|
Lesson 1 Deploying and Managing Server Images |
|
|
1 | (41) |
|
Using Windows Deployment Services |
|
|
2 | (36) |
|
Installing the Windows Deployment Services Role |
|
|
2 | (3) |
|
Configuring the WDS Server |
|
|
5 | (1) |
|
Performing the Initial Configuration of WDS |
|
|
5 | (4) |
|
Configuring the WDS Properties |
|
|
9 | (6) |
|
|
15 | (1) |
|
Configuring the Custom DHCP Option |
|
|
15 | (2) |
|
Configuring and Managing Boot, Install, and Discover Images |
|
|
17 | (1) |
|
|
18 | (2) |
|
|
20 | (1) |
|
Creating an Image File with WDS |
|
|
21 | (2) |
|
Creating a Discover Image |
|
|
23 | (2) |
|
|
25 | (2) |
|
Performing an Unattended Installation |
|
|
27 | (7) |
|
Updating Images with Patches, Hotfixes, and Drivers |
|
|
34 | (1) |
|
Installing Features for Offline Images |
|
|
35 | (1) |
|
Deploying Driver Packages with an Image |
|
|
36 | (2) |
|
|
38 | (1) |
|
|
38 | (3) |
|
|
41 | (1) |
|
Lesson 2 Implementing Patch Management |
|
|
42 | (43) |
|
Understanding Windows Updates and Automatic Updates |
|
|
43 | (4) |
|
Deploying Windows Server Update Services (WSUS) |
|
|
47 | (33) |
|
|
49 | (3) |
|
|
52 | (7) |
|
Configuring WSUS Synchronization |
|
|
59 | (5) |
|
Configuring WSUS Computer Groups |
|
|
64 | (4) |
|
Configuring Group Policies for Updates |
|
|
68 | (1) |
|
Configuring Client-Side Targeting |
|
|
69 | (2) |
|
|
71 | (4) |
|
|
75 | (3) |
|
Administrating WSUS with Commands |
|
|
78 | (1) |
|
Troubleshooting Problems with Installing Updates |
|
|
79 | (1) |
|
Understanding System Center Configuration Manager (SCCM) |
|
|
80 | (1) |
|
|
80 | (1) |
|
|
81 | (3) |
|
|
84 | (1) |
|
Lesson 3 Monitoring Servers |
|
|
85 | (48) |
|
Introducing the Microsoft Management Console (MMC) |
|
|
86 | (7) |
|
|
88 | (1) |
|
Using Computer Management |
|
|
89 | (1) |
|
Using the Services Console |
|
|
90 | (3) |
|
|
93 | (9) |
|
Understanding Logs and Events |
|
|
94 | (2) |
|
|
96 | (1) |
|
Adding a Task to an Event |
|
|
96 | (3) |
|
Configuring Event Subscriptions |
|
|
99 | (3) |
|
Using Reliability Monitor |
|
|
102 | (1) |
|
|
103 | (17) |
|
|
104 | (5) |
|
|
109 | (2) |
|
Using Performance Monitor |
|
|
111 | (3) |
|
Using Common Performance Counters |
|
|
114 | (1) |
|
Configuring Data Collector Sets (DCS) |
|
|
114 | (3) |
|
Configuring Performance Alerts |
|
|
117 | (3) |
|
|
120 | (7) |
|
Using the netstat Command |
|
|
121 | (1) |
|
|
121 | (6) |
|
Monitoring Virtual Machines (VMs) |
|
|
127 | (1) |
|
|
128 | (1) |
|
|
129 | (3) |
|
|
132 | (1) |
|
Lesson 4 Configuring Distributed File System (DFS) |
|
|
133 | (32) |
|
Using Distributed File System |
|
|
133 | (27) |
|
Installing and Configuring DFS Namespace |
|
|
134 | (1) |
|
|
135 | (1) |
|
Configuring DFS Namespaces |
|
|
136 | (6) |
|
|
142 | (3) |
|
|
145 | (1) |
|
Installing and Configuring DFS Replication |
|
|
145 | (1) |
|
Installing DFS Replication |
|
|
146 | (1) |
|
Configuring DFS Replication Targets |
|
|
147 | (7) |
|
|
154 | (1) |
|
Configuring Remote Differential Compression |
|
|
155 | (2) |
|
|
157 | (2) |
|
Configuring Fault Tolerance Using DFS |
|
|
159 | (1) |
|
|
160 | (1) |
|
|
160 | (4) |
|
|
164 | (1) |
|
