RockStarTraining.com

Setup Menus in Admin Panel

Course Detail

Active Directory Services with Windows Server - MS10969-OD

$0 $0


Active Directory Services with Windows Server - MS10969-OD

Download pdf
Request Course Detail

Module 5: Implementing Group Policy
This module describes Group Policy, how it works, and how best to implement it within your organization.
Lessons
Introducing Group Policy
Implementing and Administering GPOs
Group Policy Scope and Group Policy Processing
Troubleshooting the Application of GPOs
Lab : Implementing and Troubleshooting a Group Policy Infrastructure
Creating and Configuring GPOs
Managing GPO Scope
Verifying GPO Application
Managing GPOs
Troubleshooting GPOs
After completing this module, students will be able to:
Describe Group Policy.
Implement and administer GPOs.
Describe Group Policy scope and Group Policy processing.
Troubleshoot the application of GPOs.Module 6: Managing User Settings with Group Policy
This module describes how to how to use GPO Administrative Templates, Folder Redirection, and Group Policy features to configure users computer settings.
Lessons
Implementing Administrative Templates
Configuring Folder Redirection and Scripts
Configuring Group Policy Preferences
Lab : Managing User Desktops with Group Policy
Implementing Settings by Using Group Policy Preferences
Configuring Folder Redirection
After completing this module, students will be able to:
Implement Administrative Templates.
Configure Folder Redirection and scripts.
Configure Group Policy preferences.Module 7: Deploying and Managing AD CS
This module explain how to deploy and manage Certificate Authorities (CAs) with Active Directory Certificate Services (AD CS)
Lessons
Deploying CAs
Administering CAs
Troubleshooting, Maintaining, and Monitoring CAs
Lab : Deploying and Configuring a Two-Tier CA Hierarchy
Deploying an Offline Root CA
Deploying an Enterprise Subordinate CA
After completing this module, students will be able to:
Deploy Certificate Authorities.
Administer Certificate Authorities.
Troubleshoot, maintain, and monitor Certificate Authorities.
Module 1: Overview of Access and Information Protection This module provides an overview of multiple Access and Information Protection (AIP) technologies and services what are available with Windows Server 2012 and Windows Server 2012 R2 from a business perspective and maps business problems to technical solutions. It also includes coverage of Forefront Identify Manager (FIM). Lessons Introduction to Access and Information Protection Solutions in Business Overview of AIP Solutions in Windows Server 2012 Overview of FIM 2010 R2 Lab : Choosing an Appropriate Access and Information Protection Management Solution Analyze the Lab Scenario and Identify Business Requirements Propose a Solution After completing this module students will be able to: Describe Access and Information Protection solutions in business. Describe Access and Information Protection solutions in Windows Server 2012 and Windows Server 2012 R2. Describe Microsoft Forefront Identity Manager (FIM) 2010 R2.
Module 2: Advanced Deployment and Administration of AD DS
This module explains how to deploy AD DS remotely and describes the virtualization safeguards, cloning abilities and extending AD DS to the cloud.
Lessons
Deploying AD DS
Deploying and Cloning Virtual Domain Controllers
Deploying Domain Controllers in Windows Azure
Administering AD DS
Lab : Deploying and Administering AD DS
Deploying AD DS
Deploying Domain Controllers by Performing Domain Controller Cloning
Administering AD DS
After completing this module, students will be able to:
Describe and perform various deployment techniques for AD DS.
Describe virtual domain controller deployment considerations.
Explain how new technologies in Windows Server 2012 and Windows Server 2012 R2 support virtual domain controllers.
Describe Domain Controller cloning.
Implement AD DS using the tools provided in Windows Server 2012 and Windows Server 2012 R2.Module 3: Securing AD DS
This module describes the threats to domain controllers and what methods can be used to secure the AD DS and its domain controllers.
Lessons
Securing Domain Controllers
Implementing Account Security
Implementing Audit Authentication
Lab : Securing AD DS
Implementing Security Policies for Accounts, Passwords, and Administrative Groups
Deploying and Configuring an RODC
After completing this module, students will be able to:
Understand the importance of securing domain controllers.
Describe the benefit of read-only domain controllers (RODCs).
Explain and implement password and account lockout policies.
Implement audit authentication.Module 4: Implementing and Administering AD DS Sites and Replication
This module explains how AD DS replicates information between domain controllers within a single site and throughout multiple sites. This module also explains how to create multiple sites and how to monitor replication to help optimize AD DS replication and authentication traffic.
Lessons
Overview of AD DS Replication
Configuring AD DS Sites
Configuring and Monitoring AD DS Replication
Lab : Implementing AD DS Sites and Replication
Creating Subnets and Sites
Deploying an Additional Domain Controller
Configuring AD DS Replication
Troubleshooting AD DS Replication
After completing this module, students will be able to:
Describe AD DS replication.
Configure AD DS sites.
Copyright 2016 RockstarTraining.com
Bitnami