Docstoc

DNS_ 95

Document Sample
DNS_ 95 Powered By Docstoc
					Index
Note to the Reader: Throughout this index boldfaced page numbers indicate primary discussions of a topic. Italicized
page numbers indicate illustrations.

A                                         AdminDisplayVersion property, 85           Authoritative Domain. Email is
A/C privileged message classification,     administration                               delivered to a recipient option, 269




                                                                                     AL
   105                                        Security Configuration Wizard           authoritative domains, 268–270, 269
Accepted Domains tab, 269–270                   options, 271                         auto-attendant, 146
accidental breach of confidentiality           Unified Messaging servers for, 141      autocratic management style, 32
   disclaimers, 106                       advisory skills for consulting,            Autodiscover service, 278




                                                                              RI
accountant services for consulting          365–370                                  availability, 326
   businesses, 376                        agreement as change resistance tactic,         CCR, 327, 327, 333–336,
Achievable characteristic in SMART,          189                                           333–334




                                                                       TE
   54                                     alerts, 347–349                                LCR, 326–332, 327, 329,
action plans for troubleshooting,         aligning                                         331–332
    357–358                                    IT with business values, 4–5              SCR, 327–328, 328, 336–338, 338
Action tab, 348
actionable items from high-level goals,
    37–38
                                               objectives, 157MA
                                          AllowMerge parameter, 282–284
                                          alternate server recovery method, 324
                                                                                         Unified Messaging servers, 144


Active Directory (AD), 90–91              alternative solutions in business cases,
                                                                                     B
    backups, 318                                                                     background in business cases, 162
                                            168                                      backups, 318–319
    in deployment, 245                    analyses
                                                      ED

    DNS, 95                                                                              checking, 406
                                              in business cases, 167–168,
    domains                                                                              messaging records management,
                                                170–172, 399–400                            99
        authoritative, 268–270, 269           organizational structures, 27–34,
        design, 94, 94                                                                   methods, 320
                                                  28–31
                                              HT


        new organizations, 251                                                           monitoring, 340
                                          analytical skills for change                   operations, 319–320
    forests                                 management, 197
        design, 93–94                                                                    restoring, 321–322
                                          Analyzing Configuration page, 333               third-party, 324
        Large Organization model          antispam features
                                          IG




           deployment, 250                                                               in troubleshooting, 353
                                              Edge Transport servers, 126,           balancing needs in scope
        mailbox moves across,                     132–134
             281–283                                                                    determinations, 56, 56
                                              Hub Transport serves, 267              Bank of America, 110
                                      R




           mailbox moves within,
                                          antivirus (AV) features                    bank robber case, 61–62
             280–281                          checking, 410                          banker services for consulting
                                   PY




          new organizations, 251
          Standard Organization model         Edge Transport servers, 126,              businesses, 376
            deployment, 249                       132–134                            Basel II, 44
     hardware requirements, 95–96         application logs                           baselines
                                               Event Viewer, 341, 341
                         CO




     schema preparation, 92                                                              ExBPA scans, 304
     site and replication topology,            in installation, 267                      implementation schedules, 74
          94–95                                monitoring, 358                           performance, 344
     transitioning settings, 254          appreciation, expressing, 17, 65               in troubleshooting, 353–354
     with Unified Messaging servers        archiving. See mail archiving              basic deployment checks, 243–247
        141, 146                          ‘‘as-is’’ analysis, 47                     Bay of Pigs invasion, 11–12
     uses, 91–92                          ‘‘as needed’’ messaging system tasks,      bedside manner, 366
ActiveSync                                   343–345, 344                            benchmarks. See objectives
     Client Access server                 assumptions                                benefits in business case proposals,
        considerations, 123–124                in business cases, 157, 159, 162         157–158, 168–170, 398
     deployment, 277–278                       in scope statements, 57, 69–70        Benne, Kenneth, 199
     postinstallation tasks, 273          ‘‘attachment removed’’ message             Bennis, Warren, 199
activities in planning, 62                   classifications, 105                     Berra, Yogi, 301
Add Counters dialog box, 347–349,         attorney/client privileged message         bidirectional address rewriting, 132
    347                                      classification, 105                      biographical sketches, 377
Add Nodes Wizard, 334–335                 audience issues for presentations, 178     blogs for marketing, 382–383
added-value criteria, 207                 audit policies, 271                        body of knowledge for change
address rewriting, 129–132                auditory learners, 215                        management, 183
416   BOOKKEEPER SERVICES    •   COMFORT LEVELS FOR OUTSOURCED SERVICES



      bookkeeper services, 377                    information sources, 35–36              summary, 203–204
      boundaries in business case, 163–164        messaging, 44–45                        system skills, 199
      Branch Office business model, 27             personnel and training                  in troubleshooting, 353
      breach of confidentiality disclaimers,          assessment, 42–43                Change or Remove Programs page
         106                                      priorities, 36                          Exchange Server removal, 290
      brick-level backups, 324                    regulatory, 43–44                       server roles, 288
      ‘‘bring me a rock’’ school of               risk management, 39                 change request processes, 221
         leadership, 18–19                        stakeholder interviews, 37              authority for, 224–225, 224
      budgets, 8                                  summary, 48                             building, 222–223
           in planning, 62                        system features, 34–35, 35              case study, 236–238, 237
           in statements of work, 70          business skills                             cause analysis, 232
      Building the IT Consulting Practice         change management, 199                  change request form template,
         (Freedman), 373                          consulting, 371–372                         401–403
      builds, 85–86                           business value, 3–7                         decisions, 227–229
      Bush, George W., arrogance of, 196                                                  delegating tasks, 231–232
      business cases, 155–156                                                             after deployment, 238–239
           benefits, 157–158, 168–170, 398     C                                           determinants, 223, 224
           conclusions and                    call notification, 145                       disruptions, 231–232
             recommendations, 174, 400        CALs (client access licenses), 85,          documentation, 233, 234
           contingencies, 158, 174, 400           103–104                                 enforcing, 233–235, 295
           cost-benefit analyses, 170–172,     capacity                                    evaluating requests, 226
            399–400                               disk, 87–88                             impact determination, 226–227
          costs, 157–158, 166–168,                Edge Transport servers, 128             notifications and follow-up,
            397–398                               planning, 343, 411                          229–230
          double-checking, 174–175            Carr, Nicholas, 3                           overview, 222
          executive summaries, 161, 395       case study for change management            receiving requests, 225–226
          introduction, 162–163, 395–396        process, 236–238, 237                     summary, 239
          making, 156–158                     Castro, Fidel, 11                           summing required work, 226
          methods, 163–166, 396–397           CBAM (Concerns-Based Adoption               triple constraints, 223, 224, 227,
          nonfinancial purposes, 163             Model), 192–193                               229–230
          overview, 156                       CCR (cluster continuous replication),   channels in Unified Messaging
          presenting, 175–178                   138–139, 325, 327, 327, 333              servers, 147
          return on investment, 171–172           failover clusters, 333–336,         Chin, Robert, 199
          risks, 158, 173–174, 400                   333–334                          classifications for messages, 105–106
          sensitivities, 158, 173, 400            multiple server roles, 149          client access licenses (CALs), 85,
          summary, 178–179                    change control boards, 227–228            103–104
          supplemental documentation, 175     change curve, 184, 184                  Client Access servers (CAS), 122–125,
          template, 160–161                   change management, 181                    123
          tips and hints, 158–159                 analytical skills, 197                   new organizations, 251
      business-oriented approach, 1               business skills, 199                     postinstallation tasks, 273–275
          business value, 3–7                     change agent overview, 195–196           ratios, 151–152
          development, 2–3                        changes in                               setup, 261, 265
          nontechnical managers, 7–9                  adopting, 191–195, 194               sizing, 148
          project team management. See                obstacles, 187–190                   transitioning, 255
             project teams                            principles, 183–187, 184,       client features, SCW for, 271
          summary, 19                                   186, 190–191, 190             Client Service Location (CSL)
      business requirements, 21–22                    stopping, 236                        Large Organization model
          actionable items, 37–38                 defined, 182–183                             deployment, 250
          analyzing, 22–23                        empirical-rational strategy,             Standard Organization model
          confirming, 39–40                           199–200                                  deployment, 249
          current business model, 23               environmental-adaptive strategy,   Client Settings page, 263, 263
               company model and                     201–202                          clothing for presentations, 177
                  geographic scope, 27             guidelines, 296                    cluster continuous replication (CCR),
               organizational structures,          implementation, 294–295               325, 327, 327, 333
                  27–34, 28–31                     normative-reeducative strategy,         failover clusters, 333–336,
               processes, 23–26                      200–201                                  333–334
          data flow diagrams, 42, 43                overview, 182                          multiple server roles, 149
          dependencies identification,              people skills, 197–199             Cluster Service Account page,
            40–42                                  political skills, 196–197             334–335
          determining, 33                          power-coercive strategy, 201       clustered mailbox servers, 338
          gap analysis, 47–48                      in SLAs, 117                       clusters, failover, 333–336, 333–334
          growth forecasting and planning,         strategy selection, 203            comfort levels for outsourced services,
            45–46                                  success indicators, 297              118–119
                                                   COMMUNICATION      •   DEPARTMENT OF JUSTICE ORGANIZATION CHART           417



