers, so, you can export the configuration data from
the remaining server, and then import it to the new server. However, to speed up this process, you
could have a copy of the configuration data already exported and waiting for recovery.
Question: Would your backup plan change if public folders were present in Vancouver?
Answer: It depends on the type of data that is stored in the public folders. If the public folders
were being used only to support free/busy searches and offline address book downloads for
Microsoft Office Outlook 2003 clients, then a backup is not required. You can regenerate that
data. If the public folders are used for collaboration between users, then they do need to be backed
up, because public folder databases are not replicated in a DAG.
Note
Results: After this exercise, you should have created a disaster recovery plan for the Vancouver site.
L9-85
The failure of a single server should result in only minutes of downtime for users.
You can consider high availability as a replacement for backup if there are at least two local
copies of a database, and a remote database copy in another site.
Messaging functionality must be recoverable within one hour. You can recover historical data up
to 24 hours later.
When recovering data from a backup, the maximum allowable data loss is four hours.
Any location that is not configured with site resilience must archive backups offsite for one week.
L9-86
Task 3: Document the required configuration for the San Diego site
Jason Carlson
5th May 2010
Requirement Overview
Determine how disaster recovery will be provided for all server roles in San Diego.
Proposals
Question: Does this site require backups? If so, how will you perform backups?
Answer: Yes, the site requires backups, because the DAG does not have site resilience. Therefore,
you must perform a backup for mailbox databases. The two-member DAG will mean that the
backup is seldom required.
A disk-based backup solution is the most efficient way to perform backups. The data loss
requirements mean that a backup must be performed every four hours. If you use a disk-based
backup solutionsuch as Microsoft System Center Data Protection Managerthen each backup
will finish very quickly.
To meet the archive requirements, you must back up to tape once a week for offsite storage.
Question: Do you need to make any changes to the DAG to meet the SLA requirements?
Answer: No, this DAG does not require replay as part of the SLA, because a backup is being
performed.
Question: Are any changes required for deleted-item retention?
Answer: Yes. The default retention time for deleted items is 14 days. The SLA specifies that deleteditem retention must be increased to retain messages for 30 days. Also, you should enable singleinstance recovery on the Mailbox servers. This ensures that you can recover even hard-deleted
messages for 30 days.
Question: Are any changes required for deleted mailbox retention?
Answer: Yes. The default retention time for deleted mailboxes is 30 days. The SLA specifies that you
must increase deleted mailbox retention to 60 days.
Question: How will you meet the recovery requirement of one hour?
Answer: If a server or database fails, you can use dial-tone recovery to quickly restore basic
messaging functionality. Next, you can restore historical data to a recovery database, and merge
the historical data into the dial-tone database.
Question: Would your backup plan change if public folders were present in San Diego?
Answer: No, backups are already being performed.
Note
Results: After this exercise, you should have created a disaster recovery plan for the San Diego site.
L9-87
On VAN-EX1, click Start, point to All Programs, click Microsoft Exchange Server 2010, and then
click Exchange Management Console.
2.
3.
On the Database Management tab, right-click Mailbox Database 1, and then click Properties.
4.
5.
6.
In the Keep deleted mailboxes for (days) box, type 60, and then click OK.
7.
Click Start, point to All Programs, click Microsoft Exchange Server 2010, and then click Exchange
Management Shell.
8.
In Exchange Management Shell, type the following command, and then press ENTER:
Set-Mailbox Luca SingleItemRecoveryEnabled $true
On VAN-CL1, if necessary, log off, and then log on as Luca using the password Pa$$w0rd.
2.
3.
4.
5.
6.
7.
8.
Click Roles & Auditing, and then click the Administrator Roles tab.
9.
Click the Discovery Management role group, and then click Details.
10. In the Role Group window, scroll to Members, click Add, double-click Andreas Herbinger, and then
click OK.
11. Click Save.
12. Close Internet Explorer.
On VAN-CL1, click Start, point to All Programs, click Microsoft Office, and then click Microsoft
Outlook 2010.
2.
L9-88
3.
In the Untitled Message (HTML) window, type the following, and then click Send:
To: Luca
4.
In the Inbox, right-click the Test of SIR message, and then click Delete.
5.
6.
7.
8.
Click the Folder tab, and then click Recover Deleted Items.
9.
In the Recover Deleted Items From Deleted Items window, click Test of SIR, and then click the X
to purge the message.
2.
3.
4.
5.
6.
7.
8.
9.
In the New Mailbox Search window, in the Keywords area, type SIR.
