Scalability, 15–18
Active/Passive clustering, 277
capacity, 17
manifestation, 17–18
performance vs., 17
traditional view, 17
See also Four pillars
SCSI, 214–16
benefits, 215
connection limit, 216
drives, 214
specifications, 214, 216
specifications evolution, 215
vendors, 216
See also Storage technologies
Search tables, 65
Security, 18–19, 381
built-in mechanisms, 18
checklist, 315–16
enhancements, 318–21
Exchange servers, 316–48
general considerations, 316–18
increased focus on, 19
message content, 343–47
mobility, 321
network, 324–33
OWA, 319–21
problem, 19
putting together, 347–48
Windows services, 311–16
See also Four pillars
Security Accounts Manager (SAM), 304
Security Configuration Audit (SCA) tool, 312–13
analyzer, 313
defined, 313
Server architecture, 190–97
defined, 190
illustrated, 191
information, 192
I/O bus technology, 196–97
memory and memory bus technology, 193–96
processor and host bus technology, 190–93
Server Message Block (SMB), 87
Service-level agreements. See SLAs
Shared-nothing model, 247–49
defined, 247
shared-disk architecture comparison, 248
Single-instance storage, 64, 90–91
Single-item recovery, 120
Site replication service (SRS), 286
SLAs
accountability, 30
backup/restore, 53
cost and, 354
defined, 3553
development, 358–60
development process, 356
development team, 358, 360
disaster recovery, 159–61
establishing, 20–21, 353–62
examples, 48–49
external, 353
feedback, 361–62
fine-tuning, 361
forms, 47
four-step process, 356–62
functions provided by, 354–55
guidelines for establishing, 356
mission-critical, 47–49
motivation factors, 354
negotiating, 159
planning, 357
potential candidates, 359
qualities, 359
review, 361–62
types of, 48
uses, 47
Small computer systems interface. See SCSI
S/MIME, 19
ActiveX control, 321
OWA support, 320–21
SMTP
connectors, 369
gateways, 341
servers, 348
transport connection, 319
virtual servers, 330
Snapshots, 136–37
backup and restore, 4
defined, 136
technology, 227–32
technology, using, 175
technology illustration, 137
See also Clones
Soft recovery, 112–13
defined, 112
functioning of, 112–13
See also Recovery
Software
anomalies, 110–11
backup, selection criteria, 162–63
as downtime cause, 43–44
Software-based RAID, 205–8
Spam, 298, 300–301
antispam solution, 341
message estimates, 339
as scourge, 333
tracking, 339–41
traffic, 340
Spoofing, 302, 317–18
Storage
advanced functionality, 221–27
design, 52
design best practices, 61–62
design (Exchange 2000/2003), 235–39
design (Exchange clusters), 275–80
evolution, 91
logical, 52–54
monolithic approach, 53–54
network-based, 222
paradigms, 51–64
physical, 52–54
redefining, 54–57
single-instance, 64
visualization, 221
Storage area networks (SANs), 219–21
characteristics, 219
defined, 219
manageability, 220
management functionality, 220
shift to, 221
See also Storage technologies
Storage groups (SGs), 54
clustering and, 57
considerations, 60–64
database group management, 55
defined, 54
limitations, 276
multiple, 55
multiple, reasons for, 56–57
Storage technologies, 198–213, 380
basics, 199–213
data replication and mirroring, 222–25
Fibre Channel, 216–18
importance, 198–99
NAS, 232–35
overview, 214–39
SANs, 219–21
SCSI, 214
Streaming store (STM file), 59–60
content, 60
defined, 59
design best practice, 62
operations, 81
See also Database files
Stretched clusters, 224
Synchronous data replication, 222
System Monitor, 367, 369
data viewing in, 369
performance monitoring with, 370
thresholding alert, 373
See also Performance management
Systems Management Server (SMS), 372