Microsoft Exchange 2013 Ultimate Bootcamp Your pathway to becoming a GREAT Exchange Administrator Introduction Microsoft Exchange with its inherent high level of security features, improved assistant, instant search feature and an array of new features is arguably the choice of more and more companies and businesses. Needless to say, these entities are now constantly sourcing for Administrators trained to take advantage of the new technologies progressively embedded into the software package since 1993. This Ultimate Bootcamp has been developed to answer the requirements of IT professionals aspiring to fulfill these needs. Course Summary Duration: 5-day Course Software Vendor: Microsoft Participants: IT Professionals Technology: Microsoft Exchange ; VMware vsphere 5.5; Microsoft Hyper-V 2012 Delivery Method: Instructor-led Online & Classroom Prerequisites Understanding of internet and networking protocols Minimum of two years of experience: Administering Windows 2008 R2 or 2012 Working with Active Directory Domain Services (AD DS) Working with name resolution (DNS) Experience working with PKI certificates The Exchange Ultimate Bootcamp was designed from the ground up; we first looked into the role the Exchange administrator fulfills and then created the Course to ensure you, the Exchange Administrator, would graduate from the Course with the competence to match that role. You will not only learn what is needed to provide email, calendar and contact services to the enterprise but will also appreciate how Exchange functions as a virtual machine. You will gain an intimate knowledge of the details of the setup in a virtual environment in order that you may exploit the features of the to its fullest. Why Attend this Course? In order to be a great Administrator, you need to gain 100% thorough knowledge fallout from the foregoing Course Objectives. Most companies today are virtualized, but many are either over allocating resources or having performance issues. The sum resultant is that companies and businesses are getting more discerning as to who they hire; hence you want to be one step ahead of the competition. Our Course will do just that by teaching you what you need to setup a virtual machine correctly and maximize performance. Multiple Classes in One Core Solutions of Microsoft Exchange (M20341) Advanced Solutions of Microsoft Exchange (M20342)
Course Outline Certifications Microsoft Exam 70-341A: Microsoft Exchange, Core Solutions Microsoft Exam 70-342: Microsoft Exchange 2013, Advanced Solutions Course Objectives Learn the use of Exchange management shell in all areas of installing and administering Exchange. Learn the Infrastructure requirements for Exchange Plan and perform deployment and management Plan a mailbox deployment Configure the mailbox role Create and manage recipient objects Plan and implement the Client Access role Plan and configure Microsoft Outlook Web App Plan and configure mobile messaging using the Client Access Manage high availability Plan for disaster mitigation Implement backup and recovery Plan message security options Implement antivirus solutions Implement an anti-spam solution Configure permissions Secure the Exchange Monitor, maintain, and troubleshoot Designing Exchange 2013 and Roles Gaining an understanding of the details related to a virtual deployment Learn best practices and performance recommendation to run Exchange in a Virtual Environment VMware vsphere Microsoft Hyper-V Plan for and perform a migration Design and implement site resiliency for Exchange Plan a virtualization strategy for Exchange roles Design and implement message transport security Design and implement message retention Design and implement messaging compliance Design and implement administrative security Use Windows PowerShell 3.0 to manage Exchange Design and implement messaging coexistence 1. Introduction a. What Is Exchange b. Evolution of Microsoft Exchange over 20 Years c. Licensing Concepts : Standard CAL & Enterprise CAL d. Exchange : i. Features List ii. Architecture e. role evolution, Network layer improvements f. Discontinued Features 2. Designing Exchange 2013 and Roles for Exchange a. Active Directory components and Exchange integration b. Domain Name System (DNS) requirements for Exchange c. Considerations when virtualizing i. VMware vsphere ii. Microsoft Hyper-V d. Access Mechanism, Load Balancing, High Availability, Business Continuity, Disaster Recovery, Data Retention, Transport Rules, Security and Compliance Considerations e. Co-existence with other versions of Exchange f. Best Practices in the design of Exchange deployment in case of on premises, hosted, virtual, cloud and physical implementation 3. Infrastructure requirements for Exchange 2013 a. Determine your destiny! i. On premise, hosted, Cloud, Virtual vs Physical b. Hardware Requirements c. Software Requirements d. Virtual Machine Requirements i. VMware vsphere and Microsoft Hyper-V 4. Exchange Deployment a. Prepare Infrastructure i. Setting up the Virtual Machine properly 1. Best Practices ii. Setting up the Physical Machine properly b. Virtual Switch Connectivity c. Prepare AD DS for Exchange deployment d. Steps for installation of Exchange e. Verification of installation
