Installation Guide Template - Cluster Continuous Replication (Windows Server 2008)

Microsoft Exchange Server 2007 will reach end of support on April 11, 2017. To stay supported, you will need to upgrade. For more information, see Resources to help you upgrade your Office 2007 servers and clients.

 

Applies to: Exchange Server 2007 SP1, Exchange Server 2007 SP2, Exchange Server 2007 SP3

The following Microsoft Exchange Server 2007 installation guide template can be used as a starting point for formally documenting your organization's server build procedures for Exchange 2007 servers in a cluster continuous replication (CCR) environment.

Executive Summary

The purpose of this document is to explain the installation and configurations necessary to install Exchange 2007 in a cluster continuous replication environment.

Business Justification

By having an installation guide, Company_Name can guarantee standardization across the enterprise, reduce Total Cost of Ownership, and ease troubleshooting steps.

Scope

The scope of this document is limited to installation of an Exchange 2007 server in a CCR environment for Company_Name on the Windows Server 2008 Enterprise x64 Edition operating system platform.

Prerequisites

The operator should have working knowledge of Windows Server 2008 Enterprise x64 Edition concepts, Exchange 2007 concepts, the Exchange Management Console and Exchange Management Shell, the command line, and several system utilities. This document does not say more about the details of any system utility except as necessary to complete the tasks within.

Assumptions

This document assumes that Windows Server 2008 x64 Edition is installed according to company baseline regulations. This includes the latest approved service pack and hotfixes.

This document assumes that forest and domain preparation steps were finished as described in the Exchange 2007 Online Help topic How to Prepare Active Directory and Domains.

This document assumes that Exchange 2007 and Windows Server 2008 are secured as described in the following best practices documents:

Important

Follow the procedures in this document sequentially. Unexpected results may occur if changes are made out of sequence.

Requirements

Cluster Continuous Replication Planning

Review the Planning for Cluster Continuous Replication topic in the Exchange 2007 Online Help before you implement the cluster.

Transport Dumpster Requirements

Because clustered Mailbox servers in a CCR environment replicate data asynchronously, there is data loss during a lossy failover. To help reduce the effect of this, the Hub Transport server role has a feature that temporarily keeps mail that was recently delivered to a CCR server. This feature is known as the transport dumpster. If there is a lossy failover, the transport dumpster is used by clustered Mailbox servers in a CCR environment to re-deliver mail to each storage group for a specific timeframe. (The timeframe is based on the last log inspected and the last log generated.) The transport dumpster is for clustered Mailbox servers in a CCR environment only.

The transport dumpster is an organizational setting and, therefore, should be configured appropriately to handle all clustered Mailbox servers in a CCR environment within the organization. Additionally, be aware that the transport dumpster is configured per storage group and per clustered Mailbox server in an Active Directory directory service site.

By default, the transport dumpster is enabled to support environments that deploy CCR and that have the following settings:

  • MaxDumpsterSizePerStorageGroup – 18 megabytes (MB)

  • MaxDumpsterTime – 7 days

We recommend that you configure the MaxDumpsterSizePerStorageGroup parameter. This specifies the maximum size of the transport dumpster queue for each storage group, to a size that is 1.5 times the size of the maximum message that can be sent. For organizations that do not use a maximum message size, the formula should be 1.5 times the average size for all messages sent in the organization.

Transport Dumpster Configuration

Connect to an Exchange 2007 server through Remote Desktop, and then log on by using an account that has local administrative access and that is delegated the Exchange Organization Administrator role.

Follow the procedures in the Exchange 2007 Online Help topic How to Configure the Transport Dumpster.

Cluster Node Configuration

The following media are required for this section:

Windows Server Enterprise x64 Edition mediaExchange Server 2007 Configuration DVD

Note

For instructions about how to build an Exchange 2007 Configuration DVD, see How to Create a Configuration DVD and Automation Files.

Additional Software Verification

  1. Verify that Remote Desktop is enabled.

  2. As an optional process, install Microsoft Network Monitor. For more information, see the Microsoft Network Monitor Web site.

Drive Configuration

  1. Connect to the server through Remote Desktop, and then use an account that has local administrative access to log on.

  2. Click Start, click Administrative Tools, and then select Computer Management.

  3. Expand Storage, and then click Disk Management.

  4. Format, rename, and assign the appropriate drive letters so that the volumes and DVD drive match the appropriate server configuration. At the very least, there should be a D drive for the Exchange binaries, and the DVD drive should be configured as the Z drive. The following table describes the drive configuration that should be used.

    Drive configuration

    LUN Drive letter Usage

    1

    C

    Operating system

    2

    D

    Exchange binaries, tracking logs

    3

    Z

    DVD drive

Windows Server 2008 Hotfix Installation

All hotfixes are installed by using a batch file. For a complete list of hotfixes that are installed, see the Contoso server build DVD hotfix list. A sample hotfix list is available at Server Build DVD - Sample Hotfix List.

  1. Connect to the server through Remote Desktop, and then log on by using an account that has local administrative access and that is delegated local Administrator access.

  2. Insert the Exchange 2007 Configuration DVD.

  3. Move to the \W2K8-HotFix folder, and then double-click W2K8-hotfix.bat.

  4. Click Yes if a Digital Signature not Found dialog box appears.

    Note

    These dialog boxes will not appear in environments that have not deployed the Windows Security templates.

  5. Wait for the files to copy, and then restart the server.

Network Interfaces Configuration - Private Network

For the private network, make sure that the IP address scheme is not using the same subnet or network as any of the public network adapters.

Never use teaming for the private network. For more information, see Microsoft Knowledge Base article 254101, Network adapter teaming and server clustering.

  1. Connect to what will become the first node in the cluster through Remote Desktop, and then use an account that has local administrative access to log on.

  2. Click Start, click Control Panel, and then double-click Network and Sharing Center.

  3. Click Manage network connections.

  4. Locate the connection for the internal network, and then rename the connection with an appropriate name.

  5. Right-click the connection, and then click Properties.

  6. In the network connection properties, on the General tab, verify that the Client for Microsoft Networks, Internet Protocol Version 4 (TCP/IPv4) and File and Printer Sharing for Microsoft Networks check boxes are selected in the This connection uses the following items area.

  7. Click Internet Protocol Version 4 (TCP/IPv4), and then click Properties.

  8. In Internet Protocol Version 4 (TCP/IPv4) Properties, click Advanced.

  9. On the DNS tab, verify the following information in Advanced TCP/IP Settings:

    1. Make sure that addresses are not listed in the DNS server addresses, in order of use area if this is a private network.

    2. Make sure that the Register this connection's addresses in DNS check box is cleared.

  10. On the WINS tab, make sure that Disable NetBIOS over TCP/IP is not selected.

  11. Click OK two times to save the changes, and then click Close to exit Properties.

Network Interfaces Configuration - Public Network

Make sure that the IP address scheme for the public network is not using the same subnet or network as any private network adapters. Instead, the public network must use the subnet or network that is used to route network traffic within your intranet.

