Install the Exchange Agents on Exchange Server 2003 - Clustered Environment

Follow the steps given below to install the Exchange Agents in clustered environment on the following:

Where to Install

Related Topics

The following procedure describes the steps involved in installing the Exchange Agents for Exchange Server 2003 on the following:
  • Direct install on a Exchange Server or
  • On an Non-Exchange Server computer. This may be used for the following circumstances:
    • In the configuration where a single non-Exchange client is used to backup multiple Exchange Servers.
    • To off-load the backup of Exchange Server, so that the performance of the Exchange Server will not be effected.

Download Software Packages

Provides step-by-step procedure to download the latest packages for software install.

System Requirements

Verify that the computer in which you wish to install the software satisfies the System Requirements.

Firewall

Provides comprehensive information on firewall.

Prerequisites

The below mentioned prerequisites are for Mailbox Agents only. Ensure that you have the following:

Install Procedure

1. Log on to the computer using an account with the following privileges:
  • Administrator of the local computer
  • Administrator of the Exchange Server
 
2. Run Setup.exe from the Software Installation Package.  
3. Select the required language.

Click Next.

4. Select the option to install software on this computer.
  The options that appear on this screen depend on the computer in which the software is being installed.
5. Select I accept the terms in the license agreement.

Click Next.

6. Select Configure a Virtual Server.

Click Next.

7. Select the disk group in which the virtual server resides.

Click Next.

8. To install the Exchange iDataAgents expand Client Modules | Exchange, and select one or more of the following:
  • Exchange Database iDataAgent
  • Exchange Mailbox iDataAgent
  • Exchange Public Folder iDataAgent

To install the Exchange Archiver Agents, expand Client Modules | Archive Management, and select one or more of the following:

  • Exchange Compliance Archiver
  • Exchange Mailbox Archiver Agent
  • Exchange Public Folder Archiver Agent

Click Next.

  For Non-Exchange Server, Exchange Database iDataAgent will not be applicable.
9. If this computer and the CommServe is separated by a firewall, select the Configure firewall services option and then click Next.

For firewall options and configuration instructions, see Firewall Configuration and continue with the installation.

If firewall configuration is not required, click Next.

10. Enter the fully qualified domain name of the CommServe Host Name.

Click Next.

  Do not use space and the following characters when specifying a new name for the CommServe Host Name:

\|`~!@#$%^&*()+=<>/?,[]{}:;'"

11. Click Next.
12. Select Add programs to the Windows Firewall Exclusion List, to add CommCell programs and services to the Windows Firewall Exclusion List.

Click Next.

  This option enables CommCell operations across Windows firewall by adding CommCell programs and services to Windows firewall exclusion list.

It is recommended to select this option even if Windows firewall is disabled. This will allow the CommCell programs and services to function if the Windows firewall is enabled at a later time.

13. Verify the default location for software installation.

Click Browse to change the default location.

Click Next.
 
  • Do not install the software to a mapped network drive.
  • Do not use the following characters when specifying the destination path:

     / : * ? " < > | #

    It is recommended that you use alphanumeric characters only.

14. Select a Client Group from the list.

Click Next.
This screen will be displayed if Client Groups are configured in the CommCell Console.

15. Click Next.
16. Select a Storage Policy.

Click Next.

  If you do not have Storage Policy created, this message will be displayed.

Click OK.

  You can create the Storage Policy later in step 32.
 

Configure Exchange Database Specific Information

17. Select the backup type for Exchange Database backups. Choose either of the following options, then click Next.
  • Differential - Specifies that each non-full Exchange Database backup secures all data that has changed since the last full backup. Transaction lobs are not purged.
  • Incremental - Specifies that each non-full Exchange Database backup secures only that data that has changed since the last backup of any type. Committed transaction logs are purged.
18. Enter the user credentials to access the Exchange Server to perform the backup operation.
 
  • The User Account must have Exchange Administrator privileges.
  • The installation detects the domain name. If necessary, you can modify the domain name by specifying Windows domain that the Exchange Server resides in.
19. Click Next.
20. The install program displays a reminder to verify that Circular Logging is disabled before performing any database backup operations. To verify that Circular Logging is disabled:
  • From Exchange System Manager, navigate to and expand the server that the Database iDataAgent is being installed on.
  • Verify that the Circular Logging check box has not been selected for each Storage Group. If Circular Logging has been enabled for a Storage Group, disable it at this time.

Click OK.

