Install the Exchange Agents on Exchange Server 2003 - Clustered Environment - Virtual Server


Click on a link below to go to a specific section of the software installation:

Overview

The following procedure describes the steps involved in installing the Exchange Agents for Exchange Server 2003 on the following in a clustered environment:
  • Direct install on a Exchange Server or
  • On an off-host proxy computer. This may be used for the following circumstances:
    • In the configuration where a single non-Exchange client is used to backup multiple Exchange Servers.
    • To off-load the backup of Exchange Server, so that the performance of the Exchange Server will not be effected.

To install Exchange Agents in a cluster environment:

Install Requirements

The Windows File System iDataAgent must be first installed onto all of the physical nodes of the cluster. See Install the Microsoft Windows File System iDataAgent if you have not installed it on all of the physical nodes.

Once it has been installed onto the physical nodes, the Exchange Agents (such as Exchange Mailbox iDataAgent, Exchange Public Folder iDataAgent, Exchange Mailbox Archiver and/or Exchange Public Folder Archiver) and Windows File System iDataAgent can be installed from the active node to the virtual server using the following steps described below to install Exchange Agents.

The software can also be automatically installed on all available passive nodes when the software is installed onto the virtual server, or you can choose to install any passive node(s) separately.

Verify that the computer in which you wish to install the software satisfies the minimum requirements specified in System Requirements - Microsoft Exchange Server iDataAgents and System Requirements - Microsoft Windows File System iDataAgent. The computer on which these agents will be installed is referred to as the Client computer in this install procedure.

Review the following Install Requirements before installing the software:

General

  • Agents should only be installed after the CommServe and at least one MediaAgent have already been installed in the CommCell. Also, keep in mind that the CommServe and MediaAgent must be installed and running (but not necessarily on the same computer), before you can install the Agent.
  • This version of the software is intended to be installed in a CommCell where the CommServe and MediaAgent(s) version is 8.0.0.
  • Close all applications and disable any programs that run automatically, including anti-virus, screen savers and operating system utilities. Some of the programs, including many anti-virus programs, may be running as a service. Stop and disable such services before you begin. You can re-enable them after the installation.
  • Ensure there is an available license on the CommServe for the Agent.
  • Verify that the software installation disc is appropriate to the operating system of the computer on which the software is being installed.
    Make sure that you have the latest software installation disc before you start to install the software. If you are not sure, contact your software provider.

Firewall

  • If the CommServe® Server, MediaAgent and/or Clients communicate across two-way firewall(s):
    • Ensure port 8400 is allowed connections through the firewall.
    • In addition a range of bi-directional ports (consecutive or discrete) must also be allowed connections through the firewall.

     For information on configuring the range of ports, see Port Requirements for Two-way Firewall.

  • If the CommServe Server, MediaAgent and/or Clients communicate across one-way firewall(s):
    • Identify a range of outbound ports (consecutive or discrete) for use by the software.

     For information on configuring the range of ports, see Port Requirements for One-way Firewall.

  • If the MediaAgent/Client communicates with the CommServe Server across a one-way firewall, you must add the MediaAgent/Client host name (or the IP address) in the CommServe computer before installing the necessary software on the MediaAgent/Client computer.

Agent Specific

To Set Permissions for the Mail-Enabled User:

Method One (Exchange Server 2000/2003):

Assigning permissions by using the Exchange Administration Delegation Wizard.

  1. Using the Exchange System Manager snap-in, right-click the organization object and delegate control.
  2. Using the Wizard, assign the MailboxAdmin user Exchange Full Administrator privileges.

Now the MailboxAdmin user will be allowed full access to all mailboxes on servers in the domain.

Method Two (Exchange Server 2000/2003):

To be used if the MailboxAdmin account is NOT the Administrator, OR a member of the Domain Admins OR Enterprise Admins groups.

  1. Using the Active Directory Users and Computers snap-in, right-click on the MailboxAdmin user and select Properties.
  2. From the Properties window, select the Member of tab.
  3. Click Add, then select Exchange Services or Exchange Domain Servers group. Click Add.
  4. Verify that the group selected is added to the list box.
  5. Click Apply and OK to close the window.

