Applies to: Exchange Server 2007 SP3, Exchange Server
2007 SP2, Exchange Server 2007 SP1
Topic Last Modified: 2010-04-22
The following Microsoft Exchange Server 2007 installation guide template can be used as a starting point for formally documenting your organization's server build procedures for Exchange 2007 servers in a cluster continuous replication (CCR) environment.
Executive Summary
The purpose of this document is to explain the installation and configurations necessary to install Exchange 2007 in a cluster continuous replication environment.
Business Justification
By having an installation guide, Company_Name can guarantee standardization across the enterprise, reduce Total Cost of Ownership, and ease troubleshooting steps.
Scope
The scope of this document is limited to installation of an Exchange 2007 server in a CCR environment for Company_Name on the Windows Server 2008 Enterprise x64 Edition operating system platform.
Prerequisites
The operator should have working knowledge of Windows Server 2008 Enterprise x64 Edition concepts, Exchange 2007 concepts, the Exchange Management Console and Exchange Management Shell, the command line, and several system utilities. This document does not say more about the details of any system utility except as necessary to complete the tasks within.
Assumptions
This document assumes that Windows Server 2008 x64 Edition is installed according to company baseline regulations. This includes the latest approved service pack and hotfixes.
This document assumes that forest and domain preparation steps were finished as described in the Exchange 2007 Online Help topic How to Prepare Active Directory and Domains.
This document assumes that Exchange 2007 and Windows Server 2008 are secured as described in the following best practices documents:
- Exchange 2007: Security and
Protection
- Windows Server 2008: Windows Server 2008 Security Guide
Important: |
---|
Follow the procedures in this document sequentially. Unexpected results may occur if changes are made out of sequence. |
Requirements
Cluster Continuous Replication Planning
Review the Planning for Cluster Continuous Replication topic in the Exchange 2007 Online Help before you implement the cluster.
Transport Dumpster Requirements
Because clustered Mailbox servers in a CCR environment replicate data asynchronously, there is data loss during a lossy failover. To help reduce the effect of this, the Hub Transport server role has a feature that temporarily keeps mail that was recently delivered to a CCR server. This feature is known as the transport dumpster. If there is a lossy failover, the transport dumpster is used by clustered Mailbox servers in a CCR environment to re-deliver mail to each storage group for a specific timeframe. (The timeframe is based on the last log inspected and the last log generated.) The transport dumpster is for clustered Mailbox servers in a CCR environment only.
The transport dumpster is an organizational setting and, therefore, should be configured appropriately to handle all clustered Mailbox servers in a CCR environment within the organization. Additionally, be aware that the transport dumpster is configured per storage group and per clustered Mailbox server in an Active Directory directory service site.
By default, the transport dumpster is enabled to support environments that deploy CCR and that have the following settings:
- MaxDumpsterSizePerStorageGroup – 18 megabytes (MB)
- MaxDumpsterTime – 7 days
We recommend that you configure the MaxDumpsterSizePerStorageGroup parameter. This specifies the maximum size of the transport dumpster queue for each storage group, to a size that is 1.5 times the size of the maximum message that can be sent. For organizations that do not use a maximum message size, the formula should be 1.5 times the average size for all messages sent in the organization.
Transport Dumpster Configuration
Connect to an Exchange 2007 server through Remote Desktop, and then log on by using an account that has local administrative access and that is delegated the Exchange Organization Administrator role.
Follow the procedures in the Exchange 2007 Online Help topic How to Configure the Transport Dumpster.
Cluster Node Configuration
The following media are required for this section:
Windows Server Enterprise x64 Edition media Exchange Server 2007 Configuration DVD
Note: |
---|
For instructions about how to build an Exchange 2007 Configuration DVD, see How to Create a Configuration DVD and Automation Files. |
Additional Software Verification
- Verify that Remote Desktop is enabled.
- As an optional process, install Microsoft Network Monitor. For
more information, see the Microsoft Network Monitor Web site.
Drive Configuration
- Connect to the server through Remote Desktop, and then use an
account that has local administrative access to log on.
- Click Start, click Administrative Tools, and then
select Computer Management.
- Expand Storage, and then click Disk
Management.
- Format, rename, and assign the appropriate drive letters so
that the volumes and DVD drive match the appropriate server
configuration. At the very least, there should be a D drive for the
Exchange binaries, and the DVD drive should be configured as the Z
drive. The following table describes the drive configuration that
should be used.
Drive configuration
LUN Drive letter Usage 1
C
Operating system
2
D
Exchange binaries, tracking logs
3
Z
DVD drive
Windows Server 2008 Hotfix Installation
All hotfixes are installed by using a batch file. For a complete list of hotfixes that are installed, see the Contoso server build DVD hotfix list. A sample hotfix list is available at Server Build DVD - Sample Hotfix List.
- Connect to the server through Remote Desktop, and then log on
by using an account that has local administrative access and that
is delegated local Administrator access.
- Insert the Exchange 2007 Configuration DVD.
- Move to the \W2K8-HotFix folder, and then double-click
W2K8-hotfix.bat.
- Click Yes if a Digital Signature not Found dialog
box appears.
Note: These dialog boxes will not appear in environments that have not deployed the Windows Security templates. - Wait for the files to copy, and then restart the server.
Network Interfaces Configuration - Private Network
For the private network, make sure that the IP address scheme is not using the same subnet or network as any of the public network adapters.
Never use teaming for the private network. For more information, see Microsoft Knowledge Base article 254101, Network adapter teaming and server clustering.
- Connect to what will become the first node in the cluster
through Remote Desktop, and then use an account that has local
administrative access to log on.
- Click Start, click Control Panel, and then
double-click Network and Sharing Center.
- Click Manage network connections.
- Locate the connection for the internal network, and then rename
the connection with an appropriate name.
- Right-click the connection, and then click
Properties.
- In the network connection properties, on the General
tab, verify that the Client for Microsoft Networks,
Internet Protocol Version 4 (TCP/IPv4) and File and
Printer Sharing for Microsoft Networks check boxes are selected
in the This connection uses the following items area.
- Click Internet Protocol Version 4 (TCP/IPv4), and then
click Properties.
- In Internet Protocol Version 4 (TCP/IPv4) Properties,
click Advanced.
- On the DNS tab, verify the following information in
Advanced TCP/IP Settings:
- Make sure that addresses are not listed in the DNS server
addresses, in order of use area if this is a private
network.
- Make sure that the Register this connection's addresses in
DNS check box is cleared.
- Make sure that addresses are not listed in the DNS server
addresses, in order of use area if this is a private
network.
- On the WINS tab, make sure that Disable NetBIOS over
TCP/IP is not selected.
- Click OK two times to save the changes, and then click
Close to exit Properties.
Network Interfaces Configuration - Public Network
Make sure that the IP address scheme for the public network is not using the same subnet or network as any private network adapters. Instead, the public network must use the subnet or network that is used to route network traffic within your intranet.
Teaming can be used on the public network in redundancy mode, but it cannot be used in load balancing mode. However, if problems or issues occur that are related to teaming, Microsoft Customer Support Services will require you to disable teaming. If this resolves the issue, you must seek assistance from the hardware manufacturer. For more information about teaming, see Microsoft Knowledge Base article 254101, Network adapter teaming and server clustering.
- Connect to what will become the first node in the cluster
through Remote Desktop, and then use an account that has local
administrative access to log on.