communication, 9                             business skills, 371–372              criticism in change resistance, 188
    business processes, 25                   communication skills, 372–373         CSL (Client Service Location)
    consulting skills, 372–373               finances, 374–377                           Large Organization model
    nontechnical managers, 7–8               free experience, 373                          deployment, 250
    project team management, 14–15           functions, 362                             Standard Organization model
    system features, 34–35, 35               marketing, 377–383                            deployment, 249
    tips, 212                                overview, 361–362                     Cuban missile crisis, 12
    for user expectations, 209–212           personality for, 363–364              cultural resistance to change, 187
communication ports in Edge                  professional conduct, 383–384         Custom Server Installation option,
  Transport servers, 129–130                 starting, 373–374                        262
company confidential message                  success factors, 362–363              Customer Feedback page, 261, 261
  classification, 105                         summary, 384–385                      customer relationships, 33
company internal message                     technical skills, 370–371
  classification, 105                     contacts in SLAs, 117
company models                           Content Filter agent, 133–134             D
    analyzing, 27                        contingencies in business cases, 158,     daily messaging system tasks, 339
    selecting, 247–250, 247                174, 400                                    backups monitoring, 340
company politics, 33–34                  contingency time in implementation            checklist, 406–409
Completion page                            schedules, 74                               disk space checks, 340
    authoritative domains, 269–270       continuous replication, 138–139,              Event Viewer checks, 341, 341
    Exchange Server removal, 290           325–326                                     network performance monitoring,
    mailbox moves, 280                       CCR, 325, 327, 327, 333                      342–343
    server roles, 288–289                       failover clusters, 333–336,             operating system monitoring, 342
    Setup Wizard, 264                              333–334                              physical environment, 340
Complex organization model                      multiple server roles, 149              server performance monitoring,
  deployment, 250                            LCR, 325–326, 328                            342
compliance, 96                                  memory recommendations,            Darwin, Charles, 221
    disclaimers, 106–109                           151                             data flow diagrams (DFDs), 42, 43
    Exchange Hosted Services, 104               processor recommendations,         data processing centers, 2
    journaling, 101–103, 102                       149                             data protection, 315–316
    laws, 96–97                                 storage groups, 328–329,           data retention. See compliance
    licensing, 103–104                             329                             Database Portability option, 322
    mail archiving, 111–112                      transport dumpster                Database Recovery Management tool,
    managed folders, 100–101                        configuration, 331–332,           304–305, 305
    message classifications, 105–106                332                             Database Troubleshooter tool,
    messaging records management,             monitoring, 345–346                      305–306
        98–99                                 new feature, 79                      databases
    regulatory requirements, 43–44            SCR, 325, 327–328, 328                   backups, 318
    transport rules, 99–100, 101                   Mailbox servers, 138–139            checking, 408
computing environment                              managing, 336–337                   LCRs, 330–331, 330
  improvements, 358                                new feature, 79                     recovering, 304–306, 305, 323
Concerns-Based Adoption Model            contract termination procedures in        deadlines, user expectations for, 206
  (CBAM), 192–193                           SLAs, 117                              decentralized business unit
conclusions in business cases, 174,      control                                     organizational structure, 30, 30
  400                                         change management, 183               decisions
confidentiality breaches disclaimers,          need for, 185                            business processes, 26
  106                                         and ownership, 32                        change request processes,
confidentiality requirements, 97          Control Panel, 284–288, 287                      227–229
configuration management, 183             Cooley, Mason, 205                        deflection as change resistance tactic,
configuration tools, 302–304, 303         copy backups, 319                           189
conformity in group think, 11            copying transaction logs, 326             degree of change factor, 203
confusion as change resistance tactic,   cost reductions, Unified Messaging         delayed fan-out, 91
  188                                       servers for, 141                       delays, procurement, 68
Connectivity Test scans, 304             cost-savings examples in business         delegating change management tasks,
consolidation                               cases, 171                                 231–232
    address rewriting for, 130–131       costs                                     Deleted items folder, 98
    Unified Messaging servers for, 141         in business cases, 157–158,          Deming, W. Edwards
constraints                                      166–168, 170–172, 397–400             Out of the Crisis, 371
    change request processes, 223,            discovery, 110–111                       quoted, 181
      224, 227, 229–230                  CPU utilization tracking, 348–349,        denial as change resistance tactic, 189
    scope statements, 55, 57                406–407                                denial-of-service (DoS) attacks, 309
consulting, 361                          Creating the Cluster page, 334            Department of Justice organization
    advisory skills, 365–370             critical success factors, 36                chart, 28, 28
418   DEPENDENCIES    •   EVENTTRIGGERS.EXE TOOL



