|
Lesson 1 Deploying and Managing Server Images |
|
|
1 | (41) |
|
Using Windows Deployment Services |
|
|
2 | (36) |
|
Installing the Windows Deployment Services Role |
|
|
2 | (3) |
|
Configuring the WDS Server |
|
|
5 | (1) |
|
Performing the Initial Configuration of WDS |
|
|
5 | (4) |
|
Configuring the WDS Properties |
|
|
9 | (6) |
|
|
15 | (1) |
|
Configuring the Custom DHCP Option |
|
|
15 | (2) |
|
Configuring and Managing Boot, Install, and Discover Images |
|
|
17 | (1) |
|
|
18 | (2) |
|
|
20 | (1) |
|
Creating an Image File with WDS |
|
|
21 | (2) |
|
Creating a Discover Image |
|
|
23 | (2) |
|
|
25 | (2) |
|
Performing an Unattended Installation |
|
|
27 | (7) |
|
Updating Images with Patches, Hotfixes, and Drivers |
|
|
34 | (1) |
|
Installing Features for Offline Images |
|
|
35 | (1) |
|
Deploying Driver Packages with an Image |
|
|
36 | (2) |
|
|
38 | (1) |
|
|
38 | (3) |
|
|
41 | (1) |
|
Lesson 2 Implementing Patch Management |
|
|
42 | (43) |
|
Understanding Windows Updates and Automatic Updates |
|
|
43 | (4) |
|
Deploying Windows Server Update Services (WSUS) |
|
|
47 | (33) |
|
|
49 | (3) |
|
|
52 | (7) |
|
Configuring WSUS Synchronization |
|
|
59 | (5) |
|
Configuring WSUS Computer Groups |
|
|
64 | (4) |
|
Configuring Group Policies for Updates |
|
|
68 | (1) |
|
Configuring Client-Side Targeting |
|
|
69 | (2) |
|
|
71 | (4) |
|
|
75 | (3) |
|
Administrating WSUS with Commands |
|
|
78 | (1) |
|
Troubleshooting Problems with Installing Updates |
|
|
79 | (1) |
|
Understanding System Center Configuration Manager (SCCM) |
|
|
80 | (1) |
|
|
80 | (1) |
|
|
81 | (3) |
|
|
84 | (1) |
|
Lesson 3 Monitoring Servers |
|
|
85 | (48) |
|
Introducing the Microsoft Management Console (MMC) |
|
|
86 | (7) |
|
|
88 | (1) |
|
Using Computer Management |
|
|
89 | (1) |
|
Using the Services Console |
|
|
90 | (3) |
|
|
93 | (9) |
|
Understanding Logs and Events |
|
|
94 | (2) |
|
|
96 | (1) |
|
Adding a Task to an Event |
|
|
96 | (3) |
|
Configuring Event Subscriptions |
|
|
99 | (3) |
|
Using Reliability Monitor |
|
|
102 | (1) |
|
|
103 | (17) |
|
|
104 | (5) |
|
|
109 | (2) |
|
Using Performance Monitor |
|
|
111 | (3) |
|
Using Common Performance Counters |
|
|
114 | (1) |
|
Configuring Data Collector Sets (DCS) |
|
|
114 | (3) |
|
Configuring Performance Alerts |
|
|
117 | (3) |
|
|
120 | (7) |
|
Using the netstat Command |
|
|
121 | (1) |
|
|
121 | (6) |
|
Monitoring Virtual Machines (VMs) |
|
|
127 | (1) |
|
|
128 | (1) |
|
|
129 | (3) |
|
|
132 | (1) |
|
Lesson 4 Configuring Distributed File System (DFS) |
|
|
133 | (32) |
|
Using Distributed File System |
|
|
133 | (27) |
|
Installing and Configuring DFS Namespace |
|
|
134 | (1) |
|
|
135 | (1) |
|
Configuring DFS Namespaces |
|
|
136 | (6) |
|
|
142 | (3) |
|
|
145 | (1) |
|
Installing and Configuring DFS Replication |
|
|
145 | (1) |
|
Installing DFS Replication |
|
|
146 | (1) |
|
Configuring DFS Replication Targets |
|
|
147 | (7) |
|
|
154 | (1) |
|
Configuring Remote Differential Compression |
|
|
155 | (2) |
|
|
157 | (2) |
|
Configuring Fault Tolerance Using DFS |
