Friday, January 30, 2015

Subject Exchange: Weekend reading






from Exchange News Full Article

msexchange.org: Microsoft Ignite: Exchange Sessions

The list of available sessions for the Microsoft Ignite conference is now available.



from Exchange News Full Article

msexchange.org: A framework for cybersecurity information sharing and risk reduction

Very interesting reading for any IT stakeholder. Brief Description: Leveraging Microsoft’s decades of experience in managing security for our products, infrastructure, and customers, the paper provides a framework for information exchanges.



from Exchange News Full Article

msexchange.org: A deeper look at Outlook for iOS and Android





from Exchange News Full Article

Wednesday, January 28, 2015

Exchange Team Blog: Get the inside scoop on Exchange at Microsoft Ignite

This morning we published the first look at the Ignite session catalog providing you a better view of what to expect at Ignite. Ignite brings together the Exchange Conference with TechEd and other Microsoft technology events. By attending Ignite, you’ll have access to a broad set of content on Microsoft’s technologies, including detailed content from the teams that build the products and the experts who deploy and use the technologies.


The initial Ignite session catalog includes over 50 sessions on Exchange and Outlook. We will continue adding more sessions leading up to the event. Use this pre-filtered search link to begin reviewing the content we are planning for Ignite. In addition to first look at the sessions, we are sharing an expanded view of the featured speakers you can expect to find at Ignite.


Veterans of past MEC events, Greg Taylor and Jeff Mealiffe, took some time to talk to us about what to expect at Ignite. Check this out as they coin the new Ignite descriptor - #BREEP!


Mark your calendars for an #IgniteJam on Twitter


Join us on February 3rd at 9:00 am PT, when we’ll have the whole event team and a few speakers ready to chat with you on Twitter. We’ll be ready to answer your questions about the event and hear what you’re excited about in terms of community experiences and things to do in Chicago. Add the event to your calendar with this link.


To participate in the #IgniteJam



  1. Log in to Twitter on Feburay 3rd, at 9:00 a.m. PT. For easier real-time participation, use Twubs and join us at: twubs.com/ignitejam.

  2. Introduce yourself and include the hashtag #ignitejam and tag us at @MS_Ignite.

  3. Watch for questions coming from @MS_Ignite and chime in with your answers and commentary, using the hashtag #ignitejam.


image


So sign-up now and we’ll see you in Chicago!







from Exchange News Full Article

msexchange.org: Office 365: Microsoft Peering Agreements

Ever wondered how Microsoft is capable of delivering superior performance for the Office 365 workloads?



from Exchange News Full Article

Tuesday, January 27, 2015

MSExchange.org: Deploying an Exchange 2013 Hybrid Lab Environment in Windows Azure (Part 20)

In this article we will create the publishing rule required for publishing the AD FS servers in the Active Directory forest to the Internet followed by talking about AD FS customization and some other handy configuration options.



from Exchange News Full Article

Sunday, January 25, 2015

msexchange.org: Still using Forefront Protection 2010 for Exchange Server? Make your move soon!

Back in September 2012, in order to better align security and protection solutions with the workloads and applications they protect, we announced changes to the roadmaps of some of the security solutions offered under the Forefront brand.



from Exchange News Full Article

Friday, January 23, 2015

Subject Exchange: Weekend reading






from Exchange News Full Article

msexchange.org: Azure new RemoteApp - Cloudify your desktop applications





from Exchange News Full Article

msexchange.org: Microsoft Exchange 2013 Public Folders Directory Sync Support Scripts v15.01.0075.001

Scripts to enable creation of public folder related objects in the O365 Active Directory and synchronization of public folder related Active Directory objects between on-premise and O365 directories.



from Exchange News Full Article

msexchange.org: UPDATE: Microsoft Outlook for Mac for Office 365

This update provides new functionality and various improvements and fixes for Outlook for Mac for Office 365. THIS RELEASE CONTINUES TO BE AVAILABLE TO ELIGIBLE OFFICE 365 SUBSCRIBERS ONLY.



from Exchange News Full Article

msexchange.org: Sample CSV File for Adding Users to Office 365 - Jan2015

Useful sample file that can be useful for lab environment or 100% cloud scenarios.



from Exchange News Full Article

msexchange.org: Updated Outlook Holiday (.hol) file for Outlook 2007 and Outlook 2010

This updated Outlook Holiday (.hol) file corrects issues with multiple holidays in Outlook 2007 and Outlook 2010 products.



from Exchange News Full Article

msexchange.org: Microsoft Message Analyzer v1.2

Message Analyzer enables you to capture, display, and analyze protocol messaging traffic; and to trace and assess system events and other messages from Windows components.



from Exchange News Full Article

Thursday, January 22, 2015

Subject Exchange: New Office Visio Stencil – January 2015

The January version of the New Office Visio Stencil was recently made available to download.


