8.6 Migrating to Exchange 2010



Similar documents
10.2. Auditing Cisco PIX Firewall with Quest InTrust

How to Use Custom Site Templates and Definitions supporting Corporate look-and-feel

8.7. Resource Kit User Guide

How to Use Custom Site Templates and Definitions supporting Corporate look-and-feel

Quest Management Agent for Forefront Identity Manager

Enterprise Single Sign-On 8.0.3

An Introduction to Toad Extension for Visual Studio. Written By Thomas Klughardt Systems Consultant Quest Software, Inc.

Direct Migration from SharePoint 2003 to SharePoint 2010

Foglight for SQL Server

8.7. Target Exchange 2010 Environment Preparation

Enterprise Single Sign-On Installation and Configuration Guide

2007 Quest Software, Inc. ALL RIGHTS RESERVED. TRADEMARKS. Disclaimer

Quest ChangeAuditor 5.0. For Windows File Servers. Events Reference

8.0. Quick Start Guide

Go Beyond Basic Up/Down Monitoring

Secure and Efficient Log Management with Quest OnDemand

Taking Unix Identity and Access Management to the Next Level

Quick Connect Express for Active Directory

Migrating Your Applications to the Cloud

2010 Quest Software, Inc. ALL RIGHTS RESERVED. Trademarks. Third Party Contributions

Eight Best Practices for Identity and Access Management

How to Use Custom Site Templates and Definitions supporting Corporate look-and-feel

FOR WINDOWS FILE SERVERS

Defender Delegated Administration. User Guide

8.10. Required Ports

Using Stat with Custom Applications

Quest ChangeAuditor 4.8

4.0. Offline Folder Wizard. User Guide

2011 Quest Software, Inc. ALL RIGHTS RESERVED. TRADEMARKS DISCLAIMER

8.8. Post-Migration Activities

Quest Collaboration Services 3.5. How it Works Guide

Quest ChangeAuditor 5.1 FOR ACTIVE DIRECTORY. User Guide

Toad for Oracle Compatibility with Windows 7 Revealed

Quest Site Administrator 4.4

2011 Quest Software, Inc. ALL RIGHTS RESERVED.

Quest Collaboration Services How it Works Guide

Proactive Performance Management for Enterprise Databases

2.0. Quick Start Guide

Spotlight on Messaging. Evaluator s Guide

Quest One Privileged Account Appliance

6.0. Planning for Capacity in Virtual Environments Reference Guide

Key Methods for Managing Complex Database Environments

6.7. Quick Start Guide

Foglight Managing SQL Server Database Systems Getting Started Guide. for SQL Server

Six Steps to Achieving Data Access Governance. Written By Quest Software

How Password Lifecycle Management Can Save Money and Improve Security

Web Portal Installation Guide 5.0

2009 Quest Software, Inc. ALL RIGHTS RESERVED. Trademarks. Disclaimer

Foglight. Foglight for Virtualization, Enterprise Edition 7.2. Virtual Appliance Installation and Setup Guide

Foglight Managing SQL Server Database Systems Getting Started Guide. for SQL Server

Foglight. Dashboard Support Guide

6.5. Web Interface. User Guide

How to Use Custom Site Templates and Definitions supporting Corporate look-and-feel

Foglight for Oracle. Managing Oracle Database Systems Getting Started Guide

formerly Help Desk Authority Quest Free Network Tools User Manual

Foglight. Foglight for Virtualization, Free Edition Installation and Configuration Guide

Defender 5.7. Remote Access User Guide

An Innovative Approach to SOAP Monitoring. Written By Quest Software

The Active Directory Recycle Bin: The End of Third-Party Recovery Tools?

