Installation Guide Template - Cluster Continuous Replication (Windows Server 2008)
Microsoft Exchange Server 2007 will reach end of support on April 11, 2017. To stay supported, you will need to upgrade. For more information, see Resources to help you upgrade your Office 2007 servers and clients.
Applies to: Exchange Server 2007 SP1, Exchange Server 2007 SP2, Exchange Server 2007 SP3
The following Microsoft Exchange Server 2007 installation guide template can be used as a starting point for formally documenting your organization's server build procedures for Exchange 2007 servers in a cluster continuous replication (CCR) environment.
Executive Summary
The purpose of this document is to explain the installation and configurations necessary to install Exchange 2007 in a cluster continuous replication environment.
Business Justification
By having an installation guide, Company_Name can guarantee standardization across the enterprise, reduce Total Cost of Ownership, and ease troubleshooting steps.
Scope
The scope of this document is limited to installation of an Exchange 2007 server in a CCR environment for Company_Name on the Windows Server 2008 Enterprise x64 Edition operating system platform.
Prerequisites
The operator should have working knowledge of Windows Server 2008 Enterprise x64 Edition concepts, Exchange 2007 concepts, the Exchange Management Console and Exchange Management Shell, the command line, and several system utilities. This document does not say more about the details of any system utility except as necessary to complete the tasks within.
Assumptions
This document assumes that Windows Server 2008 x64 Edition is installed according to company baseline regulations. This includes the latest approved service pack and hotfixes.
This document assumes that forest and domain preparation steps were finished as described in the Exchange 2007 Online Help topic How to Prepare Active Directory and Domains.
This document assumes that Exchange 2007 and Windows Server 2008 are secured as described in the following best practices documents:
Exchange 2007: Security and Protection
Windows Server 2008: Windows Server 2008 Security Guide
Important
Follow the procedures in this document sequentially. Unexpected results may occur if changes are made out of sequence.
Requirements
Cluster Continuous Replication Planning
Review the Planning for Cluster Continuous Replication topic in the Exchange 2007 Online Help before you implement the cluster.
Transport Dumpster Requirements
Because clustered Mailbox servers in a CCR environment replicate data asynchronously, there is data loss during a lossy failover. To help reduce the effect of this, the Hub Transport server role has a feature that temporarily keeps mail that was recently delivered to a CCR server. This feature is known as the transport dumpster. If there is a lossy failover, the transport dumpster is used by clustered Mailbox servers in a CCR environment to re-deliver mail to each storage group for a specific timeframe. (The timeframe is based on the last log inspected and the last log generated.) The transport dumpster is for clustered Mailbox servers in a CCR environment only.
The transport dumpster is an organizational setting and, therefore, should be configured appropriately to handle all clustered Mailbox servers in a CCR environment within the organization. Additionally, be aware that the transport dumpster is configured per storage group and per clustered Mailbox server in an Active Directory directory service site.
By default, the transport dumpster is enabled to support environments that deploy CCR and that have the following settings:
MaxDumpsterSizePerStorageGroup – 18 megabytes (MB)
MaxDumpsterTime – 7 days
We recommend that you configure the MaxDumpsterSizePerStorageGroup parameter. This specifies the maximum size of the transport dumpster queue for each storage group, to a size that is 1.5 times the size of the maximum message that can be sent. For organizations that do not use a maximum message size, the formula should be 1.5 times the average size for all messages sent in the organization.
Transport Dumpster Configuration
Connect to an Exchange 2007 server through Remote Desktop, and then log on by using an account that has local administrative access and that is delegated the Exchange Organization Administrator role.
Follow the procedures in the Exchange 2007 Online Help topic How to Configure the Transport Dumpster.
Cluster Node Configuration
The following media are required for this section:
Windows Server Enterprise x64 Edition mediaExchange Server 2007 Configuration DVD
Note
For instructions about how to build an Exchange 2007 Configuration DVD, see How to Create a Configuration DVD and Automation Files.
Additional Software Verification
Verify that Remote Desktop is enabled.
As an optional process, install Microsoft Network Monitor. For more information, see the Microsoft Network Monitor Web site.
Drive Configuration
Connect to the server through Remote Desktop, and then use an account that has local administrative access to log on.
Click Start, click Administrative Tools, and then select Computer Management.
Expand Storage, and then click Disk Management.
Format, rename, and assign the appropriate drive letters so that the volumes and DVD drive match the appropriate server configuration. At the very least, there should be a D drive for the Exchange binaries, and the DVD drive should be configured as the Z drive. The following table describes the drive configuration that should be used.
Drive configuration
LUN Drive letter Usage 1
C
Operating system
2
D
Exchange binaries, tracking logs
3
Z
DVD drive
Windows Server 2008 Hotfix Installation
All hotfixes are installed by using a batch file. For a complete list of hotfixes that are installed, see the Contoso server build DVD hotfix list. A sample hotfix list is available at Server Build DVD - Sample Hotfix List.
Connect to the server through Remote Desktop, and then log on by using an account that has local administrative access and that is delegated local Administrator access.
Insert the Exchange 2007 Configuration DVD.
Move to the \W2K8-HotFix folder, and then double-click W2K8-hotfix.bat.
Click Yes if a Digital Signature not Found dialog box appears.
Note
These dialog boxes will not appear in environments that have not deployed the Windows Security templates.
Wait for the files to copy, and then restart the server.
Network Interfaces Configuration - Private Network
For the private network, make sure that the IP address scheme is not using the same subnet or network as any of the public network adapters.
Never use teaming for the private network. For more information, see Microsoft Knowledge Base article 254101, Network adapter teaming and server clustering.
Connect to what will become the first node in the cluster through Remote Desktop, and then use an account that has local administrative access to log on.
Click Start, click Control Panel, and then double-click Network and Sharing Center.
Click Manage network connections.
Locate the connection for the internal network, and then rename the connection with an appropriate name.
Right-click the connection, and then click Properties.
In the network connection properties, on the General tab, verify that the Client for Microsoft Networks, Internet Protocol Version 4 (TCP/IPv4) and File and Printer Sharing for Microsoft Networks check boxes are selected in the This connection uses the following items area.
Click Internet Protocol Version 4 (TCP/IPv4), and then click Properties.
In Internet Protocol Version 4 (TCP/IPv4) Properties, click Advanced.
On the DNS tab, verify the following information in Advanced TCP/IP Settings:
Make sure that addresses are not listed in the DNS server addresses, in order of use area if this is a private network.
Make sure that the Register this connection's addresses in DNS check box is cleared.
On the WINS tab, make sure that Disable NetBIOS over TCP/IP is not selected.
Click OK two times to save the changes, and then click Close to exit Properties.
Network Interfaces Configuration - Public Network
Make sure that the IP address scheme for the public network is not using the same subnet or network as any private network adapters. Instead, the public network must use the subnet or network that is used to route network traffic within your intranet.
Teaming can be used on the public network in redundancy mode, but it cannot be used in load balancing mode. However, if problems or issues occur that are related to teaming, Microsoft Customer Support Services will require you to disable teaming. If this resolves the issue, you must seek assistance from the hardware manufacturer. For more information about teaming, see Microsoft Knowledge Base article 254101, Network adapter teaming and server clustering.