Brief Description

These stencils contain more than 300 icons to help you create visual representations of Microsoft Office or Microsoft Office 365 deployments including Microsoft Exchange Server 2013, Microsoft Lync Server 2013, and Microsoft SharePoint Server 2013. The zip file now includes both stencil sets from 2012 and 2014.


Overview

Creating visual representations of your Microsoft Office and Office 365 architectures, including Microsoft Exchange, SharePoint, and Lync is a helpful way to communicate your deployment. These Visio stencils provide more than 300 icons — many depicting servers, server roles, services and applications — that you can use in architecture diagrams, charts, and posters. These icons are primarily centered around deployments of Microsoft Exchange Server 2013, Microsoft Lync Server 2013, and Microsoft SharePoint Server 2013 as well as hybrid Office 365 deployments of aforementioned technologies.

The zip file now includes both stencil sets from 2012 and 2014.






from Exchange News Full Article

MSExchange.org: Exchange Server 2013 Backup and Restore 101 - Disabled mailboxes (Part 5)

In this article, we are going over the process to permanently remove a disconnect mailbox, restore information from a moved mailbox from the original mailbox database and how to create a snapshot/backup of the Mailbox Database to preserve disconnected mailboxes.



from Exchange News Full Article

Wednesday, January 21, 2015

Exchange Team Blog: Ask The Perf Guy: New Exchange 2013 Performance Guidance Available On TechNet

I’m happy to announce that the Exchange performance virtual team within Microsoft Support has produced some fantastic new performance guidance content for Exchange 2013 users, and it is now available on TechNet at http://ift.tt/1utF7Qu. This is a compilation of resources that we’ve previously published, guidance presented at Microsoft events since the release of Exchange 2013, and things that we have learned through the process of providing support to customers deploying the product.


Clearly this is just a starting point, and we will be updating this content on an ongoing basis as we continue to learn more about how Exchange works in your deployments. Let us know what you think!


Jeff Mealiffe

Principal PM Manager

Office 365 Customer Experience







from Exchange News Full Article

MSExchange.org: Product Review: GFI Archiver

In this review we will look at the latest version of GFI Archiver and how it can help organizations archive messaging data and much more.



from Exchange News Full Article

msexchange.org: Enhanced email protection with DKIM and DMARC in Office 365

Spoofing is a common challenge that enterprises face in today’s world, which can lead to increased spam and more intensified phishing campaigns. In order to reduce spoofing and provide a safer client experience, Office 365 now supports inbound validation of DomainKeys Identified Mail (DKIM) over IPv4, and Domain-based Messaging and Reporting Compliance (DMARC). Both of these technologies check for trusted authenticated senders and help identify untrusted ones that that fail authentication. Exchange Online Protection (EOP), which filters every single mailbox on Office 365, had previously supported Inbound DKIM for IPV6. With these added functionalities feature, Office 365 users can expect better brand protection and an even safer experience.



from Exchange News Full Article

Tuesday, January 20, 2015

MSExchange.org: Planning and Migrating a Small Organization from Exchange 2003 to Exchange 2013 (Part 19)

The penultimate part in this series focused on the task our users have been waiting for – the final migration to Exchange Server 2013. With Exchange 2003 a long distant memory and our Exchange 2010 server part decommissioned, we’ll complete this series by performing the final removal and uninstallation steps.



from Exchange News Full Article

Monday, January 19, 2015

The EXPTA {blog}: Beware Installing .NET 4.5.2 Update on Exchange Servers

Windows Update is now offering the the .NET Framework 4.5.2 update as an "Important" update to Windows computers.




  • Microsoft .NET Framework 4.5.2 for Windows 8.1 and Windows Server 2012 R2 for x64-based Systems (KB2934520)

  • Microsoft .NET Framework 4.5.2 for Windows Server 2008 R2 for x64-based Systems (KB2901983)


Both of these updates require a restart. .NET 4.5.2 is not required for current versions of Exchange server, but if your servers or patching process uses Windows Update you will see these updates are being pushed to them anyway.












