Thursday, May 9, 2013

what is active directory

What is Active Directory?


Active Directory is Microsoft's Directory Server. It provides authentication and authorization mechanisms as well as a framework within which other related services can be deployed (AD Certificate Services, AD Federated Services, etc). It is an LDAP compliant database that contains objects. The most commonly used objects are users, computers, and groups. These objects can be organized into organizational units (OUs) by any number of logical or business needs. Group Policy Objects (GPOs) can then be linked to OUs to centralize the settings for various users or computers across an organization.

What is a domain and what is a forest?

A forest is a security boundary. Objects in separate forests are not able to interact with each other, unless the administrators of each separate forest create a trust between them. For example, an Enterprise Administrator account for domain1.com, which is normally the most privileged account of a forest, will have, no permissions at all in a second forest named domain2.com, even if those forests exist within the same LAN, unless there is a trust in place.
If you have multiple disjoint business units or have the need for separate security boundaries, you need multiple forests.
A domain is a management boundary. Domains are part of a forest. The first domain in a forest is known as the forest root domain. In many small and medium organizations (and even some large ones), you will only find a single domain in a single forest. The forest root domain defines the default namespace for the forest. For example, if the first domain in a new forest is named domain1.com, then that is the forest root domain. If you have a business need for a child domain, for example - a branch office in Chicago, you might name the child domain chi. The FQDN of the child domain would be chi.domain1.com. You can see that the child domain's name was prepended forest root domain's name. This is typically how it works. You can have disjoint namespaces in the same forest, but that's a whole separate can of worms for a different time.
In most cases, you'll want to try and do everything possible to have a single AD domain. It simplifies management, and modern versions of AD make it very easy to delegate control based on OU, which lessens the need for child domains.

I can name my domain whatever I want, right?

Not really. dcpromo.exe, the tool that handles the promotion of a server to a DC isn't idiot-proof. It does let you make bad decisions with your naming, so pay attention to this section if you are unsure. (Edit: dcpromo is deprecated in Server 2012. Use the Install-ADDSForest PowerShell cmdlet or install AD DS from Server Manager.)
First of all, don't use made up TLDs like .local, .lan, .corp, or any of that other crap. Those TLDs are notreserved. ICANN is selling TLDs now, so your mycompany.corp that you're using today could actually belong to someone tomorrow. If you own mycompany.com, then the smart thing to do is use something like internal.mycompany.com or ad.mycompany.com for your internal AD name. If you usemycompany.com as an externally resolvable website, you should avoid using that as your internal AD name as well, since you'll end up with a split-brain DNS.

Domain Controllers and Global Catalogs

A server that responds to authentication or authorization requests is a Domain Controller (DC). In most cases, a Domain Controller will hold a copy of the Global Catalog. A Global Catalog (GC) is a partial set of objects in all domains in a forest. It is directly searchable, which means that cross-domain queries can usually be performed on a GC without needing a referral to a DC in the target domain. If a DC is queried on port 3268 (3269 if using SSL), then the GC is being queried. If port 389 (636 if using SSL) is queried, then a standard LDAP query is being used and objects existing in other domains may require a referral.
When a user tries to log in to a computer that is joined to AD using their AD credentials, the salted and hashed username and password combination are sent to the DC for both the user account and the computer account that are logging in. Yes, the computer logs in too. This is important, because if something happens to the computer account in AD, like someone resets the account or deletes it, you may get an error that say that a trust relationship doesn't exist between the computer and the domain. Even though your network credentials are fine, the computer is no longer trusted to log into the domain.

Domain Controller Availability Concerns

I hear "I have a Primary Domain Controller (PDC) and want to install a Backup Domain Controller (BDC)" much more frequently that I would like to believe. The concept of PDCs and BDCs died with Windows NT4. The last bastion for PDCs was in a Windows 2000 transitional mixed mode AD when you still had NT4 DCs around. Basically, unless you're supporting a 15+ year old install that has never been upgraded, you really don't have a PDC or a BDC, you just have two domain controllers.
Multiple DCs are capable of answering authentication requests from different users and computers simultaneously. If one fails, then the others will continue to offer authentication services without having to make one "primary" like you would have had to do in the NT4 days. It is best practice to have at least two DCs per domain. These DCs should both hold a copy of the GC and should both be DNS servers that hold a copy of the Active Directory Integrated DNS zones for your domain as well.