Connect to what will become the first node in the cluster through Remote Desktop, and then use an account that has local administrative access to log on.
Click Start, click Control Panel, and then double-click Network and Sharing Center.
Click Manage network connections.
Locate the connection for the internal network, and then rename the connection with an appropriate name.
Right-click the connection, and then select Properties.
In the network connection's properties on the General tab, make sure that the Client for Microsoft Networks, Internet Protocol Version 4 (TCP/IPv4) and File and Printer Sharing for Microsoft Networks check boxes are selected in the This connection uses the following items area.
Click Internet Protocol Version 4 (TCP/IPv4), and then click Properties.
In Internet Protocol Version 4 (TCP/IPv4) Properties, click Advanced.
In Advanced TCP/IP Settings, verify the following information on the DNS tab:
Make sure that all the required addresses are listed in the DNS server addresses, in order of use area.
Make sure that the correct suffixes are listed in the Append these DNS suffixes (in order) area.
On the WINS tab, make sure that Disable NetBIOS over TCP/IP is not selected.
Click OK two times to save the changes, and then click Close to exit Properties.
Domain Membership Configuration
Connect to the server through Remote Desktop, and then use an account that has local administrative access to log on.
Click Start, right-click Computer, and then click Properties.
In the Computer Name, domain, and workgroup settings area, click Change Settings.
In System Properties, click Change.
In the Member of area, click Domain, and then type the appropriate domain name.
Enter the appropriate credentials.
Click OK two times, and then close System Properties.
Restart the server.
Local Administrators Verification
Connect to the server through Remote Desktop, and then use an account that has local administrative access to log on.
Verify that the following accounts are members of the local administrators group on this server. Add the accounts if they are not already there.
Local administrators
Item Account Description Role 1
Domain Admins
Domain Administrative Global Group
Administrator
2
Root Domain\Exchange Organization Administrators
Exchange Administrators
Administrator
Verify that the account you are using is a member of a group that is a member of the local administrators group on the Windows Server 2008-based server. If it is not, log on by using an account that is a member of the local administrators group before continuing.
Local Administrator Account Password Reset
Connect to the server through Remote Desktop, and then use an account that has local administrative access to log on.
Click Start, right-click Computer, and then click Manage.
Expand the following node: Configuration\Local Users and Groups\Users.
Right-click Administrator, and then click Set Password. Change the password so that it meets strong complexity requirements.
As an optional step, right-click Administrator, and then select Rename. Rename the account according to company regulations.
Tools Installation
This section installs several tools that will help with Exchange administration and with troubleshooting support issues.
Note Debugging Tools for Windows help administrators to debug processes that are affecting service. For more information, see Install Debugging Tools for Windows 64-bit Version.
Connect to the server through Remote Desktop, and then use an account that has local administrative access to log on.
Insert the Exchange 2007 Configuration DVD.
Open a command prompt, and then move to the \Support folder on the DVD.
Run the following command, where <DVDROM-Drive> is the DVD drive letter:
|
Right-click the C:\Tools folder, and then click Properties.
On the Security tab, click Advanced.
Click to clear the Include inheritable permissions from this object's parent check box, and then click Edit.
In the Permission entries list, click Everyone, and then click Remove. Also remove the Authenticated Users security principal if it is listed in this list.
Click Add, and then add the following groups, and grant each group FULL CONTROL permission:
SYSTEM
The local Administrators group
Creator Owner
Page File Modifications
Connect to the server through Remote Desktop, and then use an account that has local administrative access to log on.
Click Start, right-click Computer, and then click Properties.
Click Advanced system settings.
In the Startup and Recovery area, click Settings.
In the Write Debugging Information area, select Kernel Memory Dump in the list, and then click OK.
In the Performance area, click Settings.
On the Advanced tab, in the Virtual Memory area, click Change.
On servers that have a dedicated page file drive, follow these steps:
In the Drive list, click C:, and then click Custom size.
For the C: drive, set the Initial Size (MB) value to a minimum of 200 MB. (Windows requires between 150 MB and 2 GB page file space, depending on server load and the amount of physical RAM that is available for page file space on the boot volume when Windows is configured for a kernel memory dump. Therefore, you may be required to increase the size.)
For the C: drive, set the Maximum Size (MB) value to that of the Initial Size.
In the Drive list, select the page file drive (for example, the P: drive), and then click Custom size.
In the Initial Size (MB) box, type the result of one of the following calculations:
If the server has less than 8 GB of RAM, multiply the amount of RAM times 1.5,.
If the server has 8 GB of RAM or more, add the amount of RAM plus 10 MB.
In the Maximum Size (MB) box, type the same amount that you typed in the Initial Size box.
Delete all other page files.
Click OK.
On servers that do not have a dedicated page file drive, follow these steps:
In the Drive list, click C:, and then click Custom size.
For the C: drive, in the Initial Size (MB) box, type the result of one of the following calculations:
If the server has less than 8 GB of RAM, multiply the amount of RAM times 1.5.
If the server has 8 GB of RAM or more, add the amount of RAM plus 10 MB.
Delete all other page files.
Click OK.
Click OK two times to close the System Properties dialog box.
Click No if you are prompted to restart the system.
For more information about Page File recommendations, see the following articles:
Drive Permissions
Connect to the server through Remote Desktop, and then use an account that has local administrative access to log on.
Click Start, and then click Computer.
Right-click the D Drive, and then click Properties.
On the Security tab, click Edit.
Grant the following rights as outlined in the following table. Click Add, and then select the local server from Locations to add accounts that are listed in the table, but are not listed in the Group or user names list.
Drive permissions
Account Permissions Administrators
Full Control
SYSTEM
Full Control
Authenticated Users
Read and Execute, List, Read
CREATOR OWNER
Full Control
Click OK to return to D Drive Properties.
On the Security tab, click Advanced.
On the Permissions tab, click Edit.
In the Permission entries table, click CREATOR OWNER, and then click Edit.
In the Apply to list, click Subfolders and files only.
Click OK three times.
Click OK to close the drive properties.
Repeat steps 3 through 12 for each additional drive (other than drive C).
Additional Node Configuration
Repeat all steps in the Cluster Node Configuration section for the second node that will exist in the cluster.
Verification Steps
Organizational Unit Verification
Submit a change request and have the computer object moved to the appropriate organizational unit (OU). If you are following the recommendations in the Exchange 2007 Security Guide, the OU will be \Member Servers\Exchange Backend Servers\Exchange Mailbox Servers.
Active Directory Site Verification
Verify that the server is in the correct domain and Active Directory site. If the server is not in the correct Active Directory site, submit a change request to the appropriate operations group and have the server moved to the appropriate site. To verify that the domain and Active Directory site are correct, follow these steps:
Connect to the server through Remote Desktop, and then use an account that has local administrative access to log on.
Open a command prompt, and then type the following command:
NLTEST /server:%COMPUTERNAME% /dsgetsite
The name of the Active Directory site to which the server belongs is displayed.
Domain Controller Diagnostics Verification
Connect to the server through Remote Desktop, and then use an account that has local administrative access to log on.
Open a command prompt, and then change paths to drive C.