- Click Start, click Control Panel, and then
double-click Network and Sharing Center.
- Click Manage network connections.
- Locate the connection for the internal network, and then rename
the connection with an appropriate name.
- Right-click the connection, and then select
Properties.
- In the network connection's properties on the General
tab, make sure that the Client for Microsoft Networks,
Internet Protocol Version 4 (TCP/IPv4) and File and
Printer Sharing for Microsoft Networks check boxes are selected
in the This connection uses the following items area.
- Click Internet Protocol Version 4 (TCP/IPv4), and then
click Properties.
- In Internet Protocol Version 4 (TCP/IPv4)
Properties, click Advanced.
- In Advanced TCP/IP Settings, verify the following
information on the DNS tab:
- Make sure that all the required addresses are listed in the
DNS server addresses, in order of use area.
- Make sure that the correct suffixes are listed in the Append
these DNS suffixes (in order) area.
- Make sure that all the required addresses are listed in the
DNS server addresses, in order of use area.
- On the WINS tab, make sure that Disable NetBIOS over
TCP/IP is not selected.
- Click OK two times to save the changes, and then click
Close to exit Properties.
Domain Membership Configuration
- Connect to the server through Remote Desktop, and then use an
account that has local administrative access to log on.
- Click Start, right-click Computer, and then click
Properties.
- In the Computer Name, domain, and workgroup
settings area, click Change Settings.
- In System Properties, click Change.
- In the Member of area, click Domain, and then
type the appropriate domain name.
- Enter the appropriate credentials.
- Click OK two times, and then close System
Properties.
- Restart the server.
Local Administrators Verification
- Connect to the server through Remote Desktop, and then use an
account that has local administrative access to log on.
- Verify that the following accounts are members of the local
administrators group on this server. Add the accounts if they are
not already there.
Local administrators
Item Account Description Role 1
Domain Admins
Domain Administrative Global Group
Administrator
2
Root Domain\Exchange Organization Administrators
Exchange Administrators
Administrator
- Verify that the account you are using is a member of a group
that is a member of the local administrators group on the
Windows Server 2008-based server. If it is not, log
on by using an account that is a member of the local administrators
group before continuing.
Local Administrator Account Password Reset
- Connect to the server through Remote Desktop, and then use an
account that has local administrative access to log on.
- Click Start, right-click Computer, and then click
Manage.
- Expand the following node: Configuration\Local Users and
Groups\Users.
- Right-click Administrator, and then click Set
Password. Change the password so that it meets strong
complexity requirements.
- As an optional step, right-click Administrator, and then
select Rename. Rename the account according to company
regulations.
Tools Installation
This section installs several tools that will help with Exchange administration and with troubleshooting support issues.
Note Debugging Tools for Windows help administrators to debug processes that are affecting service. For more information, see Install Debugging Tools for Windows 64-bit Version.
- Connect to the server through Remote Desktop, and then use an
account that has local administrative access to log on.
- Insert the Exchange 2007 Configuration DVD.
- Open a command prompt, and then move to the \Support
folder on the DVD.
- Run the following command, where <DVDROM-Drive> is the
DVD drive letter:
|
- Right-click the C:\Tools folder, and then click
Properties.
- On the Security tab, click Advanced.
- Click to clear the Include inheritable permissions from this
object's parent check box, and then click Edit.
- In the Permission entries list, click Everyone,
and then click Remove. Also remove the Authenticated
Users security principal if it is listed in this list.
- Click Add, and then add the following groups, and grant
each group FULL CONTROL permission:
- SYSTEM
- The local Administrators group
- Creator Owner
- SYSTEM
Page File Modifications
- Connect to the server through Remote Desktop, and then use an
account that has local administrative access to log on.
- Click Start, right-click Computer, and then click
Properties.
- Click Advanced system settings.
- In the Startup and Recovery area, click
Settings.
- In the Write Debugging Information area, select
Kernel Memory Dump in the list, and then click
OK.
- In the Performance area, click Settings.
- On the Advanced tab, in the Virtual Memory area,
click Change.
- On servers that have a dedicated page file drive, follow these
steps:
- In the Drive list, click C:, and then click
Custom size.
- For the C: drive, set the Initial Size (MB) value to a
minimum of 200 MB. (Windows requires between 150 MB and 2 GB page
file space, depending on server load and the amount of physical RAM
that is available for page file space on the boot volume when
Windows is configured for a kernel memory dump. Therefore, you may
be required to increase the size.)
- For the C: drive, set the Maximum Size (MB) value to
that of the Initial Size.
- In the Drive list, select the page file drive (for
example, the P: drive), and then click Custom size.
- In the Initial Size (MB) box, type the result of one of
the following calculations:
If the server has less than 8 GB of RAM, multiply the amount of RAM times 1.5,.
If the server has 8 GB of RAM or more, add the amount of RAM plus 10 MB.
- In the Maximum Size (MB) box, type the same amount that
you typed in the Initial Size box.
- Delete all other page files.
- Click OK.
- In the Drive list, click C:, and then click
Custom size.
- On servers that do not have a dedicated page file drive, follow
these steps:
- In the Drive list, click C:, and then click
Custom size.
- For the C: drive, in the Initial Size (MB) box, type the
result of one of the following calculations:
If the server has less than 8 GB of RAM, multiply the amount of RAM times 1.5.
If the server has 8 GB of RAM or more, add the amount of RAM plus 10 MB.
- Delete all other page files.
- Click OK.
- In the Drive list, click C:, and then click
Custom size.
- Click OK two times to close the System Properties
dialog box.
- Click No if you are prompted to restart the system.
For more information about Page File recommendations, see the following articles:
Drive Permissions
- Connect to the server through Remote Desktop, and then use an
account that has local administrative access to log on.
- Click Start, and then click Computer.
- Right-click the D Drive, and then click
Properties.
- On the Security tab, click Edit.
- Grant the following rights as outlined in the following table.
Click Add, and then select the local server from
Locations to add accounts that are listed in the table, but
are not listed in the Group or user names list.
Drive permissions
Account Permissions Administrators
Full Control
SYSTEM
Full Control
Authenticated Users
Read and Execute, List, Read
CREATOR OWNER
Full Control
- Click OK to return to D Drive Properties.
- On the Security tab, click Advanced.
- On the Permissions tab, click Edit.
- In the Permission entries table, click CREATOR
OWNER, and then click Edit.
- In the Apply to list, click Subfolders and files
only.
- Click OK three times.
- Click OK to close the drive properties.
- Repeat steps 3 through 12 for each additional drive (other than
drive C).
Additional Node Configuration
Repeat all steps in the Cluster Node Configuration section for the second node that will exist in the cluster.
Verification Steps
Organizational Unit Verification
Submit a change request and have the computer object moved to the appropriate organizational unit (OU). If you are following the recommendations in the Exchange 2007 Security Guide, the OU will be \Member Servers\Exchange Backend Servers\Exchange Mailbox Servers.
Active Directory Site Verification
Verify that the server is in the correct domain and Active Directory site. If the server is not in the correct Active Directory site, submit a change request to the appropriate operations group and have the server moved to the appropriate site. To verify that the domain and Active Directory site are correct, follow these steps:
- Connect to the server through Remote Desktop, and then use an
account that has local administrative access to log on.
- Open a command prompt, and then type the following command:
Copy Code NLTEST /server:%COMPUTERNAME% /dsgetsite
The name of the Active Directory site to which the server belongs is displayed.