FSMO Roles

"So, if there are no PDCs, why is there a PDC role that only a single DC can have?"
I hear this a lot. There is a PDC Emulator role. It's different than being a PDC. In fact, there are 5 Flexible Single Master Operations roles (FSMO). These are also called Operations Master roles as well. The two terms are interchangeable. What are they and what do they do? Good question! The 5 roles and their function are:
Domain Naming Master - There is only one Domain Naming Master per forest. The Domain Naming Master makes sure that when a new domain is added to a forest that it is unique. If the server holding this role is offline, you won't be able to make changes to the AD namespace, which includes things like adding new child domains.
Schema Master - There is only one Schema Operations Master in a forest. It is responsible for updating the Active Directory Schema. Tasks that require this, such as preparing AD for a new version of Windows Server functioning as a DC or the installation of Exchange, require Schema modifications. These modifications must be done from the Schema Master.
Infrastructure Master - There is one Infrastructure Master per domain. If you only have a single domain in your forest, you don't really need to worry about it. If you have multiple forests, then you should make sure that this role is not held by a server that is also a GC holder unless every DC in the forest is a GC. The infrastructure master is responsible for making sure that cross-domain references are handled properly. If a user in one domain is added to a group in another domain, the infrastructure master for the domains in question make sure that it is handled properly. This role will not function correctly if it is on a global catalog.
RID Master - The Relative ID Master (RID Master) is responsible for issuing RID pools to DCs. There is one RID master per domain. Any object in an AD domain has a unique Security Identifier (SID). This is made up of a combination of the domain identifier and a relative identifier. Every object in a given domain has the same domain identifier, so the relative identifier is what makes objects unique. Each DC has a pool of relative IDs to use, so when that DC creates a new object, it appends a RID that it hasn't used yet. Since DCs are issued non-overlapping pools, each RID should remain unique for the duration of the life of the domain. When a DC gets to ~100 RIDs left in its pool, it requests a new pool from the RID master. If the RID master is offline for an extended period of time, object creation may fail.
PDC Emulator - Finally, we get to the most widely misunderstood role of them all, the PDC Emulator role. There is one PDC Emulator per domain. If there is a failed authentication attempt, it is forwarded to the PDC Emulator. The PDC Emulator functions as the "tie-breaker" if a password was updated on one DC and hasn't yet replicated to the others. The PDC Emulator is also the server that controls time sync across the domain. All other DCs sync their time from the PDC Emulator. All clients sync their time from the DC that they logged in to. It's important that everything remain within 5 minutes of each other, otherwise Kerberos breaks and when that happens, everyone cries.
The important thing to remember is that the servers that these roles run on is not set in stone. It's usually trivial to move these roles around, so while some DCs do slightly more than others, if they go down for short periods of time, everything will usually function normally. If they're down for a long time, it's easy to transparently transfer the roles. It's much nicer than the NT4 PDC/BDC days, so please stop calling your DCs by those old names. :)

So, um...how do the DCs share information if they can function independently of each other?

Replication, of course. By default, DCs belonging to the same domain in the same site will replicate their data to each other at 15 second intervals. This makes sure that everything is relatively up to date.
There are some "urgent" events that trigger immediate replication. These events are: An account is locked out for too many failed logins, a change is made to the domain password or lockout policies, the LSA secret is changed, the password is changed on a DC's computer account, or the RID Master role is transferred to a new DC. Any of these events will trigger an immediate replication event.
Password changes fall somewhere between urgent and non-urgent and are handled uniquely. If a user's password is changed on DC01 and a user tries to log into a computer that is authenticating againstDC02 before replication occurs, you'd expect this to fail, right? Fortunately that doesn't happen. Assume that there is also a third DC here called DC03 that holds the PDC Emulator role. When DC01is updated with the user's new password, that change is immediately replicated to DC03 also. When thee authentication attempt on DC02 fails, DC02 then forwards that authentication attempt to DC03, which verifies that it is, indeed, good, and the logon is allowed.

