MS
Exchange Interview Questions
1.
What
must be done to an AD forest before Exchange can be deployed?
- Setup.exe /forestprep
2.
What
Exchange process is responsible for communication with AD?
-
DSACCESS
3.
What 3
types of domain controller does Exchange access?
- Normal Domain Controller, Global Catalog,
Configuration Domain Controller
4. What
connector type would you use to connect to the Internet, and what are the two
methods of sending mail over that connector?
SMTP Connector: Forward to smart host or use DNS to route to each
address
5.
How
would you optimize Exchange 2003 memory usage on a Windows Server 2003 server
with more than 1 GB of memory?
Add /3Gb switch to boot.ini
6.
Name the
process names for the following:
System Attendant- MAD.EXE, Information Store – STORE.EXE, SMTP/POP/IMAP/OWA – INETINFO.EXE
System Attendant- MAD.EXE, Information Store – STORE.EXE, SMTP/POP/IMAP/OWA – INETINFO.EXE
7.
What is
the maximum amount of databases that can be hosted on Exchange 2003 Enterprise?
-
20 databases. 4 SGs x 5 DBs.
8.
What are
the standard port numbers for SMTP, POP3, IMAP4, RPC, LDAP and Global Catalog?
-
25 SMTP
-
110 POP3
-
143 IMAP4
-
135 RPC
-
389 LDAP
-
636
LDAP (SSL),
-
3268
Global Catalog
-
465 SMTP/SSL,
-
993 IMAP4/SSL,
-
563 IMAP4/SSL,
-
53 DNS
,
-
80 HTTP ,
-
88 Kerberos ,
-
102 X.400 ,
- 110 POP3 ,
-
119 NNTP
,
-
137 - NetBIOS Session Service
-
139 - NetBIOS Name Service ,
-
379 LDAP
(SRS) ,
- 443 HTTP
(SSL) ,
- 445 - NetBIOS over TCP
- 563 NNTP
(SSL) ,
- 691
LSA ,
- 993
IMAP4 (SSL) ,
- 994
IRC (SSL) ,
- 995
POP3 (SSL) ,
- 1503 T.120
,
- 1720 H.323
,
- 1731 Audio conferencing ,
- 1863 -
MSN IM
- 3268 GC ,
- 3269 GC
(SSL) ,
- 6001
Rpc/HTTP Exchange Store ,
- 6002 HTTP Exchange Directory Referral service ,
- - 6667 IRC/IRCX ,
- 6891-6900 - MSN IM File transfer ,
- 6901 -
MSN IM Voice ,
- 7801-7825 - MSN IM Voice[/b]
9. What are the perquisite
for installation of Exchange Serve
The pre requisite are- IIS, SMTP, WWW service, NNTP, W3SVC, .NET, Framework, ASP.NET
Then run Forest prep, the run domain prep
The pre requisite are- IIS, SMTP, WWW service, NNTP, W3SVC, .NET, Framework, ASP.NET
Then run Forest prep, the run domain prep
10.
Which
protocol is used for Public Folder? ANS: SMTP
11.
What is
the use of NNTP with exchange?
ANS: This protocol is used the news group in exchange
ANS: This protocol is used the news group in exchange
12.
About
the new features in Exchange 2003:
1. Updated Outlook Web Access.
2. Updated VSAPI (Virus Scanning Application Programming Interface)But in Exchange Server 2003 Enterprise, there are Specific Features which:
3. Eight-node Clustering using the Windows Clustering service in Windows Server (Ent. & Datacenter)
4. Multiple storage groups.
5. X.400 connectors which supports both TCP/IP and X.25.
1. Updated Outlook Web Access.
2. Updated VSAPI (Virus Scanning Application Programming Interface)But in Exchange Server 2003 Enterprise, there are Specific Features which:
3. Eight-node Clustering using the Windows Clustering service in Windows Server (Ent. & Datacenter)
4. Multiple storage groups.
5. X.400 connectors which supports both TCP/IP and X.25.
13.
What would a rise in remote queue length
generally indicate?
This means mail is not being sent to other servers. This can be explained by outages or performance issues with the network or remote servers.
This means mail is not being sent to other servers. This can be explained by outages or performance issues with the network or remote servers.
14.
What is Operation Master Role?
Schema master Control all updates
and modification to the schema itself. Control the object definition in the
directory and attributes associated with those objects.
Domain Naming
Master control addition and removal of objects within forest
Relative ID Master
Controls the sequence number of domain controllers within the domain. It
assigns a unique sequence of RIDs to each domain controller. When a object is
created by domain controller it is assign with unique SID. SID is a combination
of domain SID (constant ID) and RID. IF RID Master unavailable and domain
controller exhaust its pool, then it will be unable to create new objects.
PDC Emulator This role in used when a domain contain
non-active directory computers.
Infrastructure
Master Responsible for maintaining inter-domain object
reference. It informs certain objects that other objects in another domain are
modified or updated.
15.
What is active directory schema?
The
schema is a definition of the types of objects that are allowed within a directory
and the attributes that are associated with those objects. Theses definition
must be consistent across domains for securities and access right to function
correctly.
16.
What is global catalog?
Domain
controllers keep a complete copy of active directory database for a domain, so
that information about each object in the domain is readily available to user
and services. This works well within a domain but posse’s problem in crossing
domain trees. Active directory solved this issue with a special limited
database call global catalog. The global catalog stores partial replicas of the
directories of other domains. It is stored on global catalog server. It performs
two main functionsà logon capability
and query within active directory.
