Академический Документы
Профессиональный Документы
Культура Документы
and Managing
Exchange Server 2003
Contents
Overview 1
Lesson: Creating and Applying Exchange
Policies 2
Lesson: Configuring Exchange Server 2003
for Proactive Management 20
Lesson: Adding, Removing, and Updating
Exchange Servers 47
Lesson: Managing Exchange Server 2003
in a Mixed Environment 56
Discussion: Configuring and Managing
Exchange Server 2003 59
Information in this document, including URL and other Internet Web site references, is subject to
change without notice. Unless otherwise noted, the example companies, organizations, products,
domain names, e-mail addresses, logos, people, places, and events depicted herein are fictitious,
and no association with any real company, organization, product, domain name, e-mail address,
logo, person, place, or event is intended or should be inferred. Complying with all applicable
copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part
of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted
in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or
for any purpose, without the express written permission of Microsoft Corporation.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual
property rights covering subject matter in this document. Except as expressly provided in any
written license agreement from Microsoft, the furnishing of this document does not give you any
license to these patents, trademarks, copyrights, or other intellectual property.
Microsoft, MS-DOS, Windows, Windows NT, Windows Server, ActiveSync, ActiveX, Active
Directory, Hotmail, MSDN, MSN, Outlook, PowerPoint, Visual Basic, and Windows Media are
either registered trademarks or trademarks of Microsoft Corporation in the United States and/or
other countries.
The names of actual companies and products mentioned herein may be the trademarks of their
respective owners.
Module 2: Configuring and Managing Exchange Server 2003 iii
Instructor Notes
Presentation: This module teaches students how to configure and manage a newly installed
65 minutes computer running Microsoft® Exchange Server 2003 by using the tools in
Exchange Server 2003 and in the Microsoft Windows Server™ 2003 family.
Practices:
95 minutes After completing this module, students will be able to:
! Create and apply Exchange policies to simplify administration.
! Configure Exchange Server 2003 to proactively manage server
performance.
! Add, remove, and update Exchange servers.
! Manage Exchange Server 2003 in a mixed environment.
Required materials To teach this module, you need the following materials:
! Microsoft PowerPoint® file 2400B_02.ppt
! Module 2 video file 2400B_02_v05.wmv
Classroom setup The classroom should be set up to use Connectix Virtual PC software, as
discussed in the Manual Classroom Setup Guide. No additional classroom setup
is needed.
iv Module 2: Configuring and Managing Exchange Server 2003
Tip When this icon appears on the lower-right corner of a slide, it indicates
that students must complete an inline practice before you move on to the next
slide:
Practices Some practices in this module require initial startup time. Consider having
students perform the initial step in these practices before you begin the lecture
on the related content. If a practice begins with a procedure titled “To prepare
for this practice,” then it requires initial startup time.
How to Create and Apply Use this slide to discuss the high-level steps of the task. Then have the students
System Policies complete the inline practice and answer any questions that they have.
Students will not create a server policy at this time. A server policy will be
created later in this module in the How to Enable Message Tracking topic.
How to Remove and Explain when it is necessary to perform these tasks. Then use this slide to
Override System discuss the high-level steps of the task. Have the students complete the inline
Policies practice and answer any questions that they have.
Recipient Policy Discuss multiple policies and their priority. Then discuss query and search
Priorities and Search criteria. Use the animated slide to show an example of what happens to the
Criteria default policy when an additional policy is applied to users in one office
location.
How to Create and Use this slide to discuss the high-level steps of the task. Then have the students
Configure Recipient complete the inline practice and answer any questions that they have.
Policies
How to Configure Use this animated slide to help explain what notifications are and to discuss the
Notifications high-level steps of the task. Then have the students complete the inline practice
and answer any questions that they have.
How to Configure Describe the performance console snap-ins. Use the slide to discuss the high-
Performance Monitoring level steps of the task. Then have the students complete the inline practice and
Using the Performance answer any questions that they have.
Console
How to Configure Alerts Use this animated slide to help explain what alerts are and to discuss the high-
Using Performance Logs level steps of the task. The slide shows a message queue growing. When the
and Alerts message queue reaches the threshold configured for the alert, which is 25
messages in this scenario, an alert is automatically generated and sent to the
administrator.
Have the students complete the inline practice and answer any questions that
they have.
How to Enable Message Explain when this task is necessary. Use this animated slide to show what
Tracking message tracking is, what message tracking logs are, and to discuss the high-
level steps of the task. The animated slide shows a message being sent, which
causes the message tracking log file to be updated with information as
displayed in the tracking log graphic.
Have the students complete the inline practice and answer any questions that
they have. If the students are interested, you may want to discuss how message
tracking is performed in Exchange 2003. For information about how message
tracking is performed, see the Exchange 2003 online Help documentation.
How to Configure Use this animated slide to explain what protocol logging is, what protocols are
Protocol Logging supported by Exchange, and to discuss the high-level steps of the task. The
animated slide shows what happens when Simple Mail Transfer Protocol
(SMTP) logging is enabled. In the animated slide, a user establishes an SMTP
session with their Exchange server. This causes the SMTP protocol log to be
updated with information as indicated in the log file graphic. The animated
slide then displays what protocols can be logged to a file, and finishes with the
high-level steps for enabling protocol logging on a virtual server.