Let's talk about DNS

DNS is critical to a properly functioning AD. The official Microsoft party line is that any DNS server can be used if it is set up properly. If you try and use BIND to host your AD zones, you're high. Seriously. Stick with using AD Integrated DNS zones and use conditional or global forwarders for other zones if you must. Your clients should all be configured to use your AD DNS servers, so it's important to have redundancy here. If you have two DCs, have them both run DNS and configure your clients to use both of them for name resolution.
Also, you're going to want to make sure that if you have more than one DC, that they don't list themselves first for DNS resolution. This can lead to a situation where they are on a "replication island"where they are disconnected from the rest of the AD replication topology and cannot recover. If you have two servers DC01 - 10.1.1.1 and DC02 - 10.1.1.2, then their DNS server list should be configured like this:
Server: DC01 (10.1.1.1)
Primary DNS - 10.1.1.2
Secondary DNS - 127.0.0.1
Server: DC02 (10.1.1.2)
Primary DNS - 10.1.1.1
Secondary DNS - 127.0.0.1

OK, this seems complicated. Why do I want to use AD at all?

Because once you know what you're doing, you life becomes infinitely better. AD allows for the centralization of user and computer management, as well as the centralization of resource access and usage. Imagine a situation where you have 50 users in an office. If you wanted each user to have their own login to each computer, you'd have to configure 50 local user accounts on each PC. With AD, you only have to made the user account once and it can log into any PC on the domain by default. If you wanted to harden security, you'd have to do it 50 times. Sort of a nightmare, right? Also imagine that you have a file share that you only want half of those people to get to. If you're not using AD, you'd either need to replicate their username and passwords by hand on the server to give seemless access, or you'd have to make a shared account and give each user the username and password. One way means that you know (and have to constantly update) users' passwords. The other way means that you have no audit trail. Not good, right?
You also get the ability to use Group Policy when you have AD set up. Group Policy is a set of objects that are linked to OUs that define settings for users and/or computers in those OUs. For example, if you want to make it so that "Shutdown" isn't on the start menu for 500 lab PCs, you can do that in one setting in Group Policy. Instead of spending hours or days configuring the proper registry entries by hand, you create a Group Policy Object once, link it to the correct OU or OUs, and never have to think about it again. There are hundreds of GPOs that can be configured, and the flexibility of Group Policy is one of the major reasons that Microsoft is so dominant in the enterprise market.

what is sharepoint

What is sharepoint

What’s SharePoint? 


 The business collaboration platform for the enterprise and the web
 Allows individuals in an organization to easily create and manage their own collaborative Web sites
 Simplifies how people find and share information across boundaries, and enabling better informed decisions
 Seamlessly integrates with Windows and MS Office
 Does not refer to a specific product or technology
 Using the word “Microsoft SharePoint” is like using the word “Microsoft Office”
 Refers to several aspects of Web-based collaborative solutions

SharePoint as an Organizational Platform 

 Individual groups can have a collaborative web site
 Access can be limited to the team and appropriate stakeholders
 Relevant information can be centrally stored and maintained
 Communications can be streamlined
 Relatively easy to use
 IT intervention is minimal
 Based on familiar tools and technologies: Web, Windows, Microsoft Office

WSS vs MOSS 

 WSS is the core technology of Microsoft SharePoint
 Considered as the “engine” of SharePoint
 Provides document management and team
collaboration tools
 WSS is available for free as long as your organization is
utilizing Windows Server 2003 or above
 MOSS extends the capabilities of WSS
 Going back to our car analogy, MOSS provides
extended capabilities such as GPS, a DVD system,
Voice Commands, etc.
 Extended features include Enterprise search,
Personalization, Enterprise Content Management, etc.
 Unlike WSS, MOSS is not available for free


7 Ways SharePoint Can Empower Your Organization

#1 Easily Create a Collaborative Site 
 Technical skill requirement is minimal 
 Microsoft Windows 
 Microsoft Office 
 Familiar with web browsing 
 Easily define relevant access 
 Based on communication needs 
 If deployed appropriately, IT does not  have to deal with 
 Updating content 
 Defining account privileges 
 Maintaining a document repository

#2 Efficiently Manage Information 
 SharePoint provides various tools to effectively centralize  and manage information 
 Schedule 
 Documents 
 Change Request 
 Risk/Issue Log 
 Budget 
 Document management features 
 Information storage 
 Check-in/check-out 
 Version control 
 Content approval

