List of Tables


Chapter 1: Has Anyone Seen My Mission-Critical Microsoft Exchange Server?

Table 1.1: The Cost of Downtime
Table 1.2: Availability—Exchange and Domino Compared Microsoft Exchange Lotus Notes/Domino
Table 1.3: Reliability and Downtime—24/7 (365 Days Per Year or 8,760 Hours)
Table 1.4: Reliability Measurement Formulas
Table 1.5: Comparing Performance Versus Capacity Scalability
Table 1.6: Built-in Security Mechanisms for Exchange Server
Table 1.7: Additional Suggested Readings for Microsoft Exchange Server

Chapter 2: Public Enemy #1: Exchange Downtime

Table 2.1: Downtime for Exchange and Domino Compared
Table 2.2: Impact of Downtime on an End-user Basis
Table 2.3: Service-Level Agreement Types
Table 2.4: Service-Level Agreement Examples

Chapter 3: The Heart of Exchange: Exchange Store Technology

Table 3.1: Reasons for Multiple Databases or Storage Groups
Table 3.2: Exchange Server Key Database Files
Table 3.3: Exchange Server 2000/2003 Storage Design Best Practices (continued)
Table 3.4: An Evolution of JET/ESE and Variants
Table 3.5: Exchange 2000/2003 Property Promotion Rules

Chapter 4: When Exchange Servers Fall Down

Table 4.1: Exchange Server 2000/2003 Recovery Planning Scenarios
Table 4.2: Qualities of a Great Caching Disk Controller
Table 4.3: Ensuring Active Directory Service Availability for Exchange

Chapter 5: Protecting and Recovering Exchange Data

Table 5.1: Exchange Server 2003 Backup Types
Table 5.2: Microsoft Knowledge Base Articles Discussion Snap/Clone Support for Previous Versions of Exchange Server
Table 5.3: Exchange 2003 Recovery Storage Group Usage Scenarios

Chapter 6: Exchange Server Disaster-Recovery Best Practices

Table 6.1: Typical Disaster-Recovery SLA for Exchange Deployments
Table 6.2: Recommended Backup Software Selection Criteria
Table 6.3: Recommended Backup Device/Media Selection Criteria
Table 6.4: Basic Backup Strategies for Exchange 2000/2003
Table 6.5: Sample Three-Tier e-Mail Policy for an Organization

Chapter 7: Mission-Critical Server and Storage Technologies

Table 7.1: Intel Processor/Architecture Information (as of June 2003)
Table 7.2: Comparing ECC with Advanced ECC Memory Protection
Table 7.3: I/O Bus Technology and Bandwidth
Table 7.4: Reliability Formulas
Table 7.5: Comparing Operational Versus Theoretical MTBF
Table 7.6: Comparison of the Five Original RAID Levels
Table 7.7: Comparison of RAID Levels beyond the Original Five Introduced in 1988
Table 7.8: Reliability Impact of RAID
Table 7.9: The Evolution of SCSI Specifications
Table 7.10: Comparison of SCSI Versus FC As a Storage Technology
Table 7.11: Data-Replication Technology Vendor Survey
Table 7.12: A Comparison of BCVClone Versus BCVSnap Technology
Table 7.13: Microsoft Support Knowledge Base Article References for Using BCVs with Exchange 5.5/2000
Table 7.14: Microsoft Knowledge Base NAS Reference Articles

Chapter 8: Leveraging Exchange Clusters

Table 8.1: Key Terminology for MSCS
Table 8.2: MSCS Components
Table 8.3: MSCS Resources and Information
Table 8.4: Exchange 2000 Cluster-Supported Services
Table 8.5: Exchange Cluster Monitoring and Memory-Management Improvements
Table 8.6: Exchange 2000 Cluster Permissions Model
Table 8.7: Exchange 2003 Cluster Supported Services
Table 8.8: Optimal Placement of Exchange Database Files (Performance Viewpoint)
Table 8.9: Exchange 2003 Cluster Design Scenarios
Table 8.10: Cluster IP Addressing and Naming
Table 8.11: Utilizing Mount Points for Exchange Clusters

Chapter 9: Locking Down Mission-Critical Exchange Servers

Table 9.1: Comparison of How Exchange 5.5 Objects Are Represented in the AD with Exchange 2000/2003
Table 9.2: AD Objects That Are Mail Disabled, Mail Enabled, or Mailbox Enabled
Table 9.3: Effective Permissions for Exchange Role-Based Administrators
Table 9.4: MSBSA Vulnerability Checks
Table 9.5: Exchange Back-End Server Policy Service Configuration
Table 9.6: Exchange OWA Server Policy Attributes
Table 9.7: Common Indicators of a Security Breach
Table 9.8: Categories of Intrusion-Detection Tools
Table 9.9: Basic Firewall Technologies
Table 9.10: Criteria for Selecting an Antivirus Solution
Table 9.11: Exchange 2003 Antispam Features

Chapter 10: Proactive Management for Mission-Critical Exchange Servers

Table 10.1: Qualities of SLAs
Table 10.2: Key Monitoring and Data-Collection Points for Server Subsystems
Table 10.3: Key Exchange Server Monitoring and Data-Collection Points
Table 10.4: Common Software and Hardware Configuration-Management Challenges
Table 10.5: Exchange 2000/2003 MP Monitoring Features

Appendix A: Supplemental Resources

Table A.1: Ports and Protocols for the Services in Windows/Exchange 2000/2003




Mission-Critical Microsoft Exchange 2003. Designing and Building Reliable Exchange Servers
Mission-Critical Microsoft Exchange 2003: Designing and Building Reliable Exchange Servers (HP Technologies)
ISBN: 155558294X
EAN: 2147483647
Year: 2003
Pages: 91
Authors: Jerry Cochran

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net