L9-89
20. In the new Outlook Web App window, click OK to accept the default language and time zone.
21. Click the Lucas lost message folder.
22. Expand Lucas lost message, and then click Results -date and time,.
On VAN-EX1, in the Exchange Management Shell, type the following command, and then press
ENTER:
New-RoleGroup Name ExportMail Roles Mailbox Import Export Members Andreas
On VAN-EX1, log off as Administrator, and then log on as Adatum\Andreas using the password
Pa$$w0rd.
2.
3.
In the Exchange Management Shell, type the following command, and then press ENTER:
Search-Mailbox Discovery Search Mailbox SearchQuery Subject:SIR TargetMailbox
Luca TargetFolder Recovered
4.
On VAN-CL1, in Microsoft Outlook 2010, in the folder list, expand Recovered, expand Discovery
Search MailboxDateandTime, expand Primary Mailbox, expand Lucas lost message, and then
click ResultsDateandTime.
Results: After this exercise, you should have implemented single-item recovery and recovered a message.
2.
Right-click 10233B-VAN-DC1 in the Virtual Machines list, and then click Revert.
3.
4.
Repeat these steps for 10233B-VAN-EX1, 10233B-VAN-EX2, and 10233B-VAN-EX3. Close the
virtual machine connection windows.
5.
In the Virtual Machines pane, click 10233B-VAN-DC1, and then, in the Actions pane, click Start.
6.
To connect to the virtual machine for the next modules lab, click 10233B-VAN-DC1, and then, in the
Actions pane, click Connect.
Important: Start the 10233B-VAN-DC1 virtual machine first, and ensure that it is fully
started before starting the other virtual machines.
7.
Wait for 10233B-VAN-DC1 to start, and then start 10223B-VAN-EX1. Connect to the virtual machine.
8.
Wait for 10233B-VAN-EX1 to start, and then start 10223B-VAN-EX2. Connect to the virtual machine.
Wait for 10233B-VAN-EX2 to start, and then start 10223B-VAN-EX3. Connect to the virtual machine.
L9-90
L10-91
On VAN-EX1, click Start, point to All Programs, point to Microsoft Exchange Server 2010, and
then click Exchange Management Console.
2.
In the console tree, expand Microsoft Exchange On-Premises (van-ex1.adatum.com), and then
click Toolbox.
3.
4.
5.
Expand Data Collector Sets, right-click User Defined, click New, and then click Data Collector Set.
6.
In the Name box, type Baseline, click Create manually (Advanced), and then click Next.
7.
On the What type of data do you want to include page, select the Performance counter check
box, and then click Next.
8.
On the Which performance counters would you like to log page, click Add.
9.
In the Available counters list, click and expand each of the following objects, and for each, click Add.
Memory
MSExchangeIS
MSExchangeIS Mailbox
MSExchangeTransport Queues
MSExchangeTransport SmtpReceive
MSExchangeTransport SmtpSend
Physical Disk
Processor
Server
System
L10-92 Module 10: Planning Microsoft Exchange Server 2010 Monitoring and Troubleshooting
Task 2: Configure Load Generator with suitable values to simulate the required load
1.
2.
Click Start, point to All Programs, click Microsoft Exchange, and then click Exchange Load
Generator 2010.
3.
4.
5.
On the Specify test settings page, under Define the total length of the simulation, in the Hours
box, type 0.
6.
7.
8.
In the Mailbox Account Master Password box, type Pa$$w0rd, and then click Continue with
recipient management.
9.
On the User settings page, in the text box, type 12, and then click Distribute users evenly across
databases.
Use contacts
12. In the Number of contacts box, type 20 and then click Continue.
13. On the Specify test user groups page, click the PLUS SIGN (+).
14. In the resulting item, in the Client Type list, click Outlook 2007 Online.
15. On the Specify test user groups page, click the PLUS SIGN (+) sign.
16. In the resulting item, in the Client Type list, click Outlook 2007 Cached, and in the Action Profile
list, click Heavy.
17. Click Continue, and on the Remote configurations page, click Continue.
18. On the Configuration summary page, click Save the configuration file as.
19. In the Save As dialog box, in the File name box, type Baseline, and then click Save.
20. In the Configuration Saved dialog box, click OK.
21. Click Skip initialization phase and run the simulation immediately.
22. Switch to the VAN-EX1 computer.
L10-93
2.
3.
In the left pane, click System Monitor. Click the red X in the toolbar repeatedly to remove all
counters from the display.
4.
Press Ctrl+L.
5.
6.
