Disaster Recovery for Exchange 2000

Transcription

Disaster Recovery for Exchange 2000
Color profile: Generic CMYK printer profile
CertPrs8 / MCSE Administering
Composite Default screen
Exchange 2000 Server Study Guide / Clawson/Luckett / 2674-4 / Chapter 7
Blind Folio 7:511
7
Disaster
Recovery for
Exchange 2000
CERTIFICATION OBJECTIVES
7.01
Implementing a Backup and
Restore Plan
7.02
Restoring User Data
7.03
Configuring a Server for Disaster
Recovery
7.04
Restoring the Information Stores
7.05
Troubleshooting Backup and Restore
Problems
7.06
Safeguarding User Keys
✓
Q&A
C:\OMH\CertPrs8\674-4\ch07.vp
Wednesday, July 25, 2001 3:51:23 PM
Two-Minute Drill
Self Test
Color profile: Generic CMYK printer profile
CertPrs8 / MCSE Administering
Composite Default screen
512
Chapter 7:
Exchange 2000 Server Study Guide / Clawson/Luckett / 2674-4 / Chapter 7
Disaster Recovery for Exchange 2000
CERTIFICATION OBJECTIVE 7.01
Implementing a Backup and Restore Plan
An important part of keeping your network and services up and running to serve
your user community is to have a plan in place in case of a failure. With Exchange
2000 Server, this plan should include:
■ A plan to back up the underlying Windows 2000 Server
■ A plan to back up the information stores, both mailbox stores and public
folder stores
■ A plan for how to log transactions, and when and where to restore the
transaction log files
■ A plan to recover lost messages and deleted mailboxes
■ A plan to recover corrupted databases
■ A plan to restore a mailbox store when the server is otherwise operational
■ A plan to restore data to a recovery server
It is entirely possible that a large portion of your test will ask questions about
backing up, restoring, recovering, and dealing with server disasters. Be prepared!
The probability that you can pass the exam without thoroughly understanding
the material in this chapter is pretty small.
Exchange 2000 offers a great deal of flexibility in configuring the storage groups
and the information stores. Many of your decisions on how many mailbox stores
(for example) to configure will depend upon factors such as:
■ How long it will take to back up a storage group or mailbox store
■ How long it will take to restore a mailbox store
■ Who in your organization can be without messaging services and for how long
After you carefully consider those factors, you can begin to construct your plans
for how to back up and restore the databases.
C:\OMH\CertPrs8\674-4\ch07.vp
Wednesday, July 25, 2001 3:51:24 PM
Color profile: Generic CMYK printer profile
Composite Default screenCertPrs8 / MCSE Administering
Exchange 2000 Server Study Guide / Clawson/Luckett / 2674-4 / Chapter 7
Implementing a Backup and Restore Plan
513
Another item that you must account for in your backup and restore plans is
backing up Active Directory. AD exists on all domain controllers, so if your network
contains multiple Windows 2000 domain controllers, your network already has
some degree of built-in fault tolerance. If one of the domain controllers fails, you
still have working (and writable) copies of AD. To introduce another domain
controller into the network, you would simply install a Windows 2000 Server and
run DCPROMO to promote this server to a domain controller. There is no need to
“restore” AD from tape backup.
If, however, you have a single domain controller and it fails, you will need to
restore AD from tape backup. AD will contain all of the Exchange objects and
attributes. You will want to pay some attention to the status of AD when doing a
restore, especially of an Exchange Server. Later in this chapter you will learn about
using setup with the /disasterrecover switch to accommodate reinstalling an
Exchange Server when the objects currently exist in AD.
You can back up AD (and other things) by selecting System State from the
Windows Backup program. Backing up the System State will back up AD, the
Registry, the sysvol, and the COM+ registrations.
You can back up Active Directory only by backing up the System State on a
domain controller. Backing up the System State on domain controllers and
member servers will also back up the Registry on other items.
If you are running in a mixed environment with Exchange 5.5 servers, you are
interested in the sysvol, because that is where the Site Replication Service (SRS)
parameters and objects are kept. Exchange 2000 does not use the SRS, but the
Exchange 5.5 servers must reference the SRS for backward-compatibility.
Types of Backup
Before delving any further into the material, it is important to discuss the types of
backups that can be performed, how these backups interact with Exchange, and
what your options are when doing the backups.
Backup Techniques
There are three types of backups that you are most interested in when considering
exam material. Other backup techniques are possible, but probably not relevant for
testing. An important consideration in selecting one of these three types is what they
C:\OMH\CertPrs8\674-4\ch07.vp
Wednesday, July 25, 2001 3:51:24 PM
Color profile: Generic CMYK printer profile
CertPrs8 / MCSE Administering
Composite Default screen
514
Chapter 7:
Exchange 2000 Server Study Guide / Clawson/Luckett / 2674-4 / Chapter 7
Disaster Recovery for Exchange 2000
do with the archive bit, how much backup media is needed, and how much time is
required to do the backup. Another important consideration in selecting the backup
type is the kind of restore procedure that will be required. The three types of
backups are:
■ Normal backup
This is sometimes referred to as a “full” backup because it
backs up all files regardless of the status of the archive bit. Because this
technique writes all files to the backup media, it consumes the most time and
uses the most space on the backup media. The normal backup resets the
archive bit (turns it off, or sets it to zero) after it has backed up the file. You
would use a normal backup when time and media space are not a concern.
Restoring files from a normal backup is also the least complex restoration
procedure. You simply need the last media set. Since that set contains all files,
you don’t need anything else.
■ Incremental backup
As the name implies, this technique incrementally
backs up data by backing up only the files with the archive bit set on. Using
an incremental backup scheme, you would start by making a full normal
backup. This backup turns off all of the archive bits. When the backup
modifies (or creates) a file, the file system sets the archive bit on, indicating a
change to the backup system. The next backup you would perform is an
incremental backup, which backs up only the files that have changed, as
indicated by the archive bit. After the file is backed up, the archive bit is then
set to off. Each day you would run an incremental backup until the next
scheduled normal backup. Typically, you would run a normal backup once a
week and incremental backups the rest of the week. Using an incremental
backup scheme, the backup takes less time and consumes less media, since
you are backing up only the files that have changed (presumably some small
subset of the total files). Restoring files from an incremental scheme is the
most complex of the three types that this section will discuss. During the
restore, you need the last normal backup media and every incremental backup
media to be able to restore all the files.
■ Differential backup
This technique starts with you making a full backup of
the data. This backup resets the archive bit off on all of the files. Then, on
the succeeding days, you run a differential backup, which backs up all the
files with the archive bit set on (that is, all the files that have changed). But,
unlike the incremental backup, the differential backup does not reset the
C:\OMH\CertPrs8\674-4\ch07.vp
Wednesday, July 25, 2001 3:51:24 PM
Color profile: Generic CMYK printer profile
Composite Default screenCertPrs8 / MCSE Administering
Exchange 2000 Server Study Guide / Clawson/Luckett / 2674-4 / Chapter 7
Implementing a Backup and Restore Plan
515
archive bit, but leaves the archive bit set on. The next time you run a
differential backup, it will back up the same files as the previous differential
backup, plus any new files (or files with the archive bit turned on). Each
successive day, the differential backup can potentially take longer to back up
the files and consume more media. You would use a differential backup when
media capacity is a concern and the length of time it takes to do the backup
is not a prime concern. Doing a restore from a differential backup requires
the last normal backup media and the last differential media. This makes the
differential backup slightly more complex than a normal backup to restore
and slightly less complex than an incremental backup to restore.
Online and Offline Backups
When you perform an online backup, you are backing up the Exchange database
while the Exchange services are still running. In other words, users are still using
Exchange to send and receive messages while you are backing up. The advantage to
this type of backup should be obvious. You get to do the backup and the users get to
send and receive e-mail without interruption.
When you do a normal backup, you back up the database and the transaction log
files. When you do an incremental or a differential backup, you back up only the
transaction log files. You will not get a backup copy of the database using an online
incremental or differential backup.
In a production shop, you might consider doing a normal backup of the
database once each day, typically at night when the system usage is minimal.
You would then do differential backups of the transaction log several times
during the day at regular intervals. These intervals could be every hour, two
hours, or four hours, depending upon your needs. This backup scheme will not
cause undo stress on the server, as you will be backing up only several
megabytes of data. If you lose the drive that contains the log files, this
technique will allow you to limit the data loss to the interval between the
differential backups.
It is worth noting what happens when operations are made to a page during an
online backup. First, if a transaction occurs for a database that has not yet been
backed up, then the operation proceeds normally. If the transaction occurs for a
database that is being backed up, the transaction is stored in a patch (.pat) file. This
C:\OMH\CertPrs8\674-4\ch07.vp
Wednesday, July 25, 2001 3:51:25 PM
Color profile: Generic CMYK printer profile
CertPrs8 / MCSE Administering
Composite Default screen
516
Chapter 7:
Exchange 2000 Server Study Guide / Clawson/Luckett / 2674-4 / Chapter 7
Disaster Recovery for Exchange 2000
patch file is used only during an online backup or restore of the database. There is
only one patch file for any given store that is undergoing an online backup.
When you begin an online backup, the patch file is created and is stored in the
same folder as the database store, typically the mdbdata folder. The patch file uses
the same naming convention as the store. If the database file name is executive.edb,
then the patch file will be named executive.pat.
As the online backup is taking place, the transaction entries are placed into the
patch file instead of the log files. When the backup is complete, the patch file is
written to the tape and then deleted from the folder.
To do an offline backup, the information store service must be stopped or the
database store must be dismounted. Doing an offline backup can be faster and
simpler, doesn’t involve any patch files, and is always a full backup, but you must
take the store out of service. Obviously, because it requires that you dismount the
database, an offline backup is a secondary choice to an online backup.
Data Recovery Architecture
In this section, you learn about the database engine, the transaction logs, and how
you use the logs in the Exchange process.
Extensible Storage Engine
The Extensible Store Engine (ESE) uses a transaction logging system to help ensure
the consistency and integrity of the data in the database in the event of a system
crash. Microsoft points to four design goals of ESE:
■ High recoverability in the event of failure
■ Fewer I/O operations
■ The maximum level of self-tuning
■ Twenty-four-hour-a-day, seven-day-a-week uptime
From a design point of view, the ESE uses four principles, which Microsoft calls
ACID, to ensure data integrity:
■ Atomic
This is the “all or none” principle. It states that all operations in a
transaction must be completed or none of the operations will be completed.
Consider the example of an online banking application where you would
C:\OMH\CertPrs8\674-4\ch07.vp
Wednesday, July 25, 2001 3:51:26 PM
Color profile: Generic CMYK printer profile
Composite Default screenCertPrs8 / MCSE Administering
Exchange 2000 Server Study Guide / Clawson/Luckett / 2674-4 / Chapter 7
Implementing a Backup and Restore Plan
517
transfer funds from one account to another. Such a transfer actually consists
of two separate transactions: a withdrawal and a deposit. Consider the
ramifications if the withdrawal portion were done and the system failed before
the deposit portion could be completed. Bad news! You wouldn’t want the
withdrawal portion marked as completed until it was also deposited into the
other account.
■ Consistent
A transaction can start only with the database in a consistent
condition, and the database must be consistent when the transaction finishes.
■ Isolated
The changes to the database are not available (sometimes called
visible) until the transaction is completed in the atomic sense and the
database is consistent. At this point in the process, the transaction is
committed.
■ Durability
Transactions must survive system failures. This means that if a
system failure occurs, when the store.exe restarts, it will detect that the
database is in an inconsistent state and roll back the operation that was in
progress during the failure. For example, if you were moving a message from
one folder to another when the system failed, you would not lose the
message.
Data is stored inside the ESE database file in 4KB sections known as pages. Each
page contains such features as the following:
■ Data definitions
■ Data
■ Indexes
■ Checksums
■ Flags
■ Timestamps
■ B-tree information
Pages are numbered sequentially in the database to improve performance. A database
32
may contain 2 pages, which at 4KB per page is approximately 16 terabytes of
information. When information is read from the database, it is put into memory,
one page at a time.
