This website uses cookies to ensure you have the best experience. Learn more

Mail System Project Essay

1249 words - 5 pages

Mail System Project

Author’s Note
This annotated bibliography is being submitted on August 5th, 2013, for N234/CET2810C Section 01 Microsoft Exchange Server course.

Mail System Project
When designing my Microsoft Exchange mailing system I will need to gather information about my environment. I will need to see if the installation is going to be a migration or am I walking in to a fresh setup. With a fresh installation I will have a lot of things to consider such as the customer requirements, mailbox profile requirements, geographic location, and server and data protection. I will also have to make assumptions based on all configurations. With the migration of an Exchange ...view middle of the document...

One being relay restrictions which keep spammers from having a field day with my server. If relay restrictions are not implemented it means that anyone not just spammers can relay mail through my server. Another important security measure is a good virus protection. When it comes to virus protection for Exchange you have to purchase virus protection that is made especially for Exchange Server. The reason is because email viruses do not exist on Exchange Server in the form of a stand-alone file, instead they are stored in the Exchange mailbox with messages there for you need a virus protection that is designed to read the Exchange database. Another option for security is called RPC over HTTP it’s kind of like VPN but not, a RPC over HTTP connection is limits the scope of what resources can be accessed remotely. One more security measure is simple I’ll just run security and system updates regularly.
When setting up and managing my mailing list I will more than likely go with the default address list this is called the global address list (GAL). Because it will automatically populate with new users, contacts, groups, or rooms as they are added to my OU (organizational unit).
Setting up a solid back up strategy for Exchange Server is crucial regardless of system architecture and setup there is no running from the question, if something happens what is it exactly that I want to back up? I would have to have a plan set in place to make sure that if something where to happen that I would be backing up what is needed not wanted. On my list it would include Exchange database files (mailboxes, public folders), Exchange transaction logs, Message tracking logs, and protocol logs. Beyond using third party backup solutions to replicate everything I can also go virtual and back up everything in a snapshot this will protect even if I had total server failure.

Annotated Bibliography

Simpson, R. (2011, January 21). Exchange 2010 Tested Solutions: 500 Mailboxes in a Single Site Running Hyper-V on Dell Servers. Retrieved August 5, 2013, from
In this analysis Robert Simpson presents facts on how he set up Microsoft Exchange 2010 on five hundred mailboxes in a single site running Hyper-V on Dell Servers. He begins by telling the importance of the customers’ requirements, stating the first steps in Exchange solution design is to accurately summarize the business and technical requirements that are critical to making the correct design decisions. He also presents the importance of geographic location requirements, by stating that understanding the distribution of mailbox users and datacenters is important when making design decisions about high availability and site resiliency.
TechNet (2013,...

Other Papers Like Mail System Project

Isds Essay

973 words - 4 pages game strategy was d givided between all five team members, and solutions were collected in one spreadsheet using Google Docs. Second, during Phase 2 of the Littlefield Technologies game, each team member will rotate equal turns monitoring and controlling the processing system every 3 to 4 hours every day during the 4-day phase. Revisions made to the system will be decided as a group, and implementation will be communicated through e-mail

It Request Essay

1521 words - 7 pages Interaction with Managers and Users Before beginning a preliminary investigation, a memo or an e-mail message would be sent out to managers and employees to know about the investigation and explain my role as a systems analyst. I would meet with key managers, users, and IT staff to describe the project, explain my responsibilities, answer questions, and invite comments. This starts an important dialog with users that will continue throughout

Mgec40 Notes

635 words - 3 pages o Government started making railroad but it wouldn’t be famous until 1870s • Communication o Public mail with horse power • Financing (banking system) o No banking system – a few small banks existed who gave out small loans o Really risky to give loans due to high number of sole proprietorships o No concept of shares etc. (loan given from retained earnings) • Production technology (R&D) o Not really present • Government o

Inventory Management System Project Proposal

4132 words - 17 pages to the proposal approved by the IT management Board, the proposed system would take at least three months to complete before implementation is done. The whole project would cost $1,500,000 to complete and implement. Some of the limitations as per the proposal included lack of enough capacity within the current PCs in use to accommodate the new system and so an upgrade to all the PCs was suggested. The user level of information was also to be


