Click on a link below to go to a specific section of the software installation:
Install the Exchange Database iDataAgent
Overview |
||
The following procedure describes the steps
involved in installing the Exchange Agents for Exchange Server 2007/2010
on the following in a clustered environment:
To install Exchange Agents in a clustered environment:
Off-host Proxy RequirementsIf you are installing the Exchange Agents on a 64-bit off-host proxy computer, perform the following pre-requisite task before installing these agents:
|
||
Install Requirements |
||
Verify that the computer in which you wish to install the software satisfies
the minimum requirements specified in
System Requirements - Microsoft
Exchange Server iDataAgents
and System Requirements
- Microsoft Windows File System iDataAgent.
The computer on which these agents will be installed is referred to as the
Client computer in this install procedure.
Review the following Install Requirements before installing the software: General
Firewall
Agent SpecificTo Set Permissions for the Mail-Enabled User:
Now the MailboxAdmin user will be allowed full access to all mailboxes on servers in the domain. Cluster SpecificGeneral
Exchange Agents in x64 Clusters
|
||
Install the Exchange Database iDataAgent |
||
The Windows File System
iDataAgent must be first
installed onto all of the physical nodes of the cluster. See
Install the Microsoft Windows File System
iDataAgent if you have
not installed it on all of the physical nodes. Once it has been installed onto the physical nodes, the Exchange Database iDataAgent must be installed first. Follow the steps described below to install Exchange Database iDataAgent. |
||
Before You Begin |
||
|
Install Procedure |
||
Getting Started |
||
1. |
Place the software
installation disc for the Windows platform into the disc drive. After a few seconds, the installation program is launched. If the installation program does not launch automatically:
NOTES
|
|
2. | In this screen, you choose the language you want to use during installation. Click the down arrow, select the desired language from the pull-down list, and click Next to continue. | |
3. | Select the option to Install Calypso
on this 64-bit computer. NOTES:
|
|
4. |
Read the Welcome screen.
Click Next to continue, if no other applications are running. |
|
5. |
Read the virus scanning software warning.
Click OK to continue, if virus scanning software is disabled. |
|
6. |
Read the license agreement, then select I accept the terms
in the license agreement. Click Next to continue. |
|
Cluster Selection |
||
7. |
Select Configure a Virtual Server. Click Next to continue. |
|
8. |
Select the disk group in which the virtual server resides. Click Next to continue. |
|
Select Components for Installation |
9. |
Select the component(s) to install. NOTES
Click Next to continue. To install the Exchange iDataAgents expand the Client Modules folder, the iDataAgents folder, and the Exchange iDataAgents folder then select the following:
When you select the Exchange iDataAgents for install, the appropriate Windows File System iDataAgent is automatically selected for install. Optionally, select the OWA Proxy Enabler by expanding the Client Modules folder, and the DataArchiver Agents folder. The OWA Proxy Enabler is required to be installed on the Exchange Server to support functionality for Outlook Add-In and/or OWA recalls. |
|
10. |
Click Yes to set up the required privileges for the local administrators group.
NOTES
|
|
The install program checks
your Windows user account for the following necessary operating system
rights:
|
||
11. | Specify the location where you want to install the software. NOTES
Click Browse to change directories. Click Next to continue. |
|
Firewall Configuration |
||
12. |
Select from the following:
NOTES
|
|
13. |
Click the Specify list of machine across the firewall option and then
specify the list of hosts separated from this computer by a firewall. Make sure
you correctly describe whether the firewall allows two-way communication (but on
a limited range of ports), or one-way communication (with either only remote
host being able to make connections to this computer, or vice versa).
For all one-way firewalls allowing incoming connections and those one-way firewalls allowing outgoing connections without additional port filtering, skip this step. Click Next to continue. NOTES
|
|
14. |
Click the Specify list of restricted open ports option and then
specify the port range. Add the starting and ending port range and then click
Add to place it in the Open Port List. Repeat as needed.
If firewall separating this computer from others allows incoming connections, but these connections can be made only on a limited set of ports, then configure the appropriate port range here. For all other scenarios, skip this step. Note that if you do not specify hostname(s) as well as port number(s), then the firewall services will not be configured. NOTES
Click Next to continue. |
|
15. |
If desired, modify the Keep Alive interval.
