You are previewing Microsoft® Exchange 2000 Server Operations Guide.
O'Reilly logo
Microsoft® Exchange 2000 Server Operations Guide

Book Description

Microsoft Exchange 2000 Server Operations is designed to provide the best information on how to manage Exchange in a day-to-day environment.

Table of Contents

  1. Microsoft® Exchange 2000 Operations Guide: Version 1.0
    1. SPECIAL OFFER: Upgrade this ebook with O’Reilly
    2. A Note Regarding Supplemental Files
      1. Content Lead
      2. Key Authors
      3. Reviewers
    3. 1. Introduction
      1. Introduction
      2. Microsoft Operations Framework (MOF)
        1. How to Use This Guide
        2. Efficiency, Continuity, and Security
      3. Chapter Outlines
      4. Planning and Deployment
      5. Service Level Agreements
        1. Features
        2. Performance
        3. Recovery
        4. Support
      6. Summary
        1. Related Topics
    4. 2. Capacity and Availability Management
      1. Introduction
        1. Chapter Sections
      2. Capacity Management
      3. Availability Management
        1. Service Hours
        2. Service Availability
        3. Minimizing System Failures
          1. Decreasing Single Points of Failure
          2. Increasing the Reliability of Exchange 2000
        4. Minimizing System Recovery Time
      4. Performance Tuning
        1. Making Changes to the Registry
        2. No Performance Optimizer
        3. Optimizable Features
        4. Tuning Considerations
        5. Upgrading from Exchange 5.5 to Exchange 2000
        6. Tuning the Message Transfer Agent (MTA)
        7. Tuning SMTP Transport
          1. Mailroot Directory Location
          2. SMTP File Handles
        8. Store and ESE Tuning
          1. Online Store Maintenance
            1. Active Directory Checking
            2. Message Deletion and Online Defragmentation
          2. Online Backups
          3. Choosing the Correct Maintenance Strategy
          4. Extensible Storage Engine (ESE) Heaps
          5. Store-Database Cache Size
          6. Log Buffers
        9. Tuning Active Directory Integration
        10. Tuning Outlook Web Access (OWA)
      5. Hardware Upgrades
      6. Summary
    5. 3. Change and Configuration Management
      1. Introduction
        1. Prerequisites
        2. Chapter Sections
      2. Change Management
        1. Defining Change Type
          1. Step 1 – Request for Change Is Submitted to Change Manager
          2. Step 2 – Change Manager Assesses the RFC
          3. Step 3 – Change Is Passed to IT Executive Committee for Approval
          4. Step 4 – Change Is Passed to the Change Advisory Board for Scheduling
          5. Step 5 – Change Is Passed to the Change Owner
          6. Step 6 – Change Process Evaluation
          7. Minor and Standard Changes
          8. Scripting Minor and Standard Changes
        2. Security
        3. Software Control and Distribution
        4. Documentation
      3. Configuration Management
        1. Tools for Configuration Management
        2. Configuration Management and Change Management
        3. Configuration Items
          1. Configuration Management Relationships
          2. Defining Configuration Items
          3. Configuration Management and Exchange
        4. Maintaining the Configuration Management Database
          1. Change Management
          2. Ownership
          3. Security
          4. Backup
        5. Exchange System Policies
          1. Administering System Policies
      4. Summary
    6. 4. Enterprise Monitoring
      1. Introduction
        1. Prerequisites
        2. Chapter Sections
      2. Performance Monitoring
        1. System Monitor
        2. Exchange 2000 Objects and Counters to Monitor
          1. Information Store Counters
            1. MSExchangeIS
            2. MSExchangeIS Mailbox and MSExchangeIS Public
          2. SMTP Server
          3. MSExchangeMTA and MSExchangeMTAConnections
          4. MSExchangeIM Virtual Servers
          5. MSExchangeAL
        3. Windows 2000 Objects and Counters to Monitor
        4. Centralized Monitoring
      3. Event Monitoring
        1. Event Viewer
        2. Log Files
        3. Centralized Event Monitoring
      4. Availability Monitoring
        1. Monitoring and Status Tool
          1. Adding Services to the Default Configuration
          2. Monitoring Resources
          3. Notifications
          4. Status
          5. Disabling Server Monitoring
        2. Centralized Availability Monitoring
      5. Client Monitoring
      6. Summary
        1. More Information
    7. 5. Protection
      1. Introduction
        1. Chapter Start Point
        2. Chapter End Point
        3. Chapter Sections
      2. Protection Against Hacking
        1. Firewall Operations
          1. Maintaining Firewall Availability
          2. Ensuring That Only the Correct Traffic Passes Through the Firewall
          3. Monitoring Against Hacker Intrusion
          4. Dealing With Security Breaches
      3. Anti-Virus Measures
        1. Staying Current
        2. Dealing With Virus Infection
        3. Blocking Attachments at the Client
      4. Disaster Recovery Procedures
        1. Backing Up
          1. Offline Backup
          2. Disk Imaging
        2. Restoring
          1. Recovering Individual Messages
          2. Recovering Lost Mailboxes
          3. Recovering Exchange Stores and Storage Groups
          4. Full Exchange Server Recovery
          5. Recovering Exchange After Active Directory Failure
          6. Alternate Server Recovery
        3. Recovery Testing
      5. Summary
    8. 6. Support
      1. Introduction
        1. Chapter Sections
      2. Providing Support for End Users
        1. Reducing End User Support Costs
          1. Problem Reporting
          2. Dealing with User Problems
          3. Notifying Users
      3. Exchange Problem Management
      4. Summary
    9. Glossary
    10. SPECIAL OFFER: Upgrade this ebook with O’Reilly