Have you unlocked your potential?
Satisfaction Guaranteed.
Here at LearnLocker, we are committed to providing the best possible experience we can. If at any time you are not completely satisfied, we invite you to contact us with your comments and feedback. In addition, you have the right to cancel your membership at anytime. You can even cancel online through our website. Our cancellation policy and terms are covered in detail in the terms and conditions found in the LearnLocker Subscription Membership Agreement.

Windows Server 2008

Course Outlines
(70-640) Active Directory Configuration Level 1
Introduction:~ Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services
Chapter 1:~ Implementing Active Directory Domain Services
Introduction
Installing Active Directory Domain Service
Active Directory Post-Installation Demo
Read Only Domain Controllers
AD DS Domain Controller Roles
Managing Operations Manager Roles Demo
Summary
Chapter 2:~ Domain Name Services for Active Directory
Introduction
Exploring Active Directory DS and DNS Integration
DNS Server Roles Demo
Configuring AD DS Integrated Zones
Configuring AD and DNS Integration Demo
Working with Read-Only DNS Zones
Summary
Chapter 3:~ Configuring Active Directory Objects and Trusts
Introduction
Working with Active Directory Objects
Creating AD Groups Demo
Strategies for Using Groups
Automating AD DS Object Management
Object Permissions
Delegating Controls in Active Directory Demo
Trusts
Summary
Chapter 4:~ Active Directory Sites and Replication
Introduction
The Role of Replication
AD DS Sites and Replication
Configuring and Monitoring Replication
Summary
(70-640) Active Directory Configuration Level 2
Chapter 5:~ Creating and Configuring Group Policy
Introduction
Creating and Configuring Group Policy
Creating a New Group Policy Object Demo
Configuring the Scope of Group Policy Objects
Linking a GPO to another AD Object Demo
Evaluating the Application of Group Policy Objects
Modifying Affected Users in a GPO Demo
Managing Group Policy Objects
Delegating Permissions of a GPO Demo
Summary
Chapter 6:~ Creating User Environments Using Group Policy
Introduction
Configuring User Environments Using Group Policy
Configuring Scripts and Folder Redirection using Group Policy
Configuring Administrative Templates
Configuring Group Policy Preferences
Deploying Software Using Group Policy
Deploying Software Using Group Policy Demo
Summary
Chapter 7:~ Implementing Security Using Group Policy
Introduction
Implementing Security Using Group Policy
Configuring Windows Firewall Demo
Implementing Fine-Grained Password Policies
Restricting Group Membership and Access to Software
Managing Security Using Security Templates
Security Configuration Analysis Wizard Demo
Summary
(70-640) Active Directory Configuration Level 3
Chapter 8:~ Implementing an Active Directory Monitoring Plan
Introduction
Implementing a Monitoring Plan
Event Viewer Demo
Monitoring with Reliability and Performance Monitor
AD Monitoring Demo
Working with AD DS Auditing
Auditing Active Directory Demo
Summary
Chapter 9:~ Implementing an Active Directory Maintenance Plan
Introduction
Managing and Maintaining Domain Controllers
Backing Up Active Directory Domain Services
Windows Server Backup Demo
Restoring AD DS
Summary
Chapter 10:~ Troubleshooting Active Directory
Introduction
Troubleshooting Active Directory
Troubleshooting DNS and AD
Troubleshooting AD DS Replication
Summary
Chapter 11:~ Troubleshooting Group Policy Issues
Introduction
Introduction to Group Policy Troubleshooting
Tools for Diagnosing Group Policy Demo
Troubleshooting Group Policy Replication
Client Side Extension Processing
Chapter 12:~ Implementing an AD DS Infrastructure
Introduction
Overview of the AD DS Domain
Planning a Group Policy Strategy
Summary
Summary
(70-640) Active Directory Configuration Level 4
Introduction:~ Configuring and Troubleshooting Identity and Access Solutions with Windows Server 2008 Active Directory
Chapter 1:~ Exploring Identity Access Solutions
Introduction
Exploring IDA Management
Server Roles in IDA Management
Installing a Server Role Demo
Identity Lifecycle Manager (ILM) 2007
Summary
Chapter 2:~ Configuring Active Directory Certificate Services
Introduction
Overview of Public Key Infrastructure (PKI)
Deploying a CA Hierarchy
Installing Certificate Services
CRL Publication
Installing Certificate Services Demo
