Download presentation
Presentation is loading. Please wait.
1
Planning and Configuring Mailbox Servers
Presentation: 90 minutes Lab: 75 minutes After completing this module, the students will be able to: Describe the Mailbox server role. Plan the Mailbox server deployment. Configure the Mailbox servers. Create and configure the mailbox databases. Required materials To teach this module, you need the Microsoft® Office PowerPoint® file 20341B_02.pptx. Important: We recommend that you use Office PowerPoint 2007 or newer to display the slides for this course. If you use PowerPoint Viewer or an earlier version of Office PowerPoint, some features of the slides might not display correctly. Preparation tasks To prepare for this module: Read all of the materials for this module. Practice performing the demonstrations. Practice performing the labs. Work through the Module Review and Takeaways section, and determine how you will use this section to reinforce student learning and promote knowledge transfer to on-the-job performance. As you prepare for this class, it is imperative that you complete the labs yourself so that you understand how they work and the concepts that are covered in each. This will allow you to provide meaningful hints to students who may get stuck in a lab, and it also will help guide your lecture to ensure that you cover the concepts that the labs cover. Module 2 Planning and Configuring Mailbox Servers
2
Configuring the Mailbox Servers
Module Overview 2: Planning and Configuring Mailbox Servers Configuring the Mailbox Servers
3
Lesson 1: Overview of the Mailbox Server Role
2: Planning and Configuring Mailbox Servers Demonstration: Importing Data to a User’s Mailbox
4
The Mailbox Server Role in Exchange Server 2013
2: Planning and Configuring Mailbox Servers In Exchange Server 2013, the Mailbox Server role provides: Hosting for mailbox databases Hosting for public folders Transport and message routing services: Hub Transport service Mailbox Transport services Unified Messaging service High-availability services Mailbox Server role features enhancements such as: Improved transaction logs for DAGs Enhanced site resiliency Describe the role of the Mailbox server in Exchange Server It is very important that you emphasize that the Hub Transport and Unified Messaging roles are now integrated within the Mailbox server.
5
20341B How the Mailbox Server Role Interacts with Clients and the Client Access Server 2: Planning and Configuring Mailbox Servers The Hub Transport service on the Mailbox server communicates with the Transport service on the Client Access server Describe how the Mailbox server communicates with clients and with the Client Access server. Use this diagram to describe services on both the Mailbox server and the Client Access server. Also, describe how the Client Access server interacts with clients. Do not spend too much time on describing the interaction as the Client Access server will be discussed in detail in Module 4.
6
The Mailbox Store in Exchange Server 2013
2: Planning and Configuring Mailbox Servers Mailbox stores in Exchange Server 2013 consist of following files: Mailbox database (.edb file) Transaction log (.log file) Checkpoint file (.chk) Temporary file (Tmp.edb) Reserve log files (E##res0001.jrs - E##res000A.log per database, where ## is the log prefix) Administrators rarely directly interact with these files, except during backup and restore procedures Describe the mailbox store in Exchange Server Introduce the files that make up the Exchange Server mailbox store. Explain the purpose of each file.
7
Database Log File Considerations
2: Planning and Configuring Mailbox Servers Each change performed in a mailbox database must be logged in the transaction log file before it is committed to the database Each transaction log file is 1 MB in size Transaction log files are not deleted automatically Circular logging can be used, but it is not recommended Follow these guidelines for log files: Regularly perform Exchange Server backups Move transaction logs to a dedicated drive (does not apply if you are using DAGs) Place transaction log files on a redundant disk array Ensure enough free disk space is available on the log disk Do not use compression on the volume with the logs Discuss transaction log files. Explain why these files are very important, and describe their role in backup and restore procedures. Also explain what circular logging is, and why we do not recommend using it.
8
How Are Mailbox Databases Updated?