In the Select Log File dialog box, double-click Admin, double-click Baseline, double-click the folder
that ends 000001, and then double-click DataCollector01.blg.
7.
8.
Click Add.
9.
10. In Available counters list, select Pages/sec, and then click Add.
11. Use the information in the following table to add additional counters.
Performance object
Counter
MSExchangeIS
RPC Requests
MSExchangeIS
User Count
MSExchangeIS Mailbox
MSExchangeIS Mailbox
Messages Delivered/sec
MSExchangeIS Mailbox
MSExchangeIS Mailbox
Messages Sent/sec
MSExchangeTransport Queues
MSExchangeTransport Queues
MSExchangeTransport Queues
L10-94 Module 10: Planning Microsoft Exchange Server 2010 Monitoring and Troubleshooting
(continued)
Performance object
Counter
MSExchangeTransport SmtpReceive
Messages Received/sec
MSExchangeTransport SmtpSend
Messages Sent/sec
Physical Disk
% Disk Time
Physical Disk
Processor
% Processor Time
Server
Server
System
Note If Performance Monitor experiences problems, close and restart it. Then continue
from step 3.
12. Click OK, and then click OK again.
13. Click the down arrow on the toolbar, and then click Report.
14. View the counter values, and then complete the following table.
Counter
Memory Pages/sec
MSExchangeIS - User Count
MSExchangeIS - RPC Requests
MSExchangeIS Mailbox - Local delivery rate
MSExchangeIS Mailbox - Messages Delivered/sec
MSExchangeIS Mailbox - Messages Queued For
Submission
MSExchangeIS Mailbox - Messages Sent/sec
MSExchangeTransport Queues - Active Remote
Delivery Queue Length
MSExchangeTransport Queues - Retry Remote Delivery
Queue Length
MSExchangeTransport Queues - Submission Queue
Length
Average
(continued)
Counter
Average
Note
L10-95
L10-96 Module 10: Planning Microsoft Exchange Server 2010 Monitoring and Troubleshooting
Task 1: Generate additional load with Load Generator to simulate the environment
of heavier than planned for usage
1.
Switch to VAN-DC1.
2.
3.
Click Use the following saved configuration file, and then click Browse.
4.
In the Please select a configuration file dialog box, double-click Baseline.xml, and then click
Continue.
5.
On the Specify test settings page, click Continue with recipient management.
6.
On the User settings page, in the text box, type 20, and then click Distribute users evenly across
databases.
7.
Click Continue.
8.
On the Advanced recipient settings page, select the following check boxes.
9.
Use contacts
10. On the Specify test user groups page, click the PLUS SIGN (+).
11. In the resulting item, in the Client Type list, click Outlook 2007 Online, and in the Action Profile
list, click Heavy.
12. On the Specify test user groups page, click the PLUS SIGN (+).
13. In the resulting item, in the Client Type list, click Owa2010Module, and in the Action Profile list,
accept the defaults.
14. Click Continue, and on the Remote configurations page, click Continue.
15. On the Configuration summary page, click Save the configuration file as.
16. In the Save As dialog box, in the File name box, type Adatum, and then click Save.
17. In the Configuration Saved dialog box, click OK.
18. Click Skip initialization phase and run the simulation immediately.
19. Switch to VAN-EX1.
L10-97
2.
3.
4.
In the Performance Monitor Properties dialog box, click the Source tab, and then click Remove.
5.
6.
In the Select Log File dialog box, click Up One Level, double-click the folder ending in 000002,
double-click DataCollector01.blg, and then click OK.
7.
View the counter values, and then complete the following table.
Counter
Memory Pages/sec
MSExchangeIS - User Count
MSExchangeIS - RPC Requests
MSExchangeIS Mailbox - Local delivery rate
MSExchangeIS Mailbox - Messages Delivered/sec
MSExchangeIS Mailbox - Messages Queued For
Submission
MSExchangeIS Mailbox - Messages Sent/sec
MSExchangeTransport Queues - Active Remote
Delivery Queue Length
MSExchangeTransport Queues - Retry Remote Delivery
Queue Length
MSExchangeTransport Queues - Submission Queue
Length
MSExchangeTransport SmtpReceive - Messages
Received/sec
MSExchangeTransport SmtpSend - Messages Sent/sec
Physical Disk - % Disk Time
Physical Disk - Avg. Disk Queue length
Average
L10-98 Module 10: Planning Microsoft Exchange Server 2010 Monitoring and Troubleshooting
(continued)
Counter
Average
Results: After this exercise, you should have determined which server resources are likely to become
bottlenecked if server load continues to increase.
2.