Teaming can be used on the public network in redundancy mode, but it cannot be used in load balancing mode. However, if problems or issues occur that are related to teaming, Microsoft Customer Support Services will require you to disable teaming. If this resolves the issue, you must seek assistance from the hardware manufacturer. For more information about teaming, see Microsoft Knowledge Base article 254101, Network adapter teaming and server clustering.

  1. Connect to what will become the first node in the cluster through Remote Desktop, and then use an account that has local administrative access to log on.

  2. Click Start, click Control Panel, and then double-click Network and Sharing Center.

  3. Click Manage network connections.

  4. Locate the connection for the internal network, and then rename the connection with an appropriate name.

  5. Right-click the connection, and then select Properties.

  6. In the network connection's properties on the General tab, make sure that the Client for Microsoft Networks, Internet Protocol Version 4 (TCP/IPv4) and File and Printer Sharing for Microsoft Networks check boxes are selected in the This connection uses the following items area.

  7. Click Internet Protocol Version 4 (TCP/IPv4), and then click Properties.

  8. In Internet Protocol Version 4 (TCP/IPv4) Properties, click Advanced.

  9. In Advanced TCP/IP Settings, verify the following information on the DNS tab:

    1. Make sure that all the required addresses are listed in the DNS server addresses, in order of use area.

    2. Make sure that the correct suffixes are listed in the Append these DNS suffixes (in order) area.

  10. On the WINS tab, make sure that Disable NetBIOS over TCP/IP is not selected.

  11. Click OK two times to save the changes, and then click Close to exit Properties.

Domain Membership Configuration

  1. Connect to the server through Remote Desktop, and then use an account that has local administrative access to log on.

  2. Click Start, right-click Computer, and then click Properties.

  3. In the Computer Name, domain, and workgroup settings area, click Change Settings.

  4. In System Properties, click Change.

  5. In the Member of area, click Domain, and then type the appropriate domain name.

  6. Enter the appropriate credentials.

  7. Click OK two times, and then close System Properties.

  8. Restart the server.

Local Administrators Verification

  1. Connect to the server through Remote Desktop, and then use an account that has local administrative access to log on.

  2. Verify that the following accounts are members of the local administrators group on this server. Add the accounts if they are not already there.

    Local administrators

    Item Account Description Role

    1

    Domain Admins

    Domain Administrative Global Group

    Administrator

    2

    Root Domain\Exchange Organization Administrators

    Exchange Administrators

    Administrator

  3. Verify that the account you are using is a member of a group that is a member of the local administrators group on the Windows Server 2008-based server. If it is not, log on by using an account that is a member of the local administrators group before continuing.

Local Administrator Account Password Reset

  1. Connect to the server through Remote Desktop, and then use an account that has local administrative access to log on.

  2. Click Start, right-click Computer, and then click Manage.

  3. Expand the following node: Configuration\Local Users and Groups\Users.

  4. Right-click Administrator, and then click Set Password. Change the password so that it meets strong complexity requirements.

  5. As an optional step, right-click Administrator, and then select Rename. Rename the account according to company regulations.

Tools Installation

This section installs several tools that will help with Exchange administration and with troubleshooting support issues.

Note   Debugging Tools for Windows help administrators to debug processes that are affecting service. For more information, see Install Debugging Tools for Windows 64-bit Version.

  1. Connect to the server through Remote Desktop, and then use an account that has local administrative access to log on.

  2. Insert the Exchange 2007 Configuration DVD.

  3. Open a command prompt, and then move to the \Support folder on the DVD.

  4. Run the following command, where <DVDROM-Drive> is the DVD drive letter:

W2K8Toolsinstall.cmd <DVDROM-Drive> 
  1. Right-click the C:\Tools folder, and then click Properties.

  2. On the Security tab, click Advanced.

  3. Click to clear the Include inheritable permissions from this object's parent check box, and then click Edit.

  4. In the Permission entries list, click Everyone, and then click Remove. Also remove the Authenticated Users security principal if it is listed in this list.

  5. Click Add, and then add the following groups, and grant each group FULL CONTROL permission:

    • SYSTEM

    • The local Administrators group

    • Creator Owner

Page File Modifications

  1. Connect to the server through Remote Desktop, and then use an account that has local administrative access to log on.

  2. Click Start, right-click Computer, and then click Properties.

  3. Click Advanced system settings.

  4. In the Startup and Recovery area, click Settings.

  5. In the Write Debugging Information area, select Kernel Memory Dump in the list, and then click OK.

  6. In the Performance area, click Settings.

  7. On the Advanced tab, in the Virtual Memory area, click Change.

  8. On servers that have a dedicated page file drive, follow these steps:

    1. In the Drive list, click C:, and then click Custom size.

    2. For the C: drive, set the Initial Size (MB) value to a minimum of 200 MB. (Windows requires between 150 MB and 2 GB page file space, depending on server load and the amount of physical RAM that is available for page file space on the boot volume when Windows is configured for a kernel memory dump. Therefore, you may be required to increase the size.)

    3. For the C: drive, set the Maximum Size (MB) value to that of the Initial Size.

    4. In the Drive list, select the page file drive (for example, the P: drive), and then click Custom size.

    5. In the Initial Size (MB) box, type the result of one of the following calculations:

      If the server has less than 8 GB of RAM, multiply the amount of RAM times 1.5,.

      If the server has 8 GB of RAM or more, add the amount of RAM plus 10 MB.

    6. In the Maximum Size (MB) box, type the same amount that you typed in the Initial Size box.

    7. Delete all other page files.

    8. Click OK.

  9. On servers that do not have a dedicated page file drive, follow these steps:

    1. In the Drive list, click C:, and then click Custom size.

    2. For the C: drive, in the Initial Size (MB) box, type the result of one of the following calculations:

      If the server has less than 8 GB of RAM, multiply the amount of RAM times 1.5.

      If the server has 8 GB of RAM or more, add the amount of RAM plus 10 MB.

    3. Delete all other page files.

    4. Click OK.

  10. Click OK two times to close the System Properties dialog box.

  11. Click No if you are prompted to restart the system.

    For more information about Page File recommendations, see the following articles:

Drive Permissions

  1. Connect to the server through Remote Desktop, and then use an account that has local administrative access to log on.

  2. Click Start, and then click Computer.

  3. Right-click the D Drive, and then click Properties.

  4. On the Security tab, click Edit.

  5. Grant the following rights as outlined in the following table. Click Add, and then select the local server from Locations to add accounts that are listed in the table, but are not listed in the Group or user names list.

    Drive permissions

    Account Permissions

    Administrators

    Full Control

    SYSTEM

    Full Control

    Authenticated Users

    Read and Execute, List, Read

    CREATOR OWNER

    Full Control

  6. Click OK to return to D Drive Properties.

  7. On the Security tab, click Advanced.

  8. On the Permissions tab, click Edit.

  9. In the Permission entries table, click CREATOR OWNER, and then click Edit.

  10. In the Apply to list, click Subfolders and files only.

  11. Click OK three times.

  12. Click OK to close the drive properties.

  13. Repeat steps 3 through 12 for each additional drive (other than drive C).

Additional Node Configuration

Repeat all steps in the Cluster Node Configuration section for the second node that will exist in the cluster.