      dependencies                            Direct Push mechanism with firewalls,        deployment requirements,
          in change management, 203              277                                        134–135, 135
          identifying, 40–42                  direction in team management, 18–19         Edge Subscription considerations,
          implementation schedules, 74        Disable-StorageGroupCopy cmdlet,              128–129
      deployment, 241                            336                                      existing Exchange 2003
          basic checks, 243–247               disaster recovery, 314–315                    organizations, 136–137
          change management                       backups, 318–320                        new organizations, 251
            implementation, 294–297               continuous replication, 325–326         postinstallation tasks, 274–275
          Edge Transport servers, 134–135,        data protection, 315–318                ratios, 152
            135                                   design documents options, 71–72         security, 129–130, 135, 135
          Exchange Server removal,                mailbox server failures, 322–323        server capacity considerations,
            290–292                               mailboxes and individual items,           128
          installation                                324                                 setup, 261, 265
               modifying, 285–287, 287            restores, 320–321
                                                  scenarios, 316–317                      topology considerations,
               with Service Pack 1,                                                         127–128
                 258–266, 259–264                 single and multiple database
                                                     failures, 323                         transitioning, 255
               verification, 266–268, 266                                                   transport features, 128
          last Exchange Server removal,           storage group recovery, 324–325
                                                  testing, 343                             version mismatches, 85–86
            292–294                                                                   Edison, Thomas A., 121
          lessons learned, 297–299                tools, 304–307, 305
                                              discipline in team management,          edition considerations, 84
          mail archiving, 113–114                                                     education for user expectations,
          mailbox moves. See moving
                                                   12–13
                                              disclaimers, 106–109                      213–219
             mailboxes                        discovery                               Eisenhower, Dwight D., 244–245
          migration, 256–257                      costs, 110–111                      email archiving. See mail archiving
          new organizations, 250–252              judicial, 111–112                   email loops, 309
          organization model selection,           requests, 97                        empirical-rational change strategy,
             247–250, 247                     disk storage                              199–200
          postinstallation tasks. See             requirements, 87–90                 employee, starting consulting as,
             postinstallation tasks               usage tracking, 340, 349–350, 407      373
          server modification and removal,     disruptions in change request           employee productivity, 141–142
            284                                  processes, 231–232                   Enable-StorageGroupCopy cmdlet,
          server roles removal, 287–289       documentation                              336
          summary, 299                            change management processes,        End-to-End Scenario tab, 274–275
          tips, 257–258                              233, 234, 358
          transitioning, 252–256, 253                                                 enforcing change management
                                                  troubleshooting, 357–358               processes, 233–235, 295
          Unified Messaging servers,           Domain Name System (DNS), 95
            146–147                                                                   Enter Product Key Wizard, 272
                                                  authoritative domains, 269          entering into contracts, disclaimers
           upgrading, 241–243                     in deployment, 246
      deployment team communication, 211                                                 for, 106
                                                  new organizations, 251
      design documents, 70–71                 domains, Active Directory               Enterprise Voice, 145
           design decisions, 71                   authoritative, 268–270, 269         environment settings in transitioning,
           disaster recovery options, 71–72       design, 94, 94                         252–254, 253
           structure, 72–73                       new organizations, 251              environmental-adaptive change
      designer services for consulting        DoS (denial-of-service) attacks, 309       strategy, 201–202
         businesses, 376                      Drucker, Peter, Management, 371         environmental checks, 240, 406
      details                                                                         equipment
           business case presentations, 178                                                consulting, 375–376
           requirements, 22
                                              E                                            in SLAs, 118
                                              E-mail Addresses tab, 279               error messages in troubleshooting,
      Details Templates Editor, 304           E-mail Addresses (Policy) tab, 294
      detect model, 351–352, 351                                                         352–353
                                              early adopters of change, 194
           plan execution, 355–356            early majority adopters of change,      ESRP (Exchange Solution Reviewed
           problem discovery, 352                  194–195                               Program), 310
           problem symptoms, 352–354          easy agreement as change resistance     ethical walls, 97
           solution testing, 355                tactic, 189                           ethics, 383–384
           system history review, 354–355     Edge Subscriptions, 128–129             European Union Data Protection
      Deutsche Bank Securities Inc., 111      Edge Transport servers, 125–127, 126       Directive (EUDPD), 97
      Device Manager, 354                         address rewriting, 129–132          Event Comb tool, 341
      dial tone portability, 323                  agents, 268                         Event Viewer
      die-on-the-vine strategy, 202               antispam and antivirus features,         checking, 341, 341, 407
      differential backups, 319–320                   132–134                              in installation, 267
      diplomacy in team management,                 authoritative domain                   in troubleshooting, 353
        14–15                                         configuration, 270               Eventtriggers.exe tool, 341
                                          EXCHANGE 2000 FEATURES REMOVED AND NOT SUPPORTED                •   HIGH AVAILABILITY   419



Exchange 2000 features removed and          ExSetup program, 284                      functional organizational structure, 29,
  not supported, 292                        Extensible Storage Engine (ESE), 306,         29
Exchange ActiveSync                           323                                     fund sources, 374–375
    Client Access server                    external dependencies, 40–42
      considerations, 123–124
    deployment, 277–278                                                               G
    postinstallation tasks, 273
                                            F                                         Gainer, Jeff, 208
                                            failed felon case, 61–62                  Gantt, Henry Laurence, 68
Exchange continuous replication             failover clusters, 333–336, 333–334
  (ECR). See continuous replication                                                   Gantt Charts, 68, 73–74
                                            families as revenue source, 375           gathering information in
Exchange database checking, 408             fan-out, delayed, 91
Exchange Enterprise CALs, 104                                                            troubleshooting, 352
                                            fear issues in change management,         General System Theory, 199
Exchange Hosted Services, 104                   186–187
Exchange Load Generator, 90                                                           General tab for alerts, 347, 349
                                            features                                  geographic organizational structure,
Exchange Maintenance Mode page                  removed and not supported, 292
    Exchange Server removal, 290–291                                                     30, 30
                                                in trade-off triangle, 56, 56         geographic scope analysis, 27
    server roles, 286, 288–289              filters, antispam and antivirus,
Exchange Management Console                                                           geographical factors in scope
                                                132–133                                  statements, 55
    authoritative domains, 269–270,         Finalize Deployment tab, 272–274,
      269                                                                             Get-ExchangeServer cmdlet, 86, 266
                                                272–273                               Get-SetupLog.ps14 script, 267
    LCR, 328–332                            finances
    mailbox moves, 280                                                                Get-StorageGroupCopyStatus cmdlet,
                                                consulting businesses, 374–377           337
    postinstallation tasks, 272–275,            in SLAs, 117
      272–273                                                                         Get-TransportConfig cmdlet, 332
                                            Financial Institution Privacy             Getting Started in Consulting (Weiss),
    storage groups, 329                       Protection Act, 97
Exchange Management Shell                                                                373
                                            financial models in business case,         global catalog (GC) server placement,
    authoritative domains, 270                  166–167
    mailbox moves, 281–283                                                                95–96
                                            Financial Modernization Act, 97           Global Settings tab, 332
    storage groups, 329                     financial projections in business cases,
Exchange Organization page, 263                                                       global thermonuclear war case, 230
                                                170–171                               goals
Exchange Server 2007 Setup Wizard,          firewalls, Direct Push with, 277
  258–264, 259–264                                                                         actionable items from, 37–38
                                            firmware revisions, 354–355                     in change management, 187
Exchange Server Best Practices              fiscal responsibility, 5–6
  Analyzer (ExBPA) tool                                                                    in planning, 62–65
                                            focus groups, 38                               priorities, 36
    organizational analysis, 247            folders
    overview, 302–304, 303                                                                 project team, 16, 389
                                                 deleted items, 98                         in scope statements, 55, 67
    postinstallation tasks, 272–273,             managed, 100–101
      273                                                                             Goldman Sachs & Co., 111
                                                 public. See public folders           Gramm-Leach-Bliley Act, 44, 97
    transitioning readiness checks, 252     follow-up in change request processes,
Exchange Server Database Utilities                                                    group consolidation, address
                                                229–230                                  rewriting for, 130–131
  (Eseutil.exe) tool, 306–307               Forefront Security product, 273
Exchange Server Stress and                                                            group think, 11–12
                                            forests, Active Directory                 growth, forecasting and planning,
  Performance (ESP) tool, 90,                    design, 93–94
  313–314                                        Large Organization model
                                                                                          45–46
Exchange Server System Monitor, 347                deployment, 250
Exchange Server User Monitor                     mailbox moves across, 281–283        H
  (ExMon), 313                                   mailbox moves within, 280–281        hard benefits in business case, 169
Exchange Standard CALs, 104                      new organizations, 251               hardware
Exchange Troubleshooting Assistant               Standard Organization model              Active Directory, 95–96
  (ExTrA), 311–312, 312                            deployment, 249                        deployment, 245
Exchange View Only administrators           formal power, 196                             problems, 316, 355
  group, 266                                FQDNs (fully qualified domain                  procurement delays, 68
ExchangeSetup.log file, 267                     names), 269                                requirements, 81–82
ExchangeVersion property, 86                Franklin, Aretha, 16                          storage technology, 88–89
executive summaries in business             Franklin, Benjamin, 49                    hardware-based snapshot backup sets,
  cases, 161, 395                           free work, 379–380                            323
expectations                                Freedman, Rick, Building the IT           Health Check scans, 304
    business case presentations, 178           Consulting Practice, 373               Health Insurance Portability and
    change management, 186                  Friedman, Milton, 1                         Accountability Act (HIPAA), 44, 97
    user. See user expectations             frivolous change requests, 232            Heinlein, Robert A., 361, 371
expenses, consulting, 374                   full backups, 319                         helicopters case, 41–42
expertise factor in change                  full server recovery, 322                 high availability, 326
  management, 203                           fully qualified domain names                    CCR, 327, 327, 333–336,
exposure factor in risk, 70                    (FQDNs), 269                                     333–334
420   HIGH AVAILABILITY    •   MAGAZINES FOR BUSINESS INFORMATION



