Monitoring the Microsoft Windows Server System with PATROL - a Best Practices Guide

Size: px
Start display at page:

Download "Monitoring the Microsoft Windows Server System with PATROL - a Best Practices Guide"

Transcription

1 Monitoring the Microsoft Windows Server System with PATROL - a Best Practices Guide

2

3 Contents Introduction...1 Establishing a Baseline...1 The Operating System...1 CPU...2 Memory...4 Network...7 Disk...8 Server (Application Class = NT_SERVER)...11 System...11 Operating System Summary...12 Exchange...12 OS Parameters...13 Exchange Services...13 Exchange Processes...13 Events...14 Client Load...15 Client Perspective Availability...17 Data Access...18 Message Traffic...19 Exchange Connectors...21 Store...22 Monitoring Exchange in Summary...25 Active Directory...27 Operating System...27 Services and Processes...27 Events...29 Domain Level Services...32 FSMO Roles...33 Protocols...33 Replication...34 Monitoring Active Directory in Summary...36 Sources...38

4

5 Introduction While every Microsoft Windows environment is unique, there are certain practices that you can follow to ensure the overall availability of their Microsoft Windows Server System. A Windows environment can consist of many servers with each providing a different business critical application or service. Any application that affects the business should be monitored. This white paper discusses the critical components of a typical Windows environment, including the operating system, Active Directory, and Exchange. It will also show how to monitor these components with PATROL. Establishing a Baseline A baseline is a data set that indicates how system resources are being utilized. Once you establish a baseline, you can compare it with later system activity to help determine system usage and performance. PATROL products typically follow industry best practices for alarm threshold settings, every environment is unique, so a good baseline can help you ensure that these settings are appropriate for your environment. To create a Windows baseline, you should monitor these four basic server resources: memory processor disk network objects Over a several-day period, capture and save the history data from these parameters to determine what is normal for your system. You can do this offline by using the PATROL History Loader to archive PATROL history data to a database. If you need more information about establishing a baseline, refer to chapters 5 through 10 in the Microsoft Windows 2000 Resource Kit. The Operating System Begin by monitoring the Windows operating system (OS) itself. Without a healthy OS, no application will perform as expected. The following six operating systems categories will be discussed: CPU Memory Network Disk Server Page 1

6 System CPU The four most important PATROL parameters for can be found under the NT_CPU application class: CPUprcrInterruptsPerSec CPUprcrProcessorTimePercent CPUprcrPrivTimePercent CPUprcrUserTimePercent Interrupts per Second The CPUprcrInterruptsPerSec parameter monitors the number of device interrupts encountered by the processor per second. An interrupt occurs when a device completes a task or when it requires attention. Normal thread execution is suspended during interrupts. An interrupt may cause the processor to switch to another, higher priority thread. Under the _Total NT_CPU application class instance, this parameter shows the total number of interrupts per second for all processors on the computer, while each processor application class instance shows the number of interrupts for that processor. A high number of interrupts per second indicates that a hardware device is generating an excessive number of interrupts. The device causing the problem could be a video card, the network interface card (NIC), the hard disk driver, or the mouse. If the value of CPUprcrInterruptsPerSec is high, consider running a diagnostic test on your NIC to check for configuration and hardware errors. Most NIC manufacturers provide testing software with the card. If your keyboard or mouse appears to be behaving poorly, try replacing your keyboard or mouse to see if fewer interrupts occur. Processor Time Percent The CPUprcrProcessorTimePercent parameter monitors the percentage of time that a processor is busy executing the threads of a process. Threads are units of work that make up a process. Consistently high percentages (greater than 75%) indicate performance problems that can slow your system down. Temporarily high percentages (spikes) are normal. The _Total NT_CPU application class instance shows the total percentage of time that all processors are busy executing threads. Page 2

7 When in an alarm state, this parameter graph displays an annotation mark that shows you the names of the top 10 processes that are using the most CPU resources. If this parameter value is consistently greater than 75%, you should consider taking action to remedy the problem. Some actions you can take include: Reducing the workload of the CPU if possible - review the processes running on your system, and terminate unnecessary processes. Reviewing the processes listed in this parameter's graph annotation. You may find that processor cycles are being consumed by a poorly designed application that is not releasing system resources properly. In this case, you may need to contact the software vendor (or internal programmer) to update your version of the application. Upgrading to a multiprocessor system-if your problem stems from hardware resources, upgrading to a machine with more than one processor may solve the problem. Research possible hardware issues. There are several possibilities: If the CPUprcrTotalInterruptsPerSec (device interrupts to the processor) parameter's value is greater than the SYSsysSystemCallsPerSec (calls to system service routines) parameter's value, then a hardware device is probably generating excessive interrupts and degrading performance. Note that the SYSsysSystemCallsPerSec parameter is inactive by default, so if you have high interrupts, you should enable it using the Task => Show Parameter List menu command from the NT_SYSTEM application class in the PATROL Central Operator console. If the CPUprcrTotalInterruptsPerSec parameter's value is greater than 1,000, then an I/O device is probably generating these interrupts. If a disk controller that requires a large amount of physical I/O is consuming the processor cycles, install a DMA disk controller to reduce processor utilization. If a memory bottleneck exists, the increased paging activity may be taxing the processor and masking what is primarily a memory bottleneck instead of a processor bottleneck. Refer to the following NT_MEMORY parameter topics to help determine if you have a memory bottleneck: MEMmemAvailableBytes, MEMmemPageFaultsPerSec, and MEMmemPagesPerSec Privileged Time Percent The CPUprcrPrivTimePercent parameter monitors the percentage of processor time spent in privileged mode in non-idle threads. The following items run in privileged mode: Most device drivers (except those for graphics adapters and printers) Windows service layer Executive routines Windows kernel Page 3

8 Under the _Total NT_CPU application class instance, this parameter shows the total percentage of time spent in privileged mode for all processors. When this number is greater than SYSsysTotalUserTimePercent under the NT_SYSTEM application class, the system is spending more of its time processing operating system commands than application commands. Consider using the Microsoft Performance Monitor Process object to find out which processes are using the most privileged time. Terminate services that are not in use but are consuming privileged time. User Time Percent The CPUprcrUserTimePercent parameter monitors the percentage of CPU time currently spent in User Mode doing commands and tasks initiated by users. All application code and subsystem code executes in User Mode. This value helps identify how much time a particular process spends executing in User versus Privileged Mode. Under the _Total NT_CPU application class instance, this parameter shows the total percentage of time spent in User Mode for all processors. When the total system user time percentage is lower than the system privileged time percentage, the system is spending more of its time processing operating system commands than application commands. Consider using the Microsoft Performance Monitor's Process object to find out which processes are using the most privileged time. Terminate services that are not in use but are consuming privileged time. Memory Memory plays a key part in server availability. Applications and users will consume memory and sometimes make a server sluggish. A popular approach to solving a memory shortage is upgrading the amount of memory in the server. Alternatively, you can monitor memory usage to help isolate fixable issues. Consider these three application classes: NT_MEMORY NT_CACHE NT_PAGEFILE The value of monitoring each class is explained in detail in the subsequent paragraphs. Key Memory Parameters There are five parameters under the NT_MEMORY application class that can help you understand memory utilization. MEMmemAvailableBytes Page 4