Lesson 5 Configuring File Server Resource Manager (FSRM) |
|
|
165 | (23) |
|
Using File Server Resource Manager |
|
|
165 | (18) |
|
Installing File Server Resource Manager |
|
|
166 | (1) |
|
|
167 | (1) |
|
|
167 | (5) |
|
Changing Quotas Templates |
|
|
172 | (1) |
|
|
173 | (1) |
|
Managing Files with File Screening |
|
|
174 | (1) |
|
|
174 | (1) |
|
|
175 | (3) |
|
Creating a File Screen Exception |
|
|
178 | (1) |
|
Creating a File Screen Template |
|
|
178 | (1) |
|
|
179 | (3) |
|
|
182 | (1) |
|
|
183 | (1) |
|
|
184 | (3) |
|
|
187 | (1) |
|
Lesson 6 Configuring File Services and Disk Encryption |
|
|
188 | (30) |
|
|
188 | (26) |
|
Encrypting Files with EFS |
|
|
189 | (1) |
|
|
190 | (2) |
|
|
192 | (1) |
|
Sharing Files Protected with EFS with Others |
|
|
193 | (1) |
|
Configuring EFS with Group Policies |
|
|
194 | (2) |
|
Configuring the EFS Recovery Agent |
|
|
196 | (1) |
|
Managing EFS Certificates |
|
|
197 | (4) |
|
Encrypting Files with BitLocker |
|
|
201 | (2) |
|
Configuring BitLocker Encryption |
|
|
203 | (6) |
|
Configuring BitLocker To Go |
|
|
209 | (1) |
|
BitLocker Pre-Provisioning |
|
|
210 | (1) |
|
Configuring BitLocker Policies |
|
|
210 | (2) |
|
Managing BitLocker Certificates |
|
|
212 | (1) |
|
Configuring the Network Unlock Feature |
|
|
212 | (2) |
|
|
214 | (1) |
|
|
214 | (3) |
|
|
217 | (1) |
|
Lesson 7 Configuring Advanced Audit Policies |
|
|
218 | (37) |
|
Enabling and Configuring Auditing |
|
|
218 | (32) |
|
Implementing Auditing Using Group Policies |
|
|
219 | (1) |
|
Implementing an Audit Policy |
|
|
220 | (1) |
|
Implementing Object Access Auditing Using Group Policies |
|
|
221 | (6) |
|
Implementing Advanced Audit Policy Settings |
|
|
227 | (1) |
|
Implementing Advanced Audit Policy Settings Using Group Policies |
|
|
227 | (14) |
|
Removing Advanced Audit Policy Configuration |
|
|
241 | (1) |
|
Implementing Auditing Using AuditPol.exe |
|
|
241 | (2) |
|
|
243 | (1) |
|
Creating Expression-Based Audit Policies |
|
|
244 | (5) |
|
Creating Removable Device Audit Policies |
|
|
249 | (1) |
|
|
250 | (1) |
|
|
251 | (3) |
|
|
254 | (1) |
|
Lesson 8 Configuring DNS Zones |
|
|
255 | (31) |
|
|
256 | (4) |
|
Understanding DNS Names and Zones |
|
|
257 | (2) |
|
Understanding the Address Resolution Mechanism |
|
|
259 | (1) |
|
Configuring and Managing DNS Zones |
|
|
260 | (21) |
|
|
261 | (2) |
|
Configuring Primary and Secondary Zones |
|
|
263 | (6) |
|
Configuring Active Directory-Integrated Zones |
|
|
269 | (2) |
|
Configuring Zone Delegation |
|
|
271 | (2) |
|
|
273 | (1) |
|
Configuring Caching-Only Servers |
|
|
274 | (1) |
|
Configuring Forwarding and Conditional Forwarding |
|
|
274 | (4) |
|
Configuring Zone Transfers |
|
|
278 | (1) |
|
Understanding Full and Incremental Transfers |
|
|
278 | (1) |
|
Configuring Notify Settings |
|
|
279 | (2) |
|
Using the DNSCMD Command to Manage Zones |
|
|
281 | (1) |
|
|
282 | (1) |
|
|
283 | (2) |
|
|
285 | (1) |
|
Lesson 9 Configuring DNS Records |
|
|
286 | (23) |
|
Configuring DNS Record Types |
|
|
287 | (13) |
|
Creating and Configuring DNS Resource Records |
|
|
287 | (1) |
|
