SlideShare a Scribd company logo
1 of 44
Vu Nguyen Cao Son Technology Specialist Microsoft Vietnam [email_address] www.CaoSonBlog.com
Today’s Business Environment What customers tell us ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],IT Decision Makers Employees IT Pros
Today’s Business Environment Investment Themes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Built-in  Protection Anywhere  Access Operational  Efficiency
1. Built-in Protection Anti-spam & Anti-Virus ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],June 5, 2009  | Page
June 5, 2009  | Page    ,[object Object],[object Object],[object Object],1. Built-in Protection Anti-spam & Anti-Virus – Option 1: On-site protection Firewall Mailbox Server Hub Transport  Server Edge Transport Server  Client Access Server DMZ SMTP Internet
1. Built-in Protection Anti-spam & Anti-Virus –  Option 1: On-site protection
June 5, 2009  | Page    ,[object Object],[object Object],[object Object],Mailbox Server Hub Transport Server Client Access Server SMTP  Internet 1. Built-in Protection Anti-spam & Anti-Virus – Option 2: Off-site protection Firewall
1. Built-in Protection Compliance June 5, 2009  | Page    ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1. Built-in Protection Compliance via Transport Rules
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Properties of folder selected 1. Built-in Protection Compliance via Managed Folders
1. Built-in Protection Confidential Messaging ,[object Object],[object Object],[object Object],[object Object]
1. Built-in Protection Business Continuity Exchange 2007 CCR Clustered Continuous Replication Exchange 2007 LCR Local Continuous Replication ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1. Built-in Protection Protection with Hosted Services
2. Anywhere Access Enhanced OWA:  Search Triage with Outlook  flags & categories Search Inbox Search Global Address List
2. Anywhere Access Enhanced OWA:  Pwd change
2. Anywhere Access Enhanced OWA:  SharePoint & FileShare Access
2. Anywhere Access Enhanced OWA:  VPN-less SharePoint & FileShare Access
2. Anywhere Access Enhanced OWA:  Scheduling Int/Ext OOF Set start and end times Unique internal and  external OOF messages Rich HTML Out of Office messages
2. Anywhere Access Enhanced OWA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
2. Anywhere Access Mobile Messaging ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
2. Anywhere Access Calendaring:  Calendar Attendant & Scheduling Assistant ,[object Object],[object Object],[object Object],[object Object]
2. Anywhere Access Calendaring:  Resource Booking Attendant
2. Anywhere Access Calendaring:  Resource Booking Attendant
2. Anywhere Access Calendaring:  Resource Booking Attendant
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Search in Outlook 2007  2. Anywhere Access Improved Outlook Search
2. Anywhere Access Unified Messaging ,[object Object],[object Object],[object Object]
2. Anywhere Access Unified Messaging – Outlook Voice Access ,[object Object],[object Object],[object Object],[object Object]
3. Operational Efficiency Performance and Scalability ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],64-bit by the numbers 32-bit = 2 32  or 4 gigabytes of addressable memory 64-bit = 2 64  or 16 exabytes of addressable memory
3. Operational Efficiency Deployment: Server Roles Internet
[object Object],[object Object],[object Object],[object Object],[object Object],3. Operational Efficiency Deployment: Auto Discover
3. Operational Efficiency Admin and Automation ,[object Object],[object Object],[object Object],Exchange  Management Shell Exchange  Management Console
3. Operational Efficiency Admin and Automation
3. Operational Efficiency Admin and Automation
3. Operational Efficiency Admin and Automation
Savings Potential in Summary Assessing the Impact of Exchange Server 2007 Current Activity  or Cost Voicemail, corp. operator/directory How Resources Required Mobile messaging Backup & restore Server hardware Compliance Storage hardware Client/server setup Administration Unified Messaging and auto attendant with  AD integration Reduced time to backup/restore;  storage flexibility Journaling per user, archiving; retention integration with Outlook IO optimization; Direct attach storage support for HA Outlook/mobile device setup; reduced help desk calls Scripting and command line interface 64-bit enabled server consolidation Integrated; no additional servers or services $$$$ $$$$ $$$ $$$ $$ $$ $$ $ Savings Impact
Exchange Server 2007 in Summary ,[object Object],With the  Anywhere Access  employees want And the  Operational Efficiency  IT needs
Edition Comparison ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Exchange 2003 Server Editions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Exchange 2007 Server Editions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Customer
Exchange Server 2007 SKU Overview CALs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Exchange Server 2007 SKUs Packaged CAL Offers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Servers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],L&SA  $38* L  $74 L  $772 L  $4,419
Built-in Protection Exchange 2000 versus Exchange 2007 Exchange 2000 Exchange  2007 Compliance ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],AV/AS protection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Confidential Messaging ,[object Object],[object Object],[object Object],Business Continuity ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Anywhere Access Exchange 2000 versus Exchange 2007 Exchange 2000 Exchange  2007 Unified Messaging ,[object Object],[object Object],[object Object],[object Object],Mobile Access ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Remote Access ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Collaboration & Productivity ,[object Object],[object Object],[object Object],[object Object],[object Object]
Outlook Web Access Exchange 2000 versus Exchange 2007
Operational Efficiency Exchange 2000 versus Exchange 2007 Exchange  2000 Exchange  2007 Deployment ,[object Object],[object Object],[object Object],[object Object],[object Object],Scalability ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Administrative Productivity ,[object Object],[object Object],[object Object],[object Object],Extensibility ,[object Object],[object Object],[object Object],[object Object],[object Object]
Additional Resources ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
© 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.