Windows Update on Windows Server 2012 R2











Windows Update on Windows Server 2008 R2



Be aware that when this update is installed on your Windows servers it will re-optimize all .NET assemblies on the server when it restarts. Perfmon shows ~99% of CPU resources are in use for about 8-10 minutes while this occurs












98% CPU Utilization After Restart












.NET Runtime Optimization Service Racing



The main culprit is the mscorsvw.exe process (The .NET Runtime Optimization Service), as shown above. Exchange uses .NET assemblies extensively in its own code, so this optimization will affect the server's ability to function properly until this process completes. Because of this, it will take significantly longer for the server to restart and system performance will be very very poor.



Once the the re-optimization process completes the Exchange server performance will eventually return to normal. This may take some time because other processes such as the IIS Worker processes and Exchange services were starved for resources. In some cases I have seen Exchange services, such as the Microsoft Exchange Transport service, fail to start. Make sure all your services are running before moving on to patch the next server. I even suggest restarting the patched server just to make sure it restarts normally and all services start properly first.








from Exchange News Full Article

msexchange.org: System Center Management Pack for Office 365

The Office 365 Management Pack for Operations Manager is designed for the following versions of System Center Operations Manager: • System Center Operations Manager 2012 • System Center Operations Manager 2012 SP1 • System Center Operations Manager 2012 R2



from Exchange News Full Article

Sunday, January 18, 2015

Subject Exchange: Weekend reading






from Exchange News Full Article

Friday, January 16, 2015

Thursday, January 15, 2015

Tuesday, January 13, 2015

EighTwOne: End of Exchange 2010 Mainstream Support

Exchange 2010 Logo With all the media attention for Windows 7 going out of mainstream support, one might forget today also marks the end of mainstream support for Exchange Server 2010.


Exchange 2010, which was released in October, 2009 (which seems centuries ago now), and which still has a very large installed base, is going into the extended support phase.


Depending on your support contract, this means Microsoft will no longer provide free support for this product. Patches for security issues will still be available, and owners of premier support contracts are eligible for non-security updates through extended hotfix support option.


Exchange Server 2010 will reach end-of-life on January 14th, 2020.




Filed under: Exchange 2010 Tagged: Lifecycle, Planning



from Exchange News Full Article

msexchange.org: Office 365 Exchange Online message size onboarding limit increase

You asked for it. Here you go...



from Exchange News Full Article

msexchange.org: The DAG Witness server finally supported in Azure





from Exchange News Full Article

MSExchange.org: Deploying an Exchange 2013 Hybrid Lab Environment in Windows Azure (Part 19)

In this part 19, we will install the Web Application Proxy (WAP) component on the two servers that are going to act as proxy servers for the AD FS servers in our Active Directory forest. We will also import the required trusted third party certificate and create the necessary DNS records for the federation service in external DNS as well as add it to the hosts file.



from Exchange News Full Article

Monday, January 12, 2015

msexchange.org: The Office for Android tablet preview expands





from Exchange News Full Article

msexchange.org: IP Ranges Added to EOP





from Exchange News Full Article

msexchange.org: Outlook for Mac for Office 365 Database





from Exchange News Full Article

msexchange.org: New accessibility enhancements for Office Online





from Exchange News Full Article

msexchange.org: Using an Azure VM as a DAG Witness Server





from Exchange News Full Article

Exchange Team Blog: OWA Forms Based Auth Logoff Changes in Exchange 2013 Cumulative Update 8 – And Good News for TMG Customers

Back at the release of Exchange Server 2013 CU1 we made some necessary changes to the way OWA logoff works. Those changes had the unfortunate side-effect of breaking the way TMG spotted a user’s attempt to logoff, thereby breaking that scenario.


Well, we have some more changes in mind for OWA logoff once again, and we’re taking the opportunity this time to FIX the TMG logoff issues at the same time. A better result all around we are sure you will agree.


And one more thing, this is a heads up, as we’re delivering this change in CU8.


So what are we changing? Well simply put, instead of sending you back to the logon form when you log out, we’re sending you to a new static logoff page, recommending you close your browser.


