SlideShare une entreprise Scribd logo
1  sur  19
Télécharger pour lire hors ligne
Managing your Exchange Architecture
LEARN EXCHANGE – PART 3
© 2014 Veeam Software. All rights reserved. All trademarks are the property of their respective owners.
Niels Engelen
System Engineer, Veeam Software
niels.engelen@veeam.com
Johan Huttenga
System Engineer, Veeam Software
johan.huttenga@veeam.com
Recap: Last Session
We’ve discussed:
‐ Exchange Management
‐ Troubleshooting Mail Flow
‐ Compliance Policies
(including DLP and Email Archiving)
‐ Monitoring Exchange
(Events, SCOM, and Best Practice Analyzer)
Session Overview
We’ll be discussing:
‐ Exchange Security
‐ High Availability and Recovery
‐ Built-in and Veeam Instant Recovery as well Item-level recovery
‐ Exchange patch testing with Veeam’s Virtual Lab
© 2014 Veeam Software. All rights reserved. All trademarks are the property of their respective owners.
Exchange Security
‐ Accounts should have limited permissions and scoping using RBAC
‐ Internal message paths are encrypted by default, (ensure your message
transport is as secure as possible for all routes)
‐ Use a DMZ to protect your mail flow (you can use IIS Application Request
Routing to reverse proxy Exchange traffic).
‐ Make sure you test regularly
deploy security patches.
Secure it baby!
Exchange Security
‐ Anti-spam agents can be enabled on mailbox servers in organizations
without Edge Transport (.Install-AntispamAgents.ps1)
‐ Agents: Sender Filter, Recipient Filter, Sender ID, Content Filter, Protocol Analysis
‐ Anti-malware filtering is enabled by default on mailbox servers in
organzations without Edge Transport (.Install-AntiMalwareScanning.ps1)
Anti-spam and Anti-malware
Exchange Security
© 2014 Veeam Software. All rights reserved. All trademarks are the property of their respective owners.
High Availability and Recovery
Native Exchange Functionality
Exchange High Availability and Recovery
‐ Use DAG replication, email archiving, built-in recovery of hard deleted items to
protect Exchange (uses multiple DAG copies and lag copies to prevent corruption.)
‐ Eliminating traditional recovery sounds exciting but can be a
dangerous concept.
Single-Item Recovery
Exchange High Availability and Recovery
‐ Can use an In-Place
eDiscovery search
‐ Or PowerShell
Search-Mailbox "Johan" -
SearchQuery "from: 'Niels'" -
TargetMailbox "Discovery Search
Mailbox" -TargetFolder "Mail
Recovery" -LogLevel Full
© 2014 Veeam Software. All rights reserved. All trademarks are the property of their respective owners.
Recovery using Veeam
Instant VM Recovery
Recovery using Veeam
- Exclusive patented
Veeam technology
- Publishes the contents of
the backup file as a datastore
a host can connect to
- Compressed, deduplicated, (full or
incremental chain)
- Runs the VM directly from
the backup file on regular backup
storage without making any
changes to the backup file
Instant VM Recovery
Recovery using Veeam
Fast:
Restart a VM directly from
a backup file in 2 minutes
Readilyavailable:
uses existing backups
and backup storage
Buysyoutime:
Users keep working
while you troubleshoot
the problem
Recovery using Veeam
Instant VM Recovery
vPower
migrate online
Recovery using Veeam
Explorer for Exchange
- Visibility into Exchange 2010 and
2013 VM backups.
- Browse, search and restore mailboxes
and mailbox contents.
- Export, email or restore directly back
to Exchange, or even Office 365.
- Restore to online archive mailboxes
- Recover from hard deleted items (that
were both created and deleted since last
backup)
- Twist: 1-Click Exchange item recovery
in Enterprise Manager (useful for
helpdesk staff)
© 2014 Veeam Software. All rights reserved. All trademarks are the property of their respective owners.
Exchange Patch Testing
Exchange Patch Testing
Virtual Lab
VM
App
OS
Report
verification job
Leverage Data
use backup to spin up test environments
Virtual Lab Proxy
Virtual Lab Network
Production Network
Start VMs from a backup file (SureBackup) or
replica, using a virtual lab proxy to separate
network traffic.
The internal IP address of the virtual lab
should be set to the default gateway in
production. It is also possible to allow internet
traffic through or map an IP address (static
mapping) to allow production access to a VM.
SureReplica requires distributed virtual
switches.
© 2014 Veeam Software. All rights reserved. All trademarks are the property of their respective owners.
Demo
Find recordings of our series online:
http://go.veeam.com/microsoft-exchange-series/
However if you’d like there is a lot more detailed
information available:
http://microsoftvirtualacademy.com
http://blogs.technet.com/b/exchange/
(you had me at EHLO)
Niels Engelen
System Engineer, Veeam Software
niels.engelen@veeam.com
Johan Huttenga
System Engineer, Veeam Software
johan.huttenga@veeam.com
Questions?Further Reading and References

