Lesson 1 Designing and Planning an Automated Server Installation Strategy |
|
1 | (32) |
|
Designing a Server Imaging Strategy |
|
|
2 | (5) |
|
Selecting Image Characteristics |
|
|
3 | (2) |
|
Selecting Thick Images, Thin Images, and Hybrid Images |
|
|
3 | (1) |
|
Selecting Sector-Based Images or File-Based Images |
|
|
4 | (1) |
|
|
4 | (1) |
|
|
5 | (7) |
|
Determining the Number of Images |
|
|
6 | (1) |
|
Planning for Bare Metal/Virtual Deployments |
|
|
7 | (1) |
|
Selecting an Appropriate Server Deployment Strategy |
|
|
8 | (2) |
|
Planning for Windows Deployment Services (WDS) |
|
|
10 | (1) |
|
Planning for Multicast Deployment |
|
|
11 | (1) |
|
Designing a Server Implementation Using Windows Assessment and Deployment Kit (Adk) |
|
|
12 | (12) |
|
|
13 | (3) |
|
Creating and Configuring a Reference Computer and Image |
|
|
16 | (1) |
|
Creating and Using Answer Files with Windows SIM |
|
|
17 | (4) |
|
Using Sysprep to Prepare the Reference Computer |
|
|
21 | (1) |
|
Capturing a Reference Image by Using DISM |
|
|
22 | (1) |
|
Performing an Unattended Installation by Using WDS |
|
|
23 | (1) |
|
Designing a Virtual Server Deployment |
|
|
24 | (1) |
|
Planning for Deploying Servers to the Cloud |
|
|
25 | (2) |
|
Planning for Deploying Servers to Microsoft Azure Infrastructure as a service (IaaS) |
|
|
25 | (1) |
|
Planning for Deploying Servers to Public and Private Clouds |
|
|
26 | (1) |
|
|
27 | (1) |
|
|
28 | (3) |
|
|
31 | (2) |
Lesson 2 Implementing a Server Deployment Infrastructure |
|
33 | (30) |
|
Implementing a Server Deployment Infrastructure with WDS |
|
|
34 | (5) |
|
|
34 | (3) |
|
Configuring Multicast Deployment in WDS |
|
|
37 | (1) |
|
Configuring Multisite Topology and Transport Servers |
|
|
38 | (1) |
|
Implementing a Server Deployment Infrastructure with Configuration Manager |
|
|
39 | (13) |
|
Installing System Center 2012 R2 Configuration Manager |
|
|
40 | (4) |
|
Configuring PXE Boot and Multicast Support |
|
|
44 | (2) |
|
Configuring Task Sequences, Collections, and Advertisements |
|
|
46 | (5) |
|
Configuring Multisite Topology and Distribution Points with System Center Configuration Manager |
|
|
51 | (1) |
|
Implementing a Server Deployment Infrastructure with Microsoft Deployment Toolkit (MDT) |
|
|
52 | (3) |
|
Deploying Servers to Microsoft Azure IaaS |
|
|
55 | (1) |
|
Deploying Servers to Public and Private Cloud by Using App Controller and Windows PowerShell |
|
|
56 | (2) |
|
|
58 | (1) |
|
|
58 | (3) |
|
|
61 | (2) |
Lesson 3 Planning and Implementing Server Upgrade and Migration |
|
63 | (21) |
|
Planning a Windows Server 2012 R2 Upgrade |
|
|
64 | (3) |
|
Planning for and Implementing Role Migration |
|
|
67 | (7) |
|
Developing a Deployment Plan |
|
|
67 | (1) |
|
Using Proper License Keys and Activating Windows |
|
|
68 | (1) |
|
Using the Microsoft Assessment and Planning (MAP) Toolkit |
|
|
69 | (4) |
|
Using the Windows Server Migration Tools |
|
|
73 | (1) |
|
Migrating Servers Across Domains and Forests |
|
|
74 | (1) |
|
Designing a Server Consolidation Strategy |
|
|
74 | (1) |
|
Planning for Capacity and Resource Optimization |
|
|
75 | (3) |
|
|