           LCR, 326–332, 327, 329,             Information Store Integrity Checker       L
             331–332                              (Isinteg.exe), 306–307, 345            laggards in change adoption, 195
           SCR, 327–328, 328, 336–338, 338     infrastructure requirements, 21, 82–83    Lambert-St. Louis International
           Unified Messaging servers, 144       innovators and change, 194                   Airport runway, 6–7
      HIV letter, 296–297                      inputs in planning process, 60            Land Rover case, 39–40
      Hoare, Charles Anthony Richard, 77       InstallAntiSpamAgents.ps1 script, 267     Large Organization model
      home equity loans as revenue source,     installation                                 deployment, 249–250
        374                                         deployment. See deployment           Larson, Elliott, 205
      honesty                                       modifying, 285–287, 287              last legacy Exchange Server removal,
          business cases, 159                       with Service Pack 1, 258–266,            292–294
          communication, 212                          259–264                            late majority adopters of change, 195
      hosted solutions for mail archiving,          verifying, 266–268, 266              lawyer services for consulting
          114                                  installation paths, 80                       businesses, 376
      hot fixes, checking, 411                  Installation Type page, 261, 261          LCR. See local continuous replication
      Howser, Dick, 364                        insurance agent services for consulting      (LCR)
      Hub Transport servers, 137                  businesses, 376                        League of Nations, 181
          Active Directory for, 91             intangible benefits in business cases,     learning styles, 215–216
          agents, 267                              169–170                               Lebow, Rob, 377
          mail flow, 100, 101                   integrity in consulting, 383              legacy streaming backups and
          new organizations, 251–252           interim objectives in planning, 65           restores, 320
          postinstallation tasks, 274–275      internal dependencies, 40–42              legal issues. See compliance
          ratios, 151–152                      Internal Revenue Service (IRS) image,     lessons learned
          setup, 261, 265                         198                                          deployment, 297–299
          transport dumpster, 331–332,         International business model, 27                meeting agenda, 413
                332                            Internet for business information, 372    Lewin, Kurt, 190
      humor in presentations, 178              Internet mail flow in Exchange Server      libraries for business information, 371
      Hunt Group objects, 146                     removal, 293                           License Agreement page, 260, 260
                                               interoperability in Lotus Notes           licensing
      I                                           migration, 256–257                           compliance features, 103–104
      IBM Olympic game systems, 235            interpersonal relationships in team             considerations, 84–85
      IIS log and performance checking,           effectiveness, 392                           in installation, 260, 260
         407–408                               Introduction page                         lifetimes in business processes, 25–26
      image products, 378                           mailbox moves, 280                   lines of credit, 374
      IMAP4 considerations, 124                     Setup Wizard, 260                    listening skills for team management,
      immediate criticism in change            introduction sections in business            17
         resistance, 188                          cases, 162–163, 395–396                Load Generator utility, 311
      impact determination                     investors as revenue source, 375          loans, home equity, 374
           change request processes,           IP Address page, 334                      local continuous replication (LCR),
                226–227                        IP Gateway objects, 146–147                  138–139, 325–328
           risk, 70                            IPv6 receive connectors, 133                    databases and public folders,
      implementation documents, 73             IRS (Internal Revenue Service) image,              330–331, 330
           plans, 74–75                           198                                          memory recommendations, 151
           schedules, 73–74                    isolating problems, 355                         new feature, 79
      implementation plans, 50                 Israel, Shel, Naked Conversations, 382          processor recommendations, 149
      in-house services                                                                        storage groups, 328–329, 329
           archiving, 114                                                                      transport dumpster configuration,
           vs. outsourced, 114–115             J                                                  331–332, 332
      in-place upgrades, 81, 242–243, 248,     Jaikumar, Jai, 3                          logical unit numbers (LUNs), 87
         252, 257, 278                         Janis, Irving L., 11–12                   logs
      incentives for change, 188               jargon, 8                                       checking, 407–409
      incident reports, 410                    Jetstress tool, 90, 310                         Event Viewer, 341, 341
      inclusion, need for, 185                 Johnson, Lyndon B., 187, 233                    installation, 267
      incompatible software, 353               journaling, 98, 101–103, 102                    monitoring, 342, 347, 358
      incremental backups, 319                 judicial discovery, 111–112                     transaction, 326
      individual mailbox recovery, 324                                                         in troubleshooting, 353
      Industrial Revolution, 208                                                         London Post, 202
      ineffective organizational structures,   K                                         loss curve for changes, 185–186, 186
          31                                   Kauffman, Ewing, 364                      Lotus Notes, migration from, 256–257
      informal power, 196–197                  Kennedy, John F., 11–12                   lowest-cost routes, 91–92
      information flow in business              Kennedy, Robert, 12
         processes, 24–25                      kinesthetic learners, 216                 M
      information source identification,        knowledge control, archiving for, 113     magazines for business information,
          35–36                                Krekeler, John, 7                          371
                                                                                         MAIL ARCHIVING   •   NETWORKS    421



