|
Lesson 1 Deploying and Managing Server Images |
|
|
1 | (32) |
|
Using Windows Deployment Services |
|
|
2 | (1) |
|
Installing the Windows Deployment Services Role |
|
|
2 | (2) |
|
Configuring the WDS Server |
|
|
4 | (1) |
|
Performing the Initial Configuration of WDS |
|
|
5 | (2) |
|
Configuring the WDS Properties |
|
|
7 | (1) |
|
|
8 | (1) |
|
Configuring the Custom DHCP Option |
|
|
9 | (1) |
|
Configuring and Managing Boot, Install, and Discover Images |
|
|
10 | (1) |
|
|
11 | (1) |
|
|
12 | (1) |
|
Creating an Image File with WDS |
|
|
13 | (2) |
|
Creating a Discover Image |
|
|
15 | (1) |
|
|
16 | (2) |
|
Managing WDS with Windows Powershell |
|
|
18 | (1) |
|
Performing an Unattended Installation |
|
|
19 | (7) |
|
Updating Images with Patches, Hotfixes, and Drivers |
|
|
26 | (1) |
|
Installing Features for Offline Images |
|
|
27 | (1) |
|
Configuring Driver Groups and Packages |
|
|
27 | (6) |
|
|
29 | (1) |
|
|
29 | (3) |
|
|
32 | (1) |
|
Lesson 2 Implementing Patch Management |
|
|
33 | (32) |
|
Understanding Windows Updates and Automatic Updates |
|
|
34 | (3) |
|
Deploying Windows Server Update Services (WSUS) |
|
|
37 | (2) |
|
|
39 | (2) |
|
|
41 | (2) |
|
Configuring WSUS Synchronization |
|
|
43 | (4) |
|
Configuring WSUS Computer Groups |
|
|
47 | (2) |
|
Configuring Group Policies for Updates |
|
|
49 | (1) |
|
Configuring Client-Side Targeting |
|
|
50 | (2) |
|
|
52 | (4) |
|
Managing Patch Management In Mixed Environments |
|
|
56 | (1) |
|
|
57 | (1) |
|
Administrating WSUS with Commands |
|
|
58 | (1) |
|
Troubleshooting Problems with Installing Updates |
|
|
59 | (1) |
|
Understanding System Center Configuration Manager |
|
|
60 | (5) |
|
|
60 | (1) |
|
|
61 | (3) |
|
|
64 | (1) |
|
Lesson 3 Monitoring Servers |
|
|
65 | (42) |
|
Introducing the Microsoft Management Console (MMC) |
|
|
66 | (2) |
|
|
68 | (1) |
|
Using Computer Management |
|
|
69 | (1) |
|
Using the Services Console |
|
|
69 | (3) |
|
|
72 | (1) |
|
Understanding Logs and Events |
|
|
73 | (2) |
|
|
75 | (1) |
|
Adding a Task to an Event |
|
|
75 | (2) |
|
Configuring Event Subscriptions |
|
|
77 | (2) |
|
Using Reliability Monitor |
|
|
79 | (2) |
|
|
81 | (1) |
|
|
81 | (4) |
|
|
85 | (3) |
|
Using Performance Monitor |
|
|
88 | (2) |
|
Using Common Performance Counters |
|
|
90 | (1) |
|
Configuring Data Collector Sets (DCS) |
|
|
91 | (1) |
|
Configuring Performance Alerts |
|
|
92 | (1) |
|
Scheduling Performance Monitoring |
|
|
93 | (1) |
|
|
94 | (1) |
|
Using the netstat Command |
|
|
95 | (1) |
|
|
96 | (5) |
|
Monitoring Virtual Machines (VMs) |
|
|
101 | (6) |
|
|
102 | (1) |
|
|
103 | (3) |
|
|
106 | (1) |
|
Lesson 4 Configuring Distributed File System (DFS) |
|
|
107 | (27) |
|
Using Distributed File System |
|
|
107 | (1) |
|
Installing and Configuring DFS Namespace |
|
|
108 | (1) |
|
|
109 | (1) |
|
Configuring DFS Namespaces |
|
|
110 | (4) |
|
|
114 | (2) |
|
|
116 | (1) |
|
Installing and Configuring DFS Replication |
|
|
116 | (1) |
|
Installing DFS Replication |
|
|
117 | (1) |
|
Configuring DFS Replication Targets |
|
|
117 | (4) |
|
|
121 | (1) |
|
Configuring Remote Differential Compression |
|
|
121 | (3) |
|
|
124 | (1) |
|
|
125 | (1) |
|
|
126 | (1) |
|
Optimizing DFS Replication |
|
|
127 | (1) |
|