Domain Controller Diagnostics Verification
- Connect to the server through Remote Desktop, and then use an
account that has local administrative access to log on.
- Open a command prompt, and then change paths to drive C.
- Type the following command:
Copy Code dcdiag /s:<Domain Controller> /f:c:\dcdiag.log
Note: Change <domain Controller> to a domain controller that is contained within the same Active Directory site as the Exchange server. - Review the output of the C:\Dcdiag.log file, and then verify
that there are no connectivity issues with the local domain
controller.
- Repeat steps 3 and 4 for each domain controller in the local
Active Directory site.
Note: Domain Controller Diagnostics (DCDiag) is a Windows support tool that tests network connectivity and DNS resolution for domain controllers. If the account being used does not have administrative credentials, several tests under the Doing primary tests heading may not pass. These tests can be ignored if the connectivity tests pass. In addition, the log file may report that some service validation tests did not pass. These messages can be ignored if the services do not exist on the domain controller.
Exchange Best Practices Analyzer Verification
- Use Remote Desktop to connect to a server in the environment
that has the Exchange Server Best Practices Analyzer or the
Exchange 2007 Management tools installed. Then, use an account
that has local administrative access to log on. Depending on
the configuration, do one of the following:
- Click Start, click All Programs, click
Microsoft Exchange, and then click Best Practices
Analyzer.
- Click Start, click All Programs, click
Microsoft Exchange Server 2007, and then click Exchange
Management Console.
- Click Start, click All Programs, click
Microsoft Exchange, and then click Best Practices
Analyzer.
- Click Toolbox.
- Double-click Best Practices Analyzer.
- Click Download the latest updates to apply any updates
for the Best Practices Analyzer engine.
- Provide the appropriate information to connect to
Active Directory, and then click Connect to the Active
Directory server.
- On the Start a New Best Practices Scan page, in the
Select the type of scan to perform area, click Exchange 2007
Readiness Check, and then click Start Scanning.
- Review the report. Following the resolution articles that are
provided and take action on any errors or warnings that are
reported by the Best Practices Analyzer.
Note: The Microsoft Exchange Analyzers help Microsoft Exchange Server administrators troubleshoot several operational support issues.
Cluster Service Installation
The following information is required to complete this section.
- The IP Address that will be used for the cluster resource
group.
- The Network name that will be used for the cluster resource
group.
- The Hub Transport server that will be used to host the file
share for the File Share Witness.
Exchange 2007 Prerequisites Installation
- Connect to the server through Remote Desktop, and then use an
account that has local administrative access to log on.
- Open an administrative Command Prompt window.
- Type the following command where <path> references the
E2K7 CONFIG DVD \E2K7-PreReqs folder:
Copy Code ServerManagerCmd -ip <path>\Exchange-Base.XML
- Install the Microsoft Filter Pack. For more information, see
2007 Office System Converter: Microsoft Filter
Pack.
- Type the following command, where <path> represents the
path of the E2K7 CONFIG DVD \E2K7-PreReqs folder, and
<Exchange-role> represents the XML file for the appropriate
role:
Copy Code ServerManagerCmd -ip <path>\<Exchange-role>.XML
- Restart the server if it is required.
Cluster Installation
- Connect to the server through Remote Desktop, and then use an
account that has local administrative access to log on.
- Follow the procedures outlined in the "To use the New Server
Cluster wizard to create a new cluster" from the Exchange 2007
Online Help topic How to Create a Windows
Server 2008 Failover Cluster for Cluster Continuous
Replication.
Cluster Networking Configuration
- Connect to the server through Remote Desktop, and then use an
account that has local administrative access to log on.
- Follow the procedures from the Exchange 2007 Online
Help topic How to Configure Cluster
Networks for a Failover Cluster.
Windows Server 2008 Cluster Hotfix Installation
All hotfixes are installed by using a batch file. For a complete list of hotfixes that are installed, see the Contoso server build DVD hotfix list. A sample hotfix list is available at Server Build DVD - Sample Hotfix List.
- Connect to the server through Remote Desktop, and then log on
by using an account that has local administrative access and that
is delegated local Administrator access.
- Insert the Exchange 2007 Configuration DVD.
- Move to the \W2K8-HotFix folder, and then double-click
W2K8-clus-hotfix.bat.
- Click Yes if a Digital Signature not Found dialog
box appears.
Note: These dialog boxes will not appear in environments that have not deployed the Windows Security templates. - Wait for the files to copy, and then restart the server. Repeat
the process on all remaining nodes within the cluster.
Node and File Share Majority Quorum Configuration
At a high level, the steps outlined here will create, enable, and help secure the file share witness resource for the cluster.
- Connect to one of the cluster nodes through Remote Desktop, and
then use an account that has local administrative access to log
on.
- Follow the procedures from the Exchange 2007 Online Help
topic How
to Configure the Node and File Share Majority Quorum.
Cluster Validation
In Windows Server 2008, the way that clusters are qualified has changed significantly with the introduction of the Validate a Configuration Wizard. This wizard is a new feature that is integrated into failover clustering in Windows Server 2008. With the cluster validation wizard, you can run a set of focused tests on a collection of servers that you intend to use as nodes in a cluster. This cluster validation process tests the underlying hardware and software to obtain an accurate assessment of how well failover clustering can be supported on a given configuration. In fact, a cluster validation report is required by Microsoft Customer Support Services (CSS) as a condition of Microsoft supporting a given configuration. For more information about the validation process, see the Windows Server 2008 Online Help topic, Failover Cluster Step-by-Step Guide: Validating Hardware for a Failover Cluster.
- Connect to one of the cluster nodes by using Remote Desktop,
and then log on with an account that has local administrative
access.
- Follow the procedures in the Exchange 2007 Online Help
topic, How
to Validate a Windows Server 2008 Failover Cluster
Configuration.
Handoff Test
- Connect to one of the cluster nodes through Remote Desktop, and
then use an account that has local administrative access to log
on.
- Open an administrative Command Prompt window.
- Type the following command, where <Cluster Name Object>
references the cluster network name:
Copy Code cluster <Cluster Name Object> group "Cluster Group" /move
- Verify that the return response indicates that the Cluster
Group is online.
Exchange Installation
The following CD media are required for this section:
- Microsoft Exchange 2007 DVD
- Exchange 2007 Configuration DVD
Clustered Mailbox Server Computer Object Creation
This section assumes that the guidelines in the Windows Server Security Hardening Guide were followed.
- Connect to the active cluster node through Remote Desktop, and
then log on by using an account that has privileges to create
computer objects in the desired organizational unit within
Active Directory.
- Click Start, point to Administrative Tools, and
then click Active Directory Users & Computers.
- Connect to the domain that will contain the clustered Mailbox
server.
- On the View menu, click Advanced Features.
- Expand Member Servers, and then expand Clustered
Mailbox Servers.
- Right-click Clustered Mailbox Servers, point to
New, and then click Computer.
- In the Computer Name box, type the name of the clustered
Mailbox server. For example, type E2K7-MBX-01.
- Click Next two times.
- Click Finish.
- Right-click the computer object that you created in step 6, and
then click Properties.
- On the Security tab, make sure that the Cluster Name
Object (CNO) has Full Control on the clustered Mailbox server
computer object.
- Close Active Directory Users & Computers, and then
log off the system.