2: Planning and Configuring Mailbox Servers 1 4 Update 3 Write to DB Discuss the process that the Mailbox server uses when it receives data, as follows: The Mailbox server receives the message. The Mailbox server writes the message to the current transaction log and memory cache simultaneously. Note: If the current transaction log reaches 1 megabyte (MB) of storage, Exchange Server renames it and creates a new current transaction log. The Mailbox server writes the transaction from memory cache to the appropriate database. The Mailbox server updates the checkpoint file to indicate that the transaction was committed successfully to the database. Clients can access and read the message in the database. When time permits, identify the files from the previous slide that each step of this process affect. Receive message 5 Client access Write message 2 8
9
Storage Options for the Exchange Server 2013 Mailbox Server Role
2: Planning and Configuring Mailbox Servers Disk storage options: DAS SAN RAID options: RAID 0 ― Striping RAID 1 ― Mirroring RAID 5 ― Striping with parity RAID 0+1 ― Mirrored striped sets RAID 6 ― Striping with double parity RAID 1+0 or RAID 10 ― Mirrored sets in a striped set JBOD Lead a discussion about disk storage options and about RAID technologies. The students should understand the general advantages and disadvantages of each major technology. Although there are very few hard-and-fast rules, the basic concepts are the same across all implementations of these technologies. Stress that because the Exchange Server 2013 disk I/O requirements are lower than in previous Exchange Server versions, more storage options are available. Explain that an organization should take care in ensuring that the storage option it selects meets its business and technical requirements for the Exchange Server deployment. Tools are available to approximate usage patterns, such as Load Simulator and JetStress. Explain that you can use these tools to test the suitability of various hardware configurations in your environment.
10
Importing and Exporting Data from a Mailbox Database
2: Planning and Configuring Mailbox Servers Exchange Server 2013 allows you to export a user‘s mailbox data to a .pst file or import data to a user‘s mailbox from a .pst file Use the following cmdlets to import or export data: New-MailboxImportRequest New-MailboxExportRequest Mailbox Import Export roles must be assigned to the user that performs the operation PST files can be located on shares Discuss mailbox import and export features, and explain the scenarios in which you should use them. Emphasize the need to delegate the Mailbox Import Export role to someone before starting the process. Mention that .pst files can be located on network shares, and describe how you should configure the security settings on the shared folders with the .pst files.
11
Demonstration: Importing Data to a User’s Mailbox
2: Planning and Configuring Mailbox Servers In this demonstration, your instructor will show you how to import data from a .pst file to a user‘s mailbox on the Exchange Server Leave all virtual machines running for subsequent demonstrations. Preparation Steps To perform this demonstration, you need to start the 20341B-LON-DC1, 20341B-LON-MBX1, 20341B- LON-CAS1, and the 20341B-LON-CL1 virtual machines. Start each machine and sign in to it before starting the next virtual machine. Sign into all virtual machines using the Adatum\Administrator account with the password Pa$$w0rd. Important: Ensure that you start your virtual machines at least ten minutes prior to conducting the demonstration. Demonstration Steps On LON-CAS1, from the Start screen, start Internet Explorer, and in the address bar type and then press Enter. Sign in to Outlook Web App as Adatum\Aidan with the password Pa$$w0rd. At the Language and Time zone page, click save. After you sign in to Outlook Web App, make sure that you can see the In-Place Archive-Aidan Delaney folder in the navigation pane. Expand the folder, and make sure that only the Deleted Items subfolder is present. Sign out of Outlook Web App. On LON-MBX1, from the Start screen, click Exchange Management Shell. Type New-ManagementRoleAssignment –Role "Mailbox Import Export" –User Administrator, and then press Enter. Close the Exchange Management Shell. From the Start screen, click Exchange Management Shell. Type New-MailboxImportRequest -Mailbox Aidan -IsArchive -FilePath \\LON- DC1 \MailboxExport\backup.pst, and then press Enter. (More notes on the next slide)
12
2: Planning and Configuring Mailbox Servers
At the command prompt, type get-mailboximportrequest, and then press Enter. Make sure that the status of the MailboxImport is Completed. On the LON-CAS1 virtual machine, open Internet Explorer, type and then press Enter. Sign in to Outlook Web App as Adatum\Aidan with the password Pa$$w0rd. After you sign in to Outlook Web App, expand the In-Place Archive-Aidan Delaney folder in the navigation pane. Make sure that you have additional folders with messages present. Sign out of Outlook Web App and close Internet Explorer.
13
Lesson 2: Planning the Mailbox Server Deployment
2: Planning and Configuring Mailbox Servers Verifying Mailbox Server Role Performance
14
Planning Hardware for the Mailbox Server Role
2: Planning and Configuring Mailbox Servers When planning hardware for Exchange Server 2013, consider the following: CPU: Must be 64-bit Multicore recommended One core per 1,000 active mailboxes Memory: Minimum 8 GB per Mailbox server 3 MB per mailbox per 50 messages/day Discuss planning of hardware requirements for Mailbox servers. Advise the students on how they should calculate CPU and memory requirements for the Mailbox server role.
