Dell - Secure Exchange Reference Architecture Dell White Paper
|
|
- Vivian Cobb
- 3 years ago
- Views:
From this document you will learn the answers to the following questions:
What type of traffic does the quarantine function of the Symantec Mail Security 8260 help prevent?
Who has Dell partnered with to provide secure , scalable Exchange messaging solutions?
What is the name of the network of the Firewall?
Transcription
1 Dell - Secure Exchange Reference Architecture Dell White Paper By Sumankumar Singh & Bharath Vasudevan 1
2 Summary has become a vital communication tool for most businesses. Whether in the office or on the road, communicating internally or closing business with customers, users depend upon to get their jobs done. Due to the increase in popularity of as the preferred communication tool, the amount of traffic is increasing at a very rapid pace. Managing this exponentially growing traffic can sometimes become a daunting task. Along with the growing traffic, the threat of virus and spam is also growing. It is extremely important to design a base messaging infrastructure that is secure, flexible and scalable to meet the availability needs of your organization while safeguarding against any security threats. This paper presents a Dell Messaging Reference Architecture that is built on industrystandard components providing both security and availability and is scalable to accommodate future growth needs. All the components of the reference architecture have been validated to ensure their interoperability. Partnering with industry leaders Microsoft and Symantec allows Dell to provide a holistic solution for messaging environments incorporating security and archiving to complement the basic solution. 2
3 Introduction The Dell Secure Exchange reference architecture is based on industry standard components that can provide protection to businesses with the ability to scale to support the largest enterprise deployments. This approach enables organizations to pick the appropriate tools for different data center functions without being locked into proprietary technologies. Using this model, Dell has partnered with Symantec and Microsoft to provide secure, highly available and scalable Exchange messaging solutions. All the components of the reference architecture have been validated to ensure their interoperability. Figure 1 provides a pictorial representation of the Dell Secure Exchange Reference Architecture. Perimeter Firewall Internal Firewall Exchange Front End Servers Fibre Channel Switches Symantec Mail Security Appliance ISA Perimeter Network Active Exchange Directory and Back End Global Catalog Servers Server Tape Back Up Storage Systems Outside Clients Internal Clients Fig1. Dell Secure Exchange Reference Architecture The following components of reference architecture are discussed in more detail: Perimeter Network Exchange Front-end servers Exchange Back-end servers Storage Systems Tape backup Archiving 3
4 Reference Architecture Components 1. Perimeter Network: A perimeter network is typically the network segment that is closest to your internet gateway. It is the first network encountered by any incoming traffic from the internet into your internal network. Typically, if your network design includes a firewall, your perimeter network will be a part of it. In the absence of a perimeter network, the front-end messaging servers will need to handle the balance of all incoming traffic which can expose them to -based threats and viruses. Implementing a perimeter network helps you better control security by controlling the access of internal resources by external traffic and prevent attack from intruders. According to some estimates, by the end of 2006, 71% of messages sent worldwide per day will be spam, and this percentage will grow to 79% by 2010.* It is important to prevent this spam from entering into the internal network. For customer deployments larger than 2000 users, the amount of traffic can warrant a two tier approach to reduce the amount of unwanted traffic: a traffic shaper and a content filtering mechanism. For smaller deployments, both can still be implemented, but a content filtering solution may be enough to reach the desired performance goals. Traffic Shaping In the messaging context, traffic shaping involves intercepting and scanning incoming s to determine authenticity and relevancy of the traffic. In the perimeter network, organizations must consider significantly reducing, and hopefully eliminating all spam traffic prior to it entering the internal network. Traffic shaping helps to reduce the amount of unnecessary traffic and improves the performance and security of the internal network. Traffic shaping can be achieved by deploying antispam devices in the perimeter network. The Symantec Mail Security 8160 is a traffic shaper which is built as an appliance on top of the Dell PowerEdge 1850 server. This appliance acts as a router, inspecting incoming Simple Mail Transfer Protocol (SMTP) traffic in real time and providing a mechanism to reduce the amount of spam entering the internal network. By shaping traffic at the TCP protocol level, this security appliance prevents spammers from forcing unwanted into your network. Over time, the appliance determines a sender s reputation based on a cumulative history and can automatically shape traffic based on that reputation. Content Filtering In addition to traffic shaping, additional security may be required to prevent spam and other unwanted from reaching the mail servers. Controlling outbound content may also be necessary to ensure that an organization is not perceived as a source of inappropriate or malicious content. *Radicati Group, Quick Facts, Vol. 3 Issue 4, June 2006, 4
5 Symantec Mail Security 8200 series appliances and Symantec Brightmail Antispam can help address these challenges. They both include an integrated virus and spam signatures update mechanism. This tool is frequently and automatically updated to ensure that the latest antivirus policies and rules are included. This update functionality is similar to that of an Anti-Virus client running on a desktop machine. Symantec Mail Security 8260 appliance, which is also built on a Dell PowerEdge 1850 server, is designed for environments with more than 1,000 users. It delivers capabilities like antispam, antivirus, content filtering, firewall, and a quarantine function to help ensure that unwanted traffic does not enter your internal corporate network. ISA Server To complete a secure perimeter network deployment, it is equally important to restrict the access of servers by unauthorized external clients or intruders. This may be achieved by deploying a Microsoft Internet Security and Acceleration (ISA) server that can control traffic entering your internal network and outbound traffic from your messaging environment. The ISA server can be used to configure rules to securely publish internal mail services to external users by allowing access using specified protocols such as Messaging Application Programming Interface (MAPI), Post Office Protocol 3 (POP3), Internet Messaging Access Protocol 4 (IMAP4) etc. All inbound requests from client applications such as Microsoft Outlook, Outlook Web Access (OWA) or other POP3 clients can be handled by the ISA server and routed to the appropriate Exchange server on your internal network thereby protecting the internal mail servers from communication directly to external clients. The ISA server protects the Exchange server by acting as a proxy to receive all requests for the Exchange Server. When you use ISA Server to handle all inbound requests from client applications your Exchange front-end servers no longer need to be located in the perimeter network. The Exchange front-end server can be moved from the perimeter network to the internal network. This provides an additional layer of security to the Exchange Server. Due to these security benefits that it provides, it is a best practice to deploy an ISA server into your perimeter network even if you have deployed the traffic shaping and content filtering appliances. 5