Have the students complete the inline practice and answer any questions that
they have.
Module 2: Configuring and Managing Exchange Server 2003 vii
Assessment
Assessment questions for this module are located on the Student Materials
compact disc. You can use the assessment questions in whatever way you think
is best for your students. For example, you can use them as pre-assessments to
help students identify areas of difficulty, or you can use them as post-
assessments to validate learning. Consider using the questions to reinforce
learning at the end of the day or at the beginning of the next day. If you choose
not to use the assessment questions during class, show students where the
questions are located so that they can use them to assess their own learning
outside of class.
Module 2: Configuring and Managing Exchange Server 2003 1
Overview
Note This module describes how to configure and manage a newly installed
computer running Exchange Server 2003 by using the tools in Exchange
Server 2003 and in the Microsoft Windows Server™ 2003 family. For
information about the final tasks to perform to set up a new Exchange server in
your organization, see Module 3, “Securing Exchange Server 2003,” in
Course 2400, Implementing and Managing Microsoft Exchange Server 2003.
What are recipient Recipient policies are policies that you apply to recipient objects such as users,
policies? groups, contacts, and folders. These policies can control how e-mail addresses
are configured for recipient objects as well as enforce e-mail retention settings.
Exchange includes a default recipient policy that automatically generates e-mail
addresses for mail-enabled Exchange objects, including the Simple Mail
Transfer Protocol (SMTP) address that the can be used to send e-mail to a
recipient. Recipient policies must be configured for every SMTP domain for
which Exchange will be required to accept incoming SMTP messages.
Recipient policies appear in Exchange System Manager in the Recipient
Policies container of the Recipient object.
6 Module 2: Configuring and Managing Exchange Server 2003
When to use recipient Unlike system policies, recipient policies are not necessarily linked to servers or
policies stores. As a result, you can use recipient policies to simplify administration
regardless of the number of Exchange servers, mailbox stores, and public folder
stores that you have in your organization. There are two common uses for
recipient policies:
! Use recipient policies to apply e-mail addresses for Active Directory
recipient objects. For example, the organization Northwind Traders recently
acquired Contoso, Ltd. All users in the former Contoso, Ltd. organization
must continue to receive messages at their @contoso.msft SMTP address.
The users must also be able to receive e-mail at their new @nwtraders.msft
SMTP address. Messages that are generated by all users must display
@nwtraders.msft as the Reply To address. In this case, the administrator
would define a recipient policy for the former Contoso, Ltd. personnel that
includes a primary SMTP address of @nwtraders.msft and a secondary
SMTP address of @contoso.msft.
! Use recipient policies to apply mailbox management settings for Active
Directory mailbox-enabled user objects. For example, the organization
Northwind Traders defines its employee job titles in Active Directory. The
administrator wants to configure Exchange to purge the Deleted Items
folder of all employees that are not executives when items in the Deleted
Items folder are 30 days old. To do so, she can create a recipient policy that
queries Active Directory for users whose job title is not equal to Executive
and then configure the policy to purge deleted items that are 30 days old.
8 Module 2: Configuring and Managing Exchange Server 2003
The detailed steps for creating a System Policies container are included in the
practice at the end of this topic.
Module 2: Configuring and Managing Exchange Server 2003 9
To avoid system policy Because you can apply only one system policy tab to a server or store object at
conflicts any given time, you should configure system policies so that each system policy
controls the settings on just one tab. You can apply multiple system policies to
the same object only when there is no conflict in the tabs that these system
policies control. If conflicts occur, you must remove the original conflicting
system policy before applying the new system policy. For example, if you have
two mailbox store policies with the Limits tab configured, you can apply only
one policy to a specific mailbox store. However, if you have two mailbox store
policies—one with the Limits tab configured and the other with the Database
tab configured—both policies can be applied to the same mailbox store.
Note It is a best practice to grant and restrict permissions for policy creation by
configuring Exchange Administrator permissions on the administrative groups
in which your System Policies containers reside. This ensures that only a few
designated administrators are able to create policies. Additionally, Exchange
administrators should have two Active Directory accounts: one that is their
primary user account and a second account that is only used to perform
administrative functions. Administrative functions should be performed by
using the Run As command with the administrative account.
Practice: Creating a In this practice, you will read a message from your team lead, Samantha Smith,
System Policies and then create a System Policies container.
container
Important You must complete this practice to complete other practices in this
course.
Note This procedure may take five minutes to complete before you can
continue.
10 Module 2: Configuring and Managing Exchange Server 2003
The detailed steps for creating a system policy container are included in the
practice at the end of this topic.
To apply a system policy After you create a system policy, you must apply it to the appropriate object.
When you apply a system policy, it takes effect immediately. Users do not need
to log off for the system policy to take effect.
The high-level steps to apply a system policy are as follows:
1. In Exchange System Manager, browse to the system policy that you want to
apply.
2. Using the context menu for the policy, click Add Mailbox Store for a
mailbox store policy, click Add Public Store for a public store policy, or
click Add Server for a server policy.
12 Module 2: Configuring and Managing Exchange Server 2003
3. To apply the system policy to the object, locate and select the appropriate
object name.
