Deployment Guide
Deployment Guide
5
Deployment Guide
© 2018 Quest Software Inc.
ALL RIGHTS RESERVED.
This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a
software license or nondisclosure agreement. This software may be used or copied only in accordance with the terms of the
applicable agreement. No part of this guide may be reproduced or transmitted in any form or by any means, electronic or
mechanical, including photocopying and recording for any purpose other than the purchaser’s personal use without the written
permission of Quest Software Inc.
The information in this document is provided in connection with Quest Software products. No license, express or implied, by
estoppel or otherwise, to any intellectual property right is granted by this document or in connection with the sale of Quest
Software products. EXCEPT AS SET FORTH IN THE TERMS AND CONDITIONS AS SPECIFIED IN THE LICENSE
AGREEMENT FOR THIS PRODUCT, QUEST SOFTWARE ASSUMES NO LIABILITY WHATSOEVER AND DISCLAIMS ANY
EXPRESS, IMPLIED OR STATUTORY WARRANTY RELATING TO ITS PRODUCTS INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT. IN NO
EVENT SHALL QUEST SOFTWARE BE LIABLE FOR ANY DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL OR
INCIDENTAL DAMAGES (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS
INTERRUPTION OR LOSS OF INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN
IF QUEST SOFTWARE HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Quest Software makes no
representations or warranties with respect to the accuracy or completeness of the contents of this document and reserves the
right to make changes to specifications and product descriptions at any time without notice. Quest Software does not make any
commitment to update the information contained in this document.
If you have any questions regarding your potential use of this material, contact:
Quest Software Inc.
Attn: LEGAL Dept.
4 Polaris Way
Aliso Viejo, CA 92656
Refer to our website (www.quest.com) for regional and international office information.
Patents
Quest Software is proud of our advanced technology. Patents and pending patents may apply to this product. For the most current
information about applicable patents for this product, please visit our website at www.quest.com/legal.
Trademarks
Quest and the Quest logo are trademarks and registered trademarks of Quest Software Inc. in the U.S.A. and other countries. For
a complete list of Quest Software trademarks, please visit our website at www.quest.com/legal. Microsoft, Active Directory,
ActiveSync, Excel, Lync, and Skype are either registered trademarks or trademarks of Microsoft Corporation in the United States
and/or other countries. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S.
and other countries. All other trademarks, servicemarks, registered trademarks, and registered servicemarks are the property of
their respective owners.
Legend
CAUTION: A CAUTION icon indicates potential damage to hardware or loss of data if instructions are not followed.
IMPORTANT NOTE, NOTE, TIP, MOBILE, or VIDEO: An information icon indicates supporting information.
Installing UC Analytics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Types of installations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Upgrading from 8.1 or later . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Considerations before you install . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
About a pilot installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
About a production installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Rules when performing a distributed installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Accounts used during installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Performing a pilot installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Performing a production installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Installing additional Storage Engine services after installation . . . . . . . . . . . . . . . . . . . . 26
Installing additional collector roles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Activating the UC Analytics license . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Setting up the web site for HTTPS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Configuring UC Analytics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
About administration settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
How do I set a user to be a product administrator? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
About multi-tenant environments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Configuration process overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Modifying the initial target environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Appendix A:
Configuring Impersonation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
Setting impersonation for Exchange 2013 or Exchange 2016 . . . . . . . . . . . . . . . . . . . . . . 115
Setting impersonation for Office 365 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
Appendix C:
Configuring IIS Log Files to capture ActiveSync or OWA events . . . . . . . . . . . . . . . . . 121
Configuring IIS Logging on the Exchange CAS and Mailbox servers . . . . . . . . . . . . . . . . . 121
Configuring IIS if Exchange is hosted on Windows 2003 Server . . . . . . . . . . . . . . . . . 121
Configuring IIS Logging if Exchange is hosted on Windows Server 2008 or later . . . . 123
What ActiveSync events are collected and displayed in the insights? . . . . . . . . . . . . . . . . 124
Appendix D:
PowerShell cmdlets used by data sources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126
Exchange configuration data source . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126
Exchange public folder data source . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127
Skype for Business/Lync configuration data source . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127
Exchange Online hybrid and native user configuration data sources . . . . . . . . . . . . . . . . . 127
Exchange Online hybrid and native mailbox configuration data sources . . . . . . . . . . . . . . 128
Exchange Online mailbox contents data source . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128
Office 365 user subscription configuration data source . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128
Appendix E:
Custom configurations and backup and recovery options . . . . . . . . . . . . . . . . . . . . . . 129
Setting up a multi-forest environment with a one-way trust . . . . . . . . . . . . . . . . . . . . . . . . . 129
Firewall configuration: ports for data collection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
Ports used for service-to-service communication in a distributed installation . . . . . . . . 130
Backing up and restoring your data using scripts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
Supported scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
About the backup and restore batch files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
Step 1: Edit the backup.bat file parameters for your installation . . . . . . . . . . . . . . . . . . 132
Step 2: Run the backup batch file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133
Step 3: Edit the restore batch file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133
Step 4a: Restore the storage data in an existing installation . . . . . . . . . . . . . . . . . . . . 134
Step 4b: Restore the storage data to a new installation . . . . . . . . . . . . . . . . . . . . . . . . 135
Scheduling the backup batch file to run automatically . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
Performing a manual backup of the storage folder before upgrade . . . . . . . . . . . . . . . . . . 136
Moving your storage location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136
Recommendations for disaster recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
Appendix F:
Questions and answers about data source configuration . . . . . . . . . . . . . . . . . . . . . . 142
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142
How often do the data collections actually gather data and when do they run? . . . . . . 142
Why did an insight show no data for a 30-day range though I initially set the data
source to collect 30 days back? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
If I collect both Exchange Tracking Logs and
Exchange Mailbox Contents, are there duplicate items? . . . . . . . . . . . . . . . . . . . . . . . 144
If I collect message data only from the Exchange tracking logs, is the message
Send Date and delivery time available? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
What are the differences between the Exchange
Mailbox Contents and Exchange Tracking Logs data sources? . . . . . . . . . . . . . . . . . . 145
Why do I get an error when collecting Exchange
configuration from multiple Exchange versions? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147
Why do I have to specify domain name when doing a multi-forest collection? . . . . . . . 147
About us . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148
We are more than just a name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148
Our brand, our vision. Together. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148
Contacting Quest . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148
Technical support resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148
Overview
Quest Unified Communications Analytics provides dynamic and up-to-date analytics about your Exchange on-
premise messaging environments, about your Skype for Business and Lync on-premise environments, about your
Cisco environments, and about Office 365 Exchange Online hybrid or native environments. UC Analytics unlocks
the business intelligence in your corporate messaging system to enable better business decisions.