Summary
Chapter 3:~ Deploying and Managing Certificates
Introduction
Certificates and AD CS
Creating a Certificate Demo
Autoenrollment with Group Policy
Revocation of Certificates
Revoking a Certificate Demo
Certificate Templates
Editing a Certificate Template
Certificate Recovery
Summary
(70-640) Active Directory Configuration Level 5
Chapter 4:~ Active Directory Lightweight Directory Services (LDS)
Introduction
Exploring AD LDS
Installing LDS Demo
Configuring AD LDS Instances
Configuring AD LDS Demo
AD LDS/AD DS Integration
Summary
Chapter 5:~ Active Directory Federated Services (AD FS)
Introduction
Identity Federation
AD FS Deployment
Claims
Summary
Chapter 6:~ Active Directory Rights Management Services (AD RMS)
Introduction
Overview of AD RMS
Deploying RMS
Installing RMS Demo
Preinstallation Considerations
Managing AD RMS
Summary
Chapter 7:~ Maintenance of Access Management Solutions
Introduction
Supporting AD CS
AD FS Maintenance Tasks
Maintaining AD RMS
Summary
Summary
(70-642) Network Infrastructure Configuration Level 1
Introduction:~ Configuring and Troubleshooting a Windows Server 2008 Network Infrastructure
Chapter 1:~ Installing and Configuring Windows Server 2008
Introduction
Installing Windows Server 2008
Server Roles and Features
Initial Configuration Tasks Demo
Overview of the Server Core Installation
Summary
Chapter 2:~ The Domain Name System (DNS)
Introduction
Installing the DNS Server Role
Installing the DNS Server Role Demo
Configuring the DNS Server Role
Configuring the DNS Server Role Demo
Configuring DNS Zones
Configuring DNS Zone Transfers
Configuring DNS Zone Transfers Demo
DNS Maintenance
Summary
(70-642) Network Infrastructure Configuration Level 2
Chapter 3:~ Working with WINS
Introduction
A Look at WINS
WINS Name Resolution Process
Adding WINS Role Demo
Summary
Chapter 4:~ Configuring and Troubleshooting DHCP
Introduction
The Role of DHCP
Installing DHCP Server Role Demo
DHCP Scopes and Options
Configuring DHCP Scope Demo
Managing a DHCP Database
Monitoring and Troubleshooting DHCP
Monitoring and Troubleshooting DHCP Demo
DHCP Security
Summary
Chapter 5:~ Working with IPv6 TCP/IP
Introduction
Exploring IPv6
Configuring IPv6 Demo
Coexistence with IPv6
Configuring DNS Support in IPv6 Demo
IPv6 Tunneling
Transitioning from IPv4 to IPv6
Troubleshooting IPv6
Summary
(70-642) Network Infrastructure Configuration Level 3
Chapter 6:~ Routing and Remote Access
Introduction
Configuring Network Access
Installing Remote Access Service Demo
Configuring VPN Access
Overview of Network Policies
Connection Manager Administration Kit
Connection Manager Administration Kit Demo
Troubleshooting RRAS
Summary
Chapter 7:~ Network Policy Server Role Service
Introduction
Managing a Network Policy Server
Adding the Network Policy Server Role Demo
Configuring RADIUS Clients and Servers
NPS Authentication
Maintaining a Network Policy Server
Summary
Chapter 8:~ Network Access Protection
Introduction
Overview of Network Access Protection
How NAP Works
Initial Configuration of NAP Demo
Configuration of NAP
Maintaining NAP
Summary
(70-642) Network Infrastructure Configuration Level 4
Chapter 9:~ Configuring IPsec
Introduction
Overview of IPsec
Configuring IPsec Settings Demo
Configuring Connection Security Rules
Configuring Connection Security Rules Demo
Working with IPsec NAP Enforcement
Summary
Chapter 10:~ Monitoring and Troubleshooting IPsec
Introduction
Monitoring IPsec
Troubleshooting IPsec
Summary
Chapter 11:~ The Distributed File System (DFS)
Introduction
DFS Overview
Installing the DFS Services Role Demo
Configuring DFS Namespaces
Creating a DFS Namespace Demo
High Availability of a Namespace
Creating a Folder and Folder Target in DFS Demo
Exploring
Summary
Chapter 12:~ Configuring and Managing Storage Technologies
Introduction
Storage Management Overview
File Server Resource Manager
Configuring Quota Management
Implementing File Screening
Managing Storage Reports
Summary
(70-642) Network Infrastructure Configuration Level 5
Chapter 13:~ Availability of Network Resources and Content
Introduction
Backing Up Data
Installing the Backup Feature Demo
Configuring Shadow Copies
Configuring Windows Shadow Copies Demo
Providing Server and Service Availability
Summary
Chapter 14:~ Configuring Server Security Compliance
Introduction
Windows Infrastructure Security
Security Configuration Wizard Demo
