Atnaujinkite slapukų nuostatas

70-411 Administering Windows Server 2012 with MOAC Labs Online Set [Minkštas viršelis]

  • Formatas: Paperback / softback, 721 pages, aukštis x plotis x storis: 274x211x19 mm, weight: 1325 g
  • Serija: Microsoft Official Academic Course Series
  • Išleidimo metai: 26-Jun-2025
  • Leidėjas: John Wiley & Sons Inc
  • ISBN-10: 1118667085
  • ISBN-13: 9781118667088
  • Formatas: Paperback / softback, 721 pages, aukštis x plotis x storis: 274x211x19 mm, weight: 1325 g
  • Serija: Microsoft Official Academic Course Series
  • Išleidimo metai: 26-Jun-2025
  • Leidėjas: John Wiley & Sons Inc
  • ISBN-10: 1118667085
  • ISBN-13: 9781118667088
This course in the Microsoft Official Academic Course program prepares students for exam 70-411, Administering Windows Server 2012.
Lesson 1 Deploying and Managing Server Images
1(41)
Using Windows Deployment Services
2(36)
Installing the Windows Deployment Services Role
2(3)
Configuring the WDS Server
5(1)
Performing the Initial Configuration of WDS
5(4)
Configuring the WDS Properties
9(6)
Starting WDS
15(1)
Configuring the Custom DHCP Option
15(2)
Configuring and Managing Boot, Install, and Discover Images
17(1)
Adding Boot Images
18(2)
Adding Image Files
20(1)
Creating an Image File with WDS
21(2)
Creating a Discover Image
23(2)
Using Wdsutil
25(2)
Performing an Unattended Installation
27(7)
Updating Images with Patches, Hotfixes, and Drivers
34(1)
Installing Features for Offline Images
35(1)
Deploying Driver Packages with an Image
36(2)
Skill Summary
38(1)
Knowledge Assessment
38(3)
Business Case Scenarios
41(1)
Lesson 2 Implementing Patch Management
42(43)
Understanding Windows Updates and Automatic Updates
43(4)
Deploying Windows Server Update Services (WSUS)
47(33)
Installing WSUS
49(3)
Configuring WSUS
52(7)
Configuring WSUS Synchronization
59(5)
Configuring WSUS Computer Groups
64(4)
Configuring Group Policies for Updates
68(1)
Configuring Client-Side Targeting
69(2)
Approving Updates
71(4)
Viewing Reports
75(3)
Administrating WSUS with Commands
78(1)
Troubleshooting Problems with Installing Updates
79(1)
Understanding System Center Configuration Manager (SCCM)
80(1)
Skill Summary
80(1)
Knowledge Assessment
81(3)
Business Case Scenarios
84(1)
Lesson 3 Monitoring Servers
85(48)
Introducing the Microsoft Management Console (MMC)
86(7)
Using Server Manager
88(1)
Using Computer Management
89(1)
Using the Services Console
90(3)
Using Event Viewer
93(9)
Understanding Logs and Events
94(2)
Filtering Events
96(1)
Adding a Task to an Event
96(3)
Configuring Event Subscriptions
99(3)
Using Reliability Monitor
102(1)
Managing Performance
103(17)
Using Task Manager
104(5)
Using Resource Monitor
109(2)
Using Performance Monitor
111(3)
Using Common Performance Counters
114(1)
Configuring Data Collector Sets (DCS)
114(3)
Configuring Performance Alerts
117(3)
Monitoring the Network
120(7)
Using the netstat Command
121(1)
Using Protocol Analyzers
121(6)
Monitoring Virtual Machines (VMs)
127(1)
Skill Summary
128(1)
Knowledge Assessment
129(3)
Business Case Scenarios
132(1)
Lesson 4 Configuring Distributed File System (DFS)
133(32)
Using Distributed File System
133(27)
Installing and Configuring DFS Namespace
134(1)
Installing DFS Namespace
135(1)
Configuring DFS Namespaces
136(6)
Managing Referrals
142(3)
Managing DFS Security
145(1)
Installing and Configuring DFS Replication
145(1)
Installing DFS Replication
146(1)
Configuring DFS Replication Targets
147(7)
Scheduling Replication
154(1)
Configuring Remote Differential Compression
155(2)
Configuring Staging
157(2)
Configuring Fault Tolerance Using DFS
159(1)
Skill Summary
160(1)
Knowledge Assessment
160(4)
Business Case Scenarios
164(1)
Lesson 5 Configuring File Server Resource Manager (FSRM)
165(23)
Using File Server Resource Manager
165(18)
Installing File Server Resource Manager
166(1)
Using Quotas
167(1)
Creating Quotas
167(5)
Changing Quotas Templates
172(1)
Monitoring Quota Use
173(1)
