<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Talk Tech To Me - GFI Blog &#187; IT Dojo</title>
	<atom:link href="http://www.gfi.com/blog/category/tttm/it-dojo/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 13 Sep 2013 16:51:58 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
		<item>
		<title>A Closer Look at Hybrid Exchange Deployment</title>
		<link>http://www.gfi.com/blog/a-closer-look-at-hybrid-exchange-deployment/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=a-closer-look-at-hybrid-exchange-deployment</link>
		<comments>http://www.gfi.com/blog/a-closer-look-at-hybrid-exchange-deployment/#comments</comments>
		<pubDate>Thu, 11 Oct 2012 14:00:43 +0000</pubDate>
		<dc:creator>Paul Mah</dc:creator>
				<category><![CDATA[IT Dojo]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[Exchange Online]]></category>
		<category><![CDATA[Exchange Online Archiving]]></category>
		<category><![CDATA[Exchange Server]]></category>
		<category><![CDATA[Hybrid Exchange deployment]]></category>
		<category><![CDATA[on-premise Exchange Server]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=9627</guid>
		<description><![CDATA[A Hybrid Exchange deployment consists of an on-premise Exchange Server installation working together with Exchange Online, which is also known as coexistence. As we know, Exchange Online is Microsoft’s hosted Exchange service for small businesses and enterprises, and is typically &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2012/10/Hybrid-Exchange.png"><img class="alignright  wp-image-9628" style="border: 0px solid black; margin: 10px;" title="Hybrid Exchange" src="http://www.gfi.com/blog/wp-content/uploads/2012/10/Hybrid-Exchange.png" alt="" width="197" height="213" /></a>A Hybrid Exchange deployment consists of an on-premise Exchange Server installation working together with Exchange Online, which is also known as coexistence. As we know, Exchange Online is Microsoft’s hosted Exchange service for small businesses and enterprises, and is typically acquired as a bundle as part of the company’s Office 365 cloud offering.</p>
<p>In this post I will highlight some of the benefits, components and other considerations that need to be taken before going for a Hybrid Exchange deployment.<span id="more-9627"></span></p>
<h3><strong>Benefits of a Hybrid Exchange Deployment</strong></h3>
<p>Despite the greater complexity, there are a number of tangible reasons why businesses may want to try a hybrid deployment. Services such as <a href="http://www.microsoft.com/exchange/en-us/exchange-online-archiving.aspx">Exchange Online Archiving</a> (EOA) can be used with a hybrid deployment, which may appeal to smaller businesses due to its low-barrier access to 99.9% uptime, 24/7 live phone support and ability for users to access their own email archives from their Inbox.</p>
<p>In some cases, organizations can reduce cost by relocating users on inexpensive cloud servers but with important data hosted on-premise. This can be crucial in terms of legal jurisdiction of data for foreign companies not headquartered in the U.S. From a technical perspective, Exchange administrators can also run PowerShell commands that are mirrored to online servers, while a single Outlook Web App URL is used to access both on-premise and cloud-based Exchange deployment.</p>
<p>Do note that while it is possible to set up Exchange for coexistence with another system such as Lotus Notes, the term “hybrid mode” here has specific connotations that pertain specifically to an on-premise Exchange 2010 working with Exchange Online.</p>
<h3><strong>Components required for a hybrid deployment</strong></h3>
<p>An organization that wants to set up a Hybrid deployment must first configure the cloud-based portion of the Exchange deployment. Furthermore, an Exchange 2010 server with SP1 in the CAS server role is required to be installed on-premise to enable a hybrid deployment. This includes an extension of the Active Directory schema when installing Exchange 2010, as well as the setting up of a DirSync server in order to maintain a synchronized address book between the cloud and on-premise installation.</p>
<p>The Dirsync server will need to be appropriately sized to meet hardware requirements; a 1.6GHz CPU with 4GB memory and 70GB of hard disk space is adequate to support an Active Directory with up to 50,000 objects. Note that a ticket with support will need to be opened for organizations with more than 20,000 Active Directory objects. Also, an Exchange hybrid deployment is not supported for an organization that implements multiple forests for logon or resource segmentation.</p>
<h3><strong>Offboarding or decommissioning of on-premise Exchange Server</strong></h3>
<p>Aside from the benefits outlined earlier, another use of a hybrid deployment is as an intermediate step to decommissioning an on-premise Exchange so as to switch completely to Exchange Online. In addition, it can also facilitate an organization that started with Exchange Online but decided to move mailboxes back on-premises, in a move called offboarding.</p>
<p>For the former, Microsoft advices that the steps leading to the decommissioning of an on-premise Exchange deployment should be planned carefully with the help of an Office 365 deployment specialist. For moving mailboxes from Exchange Online to an on-premise deployment, you can check out <a href="http://community.office365.com/en-us/wikis/exchange/566.aspx">Exchange Hybrid Deployment – Moving Cloud-Based Mailboxes to the On-Premises Organization</a> for more information.</p>
<p>While we have barely scratched the surface of Hybrid Exchange deployment, you should now have a better understanding of what considerations and benefits it involves.</p>
<p>&nbsp;</p>
<h3>Like this post?</h3>
<p>If you like this post and would like to receive more Exchange Server tips, as well as the latest Exchange Server posts from across the web, plus a free e-book with 42 Exchange tools, subscribe to the <a href="http://www.gfi.com/blog/dojo-exchange-sensei-signup/">IT Dojo – Exchange Sensei series</a>!</p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/a-closer-look-at-hybrid-exchange-deployment/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Preparing for Exchange 2013</title>
		<link>http://www.gfi.com/blog/preparing-for-exchange-2013/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=preparing-for-exchange-2013</link>
		<comments>http://www.gfi.com/blog/preparing-for-exchange-2013/#comments</comments>
		<pubDate>Mon, 08 Oct 2012 13:58:54 +0000</pubDate>
		<dc:creator>Paul Mah</dc:creator>
				<category><![CDATA[IT Dojo]]></category>
		<category><![CDATA[Exchange 2013]]></category>
		<category><![CDATA[Exchange Administration Center]]></category>
		<category><![CDATA[Exchange Server]]></category>
		<category><![CDATA[Microsoft® Exchange Server 2013]]></category>
		<category><![CDATA[PowerShell cmdlets]]></category>
		<category><![CDATA[Public folders]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=9585</guid>
		<description><![CDATA[The Exchange Server 2013 Preview was released to the public in July, with the final version expected to ship early 2013. Three years in the making, this upcoming new version of Exchange Server incorporates a great many changes, tweaks and &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2012/10/Preparing-for-Exchange-2013.jpg"><img class="alignright  wp-image-9586" style="margin: 10px; border: 0px solid black;" title="Preparing for Exchange 2013" src="http://www.gfi.com/blog/wp-content/uploads/2012/10/Preparing-for-Exchange-2013-300x220.jpg" alt="" width="270" height="198" /></a>The Exchange Server 2013 Preview was released to the public in July, with the final version expected to ship early 2013. Three years in the making, this upcoming new version of Exchange Server incorporates a great many changes, tweaks and improvements made by a large team of engineers.</p>
<p>In this post I shall highlight four important changes in Exchange 2013 that administrators should be aware of when preparing for its arrival.<span id="more-9585"></span></p>
<h2><strong>Exchange Administration Center</strong></h2>
