8.10. Target Exchange 2013 Environment Preparation

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "8.10. Target Exchange 2013 Environment Preparation"

Transcription

1 8.10 Target Exchange 2013 Environment Preparation

2 2015 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement. This software may be used or copied only in accordance with the terms of the applicable agreement. No part of this guide may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording for any purpose other than the purchaser s personal use without the written permission of Quest Software, Inc. The information in this document is provided in connection with Quest products. No license, express or implied, by estoppel or otherwise, to any intellectual property right is granted by this document or in connection with the sale of Quest products. EXCEPT AS SET FORTH IN QUEST'S TERMS AND CONDITIONS AS SPECIFIED IN THE LICENSE AGREEMENT FOR THIS PRODUCT, QUEST ASSUMES NO LIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS, IMPLIED OR STATUTORY WARRANTY RELATING TO ITS PRODUCTS INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT. IN NO EVENT SHALL QUEST BE LIABLE FOR ANY DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL DAMAGES (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION OR LOSS OF INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN IF QUEST HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Quest makes no representations or warranties with respect to the accuracy or completeness of the contents of this document and reserves the right to make changes to specifications and product descriptions at any time without notice. Quest does not make any commitment to update the information contained in this document. If you have any questions regarding your potential use of this material, contact: Quest Software World Headquarters LEGAL Dept 5 Polaris Way Aliso Viejo, CA Refer to our Web site ( for regional and international office information. TRADEMARKS Quest, Quest Software, the Quest Software logo, Simplicity at Work are trademarks and registered trademarks of Quest Software, Inc. For a complete list of Quest Software's trademarks, please see Other trademarks and registered trademarks are property of their respective owners. This documentation is also available online at This site provides robust search capabilities that allow you to search across all related documents. Migration Manager for Exchange Version 8.10 Last updated May 7, 2015

3 Contents About This Guide... 5 Overview... 5 Conventions... 5 Introduction... 6 Preparation Overview... 7 Preparation Checklist... 9 Prerequisites Step 1: Checking System Requirements Step 2: Setting Up Accounts and Required Permissions Step 2.1: Setting Up the Target Active Directory Synchronization Account Step 2.2: Setting Up the Target Exchange Account Step 2.2.1: Changing the Default Target Exchange Account Step 2.2.2: Granting Read Access to the Target Active Directory Domain Step 2.2.3: Granting Membership in Server Local Administrators Group Step 2.2.4: Granting Full Control on Organizational Unit Step Granting Full Control on the Microsoft Exchange System Objects Organizational Unit Step 2.2.6: Granting Permission to Make Public Folders Mail-Enabled Step 2.2.7: Granting Full Control on Exchange 2013 Mailboxes Step 2.2.8: Granting Membership in Recipient Management Group Step 2.2.9: Granting ApplicationImpersonation Role Step 2.3: Setting Up the Target Active Directory Account Step 2.3.1: Changing the Default Target Active Directory Account Step 2.3.2: Granting Read Access to Active Directory Domain Step 2.3.3: Granting Full Control on Organizational Unit Step 2.3.4: Granting Read Permission for the Microsoft Exchange Container Step 2.4: Setting Up Target Agent Host Account Step 2.4.1: Changing the Default Target Agent Host Account Step 2.4.2: Granting Membership in the Local Administrators Group Step 2.5: Setting Up Single Administrative Account for Exchange Migration (Optional) 30 Step 2.5.1: Creating the Single Administrative Account Step 2.5.2: Granting Access to Active Directory Step 2.5.3: Granting Full Control on Exchange Organization Step 2.5.4: Granting Full Control on Exchange 2013 Mailboxes Step 2.5.5: Granting Access to SQL Server Step 2.5.6: Granting Read Permission for the Microsoft Exchange Container Step 2.5.7: Granting Permission to Make Public Folders Mail-Enabled Step 2.5.8: Granting Membership in Recipient Management Group Step 2.5.9: Granting Local Administrative Rights Step : Granting ApplicationImpersonation Role Step : Changing the Default Active Directory, Exchange and Agent Host Account Step 3: Preparing the Target Exchange Environment for Exchange Migration 42 Step 3.1: Backing Up Exchange Step 3.2: Creating Aelita EMW Recycle Bin Public Folder (Optional)

4 Step 3.3: Configuring Public Folder Migration Administrator Mailboxes Step 3.4: Creating Custom Throttling Policies Step 3.5: Installing the Microsoft Exchange Server MAPI Client and Collaboration Data Objects Step 4: Setting Up Connection with the Source Exchange Organization Using SMTP Connectors Step 4.1: Setting up Target Exchange 2013 Organization for Internet Mail Flow between Target and Source Exchange Organizations Step 4.1.1: Creating Send Connector Step 4.1.2: Modifying Default Receive Connector Step 4.1.3: Adding Domain Used for Redirection to the List of Accepted Domains Step 4.2: Configuring Target DNS Server for Mail Forwarding Step 4.3: Testing the SMTP Connectors (Optional) Summary About Quest Software, Inc Contacting Quest Software Contacting Quest Support Third Party Contributions

5 About This Guide Overview This document is prepared to assist you in setting up your Exchange 2013 organization and its environment for being target organization in Exchange migration process conducted by Migration Manager for Exchange. It is intended for network administrators, consultants, analysts, and any other IT professionals using Migration Manager for Exchange. Conventions In order to help you get the most out of this guide, we have used specific formatting conventions. These conventions apply to procedures, icons, keystrokes and crossreferences. ELEMENT Select Bolded text Italic text Bold Italic text CONVENTION This word refers to actions such as choosing or highlighting various interface elements, such as files and radio buttons. Interface elements that appear in Quest products, such as menus and commands. Used for comments. Introduces a series of procedures. Blue text Indicates a cross-reference. When viewed in Adobe Acrobat, this format can be used as a hyperlink. Used to highlight additional information pertinent to the process being described. Used to provide Best Practice information. A best practice details the recommended course of action for the best result. Used to highlight processes that should be performed with care. + A plus sign between two keystrokes means that you must press them at the same time. A pipe sign between elements means that you must select the elements in that particular sequence. 5

6 Introduction Follow the steps in this guide to prepare your Exchange 2013 organization and its environment for being the target organization in the Exchange migration process conducted by Migration Manager for Exchange. For more information about Migration Manager for Exchange refer to the Quest Migration Manager for Exchange Overview. On some of steps you may need to coordinate the setup process with the administrator of the source Exchange organization. 6

7 Preparation Overview This section provides a short overview of the main steps that should be performed to set up your target Exchange 2013 organization and its environment for migration using Migration Manager for Exchange. These steps are described in detail in the related subtopics. Setting up the target Exchange 2013 organization consists of four main steps: Step 1: Checking the System Requirements On this step make sure that your environment meets the minimal system requirements for Migration Manager for Exchange agents. For more details, see Step 1: Checking System Requirements. Step 2: Setting Up Accounts and Required Permissions On the second step you should set up the accounts and required permissions for Exchange migration. There are four main types of accounts used by Migration Manager for Exchange agents: Target Active Directory Synchronization Account This account is used by: a) The Directory Synchronization Agent (DSA) to access the target Active Directory domain b) The Migration Agent for Exchange (MAgE) to perform mailbox switch Target Exchange Account This account is used by Migration Manager for Exchange agents installed on agent host to access the target Exchange server. Target Active Directory Account This account is used by Migration Manager for Exchange agents to access the target domain. Target Agent Host Account This account is used to install and run the Migration Manager for Exchange agents on agent host and to access the license server. You can simplify the setup by using a single administrative account with all Migration Manager for Exchange agents. Such account should have permissions that are required for all the agents on every server that is involved in the migration, both in the source and in the target organization. For more details, see Step 2: Setting Up Accounts and Required Permissions. 7