4. Use the Policies tab of the object to verify that a policy has been applied to
the object. The Policies tab displays which policies have been applied to the
object and which tabs are controlled by the policy.
The detailed steps to apply a system policy are included in the practice that
follows.
Practice: Creating and In this practice, you will read an e-mail message and an attachment from your
applying system policies team lead, Samantha Smith, and then create a public store policy and a mailbox
store policy. You will create a server policy later in this module.
Important To complete this practice, you must first complete the practice
entitled “Practice: Creating a System Policies container,” in Module 2,
“Configuring and Managing Exchange Server 2003,” in Course 2400,
Implementing and Managing Microsoft Exchange Server 2003.
12. Right-click Public Folder Store (LONDON) and then click Properties.
13. In the Public Folder Store (LONDON) Properties dialog box, click
Policies.
14. On the Policies tab, verify that the Public Store Storage Limits Policy is
applied to the store, and then click OK.
You just created a policy that limits storage for a public folder. What
would you have to do to create a policy that defines the replication
settings for a public folder store?
When creating the policy, you would need to select the Replication
check box instead of the Limits check box. This would enable you
to configure the replication properties of a public folder store
policy.
13. In the Mailbox Store (LONDON) Properties dialog box, click Policies.
14. On the Policies tab, verify that the Mailbox Store Storage Limits Policy is
applied to the store, and then click OK.
Note Removing a system policy from an object does not remove the settings
that were applied to the object. To modify the settings of an object after
removing a policy, you must use the object’s property pages.
Why override a system Depending on their business functions, some users in your organization may
policy? require that their mailboxes to be configured differently from the rest of the
users on the same mailbox store. You may also need to configure a small
number of folders differently from the rest of the folders on the same public
folder store. In both situations, you must override the system policies.
To override a system To override a mailbox store policy, you can either override policy settings
policy manually on each mailbox or move the users to a different mailbox store that
has the correct settings applied to it. To override a public store policy, you can
override policy settings on each folder or move the folders to a different public
folder store that has the correct settings applied to it.
16 Module 2: Configuring and Managing Exchange Server 2003
The detailed steps to create and configure a recipient policy are included in the
practice at the end of this topic.
18 Module 2: Configuring and Managing Exchange Server 2003
To configure e-mail You use the E-Mail Addresses (Policy) tab to define primary and secondary
address settings e-mail addresses, which are used by external users to send messages to users in
your Exchange organization. If you create multiple e-mail addresses of the
same type in a recipient policy, the first one created is the primary e-mail
address for that address type. The primary address appears in the Reply To
field of messages that users send outside of your Exchange organization. Each
subsequent e-mail address defined in the policy is a secondary address for that
address type.
Use the variables in the following table to define e-mail address values in your
recipient policy.
Variable Value
By default, the SMTP address uses the alias of the recipient to define the left
side of the SMTP address. You can override this default by using variables. For
example, say that the default SMTP address for users is alias@domainname. To
generate the SMTP address firstname.lastname@domainname, you can create a
new recipient policy that specifies the SMTP address value as follows:
%g.%s@domainname
Practice: Creating and In this practice, you will read an e-mail message and an attachment from your
applying recipient team lead, Samantha Smith, and then create and apply a recipient policy.
policies
! To prepare for this practice
1. If it is not already open, open Outlook Web Access by using Internet
Explorer to open the URL http://london/exchange/londonadmin.
2. Read the message with the subject “Configuring Exchange” from your team
lead, Samantha Smith.
3. Read the attachment entitled rpolicydetail.doc.
You have just created a policy that cleans messages out of all user
inboxes that are only one day old. What is a more realistic
configuration of the mailbox manager settings in a recipient policy?
Answers will vary.
20 Module 2: Configuring and Managing Exchange Server 2003
Note For more information about stores and storage groups, see Module 11,
“Managing Data Storage and Hardware Resources,” in Course 2400,
Implementing and Managing Microsoft Exchange Server 2003.
The detailed steps to create a store are included in the practice at the end of this
topic.
To create a storage The high-level steps to create a storage group are as follows:
group
1. In the console tree of Exchange System Manager, locate the server in which
you want to create the storage group.
2. Use the context menu for the server to create a new storage group.
The detailed steps to create a storage group are included in the practice at the
end of this topic.
22 Module 2: Configuring and Managing Exchange Server 2003
Guidelines for creating Follow these guiding principles when you create stores:
stores
! Create multiple small mailbox stores or public folder stores instead of
having one large store. Smaller stores allow for faster restore than large
stores, which minimizes the impact of store failures and restores on users.
! Create multiple smaller stores to maximize backup efficiency. You can
estimate the maximum time it will take to perform a backup of each store
based on the speed at which your backup hardware performs in megabytes
per hour. You can then constrain your stores to a maximum size limit, which
allows you to back up all stores in a storage group within the time that you
have allocated for backups each night.
! Create a designated mailbox store for users who require priority service
and fast restore. However, having a designated store for a single user is not
recommended because the increased administrative cost outweighs the
benefits.
! Place information that requires content indexing in a separate mailbox
store or public folder store and enable content indexing for that store. This
can minimize indexing overhead.
! Place similar users, such as users in the same department, in the same
mailbox store. Users in the same department or other groups of similar users
tend to use Reply All or send large attachments to each other. If you place
these similar users together, you maximize single-instance message storage,
which minimizes disk space requirements. This also provides you with
improved administrative control.