#3 Facilitate Team Collaboration 

 Document Collaboration 
 Document Workspaces can be used to jointly develop  requirements document, reports, templates, etc. 
 Tools 
 Wikis to document lessons learned 
 Discussion boards for offline communication 
 Meeting Workspaces to support meetings

#4 Enhance Communication 
 Right information for the right person at the right time 
 Tasks 
 Schedule 
 Reports 
 Dashboard 
 Relevant information access 
 Appropriate privileges can be defined based on 
informational needs 

#5 Automate Business Processes 
 Common project workflows 
 Change Control 
 Expense Reimbursement 
 Vacation Request 
 SharePoint workflows 
 Three-State 
 Custom workflows

#6 Generate Relevant Reports 
 SharePoint can be used to generate relevant 
 Interactive summary of a project 
 Project tasks information 
 Automated alerts 
 Dashboards can be created using Web Parts 
 Red, Amber, Green (RAG) Status 
 Key Performance Indicators (KPI) 
 Charts

#7 Integrate with Existing LOB Systems 
 Integrate SharePoint with existing data sources 
 SQL – based data 
 Web Services 
 XML 
 Non Microsoft enterprise systems 
 CRM 
 Reporting Tools

What is a SCCM

SCCM

What is Lotus Sametime

Lotus Sametime

Lotus Sametime 

 Nowadays, individuals and organizations produce and replicate content and information, increasing significantly the amount of information spreads over the World. The IBM Lotus Sametime helps companies to communication in a efficient way, reducing traveling costs, time response and deliver a better service to the clients. Sametime is much more than just chat and Web conferences. It is an open-standards-based platform for real-time collaboration. Businesses and IBM Business Partners use Sametime 8.5 APIs and toolkits to build innovative new real-time customized collaboration applications, and to improve any application, business process, or third-party application. IBM® Lotus® Sametime® provides instant, anytime access to people and information through integrated presence awareness, conversation and object-sharing capabilities. Sametime improves individual and team productivity by broadening communications choices beyond the phone, e-mail and in-person meetings; enabling faster more informed decision making by bringing people together spontaneously or in a structured fashion.
Sametime offers real-time communication and collaboration via:

  • Presence 
  • Instant Messaging 
  • Web Conferencing
 Sametime consists of client and server applications that enable a community of users to collaborate through instant messaging and online meetings over an intranet or the Internet. Millions of people worldwide use IBM Lotus Sametime facilities every day to gain instant access to people and information, bring together geographically dispersed teams, and improve individual and team productivity.

 What's New in Lotus Sametime 8.5 


  •  A new online meeting experience that is integrated into the IBM Lotus Sametime Connect client. Join a meeting with a single click. Easily invite others by dragging their names from the contact list. Accept meeting invitations with a single click. Upload meeting materials in a simple way using drag and drop.
  • New zero-download, browser-based chat and meeting clients who extend the desktop experience to wherever the user is working.
  •  A new Sametime Media Manager with SIP-based interfaces and APIs inter operates with third-party video and audio conferencing systems. It also offers new video (H.264) and audio (G.722.1) codecs that deliver a better user experience at a fraction of the  bandwidth and provides administrative controls over the video experience (size, bitrate, and so on).
  • New Web 2.0 APIs let developers embed Sametime capabilities into Web sites and applications so users do not have to switch context as often
  • A new, browser-based Apple iPhone chat client, support for the Blackberry Storm, and an improved mobile client for Microsoft® Windows® Mobile devices. The figure below shows what would be shown in a blackberry mobile phone running sametime client 8.5:
  • New social views that make it easier to find the people you collaborate with the most.
  • Integrated Installation Manager that simplifies install of Sametime and all required components such as a Domino, Websphere and DB2. Installations can be managed across
  • A new System Console that centralizes infrastructure configuration, deployment, management, and policy management for all Sametime services.
  • Lotus Office Integration - Improved usability of Meeting Integrator with Lotus Sametime Standard Meetings Connect client.
  • A new online meeting infrastructure no longer requires add-on servers for high availability and improves firewall friendliness through the use of HTTP/S to connect users.
  •  Add persistent cache for Lotus Notes embedded (performance).
  • Lotus Gateway - Context Logging (serviceability) Community server.
  • Community Server - Chat logging support for announcements.
  •  Meetings Client: Meeting join-time performance / Performance of web client appshare views.
  • Integration 
– Release number synchronization for Lotus Sametime Entry, Lotus Sametime Standard, and Lotus Sametime Unified Telephony – Lotus Sametime 8.5.1 upgrade pack for Lotus Notes 8.5.1 and Lotus Notes 8.5.2
  • New platforms:
– Lotus Domino 8.5.1 and 8.5.2 – Mac, Linux - Lotus Sametime 8.5.1 client support (Lotus Sametime Standard and Lotus Notes embedded clients) – Microsoft Windows 7, MacOS 10.6, RHEL 5.4, Ubuntu support, SLED 11 clients (Lotus Sametime Standard and Lotus Notes embedded clients)

