MCITP Enterprise Administrator on Windows Server 2008
MCITP Enterprise Administrator on Windows Server 2008
Category:
$10,000.00
$10,000.00
A. Windows Server 2008 Active Directory Configuration 640
- Configuring Domain Name System (DNS) for Active Directory (18%)
- Configure zones.
- May include but is not limited to: Dynamic DNS (DDNS), Non-dynamic DNS (NDDNS), and Secure Dynamic DNS (SDDNS); Time to Live (TTL); GlobalNames; Primary, Secondary, Active Directory Integrated, Stub; SOA; zone scavenging; forward lookup; reverse lookup
- Configure DNS server settings.
- May include but is not limited to: forwarding; root hints; configure zone delegation; round robin; disable recursion; debug logging; server scavenging
- Configure zone transfers and replication.
- May include but is not limited to: configure replication scope (forestDNSzone; domainDNSzone); incremental zone transfers; DNS Notify; secure zone transfers; configure name servers; application directory partitions
- Configure zones.
- Configuring the Active Directory infrastructure (17 percent)
- Configure a forest or a domain.
- May include but is not limited to: remove a domain; perform an unattended installation; Active Directory Migration Tool (ADMT) ; change forest and domain functional levels; interoperability with previous versions of Active Directory; multiple user principal name (UPN) suffixes; forestprep; domainprep
- Configure trusts.
- May include but is not limited to: forest trust; selective authentication vs. forest-wide authentication; transitive trust; external trust; shortcut trust; SID filtering
- Configure sites.
- May include but is not limited to: create Active Directory subnets; configure site links; configure site link costing; configure sites infrastructure
- Configure Active Directory replication.
- May include but is not limited to: DFSR; one-way replication; Bridgehead server; replication scheduling; configure replication protocols; force intersite replication
- Configure the global catalog.
- May include but is not limited to: Universal Group Membership Caching (UGMC); partial attribute set; promote to global catalog
- Configure operations masters.
- May include but is not limited to: seize and transfer; backup operations master; operations master placement; Schema Master; extending the schema; time service
- Configure a forest or a domain.
- Configuring Active Directory Roles and Services (14 percent)
- Configure Active Directory Lightweight Directory Service (AD LDS).
- May include but is not limited to: migration to AD LDS; configure data within AD LDS; configure an authentication server; Server Core Installation
- Configure Active Directory Rights Management Service (AD RMS).
- May include but is not limited to: certificate request and installation; self-enrollments; delegation; create RMS templates; RMS administrative roles; RM Add-on for IE
- Configure the read-only domain controller (RODC).
- May include but is not limited to: replication; Administrator role separation; read-only DNS; BitLocker; credential caching; password replication; syskey; read-only SYSVOL; staged install
- Configure Active Directory Federation Services (AD FSv2).
- May include but is not limited to: install AD FS server role; exchange certificate with AD FS agents; configure trust policies; configure user and group claim mapping; import and export trust policies
- Configure Active Directory Lightweight Directory Service (AD LDS).
- Creating and maintaining Active Directory objects (18 percent)
- Automate creation of Active Directory accounts.
- May include but is not limited to: bulk import; configure the UPN; create computer, user, and group accounts (scripts, import, migration); template accounts; contacts; distribution lists; offline domain join
- Maintain Active Directory accounts.
- May include but is not limited to: manage computer accounts; configure group membership; account resets; delegation; AGDLP/AGGUDLP; deny domain local group; local vs. domain; Protected Admin; disabling accounts vs. deleting accounts; deprovisioning; contacts; creating organizational units (OUs); delegation of control; protecting AD objects from deletion; managed service accounts
- Create and apply Group Policy objects (GPOs).
- May include but is not limited to: enforce, OU hierarchy, block inheritance, and enabling user objects; group policy processing priority; WMI; group policy filtering; group policy loopback; Group Policy Preferences (GPP)
- Configure GPO templates.
- May include but is not limited to: user rights; ADMX Central Store; administrative templates; security templates; restricted groups; security options; starter GPOs; shell access policies
- Deploy and manage software by using GPOs.