6 2. Exchange Front End Servers: Microsoft Exchange Server 2003 supports a two-tier Exchange architecture consisting of front-end and back-end servers. The front-end server accepts requests from clients and proxies them to the appropriate back-end server for processing. This architecture is recommended if several access protocols are used by the clients to access the Exchange server or there are multiple back-end servers in the Exchange environment. However it may also be used in a single back-end server environment. It is a good practice to deploy the Exchange Front End server behind the Internal Firewall. The Exchange Front End server provides benefits such as: Single Namespace: This enables all users to access their mailbox using a single consistent name even if their mailbox is moved from one server to another or if new servers are added to the back-end infrastructure. It also enables OWA, POP3 or IMAP4 clients to access their mailbox using the same URL. Offload Processing: The front-end server can improve performance of the messaging system by offloading some of the processing tasks that otherwise are typically performed by the back-end server in the absence of a front-end server. This includes tasks such as managing all encryption and decryption processing of outgoing and incoming traffic. Strengthen Security: The front-end server provides a single point of access for all incoming requests and traffic. As it does not store user information, it provides an additional layer of security for mailboxes. It can also authenticate requests before proxying them to the back-end server thereby protecting against any security breaches. It also eliminates the need to open RPC ports from the perimeter network into the internal network. Scalability: As Front-End servers provide a single name space for all users, they enable the ability to increase or decrease the number of front-end or back-end servers without disrupting users. This simplifies scalability by facilitating the increase or decrease of the size of the Exchange organization. Selecting the right front-end server is critical to ensure the overall performance of the messaging system. The selection depends on many factors including number of users, number of back-end servers and the protocols used. It also depends on what functions the front-end server is performing. Front-end servers typically do not require large or fast disk storage due to the lack of mailboxes resident on the frontend server, but they do have higher CPU and memory requirements to perform the more processor and memory intensive back-end offload processing tasks. An ideal server candidate needs to support 4GB of memory and have scalable processor options while providing the network bandwidth required for hosting Microsoft Exchange Dell answers all of these requirements with dual-socket PowerEdge Servers. An all-purpose server which meets all of the performance characteristics is the Dell PowerEdge The Dell PowerEdge 2950 with up to 2 dual-core Intel Xeon processors and up to 32 GB of fully buffered memory provides 6
7 enough processing power required for the Exchange front-end server functionality. For larger Exchange deployments depending on the number and nature of users, multiple front-end servers may be required. 7
8 3. Exchange Back End Servers Exchange back-end servers host mailboxes and/or public folders. It is safe to say that the end-user performance and availability of the messaging infrastructure depends heavily on the selection and design of the Exchange back-end infrastructure. It is critical to consider hardware sizing and mailbox design prior to deploying a messaging solution. Ensuring that enough processor, disk, memory and network resources are available to the back-end Exchange infrastructure ensures that this component does not become the bottle-neck for the entire messaging system. In-depth sizing discussions are outside the scope of this paper, but parties interested in sizing Exchange can run Dell s Exchange advisor, available at This automated tool simplifies the sizing of new Exchange deployments by asking simple questions and converting the answers into Dell-specific Servers, Storage and Software recommendations. In lieu of running the tool, here are some generic sizing guidelines: Processor Resources: A back-end Exchange server is not very processor intensive. However if you have other applications such as anti-virus or anti-spam running on the server, make sure that there is enough processing power available to support those applications. If the processor utilization of the back end server is consistently greater than 60 70%, closely monitor the back end server performance as additional processing power may be required. Disk Resources: Exchange 2003 is an I/O intensive application and all client activity causes updates to the Exchange database, which produces I/O operations to disk. Your disk subsystem should be capable of meeting these demands. It is therefore important to size your disks for the required I/O performance and not just for capacity of the mailboxes. For a more scalable disk I/O sub-system, it is recommended to use external storage options such as Direct-Attached Storage (DAS) or Storage Area Networks (SAN). Memory Resources: Exchange Server 2003 is a 32-bit application. Therefore, the maximum amount of memory that it can use efficiently is limited to 4GB. Deployments using greater than 4-GB of RAM have shown negative performance impacts. Installing 4 GB of physical RAM takes full advantage of Exchange 2003 s capabilities. Network Resources: Exchange servers and messaging clients access Active Directory when logging on to the network, connecting to a mailbox, or accessing server-based address lists. These activities create a large amount of network traffic between the servers. It is important to have enough network bandwidth available between the servers and client computers. For a medium sized environment of about 2000 users, the Dell PowerEdge 2950 server is an ideal candidate. It provides ample computing power to host 2000 mailboxes while providing ample network and disk expandability options. For larger environments you may add additional mailbox servers to your back-end Exchange infrastructure. For more in-depth sizing recommendations refer to Dell Exchange Advisor Tool available at 8
