Partie Serveur 2008

advertisement
Partie Serveur 2008 Implement a Group Policy Infrastructure
This module explains what Group Policy is, how it works, and how best to implement Group Policy in your organization.
Lessons
•
•
•
•
•
•
Understand Group Policy
Implement a Group Policy
Explore Group Policy Settings and Features
Manage Group Policy Scope
Group Policy Processing
Troubleshoot Policy Application
Lab : Implement Group Policy
•
Create, Edit and Link GPOs
Lab : Explore Group Policy Settings and Features
•
•
Exercise 1: Use Filtering and Commenting
Exercise 2: Mange Administrative Templates
Lab : Manage Group Policy Scope
•
•
•
Exercise 1: Configure GPO Scope with Links
Exercise 2: Configure GPO Scope with Filtering
Exercise 3: Configure Loopback Processing
Lab : Troubleshoot Policy Application
•
•
•
Exercise 1: Perform RSoP Analysis
Exercise 2: using the Group Policy Results Wizard
Exercise 3: View Policy Events
After completing this module, students will be able to:
•
•
•
•
•
•
•
•
•
Identify the business drivers for configuration management
Understand the components and technologies that comprise the Group Policy framework
Manage Group Policy objects
Configure and understand a variety of policy setting types
Scope GPOs using links, security group, WMI filters, loopback processing, and Preference targeting
Explain GPO storage, replication, and versioning
Administer a Group Policy infrastructure
Evaluate GPO inheritance, precedence, and Resultant Set of Policy (RSoP)
Locate the event logs containing Group Policy related events
Manage Enterprise Security and Configuration with Group Policy Settings
This module explains how to manage security and software installation and how to audit files and folders.
Lessons
•
•
•
•
Delegate the Support of Computers
Manage Security Settings
Manage software with GPSI
Auditing
Lab : Delegate the Support of Computers
•
Exercise 1: Configure the Membership of Administrators Using Restricted Groups Policies
Lab : Manage Security Settings
•
•
•
•
Exercise
Exercise
Exercise
Exercise
1:
2:
3:
4:
Manage Local Security Settings
Create a Security Template
Use Security Configuration and Analysis
Use the Security Configuration Wizard
Lab : Manage Software with GPSI
•
•
Exercise 1: Deploy Software with GPSI
Exercise 2: Upgrade Applications with GPSI
Lab : Audit File System Access
•
•
•
Exercise 1: Configure Permissions and Audit Settings
Exercise 2: Configure Audit Policy
Exercise 3: Examine Audit Events
After completing this module, students will be able to:
•
•
•
•
•
•
•
•
•
•
Delegate the administration of computers
Use Restricted Groups policies to modify or enforce the membership of groups
Use Group Policy Preferences to modify the membership of groups
Configure security settings using the Local Security policy
Create and apply security templates to manage security configuration
Analyze security configuration based on security templates
Create, edit, and apply security policies using the Security Configuration Wizard
Deploy security configuration with Group Policy
Deploy software using GPSI
Remove software originally installed with GPSI
Secure Administration
This module explains how to administer Active Directory Domain Services Securely.
Lessons
•
•
Delegate Administrative Permissions
Audit Active Directory Changes
Lab : Delegate Administration
•
•
•
Exercise 1: Delegate Permission to create and support User Accounts
Exercise 2: View Delegated Permissions
Exercise 3: Remove and Reset Permissions
Lab : Audit Active Directory Changes
•
•
Exercise 1: Audit Changes to Active Directory using Default Audit Policy
Exercise 2: Audit Changes to Active Directory using Directory Service Changes auditing
After completing this module, students will be able to:
•
Describe the business purpose of delegation.
•
•
•
•
•
•
•
Assign permissions to Active Directory objects using the security editor user interfaces and the Delegation
of Control Wizard.
View and report permissions on Active Directory objects by using user interface and command line tools.
Reset the permissions on an object to its default.
Describe the relationship between delegation and OU design.
Configure Directory Service Changes auditing
Specify auditing settings on Active Directory objects
Identify event log entries created by Directory Access auditing and Directory Service Changes auditing
Improve the Security of Authentication in an Active Directory Domain Services (AD DS) Domain
This module explains the domain-side components of authentication, including the policies that specify password
requirements and the auditing of authentication-related activities.
Lessons
•
•
•
Configure Password and Lockout Policies
Audit Authentication
Configure Read-Only Domain Controllers
Lab : Configure Password and Account Lockout Policies
•
•
Exercise 1: Configure the Domain’s Password and Lockout Policies.
Exercise 2: Configure Fine-Grained Password Policy
Lab : Audit Authentication
•
Exercise 1: Audit Authentication
Lab : Configure Read-Only Domain Controllers
•
•
•
Exercise 1: Install RODC
Exercise 2: Configure Password Replication Policy
Exercise 3: Manage Credential Caching
After completing this module, students will be able to:
•
•
•
•
•
•
•
•
•
Implement your domain password and account lockout policy
Configure and assign fine-grained password policies
Configure auditing of authentication-related activity
Distinguish between account logon and logon events
Identify authentication-related events in the Security log
Identify the business requirements for RODCs
Install an RODC
Configure password replication policy
Monitor the caching of credentials on an RODC
Configure Domain Name System (DNS)
This module explains how to implement DNS to support name resolution both within your AD DS domain and outside
your domain and your intranet.