Type the following command:
dcdiag /s:<Domain Controller> /f:c:\dcdiag.log
Note
Change <domain Controller> to a domain controller that is contained within the same Active Directory site as the Exchange server.
Review the output of the C:\Dcdiag.log file, and then verify that there are no connectivity issues with the local domain controller.
Repeat steps 3 and 4 for each domain controller in the local Active Directory site.
Note
Domain Controller Diagnostics (DCDiag) is a Windows support tool that tests network connectivity and DNS resolution for domain controllers. If the account being used does not have administrative credentials, several tests under the Doing primary tests heading may not pass. These tests can be ignored if the connectivity tests pass. In addition, the log file may report that some service validation tests did not pass. These messages can be ignored if the services do not exist on the domain controller.
Exchange Best Practices Analyzer Verification
Use Remote Desktop to connect to a server in the environment that has the Exchange Server Best Practices Analyzer or the Exchange 2007 Management tools installed. Then, use an account that has local administrative access to log on. Depending on the configuration, do one of the following:
Click Start, click All Programs, click Microsoft Exchange, and then click Best Practices Analyzer.
Click Start, click All Programs, click Microsoft Exchange Server 2007, and then click Exchange Management Console.
Click Toolbox.
Double-click Best Practices Analyzer.
Click Download the latest updates to apply any updates for the Best Practices Analyzer engine.
Provide the appropriate information to connect to Active Directory, and then click Connect to the Active Directory server.
On the Start a New Best Practices Scan page, in the Select the type of scan to perform area, click Exchange 2007 Readiness Check, and then click Start Scanning.
Review the report. Following the resolution articles that are provided and take action on any errors or warnings that are reported by the Best Practices Analyzer.
Note
The Microsoft Exchange Analyzers help Microsoft Exchange Server administrators troubleshoot several operational support issues.
Cluster Service Installation
The following information is required to complete this section.
The IP Address that will be used for the cluster resource group.
The Network name that will be used for the cluster resource group.
The Hub Transport server that will be used to host the file share for the File Share Witness.
Exchange 2007 Prerequisites Installation
Connect to the server through Remote Desktop, and then use an account that has local administrative access to log on.
Open an administrative Command Prompt window.
Type the following command where <path> references the E2K7 CONFIG DVD \E2K7-PreReqs folder:
ServerManagerCmd -ip <path>\Exchange-Base.XML
Install the Microsoft Filter Pack. For more information, see 2007 Office System Converter: Microsoft Filter Pack.
Type the following command, where <path> represents the path of the E2K7 CONFIG DVD \E2K7-PreReqs folder, and <Exchange-role> represents the XML file for the appropriate role:
ServerManagerCmd -ip <path>\<Exchange-role>.XML
Restart the server if it is required.
Cluster Installation
Connect to the server through Remote Desktop, and then use an account that has local administrative access to log on.
Follow the procedures outlined in the "To use the New Server Cluster wizard to create a new cluster" from the Exchange 2007 Online Help topic How to Create a Windows Server 2008 Failover Cluster for Cluster Continuous Replication.
Cluster Networking Configuration
Connect to the server through Remote Desktop, and then use an account that has local administrative access to log on.
Follow the procedures from the Exchange 2007 Online Help topic How to Configure Cluster Networks for a Failover Cluster.
Windows Server 2008 Cluster Hotfix Installation
All hotfixes are installed by using a batch file. For a complete list of hotfixes that are installed, see the Contoso server build DVD hotfix list. A sample hotfix list is available at Server Build DVD - Sample Hotfix List.
Connect to the server through Remote Desktop, and then log on by using an account that has local administrative access and that is delegated local Administrator access.
Insert the Exchange 2007 Configuration DVD.
Move to the \W2K8-HotFix folder, and then double-click W2K8-clus-hotfix.bat.
Click Yes if a Digital Signature not Found dialog box appears.
Note
These dialog boxes will not appear in environments that have not deployed the Windows Security templates.
Wait for the files to copy, and then restart the server. Repeat the process on all remaining nodes within the cluster.
Node and File Share Majority Quorum Configuration
At a high level, the steps outlined here will create, enable, and help secure the file share witness resource for the cluster.
Connect to one of the cluster nodes through Remote Desktop, and then use an account that has local administrative access to log on.
Follow the procedures from the Exchange 2007 Online Help topic How to Configure the Node and File Share Majority Quorum.
Cluster Validation
In Windows Server 2008, the way that clusters are qualified has changed significantly with the introduction of the Validate a Configuration Wizard. This wizard is a new feature that is integrated into failover clustering in Windows Server 2008. With the cluster validation wizard, you can run a set of focused tests on a collection of servers that you intend to use as nodes in a cluster. This cluster validation process tests the underlying hardware and software to obtain an accurate assessment of how well failover clustering can be supported on a given configuration. In fact, a cluster validation report is required by Microsoft Customer Support Services (CSS) as a condition of Microsoft supporting a given configuration. For more information about the validation process, see the Windows Server 2008 Online Help topic, Failover Cluster Step-by-Step Guide: Validating Hardware for a Failover Cluster.
Connect to one of the cluster nodes by using Remote Desktop, and then log on with an account that has local administrative access.
Follow the procedures in the Exchange 2007 Online Help topic, How to Validate a Windows Server 2008 Failover Cluster Configuration.
Handoff Test
Connect to one of the cluster nodes through Remote Desktop, and then use an account that has local administrative access to log on.
Open an administrative Command Prompt window.
Type the following command, where <Cluster Name Object> references the cluster network name:
cluster <Cluster Name Object> group "Cluster Group" /move
Verify that the return response indicates that the Cluster Group is online.
Exchange Installation
The following CD media are required for this section:
Microsoft Exchange 2007 DVD
Exchange 2007 Configuration DVD
Clustered Mailbox Server Computer Object Creation
This section assumes that the guidelines in the Windows Server Security Hardening Guide were followed.
Connect to the active cluster node through Remote Desktop, and then log on by using an account that has privileges to create computer objects in the desired organizational unit within Active Directory.
Click Start, point to Administrative Tools, and then click Active Directory Users & Computers.
Connect to the domain that will contain the clustered Mailbox server.
On the View menu, click Advanced Features.
Expand Member Servers, and then expand Clustered Mailbox Servers.
Right-click Clustered Mailbox Servers, point to New, and then click Computer.
In the Computer Name box, type the name of the clustered Mailbox server. For example, type E2K7-MBX-01.
Click Next two times.
Click Finish.
Right-click the computer object that you created in step 6, and then click Properties.
On the Security tab, make sure that the Cluster Name Object (CNO) has Full Control on the clustered Mailbox server computer object.
Close Active Directory Users & Computers, and then log off the system.
Exchange 2007 Installation - Active Node
Connect to the first node in the cluster through Remote Desktop, and then log on by using an account that has local administrative access and that has been delegated the Exchange Server Administrator role (or higher).
Follow either the command line or setup GUI procedure from the Exchange 2007 Online Help topic How to Install the Active Clustered Mailbox Role in a CCR Environment on Windows Server 2008.
Exchange 2007 Installation – Passive Node
Connect to the second node in the cluster through Remote Desktop, and then log on by using an account that has local administrative access and that has been delegated the Exchange Server Administrator role (or higher).