15
Planning Storage for the Mailbox Server Role
2: Planning and Configuring Mailbox Servers Consider the following when planning for Exchange Server storage: Replicated database copies increase the amount of storage required Slower disks have a lower cost per GB than faster disks DAS is significantly less expensive than a SAN JBOD can be considered when there are three or more replicas of a database There are typically fewer database copies when a SAN is used Use RAID to increase redundancy Use the Exchange Server Mailbox Server Role Requirements Calculator At the end of this topic, the students should understand that if they are using a DAG with at least three database copies, then they can consider using DAS with JBOD. If they implement DAS with JBOD, it is typically much less expensive than using a SAN for reliability. If the students use JBOD, they need to monitor for disk failures. If a disk fails, replace the disk and add the database copy back to the new disk. Effective monitoring is critical. The lower-speed SAS drives cost about the same as SATA drives, but SAS drives are more reliable.
16
Database Design for Mailbox Databases
2: Planning and Configuring Mailbox Servers When designing databases, you should consider: Use split log files and database storage to enhance recoverability when replication is not used Allocate space for indexes Allocate space for single-item recovery Allocate space for personal archives Allocate space for a recovery database This topic covers the following general categories relating to database configuration: Enhancing recoverability. Split log files and databases (not required if you are not restoring from backup). Allocating sufficient disk space. Indexes, recovery databases, single-item recovery/litigation hold, and personal archives.
17
Planning Mailbox Servers for High Availability
2: Planning and Configuring Mailbox Servers You can implement high availability for Mailbox servers by using DAGs Consider the following when planning DAGs: Mailbox database names must be unique in the organization Storage paths must be identical for all copies of a database DAGs require the failover clustering feature in Windows Server DAGs can be managed completely with Exchange Server 2013 tools DAGs can also protect public folders DAGs are the method used to implement high availability for Mailbox servers in Exchange Server DAGs only support Mailbox server roles, but can be combined with other server roles. If the students are familiar with Exchange Server 2007, you can mention that the Exchange Server high-availability methods, such as Local Continuous Replication (LCR) and Cluster Continuous Replication (CCR), have been removed in Exchange Server If they are familiar with Exchange Server 2010, they probably already know about DAGs. A DAG does not require a special edition of Exchange Server 2013; it can be implemented with Exchange Server 2013 Standard or Enterprise editions. Emphasize that DAGs also protect public folders in Exchange Server 2013. This topic does not completely cover high availability for Mailbox servers. A module later in this course is devoted to high availability for all server roles, and includes more in-depth coverage of DAGs.
18
Virtualizing Mailbox Server Considerations
2: Planning and Configuring Mailbox Servers Both Exchange Server 2013 server roles can be virtualized When implementing Exchange Server 2013 on the virtual machine, consider the following: Exchange Server 2010 has the same hardware requirements in a virtualized environment Do not use dynamic memory Limit virtual processor allocation to a ratio of 2:1 Do not dynamically expand virtual disks Do not use differencing or snapshots Test virtual disk performance Use pass-through and iSCSI storage if desired You can combine virtual machine high-availability methods with Exchange Server 2013 high-availability methods All server roles for Exchange Server 2013 can be virtualized, and that is commonly done. However, it is important to make sure that the virtual machines with Exchange Server 2013 meet the same hardware specifications as physical computers that you would use for Exchange Server The slide provides some guidance for configuring the virtual machine hardware. You may want to show the students the Server Virtualization Validation Program web page. It may be interesting for them to see the wide variety of virtualization platforms that are supported. Also mention that you can combine virtual machine high-availability methods with Exchange Server high-availability methods, such as a DAG.
19
Considerations for Planning Mailbox Databases
2: Planning and Configuring Mailbox Servers When planning mailbox databases, first determine whether you will deploy standalone mailbox servers or DAGs Based on this choice, you determine: Backup policies Mailbox database size Database and transaction log locations Storage solutions Discuss how you should plan mailbox database design in scenarios when you are using DAGs and when you are not using DAGs. Also discuss some common considerations for planning mailbox databases.
20
What Is an Exchange Mailbox Server Role Requirements Calculator?