 

Configure Exchange Agents Specific Information

21. Select Exchange Server Name and Exchange Server Version from drop-down list.

Click Next.

  This screen will appear when you are installing Exchange Agents on Non-Exchange Server.
22. Click Next.
23. Enter the following Exchange Administrator information then click Next.
  • Account Name - Domain user account created with the exchange server administrator permissions. Do not include the domain name here.
  • Account Password - The password assigned to the domain user.
  • Mailbox Name for this Account - Mailbox associated with the user above.
  • Profile Name - Specify profile name to be created during agent install. This profile is associated with the domain user's mailbox.
  • Exchange Server Name - Name of the Exchange Server that the agent will communicate with for data protection and recovery operations.

    For Exchange Server 2010, enter the Client Access Role. After installation configure the roles as described in Configure Mailboxes in Database Availability Group (DAG) Servers.

  • Domain - The installation detects and enters a domain name. If necessary, modify the domain name by specifying Windows domain that the Exchange Server resides in.

Install Remaining Cluster Nodes

24. To install the software on the remaining nodes of the cluster, click Yes.

To complete the install for this node only, click No.

25. Select cluster nodes from the Preferred Nodes list and click the arrow button to move them to the Selected Nodes list.

Once you complete your selections, click Next.

 
  • The list of Preferred Nodes displays all the nodes found in the cluster; from this list you should only select cluster nodes configured to host this cluster group server.
  • Do not select nodes that already have multiple instances installed.
26. Specify User Name and Password for the Domain Administrator account Information to perform the remote install on the cluster nodes you selected in the previous step.

Click Next.

27. The progress of the remote install for the cluster nodes is displayed; the install can be interrupted if necessary.

Click Stop to prevent installation to any nodes after the current ones complete.

Click Advanced Settings to specify any of the following:

  • Maximum number of nodes on which Setup can run simultaneously.
  • Time allocated for Setup to begin executing on each node, after which the install attempt will fail.
  • Time allocated for Setup to complete on each node, after which the install attempt will fail.
  If, during the remote install of a cluster node, setup fails to complete or is interrupted, you must perform a local install on that node. When you do, the install begins from where it left off, or from the beginning if necessary. For procedures, see Manually Installing the Software on a Passive Node.
28. Read the summary for remote installation to verify that all selected nodes were installed successfully.

Click Next.

 
  • If any node installation fails, you must manually install the software on that node once the current installation is complete. See Manually Installing the Software on a Passive Node for step-by-step instructions.
  • The message displayed on your screen will reflect the status of the selected nodes, and may look different from the example.
29. Click Next.
30. Click Next.
31. Click Finish.
If you already have a storage policy selected in step 16, Click button available at the bottom of the page to proceed to the Configuration section.

If you do not have Storage Policy created, continue with the following step.

 
32. Create a Storage Policy:
  1. From the CommCell Browser, navigate to Policies.
  2. Right-click the Storage Policies and then click New Storage Policy.
  3. Follow the prompts displayed in the Storage Policy Wizard. The required options are mentioned below:
    • Select the Storage Policy type as Data Protection and Archiving and click Next.
    • Enter the name in the Storage Policy Name box and click Next.
    • From the Library list, click the name of a disk library to which the primary copy should be associated and then click Next.

      Ensure that you select a library attached to a MediaAgent operating in the current release.

    • From the MediaAgent list, click the name of a MediaAgent that will be used to create the primary copy and then click Next.
    • For the device streams and the retention criteria information, click Next to accept default values.
    • Select Yes to enable deduplication for the primary copy.
    • From the MediaAgent list, click the name of the MediaAgent that will be used to store the Deduplication store.

      Type the name of the folder in which the deduplication database must be located in the Deduplication Store Location or click the Browse button to select the folder and then click Next.

    • Review the details and click Finish to create the Storage Policy.
33.

Enable the following registry key to create job specific profiles:

  • From the CommCell Browser, navigate to Client Computers.
  • Right-click the <Client> in which you want to add the registry key, and then click Properties.
  • Click the Registry Key Settings tab.
  • Click Add.
  • Enter CreateProcessSpecificProfile in the Name field.
  • Enter MSExchangeMBAgent in the Location field. (For Exchange Mailbox iDataAgent).

    Enter MSExchangeDMAgent in the Location field. (For Exchange Mailbox iDataAgent).

  • Enter REG_DWORD in the Type filed.
  • Enter 1 to enable and 0 to disable the key in the Value field.
  • Click OK.