Introduction | p. xv |
Microsoft Certified Professional Program | p. xvi |
Acknowledgments | p. xvi |
Support & Feedback | p. xvii |
Preparing for the Exam | p. xviii |
Plan and deploy a server infrastructure | p. 1 |
Design an automated server installation strategy | p. 1 |
Understanding design considerations | p. 2 |
Using the Windows Assessment and Deployment Kit | p. 7 |
Understanding virtual server deployment | p. 9 |
Objective summary | p. 10 |
Objective review | p. 11 |
Plan and implement a server deployment infrastructure | p. 12 |
Configuring multicast deployment | p. 12 |
Configuring multisite topology and distribution points | p. 14 |
Configuring a multi-server topology | p. 18 |
Configuring WDS | p. 19 |
Objective summary | p. 23 |
Objective review | p. 24 |
Plan and implement server upgrade and migration | p. 24 |
Planning for role migration | p. 25 |
Migrating server roles | p. 26 |
Migrating servers across domains and forests | p. 29 |
Designing a server consolidation strategy | p. 29 |
Planning for capacity and resource optimization | p. 32 |
Objective summary | p. 34 |
Objective review | p. 35 |
Plan and deploy Virtual Machine Manager services | p. 36 |
Designing VMM service templates | p. 36 |
Defining operating system profiles | p. 41 |
Configuring hardware and capability profiles | p. 44 |
Managing services | p. 46 |
Configuring image and template libraries | p. 47 |
Managing logical networks | p. 48 |
Objective summary | p. 51 |
Objective review | p. 51 |
Plan and implement file and storage services | p. 52 |
Planning for file and storage service | p. 52 |
Configuring the iSCSI Target Server | p. 55 |
Configuring Internet Storage Name Server | p. 58 |
Configuring Network File System | p. 60 |
Installing device-specific modules | p. 63 |
Objective summary | p. 64 |
Objective review | p. 64 |
Chapter summary | p. 65 |
Answers | p. 66 |
Thought experiment | p. 66 |
Review | p. 66 |
Thought experiment | p. 67 |
Review | p. 67 |
Thought experiment | p. 68 |
Review | p. 68 |
Thought experiment | p. 69 |
Review | p. 69 |
Thought experiment | p. 70 |
Review | p. 70 |
Design and implement network infrastructure services | p. 71 |
Design and maintain a Dynamic Host Configuration Protocol (DHCP) solution | p. 71 |
Designing a highly available DHCP solution | p. 72 |
Implementing DHCP filtering | p. 78 |
Implementing and configuring a DHCP Management Pack | p. 79 |
Maintaining a DHCP database | p. 80 |
Objective summary | p. 81 |
Objective review | p. 82 |
Design a name resolution solution strategy | p. 83 |
Designing a name resolution strategy | p. 83 |
Objective summary | p. 91 |
Objective review | p. 91 |
Design and manage an IP address management solution | p. 92 |
Design considerations for IP address management | p. 92 |
Configuring role-based access control | p. 96 |
Configuring IPAM auditing | p. 96 |
Migrating IP addresses | p. 98 |
Managing and monitoring multiple DHCP and DNS servers | p. 99 |
Configuring data collection | p. 100 |
Objective summary | p. 101 |
Objective review | p. 102 |
Chapter summary | p. 103 |
Answers | p. 104 |
Thought experiment | p. 104 |
Review | p. 104 |
Thought experiment | p. 105 |
Review | p. 105 |
Thought experiment | p. 106 |
Review | p. 106 |
Design and implement network access services | p. 109 |
Design a VPN solution | p. 109 |
VPN design considerations | p. 110 |
Security certificate deployment | p. 111 |
Firewall design considerations | p. 112 |
Client and site-to-site considerations | p. 113 |
Bandwidth and protocol implications | p. 113 |
VPN deployment configurations with CMAK | p. 113 |
Objective summary | p. 116 |
Objective review | p. 116 |
Design a DirectAccess solution | p. 117 |
Designing a DirectAccess topology | p. 118 |
Migrating from Forefront UAG | p. 118 |
Deploying DirectAccess | p. 120 |
Using enterprise certificates | p. 121 |
Objective summary | p. 122 |
Objective review | p. 122 |
Implement a scalable Remote Access solution | p. 123 |
Configuring site-to-site VPN | p. 124 |
Configuring packet filters | p. 124 |
Implementing packet tracing | p. 125 |
Implementing Multisite Remote Access | p. 125 |
Configuring Remote Access clustered with NLB | p. 130 |
Configuring DirectAccess | p. 131 |