Start of Authority (SOA) Records |
|
|
288 | (1) |
|
|
289 | (1) |
|
Host (A and AAAA) Records |
|
|
290 | (1) |
|
Canonical Name (CNAME) Records |
|
|
290 | (1) |
|
|
291 | (1) |
|
Mail Exchanger (MX) Records |
|
|
291 | (1) |
|
Service Location (SRV) Records |
|
|
292 | (1) |
|
Configuring Record Options |
|
|
293 | (3) |
|
|
296 | (1) |
|
Configuring Secure Dynamic Updates |
|
|
297 | (1) |
|
Configuring Zone Scavenging |
|
|
298 | (2) |
|
Using the DNSCMD Command to Manage Resource Records |
|
|
300 | (1) |
|
Troubleshooting DNS Problems |
|
|
300 | (4) |
|
|
304 | (1) |
|
|
305 | (3) |
|
|
308 | (1) |
|
Lesson 10 Configuring VPN and Routing |
|
|
309 | (39) |
|
|
310 | (33) |
|
Installing and Configuring the Remote Access Role |
|
|
310 | (1) |
|
Installing Routing and Remote Access |
|
|
310 | (2) |
|
Configuring Routing and Remote Access |
|
|
312 | (2) |
|
Configuring RRAS for Dial-Up Remote Access |
|
|
314 | (5) |
|
|
319 | (2) |
|
Configuring the VPN Connection on the Server |
|
|
321 | (4) |
|
Creating a VPN Connection on a Client |
|
|
325 | (4) |
|
|
329 | (1) |
|
Configuring Split Tunneling |
|
|
330 | (1) |
|
Configuring Remote Dial-In Settings for Users |
|
|
331 | (1) |
|
Troubleshooting Remote Access Problems |
|
|
332 | (2) |
|
|
334 | (1) |
|
Disabling Routing and Remote Access |
|
|
335 | (1) |
|
|
336 | (1) |
|
|
337 | (2) |
|
|
339 | (3) |
|
Configuring Demand-Dial Routing |
|
|
342 | (1) |
|
Configuring the DHCP Relay Agent |
|
|
342 | (1) |
|
|
343 | (1) |
|
|
344 | (3) |
|
|
347 | (1) |
|
Lesson 11 Configuring Direct Access |
|
|
348 | (35) |
|
Understanding DirectAccess |
|
|
348 | (29) |
|
Looking at the DirectAccess Connection Process |
|
|
349 | (1) |
|
Understanding DirectAccess Requirements |
|
|
350 | (1) |
|
Understanding DirectAccess Server Requirements |
|
|
350 | (1) |
|
Understanding DirectAccess Client Requirements |
|
|
351 | (1) |
|
Running the DirectAccess Getting Started Wizard |
|
|
351 | (3) |
|
Running the Remote Access Setup Wizard |
|
|
354 | (3) |
|
Implementing Client Configuration |
|
|
357 | (2) |
|
Implementing DirectAccess Server |
|
|
359 | (3) |
|
Implementing Infrastructure Servers |
|
|
362 | (3) |
|
Configuring the Application Servers |
|
|
365 | (1) |
|
Preparing for DirectAccess Deployment |
|
|
366 | (1) |
|
Configuring DNS for DirectAccess |
|
|
366 | (1) |
|
Configuring Certificates for DirectAccess |
|
|
366 | (10) |
|
Troubleshooting DirectAccess |
|
|
376 | (1) |
|
|
377 | (1) |
|
|
378 | (4) |
|
|
382 | (1) |
|
Lesson 12 Configuring a Network Policy Server |
|
|
383 | (32) |
|
Configuring a Network Policy Server Infrastructure |
|
|
383 | (28) |
|
Installing and Configuring Network Policy Server |
|
|
385 | (2) |
|
Configuring Multiple RADIUS Server Infrastructures |
|
|
387 | (4) |
|
Configuring RADIUS Clients |
|
|
391 | (10) |
|
Managing RADIUS Templates |
|
|
401 | (2) |
|
Configuring RADIUS Accounting |
|
|
403 | (4) |
|
Understanding NPS Authentication Methods |
|
|
407 | (1) |
|
Using Password-Based Authentication |
|
|
407 | (1) |
|
Using Certificates for Authentication |
|
|
408 | (3) |
|
|
411 | (1) |
|
|
411 | (3) |
|
|
414 | (1) |
|
