Tuesday, December 27, 2011

The top five classes of 2011 are….

Welcome back for part two of our countdown of the top ten Microsoft classes of 2011!  Well start it off this week at number 5…

•Install and deploy Exchange Server 2010.
•Configure Mailbox servers and mailbox server components.
•Manage recipient objects.
•Configure the Client Access server role.
•Manage message transport.
•Configure the secure flow of messages between the Exchange Server organization and the Internet.
•Implement a high availability solution for Mailbox servers and other server roles.
•Plan and implement backup and restore for the server roles.
•Plan and configure messaging policy and compliance.
•Configure Exchange Server permissions and security for internal and external access.
•Monitor and maintain the messaging system.
•Transition an Exchange Server 2003 or Exchange Server 2007 organization to Exchange Server 2010.
•Configure the Unified Messaging Server role and Unified Messaging components.
•Implement high availability across multiple sites and implement Federated Sharing

•Describe the Windows Server 2008 environment including the roles, features, and the tools used to perform effective server management.
•Manage the DNS and DHCP server infrastructure roles.
•Configure secure and efficient access to file services.
•Configure and manage Distributed File Systems.
•Manage file resources by using File Server Resource Manager.
•Configure and secure Remote Access.
•Manage Active Directory Domain Services.
•Configure Active Directory object administration and Domain Trust.
•Create and manage Group Policy objects.
•Configure user and computer settings by using Group Policy.
•Implement security settings by using Group Policy.
•Provide efficient network access for remote offices.
•Monitor and maintain Windows Server 2008.
•Manage Windows Server 2008 backup, restore, and recovery

•Install and configure servers.
•Configure and troubleshoot DNS.
•Configure and manage WINS.
•Configure and troubleshoot DHCP.
•Configure and troubleshoot IPv6 TCP/IP.
•Configure and troubleshoot Routing and Remote Access.
•Install, configure, and troubleshoot the Network Policy Server Role service.
•Configure Network Access Protection.
•Configure IPsec.
•Monitor and troubleshoot IPsec.
•Configure and manage Distributed File System.
•Configure and manage storage technologies.
•Configure availability of network resources and content.
•Configure server security compliance.

•Perform a clean installation of Windows 7, upgrade to Windows 7, and migrate user-related data and settings from an earlier version of Windows.
•Configure disks, partitions, volumes, and device drivers to enable a Windows 7 client computer.
•Configure file access and printers on a Windows 7 client computer.
•Configure network connectivity on a Windows 7 client computer.
•Configure wireless network connectivity on a Windows 7 client computer.
•Secure Windows 7 client desktop computers.
•Optimize and maintain the performance and reliability of a Windows 7 client computer.
•Configure mobile computing and remote access settings for a Windows 7 client computer.

And the number one most popular class in 2011 was…
This five-day instructor-led course provides to teach Active Directory Technology Specialists with the knowledge and skills to configure Active Directory Domain Services in a distributed environment, implement Group Policies, perform backup and restore, and monitor and troubleshoot Active Directory related issues. After completing this course students will be able to configure AD DS in their Windows Server 2008 and Windows server 2008 R2 environments.
After completing this course, students will be able to implement and configure Active Directory domain services in their enterprise environment.
Happy Holidays!
-Matt

Wednesday, December 21, 2011

Have you taken one of the top ten Microsoft classes this year? Part 1

It seems like everyone is doing countdowns this time of the year, so why not?  This will be part one of a two part blog that will highlight the ten most popular Microsoft courses for 2011.  These classes should still be popular in 2012, so this will give everyone a chance to look at the best courses the big M is putting out, and the next class date.  Let’s get it started with number 10…
   •Describe identity and access solutions.
   •Configure Active Directory Certificate Services.
   •Deploy and manage certificates.
   •Configure Active Directory Lightweight Directory Services.
   •Configure Active Directory Federation Services.
   •Configure Active Directory Rights Management Services.
   •Maintain access management solutions.
   •Troubleshoot identity and access solutions

·        Describe the uses of and ways to execute the Transact-SQL language.
·        Use querying tools.
·        Write SELECT queries to retrieve data.
·        Group and summarize data by using Transact-SQL.
·        Join data from multiple tables.
·        Write queries that retrieve and modify data by using subqueries.
·        Modify data in tables.
·        Query text fields with full-text search.
·        Describe how to create programming objects.
·        Use various techniques when working with complex queries.

