Exchange Server 2010: Design and Deploy Infrastructure Security
Part 2 of 3 in the Exchange Server 2010 Design and Deployment series. In this course, you'll deepen your expertise with Exchange Server 2010, and walk away able to weigh the issues and considerations when planning for Exchange 2010, and maximize the value of your organization's Exchange deployment.
What you'll learn
Part 2 of 3 in the Exchange Server 2010 Design and Deployment series. In this course, you'll deepen your expertise with Exchange Server 2010, and walk away able to weigh the issues and considerations when planning for Exchange 2010, and maximize the value of your organization's Exchange deployment. This course is intended for Exchange administrators looking to take their knowledge to the next level, beyond administration. To get the most out of this course, you should have a solid knowledge of Exchange Server 2010, networking, and Windows Server administration.
Table of contents
- Introduction 2m
- Database and Mailbox Limitations 3m
- The Key Focus Point of Public Folders 6m
- A Description of Address Lists and the Offline Address Book (OAB) 5m
- A Review of Recipient Types 7m
- Questions to Determining Client Needs 5m
- Client Responses to Initial Design Survey 4m
- Solutions Offered 2m
- Moving Mailboxes to a New Mailbox Database 4m
- Establishing Mailbox DB Storage Limits and Mailbox Storage Quotas 3m
- Configuring a New Dynamic Distribution Group 2m
- What We Learned 1m
- Introduction 2m
- Client Access Server Configuration 3m
- Configuring CAS Properties and Policies 3m
- Enabling and Configuring OWA 2m
- Using the New Exchange Certificate Wizard 3m
- Hub Transport Server Configuration 3m
- Configuring a New SMTP Send Connector 2m
- Configuring SMTP Receive Connectors 1m
- Configuring Message Moderation for a Distribution Group 2m
- Transport Server Ports and Encryption 3m
- Edge Transport Configuration 4m
- Unified Messaging Configuration 2m
- Questions to Determining Client Needs 2m
- Client Responses to Initial Design Survey 2m
- Solutions Offered 2m
- What We Learned 1m
- Introduction 1m
- Transport Layer Security (TLS) 4m
- S/MIME Encryption 4m
- Information Rights Management (IRM) 2m
- IRM Strengths and Weaknesses 2m
- AD Rights Management Services (AD RMS) 1m
- Applying IRM 3m
- Mobile Security 2m
- Questions to Determining Client Needs 1m
- Client Responses to Initial Design Survey 3m
- Solutions Offered 2m
- What We Learned 1m
- Introduction 1m
- A Brief History of Permissions in Exchange 1m
- The New Permissions Model 2m
- Using Predefined Role Groups and Roles 1m
- Built-in Role Group Definitions 5m
- The Triangle of Power 3m
- Understanding RBAC 2m
- Working with RBAC in the EMS 8m
- Creating a Custom Role Group and/or Role 5m
- Getting a Better Handle on RBAC 7m
- Public Folder Permissions: Rights vs. Roles 3m
- Questions to Determining Client Needs 4m
- Client Responses to Initial Design Survey 3m
- Solutions Offered 5m
- What We Learned 1m
- Introduction 1m
- A Review of the Tools 2m
- Anti-Virus and/or Anti-Spam Solutions 1m
- Anti-Virus Possibilities 2m
- Anti-Spam Agents 1m
- Content Filtering 1m
- IP Allow or Block Lists 1m
- Allow and Block List Providers 1m
- Recipient Filtering and Sender Filtering 1m
- Sender ID and Sender Reputation 1m
- Configuring Anti-Spam Agents 6m
- Safelist Aggregation 3m
- Turn On Hub Transport Anti-Spam Agent 4m
- Questions to Determining Client Needs 3m
- Client Responses to Initial Design Survey 2m
- Solutions Offered 2m
- Configuring a Block List Provider and Content Filtering Settings 2m
- What We Learned 1m