Muutke küpsiste eelistusi

70-412 Configuring Advanced Windows Server 2012 with Lab Manual and MOAC Labs Online Set [Pehme köide]

  • Formaat: Paperback / softback, 865 pages, kõrgus x laius x paksus: 277x213x33 mm, kaal: 1687 g
  • Sari: Microsoft Official Academic Course Series
  • Ilmumisaeg: 26-Jun-2025
  • Kirjastus: John Wiley & Sons Inc
  • ISBN-10: 1118667476
  • ISBN-13: 9781118667477
Teised raamatud teemal:
  • Formaat: Paperback / softback, 865 pages, kõrgus x laius x paksus: 277x213x33 mm, kaal: 1687 g
  • Sari: Microsoft Official Academic Course Series
  • Ilmumisaeg: 26-Jun-2025
  • Kirjastus: John Wiley & Sons Inc
  • ISBN-10: 1118667476
  • ISBN-13: 9781118667477
Teised raamatud teemal:
This course in the Microsoft Official Academic Course program prepares students for exam 70-412, Configuring Advanced Windows Server 2012 with Lab Manual and MOAC Labs Online Set.
Lesson 1 Configuring Network Load Balancing
1(17)
Understanding Fault Tolerance
1(2)
Configuring Network Load Balancing
3(9)
Configuring NLB Prerequisites
3(1)
Installing NLB Nodes
4(5)
Configuring Port Rules
9(1)
Configuring Filtering Mode and Affinity
9(2)
Configuring Cluster Operation Mode
11(1)
Controlling Hosts in NLB
11(1)
Upgrading an NLB Cluster
12(1)
Skill Summary
12(1)
Knowledge Assessment
13(4)
Business Case Scenarios
17(1)
Lesson 2 Configuring Failover Clustering
18(26)
Understanding Failover Clustering
19(20)
Installing and Configuring Failover Clustering
20(1)
Understanding Failover Clustering Requirements
20(1)
Configuring Cluster Networking
21(1)
Installing and Creating a Failover Cluster
22(3)
Configuring Cluster Storage
25(2)
Configuring Quorum
27(3)
Managing the Cluster
30(4)
Implementing Cluster-Aware Updating
34(2)
Upgrading a Cluster
36(1)
Troubleshooting Problems with Failover Clusters
37(1)
Backing Up and Restoring Failover Cluster Configuration
38(1)
Skill Summary
39(1)
Knowledge Assessment
40(3)
Business Case Scenarios
43(1)
Lesson 3 Managing Failover Clustering
44(16)
Managing Failover Clustering Roles
44(11)
Configuring Roles
45(1)
Configuring Role-Specific Settings
46(1)
Understanding SMB 3.0
46(1)
Deploying the General Use File Server Role
47(3)
Deploying Scale-Out File Server
50(1)
Deploying a Highly Available Virtual Machine
51(2)
Deploying Hyper-V over SMB 3
53(1)
Configuring Failover and Preferences Settings
53(2)
Configuring VM Monitoring
55(1)
Skill Summary
55(1)
Knowledge Assessment
56(3)
Business Case Scenarios
59(1)
Lesson 4 Managing Virtual Machine Movement
60(24)
Understanding Virtual Machine Movement
61(1)
Understanding Live Migration
61(6)
Performing LM
61(1)
Configuring LM Prerequisites
62(3)
Moving VMs Using LM
65(2)
Performing Quick Migration
67(1)
Performing Storage Migration
68(4)
Exporting, Importing, and Copying Virtual Machines
72(3)
Understanding Exporting, Importing, and Copying Virtual Machines
72(3)
Migrating from Other Platforms -- Understanding P2V and V2V
75(3)
Using SCVMM for P2V Machine Migration
76(1)
P2V Source Machine Requirements
76(1)
P2V Destination Machine Requirements
76(1)
P2V Suggested Prerequisites
77(1)
Converting Physical Computers to VMs
77(1)
P2V Another Way---Disk2VHD
78(1)
Converting a Virtual Machine to Virtual Machine (V2V) Using SCVMM
78(1)
Convert Citrix XenServer Virtual Machines to Hyper-V
