MCITP Enterprise Administrator on Windows Server 2008

A. Windows Server 2008 AD Configuration 640
B. Windows Server 2008 Network Infrastructure 642
C. Windows Server 2008 Applications Infrastructure, Configuring 643
D. Windows Server 2008, Enterprise Administrator 647
E. Windows 7, Configuring 680

 

A. Windows Server 2008 Active Directory Configuration    640

  • Configuring Domain Name System (DNS) for Active Directory (18%)
    • Configure zones.
      • May include but is not limited to: Dynamic DNS (DDNS), Non-dynamic DNS (NDDNS), and Secure Dynamic DNS (SDDNS); Time to Live (TTL); GlobalNames; Primary, Secondary, Active Directory Integrated, Stub; SOA; zone scavenging; forward lookup; reverse lookup
    • Configure DNS server settings.
      • May include but is not limited to: forwarding; root hints; configure zone delegation; round robin; disable recursion; debug logging; server scavenging
    • Configure zone transfers and replication.
      • May include but is not limited to: configure replication scope (forestDNSzone; domainDNSzone); incremental zone transfers; DNS Notify; secure zone transfers; configure name servers; application directory partitions
  • Configuring the Active Directory infrastructure (17 percent)
    • Configure a forest or a domain.
      • May include but is not limited to: remove a domain; perform an unattended installation; Active Directory Migration Tool (ADMT) ; change forest and domain functional levels; interoperability with previous versions of Active Directory; multiple user principal name (UPN) suffixes; forestprep; domainprep
    • Configure trusts.
      • May include but is not limited to: forest trust; selective authentication vs. forest-wide authentication; transitive trust; external trust; shortcut trust; SID filtering
    • Configure sites.
      • May include but is not limited to: create Active Directory subnets; configure site links; configure site link costing; configure sites infrastructure
    • Configure Active Directory replication.
      • May include but is not limited to: DFSR; one-way replication; Bridgehead server; replication scheduling; configure replication protocols; force intersite replication
    • Configure the global catalog.
      • May include but is not limited to: Universal Group Membership Caching (UGMC); partial attribute set; promote to global catalog
    • Configure operations masters.
      • May include but is not limited to: seize and transfer; backup operations master; operations master placement; Schema Master; extending the schema; time service
  • Configuring Active Directory Roles and Services (14 percent)
    • Configure Active Directory Lightweight Directory Service (AD LDS).
      • May include but is not limited to: migration to AD LDS; configure data within AD LDS; configure an authentication server; Server Core Installation
    • Configure Active Directory Rights Management Service (AD RMS).
      • May include but is not limited to: certificate request and installation; self-enrollments; delegation; create RMS templates; RMS administrative roles; RM Add-on for IE
    • Configure the read-only domain controller (RODC).
      • May include but is not limited to: replication; Administrator role separation; read-only DNS; BitLocker; credential caching; password replication; syskey; read-only SYSVOL; staged install
    • Configure Active Directory Federation Services (AD FSv2).
      • May include but is not limited to: install AD FS server role; exchange certificate with AD FS agents; configure trust policies; configure user and group claim mapping; import and export trust policies
  • Creating and maintaining Active Directory objects (18 percent)
    • Automate creation of Active Directory accounts.
