You are previewing Microsoft® Exchange 2000 Server Upgrade Series Volume 1: Planning.
O'Reilly logo
Microsoft® Exchange 2000 Server Upgrade Series Volume 1: Planning

Book Description

The Microsoft Exchange 2000 Server Upgrade series is specifically created to assist you in the process of planning, deploying, and operating Exchange 2000 Server.

Table of Contents

  1. Microsoft® Exchange 2000 Server Upgrade Series, Version 1.0: Planning Guide
    1. SPECIAL OFFER: Upgrade this ebook with O’Reilly
    2. A Note Regarding Supplemental Files
      1. Content Lead
      2. Key Authors
      3. Reviewers
    3. 1. Exchange 2000 Server Upgrade Planning Overview
      1. The Exchange 2000 Upgrade Series
      2. Introduction
      3. Chapter Outlines
      4. Job Aids
      5. Exchange 2000 Deployment Options
        1. What is Upgrading?
          1. Why Upgrade?
          2. Is Upgrading for Me?
        2. What is Migration?
          1. Why Migrate?
          2. Is Migration for Me?
          3. How Do I Decide?
        3. What is Consolidation?
          1. Why Consolidate?
          2. Is Consolidation for Me?
        4. Migrating or Upgrading Components
      6. Defining the Operational Scenario
        1. Scenario Start Point
        2. Scenario End Point
        3. Scenario Constraints
      7. Scenario Example
      8. Securing Management Support
        1. Executive Sponsor
        2. Chief Executive Officer/Managing Director
        3. Business Decision Makers/Departmental Heads
        4. Security Officer
      9. Creating the Upgrade Project Plan
        1. Choosing a Methodology
      10. Defining Organizational Types
        1. Organization Type Descriptions
          1. Large International Conglomerate
          2. Large Multinational Organization
          3. Smaller Multinational Organization
          4. Large National Organization
          5. Medium National Organization
          6. Smaller National Organization
          7. Single Location Organization
        2. Branch Offices
          1. Regional Branch Office
          2. Large Branch Office
          3. Medium Branch Office
          4. Small Branch Office
        3. Special Case Scenarios
          1. Collaborating Organizations
          2. Security Sensitive
          3. Telecommuter-Friendly
        4. Outside Document Scope
          1. Small Office/Home Office (SOHO) Customers
          2. Hosted Environments
        5. No Matching Category
      11. Administrative and Network Models
      12. Resource Requirements
        1. Planning Phase
        2. Proof-of-Concept and Pilot Phases
      13. Personnel Requirements
        1. Microsoft Solutions Framework (MSF)
        2. MSF Team Roles
          1. Product Manager
          2. Project Manager/Program Manager
          3. Infrastructure Administrator
          4. Deployment Administrator
          5. Desktop Administrator
          6. Intranet/Internet Administrator
          7. Browser Administrator
          8. Messaging/Exchange Administrator
          9. Network Manager/Administrator
          10. Testing/Quality Assurance Team
          11. User Education/Training/Communication
          12. Logistics Management
        3. Task-Specific Roles
          1. Consultants/System Integrators
          2. Active Directory Architect
          3. Exchange Architect/Deployment Planning/Migration Planning Specialist
          4. Network Analyst
          5. Helpdesk Manager/Technical Support Manager
          6. Development
          7. End Users
      14. Time Requirements
      15. Writing the Project Plan
      16. Summary
        1. Give Us Your Feedback
    4. 2. Making the Decision to Deploy
      1. Introduction
        1. Chapter Start Point
        2. Chapter End Point
        3. Design Considerations
        4. Resource Requirements
        5. System Prerequisites
      2. Process Flowchart
      3. Determining Strategic Deployment Objectives
        1. Basing Upgrade Decisions on Strategic Initiatives
        2. Understanding the Current Implementation
          1. Obtaining Details of Computing Environment
          2. Inspecting the Current Environment
      4. Exchange 2000 Server Features & Benefits
        1. Features That Enhance Scalability
          1. Storage Improvements
          2. Front-End/Back-End Architectural Enhancements
          3. Clustering
          4. Native Content
          5. Internet Connectivity and Web Support