Verification Steps

Organizational Unit Verification

Submit a change request and have the computer object moved to the appropriate organizational unit (OU). If you are following the recommendations in the Exchange 2007 Security Guide, the OU will be \Member Servers\Exchange Backend Servers\Exchange Mailbox Servers.

Active Directory Site Verification

Verify that the server is in the correct domain and Active Directory site. If the server is not in the correct Active Directory site, submit a change request to the appropriate operations group and have the server moved to the appropriate site. To verify that the domain and Active Directory site are correct, follow these steps:

  1. Connect to the server through Remote Desktop, and then use an account that has local administrative access to log on.

  2. Open a command prompt, and then type the following command:

    NLTEST /server:%COMPUTERNAME% /dsgetsite
    

The name of the Active Directory site to which the server belongs is displayed.

Domain Controller Diagnostics Verification

  1. Connect to the server through Remote Desktop, and then use an account that has local administrative access to log on.

  2. Open a command prompt, and then change paths to drive C.

  3. Type the following command:

    dcdiag /s:<Domain Controller> /f:c:\dcdiag.log
    

    Note

    Change <domain Controller> to a domain controller that is contained within the same Active Directory site as the Exchange server.

  4. Review the output of the C:\Dcdiag.log file, and then verify that there are no connectivity issues with the local domain controller.

  5. Repeat steps 3 and 4 for each domain controller in the local Active Directory site.

    Note

    Domain Controller Diagnostics (DCDiag) is a Windows support tool that tests network connectivity and DNS resolution for domain controllers. If the account being used does not have administrative credentials, several tests under the Doing primary tests heading may not pass. These tests can be ignored if the connectivity tests pass. In addition, the log file may report that some service validation tests did not pass. These messages can be ignored if the services do not exist on the domain controller.

Exchange Best Practices Analyzer Verification

  1. Use Remote Desktop to connect to a server in the environment that has the Exchange Server Best Practices Analyzer or the Exchange 2007 Management tools installed. Then, use an account that has local administrative access to log on. Depending on the configuration, do one of the following:

    1. Click Start, click All Programs, click Microsoft Exchange, and then click Best Practices Analyzer.

    2. Click Start, click All Programs, click Microsoft Exchange Server 2007, and then click Exchange Management Console.

  2. Click Toolbox.

  3. Double-click Best Practices Analyzer.

  4. Click Download the latest updates to apply any updates for the Best Practices Analyzer engine.

  5. Provide the appropriate information to connect to Active Directory, and then click Connect to the Active Directory server.

  6. On the Start a New Best Practices Scan page, in the Select the type of scan to perform area, click Exchange 2007 Readiness Check, and then click Start Scanning.

  7. Review the report. Following the resolution articles that are provided and take action on any errors or warnings that are reported by the Best Practices Analyzer.

    Note

    The Microsoft Exchange Analyzers help Microsoft Exchange Server administrators troubleshoot several operational support issues.

Cluster Service Installation

The following information is required to complete this section.

  • The IP Address that will be used for the cluster resource group.

  • The Network name that will be used for the cluster resource group.

  • The Hub Transport server that will be used to host the file share for the File Share Witness.

Exchange 2007 Prerequisites Installation

  1. Connect to the server through Remote Desktop, and then use an account that has local administrative access to log on.

  2. Open an administrative Command Prompt window.

  3. Type the following command where <path> references the E2K7 CONFIG DVD \E2K7-PreReqs folder:

    ServerManagerCmd -ip <path>\Exchange-Base.XML
    
  4. Install the Microsoft Filter Pack. For more information, see 2007 Office System Converter: Microsoft Filter Pack.

  5. Type the following command, where <path> represents the path of the E2K7 CONFIG DVD \E2K7-PreReqs folder, and <Exchange-role> represents the XML file for the appropriate role:

    ServerManagerCmd -ip <path>\<Exchange-role>.XML
    
  6. Restart the server if it is required.

Cluster Installation

  1. Connect to the server through Remote Desktop, and then use an account that has local administrative access to log on.

  2. Follow the procedures outlined in the "To use the New Server Cluster wizard to create a new cluster" from the Exchange 2007 Online Help topic How to Create a Windows Server 2008 Failover Cluster for Cluster Continuous Replication.

Cluster Networking Configuration

  1. Connect to the server through Remote Desktop, and then use an account that has local administrative access to log on.

  2. Follow the procedures from the Exchange 2007 Online Help topic How to Configure Cluster Networks for a Failover Cluster.

Windows Server 2008 Cluster Hotfix Installation

All hotfixes are installed by using a batch file. For a complete list of hotfixes that are installed, see the Contoso server build DVD hotfix list. A sample hotfix list is available at Server Build DVD - Sample Hotfix List.

  1. Connect to the server through Remote Desktop, and then log on by using an account that has local administrative access and that is delegated local Administrator access.

  2. Insert the Exchange 2007 Configuration DVD.

  3. Move to the \W2K8-HotFix folder, and then double-click W2K8-clus-hotfix.bat.

  4. Click Yes if a Digital Signature not Found dialog box appears.

    Note

    These dialog boxes will not appear in environments that have not deployed the Windows Security templates.

  5. Wait for the files to copy, and then restart the server. Repeat the process on all remaining nodes within the cluster.

Node and File Share Majority Quorum Configuration

At a high level, the steps outlined here will create, enable, and help secure the file share witness resource for the cluster.

  1. Connect to one of the cluster nodes through Remote Desktop, and then use an account that has local administrative access to log on.

  2. Follow the procedures from the Exchange 2007 Online Help topic How to Configure the Node and File Share Majority Quorum.

Cluster Validation

In Windows Server 2008, the way that clusters are qualified has changed significantly with the introduction of the Validate a Configuration Wizard. This wizard is a new feature that is integrated into failover clustering in Windows Server 2008. With the cluster validation wizard, you can run a set of focused tests on a collection of servers that you intend to use as nodes in a cluster. This cluster validation process tests the underlying hardware and software to obtain an accurate assessment of how well failover clustering can be supported on a given configuration. In fact, a cluster validation report is required by Microsoft Customer Support Services (CSS) as a condition of Microsoft supporting a given configuration. For more information about the validation process, see the Windows Server 2008 Online Help topic, Failover Cluster Step-by-Step Guide: Validating Hardware for a Failover Cluster.

  1. Connect to one of the cluster nodes by using Remote Desktop, and then log on with an account that has local administrative access.

  2. Follow the procedures in the Exchange 2007 Online Help topic, How to Validate a Windows Server 2008 Failover Cluster Configuration.

Handoff Test

  1. Connect to one of the cluster nodes through Remote Desktop, and then use an account that has local administrative access to log on.

  2. Open an administrative Command Prompt window.

  3. Type the following command, where <Cluster Name Object> references the cluster network name:

    cluster <Cluster Name Object> group "Cluster Group" /move
    
  4. Verify that the return response indicates that the Cluster Group is online.

Exchange Installation

The following CD media are required for this section:

  • Microsoft Exchange 2007 DVD

  • Exchange 2007 Configuration DVD

Clustered Mailbox Server Computer Object Creation

This section assumes that the guidelines in the Windows Server Security Hardening Guide were followed.

