|
Lesson 1 Configuring Network Load Balancing |
|
|
1 | (17) |
|
Understanding Fault Tolerance |
|
|
1 | (2) |
|
Configuring Network Load Balancing |
|
|
3 | (9) |
|
Configuring NLB Prerequisites |
|
|
3 | (1) |
|
|
4 | (5) |
|
|
9 | (1) |
|
Configuring Filtering Mode and Affinity |
|
|
9 | (2) |
|
Configuring Cluster Operation Mode |
|
|
11 | (1) |
|
|
11 | (1) |
|
|
12 | (1) |
|
|
12 | (1) |
|
|
13 | (4) |
|
|
17 | (1) |
|
Lesson 2 Configuring Failover Clustering |
|
|
18 | (26) |
|
Understanding Failover Clustering |
|
|
19 | (20) |
|
Installing and Configuring Failover Clustering |
|
|
20 | (1) |
|
Understanding Failover Clustering Requirements |
|
|
20 | (1) |
|
Configuring Cluster Networking |
|
|
21 | (1) |
|
Installing and Creating a Failover Cluster |
|
|
22 | (5) |
|
Configuring Cluster Storage |
|
|
25 | |
|
|
27 | (3) |
|
|
30 | (4) |
|
Implementing Cluster-Aware Updating |
|
|
34 | (2) |
|
|
36 | (1) |
|
Troubleshooting Problems with Failover Clusters |
|
|
37 | (1) |
|
Backing Up and Restoring Failover Cluster Configuration |
|
|
38 | (1) |
|
|
39 | (1) |
|
|
40 | (3) |
|
|
43 | (1) |
|
Lesson 3 Managing Failover Clustering |
|
|
44 | (16) |
|
Managing Failover Clustering Roles |
|
|
44 | (11) |
|
|
45 | (1) |
|
Configuring Role-Specific Settings |
|
|
46 | (1) |
|
|
46 | (1) |
|
Deploying the General Use File Server Role |
|
|
47 | (3) |
|
Deploying Scale-Out File Server |
|
|
50 | (1) |
|
Deploying a Highly Available Virtual Machine |
|
|
51 | (2) |
|
Deploying Hyper-V over SMB 3 |
|
|
53 | (1) |
|
Configuring Failover and Preferences Settings |
|
|
53 | (2) |
|
Configuring VM Monitoring |
|
|
55 | (1) |
|
|
55 | (1) |
|
|
56 | (3) |
|
|
59 | (1) |
|
Lesson 4 Managing Virtual Machine Movement |
|
|
60 | (24) |
|
Understanding Virtual Machine Movement |
|
|
61 | (1) |
|
Understanding Live Migration |
|
|
61 | (6) |
|
|
61 | (1) |
|
Configuring LM Prerequisites |
|
|
62 | (3) |
|
|
65 | (2) |
|
Performing Quick Migration |
|
|
67 | (1) |
|
Performing Storage Migration |
|
|
68 | (4) |
|
Exporting, Importing, and Copying Virtual Machines |
|
|
72 | (3) |
|
Understanding Exporting, Importing, and Copying Virtual Machines |
|
|
72 | (3) |
|
Migrating from Other Platforms - Understanding P2V and V2V |
|
|
75 | (3) |
|
Using SCVMM for P2V Machine Migration |
|
|
76 | (1) |
|
P2V Source Machine Requirements |
|
|
76 | (1) |
|
P2V Destination Machine Requirements |
|
|
76 | (1) |
|
P2V Suggested Prerequisites |
|
|
77 | (1) |
|
Converting Physical Computers to VMs |
|
|
77 | (1) |
|
P2V Another Way---Disk2VHD |
|
|
78 | (1) |
|
Converting a Virtual Machine to Virtual Machine (V2V) Using SCVMM |
|
|
78 | (1) |
|
Convert Citrix XenServer Virtual Machines to Hyper-V |
|
|
78 | (1) |
|
Convert VMware ESX/ESXi Virtual Machines to Hyper-V |
|
|
78 | (1) |
|
Convert Virtual Machines to Hyper-V Using the OVF Import/Export Tool |
|
|
78 | (1) |
|
|
79 | (1) |
|
|
80 | (3) |
|
|
83 | (1) |
|
Lesson 5 Configuring Advanced File Services |
|
|
84 | (27) |
|
Configuring NFS Data Store |