          6. Active Directory Scalability
        2. Features That Enhance Reliability
          1. Storage Improvements
          2. Clustering (Active/Active)
          3. New Routing Topology
          4. Active Directory Separation
        3. Features That Enhance Performance
          1. New Routing Topology
          2. Native Content/Lazy Conversion
          3. Front-End/Back-End Architectural Enhancements
          4. Support for New Technology Clients
        4. Features That Enhance Collaboration
          1. Real-Time Communications
          2. Instant Messaging (Presence Information Integration)
          3. Enhanced Outlook Web Access
          4. Public Folder Enhancements
          5. Audio/Video Conferencing
        5. Features That Enhance Administration
          1. Directory Integration with Active Directory and Policy-Based Management
          2. Microsoft Management Console Integration
          3. Unified Security Concepts and Simpler ACL Assignment
          4. WMI/CDO for Exchange Management
          5. International Support
        6. Features That Enhance Development
          1. Web Storage System
          2. XML Support
          3. OLE/DB and ADO
          4. Workflow (Engine/Events/Tools)
          5. Outlook Web Access
      5. Evaluating Business Requirements Against New Capabilities
        1. Sample Feature Mapping For Selected Business Objectives
      6. Formulating a Cost/Benefit Analysis
      7. Summary
        1. More Information
    5. 3. Evaluating Technical Factors and System Dependencies
      1. Introduction
        1. Chapter Start Point
        2. Chapter End Point
        3. Design Considerations
        4. Resource Requirements
        5. System Prerequisites
      2. Process Flowchart
      3. Active Directory and Exchange 2000
        1. New Object Classes within Active Directory
        2. Domain Modes
        3. Users
        4. Groups
      4. Exchange 2000 and Groups
        1. Group Scope and Types
          1. Global Groups
          2. Domain Local Groups
          3. Universal Groups
        2. Groups in Mixed Mode Domains
        3. Using Groups within Exchange 2000
        4. Security Groups
        5. Distribution Groups
        6. Universal Groups
          1. Global Group Usage
          2. Domain Local Group Usage
          3. Universal Group Usage
          4. Group Usage Summary
            1. Security Groups
            2. Distribution Groups
            3. Global Groups
            4. Domain Local Groups
            5. Universal Groups
      5. Active Directory Design Considerations
        1. Incorporating Business Needs
        2. Coordinating the Active Directory Design
        3. Active Directory Dependencies
        4. Global Address List
        5. Global Catalog Considerations
          1. Best Practices
          2. Global Catalogs in a Mixed-Mode Environment
        6. Universal Groups
        7. Native Mode Considerations
        8. Client Connectivity Issues
        9. Active Directory Forest Dependencies
        10. Active Directory Domain Dependencies
        11. Windows 2000 Site Dependencies
        12. Active Directory Connector Placement
        13. Public Folders
          1. Public Folder Permissions
          2. Distribution Lists and Security Groups
          3. Public Folder Administration
      6. Core Operating System Dependencies
        1. DNS
        2. Internet Information Server Dependencies
        3. WINS
      7. Exchange 5.5 Dependencies
        1. Upgrade Precautions
        2. Exchange Software Requirements
        3. The Active Directory Connector
        4. Exchange 2000 in Mixed and Native Mode
          1. Mixed Mode
          2. Native Mode
        5. The Recipient Update Service (RUS)
        6. The Site Replication Service (SRS)
        7. Exchange 5.5 Service Account
        8. Public Folder Permissions
      8. Administrative and Routing Groups
        1. How They Interact
          1. Administrative Groups
          2. Routing Groups
          3. Mixed Mode Operation
        2. How Routing Has Changed
        3. Messaging Transport Changes On Upgrade
        4. Routing Group, SMTP, and X.400 Connectors
          1. Directory Replication Connectors
          2. Foreign Connectors
          3. Transfer of Ownership of Directory Entries
          4. Effects of Ownership on Import and Export
        5. Upgrade Options
