SlideShare a Scribd company logo
1 of 44
Vu Nguyen Cao Son Technology Specialist Microsoft Vietnam [email_address] www.CaoSonBlog.com
Today’s Business Environment What customers tell us ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],IT Decision Makers Employees IT Pros
Today’s Business Environment Investment Themes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Built-in  Protection Anywhere  Access Operational  Efficiency
1. Built-in Protection Anti-spam & Anti-Virus ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],June 5, 2009  | Page
June 5, 2009  | Page    ,[object Object],[object Object],[object Object],1. Built-in Protection Anti-spam & Anti-Virus – Option 1: On-site protection Firewall Mailbox Server Hub Transport  Server Edge Transport Server  Client Access Server DMZ SMTP Internet
1. Built-in Protection Anti-spam & Anti-Virus –  Option 1: On-site protection
June 5, 2009  | Page    ,[object Object],[object Object],[object Object],Mailbox Server Hub Transport Server Client Access Server SMTP  Internet 1. Built-in Protection Anti-spam & Anti-Virus – Option 2: Off-site protection Firewall
1. Built-in Protection Compliance June 5, 2009  | Page    ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1. Built-in Protection Compliance via Transport Rules
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Properties of folder selected 1. Built-in Protection Compliance via Managed Folders
1. Built-in Protection Confidential Messaging ,[object Object],[object Object],[object Object],[object Object]
1. Built-in Protection Business Continuity Exchange 2007 CCR Clustered Continuous Replication Exchange 2007 LCR Local Continuous Replication ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1. Built-in Protection Protection with Hosted Services
2. Anywhere Access Enhanced OWA:  Search Triage with Outlook  flags & categories Search Inbox Search Global Address List
2. Anywhere Access Enhanced OWA:  Pwd change
2. Anywhere Access Enhanced OWA:  SharePoint & FileShare Access
2. Anywhere Access Enhanced OWA:  VPN-less SharePoint & FileShare Access
2. Anywhere Access Enhanced OWA:  Scheduling Int/Ext OOF Set start and end times Unique internal and  external OOF messages Rich HTML Out of Office messages
2. Anywhere Access Enhanced OWA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
2. Anywhere Access Mobile Messaging ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
2. Anywhere Access Calendaring:  Calendar Attendant & Scheduling Assistant ,[object Object],[object Object],[object Object],[object Object]
2. Anywhere Access Calendaring:  Resource Booking Attendant
2. Anywhere Access Calendaring:  Resource Booking Attendant
2. Anywhere Access Calendaring:  Resource Booking Attendant
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Search in Outlook 2007  2. Anywhere Access Improved Outlook Search
2. Anywhere Access Unified Messaging ,[object Object],[object Object],[object Object]
2. Anywhere Access Unified Messaging – Outlook Voice Access ,[object Object],[object Object],[object Object],[object Object]
3. Operational Efficiency Performance and Scalability ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],64-bit by the numbers 32-bit = 2 32  or 4 gigabytes of addressable memory 64-bit = 2 64  or 16 exabytes of addressable memory
3. Operational Efficiency Deployment: Server Roles Internet
[object Object],[object Object],[object Object],[object Object],[object Object],3. Operational Efficiency Deployment: Auto Discover
3. Operational Efficiency Admin and Automation ,[object Object],[object Object],[object Object],Exchange  Management Shell Exchange  Management Console
3. Operational Efficiency Admin and Automation
3. Operational Efficiency Admin and Automation
3. Operational Efficiency Admin and Automation
Savings Potential in Summary Assessing the Impact of Exchange Server 2007 Current Activity  or Cost Voicemail, corp. operator/directory How Resources Required Mobile messaging Backup & restore Server hardware Compliance Storage hardware Client/server setup Administration Unified Messaging and auto attendant with  AD integration Reduced time to backup/restore;  storage flexibility Journaling per user, archiving; retention integration with Outlook IO optimization; Direct attach storage support for HA Outlook/mobile device setup; reduced help desk calls Scripting and command line interface 64-bit enabled server consolidation Integrated; no additional servers or services $$$$ $$$$ $$$ $$$ $$ $$ $$ $ Savings Impact
Exchange Server 2007 in Summary ,[object Object],With the  Anywhere Access  employees want And the  Operational Efficiency  IT needs
Edition Comparison ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Exchange 2003 Server Editions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Exchange 2007 Server Editions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Customer
Exchange Server 2007 SKU Overview CALs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Exchange Server 2007 SKUs Packaged CAL Offers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Servers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],L&SA  $38* L  $74 L  $772 L  $4,419
Built-in Protection Exchange 2000 versus Exchange 2007 Exchange 2000 Exchange  2007 Compliance ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],AV/AS protection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Confidential Messaging ,[object Object],[object Object],[object Object],Business Continuity ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Anywhere Access Exchange 2000 versus Exchange 2007 Exchange 2000 Exchange  2007 Unified Messaging ,[object Object],[object Object],[object Object],[object Object],Mobile Access ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Remote Access ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Collaboration & Productivity ,[object Object],[object Object],[object Object],[object Object],[object Object]
Outlook Web Access Exchange 2000 versus Exchange 2007
Operational Efficiency Exchange 2000 versus Exchange 2007 Exchange  2000 Exchange  2007 Deployment ,[object Object],[object Object],[object Object],[object Object],[object Object],Scalability ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Administrative Productivity ,[object Object],[object Object],[object Object],[object Object],Extensibility ,[object Object],[object Object],[object Object],[object Object],[object Object]
Additional Resources ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
© 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.