2024 words - 9 pages organization? Interviewee: I would like to elicit on the mail system present in our organization and there is a norm that when a mail is sent it should be replied to. This however doesn’t work always. If we talk to a particular person, the problem can be solved easily in minimum time. This we are doing frequently with other departments. The relationship is not good between the project department and the finance department. We do the work and


4782 words - 20 pages UNIVERSITY OF NAIROBI SCHOOL OF COMPUTING AND INFORMATICS ONLINE VEGETABLES MARKET PRICE AND TRENDS SYSTEM SECOND YEAR FINAL PROJECT COURSE CODE: 227 NAME: MUIGUA STEPHEN GITAU ADM NO: P15/54335/2012 SUPERVISOR: ERIC AYIENGA   DECLARATION I, Muigua Stephen Gitau, do declare that this project is my own work, and as per my knowledge, it has not been submitted to any other institution of higher learning. Student’s Name: MUIGUA STEPHEN

Value Chain

811 words - 4 pages of the costs of all activities in the value chain. © Dagmar Recklies, 2001 Recklies Management Project GmbH § Tel. 0049/391/5975930 § Fax 0049/721/151235542 § mail: -2- Some thought about the linkages between activities: These linkages are crucial for corporate success. The linkages are flows of information, goods and services, as well as systems and processes for adjusting activities. Their

Tran America

1077 words - 5 pages time; none will overlap using this process; it is a step-by-step approach by the illustration below: Figure [ 1 ] Waterfall SDLC for TrainAmerica The downside of using the Waterfall Model is the system will not function until the SDLC is complete. If there is a change of requirements or if process will be lengthy, it will not work. If there are any bottlenecks, the project could easily be scrapped. (SDLC WATERFALL MODEL) TrainAmerica

Health Care Information

9718 words - 39 pages system project, including the types of individuals who should be involved. To gain insight into many of the things that can go wrong during system implementations and strategies health care managers can employ to alleviate potential problems. To be able to discuss the importance of training, technical support, infrastructure, and ongoing maintenance and evaluation of any health care information system project. ■ ■ ■ ■ 167 168

It255 Project

1460 words - 6 pages Project Security Domains and Strategies Purpose This project provides you an opportunity to apply the competencies gained in various units of this course to identify security challenges and apply strategies of countermeasures in the information systems environment. Learning Objectives and Outcomes  You will learn the purpose of a multi-layered security strategy.  You will understand the information systems security (ISS


1100 words - 5 pages When looking for software that helps bring a company together you need something that allows each part of the company to talk share idea and gather data in a timely matter. You also want to make sure that the medium you try to use is also secure and stable so that you don’t have to worry about the system crashing around you and when company need this they look to groupware to get the job done. Groupware refers to programs that help people work

Related Essays

Project Management Essay

417 words - 2 pages Information System 3 Module 1 (AIISX3A) Semester 2 – 2015 Department of Information and Communication Technology VAAL UNIVERSITY OF TECHNOLOGY Assignment 1 Due /Submission Date: 25 September 2015 Marks: 65 plus 5 = 70 Marks (15 of your semester mark) Lecturer: KS Nyakala 5 Marks: Neat work and techniques GUIDELINES: The aim of this assessment task (AT) is to provide a summative account on what you learned in this module (AIISX3A/ IT Project

A Day In The Life Essay

745 words - 3 pages . To some extent to keep the project scope as promised, she had a heated conversation with marketing manager. So, she needs good human skills to work with, communicate, motivate and interact to be a successful team manager. How effectively do you think Rachel spent her day? As a project manager of a large information system project Rachel usually has an early morning. Her day starts in the office by socializing with other colleagues. After

Project Management Essay

1922 words - 8 pages 1. Introduction This is a two-phased project in which one phase is the upgrade of systems from stand-alone desktop PCs to networked client/server Windows NT environment, and the other phase is the design, development and installation of client specific database for a company called Penshaw Electricity Services (PES). The phase one part includes installation of Internet, E-mail and Intranet to all client PCs, with the necessary security

Negotiation Essay

1904 words - 8 pages , the coordinator on the other hand. In some cases, the Commission communicates also directly with other project partners. Communication means are mail, e-mail, phone, meetings, and might include web-based electronic submission. 1.5. Starting point of the negotiation preparation There is no clearly defined starting point of the preparation of the negotiation. Activities described in section 2 which do not imply contacts with proposal