<p>The most dramatic difference in Exchange 2013 is the Exchange Management Console, which will be replaced by the Exchange Administration Center (EAC). The EAC replaces the Exchange Control Panel (ECP) too, and is accessed from the same URL (http://&lt;serverFQDN&gt;/ecp). EAC is much more powerful in that it’s now optimized for on-premises, online, or hybrid Exchange deployments, and allows Exchange to administer it from multiple platforms.</p>
<p>Browsers supported by EMC include Internet Explorer, Firefox, Safari and Chrome; you can see a detailed list of the supported combinations of browsers and operating systems <a href="http://technet.microsoft.com/en-us/library/jj150562%28v=exchg.150%29#SB">here</a>. Going for a fully web-based interface means that administrators can now deploy their Exchange Server in a secure datacenter that is physically hard to access and still perform their work as if it is down the hall in the server room.</p>
<h2><strong>Change in Architecture</strong></h2>
<p>Probably the most notable change in Exchange Server 2013 will be the reduction of server roles to just two: Client Access server and Mailbox server. The Mailbox role includes Unified Messaging, while the Client Access role handles authentication and proxy/redirection. This change reduces complexity for administrators, and is a reflection of the optimizations being enacted in the core Exchange engine. It is understood that an Edge Server role will not be available when Exchange 2013 is released, but will be released post-RTM with Exchange Server 2013 SP1.</p>
<p>There are many other changes under the hood too, which include a much reduced IOPS load (up to 50%), as well as optimization for multiple databases per volume in order to increase aggregate disk utilization. Moreover, available RAM is harnessed to improve search query performance and reduce IOPS, all of which translate to larger mailboxes at lower costs.</p>
<h2><strong>PowerShell cmdlets</strong></h2>
<p>Based on PowerShell version 3.0, PowerShell in Exchange Server 2013 adds more than a hundred new cmdlets. A number of cmdlets have been dropped in Exchange 2013, though they mostly have to do with a major change in how public folders are now handled (See below). One of the advantages offered by PowerShell 3.0 is its simplification that makes it easier to use even as it allows for more comprehensive management of servers.</p>
<p>Note that as PowerShell cmdlets are executed on Mailbox servers only, organizations would have to have an Exchange 2013 Mailbox server available to manage the environment. Regardless, it is evident that not only is PowerShell here to stay, but is set to play an even greater role in Exchange.<strong> </strong></p>
<h2><strong>Change in Public folders</strong></h2>
<p>Exchange 2013 completely changes how public folders operate, and now stores them in mailbox databases. This means that public folders can now take advantage of Database Availability Groups (DAG) for replication and high availability.</p>
<p>Another effect is that mailbox quotas do apply to them too, and a public folder that has grown too large will need to be moved to another mailbox. As a result, administrators will do well to more carefully plan their public folder deployment in Exchange Server 2013.</p>
<p>There are a great many other changes made to Exchange 2013, which is best experienced by checking out the preview version yourself. Download it <a title="Download and try Exchange Server 2013 Preview" href="http://technet.microsoft.com/en-us/evalcenter/hh973395.aspx?wt.mc_id=TEC_116_1_33">here</a>.</p>
<p>&nbsp;</p>
<h3>Like this post?</h3>
<p>If you like this post and would like to receive more Exchange Server tips, as well as the latest Exchange Server posts from across the web, plus a free e-book with 42 Exchange tools, subscribe to the <a href="http://www.gfi.com/blog/dojo-exchange-sensei-signup/">IT Dojo – Exchange Sensei series</a>!</p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/preparing-for-exchange-2013/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The Case for a Multi-Role Exchange Deployment</title>
		<link>http://www.gfi.com/blog/the-case-for-a-multi-role-exchange-deployment/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-case-for-a-multi-role-exchange-deployment</link>
		<comments>http://www.gfi.com/blog/the-case-for-a-multi-role-exchange-deployment/#comments</comments>
		<pubDate>Fri, 28 Sep 2012 14:31:49 +0000</pubDate>
		<dc:creator>Paul Mah</dc:creator>
				<category><![CDATA[IT Dojo]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[Client Access]]></category>
		<category><![CDATA[Exchange 2010 Mailbox Server Role Requirements Calculator]]></category>
		<category><![CDATA[Exchange 2010 Server Roles]]></category>
		<category><![CDATA[Exchange Server]]></category>
		<category><![CDATA[Hub Transport]]></category>
		<category><![CDATA[Mailbox Server Processor Capacity Planning]]></category>
		<category><![CDATA[multi-role server]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=9516</guid>
		<description><![CDATA[Exchange Server has multiple roles, namely the Edge Transport, Client Access, Hub Transport, Mailbox server and Unified Messaging roles. For a large enterprise, the presence of these server roles makes it possible to design deployment scenarios for greater redundancy and &#8230;]]></description>
				<content:encoded><![CDATA[<p><img class="alignright size-medium wp-image-9517" style="border: 0px solid black; margin: 10px;" title="Multi-role Exchange" src="http://www.gfi.com/blog/wp-content/uploads/2012/09/multi-role-exchange-300x177.gif" alt="" width="300" height="177" /></p>
<p>Exchange Server has multiple roles, namely the Edge Transport, Client Access, Hub Transport, Mailbox server and Unified Messaging roles. For a large enterprise, the presence of these server roles makes it possible to design deployment scenarios for greater redundancy and load-balancing that can span offices or even geographical regions.</p>
<p>Organizations that do not require the Edge Transport and the Unified Messaging role will find themselves questioning whether they should deploy the Client Access, Hub Transport Server and Mailbox server roles on the same machine. I address these below:<span id="more-9516"></span></p>
<h2><strong>Multi-role server for simplicity</strong></h2>
<p>To be clear, a multi-role Exchange deployment involves collocating the Client Access, Hub Transport and Mailbox roles into the same physical server. The key advantage of taking this route has to do with the simplified initial configuration as well as the ease of subsequent administration. While it can be argued that deploying the Client Access and Hub Transport role into separate servers allows for greater scalability down the road, excessive processor overhead is a sheer waste of computing capability and RAM.</p>
<p>Another argument in favor of a multi-role server has to do with how simplicity helps keep things manageable, while the inherent complexity of deploying the various roles on separate physical servers increases risk. This may range from something as mundane as a LAN cable coming loose or improperly maintained documentation causing a new Exchange administrator to misconfigure a crucial IP address.</p>
<h2><strong>Debunking scalability</strong></h2>
<p>Instead of working with suppositions that a multiple-server Exchange deployment allows for greater future expansion, Microsoft has provided the free <a href="http://gallery.technet.microsoft.com/Exchange-2010-Mailbox-Server-Role-/">Exchange 2010 Mailbox Role Requirements Calculator</a> to help administrators work out the RAM and processor utilization for a given set of hardware and various variables such as number of users and size of mailboxes.</p>
<p>Exchange administrators can use this tool to validate a new server, as well as to compare the merits of an Exchange deployment using multiple servers versus a single multi-role server.  Remember to factor the cost savings of using fewer servers (over a multi-server deployment) into consideration.</p>
<h2><strong>Do you need high availability</strong></h2>
<p>As Exchange 2007 does not support Client Access or Hub Transport roles on clustered server, there is no way to have a high availability deployment unless the roles are segregated into separate physical servers. The use of a multi-role server may not be suitable in such a scenario. The introduction of Database Availability Groups (DAG) in Exchange 2010 removed that limitation though, and as such eliminates an argument against multi-role servers.</p>