More Related Content

What's hot

C:\fakepath\blewis tech deck_overview_sp1
C:\fakepath\blewis tech deck_overview_sp1C:\fakepath\blewis tech deck_overview_sp1
C:\fakepath\blewis tech deck_overview_sp1Brian Lewis
 
Exchange Server 2010 Overview - Denver Presentation
Exchange Server 2010 Overview - Denver PresentationExchange Server 2010 Overview - Denver Presentation
Exchange Server 2010 Overview - Denver PresentationHarold Wong
 
Web Server Technologies II: Web Applications & Server Maintenance
Web Server Technologies II: Web Applications & Server MaintenanceWeb Server Technologies II: Web Applications & Server Maintenance
Web Server Technologies II: Web Applications & Server MaintenancePort80 Software
 
200308 Active Directory Security
200308 Active Directory Security200308 Active Directory Security
200308 Active Directory SecurityArmando Leon
 
Web Server Hardware and Software
Web Server Hardware and SoftwareWeb Server Hardware and Software
Web Server Hardware and Softwarewebhostingguy
 
10135 a xb
10135 a xb10135 a xb
10135 a xbBố Su
 
Windows 2008 R2 Security
Windows 2008 R2 SecurityWindows 2008 R2 Security
Windows 2008 R2 SecurityAmit Gatenyo
 
Secure erasure code based cloud storage system with secure data forwarding
Secure erasure code based cloud storage system with secure data forwardingSecure erasure code based cloud storage system with secure data forwarding
Secure erasure code based cloud storage system with secure data forwardingPriyank Rupera
 
Web Server Technologies I: HTTP & Getting Started
Web Server Technologies I: HTTP & Getting StartedWeb Server Technologies I: HTTP & Getting Started
Web Server Technologies I: HTTP & Getting StartedPort80 Software
 
Migrating 3000 users and 1100 applications from Lotus Notes to Office 365
Migrating 3000 users and 1100 applications from Lotus Notes to Office 365Migrating 3000 users and 1100 applications from Lotus Notes to Office 365
Migrating 3000 users and 1100 applications from Lotus Notes to Office 365Arno Flapper
 
10135 a 11
10135 a 1110135 a 11
10135 a 11Bố Su
 
Web server administration
Web server administrationWeb server administration
Web server administrationsawsan slii
 
10135 a 10
10135 a 1010135 a 10
10135 a 10Bố Su
 
Secure Data Storage and Forwarding in Cloud Using AES and HMAC
Secure Data Storage and Forwarding in Cloud Using AES and HMACSecure Data Storage and Forwarding in Cloud Using AES and HMAC
Secure Data Storage and Forwarding in Cloud Using AES and HMACIRJET Journal
 
Web server hardware and software
Web server hardware and softwareWeb server hardware and software
Web server hardware and softwareHumma Rashid
 
Windows Server 2008 Management
Windows Server 2008 ManagementWindows Server 2008 Management
Windows Server 2008 ManagementHi-Techpoint
 

What's hot (19)

C:\fakepath\blewis tech deck_overview_sp1
C:\fakepath\blewis tech deck_overview_sp1C:\fakepath\blewis tech deck_overview_sp1
C:\fakepath\blewis tech deck_overview_sp1
 
Exchange Server 2010 Overview - Denver Presentation
Exchange Server 2010 Overview - Denver PresentationExchange Server 2010 Overview - Denver Presentation
Exchange Server 2010 Overview - Denver Presentation
 
