Solved

Decomission Strategy plan

Posted on 2013-01-05
3
316 Views
Last Modified: 2013-01-06
Decomission Strategy plan -

I would like to if there is some plan or set of steps i can follow for Decomissioning of Exchange Environment

I know about articles need some Strategy Sheet with points to follow or steps to have

Any Best practises i can follow to ensure the Old environment isnt being used (Cant simply stop or bring the Services\Servers down)
0
Comment
Question by:vicky19
  • 2
3 Comments
 
LVL 52

Assisted Solution

by:Manpreet SIngh Khatra
Manpreet SIngh Khatra earned 400 total points
ID: 38748763
I would like to if there is some plan or set of steps i can follow for Decommissioning of Exchange Environment - Step by Step i dont think is very easy but to read articles

If you are sure all users are moved i would suggest to check relay to ensure nothing is using the old environment, also hope you dont see any Mailboxes on old server once check the HomeMDB value on the DB's to ensure no users show exept default entire for System mailboxes

- Rancy
0
 
LVL 4

Author Comment

by:vicky19
ID: 38748789
I have already worked with EXMON for Mailbox or any activity on server ..... Good point about SMTP logs i guess as you have mentioned

I had few more queries
1. When is the Best time to change MX ?
2. I have run EXBPA all is fine .... any other such tool i can check something with ?
3. I have taken a Online and Offline backup so good on that part
4. Can i use these old servers for some good task ?
0
 
LVL 52

Accepted Solution

by:
Manpreet SIngh Khatra earned 400 total points
ID: 38748803
Yes i meant SMPT logs ... sorry on my part sometimes run in myself :)

1.) If you have a Firewall and thats the main point you dont need to until the receiver is changed
2.) There could be others but if Exmon is good and you will be checking SMPT logs i cant think of anything else
3.) Good but not sure why both
4.) You can surely use the old servers depending on their Performance for File server or some other Applications you might have but not very heavily used

- Rancy
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This process describes the steps required to Import and Export data from and to .pst files using Exchange 2010. We can use these steps to export data from a user to a .pst file, import data back to the same or a different user, or even import data t…
Following basic email etiquette rules will help you write a professional email and achieve a good, lasting impression with your contacts.
In this video we show how to create a mailbox database in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.: First we need to log into the Exchange Admin Center. Navigate to the Servers >> Data…
The video tutorial explains the basics of the Exchange server Database Availability groups. The components of this video include: 1. Automatic Failover 2. Failover Clustering 3. Active Manager

920 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now