Now the MailboxAdmin user will be allowed full access to all mailboxes on servers in the domain.

Cluster Specific

General

  • Check the following on the cluster computer in which you wish to install the software:
    • Cluster software is installed and running.
    • Active and passive nodes are available.
    • Disk array devices configured with access to the shared array.
    • Public Network Interface Card is bound first, before the private Network Interface Card. (Does not apply to NetWare Cluster.)

Before You Begin

  • Log on to the client as local Administrator or as a member of the Administrators group on that computer.

Install Procedure

Getting Started

1. Place the software installation disc for the Windows platform into the disc drive.

After a few seconds, the installation program is launched.

If the installation program does not launch automatically:

  • Click the Start button on the Windows task bar, and then click Run.
  • Browse to the installation disc drive, select Setup.exe, click Open, then click OK.
 
2. In this screen, you choose the language you want to use during installation. Click the down arrow, select the desired language from the pull-down list, and click Next to continue.  
3. Select the option to install software on this computer.

NOTES

  • The options that appear on this screen depend on the computer in which the software is being installed.
 
4. Read the Welcome screen.

Click Next to continue, if no other applications are running.

 
5. Read the virus scanning software warning.

Click OK to continue, if virus scanning software is disabled.

 
6. Read the license agreement, then select I accept the terms in the license agreement.

Click Next to continue.

 

Cluster Selection

7. Select Configure a Virtual Server.

Click Next to continue.

8. Select the disk group in which the virtual server resides.

Click Next to continue.

Select Components for Installation

9. Select the component(s) to install.

NOTES

  • Your screen may look different from the example shown.
  • Components that either have already been installed, or which cannot be installed, will be dimmed. Hover over the component for additional details.
  • The Special Registry Keys In Use field will be enabled when GalaxyInstallerFlags registry keys have been enabled on this computer. Hover over the field to see which keys have been set, as well as their values. For more information, see Registry Keys.

Click Next to continue.

To install the Exchange iDataAgents expand the Client Modules folder, the iDataAgents folder, and the Exchange iDataAgents folder then select one or more of the following (as appropriate to your application version):

  • iDA for Exchange Database
  • iDA for Exchange Mailbox
  • iDA for Exchange Public Folder

When you select the Exchange Agents for install, the appropriate Windows File System iDataAgent is automatically selected for install.

To install the Exchange Mailbox Archiver Agent and/or Exchange Public Folder Archiver Agents, expand the Client Modules folder, the DataArchiver Agents folder, and then select from the following:

  • DataArchiver Agent for Exchange
  • DataArchiver for Exchange Public Folder
  • Exchange Compliance Archiver
10. Click Yes to set up the required privileges for the local administrators group.

NOTES

  • This option will only appear if the Windows user account used to install the software does not have the required administrator rights (e.g., if the operating system was newly installed).
  • If you choose to click Yes, the install program will automatically assign the required rights to your account. You may be prompted to log off and log back on to continue the installation.
  • If you choose to click No, the installation will be aborted.
  • You will be prompted at the end of the installation to decide if you want these privileges to be revoked.
note.gif (292 bytes) The install program checks your Windows user account for the following necessary operating system rights:
  • Right to increase quotas (this is referred to as adjust memory quotas for a process on Windows Server 2003).
  • Right to act as a part of the operating system.
  • Right to replace a process level token.
11. Specify the location where you want to install the software.

NOTES

  • Do not install the software to a mapped network drive.
  • Do not use the following characters when specifying the destination path:
     / : * ? " < > |
    It is recommended that you use alphanumeric characters only.
  • If you intend to install other components on this computer, the selected installation directory will be automatically used for that software as well.
  • If a component has already been installed, this screen may not be displayed if the installer can use the same install location as previously used.

Click Browse to change directories.

Click Next to continue.

Firewall Configuration

12. Select from the following:
  • If this Client communicates with the CommServe Server and/or MediaAgent across a firewall, select Yes, configure firewall services, and then click Next to continue. Proceed to the next Step.
  • If firewall configuration is not required, click No, do not configure firewall services and then click Next to continue. Proceed to the next section.

