Font size:


This is a bundled training package. It contains training for each of the bundled items below:

Course Price
Security Strategies $74.95
Message Records Management $74.95
Exchange 2016 Migration, Federation, and Sharing $74.95
Planning for and Deploying Mailbox Servers $74.95
Recovery Strategies And Client Access Services $74.95
Understanding Mailflow and Auditing $74.95
Collaboration in Exchange 2016 $74.95
Design and Secure Remote Access and Multiple Namespaces Solutions $74.95

Bundle Price: $289.00
Total Savings: $310.60

Security Strategies

Security of corporate data tops the list of executive concerns today. You want to have every tool in your toolkit to lock down Exchange and secure your e-mail. In this course, you'll examine everything from encryption on the disk for data at rest to automating the encryption of sensitive e-mails as they flow through the Transport Pipeline. You'll learn about the new permissions model, Role-Based Access Control and Delegated Setup, to expose critical elements of the Exchange 2016 Transport Pipeline.

Learning Objectives
  • Start the course
  • Define the management role group architecture in RBAC
  • Identify admin roles in RBAC
  • Customize the RBAC system
  • Identify RBAC and active directory split permissions
  • Configure delegated setup
  • Define BitLocker
  • Identify smart card functions
  • Plan and configure Office 365 message encryption
  • Plan and configure EOP advanced threat protection
  • Plan and configure information rights management
  • Plan and create transport protection rules
  • Plan and create Outlook protection rules (EMS only)
  • Configure transport decryption
  • Configure journal decryption
  • Plan and configure IRM for eDiscovery
  • Troubleshoot failed IRM protection
  • Configure the scope of an RBAC group
  • Configure an edge transport server
  • Configure send/receive connectors
  • Identify transport rules
  • Configure accepted domains
  • Define e-mail address policies
  • Describe EMS cmdlets
  • Describe EMS deployment and configuration
  • Configure transport rules

Message Records Management

Not only do users want and often need access to their historical e-mail, but you may be compelled through regulatory compliance to retain e-mail for a period of time or to ensure that certain data is never included in most e-mails (perhaps with some exceptions). In this course, we will investigate the technologies and tools for Message Records Management.

Learning Objectives
  • Start the course
  • Design a data loss prevention solution
  • Identify DLP transport rules
  • Set up prebuilt rules
  • Configure custom rules process
  • Configure custom rules XML
  • Implement retention tags step by step
  • Retention policies
  • Configure the managed folder assistant
  • Identify PST cons
  • Archive mailboxes
  • Configure on-premises mailbox archiving with EAC and EMS
  • Implement online archiving for Office 365 and Hybrid
  • Create archive policies
  • Create archive policies and plan for archive storage
  • Plan and delegate RBAC roles for eDiscovery
  • Perform a query-based In-Place Hold
  • Design and configure journaling
  • Implement journaling design and configuration
  • Integrate In-Place federated searches with SharePoint
  • Plan for software update management
  • Define a service level agreement
  • Identify service level agreement metrics
  • Describe Exchange workload management
  • Manage workload policy modifications
  • Manage Exchange user throttling policies
  • Create a policy while managing user throttling policies
  • View monitoring system status
  • Configure archiving

Exchange 2016 Migration, Federation, and Sharing

Increasingly, there is a need to extend access to internal resources by external users in order to integrate an on-premise solution with a cloud-hosted service, and this needs to be done securely. In this course, you will learn how to plan for, test, implement, and configure integration between your on-premise Exchange solution and your cloud-hosted mailboxes. You'll learn how to extend access to your internal users' calendars to a trusted business partner or vendor to speed collaboration. You'll also learn how to use certificates to secure the communications between end points.