Exchange 2007 Installation - Active Node
- Connect to the first node in the cluster through Remote
Desktop, and then log on by using an account that has local
administrative access and that has been delegated the Exchange
Server Administrator role (or higher).
- Follow either the command line or setup GUI procedure from the
Exchange 2007 Online Help topic How to Install the
Active Clustered Mailbox Role in a CCR Environment on Windows
Server 2008.
Exchange 2007 Installation – Passive Node
- Connect to the second node in the cluster through Remote
Desktop, and then log on by using an account that has local
administrative access and that has been delegated the Exchange
Server Administrator role (or higher).
- Follow either the command line procedure or the Setup GUI
procedure from the Exchange 2007 Online Help
topic How
to Install the Passive Clustered Mailbox Role in a CCR Environment
on Windows Server 2008.
Handoff Test
In Exchange 2007, moving resources between nodes should be handled by using the Exchange Management Shell instead of the Cluster Administrator program or the Cluster.exe program.
- Connect to an Exchange 2007 server through Remote Desktop,
and then log on by using an account that has been delegated the
Exchange Server Administrator role (or higher).
- Click Start, click All Programs, click
Microsoft Exchange Server 2007, and then click Exchange
Management Shell.
- Move the clustered Mailbox server. To do this, run the
following command in the Exchange Management Shell, where
<CMSName> is the name of the clustered Mailbox server and
<ServerNode2> is the name of the passive node in the
cluster:
Copy Code Move-ClusteredMailboxServer <CMSName> -TargetMachine <ServerNode2> -MoveComment "Handoff test"
- Verify that the clustered mailbox server is online and ready.
To do this, run the following command:
Copy Code Get-ClusteredMailboxServerStatus <CMSName>
- Repeat steps 3 through 4 to move the resources back to the
active node (now the passive node).
Exchange Server 2007 Post-SP1 Roll-up Installation
Install all hotfixes that are released since Exchange Server 2007 Service Pack 1 (SP1). All hotfixes are installed by using a batch file. To view a sample hotfix list, see the Exchange Help topic Server Build DVD - Sample Hotfix List.
- Connect to the server through Remote Desktop, and then use an
account that has local administrative access to log on.
- Insert the Exchange 2007 Configuration DVD in the DVD
drive.
- Move to the E2K7-PostSP1 folder, and then double-click
E2K7-postsp1.bat.
- Click Yes if any Digital Signature not Found
dialog boxes open.
Note: These dialog boxes will not appear in environments that have not deployed the Windows Security templates. - Wait for all file copies to complete, and then restart the
server.
- Repeat steps 1 through 5 on the passive node.
Exchange Search Configuration
- Connect to the server through Remote Desktop, and then log on
by using an account that has local administrative access.
- Follow the instructions that are in How to Register IFilters
2.0 with Exchange 2007 and Exchange 2010.
- If you want to search through PDF files, install the Adobe PDF iFilter 9 for 64-bit platforms,
and then follow the instructions that are mentioned in the Adobe
document Configuring PDF iFilter for MS Exchange
Server 2007.
The third-party Web site information in this topic is provided to help you find the technical information you need. The URLs are subject to change without notice.
Clustered Mailbox Server DNS Tuning
- Connect to the server through Remote Desktop, and then use an
account that has local administrative access to log on.
- Follow the procedures from the Exchange 2007 Online Help
topic How to
Configure the DNS TTL Value for a Clustered Mailbox Server Network
Name Resource.
First Storage Group Configuration
Use the following table to obtain the information that is needed for the commands.
Important: |
---|
The values in the following table are sample values and are not recommended. Update these values to reflect the actual values for your organization. |
First storage group information
Old | New example | |
---|---|---|
Storage Group Name |
First Storage Group |
SG1 |
Database Name |
Mailbox Database |
<CMSName> MBX Store 1 |
Storage Group Path |
<Exchange Install Path>\Mailbox\First Storage Group |
L:\LOG01 |
Database Path |
<Exchange Install Path>\Mailbox\First Storage Group |
E:\MDB01 |
Database Filename |
Mailbox database.edb |
Priv01.edb |
- Connect to the server through Remote Desktop, and then log on
by using an account that has local administrative access and that
has been delegated the Exchange Server Administrator role (or
higher).
- Click Start, click All Programs, click
Microsoft Exchange Server 2007, and then click Exchange
Management Shell.
- In Exchange Management Shell, run the following command
to suspend replication, where <CMSName> is the name of the
clustered Mailbox server:
Copy Code Suspend-StorageGroupCopy "<CMSName>\First Storage Group"
- Run the following command to unmount the database, where
<CMSName> is the name of the clustered mailbox server:
Copy Code Dismount-Database "<CMSName>\First Storage Group\Mailbox Database"
- To change the Storage Group name from “First Storage Group” to
“SG1,” run the following command, where <DCName> is the name
of a domain controller:
Copy Code Set-StorageGroup "<CMSName>\<Old SG Name>" -Name <New SG Name> -DomainController <DCName>
- To change the mailbox database name from “Mailbox Database” to
“<CMSName> MBX Store 1,” run the following command:
Copy Code Set-MailboxDatabase "<CMSName>\<New SG Name>\<Old DB Name>" -Name "<New DB Name>" -DomainController <DCName>
- To change the location of the storage group’s transaction logs,
run the following command:
Copy Code Move-StorageGroupPath "<CMSName>\<New SG Name>" -LogFolderPath:<New SG Location> -SystemFolderPath:<New SG Path> -DomainController <DCName> -ConfigurationOnly
- To change the location of the mailbox database, run the
following command:
Copy Code Move-DatabasePath "<CMSName>\<New SG Name>\<New DB Name>" -EdbFilePath:<New DB Path\New DB FileName> -DomainController <DCName> -ConfigurationOnly
- Move the files (database, logs, and checkpoint files) to their
new locations on both the active node and the passive node.
- To mount the database, run the following command:
Copy Code Mount-Database "<CMSName>\<New SG Name>\<New DB Name>" -DomainController <DCName>
- To restart replication, run the following command:
Copy Code Resume-StorageGroupCopy "<CMSName>\<New SG Name>"
Product Key Configuration
- Connect to the server through Remote Desktop, and then log on
by using an account that has local administrative access and that
is delegated the Exchange Organization Administrator role.
- Follow the procedure that is outlined in the Exchange 2007
Online Help topic How to Enter the Product
Key.
Security Configuration Wizard
This section is optional and may be skipped.
- Connect to the server through Remote Desktop, and then use an
account that has local administrative access to log on.
- Follow the procedures from the Exchange 2007 Online Help
topic How to
Install the Security Configuration Wizard to install the
Security Configuration Wizard.
- Follow the procedures from the Exchange 2007 Online Help
topic How to
Register Exchange Server Role SCW Extensions to register the
Exchange 2007 Edge Transport server SCW extension.
- Follow the procedures from the Exchange 2007 Online Help
topic How to
Create a New Exchange Server Role SCW Policy to configure and
apply the policy.
System Performance Verification
By default, Exchange 2007 optimizes the server’s memory management for programs. Follow these steps to configure the server’s system cache as the default size. Mailbox servers will benefit from this configuration.
- Connect to the server through Remote Desktop, and then use an
account that has local administrative access to log on.
- Click Start, right-click Computer, and then click
Properties.
- Click Advanced system settings.
- On the Advanced tab, under Performance, click
Settings.