 More Information:
 What is new in Lotus Sametime 8.5 software
 What is new in Lotus Sametime 8.5.1 



Benefits we can achieve with Lotus Sametime 8.5.x


Cost savings

Reduce telephony costs by eliminating long distance phone calls by using Sametime for voice & video chats

Reduce cell phone charges by using Sametime for voice

Reduce travel costs by using on premise web conferences

Reduce external web conferencing costs by using on premise web conferences

Reduce calling (and Voice Mail) costs with alternative communication modes (Instant Messaging)

Everyday Productivity Improvements

Better and faster collaboration on projects / work efforts

Improved collaboration in R&D, Sales, Support team

Accelerate business processes

Faster response in support centers and help desks

Improved collaboration in R&D and with business partners

Faster problem resolution in manufacturing

Integrate with other user applications to speed business cycles

Leverage communications investments

Telephony, Audio, Video and Mobile integration with leading vendors allowing the company uses the existing technologies.



IBM Lotus Sametime products Family

There are three Lotus Sametime offerings:

  • Sametime Entry
  • Sametime Standard
  • Sametime Advanced
    Lotus Sametime product family




    Sametime Entry

    Lotus Sametime Entry is a limited offering, providing a core set of awareness and instant messaging capabilities either from stand-alone Lotus Sametime clients or from within Lotus Notes. Lotus Sametime Entry does not support meeting rooms. In addition, Lotus Sametime Entry is sometimes packaged with other IBM products. Sametime Entry includes online presence awareness, basic text chat capabilities and integration with Microsoft products - Microsoft Office, Microsoft Outlook and Microsoft SharePoint.

    Sametime Standard

    This is the traditional Sametime that includes Meetings, VoIP/Video, Sametime Gateway (connectivity to public Instant Messaging networks), Mobile clients, plugins, and others:

      Instant Messaging, Voice and Video Chat

    Third party telephony and video Integration (with Business Partner solutions)

    File transfer, screen capture tool

    Web conferences

    Mobile device support

    External Communities (Public Instant Messaging Federation)

    Flexible and extendable System

    Meeting system (new)

    Sametime Advanced

    Sametime Advanced includes all of the capabilities of Sametime Standard, along with the following additional features: Persistent group chat, broadcast community tools, instant screen share and server based geographic location services:

    Persistent Chat Rooms

    Real-time community

    Collaboration Tools

    Instant Screen Share

    Location Services 



    Lotus Sametime server architecture



    Sametime services fall into three areas:


    Community services: These services contain awareness, instant messaging, and chat. A buddy list makes Sametime users aware of who is available (and who is online but unavailable) to communicate thru an instant message or participate in a chat with one or more people. The instant messaging traffic is encrypted.
    Online Meeting services: These services include a shared whiteboard and the ability to share programs and documents online. Sametime also offers a server-based Meeting Center where users can schedule online meetings in advance and store agendas and other meeting materials.
    Customization and Integration services: Sametime also provides a comprehensive API that enables customers to easily integrate real-time collaborative capabilities into other applications, such as e-commerce sites, help desks, and training/information delivery applications like Sales Force Automation.

