Exchange Server 2010 Presentation and Sample Code Download at TI2011 (Mike Pfeiffer and Harold Wong)

Home > Blogs > Exchange Server > Exchange Server 2010 Presentation and Sample Code Download at TI2011 (Mike Pfeiffer and Harold Wong)

Exchange Server 2010 Presentation and Sample Code Download at TI2011 (Mike Pfeiffer and Harold Wong)

Like This Blog 1 Interface
Added by August 5, 2011

Mike Pfeiffer Exchange Server 2010 instructor at Interface Technical Trainings Tech Immersion 2011

Below are the links to download the Exchange Server 2010 sessions presented by Mike Pfeiffer and Harold Wong at the Interface Tech Immersion 2011.

Mike Pfeiffer is an instructor at Interface Technical Training, Microsoft MVP & Microsoft Certified Master (MCM) in Exchange 2010. Harold Wong is an IT Pro Evangelist with Microsoft.

Session 1: Enterprise Exchange Management with PowerShell

Presenter: Mike Pfeiffer

Get started with the Exchange Management Shell and learn how you can take control of your messaging environment from the command line. In this session, you’ll learn how to take your administrative capabilities to a new level by creating multiple recipients, updating organization wide configuration settings, and generating detailed reports, all in a matter of seconds with simple commands.
Download Session 1 Presentation
Download Session 1 Code

Session 2: Exchange 2010 — High Availability

Presenter: Harold Wong

Dive deep into Exchange 2010 High Availability and discover the inner workings of database availability groups. In this session, you’ll learn how to create, manage, and monitor database availability groups, and go beyond the basics and into advanced topics such as Active Manager, best copy selection, and datacenter activation coordination.
Download Session 2-A Presentation
Download Session 2-B Presentation

Session 3: Exchange 2010 — Role Based Access Control Deep Dive

Presenter: Mike Pfeiffer

Role Based Access Control (RBAC) is the new permissions model in Microsoft Exchange Server 2010 that provides granular control over what administrators and end-users can do in your environment. In this session, you’ll learn how to get started with RBAC, as well as dive deep into advanced topics such as creating custom RBAC roles to meet the specific needs of your organization.
Download Session 3 Presentation
Download  Session 3 Code

Session 4: Exchange 2010 — Transitioning and Coexistence

Presenter: Harold Wong

In this session, you’ll learn how to transition from an existing Exchange 2003 or Exchange 2007 environment to Exchange 2010. We’ll also take you through the requirements and considerations that need to be made when maintaining coexistence between Exchange 2010 and a previous version.
Download Session 4 Presentation

Videos You May Like

Agile Methodology in Project Management

0 154 0

In this video, you will gain an understanding of Agile and Scrum Master Certification terminologies and concepts to help you make better decisions in your Project Management capabilities. Whether you’re a developer looking to obtain an Agile or Scrum Master Certification, or you’re a Project Manager/Product Owner who is attempting to get your product or … Continue reading Agile Methodology in Project Management

Creating Users and Managing Passwords in Microsoft Office 365

0 645 3

In this Office 365 training video, instructor Spike Xavier demonstrates how to create users and manage passwords in Office 365.   For instructor-led Office 365 training classes, see our course schedulle: Spike Xavier SharePoint Instructor – Interface Technical Training Phoenix, AZ 20347: Enabling and Managing Office 365    

Detailed Forensic Investigation of Malware Infections – April 21, 2015

4 608 5

How does an investigator hunt down and identify unknown malware? In this recording of our IT Security training webinar on April 21, 2015, Security expert Mike Danseglio (CISSP / CEH) performed several malware investigations on infected computers and identify symptoms, find root cause, and follow the leads to determine what’s happening. He demonstrated his preferred … Continue reading Detailed Forensic Investigation of Malware Infections – April 21, 2015

Write a Comment

See what people are saying...

  1. Pingback: Interface Tech Immersion 2011 Phoenix, AZ | Session Downloads

Share your thoughts...

Please fill out the comment form below to post a reply.