|
|
159 | (1) |
|
|
160 | (1) |
|
|
160 | (4) |
|
|
164 | (1) |
|
Lesson 5 Configuring File Server Resource Manager (FSRM) |
|
|
165 | (23) |
|
Using File Server Resource Manager |
|
|
165 | (18) |
|
Installing File Server Resource Manager |
|
|
166 | (1) |
|
|
167 | (1) |
|
|
167 | (5) |
|
Changing Quotas Templates |
|
|
172 | (1) |
|
|
173 | (1) |
|
Managing Files with File Screening |
|
|
174 | (1) |
|
|
174 | (1) |
|
|
175 | (3) |
|
Creating a File Screen Exception |
|
|
178 | (1) |
|
Creating a File Screen Template |
|
|
178 | (1) |
|
|
179 | (3) |
|
|
182 | (1) |
|
|
183 | (1) |
|
|
184 | (3) |
|
|
187 | (1) |
|
Lesson 6 Configuring File Services and Disk Encryption |
|
|
188 | (30) |
|
|
188 | (26) |
|
Encrypting Files with EFS |
|
|
189 | (1) |
|
|
190 | (2) |
|
|
192 | (1) |
|
Sharing Files Protected with EFS with Others |
|
|
193 | (1) |
|
Configuring EFS with Group Policies |
|
|
194 | (2) |
|
Configuring the EFS Recovery Agent |
|
|
196 | (1) |
|
Managing EFS Certificates |
|
|
197 | (4) |
|
Encrypting Files with BitLocker |
|
|
201 | (2) |
|
Configuring BitLocker Encryption |
|
|
203 | (6) |
|
Configuring BitLocker To Go |
|
|
209 | (1) |
|
BitLocker Pre-Provisioning |
|
|
210 | (1) |
|
Configuring BitLocker Policies |
|
|
210 | (2) |
|
Managing BitLocker Certificates |
|
|
212 | (1) |
|
Configuring the Network Unlock Feature |
|
|
212 | (2) |
|
|
214 | (1) |
|
|
214 | (3) |
|
|
217 | (1) |
|
Lesson 7 Configuring Advanced Audit Policies |
|
|
218 | (37) |
|
Enabling and Configuring Auditing |
|
|
218 | (32) |
|
Implementing Auditing Using Group Policies |
|
|
219 | (1) |
|
Implementing an Audit Policy |
|
|
220 | (1) |
|
Implementing Object Access Auditing Using Group Policies |
|
|
221 | (6) |
|
Implementing Advanced Audit Policy Settings |
|
|
227 | (1) |
|
Implementing Advanced Audit Policy Settings Using Group Policies |
|
|
227 | (14) |
|
Removing Advanced Audit Policy Configuration |
|
|
241 | (1) |
|
Implementing Auditing Using AuditPol.exe |
|
|
241 | (2) |
|
|
243 | (1) |
|
Creating Expression-Based Audit Policies |
|
|
244 | (5) |
|
Creating Removable Device Audit Policies |
|
|
249 | (1) |
|
|
250 | (1) |
|
|
251 | (3) |
|
|
254 | (1) |
|
Lesson 8 Configuring DNS Zones |
|
|
255 | (31) |
|
|
256 | (4) |
|
Understanding DNS Names and Zones |
|
|
257 | (2) |
|
Understanding the Address Resolution Mechanism |
|
|
259 | (1) |
|
Configuring and Managing DNS Zones |
|
|
260 | (21) |
|
|
261 | (2) |
|
Configuring Primary and Secondary Zones |
|
|
263 | (6) |
|
Configuring Active Directory-Integrated Zones |
|
|
269 | (2) |
|
Configuring Zone Delegation |
|
|
271 | (2) |
|
|
273 | (1) |
|
Configuring Caching-Only Servers |
|
|
274 | (1) |
|
Configuring Forwarding and Conditional Forwarding |
|
|
274 | (4) |
|
Configuring Zone Transfers |
|
|
278 | (1) |
|
Understanding Full and Incremental Transfers |
|
|
278 | (1) |
|
Configuring Notify Settings |
|
|
279 | (2) |
|
Using the DNSCMD Command to Manage Zones |
|
|
281 | (1) |
|
|
282 | (1) |
|
|
283 | (2) |
|
|
285 | (1) |
|
Lesson 9 Configuring DNS Records |
