Interview Quesions
Interview Quesions
Interview Quesions
An object is the basic unit in Active Directory. It is a distinct named set of attributes that
represents something concrete, such as a user, printer, computer, or application. Attributes
are the characteristics of the object; for example, a computer is an object, and its
attributes include its name and location, among other things. A user is also an object. In
Exchange, a user’s attributes include the user’s first name, last name, and e-mail address.
User attributes also include Exchange-related features, such as whether the object can
receive e-mail, the formatting of e-mail it receives, and the location where it can receive
e-mail
Group Types
Windows 2003 Active Directory supports the following two group types:
You can change the group type from security to distribution, or vice versa,
if the domain functional level is set to Windows 2000 native or Windows
2003. Group types cannot be changed if the domain is running in Windows
2000 mixed mode.
Group Scopes
A group scope defines from which domain from which members can be
added and in which domain, tree, of forest, rights and permissions can be
assigned to a group. When you create a new group, it will be a security
group with global scope by default. You can modify the group scope if the
domain functional level is set to Windows 2000 native or Windows Server
2003. Changing a group scope in Windows 2000 mixed mode domains is
not possible.
Windows 2003 Active Directory supports the following three group scopes:
When you assign permissions to all the users in the Sales department,
for a shared resource, i.e. Printer1, you should create a domain local
group for the sales department, i.e. SalesPrinters, and assign it
permissions for Printer1. Then you should group the users into a global
group, i.e. Sales, and add the global group to the domain local group. A
universal group is particularly useful when the group needs to contain
members from multiple domains. Universal groups should be members
of domain local groups, and have global groups as their members.
http://www.jrksoftware.com/articles/70-292/managing-groups-in-
windows-2003.html
By using DNS, any computer on the Internet can look up the name of
any other computer in the Internet namespace. Computers running
Windows Server 2003 and Microsoft® Windows® 2000 also use DNS to
locate domain controllers and other servers running Active Directory.
Primary zone
Loads zone data directly from a file on a host. A primary zone may contain
a subzone, or child zone. It may also contain resource records such as
host, alias (CNAME), address (A), or reverse mapping pointer (PTR) records.
Subzone
A subzone defines a zone within the primary zone. Subzones allow you to
organize zone data into manageable pieces.
Child zone
A child zone defines a subzone and delegates responsibility for the
subzone data to one or more name servers.
Alias(CNAME)
An alias defines an alternate name for a primary domain name.
Host
A host object maps A and PTR records to a host. Additional resource
records may be associated with a host.
Secondaryzone
Loads zone data from a zone's primary server or another secondary server.
A secondary server maintains a complete copy of the zone for which it is a
secondary.
Note: Secondary zones are sometimes referred to as "slave zones" in other
BIND documentation.
Stubzone
A stub zone is similar to a secondary zone, but it only transfers the name
server (NS) records for that zone.
Forwardzone
A forward zone directs all queries for that particular zone to other servers
http://publib.boulder.ibm.com/infocenter/iseries/v5r3/index.jsp?topic
=/rzakk/rzakkconceptparent.htm
Ntfrsutl
See a snapshot view of the FRS internal state with this tool that ships
with Windows Servver 2003 and is available in
%systemroot%\system32. You must have an understanding of the
internal operation of FRS to effectively use this tool.
• FRSDiag
Use this tool to easily gather FRS related information from specific
servers and perform processing on the collected data to detect common
failure conditions.
Disaster Recovery
Restoring a subtree
Frequently, you may not want to restore the whole database because of
the replication impact this would have on your domain or forest. To
authoritatively restore a subtree within a forest, follow these steps:
1. Restart the domain controller.
2. When the Windows 2000 Startup menu is displayed, select Directory
Services Restore Mode, and then press ENTER.
3. Restore the data from backup media for an authoritative restore. To
do this, follow these steps:
a. In Directory Services Restore mode, click Start, point to Programs,
point to Accessories, point to System Tools, and then click Backup to
start the Windows 2000 Server Backup utility.
b. Click Restore Wizard, and then click Next.
c. Select the appropriate backup location, and then make sure that at
least the System disk and System State containers are selected.
d. Click Advanced, and then make sure that you restore junction
points. If you do not use the Advanced menu, the restore process will
not be successful.
e. In the Restore Files to list, click Original Location.
f. Click OK, and then complete the restore process. A visual progress
indicator is displayed.
g. When you are prompted to restart the computer, do not restart.
