did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780735673670

Exam Ref 70-413 : Designing and Implementing an Enterprise Server Infrastructure

by
  • ISBN13:

    9780735673670

  • ISBN10:

    0735673675

  • Edition: 1st
  • Format: Paperback
  • Copyright: 2012-11-15
  • Publisher: Microsoft Press
  • View Upgraded Edition
  • Purchase Benefits
List Price: $39.99

Summary

Prepare for MCSE Exam 70-413and help demonstrate your real-world mastery of enterprise server design and implementation. Designed for experienced, MCSA-certified professionals ready to advance their status Exam Reffocuses on the critical-thinking and decision-making acumen needed for success at the MCSE level. Optimize your exam-prep by focusing on the expertise needed to: Plan and Deploy a Server Infrastructure Design and Implement Network Infrastructure Services Design and Implement Network Access Services Design and Implement an Active Directory Infrastructure (Logical) Design and Implement an Active Directory Infrastructure (Physical)

Author Biography

Steve Suehring has worked extensively with the Windows Server product family since Windows NT, with recent experience leading a large-scale deployment at a Fortune 1000 company. He has written several books on programming, security, and enterprise administration.

Table of Contents

Introductionp. xv
Microsoft Certified Professional Programp. xvi
Acknowledgmentsp. xvi
Support & Feedbackp. xvii
Preparing for the Examp. xviii
Plan and deploy a server infrastructurep. 1
Design an automated server installation strategyp. 1
Understanding design considerationsp. 2
Using the Windows Assessment and Deployment Kitp. 7
Understanding virtual server deploymentp. 9
Objective summaryp. 10
Objective reviewp. 11
Plan and implement a server deployment infrastructurep. 12
Configuring multicast deploymentp. 12
Configuring multisite topology and distribution pointsp. 14
Configuring a multi-server topologyp. 18
Configuring WDSp. 19
Objective summaryp. 23
Objective reviewp. 24
Plan and implement server upgrade and migrationp. 24
Planning for role migrationp. 25
Migrating server rolesp. 26
Migrating servers across domains and forestsp. 29
Designing a server consolidation strategyp. 29
Planning for capacity and resource optimizationp. 32
Objective summaryp. 34
Objective reviewp. 35
Plan and deploy Virtual Machine Manager servicesp. 36
Designing VMM service templatesp. 36
Defining operating system profilesp. 41
Configuring hardware and capability profilesp. 44
Managing servicesp. 46
Configuring image and template librariesp. 47
Managing logical networksp. 48
Objective summaryp. 51
Objective reviewp. 51
Plan and implement file and storage servicesp. 52
Planning for file and storage servicep. 52
Configuring the iSCSI Target Serverp. 55
Configuring Internet Storage Name Serverp. 58
Configuring Network File Systemp. 60
Installing device-specific modulesp. 63
Objective summaryp. 64
Objective reviewp. 64
Chapter summaryp. 65
Answersp. 66
Thought experimentp. 66
Reviewp. 66
Thought experimentp. 67
Reviewp. 67
Thought experimentp. 68
Reviewp. 68
Thought experimentp. 69
Reviewp. 69
Thought experimentp. 70
Reviewp. 70
Design and implement network infrastructure servicesp. 71
Design and maintain a Dynamic Host Configuration Protocol (DHCP) solutionp. 71
Designing a highly available DHCP solutionp. 72
Implementing DHCP filteringp. 78
Implementing and configuring a DHCP Management Packp. 79
Maintaining a DHCP databasep. 80
Objective summaryp. 81
Objective reviewp. 82
Design a name resolution solution strategyp. 83
Designing a name resolution strategyp. 83
Objective summaryp. 91
Objective reviewp. 91
Design and manage an IP address management solutionp. 92
Design considerations for IP address managementp. 92
Configuring role-based access controlp. 96
Configuring IPAM auditingp. 96
Migrating IP addressesp. 98
Managing and monitoring multiple DHCP and DNS serversp. 99
Configuring data collectionp. 100
Objective summaryp. 101
Objective reviewp. 102
Chapter summaryp. 103
Answersp. 104
Thought experimentp. 104
Reviewp. 104
Thought experimentp. 105
Reviewp. 105
Thought experimentp. 106
Reviewp. 106
Design and implement network access servicesp. 109
Design a VPN solutionp. 109
VPN design considerationsp. 110
Security certificate deploymentp. 111
Firewall design considerationsp. 112