|
|
286 | (23) |
|
Configuring DNS Record Types |
|
|
287 | (13) |
|
Creating and Configuring DNS Resource Records |
|
|
287 | (1) |
|
Start of Authority (SOA) Records |
|
|
288 | (1) |
|
|
289 | (1) |
|
Host (A and AAAA) Records |
|
|
290 | (1) |
|
Canonical Name (CNAME) Records |
|
|
290 | (1) |
|
|
291 | (1) |
|
Mail Exchanger (MX) Records |
|
|
291 | (1) |
|
Service Location (SRV) Records |
|
|
292 | (1) |
|
Configuring Record Options |
|
|
293 | (3) |
|
|
296 | (1) |
|
Configuring Secure Dynamic Updates |
|
|
297 | (1) |
|
Configuring Zone Scavenging |
|
|
298 | (2) |
|
Using the DNSCMD Command to Manage Resource Records |
|
|
300 | (1) |
|
Troubleshooting DNS Problems |
|
|
300 | (4) |
|
|
304 | (1) |
|
|
305 | (3) |
|
|
308 | (1) |
|
Lesson 10 Configuring VPN and Routing |
|
|
309 | (39) |
|
|
310 | (33) |
|
Installing and Configuring the Remote Access Role |
|
|
310 | (1) |
|
Installing Routing and Remote Access |
|
|
310 | (2) |
|
Configuring Routing and Remote Access |
|
|
312 | (2) |
|
Configuring RRAS for Dial-Up Remote Access |
|
|
314 | (5) |
|
|
319 | (2) |
|
Configuring the VPN Connection on the Server |
|
|
321 | (4) |
|
Creating a VPN Connection on a Client |
|
|
325 | (4) |
|
|
329 | (1) |
|
Configuring Split Tunneling |
|
|
330 | (1) |
|
Configuring Remote Dial-In Settings for Users |
|
|
331 | (1) |
|
Troubleshooting Remote Access Problems |
|
|
332 | (2) |
|
|
334 | (1) |
|
Disabling Routing and Remote Access |
|
|
335 | (1) |
|
|
336 | (1) |
|
|
337 | (2) |
|
|
339 | (3) |
|
Configuring Demand-Dial Routing |
|
|
342 | (1) |
|
Configuring the DHCP Relay Agent |
|
|
342 | (1) |
|
|
343 | (1) |
|
|
344 | (3) |
|
|
347 | (1) |
|
Lesson 11 Configuring Direct Access |
|
|
348 | (35) |
|
Understanding DirectAccess |
|
|
348 | (29) |
|
Looking at the DirectAccess Connection Process |
|
|
349 | (1) |
|
Understanding DirectAccess Requirements |
|
|
350 | (1) |
|
Understanding DirectAccess Server Requirements |
|
|
350 | (1) |
|
Understanding DirectAccess Client Requirements |
|
|
351 | (1) |
|
Running the DirectAccess Getting Started Wizard |
|
|
351 | (3) |
|
Running the Remote Access Setup Wizard |
|
|
354 | (3) |
|
Implementing Client Configuration |
|
|
357 | (2) |
|
Implementing DirectAccess Server |
|
|
359 | (3) |
|
Implementing Infrastructure Servers |
|
|
362 | (3) |
|
Configuring the Application Servers |
|
|
365 | (1) |
|
Preparing for DirectAccess Deployment |
|
|
366 | (1) |
|
Configuring DNS for DirectAccess |
|
|
366 | (1) |
|
Configuring Certificates for DirectAccess |
|
|
366 | (10) |
|
Troubleshooting DirectAccess |
|
|
376 | (1) |
|
|
377 | (1) |
|
|
378 | (4) |
|
|
382 | (1) |
|
Lesson 12 Configuring a Network Policy Server |
|
|
383 | (32) |
|
Configuring a Network Policy Server Infrastructure |
|
|
383 | (28) |
|
Installing and Configuring Network Policy Server |
|
|
385 | (2) |
|
Configuring Multiple RADIUS Server Infrastructures |
|
|
387 | (4) |
|
Configuring RADIUS Clients |
|
|
391 | (10) |
|
Managing RADIUS Templates |
|
|
401 | (2) |
|
Configuring RADIUS Accounting |
|
|
403 | (4) |
|