Lotus Sametime server architecture




A typical Sametime server contains:


Lotus Sametime System Console

Lotus Sametime Community Server

Lotus Sametime Proxy Server

Lotus Sametime Media Server

Lotus Sametime Meeting Server

Lotus Sametime Gateway

Lotus Sametime clients

Lotus Sametime System Console
The Lotus Sametime System Console is a web based application that provides a central location for installing, configuring, administering, and monitoring the Sametime environment. This console allows the Sametime administrator consolidate in one unique console the information about the hole environment. This console should be installed on a dedicated machine in an enterprise deployment.
Lotus Sametime Community Server
The Lotus Sametime Community Server runs on Lotus Domino. It supports all presence (or awareness), and text chat activity in a Lotus Sametime community. All Sametime clients who contains a presence list have to connect to the Sametime Community Server.
Lotus Sametime Proxy Server
The Lotus Sametime Proxy Server communicates with the Lotus Sametime Community Server, Lotus Sametime Meeting server, Lotus Connections Server, and Lotus Sametime Unified Telephony Server or other TCSPI-enabled server. The IBM Lotus Sametime Proxy Server runs on IBM WebSphere® Application Server and requires a Lotus Sametime Community Server.
Lotus Sametime Media Manager
The Sametime Media Manager is a new component in the Sametime Architecture. It provides a single audio / video architecture that supports both the Community and Meetings Servers. Beyond high quality audio and video codecs (up to high definition), the Media Manager includes also a SIP Proxy to enable integration with key audio and video conferencing partners. This enables Sametime users to leverage existing video conferencing investments with little new training. The Sametime Media Manager is also WebSphere based.
Lotus Sametime Meeting Server
The Lotus Sametime Meeting Server provides a central meeting place for members of the community. Combined with the Lotus Sametime Media Manager, meeting rooms can be enhanced with audio-visual features. The Sametime Meeting Server runs over a WebSphere Application Server and it requires an IBM DB2 database and an LDAP server.
Lotus Sametime Gateway
Running over a WebSphere Application Server, Lotus Sametime Gateway is a platform for sharing presence and real-time collaboration with external instant messaging communities. Lotus Sametime Gateway is used to connect with the following gateways or communities:

Lotus Sametime communities deployed outside of your firewall

AOL Instant Messenger

Google Talk

Jabber

Microsoft Office Communications Server communities

Yahoo Messenger


Lotus Sametime clients
To collaborate in instant messaging and online meetings, people in your organization use IBM Lotus Sametime clients that interact with services on Lotus Sametime servers.

Sametime Connect - desktop instant messaging client that can be stand-alone or embedded in Lotus Notes

Sametime browser client - instant messaging client in a browser

Sametime mobile client - instant messaging features in a mobile device

Sametime iPhone client - optimized browser client for iPhone

Sametime Meetings - meeting room plugin for Sametime Connect or Lotus Notes

Sametime Meeting Room Center in a browser - online access to Sametime meeting rooms

Sametime Classic Meetings client - Java-based meeting room client interacts with the Sametime Classic Meeting




What is Lotus Notes /lotusnotes /lotus domino

Lotus Sametime

 Lotus Domino/Lotus Notes/LotusNotes

IBM® Lotus® Domino® software provides world-class collaboration capabilities that can be deployed as a core e-mail and enterprise scheduling infrastructure, as a business application platform, or both.
Lotus Domino software and its client software options deliver a reliable, security-rich messaging and collaboration environment that helps companies enhance the productivity of people, streamline business processes and improve overall business responsiveness.

IBM Domino products 

·         IBM Domino
·         Collaboration Express
·         Enterprise Server (on premises, or via cloud in IBM SmartCloud Enterprise)
·         Messaging Express
·         Messaging Server (on premises, or via cloud in IBM SmartCloud Notes)
·         Utility Express
·         Utility Server (on premises, or via cloud in IBM SmartCloud Enterprise)
·         IBM Domino Administrator Client
·         IBM Domino Designer Client
·         IBM iNotes (IBM Lotus Domino Web Access before 2008)
·         Lite Mode (for slow connections, available since 8.0.1)
·         Ultralite Mode (for Safari browser on Apple iPhone, available since 8.0.2)
·         IBM Notes Traveler