<h2><strong>Hardware recommendations</strong></h2>
<p>Microsoft does offer a recommended configuration for combining a Client Access and Hub Transport role into a single server. According to Microsoft, a minimum of two processor cores are required, with up to a recommended maximum of 12 processor cores. Minimum RAM should be 4GB, with a recommended maximum of 2GB per core.</p>
<p>Multi-role Exchange deployment should be adequate for the majority of businesses out there. As such, it makes sense to start with the assumption of a multi-role server for the simplest possible solution, and move on to more complex deployments only when there is a need to.</p>
<h3></h3>
<h3>Like this post?</h3>
<p>If you like this post and would like to receive more Exchange Server tips, as well as the latest Exchange Server posts from across the web, plus a free ebook with 42 Exchange tools, subscribe to the <a href="http://www.gfi.com/blog/dojo-exchange-sensei-signup/">IT Dojo – Exchange Sensei series</a>!</p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/the-case-for-a-multi-role-exchange-deployment/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>How to Use PowerShell to Supercharge Your Exchange Server</title>
		<link>http://www.gfi.com/blog/how-to-use-powershell-to-supercharge-your-exchange-server/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=how-to-use-powershell-to-supercharge-your-exchange-server</link>
		<comments>http://www.gfi.com/blog/how-to-use-powershell-to-supercharge-your-exchange-server/#comments</comments>
		<pubDate>Mon, 10 Sep 2012 14:22:49 +0000</pubDate>
		<dc:creator>Paul Mah</dc:creator>
				<category><![CDATA[IT Dojo]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[Cmdlets]]></category>
		<category><![CDATA[Exchange admins]]></category>
		<category><![CDATA[Exchange Server]]></category>
		<category><![CDATA[PowerShell]]></category>
		<category><![CDATA[PowerShell Scripts]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=9350</guid>
		<description><![CDATA[You’re probably already aware of how you can achieve greater levels of productivity and automation using PowerShell. To be clear though, PowerShell is not so much created for managing Exchange Server as a powerful task automation framework consisting of a &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2012/09/powershell_2.jpg"><img class="alignright  wp-image-9351" style="border: 0px solid black; margin: 10px;" title="PowerShell" src="http://www.gfi.com/blog/wp-content/uploads/2012/09/powershell_2-300x234.jpg" alt="" width="216" height="168" /></a>You’re probably already aware of how you can achieve greater levels of productivity and automation using PowerShell. To be clear though, PowerShell is not so much created for managing Exchange Server as a powerful task automation framework consisting of a command-line shell and an associated scripting language that is integrated with the .NET Framework. PowerShell can also be used to access COM and WMI objects to perform administrative tasks on local and remote Windows systems.<span id="more-9350"></span></p>
<p>Below are some tips to quickly get up to speed on certain important aspects of using PowerShell with an Exchange Server deployment.</p>
<p><strong>Connecting to Exchange Online using PowerShell</strong></p>
<p>As its name suggests, Exchange Online is the cloud-based version of Exchange Server. The growing acceptance of cloud services is resulting in businesses that eschew buy their own physical servers, or who may opt for a hybrid deployment involving both Exchange Online and an on-premise Exchange Server. Fortunately, it is possible to connect to Exchange Online using PowerShell too; here’s how:</p>
<p>To <a href="file:///C:/Users/Marketing/Downloads/1.%09http:/www.itproportal.com/2012/06/28/managing-exchange-on-line-with-powershell/">initiate an Exchange Online session</a>, first type in the following command in a PowerShell session. You will be prompted for your admin credentials:</p>
<p><em>$LiveCred = Get-Credential </em></p>
<p>Once done, create a new remote PowerShell session with the following command:</p>
<p><em>$Session = New-PSSession -ConfigurationName Microsoft.Exchange -ConnectionUri https://ps.outlook.com/powershell -Credential $LiveCred -Authentication Basic –AllowRedirection</em></p>
<p>Next, import the cmdlets to your local PowerShell session:</p>
<p><em>Import-PsSession $</em><em>Session</em></p>
<p>You can now execute various cmdlets; you can use the command below to view information about cloud-based mailboxes:</p>
<p><em>Get-Mailbox </em></p>
<p>When done, be sure to disconnect from the server-side session with the following:</p>
<p><em>Remove-PSSession $Session</em></p>
<p>For additional information about the cmdlets that are available in Exchange Online, you can check out this reference <a href="http://help.outlook.com/en-us/140/dd575549.aspx">here</a>.</p>
<p><strong>Creating PowerShell Scripts</strong></p>
<p>While the PowerShell command line offers extraordinary flexibility in performing all manner of tasks, its real power lies in the ability to create custom scripts for performing various regular management tasks. This also promotes code reuse, which has the added effect of reducing errors resulting from typos or outright mistakes.</p>
<p>To be clear, a PowerShell script is essentially a text file with a .PS1 extension, which allows it to be edited using the <a href="http://technet.microsoft.com/en-us/library/dd315244.aspx">PowerShell Integrated Scripting Environment</a> (ISE) or any common text editor such as Windows Notepad or NotePad++. Variables, conditional logic (if, else) and loops (do while, while, do until, for, for each) are other important aspects of PowerShell that Exchange administrators working with scripts will need to be familiar with.</p>
<p>To write scripts for managing Exchange Online or other remote Exchange Servers, it may be necessary to first store the login credentials so that the housekeeping scripts may be launched at predetermined times outside office hours. Rather than having the passwords in plaintext within the script, a much safer alternative would be to write an encrypted version of it to a local file. This <a href="file:///C:/Users/Marketing/Downloads/2.%09http:/blogs.technet.com/b/gary/archive/2009/07/23/creating-a-ps-credential-from-a-clear-text-password-in-powershell.aspx">can be done</a> with the following command:</p>
<p><em>Read-Host -AsSecureString | ConvertFrom-SecureString | Out-File C:\Users\someone\MyPassword.txt</em></p>
<p>Within your PowerShell script, the encrypted password credential can be accessed using the following snippet:</p>
<p><em>$Password = type C:\users\someone\MyPassword.txt | ConvertTo-SecureString</em></p>
<p><em>$Userid = </em><a href="mailto:someone@organization.onmicrosoft.com"><em>someone@organization.onmicrosoft.com</em></a><em> </em></p>
<p><em>$Cred = New-Object System.Management.Automation.PSCredential ($Userid, $Password)</em></p>
<p>It is important to note that although this method is more secure than having the plain text password written in the script itself, a few risks remain. Anyone who manages to get access to the script can alter it to perform unauthorized actions which can compromise the security of your Exchange Servers. Furthermore, if someone with malicious intent gets access to the system and is able to run his/her own scripts he/she can still retrieve the password from the SecureString itself. That said, it is a good middle ground between convenience and security for most.</p>
<p>Finally, organizations with more than one Exchange admin in place may also want to create a common repository to store useful scripts that can be shared internally. Depending on the storage environment, this repository of scripts and functions – mentioned below, can also be added to the system path for easy access.</p>
<p><strong>Piping the output of Cmdlets, Functions</strong></p>
<p>Not everything requires the hassle of writing a script though. For simpler tasks, it may make more sense to pipe the output of a cmdlet to another for the desired output. While this may require more command line and PowerShell knowledge than the average Exchange administrator may possess, chaining various cmdlets into a single command is an enormously powerful way of performing complex Exchange tasks.</p>