  1. Connect to the active cluster node through Remote Desktop, and then log on by using an account that has privileges to create computer objects in the desired organizational unit within Active Directory.

  2. Click Start, point to Administrative Tools, and then click Active Directory Users & Computers.

  3. Connect to the domain that will contain the clustered Mailbox server.

  4. On the View menu, click Advanced Features.

  5. Expand Member Servers, and then expand Clustered Mailbox Servers.

  6. Right-click Clustered Mailbox Servers, point to New, and then click Computer.

  7. In the Computer Name box, type the name of the clustered Mailbox server. For example, type E2K7-MBX-01.

  8. Click Next two times.

  9. Click Finish.

  10. Right-click the computer object that you created in step 6, and then click Properties.

  11. On the Security tab, make sure that the Cluster Name Object (CNO) has Full Control on the clustered Mailbox server computer object.

  12. Close Active Directory Users & Computers, and then log off the system.

Exchange 2007 Installation - Active Node

  1. Connect to the first node in the cluster through Remote Desktop, and then log on by using an account that has local administrative access and that has been delegated the Exchange Server Administrator role (or higher).

  2. Follow either the command line or setup GUI procedure from the Exchange 2007 Online Help topic How to Install the Active Clustered Mailbox Role in a CCR Environment on Windows Server 2008.

Exchange 2007 Installation – Passive Node

  1. Connect to the second node in the cluster through Remote Desktop, and then log on by using an account that has local administrative access and that has been delegated the Exchange Server Administrator role (or higher).

  2. Follow either the command line procedure or the Setup GUI procedure from the Exchange 2007 Online Help topic How to Install the Passive Clustered Mailbox Role in a CCR Environment on Windows Server 2008.

Handoff Test

In Exchange 2007, moving resources between nodes should be handled by using the Exchange Management Shell instead of the Cluster Administrator program or the Cluster.exe program.

  1. Connect to an Exchange 2007 server through Remote Desktop, and then log on by using an account that has been delegated the Exchange Server Administrator role (or higher).

  2. Click Start, click All Programs, click Microsoft Exchange Server 2007, and then click Exchange Management Shell.

  3. Move the clustered Mailbox server. To do this, run the following command in the Exchange Management Shell, where <CMSName> is the name of the clustered Mailbox server and <ServerNode2> is the name of the passive node in the cluster:

    Move-ClusteredMailboxServer <CMSName> -TargetMachine <ServerNode2> -MoveComment "Handoff test"
    
  4. Verify that the clustered mailbox server is online and ready. To do this, run the following command:

    Get-ClusteredMailboxServerStatus <CMSName>
    
  5. Repeat steps 3 through 4 to move the resources back to the active node (now the passive node).

Exchange Server 2007 Post-SP1 Roll-up Installation

Install all hotfixes that are released since Exchange Server 2007 Service Pack 1 (SP1). All hotfixes are installed by using a batch file. To view a sample hotfix list, see the Exchange Help topic Server Build DVD - Sample Hotfix List.

  1. Connect to the server through Remote Desktop, and then use an account that has local administrative access to log on.

  2. Insert the Exchange 2007 Configuration DVD in the DVD drive.

  3. Move to the E2K7-PostSP1 folder, and then double-click E2K7-postsp1.bat.

  4. Click Yes if any Digital Signature not Found dialog boxes open.

    Note

    These dialog boxes will not appear in environments that have not deployed the Windows Security templates.

  5. Wait for all file copies to complete, and then restart the server.

  6. Repeat steps 1 through 5 on the passive node.

Exchange Search Configuration

  1. Connect to the server through Remote Desktop, and then log on by using an account that has local administrative access.

  2. Follow the instructions that are in How to Register IFilters 2.0 with Exchange 2007 and Exchange 2010.

  3. If you want to search through PDF files, install the Adobe PDF iFilter 9 for 64-bit platforms, and then follow the instructions that are mentioned in the Adobe document Configuring PDF iFilter for MS Exchange Server 2007.

The third-party Web site information in this topic is provided to help you find the technical information you need. The URLs are subject to change without notice.

Clustered Mailbox Server DNS Tuning

  1. Connect to the server through Remote Desktop, and then use an account that has local administrative access to log on.

  2. Follow the procedures from the Exchange 2007 Online Help topic How to Configure the DNS TTL Value for a Clustered Mailbox Server Network Name Resource.

First Storage Group Configuration

Use the following table to obtain the information that is needed for the commands.

Important

The values in the following table are sample values and are not recommended. Update these values to reflect the actual values for your organization.

First storage group information

Old New example

Storage Group Name

First Storage Group

SG1

Database Name

Mailbox Database

<CMSName> MBX Store 1

Storage Group Path

<Exchange Install Path>\Mailbox\First Storage Group

L:\LOG01

Database Path

<Exchange Install Path>\Mailbox\First Storage Group

E:\MDB01

Database Filename

Mailbox database.edb

Priv01.edb

  1. Connect to the server through Remote Desktop, and then log on by using an account that has local administrative access and that has been delegated the Exchange Server Administrator role (or higher).

  2. Click Start, click All Programs, click Microsoft Exchange Server 2007, and then click Exchange Management Shell.

  3. In Exchange Management Shell, run the following command to suspend replication, where <CMSName> is the name of the clustered Mailbox server:

    Suspend-StorageGroupCopy "<CMSName>\First Storage Group"
    
  4. Run the following command to unmount the database, where <CMSName> is the name of the clustered mailbox server:

    Dismount-Database "<CMSName>\First Storage Group\Mailbox Database"
    
  5. To change the Storage Group name from “First Storage Group” to “SG1,” run the following command, where <DCName> is the name of a domain controller:

    Set-StorageGroup "<CMSName>\<Old SG Name>" -Name <New SG Name> -DomainController <DCName>
    
  6. To change the mailbox database name from “Mailbox Database” to “<CMSName> MBX Store 1,” run the following command:

    Set-MailboxDatabase "<CMSName>\<New SG Name>\<Old DB Name>" -Name "<New DB Name>" -DomainController <DCName>
    
  7. To change the location of the storage group’s transaction logs, run the following command:

    Move-StorageGroupPath "<CMSName>\<New SG Name>" -LogFolderPath:<New SG Location> -SystemFolderPath:<New SG Path> -DomainController <DCName> -ConfigurationOnly
    
  8. To change the location of the mailbox database, run the following command:

    Move-DatabasePath "<CMSName>\<New SG Name>\<New DB Name>" -EdbFilePath:<New DB Path\New DB FileName> -DomainController <DCName> -ConfigurationOnly
    
  9. Move the files (database, logs, and checkpoint files) to their new locations on both the active node and the passive node.

  10. To mount the database, run the following command:

    Mount-Database "<CMSName>\<New SG Name>\<New DB Name>" -DomainController <DCName>
    
  11. To restart replication, run the following command:

    Resume-StorageGroupCopy "<CMSName>\<New SG Name>"
    

Product Key Configuration

  1. Connect to the server through Remote Desktop, and then log on by using an account that has local administrative access and that is delegated the Exchange Organization Administrator role.

