Small Business Server 2008 Part 4: Integration and Adv. Features
Part 4 of 4 in the Small Business Server 2008 series. This course shows you how to establish a network, migrate file shares and email, enable remote access to resources, deploy and configure SharePoint and Exchange for a small business, and much more.
What you'll learn
Part 4 of 4 in the Small Business Server 2008 series. This course shows you how to establish a network, migrate file shares and email, enable remote access to resources, deploy and configure SharePoint and Exchange for a small business, and much more. This course is intended for small business owners, consultants and admins in small business environments. To get the most out of this course, you should have a solid understanding of networking. Some experience with systems administration and Windows Server operating systems will also be helpful.
Table of contents
- Introduction 1m
- Scenario Management Requests 2m
- Using a Smarthost 6m
- Configuring the POP3 Connector 9m
- Configuring Message Size Limits 17m
- Set Message Size Limit for Specific Domain 2m
- Adding Additional Domains 8m
- Allowing non-PC Devices to Send Mail 8m
- Creating a Disclaimer 4m
- Transport Rules 2m
- Checking Mailbox Statistics 8m
- Resources for Troubleshooting 6m
- MX Toolbox and DNS Stuff Websites 7m
- Exchange Server Remote Connectivity Analyzer 5m
- Exchange Console Toolbox 9m
- Best Practices 4m
- What We Covered 4m
- Introduction 1m
- Scenario Management Requests 1m
- AutoDiscover 2m
- Testing Email Autoconfiguration 7m
- Running the Remote Connectivity Analyzer with AutoDiscover 6m
- Configuring Outlook 6m
- Outlook Web Access 8m
- Redirecting HTTP to HTTPS 8m
- Outlook Anywhere 10m
- ActiveSync 6m
- Configuring Windows Mobile Clients 6m
- Best Practices 7m
- What We Covered 2m
- Introduction 1m
- Scenario Management Requests 6m
- Overview of Threat Vectors 2m
- Accidental Compromises 6m
- Managing UAC with Group Policy 3m
- Configuring UAC for Workstations 6m
- Enabling Windows Defender 7m
- Removing Local Admin Rights 2m
- Creating a Domain Desktop Admin Account 7m
- External Attack 3m
- Mail Filtering 12m
- Data Leakage 1m
- Hacking 5m
- Setting Password Criteria with Default Domain Policy 6m
- Managing the Server Firewall 7m
- Controlling Outbound Traffic 1m
- Internal Threats 10m
- Best Practices 3m
- What We Covered 1m
- Introduction 1m
- How Group Policies Work 6m
- Scenario Management Requests 2m
- Using Policy Preferences 2m
- Downloading Client Side Extensions to a Share 7m
- Creating Group Policies 7m
- Deploying Group Policy Objects 8m
- Checking Policy Changes on a Workstation 4m
- Troubleshooting Policy Deployment 8m
- Enforcing Password-Protected Screensavers 11m
- Deploying Software via Group Policy 2m
- Best Practices 12m
- What We Covered 2m
- Introduction 2m
- Migration Overview 3m
- Preparing for Migration 1m
- Getting Ready to Migrate - Part 1 16m
- Getting Ready to Migrate - Part 2 2m
- Synchronize Times 2m
- The Migration Prep Tool 4m
- Creating the Migration Answer File 5m
- Phase 1 - Migration Mode Installation 15m
- Migrating Exchange 11m
- Debris Removal 7m
- Migrating Data 20m