      • May include but is not limited to: bulk import; configure the UPN; create computer, user, and group accounts (scripts, import, migration); template accounts; contacts; distribution lists; offline domain join
    • Maintain Active Directory accounts.
      • May include but is not limited to: manage computer accounts; configure group membership; account resets; delegation; AGDLP/AGGUDLP; deny domain local group; local vs. domain; Protected Admin; disabling accounts vs. deleting accounts; deprovisioning; contacts; creating organizational units (OUs); delegation of control; protecting AD objects from deletion; managed service accounts
    • Create and apply Group Policy objects (GPOs).
      • May include but is not limited to: enforce, OU hierarchy, block inheritance, and enabling user objects; group policy processing priority; WMI; group policy filtering; group policy loopback; Group Policy Preferences (GPP)
    • Configure GPO templates.
      • May include but is not limited to: user rights; ADMX Central Store; administrative templates; security templates; restricted groups; security options; starter GPOs; shell access policies
    • Deploy and manage software by using GPOs.
      • May include but is not limited to: publishing to users; assigning software to users; assigning to computers; software removal; software restriction policies; AppLocker
    • Configure account policies.
      • May include but is not limited to: domain password policy; account lockout policy; fine-grain password policies
    • Configure audit policy by using GPOs.
      • May include but is not limited to: audit logon events; audit account logon events; audit policy change; audit access privilege use; audit directory service access; audit object access; advanced audit policies; global object access auditing; “Reason for Access” reporting
  • Maintaining the Active Directory environment (18 percent)
    • Configure backup and recovery.
      • May include but is not limited to: using Windows Server Backup; back up files and system state data to media; backup and restore by using removable media; perform an authoritative or non-authoritative restores; linked value replication; Directory Services Recovery Mode (DSRM); backup and restore GPOs; configure AD recycle bin
    • Perform offline maintenance.
      • May include but is not limited to: offline defragmentation and compaction; Restartable Active Directory; Active Directory database mounting tool
    • Monitor Active Directory.
      • May include but is not limited to: event viewer subscriptions; data collector sets; real-time monitoring; analyzing logs; WMI queries; PowerShell
  • Configuring Active Directory Certificate Services (15 percent)
    • Install Active Directory Certificate Services.
      • May include but is not limited to: certificate authority (CA) types, including standalone, enterprise, root, and subordinate; role services; prepare for multiple-forest deployments
    • Configure CA server settings.
      • May include but is not limited to: key archival; certificate database backup and restore; assigning administration roles; high-volume CAs; auditing
    • Manage certificate templates.
      • May include but is not limited to: certificate template types; securing template permissions; managing different certificate template versions; key recovery agent
    • Manage enrollments.
      • May include but is not limited to: network device enrollment service (NDES); auto enrollment; Web enrollment; extranet enrollment; smart card enrollment; authentication mechanism assurance; creating enrollment agents; deploying multiple-forest certificates; x.509 certificate mapping
    • Manage certificate revocations.
      • May include but is not limited to: configure Online Responders; Certificate Revocation List (CRL); CRL Distribution Point (CDP); Authority Information Access (AIA)