Configuring Fault Tolerance Using DFS |
|
|
128 | (6) |
|
|
128 | (1) |
|
|
129 | (4) |
|
|
133 | (1) |
|
Lesson 5 Configuring File Server Resource Manager (FSRM) |
|
|
134 | (21) |
|
Using File Server Resource Manager |
|
|
134 | (1) |
|
Installing File Server Resource Manager |
|
|
135 | (1) |
|
|
136 | (1) |
|
|
136 | (4) |
|
Changing Quotas Templates |
|
|
140 | (1) |
|
|
141 | (1) |
|
Managing Files with File Screening |
|
|
142 | (1) |
|
|
142 | (1) |
|
|
143 | (1) |
|
Creating a File Screen Exception |
|
|
144 | (1) |
|
Creating a File Screen Template |
|
|
145 | (1) |
|
|
146 | (1) |
|
|
147 | (1) |
|
Configuring File Management Tasks |
|
|
148 | (7) |
|
|
150 | (1) |
|
|
151 | (3) |
|
|
154 | (1) |
|
Lesson 6 Configuring File Services and Disk Encryption |
|
|
155 | (22) |
|
|
155 | (1) |
|
Encrypting Files with EFS |
|
|
156 | (1) |
|
|
157 | (1) |
|
|
158 | (1) |
|
Sharing Files Protected with EFS with Others |
|
|
159 | (1) |
|
Configuring EFS with Group Policies |
|
|
159 | (1) |
|
Configuring the EFS Recovery Agent |
|
|
160 | (1) |
|
Managing EFS Certificates |
|
|
161 | (2) |
|
Encrypting Files with BitLocker |
|
|
163 | (1) |
|
Configuring BitLocker Encryption |
|
|
164 | (4) |
|
Configuring BitLocker To Go |
|
|
168 | (1) |
|
BitLocker Pre-Provisioning |
|
|
168 | (1) |
|
Configuring BitLocker Policies |
|
|
169 | (2) |
|
Managing BitLocker Certificates |
|
|
171 | (1) |
|
Configuring the Network Unlock Feature |
|
|
171 | (6) |
|
|
173 | (1) |
|
|
173 | (3) |
|
|
176 | (1) |
|
Lesson 7 Configuring Advanced Audit Policies |
|
|
177 | (30) |
|
Enabling and Configuring Auditing |
|
|
177 | (1) |
|
Implementing Auditing Using Group Policies |
|
|
178 | (1) |
|
Implementing an Audit Policy |
|
|
179 | (1) |
|
Implementing Object Access Auditing Using Group Policies |
|
|
180 | (3) |
|
Implementing Advanced Audit Policy Settings |
|
|
183 | (1) |
|
Implementing Advanced Audit Policy Settings Using Group Policies |
|
|
183 | (13) |
|
Removing Advanced Audit Policy Configuration |
|
|
196 | (1) |
|
Implementing Auditing Using AuditPol.exe |
|
|
196 | (2) |
|
|
198 | (1) |
|
Creating Expression-Based Audit Policies |
|
|
199 | (2) |
|
Creating Removable Device Audit Policies |
|
|
201 | (6) |
|
|
202 | (1) |
|
|
203 | (3) |
|
|
206 | (1) |
|
Lesson 8 Configuring DNS Zones |
|
|
207 | (25) |
|
|
208 | (1) |
|
Understanding DNS Names and Zones |
|
|
209 | (2) |
|
Understanding the Address Resolution Mechanism |
|
|
211 | (1) |
|
Configuring and Managing DNS Zones |
|
|
212 | (1) |
|
|
213 | (1) |
|
Configuring Primary and Secondary Zones |
|
|
214 | (4) |
|
Configuring Active Directory-Integrated Zones |
|
|
218 | (1) |
|
Configuring Zone Delegation |
|
|
219 | (2) |
|
|
221 | (1) |
|
Configuring Caching-Only Servers |
|
|
222 | (1) |
|
Configuring Forwarding and Conditional Forwarding |
|
|
222 | (2) |
|
Configuring Zone Transfers |
|
|
224 | (1) |
|
Understanding Full and Incremental Transfers |
|
|
225 | (1) |
|
Configuring Notify Settings |
|
|
225 | (1) |
|
Using the Dnscmd Command to Manage Zones |
|
|
226 | (6) |
|
|
227 | (1) |
|
|
228 | (3) |
|
|
231 | (1) |
|
Lesson 9 Configuring DNS Records |
|
|
232 | (22) |
|
Configuring DNS Record Types |
|
|
233 | (1) |
|
Creating and Configuring DNS Resource Records |
|
|