Contenu connexe

Tendances

Veeam Backup & Replication v8 for VMware — General Overview
Veeam Backup & Replication v8 for VMware — General OverviewVeeam Backup & Replication v8 for VMware — General Overview
Veeam Backup & Replication v8 for VMware — General OverviewVeeam Software
 
Veeam back up and replication presentation
Veeam back up and replication presentation Veeam back up and replication presentation
Veeam back up and replication presentation BlueChipICT
 
Veeam Availability Suite
Veeam Availability SuiteVeeam Availability Suite
Veeam Availability SuiteArnaud PAIN
 
Modern Data Protection
Modern Data ProtectionModern Data Protection
Modern Data Protectionsubtitle
 
Veeam Backup and Replication: Overview
Veeam  Backup and Replication: OverviewVeeam  Backup and Replication: Overview
Veeam Backup and Replication: OverviewDudley Smith
 
ExaGrid and Symantec NetBackup: Optimizing Data Protection Webinar
ExaGrid  and Symantec NetBackup: Optimizing Data Protection WebinarExaGrid  and Symantec NetBackup: Optimizing Data Protection Webinar
ExaGrid and Symantec NetBackup: Optimizing Data Protection WebinarBill Hobbib
 
Veeam Presentation
Veeam PresentationVeeam Presentation
Veeam Presentationcvaleze
 
Integration with EMC VNX and VNXe hybrid storage arrays
Integration with EMC VNX and VNXe hybrid storage arraysIntegration with EMC VNX and VNXe hybrid storage arrays
Integration with EMC VNX and VNXe hybrid storage arraysVeeam Software
 
top 15 easy performance optimizations for Veeam
top 15 easy performance optimizations for Veeamtop 15 easy performance optimizations for Veeam
top 15 easy performance optimizations for VeeamTanawit Chansuchai
 
How to protect an Enterprise Email and Collaboration environment using Veeam ...
How to protect an Enterprise Email and Collaboration environment using Veeam ...How to protect an Enterprise Email and Collaboration environment using Veeam ...
How to protect an Enterprise Email and Collaboration environment using Veeam ...Jorge de la Cruz
 
Veeam backup and replication v5
Veeam backup and replication v5Veeam backup and replication v5
Veeam backup and replication v5henkarts
 
What's new in Veeam 7 - Was ist neu in Veeam 7
What's new in Veeam 7 - Was ist neu in Veeam 7What's new in Veeam 7 - Was ist neu in Veeam 7
What's new in Veeam 7 - Was ist neu in Veeam 7Osys AG
 
EVault Endpoint Protection
EVault Endpoint Protection EVault Endpoint Protection
EVault Endpoint Protection EVault
 
V ranger 5 headlines paulm feb11
V ranger 5 headlines paulm feb11V ranger 5 headlines paulm feb11
V ranger 5 headlines paulm feb11bluechipper
 
VMware Site Recovery Manager - Architecting a DR Solution - Best Practices
VMware Site Recovery Manager - Architecting a DR Solution - Best PracticesVMware Site Recovery Manager - Architecting a DR Solution - Best Practices
VMware Site Recovery Manager - Architecting a DR Solution - Best Practicesthephuck
 
Mct summit 2013 rt in the enterprise
Mct summit 2013   rt in the enterpriseMct summit 2013   rt in the enterprise
Mct summit 2013 rt in the enterprisePeter De Tender
 
