Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Z] ease of administration electronic break-ins, losing data from electronic discovery requests end-of-media (EOM) mark endian-independent format environments, protection levels, picking appropriate Exchange architecture automatic database maintenance checkpoint files circular logging Data Manipulation Language (DML) database structure ESE98 Extensible Storage Engine (ESE) Messaging Application Programming Interface (MAPI) Multipurpose Internet Mail Extensions (MIME) reserve logfiles single instance storage storage groups storage limits stores 2nd temporary files transaction logfiles transactions version store backups clone copy copy-on-write method daily differential Exchange-specific incremental methods normal (full) ntbackup offline (cold) online (hot) strategy streaming types verifying Volume Shadow Copy Service Windows-specific repair restore deleted items deleted mailboxes hard recovery mailbox or public folder stores ntbackup offline restore online database restore overview Recovery Storage Groups (RSGs) repair versus soft recovery verifying versus other databases exclude lists expansion, planning for |