f. Best practices and tips on deployment g. Troubleshooting h. Hand-on Labs i. Prepare the environment to deploy Exchange ii. Deploy AD iii. Update the Schema iv. Install Exchange 5. Designing and Configuring Mailbox s a. Mailbox role in Exchange 2013 b. Mailbox database in Exchange 2013 c. Storage options for the mailbox databases d. Recipient Objects i. Create and configure user mailboxes ii. Move mailboxes iii. Site, shared and linked mailboxes iv. Create and configure resource mailboxes v. Distribution Groups vi. Public folders vii. Address lists viii. Address book policies ix. email address policies x. Best practices and tips xi. Troubleshooting g. Hands-on Labs i. Planning Configuration for Mailbox s ii. Configuring Storage on the Mailbox s iii. Creating and Configuring Mailbox Databases iv. Lab covering recipient objects 1. Configuring Address Lists and Policies 2. Configuring Public Folders 3. Creating Group 4. Creating Distribution list 5. Create a Mailbox-Enabled User 6. Mailbox-Enable an Existing User with EAC 6. Designing and Configuring Client Access s a. Deployment & Configuration i. Hardware and software requirements for Client Access 1. Virtual Machine requirements 2. Physical Machine requirements ii. Client Access role iii. Client Access single and multiple sites b. Design and Configure client connectivity i. Configure Client Access options ii. Configure Namespaces on the Client Access iii. Configure Certificates on the Client Access iv. Secure the Client Access v. Configure Authentication on the Client Access vi. Configure POP3 and IMAP4 Client Access vii. Configure the Client Access for Internet access viii. Client Access services provided by the Client Access ix. Auto discover in Client Access x. Best practices and tips xi. Troubleshooting c. Hands-on Labs i. Configuring Certificates for the Client Access ii. Configuring Client Access Services Options iii. Configuring Custom MailTips iv. Configuring Outlook Web App policies 7. Designing and Configuring Messaging Client Connectivity a. Outlook Web Application and Outlook Anywhere b. Exchange ActiveSync c. Connect non-outlook clients to Client Access d. Outlook Web App policy e. Configure Outlook Web App f. Office Web Apps integration g. Outlook Web App off-line access h. Mobile device management i. Mobile device management in the Exchange Administration Center j. Best practices and tips k. Troubleshooting l. Work with Outlook web app i. Configuring Outlook web app for maintaining Mailbox ii. Create rule for mail box iii. Tracking Message m. Hands-on Labs i. Planning Client Connectivity ii. Configuring Outlook Web App and Outlook Anywhere iii. Configuring Exchange ActiveSync iv. Use integrated applications in Outlook Web App
8. Designing and Configuring Message Transport a. Message transport services b. Message transport components c. Message routing changes d. Routing in Front End Transport service e. Routing in Destinations and delivery groups f. Routing in Mailbox Transport service g. Modify default message flow h. Mail flow settings i. Accepted and remote domains j. SMTP connectors k. Foreign connectors l. Transport rules m. Data-loss prevention policies n. Best practices and tips o. Troubleshooting p. Hands-on Labs i. Configuring Message Transport ii. Troubleshooting Message Delivery iii. Configuring Transport Rules and Data-Loss Prevention Policies 9. Designing and Implementing Site Resiliency a. Site Resiliency in Exchange b. Planning a Site Resilient Implementation c. Implementing Site Resiliency 10. Exchange security a. Securing the connections i. Secure Internet access components ii. Secure Client Access traffic from the Internet iii. Secure simple mail transfer protocol (SMTP) connections from the Internet iv. Reverse proxy b. Securing exchange in a virtual environment i. What additional options are available? c. Designing and Implementing Message Transport Security i. Policy and Compliance Requirements ii. Designing and Implementing Transport Compliance iii. Designing and Implementing AD RMS Integration