20411: administering windows server® 2012
TRANSCRIPT
Page
s 1
Page
s 1
20411: Administering Windows Server® 2012
Course Overview
TThis course is part two in a series of three courses that provides the skills and knowledge on how to imple-ment a core Windows Serv-er 2012 infrastructure in an enterprise environment. In
this Microsoft Official Course you will be thought how to implementing, managing, maintaining and provision-ing services and infrastruc-ture in a Windows Server 2012 environment.
What you will learn.
This course will teach you how to:
• Configure and Trouble-shoot Domain Name System• Maintain Active Direc-tory Domain Services• Manage User and Ser-vice Accounts• Implement Group Poli-cy Infrastructure• Manage User Desktops
Page
s 2
Who is this course for?
This course is for Information Technology (IT) Profession-als with hands on experience working in a Windows server 2008 or Windows Server 2012 environment who wish to ac-quire the skills and knowledge necessary to be able to man-age and maintain the core in-frastructure required for a Win-dows Server 2012 and Windows Server 2012 R2 environment.
Requirement
• Knowledge and skills con-cerning the initial implemen-tation and configuration of core Windows Server services including Active Directory Do-main Services (AD DS), Net-working Services and Microsoft Hyper-V.
Module 1: Configuring and Trou-bleshooting Domain Name Sys-tem
using Group Policy• Install, Configure and Troubleshoot Network Policy Server• Implement Network Ac-cess Protection• Implement Remote Ac-cess• Optimize File Services• Configure Encryption and Advanced Auditing
Page
s 3
Lessons • Configuring the DNS Server Role• Configuring DNS Zones• Configuring DNS Zone Transfers• Managing and Trouble-shooting DNS
Lab : Configuring and Trouble-shooting DNSAfter completing this module, students will be able to:• Install and configure the DNS server role.• Create and configure DNS
zones.• Configure DNS zone transfers.• Manage and troubleshoot DNS.
Module 2: Maintaining Active Directory Domain Services
Page
s 4
Lessons • Overview of AD DS• Implementing Virtualized Domain Controllers• Implementing RODCs• Administering AD DS• Managing the AD DS Da-tabase
Lab : Maintaining AD DSAfter completing this module, students will be able to:• Implement virtualized domain controllers.• Implement RODCs.• Administer AD DS.• Manage the AD DS data-base
Module 3: Managing User and Service AccountsLessons • Configuring Password Policy and User Account Lock-out Settings• Configuring Managed Service Accounts
Lab : Managing User and Ser-vice AccountsAfter completing this module,
students will be able to:• Configure password pol-icy and user account lockout settings.• Configure managed ser-vice accounts.
Module 4: Implementing a Group Policy InfrastructureLessons • Introducing Group Policy• Implementing and Ad-ministering GPOs• Group Policy Scope and Group Policy Processing• Troubleshooting the Ap-plication of GPOsLab : Implementing a Group Policy InfrastructureAfter completing this module, students will be able to:• Explain what Group Policy is.• Implement and admin-ister Group Policy Objects (GPOs).• Manage Group Policy scope and Group Policy pro-cessing.• Troubleshoot the appli-cation of GPOs.
Page
s 5
Module 5: Managing User Desk-tops with Group PolicyLessons • Implementing Adminis-trative Templates• Configuring Folder Redi-rection and Scripts• Configuring Group Policy Preferences• Managing Software with Group Policy Lab : Managing User Desktops with Group PolicyAfter completing this module, students will be able to:• Configure folder redirec-tion and scripts by using GPOs.• Describe and implement Administrative Templates. • Configure GPO prefer-ences.• Deploy software by using GPOs.
Module 6: Installing, Configur-ing, and Troubleshooting the Network Policy Server RoleLessons • Installing and Configur-ing a Network Policy Server
• Configuring RADIUS Cli-ents and Servers• NPS Authentication Meth-ods• Monitoring and Trou-bleshooting a Network Policy Server
Lab : Installing and Configur-ing a Network Policy ServerAfter completing this module, students will be able to:• Install and configure a Network Policy Server (NPS).• Configure clients and servers with the Remote Au-thentication Dial-In User Ser-vice (RADIUS) protocol.• Explain NPS authentica-tion methods.• Monitor and troubleshoot NPS.