17.
What would a rise in the Local Delivery
queue generally mean?
This
indicates a performance issue or outage on the local server. Reasons could be
slowness in consulting AD, slowness in handing messages off to local delivery
or SMTP delivery. It could also be databases being dismounted or a lack of disk
space.
18.
What are the disadvantages of circular
logging?
In the event of a corrupt database, data
can only be restored to the last full backup.
19.
What is
the maximum storage capacity for Exchange standard version? What would you do
if it reaches maximum capacity?”
16GB.Once the store dismounts at the 16GB limit the
only way to mount it again is to use the 17GB registry setting. And even this
is a temporary solution.
If you apply Exchange 2003 SP2 to your Standard Edition server, the database size limit is initially increased to 18GB. Whilst you can go on to change this figure to a value up to 75GB, it’s important to note that 18GB is the default setting
HKLM\System\CurrentControlSet\Services\MSExchangeIS\{server name}\Private-{GUID
It therefore follows that for registry settings that relate to making changes on a public store, you’ll need to work in the following registry key:
HKLM\System\CurrentControlSet\Services\MSExchangeIS\{server name}\Public-{GUID}
If you apply Exchange 2003 SP2 to your Standard Edition server, the database size limit is initially increased to 18GB. Whilst you can go on to change this figure to a value up to 75GB, it’s important to note that 18GB is the default setting
HKLM\System\CurrentControlSet\Services\MSExchangeIS\{server name}\Private-{GUID
It therefore follows that for registry settings that relate to making changes on a public store, you’ll need to work in the following registry key:
HKLM\System\CurrentControlSet\Services\MSExchangeIS\{server name}\Public-{GUID}
Under
the relevant database, create the following registry information:
Value type: REG_DWORD
Value name: Database Size Limit in GB
Set the value data to be the maximum size in gigabytes that the database is allowed to grow to. For the Standard Edition of Exchange, you can enter numbers between 1 and 75. For the Enterprise Edition, you can enter numbers between 1 and 8000. Yes, that’s right, between 1GB and 8000GB or 8TB. Therefore, even if you are running the Enterprise Edition of Exchange, you can still enforce overall database size limits of, say, 150GB if you so desire.
Value type: REG_DWORD
Value name: Database Size Limit in GB
Set the value data to be the maximum size in gigabytes that the database is allowed to grow to. For the Standard Edition of Exchange, you can enter numbers between 1 and 75. For the Enterprise Edition, you can enter numbers between 1 and 8000. Yes, that’s right, between 1GB and 8000GB or 8TB. Therefore, even if you are running the Enterprise Edition of Exchange, you can still enforce overall database size limits of, say, 150GB if you so desire.
20.
What is
a Distribution List?
In
e-mail applications, a distribution list is a group of mail recipients that is
addressed as a single recipient. Distribution lists are used to send e-mail to
groups of people without having to enter each recipient's individual address. A
distribution list is different from an e-mail list in that members cannot reply
to the distribution list's name to send messages to everyone else in the group.
Distribution
list is a term sometimes used for a function of email clients where lists of
email addresses are used to email everyone on the list at once. This can be
referred to as an electronic mailshot. It differs from a mailing list,
electronic mailing list or the email option found in an Internet forum as it is
usually for one way traffic and not for coordinating a discussion. In effect,
only members of a distribution list can send mails to the list.
21.
GAL,
Routing Group, Stm files, Eseutil & ininteg - what are they used for?
(.STM) Streaming store file. A file used by Microsoft Exchange
(mail) server to store user emails. The file is
called a streaming file since data is added to it sequentially in its
native format. The data itself inside
the STM file is not encoded or encrypted in any way so if a store is
dismounted the file can be viewed
using a text editor.
ESEUTIL is a repair utility. It is a tool to defragment
your exchange databases offline, to check their integrity and to
repair a damaged/lost database.
ESEUTIL is located in the \EXCHSRVR\BIN directory. This
directory is not in the system path so you must open the
tool in the BIN directory or enhance the
system path with the \EXCHSRVR\BIN directory.
GAL: is Global Address List, it contains most if not all
email addresses in your Exchange organization.
22.
What is
MIME & MAPI?
MIME = Multipurpose Internet Mail Extensions It defines
non-ASCII message formats. It
is a coding standard that defines the structure of E-Mails and other
Internet messages. MIME is also used for declaration of content from other
Internet protocols like HTTP, Desktop environments like KDE, Gnome or Mac OS X
Aqua. The standard is defined in RFC 2045.
With MIME it is possible to exchange information about
the type of messages (the content type) between the sender and the recipient of
the message. MIME also defines the art of coding (Content-Transfer-Encoding).
These are different coding methods defined for the
transportation of non ASCII characters in plain text documents and non text
documents like Images, Voice and Video for transportation through text based
delivery systems like e-mail or the Usenet.
The non text elements will be encoded from the sender of
the message and will be decoded by the message recipient. Coding of non ASCII
characters is often based on “quoted printable” coding, binary data typically
using Base64-coding.
There is an extension of this Standard called S/MIME
(Secure Multipurpose Internet Mail Extensions) that allows the signing and
encryption of messages. There are other e-mail encryption
solutions like PGP/MIME (RFC 2015 and 3156).
