Professional Documents
Culture Documents
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual
property rights covering subject matter in this document. Except as expressly provided in any
written license agreement from Microsoft, the furnishing of this document does not give you any
license to these patents, trademarks, copyrights, or other intellectual property.
Microsoft, MS-DOS, Windows, Windows NT, Windows Server, ActiveSync, ActiveX, Active
Directory, Hotmail, MSDN, MSN, Outlook, PowerPoint, Visual Basic, and Windows Media are
either registered trademarks or trademarks of Microsoft Corporation in the United States and/or
other countries.
The names of actual companies and products mentioned herein may be the trademarks of their
respective owners.
Module 11: Managing Data Storage and Hardware Resources iii
Instructor Notes
Presentation: This module explains how Microsoft® Exchange Server 2003 stores data and
55 minutes describes the storage technologies that Exchange can use. The module also
explains what effects hardware components have on Exchange performance and
Practices: provides students with the steps that they can take to improve performance.
40 minutes
After completing this module, students will be able to:
! Manage data storage.
! Manage disk space.
! Manage hardware upgrades.
Required materials To teach this module, you need the following materials:
! Microsoft PowerPoint® file 2400B_11.ppt
! Module 11 video file 2400B_11_v05.wmv
! Module 11 animation, How and Where Exchange Stores Data,
2400B_11A_05.html
! The job aid titled RAID Cost, Performance, and Fault Tolerance
Comparison, which is printed at the back of the instructor Delivery Guide
and the student workbook and included on the Trainer Materials DVD and
the Student Materials compact disc.
Classroom setup The classroom should be set up to use Connectix Virtual PC software, as
discussed in the Manual Classroom Setup Guide. No additional classroom setup
is needed.
iv Module 11: Managing Data Storage and Hardware Resources
Tip When this symbol appears on the lower-right corner of a slide, it indicates
that there is an inline practice for students to complete before you move on to
the next slide:
Practices Some practices in this module require initial startup time. Consider having
students perform the initial step in these practices before you begin the lecture
on the related content. If a practice begins with a procedure titled “To prepare
for this practice,” then it requires initial startup time.
Module 11: Managing Data Storage and Hardware Resources v
To show the How and Where Exchange Stores Data interactive multimedia
piece, click the projector button on the slide or open the Web page on the
Student Materials compact disc, click Multimedia, and then click the title of
the presentation. Use the three buttons to step through each part of the
multimedia piece: discuss what happened and answer student questions after
each part. Also, show students where the multimedia piece is on the Student
Materials compact disc so that they can explore the piece on their own further if
they choose.
Also mention to the students that:
! Although the multimedia piece discusses how MAPI clients access mailbox
stores, students should also understand that public folder replication is a
MAPI process and that when public folders are replicated between two
servers, regardless of what format the data was stored in on the originating
server, the data will be saved into the rich text database.
! Back-up and restore are covered later in this course, but they should at least
understand that during a successful online backup of their Exchange server,
the transaction logs are removed. This means that if they have successful
nightly backups of their Exchange databases and they have scaled their
transaction log drives properly, they should never have a case where there is
not enough room for their log files. Also, they should never manually delete
log files.
! In the multimedia piece, five storage groups are shown. Explain to the
students that only four of the storage groups are used to store user data and
that the fifth storage group is used only for disaster recovery.
When you are finished showing the multimedia piece, facilitate a discussion
about how and where Exchange stores data. Several discussion questions have
been provided in the text. If you use these discussion questions, give students a
few minutes to read the discussion questions and explore the multimedia piece
on their own before you begin the discussion.
Naming Conventions for Use the animated slide to show an example of the naming conventions that
Stores and Storage Exchange uses for mailbox stores, public folder stores, and storage groups.