Learning Objectives
  • Start the course
  • Describe a hybrid configuration
  • Identify prerequisites for hybrid deployment
  • Deploy and manage a hybrid configuration
  • Describe server deploy assist and remote connectivity analyzer
  • Implement password synchronization
  • Plan and configure certificate and firewall requirements
  • Define Microsoft federation gateways
  • Create federation trust screenshots
  • Identify X.509 requirements for federation
  • Identify firewall requirements for federated sharing
  • Manage sharing policies
  • Create a sharing policy
  • Edit a default sharing policy via EAC
  • Manage organization relationships
  • Describe the certificate requirements for the Microsoft Federation Gateway servers
  • Plan namespaces for coexistence
  • Describe namespace models for Office Online Server
  • Describe namespace models for a regional namespace
  • Identify supported coexistence scenarios
  • Configure proxy redirect
  • Plan firewall configuration for coexistence
  • Implement single and multiphase upgrade
  • Identify Exchange 2016 supported upgrade paths
  • Migrate mailboxes
  • Execute a cross-forest move using the EMS
  • Move the Exchange system mailbox
  • Download the migration scripts
  • Implement namespace models

Planning for and Deploying Mailbox Servers

The first and most crucial step in ensuring a successful implementation is the planning and deployment. Learn what you need to know to get that right the first time. In this course, you'll learn about installation requirements and deployment scenarios including cloud-based and hybrid deployments. Additionally, the most critical failure domain in exchange is the Mailbox Server. Learn the details of the native automatic failover solution in Exchange 2016 so that when an Exchange server fails, only you know about it.

Learning Objectives
  • Start the course
  • Identify standard deployment solutions
  • Describe mail processing
  • Describe system roles, mailbox servers, HTTP proxy, and IIS
  • Define edge protection
  • Describe Outlook client communication
  • Define hybrid deployment
  • Deploy active directory
  • Install Exchange Server
  • Manage Exchange Server
  • Describe the role-based access control model
  • Plan Exchange database size and performance
  • Deploy mailbox server roles
  • Plan archive mailbox capacity and placement
  • Plan Exchange 2016 virtualization
  • Plan public folder capacity and placement
  • Identify public folder planning considerations
  • Describe JetStress utility
  • Describe identification, investigation, and mitigation
  • Create and configure a DAG
  • Define DAG architecture
  • Describe cluster quorum operation
  • Describe cluster quorum
  • Define the DAG deployment process
  • Manage DAG networks
  • Troubleshoot DAG networks
  • Describe AutoReseed
  • Configure DAG NIC
  • Prepare AD and install Exchange

Recovery Strategies And Client Access Services

When disaster strikes, you want to be prepared with time-tested methods for getting back up and running just as quickly as you can. Arm yourself against failure with these proven recovery strategies. You'll examine traditional backup and restore strategies, as well as time-tested methods like Dial Tone restores, as well as the latest options for restoring everything from a single mail item, to a database, to the entire server. Then you'll examine the CAS services in Exchange 2016. As long as Exchange has existed, there have been frontend servers. Exchange 2016 removes the CAS role as a separate install, which is a major architectural change, directly impacting your design. You'll examine the differences between legacy CAS and CAS in 2016, define the interactions between the CAS and Mailbox services, and the client communication process with a focus on the CAS services acting as a stateless proxy.

Learning Objectives
  • Start the course
  • Manage lagged mailbox database copies
  • Describe procedure 1 of activate lagged mailbox database copies
  • Activate a lagged copy of the database
  • Enforce redelivery from safety net
  • Identify backup and restore solutions and strategies
  • Describe Exchange Server recovery
  • Recover mailbox databases
  • Set item-level recovery
  • Set recoverable items retention, folder quota, and alerts
  • Define in-place hold
  • Recover the public folder hierarchy and public folders
  • Perform a dial tone restore
  • Describe the differences between legacy CAS and Exchange CAS
  • Describe the interaction between CAS and mailbox services
  • Define virtual directories
  • Implement virtual directories
  • Define client communication process
  • Use client communication process
  • Describe outlook connectivity to the Exchange 2016 solution
  • Define autodiscover service operation
  • Describe CAS configuration and management tasks
  • Configure Office Online Server (OOS)
  • Use the Exchange recover server option

Understanding Mailflow and Auditing

Designing effective, efficient Exchange solutions is not possible without a thorough understanding of the Transport Pipeline, its component elements, and how they work together to ensure message delivery. In this course, you will explore the mail flow from the internal servers to the external Internet and back again in a number of scenarios. Additionally, you will examine the audit logs to ensure the continuous and uninterrupted security of your messaging infrastructure.