Follow either the command line procedure or the Setup GUI procedure from the Exchange 2007 Online Help topic How to Install the Passive Clustered Mailbox Role in a CCR Environment on Windows Server 2008.
Handoff Test
In Exchange 2007, moving resources between nodes should be handled by using the Exchange Management Shell instead of the Cluster Administrator program or the Cluster.exe program.
Connect to an Exchange 2007 server through Remote Desktop, and then log on by using an account that has been delegated the Exchange Server Administrator role (or higher).
Click Start, click All Programs, click Microsoft Exchange Server 2007, and then click Exchange Management Shell.
Move the clustered Mailbox server. To do this, run the following command in the Exchange Management Shell, where <CMSName> is the name of the clustered Mailbox server and <ServerNode2> is the name of the passive node in the cluster:
Move-ClusteredMailboxServer <CMSName> -TargetMachine <ServerNode2> -MoveComment "Handoff test"
Verify that the clustered mailbox server is online and ready. To do this, run the following command:
Get-ClusteredMailboxServerStatus <CMSName>
Repeat steps 3 through 4 to move the resources back to the active node (now the passive node).
Exchange Server 2007 Post-SP1 Roll-up Installation
Install all hotfixes that are released since Exchange Server 2007 Service Pack 1 (SP1). All hotfixes are installed by using a batch file. To view a sample hotfix list, see the Exchange Help topic Server Build DVD - Sample Hotfix List.
Connect to the server through Remote Desktop, and then use an account that has local administrative access to log on.
Insert the Exchange 2007 Configuration DVD in the DVD drive.
Move to the E2K7-PostSP1 folder, and then double-click E2K7-postsp1.bat.
Click Yes if any Digital Signature not Found dialog boxes open.
Note
These dialog boxes will not appear in environments that have not deployed the Windows Security templates.
Wait for all file copies to complete, and then restart the server.
Repeat steps 1 through 5 on the passive node.
Exchange Search Configuration
Connect to the server through Remote Desktop, and then log on by using an account that has local administrative access.
Follow the instructions that are in How to Register IFilters 2.0 with Exchange 2007 and Exchange 2010.
If you want to search through PDF files, install the Adobe PDF iFilter 9 for 64-bit platforms, and then follow the instructions that are mentioned in the Adobe document Configuring PDF iFilter for MS Exchange Server 2007.
The third-party Web site information in this topic is provided to help you find the technical information you need. The URLs are subject to change without notice.
Clustered Mailbox Server DNS Tuning
Connect to the server through Remote Desktop, and then use an account that has local administrative access to log on.
Follow the procedures from the Exchange 2007 Online Help topic How to Configure the DNS TTL Value for a Clustered Mailbox Server Network Name Resource.
First Storage Group Configuration
Use the following table to obtain the information that is needed for the commands.
Important
The values in the following table are sample values and are not recommended. Update these values to reflect the actual values for your organization.
First storage group information
Old | New example | |
---|---|---|
Storage Group Name |
First Storage Group |
SG1 |
Database Name |
Mailbox Database |
<CMSName> MBX Store 1 |
Storage Group Path |
<Exchange Install Path>\Mailbox\First Storage Group |
L:\LOG01 |
Database Path |
<Exchange Install Path>\Mailbox\First Storage Group |
E:\MDB01 |
Database Filename |
Mailbox database.edb |
Priv01.edb |
Connect to the server through Remote Desktop, and then log on by using an account that has local administrative access and that has been delegated the Exchange Server Administrator role (or higher).
Click Start, click All Programs, click Microsoft Exchange Server 2007, and then click Exchange Management Shell.
In Exchange Management Shell, run the following command to suspend replication, where <CMSName> is the name of the clustered Mailbox server:
Suspend-StorageGroupCopy "<CMSName>\First Storage Group"
Run the following command to unmount the database, where <CMSName> is the name of the clustered mailbox server:
Dismount-Database "<CMSName>\First Storage Group\Mailbox Database"
To change the Storage Group name from “First Storage Group” to “SG1,” run the following command, where <DCName> is the name of a domain controller:
Set-StorageGroup "<CMSName>\<Old SG Name>" -Name <New SG Name> -DomainController <DCName>
To change the mailbox database name from “Mailbox Database” to “<CMSName> MBX Store 1,” run the following command:
Set-MailboxDatabase "<CMSName>\<New SG Name>\<Old DB Name>" -Name "<New DB Name>" -DomainController <DCName>
To change the location of the storage group’s transaction logs, run the following command:
Move-StorageGroupPath "<CMSName>\<New SG Name>" -LogFolderPath:<New SG Location> -SystemFolderPath:<New SG Path> -DomainController <DCName> -ConfigurationOnly
To change the location of the mailbox database, run the following command:
Move-DatabasePath "<CMSName>\<New SG Name>\<New DB Name>" -EdbFilePath:<New DB Path\New DB FileName> -DomainController <DCName> -ConfigurationOnly
Move the files (database, logs, and checkpoint files) to their new locations on both the active node and the passive node.
To mount the database, run the following command:
Mount-Database "<CMSName>\<New SG Name>\<New DB Name>" -DomainController <DCName>
To restart replication, run the following command:
Resume-StorageGroupCopy "<CMSName>\<New SG Name>"
Product Key Configuration
Connect to the server through Remote Desktop, and then log on by using an account that has local administrative access and that is delegated the Exchange Organization Administrator role.
Follow the procedure that is outlined in the Exchange 2007 Online Help topic How to Enter the Product Key.
Security Configuration Wizard
This section is optional and may be skipped.
Connect to the server through Remote Desktop, and then use an account that has local administrative access to log on.
Follow the procedures from the Exchange 2007 Online Help topic How to Install the Security Configuration Wizard to install the Security Configuration Wizard.
Follow the procedures from the Exchange 2007 Online Help topic How to Register Exchange Server Role SCW Extensions to register the Exchange 2007 Edge Transport server SCW extension.
Follow the procedures from the Exchange 2007 Online Help topic How to Create a New Exchange Server Role SCW Policy to configure and apply the policy.
System Performance Verification
By default, Exchange 2007 optimizes the server’s memory management for programs. Follow these steps to configure the server’s system cache as the default size. Mailbox servers will benefit from this configuration.
Connect to the server through Remote Desktop, and then use an account that has local administrative access to log on.
Click Start, right-click Computer, and then click Properties.
Click Advanced system settings.
On the Advanced tab, under Performance, click Settings.
On the Advanced tab, verify that the Processor scheduling is set to Background services.
Verify that the Memory Usage is set to System Cache.
Click OK.
Repeat steps 1 through 5 on the second node in the cluster.
Cluster Failover Tuning
CCR provides an attribute for Mailbox servers that you can use to control unscheduled outage recovery behavior. The AutoDatabaseMountDial attribute has the following three possible values: Lossless, Good Availability, and Best Availability.
