Installation Guide Template Exchange 2010 With Dag
Installation Guide Template Exchange 2010 With Dag
Installation Guide Template Exchange 2010 With Dag
Exchange 2010 3 out of 3 rated this helpful - Rate this topic Applies to: Exchange Server 2010 SP3, Exchange Server 2010 SP2 Topic Last Modified: 2012-03-06 This topic provides you with an installation guide template that you can use as a starting point for formally documenting your organization's server build procedures for Microsoft Exchange Server 2010 servers that will have the Mailbox server role installed in a database availability group (DAG) configuration. The template includes the following key sections: Executive Summary Server Configuration Verification Steps Exchange Server Role Installation Exchange Server Role Configuration Appendix: Server Configuration
For purposes of providing an example, the template uses the fictitious company name of Contoso. Also, you can download this template, along with templates for other server roles, as a download package in .zip file format at Microsoft Exchange Server 2010 Install Guide Templates (http://go.microsoft.com/fwlink/?LinkID=187961).
Executive Summary
The purpose of this document is to explain the installation and configurations necessary to install the Exchange 2010 Mailbox server role and create a database availability group (DAG) on the Windows Server 2008 platform.
Business Justification
By having an installation guide, Contoso will be able to ensure standardization across the enterprise, reducing total cost of ownership (TCO), and easing troubleshooting steps.
Scope
The scope of this document is limited to installation of an Exchange 2010 Mailbox server and creation of a database availability group (DAG) for Contoso on the x64 version of the Windows Server 2008 (SP2 or R2) operating system.
Prerequisites
The administrator should have working knowledge of Windows Server 2008 concepts, Exchange 2010 concepts, the Exchange Management Console and Exchange Management Shell, the command line, and various system utilities. This document does not elaborate on the details of any system utility except as necessary to complete the tasks within. In addition, before implementing the server role, the administrator should review the Overview of the Mailbox Server Role topic in the Exchange Server 2010 Library (http://go.microsoft.com/fwlink/?LinkId=187526).
Assumptions
This document assumes that Windows Server 2008 x64 Edition is installed on the intended Client Access server per company baseline regulations which include the latest approved service pack and hotfixes. In addition, the following system prerequisites have been installed: Microsoft .NET Framework 3.5 SP1 and the update for .NET Framework 3.5 SP1 For more information, see Microsoft Knowledge Base article 959209,An update for the .NET Framework 3.5 Service Pack 1 is available (http://go.microsoft.com/fwlink/?linkid=3052&kbid=959209). Windows Management Framework (Windows Remote Management 2.0 and Windows PowerShell 2.0).
This document assumes that forest and domain preparation steps have been performed as described in the Prepare Active Directory and Domains topic in the Exchange Server 2010 Library (http://go.microsoft.com/fwlink/?LinkId=187262). This document assumes that the account you will be using for the Exchange tasks has been delegated the Server Management management role, as described in the Server Management topic in the Exchange Server 2010 Library (http://go.microsoft.com/fwlink/?LinkId=187265). This document also assumes that both Exchange 2010 Windows Server 2008 and Windows Server 2008 will be secured following the best practices found in the Windows Server 2008 Security Guide (http://go.microsoft.com/fwlink/?LinkId=122593).
Important: The procedures within this document should be followed sequentially. If changes are made out of sequence, occur.
Server Configuration
The following media are required for this section. Windows Server 2008 installation files
The following procedures are in this section: 1. 2. 3. 4. 5. Additional Software Verification Network Interfaces Configuration - MAPI Network Network Interfaces Configuration - Replication Network Drive Configuration Windows Server 2008 Hotfix Installation
6. 7. 8. 9. 10. 11.