|
|
84 | (8) |
|
Obtaining User and Group Information |
|
|
85 | (3) |
|
|
88 | (1) |
|
Installing and Configuring the NFS Data Store |
|
|
89 | (3) |
|
|
92 | (6) |
|
Configuring File Classification Infrastructure |
|
|
98 | (3) |
|
Configuring File Access Auditing |
|
|
101 | (4) |
|
|
105 | (1) |
|
|
106 | (4) |
|
|
110 | (1) |
|
Lesson 6 Implementing Dynamic Access Control |
|
|
111 | (21) |
|
Using Dynamic Access Control |
|
|
112 | (16) |
|
Configuring User and Device Claim Types |
|
|
114 | (2) |
|
Configuring File Classification |
|
|
116 | (3) |
|
Implementing a Central Access Policy |
|
|
119 | (4) |
|
Implementing Policy Changes and Staging |
|
|
123 | (1) |
|
Creating Expression-Based Audit Policies |
|
|
124 | (1) |
|
Performing Access-Denied Remediation |
|
|
125 | (3) |
|
|
128 | (1) |
|
|
128 | (3) |
|
|
131 | (1) |
|
Lesson 7 Configuring and Optimizing Storage |
|
|
132 | (20) |
|
Understanding Shared Storage |
|
|
133 | (1) |
|
|
134 | (11) |
|
|
135 | (4) |
|
Configuring iSCSI Initiator |
|
|
139 | (3) |
|
Configuring iSCSI for High Availability |
|
|
142 | (1) |
|
Configuring Internet Storage Name Server |
|
|
143 | (2) |
|
Implementing Thin Provisioning and Trim |
|
|
145 | (1) |
|
Managing Server Free Space Using Features on Demand |
|
|
146 | (2) |
|
|
148 | (1) |
|
|
148 | (3) |
|
|
151 | (1) |
|
Lesson 8 Configuring and Managing Backups |
|
|
152 | (33) |
|
Configuring and Managing Backups |
|
|
152 | (28) |
|
Installing the Windows Server Backup Feature |
|
|
153 | (3) |
|
Configuring Windows Server Backups |
|
|
156 | (1) |
|
Reviewing Backup Configuration Options |
|
|
157 | (1) |
|
Exploring Your Scheduling Options |
|
|
158 | (1) |
|
Selecting Where to Store Your Backups |
|
|
158 | (2) |
|
Reviewing the Folder and File Structure Created During a Backup |
|
|
160 | (1) |
|
Optimizing Your Backups (Full versus Incremental) |
|
|
160 | (4) |
|
Configuring Windows Online Backup |
|
|
164 | (5) |
|
Optimizing Your Online Backups |
|
|
169 | (1) |
|
Monitoring the Health Status of Your Windows Azure Online Backup Service |
|
|
169 | (1) |
|
Configuring Role-Specific Backups |
|
|
170 | (1) |
|
|
170 | (2) |
|
|
172 | (1) |
|
Backing Up Certificate Services |
|
|
172 | (1) |
|
Backing Up Active Directory Domain Services |
|
|
172 | (1) |
|
Enabling the Active Directory Recycle Bin |
|
|
173 | (1) |
|
Protecting Active Directory Objects from Deletion |
|
|
174 | (1) |
|
Managing VSS Settings Using VSSAdmin |
|
|
175 | (1) |
|
Creating System Restore Snapshots |
|
|
176 | (1) |
|
Enabling Shadow Copies for Shared Volumes |
|
|
177 | (1) |
|
Backing Up Hyper-V Virtual Machines |
|
|
178 | (1) |
|
|
178 | (1) |
|
Exploring Enterprise Backup Solutions for Windows Server 2012 |
|
|
179 | (1) |
|
|
180 | (1) |
|
|
181 | (3) |
|
|
184 | (1) |
|
Lesson 9 Recovering Servers |
|
|
185 | (31) |
|
Preparing for Windows Server 2012 Restores |
|
|
185 | (25) |
|
Restoring Files and Folders |
|
|
186 | (2) |
|
|
188 | (2) |
|
Restoring the System State |
|
|
190 | (1) |
|
