SlideShare uma empresa Scribd logo
1 de 40
Baixar para ler offline
Module 1 Deploying Microsoft® Exchange Server 2010
Module Overview ,[object Object],[object Object],[object Object]
Lesson 1: Overview of Exchange Server 2010 Requirements ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Discussion: Reviewing Active Directory Components Active Directory components include: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
Reviewing Active Directory Partitions Partition Type Description Domain ,[object Object],[object Object],Configuration ,[object Object],[object Object],Schema  ,[object Object],[object Object],Application  ,[object Object],[object Object]
How Exchange Server 2010 Uses Active Directory Schema Exchange object classes and attributes Global Catalog Exchange object attributes  for mail-enabled and  mailbox-enabled objects  Exchange recipients Domain Configuration Exchange configuration Forests Exchange organization and  Active Directory forest:  one-to-one relationship
Reviewing DNS Requirements for Exchange Server 2010 Exchange Server 2010 requires: MX records to locate mail servers in other organizations  Host records to locate other servers SRV records to locate domain controllers   DNS Record Type Example SRV  _ldap._tcp.Contoso.com. IN SRV 0 100 389 SEA-DC1.Contoso.com Host  SEA-EX1.Contoso.com. IN A 10.10.10.10 MX MX 10 SEA-EX1.Adatum.com
Preparing Active Directory for Exchange Server 2010 Setup switch Description /PrepareAD   /OrganizationName: ” organizationname” ,[object Object],[object Object],[object Object],/PrepareLegacy ExchangePermissions ,[object Object],/PrepareSchema ,[object Object],/PrepareDomain /PrepareDomain  domainname /PrepareAllDomains ,[object Object]
Demonstration: Integration of Active Directory and Exchange Server 2010 ,[object Object],[object Object],[object Object],[object Object]
Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
Lesson 2: Installing Exchange Server 2010 Server Roles ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Overview of Server Roles in Exchange Server 2010 In Exchange Server 2010, servers are installed with specific functional roles: ,[object Object],[object Object],[object Object],[object Object],[object Object]
Deployment Options for Exchange Server 2010 Small Organization Medium-Size Organization Large Organization
Hardware Recommendations for Combining Server Roles  You can combine all server roles, except the Edge Transport server role, on one server You can combine server roles with Mailbox servers that are DAG members When combining server roles, reduce the maximum number of mailboxes by 20% Component   Recommendation   Processor cores   ,[object Object],[object Object],[object Object],[object Object],Memory ,[object Object],[object Object]
Options for Integrating Exchange Server 2010 and Exchange Online Services  Exchange Online Services:  ,[object Object],[object Object],[object Object],[object Object]
Infrastructure Requirements for Exchange  Server 2010 Infrastructure Component Requirements Active Directory ,[object Object],[object Object],[object Object],DNS ,[object Object]
Server Requirements for Exchange Server 2010 Software requirements: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Resource Requirements Processor ,[object Object],[object Object],Memory ,[object Object],[object Object],Disk   ,[object Object],[object Object],File System ,[object Object]
Considerations for Deploying Exchange Server 2010 as a Virtual Machine ,[object Object],[object Object],[object Object],[object Object],[object Object]
Process for Installing Exchange Server 2010 To install Exchange Server 2010: Install the Exchange language packs  Choose the option to install Exchange Server 2010  Run setup.exe from the installation source Choose the installation type  Choose the option to enable Outlook 2003 or earlier clients Install prerequisite software Provide the Exchange organization name 1 2 3 4 5 6 7 Configure the Client Access server external name  8
Unattended Installation Options Parameter Options Description /mode   ,[object Object],[object Object],[object Object],/roles   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],/ServerAdmin   ,[object Object],[object Object],/NewProvisionedServer ,[object Object],[object Object],[object Object]
Lab A: Installing Exchange Server 2010 ,[object Object],[object Object],[object Object],Logon information Estimated time: 60 minutes Logon information Virtual machines 10135A-LON-DC1, 10135A-LON-SVR1 User name Administrator   Password Pa$$w0rd
Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
Lab Scenario ,[object Object],[object Object]
Lab Review ,[object Object],[object Object]
Lesson 3: Completing an Exchange Server 2010 Installation ,[object Object],[object Object],[object Object],[object Object]
Demonstration: Verifying an Exchange Server 2010 Installation ,[object Object],[object Object],[object Object],[object Object],[object Object]
Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
Demonstration: Verifying the Exchange Server 2010 Deployment ,[object Object]
Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
Troubleshooting an Exchange Server 2010 Installation To troubleshoot Exchange Server 2010 setup: Verify the server hardware and software requirements Verify DNS name resolution  Check the setup and event logs for errors Verify Active Directory functional levels and permissions    
Finalizing the Exchange Server Installation  Configure Exchange Server security Install and configure additional software Configure settings that are specific to server roles   
Lab B: Verifying an Exchange Server 2010 Installation ,[object Object],Estimated time: 20 minutes Logon information Logon information Virtual machines 10135A-LON-DC1, 10135A-LON-SVR1 User name Administrator   Password Pa$$w0rd
Lab Scenario ,[object Object]
Lab Review ,[object Object],[object Object]
Module Review and Takeaways ,[object Object],[object Object],[object Object],[object Object]
Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.

Mais conteúdo relacionado

Mais procurados

Microsoft exchange-server-2013-installation
Microsoft exchange-server-2013-installationMicrosoft exchange-server-2013-installation
Microsoft exchange-server-2013-installationtakdirlovely09
 
Overview of Microsoft Exchange Server
Overview of Microsoft Exchange ServerOverview of Microsoft Exchange Server
Overview of Microsoft Exchange Serverbedekarpm
 
How To Configure Email Enabled Lists In Moss2007 Rtm Using Exchange 2003
How To Configure Email Enabled Lists In Moss2007 Rtm Using Exchange 2003How To Configure Email Enabled Lists In Moss2007 Rtm Using Exchange 2003
How To Configure Email Enabled Lists In Moss2007 Rtm Using Exchange 2003LiquidHub
 
MailRetriever for DPM: Quick Start Guide
MailRetriever for DPM: Quick Start GuideMailRetriever for DPM: Quick Start Guide
MailRetriever for DPM: Quick Start GuideMailRetriever
 
Simple Farm Server Deployment
Simple Farm Server DeploymentSimple Farm Server Deployment
Simple Farm Server DeploymentLiquidHub
 
Windows Server 2008 (Active Directory Yenilikleri)
Windows Server 2008 (Active Directory Yenilikleri)Windows Server 2008 (Active Directory Yenilikleri)
Windows Server 2008 (Active Directory Yenilikleri)ÇözümPARK
 
Deployingand configuringofficecommunicationsserver2007
Deployingand configuringofficecommunicationsserver2007Deployingand configuringofficecommunicationsserver2007
Deployingand configuringofficecommunicationsserver2007Ziemek Borowski
 
Pre Install Databases
Pre Install DatabasesPre Install Databases
Pre Install DatabasesLiquidHub
 
Windows server 2008 step by-step guide for dns in small networks
Windows server 2008 step by-step guide for dns in small networksWindows server 2008 step by-step guide for dns in small networks
Windows server 2008 step by-step guide for dns in small networksOchiroo Dorj
 
MailRetriever for Exchange: Quick Start Guide
MailRetriever for Exchange: Quick Start GuideMailRetriever for Exchange: Quick Start Guide
MailRetriever for Exchange: Quick Start GuideMailRetriever
 
Moss 2007 Backup Strategies
Moss 2007 Backup StrategiesMoss 2007 Backup Strategies
Moss 2007 Backup StrategiesLiquidHub
 
Virtualizing_Exchange2003
Virtualizing_Exchange2003Virtualizing_Exchange2003
Virtualizing_Exchange2003Balaji Ravi
 
70-417 Microsoft Exam
70-417 Microsoft Exam70-417 Microsoft Exam
70-417 Microsoft Examteena timmy
 

Mais procurados (20)

Microsoft exchange-server-2013-installation
Microsoft exchange-server-2013-installationMicrosoft exchange-server-2013-installation
Microsoft exchange-server-2013-installation
 