Groups
Guidelines for Deleting The slide provides all the guidelines for deleting mailbox stores, public folder
Stores and Storage stores, and storage groups. You can also use this slide to point out any
Groups differences. If you have students who have deleted stores and storage groups on
the job, ask them if they have any additional guidelines to add.
vi Module 11: Managing Data Storage and Hardware Resources
How to Delete Stores Consider demonstrating to the students how to delete a store and a storage
and Storage Groups group. The students are not asked to practice this task because it is so
straightforward and they will be familiar with the user interface (UI) from the
other tasks that they have performed.
Students were taught how to add stores and storage groups in Module 2,
“Configuring and Managing Exchange Server 2003,” in Course 2400,
Implementing and Managing Microsoft Exchange Server 2003.
What Is Circular Use the animated slide to show an example of how circular logging works and
Logging? discuss the most important things to remember about circular logging. Then
have the students complete the practice in the topic to enable circular logging
on a storage group and answer any questions that they have.
How to Move Stores, Consider demonstrating to the students how to do these tasks. The students are
Mount and Dismount not asked to practice these tasks because they are so straightforward and
Stores, and Move students will be familiar with the UI from the other tasks that they have
Transaction Log Files performed.
Why Implement Mailbox This topic provides several reasons for why mailbox limits should be
Limits? implemented. Students may have additional ideas about why mailbox limits
should be implemented.
Some additional items to mention to students are that transaction logs should
always be put on a mirrored drives, because they will never grow above 10
gigabytes (GB) on a healthy system. Also, configuring Simple Mail Transfer
Protocol (SMTP) queues on separate drives is only necessary if they have a
large volume of message traffic. For instance, they would want this for large-
scale servers or for bridgehead servers and inbound and outbound Internet
gateways.
How to Choose the Best It is important that students understand that appropriate RAID levels vary from
RAID Levels for Your company to company. This topic was designed to emphasize that point.
Environment
Show students where the job aid RAID Cost, Performance, and Fault Tolerance
Comparison resides—printed at the back of the student workbook. Mention that
a copy of the job aid is also included on the Student Materials compact disc.
Have students complete the practice in the topic, and then facilitate a discussion
and answer any questions that they have. This practice will teach students to
make decisions, so the answers that they devise may be different from the
answers that are provided. This difference is acceptable, but make sure that
students can defend their answers.
During this discussion, be prepared to explain to the students that they should
always try to make performance and reliability the controlling factors in
selecting a storage solution for Exchange. Budget is always an issue, but when
possible, budget should not be the controlling factor in selecting a storage
solution for Exchange.
Again, students must understand what we mean by RAID-0+1. This topic is
discussing striped mirrors. However, for mirrored stripes, if any two drives fail
(as long as one is on each of the stripes), it will bring down the server, and
many RAID vendors do this exact configuration. Emphasize to your students
that RAID-1 is more reliable than mirrored stripes and that they must make sure
they understand what their hardware vendor is selling them.
Explain to your students that when deciding on a RAID solution, they must
understand how reads and writes are performed for each RAID type. For every
RAID configuration, a read requested by the operating system does one read on
the disk system. However, for writes, this is not the case:
! For RAID-0, each write requested by the operating system performs one
physical write in the disk subsystem.
! For RAID-0+1, each write requested by the operating system performs two
physical writes in the disk subsystem.
! For RAID-5, each write requested by the operating system performs two
writes and two reads.
Discussion
The scenarios in this discussion were designed to allow students to reflect on
what they did in the module and to give them an opportunity to ask any
remaining questions that they have. Use the discussion scenarios to provide a
summary of the module content. You can also return to the module overview
slide and use it to help summarize the lessons covered in this module.
You can do this activity with the entire class. Or, if you have time, have
students work in small groups to come up with solutions to the problems in the
scenarios and then present and discuss their ideas with the class.
Before taking part in the discussion, students should have completed all of the
practices. Students who have not completed the practices may have difficulty
taking part in the discussion.
Assessment
Assessment questions for this module are located on the Student Materials
compact disc. You can use the assessment questions in whatever way you think
is best for your students. For example, you can use them as pre-assessments to
help students identify areas of difficulty. Or, you can use them as post-
assessments to validate learning. Consider using the questions to reinforce
learning at the end of the day or at the beginning of the next day. If you choose
not to use the assessment questions during class, show students where they are
so that they can use them to assess their own learning outside of class.