Web Server Technologies II: Web Applications & Server Maintenance
Web Server Technologies II: Web Applications & Server MaintenanceWeb Server Technologies II: Web Applications & Server Maintenance
Web Server Technologies II: Web Applications & Server Maintenance
 
200308 Active Directory Security
200308 Active Directory Security200308 Active Directory Security
200308 Active Directory Security
 
Web Server Hardware and Software
Web Server Hardware and SoftwareWeb Server Hardware and Software
Web Server Hardware and Software
 
10135 a xb
10135 a xb10135 a xb
10135 a xb
 
Windows 2008 R2 Security
Windows 2008 R2 SecurityWindows 2008 R2 Security
Windows 2008 R2 Security
 
Secure erasure code based cloud storage system with secure data forwarding
Secure erasure code based cloud storage system with secure data forwardingSecure erasure code based cloud storage system with secure data forwarding
Secure erasure code based cloud storage system with secure data forwarding
 
Web Server Technologies I: HTTP & Getting Started
Web Server Technologies I: HTTP & Getting StartedWeb Server Technologies I: HTTP & Getting Started
Web Server Technologies I: HTTP & Getting Started
 
Migrating 3000 users and 1100 applications from Lotus Notes to Office 365
Migrating 3000 users and 1100 applications from Lotus Notes to Office 365Migrating 3000 users and 1100 applications from Lotus Notes to Office 365
Migrating 3000 users and 1100 applications from Lotus Notes to Office 365
 
10135 a 11
10135 a 1110135 a 11
10135 a 11
 
Security_Measures_Rediff
Security_Measures_RediffSecurity_Measures_Rediff
Security_Measures_Rediff
 
Web server administration
Web server administrationWeb server administration
Web server administration
 
10135 a 10
10135 a 1010135 a 10
10135 a 10
 
Secure Data Storage and Forwarding in Cloud Using AES and HMAC
Secure Data Storage and Forwarding in Cloud Using AES and HMACSecure Data Storage and Forwarding in Cloud Using AES and HMAC
Secure Data Storage and Forwarding in Cloud Using AES and HMAC
 
Web server
Web serverWeb server
Web server
 
Web server hardware and software
Web server hardware and softwareWeb server hardware and software
Web server hardware and software
 
Exchange 2013
Exchange 2013Exchange 2013
Exchange 2013
 
Windows Server 2008 Management
Windows Server 2008 ManagementWindows Server 2008 Management
Windows Server 2008 Management
 

Similar to Exchange 2007 Overview Son Vu

Why Upgrade To Exchange 2007 Sp1 Son Vu
Why Upgrade To Exchange 2007 Sp1 Son VuWhy Upgrade To Exchange 2007 Sp1 Son Vu
Why Upgrade To Exchange 2007 Sp1 Son Vuguest05fee
 
Why Upgrade To Exchange 2007 Sp1 Son Vu
Why Upgrade To Exchange 2007 Sp1 Son VuWhy Upgrade To Exchange 2007 Sp1 Son Vu
Why Upgrade To Exchange 2007 Sp1 Son Vuvncson
 
Take a Leap into the Connected Cloud; 3 Trending Hybrid Cloud Scenarios
Take a Leap into the Connected Cloud; 3 Trending Hybrid Cloud ScenariosTake a Leap into the Connected Cloud; 3 Trending Hybrid Cloud Scenarios
Take a Leap into the Connected Cloud; 3 Trending Hybrid Cloud ScenariosGina Montgomery, V-TSP
 
Introducing Exchange Server 2010
Introducing Exchange Server 2010Introducing Exchange Server 2010
Introducing Exchange Server 2010Harold Wong
 
Webinar: Discover how Vaultastic integrates with your existing email infrastr...
Webinar: Discover how Vaultastic integrates with your existing email infrastr...Webinar: Discover how Vaultastic integrates with your existing email infrastr...
Webinar: Discover how Vaultastic integrates with your existing email infrastr...Vaultastic
 
Featured Webinar: Why Cloud Archiving is Best Suited for On Premise Mail Serv...
Featured Webinar: Why Cloud Archiving is Best Suited for On Premise Mail Serv...Featured Webinar: Why Cloud Archiving is Best Suited for On Premise Mail Serv...
Featured Webinar: Why Cloud Archiving is Best Suited for On Premise Mail Serv...Vaultastic
 