78 | (1) |
|
|
79 | (3) |
|
|
82 | (2) |
Lesson 4 Planning and Deploying Virtual Machine Manager Services |
|
84 | (26) |
|
Designing Virtual Machine Manager Service Templates |
|
|
85 | (4) |
|
Installing Virtual Machine Manager |
|
|
85 | (4) |
|
Designing Virtual Machine Manager Service Templates |
|
|
89 | (16) |
|
|
89 | (2) |
|
Creating Service Templates |
|
|
91 | (2) |
|
Planning and Deploying Profiles |
|
|
93 | (6) |
|
Planning and Deploying Operating System Profiles |
|
|
93 | (1) |
|
Planning and Deploying Hardware and Capability Profiles |
|
|
94 | (2) |
|
Planning and Deploying Application Profiles |
|
|
96 | (1) |
|
Planning and Deploying SQL Profiles |
|
|
97 | (2) |
|
Planning and Managing Services |
|
|
99 | (1) |
|
Configuring Virtual Machine Manager Libraries |
|
|
100 | (1) |
|
Managing Logical Networks |
|
|
101 | (1) |
|
Planning and Deploying Services to Non-Trusted Domains and Workgroups |
|
|
102 | (3) |
|
|
105 | (1) |
|
|
105 | (3) |
|
|
108 | (2) |
Lesson 5 Planning and Implementing File and Storage Services |
|
110 | (37) |
|
Planning and Implementing storage technology |
|
|
111 | (19) |
|
Planning and Implementing iSCSI SAN |
|
|
112 | (1) |
|
Configuring the iSCSI Initiator |
|
|
113 | (3) |
|
Configuring the iSCSI Target Server |
|
|
116 | (2) |
|
Configuring the iSCSI MPIO Features |
|
|
118 | (2) |
|
Configuring the Internet Storage Name Server (iSNS) |
|
|
120 | (1) |
|
Using iSCSI Best Practices |
|
|
121 | (1) |
|
Planning and Implementing Fibre Channel SANS |
|
|
122 | (1) |
|
Planning and Implementing Virtual Fibre Channel |
|
|
123 | (2) |
|
Installing Device-Specific Modules (DSMs) |
|
|
125 | (1) |
|
Planning and Implementing Storage Spaces and Storage Pools |
|
|
125 | (6) |
|
|
126 | (1) |
|
|
127 | (3) |
|
Planning and Implementing Data deduplication |
|
|
130 | (1) |
|
Configuring Services for Network file System (NFS) |
|
|
131 | (7) |
|
Obtaining User and Group Information |
|
|
132 | (3) |
|
|
135 | (1) |
|
Installing and Configuring the NFS Datastore |
|
|
136 | (2) |
|
Planning and Implementing SMB 3.0 Based Storage |
|
|
138 | (2) |
|
Planning for Windows Offloaded Data Transfer (ODX) |
|
|
140 | (1) |
|
|
141 | (1) |
|
|
142 | (4) |
|
|
146 | (1) |
Lesson 6 Designing and Maintaining a Dynamic Host Configuration Protocol (DHCP) Solution |
|
147 | (35) |
|
Planning DHCP Design and Maintenance |
|
|
148 | (1) |
|
Designing and Maintaining DHCP High Availability |
|
|
149 | (8) |
|
Configuring DHCP Failover |
|
|
150 | (4) |
|
DHCP Failover and Windows PowerShell |
|
|
152 | (2) |
|
Configuring DHCP Split-Scope |
|
|
154 | (2) |
|
Understanding DHCP Failover Clusters |
|
|
156 | (1) |
|
Integrating DHCP Interoperability with Microsoft services |
|
|
157 | (7) |
|
Configuring DHCP Interoperability with Domain Name Systems (DNS) |
|
|
157 | (2) |
|
Configuring DHCP Interoperability with Active Directory Domain Services (AD DS) |
|
|
159 | (1) |
|
Configuring DHCP Interoperability with Routing and Remote Access Service (RRAS) |
|
|
160 | (1) |
|
Configuring DHCP Interoperability with Network Access Protection (NAP) |
|
|
161 | (2) |
|
Configuring DHCP Interoperability with IP Address Management (IPAM) |