Module 11: Managing Data Storage and Hardware Resources 1
Overview
Instructions Your instructor will step through the interactive multimedia piece to show how
Exchange stores data. When you have finished viewing the all three parts of the
multimedia piece, answer the two discussion questions that follow and be
prepared to discuss your answers with the rest of the class.
Tip To explore the How and Where Exchange Stores Data interactive
multimedia piece on your own, open the Web page on the Student Materials
compact disc, click Multimedia, and then click the title of the presentation.
4 Module 11: Managing Data Storage and Hardware Resources
Discussion question 1 You are an administrator at Northwind Traders and your server running
Exchange server fails during the processing of an incoming e-mail message sent
by a client. What happens to the message?
Exchange ensures that all the operations are completed or the transaction
will not be completed. Because not all the operations in the transaction
were complete, the message cannot be successfully delivered. The sending
host will hold the message in its outbound queue and attempt redelivery.
As long as your Exchange server is recovered in the sending server’s retry
window, the message will be delivered when your server is restored.
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
Discussion question 2 You are the administrator for a medium-sized company and receive a call from
one of your technicians. She tells you that she is browsing your Exchange
server’s file system and discovered a folder that contains these files: E02.chk,
E02.log, E0200001.log, Res1.log, and Res2.log. She asks you if you know what
these files are used for and if it is acceptable to delete them to create some
available space on your Exchange volumes. What do you tell her?
Tell her that the following files are used by Exchange and that she must not
delete them:
• E02.log and E0200001.log. For each storage group, Exchange creates a
transaction log file named Exx.log. When that log file is full and
Exchange rolls over to a new log file, the new transaction log file
becomes Exx.log, and the old Exx.log file is renamed to Exx00001.log.
• E02.chk. For each storage group, a file called the checkpoint file tracks
the location of the last committed transaction that has been fully copied
to the database file. One checkpoint file is maintained for the series of
log files in each storage group and is named Exx.chk.
• Res1.log and Res2.log. For each storage group, two transaction log files
are created at the initialization of an Extensible Storage Engine (ESE)
database to provide resources in low-disk-space situations. When the
server runs out of disk space, each storage group reserves two log files,
Res1.log and Res2.log, which are stored in the transaction log file
folder.
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
Module 11: Managing Data Storage and Hardware Resources 5
Tip The procedure for adding stores and storage groups by using Exchange
System Manager are included in Module 2, “Configuring and Managing
Exchange Server 2003,” in Course 2400, Implementing and Managing
Microsoft Exchange Server 2003.
10 Module 11: Managing Data Storage and Hardware Resources
When to use circular You can use circular logging if data recovery is not important. For example,
logging you could use it on a front-end server that does not have mailboxes or public
folders, and where data would never need to be recovered.
If the data on the server is critical to your company, maintain the server’s
default setting by keeping circular logging disabled and implementing an
appropriate backup strategy that will correctly remove log files. Performing a
full online backup removes old log files, so if circular logging is disabled and
you perform full online backups frequently, you do not need to worry about the
logs occupying too much space.
Practice: Enabling In this practice, you will create a storage group with circular logging enabled.
circular logging on a
storage group
Important To complete the practices in this module, you must be logged on to
2400_London-Virtual PC as NWTraders\LondonAdmin with a password of
P@ssw0rd and run the script entitled “2400A_11_Setup.vbs” located in the
C:\MOC\2400\practices\Mod11 folder.
Note This procedure may take five minutes to complete before you can
continue.
To mount and dismount You must mount a store before a client can access it—mounting a store means
stores that you must bring the store online. You must also dismount a store before
moving its transaction log files and database files or before restoring it from
backup.