·        Prepare for and install SharePoint 2010
·        Configure the fundamental service and logical components of a SharePoint Implementation
·        Administer SharePoint using the user interface, the command line, and Windows PowerShell
·        Manage content in Lists and Libraries
·        Administer identities and authentication
·        Secure content in SharePoint sites
·        Manage customizations to a SharePoint implementation
·        Configure SharePoint services and applications
·        Configure SharePoint social networking features
·        Manage SharePoint search
·        Configure farms, servers, service applications, and web applications
·        Install, upgrade, configure, and operate a SharePoint farm
·        Configure high availability and recoverability
·        Monitor and optimize SharePoint performance


·        Create a WPF application.
·        Build a user interface in a WPF application.
·        Customize the appearance of a WPF application.
·        Bind user interface controls to data sources.
·        Bind user interface controls to collections.
·        Create new controls in a WPF application.
·        Manage documents in a WPF application.
·        Add graphics and multimedia support to a WPF application.
·        Configure and deploy WPF applications.

·        Explain SQL Server 2008 R2 architecture resources requirements and perform prechecks of IO
·        subsystems
·        Plan install and configure SQL Server 2008 R2
·        Backup and restore databases
·        Import and export wizards and explain how they relate to SSIS
·        Use BCP and BULK INSERT to import data
·        Manage security
·        Assign configure fixed database roles and create and assign user defined database roles
·        Configure and assign permissions
·        Implement SQL Server 2008 R2 Audits
·        Manage SQL Server 2008 R2 Agent and Jobs
·        Configure database mails alerts and notifications
·        Maintain databases
·        Configure SQL Profiler Traces and Use the Database Tuning Advisor
·        Monitor data by using Dynamic Management Views
·        Execute multiserver queries and configure a central management server
·        Deploy a datatierapplication
·        Troubleshoot common issues

Be sure to check back next week for part two of this countdown, and find out what the number one Microsoft class of 2011 was!
-Matt

Thursday, December 15, 2011

At the Forefront of Security

When it comes to policy management, data synchronization and user self-service Forefront Identity Manager handles it all.  Computerworld has a nice look at all three areas.

Policy Management
Forefront Identity Manager’s view of identity management is that employees, their roles and their eventual authorizations and authentication should all fall under the purview of policies. Administrators familiar with Group Policy in Windows will find this metaphor holds well. These policies consist of rules that you, as the administrator, can create to dictate what happens when certain actions take place.
These policies that you define are kicked off and then subsequently managed by the Windows Workflow Foundation.  This provides a powerful base for all sorts of interesting and complex workflows, with nesting, conditions and multiple branches. If your group has already invested in creating rules via WF, you can very simply import them into FIM and use and further customize them from within FIM, saving you from reinvesting the time necessary to create the workflows again in a different tool. If you have a proficient developer staff, you can also create workflows in Visual Studio and export them for use within FIM.

Data Synchronization
The core of any identity management product, FIM included, is the ability to keep multiple systems –often on different platforms, from different vendors, with different databases — synchronized as often as possible. The goal is for changes initiated by any system to be replicated accurately and efficiently up and down the chain of related systems.
FIM’s core, a synchronization service, manages the data coming into and out of FIM and handles communicating with the target systems — and in most cases it does so using standards or direct API support with each system. In other words, no messy agents need run on most of these systems.
All of these synchronization actions can be gated via the workflow system so that administrators or other designated personnel have to approve changes before they are sequenced throughout your organization — most helpful for creating and deleting users, but also helpful depending on the sensitivity of the systems in your network.

User Self-Service
One of the big points of emphasis in FIM 2010 is the delegation of simple administrative tasks to users themselves. From resetting passwords to managing distribution groups, FIM’s We- portal makes it reasonably simple for users to manage their group memberships, profile information (like addresses and office and mobile phone numbers, for example) and passwords themselves, without involving a help desk call.

You can check out the full article on testing FIM 2010 by Jonathan Hassell here.
If you’re looking to deploy FIM 2010 in your organization and need to ramp up on all of its little intricacies check out our M-50382 class coming up on 1/10/12 and then again on 2/21/12.

After completing this course, you will be able to:
•Understand FIM concepts and components.
•Identify appropriate FIM scenarios.
•Manage users, groups, and passwords using FIM.
•Synchronize identity data across systems, such as Active Directory and HR.
•Understand the issues involved in loading data (initial load, backup, and disaster recovery).
•Configure security for different levels of user.
•Manage password self-service reset and synchronization.
•Automate run cycles.
•Handle sets, simple workflows, and management policy rules (MPRs).
We also have a couple other Forefront classes you should checkout.