|
|
163 | (1) |
|
Understanding DHCP Interoperability with Windows Internet Name Service (WINS) |
|
|
163 | (1) |
|
|
164 | (3) |
|
|
164 | (3) |
|
Configuring for Stateless and Stateful Autoconfiguration |
|
|
164 | (1) |
|
Configuring Advanced DHCPv6 Settings |
|
|
165 | (1) |
|
Configuring DHCPv6 with Windows PowerShell |
|
|
165 | (2) |
|
Implementing DHCP Access Restrictions and Policies |
|
|
167 | (4) |
|
Configuring DHCP Policies |
|
|
167 | (2) |
|
Configuring DHCP Policies with Windows PowerShell |
|
|
168 | (1) |
|
Configuring DHCP Link-Layer Filters |
|
|
169 | (2) |
|
Implementing Microsoft System Center 2012 Management Pack for Windows Server 2012 DHCP |
|
|
171 | (1) |
|
Configuring the Microsoft System Center 2012 Management Pack for Windows Server 2012 DHCP |
|
|
171 | (1) |
|
Maintaining a DHCP Database |
|
|
172 | (6) |
|
Performing a DHCP Database Backup |
|
|
173 | (1) |
|
Restoring a DHCP Database |
|
|
174 | (1) |
|
Compacting the DHCP Database |
|
|
175 | (1) |
|
Reconciling the DHCP Database |
|
|
176 | (1) |
|
Performing a DHCP Server Migration |
|
|
177 | (1) |
|
|
178 | (1) |
|
|
178 | (3) |
|
|
181 | (1) |
Lesson 7 Designing a Name Resolution Strategy |
|
182 | (28) |
|
Creating a Name Resolution Strategy |
|
|
183 | (5) |
|
Reviewing DNS Names and Zones |
|
|
184 | (3) |
|
Understanding DNS Names and Zones |
|
|
184 | (1) |
|
Understanding the Address Resolution Mechanism |
|
|
185 | (2) |
|
Reviewing DNS Resource Records |
|
|
187 | (1) |
|
Designing a Zone Hierarchy and Zone Delegation |
|
|
188 | (8) |
|
Designing a Zone Hierarchy |
|
|
188 | (2) |
|
Creating an Internal Domain Naming Hierarchy |
|
|
190 | (1) |
|
Adding AD DS Domains to an Existing DNS Hierarchy |
|
|
190 | (1) |
|
Designing Disjoint Namespaces |
|
|
190 | (1) |
|
Designing a Physical DNS Infrastructure |
|
|
191 | (1) |
|
Designing a Zone Delegation |
|
|
192 | (2) |
|
|
192 | (2) |
|
Designing DNS Interoperability |
|
|
194 | (1) |
|
|
195 | (1) |
|
Designing Migration to DNS Application Partitions |
|
|
195 | (1) |
|
Designing Secure Name Resolution |
|
|
196 | (7) |
|
Designing Active Directory—Integrated Zones |
|
|
197 | (1) |
|
Designing Secure Dynamic Updates |
|
|
198 | (1) |
|
|
198 | (4) |
|
Designing a DNS Socket Pool |
|
|
202 | (1) |
|
Designing DNS Cache Locking |
|
|
202 | (1) |
|
Designing a Single-Label DNS Name Resolution |
|
|
203 | (2) |
|
|
203 | (1) |
|
Designing a GlobalNames Zone |
|
|
204 | (1) |
|
|
205 | (1) |
|
|
206 | (3) |
|
|
209 | (1) |
Lesson 8 Designing and Managing an IP Address Management Solution |
|
210 | (22) |
|
Designing and Managing an Address Management System |
|
|
211 | (16) |
|
Planning IP Address Management Technologies |
|
|
211 | (4) |
|
Understanding IPAM Requirements |
|
|
212 | (1) |
|
Understanding Group Policy-Based and Manual Provisioning |
|
|
213 | (1) |
|
Understanding Distributed, Centralized, and Hybrid Placement |
|
|
214 | (1) |
|
Setting Up Database Storage |
|
|
214 | (1) |
|
Configuring Data Collection for IPAM |
|
|
215 | (4) |
|
Configuring Role-Based Access Control (RBAC) |
|
|
219 | (1) |
|
Configuring IPAM Auditing |