Understanding NPS Authentication Methods |
|
|
407 | (1) |
|
Using Password-Based Authentication |
|
|
407 | (1) |
|
Using Certificates for Authentication |
|
|
408 | (3) |
|
|
411 | (1) |
|
|
411 | (3) |
|
|
414 | (1) |
|
Lesson 13 Configuring NPS Policies |
|
|
415 | (25) |
|
|
415 | (20) |
|
Configuring Connection Request Policies |
|
|
416 | (8) |
|
Configuring Network Policies |
|
|
424 | (6) |
|
Multilink and Bandwidth Allocation |
|
|
430 | (1) |
|
|
430 | (1) |
|
|
431 | (1) |
|
|
431 | (1) |
|
|
432 | (1) |
|
Exporting and Importing Templates |
|
|
432 | (2) |
|
Exporting and Importing the NPS Configuration Including NPS Policies |
|
|
434 | (1) |
|
|
435 | (1) |
|
|
436 | (3) |
|
|
439 | (1) |
|
Lesson 14 Configuring Network Access Protection (NAP) |
|
|
440 | (36) |
|
Using Network Access Protection (NAP) |
|
|
441 | (30) |
|
Installing Network Access Protection |
|
|
443 | (3) |
|
Configuring NAP Enforcement |
|
|
446 | (1) |
|
Configuring NAP Enforcement for DHCP |
|
|
446 | (14) |
|
Configuring NAP Enforcement for VPN |
|
|
460 | (3) |
|
Configuring System Health Validators |
|
|
463 | (2) |
|
Configuring Health Policies |
|
|
465 | (3) |
|
Configuring Isolation and Remediation |
|
|
468 | (1) |
|
Configuring NAP Client Settings |
|
|
469 | (2) |
|
|
471 | (1) |
|
|
471 | (4) |
|
|
475 | (1) |
|
Lesson 15 Configuring Server Authentication |
|
|
476 | (18) |
|
Configuring Server Authentication |
|
|
477 | (6) |
|
Understanding NTLM Authentication |
|
|
477 | (1) |
|
|
477 | (2) |
|
Managing Service Principal Names |
|
|
479 | (3) |
|
Configuring Kerberos Delegation |
|
|
482 | (1) |
|
Managing Service Accounts |
|
|
483 | (6) |
|
Creating and Configuring Service Accounts |
|
|
483 | (2) |
|
Creating and Configuring Managed Service Accounts |
|
|
485 | (3) |
|
Creating and Configuring Group Managed Service Accounts |
|
|
488 | (1) |
|
|
489 | (1) |
|
|
489 | (4) |
|
|
493 | (1) |
|
Lesson 16 Configuring Domain Controllers |
|
|
494 | (28) |
|
Understanding Domain Controllers |
|
|
494 | (14) |
|
Managing Global Catalogs and Configuring Universal Group Membership Caching |
|
|
496 | (3) |
|
Managing Operations Masters |
|
|
499 | (2) |
|
Viewing the Operations Masters Role Holders |
|
|
501 | (3) |
|
Transferring the Operations Masters Role |
|
|
504 | (2) |
|
Seizing the Operations Masters Role |
|
|
506 | (2) |
|
Installing and Configuring an RODC |
|
|
508 | (4) |
|
Cloning a Domain Controller |
|
|
512 | (5) |
|
|
517 | (1) |
|
|
518 | (3) |
|
|
521 | (1) |
|
Lesson 17 Maintaining Active Directory |
|
|
522 | (33) |
|
Automating User Account Management |
|
|
523 | (2) |
|
Backing Up and Restoring Active Directory |
|
|
525 | (21) |
|
Understanding the Active Directory Database, SYSVOL, and System State |
|
|
525 | (2) |
|
|
527 | (1) |
|
Performing a Backup of Active Directory and SYSVOL |
|
|
528 | (5) |
|
Performing an Active Directory Restore |
|
|
533 | (4) |
|
Configuring Active Directory Snapshots |
|
|
537 | (3) |
|
Performing Object- and Container-Level Recovery |
|
|
540 | (6) |
|
Manging Active Directory Offline |