MAPI = Messaging
Application Programming Interface It's the programming interface for email. It is a
Microsoft Windows program interface that enables you to send e-mail
from within a Windows application and attach the document you are working on to
the e-mail note. Applications that take advantage of MAPI include word
processors, spreadsheets, and graphics applications. MAPI-compatible
applications typically include a Send Mail or Send in the File
pulldown menu of the application. Selecting one of these sends a request to a
MAPI server
23.
Details of clustering Service?
Clustering
Technology: - Network load Balancing and Microsoft Cluster Service
Network Load
Balancing:
- Available with any version of Server 2003.Configured through Network Load
Balancing Manager. NLB can contain upto 32 nodes. NLB works on the concept of
heartbeats. Does not require special shred HDD.
Microsoft Cluster
Service: -
It is application service-aware. It cannot consist of: - IDE disks, software
raid, dynamic volumes, mount point; encrypt file system, remote storage. Three
different cluster configurations areà single
node server cluster, single quorum device server cluster and majority node set
server cluster. It requires Windows server 2003 Enterprise or Datacenter
edition. Cluster contains up to 8 nodes.
24.
List the
services of Exchange Server 2003?
There
are several services involved with Exchange Server,
and stopping different services will accomplish
different things. The services are interdependent, so when you stop or start
various services you may see a message about having to stop dependent services.
If you do stop dependent services, don't forget to restart them again when you
restart the service that you began with. To shut down Exchange completely on a
given machine, you need to stop all of the following services:
Microsoft Exchange Event (MSExchangeES)
This service was used for launching
event-based scripts in Exchange 5.5 when folder changes were detected. Exchange
2000 offered the ability to create Event Sinks directly, so this use of this
service has decreased. This service is not started by default.
Microsoft Exchange IMAP4 (IMAP4Svc)
This
service supplies IMAP4 protocol message server functionality. This service is
disabled by default. To use IMAP4 you must enable this service, configure it to
auto-start, and start the service.
Microsoft Exchange
Information Store (MSExchangeIS)
This
service is used to access the Exchange mail and public folder stores. If this
service is not running, users will not be able to use Exchange. This service is
started by default.
Microsoft Exchange
Management (MSExchangeMGMT)
This
service is responsible for various management functions available through WMI,
such as message tracking. This service is started by default.
Microsoft Exchange
MTA Stacks (MSExchangeMTA)
This
service is used to transfer X.400 messages sent to and from foreign systems,
including Exchange 5.5 Servers. This service was extremely important in
Exchange 5.5, which used X.400 as the default message transfer protocol. Before
stopping
or disabling this service, review MS KB 810489. This service is started by
default.
Microsoft
Exchange POP3 (POP3Svc)
This
service supplies POP3 protocol message server functionality. This service is
disabled by default. To use POP3 you must enable this service, configure it to
auto-start, and start the service.
Microsoft
Exchange Routing Engine (RESvc)
This
service is used for routing and topology information for routing SMTP based
messages. This service is started by default.
Microsoft
Exchange System Attendant (MSExchangeSA)
This
service handles various cleanup and monitoring functions. One of the most
important functions of the System Attendant is the Recipient Update Service
(RUS), which is responsible for mapping attributes in Active Directory to the
Exchange subsystem and enforcing recipient policies. When you create a mailbox
for a user, you simply set some attributes on a user object. The RUS takes that
information and does all of the work in the background with Exchange to really
make the mailbox. If you mailbox-enable or mail-enable objects and they don't
seem to work, the RUS is one of the first places you will look for an issue. If
you need to enable diagnostics for the RUS, the parameters are maintained in a
separate service registry entry called MSExchangeAL. This isn't a real service;
it is simply the supplied location to modify RUS functionality. This service is
started by default.
Microsoft
Exchange Site Replication Service (MSExchangeSRS)
This
service is used in Organizations that have Exchange 5.5 combined with Exchange
2000/2003. This service is not started by default.
Network
News Transfer Protocol (NntpSvc)
This
service is responsible for supplying NNTP Protocol Server functionality. This
service is started by default.
Simple
Mail Transfer Protocol (SMTPSVC)
This
service is responsible for supplying SMTP Protocol Server functionality. This
service is started by default.
25.
Service
dependency in Exchange Server 2003
Microsoft
Exchange System Attendant (Event Log, NTLM
Security Service Provider,RPC, RPC Locator, Server, Workstation)
Microsoft
Exchange Information Store-- (MS Exchange
System Attendant, Exchange Installable File System)
Microsoft
Exchange IMAP4-- IIS Admin Service
Microsoft
Exchange POP3- IIS Admin Service
Microsoft
Exchange MTA Stack- MS Exchange System
Attendant
Microsoft
Exchange Management RPC, WMI
Microsoft
Exchange Routing Engine IIS Admin Service
Microsoft
Exchange Events Microsoft Exchange
Information Store
26.
How
would you recover Exchange server when the log file is corrupted?
To resolve this issue, you must remove the corrupted log file from
your Microsoft Exchange 2000 Server computer. To remove the corrupted log file,
follow these steps:
1.
|
Perform an offline backup of the Exchange
databases in the storage group that contains the corrupted log file.
Important When you perform an offline backup, the Exchange 2000 computer is unavailable to users whose mailboxes are stored in the storage group that you are backing up. The Exchange 2000 computer is unavailable to the users because you must dismount the databases in the storage group.