C:\OMH\CertPrs8\674-4\ch07.vp
Wednesday, July 25, 2001 3:51:26 PM
Color profile: Generic CMYK printer profile
CertPrs8 / MCSE Administering
Composite Default screen
518
Chapter 7:
Exchange 2000 Server Study Guide / Clawson/Luckett / 2674-4 / Chapter 7
Disaster Recovery for Exchange 2000
A transaction is a modification to a page in the database. Each modification is
known as an operation. A transaction may comprise multiple operations. When all
operations are complete, then the transaction has occurred.
Now here is where the plot “sickens,” or gets a bit more complex. When a page is
read into memory, it is known as a clean page. Once on operation has been performed
on the page, it is known as a dirty page. Dirty pages may be subject to further
modifications. Many operations may be performed on a dirty page before it is written
back to the disk. The write back is not a function of the number of operations on
the page.
Before a page can be written to memory, the ESE must reserve an area in memory
for its own use. This area is known as the database buffer cache and is created by a
process known as the Dynamic Buffer Allocation (DBA). The size of this cache can
be increased, as necessary.
Don’t be too concerned if your Exchange 2000 Server seems to use all of the
available memory. First, unused memory is wasted money. That is, you bought
the memory and might as well use it rather than just let it sit in the system
unallocated. Second, Exchange will tune the amount of memory it uses based
on other demands of the system.
While operations are being processed, they are written to the version store. The
version store contains the list of all of the changes that have been made to the pages
that have not been committed.
To commit the transaction, the changes are written from the version store to the
transaction log buffer area. From there they are written to the transaction log file,
edb#.log. The edb# starts with 00 for the first storage group, then 01 for the second
storage group, and so forth. So the log file for the first storage group would be E00.log.
Transaction Log Files
We have previously discussed the transaction logs and their configuration, and this
section will go into more depth.
As discussed earlier, messages are written to the transaction logs first, and then to
the actual database afterward. So, log files are important in the processing of
messages and in the recovery process.
C:\OMH\CertPrs8\674-4\ch07.vp
Wednesday, July 25, 2001 3:51:26 PM
Color profile: Generic CMYK printer profile
Composite Default screenCertPrs8 / MCSE Administering
Exchange 2000 Server Study Guide / Clawson/Luckett / 2674-4 / Chapter 7
Implementing a Backup and Restore Plan
519
We have mentioned before that you do not want to delete the log files manually.
Let us say that again: Never, never, ever delete the log files manually. These
files will be deleted when you run your regular normal backup. Also, the same
rule applies to the checkpoint file. Deleting either the log files or the checkpoint
file will result in nothing but trouble for you.
Exchange does not use a single transaction log file. Over time, that single file
could grow to be quite large and unmanageable, and even consume all space on the
hard drive. Instead, Exchange writes to a log file called edb.log. After that file reaches
5MB, this file is renamed edbxxxxx.log and a new edb.log file is begun. During this
changeover process, a temporary log file named edbtemp.log is used to hold transactions
until the new edb.log is created.
This technique is known as generational files, with each unique log file representing
a generation. The xxxxx is a hexadecimal number, and each log file is numbered in
sequence using this sequential hexadecimal number scheme.
A transaction log files has two sections:
■ Header
■ Data
In Exchange 2000, a set of transaction log files is matched to a storage group.
Since a storage group can contain multiple information stores, it follows that a set of
transaction log files can serve multiple databases. The header section in the
transaction log file contains hard-coded paths to the databases that reference it. The
header contains a signature that is matched to the database signature that it serves.
This signature keeps the transaction log file from being paired to an identically
named, but wrong, database.
You can get a listing of the header (called a dump) to verify the log file. The
dump will provide information such as the generation number, the hard-coded
database paths, and the signatures (Figure 7-1).
With this understanding of transaction log files in place, let’s look at what
happens when a database is modified. When you modify the database, the first thing
that happens is that the page that contains the information you are modifying is read
into memory, the database cache. Next the timestamp on the page is updated to
reflect the new activity. Finally, a log record is created to keep track of what is about
to be done to the database. This log record is created in the log cache buffer.
C:\OMH\CertPrs8\674-4\ch07.vp
Wednesday, July 25, 2001 3:51:27 PM
Color profile: Generic CMYK printer profile
CertPrs8 / MCSE Administering
Composite Default screen
520
Chapter 7:
Exchange 2000 Server Study Guide / Clawson/Luckett / 2674-4 / Chapter 7
Disaster Recovery for Exchange 2000
FIGURE 7-1
Header dump
produced using
eseutil /ml
Writing the Log Entries to the Database After these steps are completed,
the page is modified. Next, a connection is created between the two entries, the
purpose of which is to preclude the page from being written to disk without the log
record being written to the log entry first. Remember, information is written to the
log file first before it is written to the database on the disk.
Committed transactions are written to the database, from the transaction log,
when one of the following occurs:
■ If the number of committed transactions on a log file reaches a point where
the checkpoint falls too far behind, these transactions will be flushed to the
database.
C:\OMH\CertPrs8\674-4\ch07.vp
Wednesday, July 25, 2001 3:51:28 PM
Color profile: Generic CMYK printer profile
Composite Default screenCertPrs8 / MCSE Administering
Exchange 2000 Server Study Guide / Clawson/Luckett / 2674-4 / Chapter 7
Implementing a Backup and Restore Plan
521
■ If the number of free pages in memory falls too low, committed transactions
will be flushed to free up memory pages.
■ If another service is requesting memory, Exchange will free up memory by
flushing its cache. Remember, unused memory is a waste, so Exchange uses
memory until another process needs some.
■ The information store service is being shut down. Then all updated pages in
memory are written to the disk.
Using a Write-Back Cache If you are using a controller with a write-back
cache enabled, there is a real risk in using this controller for the disks that support
the log files. In a nutshell, you can feed information to be written to the disk faster
than the actual disk device is capable of writing that information. Under normal
circumstances, when information has been written to the disk, the disk will report
back to the system this success and get the next piece of information to write. The
write-back controller then gets the information to be written to the disk, stores the
information in its cache, and reports a successful write to the system. The system
then moves onto its next task. Meanwhile, the write-back controller continues to
feed information, as a surrogate, to disk as the drive plods along writing the
information at whatever speed it can. And as long as everything is working okay,
then everything is okay—until a controller malfunction occurs. Under certain
circumstances, it is possible for a page to be written to the database itself without
being written to the log file first. This will cause corruption in the database and
make restoring the database anywhere from difficult to impossible.
Many high-performance disk controllers offer write-back cache. Write-back
cache can substantially improve performance under most conditions. In fact,
Microsoft indicates that you can cut restore times in half if you have enabled
write-back cache, and restore times can be very critical to you. However,
using write-back cache can pose a significant hazard to your data and should
be used only if the cache is supplied power by battery, and you have tested
this feature and confirmed that it is operational.
By the way, it doesn’t matter if you are caching the writes at the controller or at
the disk device itself; any malfunction in the cache anywhere has the potential to
lead to the same results. At a minimum, you should have a battery backup for your
cache. This battery will protect your cache from a power failure, but not from a
C:\OMH\CertPrs8\674-4\ch07.vp
Wednesday, July 25, 2001 3:51:29 PM
Color profile: Generic CMYK printer profile
CertPrs8 / MCSE Administering
Composite Default screen
522
Chapter 7:
Exchange 2000 Server Study Guide / Clawson/Luckett / 2674-4 / Chapter 7
Disaster Recovery for Exchange 2000
cache malfunction. You will have an interesting decision to make relative to this
point: You want your log files on a write-optimized disk subsystem, and employing
a write-back cache controller substantially improves disk write performance, but not
without imposing some potential for disaster. Which will you choose?
Have we mentioned that you should never manually delete your log files?
Mission-critical Mailboxes
There may be users in your organization whose ability to send and receive e-mail
messages substantially impacts the well-being of the organization. Salespeople who
need to be in constant contact with their customers may well be such a category of
users. Executives of the organization may be another group of users who need access
to their messages.
Partitioning the Database for Mission-critical Mailboxes
The concept of partitioning a database calls for placing part of that database on
another facility. In the case of Exchange 2000, this partitioning can take the form of
creating a separate storage group or creating another mailbox store within an existing
storage group.
Be prepared to field questions about how best to handle situations that
require quick restoring of mailboxes for a given group of users before
restoring the mailboxes for all users.
Which technique you should use, another storage group or another mailbox
store, largely depends upon the circumstances, your hardware, and your current
configuration. To maintain performance, you will want to put each storage group
on its own dedicated disk array, with the transaction log files on their own mirrored
array. This translates ideally to an additional five physical drives (three drives for the
storage group RAID 5 and a pair of drives for the mirrored volume that will hold
the log files) to support the new storage group.
On the other hand, you could create another mailbox store in an existing storage
group, assuming that you have not already reached the maximum number of
mailbox stores. This technique has the advantage of not needing as much hardware
or planning about where to put the storage group files.
C:\OMH\CertPrs8\674-4\ch07.vp
Wednesday, July 25, 2001 3:51:29 PM
Color profile: Generic CMYK printer profile
Composite Default screenCertPrs8 / MCSE Administering
Exchange 2000 Server Study Guide / Clawson/Luckett / 2674-4 / Chapter 7
Implementing a Backup and Restore Plan
523
Multiple Databases Single Store
We have already discussed configuring Exchange 2000 Server to support multiple
storage groups and multiple stores in a storage group. One of the real strengths of
Exchange 2000 Server, this feature allows you to scale the server vertically. In previous
versions of Exchange, if you wanted to reserve mission-critical mailboxes in a store,
you had to configure another physical server.
You can back up or restore the entire storage group, or back up and restore one or
more of the mailbox stores in the storage group, depending upon your need.
Know what happens to the transaction log files during a backup. Incremental
backups purge the transaction logs, and differential backups do not purge the
transaction logs. Also, in a storage group with multiple stores, the transaction
logs will not be purged if you do not back up all stores in the storage group,
even if you do a normal backup.
Dedicated Recovery Server
If a disaster occurs, you will have several choices for recovery. One choice is to
restore the database to the original server in the original store. This may work well in
the case of a corrupted database or a drive failure where you want to restore the
entire database. Also, this technique assumes that the underlying hardware platform
is still functional, or can be made functional.
You may want to consider keeping a fully functional and configured server
platform in reserve as a recovery server. The purpose for this server is to be a
“warm spare” in the event that a production server goes down and cannot be
brought back into service in a timely manner. You might think that maintaining
a reserve server is expensive, but here is another perspective: It is not what it
costs to keep your application servers in production that is expensive, it is what
it costs you when your application servers go down. To prove this point to
yourself (and your organization), pull the network cable on your financial
application server and see how long it takes for the pain to register.
Consider the case where you need to recover several e-mail attachments from a
mailbox that has been deleted from the database. You have that mailbox on a tape
backup, and that backup was from two weeks ago. If you restore that database to the
C:\OMH\CertPrs8\674-4\ch07.vp
Wednesday, July 25, 2001 3:51:29 PM
Color profile: Generic CMYK printer profile
CertPrs8 / MCSE Administering
Composite Default screen
524
Chapter 7:
Exchange 2000 Server Study Guide / Clawson/Luckett / 2674-4 / Chapter 7
Disaster Recovery for Exchange 2000
production server, everyone’s mailbox will be out of sync and will not contain
current messages that were received in the last two weeks. What should you do?
To set up a dedicated recovery server, especially if you want to recover individual
mailboxes, you will need to do the following:
1. Install Windows 2000 Server.
2. Create a new, isolated forest.
3. Run Exchange 2000 setup/forestprep if you plan to install Exchange 2000 on
a member server.
4. Install Exchange 2000 Server.
5. Restore the database or databases from tape backup.
Windows 2000 Backup
Windows 2000 comes with a fully functional backup and restore program already
tuned for the Windows 2000 environment. This tool, as it is, is not suitable to back up
Exchange 2000 databases until you actually install Exchange 2000 Server on the
machine. During the installation, the backup program will be made “Exchange-aware”
so that you can do online backups. An online backup is the preferable backup
method because it does not require you to take the information stores out of service
while backing up the data.