8 Step 3: Preparing the Target Exchange Environment for Exchange Migration On the third step you should perform common environment preparations: Back up Exchange. Create the Aelita EMW Recycle Bin public folder (optional) Configure public folder migration administrator mailboxes Create custom throttling policies Install Microsoft Exchange Server MAPI Client and Collaboration Data Objects version or later on agent hosts For more details, see Step 3: Preparing the Target Exchange Environment for Exchange Migration. Step 4: Setting Up Connection with the Source Exchange Organization Using SMTP Connectors On the final fourth step you should set up the connection with the source Exchange organization using SMTP connectors. This task consists of three subtasks given below: 1. Setting up the target Exchange 2013 organization for Internet mail flow between target and source Exchange organizations 2. Configuring target DNS server for mail forwarding 3. Testing the SMTP connectors (optional) For more details, see Step 4: Setting Up Connection with the Source Exchange Organization Using SMTP Connectors. 8

9 Preparation Checklist This checklist will help you set up your target Exchange 2013 organization and its environment properly. Make sure you have done all the steps below before completing the preparation. CHECK STEP REFER TO Check the system requirements Step 1 Set up the Target Active Directory Synchronization Account Step 2.1 Set up the Target Exchange Account Step 2.2 Set up the Target Active Directory Account Step 2.3 Set up the Target Agent Host Account Step 2.4 Set up a single administrative account (optional) Step 2.5 Back up Exchange Step 3.1 Create the Aelita EMW Recycle Bin public folder (optional) Step 3.2 Configure public folder migration administrator mailboxes Step 3.3 Create custom throttling policies Step 3.4 Install Microsoft Exchange Server MAPI Client and Collaboration Data Objects version or later on agent hosts Set up the target Exchange 2013 organization for Internet mail flow between target and source Exchange organizations Step 3.5 Step 4.1 Configure the target DNS server for mail forwarding Step 4.2 Test the SMTP connectors (optional) Step 4.3 9

10 Prerequisites Migration Manager for Exchange Target Exchange 2013 Environment Preparation Before starting the preparation of the target Exchange 2013 organization and its environment, make sure that you have the privileges to grant all of the following permissions to accounts. The list of permissions given below contains all required permissions for the accounts. However some of the permissions can be replaced with their equivalents. For more information, see the corresponding steps for each account. Target Active Directory Synchronization Account Membership in the Administrators or Domain Admins group of the target domain. Target Exchange Account Read access to the target domain. Membership in the local Administrators group on all target Exchange servers involved in the migration. If a server is a domain controller, the account should be added to the domain local Administrators group of the domain. Full Control permission on the organizational units (OUs) (and their child objects) where the target synchronized objects are located. Full Control permission on the Microsoft Exchange System Objects organizational unit in all domains in which target Exchange 2013 servers involved in public folder synchronization reside. Full Control permission on target Exchange 2013 organization Membership in the Public Folder Management group. Permissions to log on to every mailbox involved in the migration. Membership in the Recipient Management group. The ApplicationImpersonation role in the target Exchange 2013 organization Target Active Directory Account Read access to the target domain. Full Control permission on the organizational units (OUs) (and their child objects) where the target synchronized objects are located. Read permission for the Microsoft Exchange container in the target Active Directory. Target Agent Host Account Membership in the local Administrators group on the license server (unless alternative credentials are used for the license server). If server is located in another trusted forest, the account should have local Administrator permissions on the license server. Local Administrator permissions on the agent host server. 10

11 Step 1: Checking System Requirements Any computer that does not meet the requirements should be upgraded before installing Migration Manager for Exchange components. Migration Manager for Exchange uses the following Exchange-specific agents involved in the process of migration to Exchange 2013 organization: Public Folder Source Agent (PFSA) Public Folder Target Agent (PFTA) Transmission Agent (NTA) Migration Agent for Exchange Agents work on agent host servers. Agent host can be: 1. An Exchange server itself, which is the default configuration for PFSA, PFTA and NTA. After you enumerate an Exchange organization all Exchange servers are registered as agent hosts for themselves. 2. Another Exchange server from the same Exchange organization. 3. A stand-alone server. It can be located in another forest or workgroup. For detailed information about system requirements for agent hosts, see the Exchange Migration Agents section of the System Requirements and Access Rights. Target Exchange 2013 Organization Considerations The Migration Manager for Exchange console shows only those servers from target Exchange 2013 organization that host the Mailbox role. This is required because only servers with actual data are considered for migration. The Exchange Autodiscover service must be properly configured and run in your Exchange 2013 organization. For information on Autodiscover for Exchange 2013, go to 11

12 SSL certificates enabled on Exchange 2013 Client Access Servers of the target organization should be signed by a trusted publisher. If you use self-signed certificates, you need to log on to each agent host under the Agent Host Account and add certificate from CAS to the Trusted Root Certification Authorities and Trusted Publisher lists. The Exchange 2013 Calendar Repair Assistant (CRA) should be disabled during the migration period. 12

13 Step 2: Setting Up Accounts and Required Permissions This section describes requirements for accounts working with the target Exchange servers. Migration Manager for Exchange allows you to use different administrative accounts for different purposes. Exchange data is migrated by Migration Manager for Exchange agents, which use the following accounts: Target Active Directory Synchronization Account This account is used by: a) The Directory Synchronization Agent (DSA) to access the target Active Directory domain b) The Migration Agent for Exchange (MAgE) to perform mailbox switch For more details, see Step 2.1: Setting Up the Target Active Directory Synchronization Account. Target Exchange Account This account is used by Migration Manager for Exchange agents installed on agent host to access the target Exchange server. For more details, see Step 2.2: Setting Up the Target Exchange Account. Target Active Directory Account This account is used by Migration Manager for Exchange agents to access the target domain. For more details, see Step 2.3: Setting Up the Target Active Directory Account. Target Agent Host Account This account is used to install and run the Migration Manager for Exchange agents on agent host and to access the license server. For more details, see Step 2.4: Setting Up Target Agent Host Account. If you want to have a single administrative account for Exchange migration, you should skip steps and perform Step 2.5: Setting Up the Single Administrative Account for Exchange Migration. 13

14 Step 2.1: Setting Up the Target Active Directory Synchronization Account This section describes how to set the required permissions for the Target Active Directory Synchronization Account. This account is used by: The Directory Synchronization Agent (DSA) to access the target Active Directory domain The Migration Agent for Exchange (MAgE) to perform mailbox switch The required privilege level for the Target Active Directory Synchronization Account is membership in the Domain Admins group of the target domain. If for some reason you cannot grant such privileges to the Target Active Directory Synchronization Account, then refer to the System Requirements and Access Rights document for the list of minimal required permissions. To grant the necessary permission to the Target Active Directory Synchronization Account, perform the following: 1. On the target domain controller in the Active Directory Users and Computers snap-in, click Users, then in the right pane right-click Domain Admins and click Properties. 2. Go to the Members tab, click Add and select the Target Active Directory Synchronization Account (in our example, QMM_Trg_DSA). 14

15 3. Close the dialog boxes by clicking OK. Step 2.2: Setting Up the Target Exchange Account This section describes how to set the required permissions for the Target Exchange Account used by Migration Manager for Exchange agents. This account is used for the following: Working with target Exchange mailboxes and public folders (used by Migration Agent for Exchange, Public Folder Source Agent, and Public Folder Target Agent) Making the newly-created public folders mail-enabled (used by the public folder agents only: Public Folder Source Agent and Public Folder Target Agent) Moving mailboxes The required privileges for the Target Exchange Account are as follows: Read access to the target domain. Membership in the local Administrators group on all target Exchange servers involved in the migration. If a server is a domain controller, the account should be added to the domain local Administrators group of the domain. 15