DATA GOVERNANCE EDITION

Enterprise Single Sign-On Getting Started with SSOWatch

Quick Connect for Cloud Services

Foglight Cartridge for Active Directory Installation Guide

SharePoint Nine Key Features

The Active Directory Management and Security You ve Always Dreamed Of

The Case for Quest One Identity Manager

Dell Spotlight on Active Directory Server Health Wizard Configuration Guide

ActiveRoles 6.9. Quick Start Guide

Moving to the Cloud : Best Practices for Migrating from Novell GroupWise to Microsoft Exchange Online Standard

Foglight. Managing Java EE Systems Supported Platforms and Servers Guide

Foglight Foglight Experience Viewer (FxV) Upgrade Field Guide

Spotlight Management Pack for SCOM

Top Seven Tips and Tricks for Group Policy in Windows 7

2010 Quest Software, Inc. ALL RIGHTS RESERVED. Trademarks. Third Party Contributions

Dell InTrust Preparing for Auditing Microsoft SQL Server

Quest Site Administrator 4.4

ChangeAuditor 5.6. For Windows File Servers Event Reference Guide

About Recovery Manager for Active

Quest SQL Optimizer 6.5. for SQL Server. Installation Guide

Foglight Managing Microsoft Active Directory Installation Guide

formerly Help Desk Authority HDAccess Administrator Guide

Dell Recovery Manager for Active Directory 8.6.3

ChangeAuditor 6.0 For Windows File Servers. Event Reference Guide

System Requirements and Platform Support Guide

Using Self Certified SSL Certificates. Paul Fisher. Quest Software. Systems Consultant. Desktop Virtualisation Group

Dell Recovery Manager for Active Directory 8.6. Quick Start Guide

ActiveRoles 6.8. Web Interface User Guide

8.0. Forest Edition. Deployment Guide

formerly Help Desk Authority Upgrade Guide

Dell Enterprise Reporter 2.5. Configuration Manager User Guide

6.7. Replication: Best Practices and Troubleshooting

Introduction to Version Control in

Quest One Password Manager

Quest Application Performance Monitoring Implementation Methodology

ChangeAuditor 6.0. Web Client User Guide

Image-Based Data Protection: Simply Better Data Protection

Five Tips for Effective Backup and Recovery in Virtual Environments

Desktop to Cloud. Browser Migration in the Enterprise. Written By Quest Software, Inc.

Dell Unified Communications Command Suite - Diagnostics 8.0. Data Recorder User Guide

Quest Privilege Manager Console Installation and Configuration Guide

Transcription:

8.6 Migrating to Exchange 2010

2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement. This software may be used or copied only in accordance with the terms of the applicable agreement. No part of this guide may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording for any purpose other than the purchaser s personal use without the written permission of Quest Software, Inc. The information in this document is provided in connection with Quest products. No license, express or implied, by estoppel or otherwise, to any intellectual property right is granted by this document or in connection with the sale of Quest products. EXCEPT AS SET FORTH IN QUEST'S TERMS AND CONDITIONS AS SPECIFIED IN THE LICENSE AGREEMENT FOR THIS PRODUCT, QUEST ASSUMES NO LIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS, IMPLIED OR STATUTORY WARRANTY RELATING TO ITS PRODUCTS INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT. IN NO EVENT SHALL QUEST BE LIABLE FOR ANY DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL DAMAGES (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION OR LOSS OF INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN IF QUEST HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Quest makes no representations or warranties with respect to the accuracy or completeness of the contents of this document and reserves the right to make changes to specifications and product descriptions at any time without notice. Quest does not make any commitment to update the information contained in this document. If you have any questions regarding your potential use of this material, contact: Quest Software World Headquarters LEGAL Dept 5 Polaris Way Aliso Viejo, CA 92656 e-mail: info@quest.com Refer to our Web site (www.quest.com) for regional and international office information. TRADEMARKS AccessManager, Active Administrator, ActiveDL, ActiveGroups, ActiveRoles, AKONIX, Benchmark Factory, Big Brother, BOX & WAVE Design, BridgeAccess, BridgeAutoEscalate, BridgeSearch, BridgeTrak, ChangeAuditor, ChangeManager, CI Discovery, DataFactory, Defender, Deploy the Whole Desktop, Desktop Authority, Directory Analyzer, DirectoryExpert, DS Analyzer, DS Expert, Embargo, Enterprise Security Explorer, Enterprise Security Reporter, File System Auditor, Foglight, GPOAdmin, Help Desk Authority, InstantAssist, IntelliProfile, InTrust, itoken, J.CLASS and Design, JClass, Jint, JProbe, Kemma Software, Knowledge Xpert and Design, LiteSpeed, LiveReorg, LogAdmin, MessageStats, Move Mailbox Manager, MultSess, NBSpool, NetBase, NETPRO, PASSGO, PassGo Technologies (and design), Password Reset Manager, Patch Authority, PerformaSure, POINT, CLICK, DONE!, PowerGUI, Privilege Authority, Q.DESIGNER and Design, Quest, Quest Central, Quest Software, Quest Software and Design, Quest Software logo, ReportAdmin, RestoreAdmin, SCRIPTLOGIC, SCRIPTLOGIC (and Design), Secure Copy, Security Explorer, Security Lifecycle Map, SelfServiceAdmin, SharePlex, Spotlight, SQL Navigator, SQL TURBO, SQL TURBO and Design, SQL Watch, SQLAB, STAT, StealthCollect, T.O.A.D, Tag and Follow, TOAD, TOAD WORLD, vautomator, vconverter, vecoshell, VESI, vfoglight, VINTELA, VIZIONCORE, Vizioncore Automation Suite, Vizioncore vessentials, vmigrator, vranger, vspotlight, vtoad, WebDefender, Webthority, XRT are trademarks and registered trademarks of Quest Software, Inc in the United States of America and other countries. For a complete list of Quest Software s trademarks, please see http://www.quest.com/legal/trademark-information.aspx. Other trademarks and registered trademarks are property of their respective owners. Migration Manager Updated May 7, 2010 Software version 8.6