|
|
220 | (1) |
|
Managing and Migrating IP Addresses |
|
|
221 | (4) |
|
Managing and Monitoring Multiple DHCP and DNS Servers |
|
|
225 | (1) |
|
Integrating IPAM with Virtual Machine Manager (VMM) |
|
|
226 | (1) |
|
|
227 | (1) |
|
|
228 | (2) |
|
|
230 | (2) |
Lesson 9 Designing a VPN Solution |
|
232 | (21) |
|
Planning and Designing a VPN Solution |
|
|
233 | (15) |
|
Selecting a Tunneling Protocol |
|
|
234 | (3) |
|
|
234 | (1) |
|
|
235 | (1) |
|
Understanding Secure Socket Tunneling Protocol (SSTP) |
|
|
236 | (1) |
|
|
236 | (1) |
|
Deploying Security Certificates |
|
|
237 | (2) |
|
Designing VPN Solution with Firewalls |
|
|
239 | (3) |
|
Designing Client-to-Site VPN Solutions |
|
|
242 | (1) |
|
Designing Site-to-Site VPN Solutions |
|
|
243 | (1) |
|
Planning for Bandwidth and Protocol Implications |
|
|
244 | (1) |
|
Using Connection Manager Administration Kit (CMAK) |
|
|
244 | (3) |
|
Planning for Microsoft Azure IaaS |
|
|
247 | (1) |
|
|
248 | (1) |
|
|
249 | (2) |
|
|
251 | (2) |
Lesson 10 Designing a DirectAccess Solution |
|
253 | (20) |
|
Designing a DirectAccess Solution |
|
|
253 | (16) |
|
Understanding the DirectAccess Connection Process |
|
|
254 | (2) |
|
Understanding DirectAccess Enhancements in Windows Server 2012 R2 |
|
|
256 | (1) |
|
Understanding DirectAccess Requirements |
|
|
257 | (1) |
|
Understanding DirectAccess Server Requirements |
|
|
257 | (1) |
|
Understanding DirectAccess Client Requirements |
|
|
258 | (1) |
|
Designing a DirectAccess Deployment Topology |
|
|
258 | (2) |
|
Migrating from Forefront UAG |
|
|
260 | (1) |
|
Designing a DirectAccess Server Infrastructure and Deployment |
|
|
261 | (5) |
|
Determining the Scope of the DirectAccess Project |
|
|
262 | (1) |
|
Determining Network Requirements |
|
|
262 | (1) |
|
Designing a DirectAccess Deployment |
|
|
263 | (1) |
|
Designing an Enterprise Certificate Deployment |
|
|
263 | (2) |
|
Using One-Time Password (OTP) with DirectAccess |
|
|
265 | (1) |
|
Choosing an Access Method |
|
|
265 | (1) |
|
Using the Getting Started Wizard to Set Up a Remote Access Server |
|
|
266 | (3) |
|
|
269 | (1) |
|
|
269 | (3) |
|
|
272 | (1) |
Lesson 11 Designing a Web Application Proxy Solution |
|
273 | (21) |
|
Understanding Active Directory Federation Services |
|
|
274 | (5) |
|
|
276 | (2) |
|
Configuring Claims Provider Trust Rules |
|
|
278 | (1) |
|
Designing a Web Application Proxy Solution |
|
|
279 | (11) |
|
Planning for Applications, Authentication, and Authorization |
|
|
282 | (1) |
|
Planning for Integrated Windows Authentication |
|
|
282 | (1) |
|
Planning for Microsoft Office Forms Based Authentication Clients |
|
|
283 | (1) |
|
Planning for Windows Store App Clients |
|
|
283 | (1) |
|
Planning for Single Sign-On (SSO) |
|
|
283 | (1) |
|
Using Multi-Factor Authentication with AD FS |
|
|
284 | (2) |
|
Using Multi-Factor Access Control |
|
|
286 | (2) |
|
Adding Devices with Workplace Join |
|
|
288 | (1) |
|
Configuring CAs and Certificates |
|
|
289 | (1) |
|
Planning Access for Internal and External Clients |
|
|
289 | (1) |
|
|
290 | (1) |
|
|
290 | (3) |
|
|
293 | (1) |