Restoring the System State on a Member Server |
|
|
191 | (1) |
|
Restoring the System State on a Domain Controller |
|
|
191 | (1) |
|
Non-Authoritative Restores |
|
|
192 | (1) |
|
|
192 | (4) |
|
Restoring Active Directory Objects Using the Active Directory Recycle Bin |
|
|
196 | (1) |
|
Performing a Bare Metal Recovery Restore |
|
|
197 | (2) |
|
Recovering Servers Using WinRE and Safe Mode |
|
|
199 | (3) |
|
Exploring Command-Line Tools |
|
|
202 | (1) |
|
|
202 | (2) |
|
Applying System Restore Snapshots |
|
|
204 | (1) |
|
Returning a VM to a Previous State |
|
|
204 | (1) |
|
Restoring VMs Using Windows Server Backup |
|
|
205 | (1) |
|
Configuring the Boot Configuration Data Store |
|
|
206 | (1) |
|
Using BCDedit to Modify Settings in the BCD Store |
|
|
207 | (1) |
|
Using Bootrec with Bcdedit to Repair a Corrupted/Missing BCD Store |
|
|
208 | (2) |
|
|
210 | (2) |
|
|
212 | (3) |
|
|
215 | (1) |
|
Lesson 10 Configuring Site-Level Fault Tolerance |
|
|
216 | (13) |
|
Configuring Hyper-V Replica |
|
|
216 | (5) |
|
Configuring Multi-Site Clustering |
|
|
221 | (3) |
|
Configuring Multi-Site Storage and Network Settings |
|
|
222 | (1) |
|
Configuring Quorum and Failover Settings |
|
|
223 | (1) |
|
Configuring Multi-Site Failure Cluster |
|
|
224 | (1) |
|
|
224 | (1) |
|
|
225 | (3) |
|
|
228 | (1) |
|
Lesson 11 Implementing an Advanced Dynamic Host Configuration Protocol (DHCP) Solution |
|
|
229 | (26) |
|
Implementing Advanced DHCP Solutions |
|
|
230 | (20) |
|
Understanding DHCP Basics |
|
|
230 | (1) |
|
Clients Acquiring and Renewing IP Addresses |
|
|
231 | (1) |
|
|
231 | (1) |
|
|
232 | (1) |
|
DHCP Server Authorization |
|
|
232 | (1) |
|
Creating and Configuring DHCP Policies |
|
|
232 | (4) |
|
Creating and Configuring Superscopes |
|
|
236 | (3) |
|
Creating and Configuring Multicast Scopes |
|
|
239 | (1) |
|
Implementing DHCPv6 Scopes |
|
|
240 | (4) |
|
Configuring High Availability for DHCP |
|
|
244 | (1) |
|
|
244 | (2) |
|
Configuring DHCP Failover |
|
|
246 | (2) |
|
Configuring DHCP Name Protection |
|
|
248 | (2) |
|
|
250 | (1) |
|
|
250 | (4) |
|
|
254 | (1) |
|
Lesson 12 Implementing an Advanced DNS Solution |
|
|
255 | (19) |
|
Configuring Security for DNS |
|
|
256 | (7) |
|
|
256 | (3) |
|
Configuring DNS Socket Pool |
|
|
259 | (2) |
|
Configuring DNS Cache Locking |
|
|
261 | (2) |
|
|
263 | (2) |
|
Configuring Delegated Administration |
|
|
265 | (1) |
|
|
265 | (1) |
|
Configuring Netmask Ordering |
|
|
266 | (2) |
|
Configuring A GlobalNames Zone |
|
|
268 | (2) |
|
|
270 | (1) |
|
|
271 | (2) |
|
|
273 | (1) |
|
Lesson 13 Deploying and Managing IPAM |
|
|
274 | (19) |
|
|
274 | (7) |
|
Configuring an IPAM Server |
|
|
277 | (2) |
|
Configuring Server Discovery |
|
|
279 | (2) |
|
Creating and Managing IP Blocks and Ranges |
|
|
281 | (4) |
|
Monitoring Utilization of IP Address Space |
|
|
285 | (4) |
|
|
286 | (1) |
|
Delegating IPAM Administration |
|
|
286 | (1) |
|
Managing IPAM Collections |
|
|
287 | (2) |
|
|
289 | (1) |
|
|