233 | (1) |
|
Start of Authority (SOA) Records |
|
|
234 | (1) |
|
|
235 | (1) |
|
Host (A and AAAA) Records |
|
|
236 | (1) |
|
Canonical Name (CNAME) Records |
|
|
236 | (1) |
|
|
237 | (1) |
|
Mail Exchanger (MX) Records |
|
|
237 | (1) |
|
Service Location (SRV) Records |
|
|
238 | (1) |
|
Configuring Record Options |
|
|
239 | (2) |
|
|
241 | (1) |
|
Configuring Secure Dynamic Updates |
|
|
242 | (1) |
|
Configuring Zone Scavenging |
|
|
242 | (2) |
|
Using the DNSCMD Command to Manage Resource Records |
|
|
244 | (1) |
|
Troubleshooting DNS Problems |
|
|
245 | (9) |
|
|
249 | (1) |
|
|
250 | (3) |
|
|
253 | (1) |
|
Lesson 10 Configuring VPN and Routing |
|
|
254 | (32) |
|
|
255 | (1) |
|
Installing and Configuring the Remote Access Role |
|
|
255 | (1) |
|
Installing Routing and Remote Access |
|
|
255 | (2) |
|
Configuring Routing and Remote Access |
|
|
257 | (1) |
|
Configuring RRAS for Dial-Up Remote Access |
|
|
258 | (3) |
|
|
261 | (2) |
|
Configuring the VPN Connection on the Server |
|
|
263 | (2) |
|
Creating a VPN Connection on a Client |
|
|
265 | (2) |
|
|
267 | (1) |
|
Configuring Split Tunneling |
|
|
267 | (1) |
|
Configuring Remote Dial-In Settings for Users |
|
|
268 | (1) |
|
Troubleshooting Remote Access Problems |
|
|
269 | (2) |
|
|
271 | (1) |
|
Disabling Routing and Remote Access |
|
|
272 | (1) |
|
|
272 | (2) |
|
|
274 | (2) |
|
|
276 | (1) |
|
Configuring Demand-Dial Routing |
|
|
277 | (1) |
|
Configuring the DHCP Relay Agent |
|
|
277 | (1) |
|
Configuring Web Application Proxy in Passthrough Mode |
|
|
278 | (8) |
|
|
281 | (1) |
|
|
282 | (3) |
|
|
285 | (1) |
|
Lesson 11 Configuring Direct Access |
|
|
286 | (26) |
|
Understanding DirectAccess |
|
|
286 | (1) |
|
Looking at the DirectAccess Connection Process |
|
|
287 | (1) |
|
Understanding DirectAccess Requirements |
|
|
288 | (1) |
|
Understanding DirectAccess Server Requirements |
|
|
288 | (1) |
|
Understanding DirectAccess Client Requirements |
|
|
289 | (1) |
|
Running the DirectAccess Getting Started Wizard |
|
|
289 | (1) |
|
Running the Remote Access Setup Wizard |
|
|
290 | (3) |
|
Implementing Client Configuration |
|
|
293 | (2) |
|
Implementing DirectAccess Server |
|
|
295 | (1) |
|
Implementing Infrastructure Servers |
|
|
296 | (3) |
|
Configuring the Application Servers |
|
|
299 | (1) |
|
Preparing for DirectAccess Deployment |
|
|
299 | (1) |
|
Configuring DNS for DirectAccess |
|
|
300 | (1) |
|
Configuring Certificates for DirectAccess |
|
|
300 | (5) |
|
Troubleshooting DirectAccess |
|
|
305 | (7) |
|
|
306 | (1) |
|
|
307 | (4) |
|
|
311 | (1) |
|
Lesson 12 Configuring a Network Policy Server |
|
|
312 | (26) |
|
Configuring a Network Policy Server Infrastructure |
|
|
312 | (2) |
|
Installing and Configuring a RADIUS Server |
|
|
314 | (2) |
|
Configuring Multiple RADIUS Server Infrastructures |
|
|
316 | (2) |
|
Configuring RADIUS Clients |
|
|
318 | (6) |
|
Configuring NPS Templates |
|
|
324 | (2) |
|
Configuring RADIUS Accounting |
|
|
326 | (4) |
|
Understanding NPS Authentication Methods |
|
|
330 | (1) |
|
Using Password-Based Authentication |
|
|
330 | (1) |
|
Using Certificates for Authentication |
|
|
331 | (7) |
|
|
333 | (1) |
|
|
334 | (3) |
|
|
337 | (1) |
|
Lesson 13 Configuring NPS Policies |
|
|
