Capacity scalability, 17
Certificate Authority (CA), 345
Certificates defined, 344
in message content security, 344–46
revocation checking, 346
services, 344–46
trust list, 345
Checkpoint file, 85
Circular logging, 85–87
defined, 85
disabling, 85–86
functioning of, 86
See also Logging
Clones, 137–38
defined, 137
technology, 227–32
technology, using, 175
technology illustration, 138
See also snapshots
Cluster Administrator, 283
illustrated, 284
running, 281
Clustering
Active/Active, 276, 277
Active/Passive, 276, 277
complexity effects, 275
as downtime solution, 274
geo, 290–91
high availability and, 241–42
as high-priority requirement, 241
history lesson, 257–72
Microsoft three-pronged approach, 245–47
problems not solved by, 244
problem solving and, 243–44
ROI justification, 275
SGs and, 57
technology, 379–80
Cluster management
best practices, 287–94
memory, 68, 264–66
tools and monitoring, 287–89
Clusters
binaries removal, 292
decision points, 273–75
defined, 241
design scenarios, 289–90
design utilizing mount points, 279
disaster recovery, 294–96
drive letter limitations, 279–80
failover, improving, 266–67
failover modes, 255
four-node configuration, 280
in-place/rolling upgrade strategy, 285–86
installation, 280–85
installing Exchange 2000/2003 Server in, 282
IP addressing and naming, 291
leveraging, 241–96
managing, 267–70
migrating to, 285–87
monitoring, 288
monitoring and memory-management
improvements, 268
mount points utilization, 294
move mailbox strategy, 286–87
MSCS, 249
NLB, 246
permissions model, 269
resources, 249–50, 292
shared-nothing, 248
storage design, 275–80
storage design before configuration, 293–94
stretched, 224
successful deployment of, 272–96
supported components, 271–72
terminology, 251–52
two-node configuration, 281
upgrading to, 285–87
virtual server removal, 292
Windows technology fundamentals, 244–57
CNI study, 31, 32, 33, 34
Compaq Insight Manager (CIM), 372
Component Load Balancing (CLB), 246–47
defined, 246
LOB application focus, 247
See also Clustering
Computer Management tool, 369
Configuration management, 20, 370–73
challenges, 371
defined, 352
practices, 371
See also Proactive management
Contact information worksheet, 178
Content indexing, 89–90
Corruption
logical, 104–5
physical, 98–100