9 MEMmemCacheFaultsPerSec MEMmemPageFaultsPerSec MEMmemPagesInputPerSec MEMmemPagesPerSec The MEMmemAvailableBytes parameter monitors the number of megabytes of physical memory currently available to processes, but it is not related to the amount of physical memory installed on your server. The value of the MEMmemAvailableBytes parameter is calculated by adding the space on the Zeroed, Free, and Standby memory lists. Zeroed memory is filled with zeros to prevent later processes from seeing data used by a previous process. Free memory is ready for use by any process. Standby memory has been removed from a process' working set on route to disk but is still available for recall. The value for this parameter should never drop to less than 4 MB, even during peak usage times, and should be 10 MB or more: If the value is less than 10 megabytes, reorganize your page file by increasing its size and changing or splitting its location on to different physical drives. If the value is less than 4 megabytes, add more physical memory to your computer. The MEMmemCacheFaultsPerSec parameter monitors the frequency of cache faults. Cache faults occur whenever the cache manager does not find a file's page in the immediate cache. The MEMmemPageFaultsPerSec parameter monitors the number of hard and soft page faults in the processor. Page faults are normal for processors and do not necessarily imply a performance bottleneck. There are two kinds of page faults: soft page faults occur when the processor needs a memory page that is not in the current working set but is still in the standby list in main memory. hard page faults occur when the processor needs a memory page that is no longer in the standby list in memory and must read the page from disk. A soft page fault can be resolved without accessing a disk drive. A hard page fault must be resolved by physically accessing a disk drive. Add memory if: The ratio of hard page faults to total page faults is greater than 0.05 to If the ratio is higher than this value, the system is spending too much time on paging activity, and you should consider installing additional memory. If MEMmemPagesPerSec is greater than 10 and MEMmemPageFaultsPerSec is greater than MEMmemCacheFaultsPerSec,the system is paging too much, and you should install additional memory. Alternatives to adding memory include: Schedule memory intensive applications to run during off-peak hours. Page 5

10 Spread the paging file across multiple hard disks and remove the paging file on the disk where the Windows system is located. Note: You can use composite parameters to monitor the relationship between MEMmem- PagesPerSec, MEMmemPageFaultsPerSec and MEMmemCacheFaultsPerSec. Composite parameters can be created directly from the NT_COMPOSITES application class. There is a wizard that will guide you through the creation of a custom KM that will compare two or more parameters. The MEMmemPagesInputPerSec parameter monitors the number of pages read from the disk to resolve memory references to pages that were not in memory at the time of the reference. This parameter also includes paging activity incurred by the system cache accessing file data for applications. The ratio of hard page faults to total page faults (that is, MEMmemPagesInputPerSec / MEMmemPageFaultsPerSec), should not be greater than If the ratio is higher than this, the system is spending too much time on paging activity, consider installing additional memory resources. The same alternatives to adding memory apply here as well. MEMmemPagesPerSec monitors the number of hard page faults for the processor, and the value often determines whether or not your system needs more RAM. If MEMmemPagesPerSec is consistently greater than 5, you probably have a memory bottleneck, and you may want to install additional memory. If MEMmemPagesPerSec is consistently greater than 10 to 12 and MEMmemPageFaultsPerSec is greater than MEMmemCacheFaultsPerSec, the system is paging too much and you should consider installing additional memory and increasing the size of the paging file system. Key Cache Parameters The NT_CACHE application class contains parameters for measuring memory consumption. Two parameters provide you with valuable memory statistics: CACcachCopyReadHitsPercent CACcachCopyReadsPerSec The CACcachCopyReadHitsPercent parameter monitors the percentage of cache copy read requests. A copy read is a file read operation that is satisfied by a memory copy from a cache page to the application's buffer. A CACcachCopyReadHitsPercent value greater Page 6

11 than 80 percent is excellent. If CACcachCopyReadHitsPercent decreases in value about 10 percent while CACcachCopyReadsPerSec remains relatively flat, there is an overall memory shortage. Consider adding physical memory. The CACcachCopyReadsPerSec parameter monitors the frequency of reads from cache pages that involve a memory copy of the data from the cache to the application's buffer. If CACcachCopyReadHitsPercent decreases in value about 10 percent while CACcach- CopyReadsPerSec remains relatively flat, there is an overall memory shortage. Consider adding physical memory. Key Pagefile Parameters The NT_PAGEFILE application class offers additional parameters that should be monitored. The PAGEpgUsagePercent parameter monitors the percentage of the page file currently in use. When page file usage exceeds 90 percent, Windows increases the size of the page file dynamically. This causes two performance-degrading events: Server performance is impacted by the dynamic update. The increase in page file size occurs in non-contiguous file space. When the page file is initially created, the file is a single contiguous block of disk space that can be efficiently written and read. The paging file should be maintained to minimize the need to dynamically change the file. In order to avoid these two events you can tune the server's paging configuration. When the page file system usage exceeds 80 percent, increase the page file size as part of your routine maintenance program in order to create contiguous file space allocation and avoid dynamic allocation. If paging is less that 20 percent, the system has an extremely large page file, and has a large amount of memory, then consider freeing the excess disk space by decreasing the size of the page file. Network Network-related issues should be monitored along with core components. As more and more users or applications leverage a server for the application or service it provides, network-related problems will occur. The NT_NETWORK application class includes three important parameters to isolate network issues: NETniBytesTotalPerSec NETniOutputQueueLength NETniPcktsPerSec Page 7

12 The NETniBytesTotalPerSec parameter monitors the rate that bytes are sent and received on the interface; this rate includes framing characters. The packet size is NETniBytesTotalPerSec/NETniPcktsPerSec. If the packet size drops, collisions are probably occurring and network efficiency is decreasing. The collisions may be caused by a large number of users in a poorly configured network, or by a defective network card (NIC) that is sending excessive messages. Consider running a diagnostic test on your NIC to check for configuration or hardware errors. Most NIC manufacturers provide a diskette that contains testing software. The NETniOutputQueueLength parameter monitors the length (in packets) of the output packet queue and can indicate network bottlenecks. If this parameter's value is consistently greater than two, then the local NIC may be malfunctioning, or the network is experiencing a collision condition that is decreasing network efficiency. These collisions may also be caused by having a large number of users on a poorly configured network or by a defective network card or printer that is sending excessive messages. The NETniPcktsPerSec parameter monitors the rate that packets are sent and received on the network. The packet size is NETniBytesTotalPerSec/NETniPcktsPerSec. If the packet size drops, collisions are probably occurring and network efficiency is decreasing. The collisions may be caused by a large number of users in a poorly configured network, or by a defective NIC that is sending excessive messages. Disk One of the key resources that affect a server's availability is the disk in use. At a very high level disk activity can be attributed to users and applications. Disk activity should be measured to determine if there are potential problems with the disk, or if there are potential problems in other areas of the OS. PATROL includes two application classes that can help solidify answers to disk related problems: NT_LOGICAL_DISKS NT_PHYSICAL_DISKS Logical Disks Under the NT_LOGICAL_DISKS application class, four critical parameters are included: LdldDiskQueueLength LdldDiskTimePercent LdldFreeMegabytes LdldFreeSpacePercent Page 8

