MS에서 Exchange Server 2010을 2009년 4월 15일(현지시간) 발표했습니다.
웹 친화형 익스체인지 제품이고, 최종버전은 올해말에 공개될 예정이지만, 오피스 2010버전은 2010년 초가 되어야
선보일 것 같아서 안정적으로 상용화가 되려면 시간이 조금 걸릴 듯 합니다.
2010년 상반기부터 업그레이드를 고려할 수 있다고 봐야 될 것 같습니다.
Microsoft에서는 메시징 및 커뮤니케이션을 통합메시징(Unified Communication)으로 무게를 두고 있어서, 기존의 흩어져 있던 Communication제품들을 하나로 묶어서 Microsoft UC 제품군으로 만들게 되었습니다. 그리고 Exchange, SharePoint, Communication 서버들이 기존의 Enterprise Servers제품군에서 Office 제품군으로 이동하게 됩니다. Exchange Server 를 제외하고는 앞에 모두 Office SharePoint Server, Office Communication Server와 같은 이름이 붙게 되었습니다.
내년초에 Windows 7과 함께 출시될 가능성이 높아지고 있습니다.
재미있는 점은 Beta버전이 한글버전도 같이 공개되었다는 점인데
아래 링크를 통하여 다운로드 받으실 수 있습니다.
중요 이 문서에서는 컴퓨터에서 보안 설정 수준을 낮추거나 보안 기능을 해제하는 방법에 대해 설명합니다. 특정 문제를 해결하기 위해 이와 같이 변경할 수 있습니다. 이렇게 변경하기 전에 특정 환경에서 이러한 문제 해결 방법을 사용하는 것과 관련된 위험을 평가하는 것이 좋습니다. 이 해결 방법을 사용하는 경우 적절한 시스템 보호 조치를 추가로 취하십시오. 경고 이 해결 방법으로 인해 컴퓨터나 네트워크가 악의 있는 사용자나 바이러스 같은 악의 있는 소프트웨어의 공격에 취약해질 수 있습니다. 이 해결 방법을 권장하지는 않지만 사용자 판단에 따라 해결 방법을 구현할 수 있도록 이에 대한 정보를 제공하고 있습니다. 이 해결 방법의 사용에 따른 모든 책임은 사용자에게 있습니다. 참고 바이러스 백신 프로그램은 컴퓨터를 바이러스로부터 보호하도록 설계되었습니다. 바이러스 백신 프로그램이 해제되었을 때 신뢰하지 않는 원본으로부터 파일을 다운로드하거나 열거나, 신뢰하지 않는 웹 사이트를 방문하거나, 전자 메일 첨부 파일을 열지 말아야 합니다.
컴퓨터 바이러스에 대한 자세한 정보는 Microsoft 기술 자료의 다음 문서를 참조하십시오.
129972 (http://support.microsoft.com/kb/129972/) 컴퓨터 바이러스: 설명, 예방 및 복구
요약
본 문서에서는 바이러스 백신 소프트웨어가 설치된 Microsoft Exchange Server 컴퓨터 문제 해결에 대한 권장 사항을 설명합니다.
추가정보
파일기반바이러스백신소프트웨어
Exchange 컴퓨터에 파일 기반 검색 바이러스 백신 소프트웨어를 설치할 수 있습니다. 그러나 Exchange 컴퓨터의 프로그램과 데이터베이스 파일에 대한 검색은 절대 실행하지 마십시오.
또한 Exchange 2000 서버의 IFS(설치 가능 파일 시스템) 드라이브(M 드라이브)에 대해서도 검색을 실행하지 마십시오. 이렇게 할 경우 바이러스에 대한 잘못된 보고서를 받을 수 있으며 파일을 치료하려고 시도하면 Exchange 2000 데이터베이스가 손상될 수 있습니다.
Exchange 2000에서 드라이브 M은 Exchange IFS를 위한 편리한 레이블입니다. Exchange IFS를 사용하면 Exchange 정보 저장소를 파일 시스템으로 보고 사용할 수 있습니다. 참고 M 드라이브는 M 이외의 문자를 사용할 수 있습니다. 이 드라이브는 일반적으로 M 드라이브로 참조되지만, 문자 M을 이미 사용 중이면 이 드라이브에는 다른 드라이브 문자가 사용됩니다. M 드라이브의 바이러스 백신 검색으로 인해 발생하는 문제에 대한 자세한 내용은 Microsoft 기술 자료의 다음 문서를 참조하십시오.
299046 (http://support.microsoft.com/kb/299046/) XADM: 일정 항목이 사용자 폴더에서 사라진다
상황에 따라 Exchange IFS에 추가 문제가 발생할 수 있습니다. 자세한 내용은 Microsoft 기술 자료의 다음 문서를 참조하십시오.
305145 (http://support.microsoft.com/kb/305145/) HOWTO: XADM: M 드라이브에서 IFS 매핑 제거
Exchange 컴퓨터에서 파일 기반 바이러스 검색 프로그램을 실행해야 하는 경우 예약된 검색과 실시간 검색에서 Exchange 관련 파일과 폴더를 제거하십시오. Exchange 2000 실행 파일의 파일 기반 검색은 지원됩니다. 중요 Exchange 데이터베이스, 로그, 임시 파일, IIS 시스템 파일 또는 IFS 드라이브(M 드라이브)에 대해서는 파일 기반 검색 소프트웨어를 실행하지 마십시오. 이러한 파일이 들어 있는 폴더를 검색하지 않도록 바이러스 백신 소프트웨어를 구성하십시오.
Exchange 컴퓨터의 운영 체제와 Exchange 프로그램 파일(Exchsrvr\Bin 폴더)에 대해서는 파일 기반 바이러스 백신 소프트웨어를 실행할 수 있지만 다음 폴더의 파일에 대해서는 파일 기반 바이러스 백신 소프트웨어를 실행하지 마십시오.
•Exchange 데이터베이스 및 로그 파일
•Exchange .mta 파일(기본 위치: \Exchsrvr\Mtadata)
•Exchange 메시지 추적 로그 파일(기본 위치: \Exchsrvr\Server_Name.log).
•가상 서버 폴더(기본 위치: \Exchsrvr\Mailroot)
•SRS(사이트 복제 서비스) 파일(기본 위치: \Exchsrvr\Srsdata)
•IIS(인터넷 정보 서비스) 시스템 파일(기본 위치: \%SystemRoot%\System32\Inetsrv)
•인터넷 메일 커넥터 파일(기본 위치: \Exchsrvr\IMCData)
•메시지 변환에 사용된 스트리밍 임시 파일을 저장하는 데 사용되는 작업 폴더. 기본적으로 이 작업 폴더는 \Exchsrvr\MDBData에 있습니다.
•Eseutil.exe 같은 오프라인 유지 관리 유틸리티에 함께 사용되는 임시 폴더. 기본적으로 이 폴더는 .exe 파일이 실행되는 위치이지만 유틸리티를 실행할 때 이 위치를 구성할 수 있습니다.
다음 폴더에 대해서는 파일 기반 검색을 실행할 수 있습니다.
•Exchsrvr\Address
•Exchsrvr\Bin
•Exchsrvr\Exchweb
•Exchsrvr\Res
•Exchsrvr\Schema
운영 체제와 Exchange를 업그레이드하는 동안 임시로 파일 기반 검색 소프트웨어를 해제하십시오. 여기에는 Exchange 또는 운영 체제의 새로운 버전으로 업그레이드하고 Exchange 또는 운영 체제 수정 프로그램이나 서비스 팩을 적용하는 것이 포함됩니다.
Exchange 또는 운영 체제 제품을 업그레이드하거나 서비스 팩 또는 수정 프로그램을 적용하는 경우, 업데이트나 업그레이드를 수행하기 전에 타사 서비스, 하드웨어 공급업체 및 운영 체제 모니터, 에이전트 또는 Exchange 모니터를 모두 중지하고 해제하는 것이 일반적입니다. 또한 성능 모니터, Microsoft나 타사 백업 프로그램 및 Microsoft SNMP(Simple Network Management Protocol)를 중지하고 해제하십시오. 그런 다음 업그레이드나 수정 프로그램을 적용하기 전에 Exchange 컴퓨터를 다시 시작하십시오. 이렇게 하면 업데이트 프로세스가 액세스해야 하는 파일이 잠기는 것이 방지됩니다. 중요 이 절차에는 Exchange나 운영 체제의 모든 버전을 업그레이드하기 전과 Exchange나 운영 체제 서비스 팩 또는 수정 프로그램을 적용하기 전에 파일 기반 검색 바이러스 백신 소프트웨어를 비롯한 모든 바이러스 백신 프로그램을 중지하고 해제하는 것도 포함됩니다.
Exchange 정보저장소검색소프트웨어
Microsoft는 다른 제조업체가 정보 저장소를 검색하는 바이러스 백신 프로그램을 작성하는 데 사용할 수 있는 API(응용 프로그래밍 인터페이스)를 제공합니다. 이런 종류의 소프트웨어가 Exchange 컴퓨터에서 실행되고 있고 문제가 발생하는 경우 문제를 조사하고 일반적인 문제 해결 절차를 수행하십시오. 이러한 절차를 수행해도 문제가 해결되지 않으면 바이러스 백신 소프트웨어를 임시로 해제하거나 제거하여 문제의 원인인지 확인하십시오. 바이러스 백신 소프트웨어가 문제의 원인이 아니면 바이러스 백신 소프트웨어를 다시 설정할 수 있습니다.
바이러스 백신 소프트웨어를 해제하거나 제거한 후에 문제가 발생하지 않는 경우 바이러스 백신 소프트웨어 제조업체에 최신 업데이트가 있는지 문의하십시오. 소프트웨어의 최신 업데이트로도 문제가 해결되지 않으면 바이러스 백신 소프트웨어 제조업체 및 Microsoft와 계속 협력하여 문제 해결 방법을 찾으십시오.
자세한 내용은 Microsoft 기술 자료의 다음 문서를 참조하십시오.
241855 (http://support.microsoft.com/kb/241855/) 이벤트 ID 145가 발생하면서 정보 저장소가 시작되지 않는다
이 문서에 나와 있는 다른 공급업체 제품은 Microsoft와 무관한 회사에서 제조한 것입니다. Microsoft는 이들 제품의 성능이나 신뢰성에 관하여 명시적이든 묵시적이든 어떠한 보증도 하지 않습니다.
파일 기반 검색 프로그램에서 검사점(.chk) 파일이 포함된 폴더를 제외합니다. 참고Exchange 데이터베이스와 로그 파일을 새 위치로 이동하고 해당 폴더를 제외하는 경우에도 .chk 파일이 계속 검색될 수 있습니다. .chk 파일을 검색하는 경우에 발생할 수 있는 문제에 대한 자세한 내용은 Microsoft 기술 자료의 다음 문서를 참조하십시오.
253111 (http://support.microsoft.com/kb/253111/) Exchange Server 데이터베이스 서비스에 자체 .edb 파일이나 .chk 파일에 대한 쓰기 액세스가 거부되면 오류 이벤트가 기록된다
176239 (http://support.microsoft.com/kb/176239/) XADM: 데이터베이스가 시작되지 않는다. 순환 로깅이 로그 파일을 너무 빨리 삭제했다
Unable to resend the message. The nondelivery report does not contain sufficient information about the original message. To resend the message, open it in your Sent Items folder, click the Actions menu, and click "Resend this message".
Option to strip attachments for messages that generate an NDR
KB문서
Article ID : 308303
Last Review : February 28, 2007
Revision : 2.2
This article was previously published under Q308303
Important This article contains information about how to modify the registry. Make sure to back up the registry before you modify it. Make sure that you know how to restore the registry if a problem occurs. For more information about how to back up, restore, and modify the registry, click the following article number to view the article in the Microsoft Knowledge Base:
256986 (http://support.microsoft.com/kb/256986/) Description of the Microsoft Windows registry
SUMMARY
This article describes an option that you can enable on a computer that is running Exchange 2000 Service Pack 2 (SP2) or later to remove attachments if a message cannot be delivered. For more information about the latest service pack for Microsoft Exchange 2000 Server, click the following article number to view the article in the Microsoft Knowledge Base:
301378 (http://support.microsoft.com/kb/301378/) How to obtain the latest Exchange 2000 Server service pack
Note Starting with Microsoft Exchange Server 2003 Service Pack 1 (SP1), Exchange Server will automatically remove an attachment that is 10 megabytes (MB) from DSN messages that are generated by the SMTP engine. The registry key that is specified in the "More Information" section can be used to modify the default behavior.