A limitation to this backup program is that you can only back up the local
Exchange databases. You will not be able to back up a remote Exchange database
successfully using this program, even if you have Exchange 2000 Server installed
locally.
EXERCISE 7-1
Using Windows 2000 Backup Program
In this exercise, you will become familiar with and use the Windows 2000 backup
program to back up an Exchange database.
1. Click the Start button.
2. Point to Programs.
C:\OMH\CertPrs8\674-4\ch07.vp
Wednesday, July 25, 2001 3:51:30 PM
Color profile: Generic CMYK printer profile
Composite Default screenCertPrs8 / MCSE Administering
Exchange 2000 Server Study Guide / Clawson/Luckett / 2674-4 / Chapter 7
Implementing a Backup and Restore Plan
3. Point to Accessories.
4. Point to System Tools.
5. Click on Backup Wizard to start the backup process.
C:\OMH\CertPrs8\674-4\ch07.vp
Wednesday, July 25, 2001 3:51:32 PM
525
Color profile: Generic CMYK printer profile
CertPrs8 / MCSE Administering
Composite Default screen
526
Chapter 7:
Exchange 2000 Server Study Guide / Clawson/Luckett / 2674-4 / Chapter 7
Disaster Recovery for Exchange 2000
6. Click on the Backup tab.
7. Expand the Microsoft Exchange Server container.
8. Expand the Exchange1 container.
9. Expand the Microsoft Information Store container.
10. Left-click on the First Storage Group. The details pane of the console then
displays the mailbox stores located in the first storage group.
11. Click on the Executive Mailbox Store checkbox.
12. If you have a backup device, you would click Start Backup to begin backing
up the Executive mailbox store.
13. Clicking on Start Backup brings up the Backup Job Information dialog box.
From here you can start the backup, schedule the backup to run, and select
the backup type through the Advanced tab.
C:\OMH\CertPrs8\674-4\ch07.vp
Wednesday, July 25, 2001 3:51:33 PM
Color profile: Generic CMYK printer profile
Composite Default screenCertPrs8 / MCSE Administering
Exchange 2000 Server Study Guide / Clawson/Luckett / 2674-4 / Chapter 7
Implementing a Backup and Restore Plan
C:\OMH\CertPrs8\674-4\ch07.vp
Wednesday, July 25, 2001 3:51:35 PM
527
Color profile: Generic CMYK printer profile
CertPrs8 / MCSE Administering
Composite Default screen
528
Chapter 7:
Exchange 2000 Server Study Guide / Clawson/Luckett / 2674-4 / Chapter 7
Disaster Recovery for Exchange 2000
CERTIFICATION OBJECTIVE 7.02
Restoring User Data
Being able to restore user data is critical to both your operation and your success as
an Exchange administrator. This section covers some key concepts as well as testable
material.
Mailbox Recovery Scenarios
The term brick-level restore (or backup) refers to the ability of your backup program
to restore a single mailbox without having to restore the entire mailbox store. The
Windows 2000 backup program does not provide for a brick-level restore. Some
third-party backup programs allow for the restore of a single user’s mailbox.
Using Exmerge (described in the following section), it is possible to approximate
a restore of a single user’s mailbox, but there are a lot of assumptions made for this
technique to work.
Exmerge and .PST files
Exmerge is an Exchange 2000 utility. If you are an Exchange 5.x administrator, you
probably recognize the Exmerge program and may have used it in administering
your Exchange 5.x servers. You can find it on the Exchange 2000 Server CD. This
utility enables you to accomplish the following:
■ Extract mail from a mailbox store, even if the store is damaged. The mail is
put into a .pst file, which can be imported into another mailbox store.
■ Locate and remove specific messages from the mailbox store. For example,
you might use Exmerge to find an e-mail containing a virus.
■ Extract folder rules.
■ Migrate users between different Exchange organizations by extracting the
contents of a mailbox into a .pst file and then importing the contents into
the new store.
C:\OMH\CertPrs8\674-4\ch07.vp
Wednesday, July 25, 2001 3:51:35 PM
Color profile: Generic CMYK printer profile
Composite Default screenCertPrs8 / MCSE Administering
Exchange 2000 Server Study Guide / Clawson/Luckett / 2674-4 / Chapter 7
Restoring User Data
529
Recovering a Deleted Mailbox
You can specify the retention period to keep a mailbox after you have deleted the
mailbox. The default time period is 30 days. You can set the retention period for
whatever time period is appropriate for you. There are minor ramifications to increasing
the deleted mailbox retention period other than consuming more storage space.
Connecting a user account to a mailbox that has been deleted is a relatively trivial
matter, as long as you are still in the retention time period. You will connect a user
to the deleted mailbox in the Active Directory Users and Computers console.
In the ESM, an unconnected mailbox is displayed with a red X through it.
Know how to recover a deleted mailbox. The exam will ask you how to do so,
as this is an important topic at Microsoft.
EXERCISE 7-2
CertCam 7-2
Configuring Deleted Mailbox Retention
In this exercise, you will specifically configure a mailbox store to increase the deleted
mailbox retention period.
1. Start the ESM console.
2. Navigate to and expand the Administrative Groups container.
3. Navigate to and expand the First Administrative Group container.
4. Expand the Servers container.
5. Expand the Exchange1 container.
6. Expand the First Storage Group.
7. Right-click on the Mailbox Store container.
8. Select Properties from the menu.
9. Click on the Limits tab.
10. In the Deletion Settings section, enter 90 in the Keep Deleted Mailboxes For
(Days) field.
C:\OMH\CertPrs8\674-4\ch07.vp
Wednesday, July 25, 2001 3:51:36 PM
Color profile: Generic CMYK printer profile
CertPrs8 / MCSE Administering
Composite Default screen
530
Chapter 7:
Exchange 2000 Server Study Guide / Clawson/Luckett / 2674-4 / Chapter 7
Disaster Recovery for Exchange 2000
11. Click on OK to close the dialog box.
12. Close the ESM console.
Recovering Deleted Items
Deleted items retention is very different from deleted mailbox retention. Deleted
items refer to messages, whereas the deleted mailbox refers to the whole mailbox.
You can configure each of these items independently of each other.
You set the time period for deleted items using the ESM in the same dialog
section of the Limits tab where you set the deleted mailbox retention time period.
You recover deleted items by using Outlook 2000.
Recovering a Mailbox from Backup
To recover an Exchange 2000 mailbox from backup to a recovery (offline) server,
follow these steps:
1. You will need these logical names:
C:\OMH\CertPrs8\674-4\ch07.vp
Wednesday, July 25, 2001 3:51:36 PM
Color profile: Generic CMYK printer profile
Composite Default screenCertPrs8 / MCSE Administering
Exchange 2000 Server Study Guide / Clawson/Luckett / 2674-4 / Chapter 7
Restoring User Data
531
■ The Exchange 2000 organization name
■ The name of the administrative group to which the database belongs
■ The name of the storage group to which the database belongs
■ The logical database name
■ The LegacyExchangeDN value of the administrative group to which the
database belongs (see the discussion in the next section to learn how to
find this value)
2. Install Microsoft Windows 2000 Server on the recovery server, and then run
DCPROMO to install Active Directory on the recovery server.
You will need to create a new isolated forest for your recovery server. Also,
pay attention to how forests (DNS namespace), domains, servers, and folders
must be named and their paths.
3. Install and configure DNS if necessary.
4. Install Exchange 2000, using the same organization name as used in the
production system.
5. Change the name in the LegacyExchangeDN value, if required.
6. Create a storage group using the same logical name as the production server’s
storage group.
7. Create logical database names in the storage group to match the original names.
8. Right-click on the database to rename it, and then click on Rename, if
required.
9. Dismount the database to be restored. In System Manager, select the This
Database Can Be Overwritten By A Restore checkbox.
10. Use Windows 2000 backup utility to restore the database that contains the
mailbox that you want to recover.
Be sure that you select the Last Backup Set checkbox when restoring the last
online backup set. If you fail to select this checkbox, you must run ESEUTIL
/CC against the restored files before the database will start.
C:\OMH\CertPrs8\674-4\ch07.vp
Wednesday, July 25, 2001 3:51:37 PM
Color profile: Generic CMYK printer profile
CertPrs8 / MCSE Administering
Composite Default screen
532
Chapter 7:
Exchange 2000 Server Study Guide / Clawson/Luckett / 2674-4 / Chapter 7
Disaster Recovery for Exchange 2000
11. Mount the database that you restored.
12. In System Manager, navigate to the database and right-click on Mailboxes.
13. Click on Run Cleanup Agent. A red X will identify mailboxes that are not
currently linked to an AD account.
14. Create a non-mailbox-enabled AD user account for each mailbox that you
want to recover.
15. Link the mailboxes to AD accounts by clicking Reconnect.
16. Extract the contents of the mailbox to a .pst file.
Know how to restore a single user’s mailbox from a backup. The exam will
ask you how to do so, as this is an important topic at all the Exchange
conferences that we attend.
LegacyExchangeDN Values To be able to restore from a backup a mailbox
that was part of a previous Exchange 5.5 server, you will need to identify the
LegacyExchangeDN value. There are several ways to find the LegacyExchangeDN of
the administrative group. The LegacyExchangeDN value has the following form:
/O=organization/OU=administrative group
If the OU= portion of the LegacyExchangeDN value is First Administrative Group,
there is no need to change any LegacyExchangeDN values on the recovery server.
If this portion of the value is not administrative group, then you must change the
LegacyExchangeDN values. You must first know what the LegacyExchangeDN
value is (and be able to determine whether the value is an obstacle to configuring
your recovery server).
There are two ways to determine and change the LegacyExchangeDN value:
■ You can use ADSIEDIT or LDP to view the properties of the administrative
group object.
■ You can use the LDIFDE utility.
To use LDIFDE, you must know the fully qualified DNS domain name of
the root domain in your Windows 2000 forest. The domain name you want is
C:\OMH\CertPrs8\674-4\ch07.vp
Wednesday, July 25, 2001 3:51:37 PM
Color profile: Generic CMYK printer profile
Composite Default screenCertPrs8 / MCSE Administering
Exchange 2000 Server Study Guide / Clawson/Luckett / 2674-4 / Chapter 7
Restoring User Data
533
not necessarily the domain name to which the Exchange 2000 Server belongs,
but rather the root domain name of the entire forest. You will also need the
Exchange organization and the administrative group names.
For example, the following LDIFDE command displays the results on the screen.
(The command must be entered as a single line, but it is wrapped here for readability.)
LDIFDE –f CON –d "CN=Executives,CN=Administrative Groups,
CN=Exchange1,CN=Microsoft Exchange,CN=Services,CN=Configuration,
DC=gk,DC=com" –l legacyExchangeDN –p Base
In this example, Executives is in LegacyExchangeDN, and because of this,
objects on the recovery server must be modified because after a clean Exchange
2000 installation, LegacyExchangeDN on the recovery server contains First
Administrative Group, not Executives.
SCENARIO & SOLUTION
I have more data to back up than I can fit on my
tape cassette. What can I do?
Depending on exactly how much data changes from
day to day, you can use either an incremental or a
differential backup technique.
In the case of a failure, I must restore the sales
department’s e-mail first. How do I do that?
Put the sales department’s mailboxes in their own
mailbox store in another storage group. This will
allow you to restore that storage group first and
mount the mailbox store.
I have two storage groups on my Exchange 2000
Server. Each storage group contains enough data to
fill my tape and I want to do a full backup. What
can I do?
You could perform a full backup of each storage
group every other day.