Why would we want to do that? Well, it means we have a more consistent logoff experience now whether the authentication used is FBA, Basic or Integrated Windows, the message gets presented for all. It also means we decouple log on and logoff, which means each can potentially be changed in some way without impacting the other.


So here’s the old, pre-CU8 way;


When using OWA, and when you click on sign out:



  1. The client initiates logoff with the request to “/owa/logoff.owa”

  2. Client then gets a 302 redirect to “/owa/auth/logon.aspx”


And you’re back at the logon page.


When using ECP, and the user clicks on sign out:



  1. The client initiates logoff with the request to “/ecp/logoff.aspx”

  2. Client gets a 302 redirect to “/owa/logoff.owa”

  3. The client then gets another 302 redirect to “/owa/logon.aspx”


And you’re back at the logon page again.


Now here’s how we’re doing it in CU8 by default.


When using OWA, and when you click on sign out:



  1. Client initiates logoff with the request to “/owa/logoff.owa”

  2. The server sends to client a 302 redirect to the landing page “/owa/auth/signout.aspx”


Now you’re at the new signout.aspx page.


When using ECP and the user clicks on sign out:



  1. Client initiates logoff with the request to “/ecp/logoff.aspx”

  2. Client gets a 302 redirect to “/owa/logoff.owa”

  3. Client gets a 302 redirect to the landing page “/owa/auth/signout.aspx”


And again you’re at the new signout.aspx page.


So now that you understand what we changed and why, why do you care? And why are we telling you now? We expect a large portion of our customers likely don’t need to care too much as the changes will be invisible to you, but some of you may need to (as our KB articles say) ‘consider the following’ scenarios;


You are using TMG and have it configured to watch for logoff.owa to signify a user was logging off. If you have that configuration today it will simply start to work again. That’s great news, isn’t it?


Regardless of TMG, it still might be important to you to know about this if you have any third party applications integrated into Exchange. We know of a few that have come to depend upon the behavior we introduced with CU1, and we know at least one (as they are participants in our TAP which makes them very smart fellows) who has already made the changes they needed to make to accommodate this in preparation for CU8 being publically available.


So what if the third party vendor solution you have wasn’t aware of this change, and once you install CU8 things break? Well, there are two things you can do;



  1. Ask your vendor why, if they develop third party add-in apps for Exchange are they not reading our blog…. J And ask them when they will be fixing their app so it works with your CU8 or later deployment.

  2. You can put in a temporary reversion to the older (CU1 and later) behavior. This change is only supported with CU8 or later, and the ability to make this reversion will potentially be removed from future updates – so don’t get used to using it, and don’t forget CU9 or later will wipe any web.config changes you make.


The legacy logoff mode can be enabled (disabling redirect to signout.aspx) by changing 3 web.config files.



On servers with the Client Access role;



  • %ExchangeInstallPath%\FrontEnd\HttpProxy\OWA\web.config


On servers with the Mailbox Role;



  • %ExchangeInstallPath%\ClientAccess\OWA\web.config

  • %ExchangeInstallPath%\ClientAccess\ECP\web.config


Modify the following line (make sure you make a backup of web.config before you do this):


<add key="LogonSettings.SignOutKind" value="LegacyLogOff" />


To look like this (the !- - and trailing - - ‘s ensure it is treated as a comment line and not acted upon):


<!-- add key="LogonSettings.SignOutKind" value="LegacyLogOff" /-->


AppPools will recycle automatically on the change unless that has been disabled, in which case it will need manually recycling.


If the entry is not present, or the value is “DefaultSignOut” or any other value then logoff ends on signout.aspx page (default).



And don’t forget, the next Cumulative Update will reset this manual modification, so be prepared to do it again if you must after CU9 releases. Ideally though, if the reason you are doing this is to allow some third party app to work, that app should be updated to live with the new behavior.


The final, and perhaps the most important scenario is that this change introduces an install order dependency, something we thankfully have quite rarely, but something you need to pay attention to on this occasion.


Simply put, if a user’s mailbox is on a CU8 Mailbox server but connecting through a CU6 or earlier CAS, they will see an issue at OWA logoff due to this change. What about if you have CU7 CAS you ask? Well we made enough code changes in CU7 that this situation doesn’t crop up. So to put it simply once again, if your CAS is on CU7, or CU8, or if you have only multi-role servers at CU7 or later, no problem, none, not at all.


