Implementing a large Exchange Server Organization in independent autonomous (or franchised) sites can be difficult. Guidelines can help companies set up naming conventions, connectors, directory replication, public folders, and address book views.
Using the Internet as a network backbone exposes the network to security risks. Find out how Exchange Server 5.5 protects the IMS by preventing unauthorized access and using encryption to secure message traffic.
In Exchange Server 5.5, Microsoft introduced address-space restrictions to give systems administrators more control over users' access to connectors. You can use this restrictions to configures your organization the way you want it.
Past Sessions Available for Instant Access! Access to Recordings through May 20, 2015
Semester 1: October 30th to December 4th
Semester 2: January 22nd to February 19th
John Savill will cover topics including:
* Deploying, Managing, and Maintaining Windows * Key Features of Active Directory from Windows 2000 to Windows Server 2012 * Key elements of System Center 2012 and System Center 2012 R2 * Deploying, Migrating to and Managing Hyper-V in Your Organization * Implementing a Private Cloud * Using PowerShell to Automate Common Tasks * PLUS a preview of Windows 10