Objective summary | p. 133 |
Objective review | p. 133 |
Design a network protection solution | p. 134 |
Understanding network protection solutions | p. 135 |
Planning for capacity and server placement | p. 136 |
Planning for NPS and firewall access | p. 139 |
Remediation Network | p. 140 |
Objective summary | p. 140 |
Objective review | p. 141 |
Implement a network protection solution | p. 141 |
Implementing multiple RADIUS servers | p. 142 |
Configuring NAP enforcement for IPsec and 802.1X | p. 145 |
Deploying and configuring the Endpoint Protection Client | p. 157 |
Setting up antimalware and firewall policies | p. 163 |
Monitoring compliance | p. 168 |
Objective summary | p. 170 |
Objective review | p. 171 |
Chapter summary | p. 171 |
Answers | p. 172 |
Thought experiment | p. 172 |
Review | p. 172 |
Thought experiment | p. 173 |
Review | p. 173 |
Thought experiment | p. 174 |
Review | p. 174 |
Thought experiment | p. 175 |
Review | p. 175 |
Thought experiment | p. 176 |
Review | p. 176 |
Design and implement an Active Directory infrastructure (logical) | p. 177 |
Design a forest and domain infrastructure | p. 177 |
Multi-forest architecture | p. 178 |
Trusts | p. 179 |
Functional levels | p. 180 |
Domain upgrade | p. 181 |
Domain migration and forest restructure | p. 181 |
Hybrid cloud services | p. 182 |
Objective summary | p. 182 |
Objective review | p. 183 |
Implement a forest and domain infrastructure | p. 184 |
Configuring domain rename | p. 184 |
Configuring a Kerberos realm trust | p. 188 |
Implementing a domain upgrade | p. 192 |
Implementing a domain migration | p. 193 |
Implementing a forest restructure | p. 194 |
Deploying and managing a test forest | p. 195 |
Objective summary | p. 197 |
Objective review | p. 197 |
Design a Group Policy strategy | p. 198 |
Blocking inheritance | p. 199 |
Using enforced policies | p. 199 |
Using loopback processing | p. 199 |
Using Windows Management Instrumentation (WMI) filters | p. 200 |
Understanding site-linked GPOs | p. 200 |
Using slow link processing | p. 201 |
Understanding group strategies | p. 202 |
Understanding OU hierarchy | p. 202 |
Using Advanced Group Policy Management | p. 202 |
Objective summary | p. 203 |
Objective review | p. 204 |
Design an Active Directory permission model | p. 204 |
Understanding design considerations for Active Directory permissions | p. 205 |
Customizing tasks in the Delegation of Control Wizard | p. 206 |
Deploying Remote Server Administrative Tools on a client computer | p. 208 |
Delegating permissions on administrative users | p. 208 |
Configuring Kerberos delegation | p. 210 |
Objective summary | p. 212 |
Objective review | p. 213 |
Chapter summary | p. 213 |
Answers | p. 214 |
Thought experiment | p. 214 |
Review | p. 214 |
Thought experiment | p. 215 |
Review | p. 215 |
Thought experiment | p. 216 |
Review | p. 216 |
Thought experiment | p. 217 |
Review | p. 217 |
Design and implement an Active Directory infrastructure (physical) | p. 219 |
Design an Active Directory sites topology | p. 219 |
Understanding Active Directory topology design | p. 220 |
Monitoring and resolving Active Directory replication conflicts | p. 221 |
Objective summary | p. 223 |
Objective review | p. 223 |
Design a domain controller strategy | p. 224 |
Global catalog and operations master roles | p. 224 |
Read-only domain controllers | p. 225 |
Partial attribute set | p. 226 |
Domain controller cloning | p. 226 |
Objective summary | p. 227 |
Objective review | p. 228 |
Design and implement a branch office infrastructure | p. 228 |
Understanding branch office infrastructure design considerations | p. 229 |
Implementing confidential attributes | p. 231 |
Delegating administration | p. 233 |
Modifying the filtered attribute set | p. 234 |
Configuring Password Replication Policy | p. 236 |
Configuring Hash Publication | p. 238 |
Objective summary | p. 240 |
Objective review | p. 240 |
Chapter summary | p. 241 |
Answers | p. 242 |
Thought experiment | p. 242 |
Review | p. 242 |
Thought experiment | p. 243 |
Review | p. 243 |
Thought experiment | p. 244 |
Review | p. 244 |
Index | p. 245 |
Table of Contents provided by Ingram. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.