Considerations for upgrading an existing Domino infrastructure

In addition to the general areas of concern listed in this section, when you are evaluating an
existing Domino infrastructure, there are some additional areas to be reviewed and
evaluated. You should evaluate your current Domino environment thoroughly when planning
your upgrade. Some things you should consider include:
_ Domain and directory configuration
– The number of domains you have
– The types of domains you have
– The types of directories in use
Planning the Notes and Domino 8 Deployment 
_ Mail routing topology
_ Replication topology
_ Application topology
_ User and server registration process used in your organization
– Naming standards for users and servers
– Domino certificates for organization and organizational units
_ Domino software upgrade procedures currently used in your organization
_ Hardware age and capacity
_ Usage patterns on each server
_ Template customization
_ Third-party software
– Virus scanning
– Spam scanning
– Backup
– Monitoring
– Mobile device support
The goal of the review of your existing Domino environment is to understand whether it is
meeting your needs and how close to capacity your environment is. Typically, older
enterprise deployments have grown organically and incrementally, as the needs of the
organization have changed. Growth in the size and maturity of an organization, mergers,
acquisitions, and divestitures all have an effect on deployments, with changes typically being
tactical and incremental, rather than strategic.
When reviewing your Domino environment, you may find a need for some new hardware or
added capacity. You may also see an opportunity for server consolidation.

Considerations for mail servers


For many organizations, e-mail is considered a mission-critical application. For this reason,
special attention should be given to the evaluation of your mail infrastructure. When
assessing your Domino mail servers, you should consider each of the following areas:
_ General server performance
– Responsiveness
– Average and peak CPU utilization
– Average and peak memory utilization
– Average and peak transactions per minute
– Average and peak disk utilization
_ Total disk usage for mail files
_ Average mail file size
_ Largest mail files
_ Current quota practices
_ Current archiving practices
_ Average number of messages processed each day
 IBM Lotus Notes and Domino 8 Deployment Guide
_ Average number of concurrent users
_ Peak usage times
_ Usage of local replica model
_ Inbox size
_ Attachment compression
_ Standard settings and configurations
_ Use of Web-based mail
– HTTP
– IMAP
– SSL
– RSS
You are probably already monitoring many of these things, and you may have historical data
to show you how disk space usage and CPU utilization has increased over time. You may
also track your top 10 largest mail files, and track the overall disk footprint of mail files on your
servers. You may even have implemented an archiving and quota strategy to keep your mail
files at or below a specified size, as well as a local replica model to improve user experience
and decrease user impact in the event of network or server issues.
Wherever you are today, understanding the work that your mail servers do is a very important
part of assessing your overall Domino environment.
Considerations for application servers
From a similar perspective, you should consider your application servers carefully. In some
ways, your application servers are more difficult to assess than your mail servers because of
different usage patterns and differences in application design. However, many of the same
things should be assessed in your review.
Information to collect while assessing your application environment includes:
_ List of all application servers in your environment
_ List of any mixed-use servers (mail and application)
_ Locations of critical and enterprise-wide applications
_ List of servers dedicated to a specific application
_ Inventory of all non-mail applications
_ Usage patterns
– Critical and enterprise-wide applications
– Application servers
_ Use of Web applications
– HTTP
– SSL
– RSS
_ Replication topology
_ Attachment handling
_ Any specialized functions or features used by applications
_ Backup methodology
_ Dependencies between databases in complex applications (such as lookups)
_ Use of applications to send mail
Using the database catalog on your application servers, or on any server on which you allow
users to create databases, is a good way to develop your application inventory. The catalog
also provides information such as ACL listings and information about reads and writes on the
database. Additionally, you can redirect the output of a directory list command on the
operating system to develop a list of all databases and applications on your servers.
Chapter 2. Planning the Notes and Domino 8 Deployment 27
Because of the varied nature of applications, there may well be other concerns as well. It is
important to work closely with your development teams to gain a full understanding of your
application environment.
Third-party applications
Like many organizations, you may have third-party applications in place in your environment,
such as anti-spam, anti-virus, backup, and monitoring. When reviewing your Domino
environment, it is important to fully understand the third-party applications you have in your
environment.
Things to consider while assessing the use of third-party applications in your environment
include:
_ Which third-party applications you have in place
_ Versions of each third-party application
_ Dependencies for each third-party application
_ Interaction between Domino and third-party applications
There may well be other concerns, depending on the nature of the third-party applications
you have in place. Because of the variety of applications and vendors, it is important to work
closely with the teams supporting these applications to fully understand their usage in your
environment.
Template customization
When evaluating your environment, you should also consider any customizations that you
have made to templates. It is possible that customizations have been made to mail templates,
directory templates, and application templates that ship with Notes and Domino, such as
teamroom and discussion. You need to consider any customizations that have been made,
and determine whether any customizations need to be carried forward into the templates that
ship with Notes and Domino 8.
If you do have template customizations, best practices suggest that you create a new custom
template based on the template that ships with the version of code you deploy. This may
involve re-coding certain changes to ensure full compatibility.