2: Planning and Configuring Mailbox Servers Exchange Mailbox Server Role Requirements Calculator is a free tool from Microsoft that helps you design your Mailbox server deployment User inputs are made in the following categories: User profile High-availability architecture Server's CPU platform Storage architecture Backup architecture Network architecture It provides very detailed information about requirements for mailbox servers Provide information about Exchange Mailbox Server Role Requirements Calculator tool. Explain that this tool is actually very advanced Excel sheet created by Exchange product group. Also mention that at the time this course was written, the official tool for Exchange Server 2013 had not been released.
21
20341B Demonstration: Using the Exchange Mailbox Server Role Requirements Calculator 2: Planning and Configuring Mailbox Servers In this demonstration, your instructor will show you how to use the Exchange Mailbox Server Role Requirements Calculator Lave the virtual machines running for subsequent demonstrations. Preparation Steps To perform this demonstration, you need to start the 20341B-LON-DC1, 20341B-LON-CAS1, 20341B- LON-MBX1, and 20341B-LON-CL1 virtual machines. Sign in to the virtual machines as Adatum\Administrator with the password Pa$$w0rd. Demonstration Steps On LON-CL1, on the Start screen, click the Desktop tile. On the task bar, click File Explorer, navigate to C:\Files, and then double click E2013Calc.xlsm. In the Security Warning dialog box, click the Enable Content button. If the Welcome to your new Office Wizard launches, click Next three times and then click All done!. In the E2013Calc, on the Input sheet, enter the following values for each section: Exchange Environment Configuration Server Multi-Role Configuration (MBX+CAS): Yes Server Role Virtualization: Yes High Availability Deployment: Yes Number of Mailbox Servers Hosting Active Mailboxes / DAG: 4 Number of Database Availability Groups: 2 Mailbox Database Copy Configuration Total Number of HA Database Copy Instances (Includes Active Copy) within DAG: 3 Total number of Lagged Database Copy Instances within DAG: 1 Exchange Data Configuration Mailbox Moves/Week Percentage: 1% LUN Free Space Percentage: 15% (More notes on the next slide)
22
2: Planning and Configuring Mailbox Servers
Tier-1 User Mailbox Configuration Total Number of Tier-1 User Mailboxes/Environment: 500 Projected Mailbox Number Growth Percentage: 5% Total Send/Receive Capability/ Mailbox/Day: 50 messages Average Message Size (KB): 50 Mailbox Size Limit (MB): 1024 Personal Archive Mailbox Size Limit (MB): 2048 Deleted Item Retention Window (Days): 20 Single Item Recovery: Enabled Calendar Version Storage: Enabled Backup Configuration Backup Methodology: Software VSS Backup/Restore Backup Frequency: Weekly Full / Daily incremental Database and Log Isolation Configured: Yes Backup/Truncation Failure Tolerance: 3 Network Failure Tolerance (Days): 0 Primary Datacenter Disk Configuration Database: 1000 GB, 7.2K RPM SAS 3.5” Log: 500 GB, 7.2K RPM SAS 3.5” Restore LUN: 1500 GB, 7.2K RPM SAS 3.5” (More notes on the next slide)
23
2: Planning and Configuring Mailbox Servers
In the E2013Calc, click the Role Requirements tab. Review the calculated requirements provided on this sheet. Click the Distribution Sheet. Click the Fail Server button for each server. Observe where the databases will be distributed. Click Export DAG Scripts button. In the Storage Calculator – Export Scripts window, click OK twice. Click the LUN Requirements sheet. Review the calculated requirements provided on this sheet. Click the Backup Requirements sheet. Review the calculated requirements provided on this sheet. Click the Replication Requirements sheet. Review the calculated requirements provided on this sheet. Click the Storage Design sheet. Review the calculated requirements provided in this sheet. Close Excel without saving changes.
24
Verifying Mailbox Server Role Performance
2: Planning and Configuring Mailbox Servers To evaluate server configuration and performance: Gather usage information Create a test environment Measure hardware capacity with LoadGen and Jetstress Virtualization should not be used for performance testing unless the production environment will be virtualized Explain that the test environment must replicate production as closely as possible. Otherwise, capacity testing is not valid. For testing of features, many of the students will be using virtualized environments. A virtualized environment is not useful for performance testing unless the production servers will also be virtualized and placed on a host with the same hardware characteristics.
