Index_S


S

Scalability, 15–18

Active/Passive clustering, 277

capacity, 17

manifestation, 17–18

performance vs., 17

traditional view, 17

See also Four pillars

SCSI, 214–16

benefits, 215

connection limit, 216

drives, 214

specifications, 214, 216

specifications evolution, 215

vendors, 216

See also Storage technologies

Search tables, 65

Security, 18–19, 381

built-in mechanisms, 18

checklist, 315–16

enhancements, 318–21

Exchange servers, 316–48

general considerations, 316–18

increased focus on, 19

message content, 343–47

mobility, 321

network, 324–33

OWA, 319–21

problem, 19

putting together, 347–48

Windows services, 311–16

See also Four pillars

Security Accounts Manager (SAM), 304

Security Configuration Audit (SCA) tool, 312–13

analyzer, 313

defined, 313

Server architecture, 190–97

defined, 190

illustrated, 191

information, 192

I/O bus technology, 196–97

memory and memory bus technology, 193–96

processor and host bus technology, 190–93

Server Message Block (SMB), 87

Service-level agreements. See SLAs

Shared-nothing model, 247–49

defined, 247

shared-disk architecture comparison, 248

Single-instance storage, 64, 90–91

Single-item recovery, 120

Site replication service (SRS), 286

SLAs

accountability, 30

backup/restore, 53

cost and, 354

defined, 3553

development, 358–60

development process, 356

development team, 358, 360

disaster recovery, 159–61

establishing, 20–21, 353–62

examples, 48–49

external, 353

feedback, 361–62

fine-tuning, 361

forms, 47

four-step process, 356–62

functions provided by, 354–55

guidelines for establishing, 356

mission-critical, 47–49

motivation factors, 354

negotiating, 159

planning, 357

potential candidates, 359

qualities, 359

review, 361–62

types of, 48

uses, 47

Small computer systems interface. See SCSI

S/MIME, 19

ActiveX control, 321

OWA support, 320–21

SMTP

connectors, 369

gateways, 341

servers, 348

transport connection, 319

virtual servers, 330

Snapshots, 136–37

backup and restore, 4

defined, 136

technology, 227–32

technology, using, 175

technology illustration, 137

See also Clones

Soft recovery, 112–13

defined, 112

functioning of, 112–13

See also Recovery

Software

anomalies, 110–11

backup, selection criteria, 162–63

as downtime cause, 43–44

Software-based RAID, 205–8

Spam, 298, 300–301

antispam solution, 341

message estimates, 339

as scourge, 333

tracking, 339–41

traffic, 340

Spoofing, 302, 317–18

Storage

advanced functionality, 221–27

design, 52

design best practices, 61–62

design (Exchange 2000/2003), 235–39

design (Exchange clusters), 275–80

evolution, 91

logical, 52–54

monolithic approach, 53–54

network-based, 222

paradigms, 51–64

physical, 52–54

redefining, 54–57

single-instance, 64

visualization, 221

Storage area networks (SANs), 219–21

characteristics, 219

defined, 219

manageability, 220

management functionality, 220

shift to, 221

See also Storage technologies

Storage groups (SGs), 54

clustering and, 57

considerations, 60–64

database group management, 55

defined, 54

limitations, 276

multiple, 55

multiple, reasons for, 56–57

Storage technologies, 198–213, 380

basics, 199–213

data replication and mirroring, 222–25

Fibre Channel, 216–18

importance, 198–99

NAS, 232–35

overview, 214–39

SANs, 219–21

SCSI, 214

Streaming store (STM file), 59–60

content, 60

defined, 59

design best practice, 62

operations, 81

See also Database files

Stretched clusters, 224

Synchronous data replication, 222

System Monitor, 367, 369

data viewing in, 369

performance monitoring with, 370

thresholding alert, 373

See also Performance management

Systems Management Server (SMS), 372




Mission-Critical Microsoft Exchange 2003. Designing and Building Reliable Exchange Servers
Mission-Critical Microsoft Exchange 2003: Designing and Building Reliable Exchange Servers (HP Technologies)
ISBN: 155558294X
EAN: 2147483647
Year: 2003
Pages: 91
Authors: Jerry Cochran

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net