Documente Academic
Documente Profesional
Documente Cultură
•Monitoring and measuring tasks Provide procedures for system monitoring and system measurement.
•Capacity planning Establish baselines for each service and monitor all levels of system operations.
•Capturing and reporting performance data Record and log system activity over time, chart the activity
in real time, and display information that is in log files.
•Analyzing trends Capture data and analyze the reports that you create by using that data.
•System monitoring These procedures must include information about server resources that must be
monitored, including memory, processor usage, hard disk space and disk performance, and network
performance. Additionally, Exchange-specific performance indicators, such as Exchange store performance,
message delivery rates, and message queue problems must be included. Each of these procedures must
specify the frequency of monitoring tasks, the baseline or expected data to be captured, and the appropriate
escalation procedures for managing problems as they occur.
•System measurement These procedures work with system monitoring procedures and must include
standards for the types of information measured, the measurement sampling rate, the equations to use when
you analyze data, the formats to store the data in, and the formats to use for reporting.
•Capacity Planning and Topology Calculator The Capacity Planning and Topology Calculator helps you
determine the size of the servers you need for your Exchange 2000 Server or Exchange Server 2003 topology.
•Exchange Server Load Simulator (LoadSim.exe) 2003 You can simulate the load of MAPI clients
against Exchange by running LoadSim tests on client computers. These tests send messaging requests to the
Exchange server, causing a load on the server.
•Exchange Stress and Performance (Esp.exe) The Exchange Stress and Performance tool is a highly
scalable stress and performance tool for Exchange Server. It simulates large numbers of client sessions by
concurrently accessing one or more protocol services.
•Jetstress (Jetstress.exe) Jetstress is a tool in Exchange Server to help administrators verify the
performance and stability of the disk subsystem before putting their Exchange server into production.
Important :
Because some of these tools create accounts that have non-secure passwords, these tools are intended for use
in test environments, not in production environments.
For more information about capacity planning, see the Planning an Exchange Server 2003 Messaging System
Guide (http://go.microsoft.com/fwlink/?LinkId=21766).
•Record and log system activity over time by using Performance Logs and Alerts. You collect data to analyze
performance and usage. To use Performance Monitor to generate reports, you must do the following:
•Configure Performance Logs and Alerts to collect data for the recommended counters at set intervals, such
as every 10 to 15 minutes.
•Chart activity in real time and display information that is in log files by using System Monitor. System Monitor
is a Microsoft Management Console (MMC) snap-in that you can use to monitor many subsystems and
software. It provides a common infrastructure for reporting data based on performance counters. For more
information about System Monitor, see Windows® Help. You can use System Monitor to do the following
tasks:
Top of page
Protocol log files can help you troubleshoot messaging problems and identify potential issues with your HTTP,
SMTP, and NNTP virtual servers. There are four types of protocol logs as described in Table 1.
Note :
W3C Extended Log File Format is the preferred logging format. Unless you are sure that another format meets
your needs, use this format with HTTP, SMTP, and NNTP protocol logging.
You can enable protocol logging on the Properties tab of the SMTP or NNTP virtual servers in Exchange
System Manager. You enable logging on the HTTP Exchange Virtual Server through the IIS Manager. For more
information about how to enable logging for virtual servers, see the Exchange Server 2003 Help. For more
information about troubleshooting transport issues, see Microsoft Knowledge Base article 821910, "How to
Troubleshoot for Exchange Server 2003 Transport Issues," (http://go.microsoft.com/fwlink/?
LinkId=3052&kbid=821910).
Top of page
You can install HTTPMon from the resource kit by running Setup.exe from the \apps\httpmon folder of the
resource kit. After you install HTTPMon, you must run HTTPMon Configuration Manager to configure the
service. HTTP Configuration Manager lets you configure global settings for your organization and add the
Outlook Web Access servers you want to monitor. You can use the Services MMC to start the HTTP Monitoring
Service. After your tests start running, you should review the .csv files for response codes, time taken by the
sample to return the text, and for the number of retry attempts made by HTTPMon. You can analyze this data
to detect problems with your Outlook Web Access servers, and you can review the events logged by HTTPMon
in Event Viewer.
•SQL Reporting Server Gathers data from monitor servers and loads it into SQL Server
•Client Monitor This component is a set of Web pages that displays the results from the SQL Reporting
Server database
You can then use Windows Management Instrumentation (WMI) or other technologies to monitor the event log,
or you can import the .csv file output to Microsoft Office Excel, SQL Server, or another tool for more analysis.