Domain Membership Configuration Local Administrators Verification Local Administrator Account Password Reset Debugging Tools Installation Page File Modifications Drive Permissions
Drive Configuration
1. 2. 3. 4. Connect to the server through Remote Desktop and log on with an account that has local administrative access. Click Start > Administrative Tools, and select Computer Management. Expand Storage and click Disk Management. Open the Disk Management Microsoft Management Console (MMC) and format, rename, and assign the appropriate Drive Letters so that the volumes and DVD drive match the appropriate server configuration. Refer to the Database Log/LUN Appendix at the end of this document for the actual drive configuration that should be used.
Drive configuration
LUN 1 2 Drive letter C E Usage Operating system, Exchange binaries, and tracking logs Exchange databases
4 5-x 6
L -Z
Exchange transaction logs Additional drives for databases and logs DVD drive
3.
4.
Note:
These dialog boxes will not appear in environments that have not deployed the Windows Security tem
5.
Wait for all file copies to complete, and then restart the server. You can use the Processes tab in Windows Task Manager to monitor the hotfix installation progress. When the wusa.exe process has exited, the hotfix installation is complete.
9.
3.
5.
6. 7. 8.
Click the Advanced tab. Under Virtual Memory, click Change. On servers that have a dedicated page file drive, follow these steps: a. In the Drive list, click C:, and then click Custom size. b. For the C: drive, set the Initial Size (MB) value to a minimum of 200 MB. (Windows requires between 150 MB and 2 GB page file space, depending on server load and the amount of physical RAM that is available for page file space on the boot volume when Windows is configured for a kernel memory dump. Therefore, you may be required to increase the size.) c. For the C: drive, set the Maximum Size (MB) value to that of the Initial Size. d. In the Drive list, select the page file drive (for example, the P: drive), and then click Custom size. e. In the Initial Size (MB) box, type the result of one of the following calculations: If the server has less than 8 GB of RAM, multiply the amount of RAM times 1.5. If the server has 8 GB of RAM or more, add the amount of RAM plus 10 MB. f. In the Maximum Size (MB) box, type the same amount that you typed in the Initial Size box. g. Delete all other page files. h. Click OK. 9. On servers that do not have a dedicated page file drive, follow these steps: a. In the Drive list, click C:, and then click Custom size. b. For the C: drive, in the Initial Size (MB) box, type the result of one of the following calculations: If the server has less than 8 GB of RAM, multiply the amount of RAM times 1.5. If the server has 8 GB of RAM or more, add the amount of RAM plus 10 MB. c. Delete all other page files. d. Click OK. 10. Click OK two times to close the System Properties dialog box. 11. Click No if prompted to restart the system.
Note:
For more information about page file recommendations, see the following Microsoft Knowledge Bas the appropriate page file size for 64-bit versions of Windows Server 2003 or Windows XP (http://go.microsoft.com/fwlink/?linkid=3052&kbid=889654); andOverview of memory dump fi Vista, Windows Server 2008, Windows Server 2003, Windows XP, and Windows 2000(http://go.microsoft.com/fwlink/?linkid=3052&kbid=254649).
Drive Permissions
1. 2. 3. 4. 5. 6. 7. Connect to the server through Remote Desktop, and then log on with an account that has been delegated local administrative access. Click Start and select Computer. Right-click D Drive and select Properties. Click the Security tab. Click Edit. Click Add, and then select the local server from Locations. Grant the following rights as outlined in the following table.
Drive permissions
Account Administrators SYSTEM Authenticated Users CREATOR OWNER
8. 9. 10. 11. 12. 13.
Permissions Full Control Full Control Read and Execute, List, Read Full Control
Click the Advanced button. Select the CREATOR OWNER permission entry, and then click View/Edit. Select Subfolders and Files Only from the drop-down list. Click OK two times. Click OK to close the drive properties. Repeat steps 3-12 for each additional drive (other than the C drive).
Verification Steps
The following procedures are in this section: 1. 2. 3. 4. Organizational Unit Verification Active Directory Site Verification Domain Controller Diagnostics Verification Exchange Best Practices Analyzer Verification
Important: The procedures within this document should be followed sequentially. If changes are made out of sequence, occur.