9 Mailbox Server Security Security of the back-end Exchange server is a big concern as these servers host critical data such as user mailboxes and/or public folders. Even with strong perimeter network security in place, the mailbox servers require protection against spam and virus as viruses can enter through other vectors such as web mail, USB drives or other removable storage media. Symantec Mail Security (SMS) for Exchange can provide this required integrated mail protection against virus threats, spam, and other unwanted content. It enables administrators to inspect content in real time as is being committed and accessed from the Exchange database. Attachment and subject line blocking capabilities provide responses against known threats, and support for hourly definition updates enables organizations to respond quickly to emerging threats. Administrators can also conduct scans on a regular scheduled or on-demand basis to identify, detect and quarantine inappropriate content or potential viruses. High Availability Clustering Since the back-end Exchange servers host mission critical data, it is recommended that you cluster these servers to provide high availability. The basic goal of high availability (HA) clustering is to ensure that the physical server hosting the Exchange mailboxes is not a single point-of-failure, by providing the ability for that Exchange application to be restarted on one of multiple servers in the cluster. If the server running the application fails, another designated server takes over the responsibility of running that application. Dell s high availability (HA) cluster solutions built upon the Microsoft Cluster Server (MSCS) are part of the Secure Exchange Reference architecture. They are designed and tested to make sure that no single point of failure (SPOF) exists. High availability clustering using MSCS requires shared storage, as every node in the cluster needs access to the Exchange data. For more information about Dell HA Clusters refer to 9
10 4. Storage System: In Dell s Secure Exchange reference architecture storage is sharable via Storage Area Networks (SAN). The fabric utilized is fibre channel as it provides high bandwidth and low latency. With the new emerging 4Gb architecture, there is generally enough bandwidth to support the most I/O intensive applications. Redundant fabrics may be used to provide multiple paths to the data and thereby improve availability. Utilizing LUNs, the storage systems can be abstracted more effectively, eliminating physical dependencies between application and data. This also makes the storage system more scalable as storage can be added or removed easily without disrupting applications. Since Exchange is an I/O intensive application the disk system can potentially become a bottleneck. It is recommended to use a large number of drives with smaller capacity instead of fewer numbers of drives with large capacities. This will help improve the performance of the disk subsystem. For environments of about 2000 users, Dell recommends using external storage. There are several external storage solutions available including Direct-Attached Storage (DAS) or Storage Area Networks (SAN). Dell/EMC Fibre Channel storage arrays provide a great platform to host the Exchange Mailbox Stores. They offer a highly scalable enterprise networked storage with superior performance and advanced management. For more in-depth sizing recommendations, refer to Dell Exchange Advisor Tool available at 10
11 5. Tape Backup: To protect data from potential disaster, the first line of defense is usually to back up critical information using tape or disk. Dell s Secure Exchange Reference Architecture recommends using a SAN-based backup model; however other back up methods may be used depending on your environment and needs. In the SAN-based back up method, all of the components of the messaging subsystem are interconnected on the Fibre-Channel SAN fabric: the Exchange servers, a master backup server, the storage systems, and the tape library. Data traffic can be routed from the Exchange servers through a high-speed Fibre Channel switch and written directly to the tape library. Symantec Backup Exec Dell PowerVault Tape Libraries and Symantec Backup Exec together provide a reliable hardware and software platform to ensure your business-critical data is protected against application or hardware-based failures. The Dell PowerVault Tape libraries are completely scalable to secure the storage capacity required today while helping ensure that they will meet future requirements. Symantec Backup Exec Agent for Microsoft Exchange Server provides administrators with the means and tools necessary for the complete protection of the Exchange Server. It provides a fast and flexible option to protect Exchange while the application is online. Its customizable options allow users to perform individual mailbox or even an individual mail message backup or restore. The support for SAN based backups further increases the backup and recovery process. After hardware and software components are configured properly in the backup infrastructure and critical backup data is identified, administrators must implement a backup strategy. Exchange works with one or a combination of the following methods: full backup, differential backup, incremental backup, and mirror backup. 11
12 Exchange Severs Backup Server FC Switches Tape Library Storage System Fig2. SAN Based Back Up Model Full Backup A full backup is designed to store all data, including Exchange database files and transaction logs. This approach helps simplify the recovery process because it saves all the data files and transaction log files in a single backup session. However, a full backup operation consumes the most bandwidth and requires the most storage space compared to differential, incremental, and mirror backups. For that reason, best practices recommend a full backup operation be performed at regular intervals, in rotation with other backup strategies. Differential Backup A differential backup contains only the Exchange transaction log files that have changed since the last full backup; the database files are not copied. Because all the transaction logs since the last full backup are required for a restore operation, circular logging cannot be enabled during a differential backup. Recovery requires both the last full backup and the last differential backup. Best practices recommend 12
