Free Essay

Mail System Outline

In:

Submitted By robbycollazo2
Words 824
Pages 4
Mail System Outline

Author’s Note This Outline is being submitted on August 12th, 2013, for N234/CET2810C Section 01 Microsoft Exchange Server course.

Mail System Outline When designing a Microsoft Exchange mailing system you will need to gather information about your environment. You will need to see if the installation is going to be a migration or if you’re walking in to a fresh setup. With a fresh installation you will have a lot of things to consider such as the customer requirements: * Mailbox profile requirements * Geographic location * Server and data protection
You will also have to make assumptions based on all configurations. With the migration of an Exchange environment things become a little easier because some of the things you have to take into consideration during a fresh install are already done. You can just move the Exchange resources from one installation to the other such as: * Mailboxes * Public folders * Connectors
But you will need to determine the specific needs for the migration and you will need to Archive non-essential data before you migrate to reduce cost and shorten your timeline. Also there are plenty of tools to assist in Exchange migration to where it becomes a simple task. So if you ask me if you should go with a fresh install vs. migration if they already have Exchange in place my choice is Migration. Storage is also a big factor when setting up an exchange Server environment. There are a lot of architectural factors the play in to the storage design of your exchange server, the most important factors are: * Mailbox count * Mailbox currency * Mailbox size * Mailbox user profile * E-mail client types * E-mail client extensions * Server applications
When going over these specific requirements, this will allow you to base your design on the company’s growth and current state of storage usage. When setting up security for your exchange server there are a few options you have. * Relay restrictions * Virus Protection * RCP over HTTP
Relay restrictions keep spammers from having a field day with my server. If relay restrictions are not implemented it means that anyone not just spammers can relay mail through your server. When it comes to virus protection for Exchange you have to purchase virus protection that is made especially for Exchange Server. The reason is because email viruses do not exist on Exchange Server in the form of a stand-alone file, instead they are stored in the Exchange mailbox with messages, there for you need a virus protection that is designed to read the Exchange database. RPC over HTTP it’s kind of like VPN but not, a RPC over HTTP connection is limits the scope of what resources can be accessed remotely. One more security measure is simple you’ll just have to run security and system updates regularly. When setting up and managing your mailing list you should more than likely go with the default address list this is called the Global Address List (GAL). Because it will automatically populate with new users, contacts, groups, or rooms as they are added to your Organizational Unit (OU). Setting up a solid back up strategy for Exchange Server is crucial regardless of system architecture and setup, there is no running from the question; if something happens; what is it exactly that you want to back up? You would have to have a plan set in place to make sure that if something where to happen that you would be backing up what is needed and not wanted. Your list will need to include the following: * Exchange database files (mailboxes, public folders) * Exchange transaction logs * Message tracking logs * Protocol logs
Beyond using third party backup solutions to replicate everything you could also go virtual and back up everything in a snapshot this will protect even if you had total server failure.

References Simpson, R. (2011, January 21). Exchange 2010 Tested Solutions: 500 Mailboxes in a Single Site Running Hyper-V on Dell Servers. Retrieved August 5, 2013, from technet.microsoft.com/en-us/library/gg436085(v=exchg.141).aspx
TechNet (2013, June 11). Migrate Public Folders to Exchange 2013 From Previous Versions: Exchange 2013 Help. Retrieved August 5, 2013, from technet.microsoft.com/en-us/library/jj150486(v=exchg.150).aspx
TechNet (2012, July 23). Mailbox Storage Design Process: Exchange 2010 Help. Retrieved August 5, 2013, from http://technet.microsoft.com/en-us/library/ff367907(v=exchg.141).aspx
Posey, B. (2006, September 27). 5 Exchange Server security tips - TechRepublic. Retrieved August 5, 2013, from http://www.techrepublic.com/article/5-exchange-server-security-tips/
TechNet (2013, March 18). Address Lists: Exchange Online Help. Retrieved August 5, 2013, from http://technet.microsoft.com/en-us/library/bb232119(v=exchg.150).aspx#DALists
Mah, P. (2011, December 16). 4 Steps to Developing a Solid Backup Strategy for Exchange. Retrieved August 5, 2013, from http://www.gfi.com/blog/4-steps-to-developing-a-solid-backup-strategy-for-exchange/

Similar Documents

Premium Essay

Cis1101 Review Questions and Case Study Questions Cis 1101 Review Questions and Case Study Questions