- On the Advanced tab, verify that the Processor
scheduling is set to Background services.
- Verify that the Memory Usage is set to System
Cache.
- Click OK.
- Repeat steps 1 through 5 on the second node in the cluster.
Cluster Failover Tuning
CCR provides an attribute for Mailbox servers that you can use to control unscheduled outage recovery behavior. The AutoDatabaseMountDial attribute has the following three possible values: Lossless, Good Availability, and Best Availability.
- Lossless
When the attribute is set to Lossless, the system waits for the failed node to come back online before databases are mounted. Even then, the failed system must return with all the logs that can be accessed, and they must not be corrupted. After the failure, the passive node is made active, and the Information Store is brought online. It checks whether the databases can be mounted without any data loss. If they can, the databases are mounted. If the databases cannot be mounted without any data loss, the system periodically tries to copy the logs. If the server returns and its logs are intact, the databases will mount. If the server returns and its logs are not intact, the remaining logs will not be available, and the affected databases will not mount.
- Good Availability
When the attribute is set to Good Availability, full automatic recovery is provided when replication is operating correctly and it is replicating logs at the rate that they are being generated.
- Best Availability
By default, the value is set to Best Availability. Best Availability operates similarly to Good Availability. However, it enables automatic recovery when the replication experiences slightly more latency. Therefore, the new active node might be slightly further behind the state of the old active node after the failover. This increases the possibility that database divergence occurs, and requires a full re-seed to correct.
Note By default, CCR is configured to use Best Availability. Typically, this setting should not be changed. Therefore, this section may be skipped.
Test Mailbox Creation
Several of the diagnostics tasks that are used to monitor Exchange require test mailboxes to be created on the Mailbox servers. For more information about how to use the Test script to create the test mailboxes, see the Monitoring for Agentless Servers topic in the Exchange 2007 Online Help.
- Connect to the Exchange 2007 Mailbox server through Remote
Desktop, and then log on by using an account that has local
administrative access and that is delegated the Exchange Server
Administrator role (or higher).
- Click Start, click All Programs, click
Microsoft Exchange Server 2007, and then click Exchange
Management Shell.
- In Exchange Management Shell, change the directory path
to <Exchange Server Install Path>\Scripts.
- Type New-TestCasConnectivityUser.ps1, and then press
ENTER.
- Enter a temporary password, and then follow the prompts to
create the test mailboxes.
Exchange Server Role Configuration
Records Management Server Configuration
This section can be skipped if messaging records management (MRM) will not be enabled in the environment. For more information about how to deploy MRM, see the Deploying Messaging Records Management topic in the Exchange 2007 Online Help.
- Connect to an Exchange 2007 server through Remote Desktop,
and then log on by using an account that has local administrative
access and that is delegated the Exchange Server Administrator role
(or higher).
- Click Start, click All Programs, click
Microsoft Exchange Server 2007, and then click Exchange
Management Shell.
- To enable the managed folder assistant, run the following
command in the Exchange Management Shell, where <ServerName>
is the name of the mailbox server and <DCName> is the name of
a domain controller:
Copy Code Set-MailboxServer <ServerName> -LogPathForManagedFolders <LogPath> -ManagedFolderAssistantSchedule <AssistantSchedule> -LogFileAgeLimitForManagedFolders <LogFileAgeLimit> -LogDirectorySizeLimitForManagedFolders <LogDirSizeLimit> -LogFileSizeLimitForManagedFolders <LogFileSizeLimit> -FolderLogForManagedFoldersEnabled <LogFolderEnabled> -SubjectLogForManagedFoldersEnabled <SubjectLogEnabled> -RetentionLogForManagedFoldersEnabled <RetentionLogEnabled> -JournalingLogForManagedFoldersEnabled <JournalLogEnabled> -DomainController <DCName>
Note: |
---|
Use the appropriate table from Server Configuration Appendix at the end of this topic to obtain the information that you must have to run the commands. |
Message Tracking Server Configuration
This section can be skipped if the default Message Tracking parameters are appropriate for the environment.
- Connect to an Exchange 2007 server through Remote Desktop,
and then log on by using an account that has local administrative
access and that was delegated the Exchange Server Administrator
role (or higher).
- Click Start, click All Programs, click
Microsoft Exchange Server 2007, and then click Exchange
Management Shell.
- To configure message tracking settings, run the following
command in the Exchange Management Shell, where <ServerName>
is the name of the Mailbox server and <DCName> is the name of
a domain controller:
Copy Code Set-MailboxServer <ServerName> -MessageTrackingLogPath <LogPath> -MessageTrackingLogMaxAge <MaxAge> -MessageTrackingLogMaxDirectorySize <LogDirSize> -MessageTrackingLogMaxFileSize <LogFileSize> -MessageTrackingLogSubjectLoggingEnabled <SubjectLogEnabled> -DomainController <DCName>
Note: |
---|
Use the appropriate table from the Server Configuration Appendix at the end of this topic to obtain the information that you must have to run the commands. |
Additional Storage Groups
- Connect to an Exchange 2007 server through Remote Desktop,
and then log on by using an account that has local administrative
access and that is delegated the Exchange Server Administrator role
(or higher).
- Click Start, click All Programs, click
Microsoft Exchange Server 2007, and then click Exchange
Management Shell.
- Use the appropriate table from the Database / Log LUN Appendix
and Database Configuration Appendix at the end of this topic to
obtain the information that you must have to run the commands.
- To create the Storage Group, run the following command in the
Exchange Management Shell, where <CMSName> is the name of the
clustered mailbox server and <DCName> is the name of a domain
controller:
Copy Code New-StorageGroup -Server <CMSName> -Name <SG> -LogFolderPath <Transaction Log Location> -SystemFolderPath <Transaction Log Location> -DomainController <DCName>
- To create the database that resides within the storage group,
run the following command:
Copy Code New-MailboxDatabase -StorageGroup "<CMSName>\<SG Name>" -Name "<DB Name>" -DomainController <DCName> -OfflineAddressBook <OfflineAddressBook> -PublicFolderDatabase <PFDatabase> | Set-MailboxDatabase -IssueWarningQuota <WarningQuota> -ProhibitSendQuota <SendQuota> -ProhibitSendReceiveQuota <SendReceiveQuota> -MailboxRetention <dd.hh:mm:ss> -DeletedItemRetention <dd.hh:mm:ss> -MaintenanceSchedule <MaintenanceSchedule> -QuotaNotificationSchedule <QuotaSchedule> -RetainDeletedItemsUntilBackup <RetainDeletedItemsUntilBackup> -EdbFilePath:<FullPathIncludingDatabaseFileName>
- To mount the database, run the following command:
Copy Code Mount-Database "<CMSName>\<SG>\<Database Name>" -DomainController <DCName>
- Repeat steps 3 through 6 for each database that must be
created.
Server Configuration Appendix
Records Management Configuration
The following table is a sample configuration that can be applied to the Mailbox server, depending on requirements.