Predefined insights provide a simple way to view Exchange messaging volumes and details between individuals,
groups, and external entities, and to see peer-to-peer session and conference information for Skype for
Business/Lync or Cisco. You can also view the quality of experience (QoE) information about all Skype for
Business or Lync enterprise voice calls, conferences, and peer-to-peer sessions.
You can select predefined insights from the insight library and add them to your personal dashboard.
Once UC Analytics is installed, access the UC Analytics home page, at the following location:
http://<ServerName>/Analytics/
Supported environments
You can use UC Analytics to collect data from the following environments:
• Microsoft Exchange 2010 (SP1 and later)
• Microsoft Exchange 2013
• Microsoft Exchange 2016
• Exchange Online (Office 365 hybrid with on-premise Exchange)
• Exchange Online (Office 365 native)
Supported browsers
Once you have installed UC Analytics, you can access the web site from anywhere using one of the following
browsers:
• Microsoft Edge
• Internet Explorer 10 or later
• Mozilla Firefox
• Google Chrome
• Apple Safari
Since UC Analytics uses Windows Integrated Authentication to connect to the web site, if you are on a different
domain than the web site or are using an iPad, you will be prompted for your user name and password when you
connect to the web site.
Architecture
The following are the main services that comprise UC Analytics:
• Web site (IIS)
• UC Analytics Data Engine
• UC Analytics Query Engine
• UC Analytics Storage Engine
You can install all the services on a single computer or distribute the services across two or more computers. For a
distributed installation, the Data Engine and the Query Engine services can be divided into two different roles:
• collector role
• insights role
UC Analytics
web site
Office 365
Cisco CUCM
Servers
Deployment options
There are two main options for installing UC Analytics:
• Pilot deployment—all services on a single computer, simple configuration.
• Production deployment—services can be distributed across several computers:
▪ Web site & Data Engine (Insights)
▪ Data Engine (Collector)
You can install more than one instance of the Data Engine (Collector).
▪ Query Engine (Collector)
You can install more than one instance of the Query Engine (Collector).
Type Minimum
Processor Minimum: Quad-core 64-bit computer.
RAM Minimum: 24 GB.
Disk • 5 GB for the application
• X GB where X is the required disk space for collected data
For estimates regarding the required disk space for the collected data for different numbers
of users for all the platforms, see the UC Analytics Deployment Sizing.xlsx spreadsheet
which can be found under Documentation in the autorun.exe.
IMPORTANT: These estimates provided here are guidelines only. You might require more resources,
depending on your environment and how you configure UC Analytics. Foremost, if you collect email
message body, the required RAM and disk space will be greater than the estimates. If you configure many
data sources, the required resources can increase.
For distributed installations, you can use the UC Analytics Deployment Sizing.xlsx spreadsheet to see different
options that can meet your environment’s needs. The spreadsheet can be found under Documentation in the
autorun.exe.
Minimum
5,000 users 20,000 users 50,000 users 100,000 users
Requirements for
Minimum RAM 24 GB 36 GB 84 GB 144 GB
Disk Space 721 GB 2.9 TB 7.2 TB 14.4 TB
Processors Quad core Quad core Eight core Eight or 16 Core
Data retention 1 year 1 year 1 year 1 year
Table 3. Shows the minimum requirements for a small single server installation.
Table 4. Shows the minimum requirements for a medium single server installation.
Table 5. Shows the minimum requirements for a larger single server installation.
If you install the Storage Engine on a server with two disks, you should specify a directory on the non-operating
system drive as the Storage Directory for the Storage Engine during installation.
Software prerequisites
This section lists the prerequisites for the individual UC Analytics components (services and service roles). If you
want to install more than one component on a single server, you must ensure all the prerequisites for the
components are met.
The server on which UC Analytics is installed must meet following minimum requirements:
Table 8. World Wide Web Services (IIS) services that must be enabled.
For information about setting security for your UC Analytics web site, see Setting up the web site for HTTPS on
page 27.
Click the gear icon on the home page side bar to access Admin Settings.
For more information, see Configuration process overview on page 29.
Types of installations
When you install UC Analytics, you can perform one of two types of installation:
• a pilot installation (single computer)
• a production installation (single computer or distributed)
For performance reasons, it is recommended that you do not install UC Analytics on the same computer as
MessageStats.
For information about the number of mailboxes from which you can collect data see Hardware minimum
requirements on page 13.
If you have a native Office 365 environment with no on-premise users, you can install UC Analytics in a workgroup.
NOTE: If you previously customized a data collection by modifying a .config file (usually with the help of
Quest Support), after you upgrade to a new version, check the same .config file and reapply all the changes.
IMPORTANT: Due to the volume of communication between the Data Engine and Query Engine, it is
recommended that these services be installed on the same server.
When you install more than one Data Engine (Collector), one of the collectors must be set as the Primary Data
Collector. By default the Primary Data Collector is the first collector that is installed. You can manually set a
collector to be the Primary Data Collector on the Add Server page when using the Advanced Deployment option.
The Primary Data Collector is used to run the data sources that run automatically in the background in addition to
the data sources that you have configured. For more information, see Data sources that run in background as
needed on page 40.
IMPORTANT: It is not recommended that you use the built-in domain Administrator account for installing or
for accessing UC Analytics. If you have a child domain in your environment, or if you have two root level
domains, you will be unable to install the product or access the web site.
Query Port Number If the port is already used by another application, change the port
number. This port is used by the web site to access the Data Engine
service for query purposes.
Configuration Port Number If the port is already used by another application, change the port
number. This port is used by the web site to access the Data Engine
for configuration purposes.
Primary Data Collector When installing the Data Engine (Collector), you can specify that the
collector be used as the primary collector that is used to run any
background jobs such as Database Consistency. For information
about these jobs, see Data sources that run in background as needed
on page 40.
By default, the first installed Data Engine (Collector) is set to be the
Primary Data Collector.
Physical Memory (MB) Ensure the check box is selected to calculate whether sufficient
Calculate automatically memory is available. If you clear the check box, the value you enter in
text box is assigned.
NOTE: Physical memory is automatically assigned during installation.
After you successfully install, if you display the properties dialog, the
currently installed physical memory is displayed in the text box.