13 that a full backup be performed at regular intervals and supplemented with daily differential backups. Incremental Backup An incremental backup contains the Exchange transaction log files that have changed since the last full, differential, or incremental backup. Of these three types, incremental is the fastest backup method and may be suitable for large Exchange databases with a high volume of daily activity. The drawback to the incremental approach is that recovery requires the last full backup and all subsequent incremental backups. Best practices recommend that a full backup be performed at regular intervals and supplemented with daily incremental backups. Mirror Backup A mirror backup is similar to a full backup except that no file marking is performed. Mirror backup is not ordinarily used for recovery purposes. This method can be used to make a full copy of the Exchange database without disrupting any incremental or differential backup procedures. 13
14 6. Archiving: With the ever-growing volume of s there may be several reasons for an organization to consider Archiving solutions including business needs, technical requirements or both. The business needs may include compliance or legal requirements. The technical reasons may include better mailbox management, PST migration, faster retrieval etc. Symantec Enterprise Vault software provides a flexible archiving framework to enable the discovery of content held within , file system, and collaborative environments -- while helping to reduce storage costs and simplifying management. Enterprise Vault manages content via policy-controlled archiving to online stores for active retention and seamless retrieval of information. It provides powerful search and discovery capabilities to enable end users to access all content. Enterprise Vault is a powerful product with features that enable management, archiving and compliance. The detailed description of its architecture and components is outside the scope of this paper. Before it can be deployed, the IT administrators should become familiar with its capabilities. To learn more about Symantec Enterprise Vault refer to Symantec Yellow book titled Introducing Symantec Enterprise Message Management for Microsoft Exchange. Dell and Symantec have worked together to validate and test Symantec Enterprise Vault on Dell servers and storage to ensure interoperability and performance and provide an end-to-end Exchange Solution. 14
15 Conclusion It is Dell s belief that standardization is the key to the continued evolution of the datacenter. All the components of Dell s Secure Exchange Reference architecture are built using industry standards. They are scalable to accommodate changes in your organization. You have the ability to add or remove capacity on the fly without having to change the base architecture of the messaging system. The reference architecture presented will help you design a secure and highly available Exchange messaging environment. Partnering with industry leaders Microsoft and Symantec has allowed Dell to provide a holistic solution for messaging environments incorporating security and archiving to complement the basic solution. THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES. THE CONTENT IS PROVIDED AS IS, WITHOUT EXPRESS OR IMPLIED WARRANTIES OF ANY KIND. Dell, PowerEdge and the Dell logo are trademarks of Dell Inc. Windows is a trademark of Microsoft Corp. EMC is a trademark of EMC Corporation Dell Inc. U.S. only. 15
16 Resources and References For More information please refer to:
Microsoft Exchange Server 2003 Deployment Considerations
Microsoft Exchange Server 3 Deployment Considerations for Small and Medium Businesses A Dell PowerEdge server can provide an effective platform for Microsoft Exchange Server 3. A team of Dell engineers
More informationWHITE PAPER Meeting Email Security Head On: Dell's Secure Exchange Services
WHITE PAPER Meeting Email Security Head On: Dell's Secure Exchange Services Sponsored by: Dell Charles J. Kolodgy January 2007 IDC OPINION Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200
More informationExchange Server 2007 Design Considerations
Exchange Server 2007 Design Considerations Product Group - Enterprise Dell White Paper By Ananda Sankaran Sumankumar Singh April 2007 Contents Introduction... 3 Server Roles in Exchange 2007... 4 Mailbox
More informationALABAMA CENTRALIZED E-MAIL (ACE) PROJECT SUMMARY
ALABAMA CENTRALIZED E-MAIL (ACE) PROJECT SUMMARY E-mail is a mission-critical application that business and government organizations expect to be secure, reliable and available at all times. The State
More informationQuick Heal Exchange Protection 4.0
Quick Heal Exchange Protection 4.0 Customizable Spam Filter. Uninterrupted Antivirus Security. Product Highlights Built-in defense keeps your business communications and sensitive information secure from
More information5053A: Designing a Messaging Infrastructure Using Microsoft Exchange Server 2007
5053A: Designing a Messaging Infrastructure Using Microsoft Exchange Server 2007 Course Number: 5053A Course Length: 3 Days Course Overview This three-day instructor-led course provides students with the
More informationLoad Balancing for Microsoft Office Communication Server 2007 Release 2
Load Balancing for Microsoft Office Communication Server 2007 Release 2 A Dell and F5 Networks Technical White Paper End-to-End Solutions Team Dell Product Group Enterprise Dell/F5 Partner Team F5 Networks
More informationSIP Trunking with Microsoft Office Communication Server 2007 R2
SIP Trunking with Microsoft Office Communication Server 2007 R2 A Dell Technical White Paper By Farrukh Noman Dell Product Group - Enterprise THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY
More informationIronPort C10 for Small and Medium Businesses
I r o n P o r t A p p l i a n c e s S I M P L E I N S TA L L AT I O N, E A S Y M A N A G E M E N T, A N D P O W E R F U L P R O T E C T I O N F O R Y O U R E M A I L I N F R A S T R U C T U R E. IronPort
More informationSolution Brief: Enterprise Security
Symantec Brightmail Gateway and VMware Solution Brief: Enterprise Security Symantec Brightmail Gateway and VMware Contents Corporate overview......................................................................................
More informationBEST PRACTICES FOR PROTECTING MICROSOFT EXCHANGE DATA
BEST PRACTICES FOR PROTECTING MICROSOFT EXCHANGE DATA Bill Webster September 25, 2003 VERITAS ARCHITECT NETWORK TABLE OF CONTENTS Introduction... 3 Exchange Data Protection Best Practices... 3 Application
More informationThe Methodology Behind the Dell SQL Server Advisor Tool
The Methodology Behind the Dell SQL Server Advisor Tool Database Solutions Engineering By Phani MV Dell Product Group October 2009 Executive Summary The Dell SQL Server Advisor is intended to perform capacity
More informationDell PowerVault MD Series Storage Arrays: IP SAN Best Practices
Dell PowerVault MD Series Storage Arrays: IP SAN Best Practices A Dell Technical White Paper Dell Symantec THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND
More information15 Ways to Optimize Microsoft Exchange by Robert Shimonski & Chad Conrow
15 Ways to Optimize Microsoft Exchange by Robert Shimonski & Chad Conrow In today s high-speed, fast-paced environment whether it be business or technology it is essential to pay close attention to detail.
