Configuring and Managing File Systems

  1. Working with File Systems
  2. Managing Data Compression
  3. Securing Data by Using EFS
  4. Troubleshooting the Boot Process and Other System Issues.

 Examining the Windows 7 Boot Process

  1. Controlling System Settings During the Boot Process
  2. Changing Startup Behavior Using the Boot.ini File
  3. Using Advanced Boot Options to Troubleshoot Startup Problems
  4. Using the Recovery Console to Start the Computer
  5. Restoring a Computer to a Previous State
  6. Configuring TCP/IP Addressing and Name Resolution.

Configuring IP Addresses

  1. Troubleshooting IP Addresses
    Determining TCP/IP Name Resolution Methods
    Configuring a DNS and WINS Client
    Connecting to a Remote Host
    Configuring Microsoft Windows 7 to Operate in Microsoft Windows Networks
  2. Examining Workgroups and User Accounts
    Creating and Authenticating Local User Accounts
    Configuring Local Security
    Configuring Logon Options in a Workgroup
    Configuring Networking Options in a Workgroup
    Joining a Domain
    Monitoring Resources and Performance
  3. Determining System Information
    Using Task Manager to Monitor System Performance
    Using Performance and Maintenance Tools to Improve Performance
    Monitoring Event Logs
    Configuring Program Compatibility
    Deploying and Managing Windows Server 2012.

 Windows Server 2012 Overview

  1. Overview of Windows Server 2012 Management
    Installing Windows Server 2012
    Post-Installation Configuration of Windows Server 2012
    Introduction to Windows PowerShell
    Implementing IPv4
  2. Overview of TCP/IP
    Understanding IPv4 Addressing
    Subnetting and Supernetting
    Configuring and Troubleshooting IPv4
    Implementing IPv6
  3. Overview of IPv6
    IPv6 Addressing
    Co
    IPv6 Transition Technologies
    existence with IPv6Implementing Local Storage
    Overview of Storage
    Managing Disks and Volumes
    Implementing Storage Spaces
    Configuring Encryption and Advanced Auditing
  4. Encrypting Files by Using Encrypting File System
    Configuring Advanced Auditing
    Implementing File and Print Services
  5. Securing Files and Folders
    Protecting Shared Files and Folders by Using Shadow Copies
    Configuring Network Printing
    Configuring Shadow Copies
    Implementing Advanced File Services
  6. Configuring iSCSI Storage
    Configuring BranchCache
    Optimizing Storage Usage
    Optimizing File Services.

 Overview of FSRM

  • Using FSRM to Manage Quotas, File Screens, and Storage Reports
  • Implementing Classification and File Management Tasks
  • Overview of Distributed File System (DFS)
  • Configuring DFS Namespaces
  • Configuring and Troubleshooting Distributed File System Replication (DFS-R)
  • Implementing Update Management.

Overview of WSUS

  1. Deploying Updates with WSUS
    Monitoring Windows Server 2012
  2. Monitoring Tools
    Using Performance Monitor
    Monitoring Event Logs
    Implementing Server Virtualization with Hyper-V
  3. Overview of Virtualization Technologies
    Implementing Hyper-V
    Managing Virtual Machine Storage
    Managing Virtual Networks
    Implementing Dynamic Host Configuration Protocol
  4. Installing a DHCP Server Role
    Configuring DHCP Scopes
    Managing a DHCP Database
    Securing and Monitoring DHCP
    Implementing Advanced Network Services
  5. Configuring Advanced DHCP Features
    Implementing IPAM
    Configuring and Troubleshooting Domain Name System
  6. Installing the DNS Server Role
    Configuring the DNS Server Role
    Configuring DNS Zones
    Configuring DNS Zone Transfers
    Configuring Advanced DNS Settings
    Managing and Troubleshooting DNS
    Introduction to Active Directory Domain Services.

