|
Certkingdom's preparation material includes the most excellent features, prepared by the same dedicated experts who have come together to offer an integrated solution. We provide the most excellent and simple method to pass your certification exams on the first attempt "GUARANTEED"
Whether you want to improve your skills, expertise or career growth, with Certkingdom's training and certification resources help you achieve your goals. Our exams files feature hands-on tasks and real-world scenarios; in just a matter of days, you'll be more productive and embracing new technology standards. Our online resources and events enable you to focus on learning just what you want on your timeframe. You get access to every exams files and there continuously update our study materials; these exam updates are supplied free of charge to our valued customers. Get the best 70-162 exam Training; as you study from our exam-files "Best Materials Great Results"
70-162 Exam + Online / Offline and Android Testing Engine & 4500+ other exams included
$50 - $25 (you save $25)
Buy Now
Exam 70-162:
TS: Forefront Protection for Endpoints and Applications, Configuring
Audience Profile
This exam is for Consultants that implement Microsoft Forefront technologies for medium to large clients. This exam will focus on Forefront Security products (FEP, FPE, FPS). Candidates should have at least two years of experience in desktop administration and Microsoft Windows server administration as well as knowledge of malware, anti-virus, and spam protection technologies.
Credit Toward Certification
When you pass Exam 70-162: TS: Forefront Protection for Endpoints and Applications, Configuring, you complete the requirements for the following certification(s):
Microsoft Certified Technology Specialist (MCTS): Forefront Endpoint and Application Protection, Configuration
This Training will Cover
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam.
Deploying Forefront Endpoint Protection 2010, Forefront Protection 2010 for Exchange Server, and Forefront Protection 2010 for SharePoint (24 percent)
Plan and implement a Forefront Endpoint Protection (FEP) topology.
This objective may include but is not limited to: where to install the remote reporting database; install FEP server components; WSUS configuration, System Center Configuration Manager single site vs. hierarchy considerations (reporting)
Design and install Forefront Protection for Exchange Server (FPE) and Forefront Protection for SharePoint (FPSP) components.
This objective may include but is not limited to: import and export configuration settings from and to multiple servers, deciding which server roles to install on (Mailbox, Hub Transport, and Edge), High Availability
Customize the System Center Configuration Manager and System Center Operations Manager configuration for FEP implementations.
This objective may include but is not limited to: create a collection in Configuration Manager, SUP configuration, configure advertisements, configure agent components, import security management pack (SMP), create custom Desired Configuration Management (DCM) baselines and configuration items
Deploy the FEP client.
This objective may include but is not limited to: operating system prerequisites, uninstall existing anti-virus software including Forefront Client Security (FCS), deploy Operations Manager and Configuration Manager agents to workgroup computers and to domain-joined computers, deploy using Configuration Manager, deploy using Group Policy, deploy manually, setup switches
Maintaining Endpoint and Application Protection (26 percent)
Configure Operations Manager Management Pack for FEP.
This objective may include but is not limited to: alerts, notifications, and monitoring
Configure alerts, notifications, and monitoring for FEP by using Configuration Manager.
This objective may include but is not limited to: reporting, SQL reporting services, creating subscriptions using DCM, collections and FEP console
Remediate FEP client issues.
This objective may include but is not limited to: using Operations Manager tasks; changes to policies; validate or audit FEP; client log files; quarantine; uninstall the FEP client, initiate client scan using Configuration Manager, remediating a locally removed client, diagnose and resolve a malware outbreak
Configure alerts, notifications, monitoring, and quarantine for FPE and FPSP.
This objective may include but is not limited to: email notifications, email alerts, Operations Manager alerts; set quarantine policy
Configuring the FEP Client (25 percent)
Configure FEP clients by using Configuration Manager.
This objective may include but is not limited to: create and manage policy using Configuration Manager, configure definitions within the client policy, export from Configuration Manager, choose which template to use, select exclusions
Configure the FEP client by using Group Policy.
This objective may include but is not limited to: import FEP configuration options into Group Policy (ADMX, ADML, FEP2010GPTool.exe), merge FEP policies, Group Policy precedence, manage Group Policy templates
Configure FEP clients manually.
This objective may include but is not limited to: import XML files, configure using the FEP Console, how to add an exclusion, how to disable, local vs. domain Group Policy precedence
Configuring FPE and FPSP Application Protection (25 percent)
Configure anti-spam protection by using FPE.
This objective may include but is not limited to: configure filter lists by keyword and by content, file filtering by name and/or by type, filtering by source, destination domain, or sender ID, block lists, backscatter
Configure anti-malware protection by using FPE.
This objective may include but is not limited to: different types of scans, perform an on-demand scan, configure real-time scan, configure scanning engines, definition distribution, optimize performance of the scan engine
Configure application protection with FPSP.
This objective may include but is not limited to: manage filter lists by keyword and by content, manage file filtering by name and/or by type, perform an on-demand scan, configure real-time scan, configure scanning engines, definition distribution, optimize performance of the scan engine
Diagnose and resolve malware and spam outbreaks.
This objective may include but is not limited to: read event logs, infected documents, and attachments