->
Oreilly - 70-662: Microsoft Exchange Server 2010, Configuring - 300000006A0117
Oreilly - 70-662: Microsoft Exchange Server 2010, Configuring
by Integrity Training | Publisher: Stone River eLearning | Release Date: July 2018 | ISBN: 300000006A0117


The 70-662: Microsoft Exchange Server 2010, Configuring training course provides the candidates with the essential knowledge and skills to configure and manage a Microsoft Exchange Server 2010 messaging environment. This course will teach the candidates on how to configure Exchange Server 2010, as well as provide guidelines, best practices, and considerations that will help them to optimize their Exchange server deployment. This training course is focused on the Microsoft Exchange Server 2010, one of the most widely used email infrastructures around the world. This training course is helpful to certify the candidates and pass the Microsoft exam 70-662. The course is addresses and focuses on the skills, concepts, technologies, and the information that are necessary for IT professionals to effectively install, operate and manage Microsoft Exchange Server 2010 environments.
  1. Course Introduction
    • Course Introduction 00:01:51
    • Instructor Intruduction 00:01:10
  2. Chapter 01 - Active Directory and Supporting Infrastructure
    • Active Directory and Supporting Infrastructure 00:02:01
    • Network Infrastructure 00:00:31
    • Active Directory 00:02:23
    • Active Directory Infrastructure 00:04:30
    • Active Directory Topology 00:02:25
    • Trust Relationships 00:02:20
    • Active Directory Components 00:02:54
    • Active Directory Components - Domains and Domain Tree 00:00:30
    • Active Directory Components - Forests 00:00:42
    • Active Directory Components - Trusts 00:00:25
    • Active Directory Components - Domain Controller 00:01:10
    • Active Directory Components - Global Catalog 00:01:08
    • Active Directory Components - Sites 00:00:45
    • Active Directory Components - Replication 00:00:13
    • Active Directory Partition - Domain 00:00:35
    • Active Directory Partition - Configuration 00:01:17
    • Active Directory Partitions - Schema 00:01:03
    • Active Directory Partitions - Application 00:00:15
    • Active Directory Hierarchy 00:02:34
    • Demo - Prepare Active Directory 00:11:13
    • Network Based Services 00:02:22
    • DNS 00:01:00
    • Types of DNS Zones 00:02:29
    • DHCP 00:01:52
    • Time Servers 00:00:33
    • DNS Requirements for Exchange Server 2010 00:04:24
    • Preparing Active Directory for Exchange 00:03:59
    • Exchange Server 2010 Editions & Licensing 00:05:10
    • Server Roles in Exchange Server 2010 00:02:36
    • Server Roles - Expanded 00:06:08
    • Server Roles - Expanded (Cont.) 00:03:45
    • Simple Organizations 00:02:21
    • Standard Organization Deployments 00:01:14
    • Complex Organization Deployment 00:01:16
    • Hardware Recommendations for Combining Server Roles 00:02:48
    • Integration with Exchange Online Services 00:01:38
    • Infrastructure Requirements for Exchange Server 2010 00:01:49
    • Infrastructure Requirements for Exchange Server 2010 (Cont.) 00:00:18
    • Hardware Requirements for Install 00:01:57
    • Installation Software Requirements 00:02:15
    • Process for Installing Exchange Server 2010 00:02:47
    • Demo - Install Exchange Server 00:14:06
    • Demo - Install a Second Exchange Server 00:10:33
    • Unattended Installation Options 00:01:19
    • Demo - Install Exchange Server Updates 00:02:33
    • Chapter 01 Review 00:01:30
  3. Chapter 02 - Mailbox Servers and Recipients
    • Mailbox Servers and Recipients 00:01:16
    • Exchange Management Console 00:02:39
    • Demo - Exchange Management Console 00:10:02
    • Exchange Management Shell & PowerShell 00:02:26
    • Remote Windows PowerShell 00:01:15
    • Exchange Management Shell Cmdlets 00:01:49
    • Using Cmdlets Together 00:01:38
    • Demo - Exchange Management Shell 00:14:32
    • EMS Examples 00:05:10
    • Exchange Control Panel (ECP) 00:01:24
    • Demo - Exchange Control Panel 00:06:54
    • Initial Mailbox Configuration Tasks 00:00:27
    • Demo - Configure Mailbox Management Options 00:08:32