CONTENTS About This Guide... 3 Overview... 3 Conventions... 3 Introduction... 4 Security Configuration... 5 Access to Exchange 2010 Mailboxes... 5 Running Cmdlets to Move Mailboxes... 6 Making Public Folders Mail-Enabled... 7 Using the Exchange Processing Wizard... 7 Processing Mailboxes and Public Folders... 7 Processing Mailbox and Public Folder Contents... 8 Before You Begin... 9 Create Migration Administrator Mailboxes... 9 Install the Microsoft Exchange Server Messaging API... 9 Disable RPC Encryption on Exchange Servers... 10 Avoid Incompatible Mailboxes... 10 Migration Steps... 11 Register Target Exchange 2010 Organization... 11 Public Folder and Free/Busy Synchronization... 12 Mailbox Migration and Calendar Synchronization... 12 About Quest Software, Inc.... 13 Contacting Quest Software... 13 Contacting Quest Support... 13 Third Party Contributions... 14 Boost 1.0 License Agreement... 14 Loki 0.1.4 License Agreement... 14 Loki 0.1.6 License Agreement... 15 ZLib 1.1.4 License Agreement... 15 i

Migrating to Exchange 2010 About This Guide Overview This document has been prepared to assist you in becoming familiar with Quest Migration Manager. This guide contains the information required for migration to an Exchange 2010 environment using Migration Manager. It is intended for network administrators, consultants, analysts, and any other IT professionals using the product. Conventions In order to help you get the most out of this guide, we have used specific formatting conventions. These conventions apply to procedures, icons, keystrokes and crossreferences. ELEMENT Select Bolded text Italic text Bold Italic text Blue text CONVENTION This word refers to actions such as choosing or highlighting various interface elements, such as files and radio buttons. Interface elements that appear in Quest products, such as menus and commands. Used for comments. Introduces a series of procedures. Indicates a cross-reference. When viewed in Adobe Acrobat, this format can be used as a hyperlink. Used to highlight additional information pertinent to the process being described. Used to provide Best Practice information. A best practice details the recommended course of action for the best result. Used to highlight processes that should be performed with care. + A plus sign between two keystrokes means that you must press them at the same time. A pipe sign between elements means that you must select the elements in that particular sequence. 3

Migration Manager 8.6 Introduction This is a companion document for the Migration Manager for Exchange User Guide. It does not supplant or duplicate the User Guide, but contains information that applies specifically to projects involving migration to Exchange 2010. The procedures described here are required for successful migration to an Exchange 2010 environment. For details related to all supported Exchange versions, refer to the general documentation. 4