To take a specific store offline and bring it online again, use the Mount Store
and Dismount Store commands, which are on the store context menu. These
commands are toggle options, which means that Exchange only displays the
available action. The Microsoft Exchange Information Store service must be
running before you can use these commands.
Module 11: Managing Data Storage and Hardware Resources 13
Warning Users are not automatically warned that the server is dismounting a
store. You will see a warning that dismounting the database will disconnect all
users when you select this option. Use the mailbox container in Exchange
System Manager to view which users have mailboxes in the store and verify
that they are not connected to their mailboxes before you continue.
To move transaction log To relocate transaction log files, use the General tab in the Properties dialog
files box for the storage group. When you change the location of the transaction log
files, all the stores in the storage group are dismounted, the transaction log files
are moved, and the stores are then remounted.
Note Before you implement any mailbox limits that impact your users, clearly
communicate these changes to your users. By communicating any changes, you
will improve the user experience and help reduce support calls after the change
has been implemented. For detailed information about how to configure storage
limits either on a mailbox store or by using a mailbox store policy, see
Module 2, “Configuring and Managing Microsoft Exchange Server 2003,” in
Course 2400, Implementing and Managing Microsoft Exchange Server 2003.
16 Module 11: Managing Data Storage and Hardware Resources
Note For more information about clustering, see Course 2087, Implementing
Microsoft Windows® 2000 Clustering.
18 Module 11: Managing Data Storage and Hardware Resources
External storage Also called direct attached storage, this is a storage solution that uses an external SCSI drive
array cabinet to hold multiple SCSI disk drives and other hardware, usually configured as a RAID set. It
is connected with SCSI cables directly to your Exchange server. This type of storage provides
good performance but limited scalability, and must be managed on a per-server basis. External
storage arrays can be adequate storage solutions for smaller Exchange organizations.
Network- A network-attached storage solution is any storage product set up with its own network address
attached storage rather than being attached to the server. The network-attached storage device is attached directly to
the Ethernet network through SCSI or Fibre Channel connections and assigned an IP address. File
requests are mapped by the main server to the network-attached storage file server.
Exchange has local data access and I/O bandwidth requirements that network-attached storage
products do not typically meet so they are not supported by Microsoft. However, several network-
attached storage devices can also be directly attached to Microsoft Windows-based servers, which
will allow them to run Exchange. Only if the network-attached storage device and its associated
configuration is on the Windows Hardware Compatibility List (HCL) will it be supported for
Exchange 2003. It is recommended that you contact your hardware or storage vendor before you
deploy any network-attached storage solution to obtain assurance that the end-to-end solution is
designed for use with Exchange. Many hardware and storage vendors have best practices guides
for Exchange.
Module 11: Managing Data Storage and Hardware Resources 19
(continued)
Storage
technology Description
Storage area A storage area network solution connects multiple servers and different storage devices on a single
network network. A storage area network provides storage and storage management capabilities for
company data. Storage area networks use Fibre Channel switching technology to provide fast and
reliable connectivity between storage and applications, allowing many servers to connect to a
single storage area network.
The recommended Storage area networks are complex, and they require specialized knowledge to
storage solution for design, operate, and maintain. They are also a more expensive solution than
Exchange external storage arrays and network-attached storage solutions. However, it is
recommended that storage area networks be used to store Exchange data, such
as mailbox and public folder stores, because storage area network
configurations optimize server performance and reliability and are also highly
scalable. Storage area networks are good storage solutions for large Exchange
organizations.
If you implement a storage area network solution in your Exchange
organization, you receive the following benefits:
! Storage area networks meet Exchange’s high I/O bandwidth requirement.
Storage area networks use a channel-attached disk storage system and
generally have a large RAM cache. This keeps even disk access from
becoming a bottleneck in most cases.
! Storage area networks meet the Exchange requirement that mailbox and
public folder stores exist on a drive that is local to the Exchange server.
Storage area network solutions connect directly to Exchange servers through
a local Fibre Channel connection. The operating system sees these drives as
direct-attached drives.
