Course Outline

2159 - Deploying and Managing Microsoft Internet Security and Acceleration Server 2000 

 

 

Module 1: Overview of Microsoft ISA Server
The following topics are covered in this module:
Introducing ISA Server
Using Caching
Using Firewalls
Deployment Scenarios for ISA Server.
At the end of this module, you will be able to explain the use of ISA Server as a cache server and as an enterprise firewall. This includes:
 
Explaining the use of ISA Server.
Describing the use of Web caching.
Describing the use of firewalls.
Identifying common deployment scenarios for ISA Server.

 

Module 2: Installing and Maintaining ISA Server
The following topics are covered in this module:
Installing ISA Server
Installing and Configuring ISA Server Clients
Maintaining an ISA Server
At the end of this module, you will be able to install and configure ISA Server as a cache server and as a firewall. This includes:
 
Install ISA Server on a computer running Windows 2000 Server.
Configure computers as Web proxy, Firewall, or SecureNAT clients for ISA Server.
Perform administrative tasks for maintaining ISA Server.

 

Module 3: Enabling Security-Enhanced Internet Access
The following topics are covered in this module:
Accessing Policies and Rules Overview
Creating Policy Elements
Configuring Access Polices and Rules
Configuring Bandwidth Rules
Using ISA Server Authentication
At the end of this module, you will be able to configure access policies to enable security-enhanced Internet access for client computers. This includes:
 
Explaining the use of access policies and rules to enable Internet access.
Creating policy elements.
Configuring access polices and rules.
Configuring bandwidth rules.
Explaining the use of authentication for outgoing Web requests.

 

Module 4: Configuring Caching
The following topics are covered in this module:
Cache Overview
Configuring Cache Policy
Configuring Cache Settings
Configuring Scheduled Content Downloads
At the end of this module, you will be able to configure ISA Server as a caching server. This includes:
 
Describing the cache process that ISA Server uses to process requests from client computers.
Configuring the cache policy.
Configuring cache settings.
Configuring scheduled content downloads.

 

Module 5: Configuring Access for Remote Clients and Networks
The following topics are covered in this module:
VPN Overview
Configuring VPNs
At the end of this module, you will be able to configure VPN access. This includes:
 
Explaining the use of VPNs and ISA Server.
Configuring VPNs by using ISA Server.

 

Module 6: Configuring the Firewall
The following topics are covered in this module:
Securing the Server
Examining Perimeter Networks
Examining Packet Filtering and IP Routing
Configuring Packet Filtering and IP Routing
Configuring Application Filters
At the end of this module, you will be able to configure ISA Server as a firewall. This includes:
 
Securing the ISA Server computer.
Explaining the use of perimeter networks.
Explaining the use of packet filtering and IP routing.
Configuring packet filtering and IP routing.
Configuring application filters.

 

Module 7: Configuring Access to Internal Resources
The following topics are covered in this module:
Introduction to Publishing
Configuring Web Publishing
Configuring Server Publishing
Adding an H.323 Gatekeeper
At the end of this module, you will be able to configure access to selected internal resources. This includes:
 
Explaining the concepts associated with server publishing.
Configuring Web publishing.
Configuring server publishing.
Adding an H.323 Gatekeeper.

 

Module 8: Monitoring and Reporting
The following topics are covered in this module:
Planning a Monitoring and Reporting Strategy
Monitoring Intrusion Detection
Monitoring ISA Server Activity
Analyzing ISA Server Activity by Using Reports
Monitoring Real-Time Activity
Testing the ISA Server Configuration
At the end of this module, you will be able to monitor ISA Server activities by using alerts, logging, reporting, and real-time monitoring. This includes:
 
Planning a strategy for monitoring and reporting ISA Server activities.
Configuring alerts to monitor intrusion detection.
Configuring logging to monitor ISA Server activity.
Using reports to analyze ISA Server activity.
Monitoring ISA Server computer activity.
Testing the ISA Server configuration.

 

Module 9: Configuring ISA Server for an Enterprise
The following topics are covered in this module:
Introducing ISA Server Enterprise Edition
Installing ISA Server in the Enterprise
Using Enterprise Policies and Array Policies
Managing Network Connections
Scaling ISA Server
Extending and Automating ISA Server Functionality
At the end of this module, you will be able to install and configure ISA Server for an enterprise environment. This includes:
 
Describing the use of ISA Server in an enterprise environment.
Installing ISA Server in an enterprise environment.
Using enterprise and array policies.
Scaling ISA Server.
Managing network connections.
Extending and automating ISA Server functionality.