More informationHow To Protect Email From The Internet With Mailmarshal Smt And Mailmper For Exchange
Deployment Options for Exchange March 2006 Contents What is Email Scanning? 2 What is Total Email Content Security? 3 The Solutions 3 What are my Options? 4 Key Differences between MailMarshal SMTP and
More informationEMC Security for Microsoft Exchange Solution: Data Loss Prevention and Secure Access Management
EMC Security for Microsoft Exchange Solution: Data Loss Prevention and Applied Technology Abstract Securing a Microsoft Exchange e-mail environment presents a myriad of challenges and compliance issues
More informationOutlook. Sharepoint. Lync. BlackBerry. McAfee. Microsoft Hosted Exchange
Outlook Sharepoint Lync BlackBerry McAfee Microsoft Hosted Exchange Microsoft Hosted Exchange Webhosting.net provides a comprehensive Hosted Exchange solution that combines the comprehensive features of
More informationBUILT FOR YOU. Contents. Cloudmore Exchange
BUILT FOR YOU Introduction is designed so it is as cost effective as possible for you to configure, provision and manage to a specification to suit your organisation. With a proven history of delivering
More informationData Sheet: Messaging Security Symantec Brightmail Gateway Award-winning messaging security for inbound protection and outbound control
Award-winning messaging security for inbound protection and outbound control Overview The delivers inbound and outbound messaging security for email and IM, with effective and accurate antispam and antivirus
More informationSymantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations
Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Technical Product Management Team Endpoint Security Copyright 2007 All Rights Reserved Revision 6 Introduction This
More informationEuropean developer & provider ensuring data protection User console: Simile Fingerprint Filter Policies and content filtering rules
Cloud Email Firewall Maximum email availability and protection against phishing and advanced threats. If the company email is not protected then the information is not safe Cloud Email Firewall is a solution
More informationWHITE PAPER: TECHNICAL OVERVIEW. NetBackup Desktop Laptop Option Technical Product Overview
WHITE PAPER: TECHNICAL OVERVIEW NetBackup Desktop Laptop Option Technical Product Overview Mayur Dewaikar, Sr. Technical Product Manager NetBackup Platform Symantec Technical Network White Paper EXECUTIVE
More informationEMC Virtual Infrastructure for Microsoft Applications Data Center Solution
EMC Virtual Infrastructure for Microsoft Applications Data Center Solution Enabled by EMC Symmetrix V-Max and Reference Architecture EMC Global Solutions Copyright and Trademark Information Copyright 2009
More informationExchange 2007 Overview
Exchange 2007 Overview Presented by: Chris Avis IT Evangelist Microsoft Corporation Seattle Windows Networking User Group February 2009 monthly meeting What Will We Cover? New features in Microsoft Exchange
More informationE-MAIL AND SERVER SECURITY
E-MAIL AND SERVER SECURITY DEPLOYMENT GUIDE 1 E-MAIL AND SERVER SECURITY Deployment Guide 2 CONTENTS 1. Overview 3 1.1 How the product works 3 1.2 Product contents 4 2. Deployment scenarios 5 2.1 Stand-alone
More informationE-MAIL AND SERVER SECURITY
E-MAIL AND SERVER SECURITY DEPLOYMENT GUIDE 1 E-MAIL AND SERVER SECURITY Deployment Guide 2 CONTENTS 1. Overview 3 2. Deployment scenarios 5 2.1 Stand-alone server 5 2.2 Deploying the product with F-Secure
More informationHBA Virtualization Technologies for Windows OS Environments
HBA Virtualization Technologies for Windows OS Environments FC HBA Virtualization Keeping Pace with Virtualized Data Centers Executive Summary Today, Microsoft offers Virtual Server 2005 R2, a software
More informationTHE FUTURE OF COLLABORATION
THE FUTURE OF COLLABORATION Dell + Microsoft Office SharePoint Server 2007 SIMPLIFYING IT Microsoft Office SharePoint Server 2007 is one of the most valuable tools for today s businesses, letting you efficiently
More informationHow To Protect Data On Network Attached Storage (Nas) From Disaster
White Paper EMC FOR NETWORK ATTACHED STORAGE (NAS) BACKUP AND RECOVERY Abstract This white paper provides an overview of EMC s industry leading backup and recovery solutions for NAS systems. It also explains
More informationDELL. Dell Microsoft Windows Server 2008 Hyper-V TM Reference Architecture VIRTUALIZATION SOLUTIONS ENGINEERING
DELL Dell Microsoft Windows Server 2008 Hyper-V TM Reference Architecture VIRTUALIZATION SOLUTIONS ENGINEERING September 2008 1 THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL
More informationDeploying Exchange Server 2007 SP1 on Windows Server 2008
Deploying Exchange Server 2007 SP1 on Windows Server 2008 Product Group - Enterprise Dell White Paper By Ananda Sankaran Andrew Bachler April 2008 Contents Introduction... 3 Deployment Considerations...
More informationHardware Load Balancing for Optimal Microsoft Exchange Server 2010 Performance
F5 White Paper Hardware Load Balancing for Optimal Microsoft Exchange Server 2010 Performance A comprehensive F5 solution readies application infrastructure for a successful implementation of the re-engineered
More informationMCSE 5053/5054 - Designing a Messaging Infrastructure and High Availability Messaging Solution Using Microsoft Exchange Server 2007
MCSE 5053/5054 - Designing a Messaging Infrastructure and High Availability Messaging Solution Using Microsoft Exchange Server 2007 Duration: 5 Days Course Price: $2,975 Software Assurance Eligible Course
More informationInjazat s Managed Services Portfolio
Injazat s Managed Services Portfolio Overview Premium Managed Services to Transform Your IT Environment Injazat s Premier Tier IV Data Center is built to offer the highest level of security and reliability.
More informationAudience. At Course Completion. Prerequisites. Course Outline. Take This Training
Designing a High Availability Messaging Solution using Microsoft Exchange Server 2007 Course 5054A: Two days; Instructor-Led Preliminary Course Syllabus Note: You are viewing a Preliminary Course Syllabus.