! Storage area networks are highly scalable. This is an important
consideration for Exchange. As e-mail data grows and mailbox limits are
continually challenged, you must increase storage capacity and I/O rates. As
your organization expands, a storage area network allows you to easily add
disks to your storage. Select a storage area network that incorporates storage
virtualization, which allows you to easily add storage and quickly reallocate
it to your Exchange servers. With storage virtualization, you can purchase
storage disks in accordance with your budget; even if the disks are of
various capacities, a storage area network that features storage virtualization
is capable of immediately using all available disk space.
20 Module 11: Managing Data Storage and Hardware Resources
System and Configure a separate drive and provide fault tolerance. RAID-1
boot files
Pagefile Configure a separate drive. No fault tolerance is required. Using a separate drive No RAID required
reduces recoverability because no memory dump will be created during system
failure.
SMTP Configure a separate drive and provide good throughput with fault tolerance. RAID-1
queue Although messages are typically stored in the SMTP queue for a short time, if a
directory failure occurs downstream, the SMTP queue could be required to store a large
amount of data. Using RAID-1 provides a good solution because it provides fault
tolerance while providing adequate throughput. You must ensure that your RAID-
1 volume is large enough to handle instances in which your SMTP queue grows
unexpectedly.
.edb and Configure a separate drive and provide fault tolerance. Optimize for performance RAID-1, RAID-5,
.stm files or capacity. After you optimize for reliability, your storage solution is based on a or RAID-0+1,
(or database choice between optimizing performance (RAID-1) and optimizing capacity depending on
files) (RAID-5). If possible, use RAID-0+1 for these files. You could store public what you are
folder database files on a RAID-5 array, because data on public folders is usually trying to optimize
written once and read many times. RAID-5 provides better read performance than for
write performance.
22 Module 11: Managing Data Storage and Hardware Resources
(continued)
Category Guidelines Recommendation
Transaction Configure on a separate drive from .edb and .stm files. Split the transaction logs RAID-0+1
log files and database onto separate disk spindles to take advantage of sequential writes.
The spindle set should be dedicated only to logs. For example, you will not
receive the performance benefits of the split if you choose to place the pagefile or
Windows binary files on the same spindle set as the logs. Provide fault tolerance
with best performance. Use a separate drive for the transaction log files for each
storage group. If you are using a storage area network solution, use separate
virtual drives. Protect the drives against failure. Transaction log files are critical to
the operation of a server.
Note For more information about hard disk configuration, see the white paper
Storage Solutions for Microsoft Exchange 2000 Server in the Additional
Reading section of the Student Materials compact disc.
Module 11: Managing Data Storage and Hardware Resources 23
Note To balance the cost, performance, and fault tolerance of the RAID
solutions, you can use the job aid titled RAID Cost, Performance, and Fault
Tolerance Comparison that is printed at the back of the student workbook. For
more information about storage solutions, see the white paper Storage Solutions
for Microsoft Exchange 2000 under Additional Reading on the Web page on
the Student Materials compact disc.
Practice: Choosing the Read the following scenarios, determine a solution, and then discuss your
best RAID levels for solution with the class.
your environment
To determine the best storage solution for your database files and your
transaction log files, use the job aid RAID Cost, Performance, and Fault
Tolerance Comparison, which is printed at the end of the workbook, and the
guidelines and recommendations in this lesson. A copy of the job aid is also
included in the Job Aids folder on the Student Materials compact disc.
Scenario 1 You have just been given your budget for the upcoming fiscal year and you
have limited funds to purchase storage for your new Exchange server. You
must select a storage solution for your mailbox store and transaction log files
that gives you the best performance while still maintaining fault tolerance for
your data. Which RAID solution should you implement?
Because your budget is limited, you should choose a solution that provides
fault tolerance but that gives you the best use of your storage. Choosing a
RAID-5 array for the mailbox database and a RAID-1 array for the
transaction logs would require the fewest hard disks while still providing
the level of fault tolerance that you need.