Lessons
•
•
•
•
Review DNS Concepts, Components, and Processes
Install and Configure DNS Server in an AD DS Domain
AD DS,DNS, and Windows
Advanced DNS Configuration and Administration
Lab : Installing the DNS Service
•
•
Exercise 1: Add the DNS Server Role
Exercise 2: Configure Forward Lookup Zones and Resource Records
Lab : Advanced Configuration of DNS
•
•
•
•
Exercise
Exercise
Exercise
Exercise
1:
2:
3:
4:
Enable Scavenging of DNS Zones
Create Reverse Lookup Zones
Explore Domain Controller Location
Configure Name Resolution for External Domains
After completing this module, students will be able to:
•
•
•
•
•
•
•
•
•
•
•
•
•
•
Understand the structure role, structure and functionality of the domain name system (DNS)
Describe client and server name resolution processes
Install DNS
Manage DNS records
Configure DNS server settings
Understand the integration between AD DS and DNS
Choose a DNS domain for an Active Directory domain
Create a zone delegation for a new Active Directory domain
Configure replication for Active Directory integrated zones
Describe the purpose of SRV records in the domain controller location process
Understand read-only DNS servers
Understand and configure single-label name resolution
Configure advanced DNS server settings
Audit, maintain, and troubleshoot the DNS server role
Manage Sites and Active Directory ReplicationThis module explains how to create a distributed directory service
that supports domain controllers in portions of your network that are separated by expensive, slow, or unreliable
links.Lessons
•
•
•
Configure Sites and Subnets
Configure the Global Catalog and Application Partitions
Configure Replication
Lab : Configure Sites and Subnets
•
•
Exercise 1: Configure the Default Site
Exercise 2: Create Additional Sites
Lab : Configure the Global Catalog and Application Partitions
•
•
•
Exercise 1: Configure a Global Catalog
Exercise 2: Configure Universal Group Membership
Exercise 3: Examine DNS and Application Directory Partitions
Lab : Configure Replication
•
•
•
•
•
Exercise 1:
Exercise 2:
Exercise 3:
Exercise 4:
Exercise 5:
Create a Connection Object
Create Site Links
Move Domain Controllers into Sites
Designate a Preferred Bridgehead Server
Configure Intersite Replication
After completing this module, students will be able to:
•
Configure sites and subnets
•
•
•
•
•
•
Understand domain controller location and manage domain controllers in sites
Configure replication of the partial attribute set to global catalog servers
Implement universal group membership caching
Understand the role of application directory partitions
Configure replication topology with connection objects, bridgehead servers, site links, and site link bridges
Report, analyze, and troubleshoot replication with repadmin.exe and dcdiag.exe
Monitoring and Maintaining Windows Server 2008 Servers
This module explains how to monitor and maintain Windows Server 2008 servers.
Lessons
•
•
•
•
•
•
•
Planning Monitoring Tasks
Calculating a Server Baseline
Measuring Performance Objects
Selecting Appropriate Monitoring Tools
Planning Notification Methods
Overview of Windows Server 2008 Maintenance Tasks
Automating Windows Server 2008 Maintenance
Lab : Identifying Windows Server 2008 Monitoring Requirements
•
•
Evaluating Performance Metrics
Monitoring Performance Metrics
Lab : Configuring Windows Server 2008 Monitoring
•
•
•
Configuring Data Collector Sets
Monitoring Extension Exercise
Automating Maintenance Tasks
After completing this module, students will be able to:
•
•
•
•
•
•
•
•
Plan monitoring tasks.
Determine an appropriate server baseline.
Determine objects and counters to monitor based on server role.
Analyze key performance counters.
Select appropriate monitoring tools.
Identify appropriate notification methods.
Create a server management task schedule for Windows Server 2008.
List automated maintenance tools for Windows Server 2008.
Configuring and Managing Storage Technologies
This module explains how to manage storage using File Server Resource Manager, configure quota management,
implement file screening and manage storage reports.
Lessons
•
•
•
•
•
•
Windows Server 2008 Storage Management Overview
Managing Storage Using File Server Resource Manager
Configuring Quota Management
Implementing File Screening
Managing Storage Reports
Understanding Storage Area Networks
Lab : Installing the FSRM Role Service
•
Installing the FSRM Role Service
Lab : Configuring Storage Quotas
•
Configuring Storage Quotas
Lab : Configuring File Screening
•
Configuring File Screening
Lab : Generating Storage Reports
•
Generating Storage Reports
After completing this module, students will be able to:
•
•
•
•
•
•
Describe storage management solutions included in Windows Server 2008.
Manage storage using FSRM.