Query Port Number If the port is already used by another application, change the port
number. This port is used by the Data Engine service to access the
Query Engine service.
Physical Memory (MB) Ensure the check box is selected to calculate whether sufficient
Calculate automatically memory is available. If you clear the check box, the value you enter in
text box is assigned.
NOTE: Physical memory is automatically assigned during installation.
After you successfully install, if you display the properties dialog, the
currently installed physical memory is displayed in the text box.
Query Port Number If the port is already used by another application, change the port
number. This port is used by the Query Engine service to access the
Storage Engine service.
8 In the Storage Directory Path field, specify the directory path in which all the collected data is stored and
click Next.
The UC Analytics installer verifies the hardware prerequisite for required disk space against actual disk
space and physical memory (RAM) on the selected servers for the roles you have specified and provides
recommendations for your hardware configuration.
9 Enter the credentials that will be used to run the Data Engine service and click Next.
The account must be a domain account (not a local computer account) and must have local Admin rights to
the computer on which the Data Engine service is being installed.
10 Verify that the software prerequisites are met.
14 To begin product configuration, click the gear icon on the home page side bar. For more information,
see Configuring UC Analytics on page 28.
TIP: When you view an existing deployment in the Configure Deployment page, you can identify the
Data Engine (Collector) that is used as the Primary Data Collector since it is identified up arrow icon
instead of a check mark.
To activate a license
1 Copy the license file (xxx-xxxx.dlv) to a computer on which the UC Analytics Data Engine service is
installed.
2 Start Quest UC Analytics | Quest UC Analytics from the Start menu or run the DeploymentManager.exe file
from the product installation directory.
3 Click the Manage Licenses button.
4 Click Add License and browse to the location where license file (xxx-xxxx.dlv) is copied and install it.
Click the gear icon on the home page side bar to access Admin Settings.
Before you begin to use UC Analytics to gather and analyze information, you must specify settings that determine
what data is collected (data sources) and when it is collected. Depending on the data sources that you configure,
UC Analytics can collect different types of data.
You configure classifications to identify the domains that are internal to your organization, to configure call
classifications for Skype for Business/Lync and Cisco, and to set thresholds for quality metrics for the different
platforms.
In the Admin Settings, you also configure security to control which users can see data in which insights. For
example, you can specify security settings which determine whether specific users can see detailed or aggregate
data for the Exchange messages and Skype for Business/Lync data.
1 Click the gear icon on the home page side bar to access Admin Settings.
2 Review the target environment used to create the initial connection. (Target Environments)
3 Add any additional target environments such as another Active Directory forest or a native Office 365
deployment. (Target Environments)
4 Add and configure the data sources used to create the data collections that gather data. (Data Collection).
For information about configuring each type of data source, see the following sections:
▪ Adding data sources for Active Directory or Azure Active Directory on page 52
▪ Adding data sources, chargeback costs, and thresholds for Exchange and Exchange Online on
page 57
▪ Adding data sources, chargeback costs, and thresholds for Skype for Business/Lync on page 89
▪ Adding data sources, chargeback, and thresholds for Cisco on page 100
5 Set a data aging time period for the data you collect (Data Collection).
6 Set the initial data collection start date (Data Collection).
7 Identify the domains that are internal to your environment (Classifications | Domain Classifications).
This information is used in insights to identify internal and external message traffic and Skype for
Business/Lync activities.
8 Specify classifications that map to specific domains (Classifications | Domain Classifications).
To add an target environment for an additional Active Directory forest or Office 365 hybrid
environment
NOTE: If a master mailbox (Exchange) or primary user (Skype for Business) is associated with more
than one stand-in (linked mailbox or disabled account) in more than one resource forest, single-
valued properties can be populated from any one of the stand-ins.
By default, UC Analytics only shows the status from the last job run for each data source (Most recent / running). If
a collection job shows errors or warnings, you can view the details in the Details pane at the bottom. Use the
Show errors only check box and the Show warnings only check box to select whether you want to only errors,
only warnings, or both errors and warnings.
Using the filter options, you can filter for a specific data source or job status to determine if a data collection has
been running correctly. You can also narrow the returned results by specifying a custom date range.
• To filter by job status, click in status field and select a status of running, succeeded, failed, or warning.
• To fitter by the data collection, click in the job type field and select the data source for which you want to
see all data collection job status information.
1 Click the beside Most recent only in the date range field
2 Select the time period that you want:
Today
Yesterday
Last 7 days
Last 14 days
Custom
3 If you select Custom, specify the start date and the end date for the time period:
a Enter or select the start date in the left field.
b Enter or select the end date in the right field.
The job status page displays only the job status records that fall within the specified date range.
Run now
1 On the Data Collection page, hover over the right corner of the data source tile and click .
2 Select Rename.
3 Enter a descriptive name for the data source and click Save.
NOTE: Domains which are not added to the internal domains list are treated as external, regardless of their
classification.
TIP: When granting access to specific users, you can enter an individual user or a distribution group.
If you selected Office 365 as the target environment, it is not recommended that you enter a dynamic
distribution group or a distribution group with a large number of members due to performance issues.
4 Specify if the users have aggregate access or unrestricted access to each type of data.
For information about the differences between aggregate or unrestricted access to data, see Differences
between aggregate and unrestricted access on page 49.
5 If you want to grant access to all users, select the Grant access to all users in all target environments
check box.
- OR -
Enter a specific user (email address or SAM account name) or enter a distribution group for all the users to
be granted access.
IMPORTANT: For deployments with multiple target environments, if you are specifying a specific
user or distribution group, ensure that the displayed target environment is the environment for which
the user or group has rights. If necessary, select the correct environment from the dropdown list.
6 Click Add.
7 Click Save.
Unlike a product administrator who has access to the configuration settings for all environments (tenants), a tenant
administrator can only configure settings for a specific environment.
TIP: If you do not have access to a certain insight (appears dimmed in the insight library) and you want to
know what type of access is required to see the insight, click the Launch Default button for the insight. A
message is displayed that indicates what type of data access is required to view data in the insight.
Cross-Platform Data
For cross-platform data, you can grant the following access to the aggregated and unrestricted data:
Table 15. Types of access that can be granted for Cross-Platform Data.
Table 16. Types of access that can be granted for Exchange Mail Client Connectivity (ActiveSync
and OWA) Data.
What insights are affected by the Exchange Mail Client Connectivity security
settings?