MORE INFORMATION
If you enable this option, you can save server and network resources. However, there are drawbacks to this implementation of Simple Mail Transfer Protocol (SMTP) attachment stripping. If you enable this option to strip the attachments from the non-delivery report (NDR), the details that are necessary to display the notification in the preview pane are also stripped, and the originator of the message cannot use the Send Again option. If the originator of the message tries to use the Send Again option from the NDR, the originator of the message receives the following error message:
Unable to resend the message. The nondelivery report does not contain sufficient information about the original message. To resend the message, open it in your Sent Items folder, click the Actions menu, and click "Resend this message".
However, the originator of the message cannot resend the message, even by using the method in the error message.
To enable this option, you need to edit the registry. Warning Serious problems might occur if you modify the registry incorrectly by using Registry Editor or by using another method. These problems might require that you reinstall your operating system. Microsoft cannot guarantee that these problems can be solved. Modify the registry at your own risk.
To enable this option:
1.Start Registry Editor (Regedt32.exe).
2.Locate and click the following key in the registry:
3.On the Edit menu, click Add Key, add the following registry key, and then click OK:
Key name: Queuing
Class: Leave the class blank
4.Click the Queuing registry key that you just added. On the Edit menu, click Add Value, and then add the following registry value:
Value name: MaxDSNSize
Data type: REG_DWORD
Radix: Decimal
Value data: This value is the size limit in bytes; messages that are larger than this value that generate an NDR do not return attachments or full message properties.
5.Close Registry Editor.
You must restart the SMTP service for this registry change to take effect.
APPLIES TO
•Microsoft Exchange 2000 Server Standard Edition
•Microsoft Exchange Server 2003 Enterprise Edition
OWA(Outlook Web Access) 관리 도구에서는 관리자가 조정할 수 있는 모든 OWA 설정에 대해 웹 기반 UI를 제공하고 도메인의 모든 서버 목록을 제공하며 이 관리 도구를 사용할 경우 모든 프런트 엔드 및 백 엔드 서버에서 OWA 설정을 관리할 수 있습니다. 이 도구는 서버 레지스트리에 설정을 올바르게 기록하도록 해 주며 구성할 수 있는 모든 기능에 대한 인라인 설명서를 제공합니다.
Regedit를 수정할 필요 없이 OWA Admin이 웹 기반 폼으로 손쉽게 적용이 가능합니다.
테마 및 정크 메일, 자동 서명, 주소록, 보안, 등 OWA기능을 손쉽게 변경할 수 있습니다.
Main 화면
서버기능 수정
테마적용
설치 요구 사항
Exchange 2003용 Outlook Web Access 웹 관리 도구(OWA Admin)는 IIS(Internet Information Server), .Net framework 버전 1.1, ASP.Net이 설치된 시스템에 설치해야 합니다.
OWA Admin 도구에는 SSL 연결이 필요합니다.이 SSL 연결은 인증을 활성화하고 Exchange 서버에 원격으로 액세스하기 위해 필요합니다.OWA Admin을 설치하는 시스템에 SSL 인증서가 없는 경우 OWA Admin 설치 프로그램은 테스트 인증서를 자동으로 만들고 구성합니다.
설치 권장 사항
OWA Admin 도구는 원격 서버에서 OWA 설정을 관리하기 위해 만들어졌습니다.Exchange 서버가 아닌 별도의 워크스테이션에 OWA Admin 도구를 설치하는 것이 좋습니다.이렇게 하면 Exchange 네트워크에 보안 위험을 줄일 수 있습니다.또한 사용자의 회사 보안벽 DMZ 영역에 있는 Exchange 프런트 엔드 서버에 이 도구를 설치하지 않는 것이 좋습니다.원격 서버에 연결하여 관리할 때 OWA Admin 도구는Windows Management Interface (WMI) 포트의 영향을 받는데이 포트는 일반적으로 방화벽에서는 열리지 않기 때문입니다.
알려진 문제점
Windows 2000 Server .Net framework 메모리 사용
OWA Admin 도구를 Windows 2000 Server에 설치하는 경우 시스템을 다시 시작하지 않으면 .Net framework가 자동으로 언로드되지 않고 일부 메모리가 해제되지 않는다는 점에 유의하십시오.Windows 2003 Server에서는 사용하지 않을 경우 잠시 후 IIS가 자동으로 모든 .Net framework 응용 프로그램 메모리를 해제합니다.
브라우저 지원
OWA Admin 도구는 Microsoft Internet Explorer 버전 6.0 Service Pack 1에서만 테스트되고 지원됩니다.다른 브라우저에서 작동하더라도 Microsoft에서는 다른 브라우저에 관련된 문제점을 해결하거나 지원하지 않습니다.
In order to assist customers in designing their storage layout for Exchange 2007, we have put together a calculator that focuses on driving the storage requirements (I/O performance and capacity) and what the optimal LUN layout should be based on a set of input factors.
Exchange 2007 사용자 DB(Storage) Size 계산을 하는 Excel Sheet입니다.
EDIT: This post has been updated on 9/23/08 for the new version of storage calculator. For the list of latest major changes, please see THIS.
In order to assist customers in designing their storage layout for Exchange 2007, we have put together a calculator that focuses on driving the storage requirements (I/O performance and capacity) and what the optimal LUN layout should be based on a set of input factors.
The calculator uses all the recommendations outlined in the following articles, and thus we recommend you read them before utilizing the calculator:
The calculator is broken out into the following sections (worksheets):
Input
Storage Requirements
LUN Requirements
Backup Requirements
Log Replication Requirements
Storage Design
Important: The data points provided in the calculator are an example configuration. As such any data points entered into the Input worksheet are specific to that particular configuration and do not apply for other configurations. Please ensure you are using the correct data points for your design.
This section is where you enter in all the relevant information regarding your design, so that the calculator can generate what you need in order to achieve your design.
Note: There are many input factors that need to be accounted for before you can design your solution. Each input factor is briefly listed below; there are additional notes within the calculator that explain them in more detail.
Step 1 - Server Configuration
Exchange Server Configuration
Which version of Exchange 2007 are you using? Depending on the version you select (RTM or SP1+), there is a different amount of RAM required per storage group. Exchange 2007 SP1 and later requires less RAM per storage group, than the RTM version does due to changes in the Jet architecture.
How many mailbox servers are you going to deploy? If you enter more than a single server, the calculator will evenly distribute the user mailboxes across the total number of mailbox servers and make performance and capacity recommendations for each server, as well as, for the entire environment.
What High Availability configuration are you deploying? You can select none, LCR, CCR, or SCC.
Are you using Content Indexing? By default this is enabled in Exchange 2007 and requires an additional 5% capacity per storage group.
Are you going to deploy a Dedicated Restore LUN? A dedicated restore LUN is used as a staging point for the restoration of data or could be used during maintenance activities; if one is selected then additional capacity will not be factored into each database LUN.
What percentage of disk space do you want to ensure remains free on the LUN? Most operations management programs have capacity thresholds that alert when a LUN is more than 80% utilized. This value allows you to ensure that each LUN has a certain percentage of disk space available so that the LUN is not designed and implemented at maximum capacity.
Exchange Data Configuration
What will be the deleted item retention? By default in Exchange 2007, the deleted item retention per database is 14 days.
What will be the Data Overhead Factor? Microsoft recommends using 20% to account for any extraneous growth that may occur.
How many mailboxes do you move per week? In terms of transactions, you have to take into account how many mailboxes you will either be moving to this server or within this server, as transactions will always get generated in the target storage group.
IOPS Configuration
What will be the I/O Overhead Factor? Microsoft recommends using 20% to ensure adequate headroom in terms of I/O to allow for abnormal spikes in I/O that may occur from to time.
Additional IOPS Requirements / Server? In other words, what additional I/O requirements do you need to factor into the solution for each mailbox server (e.g. certain third-party mobility products have additional I/O requirements that need to be factored into any design if they are being utilized)? This may require additional testing by comparing a baseline system against a system that has the I/O generating application installed and running.
Standby Continuous Replication Configuration
Are you going to deploy Standby Continuous Replication (SCR) with this server? If so, choose the number of SCR targets you will have for each source mailbox server (note: if you do choose to have an SCR target, the calculator assumes that all storage groups on the source server will have an SCR target).
What will be the SCR target's high availability configuration? You can select either "Single-Node" or "Match Source Configuration". If you choose single-node you are either deploying 2-node source clusters (CCR or SCC) and want only a single node to be the standby cluster or you are deploying standalone mailbox servers (or LCR); the other option for "Single-Node" is if you are performing database portability instead of server recovery. If you choose "Match Source Configuration" you are performing server recovery to retain the same level of availability as the source environment.
What will be the SCR log replay delay? This parameter is used to specify the amount of time that the Microsoft Exchange Replication service should wait before replaying log files that have been copied to the SCR target computer. The default is 1 day (86400 seconds) and you can configure up to 7 days. Or you can disable log replay delay by setting the input to 0, in which case the replication service will delay the last 50 logs from being replayed into the SCR target database. The value you specify here will influence the log capacity requirements.
What will be the SCR log truncation delay? This parameter is used to specify the amount of time that the Microsoft Exchange Replication service should wait before truncating log files that have been copied to the SCR target computer and replayed into the copy of the database. The time period begins after the log has been successfully replayed into the copy of the database. The maximum allowable setting for this value is 7 days. The minimum allowable setting is 0 seconds, although setting this value to 0 seconds effectively eliminates any delay in log truncation activity.
Database Configuration
Do you want to follow Microsoft's recommendations regarding maximum database size? Microsoft recommends that the database size should not be more than 100GB in size when continuous replication is not in use and no more than 200GB when continuous replication is in use. This is by no means a hard limit, but a recommendation based on the impact database size has to recovery times. If you want to follow Microsoft's recommendation, then select Yes. Otherwise, select No.
Do you want to specify a custom Maximum Database Size? If you selected No for the previous field, then you need to enter in a custom maximum database size.
Step 2 - Mailbox Configuration
The calculator provides the capability to design a storage solution that can support three different tiers (or classes) of mailbox users.
Mailbox Configuration
How many mailboxes will you deploy on the server or in the environment? If deploying a single server environment, this is how many mailboxes you will deploy on this server. If you are deploying multiple servers, then this is how many mailboxes you will deploy in the environment. For example, if you choose to deploy 5 servers, and want 3000 mailboxes per server, then enter 15000 here.
What is the solution's projected growth in terms of number of mailboxes over its lifecycle? Enter in the total percentage by which you believe the number of mailboxes will grow during the solution's lifecycle. For example, if you believe the solution will increase by 30% and you are starting out with 1000 mailboxes, then at the end of the lifecycle, the solution will have 1300 mailboxes. The calculator will utilize the projected growth plus the number of mailboxes to ensure that the capacity and performance requirements can be sustained throughout the solution's lifecycle.
How much mail do the users send and receive per day on average? The usage profiles found here are based on the work done around the memory and processor scalability requirements.
What is the average message size? For most customers the average message size is around 50KB.
What will be the prohibit send & receive mailbox size limit? If you want to adequately control your capacity requirements, you need to set a hard mailbox size limit (prohibit send and receive) for the majority of your users.
Predict IOPS Value? This question asks whether you want to override the calculator in determining the IOPS / mailbox value. By default the calculator will predict the IOPS / mailbox value based on the number of messages per mailbox, the user memory profile, and in what Outlook mode the mailboxes are operating. For some customers that want to design toward a specific I/O profile, this option will not be viable. Therefore, if you want to design toward a specific I/O profile, select No to the "Override IOPS Calculation" question.
IOPS / Mailbox? Only enter a value in this field if you selected "No" to the "Predict IOPS Value" question.
What will be the database read:write ratio? Only adjust this value if you selected "No" to the "Predict IOPS Value" parameter. When IOPS prediction is enabled, the calculator will calculate the read:write ratio based on the message profile and the Outlook mode in use.
In what Outlook mode will the majority of the clients operate? Select either Online or Cached Mode depending on how the majority of your users operate (>75%).
Client Configuration
What will be the user concurrency? Typically most customers should design toward 100% concurrency.