|
|
546 | (1) |
|
Optimizing an Active Directory Database |
|
|
547 | (2) |
|
|
549 | (1) |
|
|
550 | (1) |
|
|
551 | (3) |
|
|
554 | (1) |
|
Lesson 18 Configuring Account Policies |
|
|
555 | (17) |
|
Working with Account Policies |
|
|
555 | (13) |
|
Configuring Domain User Password Policy |
|
|
557 | (1) |
|
Understanding Strong Passwords |
|
|
557 | (1) |
|
Configuring Password Policy Settings |
|
|
558 | (2) |
|
Configuring Account Lockout Settings |
|
|
560 | (2) |
|
Configuring and Applying Password Settings Objects |
|
|
562 | (3) |
|
Configuring Local User Password Policy |
|
|
565 | (1) |
|
Delegating Password Settings Management |
|
|
565 | (3) |
|
|
568 | (1) |
|
|
568 | (3) |
|
|
571 | (1) |
|
Lesson 19 Configuring Group Policy Processing |
|
|
572 | (29) |
|
Understanding group policy processing |
|
|
572 | (24) |
|
Configuring Processing Order and Precedence |
|
|
573 | (1) |
|
Understanding Group Policy Inheritance |
|
|
573 | (3) |
|
Managing Group Policy Links |
|
|
576 | (1) |
|
Using Filtering with Group Policies |
|
|
577 | (1) |
|
Configuring Blocking of Inheritance |
|
|
578 | (1) |
|
Configuring Enforced Policies |
|
|
579 | (2) |
|
Configuring Security Filtering and WMI Filtering |
|
|
581 | (1) |
|
|
581 | (2) |
|
|
583 | (3) |
|
Configuring Loopback Processing |
|
|
586 | (1) |
|
Configuring Client-Side Extension Behavior |
|
|
587 | (2) |
|
Looking at GPOs and Disconnected Computers |
|
|
589 | (1) |
|
Configuring and Managing Slow-Link Processing |
|
|
589 | (1) |
|
|
589 | (7) |
|
|
596 | (1) |
|
|
596 | (4) |
|
|
600 | (1) |
|
Lesson 20 Configuring Group Policy Settings |
|
|
601 | (30) |
|
Configuring Group Policy Settings |
|
|
602 | (24) |
|
Performing Software Installation Using Group Policies |
|
|
603 | (1) |
|
Assigning or Publishing a Package |
|
|
604 | (3) |
|
Redeploying an Application |
|
|
607 | (1) |
|
|
607 | (1) |
|
|
608 | (4) |
|
Using Scripts with Group Policies |
|
|
612 | (3) |
|
Using Administrative Templates |
|
|
615 | (1) |
|
Managing Administrative Templates |
|
|
615 | (2) |
|
|
617 | |
|
|
518 | (104) |
|
Using Custom Administrative Template Files |
|
|
622 | (1) |
|
Converting Administrative Templates Using ADMX Migrator |
|
|
623 | (2) |
|
Configuring Property Filters for Administrative Templates |
|
|
625 | (1) |
|
|
626 | (1) |
|
|
627 | (3) |
|
|
630 | (1) |
|
Lesson 21 Managing Group Policy Objects |
|
|
631 | (15) |
|
Managing Group Policy Objects |
|
|
631 | (10) |
|
Backing Up and Restoring GPOs |
|
|
632 | (4) |
|
|
636 | (2) |
|
Resetting the Default GPOs |
|
|
638 | (1) |
|
Delegating Group Policy Management |
|
|
639 | (2) |
|
|
641 | (1) |
|
|
642 | (3) |
|
|
645 | (1) |
|
Lesson 22 Configuring Group Policy Preferences |
|
|
646 | |
|
Using Group Policy Preferences |
|
|
646 | (20) |
|
Configuring Preference Settings |
|
|
647 | (3) |
|
Configuring Windows Settings |
|
|
650 | (1) |
|
Configuring Network Drive Mappings |
|
|
650 | (1) |
|
Performing File and Folder Deployment |
|
|
651 | (3) |
|
Performing Shortcut Deployment |
|
|
654 | (1) |
|