Module 7: Implementing Net-work Access ProtectionLessons • Overview of Network Ac-cess Protection• Overview of NAP Enforce-ment Processes• Configuring NAP
Page
s 6
• Configuring IPSec En-forcement for NAP• Monitoring and Trouble-shooting NAP
Lab : Implementing Network Access ProtectionAfter completing this module, students will be able to:• Describe how NAP can help to protect your network.• Describe the various NAP enforcement processes.• Configure NAP.• Monitor and troubleshoot NAP.
Module 8: Implementing Re-mote AccessLessons • Overview of Remote Ac-cess• Implementing Direct-Access by Using the Getting Started Wizard• Implementing and Man-aging an Advanced DirectAc-cess Infrastructure• Implementing VPN• Implementing Web Appli-cation Proxy
Lab : Implementing Direct-Access by Using the Getting Started WizardLab : Deploying an Advanced DirectAccess SolutionLab : Implementing VPNLab : Implementing Web Application ProxyAfter completing this module, students will be able to:• Install and manage the Remote Access role in Win-dows Server 2012 operating system.• Implement DirectAccess by using the Getting Started Wizard.• Implement and manage an advanced DirectAccess In-frastructure.• Implement VPN access.• Implement Web Applica-tion Proxy.
Module 9: Optimizing File Ser-vicesLessons • Overview of FSRM• Using FSRM to Manage Quotas, File Screens, and Stor-age Reports• Implementing Classifi-
Page
s 7
cation and File Management Tasks• Overview of DFS• Configuring DFS Name-spaces• Configuring and Trouble-shooting DFS Replication
Lab : Configuring Quotas and File Screening Using File Serv-er Resource ManagerLab : Im-plementing Distributed File SystemAfter completing this module, students will be able to:• Describe the File Server Resource Manager (FSRM) in the Windows Server 2012 oper-ating system.• Use FSRM to manage quotas, file screens, and stor-age reports.• Implement classification and file management tasks.• Describe Distributed File System (DFS).• Configure DFS name-spaces.• Configure and trouble-shoot DFS Replication.
Module 10: Configuring Encryp-tion and Advanced AuditingThis module explains how to encrypt files using EFS and configure advanced auditing features. Lessons • Encrypting Drives by Us-ing BitLocker• Encrypting Files by Using EFS• Configuring Advanced AuditingLab : Configuring Encryption and Advanced AuditingAfter completing this module, students will be able to:• Secure data by using Bit-Locker Drive Encryption.• Encrypt files by using En-crypting File System (EFS).• Configure advanced au-diting.
Module 11: Deploying and Main-taining Server ImagesLessons • Overview of Windows De-ployment Services• Managing Images• Implementing Deploy-
Page
s 8
ment with Windows Deploy-ment Services• Administering Windows Deployment Services
Lab : Using Windows Deploy-ment Services to Deploy Win-dows Server 2012After completing this module, students will be able to:• Describe the important features and functionality of Windows Deployment Services (Windows DS). • Manage images by us-ing Windows Assessment and Deployment Kit (Windows ADK) Tools.• Configure Windows De-ployment Services in Windows Server 2012.• Perform deployments with Windows Deployment Services.
Module 12: Implementing Up-date ManagementLessons • Overview of WSUS• Deploying Updates with WSUS
Lab : Implementing Update ManagementAfter completing this module, students will be able to:• Describe the role of WSUS.• Describe the WSUS up-date management process.• Deploy updates with WSUS.
Module 13: Monitoring Windows Server 2012Lessons • Monitoring Tools• Using Performance Moni-tor• Monitoring Event Logs
Lab : Monitoring Windows Server 2012After completing this module, students will be able to:• Describe the monitoring tools for the Windows Server 2012 operating system.• Use Performance Moni-tor to view and analyze perfor-mance statistics of programs that are running on their serv-ers.
Page
s 9
• Monitor event logs to view and interpret the record-ed events.