25
Lesson 3: Configuring the Mailbox Servers
2: Planning and Configuring Mailbox Servers Demonstration: Creating and Managing Mailbox Databases
26
Initial Mailbox Server Configuration Tasks
2: Planning and Configuring Mailbox Servers Before you put your Exchange 2013 Mailbox server into production, perform the following tasks: Secure the server Create and configure the databases Configure high availability Configure the public folders Configure the recipients, including resource mailboxes Configure the offline address book Implement an antivirus solution Discuss the tasks that should be performed before you put your Mailbox server into production, or before you migrate your data to it.
27
Configuring iSCSI Storage in Windows Server 2012
20341B Configuring iSCSI Storage in Windows Server 2012 2: Planning and Configuring Mailbox Servers iSCSI is a protocol that supports access to remote, SCSI-based storage devices over a TCP/IP network iSCSI SAN deployments include: IP network iSCSI targets iSCSI initiators iSCSI Qualified Name (IQN) iSCSI Target Servers in Windows Server 2012 include: Network/diskless boot Server application storage Heterogeneous storage Lab environments Define an iSCSI. Describe the benefits of using iSCSI storage. Describe components of the iSCSI solution, and then discuss the iSCSI target included in Windows Server 2012.
28
Demonstration: Configuring iSCSI Storage for the Mailbox Server Role
2: Planning and Configuring Mailbox Servers In this demonstration, your instructor will show you how to configure iSCSI storage for mailbox servers Leave the virtual machines running for the subsequent demonstration. Preparation Steps To perform this demonstration, you need to start the 20341B-LON-DC1, 20341B-LON-CAS1, 20341B- LON-MBX1, and 20341B-LON-CL1 virtual machines. Sign in to the virtual machines as Adatum\Administrator with the password Pa$$w0rd. Demonstration Steps On LON-DC1, from the task bar, start Server Manager, click Manage and then click Add Roles and Features. In the Add Roles and Features Wizard, on the Before you begin page, click Next. On the Select installation type page, click Next. On the Select destination server page, make sure that Select a server from the server pool is selected, and then click Next. On the Select server roles page, expand File And Storage Services (Installed), expand File and iSCSI Services (Installed), select the iSCSI Target Server check box, and then click Next. On the Select features page, click Next. On the Confirm installation selections page, click Install. When the installation is complete, click Close. On LON-DC1, in Server Manager, in the navigation pane, click File and Storage Services. In the File and Storage Services pane, click iSCSI. In the iSCSI VIRTUAL DISKS pane, click TASKS, and then in the TASKS drop-down list, select New iSCSI Virtual Disk. In the New iSCSI Virtual Disk Wizard, on the Select iSCSI virtual disk location page, under Storage location, click C:, and then click Next. (More notes on the next slide)
29
2: Planning and Configuring Mailbox Servers
On the Specify iSCSI virtual disk name page, in the Name box, type iSCSIDisk1, and then click Next. On the Specify iSCSI virtual disk size page, in the Size box, type 2, make sure GB is selected in the drop-down list, and then click Next. On the Assign iSCSI target page, click New iSCSI target, and then click Next. On the Specify target name page, in the Name box, type LON-MBX1, and then click Next. On the Specify access servers page, click Add. In the Select a method to identify the initiator dialog box, click Browse. In the Select Computer window, type LON-MBX1, click Check Names, click OK, and then click OK again. On the Specify access servers page, click Next. On the Enable Authentication page, click Next. On the Confirm selections page, click Create. On the View results page, wait until the creation is completed, and then click Close. In the iSCSI VIRTUAL DISKS pane, click TASKS, and then in the TASKS drop-down list, select New iSCSI Virtual Disk. In the New iSCSI Virtual Disk Wizard, on the Select iSCSI virtual disk location page, under Storage location, click C:, and then click Next. On the Specify iSCSI virtual disk name page, in the Name box, type iSCSIDisk2, and then click Next. On the Specify iSCSI virtual disk size page, in the Size box, type 500, make sure MB is selected in the drop-down list, and then click Next. (More notes on the next slide)
30
2: Planning and Configuring Mailbox Servers
On the Assign iSCSI target page, click lon-mbx1, and then click Next. On the Confirm selections page, click Create. On the View results page, wait until the creation is completed, and then click Close. Switch to LON-MBX1, and then click the Desktop tile. On LON-MBX1, on the task bar, click Server Manager, click Tools, and then click iSCSI Initiator. In the Microsoft iSCSI dialog box, click Yes. Click the Discovery tab. Click Discover Portal. In the IP address or DNS name box, type , and then click OK. Click the Targets tab. Click Refresh. In the Targets list, select iqn com.microsoft:lon-dc1-lon-mbx1-target, and then click Connect. Select Add this connection to the list of Favorite Targets, and then click OK two times.