C:\OMH\CertPrs8\674-4\ch07.vp
Wednesday, July 25, 2001 3:51:38 PM
Color profile: Generic CMYK printer profile
CertPrs8 / MCSE Administering
Composite Default screen
534
Chapter 7:
Exchange 2000 Server Study Guide / Clawson/Luckett / 2674-4 / Chapter 7
Disaster Recovery for Exchange 2000
CERTIFICATION OBJECTIVE 7.03
Configuring a Server for Disaster Recovery
This section discusses configuring the Exchange 2000 Server that holds the
Exchange databases to make it easier to recover them in the event of a disaster. You
can recover the databases in two places: the original server and a different server. In
the different server category, there are two types of servers. One is a replacement
server that will be used permanently for the failed original server. The other is a
temporary recovery server that will be used only to recover some specific data, and
when that task is done, the recovery server will more or less be abandoned until the
next disaster recovery. This section focuses on configuring three items:
■ Storage groups and stores
■ Log settings
■ A server for recovery
Storage Groups and Stores
There are several reasons to configure multiple storage groups and multiple
information stores on the same server. One reason can be to improve performance,
especially that of disk subsystems. The other reason is to aid restoring a storage
group or information store after a failure.
You want your design to minimize the restore time for critical mailboxes or
mailbox stores. You also want your design to keep your backup routines as simple as
is practical. Complex designs are difficult to implement and sustain and often
require great attention to detail, the kind of attention that often gets overlooked in
the boredom of routines such as daily or multiple daily backups.
When you are doing an online backup, the transaction logs are of critical
importance because they contain the transactions that are not yet written to the
database. These same transaction files are of no concern when you do an offline
backup. To do an offline backup, you must dismount the store. When you do that,
the committed transactions held in the log files are flushed to the database. Of
course, when you are doing an offline backup, that database is not available for use.
C:\OMH\CertPrs8\674-4\ch07.vp
Wednesday, July 25, 2001 3:51:38 PM
Color profile: Generic CMYK printer profile
Composite Default screenCertPrs8 / MCSE Administering
Exchange 2000 Server Study Guide / Clawson/Luckett / 2674-4 / Chapter 7
Configuring a Server for Disaster Recovery
535
Backing up the entire storage group backs up all of the stores and the transaction
files. Such a backup is the simplest to administer, and you can’t miss anything.
However, if you must back up all of the stores in the storage group at the same time,
the backup might possibly exceed the time allotted. In this case, using multiple
storage groups and multiple backup devices, you can simultaneously back up the
multiple stores and keep the backup time within the allotted time period.
As we have indicated before, using multiple stores (even within the same storage
group) allows you to selectively restore the store. You can restore a mailbox store, for
example, without having to disrupt the other mailbox stores in the storage group.
Using multiple mailbox stores also allows you to restore one mailbox store, and
therefore the critical mailboxes within that store, before restoring the others.
Logging Settings
The prime consideration here is whether to use circular logging or not to use circular
logging. Circular logging conserves disk space. But unless you do normal backups
frequently enough before the circular log wraps, you will be in trouble if a failure
occurs. Disabling circular logging is the preferred method of operation.
EXERCISE 7-3
CertCam 7-3
Configuring Log Settings
In this exercise, you will configure the log settings to ensure that circular logging is
disabled on the default mailbox store.
1. Start the ESM console.
2. Navigate to and expand the Administrative Groups container.
3. Navigate to and expand the First Administrative Group container.
4. Expand the Servers container.
5. Expand the Exchange1 container.
6. Right-click on the First Storage Group.
7. Click on the Enable Circular Logging checkbox, then click OK.
C:\OMH\CertPrs8\674-4\ch07.vp
Wednesday, July 25, 2001 3:51:39 PM
Color profile: Generic CMYK printer profile
CertPrs8 / MCSE Administering
Composite Default screen
536
Chapter 7:
Exchange 2000 Server Study Guide / Clawson/Luckett / 2674-4 / Chapter 7
Disaster Recovery for Exchange 2000
8. Click on Yes in response to the question about using circular logging.
9. Close the ESM.
Configuring a Server for Recovery
There are two issues that are important when configuring a server for recovery. One
is configuring a server to be easy to manage in the case of failure and the other is if
you want to restore to that server. Using multiple drives will simplify the process.
Using multiple storage groups may also help, depending on the exact scenario. If
C:\OMH\CertPrs8\674-4\ch07.vp
Wednesday, July 25, 2001 3:51:40 PM
Color profile: Generic CMYK printer profile
Composite Default screenCertPrs8 / MCSE Administering
Exchange 2000 Server Study Guide / Clawson/Luckett / 2674-4 / Chapter 7
Restoring the Information Stores
537
you elect to use multiple storage groups, the recommendation is to put each storage
group on its own array, using RAID 5 if you are interested in fault tolerance.
Remember also that for best performance, you should keep the log files for that
storage group on separate physical drives as well. Don’t forget that you want to
mirror the transaction log file drives.
If you are using multiple storage groups, do not put the transaction log files
for multiple storage groups on the same drive.
CERTIFICATION OBJECTIVE 7.04
Restoring the Information Stores
Before you restore a backup from tape, you should make copies of existing database
files, even if you cannot start these files. The existing database may be repairable,
even though the database may be damaged.
You cannot restore an Exchange 5.5 database to an Exchange 2000 Server.
The log files for an Exchange 5.5 database are different from those of an
Exchange 2000 database.
You should never let the drive that contains your databases get more than half
full. This way, you can quickly save a copy of a database that crashes. If you do let
the database drive fill up, and you do not have sufficient space to move the database
to another folder on the same logical drive, your recovery time is extended. Usually,
recovery time is doubled.
If you keep your database drive from filling up, you also have room for offline
defragmentation.
Before you restore a database, you must start the information store service. You
will need to dismount the databases that you want to restore. If you leave the Mount
Database After Restore checkbox clear, be sure to examine the event logs to see that
the hard recovery finishes before you mount the database in ESM. A hard recovery
replays the transaction log files and the patch files after you restore the database.
C:\OMH\CertPrs8\674-4\ch07.vp
Wednesday, July 25, 2001 3:51:40 PM
Color profile: Generic CMYK printer profile
CertPrs8 / MCSE Administering
Composite Default screen
538
Chapter 7:
Exchange 2000 Server Study Guide / Clawson/Luckett / 2674-4 / Chapter 7
Disaster Recovery for Exchange 2000
If you are restoring only a single backup set, do not forget to select the Last
Restore Set checkbox in Windows NT Backup to trigger hard recovery after
restoration. If you did not select this checkbox, then you can perform a hard
recovery by using ESEUTIL /CC. You must run this utility in the same folder as
the transaction logs, patch files, and the restore.env file. You cannot remount
the database until the hard recovery finishes.
In a soft recovery, a database starts normally and the storage group is initialized. If
the database file is in a consistent state, the ESE simply begins to handle transactions.
If the database is in an inconsistent state (it might not have been shut down
properly), the ESE replays transactions from the checkpoint through to the log file.
If the checkpoint file doesn’t exist, the ESE starts with the earliest transaction log
that it finds. When the ESE finishes replaying the transaction, the database is
available.
You can follow these steps to recover databases:
1. Ensure that the information store service is running.
2. Ensure that the database you want to restore is dismounted.
3. On the Start menu, point to Programs, point to Accessories, point to System
Tools, and then click on Backup.
4. On the Restore tab, expand the media file. Select checkboxes to select the
data that you want to restore.
5. Click on Start Restore.
6. In the Restore Database Store dialog box, use the Temporary location to
specify a directory to store a log file that is different from the directory where
the original log files exist. Make sure the location has enough disk space to
store the files. If you restore databases or log files to their original location,
any existing databases or log files are overwritten.
7. If you are restoring a full backup without any incremental backups, select
Last Restore Set to start a log file replay after restoring the database. If you
are restoring a backup with incremental backups, do not select this option
until you are restoring the last incremental backup.
8. Click on OK.
C:\OMH\CertPrs8\674-4\ch07.vp
Wednesday, July 25, 2001 3:51:40 PM
Color profile: Generic CMYK printer profile
Composite Default screenCertPrs8 / MCSE Administering
Exchange 2000 Server Study Guide / Clawson/Luckett / 2674-4 / Chapter 7
Troubleshooting Backup and Restore Problems
539
Restoring Exchange Server
Active Directory almost always survives a disaster that occurs to an Exchange 2000
computer. Therefore, you cannot reinstall Exchange 2000 on a server without first
removing that server from AD. However, you do not want to remove the server
from AD, because all of the configuration information will be lost, and you will
need that information in AD.
With Exchange 2000, using the Setup utility with the /disasterrecovery switch
solves this problem.
In disaster recovery mode, Setup installs program files and local Registry settings,
but assumes that AD information remains intact. Setup searches for the server in
AD, then reconfigures the local setup based on what it found in AD.
In disaster recovery mode, Setup restores only the components that you choose to
restore. If you do not choose a component that was previously installed, the utility
does not restore that component. After Setup finishes, you can restore the Exchange
databases, and those databases are restored to the correct previous locations because
AD stores information store database paths.
CERTIFICATION OBJECTIVE 7.05
Troubleshooting Backup and Restore Problems
Backing up data is a very important process. You will only go to your backup when
you have an emergency or have suffered a disaster with the online data. In these
cases, you will want to have good, usable backup copies of the data.
However, backing up the data is only a small part of the picture. Actually being
able to successfully restore the data is the big part of the picture. Having a good, usable
backup copy of the data will not be helpful if you can’t actually restore that data.
Problems can occur when both backing up and restoring data from backups. This
section will highlight some of the problems that can occur and what to do if those
problems occur.
C:\OMH\CertPrs8\674-4\ch07.vp
Wednesday, July 25, 2001 3:51:41 PM
Color profile: Generic CMYK printer profile
CertPrs8 / MCSE Administering
Composite Default screen
540
Chapter 7:
Exchange 2000 Server Study Guide / Clawson/Luckett / 2674-4 / Chapter 7
Disaster Recovery for Exchange 2000
SCENARIO & SOLUTION
I keep getting a bunch of 1018 errors.
Look for hardware problems.
One of my mailbox stores is corrupt. What should I
attempt first to fix it?
Restore from tape backup.
Why not just run ESEUTIL or ISINTEG?
Depending on the state of things, you could suffer
data loss from running one of these utilities. Use
them as a last resort.
So what? I still have my online tape backup.
Your online backup will need the transaction logs,
which got flushed when you ran the utility, and
again you suffer data loss.
I manually deleted my transaction logs to free up
space on the drive. Now I need to restore my online
backup and need the most current data. What
should I do?
Look for another job, perhaps in the housekeeping
or food services industries. When you deleted the
logs, you deleted your ability to restore the database
in as current a state as possible.
Common Error Messages
Several common error messages are important for you to know, both in the real
world and for the test.
–1018 Error
One important error message is –1018 JET_errReadVerifyFailure. Before a page is
written to the disk, a checksum is calculated for that page and written with the page
to the disk. When a page is requested, it is read from the disk, and the checksum is
recalculated and verified along with the page number being requested. If the
checksum fails or there is a page number mismatch, a –1018 error message is
generated. This error indicates that the data that was written to the disk was not the
data that was read from the disk to memory. The ESE will attempt to read the data
many times (16, in fact) before it reports the error. ESE makes these attempts to
minimize the possibility of a transient fault condition causing the error.
To fix 1018 errors, first fix the underlying problem of the error, which is
usually a disk subsystem problem. Then restore the database from a known
good copy.
C:\OMH\CertPrs8\674-4\ch07.vp
Wednesday, July 25, 2001 3:51:41 PM
Color profile: Generic CMYK printer profile
Composite Default screenCertPrs8 / MCSE Administering
Exchange 2000 Server Study Guide / Clawson/Luckett / 2674-4 / Chapter 7
Troubleshooting Backup and Restore Problems
541
Common causes of this error message are:
■ A hardware problem with the disk subsystem. This is the most common
cause of the error.
■ A high number of “soft” recovered errors on a hard drive. In this case, you
should replace the drive.
■ Improper SCSI termination.
■ Trouble with the write-back cache on a disk controller.
■ Third-party tools that attempt to write directly to the Exchange database.
■ Faulty device drivers.
■ Firmware bugs in the disks or the disk controllers.
If you receive error messages, do not assume that your database has been
damaged. If you incorrectly assume the database is damaged and take drastic
measures to correct the supposed damage, it could lead to actual damage
and prolonged downtime. The only error messages that you can assume
indicate a corrupted database are repetitive –1018 errors.
-1069 Error
Another important error message is –1069 JET_errVersionStoreOutOfMemory.
During an operation, it is possible that an operation will fail to complete (hang) or
that it is so large that it will cause the version store to consume hundreds of
megabytes. One possible operation that might cause such a failure to occur is
indexing a large table. As the version store keeps track of all of the changes, such an
operation could stress the version store to the point of generating an error. To fix
this, try moving the information stores to a disk with more free space. You might
also consider adding more RAM.
ESEUTIL
In an ideal world, you’d never need to run ESEUTIL. There are only three
situations in which we recommend using it:
■ You want to check the integrity of a database.
C:\OMH\CertPrs8\674-4\ch07.vp
Wednesday, July 25, 2001 3:51:42 PM
Color profile: Generic CMYK printer profile
CertPrs8 / MCSE Administering
Composite Default screen
542
Chapter 7:
Exchange 2000 Server Study Guide / Clawson/Luckett / 2674-4 / Chapter 7
Disaster Recovery for Exchange 2000
■ You need to defragment a database to free up disk space. There is never any
reason to defragment databases on a routine basis. Remember, the online
defragmentation process runs daily to defragment databases.
■ You need to fix a corrupted database because you can’t restore it from a
backup.
We cannot overemphasize that ESEUTIL is not a tool for casual use. It can be
dangerous, especially in repair mode. We grimace when we see people
running it as a preventive maintenance tool. Doing so is like playing Russian
roulette with an automatic pistol.
Table 7-1 lists the common switches used with ESEUTIL and their meaning.
Pay attention! The Exchange 2000 version of ESEUTIL is different from the
previous versions, especially the /C [options] switch and the /U switch, which
no longer exists.
TABLE 7-1
ESEUTIL Options
Switch
Function
/CC
Forces a hard recover that plays the transaction log files and patch files. Use this switch after a
restore where you did not select the Last Restore Set option.
/CM
Dumps the restore.env file, which is a binary file. Both this switch and the /CC switch are
options used with the /c switch, described later in this table.
/d
Defragmentation. Copies the database to a new file and removes empty or unused pages and
then copies the file back. You need space on the drive to use this switch.
/r
Recovery. Attempts to put the database in a consistent state, but does not truncate the data.
/g
Integrity. Validates the checksum and header information and is nondestructive. You will
need to run it once for each database.
/m
File dump. Attempts to dump the database file contents in a human-readable form.
/p
Repair. Validates the database and links and can truncate data and cause data loss.
/c
Restores the database without a hard recovery using the Restore.env.
C:\OMH\CertPrs8\674-4\ch07.vp
Wednesday, July 25, 2001 3:51:42 PM
Color profile: Generic CMYK printer profile
Composite Default screenCertPrs8 / MCSE Administering
Exchange 2000 Server Study Guide / Clawson/Luckett / 2674-4 / Chapter 7
Troubleshooting Backup and Restore Problems
543
ISINTEG
The Information Store Integrity Checker (ISINTEG) is used on Exchange
databases. It is a suite of tests that check the Exchange 2000 databases for
consistency.
You should be careful which tests you select to run. Running a full test
complement on your Exchange database could take many hours to complete.
The database stores are unavailable during this time.
To use the utility, the database must be dismounted. When you use ISINTEG, it
will create a temporary database, so you will need to have room on the drive for this
database.
A storage group can have no more than six databases. If you have six
databases created in the storage group and want to run ISINTEG, you will
need to dismount a second database so the utility can execute.
Table 7-2 lists the common switches used with ISINTEG and their meaning.
Pay attention! Like ESEUTIL, there are differences between the Exchange
2000 version of ISINTEG and previous versions. The –patch switch no longer
exists.
TABLE 7-2
ISINTEG Switches
Switch
Function
-fix
Specifies the fix mode. The default is check-only mode. In fix mode, ISINTEG will
fix any inconsistencies that it finds.
-verbose
Reports in verbose form.
-s
Specifies the server name against which to test.
-l [log filename]
Specifies the log filename.
-t [ref db location]
Indicates the location of the temporary database, also known as the reference
database.
-test [test name]
Selects the ISINTEG test.
C:\OMH\CertPrs8\674-4\ch07.vp
Wednesday, July 25, 2001 3:51:43 PM
Color profile: Generic CMYK printer profile
CertPrs8 / MCSE Administering
Composite Default screen
544
Chapter 7:
Exchange 2000 Server Study Guide / Clawson/Luckett / 2674-4 / Chapter 7
Disaster Recovery for Exchange 2000
EXERCISE 7-4
Running ESEUTIL
In this exercise, you will dismount the mailbox store, run ESEUTIL to defragment
the database, and then mount the mailbox store after the defragmentation is done.
1. Open the ESM.
2. Navigate to and expand the Administrative Groups folder.
3. Expand First Administrative Group.
4. Expand Exchange Server.
5. Expand First Storage Group.
6. Right-click on Mailbox Store.
7. Click on Dismount Store from the menu.
8. Click on Yes on the confirmation dialog box.
9. Open a command prompt.
C:\OMH\CertPrs8\674-4\ch07.vp
Wednesday, July 25, 2001 3:51:44 PM
Color profile: Generic CMYK printer profile
Composite Default screenCertPrs8 / MCSE Administering
Exchange 2000 Server Study Guide / Clawson/Luckett / 2674-4 / Chapter 7
Troubleshooting Backup and Restore Problems
545
10. Change directories to the c:\program files\exchsrvr\bin folder. Your actual
path may be different depending on where you installed the Exchange 2000
Server. During this exercise, simply use your correct path.
11. Enter eseutil /d “c:\program files\exchsrvr\mdbdata\priv1.edb”. Don’t
forget to use the double quotes around the command to accommodate the
spaces in the command line.
12. Press ENTER.
13. Depending on the size of the database, defrag will run and then terminate by
reporting the status and time it took to run the program.
14. Close the command prompt.
15. In the ESM, mount the mailbox store.
16. Click on OK in the success message dialog box.
17. Close the ESM.
C:\OMH\CertPrs8\674-4\ch07.vp
Wednesday, July 25, 2001 3:51:45 PM
Color profile: Generic CMYK printer profile
CertPrs8 / MCSE Administering
Composite Default screen
546
Chapter 7:
Exchange 2000 Server Study Guide / Clawson/Luckett / 2674-4 / Chapter 7
Disaster Recovery for Exchange 2000
FROM THE CLASSROOM
Backing Up
Backing up mission-critical services is, in itself,
mission-critical. When students come to class,
it is a good time to interact with engineers
from many different types of organizations and
find out what applications those organizations
believe are mission-critical. It is also very
interesting to hear their reaction when the
engineers find out which applications are
mission-critical.
Among the applications mentioned as being
mission-critical are e-mail, human resources,
payroll, customer management, and online
commerce. In the last two years, e-mail has
gone from being the second- or third-priority
application to being the number-one
mission-critical application among many.
Students used to say, “Payroll is the most
important application if it goes down,
especially during certain times.” Now they say,
“If e-mail isn’t working, then I won’t get
notified that the payroll service is down!”
It can be easy to find out how
mission-critical your e-mail application is
when it goes down. I have heard several
students remark that they thought they had
two or more days to restore e-mail. After the
e-mail service went down, they found out they
had hours, not days, to restore the service.
In fact, some organizations require that
some mailboxes be restored within 20 minutes,
and it is not unusual to find the requirement
for all mailboxes to be restored in a two- to
four-hour timeframe. Obviously, to meet these
requirements you must plan your restore and
backup routines very carefully.
—Shane Clawson, MCSE+I, MCT
CERTIFICATION OBJECTIVE 7.06
Safeguarding User Keys
When configuring Exchange 2000 for Advanced Security, you must consider some
additional factors when developing a disaster recovery plan. The Key Management
Services (KMS) provided in Exchange 2000 used for managing the enrollment of
users and the archiving of their keys for secure e-mail rely on several underlying
services. If one of the components involved with Advanced Security fails, it is
C:\OMH\CertPrs8\674-4\ch07.vp
Wednesday, July 25, 2001 3:51:46 PM
Color profile: Generic CMYK printer profile
Composite Default screenCertPrs8 / MCSE Administering
Exchange 2000 Server Study Guide / Clawson/Luckett / 2674-4 / Chapter 7
Safeguarding User Keys
547
possible that all components will be inoperable, leaving secured e-mail in your
organization inaccessible. In short, recovering KMS in Exchange 2000 in the event
that all servers in your organization have failed (total disaster) requires:
■ The most recent backup of the Certificate Authority (CA) and subordinate
CA certificate (.p12 export files) and the associated passwords
■ The most recent backup of Active Directory that contains the KMS
administrator accounts
■ The most recent backup of the KMS database and the startup password
■ The KMS administrator’s password
Earlier in the book, we focused on how to enroll clients using KMS and Active
Directory. We have also already discussed how to recover the keys used to secure
e-mail. This section takes a step further and talks about how to ensure that the KMS
service can be restored in the event of a disaster. To learn more about KMS, and
how to administer advanced security using KMS, see Chapter 3.
Backing Up Key Management Services
KMS in Exchange 5.5 was a self-contained entity. In Exchange 2000, KMS can
be thought of as the combination of the Windows 2000 Enterprise Certificate
Authority, Active Directory Services, and the Key Management Service itself. All
three of these must be backed up together in order for KMS to be properly restored
in the event of a critical failure.
Backing Up the Certificate Authority
Microsoft recommends backing up the Enterprise Certificate Authority server using
the “entire server” option with NT Backup. You should back up this server for each
subordinate CA in your enterprise as well. However, you must do some additional
work to safeguard this critical service in Exchange 2000. To restore a Certificate
Authority, you must also use the Certification Authority MMC snap-in to back up
the CA certificate. This will create a .p12 file that will be used during the restore
process. When backing up the CA certificate, you will be prompted for a password.
Make this a very difficult password and safeguard the .p12 file and password in an
extremely secure place. If this password is compromised, your entire PKI will be
jeopardized.
C:\OMH\CertPrs8\674-4\ch07.vp
Wednesday, July 25, 2001 3:51:46 PM
Color profile: Generic CMYK printer profile
CertPrs8 / MCSE Administering
Composite Default screen
548
Chapter 7:
Exchange 2000 Server Study Guide / Clawson/Luckett / 2674-4 / Chapter 7
Disaster Recovery for Exchange 2000
EXERCISE 7-5
Backing Up the CA Certificate
In this exercise, you will back up the CA certificate and the Issued Certificate log
using the Certification Authority MMC snap-in.
1. Click on Start | Programs | Administrative Tools, then select Certification
Authority.
2. Right-click on the root object, point to All Tasks, and select Backup CA.
3. When the welcome screen appears for the Certification Authority Backup
Wizard, click on Next.
4. On the Items To Back Up screen, select the Private Key And CA Certificate
checkbox and the Issued Certificate Log And Pending Certificate Request
Queue checkbox. Make sure to also specify a path for the backup. Then click
on Next.
C:\OMH\CertPrs8\674-4\ch07.vp
Wednesday, July 25, 2001 3:51:47 PM
Color profile: Generic CMYK printer profile
Composite Default screenCertPrs8 / MCSE Administering
Exchange 2000 Server Study Guide / Clawson/Luckett / 2674-4 / Chapter 7
Safeguarding User Keys
549
5. On the Select A Password screen, enter a complex password, confirm the
password, and click on Next. Note that it is important not to lose this
password. Make sure that you store it in an extremely safe location.
6. Verify the settings you have made in the CA Backup Wizard on the
Completing The Certification Authority Backup Wizard screen and then
click on Finish.
7. Navigate to the location that you specified for the backup to be placed and
verify that there is a DataBase folder and a .p12 file. You should move these
files to a very safe location. Preferably, you should move them off the
network until you need them for recovery purposes.
C:\OMH\CertPrs8\674-4\ch07.vp
Wednesday, July 25, 2001 3:51:48 PM
Color profile: Generic CMYK printer profile
CertPrs8 / MCSE Administering
Composite Default screen
550
Chapter 7:
Exchange 2000 Server Study Guide / Clawson/Luckett / 2674-4 / Chapter 7
Disaster Recovery for Exchange 2000
Backing Up Active Directory
Each Active Directory domain should include two or more domain controllers
(DCs). Each of these domain controllers contains a read/write copy of the domain
database. Changes made to any DC are automatically replicated to all other DCs
using a multimaster replication model, essentially making each DC an online
backup for all other domain controllers.
