Preview

Database Assignment: ITT Virtual Database

Better Essays
Open Document
Open Document
921 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Database Assignment: ITT Virtual Database
IT260
ITT Virtual Library Assignment
Microsoft Exchange Server 2007
Kolin Bulmer
ITT Technical Institute, Las Vegas

Active Directory Requirements
Here 's what your Windows environment must look like to install Exchange Server 2007:
An available Active Directory forest running a domain functional level of at least Windows 2000 Server native. The Schema Master role must be running Windows Server 2003 Service Pack 1 (SP1). As already required by the presence of Active Directory you need to have Domain Name Service (DNS) installed and configured properly.
At least one global catalog server running at least Windows Server 2003 SP1 in each Active Directory site on which you plan on running Exchange 2007.
If an Exchange organization already
…show more content…

However, only the 64-bit version of Exchange running on a 64-bit version of Windows Server 2003 is supported by Microsoft in production environments.
Normally, at this point in the chapter, you 'd expect to see some silly minimum requirement, like a Pentium 500 MHz with 512 MB or RAM (not even your kids are running a computer that slow!), at which point, I would write a few paragraphs on what the really real minimums are. In this case, Microsoft is taking a bold move forward and making the basic requirement to install Exchange 2007 be that you are running state-of-the-art hardware. The move to recommend 64-bit hardware for Exchange and Active Directory is to increase the performance of both in larger environments. Table 2-1 lists the processor and memory requirements recommended by Microsoft.

Backup of Exchange Server
Exchange 2007 server, there are always two copies of each change to the database: the change written to the page (or series of pages) in RAM, and the log record of those changes in the transaction logs. If the information is lost in RAM, if it has been written to a transaction log, it can be recovered and written to the database. This graph shows the types of backups and its effects on the files/transaction logs.

Type
Copies
…show more content…

To restore the database, you 'll need the last full backup and the most recent differential backup. This is the fastest restore process.
Offline
Yes
N/A
N/A
Offline backups mean that the store process has been shut down prior to backing up the database. This means that all the transaction logs have been flushed to the database and that the database is in a consistent state. Therefore, offline backups are always full backups, because the database must be shut down first. No additional transaction log files are needed to complete a restore of an offline backup. Offline backups require manual selection of the database during the backup process.
Copy
Maybe
Maybe
No
Copy backs up any files that have changed since the last full backup. You must specify which files should be copied. In most scenarios, the copy backup will copy the new transaction logs and the databases, since they will have most likely changed since the last full backup. However, if there are no changes, these files will not be backed up. You can manually select which files should be included in a copy backup, and we suggest that you use the copy backup to copy the transaction logs but not the


You May Also Find These Documents Helpful

  • Satisfactory Essays

    To add two new branch offices we will need to find a strategy to design a replication process. To implement this we will need to use inter-site replication. Inter-site replication is needed when adding domain controllers located in different sites. We will also need a site link (Site link is a logical, transitive connection between two sites that allows replication to occur) protocol of Remote Procedure Call (RPC) over Internet Protocol (IP) which is the preferred choice for the replication process. This allows you to communicate with network services on various computers and also keep data secure when being transmitted by using both encryption and authentication. We will need to take into consideration the cost, schedule, and frequency of the replication. It’s best to set the schedule for the site link during off-peak business hours to ensure the bandwidth is not bogged down on the WAN, due to replication traffic. Frequency will determine how often information is replicated over the site link. I think the best schedule/frequency for the replication would be every 6/hrs starting at 0600/daily.…

    • 670 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Before you can use the Active Directory Schema snap-in for the first time, you must register it with the system.…

    • 585 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    AD FSMO Role Research

    • 414 Words
    • 2 Pages

    * To provide fault tolerance there should be at least 2 DCs available within each domain of the forest.…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    I learned how to add a domain controller to an Active Directory domain, back up and restore Active Directory, and recognize and respond to Active Directory replication issues.…

    • 1334 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    needed by any business. This edition is bundled with the new Internet Information Server (IIS)…

    • 1042 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Unit 10 Assignment 1

    • 344 Words
    • 2 Pages

    * The onsite updates the responsibility of the onsite IT team, and ultimately the IT supervisor. The responsibility of the restore includes the same people plus the OK from management. All parties need to be kept updated with current…

    • 344 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    disk as your system drive? The K: Drive is on the same internal harddisk if the Harddisk fails the backup is lost also. That is why it is important that OM image is backed up externally in case of hard disk failure. If windows becomes corrupt on the system partition you can use the OM image that was partitioned to recover it. That is the one instance that image is viable.…

    • 776 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    IT113 Unit 5

    • 393 Words
    • 2 Pages

    • Active Directory requires DNS to be installed. DNS does not have to be installed on a…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Unit 8 Assignment 1

    • 509 Words
    • 3 Pages

    For safety backups should be stored off site because you could lose everything this will allow you to have the information off-site to be retrieved at a later date.…

    • 509 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    dns scenairo

    • 624 Words
    • 2 Pages

    I recommend that all the information that is needed for each new site is correctly documented and added to the Root Active Directory through the Active Directory sites and services. This is done so that the Root AD will automatically build the intersite replication topology based on the information provided about the new site connections. Each new site AD will have an individual domain controller that is known as the intersite topology generator and they are assigned to build the topology at their sites.…

    • 624 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    1. A) Active Directory Federation Services provides a way for users to access multiple services within a network using a single sign-on process that authenticates for all the services. This eliminates the need for the user to sign-on to multiple services and/or maintain multiple user accounts…

    • 285 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 2 Assesment

    • 271 Words
    • 3 Pages

    In this lab, you used the Microsoft® Active Directory Users and Computers utility to create and manage…

    • 271 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    admin

    • 946 Words
    • 4 Pages

    1. Active Directory uses __________ relationships to allow access between multiple domains and/or forests, either within a single forest or across multiple enterprise networks.…

    • 946 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Chapter 8

    • 259 Words
    • 2 Pages

    Identify the key elements of the technology infrastructure required to successfully implement e-commerce within an…

    • 259 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Records can be stored, electronically, on a computer hard drive, external memory or floppy discs (normally with back up), there could still be a paper record although this is becoming less popular (probably due to the cost of storing the paper and the insurance that comes with storing paper). There might be audio or/ and records video records again there would normally be a backup. Records might well be a product or material for a product, again all of the aforementioned are valid means of keeping…

    • 2265 Words
    • 10 Pages
    Powerful Essays