Private Cloud Academy: Backup and DPM 2010
Private Cloud Academy: Backup and DPM 2010Private Cloud Academy: Backup and DPM 2010
Private Cloud Academy: Backup and DPM 2010Aidan Finn
 

Tendances (20)

Veeam Backup & Replication v8 for VMware — General Overview
Veeam Backup & Replication v8 for VMware — General OverviewVeeam Backup & Replication v8 for VMware — General Overview
Veeam Backup & Replication v8 for VMware — General Overview
 
Veeam back up and replication presentation
Veeam back up and replication presentation Veeam back up and replication presentation
Veeam back up and replication presentation
 
Veeam Availability Suite
Veeam Availability SuiteVeeam Availability Suite
Veeam Availability Suite
 
Modern Data Protection
Modern Data ProtectionModern Data Protection
Modern Data Protection
 
Veeam Backup and Replication: Overview
Veeam  Backup and Replication: OverviewVeeam  Backup and Replication: Overview
Veeam Backup and Replication: Overview
 
Veeam Backup Essentials v9 Overview
Veeam Backup Essentials v9 OverviewVeeam Backup Essentials v9 Overview
Veeam Backup Essentials v9 Overview
 
ExaGrid and Symantec NetBackup: Optimizing Data Protection Webinar
ExaGrid  and Symantec NetBackup: Optimizing Data Protection WebinarExaGrid  and Symantec NetBackup: Optimizing Data Protection Webinar
ExaGrid and Symantec NetBackup: Optimizing Data Protection Webinar
 
Veeam Presentation
Veeam PresentationVeeam Presentation
Veeam Presentation
 
Integration with EMC VNX and VNXe hybrid storage arrays
Integration with EMC VNX and VNXe hybrid storage arraysIntegration with EMC VNX and VNXe hybrid storage arrays
Integration with EMC VNX and VNXe hybrid storage arrays
 
top 15 easy performance optimizations for Veeam
top 15 easy performance optimizations for Veeamtop 15 easy performance optimizations for Veeam
top 15 easy performance optimizations for Veeam
 
How to protect an Enterprise Email and Collaboration environment using Veeam ...
How to protect an Enterprise Email and Collaboration environment using Veeam ...How to protect an Enterprise Email and Collaboration environment using Veeam ...
How to protect an Enterprise Email and Collaboration environment using Veeam ...
 
Veeam backup and replication v5
Veeam backup and replication v5Veeam backup and replication v5
Veeam backup and replication v5
 
What's new in Veeam 7 - Was ist neu in Veeam 7
What's new in Veeam 7 - Was ist neu in Veeam 7What's new in Veeam 7 - Was ist neu in Veeam 7
What's new in Veeam 7 - Was ist neu in Veeam 7
 
EVault Endpoint Protection
EVault Endpoint Protection EVault Endpoint Protection
EVault Endpoint Protection
 
V ranger 5 headlines paulm feb11
V ranger 5 headlines paulm feb11V ranger 5 headlines paulm feb11
V ranger 5 headlines paulm feb11
 
PowerCLI & Onyx
PowerCLI & OnyxPowerCLI & Onyx
PowerCLI & Onyx
 
VMware Site Recovery Manager - Architecting a DR Solution - Best Practices
VMware Site Recovery Manager - Architecting a DR Solution - Best PracticesVMware Site Recovery Manager - Architecting a DR Solution - Best Practices
VMware Site Recovery Manager - Architecting a DR Solution - Best Practices
 
Mct summit 2013 rt in the enterprise
Mct summit 2013   rt in the enterpriseMct summit 2013   rt in the enterprise
Mct summit 2013 rt in the enterprise
 
Installation of EM 12c
Installation of EM 12cInstallation of EM 12c
Installation of EM 12c
 
Private Cloud Academy: Backup and DPM 2010
Private Cloud Academy: Backup and DPM 2010Private Cloud Academy: Backup and DPM 2010
Private Cloud Academy: Backup and DPM 2010
 

Similaire à Protecting Exchange with Veeam

Oracle business continuity for virtualization and cloud infrastructure
Oracle business continuity for virtualization and cloud infrastructureOracle business continuity for virtualization and cloud infrastructure
Oracle business continuity for virtualization and cloud infrastructureOTN Systems Hub
 