 

B. Windows Server 2008 Network Infrastructure    642

  • Configuring Addressing and Services (21 percent)
    • Configure IPv4 and IPv6 addressing.
      • May include but is not limited to: configure IP address options; subnetting; supernetting; multi-homed; interoperability between IPv4 and IPv6
    • Configure Dynamic Host Configuration Protocol (DHCP).
      • May include but is not limited to: DHCP options; creating new options; PXE boot; default user profiles; DHCP relay agents; exclusions; authorize server in Active Directory; scopes; DHCPv6
    • Configure routing.
      • May include but is not limited to: static routing; persistent routing; Routing Internet Protocol (RIP); metrics; choosing a default gateway; maintaining a routing table; demand-dial routing; IGMP proxy
    • Configure Windows Firewall with Advanced Security.
      • May include but is not limited to: inbound and outbound rules; custom rules; authorized users; authorized computers; configure firewall by using Group Policy; network location profiles; service groups; import/export policies; isolation policy; IPsec group policies; Connection Security Rules
  • Configuring Names Resolution (22 percent)
    • Configure a Domain Name System (DNS) server.
      • May include but is not limited to: conditional forwarding; external forwarders; root hints; cache-only; socket pooling; cache locking
    • Configure DNS zones.
      • May include but is not limited to: zone scavenging; zone types; Active Directory integration; Dynamic Domain Name System (DDNS); Secure DDNS; GlobalNames; zone delegation; DNS Security Extensions (DNSSEC); reverse lookup zones
    • Configure DNS records.
      • May include but is not limited to: record types; Time to live (TTL); weighting records; registering records; netmask ordering; DnsUpdateProxy group; round robin; DNS record security; auditing
    • Configure DNS replication.
      • May include but is not limited to: DNS secondary zones; DNS stub zones; Active Directory Integrated replication scopes; securing zone transfer; SOA refresh; auditing
    • Configure name resolution for client computers.
      • May include but is not limited to: configuring HOSTS file; Link-Local Multicast Name Resolution (LLMNR); broadcasting; resolver cache; DNS server list; Suffix Search order; DNS devolution
  • Configuring Network Access (18 percent)
    • Configure remote access.
      • May include but is not limited to: dial-up; Remote Access Policy; Network Address Translation (NAT); VPN protocols, such as Secure Socket Tunneling Protocol (SSTP) and IKEv2; Routing and Remote Access Services (RRAS); packet filters; Connection Manager; VPN reconnect; RAS authentication by using MS-CHAP, MS-CHAP v2, and EAP
    • Configure Network Access Protection (NAP).
      • May include but is not limited to: network layer protection; DHCP enforcement; VPN enforcement; RDS enforcement; configure NAP health policies; IPsec enforcement; 802.1x enforcement; flexible host isolation; multi-configuration System Health Validator (SHV)
    • Configure DirectAccess.
      • May include but is not limited to: IPv6; IPsec; server requirements; client requirements; perimeter network; name resolution policy table
    • Configure Network Policy Server (NPS).
      • May include but is not limited to: IEEE 802.11 wireless; IEEE 802.3 wired; group policy for wireless; RADIUS accounting; Connection Request policies; RADIUS proxy; NPS templates
  • Configuring File and Print Services (20 percent)
    • Configure a file server.
      • May include but is not limited to: file share publishing; Offline Files; share permissions; NTFS permissions; encrypting file system (EFS); BitLocker; Access-Based Enumeration (ABE); branch cache; Share and Storage Management console
    • Configure Distributed File System (DFS).
      • May include but is not limited to: DFS namespace; DFS configuration and application; creating and configuring targets; DFS replication; read-only replicated folder; failover cluster support; health reporting
    • Configure backup and restore.
      • May include but is not limited to: backup types; backup schedules; managing remotely; restoring data; shadow copy services; volume snapshot services (VSS); bare metal restore; backup to remote file share
    • Manage file server resources.
      • May include but is not limited to: FSRM; quota by volume or quota by user; quota entries; quota templates; file classification; Storage Manager for SANs; file management tasks; file screening
    • Configure and monitor print services.
      • May include but is not limited to: printer share; publish printers to Active Directory; printer permissions; deploy printer connections; install printer drivers; export and import print queues and printer settings; add counters to Performance Monitor to monitor print servers; print pooling; print priority; print driver isolation; location-aware printing; print management delegation
  • Monitoring and Managing a Network Infrastructure (20 percent)
    • Configure Windows Server Update Services (WSUS) server settings.
      • May include but is not limited to: update type selection; client settings; Group Policy object (GPO); client targeting; software updates; test and approval; disconnected networks
    • Configure performance monitoring.
      • May include but is not limited to: Data Collector Sets; Performance Monitor; Reliability Monitor; monitoring System Stability Index; page files; analyze performance data
    • Configure event logs.
      • May include but is not limited to: custom views; application and services logs; subscriptions; attaching tasks to events find and filter
    • Gather network data.
      • May include but is not limited to: Simple Network Management Protocol (SNMP); Network Monitor; Connection Security Rules monitoring

 