A domain database is a single partition of Active Directory. Active Directory is
the sum total of all objects in all Active Directory domain databases in an
organization. The AD component that ties them all together is the Global Catalog.
By having more than one domain controller in each domain, you guarantee that a
given AD domain will have no single point of failure. Because Windows 2000 uses
multimaster replication, a single failed DC does not necessarily constitute an
emergency situation. Even so, you should back up each domain controller in Active
Directory on a regular schedule. The Active Directory database is backed up when
you select the System State in Windows 2000 Backup on a DC (Figure 7-2).
Backing Up the KMS Database
The KMS database (KMSMDB.EDB) and associated KMS files will be backed up
when you perform a backup of the Exchange Server running KMS. You must select
FIGURE 7-2
From Windows
2000 Backup
Wizard, select
the option to
back up only the
System State data
C:\OMH\CertPrs8\674-4\ch07.vp
Wednesday, July 25, 2001 3:51:48 PM
Color profile: Generic CMYK printer profile
Composite Default screenCertPrs8 / MCSE Administering
Exchange 2000 Server Study Guide / Clawson/Luckett / 2674-4 / Chapter 7
Safeguarding User Keys
551
the Microsoft Key Management Service object from the Items To Back Up screen in
the NT Backup Wizard (Figure 7-3). In fact, this option will not be available if the
KMS service is not running while the backup is performed. The KMS files are
located in PROGRAM FILES\EXCHSRVR\KMSDATA\ by default. It is important
that the Certification Authority be backed up at the same time that you back up the
KMS database in order to keep the CRLs (Certificate Revocation Lists) in sync.
Backing Up the KMS Database Remotely
You can back up KMS databases only on the local machine. This is because the
KMS database is hidden from the network to prevent unauthorized people from
browsing the network for the KMS server. There are a couple of workarounds in the
event that you must back up the KMS database remotely. You can install terminal
services on the KMS server and connect with a Terminal server client. Because
Terminal server can be detrimental to performance, you may choose to use lightweight
remote console software such as Symantec’s PC Anywhere or McAfee’s Remote
Desktop. Once connected to the KMS server, you can initiate NT Backup to back up
the KMSDATA folder. Then you can remotely back up the .bkf created by NT Backup.
FIGURE 7-3
Microsoft Key
Management
Service object in
the Backup
Wizard
C:\OMH\CertPrs8\674-4\ch07.vp
Wednesday, July 25, 2001 3:51:49 PM
Color profile: Generic CMYK printer profile
CertPrs8 / MCSE Administering
Composite Default screen
552
Chapter 7:
Exchange 2000 Server Study Guide / Clawson/Luckett / 2674-4 / Chapter 7
Disaster Recovery for Exchange 2000
The KMS database is hidden from the rest of the network and can be backed
up only on the local KMS server.
Restoring KMS
Prior to restoring the KMS database, make sure that Active Directory and
Certificate Server have been restored, are working properly, and are available.
Because of the additional password security associated with KMS administration,
restoring KMS is not as straightforward a process as restoring the information store
databases. However, the processes are similar. The KMS restore process is outlined
as follows:
1. Install KMS. Note that you do not have to install KMS on the same
computer or computername.
2. If you are restoring KMS to same machine, stop KMS and move the current
contents of the KMSDATA directory to another location. Note that if the
KMSDATA directory isn’t empty before you restore KMS, you will receive a
0xC103798A error.
3. If the KMS password was placed in a Kmserver.pwd file, place this file on the
server.
4. Start the KMS service. If the KMS password was not placed in a
Kmserver.pwd file, type in the password to start the service.
5. Restore KMS using NT Backup.
6. Stop and restart the KMS service.
KMS Restoration Problems
In the process of reinstalling or restoring KMS, you may run into some KMS-specific
problems. Although many problems with KMS in Exchange 5.5 are documented,
that documentation may prove to be useless and at the very least outdated by KMS
in Exchange 2000 for reasons that this book has already mentioned. Here are two
known issues related to KMS restoration to watch out for on the exam:
■ Error 0xC103798A
■ Error c104172 with ESE Event ID 619
C:\OMH\CertPrs8\674-4\ch07.vp
Wednesday, July 25, 2001 3:51:49 PM
Color profile: Generic CMYK printer profile
Composite Default screenCertPrs8 / MCSE Administering
Exchange 2000 Server Study Guide / Clawson/Luckett / 2674-4 / Chapter 7
Safeguarding User Keys
553
Error 0xC103798A When recovering a failed machine, you may decide to
reinstall KMS. During the installation process, you may get the following message:
Setup failed while installing sub-component Key Management
Service with error code 0xC103798A (please consult the
installation logs for a detailed description). You may cancel
the installation or try the failed step again.
The most likely cause of this error is that a database for a previously installed version
of KMS still exists in the KMSDATA folder. To fix this problem, you should move
the data in the KMSDATA folder to another location and then perform the
installation again. It is a good idea not to delete the previous database, as you may
need it in the future.
Error c104172 with ESE Event ID 619 Error c104172 is not unique to
KMS. However, it may occur when you mount the KMS database after a restore.
When attempting to mount the database, you may receive the following error:
An internal processing error has occurred. Try restarting the
Exchange System Manager or the Microsoft Exchange Information
Store service, or both.
ID no: c1041724
Exchange System Manager
The following event will be logged into the application log as well:
Event
Event
Event
Event
Type: Error
Source: ESE98
Category: Logging/Recovery
ID: 619
If you encounter this error and event ID, it is very likely that you did not select the
Last Restore Set checkbox during the restore process. This means that a hard
recovery was not performed on the database. Before you can mount the database,
you will need to force a hard recovery. You can do so using ESEUTIL:
eseutil /cc [path to directory containing Restore.env]
Another option is to run the restore again and select the Last Restore Set checkbox.
C:\OMH\CertPrs8\674-4\ch07.vp
Wednesday, July 25, 2001 3:51:50 PM
Color profile: Generic CMYK printer profile
CertPrs8 / MCSE Administering
Composite Default screen
554
Chapter 7:
Exchange 2000 Server Study Guide / Clawson/Luckett / 2674-4 / Chapter 7
Disaster Recovery for Exchange 2000
CERTIFICATION SUMMARY
This chapter has wrapped up discussions of technologies that earlier chapters
introduced and covered specific exam objectives. Planning your Exchange Server
backup and restore routines is an important part of the production cycle of your
Exchange Server. Much of your administrative time may be involved with planning
to recover from the unexpected or having to recover from the expected disaster.
Some of the disaster may be user-induced, but you will still need to recover the data.
You can create storage groups and mailbox stores to facilitate both the backup and
the restore process.
Because backup and restore are very important functions in the real world, you
can expect Microsoft to make them an important test area. You need to know about
a number of important utilities, again for both the test and to be able to do your job
effectively when administering an Exchange 2000 Server.
You must also fix clearly in your mind the types of restore scenarios that could
come up. Some examples of such scenarios include restoring to the same server after
data corruption, restoring to the same server after a hardware failure and repair,
restoring to a new replacement server of the same name or different name, and
restoring to a recovery server not intended for production for the purposes of
recovering deleted messages from tape backup.
So now you are nearly done with the book, and you are studying to administer
Exchange 2000 Server and to take the test. Just a few more items to read and
understand and you are ready to go. Good luck!
C:\OMH\CertPrs8\674-4\ch07.vp
Wednesday, July 25, 2001 3:51:50 PM
Color profile: Generic CMYK printer profile
Composite Default screenCertPrs8 / MCSE Administering
Exchange 2000 Server Study Guide / Clawson/Luckett / 2674-4 / Chapter 7
Two-Minute Drill
✓
555
TWO-MINUTE DRILL
Implementing a Backup and Restore Plan
❑ You can create storage groups to facilitate backup and restore.
❑ You can create mailbox stores to facilitate backup and restore.
❑ The database remains available during an online backup.
❑ To do an offline backup, you first must dismount the storage group or store.
Messaging is not available during an offline backup.
❑
❑
❑
❑
Transaction logs are deleted after an offline backup.
Never manually delete the transaction log files.
A normal or full backup backs up all files, databases, and transaction logs.
A normal or full backup deletes the transaction log files after the database has
been successfully backed up.
❑ After a normal or full backup, everything you need for a restore is on the tape.
❑ An incremental online backup does delete the transaction log files. You will
need these files for a restore.
❑ A differential online backup does not delete the transaction log files. You will
need these files for a restore.
❑ You should never manually delete the transaction log files.
Restoring User Data
❑ Users can recover deleted messages from inside Outlook 2000 up to the
deleted item retention period you specify.
❑ The default item retention period is zero days.
❑ You can recover a deleted mailbox up to the deleted mailbox retention period.
❑ Run Mailbox Cleanup Agent to see which mailboxes do not have associated
user accounts.
❑ Put mission-critical mailboxes, those that must be restored before other
mailboxes, in their own separate mailbox store.
C:\OMH\CertPrs8\674-4\ch07.vp
Wednesday, July 25, 2001 3:51:55 PM
Color profile: Generic CMYK printer profile
CertPrs8 / MCSE Administering
Composite Default screen
556
Chapter 7:
Exchange 2000 Server Study Guide / Clawson/Luckett / 2674-4 / Chapter 7
Disaster Recovery for Exchange 2000
Configuring a Server for Disaster Recovery
❑ Put transaction log files and database files on separate physical drives.
❑ Put each storage group on its own drive or set of drives.
❑ Recovery servers for message recovery must be in an isolated forest.
Restoring the Information Stores
❑ Restore information stores from tape backup.
❑ Databases restored from online backups must replay the current set of
transaction logs and patch files to be current.
❑ Be sure to select the Last Restore Set checkbox to force a hard recovery.
❑ You can use ESEUTIL /CC to force a hard recovery.
❑ A hard recovery forces the ESE to replay the transaction logs.
Troubleshooting Backup and Restore Problems
❑ You must dismount the database prior to a restore.
❑ You must dismount the database prior to running ESEUTIL.
❑ Running ISINTEG can take a very long time, during which the database will
be unavailable.
❑ In general, 1018 error messages indicate a hardware problem.
❑ You want to fix the hardware problem first.
❑ A 1018 error could also indicate a corrupt database not caused by any
particular hardware problem.
❑ Attempt to restore a corrupted database from tape backup first, before
running ESEUTIL or ISINTEG.
❑ Use ESEUTIL to defragment a database.
❑ Have we mentioned before that you should never manually delete the
transaction log files?
❑ You are running out of time to remember this.
C:\OMH\CertPrs8\674-4\ch07.vp
Wednesday, July 25, 2001 3:52:00 PM
Color profile: Generic CMYK printer profile
Composite Default screenCertPrs8 / MCSE Administering
Exchange 2000 Server Study Guide / Clawson/Luckett / 2674-4 / Chapter 7
Two-Minute Drill
557
Safeguarding User Keys
❑ If one of the components involved with Advanced Security fails, it is possible
that all components will be inoperable, leaving secured e-mail in your
organization inaccessible.
❑ KMS in Exchange 5.5 was a self-contained entity. In Exchange 2000, KMS
can be thought of as the combination of the Windows 2000 Enterprise
Certificate Authority, Active Directory Services, and the Key Management
Service itself.
❑ The KMS files are located in PROGRAM FILES\EXCHSRVR\KMSDATA\
by default.
❑ To restore a Certificate Authority, you must also use the Certification
Authority MMC snap-in to back up the CA certificate. This will create a
.p12 file that will be used during the restore process.
C:\OMH\CertPrs8\674-4\ch07.vp
Wednesday, July 25, 2001 3:52:05 PM
Color profile: Generic CMYK printer profile
CertPrs8 / MCSE Administering
Composite Default screen
558
Chapter 7:
Exchange 2000 Server Study Guide / Clawson/Luckett / 2674-4 / Chapter 7
Disaster Recovery for Exchange 2000
SELF TEST
Implementing a Backup and Restore Plan
1. You are the Exchange administrator for your company. You want to be able to back up your
Exchange 2000 Server computer, which is a member server in the domain. Which of the
following are legitimate options for backing up your server? (Choose all that apply.)