More informationMicrosoft SQL Server 2005 on Windows Server 2003
EMC Backup and Recovery for SAP Microsoft SQL Server 2005 on Windows Server 2003 Enabled by EMC CLARiiON CX3, EMC Disk Library, EMC Replication Manager, EMC NetWorker, and Symantec Veritas NetBackup Reference
More informationThis course is intended for IT professionals who are responsible for the Exchange Server messaging environment in an enterprise.
10233A: Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Course Number: 10233A Course Length: 5 Day Course Overview This instructor-led course provides you with the knowledge
More informationAccelerating Microsoft Exchange Servers with I/O Caching
Accelerating Microsoft Exchange Servers with I/O Caching QLogic FabricCache Caching Technology Designed for High-Performance Microsoft Exchange Servers Key Findings The QLogic FabricCache 10000 Series
More informationVirtualizing SQL Server 2008 Using EMC VNX Series and Microsoft Windows Server 2008 R2 Hyper-V. Reference Architecture
Virtualizing SQL Server 2008 Using EMC VNX Series and Microsoft Windows Server 2008 R2 Hyper-V Copyright 2011 EMC Corporation. All rights reserved. Published February, 2011 EMC believes the information
More informationEMC Virtual Infrastructure for Microsoft SQL Server
Microsoft SQL Server Enabled by EMC Celerra and Microsoft Hyper-V Copyright 2010 EMC Corporation. All rights reserved. Published February, 2010 EMC believes the information in this publication is accurate
More informationNETAPP WHITE PAPER USING A NETWORK APPLIANCE SAN WITH VMWARE INFRASTRUCTURE 3 TO FACILITATE SERVER AND STORAGE CONSOLIDATION
NETAPP WHITE PAPER USING A NETWORK APPLIANCE SAN WITH VMWARE INFRASTRUCTURE 3 TO FACILITATE SERVER AND STORAGE CONSOLIDATION Network Appliance, Inc. March 2007 TABLE OF CONTENTS 1 INTRODUCTION... 3 2 BACKGROUND...
More informationConverged Networking Solution for Dell M-Series Blades. Spencer Wheelwright
Converged Networking Solution for Dell M-Series Blades Authors: Reza Koohrangpour Spencer Wheelwright. THIS SOLUTION BRIEF IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL
More informationNetwork Attached Storage. Jinfeng Yang Oct/19/2015
Network Attached Storage Jinfeng Yang Oct/19/2015 Outline Part A 1. What is the Network Attached Storage (NAS)? 2. What are the applications of NAS? 3. The benefits of NAS. 4. NAS s performance (Reliability
More informationBest Practices for Using Symantec Online Storage for Backup Exec
WHITE PAPER: xxxxxx Data Protection [00-Cover_Bar] Best Practices for Using Symantec Online Storage for Backup Exec Confidence in a connected world. White Paper: Data Protection Best Practices for Using
More informationEMC Virtual Infrastructure for Microsoft Applications Data Center Solution
EMC Virtual Infrastructure for Microsoft Applications Data Center Solution Enabled by EMC Symmetrix V-Max and Reference Architecture EMC Global Solutions Copyright and Trademark Information Copyright 2009
More informationINFORMATION PROTECTED
INFORMATION PROTECTED Symantec Protection Suite Effective, comprehensive threat protection Safeguarding your organization s business-critical assets in today s ever-changing threat landscape has never
More informationFor nearly 40 years, Metrologic Instruments has been designing and manufacturing both
, Inc. Manufacturing backup/recovery/archiving n clustering n consolidation n database n management/utilities n messaging n VIRTUALIZATION n Customer Overview is a leading provider of hardware and software
More informationWHITE PAPER BRENT WELCH NOVEMBER
BACKUP WHITE PAPER BRENT WELCH NOVEMBER 2006 WHITE PAPER: BACKUP TABLE OF CONTENTS Backup Overview 3 Background on Backup Applications 3 Backup Illustration 4 Media Agents & Keeping Tape Drives Busy 5
More informationQuantum DXi6500 Family of Network-Attached Disk Backup Appliances with Deduplication
PRODUCT BRIEF Quantum DXi6500 Family of Network-Attached Disk Backup Appliances with Deduplication NOTICE This Product Brief contains proprietary information protected by copyright. Information in this
More informationSmall Business Protection Guide. Don t Leave Your Business at Risk Protect it Completely
Small Business Protection Guide Don t Leave Your Business at Risk Protect it Completely Changing risks, rising costs Information is fundamental to your business: You and your employees constantly exchange,
More informationCopyright 2011 Sophos Ltd. Copyright strictly reserved. These materials are not to be reproduced, either in whole or in part, without permissions.