How to use the Install from Media feature to promote Windows Server
2003-based domain
DCPROMO /ADV
http://support.microsoft.com/?id=311078
=====================================
Intraforest Migration
Interforest Migration
The account you use to run ADMT must have enough permissions to
complete the required tasks. The account must have permission to
create computer accounts in the target domain and organizational
unit, and must be a member of the local Administrators group on each
computer to be migrated.
To install the password migration DLL:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\LSA\AllowPas
swordExport
http://www.petri.co.il/active_directory_migration_tool_usage_w2k_wi
ndows_2003.htm
DHCP Superscope
Nesting groups
Using nesting, you can add a group as a member of another group. You
nest groups to consolidate member accounts and reduce replication
traffic.
• Groups with global scope can have the following members: accounts
from the same domain and other groups with global scope from the
same domain.
• Groups with domain local scope can have the following members:
accounts, groups with universal scope, and groups with global scope,
all from any domain. This group can also have as members other
groups with domain local scope from within the same domain.
• Groups with global scope can have as their members only accounts.
• Groups with domain local scope can have as their members other
groups with global scope and accounts.
Security groups with universal scope cannot be created in domains
with the domain functional level set to Windows 2000 mixed because
universal scope is supported only in domains where the domain
functional level is set to Windows 2000 native or Windows Server 2003
.
NTLM
The NTLM protocol was the default for network authentication in the
Windows NT 4.0 operating system. It is retained in Windows 2000 for
compatibility with down-level clients and servers. NTLM is also used to
authenticate logons to standalone computers with Windows 2000.
Computers with Windows 3.11, Windows 95, Windows 98, or Windows
NT 4.0 will use the NTLM protocol for network authentication in
Windows 2000 domains. Computers running Windows 2000 will use
NTLM when authenticating to servers with Windows NT 4.0 and when
accessing resources in Windows NT 4.0 domains.*
Process of Logging On
CTRL+ALT+DEL is pressed, name and password entered, and local or domain logon is
indicated.
If the logon is local, the name and password are checked against the local database. If the
logon is a domain logon, the name and password are encrypted into a key, and timestamp
information is encrypted. This information is sent to the Windows 2000 domain controller
with an authentication request.
The domain controller decrypts the information and checks for a valid timestamp. If the
timestamp is valid, two Kerberos tickets are made and encrypted with the password. The
tickets are sent back to the client computer. The tickets are:
User session key - Used to log on.
User ticket - Used to get other Kerberos tickets for accessing other domain resources.
The client decrypts the tickets and uses the session key to log on.
• Winlogon takes the user's credentials and passes them to the Local
Security Authority Subsystem, LSASS, which hashes the user's
password using MD4 and then works with the Kerberos package to
authenticate the user.
• The Kerberos package takes the user's password hash and uses it to
construct a TGT request that contains the preauthenticator (a
timestamp encrypted with the user's password hash). (This
transaction does not require Netlogon at either the client or the
domain controller.)
• The KDC service at the domain controller receives the TGT request. If
the user's name exists, the service obtains the user's password hash
from Active Directory and uses it to decrypt the preauthenticator.
• If the KDC fails to decrypt the preauthenticator, or if the timestamp
indicates that it has been replayed or is out of the acceptable time
skew, the authentication fails. The KDC sends a logon failure
notification to the client.
• If the KDC accepts the preauthenticator as genuine, it gets help from
LSASS to create a PAC for the user. It places the PAC in the
authentication data field of the TGT and returns it inside a reply
message to the user. The TGT is encrypted with the password hash
of the krbtgt account. The entire reply is encrypted with the user's
password hash.
• The Kerberos client decrypts the reply and caches the session key
and TGT in memory, not on disk. It turns the PAC over to LSASS.
• The LSASS uses the information in the PAC to build a local access
token for the user. (It adds the SIDs of any machine local groups that
have the user as a member and any local security policies that apply
to the user.)
• When the TGT expires (the default Time-To-Live is 10 hours), the
client obtains a new TGT from the KDC. This happens transparently
with no service interruption unless no domain controller is available,
in which case the client loses access to the domain until a domain
controller can be made available.