Click Next to continue. |
|
16. |
Optionally, select Advanced Firewall Configuration and specify a local
host name interface to use for outgoing tunnel connections through
the firewall. Otherwise, the interface and port is automatically selected for
you by the OS. Click Next to continue. |
|
17. |
If desired, modify the Tunnel Initialization interval.
Click Next to continue. |
|
Configuration of Other Installation Options |
||
18. |
Enter the fully qualified domain name of the CommServe computer. (TCP/IP network
name. e.g., computer.company.com)
NOTES
Click Next to continue. |
|
19. |
Enter the username and password information for an external
domain user account or a CommCell user account. This authorizes the installation
of an agent on the CommCell.
NOTES
Click Next to continue. |
|
20. |
Enter the following:
NOTES
Click Next to continue. |
|
21. |
Specify the location of the client's job results directory. NOTES
UNC paths are supported for Windows and Exchange Database 2007 iDataAgents with Cluster Continuous Replication (CCR), but cannot be specified on this screen. After the installation completes, you can change the Job Results path to a UNC path. For comprehensive information on UNC paths, see Using UNC Paths for Job Results Directory. Click Browse to change directory. Click Next to continue. |
|
Storage Policy Selection |
||
22. |
Select the storage policy through which you want to back up/archive the
indicated component (subclient, instance, etc.)
NOTES
Click Next to continue. |
|
Client Group Selection |
||
23. |
Select a Client Group from the list. Click Next to continue. NOTES
|
|
Configure Exchange Database Specific Information |
||
24. |
Select the backup type for Exchange Database backups. Choose either of the
following options, then click Next to continue:
A backup type is the selected partial backup that you run between full backups. In this window, you select the backup type that you want for this client. |
|
25. |
The install program displays a reminder to verify that Circular Logging is disabled before performing any database backup operations. To verify that Circular Logging is disabled:
Click OK to continue. |
|
26. |
Specify the Exchange Administrator information and click Next to
continue. Otherwise, skip to the next step.
Account Name - Domain user account created with the proper permissions. Do not include the domain name here. Account Password - The password assigned to the domain user. Domain - The Windows domain that the Exchange Server resides in. The installation detects and enters a domain name. If necessary, this field can be modified. |
|
Download and Install Latest Packs |
||
27. |
Select Download Pack(s) and Install to download and install the latest service packs and post packs from the software provider. NOTES
Click Next to continue. |
|
Verify Summary of Install Options |
||
28. |
Verify the summary of selected options.
NOTES
Click Next to continue or Back to change any of the options. The install program now starts copying the software to the computer. This step may take several minutes to complete. |
|
29. |
The System Reboot message may be displayed. If so, select one of the following:
|
|
Schedule Automatic Update |
||
30. |
If necessary, select this option to schedule an automatic installation of software
updates.
NOTES
Click Next to continue. |
|
Install Remaining Cluster Nodes |
||
31. |
To install/upgrade the software on the remaining nodes of the cluster, click Yes. To complete the install for this node only, click No. |
|
32. |
Select cluster nodes from the Preferred Nodes list and click the arrow
button to move them to the Selected Nodes list.
NOTES
When you have completed your selections, click Next to continue. |
|
33. |
Type the User Name and Password for the Domain Administrator
account, so that the installer can perform the remote install/upgrade of the cluster
nodes you selected in the previous step.
Click Next to continue. |
|
34. |
The progress of the remote install for the cluster nodes is displayed; the
install can be
interrupted if necessary.
Click Stop to prevent installation to any nodes after the current ones complete. Click Advanced Settings to specify any of the following:
NOTES
|
|
35. |
Read the summary for remote installation to verify that all selected nodes were installed
successfully.
NOTES
Click Next to continue. |
|
Setup Complete |
||
36. |
Click Next to continue.
NOTES
|
|
37. |
Click Yes to remove the privileges that were assigned earlier by the
install program. If you do not wish to remove them, click No.
NOTES
|
|
38. |
Setup displays the successfully installed components.
NOTES
Click Finish to close the install program. The installation is now complete. |
|
Post-Install Considerations |
||
General
The software provides many more features that you will find useful. See the Index for a complete list of supported features. Disaster Recovery Considerations
|
Install the Exchange Agents |
The Windows File System
iDataAgent must be first
installed onto all of the physical nodes of the cluster. See
Install the Microsoft Windows File System
iDataAgent if you have
not installed it on all of the physical nodes.