...CIS1101 REVIEW QUESTIONS AND CASE STUDY QUESTIONS Click below link for Answer http://workbank247.com/q/cis1101-review-questions-and-case-study-cis-1101-r/23695 http://workbank247.com/q/cis1101-review-questions-and-case-study-cis-1101-r/23695 MODULE 1 CHAPTER 1 REVIEW QUESTIONS 1. Briefly describe the technologies that led businesses into the second wave of electronic commerce. 3. Briefly describe the specific activities that a computer assembly operation might include in B2B electronic commerce for its supply management or procurement operations. 5. Many business analysts have discussed the concept of the first-mover advantage. What are some of the disadvantages of being a first mover? CASE STUDY C1 CRITICAL THINKING QUESTIONS 1. Toys“R”Us sales exceeded $300 million by 2004 on the Amazon.com site. Explain how Amazon, Toys“R”Us, and other toy sellers who participated in Amazon’s Marketplace retailer program benefitted from the network effect as a result of the relationship between Amazon and Toys“R”Us. 2. In 2004, Toys“R”Us sued Amazon.com for violating terms of the agreement between the companies; specifically, Toys“R”Us objected to Amazon.com’s permitting Amazon Market-place retailers to sell toys. (Note: When the lawsuit was filed, Amazon Marketplace was called “zShops.”) Amazon.com responded by filing a countersuit. After more than two years of litigation, a New Jersey Superior Court judge ruled that the agreement had been violated...

Words: 2988 - Pages: 12

Premium Essay

The Execution of the Second World War

...Mejias FRIST NAME: Jesus SECTION: Q1. Smart-Toys-Smart Kids CEO (Part 1) “Smart-Toys-Smart Kids” is a toy manufacturing company. They are providing toys to retail stores in the region. The company has 500 employees. The CEO of the company Fred is looking for alternatives to streamline B2B transactions between his employees and the retail stores. Fred's information systems department has presented him with two alternatives for developing the new tools for better customer service with the retail stores. The first alternative will have a special software tool developed in C++ program (application software) that clients ( 500 employees) will download onto their computers to run. The tool will communicate with the server to select data to analyze. The second alternative will have the C++ program running on the server in the headquarters; the client (500 employees) will use his or her browser to interact with the server. Part of the program in the user computer and other parts are in the Server side. a) Classify the two alternatives in terms of what type of application architecture they use. b) Outline the pros and cons of the two alternatives c) Make a recommendation to Fred about which is better. ANSWER a) Classification Alternative 1 : | Alternative 2 : | Client-Server Architecture | Client-Based Architecture | b) Alternative 1 | Alternative 2 | Pros | Cons | Pros | Cons | If these servers are implemented correctly the organizational...

Words: 742 - Pages: 3

Premium Essay

Itn 100

... LAST NAME F NAME Chapter 2 Mini-Cases Q1. Deals-R-Us Brokers (Part 1) Fred's information systems department has presented him with two alternatives for developing the new tools. The first alternative will have a special tool developed in C++ that clients will download onto their computers to run. The tool will communicate with the DRUB server to select data to analyze. The second alternative will have the C++ program running on the server; the client will use his or her browser to interact with the server. a) Classify the two alternatives in terms of what type of application architecture they use. b) Outline the pros and cons of the two alternatives c) Make a recommendation to Fred about which is better. ANSWER a) Classification Alternative 1 : | Alternative 2 : | | | b) Alternative 1 | Alternative 2 | Pros | Cons | Pros | Cons | | | | | d) RECOMMENDATION Q2 Deals-R-Us Brokers (Part 2) Dears-R-Us Brokers has decided to install a new e-mail package. One vendor is offering an SMTP-based two-tier client server architecture. The second vendor is offering a Web-based e-mail architecture. Fred doesn't understand either one, but thinks the Web-based one should be better because, in his words "the Web is the future." a) Briefly explain to Fred, in layman's terms, the differences between the two. b) Outline the pros and cons of the two alternatives c) Make a recommendation to Fred about which is better. ...

