Introduction |
|
xi | |
Microsoft certifications |
|
xii | |
Acknowledgments |
|
xii | |
Errata, updates, & book support |
|
xiii | |
We want to hear from you |
|
xiv | |
Stay in touch |
|
xiv | |
Preparing for the exam |
|
xiv | |
|
Chapter 1 Plan and deploy a server infrastructure |
|
|
1 | (62) |
|
Objective 1.1 Design and plan for an automated server installation strategy |
|
|
1 | (20) |
|
Understanding design considerations for deployment images |
|
|
2 | (7) |
|
Using the Windows Assessment and Deployment Kit |
|
|
9 | (1) |
|
Planning for deploying servers to Microsoft Azure laaS |
|
|
10 | (3) |
|
Planning for deploying servers using System Center App Controller and Windows PowerShell |
|
|
13 | (5) |
|
Planning for multicast deployment |
|
|
18 | (1) |
|
Planning for Windows Deployment Services |
|
|
18 | (2) |
|
|
20 | (1) |
|
|
21 | (1) |
|
Objective 1.2 Implement a server deployment infrastructure |
|
|
21 | (7) |
|
Configuring multisite topology and transport servers |
|
|
22 | (1) |
|
Configuring a multiserver topology |
|
|
23 | (4) |
|
|
27 | (1) |
|
|
28 | (1) |
|
Objective 1.3 Plan and implement server upgrade and migration |
|
|
28 | (8) |
|
Planning for role migration |
|
|
29 | (2) |
|
|
31 | (2) |
|
Migrating servers across domains and forests |
|
|
33 | (1) |
|
Designing a server consolidation strategy |
|
|
33 | (1) |
|
Planning for capacity and resource optimization |
|
|
34 | (1) |
|
|
35 | (1) |
|
|
36 | (1) |
|
Objective 1.4 Plan and deploy Virtual Machine Manager services |
|
|
36 | (8) |
|
Designing Virtual Machine Manager service templates |
|
|
37 | (1) |
|
Defining operating system profiles |
|
|
38 | (1) |
|
Configuring hardware and capability profiles |
|
|
39 | (2) |
|
|
41 | (1) |
|
Configuring image and template libraries |
|
|
41 | (1) |
|
Managing logical networks |
|
|
42 | (1) |
|
|
43 | (1) |
|
|
43 | (1) |
|
Objective 1.5 Plan and implement file and storage services |
|
|
44 | (13) |
|
Incorporating planning considerations |
|
|
44 | (7) |
|
Configuring the iSCSI Target Server |
|
|
51 | (1) |
|
Configuring iSCSI Naming Services (iSNS) |
|
|
52 | (1) |
|
Configuring the Network File System (NFS) |
|
|
52 | (3) |
|
|
55 | (1) |
|
|
56 | (1) |
|
|
57 | (6) |
|
Chapter 2 Design and implement network infrastructure services |
|
|
63 | (66) |
|
Objective 2.1 Design and maintain a Dynamic Host Configuration Protocol (DHCP) solution |
|
|
63 | (17) |
|
Designing a highly available DHCP service |
|
|
65 | (9) |
|
Implementing DHCP filtering |
|
|
74 | (1) |
|
Implementing and configuring a DHCP Management Pack |
|
|
75 | (1) |
|
Maintaining a DHCP database |
|
|
76 | (1) |
|
|
77 | (1) |
|
|
78 | (2) |
|
Objective 2.2 Design a name resolution solution strategy |
|
|
80 | (22) |
|
Configuring secure name resolution |
|
|
81 | (11) |
|
Supporting DNS interoperability |
|
|
92 | (1) |
|
Managing DNS replication with application partitions |
|
|
93 | (2) |
|
Providing name resolution for IPv6 |
|
|
95 | (1) |
|
Supporting single-label DNS name resolution |
|
|
95 | (1) |
|
Designing a DNS zone hierarchy |
|
|
96 | (3) |
|
|
99 | (1) |
|
|
100 | (2) |
|
Objective 2.3 Design and manage an IP address management solution |
|
|
102 | (18) |
|
Managing IP addresses with IPAM |
|
|
102 | (1) |
|
|
103 | (4) |
|
Planning for IPAM server placement |
|
|
107 | (2) |
|
Managing IPAM database storage |
|
|
109 | (1) |
|
Using role-based access control with IPAM |
|
|
109 | (3) |
|
Configuring IPAM auditing |
|
|
112 | (1) |
|
Managing and monitoring multiple DHCP and DNS servers with IPAM |
|
|
113 | (1) |
|
|
114 | (1) |
|
Configuring data collection for IPAM |
|
|
115 | (1) |
|
Integrating IPAM with Virtual Machine Manager (VMM) |
|
|
115 | (1) |
|
|
116 | (1) |
|
|
117 | (3) |
|
|
120 | (9) |
|
Chapter 3 Design and implement network access services |
|
|
129 | (64) |
|
Objective 3.1 Design a VPN solution |
|
|
130 | (10) |
|
|
130 | (1) |
|
|
131 | (1) |
|
Using client/site-to-site connections |
|
|
132 | (1) |
|
Understanding bandwidth requirements |
|
|
133 | (1) |
|
Understanding protocol implications |
|
|
134 | (1) |
|
Connecting to Microsoft Azure laaS |
|
|
135 | (1) |
|
Using the Connection Manager Administration Kit (CMAK) for VPN deployment configurations |
|
|
136 | (2) |
|
|
138 | (1) |
|
|
139 | (1) |
|
Objective 3.2 Design a DirectAccess solution |
|
|
140 | (11) |
|
Understanding deployment topology |
|
|
141 | (3) |
|
Migrating from Forefront UAG |
|
|
144 | (2) |
|