So, what’s the best way to make sure you won’t hit an issue? Keep up to date of course, as that means all your servers are already at CU7, so you have nothing to worry about.


What if on the other hand you are coming from CU6 or earlier and you expect users might be using OWA during the window in which you plan to install CU8?


Well if you have separate CAS/MBX roles (and if you do… why?) then we recommend you update all the CAS first. Then you can update the Mailbox servers in any order you like. That’s the simplest solution by far.


If, on the other, other hand, you have all multi-role servers (well done you, we like you), and they are CU6 or earlier, then you have three choices;



  • Upgrade them all to CU7 before you begin your CU8 rollout.

  • Accept there may be some funky issues during that upgrade window and simply decide you want to live with it.

  • Do a rolling upgrade and be smart with your load balancing pool so all incoming connections hit only upgraded CU8 CAS. If you don’t have any idea what that means or how to do it, it’s not the option for you. Take the first option.


We hope this gives you what you need to successfully get your servers to CU8 and hope you TMG stalwarts are once again happy and pleased the logoff experience is properly working again.


Greg Taylor

Principal PM Manager

Office 365 Customer Experience







from Exchange News Full Article

Sunday, January 11, 2015

Friday, January 9, 2015

msexchange.org: DAG Witness Server in Azure IaaS now supported!

I’m happy to announce support for use of an Azure virtual machine as an Exchange 2013 Database Availability Group witness server. Automatic datacenter failover in Exchange 2013 requires three physical sites, but many of our customers with stretched DAGs only have two physical sites deployed today. By enabling the use of Azure as a third physical site, this provides many of our customers with a cost-effective method for improving the overall availability and resiliency of their Exchange deployment.



from Exchange News Full Article

msexchange.org: Concerning Trends Discovered During Several Critical Escalations

Over the last several months, I have been involved in several critical customer escalations (what we refer to as critsits) for Exchange 2010 and Exchange 2013. As a result of my involvement, I have noticed several common themes and trends. The intent of this blog post is to describe some of these common issues and problems, and hopefully this post will lead you to come to the same conclusion that I have – that many of these issues could have been avoided by taking sensible, proactive steps.



from Exchange News Full Article

msexchange.org: Largest Azure VM in the Cloud

Today, we’re announcing the release of a new series of VM sizes for Microsoft Azure Virtual Machines called the G-series. G-series sizes provide the most memory, the highest processing power and the largest amount of local SSD of any Virtual Machine size currently available in the public cloud.



from Exchange News Full Article

Exchange Team Blog: Using an Azure VM as a DAG Witness Server

I’m happy to announce support for use of an Azure virtual machine as an Exchange 2013 Database Availability Group witness server. Automatic datacenter failover in Exchange 2013 requires three physical sites, but many of our customers with stretched DAGs only have two physical sites deployed today. By enabling the use of Azure as a third physical site, this provides many of our customers with a cost-effective method for improving the overall availability and resiliency of their Exchange deployment.


You can learn more about the deployment and configuration process, as well as learn about our best practices in the TechNet Library article.


It’s important to remember that deployment of production Exchange servers is still unsupported on Azure virtual machines, so it’s not yet possible to stretch a DAG into Azure. This announcement is limited to deployment of a file share witness in the Azure cloud. Also note that this is not related to the “Cloud Witness” feature in the Windows Server Technical Preview. Stay tuned for future announcements about additional support for Azure deployment scenarios.


Jeff Mealiffe

Principal PM Manager

Office 365 Customer Experience







from Exchange News Full Article

Thursday, January 8, 2015

Exchange Team Blog: Concerning Trends Discovered During Several Critical Escalations

Over the last several months, I have been involved in several critical customer escalations (what we refer to as critsits) for Exchange 2010 and Exchange 2013. As a result of my involvement, I have noticed several common themes and trends. The intent of this blog post is to describe some of these common issues and problems, and hopefully this post will lead you to come to the same conclusion that I have – that many of these issues could have been avoided by taking sensible, proactive steps.


Software Patching


By far, the most common issue was that almost every customer was running out-of-date software. This included OS patches, Exchange patches, Outlook client patches, drivers, and firmware. One might think that being out-of-date is not such a bad thing, but in almost every case, the customer was experiencing known issues that were resolved in current releases.Maintaining currency also ensures an environment is protected from known security defects. In addition, as the software version ages, it eventually goes out of support (e.g., Exchange Server 2010 Service Pack 2).