Configure quota management using FSRM.
Implement file screening using FSRM.
Manage storage reports.
Troubleshoot storage issues.
Partie PowerShell Automating Active Directory Administration
This module introduces the concept of Active Directory administrative automation. It explains how to retrieve, create,
modify, move, and remove objects in the Active Directory. It focuses on PowerShell-centric techniques rather than
scripting, and heavily leverages on basic and advanced pipeline techniques covered in previous modules.
Lessons
•
•
•
Active Directory Automation Overview
Managing Users and Groups
Managing Computers and Other Directory Objects
Lab : Managing Users and Groups
•
•
•
Retrieving a filtered list of users from Active Directory
Resetting user passwords and address information
Disabling users that belong to a specific group
Lab : Managing Computers and Other Directory Objects
•
•
•
•
Listing all computers that appear to be running a specific operating system according to Active Directory
information
Creating a report showing all Windows Server 2008 R2 servers
Managing fine-grained password policies in Active Directory
Discovering Organizational Units that are not protected against accidental deletion
After completing this module, students will be able to:
•
•
•
Give an overview of Active Directory automation.
Manage Users and Groups using Windows PowerShell.
Manage Computers and Other Active Directory Objects using Windows PowerShell.
Windows PowerShell Scripts
This module introduces basic Windows PowerShell scripts that execute a batch of shell commands in a single operation.
It points out the security concerns associated with scripting, and how to configure and control the shell’s security
settings that relate to scripting. It also explains how to write basic scripts that execute batches of commands, and how
to parameterize scripts in order to make them more flexible in a variety of situations.
Lessons
•
•
•
Script Security
Basic Scripts
Parameterized Scripts
Lab : Writing Windows PowerShell Scripts
•
•
•
Executing scripts
Using positional script parameters
Using named script parameters
After completing this module, students will be able to:
•
•
•
Identify security concerns associated with scripting.
Write basic scripts.
Write parameterized scripts.
Background Jobs and Remote AdministrationThis module explains how to work with Windows PowerShell’s
background jobs and remote administration functionality. It shows how to create, monitor, and manage local
background jobs, and receive results from completed jobs. It also covers how to configure Windows PowerShell
remoting both locally and in a domain environment. This module describes how to create and manage session
connections to remote computers, and explain how to use those session connections in one-to-one remote shell
instances as well as one-to-many remote command invocation. Finally, it shows how to invoke remote commands as
background jobs, and how to manage those jobs and receive results from them.Lessons
•
•
Working with Background Jobs
Using Windows PowerShell Remoting
Lab : Working with Background Jobs
•
•
•
•
•
•
•
Using background jobs with WMI
Using background jobs for local computers
Receiving the results from a completed job
Removing a completed job
Waiting for a background job to complete
Stopping a background job before it completes
Working with the properties of a job
Lab : Using Windows PowerShell Remoting
•
•
•
•
Interactive remoting
Fan-out remoting
Fan-out remoting using background jobs
Saving information from background jobs
After completing this module, students will be able to:
•
•
Work with Background Jobs.
Use Windows PowerShell Remoting.
Automating Windows Server 2008 R2 AdministrationThis module gives an opportunity to complete several realworld administration tasks related to Windows Server 2008 R2. It provides minimal instruction in how to use the cmdlets
and techniques required to accomplish the lab portion of this module; instead, it lets students rely on the skills they
have learned in the preceding modules of this course.Lessons
•
•
•
•
•
•
Windows Server 2008 R2 Modules Overview
Server Manager Cmdlets Overview
Group Policy Cmdlets Overview
Troubleshooting Pack Overview
Best Practices Analyzer Cmdlets Overview
IIS Cmdlets Overview
Lab : Using the Server Manager Cmdlets
•
•
•
•
Listing all currently installed features
Comparing objects
Installing a new server feature
Exporting current configuration to XML
Lab : Using the Group Policy Cmdlets
•
•
•
•
Listing all the Group Policy Objects in the domain
Creating a text-based report
Creating an HTML report
Backing up all Group Policy Objects
Lab : Using the Troubleshooting Pack Cmdlets
•
•
•
Importing the Troubleshooting Pack module
Solving an end-user problem interactively
Solving a problem using answer files
Lab : Using the Best Practice Analyzer Cmdlets
•
•
•
Importing the Best Practice module
Viewing existing models
Running a Best Practices scan
Lab : Using the IIS Cmdlets
•
•
•
•
•
•
Importing the IIS module
Creating a new web site
Backing up IIS
Modifying web site bindings
Using the IIS PSDrive
Restoring an IIS Configuration
After completing this module, students will be able to:
•
•
•
•
•
•
Give
Give
Give
Give
Give
Give
an
an
an
an
an
an
overview
overview
overview
overview
overview
overview
of
of
of
of
of
of
Windows Server 2008 Modules.
Server Manager Cmdlets.
Group Policy Cmdlets.
Troubleshooting Pack.
Best Practices Analyzer Cmdlets.
IIS Cmdlets. 
Download