NOTES

  • Operating systems, such as Windows 2008 and Windows Vista, may have more than one profile present. When you select No to configure firewall services, verify that firewall settings are not enabled in the profile(s).
  • If the system detects firewall settings are present in the profile(s), you must select from the following:
    • Disable firewall for ALL profiles: Employ caution when choosing this option; firewall settings will be disabled in all profiles. This requires a system reboot; installation automatically resumes after reboot.
    • No, Firewall is not enabled: Select this option if your firewall settings allow communication with the CommServe computer.
      Click Back to configure firewall services.
13. Click the Specify list of machine across the firewall option and then specify the list of hosts separated from this computer by a firewall. Make sure you correctly describe whether the firewall allows two-way communication (but on a limited range of ports), or one-way communication (with either only remote host being able to make connections to this computer, or vice versa).

For all one-way firewalls allowing incoming connections and those one-way firewalls allowing outgoing connections without additional port filtering, skip this step.

Click Next to continue.

NOTES

  • Consider the following:
    • On the CommServe Server, this list should include all the MediaAgents and Clients that are on the other side of the firewall.
    • On the MediaAgents/Clients this should include the CommServe computer, and any other Clients/MediaAgents on the other side of the firewall with which communications will be established.
  • For each machine on the other side of the firewall that you want to configure, choose the type of firewall configuration based on the firewall setup in your environment. Choose from the following options:
    • Click on 2-way firewall if you can open certain ports as bi-directional ports.
    • Click 1-way firewall; host is reachable from this machine on the machine that is on the secure side of the firewall.
    • Click 1-way firewall; host is NOT reachable from this machine on the machine that is on the public / DMZ side of the firewall.
  • If you wish to communicate with computers in a clustered environment, ensure that you add the Host Name/IP Address of all physical nodes in the cluster (even if no CommCell components are installed) and all the virtual nodes in which CommCell components are installed.
  • Type the host name or the IP address and the GxCVD port number of the host name, and click Add to place it in the Host Name/IP Address List.
14. Click the Specify list of restricted open ports option and then specify the port range. Add the starting and ending port range and then click Add to place it in the Open Port List. Repeat as needed.

If firewall separating this computer from others allows incoming connections, but these connections can be made only on a limited set of ports, then configure the appropriate port range here. For all other scenarios, skip this step.

Note that if you do not specify hostname(s) as well as port number(s), then the firewall services will not be configured.

NOTES

  • Typically in a two-way firewall, the open ports must be indicated for all computers. In a one-way firewall, the ports must be specified on computers in the open side, if they are open in a restricted way. Note that the port ranges are not required for computers that are fully closed in the one-way firewall. For example, laptops which are configured as clients in the Workstation Backup Agent.
  • In a clustered environment, make sure the firewall ports specified here are open for communication on all the physical nodes as well as the virtual nodes.

Click Next to continue.

15. If desired, modify the Keep Alive interval.

Click Next to continue.

16. Optionally, select Advanced Firewall Configuration and specify a local host name interface to use for outgoing tunnel connections through the firewall. Otherwise, the interface and port is automatically selected for you by the OS.

Click Next to continue.

17. If desired, modify the Tunnel Initialization interval.

Click Next to continue.

Configuration of Other Installation Options

18. Enter the fully qualified domain name of the CommServe computer. (TCP/IP network name. e.g., computer.company.com)

NOTES

  • Do not use spaces when specifying a new name for the CommServe Host Name.
  • If a component has already been installed, this screen will not be displayed; instead, the installer will use the same Server Name as previously specified.

Click Next to continue.

19. Enter the username and password information for an external domain user account or a CommCell user account. This authorizes the installation of an agent on the CommCell.

NOTES

  • This window is only displayed when the Require Authentication for Agent Installation option is selected in the CommCell Properties. Users must belong to a User Group with Administrative Management capabilities to enable this feature. For more information, see Authentication for Agent Installs.

Click Next to continue.

20. Enter the following:
  • The local (NetBIOS) name of the client computer.
  • The TCP/IP IP host name of the NIC that the client computer must use to communicate with the CommServe Server.