! Place data that requires different restore criteria in different mailbox or
public folder stores. This allows for improved administrative control over
data. For example, you may have different restore guidelines for executive
mailboxes, so those mailboxes should be in a separate store.
! Consolidate dedicated servers, such as mailbox-only, public folders-only, or
NNTP-only servers, into a single server. This will improve manageability.
Guidelines for creating Follow these guiding principles when you create storage groups:
storage groups
! Ensure that each storage group has its own dedicated drive for transaction
log files. This allows for faster server performance.
! In a hosting scenario, when possible, host multiple companies on the same
server, with each company having its own partition or drive, storage
groups, transaction log files, public folders, and so on. This allows for
improved administrative control. You should keep different companies in
separate storage groups, because this will keep all transaction logs for each
company separate from each other. Hosting companies in the same storage
group will result in all transactions for each company sharing the same set
of transaction logs, which may cause billing or legal issues for your
customers.
! Place stores requiring the same backup schedule in the same storage group
and use the storage group as a unit for backup. This allows for improved
administrative control.
Module 2: Configuring and Managing Exchange Server 2003 23
Practice: Creating a new In this practice, you will create a new storage group and a new mailbox store.
storage group and a new Complete the following steps:
store
1. In Exchange System Manager, in the console tree, expand
Northwind Traders (Exchange)\Administrative Groups\
First Administrative Group\Servers, right-click London, point to New,
and then click Storage Group.
2. In the Properties dialog box, on the General tab, in the Name box, type
Executive SG and then click OK.
3. In the console tree, right-click Executive SG, point to New, and then click
Mailbox Store.
4. In the Properties dialog box, in the Name box, type Executive Mailbox
Store and click OK. Then, click Yes to mount the store, and click OK.
5. In the console tree, verify that the London server now contains the
Executive SG storage group and that the Executive SG storage group
contains the Executive Mailbox Store.
You just created a new storage group to contain the Executive mailbox
store. What reason do you think your team lead had for asking you to
place this new mailbox store in a new storage group, rather than in the
default storage group?
The most likely reason to create a new storage group in this
situation is if you have different backup requirements for the
executives.
24 Module 2: Configuring and Managing Exchange Server 2003
Default public Identify a public folder store that is physically close to the server
folder store on which the mailbox store is defined. This minimizes network
traffic when clients download the public folder list from the default
public folder store each time they expand the All Public Folders
container.
Archive all Enable this option if you have a legal requirement to retain all
messages sent or messages that are handled by a mailbox store. When you enable
received by this option, you must also specify a mailbox that will store all the
mailboxes on this messages that are archived. For security purposes, this archive
store mailbox should be located on a dedicated, secure server rather than
on a mailbox server.
Note For more information about client access to public folders, see Module 5,
“Managing Public Folders,” in Course 2400, Implementing and Managing
Microsoft Exchange Server 2003.
Module 2: Configuring and Managing Exchange Server 2003 25
The Database tab Configure the items on the Database tab as described in the following table.
Item How to configure it
Note For more information about disk configuration, see Module 11,
“Managing Data Storage and Hardware Resources,” in Course 2400,
Implementing and Managing Microsoft Exchange Server 2003.
26 Module 2: Configuring and Managing Exchange Server 2003
The Limits tab Configure the items on the Limits tab as described in the following table.
Item How to configure it
• Issue warning at Identify the maximum size that each mailbox will be allowed
(KB) on your hard disk and set that to be the Prohibit send and
• Prohibit send at receive at (KB) amount. This number should be based on the
(KB) maximum size of your mailbox store. It should allow you to
perform full online backups within the time that is allocated
• Prohibit send and each night. As a courtesy to your users, issue a warning before
receive at (KB) their mailboxes reach this hard limit.
Warning message Identify the time of day that Exchange will send warning
interval messages to users whose mailbox storage exceeds the limits
defined. In general, one warning per day is adequate. The
warning should occur outside of your regular business hours.
Keep deleted items Configure this item to a number that is reasonable for your
for (days) environment, because Exchange does not support individual
item recovery from backup media. Because deleted items
occupy space on your hard disk and are not included in
mailbox limits, you may want to leave this at the default seven
days. Be prepared to adjust this number according to user
needs and hardware use.
Keep deleted Configure this item to be a value that is reasonable for your
mailboxes for (days) environment, because mailbox recovery is not supported from
backup media. Because deleted mailboxes occupy space on
your hard disk, you may want to leave this at the default 30
days. Be prepared to adjust this number according to user
needs and hardware use.
Do not permanently When this option is enabled, no information will ever be lost
delete mailboxes and before it is backed up. Set this option and implement a nightly
items until the store backup schedule, except for situations in which you are not
has been backed up responsible for recovering user data.
Module 2: Configuring and Managing Exchange Server 2003 27
Note For more information about disk configuration, see Module 11,
“Managing Data Storage and Hardware Resources,” in Course 2400,
Implementing and Managing Microsoft Exchange Server 2003.
28 Module 2: Configuring and Managing Exchange Server 2003
The Replication tab Configure the items on the Replication tab as described in the following table.