Migrating to Exchange 2010 Security Configuration This section contains information about the rights and permissions necessary to perform mailbox migration to the target Exchange Server 2010 organization. First of all, refer to the Quest Migration Manager System Requirements and Access Rights document to make sure that your environment meets all the requirements to perform the migration process. Before you migrate mailboxes to Exchange Server 2010, ensure that the Exchange account (the account used for Exchange migration) has sufficient privileges to do the following: Access every mailbox within the Exchange 2010 organization Run the cmdlets performing Move mailbox operations Run the Enable-MailPublicFolder cmdlet to make public folders mail-enabled Access to Exchange 2010 Mailboxes For every mailbox database and its associated public folder database that is involved in migration, take the following steps: 1. In the ADSIEdit snap-in, open the Active Directory configuration partition and browse to CN=<DatabaseName>,CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=<ExchangeOrganizationName>,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=<...>,DC=<...> 2. Add the Exchange account to the CN=<DatabaseName> object and give it the Receive as permission. 3. Click Advanced and make sure that the permissions are set to This object and all child (descendant) objects. 4. In the ADSIEdit snap-in, browse to CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=<ExchangeOrganizationName>,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=< >,DC=< > 5. Add the Exchange account to the CN=Databases object and give it the Full Control permission. 5

Migration Manager 8.6 6. Click Advanced and make sure that the permissions are set to This object and all child (descendant) objects. 7. Wait 2 hours, or restart the Information Store service twice on every target Exchange 2010 server that is involved in the migration and hosts the Mailbox role. The interval between restarts does not matter. After that, your Exchange account will have access to every Exchange 2010 mailbox in every mailbox database in your organization. You can grant the same permissions by running the following cmdlet in Exchange Management Shell: Add-ADPermission -Identity "CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=<your_org_name>,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=<your_domain>" -User <user_name> -AccessRights GenericAll -ExtendedRights Send-As,Receive-As In some cases, the inherited Receive as permission may not work. If the Exchange account is granted the Read and Receive as permissions on the CN=Databases object and these permissions are set to This object and all child (descendant) objects, the Exchange account may not have full access to all mailboxes in the organization. To resolve this problem, you should explicitly set the Receive-as permission in the properties of Mailbox Database. Running Cmdlets to Move Mailboxes To perform Move mailbox operations, your Exchange account needs to be assigned permissions to run the following cmdlets: New-MoveRequest Get-MoveRequest Remove-MoveRequest Get-MoveRequestStatistics To assign these permissions, add this account to the Recipient Management role group in the target Exchange 2010 organization, as follows: 1. Open the Active Directory Users and Computers MMC snap-in. 2. Select the Microsoft Exchange Security Groups node. 3. In the right pane, open the properties of the Recipient Management group. 4. On the Members tab, add the account. 6

Migrating to Exchange 2010 Making Public Folders Mail-Enabled If a public folder is mail-enabled in the source organization, the Public Folder Target Agent needs to be able to make it mail-enabled in the target organization as well. To achieve this, assign your Exchange account permissions to run the Enable- MailPublicFolder cmdlet, as follows: 1. Add this account to the Public Folder Management role group in the target Exchange 2010 organization. 2. Give the account the Full Control permission on the CN=<ExchangeOrganizationName>,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=<...>,DC=<...> container. Using the Exchange Processing Wizard This section is relevant only for scenarios where Exchange migration is part of Active Directory migration. Processing Mailboxes and Public Folders OPERATION RIGHTS AND PERMISSIONS WHERE SPECIFIED Access to mailboxes and public folders Exchange impersonation (step 1) The account should be a member of the Domain Admins or Enterprise Admins group. Alternatively, if you want to avoid granting such broad privileges, make the account a member of the Organization Management and Public Folder Management roles. The ApplicationImpersonation role enables the Exchange processing user account to impersonate other users. To assign the roles to the account (<User>), run the following commands in the Exchange Management Shell: Add-RoleGroupMember "Organization Management" -Member <User> Add-RoleGroupMember "Public Folder Management" -Member <User> To enable the account (<User>) to impersonate all users in an organization, run the following in the Exchange Management Shell: New-ManagementRoleAssignment Name <AssignmentName> -Role ApplicationImpersonation User <User> See http://msdn.microsoft.com/enus/library/bb204095.aspx for more details related to enabling Exchange impersonation, such as limiting the scope of users. 7