- May include but is not limited to: publishing to users; assigning software to users; assigning to computers; software removal; software restriction policies; AppLocker
- Configure account policies.
- May include but is not limited to: domain password policy; account lockout policy; fine-grain password policies
- Configure audit policy by using GPOs.
- May include but is not limited to: audit logon events; audit account logon events; audit policy change; audit access privilege use; audit directory service access; audit object access; advanced audit policies; global object access auditing; “Reason for Access” reporting
- Automate creation of Active Directory accounts.
- Maintaining the Active Directory environment (18 percent)
- Configure backup and recovery.
- May include but is not limited to: using Windows Server Backup; back up files and system state data to media; backup and restore by using removable media; perform an authoritative or non-authoritative restores; linked value replication; Directory Services Recovery Mode (DSRM); backup and restore GPOs; configure AD recycle bin
- Perform offline maintenance.
- May include but is not limited to: offline defragmentation and compaction; Restartable Active Directory; Active Directory database mounting tool
- Monitor Active Directory.
- May include but is not limited to: event viewer subscriptions; data collector sets; real-time monitoring; analyzing logs; WMI queries; PowerShell
- Configure backup and recovery.
- Configuring Active Directory Certificate Services (15 percent)
- Install Active Directory Certificate Services.
- May include but is not limited to: certificate authority (CA) types, including standalone, enterprise, root, and subordinate; role services; prepare for multiple-forest deployments
- Configure CA server settings.
- May include but is not limited to: key archival; certificate database backup and restore; assigning administration roles; high-volume CAs; auditing
- Manage certificate templates.
- May include but is not limited to: certificate template types; securing template permissions; managing different certificate template versions; key recovery agent
- Manage enrollments.
- May include but is not limited to: network device enrollment service (NDES); auto enrollment; Web enrollment; extranet enrollment; smart card enrollment; authentication mechanism assurance; creating enrollment agents; deploying multiple-forest certificates; x.509 certificate mapping
- Manage certificate revocations.
- May include but is not limited to: configure Online Responders; Certificate Revocation List (CRL); CRL Distribution Point (CDP); Authority Information Access (AIA)
- Install Active Directory Certificate Services.
B. Windows Server 2008 Network Infrastructure 642
- Configuring Addressing and Services (21 percent)
- Configure IPv4 and IPv6 addressing.
- May include but is not limited to: configure IP address options; subnetting; supernetting; multi-homed; interoperability between IPv4 and IPv6
- Configure Dynamic Host Configuration Protocol (DHCP).
- May include but is not limited to: DHCP options; creating new options; PXE boot; default user profiles; DHCP relay agents; exclusions; authorize server in Active Directory; scopes; DHCPv6
- Configure routing.
- May include but is not limited to: static routing; persistent routing; Routing Internet Protocol (RIP); metrics; choosing a default gateway; maintaining a routing table; demand-dial routing; IGMP proxy
- Configure Windows Firewall with Advanced Security.
- May include but is not limited to: inbound and outbound rules; custom rules; authorized users; authorized computers; configure firewall by using Group Policy; network location profiles; service groups; import/export policies; isolation policy; IPsec group policies; Connection Security Rules
- Configure IPv4 and IPv6 addressing.
- Configuring Names Resolution (22 percent)
- Configure a Domain Name System (DNS) server.
- May include but is not limited to: conditional forwarding; external forwarders; root hints; cache-only; socket pooling; cache locking
- Configure DNS zones.
- May include but is not limited to: zone scavenging; zone types; Active Directory integration; Dynamic Domain Name System (DDNS); Secure DDNS; GlobalNames; zone delegation; DNS Security Extensions (DNSSEC); reverse lookup zones
- Configure DNS records.
- May include but is not limited to: record types; Time to live (TTL); weighting records; registering records; netmask ordering; DnsUpdateProxy group; round robin; DNS record security; auditing
- Configure DNS replication.
- May include but is not limited to: DNS secondary zones; DNS stub zones; Active Directory Integrated replication scopes; securing zone transfer; SOA refresh; auditing
- Configure name resolution for client computers.