Software patching is not simply an issue for Microsoft software. You must also ensure that all inter-dependent solutions (e.g., Blackberry Enterprise Server, backup software, etc.) are kept up-to-date for a specific release as this ensures optimal reliability and compatibility.


Microsoft recommends adopting a software update strategy that ensures all software follows N to N-1 policy, where N is a service pack, update rollup, cumulative update, maintenance release, or whatever terminology is used by the software vendor. We strongly recommend that our customers also adopt a similar strategy with respect to hardware firmware and drivers ensuring that network cards, BIOS, and storage controllers/interfaces are kept up to date.


Customers must also follow the software vendor’s Software Lifecycleand appropriately plan on upgrading to a supported version in the event that support for a specific version is about to expire or is already out of support.


For Exchange 2010, this means having all servers deployed with Service Pack 3 and either Rollup 7 or Rollup 8 (at the time of this writing). For Exchange 2013, this means having all servers deployed with Cumulative Update 6 or Cumulative Update 7 (at the time of this writing).


For environments that have a hybrid configuration with Office 365, the servers participating in the hybrid configuration mustbe running the latest version (e.g., Exchange 2010 SP3 RU8 or Exchange 2013 CU7) or the prior version (e.g., Exchange 2010 SP3 RU7 or Exchange 2013 CU6) in order to maintain and ensure compatibility with Office 365. There are some required dependencies for hybrid deployments, so it’s even more critical you keep your software up to date if you choose to go hybrid.


Change Control


Change control is a critical process that is used to ensure an environment remains healthy. Change control enables you to build a process by which you can identify, approve, and reject proposed changes. It also provides a means by which you can develop a historical accounting of changes that occur. Often times I find that customers only leverage a change control process for “big ticket” items, and forego the change control process for what are deemed as “simple changes.”


In addition to building a change control process, it is also critical to ensure that all proposed changes are vetted in a lab environment that closely mirrors production, and includes any 3rdparty applications you have integrated (the number of times I have seen Exchange get updated and heard the integrated app has failed is non-zero, to use a developer’s phrase).


While lab environments provide a great means to validate the functionality of a proposed change, they often do not provide a view on the scalability impact of a change. One way to address this is to leverage a “slice in production” where a change is deployed to a subset of the user population. This subset of the user population can be isolated using a variety of means, depending on the technology (e.g., dedicated forests, dedicated hardware, etc.). Within Office 365, we use slices in productions a variety of different ways; for example, we leverage them to test (or what we call dogfood) new functionality prior to customer release and we use it as a First Releasemechanism so that customers can experience new functionality prior to worldwide deployment.


If you can’t build a scale impact lab, you should at a minimum build an environment that includes all of the component pieces you have in place, and make sure you keep it updated so you can validate changes within your core usage scenarios.


The other common theme I saw is bundling multiple changes together in a single change control request. While bundling multiple changes together may seem innocuous, when you are troubleshooting an issue, the last thing you want to do is make multiple changes. First, if the issue gets resolved, you do not know which particular change resolved the issue. Second, it is entirely possible the changes may exacerbate the current issue.


Complexity


Failure happens. There is no technology that can change that fact. Disks, servers, racks, network appliances, cables, power substations, pumps, generators, operating systems, applications, drivers, and other services – there is simply no part of an IT service that is not subject to failure.


This is why we use built-in redundancy to mitigate failures. Where one entity is likely to fail, two or more entities are used. This pattern can be observed in Web server arrays, disk arrays, front-end and back-end pools, and the like. But redundancy can be prohibitively expensive (as a simple multiplication of cost). For example, the cost and complexity of the SAN-based storage system that was at the heart of Exchange until the 2007 release, drove the Exchange Team to evolve Exchange to integrate key elements of storage directly into its architecture. Every SAN system and every disk will ultimately fail, and implementing a highly-redundant system using SAN technology is cost-prohibitive, so Exchange evolved from requiring expensive, scaled-up, high-performance storage systems, to being optimized for commodity scaled-out servers with commodity low-performance SAS/SATA drives in a JBOD configuration with commodity disk controllers. This architecture enables Exchange to be resilient to any storage failure.