Securing Servers with Security Templates
Working with Audit Policy
Windows Server Update Services
Managing WSUS
Summary
Summary
(70-643) Applications Infrastructure Configuration Level 1
Introduction:~ Configuring and Troubleshooting Windows Server 2008 Terminal Services
Chapter 1:~ Configuring Core Functionality and Connections of Terminal Services
Introduction
Understanding Terminal Services
New Features of Terminal Services
Installing and Configuring Terminal Services
Demo Installing Terminal Services Role Service
Remote Desktop Connection
Installation Options for Terminal Services
Configuring and Troubleshooting TS Settings
Demo Configuring Settings
Troubleshooting Terminal Services Settings
Summary
Chapter 2:~ Configuring and Managing Licensing
Introduction
Deploying the Terminal Services Licensing Role
Using the Terminal Services Licensing Manager
Client Access Licenses
Managing Licenses
Summary
(70-643) Applications Infrastructure Configuration Level 2
Chapter 3:~ Configuring Terminal Services RemoteApp and Easy Print
Introduction
Configuring RemoteApp Programs
Deploying RemoteApp Programs with TS Web Access
Demo Configuring and Deploying RemoteApp Programs
Configuring Printers
Summary
Chapter 4:~ Configuring Web Access and Session Broker Services
Introduction
Understanding TS Web Access
Deploying TS Web Access
Configuring the TS Session Broker Service
Installing and Configuring TS Session Broker
Demo Deploying and Configuring Session Broker
Summary
(70-643) Applications Infrastructure Configuration Level 3
Chapter 5:~ Configuring and Troubleshooting the TS Gateway
Introduction
Understanding TS Gateway
Configuring TS Gateway
Configuring Authorization Policies
Demo Deploying TS Gateway
Monitoring and Troubleshooting TS Gateway Connections
Utilizing NAP with TS Gateway
Demo Configuring the TS Gateway for NAP
Troubleshooting TS Gateway Connections
Summary
Chapter 6:~ Managing and Monitoring Terminal Services
Introduction
Managing and Monitoring Connections to TS
Configuring Windows System Resource Manager
Summary
Course Summary
(70-646) Server Administrator Level 1
Introduction:~ Planning and Administering Windows Server 2008 Servers
Chapter 1:~ Planning Deployment and Migration
Introduction
Planning for WS08 Deployment and Migration
Features and Benefits
Deployment Considerations
Identifying Compatibility Issues
Developing a Deployment Plan
Designing and Scheduling Server Deployments
Planning Server Rollback
Migrating Data and Services
Planning the Decommissioning Process
Commissioning Windows Server 2008 Servers
Installing Windows Server 2008 Demo
Initial Configuration Tasks Demo
Summary
(70-646) Server Administrator Level 2
Chapter 2:~ Planning Server Roles
Introduction
Planning for Server Hardware
Introduction to Server Roles
Implications and Recommendations for Combining Server Roles
High Availability Options
Planning for WS08 Server Core
Designing for Hyper-V Virtualization
File Storage in WS08
High Availability for File Servers
Configuring File Service Resource Manager Demo
Summary
Chapter 3:~ Creating a Change Control Plan
Introduction
Developing a Change Control Process
Establishing a Communication Plan
Establishing a Change Approval Process
Developing Configuration Changes
Testing Proposed Changes
Creating and Testing Rollback Plans
Reviewing Configuration Changes
Summary
(70-646) Server Administrator Level 3
Chapter 4:~ Planning for High Availability
Introduction
Defining and Documenting High Availability Requirements
Infrastructure Requirements for High Availability
High Availability Options in Windows Server 2008
Planning Network Load Balancing (NLB)
Overview of Network Load Balancing
Sharing Application Data for NLB
Planning Host Affinity and Priority
Selecting Network Communication Methods for NLB
Planning Failover Clustering
Overview of Failover Clustering
Shared Storage for Failover Clustering
Quorum Configuration for Failover Clustering
Guidelines for Designing Failover Clusters
Planning Geographically Dispersed Clusters
Summary
Chapter 5:~ Planning and Maintaining Security
Introduction
Characteristics of a Defense in Depth Strategy
Defense in Depth Layers
Implementing Host Level Security
Utilizing the Windows Server 2008 Firewall
Configuring Windows Firewall Demo
Implementing Security Policies and Templates
Implementing Network Level Security
Network Security Options