Exchange server 2013
Exchange server 2013Exchange server 2013
Exchange server 2013
 
10135 b 12
10135 b 1210135 b 12
10135 b 12
 
Overview of Microsoft Exchange Server
Overview of Microsoft Exchange ServerOverview of Microsoft Exchange Server
Overview of Microsoft Exchange Server
 
EXCHANGE SERVER 2010
EXCHANGE SERVER 2010EXCHANGE SERVER 2010
EXCHANGE SERVER 2010
 
How To Configure Email Enabled Lists In Moss2007 Rtm Using Exchange 2003
How To Configure Email Enabled Lists In Moss2007 Rtm Using Exchange 2003How To Configure Email Enabled Lists In Moss2007 Rtm Using Exchange 2003
How To Configure Email Enabled Lists In Moss2007 Rtm Using Exchange 2003
 
Upgrading to Exchange 2016
Upgrading to Exchange 2016Upgrading to Exchange 2016
Upgrading to Exchange 2016
 
MailRetriever for DPM: Quick Start Guide
MailRetriever for DPM: Quick Start GuideMailRetriever for DPM: Quick Start Guide
MailRetriever for DPM: Quick Start Guide
 
Simple Farm Server Deployment
Simple Farm Server DeploymentSimple Farm Server Deployment
Simple Farm Server Deployment
 
Windows Server 2008 (Active Directory Yenilikleri)
Windows Server 2008 (Active Directory Yenilikleri)Windows Server 2008 (Active Directory Yenilikleri)
Windows Server 2008 (Active Directory Yenilikleri)
 
MCITP
MCITPMCITP
MCITP
 
Deployingand configuringofficecommunicationsserver2007
Deployingand configuringofficecommunicationsserver2007Deployingand configuringofficecommunicationsserver2007
Deployingand configuringofficecommunicationsserver2007
 
Pre Install Databases
Pre Install DatabasesPre Install Databases
Pre Install Databases
 
Windows server 2008 step by-step guide for dns in small networks
Windows server 2008 step by-step guide for dns in small networksWindows server 2008 step by-step guide for dns in small networks
Windows server 2008 step by-step guide for dns in small networks
 
MailRetriever for Exchange: Quick Start Guide
MailRetriever for Exchange: Quick Start GuideMailRetriever for Exchange: Quick Start Guide
MailRetriever for Exchange: Quick Start Guide
 
Ad installation
Ad installationAd installation
Ad installation
 
Moss 2007 Backup Strategies
Moss 2007 Backup StrategiesMoss 2007 Backup Strategies
Moss 2007 Backup Strategies
 
Virtualizing_Exchange2003
Virtualizing_Exchange2003Virtualizing_Exchange2003
Virtualizing_Exchange2003
 
70-417 Microsoft Exam
70-417 Microsoft Exam70-417 Microsoft Exam
70-417 Microsoft Exam
 
Mcitp course details
Mcitp course detailsMcitp course details
Mcitp course details
 

Destaque

Quest_Software_Best_Practices_for_Exchange_2007
Quest_Software_Best_Practices_for_Exchange_2007Quest_Software_Best_Practices_for_Exchange_2007
Quest_Software_Best_Practices_for_Exchange_2007Balaji Ravi
 
Clustering of Exchnage server
Clustering of Exchnage serverClustering of Exchnage server
Clustering of Exchnage serverLohit Ahuja
 
24 Hours Of Exchange Server 2007 ( Part 6 Of 24)
24  Hours Of  Exchange  Server 2007 ( Part 6 Of 24)24  Hours Of  Exchange  Server 2007 ( Part 6 Of 24)
24 Hours Of Exchange Server 2007 ( Part 6 Of 24)guestef2a2b
 
24 Hours Of Exchange Server 2007 ( Part 4 Of 24)
24  Hours Of  Exchange  Server 2007 ( Part 4 Of 24)24  Hours Of  Exchange  Server 2007 ( Part 4 Of 24)
24 Hours Of Exchange Server 2007 ( Part 4 Of 24)guestef2a2b
 
24 Hours Of Exchange Server 2007 (Part 1 Of 24)
24 Hours Of Exchange Server 2007 (Part 1 Of 24)24 Hours Of Exchange Server 2007 (Part 1 Of 24)
24 Hours Of Exchange Server 2007 (Part 1 Of 24)Harold Wong
 
Introduction to Exchange 2010
Introduction to Exchange 2010Introduction to Exchange 2010
Introduction to Exchange 2010Nathan Winters
 

Destaque (7)

Quest_Software_Best_Practices_for_Exchange_2007
Quest_Software_Best_Practices_for_Exchange_2007Quest_Software_Best_Practices_for_Exchange_2007
Quest_Software_Best_Practices_for_Exchange_2007
 
Clustering of Exchnage server
Clustering of Exchnage serverClustering of Exchnage server
Clustering of Exchnage server
 
24 Hours Of Exchange Server 2007 ( Part 6 Of 24)
24  Hours Of  Exchange  Server 2007 ( Part 6 Of 24)24  Hours Of  Exchange  Server 2007 ( Part 6 Of 24)
24 Hours Of Exchange Server 2007 ( Part 6 Of 24)
 
24 Hours Of Exchange Server 2007 ( Part 4 Of 24)
24  Hours Of  Exchange  Server 2007 ( Part 4 Of 24)24  Hours Of  Exchange  Server 2007 ( Part 4 Of 24)
24 Hours Of Exchange Server 2007 ( Part 4 Of 24)
 
24 Hours Of Exchange Server 2007 (Part 1 Of 24)
24 Hours Of Exchange Server 2007 (Part 1 Of 24)24 Hours Of Exchange Server 2007 (Part 1 Of 24)
24 Hours Of Exchange Server 2007 (Part 1 Of 24)
 
Introduction to Exchange 2010
Introduction to Exchange 2010Introduction to Exchange 2010
Introduction to Exchange 2010
 
Exchange Server 2013 Architecture Deep Dive, Part 1
Exchange Server 2013 Architecture Deep Dive, Part 1Exchange Server 2013 Architecture Deep Dive, Part 1
Exchange Server 2013 Architecture Deep Dive, Part 1
 

Semelhante a 10135 a 01

10135 a 12
10135 a 1210135 a 12
10135 a 12Bố Su
 
Ch02 installing exchange
Ch02 installing exchangeCh02 installing exchange
Ch02 installing exchangeShane Flooks
 
Exchange 2003 / 2010 Notes from the Field
Exchange 2003 / 2010 Notes from the FieldExchange 2003 / 2010 Notes from the Field
Exchange 2003 / 2010 Notes from the FieldDave Kawula
 
24 Hours Of Exchange Server 2007 (Part 3 Of 24)
24 Hours Of Exchange Server 2007 (Part 3 Of 24)24 Hours Of Exchange Server 2007 (Part 3 Of 24)
24 Hours Of Exchange Server 2007 (Part 3 Of 24)Harold Wong
 
24 Hours Of Exchange Server 2007 ( Part 3 Of 24)
24  Hours Of  Exchange  Server 2007 ( Part 3 Of 24)24  Hours Of  Exchange  Server 2007 ( Part 3 Of 24)
24 Hours Of Exchange Server 2007 ( Part 3 Of 24)guestef2a2b
 
Office Track: Exchange 2013 in the real world - Michael Van Horenbeeck
Office Track: Exchange 2013 in the real world - Michael Van HorenbeeckOffice Track: Exchange 2013 in the real world - Michael Van Horenbeeck
Office Track: Exchange 2013 in the real world - Michael Van HorenbeeckITProceed
 
PPT_Deploying_Exchange_Server.pdf.pdf
PPT_Deploying_Exchange_Server.pdf.pdfPPT_Deploying_Exchange_Server.pdf.pdf
PPT_Deploying_Exchange_Server.pdf.pdfTrngTn67
 
10135 a 02
10135 a 0210135 a 02
10135 a 02Bố Su
 
24 Hours Of Exchange Server 2007 (Part 4 Of 24)
24 Hours Of Exchange Server 2007 (Part 4 Of 24)24 Hours Of Exchange Server 2007 (Part 4 Of 24)
24 Hours Of Exchange Server 2007 (Part 4 Of 24)Harold Wong
 
