MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.


I'm not curious

Exchange Server 2010: Design and Deploy Infrastructure Security

Course Summary

Part 2 of 3 in the Exchange Server 2010 Design and Deployment series. In this course, you'll deepen your expertise with Exchange Server 2010, and walk away able to weigh the issues and considerations when planning for Exchange 2010, and maximize the value


  • +

    Course Syllabus

    ● Deploying the Mailbox Server Role
        ◦ Introduction
        ◦ Database and Mailbox Limitations
        ◦ The Key Focus Point of Public Folders
        ◦ A Description of Address Lists and the Offline Address Book (OAB)
        ◦ A Review of Recipient Types
        ◦ Questions to Determining Client Needs
        ◦ Client Responses to Initial Design Survey
        ◦ Solutions Offered
        ◦ Moving Mailboxes to a New Mailbox Database
        ◦ Establishing Mailbox DB Storage Limits and Mailbox Storage Quotas
        ◦ Configuring a New Dynamic Distribution Group
        ◦ What We Learned
    ● Deploying Non-Mailbox Server Roles
        ◦ Introduction
        ◦ Client Access Server Configuration
        ◦ Configuring CAS Properties and Policies
        ◦ Enabling and Configuring OWA
        ◦ Using the New Exchange Certificate Wizard
        ◦ Hub Transport Server Configuration
        ◦ Configuring a New SMTP Send Connector
        ◦ Configuring SMTP Receive Connectors
        ◦ Configuring Message Moderation for a Distribution Group
        ◦ Transport Server Ports and Encryption
        ◦ Edge Transport Configuration
        ◦ Unified Messaging Configuration
        ◦ Questions to Determining Client Needs
        ◦ Client Responses to Initial Design Survey
        ◦ Solutions Offered
        ◦ What We Learned
    ● Designing and Deploying Message Security
        ◦ Introduction
        ◦ Transport Layer Security (TLS)
        ◦ S/MIME Encryption
        ◦ Information Rights Management (IRM)
        ◦ IRM Strengths and Weaknesses
        ◦ AD Rights Management Services (AD RMS)
        ◦ Applying IRM
        ◦ Mobile Security
        ◦ Questions to Determining Client Needs
        ◦ Client Responses to Initial Design Survey
        ◦ Solutions Offered
        ◦ What We Learned
    ● Designing and Deploying the Exchange Permissions Model
        ◦ Introduction
        ◦ A Brief History of Permissions in Exchange
        ◦ The New Permissions Model
        ◦ Using Predefined Role Groups and Roles
        ◦ Built-in Role Group Definitions
        ◦ The Triangle of Power
        ◦ Understanding RBAC
        ◦ Working with RBAC in the EMS
        ◦ Creating a Custom Role Group and/or Role
        ◦ Getting a Better Handle on RBAC
        ◦ Questions to Determining Client Needs
        ◦ Client Responses to Initial Design Survey
        ◦ Solutions Offered
        ◦ What We Learned
    ● Designing and Deploying Message Hygiene
        ◦ Introduction
        ◦ A Review of the Tools
        ◦ Anti-Virus and/or Anti-Spam Solutions
        ◦ Anti-Virus Possibilities
        ◦ Anti-Spam Agents
        ◦ Content Filtering
        ◦ IP Allow or Block Lists
        ◦ Allow and Block List Providers
        ◦ Recipient Filtering and Sender Filtering
        ◦ Sender ID and Sender Reputation
        ◦ Configuring Anti-Spam Agents
        ◦ Safelist Aggregation
        ◦ Turn On Hub Transport Anti-Spam Agent
        ◦ Questions to Determining Client Needs
        ◦ Client Responses to Initial Design Survey
        ◦ Solutions Offered
        ◦ Configuring a Block List Provider and Content Filtering Settings
        ◦ What We Learned

     


Course Fee:
USD 29

Course Type:

Self-Study

Course Status:

Active

Workload:

1 - 4 hours / week

Attended this course?

Back to Top

Awards & Accolades for MyTechLogy
Winner of
REDHERRING
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url

Back to Top