Learn your way! Get started

Implementing ISA 2004

with expert Rafiq Wayani


Course at a glance

Included in these subscriptions:

  • Dev & IT Pro Video
  • Dev & IT Pro Power Pack

Release date 6/14/2006
Level Advanced
Runtime 5h 2m
Closed captioning N/A
Transcript N/A
eBooks / courseware N/A
Hands-on labs N/A
Sample code N/A
Exams Included
Platform Internet Explorer Only


Enterprise Solutions

Need reporting, custom learning tracks, or SCORM? Learn More



Course description

Implementing Microsoft Internet Security And Acceleration (ISA) Server 2004 course will give you the knowledge and skills necessary to prepare to pass Microsoft exam 70-350. This course serves as an elective course for individuals pursuing the MCSA or MCSE on Windows Server 2003 certification.

Meet the expert

Rafiq Wayani has extensive experience including more than 20 years in IT as Systems Architect, Software Engineer, DBA, and Project Manager. Wayani has instructed in a variety of technical areas, has designed and implemented network and information systems, and is certified across a wide range of platforms and systems including Microsoft Solutions Developer, Systems Engineer, Application Developer, Database Administrator, Trainer; Novell Netware Administrator and Engineer; Master Certified Netware Engineer; and A Certified.

Course outline



Module 1

Planning / Installing (19:34)
  • Introduction (00:58)
  • Benefits of ISA Server (03:00)
  • New Features in ISA 2004 (01:15)
  • Use for ISA Server (04:42)
  • Install ISA Server 2004 (07:02)
  • ISA Server Mgmt. Console (02:14)
  • Summary (00:19)
Configuring (46:11)
  • Introduction (01:03)
  • ISA Min. Hardware Req. (04:00)
  • ISA Default Configuration (06:38)
  • Types of Clients (02:20)
  • ISA Server Mgmt. Console (01:00)
  • ISA Services/Log Files (02:12)
  • ISA Default Configuration (00:49)
  • View LastDefaultRule (02:42)
  • Create a New Access Rule (02:37)
  • Setup a Web Proxy Client (01:14)
  • Setup a Firewall Client (03:39)
  • Setup a SecureNAT Client (02:09)
  • Adv. Firewall Client Config. (02:47)
  • Web Proxy Auto. Discovery (03:42)
  • Local Domain Table (01:37)
  • View Client Firewall .ini files (02:07)
  • View/Publish the WPAD (03:51)
  • Specify the LDT (01:12)
  • Summary (00:24)

Module 2

Managing (21:32)
  • Introduction (00:36)
  • Use ISA as a Proxy Server (03:39)
  • Reasons to Use Proxy Server (03:44)
  • DNS Configuration (01:24)
  • Create/Test Firewall Policies (11:29)
  • Summary (00:39)
Multiple Network Support (37:03)
  • Introduction (00:48)
  • Overview (05:57)
  • Default ISA Networks (02:58)
  • ISA Definitions (01:53)
  • Access Rules (02:59)
  • Authentication Methods (03:43)
  • Troubleshooting Access (03:10)
  • View/Configure Access Rules (00:28)
  • View Firewall Policy Tasks (00:18)
  • System Policy Tasks/Editor (00:33)
  • SP: Network Services (01:53)
  • SP: Authentication Services (01:38)
  • SP: Remote Mgmt (01:51)
  • SP: Firewall Client (00:09)
  • SP: Diagnostic Services (01:21)
  • SP: Logging (00:10)
  • SP: Remote Monitoring (01:02)
  • SP: Other Policies (00:55)
  • Create a New Access Rule (01:59)
  • Proxy Server Properties (00:52)
  • Select Auth. Mechanisms (02:01)
  • Summary (00:17)