Words: 361 - Pages: 2

Premium Essay

Netiquette

...Week Four- Netiquette Article Response Technology has evolved at lighting speed in the last 20 years. Companies have moved past sending manila interoffice mail envelopes to using company designed electronic mail systems to communicate with its employees. Additionally, the invention of smart phones allow us to have the internet at our fingertips. More and more universities offer online classes for distance learners. In the healthcare industry, many hospitals are using paperless charting systems to chart on patient records and doctor offices are also using paperless patient record systems as well. Also, many companies have developed their own intranet pages for employee use within their organizations. Since companies are capitalizing on the technological advancements, they also must be educated on the proper way to use these tools effectively. Netiquette is the term used describe the proper and polite way to behave while using an electronic device or engaging in communication or activities online (Brusco, 2011). Netiquette outlines rules that help people who use the internet and other technology, such as electronic mail delivery systems. Netiquette is not only confined to using emails. Netiquette also carries over into how we use our cell phones in public as well. Some of the ways suggested are being mindful of businesses that discourage cell phone usage while providing a service and monitoring the volume during phone calls (Brusco, 2011). The articles this week reflect...

Words: 511 - Pages: 3

Premium Essay

Security Policy Outline

...Richman Investments – Multi-layered Security Solutions Outline In today’s technological landscape, securing information is a high priority. There are many ways that a company’s assets can be compromised. In order to maintain a high level of confidence in the safety of information, actions to secure each domain in the network structure shall be implemented and observed. The following outline shows the strategies taken to mitigate risks, threats and vulnerabilities. This outline is subject to change at any time if the situation arises that new risks and threats are revealed. This outline will be subjected to monthly auditing to ensure the highest level of security. The layers of security that will be covered are as follows: 1. User Domain 2. Workstation Domain 3. LAN (Local Area Network) Domain 4. LAN-to-WAN (Wide Area Network) Domain 5. WAN Domain (Internet and Connectivity) 6. Remote Access Domain 7. System/Application Domain 1. User Domain a) Conduct security training for new associates and vendors who are being allowed onto the network. b) Develop an Acceptable Use Policy (AUP) c) Auditing of user activities on company assets 2. Workstation Domain a) Disable peripheral devices such as USB’s and CD’s from being used at workstations b) Enable password protection. Require passwords to meet complexity standards. c) Enable automatic antivirus scans d) Enable content filtering 3. LAN Domain a) Ensure wiring...

Words: 585 - Pages: 3

Free Essay

What Is a Rfp

...How to Write an RFP for e-Learning Services Including a Customizable RFP Template What is an RFP? How can you narrow the list of possibilities before contracting for services? How can you ensure that your organization’s business needs will be met? One solution is to write and distribute a Request for Proposal (RFP) in the marketplace. An RFP is a document produced by a company seeking goods and/or services and distributed to prospective vendors. Vendors then provide proposals based on the criteria specified within the RFP. A well-written RFP will outline specific information about your organization, the services and products you need, and the specific requirements suppliers must meet in order to win your business. It forces your to identify your business and technical requirements. It also forces the vendor to state in writing to what extent they can meet your requirements. A written RFP increases market awareness of your organization’s needs, thereby increasing the competition to serve those needs and increasing the formality of the relationship between you and the supplier. In short, an RFP places you—the buyer—in control of the desired service levels and related requirements and lets potential vendors know up front that your most important concern is the level of customer service you will receive. Reasons to Write a Formal Request for Proposal • To increase competition for your organization’s money, which will increase the options and potentially could drive down...

Words: 4470 - Pages: 18

Premium Essay

Internet and Email Aups

...E-mail Acceptable Use Policy Purpose E-mail is a critical mechanism for business communications at Richman Investments. However, use of Richman Investments’ electronic mail systems and services are a privilege, not a right, and therefore must be used with respect and in accordance with the goals of Richman Investments. The objectives of this policy are to outline appropriate and inappropriate use of Richman Investments’ e-mail systems and services in order to minimize disruptions to services and activities, as well as comply with applicable policies and laws. Scope This policy applies to all e-mail systems and services owned by Richman Investments, all e-mail account users/holders at Richman Investments (both temporary and permanent), and all company e-mail records. Account Activation/Termination E-mail access at Richman Investments is controlled through individual accounts and passwords. Each user of Richman Investments’ e-mail system is required to read and sign a copy of this E-mail Acceptable Use Policy prior to receiving an e-mail access account and password. It is the responsibility of the employee to protect the confidentiality of their account and password information. All employees of Richman Investments will receive an e-mail account. E-mail accounts will be granted to third-party non-employees on a case-by-case basis. Possible non-employees that may be eligible for access include: • Contractors. • Employees. • Interns. Applications for these temporary...