Evaluation questionnaire: existing Domino environment


Table 2-1 provides a checklist of things to consider based on the areas listed in this section.
Table 2-1 Existing Domino environment evaluation questionnaire
Area of concern Things to consider

Stakeholders
CTO/CIO
Users
Client/desktop software team
Deployment team
Domino admin/operations team
Help desk/support team
Network admin
Storage admin
Other admins (Portal, WAS, DB2, Web servers)
Organizational
concerns
Countries in which you do business
Number of locations/facilities
Number of users
Domino environment -
general
Domain and directory configurations
The number of domains you have
The types of domains you have
The types of directories in use
Replication topology
Naming standards
Domino certificates in use (O, OUs)
User registration process used in your organization
Domino software upgrade procedures currently used in your

Hardware age and capacity
Template customization
Domino environment -
mail
Locations of key mail files (executives)
Average mail file size per server
Largest mail files per server
Archive strategy
Quota strategy
Mail routing topology
Usage patterns on each server
Average number of messages processed each day
Average concurrency rate
Peak usage times
Usage of local replica model
Inbox size
Attachment compression
Standard settings and configurations
Use of IMAP/HTTP/SSL/RSS for mail
Domino environment -
applications
Location of critical applications
Location of enterprise-wide applications
Usage patterns on each server
Any servers dedicated to a specific application
Use of HTTP/SSL/RSS for applications
Replication topology
Attachment handling
Specialized functions or features used by applications
Backup methodology
Dependencies between databases in complex applications (such as
lookups)
Use of applications to send mail
User types Executives
Desktop
Laptop
Kiosk: DWA
Kiosk: Notes multi-user
Roaming users
Telecommuters
Mobile device users

Considerations for a new Domino deployment

When evaluating your existing environment in order to plan a new deployment of Domino, the
process is essentially the same as for an existing Domino infrastructure upgrade. The
additional concerns include:
_ Designing your Domino architecture
– Planning your hierarchy
– Determining your organizational structure
_ Setting your naming standards
_ Defining your topologies
– Mail routing
– Replication
_ Planning your administration strategy
– Centralized or regional
– User management
– Server management
– Application management
Network/Infrastructure Geographic distribution of users and servers
Network topology
Current network bandwidth usage in each geographic location and
between locations
Network bandwidth availability and cost for each geographic location
Storage subsystems
Documentation Infrastructure diagrams
Standard configurations (client and server)
Lists of customizations
Procedure documents
Organizational best practices
Other concern Governmental regulations
Business pressures
Other data stores you may want to utilize
Future needs Planned mergers, acquisitions, divestitures
Planned or expected hiring
Increased usage of products due to new features
Increased traffic on network/servers
Increases in mail file or application size
Planned changes in corporate strategy
Third-party applications
(such as backup,
anti-virus, anti-spam,
monitoring, mobile)
Third-party applications you have in place
Versions of each third-party application
Dependencies for each third-party application
Interaction between Domino and third-party applications
Area of concern Things to consider


Environment evaluation questionnaire: new Domino deployment
Area of concern Things to consider
Stakeholders CTO/CIO
Users
Client/desktop software team
Deployment team
Domino admin/operations team
Help desk/support team
Network admin
Storage admin
Other admins (Portal, WAS, DB2, Web servers)
Organizational
concerns
Countries in which you do business
Number of locations/facilities
Number of users
User types Executives
Desktop users
Laptop users
Kiosk: DWA
Kiosk: Notes multi-user
Roaming users
Telecommuters
Mobile device users
Network/infrastructure Geographic distribution of users and servers
Network topology
Current network bandwidth usage in each geographic location and
between locations
Network bandwidth availability and cost for each geographic location
Storage subsystems
Documentation Infrastructure diagrams
OS and software versions
Standard configurations (client and server)
Lists of customizations
Procedure documents
Organizational best practices
Other concerns Governmental regulations
Business pressures
Other data stores you may want to utilize
Future needs Planned mergers, acquisitions, divestitures
Planned or expected hiring
Increased usage of products due to new features
Increased traffic on network/servers
Increases in mail file or application size
Planned changes in corporate strategy
Third-party applications Backup
Spam
Virus scanning
Monitoring