    • Secure the Server 00:02:35
    • Create and Configure Database 00:03:57
    • Demo - Create Mailbox and Public Folders 00:04:41
    • Configure Public Folders 00:01:58
    • Demo - Public Folders 00:05:42
    • Demo - Public Folder Toolbox 00:10:42
    • Configure Recipients 00:00:51
    • Configure the Offline Address Book 00:01:09
    • Database Key - Points 00:00:53
    • Database File Types 00:03:29
    • Database File Types Continued 00:02:12
    • Mailbox Database Update Process 00:02:57
    • Storage Improvements 00:01:14
    • Options for Database Storage 00:06:26
    • Data Storage Options - Direct Attached Storage 00:01:29
    • Data Storage Options: Storage Area Networks 00:01:34
    • Public Folder Replication 00:03:11
    • How Clients Access Public Folders 00:01:56
    • Sharepoint Vs. Public Folders 00:03:52
    • Demo - Configuring Public Folder Replication 00:03:26
    • Public Folder Process for MAPI Clients 00:01:50
    • Exchange Recipients - User Mailboxes 00:01:05
    • Exchange Recipients - Resource Mailbox 00:02:19
    • Exchange Recipients - Mail Users 00:01:27
    • Exchange Recipients - Mail Contact 00:00:40
    • Exchange Recipients - Mail-Enabled Security and Distribution Groups 00:01:28
    • Types of Distribution Groups 00:02:37
    • Distribution Group Features 00:01:20
    • Some Options for Configuring Distribution Groups 00:02:48
    • Exchange Recipients - Linked Mailboxes 00:00:34
    • Moving Mailboxes 00:02:28
    • Resource Mailboxes 00:01:17
    • Booking Attendants 00:01:31
    • Designing Resource Booking Policies 00:01:13
    • Demo - Resource Mailbox 00:06:19
    • E-Mail Address Policies 00:02:43
    • Creating an E-mail Policy for Distribution Groups 00:01:02
    • Demo - E-mail Address Policies 00:03:48
    • Address Lists 00:02:01
    • Demo - Configuring Address Lists 00:05:05
    • Configuring Offline Address Books 00:02:00
    • Options for Deploying Offline Address Books 00:00:33
    • Distribution Options - Address Book 00:00:46
    • Chapter 02 Review 00:01:53
  4. Chapter 03 - Managing Client Access
    • Managing Client Access 00:01:18
    • Client Access Servers 00:06:40
    • Client Access Server Deployment Options 00:02:12
    • Deploy Client Access Servers 00:00:37
    • Demo - Configuring a Client Access Server 00:14:20
    • Securing a Client Access Server 00:02:52
    • Using Application Layer Firewall 00:03:28
    • Best Practices: Implementing Client Access Server Certificates 00:03:45
    • Demo - Configuring Certificates for Client Access Servers 00:11:29
    • POP3 and IMAP4 Options 00:04:52
    • Configuring the Client Access Server for Internet Access 00:02:53
    • Client Access Server Services for Outlook Clients 00:04:36
    • Client Access Server Services for Outlook Clients Continued 00:00:55
    • Autodiscover 00:00:58
    • Configuring Autodiscover 00:00:30
    • Availability Service 00:01:44
    • MailTips 00:01:14
    • Demo - Configuring MailTips 00:10:50
    • Outlook Anywhere 00:01:35
    • Demo - Enable Outlook Anywhere 00:05:22
    • Outlook Client Connectivity Troubleshooting 00:03:00
    • Outlook Web App 00:01:56
    • Configuration Options for Outlook Web App 00:00:48
    • File and Data Access for Outlook Web App 00:01:18
    • File and Data Access Configuration 00:00:56
    • Demo - Configure Outlook Web App 00:10:32
    • ActiveSync 00:02:30
    • Exchange ActiveSync 00:00:28
    • Exchange ActiveSync Security Options 00:02:11
    • Chapter 03 Review 00:00:51
  5. Chapter 04 - Managing Message Transports
    • Managing Message Transports 00:02:10
    • SMTP 00:01:14
    • One-way SMTP Connections 00:02:01
    • Demo - SMTP Connectors 00:13:34
    • Changing Default Message Flow 00:02:39
    • Troubleshooting SMTP Message Delivery 00:05:20
    • SMTP E-Mail Security Options 00:04:04
    • Demo - Configuring SMTP Security 00:05:18
    • Domain Security 00:01:26
    • Domain Security Process 00:00:46
    • Domain Security Configuration 00:00:43
    • Demo - Configuring Domain Security 00:10:20
    • How S/MIME Works 00:03:01
    • How S/MIME Works Continued 00:01:22