31
Creating and Managing Mailbox Databases
2: Planning and Configuring Mailbox Servers You can create and manage mailbox databases by using the Exchange Administration Center or Exchange Management Shell The Exchange Administration Center is used for basic management The Exchange Management Shell is used for advanced mailbox database management You cannot use the Exchange Administration Center to move mailbox databases Useful Exchange Management Shell cmdlets include: New-MailboxDatabase Get-MailboxDatabase Set-MailboxDatabase Move-DatabasePath Explain how you can create and manage mailbox databases in the EAC and in the Exchange Management Shell. Emphasize that advanced configuration and management cannot be performed in the EAC. Describe the purpose of the most important cmdlets that are used for Mailbox server management.
32
Demonstration: Creating and Managing Mailbox Databases
2: Planning and Configuring Mailbox Servers In this demonstration, your instructor will show you how to create and manage mailbox databases At the completion of the demonstration, revert all virtual machines. Preparation Steps To perform this demonstration, you need to start the 20341B-LON-DC1, 20341B-LON-CAS1, 20341B- LON-MBX1, and 20341B-LON-CL1 virtual machines. Sign in to the virtual machines as Adatum\Administrator with the password Pa$$w0rd. Demonstration Steps On LON-MBX1, in Server Manager, click Tools, and then click Computer Management. Expand Storage, and then click Disk Management. Right-click Disk 1, and then click Online. Right-click Disk 1, and then click Initialize disk. In the Initialize Disk dialog box, click OK. Right-click the unallocated space next to Disk 1, and then click New Simple Volume. On the Welcome to the New Simple Volume Wizard page, click Next. On the Specify Volume Size page, click Next. On the Assign Drive Letter or Path page, click Next. On the Format Partition page, in the Volume Label box, type DB2. Select the Perform a quick format check box, and then click Next. Click Finish. (Note: If the Microsoft Windows window pops up with prompt to format the disk, click Cancel.) Repeat steps 3 through 10 for Disk 2. (Note: Use Logs for Volume Label). Close the Computer Management window. Click to the Start screen and then click Internet Explorer. Open the EAC, by typing in Internet Explorer and sign in as Adatum\Administrator with the password of Pa$$w0rd. (More notes on the next slide)
33
2: Planning and Configuring Mailbox Servers
Click servers in the feature pane, and then click databases tab. Click the New button. In the Database window, type DB2 in the Mailbox database text box. Click browse. In the Select Server window, select LON-MBX1 and click ok. In the Database file path text box, type: E:\DB2\DB2.edb In the Log folder path text box, type F:\Logs\DB2. Ensure that Mount this database is selected, and click save. Click ok. Switch to Exchange Management Shell. In the Exchange Management Shell window, type the following: Set-MailboxDatabase –identity DB2 –DeletedItemRetention 20.00:00:00 – CircularLoggingEnabled $true –ProhibitSendQuota 2.2GB and press Enter. Type Dismount-Database –identity DB2, and press Enter. Type y, and press Enter. Type Mount-Database –identity DB2, and press Enter.