13 The LdldDiskQueueLength parameter monitors the number of requests outstanding on the disk, including requests currently in service. This is an instantaneous value at the time the data was collected. If the number displayed is consistently high, there is a sustained load on your disk drive. If this number, minus the number of disk spindles, averages greater than 2, there may be a disk-related bottleneck. If one drive is more heavily loaded than another, you may want to move some of the most used files to other disks to distribute the load more evenly. The LdldDiskTimePercent parameter monitors the percentage of elapsed time that the selected disk drive is busy servicing read or write requests. If you have multiple disks in your system, you may want to check this parameter for each volume of a server to see how the load is distributed across the system. If one drive has a considerably larger load, you may want to move some of the files to other disks in the system to distribute the load across disks. You should investigate any major swing in utilization, as it can reveal problems. PATROL initiates an alarm if this parameter is between 69 and 100 percent. The LdldFreeMegabytes parameter monitors the amount of unused space on the disk drive in megabytes (MB). Applications that write to drives with limited space can cause operating system stress and possible failures. For drives larger than 1 GB: If this parameter falls below the number of megabytes that you have chosen for your system, free up some disk space. To provide free disk space: Delete or move duplicate or unneeded files from the drive. Consider archiving the data before taking these actions. Back up the files on the drive, replace the drive with a larger capacity drive, and restore the files to the new drive. For drives that are 1 gigabyte (GB) or smaller: Consider using the LDldFreeSpacePercent (percentage of free space on the logical disk) parameter rather than LdldFreeMegabytes. The LdldFreeSpacePercent parameter notifies you when its value falls below 10 percent (warning) and 5 percent (alarm). LdldFreeSpacePercent monitors the percentage of free space available on the selected logical disk drive. Applications that write to drives with limited space can cause operating system stress and possible failures. This parameter contains a recovery action that automatically clears the temporary directory when LdldFreeSpacePercent enters an alarm state. The same recommendations for LdldFreeMegabytes apply here. Page 9

14 Physical Disks Included with the NT_PHYSICAL_DISKS application class are two parameters that compliment the logical disks parameters in monitoring disk activity and usage: PdpdDiskQueueLength PDpdDiskTimePercent The PdpdDiskQueueLength parameter monitors the number of requests outstanding on the disk at the time the performance data is collected. If this parameter consistently has a value greater than 2, you should consider replacing the disk drive and/or the disk controller with faster versions. Before you upgrade the disk system however, make sure that you do not have a memory bottleneck, since excessive paging activity that is caused by insufficient memory can appear as a disk bottleneck. Verify that the paging parameters have low values relative to the total disk activity to help you decide if you have a disk bottleneck. Refer to the following parameters to help identify memory bottlenecks: MEMmemCacheFaultsPerSec MEMmemPageFaultsPerSec MEMmemPagesInputPerSec MEMmemPagesPerSec The PDpdDiskTimePercent parameter monitors the percentage of elapsed time that the disk spends servicing read or write requests. Good disk performance enhances virtual memory performance and reduces the elapsed time required to load programs that perform a large number of I/O requests. Disk performance may be impacted by a shortage of physical memory. If the PDpdDiskTimePercent parameter is greater than 60 percent or the PdpdDiskQueue- Length parameter is greater than 2, then physical disk congestion is adversely affecting your system's performance. To fix the situation, consider one or more of the following actions: Install a faster disk and controller. Distribute the workload as evenly as possible among different disk drives. Use the NTFS file system. NTFS is more efficient for large disks (400 MB or more). Create mirrored data sets. Create striped data sets. Disable short name generation on the NTFS file system. To determine if a memory shortage is impacting disk performance, calculate the portion of the disk I/O used for paging with the following formula: Page 10

15 % disk time used for paging = 100 * (MEMmemPagesPerSec * 'PhysicalDisk Avg,DiskSec/Transfer') MEMmemPagesPerSec is the number of hard page faults. PhysicalDisk Avg,DiskSec/Transfer is the time in seconds of the average disk transfer. You can add this parameter to PATROL using the PATROL Performance Monitor Wizard. You can also find this value using Windows Performance Monitor. If this value is greater than 10 percent of the total disk activity, then paging is considered excessive. If this value is less than 10 percent of the total disk activity, consider adding more physical memory and increasing the paging file size. Server (Application Class = NT_SERVER) The NT_SERVER application class monitors statistics related to network and shows the workload that the server is experiencing. The SVRsvrBytesTotalPerSec parameter indicates the number of bytes that the server has sent to and received from the network. This value provides an overall indication of server workload. If this number is consistently at or above 50 percent of the network capacity, you may need to put the server on a faster switch or hub. You can also add a second network interface card (NIC) to the server and build a subnetwork using the routing capability in Windows NT. System The NT_SYSTEM application class provides information about the state of objects in a Windows system. The application class also provides information about the number of processes interrupts amount of CPU utilization. This application class also provides you with an overall workload metric experienced by the server. The SYSsysProcessorQueueLength parameter monitors the length of the processor queue in number of threads. If the queue length is consistently greater than 2, the processor is probably congested. Consider adding processors to the system or upgrading to a machine with faster processors. If the queue length is consistently between four and eight, check the CPUprcrProcessorTimePercent parameter to see if processor utilization is consistently at 100 percent, which may indicate a poorly-behaved process that is not releasing system resources properly. Page 11

16 Operating System Summary System Resource Parameters CPU Memory Network Disks Server System NT_CPU\CPUprcrInterruptsPerSec NT_CPU\CPUprcrPrivTimePercent NT_CPU\CPUprcrProcessorTimePercent NT_CPU\CPUprcrUserTimePercent NT_MEMORY\MEMmemAvailableBytes NT_MEMORY\MEMmemAvailableBytes NT_MEMORY\MEMmemCacheFaultsPerSec NT_MEMORY\MEMmemPageFaultsPerSec NT_MEMORY\MEMmemPagesInputPerSec NT_MEMORY\MEMmemPagesPerSec NT_CACHE\CACcachCopyReadHitsPercent NT_CACHE\CACcachCopyReadsPerSec NT_PAGEFILE\PAGEpgUsagePercent NT_NETWORK\NETniBytesTotalPerSec NT_NETWORK\NETniOutputQueueLength NT_NETWORK\NETniPcktsPerSec NT_LOGICAL_DISKS\LdldDiskQueueLength NT_LOGICAL_DISKS\LdldDiskTimePercent NT_LOGICAL_DISKS\LdldFreeMegabytes NT_LOGICAL_DISKS\LdldFreeSpacePercent NT_PYSICAL_DISKS\PDpdDiskQueueLength NT_PYSICAL_DISKS\PDpdDiskTimePercent NT_SERVER\SVRsvrBytesTotalPerSec NT_SYSTEM\SYSsysProcessorQueueLength Exchange When monitoring Exchange it is important to look at the key areas of the application that affect availability. No one single service or area of Exchange should be ignored, as they all relate directly or indirectly to each other. The major areas to look at are: OS Parameters (CPU, Memory, Disk, Network) Exchange Services Exchange Processes Events Client Load Client Perspective Availability Data Access Message Traffic (Connectors, Queues) Store Page 12

17 OS Parameters Begin by monitoring the Windows operating system (OS) itself. The performance and availability of applications and databases are intimately tied to the operating systems that they run on; without a healthy OS, no application (ie: Exchange) will perform as expected. Use the previous part of this paper as a guide to monitoring the base operating system. Exchange Services Services are application types that run in the system background. Services provide core operating system features, such as Web serving, event logging, file serving, help and support, printing, cryptography, and error reporting. To provide core system features to its users, Exchange provides a number of services that run on an Exchange server. Of these services, the following components should be monitored: Microsoft Exchange Information Store Microsoft Exchange MTA Stacks Microsoft Exchange Routing Engine Microsoft Exchange System Attendant Simple Mail Transport Protocol World Wide Web Publishing The NT KM provides a number of parameters that give the status of all of these services. The two most important parameters to monitor are ServiceStatus and SvcDown. The ServiceStatus parameter indicates whether or not the Exchange services have been started and whether or not clients can make connections. The SvcDown parameter indicates the opposite. The NT KM monitors all services out of the box so there is little configuration necessary to achieve service monitoring. If any of the Exchange services enters a down state, it can be detrimental to your mail flow and your organization. Exchange Processes In addition to service monitoring, you should also monitor the processes that run on behalf of an application. Exchange has critical processes that should be watched to determine their availability and resource usage. Exchange processes include the following Store.exe (Information Store Service) Inetinfo.exe (IIS, Routing Engine) Mad.exe (System Attendant) Emsmta.exe (MTA Stacks Service) Windows Memory Handler System Process Page 13