The Exchange Mail Client Connectivity security setting is used to grant access to all OWA insights and to
ActiveSync insights that show ActiveSync event activity. These insights are as follows:
• ActiveSync - Event Details
Table 17. Types of access that can be granted for Exchange Message Data.
Table 18. Access that can be granted for Exchange DLP Data.
Table 20. Types of access that can be granted for Skype for Business/Lync Data.
Table 21. Access that can be granted for Skype for Business/Lync Quality of Experience (QoE) data.
NOTE: If UC Analytics is configured for a native Office 365 environment, you will be prompted for your
credentials. You can specify either your Windows credentials or your Office 365 credentials, depending on
how UC Analytics was configured to for user authentication. For more information, see Adding a target
environment for native Office 365.
To view the list of all available insights, click the library icon . home page side bar.
3 Beside the Date Format or Time Format field, click and select the format you want.
4 Enter the values you want for the Decimal Separator and the Thousand Separator fields.
5 Click Save.
IMPORTANT: If you collect effective membership for many groups, it can have significant
impact on performance and storage requirements.
10 Click Save.
For information about creating Domain Controller data sources for a resource forest configuration, see Configuring
UC Analytics for resource forests on page 32.
For more information about credential prerequisites, see Permissions needed for the Office 365 user subscription
configuration data source on page 53.
NOTE: If you require information about database copies, ensure that the LDAP connection credential has
read permissions to ms-Exch-MDB-Copy objects in Active Directory:
• To grant permissions directly, modify permissions in Active Directory.
• To grant permissions indirectly, add the credential to either the Exchange Organization Management
or the Exchange Public Folder Management role group.
NOTE: If the Data Engine is in a different forest from the data to be collected, specify the
domain controller you want to use for data collection. If you leave the default setting to
automatically discover domain controller, the data collector selects a domain controller from
the forest that hosts the Data Engine, not a domain controller from the forest from which you
are collecting the data.
▪ To use HTTPS instead of HTTP to connect to the Exchange 2010/2013/2016 CAS server, click
Show Advanced Settings in the PowerShell Connection Parameters section. This option requires
that TLS/SSL is enabled for remote PowerShell on the Exchange CAS server.
The Advanced Settings also provide options if you have a customized PowerShell virtual folder, or if
you want specify either an implicit credential or the Data Engine credential be used to make the
PowerShell connection.
11 Click Save.
For more information about credential prerequisites, see Permissions needed for the Exchange configuration data
source on page 59.
For information about creating Exchange Configuration data sources for a resource forest configuration, see
Configuring UC Analytics for resource forests on page 32.
TIP: To create dynamic distribution group for mailboxes from a single location, you could use a filter based
on a mailbox custom attribute.
1 Run a PowerShell script to get all the mailbox databases.
2 Get the CAS server for each mailbox database.
3 Set the corresponding CAS server name to be one of the Custom Attributes for each mailbox.
4 After the attribute is set, use that Custom Attribute as a filter when you create dynamic distribution
groups.
TIP: When specifying individual mailboxes as targets, it is recommended that you add the user mailboxes to
a distribution group. You can then add the distribution group for the target mailboxes.
If you have an Exchange hybrid environment, you can configure an Exchange Online Mailbox Contents data
source to collect Office 365 mailboxes. For more information, see Permissions needed for Exchange mailbox
contents or Exchange mailbox content summary data sources on page 60.
In addition to message traffic, you can configure the mailbox contents collection to gather the following message
information from the target mailboxes:
• Subject
When you specify the CAS for the EWS gathering, you must enter the URL for the server. For
example, the URL might be:
https://MyCASServer/ews/Exchange.asmx
You can specify multiple CAS URLs to be used for the EWS gathering. If you specify multiple CAS
URLs, data collection is faster. If you do not specify one or more CAS URLs, the Exchange
Autodiscover service is used to find the CAS servers for the target mailboxes.
Advanced settings (not required for most deployments)
▪ If you want to change the minimum interval between the data collection runs or change the Data
Engine (Collector) server to be used for the data source, click Show Advanced Settings in the
Scheduling section.
▪ If you want to specify one or more explicit domain controllers instead of automatically discovering
the domain controller, click Show Advanced Settings in the LDAP Collection Parameters section.
For more information, see Specifying explicit domain controllers for LDAP connections on page 38.
The domain controller must be a global catalog server.
If the Data Engine is in a different forest from the data to be collected, you must specify the domain
controller you want to use for data collection. If you leave the default setting to automatically
discover domain controller, the data collector selects a domain controller from the forest that hosts
the Data Engine, not a domain controller from the forest from which you are collecting the data.
12 Click Save.
Table 22. Comparison of Exchange tracking log and mailbox contents collections
Exchange tracking log data collection Exchange mailbox contents data collection
The Exchange tracking log collection gathers The mailbox contents collection gathers message
message information for all mailboxes. information for only the specified target mailboxes.
The Exchange tracking log collection gathers both The mailbox contents collection (EWS) gathers only
message data and DLP rule matches. message data but includes specific data not found in
tracking logs such as
• file attachments
• “in reply to”
• time-of-day data.
The mailbox contents data collection can also include
message body text if configured.
NOTE: If a message is collected through EWS and the
message was sent from a mailbox user to a distribution
group to which the user belongs, the user is counted only
as a sender, not a recipient. If the tracking log collection
was also run, that user is also counted as a recipient.
The Exchange tracking log collection is much faster The mailbox contents collection is much slower than the
than the mailbox contents collection. Exchange tracking log collection.
You run the Exchange tracking log collection against The mailbox contents collection accesses the Exchange
both Exchange mailbox servers and hub transport CAS (Client Access Servers) to gather data.
servers.
For more detailed information, see What are the differences between the Exchange Mailbox Contents and
Exchange Tracking Logs data sources? on page 145.
NOTE: If the Data Engine is in a different forest from the data to be collected, you must
specify the domain controller you want to use for data collection.
If you leave the default setting to automatically discover domain controller, the data collector
selects a domain controller from the forest that hosts the Data Engine, not a domain controller
from the forest from which you are collecting the data.
11 Click Save.
TIP: When specifying individual mailboxes as targets, it is recommended that you add the user mailboxes to
a distribution group. You can then add the distribution group for the target mailboxes.
The data source collection does not include system mailboxes. For a list of the types of mailboxes that are
excluded, see What types of mailboxes are excluded? on page 67.
If you have an Exchange hybrid environment, you can configure an Exchange Online Mailbox Content Summary
data source to collect Office 365 mailboxes. For more information, see Creating a data source for Exchange
Online mailbox content summary data source on page 84.