Lossless
When the attribute is set to Lossless, the system waits for the failed node to come back online before databases are mounted. Even then, the failed system must return with all the logs that can be accessed, and they must not be corrupted. After the failure, the passive node is made active, and the Information Store is brought online. It checks whether the databases can be mounted without any data loss. If they can, the databases are mounted. If the databases cannot be mounted without any data loss, the system periodically tries to copy the logs. If the server returns and its logs are intact, the databases will mount. If the server returns and its logs are not intact, the remaining logs will not be available, and the affected databases will not mount.
Good Availability
When the attribute is set to Good Availability, full automatic recovery is provided when replication is operating correctly and it is replicating logs at the rate that they are being generated.
Best Availability
By default, the value is set to Best Availability. Best Availability operates similarly to Good Availability. However, it enables automatic recovery when the replication experiences slightly more latency. Therefore, the new active node might be slightly further behind the state of the old active node after the failover. This increases the possibility that database divergence occurs, and requires a full re-seed to correct.
Note By default, CCR is configured to use Best Availability. Typically, this setting should not be changed. Therefore, this section may be skipped.
Connect to the first cluster node through Remote Desktop, and then use an account that has local administrative access to log on.
Follow the procedures in the Exchange 2007 Online Help topic How to Tune Mount and Failover Settings for Cluster Continuous Replication.
Test Mailbox Creation
Several of the diagnostics tasks that are used to monitor Exchange require test mailboxes to be created on the Mailbox servers. For more information about how to use the Test script to create the test mailboxes, see the Monitoring for Agentless Servers topic in the Exchange 2007 Online Help.
Connect to the Exchange 2007 Mailbox server through Remote Desktop, and then log on by using an account that has local administrative access and that is delegated the Exchange Server Administrator role (or higher).
Click Start, click All Programs, click Microsoft Exchange Server 2007, and then click Exchange Management Shell.
In Exchange Management Shell, change the directory path to <Exchange Server Install Path>\Scripts.
Type New-TestCasConnectivityUser.ps1, and then press ENTER.
Enter a temporary password, and then follow the prompts to create the test mailboxes.
Exchange Server Role Configuration
Records Management Server Configuration
This section can be skipped if messaging records management (MRM) will not be enabled in the environment. For more information about how to deploy MRM, see the Deploying Messaging Records Management topic in the Exchange 2007 Online Help.
Connect to an Exchange 2007 server through Remote Desktop, and then log on by using an account that has local administrative access and that is delegated the Exchange Server Administrator role (or higher).
Click Start, click All Programs, click Microsoft Exchange Server 2007, and then click Exchange Management Shell.
To enable the managed folder assistant, run the following command in the Exchange Management Shell, where <ServerName> is the name of the mailbox server and <DCName> is the name of a domain controller:
Set-MailboxServer <ServerName> -LogPathForManagedFolders <LogPath> -ManagedFolderAssistantSchedule <AssistantSchedule> -LogFileAgeLimitForManagedFolders <LogFileAgeLimit> -LogDirectorySizeLimitForManagedFolders <LogDirSizeLimit> -LogFileSizeLimitForManagedFolders <LogFileSizeLimit> -FolderLogForManagedFoldersEnabled <LogFolderEnabled> -SubjectLogForManagedFoldersEnabled <SubjectLogEnabled> -RetentionLogForManagedFoldersEnabled <RetentionLogEnabled> -JournalingLogForManagedFoldersEnabled <JournalLogEnabled> -DomainController <DCName>
Note
Use the appropriate table from Server Configuration Appendix at the end of this topic to obtain the information that you must have to run the commands.
Message Tracking Server Configuration
This section can be skipped if the default Message Tracking parameters are appropriate for the environment.
Connect to an Exchange 2007 server through Remote Desktop, and then log on by using an account that has local administrative access and that was delegated the Exchange Server Administrator role (or higher).
Click Start, click All Programs, click Microsoft Exchange Server 2007, and then click Exchange Management Shell.
To configure message tracking settings, run the following command in the Exchange Management Shell, where <ServerName> is the name of the Mailbox server and <DCName> is the name of a domain controller:
Set-MailboxServer <ServerName> -MessageTrackingLogPath <LogPath> -MessageTrackingLogMaxAge <MaxAge> -MessageTrackingLogMaxDirectorySize <LogDirSize> -MessageTrackingLogMaxFileSize <LogFileSize> -MessageTrackingLogSubjectLoggingEnabled <SubjectLogEnabled> -DomainController <DCName>
Note
Use the appropriate table from the Server Configuration Appendix at the end of this topic to obtain the information that you must have to run the commands.
Additional Storage Groups
Connect to an Exchange 2007 server through Remote Desktop, and then log on by using an account that has local administrative access and that is delegated the Exchange Server Administrator role (or higher).
Click Start, click All Programs, click Microsoft Exchange Server 2007, and then click Exchange Management Shell.
Use the appropriate table from the Database / Log LUN Appendix and Database Configuration Appendix at the end of this topic to obtain the information that you must have to run the commands.
To create the Storage Group, run the following command in the Exchange Management Shell, where <CMSName> is the name of the clustered mailbox server and <DCName> is the name of a domain controller:
New-StorageGroup -Server <CMSName> -Name <SG> -LogFolderPath <Transaction Log Location> -SystemFolderPath <Transaction Log Location> -DomainController <DCName>
To create the database that resides within the storage group, run the following command:
New-MailboxDatabase -StorageGroup "<CMSName>\<SG Name>" -Name "<DB Name>" -DomainController <DCName> -OfflineAddressBook <OfflineAddressBook> -PublicFolderDatabase <PFDatabase> | Set-MailboxDatabase -IssueWarningQuota <WarningQuota> -ProhibitSendQuota <SendQuota> -ProhibitSendReceiveQuota <SendReceiveQuota> -MailboxRetention <dd.hh:mm:ss> -DeletedItemRetention <dd.hh:mm:ss> -MaintenanceSchedule <MaintenanceSchedule> -QuotaNotificationSchedule <QuotaSchedule> -RetainDeletedItemsUntilBackup <RetainDeletedItemsUntilBackup> -EdbFilePath:<FullPathIncludingDatabaseFileName>
To mount the database, run the following command:
Mount-Database "<CMSName>\<SG>\<Database Name>" -DomainController <DCName>
Repeat steps 3 through 6 for each database that must be created.
Server Configuration Appendix
Records Management Configuration
The following table is a sample configuration that can be applied to the Mailbox server, depending on requirements.
Important
The values in the following table are sample values, not recommended values. Update these values to reflect the actual values for your organization.
Records management configuration
Default value | Sample value | |
---|---|---|
Server Name |
<CMSName> |
<CMSName> |
Log Path For Managed Folders |
<Exchange Install Path>\Logging\Managed Folder Assistant |
D:\Exchsrvr\Logging\Managed Folder Assistant |
Log File Age Limit For Managed Folders |
00:00:00 |
7.00:00:00 |
Log Directory Size Limit For Managed Folders |
unlimited |
5 GB |
Log File Size Limit For Managed Folders |
10 MB |
10 MB |
Retention Log For Managed Folders Enabled |
False |
True |
Journaling Log For Managed Folders Enabled |
False |
False |
Folder Log For Managed Folders Enabled |
False |
True |
Subject Log For Managed Folders Enabled |
False |
True |
Managed Folder Assistant Schedule |
Never Run |
“Sun.6:00 PM-Sun.7:45 PM”, “Mon.6:00 PM-Mon.7:45 PM”, “Tue.6:00 PM-Tue.7:45 PM”, “Wed.6:00 PM-Wed.7:45 PM”, “Thu.6:00 PM-Thu.7:45 PM”, “Fri.6:00 PM-Fri.7:45 PM”, “Sat.6:00 PM-Sat.7:45 PM” |
Message Tracking Configuration
The following table is a sample configuration that can be applied to the Mailbox server, depending on requirements.