There is No Server: Immutable Infrastructure and Serverless Architecture
There is No Server: Immutable Infrastructure and Serverless ArchitectureThere is No Server: Immutable Infrastructure and Serverless Architecture
There is No Server: Immutable Infrastructure and Serverless ArchitectureSonatype
 
Emc recoverpoint technical
Emc recoverpoint technicalEmc recoverpoint technical
Emc recoverpoint technicalsolarisyougood
 
Transforming Mission Critical Applications
Transforming Mission Critical ApplicationsTransforming Mission Critical Applications
Transforming Mission Critical ApplicationsCenk Ersoy
 
CloudStack - Top 5 Technical Issues and Troubleshooting
CloudStack - Top 5 Technical Issues and TroubleshootingCloudStack - Top 5 Technical Issues and Troubleshooting
CloudStack - Top 5 Technical Issues and TroubleshootingShapeBlue
 
Vmware srm 6.1
Vmware srm 6.1Vmware srm 6.1
Vmware srm 6.1faz4eva_27
 
2689 - Exploring IBM PureApplication System and IBM Workload Deployer Best Pr...
2689 - Exploring IBM PureApplication System and IBM Workload Deployer Best Pr...2689 - Exploring IBM PureApplication System and IBM Workload Deployer Best Pr...
2689 - Exploring IBM PureApplication System and IBM Workload Deployer Best Pr...Hendrik van Run
 
ICALEPCS 2011: Testing Environments using Virtualization
ICALEPCS 2011: Testing Environments using VirtualizationICALEPCS 2011: Testing Environments using Virtualization
ICALEPCS 2011: Testing Environments using VirtualizationOmer Khalid
 
Zero to Manageability in 60 Minutes: Building a Solid Foundation for Oracle E...
Zero to Manageability in 60 Minutes: Building a Solid Foundation for Oracle E...Zero to Manageability in 60 Minutes: Building a Solid Foundation for Oracle E...
Zero to Manageability in 60 Minutes: Building a Solid Foundation for Oracle E...Courtney Llamas
 
Anatomy of a Build Pipeline
Anatomy of a Build PipelineAnatomy of a Build Pipeline
Anatomy of a Build PipelineSamuel Brown
 
Webinar: Discover how Vaultastic integrates with your existing email infrastr...
Webinar: Discover how Vaultastic integrates with your existing email infrastr...Webinar: Discover how Vaultastic integrates with your existing email infrastr...
Webinar: Discover how Vaultastic integrates with your existing email infrastr...Vaultastic
 
Avaya Aura System Manager
Avaya Aura System ManagerAvaya Aura System Manager
Avaya Aura System ManagerMotty Ben Atia
 
Getting Started With Virtualization
Getting Started With VirtualizationGetting Started With Virtualization
Getting Started With VirtualizationBill Kalarness
 
Using puppet
Using puppetUsing puppet
Using puppetAlex Su
 
SafeNet ProtectV Data Protection for Virtual Infrastructure
SafeNet ProtectV Data Protection for Virtual InfrastructureSafeNet ProtectV Data Protection for Virtual Infrastructure
SafeNet ProtectV Data Protection for Virtual InfrastructureLETA IT-company
 
Netapp HCI + Veeam Availability Platform
Netapp HCI + Veeam Availability PlatformNetapp HCI + Veeam Availability Platform
Netapp HCI + Veeam Availability PlatformTanawit Chansuchai
 

Similaire à Protecting Exchange with Veeam (20)

VBR v8 Overview-handout
VBR v8 Overview-handoutVBR v8 Overview-handout
VBR v8 Overview-handout
 
Oracle business continuity for virtualization and cloud infrastructure
Oracle business continuity for virtualization and cloud infrastructureOracle business continuity for virtualization and cloud infrastructure
Oracle business continuity for virtualization and cloud infrastructure
 
There is No Server: Immutable Infrastructure and Serverless Architecture
There is No Server: Immutable Infrastructure and Serverless ArchitectureThere is No Server: Immutable Infrastructure and Serverless Architecture
There is No Server: Immutable Infrastructure and Serverless Architecture
 