Managing Files with File Screening
174(1)
Creating File Groups
174(1)
Creating a File Screen
175(3)
Creating a File Screen Exception
178(1)
Creating a File Screen Template
178(1)
Using Storage Reports
179(3)
Enabling SMTP
182(1)
Skill Summary
183(1)
Knowledge Assessment
184(3)
Business Case Scenarios
187(1)
Lesson 6 Configuring File Services and Disk Encryption
188(30)
Securing Files
188(26)
Encrypting Files with EFS
189(1)
Configuring EFS
190(2)
Using the Cipher Command
192(1)
Sharing Files Protected with EFS with Others
193(1)
Configuring EFS with Group Policies
194(2)
Configuring the EFS Recovery Agent
196(1)
Managing EFS Certificates
197(4)
Encrypting Files with BitLocker
201(2)
Configuring BitLocker Encryption
203(6)
Configuring BitLocker To Go
209(1)
BitLocker Pre-Provisioning
210(1)
Configuring BitLocker Policies
210(2)
Managing BitLocker Certificates
212(1)
Configuring the Network Unlock Feature
212(2)
Skill Summary
214(1)
Knowledge Assessment
214(3)
Business Case Scenarios
217(1)
Lesson 7 Configuring Advanced Audit Policies
218(37)
Enabling and Configuring Auditing
218(32)
Implementing Auditing Using Group Policies
219(1)
Implementing an Audit Policy
220(1)
Implementing Object Access Auditing Using Group Policies
221(6)
Implementing Advanced Audit Policy Settings
227(1)
Implementing Advanced Audit Policy Settings Using Group Policies
227(14)
Removing Advanced Audit Policy Configuration
241(1)
Implementing Auditing Using AuditPol.exe
241(2)
Viewing Audit Events
243(1)
Creating Expression-Based Audit Policies
244(5)
Creating Removable Device Audit Policies
249(1)
Skill Summary
250(1)
Knowledge Assessment
251(3)
Business Case Scenarios
254(1)
Lesson 8 Configuring DNS Zones
255(31)
Understanding DNS
256(4)
Understanding DNS Names and Zones
257(2)
Understanding the Address Resolution Mechanism
259(1)
Configuring and Managing DNS Zones
260(21)
Installing DNS
261(2)
Configuring Primary and Secondary Zones
263(6)
Configuring Active Directory-Integrated Zones
269(2)
Configuring Zone Delegation
271(2)
Configuring Stub Zones
273(1)
Configuring Caching-Only Servers
274(1)
Configuring Forwarding and Conditional Forwarding
274(4)
Configuring Zone Transfers
278(1)
Understanding Full and Incremental Transfers
278(1)
Configuring Notify Settings
279(2)
Using the DNSCMD Command to Manage Zones
281(1)
Skill Summary
282(1)
Knowledge Assessment
283(2)
Business Case Scenarios
285(1)
Lesson 9 Configuring DNS Records
286(23)
Configuring DNS Record Types
287(13)
Creating and Configuring DNS Resource Records
287(1)
Start of Authority (SOA) Records
288(1)
Name Server (NS) Records
289(1)
Host (A and AAAA) Records
290(1)
Canonical Name (CNAME) Records
290(1)
Pointer (PTR) Records
291(1)
Mail Exchanger (MX) Records
291(1)
Service Location (SRV) Records
292(1)
Configuring Record Options
293(3)
Configuring Round Robin
296(1)
Configuring Secure Dynamic Updates
297(1)
Configuring Zone Scavenging
298(2)
Using the DNSCMD Command to Manage Resource Records
300(1)
Troubleshooting DNS Problems
300(4)
Skill Summary
304(1)
Knowledge Assessment
305(3)
Business Case Scenarios
308(1)
Lesson 10 Configuring VPN and Routing
309(39)
The Remote Access Role
310(33)
Installing and Configuring the Remote Access Role
310(1)
Installing Routing and Remote Access
310(2)
Configuring Routing and Remote Access
312(2)
Configuring RRAS for Dial-Up Remote Access
314(5)
Configuring VPN Settings
319(2)
Configuring the VPN Connection on the Server
321(4)
Creating a VPN Connection on a Client
325(4)
VPN Reconnect
329(1)
Configuring Split Tunneling
330(1)
Configuring Remote Dial-In Settings for Users
331(1)
Troubleshooting Remote Access Problems
332(2)
Implementing NAT
334(1)
Disabling Routing and Remote Access
335(1)
Configuring Routing
336(1)
Managing Static Routes
337(2)
Configuring RIP
339(3)
Configuring Demand-Dial Routing
342(1)
Configuring the DHCP Relay Agent
342(1)
Skill Summary
343(1)
Knowledge Assessment
344(3)
Business Case Scenarios
347(1)