Exchange Conference (Philadelphia) - Exchange 2007 Security
Exchange Conference (Philadelphia) - Exchange 2007 SecurityExchange Conference (Philadelphia) - Exchange 2007 Security
Exchange Conference (Philadelphia) - Exchange 2007 SecurityHarold Wong
 
Operations: Security Crash Course — Best Practices for Securing your Company
Operations: Security Crash Course — Best Practices for Securing your CompanyOperations: Security Crash Course — Best Practices for Securing your Company
Operations: Security Crash Course — Best Practices for Securing your CompanyAmazon Web Services
 
C:\fakepath\run 20 exchange 2010
C:\fakepath\run 20 exchange 2010C:\fakepath\run 20 exchange 2010
C:\fakepath\run 20 exchange 2010guest3559b8d
 
Run 20 exchange 2010
Run 20 exchange 2010Run 20 exchange 2010
Run 20 exchange 2010guest3559b8d
 
C:\fakepath\run 20 exchange 2010
C:\fakepath\run 20 exchange 2010C:\fakepath\run 20 exchange 2010
C:\fakepath\run 20 exchange 2010guest3559b8d
 
Exchange 2010 Archiving And Retention
Exchange 2010 Archiving And RetentionExchange 2010 Archiving And Retention
Exchange 2010 Archiving And RetentionHarold Wong
 
Sonasoft email archiving
Sonasoft email archivingSonasoft email archiving
Sonasoft email archivingkeesnielen
 
Start Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best PraticesStart Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best PraticesAmazon Web Services
 
Windows Server 2008 Security Enhancements
Windows Server 2008 Security EnhancementsWindows Server 2008 Security Enhancements
Windows Server 2008 Security EnhancementsPresentologics
 

Similar to Exchange 2007 Overview Son Vu (20)

Why Upgrade To Exchange 2007 Sp1 Son Vu
Why Upgrade To Exchange 2007 Sp1 Son VuWhy Upgrade To Exchange 2007 Sp1 Son Vu
Why Upgrade To Exchange 2007 Sp1 Son Vu
 
Why Upgrade To Exchange 2007 Sp1 Son Vu
Why Upgrade To Exchange 2007 Sp1 Son VuWhy Upgrade To Exchange 2007 Sp1 Son Vu
Why Upgrade To Exchange 2007 Sp1 Son Vu
 
Overview of Microsoft Exchange Online
Overview of Microsoft Exchange OnlineOverview of Microsoft Exchange Online
Overview of Microsoft Exchange Online
 
Take a Leap into the Connected Cloud; 3 Trending Hybrid Cloud Scenarios
Take a Leap into the Connected Cloud; 3 Trending Hybrid Cloud ScenariosTake a Leap into the Connected Cloud; 3 Trending Hybrid Cloud Scenarios
Take a Leap into the Connected Cloud; 3 Trending Hybrid Cloud Scenarios
 
Introducing Exchange Server 2010
Introducing Exchange Server 2010Introducing Exchange Server 2010
Introducing Exchange Server 2010
 
HMSC_AD Event V3
HMSC_AD Event V3HMSC_AD Event V3
HMSC_AD Event V3
 
Atelier Barracuda Bessage Archiver
Atelier Barracuda Bessage ArchiverAtelier Barracuda Bessage Archiver
Atelier Barracuda Bessage Archiver
 
Exchange Server 2010
Exchange Server 2010   Exchange Server 2010
Exchange Server 2010
 
Webinar: Discover how Vaultastic integrates with your existing email infrastr...
Webinar: Discover how Vaultastic integrates with your existing email infrastr...Webinar: Discover how Vaultastic integrates with your existing email infrastr...
Webinar: Discover how Vaultastic integrates with your existing email infrastr...
 
Featured Webinar: Why Cloud Archiving is Best Suited for On Premise Mail Serv...
Featured Webinar: Why Cloud Archiving is Best Suited for On Premise Mail Serv...Featured Webinar: Why Cloud Archiving is Best Suited for On Premise Mail Serv...
Featured Webinar: Why Cloud Archiving is Best Suited for On Premise Mail Serv...
 