2. The local name server checks its zone database file to determine whether
it contains the name-to-IP address mapping for the client query. The local
name server does not have authority for the microsoft.com domain, so it
passes the query to one of the DNS root servers, requesting resolution of
the host name. The root name server sends back a referral to the com name
server.
3. The local name server sends a request to a com name server, which
responds with a referral to the Microsoft name server.
4. The local name server sends a request to the Microsoft name server.
Because the Microsoft name server has authority for that portion of the
domain namespace, when it receives the request, it returns the IP address
for www.microsoft.com to the local name server.
5. The local name server sends the IP address for www.microsoft.com to the
client.
Exchange
Link State Information
Exchange 2000 determines the route that a message takes based on a least-
cost algorithm. Each Exchange 2000 Server computer has a map of the entire
messaging topology of which it is a member. This map, which is represented in
the link state table, is updated regularly and is propagated to all the servers in
the topology, so that each server can determine not only the most inexpensive
route to deliver a message, but also whether all the connectors that comprise
the route are functioning.
The link state table is used on each Exchange 2000 Server computer to store
link state information that is propagated by a link propagation protocol called
the Link State Algorithm (LSA). The link state table is used to evaluate the most
suitable route for message given cost and availability information. The link state
table is only present in memory and is rebuilt from scratch every time the
server is restarted.
The LSA propagates the routing status of the messaging system in close to real
time to all Exchange 2000 Server computers in the system. This has the
following advantages
• Each Exchange 2000 Server computer can determine the best routing option
at the source and therefore avoid sending a message on a path on which a
downstream link is disabled.
• Messages do not bounce between servers because each Exchange 2000 Server
computer can determine whether alternate or redundant links are up or down.
• Message looping problems are eliminated.
• After he or she sends the message, it goes to the user's outbox on the
server.
• After the route is determined and the message has been routed to the
appropriate server within the Exchange organization, the message is
placed into the MTA's queue for the IMS on the appropriate server.
• The MTA then moves the message from that queue to the MTS-OUT
queue for the Internet Mail Service. At this point, the MTA's job is done.
• The IMS picks up the message from the MTS-OUT (also known as
Outbound Waiting Conversion) queue and streams the message data to
IMAIL in the information store. IMAIL does content-conversion to convert
the message from MDBEF format to SMTP Multipurpose Internet Mail
Extenstions (MIME) or UUencode format.
• The IMS then reads in the message from the \Imcdata\Out to get the
destination host name.
• If the destination host name is known or if the IMS is set to forward all
mail to a certain host, then the IMS looks to see if this is a host that it
recognizes via the EMAIL DOMAINS lists. If not, it does a domain name
system (DNS) lookup to resolve the host name to an IP address.
• After delivery is complete, the entry for this message is removed from
the \Imcdata\Queue.dat file and the IMS resets for a new message to the
same host or closes the connection if there are no more messages for this
host.
Routing Groups
Routing determines how messages flow between servers
within your MicrosoftExchange organization and to users
outside of your organization.
NLTEST
Nltest.exe can be used to test the trust relationship between a
computer running Windows that is a member of a domain and a
domain controller where its machine account resides. NLTEST can
also verify the trust between the ADCs in a domain and their RDC. In
domains where an explicit trust has been defined, NLTEST can test
the trust relationship between all domain controllers in the trusting
domain and a domain controller in the trusted domain.
Nltest.exe is a very powerful command-line utility that can be
used to test trust relationships and the state of domain
controller replication in a Windows NT domain. A domain
consist of domain controllers in which there is a single primary
domain controller (PDC) and zero or more backup domain
controllers (BDC).
Note When you restore a mailbox store to the Recovery Storage Group,
the mailbox store is upgraded to the version of the mailbox store that
currently is running on the computer. This means that you must
upgrade the original computer to the version of Exchange that is
running on the computer where the Recovery Storage Group is located
before you can copy the databases back to the original computer. For
example, if you restore a mailbox store from a computer that is
running Exchange 2000 Server SP3 to a Recovery Storage Group that
is stored on a computer that is running Exchange Server 2003, you
must upgrade the original computer to Exchange Server 2003.
You can use the Exmerge.exe tool to move or to copy mailbox data
between servers regardless of the version of Exchange Server that is
running on the computers.
• By default, data is restored to the existing Recovery Storage Group
on the computer.
• If you restore multiple databases to a Recovery Storage Group, all
databases that you add to the Recovery Storage Group must be from
the same storage group.
• You can only have one Recovery Storage Group on a computer.
• You can only have one Recovery Storage Group per two-node cluster,
regardless of the number of Exchange virtual servers that are present.
For clusters that contain more than two nodes, each Exchange virtual
server can have its own Recovery Storage Group.
• Recovery Storage groups cannot be used to restore Exchange
backups that were performed using third-party software that supports
the Volume Shadow Service in Microsoft Windows Server 2003.
Recovery Storage Groups can be used only to restore backups
performed by an Exchange-aware backup application. Backup
snapshots that were taken by using Volume Shadow Service can be
restored only by using Volume Shadow Service.
http://support.microsoft.com/kb/824126/
Messaging Dial Tone Recovery Strategy
With the "Messaging Dial Tone" strategy, you can restore e-mail service more
quickly to users, and you can restore their previous data as it becomes
available. You first reset an Exchange database by removing the current
database files to create a temporary, blank, "dial tone" database. Users can log
on to this database to send and to receive mail. New, empty mailboxes are
created in the "dial tone" database when users log on. Because the new
mailboxes have the same values for the msExchMailboxGUID attribute in the
"dial tone" database as in the original database, you can use the Exmerge.exe
tool to transfer data between the original database and the temporary “dial
tone” database.
When the "dial tone" database is set up and is running, you can restore or
repair the original database in the Recovery Storage Group. When the restore or
the repair operation is complete, dismount both database, and then swap the
database files between the original storage group and the Recovery Storage
Group. By doing so, users can access their previous data, but users cannot
access new items. To restore access to new items, use the Exmerge.exe tool to
transfer data from the "dial tone" database to the original database.
Exchange Ports
• A partial list of the ports your Exchange server might use is included
below
• 21 FTP
• 23 Telnet
• 25 SMTP
• 53 DNS
• 80 HTTP
• 88 Kerberos
• 102 X.400
• 110 POP3
• 119 NNTP
• 135 RPC
• 137 - NetBIOS Session Service
• 139 - NetBIOS Name Service
• 143 IMAP4
• 379 LDAP (SRS)
• 389 LDAP
• 443 HTTP (SSL)
• 445 - NetBIOS over TCP
• 465 SMTP (SSL)
• 563 NNTP (SSL)
• 636 LDAP (SSL)
• 691 LSA
• 993 IMAP4 (SSL)
• 994 IRC (SSL)
• 995 POP3 (SSL)
• 1503 T.120
• 1720 H.323
• 1731 Audio conferencing
• 1863 - MSN IM
• 3268 GC
• 3269 GC (SSL)
• 6001 Rpc/HTTP Exchange Store
• 6002 HTTP Exchange Directory Referral service
• 6004 Rpc/HTTP NSPI Exchange Directory Proxy service/Global
Catalog
• 6667 IRC/IRCX
• 6891 - 6900 - MSN IM File transfer
• 6901 - MSN IM Voice
• 7801 - 7825 - MSN IM Voice
ExchWeb The ExchWeb folder provides most of the OWA control functionalities. By
default, this folder has anonymous access enabled, but don’t let this setting fool you. The
subfolder BIN that contains the controls is set to basic and Integrated Windows
authentication (see Figure 5.3). Also note that this folder is viewable through only the IIS
Manager and not the Exchange System Manager.
Microsoft-Server-Activesync: This directory provides support for wireless
synchronization (Activesync) by Microsoft Pocket PCs, smartphones, and the like. The
folder is by default set to basic authentication and the default AD domain .
OMA: The OMA folder provides Web-based mailbox access to Pocket PCs,
smartphones, and the like. The folder is set by default to basic authentication and default
domain \
Public: The Public folder provides users with access to the Public folders. This folder is
set by default to basic and Integrated Windows authentication and the default AD domain
Authentication Methods
By default, the authentication method for accessing OWA is basic and/or Integrated
Windows authentication, but actually there are five different authentication methods that
can be used to validate your OWA users:
In general there are two ways for moving to Exchange Server 2003.
The first is to upgrade an existing Exchange 5.5 environment by running an
inplace upgrade.
Another way is to migrate the Exchange directory service to Active Directory
and then implementing an Exchange Server 2003 environment.