Important
The values in the following table are sample values, not recommended values. These values must be updated to reflect the actual values for your organization.
Message tracking configuration
Default value | Sample value | |
---|---|---|
Server Name |
<CMSName> |
< CMSName > |
Message Tracking Log Path |
<Exchange Install Path>\TransportRoles\Logs\MessageTracking |
d:\exchsrvr\MessageTracking |
Message Tracking Log Enabled |
True |
True |
Message Tracking Log Max Age |
30.00:00:00 |
10.00:00:00 |
Message Tracking Log Max Directory Size |
250 MB |
20 GB |
Message Tracking Log Max File Size |
10 MB |
10 MB |
Message Tracking Log Subject Logging Enabled |
True |
True |
Database / Log LUN Appendix
When you use continuous replication, you do not have to perform daily full backups because the storage group copy provides the first line of defense against corruption and data loss. Therefore, there are two approaches to how backups can be performed in a continuous replication environment.
Use streaming backup to perform a full backup of 1/7th of the databases and incremental or differential backups for the rest.
Use Volume Shadow Copy Service (VSS) to perform backups.
Because of the backup methodology selected, the LUN layout has to be altered.
Database / Log LUN Layout - 1/7th Approach
When you use streaming backups, we recommend that you separate streaming I/O (source and target) so that multiple storage groups that are being backed up concurrently do not compete for the same disk resources. Whether the target is disk or tape, there will be a throughput limit on the physical disks and controllers that is unique to each hardware solution. You may have to isolate some storage groups from one another to maximize the number of concurrent backup operations, to increase throughput, and to minimize the size of the backup window.
You can run streaming backups concurrently, one from each LUN, if you isolate your storage group LUNs from one another. The backup jobs should complete on the first storage group on each LUN before the second storage group begins the back up process, isolating the backup streams. Two streaming backup jobs on the same physical disks may not be twice as fast, but it should be faster than a single streaming backup job with regard to the megabytes per second.
A backup set is the number of databases that are fully backed up in a night. A solution that performs a full backup on 1/7th of the databases nightly could reduce complexity by adding all the storage groups to be backed up on the same log and database LUN. This can reduce the number of LUNs on the server.
Some benefits of this strategy include the following:
Simplified storage administration and fewer LUNs to manage.
A potential reduction in the number of backup jobs.
Some concerns with this strategy include the following:
It limits the ability to take hardware-based VSS backup and restores.
The 2-terabyte limit on a master boot record (MBR) partition would limit how far this would scale in capacity.
A capacity or corruption problem on a single LUN could affect more than one storage group.
1/7th approach LUN design
SG Name | Database Name | Database Location | Database File Name | Transaction Log Location |
---|---|---|---|---|
SG1 |
<CMSName> MBX Store 1 |
E:\MDB01 |
Priv01.edb |
L:\LOG01 |
SG2 |
<CMSName> MBX Store 2 |
E:\MDB02 |
Priv02.edb |
L:\LOG02 |
SG3 |
<CMSName> MBX Store 3 |
E:\MDB03 |
Priv03.edb |
L:\LOG03 |
SG4 |
<CMSName> MBX Store 4 |
E:\MDB04 |
Priv04.edb |
L:\LOG04 |
SG5 |
<CMSName> MBX Store 5 |
E:\MDB05 |
Priv05.edb |
L:\LOG05 |
SG6 |
<CMSName> MBX Store 6 |
E:\MDB06 |
Priv06.edb |
L:\LOG06 |
SG7 |
<CMSName> MBX Store 7 |
E:\MDB07 |
Priv07.edb |
L:\LOG07 |
SG8 |
<CMSName> MBX Store 8 |
F:\MDB08 |
Priv08.edb |
M:\LOG08 |
SG9 |
<CMSName> MBX Store 9 |
F:\MDB09 |
Priv09.edb |
M:\LOG09 |
SG10 |
<CMSName> MBX Store 10 |
F:\MDB10 |
Priv10.edb |
M:\LOG10 |
SG11 |
<CMSName> MBX Store 11 |
F:\MDB11 |
Priv11.edb |
M:\LOG11 |
SG12 |
<CMSName> MBX Store 12 |
F:\MDB12 |
Priv12.edb |
M:\LOG12 |
SG13 |
<CMSName> MBX Store 13 |
F:\MDB13 |
Priv13.edb |
M:\LOG13 |
SG14 |
<CMSName> MBX Store 14 |
F:\MDB14 |
Priv14.edb |
M:\LOG14 |
SG15 |
<CMSName> MBX Store 15 |
G:\MDB15 |
Priv15.edb |
N:\LOG15 |
SG16 |
<CMSName> MBX Store 16 |
G:\MDB16 |
Priv16.edb |
N:\LOG16 |
SG17 |
<CMSName> MBX Store 17 |
G:\MDB17 |
Priv17.edb |
N:\LOG17 |
SG18 |
<CMSName> MBX Store 18 |
G:\MDB18 |
Priv18.edb |
N:\LOG18 |
SG19 |
<CMSName> MBX Store 19 |
G:\MDB19 |
Priv19.edb |
N:\LOG19 |
SG20 |
<CMSName> MBX Store 20 |
G:\MDB20 |
Priv20.edb |
N:\LOG20 |
SG21 |
<CMSName> MBX Store 21 |
G:\MDB21 |
Priv21.edb |
N:\LOG21 |
SG22 |
<CMSName> MBX Store 22 |
H:\MDB22 |
Priv22.edb |
O:\LOG22 |
SG23 |
<CMSName> MBX Store 23 |
H:\MDB23 |
Priv23.edb |
O:\LOG23 |
SG24 |
<CMSName> MBX Store 24 |
H:\MDB24 |
Priv24.edb |
O:\LOG24 |
SG25 |
<CMSName> MBX Store 25 |
H:\MDB25 |
Priv25.edb |
O:\LOG25 |
SG26 |
<CMSName> MBX Store 26 |
H:\MDB26 |
Priv26.edb |
O:\LOG26 |
SG27 |
<CMSName> MBX Store 27 |
H:\MDB27 |
Priv27.edb |