When you specify the CAS for the gathering, you must enter the URL for the server. For example,
the URL might be:
https://MyCASServer/ews/Exchange.asmx
You can specify multiple CAS URLs to be used for the EWS gathering. If you specify multiple CAS
URLs, data collection is faster. If you do not specify one or more CAS URLs, the Exchange
Autodiscover service is used to find the CAS servers for the target mailboxes.
Advanced settings (not required for most deployments)
▪ If you want to change the minimum interval between the data collection runs or change the Data
Engine (Collector) server to be used for the data source, click Show Advanced Settings in the
Scheduling section.
▪ If you want to specify one or more explicit domain controllers instead of automatically discovering
the domain controller, click Show Advanced Settings in the LDAP Collection Parameters section.
For more information, see Specifying explicit domain controllers for LDAP connections on page 38.
NOTE: The Exchange Online Mailbox Contents and the Exchange Online Mailbox Content Summary
data sources can be added to an Active Directory Forest / Office 365 (hybrid) target environment to
collect from hybrid Exchange Online or added to a native Office 365 target environment to collect
from native Exchange Online.
Table 23. Hybrid synchronization methods for on-premise Active Directory and Azure Active Directory.
Answer
Only one target, an Active Directory Forest / Office 365 (hybrid) target, is needed for hybrid environments.
The hybrid Exchange Online data sources collect all hybrid objects, both the objects created on-premise and
migrated to Office 365 and the objects created in Office 365 (Office 365 native objects). For example, when
collecting groups, the Exchange Online Hybrid User Configuration data source collects both
• hybrid groups (created on-premise and migrated to Office 365)
• Office 365 native groups (created in Office 365).
If you were to add an Office 365 (native) target and run the Exchange Online native data source collections, the
hybrid objects would be duplicated.
9 Select the tool that is used to synchronize your Azure Active Directory with on-premise Active Directory.
▪ Azure AD Connect with Exchange 2016
▪ Azure AD Connect
▪ Azure AD Sync
▪ DirSync
NOTE: If you use Azure AD Connect and have Exchange 2016 (mixed or native environment), select
Azure AD Connect with Exchange 2016 for optimal performance.
For information about synchronization methods, see About AD synchronization methods for hybrid
Exchange Online on page 77.
Advanced settings (not required for most deployments)
▪ If you want to change the minimum interval between the data collection runs or change the Data
Engine (Collector) server to be used for the data source, click Show Advanced Settings in the
Scheduling section.
▪ If you want to specify one or more explicit domain controllers instead of automatically discovering
the domain controller, click Show Advanced Settings in the LDAP Collection Parameters section.
For more information, see Specifying explicit domain controllers for LDAP connections on page 38.
The domain controller must be a global catalog server.
NOTE: If the Data Engine is in a different forest from the data to be collected, specify the
domain controller you want to use for data collection. If you leave the default setting to
automatically discover domain controller, the data collector selects a domain controller from
the forest that hosts the Data Engine, not a domain controller from the forest from which you
are collecting the data.
▪ By default, the data source collects direct members of groups. If you want to collect effective
members (direct and indirect) for groups, click Show Advanced Settings in the Collect Effective
(Direct and Indirect) Members for Groups section. You can select to collect effective members for
specified groups or for all groups.
If you select Effective members for specific groups and click Add group, you have the option to
add each group individually or you can enter a list of groups, each entry separated by a semi-colon
(;).
IMPORTANT: If you collect effective membership for many groups, it can have significant
impact on performance and storage requirements.
10 Click Save.
10 Select the tool that is used to synchronize your Azure Active Directory with on-premise Active Directory.
▪ Azure AD Connect with Exchange 2016
▪ Azure AD Connect
▪ Azure AD Sync
▪ DirSync
NOTE: If you use Azure AD Connect and have Exchange 2016 (mixed or native environment), select
Azure AD Connect with Exchange 2016 for optimal performance.
For information about synchronization methods, see About AD synchronization methods for hybrid
Exchange Online on page 77.
Advanced settings (not required for most deployments)
▪ If you want to change the minimum interval between the data collection runs or change the Data
Engine (Collector) server to be used for the data source, click Show Advanced Settings in the
Scheduling section.
NOTE: If the Data Engine is in a different forest from the data to be collected, you must
specify the domain controller you want to use for data collection. If you leave the default
setting to automatically discover domain controller, the data collector selects a domain
controller from the forest that hosts the Data Engine, not a domain controller from the forest
from which you are collecting the data.
11 Click Save.
NOTE: Both the Exchange Online Mailbox Contents and the Exchange Online Mailbox Content
Summary data sources can be added to an Active Directory Forest / Office 365 (hybrid) target
environment to collect from hybrid Exchange Online or to a native Office 365 target environment to
collect from native Exchange Online.
IMPORTANT: If you collect effective membership for many groups, it can have significant
impact on performance and storage requirements.
9 Click Save.
11 Click Save.
3 Beside the displayed field, click the down arrow and select the field that you want from the list.
4 Specify the operator for the threshold:
▪ greater than or equal to
▪ greater than
▪ less than or equal to
▪ less than
5 Set the value for the threshold and the units of measure.
6 Select the color (red, yellow, or green) that should display when the threshold is met.
7 To add another threshold for the metric, click Add threshold and specify the value, units of measure, and
color.
NOTE: If you want to enter specific target users (rather than select all users or an organizational unit), you
can enter a user, a group, or a dynamic distribution group. However, you cannot use the Domain Users
group. For more information see Can I enter the Domain Users group as the target for the data collection? on
page 67.
For more information about dynamic distribution groups, see Using dynamic distribution groups to select
target mailboxes on page 66.
9 For the PowerShell connection, specify the Skype for Business/Lync front-end server from which you are
collecting data.
▪ Click Add server and enter the Skype for Business/Lync front-end server name (and port number if
applicable).
10 Specify the credentials to be used to connect through PowerShell.
The credential that is specified must have the appropriate permissions. For more information, see
Permissions needed for Skype for Business/Lync configuration data source on page 89.
Advanced settings (not required for most deployments)
▪ If you want to change the minimum interval between the data collection runs or change the Data
Engine (Collector) server to be used for the data source, click Show Advanced Settings in the
Scheduling section.
▪ If you want to specify one or more explicit domain controllers instead of automatically discovering
the domain controller, click Show Advanced Settings in the LDAP Collection Parameters section.