- May include but is not limited to: configuring HOSTS file; Link-Local Multicast Name Resolution (LLMNR); broadcasting; resolver cache; DNS server list; Suffix Search order; DNS devolution
- Configure a Domain Name System (DNS) server.
- Configuring Network Access (18 percent)
- Configure remote access.
- May include but is not limited to: dial-up; Remote Access Policy; Network Address Translation (NAT); VPN protocols, such as Secure Socket Tunneling Protocol (SSTP) and IKEv2; Routing and Remote Access Services (RRAS); packet filters; Connection Manager; VPN reconnect; RAS authentication by using MS-CHAP, MS-CHAP v2, and EAP
- Configure Network Access Protection (NAP).
- May include but is not limited to: network layer protection; DHCP enforcement; VPN enforcement; RDS enforcement; configure NAP health policies; IPsec enforcement; 802.1x enforcement; flexible host isolation; multi-configuration System Health Validator (SHV)
- Configure DirectAccess.
- May include but is not limited to: IPv6; IPsec; server requirements; client requirements; perimeter network; name resolution policy table
- Configure Network Policy Server (NPS).
- May include but is not limited to: IEEE 802.11 wireless; IEEE 802.3 wired; group policy for wireless; RADIUS accounting; Connection Request policies; RADIUS proxy; NPS templates
- Configure remote access.
- Configuring File and Print Services (20 percent)
- Configure a file server.
- May include but is not limited to: file share publishing; Offline Files; share permissions; NTFS permissions; encrypting file system (EFS); BitLocker; Access-Based Enumeration (ABE); branch cache; Share and Storage Management console
- Configure Distributed File System (DFS).
- May include but is not limited to: DFS namespace; DFS configuration and application; creating and configuring targets; DFS replication; read-only replicated folder; failover cluster support; health reporting
- Configure backup and restore.
- May include but is not limited to: backup types; backup schedules; managing remotely; restoring data; shadow copy services; volume snapshot services (VSS); bare metal restore; backup to remote file share
- Manage file server resources.
- May include but is not limited to: FSRM; quota by volume or quota by user; quota entries; quota templates; file classification; Storage Manager for SANs; file management tasks; file screening
- Configure and monitor print services.
- May include but is not limited to: printer share; publish printers to Active Directory; printer permissions; deploy printer connections; install printer drivers; export and import print queues and printer settings; add counters to Performance Monitor to monitor print servers; print pooling; print priority; print driver isolation; location-aware printing; print management delegation
- Configure a file server.
- Monitoring and Managing a Network Infrastructure (20 percent)
- Configure Windows Server Update Services (WSUS) server settings.
- May include but is not limited to: update type selection; client settings; Group Policy object (GPO); client targeting; software updates; test and approval; disconnected networks
- Configure performance monitoring.
- May include but is not limited to: Data Collector Sets; Performance Monitor; Reliability Monitor; monitoring System Stability Index; page files; analyze performance data
- Configure event logs.
- May include but is not limited to: custom views; application and services logs; subscriptions; attaching tasks to events find and filter
- Gather network data.
- May include but is not limited to: Simple Network Management Protocol (SNMP); Network Monitor; Connection Security Rules monitoring
- Configure Windows Server Update Services (WSUS) server settings.
C. Windows Server 2008 Applications Infrastructure, Configuring 643
- Deploying Servers (28 percent)
- Deploy images by using Windows Deployment Services.
- May include but is not limited to: Install from media (IFM); configure Windows Deployment Services; capture Windows Deployment Services images; deploy Windows Deployment Services images; dynamic driver provisioning; PXE provider; multicasting; VHD deployment
- Configure Microsoft Windows activation.
- May include but is not limited to: install a KMS server; create a DNS SRV record; replicate volume license data; Multiple Activation Key (MAK); managing activation
- Configure Windows Server Hyper-V and virtual machines.
- May include but is not limited to: Virtual networking; virtualization hardware requirements; Virtual Hard Disks; migration types; Integration Services; dynamic memory allocation; dynamic virtual machine storage; import/export; snapshot
- Configure high availability.