338 | (20) |
|
|
338 | (1) |
|
Configuring Connection Request Policies |
|
|
339 | (5) |
|
Configuring Network Policies |
|
|
344 | (3) |
|
Multilink and Bandwidth Allocation |
|
|
347 | (1) |
|
|
348 | (1) |
|
|
348 | (1) |
|
|
349 | (1) |
|
|
350 | (1) |
|
Exporting and Importing Templates |
|
|
350 | (2) |
|
Exporting and Importing the NPS Configuration Including NPS Policies |
|
|
352 | (6) |
|
|
353 | (1) |
|
|
354 | (3) |
|
|
357 | (1) |
|
Lesson 14 Configuring Network Access Protection (NAP) |
|
|
358 | (25) |
|
Using Network Access Protection (NAP) |
|
|
359 | (2) |
|
Installing Network Access Protection |
|
|
361 | (2) |
|
Configuring NAP Enforcement |
|
|
363 | (1) |
|
Configuring NAP Enforcement for DHCP |
|
|
363 | (7) |
|
Configuring NAP Enforcement for VPN |
|
|
370 | (1) |
|
Configuring System Health Validators |
|
|
371 | (1) |
|
Configuring Health Policies |
|
|
372 | (3) |
|
Configuring Isolation and Remediation |
|
|
375 | (1) |
|
Configuring NAP Client Settings |
|
|
376 | (7) |
|
|
377 | (1) |
|
|
378 | (4) |
|
|
382 | (1) |
|
Lesson 15 Configuring Service Authentication |
|
|
383 | (16) |
|
Configuring Service Authentication |
|
|
384 | (1) |
|
Understanding NTLM Authentication |
|
|
384 | (1) |
|
|
384 | (2) |
|
Managing Service Principal Names |
|
|
386 | (2) |
|
Configuring Kerberos Delegation |
|
|
388 | (1) |
|
Managing Service Accounts |
|
|
388 | (1) |
|
Creating and Configuring Service Accounts |
|
|
389 | (1) |
|
Creating and Configuring Managed Service Accounts |
|
|
390 | (3) |
|
Creating and Configuring Group Managed Service Accounts |
|
|
393 | (1) |
|
Configuring Virtual Accounts |
|
|
393 | (6) |
|
|
394 | (1) |
|
|
395 | (3) |
|
|
398 | (1) |
|
Lesson 16 Configuring Domain Controllers |
|
|
399 | (22) |
|
Understanding Domain Controllers |
|
|
399 | (2) |
|
Managing Global Catalogs and Configuring Universal Group Membership Caching |
|
|
401 | (2) |
|
Managing Operations Masters |
|
|
403 | (2) |
|
Viewing the Operations Masters Role Holders |
|
|
405 | (2) |
|
Transferring the Operations Masters Role |
|
|
407 | (2) |
|
Seizing the Operations Masters Role |
|
|
409 | (1) |
|
Installing and Configuring an RODC |
|
|
410 | (3) |
|
Cloning a Domain Controller |
|
|
413 | (8) |
|
|
416 | (1) |
|
|
417 | (3) |
|
|
420 | (1) |
|
Lesson 17 Maintaining Active Directory |
|
|
421 | (26) |
|
Automating User Account Management |
|
|
422 | (2) |
|
Backing Up and Restoring Active Directory |
|
|
424 | (1) |
|
Understanding the Active Directory Database, SYSVOL, and System State |
|
|
424 | (2) |
|
|
426 | (1) |
|
Performing a Backup of Active Directory and SYSVOL |
|
|
427 | (1) |
|
Performing an Active Directory Restore |
|
|
428 | (3) |
|
Configuring Active Directory Snapshots |
|
|
431 | (2) |
|
Performing Object- and Container-Level Recovery |
|
|
433 | (2) |
|
Configuring and Restoring Objects by Using the Active Directory Recycle Bin |
|
|
435 | (3) |
|
Managing Active Directory Offline |
|
|
438 | (1) |
|
Optimizing an Active Directory Database |
|
|
439 | (2) |
|
|
441 | (6) |
|
|
442 | (1) |
|
|
443 | (3) |
|
|
446 | (1) |
|
Lesson 18 Configuring Account Policies |
|
|
447 | (15) |
|
Working with Account Policies |
|
|
447 | (2) |
|
Configuring Domain User Password Policy |
|
|
449 | (1) |
|