 After completing this course, you will be able to:
•Understand the new features and the value proposition for Forefront TMG.
•Explain how Forefront TMG protects clients and servers from Web-based threats.
•Describe how Forefront TMG enable outside systems to secure connect to internal services and applications.
•Describe how Forefront TMG integrates with Forefront Protection 2010 for Exchange and Microsoft Exchange Server 2010 to protect an organization from mail-based threats.
•Design an enterprise solution using Forefront TMG considering availability, scalability, operations, and migration from an existing Microsoft Internet Security and Acceleration (ISA) solution.


After completing this course, you will be able to:
•Understand the new features and the value proposition for the different product and technologies that are part of the Microsoft Forefront Protection Suite.
•Explain how Microsoft Forefront Threat Management Gateway 2010 can provide secure mail relay functionality combined with Microsoft Forefront Protection 2010 for Exchange Server and Microsoft Exchange Edge server role.
•Describe how Forefront Protection 2010 for Exchange Server and Microsoft Forefront Online Protection for Exchange protect an organization from mail-based threats.
•Describe how Microsoft Forefront Protection 2010 for SharePoint protects the organization from threats involving data in SharePoint Server sites.
•Understand how the Exchange Server and SharePoint Server security solutions are integrated and managed from Microsoft Forefront Protection Manager.

-Matt

Thursday, December 8, 2011

Is Windows 8 the Next Big Thing?

CNET News has a great article out about the looming Windows 8 release in 2012.

The rumor is that Microsoft Windows 8 may be largely irrelevant to users of traditional PC’s.  Research has shown that since the release of the Windows 8 Developer Preview in September, Microsoft has been battered by criticism from desktop users over the new Metro interface. In addition to those who just don’t like the new look and feel, many have complained that the touch-based UI simply doesn’t work well with a mouse and keyboard.  In fact, Microsoft is actually telling organizations currently running Windows XP to jump to Windows 7 instead of waiting around for Windows 8.

Maybe you believe that Windows 8 will be a flop, or maybe you’re just not ready to move away from Windows 7.  Either way, we here at Babsim have the perfect classes to make you a pro at using every little bit of Windows 7.  Check out our upcoming classes below.


1/3/12-1/5/12 and 3/5/12

After completing this course, students will be able to troubleshoot:
  • Startup issues on a computer with Windows 7 installed.
  • Issues related to the application of Group Policy.
  • Issues related to hardware devices and device drivers.
  • Issues related to network connectivity.
  • Remote connectivity issues.
  • User profile and logon script issues.
  • Issues related to security systems such as Encrypting File Systems (EFS), BitLocker, and file permissions.
  • Issues related to operating system features and applications.
    Issues related to performance.

1/30/12-2/3/12 and 3/5/12-3/9/12

After completing this Windows 7 training course, students will be able to:
• Plan and perform effective preparation tasks for deploying Windows 7.
• Describe and compare various deployment methods to determine the best deployment method for your scenario.
• Assess and resolve application compatibility issues.
• Assess and evaluate business needs and requirements to design a standard image.
• Configure system, security and Internet Explorer settings to define the client environment.
• Describe the tools and methods to perform automated installation in Windows 7.
• Deploy images using WAIK.
• Deploy images using WDS.
• Deploy images using Lite Touch installation
• Use MDT 2010 to deploy Windows 7 using Zero Touch installation technologies
• Migrate user state using USMT 4.0.
• Create and implement a strategy to deploy applications and updates
• Perform an end-to-end Windows 7 Deployment


2/1/12-2/3/12

After completing this course, students will be able to:
•Perform a clean installation of Windows 7, upgrade to Windows 7, and migrate user-related data and settings from an earlier version of Windows.
•Configure disks, partitions, volumes, and device drivers to enable a Windows 7 client computer.
•Configure file access and printers on a Windows 7 client computer.
•Configure network connectivity on a Windows 7 client computer.
•Configure wireless network connectivity on a Windows 7 client computer.
•Secure Windows 7 client desktop computers.
•Optimize and maintain the performance and reliability of a Windows 7 client computer.
•Configure mobile computing and remote access settings for a Windows 7 client computer.

To view the whole CNET article click here.

-Matt