<p>Building on the idea of code reuse mooted above in “Creating PowerShell Scripts”, would be the idea of packaging them into functions. As opposed to the single purpose usage of a script, a function can be called and its output reused or even piped to another cmdlet as necessary. Used correctly, piping the output of one cmdlet to another can be used to quickly perform tedious configuration changes. The following configures all mailboxes with a quota of 3GB with a warning set at 2.8GB (<a href="file:///C:/Users/Marketing/Downloads/3.%09http:/www.powershellmagazine.com/2011/12/20/5-essential-powershell-skills-for-exchange-server-administrators/">source</a>):</p>
<p><em>Get-Mailbox | Set-Mailbox -IssueWarningQuota 2.8GB -ProhibitSendQuota 3GB</em></p>
<p>This may also be further filtered by selecting only those accounts where the “Office” attribute matches that of the “Main Office.” The result would look something like this:</p>
<p><em>Get-Mailbox | Where-Object {$_.Office -eq &#8220;Main Office&#8221;} | Set-Mailbox -IssueWarningQuota 2.8GB -ProhibitSendQuota 3GB</em></p>
<p>Though we have really only scratched the surface with the tips outlined above, PowerShell is capable of greatly simplifying the work for Exchange admins. With its increasing role in the Windows Server operating system and the <a href="http://blogs.msdn.com/b/powershell/archive/2012/06/14/new-v3-language-features.aspx">latest improvements in PowerShell 3.0</a>, its role in the management of Exchange environments will only become more important.</p>
<p>&nbsp;</p>
<h3>Like this post?</h3>
<p>If you like this post and would like to receive more Exchange Server tips, as well as the latest Exchange Server posts from across the web, plus a free ebook with 42 Exchange tools, subscribe to the <a href="http://www.gfi.com/blog/dojo-exchange-sensei-signup/">IT Dojo – Exchange Sensei series</a>!</p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/how-to-use-powershell-to-supercharge-your-exchange-server/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>A Deeper Look at Spam and Malware Filtering with Exchange Server</title>
		<link>http://www.gfi.com/blog/a-deeper-look-at-spam-and-malware-filtering-with-exchange-server/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=a-deeper-look-at-spam-and-malware-filtering-with-exchange-server</link>
		<comments>http://www.gfi.com/blog/a-deeper-look-at-spam-and-malware-filtering-with-exchange-server/#comments</comments>
		<pubDate>Wed, 25 Apr 2012 14:52:31 +0000</pubDate>
		<dc:creator>Paul Mah</dc:creator>
				<category><![CDATA[IT Dojo]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[anti-spam]]></category>
		<category><![CDATA[cloud anti-spam]]></category>
		<category><![CDATA[endpoint protection]]></category>
		<category><![CDATA[Exchange Server]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[Server deployed]]></category>
		<category><![CDATA[spam]]></category>
		<category><![CDATA[Spam appliance]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8484</guid>
		<description><![CDATA[There are various spam filtering tools at an Exchange admin’s disposal. How can these be used to leverage Exchange itself? What other solutions are there to defend against spam and malware? Read on. Configuring Edge Transport Server The Edge Transport &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2012/04/A-Deeper-Look-at-Spam-and-Malware-Filtering-with-Exchange-Server.jpg"><img class="alignright size-full wp-image-8488" style="border-image: initial; border-width: 0px; border-color: black; border-style: solid; margin: 10px;" title="A Deeper Look at Spam and Malware Filtering with Exchange Server" src="http://www.gfi.com/blog/wp-content/uploads/2012/04/A-Deeper-Look-at-Spam-and-Malware-Filtering-with-Exchange-Server.jpg" alt="" width="324" height="216" /></a>There are various spam filtering tools at an Exchange admin’s disposal. How can these be used to leverage Exchange itself? What other solutions are there to defend against spam and malware? Read on.</p>
<h2><span id="more-8484"></span></h2>
<h2>Configuring Edge Transport Server</h2>
<p>The Edge Transport server role was really created to serve as an additional layer to assess and filter incoming messages before allowing them into Exchange proper. In this regard, various policies and rules are used to identify and eliminate spam and other undesirable messages. Do note that it is not installed by default; a deployment done without one is still considered a fully operational Exchange Server messaging environment.</p>
<p>An Edge Transport server works on new incoming messages in the following order:</p>
<ol>
<li>IP Block and Allow Lists are first checked for a match (blacklisting and whitelisting respectively).</li>
<li>Next, IP Block List Providers and IP Allow List Providers are checked.</li>
<li>The Sender Filtering Agent checks the Blocked Senders list for a match.</li>
<li>A Sender Policy Framework (SPF) lookup is conducted.</li>
<li>The Blocked Recipients list is checked for a match; this also filters out nonexistent recipients.</li>
<li>Content Filtering Agent looks into the content of messages and filters them according to the company’s policy.</li>
<li>Mail attachments are then analyzed by the Attachment Filter Agent.</li>
<li>Finally, if everything checks out, the message is delivered into Exchange inboxes. Depending on the exact configuration, rejected messages could get an error message, be deleted without further notice, sent to the spam quarantine mailbox, or placed in a user’s Junk E-mail folder.</li>
</ol>
<p>One downside is that the accurate way to determine the impact or effectiveness of various rules would be to deploy an Edge Transport server in a “live” environment. As such, it makes sense to start with laxer filter configuration so as not to unwittingly delete legitimate emails – slowly tightening it over time.</p>
<p><strong> </strong></p>
<h2>Third Party Solutions</h2>
<p>Administrators who prefer a more autonomous set of spam and malware filtering capabilities than those offered by an Edge Transport server have a number of anti-spam solutions to choose from:</p>
<p><strong><em>Cloud-based provider</em>:</strong> A popular option, anti-spam cloud providers work by redirecting incoming email messages at the DNS MX level, with only legitimate mails being channeled back. This has the advantage of ensuring that no processing and bandwidth overhead enters your network. The downside is that regulatory rules or sensitivity of certain data may preclude this approach.</p>
<p><strong><em>Spam appliance</em>:</strong> The spam appliance is attractive as it prevents CPU cycles from being wasted to process spam. Deployment is also generally straightforward, with little or no need for maintenance. However, spam appliances may be expensive, and prone to hardware obsolesce.</p>
<p><strong><em>Server deployed</em>:</strong> This is usually the preferred option for businesses with on-premise Exchange deployments, and tends to saddle the middle ground between a cloud-based provider and spam appliance in terms of cost. Be prepared for a higher maintenance and administrative overheads here however.</p>
<p><strong><em>Endpoint protection</em>:</strong> Many antimalware suites feature endpoint spam protection. Personally, I least prefer this option due to the general lack of central manageability in such software.</p>
<p>&nbsp;</p>
<p>There are many options that can be brought to bear against spam and malware. Indeed, a mix-and-match approach would work too, though it will obviously result in a higher cost. Ultimately, the ideal solution would depend on the company’s infrastructure, its overall budget, as well as the amount of spam that an organization is receiving.</p>
<p>&nbsp;</p>
<h3>Like this post?</h3>
<p>If you like this post and would like to receive more Exchange Server tips, as well as the latest Exchange Server posts from across the web, plus a free ebook with 42 Exchange tools, subscribe to the <a href="http://www.gfi.com/blog/dojo-exchange-sensei-signup/">IT Dojo – Exchange Sensei series</a>!</p>
<p><em><br />
</em></p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/a-deeper-look-at-spam-and-malware-filtering-with-exchange-server/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>Integrating Exchange Server in a Non-Windows Environment</title>