Client and site-to-site considerationsp. 113
Bandwidth and protocol implicationsp. 113
VPN deployment configurations with CMAKp. 113
Objective summaryp. 116
Objective reviewp. 116
Design a DirectAccess solutionp. 117
Designing a DirectAccess topologyp. 118
Migrating from Forefront UAGp. 118
Deploying DirectAccessp. 120
Using enterprise certificatesp. 121
Objective summaryp. 122
Objective reviewp. 122
Implement a scalable Remote Access solutionp. 123
Configuring site-to-site VPNp. 124
Configuring packet filtersp. 124
Implementing packet tracingp. 125
Implementing Multisite Remote Accessp. 125
Configuring Remote Access clustered with NLBp. 130
Configuring DirectAccessp. 131
Objective summaryp. 133
Objective reviewp. 133
Design a network protection solutionp. 134
Understanding network protection solutionsp. 135
Planning for capacity and server placementp. 136
Planning for NPS and firewall accessp. 139
Remediation Networkp. 140
Objective summaryp. 140
Objective reviewp. 141
Implement a network protection solutionp. 141
Implementing multiple RADIUS serversp. 142
Configuring NAP enforcement for IPsec and 802.1Xp. 145
Deploying and configuring the Endpoint Protection Clientp. 157
Setting up antimalware and firewall policiesp. 163
Monitoring compliancep. 168
Objective summaryp. 170
Objective reviewp. 171
Chapter summaryp. 171
Answersp. 172
Thought experimentp. 172
Reviewp. 172
Thought experimentp. 173
Reviewp. 173
Thought experimentp. 174
Reviewp. 174
Thought experimentp. 175
Reviewp. 175
Thought experimentp. 176
Reviewp. 176
Design and implement an Active Directory infrastructure (logical)p. 177
Design a forest and domain infrastructurep. 177
Multi-forest architecturep. 178
Trustsp. 179
Functional levelsp. 180
Domain upgradep. 181
Domain migration and forest restructurep. 181
Hybrid cloud servicesp. 182
Objective summaryp. 182
Objective reviewp. 183
Implement a forest and domain infrastructurep. 184
Configuring domain renamep. 184
Configuring a Kerberos realm trustp. 188
Implementing a domain upgradep. 192
Implementing a domain migrationp. 193
Implementing a forest restructurep. 194
Deploying and managing a test forestp. 195
Objective summaryp. 197
Objective reviewp. 197
Design a Group Policy strategyp. 198
Blocking inheritancep. 199
Using enforced policiesp. 199
Using loopback processingp. 199
Using Windows Management Instrumentation (WMI) filtersp. 200
Understanding site-linked GPOsp. 200
Using slow link processingp. 201
Understanding group strategiesp. 202
Understanding OU hierarchyp. 202
Using Advanced Group Policy Managementp. 202
Objective summaryp. 203
Objective reviewp. 204
Design an Active Directory permission modelp. 204
Understanding design considerations for Active Directory permissionsp. 205
Customizing tasks in the Delegation of Control Wizardp. 206
Deploying Remote Server Administrative Tools on a client computerp. 208
Delegating permissions on administrative usersp. 208
Configuring Kerberos delegationp. 210
Objective summaryp. 212
Objective reviewp. 213
Chapter summaryp. 213
Answersp. 214
Thought experimentp. 214
Reviewp. 214
Thought experimentp. 215
Reviewp. 215
Thought experimentp. 216
Reviewp. 216
Thought experimentp. 217
Reviewp. 217
Design and implement an Active Directory infrastructure (physical)p. 219
Design an Active Directory sites topologyp. 219
Understanding Active Directory topology designp. 220
Monitoring and resolving Active Directory replication conflictsp. 221
Objective summaryp. 223
Objective reviewp. 223
Design a domain controller strategyp. 224
Global catalog and operations master rolesp. 224
Read-only domain controllersp. 225
Partial attribute setp. 226
Domain controller cloningp. 226
Objective summaryp. 227
Objective reviewp. 228
Design and implement a branch office infrastructurep. 228
Understanding branch office infrastructure design considerationsp. 229
Implementing confidential attributesp. 231
Delegating administrationp. 233
Modifying the filtered attribute setp. 234
Configuring Password Replication Policyp. 236
Configuring Hash Publicationp. 238
Objective summaryp. 240
Objective reviewp. 240
Chapter summaryp. 241
Answersp. 242
Thought experimentp. 242
Reviewp. 242
Thought experimentp. 243
Reviewp. 243
Thought experimentp. 244
Reviewp. 244
Indexp. 245
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program