Lesson 12 Implementing a Scalable Remote Access Solution |
|
294 | (31) |
|
Configuring Site-to-Site VPN |
|
|
295 | (3) |
|
Configuring Packet Filters |
|
|
298 | (7) |
|
Exploring the WFAS Profiles |
|
|
298 | (2) |
|
Understanding Inbound Rules, Outbound Rules, and Connection Security Rules |
|
|
300 | (4) |
|
Addressing Conflicts with Firewall Rules |
|
|
304 | (1) |
|
Exporting Firewall Configuration Rules |
|
|
304 | (1) |
|
Implementing Packet Tracing |
|
|
305 | (2) |
|
Implementing MultiSite Remote Access |
|
|
307 | (2) |
|
Configuring Remote Access Clustered with Network Load Balancing (NLB) |
|
|
309 | (1) |
|
Implementing an Advanced DirectAccess Solution |
|
|
310 | (4) |
|
Configuring Multiple RADIUS Server Groups and Infrastructure |
|
|
314 | (5) |
|
Installing and Configuring Network Policy Server |
|
|
315 | (1) |
|
Configuring Multiple RADIUS Servers |
|
|
315 | (4) |
|
Configuring Web Application Proxy for Clustering |
|
|
319 | (2) |
|
|
321 | (1) |
|
|
322 | (2) |
|
|
324 | (1) |
Lesson 13 Designing and Implementing a Network Protection Solution |
|
325 | (22) |
|
Designing Network Access Protection (NAP) |
|
|
326 | (17) |
|
Choosing a NAP Enforcement Method |
|
|
328 | (1) |
|
Designing for NAP Capacity |
|
|
329 | (1) |
|
Designing Placement of Servers, Firewall, Network Policy Server, and Remediation Network |
|
|
330 | (1) |
|
Configuring NAP Enforcement for IPsec |
|
|
330 | (6) |
|
Configuring NAP Enforcement for 802.1x |
|
|
336 | (2) |
|
Configuring System Health Validators (SHVs) |
|
|
338 | (2) |
|
Configuring Health Policies |
|
|
340 | (1) |
|
Configuring Isolation and Remediation |
|
|
341 | (1) |
|
Monitoring NAP Compliance |
|
|
342 | (1) |
|
|
343 | (1) |
|
|
343 | (3) |
|
|
346 | (1) |
Lesson 14 Designing a Forest and Domain Infrastructure |
|
347 | (35) |
|
Designing a Forest and Domain Infrastructure |
|
|
348 | (23) |
|
Using Microsoft Operations Framework |
|
|
350 | (1) |
|
|
350 | (4) |
|
Determining the Role of AD DS |
|
|
351 | (2) |
|
Diagramming the Current Infrastructure |
|
|
353 | (1) |
|
Determining Business Requirements |
|
|
353 | (1) |
|
Designing a Multi-Forest Architecture |
|
|
354 | (4) |
|
|
354 | (1) |
|
Why Create Multiple Forests? |
|
|
355 | (1) |
|
|
355 | (1) |
|
|
355 | (1) |
|
|
355 | (1) |
|
|
355 | (1) |
|
|
355 | (1) |
|
|
356 | (1) |
|
Organizational Forest Model |
|
|
356 | (1) |
|
|
357 | (1) |
|
Restricted Access Forest Model |
|
|
357 | (1) |
|
Designing a Domain Structure |
|
|
358 | (4) |
|
Creating a Forest Root Domain |
|
|
359 | (1) |
|
Creating a Domain Hierarchy |
|
|
360 | (2) |
|
Designing Trust Relationships |
|
|
362 | (4) |
|
|
363 | (1) |
|
|
363 | (1) |
|
|
364 | (1) |
|
|
365 | (1) |
|
Designing Functional Levels |
|
|
366 | (5) |
|
Migrating to Windows Server 2012 R2 |
|
|
371 | (3) |
|
Designing a Domain Migration |
|
|
371 | (1) |
|
Designing Domain Upgrades |
|
|
372 | (27) |
|
|
373 | (1) |
|
|
373 | (1) |
|
|
374 | (1) |
|
Designing Forest Restructure |
|
|
374 | (2) |
|
Designing Microsoft Azure Active Directory |
|
|
376 | (1) |
|
|
377 | (1) |
|
|
377 | (1) |
|
|
378 | (3) |
|
|
381 | (1) |
Lesson 15 Implementing a Forest and Domain Infrastructure |