Step 3 - Backup Configuration
Backup Configuration
What backup methodology will be used to backup the solution? Choose Hardware VSS Backup/Restore, Software VSS Backup/Restore, Streaming, or VSS Backup Only. The backup methodology will affect the LUN design.
What will be the backup frequency? You can choose Daily Full, Weekly Full with Daily Differential, or Weekly Full with Daily Incremental. The backup frequency will affect the LUN design and the disk space requirements (e.g. if performing daily differentials, then you need to account for 7 days of log generation in your capacity design).
What is the streaming backup rate in MB/s for your environment? Enter in the rate at which you can backup your Exchange data when performing a streaming (online) backup.
What is the streaming restore rate in MB/s for your environment? Enter in the rate at which you can restore your Exchange data when performing a streaming (online) restore.
How many times can you operate without log truncation? Select how many times you can survive without a full backup or an incremental backup. For example, if you are a performing weekly full backup and daily differential backups, the only time log truncation occurs is during the full backup. If the full backup fails, then you have to wait an entire week to perform another full backup or perform an emergency full backup. This parameter allows you to ensure that you have enough capacity to not have to perform an immediate full backup.
Step 4 - Replication Requirements
The data for this section will help determine the appropriate log bandwidth requirements for both geographically dispersed CCR and SCR configurations.
Log Replication Configuration
How many transaction logs are generated for each hour in the day? Enter in the number of transaction logs that are generated for each hour in the day.
Now you may be wondering how you can collect this data. We've written a simple VBS script that will collect all files in a folder and output it to a log file. You can use Task Scheduler to execute this script at certain intervals in the day (e.g. every 15 minutes). Once you have generated the log file for a 24 hour period, you can import it into Excel, massage the data (i.e. remove duplicate entries) and determine how many logs are generated for each hour. If you do this for each storage group, you will be able to determine your log generation rate for each hour in the day. This script is named collectlogs.vbsrename (just rename it to collectlogs.vbs) and you can find it here:
What type of network link will you be using between the servers? Select the appropriate network link you will be using between the two nodes in the geographically dispersed cluster or between the SCR source and SCR targets.
What is the latency on the network link? Enter in the latency (in milliseconds) that exists on the network link.
How can you survive a network outage? When a network outage occurs, log replication cannot occur. As a result, the copy queue length will increase on the source; in addition, log truncation cannot occur on the source. For geographically dispersed CCR or remote SCR deployments, network outages can seriously affect the solution's usefulness. If the outage is too long, log capacity on the source may become compromised and as result, a manual log truncation event must occur. Once that happens, the remote copies must be reseeded. The Network Failure Tolerance parameter ensures there is enough capacity on the log LUNs to ensure that you can survive an excessive network outage.
Recovery Configuration
What is your Recovery Point Objective? Enter in the recovery point objective (RPO) for which you are designing; this will help determine the log replication throughput requirements necessary for the SCR targets.
Storage Requirements
This section deals with outputting the I/O performance and capacity storage requirements based on the input factors entered into the calculator.
Calculations
The Calculations Pane performs all the calculations based on the input factors and outputs the key calculations into the Results Pane. For this blog, I will not delve into the specifics of the calculations, but feel free to review them within the calculator.
Results
Based on the above input factors the calculator will recommend the following settings.
Number of Servers & Data Copies
The Number of Servers and Data Copies table will provide you with
The Number of Mailbox Servers that will exist in your environment. This value is based on the Number of Exchange Mailbox Servers that you entered in the Input section.
The Number of SCR Target Servers. This value is based on the Number of Exchange Mailbox Servers and the Number of SCR Targets / Source Server that you entered in the Input section. For SCR targets, it is assumed that if you are utilizing CCR as the source and you are matching the source HA configuration for the SCR target, then you will be replicating the storage groups to both nodes of the SCR standby cluster.
The Number of Data Copies value will tell you how many copies of the data you will have. For example if you selected LCR or CCR, you will have at least 2 copies (you could have more if you specified a number of SCR targets). For SCR targets, it is assumed that if you are utilizing CCR as the source and you are matching the source HA configuration for the SCR target, then you will be replicating the storage groups to both nodes of the SCR standby cluster.
User Mailbox Configuration
The Mailbox Configuration table will provide you with
The Number of Mailboxes that you entered in the Input section (this value will include the projected growth).
The Mailbox Size is the actual mailbox size on disk that factors in the prohibit send/receive limit, the number of messages the user sends/receives per day, the deleted item retention window, and the average database daily churn per mailbox. It is important to note that the Mailbox size on disk is actually higher than your mailbox size limit; this is to be expected.
The Database Cache / Mailbox value is the necessary amount of RAM per mailbox that is needed to increase the database cache so that the number of database reads can be reduced.
The Transaction Logs Generated / Mailbox value is based on the message profile selected and the average message size and indicates how many transaction logs will be generated per mailbox.
The IOPS / Mailbox value is either the calculated IOPS / Mailbox value that is based on the number of messages per mailbox, the user memory profile, in what Outlook mode the mailboxes are operating. If you had chosen to enter in a specific IOPS / mailbox value rather than allowing the calculator determining the value based on the above requirements, then this value will be that custom value.
Solution Configuration
The Solution Configuration table will provide you with
The Recommended RAM Configuration for the mailbox server. This is the amount of RAM needed to support the number of databases required, in addition to, the number of mailboxes based on their memory profile.
The Recommended Number of Databases is the calculated number of databases required to support the mailbox population. This number can be used with the DPM 2007 Storage Calculator. Also, if you selected to have multiple mailbox servers, the Total for all Servers column, will output the total number of storage groups for all mailbox servers.
The Recommended Number of Mailboxes / Database is the calculated number of mailboxes per database ensuring that the database size does not go above the recommended size limit (for non-Continuous Replication (CR) systems 100GB, for CR systems 200GB).
The Number of Tier-x Mailboxes / Database provides a breakdown of how many mailboxes from each mailbox tier will be stored within a database.
The Total Number of Mailboxes outlines how many mailboxes will reside on each server, as well as, the total number of mailboxes that will exist within the environment if you selected to have multiple mailbox servers.
Transaction Log Requirements
The The Transaction Log Requirements table will provide you with
The User Transaction Logs Generated / Day indicates how many transaction logs will be generated during the day for the server. The Total for all Servers column outputs the total number of user transaction logs generated across all mailbox servers.
The Average Mailbox Move Transaction Logs Generated / Day indicates how many transaction logs will be generated during the day for the server. This number is an assumption and assumes that an equal percentage of mailboxes will be moved each day, as opposed to moving all mailboxes on the same day. The Total for all Servers column outputs the average move mailbox transaction logs generated across all mailbox servers.
The Average Transaction Logs Generated / Day is the total number of transaction logs that are generated per day on the server (includes user generated logs and mailbox move generated logs). The Total for all Servers column outputs the average number of transaction logs generated across all mailbox servers.
The User Transaction Logs Generated / SG / Day indicates how many transaction logs will be generated during the day for each storage group.
The Average Mailbox Move Transaction Logs Generated / SG / Day indicates how many transaction logs will be generated during the day for each storage group. This number is an assumption and assumes that an equal percentage of mailboxes will be moved each day, as opposed to moving all mailboxes on the same day.
The Average Transaction Logs Generated / SG / Day is the total number of transaction logs that are generated per day for a storage group on the server (includes user generated logs and mailbox move generated logs). This number can be used with the DPM 2007 Storage Calculator.
Disk Space & Performance Requirements
The Disk Space & Performance Requirements table will provide you with
The Total Database Disk Space Required/ Replica is the amount of space required to support the database infrastructure for each replica that exists. This value is derived from the mailbox size on disk, the data overhead factor, whether a dedicated restore LUN is available, and the use of content indexing. The Total for all Mailbox Servers column outputs the total database disk space required for all mailbox servers. The Total for all SCR Servers column outputs the total database disk space required for all SCR target servers.
The Total Log Disk Space Required/ Replica is the amount of space required to support the log infrastructure for each replica that exists. This value takes into account the number of mailboxes moved per week (assumes worst case and that all mailboxes are moved on the same day), the type of backup frequency in use, the number of days that can be tolerated without log truncation and the number of transaction logs generated per day. This number can be used with the DPM 2007 Storage Calculator. The Total for all Mailbox Servers column outputs the total log disk space required for all mailbox servers. The Total for all SCR Servers column outputs the total log disk space required for all SCR target servers.
The Total Database LUN Space Required/ Replica is the LUN size required to support the database infrastructure for each replica that exists. The Total for all Mailbox Servers column outputs the database LUN disk space required for all mailbox servers. The Total for all SCR Servers column outputs the database LUN disk space required for all SCR target servers.
The Total Log LUN Space Required / Replica is the LUN size required to support the log infrastructure for each replica that exists. The Total for all Mailbox Servers column outputs the log LUN disk space required for all mailbox servers. The Total for all SCR Servers column outputs the total Restore LUN disk space required for all SCR target servers..
The Restore LUN Size / Node is the amount of space needed to support a restore LUN if the option was selected in the Input Factor section; this will include space for up to 7 databases and 7 transaction log sets. If CCR is chosen as the continuous replication solution, then a Restore LUN will be provisioned for each node in the cluster. If there are SCR targets, then you will also need to provision a restore LUN on each SCR target server. The Total for all Mailbox Servers column outputs the log LUN disk space required for all mailbox servers. The Total for all SCR Servers column outputs the total Restore LUN disk space required for all SCR target servers.
The Required Database IOPS is the amount of read and write host I/O the database disk set must sustain during peak load. The Total for all Mailbox Servers column outputs the total database IOPS required for all mailbox servers. The Total for all SCR Servers column outputs the total Restore LUN disk space required for all SCR target servers.
The Required Log IOPS is the amount of read and write host I/O that will occur against the transaction log disk set. The Total for all Mailbox Servers column outputs the total database IOPS required for all mailbox servers. The Total for all SCR Servers column outputs the total Restore LUN disk space required for all SCR target servers.
LUN Requirements
The LUN Requirements section is really a continuation of the Storage Requirements section. It outlines what we believe is the appropriate LUN design based on the input factors and the analysis performed in the previous section.
Note: The term LUN utilized in the calculator refers only the representation of the disk that is exposed to the host operating system. It does not define the disk configuration.
LUN Design
The LUN Design highlights the LUN architecture chosen for this server solution. The architecture is derived from the backup type and frequency that was chosen in the Storage Requirements section.
If you selected to perform a weekly full backup and are not using hardware-based VSS as a backup solution, then we will recommend the 2 LUNs / Backup Set approach. This approach places the storage group backup set on the same log and db LUN. This can reduce the number of LUNs on the server. For example, if you have 14 databases, the calculator will recommend that SG1-7 be grouped together on 2 LUNs; this becomes the backup set. SG8-14 will be grouped together on another 2 LUNs to become a second backup set.
If you selected to use hardware VSS as a backup method or are performing daily full backups, then we recommend the 2 LUNs / Storage Group approach. This approach places each storage group set on its own set of LUNs.
LUN Configuration
The LUN Configuration table highlights the number of databases that should be placed on a single LUN. This is derived from LUN Architecture model.
This section also documents how many LUNs will be required for the entire solution, broken out by Database and Log sets (remember continuous replication will require an additional number of LUNs), and the number of restore LUNs for both the source, replica, and SCR targets.
Database Configuration
The Database Configuration table outlines how many databases are required, the number of mailboxes per database, the size of each database, and the transaction log size required for each database.
SG LUN Design
The SG LUN Design table outlines the physical LUN layout and follows the recommended number of storage groups per LUN approach based on the LUN Architecture model. It also documents the LUN size required to support layout (this is where we factor in the additional capacity for content indexing, the LUN Free Space Percentage, and whether you are using a Restore LUN), as well as the transaction log LUN.
Backup Requirements
The Backup Requirements section is really a continuation of the Storage Requirements section. It outlines what we believe is the appropriate backup design based on the input factors and the analysis performed in the previous sections.
Streaming Backup Window Requirements
If you selected to utilize a streaming backup methodology, then the Streaming Backup Window Requirements section will provide you with:
The Full Backup Window / SG is the amount of time it will take to back up a single storage group utilizing a streaming backup application by taking into account the calculated database size and the backup rate. You should validate this metric against your Service Level Agreements to determine if it is acceptable.