Important: |
---|
The values in the following table are sample values, not
recommended values. Update these values to reflect the actual
values for your organization. |
Records management configuration
Default value | Sample value | |
---|---|---|
Server Name |
<CMSName> |
<CMSName> |
Log Path For Managed Folders |
<Exchange Install Path>\Logging\Managed Folder Assistant |
D:\Exchsrvr\Logging\Managed Folder Assistant |
Log File Age Limit For Managed Folders |
00:00:00 |
7.00:00:00 |
Log Directory Size Limit For Managed Folders |
unlimited |
5 GB |
Log File Size Limit For Managed Folders |
10 MB |
10 MB |
Retention Log For Managed Folders Enabled |
False |
True |
Journaling Log For Managed Folders Enabled |
False |
False |
Folder Log For Managed Folders Enabled |
False |
True |
Subject Log For Managed Folders Enabled |
False |
True |
Managed Folder Assistant Schedule |
Never Run |
“Sun.6:00 PM-Sun.7:45 PM”, “Mon.6:00 PM-Mon.7:45 PM”, “Tue.6:00 PM-Tue.7:45 PM”, “Wed.6:00 PM-Wed.7:45 PM”, “Thu.6:00 PM-Thu.7:45 PM”, “Fri.6:00 PM-Fri.7:45 PM”, “Sat.6:00 PM-Sat.7:45 PM” |
Message Tracking Configuration
The following table is a sample configuration that can be applied to the Mailbox server, depending on requirements.
Important: |
---|
The values in the following table are sample values, not recommended values. These values must be updated to reflect the actual values for your organization. |
Message tracking configuration
Default value | Sample value | |
---|---|---|
Server Name |
<CMSName> |
< CMSName > |
Message Tracking Log Path |
<Exchange Install Path>\TransportRoles\Logs\MessageTracking |
d:\exchsrvr\MessageTracking |
Message Tracking Log Enabled |
True |
True |
Message Tracking Log Max Age |
30.00:00:00 |
10.00:00:00 |
Message Tracking Log Max Directory Size |
250 MB |
20 GB |
Message Tracking Log Max File Size |
10 MB |
10 MB |
Message Tracking Log Subject Logging Enabled |
True |
True |
Database / Log LUN Appendix
When you use continuous replication, you do not have to perform daily full backups because the storage group copy provides the first line of defense against corruption and data loss. Therefore, there are two approaches to how backups can be performed in a continuous replication environment.
- Use streaming backup to perform a full backup of 1/7th of the
databases and incremental or differential backups for the rest.
- Use Volume Shadow Copy Service (VSS) to perform backups.
Because of the backup methodology selected, the LUN layout has to be altered.
Database / Log LUN Layout - 1/7th Approach
When you use streaming backups, we recommend that you separate streaming I/O (source and target) so that multiple storage groups that are being backed up concurrently do not compete for the same disk resources. Whether the target is disk or tape, there will be a throughput limit on the physical disks and controllers that is unique to each hardware solution. You may have to isolate some storage groups from one another to maximize the number of concurrent backup operations, to increase throughput, and to minimize the size of the backup window.
You can run streaming backups concurrently, one from each LUN, if you isolate your storage group LUNs from one another. The backup jobs should complete on the first storage group on each LUN before the second storage group begins the back up process, isolating the backup streams. Two streaming backup jobs on the same physical disks may not be twice as fast, but it should be faster than a single streaming backup job with regard to the megabytes per second.
A backup set is the number of databases that are fully backed up in a night. A solution that performs a full backup on 1/7th of the databases nightly could reduce complexity by adding all the storage groups to be backed up on the same log and database LUN. This can reduce the number of LUNs on the server.
Some benefits of this strategy include the following:
- Simplified storage administration and fewer LUNs to manage.
- A potential reduction in the number of backup jobs.
Some concerns with this strategy include the following:
- It limits the ability to take hardware-based VSS backup and
restores.
- The 2-terabyte limit on a master boot record (MBR) partition
would limit how far this would scale in capacity.
- A capacity or corruption problem on a single LUN could affect
more than one storage group.
1/7th approach LUN design
SG Name | Database Name | Database Location | Database File Name | Transaction Log Location |
---|---|---|---|---|
SG1 |
<CMSName> MBX Store 1 |
E:\MDB01 |
Priv01.edb |
L:\LOG01 |
SG2 |
<CMSName> MBX Store 2 |
E:\MDB02 |
Priv02.edb |
L:\LOG02 |
SG3 |
<CMSName> MBX Store 3 |
E:\MDB03 |
Priv03.edb |
L:\LOG03 |
SG4 |
<CMSName> MBX Store 4 |
E:\MDB04 |
Priv04.edb |
L:\LOG04 |
SG5 |
<CMSName> MBX Store 5 |
E:\MDB05 |
Priv05.edb |
L:\LOG05 |
SG6 |
<CMSName> MBX Store 6 |
E:\MDB06 |
Priv06.edb |
L:\LOG06 |
SG7 |
<CMSName> MBX Store 7 |
E:\MDB07 |
Priv07.edb |
L:\LOG07 |
SG8 |
<CMSName> MBX Store 8 |
F:\MDB08 |
Priv08.edb |
M:\LOG08 |
SG9 |
<CMSName> MBX Store 9 |
F:\MDB09 |
Priv09.edb |
M:\LOG09 |
SG10 |
<CMSName> MBX Store 10 |
F:\MDB10 |
Priv10.edb |
M:\LOG10 |
SG11 |
<CMSName> MBX Store 11 |
F:\MDB11 |
Priv11.edb |
M:\LOG11 |
SG12 |
<CMSName> MBX Store 12 |
F:\MDB12 |
Priv12.edb |
M:\LOG12 |
SG13 |
<CMSName> MBX Store 13 |
F:\MDB13 |
Priv13.edb |
M:\LOG13 |
SG14 |
<CMSName> MBX Store 14 |
F:\MDB14 |
Priv14.edb |
M:\LOG14 |
SG15 |
<CMSName> MBX Store 15 |
G:\MDB15 |