For more information, see Specifying explicit domain controllers for LDAP connections on page 38.
The domain controller must be a global catalog server.
▪ To use HTTPS instead of HTTP to connect to the Skype for Business/Lync front-end server, click
Show Advanced Settings in the PowerShell Connection Parameters section. This option requires
that TLS/SSL be enabled for remote PowerShell on the Skype for Business/Lync front-end server.
The PowerShell Advanced Settings also provide options if you have a customized PowerShell
virtual folder, or if you want specify either an implicit credential or the Data Engine credential be
used to make the PowerShell connection.
11 Click Save.
NOTE: You do not need to specify an instance when you enter an explicit port number. For example,
you would specify UCAServer1,2014 to connect to the instance on port 2014.
8 Specify how chargeback costs are calculated if enterprise voice calls go through both a PSTN gateway and
a Skype for Business/Lync mediation server by selecting either:
▪ PSTN gateway
▪ Skype for Business/Lync Mediation Server
NOTE: You do not need to specify an instance when you enter an explicit port number. For example,
you would specify UCAServer1,2014 to connect to the instance on port 2014.
8 Enter a credential to be used to access the QoE SQL database. You can select one of the following:
▪ Use the Data Engine service credential
▪ Specify a Windows credential
▪ Specify a SQL credential
Advanced settings (not required for most deployments)
▪ If you want to change the minimum interval between the data collection runs or change the Data
Engine (Collector) server to be used for the data source, click Show Advanced Settings in the
Scheduling section.
9 Click Save.
You also enter phone number (usually a destination mask) and number of digits for different call classifications. For
example, you can specify a phone number (or destination mask) for internal, local, toll-free and other types of
calls. You can use one wild card (“*”) in the destination mask to match the pattern for the normalized destination
phone numbers in Skype for Business/Lync.
To set classifications for Skype for Business/Lync incoming and outgoing calls
1 Click Classifications and click Call Classifications.
2 Click Add Classification for type of call that you want to define.
3 Enter a description for the call type.
4 Enter the mediation or gateway server name for the server used.
5 Enter the phone number associated with the call type. Since you can enter * wild cards, you usually would
enter a destination mask for a phone number. For example, you might specify 1800* for toll free calls.
6 Enter the number of digits for the call type. This field is optional. If the call type can be uniquely identified
through the phone number mask, you could leave this field empty.
To set thresholds for the default Skype for Business/Lync QoE metrics
1 Click Classifications and click Thresholds.
2 Click the metric for which you want to set a threshold.
By default, you can set or modify threshold levels for several key QoE stream quality metrics. For more
information, see About the default Skype for Business/Lync quality metrics on page 96.
3 Specify the operator for the threshold:
▪ greater than or equal to
▪ greater than
Table 25. Default Skype for Business/Lync quality metrics and recommended thresholds.
3 Beside the displayed field, click the down arrow and select the field that you want from the list.
4 Specify the operator for the threshold:
▪ greater than or equal to
▪ greater than
▪ less than or equal to
▪ less than
5 Set the value for the threshold and the units of measure.
6 Select the color (red, yellow, or green) that should display when the threshold is met.
7 To add another threshold for the metric, click Add threshold and specify the value, units of measure, and
color.
You can add threshold classifications for the quality metrics that are specific only to Lync 2010.
In addition to adding the specific Lync 2010 recommended metric thresholds, you can add threshold classifications
for a wide range of numeric values that are reported in the Skype for Business/Lync insights.
The following table lists the additional thresholds that you can add and set.
Table 27. Skype for Business/Lync threshold classifications that can be added.
NOTE: If the Data Engine is in a different forest from the data to be collected, you must
specify the domain controller you want to use for data collection. If you leave the default
setting to automatically discover domain controller, the data collector selects a domain
controller from the forest that hosts the Data Engine, not a domain controller from the forest
from which you are collecting the data.
9 Click Save.
3 Beside the displayed field, click the down arrow and select the field that you want from the list.
4 Specify the operator for the threshold:
▪ greater than or equal to
▪ greater than
▪ less than or equal to
▪ less than
5 Set the value for the threshold and the units of measure.
6 Select the color (red, yellow, or green) that should display when the threshold is met.
7 To add another threshold for the metric, click Add threshold and specify the value, units of measure, and
color.
Now when you access the UC Analytics web page, the Company home page icon displays on the left.
As a product administrator, you can populate the Company home page with insights from the library, load a set of
recommended insights, or import insights from a file.
For more information about adding insights to a home page and customizing insights, see the Unified
Communications Analytics User Guide.
Users can create different schedules for each subscription so that the subscription insights are exported and sent
on a regular basis.
Prerequisites
You must be a product administrator to access Admin Settings.
Optionally, you can require authentication be used to access the SMTP server for email subscriptions. If you
enabled authentication by checking the Authentication check box, the authentication credentials must have Sent
As permissions for the Active Directory user associated with the email address that is in the Sender Address field.
The Sender Email Address is used to send SMTP email subscriptions and the Sender Display Name appears in
the From field in the email.
1 Click the gear icon on the home page side bar to access Admin Settings.
2 Click the Subscriptions tile.
General Settings
3 Ensure that Enable subscriptions is selected.
a For subscriptions where exported insights are sent by email, ensure that Enable email as a target
output is selected.
b For subscriptions where exported insights are posted to a file share, ensure that Enable file share
as a target output is selected.
4 Select a value for Parallel subscriptions threshold to limit the number of subscriptions that can run
concurrently.
NOTE: Threshold value should not be more than two times the number of processor cores on the UC
Analytics server that runs the Insights role.
6 Specify an email address that will used as the email subscription sender address as in the Sender Email
Address field.
If you enable SMTP authentication (described in the Advanced settings section that follows), the
authentication credentials that you specify must have Sent As permissions for this sender address.
7 Optionally, you can specify a recipient for a test message in the Test Subscription Recipient field.
You can test that email subscriptions can be successfully sent by specifying a valid email address as the
Test Subscription Recipient. After you enter the email address, click the Send Test Subscription button to
send a test email to the specified address.
If you require authentication to access the SMTP server and want specify SMTP encryption, click Show
advanced settings.
Advanced settings (not required for most deployments)
8 If authentication is required, select Use authentication for SMTP server and click Set credential.
a Enter the credentials that are to be used to access the SMTP server.
a If TLS or SSL is required to connect to the SMTP server, select the down arrow beneath the SMTP
Encryption heading and select one of the following:
▪ Use SSL
▪ Use TLS
9 Enter the display name that should show as the From name on email subscriptions in the Sender Display
Name field.