The Incremental or Differential backup Window / SG is the amount of time it will take to perform an incremental or differential streaming backup for a single storage group and is based on the number of transaction logs that are generated per day and the backup rate.
Streaming Restore Window Requirements
If you selected to utilize a streaming backup methodology, then the Streaming Restore Window Requirements section will provide you with:
The Full Restore Window / SG is the amount of time it will take to restore a single storage group utilizing a streaming restore process by taking into account the calculated database size and the restore rate. You should validate this metric against your Service Level Agreements to determine if it is acceptable.
The Incremental or Differential Restore Window / SG is the amount of time it will take to perform an incremental or differential streaming restore for a single storage group and is based on the number of transaction logs that are generated per day and the restore rate.
Backup Configuration
The Backup Configuration table outlines the number of databases that will be placed within a single LUN and the type of backup methodology and frequency in which the backups will occur.
Backup Frequency Configuration
The Backup Frequency Configuration section will provide you with an outline on how you should perform the backups for each server, utilizing either a daily full backup or weekly full backup frequency.
Log Replication Requirements
The Log Replication Requirements section is another continuation of the Storage Requirements section. It outlines what we believe is the throughput required to replicate the transaction logs for SCR targets or a geographically dispersed CCR scenario. Please note that if you selected to have multiple mailbox servers, then the data outputted in this section represents all mailbox servers.
Log Replication Throughput Requirements
The Log Replication Throughput Requirements table will provide you with
The Transaction Logs Generated / Day is the amount of logs that will be generated for the entire day (includes user generated logs and mailbox move generated logs).
The Geographically Dispersed CCR Throughput Required / CMS is the throughput required to sustain a single geographically dispersed cluster's log generation. This value is based on the peak log generation hour.
The Geographically Dispersed CCR Throughput Required is the throughput required to sustain all geographically dispersed clusters' log generation. This value is based on the peak log generation hour.
The SCR Throughput Required SCR Target / Source is the throughput required to sustain log replication to a single SCR target from a single source mailbox server. This value is based on the recovery point objective. This model does not assume that the peak hours are contiguous. The effect is that you can modify this to have peak hours at, 8am and 4pm, and the resulting bandwidth requirement will assume that you can take the time in between 8 and 4 to catch up within the specified RPO.
The Total SCR Throughput Required is the total throughput required to sustain log replication to all SCR targets from all source mailbox servers.
Chosen Network Link Suitability
The Chosen Network Link Suitability table will dictate whether the chosen network link has sufficient capacity to sustain geographically dispersed CCR replication and/or SCR replication. If the network link cannot sustain the log replication traffic, then you will need to either upgrade the network link to the recommended network link throughput, or adjust the design appropriately.
Recommended Network Link
The Recommended Network Link table recommends an appropriate network link if the chosen network link does not have sufficient capacity to sustain log replication for geographically dispersed CCR and SCR solutions.
TCP/IP Settings for Geographically Dispersed CCR
The TCP/IP Settings for Geographically Dispersed CCR table outlines the custom TCPWindowSize and TCP1323Opts values you should deploy on the source and target server (assuming both source and target are Windows Server 2003) to improve the number of logs that can be replicated per second. This value is determined based on the network link (either the chosen network link if it is acceptable, or the recommended network link) and its latency.
TCP/IP Settings for SCR
The TCP/IP Settings for SCR table outlines the custom TCPWindowSize and TCP1323Opts values you should deploy on the source and target server (assuming both source and target are Windows Server 2003) to improve the number of logs that can be replicated per second. This value is determined based on the network link (either the chosen network link if it is acceptable, or the recommended network link) and its latency. Please note that in the SCR target replication scenario, the recommendation assumes that all SCR targets will replicate over the same network link.
Note: the Network Link recommendations do not take into account database seeding or any other data that may also utilize the link.
Storage Design
The Storage Design worksheet is designed to take the data collected from the Input worksheet and Storage Requirements worksheet and help you determine the number of physical disks needed to support the databases, transaction logs, and Restore LUN configurations.
Storage Design Input Factors
In order to determine the physical disk requirements, you must enter in some basic information about your storage solution.
Step 1 - RAID Configuration
RAID Parity Configuration
For the RAID Parity Configuration table you need to select the type of building block your storage solution utilizes. For example, some storage vendors build the underlying storage in sets of data+parity (d+p) groups. A RAID-5 3+1 configuration means that 3 disks will be used for capacity and 1 disk will be used for parity, even though parity is distributed across all the disks. So if you had a capacity requirement that would utilize 15 disks, then you would need to deploy 5 3+1 groups to build that RAID-5 array.
RAID-1/0 supports 1d+1p, 2d+2p, and 4d+4p groupings
RAID-5 supports 3d+1p through 20d+1p groupings (though storage solutions could support more than that).
RAID-6 supports 6d+2p groupings.
RAID Rebuild Overhead
When a disk is lost, the disk needs to be replaced and rebuilt. During this time, the performance of the RAID group is affected. This impact as a result can affect user actions. Therefore, to ensure that RAID rebuilds do not affect the overall performance of the mailbox server, Microsoft recommends that you should ensure sufficient overhead is provisioned into the performance calculations when designing for RAID parity. Most RAID-1/0 implementations will suffer a 25% performance penalty during a rebuild. Most RAID-5 and RAID-6 implementations will suffer a 50% performance penalty during a rebuild.
The calculator defaults with the following as Microsoft recommendations, but they are adjustable:
For RAID-1/0 implementations, ensure that you factor in an additional 35% performance overhead.
For RAID-5/RAID-6 implementations, ensure that you factor in an additional 100% performance overhead.
RAID Configuration
By default the calculator will recommend either RAID-1/0 or RAID-5 by evaluating capacity and I/O factors and determining which configuration utilizes the least amount of disks while satisfying the requirements. If you would like to override this and force the calculator to utilize a particular RAID configuration (e.g., RAID-0 or RAID-6), select "Yes" to this option and then select the appropriate RAID configuration in the cell labeled "Desired RAID Configuration."
By default the calculator utilizes RAID-5 for the Restore LUN. However, you can define a specific RAID configuration for the Restore LUN.
Step 2 - Disk Selection
In this section you can select the appropriate disk capacity and disk type that you will want to utilize for your databases, transaction logs, and Restore LUN disks.
The storage calculator allows you to select up to three different disk configuration scenarios, which allows you to perform comparisons. The calculator will then run through the possible iterations and choose an appropriate configuration that ensures that both capacity and performance metrics are met while utilizing the least amount of physical disks. However, please keep in mind that the calculator does not take into account other factors that should be considered when evaluating different storage solutions like cost per disk, power consumption per disk, additional hardware (e.g., storage controller, disk enclosures) and software costs, and operational management costs.
Storage Design Calculations
The Calculations Pane performs all the calculations based on the input factors and outputs the key calculations into the Results Pane. For this blog, I will not delve into the specifics of the calculations, but feel free to review them within the calculator.
Storage Design Results
The Storage Design Results section outputs the recommended configuration for the solution. The recommendations made are the following:
Optimum RAID configuration
Optimum number of disks for databases, transaction logs, and Restore LUN
RAID Configurations
The RAID Configurations Table outlines the number of disks required and the RAID configuration that should be used for each disk configuration that you previously had selected in the Input section.
Recommended RAID Configuration / Server
This table recommends the optimum configuration for each mailbox server ensuring that performance and capacity requirements are met in the design. If multiple disk types and capacities configurations were originally selected, then each configuration will be compared and the disk / RAID option that utilizes the least number of disks (while ensuring the performance and capacity requirements are met) will be recommended.
Storage Configuration
This table will output the total number of disks required for each mailbox server (for both source and replica instances in the LCR/CCR scenario) and its respective SCR targets. It will also identify the total number of disks required to support the entire environment.
Conclusion
Hopefully you will find this calculator invaluable in helping to determine your storage requirements for Exchange 2007 mailbox servers. If you have any questions or suggestions, please email strgcalc AT microsoft DOT com.
Exchange2007에서 사용자 그룹정책에 대한 내용입니다.
참고하셔서 보시면 좋을 것 같습니다.
Policies in Exchange are designed to enable flexible administration of large numbers of Exchange objects. A policy is a collection of configuration settings that can be applied to one or more Exchange objects of the same class. This blog post gives an overview of Exchange 2007 policies: E-mail Address Policy (EAP), Exchange ActiveSync mailbox policy, Unified Messaging (UM) mailbox policy, and managed folder mailbox policy. Policies available in Exchange 2003 that are removed or changed in Exchange 2007 are also covered.
E-mail Address Policy (EAP)
EAP defines the proxy addresses that are stamped onto recipient objects. In Exchange 2007, every EAP must link to an existing accepted domain object. This is required so that e-mails sent to e-mail addresses defined by the EAP can be routed by Exchange 2007 transport servers. The relationship between EAP and accepted domains in Exchange 2007 and is covered in my recent post Recipient Policies and Accepted Domains.
Manage E-mail Address Policies
In the Exchange Management Console, the E-mail Address Policies tab of the Hub Transport node under the Organization Configuration work center is the place to create and configure e-mail address policies. If multiple policies apply to the same recipients, the policy with the highest priority (the lower the priority number, the higher the priority) takes precedence over any matching policies with a lower priority.
The PowerShell tasks used to manage e-mail address policies are <verb>-EmailAddressPolicy.
How EAP Enforces E-mail Address for Associated Recipients
The E-Mail Addresses property page of a recipient in the console allows management of recipient e-mail addresses. You can select whether to automatically update the e-mail address for this recipient based on e-mail address policies by checking or/unchecking the "Automatically update ..." checkbox at the bottom of this property page.
If a recipient is configured to automatically update the e-mail addresses based on e-mail address policy, all primary e-mail addresses (default reply addresses) of e-mail address types will always be set from the e-mail address policy. If you try to edit the primary address to a different e-mail address, it will always revert to the one specified by the e-mail address policy. Which policies applying to a recipient are up to the filtering rules of the policies.
The PowerShell command line to configure a mailbox to automatically update the e-mail addresses based on EAP is:
The command line to configure automatic update of e-mail addresses based on EAP for another type of recipient is similar.
Removal of Recipient Update Services (RUS)
In Exchange 2003, RUS is used to update e-mail addresses for recipients. This service processes e-mail address policy in an asynchronous way, which can be unreliable and unpredictable. Exchange 2007 doesn't rely on RUS to update e-mail addresses any more, instead it uses a predictable, synchronous e-mail provisioning process. Once an e-mail address policy is changed, the e-mail addresses for all associated recipients are updated synchronously.
With Exchange 2007, you'll be able to create multiple Exchange ActiveSync (EAS) mailbox policies to have more control for mobile deployments. Exchange 2003 SP2 first introduced EAS policies; however Exchange 2003 can only create only a single global policy which applies to all users not specifically excluded. Exchange 2007 EAS policies are per-user policies, so you can create as many policies as needed to meet your company's security requirements.
Manage EAS Policies
In the console, the Exchange ActiveSync Mailbox Policies tab of the Client Access node under the Organization Configuration work center is the place to create and configure EAS policies.
The PowerShell tasks for managing EAS policies are <verb>-ActiveSyncMailboxPolicy.
Apply an EAS policy to a Mailbox
Each mailbox can have zero or one ActiveSync mailbox policy applied. Below is the console GUI to associate an ActiveSync mailbox policy to a mailbox.
An example PowerShell command line to assign an EAS policy to a mailbox is:
Set-CASMailbox <mailboxid> -ActiveSyncMailboxPolicy (Get-ActiveSyncMailboxPolicy "Corporate Mobile Policy").Identity
Unified Messaging (UM) mailbox policy
UM is a brand new feature introduced in Exchange 2007. UM mailbox policies are required when you enable users for Unified Messaging, as these policies control the association between UM mailbox and UM dial plan. You can also use UM mailbox policy to apply a common set of policies or security settings (such as PIN policies, dialing restrictions, etc) to a collection of UM-enabled mailboxes.
Manage UM policies
In the console, the UM Mailbox Policies tab of the Unified Messaging node under the Organization Configuration work center is the place to create and configure UM mailbox policies.
The PowerShell tasks for managing UM policies are <verb>-UMMailboxPolicy.
Apply an UM policy To a Mailbox
When you enable a mailbox for UM through the Enable Unified Messaging wizard, a UM policy is required. Below is the console GUI to associate a UM mailbox policy to a mailbox.