More Related Content

What's hot

Web Server Hardware and Software
Web Server Hardware and SoftwareWeb Server Hardware and Software
Web Server Hardware and Software
webhostingguy
 
10135 a xb
10135 a xb10135 a xb
10135 a xb
Bố Su
 
Windows 2008 R2 Security
Windows 2008 R2 SecurityWindows 2008 R2 Security
Windows 2008 R2 Security
Amit Gatenyo
 
10135 a 11
10135 a 1110135 a 11
10135 a 11
Bố Su
 
10135 a 10
10135 a 1010135 a 10
10135 a 10
Bố Su
 

What's hot (19)

C:\fakepath\blewis tech deck_overview_sp1
C:\fakepath\blewis tech deck_overview_sp1C:\fakepath\blewis tech deck_overview_sp1
C:\fakepath\blewis tech deck_overview_sp1
 
Exchange Server 2010 Overview - Denver Presentation
Exchange Server 2010 Overview - Denver PresentationExchange Server 2010 Overview - Denver Presentation
Exchange Server 2010 Overview - Denver Presentation
 
Web Server Technologies II: Web Applications & Server Maintenance
Web Server Technologies II: Web Applications & Server MaintenanceWeb Server Technologies II: Web Applications & Server Maintenance
Web Server Technologies II: Web Applications & Server Maintenance
 
200308 Active Directory Security
200308 Active Directory Security200308 Active Directory Security
200308 Active Directory Security
 
Web Server Hardware and Software
Web Server Hardware and SoftwareWeb Server Hardware and Software
Web Server Hardware and Software
 
10135 a xb
10135 a xb10135 a xb
10135 a xb
 
Windows 2008 R2 Security
Windows 2008 R2 SecurityWindows 2008 R2 Security
Windows 2008 R2 Security
 
Secure erasure code based cloud storage system with secure data forwarding
Secure erasure code based cloud storage system with secure data forwardingSecure erasure code based cloud storage system with secure data forwarding
Secure erasure code based cloud storage system with secure data forwarding
 
Web Server Technologies I: HTTP & Getting Started
Web Server Technologies I: HTTP & Getting StartedWeb Server Technologies I: HTTP & Getting Started
Web Server Technologies I: HTTP & Getting Started
 
