Exclusive
Exchange Server

Designing Microsoft Exchange 2000 for the Enterprise
(Microsoft Training Course: 1573) - 4 days - £2100 exc VAT



> Target Audience
This course is intended for system architects and consultants who are responsible for developing an Exchange 2000 design that is based on the business needs of an organization. Students for this course typically work in medium to large computing environments that have multiple physical locations, mixed client connection protocols, and Internet messaging connectivity.
The audience includes the following:
Senior IT Professionals: These individuals have one or more years of messaging and networking experience, and are ready to go on to an architect role.
Messaging Architects: These individuals are responsible for the design and creation of messaging strategies
> Course outline
  1. Introduction to Designing Exchange 2000 for the Enterprise
  2. Analyzing Active Directory for Exchange 2000
  3. Designing an Administrative Plan
  4. Designing a Routing Topology
  5. Designing a Public Folder Strategy
  6. Designing a Security Strategy
  7. Planning Server Roles and Placement
  8. Designing an Exchange 2000 Management and Operations Plan
  9. Designing an Exchange 2000 Clustering Strategy
  10. Designing an Exchange 2000 Management and Operations
  11. Northwind Traders Design Review


Module 1: Introduction to Designing Exchange 2000 for the Enterprise
  • The following topics are covered in this module:
  • Introduction to the Exchange 2000 Design Process
  • Using the Case Studies in This Course
  • Using the Job Aids in This Course
  • Performing the Labs in This Course
  • Classroom Setup
  • At the end of the module, you will be able to:
  • Identify and describe the basic steps that must be taken in designing an Exchange 2000 organization.
  • Explain how the case studies will be used in this course.
  • Explain how the job aids will be used in this course.
  • Explain how labs are structured in this course.
  • Explain how the classroom is set up for this course.
top
Module 2: Analyzing Active Directory for Exchange 2000
  • The following topics are covered in this module:
  • Reviewing Active Directory Basics.
  • Examining How Exchange 2000 Uses Active Directory.
  • Examining How Exchange 2000 Works with DSAccess.
  • Designing Active Directory Groups for an Exchange 2000 Organization.
  • At the end of this module, you will be able to:
  • Explain how Active Directory works.
  • Explain how Exchange 2000 uses Active Directory.
  • Explain how Exchange 2000 works with DSAccess.
  • Design Active Directory Groups for an Exchange 2000 organization.
top
Module 3: Designing an Administrative Plan
  • The following topics are covered in this module:
  • Introduction to Designing an Administrative Plan.
  • Designing Administrative Groups to Manage Tasks.
  • Delegating Administrative Authority.
  • At the end of this module, you will be able to:
  • Describe the administrative models commonly used to manage servers running Exchange 2000, and explain how various factors and features affect the design of an administrative plan.
  • Create administrative groups to manage administrative tasks and responsibilities.
  • Delegate administrative authority by determining which users need access, what they need access to, and then assigning roles and granting permissions.
top
Module 4: Designing a Routing Topology
  • The following topics are covered in this module:
  • Analyzing the Existing Environment
  • Planning Routing Groups
  • Planning Routing Group Boundaries
  • Planning Message Flow
  • Planning Connectors Between Routing Groups
  • At the end of this module, you will be able to:
  • Analyze the existing business environment and network infrastructure.
  • Plan routing groups.
  • Plan routing group boundaries.
  • Plan message flow.
  • Plan connectors between routing groups.
top
Module 5: Designing a Public Folder Strategy
  • The following topics are covered in this module:
  • Planning a Public Folder Replication Strategy
  • Planning Public Folder Permissions
  • Planning Full-text Indexing
  • At the end of this module, you will be able to:
  • Identify the functions of public folders; determine how to use, organize, and display public folders within an Exchange 2000 organization; and evaluate their effect on an Exchange 2000 design.
  • Plan a public folder replication strategy based on user and company needs.
  • Plan a public folder permission strategy that provides individual and group access as well as default and anonymous permissions.
  • Plan a full-text indexing strategy that balances information access with server load.
top
Module 6: Designing a Security Strategy
  • The following topics are covered in this module:
  • Helping to Protect Against External Security Threats
  • Helping to Protect Against Internal Security Threats
  • Designing an Encryption Strategy
  • Windows 2000 Security Considerations
  • At the end of this module, you will be able to:
  • Identify security risks and describe security best practices.
  • Help protect an Exchange 2000 organization from external security threats.