Item How to configure it
Replication By default, the replication interval is the span of time in which folders
interval that are scheduled to replicate will actually be replicated, or copied, to
other servers. Set this to a value that is appropriate for the type of
content in your folders and the network bandwidth available between
public folder servers. You can override this schedule for each public
folder if necessary.
Replication This determines when replication updates will be sent to other servers
interval for that maintain replicas of folders. If the interval is set to “Always,” you
always can define how often updates will be sent. The default is every 15
(minutes) minutes.
Replication By default, the replication message size limit is 300 kilobytes (KB).
message size However, if the replication messages must go through connectors that
limit (KB) have size limits, then you should set the replication message size limit
to be smaller than the connector limit.
Note For more information about setting replication intervals, see Module 5,
“Managing Public Folders,” in Course 2400, Implementing and Managing
Microsoft Exchange Server 2003.
The Limits tab Configure the items on the Limits tab as described in the following table.
Item How to configure it
• Issue warning Identify the maximum size that each folder will be allowed on your
at (KB) hard disk and set that to be the Prohibit post at (KB) amount. This
• Prohibit post number should be based on the maximum size of your public folder
at (KB) store. As a courtesy to the folder owners, set Exchange to issue a
warning well in advance of this hard limit.
Maximum item Identify the maximum item size to prevent users from posting large
size (KB) files. For example, if most of the items that you expect to see
posted are Microsoft Word documents that occupy less than 500
KB, then set this value to be 1,000 KB.
Warning message Identify the time of day that Exchange will send warning messages
interval to folder owners whose folder storage exceeds the defined limits. In
general, one warning per day is adequate. The warning should
occur outside of your regular business hours.
Keep deleted Configure this item to be a value that is reasonable for your
items for (days) environment, because Exchange does not support individual item
recovery from backup media. Because deleted items occupy space
on your hard disk and are not included in folder storage limits, you
may want to leave this at the default 7 days. Be prepared to adjust
this number according to user needs and hardware use.
Do not You should only need to enable this option if you have just one
permanently public folder server in your organization. In general, the
delete items until availability of public stores should be managed by using
the store has been replication, not backups. If replication is configured correctly, the
backed up only time that you must back up public stores is when you want to
remove transaction log files.
Module 2: Configuring and Managing Exchange Server 2003 29
Guidelines for setting You should configure Exchange to monitor the performance of additional
thresholds for additional resources and services that are crucial to the proper functioning of Exchange.
resources and services You should define the threshold or critical level for a resource and configure a
that Exchange monitors notification to appear when the threshold is reached. The following table shows
these additional resources and provides guidelines for setting their respective
thresholds.
Resource Guideline for setting the threshold
Available virtual memory Set warning and critical thresholds for available virtual
memory. Virtual memory should not fall below 25
percent free on an Exchange server for any length of
time.
CPU Utilization Set warning and critical limits for CPU usage over a
sustained period. CPU usage should not exceed 80
percent over 5 minutes.
Free disk space Set warning and critical levels for available space on a
volume. Monitor the volumes used for system binaries,
Exchange Server databases, and Exchange Server
transaction logs. Configure the monitor to issue a warning
when a drive has less than 100 megabytes (MB) of disk
space remaining and to issue a critical alert when a drive
has less than 25 MB of disk space remaining.
SMTP queue growth Set thresholds for continuous queue growth. Messages
that stay in the queue for longer than five minutes may
indicate a problem with a connector.
Windows 2000 service Identify additional services in Windows that you want to
monitor. Identify whether each service being stopped is
considered to be in a warning or critical state.
X.400 queue growth Set thresholds for continuous queue growth. Messages
that stay in the queue for longer than five minutes may
indicate a problem with a connector. This queue should
be empty for any environment that only uses SMTP to
connect to other messaging systems.
To monitor additional The high-level steps to monitor the additional resources beyond the default
resources and services resources are as follows:
1. Use Exchange System Manager to locate the appropriate server.
2. Open the server’s Properties dialog box.
3. Use the Monitoring tab to add a resource or service to monitor.
The detailed steps to monitor additional resources are included in the practice
that follows.
Module 2: Configuring and Managing Exchange Server 2003 31
Practice: Configuring In this practice, you will configure resource monitoring on your Exchange
resource monitoring on server. Complete the following steps:
an Exchange server
1. In Exchange System Manager, in the console tree, right-click London, and
then click Properties.
2. In the London Properties dialog box, click Monitoring.
3. On the Monitoring tab, click Add.
4. In the Add Resource dialog box, click SMTP queue growth, and then
click OK.
5. In the SMTP Queue Thresholds dialog box, select the Critical state
(minutes) check box, type 5 and then click OK.
6. In the London Properties dialog box, click OK.
7. In the console tree, expand Tools, expand Monitoring and Status, and then
click Status.
Note This step may take several minutes to complete before you can
continue.
8. In the details pane, verify that London Status is indicated as Critical: Queue
growth.
Why is the London status indicated as critical for queue growth?
There is another server in the organization named Miami. Miami is
not currently running, so all messages for Miami are queued on
London.
The detailed steps to configure notifications are included in the practice that
follows.
