Â
 Configuring and Managing File Systems
- Working with File Systems
- Managing Data Compression
- Securing Data by Using EFS
- Troubleshooting the Boot Process and Other System Issues.
 Examining the Windows 7 Boot Process
- Controlling System Settings During the Boot Process
- Changing Startup Behavior Using the Boot.ini File
- Using Advanced Boot Options to Troubleshoot Startup Problems
- Using the Recovery Console to Start the Computer
- Restoring a Computer to a Previous State
- Configuring TCP/IP Addressing and Name Resolution.
Configuring IP Addresses
- Troubleshooting IP Addresses
Determining TCP/IP Name Resolution Methods
Configuring a DNS and WINS Client
Connecting to a Remote Host
Configuring Microsoft Windows 7 to Operate in Microsoft Windows Networks - Examining Workgroups and User Accounts
Creating and Authenticating Local User Accounts
Configuring Local Security
Configuring Logon Options in a Workgroup
Configuring Networking Options in a Workgroup
Joining a Domain
Monitoring Resources and Performance - Determining System Information
Using Task Manager to Monitor System Performance
Using Performance and Maintenance Tools to Improve Performance
Monitoring Event Logs
Configuring Program Compatibility
Deploying and Managing Windows Server 2012.
 Windows Server 2012 Overview
- Overview of Windows Server 2012 Management
Installing Windows Server 2012
Post-Installation Configuration of Windows Server 2012
Introduction to Windows PowerShell
Implementing IPv4 - Overview of TCP/IP
Understanding IPv4 Addressing
Subnetting and Supernetting
Configuring and Troubleshooting IPv4
Implementing IPv6 - Overview of IPv6
IPv6 Addressing
Co
IPv6 Transition Technologies
existence with IPv6Implementing Local Storage
Overview of Storage
Managing Disks and Volumes
Implementing Storage Spaces
Configuring Encryption and Advanced Auditing - Encrypting Files by Using Encrypting File System
Configuring Advanced Auditing
Implementing File and Print Services - Securing Files and Folders
Protecting Shared Files and Folders by Using Shadow Copies
Configuring Network Printing
Configuring Shadow Copies
Implementing Advanced File Services - Configuring iSCSI Storage
Configuring BranchCache
Optimizing Storage Usage
Optimizing File Services.
 Overview of FSRM
- Using FSRM to Manage Quotas, File Screens, and Storage Reports
- Implementing Classification and File Management Tasks
- Overview of Distributed File System (DFS)
- Configuring DFS Namespaces
- Configuring and Troubleshooting Distributed File System Replication (DFS-R)
- Implementing Update Management.
Overview of WSUS
- Deploying Updates with WSUS
Monitoring Windows Server 2012 - Monitoring Tools
Using Performance Monitor
Monitoring Event Logs
Implementing Server Virtualization with Hyper-V - Overview of Virtualization Technologies
Implementing Hyper-V
Managing Virtual Machine Storage
Managing Virtual Networks
Implementing Dynamic Host Configuration Protocol - Installing a DHCP Server Role
Configuring DHCP Scopes
Managing a DHCP Database
Securing and Monitoring DHCP
Implementing Advanced Network Services - Configuring Advanced DHCP Features
Implementing IPAM
Configuring and Troubleshooting Domain Name System - Installing the DNS Server Role
Configuring the DNS Server Role
Configuring DNS Zones
Configuring DNS Zone Transfers
Configuring Advanced DNS Settings
Managing and Troubleshooting DNS
Introduction to Active Directory Domain Services.