Lesson 11 Configuring Direct Access
348(35)
Understanding DirectAccess
348(29)
Looking at the DirectAccess Connection Process
349(1)
Understanding DirectAccess Requirements
350(1)
Understanding DirectAccess Server Requirements
350(1)
Understanding DirectAccess Client Requirements
351(1)
Running the DirectAccess Getting Started Wizard
351(3)
Running the Remote Access Setup Wizard
354(3)
Implementing Client Configuration
357(2)
Implementing DirectAccess Server
359(3)
Implementing Infrastructure Servers
362(3)
Configuring the Application Servers
365(1)
Preparing for DirectAccess Deployment
366(1)
Configuring DNS for DirectAccess
366(1)
Configuring Certificates for DirectAccess
366(10)
Troubleshooting DirectAccess
376(1)
Skill Summary
377(1)
Knowledge Assessment
378(4)
Business Case Scenarios
382(1)
Lesson 12 Configuring a Network Policy Server
383(32)
Configuring a Network Policy Server Infrastructure
383(28)
Installing and Configuring Network Policy Server
385(2)
Configuring Multiple RADIUS Server Infrastructures
387(4)
Configuring RADIUS Clients
391(10)
Managing RADIUS Templates
401(2)
Configuring RADIUS Accounting
403(4)
Understanding NPS Authentication Methods
407(1)
Using Password-Based Authentication
407(1)
Using Certificates for Authentication
408(3)
Skill Summary
411(1)
Knowledge Assessment
411(3)
Business Case Scenarios
414(1)
Lesson 13 Configuring NPS Policies
415(25)
Managing NPS Policies
415(20)
Configuring Connection Request Policies
416(8)
Configuring Network Policies
424(6)
Multilink and Bandwidth Allocation
430(1)
IP Filters
430(1)
Encryption
431(1)
IP Addressing
431(1)
Managing NPS Templates
432(1)
Exporting and Importing Templates
432(2)
Exporting and Importing the NPS Configuration Including NPS Policies
434(1)
Skill Summary
435(1)
Knowledge Assessment
436(3)
Business Case Scenarios
439(1)
Lesson 14 Configuring Network Access Protection (NAP)
440(36)
Using Network Access Protection (NAP)
441(30)
Installing Network Access Protection
443(3)
Configuring NAP Enforcement
446(1)
Configuring NAP Enforcement for DHCP
446(14)
Configuring NAP Enforcement for VPN
460(3)
Configuring System Health Validators
463(2)
Configuring Health Policies
465(3)
Configuring Isolation and Remediation
468(1)
Configuring NAP Client Settings
469(2)
Skill Summary
471(1)
Knowledge Assessment
471(4)
Business Case Scenarios
475(1)
Lesson 15 Configuring Service Authentication
476(18)
Configuring Service Authentication
477(6)
Understanding NTLM Authentication
477(1)
Managing Kerberos
477(2)
Managing Service Principal Names
479(3)
Configuring Kerberos Delegation
482(1)
Managing Service Accounts
483(6)
Creating and Configuring Service Accounts
483(2)
Creating and Configuring Managed Service Accounts
485(3)
Creating and Configuring Group Managed Service Accounts
488(1)
Skill Summary
489(1)
Knowledge Assessment
489(4)
Business Case Scenarios
493(1)
Lesson 16 Configuring Domain Controllers
494(28)
Understanding Domain Controllers
494(14)
Managing Global Catalogs and Configuring Universal Group Membership Caching
496(3)
Managing Operations Masters
499(2)
Viewing the Operations Masters Role Holders
501(3)
Transferring the Operations Masters Role
504(2)
Seizing the Operations Masters Role
506(2)
Installing and Configuring an RODC
508(4)
Cloning a Domain Controller
512(5)
Skill Summary
517(1)
Knowledge Assessment
518(3)
Business Case Scenarios
521(1)
Lesson 17 Maintaining Active Directory
522(33)
Automating User Account Management
523(2)
Backing Up and Restoring Active Directory
525(21)
Understanding the Active Directory Database, SYSVOL, and System State
525(2)
Using Windows Backup
527(1)
Performing a Backup of Active Directory and SYSVOL
528(5)
Performing an Active Directory Restore
533(4)
Configuring Active Directory Snapshots
537(3)
Performing Object- and Container-Level Recovery
540(6)
Managing Active Directory Offline
546(1)
Optimizing an Active Directory Database
547(2)
Cleaning Up Metadata
549(1)
Skill Summary
550(1)
Knowledge Assessment