          1. Native Connector Upgrades
          2. Foreign Connector Upgrades
        6. Choosing The Best Approach
          1. In-Place Upgrade
          2. Build New Upgrade
      9. Hardware and Performance Considerations
        1. Processor
        2. Memory
        3. Storage
        4. RAID Definitions
          1. Exchange Data Storage Locations
            1. SMTP Queue Directory
            2. .EDB and .STM Files
            3. Transaction Log Files
          2. Storage Groups and Memory
          3. Databases and Log Files
          4. Storage Area Networks
          5. Network Attached Storage
        5. Network Interface
      10. Software Considerations
        1. Software Requirements
        2. Exchange 2000 Licensing
          1. Exchange 2000 Licenses
          2. Operating System Licenses
      11. Summary
        1. Further Reading
    6. 4. Connecting Active Directory to Exchange 5.5
      1. Introduction
        1. Chapter Start Point
        2. Chapter End Point
        3. Resource Requirements
          1. Personnel
          2. Skills
        4. Design Considerations
      2. Planning and Deploying Active Directory
        1. Deploying Active Directory
      3. Process Flowchart
      4. Reviewing the Exchange 5.5 Environment
        1. Operating System
          1. Domain Controllers
        2. Service Pack
        3. Naming
        4. Mailboxes
          1. ADC Account Mapping
          2. Using NTDSNoMatch
        5. Public Folders
        6. Other Issues
          1. LDAP
          2. Internet Mail Service
          3. Connectors Not Supported in Exchange 2000
          4. Third-Party Software
      5. Preparing the Active Directory Forest
        1. Schema Extensions
          1. Schema Permission
          2. Replication Traffic
      6. Using the Active Directory Connector
        1. ADC Versions
          1. Windows 2000 ADC
          2. Exchange 2000 ADC
        2. How ADC Works
          1. Mailbox
          2. Distribution Lists
          3. Custom Recipients
        3. Connection Agreements
        4. Architecture Strategy
      7. Removing the ADC
        1. Changing to Native Mode
        2. Related Topics
      8. Summary
        1. More Information
    7. 5. Creating the Deployment Plan
      1. Introduction
        1. Chapter Start
        2. Chapter Finish
        3. Design Considerations
        4. Resource Requirements
        5. System Prerequisites
      2. Upgrading or Migrating?
        1. What is Upgrading?
        2. What is Migrating?
        3. Which Option is for Best for Me?
          1. When Should I Migrate?
          2. When Should I Upgrade?
        4. Choosing Between Migrating and Upgrading
          1. Recommended Deployment Path
      3. Consolidating with Exchange 2000
        1. What is Consolidation?
        2. Why Consolidate?
          1. Reduced Cost
          2. Increased Reliability
          3. Reduced Complexity
          4. Reduced Network Traffic
        3. Consolidation Limitations
        4. Server Consolidation Methods
          1. Exchange 2000 Mailbox Hosting
          2. Consolidation Requirements
            1. Processor
            2. Memory
            3. Storage
          3. Exchange 2000 Resource Partitioning
          4. Other Advantages
        5. What are the Potential Issues?
          1. The Network Is Fine As It Is
          2. The Risks Are Too High
          3. The Cost of Consolidation Is Too High
        6. Is Consolidation for Me?
          1. Large International Conglomerate (LIC) Example
          2. Single Location Organization (SLO) Example
        7. Architectural Changes due to Consolidation
        8. Assess Current Messaging System
        9. Determine Consolidation Strategy
        10. Intra-Office Consolidations
          1. Global Headquarters
          2. Regional Branch Office
          3. Large Branch Office
          4. Medium Branch Office
          5. Small Branch Office
        11. Inter-Office Consolidations
      4. Determining Your Deployment Strategy
        1. Examining Current Exchange System
          1. Exchange System Review at the Data Center Level
          2. Exchange System Review at the Site Level
          3. Exchange System Review at the Individual Server Level
      5. Building a Deployment Plan
        1. What You Will Need
        2. What You Should Know
        3. In-Place Upgrade or Migration?
        4. Exchange 2000 Routing Groups and Administrative Groups