mail archiving, 102, 109–110             measurements                              module size for server role memory,
    for compliance, 111–112                  in business cases, 159                 149
    deploying, 113–114                       team effectiveness, 387–392           MOM (Microsoft Operations
    for discovery process, 110–112       media kits, 377–378                        Manager), 340–341
    for knowledge control, 113           meetings                                  monitoring
    for performance, 113                     lessons learned, 298, 413                backups, 340
    planning considerations, 113             project team management, 13–14           continuous replication, 345–346
    storage management, 112                  scope statement validation, 58–59        logs, 342, 347, 358
mail flow                                     status, 210                              network performance, 342–343
    checking, 409                        memory                                       operating system, 342
    tools, 307–310, 308                      server roles, 149–151                    server performance, 342
Mail Flow Troubleshooter tool, 308,          usage tracking, 347–348, 347,         monthly consulting expenses, 374
  308                                           406–407                            monthly operations
Mailbox Manager Settings (Policy) tab,   mergers and acquisitions, address            checklist, 411
 294                                       rewriting for, 131                         messaging system tasks, 343
Mailbox servers, 137–139, 138            merging mailboxes, 283–284                morality in group think, 11
    failure recovery, 322–323            Message Tracking tool, 309                Morgan Stanley, 111
    memory considerations, 150–151       messages                                  Move-DatabasePath cmdlet, 337
    new organizations, 251–252               classifications, 105–106               Move-Mailbox cmdlet, 279–284
    postinstallation tasks, 273–275          path checking, 409                    Move Mailbox page, 280
    ratios, 151–152                      messaging records management              Move Mailbox Wizard, 279–280
    setup, 261, 265                        (MRM), 98–99                            Move Options page, 280
    sizing, 149                          messaging requirements, 44–45             Move Schedule page, 280
mailboxes                                messaging system management,              Move-StorageGroupPath cmdlet, 336
    databases for LCR, 330–331, 330        338–339                                 moving mailboxes, 278
    housekeeping tasks, 343, 344            ‘‘as needed’’ tasks, 343–345, 344         across forests, 281–283
    merging, 283–284                        continuous replication                    merging, 283–284
    moving. See moving mailboxes               monitoring, 345–346                    shared and resource, 279–280
    recovering, 324                         daily tasks, 339–343, 341                 within single forests, 280–281
    size calculations, 88                   monthly tasks, 343                        strategies, 278–279
Majority Node Set quorum, 335               weekly tasks, 343                         tools, 279
malicious compliance as change           methods in business case, 163–166,        MRM (messaging records
 resistance, 189                           396–397                                  management), 98–99
malpractice suits, 366                   Microsoft Exchange Server Best            MSExchangeSetup, 267
man-made disasters, 316                    Practices Analyzer Tool (ExBPA)         multiple database failure recovery,
managed folders, 100–101                    organizational analysis, 247               323
Management (Drucker), 371                   overview, 302–304, 303                 multiple forests, 93
management information systems              postinstallation tasks, 272–273,       multiple server roles
 (MISs), 2                                     273                                    memory recommendations, 151
management models, 32                        transitioning readiness checks, 252      processor recommendations, 149
management of change (MOC). See          Microsoft Identity Integration Server     Murdoch, Rupert, 202
 change request processes                  (MIIS), 250                             Murphy Oil USA v. Flour Daniel, 110
MAPI Client performance checking,        Microsoft Operations Manager
 408                                       (MOM), 340–341
marketing for consulting, 377            migration, 242–243                        N
    blogs, 382–383                           from Exchange Server 5.5, 257         Naked Conversations (Scoble and
    free work, 379–380                       from Lotus Notes, 256–257               Israel), 382
    image products, 378                      mailbox moves, 278                    National Association of Securities
    media kits, 377–378                  milestones. See objectives                  Dealers, 96–97
    networking, 379                      mindguards in group think, 11             National business model, 27
    newsletters, 381–382                 MISs (management information              needs issues
    passive, 380                           systems), 2                                 change management, 185
    public speaking, 381                 missile attack case, 230                      scope determinations, 56, 56
    writing and publishing, 380–381      missile crisis, 12                        negligent misstatements, disclaimers
Masefield, John, 65                       misstatements, disclaimers for,             for, 106
matrix organizational structure, 29,       106–107                                 nervousness issues in presentations,
  29                                     mobile devices, 277                         178
Maurer, Rick, 188                        MOC (management of change). See           Network Monitor, 342
MaxDumpsterSizePerStorageGroup             change request processes                networking in marketing, 379
 parameter, 331                          moderate resistance to change, 188        networks
MaxDumpsterTime parameter, 331           modifying                                     infrastructure requirements,
Measurable characteristic in SMART,          installation, 285–287, 287                      82–83
 54                                          servers, 284                               new organizations, 251
422   NETWORKS      •   POSTINSTALLATION TASKS