		<link>http://www.gfi.com/blog/integrating-exchange-server-in-a-non-windows-environment/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=integrating-exchange-server-in-a-non-windows-environment</link>
		<comments>http://www.gfi.com/blog/integrating-exchange-server-in-a-non-windows-environment/#comments</comments>
		<pubDate>Fri, 30 Mar 2012 16:00:22 +0000</pubDate>
		<dc:creator>Paul Mah</dc:creator>
				<category><![CDATA[IT Dojo]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[Exchang Server]]></category>
		<category><![CDATA[Exchange]]></category>
		<category><![CDATA[Exchange Connectors]]></category>
		<category><![CDATA[Exchange Server 2003]]></category>
		<category><![CDATA[Forefront Identity Manager]]></category>
		<category><![CDATA[UNIX]]></category>
		<category><![CDATA[Windows Server 2008]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8360</guid>
		<description><![CDATA[Using Exchange Server in a non-Windows enterprise environment can be a tricky, yet unavoidable situation for some organizations.  In this post I will highlight some of the best methods you can apply to integrate Exchange Server in a non-Windows environment. &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2012/03/Integrating-Exchange-Server-in-a-Non-Windows-Environment.gif"><img class="alignright size-full wp-image-8362" style="border-image: initial; border-width: 0px; border-color: black; border-style: solid; margin: 10px;" title="Integrating Exchange Server" src="http://www.gfi.com/blog/wp-content/uploads/2012/03/Integrating-Exchange-Server-in-a-Non-Windows-Environment.gif" alt="" width="243" height="243" /></a>Using Exchange Server in a non-Windows enterprise environment can be a tricky, yet unavoidable situation for some organizations.  In this post I will highlight some of the best methods you can apply to integrate Exchange Server in a non-Windows environment.<span id="more-8360"></span></p>
<p><strong>Built-in Exchange Connectors</strong></p>
<p>Exchange Server 2003 and the earlier versions of Exchange, come with embedded connectors that can be used for Exchange to work with other email systems. For example, the GroupWise Connector or Lotus Notes Connector can be used to connect to the respective systems to facilitate directory updates as well as email messages. However, it is important to note that Exchange 2010 no longer comes with these connectors. As such, the use of the built-in connectors in Exchange 2003 may only be good as an interim measure for businesses that may still be on this old version of Exchange Server.</p>
<p><strong>Forefront Identity Manager</strong></p>
<p><a href="http://www.microsoft.com/en-us/server-cloud/forefront/identity-manager.aspx">Forefront Identity Manager</a> (FIM) is a product from Microsoft that helps to manage identity information from a variety of heterogeneous directory and non-directory identity stores, presenting it as a single local view that makes for ease of management. The key capabilities of FIM include the management of users, credentials, access and policy. Management agents (MA) within FIM are used to communicate with a specific type of directory that includes the importing or exporting of data.</p>
<p>In short, it is an extremely powerful tool that can be used to synchronize user between Exchange Server 2010, Active Directory and other support third-party directories such as Novell eDirectory, LDAP and UNIX directories. Oracle and SAP are also supported, as with the ability for users to reset their own passwords via a web management interface.</p>
<p>Though FIM greatly simplifies the task of integrating a heterogeneous network, a good understanding of the various environments is necessary in order to deploy the pertinent MA. As such, expect to devote a significant amount of time to properly study, plan and deploy FIM.</p>
<p><strong>Windows Server 2008 Services for UNIX</strong></p>
<p>In situation where an existing UNIX implementation needs to be integrated with an Exchange Server 2010 forest, Windows 2008 Services for UNIX can be leveraged upon to provide the needed interoperability between the UNIX and Windows environment. Earlier versions of this suite of tools were released as Services for UNIX, with the latest separately released version being 3.5; the tools were subsequently incorporated within Windows Server 2008.</p>
<p>Specifically tested versions of UNIX that will work with Windows Server 2008 include Sun Solaris 7.x to 10, Red Hat Linux 8.0 and later, Hewlett-Packard HP-UX 11i, IBM AIX 5L 5.2, and the Apple Mac OS X. As with FIM, a successful implementation of Services for UNIX requires proper understanding of identity management concepts in UNIX and adequate time for planning.</p>
<p>The above tips simply represent a snapshot of the options available to Exchange administrators. Depending on organizational needs, other solutions, such as the writing of custom scripts using ActivePerl or the Windows Scripting Host to reduce overheads and tweak account parameters, may be viable options too.</p>
<h3>Like this post?</h3>
<p>If you like this post and would like to receive more Exchange Server tips, as well as the latest Exchange Server posts from across the web, plus a free ebook with 42 Exchange tools, subscribe to the <a href="http://www.gfi.com/blog/dojo-exchange-sensei-signup/">IT Dojo – Exchange Sensei series</a>!</p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/integrating-exchange-server-in-a-non-windows-environment/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>Exchange Server 2010 Scalability Techniques</title>
		<link>http://www.gfi.com/blog/exchange-server-2010-scalability-techniques/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=exchange-server-2010-scalability-techniques</link>
		<comments>http://www.gfi.com/blog/exchange-server-2010-scalability-techniques/#comments</comments>
		<pubDate>Mon, 26 Mar 2012 14:00:31 +0000</pubDate>
		<dc:creator>Paul Mah</dc:creator>
				<category><![CDATA[IT Dojo]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[Database Availability Groups]]></category>
		<category><![CDATA[Exchange Server]]></category>
		<category><![CDATA[Exchange Server 2010]]></category>
		<category><![CDATA[Server Roles]]></category>
		<category><![CDATA[Third-Party Applications]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8392</guid>
		<description><![CDATA[As your organization grows, so do mailboxes and, with them, storage requirements. You will therefore need to make some scalability tweaks and design considerations in accordance with this growth. In this post I shall outline the best Exchange Server 2010 &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2012/04/company-growth.jpg"><img class="alignright size-full wp-image-8393" style="border-image: initial; border-width: 0px; border-color: black; border-style: solid; margin: 10px;" title="company growth" src="http://www.gfi.com/blog/wp-content/uploads/2012/04/company-growth.jpg" alt="" width="350" height="241" /></a>As your organization grows, so do mailboxes and, with them, storage requirements. You will therefore need to make some scalability tweaks and design considerations in accordance with this growth. In this post I shall outline the best Exchange Server 2010 scalability methods any Exchange admin should consider.<span id="more-8392"></span></p>
<h2>Server Roles</h2>
<p>Thankfully, Exchange Server 2010 makes it intuitive to scale Exchange deployments with its various clearly defined server roles. A small business can probably install the different server roles (Except Edge Transport Server) onto a physical server, and expand by deploying heavily loaded roles into the new physical server in tandem with the growth of the company.</p>
<ul>
<li>Client Access Server (CAS) – Hosts client access via protocols such as POP3, IMAP4, ActiveSync, Outlook Web Access and Outlook Anywhere.</li>
<li>Edge Transport Server – Typically deployed at the network perimeter or DMZ, this facilitates content filtering before forwarding them onto the Hub Transport Server.</li>
<li>Hub Transport Server – Works as an internal mail delivery system.</li>
<li>Mailbox Server – Acts as a backend store house to host mailboxes and public folders.</li>
<li>Unified Messaging Server – Links up a Private Branch PBX system to Exchange 2010 for voice messaging and fax capabilities.</li>
</ul>
<p>Clearly, an understanding of the various Server Roles and how they can be expanded is crucial to being able to scale Exchange Server 2010 to support a larger number of clients.</p>