Module 2: Configuring and Managing Exchange Server 2003 33
Practice: Configuring In this practice, you will configure Exchange to send notifications to you.
notifications by using Complete the following steps:
Exchange System
Manager 1. In Exchange System Manager, in the console tree, expand Tools, expand
Monitoring and Status, right-click Notifications, point to New, and then
click E-mail notification.
2. In the Properties dialog box, click Select.
3. In the Select Exchange Server dialog box, in the Enter the object name to
select (examples) box, type London and then click OK.
4. In the Properties dialog box, in the To box, type LondonAdmin and then
click OK.
5. In the console tree, click Notifications. In the details pane, verify that a
notification is listed for London that indicates an action of
Mailto:LondonAdmin.
What will happen when the London Information Store service enters a
critical state?
London will attempt to send an e-mail notification to
LondonAdmin. However, because the LondonAdmin account is on
the London server, the message will not be received. Message
delivery to local recipients is dependent on the Information Store
service. Instead, you should either configure the notification to be
sent to a recipient on a different server, or you should configure a
script notification that notifies you by using a mechanism other
than e-mail.
34 Module 2: Configuring and Managing Exchange Server 2003
Note If you monitor only Exchange performance objects and counters, you
will not have complete information about the condition of your Exchange
server. You must also monitor your Windows 2000 Server and
Windows Server 2003 for possible performance issues.
Exchange performance To ensure the performance of your Exchange server, monitor the objects in the
objects following table.
Object Description
Counters to monitor the The following table lists the Exchange store objects and the counters that you
Exchange store objects can use to monitor these objects.
Object Counter
Notes For more information about Recipient Update Service, search for the
article “How the Recipient Update Service populates Address Lists” on the
Product Support Services page of the Microsoft Web site at
http://support.microsoft.com/.
For information about what objects and counters in Windows you should
monitor in conjunction with Exchange objects and counters, search for
“Chapter 27 – Overview of Performance Monitoring,” which is part of the
Windows 2000 Professional Resource Kit on the TechNet page of the Microsoft
Web site at http://www.microsoft.com/technet.
36 Module 2: Configuring and Managing Exchange Server 2003
Note You can also use Microsoft Operations Manager to automate the
monitoring of servers and applications. The Microsoft Operations Manager
Management Pack for Exchange includes key performance metrics to monitor
the overall performance of Exchange and to alert you to critical performance
issues. For more information about Microsoft Operations Manager and the
Management Pack for Exchange, see the Microsoft Operations Manager Web
site at http://www.microsoft.com/mom/.
Module 2: Configuring and Managing Exchange Server 2003 37
To log objects and The high-level steps to log objects and counters are as follows:
counters
1. Open the Performance console.
2. Expand Performance Logs and Alerts to locate Counter Logs.
3. Use the context menu to create a new log file.
4. In the dialog box for the new log, add the performance objects and counters
and configure the logging schedule.
5. In the details pane of Counter Logs, use the context menu of the log file to
start the logging.
Logging automatically begins as soon as you create the log file or when the
start time that you specify on the schedule’s tab equals the current time. To stop
the log file manually, you can use the log file’s context menu. Detailed steps for
logging objects and counters are included in the practice that follows.
Practice: Configuring In this practice, you will read an e-mail message and an attachment from your
performance logs team lead, Samantha Smith, and then configure the Performance console to
monitor Exchange objects and counters.
(continued)
Object Counter
Memory Pages/sec
LogicalDisk %Free Space
Free Megabytes
7. After you have added all of these objects and counters, in the Add
Counters dialog box, click Close.
8. In the London Stores dialog box, on the General tab:
a. In the Interval box, type 1
b. In the Units box, click minutes, and then click Log Files.
9. On the Log Files tab, in the Log file type box, click Text File (Tab
delimited), and then click Configure.
10. In the Configure Log Files dialog box, click Limit of, type 5 and then click
OK.
11. In the London Stores dialog box, click Yes to create the C:\PerfLogs
folder, and then click OK.
12. In the console tree, click Counter Logs. In the details pane, verify that the
log named London Stores is green. This indicates that the log is started. If
the log is not started, right-click London Stores and then click Start.
To configure alerts The high-level steps to configure alerts in Performance Logs and Alerts are as
follows:
1. Open the Performance console, and then open Performance Logs and
Alerts.
2. Use the Alerts context menu to create a new alert.
3. Configure the new alert by adding counters, configuring thresholds,
configuring the data sampling rate, configuring the schedule during which
you want the alert to be operational, and defining actions that occur when an
alert is triggered.
The detailed steps to configure alerts by using Performance Logs and Alerts are
included in the practice that follows.
40 Module 2: Configuring and Managing Exchange Server 2003
Practice: Configuring In this practice, you will use the Performance console to configure alerts.
alerts by using Complete the following steps:
Performance Logs and
Alerts 1. In Performance, in the console tree, right-click Alerts, and then click New
Alert Settings.
2. In the New Alert Settings dialog box, type London Send Queue Alert and
then click OK.
3. In the London Send Queue Alert dialog box, on the General tab, click
Add.
4. In the Add Counters dialog box, in the Performance object box, click
MSExchangeIS Mailbox, verify that Send Queue Size is selected, click
Add, and then click Close.
5. In the London Send Queue Alert dialog box, in the Limit box, type 25 and
then click the Action tab.