NOTES

  • Do not use spaces when specifying a new name for the Client.
  • The default network interface name of the client computer is displayed if the computer has only one network interface. If the computer has multiple network interfaces, enter the interface name that is preferred for communication with the CommServe Server.
  • If a component has already been installed, this screen will not be displayed; instead, the install program will use the same name as previously specified.

Click Next to continue.

21. Specify the location of the client's job results directory.

NOTES

  • The Agent uses the job results directory to store the client's backup and restore job results.

Click Browse to change directory.

Click Next to continue.

Storage Policy Selection

22. Select the storage policy through which you want to back up/archive the indicated component (subclient, instance, etc.)

NOTES

  • A storage policy directs backup data to a media library. Each library has a default storage policy.
  • When you install an Agent, the install program creates a default subclient for most Agents.
  • If desired, you can change your storage policy selection at any time after you have installed the client software.
  • If this screen appears more than once, it is because you have selected multiple agents for installation and are configuring storage policy association for each of the installed agents.

Click Next to continue.

Client Group Selection

23. Select a Client Group from the list.

Click Next to continue.

NOTES

  • This screen will be displayed only if Client Groups are configured in the CommCell Console. For more information, see Client Computer Groups.

Configure Exchange Database Specific Information

24. If you are installing the Exchange Database iDataAgent then continue on with this step, otherwise skip to the appropriate section: Select the backup type for Exchange Database backups. Choose either of the following options, then click Next to continue:
  • Differential - Backs up all new and changed data since the last full backup.
  • Incremental - Backs up all new and changed data since the last full backup or incremental backup. The Incremental backup type is selected by default.

A backup type is the selected partial backup that you run between full backups. In this window, you select the backup type that you want for this client.

25. The install program displays a reminder to verify that Circular Logging is disabled before performing any database backup operations. To verify that Circular Logging is disabled:
  1. From Exchange System Manager, navigate to and expand the server that the Database iDataAgent is being installed on.
  2. Verify that the Circular Logging check box has not been selected for each Storage Group. If Circular Logging has been enabled for a Storage Group, disable it at this time.

Click OK to continue.

Configure Exchange Agents Specific Information

26. If you are installing the Exchange Agents then continue on with this step, otherwise skip to Verify Summary of Install Options. Enter the following Exchange Administrator information then click Next to continue:

Account Name - Domain user account created with the proper permissions. Do not include the domain name here.

Account Password - The password assigned to the domain user.

Mailbox Name for this Account - Mailbox associated with the user above.

Profile Name - Created during agent install. This profile is associated with the domain user's mailbox.

Exchange Server Name - Name of the Exchange Server that the agent will communicate with for data protection and recovery operations.

Domain - The Windows domain that the Exchange Server resides in. The installation detects and enters a domain name. If necessary, this field can be modified.

NOTES

  • The Exchange Administrator Account Information dialog will appear only once during the installation of multiple Exchange MAPI-based agents, and the account settings established initially will apply to all of them. To specify different Exchange Administrator Account settings for each Exchange MAPI-based agent, either install the agents separately or manually modify the account information in the Agent properties.

  • In some cases, a pre-populated default value for this field will appear and may need to be changed depending on your configuration.

See the Exchange Agents section in User Accounts and Passwords for more information.

Download and Install Latest Packs

27. Select Download Pack(s) and Install to download and install the latest service packs and post packs from the software provider.

NOTES

  • Internet connectivity is required to download updates.
  • Updates are downloaded to the following directory: 
    <software installation>/Base/Temp/DownloadedPacks
    .
    They are launched silently and installed automatically.

Click Next to continue.

Verify Summary of Install Options

28. Verify the summary of selected options.

NOTES

  • The Summary on your screen should reflect the components you selected for install, and may look different from the example shown.

Click Next to continue or Back to change any of the options.

The install program now starts copying the software to the computer. This step may take several minutes to complete.

29. The System Reboot message may be displayed. If so, select one of the following:
  • Skip Reboot
    This option will be displayed if the install program finds any files belonging to other applications, that need to be replaced. As these files are not critical for this installation, you may skip the reboot and continue the installation and reboot the computer at a later time.
  • Reboot Now
    If this option is displayed without the Skip Reboot option, the install program has found files required by the software that are in use and need to be replaced. If Reboot Now is displayed without the Skip Reboot option, reboot the computer at this point. The install program will automatically continue after the reboot.
  • Exit Setup
    If you want to exit the install program, click Exit Setup.