Lesson 13 Configuring NPS Policies |
|
|
415 | (25) |
|
|
415 | (20) |
|
Configuring Connection Request Policies |
|
|
416 | (8) |
|
Configuring Network Policies |
|
|
424 | (6) |
|
Multilink and Bandwidth Allocation |
|
|
430 | (1) |
|
|
430 | (1) |
|
|
431 | (1) |
|
|
431 | (1) |
|
|
432 | (1) |
|
Exporting and Importing Templates |
|
|
432 | (2) |
|
Exporting and Importing the NPS Configuration Including NPS Policies |
|
|
434 | (1) |
|
|
435 | (1) |
|
|
436 | (3) |
|
|
439 | (1) |
|
Lesson 14 Configuring Network Access Protection (NAP) |
|
|
440 | (36) |
|
Using Network Access Protection (NAP) |
|
|
441 | (30) |
|
Installing Network Access Protection |
|
|
443 | (3) |
|
Configuring NAP Enforcement |
|
|
446 | (1) |
|
Configuring NAP Enforcement for DHCP |
|
|
446 | (14) |
|
Configuring NAP Enforcement for VPN |
|
|
460 | (3) |
|
Configuring System Health Validators |
|
|
463 | (2) |
|
Configuring Health Policies |
|
|
465 | (3) |
|
Configuring Isolation and Remediation |
|
|
468 | (1) |
|
Configuring NAP Client Settings |
|
|
469 | (2) |
|
|
471 | (1) |
|
|
471 | (4) |
|
|
475 | (1) |
|
Lesson 15 Configuring Service Authentication |
|
|
476 | (18) |
|
Configuring Service Authentication |
|
|
477 | (6) |
|
Understanding NTLM Authentication |
|
|
477 | (1) |
|
|
477 | (2) |
|
Managing Service Principal Names |
|
|
479 | (3) |
|
Configuring Kerberos Delegation |
|
|
482 | (1) |
|
Managing Service Accounts |
|
|
483 | (6) |
|
Creating and Configuring Service Accounts |
|
|
483 | (2) |
|
Creating and Configuring Managed Service Accounts |
|
|
485 | (3) |
|
Creating and Configuring Group Managed Service Accounts |
|
|
488 | (1) |
|
|
489 | (1) |
|
|
489 | (4) |
|
|
493 | (1) |
|
Lesson 16 Configuring Domain Controllers |
|
|
494 | (28) |
|
Understanding Domain Controllers |
|
|
494 | (14) |
|
Managing Global Catalogs and Configuring Universal Group Membership Caching |
|
|
496 | (3) |
|
Managing Operations Masters |
|
|
499 | (2) |
|
Viewing the Operations Masters Role Holders |
|
|
501 | (3) |
|
Transferring the Operations Masters Role |
|
|
504 | (2) |
|
Seizing the Operations Masters Role |
|
|
506 | (2) |
|
Installing and Configuring an RODC |
|
|
508 | (4) |
|
Cloning a Domain Controller |
|
|
512 | (5) |
|
|
517 | (1) |
|
|
518 | (3) |
|
|
521 | (1) |
|
Lesson 17 Maintaining Active Directory |
|
|
522 | (33) |
|
Automating User Account Management |
|
|
523 | (2) |
|
Backing Up and Restoring Active Directory |
|
|
525 | (21) |
|
Understanding the Active Directory Database, SYSVOL, and System State |
|
|
525 | (2) |
|
|
527 | (1) |
|
Performing a Backup of Active Directory and SYSVOL |
|
|
528 | (5) |
|
Performing an Active Directory Restore |
|
|
533 | (4) |
|
Configuring Active Directory Snapshots |
|
|
537 | (3) |
|
Performing Object- and Container-Level Recovery |
|
|
540 | (6) |
|
Managing Active Directory Offline |
|
|
546 | (1) |
|
Optimizing an Active Directory Database |
|
|
547 | (2) |
|
|
549 | (1) |
|
|
550 | (1) |
|
|
551 | (3) |
|
|
554 | (1) |
|
Lesson 18 Configuring Account Policies |
|
|
555 | (17) |
|
Working with Account Policies |
|
|
555 | (13) |
|
Configuring Domain User Password Policy |
|
|