Module 3

Net Load Balancing / Backup (21:41)
  • Introduction (00:43)
  • Cache Array Routing Protocol (03:46)
  • Benefits of CARP (01:39)
  • Implementations: Client-side (01:11)
  • Implementations: Server-side (00:47)
  • Overview: Disaster Recovery (04:21)
  • Define ISA Admin Roles (03:01)
  • Backup ISA Server (04:15)
  • Restore ISA Server (01:26)
  • Summary (00:27)
ISA Enterprise Edition (18:18)
  • Introduction (00:43)
  • Reasons to Deploy (02:37)
  • Active Directory App. Mode (00:46)
  • Enterprise Policies (00:27)
  • Enterprise Networks (01:22)
  • Arrays (00:20)
  • Array Policies (00:31)
  • Insert Server into an Array (00:36)
  • ISA Server Array Member (03:38)
  • Cache Array Routing Protocol (00:35)
  • Adjust CARP Load Factor (01:17)
  • Network Load Balancing (NLB) (02:25)
  • Enable NLB (02:16)
  • Summary (00:38)
Monitoring / Reporting (13:16)
  • Introduction (00:34)
  • Overview (04:45)
  • Monitoring (00:46)
  • Drill Down Into Alerts (00:46)
  • Drill Down Into Sessions (00:21)
  • Drill Down Into Reports (00:09)
  • Generate a Summary Report (01:04)
  • View the Summary Report (00:56)
  • Generate a Detail Report (00:29)
  • View the Detail Report (01:15)
  • Configure Report Jobs (00:56)
  • Configure Log Summaries (00:37)
  • Summary (00:30)

Module 4

Configuring ISA Firewall (25:28)
  • Introduction (00:35)
  • TCP/IP Packets Overview (03:16)
  • Filtering Packets (01:32)
  • Filtering Network Traffic (02:39)
  • ISA Firewall Configuration (03:28)
  • Perimeter Network Config. (03:39)
  • Example: Edge Firewall (00:46)
  • Other Firewall Type Templates (02:10)
  • Intrusion Detection (01:19)
  • Types of IP Attacks (02:03)
  • DNS / POP Intrusions (01:00)
  • Configure Intrusion Detection (02:17)
  • Summary (00:38)
IP Pref. and Publishing Rules (24:19)
  • Introduction (00:31)
  • IP Preferences (02:06)
  • Configure IP Preferences (01:25)
  • Web Publishing Rules (02:36)
  • Secure Web Publishing Rules (00:55)
  • Publish a Web Server (01:46)
  • Configure HTTP (00:45)
  • View/Set Web Pub. Rules (01:10)
  • Publish a Secure Web Server (01:20)
  • Server Publishing (01:12)
  • Create New Server Pub. Rule (02:22)
  • Why Publish a Mail Server (04:39)
  • Publish a Mail Server (02:55)
  • Summary (00:30)
Secure Web Publishing (25:02)
  • Introduction (00:40)
  • Overview (01:18)
  • Secure Socket Layer (SSL) (01:28)
  • Authentication (04:26)
  • Enabling SSL on ISA (00:25)
  • Install SSL Certificate on ISA (00:45)
  • SSL Bridging (04:15)
  • SSL Tunneling (01:47)
  • Create a Certificate Authority (02:48)
  • Retarget the CA (00:31)
  • Edit Allowed Sites in SP (00:41)
  • Publish Secure Web Server (01:49)
  • Create/Install a Cert. on CA (01:47)
  • Assign Certificate on Client (01:43)
  • Summary (00:30)

Module 5

Caching (22:51)
  • Introduction (00:50)
  • Caching Contents (06:03)
  • How to Implement Caching (01:50)
  • Caching Components Include (01:20)
  • Set Up Caching (01:47)
  • Add a New Caching Rule (06:15)
  • Content Download Jobs (01:56)
  • Utilize the Cached Data (01:09)
  • Delete Cache Data (01:09)
  • Summary (00:27)
Virtual Private Network (VPN) (27:12)
  • Introduction (00:40)
  • VPN Overview (05:29)
  • Two Primary Scenarios (01:52)
  • Benefits (02:51)
  • Protocols: Supported OS"s (00:29)
  • Protocols: Certificate Support (00:38)
  • Protocols: Security (00:19)
  • Protocols: NAT Support (00:25)
  • Protocols: Additional Protocols (02:06)
  • Enable/Config. Client Access (02:46)
  • Config. Server VPN Properties (01:04)
  • Monitor VPN Clients (00:10)
  • Setup/Connect a VPN Client (01:50)
  • Configure Dial-in Permissions (01:02)
  • Deny Dial-in Access (00:59)
  • Configure Site-to-site VPN (01:52)
  • Create a New Network Rule (00:40)
  • Create a New Access Rule (01:22)
  • Summary (00:31)