289 | (3) |
|
|
292 | (1) |
|
Lesson 14 Configuring a Domain and Forest |
|
|
293 | (18) |
|
Implementing Complex Active Directory Environments |
|
|
294 | (5) |
|
Implementing Multi-Domain Active Directory Environments |
|
|
296 | (3) |
|
Implementing Multi-Forest Active Directory Environments |
|
|
299 | (1) |
|
Upgrading Existing Domains and Forests |
|
|
299 | (6) |
|
Understanding Functional Levels |
|
|
300 | (1) |
|
Raising Domain Functional Levels |
|
|
300 | (2) |
|
Raising Forest Functional Levels |
|
|
302 | (2) |
|
Upgrading Windows Server 2008 and Windows Server 2008 R2 to Windows Server 2012 Domain Controllers |
|
|
304 | (1) |
|
Configuring Multiple UPN Suffixes |
|
|
305 | (1) |
|
|
306 | (1) |
|
|
307 | (3) |
|
|
310 | (1) |
|
Lesson 15 Configuring Trusts |
|
|
311 | (29) |
|
|
312 | (4) |
|
|
312 | (2) |
|
Understanding Trust Types |
|
|
314 | (1) |
|
Understanding Trust Direction |
|
|
314 | (1) |
|
Understanding Transitivity |
|
|
315 | (1) |
|
Configuring DNS for Trusts |
|
|
316 | (1) |
|
|
316 | (3) |
|
|
319 | (3) |
|
|
322 | (3) |
|
|
325 | (4) |
|
|
329 | (1) |
|
Configuring Trust Authentication |
|
|
329 | (3) |
|
Configuring Selective Authentication |
|
|
330 | (1) |
|
Configuring Domain-Wide Authentication |
|
|
331 | (1) |
|
Configuring Forest-Wide Authentication |
|
|
331 | (1) |
|
Configuring SID Filtering |
|
|
332 | (1) |
|
Configuring Name Suffix Routing |
|
|
333 | (2) |
|
|
335 | (1) |
|
|
335 | (3) |
|
|
338 | (2) |
|
Lesson 16 Configuring Sites |
|
|
340 | (23) |
|
Configuring Sites and Subnets |
|
|
340 | (18) |
|
|
341 | (2) |
|
|
343 | (2) |
|
Creating and Configuring Site Links |
|
|
345 | (1) |
|
Knowledge Consistency Checker (KCC) |
|
|
345 | (1) |
|
Intersite Topology Generator |
|
|
346 | (1) |
|
Intersite Transport Protocols |
|
|
346 | (1) |
|
|
346 | (1) |
|
|
347 | (4) |
|
|
351 | (1) |
|
|
352 | (1) |
|
|
353 | (1) |
|
|
354 | (1) |
|
|
354 | (1) |
|
Disable Automatic Site Coverage |
|
|
354 | (2) |
|
Managing Registration of SRV Records |
|
|
356 | (1) |
|
|
356 | (1) |
|
|
356 | (1) |
|
Moving Domain Controllers between Sites |
|
|
356 | (1) |
|
Preparing the Domain Controller, DNS, and Environment |
|
|
357 | (1) |
|
|
358 | (1) |
|
|
358 | (4) |
|
|
362 | (1) |
|
Lesson 17 Managing Active Directory and SYSVOL Replication |
|
|
363 | (24) |
|
Managing Active Directory Replication |
|
|
364 | (19) |
|
Understanding Intrasite Replication |
|
|
364 | (2) |
|
Understanding Intersite Replication |
|
|
366 | (1) |
|
Controlling Active Directory Replication |
|
|
366 | (1) |
|
Using the REPADMIN Command to Control Active Directory Replication |
|
|
366 | (2) |
|
Using the Active Directory Module with Windows PowerShell to Control Active Directory Replication |
|
|
368 | (1) |
|
Using the Active Directory Sites and Services Tool to Control Active Directory Replication |
|
|
368 | (1) |
|
Configuring Read-Only Domain Controllers |
|
|
369 | (1) |
|
Configuring Replication to a Read-Only Domain Controller |
|
|
370 | (1) |
|