- May include but is not limited to: failover clustering; Network Load Balancing; geo-clustering support; cluster service migration; Cluster Shared Volumes (CSV)
- Configure storage.
- May include but is not limited to: RAID types; Virtual Disk Specification (VDS); iSCSI Initiator; Storage Area Networks (SANs); mount points; Multipath I/O (MPIO); VHD mounting; boot from VHD; N-Port Identification Virtualization (NPIV)
- Deploy images by using Windows Deployment Services.
- Configuring Remote Desktop Services (26 percent)
- Configure RemoteApp and Remote Desktop Web Access.
- May include but is not limited to: providing access to remote resources; per-user filtering; forms-based authentication; single sign-on
- Configure Remote Desktop Gateway (RD Gateway).
- May include but is not limited to: certificate configuration; Remote Desktop resource authorization policy (RD RAP); Remote Desktop connection authorization policy (RD CAP); Remote Desktop group policy
- Configure Remote Desktop Connection Broker.
- May include but is not limited to: redirection modes; DNS registration; set by using group policy
- Configure and monitor Remote Desktop resources.
- May include but is not limited to: allocate resources by using Windows Server Resource Manager; configure application logging; fair share CPU scheduling; viewing processes
- Configure Remote Desktop licensing.
- May include but is not limited to: deploy licensing server; connectivity between Remote Desktop Session Hosts (RD Session Hosts) and Remote Desktop Licensing (RD Licensing); recovering Remote Desktop Licensing server; managing Remote Desktop Services client access licenses (RDS CALs); revoking licensing
- Configure Remote Desktop Session Host.
- May include but is not limited to: session options; session permissions; display data prioritization; profiles and home folders; IP Virtualization; RemoteFX
- Configure RemoteApp and Remote Desktop Web Access.
- Configuring a Web Services Infrastructure (25 percent)
- Configure Web applications.
- May include but is not limited to: directory-dependent; publishing; URL-specified configuration; Microsoft .NET components, for example, .NET and aspx; configure application pools; manage service accounts; server core
- Manage Web sites.
- May include but is not limited to: migrate sites and Web applications; publish IIS Web sites; configure virtual directories; xcopy deployment
- Configure a File Transfer Protocol (FTP) server.
- May include but is not limited to: configure for extranet users; configure permissions; configure File Transfer Protocol Secure (FTPS); WebDAV integration; user isolation
- Configure Simple Mail Transfer Protocol (SMTP).
- May include but is not limited to: setting up smart hosts; configuring size limitations; setting up security and authentication to the delivering server; creating proper service accounts; authentication; SMTP relay
- Manage the Web Server (IIS) role.
- May include but is not limited to: Web site content backup and restore; IIS configuration backup; monitor IIS; configuration logging and tracing; delegation of administrative rights
- Configure SSL security.
- May include but is not limited to: configure certificates; requesting SSL certificate; renewing SSL certificate; exporting and importing certificates
- Configure Web site authentication and permissions.
- May include but is not limited to: configure site permissions and authentication; configure application permissions; client certificate mappings; request filtering
- Configure Web applications.
- Configuring Network Application Services (21 percent)
- Manage the Streaming Media Services role.
- May include but is not limited to: installation; on-demand replication; caching and proxy; multicast streaming; advertising; Web-based administration; Real-Time Streaming Protocol (RTSP)
- Secure streaming media.
- May include but is not limited to: encryption; sharing business rules; configuring license delivery; configuring policy templates; configure Windows Media Rights Manager; automatically acquire media usage rights; Microsoft DRM upgrade service
- Configure SharePoint Foundation options.
- May include but is not limited to: site permissions; backup; service accounts; rights management services (RMS); migration; audience targeting; claims-based authentication; SharePoint Timer jobs; usage and report logging
- Configure SharePoint Foundation integration.
- May include but is not limited to: configuring a document library to receive e-mail; configuring incoming vs. outgoing e-mail; support for Office Web Apps and SharePoint Workspaces
- Manage the Streaming Media Services role.