6. On the Action tab, select the Send a network message to check box, type
LondonAdmin in the corresponding box, and then click OK.
7. In the Performance console tree, click Alerts. Verify that the London Send
Queue Alert is green. This indicates that the alert is started.
8. Close Performance.
Why did your team lead choose 25 as the limit for the London send
queue alert?
The threshold for this value should be determined based on your
existing performance baseline and the level of service that you
provide to your employees. Using this information, the team lead
decided that there should never be more than 24 messages waiting
to be sent out from the London server and that if there was more
than that amount, there must be a problem with some component
of the messaging environment.
Module 2: Configuring and Managing Exchange Server 2003 41
What are message When you enable message tracking on a server running Exchange,
tracking logs? Exchange creates a set of logs in a shared folder named servername.log (where
servername is the name of the Exchange server on which you enabled message
tracking). A new message tracking log file is created each day. Information
about messages that are handled by the server that day is recorded in the
corresponding log file.
You can configure message tracking to record information about the sender, the
message, the recipient, and the subject line of the message. By default,
Exchange does not display message subjects in message logs. If you want
message subjects to be visible during message tracking on both the SMTP and
MAPI queues, you can enable subject logging. You may need this information
if you want to trace a message back to its source to troubleshoot delivery
problems.
42 Module 2: Configuring and Managing Exchange Server 2003
Note To track messages, administrators have permission to view the log files.
If you have enabled subject logging, administrators will be able to read the
message subjects. This may be a security consideration in your environment.
To redirect message By default, message tracking logs are stored on the Exchange installation drive.
tracking log storage The size and number of these logs can increase considerably over time. You
may want to change the location of the message tracking logs to accommodate
the size requirements. To move message tracking logs:
1. Open Exchange System Manager and locate the Exchange server that has
the message logs that you want to move.
2. On that server, open the Properties dialog box and then use the General tab
to select the directory in which you want to store the message tracking logs.
Practice: Configuring In this practice, you will read an e-mail message and an attachment from your
message tracking team lead, Samantha Smith, and then create and apply a policy that enables
message tracking on your server.
You would like to create a policy that configures all servers to monitor
all Exchange services. How can you accomplish this?
You cannot do this. The only configuration that a server policy can
control is message tracking.
44 Module 2: Configuring and Managing Exchange Server 2003
(continued)
Protocol Description
To configure protocol You can use a virtual server to host different protocols on the same physical
logging for virtual server. During installation, Exchange creates a default virtual server for each
servers supported protocol. Each virtual server has a unique network name and IP
address. Clients connect to a virtual server the same way that they would
connect to a physical server. To configure protocol logging for SMTP and
NNTP virtual servers:
1. In Exchange System Manager, select the appropriate virtual server from the
Protocols container of the server.
2. Open the Properties dialog box on the virtual server.
3. Use the General tab to enable logging.
4. Set the protocol logging level, log format, logging frequency, and other log
file information.
Note You can also enable diagnostic logging for POP3 and IMAP4. For more
information, search for “Chapter 4 – Enterprise Monitoring,” which is part of
the Exchange 2000 Server Operations Guide on the TechNet page of the
Microsoft Web site at http://www.microsoft.com/technet/.
Practice: Configuring In this practice, you will configure SMTP logging on your server. To do this,
SMTP logging complete the following steps:
1. In Exchange System Manager, in the console tree, expand LONDON,
expand Protocols, and then click SMTP.
2. In the console tree, right-click Default SMTP Virtual Server, and then
click Properties.
3. In the Default SMTP Virtual Server Properties dialog box, on the
General tab, select the Enable logging check box.
4. In the Active log format box, select Microsoft IIS Log File Format from
the list, and then click OK.
5. On the desktop, click Start, click Run, type cmd and then click OK.
6. At the command prompt, type telnet London 25 and then press ENTER.
7. In Telnet London, type helo and then press ENTER
8. In Telnet London, type quit and then press ENTER.
46 Module 2: Configuring and Managing Exchange Server 2003
9. In Windows Explorer, use Notepad to open the SMTP log file located at
C:\windows\system32\logfiles\smtpsvc1. Verify that the log file is
generated and that the helo and quit commands that you sent to the SMTP
virtual server were logged.
10. Close Microsoft Notepad, close Windows Explorer, and then close the
command prompt window.
Note To create multiple virtual servers for a specific protocol, you must
uniquely identify each virtual server. To do this, you must specify a unique
TCP port and address combination for each server running that protocol.
Protocols and their The following table shows the default and secure TCP ports that are associated
associated TCP ports with the protocols supported in Exchange Server 2003.
Protocol Default port Secure port
To create an additional The high-level steps for creating an additional virtual server are as follows:
virtual server
1. Use Exchange System Manager to locate the physical server on which you
want to add an additional virtual server.
2. Open the protocol that the new virtual server will provide.
3. Use the context menu of the protocol to create the new virtual server.
4. Configure the default settings for the virtual server by using the wizard.
To move public folders 1. Use Exchange System Manager to replicate the folders
and system folders to to the new server.
another Exchange server 2. After replication is complete, confirm that the replica
in the routing group folders are synchronized with the source folders.
To move all mailboxes • Use either Exchange System Manager or Exchange Task
to another server Wizard in Active Directory Users and Computers.