NOTE: If you set Retry on subscription failure, UC Analytics will attempt to send the subscription
every 30 minutes until the specified number of retries has been attempted.
11 Select the type of error that would trigger a failed subscription run to retry:
▪ Unable to write to the file share - access is denied
▪ Not enough disk space available in file share location
▪ Recipient mailbox is unavailable
▪ Unable to connect to the SMTP server
▪ Sending email failed by timeout
▪ Subscription sending was terminated due to server fault
For example, you might want the subscription to retry delivery if there is a transient error that causes the
SMTP server to be unavailable. In this case, you could select the Unable to connect to SMTP server and
leave the other options clear.
12 Click Save.
Once you have configured the Admin Settings for subscriptions, users can create subscriptions for insights. For
information about how to create and schedule subscriptions, see the UC Analytics User Guide.
To manage subscriptions
1 On the UC Analytics web site home page, click the subscriptions icon on the left border.
The list of your own subscriptions is displayed.
5 If you want to delete or modify a single subscription, select the subscription that you want.
You can modify a subscription, view the launch history for a subscription, or delete the subscription:
a To modify the subscription, click on the subscription to open the subscription wizard which allows
you to change the following parameters:
▪ the schedule
▪ the insights included in the subscription
▪ the delivery format
▪ the recipients of the subscription
NOTE: For detailed information about creating subscriptions, see the Unified
Communications Analytics User Guide.
b To view the subscription launch history, click . For a description about the information that is
shown in the subscription launch history, see the Unified Communications Analytics User Guide.
NOTE: If you must reboot the computer on which the Storage Engine service is installed and you have a
larger database, there can be a period of 5 to 10 minutes before UC Analytics will be available.
Physical Memory (MB) Ensure the check box is selected to calculate whether sufficient
Calculate automatically memory is available. If you clear the check box, the value you enter in
text box is assigned.
NOTE: Physical memory is automatically assigned during installation.
After you successfully install, if you display the properties dialog, the
currently installed physical memory is displayed in the text box.
Query Port Number If the port is already used by another application, change the port
number. This port is used by the Query Engine service to access the
Storage Engine service.
7 In the Storage Directory Path field, specify the directory path in which all the collected data is to be stored.
When you install additional Storage Engines, it can take several minutes to start and synchronize all the Storage
Engine services before they are ready.
TIP: When you view an existing deployment in the Configure Deployment page, you can identify the Data
Engine (Collector) that is used as the Primary Data Collector since it is identified up arrow icon instead of
a check mark.
Query Port Number If the port is already used by another application, change the port
number. This port is used by the web site to access the Data Engine
service for query purposes.
Configuration Port Number If the port is already used by another application, change the port
number. This port is used by the web site to access the Data Engine
for configuration purposes.
Primary Data Collector When installing the Data Engine (Collector), you can specify that the
collector be used as the Primary Data Collector which is used to run
any background jobs such as Database Consistency. For information
about these jobs, see Data sources that run in background as needed
on page 40.
By default, the first installed Data Engine (Collector) is set to be the
Primary Data Collector.
Physical Memory (MB) Ensure the check box is selected to calculate whether sufficient
Calculate automatically memory is available. If you clear the check box, the value you enter in
text box is assigned.
NOTE: Physical memory is automatically assigned during installation.
After you successfully install, if you display the properties dialog, the
currently installed physical memory is displayed in the text box.
Query Port Number If the port is already used by another application, change the port
number. This port is used by the Data Engine service to access the
Query Engine service.
Prerequisite
As a prerequisite, you must have created a SQL instance which will be used to store the monitoring records.
During configuration you will associate the SQL instance with the Front-End Lync server on which the monitoring
services will run.
To associate the store with the Front-End pool and publish the topology
1 Open the Topology Builder.
2 Select Standard Edition Front-End and select the Lync or Skype for Business server.
3 Right-click and select Edit Properties.
4 Select the Monitoring (CDR and QoE metrics) check box and click New.
5 In the Define New SQL Server Store dialog, enter the FQDN for the SQL Server and the SQL instance
name (if you are not using the default instance).
6 Click OK.
7 Review SQL server information for the Monitoring database and click OK.
8 Select the Lync server, right-click and select Topology.
9 Select Publish.
To see the event type in an insight, click the details browser icon in the top right corner of the main insight.
The following events are collected and displayed in the ActiveSync insights.
Table 35. ActiveSync event types that are collected and reported.
The ActiveSync data collector skips any IIS log entries for ActiveSync events that are missing critical fields. The
collector writes partial information for ActiveSync events that are missing non-critical fields.
If you see error or warnings in the data collection status for Exchange IIS Logs jobs that indicate there are missing
fields, ensure that all of the recommended W3C logging fields were selected when you configured IIS logging on
your Exchange CAS server.
For more information, see Configuring IIS if Exchange is hosted on Windows 2003 Server on page 121 and
Configuring IIS Logging if Exchange is hosted on Windows Server 2008 or later on page 123.
If you have implemented an intelligent firewall, you can configure the firewall to allow the specific types of network
access (SMB, LDAP, and so on) that UC Analytics requires instead of access to specific ports.
Supported scenarios
The following scenarios are supported by the backup and restore scripts:
• You can back up an existing installation and restore to the same installation
• You can back up an existing installation and restore to a new installation.The Data Engine and Query
Engine roles installed in a new installation can be different than the original installation. However, the new
installation must meet the following criteria:
▪ have the same number of installed Storage Engines as the old installation
▪ use the same time zone settings on all Storage Engines as the old installation. UC Analytics
performs the backup using a date-related label.
▪ have the same server name and IP address as the old installation in which the backup was created.
For example, any of the following installations could be backed up and interchangeably restored:
Scenario 1
Server A: All components - Web Site, Data Engine (Insights), Query Engine (Insights), Data Engine
(collector role, Query Engine (Collector), Storage Engine.
Server B: Storage Engine
Scenario 2
Server A: Web Site, Data Engine (Insights), Query Engine (Insights), Storage Engine
Server B: Data Engine (Collector), Query Engine (Collector), Storage Engine
Scenario 3
Server A: Web Site, Data Engine (Insights), Data Engine (Collector), Storage Engine
Server B: Query Engine (Insights), Query Engine (Collector), Storage Engine
Prerequisites
To run the backup and restore batch files, you must have PowerShell 3.0 or later installed on the server that hosts
the UC Analytics Storage Engine.