|
382 | (15) |
|
Configuring Domain Rename |
|
|
382 | (2) |
|
Configuring Forest and Domain Trusts |
|
|
384 | (2) |
|
Configuring Kerberos Realm Trusts |
|
|
386 | (1) |
|
Implementing a Domain Upgrade |
|
|
387 | (1) |
|
Implementing a Domain Migration |
|
|
387 | (3) |
|
Implementing a Forest Restructure |
|
|
390 | (1) |
|
Deploying and Managing a Test Forest |
|
|
391 | (2) |
|
|
393 | (1) |
|
|
393 | (3) |
|
|
396 | (1) |
Lesson 16 Designing a Group Policy Strategy |
|
397 | (41) |
|
Understanding Group Policy |
|
|
398 | (1) |
|
|
399 | (6) |
|
Planning Organizational Unit (OU) Hierarchy |
|
|
399 | (2) |
|
Identifying Group Policy Goals |
|
|
401 | (2) |
|
Meeting Organizational Requirements |
|
|
403 | (1) |
|
Planning Delegated Administration |
|
|
404 | (1) |
|
|
405 | (7) |
|
Designing for Group Policy Object Placement |
|
|
405 | (1) |
|
Designing for Inheritance Blocking |
|
|
405 | (3) |
|
Designing for Policy Enforcement |
|
|
408 | (1) |
|
Designing for Security Filters |
|
|
409 | (1) |
|
Designing for WMI Filtering |
|
|
410 | (2) |
|
|
412 | (13) |
|
Deploying Group Policy Objects |
|
|
413 | (3) |
|
Performing a Group Policy Update |
|
|
413 | (1) |
|
Modifying Group Policy Refresh Interval |
|
|
414 | (1) |
|
Forcing an Update through Group Policy Management Console |
|
|
414 | (1) |
|
Deploying a Loopback Policy |
|
|
414 | (2) |
|
Staging Group Policy Objects for Deployment |
|
|
416 | (2) |
|
Using the Group Policy Modeling Wizard |
|
|
416 | (1) |
|
Creating an OU for Testing |
|
|
417 | (1) |
|
Deploying Group Policy for Slow Links |
|
|
418 | (1) |
|
Deploying Site-Linked Group Policy Objects |
|
|
419 | (2) |
|
Deploying Delegated Administration |
|
|
421 | (3) |
|
Understanding Group Policy Caching |
|
|
424 | (1) |
|
|
425 | (8) |
|
Performing Maintenance on Group Policy |
|
|
426 | (1) |
|
Configuring Advanced Group Policy Management |
|
|
427 | (1) |
|
Managing Group Policy through Windows PowerShell |
|
|
428 | (5) |
|
|
433 | (1) |
|
|
434 | (3) |
|
|
437 | (1) |
Lesson 17 Designing an Active Directory Permission Model |
|
438 | (19) |
|
Designing an Active Directory Permission Model |
|
|
438 | (14) |
|
Designing Active Directory Object Security |
|
|
439 | (1) |
|
Customizing Tasks Using the Delegation of Control Wizard |
|
|
440 | (3) |
|
Designing Active Directory Quotas |
|
|
443 | (1) |
|
Deploying Administrative Tools on the Client Computer |
|
|
443 | (1) |
|
Delegating Permissions on Administrative Users |
|
|
444 | (3) |
|
Configuring a Plan for Kerberos Delegation |
|
|
447 | (10) |
|
Managing Service Principal Names (SPNS) |
|
|
449 | (2) |
|
Configuring Kerberos Delegation |
|
|
451 | (1) |
|
|
452 | (1) |
|
|
453 | (2) |
|
|
455 | (2) |
Lesson 18 Designing an Active Directory Sites Topology |
|
457 | (29) |
|
Planning an Active Directory Sites |
|
|
457 | (25) |
|
Gathering Network Information |
|
|
458 | (1) |
|
Determining Proximity of Domain Controllers |
|
|
459 | (1) |
|
|
460 | (3) |
|
|
461 | (1) |
|
|
461 | (1) |
|
|
462 | (1) |
|
|
463 | (9) |
|
Understanding lntrasite Replication |
|
|
464 | (2) |
|
Understanding Intersite Replication |
|
|
466 | (1) |