Migration Manager 8.6 OPERATION RIGHTS AND PERMISSIONS WHERE SPECIFIED Exchange impersonation (step 2) In addition to enabling Exchange impersonation for an account, give it the necessary access privileges by granting the ms-exch- EPI-May-Impersonate extended right. To give the account (<User>) the right to impersonate all users on all Client Access Servers, run the following in the Exchange Management Shell: Set-ExchangeServer where {$_.IsClientAccessServer -eq $TRUE} ForEach-Object {Add- ADPermission -Identity $_.distinguishedname -User (Get- User -Identity <User> selectobject).identity -extendedright ms-exch-epi-impersonation} To give the account (<User>) permission to impersonate all accounts on an all MailboxDatabases, run the following in the Exchange Management Shell: Set-MailboxDatabase ForEach- Object {Add-ADPermission -Identity $_.DistinguishedName -User <User> -ExtendedRights ms-exch-epi- Impersonate} See http://msdn.microsoft.com/enus/library/bb204095%28exchg.80%29.aspx for more details related to granting Exchange impersonation rights, such as narrowing the scope of accounts, servers and databases. Processing Mailbox and Public Folder Contents OPERATION RIGHTS AND PERMISSIONS WHERE SPECIFIED Message sending Message processing in other users' mailboxes Send As extended right. Full mailbox access rights. Run the following in the Exchange Management Shell: Add-ADPermission "Mailbox" -User <User> -Extendedrights "Send As" Run the following in the Exchange Management Shell: Add-MailboxPermission "Mailbox" - User <User> -AccessRights FullAccess 8

Migrating to Exchange 2010 Before You Begin This section includes the steps you need to take to prepare for migration to an Exchange 2010 organization. The Migration Manager console shows only those servers from the target Exchange 2010 organization that host the Mailbox role. Create Migration Administrator Mailboxes Migration administrator mailboxes are required for mailbox, calendar, public folder and free/busy synchronization. The Migration Manager agents will access the migrated mailboxes and public folders through an administrator mailbox that you specify. The System Attendant mailbox, which Migration Manager uses for migration to Exchange versions up to 2007, was deprecated in Exchange 2010. This means that you should create the administrator mailbox manually for every Exchange Server 2010 and specify this mailbox in the Exchange Server properties in the Migration Manager console. Synchronization of mailboxes that are hosted on Exchange 2010 servers uses the specialized Exchange Attendant component of the Migration Manager suite. During installation of shared components, Exchange Attendant is registered as a service that starts automatically. Install the Microsoft Exchange Server Messaging API Migration Manager also requires Microsoft Exchange Server Messaging API client and the latest version of Microsoft Exchange Server MAPI Client and Collaboration Data Objects 1.2.1 to be installed on the computers where Migration Manager agents will run. Since the MAPI CDO setup package is not available for distribution, you should download it from the Microsoft Web site. For the download link, please see Microsoft Knowledge Base article 171440. After installing the API, restart the computer. 9

Migration Manager 8.6 Disable RPC Encryption on Exchange Servers The EncryptionRequired parameter specifies whether connections to the Exchange 2010 are required to be encrypted. The Exchange RPC Client Access service rejects unencrypted connections if this parameter is set to $true. During the migration, agents that are installed on source Exchange Server 2003 require connection to Exchange 2010 to perform some operations. Migration Manager agents create unencrypted connections, so you need to remove the RPC encryption requirement to log on to the target Exchange Server 2010. To disable the RPC encryption requirement, use the Exchange Management Shell to run the following command on all Exchange 2010 servers with mailbox databases and public folder databases that are associated with mailbox databases as well as on all Exchange 2010 servers with the Client Access Server (CAS) role installed: Set-RpcClientAccess Server <Exchange 2010 Server Name> EncryptionRequired $false Avoid Incompatible Mailboxes Exchange 2010 may create unrequested empty mailboxes for mailbox-enabled users that have no mailboxes. This behavior was not present in previous Exchange versions. The resulting mailboxes are incompatible with Migration Manager and cannot be used by during Exchange migration. Instead of relying on Exchange to create mailboxes, you should delete such automatically created mailboxes and use mailbox creation settings in your migration project. Mailboxes created by Migration Manager are fully supported. However, new Exchange 2010 mailboxes should not be deleted indiscriminately, because valid target mailboxes might be deleted in the process. The ForbidDelMailbox2010 parameter has been introduced to facilitate cleanup. Previously, the ForbidDelMailbox parameter in the mail transfer agent's INI file was the only setting responsible for preserving or removing target mailboxes whose MailboxInfo parameter did not match the same parameter in the source mailbox. The ForbidDelMailbox parameter is a precaution against the deletion of mailboxes that are in actual use in the target environment. By default, it is set to 1 so that non-matched target mailboxes are not deleted. The additional ForbidDelMailbox2010 parameter affects only Exchange 2010 target mailboxes. This parameter can have one of the following values: 0 Delete the new mailbox, but only if it is empty. 1 Let the ForbidDelMailbox parameter define what to do with the new mailbox, but only if the mailbox is empty. Otherwise, do not delete the mailbox. The ForbidDelMailbox2010 parameter is not included in the mail transfer agent's INI file by default, and its value is assumed to be 0. 10