Summary
(70-646) Server Administrator Level 4
Chapter 6:~ Planning Disaster Recovery for Windows Server 2008
Introduction
Planning Backups for Windows Server 2008
Planning a Backup Policy
Storage and Security Considerations
Planning Restore Policies for Windows Server 2008
Considerations for Server Restores
Improving the Backup Plan
Planning an EFS Restore Policy
Verifying Restored Data
Summary
Chapter 7:~ Maintaining Windows Server 2008 Servers
Introduction
Overview of Windows Server 2008 Management Tasks
Planning for Security Update Management
Overview of WSUS Deployment
Server Core Security Updates
Automating Server Maintenance
Configuring WSUS Demo
Summary
(70-646) Server Administrator Level 5
Chapter 8:~ Maintaining the Distributed File System (DFS)
Introduction
Overview of DFS in Windows Server 2008
DFS Architecture and Required Services
Planning for High Availability with DFS
Tools for Managing DFS
Installing and Configuring DFS Demo
Summary
Chapter 9:~ Monitoring Windows Server 2008 Servers
Introduction
Reasons for Monitoring
Monitoring Methods and Tools
Establishing Performance Baselines
Measuring Performance Objects
Choosing the Appropriate Monitoring Tools
Summary
Chapter 10:~ Troubleshooting Windows Server 2008 Hardware
Introduction
Troubleshooting Tools
Evaluating Hardware Devices and Drivers
Handling Component and Device Driver Failures
Summary
(70-646) Server Administrator Level 6
Chapter 11:~ Troubleshooting Software Problems in Windows Server 2008
Introduction
Determining the Business Impact of Software Failure
Monitoring Service Level Agreements
Troubleshooting Methodology Stages
Reviewing Logs and System Settings
Identifying Core Operating System Components
Evaluating Security Issues
Summary
Chapter 12:~ Troubleshooting Windows Server 2008 Networks
Introduction
Business Impact of Network Failure
Service Level Agreements and Change Management
Interaction with Other Teams
Correcting IP Connectivity Issues
Resolving Names in Windows Server 2008
Summary
Summary
(70-647) Enterprise Administrator Level 1
Introduction:~ Designing a Windows Server 2008 Network Infrastructure
Chapter 1:~ Overview of Network Infrastructure Design Process
Introduction
Preparing for a Network Infrastructure Design
Designing the Network Topology
Designing for Virtualization
Virtual Machine Connectivity Requirements
MAC Addressing for Virtual Machines
Summary
Chapter 2:~ Designing Network Security
Introduction
The Importance and Principals of Network Security
Security Design and Implementation
Security Policies and Procedures
Identify Network Security Threats
Common Network Vulnerabilities
STRIDE Threat Model Overview
Identifying and Analyzing Risks to Network Security
Defense-in-Depth Model Overview
Summary
Chapter 3:~ Designing IP Addressing
Introduction
Public vs. Private IP Addresses
Determining the Number of Subnets and Hosts
Designing an IPv6 Addressing Scheme
Designing and IPv6 Transition
Process and Guidelines for an IPv6 Transition
Designing the DHCP Infrastructure
DHCP Communication Process
Design Options for DHCP Servers
Guidelines for Designing the DHCP Infrastructure
Determining DHCP Lease Lengths
Using Superscopes
DHCP Class-Level Options
Summary
(70-647) Enterprise Administrator Level 2
Chapter 4:~ Designing Routing and Switching Requirements
Introduction
Security Requirements
Selecting Network Devices
Designing the Use of Routers
Designing the Use of Switches
Designing Internet Connectivity Perimeter Networks
NAT for Internet Security
Strategies for Firewall Design
Designing Routing Communications
Choosing a Routing Protocol
Understanding and Designing Packet Filters
Evaluating Site-To-Site Connectivity Options
Evaluating Network Performance
Quality of Service
Summary
Chapter 5:~ Designing Name Resolution
Introduction
Name Resolution Requirements and Considerations
Identifying Locations and Application Requirements
Designing a DNS Server Strategy
Determining DNS Server Hardware Requirements and Placement
Planning DNS Server Roles
Securing DNS Servers
Designing DNS Zone Implementations
Standard vs. Active Directory DNS Zones
Zone Security Considerations
Designing Zone Transfers
Designing Delegation of DNS Zones
DNS Zones Demo
Summary
Chapter 6:~ Designing Advanced Name Resolution
Introduction
Modifications that Optimize DNS Servers
DNS Troubleshooting Tools
Designing DNS for High Availability and Security