The PowerShell command line to assign a UM mailbox to a mailbox is:
Managed folder mailbox policies are used for messaging records management (MRM), a.k.a e-mail lifecycle (ELC), in Exchange 2007. Managed folder mailbox policies collect managed folders into logical groupings. When a managed folder mailbox policy is applied to a mailbox, the managed folders and their settings linked to the mailbox policy are applied to the mailbox in a single step.
In the console, the Managed Folder Mailbox Policies tab of the Mailbox node under the Organization Configuration work center is the place to create and configure managed folder mailbox policies.
The PowerShell tasks for managing managed folder mailbox policies are <verb>-ManagedFolderMailboxPolicy.
The PowerShell command line to assign a managed folder mailbox policy to a mailbox is:
Policies in Exchange 2003 That Are Removed or Changed
System Policy
This has been removed. Refer to an earlier post Gone but not forgotten for a more detailed explanation.
Mailbox Manager Recipient Policy
This has been removed. The mailbox manager recipient policy is one kind of recipient policies in Exchange 2003, which is gone in Exchange 2007. This concept is replaced by managed default/custom folder, managed content settings and managed folder mailbox policy concepts in Exchange 2007, which is covered in the previous managed folder mailbox policy section of this post.
E-mail Address Recipient Policy
Changed. E-mail address recipient policy in Exchange 2003 has been separated into EAP and Accepted Domain concepts in Exchange 2007 which was covered in the E-mail Address Policy (EAP) section of this post.
The previous sections listed the counters for the most common use of Exchange Servers—as mail-flow and mailbox servers. However, some organizations heavily use Exchange server roles, such as front-end servers and public folder servers. For those organizations, there are other performance issues that need to be monitored.
Front-end servers, such as those that serve Outlook Web Access, authentication, IP address checking, Secure Sockets Layer (SSL) protocol, and encryption schemes, have security features that require significant processing. For these servers, you are likely to see increased processor activity, both in privileged and user mode, and an increase in the rate of context switches and interrupts. If the processors in the server cannot handle this increased load, queues are likely to develop.
If your front-end servers are using SSL, the Local Security Authentication Server (Lsass.exe) process may consume a large amount of CPU. This is because SSL processing occurs here at the server. This means that administrators used to monitoring CPU usage may see less processor consumed by the Inetinfo.exe process and more consumed by the Lsass.exe process.
Improving Front-End Server Performance
The following item describes how you can improve the front-end server performance:
·Use hardware cryptographic accelerators
When there is extremely high SSL use, you can improve performance by using hardware cryptographic accelerators to offload the calculations and remove SSL from being a bottleneck.
For public folder servers, it is important to understand that the replication traffic between public folders (if there is more than one public folder in the topology) can affect all the servers involved. Arrange the replication schedule of the servers so that a replication queue does not mount any public folder. Processing replication changes causes resource competition with the operations already occurring on the server.
Replication Mail Flow
Replication messages are received by SMTP, categorized and handed to the local SMTP queue. The messages are then submitted to the Public Folder store. Once they have been submitted to the Public Folder store the messages are put in the Replication Receive Queue. The messages in the Replication Receive Queue then get processed and the changes are performed on the appropriate Public Folder
Use the counter listed in the following table to determine whether there is any public folder performance degradation.
Performance Counter for Public Folder Server Receive Queue
Indicates the number of replication messages waiting to be processed.
·This value should not go above 100.
·This value should return to a minimum value between replication intervals
Improving Public Folder Server Performance
The following item describes how you can improve the public folder server performance:
·Tune replication schedule to avoid queues
You can increase or decrease the frequency that a public folder replicates its content changes to other public folders. For some deployments, having replication contents replicate more frequently actually results in performance gains. These performance gains are possible because the increased replication frequency avoids big replication queues and involves less public folder content being replicated at a time.
However, if replication is never completing then you will see an unbounded growth of the Replication Receive Queue size. When changing the frequency of replication monitor this counter to ensure that replication is completing before the beginning of the next interval.
·Minimize the number of replicas
Minimizing the number of replicas will also result in performance gains. In some cases multiple replicas of folders may have been added in order to distribute the load over multiple servers. A more effective way to balance the load would be to divide the folders across multiple servers.
For example, if you were to divide the folders between two servers such that each server had replicas of half the hierarchy that scenario would result in less load per server than if the two servers that had replicas of all the folders. Dividing the folders results in better performance because there will not be the added performance cost of replicating all the content changes between the servers.
·Throttling Offline Address Book downloads to reduce network hit
Exchange 2003 and Outlook 2003 Cached Mode increase the number of downloads of the Offline Address Book (OAB). These downloads may result in very high network utilization and may overload the network. By default, every client request for a full OAB is served immediately. Throttling the OAB downloads will help limit the effect on the network. See the following Microsoft Knowledge Base articles for more information.
Reducing the number of direct subfolders will also help improve performance. A deeper and narrow hierarchy will have lower performance cost than a shallow and wide hierarchy. Limiting the number of direct subfolders for any given folder to 250 will reduce the cost of both replication and user actions.
·Limiting the number of messages per folder
Limiting the number of messages for a public folder will reduce search and sort times on that folder. This will improve the client experience as well as reduce load on the server.
It is not uncommon for servers to experience multiple bottlenecks. It is important, however, to understand whether there are any causal relations occurring—that is, where one subsystem's performance issues spills over to another subsystem. For example, a CPU-bound server can build up queues, which causes unusually high use of the SMTP disks.
Because of the possibility of causal relations occurring between subsystems, analyze the performance logs with regard to:
·The role assigned to the server.
·The cause or causes that trigger the performance degradation of one or more subsystems.
Generally, it is worth mitigating each bottleneck, and then seeing the effects of removing that malfunctioning piece of the puzzle. Otherwise, enforcing policies may be enough to mitigate issues caused by multiple bottlenecks. For instance, enforcing message sizes for POP3 retrievals can reduce the load on the database disk. However, enforcement may not be enough. There are many cases that will require upgrades or a redesign of the hardware.
In this example, the Exchange server is a mailbox server that hosts 6,000 users. It is connected to three direct attach storage arrays:
·One array has the database.
·Another array has the transaction logs.
·The third array has the SMTP disks.
This Exchange server has two storage groups with two private databases, each database with 1,500 users. The SLA for backing up and restoring limits the number of storage groups to two.
The problem is that, during the daytime, users experience slow response as they use Microsoft® Office Outlook® in online mode.
By collecting a performance log during the eight hours of day-time use for which this server is experiencing degraded performance, it becomes clear that the MSExchangeIS\RPC Requests counter is constantly around 60, and that some clients experience slow responses to the operations requested. Furthermore, the MSExchangeIS\RPC Averaged Latency counter is constantly hitting or going above 100 ms. These are clear symptoms of performance issues that need to be isolated.
Eight hours of day-time performance information
Analysis of the performance logs uncovered problems with the performance of the database drive, the log drive, and the CPU. The following sections indicate which performance counters were used to determine each problem.
Problem 1—Database drive with bad performance
The Exchange Server is connected to a Storage Area Network that cannot handle the I/O load. As shown in Figure 10, the write latencies on the database drive (as indicated by the PhysicalDisk\Average Disk sec/Write counter) average 62 ms, with frequent spikes above 80 ms and some above 100 ms.
Performance log of the database drive
Problem 1 Solution
By adding another array and controller, and then splitting the storage groups into separate arrays, the performance of the database drive improved.
Problem 2—Log drive with bad performance
As shown in the following figure, a slow transaction log drive is causing the Database\Log Record Stalls/sec counter to average 114 stalls/second, with constant spikes above 150 stalls/second. In addition, there are frequent log threads waiting as indicated by the Database\Log Record Stalls/sec counter, with spikes above 20.
Performance log of the transaction log drive
Problem 2 Solution
The controller responsible for the transaction logs was experiencing problems. The controller has the write-back cache disabled. The stalls subsided after replacing the old controller with a new controller that had a properly functioning write-back cache.
Problem 3—CPU-bound
As shown in the following figure, this server is experiencing high CPU usage (with the Processor\% Processor Time counter averaging 97%) and large processor queues (as indicated by the System\Processor Queue Length counter).
Performance log of CPU usage
Problem 3 Solution
The slowness on the database and transaction logs aggravated the CPU utilization, causing more context switches than necessary (an average of 50,000 on this performance log) and consequently over utilizing the CPU. By resolving the database issues in Problem 1 and the transaction logs issues in Problem 2, the CPU utilization problem shown in the figure in this problem is resolved as well.
Exchange depends on the performance of the global catalog domain controllers. You can investigate CPU usage, as well as disk and memory bottlenecks, on your Active Directory servers.
Note:
Most investigative techniques described in this article apply to global catalogs.
For each of the Exchange servers in the topology, use the counters listed in the following table to determine whether there is a slowdown in communicating with global catalogs.
Performance Counters on the Exchange Server that Indicate Global Catalog Problems
Counter
Expected values
SMTP Server\Categorizer Queue Length
Indicates how well SMTP is processing LDAP lookups against global catalog servers.
This should be at or around zero unless the server is expanding distribution lists. When expanding distribution lists, this counter can occasionally go up higher. This is an excellent counter to tell you how healthy your global catalogs are. If you have slow global catalogs, you will see this counter go up.
·The maximum value should be below 10.
MSExchangeDSAccess Process\LDAP Read Time (for all processes)
Shows the time (in ms) that an LDAP read request takes to be fulfilled.
·The average value should be below 50 ms.
·Spikes (maximum values) should not be higher than 100 ms.
MSExchangeDSAccess Process\LDAP Search Time (for all processes)
Shows the time (in ms) that an LDAP search request takes to be fulfilled.
·The average value should be below 50 ms.
·Spikes (maximum values) should not be higher than 100 ms.
For each of the global catalogs in the topology, use the counters listed in the following table to determine whether the global catalogs are experiencing performance degradations.
Performance Counters on the Global Catalog Servers that Indicate Problems
Counter
Expected values
Processor\% Processor Time (_Total)
Indicates the percentage of time the processor is running non-idle threads.
You can use this counter to monitor the overall utilization of the processors or per-processor.
·The average CPU utilization should be below 90% at all times.
System\Processor Queue Length
Indicates the number of threads in the processor queue.
There is a single queue for processor time, even on computers with multiple processors. This counter shows ready threads only, not threads that are currently running.
·This counter should be less than 2.
Network Interface\Bytes Total/sec
Indicates the rate at which the network adapter is processing data bytes.
This counter includes all application and file data, in addition to protocol information such as packet headers.
·For a 100-Mbps NIC, this counter should be below 6 MB/sec.
·For a 1000-Mbps NIC, this counter should be below 60 MB/sec.
Network Interface\Packets Outbound Errors
Indicates the number of outbound network packets that could not be transmitted because of errors.
·This counter should be zero (0) at all times.
PhysicalDisk(NTDS Database Disk)\Average Disk sec/Read
Indicates the average time (in seconds) that it takes to read data from the disk.
·The average value should be below 20 ms.
·Spikes (maximum values) should not be higher than 50 ms.
PhysicalDisk(NTDS Database Disk)\Average Disk sec/Write
Indicates the average time (in seconds) that it takes to write data to the disk.
·The average value should be below 20 ms.
·Spikes (maximum values) should not be higher than 50 ms.
PhysicalDisk(NTDS Log Disk)\Average Disk sec/Read
Indicates the average time (in seconds) that it takes to read data from the disk.
·This value should be below 10 ms at all times.
PhysicalDisk(NTDS Log Disk)\Average Disk sec/Write
Indicates the average time (in seconds) that it takes to write data to the disk.
·This value should be below 10 ms at all times.
PhysicalDisk(NTDS Database or Log Disks)\Average Disk Queue Length
Indicates the average number of both read and write requests that were queued for the selected disk during the sample interval.
·The average value to be less than the number of spindles of the disk.
If a SAN is being used, ignore this counter and concentrate on the latency counters:
PhysicalDisk\Average Disk sec/Read and PhysicalDisk\Average Disk sec/Write.
Memory\Available Mbytes (MB)
Indicates the amount of physical memory (in MB) immediately available for allocation to a process or for system use.
The value of this counter is equal to the sum of memory assigned to the standby (cached), free, and zero page lists.
·During the test, there must be 50 MB of memory available at all times.