Migrating to Exchange 2010 Migration Steps Currently, Exchange 2010 is supported only as the migration destination, not the source. In this release, the implementation of Exchange Server 2010 support uses the same product architecture as for migration to previous versions of Exchange Server. The main difference in migration to an Exchange 2010 organization is support for the database availability group (DAG) feature implemented in Exchange Server 2010. A database availability group is the base component of the high availability and site resilience framework built into Microsoft Exchange Server 2010. A DAG is a group of up to 16 Mailbox servers that host a set of databases and provide automatic database-level recovery from failures that affect individual servers or databases. Migration Manager for Exchange Console and migration agents detect automatically if there are mailbox databases with copies on other Exchange servers included in a DAG. Procedures such as job creation, administrator mailbox selection for all types of synchronization, and copying of mailbox content to the target mailbox database depend on the Exchange 2010 server (included in DAG) where the mailbox database is mounted. In an Exchange 2010 organization, the same set of recipients is displayed in the Migration Manager console for all active and passive database copies. This chapter does not present the migration steps in a sequence. Instead, it contains Exchange 2010-specific additions to the Migration Manager for Exchange User Guide. Register Target Exchange 2010 Organization This section complements the Registering Source and Target Organizations section in the Migration Manager for Exchange User Guide. If the target Exchange 2010 organization is added to the Migration Manager console, you can view all database copies for every Exchange Server 2010 in the tree-view irrespective of whether this server hosts an active or passive copy of the mailbox database. You can see the status (active or passive) for each copy. After you register the organization, add migration administrator mailboxes for mailbox, calendar, public folder and free/busy synchronization. Then set these mailboxes as the Migration Administrator Mailboxes in the properties of the corresponding Exchange servers or in the properties of mailbox databases. 11

Migration Manager 8.6 Public Folder and Free/Busy Synchronization This section complements the Public Folder Synchronization and Free/Busy Synchronization sections in the Migration Manager for Exchange User Guide. If you create a public folder or free/busy synchronization job, specify the administrator mailbox for the Exchange Server 2010. As an administrator mailbox you should specify the mailbox that is hosted on any mailbox database which has a copy on the target Exchange Server 2010. This mailbox database must be associated with the public folder database hosted on the target Exchange Server 2010. During public folder migration, if there are identically named folders in the source and target Exchange environment, then a pair of folders with the same name will appear in the target environment. Such folders are not duplicates and should not be deleted. If you encounter identically named folders after migration, consider merging them. Mailbox Migration and Calendar Synchronization This section complements the Mailbox Migration and Calendar Synchronization sections in the Migration Manager for Exchange User Guide. When you create the mailbox or calendar synchronization job with the target Exchange 2010 server specified, you can select only mailbox database that has an active copy on this Exchange 2010 server. The information about active database copies is stored in the Migration Manager console and updated during every manual refresh of the Exchange 2010 server. If the collection is created within the Mailbox or Calendar Synchronization job with certain Mailbox Database, other collections with this Mailbox Database can be created only within this job even if the active copy of this database moves to another Exchange server after creation of the first collection. By default, Mailbox Synchronization agents process mailboxes from the target Mailbox Database only if the active copy of this database is located on the target Exchange 2010 server. If the active copy of the Mailbox Database is moved to another Exchange 2010 server from the database availability group, agents stop processing mailboxes on the target server. To disable this default behavior, do either of the following: In the Migration Manager console, open the properties of the server, go to the Mail Target Agent General node, and enable the Process mailbox databases after their switchover to another server option. Specify the ProcessMailboxDBAfterSwitchover=1 parameter in the Config.ini file of the corresponding agent. After a mailbox move operation or the creation of a new Exchange 2010 mailbox during the migration process, the mailbox does not immediately become available for login. The Mail Target Agent will record login errors until the mailbox is ready (this can take up to 20 minutes). In these situations, login errors can be safely ignored. If a mailbox move request completes with an error, delete this request before the agent creates a new one. During mailbox migration, if there are identically named folders in the source mailbox and target mailbox, then a pair of folders with the same name will appear in the target mailboxes. Such folders are not duplicates and should not be deleted. If you encounter identically named folders after migration, consider merging them. 12