Configuring Password Replication Policy for RODCs |
|
|
371 | (1) |
|
Read-Only Domain Controller Security |
|
|
372 | (2) |
|
|
374 | (1) |
|
Monitoring Replication with REPADMIN |
|
|
374 | (1) |
|
Monitoring Replication with Windows PowerShell |
|
|
375 | (1) |
|
Monitoring Replication with Active Directory Replication Status Tool (ADREPLSTATUS) |
|
|
375 | (3) |
|
Upgrading SYSVOL Replication to Distributed File System Replication (DFSR) |
|
|
378 | (1) |
|
Understanding the FRS to DFSR Migration Process |
|
|
378 | (1) |
|
|
378 | (1) |
|
Preparing the Domain for Migration |
|
|
379 | (4) |
|
|
383 | (1) |
|
|
383 | (3) |
|
|
386 | (1) |
|
Lesson 18 Implementing Active Directory Federation Services |
|
|
387 | (30) |
|
Understanding Active Directory Federation Services |
|
|
388 | (2) |
|
|
390 | (22) |
|
Managing AD FS Certificates |
|
|
395 | (5) |
|
Implementing Claims-Based Authentication |
|
|
400 | (4) |
|
Implementing Relying Party Trusts |
|
|
404 | (2) |
|
Configuring Claims Provider Trust Rules |
|
|
406 | (2) |
|
Configure Attribute Stores |
|
|
408 | (1) |
|
|
409 | (2) |
|
Integrating with Cloud Services |
|
|
411 | (1) |
|
Testing Active Directory Federation |
|
|
411 | (1) |
|
|
412 | (1) |
|
|
413 | (3) |
|
|
416 | (1) |
|
Lesson 19 Installing and Configuring Active Directory Certificate Services |
|
|
417 | (27) |
|
Understanding the Active Directory Certificate Services |
|
|
418 | (20) |
|
Installing an Enterprise Certificate Authority |
|
|
418 | (10) |
|
Configuring AIA and CRL Distribution Points |
|
|
428 | (3) |
|
Installing and Configuring Online Responder |
|
|
431 | (4) |
|
Implementing Administrative Role Separation |
|
|
435 | (2) |
|
Configuring CA Backup and Recovery |
|
|
437 | (1) |
|
|
438 | (1) |
|
|
439 | (4) |
|
|
443 | (1) |
|
Lesson 20 Managing Certificates |
|
|
444 | (28) |
|
Managing Digital Certificates |
|
|
445 | (22) |
|
Managing Certificate Templates |
|
|
449 | (5) |
|
Implementing and Managing Certificate Deployment, Validation, and Revocation |
|
|
454 | (1) |
|
|
454 | (1) |
|
|
455 | (1) |
|
Enrolling Using Enrollment Agents |
|
|
456 | (2) |
|
|
458 | (1) |
|
|
458 | (1) |
|
Network Device Enrollment Service (NDES) |
|
|
459 | (2) |
|
Managing Certificate Renewal |
|
|
461 | (1) |
|
Managing Certificate Enrollment and Renewal Using Group Policies |
|
|
462 | (1) |
|
Configuring and Managing Key Archival and Recovery |
|
|
463 | (4) |
|
|
467 | (1) |
|
|
468 | (3) |
|
|
471 | (1) |
|
Lesson 21 Installing and Configuring Active Directory Rights Management Services |
|
|
472 | |
|
Understanding Active Directory Rights Management |
|
|
473 | (23) |
|
Understanding the Rights Management Processes |
|
|
474 | (2) |
|
Installing a Licensing or Certificate AD RMS Server |
|
|
476 | (8) |
|
Managing AD RMS Service Connection Point |
|
|
484 | (2) |
|
Managing AD RMS Client Deployment |
|
|
486 | (1) |
|
Managing Trusted User Domains |
|
|
487 | (1) |
|
Managing Trusted Publishing Domains |
|
|
488 | (2) |
|
Managing Federated Identity Support |