           performance monitoring,               offices for consulting, 375                   Exchange components, 350
             342–343                             Olympic games, 235                           mail archiving for, 113
          security, 271                          openness, need for, 185                      memory usage, 347–348, 347
          transitioning settings, 254            operating system (OS)                        monitoring, 342–343
          troubleshooting, 353                       monitoring, 342                          project team, 15–16
          Unified Messaging servers on, 147           requirements, 82–83                      tools, 310–311, 311
      neurolinguistic programming (NLP)          Operation Overload, 244–245              performance-level guidelines in SLAs,
        model, 215                               operations checklists, 405                 117–118
      New Accepted Domain page, 270                  daily tasks, 406–409                 Performance Logs and Alerts, 342, 347
      New Accepted Domain Wizard,                    monthly tasks, 411                   Performance Monitor, 310, 311, 347
        269–270, 269                                 summary, 412                         Performance Object, 347–350
      New-AcceptedDomain cmdlet, 270                 weekly tasks, 410                    Performance Troubleshooter, 310
      New Alert Settings dialog box, 347,        operations management, 339               peripheral firmware revisions, 355
        349                                      organization models and structures       Permission Check scans, 304
      new features, 78–80                            analyzing, 27–34, 28–31              permissions in deployment, 245
      New-Mailbox cmdlet, 331                        selecting, 247–250, 247              Personal Information Protection Act,
      New Mailbox Database Wizard,               organizational communication in            97
        330–331, 330                               scope statements, 55                   personnel assessment, 42–43
      new organization deployment,               organizing presentation materials, 178   phased migration in moving
          250–252                                orphaned mailboxes, 324                    mailboxes, 278
      New Rules of Marketing and PR, The         Osterman Research study, 112             Philip Morris International, 111
        (Scott), 382                             Out of the Crisis (Deming), 371          physical environment, checking, 340,
      New Server Cluster Wizard, 333–334,        outbound-only address rewriting, 132       406
          333–334                                outcomes in planning process, 61         physical location organization, 33
      New Storage Group page, 328                Outlook Anywhere feature, 124,           Placeholder Domain model, 94, 94
      New Storage Group Wizard, 328, 329             275–277                              planning, 49
      New-StorageGroup cmdlet, 329, 336          Outlook Web Access, 124                      growth, 45–46
      news, business, 371                        outputs in planning process, 60              Lotus Notes migration, 256
      newsletters, 381–382                       outsourced services                          mail archiving, 113
      next generation networking (NGN),              comfort levels, 118–119                  phases, 62–65
        141                                          vs. in-house, 114–115                    process overview, 59–62, 60
      95 percent syndrome, 232                       pros and cons, 115–116                   scope statements. See scope
      NLP (neurolinguistic programming)              service-level agreements,                   statement documents
        model, 215                                      116–118                               solution visualization, 52
      no restriction message classification,      overheating helicopters case, 41–42          summary, 75
        105                                      ownership and control, 32                    terminology, 50–52, 62
      nonfinancial business cases, 163                                                         Unified Messaging servers,
      nonretirement savings as revenue                                                          143–144
        source, 374                              P                                            upgrades, 358
      nontechnical managers, 7–9                 Parker, Dorothy, 363                     Planning of Change, The (Bennis,
      normative-reeducative strategy in          parochialism as change obstacle, 187       Benne, and Chin), 199
        change management, 200–201               part-time consulting, 374                policies
      notifications                               partners                                     ActiveSync, 277
          change request processes,                  address rewriting for, 131               in Exchange Server removal,
             229–230                                 consulting, 374                             293–294
          deployment, 246–247                        relationships, 33                        Security Configuration Wizard,
      nurturing relationships, 367–368           passive marketing, 380                          271
                                                 passwords                                political climate, 64
      O                                              clusters, 335                        political skills for change
      objectives                                     counter logs, 348                      management, 196–197
          aligning, 157                          PATRIOT Act, 44, 97                      politics, company, 33–34
          business case, 163                     Patton, George S., 121                   POP3 considerations, 124
          implementation schedules, 74           Patton, George S., Jr, 49                portable video player case, 50–52
          planning, 62, 65                       payroll services for consulting          ports for Edge Transport servers,
          in SLAs, 117                             businesses, 376                          129–130
          in statements of work, 68–69           PBX lines, 147                           position papers, 377–378
          user expectations, 206                 people skills for change management,     positive attitudes for project teams,
      obstacles to change, 187–190                   197–199                                17–18
      Occam’s razor, 93                          performance, 346                         postinstallation tasks, 266
      Office Communications 2007 Server               baselines, 344                           authoritative domains, 268–270,
          features, 80                               checking, 407–408                          269
          Unified Messaging server                    CPU utilization, 348–349                 Exchange ActiveSync deployment,
             integration, 144–146                    disk usage, 349–350                        277–278
                                                                            POSTINSTALLATION TASKS    •   RISK TOLERANCE     423



    Exchange Management Console,             goals, 16                             Regional business model, 27
      272–275, 272–273                       group think, 11–12                    registry settings for SCW, 271
    installation verification, 266–268,       member selection, 10–12               regulatory requirements. See
        266                                  performance management, 15–16            compliance
    Outlook Anywhere deployment,             structure, 13–14                      rejections in change request processes,
        275–277                          project vision statements, 54–55             229
    Security Configuration Wizard         projections, 46                           relationships
       (SCW), 271                        promptness for presentations, 177              change management, 198
power, formal and informal, 196–197      proposed actions in business cases,            nurturing, 367–368
power-coercive change strategy, 201          162                                        team effectiveness, 392
PowerPoint presentations, 176–177        Proposed Cluster Configuration page,       Relevant characteristic in SMART, 54
practicing presentations, 177              334–335, 334                            reliability, simplicity for, 77
premium journaling, 103                  prototyping for user expectations, 213    removing
prescreening change requests, 231        provisioning PBX lines, 147                    Exchange Server, 290–292
presenting business cases, 175–178       Public Folder Management Console,              servers, 284, 286–289, 287,
preventive maintenance, 339                304                                              292–294
print materials in marketing, 378        public folders                            replication
priorities determination, 36                 creating, 344                              Active Directory, 94–95
privacy requirements, 97                     in Exchange Server removal, 293            continuous. See continuous
pro bono work, 379–380                       for LCR, 330–331, 330                         replication
proactive troubleshooting approach,          Mailbox servers, 138                  reports
  356–358                                    Setup Wizard, 263                          checklist, 410
probability, risk, 70                    public speaking, 381                           in SLAs, 117
problem statement in scope               publishing for marketing, 380–381         reprimands in team management, 17
  statements, 54                         purpose in business cases, 163            requirements
procedures in team effectiveness, 391                                                   Active Directory, 90–96
processes                                                                               business. See business
    analyzing, 23–26                     Q                                                 requirements
    in planning, 60                      quality criteria in user expectations,         deployment, 245
processors for servers, 147–149            207                                          disk storage, 87–90
procurement delays, 68                   quarantine, spam, 133–134                      gap analysis, 47–48
product keys, 84–85, 272                 questions in presentations, 178                hardware, 81–82
product licensing considerations,        Queue Viewer, 309–310, 408–409                 operating systems, 82–83
  84–85                                                                                 in scope determinations, 56–57
product life cycles, 25–26               R                                              understanding, 9
productivity                             RAID (redundant array of inexpensive           user expectations, 206
    in business case presentations,         disks), 89                             resistance to change, 188–190, 203
      178                                rationale in business cases, 164–165      Resource Forest model, 93
    Unified Messaging servers for,        rationalization in group think, 11        resource mailbox moves, 279–280
      141–142                            ratios, server role, 151–152              resources
professional conduct, 383–384            reaction to change, 184–185, 184               planning, 62
professional help for consulting         Readiness Check                                in statements of work, 69
  businesses, 376–377                         Exchange Server removal, 290              trade-off triangle, 56, 56
professionals in change management,           installation modification, 287             user expectations, 206
  183                                         server roles, 288–289                respect for team members, 16–17
profiles, user                                 Setup Wizard, 263, 264               responsibilities for objectives, 65
    scope statements, 55                      transitioning, 252                   Restore-StorageGroupCopy cmdlet,
    in troubleshooting, 353              rebuilding servers, 322                      331
project managers in change request       recipient policies in Exchange Server     restores
  process, 228–229                          removal, 293                                process, 320–321
project sponsors, communication with,    Recipient Update Services, 294                 testing, 343
  211                                    recognition at project completion, 65     results orientation in consulting, 370
project teams, 9–10                      recommendations in business cases,        Resume-StorageGroupCopy cmdlet,
    attitudes, 16–19                        174, 400                                  336–337
    communication, 211                   records management. See compliance        retention policies, 44
    diplomacy, 14–15                     RecoverServer option, 322                 retirement savings as revenue source,
    discipline, 12–13                    recovery. See disaster recovery              374
    effectiveness measurements, 387      recovery storage groups, 324–325          return on investment (ROI) in
         goal setting, 389               recovery time objectives (RTOs), 87          business cases, 171–172
         interpersonal relationships,    redundant array of inexpensive disks      review process in SLAs, 117
              392                           (RAID), 89                             rewriting, address, 129–132
         procedures, 391                 reengineering business processes, 24      risk assessment matrices, 39
         roles, 390                      references in marketing, 378              risk tolerance, 39
424   RISKS   •   SETUP.COM COMMAND