D. Windows Server 2008, Enterprise Administrator 647
- Planning network and application services (23 percent)
- Plan for name resolution and IP addressing. May include but is not limited to: internal and external naming strategy, naming resolution support for legacy clients, naming resolution for directory services, IP addressing scheme, TCP/IP version coexistence
- Design for network access. May include but is not limited to: network access policies, remote access strategy, perimeter networks, server and domain isolation
- Plan for application delivery. May include but is not limited to: application virtualization, presentation virtualization, locally installed software, Web-based applications
- Plan for Remote Desktop Services. May include but is not limited to: Terminal Services licensing, Remote Desktop Services infrastructure
- Designing core identity and access management components (25 percent)
- Design Active Directory forests and domains. May include but is not limited to: forest structure, forest and domain functional levels, intra-organizational authorization and authentication, schema modifications
- Design the Active Directory physical topology. May include but is not limited to: placement of servers, site and replication topology, printer location policies
- Design the Active Directory administrative model. May include but is not limited to: delegation, group strategy, compliance auditing, group administration, organizational structure
- Design the enterprise-level group policy strategy. May include but is not limited to: group policy hierarchy and scope filtering, control device installation, authentication and authorization
- Designing support identity and access management components (29 percent)
- Plan for domain or forest migration, upgrade, and restructuring. May include but is not limited to: cross-forest authentication, backward compatibility, object migration, migration planning, implementation planning, environment preparation
- Design the branch office deployment. May include but is not limited to: authentication strategy, server security
- Design and implement public key infrastructure. May include but is not limited to: certificate services, PKI operations and maintenance, certificate life cycle management
- Plan for interoperability. May include but is not limited to: inter-organizational authorization and authentication, application authentication interoperability, cross-platform interoperability
- Designing for business continuity and data availability (23 percent)
- Plan for business continuity. May include but is not limited to: service availability, directory service recovery
- Design for software updates and compliance management. May include but is not limited to: patch management and patch management compliance, Microsoft Update and Windows Update, security baselines, system health models
- Design the operating system virtualization strategy. May include but is not limited to: server consolidation, application compatibility, virtualization management, placement of servers
- Design for data management and data access. May include but is not limited to: data security, data accessibility and redundancy, data collaboration
E. Windows 7, Configuring 680
- Installing, Upgrading, and Migrating to Windows 7 (14 percent)
- Perform a clean installation.
- This objective may include but is not limited to: identifying hardware requirements; setting up as the sole operating system; setting up as dual boot; installation methods; boot from the source of installation, preparing the installation source: USB, CD, network share, WDS
- Upgrade to Windows 7 from previous versions of Windows.
- This objective may include but is not limited to: upgrading from Windows Vista; migrating from Windows XP; upgrading from one edition of Windows 7 to another edition of Windows 7
- Migrate user profiles.
- This objective may include but is not limited to: migrating from one machine to another; migrating from previous versions of Windows; side-by-side vs. wipe and load
- Perform a clean installation.
- Deploying Windows 7 (13 percent)
- Capture a system image.
- This objective may include but is not limited to: preparing system for capture; creating a WIM file; automated capture; manual capture
- Prepare a system image for deployment.
- This objective may include but is not limited to: inserting an application into a system image; inserting a driver into a system image; inserting an update into a system image; configuring tasks to run after deployment
- Deploy a system image.
- This objective may include but is not limited to: automated deployment methods; manually deploying a customized image
- Configure a VHD.
- This objective may include but is not limited to: creating, deploying, booting, mounting, and updating VHDs; offline updates; offline servicing
- Capture a system image.
- Configuring Hardware and Applications (14 percent)
- Configure devices.
- This objective may include but is not limited to: updating, disabling, and uninstalling drivers; signed drivers; conflicts between drivers; configuring driver settings; resolving problem device driver
- Configure application compatibility.
- This objective may include but is not limited to: setting compatibility mode; implementing shims; compatibility issues with Internet Explorer
- Configure application restrictions.
- This objective may include but is not limited to: setting software restriction policies; setting application control policies; setting through group policy or local security policy
- Configure Internet Explorer.
- This objective may include but is not limited to: configuring compatibility view; configuring security settings; configuring providers; managing add-ons; controlling InPrivate mode; certificates for secure Web sites
- Configure devices.