PureMessage for Microsoft Exchange protects Microsoft Exchange servers and Windows gateways against email borne threats such as from spam, phishing, viruses, spyware. In addition, it controls information
More informationCisco Cloud Email Security Interoperability with Microsoft Office 365
White Paper Cisco Cloud Email Security Interoperability with Microsoft Office 365 We ve all been witness to the cloud evolution and the technologies that have been driven by moving operations and resources
More informationReference Architecture for Dell VIS Self-Service Creator and VMware vsphere 4
Reference Architecture for Dell VIS Self-Service Creator and VMware vsphere 4 Solutions for Large Environments Virtualization Solutions Engineering Ryan Weldon and Tom Harrington THIS WHITE PAPER IS FOR
More informationWHITE PAPER [MICROSOFT EXCHANGE 2007 WITH ETERNUS STORAGE] WHITE PAPER MICROSOFT EXCHANGE 2007 WITH ETERNUS STORAGE
WHITE PAPER MICROSOFT EXCHANGE 2007 WITH ETERNUS STORAGE ETERNUS STORAGE Table of Contents 1 SCOPE -------------------------------------------------------------------------------------------------------------------------
More informationSIP Trunking Configuration with
SIP Trunking Configuration with Microsoft Office Communication Server 2007 R2 A Dell Technical White Paper End-to-End Solutions Team Dell Product Group - Enterprise THIS WHITE PAPER IS FOR INFORMATIONAL
More informationEMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage
EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage Applied Technology Abstract This white paper describes various backup and recovery solutions available for SQL
More informationVERITAS Backup Exec 9.0 for Windows Servers
WHITE PAPER Data Protection Solutions for Network Attached Storage VERITAS Backup Exec 9.0 for Windows Servers VERSION INCLUDES TABLE OF CONTENTS STYLES 1 TABLE OF CONTENTS Background...3 Why Use a NAS
More informationContinuous Data Protection. PowerVault DL Backup to Disk Appliance
Continuous Data Protection PowerVault DL Backup to Disk Appliance Continuous Data Protection Current Situation The PowerVault DL Backup to Disk Appliance Powered by Symantec Backup Exec offers the industry
More informationCourse Syllabus. Implementing and Managing Microsoft Exchange Server 2003. Key Data. Audience. Prerequisites
Course Syllabus Key Data Product #: 1947 Course #: 2400 Number of Days: 5 Format: Instructor-Led Certification Exams: 70-284 This course helps you prepare for the following Microsoft Certified Professional
More informationGFI Product Manual. Administrator Guide
GFI Product Manual Administrator Guide The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind, either express or implied,
More informationOvercoming Security Challenges to Virtualize Internet-facing Applications
Intel IT IT Best Practices Cloud Security and Secure ization November 2011 Overcoming Security Challenges to ize Internet-facing Applications Executive Overview To enable virtualization of Internet-facing
More informationF5 provides a secure, agile, and optimized platform for Microsoft Exchange Server 2007 deployments
APPLICATION READY SOLUTION GUIDE Key Benefits Eliminate 70% of unwanted email, before it reaches your Exchange Servers Gain more than 25% server capacity with SSL and Compression offload Experience up
More informationSAN Conceptual and Design Basics
TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer
More informationSymantec Messaging Gateway 10.6
Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate
More informationMicrosoft Exchange Server 2010 SP1
Microsoft Exchange Server 2010 SP1 Number: 70-663 Passing Score: 700 Time Limit: 120 min File Version: 1.0 http://www.gratisexam.com/ Mixed dump of Herby and oktrian, credit for these guys. Cleaned from
More informationTHIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY COMPANY.
THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY COMPANY. Capitalized terms used herein but not otherwise defined shall have their respective meanings set forth in the End User
More informationSecurEnvoy Security Server. SecurMail Solutions Guide
SecurEnvoy Security Server SecurMail Solutions Guide SecurMail Solutions Guide 2009 SecurEnvoy Printed: 2009 in United Kingdom Publisher SecurEnvoy Publishing Managing Editor SecurEnvoy Training Dept Technical
More informationSymantec Backup Exec System Recovery
The Gold Standard in Complete Windows System Recovery Overview Symantec Backup Exec System Recovery 8 is a complete, disk-based system recovery solution for Microsoft Windows based servers, desktops, and
More informationDELL POWERVAULT LIBRARY-MANAGED ENCRYPTION FOR TAPE. By Libby McTeer
DELL POWERVAULT LIBRARY-MANAGED ENCRYPTION FOR TAPE By Libby McTeer CONTENTS ABSTRACT 3 WHAT IS ENCRYPTION? 3 WHY SHOULD I USE ENCRYPTION? 3 ENCRYPTION METHOD OVERVIEW 4 LTO4 ENCRYPTION BASICS 5 ENCRYPTION
More informationORACLE COMMUNICATIONS MESSAGING EXCHANGE SERVER
ORACLE COMMUNICATIONS MESSAGING EXCHANGE SERVER DESIGNED TO MEET TODAY S COMMUNICATION NEEDS KEY FEATURES 64-bit scalable and secure messaging for enterprises and service providers Rich Ajax-based Web
More informationSymantec Mail Security for Domino
Getting Started Symantec Mail Security for Domino About Symantec Mail Security for Domino Symantec Mail Security for Domino is a complete, customizable, and scalable solution that scans Lotus Notes database
More informationExchange 2010 migration guide
HOW-TO GUIDE Exchange 2010 migration guide This guide details the best practices to follow when migrating from Microsoft Exchange 2003 to Microsoft Exchange 2010. The guidelines provided explain how to
More informationHow To Create A Large Enterprise Cloud Storage System From A Large Server (Cisco Mds 9000) Family 2 (Cio) 2 (Mds) 2) (Cisa) 2-Year-Old (Cica) 2.5
Cisco MDS 9000 Family Solution for Cloud Storage All enterprises are experiencing data growth. IDC reports that enterprise data stores will grow an average of 40 to 60 percent annually over the next 5
More informationPrerequisite Software for EV Installation on Windows 2003
Implementation Prerequisite Software for EV Installation on Windows 2003 Windows 2008 Server SP1, including:.net Framework 2.0 Message Queuing (no AD integration) IIS (with Active Server Pages enabled)
More informationWHITE PAPER. Safeguarding your Email Infrastructure INSIDE MODUS TECHNOLOGY
WHITE PAPER Safeguarding your Email Infrastructure INSIDE MODUS TECHNOLOGY Table of Contents Executive Summary............................................................. 3 Vircom s modus Technology....................................................
