Overview
This one-day instructor-led course provides students with the knowledge and skills to envision, design, and deploy security solutions based on the Microsoft Forefront suite that protect organizations using Microsoft Exchange Server and Microsoft SharePoint Server, enabling them to identify the requirements and make the appropriate design decisions that will come up during the deployment process, and providing hands-on experience with the products.
Audience Profile
This course is intended for Architects, Consultants, and Technical Sales Professionals involved in designing, deploying, or operating security solutions.
Prerequisites
- A good understanding of Active Directory and Group Policies.
- Basic knowledge of Microsoft Exchange Server 2007 and Microsoft Office SharePoint Server 2007.
Delegates will learn how to
- Understand the new features and the value proposition for the different product and technologies that are part of the Microsoft Forefront Protection Suite.
- Explain how Microsoft Forefront Threat Management Gateway 2010 can provide secure mail relay functionality combined with Microsoft Forefront Protection 2010 for Exchange Server and Microsoft Exchange Edge server role.
- Describe how Forefront Protection 2010 for Exchange Server and Microsoft Forefront Online Protection for Exchange protect an organization from mail-based threats.
- Describe how Microsoft Forefront Protection 2010 for SharePoint protects the organization from threats involving data in SharePoint Server sites.
- Understand how the Exchange Server and SharePoint Server security solutions are integrated and managed from Microsoft Forefront Protection Manager.
Course Outline
Module 1: Secure Mail Relay using Forefront Threat Management Gateway 2010
This module explains how Forefront Threat Management Gateway 2010 and Forefront Protection 2010 for Exchange Server can work together with Microsoft Exchange Server to provide premium antispam and antimalware protection at the network edge.
Lessons
- Secure Mail Relay Overview
- Solution Components
- Configuring SMTP Protection
Lab : Secure Mail Relay using Forefront Threat Management Gateway 2010 (Release Candidate)
- Install Forefront TMG to provide secure mail relay functionality between Contoso and the Internet
- Perform an initial configuration of Forefront TMG using the Getting Started wizards
- Configure the Exchange Edge Transport role on the Forefront TMG server using the Exchange EdgeSync service
- Explore antispam and antimalware protection of Internet e-mail
After completing this module, students will be able to:
- Describe the mail threats facing organization, and explain the key Forefront features that address those threats.
- Explain how Forefront Threat Management Gateway and Forefront Protection 2010 for Exchange Server are deployed together for premium antispam and antimalware protection at the network edge.
- Describe in detail how the solution performs spam filtering, malware filtering, and content filtering.
- Describe the implementation process for this scenario and how the solution is configured.
Module 2: Forefront Protection 2010 for Exchange Server
This module explains how Forefront Protection 2010 for Exchange Server protects organizations from spam and malware coming from Internet mail.
Lessons
- Forefront Protection 2010 for Exchange Server (FPE) Overview
- FPE Management
- Deployment Considerations
- Engine and Definition Updates
- Antimalware Protection
- Antispam Protection
- Content Filtering
- Operations
Lab : Forefront Protection 2010 for Exchange Server
- Install Forefront Protection 2010 for Exchange Server on a Microsoft Exchange Server
- Configure filters based on attachment file type or keywords in e-mail content
- Recap the antispam functionality
After completing this module, students will be able to:
- Describe the history of Forefront Antigen and Forefront Security products for Exchange Server, and explain the value proposition for Forefront Protection 2010 for Exchange Server.
- Describe how Forefront Protection 2010 for Exchange Server integrates into Microsoft Exchange Server, the solution architecture, and the different deployment topologies.
- Explain how the solution is managed, including the different configuration and update options.
- Describe the product installation and configuration process.
ModuleĀ 3: Forefront Online Protection for Exchange
This module explains how Forefront Online Protection for Exchange provides Internet-based mail protection to enterprise organizations.
Lessons
- Forefront Online Protection for Exchange (FOPE) Overview
- Hybrid Scenario with Forefront Protection 2010 for Exchange Server
- Deploying Forefront Online Protection for Exchange
After completing this module, students will be able to:
- List the main features and explain value proposition of Forefront Online Protection for Exchange.
- Describe how it should be positioned related to Forefront Protection 2010 for Exchange Server solutions and how both solutions can work together.
- Explain the deployment process for FOPE.
Module 4: Forefront Protection 2010 for SharePoint
This module explains how Forefront Protection 2010 for SharePoint prevents users from uploading or downloading documents containing malware, out-of-policy content, or sensitive information to SharePoint libraries.
Lessons
- Forefront Protection 2010 for SharePoint (FPSP) Overview
- Solution Components
- Deployment Considerations
- Engine and Definition Updates
- Antimalware Scanning
- Content Filtering
- Operations
Lab : Forefront Protection 2010 for SharePoint (Beta 2 Refresh)
- Install Forefront Protection 2010 for SharePoint
- Configure filters based on file name/file type, or keywords in document content
- Use Windows PowerShell to manage filters and troubleshoot issues
After completing this module, students will be able to:
- Describe the history of Forefront Security products for SharePoint, and explain the value proposition for Forefront Protection 2010 for SharePoint.
- Describe how it integrates into Microsoft Office SharePoint Server, the solution architecture and the different deployment topologies.
- Explain how the solution is managed, including the different configuration and update options.
- Describe the product installation and configuration process.