  2. Follow the procedure that is outlined in the Exchange 2007 Online Help topic How to Enter the Product Key.

Security Configuration Wizard

This section is optional and may be skipped.

  1. Connect to the server through Remote Desktop, and then use an account that has local administrative access to log on.

  2. Follow the procedures from the Exchange 2007 Online Help topic How to Install the Security Configuration Wizard to install the Security Configuration Wizard.

  3. Follow the procedures from the Exchange 2007 Online Help topic How to Register Exchange Server Role SCW Extensions to register the Exchange 2007 Edge Transport server SCW extension.

  4. Follow the procedures from the Exchange 2007 Online Help topic How to Create a New Exchange Server Role SCW Policy to configure and apply the policy.

System Performance Verification

By default, Exchange 2007 optimizes the server’s memory management for programs. Follow these steps to configure the server’s system cache as the default size. Mailbox servers will benefit from this configuration.

  1. Connect to the server through Remote Desktop, and then use an account that has local administrative access to log on.

  2. Click Start, right-click Computer, and then click Properties.

  3. Click Advanced system settings.

  4. On the Advanced tab, under Performance, click Settings.

  5. On the Advanced tab, verify that the Processor scheduling is set to Background services.

  6. Verify that the Memory Usage is set to System Cache.

  7. Click OK.

  8. Repeat steps 1 through 5 on the second node in the cluster.

Cluster Failover Tuning

CCR provides an attribute for Mailbox servers that you can use to control unscheduled outage recovery behavior. The AutoDatabaseMountDial attribute has the following three possible values: Lossless, Good Availability, and Best Availability.

  • Lossless

    When the attribute is set to Lossless, the system waits for the failed node to come back online before databases are mounted. Even then, the failed system must return with all the logs that can be accessed, and they must not be corrupted. After the failure, the passive node is made active, and the Information Store is brought online. It checks whether the databases can be mounted without any data loss. If they can, the databases are mounted. If the databases cannot be mounted without any data loss, the system periodically tries to copy the logs. If the server returns and its logs are intact, the databases will mount. If the server returns and its logs are not intact, the remaining logs will not be available, and the affected databases will not mount.

  • Good Availability

    When the attribute is set to Good Availability, full automatic recovery is provided when replication is operating correctly and it is replicating logs at the rate that they are being generated.

  • Best Availability

    By default, the value is set to Best Availability. Best Availability operates similarly to Good Availability. However, it enables automatic recovery when the replication experiences slightly more latency. Therefore, the new active node might be slightly further behind the state of the old active node after the failover. This increases the possibility that database divergence occurs, and requires a full re-seed to correct.

    Note   By default, CCR is configured to use Best Availability. Typically, this setting should not be changed. Therefore, this section may be skipped.

  1. Connect to the first cluster node through Remote Desktop, and then use an account that has local administrative access to log on.

  2. Follow the procedures in the Exchange 2007 Online Help topic How to Tune Mount and Failover Settings for Cluster Continuous Replication.

Test Mailbox Creation

Several of the diagnostics tasks that are used to monitor Exchange require test mailboxes to be created on the Mailbox servers. For more information about how to use the Test script to create the test mailboxes, see the Monitoring for Agentless Servers topic in the Exchange 2007 Online Help.

  1. Connect to the Exchange 2007 Mailbox server through Remote Desktop, and then log on by using an account that has local administrative access and that is delegated the Exchange Server Administrator role (or higher).

  2. Click Start, click All Programs, click Microsoft Exchange Server 2007, and then click Exchange Management Shell.

  3. In Exchange Management Shell, change the directory path to <Exchange Server Install Path>\Scripts.

  4. Type New-TestCasConnectivityUser.ps1, and then press ENTER.

  5. Enter a temporary password, and then follow the prompts to create the test mailboxes.

Exchange Server Role Configuration

Records Management Server Configuration

This section can be skipped if messaging records management (MRM) will not be enabled in the environment. For more information about how to deploy MRM, see the Deploying Messaging Records Management topic in the Exchange 2007 Online Help.

  1. Connect to an Exchange 2007 server through Remote Desktop, and then log on by using an account that has local administrative access and that is delegated the Exchange Server Administrator role (or higher).

  2. Click Start, click All Programs, click Microsoft Exchange Server 2007, and then click Exchange Management Shell.

  3. To enable the managed folder assistant, run the following command in the Exchange Management Shell, where <ServerName> is the name of the mailbox server and <DCName> is the name of a domain controller:

    Set-MailboxServer <ServerName> -LogPathForManagedFolders <LogPath> -ManagedFolderAssistantSchedule <AssistantSchedule> -LogFileAgeLimitForManagedFolders <LogFileAgeLimit> -LogDirectorySizeLimitForManagedFolders <LogDirSizeLimit> -LogFileSizeLimitForManagedFolders <LogFileSizeLimit> -FolderLogForManagedFoldersEnabled <LogFolderEnabled> -SubjectLogForManagedFoldersEnabled <SubjectLogEnabled> -RetentionLogForManagedFoldersEnabled <RetentionLogEnabled> -JournalingLogForManagedFoldersEnabled <JournalLogEnabled> -DomainController <DCName>
    

Note

Use the appropriate table from Server Configuration Appendix at the end of this topic to obtain the information that you must have to run the commands.

Message Tracking Server Configuration

This section can be skipped if the default Message Tracking parameters are appropriate for the environment.

  1. Connect to an Exchange 2007 server through Remote Desktop, and then log on by using an account that has local administrative access and that was delegated the Exchange Server Administrator role (or higher).

  2. Click Start, click All Programs, click Microsoft Exchange Server 2007, and then click Exchange Management Shell.

  3. To configure message tracking settings, run the following command in the Exchange Management Shell, where <ServerName> is the name of the Mailbox server and <DCName> is the name of a domain controller:

    Set-MailboxServer <ServerName> -MessageTrackingLogPath <LogPath> -MessageTrackingLogMaxAge <MaxAge> -MessageTrackingLogMaxDirectorySize <LogDirSize> -MessageTrackingLogMaxFileSize <LogFileSize> -MessageTrackingLogSubjectLoggingEnabled <SubjectLogEnabled> -DomainController <DCName>
    

Note

Use the appropriate table from the Server Configuration Appendix at the end of this topic to obtain the information that you must have to run the commands.

Additional Storage Groups

  1. Connect to an Exchange 2007 server through Remote Desktop, and then log on by using an account that has local administrative access and that is delegated the Exchange Server Administrator role (or higher).

  2. Click Start, click All Programs, click Microsoft Exchange Server 2007, and then click Exchange Management Shell.

  3. Use the appropriate table from the Database / Log LUN Appendix and Database Configuration Appendix at the end of this topic to obtain the information that you must have to run the commands.