3.
Verify that the server is in the correct domain and Active Directory site. At the command line, type the following: 4. NLTEST /server:%COMPUTERNAME% /dsgetsite 5. The name of the Active Directory site to which the server belongs will be displayed. If the server is not in the correct Active Directory site, submit a change request to the appropriate operations group and have the server moved to the appropriate Active Directory site.
Note:
Change <domain Controller> to a domain controller contained within the same Active Directory sit
5. 6.
Review the output of C:\dcdiag.log file, and verify that there are no connectivity issues with the local domain controller. Repeat steps 3 and 4 for each domain controller in the local Active Directory site.
Note:
Domain Controller Diagnostics (DCDiag) is a Windows support tool that tests network connectivity domain controllers. If the account being used does not have administrative privileges, several tests un tests heading may not pass. These tests can be ignored if the connectivity tests pass. In addition, the service validation tests did not pass. These messages can be ignored if the services do not exist on th
5. 6. 7.
Provide the appropriate information to connect to Active Directory, and then click Connect to the Active Directory server. In the Start a New Best Practices Scan, select Health Check, and then click Start Scanning. Review the report, and take action on any errors or warnings that are reported by following the resolution articles that are provided within the Best Practices Analyzer.
The following procedures are in this section: 1. Exchange 2010 Prerequisites Installation for: o Windows Server 2008 SP2 -oro Windows Server 2008 R2 Exchange 2010 Installation Exchange 2010 Update Rollup Installation Product Key Configuration Exchange Search Configuration System Performance Verification Test Mailbox Creation
2. 3. 4. 5. 6. 7.
Important: The procedures within this document should be followed sequentially. If changes are made out of sequence, occur.
Important:
If this is the first Mailbox server role being installed into an organization that does not contain any version o you have client computers running Microsoft Office Outlook 2003, you must also specify the optional /Enab parameter. In addition, if this is the first Exchange 2010 server role being installed into an environment that version of Microsoft Exchange, you must also specify the/OrganizationName setup parameter.
1.
Connect to the server through Remote Desktop and log on with an account that has local administrative access and was delegated the Server Management or Delegated Setup role if the server was pre-created. 2. Follow the procedure detailed in the Install Exchange 2010 in Unattended Mode topic in the Exchange Server 2010 Library (http://go.microsoft.com/fwlink/?LinkId=187229). For example, the following command installs the Mailbox server role , provides a custom database name, database path, and transaction log file location. 3. setup.com /r:MB /mdbName "<DAGName> MBX Store 1" /dbfilepath e:\mdb1\priv01.edb /logfolderpath l:\log01 4. Do not restart the server, even if required.
1. 2. 3.
Connect to the server through Remote Desktop, and then log on with an account that has local administrative access. Obtain the latest company approved rollup, and then copy it to the server. Launch the Windows Installer patch (the MSP file) setup via one of two ways: a. Double-click the MSP file, and then follow the GUI instructions. b. Perform a silent installation using the following command from an administrative command prompt: c. msiexec /i <Path and filename of MSP file> /q Click Yes for any Digital Signature not Found dialog boxes that may appear.
4.
Note:
These dialog boxes will appear only in environments that have deployed the Windows Security temp
Note: The third-party Web site information in this topic is provided to help you find the technical information you subject to change without notice.
By default, Exchange 2010 optimizes the servers processor scheduling management for background services. 1. 2. 3. 4. Connect to the server through Remote Desktop, and then log on with an account that has local administrative access. Click Start, right-click Computer, and then select Properties. Select the Advanced System Settings. Under Performance, click Settings. a. Click the Advanced tab. b. Verify that Processor Scheduling is set to Background Services. Click OK.
5.
2. 3. 4. 5.
Important: The procedures within this document should be followed sequentially. If changes are made out of sequence, occur.