18 Measure the percentage of processor time used to monitor for excessive processor usage and overall process status. Use the Process KM, which is part of the NT KM. The two most important parameters to look at are: PROCDown PROCProcessorTimePercent The PROCDown parameter indicates that a process is down. In monitoring the processor time percentage of a parameter, you can determine if a process is using too much processor time. Inetinfo.exe, store.exe, emsmta.exe and system.exe normally consume 90 percent of the processor time combined. In addition to processor time, the working set used by each process should be monitored. The working set is the set of memory pages touched recently by the threads in the process. This will give you an indication of memory usage per process. The PROCWorkingSet parameter can be found in the NT_PROCESS application class. Store.exe will consume most of the committed bytes due to the Exchange store maintaining a large cache. When used with PATROL KM for Microsoft Windows Operating System (the OS KM), PATROL for Microsoft Exchange Servers automatically monitors Exchange Server processes that are initiated at startup. You can also configure PATROL to monitor additional Exchange Server processes. Events Events can be monitored by configuring the NT_EVENTLOG application class. Exchange writes information and errors to the Windows Event Log. When troubleshooting a problematic server, this is often the first place to look. If your event log is not free from errors and potentially escalating warnings, users will suffer. With the OS KM, you can select specific IDs directly from a Windows Event Viewer and launch them from the console. Store errors and warnings should be monitored closely, as they will cause the most problems with Exchange. Store errors that are not resolved affect access and present the impression that your servers are unavailable. Any errors indicating a failure to access a Global Catalog (GC) by the store or a domain controller by the MTA should be monitored as well. Failure to access a GC will cause the store to dismount. Failure to access a domain controller will cause the MTA to shutdown. Monitoring all critical Exchange events ensures that your Exchange server is functioning properly. To monitor these events, use the Event Log KM found in the OS KM. The following services write events to the Application event log: IMAP4Svc (IMAP4 Protocol) Page 14

19 MS-ExhangeAL (Address List) MSExchangeIS\System (Information Store System) MSExchangeIS\Mailbox (Information Store Mailbox) MSExchangeIS\Public Folder (Information Store Public Folders) MSExchangeSRS (Site Replication Service) MSExchangeTransport (SMTP Routing Engine and Transport) MSExchangeMTA (MTA Service) MSExchangeSA (System Attendant Service) POP3SVC (POP3 Protocol) Aside from watching for errors generated by the above sources, server availability can also be assessed by looking for key events: Event ID 6005: This is a startup event indicating the time the operating system became available to Exchange. Event ID 6006: This event indicates the time the system became unavailable to Exchange due to a shutdown. Event ID 6008: This event is written upon restart if the server was not shutdown properly. Event ID=9582: The virtual memory necessary to run your Exchange server is fragmented in such a way that performance may be affected. It is highly recommended that you restart all Exchange services to correct this issue. Client Load PATROL gives you the ability to monitor client-level resource usage. Monitoring from the client perspective is unique because it gives you information about the user's experience. The following Exchange statistics can be monitored to determine client usage: client load top mail senders and mail receivers top mailbox users and public folders Monitoring the top senders allows you to determine the top senders either by the number of messages sent or the total size of the messages sent. Message tracking must be enabled to use this functionality. Under the MSEXCH_Top_Senders application class, you can monitor these three parameters: MsgSize MsgCount AvgMsgsPerHour Page 15

20 You can also monitor the top receivers. The MsgSize, MsgCount, and AvgMsgsPerHour parameters can also be found in the MSEXCH_Top_Receivers application class. Message tracking must also be enabled to use this functionality. Top mailbox users can be monitored with the MSEXCH_Top_Mailboxes application class. The Top Mailboxes application class monitors the top resource-consuming private folders (mailboxes) with these two parameters: MsgCount: number of messages MsgSize: size of messages Monitoring the Public folders should be considered a best practice approach to monitoring Exchange at the client level. Clients will update and add data to public folders; therefore, this is a natural progression in a monitoring plan. These top public folders can be monitored with the MSEXCH_Top_Folders application class, and the MsgCount and MsgSize parameters. Both application classes should be monitored. You can configure the Exchange KM to perform recovery actions such as automatically notifying the top senders, receivers, or mailbox users of their usage. You can also specify whether to use the number of messages or the total message size to determine the top senders, receivers, mailboxes, and folders. PATROL also lets you monitor specified users. You can use the MSEXCH_Watched_Users application class to monitor the following statistics for specified Exchange users: message send and receive rate Internet messages sent and received whether the client is over the send or receive limits An administrator can better understand the amount of storage that a user is consuming and better allocate storage resources by gathering these statistics. For example, the CEO of the company may require a larger storage capacity than a regular employee. Conversely, some employees' storage needs may be less than what they have allocated. Knowing this allows the administrator to free up storage space for those who require it, rather than purchasing more storage capacity. Additionally, understanding storage consumption may help prevent storage abuse by individual users. If the administrator understands the amount of network bandwidth that is consumed by individual users, then he or she can help prevent or alleviate network problems. For example, the administrator can move the mailboxes of those using the most bandwidth onto an Exchange server that is connected to a higher capacity WAN or LAN that will not be as affected by the amount of that the user is sending. By tracking the activity of each user, an administrator can also Page 16

Monitoring Microsoft Exchange to Improve Performance and Availability

Monitoring Microsoft Exchange to Improve Performance and Availability Focus on Value Monitoring Microsoft Exchange to Improve Performance and Availability With increasing growth in email traffic, the number and size of attachments, spam, and other factors, organizations

More information

PATROL for Microsoft Windows Servers v2.3.00 Reviewer s Guide

PATROL for Microsoft Windows Servers v2.3.00 Reviewer s Guide PATROL for Microsoft Windows Servers v2.3.00 Reviewer s Guide Contents Welcome!................................................. 3 Management of Microsoft Windows Servers...................... 3 Installation

More information

Monitoring Mail Servers

Monitoring Mail Servers Monitoring Mail Servers eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be reproduced

More information

Centerity Service Pack for Microsoft Exchange 2013 Keep your e-mail services up and running!

Centerity Service Pack for Microsoft Exchange 2013 Keep your e-mail services up and running! Centerity Service Pack for Microsoft Exchange 2013 Keep your e-mail services up and running! Key Features Client & server monitoring. Tens of monitored KPI s for in-depth inspection. Wide range of usage

More information

IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Exchange Server Agent Version 6.3.1 Fix Pack 2.

IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Exchange Server Agent Version 6.3.1 Fix Pack 2. IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Exchange Server Agent Version 6.3.1 Fix Pack 2 Reference IBM Tivoli Composite Application Manager for Microsoft Applications:

More information

Also on the Performance tab, you will find a button labeled Resource Monitor. You can invoke Resource Monitor for additional analysis of the system.