78(1)
Convert VMware ESX/ESXi Virtual Machines to Hyper-V
78(1)
Convert Virtual Machines to Hyper-V Using the OVF Import/Export Tool
78(1)
Summary Skills Matrix
79(1)
Knowledge Assessment
80(3)
Business Case Scenarios
83(1)
Lesson 5 Configuring Advanced File Services
84(27)
Configuring NFS Data Store
84(8)
Obtaining User and Group Information
85(3)
Creating an NFS Share
88(1)
Installing and Configuring the NFS Data Store
89(3)
Configuring BranchCache
92(6)
Configuring File Classification Infrastructure
98(3)
Configuring File Access Auditing
101(4)
Skill Summary
105(1)
Knowledge Assessment
106(4)
Business Case Scenarios
110(1)
Lesson 6 Implementing Dynamic Access Control
111(21)
Using Dynamic Access Control
112(16)
Configuring User and Device Claim Types
114(2)
Configuring File Classification
116(3)
Implementing a Central Access Policy
119(4)
Implementing Policy Changes and Staging
123(1)
Creating Expression-Based Audit Policies
124(1)
Performing Access-Denied Remediation
125(3)
Skill Summary
128(1)
Knowledge Assessment
128(3)
Business Case Scenarios
131(1)
Lesson 7 Configuring and Optimizing Storage
132(20)
Understanding Shared Storage
133(1)
Using iSCSI
134(11)
Configuring iSCSI Target
135(4)
Configuring iSCSI Initiator
139(3)
Configuring iSCSI for High Availability
142(1)
Configuring Internet Storage Name Server
143(2)
Implementing Thin Provisioning and Trim
145(1)
Managing Server Free Space Using Features on Demand
146(2)
Skill Summary
148(1)
Knowledge Assessment
148(3)
Business Case Scenarios
151(1)
Lesson 8 Configuring and Managing Backups
152(33)
Configuring and Managing Backups
152(28)
Installing the Windows Server Backup Feature
153(3)
Configuring Windows Server Backups
156(1)
Reviewing Backup Configuration Options
157(1)
Exploring Your Scheduling Options
158(1)
Selecting Where to Store Your Backups
158(2)
Reviewing the Folder and File Structure Created During a Backup
160(1)
Optimizing Your Backups (Full versus Incremental)
160(4)
Configuring Windows Online Backup
164(5)
Optimizing Your Online Backups
169(1)
Monitoring the Health Status of Your Windows Azure Online Backup Service
169(1)
Configuring Role-Specific Backups
170(1)
Backing Up DHCP and DNS
170(2)
Backing Up WINS
172(1)
Backing Up Certificate Services
172(1)
Backing Up Active Directory Domain Services
172(1)
Enabling the Active Directory Recycle Bin
173(1)
Protecting Active Directory Objects from Deletion
174(1)
Managing VSS Settings Using VSSAdmin
175(1)
Creating System Restore Snapshots
176(1)
Enabling Shadow Copies for Shared Volumes
177(1)
Backing Up Hyper-V Virtual Machines
178(1)
Taking Hyper-V Snapshots
178(1)
Exploring Enterprise Backup Solutions for Windows Server 2012
179(1)
Skill Summary
180(1)
Knowledge Assessment
181(3)
Business Case Scenarios
184(1)
Lesson 9 Recovering Servers
185(31)
Preparing for Windows Server 2012 Restores
185(25)
Restoring Files and Folders
186(2)
Restoring Volumes
188(2)
Restoring the System State
190(1)
Restoring the System State on a Member Server
191(1)
Restoring the System State on a Domain Controller
191(1)
Non-Authoritative Restores
192(1)
Authoritative Restores
192(4)
Restoring Active Directory Objects Using the Active Directory Recycle Bin
196(1)
Performing a Bare Metal Recovery Restore
197(2)