Designing a WINS Name Resolution Strategy
Designing WINS Replication
Transitioning from WINS
DNS Optimization Demo
Summary
(70-647) Enterprise Administrator Level 3
Chapter 7:~ Designing Security for Internal Networks
Introduction
Designing Windows Firewall Implementations
Overview of IPSec
Connection Security Rules
IPSec Authentication Types
Designing an IPSec Implementation
Summary
Chapter 8:~ Designing Networks Access Solutions
Introduction
Determining Network Access Requirements
Securing and Controlling Network Access
Authentication Methods
Encryption Methods
Network Policies
Creating and Configuring Network Policies Demo
Remote Access Monitoring
Designing Remote Access Services
VPN Tunneling Protocols
Hardware Considerations and Server Placement
User Environment Configuration
Designing RADIUS Authentication and Network POlicy Services
Connection Request Policies
Designing Wireless Access
Wireless Security
Using RADIUS for Wireless Authentication
Hardware Considerations
Summary
Chapter 9:~ Designing Networks Access Protection
Introduction
NAP Architecture
Network Layer Protection
Host Layer Protection
NAP Enforcement
DHCP Enforcement
VPN Enforcement
IPSec Enforcement
Designing NAP Policies
Designing Considerations for NAP
Configuring NAP for DHCP Clients Demo
Summary
(70-647) Enterprise Administrator Level 4
Chapter 10:~ Designing File Services and DFS
Introduction
Evaluating Windows File Services
Understanding Distributed File System
Analyzing High Availability for File Services
Designing a Distributed File System
Designing DFS Namespaces
Designing DFS Replication
Designing File Server Resource Manager Configuration
FSRM Quotas
Deploying FSRM Utility Demo
Summary
Chapter 11:~ Designing Print Services
Introduction
Considerations for Print Services
Windows Server 2008 Printing Features
XPS-Based Printing
Print Management Console
Print Management Console Demo
Printer Driver Store
Internet Printing Protocol
Designing Print Services
Summary
Chapter 12:~ Designing High Availability
Introduction
Defining and Documenting High Availability Requirements
Infrastructure Requirements for High Availability
High Availability Options in Windows Server 2008
Overview of Network Load Balancing
Sharing Application Data for NLB
Designing Host Affinity and Priority
Selecting Network Communication Methods for NLB
Designing Failover Clustering
Overview of Failover Clustering
Shared Storage for Failover Clustering
Quorum Configuration for Failover Clustering
Guidelines for Designing Failover Clusters
Designing Geographically Dispersed Clusters
Summary
Summary
(70-647) Enterprise Administrator Level 5
Introduction:~ Designing a Windows Server 2008 Active Directory Infrastructure and Services
Chapter 1:~ Designing the Logical Structure within Active Directory
Introduction
Determining Directory Service Requirements
Overview of Active Directory DS Design Requirements
Business and Technical Requirements
Administrative and Security Requirements
Documenting Active Directory Design
Designing the Active Directory Forest and Forest Trusts
Choosing the AD Forest Model
Forest Functional Levels
Types of Active Directory Trust Relationships
Design Methodology and Best Practices
Active Directory Domains and Domain Trusts
AD DS Functional Levels
AD DS Domain Trusts
Integration of DNS Namespaces
Designing Active Directory Integrated DNS
Integration with Current DNS Infrastructure
Domain Controller Deployment
Summary
Chapter 2:~ Designing the Physical Structure of Active Directory
Introduction
Collecting Information for AD Site Design
Evaluating AD DS Site Models
Understanding Automatic Site Coverage
Designing Active Directory Replication
Types of Replication Typologies
Understanding and Implementing a Replication Design
Site Links and Bridgehead Servers
Server Locations
Summary
Chapter 3:~ Designing Administrative Structures for Active Directory
Introduction
Types of Administrative Models
Information Gathering for Designing Administrative Structures
Designing Organizational Unit Structures
Delegation of Control Strategies
Group Policy Structures
Designing Group Strategies
Guidelines for Developing a Group Naming Strategy
Strategies for Using Groups to Access Resources
Strategies for Placing Groups Objects
Designing User and Computer Accounts
Summary
(70-647) Enterprise Administrator Level 6
