Exclusive
Web Development

Deploying and Managing Microsoft Internet Security and Acceleration Server 2000
(Microsoft Training Course: 2159) - 3 days - £1700 exc VAT



> Target Audience
This course is intended for IT professionals and is not intended for network architects. Three of the major job roles performed by IT professionals to be addressed by this course include Web administrators, network administrators, and security administrators
> Course outline
  1. Overview of Microsoft ISA Server
  2. Installing and Maintaining ISA Server
  3. Enabling Security-Enhanced Internet Access
  4. Configuring Caching
  5. Configuring Access for Remote Clients and Networks
  6. Configuring the Firewall
  7. Configuring Access to Internal Resources
  8. Monitoring and Reporting
  9. Configuring ISA Server for an Enterprise


Module 1: Overview of Microsoft ISA Server
  • The following topics are covered in this module:
  • Introducing ISA Server
  • Using Caching
  • Using Firewalls
  • Deployment Scenarios for ISA Server.
  • At the end of this module, you will be able to explain the use of ISA Server as a cache server and as an enterprise firewall. This includes:
  • Explaining the use of ISA Server.
  • Describing the use of Web caching.
  • Describing the use of firewalls.
  • Identifying common deployment scenarios for ISA Server.
top
Module 2: Installing and Maintaining ISA Server
  • The following topics are covered in this module:
  • Installing ISA Server
  • Installing and Configuring ISA Server Clients
  • Maintaining an ISA Server
  • At the end of this module, you will be able to install and configure ISA Server as a cache server and as a firewall. This includes:
  • Install ISA Server on a computer running Windows 2000 Server.
  • Configure computers as Web proxy, Firewall, or SecureNAT clients for ISA Server.
  • Perform administrative tasks for maintaining ISA Server.
top
Module 3: Enabling Security-Enhanced Internet Access
  • The following topics are covered in this module:
  • Accessing Policies and Rules Overview
  • Creating Policy Elements
  • Configuring Access Polices and Rules
  • Configuring Bandwidth Rules
  • Using ISA Server Authentication
  • At the end of this module, you will be able to configure access policies to enable security-enhanced Internet access for client computers. This includes:
  • Explaining the use of access policies and rules to enable Internet access.
  • Creating policy elements.
  • Configuring access polices and rules.
  • Configuring bandwidth rules.
  • Explaining the use of authentication for outgoing Web requests.
top
Module 4: Configuring Caching
  • The following topics are covered in this module:
  • Cache Overview
  • Configuring Cache Policy
  • Configuring Cache Settings
  • Configuring Scheduled Content Downloads
  • At the end of this module, you will be able to configure ISA Server as a caching server. This includes:
  • Describing the cache process that ISA Server uses to process requests from client computers.
  • Configuring the cache policy.
  • Configuring cache settings.
  • Configuring scheduled content downloads.
top
Module 5: Configuring Access for Remote Clients and Networks
  • The following topics are covered in this module:
  • VPN Overview
  • Configuring VPNs
  • At the end of this module, you will be able to configure VPN access. This includes:
  • Explaining the use of VPNs and ISA Server.
  • Configuring VPNs by using ISA Server.
top
Module 6: Configuring the Firewall
  • The following topics are covered in this module:
  • Securing the Server
  • Examining Perimeter Networks
  • Examining Packet Filtering and IP Routing
  • Configuring Packet Filtering and IP Routing
  • Configuring Application Filters
  • At the end of this module, you will be able to configure ISA Server as a firewall. This includes:
  • Securing the ISA Server computer.
  • Explaining the use of perimeter networks.
  • Explaining the use of packet filtering and IP routing.
  • Configuring packet filtering and IP routing.
  • Configuring application filters.
top
Module 7: Configuring Access to Internal Resources
  • The following topics are covered in this module:
  • Introduction to Publishing
  • Configuring Web Publishing
  • Configuring Server Publishing
  • Adding an H.323 Gatekeeper
  • At the end of this module, you will be able to configure access to selected internal resources. This includes:
  • Explaining the concepts associated with server publishing.
  • Configuring Web publishing.
  • Configuring server publishing.
  • Adding an H.323 Gatekeeper.
top
Module 8: Monitoring and Reporting
  • The following topics are covered in this module:
  • Planning a Monitoring and Reporting Strategy
  • Monitoring Intrusion Detection
  • Monitoring ISA Server Activity
  • Analyzing ISA Server Activity by Using Reports
  • Monitoring Real-Time Activity
  • Testing the ISA Server Configuration
  • At the end of this module, you will be able to monitor ISA Server activities by using alerts, logging, reporting, and real-time monitoring. This includes:
  • Planning a strategy for monitoring and reporting ISA Server activities.
  • Configuring alerts to monitor intrusion detection.
  • Configuring logging to monitor ISA Server activity.
  • Using reports to analyze ISA Server activity.
  • Monitoring ISA Server computer activity.
  • Testing the ISA Server configuration.
top
Module 9: Configuring ISA Server for an Enterprise
  • The following topics are covered in this module:
  • Introducing ISA Server Enterprise Edition
  • Installing ISA Server in the Enterprise
  • Using Enterprise Policies and Array Policies
  • Managing Network Connections
  • Scaling ISA Server
  • Extending and Automating ISA Server Functionality
  • At the end of this module, you will be able to install and configure ISA Server for an enterprise environment. This includes:
  • Describing the use of ISA Server in an enterprise environment.
  • Installing ISA Server in an enterprise environment.
  • Using enterprise and array policies.
  • Scaling ISA Server.
  • Managing network connections.
  • Extending and automating ISA Server functionality
  • The following topics are covered in this module:
  • Introducing ISA Server Enterprise Edition
  • Installing ISA Server in the Enterprise
  • Using Enterprise Policies and Array Policies
  • Managing Network Connections
  • Scaling ISA Server
  • Extending and Automating ISA Server Functionality
  • At the end of this module, you will be able to install and configure ISA Server for an enterprise environment. This includes:
  • Describing the use of ISA Server in an enterprise environment.
  • Installing ISA Server in an enterprise environment.
  • Using enterprise and array policies.
  • Scaling ISA Server.
  • Managing network connections.
  • Extending and automating ISA Server functionality.
top
> Pre-Requisites
Successfully completed Course 2152, Implementing Microsoft Windows 2000 Professional and Server or have equivalent knowledge of Microsoft Windows® 2000 Professional and Windows 2000 Server.
  • Successfully completed Course 2153, Implementing a Microsoft Windows 2000 Network Infrastructure.
  • The course materials, lectures, and lab exercises are in English. To benefit fully from the instruction, students need an understanding of the English language and completion of the prerequisites.
> Purpose
At the end of the course, students will be able to:Explain the use of ISA Server as a cache server and as an enterprise firewall. Install and configure ISA Server as a cache server and as a firewall. Configure access policies to enable security-enhanced Internet access for client computers. Configure ISA Server as a cache server. Configure ISA Server as a virtual private network (VPN). Configure ISA Server as a firewall. Configure access to selected internal resources. Monitor ISA Server activities by using alerts, logging, reporting, and real-time monitoring. Install and configure ISA Server for an enterprise environment.