      risks                                    scope creep, 53                         sensitivities in business cases, 158,
           in business cases, 158, 173–174,    scope statement documents, 50, 52,         173, 400
              400                                65–66                                 Sent items folder, 98
           in presentations, 178                   approval, 70                        Server Cluster Wizard, 334–336
           in statements of work, 69–70            benefits, 57                         Server Role Selection page, 262, 262,
      Rogers, Everett M., 193                      budget summary, 70                     286–290, 287
      ROI (return on investment) in                in deployment, 243–244              server roles, 121–122, 122
         business cases, 171–172                   design document, 70–73                  Client Access. See Client Access
      role-based deployment, 79                    goals summary, 67                          servers (CAS)
      role models for teams, 16                    implementation document, 73–75          Edge Transport. See Edge
      roles                                        outline, 66                                Transport servers
           consulting, 368–369                     overview, 52–53                         Hub Transport. See Hub
           server. See server roles                problem statement, 54                      Transport servers
           in SLAs, 117                            project vision statements, 54–55        Mailbox. See Mailbox servers
           team effectiveness measurements,        resource requirements summary,          memory configuration, 149–151
              390                                      69                                  processors, 147–149
      Rommel, Erwin, 244                           risks and assumptions summary,          ratios, 151–152
      Rossotti, Charles O., 198                        69–70                               removing, 286–289, 287
      routes, Active Directory for, 91–92          scope in, 56–59, 56                     Security Configuration Wizard,
      routing groups                               summary, 66–67                             271
          Exchange Server removal, 293             timeline and milestones summary,        summary, 152–153
          Large Organization model                     68–69                               tools, 152
             deployment, 250                       user profiles, 55                        Unified Messaging. See Unified
          Setup Wizard, 263                        validating, 58–59                          Messaging servers
          Standard Organization model          Scott, David Meerman, The New           server-side deleted item retention, 324
             deployment, 249                     Rules of Marketing and PR, 382        servers
          transitioning, 255                   SCR (standby continuous replication),       backups, 318–320
      Routing Log Viewer, 310                    325, 327–328, 328                         consolidation, 141
      RTOs (recovery time objectives), 87          Mailbox servers, 138–139                modifying and removing, 284
      rules, transport, 99–100, 101                                                        performance monitoring, 342
                                                   managing, 336–337
      rumors, 210                                                                      Service Delivery Location (SDL)
                                                   new feature, 79
                                                                                           Large Organization model
                                               SCW (Security Configuration Wizard),
                                                                                              deployment, 250
      S                                          271                                       Standard Organization model
      sabotage                                 SDL (Service Delivery Location)                deployment, 249
           as change resistance tactic, 189         Large Organization model           service-level agreements (SLAs), 323
           history, 208                               deployment, 250                      elements, 117–118
      safelist aggregation, 134                     Standard Organization model            parts, 116–117
      SARAH loss curve, 185–186, 186                  deployment, 249                      user expectations, 217
      Sarbanes-Oxley (SOX), 44, 96             Secure Sockets Layer (SSL)              Service Pack 1
      satisfaction in user expectations, 206        Outlook Anywhere certificates,          in deployment, 245
      savings as revenue source, 374                  275–276                              Exchange Server 2007 installation,
      scalability, 144                              postinstallation tasks, 273               258–266, 259–264
      SCCs (single copy clusters)              security                                    in-place upgrades, 242
           configurations, 338, 338                  ActiveSync, 277–278                    new features, 79
           multiple server roles, 149               Client Access servers, 125         service packs checking, 411
      scenarios                                     deployment, 246                    services
           business cases, 157                      Edge Transport servers, 129–130,       in-house vs. outsourced, 114–115
           disaster recovery, 316–317                 135, 135                             life cycles, 25–26
      schedules                                     monthly checks, 343                    SCW, 271
           implementation documents,                Security Configuration Wizard,      Set-ADSiteLink cmdlet, 91
              73–74                                   271                              Set-ExchangeServer cmdlet, 272
          in trade-off triangle, 56, 56             updates checking, 411              Set-MailboxServer cmdlet, 335
      schema preparation, 92                   Security Configuration Wizard (SCW),     Set Password dialog box, 348
      Schlesinger, Arthur, 12                     135, 135, 271                        Set-TransportConfig cmdlet, 331–332
      Schneider, Greg, 366                     Security Exchange Commission Rule       setup.com command
      Schutz, Will, 185                           17a-4, 43–44, 96                         Active Directory, 92
      SCL (Spam Confidence Level), 134          security logs, 409                          Exchange Server installation,
      Scoble, Robert, Naked Conversations,     Select Computer page, 333                     265–266
        382                                    self-censorship in group think, 11          Exchange Server removal,
      scope                                    self-service features, 141                    291–292
          business cases, 163–164              Senate Bill 1386 (SB 1386), 44              installation modifications,
          geographic, 27                       senior management for priorities, 36          285–286
                                                                             SETUP.COM COMMAND      •   THROWER, MITCH        425