Overview of AD DS
- Installing a Domain Controller
Managing Active Directory Domain Services Objects - Managing User Accounts
Managing Group Accounts - Managing Computer Accounts
Delegating Administration
Managing User and Service Accounts - Automating User Account Management
Configuring Password-Policy and User-Account Lockout Settings
Configuring Managed Service Accounts
Automating Active Directory Domain Services Administration - Using Command-line Tools for AD DS Administration
Using Windows PowerShell for AD DS Administration
Performing Bulk Operations with Windows PowerShell
Deploying and Maintaining Server Images - Overview of Windows Deployment Services
Implementing Deployment with Windows Deployment Services
Administering Windows Deployment Services
Maintaining Active Directory Domain Services - Overview of AD DS
Implementing Virtualized Domain Controllers
Implementing RODC
Administering AD DS
Managing the AD DS Database
Implementing Distributed Active Directory Domain Services Deployments - Overview of Distributed AD DS Deployments
Deploying a Distributed AD DS Environment
Configuring AD DS Trusts
Implementing Active Directory Domain Services Sites and Replication - Overview of AD DS Replication
Configuring AD DS Sites
Configuring and Monitoring AD DS Replication
Implementing Group Policy - Overview of Group Policy
Group Policy Processing
Implementing a Central Store for Administrative Templates
Implementing a Group Policy Infrastructure - Implementing and Administering Group Policy Objects (GPOs)
Group Policy Scope and Group Policy Processing
Troubleshooting the Application of GPOs
Managing User Desktops with Group Policy - Implementing Administrative Templates
Configuring Folder Redirection and Scripts
Configuring Group Policy Preferences
Managing Software with Group Policy
Securing Windows Servers Using Group Policy Objects - Windows Operating Systems Security Overview
Configuring Security Settings
Restricting Software
Configuring Windows Firewall with Advanced Security
Implementing Network Access Protection - Overview of Network Access Protection
Overview of NAP Enforcement Processes
Configuring NAP
Monitoring and Troubleshooting NAP
Configuring and Troubleshooting Remote Access - Configuring Network Access
Configuring Virtual Private Network (VPN) Access
Overview of Network Policies
Troubleshooting Routing and Remote Access
Configuring DirectAccess
Implementing Dynamic Access Control - Overview of Dynamic Access Control
Planning for Dynamic Access Control
Deploying Dynamic Access Control
Implementing Active Directory Certificate Services - PKI Overview
Deploying CAs
Deploying and Configuring CA Hierarchy
Deploying and Managing Certificate Templates
Implementing Certificate Distribution and Revocation
Managing Certificate Recovery
Implementing Active Directory Rights Management Services - AD RMS Overview
Deploying and Managing an AD RMS Infrastructure
Configuring AD RMS Content Protection
Configuring External Access to AD RMS
Implementing Active Directory Federation Services - Overview of AD FS
Deploying AD FS
Implementing AD FS for a Single Organization
Deploying AD FS in a B2B Federation Scenario
Implementing Network Load Balancing - Overview of NLB
Configuring an NLB ClusterDeploying and Managing Windows Server 2012
Deploying Windows Server 2012
Configuring Windows Server 2012 Server Core
Managing Servers
Using Windows PowerShell to Manage Servers
Implementing IPv4 - Identifying Appropriate Subnets
Troubleshooting IPv4
Implementing IPv6 - Configuring an IPv6 Network
Configuring an ISATAP Router
Implementing Local Storage - Installing and Configuring a New Disk
Resizing Volumes
Configuring a Redundant Storage Space
Configuring Encryption and Advanced Auditing - Encrypting and Recovering Files
Configuring Advanced Auditing
Implementing File and Print Services - Creating and Configuring a File Share
Configuring Shadow Copies
Creating and Configure a Printer Pool
Implementing Advanced File Services - Configuring iSCSI Storage
Configuring the File Classification Infrastructure
Implementing BranchCache - Configuring the Main Office Servers for BranchCache
Configuring the Branch Office Servers for BranchCache
Configuring Client Computers for BranchCache
Monitoring BranchCache
Configuring Quotas and File Screening Using FSRM - Configuring FSRM Quotas