  4. To create the Storage Group, run the following command in the Exchange Management Shell, where <CMSName> is the name of the clustered mailbox server and <DCName> is the name of a domain controller:

    New-StorageGroup -Server <CMSName> -Name <SG> -LogFolderPath <Transaction Log Location> -SystemFolderPath <Transaction Log Location> -DomainController <DCName>
    
  5. To create the database that resides within the storage group, run the following command:

    New-MailboxDatabase -StorageGroup "<CMSName>\<SG Name>" -Name "<DB Name>" -DomainController <DCName> -OfflineAddressBook <OfflineAddressBook> -PublicFolderDatabase <PFDatabase> | Set-MailboxDatabase -IssueWarningQuota <WarningQuota> -ProhibitSendQuota <SendQuota> -ProhibitSendReceiveQuota <SendReceiveQuota> -MailboxRetention <dd.hh:mm:ss> -DeletedItemRetention <dd.hh:mm:ss> -MaintenanceSchedule <MaintenanceSchedule> -QuotaNotificationSchedule <QuotaSchedule> -RetainDeletedItemsUntilBackup <RetainDeletedItemsUntilBackup> -EdbFilePath:<FullPathIncludingDatabaseFileName>
    
  6. To mount the database, run the following command:

    Mount-Database "<CMSName>\<SG>\<Database Name>" -DomainController <DCName>
    
  7. Repeat steps 3 through 6 for each database that must be created.

Server Configuration Appendix

Records Management Configuration

The following table is a sample configuration that can be applied to the Mailbox server, depending on requirements.

Important

The values in the following table are sample values, not recommended values. Update these values to reflect the actual values for your organization.

Records management configuration

Default value Sample value

Server Name

<CMSName>

<CMSName>

Log Path For Managed Folders

<Exchange Install Path>\Logging\Managed Folder Assistant

D:\Exchsrvr\Logging\Managed Folder Assistant

Log File Age Limit For Managed Folders

00:00:00

7.00:00:00

Log Directory Size Limit For Managed Folders

unlimited

5 GB

Log File Size Limit For Managed Folders

10 MB

10 MB

Retention Log For Managed Folders Enabled

False

True

Journaling Log For Managed Folders Enabled

False

False

Folder Log For Managed Folders Enabled

False

True

Subject Log For Managed Folders Enabled

False

True

Managed Folder Assistant Schedule

Never Run

“Sun.6:00 PM-Sun.7:45 PM”, “Mon.6:00 PM-Mon.7:45 PM”, “Tue.6:00 PM-Tue.7:45 PM”, “Wed.6:00 PM-Wed.7:45 PM”, “Thu.6:00 PM-Thu.7:45 PM”, “Fri.6:00 PM-Fri.7:45 PM”, “Sat.6:00 PM-Sat.7:45 PM”

Message Tracking Configuration

The following table is a sample configuration that can be applied to the Mailbox server, depending on requirements.

Important

The values in the following table are sample values, not recommended values. These values must be updated to reflect the actual values for your organization.

Message tracking configuration

Default value Sample value

Server Name

<CMSName>

< CMSName >

Message Tracking Log Path

<Exchange Install Path>\TransportRoles\Logs\MessageTracking

d:\exchsrvr\MessageTracking

Message Tracking Log Enabled

True

True

Message Tracking Log Max Age

30.00:00:00

10.00:00:00

Message Tracking Log Max Directory Size

250 MB

20 GB

Message Tracking Log Max File Size

10 MB

10 MB

Message Tracking Log Subject Logging Enabled

True

True

Database / Log LUN Appendix

When you use continuous replication, you do not have to perform daily full backups because the storage group copy provides the first line of defense against corruption and data loss. Therefore, there are two approaches to how backups can be performed in a continuous replication environment.

  • Use streaming backup to perform a full backup of 1/7th of the databases and incremental or differential backups for the rest.

  • Use Volume Shadow Copy Service (VSS) to perform backups.

Because of the backup methodology selected, the LUN layout has to be altered.

Database / Log LUN Layout - 1/7th Approach

When you use streaming backups, we recommend that you separate streaming I/O (source and target) so that multiple storage groups that are being backed up concurrently do not compete for the same disk resources. Whether the target is disk or tape, there will be a throughput limit on the physical disks and controllers that is unique to each hardware solution. You may have to isolate some storage groups from one another to maximize the number of concurrent backup operations, to increase throughput, and to minimize the size of the backup window.

You can run streaming backups concurrently, one from each LUN, if you isolate your storage group LUNs from one another. The backup jobs should complete on the first storage group on each LUN before the second storage group begins the back up process, isolating the backup streams. Two streaming backup jobs on the same physical disks may not be twice as fast, but it should be faster than a single streaming backup job with regard to the megabytes per second.

A backup set is the number of databases that are fully backed up in a night. A solution that performs a full backup on 1/7th of the databases nightly could reduce complexity by adding all the storage groups to be backed up on the same log and database LUN. This can reduce the number of LUNs on the server.

Some benefits of this strategy include the following:

  • Simplified storage administration and fewer LUNs to manage.

  • A potential reduction in the number of backup jobs.

Some concerns with this strategy include the following:

  • It limits the ability to take hardware-based VSS backup and restores.

  • The 2-terabyte limit on a master boot record (MBR) partition would limit how far this would scale in capacity.

  • A capacity or corruption problem on a single LUN could affect more than one storage group.

1/7th approach LUN design

SG Name Database Name Database Location Database File Name Transaction Log Location