O:\LOG27 |
SG28 |
<CMSName> MBX Store 28 |
H:\MDB28 |
Priv28.edb |
O:\LOG28 |
SG29 |
<CMSName> MBX Store 29 |
I:\MDB29 |
Priv29.edb |
P:\LOG29 |
SG30 |
<CMSName> MBX Store 30 |
I:\MDB30 |
Priv30.edb |
P:\LOG30 |
SG31 |
<CMSName> MBX Store 31 |
I:\MDB31 |
Priv31.edb |
P:\LOG31 |
SG32 |
<CMSName> MBX Store 32 |
I:\MDB32 |
Priv32.edb |
P:\LOG32 |
SG33 |
<CMSName> MBX Store 33 |
I:\MDB33 |
Priv33.edb |
P:\LOG33 |
SG34 |
<CMSName> MBX Store 34 |
I:\MDB34 |
Priv34.edb |
P:\LOG34 |
SG35 |
<CMSName> MBX Store 35 |
I:\MDB35 |
Priv35.edb |
P:\LOG35 |
SG36 |
<CMSName> MBX Store 36 |
J:\MDB36 |
Priv36.edb |
Q:\LOG36 |
SG37 |
<CMSName> MBX Store 37 |
J:\MDB37 |
Priv37.edb |
Q:\LOG37 |
SG38 |
<CMSName> MBX Store 38 |
J:\MDB38 |
Priv38.edb |
Q:\LOG38 |
SG39 |
<CMSName> MBX Store 39 |
J:\MDB39 |
Priv39.edb |
Q:\LOG39 |
SG40 |
<CMSName> MBX Store 40 |
J:\MDB40 |
Priv40.edb |
Q:\LOG40 |
SG41 |
<CMSName> MBX Store 41 |
J:\MDB41 |
Priv41.edb |
Q:\LOG41 |
SG42 |
<CMSName> MBX Store 42 |
J:\MDB42 |
Priv42.edb |
Q:\LOG42 |
SG43 |
<CMSName> MBX Store 43 |
K:\MDB43 |
Priv43.edb |
R:\LOG43 |
SG44 |
<CMSName> MBX Store 44 |
K:\MDB44 |
Priv44.edb |
R:\LOG44 |
SG45 |
<CMSName> MBX Store 45 |
K:\MDB45 |
Priv45.edb |
R:\LOG45 |
SG46 |
<CMSName> MBX Store 46 |
K:\MDB46 |
Priv46.edb |
R:\LOG46 |
SG47 |
<CMSName> MBX Store 47 |
K:\MDB47 |
Priv47.edb |
R:\LOG47 |
SG48 |
<CMSName> MBX Store 48 |
K:\MDB48 |
Priv48.edb |
R:\LOG48 |
SG49 |
<CMSName> MBX Store 49 |
K:\MDB49 |
Priv49.edb |
R:\LOG49 |
Database / LUN Layout – VSS Approach
The Volume Shadow Copy Service (VSS) in Windows Server 2008 is used by applications to back up and restore Exchange 2007. VSS provides an infrastructure that enables third-party storage management programs, business programs, and hardware providers to cooperate in creating and managing shadow copies. Solutions based on this infrastructure can use shadow, or mirrored, copies to back up and restore one or more Exchange 2007 databases.
VSS coordinates communication between Requestors (backup applications), Writers (applications in Windows, such as Exchange 2007), and Providers (system components, software components, or hardware components that create the shadow copies). To use VSS to back up Exchange 2007, a backup program must include an Exchange 2007-aware VSS Requestor. The Windows Server Backup program that is part of Windows Server 2008 does not include an Exchange -aware VSS Requestor. Therefore, you must use a third-party backup program to back up Exchange 2007 on a Windows Server 2008-based computer.
Note
The Windows Server Backup program also does not support the Exchange 2007 Extensible Storage Engine streaming APIs. Therefore, you cannot use Windows Server Backup to back up Exchange 2007.
For more information about VSS and Exchange 2007, see the Exchange Online Help topic Exchange 2007 Data Backup and Volume Shadow Copy Services.
When you use continuous replication, Exchange 2007 can run a software VSS snapshot not just on the active copy but also on the passive copy. Taking a VSS snapshot on the passive copy offloads the disk I/O from the active LUN during both the checksum integrity (ESEUTIL) and during the subsequent copy to tape or disk. This feature also frees more time on the active LUNs to run online maintenance, MRM, and other tasks.
Creating two LUNs (log and database) for a storage group is the standard best practice for Exchange 2003. With Exchange 2007, in the maximum case of 50 storage groups, the number of LUNs you provision will depend on your backup strategy. If your recovery time objective (RTO) is very small or if you use VSS clones for fast recovery, it may be best to put each storage group on its own transaction log LUN and database LUN. Because doing this will exceed the number of available drive letters, you must use volume mount points.
Some benefits of this strategy include the following:
Enables hardware-based VSS at a storage group level, providing single storage group backup and restore.
Flexibility to isolate the performance between storage groups when not sharing spindles between LUNs.
Increased reliability. A capacity or corruption problem on a single LUN will only affect one storage group.
Some concerns with this strategy include the following:
Using continuous replication together with 50 storage groups could require 200 LUNs. This configuration would exceed some storage array maximums. CCR solutions could have 100 LUNs on each node, whereas LCR could have all 200 LUNs presented to a single server.
A separate LUN for each storage group causes more LUNs per server. This increases the administrative costs and complexity.
Note
In the following table, MP represents Mount Point.
VSS approach LUN design
SG Name | Database Name | Database Location | Database File Name | Transaction Log Location |
---|---|---|---|---|
Anchor LUN |
-- |
E:\ |
-- |
L:\ |
SG1 |
<CMSName> MBX Store 1 |
MP:\MDB01 |
Priv01.edb |
MP:\LOG01 |
SG2 |
<CMSName> MBX Store 2 |
MP:\MDB02 |
Priv02.edb |
MP:\LOG02 |
SG3 |
<CMSName> MBX Store 3 |