Right-click 10233B-VAN-DC1 in the Virtual Machines list, and then click Revert.
3.
4.
You do not need to start any virtual machines, as this is the last lab of the course.
L11-99
Adatum_ProposedADSiteDesign.vsd
Adatum_ProposedPerimeterDesign.vsd
Exchange_Server_2003_Configuration.doc
Answer the questions in the A. Datum Upgrade Design Questions document, and then complete the
A. Datum Upgrade Design document.
A. Datum Upgrade Design
Document Reference Number: JC060610/1
Document Author
Date
Jason Carlson
6th June 2010
Requirement Overview
Describe the upgrade strategy for the A. Datum organization.
Proposals
Question: Based on what you know about the A. Datum organization, what would be a reasonable
timeline for completing this migration?
Answer: Answers will vary. Because this upgrade does not require any client reconfigurations for
users, the organization could pursue a fairly aggressive timeline. Estimates for completing the
upgrade should range from 3 to 12 months.
Question: What are the factors that will affect the timeline?
Answer: Factors that will impact the upgrade time line include:
Project budget
Resource availability (both personnel and hardware)
Test requirements
Question: Where will you perform the schema upgrade?
Answer: The schema upgrade must be done in the domain where the Schema Master is located. As
a best practice, you should disable schema replication on the Schema Master while performing the
upgrade. After the upgrade is successfully completed, you can re-enable replication. In a large
organization, allow enough time for the schema upgrade to replicate to all domain controllers
before you prepare the domains.
L11-100
(continued)
A. Datum Upgrade Design
Question: What is the process for preparing domains for Exchange Server 2010?
Answer: Each domain with Exchange Server 2010 users or servers must be prepared. After the
schema upgrade has replicated to all domain controllers, you can run the setup with the
PrepareAllDomains option.
Question: How will you ensure that Exchange Server 2010 can coexist with Exchange Server 2003?
Answer: Run setup with the PrepareLegacyExchangePermissions option.
Question: Which site should be upgraded first?
Answer: London is the best site to upgrade first. The most experienced Exchange Server
administrators are likely located in London, as well as the central team of administrators who have
permission throughout the organization. London is also the site with the most users and the frontend servers for Exchange Server 2003.
Question: Which server role should be implemented first in that site?
Answer: The Client Access server role should be implemented first. It is required to provide
coexistence between Exchange Server 2003 and Exchange Server 2010.
Question: Should coexistence occur in multiple sites or a single location?
Answer: In general, it is better to limit coexistence to a single location to simplify the migration
process. If only a single location has coexistence, it is easy to configure message routing with a
single routing group connector. If time constraints dictate that multiple locations must have
coexistence, it is possible, but complexity increases.
Question: How will client access be configured to allow coexistence in the first site?
Answer: A client access array will be configured in the London site. The client access array will use
the external name of mail.adatum.com, which is currently used by the load-balanced front-end
servers for Exchange Server 2003. A new legacy.adatum.com name will be configured for the loadbalanced front-end servers. The Exchange Server 2010 Client Access servers will be configured with
the legacy URL for the Exchange Server 2003 front-end servers.
All users will initially connect to mail.adatum.com. Outlook Web Access users with Exchange
Server 2003 mailboxes will be redirected to the Exchange Server 2003 front-end servers. The
Exchange Server 2010 Client Access server will proxy connections for ActiveSync users. The
Exchange Server 2010 Client Access server will communicate directly with Exchange Server 2003
computers hosting mailboxes for Outlook Anywhere users.
Question: How will message transport be configured to allow coexistence in the first site?
Answer: The initial installation will have a single routing group connector between Exchange
Server 2010 and the London routing group. This will allow messages to be delivered between
Exchange Server 2003 and Exchange Server 2010.
Question: How will mailboxes be moved in the first site?
Answer: Mailboxes can be moved from Exchange Server 2003 to Exchange Server 2010 as soon as
all of the Exchange Server 2010 infrastructure is in place in London. Live mailbox moves are not
supported from Exchange Server 2003 to Exchange Server 2010. So, you will need to move
mailboxes outside of standard business hours or arrange for downtime to move mailboxes.
11-101
(continued)
A. Datum Upgrade Design
Question: How will you move Internet message delivery from Exchange Server 2003 to Exchange
Server 2010 and use Edge Transport servers?
Answer: Edge transport servers can be introduced before Exchange Server 2010 Hub Transport
servers, but there is no reason to do so because there is already an anti-spam solution in place.