<h2>Third-Party Applications</h2>
<p>An important but often overlooked consideration is the presence of third-party monitoring applications. For example, internal network appliances may need to relay mail off Exchange Server’s SMTP engine to send out important email alerts to administrators, and CRM (Customer Relationship Management) portals or other internal applications may also generate a hefty load on this front.</p>
<p>Apart from relaying email messages through the SMTP engine, Microsoft has designed Exchange to support hooks for third-party software such as antimalware scanners, backup software, fax software and other phone/PBX features. As this will also have an impact on the system performance, knowing from beforehand how these third-party applications interact with Exchange pays off.</p>
<h2>Database Availability Groups</h2>
<p>Database Availability Groups (DAGs), is a feature in Exchange 2010 that allows for multiple databases to be spread across multiple servers.<strong> </strong>While the use of DAGs is primarily geared towards high availability and site resilience, its strengths do address the primary pain points when scaling an Exchange deployment. <strong></strong></p>
<p>Specifically, because DAG allows for multiple databases that tend to be smaller in size, restoration of an individual database from offline storage can complete in a smaller time window compared to a larger database. In addition, risk is mitigated by distributing mailboxes across multiple databases; failure of a single database will only inconvenience users contained within that specific database, instead of all users in an organization.</p>
<h2>Configure Your Disk for Performance</h2>
<p>A common problem that can severely reduce the efficiency and speed of your Exchange Server would be poor disk performance as server workload increases. One easy way of mitigating this, so that an existing deployment can be scaled without having to rebuild it, would be to separate the Exchange Server database and log files into separate hard drive volumes.</p>
<p>Because log files predominantly consist of write operations, in the same way that the majority of mailbox database accesses are read operations, a relatively clean separation can be achieved by simply storing Exchange and server log files in a separate physically volume from the Exchange databases.</p>
<p>Obviously, other methods exist with which to boost disk performance. Switching to Solid State Drive (SSD) will bring about a tremendous improvement in read and write speeds, but at a much higher per megabyte cost.</p>
<p>There are many considerations that play a part in stretching the scalability of an Exchange Server deployment, and we hope that the above tips will help you plan better, as well as to squeeze some more life out of existing deployments.</p>
<p>&nbsp;</p>
<h3>Like this post?</h3>
<p>If you like this post and would like to receive more Exchange Server tips, as well as the latest Exchange Server posts from across the web, plus a free ebook with 42 Exchange tools, subscribe to the <a href="http://www.gfi.com/blog/dojo-exchange-sensei-signup/">IT Dojo – Exchange Sensei series</a>!</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/exchange-server-2010-scalability-techniques/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>5 Steps to Protect Exchange Server from Security Attacks</title>
		<link>http://www.gfi.com/blog/5-steps-to-protect-exchange-server-from-security-attacks/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=5-steps-to-protect-exchange-server-from-security-attacks</link>
		<comments>http://www.gfi.com/blog/5-steps-to-protect-exchange-server-from-security-attacks/#comments</comments>
		<pubDate>Tue, 31 Jan 2012 15:00:06 +0000</pubDate>
		<dc:creator>Paul Mah</dc:creator>
				<category><![CDATA[IT Dojo]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[DoS attacks]]></category>
		<category><![CDATA[Exchange Server]]></category>
		<category><![CDATA[firewall]]></category>
		<category><![CDATA[security attacks]]></category>
		<category><![CDATA[security updates]]></category>
		<category><![CDATA[server patch management]]></category>
		<category><![CDATA[SMTP protocol]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<category><![CDATA[zero-day vulnerabilities]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8086</guid>
		<description><![CDATA[The average IT admin needs to be concerned about a wide range of security threats, such as the prospect of a security breach and denial of service (DOS) attacks. In this post we shall look at five steps admins need &#8230;]]></description>
				<content:encoded><![CDATA[<p><img class="alignright size-full wp-image-8087" style="border-width: 0px; border-color: black; border-style: solid; margin: 10px;" title="protect-exchange-server" src="http://www.gfi.com/blog/wp-content/uploads/2012/02/protect-exchange-server.jpg" alt="" width="278" height="315" /></p>
<p>The average IT admin needs to be concerned about a wide range of security threats, such as the prospect of a security breach and denial of service (DOS) attacks. In this post we shall look at five steps admins need to take to protect their Exchange Server deployments from security attacks.<span id="more-8086"></span></p>
<h3><strong><br />
</strong>1. Be persistent about security updates</h3>
<p>Ensuring that important patches and security updates are applied in a timely fashion is a must when it comes to protecting an Exchange Server from security breaches.  On the downside, if done manually, the installation of a security update can be a time-consuming affair for larger deployments due to the need to take systems offline. David Kelleher touches on this in his post where he suggests the best practices for running <a href="http://www.gfi.com/blog/server-patch-management/">server patch management</a>.</p>
<p>On the other hand, the judicious use of virtualization can minimize downtime by allowing administrators to easily test new updates before an actual rollout.  And assuming that mailbox databases are stored on a SAN, the option exists to perform a rollback should catastrophic problems surface at a later stage. Of course, other benefits such as higher scalability and rapid disaster recovery apply.  Indeed, virtualization vendor VMware has put together some nice pages on <a href="http://www.vmware.com/solutions/business-critical-apps/index.html">using Exchange Server with virtualization</a>.<br />
<strong></strong></p>
<h3><strong><br />
2. </strong><strong>Maintain separation using firewall</strong></h3>
<p>The creation of server roles in Exchange Server has served to greatly alleviate the challenges of protecting a general purpose email server against external attacks.  Regardless, it would be foolhardy not to place an Edge Transport Server behind properly configured firewalls, preferably within a DMZ.</p>
<p>The concept is simple: to reduce the attack profile by allowing only essential services to be exposed to the Internet.  This is the same philosophy that Microsoft applied to its upcoming <a href="http://www.microsoft.com/en-us/server-cloud/windows-server/v8.aspx">Windows Server 8</a> operating system where the software vendor removed the GUI from the basic base Server Core installation so as to reduce security risks to an absolute minimum.</p>
<p>And while we’re on the topic of narrowing the attack profile of an Exchange Server, it makes sense to tweak things on the network front such as the disabling of HTTP (allowing only HTTPS), as well as ensuring that default digital certificates are not used on Internet-facing server roles.<br />
<strong></strong></p>
<h3><strong></strong><strong><br />
3. Protecting against DoS attacks</strong></h3>
<p>The hard truth is that there is really no easy way to defend against DOS attacks without huge investments to acquire the requisite expertise and to bolster one’s underlying infrastructure capabilities. For most companies faced with a determined and competent attacker, the only viable solution would be to seek the assistance of a DDoS mitigation vendor.</p>