Priv15.edb |
N:\LOG15 |
SG16 |
<CMSName> MBX Store 16 |
G:\MDB16 |
Priv16.edb |
N:\LOG16 |
SG17 |
<CMSName> MBX Store 17 |
G:\MDB17 |
Priv17.edb |
N:\LOG17 |
SG18 |
<CMSName> MBX Store 18 |
G:\MDB18 |
Priv18.edb |
N:\LOG18 |
SG19 |
<CMSName> MBX Store 19 |
G:\MDB19 |
Priv19.edb |
N:\LOG19 |
SG20 |
<CMSName> MBX Store 20 |
G:\MDB20 |
Priv20.edb |
N:\LOG20 |
SG21 |
<CMSName> MBX Store 21 |
G:\MDB21 |
Priv21.edb |
N:\LOG21 |
SG22 |
<CMSName> MBX Store 22 |
H:\MDB22 |
Priv22.edb |
O:\LOG22 |
SG23 |
<CMSName> MBX Store 23 |
H:\MDB23 |
Priv23.edb |
O:\LOG23 |
SG24 |
<CMSName> MBX Store 24 |
H:\MDB24 |
Priv24.edb |
O:\LOG24 |
SG25 |
<CMSName> MBX Store 25 |
H:\MDB25 |
Priv25.edb |
O:\LOG25 |
SG26 |
<CMSName> MBX Store 26 |
H:\MDB26 |
Priv26.edb |
O:\LOG26 |
SG27 |
<CMSName> MBX Store 27 |
H:\MDB27 |
Priv27.edb |
O:\LOG27 |
SG28 |
<CMSName> MBX Store 28 |
H:\MDB28 |
Priv28.edb |
O:\LOG28 |
SG29 |
<CMSName> MBX Store 29 |
I:\MDB29 |
Priv29.edb |
P:\LOG29 |
SG30 |
<CMSName> MBX Store 30 |
I:\MDB30 |
Priv30.edb |
P:\LOG30 |
SG31 |
<CMSName> MBX Store 31 |
I:\MDB31 |
Priv31.edb |
P:\LOG31 |
SG32 |
<CMSName> MBX Store 32 |
I:\MDB32 |
Priv32.edb |
P:\LOG32 |
SG33 |
<CMSName> MBX Store 33 |
I:\MDB33 |
Priv33.edb |
P:\LOG33 |
SG34 |
<CMSName> MBX Store 34 |
I:\MDB34 |
Priv34.edb |
P:\LOG34 |
SG35 |
<CMSName> MBX Store 35 |
I:\MDB35 |
Priv35.edb |
P:\LOG35 |
SG36 |
<CMSName> MBX Store 36 |
J:\MDB36 |
Priv36.edb |
Q:\LOG36 |
SG37 |
<CMSName> MBX Store 37 |
J:\MDB37 |
Priv37.edb |
Q:\LOG37 |
SG38 |
<CMSName> MBX Store 38 |
J:\MDB38 |
Priv38.edb |
Q:\LOG38 |
SG39 |
<CMSName> MBX Store 39 |
J:\MDB39 |
Priv39.edb |
Q:\LOG39 |
SG40 |
<CMSName> MBX Store 40 |
J:\MDB40 |
Priv40.edb |
Q:\LOG40 |
SG41 |
<CMSName> MBX Store 41 |
J:\MDB41 |
Priv41.edb |
Q:\LOG41 |
SG42 |
<CMSName> MBX Store 42 |
J:\MDB42 |
Priv42.edb |
Q:\LOG42 |
SG43 |
<CMSName> MBX Store 43 |
K:\MDB43 |
Priv43.edb |
R:\LOG43 |
SG44 |
<CMSName> MBX Store 44 |
K:\MDB44 |
Priv44.edb |
R:\LOG44 |
SG45 |
<CMSName> MBX Store 45 |
K:\MDB45 |
Priv45.edb |
R:\LOG45 |
SG46 |
<CMSName> MBX Store 46 |
K:\MDB46 |
Priv46.edb |
R:\LOG46 |
SG47 |
<CMSName> MBX Store 47 |
K:\MDB47 |
Priv47.edb |
R:\LOG47 |
SG48 |
<CMSName> MBX Store 48 |
K:\MDB48 |
Priv48.edb |
R:\LOG48 |
SG49 |
<CMSName> MBX Store 49 |
K:\MDB49 |
Priv49.edb |
R:\LOG49 |
Database / LUN Layout – VSS Approach
The Volume Shadow Copy Service (VSS) in Windows Server 2008 is used by applications to back up and restore Exchange 2007. VSS provides an infrastructure that enables third-party storage management programs, business programs, and hardware providers to cooperate in creating and managing shadow copies. Solutions based on this infrastructure can use shadow, or mirrored, copies to back up and restore one or more Exchange 2007 databases.
VSS coordinates communication between Requestors (backup applications), Writers (applications in Windows, such as Exchange 2007), and Providers (system components, software components, or hardware components that create the shadow copies). To use VSS to back up Exchange 2007, a backup program must include an Exchange 2007-aware VSS Requestor. The Windows Server Backup program that is part of Windows Server 2008 does not include an Exchange -aware VSS Requestor. Therefore, you must use a third-party backup program to back up Exchange 2007 on a Windows Server 2008-based computer.
Note: |
---|
The Windows Server Backup program also does not support the Exchange 2007 Extensible Storage Engine streaming APIs. Therefore, you cannot use Windows Server Backup to back up Exchange 2007. |
For more information about VSS and Exchange 2007, see the Exchange Online Help topic Exchange 2007 Data Backup and Volume Shadow Copy Services.
When you use continuous replication, Exchange 2007 can run a software VSS snapshot not just on the active copy but also on the passive copy. Taking a VSS snapshot on the passive copy offloads the disk I/O from the active LUN during both the checksum integrity (ESEUTIL) and during the subsequent copy to tape or disk. This feature also frees more time on the active LUNs to run online maintenance, MRM, and other tasks.
Creating two LUNs (log and database) for a storage group is the standard best practice for Exchange 2003. With Exchange 2007, in the maximum case of 50 storage groups, the number of LUNs you provision will depend on your backup strategy. If your recovery time objective (RTO) is very small or if you use VSS clones for fast recovery, it may be best to put each storage group on its own transaction log LUN and database LUN. Because doing this will exceed the number of available drive letters, you must use volume mount points.
Some benefits of this strategy include the following:
- Enables hardware-based VSS at a storage group level, providing
single storage group backup and restore.
- Flexibility to isolate the performance between storage groups
when not sharing spindles between LUNs.
- Increased reliability. A capacity or corruption problem on a
single LUN will only affect one storage group.
Some concerns with this strategy include the following:
- Using continuous replication together with 50 storage groups
could require 200 LUNs. This configuration would exceed some
storage array maximums. CCR solutions could have 100 LUNs on each
node, whereas LCR could have all 200 LUNs presented to a single
server.
- A separate LUN for each storage group causes more LUNs per
server. This increases the administrative costs and complexity.