- Configuring Network Connectivity (14 percent)
- Configure IPv4 network settings.
- This objective may include but is not limited to: connecting to a network; configuring name resolution; setting up a connection for a network; network locations; resolving connectivity issues; APIPA
- Configure IPv6 network settings.
- This objective may include but is not limited to: configuring name resolution; connecting to a network; setting up a connection for a network; network locations; resolving connectivity issues; link local multicast name resolution
- Configure networking settings.
- This objective may include but is not limited to: adding a physically connected (wired) or wireless device; connecting to a wireless network; configuring security settings on the client; set preferred wireless networks; configuring network adapters; configuring location-aware printing
- Configure Windows Firewall.
- This objective may include but is not limited to: configuring rules for multiple profiles; allowing or denying an application; network-profile-specific rules; configuring notifications; configuring authenticated exceptions
- Configure remote management.
- This objective may include but is not limited to: remote management methods; configuring remote management tools; executing PowerShell commands
- Configure IPv4 network settings.
- Configuring Access to Resources (13 percent)
- Configure shared resources.
- This objective may include but is not limited to: folder virtualization; shared folder permissions; printers and queues; configuring HomeGroup settings
- Configure file and folder access.
- This objective may include but is not limited to: encrypting files and folders by using EFS; configuring NTFS permissions; resolving effective permissions issues; copying files vs. moving files
- Configure user account control (UAC).
- This objective may include but is not limited to: configuring local security policy; configuring admin vs. standard UAC prompt behaviors; configuring Secure Desktop
- Configure authentication and authorization.
- This objective may include but is not limited to: resolving authentication issues; configuring rights; managing credentials; managing certificates; smart cards with PIV; elevating user privileges; multifactor authentication
- Configure BranchCache.
- This objective may include but is not limited to: distributed cache mode vs. hosted mode; network infrastructure requirements; configuring settings; certificate management
- Configure shared resources.
- Configuring Mobile Computing (10 percent)
- Configure BitLocker and BitLocker To Go.
- This objective may include but is not limited to: configuring BitLocker and BitLocker To Go policies; managing Trusted Platform Module (TPM) PINs; configuring startup key storage; data recovery agent support
- Configure DirectAccess.
- This objective may include but is not limited to: configuring client side; configuring authentication; network infrastructure requirements
- Configure mobility options.
- This objective may include but is not limited to: configuring offline file policies; transparent caching; creating and migrating power policy
- Configure remote connections.
- This objective may include but is not limited to: establishing VPN connections and authentication; enabling a VPN reconnect; advanced security auditing; NAP quarantine remediation; dial-up connections; remote desktop; published apps
- Configure BitLocker and BitLocker To Go.
- Monitoring and Maintaining Systems that Run Windows 7 (11 percent)
- Configure updates to Windows 7.
- This objective may include but is not limited to: configuring update settings; determining source of updates; configuring Windows Update policies; reviewing update history; checking for new updates; rolling back updates
- Manage disks.
- This objective may include but is not limited to: managing disk volumes; managing file system fragmentation; RAID; removable device policies
- Monitor systems.
- This objective may include but is not limited to: configuring event logging; filtering event logs; event subscriptions; data collector sets; generating a system diagnostics report
- Configure performance settings.
- This objective may include but is not limited to: configuring page files; configuring hard drive cache; updated drivers; configuring networking performance; configuring power plans; configuring processor scheduling; configuring desktop environment; configuring services and programs to resolve performance issues; mobile computing performance issues; configuring power
- Configure updates to Windows 7.
- Configuring Backup and Recovery Options (11 percent)
- Configure backup.
- This objective may include but is not limited to: creating a system recovery disk; backing up files, folders, or full system; scheduling backups
- Configure system recovery options.
- This objective may include but is not limited to: configuring system restore points; restoring system settings; last known good configuration; complete restore; driver rollback
- Configure file recovery options.
- This objective may include but is not limited to: configuring file restore points; restoring previous versions of files and folders; restoring damaged or deleted files by using shadow copies; restore user profiles
- Configure backup.
$10,000.00