16 Full Control permission on the organizational units (OUs) (and their child objects) where the target synchronized objects are located. Full Control permission on the Microsoft Exchange System Objects organizational unit in all domains in which target Exchange 2013 servers involved in public folder synchronization reside. Full Control permission on target Exchange 2013 organization Membership in the Public Folder Management group. Permissions to log on to every mailbox involved in the migration. Membership in the Recipient Management group. The ApplicationImpersonation role in the target Exchange 2013 organization To set up the Target Exchange Account, perform the steps described in the related subtopics. Note that the steps are given only as an example of a possible Target Exchange Account setup. Step 2.2.1: Changing the Default Target Exchange Account This section is relevant to the public folder synchronization only. Target Exchange Account for mailbox or calendar synchronization is specified during corresponding job configuration. The default Target Exchange Account (initially displayed on the Connection page of the Exchange server Properties) is set when you add the target organization to the migration project (see the Registering Source and Target Organizations section of the Migration Manager for Exchange User Guide for details). If necessary, you can change the default Target Exchange Account by clicking Modify on the General Connection page in the properties of the corresponding target server in the Migration Manager for Exchange Console. To go on using the default Target Exchange Account for Exchange migration, grant the permissions required for Exchange migration to this account (see the next steps). Step 2.2.2: Granting Read Access to the Target Active Directory Domain Target Exchange Account should have Read access to the target Active Directory. To grant this permission to the Target Exchange Account, complete the following steps: 1. In the Active Directory Users and Computers snap-in, right-click the domain name (in our example, targetdomain), and then click Properties. 2. On the Security tab, click Add and select the Target Exchange Account (in our example, QMM_Trg_Ex). 3. Select the Target Exchange Account, and then check the Allow box for the Read permission in the Permissions box. 16

17 4. Click the Advanced button. In the Advanced Security Settings dialog box, select the account you specified on step 2, and click Edit. 5. In the Permission Entry dialog box, select This object and all descendant (child) objects from the Apply to drop-down list. 6. Close the dialog boxes by clicking OK. Step 2.2.3: Granting Membership in Server Local Administrators Group The Target Exchange Account used by Migration Manager for Exchange agents should be a member of the local Administrators group on each target Exchange server involved in the migration. If the Exchange server is a domain controller, the account should be added to the domain local Administrators group of the domain. To grant the required permissions to the account, perform the following on each target Exchange server involved in the migration: 1. Open the Computer Management snap-in (Click Start Run, enter compmgmt.msc and then click OK). 17

18 2. In the left pane click System Tools Local Users and Groups Groups. 3. Right-click the Administrators group and click Add to Group. 4. Click Add and select the Target Exchange Account (in our example, QMM_Trg_Ex). 5. Close the dialog boxes by clicking OK. Step 2.2.4: Granting Full Control on Organizational Unit To work with the target Active Directory objects, the Target Exchange Account needs the Full Control permission on the organizational units and their child objects that contain the objects to be synchronized. This permission should be set on the domain controller where the objects you need to synchronize are located. To grant the required permissions to the account, perform the following steps: 1. In the Active Directory Users and Computers snap-in, right-click the OU where the objects are located, and click Properties. 2. On the Security tab, click Add, and select the Target Exchange Account (in our example, QMM_Trg_Ex). If there is no Security tab, you should select View Advanced Features in the Active Directory Users and Computers snap-in. 18

19 3. Select the account name, and then enable the Allow option for the Full Control permission in the Permissions box. 4. Click the Advanced button. In the Advanced Security Settings dialog box, select the account you specified on step 2, and click Edit. 5. In the Permission Entry dialog box, select This object and all descendant (child) objects from the Apply to drop-down list. 6. Close the dialog boxes by clicking OK. Step Granting Full Control on the Microsoft Exchange System Objects Organizational Unit The Target Exchange Account used by Migration Manager for Exchange agents needs the Full Control permission on the Microsoft Exchange System Objects organizational unit (OU) in all domains in which target Exchange 2013 servers involved in public folder synchronization reside. 1. In the Active Directory Users and Computers snap-in, right-click the Microsoft Exchange System Objects OU and click Properties. If there is no Microsoft Exchange System Objects OU, you should select View Advanced Features in the Active Directory Users and Computers snap-in. 19

20 2. On the Security tab, click Add, and select the Target Exchange Account (in our example, QMM_Trg_Ex). 3. Select the account name, and then enable the Allow option for the Full Control permission in the Permissions box. 4. Click the Advanced button. In the Advanced Security Settings dialog box, select the account you specified on step 2, and click Edit. 5. In the Permission Entry dialog box, select This object and all descendant (child) objects from the Apply to drop-down list. 6. Close the dialog boxes by clicking OK. Step 2.2.6: Granting Permission to Make Public Folders Mail-Enabled If a public folder is mail-enabled in the source organization, the Public Folder Target Agent needs to be able to make it mail-enabled in the target organization as well. To achieve this, assign your Target Exchange Account permissions to run the Enable- MailPublicFolder cmdlet, as follows: 1. Add this account to the Public Folder Management group in the target Exchange 2013 organization: a) In the Active Directory Users and Computers snap-in select the Microsoft Exchange Security Groups node. 20

21 b) In the right pane, right-click Public Folder Management group and click Properties. c) On the Members tab click Add and select the Target Exchange Account (in our example, QMM_Trg_Ex). d) Close the dialog boxes by clicking OK If the Target Exchange Account is located in another trusted forest, you cannot add the account to the Public Folder Management group. In this case grant the following permissions for the Exchange Administrative Group (FYDIBOHF23SPDLT) container and its descendant (child) objects to the account in the Configuration partition using the ADSIEdit snap-in: Modify public folder replica list permission Modify public folder deleted item retention permission Modify public folder quotas permission 2. Give the account the Full Control permission on the CN=<ExchangeOrganizationName>,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=<...>,DC=<...> container: a) From the Start menu, select Run. In the Run dialog box, type ADSIEdit.msc. Click OK. b) In the ADSIEdit snap-in, open the CN=<ExchangeOrganizationName>,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=<...>,DC=<...> container 21

22 c) Right-click the CN=<ExchangeOrganizationName> container and click Properties. d) In the Properties dialog box, click the Security tab. e) On the Security tab, click Advanced. f) In the Advanced Security Settings dialog box, click Add. g) In the Select User, Computer, Service Account, or Group (or similar) dialog box, select the Target Exchange Account (in our example, QMM_Trg_Ex) and click OK. h) In the Permission Entry for dialog box, select This object and all descendant (child) objects from the Apply to drop-down list. i) Allow Full Control permission for the Target Exchange Account. j) Close the dialog boxes by clicking OK. Step 2.2.7: Granting Full Control on Exchange 2013 Mailboxes The Target Exchange Account used by Migration Manager for Exchange agents needs the Full Control permission on each mailbox database involved in migration. To grant the required permissions to the <User> (in our example, LA\QMM_Trg_Ex), run the following cmdlet in Exchange Management Shell: Get-MailboxDatabase Add-ADPermission -User <User> -AccessRights GenericAll -ExtendedRights Receive-As To verify that all permissions for the Target Exchange Account are set correctly, select any mailbox involved in the migration in the Migration Manager Console and check that the Target Exchange Account has Full Access permissions for the mailbox. 22

23 Step 2.2.8: Granting Membership in Recipient Management Group To perform Move mailbox operations, the Target Exchange Account needs to be assigned permissions to run the following cmdlets: New-MoveRequest Get-MoveRequest Remove-MoveRequest Get-MoveRequestStatistics To grant these permissions, add the account to the Recipient Management group in the target Exchange 2013 organization, as follows: 1. In the Active Directory Users and Computers snap-in select the Microsoft Exchange Security Groups node. 2. In the right pane, right-click Recipient Management group and select Properties from the shortcut menu. 3. On the Members tab click Add and select the Target Exchange Account (in our example, QMM_Trg_Ex). 4. Close the dialog boxes by clicking OK. 23