Step 1
a) Implement and deploy Active Directory on Windows Server 2003 and all
your Global Catalog Server are Windows Server 2003.
b) Update WINNT 4.0 SP6a and Exchange Server 5.5 with Service Pack 3 or
higher.
c) Create trust relation ship between Windows 2003 AD and WINNT 4.0
Domain.
e) Install the ADMT tool to migrate the user SID and Passwords. Before
migrating the SID the windows should be raised to Native mode.
Step2
a) Login as Enterprise Administrator account run the Exchange
Forestprep and Domain prep on the Domain controller.
b) Setup.exe /forestprep and setup.exe /domainprep.
c) Install and configure the ADC connector, Configure the appropriate
connection agreements for public and private folders. Synchronies
the Exchange 5.5 directory services with windows Active directory
Service.
d) Run the exchange stepup with setup.exe.
e) Move the Mailbox from exchange 5.5 to Exchange 2003 server with
Move wizard mailbox or from ADUC.
f) Moving the connectors
g) Rehoming the Public folders
Step 3
a) Changing the IMC from exchange 5.5 to Exchange 2003
b) Changing the MX pointer.
c) Removing the Exchange 5.5 from the network.
ADMT is first.
To migrate SIDs, the target Windows domain must be in native mode. The
SIDHistory attribute exists in the domain schema only if the Windows
domain is in native mode.
http://www.microsoft.com/technet/prodtechnol/exchange/guides/PlanE2k3M
sgSys/504334e5-6ba1-474b-a37c-976553f8d79a.mspx?mfr=true
SIDHistory and SID transalation
http://support.microsoft.com/kb/326480/
ADClean Command
NTDSNoMatch
• Create new user accounts in Active Directory (if they do not already
exist) based on the Exchange 5.5 accounts in the source organization.
• Migrate X.400, Simple Mail Transfer Protocol (SMTP), cc:Mail, Microsoft
Mail, and other e-mail addresses into the e-mail addresses attribute of the
new user account in Active Directory.
• Convert Active Directory contacts to mail-enabled user accounts in
Active Directory (if these contacts have been created with the Active
Directory Connector) when you migrate from Exchange 5.5. If a contact
has been manually created in the target Active Directory and a mailbox
that has the same alias is migrated, a new disabled user account with a 1
appended to the name is created in Active Directory. The original contact
remains unchanged. Only contacts that are created by the ADC are
converted into mail-enabled user accounts by the Migration Wizard.
• Update Exchange 2000 Server or Exchange Server 2003 group
membership when you migrate from Exchange 5.5. However, Exchange 5.5
distribution lists are not migrated. For example, if a distribution group in
Active Directory contains contacts, during a migration procedure these
contacts may be converted to user accounts that are turned off, and the
distribution group in Active Directory is updated to reflect this change.
Note However, you can use the Migration Wizard to migrate information
from an Exchange 5.5 organization that is in the same forest as the target
Exchange organization, but has not yet joined the target Exchange
organization. For example, the source Exchange 5.5 servers may be
running on Microsoft Windows 2000 Server-based computers in an Active
Directory forest that also contains the target Exchange organization. As
long as the migration source and target organizations have different
names, you can use the Migration Wizard to import information.
• Migrate personal mail archives or personal address books. For
information about how to migrate personal mail archives or personal
address books, see the Exchange 2000 Server or the Exchange Server 2003
online documentation.
• Migrate distribution lists. You can use either of the following two
methods to migrate Exchange 5.5 distribution lists: • Convert the
distribution list to a public folder, and then migrate the public folder.
• Export the distribution list, and then use the LDIFDE or CSVDE
command-line utilities to convert them.
• Migrate Inbox rules. After you use the Migration Wizard to migrate
mailbox information, the mailbox owners must re-create their Microsoft
Outlook Inbox rules.
• Migrate public folders. You can migrate public folders by exporting them
to .pst files or by using the Inter-organization replication utility.
Disk defragmentation involves rearranging data on a server's hard disks to make the files
more contiguous for more efficient reads. Defragmenting your hard disks helps increase
disk performance and helps ensure that your servers that run Exchange run smoothly and
efficiently.