10135 a 08
10135 a 0810135 a 08
10135 a 08Bố Su
 
Building the Perfect SharePoint 2010 Farm
Building the Perfect SharePoint 2010 FarmBuilding the Perfect SharePoint 2010 Farm
Building the Perfect SharePoint 2010 FarmMichael Noel
 
24 Hours Of Exchange Server 2007 ( Part 7 Of 24)
24  Hours Of  Exchange  Server 2007 ( Part 7 Of 24)24  Hours Of  Exchange  Server 2007 ( Part 7 Of 24)
24 Hours Of Exchange Server 2007 ( Part 7 Of 24)guestef2a2b
 
24 Hours Of Exchange Server 2007 (Part 7 Of 24)
24 Hours Of Exchange Server 2007 (Part 7 Of 24)24 Hours Of Exchange Server 2007 (Part 7 Of 24)
24 Hours Of Exchange Server 2007 (Part 7 Of 24)Harold Wong
 
Ch01 Introduction to Exchange 2013
Ch01 Introduction to Exchange 2013Ch01 Introduction to Exchange 2013
Ch01 Introduction to Exchange 2013Shane Flooks
 
24 Hours Of Exchange Server 2007 (Part 6 Of 24)
24 Hours Of Exchange Server 2007 (Part 6 Of 24)24 Hours Of Exchange Server 2007 (Part 6 Of 24)
24 Hours Of Exchange Server 2007 (Part 6 Of 24)Harold Wong
 
SharePoint 2010 High Availability - SPC2C
SharePoint 2010 High Availability - SPC2CSharePoint 2010 High Availability - SPC2C
SharePoint 2010 High Availability - SPC2CMichael Noel
 
gcis-zenworks7.2
gcis-zenworks7.2gcis-zenworks7.2
gcis-zenworks7.2KARLY21
 
Material modulo01 asf6501(6419-a_01)
Material   modulo01 asf6501(6419-a_01)Material   modulo01 asf6501(6419-a_01)
Material modulo01 asf6501(6419-a_01)JSantanderQ
 

Semelhante a 10135 a 01 (20)

10135 b 01
10135 b 0110135 b 01
10135 b 01
 
10135 a 12
10135 a 1210135 a 12
10135 a 12
 
Ch02 installing exchange
Ch02 installing exchangeCh02 installing exchange
Ch02 installing exchange
 
Exchange 2003 / 2010 Notes from the Field
Exchange 2003 / 2010 Notes from the FieldExchange 2003 / 2010 Notes from the Field
Exchange 2003 / 2010 Notes from the Field
 
24 Hours Of Exchange Server 2007 (Part 3 Of 24)
24 Hours Of Exchange Server 2007 (Part 3 Of 24)24 Hours Of Exchange Server 2007 (Part 3 Of 24)
24 Hours Of Exchange Server 2007 (Part 3 Of 24)
 
24 Hours Of Exchange Server 2007 ( Part 3 Of 24)
24  Hours Of  Exchange  Server 2007 ( Part 3 Of 24)24  Hours Of  Exchange  Server 2007 ( Part 3 Of 24)
24 Hours Of Exchange Server 2007 ( Part 3 Of 24)
 
Office Track: Exchange 2013 in the real world - Michael Van Horenbeeck
Office Track: Exchange 2013 in the real world - Michael Van HorenbeeckOffice Track: Exchange 2013 in the real world - Michael Van Horenbeeck
Office Track: Exchange 2013 in the real world - Michael Van Horenbeeck
 
PPT_Deploying_Exchange_Server.pdf.pdf
PPT_Deploying_Exchange_Server.pdf.pdfPPT_Deploying_Exchange_Server.pdf.pdf
PPT_Deploying_Exchange_Server.pdf.pdf
 
10135 a 02
10135 a 0210135 a 02
10135 a 02
 
Exchange 2010 SP2 & Tips
Exchange 2010 SP2 & TipsExchange 2010 SP2 & Tips
Exchange 2010 SP2 & Tips
 
24 Hours Of Exchange Server 2007 (Part 4 Of 24)
24 Hours Of Exchange Server 2007 (Part 4 Of 24)24 Hours Of Exchange Server 2007 (Part 4 Of 24)
24 Hours Of Exchange Server 2007 (Part 4 Of 24)
 
10135 a 08
10135 a 0810135 a 08
10135 a 08
 
Building the Perfect SharePoint 2010 Farm
Building the Perfect SharePoint 2010 FarmBuilding the Perfect SharePoint 2010 Farm
Building the Perfect SharePoint 2010 Farm
 
24 Hours Of Exchange Server 2007 ( Part 7 Of 24)
24  Hours Of  Exchange  Server 2007 ( Part 7 Of 24)24  Hours Of  Exchange  Server 2007 ( Part 7 Of 24)
24 Hours Of Exchange Server 2007 ( Part 7 Of 24)
 
24 Hours Of Exchange Server 2007 (Part 7 Of 24)
24 Hours Of Exchange Server 2007 (Part 7 Of 24)24 Hours Of Exchange Server 2007 (Part 7 Of 24)
24 Hours Of Exchange Server 2007 (Part 7 Of 24)
 
Ch01 Introduction to Exchange 2013
Ch01 Introduction to Exchange 2013Ch01 Introduction to Exchange 2013
Ch01 Introduction to Exchange 2013
 
24 Hours Of Exchange Server 2007 (Part 6 Of 24)
24 Hours Of Exchange Server 2007 (Part 6 Of 24)24 Hours Of Exchange Server 2007 (Part 6 Of 24)
24 Hours Of Exchange Server 2007 (Part 6 Of 24)
 
SharePoint 2010 High Availability - SPC2C
SharePoint 2010 High Availability - SPC2CSharePoint 2010 High Availability - SPC2C
SharePoint 2010 High Availability - SPC2C
 
gcis-zenworks7.2
gcis-zenworks7.2gcis-zenworks7.2
gcis-zenworks7.2
 
Material modulo01 asf6501(6419-a_01)
Material   modulo01 asf6501(6419-a_01)Material   modulo01 asf6501(6419-a_01)
Material modulo01 asf6501(6419-a_01)
 

Mais de Bố Su

10135 a xb
10135 a xb10135 a xb
10135 a xbBố Su
 
10135 a xa
10135 a xa10135 a xa
10135 a xaBố Su
 
10135 a 11
10135 a 1110135 a 11
10135 a 11Bố Su
 
10135 a 10
10135 a 1010135 a 10
10135 a 10Bố Su
 
10135 a 09
10135 a 0910135 a 09
10135 a 09Bố Su
 
10135 a 07
10135 a 0710135 a 07
10135 a 07Bố Su
 
10135 a 06
10135 a 0610135 a 06
10135 a 06Bố Su
 
10135 a 05
10135 a 0510135 a 05
10135 a 05Bố Su
 
10135 a 04
10135 a 0410135 a 04
10135 a 04Bố Su
 
10135 a 03
10135 a 0310135 a 03
10135 a 03Bố Su
 
10135 a 00
10135 a 0010135 a 00
10135 a 00Bố Su
 
50357 a enu-module05
50357 a enu-module0550357 a enu-module05
50357 a enu-module05Bố Su
 
50357 a enu-module03
50357 a enu-module0350357 a enu-module03
50357 a enu-module03Bố Su
 
50357 a enu-module02
50357 a enu-module0250357 a enu-module02
50357 a enu-module02Bố Su
 
50357 a enu-module01
50357 a enu-module0150357 a enu-module01
50357 a enu-module01Bố Su
 
50357 a enu-module00
50357 a enu-module0050357 a enu-module00
50357 a enu-module00Bố Su
 
50357 a enu-module04
50357 a enu-module0450357 a enu-module04
50357 a enu-module04Bố Su
 

Mais de Bố Su (17)

