• RSS
  • Twitter
  • FaceBook

Exchange Server Forums

Forums | Register | Login | My Profile | Inbox | RSS RSS icon | My Subscription | My Forums | Address Book | Member List | Search | FAQ | Ticket List | Log Out

Exchange 2010 Recovery

Users viewing this topic: none

Logged in as: Guest
  Printable Version
All Forums >> [Microsoft Exchange 2010] >> Installation >> Exchange 2010 Recovery Page: [1]
Login
Message << Older Topic   Newer Topic >>
Exchange 2010 Recovery - 2.Jan.2012 7:15:56 AM   
libra_ali786

 

Posts: 2
Joined: 11.Feb.2009
Status: offline
Hi

i try to recover exchange 2010 from recovery. when i apply Setup /m:recoveryserver  switch after some steps cheking , i got the following error message "exchange server 2010 build 14.2.247.5 must be used to perform recovery". How i can perform recovery?

Note : i had the installed exchange 2010 sp2 in my disaster server.
Post #: 1
RE: Exchange 2010 Recovery - 2.Jan.2012 8:12:50 AM   
libra_ali786

 

Posts: 2
Joined: 11.Feb.2009
Status: offline
I got the answer from other source.

(in reply to libra_ali786)
Post #: 2
RE: Exchange 2010 Recovery - 29.Sep.2012 12:10:32 PM   
albakiulmaruf

 

Posts: 1
Joined: 29.Sep.2012
Status: offline
Basic Risk Assessment


You don’t have to be a risk expert to undertake a basic risk assessment of your companies’ digital assets.

Initially put a few basic scenarios together, for example what aspects of the business would cause the most impact if data was stolen or systems taken out of operation.

For example would a denial of service attack on the corporate website be as damaging as a customer records being lost from a back-end server hack. Try and understand where the money is currently being spent on security and whose responsibilities each area is.

This exercise will focus your efforts on the most crucial aspects of the business and where the most damage could be done to the company’s reputation and well-being.

Understanding Compliance and Accreditations
Your organization might need to comply with official frameworks and regulations depending on the industry your company work within and financial transactions handled.

For example any entities dealing with credit card details will need to adhere to PCI requirements and their stringent regulations on storage and transmission of customer data.

Secure Infrastructure Design
Some basic secure network design both in your data center and office locations can have a dramatic effect on the likelihood of being hacked.

For example most hacker Trojans and Backdoors rely on outbound connections from the DMZ or internal networks. Filtering outbound connections on your firewall and just using an authenticated proxy server for employee web access will prevent the majority of hacker access to internal data. This is an example of a simple configuration change that makes a huge security difference.

Understanding whether a hack has occurred is also an essential part of a secure infrastructure. There are free tools available which can detect a successful attack and give you time to react before serious data loss occurs.

Some points to consider:

• Ensure strict firewall rule-sets
• Undertake server build hardening
• Secure databases and customer data in DMZ areas
• Enforce a strict password policy
• Install intrusion detection/protection systems
• Instigate a regular patching process


Secure Application Design.

A design document outlining secure coding practices could prevent a security incident later in the development process.

Web coding frameworks such as Ruby on Rails and PHP have security modules readily available which can be included from the inception of the application. How the web application authenticates users and deals with password attacks should be considered from the beginning of the design process, for example the use of CAPTCHA on logins to reduce brute force attempts.

Encryption of key data should be considered in case a successful hack does occur, this could prevent hacker groups spreading the user credentials on public sites as have recently occurred.

Compiled code such as C has been traditionally subject to attacks such as buffer overflows, which can be eliminated with safe, modern coding practices.

Some points to consider:

• Consider cryptographic storage of customer data
• Enforce a strong password policy
• Secure authentication processes with HTTPS
• Secure password reset processes
• Use of CAPTCHA to prevent brute force attacks
• Ensure data validation
• Prevent Verbose Error Handling
• Code from the outside for buffer overflow protection
• Secure Authentication processes


Mobile Device Security

The loss of a mobile device is always frustrating however when linked to an organization can be a real security issue. Leaked confidential emails, contacts and pictures have already been involved in well-publicized scandals. Enforcing of pin locks and encryption are two simple steps that prevent these issues but steps so often taken by newly formed companies.

Some points to consider:

• Full Hard drive encryption
• Enforce USB Device Encryption
• Enforce PIN codes and password
• Remote Wipe Enabled
• Firewall and Antivirus Enabled


Desktop Security

Desktops are often the starting point of serious data loss incidents and users can be exposed to web and email malware attacks. A common security incident scenario is a user browses to a malicious website, a browser or browser plug-in vulnerability downloads malware to the operating system and key strokes are then sent back to the hacker. Often attacks are then launched into the server environment from the hacked desktop.

Some points to consider:

• Enforce Full hard drive encryption of desktop in case of loss
• Enforce strict Windows domain policy
• Instigate a strict password policy
• Install centrally managed antivirus which reports to administrators
• User web traffic passed through malware blocking security device
• Instigate a rigorous patching regime of desktops


Physical Security

Rarely considered when storing computer equipment is the physical security of the location. This includes user working from homes or shared office space. If equipment is not fully encrypted and backed-up the loss of a server or laptop could be devastating.

Some points to consider:

• Ensure servers placed in a secure location such as a well established data center
• Use dumb terminals and remote desktops where possible to keep data centrally located
• Use laptop and desktop locks in shared office environments.
• Encrypt removable storage devices in case of loss.