Using One-Time Password (OTP) |
|
|
146 | (1) |
|
Using enterprise Certificate Authority (CA) certificates |
|
|
147 | (2) |
|
|
149 | (1) |
|
|
149 | (2) |
|
Objective 3.3 Design a Web Application Proxy solution |
|
|
151 | (8) |
|
Planning for applications |
|
|
151 | (1) |
|
Using authentication and authorization |
|
|
152 | (1) |
|
|
153 | (1) |
|
|
154 | (1) |
|
Using multifactor authentication |
|
|
154 | (1) |
|
Using multifactor access control |
|
|
155 | (1) |
|
Using Single Sign-On (SSO) |
|
|
155 | (1) |
|
|
155 | (1) |
|
Planning access for internal and external clients |
|
|
155 | (2) |
|
|
157 | (1) |
|
|
157 | (2) |
|
Objective 3.4 Implement a scalable remote access solution |
|
|
159 | (7) |
|
Configuring site-to-site VPNs |
|
|
159 | (1) |
|
Configuring packet filters |
|
|
160 | (1) |
|
Implementing packet tracing |
|
|
161 | (1) |
|
Implementing multisite remote access |
|
|
161 | (1) |
|
Configuring remote access clustered with NLB |
|
|
162 | (1) |
|
Implementing an advanced DirectAccess solution |
|
|
163 | (1) |
|
Configuring multiple RADIUS server groups and infrastructure |
|
|
163 | (1) |
|
Configuring Web Application Proxy for clustering |
|
|
164 | (1) |
|
|
164 | (1) |
|
|
165 | (1) |
|
Objective 3.5 Design and implement a network protection solution |
|
|
166 | (16) |
|
Configuring NAP enforcement methods |
|
|
167 | (3) |
|
Designing an NPS infrastructure |
|
|
170 | (4) |
|
Configuring NAP enforcement for IPsec and 802.1x |
|
|
174 | (4) |
|
Monitoring for compliance |
|
|
178 | (1) |
|
|
179 | (1) |
|
|
180 | (2) |
|
|
182 | (11) |
|
Chapter 4 Design and implement an Active Directory infrastructure (logical) |
|
|
193 | (66) |
|
Objective 4.1 Design a forest and domain infrastructure |
|
|
194 | (15) |
|
Building multiforest structures and trust relationships |
|
|
194 | (5) |
|
Managing functional levels and domain upgrades |
|
|
199 | (2) |
|
Altering the forest structure |
|
|
201 | (2) |
|
Implementing hybrid cloud services, including Microsoft Azure Active Directory and DirSync |
|
|
203 | (3) |
|
|
206 | (1) |
|
|
207 | (2) |
|
Objective 4.2 Implement a forest and domain infrastructure |
|
|
209 | (16) |
|
Configuring domain rename |
|
|
210 | (7) |
|
Configuring Kerberos realm trusts |
|
|
217 | (1) |
|
Implementing a domain upgrade |
|
|
217 | (1) |
|
Implementing a domain migration |
|
|
218 | (2) |
|
Implementing a forest restructure |
|
|
220 | (1) |
|
Deploying and managing a test forest |
|
|
221 | (1) |
|
|
222 | (1) |
|
|
223 | (2) |
|
Objective 4.3 Design a Group Policy strategy |
|
|
225 | (13) |
|
Controlling GPO application |
|
|
225 | (4) |
|
|
229 | (3) |
|
Using Advanced Group Policy Management (AGPM) |
|
|
232 | (2) |
|
|
234 | (1) |
|
|
235 | (1) |
|
|
236 | (2) |
|
Objective 4.4 Design an Active Directory permission model |
|
|
238 | (10) |
|
Designing and implementing Active Directory object security |
|
|
238 | (2) |
|
Managing Active Directory quotas |
|
|
240 | (1) |
|
Creating custom tasks using the Delegation of Control Wizard |
|
|
241 | (2) |
|
Deploying administration tools |
|
|
243 | (1) |
|
Delegating permissions on administrative users (AdminSDHolder) |
|
|
243 | (1) |
|
Planning for Kerberos delegation |
|
|
244 | (2) |
|
|
246 | (1) |
|
|
246 | (2) |
|
|
248 | (11) |
|
Chapter 5 Design and implement an Active Directory infrastructure (physical) |
|
|
259 | (58) |
|
Objective 5.1 Design an Active Directory sites topology |
|
|
260 | (18) |
|
Planning for domain controller proximity |
|
|
261 | (3) |
|
Optimizing Active Directory replication |
|
|
264 | (5) |
|
|
269 | (5) |
|
Identifying and resolving Active Directory replication conflicts |
|
|
274 | (1) |
|
|
275 | (1) |
|
|
276 | (2) |
|
Objective 5.2 Design a domain controller strategy |
|
|
278 | (13) |
|
|
279 | (1) |
|
Optimizing operations master roles |
|
|
280 | (1) |
|
Planning for read-only domain controller (RODC) placement |
|
|
281 | (2) |
|
Understanding the partial attribute set |
|
|
283 | (2) |
|
Using cloned domain controllers |
|
|
285 | (2) |
|
Choosing domain controller placement |
|
|
287 | (1) |
|
|
288 | (1) |
|
|
289 | (2) |
|
Objective 5.3 Design and implement a branch office infrastructure |
|
|
291 | (16) |
|
Improving branch office authentication |
|
|
292 | (5) |
|
Implementing branch office infrastructure requirements |
|
|
297 | (1) |
|
Securing branch office deployments |
|
|
298 | (6) |
|
|
304 | (1) |
|
|
304 | (3) |
|
|
307 | (10) |
Index |
|
317 | |