You can also use the SQL Server data and Client Monitor to track your servers, and you can use the reporting
features of SQL Server to additionally analyze the data.
You can use HTTPMon to identify and troubleshoot issues with Outlook Web Access servers. Make sure that you
monitor Outlook Web Access regularly. Based on your organization's requirements, you may want to consider
monitoring your Outlook Web Access servers weekly. You can increase or decrease the frequency of monitoring
based on trend analysis of your Outlook Web Access servers. For more information about installing and
configuring HTTPMon, see the Windows Server 2003 Resource Kit documentation.
Top of page
Managing Mailboxes
Mailboxes are the delivery location for all incoming mail messages for a designated recipient. A mailbox can
contain messages, message attachments, folders, documents, and other files such as calendar and contact
objects. Information in a user's mailbox is stored in a mailbox store database on an Exchange server.
Mailboxes inherit many of their properties, such as storage limits, from the mailbox store. You can create
different mailbox stores for different groups of users. For example, you may put mailboxes for your staff in one
store and mailboxes for executives in another store, and give the executives double the normal storage limits
by configuring the store instead of configuring the individual mailboxes. You must actively manage the
mailboxes in your organization to guarantee reliability and availability to your users. Make sure that you
manage mailbox limits for resource management of your servers. For more information about managing
mailboxes, see the Exchange Server 2003 Administration Guide (http://go.microsoft.com/fwlink/?
LinkId=21769).
configuration settings that you apply to one or more servers, mailbox stores, or public folder stores. A mailbox
store policy allows you to configure settings and apply that policy to one or more mailbox stores on any server.
You can use the System Policies node in Exchange System Manager to create and apply policies.
You can apply a policy to a mailbox store only if you have permissions to modify that mailbox store. If you are
using a distributed administration model, with multiple administrative groups that have separate
administrators, each administrator will be able to interact only with the mailbox stores in that administrator's
own administrative group.
You can select when you want the mailbox management process to start on a particular server, according to
the rules defined by associated recipient policies. The recipient policies determine which mailbox or mailboxes
Mailbox Manager cleans. You can also customize the mailbox management schedule to suit your organizational
requirements. For example, you can create a custom schedule that runs Mailbox Manager on Saturday at
midnight.
When you schedule Mailbox Manager, you can designate a mailbox, contact, or distribution group to receive
Mailbox Manager reports. You can also select the type of report to be generated. The report can include
information such as when Mailbox Manager ran, which mailbox recipient policy settings were applied, which
mailboxes were processed, which folders were processed, the number of messages that were moved or
deleted, and the size of messages that were moved or deleted.
Most of the Mailbox Manager settings are controlled through recipient policy. You can add an additional tab
named Mailbox Manager Settings to an already existing policy, or a new policy can be created. For each
recipient policy you create, you can define the objects that this recipient policy will apply to (this is done
through defining the policy Filter) and select whether you want to delete messages based on age, size, or both.
You can also choose to notify clients that their mailboxes were cleaned. In the Properties of the server object,
on the Mailbox Manager tab, you can choose to have reports sent to an administrator and can choose the
Administrator's mailbox.
The action that occurs when Mailbox Manager processes a message depends on the setting that you select
when creating the policy. By default, only a report is generated. No additional action is taken. In addition to the
default setting, there are four other options for how Mailbox Manager processes messages that exceed the
specified limits. Table 3 describes these Mailbox Manager options.
Option Description
Generate report only(default) No messages are moved or deleted, but an administrator report is generated
that indicates which mailboxes contain items that exceed the limits defined
by the mailbox recipient policy.
Move to Deleted Items folder Messages are moved to the Deleted Items folder in each client mailbox.
Messages are handled as if deleted by the client. Users can remove them
from the Deleted Items folder if they want to.
Move to System Cleanup folders A partial replica of the folder hierarchy of the mailbox is created under a
root folder named System Cleanup. Affected messages are moved to the
appropriate subfolder of the System Cleanup folder. This feature gives users
a way to recover recently deleted items without losing information about the
original folder location of the items.
Delete immediately Messages are immediately deleted from client view without being moved to
either the Deleted Items or System Cleanup folder.