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
Scenario 2 Given the same scenario as in Scenario 1, if you did not have any budgeting
constraints, would you implement a different RAID solution? Why or why not?
Yes. If budget was not an issue, using RAID-0+1 would be the best choice
for the databases and the log files. RAID-0+1 will give you excellent
performance while providing a fault-tolerant solution that has the least
amount of risk associated with it.
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
Module 11: Managing Data Storage and Hardware Resources 25
Note Before you add additional storage, contact your hardware or storage
vendor for information about which procedures for performing the upgrade they
support.
26 Module 11: Managing Data Storage and Hardware Resources
! If you are running Exchange 2003 on Windows Server 2003, set the
/USERVA=3030 parameter in the Boot.ini file. Setting this parameter
allows for more system page table entries on the server, which are critical
for larger systems.
30 Module 11: Managing Data Storage and Hardware Resources
! Do not let the Store.exe process run out of virtual address space. When
virtual memory in the store process runs low, the performance of your
Exchange server can decrease dramatically. Depending on the size of the
largest free block of virtual memory, you may need to restart the
information store service or restart the Exchange server.
Path HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet
\Control\Session Manager
Parameter HeapDeCommitFreeBlockThreshold
Type REG_DWORD
Default Not present
Recommend setting: 0x00040000
32 Module 11: Managing Data Storage and Hardware Resources
In most scenarios, these steps will resolve most virtual address space
consumption issues. On larger servers, more tuning may be required to realign
the balance between performance and scalability; this involves changing the
store database cache size, as described in the next topic.
Important If you see values that are higher than the preceding values for
either configuration, do not increase the size of your maximum store
database cache size. If you see values that are lower for either configuration,
you may be able to increase your maximum store database cache size. For
example, if you have a server configured with the /3GB switch, and the
performance monitor shows the virtual bytes count at 2.5 GB under a heavy
load, you may be able to increase your maximum store database cache size
by ~300 MB, for a total of 1,200 MB.
Module 11: Managing Data Storage and Hardware Resources 35
! On very large mailbox servers, you may need to decrease the default store
database cache size to prevent system instabilities. Unfortunately,
increasing the store database cache size sometimes has a negative effect on
server performance. A larger store database cache means more virtual
address space consumption. Therefore, if your server already lacked
sufficient address space, increasing the store database cache may result in
system instability.
! Set the msExchESEParamCacheSizeMax parameter to an exact multiple
of 8,192 for maximum efficiency. The msExchESEParamCacheSizeMax
parameter controls the store database cache size. Its value is expressed in a
count of pages. These values do not appear by default when you view the
properties of the msExchESEParamCacheSizeMax attribute.
Use the following values as your starting point for adjusting the store
database cache. For example, if you have used the /3GB switch and you
need to increase your store database cache, the value that you enter should
be larger than 229,376 but smaller than 307,200:
• Default size on /3GB servers = 229,376 (896 MB)
• Default size on non /3GB servers = 147,456 (576 MB)
• Recommended maximum = 307,200 (1.2 GB)
• Very large servers lacking sufficient address-space = 196,608 (768 MB)
Note The transaction log replay will be significantly faster if the store database
cache is set to a large size. Consider temporarily increasing the store database
cache size to 307,200 in disaster recovery scenarios.
36 Module 11: Managing Data Storage and Hardware Resources
4. Close the ADSI Edit tool and then wait for Microsoft Active Directory®
directory service replication to replicate this new value throughout the
forest. The amount of time that this will take depends on your environment.
5. Restart the Information Store service on the server running Exchange
Server 2003.
Practice: Configuring In this practice, you will configure Exchange performance settings.
Exchange performance
settings
Important Because the virtual PCs used in this classroom do not have extra
memory, you will not save your changes when you complete this practice.
2. In the Shut Down dialog box, click Save PC state and keep changes,
verify that the Commit hard drive changes now check box is selected, and
then click OK.
3. Restart 2400_London-Virtual PC.
Are there any circumstances in which you would want to decrease the
default store database size cache?