Also on the Performance tab, you will find a button labeled Resource Monitor. You can invoke Resource Monitor for additional analysis of the system. 1348 CHAPTER 33 Logging and Debugging Monitoring Performance The Performance tab enables you to view the CPU and physical memory usage in graphical form. This information is especially useful when you

More information

Monitoring Agent for Microsoft Exchange Server 6.3.1 Fix Pack 9. Reference IBM

Monitoring Agent for Microsoft Exchange Server 6.3.1 Fix Pack 9. Reference IBM Monitoring Agent for Microsoft Exchange Server 6.3.1 Fix Pack 9 Reference IBM Monitoring Agent for Microsoft Exchange Server 6.3.1 Fix Pack 9 Reference IBM Note Before using this information and the product

More information

Perfmon counters for Enterprise MOSS

Perfmon counters for Enterprise MOSS Perfmon counters for Enterprise MOSS # Counter What does it measure or can tell us Threshold [Action taken if] Notes PROCESSOR RELATED COUNTERS 1 Processor(_Total)\% Measures average processor utilization

More information

Planning Domain Controller Capacity

Planning Domain Controller Capacity C H A P T E R 4 Planning Domain Controller Capacity Planning domain controller capacity helps you determine the appropriate number of domain controllers to place in each domain that is represented in a

More information

WINDOWS SERVER MONITORING

WINDOWS SERVER MONITORING WINDOWS SERVER Server uptime, all of the time CNS Windows Server Monitoring provides organizations with the ability to monitor the health and availability of their Windows server infrastructure. Through

More information

Lesson Plans Configuring Exchange Server 2007

Lesson Plans Configuring Exchange Server 2007 Lesson Plans Configuring Exchange Server 2007 (Exam 70-236) Version 2.1 Table of Contents Course Overview... 2 Section 1.1: Server-based Messaging... 4 Section 1.2: Exchange Versions... 5 Section 1.3:

More information

pc resource monitoring and performance advisor

pc resource monitoring and performance advisor pc resource monitoring and performance advisor application note www.hp.com/go/desktops Overview HP Toptools is a modular web-based device management tool that provides dynamic information about HP hardware

More information

Windows Server Performance Monitoring

Windows Server Performance Monitoring Spot server problems before they are noticed The system s really slow today! How often have you heard that? Finding the solution isn t so easy. The obvious questions to ask are why is it running slowly

More information

Web Server (Step 1) Processes request and sends query to SQL server via ADO/OLEDB. Web Server (Step 2) Creates HTML page dynamically from record set

Web Server (Step 1) Processes request and sends query to SQL server via ADO/OLEDB. Web Server (Step 2) Creates HTML page dynamically from record set Dawn CF Performance Considerations Dawn CF key processes Request (http) Web Server (Step 1) Processes request and sends query to SQL server via ADO/OLEDB. Query (SQL) SQL Server Queries Database & returns

More information

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2 Feature and Technical Overview Published: 2010-06-16 SWDT305802-1108946-0615123042-001 Contents 1 Overview: BlackBerry Enterprise

More information

15 Ways to Optimize Microsoft Exchange by Robert Shimonski & Chad Conrow

15 Ways to Optimize Microsoft Exchange by Robert Shimonski & Chad Conrow 15 Ways to Optimize Microsoft Exchange by Robert Shimonski & Chad Conrow In today s high-speed, fast-paced environment whether it be business or technology it is essential to pay close attention to detail.

More information

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure Question Number (ID) : 1 (wmpmsp_mngnwi-121) You are an administrator for an organization that provides Internet connectivity to users from the corporate network. Several users complain that they cannot

More information

FIGURE 33.5. Selecting properties for the event log.

FIGURE 33.5. Selecting properties for the event log. 1358 CHAPTER 33 Logging and Debugging Customizing the Event Log The properties of an event log can be configured. In Event Viewer, the properties of a log are defined by general characteristics: log path,

More information

MailEnable Scalability White Paper Version 1.2

MailEnable Scalability White Paper Version 1.2 MailEnable Scalability White Paper Version 1.2 Table of Contents 1 Overview...2 2 Core architecture...3 2.1 Configuration repository...3 2.2 Storage repository...3 2.3 Connectors...3 2.3.1 SMTP Connector...3

More information

Monitoring and Troubleshooting Microsoft Exchange Server 2007 (5051A) Course length: 2 days

Monitoring and Troubleshooting Microsoft Exchange Server 2007 (5051A) Course length: 2 days Monitoring and Troubleshooting Microsoft Exchange Server 2007 (5051A) Course length: 2 days Who Should Attend: This workshop is intended for experienced enterprise-level messaging professionals who have

More information

MCSE Objectives. Exam 70-236: TS:Exchange Server 2007, Configuring

MCSE Objectives. Exam 70-236: TS:Exchange Server 2007, Configuring MCSE Objectives Exam 70-236: TS:Exchange Server 2007, Configuring Installing and Configuring Microsoft Exchange Servers Prepare the infrastructure for Exchange installation. Prepare the servers for Exchange

More information

MOC 5047B: Intro to Installing & Managing Microsoft Exchange Server 2007 SP1

MOC 5047B: Intro to Installing & Managing Microsoft Exchange Server 2007 SP1 MOC 5047B: Intro to Installing & Managing Microsoft Exchange Server 2007 SP1 Course Number: 5047B Course Length: 3 Days Certification Exam This course will help you prepare for the following Microsoft

More information

Running a Workflow on a PowerCenter Grid

Running a Workflow on a PowerCenter Grid Running a Workflow on a PowerCenter Grid 2010-2014 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying, recording or otherwise)

More information

ERserver. iseries. Work management

ERserver. iseries. Work management ERserver iseries Work management ERserver iseries Work management Copyright International Business Machines Corporation 1998, 2002. All rights reserved. US Government Users Restricted Rights Use, duplication

More information

Installing GFI MailSecurity

Installing GFI MailSecurity Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install

More information

Dell Active Administrator 8.0

Dell Active Administrator 8.0 What s new in Dell Active Administrator 8.0 January 2016 Dell Active Administrator 8.0 is the upcoming release of Dell Software's complete solution for managing Microsoft Active Directory security auditing,

More information

Active Directory Monitoring With PATROL

Active Directory Monitoring With PATROL Active Directory Monitoring With PATROL Contents What is Active Directory?...1 Why Monitor?...1 Active Directory and PATROL...2 Critical Active Directory Components to Monitor...3 Address Book...3 Domain

More information

Network Management and Monitoring Software

Network Management and Monitoring Software Page 1 of 7 Network Management and Monitoring Software Many products on the market today provide analytical information to those who are responsible for the management of networked systems or what the

More information

This course is intended for IT professionals who are responsible for the Exchange Server messaging environment in an enterprise.

This course is intended for IT professionals who are responsible for the Exchange Server messaging environment in an enterprise. 10233A: Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Course Number: 10233A Course Length: 5 Day Course Overview This instructor-led course provides you with the knowledge

More information

ES Exchange Server - How to Remove XMON

ES Exchange Server - How to Remove XMON w e p r o t e c t d i g i t a l w o r l d s NOD32 Server Edition for MS Exchange Server Installation Copyright Eset, spol. s r. o. All rights reserved. No part of this document may be reproduced or transmitted

More information

Installing Windows XP Professional

Installing Windows XP Professional CHAPTER 3 Installing Windows XP Professional After completing this chapter, you will be able to: Plan for an installation of Windows XP Professional. Use a CD to perform an attended installation of Windows

More information

Journaling Guide for Email Archive for Exchange 2007

Journaling Guide for Email Archive for Exchange 2007 Journaling Guide for Email Archive for Exchange 2007 (C) 2010 Websense, Inc. All Rights Reserved. Thank you for choosing Email Archive. This Journaling Guide provides information you need to set up the

More information

Monitoring Microsoft Exchange 2013

Monitoring Microsoft Exchange 2013 Monitoring Microsoft Exchange 2013 eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may

More information

VirtualCenter Database Performance for Microsoft SQL Server 2005 VirtualCenter 2.5

VirtualCenter Database Performance for Microsoft SQL Server 2005 VirtualCenter 2.5 Performance Study VirtualCenter Database Performance for Microsoft SQL Server 2005 VirtualCenter 2.5 VMware VirtualCenter uses a database to store metadata on the state of a VMware Infrastructure environment.