C. Windows Server 2008 Applications Infrastructure, Configuring  643

  • Deploying Servers (28 percent)
    • Deploy images by using Windows Deployment Services.
      • May include but is not limited to: Install from media (IFM); configure Windows Deployment Services; capture Windows Deployment Services images; deploy Windows Deployment Services images; dynamic driver provisioning; PXE provider; multicasting; VHD deployment
    • Configure Microsoft Windows activation.
      • May include but is not limited to: install a KMS server; create a DNS SRV record; replicate volume license data; Multiple Activation Key (MAK); managing activation
    • Configure Windows Server Hyper-V and virtual machines.
      • May include but is not limited to: Virtual networking; virtualization hardware requirements; Virtual Hard Disks; migration types; Integration Services; dynamic memory allocation; dynamic virtual machine storage; import/export; snapshot
    • Configure high availability.
      • May include but is not limited to: failover clustering; Network Load Balancing; geo-clustering support; cluster service migration; Cluster Shared Volumes (CSV)
    • Configure storage.
      • May include but is not limited to: RAID types; Virtual Disk Specification (VDS); iSCSI Initiator; Storage Area Networks (SANs); mount points; Multipath I/O (MPIO); VHD mounting; boot from VHD; N-Port Identification Virtualization (NPIV)
  • Configuring Remote Desktop Services (26 percent)
    • Configure RemoteApp and Remote Desktop Web Access.
      • May include but is not limited to: providing access to remote resources; per-user filtering; forms-based authentication; single sign-on
    • Configure Remote Desktop Gateway (RD Gateway).
      • May include but is not limited to: certificate configuration; Remote Desktop resource authorization policy (RD RAP); Remote Desktop connection authorization policy (RD CAP); Remote Desktop group policy
    • Configure Remote Desktop Connection Broker.
      • May include but is not limited to: redirection modes; DNS registration; set by using group policy
    • Configure and monitor Remote Desktop resources.
      • May include but is not limited to: allocate resources by using Windows Server Resource Manager; configure application logging; fair share CPU scheduling; viewing processes
    • Configure Remote Desktop licensing.
      • May include but is not limited to: deploy licensing server; connectivity between Remote Desktop Session Hosts (RD Session Hosts) and Remote Desktop Licensing (RD Licensing); recovering Remote Desktop Licensing server; managing Remote Desktop Services client access licenses (RDS CALs); revoking licensing
    • Configure Remote Desktop Session Host.
      • May include but is not limited to: session options; session permissions; display data prioritization; profiles and home folders; IP Virtualization; RemoteFX
  • Configuring a Web Services Infrastructure (25 percent)
    • Configure Web applications.
      • May include but is not limited to: directory-dependent; publishing; URL-specified configuration; Microsoft .NET components, for example, .NET and aspx; configure application pools; manage service accounts; server core
    • Manage Web sites.
      • May include but is not limited to: migrate sites and Web applications; publish IIS Web sites; configure virtual directories; xcopy deployment
    • Configure a File Transfer Protocol (FTP) server.
      • May include but is not limited to: configure for extranet users; configure permissions; configure File Transfer Protocol Secure (FTPS); WebDAV integration; user isolation
    • Configure Simple Mail Transfer Protocol (SMTP).
      • May include but is not limited to: setting up smart hosts; configuring size limitations; setting up security and authentication to the delivering server; creating proper service accounts; authentication; SMTP relay
    • Manage the Web Server (IIS) role.
      • May include but is not limited to: Web site content backup and restore; IIS configuration backup; monitor IIS; configuration logging and tracing; delegation of administrative rights
    • Configure SSL security.
      • May include but is not limited to: configure certificates; requesting SSL certificate; renewing SSL certificate; exporting and importing certificates
    • Configure Web site authentication and permissions.
      • May include but is not limited to: configure site permissions and authentication; configure application permissions; client certificate mappings; request filtering
  • Configuring Network Application Services (21 percent)
    • Manage the Streaming Media Services role.
      • May include but is not limited to: installation; on-demand replication; caching and proxy; multicast streaming; advertising; Web-based administration; Real-Time Streaming Protocol (RTSP)
    • Secure streaming media.
      • May include but is not limited to: encryption; sharing business rules; configuring license delivery; configuring policy templates; configure Windows Media Rights Manager; automatically acquire media usage rights; Microsoft DRM upgrade service
    • Configure SharePoint Foundation options.
      • May include but is not limited to: site permissions; backup; service accounts; rights management services (RMS); migration; audience targeting; claims-based authentication; SharePoint Timer jobs; usage and report logging
    • Configure SharePoint Foundation integration.
      • May include but is not limited to: configuring a document library to receive e-mail; configuring incoming vs. outgoing e-mail; support for Office Web Apps and SharePoint Workspaces

 