557 | (1) |
|
Understanding Strong Passwords |
|
|
557 | (1) |
|
Configuring Password Policy Settings |
|
|
558 | (2) |
|
Configuring Account Lockout Settings |
|
|
560 | (2) |
|
Configuring and Applying Password Settings Objects |
|
|
562 | (3) |
|
Configuring Local User Password Policy |
|
|
565 | (1) |
|
Delegating Password Settings Management |
|
|
565 | (3) |
|
|
568 | (1) |
|
|
568 | (3) |
|
|
571 | (1) |
|
Lesson 19 Configuring Group Policy Processing |
|
|
572 | (29) |
|
Understanding group policy processing |
|
|
572 | (24) |
|
Configuring Processing Order and Precedence |
|
|
573 | (1) |
|
Understanding Group Policy Inheritance |
|
|
573 | (3) |
|
Managing Group Policy Links |
|
|
576 | (1) |
|
Using Filtering with Group Policies |
|
|
577 | (1) |
|
Configuring Blocking of Inheritance |
|
|
578 | (1) |
|
Configuring Enforced Policies |
|
|
579 | (2) |
|
Configuring Security Filtering and WMI Filtering |
|
|
581 | (1) |
|
|
581 | (2) |
|
|
583 | (3) |
|
Configuring Loopback Processing |
|
|
586 | (1) |
|
Configuring Client-Side Extension Behavior |
|
|
587 | (2) |
|
Looking at GPOs and Disconnected Computers |
|
|
589 | (1) |
|
Configuring and Managing Slow-Link Processing |
|
|
589 | (1) |
|
|
589 | (7) |
|
|
596 | (1) |
|
|
596 | (4) |
|
|
600 | (1) |
|
Lesson 20 Configuring Group Policy Settings |
|
|
601 | (30) |
|
Configuring Group Policy Settings |
|
|
602 | (24) |
|
Performing Software Installation Using Group Policies |
|
|
603 | (1) |
|
Assigning or Publishing a Package |
|
|
604 | (3) |
|
Redeploying an Application |
|
|
607 | (1) |
|
|
607 | (1) |
|
|
608 | (4) |
|
Using Scripts with Group Policies |
|
|
612 | (3) |
|
Using Administrative Templates |
|
|
615 | (1) |
|
Managing Administrative Templates |
|
|
615 | (2) |
|
|
617 | |
|
|
518 | (104) |
|
Using Custom Administrative Template Files |
|
|
622 | (1) |
|
Converting Administrative Templates Using ADMX Migrator |
|
|
623 | (2) |
|
Configuring Property Filters for Administrative Templates |
|
|
625 | (1) |
|
|
626 | (1) |
|
|
627 | (3) |
|
|
630 | (1) |
|
Lesson 21 Managing Group Policy Objects |
|
|
631 | (15) |
|
Managing Group Policy Objects |
|
|
631 | (10) |
|
Backing Up and Restoring GPOs |
|
|
632 | (4) |
|
|
636 | (2) |
|
Resetting the Default GPOs |
|
|
638 | (1) |
|
Delegating Group Policy Management |
|
|
639 | (2) |
|
|
641 | (1) |
|
|
642 | (3) |
|
|
645 | (1) |
|
Lesson 22 Configuring Group Policy Preferences |
|
|
646 | (24) |
|
Using Group Policy Preferences |
|
|
646 | (20) |
|
Configuring Preference Settings |
|
|
647 | (3) |
|
Configuring Windows Settings |
|
|
650 | (1) |
|
Configuring Network Drive Mappings |
|
|
650 | (1) |
|
Performing File and Folder Deployment |
|
|
651 | (3) |
|
Performing Shortcut Deployment |
|
|
654 | (1) |
|
Configuring Control Panel Settings |
|
|
655 | (1) |
|
Configuring Printer Settings |
|
|
656 | (2) |
|
Configuring Custom Registry Settings |
|
|
658 | (1) |
|
Configuring Power Options |
|
|
659 | (5) |
|
Configuring Internet Explorer Settings Configuring Item-Level Targeting |
|
|
664 | (2) |
|
|
666 | (1) |
|
|
666 | (3) |
|
|
669 | (1) |
Appendix A |
|
670 | (2) |
Index |
|
672 | |