Avamar-7_2010.ppt
Avamar-7_2010.pptAvamar-7_2010.ppt
Avamar-7_2010.ppt
 
Avamar 7 2010
Avamar 7 2010Avamar 7 2010
Avamar 7 2010
 
Emc recoverpoint technical
Emc recoverpoint technicalEmc recoverpoint technical
Emc recoverpoint technical
 
Mechsoft products services
Mechsoft  products  servicesMechsoft  products  services
Mechsoft products services
 
Transforming Mission Critical Applications
Transforming Mission Critical ApplicationsTransforming Mission Critical Applications
Transforming Mission Critical Applications
 
CloudStack - Top 5 Technical Issues and Troubleshooting
CloudStack - Top 5 Technical Issues and TroubleshootingCloudStack - Top 5 Technical Issues and Troubleshooting
CloudStack - Top 5 Technical Issues and Troubleshooting
 
Vmware srm 6.1
Vmware srm 6.1Vmware srm 6.1
Vmware srm 6.1
 
2689 - Exploring IBM PureApplication System and IBM Workload Deployer Best Pr...
2689 - Exploring IBM PureApplication System and IBM Workload Deployer Best Pr...2689 - Exploring IBM PureApplication System and IBM Workload Deployer Best Pr...
2689 - Exploring IBM PureApplication System and IBM Workload Deployer Best Pr...
 
ICALEPCS 2011: Testing Environments using Virtualization
ICALEPCS 2011: Testing Environments using VirtualizationICALEPCS 2011: Testing Environments using Virtualization
ICALEPCS 2011: Testing Environments using Virtualization
 
Zero to Manageability in 60 Minutes: Building a Solid Foundation for Oracle E...
Zero to Manageability in 60 Minutes: Building a Solid Foundation for Oracle E...Zero to Manageability in 60 Minutes: Building a Solid Foundation for Oracle E...
Zero to Manageability in 60 Minutes: Building a Solid Foundation for Oracle E...
 
Anatomy of a Build Pipeline
Anatomy of a Build PipelineAnatomy of a Build Pipeline
Anatomy of a Build Pipeline
 
Webinar: Discover how Vaultastic integrates with your existing email infrastr...
Webinar: Discover how Vaultastic integrates with your existing email infrastr...Webinar: Discover how Vaultastic integrates with your existing email infrastr...
Webinar: Discover how Vaultastic integrates with your existing email infrastr...
 
Avaya Aura System Manager
Avaya Aura System ManagerAvaya Aura System Manager
Avaya Aura System Manager
 
Getting Started With Virtualization
Getting Started With VirtualizationGetting Started With Virtualization
Getting Started With Virtualization
 
Using puppet
Using puppetUsing puppet
Using puppet
 
SafeNet ProtectV Data Protection for Virtual Infrastructure
SafeNet ProtectV Data Protection for Virtual InfrastructureSafeNet ProtectV Data Protection for Virtual Infrastructure
SafeNet ProtectV Data Protection for Virtual Infrastructure
 
Netapp HCI + Veeam Availability Platform
Netapp HCI + Veeam Availability PlatformNetapp HCI + Veeam Availability Platform
Netapp HCI + Veeam Availability Platform
 

Plus de Veeam Software

The Voice of the Customer - How to enable Availability for the Always-On Ente...
The Voice of the Customer - How to enable Availability for the Always-On Ente...The Voice of the Customer - How to enable Availability for the Always-On Ente...
The Voice of the Customer - How to enable Availability for the Always-On Ente...Veeam Software
 
Veeam Backup & Replication - What’s New in 6.5
Veeam Backup & Replication - What’s New in 6.5Veeam Backup & Replication - What’s New in 6.5
Veeam Backup & Replication - What’s New in 6.5Veeam Software
 
THE UNOFFICIAL OFFICIAL VCP6-DCV Study Guide
THE UNOFFICIAL OFFICIAL VCP6-DCV Study GuideTHE UNOFFICIAL OFFICIAL VCP6-DCV Study Guide
THE UNOFFICIAL OFFICIAL VCP6-DCV Study GuideVeeam Software
 
All you need to know about Microsoft Ignite 2016
All you need to know about Microsoft Ignite 2016All you need to know about Microsoft Ignite 2016
All you need to know about Microsoft Ignite 2016Veeam Software
 