24 Step 2.2.9: Granting ApplicationImpersonation Role The Target Exchange Account used by Migration Manager for Exchange agents needs the ApplicationImpersonation role in the target Exchange 2013 organization. To grant the required permission to the <User> (in our example, LA\QMM_Trg_Ex), run the following cmdlet in Exchange Management Shell: New-ManagementRoleAssignment -Role ApplicationImpersonation -User LA\QMM_Trg_Ex Step 2.3: Setting Up the Target Active Directory Account This section describes how to set the required permissions for the Target Active Directory Account used by Migration Manager for Exchange agents. This account is used for the following: Working with the target Active Directory Re-homing mailboxes Switching mailboxes (Migration Agent for Exchange) The required permissions for the Target Active Directory Account are as follows: Read access to the target domain Full Control permission on the organizational units (OUs) (and their child objects) where the target synchronized objects are located. Read permission for the Microsoft Exchange container in the target Active Directory To set up the Target Active Directory Account, perform the steps described in the related subtopics. Note that these steps are given only as an example of a possible Target Active Directory Account setup. Step 2.3.1: Changing the Default Target Active Directory Account This section is relevant to the public folder synchronization only. Target Active Directory Account for mailbox or calendar synchronization is specified during corresponding job configuration. The default Target Active Directory Account (initially displayed on the Associated domain controller page of the Exchange server's properties) is set when you add the target organization to the migration project (see the Registering Source and Target Organizations section of the Migration Manager for Exchange User Guide for details). 24

25 To change the Target Active Directory Account, click Modify on the General Associated domain controller page of the corresponding target server properties in the Migration Manager for Exchange Console. To go on using the default Target Active Directory Account for Exchange migration, grant the permissions required for Exchange migration to this account (see the next steps). Step 2.3.2: Granting Read Access to Active Directory Domain The Target Active Directory Account used by Migration Manager for Exchange agents needs Read access to the target domain to work with servers and target Active Directory. To grant this permission to the account, complete the following steps: 1. On the target domain controller in the Active Directory Users and Computers snap-in, right-click the domain name, and then click Properties on the shortcut menu. 2. On the Security tab, click Add and select the account to which you wish to assign permissions (in our example, QMM_Trg_AD). If there is no Security tab, you should select View Advanced Features in the Active Directory Users and Computers snap-in. 3. Select the account name, and then enable the Allow option for the Read permission in the Permissions box. 4. Click the Advanced button. In the Advanced Security Settings dialog box, select the account you specified on step 2 and click Edit. 5. In the Permission Entry dialog box, select This object and all descendant (child) objects from the Apply to drop-down list. 25

26 6. Close the dialog boxes by clicking OK. Step 2.3.3: Granting Full Control on Organizational Unit To work with the target Active Directory objects, the Target Active Directory Account needs the Full Control permission on the organizational units and their child objects that contain the objects to be synchronized. This permission should be set on the domain controller where the objects you need to synchronize are located. To grant the required permissions to the account, perform the following steps: 1. In the Active Directory Users and Computers snap-in, right-click the OU where the objects are located, and click Properties. 2. On the Security tab, click Add, and select the Target Active Directory Account (in our example, QMM_Trg_AD). If there is no Security tab, you should select View Advanced Features in the Active Directory Users and Computers snap-in. 3. Select the account name, and then enable the Allow option for the Full Control permission in the Permissions box. 4. Click the Advanced button. In the Advanced Security Settings dialog box, select the account you specified on step 2, and click Edit. 26

27 5. In the Permission Entry dialog box, select This object and all descendant (child) objects from the Apply to drop-down list. 6. Close the dialog boxes by clicking OK. Step 2.3.4: Granting Read Permission for the Microsoft Exchange Container In the target Exchange 2013 organization, the Target Active Directory Account requires the Read permission on the Microsoft Exchange container in the target Active Directory. To grant this permission, add the account to the View-Only Organization Management group in the target Exchange 2013 organization, as follows: 1. In the Active Directory Users and Computers snap-in select the Microsoft Exchange Security Groups node. 2. In the right pane, right-click View-Only Organization Management group and click Properties. 3. On the Members tab click Add and select the Target Exchange Account (in our example, QMM_Trg_AD). 27

28 4. Close the dialog boxes by clicking OK. If the Target Active Directory Account is located in another trusted forest, you cannot add the account to the View-Only Organization Management group. In this case grant the Read permission for the Microsoft Exchange container and its child objects to the account in the Configuration partition using the ADSIEdit snap-in. Step 2.4: Setting Up Target Agent Host Account This section describes how to set the required permissions for the Target Agent Host Account used by Migration Manager for Exchange agents. This account is used to install and run Migration Manager for Exchange agents on the target agent host and to access the license server. The required privileges for the Target Agent Host Account are as follows: Membership in the local Administrators group on the license server (unless alternative credentials are used for the license server). If server is located in another trusted forest, the account should have local Administrator permissions on the license server Local Administrator permissions on the agent host server. By default, for public folder synchronization each Exchange server is an agent host for itself. If you use the default agent host then to simplify the account setup process, you can grant these permissions to the Target Exchange 28

29 Account and use it instead of the Target Agents Host Account. Note that Active Directory and Exchange accounts for mailbox or calendar synchronization and for public folder synchronization are set separately, and therefore may be different. To set up the Target Agent Host Account, perform the steps described in the related subtopics. Note that the steps are given only as an example of a possible Target Agent Host Account setup. Step 2.4.1: Changing the Default Target Agent Host Account This section is relevant to the public folder synchronization only. Target Agent Host Account for mailbox or calendar synchronization is specified during corresponding job configuration. The default Target Agent Host Account (initially displayed on the Default Agent Host page of the Exchange server Properties) is set when you add the target organization to migration project (see the Registering Source and Target Organizations section of the Migration Manager for Exchange User Guide for details). If necessary, you can change the default Target Agent Host Account. For that, go to the Agent Management node in the Migration Manager for Exchange Console, and use properties of the corresponding agent host server. To go on using the default Target Agent Host Account for Exchange migration, grant the permissions required for Exchange migration to this account (see the next steps). Step 2.4.2: Granting Membership in the Local Administrators Group The Target Agent Host Account should be a member of the local Administrators group on the agent host server and on the license server (unless alternative credentials are used for the license server). If license server is a domain controller, the account should be added to the domain local Administrators group of the domain. Local Administrator permissions are required on the license server if this license server is located in another trusted forest. To add the Target Agents Host Account to the local Administrators group on a server perform the following: 1. Open the Computer Management snap-in (Click Start Run, enter compmgmt.msc and then click OK). 29

30 2. In the left pane click System Tools Local Users and Groups Groups. 3. Right-click the Administrators group and click Add to Group. 4. Click Add and select the Target Agent Host Account (in our example, QMM_Trg_AH). 5. Close the dialog boxes by clicking OK. Step 2.5: Setting Up Single Administrative Account for Exchange Migration (Optional) You can simplify the setup by using one account with all Migration Manager for Exchange agents. This account should have the permissions that are required for all the agents on every server that is involved in the migration both in the source and in the target organization. However, using such an account in a production environment may be a security risk because it would be extremely powerful. The steps described in the related subtopics will help you to set up a single administrative account that can be used by all agents. The same account should be used to launch Migration Manager for Exchange Console. Step 2.5.1: Creating the Single Administrative Account This step should be performed in coordination with the administrator of the source Exchange organization. 30