Memory\Pages/sec
Indicates the rate at which pages are read from or written to disk when resolving hard page faults.
This counter is a primary indicator of the types of faults that cause system-wide delays. It includes pages retrieved to satisfy page faults in the file system cache. These pages are usually requested by applications.
안녕하세요 빛향기고운데입니다.
레지스트리 통하여 Exchange Server IMF v2 수정하는 방법입니다.
By default, the Intelligent Message Filter feature is installed with Microsoft Exchange Server 2003 Service Pack 2 (SP2). You must manually enable Intelligent Message Filter to obtain the benefits of this new message filtering technology. The Microsoft Exchange Server Intelligent Message Filter v2 Operations Guide describes the update process that keeps Intelligent Message Filter up-to-date. This guide includes information about the following topics:
•
How Intelligent Message Filter works
•
How to plan your Exchange Server Intelligent Message Filter
•
How to secure your gateway SMTP virtual servers
•
How to deploy in a multiple forest scenario
•
How to configure and to enable Exchange Server Intelligent Message Filter
•
How to update the Exchange Server Intelligent Message Filter
•
Supported scenarios
•
Schedule and availability of updates
•
How to enable updates
•
How to uninstall updates
•
Service packs
•
Unsupported scenarios: clustered environment
•
Automatic updates
•
How to monitor and to troubleshoot Exchange Server Intelligent Message Filter
•
How to use system monitor and performance logs and alerts
•
How to customize Exchange Server Intelligent Message Filter
•
How to change the archive location
•
How to store the SCL rating with archived messages
•
How to filter messages sent through authenticated connections
•
How to set the size of spam rules
Demystifying Exchange Server 2003 SP2 IMF Updates
Hi All,
I thought I would introduce myself to the BLOG-O-Sphere, my name is Scott Roberts and I'm a Software Developer in Test for the Exchange Sustained Engineering team. One of my responsibilities on the Exchange team includes being part of a team that pushes out the update for Intelligent Message Filtering (IMF) via Microsoft Update (MU). This BLOG will cover a few of the areas that we seem to find customers having problems with when trying to get the latest IMF update via MU.
By now, I hope all of you know that new Intelligent Message Filter (IMF) is out in the wild with the release Exchange Server 2003 Service Pack 2 and have moved off of the older version. What you might not be aware of is that Exchange pushes an update twice a month to the Microsoft Update infrastructure to deliver the latest IMF files to your server and this is explained in
http://support.microsoft.com/?kbid=907747. The below will give additional information and troubleshooting steps to make using the IMF update functionality easier and troubleshooting issues less costly. Additionally, you should check our previous post on this subject too.
Microsoft Update/Windows Update
An IMF Update is the same as any other Exchange Update and therefore will use the 'Microsoft Update' pipe instead of the 'Windows Update' pipe to deliver the update to the customer. Every computer by default uses 'Windows Update' when first installed and can be reached by START > PROGRAM FILES and selecting the 'Windows Update' shortcut.
What Is Microsoft Update?
It's the new website from Microsoft that helps you update Microsoft Windows and many other Microsoft programs that you've installed, such as Microsoft Office, Microsoft Exchange Server and Microsoft SQL Server, all in one convenient place.
Does it work with Automatic Updates?
Yes. If you turn on Automatic Updates using your settings in Control Panel, Windows will automatically find and install high-priority updates for any Microsoft products that you have installed and that are supported by the website.
If I use Microsoft Update, do I still need to visit the Windows Update website?
No. Microsoft Update provides the same updates you find on the Windows Update website and more. Microsoft Update is designed to make it easier for you to update Windows and your Microsoft products in one place.
In order to use Microsoft Update (MU), the computer must 'opt-in' via a website and from that point on the machine will use MU for detecting if it needs updates instead of Windows Update (WU). KB901037 explains 'How to enable and to disable Microsoft Update'. It isn't that difficult to do and only takes a minute.
Detection Logic
First off, I think it will be important to explain how detection does happen. There are several checks that happen before the update will be downloaded to the machine and installed. The Automatic Update (AU) Service (Description of the Automatic Updates feature in Windows) is responsible for the scan on the local machine and based on its configuration (How to schedule automatic updates in...) will decide how to handle the update. Remember that there is an ActiveX control that needs to be installed and that there is also a possibility that the machine needs an update for 'Windows Update'.
The detection that happens during the AU scan that does happen is as follows:
Is one of the Exchange Product installed on the machine?
Is Exchange Server 2003 installed on the machine?
Is Exchange Server 2003 Service Pack 2 installed on the machine?
Is the IMF 'ContentFilterState' registry a DWORD and a value of 1?
Is this particular IMF Update already installed onto the machine?
At this point, the 'AU' then does what is configured to do on the local machine:
The update is automatically installed (AU Scheduled)and uses the 'localsystem' account for the installation of the update
The update is downloaded and the local user is prompted to install. The update is installed using the credentials of the local user.
The update is not download but the local user is prompted to download and install. The update is installed using the credentials of the local user.
To enable Intelligent Message Filter updates, you must create the ContentFilterState registry entry. http://support.microsoft.com/?kbid=907747 explains this some detail. To do this, follow these steps:
1.
Ensure that Exchange Server 2003 Service Pack 2 is installed on the machine
2.
Click Start, click Run, type regedit, and then click OK.
3.
Expand the following registry subkey:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Exchange
4.
In the left pane, click Exchange. Then, right-click in the right pane, point to New, and then click DWORD Value.
5.
Type ContentFilterState, and then press ENTER to name the new registry entry.
6.
Right-click ContentFilterState, and then click Modify.
7.
In the Data value box, type 1, and then click OK.
8.
Quit Registry Editor.
9.
In the Services snap-in, restart the Simple Mail Transfer Protocol (SMTP) service.
해당 Regedit 값에 DWORD 추가하시고값을 1로주시면됩니다.
restart the Simple Mail Transfer Protocol (SMTP) service
앞에서설명한것처럼 NDR을표시하지않는것은 RFC를준수하는방법이아닙니다. 따라서 NDR을표시하지않는것은일반적으로좋지않습니다. 또한 NDR을표시하지않으면전자메일메시지를보낼때받는사람주소를잘못입력하는일반사용자에게불편을주기도합니다. 전자메일을보내는사람은일반적으로 NDR이반환되지않으면전자메일메시지가목적지에도달한것으로생각합니다.
받는사람필터링기능을설정하면수집공격을받을위험이커질수있습니다. 그러나 NDR 대량공격을위한벡터로사용될가능성도줄어듭니다. NDR 대량공격은보낸사람이유효한도메인의반환주소를의도적으로스푸핑한다음잘못된전자메일메시지를해당도메인에서보낸것처럼사용자에게보내는것입니다. 그러면사용자의서버는이도메인에의무적으로다량의 NDR 보고서를보냅니다.
오늘은 Exchange Server에서 Memory때문에 Kernel issues가 생기는 문제에 대하여 다뤄보도록 하겠습니다.
64-bit & 32-bit
* Addressable Memory * 32-bit = 2 의 32승 = 4GB maximum memory
* 64-bit = 2 의 64승 = 18 Exabyte maximum memory
* Current hardware restricts memory to between 16 and 64GB
* More memory = larger cache
* Larger cache = less IOPS/user
* Less IOPS/user (75% less )
* Less IOPS = 4x users per disk or 1/4 disks required)
* More memory = no more kernel errors
* More memory = no more VM fragmentation
* More memory = meet growing demands
No switches
/3GB
/3GB and /USERVA
PAE & AWE
* PAE(Physical Address Extension)
* A function of the Windows 2000/2003 memory managers that provides more physical memory to a
program that requests memory
* The progrma is not aware that any of the memory that it uses resides in the range 4GB +
* AWE(Address Windowing Extensions)
* An API set that enables programs to reserve large chunks of memory
* The reserved memory is non-pageable and is only accessible to that program
Boot.ini Ortions for Exchange 2003 on Windows 2003
Exchange 2003 Server Role
Physical Memory Config
Additions Made to Boot.ini
Mailbox
1GB
/3GB /USERVA=3030
Public Folder
1GB
/3GB /USERVA=3030
Front End(FE)
1GB
None
SMTP
Gateway/Bridgehead
1GB
None
SMTP
Gateway/Bridgehead
(Envelope Journaling)
1GB
/3GB /USERVA=3030
MTA/X.400/3rd Party
Connector Bridgehead
1GB
/3GB /USERVA=3030
* /PAE
The Physical Address Extension (PAE) allows 32-bit Windows systems to use more than 4 GB of physical memory. PAE also enables several advanced system and processor features so it can also be used on computers that have less than 4 GB of memory. Features enabled by PAE include hardware-enabled Data Execution Prevention (DEP), non-uniform memory access (NUMA), and the ability to add memory to a system while it is running (hot-add memory).
On most computers, PAE is disabled by default. (PAE is enabled by default only if DEP is enabled on a computer that supports hardware-enabled DEP, or if the computer is configured for hot-add memory devices in memory ranges beyond 4 GB.) PAE must be explicitly enabled for Windows to run in NUMA mode on a NUMA-capable computer.
To enable PAE, use the BCDEdit /set command to set the pae boot entry option.
Windows Server 2003 and Windows XP/2000: To enable PAE, use the /PAE switch in the Boot.ini file. To disable PAE, use the /NOPAE switch.
With PAE enabled, the operating system moves from two-level linear address translation to three-level address translation. The extra layer of translation provides access to physical memory beyond 4 GB. Instead of a linear address being split into three separate fields for indexing into memory tables, it is split into four separate fields: a 2-bit field, two 9-bit fields, and a 12-bit field that corresponds to the page size implemented by Intel Architecture (4 KB).
PAE allows the operating system to access and use more than 4 GB of physical memory.
4GT extends the 32-bit user virtual address space from 2 GB to up to 3 GB.
AWE is a set of APIs that allows a process to allocate nonpaged physical memory and then dynamically map portions of this memory into the virtual address space of the process.
When neither 4GT nor AWE are being used, the amount of physical memory that a single 32-bit process can use is limited by the size of its address space (2 GB). In this case, a PAE-enabled system can still make use of more than 4 GB of RAM to run multiple processes at the same time or to cache file data in memory.
4GT can be used with or without PAE. However, some versions of Windows limit the maximum amount of physical memory that can be supported when 4GT is used. On such systems, booting with 4GT enabled causes the operating system to ignore any memory in excess of the limit. For details, see Memory Limits for Windows Releases.
AWE does not require PAE or 4GT but is often used together with PAE to allocate more than 4 GB of physical memory from a single 32-bit process.
Windows Server 2003에서는 서버가 핫 추가 메모리 장치를 사용하는 경우에만 PAE가 자동으로 설정됩니다. 이 경우 핫 추가 메모리 장치를 사용하도록 구성된 시스템에서는 /PAE 스위치를 사용할 필요가 없습니다. 다른 모든 경우에 4GB 이상의 메모리를 이용하려면 Boot.ini 파일에서 /PAE 스위치를 사용해야 합니다.
일반적으로 Windows 2000이나 Windows Server 2003에서 실행되는 프로세스는 /3GB 스위치를 사용하지 않는다고 가정할 때 최대 2GB의 메모리 주소 공간에 액세스할 수 있으며 이 메모리 중 일부는 실제 메모리이고 일부는 가상 메모리입니다. 프로그램과 프로세스를 더 많이 실행하면 최대 2GB의 주소 공간까지 메모리를 더 많이 커밋하게 됩니다.
이런 상황이 발생하면 페이징 프로세스가 크게 증가하여 성능에 나쁜 영향을 미칠 수 있습니다. Windows 2000 및 Windows Server 2003 메모리 관리자는 PAE를 사용하여 프로그램에 더 많은 실제 메모리를 제공합니다. 이렇게 하면 페이지 파일의 메모리를 스왑할 필요성이 줄어들어 성능이 향상됩니다. 프로그램 자체는 실제 메모리 크기를 인식하지 못합니다. 모든 메모리 관리와 PAE 메모리의 할당은 실행되는 프로그램에 관계없이 메모리 관리자에 의해 처리됩니다.