Veeam Availability Report Summary 2016
Veeam Availability Report Summary 2016Veeam Availability Report Summary 2016
Veeam Availability Report Summary 2016Veeam Software
 
Always-On Business Demands
Always-On Business DemandsAlways-On Business Demands
Always-On Business DemandsVeeam Software
 
Veeam Backup & Replication v8 for Hyper-V
Veeam Backup & Replication v8 for Hyper-VVeeam Backup & Replication v8 for Hyper-V
Veeam Backup & Replication v8 for Hyper-VVeeam Software
 
47 restore scenarios from Veeam Backup & Replication v8
47 restore scenarios from Veeam Backup & Replication v847 restore scenarios from Veeam Backup & Replication v8
47 restore scenarios from Veeam Backup & Replication v8Veeam Software
 
Defining availability for the modern data center
Defining availability for the modern data centerDefining availability for the modern data center
Defining availability for the modern data centerVeeam Software
 
Five questions for every Modern Data Center (Infographic)
Five questions for every Modern Data Center (Infographic)Five questions for every Modern Data Center (Infographic)
Five questions for every Modern Data Center (Infographic)Veeam Software
 
Tape and cloud strategies for VM backups
Tape and cloud strategies for VM backupsTape and cloud strategies for VM backups
Tape and cloud strategies for VM backupsVeeam Software
 
The Unofficial VCAP / VCP VMware Study Guide
The Unofficial VCAP / VCP VMware Study GuideThe Unofficial VCAP / VCP VMware Study Guide
The Unofficial VCAP / VCP VMware Study GuideVeeam Software
 
Microsoft System Center Data Protection Manager and Veeam Backup & Replicatio...
Microsoft System Center Data Protection Manager and Veeam Backup & Replicatio...Microsoft System Center Data Protection Manager and Veeam Backup & Replicatio...
Microsoft System Center Data Protection Manager and Veeam Backup & Replicatio...Veeam Software
 
12 best practices for virtualizing active directory DCs
12 best practices for virtualizing active directory DCs12 best practices for virtualizing active directory DCs
12 best practices for virtualizing active directory DCsVeeam Software
 
Preparing for Server 2012 Hyper-V: Seven Questions to Ask Now
Preparing for Server 2012 Hyper-V: Seven Questions to Ask NowPreparing for Server 2012 Hyper-V: Seven Questions to Ask Now
Preparing for Server 2012 Hyper-V: Seven Questions to Ask NowVeeam Software
 
Basic principles of backup policies by Andrea Mauro, Backup Academy
Basic principles of backup policies by Andrea Mauro, Backup AcademyBasic principles of backup policies by Andrea Mauro, Backup Academy
Basic principles of backup policies by Andrea Mauro, Backup AcademyVeeam Software
 
VMware Disaster Recovery Planning: Essential Checklist
VMware Disaster Recovery Planning: Essential ChecklistVMware Disaster Recovery Planning: Essential Checklist
VMware Disaster Recovery Planning: Essential ChecklistVeeam Software
 
Why virtual machine backups are different by David Davis
Why virtual machine backups are different by David DavisWhy virtual machine backups are different by David Davis
Why virtual machine backups are different by David DavisVeeam Software
 
Best practices for Hyper-V backups by Greg Shields
Best practices for Hyper-V backups by Greg ShieldsBest practices for Hyper-V backups by Greg Shields
Best practices for Hyper-V backups by Greg ShieldsVeeam Software
 
How to manage System Сenter Operations Manager using groups
How to manage System Сenter Operations Manager using groups How to manage System Сenter Operations Manager using groups
How to manage System Сenter Operations Manager using groups Veeam Software
 

Plus de Veeam Software (20)

The Voice of the Customer - How to enable Availability for the Always-On Ente...
The Voice of the Customer - How to enable Availability for the Always-On Ente...The Voice of the Customer - How to enable Availability for the Always-On Ente...
The Voice of the Customer - How to enable Availability for the Always-On Ente...
 