31 The Migration Manager for Exchange administrative account should be created either in the source or in the target domain. Two-way trusts between the source and the target domain should be established. To ensure that the Migration Manager for Exchange administrative account is not a member of any Active Directory group with some of the permissions denied, we recommend creating a new user account. In our example we create the new user account in the target domain and name it QMMEx. To create such account, perform the following: 1. On the target domain controller in the Active Directory Users and Computers, right-click Users and then click New User. 2. In the New Object - User wizard, type First name and User logon name of the administrative account (in our example, QMMEx), then click Next. 3. Type and confirm the password, select necessary options for the account, click Next and then click Finish. Step 2.5.2: Granting Access to Active Directory The administrative account should have access to the target Active Directory to create objects and modify their properties. To grant such access privileges to the account, add the account to the domain local Administrators group: 1. In the Active Directory Users and Computers snap-in, click Builtin, then in the right pane right-click Administrators and click Properties. 31

32 2. Go to the Members tab, click Add and select the administrative account (in our example, QMMEx). 3. Close the dialog boxes by clicking OK. Step 2.5.3: Granting Full Control on Exchange Organization Grant the administrative account the Full Control permission on the CN=<ExchangeOrganizationName>,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=<...>,DC=<...> container: 1. From the Start menu, select Run. In the Run dialog box, type ADSIEdit.msc. Click OK. 2. In the ADSIEdit snap-in, open the CN=<ExchangeOrganizationName>,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=<...>,DC=<...> container 3. Right-click the CN=<ExchangeOrganizationName> container and click Properties. 4. In the Properties dialog box, click the Security tab. 5. On the Security tab, click Advanced. 6. In the Advanced Security Settings dialog box, click Add. 7. In the Select User, Computer, Service Account, or Group (or similar) dialog box, select the administrative account (in our example, QMMEx) and click OK. 32

33 8. In the Permission Entry for dialog box, select This object and all descendant (child) objects from the Apply to drop-down list. 9. Allow Full Control permission for the administrative account. 10. Close the dialog boxes by clicking OK. Step 2.5.4: Granting Full Control on Exchange 2013 Mailboxes The administrative account used by Migration Manager for Exchange agents needs the Full Control permission on each mailbox database involved in migration. To grant the required permissions to the <User> (in our example, LA\QMMEx), run the following cmdlet in Exchange Management Shell: Get-MailboxDatabase Add-ADPermission -User <User> -AccessRights GenericAll -ExtendedRights Receive-As To verify that all permissions for the administrative account are set correctly, select any mailbox involved in the migration in the Migration Manager Console and check that the administrative account has Full Access permission for the mailbox. 33

34 Step 2.5.5: Granting Access to SQL Server The administrative account should have the appropriate permissions to create and modify databases on a SQL server. In SQL Server Management Studio, browse to the server that will be used by Migration Manager for Exchange, and select Logins from the server Security node. To create a new login for the administrative account, complete the following steps: 1. Right-click Logins and click New Login. 2. On the General page of the Login - New dialog box, specify the administrative account in the Name field (in our example, QMMEx) and select the Windows Authentication method. 3. On the Server Roles page of the Login - New dialog box, select the dbcreator role. 34

35 4. Close the dialog boxes by clicking OK. Step 2.5.6: Granting Read Permission for the Microsoft Exchange Container The administrative account requires the Read permission on the Microsoft Exchange container in the target Active Directory. To grant it, complete the following steps: 1. On the target domain controller in the Active Directory Users and Computers snap-in select the Microsoft Exchange Security Groups node. 2. In the right pane, right-click View-Only Organization Management group and click Properties. 3. On the Members tab click Add and select the administrative account (in our example, QMMEx). 35

36 4. Close the dialog boxes by clicking OK. Step 2.5.7: Granting Permission to Make Public Folders Mail-Enabled If a public folder is mail-enabled in the source organization, the Public Folder Target Agent needs to be able to make it mail-enabled in the target organization as well. To achieve this, assign the administrative account permissions to run the Enabl PublicFolder cmdlet, as follows: 1. Add the account to the Public Folder Management group in the target Exchange 2013 organization: a) In the Active Directory Users and Computers snap-in select the Microsoft Exchange Security Groups node. b) In the right pane, right-click Public Folder Management group and click Properties. c) On the Members tab click Add and select the administrative account (in our example, QMMEx). 36

37 d) Close the dialog boxes by clicking OK 2. Give the account the Full Control permission on the CN=<ExchangeOrganizationName>,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=<...>,DC=<...> container: a) From the Start menu, select Run. In the Run dialog box, type ADSIEdit.msc. Click OK. b) In the ADSIEdit snap-in, open the CN=<ExchangeOrganizationName>,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=<...>,DC=<...> container c) Right-click the CN=<ExchangeOrganizationName> container and click Properties. d) In the Properties dialog box, click the Security tab. e) On the Security tab, click Advanced. f) In the Advanced Security Settings dialog box, click Add. g) In the Select User, Computer, Service Account, or Group (or similar) dialog box, select the administrative account (in our example, QMMEx) and click OK. h) In the Permission Entry for dialog box, select This object and all descendant (child) objects from the Apply to drop-down list. 37

38 i) Allow Full Control permission for the administrative account. j) Close the dialog boxes by clicking OK. Step 2.5.8: Granting Membership in Recipient Management Group To perform Move mailbox operations, the administrative account needs to be assigned permissions to run the following cmdlets: New-MoveRequest Get-MoveRequest Remove-MoveRequest Get-MoveRequestStatistics To grant these permissions, add the account to the Recipient Management group in the target Exchange 2013 organization, as follows: 1. In the Active Directory Users and Computers snap-in select the Microsoft Exchange Security Groups node. 2. In the right pane, right-click Recipient Management group and select Properties from the shortcut menu. 3. On the Members tab click Add and select the administrative account (in our example, QMMEx). 38

39 4. Close the dialog boxes by clicking OK. Step 2.5.9: Granting Local Administrative Rights The administrative account should be a member of the local Administrators groups on the following servers: The Directory Synchronization Agent servers The Migration Manager for Exchange Console server The license server specified in the Migration Manager for Exchange Console options The agent host servers If a server is a domain controller, the account should be added to the domain local Administrators group of the domain. To add the administrative account to the Administrators group, perform the following on each server listed above: 1. Open the Computer Management snap-in (Click Start Run, enter compmgmt.msc and then click OK). 2. In the left pane click System Tools Local Users and Groups Groups. 39

40 3. Right-click the Administrators group and click Add to Group. 4. Click Add and select the administrative account (in our example, QMMEx). 5. Close the dialog boxes by clicking OK. Step : Granting ApplicationImpersonation Role The administrative account used by Migration Manager for Exchange agents needs the ApplicationImpersonation role in the target Exchange 2013 organization. To grant the required permission to the <User> (in our example, TARGETDOMAIN\QMMEx), run the following cmdlet in Exchange Management Shell: New-ManagementRoleAssignment -Role ApplicationImpersonation -User TARGETDOMAIN\QMMEx Step : Changing the Default Active Directory, Exchange and Agent Host Account To begin using the single administrative account for Exchange Migration, you should log on under this account to the computer where the Migration Manager for Exchange Console is installed. After that you need to perform the following steps: For mailbox and calendar synchronization jobs you need to specify the administrative account as each required account while configuring the jobs. 40

41 To change accounts specified for Active Directory and Exchange in existing mailbox or calendar synchronization job, use properties of the corresponding job. To change account specified for agent host, go to the Agent Management node in the Migration Manager for Exchange Console, and use properties of the corresponding agent host server. For public folder synchronization jobs, you need to change the default accounts to administrative account as follows: To change the default Target Exchange Account, click Modify on the General Connection page in the properties of the corresponding target server in the Migration Manager for Exchange Console. To change the default Target Active Directory Account, click Modify on the General Associated domain controller page in the properties of the corresponding target server in the Migration Manager for Exchange Console. To change the default Target Agent Host Account, go to the Agent Management node in the Migration Manager for Exchange Console, and use properties of the corresponding agent host server. 41