    • Message Transport Components 00:02:31
    • Message Transport Components Continued 00:00:44
    • Routing Messages Within an Exchange Organization: Message Sent 00:01:13
    • Routing Messages Within an Exchange Organization: Microsoft Exchange Mail Submission Service 00:00:35
    • Routing Messages Within an Exchange Organization: Store Driver 00:01:20
    • Routing Messages Within an Exchange Organization: Mail Delivery Within AD 00:02:22
    • Routing Messages Within an Exchange Organization: Mail Delivery to Internet 00:01:24
    • Shadow Redundancy - Transport Dumpster 00:01:43
    • Configuring Shadow Redundancy 00:02:08
    • Process for Configuring Hub Transport Servers 00:02:43
    • Options for Configuring Message Transport 00:03:14
    • Remote Domains 00:01:43
    • Demo - Configuring Accepted and Remote Domains 00:13:34
    • Back Pressure - System Monitoring 00:00:55
    • Back Pressure 00:02:01
    • Edge Transport Server Role 00:03:35
    • Edge Transport Role 00:01:36
    • Edge Transport Server Role Infrastructure Requirements 00:01:04
    • AD LDS Scenarios 00:01:49
    • Edge Synchronization 00:01:01
    • Cloned Configuration 00:01:20
    • Cloned Configuration Continued 00:01:58
    • Edge Transport Server Security 00:02:10
    • Antivirus Features 00:01:24
    • Forefront Protection 2010 for Exchange Server 00:01:30
    • Forefront Protection 2010 Options 00:00:30
    • Defense in Depth 00:03:20
    • Overview of Spam -Filtering Features 00:05:08
    • How Exchange Server 2010 Applies Spam Filters 00:01:24
    • Sender ID Filtering 00:01:19
    • Sender Reputation Filtering 00:01:59
    • Content Filtering 00:00:45
    • Demo - Configuring Anti -Spam Options 00:16:51
    • Chapter 04 Review 00:01:45
  6. Chapter 05 - Exchange Security
    • Exchange Security 00:01:30
    • Role Based Access Control (RBAC) 00:01:42
    • Role Based Access Control Options 00:01:41
    • Management Role Groups 00:02:10
    • Built-In Management Role Groups 00:02:27
    • Built-In Management Role Groups (Cont.) 00:01:20
    • Demo - Managing Permissions 00:10:17
    • Process for Configuring Custom Role Groups 00:01:27
    • Demo - Configuring Custom Role Groups 00:14:03
    • Management Role Assignment Policies 00:01:02
    • Working with Management Role Assignment Policies 00:02:20
    • Managing Permissions on Edge Transport Servers 00:02:14
    • Exchange Server Security Risks 00:04:51
    • Exchange Server Security Guidelines 00:04:25
    • Secure Internet Access Components 00:01:06
    • Designing Security - Client to Internet 00:01:05
    • Designing Security - Internal Network 00:00:55
    • Common Port Assignments for Firewall 00:01:26
    • Securing Client Access Traffic from the Internet 00:01:59
    • SMTP Connections 00:02:45
    • Reverse Proxy 00:02:15
    • Governing Compliance 00:01:36
    • Compliance Examples 00:01:44
    • Compliance Examples Continued 00:00:42
    • Exchange Messaging Policy and Compliance 00:01:46
    • Transport Rules - Hub Transport Server 00:00:32
    • Transport Rules - Edge Transport Server 00:00:33
    • Transport Rule Components - Conditions 00:01:29
    • Transport Rule Components - Actions 00:01:08
    • Transport Rule Components - Exceptions 00:00:41
    • Transport Rule Component - Predicates 00:00:43
    • Demo - Configuring Transport Users 00:23:30
    • Message Classifications 00:02:08
    • AD RMS 00:03:10
    • How AD RMS Works 00:03:02
    • Exchange Server 2010 Integration 00:01:34
    • Moderated Transport 00:02:07
    • Message Journaling - Messaging Records Management 00:01:51
    • Demo - Configuring Message Journaling 00:07:12
    • Considerations for Managing the Message Journal Mailbox 00:05:30
    • Multi-Mailbox Search 00:02:17
    • Demo - Configuring Multi-Mailbox Search 00:14:29
    • What Are Retention Tags and Retention Policies? 00:04:04
    • AutoTagging 00:01:05
    • Demo - Configuring Retention Tags and Policies 00:10:27
    • Managed Folders 00:00:45
    • Process for Deploying Managed Folders 00:02:49
    • Demo - Implementing Custom Folders 00:07:29
    • Considerations for Implementing Messaging Records Management 00:03:08