Recovering Servers Using WinRE and Safe Mode
199(3)
Exploring Command-Line Tools
202(1)
Booting into Safe Mode
202(2)
Applying System Restore Snapshots
204(1)
Returning a VM to a Previous State
204(1)
Restoring VMs Using Windows Server Backup
205(1)
Configuring the Boot Configuration Data Store
206(1)
Using BCDedit to Modify Settings in the BCD Store
207(1)
Using Bootrec with Bcdedit to Repair a Corrupted/Missing BCD Store
208(2)
Skill Summary
210(2)
Knowledge Assessment
212(3)
Business Case Scenarios
215(1)
Lesson 10 Configuring Site-Level Fault Tolerance
216(13)
Configuring Hyper-V Replica
216(5)
Configuring Multi-Site Clustering
221(3)
Configuring Multi-Site Storage and Network Settings
222(1)
Configuring Quorum and Failover Settings
223(1)
Configuring Multi-Site Failure Cluster
224(1)
Skill Summary
224(1)
Knowledge Assessment
225(3)
Business Case Scenarios
228(1)
Lesson 11 Implementing an Advanced Dynamic Host Configuration Protocol (DHCP) Solution
229(26)
Implementing Advanced DHCP Solutions
230(20)
Understanding DHCP Basics
230(1)
Clients Acquiring and Renewing IP Addresses
231(1)
DHCP Options
231(1)
Reservations
232(1)
DHCP Server Authorization
232(1)
Creating and Configuring DHCP Policies
232(4)
Creating and Configuring Superscopes
236(3)
Creating and Configuring Multicast Scopes
239(1)
Implementing DHCPv6 Scopes
240(4)
Configuring High Availability for DHCP
244(1)
Configuring Split Scopes
244(2)
Configuring DHCP Failover
246(2)
Configuring DHCP Name Protection
248(2)
Skill Summary
250(1)
Knowledge Assessment
250(4)
Business Case Scenarios
254(1)
Lesson 12 Implementing an Advanced DNS Solution
255(19)
Configuring Security for DNS
256(7)
Configuring DNSSEC
256(3)
Configuring DNS Socket Pool
259(2)
Configuring DNS Cache Locking
261(2)
Configuring DNS Logging
263(2)
Configuring Delegated Administration
265(1)
Configuring Recursion
265(1)
Configuring Netmask Ordering
266(2)
Configuring A GlobalNames Zone
268(2)
Skill Summary
270(1)
Knowledge Assessment
271(2)
Business Case Scenarios
273(1)
Lesson 13 Deploying and Managing IPAM
274(19)
Configuring IPAM
274(7)
Configuring an IPAM Server
277(2)
Configuring Server Discovery
279(2)
Creating and Managing IP Blocks and Ranges
281(4)
Monitoring Utilization of IP Address Space
285(4)
Migrating to IPAM
286(1)
Delegating IPAM Administration
286(1)
Managing IPAM Collections
287(2)
Skill Summary
289(1)
Knowledge Assessment
289(3)
Business Case Scenarios
292(1)
Lesson 14 Configuring a Domain and Forest
293(18)
Implementing Complex Active Directory Environments
294(5)
Implementing Multi-Domain Active Directory Environments
296(3)
Implementing Multi-Forest Active Directory Environments
299(1)
Upgrading Existing Domains and Forests
299(6)
Understanding Functional Levels
300(1)
Raising Domain Functional Levels
300(2)
Raising Forest Functional Levels
302(2)
Upgrading Windows Server 2008 and Windows Server 2008 R2 to Windows Server 2012 Domain Controllers
304(1)
Configuring Multiple UPN Suffixes
305(1)
Skill Summary
306(1)
Knowledge Assessment
307(3)
Business Case Scenarios
310(1)
Lesson 15 Configuring Trusts
311(29)
Configuring Trusts
312(4)
Understanding Trusts
312(2)
Understanding Trust Types
314(1)
Understanding Trust Direction
314(1)
Understanding Transitivity
315(1)
Configuring DNS for Trusts