Schedule Automatic Update

30. If necessary, select this option to schedule an automatic installation of software updates.

NOTES

  • Install Updates Schedule allows automatic installation of the necessary software updates on the computer on a single or weekly basis. If you do not select this option, you can schedule these updates later from the CommCell Console.
  • To avoid conflict, do not schedule the automatic installation of software updates to occur at the same time as the automatic FTP downloading of software updates.
  • You may be prompted to reboot the computer before restarting services.
  • If a component has already been installed, this screen will not be displayed; instead, the installer will use the same option as previously specified.

Click Next to continue.

Install Remaining Cluster Nodes

31. To install/upgrade the software on the remaining nodes of the cluster, click Yes.

To complete the install for this node only, click No.

32. Select cluster nodes from the Preferred Nodes list and click the arrow button to move them to the Selected Nodes list.

NOTES

  • The list of Preferred Nodes displays all the nodes found in the cluster; from this list you should only select cluster nodes configured to host this virtual server.
  • Do not select nodes that already have multiple instances installed. For more information, see Multi Instancing.

When you have completed your selections, click Next to continue.

33. Type the User Name and Password for the Domain Administrator account, so that the installer can perform the remote install/upgrade of the cluster nodes you selected in the previous step.

Click Next to continue.

34. The progress of the remote install for the cluster nodes is displayed; the install can be interrupted if necessary.

Click Stop to prevent installation to any nodes after the current ones complete.

Click Advanced Settings to specify any of the following:

  • Maximum number of nodes on which Setup can run simultaneously.
  • Time allocated for Setup to begin executing on each node, after which the install attempt will fail.
  • Time allocated for Setup to complete on each node, after which the install attempt will fail.

NOTES

  • If, during the remote install of a cluster node, setup fails to complete or is interrupted, you must perform a local install on that node. When you do, the install begins from where it left off, or from the beginning if necessary. For procedures, see Manually Installing the Software on a Passive Node.
35. Read the summary for remote installation to verify that all selected nodes were installed successfully.

NOTES

  • If any node installation fails, you must manually install the software on that node once the current installation is complete. (See Manually Installing the Software on a Passive Node for step-by-step instructions.)
  • The message displayed on your screen will reflect the status of the selected nodes, and may look different from the example.

Click Next to continue.

Setup Complete

36. Click Next to continue.

NOTES

  • Schedules help ensure that the data protection operations for the Agent are automatically performed on a regular basis without user intervention. For more information, see Scheduling.
37. Click Yes to remove the privileges that were assigned earlier by the install program. If you do not wish to remove them, click No.

NOTES

  • This option will only be displayed if you were prompted to assign the privileges earlier in the installation.
38. Setup displays the successfully installed components.

NOTES

  • The Setup Complete message displayed on your screen will reflect the components you installed, and may look different from the example shown.
  • If you install an Agent with the CommCell Console open, you need to refresh the CommCell Console (F5) to see the new Agents.
  • If Reboot Now button is displayed make sure to reboot the computer before performing any other operations from the computer.

Click Finish to close the install program.

The installation is now complete.

Post-Install Considerations

General

  • Install post-release updates or Service Packs that may have been released after the release of the software. If you are installing a Service Pack, verify and ensure that it is the same version as the one installed in the CommServe Server. Alternatively, you can enable Automatic Updates for quick and easy installation of updates in the CommCell component.
  • After installing the Agent, you may want to configure the Agent before running a data protection operation. The following list includes some of the most common features that can be configured:
    • Configure your subclients - see Subclients for more information.
    • Schedule your data protection operations - see Scheduling for more information.
    • Configure Alerts - See Alerts and Monitoring for more information.
    • Schedule Reports - See Reports for more information.

The software provides many more features that you will find useful. See the Index for a complete list of supported features.

Disaster Recovery Considerations

  • Before you use your agent, be sure to review and understand the associated full system restore (or disaster recovery) procedure. The procedure for some agents may require that you plan specific actions or consider certain items before an emergency occurs.  See Disaster Recovery for more information regarding your agent.