|
|
490 | (1) |
|
Supporting Mobile Devices |
|
|
491 | (1) |
|
|
491 | (4) |
|
Configuring Exclusion Policies |
|
|
495 | (1) |
|
|
496 | (1) |
|
|
497 | (4) |
|
|
501 | |
Appendix A |
|
502 | (2) |
Index |
|
504 | |
|
1 Configuring Network Load Balancing |
|
|
1 | (14) |
|
Exercise 1.1 Installing the Network Load Balancing Feature |
|
|
2 | (3) |
|
Exercise 1.2 Creating a Windows Server 2012 NLB Cluster |
|
|
5 | (5) |
|
Exercise 1.3 Configuring DNS |
|
|
10 | (1) |
|
Exercise 1.4 Configuring Cluster Properties |
|
|
11 | (1) |
|
Exercise 1.5 Managing the Cluster Nodes |
|
|
12 | (1) |
|
Exercise 1.6 Removing the NLB Cluster |
|
|
13 | (2) |
|
Lab Challenge: Adding Drivers to a Windows image |
|
|
14 | (1) |
|
2 Configuring Failover Clustering |
|
|
15 | (14) |
|
Exercise 2.1 Configuring the iSCSI Client |
|
|
16 | (4) |
|
Exercise 2.2 Installing the Failover Clustering Feature |
|
|
20 | (1) |
|
Exercise 2.3 Creating a Failover Cluster |
|
|
20 | (5) |
|
Exercise 2.4 Configuring the Quorum |
|
|
25 | (1) |
|
Exercise 2.5 Implementing Cluster Aware Updating |
|
|
26 | (3) |
|
Lab Challenge: Upgrading a Failover Cluster |
|
|
28 | (1) |
|
3 Managing Failover Clustering |
|
|
29 | (15) |
|
Exercise 3.1 Deploying the General Use File Server Role |
|
|
30 | (8) |
|
Exercise 3.2 Deploying Scale-Out File Server |
|
|
38 | (1) |
|
Exercise 3.3 Configuring Fail-over and Preference Settings |
|
|
39 | (2) |
|
Exercise 3.4 Managing the Cluster |
|
|
41 | (1) |
|
Exercise 3.5 Destroying a Cluster |
|
|
42 | (2) |
|
Lab Challenge: Configuring VM Monitoring |
|
|
43 | (1) |
|
|
44 | (11) |
|
Exercise 4.1 Moving a VM Storage Location |
|
|
45 | (4) |
|
Exercise 4.2 Move a VM to Another Host |
|
|
49 | (1) |
|
|
50 | (5) |
|
Lab Challenge: Configuring Computers for Live Migration |
|
|
54 | (1) |
|
5 Configuring Advanced File Solutions |
|
|
55 | (19) |
|
Exercise 5.1 Creating an NFS Shared Folder |
|
|
56 | (3) |
|
Exercise 5.2 Installing and Configuring BranchCache |
|
|
59 | (5) |
|
Exercise 5.3 Using File Classification |
|
|
64 | (5) |
|
Exercise 5.4 Configuring File Access Auditing |
|
|
69 | (5) |
|
Lab Challenge: Creating an NFS Shared Folder on a Cluster |
|
|
73 | (1) |
|
6 Implementing Dynamic Access Control |
|
|
74 | (15) |
|
Exercise 6.1 Using Dynamic Access Control |
|
|
75 | (7) |
|
Exercise 6.2 Implementing a Central Access Policy |
|
|
82 | (7) |
|
Lab Challenge: Performing Access-Denied Remediation |
|
|
88 | (1) |
|
7 Configuring and Optimizing Storage |
|
|
89 | (14) |
|
Exercise 7.1 Removing an iSCSI Target |
|
|
90 | (6) |
|
Exercise 7.2 Creating and Configuring an iSCSI Target |
|
|
96 | (2) |
|
Exercise 7.3 Configuring iSCSI Initiator |
|
|
98 | (3) |
|
Exercise 7.4 Using Features on Demand |
|
|
101 | (2) |
|
Lab Challenge: Implementing Thin Provisioning |
|
|
102 | (1) |
|
8 Configuring and Managing Backups |
|
|
103 | (11) |
|
Exercise 8.1 Installing the Windows Server Backup Feature |
|
|
104 | (1) |
|
Exercise 8.2 Performing a Manual Backup of Local Folders to a Remote Share |