D. Windows Server 2008, Enterprise Administrator  647

  • Planning network and application services (23 percent)
    • Plan for name resolution and IP addressing. May include but is not limited to: internal and external naming strategy, naming resolution support for legacy clients, naming resolution for directory services, IP addressing scheme, TCP/IP version coexistence
    • Design for network access. May include but is not limited to: network access policies, remote access strategy, perimeter networks, server and domain isolation
    • Plan for application delivery. May include but is not limited to: application virtualization, presentation virtualization, locally installed software, Web-based applications
    • Plan for Remote Desktop Services. May include but is not limited to: Terminal Services licensing, Remote Desktop Services infrastructure
  • Designing core identity and access management components (25 percent)
    • Design Active Directory forests and domains. May include but is not limited to: forest structure, forest and domain functional levels, intra-organizational authorization and authentication, schema modifications
    • Design the Active Directory physical topology. May include but is not limited to: placement of servers, site and replication topology, printer location policies
    • Design the Active Directory administrative model. May include but is not limited to: delegation, group strategy, compliance auditing, group administration, organizational structure
    • Design the enterprise-level group policy strategy. May include but is not limited to: group policy hierarchy and scope filtering, control device installation, authentication and authorization
  • Designing support identity and access management components (29 percent)
    • Plan for domain or forest migration, upgrade, and restructuring. May include but is not limited to: cross-forest authentication, backward compatibility, object migration, migration planning, implementation planning, environment preparation
    • Design the branch office deployment. May include but is not limited to: authentication strategy, server security
    • Design and implement public key infrastructure. May include but is not limited to: certificate services, PKI operations and maintenance, certificate life cycle management
    • Plan for interoperability. May include but is not limited to: inter-organizational authorization and authentication, application authentication interoperability, cross-platform interoperability
  • Designing for business continuity and data availability (23 percent)
    • Plan for business continuity. May include but is not limited to: service availability, directory service recovery
    • Design for software updates and compliance management. May include but is not limited to: patch management and patch management compliance, Microsoft Update and Windows Update, security baselines, system health models
    • Design the operating system virtualization strategy. May include but is not limited to: server consolidation, application compatibility, virtualization management, placement of servers
    • Design for data management and data access. May include but is not limited to: data security, data accessibility and redundancy, data collaboration

 