To remove the server • Run the Exchange Setup program to uninstall the server
from Active Directory and remove it from Active Directory.
Note For more information about public folder replication, see Module 5,
“Managing Public Folders,” in Course 2400, Implementing and Managing
Microsoft Exchange Server 2003.
52 Module 2: Configuring and Managing Exchange Server 2003
Notes For more information about SRS, search for “Chapter 6, Deployment
Strategies” which is part of the Microsoft Exchange Server 2000 Resource Kit
on the TechNet page of the Microsoft Web site at
http://www.microsoft.com/technet/.
For more information about routing groups, see Module 9, “Managing
Routing,” in Course 2400, Implementing and Managing Microsoft Exchange
Server 2003.
54 Module 2: Configuring and Managing Exchange Server 2003
Where to find updates You can download Exchange updates from the Exchange Server page of the
Microsoft Web site at http://www.microsoft.com/exchange/downloads and from
the Microsoft Product Support Services page at http://support.microsoft.com.
Module 2: Configuring and Managing Exchange Server 2003 55
Best practices for Follow these best practices when applying a hotfix or service pack:
applying product
updates ! Use a change control process to manage the process from start to finish.
! Read all related documentation before applying any update.
! Apply updates only on an as-needed basis.
! Test the updates on a representative test environment before deploying the
update.
! Install the update in such a way that it can be uninstalled when necessary.
! Maintain consistency across all domain controllers whenever possible.
! Have a working backup and schedule production downtime.
! Create a backout plan that allows the system to return to its original state.
! Forewarn Help Desk and key user groups before you apply a hotfix or
service pack.
! Schedule periodic updates to avoid being more than two service packs
behind.
! Deploy updates on non-critical servers first and then move to primary
servers.
Note For more information about the best practices for applying product
updates, search for “Best Practices for Applying Service Packs, Hotfixes and
Security Patches” on the TechNet page of the Microsoft Web site at
http://www.microsoft.com/technet/.
Practice: Applying a In this practice, you will search www.microsoft.com\exchange for current
hotfix product updates and hotfixes.
Exchange 2000 tools If you use Exchange 2000 tools to manage Exchange in a mixed environment,
and their limitations you are limited to the feature set that Exchange 2000 offered. For example, you
will not be able to use the enhanced Exchange System Manager features,
including moving and deleting mailboxes, viewing the content of public folders,
searching public folders, and using the Mailbox Recovery Center. To use these
features, you must use Exchange System Manager in Exchange Server 2003.
Module 2: Configuring and Managing Exchange Server 2003 59
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
60 Module 2: Configuring and Managing Exchange Server 2003
Scenario 2 You are a messaging administrator. You want to be notified when there are
problems with your Exchange server. You want to be able to predict when you
might have problems with your Exchange server. And you want to be able to
find out all the servers that have processed any given message. What should
you do?
Configure service and resource monitoring and notifications by using
Exchange System Manager, configure message tracking by using Exchange
System Manager, and configure protocol logging by using Exchange
System Manager. You configure service and resource monitoring and
notifications by using Exchange System Manager so that you can be
notified when Exchange services enter warning or critical states. You
should also configure message tracking on all server objects to maximize
your ability to locate messages that failed to transfer. Configure protocol
logging so that information processed by SMTP, NNTP, POP3 and/or
IMAP4 is logged. To predict when your server might have problems, you
should configure performance monitoring and alerts by using Performance
Console, and you should review the log files regularly. Exchange System
Manager does not allow you to configure performance monitoring and
alerts.
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
Module 2: Configuring and Managing Exchange Server 2003 61
Scenario 3 You want to configure your Exchange server to transmit SMTP data over the
Internet securely to your branch offices. However, you want to continue to be
able to receive standard SMTP messages from unknown senders on the Internet.
What should you do?
Create a secondary SMTP virtual server. Configure this virtual server to
encrypt data sent outbound, and require incoming messages to be
encrypted. Use the connection control dialog box to identify the hosts at
your branch offices that you want to communicate securely with. If you
require different configurations for the same protocol on a single server
running Exchange, you can configure multiple virtual servers for that
protocol. Consider creating multiple virtual servers for a protocol when
you need to supply different encryption methods for different groups of
users or if you want to segregate traffic for the same protocol over different
ports. You can further control the way SMTP messages are handled by
using SMTP connectors.
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
Scenario 4 You are the messaging administrator for a company that uses Exchange 2000.
Security is of the utmost concern for you. Currently, you have Key
Management Service deployed to allow messaging users to digitally sign and
encrypt messages. You believe that this is a crucial service for your users. You
are considering upgrading to Exchange Server 2003. Given your understanding
of the features of Exchange Server 2003, how should you proceed with the
upgrade?
Because Exchange Server 2003 does not support Key Management Service,
and Key Management Service provides a critical service to your users, you
should only upgrade the Exchange 2000 servers that are not providing the
Key Management Service to your users until you are able to implement a
public key infrastructure (PKI). Also, because you cannot use Exchange
System Manager in Exchange Server 2003 to manage the Key Management
Service, you must continue to use the Exchange 2000 version of Exchange
System Manager to manage the Key Management Service.
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
THIS PAGE INTENTIONALLY LEFT BLANK