10135 a xb
10135 a xb10135 a xb
10135 a xb
 
10135 a xa
10135 a xa10135 a xa
10135 a xa
 
10135 a 11
10135 a 1110135 a 11
10135 a 11
 
10135 a 10
10135 a 1010135 a 10
10135 a 10
 
10135 a 09
10135 a 0910135 a 09
10135 a 09
 
10135 a 07
10135 a 0710135 a 07
10135 a 07
 
10135 a 06
10135 a 0610135 a 06
10135 a 06
 
10135 a 05
10135 a 0510135 a 05
10135 a 05
 
10135 a 04
10135 a 0410135 a 04
10135 a 04
 
10135 a 03
10135 a 0310135 a 03
10135 a 03
 
10135 a 00
10135 a 0010135 a 00
10135 a 00
 
50357 a enu-module05
50357 a enu-module0550357 a enu-module05
50357 a enu-module05
 
50357 a enu-module03
50357 a enu-module0350357 a enu-module03
50357 a enu-module03
 
50357 a enu-module02
50357 a enu-module0250357 a enu-module02
50357 a enu-module02
 
50357 a enu-module01
50357 a enu-module0150357 a enu-module01
50357 a enu-module01
 
50357 a enu-module00
50357 a enu-module0050357 a enu-module00
50357 a enu-module00
 
50357 a enu-module04
50357 a enu-module0450357 a enu-module04
50357 a enu-module04
 

Último

Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsSafe Software
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfJamie (Taka) Wang
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 

Último (20)

Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 

10135 a 01

  • 1. Module 1 Deploying Microsoft® Exchange Server 2010
  • 2.
  • 3.
  • 4.
  • 5. Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
  • 6. Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
  • 7.
  • 8. How Exchange Server 2010 Uses Active Directory Schema Exchange object classes and attributes Global Catalog Exchange object attributes for mail-enabled and mailbox-enabled objects Exchange recipients Domain Configuration Exchange configuration Forests Exchange organization and Active Directory forest: one-to-one relationship
  • 9. Reviewing DNS Requirements for Exchange Server 2010 Exchange Server 2010 requires: MX records to locate mail servers in other organizations  Host records to locate other servers SRV records to locate domain controllers   DNS Record Type Example SRV _ldap._tcp.Contoso.com. IN SRV 0 100 389 SEA-DC1.Contoso.com Host SEA-EX1.Contoso.com. IN A 10.10.10.10 MX MX 10 SEA-EX1.Adatum.com
  • 10.
  • 11.
  • 12. Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
  • 13. Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
  • 14.
  • 15.
  • 16. Deployment Options for Exchange Server 2010 Small Organization Medium-Size Organization Large Organization
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22. Process for Installing Exchange Server 2010 To install Exchange Server 2010: Install the Exchange language packs Choose the option to install Exchange Server 2010 Run setup.exe from the installation source Choose the installation type Choose the option to enable Outlook 2003 or earlier clients Install prerequisite software Provide the Exchange organization name 1 2 3 4 5 6 7 Configure the Client Access server external name 8
  • 23.
  • 24.
  • 25. Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30. Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
  • 31. Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
  • 32.
  • 33. Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
  • 34. Troubleshooting an Exchange Server 2010 Installation To troubleshoot Exchange Server 2010 setup: Verify the server hardware and software requirements Verify DNS name resolution Check the setup and event logs for errors Verify Active Directory functional levels and permissions    
  • 35. Finalizing the Exchange Server Installation Configure Exchange Server security Install and configure additional software Configure settings that are specific to server roles   
  • 36.
  • 37.
  • 38.
  • 39.
  • 40. Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.

