About this course

Course code TPZL1_D8L76
Duration 2 Days

This course covers installing and configuring a basic IBM Lotus Domino 8.5 and IBM Lotus Notes infrastructure with a single domain and using an existing deployment plan. This course also covers configuring replication and mail routing in the single-domain environment.

The target audience for this course is system administrators new to Lotus Domino, who have a general understanding of the Lotus Domino and Lotus Notes administration environment, and who will be responsible for initial installation and setup of a basic Lotus Domino and Lotus Notes 8 infrastructure, and setup of Domino Mail servers in the corporate intranet and extranet (i.e. Internet) environments

Prerequisites

You should have:

Delegates will learn how to

Outline

Lesson 1: Setting Up the First Server and Administrator

  • Topic 1A: Analyzing a Deployment Plan Planning Considerations
  • Planning Guidelines
  • The Worldwide Corporation Deployment Plan
  • Supported Platforms and System Requirements
  • Topic 1B: Installing the IBM Lotus Domino Server Software
  • Lotus Domino Server Installation Types
  • Topic 1C: Installing the IBM Lotus Domino Administrator Client Software
  • The Lotus Notes 8.5 Client Standard and Basic Configurations
  • What is Eclipse?
  • Client Installation Types
  • What is Lotus Expeditor?
  • Expeditor Component Packaging
  • Eclipse Update Sites
  • Automated Installation Options for Eclipse Components
  • Multiple Users Sharing One Workstation
  • Topic 1D: Launching and Configuring the First Server •The Server Setup Process
  • The Domino Directory
  • Replicas of the Domino Directory
  • Comparing Domains and Organizations
  • Purposes of Organizational Units
  • Alternatives to Organizational Units
  • Descendants of the Organization Certifier
  • Organization Security
  • Organization Certifier ID Security
  • Authentication Between Organizations
  • Country Codes
  • Server Audience Types
  • The Lotus Domino Server Log
  • Administrators Group Security Options
  • Topic 1E: Configuring the First Workstation
  • The Client Configuration Program
  • Topic 1F: Assigning Roles to Administrators and Servers
  • Access in the Domino Directory
  • The Special Privilege of the LocalDomainAdmins Group
  • Privileges the LocalDomainAdmins Group Lacks

Lesson 2: Adding IBM Lotus Domino Servers

  • Topic 2A: Registering Servers
  • The Server Registration Process
  • Domino Directory Access for Registering Servers
  • Need for Selecting a Registration Server
  • Server ID File Storage Options
  • Topic 2B: Configuring and Starting Additional IBM Lotus Domino Servers
  • The Standard Directory Structure
  • The Central Directory Structure
  • Replicating a Subset of Documents in the Domino Directory
  • Server Setup Profiles
  • Clearing the Server ID Password

Lesson 3: Adding IBM Lotus Notes Clients

  • Topic 3A: Creating an Organizational Unit Certifier
  • The Certifier Registration Process
  • The Certification Log
  • Administrator Access to Register OU Certifiers
  • Need for Selecting a Registration Server
  • Topic 3B: Registering New Administrators
  • User Registration Options
  • Administrator Access to Register Users
  • The License Tracking Database
  • Internet Password Options
  • Internet Password Locking
  • ID File Distribution Options
  • Topic 3C: Registering Users from a File
  • User Registration Text Files
  • How to Register Users from a Text File
  • Topic 3D: Replicating Server Document Changes
  • Domino Directory Document Synchronization
  • Topic 3E: Setting Up an Administrator Workstation
  • Workstation Setup for Additional Workstations
  • Topic 3F: Verifying the IBM Lotus Domino Installation
  • The Lotus Domino Administrator
  • Topic 3G: Creating Replicas on Multiple Servers
  • The Administration Process
  • Components of the Administration Process
  • Database Tools in Domino Administrator
  • Timing and Execution of Administration Process Requests