Ethical Hacking/Penetration Testing

A key part of any security policy is regular testing from a respected Ethical hacking/penetration provider. Finding holes in your system before the hacker does has provided many corporate and government an additional level of confidence in their infrastructure and applications. Ethical hackers will use the same tools and techniques that a hacker does and report back on their findings.


Some areas that should be tested:

• Web applications
• Office and datacenter infrastructure
• Mobile device security review
• Desktop security review
• Security process review (for example what happens if a user forgets the password of a lost device).

(in reply to libra_ali786)
Post #: 3
RE: Exchange 2010 Recovery - 6.Oct.2012 10:13:15 PM   
brenda.nguyen

 

Posts: 1
Joined: 6.Oct.2012
Status: offline
Good news!!!Good news!!!Fastest delivery with more 5%gold for free!!
Announcement – 10:32 am

The Mist of Pandaria is finally going live now, and in order to celebrate this big event, we will introduce the following promotions from September 23.

1,Event time:EST 2012,9,25-2012,10,22
Content: Everyone who bought WOW gold can participate in the activity.

Place coupon code PANDAGOLD your cart when you order to save! EXPIRES 10/25/2012
This coupon code can be used repeatedly when you order.
Click her to buy World of Warcraft Gold US orWorld of Warcraft Gold EU ,welcome to subscribe to our website http://www.cheap-wow-gold.us

Hurry to grab the chance to win big prize, come and enjoy the magic trip of the Mist of Pandaria !

_____________________________

[URL="http://www.cheap-wow-gold.us"] Fast Delivery[/URL][url]www.cheap-wow-gold.us[/url]

(in reply to libra_ali786)
Post #: 4
RE: Exchange 2010 Recovery - 14.Oct.2012 11:34:57 AM   
rahul_khanna

 

Posts: 2
Joined: 14.Oct.2012
Status: offline
Try to use the recovery software especially for these types of softwares for recovery..hopefully they will help you to recover ..search for the best.

(in reply to alex21)
Post #: 5
RE: Exchange 2010 Recovery - 11.Nov.2013 9:54:45 AM   
rickytech

 

Posts: 23
Joined: 23.Dec.2012
Status: offline
Yes Rahul, there are several third party applications in the market, designed with advance scanning and analyzing technologies to solve such kind of problem in MS Exchange servers. One such popular Exchange server recovery software can be downloaded from here: http://www.recover-computerdata.com/exchange-server-recovery.html

The software has also a free trial version with full recovery features!

(in reply to rahul_khanna)
Post #: 6
RE: Exchange 2010 Recovery - 22.Nov.2013 6:13:25 AM   
jteresa

 

Posts: 5
Joined: 8.May2013
Status: offline
Exchange recovery tool is an advance, easy to use and cost effective application to repair and rebuild corrupt or damaged Exchange server database (.edb) file. The software effectively handles all the corruption and Exchange disaster situations. After repairing the damaged database file, you can directly mount it on the server.http://www.edbtopst-converter.com/exchange-recovery.html

(in reply to rickytech)
Post #: 7
RE: Exchange 2010 Recovery - 18.Dec.2013 9:22:41 AM   
maxilo

 

Posts: 2
Joined: 18.Dec.2013
Status: offline
Thanks for the information, has been very useful to me.

(in reply to jteresa)
Post #: 8
RE: Exchange 2010 Recovery - 5.Feb.2014 11:06:39 PM   
RalphMosley

 

Posts: 1
Joined: 5.Feb.2014
Status: offline
Get Best Microsoft EDB to PST recovery software and easily migrate EDB file to PST files. EDB to PST tool has full ability to extract emails from EDB file and migrate EDB mailbox to PST mailboxes with all features such as- Inbox, Outbox, Notes, Contacts, Calendars, Tasks, Journals, Sent items etc.
Recover Exchange EDB files with efficient EDB Recovery software. This EDB Recovery tool helps user to Recover Exchange EDB files and also converts EDB to PST.

Features
User can save EDB files into PST format
Software easily convert corrupted or healthy EDB files
Compatible with all Windows version
EDB Recovery successfully works with all Exchange corruptions.
A free trial version is also available here
http://www.filesrepairtool.com/edb-to-pst-converter.html

(in reply to maxilo)
Post #: 9
RE: Exchange 2010 Recovery - 18.Aug.2014 1:27:35 AM   
IsraelRoberts

 

Posts: 5
Joined: 12.May2014
Status: offline
Exchange recovery tool is an advance, easy to use and cost effective application to repair and rebuild corrupt or damaged Exchange server database (.edb) file. The software effectively handles all the corruption and Exchange disaster situations. After repairing the damaged database file, you can directly mount it on the server.
http://www.exchangeserver.pcrecoverytools.com/

(in reply to RalphMosley)
Post #: 10
[Deleted] - 18.Aug.2014 6:23:25 AM   
Deleted User
[Deleted by Admins]

(in reply to IsraelRoberts)
  Post #: 11

Page:   [1] << Older Topic    Newer Topic >>
All Forums >> [Microsoft Exchange 2010] >> Installation >> Exchange 2010 Recovery Page: [1]
Jump to:

New Messages No New Messages
Hot Topic w/ New Messages Hot Topic w/o New Messages
Locked w/ New Messages Locked w/o New Messages
 Post New Thread
 Reply to Message
 Post New Poll
 Submit Vote
 Delete My Own Post
 Delete My Own Thread
 Rate Posts


Follow TechGenix on Twitter