By building a replication architecture into Exchange and optimizing Exchange for commodity hardware, failure modes are predictable from a hardware perspective, and that redundancy can removed from other hardware layers, as well. Redundant NICs, redundant power supplies, etc., can also be removed from the server hardware. Whether it is a disk, a controller, or a motherboard that fails, the end result is the same: another database copy is activated on another server.


The more complex the hardware or software architecture, the more unpredictable failure events can be. Managing failure at scale requires making recovery predictable, which drives the necessity for predictable failure modes. Examples of complex redundancy are active/passive network appliance pairs, aggregation points on a network with complex routing configurations, network teaming, RAID, multiple fiber pathways, and so forth.


Removing complex redundancy seems counter-intuitive – how can removing hardware redundancy increase availability? Moving away from complex redundancy models to a software-based redundancy model creates a predictable failure mode.


Several of my critsit escalations involved customers with complex architectures where components within the architecture were part of the systemic issue trying to be resolved:



  1. Load balancers were not configured to use round robin or least connection management for Exchange 2013. Customers that did implement least connection management, did not have the “slow start” feature enabled. Slow start ensures that when a server is returned to a load-balanced pool, it is not immediately flooded with connections. Instead, the connections are slowly ramped up on that server. If your load balancer does not provide a slow start function for least connection management, we strongly recommend using round robin connection management.

  2. Hypervisor hosts were not configured in accordance with vendor recommendations for large socket/pCPU machines.

  3. Firewalls between Exchange servers, Active Directory servers, or Lync servers. As discussed in Exchange, Firewalls, and Support…Oh, my!, Microsoft does not support configurations when Exchange servers have network port restrictions that interfere with communicating with other Exchange servers, Active Directory servers, or Lync servers.

  4. Ensuring the correct file-based anti-virus exclusions are in place.

  5. Deploying asymmetric designs in a “failover datacenter.” In all instances, there were fewer servers in the failover datacenter than the primary datacenter. The logic used in designing these architectures was that the failover datacenter would only be used during maintenance activities or during catastrophic events. The fundamental flaw in this logic is that it assumes there will not be 100% user activity. As a result, users are affected by higher response latencies, slower mail delivery, and other performance issues when the failover datacenter is activated.

  6. SSL offloading (another supported, but rarely recommended scenario) was not configured per our guidance.

  7. Storage area networks were not designed to deliver the capacity and IO requirements necessary to support the messaging environment. We have seen customers invest in tiered storage to help Exchange and other applications; however, due to the way the Extensible Storage Engine and the Managed Store work and the random nature of the requests being made, tiered storage is not beneficial for Exchange. The IO is simply not available when needed.


How can the complexity be reduced? For Exchange, we use predictable recovery models (for example, activation of a database copy). Our Preferred Architectureis designed to reduce complexity and deliver a symmetrical design that ensures that the user experience is maintained when failures occur.


Ignoring Recommendations


Another concerning trend I witnessed is that customers repeatedly ignored recommendations from their product vendors. There are many reasons I’ve heard to explain away why a vendor’s advice about configuring or managing their own product was ignored, but it’s rare to see a case where a customer honestly knows more about how a vendor’s product works than does the vendor. If the vendor tells you to configure X or update to version Y, chances are they are telling you for a reason, and you would be wise to follow that advice and not ignore it.


Microsoft’s recommendations are grounded upon data- the data we collect during a support call, the data we collect during a Risk Assessment, and the data we get from you. All of this data is analyzed before recommendations are made. And because we have a lot of customers, the collective learnings we get from you plays a big part.


Deployment Practices


When deploying a new version of software, whether it's Exchange or another product, it's important to follow an appropriate deployment plan. Customers that don't take on the unnecessary risk of running into unexpected issues during the deployment.


Proper planning of an Exchange deployment is imperative. At a minimum, any deployment plan you use should include the following steps:



  1. Identify the business and technical requirements that need to be solved.

  2. You'll need to know your peak usage time(s) and you will collect IO and message profile data during your peak usage time(s).

  3. Design a solution based on the requirements and data collected.

  4. Then, you use the Exchange Server Role Requirements Calculator to model the design based on this collected data and any extrapolations required for your design.

  5. Then, you'll procure the necessary hardware based on the calculator output and leverage the advice of your hardware vendor.

  6. Next, you'll configure the hardware according to your design.

  7. Before going into production, you'll validate the storage system with Jetstress (following the recommendations in the Jetstress Field Guide) to verify that your storage configuration can meet the requirements defined in the calculator.