Once it has been installed onto the physical nodes, the Exchange Agents (such as Exchange Mailbox iDataAgent, Exchange Public Folder iDataAgent, Exchange Mailbox Archiver and/or Exchange Public Folder Archiver) and Windows File System iDataAgent can be installed from the active node to the virtual server using the following steps described below to install Exchange Agents. The software can also be automatically installed on all available passive nodes when the software is installed onto the virtual server, or you can choose to install any passive node(s) separately. |
Before You Begin |
|
Create the Registry Keys |
||||
Before installing the Exchange Agents, create the bAllowMultiInstances and bAllow32BitInstallOn64Bit registry keys. |
||||
1. | Create the bAllowMultiInstances registry key. | To create the registry key, see the following steps:
|
||
2. | Create the bAllow32BitInstallOn64Bit registry key. | To create the registry key, see the following steps:
|
||
Install Procedure |
||||
Getting Started |
||||
1. |
Place the software
installation disc for the Windows platform into the disc drive. After a few seconds, the installation program is launched. If the installation program does not launch automatically:
|
|||
2. | In this screen, you choose the language you want to use during installation. Click the down arrow, select the desired language from the pull-down list, and click Next to continue. | |||
3. |
Select the Calypso 32-bit
Software install options to install software. NOTES
|
|||
4. |
Select the option to install software on this computer. NOTES
|
|||
5. |
Read the Welcome screen.
Click Next to continue, if no other applications are running. |
|||
6. |
Read the virus scanning software warning.
Click OK to continue, if virus scanning software is disabled. |
|||
7. |
Read the license agreement, then select I accept the terms
in the license agreement. Click Next to continue. |
|||
8. | Select Create a new instance option to install the
Exchange Agents on separate
instance. NOTES
|
|||
Cluster Selection |
||||
9. |
Select Configure a Virtual Server. Click Next to continue. |
|||
10. |
Select the disk group in which the virtual server resides. Click Next to continue. |
|||
Select Components for Installation |
||||
11. |
Select the component(s) to install. NOTES
Click Next to continue. To install the Exchange Agents expand the Client Modules folder, the iDataAgents folder, and the Exchange iDataAgents folder then select one or more of the following (as appropriate to your application version):
When you select the Exchange Agents for install, the appropriate Windows File System iDataAgent is automatically selected for install. To install the Exchange Mailbox Archiver Agent, expand the Client Modules folder, the DataArchiver Agents folder, and then select from the following:
Optionally, select the Data Classification by expanding the Client Modules folder, and the Supporting Modules folder. The Data Classification is required to be installed on off-host proxy computer. Note that the Exchange Database iDataAgents must be installed on the Exchange Server, see Install the Exchange Database iDataAgent for step-by-step procedure.
|
|||
12. |
Click Yes to set up the required privileges for the local administrators group.
NOTES
|
|||
The install program checks
your Windows user account for the following necessary operating system
rights:
|
||||
13. | Specify the location where you want to install the software. NOTES
Click Browse to change directories. Click Next to continue. |
|||
Firewall Configuration |
||||
14. |
Select from the following:
NOTES
|
|||
15. |
Click the Specify list of machine across the firewall option and then
specify the list of hosts separated from this computer by a firewall. Make sure
you correctly describe whether the firewall allows two-way communication (but on
a limited range of ports), or one-way communication (with either only remote
host being able to make connections to this computer, or vice versa).
For all one-way firewalls allowing incoming connections and those one-way firewalls allowing outgoing connections without additional port filtering, skip this step. Click Next to continue. NOTES
|
|||
16. |
Click the Specify list of restricted open ports option and then
specify the port range. Add the starting and ending port range and then click
Add to place it in the Open Port List. Repeat as needed.
If firewall separating this computer from others allows incoming connections, but these connections can be made only on a limited set of ports, then configure the appropriate port range here. For all other scenarios, skip this step. Note that if you do not specify hostname(s) as well as port number(s), then the firewall services will not be configured. NOTES
Click Next to continue. |
|||
17. |
If desired, modify the Keep Alive interval.