On very large mailbox servers, you may need to decrease the
default store database cache size to prevent system instabilities. A
larger store database cache means more virtual address space
consumption. Therefore, if your server already lacked sufficient
address space, decreasing the store database cache may result in
better system stability.
Module 11: Managing Data Storage and Hardware Resources 39
Note Depending on how many mailboxes you are moving, your log files
may experience unusual growth. Monitor transaction logs during the move
to make sure that you do not run out of storage space on the drive where
your transaction logs are located.
5. Use Exchange Tasks in Active Directory Users and Computers to select the
user accounts for the users whose mailboxes you want to move and select
the server running Exchange 2003 and the associated mailbox store to
which you want to move the mailboxes.
6. Test the move mailbox procedure by checking the application and system
event logs for any Exchange-related errors. Also, connect to a mailbox on
the new server to ensure that messages, calendar items, contacts, and to-do
lists have moved properly.
7. Back up the new server running Exchange 2003.
8. Move public folders to the new server running Exchange 2003 by
replicating public folders from the old server and removing replicas. Use
the pfMigrate tool to do this.
9. Move any connectors to the new server. If the old server is acting as a
bridgehead server for any connectors, you must move the connectors to the
new server before you remove the old server.
10. Remove the old server. Uninstall the old server to remove it from the
Exchange organization.
Note For more information about removing the server, see Module 2,
“Configuring and Managing Exchange Server 2003,” in Course 2400,
Implementing and Managing Microsoft Exchange Server 2003.
For additional assistance with the upgrade process, browse to the
Support Tools\ExDeploy folder on the Exchange Server 2003 compact disc,
and review the Microsoft Exchange Server Deployment Tools (ExDeploy) tool.
42 Module 11: Managing Data Storage and Hardware Resources
Where do I get The pfMigrate tool is in the ExDeploy folder on the Exchange 2003 compact
pfMigrate? disc, under Support Tools. You can run the tool at the command prompt, either
on the Exchange server or from the administrative console.
Module 11: Managing Data Storage and Hardware Resources 43
• Tune your system in stages. If you make many changes all at once and
the performance of your server degrades, you will not know which
change had the negative effect and will have to back out all changes.
• If your server is not exhibiting performance problems, be cautious in
making performance-tuning adjustments.
! Choose appropriate hardware and configure it properly. The hardware that
you choose for your Exchange deployment will have the greatest impact on
the performance that you receive. Choose the best possible hardware
components that you can afford based on the role of your Exchange server.
Also, ensure that all firmware for your hardware is current and up to date.
44 Module 11: Managing Data Storage and Hardware Resources
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
Module 11: Managing Data Storage and Hardware Resources 47
Scenario 2 When you migrated your users to Exchange Server 2003, you calculated
mailbox store storage requirements by multiplying the number of mailboxes on
the server by the size of the mailboxes in your former messaging system. You
notice that the average size of the mailboxes on the Exchange Server 2003 is
growing at a tremendous rate, and you are concerned about running out of disk
space. What should you do?
To control the current growth situation, you should establish a policy that
encourages users to clean out their own mailboxes. This policy should be in
two parts: an actual storage limit on their mailbox that, when exceeded,
causes the user to lose functionality, and a mailbox management routine in
which you configure Exchange to systematically delete particular messages
from user mailboxes (for example, deleted items that are more than one
year old). The policy should be communicated to all users so that no
surprises occur.
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
Scenario 3 The performance of your server running Exchange Server 2003 has been
degrading slowly for several months. You received approval to add additional
memory to the server so that the server now has 4 GB of memory, but the
performance of the server does not appear to be improving. What else must you
do to improve your performance?
For your server running Exchange to use more than 1 GB of memory, you
must edit the Boot.ini file on the server and add the /3GB switch. If your
server is also running on a member of the Windows Server 2003 family,
you should include the /USERVA=3030 switch. After you make these
changes, you must restart your server.
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
THIS PAGE INTENTIONALLY LEFT BLANK