  • Help protect an Exchange 2000 organization from internal security threats.
  • Design a digital signature and encryption strategy.
  • Outline security considerations that are related to Microsoft Windows® 2000.
top
Module 7: Planning Server Roles and Placement
  • The following topics are covered in this module:
  • Planning Mailbox Servers and Public Folder Servers
  • Planning Connector Servers
  • Planning Front-end/Back-end Servers
  • Planning for Servers Running Active Directory
  • At the end of this module, you will be able to:
  • Plan mailbox servers and plan public folder servers.
  • Plan connector servers.
  • Plan front-end/back-end servers.
  • Plan servers running Active Directory.
  • Discuss the factors to consider when designing server placement.
top
Module 8: Designing an Exchange 2000 Management and Operations Plan
  • The following topics are covered in this module:
  • Introduction to Designing a Highly Available Exchange 2000 Organization
  • Providing Redundant Supporting Services for the Exchange 2000 Organization
  • Providing a Redundant Routing Topology for the Exchange 2000 Organization
  • Designing a Highly Available Internet Client Access Strategy
  • Designing a Highly Available Outlook® Client Access Strategy
  • Providing Redundant Storage for the Exchange 2000 Organization
  • At the end of this module, you will be able to:
  • Design redundant supporting services for the Exchange 2000 organization.
  • Design a redundant routing topology for the Exchange 2000 organization.
  • Design a highly available Internet client access strategy.
  • Design a highly available Microsoft Outlook client access strategy.
  • Design a redundant storage strategy for the Exchange 2000 organization.
top
Module 9: Designing an Exchange 2000 Clustering Strategy
  • The following topics are covered in this module:
  • Introduction to Designing an Exchange 2000 Clustering Strategy
  • Reviewing Key Concepts of Microsoft Windows 2000 Clustering
  • Examining Key Concepts of Exchange 2000 Clustering
  • Designing an Exchange 2000 Clustering Strategy
  • Designing an Appropriate Data Storage Strategy
  • At the end of this module, you will be able to:
  • Describe server clustering.
  • Choose an appropriate clustering model.
  • Design an appropriate data storage strategy.
top
Module 10: Designing an Exchange 2000 Management and Operations
  • The following topics are covered in this module:
  • Introduction to Designing an Exchange 2000 Management and Operations Plan
  • Management and Operations Tools for Exchange 2000
  • Microsoft Operations Manager 2000
  • Designing a Change Plan
  • Designing an Operations Plan
  • Designing a Support Plan
  • Designing an Optimization Plan
  • At the end of this module, you will be able to:
  • Describe service solutions and IT service management functions, and explain how these tools relate to the four plans that comprise a management and operations plan.
  • Explain how to use the default tools provided in Microsoft Windows 2000 and Exchange 2000 to manage and operate an Exchange 2000 environment.
  • Explain how to use Microsoft Operations Manager 2000 to monitor Exchange 2000.
  • Design a change plan.
  • Design an operations plan.
  • Design a support plan.
  • Design an optimization plan.
top
Module 11: Northwind Traders Design Review
  • The following topics are covered in this module:
  • How Northwind Traders Was Configured Before the Labs
  • How Northwind Traders is Now Configured
  • Review of the Northwind Traders Configuration Changes
  • At the end of this module, you will be able to:
  • Explain how Northwind Traders was configured before they began to work on the first lab.
  • Explain how Northwind Traders is configured now that they have completed their work on the last lab.
  • Describe how the work they did in the labs affected the Northwind Traders design.
top
> Pre-Requisites
Complete Course 1560B, Updating Support Skills from Windows NT 4.0 to Windows 2000, or Course 2154A, Implementing and Administering Microsoft Windows 2000 Directory Services, or have an equivalent working knowledge.
  • Complete Course 1572, Implementing and Managing Microsoft Exchange 2000.
  • Have a working knowledge of networking technology, including Transmission Control Protocol/Internet Protocol (TCP/IP), Domain Name System (DNS), and Internet Information Services (IIS).
  • Possess a working knowledge of Internet protocols including Post Office Protocol version 3 (POP3) or Internet Message Access Protocol version 4 (IMAP4), Simple Mail Transfer Protocol (SMTP), Hypertext Transfer Protocol (HTTP), and Network News Transfer Protocol (NNTP).
  • Knowledge of Exchange Server 5.5 is beneficial, but not essential.
> Purpose
At the end of the course, students will be able to:Evaluate the effect of the Active Directory™ directory service design on the Exchange 2000 design. Design an administrative topology. Design a routing topology. Design a public folder topology. Design a security strategy. Plan server roles and placement. Design for high-availaiblity, including implementing clustering technology. Design a management and operations plan.