Migrating 3000 users and 1100 applications from Lotus Notes to Office 365
Migrating 3000 users and 1100 applications from Lotus Notes to Office 365Migrating 3000 users and 1100 applications from Lotus Notes to Office 365
Migrating 3000 users and 1100 applications from Lotus Notes to Office 365
 
10135 a 11
10135 a 1110135 a 11
10135 a 11
 
Security_Measures_Rediff
Security_Measures_RediffSecurity_Measures_Rediff
Security_Measures_Rediff
 
Web server administration
Web server administrationWeb server administration
Web server administration
 
10135 a 10
10135 a 1010135 a 10
10135 a 10
 
Secure Data Storage and Forwarding in Cloud Using AES and HMAC
Secure Data Storage and Forwarding in Cloud Using AES and HMACSecure Data Storage and Forwarding in Cloud Using AES and HMAC
Secure Data Storage and Forwarding in Cloud Using AES and HMAC
 
Web server
Web serverWeb server
Web server
 
Web server hardware and software
Web server hardware and softwareWeb server hardware and software
Web server hardware and software
 
Exchange 2013
Exchange 2013Exchange 2013
Exchange 2013
 
Windows Server 2008 Management
Windows Server 2008 ManagementWindows Server 2008 Management
Windows Server 2008 Management
 

Similar to Exchange 2007 Overview Son Vu

Run 20 exchange 2010
Run 20 exchange 2010Run 20 exchange 2010
Run 20 exchange 2010
guest3559b8d
 
C:\fakepath\run 20 exchange 2010
C:\fakepath\run 20 exchange 2010C:\fakepath\run 20 exchange 2010
C:\fakepath\run 20 exchange 2010
guest3559b8d
 
Windows Server 2008 Security Enhancements
Windows Server 2008 Security EnhancementsWindows Server 2008 Security Enhancements
Windows Server 2008 Security Enhancements
Presentologics
 

Similar to Exchange 2007 Overview Son Vu (20)

Why Upgrade To Exchange 2007 Sp1 Son Vu
Why Upgrade To Exchange 2007 Sp1 Son VuWhy Upgrade To Exchange 2007 Sp1 Son Vu
Why Upgrade To Exchange 2007 Sp1 Son Vu
 
Why Upgrade To Exchange 2007 Sp1 Son Vu
Why Upgrade To Exchange 2007 Sp1 Son VuWhy Upgrade To Exchange 2007 Sp1 Son Vu
Why Upgrade To Exchange 2007 Sp1 Son Vu
 
Overview of Microsoft Exchange Online
Overview of Microsoft Exchange OnlineOverview of Microsoft Exchange Online
Overview of Microsoft Exchange Online
 
Take a Leap into the Connected Cloud; 3 Trending Hybrid Cloud Scenarios
Take a Leap into the Connected Cloud; 3 Trending Hybrid Cloud ScenariosTake a Leap into the Connected Cloud; 3 Trending Hybrid Cloud Scenarios
Take a Leap into the Connected Cloud; 3 Trending Hybrid Cloud Scenarios
 
Introducing Exchange Server 2010
Introducing Exchange Server 2010Introducing Exchange Server 2010
Introducing Exchange Server 2010
 
HMSC_AD Event V3
HMSC_AD Event V3HMSC_AD Event V3
HMSC_AD Event V3
 
Atelier Barracuda Bessage Archiver
Atelier Barracuda Bessage ArchiverAtelier Barracuda Bessage Archiver
Atelier Barracuda Bessage Archiver
 
Exchange Server 2010
Exchange Server 2010   Exchange Server 2010
Exchange Server 2010
 
Webinar: Discover how Vaultastic integrates with your existing email infrastr...
Webinar: Discover how Vaultastic integrates with your existing email infrastr...Webinar: Discover how Vaultastic integrates with your existing email infrastr...
Webinar: Discover how Vaultastic integrates with your existing email infrastr...
 
Featured Webinar: Why Cloud Archiving is Best Suited for On Premise Mail Serv...
Featured Webinar: Why Cloud Archiving is Best Suited for On Premise Mail Serv...Featured Webinar: Why Cloud Archiving is Best Suited for On Premise Mail Serv...
Featured Webinar: Why Cloud Archiving is Best Suited for On Premise Mail Serv...
 
Exchange Conference (Philadelphia) - Exchange 2007 Security
Exchange Conference (Philadelphia) - Exchange 2007 SecurityExchange Conference (Philadelphia) - Exchange 2007 Security
Exchange Conference (Philadelphia) - Exchange 2007 Security
 
Operations: Security Crash Course — Best Practices for Securing your Company
Operations: Security Crash Course — Best Practices for Securing your CompanyOperations: Security Crash Course — Best Practices for Securing your Company
Operations: Security Crash Course — Best Practices for Securing your Company
 
Operations: Security
Operations: SecurityOperations: Security
Operations: Security
 
C:\fakepath\run 20 exchange 2010
C:\fakepath\run 20 exchange 2010C:\fakepath\run 20 exchange 2010
C:\fakepath\run 20 exchange 2010
 
Run 20 exchange 2010
Run 20 exchange 2010Run 20 exchange 2010
Run 20 exchange 2010
 
C:\fakepath\run 20 exchange 2010
C:\fakepath\run 20 exchange 2010C:\fakepath\run 20 exchange 2010
C:\fakepath\run 20 exchange 2010
 
Exchange 2010 Archiving And Retention
Exchange 2010 Archiving And RetentionExchange 2010 Archiving And Retention
Exchange 2010 Archiving And Retention
 
Sonasoft email archiving
Sonasoft email archivingSonasoft email archiving
Sonasoft email archiving
 
Start Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best PraticesStart Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best Pratices
 
Windows Server 2008 Security Enhancements
Windows Server 2008 Security EnhancementsWindows Server 2008 Security Enhancements
Windows Server 2008 Security Enhancements
 

More from vncson

Microsoft Private Cloud Computing
Microsoft Private Cloud ComputingMicrosoft Private Cloud Computing
Microsoft Private Cloud Computing
vncson
 
Hyper V In Windows Server 2008 R2.Son Vu
Hyper V In Windows Server 2008 R2.Son VuHyper V In Windows Server 2008 R2.Son Vu
Hyper V In Windows Server 2008 R2.Son Vu
vncson
 
Scvmm Technical Overview.Son Vu
Scvmm Technical Overview.Son VuScvmm Technical Overview.Son Vu
Scvmm Technical Overview.Son Vu
vncson
 

More from vncson (15)

Protecting exchange servers with dpm 2010 son vu
Protecting exchange servers with dpm 2010 son vuProtecting exchange servers with dpm 2010 son vu
Protecting exchange servers with dpm 2010 son vu
 
Microsoft Private Cloud Computing
Microsoft Private Cloud ComputingMicrosoft Private Cloud Computing
Microsoft Private Cloud Computing
 
Hyper V In Windows Server 2008 R2.Son Vu
Hyper V In Windows Server 2008 R2.Son VuHyper V In Windows Server 2008 R2.Son Vu
Hyper V In Windows Server 2008 R2.Son Vu
 
Scvmm Technical Overview.Son Vu
Scvmm Technical Overview.Son VuScvmm Technical Overview.Son Vu
Scvmm Technical Overview.Son Vu
 
Dpm4 Data Center
Dpm4 Data CenterDpm4 Data Center
Dpm4 Data Center
 
Dpm Disaster Recovery Sonvu
Dpm Disaster Recovery SonvuDpm Disaster Recovery Sonvu
Dpm Disaster Recovery Sonvu
 
Branch Office Solution Son Vu
Branch Office Solution   Son VuBranch Office Solution   Son Vu
Branch Office Solution Son Vu
 
Dpm.2007.For.Sql Sonvu
Dpm.2007.For.Sql SonvuDpm.2007.For.Sql Sonvu
Dpm.2007.For.Sql Sonvu
 
Data Protection Manager 2007 Technical Overview Son Vu
Data Protection Manager 2007 Technical Overview Son VuData Protection Manager 2007 Technical Overview Son Vu
Data Protection Manager 2007 Technical Overview Son Vu
 
Data Center Optimization With Microsoft System Center Son Vu
Data Center Optimization With Microsoft System Center  Son VuData Center Optimization With Microsoft System Center  Son Vu
Data Center Optimization With Microsoft System Center Son Vu
 
MS NAP - Security Day
MS NAP - Security DayMS NAP - Security Day
MS NAP - Security Day
 
IO ROI Example
IO ROI ExampleIO ROI Example
IO ROI Example
 
Microsoft IO 101 Training
Microsoft IO 101 TrainingMicrosoft IO 101 Training
Microsoft IO 101 Training
 
Microsoft.Virtualization.Technologies Son Vu
Microsoft.Virtualization.Technologies Son VuMicrosoft.Virtualization.Technologies Son Vu
Microsoft.Virtualization.Technologies Son Vu
 
Microsoft Hyper V Server 2008
Microsoft Hyper V Server 2008Microsoft Hyper V Server 2008
Microsoft Hyper V Server 2008
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Recently uploaded (20)

ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 

Exchange 2007 Overview Son Vu

  • 1. Vu Nguyen Cao Son Technology Specialist Microsoft Vietnam [email_address] www.CaoSonBlog.com
  • 2.
  • 3.
  • 4.
  • 5.
  • 6. 1. Built-in Protection Anti-spam & Anti-Virus – Option 1: On-site protection
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14. 2. Anywhere Access Enhanced OWA: Search Triage with Outlook flags & categories Search Inbox Search Global Address List
  • 15. 2. Anywhere Access Enhanced OWA: Pwd change
  • 16. 2. Anywhere Access Enhanced OWA: SharePoint & FileShare Access
  • 17. 2. Anywhere Access Enhanced OWA: VPN-less SharePoint & FileShare Access
  • 18. 2. Anywhere Access Enhanced OWA: Scheduling Int/Ext OOF Set start and end times Unique internal and external OOF messages Rich HTML Out of Office messages
  • 19.
  • 20.
  • 21.
  • 22. 2. Anywhere Access Calendaring: Resource Booking Attendant
  • 23. 2. Anywhere Access Calendaring: Resource Booking Attendant
  • 24. 2. Anywhere Access Calendaring: Resource Booking Attendant
  • 25.
  • 26.
  • 27.
  • 28.
  • 29. 3. Operational Efficiency Deployment: Server Roles Internet
  • 30.
  • 31.
  • 32. 3. Operational Efficiency Admin and Automation
  • 33. 3. Operational Efficiency Admin and Automation
  • 34. 3. Operational Efficiency Admin and Automation
  • 35. Savings Potential in Summary Assessing the Impact of Exchange Server 2007 Current Activity or Cost Voicemail, corp. operator/directory How Resources Required Mobile messaging Backup & restore Server hardware Compliance Storage hardware Client/server setup Administration Unified Messaging and auto attendant with AD integration Reduced time to backup/restore; storage flexibility Journaling per user, archiving; retention integration with Outlook IO optimization; Direct attach storage support for HA Outlook/mobile device setup; reduced help desk calls Scripting and command line interface 64-bit enabled server consolidation Integrated; no additional servers or services $$$$ $$$$ $$$ $$$ $$ $$ $$ $ Savings Impact
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41. Outlook Web Access Exchange 2000 versus Exchange 2007
  • 42.
  • 43.
  • 44. © 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.

Editor's Notes

  1. 06/05/09 18:22 © 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.