Chapter 4:~ Designing Group Policy
Introduction
Gathering Organizational Information
Desktop Management and Security Requirements
Administrative Processes Information
Settings
Defining and Configuring Group Policy Settings
Demo Group Policy Management
Designing Administrative Templates
Deployment
Inheritance
Filtering
Administration
Summary
Chapter 5:~ Designing Security for Active Directory
Introduction
Gathering Information for Designing Account Security Policies
Fundamentals of Active Directory Security
Fine-Grained Password Policies in Windows Server 2008
Demo Setting Fine-Grained Password Policies
Designing Domain Controller Security
Server core Domain Controllers
Deploying Read Only Domain Controllers
Designing the Delegation of Administrative Control
Creating a Delegation Model
Auditing of Administrative Access
Summary
(70-647) Enterprise Administrator Level 7
Chapter 6:~ Designing High Availability and Disaster Recovery for Active Directory
Introduction
High Availability Fundamentals
Designing a High Availability Strategy
High Availability for DNS
Database Maintenance Strategies
Designing an AD Backup and Recovery Stategy
Planning and Implementing Restore Procedures
Best Practices for Backup and Recovery
Designing an Active Directory Monitoring Strategy
Tools for Monitoring Active Directory
Summary
Chapter 7:~ Designing a Public Key Infrastructure with AD Certificate Services(AD CS)
Introduction
Overview of Public Key Infrastructure and AD CS
Certifiacte Authorities
Active Directory Certificate Services(AD CS)
Certifiate Authority (CA) Hierarchy
CA Hierarchy Roles
Creating and Managing Certificates
Certificate Distribution and Revocation
Certificate Revocation Processes
Summary
(70-647) Enterprise Administrator Level 8
Chapter 8:~ Designing Rights Management Services
Introduction
What is Active Dircetory Right Managment Services(AD RMS)
Key Components of an AD RMS Solution
Designing Access to AD RMS
RMS Clusters
RMS Disater Recovery
Summary
Chapter 9:~ Designing an Acitve Directory Federation Services Implementation
Introduction
Understing Active Directory Federation Services (AD FS)
Deployment Scenarios
AD FS Server Roles and Placement
Business-to-Business Federation Trust
AD FS Claims and Applications
Summary
(70-647) Enterprise Administrator Level 9
Chapter 10:~ Designing an Active Directory Light Weight Services Implementation
Introduction
Understanding AD Light Weight Directory Services(LDS)
AD LDS Deployment Scenarios
Overview of an AD LDS Implementation Design
AD LDS Replication Scenarios
Integrating AD LDS with AD DS
Designing AD LDS Schema and Replication
Summary
Chapter 11:~ Designing AD Migrations to Windows Server 2008
Introduction
AD DS Upgrade Strategies
Criteria and Guidelines for Choosing a Migration Strategy
Designing the Active Directory Upgrade
Designing the Active Directory Restructure
Summary
Summary
(70-647) Enterprise Administrator Level 10
Introduction:~ Designing a Windows Server 2008 Applications Infrastructure
Chapter 1:~ Working with Web Farms
Introduction
Design Considerations for IIS 7.0 Web Farms
OS and IIS Configuration Options
Planning the Hardware for a Web Farm
Overview of Web Farms
Working with Load Balancing
DFS Enabled Share
Managing Content for Web Farms
Summary
Chapter 2:~ Optimization
Introduction
Hosting Application Pools
Basic Properties of an Application Pool
Script Mapping
Managing Bandwidth
Bandwidth Allocation
WSRM Demo
Logging Web Traffic
Guidelines for Auditing Logs
Web Site and Web Application Logs
Internet Information Services (IIS) 7.0 Demo
Summary
Chapter 3:~ Planning for Security
Introduction
Transport Security
Configuring a Secure Web Server
Importing Certificates
Installing a Certificate to a Web Site
Authentication and Authorization
Designing Delegation Administration
Delegating Administration
Setting Permissions in IIS 7.0 Demo
Summary
Chapter 4:~ Designing IIS Maintenance and UDDI
Introduction
IIS Backup and Recovery
Centralized Configuration
Monitoring with IIS 7.0
IIS 7.0 Logging Modules
Configuring Tracing in IIS 7.0 Demo
Deploying UDDI Services
Requirements for UDDI
Application Pool Management Demo
Summary
Chapter 5:~ Planning and Designing Terminal Services Infrastructure
Introduction
Licensing with Terminal Services
Checklist for TS Licensing
Adding the TS Licensing Role Demo
Connection Properties
Remote Desktop Connection Display (cont.)