Words: 1904 - Pages: 8

Premium Essay

Mr Pkim

...Moodle theme is not very appealing but Moodle Themes are freely and easily downloadable from moodle.org where user can upload any tailored CSS. Usability GUI is pleasant, font type is readible, clean , system colors are agreeable to the eye; "L" shape menu composed by left iconic bar and horizontal top tabs menu - tabs are worded with nouns and verbs that communicate clear functionality; iconic menu is not worded which may confuse the user to distitinguish top and left menu. GUI is polluted and busy with too many resource blocks/menus. The "L" shape menu composed by a horizontal top tab menu and a worded menu on the left side confuses the users with the other menu on top of the page. The color palette is pleasant to the eye. Font type is good and readable.Breadcrumbs are fairly comprehensive. The content areas in the LMS is generally visible and well divided. It is clear where a menu goes and where content goes. Two - a system home page (after login) and a course home Number of page. Fewer areas to confuse "Home Pages" the user. This section features primarily course list, community groups, annoucements, welcome screen and calendar - which is enough for students - but it's also it s customizable. System home page (after login) ; There are 3 home pages: System home page (after login), institution's course home page home page, list of courses home page and course home page. Confusing [it has 16 blocks, a header with links and image, a top horizontal tab menu in one...

Words: 1796 - Pages: 8

Premium Essay

Imd123

...FACULTY OF INFORMATION MANAGEMENT UNIVERSITI TEKNOLOGI MARA SCHEME OF WORK ( RANCANGAN KULIAH ) PROGRAMME IMD 123 COURSE Foundation of Records Management CREDIT HOUR 3 SEMESTER 2 SYNOPSIS: This subject outlines the purpose of records management and defines the key terminologies, theories and principles underpinning current records care. The course examines the importance of good records keeping in an organization be it of public or private sector. It also presents a rationale for developing an integrated records management program. It discusses the process involves in restructuring existing information and records and the outlines of key activities undertaken in a registry. OBJECTIVES: At the end of the course, students will be able:1. Define the terminologies and principles of records management. (C1) 2. Describe the file management process in an organization. (C2) 3. Explain the steps that may be taken to support and sustain an integrated records management program. (C2) COURSE EVALUATION: Course Work Assignment Group project Practical Test (Filing) Test Total course work Final Examination Total Marks Percentage 10 % 20 % 10 % 20 % 10% 20% 10% 20% 60% 40% 100% Recommended Texts Rusnah Johare, Dr. (2002). Records management handbook : A guide to records management in an agency. Shah Alam : Faculty of information Management. References Ann and Titlow (1992). Records management for information...

Words: 570 - Pages: 3

Free Essay

Karl Marx

...on Carleton Central Instructor: Office: Office hours: Telephone: e-mail: James Milner Loeb A629 Thursdays, 3-4pm and Fridays, 10-11am (or by appointment) (613) 520-2600 x2211 James.Milner@carleton.ca Please use your Carleton e-mail address or the e-mail function of cuLearn to send an email to the instructor or TA and always include the course code in the subject line. First class: Last class: 7 January 2016 7 April 2016 NOTE: No class meeting on 18 February 2016 due to Reading Week cuLearn: On-line components of this course will be managed through cuLearn. Please visit the cuLearn site at least once a week to receive the most current information pertaining to the scheduling of the course and required readings. Course objectives: International institutions have come to play an increasingly important role in global politics in the last century. Arguably the most prominent of these institutions is the United Nations (UN). Established in 1945 and in the immediate aftermath of the Second World War, the UN’s Charter set out the rights and obligations of Member States, and pledged to: “save succeeding generations from the scourges of war”; “reaffirm faith in fundamental human rights”; promote “respect for the obligations arising from treaties”; and “promote social progress and better standards of life in larger freedom”. A brief review of the state of the international system 70 years later, however, has led many to conclude that the UN is incapable...