A. The Windows 2000 backup program on the domain controller
B. The Windows 2000 backup program on the member server
C. A third-party backup program with an Exchange agent
D. Any third-party backup program
2. You are the Exchange administrator for your company. You are preparing the disaster recovery
plan for your Exchange 2000 Server. You are considering using a recovery server as part of your
process. What factors should you consider when making your plan?
A. DNS services
B. The number of storage groups
C. The number of mailbox stores
D. The number of user accounts
E. The amount of RAM in the recovery server
F.
The disk drive configuration of the recovery server
Restoring User Data
3. You are the administrator for the Exchange 2000 Server computer. Your server has a single
storage group and a single mailbox store. The configuration items for the mailbox store are in
the default configuration. You back up the Exchange databases once each week on Sunday
morning. Today is Wednesday. Mary Jo called you this morning to report that she has
accidentally deleted some critical messages that she received Monday morning. She checked her
Deleted Items folder in Outlook and it was empty. What can you do to recover Mary Jo’s
messages?
A. Create a new user account in the ADUC. Connect this account to Mary Jo’s mailbox.
Configure Outlook with a profile using the new account. Open Outlook and copy the
messages to a .pst file.
C:\OMH\CertPrs8\674-4\ch07.vp
Wednesday, July 25, 2001 3:52:05 PM
Color profile: Generic CMYK printer profile
Composite Default screenCertPrs8 / MCSE Administering
Exchange 2000 Server Study Guide / Clawson/Luckett / 2674-4 / Chapter 7
Self Test
559
B. Instruct Mary Jo to open Outlook, go to the Deleted Items folder, and use the Recover
Deleted Item tool from the Tools menu.
C. Using the ESM, recover the deleted items for Mary Jo.
D. Update your resumé.
4. You are the Exchange administrator for your company. You have two Exchange 2000 Server
computers named Exch1 and Exch2. Each server has a single storage group with two databases.
Exch1 has mbstore1 and mbstore2. Exch2 has mbstore3 and mbstore4.
Fred has a mailbox on Exch1. Last week, Fred deleted several messages that he now needs. You
attempted to restore Fred’s mailbox on Exch2 by restoring mbstore1 onto Exch2. You then ran
the Mailbox Cleanup Agent on the new copy of mbstore1. You were unable to connect Fred’s
mailbox to another AD user account. What should you do?
A. Promote Exch2 to a domain controller. In the ADUC, connect Fred’s account to the
mailbox on the mbstore1 copy.
B. On Exch1, dismount mbstore1. On Exch2, stop and start the Information Store service.
Run the Mailbox Cleanup Agent.
C. Install another Exchange 2000 Server computer in an isolated forest. Restore mbstore1 to
this server. Connect Fred’s mailbox to a new user’s account.
D. On Exch2, dismount mbstore3. Mount the copy of mbstore1. Run ISINTEG –fix.
Configuring a Server for Disaster Recovery
5. You are the Exchange administrator for your company. You have configured a Windows 2000
member server as your Exchange recovery server. You will use this server to recover single
mailboxes should the need arise. To verify proper restore procedures, you restore the database
files from the production Exchange Server’s online tape backup. During the restore, you used
the correct database and path names. After the restore, you are unable to mount the database.
What should you do?
A. In the ESM, select the This Database Can Be Overwritten By A Restore checkbox. Mount
the database.
B. Run ISINTEG –patch. Mount the database.
C. Change the path of the transaction log file to match the path of the original server.
D. Select the Last Restore Set checkbox during restore. Run ESEUTIL /D. Mount the
database.
C:\OMH\CertPrs8\674-4\ch07.vp
Wednesday, July 25, 2001 3:52:05 PM
Color profile: Generic CMYK printer profile
CertPrs8 / MCSE Administering
Composite Default screen
560
Chapter 7:
Exchange 2000 Server Study Guide / Clawson/Luckett / 2674-4 / Chapter 7
Disaster Recovery for Exchange 2000
6. You are the Lotus Notes administrator for your company. The Notes activity has been slow
because most of the users have requested to be migrated to Exchange so that they can use
Outlook 2000. While you were checking the event log of one of the Windows 2000 member
servers that host Exchange, you notice the Netlogon and the Exchange services are not started.
You attempt to start them, but fail. You suspect the Registry is corrupted. What should you do
to repair the Registry?
A. Restart the server using the Last Known Good Configuration.
B. Copy the System.Alt file to System.dat and restart the server.
C. Restore the Sysvol folder from the backup.
D. Restore the System State from the backup.
Restoring the Information Stores
7. You are the Exchange administrator for your company. The sales department users have told
you that e-mail is mission-critical to them, and that in the case of failure their mailboxes must
be restored first and as soon as possible. You have a single Exchange 2000 Server computer in
your organization supporting 1,542 users. The current size of the information store is nearly
14GB. You currently back up the information store to a single 4 MM DAT drive and must
keep the backup in one set. What should you do?
A. Create new storage group.
Create a new mailbox store in the storage group.
Put the transaction logs on a different physical drive.
Move the sales department users’ mailboxes to the new store.
B. Create a new storage group.
Create a new mailbox store in the storage group.
Accept the default location for the log files.
Move the sales department users’ mailboxes to the new store.
C. Create a new mailbox store in the existing storage group.
Move the sales department users’ mailboxes to the new store.
Modify the storage group’s properties so that the log files are put on another physical drive.
D. Create a new mailbox store in the existing storage group.
Move the sales department users’ mailboxes to the new store.
Leave the mailbox store’s properties so that the log files are on the same physical drive.
C:\OMH\CertPrs8\674-4\ch07.vp
Wednesday, July 25, 2001 3:52:06 PM
Color profile: Generic CMYK printer profile
Composite Default screenCertPrs8 / MCSE Administering
Exchange 2000 Server Study Guide / Clawson/Luckett / 2674-4 / Chapter 7
Self Test
561
8. Your company has three Windows 2000 domains in a single forest. Each domain is in one of
the company’s three locations in North America. You are the administrator for the Exchange
2000 Server computer located in the San Diego office. Users in the San Diego office are
complaining that they cannot open some messages in the public folder. After checking, you
find that some of the folders are corrupted in the public folder structure. What should you do
to resolve this problem?
A. Dismount the public folder store. Run ISINTEG –fix. Mount the store.
B. Run ISINTEG –patch. Start the information store service.
C. Run ESEUTIL /CM. Start the information store service.
D. Run ESEUTIL /CC. Mount the store.
Troubleshooting Backup and Restore Problems
9. You are the Exchange administrator for your company. Your company’s Windows 2000
environment consists of a single domain across three sites. You have Exchange 2000 Server
computers located at each of the sites. During your regular review of the event log files on one
of the computers, you find there is a string of –1018 ESE error messages in the log. Users with
mailboxes on this server have not reported any problems when they connect to their mailboxes.
You need to fix this problem, but you do not want to damage the contents of the mailbox
store. What could you do?
A. Stop the information store service and truncate the transaction log files. Restart the
information store.
B. Dismount the mailbox store and run ISINTEG –fix. Remount the mailbox store.
C. Repair the disk subsystem hardware and restore the mailbox store from backup.
D. Dismount the mailbox store and run ESEUTIL /CC. Remount the mailbox store.
10. You are an Exchange administrator for your company. There is a single Exchange Server with a
single storage group. The storage group contains mailbox stores for the sales, engineering,
management, production, HR, and finance departments. You work second shift and are
responsible for the backups. When you got to work today, the administrator on the first shift
had left a note that he has begun an ISINTEG process to fix some anomalies on the sales
database. He is asking that you monitor the process through to completion. However, when
you check, you find that the ISINTEG process has failed to run. What could you do to ensure
that it can successfully run?
A. Start the ISINTEG process with a “runas” process and specify the Exchange service account
as the credentials for the process.
C:\OMH\CertPrs8\674-4\ch07.vp
Wednesday, July 25, 2001 3:52:06 PM
Color profile: Generic CMYK printer profile
CertPrs8 / MCSE Administering
Composite Default screen
562
Chapter 7:
Exchange 2000 Server Study Guide / Clawson/Luckett / 2674-4 / Chapter 7
Disaster Recovery for Exchange 2000
B. Delete the transaction log files first and then restart the ISINTEG process.
C. Restore the sales database from tape backup and then run the ISINTEG process.
D. Dismount another database first, then restart the ISINTEG process.
11. You are the Exchange administrator for your company. You have a single Windows 2000
domain with a single Exchange 2000 Server computer. You receive calls from your users stating
they are unable to connect to their mailboxes. When you check, you find that the information
store service has shut down improperly. You suspect that this has caused the mailbox store to
shut down improperly as well. You examine the database header and discover that the database
is in an inconsistent state. How can you bring the mailbox store online without damaging the
database?
A. Restart the information store and remount the database.
B. Run ESEUTIL /D and remount the database.
C. Run ISINTEG -patch and remount the database.
D. Run ESEUTIL /P and remount the database.
Safeguarding User Keys
12. You are the Exchange administrator at your company. You are responsible for maintaining the
KMS. Every night you perform a backup of KMS using NT Backup. You recently enrolled 50
new users using KMS. You want to make sure you can restore these users’ certificates in the
event of a disaster. What else must you do in addition to backing up KMS? Choose the best answer.
A. When backing up KMS using NT Backup, select the option to back up Private Key And
CA Certificate and Issued Certificate Log And Pending Certificate Request Queue.
B. Use the Certification Authority Backup Wizard to back up the Private Key And CA
Certificate and Issued Certificate Log And Pending Certificate Request Queue.
C. Use the Export Wizard to create a p.12 file.
D. Do nothing; all you need is the KMS backup.
13. You are the Exchange administrator for your company. You have just restored KMS. However,
when you attempt to mount the KMS database, you receive the following error message:
An internal processing error has occurred. Try restarting the
Exchange System Manager or the Microsoft Exchange Information
Store service, or both. ID no: c1041724 Exchange System Manager
C:\OMH\CertPrs8\674-4\ch07.vp
Wednesday, July 25, 2001 3:52:06 PM
Color profile: Generic CMYK printer profile
Composite Default screenCertPrs8 / MCSE Administering
Exchange 2000 Server Study Guide / Clawson/Luckett / 2674-4 / Chapter 7
Lab Question
563
What must you do to be able to mount the database? Choose the best answer.
A. Run ESEUTIL /CM.
B. Run ESEUTIL /CC.
C. Run ISINTEG –patch.
D. Run ISINTEG –fix.
14. You are the Exchange administrator for a syndicated radio program. On a regular basis, you
check the services on the Exchange Server to make sure all Exchange services are running. You
notice that the KMS service is not running. What impact will this have on the users currently
enrolled in Advanced Security?
A. Users will be unable to send and receive secure e-mail.
B. Users will be able to send but will not be able to receive secure e-mail.
C. Users will be able to send and receive secure e-mail but will not be able to open secure
e-mail.
D. There will be no effect on users currently enrolled.
E. Users will have to reenroll when the service is restarted.
LAB QUESTION
You are the Exchange administrator for your company. You have deployed a single Exchange 2000
Server computer. You want to configure the server for optimum performance and fault tolerance.
You must provide for the following:
■ There are 3,200 mailboxes.
■ Each mailbox may have up to 100MB of storage.
■ Two hundred and twenty salespeople have mission-critical mailboxes.
■ In the event of a disaster, you must first restore the sale department’s mailbox, without
affecting other mailboxes that may still be available. Also, the process of restoring other
mailboxes must not interfere with the sales department’s mailboxes.
■ You must be able to restore from tape backup the sales department’s mailboxes within 40
minutes of being notified.
■ The backup and restore plan must be as simple as possible using the least amount of media
possible. The processes also must be unattended.