Lesson 4: Administering Users

  • Topic 4A: Creating Groups
  • Groups
  • Nested Groups
  • The Deny List Only Group Type
  • Group Precedence in Database Access
  • Auto-populated Groups
  • Topic 4B: Creating an Organizational Policy
  • Policies
  • Policy Documents
  • Policy Types
  • Settings Document Types
  • Policy Precedence Rules
  • Static and Dynamic Settings
  • Policy Management Tools
  • Policy Management Development Tools
  • Use of an Organizational Policy
  • Topic 4C: Creating and Assigning an Explicit Policy
  • Policy Assignment Methods
  • Policy Assignment During Registration
  • Dynamic Policy Assignments
  • The Effect of Multiple Policies

Lesson 5: Setting Up Server Administration

  • Topic 5A: Customizing the IBM Lotus Domino Administrator Work Environment
  • Administration Preferences
  • Lotus Domino Server Console Administration Tasks
  • Message Color-Coding on the Server Console
  • Topic 5B: Setting Access to Create Databases on the Server
  • Server Access Control Mechanisms
  • Restrictions for Authorizing Server Access
  • User Access to the Server
  • When to Restart the Server
  • Topic 5C: Setting Administration Levels
  • Administration Levels
  • Administration Level Details
  • The Full Access Administrator Level
  • Full Access Administrator Best Practices
  • The Domino Web Administrator
  • Administration Levels and the Lotus Domino Web Administrator Application
  • Topic 5D: Setting Logging Levels
  • The Domino Server Log
  • The Notes.ini File
  • Logging Levels

Lesson 6: Synchronizing IBM Lotus Domino System Databases

  • Topic 6A: Creating Server Groups for Replication
  • Server Databases to Replicate
  • Server Groups and Replication
  • Topic 6B: Creating a Connection Document
  • Replication Controls
  • Replication Types
  • Methods for Forcing Replication
  • Pull Push Replication
  • Multiple Replication Hubs
  • Critical Application Scheduling
  • Replication Schedule Criteria

Lesson 7: Configuring Basic Intranet Mail Routing

  • Topic 7A: Configuring Notes Named Networks
  • Checklist for Configuring Basic Intranet Mail Routing
  • Mail Routing Components
  • Mail Routing Behavior Within and Between NNNs
  • Topic 7B: Implementing a Hub-and-Spoke Mail Routing Topology
  • The Hub-and-Spoke Mail Routing Topology
  • How Mail Routes in the Hub and Spoke Topology
  • Opportunistic Routing
  • Connection Document Mail Routing Options
  • Router Types and Connection Documents
  • Topic 7C: Selecting a Mail Storage Format for Incoming Mail
  • Mail Storage Formats

Lesson 8: Configuring Mail Routing to the Internet

  • Topic 8A: Enabling the SMTP Listener Task
  • Checklist for Configuring Mail Routing to the Internet
  • SMTP
  • SMTP Implementation Scenarios
  • SMTP Best Practices
  • Internet Mail Routing
  • The SMTP Listener and Router Tasks
  • Methods for Enabling SMTP
  • Topic 8B: Configuring Basic SMTP Settings
  • SMTP Settings
  • Topic 8C: Restricting Internet Mail Delivery
  • SMTP Inbound Controls
  • SMTP Outbound Controls
  • Message Relay Prevention
  • Topic 8D: Enabling Whitelist and Blacklist Filters
  • What Are DNS Whitelist Filters?
  • The DNS Whitelist Filter Query Process
  • Enabling DNS Whitelist Filters
  • What Happens When a Host is Found in the DNS Whitelist?
  • DNS Whitelist Filter Statistics
  • Enabling DNS Blacklist Filters
  • What Happens When a Host is Found in the DNS Blacklist?
  • What are Private Whitelist Filters?
  • Enabling Private Whitelist Filters
  • What Happens When a Host is Found in the Private Whitelist?
  • What are Private Blacklist Filters?
  • Enabling Private Blacklist Filters
  • What Happens When a Host is Found in the Private Blacklist?
  • Order of Whitelist and Blacklist Precedence
  • How to Enable Whitelist and Blacklist Filters
  • Topic 8E: Configuring Extended SMTP (E/SMTP) Options
  • E/SMTP Settings
  • Topic 8F: Configuring Internet Addressing
  • When to Set Internet Addresses
  • Internet Address Lookup Options
  • Topic 8G: Testing SMTP
  • An Implementation of SMTP Routing