        5. Exchange 2000 Server Migration/Upgrade Timing
          1. Site Upgrade Timing Recommendations
          2. Server Migration/Upgrade Timing Recommendations
      6. Decommissioning Exchange Servers
      7. Summary
    8. 6. Constructing Security and Administrative Models
      1. Introduction
        1. Chapter Start Point
        2. Chapter End Point
        3. Design Considerations
        4. Resource Requirements
        5. System Prerequisites
      2. Building the Security Model
        1. What You Will Need
        2. What You Should Know
      3. Current Exchange 5.5 Security Model
        1. Exchange 5.5 Security Model Review
          1. Organization Security Model
          2. Site Security Model
          3. Recipient Security Model
          4. Configuration Security Model
        2. Current Windows NT Security Model
        3. Exchange 5.5 Message Journaling
        4. Exchange 5.5 Third-Party Security Tools
      4. Exchange 2000 Security Model
        1. Active Directory Security
        2. Exchange 2000 Object Security
        3. Exchange 2000 Administration/Routing Groups
          1. Exchange 5.5 Security Model Example 1
          2. Exchange 5.5 Security Model Example 2
          3. Exchange 5.5 Security Model Example 3
        4. Permissions
        5. Administrative Groups
        6. Routing Groups
      5. Migrating Your Security Model
        1. Migrating Recipient Object Security Model
          1. Example
        2. Migrating Organizational Security Model
        3. Migrating Site Security Model
      6. Building the Administrative Model
        1. Design Considerations
        2. Administrator Types
          1. View-Only Administrator
          2. Administrator
          3. Full Administrator
        3. Policies
          1. System Policies
          2. Recipient Policies
        4. User Administration
        5. Mail-Enabled Groups
        6. Global Settings
        7. Server Management
        8. Routing
        9. Public Folders
      7. Summary
    9. 7. Designing Monitoring and Maintenance Procedures
      1. Introduction
        1. Chapter Start Point
        2. Chapter End Point
        3. Design Considerations
        4. Resource Requirements
        5. System Prerequisites
      2. Active Directory Considerations
        1. Active Directory
        2. Schema Architect/Administrator Role
      3. Identifying Operational Requirements
        1. Identifying and Tasking Teams
        2. Security and Account Privileges
      4. Process Flow
      5. Defining Service Level Agreement Metrics
        1. Defining a Service Level Agreement
        2. Service Level Agreement Metrics
      6. Service Delivery Functions
        1. Service Level Management
        2. Availability Management
        3. Capacity Management
        4. Contingency Planning
        5. Cost Management
      7. Deciding What to Monitor
        1. Processor
        2. Memory
        3. Disk I/O
        4. Network I/O
        5. Setting Monitoring Levels
        6. Identifying Causes of Downtime
        7. Dealing With Bottlenecks
        8. Reducing the Monitoring Burden
          1. Health Monitoring
          2. High-to-Medium Level Problem Resolution Metric
          3. Detailed Troubleshooting, Optimization or Capacity Planning Metrics
      8. Monitoring and Maintenance Tools
        1. Changes from Exchange 5.5
          1. Performance Optimizer
          2. Upgrading Performance Optimizer Settings
        2. Exchange 2000 Tools
          1. Exchange Monitoring and Status Tool
          2. Queue Viewer
          3. Message Tracking Center
        3. Windows 2000 Tools
          1. Performance Monitor
            1. Counter Logs
            2. Trace Logs
            3. Alerts
            4. Monitoring Permissions
          2. Event Viewer
          3. Windows Management Instrumentation
          4. Using PerfMon with Windows Management Instrumentation
          5. Web Monitor Tool
          6. Additional Tools
      9. Monitoring Exchange Server Availability
        1. Performance Monitor System Uptime Counter
        2. Exchange 2000 Service Availability
      10. Defining an Escalation Model
        1. Example Escalation Model
          1. Escalation Model Objective
          2. Incident Escalation Processing Components and Definitions
            1. Sample Incident Severities