You can use the same limits for every folder that the mailbox recipient policy applies to, or you can set custom
limits on a folder-by-folder basis. Each folder must be configured individually if its limits differ from the default
limits.
Top of page
By default, the BadMail folder is located in the virtual server's home directory. The default location is \Exchsrvr
\Mailroot\vsi #virtual server instance\badmail. Before Exchange Server 2003 SP1, badmails were written to the
BadMail folder until the hard disk became full or messages were deleted from hard disk manually. In Exchange
Server 2003 SP1, badmails are not written to the disk. However, if you want to continue to receive the
badmails, you can use Registry Editor to add two registry keys that will ensure that you continue to receive
badmail messages. For more information about the BadMail folder and badmail messages, see Microsoft
Knowledge Base article 555164, "Exchange 2003 Service Pack 1 stops the BadMail folder from collecting bad
messages" (http://go.microsoft.com/fwlink/?LinkId=3052&kbid=555164).
In Registry Editor, you must add the following registry key under the folder: HKEY_LOCAL_MACHINE\\System\
\CurrentControlSet\\Services\\SMTPSVC\\Queuing
•MaxBadMailFolderSize This is the maximum number, in kilobytes, that the system will write badmail to
each BadMail folder. This setting applies to all BadMail folders under the various virtual server instances
(VSIs) that you may have. When a BadMail folder reaches the size limit, badmail will no longer be written.
Using a value of -1 (0xffffffff hexadecimal in regedit) will give you the same functionality as in pre-
Exchange 2003 SP1, that is, badmails grow unbounded. When the regkey is not set, the default is 0: no
badmail written.
•BadMailSyncPeriod (in minutes) This registry key defines how frequently Exchange Server monitors the
system to see if badmails have been deleted. The server caches the size of the BadMail folder for performance
reasons and this cached size is used only when a MaxBadMailFolderSize is specified. If regkey is not set, the
default value of 12 hours is used.
Use Windows Explorer to examine the BadMail folder contents for undeliverable messages. Many undelivered
messages could indicate a network or Domain Name System (DNS) problem. You can create policies for
monitoring the BadMail folder and remove messages after a specified time (such as deleting messages once a
week). You can also use the Badmail Deletion and Archiving tool to automatically delete or archive files in the
Badmail directory of specified SMTP virtual servers. Installing this tool ensures that the size of the Badmail
directory does not exceed specific size limits and eliminates the administrative overhead of manually archiving
or deleting these files. To download the Badmail tool, see the Downloads for Exchange Server 2003 Web site
(http://go.microsoft.com/fwlink/?linkid=25097).
Top of page
Depending on your organization's requirements, you may want to change this default assignment to avoid
exposure of your administrator account to external users.
Note :
Requests for Comments (RFC) 2822 defines a reserved address for the postmaster. For more information about
RFCs, see http://www.rfc-editor.org/rfc.html.
To designate a specific user's mailbox as the postmaster mailbox for any local SMTP domain that is created,
you can manually add the proxy postmaster@localdomainname to the user's list of SMTP proxy addresses.
Managing the postmaster mailbox may involve the following high-level tasks:
•Depending on your organization's requirements, you may need to decide whether to:
•Associate a single e-mail account with the postmaster, such as your Help desk mailbox account.
•Create a dedicated postmaster account that will be used when NDRs are sent.
•If you are creating a dedicated postmaster account, you will need to designate access to the postmaster’s
mailbox to the appropriate support staff. You can manage a dedicated mailbox in the following ways:
•Create a dedicated account and log on as that account by using an Outlook profile, and then respond to the
account messages.
•Delegate Send As permissions on the account to the person who typically manages the mailbox, and then
add the mailbox to their Outlook profile.
•You should establish a regular schedule, such as a weekly schedule, for reviewing and responding to the
delivery reports in the mailbox. For example, you may want to respond to messages in which the e-mail alias
is incorrect and then notify the sender that they must update their records. The schedule you establish should
be based on your organization’s requirements. Some organizations make this a daily task to try to reduce the
number of e-mail messages that are delivered to users who are no longer with the company, while other
companies make this a weekly or monthly maintenance task.
•Determine whether you want a copy of all NDRs to be sent to the postmaster account.
Top of page
•Server and network status for the overall organization and segments
•SLA reviews
•Incident report reviews
•Risk analysis and evaluation
•Capacity, availability, and performance reviews
Top of page