Notas do Editor

  1. Module 1: Deploying Exchange Server 2010 Course 10135A Presentation: 70 minutes Lab: 80 minutes After completing this module, students will be able to: Describe the infrastructure requirements to install Microsoft® Exchange Server 2010. Install Exchange Server 2010 server roles. Complete an Exchange Server 2010 installation. Required materials To teach this module, you need the Microsoft Office PowerPoint® file 10135A_01.ppt. Important: We recommend that you use PowerPoint 2002 or a later version to display the slides for this course. If you use PowerPoint Viewer or an earlier version, all the features of the slides might not display correctly. Preparation tasks To prepare for this module: Read all of the materials for this module. Practice performing the demonstrations and the lab exercises. Work through the Module Review and Takeaways section, and determine how you will use this section to reinforce student learning and promote knowledge transfer to on-the-job performance.   Note about the demonstrations : To prepare for the demonstrations, start the 10135A-VAN-DC1 virtual machine and log on to the server before starting the other virtual machines. To save time during the demonstrations, log on to the Exchange servers and open the Exchange Server management tools before starting the demonstrations. Additionally, connect to the Microsoft Outlook® Web App site on the Exchange servers, and then log on as Administrator. It can take more than a minute to open the management tools and Outlook Web App for the first time. Make sure that students are aware that the Course Companion CD has additional information and resources for the module.
  2. Module 1: Deploying Exchange Server 2010 Course 10135A
  3. Module 1: Deploying Exchange Server 2010 Course 10135A
  4. Lead a discussion about the various components of Active Directory® directory service. The goal of this discussion is to ensure that all students have a good understanding of Active Directory. Because Exchange Server 2010 requires Active Directory to function, it is critical that students have at least a basic understanding of the Active Directory components and processes. You also can use this discussion to evaluate student knowledge and to encourage student interaction. Activity instructions: Sketch a diagram on the whiteboard of the Active Directory components, and point out the connections between each. Define and explain the functionality of the following terms: Domains. An Active Directory domain is a collection of computers that a Microsoft Windows® network administrator defines. These computers share a common directory database, security policies, and security relationships with other domains. An Active Directory domain provides access to the centralized user and group accounts that the domain administrator maintains. You can organize computer and user accounts within an Active Directory into a hierarchy based on organizational units (OUs). Forests. A forest is a set of one or more domains that share common configuration and schema information. A tree is set of domains that share the same Domain Name System (DNS) namespace. When multiple domains exist in a forest, there is an automatic trust relationship between the domain, which enables users in one domain to access resources in another domain. There can be only one Exchange Server organization per forest. An Active Directory forest is a security boundary. By default, no security accounts outside of a forest have any access in the forest. Trusts. Trusts enable users from at trusted domain to authenticate in another trusting domain. In a forest, all domains have trusts (either direct trusts, or transitive trusts) with all other domains in the forest. Domain controllers and global catalog servers : A domain controller holds a copy of the local domain database, which includes user accounts and computer accounts. It also is responsible for authenticating users and computers. Additionally, domain controllers respond to queries for information in Active Directory. A domain controller has directory information only for the domain of which it is a member, and does not have information about users in other domains. A global catalog server is a domain controller that also holds a subset of information from other domains in the forest. For example, a global catalog server has limited information about all users in a forest. Active Directory sites. Active Directory sites are defined as one or more IP subnets. Typically, all of the IP subnets in a given physical location are part of the same site. Sites do not typically encompass more than one physical location. All of the computers within a single site must have a fast network connection, which is usually 10 megabits per second (Mbps) or more, between them. Active Directory replication. Active Directory replicates information between domain controllers. It replicates domain information between domain controllers in the same domain and to global catalog servers in the forest. Active Directory also replicates configuration data and the schema between all domain controllers in the same forest. Module 1: Deploying Exchange Server 2010 Course 10135A
  5. Question: Under what circumstances would an organization deploy multiple domains in the same forest? Answer : Some organizations deploy multiple domains to provide an administrative boundary. They want to be able to have one group of administrators with full control of part of the organization. Other organizations deploy additional domains to isolate replication traffic. In very large organizations, you can minimize the amount of replication traffic that is sent across a slow wide area network (WAN) link by deploying separate domains. Question: Under what circumstances might an organization deploy multiple forests? Answer : The primary reason to deploy multiple forests is to ensure that there is a complete security boundary between different parts of the organization's IT infrastructure. This could happen if an organization has multiple departments or business units that require isolation, or in the event of two organizations merging. Question: What type of information do domains in a forest share? Answer: All domains in a forest share the same Active Directory configuration information, Active Directory schema information, and a common global catalog. Question: What is the functionality of a domain controller? Answer: A domain controller holds a copy of the local domain database, which includes user and computer accounts, and it is responsible for authenticating users and computers. A domain controller has directory information only for the domain of which it is a member. Additionally, domain controllers respond to queries for information in Active Directory. Question: What is a global catalog server? Answer: A global catalog server is a domain controller that also holds a subset of information from other domains in the forest. For example, a global catalog server has limited information about all users in a forest. By default, the first domain controller deployed in a forest is a global catalog server, but you also can configure other domain controller as a global catalog server. You use global catalog servers for authentication, global address list (GAL) lookups, and universal group membership lookups. Question: What is the definition of an Active Directory site? Answer: The definition of an Active Directory site is one or more IP subnets. Typically, all of the IP subnets in a given physical location are part of the same site. Active Directory sites typically do not encompass more than one physical location. All of the computers within a single site must have a fast network connection, typically 10 megabytes per second (Mbps) or more between them. The Active Directory site configuration should be a logical representation of the physical network deployment. Module 1: Deploying Exchange Server 2010 Course 10135A
  6. Question: What is Active Directory replication? Answer: Active Directory replicates information between domain controllers. It replicates domain information between domain controllers in the same domain and to global catalog servers in the forest. It also replicates configuration data and the schema between all domain controllers in the same forest. Question: How do Active Directory sites affect replication? Answer: Within an Active Directory site, replication of changes starts within a few seconds of the change being made on one domain controller. If an Active Directory site contains more than one domain controller, each domain controller also has at least two replication partners. Between Active Directory sites, replication can be scheduled, and happens every three hours by default. Also, all replication traffic between sites is sent through a bridgehead server in each site. References Understanding the Active Directory Logical Model: http://go.microsoft.com/fwlink/?LinkId=179867 Understanding Active Directory Site Topology: http://go.microsoft.com/fwlink/?LinkId=179868 Module 1: Deploying Exchange Server 2010 Course 10135A
  7. Many students might be familiar with only the domain partition of Active Directory. You can start this topic by asking them what type of information the domain partition includes, and then you can expand the discussion to describe what other partitions include. Ensure that you discuss the replication scope for each of the Active Directory partitions. Emphasize that the configuration and schema partitions are replicated to all domain controllers in the entire Active Directory forest. References Active Directory Logical Structure and Data Storage: http://go.microsoft.com/fwlink/?LinkId=179859 Module 1: Deploying Exchange Server 2010 Course 10135A
  8. While you discuss how Exchange Server 2010 uses Active Directory, refer to the concept of partitions described in the previous topic. Stress the importance of the global catalog for Exchange Server deployments. All global address list information is stored in the global catalog. Both Exchange Servers and messaging clients cannot function without access to the global catalog. References Planning Active Directory: http://go.microsoft.com/fwlink/?LinkId=179870 Guidance on Active Directory design for Exchange Server 2007: http://go.microsoft.com/fwlink/?LinkId=179872 Module 1: Deploying Exchange Server 2010 Course 10135A
  9. Review the importance of DNS and how all domain computers use DNS to locate domain controllers. Exchange Server services use DNS to locate a valid domain controller or a global catalog server. By default, each time a domain controller starts the Netlogon service, it updates DNS with service (SRV) records describing it as a domain controller and global catalog server (if applicable). To ensure that DNS records are updated properly, it is essential that all domain controllers use an internal DNS server that supports dynamic updates. After the domain controller registers the DNS records, computers running Exchange Server can use DNS to find domain controllers and global catalog servers. The service resource (SRV) records for domain controllers and global catalog servers are registered with several different variations so that computers running Exchange Server 2010 can find domain controllers and global catalog servers in several different ways. For example, DNS records can be registered by site name. This allows computers running Exchange Server to find domain controllers and global catalog servers in the local Active Directory site. DNS queries for resources are always performed for the local Active Directory site first. Consider opening the DNS console on the domain controller virtual machine to show students the SRV records that have been registered. Also, discuss the importance of mail exchange (MX) records for messaging. Messaging systems use MX records to locate mail servers in external organizations. If an organization does not have MX records registered in their external DNS zone, they will not be able to receive e-mail from the Internet. Module 1: Deploying Exchange Server 2010 Course 10135A