<p>Fortunately, there are a number of tricks that an administrator can employ to foil the occasional troublemakers.  On an Exchange 2010 Transport Server, for example, the <em>Set-TransportServer</em> cmdlet can be used to modify the default control message processing rates, SMTP connection rates and SMTP session time-out values. Moreover, the <em>Set-ReceiveConnector</em> cmdlet can be used to configure inactivity timeouts, maximum number of connections and allowable SMTP protocol connection errors.</p>
<p>Finally, the <em>Set-POPSettings</em> and <em>Set-IMAPSettings</em> cmdlets can be used to configure parameters related to POP and IMAP.  The last two are particularly useful for organizations that don’t implement VPN security but allow users to download their emails from external networks. Ram Mohan’s post on <a href="http://www.securityweek.com/content/how-defend-against-ddos-attacks">how to defend against DDoS attacks</a> touches on generic techniques further.<br />
<strong></strong></p>
<h3><strong><br />
4. </strong><strong>Have external parties conduct penetration tests</strong></h3>
<p>The simplest way to know what hackers are thinking would be to hire someone who can reason in the same way and then task them with finding ways to break into your system.  It is an acceptable practice these days to hire penetration testing engineers, also known as ‘white hats’, to find weak spots in a company’s IT setup.<br />
<strong></strong></p>
<h3><strong><br />
5. </strong><strong>Protecting against zero-day vulnerabilities</strong></h3>
<p>By definition, zero-day vulnerabilities are not detectable with current antimalware defenses. It is therefore unfortunate that an increasing number of attacks have been shown to utilize novel exploits.  One possible way of defending against zero-day vulnerabilities would be to install antimalware defenses known as whitelisting software. While nothing is absolute, the use of whitelisting software should offer a level of additional protection against the execution of ‘helper’ software such as RAT (Remote Administration Tool) commonly installed to facilitate hackers’ entry into a compromised server.</p>
<p>Following these five steps may not guarantee ultimate protection, but it will definitely mean you are making the best out of the technologies and methods available to protect your Exchange Server.</p>
<h3>Like this post?</h3>
<p>If you like this post and would like to receive more Exchange Server tips, as well as the latest Exchange Server posts from across the web, plus a free ebook with 42 Exchange tools, subscribe to the <a href="http://www.gfi.com/blog/dojo-exchange-sensei-signup/">IT Dojo – Exchange Sensei series</a>!</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/5-steps-to-protect-exchange-server-from-security-attacks/feed/</wfw:commentRss>
		<slash:comments>5</slash:comments>
		</item>
		<item>
		<title>3 Tricks to Power Up Exchange Server with PowerShell</title>
		<link>http://www.gfi.com/blog/3-tricks-to-power-up-exchange-server-with-powershell/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=3-tricks-to-power-up-exchange-server-with-powershell</link>
		<comments>http://www.gfi.com/blog/3-tricks-to-power-up-exchange-server-with-powershell/#comments</comments>
		<pubDate>Wed, 25 Jan 2012 15:00:32 +0000</pubDate>
		<dc:creator>Paul Mah</dc:creator>
				<category><![CDATA[IT Dojo]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[event log]]></category>
		<category><![CDATA[Exchange Management Console]]></category>
		<category><![CDATA[Exchange Management Shell]]></category>
		<category><![CDATA[Exchange Server]]></category>
		<category><![CDATA[PowerShell]]></category>
		<category><![CDATA[PowerShell Command Log]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8089</guid>
		<description><![CDATA[Microsoft PowerShell is a powerful task automation framework that consists of a command-line shell and associated scripting language. On its part, the Exchange Management Shell (EMS) is built on Windows PowerShell in order to manage Exchange Server objects. Within EMS, &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2012/02/Exchange-Server-PowerShell.png"><img class="alignright size-full wp-image-8090" style="border-width: 0px; border-color: black; border-style: solid; margin: 10px;" title="Exchange-Server-PowerShell" src="http://www.gfi.com/blog/wp-content/uploads/2012/02/Exchange-Server-PowerShell.png" alt="" width="170" height="153" /></a>Microsoft PowerShell is a powerful task automation framework that consists of a command-line shell and associated scripting language. On its part, the <a href="http://technet.microsoft.com/en-us/library/dd297939.aspx">Exchange Management Shell (EMS) </a>is built on Windows PowerShell in order to manage Exchange Server objects. Within EMS, the savvy Exchange Admin is able to perform tasks ranging from the mundane creation of new email accounts to writing complex scripts. Indeed, the Exchange Management Console (EMC) is really a GUI that is built on top of EMS; there are actually many operations that can be performed only within EMS.<span id="more-8089"></span></p>
<p>Let’s go through three tricks of using Exchange Server with PowerShell that you might have not been aware of:</p>
<p>&nbsp;</p>
<h2>1. Windows PowerShell Command Log</h2>
<p>Windows PowerShell Command Log can be configured to log every Shell command that runs within EMC. This may be useful for novice admins in order to keep a log of the commands that they have performed. Even expert users operating within mission critical environments may want to enable it so as to facilitate the tracking of mistakes.</p>
<p>The log can be started by clicking on “View…” and selecting “View Windows PowerShell Command Log…” in EMC. Under the “Action” menu, click on “Start Command Logging” to enable logging. The PowerShell Command Log stays resident when logging commands and continues to do so until EMC is closed. It resumes logging when EMC is restarted. Anderson Patricio gives explains this further in his post on <a href="http://msmvps.com/blogs/andersonpatricio/archive/2009/04/20/using-exchange-2010-windows-powershell-command-log.aspx">using Exchange 2010 Windows PowerShell Command Log</a>.</p>
<p>&nbsp;</p>
<h2>2. Reviewing the Event Log</h2>
<p>Events that pertain to Exchange can often be logged into the Windows Event Log. On a busy server that is used for many tasks however, it may be a hassle to filter out those related to Exchange on a regular basis. One simple and powerful way to leverage PowerShell would be to make use of the Get-Eventlog to export a CSV file of events that pertains to Exchange to regularly check for potential problems that may arise. Saving into CSV allows it to be easily imported and viewed by Microsoft Excel.</p>
<h4>Get-Eventlog Application | while {$_.Source –ilike “Exchange*”} | Export-CSV [Path to output file]</h4>
<p>&nbsp;</p>
<h2>3. Parsing Setup Logs for easy Review</h2>
<p>Installing Exchange 2010 creates a folder named “C:\ExchangeSetupLogs” which contains numerous log files generated by the installation process. While a normal text editor will suffice to view the generated text files, Microsoft has provided the GetSetupLogs.ps1 script to process the log files. It will highlight warning and critical errors in different color so that an Exchange Administrator can quickly review it for installation errors. To use it, simply run: .\Get-SetupLog.ps1 from the Scripts folder.</p>
<p>&nbsp;</p>
<h2>Best Practices</h2>
<p>Although this post was on using Exchange Server with Powershell, I would like to conclude with some of the best practices related to EMS that may be of help:</p>
<ul>
<li>Make use of PowerShell scripting to automate repetitive tasks to save time and reduce mistakes.</li>
<li>Work on creating a cmdlet and script library that can be reused.</li>
<li>Develop a naming scheme that makes it easy to identify and intuitively understand the function of cmdlets in your library.</li>
<li>You can make use of EMS to create reports to identify email users with large mailboxes and user distribution reports, for example.</li>
<li>Create scripts to perform server administration tasks; use EMS to perform basic administrative tasks such as in the creation, moving and modification of mailboxes.</li>
</ul>
<p>&nbsp;</p>
<h3>Like this post?</h3>
<p>If you like this post and would like to receive more Exchange Server tips, as well as the latest Exchange Server posts from across the web, plus a free ebook with 42 Exchange tools, subscribe to the <a href="http://www.gfi.com/blog/dojo-exchange-sensei-signup/">IT Dojo – Exchange Sensei series</a>!</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/3-tricks-to-power-up-exchange-server-with-powershell/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>4 Steps to Recovering a Failed Exchange Server</title>