When the backup is finished, continue to
step 2.
|
||||||||||||||||||||
2.
|
Use the Eseutil utility (Eseutil.exe) to
determine whether the databases are in a consistent state or in an
inconsistent state. A consistent state is the same as a clean shutdown
state. An inconsistent state is the same as a dirty shutdown state. To
determine whether the databases are in a consistent state or in an
inconsistent state, follow these steps:
For additional information about where to
find the Eseutil utility, click the following article number to view the
article in the Microsoft Knowledge Base:
170091
(http://support.microsoft.com/kb/170091/) XADM: Location of the
Eseutil utility
For additional information about Eseutil command line switches, click the following article number to view the article in the Microsoft Knowledge Base:
317014
(http://support.microsoft.com/kb/317014/) XADM: Exchange 2000 Server
Eseutil command line switches
|
||||||||||||||||||||
3.
|
If the databases are consistent, move all
the log files out of the folder where your database files are located, and
then mount the stores. The folder where your database files are located is
typically the Exchsrvr\Mdbdata folder. As with any situation where a log file
has been corrupted, some data loss will occur.
|
||||||||||||||||||||
4.
|
If the databases are inconsistent, you
can try to perform a soft recovery of the files. Important To perform
a soft recovery, you must stop the Microsoft Exchange Information Store
service. When the Information Store service is stopped, all users who have
their mailboxes stored on the server will not be able to send and receive
mail.
To perform a soft recovery of the files, follow these steps:
|
||||||||||||||||||||
5.
|
If the soft recovery is unsuccessful, you
can try to perform a recovery of the Exchange database by restoring from a
backup. The databases in the storage group must remain dismounted if you try
to restore from a backup.
Note If you enabled circular logging for the storage group that the inconsistent database is located in, you can only recover the data that was in the database when you performed the last working full backup. To determine if circular logging is enabled, right-click the storage group, click Properties, and then view the status of the Enable Circular Logging check box.
|
||||||||||||||||||||
6.
|
If there are no backups available that
you can use and if the database remains in an inconsistent state, you can try
to repair your databases by using the eseutil /p command.
Note If you use the eseutil /p command, you may lose some Exchange 2000 data. The command is a hard command. A hard command is also known as a forcible-state recovery command. Microsoft recommends that you use this command only if the public information store or the private information store does not return to a consistent state after you perform the steps that are described earlier in this article. For more information about the ramifications of using the eseutil /p command, click the following article number to view the article in the Microsoft Knowledge Base:
259851
(http://support.microsoft.com/kb/259851/) Ramifications of running the
eseutil /p or edbutil /d /r command in Exchange
|
27.
How can
you recover a deleted mail box?
In
Exchange, if you delete a mailbox, it is disconnected for a default period of
30 days (the mailbox retention period), and you can reconnect it at any point
during that time. Deleting a mailbox does not mean that it is permanently
deleted (or purged) from the information store database right away; only that
it is flagged for deletion. At the end of the mailbox retention period, the
mailbox is permanently deleted from the database. You can also permanently
delete the mailbox by choosing to purge it at any time.
This
also means that if you mistakenly delete a mail-enabled user account, you can
recreate that user object, and then reconnect that mailbox during the mailbox
retention period.
Configure
the deleted mailbox retention period at the mailbox store object level.
To Delete a Mailbox in Exchange
1.
Right-click the user in Active Directory Users and Computers.
2.
Click Exchange Tasks.
3.
Click Next on the Welcome page of the Exchange Task Wizard.
4.
Click Delete Mailbox.
5.
Click Next, click Next, and then click Finish.
The
mailbox is now flagged for deletion and will be permanently deleted at the end
of the mailbox retention period unless you recover it.
To Reconnect (or Recover) a Deleted
Mailbox
1.
In Exchange System Manager, locate the mailbox store that contains the
disconnected mailbox.
2.
Click the Mailboxes object under the mailbox store.
3.
If the mailbox is not already marked as disconnected (the mailbox icon appears
with a red X), right-click the Mailboxes object, and then click Cleanup Agent.
4.
Right-click the disconnected mailbox, click Reconnect, and then select the
appropriate user from the dialog box that appears.
5.
Click OK.
Note
Only one user may be connected to a mailbox because all globally unique
identifiers (GUIDs) are required to be unique across an entire forest
.
To Reconnect a Deleted Mailbox to a
New User Object
1.
In Active Directory Users and Computers, create a new user object. When you
create the new user object, click to clear the Create an Exchange Mailbox check
box.
You
will connect this user account to an already existing mailbox.
2.
Follow steps 1 through 4 in the preceding "To Reconnect (or Recover) a
Deleted Mailbox" section.
To Configure the Mailbox Retention
Period
1.
Right-click the mailbox store, and then click Properties.
2.
On the Limits tab, change the Keep deleted mailboxes for (days) default setting
of 30 to the number of days you want.
3.
Click OK.
28.
What is the use of ESUtil.exe?
Repair the
database. ESEUTIL is a tool to defragment your exchange databases
offline, to check their integrity and to repair a damaged/lost database.
ESEUTIL is located in the \EXCHSRVR\BIN directory. This
directory is not in the system path so you must open the tool in the BIN
directory or enhance the system path with the \EXCHSRVR\BIN directory.