Configuring Control Panel Settings |
|
|
655 | (1) |
|
Configuring Printer Settings |
|
|
656 | (2) |
|
Configuring Custom Registry Settings |
|
|
658 | (1) |
|
Configuring Power Options |
|
|
659 | (2) |
|
Configuring Internet Explorer Settings |
|
|
661 | (3) |
|
Configuring Item-Level Targeting |
|
|
664 | (2) |
|
|
666 | (1) |
|
|
666 | (3) |
|
|
669 | |
Appendix A |
|
670 | (2) |
Index |
|
672 | |
|
1 Deploying and Managing Server Images |
|
|
1 | (22) |
|
Exercise 1.1 Installing and Configuring Windows Deployment Services |
|
|
2 | (2) |
|
Exercise 1.2 Creating Windows Deployment Images |
|
|
4 | (2) |
|
Exercise 1.3 Generating an Autounattend.xml file |
|
|
6 | (12) |
|
Exercise 1.4 Deploying a Windows Image |
|
|
18 | (1) |
|
Exercise 1.5 Updating a Windows Image |
|
|
19 | (4) |
|
Lab Challenge: Adding Drivers to a Windows Image |
|
|
21 | (2) |
|
2 Implementing Patch Management |
|
|
23 | (16) |
|
Exercise 2.1 Installing WSUS |
|
|
24 | (4) |
|
Exercise 2.2 Configuring WSUS |
|
|
28 | (3) |
|
Exercise 2.3 Configuring Clients |
|
|
31 | (3) |
|
Exercise 2.4 Approving Updates |
|
|
34 | (5) |
|
Lab Challenge: Running WSUS Reports |
|
|
37 | (2) |
|
|
39 | (26) |
|
Exercise 3.1 Using the Event Viewer |
|
|
40 | (11) |
|
Exercise 3.2 Using the Reliability Monitor |
|
|
51 | (3) |
|
Exercise 3.3 Using the Task Manager |
|
|
54 | (3) |
|
Exercise 3.4 Using Resource Monitor |
|
|
57 | (1) |
|
Exercise 3.5 Using the Performance Monitor |
|
|
58 | (3) |
|
Exercise 3.6 Monitoring VMs |
|
|
61 | (4) |
|
Lab Challenge: Using Network Monitor |
|
|
63 | (2) |
|
4 Configuring Distributed File System (DFS) |
|
|
65 | (12) |
|
Exercise 4.1 Installing DFS |
|
|
66 | (1) |
|
Exercise 4.2 Configuring DFS Namespace |
|
|
67 | (5) |
|
Exercise 4.3 Configuring DFS Replication |
|
|
72 | (5) |
|
Lab Challenge: Creating a Fault-Tolerant Shared Folder |
|
|
76 | (1) |
|
5 Configuring File Server Resource Manager |
|
|
77 | (12) |
|
Exercise 5.1 Installing File Server Resource Manager |
|
|
78 | (1) |
|
Exercise 5.2 Configuring Quotas |
|
|
79 | (4) |
|
Exercise 5.3 Managing Files with File Screening |
|
|
83 | (4) |
|
Exercise 5.4 Using Storage Reports |
|
|
87 | (2) |
|
Lab Challenge: Enabling SMTP for FSRM |
|
|
88 | (1) |
|
6 Configuring File Services and Disk Encryption |
|
|
89 | (20) |
|
Exercise 6.1 Encrypting Files with EFS |
|
|
90 | (7) |
|
Exercise 6.2 Configuring the EFS Recovery Agent |
|
|
97 | (4) |
|
Exercise 6.3 Backing Up and Restoring EFS Certificates |
|
|
101 | (3) |
|
Exercise 6.4 Encrypting a Volume with BitLocker |
|
|
104 | (5) |
|
Lab Challenge: Configuring Network Unlock |
|
|
107 | (2) |
|
7 Configuring Advanced Audit Policies |
|
|
109 | (10) |
|
Exercise 7.1 Implementing Auditing |
|
|
110 | (4) |
|
Exercise 7.2 Implementing Advanced Auditing |
|
|
114 | (2) |
|
Exercise 7.3 Using AuditPol.exe |
|
|
116 | (3) |
|
Lab Challenge: Auditing Removable Devices |
|
|
118 | (1) |
|
|
119 | (14) |
|
Exercise 8.1 Installing DNS |
|
|
120 | (1) |
|
Exercise 8.2 Creating Primary and Secondary Zones |
|
|
121 | (4) |
|