    • Personal Archives in Exchange Server 2010 00:02:39
    • Demo - Configuring Personal Archives 00:01:19
    • Best Practices: Personal Archives 00:01:08
    • Chapter 05 Review 00:02:14
  7. Chapter 06 - Implementing High Availability
    • Implementing High Availability 00:01:17
    • High Availability 00:03:25
    • High Availability (Cont.) 00:03:15
    • Types of Downtime 00:03:53
    • High Availability - Mailbox Servers 00:03:32
    • High Availability - Non-Mailbox Servers 00:02:53
    • Database Availability Group 00:06:38
    • Active Manager 00:00:54
    • Continuous Replication Process 00:03:35
    • DAG Database Protection 00:00:55
    • Exchange Server 2007 and 2010 Mailbox Availability Options 00:04:11
    • Exchange Server 2007 and 2010 Mailbox Availability Options (Cont.) 00:02:15
    • Create and Configure DAG 00:01:09
    • DAG Network 00:02:14
    • Demo - Creating and Configuring a DAG 00:08:34
    • Demo - DAG LAG 00:02:13
    • Transport Dumpster 00:03:10
    • Understanding the Failover Process 00:02:06
    • Client Access Servers - High Availability 00:02:17
    • Shadow Redundancy for Hub Transport Servers 00:01:32
    • Shadow Redundancy for Hub Tranports Servers (2) 00:00:53
    • Shadow Redundancy for Hub Transport Servers (3) 00:01:36
    • Shadow Redundancy for Hub Transport Servers (4) 00:01:06
    • Shadow Redundancy Manager (SRM) 00:00:29
    • Edge Transport Servers - High Availability 00:01:24
    • Disaster Mitigations Options (1/4) 00:02:49
    • Disaster Mitigations Options (2/4) 00:01:47
    • Disaster Mitigations Options (3/4) 00:01:12
    • Disaster Mitigations Options (4/4) 00:02:21
    • Disaster Recovery: Mailbox Servers 00:03:27
    • Recovery Mailbox Server 00:00:50
    • Backup and Restore Scenarios 00:02:51
    • Backup in Exchange Server 2010 - Differences from Previous Versions 00:01:44
    • Backup Requirements for Exchange Server 2010 00:04:47
    • Backup Strategies 00:05:16
    • Volume Shadow Copy Service (VSS) 00:01:43
    • VSS Backup 00:01:24
    • VSS Component Definitions 00:00:59
    • How to Pick a Backup Solution 00:02:36
    • Restore Strategies 00:01:21
    • Process for Recovering Data Using the Recovery Database 00:01:10
    • Dial-Tone Recovery 00:01:10
    • Process for Implementing Dial-Tone Recovery 00:01:05
    • Database Mobility 00:00:49
    • Recovering Exchange Servers 00:02:59
    • Performance Monitoring 00:04:42
    • Monitoring Exchange Server 00:02:08
    • Performance Counters for Exchange Server 00:04:14
    • Performance Counters for Mailbox Servers 00:02:13
    • Performance Counters for Hub and Edge Transport Servers 00:01:59
    • Performance Counters for Client Access Servers 00:01:34
    • Performance Counters for Client Access Servers (Cont.) 00:00:49
    • Network and Performance Guidelines 00:02:14
    • Change Management 00:02:55
    • Software Updates vs. Hotfixes 00:01:56
    • Deploying Software Updates 00:02:15
    • Determining the Need for Hardware Upgrades 00:01:36
    • Process for Implementing Hardware Upgrades 00:02:19
    • Developing a Troubleshooting Methodology 00:03:31
    • Troubleshooting Tools 00:01:36
    • Chapter 06 Review 00:01:14
    • Course Closure 00:02:38
  8. Oreilly - 70-662: Microsoft Exchange Server 2010, Configuring

    300000006A0117.70662.Microsoft.Exchange.Server.2010.Configuring.part1.OR.rar

    300000006A0117.70662.Microsoft.Exchange.Server.2010.Configuring.part2.OR.rar

    300000006A0117.70662.Microsoft.Exchange.Server.2010.Configuring.part3.OR.rar

    300000006A0117.70662.Microsoft.Exchange.Server.2010.Configuring.part4.OR.rar

    300000006A0117.70662.Microsoft.Exchange.Server.2010.Configuring.part5.OR.rar

    300000006A0117.70662.Microsoft.Exchange.Server.2010.Configuring.part6.OR.rar


 TO MAC USERS: If RAR password doesn't work, use this archive program: 

RAR Expander 0.8.5 Beta 4  and extract password protected files without error.


 TO WIN USERS: If RAR password doesn't work, use this archive program: 

Latest Winrar  and extract password protected files without error.


 Coktum   |  

Information
Members of Guests cannot leave comments.




rss