앞의 정보는 /3GB 스위치를 사용하여 실행하는 프로그램에 해당됩니다. 3GB 메모리를 요청하는 프로그램은 페이징 아웃하는 대신 실제 메모리에 더 많은 메모리가 남아 있도록 할 수 있습니다. 이렇게 하면 /3GB 스위치를 사용할 수 있는 프로그램의 성능이 좋아집니다. 예외는 /3GB 스위치를 /PAE 스위치와 함께 사용할 때 발생합니다. 이 경우 운영 체제는 16GB를 초과하는 메모리를 사용하지 못합니다. 이 문제는 커널 가상 메모리 공간의 고려 사항으로 인해 발생합니다. 이렇게 Boot.ini 파일에서 /3GB 항목을 사용하여 시스템을 다시 시작하고 시스템의 실제 메모리가 16GB보다 큰 경우 운영 체제는 추가 실제 RAM을 사용하지 않습니다. /3GB 스위치를 사용하지 않고 컴퓨터를 다시 시작하면 실제 메모리를 모두 사용할 수 있습니다.
AWE는 메모리 관리자 기능에 대한 API(응용 프로그래밍 인터페이스) 집합으로 프로그램이 표준 32비트 주소 지정을 통해 4GB보다 큰 사용 가능한 메모리를 주소 지정할 수 있게 해 줍니다. AWE를 사용하면 프로그램은 실제 메모리를 비페이징 메모리로 예약한 다음 비페이징 메모리 일부를 프로그램의 메모리 작업 집합에 동적으로 매핑할 수 있습니다. 이 프로세스를 사용하면 대형 데이터베이스 시스템처럼 메모리를 많이 사용하는 프로그램이 페이지 파일을 사용하기 위해 페이징 인/아웃할 필요 없이 많은 실제 메모리를 데이터용으로 예약할 수 있습니다. 대신 데이터는 작업 집합에서 스와핑되며 예약된 메모리는 4GB 범위를 초과합니다. 또한 4GB를 초과하는 메모리 범위는 PAE에 의해 AWE 기능 및 메모리 관리자에 노출됩니다. PAE 없이는 AWE가 4GB를 초과한 메모리를 예약할 수 없습니다.
-> 기본적으로 Windows는 총 4GB의 가상 주소 공간을 주소 지정할 수 있습니다. 기본적으로 이 중 2GB는
커널(운영 체제)용으로 예약되고 나머지 2GB는 Exchange 같은 사용자 모드 프로그램용으로 예약됩니다.
운영 체제의 Boot.ini 파일에 /3GB 스위치를 추가하면 사용자 모드 프로그램에 3GB의 공간을 제공하고
커널을 1GB로 제한하도록 가상 주소 공간 분배가 다시 할당됩니다. /3GB 스위치는 사서함 저장소나
공용 폴더 저장소가 있는 컴퓨터에서만 필요합니다. 사서함 저장소나 공용 폴더 저장소가 없는 컴퓨터에서는
이 스위치를 사용하지 않는 것이 좋습니다.
* /3GB 사용가능 운영체제
•
Microsoft Windows Server 2003 Datacenter Edition
•
Microsoft Windows Server 2003 Enterprise Edition
•
Microsoft Windows 2000 Advanced Server
•
Microsoft Windows 2000 Datacenter Server
•
Microsoft Windows NT 4.0 Enterprise Server
* /3GB 사용 불가능 운영체제
•
Microsoft Windows 2000 Server
•
Microsoft Windows NT 4.0 Server
-> /3GB스위치 사용하면 커널용으로 1GB와 사용자 모드 프로그램용으로 2GB가 할당되어 1GB의 주소공간이
손실 됩니다.
메모리 부족이 발생하면 가상 메모리 조각화가 발생하여 문제를 information store 서비스가 비정상 동작하게 된다.
관련 성능 카운터
(1) MSExchangeIS - VMLargest Block Size
가상 메모리의 가장 큰 free block 크기를 byte 크기로 알려 줍니다.
이 값이 32MB 이하가 되면 9582 이벤트가 경고로 발생하고
16MB 이하가 되면 에러로 이벤트가 남게 됩니다.
이 값은 32MB 이하로 내려가서는 안 됩니다.
(2) MSExchangeIS – VM Total 16mb Free Blocks
16MB 이상의 가상 메모리 블록의 개수를 나타내고 1 밑으로 값이 떨어져서는 안 됩니다.
(3) MSExchangeIS – VM Total Free Blocks
크기와 상관없이 가용한 가상 메모리 블록크리의 총 개수를 나타냅니다.
역시 1 밑으로 값이 떨어져서는 안 됩니다.
(4) MSExchangeIS – VM Total Largest Free Block Bytes
16MB 이상이ㅡ 크기를 가지는 가상 메모리들만의 총 바이트 입니다.
50MB 밑으로 떨어져서는 안 됩니다.
관련 성능 카운터의 임계치를 넘어서면
이벤트 9582를 발생시킨다. 해당 이벤트를 만나면 서비스를 재시작하여 큰 문제를 막아야 한다.
Troubleshooting Kernel Memory
1.Ensure Exchange server configuration is correct. Run ExBPA
2.Isolate which Kernel Memory space is being exhausted (PP, NPP or PTE’s)
a.Analyze Events
b.Analyze Perfmon
3.Determine what is causing the specific Kernel Memory space exhaustion
4.Take corrective action
291988 (http://support.microsoft.com/kb/291988/) 4GB RAM 조정 기능 및 PAE(실제 주소 확장) 스위치에
대한 설명
300573 (http://support.microsoft.com/kb/300573/) XGEN: Windows 2000 Datacenter Server에서의
Exchange 2000 Enterprise Server 지원
266096 (http://support.microsoft.com/kb/266096/) XGEN: 1GB 이상의 실제(Physical) RAM을 가진
Exchange 2000 서버에서 /3GB 스위치가 필요하다
298064 (http://support.microsoft.com/kb/298064/) Exchange 2000 Server에 대한 확장성 계획
266650 (http://support.microsoft.com/kb/266650/) Windows 2000 Datacenter Server 기반 컴퓨터에서의
BackOffice 프로그램 지원 정보
317411 (http://support.microsoft.com/kb/317411/) XADM: Exchange 가상 메모리 문제를 해결하기 위해
데이터를 수집하는 방법
266768 (http://support.microsoft.com/kb/266768/) Exchange 2000 Server에서 저장소 데이터베이스 최대 캐시
크기를 수정하는 방법
823440 (http://support.microsoft.com/kb/823440/) Windows Server 2003 기반 시스템에 Exchange Server 2003
을 설치한 경우 /3GB 스위치를 사용해야 한다
Microsoft Exchange 2000 Server Standard Edition 정보 저장소는 허용되는 최대 크기 제한에 도달하면 자동으로 종료되고 다시 시작되지 않습니다. 또한 응용 프로그램 이벤트 로그에 다음과 같은 이벤트 ID가 기록될 수도 있습니다.
이벤트 유형: Error
이벤트 원본: MSExchangeIS
이벤트 범주: 일반 사항
터미널 서비스를 1112
설명: "사서함 저장소(서버 이름)" 데이터베이스가 최대 허용 크기에 도달했습니다. 데이터베이스를 연결 해제하고 있습니다.
이벤트 유형: Warning
이벤트 원본: ESE
이벤트 범주: 공간 관리
터미널 서비스를 445
설명: 정보 저장소(3160) - D:\Program Files\Exchsrvr\MDBDATA\priv1.edb 데이터베이스가 최대 크기인 16383MB에 도달했습니다. 데이터베이스를 다시 시작할 수 없는 경우 오프라인 조각 모음을 실행하여 데이터베이스 크기를 줄일 수 있습니다.
참고 이벤트 ID 445의 설명에는 Priv1.edb 파일이 16,383MB에 도달한 것으로 되어 있지만 실제로는 아닐 수도 있습니다. 이벤트 ID 445는 Priv1.edb 파일과 Priv1.stm 파일을 합한 크기가 16,383MB에 도달하는 경우에 발생합니다. Priv1.edb 파일의 크기는 16,383MB보다 작을 수 있습니다.
원인
이것은 Exchange Server 2000 Standard Edition 정보 저장소 데이터베이스가 데이터베이스 파일에 보유할 수 있는 것보다 더 많은 데이터를 삽입하지 못하도록 의도적으로 설계된 동작입니다.
Microsoft Exchange 2000 Server Standard Edition을 실행할 때 이 문제가 종종 발생합니다. Exchange 2000 Server Standard Edition은 데이터베이스 크기를 16GB로 제한합니다.
참고 Exchange 개인 사서함 저장소 데이터베이스의 16GB 크기 제한과 Exchange 공용 사서함 저장소 데이터베이스의 16GB 크기 제한은 Priv.edb 파일과 Priv.stm 파일의 크기를 합한 값입니다. Exchange System Manager에서 사서함에 사용되는 공간을 검토하면 Priv.edb 파일에 사용되는 공간만 포함되어 있고 Priv.stm 파일에 사용되는 공간은 포함되어 있지 않습니다.
사서함에 제한을 적용할 경우 Priv.edb 파일의 저장소만 제한하고 Priv.stm 파일의 저장소는 제한하지 않습니다. 예를 들어 Exchange System Manager에서 사서함이 250MB의 공간만 사용하는 것으로 나타날 수 있습니다. 그러나 사서함이 사용하는 전체 공간은 450MB일 수 있습니다. Priv.stm 파일에 사용되는 200MB의 공간이 Exchange System Manager에 나타나지 않기 때문에 이러한 차이가 발생합니다.
해결 방법
Exchange 2000 Server Standard Edition에 대한 새 업데이트가 개발되었습니다. 이 업데이트를 사용하면 데이터베이스 크기 제한이 일시적으로 1GB까지 늘어납니다.
이 문제를 해결하기 위해 관리자는 다음 단계를 수행해야 합니다.
•
데이터베이스 크기 제한을 임시로 1GB 늘립니다.
•
필요 없는 데이터베이스 콘텐츠를 선택적으로 제거합니다.
•
데이터베이스 조각 모음을 수행하여 정의된 데이터베이스 크기 제한 이하의 수준으로 데이터베이스 크기를 줄입니다.
Exchange Server 2003에서는 임시로 데이터베이스 크기 제한을 1GB씩 늘리는 기능이 제품에 내장되었습니다. 그러나 이 기능을 활성화하려면 관리자가 다음 기술 자료 문서에 설명되어 있는 새로운 레지스트리 값을 만들어야 합니다.
Exchange 2000에서는 2003년 9월 Exchange 2000 Server 서비스 팩 3 이후 롤업을 적용하여 이 문제를 해결할 수 있습니다. 그런 다음 관리자가 새로운 레지스트리 값을 만들어서 이 기능을 활성화해야 합니다. 롤업을 다운로드하고 설치하는 방법에 대한 자세한 내용은 다음 문서 번호를 클릭하여 Microsoft 기술 자료 문서를 참조하십시오.
824282 (http://support.microsoft.com/kb/824282/) 2003년 9월 Exchange 2000 Server 서비스 팩 3 이후 롤업
2003년 9월 Exchange 2000 Server 서비스 팩 3 이후 롤업을 나중에 설치할 계획이지만 이 문제를 위한 수정이 지금 필요하다면 아래 "업데이트 정보" 절을 확인하십시오.
업데이트 정보
현재 제품의 기본 동작을 수정하는 지원 기능은 Microsoft에서 구할 수 있지만 이 문서에서 설명하는 동작을 수정하기 위한 기능일 뿐입니다. 이 기능이 특별히 필요한 시스템에만 적용하십시오.
기능을 다운로드할 수 있는 경우 기술 자료 문서의 맨 위에 "핫픽스 다운로드 가능"이 표시됩니다. 이 부분이 표시되지 않는 경우 해당 기능을 구하려면 Microsoft 온라인 기술 지원으로 문의하십시오.
참고 문제가 추가로 발생하거나 문제 해결이 필요한 경우 별도의 서비스 요청을 해야 할 수도 있습니다. 이 특정 기능으로 해결할 수 없는 추가적인 질문과 문제에 대해서는 지원 비용이 청구됩니다. Microsoft 온라인 기술 지원 전화 번호의 전체 목록을 얻거나 별도의 서비스 요청을 하려면 다음 Microsoft 웹 사이트를 방문하십시오.
참고 "핫픽스 다운로드 사용 가능" 형식에는 기능에 사용할 수 있는 언어가 표시됩니다. 사용자 언어가 표시되지 않으면 해당 언어로 기능을 사용할 수 없기 때문입니다.