Configuring File Screening and Storage Reports
Implementing DFS - Installing the DFS Role Service
Configuring a DFS Namespace
Configuring DFS-R
Implementing Update Management - Implementing the WSUS Server Role
Configuring Update Settings
Approving and Deploying an Update by Using WSUS
Monitoring Windows Server 2012 - Establishing a Performance Baseline
Identifying the Source of a Performance Problem
Viewing and Configuring Centralized Event Logs
Implementing Server Virtualization with Hyper-V - Installing the Hyper V Role onto a Server
Configuring Virtual Networking
Creating and Configuring a Virtual Machine
Using Virtual Machine Snapshots
Implementing DHCP - Implementing DHCP
Implementing a DHCP Relay Agent (Optional Exercise)
Implementing Advanced Network Services - Configuring Advanced DHCP Settings
Configuring IPAM
Configuring and Troubleshooting DNS - Installing and Configuring DNS
Creating Host Records in DNS
Managing the DNS Server Cache
Configuring DNS Resource Records
Configuring DNS Conditional Forwarding
Configuring DNS Conditional Forwarding
Configuring Advanced DNS Settings
Troubleshooting DNS
Installing Domain Controllers - Installing a Domain Controller
Installing a Domain Controller by Using IFM
Managing Active Directory Domain Services Objects - Delegating Administration for a Branch Office
Creating and Configuring User Accounts in AD DS
Managing Computer Objects in AD DS
Managing User and Service Accounts - Configuring Password-Policy and Account-Lockout Settings
Creating and Associating a Managed Service Account
Automating AD DS Administration by Using Windows PowerShell - Creating User Accounts and Groups by Using Windows PowerShell
Using Windows PowerShell to Create User Accounts in Bulk
Using Windows PowerShell to Modify User Accounts in Bulk
Using Windows Deployment Services to Deploy Windows Server 2012 - Installing and Configuring Windows Deployment Services
Creating Operating System Images with Windows Deployment Services
Configuring Custom Computer Naming
Deploying Images with Windows Deployment Services
Maintaining AD DS - Installing and Configuring a RODC
Configuring AD DS snapshots
Configuring the Active Directory Recycle Bin
Implementing Complex AD DS Deployments - Implementing Child Domains in AD DS
Implementing Forest Trusts
Implementing AD DS Sites and Replication - Modifying the Default Site
Creating Additional Sites and Subnets
Configuring AD DS Replication
Implementing Group Policy - Configuring a Central Store
Creating GPOs
Implementing a Group Policy Infrastructure - Creating and Configuring GPOs
Managing GPO Scope
Verifying GPO Application
Managing GPOs
Managing User Desktops with Group Policy - Implementing Settings by Using Group Policy Preferences
Configuring Folder Redirection
Increasing Security for Server Resources - Using Group Policy to Secure Member Servers
Auditing File System Access
Auditing Domain Logons
Configuring AppLocker and Windows Firewall - Configuring AppLocker Policies
Configuring Windows Firewall
Implementing NAP - Configuring NAP Components
Configuring VPN Access
Configuring the Client Settings to Support NAP
Configuring Remote Access - Configuring a VPS Server
Configuring VPN Clients
Configuring DirectAccess - Configuring the DirectAccess Infrastructure
Configuring the DirectAccess Clients
Verifying the DirectAccess Configuration
Implementing Dynamic Access Control - Planning the Dynamic Access Control Implementation
Configuring User and Device Claims
Configuring Resource Property Definitions
Configuring Central Access Rules and Central Access Policies
Validating and Remediating Dynamic Access Control
Implementing New Resource Policies
Deploying and Managing Certificates - Configuring Certificate Templates
Configuring Certificate Enrollment
Configuring Certificate Revocation
Configuring Key Recovery
Implementing AD RMS - Installing and Configuring AD RMS
Configuring AD RMS Templates
Implementing the AD RMS Trust Policies
Verifying the AD RMS Deployment
Implementing AD FS - Configuring AD FS Prerequisites
Installing and Configuring AD FS
Configuring AD FS for a Single Organization
Configuring AD FS for Federated Business Partners
Implementing Network Load Balancing - Implementing a Network Load Balancing Cluster
Configuring and Managing the NLB Cluster
Validating High Availability for the NLB Cluste
Planning an NLB Implementation