Click Next to continue. |
|||
18. |
Optionally, select Advanced Firewall Configuration and specify a local
host name interface to use for outgoing tunnel connections through
the firewall. Otherwise, the interface and port is automatically selected for
you by the OS. Click Next to continue. |
|||
19. |
If desired, modify the Tunnel Initialization interval.
Click Next to continue. |
|||
Configuration of Other Installation Options |
||||
20. |
Enter the fully qualified domain name of the CommServe computer. (TCP/IP network
name. e.g., computer.company.com)
NOTES
Click Next to continue. |
|||
21. |
Enter the username and password information for an external
domain user account or a CommCell user account. This authorizes the installation
of an agent on the CommCell.
NOTES
Click Next to continue. |
|||
22. |
Enter the following:
NOTES
Click Next to continue. |
|||
23. |
Specify the location of the client's job results directory. NOTES
Click Browse to change directory. Click Next to continue. |
|||
Storage Policy Selection |
||||
24. |
Select the storage policy through which you want to back up/archive the
indicated component (subclient, instance, etc.)
NOTES
Click Next to continue. |
|||
Client Group Selection |
||||
25. |
Select a Client Group from the list. Click Next to continue. NOTES
|
|||
Configure Exchange Agents Specific Information |
||||
26. | If you are installing the Exchange Agents then continue
on with this step, otherwise skip to
Verify Summary of Install
Options.
Enter the following Exchange Administrator information then click Next to continue:
Account Name - Domain user account created with the proper permissions. Do not include the domain name here. Account Password - The password assigned to the domain user. Mailbox Name for this Account - Mailbox associated with the user above. Profile Name - Created during agent install. This profile is associated with the domain user's mailbox. Exchange Server Name - Name of the Exchange Server that the agent will communicate with for data protection and recovery operations. Domain - The Windows domain that the Exchange Server resides in. The installation detects and enters a domain name. If necessary, this field can be modified. NOTES
See the Exchange Agents section in User Accounts and Passwords for more information. |
|||
Download and Install Latest Packs |
||||
27. |
Select Download Pack(s) and Install to download and install the latest service packs and post packs from the software provider. NOTES
Click Next to continue. |
|||
Verify Summary of Install Options |
||||
28. |
Verify the summary of selected options.
NOTES
Click Next to continue or Back to change any of the options. The install program now starts copying the software to the computer. This step may take several minutes to complete. |
|||
29. |
The System Reboot message may be displayed. If so, select one of the following:
|
|||
Schedule Automatic Update |
||||
30. |
If necessary, select this option to schedule an automatic installation of software
updates.
NOTES
Click Next to continue. |
|||
Install Remaining Cluster Nodes |
||||
31. |
To install/upgrade the software on the remaining nodes of the cluster, click Yes. To complete the install for this node only, click No. |
|||
32. |
Select cluster nodes from the Preferred Nodes list and click the arrow
button to move them to the Selected Nodes list.
NOTES
When you have completed your selections, click Next to continue. |
|||
33. |
Type the User Name and Password for the Domain Administrator
account, so that the installer can perform the remote install/upgrade of the cluster
nodes you selected in the previous step.
Click Next to continue. |
|||
34. |
The progress of the remote install for the cluster nodes is displayed; the
install can be
interrupted if necessary.
Click Stop to prevent installation to any nodes after the current ones complete. Click Advanced Settings to specify any of the following:
NOTES
|
|||
35. |
Read the summary for remote installation to verify that all selected nodes were installed
successfully.
NOTES
Click Next to continue. |
|||
Setup Complete |
||||
36. |
Click Next to continue.
NOTES
|
|||
37. |
Click Yes to remove the privileges that were assigned earlier by the
install program. If you do not wish to remove them, click No.
NOTES
|
|||
38. |
Setup displays the successfully installed components.
NOTES
Click Finish to close the install program. The installation is now complete. |
|||
Post-Install Considerations |
||||
General
The software provides many more features that you will find useful. See the Index for a complete list of supported features. Agent SpecificMicrosoft Windows Server 2008 and Microsoft Windows Server 2008 R2 requires "csvde.exe" feature to be installed on the server to query Active Directory for mailbox information
1. Open Server Manager 2. Go to Features->Add Feature 3. Remote Server Administration Tools 4. Role Administration Tools 5. Select "Active Directory Lightweight Directory Service Tools"
Disaster Recovery Considerations
|