316(1)
Creating External Trusts
316(3)
Creating Forest Trusts
319(3)
Creating Shortcut Trusts
322(3)
Creating Realm Trusts
325(4)
Validating Trusts
329(1)
Configuring Trust Authentication
329(3)
Configuring Selective Authentication
330(1)
Configuring Domain-Wide Authentication
331(1)
Configuring Forest-Wide Authentication
331(1)
Configuring SID Filtering
332(1)
Configuring Name Suffix Routing
333(2)
Summary Skills Matrix
335(1)
Knowledge Assessment
335(3)
Business Case Scenarios
338(2)
Lesson 16 Configuring Sites
340(23)
Configuring Sites and Subnets
340(18)
Configuring Sites
341(2)
Configuring Subnets
343(2)
Creating and Configuring Site Links
345(1)
Knowledge Consistency Checker (KCC)
345(1)
Intersite Topology Generator
346(1)
Intersite Transport Protocols
346(1)
Bridgehead Servers
346(1)
Site Link Bridges
347(4)
Site Link Costs
351(1)
Replication Interval
352(1)
Replication Schedule
353(1)
Managing Site Coverage
354(1)
Automatic Site Coverage
354(1)
Disable Automatic Site Coverage
354(2)
Managing Registration of SRV Records
356(1)
NETLOGON Service
356(1)
Netlogon.Dns
356(1)
Moving Domain Controllers between Sites
356(1)
Preparing the Domain Controller, DNS, and Environment
357(1)
Skill Summary
358(1)
Knowledge Assessment
358(4)
Business Case Scenarios
362(1)
Lesson 17 Managing Active Directory and SYSVOL Replication
363(24)
Managing Active Directory Replication
364(19)
Understanding Intrasite Replication
364(2)
Understanding Intersite Replication
366(1)
Controlling Active Directory Replication
366(1)
Using the REPADMIN Command to Control Active Directory Replication
366(2)
Using the Active Directory Module with Windows PowerShell to Control Active Directory Replication
368(1)
Using the Active Directory Sites and Services Tool to Control Active Directory Replication
368(1)
Configuring Read-Only Domain Controllers
369(1)
Configuring Replication to a Read-Only Domain Controller
370(1)
Configuring Password Replication Policy for RODCs
371(1)
Read-Only Domain Controller Security
372(2)
Monitoring Replication
374(1)
Monitoring Replication with REPADMIN
374(1)
Monitoring Replication with Windows PowerShell
375(1)
Monitoring Replication with Active Directory Replication Status Tool (ADREPLSTATUS)
375(3)
Upgrading SYSVOL Replication to Distributed File System Replication (DFSR)
378(1)
Understanding the FRS to DFSR Migration Process
378(1)
Global States
378(1)
Preparing the Domain for Migration
379(4)
Skill Summary
383(1)
Knowledge Assessment
383(3)
Business Case Scenarios
386(1)
Lesson 18 Implementing Active Directory Federation Services
387(30)
Understanding Active Directory Federation Services
388(2)
Implementing AD FS
390(22)
Managing AD FS Certificates
395(5)
Implementing Claims-Based Authentication
400(4)
Implementing Relying Party Trusts
404(2)
Configuring Claims Provider Trust Rules
406(2)
Configure Attribute Stores
408(1)
Configuring AD FS Proxy
409(2)
Integrating with Cloud Services
411(1)
Testing Active Directory Federation
411(1)
Skill Summary
412(1)
Knowledge Assessment
413(3)
Business Case Scenarios
416(1)
Lesson 19 Installing and Configuring Active Directory Certificate Services
417(27)
Understanding the Active Directory Certificate Services
418(20)
Installing an Enterprise Certificate Authority
418(10)