    permissions, 245                            Hub Transport server for, 267       Subsidiary business model, 27
    server role removal, 289               Spam Confidence Level (SCL), 134          success acknowledgement in scope
Setup Wizard                               Specific characteristic in SMART, 54        statement development, 59
    Exchange Server installation,          speed of server role memory, 149         success criteria
      258–264, 259–264                     sponsor communication, 211                   business cases, 165–166
    Exchange Server removal,               SSL (Secure Sockets Layer)                   change management, 297
      290–291                                   Outlook Anywhere certificates,           in consulting, 369
     server role removal, 288–289                 275–276                           summary checklist, 412
shared mailbox moves, 279–280                   postinstallation tasks, 273         superficial resistance to change, 188
silence as change resistance tactic, 189   staffing in SLAs, 118                     supplemental documentation in
Simple Exchange Organization model,        Stagg, J. M., 244                          business cases, 175
  248–249                                  stakeholders                             support issues in scope statements, 55
Simple Mail Transfer Protocol (SMTP)            business cases, 158                 Suspend-StorageGroupCopy cmdlet,
     accepted domains, 268, 270                 communication with, 211               336–337
     mailbox moves, 279                         interviewing, 37                    swing migration for mailbox moves,
Simple Network Management                       scope statement validation, 58–59     278
   Protocol (SNMP), 343                    stakes factor in change management,      symptom identification in
simplicity                                    203                                     troubleshooting, 352–354
     business cases, 158                   stamps, antispam, 133                    system features, identifying and
     for reliability, 77                   standard journaling, 103                   communicating, 34–35, 35
single copy clusters (SCCs)                Standard Organization model, 249         system history review in detect model,
     configurations, 338, 338               standby continuous replication (SCR),        354–355
     multiple server roles, 149               325, 327–328, 328                     System Information (MSInfo32) tool,
single database failure recovery, 323           Mailbox servers, 138–139              354
Single Domain model, 94                         managing, 336–337                   system log monitoring, 358
single forests, 93                              new feature, 79                     System Monitor, 342
SIP addresses, 146                         standby recovery servers, 322            system skills in change management,
site consolidation, 141                    Start page, 259–260, 260                     199
size                                       startup consulting expenses, 375–377     System State Backup recovery,
     Client Access servers, 148            statements of objectives in SLAs, 117      322–323
     Mailbox servers, 149                  statements of requirements, 50
     mailboxes, 88                         statements of work (SOWs). See scope
     server role memory, 149                  statement documents                   T
SLAs (service-level agreements), 323       status meetings, 410                     tactical benefits in business cases, 169
     elements, 117–118                     STC (Society of Telecommunication        tangible benefits in business cases, 169
     parts, 116–117                           Consultants), 383–384                 target population factor in change
     user expectations, 217                stereotyping in group think, 11             management, 203
slots for server role memory, 150          storage                                  targets in SCR, 139
SMART characteristics, 54                       mail archiving, 112                 Task Manager, 342
SMTP (Simple Mail Transfer Protocol)            technology, 88–89                   tasks
     accepted domains, 268, 270                 tools, 89–90                             ‘‘as needed’’, 343–345, 344
     mailbox moves, 279                    storage groups                                change management, 182
SNMP (Simple Network Management                 enabling, 328–329, 329                   continuous replication
   Protocol), 343                               recovery, 324–325                           monitoring, 345–346
Society of Telecommunication               Storage Requirements Calculator, 89           daily, 339–343, 341
   Consultants (STC), 383–384              stories in business cases, 158–160            monthly, 343
Socrates, 13                               strategic business unit organizational        in planning, 62
soft benefits in business cases, 169           structure, 30, 31                          weekly, 343
software                                   strategies                               TCO (Total Cost of Ownership), 81–82
     deployment requirements, 245               change management, 199–203          teams. See project teams
     detect model problems, 355                 in planning, 62, 65                 technical jargon, 8
     incompatible, 353                     streaming backups, 320, 323              technical skills for consulting,
     procurement delays, 68                Stress and Performance tool, 90              370–371
Solomon Smith Barney Inc., 111             strong resistance to change, 188         technology bigotry, 369
solutions                                  structures                               termination procedures in SLAs, 117
     detect model testing, 355                  analyzing, 27–34, 28–31             Test-ReplicationHealth cmdlet,
     visualizing, 52                            project team management, 13–14          345–346
sources of user expectations, 207          subcontracting, 373                      testimonials, 377
SOWs (statements of work). See scope       subject matter experts, 22               Thatcher, Margaret, 202
   statement documents                     subscriptions                            third-parties
spam                                            Edge Subscriptions, 128–129              brick-level backups, 324
     Edge Transport servers for, 126,           Unified Messaging servers,                product functionality, 86–87
      132–134                                     145–146                           Thrower, Mitch, 205
426   TIME-BASED CHARACTERISTIC IN SMART       •   ZUBULAKE VS. WARBUNG (USB BANK)



      Time-based characteristic in SMART,          Twain, Mark, 65                          user profiles
         54                                        tweaking scope determinations, 56–58         scope statements, 55
      time frame factor in change                  Typical Exchange Server Installation         in troubleshooting, 353
         management, 203                             option, 261                            user self-service features, 141
      timelines
           for objectives, 65
           in statements of work, 68–69            U                                        V
      ‘‘to-be’’ analysis, 47                       UM Dial Plan objects, 146                VAK (visual-audio-kisthethetic)
      Toolbox node, 301–302, 303                   unanimity in group think, 11                learning style, 215–216
      tools, 301–302                               unclear goals and performance            validating scope statements, 58–59
           configuration, 302–304, 303                measures as change obstacle, 187       vendors
           disaster recovery, 304–307, 305         unfreeze-change-refreeze change               in business cases, 159
           mail flow, 307–310, 308                    model, 190–191, 190                         relationships, 33
           performance, 310–311, 311               Unified Messaging servers, 140, 140       verifying installation, 266–268, 266
           troubleshooting, 311–314, 312               availability and scalability, 144    version selection, 83
      topologies                                       benefits, 141–143                     virtualization considerations, 85–86
           Active Directory, 94–95                     deployment, 146–147                  Virus Scanning Application Program
           Edge Transport servers, 127–128             new features, 79–80                     Interface, 126–127
      Total Cost of Ownership (TCO), 81–82             new organizations, 251–252           virus transmission disclaimers, 106
      Tower of Pisa, 59, 60                            Office Communications 2007            viruses
      tracking                                            Server integration, 144–146            Edge Transport servers for, 126,
           CPU utilization, 348–349,                   planning, 143–144                          132–134
              406–407                                  postinstallation tasks, 274–275           protection checking, 410
           disk usage, 349–350, 407                    ratios, 152                          vision/scope documents. See scope
           Exchange components, 350                    setup, 261, 265                         statement documents
           memory usage, 347–348, 347,                 transitioning, 255                   vision statements, 54–55, 63–64
              406–407                              unit directors, communication with,      visual-audio-kisthethetic (VAK)
      trade-off triangle, 56, 56                     211                                       learning style, 215–216
      training                                     unmet user expectations, 207–208,        visual learners, 215–216
           assessing, 42–43                            208                                  visualizing solutions, 52
           in deployment, 246                      untested software in troubleshooting,    voice mail messages, 145
           Unified Messaging servers for, 141         353                                    Volume Shadow Copy Service (VSS),
           for user expectations, 213–215          update rollups, 411                         320, 323
      transaction logs, copying, 326               Update-StorageGroupCopyStatus
      transitioning, 252                             cmdlet, 337                            W
           environment settings, 252–254,          updated firmware, 355                     waypoints. See objectives
            253                                    upgrades                                 web designer services for consulting
           miscellaneous tasks, 255                    mailbox moves, 278                     businesses, 376–377
           phases, 242                                 overview, 241–243                    websites for marketing, 378
           quick guide, 254–255                        plans, 358                           weekly operations
           readiness checks, 252                   uptime requirements in SLAs, 118             checklist, 410
           support, 243                            U.S. Bancorp Jaffray Inc., 111               messaging system tasks, 343
      transmission of viruses disclaimers,         user benefits in Unified Messaging         Weiss, Alan, Getting Started in
         106–107                                     servers, 142–143                         Consulting, 373
      transport dumpster, 331–332, 332             user expectations, 205                   white papers, 377–378
      transport rules, 99–100, 101                     communication for, 209–212           William of Occam, 93
      transport servers. See Edge Transport            criteria, 206–207                    Wilson, Woodrow, 181
         servers; Hub Transport servers                management guide, 217–219, 218       Windows Management
      Transport Settings Properties dialog             power of, 205–206                      Instrumentation (WMI), 343
         box, 332, 332                                 prototyping for, 213                 Windows servers, server role removal
      trend analysis, 46                               service-level agreements, 217          from, 287–289
      triple constraints in change request             sources, 207                         workspace for consulting, 375
         processes, 223, 224, 227, 229–230             summary, 219                         writing in marketing, 380–381
      troubleshooting, 350–351                         training for, 213–215
           methodology development,                    unmet, 207–208, 208
             351–356, 351                              user considerations, 208–209         Z
           proactive approach, 356–358             user focus groups, 38                    Zubulake vs. Warbung (USB Bank),
           tools, 311–314, 312                     user functions in scope statements, 55     111

				
DOCUMENT INFO