If the DAG has been created, you can skip this section. 1. 2. 3. Make sure that there are no pending reboots for the server before adding it to a DAG. Launch the Exchange Management Shell with an account that has been delegated the Organization Management role. In environments where computer account creation is restricted or where computer accounts are created in a container other than the default computers container, you must pre-stage the cluster network object (CNO) and then provision the CNO by assigning permissions to it. Follow the procedures documented in the Pre-stage the Cluster Network Object for a Database Availability Group topic in the Exchange Server 2010 Library (http://go.microsoft.com/fwlink/?LinkId=187665). Create a database availability group by following the procedures documented in the Create a Database Availability Group topic in the Exchange Server 2010 Library (http://go.microsoft.com/fwlink/?LinkId=187666). Configure the database availability group properties such as the witness settings, replication port, compression, and encryption by following the procedures documented in the Configure Database Availability Group Properties topic in the Exchange Server 2010 Library (http://go.microsoft.com/fwlink/?LinkId=187667).
4.
5.
MAPI Networks
o o
MBX-1 and MBX-2 have MAPI networks on 192.168.0.0/24 MBX-3 and MBX-4 have MAPI networks on 192.168.1.0/24
Replication Networks o o MBX-1 and MBX-2 have replication networks on 10.0.0.0/24 MBX-3 and MBX-4 have replication networks on 10.0.1.0/24
3. To collapse these networks, run the following commands. 4. Set-DatabaseAvailabilityGroupNetwork <DAGName>\DAGNetwork01 -Subnets 192.168.0.0/24,192.168.1.0/24 5. Set-DatabaseAvailabilityGroupNetwork <DAGName>\DAGNetwork02 -Subnets 10.0.0.0/24,10.0.1.0/24 6. Remove-DatabaseAvailabilityGroupNetwork <DAGName>\DAGNetwork03 7. Remove-DatabaseAvailabilityGroupNetwork <DAGName>\DAGNetwork04 8. To rename the networks according to their behavior, run the following commands. 9. Set-DatabaseAvailabilityGroupNetwork <DAGName>\DAGNetwork01 -Name MAPINetwork 10. Set-DatabaseAvailabilityGroupNetwork <DAGName>\DAGNetwork02 -Name ReplicationNetwork 11. If both MAPI and replication networks are deployed, run the following command to enable replication and seeding traffic on the replication network (unless it is unavailable). 12. Set-DatabaseAvailabilityGroupNetwork <DAGName\MAPINetworkName> ReplicationEnabled $false
Important: The values in the following table are example values, not recommended values. Revise these values for your organization.
Log Path
%Program Files%\Microsoft\Exchange Server\v14\Mailbox\Mailbox Database <GUID> %Program Files%\Microsoft\Exchange Server\v14\Mailbox\Mailbox Database <GUID>\Mailbox database <GUID>.edb
3. To dismount the database, run the following command: 4. Dismount-Database "Mailbox Database <GUID>" 5. To change the mailbox database name from Mailbox Database <GUID> to <DAGName> MBX Store 1, run the following command: 6. Set-MailboxDatabase "<Old DB Name>" -Name "<New DB Name>" 7. To change the location of the database's transaction logs and the location of the database file, run the following command: 8. Move-DatabasePath "<Database Name>" -LogFolderPath:<New Log Location> -EdbFilePath:<New DB Path and FileName> 9. To mount the database, run the following command: 10. Mount-Database "<New DB Name>" 11. To add a database copy for a specific mailbox database, follow the procedures documented in the Add a Mailbox Database Copy topic in the Exchange Server 2010 Library (http://go.microsoft.com/fwlink/?LinkId=187673).
Important: The values in the following table are example values, not recommended values. Revise these values for your organization.