Configuring AIA and CRL Distribution Points
428(3)
Installing and Configuring Online Responder
431(4)
Implementing Administrative Role Separation
435(2)
Configuring CA Backup and Recovery
437(1)
Skill Summary
438(1)
Knowledge Assessment
439(4)
Business Case Scenarios
443(1)
Lesson 20 Managing Certificates
444(28)
Managing Digital Certificates
445(22)
Managing Certificate Templates
449(5)
Implementing and Managing Certificate Deployment, Validation, and Revocation
454(1)
Using Manual Enrollment
454(1)
Using CA WEB Enrollment
455(1)
Enrolling Using Enrollment Agents
456(2)
Using Autoenrollment
458(1)
Using Credential Roaming
458(1)
Network Device Enrollment Service (NDES)
459(2)
Managing Certificate Renewal
461(1)
Managing Certificate Enrollment and Renewal Using Group Policies
462(1)
Configuring and Managing Key Archival and Recovery
463(4)
Skill Summary
467(1)
Knowledge Assessment
468(3)
Business Case Scenarios
471(1)
Lesson 21 Installing and Configuring Active Directory Rights Management Services
472
Understanding Active Directory Rights Management
473(23)
Understanding the Rights Management Processes
474(2)
Installing a Licensing or Certificate AD RMS Server
476(8)
Managing AD RMS Service Connection Point
484(2)
Managing AD RMS Client Deployment
486(1)
Managing Trusted User Domains
487(1)
Managing Trusted Publishing Domains
488(2)
Managing Federated Identity Support
490(1)
Supporting Mobile Devices
491(1)
Managing RMS Templates
491(4)
Configuring Exclusion Policies
495(1)
Skill Summary
496(1)
Knowledge Assessment
497(4)
Business Case Scenarios
501
Appendix A 502(2)
Index 504
1 Configuring Network Load Balancing
1(14)
Exercise 1.1 Installing the Network Load Balancing Feature
2(3)
Exercise 1.2 Creating a Windows Server 2012 NLB Cluster
5(5)
Exercise 1.3 Configuring DNS
10(1)
Exercise 1.4 Configuring Cluster Properties
11(1)
Exercise 1.5 Managing the Cluster Nodes
12(1)
Exercise 1.6 Removing the NLB Cluster
13(1)
Lab Challenge: Adding Drivers to a Windows image
14(1)
2 Configuring Failover Clustering
15(14)
Exercise 2.1 Configuring the iSCSI Client
16(4)
Exercise 2.2 Installing the Failover Clustering Feature
20(1)
Exercise 2.3 Creating a Failover Cluster
20(5)
Exercise 2.4 Configuring the Quorum
25(1)
Exercise 2.5 Implementing Cluster Aware Updating
26(2)
Lab Challenge: Upgrading a Failover Cluster
28(1)
3 Managing Failover Clustering
29(15)
Exercise 3.1 Deploying the General Use File Server Role
30(8)
Exercise 3.2 Deploying Scale-Out File Server
38(1)
Exercise 3.3 Configuring Fail-over and Preference Settings
39(2)
Exercise 3.4 Managing the Cluster
41(1)
Exercise 3.5 Destroying a Cluster
42(1)
Lab Challenge: Configuring VM Monitoring
43(1)
4 Managing VM Movement
44(11)
Exercise 4.1 Moving a VM Storage Location
45(4)
Exercise 4.2 Move a VM to Another Host
49(1)
Exercise 4.3 Copy a VM
50(4)
Lab Challenge: Configuring Computers for Live Migration
54(1)
5 Configuring Advanced File Solutions
55(19)
Exercise 5.1 Creating an NFS Shared Folder
56(3)
Exercise 5.2 Installing and Configuring BranchCache
59(5)
Exercise 5.3 Using File Classification
64(5)
Exercise 5.4 Configuring File Access Auditing
69(4)
Lab Challenge: Creating an NFS Shared Folder on a Cluster
73(1)
6 Implementing Dynamic Access Control
74(15)
Exercise 6.1 Using Dynamic Access Control
75(7)
