Configuring and Using MailTips in Exchange 2013
In this demonstration we are going to look at configuring, and using, the MailTips feature that we have here in Exchange 2013. Actually let’s start here over in the shell. We’ll go get organization...
View ArticleConfiguring Claims Provider and Relying Party Trusts in Windows Server 2012
In this brief demo, I wanna show you how you can configure an ADFS, the claims provider trusts, and the relying party trusts. Let’s bring up, in server manager. Now that we’ve installed ADFS that we...
View ArticleConfiguring NLB Affinity and Port Rules in Windows Server 2012
In this brief demo I want to show you how you can configure port rules in your NLB cluster. So once you’ve configured a cluster, you’ve added servers into there, we can define which ports are going to...
View ArticleExamining Transport Components in Exchange Server 2013
So now, let’s take a graphical look at the various transport components that we have in Exchange 2013. I pulled up a good image here from Microsoft that can help us to see this. This is an...
View ArticleConfiguring Domain Security in Exchange Server 2013
Let’s walk through that configuration of domain security that we’ve been talking about. We’re going to go into the EAC. Of course here is where we would configure the certificates, do the initial...
View ArticleLeading the Future for the Cloud Security Profession
David Shearer: I’m here with Jim Reavis, Cloud Security Alliance, the Chief Executive Officer there. It’s very obvious from this conversation that Jim’s a deep thought leader on this topic, and I...
View ArticleThe Need for HCISPPs
Hord Tripton: After a long period of deliberation and research into the health care industry, and with a great number of health care professionals and organizations, it came to us that it was actually...
View ArticleAsk (ISC)² about SSCP
Graham: The difference is that the CISSP is a management level, top-down view. It looks at security across the entire environment. It takes in all aspects of security. The SSEP is a bottom-up approach....
View ArticleCertified Ethical Hacker Version 7
Hello. I am EC-Council Master Instructor, Eric Reed, and I am stoked to be bringing you CEH version 7. We’ve been waiting for this course for quite a while, and let me tell you, it was worth the wait....
View ArticleIntroduction to CompTIA SY0-401 Security+ Certification
Hello, everyone. Welcome to Professor Messer’s CompTIA SY0-401 Security+ training course. I’m James Messer, and I’ll be your host through all of these videos that we’ve made available for you –...
View Article