SG1

<CMSName> MBX Store 1

E:\MDB01

Priv01.edb

L:\LOG01

SG2

<CMSName> MBX Store 2

E:\MDB02

Priv02.edb

L:\LOG02

SG3

<CMSName> MBX Store 3

E:\MDB03

Priv03.edb

L:\LOG03

SG4

<CMSName> MBX Store 4

E:\MDB04

Priv04.edb

L:\LOG04

SG5

<CMSName> MBX Store 5

E:\MDB05

Priv05.edb

L:\LOG05

SG6

<CMSName> MBX Store 6

E:\MDB06

Priv06.edb

L:\LOG06

SG7

<CMSName> MBX Store 7

E:\MDB07

Priv07.edb

L:\LOG07

SG8

<CMSName> MBX Store 8

F:\MDB08

Priv08.edb

M:\LOG08

SG9

<CMSName> MBX Store 9

F:\MDB09

Priv09.edb

M:\LOG09

SG10

<CMSName> MBX Store 10

F:\MDB10

Priv10.edb

M:\LOG10

SG11

<CMSName> MBX Store 11

F:\MDB11

Priv11.edb

M:\LOG11

SG12

<CMSName> MBX Store 12

F:\MDB12

Priv12.edb

M:\LOG12

SG13

<CMSName> MBX Store 13

F:\MDB13

Priv13.edb

M:\LOG13

SG14

<CMSName> MBX Store 14

F:\MDB14

Priv14.edb

M:\LOG14

SG15

<CMSName> MBX Store 15

G:\MDB15

Priv15.edb

N:\LOG15

SG16

<CMSName> MBX Store 16

G:\MDB16

Priv16.edb

N:\LOG16

SG17

<CMSName> MBX Store 17

G:\MDB17

Priv17.edb

N:\LOG17

SG18

<CMSName> MBX Store 18

G:\MDB18

Priv18.edb

N:\LOG18

SG19

<CMSName> MBX Store 19

G:\MDB19

Priv19.edb

N:\LOG19

SG20

<CMSName> MBX Store 20

G:\MDB20

Priv20.edb

N:\LOG20

SG21

<CMSName> MBX Store 21

G:\MDB21

Priv21.edb

N:\LOG21

SG22

<CMSName> MBX Store 22

H:\MDB22

Priv22.edb

O:\LOG22

SG23

<CMSName> MBX Store 23

H:\MDB23

Priv23.edb

O:\LOG23

SG24

<CMSName> MBX Store 24

H:\MDB24

Priv24.edb

O:\LOG24

SG25

<CMSName> MBX Store 25

H:\MDB25

Priv25.edb

O:\LOG25

SG26

<CMSName> MBX Store 26

H:\MDB26

Priv26.edb

O:\LOG26

SG27

<CMSName> MBX Store 27

H:\MDB27

Priv27.edb

O:\LOG27

SG28

<CMSName> MBX Store 28

H:\MDB28

Priv28.edb

O:\LOG28

SG29

<CMSName> MBX Store 29

I:\MDB29

Priv29.edb

P:\LOG29

SG30

<CMSName> MBX Store 30

I:\MDB30

Priv30.edb

P:\LOG30

SG31

<CMSName> MBX Store 31

I:\MDB31

Priv31.edb

P:\LOG31

SG32

<CMSName> MBX Store 32

I:\MDB32

Priv32.edb

P:\LOG32

SG33

<CMSName> MBX Store 33

I:\MDB33

Priv33.edb

P:\LOG33

SG34

<CMSName> MBX Store 34

I:\MDB34

Priv34.edb

P:\LOG34

SG35

<CMSName> MBX Store 35

I:\MDB35

Priv35.edb

P:\LOG35

SG36

<CMSName> MBX Store 36

J:\MDB36

Priv36.edb

Q:\LOG36

SG37

<CMSName> MBX Store 37

J:\MDB37

Priv37.edb

Q:\LOG37

SG38

<CMSName> MBX Store 38

J:\MDB38

Priv38.edb

Q:\LOG38

SG39

<CMSName> MBX Store 39

J:\MDB39

Priv39.edb

Q:\LOG39

SG40

<CMSName> MBX Store 40

J:\MDB40

Priv40.edb

Q:\LOG40

SG41

<CMSName> MBX Store 41

J:\MDB41

Priv41.edb

Q:\LOG41

SG42

<CMSName> MBX Store 42

J:\MDB42

Priv42.edb

Q:\LOG42

SG43

<CMSName> MBX Store 43

K:\MDB43

Priv43.edb

R:\LOG43

SG44

<CMSName> MBX Store 44

K:\MDB44

Priv44.edb

R:\LOG44

SG45

<CMSName> MBX Store 45

K:\MDB45

Priv45.edb

R:\LOG45

SG46

<CMSName> MBX Store 46

K:\MDB46

Priv46.edb

R:\LOG46

SG47

<CMSName> MBX Store 47

K:\MDB47

Priv47.edb

R:\LOG47

SG48

<CMSName> MBX Store 48

K:\MDB48

Priv48.edb

R:\LOG48

SG49

<CMSName> MBX Store 49

K:\MDB49

Priv49.edb

R:\LOG49

Database / LUN Layout – VSS Approach

The Volume Shadow Copy Service (VSS) in Windows Server 2008 is used by applications to back up and restore Exchange 2007. VSS provides an infrastructure that enables third-party storage management programs, business programs, and hardware providers to cooperate in creating and managing shadow copies. Solutions based on this infrastructure can use shadow, or mirrored, copies to back up and restore one or more Exchange 2007 databases.

VSS coordinates communication between Requestors (backup applications), Writers (applications in Windows, such as Exchange 2007), and Providers (system components, software components, or hardware components that create the shadow copies). To use VSS to back up Exchange 2007, a backup program must include an Exchange 2007-aware VSS Requestor. The Windows Server Backup program that is part of Windows Server 2008 does not include an Exchange -aware VSS Requestor. Therefore, you must use a third-party backup program to back up Exchange 2007 on a Windows Server 2008-based computer.

Note

The Windows Server Backup program also does not support the Exchange 2007 Extensible Storage Engine streaming APIs. Therefore, you cannot use Windows Server Backup to back up Exchange 2007.

For more information about VSS and Exchange 2007, see the Exchange Online Help topic Exchange 2007 Data Backup and Volume Shadow Copy Services.

When you use continuous replication, Exchange 2007 can run a software VSS snapshot not just on the active copy but also on the passive copy. Taking a VSS snapshot on the passive copy offloads the disk I/O from the active LUN during both the checksum integrity (ESEUTIL) and during the subsequent copy to tape or disk. This feature also frees more time on the active LUNs to run online maintenance, MRM, and other tasks.

Creating two LUNs (log and database) for a storage group is the standard best practice for Exchange 2003. With Exchange 2007, in the maximum case of 50 storage groups, the number of LUNs you provision will depend on your backup strategy. If your recovery time objective (RTO) is very small or if you use VSS clones for fast recovery, it may be best to put each storage group on its own transaction log LUN and database LUN. Because doing this will exceed the number of available drive letters, you must use volume mount points.

Some benefits of this strategy include the following:

  • Enables hardware-based VSS at a storage group level, providing single storage group backup and restore.

  • Flexibility to isolate the performance between storage groups when not sharing spindles between LUNs.

  • Increased reliability. A capacity or corruption problem on a single LUN will only affect one storage group.

Some concerns with this strategy include the following:

  • Using continuous replication together with 50 storage groups could require 200 LUNs. This configuration would exceed some storage array maximums. CCR solutions could have 100 LUNs on each node, whereas LCR could have all 200 LUNs presented to a single server.

  • A separate LUN for each storage group causes more LUNs per server. This increases the administrative costs and complexity.

Note

In the following table, MP represents Mount Point.