E. Windows 7, Configuring     680

  • Installing, Upgrading, and Migrating to Windows 7 (14 percent)
    • Perform a clean installation.
      • This objective may include but is not limited to: identifying hardware requirements; setting up as the sole operating system; setting up as dual boot; installation methods; boot from the source of installation, preparing the installation source: USB, CD, network share, WDS
    • Upgrade to Windows 7 from previous versions of Windows.
      • This objective may include but is not limited to: upgrading from Windows Vista; migrating from Windows XP; upgrading from one edition of Windows 7 to another edition of Windows 7
    • Migrate user profiles.
      • This objective may include but is not limited to: migrating from one machine to another; migrating from previous versions of Windows; side-by-side vs. wipe and load
  • Deploying Windows 7 (13 percent)
    • Capture a system image.
      • This objective may include but is not limited to: preparing system for capture; creating a WIM file; automated capture; manual capture
    • Prepare a system image for deployment.
      • This objective may include but is not limited to: inserting an application into a system image; inserting a driver into a system image; inserting an update into a system image; configuring tasks to run after deployment
    • Deploy a system image.
      • This objective may include but is not limited to: automated deployment methods; manually deploying a customized image
    • Configure a VHD.
      • This objective may include but is not limited to: creating, deploying, booting, mounting, and updating VHDs; offline updates; offline servicing
  • Configuring Hardware and Applications (14 percent)
    • Configure devices.
      • This objective may include but is not limited to: updating, disabling, and uninstalling drivers; signed drivers; conflicts between drivers; configuring driver settings; resolving problem device driver
    • Configure application compatibility.
      • This objective may include but is not limited to: setting compatibility mode; implementing shims; compatibility issues with Internet Explorer
    • Configure application restrictions.
      • This objective may include but is not limited to: setting software restriction policies; setting application control policies; setting through group policy or local security policy
    • Configure Internet Explorer.
      • This objective may include but is not limited to: configuring compatibility view; configuring security settings; configuring providers; managing add-ons; controlling InPrivate mode; certificates for secure Web sites
  • Configuring Network Connectivity (14 percent)
    • Configure IPv4 network settings.
      • This objective may include but is not limited to: connecting to a network; configuring name resolution; setting up a connection for a network; network locations; resolving connectivity issues; APIPA
    • Configure IPv6 network settings.
      • This objective may include but is not limited to: configuring name resolution; connecting to a network; setting up a connection for a network; network locations; resolving connectivity issues; link local multicast name resolution
    • Configure networking settings.
      • This objective may include but is not limited to: adding a physically connected (wired) or wireless device; connecting to a wireless network; configuring security settings on the client; set preferred wireless networks; configuring network adapters; configuring location-aware printing
    • Configure Windows Firewall.
      • This objective may include but is not limited to: configuring rules for multiple profiles; allowing or denying an application; network-profile-specific rules; configuring notifications; configuring authenticated exceptions
    • Configure remote management.
      • This objective may include but is not limited to: remote management methods; configuring remote management tools; executing PowerShell commands
  • Configuring Access to Resources (13 percent)
    • Configure shared resources.
      • This objective may include but is not limited to: folder virtualization; shared folder permissions; printers and queues; configuring HomeGroup settings
    • Configure file and folder access.
      • This objective may include but is not limited to: encrypting files and folders by using EFS; configuring NTFS permissions; resolving effective permissions issues; copying files vs. moving files
    • Configure user account control (UAC).
      • This objective may include but is not limited to: configuring local security policy; configuring admin vs. standard UAC prompt behaviors; configuring Secure Desktop
    • Configure authentication and authorization.
      • This objective may include but is not limited to: resolving authentication issues; configuring rights; managing credentials; managing certificates; smart cards with PIV; elevating user privileges; multifactor authentication
    • Configure BranchCache.
      • This objective may include but is not limited to: distributed cache mode vs. hosted mode; network infrastructure requirements; configuring settings; certificate management
  • Configuring Mobile Computing (10 percent)
    • Configure BitLocker and BitLocker To Go.
      • This objective may include but is not limited to: configuring BitLocker and BitLocker To Go policies; managing Trusted Platform Module (TPM) PINs; configuring startup key storage; data recovery agent support
    • Configure DirectAccess.
      • This objective may include but is not limited to: configuring client side; configuring authentication; network infrastructure requirements
    • Configure mobility options.
      • This objective may include but is not limited to: configuring offline file policies; transparent caching; creating and migrating power policy
    • Configure remote connections.
      • This objective may include but is not limited to: establishing VPN connections and authentication; enabling a VPN reconnect; advanced security auditing; NAP quarantine remediation; dial-up connections; remote desktop; published apps
  • Monitoring and Maintaining Systems that Run Windows 7 (11 percent)
    • Configure updates to Windows 7.
      • This objective may include but is not limited to: configuring update settings; determining source of updates; configuring Windows Update policies; reviewing update history; checking for new updates; rolling back updates
    • Manage disks.
      • This objective may include but is not limited to: managing disk volumes; managing file system fragmentation; RAID; removable device policies
    • Monitor systems.
      • This objective may include but is not limited to: configuring event logging; filtering event logs; event subscriptions; data collector sets; generating a system diagnostics report
    • Configure performance settings.
      • This objective may include but is not limited to: configuring page files; configuring hard drive cache; updated drivers; configuring networking performance; configuring power plans; configuring processor scheduling; configuring desktop environment; configuring services and programs to resolve performance issues; mobile computing performance issues; configuring power
  • Configuring Backup and Recovery Options (11 percent)
    • Configure backup.
      • This objective may include but is not limited to: creating a system recovery disk; backing up files, folders, or full system; scheduling backups
    • Configure system recovery options.
      • This objective may include but is not limited to: configuring system restore points; restoring system settings; last known good configuration; complete restore; driver rollback
    • Configure file recovery options.
      • This objective may include but is not limited to: configuring file restore points; restoring previous versions of files and folders; restoring damaged or deleted files by using shadow copies; restore user profiles