The transaction logs are some of the most crucial files when it comes to a
working Exchange server. Microsoft Exchange Server uses transaction logs as a
disaster recovery method that can bring a Exchange database back to a
consistent state after a crash. Before anything is written to the EDB file, it is
first written to a transaction log. Once the transaction has been logged, the data
is written to the database when convenient.
• E##.log is the current transaction log for the database. Once the log file
reaches 5MB in size it is renamed E#######.log and a new E##.log is
created. As with the checkpoint file the ## represents the Storage Group
identifier. While the new E##.log file is being created you will see a file
called Edbtmp.log which is a template for Exchange server log files.
• E#######.log are the secondary transaction logs. They are numbered
sequentially starting with E0000001.log using the hexadecimal
numbering format and are 5MB in size.
• Res1.log is a reserved log file that is limited to 5MB in size. When the
disk has run out of space, transactions are written to this log file while
you work on clearing up space on the disk.
• Res2.log is another reserved log with the same function
Messages routed between servers in the same routing group use SMTP as their transport.
The steps involved in routing a message between two servers in the same group are
slightly more complicated than on a single server:
1. Since the message is not intended for local delivery, the message is passed to the
routing engine.
2. Once in the routing engine, the message is parsed against the Domain Mapping
and Configuration table and then placed in the outgoing SMTP queue for the
destination server.
3. The sending server looks up the recipient’s home directory in Active Directory,
conducts a DNS lookup for the MX record associated with the destination server
on which the recipient’s mailbox is stored, and then creates a TCP connection to
that server.
4. The message is transmitted to the destination server.
5. Once the destination server receives the message, it processes it in different ways
depending on the destination of the message. If it determines that the message
goes to a recipient in its local store, it follows the procedure discussed in the
previous section. If it determines that the message goes to a different server or
outside the organization, the above process is repeated to route the message to the
correct server.
Between Routing Groups
Messages routed between servers in multiple groups incur the use of a bridgehead server
at each end of the connector. The steps involved in routing messages between servers in
different routing groups are as follows (see Figure 2.6, where the solid line represents the
flow of messages and the dashed line represents queries):
1. Since the message is not intended for local delivery, the message is passed to the
routing engine.
2. The routing group information is gathered from the configuration naming context
of Active Directory.
3. The link-state information is consulted to determine the best routing path.
4. The message is passed to the bridgehead server.
5. The bridgehead server passes the message to the destination bridgehead server in
the other routing group.
6. The receiving bridgehead server passes the message to the destination server in its
group.
7. The message is brought into the destination server via the SMTP service and
placed in the Local Delivery queue.
8. The message is taken out of the queue by the store.exe process and associated
with the recipient’s inbox.
1. In the 2080 event logged by DSACCESS, what does "out-of-site" mean?
Out of site means servers in a different site which the exchange server is trying to query.
It is the next adjacent site determined by AD site membership. If there are two adjacent
sites of the same cost, then it's GC's in both or all of those sites.
2. What are the size limits around Exchange databases in Exchange 2003 SP 2 ?
75 GB
3. How can I see which clients are logging in to my Exchange servers, and in particular
which versions are logging in?
5. When applying an Exchange 2003 service pack, which servers should you apply the
update on first?
Connector servers
6. What happens if you delete the mailbox which is being used for Message Journalling
in Exchange 2003?
All journalled emails are lost, messages will try reach the journal and queue will build on
servers…. Guessing. ALL mail will queue, in messages awaiting directory lookup. And
yes all previously journaled mail is deleted, but deleted mailboxes are kept for 30 days.
7. If I select 1000 mailboxes to perform a move mailbox on… how will Move Mailbox
in ESM do that? And how does it differ from older versions?
THE ESE process verifies against the database for the checksum and integrity.
No.
It removes any folder/message aging. Make sure the space available within the database, by
removing aging is available for the next data within the database file.
4) What happens if I turn on circular logging, on a storage group ? Why is it not recommended ?
It overwrites the transaction logs and as result restore from online backup will be impossible
5) In a cluster what is the single point of failure, and how can you overcome that?
???
6) On an Exchange server, why do you want to run it on a machine with the /3Gb switch ?
/3gb switch is applied when u have physical more than 1 Gb and this will apply the 3GB to
application and 1 Gnb to kernel.
7) How do Exchange 2000 servers communicate to other servers in the same routing group ?
RPC??