42 Step 3: Preparing the Target Exchange Environment for Exchange Migration Perform the steps described in the related subtopics to ensure that your Exchange environment is ready for migration: Step 3.1: Backing Up Exchange Step 3.2: Creating Aelita EMW Recycle Bin Public Folder (Optional) Step 3.3: Configuring Public Folder Migration Administrator Mailboxes Step 3.4: Creating Custom Throttling Policies Step 3.5: Installing the Microsoft Exchange Server MAPI Client and Collaboration Data Objects Step 3.1: Backing Up Exchange Before implementing Migration Manager for Exchange in your production environment, back up your Exchange infrastructure. We recommend that target Active Directory data be backed up at least twice a day during migration. Transaction Log File Cleanup When Migration Manager for Exchange synchronizes mail and public folders, for every megabyte of data migrated from the source to the target, a transaction log file of equal size is generated on the target Exchange server. Exchange-aware backup applications purge the transaction logs after the backup completes. By the time the backup finishes, all logged transactions have already been applied to the store and backed up to tape, making log cleaning safe. Large transaction logs that are generated during mailbox migration quickly occupy free disk space. To work around this problem, perform one of the following: If a full backup strategy is implemented in the organization or there is no backup strategy at all, then circular logging may be enabled for unattended log deletion. If an incremental or differential backup strategy is already implemented in the organization, then make sure that logs are cleared automatically when backup process is finished. Do not enable circular logging in this case. 42

8.7. Target Exchange 2010 Environment Preparation

8.7. Target Exchange 2010 Environment Preparation 8.7 Target Exchange 2010 Environment Preparation 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected by copyright. The software described in this document

More information

Dell Migration Manager for Exchange Target Exchange 2010 Environment Preparation (MAgE)

Dell Migration Manager for Exchange Target Exchange 2010 Environment Preparation (MAgE) Dell Migration Manager for Exchange 8.13 Target Exchange 2010 Environment Preparation (MAgE) Copyright 2016 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright

More information

Defender Delegated Administration. User Guide

Defender Delegated Administration. User Guide Defender Delegated Administration User Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Dell Migration Manager Upgrade Guide

Dell Migration Manager Upgrade Guide 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

4.0. Offline Folder Wizard. User Guide

4.0. Offline Folder Wizard. User Guide 4.0 Offline Folder Wizard User Guide Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this

More information

8.7. Resource Kit User Guide

8.7. Resource Kit User Guide 8.7 Resource Kit User Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected by copyright. The software described in this document is furnished under

More information

Defender 5.7. Defender Desktop Login Installation and Configuration Guide

Defender 5.7. Defender Desktop Login Installation and Configuration Guide Defender 5.7 Defender Desktop Login Installation and Configuration Guide 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in

More information

formerly Help Desk Authority 9.1.3 HDAccess Administrator Guide

formerly Help Desk Authority 9.1.3 HDAccess Administrator Guide formerly Help Desk Authority 9.1.3 HDAccess Administrator Guide 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656

More information

Quest ChangeAuditor 5.1 FOR ACTIVE DIRECTORY. User Guide

Quest ChangeAuditor 5.1 FOR ACTIVE DIRECTORY. User Guide Quest ChangeAuditor FOR ACTIVE DIRECTORY 5.1 User Guide Copyright Quest Software, Inc. 2010. All rights reserved. This guide contains proprietary information protected by copyright. The software described

More information

2.0. Quick Start Guide

2.0. Quick Start Guide 2.0 Quick Start Guide Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this guide is furnished

More information

Quest ChangeAuditor 4.8

Quest ChangeAuditor 4.8 Quest ChangeAuditor 4.8 Migration Guide Copyright Quest Software, Inc. 2009. All rights reserved. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Quick Connect Express for Active Directory

Quick Connect Express for Active Directory Quick Connect Express for Active Directory Version 5.2 Quick Start Guide 2012 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in

More information

FOR WINDOWS FILE SERVERS

FOR WINDOWS FILE SERVERS Quest ChangeAuditor FOR WINDOWS FILE SERVERS 5.1 User Guide Copyright Quest Software, Inc. 2010. All rights reserved. This guide contains proprietary information protected by copyright. The software described

More information

formerly Help Desk Authority 9.1.2 Quest Free Network Tools User Manual

formerly Help Desk Authority 9.1.2 Quest Free Network Tools User Manual formerly Help Desk Authority 9.1.2 Quest Free Network Tools User Manual 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo,

More information

Dell Recovery Manager for Active Directory 8.6. Quick Start Guide

Dell Recovery Manager for Active Directory 8.6. Quick Start Guide Dell Recovery Manager for Active Directory 8.6 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

2011 Quest Software, Inc. ALL RIGHTS RESERVED.

2011 Quest Software, Inc. ALL RIGHTS RESERVED. 8.7 User Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected by copyright. The software described in this document is furnished under a software

More information

6.7. Quick Start Guide

6.7. Quick Start Guide 6.7 Quick Start Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software

More information

Quest One Password Manager

Quest One Password Manager Quest One Password Manager Version 5.5 User Guide 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Dell Spotlight on Active Directory 6.8.3. Server Health Wizard Configuration Guide

Dell Spotlight on Active Directory 6.8.3. Server Health Wizard Configuration Guide Dell Spotlight on Active Directory 6.8.3 Server Health Wizard Configuration Guide 2013 Dell Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software

More information

8.7. Installation Guide

8.7. Installation Guide 8.7 Installation Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected by copyright. The software described in this document is furnished under a

More information

Defender 5.7. Deploying Defender Desktop Login using Microsoft Group Policy

Defender 5.7. Deploying Defender Desktop Login using Microsoft Group Policy Defender 5.7 Deploying Defender Desktop Login using Microsoft Group Policy 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

6.7. Replication: Best Practices and Troubleshooting

6.7. Replication: Best Practices and Troubleshooting 6.7 Replication: Best Practices and Troubleshooting 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

formerly Help Desk Authority 9.1.3 Upgrade Guide

formerly Help Desk Authority 9.1.3 Upgrade Guide formerly Help Desk Authority 9.1.3 Upgrade Guide 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656 USA www.quest.com

More information

Defender 5.7. Remote Access User Guide

Defender 5.7. Remote Access User Guide Defender 5.7 Remote Access User Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

6.9. Administrator Guide

6.9. Administrator Guide 6.9 Administrator Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software

More information

Active Directory Change Notifier Quick Start Guide

Active Directory Change Notifier Quick Start Guide Active Directory Change Notifier Quick Start Guide Software version 3.0 Mar 2014 Copyright 2014 CionSystems Inc., All Rights Reserved Page 1 2014 CionSystems Inc. ALL RIGHTS RESERVED. This guide may not

More information

Enterprise Single Sign-On 8.0.3

Enterprise Single Sign-On 8.0.3 For Internal Use Only Enterprise Single Sign-On 8.0.3 Additional Dedicated Server Instance Copyright 1998-2009 Quest Software and/or its Licensors ALL RIGHTS RESERVED. This publication contains proprietary

More information

Enterprise Single Sign-On 8.0.3 Installation and Configuration Guide

Enterprise Single Sign-On 8.0.3 Installation and Configuration Guide Enterprise Single Sign-On 8.0.3 Installation and Configuration Guide Dedicated Directory Replication Copyright 1998-2009 Quest Software and/or its Licensors ALL RIGHTS RESERVED. This publication contains