Veeam Backup & Replication - What’s New in 6.5
Veeam Backup & Replication - What’s New in 6.5Veeam Backup & Replication - What’s New in 6.5
Veeam Backup & Replication - What’s New in 6.5
 
THE UNOFFICIAL OFFICIAL VCP6-DCV Study Guide
THE UNOFFICIAL OFFICIAL VCP6-DCV Study GuideTHE UNOFFICIAL OFFICIAL VCP6-DCV Study Guide
THE UNOFFICIAL OFFICIAL VCP6-DCV Study Guide
 
All you need to know about Microsoft Ignite 2016
All you need to know about Microsoft Ignite 2016All you need to know about Microsoft Ignite 2016
All you need to know about Microsoft Ignite 2016
 
Veeam Availability Report Summary 2016
Veeam Availability Report Summary 2016Veeam Availability Report Summary 2016
Veeam Availability Report Summary 2016
 
Always-On Business Demands
Always-On Business DemandsAlways-On Business Demands
Always-On Business Demands
 
Veeam Backup & Replication v8 for Hyper-V
Veeam Backup & Replication v8 for Hyper-VVeeam Backup & Replication v8 for Hyper-V
Veeam Backup & Replication v8 for Hyper-V
 
47 restore scenarios from Veeam Backup & Replication v8
47 restore scenarios from Veeam Backup & Replication v847 restore scenarios from Veeam Backup & Replication v8
47 restore scenarios from Veeam Backup & Replication v8
 
Defining availability for the modern data center
Defining availability for the modern data centerDefining availability for the modern data center
Defining availability for the modern data center
 
Five questions for every Modern Data Center (Infographic)
Five questions for every Modern Data Center (Infographic)Five questions for every Modern Data Center (Infographic)
Five questions for every Modern Data Center (Infographic)
 
Tape and cloud strategies for VM backups
Tape and cloud strategies for VM backupsTape and cloud strategies for VM backups
Tape and cloud strategies for VM backups
 
The Unofficial VCAP / VCP VMware Study Guide
The Unofficial VCAP / VCP VMware Study GuideThe Unofficial VCAP / VCP VMware Study Guide
The Unofficial VCAP / VCP VMware Study Guide
 
Microsoft System Center Data Protection Manager and Veeam Backup & Replicatio...
Microsoft System Center Data Protection Manager and Veeam Backup & Replicatio...Microsoft System Center Data Protection Manager and Veeam Backup & Replicatio...
Microsoft System Center Data Protection Manager and Veeam Backup & Replicatio...
 
12 best practices for virtualizing active directory DCs
12 best practices for virtualizing active directory DCs12 best practices for virtualizing active directory DCs
12 best practices for virtualizing active directory DCs
 
Preparing for Server 2012 Hyper-V: Seven Questions to Ask Now
Preparing for Server 2012 Hyper-V: Seven Questions to Ask NowPreparing for Server 2012 Hyper-V: Seven Questions to Ask Now
Preparing for Server 2012 Hyper-V: Seven Questions to Ask Now
 
Basic principles of backup policies by Andrea Mauro, Backup Academy
Basic principles of backup policies by Andrea Mauro, Backup AcademyBasic principles of backup policies by Andrea Mauro, Backup Academy
Basic principles of backup policies by Andrea Mauro, Backup Academy
 
VMware Disaster Recovery Planning: Essential Checklist
VMware Disaster Recovery Planning: Essential ChecklistVMware Disaster Recovery Planning: Essential Checklist
VMware Disaster Recovery Planning: Essential Checklist
 
Why virtual machine backups are different by David Davis
Why virtual machine backups are different by David DavisWhy virtual machine backups are different by David Davis
Why virtual machine backups are different by David Davis
 
Best practices for Hyper-V backups by Greg Shields
Best practices for Hyper-V backups by Greg ShieldsBest practices for Hyper-V backups by Greg Shields
Best practices for Hyper-V backups by Greg Shields
 
How to manage System Сenter Operations Manager using groups
How to manage System Сenter Operations Manager using groups How to manage System Сenter Operations Manager using groups
How to manage System Сenter Operations Manager using groups
 

Dernier

5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfCionsystems
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 

Dernier (20)

5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdf
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 