Exercise 8.3 Creating an Active Directory Integrated Zone |
|
|
125 | (1) |
|
Exercise 8.4 Configuring Zone Delegation |
|
|
125 | (2) |
|
Exercise 8.5 Creating a Stub Zone |
|
|
127 | (1) |
|
Exercise 8.6 Configuring Forwarding and Conditional Forwarding Zones |
|
|
128 | (2) |
|
Exercise 8.7 Configuring Zone Transfers |
|
|
130 | (3) |
|
Lab Challenge: Using the DNSCMD Command to Manage Zones |
|
|
132 | (1) |
|
9 Configuring DNS Records |
|
|
133 | (12) |
|
Exercise 9.1 Managing DNS Resource Records |
|
|
134 | (4) |
|
Exercise 9.2 Configuring Round Robin |
|
|
138 | (1) |
|
Exercise 9.3 Configuring Zone Scavenging |
|
|
139 | (2) |
|
Exercise 9.4 Troubleshooting DNS |
|
|
141 | (4) |
|
Lab Challenge: Using the DNSCMD Command to Manage Resource Records |
|
|
143 | (2) |
|
10 Configuring VPN and Routing |
|
|
145 | (16) |
|
Exercise 10.1 Installing and Configuring RRAS |
|
|
146 | (1) |
|
Exercise 10.2 Configuring a VPN Server |
|
|
147 | (5) |
|
Exercise 10.3 Configuring a VPN Client |
|
|
152 | (4) |
|
Exercise 10.4 Configuring Split Tunneling |
|
|
156 | (1) |
|
Exercise 10.5 Configuring Routing |
|
|
157 | (2) |
|
Exercise 10.6 Resetting Servers |
|
|
159 | (2) |
|
Lab Challenge: Using the Route Command |
|
|
160 | (1) |
|
11 Configuring DirectAccess |
|
|
161 | (10) |
|
Exercise 11.1 Implementing Client Configuration |
|
|
162 | (3) |
|
Exercise 11.2 Implementing DirectAccess Server |
|
|
165 | (2) |
|
Exercise 11.3 Implementing the Infrastructure Servers |
|
|
167 | (1) |
|
Exercise 11.4 Implementing the Application Servers |
|
|
168 | (3) |
|
Lab Challenge: Configuring Certificates for DirectAccess |
|
|
169 | (2) |
|
12 Configuring a Network Policy Server |
|
|
171 | (12) |
|
Exercise 12.1 Installing and Configuring Network Policy Server |
|
|
172 | (3) |
|
Exercise 12.2 Configuring NPS for RADIUS Server for VPN Connections |
|
|
175 | (3) |
|
Exercise 12.3 Managing RADIUS Templates |
|
|
178 | (1) |
|
Exercise 12.4 Configuring RADIUS Accounting |
|
|
179 | (4) |
|
Lab Challenge: Add Workstation Authentication Certificates to All Workstations |
|
|
181 | (2) |
|
13 Configuring NPS Policies |
|
|
183 | (8) |
|
Exercise 13.1 Creating and Configuring Connection Request Policies |
|
|
184 | (3) |
|
Exercise 13.2 Creating and Configuring Network Policies |
|
|
187 | (1) |
|
Exercise 13.3 Exporting and Importing the NPS Configuration |
|
|
188 | (3) |
|
Lab Challenge: Processing Network Policies |
|
|
189 | (2) |
|
14 Configuring Network Access Protection (NAP) |
|
|
191 | (10) |
|
Exercise 14.1 Installing Health Registration Authority Role on an NPS Server |
|
|
192 | (1) |
|
Exercise 14.2 Configuring NAP Enforcement for DHCP |
|
|
193 | (5) |
|
Exercise 14.3 Configuring SHV and Health Policies |
|
|
198 | (3) |
|
Lab Challenge: Configuring Clients for NAP |
|
|
200 | (1) |
|
15 Configuring Server Authentication |
|
|
201 | (10) |
|
Exercise 15.1 Creating a Service Account |
|
|
202 | (1) |
|
Exercise 15.2 Creating a Managed Service Account |
|
|
203 | (2) |
|
Exercise 15.3 Configuring Kerberos and Kerberos Delegation |
|
|
205 | (6) |
|