8) How many storage groups, and stores can I have on an Exchange 2000 Standard Edition Server? And
on Enterprise ?
Standard - 1 storage group Enterprise 4 storage groups
5 stores in each storage
9) What’s the best method of virus scanning an Exchange 2000 server?
10) What have I forgotten to do if my SMTP connector restriction aren’t working ? ie I restrict a connector so
that only members of the messaging team can send mails over it, but when I check there are tons of other
mails going over it too… what have I forgotten to do?
1) What processes will remove transaction logs?
i.e. what operations do I need to perform to clear them up
To clean up transaction log file one option is to take full backup, and second one is
check through eseutil /mk command.
4) What happens if I turn on circular logging, on a storage group ? Why is it not recommended ?
Once u turn it on, it will overwite transaction log files. So if ur database will get crash u will not get
up to date data. When u make it off, every 5mb new transaction log file will get generated.once u
tke backup, it will purge and committed to databse, so while restoring databse, u will get up to
date data.
5) In an Exchange cluster what is the single point of failure, and how can you overcome that?
6) On an Exchange server, why and when do you want to run it on a machine with the /3Gb switch ?
Exchange 2k3 support 4GB of RAM. /3gb switch will give virtual memory to the server. Mean if u
have 2gb ram and u will put /3gb switch it will free up memory virtually for exchange operation, in
short it speed up ur performance
7) How do Exchange 2000 servers communicate to other servers in the same routing group ?
Need to check
8) How many storage groups, and stores can I have on an Exchange 2000 Standard Edition Server? And
on Enterprise ?
1 storage group and five mailbox store
9) What’s the best method of virus scanning an Exchange 2000 or Exchange 2003 server?
U can use third party tools like Mcafee group shield and trend micro, and Antigen. Some of them
have mailbox scan facility.
10) If I set up restrictions on my SMTP connectors, and later find out that lots of mails are still going through
the restricted connector, how do I start troubleshooting this?
That’s due to relay. U have to check SMTP relay option. Its happen if ur exchange server open for replay.
12) Which task copies protocol settings from Active Directory in to the metabase on the local machine?
No idea,, have to check
13) How would you recommend a maximum database size in Exchange 2000 or Exchange 2003 ?
For enterprise server it support 16TB, only thing is ur h/w should compatible for the same.
14) During installation where does setup record it’s actions, successes and failures ?
While installing exchange 2003, one setup file .txt will get create in C: drive on root folder. Each and every
step u can get it from that file.its always recommended to check that during installation.
15) Approximately how many address lists can you have in an Exchange organisation ?
No idea.. have to check
16) Name 3 places that you can set the maximum message size which can be sent or received in Exchange
I think u can get this option on message delivery option on root of exchange organization.
17) What functions take place during an Online Backup with regards to transaction logs ?
Online backup commit all transaction log file to physical database and then purge all files.
20) How would you physically recover white space in the database, and how would you check how much
whitespace there actually is in an Exchange database ?
Same online defrage shows white space size and run eseutil /g to defrgmant database. During defragment
database shuld be in dismount mode. If customer is not ready for down time, then simple do a move mailbox
wizard. This will create new database.
31) I have a bunch of POP3 and IMAP4 clients running against my Exchange 2000 server, when I upgrade
the server to Exchange 2003, what do I need to be careful about?
No idea.. need to check
32) In a brand new forest at which point in the installation process do I specify my organisation name?
When u start installation of exchange u will find this option.
33) How is mailbox manager implemented in Exchange 2000 (and Exchange 2003)?
It’s a task which u can define by right cliking mailbox store. But still need to check.
34) How many nodes can I have an Exchange 2003 / Windows 2003 Enterprise Edition cluster ?
Exchange 2003 cluster supports up to 8 nodes.
35) On a 4 node Exchange 2003 cluster how many Exchange Virtual Servers can I create? How many can
I run on each node ?
No idea.. need to check
36) How can you use Outlook 2003 and Exchange 2003 to connect over the internet ?
Use RPC over HTTP and use outlook using cache mode.u can find this option on profile settings to enable
rpc/http.
37) To install Exchange 2003 System Manager on a workstation, what are the prerequisites?
System should be XP,2003
38) What’s the purpose of Exchange 2000/3 System Policy (created in Exchange System Manager)
U can use this in many ways like email address creation(first anme. Last [email protected])