d. Designing and Implementing Message Retention i. Message Records Management and Archiving ii. Designing In-Place Archiving iii. Designing and Implementing Message Retention e. Designing and Implementing Messaging Compliance i. Designing and Implementing Data Loss Prevention ii. Designing and Implementing an In-Place Hold iii. Designing and Implementing In-Place E-Discovery f. Designing and Implementing Administrative Security and Auditing i. Designing and Implementing Role Based Access Control ii. Designing and Implementing Split Permissions iii. Designing and Implementing Audit Logging 11. Administering Exchange a. The Exchange Administration Center (EAC) b. The Exchange Management Shell (EMS) i. Windows PowerShell 3.0 ii. Using Windows PowerShell to Manage Exchange c. Best practices and tips d. Troubleshooting e. Hands-on Labs i. Manage Exchange ii. Exchange Administration Tools to Manage Exchange iii. Work with Exchange Management Shell iv. Designing Configuration for Mailbox s v. Configuring Storage on the Mailbox s vi. Adding and Configuring Mailbox Databases 12. Managing Performance a. Physical Machine Performance Considerations b. Virtual Machine Performance Considerations 13. Designing and Configuring Message Hygiene a. Define messaging security requirements b. Plan Client Access security options c. Plan restrictions to message flow d. Define anti-spam solution requirements e. Portray Exchange spam-filtering features f. Configure Sender ID filtering g. Understand the spam confidence level (SCL) in Exchange h. Portray anti-virus solution requirements i. Portray Exchange Online Protection j. Portray deployment options for Online Protection k. Best practices and Tips l. Troubleshooting
m. Hands-on Labs i. Configuring Antimalware Options in Exchange ii. Configuring Anti-Spam Options on Exchange iii. Validating Antimalware and Anti-Spam Configuration 14. Designing and Configuring Administrative Security and Auditing a. Portray Role Based Access Control b. Identify Exchange built-in management role groups c. Management role-assignment policies d. Exchange split permissions e. Best practices and tips f. Troubleshooting g. Hands-on Labs i. Configuring Exchange Permissions ii. Configuring Audit Logging iii. Configuring RBAC Split Permissions on Exchange 15. Planning and Implementing High Availability a. Components of high availability b. Database Availability Groups c. High availability for Client Access s d. High availability for Edge Transport e. High availability for mailbox s f. Designing high availability solutions in a virtual environment g. Plan software and hardware components for DAGs h. Active Manager and Active Manager i. Continuous replication j. Create and Configure a Database Availability Group k. Create and Configure Databases for high availability l. Fail-over process m. Configuring Highly Available Client Access s n. Network Load Balancing (NLB) i. Virtual Switch settings o. Best practices and tips p. Troubleshooting q. Hands-on Labs i. Creating and Configuring a Database Availability Group ii. Deploying Highly Available Client Access s iii. Testing the High-Availability Configuration iv. Identify failure domains v. Manage DAG networks vi. Configure proper placement of a file share witness vii. Manage mailbox database copies 16. Designing and Implementing Back-up, Restore and Disaster Recovery a. Data-loss scenarios b. Identify scenarios that require backup and restore c. Choose Exchange backup software and Backup Media i. Including options for the virtual environment d. Volume Shadow Copy Service (VSS) backup e. Options to recover Exchange i. Options to recover mailbox data ii. Recover mailbox data and Recover Client Access s iii. Recover the public folder hierarchy iv. Recover data using the recovery database v. Repair a corrupted Exchange database vi. Recover a database with the dial-tone functionality f. List data-loss mitigation features g. Disaster mitigation strategy h. Disaster recovery and High Availability i. Including options for the virtual environment i. Timelines for disaster recovery j. Best practices and tips k. Troubleshooting l. Hands-on Labs i. Backing Up Exchange 2013 ii. Windows Backup iii. Restoring Exchange iv. Data Protection Manager v. Recovery Database (RDB) vi. Restoring Exchange Data 17. Migrate and Upgrade for Exchange 2013 a. Upgrade from Exchange 2007 b. Upgrade from Exchange 2010 c. What to do with Exchange 2003 d. Migrating from other products e. Lotus Notes ii. Groupwise iii. Zimbra f. Hands-on Labs i. Upgrades from previous Exchange versions ii. Upgrading from Exchange 2010 to Exchange 2013 iii. Removing Exchange 2010