Lab Challenge: Configuring Kerberos with the Setspn Command |
|
|
209 | (2) |
|
16 Configuring Domain Controllers |
|
|
211 | (12) |
|
Exercise 16.1 Promoting ServerOl to a Domain Controller |
|
|
212 | (1) |
|
Exercise 16.2 Configuring Universal Group Membership Caching |
|
|
213 | (1) |
|
Exercise 16.3 Moving Operations Masters |
|
|
214 | (3) |
|
Exercise 16.4 Seizing Operations Masters |
|
|
217 | (1) |
|
Exercise 16.5 Creating an RODC |
|
|
218 | (5) |
|
Lab Challenge: Cloning a Domain Controller |
|
|
221 | (2) |
|
17 Maintaining Active Directory |
|
|
223 | (14) |
|
Exercise 17.1 Backing Up System State |
|
|
224 | (3) |
|
Exercise 17.2 Restoring the System State |
|
|
227 | (1) |
|
Exercise 17.3 Using an Active Directory Snapshot |
|
|
228 | (3) |
|
Exercise 17.4 Restoring a Deleted Object Using the Recycle Bin |
|
|
231 | (2) |
|
Exercise 17.5 Managing the Active Directory Database |
|
|
233 | (4) |
|
Lab Challenge: Remove Server02 from Active Directory |
|
|
234 | (3) |
|
18 Configuring Account Policies |
|
|
237 | (10) |
|
Exercise 18.1 Configuring a Domain Password Policy |
|
|
238 | (2) |
|
Exercise 18.2 Configuring Account Lockout Settings |
|
|
240 | (1) |
|
Exercise 18.3 Configuring a Password Settings Object |
|
|
240 | (7) |
|
Lab Challenge: Managing Password Settings Objects Permissions |
|
|
245 | (2) |
|
19 Configuring Group Policy Processing |
|
|
247 | (10) |
|
Exercise 19.1 Configuring Processing and Precedence of GPOs |
|
|
248 | (2) |
|
Exercise 19.2 Configuring Blocking Inheritance and Enforced Policies |
|
|
250 | (2) |
|
Exercise 19.3 Configuring Security Filtering and WMI Filtering |
|
|
252 | (3) |
|
Exercise 19.4 Configuring Loopback Processing |
|
|
255 | (2) |
|
Lab Challenge: Using Group Policy Results Wizard |
|
|
256 | (1) |
|
20 Configuring Group Policy Settings |
|
|
257 | (12) |
|
Exercise 20.1 Performing Software Installation with Group Policies |
|
|
258 | (2) |
|
Exercise 20.2 Using Folder Redirection |
|
|
260 | (3) |
|
Exercise 20.3 Using Scripts with Group Policies |
|
|
263 | (1) |
|
Exercise 20.4 Using Administrative Templates |
|
|
264 | (2) |
|
Exercise 20.5 Using Security Templates |
|
|
266 | (3) |
|
Lab Challenge: Using ADM Files |
|
|
267 | (2) |
|
21 Managing Group Policy Objects |
|
|
269 | (8) |
|
Exercise 21.1 Backing Up and Restoring GPO |
|
|
270 | (1) |
|
Exercise 21.2 Importing and Copying GPOs |
|
|
271 | (2) |
|
Exercise 21.3 Resetting Default GPOs |
|
|
273 | (1) |
|
Exercise 21.4 Delegating Group Policy Management |
|
|
273 | (4) |
|
Lab Challenge: Using a Migration Table |
|
|
274 | (3) |
|
22 Configuring Group Policy Preferences |
|
|
277 | (10) |
|
Exercise 22.1 Configuring Printer Settings |
|
|
278 | (3) |
|
Exercise 22.2 Configuring Network Drive Mappings |
|
|
281 | (1) |
|
Exercise 22.3 Configuring Power Options |
|
|
281 | (2) |
|
Exercise 22.4 Configuring IE Settings |
|
|
283 | (1) |
|
Exercise 22.5 Performing File, Folder, and Shortcut Deployment |
|
|
284 | (3) |
|
Lab Challenge: Configuring Item-Level Targeting |
|
|
286 | (1) |
Appendix: Lab Setup Guide |
|
287 | |