Log Path
%Program Files%\Microsoft\Exchange Server\Mailbox\Public Folder Database <GUID> %Program Files%\Microsoft\Exchange Server\Mailbox\Public Folder Database <GUID>\ Public Folder database <GUID>.edb
3. To dismount the database, run the following command: 4. Dismount-Database "Public Folder Database <GUID>" 5. To change the mailbox database name from Mailbox Database <GUID> to <ServerName> MBX Store 1, run the following command: 6. Set-PublicFolderDatabase "<Old DB Name>" -Name "<New DB Name>" 7. To change the location of the database's transaction logs and the location of the database file, run the following command: 8. Move-DatabasePath "<Database Name>" -LogFolderPath:<New Log Location> -EdbFilePath:<New DB Path and FileName> 9. To mount the database, run the following command: 10. Mount-Database "<New DB Name>"
Note:
Refer to the "Records management configuration for Contoso" table in the Server Configuration App document for the information that you need for the commands.
Note:
Refer to the "Message tracking configuration for Contoso" table in the Server Configuration Append document for the information that you need for the commands.
Additional Databases
1. 2. 3. Launch the Exchange Management Shell with an account that has been delegated the Server Management role. Use the appropriate table in the Database/Log LUN Appendix and Database Configuration Appendix at the end of this document for information that you need for the commands. To create the database, run the following command:
4. New-MailboxDatabase -Name "<DB Name>" -LogFolderPath <Transaction Log Location> -EdbFilePath:<FullPathIncludingDatabaseFileName> OfflineAddressBook <OfflineAddressBook> -PublicFolderDatabase <PFDatabase> | Set-MailboxDatabase -IssueWarningQuota <WarningQuota> -ProhibitSendQuota <SendQuota> -ProhibitSendReceiveQuota <SendReceiveQuota> -MailboxRetention <dd.hh:mm:ss> DeletedItemRetention <dd.hh:mm:ss> -MaintenanceSchedule <MaintenanceSchedule> -QuotaNotificationSchedule <QuotaSchedule> RetainDeletedItemsUntilBackup <RetainDeletedItemsUntilBackup> 5. To mount the database, run the following command: 6. Mount-Database "<Database Name>" 7. To add replicas for this mailbox database, follow the procedures outlined in the Add a Mailbox Database Copy topic in the Exchange Server 2010 Library (http://go.microsoft.com/fwlink/?LinkId=187673) after ensuring that the directory and path structure exists on the target server for the database in question. Repeat steps 3, 4, and 5 for each database that needs to be created.
8.
Important:
The values in the following table are example values, not recommended values. Revise these values to reflec organization.
Records management configuration for Contoso
Sun.1:00 AM-Sun.9:00 AM, Mon.1:00 AMMon.9:00 AM, Tue.1:00 AM-Tue.9:00 AM, Wed.1:00 AM-Wed.9:00 AM, Thu.1:00 AMThu.9:00 AM, Fri.1:00 AM-Fri. 9:00 AM, Sat.1:00 AM-Sat.9:00 AM
Sun.6:00 PM-Sun.7:45 PM Mon.7:45 PM, Tue.6:00 Wed.6:00 PM-Wed.7:45 P Thu.7:45 PM, Fri.6:00 PM PM-Sat.7:45 PM
Important:
The values in the following table are example values, not recommended values. Revise these values to reflec organization.
Message tracking configuration for Contoso
<
Message Tracking Log Enabled Message Tracking Log Max Age Message Tracking Log Max Directory Size Message Tracking Log Max File Size Message Tracking Log Subject Logging Enabled
45
20
10 MB
10
True
Use Exchange Native Data Protection features as your backup methodology. For more information about Exchange Native Data Protection, see theUnderstanding Backup, Restore and Disaster Recovery topic in the Exchange Server 2010 Library (http://go.microsoft.com/fwlink/?LinkId=187541).