More informationA Practical Guide to Protecting and. Virtual Environment for Rapid Recovery
A Practical Guide to Protecting and Leveraging Your Virtual Environment for Rapid Recovery TABLE OF CONTENTS PAGE 03 PART 1 Common roadblocks to broadly rolling out virtualization PAGE 05 PART 2 The challenges
More informationSymantec Messaging Gateway 10.5
Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate
More informationLesson Plans Configuring Exchange Server 2007
Lesson Plans Configuring Exchange Server 2007 (Exam 70-236) Version 2.1 Table of Contents Course Overview... 2 Section 1.1: Server-based Messaging... 4 Section 1.2: Exchange Versions... 5 Section 1.3:
More informationMCSE SYLLABUS. Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003:
MCSE SYLLABUS Course Contents : Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003: Managing Users, Computers and Groups. Configure access to shared folders. Managing and Maintaining
More informationWe look beyond IT. Cloud Offerings
Cloud Offerings cstor Cloud Offerings As today s fast-moving businesses deal with increasing demands for IT services and decreasing IT budgets, the onset of cloud-ready solutions has provided a forward-thinking
More informationAchieving High Availability & Rapid Disaster Recovery in a Microsoft Exchange IP SAN April 2006
Achieving High Availability & Rapid Disaster Recovery in a Microsoft Exchange IP SAN April 2006 All trademark names are the property of their respective companies. This publication contains opinions of
More informationDeployment Guides. Help Documentation
Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Deployment Guides SmarterMail in Individual and Micro-business
More informationSERVICE LEVEL AGREEMENT
SERVICE LEVEL AGREEMENT This Service Level Agreement (SLA) is provided by ECS and is intended to define services and responsibilities between ECS and customer. ECS along with contracted 3 rd party partners
More informationSymantec AntiVirus Enterprise Edition
Symantec AntiVirus Enterprise Edition Comprehensive threat protection for every network tier, including client-based spyware prot e c t i o n, in a single product suite Overview Symantec AntiVirus Enterprise
More information5054A: Designing a High Availability Messaging Solution Using Microsoft Exchange Server 2007
5054A: Designing a High Availability Messaging Solution Using Microsoft Exchange Server 2007 Course Number: 5054A Course Length: 2 Days Course Overview This 2-day course teaches messaging engineers to
More informationVMware ESX 2.5 Server Software Backup and Restore Guide on Dell PowerEdge Servers and PowerVault Storage
VMware ESX 2.5 Server Software Backup and Restore Guide on Dell PowerEdge Servers and PowerVault Storage This document provides best practices for backup and recovery of Virtual Machines running on VMware
More informationnwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.
CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such
More informationMail-SeCure for virtualized environment
OUR INNOVATION YOUR SECURITY Mail-SeCure for virtualized environment OVERVIEW More and more companies are moving towards a virtualized IT-environment, where several network services (email, web surfing
More informationVeritas Storage Foundation 4.3 for Windows by Symantec
Veritas Storage Foundation 4.3 for Windows by Symantec Advanced online volume management technology for Windows Veritas Storage Foundation for Windows brings advanced volume management technology to Windows
More informationCA Cloud Overview Benefits of the Hyper-V Cloud
Benefits of the Hyper-V Cloud For more information, please contact: Email: sales@canadianwebhosting.com Ph: 888-821-7888 Canadian Web Hosting (www.canadianwebhosting.com) is an independent company, hereinafter
More informationMicrosoft Exchange 2010 on Dell Systems. Simple Distributed Configurations
Microsoft Exchange 2010 on Dell Systems Simple Distributed Configurations Global Solutions Engineering Dell Product Group Microsoft Exchange 2010 on Dell Systems Simple Distributed Configurations This
More informationGIVE YOUR ORACLE DBAs THE BACKUPS THEY REALLY WANT
Why Data Domain Series GIVE YOUR ORACLE DBAs THE BACKUPS THEY REALLY WANT Why you should take the time to read this paper Speed up backups (Up to 58.7 TB/hr, Data Domain systems are about 1.5 times faster
More informationMicrosoft Exchange Server 2007, Upgrade from Exchange 2000/2003 (3938. 3938/5049/5050) Course KC3065 5 Days OVERVIEW COURSE OBJECTIVES AUDIENCE
Microsoft Exchange, Upgrade from Exchange 2000/2003 COURSE OVERVIEW This instructor-led course offers Microsoft Exchange Server administrators with the skills they need to manage a Microsoft Exchange infrastructure.
More informationDesktop Virtualization in the Educational Environment
Desktop Virtualization in the Educational Environment The Problem High Total Cost of Ownership (TCO) for school computers. TCO goes beyond the original purchase price of hardware and software. It includes
More informationSymantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure
Real-time protection backed by the largest investment in security infrastructure Overview delivers inbound and outbound messaging security, with effective and accurate real-time antispam and antivirus
More informationData Sheet: Backup & Recovery Symantec Backup Exec 12.5 for Windows Servers The gold standard in Windows data protection
The gold standard in Windows data protection Overview Symantec Backup Exec 12.5 delivers market-leading backup and recovery protection from server to desktop, providing complete data protection for the
More informationMS Exchange Server Acceleration
White Paper MS Exchange Server Acceleration Using virtualization to dramatically maximize user experience for Microsoft Exchange Server Allon Cohen, PhD Scott Harlin OCZ Storage Solutions, Inc. A Toshiba
More informationOffice 365 Migration Performance & Server Requirements
Solutions for the Modern Workforce Office 365 Migration Performance & Server Requirements Understanding Migration Performance There are many factors that can affect performance when migrating to Office
More informationIBM Tivoli Storage Manager
Help maintain business continuity through efficient and effective storage management IBM Tivoli Storage Manager Highlights Increase business continuity by shortening backup and recovery times and maximizing
More informationM.Sc. IT Semester III VIRTUALIZATION QUESTION BANK 2014 2015 Unit 1 1. What is virtualization? Explain the five stage virtualization process. 2.
M.Sc. IT Semester III VIRTUALIZATION QUESTION BANK 2014 2015 Unit 1 1. What is virtualization? Explain the five stage virtualization process. 2. What are the different types of virtualization? Explain
More information