Exchange Conference (Philadelphia) - Exchange 2007 Security
Exchange Conference (Philadelphia) - Exchange 2007 SecurityExchange Conference (Philadelphia) - Exchange 2007 Security
Exchange Conference (Philadelphia) - Exchange 2007 Security
 
Operations: Security Crash Course — Best Practices for Securing your Company
Operations: Security Crash Course — Best Practices for Securing your CompanyOperations: Security Crash Course — Best Practices for Securing your Company
Operations: Security Crash Course — Best Practices for Securing your Company
 
Operations: Security
Operations: SecurityOperations: Security
Operations: Security
 
C:\fakepath\run 20 exchange 2010
C:\fakepath\run 20 exchange 2010C:\fakepath\run 20 exchange 2010
C:\fakepath\run 20 exchange 2010
 
Run 20 exchange 2010
Run 20 exchange 2010Run 20 exchange 2010
Run 20 exchange 2010
 
C:\fakepath\run 20 exchange 2010
C:\fakepath\run 20 exchange 2010C:\fakepath\run 20 exchange 2010
C:\fakepath\run 20 exchange 2010
 
Exchange 2010 Archiving And Retention
Exchange 2010 Archiving And RetentionExchange 2010 Archiving And Retention
Exchange 2010 Archiving And Retention
 
Sonasoft email archiving
Sonasoft email archivingSonasoft email archiving
Sonasoft email archiving
 
Start Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best PraticesStart Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best Pratices
 
Windows Server 2008 Security Enhancements
Windows Server 2008 Security EnhancementsWindows Server 2008 Security Enhancements
Windows Server 2008 Security Enhancements
 

More from vncson

Protecting exchange servers with dpm 2010 son vu
Protecting exchange servers with dpm 2010 son vuProtecting exchange servers with dpm 2010 son vu
Protecting exchange servers with dpm 2010 son vuvncson
 
Microsoft Private Cloud Computing
Microsoft Private Cloud ComputingMicrosoft Private Cloud Computing
Microsoft Private Cloud Computingvncson
 
Hyper V In Windows Server 2008 R2.Son Vu
Hyper V In Windows Server 2008 R2.Son VuHyper V In Windows Server 2008 R2.Son Vu
Hyper V In Windows Server 2008 R2.Son Vuvncson
 
Scvmm Technical Overview.Son Vu
Scvmm Technical Overview.Son VuScvmm Technical Overview.Son Vu
Scvmm Technical Overview.Son Vuvncson
 
Dpm4 Data Center
Dpm4 Data CenterDpm4 Data Center
Dpm4 Data Centervncson
 
Dpm Disaster Recovery Sonvu
Dpm Disaster Recovery SonvuDpm Disaster Recovery Sonvu
Dpm Disaster Recovery Sonvuvncson
 
Branch Office Solution Son Vu
Branch Office Solution   Son VuBranch Office Solution   Son Vu
Branch Office Solution Son Vuvncson
 
Dpm.2007.For.Sql Sonvu
Dpm.2007.For.Sql SonvuDpm.2007.For.Sql Sonvu
Dpm.2007.For.Sql Sonvuvncson
 
Data Protection Manager 2007 Technical Overview Son Vu
Data Protection Manager 2007 Technical Overview Son VuData Protection Manager 2007 Technical Overview Son Vu
Data Protection Manager 2007 Technical Overview Son Vuvncson
 
Data Center Optimization With Microsoft System Center Son Vu
Data Center Optimization With Microsoft System Center  Son VuData Center Optimization With Microsoft System Center  Son Vu
Data Center Optimization With Microsoft System Center Son Vuvncson
 
MS NAP - Security Day
MS NAP - Security DayMS NAP - Security Day
MS NAP - Security Dayvncson
 
IO ROI Example
IO ROI ExampleIO ROI Example
IO ROI Examplevncson
 
Microsoft IO 101 Training
Microsoft IO 101 TrainingMicrosoft IO 101 Training
Microsoft IO 101 Trainingvncson
 
Microsoft.Virtualization.Technologies Son Vu
Microsoft.Virtualization.Technologies Son VuMicrosoft.Virtualization.Technologies Son Vu
Microsoft.Virtualization.Technologies Son Vuvncson
 
Microsoft Hyper V Server 2008
Microsoft Hyper V Server 2008Microsoft Hyper V Server 2008
Microsoft Hyper V Server 2008vncson
 

More from vncson (15)

Protecting exchange servers with dpm 2010 son vu
Protecting exchange servers with dpm 2010 son vuProtecting exchange servers with dpm 2010 son vu
Protecting exchange servers with dpm 2010 son vu
 
Microsoft Private Cloud Computing
Microsoft Private Cloud ComputingMicrosoft Private Cloud Computing
Microsoft Private Cloud Computing
 
Hyper V In Windows Server 2008 R2.Son Vu
Hyper V In Windows Server 2008 R2.Son VuHyper V In Windows Server 2008 R2.Son Vu
Hyper V In Windows Server 2008 R2.Son Vu
 