  10. While you describe the process for preparing Active Directory for Exchange Server 2010, reference the schema master and infrastructure master domain controller roles. Explain why these roles are important. Also explain the permissions that are required to run each of the commands listed on the slide. Mention that if you do not specifically prepare Active Directory and the domain before installation, it is prepared as part of a standard installation. Students might be confused about the process for upgrading Active Directory to the Windows Server® 2008 operating system or the Windows Server 2008 R2 operating system and the process for preparing the forest for Exchange Server 2010. Emphasize that these are two different processes, and can be completed in any order. Also, mention that organizations can upgrade directly from Microsoft Exchange Server 2003 to Exchange Server 2010 without first upgrading to Microsoft Exchange Server 2007. The Exchange Server 2010 schema changes include the Exchange Server 2007 schema changes. Mention that it is possible to install Exchange Server 2010 in a new organization without preparing Active Directory as a separate step. This is possible when you are deploying Exchange Server 2010 in an organization with only a single Active Directory domain. However, when you are performing transition from a previous version of Exchange Server, or when you are deploying Exchange Server 2010 in an organization with multiple domains, you must prepare Active Directory before installing the first Exchange Server. Mention that the following permissions are required to run the listed commands: /PrepareSchema  requires Schema Administrator and Enterprise Administrator rights. /PrepareAD requires Enterprise Administrator (and Exchange Organization Administrator rights if the Enterprise administrators have been explicitly denied access to the Exchange configuration) /PrepareDomain requires Domain Administrator rights References Exchange Server 2010 Help: Prepare Active Directory and Domains   Module 1: Deploying Exchange Server 2010 Course 10135A
  11. In this demonstration, you will use Active Directory Users and Computers to show the Exchange security groups in Active Directory. These groups are created when Active Directory is prepared for the Exchange Server installation. Do not spend much time describing the permissions assigned to each group at this point. Mention that Module 9 will provide details for each of the default groups. Also, you will use ADSIEdit.msc to show the Active Directory partitions and the Exchange Server information stored in each partition. You also will add the Schema partition to ADSIEdit.msc, and show some of the Exchange attributes that are added to the Active Directory schema. Preparation Ensure that the 10135A-VAN-DC1 virtual machine is running. Log on to the virtual machine as Administrator with the password of Pa$$w0rd . Demonstration Steps On VAN-DC1, click Start , point to Administrative Tools , and then click Active Directory Users and Computers . If necessary, expand Adatum.com , and then click the Microsoft Exchange Security Groups organizational unit. Double-click Organization Management , and then click the Members tab. The only default member of this group is the user that installed the first computer running Exchange Server. Members of this group have the necessary permissions to manage any aspect of the Exchange Server organization. Click Cancel . Double-click Recipient Management , and then click the Members tab. Verify that there are no group members. Members of this group are assigned full control permissions to manage the Exchange Server properties of user objects in Active Directory. Click Cancel . Double-click the View-Only Organization Management group, and then click the Members tab. The members of this group are assigned read permissions to the Exchange Server container in the Active Directory configuration partition, and read permission to all domains that have Exchange Server recipients. Click Cancel . Double-click the Discovery Management group, and then click the Members tab. The members of this group have permission to search all mailboxes in the organization for messages or content that meets specific criteria. Click Cancel . Close Active Directory Users and Computers . Click Start , and in the Search box, type adsiedit.msc , and then press ENTER. By default, when you open Active Directory Service Interfaces (ADSI) Edit in Windows Server 2008 R2, it does not display any partitions. Right-click ADSI Edit , and click Connect to . Module 1: Deploying Exchange Server 2010 Course 10135A
  12. In the Connection Settings dialog box, click OK . This connects ADSI Edit to the domain partition. In the left pane, expand Default naming context [VAN-DC1.Adatum.com] , and then click DC=Adatum,DC=com . The domain partition holds user accounts, computer accounts, and other domain specific configuration information. Objects with names that start with an OU are organizational units. Objects with names that start with CN are containers or other objects, such as users. You can verify the object type by looking at the Class column. In the right pane, double-click CN=Users . Notice that in the Users container, there are users and groups. Double-click OU=ITAdmins . Right-click CN=Andreas Herbinger , and then click Properties . This shows the attributes and values that are part of the Andreas Herbinger user object. Click Cancel . Right-click ADSI Edit , and click Connect to . In the Connection Settings dialog box, in the Connection Point section, in the Select a well known Naming Context list, click Configuration , and then click OK . This connects ADSI Edit to the configuration partition. In the left pane, expand Configuration[VAN-DC1.ADatum.com] , and then click CN=Configuration,DC=Adatum,DC=com . This displays the containers in the configuration partition of Active Directory. The containers contain configuration data used by Active Directory, applications, and services. Double-click CN=Partitions . This container holds a list of the Active Directory partitions. In the left pane, click CN=Sites . This container holds sites and their related configuration objects. Expand CN=Services , expand CN=Microsoft Exchange , and then click CN=AdatumOrg . In the right pane, you can see the containers that hold the various configuration information for Exchange Server. Double-click CN=Address Lists Container . This container stores configuration information for all address lists. In the left pane, click CN=Client Access . This container holds configuration information for the Autodiscover process. In the left pane, expand CN=Administrative Groups , expand CN=Exchange Administrative Group (FYDIBOHF23SPDLT) , expand CN=Servers . This container holds the Exchange Server objects. Right-click ADSI Edit , and click Connect to . In the Connection Settings dialog box, in the Connection Point section, in the Select a well known Naming Context list, click Schema , and then click OK . This connects ADSI Edit to the schema partition. In the left pane, expand Schema [VAN-DC1.ADatum.com] , and then click CN=Schema,CN=Configuration,DC=Adatum,DC=com . The schema container holds a list of classes and attributes that define the objects in Active Directory. Module 1: Deploying Exchange Server 2010 Course 10135A
  13. In the right page, click CN=ms-Exch-2003-Url , and then scroll down. Notice that many Exchange-specific attributes and classes have been added to the Active Directory schema. Close ADSI Edit. Question: How do you assign permissions in your Exchange organization? How will you assign permissions using the Exchange security groups? Answers will vary. Most small organizations will just have one set of administrators who will have full control of the Exchange organization. They can address the permission requirements by just adding the group to the Organization Management group. Organizations with more complex security requirements will need to use the other groups, or use custom role-based access control (RBAC) management roles. Question: Which Active Directory partition would you expect to contain the following information? User's e-mail address: Answer – Domain partition or global catalog. Exchange connector for sending e-mail to the Internet: Answer – Configuration partition. Exchange Server configuration: Answer – The configuration partition contains the Exchange Server-specific configuration information, but the Exchange Server computer object is also located in the domain partition. Module 1: Deploying Exchange Server 2010 Course 10135A
  14. Module 1: Deploying Exchange Server 2010 Course 10135A
  15. The concept of server roles might be new to Exchange Server 2003 administrators, but Exchange Server 2007 administrators are familiar with server roles. If you have students who have Exchange Server 2003 experience only, be prepared to spend more time on this topic. Mention that the front-end and back-end servers in Microsoft Exchange 2000 Server and Exchange Server 2003 introduced the concept of separating server functions into multiple servers. If you have students with Exchange Server 2007 deployment experience, ask them how they have deployed the server roles in their organization. Mention that they may need to redesign some of the server role deployments because of some of the architectural changes to Exchange Server 2010. As you describe the Exchange Server roles, point out the graphics that represent each server role on the slide. These graphics will be used consistently throughout the course. References Overview: http://go.microsoft.com/fwlink/?LinkId=179873 Module 1: Deploying Exchange Server 2010 Course 10135A
  16. The deployment scenarios are organized into small, medium, and large organizations. Emphasize that the suggested configuration is typical, but not sufficient for every scenario. For example, some medium-size organizations may desire multiple servers for redundancy. If you have students in the class who are familiar with Exchange 2007, stress that in Exchange 2010, Mailbox servers that are part of a highly available deployment can also host other server roles. Mention that in Exchange Server 2010, except for the Edge Transport Server role, you can implement full redundancy for all other server roles with just two servers. References Topologies: Overview: http://go.microsoft.com/fwlink/?LinkId=179874 Module 1: Deploying Exchange Server 2010 Course 10135A
  17. Question: When would you combine server roles on single servers in your organization? Answer : Answers will vary. Most small organizations might combine multiple server roles on one or more servers. Large organizations are less likely to do this. Question : What are the benefits and disadvantages of combining server roles? Answer : The obvious benefit is that you can deploy the required Exchange server roles while reducing the organization’s hardware costs. The disadvantage for large organizations is that it becomes more difficult to plan the server hardware requirements. If only a single role is installed on a computer, it is much easier to monitor server performance and identify bottlenecks than it is with multiple roles. Stress the new option in Exchange Server 2010 that enables multiple server roles to be installed on Mailbox servers that are part of a Database Availability Group (DAG). The option of deploying multiple roles on a highly available Mailbox server has not been available in any of the previous Exchange Server versions. Module 1: Deploying Exchange Server 2010 Course 10135A