|
|
105 | (4) |
|
Exercise 8.3 Backing up the System State |
|
|
109 | (1) |
|
Exercise 8.4 Managing VSS Settings |
|
|
110 | (1) |
|
Exercise 8.5 Enabling Shadow Copies for Shared Volumes |
|
|
111 | (3) |
|
Lab Challenge: Using Hyper-V Snapshots |
|
|
113 | (1) |
|
|
114 | (15) |
|
Exercise 9.1 Restoring a Folder using Windows Server Backup |
|
|
116 | (2) |
|
Exercise 9.2 Restoring the System State of a System |
|
|
118 | (1) |
|
Exercise 9.3 Restoring a File Using Shadow Copy |
|
|
118 | (2) |
|
Exercise 9.4 Booting Into Safe Mode |
|
|
120 | (6) |
|
Exercise 9.5 Using Command Prompt Repair Tools |
|
|
126 | (3) |
|
Lab Challenge: Performing an Authoritative Restore |
|
|
128 | (1) |
|
10 Configuring Site-Level Fault Tolerance |
|
|
129 | (7) |
|
Exercise 10.1 Configuring and Enabling Hyper-V Replication |
|
|
130 | (4) |
|
Exercise 10.2 Configuring Replication for a VM |
|
|
134 | (2) |
|
Lab Challenge: Configuring Multi-Site Failure Cluster |
|
|
135 | (1) |
|
11 Implementing an Advanced Dynamic Host Configuration Protocol (DHCP) Solution |
|
|
136 | (13) |
|
Exercise 11.1 Creating a Vendor Class |
|
|
138 | (1) |
|
Exercise 11.2 Creating a DHCP Policy |
|
|
139 | (3) |
|
Exercise 11.3 Creating and Configuring a Superscope |
|
|
142 | (2) |
|
Exercise 11.4 Creating and Configuring Multicast Scopes |
|
|
144 | (1) |
|
Exercise 11.5 Implementing DHCPv6 Scopes |
|
|
145 | (2) |
|
Exercise 11.6 Configuring DHCP Name Protection |
|
|
147 | (2) |
|
Lab Challenge: Creating a DHCP Split-Scope |
|
|
148 | (1) |
|
12 Implementing an Advanced DNS Solution |
|
|
149 | (10) |
|
Exercise 12.1 Configuring DNSSEC |
|
|
150 | (4) |
|
Exercise 12.2 Enabling DNS Cache Locking |
|
|
154 | (1) |
|
Exercise 12.3 Configuring DNS Logging |
|
|
155 | (1) |
|
Exercise 12.4 Disabling Recursion |
|
|
155 | (1) |
|
Exercise 12.5 Configuring Netmask Ordering |
|
|
156 | (1) |
|
Exercise 12.6 Configuring a GlobalNames Zone |
|
|
156 | (3) |
|
Lab Challenge: Delegating DNS Administration |
|
|
158 | (1) |
|
13 Deploying and Managing IPAM |
|
|
159 | (13) |
|
Exercise 13.1 Installing an IPAM on a Member Server |
|
|
160 | (1) |
|
Exercise 13.2 Configuring IPAM |
|
|
161 | (11) |
|
Lab Challenge: Migrating to IPAM |
|
|
171 | (1) |
|
14 Configuring a Domain and Forest |
|
|
172 | (11) |
|
Exercise 14.1 Creating a Child Domain |
|
|
173 | (3) |
|
Exercise 14.2 Demoting a Domain Controller |
|
|
176 | (2) |
|
Exercise 14.3 Installing a New Forest |
|
|
178 | (2) |
|
Exercise 14.4 Raising the Domain and Forest Functional Level |
|
|
180 | (1) |
|
Exercise 14.5 Configuring Multiple UPN Suffixes |
|
|
181 | (2) |
|
Lab Challenge: Performing an Upgrade Installation |
|
|
182 | (1) |
|
|
183 | (13) |
|
Exercise 15.1 Creating a One-Way External Trust |
|
|
184 | (5) |
|
Exercise 15.2 Creating a Two-Way Forest Trust |
|
|
189 | (2) |
|
Exercise 15.3 Validating and Testing the Trust |
|
|
191 | (5) |
|
Lab Challenge: Configuring Selective Authentication between two Trusted Domains |
|
|
195 | (1) |
|
|