Migrating to Exchange 2010 About Quest Software, Inc. Now more than ever, organizations need to work smart and improve efficiency. Quest Software creates and supports smart systems management products helping our customers solve everyday IT challenges faster and easier. Visit www.quest.com for more information. Contacting Quest Software Phone 949.754.8000 (United States and Canada) Email info@quest.com Mail Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656 USA Web site www.quest.com Please refer to our Web site for regional and international office information. Contacting Quest Support Quest Support is available to customers who have a trial version of a Quest product or who have purchased a Quest product and have a valid maintenance contract. Quest Support provides unlimited 24x7 access to SupportLink, our self-service portal. Visit SupportLink at http://support.quest.com/ From SupportLink, you can do the following: Retrieve thousands of solutions from our online Knowledgebase Download the latest releases and service packs Create, update and review Support cases View the Global Support Guide for a detailed explanation of support programs, online services, contact information, and policy and procedures. The guide is available at: http://support.quest.com. 13

Migration Manager 8.6 Third Party Contributions Quest Migration Manager, version 8.6 contains some third party components (listed below). Copies of their licenses may be found at http://www.quest.com/legal/third-party-licenses.aspx. COMPONENT LICENSE OR ACKNOWLEDGEMENT Boost 1.34.1 Boost 1.0 Loki 0.1.4 Loki 0.1.6 TinyXml 2.2.1 ZLib 1.1.4 MIT MIT This product contains portions of the PAWN scripting software (formerly known as SMALL). Copyright (C) 1995-2005 Jean-loup Gailly and Mark Adler Boost 1.0 License Agreement Boost Software License - Version 1.0 - August 17th, 2003 Permission is hereby granted, free of charge, to any person or organization obtaining a copy of the software and accompanying documentation covered by this license (the "Software") to use, reproduce, display, distribute, execute, and transmit the Software, and to prepare derivative works of the Software, and to permit third-parties to whom the Software is furnished to do so, all subject to the following: The copyright notices in the Software and this entire statement, including the above license grant, this restriction and the following disclaimer, must be included in all copies of the Software, in whole or in part, and all derivative works of the Software, unless such copies or derivative works are solely in the form of machineexecutable object code generated by a source language processor. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR ANYONE DISTRIBUTING THE SOFTWARE BE LIABLE FOR ANY DAMAGES OR OTHER LIABILITY, WHETHER IN CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE Loki 0.1.4 License Agreement Copyright (c) Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. 14

Migrating to Exchange 2010 Loki 0.1.6 License Agreement Copyright (c) Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. ZLib 1.1.4 License Agreement /* zlib.h interface of the 'zlib' general purpose compression library version 1.2.3, July 18th, 2005 Copyright (C) 1995-2005 Jean-loup Gailly and Mark Adler This software is provided 'as-is', without any express or implied warranty. In no event will the authors be held liable for any damages arising from the use of this software. Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions: 1. The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation would be appreciated but is not required. 2. Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software. 3. This notice may not be removed or altered from any source distribution. Jean-loup Gailly jloup@gzip.org Mark Adler madler@alumni.caltech.edu 15