|
Understanding Connection Objects |
|
|
466 | (2) |
|
Selecting a Replication Model |
|
|
468 | (1) |
|
Selecting a Replication Model |
|
|
468 | (1) |
|
|
469 | (1) |
|
|
470 | (1) |
|
|
470 | (1) |
|
Planning Global Catalog and RODC Replication |
|
|
471 | (1) |
|
Planning for SYSVOL Replication |
|
|
471 | (1) |
|
|
472 | (6) |
|
Configuring Site Link Costs |
|
|
473 | (1) |
|
Configuring Site Link Schedules |
|
|
474 | (1) |
|
Creating Site Link Bridges |
|
|
475 | (3) |
|
Identifying and Resolving Active Directory Replication Conflicts |
|
|
478 | (8) |
|
Monitoring Replication with the Active Directory Replication Status Tool (ADREPLSTATUS) |
|
|
479 | (3) |
|
|
482 | (1) |
|
|
482 | (3) |
|
|
485 | (1) |
Lesson 19 Designing a Domain Controller Strategy |
|
486 | (17) |
|
Designing a Domain Controller Strategy |
|
|
486 | (13) |
|
Designing Global Catalogs |
|
|
487 | (1) |
|
Designing Partial Attribute Sets |
|
|
488 | (1) |
|
Designing Operations Master Roles |
|
|
489 | (4) |
|
Transferring the Operations Masters Role |
|
|
491 | (1) |
|
Seizing the Operations Masters Role |
|
|
492 | (1) |
|
Designing Read-Only Domain Controllers (RODCs) |
|
|
493 | (2) |
|
Planning Virtualizing Domain Controllers |
|
|
495 | (1) |
|
Planning Domain Controller Cloning |
|
|
496 | (2) |
|
Planning Domain Controller Placement |
|
|
498 | (6) |
|
How Many Domain Controllers? |
|
|
498 | (1) |
|
Deploying Forest Root Domain Controllers |
|
|
498 | (1) |
|
|
499 | (1) |
|
|
499 | (3) |
|
|
502 | (1) |
Lesson 20 Designing and Implementing a Branch Office Infrastructure |
|
503 | (27) |
|
Designing a Branch Office Strategy |
|
|
504 | (5) |
|
Using AD DS in the Branch Office |
|
|
504 | (1) |
|
Designing a Branch Office Topology |
|
|
505 | (1) |
|
Evaluating Full Domain Controller and Server Core Domain Controller |
|
|
506 | (1) |
|
Using a Full Domain Controller |
|
|
507 | (1) |
|
Using a Server Core Domain Controller |
|
|
507 | (1) |
|
Designing Global Catalogs and Universal Group Membership Caching at Branch Offices |
|
|
507 | (2) |
|
Designing a Read-Only Domain Controller for a Branch Office |
|
|
509 | (3) |
|
Configuring Password Replication Policy |
|
|
509 | (2) |
|
Modifying Filtered Attributes Set and Confidential Attributes |
|
|
511 | (1) |
|
Choosing Branch Office Services |
|
|
512 | (3) |
|
Designing DNS for the Branch Office |
|
|
514 | (1) |
|
Designing DHCP for the Branch Office |
|
|
514 | (1) |
|
Using the 80/20 Split Scopes |
|
|
514 | (1) |
|
|
515 | (1) |
|
Delegating Administration |
|
|
515 | (3) |
|
Using the Delegation of Control Wizard |
|
|
515 | (2) |
|
Using Administrator Role Separation |
|
|
517 | (1) |
|
|
518 | (7) |
|
Understanding BranchCache Benefits |
|
|
518 | (1) |
|
Understanding Content Servers |
|
|
518 | (1) |
|
Understanding BranchCache Operating Modes |
|
|
519 | (3) |
|
Enabling BranchCache on Content Servers |
|
|
522 | (1) |
|
Configuring a Hosted Cache Mode Server |
|
|
523 | (1) |
|
Configuring Hash Publications |
|
|
524 | (1) |
|
Configuring BranchCache Clients |
|
|
525 | (1) |
|
|
525 | (1) |
|
|
526 | (3) |
|
|
529 | (1) |
Appendix A |
|
530 | (2) |
Index |
|
532 | |