Lesson 9: Establishing Mail Controls

  • Topic 9A: Configuring Router Restrictions
  • Mail Restrictions and Controls
  • Topic 9B: Implementing Message Disclaimers
  • Message Disclaimers
  • The Message Disclaimer Implementation Process
  • Options for Attaching Disclaimers
  • Enabling Server Message Disclaimers
  • Creating Message Disclaimer Policy Settings
  • Using Message Disclaimers in S/MIME Messages
  • Topic 9C: Implementing Mail Delivery Controls
  • Delivery Controls
  • Topic 9D: Implementing Mail Transfer Controls
  • Mail Transfer Controls
  • Topic 9E: Configuring Multiple Server Mailboxes
  • Benefits of Multiple Mailboxes

Lesson 10: Implementing Mail Rules and Storage Limits

  • Topic 10A: Creating and Activating a Server Mail Rule
  • Mail Rules
  • How Mail Rules Work
  • Mail Rule Actions
  • Activating a Server Mail Rule
  • Topic 10B: Enabling Mail Journaling
  • Mail Journaling
  • Journaling and Mail Rules Interactions
  • Journaling and Mail Routing
  • Journaling and Server Configuration
  • Topic 10C: Implementing Blacklist Tag and Whitelist Tag Mail Rule Conditions
  • Tag Mail Rule Conditions
  • Field Names Associated with Tags
  • Options for Creating Rules with Blacklist or Whitelist Tags
  • Topic 10D: Establishing Mail Quotas
  • Quotas
  • Quota Implementation Options
  • Quota Restrictions
  • Topic 10E: Controlling Inbox Size with Inbox Maintenance
  • Inbox Maintenance
  • Using the Inbox Maintenance Feature to Control Inbox Size
  • Topic 10F: Archiving Mail
  • Archiving
  • Benefits of Archiving and Policies
  • Archive Policy Documents
  • Archive Policy Settings Document
  • Archive Criteria Settings Document

Lesson 11: Monitoring Mail

  • Topic 11A: Verifying Routing and Checking Mail Delivery
  • Checklist for Verifying Mail Routing
  • Checklist for Monitoring Mail
  • Types of Misdelivered Mail
  • Checking Mail Delivery
  • Topic 11B: Enabling Mail Statistics
  • Mail Statistics
  • Topic 11C: Enabling Message Tracking
  • Message Tracking
  • Topic 11D: Configuring Message Recall
  • What is Message Recall?
  • Message Recall Options
  • Configuring the Message Recall Feature

Lesson 12: Resolving Common Mail Routing Problems

  • Topic 12A: Sending a Mail Trace
  • Common Causes for Mail Routing and Delivery Problems
  • Troubleshooting Stages
  • The Mail Trace Tool
  • Topic 12B: Restarting the Router
  • When to Restart the Router
  • Topic 12C: Forcing Mail Routing
  • When to Force Mail Routing
  • Topic 12D: Resolving Undelivered and Dead Mail
  • The Delivery Failure Process

2 Days

Duration
Delivery Method

Delivery method

Classroom

Face-to-face learning in the comfort of our quality nationwide centres, with free refreshments and Wi-Fi.

Find dates and prices

Online booking is currently not available for this course, to find out more please call us on 0345 074 7998 or email us at info@qa.com to discuss how we can help.

Trusted, awarded and accredited

Fully accredited to ensure we provide the highest possible standards in learning

All third party trademark rights acknowledged.