Note: |
---|
In the following table, MP represents Mount Point. |
VSS approach LUN design
SG Name | Database Name | Database Location | Database File Name | Transaction Log Location |
---|---|---|---|---|
Anchor LUN |
-- |
E:\ |
-- |
L:\ |
SG1 |
<CMSName> MBX Store 1 |
MP:\MDB01 |
Priv01.edb |
MP:\LOG01 |
SG2 |
<CMSName> MBX Store 2 |
MP:\MDB02 |
Priv02.edb |
MP:\LOG02 |
SG3 |
<CMSName> MBX Store 3 |
MP:\MDB03 |
Priv03.edb |
MP:\LOG03 |
SG4 |
<CMSName> MBX Store 4 |
MP:\MDB04 |
Priv04.edb |
MP:\LOG04 |
SG5 |
<CMSName> MBX Store 5 |
MP:\MDB05 |
Priv05.edb |
MP:\LOG05 |
SG6 |
<CMSName> MBX Store 6 |
MP:\MDB06 |
Priv06.edb |
MP:\LOG06 |
SG7 |
<CMSName> MBX Store 7 |
MP:\MDB07 |
Priv07.edb |
MP:\LOG07 |
SG8 |
<CMSName> MBX Store 8 |
MP:\MDB08 |
Priv08.edb |
MP:\LOG08 |
SG9 |
<CMSName> MBX Store 9 |
MP:\MDB09 |
Priv09.edb |
MP:\LOG09 |
SG10 |
<CMSName> MBX Store 10 |
MP:\MDB10 |
Priv10.edb |
MP:\LOG10 |
SG11 |
<CMSName> MBX Store 11 |
MP:\MDB11 |
Priv11.edb |
MP:\LOG11 |
SG12 |
<CMSName> MBX Store 12 |
MP:\MDB12 |
Priv12.edb |
MP:\LOG12 |
SG13 |
<CMSName> MBX Store 13 |
MP:\MDB13 |
Priv13.edb |
MP:\LOG13 |
SG14 |
<CMSName> MBX Store 14 |
MP:\MDB14 |
Priv14.edb |
MP:\LOG14 |
SG15 |
<CMSName> MBX Store 15 |
MP:\MDB15 |
Priv15.edb |
MP:\LOG15 |
SG16 |
<CMSName> MBX Store 16 |
MP:\MDB16 |
Priv16.edb |
MP:\LOG16 |
SG17 |
<CMSName> MBX Store 17 |
MP:\MDB17 |
Priv17.edb |
MP:\LOG17 |
SG18 |
<CMSName> MBX Store 18 |
MP:\MDB18 |
Priv18.edb |
MP:\LOG18 |
SG19 |
<CMSName> MBX Store 19 |
MP:\MDB19 |
Priv19.edb |
MP:\LOG19 |
SG20 |
<CMSName> MBX Store 20 |
MP:\MDB20 |
Priv20.edb |
MP:\LOG20 |
SG21 |
<CMSName> MBX Store 21 |
MP:\MDB21 |
Priv21.edb |
MP:\LOG21 |
SG22 |
<CMSName> MBX Store 22 |
MP:\MDB22 |
Priv22.edb |
MP:\LOG22 |
SG23 |
<CMSName> MBX Store 23 |
MP:\MDB23 |
Priv23.edb |
MP:\LOG23 |
SG24 |
<CMSName> MBX Store 24 |
MP:\MDB24 |
Priv24.edb |
MP:\LOG24 |
SG25 |
<CMSName> MBX Store 25 |
MP:\MDB25 |
Priv25.edb |
MP:\LOG25 |
SG26 |
<CMSName> MBX Store 26 |
MP:\MDB26 |
Priv26.edb |
MP:\LOG26 |
SG27 |
<CMSName> MBX Store 27 |
MP:\MDB27 |
Priv27.edb |
MP:\LOG27 |
SG28 |
<CMSName> MBX Store 28 |
MP:\MDB28 |
Priv28.edb |
MP:\LOG28 |
SG29 |
<CMSName> MBX Store 29 |
MP:\MDB29 |
Priv29.edb |
MP:\LOG29 |
SG30 |
<CMSName> MBX Store 30 |
MP:\MDB30 |
Priv30.edb |
MP:\LOG30 |
SG31 |
<CMSName> MBX Store 31 |
MP:\MDB31 |
Priv31.edb |
MP:\LOG31 |
SG32 |
<CMSName> MBX Store 32 |
MP:\MDB32 |
Priv32.edb |
MP:\LOG32 |
SG33 |
<CMSName> MBX Store 33 |
MP:\MDB33 |
Priv33.edb |
MP:\LOG33 |
SG34 |
<CMSName> MBX Store 34 |
MP:\MDB34 |
Priv34.edb |
MP:\LOG34 |
SG35 |
<CMSName> MBX Store 35 |
MP:\MDB35 |
Priv35.edb |
MP:\LOG35 |
SG36 |
<CMSName> MBX Store 36 |
MP:\MDB36 |
Priv36.edb |
MP:\LOG36 |
SG37 |
<CMSName> MBX Store 37 |
MP:\MDB37 |
Priv37.edb |
MP:\LOG37 |
SG38 |
<CMSName> MBX Store 38 |
MP:\MDB38 |
Priv38.edb |
MP:\LOG38 |
SG39 |
<CMSName> MBX Store 39 |
MP:\MDB39 |
Priv39.edb |
MP:\LOG39 |
SG40 |
<CMSName> MBX Store 40 |
MP:\MDB40 |
Priv40.edb |
MP:\LOG40 |
SG41 |
<CMSName> MBX Store 41 |
MP:\MDB41 |
Priv41.edb |
MP:\LOG41 |
SG42 |
<CMSName> MBX Store 42 |
MP:\MDB42 |
Priv42.edb |
MP:\LOG42 |
SG43 |
<CMSName> MBX Store 43 |
MP:\MDB43 |
Priv43.edb |
MP:\LOG43 |
SG44 |
<CMSName> MBX Store 44 |
MP:\MDB44 |
Priv44.edb |
MP:\LOG44 |
SG45 |
<CMSName> MBX Store 45 |
MP:\MDB45 |
Priv45.edb |
MP:\LOG45 |
SG46 |
<CMSName> MBX Store 46 |
MP:\MDB46 |
Priv46.edb |
MP:\LOG46 |
SG47 |
<CMSName> MBX Store 47 |
MP:\MDB47 |
Priv47.edb |
MP:\LOG47 |
SG48 |
<CMSName> MBX Store 48 |
MP:\MDB48 |
Priv48.edb |
MP:\LOG48 |
SG49 |
<CMSName> MBX Store 49 |
MP:\MDB49 |
Priv49.edb |
MP:\LOG49 |
SG50 |
<CMSName> MBX Store 50 |
MP:\MDB50 |
Priv50.edb |
MP:\LOG50 |
Database Configuration Appendix
The following table describes a configuration that can be applied to each database that is created or customized for each database on a server, depending on requirements.
Important: |
---|
The values in the following table are sample values, not recommended values. These values must be updated to reflect the actual values for your organization. |
Database configuration
Default value | Sample value | |
---|---|---|
Database Name |
<CMSName> MBX Store xx |
<CMSName> MBX Store xx |
Offline Address Book |
Default Offline Address List |
Default Offline Address List |
Public Folder Database |
<PublicFolderServer> PUB Store xx |
<PublicFolderServer> PUB Store xx |
Warning Quota |
1945 MB |
1700000 KB |
Send Quota |
2 GB |
1900000 KB |
Send Receive Quota |
2355 MB |
2090000 KB |
Maintenance Schedule |
{Sun.1:00 AM-Sun.5:00 AM, Mon.1:00 AM-Mon.5:00 AM, Tue.1:00 AM-Tue.5:00 AM, Wed.1:00 AM-Wed.5: 00 AM, Thu.1:00 AM-Thu.5:00 AM, Fri.1:00 AM-Fri.5:00 AM, Sat.1:00 AM-Sat.5:00 AM} |
“Sun.12:00 AM-Sun.4:00 AM”, “Mon.12:00 AM-Mon.4:00 AM”, “Tue.12:00 AM-Tue.4:00 AM”, “Wed.12:00 AM-Wed.4:00 AM”, “Thu.12:00 AM-Thu.4:00 AM”, “Fri.12:00 AM-Fri.4:00 AM”, “Sat.12:00 AM-Sat.4:00 AM” |
Quota Notification Schedule |
{Sun.1:00 AM-Sun.1:15 AM, Mon.1:00 AM-Mon.1:15 AM, Tue.1:00 AM-Tue.1:15 AM, Wed.1:00 AM-Wed.1:15 AM, Thu.1:00 AM-Thu.1:15 AM, Fri.1:00 AM-Fri.1:15 AM, Sat.1:00 AM-Sat.1:15 AM} |
“Sun.12:00 AM-Sun.12:15 AM”, “Mon.12:00 AM-Mon.12:15 AM”, “Tue.12:00 AM-Tue.12:15 AM”, “Wed.12:00 AM-Wed.12: 15 AM”, “Thu.12:00 AM-Thu.12:15 AM”, “Fri.12:00 AM-Fri.12:15 AM”, “Sat.12:00 AM-Sat.12:15 AM” |
Mailbox Retention |
30.00:00:00 |
30.00:00:00 |
Deleted Item Retention |
14.00:00:00 |
14.00:00:00 |
Retain Deleted Items Until Backup |
False |
True |