You can
use the Eseutil utility to defragment the information store and directory in
Microsoft Exchange Server 5.5 and to defragment the information store in
Microsoft Exchange 2000 Server and in Microsoft Exchange Server 2003. Eseutil
examines the structure of the database tables and records (which can include
reading, scanning, repairing, and defragmenting) the low level of the database
(Ese.dll).
Eseutil is located in the Winnt\System32 folder in Exchange Server 5.5 and in the Exchsrvr/Bin folder in Exchange 2000 and in Exchange 2003. The utility can run on one database at a time from the command line.
29.
Difference between Exchange 2003 and 2007?
Exchange Server 2003
Exchange Server 2003 may be run on the Windows 2000 Server if the
fourth service pack has already been installed. It may also be run on 32 bit
Windows Server 2003. There is a new disaster recovery feature that is even
better than before. It allows the server to experience less downtime. The
Exchange Server 2003 received some features form Microsoft Mobile Information
server as well. These include Outlook Mobile Access as well as ActiveSync.
Improved versions of anti-spam and anti-virus were also included. Management
tools for mailboxes and messages have been improved and Instant Messaging and
Exchange Conferencing Server are now separate products. There are two versions
available of Exchange Server 2003. These include the Enterprise edition and the
Standard edition. There are many other features that are available on Exchange
Server 2003.
Exchange Server 2007
When Exchange Server 2003 was released there were no immediate
plans as to what would happen to the product. A 2005 edition was dropped and it
was not until the end of 2006 that the new version was released. Some of the
new features included integration of voicemail, improved filtering, Web service
support, and Outlook Web Access interface. The new edition was run on a 64 bit
x 64 version of Windows Server. This increases the performance significantly.
There are quite a few improvements to Exchange Server 2007. These include
better calendaring, improved web access, unified messages, and better mobility.
From a system protection standpoint there is more clustering, antivirus, anti
spam, and compliance included. The IT experience is improved overall with a
64-bit performance. Deployment is better; routing is simplified as well as the
command line shell and GUI.
30.
What is
required for using RPC over Https with MS Outlook?
You can configure user accounts in
Microsoft® Office Outlook® 2003 to connect to Microsoft Exchange Server 2003
over the Internet without the need to use virtual private network (VPN)
connections. This feature — connecting to an Exchange account by using Remote
Procedure Call (RPC) over HTTP — allows Outlook users to access their Exchange
Server accounts from the Internet when they are traveling or are working
outside their organization's firewall.
There are several requirements for
this feature. These include:
Microsoft Windows® XP with
Service Pack 1 and the Q331320 hotfix (or a later service pack) installed on
users' computers
Outlook 2003
Microsoft Exchange Server 2003 e-mail
accounts
Microsoft Windows Server™ 2003
(required for server components only)
Server requirements
RPC
over HTTP/S requires Windows Server 2003 and Exchange Server 2003. RPC over
HTTP/S also requires Windows Server 2003 in a Global Catalog role.
Client requirements
·
The client computer must be running
Microsoft Windows X
Professional Service Pack 1 (SP1) or later.
Professional Service Pack 1 (SP1) or later.
If
you're running SP1, you must install the following update package:
Outlook 2003 Performs
Slowly or Stops Responding When Connected to Exchange Server 2003 Through HTTP
- 331320
If
you have installed Windows XP SP2, you do NOT have to install the update
package.
You can also run Windows Server 2003 as the client operating system.
You can also run Windows Server 2003 as the client operating system.
·
The client computer must be running
Microsoft Office Outlook 2003.
Recommendations
Here
are some of Microsoft's (and my) recommendations when using Exchange with RPC
over HTTP:
·
Use basic authentication over Secure
Sockets Layer (SSL) - You should enable and require the use of SSL on the RPC
proxy server for all client-to-server communications.
·
Use an advanced firewall server on the
perimeter network - A dedicated firewall server is recommended to help enhance
the security of your Exchange computer. Microsoft Internet Security and
Acceleration (ISA) Server 2000 is an example of a dedicated firewall server
product.
·
Obtain a certificate from a third-party
certification authority (CA) - When using the Basic Authentication you
MUST use an SSL-based connection, and you will have to configure a Digital
Certificate for your Default Website. Read Configure
SSL on Your Website with IIS for more on this issue.
A
Digital Certificate needs to be obtained from a CA (Certification Authority),
either a 3rd-party commercial CA such as Verisign, Thawte and others, or from
an internal CA.
Windows
2000/2003 has a built-in CA that can be installed and used, however, when
issuing a Digital Certificate from your internal CA you MUST be 100% sure that
the client computers that are going to connect to the server are properly
configured to trust this CA.
Most
operating systems are pre-configured to trust known 3rd-party CAs such as
Verisign, Thawte and others. However unless these computers are made members of
the Active Directory domain where you've installed your CA, they will NOT
automatically trust your internal CA, and thus your connection will fail! In
these scenarios, when a user tries to connect by using RPC over HTTP/S, that
user loses the connection to Exchange and is NOT notified.
In
such scenarios you must import the ROOT CA Digital Certificate into the client
computers in order to make them trust your CA.
When
using 3rd-party trusted CAs, in most cases you won't be required to import
anything to the client computers, however you will be required to pay a few
hundred dollars for such a Digital Certificate.