  18. Discuss the Exchange Online Services solution and how it provides e-mail services for organizations. If students show interest in this feature, refer them to the Additional Reading links. The “Migrate to Microsoft Online Services” whitepaper provides details on how to migrate mailboxes and global address lists from the local Exchange Server to Exchange Online Services. This paper is based on Exchange Server 2007, but many of the same processes apply. References Business Productivity Online http://go.microsoft.com/fwlink/?LinkId=179875 Migrate to Microsoft Online Services http://go.microsoft.com/fwlink/?LinkId=179876 Module 1: Deploying Exchange Server 2010 Course 10135A
  19. Some students might not understand the schema master role, so if necessary, take a few moments to review the schema master role with students. Note that the schema master role exists once per forest, and that schema updates are performed through the domain controller that is the schema master. You also might want to review the concept of forest and domain functional levels. References Exchange Server 2010 Help: Exchange 2010 System Requirements Module 1: Deploying Exchange Server 2010 Course 10135A
  20. Review the installation requirements that are common for all server roles, and then describe the server requirements that are unique to each server role. References Exchange Server 2010 Help: Exchange 2010 System Requirements Module 1: Deploying Exchange Server 2010 Course 10135A
  21. Mention that because Exchange Server 2010 can be scaled to fully utilize the server hardware, large organizations might not consider it is as important to virtualize Exchange Servers. Mention that some virtualization products provide options for enabling high availability at the virtual machine level. Because Exchange Server provides several options for enabling high availability, you can deploy a highly available Exchange organization without using the high-availability options available in the virtualization products. In particular, if you deploy a DAG, and configure multiple copies of the mailbox databases, you should not use virtual machine-level high availability. Question: What are the benefits of virtualizing servers? Answer: Many organizations are using virtualization to significantly increase server utilization while decreasing hardware and power costs. Question: Discuss the benefits and disadvantages of using virtualization with Exchange Server 2010. Answer: Because you can add several thousand mailboxes to an Exchange Server 2010 server, you typically can utilize the hardware fully without virtualization. With the Exchange Server 2010 high availability models, this option becomes even more feasible. Emphasize that organizations should plan the hardware for virtual machines using the same criteria that they use for planning hardware for physical servers. References Microsoft Support Policies and Recommendations for Exchange Servers in Hardware Virtualization Environments: http://go.microsoft.com/fwlink/?LinkId=179877 Windows Server Virtualization Validation Program http://go.microsoft.com/fwlink/?LinkId=179878 Module 1: Deploying Exchange Server 2010 Course 10135A
  22. Mention that the Exchange Server 2010 setup program is easy to use and understand. Tell students that they will use the Exchange Server 2010 Installation Wizard to install Exchange Server 2010 in the lab that follows. Explain the significance of choosing to support Outlook 2003 or earlier clients. If you do not select this option, public folder databases are not be created on the server, and none of the system folders that these clients use will be available. Explain the selection of server roles during installation to the students. A typical installation includes the Mailbox server, Hub Transport server, and Client Access server roles. References Exchange Server 2010 Help: Perform a Typical Exchange 2010 Installation Module 1: Deploying Exchange Server 2010 Course 10135A
  23. Discuss the command-line parameters available to install Exchange Server 2010. Mention that some of these commands, such as the /PrepareAD and the /DomainController options, are available only from the command line. References Exchange Server 2010 Help Module 1: Deploying Exchange Server 2010 Course 10135A
  24. In this lab, students will: Evaluate infrastructure and server requirements for an Exchange Server installation. Prepare the environment for an Exchange Server 2010 installation. Install Exchange Server 2010 server roles Exercise 1: Evaluating Requirements for an Exchange Server Installation In this exercise, students will evaluate infrastructure and server requirements for an Exchange Server installation. The main tasks for this exercise are as follows: 1.Evaluate the Active Directory requirements. 2.Evaluate the DNS requirements. 3.Evaluate the server requirements. Exercise 2: Preparing for an Exchange Server 2010 Installation In this exercise, students will prepare the environment for an Exchange Server 2010 installation. The main tasks for this exercise are as follows: 1.Install the Windows Server 2008 server roles and features 2.Prepare Active Directory Domain Services (AD DS) for the Exchange Server 2010 installation. Module 1: Deploying Exchange Server 2010 Course 10135A
  25. Exercise 3: Installing Exchange Server 2010 In this exercise, students will install Exchange Server 2010 server roles. Before the students begin the lab, read each exercise’s scenario to the class. This will reinforce the broad issue that the students are troubleshooting, and will help to facilitate the lab discussion at the end of the module. Remind the students to complete the discussion questions after the last lab exercise. Module 1: Deploying Exchange Server 2010 Course 10135A
  26. Module 1: Deploying Exchange Server 2010 Course 10135A
  27. Use the questions on the slide to debrief students after they complete the lab exercises. Answers to the lab-review questions will vary depending on the organizations where the students work. If organizations have upgraded to the Windows Server 2003 operating system or Windows Server 2008 Active Directory, they may not need to make any changes to Active Directory. Most organizations will purchase server hardware that significantly exceeds the minimum required hardware for Exchange Server 2010. Ask students to describe the hardware they will purchase, and then follow with questions on the number of servers and number of mailboxes they will deploy. Module 1: Deploying Exchange Server 2010 Course 10135A
  28. Module 1: Deploying Exchange Server 2010 Course 10135A
  29. Preparation Ensure that the 10135A-VAN-DC1 and the 10135A-VAN-EX1 virtual machines are running. Log on to the virtual machines as Administrator with the password Pa$$w0rd . Important: When you start the virtual machines, ensure that you start 10135A-VAN-DC1 first, and that it starts fully before you start any other virtual machines. If you receive a notification that one or more services failed to start when starting a virtual machine, open the Services console on the virtual machine, and ensure that all Microsoft Exchange services that are configured to start automatically are started. On VAN-EX1, click Start , point to Administrative Tools , and then click Services . Scroll down to the Microsoft Exchange services, and expand the name column, so that you can read the service names. These are all of the services that Exchange Server installs. The services that Exchange Server installs vary depending on the Exchange Server roles that are installed on the server. Close Services. Click Start , right-click Computer , and then click Open . Browse to C:\\ExchangeSetupLogs . Double-click ExchangeSetup.log to open it. This log file contains information about the status of prerequisite and system-readiness checks that Exchange Server performs before the installation begins. This log also contains information about every task that occurs during the Exchange Server setup, and is the most complete log available for troubleshooting installation errors. Close Notepad. Describe some of the other files in this folder: ExchangeSetup.msilog. This file contains information about the extraction of the Exchange Server 2010 code from the installer file. Install-AdminToolsRole-[ date and time ].ps1. Setup generates this file, which contains the steps that Exchange Server uses to install the Exchange administration tools. Install-BridegeheadRole-[ date and time ].ps1. Setup generates this file, which contains the steps that Exchange Server uses to install the Hub Transport server role. Install-ClientAccessRole-[ date and time ].ps1. Setup generates this file, which contains the steps that Exchange Server uses to install the Client Access server role. Install-ExchangeOrganization-[ date and time ].ps1. Setup generates this file, which contains the steps that Exchange Server uses to create the Exchange Server organization. Install-MailboxRole-[ date and time ].ps1. Setup generates this file, which contains the steps that Exchange Server uses to install the Mailbox server role. InstallSearch.msilog. This file contains information about the extraction of the Search service that Exchange Server uses. Module 1: Deploying Exchange Server 2010 Course 10135A
  30. Note : Other .msilog or .ps1 files may exist in this folder, depending on which roles you install on this server. Browse to C:\\Program Files\\Microsoft\\Exchange Server\\V14 . Describe the contents of the folders: Bin. Applications and extensions that you can use to manage Exchange Server. ClientAccess. Configuration files for the Client Access server role. ExchangeOAB. Contains the Exchange Offline Address book files that Exchange Web Services makes available. GroupMetrics. Contains information about distribution groups and distribution-group membership that MailTips uses. Logging. Various log files. Mailbox. Schema files, .dll files, database files, and database log files for the mailbox databases and public folder databases. Public. Several .dll and .xml files. RemoteScripts. Contains a single script used only by the Exchange Management Console. Scripts. Exchange Management Shell scripts that you can use to retrieve anti-spam statistics and perform other tasks. Setup. Extensible Markup Language (XML) configuration files and data. TransportRoles. Folders and files that the Hub Transport Server role uses. Working. Contains an empty folder. Close Windows Explorer. Click Start , point to All Programs , click Microsoft Exchange Server 2010 , and then click Exchange Management Console . Click OK to acknowledge that the servers are not licensed. In the left pane, expand Microsoft Exchange On-Premises , and then click Server Configuration . The server you just installed should always appear here, as should the list of roles you installed. In the left pane, click Toolbox . The Toolbox node includes tools that you can use to troubleshoot and repair Exchange Server. During installation, the only relevant tool is the Microsoft Exchange Server Best Practices Analyzer Tool. In the left pane, click Recipient Configuration . This shows all of the users and groups that are mailbox users or mail-enabled. Right-click Recipient Configuration , and then click New Mailbox . Accept the default setting of User Mailbox , and then click Next . Accept the default setting of New user , and then click Next . In the First name box, type TestUser . In the User logon name (User Principal Name) box, type TestUser . Module 1: Deploying Exchange Server 2010 Course 10135A
  31. In the Password and Confirm password boxes, type Pa$$w0rd , and then click Next . 21. On the Mailbox Settings page, type TestUser as the Alias , and click Next to accept the default mailbox settings. 22. On the Archive Settings page, click Next . 23. Click New to create the new mailbox. 24. Click Finish . 25. Close the Exchange Management Console. 26. Click Start , point to All Programs , and then click Internet Explorer . In the Address bar, type https://VAN-EX1.adatum.com/owa , and then press ENTER. In the Domain\\User name box, type Adatum\\TestUser . 29. In the Password box, type Pa$$w0rd , and then click Sign in . 30. Click OK to accept the default configuration for Outlook Web App. 31. Create a new message and send it to TestUser: Click New in the toolbar. In the To box, type TestUser . In the Subject box, type Test Message . Click Send . 32. Verify the message was received by clicking Check Messages in the toolbar. 33. Close Microsoft Internet Explorer®. Module 1: Deploying Exchange Server 2010 Course 10135A