More information

One of the database administrators

One of the database administrators THE ESSENTIAL GUIDE TO Database Monitoring By Michael Otey SPONSORED BY One of the database administrators (DBAs) most important jobs is to keep the database running smoothly, which includes quickly troubleshooting

More information

MCSA Objectives. Exam 70-236: TS:Exchange Server 2007, Configuring

MCSA Objectives. Exam 70-236: TS:Exchange Server 2007, Configuring MCSA Objectives Exam 70-236: TS:Exchange Server 2007, Configuring Installing and Configuring Microsoft Exchange Servers Prepare the infrastructure for Exchange installation. Prepare the servers for Exchange

More information

Feature and Technical

Feature and Technical BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 4 Feature and Technical Overview Published: 2013-11-07 SWD-20131107160132924 Contents 1 Document revision history...6 2 What's

More information

Microsoft Exchange Server 2003 Deployment Considerations

Microsoft Exchange Server 2003 Deployment Considerations Microsoft Exchange Server 3 Deployment Considerations for Small and Medium Businesses A Dell PowerEdge server can provide an effective platform for Microsoft Exchange Server 3. A team of Dell engineers

More information

The Lagopus SDN Software Switch. 3.1 SDN and OpenFlow. 3. Cloud Computing Technology

The Lagopus SDN Software Switch. 3.1 SDN and OpenFlow. 3. Cloud Computing Technology 3. The Lagopus SDN Software Switch Here we explain the capabilities of the new Lagopus software switch in detail, starting with the basics of SDN and OpenFlow. 3.1 SDN and OpenFlow Those engaged in network-related

More information

Using Avaya Aura Messaging

Using Avaya Aura Messaging Using Avaya Aura Messaging Release 6.3.2 Issue 1 December 2014 Contents Chapter 1: Getting Started... 4 Messaging overview... 4 Prerequisites... 4 Accessing your mailbox from any phone... 4 Accessing the

More information

Understanding IBM Lotus Domino server clustering

Understanding IBM Lotus Domino server clustering Understanding IBM Lotus Domino server clustering Reetu Sharma Software Engineer, IBM Software Group Pune, India Ranjit Rai Software Engineer IBM Software Group Pune, India August 2009 Copyright International

More information

IT Essentials v4.1 LI 11.4.5 Upgrade and configure storage devices and hard drives. IT Essentials v4.1 LI 12.1.3 Windows OS directory structures

IT Essentials v4.1 LI 11.4.5 Upgrade and configure storage devices and hard drives. IT Essentials v4.1 LI 12.1.3 Windows OS directory structures IT Essentials v4.1 LI 11.4.5 Upgrade and configure storage devices and hard drives 2.3 Disk management tools In Windows Vista and Windows 7, use the following path: Start > Start Search > type diskmgmt.msc

More information

WhatsUp Event Alarm v10x Quick Setup Guide

WhatsUp Event Alarm v10x Quick Setup Guide WhatsUp Event Alarm v10x Quick Setup Guide Contents CHAPTER 1 WhatsUp Event Alarm Quick Setup Guide Microsoft Vista/Server 2008/Windows 7 Requirements/Recommendations... 3 Before You Begin... 7 Installation

More information

EUCIP IT Administrator - Module 2 Operating Systems Syllabus Version 3.0

EUCIP IT Administrator - Module 2 Operating Systems Syllabus Version 3.0 EUCIP IT Administrator - Module 2 Operating Systems Syllabus Version 3.0 Copyright 2011 ECDL Foundation All rights reserved. No part of this publication may be reproduced in any form except as permitted

More information

5nine Cloud Monitor for Hyper-V

5nine Cloud Monitor for Hyper-V 5nine Cloud Monitor for Hyper-V Getting Started Guide Table of Contents System Requirements... 2 Installation... 3 Getting Started... 8 Settings... 9 Authentication... 9 5nine Cloud Monitor for Hyper-V

More information

Installing GFI MailSecurity

Installing GFI MailSecurity Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install

More information

Active Directory and Transport Server

Active Directory and Transport Server Active Directory and Transport Server Kamal Abburi Kamal.Abburi@microsoft.com Premier Field Engineering Source : TechNet Documentation Premier Field Engineering - What do we do Reactive Support Troubleshooting

More information

ESET Mail Security 4. User Guide. for Microsoft Exchange Server. Microsoft Windows 2000 / 2003 / 2008

ESET Mail Security 4. User Guide. for Microsoft Exchange Server. Microsoft Windows 2000 / 2003 / 2008 ESET Mail Security 4 for Microsoft Exchange Server User Guide Microsoft Windows 2000 / 2003 / 2008 Content 1. Introduction...4 1.1 System requirements... 4 1.2 Methods Used... 4 1.2.1 Mailbox scanning

More information

Benchmarking Guide. Performance. BlackBerry Enterprise Server for Microsoft Exchange. Version: 5.0 Service Pack: 4

Benchmarking Guide. Performance. BlackBerry Enterprise Server for Microsoft Exchange. Version: 5.0 Service Pack: 4 BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 4 Performance Benchmarking Guide Published: 2015-01-13 SWD-20150113132750479 Contents 1 BlackBerry Enterprise Server for Microsoft

More information

Distribution One Server Requirements

Distribution One Server Requirements Distribution One Server Requirements Introduction Welcome to the Hardware Configuration Guide. The goal of this guide is to provide a practical approach to sizing your Distribution One application and

More information

Analyzing IBM i Performance Metrics

Analyzing IBM i Performance Metrics WHITE PAPER Analyzing IBM i Performance Metrics The IBM i operating system is very good at supplying system administrators with built-in tools for security, database management, auditing, and journaling.

More information

How To Backup An Exchange 2007 Mailbox With A Backup From A Backup To A Backup On A Windows 2007 Mail Box (Brick Level) (Barcondown) (For Windows 2007) (Powerpoint) (Windows 2007) And Power

How To Backup An Exchange 2007 Mailbox With A Backup From A Backup To A Backup On A Windows 2007 Mail Box (Brick Level) (Barcondown) (For Windows 2007) (Powerpoint) (Windows 2007) And Power MS Exchange Server Backup - User Guide TABLE OF CONTENTS Introduction...2 Features...2 System Requirements...4 Exchange Server 2010... 4 Exchange Server 2007... 4 Exchange Server 2003... 4 Exchange Server

More information

Product Review ControlUp

Product Review ControlUp Product Review ControlUp Februari 2012 Wilco van Bragt Control-UP Page 2 of 15 Introduction While Citrix Resource Manager was not perfect in earlier version of Citrix Presentation Server, many Citrix administrators

More information

Agency Pre Migration Tasks

Agency Pre Migration Tasks Agency Pre Migration Tasks This document is to be provided to the agency and will be reviewed during the Migration Technical Kickoff meeting between the ICS Technical Team and the agency. Network: Required

More information

How To Check If Your Mailbox Is Running Properly

How To Check If Your Mailbox Is Running Properly CA Nimsoft Monitor Probe Guide for Exchange Server Monitor exchange_monitor v5.0 series Legal Notices Copyright 2013, CA. All rights reserved. Warranty The material contained in this document is provided

More information

EUCIP - IT Administrator. Module 2 Operating Systems. Version 2.0

EUCIP - IT Administrator. Module 2 Operating Systems. Version 2.0 EUCIP - IT Administrator Module 2 Operating Systems Version 2.0 Module 2 Goals Module 2 Module 2, Operating Systems, requires the candidate to be familiar with the procedure of installing and updating

More information

Features Overview Guide About new features in WhatsUp Gold v12

Features Overview Guide About new features in WhatsUp Gold v12 Features Overview Guide About new features in WhatsUp Gold v12 Contents CHAPTER 1 Learning about new features in Ipswitch WhatsUp Gold v12 Welcome to WhatsUp Gold... 1 What's new in WhatsUp Gold v12...