34
Lab: Configuring Mailbox Servers
2: Planning and Configuring Mailbox Servers Exercise 3: Creating and Configuring Mailbox Databases Exercise 1: Planning Configuration for Mailbox Servers Use the Mailbox server role calculator to design the Exchange infrastructure for A. Datum. You must fulfill the following requirements: A. Datum has to provide mailboxes for 5,000 users. The number of mailboxes grows by a factor of 5% per year. All users must be provided with 1-GB mailboxes. In addition, each user must have an online archive of 2 GB. The average message size is 75 KB, and the total number of sent/received messages per mailbox per day is 150. All deleted messages should have a retention period of 30 days, with single-item recovery enabled. A. Datum plans to deploy four Mailbox servers. Mailbox databases should be highly available. Each database should have three total instances: 1 active instance, 1 passive instance, and 1 lagged copy with 24 hours delay. Approximately 2% of mailboxes are moved per week. Databases and logs should be separated. A. Datum plans to implement a third-party backup solution. Backups will be performed on a weekly full/daily incremental schema. Currently, A. Datum has only one datacenter, and at this time the company is not planning for a site- resilient solution. Servers for Exchange currently have 1,000-GB disks for databases, 500-GB disks for transaction logs, and 1,500-GB disks for Restore LUN. A. Datum also plans to leverage virtualization as much as possible. Note: This lab uses a modified version of the Exchange Server 2010 Exchange Mailbox Server Role Requirements Calculator. Ensure that you download and use the Exchange Server 2013 version when calculating hardware requirements for Exchange Server 2013 servers. Logon Information Virtual Machines B-LON-DC1 20341B-LON-CAS1 20341B-LON-MBX1 20341B-LON-CL1 User name Adatum\Administrator Password Pa$$w0rd Estimated Time: 60 minutes (More notes on the next slide)
35
2: Planning and Configuring Mailbox Servers
Exercise 2: Configure Storage on the Mailbox Servers Currently, the Mailbox server has no locally attached storage for the mailbox database. You have available iSCSI storage that should be used for the mailbox databases and logs. These drives will be sufficient for the initial deployment at A. Datum, but the organization expects to add several additional iSCSI drives during the deployment. You need to configure Windows Server 2012 to connect to the iSCSI drives, and configure storage for the mailbox databases and logs. Exercise 3: Creating and Configuring Mailbox Databases When installing the Mailbox server role, a default mailbox database is created on the server. You need to modify the location and configuration of the default mailbox database to meet the corporate standards. The database should have a warning limit set to 0.9 GB, prohibit send at 1.0 GB, and prohibit send and receive at 2.2 GB. In addition to the default mailbox database, you also need to create a new mailbox database to meet the deployment requirements. The new mailbox database should be placed on the iSCSI drive, and it should have circular logging enabled. You also need to set different limits and retention time periods from the default database. After setting the limits and retentions, you need to export the mailbox of Aidan Delaney to a .pst file.
36
20341B Lab Scenario 2: Planning and Configuring Mailbox Servers After performing a test deployment, A. Datum is now planning the deployment of Exchange Server in a production environment. First, they want to summarize all requirements and all available resources, and then plan for the Mailbox server deployment. After the deployment, you need to configure the storage attached to the servers, and then configure the mailbox databases. After the configuration tasks, you need to export data from the user’s mailbox to the .pst file.
37
20341B Lab Review 2: Planning and Configuring Mailbox Servers What must you do before you can export the user’s mailbox to the .pst file? Question What is the purpose of the Exchange Mailbox Server Role Requirements Calculator? Answer This tool provides recommendations for hardware and software configuration of the Mailbox server role, based on the inputs that the user provides. Can you move existing mailbox databases to a different path by using the EAC? No, you can only move them by using the Exchange Management Shell. What must you do before you can export the user’s mailbox to the .pst file? You must ensure that the Mailbox Export Import role is assigned to you.
38
Module Review and Takeaways
20341B Module Review and Takeaways 2: Planning and Configuring Mailbox Servers Best Practice Review Questions Question Why would you choose to use SATA drives instead of a SAN or small computer system interface (SCSI) drives for your Mailbox servers? Answer SATA drives are much less expensive than a SAN or SCSI drive for data storage. However, they do have lower performance, at least in part due to slower spindle speeds. Exchange Server 2013 makes it possible to consider using lower performing SATA drives because of changes to the store that improves disk performance. Your organization needs to determine which storage solution to deploy for the new Exchange Server messaging environment. What information should you consider when selecting the hardware? You should consider many issues when choosing storage. Your focus should be on providing enough disk space and throughput to meet your needs. There are tools that you can use to approximate the requirements and help you make an informed decision. Tools Exchange Mailbox Server Role Calculator Exchange Administration Center Exchange Management Shell (More notes on the next slide)
39
2: Planning and Configuring Mailbox Servers
Best Practice: Use the Exchange Server Mailbox Server Role Calculator when planning for Mailbox server deployment. Always provide high availability for Mailbox servers. Do not use circular logging on mailboxes in production. Consider using Exchange native data protection. Instructor Note: Ensure that you cover the common issues and the corresponding troubleshooting tips listed in this section. Encourage students to share tips from their own work environments.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.