Overview of AD DS

  1. Installing a Domain Controller
    Managing Active Directory Domain Services Objects
  2. Managing User Accounts
    Managing Group Accounts
  3. Managing Computer Accounts
    Delegating Administration
    Managing User and Service Accounts
  4. Automating User Account Management
    Configuring Password-Policy and User-Account Lockout Settings
    Configuring Managed Service Accounts
    Automating Active Directory Domain Services Administration
  5. Using Command-line Tools for AD DS Administration
    Using Windows PowerShell for AD DS Administration
    Performing Bulk Operations with Windows PowerShell
    Deploying and Maintaining Server Images
  6. Overview of Windows Deployment Services
    Implementing Deployment with Windows Deployment Services
    Administering Windows Deployment Services
    Maintaining Active Directory Domain Services
  7. Overview of AD DS
    Implementing Virtualized Domain Controllers
    Implementing RODC
    Administering AD DS
    Managing the AD DS Database
    Implementing Distributed Active Directory Domain Services Deployments
  8. Overview of Distributed AD DS Deployments
    Deploying a Distributed AD DS Environment
    Configuring AD DS Trusts
    Implementing Active Directory Domain Services Sites and Replication
  9. Overview of AD DS Replication
    Configuring AD DS Sites
    Configuring and Monitoring AD DS Replication
    Implementing Group Policy
  10. Overview of Group Policy
    Group Policy Processing
    Implementing a Central Store for Administrative Templates
    Implementing a Group Policy Infrastructure
  11. Implementing and Administering Group Policy Objects (GPOs)
    Group Policy Scope and Group Policy Processing
    Troubleshooting the Application of GPOs
    Managing User Desktops with Group Policy
  12. Implementing Administrative Templates
    Configuring Folder Redirection and Scripts
    Configuring Group Policy Preferences
    Managing Software with Group Policy
    Securing Windows Servers Using Group Policy Objects
  13. Windows Operating Systems Security Overview
    Configuring Security Settings
    Restricting Software
    Configuring Windows Firewall with Advanced Security
    Implementing Network Access Protection
  14. Overview of Network Access Protection
    Overview of NAP Enforcement Processes
    Configuring NAP
    Monitoring and Troubleshooting NAP
    Configuring and Troubleshooting Remote Access
  15. Configuring Network Access
    Configuring Virtual Private Network (VPN) Access
    Overview of Network Policies
    Troubleshooting Routing and Remote Access
    Configuring DirectAccess
    Implementing Dynamic Access Control
  16. Overview of Dynamic Access Control
    Planning for Dynamic Access Control
    Deploying Dynamic Access Control
    Implementing Active Directory Certificate Services
  17. PKI Overview
    Deploying CAs
    Deploying and Configuring CA Hierarchy
    Deploying and Managing Certificate Templates
    Implementing Certificate Distribution and Revocation
    Managing Certificate Recovery
    Implementing Active Directory Rights Management Services
  18. AD RMS Overview
    Deploying and Managing an AD RMS Infrastructure
    Configuring AD RMS Content Protection
    Configuring External Access to AD RMS
    Implementing Active Directory Federation Services
  19. Overview of AD FS
    Deploying AD FS
    Implementing AD FS for a Single Organization
    Deploying AD FS in a B2B Federation Scenario
    Implementing Network Load Balancing
  20. Overview of NLB
    Configuring an NLB ClusterDeploying and Managing Windows Server 2012
    Deploying Windows Server 2012
    Configuring Windows Server 2012 Server Core
    Managing Servers
    Using Windows PowerShell to Manage Servers
    Implementing IPv4
  21. Identifying Appropriate Subnets
    Troubleshooting IPv4
    Implementing IPv6
  22. Configuring an IPv6 Network
    Configuring an ISATAP Router
    Implementing Local Storage
  23. Installing and Configuring a New Disk
    Resizing Volumes
    Configuring a Redundant Storage Space
    Configuring Encryption and Advanced Auditing
  24. Encrypting and Recovering Files
    Configuring Advanced Auditing
    Implementing File and Print Services
  25. Creating and Configuring a File Share
    Configuring Shadow Copies
    Creating and Configure a Printer Pool
    Implementing Advanced File Services
  26. Configuring iSCSI Storage
    Configuring the File Classification Infrastructure
    Implementing BranchCache
  27. Configuring the Main Office Servers for BranchCache
    Configuring the Branch Office Servers for BranchCache
    Configuring Client Computers for BranchCache
    Monitoring BranchCache
    Configuring Quotas and File Screening Using FSRM
  28. Configuring FSRM Quotas
    Configuring File Screening and Storage Reports