전제 조건
파일 종속성으로 인해 이 업데이트에는 Microsoft Exchange 2000 Server 서비스 팩 3(SP3)이 필요합니다. 자세한 내용은 다음 문서 번호를 클릭하여 Microsoft 기술 자료 문서를 참조하십시오.
301378 (http://support.microsoft.com/kb/301378/) 최신 Exchange 2000 Server 서비스 팩을 구하는 방법
파일 정보
이 업데이트의 영어 버전에는 다음과 같은 파일 특성 또는 최신 파일 특성이 포함되어 있습니다. 이 파일의 날짜와 시간은 UTC(협정 세계시)로 나열되며 파일 정보를 볼 때 현지 시간으로 변환됩니다. UTC와 현지 시간의 차이를 보려면 제어판의 날짜 및 시간 항목에서 표준 시간대 탭을 사용하십시오.
날짜 시간 버전 크기 파일 이름
--------------------------------------------------------------
<Tr><Td>2003-01-17</Td> <Td>01:17</Td> <Td>6.0.6401.0</Td> <Td>3,915,776</Td> <Td>Cdoex.dll</Td></Tr>
<Tr><Td>2003-01-17</Td> <Td>01:17</Td> <Td>6.0.6401.0</Td> <Td>3,567,616</Td> <Td>Excdo.dll</Td></Tr>
<Tr><Td>2003-01-17</Td> <Td>00:32</Td> <Td>6.0.6401.0</Td> <Td>258,048</Td> <Td>Exmime.dll</Td></Tr>
<Tr><Td>2003-01-17</Td> <Td>01:09</Td> <Td>6.0.6401.0</Td> <Td>1,691,648</Td> <Td>Exoledb.dll</Td></Tr>
<Tr><Td>2003-01-16</Td> <Td>22:37</Td> <Td>6.0.6401.0</Td> <Td>2,265,088</Td> <Td>Mdbmsg.dll</Td></Tr>
<Tr><Td>2003-01-16</Td> <Td>22:08</Td> <Td>6.0.6401.0</Td> <Td>32,768</Td> <Td>Mdbrole.dll</Td></Tr>
<Tr><Td>2003-01-17</Td> <Td>00:31</Td> <Td>6.0.6401.0</Td> <Td>4,591,616</Td> <Td>Store.exe</Td></Tr></Table>
새 레지스트리 값 만들기
업데이트에서 이 기능을 사용하려면 새 레지스트리 값을 만들어야 합니다.
중요 이 절, 방법 또는 작업에는 레지스트리를 수정하는 방법에 대한 단계가 포함되어 있습니다. 그러나 레지스트리를 잘못 수정하면 심각한 문제가 발생할 수도 있으므로 다음 단계를 주의하여 수행해야 합니다. 추가 보호 조치로 레지스트리를 수정하기 전에 해당 레지스트리를 백업하는 것이 좋습니다. 이렇게 하면 문제가 발생하는 경우 레지스트리를 복원할 수 있습니다. 레지스트리 백업 및 복원 방법에 대한 자세한 내용은 다음 문서 번호를 클릭하여 Microsoft 기술 자료 문서를 참조하십시오.
322756 (http://support.microsoft.com/kb/322756/) Windows XP 및 Windows Server 2003에서 레지스트리를 백업, 편집 및 복원하는 방법
Exchange 2000 컴퓨터에 레지스트리 항목을 추가하려면 다음 단계를 수행하십시오.
1.
시작, 실행을 차례로 클릭한 다음 regedt32.exe를 입력합니다.
2.
다음 레지스트리 키를 찾습니다. HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MSExchangeIS\<Exchange Server Name>\Private-<long hexadecimal string>
3.
편집 메뉴에서 값 추가를 클릭한 다음 값 이름 상자에 Temporary DB Size Limit Extension
4.
데이터 형식으로 REG_DWORD를 선택한 다음 확인을 클릭합니다.
5.
값 1을 입력한 다음 확인을 클릭합니다.
6.
레지스트리 편집기를 종료합니다.
특정 데이터베이스에 대해 Temporary DB Size Limit Extension 레지스트리 값이 있고 값이 0 이외의 값으로 설정된 경우 데이터베이스 크기 제한은 1GB씩 증가됩니다. 그러나, 이 레지스트리 값은 동적으로 읽는 것이 아니고 데이터베이스가 시작될 때만 읽습니다. Exchange 정보 저장소가 시작되면 임시 데이터베이스 크기 제한을 사용한다는 것을 알려주는 이벤트 9657이 경고로 기록됩니다.
참고 복구 프로세스 동안 임시 17GB 제한을 초과하는 사서함 저장소에 새 전자 메일 콘텐츠가 추가되지 않도록 하려면 사서함 저장소를 탑재하기 전에 SMTP(Simple Mail Transfer Protocol) 및 Microsoft Exchange MTA Stacks 서비스를 중지하는 것이 좋습니다. 이 메타데이터를 제거하는 방법에 대한 자세한 내용은 다음 문서 번호를 클릭하여 Microsoft 기술 자료 문서를 참조하십시오.
Database Size Limit Configuration and Management / 2008-08-05
Prior to Microsoft Exchange Server 2003 Service Pack 2 (SP2), there was no method to configure database size limits for Exchange Server 2003. Exchange Server 2003 SP2 introduces the following new features:
For the Standard Edition, the default configured database size limit will now be 18 GB, a 2 GB addition to the previous limit, with a new maximum size of 75 GB.
For the Enterprise Edition, there is no default configured database size limit, and no software set maximum size.
Both versions of Exchange Server 2003 with SP2 have the ability to configure a limit, a warning threshold, and a warning interval set through registry keys.
Size check done against the database now uses logical database size. Empty or white space in the database does not count against the configured database size limit; therefore, no offline defragmenting is required for recovery exceeding the configured or licensed database limits.
Limit checks, done at regular intervals, are now controlled by the store process instead of JET. The default time interval is 24 hours and this interval is configurable through the registry.
메일서버 정보를 사전에 DNS에 공개 등록함으로써 수신자로 하여금 이메일에 표시된 발송자
정보가 실제 메일서버의 정보와 일치하는지를 확인할 수 있도록 하는 인증기술
* 대다수 스팸발송자가 자신의 신원을 감추기 위하여 발송자 주소나 전송경로를 허위로 표기하거나
변경하는 경우가 많다는데 착안
SPF를 이용한 이메일 인증절차:
발신자 : 자신의 메일서버 정보와 정책을 나타내는 SPF 레코드를 해당 DNS에 등록
수신자 : 이메일 수신시 발송자의 DNS에 등록된 SPF 레코드를 확인하여 해당 이메일에
표시된 발송IP와 대조하고 그 결과값에 따라 수신여부를 결정
(메일서버나 스팸차단솔루션에 SPF 확인기능이 설치되어 있어야 함)
SPF 개발 및 도입현황:
1998년 Paul Vixie의 ‘Repudiating Mail From'에서 처음으로 아이디어가 제안된 이후
Pobox.com의 Meng Weng Wong에 의해 SPF가 개발됨
2004년 2월 IETF(Internet Engineering Task Force)에 공식 RFC(Request For Comments)로
제안되었으며, 2004년 12월 SPF의 모든 기술적 내용들이 최종 완성됨
SPF는 타 인증기술에 비해 적용이 용이하고 호환성이 좋으며 오픈소스를 기반으로 하므로
전 세계적으로 폭넓은 지지기반을 확보하고 있음
한국을 비롯한 미국, 캐나다, 일본 등 여러 국가들이 정부차원에서 사업자들을 대상으로
SPF 레코드 출판 및 확인기능 도입을 통한 스팸차단 활용을 적극 권고하고 있음
통합 White Domain 등록제란?
정상적으로 발송하는 대량 이메일이 RBL이력으로 간주되어 차단되는 것을 방지하기
위하여, 사전에 등록된 개인이나 사업자에 한하여 국내 주요 포탈사이트로의 이메일
전송을 보장해주는 제도입니다. ( 무료 )
* 단, White Domain으로 등록되었다 하더라도 이후 모니터링을 통해 RBL이력발송 사실이
확인되면, 즉각 차단 조치되며 White 리스트에서도 삭제될 수 있습니다.
기존에 개별 포탈에서 'IP 등록제', 'IP 실명제'등의 이름으로 운영해오던 것을
2006년 9월 1일부로 KISARBL이 등록접수/관리/운영을 통합한 것이므로,
KISARBL에 White Domain으로 등록하게 되면 , 여러번 별도로 등록할 필요없이 참여하고
있는 포탈사이트에 동시에 등록됩니다 .
; 수신측 서버의 응답지연. 수신서버의 트래픽등으로 메일을 수신 받지 못하는 상황에서 발송자에게 리턴 메일을 보냄.
▶ 421-Microsoft ESMTP MAIL Service, Version: 5.0.2195.5600 ready at Service not available, closing transmission channel
; MS사의 smtp 서버의 장애로 인해 메일을 수신받지 못하는 상황에서 리턴된 메시지.
▶421 4.3.2 Your IP(218.236.206.104) is filtered and this connection will be closed. You must register your IP to spammasters@hanafos.com By SpaceLee, the Lord of mail server.
; 우리쪽 (mail.hanafos.com) 서버로 메일을 발송시 필터링 조건에 위배되어 스패머로 인식되고 필터링 되어 발신자에게 리턴되는 메시지.
▶ 441 4.4.1 No answer from host
; 수신측 서버의 응답이 없어서 리턴된 메시지.
▶ 451 4.4.0 DNS resolving error
; 수신측 서버의 도메인을 못찾아 리턴된 메시지.
▶ 451 4.3.0 Other or undefined mail system status
; 수신측 메일 시스템의 프로토콜이 틀리거나 수신 smtp 서버가 아닐경우 리턴되는 메시지.
▶ 451 4.3.0 Temporary system failure. Please try again later.
; 수신 서버의 일시적인 장애로 인해 메일을 수신받지 못해 리턴된 메시지.
▶ 451 4.4.2 Bad connection (io timeout)
; 수신 서버의 응답이 없어서 응답시간이 초과 되어 리턴된 메시지.
▶ 451 Relay Server Not Ready.
; 수신측 서버에서 릴레이 기능이 안돼어 리턴된 메시지.
▶ 452 4.4.5 Insufficient disk space; try again later
; 수신서버의 디스크용량이 부족하여 메일을 수신받지 못해 리턴된 메시지.
▶ 452 4.4.5 ... Insufficient disk space; try again later
; 수신자(leoss@buffgame.com)의 메일함 용량이 부족하여 메일을 수신받지 못해 리턴된 메시지
▶ 550 Requested action not taken: mailbox unavailable
; 수신자의 메일함을 찾지 못해 리턴된 메시지.
▶ 550 Mail is reject ( filtering reject )
; 수신 서버에서 발신자의 메일 주소나 IP를 필터링 하여 거부되어 리턴된 메시지.
▶ 550 Invalid recipient lobsterss@fernand.com
; 수신자 계정을 찾지 못해 리턴된 메시지 .
▶ 550 RCPT ERROR. Mailbox doesn't exist
; 수신자 메일함이 존재 하지 않아서 리턴된 메시지.
▶ 550 5.1.1 ... User unknown
; 수신자 (hkaprkss@jeill.co.kr)계정을 찾지 못해 리턴된 메시지.
▶ 550 5.1.1 Suspended user
; 수신자의 사용자의 계정이 중단 상태.
▶ 550 5.1.2 ... Unsupported mail destination
; 수신 서버가 응답이 지연되어 리턴된 메시지.
▶ 550 5.7.1 ... Relaying denied. IP name lookup failed [211.202.13.144]
; 수신 서버에서 발신자의 IP에 대해 릴레이 거부를 하여 메일을 보내지 못해 리턴된 메시지.
; 해외 메일서버의 경우 MAPS 에 등록이 되어 메일송신이 아주 불가능한 경우가 많으며 대부분 우리쪽 서버의 IP를 고정IP로 인식하지 않고 DIAL UP을 통한 유동IP로 인식하여 생기는 문제인데 MAPS에 제외처리를 요청하면 ISP를 통해 고정IP임을 확인하는 과정을 요구합니다. 거의 처리하기 힘든 상황이 되며 해당 Site로 발신이 가능한 다른 서버를 우회하여 relay 시켜야 배달이 가능합니다.
▶ 550 5.7.1 Unable to relay for lyc4144@hanafos.net