Limited Time 30% Discount Offer Use Code - off30

70-162 Exam Details

70-162 - Bundle Pack

Actualkey Prepration Latest 70-162 : TS: Forefront Protection for Endpoints and Applications, Configuring Questions and Answers PDF's, Verified Answers via Experts - Pass Your Exam For Sure and instant Downloads - "Money Back Guarantee".


Vendor Microsoft
Certification MCTS
Exam Code 70-162
Title TS: Forefront Protection for Endpoints and Applications, Configuring
No Of Questions 105
Last Updated September 16,2024
Product Type Q & A with Explanation
Bundel Pack Included PDF + Offline / Andriod Testing Engine and Simulator

Bundle Pack

PRICE: $25

70-162 : BUNDLE PACK LEARNING TOOLS INCLUDED

Actualkey Products

PDF Questions & Answers

Exam Code : 70-162 - Sep 16,2024
Testing Engine

Offline Test Engine

Exam Code : 70-162 - Sep 16,2024
Try Demo
android testing engine

Android Test Engine

Exam Code : 70-162 - Sep 16,2024
Try Demo
online Exam Engine

Online Test Engine

Exam Code : 70-162 - Sep 16,2024

Exam 70-162:
TS: Forefront Protection for Endpoints and Applications, Configuring


Audience Profile
This exam is for Consultants that implement Microsoft Forefront technologies for medium to large clients. This exam will focus on Forefront Security products (FEP, FPE, FPS). Candidates should have at least two years of experience in desktop administration and Microsoft Windows server administration as well as knowledge of malware, anti-virus, and spam protection technologies.

Credit Toward Certification
When you pass Exam 70-162: TS: Forefront Protection for Endpoints and Applications, Configuring, you complete the requirements for the following certification(s):
Microsoft Certified Technology Specialist (MCTS): Forefront Endpoint and Application Protection, Configuration

This Training will Cover
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam.

Deploying Forefront Endpoint Protection 2010, Forefront Protection 2010 for Exchange Server, and Forefront Protection 2010 for SharePoint (24 percent)
Plan and implement a Forefront Endpoint Protection (FEP) topology.
This objective may include but is not limited to: where to install the remote reporting database; install FEP server components; WSUS configuration, System Center Configuration Manager single site vs. hierarchy considerations (reporting)
Design and install Forefront Protection for Exchange Server (FPE) and Forefront Protection for SharePoint (FPSP) components.
This objective may include but is not limited to: import and export configuration settings from and to multiple servers, deciding which server roles to install on (Mailbox, Hub Transport, and Edge), High Availability
Customize the System Center Configuration Manager and System Center Operations Manager configuration for FEP implementations.
This objective may include but is not limited to: create a collection in Configuration Manager, SUP configuration, configure advertisements, configure agent components, import security management pack (SMP), create custom Desired Configuration Management (DCM) baselines and configuration items
Deploy the FEP client.
This objective may include but is not limited to: operating system prerequisites, uninstall existing anti-virus software including Forefront Client Security (FCS), deploy Operations Manager and Configuration Manager agents to workgroup computers and to domain-joined computers, deploy using Configuration Manager, deploy using Group Policy, deploy manually, setup switches

Maintaining Endpoint and Application Protection (26 percent)
Configure Operations Manager Management Pack for FEP.
This objective may include but is not limited to: alerts, notifications, and monitoring
Configure alerts, notifications, and monitoring for FEP by using Configuration Manager.
This objective may include but is not limited to: reporting, SQL reporting services, creating subscriptions using DCM, collections and FEP console
Remediate FEP client issues.
This objective may include but is not limited to: using Operations Manager tasks; changes to policies; validate or audit FEP; client log files; quarantine; uninstall the FEP client, initiate client scan using Configuration Manager, remediating a locally removed client, diagnose and resolve a malware outbreak
Configure alerts, notifications, monitoring, and quarantine for FPE and FPSP.
This objective may include but is not limited to: email notifications, email alerts, Operations Manager alerts; set quarantine policy

Configuring the FEP Client (25 percent)
Configure FEP clients by using Configuration Manager.
This objective may include but is not limited to: create and manage policy using Configuration Manager, configure definitions within the client policy, export from Configuration Manager, choose which template to use, select exclusions
Configure the FEP client by using Group Policy.
This objective may include but is not limited to: import FEP configuration options into Group Policy (ADMX, ADML, FEP2010GPTool.exe), merge FEP policies, Group Policy precedence, manage Group Policy templates
Configure FEP clients manually.
This objective may include but is not limited to: import XML files, configure using the FEP Console, how to add an exclusion, how to disable, local vs. domain Group Policy precedence

Configuring FPE and FPSP Application Protection (25 percent)
Configure anti-spam protection by using FPE.
This objective may include but is not limited to: configure filter lists by keyword and by content, file filtering by name and/or by type, filtering by source, destination domain, or sender ID, block lists, backscatter
Configure anti-malware protection by using FPE.
This objective may include but is not limited to: different types of scans, perform an on-demand scan, configure real-time scan, configure scanning engines, definition distribution, optimize performance of the scan engine
Configure application protection with FPSP.
This objective may include but is not limited to: manage filter lists by keyword and by content, manage file filtering by name and/or by type, perform an on-demand scan, configure real-time scan, configure scanning engines, definition distribution, optimize performance of the scan engine
Diagnose and resolve malware and spam outbreaks.
This objective may include but is not limited to: read event logs, infected documents, and attachments

SATISFIED CUSTOMERS