In case you didn't know, Lync 2013 Best Practices Analyzer has been released some time ago and you can grab it here.
In this blog post I'll give you a quick overview on how BPA for Lync 2013 works.
What is it?
Apologies for just copying and pasting from the download site, but I think it's already a good summary
The Microsoft Lync Server 2013, Best Practices Analyzer is designed for administrators who want to determine the overall health of their Lync Server environment.
The BPA Allows you to :
- Proactively perform checks, verifying that the configuration is set according to recommended best practices.
- Automatically detect required updates to Lync Server 2013.
- Generate a list of issues, such as suboptimal configuration settings, unsupported options, missing updates, or practices that we do not recommend.
- Help you troubleshoot and fix specific problems.
System requirements can also be found on the same BPA download page. Make sure you install the "WMI Backwards Compatibility Package" to have all checks executed.
Installation
As you'll see this one is very easy: next, accept & next, choose destination folder and install.
Running & Updating The Tool
I got Lync 2013 installed on Windows Server 2012 so my start screen now has a new icon: Best Practices Analyzer.
Click the icon to start the BPA...
The first screen requests if BPA Should get the latest XML files from Microsoft, containing the latest updates. I always recommend doing this so you're sure BPA knows about latest product updates and known configuration issues. Click on "Check for updates now".
The BPA will now connect to Microsoft servers and download the appropriate data
Because Lync 2013 is pretty new, at this time no updates are available
Executing a BPA scan
Now let's run the scan, shall we?
The welcome screen allows you to start a new scan or view the result from a previous scan. We will off course select options for a new scan...
The tool will then propose you an automatically detected Active Directory Domain Controller it will use for the scan. You can modify this if you want the tool to use a different DC.
Using the Advanced logon options you can provide different credentials to access the DC, Edge and Exchange Servers.
For my setup I only need to provide credentials for the Edge server.
Then click "Connect to the AD Server" to continue
After connecting to AD, BPA will present you all detected pools and servers and let you select which of these components you want to be included in the test.
In my setup it has detected one Edge Server and One Front End Pool, both containing one server
You also have to type a descriptive label for the scan (so you can review it later)
Press "Start Scanning" to run the scan
The scan now starts and shows you current progress
And.... done...
Press "View a report..." to view the scan report
Viewing the Report
- The report viewer allows you to print or export the report. If it's all green you can use this feature to show your manager how good of an engineer you are
- In my environment, the tool detected that the Front-End server was not sized properly (number of CPU cores and available RAM). Since this a small environment and I chose this configuration on purpose, I can safely click "Do not show me this item again for this instance".
- If you chose "Do not show me this item again for all instances" you are in fact disabling this BPA Rule, which is not recommended.
- If you have other warnings or errors, please investigate them one by one and solve the configuration issues. Re-run the BPA to make sure you no longer have any unexpected notifications.
Remark : If you did not install the WMI Compatibility component, a warning will be shown on top of the report.
Cheers!