Words: 3716 - Pages: 15

Free Essay

Wireless

...Network Security System Outline Requirements The University is based in Glasgow, and provides higher education services to its students and staff. It is located on a single campus called Campus A. Students and staff use the network services from hosts on various different user networks, as shown in Figure 1 . Due to an increasing number of security violations, a possible redesign of the network infrastructure is to be investigated. You have been hired as a consultant to propose security enhancements, and produce a report. The aim of the exercise is to present a possible solution to the problem at hand by creating a prototype of the new network security infrastructure. This new design should tackle the following components:  Provide best practice network egress and ingress filtering at the network perimeter.  Create a perimeter firewall, with an appropriate topology to provide the organisations services, including public web, and mail servers. The firewall should have a closed security stance, and provide public services in a secure way.  Provide secure access to all devices, from the security management subnet. Additionally, research should be carried out into increasingly common Advanced Persistent Threats (APT), and ways to defend against these using network defenses. This part of the coursework will be research only and be confined to a part of the Research Section. You will be required to analyze the new system requirements and...

Words: 607 - Pages: 3

Premium Essay

Business and Admin Level 2

...that this Assessment document has 13 pages and is made up of 9 Sections. Name: Section 1: Using the telephone This section will help you to evidence Learning Outcome 1: Understand how to make and receive telephone calls. |Learning objective |Place in Assessment | |1.1 Describe the different features of telephone systems and how to use them |Question 1 Page 1 | |1.2 Describe how to follow organisational procedures when making and receiving telephone |Question 2 Page 2 | |calls | | |1.3 Explain the purpose of giving a positive image of self and own organisation |Question 2 Page 2 | 1. Complete the table below with descriptions of at least two different features of a telephone system and how / when they would be used. [1.1] |Feature |How / when used | |1....

Words: 3287 - Pages: 14

Premium Essay

Business Admin

...that this Assessment document has 13 pages and is made up of 9 Sections. Name: Section 1: Using the telephone This section will help you to evidence Learning Outcome 1: Understand how to make and receive telephone calls. |Learning objective |Place in Assessment | |1.1 Describe the different features of telephone systems and how to use them |Question 1 Page 1 | |1.2 Describe how to follow organisational procedures when making and receiving telephone |Question 2 Page 2 | |calls | | |1.3 Explain the purpose of giving a positive image of self and own organisation |Question 2 Page 2 | 1. Complete the table below with descriptions of at least two different features of a telephone system and how / when they would be used. [1.1] |Feature |How / when used | |1. Call Transfer...

Words: 3774 - Pages: 16

Free Essay

Project Part 1,

...Project Part 1 : Multilayered Security Plan The safety and security of information owned by Richman Investments is extremely important and needs to monitored constantly. Through the following outline I hope to enhance the companies security, update systems and applications and ensure the integrity of the information stored on the network. The outlined areas will be monitored and reported monthly to senior management and will be updated as needed. The following outline will touch on each domain and will include security measures needed for those domains. 1.0 User Domain 2.1 Mobile storage disabled 2.2 Admittance to work area and computer with badge only. No visitors permitted 2.3 Multi-layered authentication with username/password and either token or biometrics 2.4 Training of new hires or quarterly training of current employees on security awareness 2.5 Security software with scanning capabilities to ensure no malware or virus intrusion is allowed. 2.0 Workstation 3.6 Hardware inventory taken quarterly to asses needs for new equipment or updates. 3.7 Software database examined to asses need for updates or antivirus renewal. 3.8 Different departments will be assessed groups in active directory to prevent authorization conflicts or confusion 3.9 Admittance to workstations will only be permitted with proper credentials, badge or token. 3.0 Lan 4.10 All cabinets and server rooms will be locked...

Words: 656 - Pages: 3

Premium Essay

Sales and Distribution Plan

...Sales and Distribution Plan Remember, the primary goal of the marketing plan is to get people to buy your products or services. The Sales and Distribution part of the marketing plan details how this is going to happen. Traditionally there are three parts to the Sales and Distribution section of the marketing plan, although all three parts may not apply to your business. 1) Outline the distribution methods to be used. How is your product or service going to get to the customer? For instance, will you distribute your product or service through a Web site, through the mail, through sales representatives, or through retail? What distribution channel is going to be used? In a direct distribution channel, the product or service goes directly from the manufacturer to the consumer. In a one stage distribution channel it goes from manufacturer to retailer to consumer. The traditional distribution channel is from manufacturer to wholesaler to retailer to consumer. Outline all the different companies, people and/or technologies that will be involved in the process of getting your product or service to your customer. What are the costs associated with distribution? What are the delivery terms? How will the distribution methods affect production time frames or delivery? (How long will it take to get your product or service to your customer?) If your business involves selling a product, you should also include information about inventory levels and packaging...

Words: 525 - Pages: 3