After Exchange Server 2010 Hub Transport servers are introduced, then you can implement Edge
Synchronization, which simplifies the management of Edge Transport servers.
After Edge Synchronization is configured, then you can direct incoming messages to the new Edge
Transport servers rather than the existing anti-spam appliances. To support outgoing mail directly
from Exchange Server 2010 to the Internet, you must create a send connector. Then you must
disable outbound mail delivery from Exchange Server 2003 to the Internet.
Question: When you begin migrating the second site to Exchange Server 2010, what process will
you use?
Answer: The same process as was used in London. The Client Access server will be implemented
first, and then other server roles. After you verify that message delivery and all services work
correctly, you can begin migrating mailboxes in the site.
To ensure that message delivery is efficient, you should create an additional routing group
connector between Exchange Server 2010 and the routing group for the second site.
Question: How will you remove Exchange Server 2003?
Answer: Exchange Server 2003 cannot be completely removed until all mailboxes are migrated to
Exchange Server 2010. Any Exchange Server 2003 computers that no longer have mailboxes can be
uninstalled. Care should be taken to ensure that bridgehead servers are not accidentally removed,
which could affect message routing.
The Exchange Server 2003 front-end servers should be the last servers removed. They must remain
in place to provide external Outlook Web Access connectivity for all external users with Exchange
Server 2003 mailboxes.
Note
Results: After this exercise, you should have completed the A. Datum Upgrade document.
L11-102
L12-103
Jason Carlson
5th June 2010
Requirement Overview
Determine how to how migrate Northwind Traders email to Office 365.
Proposals
Question: Does this scenario require a hybrid implementation of Office 365?
Answer: Yes. For the best interoperability between the on-premises Exchange Server organization
for A. Datum and Office 365, you should implement a hybrid scenario.
Question: Will inbound routing be to the on-premises Exchange Server organization or to
Office 365?
Answer: Inbound routing should be through the on-premises Exchange Server organization. This
allows the Edge Transport server in London to perform anti-spam and antivirus scanning for all
messages. Using Microsoft Forefront Online Protection for Exchange (FOPE) in Office 365 to scan
all messages would be expensive because additional licenses for FOPE would need to be purchased
for thousands of A. Datum Corporation users that do not have Office 365 mailboxes.
Question: Will outbound routing be centralized or decentralized?
Answer: Outbound routing will be centralized through the on-premises Exchange Server
organization. This is the only way that the legal disclaimer that includes the company logo can be
applied to all outbound messages.
Question: How will you configure mail exchanger (MX) resource records?
Answer: After the mailboxes are moved, you should direct the MX records for
northwindtraders.com to the Edge Transport servers in the A. Datum Corporation data center in
London. The MX records for adatum.com are already directed to the Edge Transport server in the A.
Datum Corporation data center in London.
Question: How will you migrate mailboxes to Office 365?
Answer: The only option for migrating mailboxes from a POP3/IMAP messaging system to
Office 365 is to use the IMAP migration. This migrates mailbox contents through an Internet
message access protocol (IMAP) connection.
L12-104 Module 12: Integrating Microsoft Exchange Server 2010 with Other Messaging Systems
(continued)
A. Datum Corporation and Northwind Traders Integration Plan
Question: Will you configure single sign-on?
Answer: Yes. There are 800 users at Northwind Traders. That large number of users will generate
many help desk calls if they cannot use the same user credentials for email logon as they use
internally for AD DS.
Question: Do you need to configure a user principal name (UPN) to support single sign-on?
Answer: Yes. You need to verify that the UPN for the adatum.com domain is configured to be
adatum.com. This matches the email addresses of the users. This should be configured before
directory synchronization begins as part of the hybrid deployment.
Question: What Active Directory Federation Services (AD FS) servers do you require to support
single sign-on?
Answer: To be highly available, there should be two load balanced federation servers and two load
balanced federation server proxies. The federation servers can be installed on existing domain
controllers because there are fewer than 1,000 users. The federation server proxies can be installed
on existing web or proxy servers in the perimeter network.
Question: What certificates do you need to support single sign-on?
Answer: Single sign-on with AD FS requires two certificates. One SSL certificate is installed on the
Default Web Site of the federation servers and federation server proxies. The subject of this
certificate needs to be an Internet routable domain name that matches the DNS name configured
for load balancing on federation servers and federation server proxies. The subject name also needs
to match the DNS name that is configured as the Federation Service name.
The federation servers also use a token-signing certificate that is automatically generated. No
configuration is required for the token-signing certificate.
Results: After this exercise, you should have created a plan to migrate Northwind Traders email to
Office 365.