More information

Dell Statistica Document Management System (SDMS) Installation Instructions

Dell Statistica Document Management System (SDMS) Installation Instructions Dell Statistica Document Management System (SDMS) Installation Instructions 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Introduction to Version Control in

Introduction to Version Control in Introduction to Version Control in In you can use Version Control to work with different versions of database objects and to keep the database updated. You can review, manage, compare, and revert to any

More information

Using Self Certified SSL Certificates. Paul Fisher. Quest Software. Systems Consultant. Desktop Virtualisation Group

Using Self Certified SSL Certificates. Paul Fisher. Quest Software. Systems Consultant. Desktop Virtualisation Group Using Self Certified SSL Certificates Paul Fisher Systems Consultant paul.fisher@quest.com Quest Software Desktop Virtualisation Group Quest Software (UK) Limited Ascot House Maidenhead Office Park Westacott

More information

ActiveRoles 6.9. Replication: Best Practices and Troubleshooting

ActiveRoles 6.9. Replication: Best Practices and Troubleshooting ActiveRoles 6.9 Replication: Best Practices and Troubleshooting 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration

Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration February 2015 This guide describes how to configure Dell One Identity Cloud Access Manager to communicate with a Dell

More information

Dell InTrust 11.0. Preparing for Auditing Microsoft SQL Server

Dell InTrust 11.0. Preparing for Auditing Microsoft SQL Server 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

2015 Dell Inc. ALL RIGHTS RESERVED. Trademarks

2015 Dell Inc. ALL RIGHTS RESERVED. Trademarks 8.10 User Guide 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure

More information

ActiveRoles 6.9. Quick Start Guide

ActiveRoles 6.9. Quick Start Guide ActiveRoles 6.9 Quick Start Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

Web Portal Installation Guide 5.0

Web Portal Installation Guide 5.0 Web Portal Installation Guide 5.0 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

ChangeAuditor 5.6. For Windows File Servers Event Reference Guide

ChangeAuditor 5.6. For Windows File Servers Event Reference Guide ChangeAuditor 5.6 For Windows File Servers Event Reference Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Quick Connect for Cloud Services

Quick Connect for Cloud Services Quick Connect for Cloud Services Version 3.5 Administrator Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

7.5 7.5. Spotlight on Messaging. Evaluator s Guide

7.5 7.5. Spotlight on Messaging. Evaluator s Guide 7.5 Spotlight on Messaging 7.5 Evaluator s Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

ChangeAuditor 6.0 For Windows File Servers. Event Reference Guide

ChangeAuditor 6.0 For Windows File Servers. Event Reference Guide ChangeAuditor 6.0 For Windows File Servers Event Reference Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Dell Enterprise Reporter 2.5. Configuration Manager User Guide

Dell Enterprise Reporter 2.5. Configuration Manager User Guide Dell Enterprise Reporter 2.5 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license

More information

Spotlight Management Pack for SCOM

Spotlight Management Pack for SCOM Spotlight Management Pack for SCOM User Guide January 2015 The is used to display data from alarms raised by Spotlight on SQL Server Enterprise in SCOM (System Center Operations Manager). About System

More information

Dell Statistica 13.0. Statistica Enterprise Installation Instructions

Dell Statistica 13.0. Statistica Enterprise Installation Instructions Dell Statistica 13.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or

More information

formerly Help Desk Authority 9.1.3 HDAccess User Manual

formerly Help Desk Authority 9.1.3 HDAccess User Manual formerly Help Desk Authority 9.1.3 HDAccess User Manual 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656 USA

More information

8.10. Required Ports

8.10. Required Ports 8.10 Required Ports 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software

More information

Quest vworkspace Connector for Android. User Guide Version 1.1.1

Quest vworkspace Connector for Android. User Guide Version 1.1.1 Quest vworkspace Connector for Android User Guide Version 1.1.1 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Dell AppAssure License Portal User Guide

Dell AppAssure License Portal User Guide Dell AppAssure License Portal 5.5.3.1 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software

More information

Dell Active Administrator 7.5. User Guide

Dell Active Administrator 7.5. User Guide Dell Active Administrator 7.5 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software

More information

4.4. User Guide. Self-Service Desktop Migrator. Notes Migrator for Exchange

4.4. User Guide. Self-Service Desktop Migrator. Notes Migrator for Exchange Notes Migrator for Exchange Self-Service Desktop Migrator 4.4 User Guide Quest Notes Migrator for Exchange Self-Service Desktop Migrator Notes Migrator for Exchange Self-Service Desktop Migrator User Guide

More information

Deploying Defender Desktop Login. using Microsoft Group Policy

Deploying Defender Desktop Login. using Microsoft Group Policy Deploying Defender Desktop Login using Microsoft Group Policy 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in

More information

Object Level Authentication

Object Level Authentication Toad Intelligence Central Version 2.5 New in This Release Wednesday, 4 March 2015 New features in this release of Toad Intelligence Central: Object level authentication - Where authentication is required

More information

Quest vworkspace Virtual Desktop Extensions for Linux

Quest vworkspace Virtual Desktop Extensions for Linux Quest vworkspace Virtual Desktop Extensions for Linux What s New Version 7.6 2012 Quest Software, Inc. ALL RIGHTS RESERVED. Patents Pending. This guide contains proprietary information protected by copyright.

More information

Security Explorer 9.5. User Guide

Security Explorer 9.5. User Guide 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

Dell Spotlight on Active Directory 6.8.4. Deployment Guide

Dell Spotlight on Active Directory 6.8.4. Deployment Guide Dell Spotlight on Active Directory 6.8.4 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

Security Explorer 9.5. About Security Explorer 9.5. New features. June 2014

Security Explorer 9.5. About Security Explorer 9.5. New features. June 2014 June 2014 These release notes provide information about Dell. About New features s Known issues System requirements Product licensing Getting started with Security Explorer Globalization About Dell About

More information

Quest Collaboration Services 3.6.1. How it Works Guide

Quest Collaboration Services 3.6.1. How it Works Guide Quest Collaboration Services 3.6.1 How it Works Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Quest Management Agent for Forefront Identity Manager

Quest Management Agent for Forefront Identity Manager Quest Management Agent for Forefront Identity Manager Version 1.0 Administrator Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.

More information

Quest Privilege Manager Console 1.1.1. Installation and Configuration Guide

Quest Privilege Manager Console 1.1.1. Installation and Configuration Guide Quest Privilege Manager Console 1.1.1 Installation and Configuration Guide 2008 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software

More information

Quest Collaboration Services 3.5. How it Works Guide

Quest Collaboration Services 3.5. How it Works Guide Quest Collaboration Services 3.5 How it Works Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 May 2015 About this guide Prerequisites and requirements NetWeaver configuration Legal notices About

More information

8.6 Migrating to Exchange 2010

8.6 Migrating to Exchange 2010 8.6 Migrating to Exchange 2010 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 May 2015 This guide describes how to configure Microsoft Office 365 for use with Dell One Identity Cloud Access Manager

More information

Dell InTrust 11.0. Preparing for Auditing and Monitoring Microsoft IIS

Dell InTrust 11.0. Preparing for Auditing and Monitoring Microsoft IIS Preparing for Auditing and Monitoring Microsoft IIS 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

ActiveRoles 6.8. Web Interface User Guide

ActiveRoles 6.8. Web Interface User Guide ActiveRoles 6.8 Web Interface User Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

2010 Quest Software, Inc. ALL RIGHTS RESERVED. Trademarks. Third Party Contributions

2010 Quest Software, Inc. ALL RIGHTS RESERVED. Trademarks. Third Party Contributions 6.7 User Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license

More information

2011 Quest Software, Inc. ALL RIGHTS RESERVED.

2011 Quest Software, Inc. ALL RIGHTS RESERVED. 8.7 User Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected by copyright. The software described in this document is furnished under a software