Designing Device Redirection
Designing a TS Gateway
Prerequisites for TS Gateway Functionality
Installing the TS Gateway Role Demo
Exploring the TS Session Broker
Overview of TS RemoteApp Programs
Designing TS Web Access
Summary
Chapter 6:~ Designing Virtualization Infrastructure
Introduction
Application Resource Management
Group Policy Settings and Terminal Servers
Designing for High Availability
Specifying Maintenance and Recovery
Summary
Chapter 7:~ Designing Virtualization Provisioning
Introduction
Virtualization in a Lab Environment
Designing Virtual Server Hosting
Virtualization and Migration of Legacy Applications
Design Considerations for Virtualization
The Virtualized Development Environment
Customization to Standard Configuration
Virtual Server Provisioning Workflow Model
Suitability for Virtualization
Customization to Standard Configuration
Deployment of Virtualization
Summary
Summary
Active Directory Servers Level 1
Introduction:~ Managing and Maintaining Windows Server 2008 Active Directory Servers
Chapter 1:~ Planning Active Directory Server Deployment
Introduction
Planning Active Directory Server Deployment
Deploying RODCs
Deploying Active Directory on a Server Core
Using Active Directory Server Deployment Technologies
Deploying Active Directory Server Roles
Methods for Adding Server Roles
Adding Server Roles Demo
Methods for Removing Server Roles
Summary
Chapter 2:~ Managing Active Directory Domain Services
Introduction
Flexible Single Master Operations (FSMO) Roles
Managing Sites and Replications
FSMO Roles and Managing Active Directory Sites Demo
Managing Read Only Domain Controllers (RODC)
Managing Server Core Domain Controllers
Managing Group Policy Objects
Creating a Central Store for ADMX Files
Creating an ADMX Central Store Demo
Group Policy Troubleshooting
Group Policy Preferences
Delegating Active Directory Administration
Configuring Group Policy Preferences Demo
Restarting and Restoring Active Directory
Summary
Chapter 3:~ Maintaining Security for Active Directory Servers
Introduction
Manual Hardening Techniques
Additional Server Hardening Mechanisms
Applying Security Templates
Security Deployment Using Group Policy
Securing User Passwords in Windows Server 2008
Configuring Fine Grain Password Policies Demo
Directory Service Auditing
Enhancing Physical Security
Configuring a Password Replication Policy Demo
Physical Security for Writeable Domain Controllers
Summary
Active Directory Servers Level 2
Chapter 4:~ Managing Active Directory Service Controllers
Introduction
Benefits of Online Responders
Managing Certificate Enrollment
Enterprise PKI Console
Managing Group Policy Settings for AD CS
Active Directory Lightweight Directory Services
Managing AD LDS
Active Directory Federation Services
AD FS Management
Active Directory Rights Management Services
Administrative Groups
AD RMS Dependent Services Overview
Summary
Chapter 5:~ Monitoring Active Directory Servers
Introduction
Why Monitor Active Directory Servers?
Windows Reliability and Performance Monitor
Logging and Reporting Options
How to Monitor Active Directory Servers
Establishing Baselines and Thresholds
Key Performance Counters
Summary
Summary
Deployment Level 1
Introduction:~ Deploying Windows Server 2008
Chapter 1:~ Installing and Configuring Windows Server 2008
Introduction
Windows Server 2008 Setup Improvements
Installation Changes in Windows Server 2008
Potential Compatibility Issues
Windows Server 2008 Installation Checklist
A Word About 64-bit Processors
Pre-Installation Checklist
Exploring Windows Server Core
Windows Server Core Installation 1 Demo
Windows Server Core Installation 2 Demo
Why Not Windows Server Core?