Additionally,
if you use your own certification authority, when you issue a certificate to
your RPC proxy server, you must make sure that the Common Name field or the
Issued to field on that certificate contains the same name as the URL of the
RPC proxy server that is available on the Internet.
32.
Which
protocol is used for Public Folder?
NNTP Network News Transfer Protocol, both nntp and imap helps clients to
access the public folder. but actually,SMTP send the mails across the public
folder.
33.
What is
latest service pack Exchange 2003? SP2
34.
What is
latest service pack Exchange 2000?
SP4
35.
What is
the name of Exchange Databases? priv1.edb
36.
How many
databases in Standard Exchange version? 1
37.
How many
databases in Enterprise Exchange version? 20
38.
What is
Storage Group?
The Exchange store has
several logical components that interact with each other. These components
can reside on a single server, or they can be distributed across multiple
servers. This topic provides details about the following primary components of
the Exchange store:
·
Storage groups (including recovery storage
groups)
·
Mailbox databases
·
Public folder databases
Storage
groups
An
Exchange storage group is a logical container for Exchange databases
and their associated system and transaction log files.
Storage groups are the basic unit for
backing up and restoring data in Microsoft Exchange (although you can
restore a single database). All databases in a storage group share a single
backup schedule and a single set of transaction log files.
Exchange Server 2007 Enterprise
Edition supports up to 50 storage groups. Exchange 2007 Standard
Edition supports up to five storage groups.
1.
What is
mail store?
The mail store is a directory
or Universal Naming Convention (UNC) path where the POP3 service stores all
e-mail until users retrieve it to their client computer.
The basic structure of the mail
store, or mail root, is a directory on the local hard disk where all e-mail is
stored.
When a domain is created, the
POP3 service creates a corresponding directory in the directory that has been
designated for the mail store. For each user with a mailbox in that domain,
POP3 creates a directory in the domain directory. E-mail that a user receives
is stored as an individual file within the user's directory until the user
retrieves it using a POP3 e-mail client.
The following is an example of
the path to an e-mail message in the mail store:
C:\inetpub\mailroot\mailbox\example.com\P3_someone.mbx\P347865.eml
Where mailroot corresponds to
the mail store directory, example.com to the domain directory, P3_somone.mbx to
the directory for a mailbox named someone and P347865.eml to a single saved
e-mail message.
The directory and file
permissions for each directory in the mail store are identical. When you
configure the mail store, the permissions are set so that only local or domain
administrators and the local network service, which the POP3 service is
configured to run under, are assigned permissions to the directories. No other
user is assigned read/write permissions.
The mail store's functionality
depends on having adequate hard disk space available. To ensure the mail
store's functionality, you should develop a disk-space requirement estimate
based on the number of users on the server, the volume of e-mail that they will
receive, and the average size of the e-mail they will receive.
In addition, you can protect
the server from situations where the mail store's disk usage might increase
unexpectedly by implementing disk quotas. Disk quotas monitor and control disk
space that is used on NTFS file system volumes.
Notes
Because the mail store can
potentially use large amounts of disk space, you should either set a disk quota
limit on the volume of the mail store (to control its disk space usage) or set
it to use a volume other than the one where the operating system is installed.
This will prevent the possibility of the operating system running out of disk
space if the mail store becomes too large.
The mail store must be
configured to use either a directory on the local hard disk or a UNC path;
other storage options, such as mapped drives, are not supported.
You cannot set the mail store
to the root directory of the hard disk, for example C:\, or to a directory in
which files are currently in use.
If you transfer the mail store
to a new directory, you must move the mail store directory to ensure the
directory retains the correct ownership; copying the mail store will not work.
Physical access to a server is
a high security risk. To maintain a more secure environment, restrict physical
access to the server where the mail store resides.
2.
Explain
Exchange transaction logs
Before changes are actually made to an
Exchange database file, Exchange writes the changes to a transaction log file.
After a change has been safely logged, it can then be written to the database
file.
One of the most important components of Exchange server
is the transaction logs. Exchange server was designed to write all transactions
to these log files and commit the changes to the databases when the system
allows. Users can send and receive messages without touching the database
thanks to this write-ahead method of logging.
When a message is sent, the transaction is first recorded
in the transaction logs. Until the transaction is committed to the Exchange
database (EDB), the only existence of this data is in the system memory and the
transaction logs. In the event of a crash, you lose the contents of the memory
and all you are left with is the record in the transaction log. These
transaction logs are crucial to the recovery of a failed Exchange server,
whether it was a minor crash that required a reboot, or a more catastrophic
failure requiring the deployment of your disaster recovery plans. The same goes
for other transactions such as received messages, deleted items and messages
moved to different folders.
3.
What is
default size for Transaction logs?
5
MB for 2003 and 1 MB for 2007
4.
Why
exchange is using transaction logs? Why not to write to data directly to the
Exchange database?
One of the most important components of Exchange server
is the transaction logs. Exchange server was designed to write all transactions
to these log files and commit the changes to the databases when the system
allows. Users can send and receive messages without touching the database thanks
to this write-ahead method of logging.
When a message is sent, the transaction is first recorded
in the transaction logs. Until the transaction is committed to the Exchange
database (EDB), the only existence of this data is in the system memory and the
transaction logs. In the event of a crash, you lose the contents of the memory
and all you are left with is the record in the transaction log. These
transaction logs are crucial to the recovery of a failed Exchange server,
whether it was a minor crash that required a reboot, or a more catastrophic
failure requiring the deployment of your disaster recovery plans. The same goes
for other transactions such as received messages, deleted items and messages
moved to different folders.