As a result of the backup methodology selected, the LUN layout has to be altered. Exchange 2010 supports the following LUN layout architectures: One LUN per database A single LUN per database architecture means that both the database and its corresponding log files are placed on the same LUN. To deploy this architecture, you must have two or more copies of your databases, and you must not be using a hardware-based VSS solution. Two LUNs per database With Exchange 2010, in the maximum case of 100 databases, the number of LUNs you provision will depend upon your backup strategy. If your recovery time objective (RTO) is small, or if you use VSS clones for fast recovery, it may be best to place each database on its own transaction log LUN and database LUN. This approach will exceed the number of available drive letters; therefore, volume mount points must be used. Two LUNs per backup set A backup set is the number of databases fully backed up in a night. A solution that performs a full backup on 1/7th of the databases nightly (for example, using a weekly or bimonthly full backup with daily incremental or differential backups) can reduce complexity by placing all of the databases to be backed up on the same log and database LUN. This approach can reduce the number of LUNs on the server.
100 databases using mailbox resiliency could require 400 LUNs which would exceed some storage array maximums. 100 databases without mailbox resiliency could require 200 LUNs which would exceed some storage array maximums. A separate LUN for each database causes more LUNs per server increasing the administrative costs and complexity.
Note: In the following table, the reference to MP stands for Mount Point. X and Y may refer to unique databases.
LUN design approach: Two LUNs per database
A concern with this strategy is that it limits the ability to perform hardware-based VSS backup and restore procedures (for example, clone snapshots). For VSS details, review the white paper, Best Practices for Using Volume Shadow Copy Service with Exchange Server 2003 (http://go.microsoft.com/fwlink/?LinkId=122556).
Note: In the following table, the reference to MP stands for Mount Point. X and Y refer to unique databases.
LUN design approach: One LUN per database
DBy
Important:
The values in the following table are example values, not recommended values. Revise these values to reflec organization.
Database configuration for Contoso
Parameter Database Name Offline Address Book Public Folder Database Warning Quota Send Quota Send Receive Quota
<ServerName> PUB DB xx
Maintenance Schedule
Sun.1:00 AM-Sun.5:00 AM, Mon.1:00 AMMon.5:00 AM, Tue.1:00 AM-Tue.5:00 AM, Wed.1:00 AM-Wed.5:00 AM, Thu.1:00 AMThu.5:00 AM, Fri.1:00 AM-Fri.5:00 AM, Sat.1:00 AM-Sat.5:00 AM Sun.1:00 AM-Sun.1:15 AM, Mon.1:00 AMMon.1:15 AM, Tue.1:00 AM-Tue.1:15 AM, Wed.1:00 AM-Wed.1:15 AM, Thu.1:00 AMThu.1:15 AM, Fri.1:00 AM-Fri.1:15 AM, Sat.1:00 AM-Sat.1:15 AM 30.00:00:00
Sun.12:00 AM-Sun.4:00 AM Mon.4:00 AM, Tue.12:00 A Wed.12:00 AM-Wed.4:00 AM Thu.4:00 AM, Fri.12:00 AM AM-Sat.4:00 AM
Sun.12:00 AM-Sun.12:15 AM Mon.12:15 AM, Tue.12:00 Wed.12:00 AM-Wed.12: 15 Thu.12:15 AM, Fri.12:00 A Sat.12:00 AM-Sat.12:15 AM 30.00:00:00
Mailbox Retention Deleted Item Retention Keep Deleted Items Until Backup
14.00:00:00
14.00:00:00
False
True
Community Additions
ADD
I agree
I agree. On every DAG I have set up, I disable everything except TCP/IP V4 on the replication network. I have never had a need for NetBIOS. I guess if you were running some sort of MS Storage server it might come in to play, but iSCSI? I think not.
Is NetBIOS really needed for Replication network? AFAIR MS Exchange Replication service uses pure TCP connection to the IP address and port 64327. In the other articles there are no any information about why Exchange 2010 may need NetBIOS enabled for replication network. Is it possible to clarify why NetBIOS shouldn't be disabled for Replication network? Or change the article to remove requirement for NetBIOS on the Replication network. Thanks.