Implement a Licensing Strategy with KMS and MAK
Initial Configuration Task Wizard Demo
Summary
Chapter 2:~ Server Core Configuration
Introduction
Server Core Basic Configuration
Configuring Roles In Server Core
Installing Roles on Server Core Demo
Summary
Deployment Level 2
Chapter 3:~ Windows Unattended Installation Options
Introduction
Unattended Windows Server 2008 Installation
Unattended Deployment Scenarios
Troubleshooting Unattended Installations
Unattended Domain Controller Installation
A Word About Read Only Domain Controllers
Summary
Chapter 4:~ Windows Deployment Services (WDS)
Introduction
Windows Deployment Services
Differences in WDS
Windows Deployment Services Introduction
Windows Deployment Service Server and Client
Upgrading and Interoperability Moving from RIS to WDS
Working with the WIM Format
Creating and Editing WIM Files
Summary
Chapter 5:~ Windows Server Deployment Toolkits
Introduction
Choosing an Imaging Strategy
Using the Microsoft Deployment Toolkit
Maintaining Images
Summary
Deployment Level 3
Chapter 6:~ Active Directory Upgrade/Migration Issues
Introduction
Windows Server 2008 Upgrade Overview
Upgrading 2003 Domain Controllers to Server 2008
Changes to Windows Server 2003
Active Directory Upgrade Sequence
Summary
Chapter 7:~ Upgrading Servers to Windows Server 2008
Introduction
Upgrading File and Print Servers
File Server Storage Changes
Upgrading Web and Application Servers
Application Server Installed on Server Core
Upgrading Remote Infrastructure Servers
BitLocker Drive Encryption
Summary
Deployment Level 4
Chapter 8:~ Migrating Workloads to Microsoft Virtual Machines
Introduction
Microsoft Server Virtualization
About Microsoft Virtual Server
Using VSMT to Migrate Workloads to Virtual Servers
Summary
Chapter 9:~ Optimizing Windows Server 2008
Introduction
Hardware Guidelines
Networks Guidelines
Workload Considerations
Domain Controller Optimization Tips
Summary
Summary
Network Infrastructure Servers Level 1
Introduction:~ Managing and Maintaining Windows Server 2008 Network Infrastructure Servers
Chapter 1:~ Managing a Windows Server 2008 Network Infrastructure Server Lifecycle
Introduction
Key Features of Windows Server 2008
Windows Server Core Edition
Hyper-V Improved Virtualization
Network Access Protection
DNS Server Improvements
Deployment and Backup with Windows Deployment Services
Terminal Services Gateway Services
Managing Implementation of Server Roles
Server Role Installation and Verification Demo
Managing Server Roles with SCW
Summary
Chapter 2:~ Managing Network Access Protection
Introduction
NAP Compliance Considerations
NAP Architecture
Placement of Network Policy Servers
Planning the System Health Validator Configuration
Configuring the Windows SHV Demo
Creating Solutions Using NAP
Enforcing NAP for VPN Clients
Enforcing NAP with TS Gateways
Implementing NAP
Configuring DHCP Enforcement for NAP Demo
Summary
Network Infrastructure Servers Level 2
Chapter 3:~ Managing Remote Access
Introduction
Remote Access Methods
Remote Access Protocols
RAS Solution Planning
Configuring RAS Server Roles Demo
Managing RAS Authentication
Managing Certificates and Smart Cards for Authentication
Implementing and Managing Network Policies
Configuring Network Policies Demo
Summary
Chapter 4:~ Managing and Maintaining DNS and DHCP Server Roles
Introduction
Managing DNS Server Configuration
Managing DNS Server Security
Maintaining DNS Zones
Monitoring DNS Zones
Configuring and Monitoring DNS Servers Demo
Managing and Maintaining DHCP Servers
Securing DHCP Services
Monitoring DHCP Servers
Configuring and Monitoring DHCP Demo
Summary
Network Infrastructure Servers Level 3
Chapter 5:~ Maintaining Security for Network Servers
Introduction
Hardening Network Server Roles
Monitoring Network Server Security
Configuring Windows Firewall with Advanced Security
Connection Security Rules
Additional Management Options
Summary
Chapter 6:~ Monitoring Windows Server 2008 Infrastructure Roles
Introduction
Why Monitor Network Services?
Establishing Performance Baselines
Windows Server 2008 Monitoring Tools
Windows Reliability and Performance Monitor
Logging and Reporting Options
Summary
Summary
Reset Password
Sign In:


You will be sent a link to the Reset Password page. Please note that the link may only be used today.