  8. One the hardware has been validated you can deploy a pilot that mirrors your expected production load.

  9. Be sure to collect performance data and analyze it. Verify that the data matches your theoretical projections. If the pilot requires additional hardware to meet the demands of the user base, optimize the design accordingly.

  10. Deploy the optimized design and start onboarding the remainder of your users.

  11. Continue collecting data and analyzing it, and adjust if changes occur.


The last step is important. Far too often, I see customers implement an architecture and then question why the system is overloaded. The landscape is constantly evolving. Years ago, bring your own device (BYOD) was not an option in many customer environments, whereas, now it is becoming the norm. As a result, your messaging environment is constantly changing – users are adapting to the larger mailbox quotas, the proliferation of devices, the capabilities within the devices, etc. These changes affect your design and can consume more resources. In order to account for this, you must baseline, monitor, and evaluate how the system is performing and make changes, if necessary.


Historical Data


To run a successful service at any scale, you must be able to monitor the solution to not only identify issues as they occur in real-time, but to also proactively predict and trend how the user base or user base activity is growing. Performance, event log and protocol logging data provides two valuable functions:



  1. It allows you to trend and determine how your users’ message profile evolves over time.

  2. When an issue occurs, it allows you to go back in time and see whether there were indicators that were missed.


The data collected can also be used to build intelligent reports that expose the overall health of the environment. These reports can then be shared at monthly service reviews that outline the health and metrics, actions taken within the last month, plans for the next month, issues occurring within the environment and steps being taken to resolve the issues.


If you do not have a monitoring solution capable of collecting and storing historical data, you can still collect the data you need.



  • Exchange 2013 captures performance data automatically and stores it in the Microsoft\Exchange Server \V15\Logging\Diagnostics\DailyPerformanceLogs folder. If you are not running Exchange 2013, you can use Experfwiz to capture the data.

  • Event logs capture all relevant events that Exchange writes natively. Unfortunately, I often see customers configure Event logs to flush after a short period of time (one day). Event logs should collect and retain information for one week at a minimum.

  • Exchange automatically writes a ton of useful information into protocol logs that can tell you how your users and their devices behave. Log Parser Studio 2.2 provides means to interact with this data easily.

  • Message tracking data is stored on Hub Transport servers and/or Mailbox servers and provides a wealth of information on the message flow in an environment.


Summary


As I said when at the beginning of this article, many of these customer issues could have been avoided by taking sensible, proactive steps. I hope this article inspires you to investigate how many of these might affect your environments, and more importantly, to take steps to resolve them, before you are my next critsit escalation.


Ross Smith IV

Principal Program Manager

Office 365 Customer Experience







from Exchange News Full Article

msexchange.org: How to plan your upgrade to BES12 cleverly?





from Exchange News Full Article

msexchange.org: The smart way to BES 12





from Exchange News Full Article

MSExchange.org: Exchange Server 2013 Backup and Restore 101 - Disabled mailboxes (Part 4)

How to retrieve information from removed mailboxes and refresh disconnected mailboxes in Exchange Server 2013.



from Exchange News Full Article

Tuesday, January 6, 2015

MSExchange.org: Planning and Migrating a Small Organization from Exchange 2003 to Exchange 2013 (Part 18)

In this part of the series we will focus on migrating mailboxes to Exchange Server 2013.



from Exchange News Full Article

msexchange.org: Increase MSP Margins: Develop New Remote Services with GSX Solutions





from Exchange News Full Article

msexchange.org: Azure Active Directory for the Old-School AD Admin

Greetings! Hilde here to wish you a Happy New Year and to welcome you to the first Monday of 2015 and the first post of 2015 for AskPFEPlat! As you may know from reading my posts here, I tend to reminisce. Well it's the New Year, so here I go again … Anyone out there remember the "Distributed Systems Guide" from the Windows 2000 Resource Kit series of books? Chances are if you are an old-school AD admin, you read it cover to cover more than once. Pound for pound, that book is one of my top IT books EVER (and heaviest). I still learn something every time I open it. KUDOS to the numerous authors who had a hand in its creation (some of whom I've been privileged enough to work with). I still like tangible "hold in my hand" books and I would love an update to that one but the way book publishing has changed, I don't see that happening.



from Exchange News Full Article