More information

8.10. Migrating to Microsoft Office 365

8.10. Migrating to Microsoft Office 365 8.10 Migrating to Microsoft Office 365 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a

More information

Interactive Visualizations & Dashboards Quick Start Guide

Interactive Visualizations & Dashboards Quick Start Guide Statistica TM Interactive Visualizations & Dashboards Create a new dashboard Ribbon bar. On the Home tab, in the File group, click the New arrow and from the drop-down list, select Dashboard to display

More information

Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability

Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability May 2015 Cloning the database Cloning the STS host Cloning the proxy host This guide describes how to extend a typical

More information

Dell Migration Manager for Exchange 8.11. User Guide

Dell Migration Manager for Exchange 8.11. User Guide Dell Migration Manager for Exchange 8.11 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

About Recovery Manager for Active

About Recovery Manager for Active Dell Recovery Manager for Active Directory 8.6.1 May 30, 2014 These release notes provide information about the Dell Recovery Manager for Active Directory release. About Resolved issues Known issues System

More information

Spotlight Management Pack for SCOM

Spotlight Management Pack for SCOM Spotlight Management Pack for SCOM User Guide March 2015 The Spotlight Management Pack for SCOM is used to display data from alarms raised by Spotlight on SQL Server Enterprise in SCOM (System Center Operations

More information

Dell MessageStats for Lync and the MessageStats Report Pack for Lync & OCS 7.3. User Guide

Dell MessageStats for Lync and the MessageStats Report Pack for Lync & OCS 7.3. User Guide Dell MessageStats for Lync and the MessageStats Report Pack for Lync & OCS 7.3 User Guide 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software

More information

2007 Quest Software, Inc. ALL RIGHTS RESERVED. TRADEMARKS. Disclaimer

2007 Quest Software, Inc. ALL RIGHTS RESERVED. TRADEMARKS. Disclaimer What s New 6.7 2007 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license

More information

Quest One Password Manager

Quest One Password Manager Quest One Password Manager Version 5.0 User Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Foglight. Foglight for Virtualization, Free Edition 6.5.2. Installation and Configuration Guide

Foglight. Foglight for Virtualization, Free Edition 6.5.2. Installation and Configuration Guide Foglight Foglight for Virtualization, Free Edition 6.5.2 Installation and Configuration Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.

More information

Installation Manual UC for Business Unified Messaging for Exchange 2010

Installation Manual UC for Business Unified Messaging for Exchange 2010 Installation Manual UC for Business Unified Messaging for Exchange 2010 NEC Corporation nec.com Unified Messaging for Exchange Installation Manual - Exchange 2010 Edition Table of Contents About this Manual...

More information

Quest Migration Solutions for SharePoint

Quest Migration Solutions for SharePoint Quest Migration Solutions for SharePoint User Guide Quest Migration Solutions for SharePoint User Guide Migration Suite for SharePoint v4.0 Migrator for SharePoint Online v4.0 Migration Manager for SharePoint

More information

Security Analytics Engine 1.0. Help Desk User Guide

Security Analytics Engine 1.0. Help Desk User Guide 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

Dell One Identity Cloud Access Manager How to Configure as an Identity Provider

Dell One Identity Cloud Access Manager How to Configure as an Identity Provider Dell One Identity Cloud Access Manager 8.1.1 - How to Configure as an Identity Provider January 2016 To provide end-users located on another network with access to your applications, you can configure

More information

Enterprise Reporter Report Library

Enterprise Reporter Report Library Enterprise Reporter Overview v2.5.0 This document contains a list of the reports in the Enterprise Reporter. Active Directory Reports Change History Reports Computer Reports File Storage Analysis Reports

More information

DATA GOVERNANCE EDITION

DATA GOVERNANCE EDITION Quest One Identity Manager DATA GOVERNANCE EDITION 6.1 What s New 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Built-in Plug-ins User s Guide

Built-in Plug-ins User s Guide Quest NetVault Backup version 9.1 Built-in Plug-ins User s Guide Version: Product Number: NVG-129-9.1-EN-01 NVG-129-9.1-EN-01 05/10/13 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains

More information

2011 Quest Software, Inc. ALL RIGHTS RESERVED. TRADEMARKS DISCLAIMER

2011 Quest Software, Inc. ALL RIGHTS RESERVED. TRADEMARKS DISCLAIMER 8.8 Upgrade Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected by copyright. The software described in this document is furnished under a software

More information

Quest SQL Optimizer 6.5. for SQL Server. Installation Guide

Quest SQL Optimizer 6.5. for SQL Server. Installation Guide Quest SQL Optimizer for SQL Server 6.5 2008 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

ChangeAuditor 6.0. Web Client User Guide

ChangeAuditor 6.0. Web Client User Guide ChangeAuditor 6.0 Web Client User Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Dell Migrator for Notes to Exchange SSDM User Guide

Dell Migrator for Notes to Exchange SSDM User Guide Dell Migrator for Notes to Exchange 4.13 MNE Updated - March 2016 Software Version - 4.13 2016 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software

More information

8.8. Post-Migration Activities

8.8. Post-Migration Activities 8.8 Post-Migration Activities 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected by copyright. The software described in this document is furnished

More information

Dell Client Profile Updating Utility 5.5.6

Dell Client Profile Updating Utility 5.5.6 Complete Product Name with Trademarks Version Dell 5.5.6 April 21, 2015 These release notes provide information about the Dell release. Welcome to What's New Known issues Upgrade and Compatibility System

More information

Foglight. Dashboard Support Guide

Foglight. Dashboard Support Guide Foglight Dashboard Support Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

How to Deploy Models using Statistica SVB Nodes

How to Deploy Models using Statistica SVB Nodes How to Deploy Models using Statistica SVB Nodes Abstract Dell Statistica is an analytics software package that offers data preparation, statistics, data mining and predictive analytics, machine learning,

More information

2010 Quest Software, Inc. ALL RIGHTS RESERVED. Trademarks. Third Party Contributions

2010 Quest Software, Inc. ALL RIGHTS RESERVED. Trademarks. Third Party Contributions 6.7 Feature Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license

More information

Dell NetVault Backup Plug-in for SharePoint 1.3. User s Guide

Dell NetVault Backup Plug-in for SharePoint 1.3. User s Guide Dell NetVault Backup Plug-in for 1.3 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software

More information

Dell Recovery Manager for Active Directory 8.6. Deployment Guide

Dell Recovery Manager for Active Directory 8.6. Deployment Guide Dell Recovery Manager for Active Directory 8.6 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

2011 Quest Software, Inc. ALL RIGHTS RESERVED. TRADEMARKS DISCLAIMER

2011 Quest Software, Inc. ALL RIGHTS RESERVED. TRADEMARKS DISCLAIMER 8.8 User Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected by copyright. The software described in this document is furnished under a software

More information

Dell One Identity Cloud Access Manager How to Configure as an Identity Provider

Dell One Identity Cloud Access Manager How to Configure as an Identity Provider Dell One Identity Cloud Access Manager 7.0.2 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

Dell One Identity Quick Connect for Cloud Services 3.6.1

Dell One Identity Quick Connect for Cloud Services 3.6.1 Dell One Identity Quick Connect for Cloud Services 3.6.1 March 2015 These release notes provide information about the Dell One Identity Quick Connect for Cloud Services release. About New features Resolved

More information

Dell One Identity Quick Connect for Cloud Services 3.6.0

Dell One Identity Quick Connect for Cloud Services 3.6.0 Dell One Identity Quick Connect for Cloud Services 3.6.0 August, 2014 These release notes provide information about the Dell One Identity Quick Connect for Cloud Services release. About New features Resolved

More information