VSS approach LUN design

SG Name Database Name Database Location Database File Name Transaction Log Location

Anchor LUN

--

E:\

--

L:\

SG1

<CMSName> MBX Store 1

MP:\MDB01

Priv01.edb

MP:\LOG01

SG2

<CMSName> MBX Store 2

MP:\MDB02

Priv02.edb

MP:\LOG02

SG3

<CMSName> MBX Store 3

MP:\MDB03

Priv03.edb

MP:\LOG03

SG4

<CMSName> MBX Store 4

MP:\MDB04

Priv04.edb

MP:\LOG04

SG5

<CMSName> MBX Store 5

MP:\MDB05

Priv05.edb

MP:\LOG05

SG6

<CMSName> MBX Store 6

MP:\MDB06

Priv06.edb

MP:\LOG06

SG7

<CMSName> MBX Store 7

MP:\MDB07

Priv07.edb

MP:\LOG07

SG8

<CMSName> MBX Store 8

MP:\MDB08

Priv08.edb

MP:\LOG08

SG9

<CMSName> MBX Store 9

MP:\MDB09

Priv09.edb

MP:\LOG09

SG10

<CMSName> MBX Store 10

MP:\MDB10

Priv10.edb

MP:\LOG10

SG11

<CMSName> MBX Store 11

MP:\MDB11

Priv11.edb

MP:\LOG11

SG12

<CMSName> MBX Store 12

MP:\MDB12

Priv12.edb

MP:\LOG12

SG13

<CMSName> MBX Store 13

MP:\MDB13

Priv13.edb

MP:\LOG13

SG14

<CMSName> MBX Store 14

MP:\MDB14

Priv14.edb

MP:\LOG14

SG15

<CMSName> MBX Store 15

MP:\MDB15

Priv15.edb

MP:\LOG15

SG16

<CMSName> MBX Store 16

MP:\MDB16

Priv16.edb

MP:\LOG16

SG17

<CMSName> MBX Store 17

MP:\MDB17

Priv17.edb

MP:\LOG17

SG18

<CMSName> MBX Store 18

MP:\MDB18

Priv18.edb

MP:\LOG18

SG19

<CMSName> MBX Store 19

MP:\MDB19

Priv19.edb

MP:\LOG19

SG20

<CMSName> MBX Store 20

MP:\MDB20

Priv20.edb

MP:\LOG20

SG21

<CMSName> MBX Store 21

MP:\MDB21

Priv21.edb

MP:\LOG21

SG22

<CMSName> MBX Store 22

MP:\MDB22

Priv22.edb

MP:\LOG22

SG23

<CMSName> MBX Store 23

MP:\MDB23

Priv23.edb

MP:\LOG23

SG24

<CMSName> MBX Store 24

MP:\MDB24

Priv24.edb

MP:\LOG24

SG25

<CMSName> MBX Store 25

MP:\MDB25

Priv25.edb

MP:\LOG25

SG26

<CMSName> MBX Store 26

MP:\MDB26

Priv26.edb

MP:\LOG26

SG27

<CMSName> MBX Store 27

MP:\MDB27

Priv27.edb

MP:\LOG27

SG28

<CMSName> MBX Store 28

MP:\MDB28

Priv28.edb

MP:\LOG28

SG29

<CMSName> MBX Store 29

MP:\MDB29

Priv29.edb

MP:\LOG29

SG30

<CMSName> MBX Store 30

MP:\MDB30

Priv30.edb

MP:\LOG30

SG31

<CMSName> MBX Store 31

MP:\MDB31

Priv31.edb

MP:\LOG31

SG32

<CMSName> MBX Store 32

MP:\MDB32

Priv32.edb

MP:\LOG32

SG33

<CMSName> MBX Store 33

MP:\MDB33

Priv33.edb

MP:\LOG33

SG34

<CMSName> MBX Store 34

MP:\MDB34

Priv34.edb

MP:\LOG34

SG35

<CMSName> MBX Store 35

MP:\MDB35

Priv35.edb

MP:\LOG35

SG36

<CMSName> MBX Store 36

MP:\MDB36

Priv36.edb

MP:\LOG36

SG37

<CMSName> MBX Store 37

MP:\MDB37

Priv37.edb

MP:\LOG37

SG38

<CMSName> MBX Store 38

MP:\MDB38

Priv38.edb

MP:\LOG38

SG39

<CMSName> MBX Store 39

MP:\MDB39

Priv39.edb

MP:\LOG39

SG40

<CMSName> MBX Store 40

MP:\MDB40

Priv40.edb

MP:\LOG40

SG41

<CMSName> MBX Store 41

MP:\MDB41

Priv41.edb

MP:\LOG41

SG42

<CMSName> MBX Store 42

MP:\MDB42

Priv42.edb

MP:\LOG42

SG43

<CMSName> MBX Store 43

MP:\MDB43

Priv43.edb

MP:\LOG43

SG44

<CMSName> MBX Store 44

MP:\MDB44

Priv44.edb

MP:\LOG44

SG45

<CMSName> MBX Store 45

MP:\MDB45

Priv45.edb

MP:\LOG45

SG46

<CMSName> MBX Store 46

MP:\MDB46

Priv46.edb

MP:\LOG46

SG47

<CMSName> MBX Store 47

MP:\MDB47

Priv47.edb

MP:\LOG47

SG48

<CMSName> MBX Store 48

MP:\MDB48

Priv48.edb

MP:\LOG48

SG49

<CMSName> MBX Store 49

MP:\MDB49

Priv49.edb

MP:\LOG49

SG50

<CMSName> MBX Store 50

MP:\MDB50

Priv50.edb

MP:\LOG50

Database Configuration Appendix

The following table describes a configuration that can be applied to each database that is created or customized for each database on a server, depending on requirements.

Important

The values in the following table are sample values, not recommended values. These values must be updated to reflect the actual values for your organization.

Database configuration

Default value Sample value

Database Name

<CMSName> MBX Store xx

<CMSName> MBX Store xx

Offline Address Book

Default Offline Address List

Default Offline Address List

Public Folder Database

<PublicFolderServer> PUB Store xx

<PublicFolderServer> PUB Store xx

Warning Quota

1945 MB

1700000 KB

Send Quota

2 GB

1900000 KB

Send Receive Quota

2355 MB

2090000 KB

Maintenance Schedule

{Sun.1:00 AM-Sun.5:00 AM, Mon.1:00 AM-Mon.5:00 AM, Tue.1:00 AM-Tue.5:00 AM, Wed.1:00 AM-Wed.5: 00 AM, Thu.1:00 AM-Thu.5:00 AM, Fri.1:00 AM-Fri.5:00 AM, Sat.1:00 AM-Sat.5:00 AM}

“Sun.12:00 AM-Sun.4:00 AM”, “Mon.12:00 AM-Mon.4:00 AM”, “Tue.12:00 AM-Tue.4:00 AM”, “Wed.12:00 AM-Wed.4:00 AM”, “Thu.12:00 AM-Thu.4:00 AM”, “Fri.12:00 AM-Fri.4:00 AM”, “Sat.12:00 AM-Sat.4:00 AM”

Quota Notification Schedule

{Sun.1:00 AM-Sun.1:15 AM, Mon.1:00 AM-Mon.1:15 AM, Tue.1:00 AM-Tue.1:15 AM, Wed.1:00 AM-Wed.1:15 AM, Thu.1:00 AM-Thu.1:15 AM, Fri.1:00 AM-Fri.1:15 AM, Sat.1:00 AM-Sat.1:15 AM}

“Sun.12:00 AM-Sun.12:15 AM”, “Mon.12:00 AM-Mon.12:15 AM”, “Tue.12:00 AM-Tue.12:15 AM”, “Wed.12:00 AM-Wed.12: 15 AM”, “Thu.12:00 AM-Thu.12:15 AM”, “Fri.12:00 AM-Fri.12:15 AM”, “Sat.12:00 AM-Sat.12:15 AM”

Mailbox Retention

30.00:00:00

30.00:00:00

Deleted Item Retention

14.00:00:00

14.00:00:00

Retain Deleted Items Until Backup

False

True