            2. Incident Severity Assessment and Ticket Generation
            3. Incident Troubleshooting
            4. Incident Escalation Handoff
          3. First Tier – Process
          4. Second Tier – Solution
          5. Third Tier – Crisis Management
          6. IT Management
      11. Creating your Monitoring and Maintenance Plan
      12. Summary
        1. More Information
          1. WMI Scripting
          2. Building Management Components for Microsoft Exchange 2000
    10. 8. Choosing Client Access Methods
      1. Introduction
        1. Chapter Start Point
        2. Chapter End Point
        3. Resource Requirements
        4. Design Considerations
      2. Process Flowchart
      3. Major Client Types
        1. Internet Mail Protocols
          1. SMTP
          2. POP3
          3. IMAP4
          4. LDAP
        2. MAPI Protocols
        3. HTTP Clients
      4. Exchange 2000 Clients
        1. Outlook 2000
          1. Features
          2. Special MAPI Considerations
          3. Appropriate Environments
            1. Branch Offices
            2. Does the Location Have a Permanent Link?
            3. How Much Bandwidth Is Available?
            4. Telecommuter Friendly (TF)
          4. Outlook 2000 Minimum Hardware/Software Requirements
        2. Outlook 98 and Outlook 97
          1. Features
          2. Special Considerations
          3. Appropriate Environments
          4. Outlook 98 Minimum Hardware/Software Requirements
          5. Outlook 97 Minimum Hardware/ and Software Requirements
        3. Outlook Express
          1. Features
          2. Special Considerations
          3. Roaming Users
          4. Appropriate Environments
          5. Outlook Express Minimum Hardware/Software Requirements
        4. Web Clients
          1. Features
          2. Special Considerations
          3. Appropriate Environments
          4. Hardware and Software Requirements
        5. Front-End/Back-End Servers
      5. Summary
    11. 9. Ensuring Messaging Security
      1. Introduction
        1. Chapter Start Point
        2. Chapter End Point
        3. Prerequisites
        4. Resource Requirements
        5. System Prerequisites
      2. Introduction to PKI and KMS
        1. Design Considerations
      3. Encryption Basics
        1. Symmetric Key
        2. Public Key
        3. Digital Signature
        4. Public Key Infrastructure Components
          1. X.509 Certificates
          2. Public Keys and Certificates
          3. Certificate Versions
      4. Certification Authority
        1. Types of Certification Authorities
        2. Certificate Enrollment
        3. Certificate Revocation
      5. Secure Messaging Using Exchange KMS
      6. Network Security
        1. IP Security (IPSec)
        2. Other Network Security
      7. Planning Your Exchange Security
        1. PKI Planning
          1. Certificate Server Planning
          2. Planning a Trust Hierarchy
          3. Planning Cross-Certification
        2. Exchange Server Security Planning
          1. SMTP Security
            1. SASL and AUTH
            2. SASL/AUTH over SSL
            3. Windows NT Challenge/Response and NTRPC.
          2. Message Security
            1. X.509v1 Key Exchange (Item Encryption and Signing)
            2. X.509v3 Key Exchange (Item Encryption and Signing)
        3. Client Security Planning
      8. Summary
    12. 10. Planning Outlook Web Access Servers
      1. Introduction
        1. Chapter Start Point
        2. Chapter End Point
        3. Resources
      2. The New OWA Architecture
        1. IIS: The Exchange 2000 Server Protocol Engine
        2. Web Storage System
        3. Exchange 2000 Multi-Tiered Architecture
        4. Performance and Scalability
        5. Host Naming
      3. OWA 2000 Feature Overview
        1. Outlook and OWA Feature Comparison
        2. Supported/Recommended Browsers
        3. Language Support
      4. Assessing OWA User Population
        1. Defining OWA User Profiles
        2. Recommended Reading
      5. Determining OWA Application Requirements
        1. Default Virtual Directories
        2. Extending OWA
        3. Virtual Servers
          1. Public Folder Virtual Directories
        4. Security Requirements
          1. Server Certificates
          2. Other Security Considerations
      6. Planning an FE/BE Topology
        1. FE/BE Tradeoffs
        2. Intranet Deployments
        3. Internet-Connected Deployments