To run the backup.bat file to create the backup, all the UC Analytic services must be running.
For deployments with multiple storage nodes, the scripts must be run on each node. All nodes must be within the
same time zone.
The prerequisites for running the restore.bat differ depending whether you are restoring to the existing installation
or to a new installation.
IMPORTANT: On Windows Server 2016, you must open a cmd window as Administrator to run the scripts.
NOTE: Do not change the port number from 7299. This is the port that is used by the Cassandra nodetool.
NOTE: Do not change the port number from 7299. This is the port that is used by the Cassandra nodetool.
This type of backup copy is different from the backup script. The backup script copies only the collected data, data
source configuration, and Admin settings. The backup script does not copy the Cassandra system files. To back
up all of the database, you must copy the entire storage folder.
To move the storage directory and configure the cassandra.yaml file for the new location
1 Stop the following UC Analytics services:
▪ UC Analytics Query Engine
▪ UC Analytics Storage Engine
2 Navigate to the UC Analytics installation folder. By default, the installation directory is located in the
following path:
C:\Program Files\Quest\UC Analytics\
When you edit the file and enter your own values, the characters that you enter in the value fields must use valid
XML characters. For certain characters, such as double quotation marks (“), ampersand (&), and apostrophe (‘),
you must escape the characters to have them render correctly on the title page.
/>
5 To change the retention period for the job status details records, change the 30 beside
retentionPeriodInDays= to the number of days that you want retain the job status details data.
6 Save your changes.
7 For the changes to take effect, restart the Data Engine service.
To set the PowerShell proxy access type for the Exchange Online data collections
1 On the server that hosts the UC Analytics Data Engine, navigate to the folder in which the Data Engine
collector role is installed. By default, the Data Engine folder is located at:
C:\Program Files\Quest\UC Analytics\Data Engine
2 Create a backup copy of the UC.Analytics.Insights.DataEngine.DataCollector.dll.config file and save it to a
different location.
3 Using a text editor, open the UC.Analytics.Insights.DataEngine.DataCollector.dll.config file.
4 Locate the following text in three locations in the Dell.UC.Insights.DataEngine.DataCollector.dll.config file:
powerShellProxyAccessType="None"
5 Modify the text to use the proxy setting that you want. The setting will be one of the following:
▪ IEConfig
▪ WinHttpConfig
▪ AutoDetect
▪ NoProxyServer:
For example, if you want the Exchange Online collectors to create the remote PowerShell sessions using
the IE proxy configuration settings of the service account, you would set the following:
powerShellProxyAccessType="IEConfig"
These settings affect all Exchange Online data sources that use a remote PowerShell connection.
For more information about the Microsoft PowerShell proxy settings, search for New-PSSessionOption in the
Microsoft PowerShell documentation web site.
Introduction
This section includes common questions and provides detailed answers to help you understand and troubleshoot
your UC Analytics deployment.
Answer
All user-created data sources (except for Mailbox Contents) run aligned with UTC midnight and, when you add the
data source and start the Data Engine, at the interval that you specified in the data source. You can set the
execution interval for all data sources except Mailbox Contents. The default interval is different for each data
source, but all are more frequent than once a day.
The Configuration data sources (Exchange/Lync/Cisco/Domain Controllers) and the Exchange Public Folder data
source are unique in that they only collect data once a day (first run in the UTC day). Even if you scheduled these
collections to run more than once a day, they take a “snapshot” of the data only once per UTC day. You might
schedule the data sources to run multiple times per day to handle any situation when data collection fails.
For example, suppose you add an Exchange Configuration data source, schedule it to run every 6 hours, and you
created the data source at 8:00 am UTC. The data source job will run (in UTC) as follows:
Answer
There are two data source collections that provide information for the Lync Organizational Summary User Activity
insight:
• Domain Controller (AD)
• Lync Configuration
When you started your Domain Controller data collection on Jan 30, the initial data collection period was set to 30
days (default). The Domain Controller data source collects information from AD and retroactively creates AD user
“snapshots” in the database for each user. This ensures that there is a user object to link to historical data from
data sources that collect historical information such as the Exchange Tracking Logs, Lync Users, and so on.
The Lync Configuration data source collection, however, collects data using PowerShell and only creates objects
for the current day. The data only covers the date on which the Lync Configuration data collection accessed
PowerShell to gather the data.
Therefore, on Jan 30, after the data source collections had finished, you had 30 days of AD user data and but only
one day of Lync configuration data (Jan 30). The AD user snapshots from Jan 30 are linked to the Lync
information, but user snapshots from Jan 29, 28, and earlier are not linked since Lync configuration data does not
exist in the database for those dates.
Answer
No. The Tracking Log and Mailbox Contents data collections both collect email messages from Exchange
mailboxes. However, if you collect the same messages using both types of data collections the message objects
are not duplicated.
Determining which data collections you want to run is dependent on the information that you want to get from the
messages. If you want a faster data collection, or if you need DLP / journaling messages, set up an Exchange
Tracking Logs data collection. If you want information about response time or email attachments, and are willing to
wait longer for the data collection, set up the Exchange Mailbox Contents data collection.
Answer
The following table shows the differences in email message statistics between the two data sources that collect
Exchange email message information:
• Exchange Mailbox Content (EWS) data source
• Exchange Tracking Log data source
Table 41. How Exchange message data is collected by different UC Analytics data sources.
Answer
You must create separate Exchange configuration data collections for Exchange 2010 on-premise and for
Exchange 2016/ Office 365 hybrid.
If you only added an Exchange configuration data source for Exchange 2016, you will see that the Exchange
2010/2013 option is greyed out so it is not being used. Create another Exchange configuration data collection for
Exchange 2016 and that will collect the mailboxes from Exchange 2016 and Office 365 hybrid as well.
Also in the Exchange 2010 Exchange configuration data source, remove the server name that you added under
Exchange 2016.
After you have configured multiple Exchange configuration data sources, you can use the Rename option to
uniquely identify each data collection. For information about how rename a data source, see Renaming a data
source on page 43.
Answer
The key to making the multi-forest configurations work is you cannot use the “Automatically discover domain
controller” for data sources in the secondary forests. This setting is selected by default and is hidden. To access
the setting, you must click the Show Advanced Settings link in the LDAP Connection Parameters section. Specify
a specific domain controller.
Contacting Quest
For sales or other inquiries, visit www.quest.com/contact.