For this reason, it is recommended to house the
transaction files on a redundant storage system, like a RAID 1 array, so that
in the event of a hardware failure, no data is lost. Losing a set of
transaction logs will not prevent you from restoring from your backups, but you
will lose all the messages and changes since the last full backup.
5.
How
exchange database gets defragmented?
There are two types of Exchange database defragmentation: online
and offline.
Online Defragmentation
Online Defragmentation
Online defragmentation is one of several database-related
processes that occur during Exchange database maintenance. By default, on
servers running Exchange 2000 Server and Exchange Server 2003, Exchange Server
database maintenance occurs daily between 01:00 (1:00 A.M.) and 05:00 (5:00
A.M.). Online defragmentation occurs while Exchange Server databases remain
online. Therefore, your e-mail users have complete access to mailbox data
during the online defragmentation process.
The online defragmentation process involves automatically detecting and deleting objects that are no longer being used. This process provides more database space without actually changing the file size of the databases that are being defragmented.
Note: To increase the efficiency of defragmentation and backup processes, schedule your maintenance processes and backup operations to run at different times.
The online defragmentation process involves automatically detecting and deleting objects that are no longer being used. This process provides more database space without actually changing the file size of the databases that are being defragmented.
Note: To increase the efficiency of defragmentation and backup processes, schedule your maintenance processes and backup operations to run at different times.
Offline Defragmentation
Offline defragmentation involves using the Exchange Server Database Utilities (Eseutil.exe). ESEUTIL is an Exchange Server utility that you can use to defragment, repair, and check the integrity of Exchange Server databases. It is available through the following sources:
If you are running Exchange 2000 Server, ESEUTIL is located in the E:\Support\Utils folder of your Exchange 2000 CD (where E:\ is the drive letter of your CD-ROM drive).
If you are running Exchange Server 2003, ESEUTIL is located in the F:\Program Files\exchsrvr\bin directory after running Exchange Server 2003 Setup (where F:\ is the drive letter of the drive to which you installed Exchange Server).
You can only perform offline defragmentation when your Exchange Server databases are offline. Therefore, your e-mail users will not have access to mailbox data during the offline defragmentation processes.
During the offline defragmentation process, Eseutil.exe creates a new database, copies the old database records to the new one, and then discards unused pages, resulting in a new compact database file. To reduce the physical file size of the databases, you must perform an offline defragmentation in the following situations:
Offline defragmentation involves using the Exchange Server Database Utilities (Eseutil.exe). ESEUTIL is an Exchange Server utility that you can use to defragment, repair, and check the integrity of Exchange Server databases. It is available through the following sources:
If you are running Exchange 2000 Server, ESEUTIL is located in the E:\Support\Utils folder of your Exchange 2000 CD (where E:\ is the drive letter of your CD-ROM drive).
If you are running Exchange Server 2003, ESEUTIL is located in the F:\Program Files\exchsrvr\bin directory after running Exchange Server 2003 Setup (where F:\ is the drive letter of the drive to which you installed Exchange Server).
You can only perform offline defragmentation when your Exchange Server databases are offline. Therefore, your e-mail users will not have access to mailbox data during the offline defragmentation processes.
During the offline defragmentation process, Eseutil.exe creates a new database, copies the old database records to the new one, and then discards unused pages, resulting in a new compact database file. To reduce the physical file size of the databases, you must perform an offline defragmentation in the following situations:
After performing a database repair (using Eseutil /p)
After moving a considerable amount of data from an Exchange Server database.
When an Exchange Server database is much larger than it should be.
After moving a considerable amount of data from an Exchange Server database.
When an Exchange Server database is much larger than it should be.
Defragmenting an Exchange 2000 or Exchange 2003 database
Defragmenting a database requires free disk space equal to 110
percent of the size of the database being processed.
1. In Exchange System Manager, right-click the information store
that you want to defragment, and then click Dismount Store.
2. At the command prompt, change to the Exchsrvr\Bin folder, and
then type the eseutil /d command, a database switch, and any options
that you want to use.
For example, the following command runs the standard
defragmentation utility on a mailbox store database:
C:\program files\exchsrvr\bin> eseutil /d
c:\progra~1\exchsrvr\mdbdata\priv1.edb
Use the following database switch to run Eseutil defragmentation
on a specific database:
eseutil /d <database_name> [options]
6.
What is
white space, and how can it be reclaimed?
White
space is nothing but free space. When the 16 GB database size limit is reached
on the Standard version of Exchange and white space must be reclaimed in order
to mount the database. If you are running Exchange Server 2003, then Service
Pack 2 (SP2) should be installed to raise the limit to 75 GB.
Free
Space Reclamation
The
version store is the area of the database that manages version control. When a
transaction is committed to the database, a cleanup process returns space that
is freed by modify and delete transactions to the database. For each modify or
delete operation, the existing version of the record is written to the version
store so that the database maintains a copy of the old version until the new
version is written to the database. After the transaction is committed to the
database, any space that is freed from deleted records and long values is
returned to the table or index that owns the space. Until the change is
committed to the database, requests for the object continue to access the old
version. If the transaction is rolled back, the version store record is used to
undo the transaction.