  32. Before you start the demonstration, describe how the Exchange Server Best Practices Analyzer works. Because the Exchange Server Best Practices Analyzer scan can take a few minutes, you might want to start the Exchange Server Best Practices Analyzer during a break and then start the scan. References Microsoft Exchange Analyzers: http://go.microsoft.com/fwlink/?LinkId=179879 Preparation Ensure that the 10135A-VAN-DC1 and the 10135A-VAN-EX1 virtual machines are running. Log on to the virtual machines as Administrator with the password of Pa$$w0rd . Demonstration Steps Demonstrate how the Exchange Server Best Practices Analyzer works by using the following steps: On VAN-EX1, click Start , point to All Programs , click Microsoft Exchange Server 2010 , and then click Exchange Management Console . In the left pane, click Toolbox . In the middle pane, double-click Best Practices Analyzer . Click Do not check for updates on startup . As a best practice, check for updates on startup to ensure that you have the latest best practices information from Microsoft. However, our virtual machines are limited to local network connectivity. Click I don’t want to join the program at this time . As a best practice, join the customer improvement program so that Microsoft can get anonymous feedback about how you use Exchange Server. This allows Microsoft to make future improvements that more accurately reflect the needs of their customers. However, our virtual machines are limited to local network connectivity. Click Go to Welcome Screen . Notice that this tool can scan a single server or the whole organization. Click Select options for a new scan . If necessary, in the Active Directory Server box, type VAN-DC1 , and then click Connect to the Active Directory server . The Exchange Server Best Practices Analyzer uses this server for read-only access to Active Directory. By default, it authenticates as the user who is logged on. In the Enter an identifying label for this scan box, type VAN-EX1 Scan . In the Specify the scope for this scan box, clear the check box for VAN-EX2 and VAN-EX3 . Module 1: Deploying Exchange Server 2010 Course 10135A
  33. If necessary, select Health Check . The Exchange Server Best Practices Analyzer can perform four types of scans: Health Check . This test checks for errors, warnings, nondefault configurations, recent changes, and other configuration information. This scan checks the health of your Exchange Server organization, and you can use it for troubleshooting. When you select the Performance check option, a sampling of performance data is taken over a two-hour period Permission Check . This test verifies that permissions are properly configured on the selected servers. Connectivity Check . This test verifies that network connectivity is available to the selected servers. Baseline . This scan allows you to select specific properties, configure baseline values for those properties, and then scan for servers to find deviations from the baseline values. Select Fast LAN (100 mbps or more) as the network speed. This setting does not have any influence on test performance. The estimated scan time is generated based on the network speed selected. Click Start scanning . You also can schedule scans for specific times. This scan gathers performance data or performs a weekly health check. However, to perform a scheduled scan, you must configure credentials under which the scan runs. The credentials are configured in the Connect to Active Directory screen in the advanced logon options. Running this scan will take approximately two minutes. After the scan is complete, click View a report of this Best Practices scan . The first tab displayed is the Critical Issues tab. This tab highlights issues that you should consider addressing immediately. Click the All Issues tab. This tab shows any issues that may be a concern. Click the Informational Items tab. This tab displays configuration information about your Exchange Server organization. Click Tree Reports . This view shows all of the configuration information that the Exchange Server Best Practices Analyzer collects. Click Other Reports . The Run-Time Log displays information generated during the collection and analysis of data by the Exchange Server Best Practices Analyzer. Close the Exchange Server Best Practices Analyzer. Close the Exchange Management Console. Module 1: Deploying Exchange Server 2010 Course 10135A
  34. Ask the students if they have a standard troubleshooting process that they follow. If you have students who have troubleshooting experience, encourage them to describe how they would approach troubleshooting an issue such as an installation that fails. Emphasize the importance of reviewing the contents of any message that displays during a setup failure and of reviewing the setup logs. These sources of information typically can pinpoint the reason for the setup failure. Module 1: Deploying Exchange Server 2010 Course 10135A
  35. Question: What additional software would you install on an Exchange server? The slide provides some examples of software that organizations often will install on Exchange servers. Ask students for additional examples of the types of software or configuration settings they normally include in a server build. Question: What additional software might you need to install in organizations with other messaging systems? In organizations with other messaging systems, such as Lotus Domino or X.400-based messaging systems, you might need to install some type of connector on one or more Exchange servers. Question: What are the potential issues with installing additional software? You should verify that all of the software that you install on an Exchange Server are Exchange Server 2010 compatible. If you install an older version of software on the Exchange Server 2010 servers, the software installation might fail or cause problems for the Exchange Server 2010 installation. Module 1: Deploying Exchange Server 2010 Course 10135A
  36. In this lab, students will verify that the Exchange Server 2010 installation was successful. Exercise 1 In this exercise, students will verify an Exchange Server 2010 installation. Inputs: Students will verify that the installation was successful. Outputs: Students will verify that the Exchange Server installation completes successfully by performing the following steps on it : 1. View the Exchange Server services. 2. View the Exchange Server folders. 3. Create a new user, and send a test message. Run the Exchange Server Best Practices Analyzer Tool. Before the students begin the lab, read the scenario associated with each exercise to the class. This will reinforce the broad issue that the students are troubleshooting and will help to facilitate the lab discussion at the end of the module. Remind the students to complete the discussion questions after the last lab exercise. Module 1: Deploying Exchange Server 2010 Course 10135A
  37. Module 1: Deploying Exchange Server 2010 Course 10135A
  38. Use the questions on the slide to debrief students after the complete the lab exercises. Answers to the second question will vary. Some organizations use the Exchange Server Best Practices Analyzer only once, after the initial deployment. Other organizations regularly run the tool. Recommend to the students that they should run the tool regularly, and especially when they are troubleshooting an issue with the Exchange deployment. Module 1: Deploying Exchange Server 2010 Course 10135A
  39. Review Questions 1. The installation of Exchange Server 2010 fails. What information sources can you use to troubleshoot the issue? Answer: The two most important sources of information are the error message that displays when the installation fails, and the setup logs. In most cases, these sources of information will clearly indicate why the installation fails. A third option is to review the server’s event logs. 2. What factors should you consider while purchasing new servers for your Exchange Server 2010 deployment? Answer: The most important consideration is that you can install Exchange Server 2010 only on 64-bit hardware, which means that you must buy this type of hardware. Additional considerations include capacity planning and redundancy requirements. 3. How would the deployment of additional Exchange Server 2010 servers vary from the deployment of the first server? Answer: When you deploy the second server, you do not need to be concerned with the Active Directory prerequisites, as these will already have been configured for the first server installation. Additionally, you are more likely to install specific server roles if you deploy multiple servers. Common Issues Related to Deploying Exchange Server 2010 Identify the causes for the following common issues pertaining to installing Exchange Server 2010, and fill in the troubleshooting tips. For answers, refer to relevant lessons in the module. Module 1: Deploying Exchange Server 2010 Course 10135A
  40. Real-World Issues and Scenarios 1. An organization has a main office and multiple smaller branch offices. What criteria would you use to decide whether to install an Exchange server in a branch office? What additional factors should you consider if you decide to deploy an Exchange server in the branch office? Answer: The most important criteria is the number of users in the branch office, and the bandwidth between the branch office and main office. If the number of users is low, and there is enough available bandwidth for the users to have a positive experience with e-mail, you might choose not to deploy Exchange servers in the office. If the branch office has a large number of users, or if the client connections to Exchange servers in the main office are slow, you may choose to put an Exchange server in the office. If you put an Exchange Server 2010 server in a branch office, you must ensure that you deploy a Mailbox server, Client Access server, and Hub Transport server, and that you deploy a global catalog server in the office. 2. An organization has deployed Active Directory directory services within two different forests. What issues will this organization experience when they deploy Exchange Server 2010? Answer: Organizations with multiple forests need to decide whether to deploy two Exchange organizations, or a single Exchange organization and enable user accounts from one forest to access mailboxes in the other forest. If the organization deploys multiple forests, it will need to plan for the replication of information such as free/busy information between the forests. 3. An organization is planning to deploy Exchange Server 2010 servers as virtual machines running on Hyper-V™ in Windows Server 2008 R2. What factors should the organization consider in their planning? Answer: Firstly, the organization should be aware that they cannot deploy Unified Messaging servers on virtual machines. Secondly, the organization should consider whether to use Hyper-V to provide high availability for the Exchange servers, or to use the built-in Exchange high availability options. For Mailbox servers, we recommend strongly that you use DAGs. For other Exchange server roles, it is more feasible to use the Hyper-V failover component. Best Practices for Deploying Exchange Server 2010 Help the students understand the best practices presented in this section. Ask students to consider these best practices in the context of their own business situations. Module 1: Deploying Exchange Server 2010 Course 10135A