C:\OMH\CertPrs8\674-4\ch07.vp
Wednesday, July 25, 2001 3:52:07 PM
Color profile: Generic CMYK printer profile
CertPrs8 / MCSE Administering
Composite Default screen
564
Chapter 7:
Exchange 2000 Server Study Guide / Clawson/Luckett / 2674-4 / Chapter 7
Disaster Recovery for Exchange 2000
■ All mailboxes must be backed up within a six-hour timeframe.
You have the following equipment available:
■ Your company has selected a tape backup unit that can store 180GB of data per tape unit
and can read and write at 40GB per hour.
■ You have several disk controllers available that will support RAID 0, 1, and 5. Each
controller can support up to 15 drives. To support RAID configurations, all drives in the
array must be on the same controller.
■ Your company has selected 50GB capacity drives.
Your task is to configure the server with the appropriate hard drives and tape backup devices to
support the mission requirements. You have no limitations or requirements other than the ones
previously listed. How will you configure the server?
Drive and Controller Configuration Work Area:
C:\OMH\CertPrs8\674-4\ch07.vp
Wednesday, July 25, 2001 3:52:07 PM
Color profile: Generic CMYK printer profile
Composite Default screenCertPrs8 / MCSE Administering
Exchange 2000 Server Study Guide / Clawson/Luckett / 2674-4 / Chapter 7
Lab Question
Tape Unit Work Area:
C:\OMH\CertPrs8\674-4\ch07.vp
Wednesday, July 25, 2001 3:52:07 PM
565
Color profile: Generic CMYK printer profile
CertPrs8 / MCSE Administering
Composite Default screen
566
Chapter 7:
Exchange 2000 Server Study Guide / Clawson/Luckett / 2674-4 / Chapter 7
Disaster Recovery for Exchange 2000
SELF TEST ANSWERS
Implementing a Backup and Restore Plan
1. þ B and C. If you want to use the Windows backup program to back up the Exchange
databases, you must use the backup program at the server, which in this case is a member
server. You can also use a third-party program with an Exchange agent, which is the part that
allows you to do an online backup of the database.
ý A is wrong because the Exchange database is not the domain controller. D is wrong because
you can’t just use any third-party backup program. The program must include an agent for
backing up Exchange databases.
2. þ A, B, C, E, and F are all good choices. Each one of these will play a part and can affect the
length of time the restore can take.
ý D has nothing to do with backing up or restoring the Exchange databases. There is no
relationship between the number of user accounts and the number of mailboxes. It is possible
to have many fewer mailboxes than user accounts.
Restoring User Data
3. þ D is the best choice here. The default configuration for the mailbox store is to have zero
days set for the deleted items retention period, so you lose the ability to recover the items.
Since you back up only once each week on Sunday, last Monday’s messages aren’t on tape
backup, so it offers no help. Your only hope for salvation is to get your resumé updated and on
the street so that you can get another job as a Notes administrator before your boss finds out
about this catastrophe!
ý A is just incorrect, even if this idea would work (and it won’t). The problem is not with the
account; the messages are gone, which means there is nothing to copy to the .pst file. B is
wrong because the scenario clearly states that the deleted item folder is empty. C is incorrect.
You can’t use the ESM to recover deleted items.
4. þ C is the only choice among these answers that makes any sense. The issue is that Fred has
deleted messages from his mailbox and you need to recover these messages from a tape backup.
You will need to do this on a recovery server, not a production server, and in an isolated forest.
ý A, B, and D are all wrong because they do not involve using a recovery server. A is really bad
for suggesting that promoting a machine to a domain controller would influence the fix.
B is really bad for suggesting that you dismount a database on one server to be able to affect a
C:\OMH\CertPrs8\674-4\ch07.vp
Wednesday, July 25, 2001 3:52:08 PM
Color profile: Generic CMYK printer profile
Composite Default screenCertPrs8 / MCSE Administering
Exchange 2000 Server Study Guide / Clawson/Luckett / 2674-4 / Chapter 7
Self Test Answers
567
fix of a database on another server. D is bad because there is an empty database slot in the
storage group available for ISINTEG to use.
Configuring a Server for Disaster Recovery
5. þ C is the best choice. After a restore, the transaction logs must be replayed to make the
database consistent from an online backup. The most probable cause here is that the log files
cannot be located because they are in a different folder.
ý A is wrong because there is no database on the recovery server to overwrite. B is wrong
because –patch is not an option in E2K. D is wrong because selecting the checkboxes is what
you do to force a hard recovery after the restore. You would need to run ESEUTIL only if you
did not select that checkbox, and in that case you would use the /CC switch and not the /D switch.
6. þ D is correct. The Registry is one of the items that gets backed up with the System State.
ý A is wrong because using the LKGC is effective in the case of an invalid configuration
change, but won’t do much for a corrupted Registry. B is incorrect; don’t rename this file.
C is wrong because the System State contains the Registry, not the sysvol.
Restoring the Information Stores
7. þ C. This is a really difficult set of choices and you should read the question very closely. The
issue at the root of the question is that the sales department’s users’ mailboxes must be restored
first, before anyone else. The rest of the narrative about the number of users and IS size and
tape drive is just “filler” to distract you. Creating a new mailbox store is the logical answer.
Nothing in this scenario should lead you to believe a new storage group is required, so you can
throw out answers A and B. Now the choices are between answers that pose different solutions
as to what to do with the log files. It is always better to put the log files on a separate drive.
ý A, B, and D. See the explanation for the correct answer.
8. þ A. This is a folder corruption problem that you can fix with ISINTEG.
ý B, C, and D are all wrong. As mentioned previously, the –patch switch does not exist.
ESEUTIL is simply the wrong utility to use to solve this problem.
Troubleshooting Backup and Restore Problems
9. þ C is the correct answer. The predominant cause of 1018 errors is a hardware malfunction.
To eliminate the error, you will need to fix the underlying problem first. Only answer
C does so.
ý A, B, and D. No matter what else is right in the other answers, if you don’t fix the hardware
problem, the 1018 errors are not going away.
C:\OMH\CertPrs8\674-4\ch07.vp
Wednesday, July 25, 2001 3:52:09 PM
Color profile: Generic CMYK printer profile
CertPrs8 / MCSE Administering
Composite Default screen
568
Chapter 7:
Exchange 2000 Server Study Guide / Clawson/Luckett / 2674-4 / Chapter 7
Disaster Recovery for Exchange 2000
10. þ D is the best choice. You must dismount the database to use ISINTEG and it will be
unavailable for the duration of the process.
ý A is a poor choice because you do not need to use the “run as” process and the Exchange
service account no longer exists. Exchange services use the Windows 2000 system account.
B is a really bad choice. Have we mentioned before that you never want to delete the log files?
C is a bad choice. You don’t need to restore the database to run ISINTEG.
11. þ D is the best choice here. The /P switch will repair the database.
ý A is wrong. The IS probably won’t start, and if even it does, the database will still be
corrupt. B is a bad choice as it defragments the database but won’t fix the corruption.
C is wrong because this version of the product no longer has a –patch switch.
Safeguarding User Keys
12. þ Answer B is the correct answer. In addition to backing up KMS using NT Backup,
administrators of KMS should also back up the Certification Authority.
ý The options listed in A are not available with NT Backup. The p.12 file is created when you
perform B, so C is invalid. D is a partially true statement. However, depending on the
circumstance in which the KMS failed, there is a possibility that the client certificates will be
corrupted or lost. Having a backup of the Certification Authority and specifically the issued
certificate log will guarantee a full recovery.
13. þ B is the correct answer. ESEUTIL should be run with the /cc parameter to enforce a hard
recovery.
ý A is wrong, as /cm will simply dump the Restore.env file. C and D are incorrect, as
ISINTEG will do nothing to help in this scenario. In fact, the –patch parameter no longer
exists in Exchange 2000.
14. þ D is correct. In fact, when you are not enrolling new users, it is recommended that you stop
the service to reduce even further the chance that it might be discovered on the network and
compromised.
ý A, B, and C are all untrue statements. E is not true either. Just because the service stops does
not mean the certificate will expire.
C:\OMH\CertPrs8\674-4\ch07.vp
Wednesday, July 25, 2001 3:52:09 PM
Color profile: Generic CMYK printer profile
Composite Default screenCertPrs8 / MCSE Administering
Exchange 2000 Server Study Guide / Clawson/Luckett / 2674-4 / Chapter 7
Lab Answer
569
LAB ANSWER
Solving this lab question will require some “stubby pencil” engineering work and calculations:
■ You must support 3,200 mailboxes with an individual mailbox limit of 100MB. This means
you must accommodate 320GB of data (3200*100MB=320,000MB).
■ However, you have special support requirements for 220 sales users who can store 22GB of
data. You must be able to restore their mailboxes before other mailboxes in less than 40
minutes. To support this requirement, you will put the sales mailboxes in their own
mailbox store and in their own storage group.
■ This leaves 2,980 other mailboxes, or 298GB of data. As your tape units will back up at the
rate of 40GB per hour, you will need 7.45 hours to back up the information store.
However, you must back up the database in no more than six hours, so you need to make
some adjustments. You will have to spilt the users among multiple mailbox stores (two
stores) and use multiple tape backup units, one for each store. To support this configuration,
you will need separate storage groups for each of the mailbox stores to allow you to restore
the transaction log files separately. If you were to use a single storage group, when you back
up from each tape unit, each tape will include the same transaction log files, which would be
awkward during a restore as each tape unit would attempt to restore the same log files. A
better design is to use two storage groups and one tape unit per storage group.
■ Using two storage groups with a single mailbox store, you will have 1,490 users per mailbox
store and 149GB of data. Thus you will need 3.75 hours for backup, which is within the
six-hour window.
■ To summarize, you will have three storage groups; you will use a tape unit for each of the
storage groups; each tape unit has enough capacity for you to do a normal (full) backup
every day using a single tape, which makes the backup as simple as possible.
Okay, let’s design the storage groups and mailbox stores:
Storage group 1
Sales mailbox store
Sales users’ mailboxes
Storage group 2
Mailbox store 2
Half of the user mailboxes
Storage group 3
Mailbox store 3
Half of the user mailboxes
C:\OMH\CertPrs8\674-4\ch07.vp
Wednesday, July 25, 2001 3:52:09 PM
Color profile: Generic CMYK printer profile
CertPrs8 / MCSE Administering
Composite Default screen
570
Chapter 7:
Exchange 2000 Server Study Guide / Clawson/Luckett / 2674-4 / Chapter 7
Disaster Recovery for Exchange 2000
Now let’s configure the disk drives:
Controller 0
Disk 0; Disk1
RAID 1; contains the operation system
files and the Exchange operating files
Controller 0
Disk 2
Windows 2000 page file
Controller 0
Disk 3; Disk 4
RAID 1; transaction log files for storage
group 1
Controller 0
(Disk 5; Disk 6) (Disk 7; Disk 8)
RAID 0 +1; storage group 1 (sales
mailboxes at 22GB maximum)
Controller 1
Disk 9; Disk 10
RAID 1; transaction log files for storage
group 2
Controller 1
(Disk 11; 12; 13; 14) (Disk 15; 16; 17; 18)
RAID 0+1; storage group 2 (1,490 or half
the remaining user mailboxes at 149GB
maximum)
Controller 2
Disk 19; Disk 20
RAID 1; transaction log files for storage
group 3
Controller 2
(Disk 21; 22; 23; 24) (Disk 25; 26; 27; 28)
RAID 0+1; storage group 3 (1,490 or half
the remaining user mailboxes at 149GB
maximum)
Notice that you are using four drives in the array for storage groups 2 and 3. This is because using
three drives provides only 150GB of storage, whereas 149GB might be required, and that would fill
the drives too full to be efficient. This overall drive configuration will support the requirements for
performance and fault tolerance.
You will need three tape units and use one tape unit to back up each storage group. Remember,
the backup must be simple and unattended, which means that the administrator will not be there to
change tapes. The potential size of the database is too big for a single unit to handle, so you split the
users among different mailbox stores. Putting the mailbox stores in different storage groups makes
them “self-contained” with their transaction log files. This simplifies both the backup and potential
restore.
C:\OMH\CertPrs8\674-4\ch07.vp
Wednesday, July 25, 2001 3:52:10 PM