The
version store has a size limit that is the lesser of the following: one-fourth
of total random access memory (RAM) or 100 MB.
Because
most domain controllers have more than 400 MB of RAM, the most common
version store size is the maximum size of 100 MB. If too many large
changes or deletions occur simultaneously, it is possible for the version store
to run out of processing space. In this event, cleanup of free space is
suspended temporarily. On domain controllers running
Windows 2000 Server, the most common cause of version store overload
is large-scale bulk deletions.
Bulk
deletions and database growth in Windows 2000
Delete
operations are the most CPU-intensive operations that the version store
processes. On domain controllers running Windows 2000 Server, bulk
deletions, such as the deletion of an entire tree of objects at one time, can
cause a temporary condition in which free space cannot be returned to the
database in a timely fashion because the cleanup process cannot keep up with
the deletions. Event ID 602 is logged in the Directory Services event log
to indicate this condition.
During
the time that pages are being skipped by the cleanup process, free space is not
released to the database, and space is not reclaimed until the next scheduled
online defragmentation occurs. In the meantime, processing requirements can
cause the database to grow. In particular, when bulk deletions or other bulk
changes coincide with database additions, significant growth can occur. In
addition, space from the deletion of long values is not returned to the
database by online defragmentation. As a result of these conditions, the
directory database on domain controllers running Windows 2000 Server
can actually increase in size following a bulk deletion.
On
domain controllers running Windows Server 2003, the effects of these
conditions are greatly reduced by improvements in version store cleanup and online
defragmentation. However, if event ID 602 is logged in the Directory
Services event log, running online defragmentation manually can alleviate the
problem. On domain controllers running Windows 2000 Server, the only
way to prompt online defragmentation is to change the garbage collection
interval to the minimum value of one hour to force garbage collection and
online defragmentation to occur as soon as possible.
Improved
space processing in Windows Server 2003
Two
improvements in the Windows Server 2003 processing of free space
eliminate the database growth problems that can result from large-scale bulk
deletions:
•
|
The
threshold at which the database begins skipping cleanup operations is
increased from 5 percent to 90 percent.
|
•
|
Space
is reclaimed from long-value deletions.
|
The
threshold of maximum pages that can be processed by the version store is the
limiting factor in whether the cleanup process can keep pace with deletions.
The version store cleanup process can take place only as long as the version
store has sufficient space. With a maximum version store size of 100 MB,
only 5 MB (5 percent) is available in Windows 2000 Server,
and this low threshold is responsible for early suspension of the cleanup
process. The threshold of 90 MB (90 percent) in
Windows Server 2003 eliminates this problem. For this reason,
large-scale bulk deletions that can be problematic on domain controllers
running Windows 2000 Server present no significant growth concerns on
domain controllers running Windows Server 2003.
In
addition, online defragmentation on domain controllers running
Windows Server 2003 returns the space that is freed by long values to
the long-value table, which further optimizes the availability of space in the
database.
7.
What
time online maintenance runs by default in Exchange?
Exchange Server database maintenance occurs daily between 01:00
(1:00 A.M.) and 05:00 (5:00 A.M.).
8.
What
event log exchange logs after online defragmentation. What is the maximum storage capacity for
Exchange standard version? What would you do if it reaches maximum capacity?”
For Exchange Server 5.5, an
Event 179 from source ESE97 is logged for each database at the beginning of
online defragmentation. An Event 180 signals completion of online
defragmentation. An Event 183 indicates that online defragmentation did not
complete, but has been suspended and will finish later. Online defragmentation
may be suspended if the online maintenance period that is defined for the
database expires before online defragmentation completes. In this case, online
defragmentation will resume where it left off during the next online
maintenance window.
In Microsoft Exchange 2000 Server and in Microsoft Exchange Server 2003, event ID 700 signals the beginning of a full pass, and event ID 701 signals the completion of a full pass.
You may view or adjust the Information Store Maintenance schedule in the Exchange Server Administrator program for individual databases.
The free space that is reported by Event 1221 is a conservative estimate. If you perform offline defragmentation, you will recover at least the amount of space that is reported as free. All space in an Exchange database is owned either by the database root or by particular tables in the database. Event 1221 estimates free space by calculating the number of empty pages owned by the messages table, the attachments table, and the database root. Free pages that are owned by other tables in the database are not taken into account.
In Microsoft Exchange 2000 Server and in Microsoft Exchange Server 2003, event ID 700 signals the beginning of a full pass, and event ID 701 signals the completion of a full pass.
You may view or adjust the Information Store Maintenance schedule in the Exchange Server Administrator program for individual databases.
The free space that is reported by Event 1221 is a conservative estimate. If you perform offline defragmentation, you will recover at least the amount of space that is reported as free. All space in an Exchange database is owned either by the database root or by particular tables in the database. Event 1221 estimates free space by calculating the number of empty pages owned by the messages table, the attachments table, and the database root. Free pages that are owned by other tables in the database are not taken into account.
9.
Retention
Period:
The retention period specifies how long Exchange will keep items that users have deleted. Upon deleting an item, Exchange marks the item for complete removal based on the retention period. The default retention period is set to 30 days:
The retention period specifies how long Exchange will keep items that users have deleted. Upon deleting an item, Exchange marks the item for complete removal based on the retention period. The default retention period is set to 30 days:
No comments:
Post a Comment