Exercise 6.2 Implementing a Central Access Policy
82(6)
Lab Challenge: Performing Access-Denied Remediation
88(1)
7 Configuring and Optimizing Storage
89(14)
Exercise 7.1 Removing an iSCSI Target
90(6)
Exercise 7.2 Creating and Configuring an iSCSI Target
96(2)
Exercise 7.3 Configuring iSCSI Initiator
98(3)
Exercise 7.4 Using Features on Demand
101(1)
Lab Challenge: Implementing Thin Provisioning
102(1)
8 Configuring and Managing Backups
103(11)
Exercise 8.1 Installing the Windows Server Backup Feature
104(1)
Exercise 8.2 Performing a Manual Backup of Local Folders to a Remote Share
105(4)
Exercise 8.3 Backing up the System State
109(1)
Exercise 8.4 Managing VSS Settings
110(1)
Exercise 8.5 Enabling Shadow Copies for Shared Volumes
111(2)
Lab Challenge: Using Hyper-V Snapshots
113(1)
9 Recovering Servers
114(15)
Exercise 9.1 Restoring a Folder using Windows Server Backup
116(2)
Exercise 9.2 Restoring the System State of a System
118(1)
Exercise 9.3 Restoring a File Using Shadow Copy
118(2)
Exercise 9.4 Booting Into Safe Mode
120(6)
Exercise 9.5 Using Command Prompt Repair Tools
126(2)
Lab Challenge: Performing an Authoritative Restore
128(1)
10 Configuring Site-Level Fault Tolerance
129(7)
Exercise 10.1 Configuring and Enabling Hyper-V Replication
130(4)
Exercise 10.2 Configuring Replication for a VM
134(1)
Lab Challenge: Configuring Multi-Site Failure Cluster
135(1)
11 Implementing an Advanced Dynamic Host Configuration Protocol (DHCP) Solution
136(13)
Exercise 11.1 Creating a Vendor Class
138(1)
Exercise 11.2 Creating a DHCP Policy
139(3)
Exercise 11.3 Creating and Configuring a Superscope
142(2)
Exercise 11.4 Creating and Configuring Multicast Scopes
144(1)
Exercise 11.5 Implementing DHCPv6 Scopes
145(2)
Exercise 11.6 Configuring DHCP Name Protection
147(1)
Lab Challenge: Creating a DHCP Split-Scope
148(1)
12 Implementing an Advanced DNS Solution
149(10)
Exercise 12.1 Configuring DNSSEC
150(4)
Exercise 12.2 Enabling DNS Cache Locking
154(1)
Exercise 12.3 Configuring DNS Logging
155(1)
Exercise 12.4 Disabling Recursion
155(1)
Exercise 12.5 Configuring Netmask Ordering
156(1)
Exercise 12.6 Configuring a GlobalNames Zone
156(2)
Lab Challenge: Delegating DNS Administration
158(1)
13 Deploying and Managing IPAM
159(13)
Exercise 13.1 Installing an IPAM on a Member Server
160(1)
Exercise 13.2 Configuring IPAM
161(10)
Lab Challenge: Migrating to IPAM
171(1)
14 Configuring a Domain and Forest
172(11)
Exercise 14.1 Creating a Child Domain
173(3)
Exercise 14.2 Demoting a Domain Controller
176(2)
Exercise 14.3 Installing a New Forest
178(2)
Exercise 14.4 Raising the Domain and Forest Functional Level
180(1)
Exercise 14.5 Configuring Multiple UPN Suffixes
181(1)
Lab Challenge: Performing an Upgrade Installation
182(1)
15 Configuring Trusts
183(13)
Exercise 15.1 Creating a One-Way External Trust
184(5)
Exercise 15.2 Creating a Two-Way Forest Trust
189(2)
Exercise 15.3 Validating and Testing the Trust
191(4)
Lab Challenge: Configuring Selective Authentication between two Trusted Domains
195(1)
16 Configuring Sites
196(9)
Exercise 16.1 Adding Sites and Subnets
197(3)
Exercise 16.2 Configuring a Bridgehead Server
200(1)
Exercise 16.3 Creating a Site Link
201(1)
Exercise 16.4 Modifying the Replication Interval and Replication Schedule
202(2)