    Implementing DFS
  29. Installing the DFS Role Service
    Configuring a DFS Namespace
    Configuring DFS-R
    Implementing Update Management
  30. Implementing the WSUS Server Role
    Configuring Update Settings
    Approving and Deploying an Update by Using WSUS
    Monitoring Windows Server 2012
  31. Establishing a Performance Baseline
    Identifying the Source of a Performance Problem
    Viewing and Configuring Centralized Event Logs
    Implementing Server Virtualization with Hyper-V
  32. Installing the Hyper V Role onto a Server
    Configuring Virtual Networking
    Creating and Configuring a Virtual Machine
    Using Virtual Machine Snapshots
    Implementing DHCP
  33. Implementing DHCP
    Implementing a DHCP Relay Agent (Optional Exercise)
    Implementing Advanced Network Services
  34. Configuring Advanced DHCP Settings
    Configuring IPAM
    Configuring and Troubleshooting DNS
  35. Installing and Configuring DNS
    Creating Host Records in DNS
    Managing the DNS Server Cache
    Configuring DNS Resource Records
    Configuring DNS Conditional Forwarding
    Configuring DNS Conditional Forwarding
    Configuring Advanced DNS Settings
    Troubleshooting DNS
    Installing Domain Controllers
  36. Installing a Domain Controller
    Installing a Domain Controller by Using IFM
    Managing Active Directory Domain Services Objects
  37. Delegating Administration for a Branch Office
    Creating and Configuring User Accounts in AD DS
    Managing Computer Objects in AD DS
    Managing User and Service Accounts
  38. Configuring Password-Policy and Account-Lockout Settings
    Creating and Associating a Managed Service Account
    Automating AD DS Administration by Using Windows PowerShell
  39. Creating User Accounts and Groups by Using Windows PowerShell
    Using Windows PowerShell to Create User Accounts in Bulk
    Using Windows PowerShell to Modify User Accounts in Bulk
    Using Windows Deployment Services to Deploy Windows Server 2012
  40. Installing and Configuring Windows Deployment Services
    Creating Operating System Images with Windows Deployment Services
    Configuring Custom Computer Naming
    Deploying Images with Windows Deployment Services
    Maintaining AD DS
  41. Installing and Configuring a RODC
    Configuring AD DS snapshots
    Configuring the Active Directory Recycle Bin
    Implementing Complex AD DS Deployments
  42. Implementing Child Domains in AD DS
    Implementing Forest Trusts
    Implementing AD DS Sites and Replication
  43. Modifying the Default Site
    Creating Additional Sites and Subnets
    Configuring AD DS Replication
    Implementing Group Policy
  44. Configuring a Central Store
    Creating GPOs
    Implementing a Group Policy Infrastructure
  45. Creating and Configuring GPOs
    Managing GPO Scope
    Verifying GPO Application
    Managing GPOs
    Managing User Desktops with Group Policy
  46. Implementing Settings by Using Group Policy Preferences
    Configuring Folder Redirection
    Increasing Security for Server Resources
  47. Using Group Policy to Secure Member Servers
    Auditing File System Access
    Auditing Domain Logons
    Configuring AppLocker and Windows Firewall
  48. Configuring AppLocker Policies
    Configuring Windows Firewall
    Implementing NAP
  49. Configuring NAP Components
    Configuring VPN Access
    Configuring the Client Settings to Support NAP
    Configuring Remote Access
  50. Configuring a VPS Server
    Configuring VPN Clients
    Configuring DirectAccess
  51. Configuring the DirectAccess Infrastructure
    Configuring the DirectAccess Clients
    Verifying the DirectAccess Configuration
    Implementing Dynamic Access Control
  52. Planning the Dynamic Access Control Implementation
    Configuring User and Device Claims
    Configuring Resource Property Definitions
    Configuring Central Access Rules and Central Access Policies
    Validating and Remediating Dynamic Access Control
    Implementing New Resource Policies
    Deploying and Managing Certificates
  53. Configuring Certificate Templates
    Configuring Certificate Enrollment
    Configuring Certificate Revocation
    Configuring Key Recovery
    Implementing AD RMS
  54. Installing and Configuring AD RMS
    Configuring AD RMS Templates
    Implementing the AD RMS Trust Policies
    Verifying the AD RMS Deployment
    Implementing AD FS
  55. Configuring AD FS Prerequisites
    Installing and Configuring AD FS
    Configuring AD FS for a Single Organization
    Configuring AD FS for Federated Business Partners
    Implementing Network Load Balancing
  56. Implementing a Network Load Balancing Cluster
    Configuring and Managing the NLB Cluster
    Validating High Availability for the NLB Cluste
    Planning an NLB Implementation