551(3)
Business Case Scenarios
554(1)
Lesson 18 Configuring Account Policies
555(17)
Working with Account Policies
555(13)
Configuring Domain User Password Policy
557(1)
Understanding Strong Passwords
557(1)
Configuring Password Policy Settings
558(2)
Configuring Account Lockout Settings
560(2)
Configuring and Applying Password Settings Objects
562(3)
Configuring Local User Password Policy
565(1)
Delegating Password Settings Management
565(3)
Skill Summary
568(1)
Knowledge Assessment
568(3)
Business Case Scenarios
571(1)
Lesson 19 Configuring Group Policy Processing
572(29)
Understanding group policy processing
572(24)
Configuring Processing Order and Precedence
573(1)
Understanding Group Policy Inheritance
573(3)
Managing Group Policy Links
576(1)
Using Filtering with Group Policies
577(1)
Configuring Blocking of Inheritance
578(1)
Configuring Enforced Policies
579(2)
Configuring Security Filtering and WMI Filtering
581(1)
Using Security Filtering
581(2)
Using WMI Filtering
583(3)
Configuring Loopback Processing
586(1)
Configuring Client-Side Extension Behavior
587(2)
Looking at GPOs and Disconnected Computers
589(1)
Configuring and Managing Slow-Link Processing
589(1)
Troubleshooting GPOs
589(7)
Skill Summary
596(1)
Knowledge Assessment
596(4)
Business Case Scenarios
600(1)
Lesson 20 Configuring Group Policy Settings
601(30)
Configuring Group Policy Settings
602(24)
Performing Software Installation Using Group Policies
603(1)
Assigning or Publishing a Package
604(3)
Redeploying an Application
607(1)
Uninstalling a Package
607(1)
Using Folder Redirection
608(4)
Using Scripts with Group Policies
612(3)
Using Administrative Templates
615(1)
Managing Administrative Templates
615(2)
Creating a Central Store
617
Using Security Templates
518(104)
Using Custom Administrative Template Files
622(1)
Converting Administrative Templates Using ADMX Migrator
623(2)
Configuring Property Filters for Administrative Templates
625(1)
Skill Summary
626(1)
Knowledge Assessment
627(3)
Business Case Scenarios
630(1)
Lesson 21 Managing Group Policy Objects
631(15)
Managing Group Policy Objects
631(10)
Backing Up and Restoring GPOs
632(4)
Using a Migration Table
636(2)
Resetting the Default GPOs
638(1)
Delegating Group Policy Management
639(2)
Skill Summary
641(1)
Knowledge Assessment
642(3)
Business Case Scenarios
645(1)
Lesson 22 Configuring Group Policy Preferences
646(24)
Using Group Policy Preferences
646(20)
Configuring Preference Settings
647(3)
Configuring Windows Settings
650(1)
Configuring Network Drive Mappings
650(1)
Performing File and Folder Deployment
651(3)
Performing Shortcut Deployment
654(1)
Configuring Control Panel Settings
655(1)
Configuring Printer Settings
656(2)
Configuring Custom Registry Settings
658(1)
Configuring Power Options
659(5)
Configuring Internet Explorer Settings Configuring Item-Level Targeting
664(2)
Skill Summary
666(1)
Knowledge Assessment
666(3)
Business Case Scenarios
669(1)
Appendix A 670(2)
Index 672
The Microsoft Official Academic Course (MOAC) Program is the official product for Microsoft Programs in higher education. These learning products are created especially for the academic market and combine the business world focus and market research of Microsoft with 200 years of successful higher education publishing from Wiley. The program is based upon the same curriculum as the Microsoft IT Certifications to build the skills students need to succeed at work and the preparation they need to validate those skills and get the jobs they seek. All the support instructors need to deliver great courses on Microsoft software is in the program. Student copies of the textbooks include the trial software in select markets and student files for completing homework assignments. Microsoft Updates will bring you the latest information on new products and curriculums and are a part of the program. MOAC is a great way for instructors to get ready to teach and for students to get ready for work.