196 | (9) |
|
Exercise 16.1 Adding Sites and Subnets |
|
|
197 | (3) |
|
Exercise 16.2 Configuring a Bridgehead Server |
|
|
200 | (1) |
|
Exercise 16.3 Creating a Site Link |
|
|
201 | (1) |
|
Exercise 16.4 Modifying the Replication Interval and Replication Schedule |
|
|
202 | (3) |
|
Lab Challenge: Working with SRV Records |
|
|
204 | (1) |
|
17 Managing Active Directory and SYSVOL Replication |
|
|
205 | (11) |
|
Exercise 17.1 Demoting a Domain Controller |
|
|
206 | (1) |
|
Exercise 17.2 Promoting a Domain Controller |
|
|
207 | (2) |
|
Exercise 17.3 Replicating with Active Directory Sites and Services |
|
|
209 | (1) |
|
Exercise 17.4 Using REPADMIN |
|
|
210 | (1) |
|
Exercise 17.5 Configuring Password Replication Policies for an RODC |
|
|
210 | (6) |
|
Lab Challenge: Upgrading SYSVOL Replication to DFSR |
|
|
215 | (1) |
|
18 Implementing Active Directory Federation Services |
|
|
216 | (16) |
|
Exercise 18.1 Installing the Active Directory Federation Services |
|
|
218 | (1) |
|
Exercise 18.2 Creating a standalone Federation Server |
|
|
219 | (2) |
|
Exercise 18.3 Creating and Configuring a Sample WIF Application |
|
|
221 | (5) |
|
Exercise 18.4 Implementing Relying Party Trusts |
|
|
226 | (2) |
|
Exercise 18.5 Configuring the Active Directory Claims Provider Trust |
|
|
228 | (4) |
|
Lab Challenge: Adding an Attribute Store |
|
|
231 | (1) |
|
19 Installing and Configuring Active Directory Certificate Services |
|
|
232 | (14) |
|
Exercise 19.1 Installing an Enterprise Certificate Authority |
|
|
233 | (3) |
|
Exercise 19.2 Installing Subordinate Certificate Services |
|
|
236 | (3) |
|
Exercise 19.3 Configuring Certified Revocation List (CRL) Distribution |
|
|
239 | (1) |
|
Exercise 19.4 Installing the Online Responder Role |
|
|
240 | (4) |
|
Exercise 19.5 Performing a CA Backup |
|
|
244 | (2) |
|
Lab Challenge: Managing Administrative Roles |
|
|
245 | (1) |
|
|
246 | (16) |
|
Exercise 20.1 Importing and Exporting Digital Certificates |
|
|
247 | (2) |
|
Exercise 20.2 Renewing a Certificate Authority Certificate |
|
|
249 | (1) |
|
Exercise 20.3 Creating a New User Certificate Template |
|
|
250 | (2) |
|
Exercise 20.4 Requesting a Certificate |
|
|
252 | (3) |
|
Exercise 20.5 Configuring Autoenrollment |
|
|
255 | (2) |
|
Exercise 20.6 Enabling Enrollment Agents |
|
|
257 | (5) |
|
Lab Challenge: Configuring the Key Recovery Agent |
|
|
261 | (1) |
|
21 Installing and Configuring Active Directory Rights Management Services |
|
|
262 | (13) |
|
Exercise 21.1 Installing Active Directory Rights Management Service (AD RMS) |
|
|
264 | (4) |
|
Exercise 21.2 Creating and Enabling the Super Users Group |
|
|
268 | (3) |
|
Exercise 21.3 Export and Import the TUD Certificate |
|
|
271 | (1) |
|
Exercise 21.4 Create Distributed Rights Policy Template |
|
|
271 | (1) |
|
Exercise 21.5 Enable and Configure Application Exclusion |
|
|
272 | (3) |
|
Lab Challenge: Enabling and Configuring Federated Identity Support Settings |
|
|
274 | (1) |
Appendix: Lab Setup Guide |
|
275 | |