More information

theguard! ApplicationManager System Windows Data Collector

theguard! ApplicationManager System Windows Data Collector theguard! ApplicationManager System Windows Data Collector Status: 10/9/2008 Introduction... 3 The Performance Features of the ApplicationManager Data Collector for Microsoft Windows Server... 3 Overview

More information

Installing GFI FAXmaker

Installing GFI FAXmaker Installing GFI FAXmaker System Requirements Before you install GFI FAXmaker, please ensure that the following requirements are met. GFI FAXmaker FAX Server: A Windows 2000, 2003, 2008 server or Windows

More information

my forecasted needs. The constraint of asymmetrical processing was offset two ways. The first was by configuring the SAN and all hosts to utilize

my forecasted needs. The constraint of asymmetrical processing was offset two ways. The first was by configuring the SAN and all hosts to utilize 1) Disk performance When factoring in disk performance, one of the larger impacts on a VM is determined by the type of disk you opt to use for your VMs in Hyper-v manager/scvmm such as fixed vs dynamic.

More information

CHAPTER 3 PROBLEM STATEMENT AND RESEARCH METHODOLOGY

CHAPTER 3 PROBLEM STATEMENT AND RESEARCH METHODOLOGY 51 CHAPTER 3 PROBLEM STATEMENT AND RESEARCH METHODOLOGY Web application operations are a crucial aspect of most organizational operations. Among them business continuity is one of the main concerns. Companies

More information

Lotus Domino 8 Monitoring and Maintenance

Lotus Domino 8 Monitoring and Maintenance Lotus Domino 8 Monitoring and Maintenance Course Title Course Code Lotus Domino 8 Monitoring and Maintenance DSMM8 Duration 02 days Course Fee Call to Request Instructor Certified Lotus Instructor or Certified

More information

Omtool Server Monitor administrator guide

Omtool Server Monitor administrator guide Omtool Server Monitor administrator guide May 29, 2008 (4.0342-AA) Omtool, Ltd. 6 Riverside Drive Andover, MA 01810 Phone: +1/1 978 327 5700 Toll-free in the US: +1/1 800 886 7845 Fax: +1/1 978 659 1300

More information

המרכז ללימודי חוץ המכללה האקדמית ספיר. ד.נ חוף אשקלון 79165 טל'- 08-6801535 פקס- 08-6801543 בשיתוף עם מכללת הנגב ע"ש ספיר

המרכז ללימודי חוץ המכללה האקדמית ספיר. ד.נ חוף אשקלון 79165 טל'- 08-6801535 פקס- 08-6801543 בשיתוף עם מכללת הנגב עש ספיר מודולות הלימוד של מייקרוסופט הקורס מחולק ל 4 מודולות כמפורט:.1Configuring Microsoft Windows Vista Client 70-620 Installing and upgrading Windows Vista Identify hardware requirements. Perform a clean installation.

More information

VirtualCenter Database Maintenance VirtualCenter 2.0.x and Microsoft SQL Server

VirtualCenter Database Maintenance VirtualCenter 2.0.x and Microsoft SQL Server Technical Note VirtualCenter Database Maintenance VirtualCenter 2.0.x and Microsoft SQL Server This document discusses ways to maintain the VirtualCenter database for increased performance and manageability.

More information

Metalogix SharePoint Backup. Advanced Installation Guide. Publication Date: August 24, 2015

Metalogix SharePoint Backup. Advanced Installation Guide. Publication Date: August 24, 2015 Metalogix SharePoint Backup Publication Date: August 24, 2015 All Rights Reserved. This software is protected by copyright law and international treaties. Unauthorized reproduction or distribution of this

More information

Best Practices with Argent

Best Practices with Argent Best Practices with Argent... Contents System Requirements 3 Remote Monitoring Engines (Formerly Regional Agents) 4 Daughter Engines 4 Non-Stop Monitoring 5 What to Monitor On All Your Servers 5 What to

More information

CA Unified Infrastructure Management

CA Unified Infrastructure Management CA Unified Infrastructure Management Probe Guide for IIS Server Monitoring iis v1.7 series Copyright Notice This online help system (the "System") is for your informational purposes only and is subject

More information

How To Use Gfi Mailarchiver On A Pc Or Macbook With Gfi Email From A Windows 7.5 (Windows 7) On A Microsoft Mail Server On A Gfi Server On An Ipod Or Gfi.Org (

How To Use Gfi Mailarchiver On A Pc Or Macbook With Gfi Email From A Windows 7.5 (Windows 7) On A Microsoft Mail Server On A Gfi Server On An Ipod Or Gfi.Org ( GFI MailArchiver for Exchange 4 Manual By GFI Software http://www.gfi.com Email: info@gfi.com Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

Predefined Analyser Rules for MS SQL Server

Predefined Analyser Rules for MS SQL Server NORAD Surveillance DB for Microsoft SQL Server NORAD Surveillance DB for Microsoft SQL Server provides several predefined rule templates and parameters which can immediately apply to SQL Server entities

More information

Load Testing and Monitoring Web Applications in a Windows Environment

Load Testing and Monitoring Web Applications in a Windows Environment OpenDemand Systems, Inc. Load Testing and Monitoring Web Applications in a Windows Environment Introduction An often overlooked step in the development and deployment of Web applications on the Windows

More information

MICROSOFT EXCHANGE 2010 4 MAIN CHALLENGES IT MANAGER HAVE TO FACE GSX SOLUTIONS

MICROSOFT EXCHANGE 2010 4 MAIN CHALLENGES IT MANAGER HAVE TO FACE GSX SOLUTIONS White paper September 2011 GSX SOLUTIONS MICROSOFT EXCHANGE 2010 4 MAIN CHALLENGES IT MANAGER HAVE TO FACE Project: Exchange 2010 Monitoring an reporting Targeted Product: GSX Monitor [ A d r e s s e d

More information

Monitoring and Maintaining Cisco Unified MeetingPlace Web Conferencing

Monitoring and Maintaining Cisco Unified MeetingPlace Web Conferencing CHAPTER 7 Monitoring and Maintaining Cisco Unified MeetingPlace Web Conferencing We recommend that you monitor heavily used systems on short intervals, such as bi-weekly or weekly. Monitor systems with

More information

The team that wrote this redbook Comments welcome Introduction p. 1 Three phases p. 1 Netfinity Performance Lab p. 2 IBM Center for Microsoft

The team that wrote this redbook Comments welcome Introduction p. 1 Three phases p. 1 Netfinity Performance Lab p. 2 IBM Center for Microsoft Foreword p. xv Preface p. xvii The team that wrote this redbook p. xviii Comments welcome p. xx Introduction p. 1 Three phases p. 1 Netfinity Performance Lab p. 2 IBM Center for Microsoft Technologies

More information

DELL TM PowerEdge TM T610 500 Mailbox Resiliency Exchange 2010 Storage Solution

DELL TM PowerEdge TM T610 500 Mailbox Resiliency Exchange 2010 Storage Solution DELL TM PowerEdge TM T610 500 Mailbox Resiliency Exchange 2010 Storage Solution Tested with: ESRP Storage Version 3.0 Tested Date: Content DELL TM PowerEdge TM T610... 1 500 Mailbox Resiliency

More information

HP Device Manager 4.6

HP Device Manager 4.6 Technical white paper HP Device Manager 4.6 Installation and Update Guide Table of contents Overview... 3 HPDM Server preparation... 3 FTP server configuration... 3 Windows Firewall settings... 3 Firewall

More information

Module 10: Maintaining Active Directory

Module 10: Maintaining Active Directory Module 10: Maintaining Active Directory! Lesson: Backing Up Active Directory Topic: How to Back Up Active Directory! Lesson: Restoring Active Directory Topic: How to Perform a Primary Restore! Lesson:

More information

BMC Performance Manager Active Directory Best Practices White Paper

BMC Performance Manager Active Directory Best Practices White Paper BMC Performance Manager Active Directory Best Practices White Paper Problem The IT department delivers user authentication services to their internal and external customers. Users complain that they can

More information

GFI Product Guide. GFI MailArchiver Archive Assistant

GFI Product Guide. GFI MailArchiver Archive Assistant GFI Product Guide GFI MailArchiver Archive Assistant The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind, either

More information

Installing GFI MailEssentials

Installing GFI MailEssentials Installing GFI MailEssentials Introduction to installing GFI MailEssentials This chapter shows you how to install and configure GFI MailEssentials. GFI MailEssentials can be installed in two ways: Installation

More information

SAN Conceptual and Design Basics

SAN Conceptual and Design Basics TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer

More information

Windows 2003 Performance Monitor. System Monitor. Adding a counter

Windows 2003 Performance Monitor. System Monitor. Adding a counter Windows 2003 Performance Monitor The performance monitor, or system monitor, is a utility used to track a range of processes and give a real time graphical display of the results, on a Windows 2003 system.

More information

WebEx. Remote Support. User s Guide

WebEx. Remote Support. User s Guide WebEx Remote Support User s Guide Version 6.5 Copyright WebEx Communications, Inc. reserves the right to make changes in the information contained in this publication without prior notice. The reader should

More information

Jerry Cochran Internet Solutions Business Unit Compaq Computer Corporation

Jerry Cochran Internet Solutions Business Unit Compaq Computer Corporation Jerry Cochran Internet Solutions Business Unit Compaq Computer Corporation Core Services Messaging Inbox Collaboration Workflow Management/Newsgroups Organizational Applications, Business Processes, Corporate

More information

PrinterOn Enterprise Administration Support Guide

PrinterOn Enterprise Administration Support Guide PrinterOn Enterprise Administration Support Guide Version 2.5 Doc Rev: 1.1 Table of Contents 1. Overview...4 2. Hardware and Operating System Requirements...5 2.1. Hardware Requirements...5 2.2. Software

More information

How To Install An Aneka Cloud On A Windows 7 Computer (For Free)

How To Install An Aneka Cloud On A Windows 7 Computer (For Free) MANJRASOFT PTY LTD Aneka 3.0 Manjrasoft 5/13/2013 This document describes in detail the steps involved in installing and configuring an Aneka Cloud. It covers the prerequisites for the installation, the

More information

Windows Admins... & Long-term capacity planning... do the two go together?

Windows Admins... & Long-term capacity planning... do the two go together? Windows Admins... & Long-term capacity planning... do the two go together? Carl Stanfield EMC Australia Capacity management requires a few minutes of your day to crunch some numbers. The results are priceless

More information

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows : Managing, Maintaining, and Troubleshooting, 5e Chapter 3 Installing Windows Objectives How to plan a Windows installation How to install Windows Vista How to install Windows XP How to install Windows

More information

Getting Started Guide

Getting Started Guide GFI MailArchiver for Exchange Getting Started Guide By GFI Software Ltd. http://www.gfi.com Email: info@gfi.com Information in this document is subject to change without notice. Companies, names, and

More information

IBM Tivoli Monitoring Version 6.3 Fix Pack 2. Infrastructure Management Dashboards for Servers Reference

IBM Tivoli Monitoring Version 6.3 Fix Pack 2. Infrastructure Management Dashboards for Servers Reference IBM Tivoli Monitoring Version 6.3 Fix Pack 2 Infrastructure Management Dashboards for Servers Reference IBM Tivoli Monitoring Version 6.3 Fix Pack 2 Infrastructure Management Dashboards for Servers Reference

More information

Basic Messaging Services for Windows NT and Windows 2000

Basic Messaging Services for Windows NT and Windows 2000 Basic Messaging Services for Windows NT and Windows 2000 SYSTEM OVERVIEW MANUAL Version 1-0-1b www.mailenable.com TABLE OF CONTENTS 1 INTRODUCTION...3 2 SYSTEM OVERVIEW...4 3 CONNECTORS...6 3.1 SMTP Connector...7

More information

ENTERPRISE INFRASTRUCTURE CONFIGURATION GUIDE

ENTERPRISE INFRASTRUCTURE CONFIGURATION GUIDE ENTERPRISE INFRASTRUCTURE CONFIGURATION GUIDE MailEnable Pty. Ltd. 59 Murrumbeena Road, Murrumbeena. VIC 3163. Australia t: +61 3 9569 0772 f: +61 3 9568 4270 www.mailenable.com Document last modified:

More information

Hardware Performance Optimization and Tuning. Presenter: Tom Arakelian Assistant: Guy Ingalls

Hardware Performance Optimization and Tuning. Presenter: Tom Arakelian Assistant: Guy Ingalls Hardware Performance Optimization and Tuning Presenter: Tom Arakelian Assistant: Guy Ingalls Agenda Server Performance Server Reliability Why we need Performance Monitoring How to optimize server performance

More information

MANAGING NETWORK COMPONENTS USING SNMP

MANAGING NETWORK COMPONENTS USING SNMP MANAGING NETWORK COMPONENTS USING SNMP Abubucker Samsudeen Shaffi 1 Mohanned Al-Obaidy 2 Gulf College 1, 2 Sultanate of Oman. Email: abobacker.shaffi@gulfcollegeoman.com mohaned@gulfcollegeoman.com Abstract:

More information

NetWrix Server Configuration Monitor

NetWrix Server Configuration Monitor NetWrix Server Configuration Monitor Version 2.2 Quick Start Guide Contents NetWrix Server Configuration Monitor Quick Start Guide 1. INTRODUCTION... 3 1.1 KEY FEATURES... 3 1.2 LICENSING... 4 1.3 HOW

More information

NE-2273B Managing and Maintaining a Microsoft Windows Server 2003 Environment

NE-2273B Managing and Maintaining a Microsoft Windows Server 2003 Environment NE-2273B Managing and Maintaining a Microsoft Windows Server 2003 Environment Summary Duration Vendor Audience 5 Days Microsoft IT Professionals Published Level Technology 05 October 2005 200 Microsoft

More information

Microsoft Exchange 2003 Disaster Recovery Operations Guide

Microsoft Exchange 2003 Disaster Recovery Operations Guide Microsoft Exchange 2003 Disaster Recovery Operations Guide Microsoft Corporation Published: December 12, 2006 Author: Exchange Server Documentation Team Abstract This guide provides installation and deployment

More information

Installing GFI MailEssentials

Installing GFI MailEssentials Installing GFI MailEssentials Introduction to installing GFI MailEssentials This chapter explains the procedure on how to install and configure GFI MailEssentials. GFI MailEssentials can be installed in

More information

white paper Capacity and Scaling of Microsoft Terminal Server on the Unisys ES7000/600 Unisys Systems & Technology Modeling and Measurement

white paper Capacity and Scaling of Microsoft Terminal Server on the Unisys ES7000/600 Unisys Systems & Technology Modeling and Measurement white paper Capacity and Scaling of Microsoft Terminal Server on the Unisys ES7000/600 Unisys Systems & Technology Modeling and Measurement 2 This technical white paper has been written for IT professionals

More information

NEC Express5800 Series NEC ESMPRO AlertManager User's Guide

NEC Express5800 Series NEC ESMPRO AlertManager User's Guide NEC Express5800 Series NEC ESMPRO AlertManager User's Guide 7-2006 ONL-4152aN-COMMON-128-99-0606 PROPRIETARY NOTICE AND LIABILITY DISCLAIMER The information disclosed in this document, including all designs

More information