Lab Challenge: Working with SRV Records
204(1)
17 Managing Active Directory and SYSVOL Replication
205(11)
Exercise 17.1 Demoting a Domain Controller
206(1)
Exercise 17.2 Promoting a Domain Controller
207(2)
Exercise 17.3 Replicating with Active Directory Sites and Services
209(1)
Exercise 17.4 Using REPADMIN
210(1)
Exercise 17.5 Configuring Password Replication Policies for an RODC
210(5)
Lab Challenge: Upgrading SYSVOL Replication to DFSR
215(1)
18 Implementing Active Directory Federation Services
216(16)
Exercise 18.1 Installing the Active Directory Federation Services
218(1)
Exercise 18.2 Creating a standalone Federation Server
219(2)
Exercise 18.3 Creating and Configuring a Sample WIF Application
221(5)
Exercise 18.4 Implementing Relying Party Trusts
226(2)
Exercise 18.5 Configuring the Active Directory Claims Provider Trust
228(3)
Lab Challenge: Adding an Attribute Store
231(1)
19 Installing and Configuring Active Directory Certificate Services
232(14)
Exercise 19.1 Installing an Enterprise Certificate Authority
233(3)
Exercise 19.2 Installing Subordinate Certificate Services
236(3)
Exercise 19.3 Configuring Certified Revocation List (CRL) Distribution
239(1)
Exercise 19.4 Installing the Online Responder Role
240(4)
Exercise 19.5 Performing a CA Backup
244(1)
Lab Challenge: Managing Administrative Roles
245(1)
20 Managing Certificates
246(16)
Exercise 20.1 Importing and Exporting Digital Certificates
247(2)
Exercise 20.2 Renewing a Certificate Authority Certificate
249(1)
Exercise 20.3 Creating a New User Certificate Template
250(2)
Exercise 20.4 Requesting a Certificate
252(3)
Exercise 20.5 Configuring Autoenrollment
255(2)
Exercise 20.6 Enabling Enrollment Agents
257(4)
Lab Challenge: Configuring the Key Recovery Agent
261(1)
21 Installing and Configuring Active Directory Rights Management Services
262(13)
Exercise 21.1 Installing Active Directory Rights Management Service (AD RMS)
264(4)
Exercise 21.2 Creating and Enabling the Super Users Group
268(3)
Exercise 21.3 Export and Import the TUD Certificate
271(1)
Exercise 21.4 Create Distributed Rights Policy Template
271(1)
Exercise 21.5 Enable and Configure Application Exclusion
272(2)
Lab Challenge: Enabling and Configuring Federated Identity Support Settings
274(1)
Appendix: Lab Setup Guide 275
The Microsoft Official Academic Course (MOAC) Program is the official product for Microsoft Programs in higher education. These learning products are created especially for the academic market and combine the business world focus and market research of Microsoft with 200 years of successful higher education publishing from Wiley. The program is based upon the same curriculum as the Microsoft IT Certifications to build the skills students need to succeed at work and the preparation they need to validate those skills and get the jobs they seek. All the support instructors need to deliver great courses on Microsoft software is in the program. Student copies of the textbooks include the trial software in select markets and student files for completing homework assignments. Microsoft Updates will bring you the latest information on new products and curriculums and are a part of the program. MOAC is a great way for instructors to get ready to teach and for students to get ready for work.