		<link>http://www.gfi.com/blog/4-steps-to-recovering-a-failed-exchange-server/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=4-steps-to-recovering-a-failed-exchange-server</link>
		<comments>http://www.gfi.com/blog/4-steps-to-recovering-a-failed-exchange-server/#comments</comments>
		<pubDate>Mon, 19 Dec 2011 15:00:05 +0000</pubDate>
		<dc:creator>Paul Mah</dc:creator>
				<category><![CDATA[IT Dojo]]></category>
		<category><![CDATA[Exchange Server]]></category>
		<category><![CDATA[failed Exchange Server]]></category>
		<category><![CDATA[recovery]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3614</guid>
		<description><![CDATA[No sane administrator wants to be at the receiving end of a failed Exchange Server, given the enormous pressures that the rush to restore services entails.  Yet the very real possibility of data loss coupled with general inexperience with server &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2011/11/recovering-a-failed-Exchange-Server.jpg"><img class="alignright size-medium wp-image-3620" style="border-width: 0px; border-color: black; border-style: solid; margin: 10px;" title="recovering-a-failed-Exchange-Server" src="http://www.gfi.com/blog/wp-content/uploads/2011/11/recovering-a-failed-Exchange-Server-200x300.jpg" alt="" width="180" height="270" /></a>No sane administrator wants to be at the receiving end of a failed Exchange Server, given the enormous pressures that the rush to restore services entails.  Yet the very real possibility of data loss coupled with general inexperience with server restoration – it’s not something that happens all the time, after all – makes it even more important be acquainted with the steps leading to the recovery of a failed Exchange Server.<span id="more-3614"></span></p>
<p><strong>1.      </strong><strong>Identify the problem</strong></p>
<p>The first step would of course be to identify the problem.  Identification of the issue is important as not only does it allow an estimated timeframe to be worked out and the allocation of sufficient resources, but knowing the problem can also influence whether a full server backup is required.</p>
<p>Below is a short list of some of the categories of problems that may crop up.</p>
<ul>
<li>Mailbox content deleted by mistake</li>
<li>Data is lost, restoration from backup required</li>
<li>Data is fine, but server just doesn’t boot</li>
<li>Data is corrupted: Some or all mailboxes inaccessible</li>
<li>Exchange Server is fine; problem lies somewhere else</li>
<li>Mail is not flowing between sites</li>
<li>Mail is not flowing to or from the Internet.</li>
</ul>
<p>The restoration on mailbox content is actually the easiest to recover from.  This is because data is actually retained in Exchange for 30 days (default), and can be retrieved using the “Recover Deleted Items” tool.  You can <a href="http://blogs.appriver.com/blog/is-it-monday-yet/0/0/recover-deleted-items-for-all-folders-with-microsoft-outlook-2010">read more about the process</a> for items that were deleted normally as well as for <a href="http://support.microsoft.com/kb/246153">“hard deleted” items</a>.</p>
<p>The other issues can be broadly divided into those that require a restoration from data backups, hardware and other issues not directly related to Exchange or Exchange-centric problems.  In a nutshell, administrators may want to establish if the failed Exchange Server is related to data, external factors or Exchange-related problems – or a combination of them.</p>
<p><strong>2.      </strong><strong>Perform a full backup of server</strong></p>
<p>Before the initiation of any attempts at recovery, it is imperative that a full backup first be performed on the affected server.  An experienced administrator will know that the race to solve the problem might sometimes cause more harm as a direct results of mistakes made.  Moreover, the installation of patches or updates that causes inadvertent problem may also not be easy (or even impossible) to reverse.</p>
<p>The rational for a full server backup is simple: it serves as a restore point where harmful changes or misconfigurations can be overcome by rolling backwards to the original point.  The exception would be external problems such as those related to the network or misconfiguration of DNS, for example.</p>
<p><strong>3.      </strong><strong>Initiate recovery</strong></p>
<p>Only after the creation of a backup should the recovery of a failed Exchange Server be initiated.  Below is a short list of common problems.</p>
<p><span style="text-decoration: underline;">Boot failure</span>: Assuming that the boot failure is not caused by a malware attack, initiate the Recovery Console by hitting the F8 key as the boot loader is being loaded.  Problems related to errant system services or problematic applications in the startup queue may be resolved here.</p>
<p><span style="text-decoration: underline;">Disk failure</span>: Where RAID is used, a recovery here may be as easy as replacing a failed disk in the array and waiting for it to rebuild.  However, the situation is akin as recovering from a complete server failure should there be no data redundancy, or should multiple disk failure occur.</p>
<p><span style="text-decoration: underline;">Complete server failure</span>: The first step to do here would be to file a support ticket with your server vendor.  Depending on support package, a replacement may be delivered in as little as four hours or on the next business day.  The decision at this stage would be to decide on rebuilding a new machine or restoring the server image from a backup.</p>
<p><span style="text-decoration: underline;">Database corruption</span>: The steps for partial or complete database corruption may vary, as with the tools that can be used.  On this, I recommend reading Understanding Backup, Restore and Disaster Recovery from TechNet for additional background on the technology and methodologies behind data recovering for Exchange 2010 <a href="http://technet.microsoft.com/en-us/library/dd876874.aspx">here</a> and using Recovery Storage Group to restore Exchange mailbox data from earlier versions of Exchange <a href="http://www.petri.co.il/restoring_exchange_mailbox_recovery_storage_group_part1.htm">here</a>.</p>
<p><span style="text-decoration: underline;">Configuration problem</span>: While easy to resolve in the hands of an experienced Exchange administrator, it can also result in larger problems being caused by consecutive or multiple configuration mistakes.  Making a proper backup before proceeding is highly recommended here.</p>
<p><strong>4.      </strong><strong>Preparing for easy recovery</strong></p>
<p>Finally, it makes sense to prepare adequately for disaster before they actually hit.  One way to do so would be to configure your Exchange with redundancy or failover in mind.  An alternative for businesses that cannot afford failover hardware is to ensure the presence of sufficient storage space to facilitate the creation of server backups mentioned earlier.</p>
<p>Another way to be prepared would be to ensure that the Exchange Server environment is properly documented.  Some of the information that should be documented includes the server name, version of Windows, version of Exchange Server, database names, location and size of databases.  On this front, Microsoft has a utility called ExchDump that can assist administrators in creating a baseline snapshot of an Exchange environment.  The utility can be downloaded <a href="http://www.microsoft.com/download/en/details.aspx?id=11717">here</a>.</p>
<p>&nbsp;</p>
<h3>Like this post?</h3>
<p>If you like this post and would like to receive more Exchange Server tips, as well as the latest Exchange Server posts from across the web, plus a free ebook with 42 Exchange tools, subscribe to the <a href="http://www.gfi.com/blog/dojo-exchange-sensei-signup/">IT Dojo – Exchange Sensei series</a>!</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/4-steps-to-recovering-a-failed-exchange-server/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
	</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-09-14 21:18:58 by W3 Total Cache --