Scvmm Technical Overview.Son Vu
Scvmm Technical Overview.Son VuScvmm Technical Overview.Son Vu
Scvmm Technical Overview.Son Vu
 
Dpm4 Data Center
Dpm4 Data CenterDpm4 Data Center
Dpm4 Data Center
 
Dpm Disaster Recovery Sonvu
Dpm Disaster Recovery SonvuDpm Disaster Recovery Sonvu
Dpm Disaster Recovery Sonvu
 
Branch Office Solution Son Vu
Branch Office Solution   Son VuBranch Office Solution   Son Vu
Branch Office Solution Son Vu
 
Dpm.2007.For.Sql Sonvu
Dpm.2007.For.Sql SonvuDpm.2007.For.Sql Sonvu
Dpm.2007.For.Sql Sonvu
 
Data Protection Manager 2007 Technical Overview Son Vu
Data Protection Manager 2007 Technical Overview Son VuData Protection Manager 2007 Technical Overview Son Vu
Data Protection Manager 2007 Technical Overview Son Vu
 
Data Center Optimization With Microsoft System Center Son Vu
Data Center Optimization With Microsoft System Center  Son VuData Center Optimization With Microsoft System Center  Son Vu
Data Center Optimization With Microsoft System Center Son Vu
 
MS NAP - Security Day
MS NAP - Security DayMS NAP - Security Day
MS NAP - Security Day
 
IO ROI Example
IO ROI ExampleIO ROI Example
IO ROI Example
 
Microsoft IO 101 Training
Microsoft IO 101 TrainingMicrosoft IO 101 Training
Microsoft IO 101 Training
 
Microsoft.Virtualization.Technologies Son Vu
Microsoft.Virtualization.Technologies Son VuMicrosoft.Virtualization.Technologies Son Vu
Microsoft.Virtualization.Technologies Son Vu
 
Microsoft Hyper V Server 2008
Microsoft Hyper V Server 2008Microsoft Hyper V Server 2008
Microsoft Hyper V Server 2008
 

Recently uploaded

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

Exchange 2007 Overview Son Vu

  • 1. Vu Nguyen Cao Son Technology Specialist Microsoft Vietnam [email_address] www.CaoSonBlog.com
  • 2.
  • 3.
  • 4.
  • 5.
  • 6. 1. Built-in Protection Anti-spam & Anti-Virus – Option 1: On-site protection
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14. 2. Anywhere Access Enhanced OWA: Search Triage with Outlook flags & categories Search Inbox Search Global Address List
  • 15. 2. Anywhere Access Enhanced OWA: Pwd change
  • 16. 2. Anywhere Access Enhanced OWA: SharePoint & FileShare Access
  • 17. 2. Anywhere Access Enhanced OWA: VPN-less SharePoint & FileShare Access
  • 18. 2. Anywhere Access Enhanced OWA: Scheduling Int/Ext OOF Set start and end times Unique internal and external OOF messages Rich HTML Out of Office messages
  • 19.
  • 20.
  • 21.
  • 22. 2. Anywhere Access Calendaring: Resource Booking Attendant
  • 23. 2. Anywhere Access Calendaring: Resource Booking Attendant
  • 24. 2. Anywhere Access Calendaring: Resource Booking Attendant
  • 25.
  • 26.
  • 27.
  • 28.
  • 29. 3. Operational Efficiency Deployment: Server Roles Internet
  • 30.
  • 31.
  • 32. 3. Operational Efficiency Admin and Automation
  • 33. 3. Operational Efficiency Admin and Automation
  • 34. 3. Operational Efficiency Admin and Automation
  • 35. Savings Potential in Summary Assessing the Impact of Exchange Server 2007 Current Activity or Cost Voicemail, corp. operator/directory How Resources Required Mobile messaging Backup & restore Server hardware Compliance Storage hardware Client/server setup Administration Unified Messaging and auto attendant with AD integration Reduced time to backup/restore; storage flexibility Journaling per user, archiving; retention integration with Outlook IO optimization; Direct attach storage support for HA Outlook/mobile device setup; reduced help desk calls Scripting and command line interface 64-bit enabled server consolidation Integrated; no additional servers or services $$$$ $$$$ $$$ $$$ $$ $$ $$ $ Savings Impact
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41. Outlook Web Access Exchange 2000 versus Exchange 2007
  • 42.
  • 43.
  • 44. © 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.

Editor's Notes

  1. 06/05/09 18:22 © 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.