Job Aid - Operations Check Lists
Archived content. No warranty is made as to technical accuracy. Content may contain URLs that were valid when originally published, but now link to sites or pages that no longer exist. |
Updated : October 11, 2001
Microsoft® Exchange 2000 Server
This job aid is part of the Exchange 2000 Server Operations Guide.
This job aid will help you to identify which processes are essential for successful Microsoft® Exchange 2000 Server operations.
On This Page
Operations Procedures
Operations Procedures
Microsoft® Exchange 2000 Server has multiple components that need to be monitored on a continual basis. It also relies on a network operating system and physical network services. For Exchange Server to operate reliably, you need to define operations procedures for each of these services and components. The following checklists will help you ensure that you do not unintentionally omit crucial parts of your operations procedures.
This job aid includes checklists for the following:
General Operations
Capacity and Availability Management
Change and Configuration Management
Enterprise Monitoring
Protection
Support
These checklists present you with a series of questions to consider. Although you may want to answer yes to every question, budget constraints may prevent you from doing so. The important thing is that you consider all the questions. The checklists also refer you to the area in the Operations Guide where you can find more information.
General Operations |
Description |
Chapter |
Completed |
---|---|---|---|
Early involvement in Exchange 2000 Server planning and deployment |
Will your operations team be ready to take over responsibility for infrastructure and processes when the time comes? |
1 |
|
Feedback from operations |
Do you have a mechanism for providing feedback from the operations team to the planning and deployment team? |
1 |
|
SLA definitions |
Is the operations team involved in defining service level agreements (SLAs)? |
1 |
|
Operations documentation |
Have you agreed which operations documents should be produced? |
1 |
|
Capacity and Availability Management |
Description |
Chapter |
Completed |
Hardware reliability |
Are all system components on the Microsoft hardware compatibility list? |
2 |
|
Air conditioning/sprinkler systems |
Have you checked for overloaded circuits? |
2 |
|
Secure access |
Have you defined who can access data centers? |
2 |
|
Power failure |
Have you ensured that you have no exposed power switches? |
2 |
|
Single points of failure |
Have you minimized all single points of failure? |
2 |
|
Service Hours |
Are your service hours defined? |
2 |
|
Service availability |
Do you define levels of availability on a service-by-service basis? |
2 |
|
Capacity and availability |
Do you size your Exchange servers so that they meet your SLAs on availability? |
2 |
|
Minimizing recovery time |
Do you have hardware available to do a restore? |
2 |
|
Improving performance |
Have you tuned Exchange to the needs of your environment? |
2 |
|
Change and Configuration Management |
Description |
Chapter |
Completed |
Change control process |
Do you have a workflow defined for dealing with all forms of change (from major to standard)? |
3 |
|
Change and configuration management software |
Do you have change management software in place? |
3 |
|
Configuration items |
Have you defined which CIs should be recorded? |
|
|
Consistency |
Have you trained your staff in change and configuration management procedures? |
3 |
|
Documentation |
Does your change management process ensure that all change is documented fully? |
3 |
|
Verification |
Do you regularly check that your change management process is being followed? |
3 |
|
Enterprise Monitoring |
Description |
Chapter |
Completed |
Monitoring procedures |
Have you determined how your data will be collected and archived? |
4 |
|
What to monitor |
Have you determined key objects and counters to monitor? |
4 |
|
Baselines |
Have you established a baseline for the Microsoft Windows® 2000 operating system and Exchange 2000 Server counters? |
4 |
|
Thresholds |
Have you defined thresholds for key objects and counters? |
4 |
|
Alerts |
Do you have an effective alert mechanism in place? (one that does not rely on e-mail) |
4 |
|
Staffing |
Do you have staff on call to deal with alerts when they arise? |
4 |
|
Protection |
Description |
Chapter |
Completed |
Mailbox Security |
Do you monitor to see if rights on mailboxes change? |
5 |
|
Key Management Servers |
Have you considered deploying Key Management Server? |
5 |
|
Server security |
Are your servers running Exchange and domain controllers physically secure? |
5 |
|
Firewall |
Do you ensure high availability of your firewalls? |
5 |
|
Virus protection |
Do you check that all servers and clients always have the latest updates from the anti-virus software vendor? |
5 |
|
Security audit |
Have you performed a full security audit? |
5 |
|
Backup |
Do you perform regular backups? |
5 |
|
Recovery |
Do you set mailbox and message retention times on all your servers? |
5 |
|
Support |
Description |
Chapter |
Completed |
Reducing Service desk calls |
Do you have a Web site with help information for users? |
6 |
|
Prioritizing problems |
Do you prioritize problems based on the nature of the problem and the number of users affected? |
6 |
|
Service desk support |
Is your service desk staff trained in the use of Windows 2000 and Exchange 2000? |
6 |
|
Problem management |
Do you have an escalation path for troubleshooting? |
6 |
|
Getting help |
Do you have up-to-date contact details for all employees and vendors who may be required in a troubleshooting scenario? |
|
|