Understanding Strong Passwords |
|
|
449 | (1) |
|
Configuring Password Policy Settings |
|
|
449 | (2) |
|
Configuring Account Lockout Settings |
|
|
451 | (1) |
|
Configuring and Applying Password Settings Objects |
|
|
452 | (3) |
|
Configuring Local User Password Policy |
|
|
455 | (1) |
|
Delegating Password Settings Management |
|
|
455 | (2) |
|
Configuring Kerberos Policy Settings |
|
|
457 | (5) |
|
|
458 | (1) |
|
|
458 | (3) |
|
|
461 | (1) |
|
Lesson 19 Configuring Group Policy Processing |
|
|
462 | (22) |
|
Understanding Group Policy Processing |
|
|
462 | (1) |
|
Configuring Processing Order and Precedence |
|
|
463 | (1) |
|
Understanding Group Policy Inheritance |
|
|
463 | (3) |
|
Managing Group Policy Links |
|
|
466 | (1) |
|
Using Filtering with Group Policies |
|
|
467 | (1) |
|
Configuring Blocking of Inheritance |
|
|
467 | (1) |
|
Configuring Enforced Policies |
|
|
467 | (1) |
|
Configuring Security Filtering and WMI Filtering |
|
|
468 | (1) |
|
|
468 | (2) |
|
|
470 | (2) |
|
Configuring Loopback Processing |
|
|
472 | (1) |
|
Configuring Client-Side Extension Behavior |
|
|
473 | (1) |
|
Looking at GPOs and Disconnected Computers |
|
|
474 | (1) |
|
Configuring and Managing Slow-Link Processing and Group Policy Caching |
|
|
474 | (1) |
|
Forcing Group Policy Update |
|
|
475 | (1) |
|
|
476 | (8) |
|
|
479 | (1) |
|
|
480 | (3) |
|
|
483 | (1) |
|
Lesson 20 Configuring Group Policy Settings |
|
|
484 | (27) |
|
Configuring Group Policy Settings |
|
|
485 | (1) |
|
Performing Software Installation Using Group Policy |
|
|
486 | (1) |
|
Assigning or Publishing a Package |
|
|
487 | (3) |
|
Redeploying an Application |
|
|
490 | (1) |
|
|
490 | (1) |
|
|
491 | (3) |
|
Using Scripts with Group Policy |
|
|
494 | (2) |
|
Using Administrative Templates |
|
|
496 | (1) |
|
Managing Administrative Templates |
|
|
496 | (2) |
|
|
498 | (1) |
|
|
499 | (4) |
|
Using Custom Administrative Template Files |
|
|
503 | (1) |
|
Converting Administrative Templates Using ADMX Migrator |
|
|
504 | (1) |
|
Configuring Property Filters for Administrative Templates |
|
|
505 | (6) |
|
|
506 | (1) |
|
|
507 | (3) |
|
|
510 | (1) |
|
Lesson 21 Managing Group Policy Objects |
|
|
511 | (12) |
|
Managing Group Policy Objects |
|
|
511 | (1) |
|
Backing Up and Restoring GPOs |
|
|
512 | (2) |
|
|
514 | (2) |
|
Resetting the Default GPOs |
|
|
516 | (1) |
|
Delegating Group Policy Management |
|
|
516 | (7) |
|
|
518 | (1) |
|
|
519 | (3) |
|
|
522 | (1) |
|
Lesson 22 Configuring Group Policy Preferences |
|
|
523 | (17) |
|
Using Group Policy Preferences |
|
|
523 | (1) |
|
Configuring Preference Settings |
|
|
524 | (2) |
|
Configuring Windows Settings |
|
|
526 | (1) |
|
Configuring Network Drive Mappings |
|
|
526 | (1) |
|
Performing File and Folder Deployment |
|
|
527 | (2) |
|
Performing Shortcut Deployment |
|
|
529 | (1) |
|
Configuring Control Panel Settings |
|
|
530 | (1) |
|
Configuring Printer Settings |
|
|
530 | (1) |
|
Configuring Custom Registry Settings |
|
|
531 | (1) |
|
Configuring Power Options |
|
|
532 | (1) |
|
Configuring Internet Explorer Settings |
|
|
533 | (1) |
|
Configuring Item-Level Targeting |
|
|
534 | (6) |
|
|
535 | (1) |
|
|
536 | (3) |
|
|
539 | (1) |
Appendix A |
|
540 | (2) |
Index |
|
542 | |