          1. Single Firewall
          2. Perimeter Network (Two Firewalls)
        4. Mixed (Intranet/Internet) Deployments
      7. FE/BE Server Hardware
        1. Selecting Front-End Server Hardware
          1. Rack-Mounted Servers
          2. Planning for Growth
          3. Reference Hardware
            1. Front-End Server
            2. Back-End Servers
        2. Server Standardization
      8. Planning for Availability
        1. Network Load Balancing
          1. Single Namespace
          2. Global Catalog Availability
        2. FE/BE Deployment Options
        3. Round Robin DNS
      9. Planning for Integration
        1. DNS Integration
          1. Host Naming
        2. Firewall Integration
          1. Front End Behind Firewall
          2. Front-End on Perimeter Network
        3. Network Integration
      10. Summary
        1. More Information
    13. 11. Implementing an Exchange 2000 Server Pilot
      1. Introduction
        1. Chapter Start Point
        2. Chapter End Point
        3. Project Phases
        4. Resource Requirements
          1. Personnel
            1. Pre-Pilot Users
            2. Pilot Users
            3. Technology Evangelists (Super Users)
            4. Internet Service Provider Technical Support
            5. External Recipients
          2. Hardware
          3. Software
          4. Time
          5. Office Space
          6. Training Facility
        5. Design Considerations
          1. Multiple Pilots
      2. The Pilot Migration Process
        1. The Rolling Implementation
      3. Process Flowchart
      4. Pre-Project Planning Phase
        1. Presenting Outline Business Case to Management
      5. Project Planning Phase
        1. Creating Overall Test and Migration Plan
          1. Deciding Which Features to Pilot
            1. Client Features
            2. Server Features
          2. Assessing Risks of Pilot/Migration Process
          3. Risks Associated with E-mail Migration
          4. Sample Risk Analysis
        2. Securing Full Management and Budgetary Support
      6. Project Start
        1. Implementing a Project Tracking Database
        2. Ordering the Hardware and Software
          1. Assembling and Briefing the Project Team
        3. Allocating Sufficient Office Space
      7. Pre-Pilot Phase (Optional)
        1. Training Pre-Pilot Users and Technology Evangelists
        2. Training Helpdesk Operators
        3. Installing Exchange 2000 on the Pilot Server
        4. Running Pre-Pilot
        5. Evaluating Results of Pre-Pilot
      8. Full Pilot Phase
        1. Training Pilot Users
        2. Running Full Pilot with Representative Users
        3. Evaluating Results of Full Pilot
      9. Pilot to Production Phase
        1. Finalizing Plan of Move from Pilot to Production
        2. Training End Users on New System
        3. Setting User Expectations
        4. Implementing Move from Pilot to Production
        5. Deploying Client Software (Optional)
        6. Informing Users of Changeover
        7. If It Goes Wrong
      10. Post Migration Phase
        1. Performing Post-Migration Tasks
        2. Monitoring for Correct Operation
        3. Decommissioning an Earlier E-mail System
      11. Summary
        1. More Information
    14. 12. Planning a Successful Deployment
      1. Introduction
        1. Chapter Start Point
        2. Chapter End Point
        3. Resource Requirements
          1. Personnel
        4. Design Considerations
      2. Analyzing Success
        1. When to Start the Analysis Process
        2. Analysis Plan
      3. Process Flowchart
      4. Preparing for the Analysis Process
        1. Rapid Economic Justification
        2. Microsoft Solutions Framework
        3. Economic Justification in Larger Environments
      5. Pre-Deployment Review
        1. Metrics
        2. Customer Satisfaction
        3. Analysis
        4. Functional Requirements Ranking
          1. Analysis
        5. Project Team
          1. Analysis
      6. Pilot/Testing Review
        1. Pilot Analysis
        2. Pilot Final Review
      7. Deployment Review
        1. Analysis
      8. Post-Deployment Survey
      9. Summary
        1. More Information
    15. A.
      1. Company Type Acronyms
      2. Exchange 2000 Benefit Analysis
      3. Recommended Hardware Levels
    16. Glossary
    17. SPECIAL OFFER: Upgrade this ebook with O’Reilly