Protecting Exchange with Veeam

  • 1. Managing your Exchange Architecture LEARN EXCHANGE – PART 3 © 2014 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. Niels Engelen System Engineer, Veeam Software niels.engelen@veeam.com Johan Huttenga System Engineer, Veeam Software johan.huttenga@veeam.com
  • 2. Recap: Last Session We’ve discussed: ‐ Exchange Management ‐ Troubleshooting Mail Flow ‐ Compliance Policies (including DLP and Email Archiving) ‐ Monitoring Exchange (Events, SCOM, and Best Practice Analyzer)
  • 3. Session Overview We’ll be discussing: ‐ Exchange Security ‐ High Availability and Recovery ‐ Built-in and Veeam Instant Recovery as well Item-level recovery ‐ Exchange patch testing with Veeam’s Virtual Lab
  • 4. © 2014 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. Exchange Security
  • 5. ‐ Accounts should have limited permissions and scoping using RBAC ‐ Internal message paths are encrypted by default, (ensure your message transport is as secure as possible for all routes) ‐ Use a DMZ to protect your mail flow (you can use IIS Application Request Routing to reverse proxy Exchange traffic). ‐ Make sure you test regularly deploy security patches. Secure it baby! Exchange Security
  • 6. ‐ Anti-spam agents can be enabled on mailbox servers in organizations without Edge Transport (.Install-AntispamAgents.ps1) ‐ Agents: Sender Filter, Recipient Filter, Sender ID, Content Filter, Protocol Analysis ‐ Anti-malware filtering is enabled by default on mailbox servers in organzations without Edge Transport (.Install-AntiMalwareScanning.ps1) Anti-spam and Anti-malware Exchange Security
  • 7. © 2014 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. High Availability and Recovery
  • 8. Native Exchange Functionality Exchange High Availability and Recovery ‐ Use DAG replication, email archiving, built-in recovery of hard deleted items to protect Exchange (uses multiple DAG copies and lag copies to prevent corruption.) ‐ Eliminating traditional recovery sounds exciting but can be a dangerous concept.
  • 9. Single-Item Recovery Exchange High Availability and Recovery ‐ Can use an In-Place eDiscovery search ‐ Or PowerShell Search-Mailbox "Johan" - SearchQuery "from: 'Niels'" - TargetMailbox "Discovery Search Mailbox" -TargetFolder "Mail Recovery" -LogLevel Full
  • 10. © 2014 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. Recovery using Veeam
  • 11. Instant VM Recovery Recovery using Veeam - Exclusive patented Veeam technology - Publishes the contents of the backup file as a datastore a host can connect to - Compressed, deduplicated, (full or incremental chain) - Runs the VM directly from the backup file on regular backup storage without making any changes to the backup file
  • 12. Instant VM Recovery Recovery using Veeam Fast: Restart a VM directly from a backup file in 2 minutes Readilyavailable: uses existing backups and backup storage Buysyoutime: Users keep working while you troubleshoot the problem
  • 13. Recovery using Veeam Instant VM Recovery vPower migrate online
  • 14. Recovery using Veeam Explorer for Exchange - Visibility into Exchange 2010 and 2013 VM backups. - Browse, search and restore mailboxes and mailbox contents. - Export, email or restore directly back to Exchange, or even Office 365. - Restore to online archive mailboxes - Recover from hard deleted items (that were both created and deleted since last backup) - Twist: 1-Click Exchange item recovery in Enterprise Manager (useful for helpdesk staff)
  • 15. © 2014 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. Exchange Patch Testing
  • 16. Exchange Patch Testing Virtual Lab VM App OS Report verification job
  • 17. Leverage Data use backup to spin up test environments Virtual Lab Proxy Virtual Lab Network Production Network Start VMs from a backup file (SureBackup) or replica, using a virtual lab proxy to separate network traffic. The internal IP address of the virtual lab should be set to the default gateway in production. It is also possible to allow internet traffic through or map an IP address (static mapping) to allow production access to a VM. SureReplica requires distributed virtual switches.
  • 18. © 2014 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. Demo
  • 19. Find recordings of our series online: http://go.veeam.com/microsoft-exchange-series/ However if you’d like there is a lot more detailed information available: http://microsoftvirtualacademy.com http://blogs.technet.com/b/exchange/ (you had me at EHLO) Niels Engelen System Engineer, Veeam Software niels.engelen@veeam.com Johan Huttenga System Engineer, Veeam Software johan.huttenga@veeam.com Questions?Further Reading and References