MP:\MDB03 |
Priv03.edb |
MP:\LOG03 |
SG4 |
<CMSName> MBX Store 4 |
MP:\MDB04 |
Priv04.edb |
MP:\LOG04 |
SG5 |
<CMSName> MBX Store 5 |
MP:\MDB05 |
Priv05.edb |
MP:\LOG05 |
SG6 |
<CMSName> MBX Store 6 |
MP:\MDB06 |
Priv06.edb |
MP:\LOG06 |
SG7 |
<CMSName> MBX Store 7 |
MP:\MDB07 |
Priv07.edb |
MP:\LOG07 |
SG8 |
<CMSName> MBX Store 8 |
MP:\MDB08 |
Priv08.edb |
MP:\LOG08 |
SG9 |
<CMSName> MBX Store 9 |
MP:\MDB09 |
Priv09.edb |
MP:\LOG09 |
SG10 |
<CMSName> MBX Store 10 |
MP:\MDB10 |
Priv10.edb |
MP:\LOG10 |
SG11 |
<CMSName> MBX Store 11 |
MP:\MDB11 |
Priv11.edb |
MP:\LOG11 |
SG12 |
<CMSName> MBX Store 12 |
MP:\MDB12 |
Priv12.edb |
MP:\LOG12 |
SG13 |
<CMSName> MBX Store 13 |
MP:\MDB13 |
Priv13.edb |
MP:\LOG13 |
SG14 |
<CMSName> MBX Store 14 |
MP:\MDB14 |
Priv14.edb |
MP:\LOG14 |
SG15 |
<CMSName> MBX Store 15 |
MP:\MDB15 |
Priv15.edb |
MP:\LOG15 |
SG16 |
<CMSName> MBX Store 16 |
MP:\MDB16 |
Priv16.edb |
MP:\LOG16 |
SG17 |
<CMSName> MBX Store 17 |
MP:\MDB17 |
Priv17.edb |
MP:\LOG17 |
SG18 |
<CMSName> MBX Store 18 |
MP:\MDB18 |
Priv18.edb |
MP:\LOG18 |
SG19 |
<CMSName> MBX Store 19 |
MP:\MDB19 |
Priv19.edb |
MP:\LOG19 |
SG20 |
<CMSName> MBX Store 20 |
MP:\MDB20 |
Priv20.edb |
MP:\LOG20 |
SG21 |
<CMSName> MBX Store 21 |
MP:\MDB21 |
Priv21.edb |
MP:\LOG21 |
SG22 |
<CMSName> MBX Store 22 |
MP:\MDB22 |
Priv22.edb |
MP:\LOG22 |
SG23 |
<CMSName> MBX Store 23 |
MP:\MDB23 |
Priv23.edb |
MP:\LOG23 |
SG24 |
<CMSName> MBX Store 24 |
MP:\MDB24 |
Priv24.edb |
MP:\LOG24 |
SG25 |
<CMSName> MBX Store 25 |
MP:\MDB25 |
Priv25.edb |
MP:\LOG25 |
SG26 |
<CMSName> MBX Store 26 |
MP:\MDB26 |
Priv26.edb |
MP:\LOG26 |
SG27 |
<CMSName> MBX Store 27 |
MP:\MDB27 |
Priv27.edb |
MP:\LOG27 |
SG28 |
<CMSName> MBX Store 28 |
MP:\MDB28 |
Priv28.edb |
MP:\LOG28 |
SG29 |
<CMSName> MBX Store 29 |
MP:\MDB29 |
Priv29.edb |
MP:\LOG29 |
SG30 |
<CMSName> MBX Store 30 |
MP:\MDB30 |
Priv30.edb |
MP:\LOG30 |
SG31 |
<CMSName> MBX Store 31 |
MP:\MDB31 |
Priv31.edb |
MP:\LOG31 |
SG32 |
<CMSName> MBX Store 32 |
MP:\MDB32 |
Priv32.edb |
MP:\LOG32 |
SG33 |
<CMSName> MBX Store 33 |
MP:\MDB33 |
Priv33.edb |
MP:\LOG33 |
SG34 |
<CMSName> MBX Store 34 |
MP:\MDB34 |
Priv34.edb |
MP:\LOG34 |
SG35 |
<CMSName> MBX Store 35 |
MP:\MDB35 |
Priv35.edb |
MP:\LOG35 |
SG36 |
<CMSName> MBX Store 36 |
MP:\MDB36 |
Priv36.edb |
MP:\LOG36 |
SG37 |
<CMSName> MBX Store 37 |
MP:\MDB37 |
Priv37.edb |
MP:\LOG37 |
SG38 |
<CMSName> MBX Store 38 |
MP:\MDB38 |
Priv38.edb |
MP:\LOG38 |
SG39 |
<CMSName> MBX Store 39 |
MP:\MDB39 |
Priv39.edb |
MP:\LOG39 |
SG40 |
<CMSName> MBX Store 40 |
MP:\MDB40 |
Priv40.edb |
MP:\LOG40 |
SG41 |
<CMSName> MBX Store 41 |
MP:\MDB41 |
Priv41.edb |
MP:\LOG41 |
SG42 |
<CMSName> MBX Store 42 |
MP:\MDB42 |
Priv42.edb |
MP:\LOG42 |
SG43 |
<CMSName> MBX Store 43 |
MP:\MDB43 |
Priv43.edb |
MP:\LOG43 |
SG44 |
<CMSName> MBX Store 44 |
MP:\MDB44 |
Priv44.edb |
MP:\LOG44 |
SG45 |
<CMSName> MBX Store 45 |
MP:\MDB45 |
Priv45.edb |
MP:\LOG45 |
SG46 |
<CMSName> MBX Store 46 |
MP:\MDB46 |
Priv46.edb |
MP:\LOG46 |
SG47 |
<CMSName> MBX Store 47 |
MP:\MDB47 |
Priv47.edb |
MP:\LOG47 |
SG48 |
<CMSName> MBX Store 48 |
MP:\MDB48 |
Priv48.edb |
MP:\LOG48 |
SG49 |
<CMSName> MBX Store 49 |
MP:\MDB49 |
Priv49.edb |
MP:\LOG49 |
SG50 |
<CMSName> MBX Store 50 |
MP:\MDB50 |
Priv50.edb |
MP:\LOG50 |
Database Configuration Appendix
The following table describes a configuration that can be applied to each database that is created or customized for each database on a server, depending on requirements.
Important
The values in the following table are sample values, not recommended values. These values must be updated to reflect the actual values for your organization.
Database configuration
Default value | Sample value | |
---|---|---|
Database Name |
<CMSName> MBX Store xx |
<CMSName> MBX Store xx |
Offline Address Book |
Default Offline Address List |
Default Offline Address List |
Public Folder Database |
<PublicFolderServer> PUB Store xx |
<PublicFolderServer> PUB Store xx |
Warning Quota |
1945 MB |
1700000 KB |
Send Quota |
2 GB |
1900000 KB |
Send Receive Quota |
2355 MB |
2090000 KB |
Maintenance Schedule |
{Sun.1:00 AM-Sun.5:00 AM, Mon.1:00 AM-Mon.5:00 AM, Tue.1:00 AM-Tue.5:00 AM, Wed.1:00 AM-Wed.5: 00 AM, Thu.1:00 AM-Thu.5:00 AM, Fri.1:00 AM-Fri.5:00 AM, Sat.1:00 AM-Sat.5:00 AM} |
“Sun.12:00 AM-Sun.4:00 AM”, “Mon.12:00 AM-Mon.4:00 AM”, “Tue.12:00 AM-Tue.4:00 AM”, “Wed.12:00 AM-Wed.4:00 AM”, “Thu.12:00 AM-Thu.4:00 AM”, “Fri.12:00 AM-Fri.4:00 AM”, “Sat.12:00 AM-Sat.4:00 AM” |
Quota Notification Schedule |
{Sun.1:00 AM-Sun.1:15 AM, Mon.1:00 AM-Mon.1:15 AM, Tue.1:00 AM-Tue.1:15 AM, Wed.1:00 AM-Wed.1:15 AM, Thu.1:00 AM-Thu.1:15 AM, Fri.1:00 AM-Fri.1:15 AM, Sat.1:00 AM-Sat.1:15 AM} |
“Sun.12:00 AM-Sun.12:15 AM”, “Mon.12:00 AM-Mon.12:15 AM”, “Tue.12:00 AM-Tue.12:15 AM”, “Wed.12:00 AM-Wed.12: 15 AM”, “Thu.12:00 AM-Thu.12:15 AM”, “Fri.12:00 AM-Fri.12:15 AM”, “Sat.12:00 AM-Sat.12:15 AM” |
Mailbox Retention |
30.00:00:00 |
30.00:00:00 |
Deleted Item Retention |
14.00:00:00 |
14.00:00:00 |
Retain Deleted Items Until Backup |
False |
True |