Learning Objectives
  • Start the course
  • Set up redundancy for intrasite scenarios
  • Implement redundancy for intrasite scenarios
  • Describe Exchange 2016 Transport architecture
  • Describe mail flow from an external SMTP with no Edge Transport servers
  • Describe mail flow from an external SMTP with Edge Transport servers
  • Describe mail flow to an external SMTP with no Edge Transport servers
  • Describe mail flow to an external SMTP with Edge Transport servers
  • Identify transport high availability boundary
  • Define shadow redundancy
  • Identify shadow redundancy components
  • Describe safety net operation
  • Describe MX record resilience
  • Implement MX record resilience
  • Describe an ethical wall
  • Describe an ethical wall with distribution groups
  • Create an ethical wall with distribution groups
  • Identify transport rules
  • Create, configure, and deploy message classifications
  • Configure MailTips
  • Configure mailbox audit logging
  • Search the MailboxAuditLog
  • Implement administrative mailbox audit logging
  • Describe audit log fields
  • Prepare search audit logs
  • Configure MX record resilience

Collaboration in Exchange 2016

Today, technology drives efficiency in business by making it easier for people to work together. Discover the native collaboration solutions in Exchange 2016 and exploit the technology to drive business productivity. In this course, you will examine collaboration solutions including Resource, Linked, and Site Mailboxes, as well as distribution groups and permissions.

Learning Objectives
  • Start the course
  • Describe architectural planning
  • Describe addresses and address management
  • Create and configure an offline address book
  • Create and configure public folders
  • Move a public folder item
  • Migrate public folders
  • Define collaboration within Exchange 2013
  • Describe recipients in Exchange 2016
  • Describe resource mailbox configuration and scheduling
  • Configure resource mailboxes and scheduling
  • Identify distribution groups
  • Create and manage distribution groups
  • Describe distribution group naming policy
  • Identify the operation of linked mailboxes
  • Create and manage linked mailboxes
  • Define site mailboxes
  • Describe mailbox permissions
  • Use the EMS to manage folder permissions
  • Manage folder permissions with the EMS
  • Configure mailbox permissions
  • Set up room mailbox delegation
  • Create a distribution group
  • Prepare room mailbox delegation

Design and Secure Remote Access and Multiple Namespaces Solutions

Today, you have to be able to provide secure access to e-mail from virtually any device users might have available to them. Understanding the infrastructure that enables secure remote client access is critical to any Exchange deployment. In this course, you will work through the remote client access requirements and setups from namespace design considerations to load balancing strategies and OWA Policies. Also you will learn how to integrate and support multiple namespaces (tenant organizations) within a single exchange solution.

Learning Objectives
  • Start the course
  • Describe design namespaces for client connectivity
  • Configure URLs
  • Define URL configuration
  • Configure Outlook Web Application (OWA) URLs
  • Describe configuration script
  • Plan for certificates
  • Use the EMS to configure authentication
  • Set internal and external URLs
  • Deploy mobile OOTW and configure OWA policy
  • Apply and disassociate OWA policy using the EAC
  • Identify mobile device access policies
  • Implement load balancing for single namespace
  • Implement load balancing for multiple namespace
  • Describe multiple namespaces with no session affinity
  • Define delivery groups
  • Describe Exchange mail flow
  • Design intersite mail flow routing
  • Design intersite mail flow site links
  • Manage site link cost and hub sites
  • Design interorganization mail flow
  • Define edge transport
  • Describe antispam
  • Describe antispam management
  • Describe antimalware
  • Identify server-hosted antivirus applications
  • Design shared namespaces
  • Apply OWA mailbox policies
Register Now
Designing and Deploying Exchange Server 2016 e-learning bundle
  • Course ID:
  • Duration:
  • Price: