Partie Serveur 2008 Implement a Group Policy Infrastructure This module explains what Group Policy is, how it works, and how best to implement Group Policy in your organization. Lessons • • • • • • Understand Group Policy Implement a Group Policy Explore Group Policy Settings and Features Manage Group Policy Scope Group Policy Processing Troubleshoot Policy Application Lab : Implement Group Policy • Create, Edit and Link GPOs Lab : Explore Group Policy Settings and Features • • Exercise 1: Use Filtering and Commenting Exercise 2: Mange Administrative Templates Lab : Manage Group Policy Scope • • • Exercise 1: Configure GPO Scope with Links Exercise 2: Configure GPO Scope with Filtering Exercise 3: Configure Loopback Processing Lab : Troubleshoot Policy Application • • • Exercise 1: Perform RSoP Analysis Exercise 2: using the Group Policy Results Wizard Exercise 3: View Policy Events After completing this module, students will be able to: • • • • • • • • • Identify the business drivers for configuration management Understand the components and technologies that comprise the Group Policy framework Manage Group Policy objects Configure and understand a variety of policy setting types Scope GPOs using links, security group, WMI filters, loopback processing, and Preference targeting Explain GPO storage, replication, and versioning Administer a Group Policy infrastructure Evaluate GPO inheritance, precedence, and Resultant Set of Policy (RSoP) Locate the event logs containing Group Policy related events Manage Enterprise Security and Configuration with Group Policy Settings This module explains how to manage security and software installation and how to audit files and folders. Lessons • • • • Delegate the Support of Computers Manage Security Settings Manage software with GPSI Auditing Lab : Delegate the Support of Computers • Exercise 1: Configure the Membership of Administrators Using Restricted Groups Policies Lab : Manage Security Settings • • • • Exercise Exercise Exercise Exercise 1: 2: 3: 4: Manage Local Security Settings Create a Security Template Use Security Configuration and Analysis Use the Security Configuration Wizard Lab : Manage Software with GPSI • • Exercise 1: Deploy Software with GPSI Exercise 2: Upgrade Applications with GPSI Lab : Audit File System Access • • • Exercise 1: Configure Permissions and Audit Settings Exercise 2: Configure Audit Policy Exercise 3: Examine Audit Events After completing this module, students will be able to: • • • • • • • • • • Delegate the administration of computers Use Restricted Groups policies to modify or enforce the membership of groups Use Group Policy Preferences to modify the membership of groups Configure security settings using the Local Security policy Create and apply security templates to manage security configuration Analyze security configuration based on security templates Create, edit, and apply security policies using the Security Configuration Wizard Deploy security configuration with Group Policy Deploy software using GPSI Remove software originally installed with GPSI Secure Administration This module explains how to administer Active Directory Domain Services Securely. Lessons • • Delegate Administrative Permissions Audit Active Directory Changes Lab : Delegate Administration • • • Exercise 1: Delegate Permission to create and support User Accounts Exercise 2: View Delegated Permissions Exercise 3: Remove and Reset Permissions Lab : Audit Active Directory Changes • • Exercise 1: Audit Changes to Active Directory using Default Audit Policy Exercise 2: Audit Changes to Active Directory using Directory Service Changes auditing After completing this module, students will be able to: • Describe the business purpose of delegation. • • • • • • • Assign permissions to Active Directory objects using the security editor user interfaces and the Delegation of Control Wizard. View and report permissions on Active Directory objects by using user interface and command line tools. Reset the permissions on an object to its default. Describe the relationship between delegation and OU design. Configure Directory Service Changes auditing Specify auditing settings on Active Directory objects Identify event log entries created by Directory Access auditing and Directory Service Changes auditing Improve the Security of Authentication in an Active Directory Domain Services (AD DS) Domain This module explains the domain-side components of authentication, including the policies that specify password requirements and the auditing of authentication-related activities. Lessons • • • Configure Password and Lockout Policies Audit Authentication Configure Read-Only Domain Controllers Lab : Configure Password and Account Lockout Policies • • Exercise 1: Configure the Domain’s Password and Lockout Policies. Exercise 2: Configure Fine-Grained Password Policy Lab : Audit Authentication • Exercise 1: Audit Authentication Lab : Configure Read-Only Domain Controllers • • • Exercise 1: Install RODC Exercise 2: Configure Password Replication Policy Exercise 3: Manage Credential Caching After completing this module, students will be able to: • • • • • • • • • Implement your domain password and account lockout policy Configure and assign fine-grained password policies Configure auditing of authentication-related activity Distinguish between account logon and logon events Identify authentication-related events in the Security log Identify the business requirements for RODCs Install an RODC Configure password replication policy Monitor the caching of credentials on an RODC Configure Domain Name System (DNS) This module explains how to implement DNS to support name resolution both within your AD DS domain and outside your domain and your intranet. Lessons • • • • Review DNS Concepts, Components, and Processes Install and Configure DNS Server in an AD DS Domain AD DS,DNS, and Windows Advanced DNS Configuration and Administration Lab : Installing the DNS Service • • Exercise 1: Add the DNS Server Role Exercise 2: Configure Forward Lookup Zones and Resource Records Lab : Advanced Configuration of DNS • • • • Exercise Exercise Exercise Exercise 1: 2: 3: 4: Enable Scavenging of DNS Zones Create Reverse Lookup Zones Explore Domain Controller Location Configure Name Resolution for External Domains After completing this module, students will be able to: • • • • • • • • • • • • • • Understand the structure role, structure and functionality of the domain name system (DNS) Describe client and server name resolution processes Install DNS Manage DNS records Configure DNS server settings Understand the integration between AD DS and DNS Choose a DNS domain for an Active Directory domain Create a zone delegation for a new Active Directory domain Configure replication for Active Directory integrated zones Describe the purpose of SRV records in the domain controller location process Understand read-only DNS servers Understand and configure single-label name resolution Configure advanced DNS server settings Audit, maintain, and troubleshoot the DNS server role Manage Sites and Active Directory ReplicationThis module explains how to create a distributed directory service that supports domain controllers in portions of your network that are separated by expensive, slow, or unreliable links.Lessons • • • Configure Sites and Subnets Configure the Global Catalog and Application Partitions Configure Replication Lab : Configure Sites and Subnets • • Exercise 1: Configure the Default Site Exercise 2: Create Additional Sites Lab : Configure the Global Catalog and Application Partitions • • • Exercise 1: Configure a Global Catalog Exercise 2: Configure Universal Group Membership Exercise 3: Examine DNS and Application Directory Partitions Lab : Configure Replication • • • • • Exercise 1: Exercise 2: Exercise 3: Exercise 4: Exercise 5: Create a Connection Object Create Site Links Move Domain Controllers into Sites Designate a Preferred Bridgehead Server Configure Intersite Replication After completing this module, students will be able to: • Configure sites and subnets • • • • • • Understand domain controller location and manage domain controllers in sites Configure replication of the partial attribute set to global catalog servers Implement universal group membership caching Understand the role of application directory partitions Configure replication topology with connection objects, bridgehead servers, site links, and site link bridges Report, analyze, and troubleshoot replication with repadmin.exe and dcdiag.exe Monitoring and Maintaining Windows Server 2008 Servers This module explains how to monitor and maintain Windows Server 2008 servers. Lessons • • • • • • • Planning Monitoring Tasks Calculating a Server Baseline Measuring Performance Objects Selecting Appropriate Monitoring Tools Planning Notification Methods Overview of Windows Server 2008 Maintenance Tasks Automating Windows Server 2008 Maintenance Lab : Identifying Windows Server 2008 Monitoring Requirements • • Evaluating Performance Metrics Monitoring Performance Metrics Lab : Configuring Windows Server 2008 Monitoring • • • Configuring Data Collector Sets Monitoring Extension Exercise Automating Maintenance Tasks After completing this module, students will be able to: • • • • • • • • Plan monitoring tasks. Determine an appropriate server baseline. Determine objects and counters to monitor based on server role. Analyze key performance counters. Select appropriate monitoring tools. Identify appropriate notification methods. Create a server management task schedule for Windows Server 2008. List automated maintenance tools for Windows Server 2008. Configuring and Managing Storage Technologies This module explains how to manage storage using File Server Resource Manager, configure quota management, implement file screening and manage storage reports. Lessons • • • • • • Windows Server 2008 Storage Management Overview Managing Storage Using File Server Resource Manager Configuring Quota Management Implementing File Screening Managing Storage Reports Understanding Storage Area Networks Lab : Installing the FSRM Role Service • Installing the FSRM Role Service Lab : Configuring Storage Quotas • Configuring Storage Quotas Lab : Configuring File Screening • Configuring File Screening Lab : Generating Storage Reports • Generating Storage Reports After completing this module, students will be able to: • • • • • • Describe storage management solutions included in Windows Server 2008. Manage storage using FSRM. Configure quota management using FSRM. Implement file screening using FSRM. Manage storage reports. Troubleshoot storage issues. Partie PowerShell Automating Active Directory Administration This module introduces the concept of Active Directory administrative automation. It explains how to retrieve, create, modify, move, and remove objects in the Active Directory. It focuses on PowerShell-centric techniques rather than scripting, and heavily leverages on basic and advanced pipeline techniques covered in previous modules. Lessons • • • Active Directory Automation Overview Managing Users and Groups Managing Computers and Other Directory Objects Lab : Managing Users and Groups • • • Retrieving a filtered list of users from Active Directory Resetting user passwords and address information Disabling users that belong to a specific group Lab : Managing Computers and Other Directory Objects • • • • Listing all computers that appear to be running a specific operating system according to Active Directory information Creating a report showing all Windows Server 2008 R2 servers Managing fine-grained password policies in Active Directory Discovering Organizational Units that are not protected against accidental deletion After completing this module, students will be able to: • • • Give an overview of Active Directory automation. Manage Users and Groups using Windows PowerShell. Manage Computers and Other Active Directory Objects using Windows PowerShell. Windows PowerShell Scripts This module introduces basic Windows PowerShell scripts that execute a batch of shell commands in a single operation. It points out the security concerns associated with scripting, and how to configure and control the shell’s security settings that relate to scripting. It also explains how to write basic scripts that execute batches of commands, and how to parameterize scripts in order to make them more flexible in a variety of situations. Lessons • • • Script Security Basic Scripts Parameterized Scripts Lab : Writing Windows PowerShell Scripts • • • Executing scripts Using positional script parameters Using named script parameters After completing this module, students will be able to: • • • Identify security concerns associated with scripting. Write basic scripts. Write parameterized scripts. Background Jobs and Remote AdministrationThis module explains how to work with Windows PowerShell’s background jobs and remote administration functionality. It shows how to create, monitor, and manage local background jobs, and receive results from completed jobs. It also covers how to configure Windows PowerShell remoting both locally and in a domain environment. This module describes how to create and manage session connections to remote computers, and explain how to use those session connections in one-to-one remote shell instances as well as one-to-many remote command invocation. Finally, it shows how to invoke remote commands as background jobs, and how to manage those jobs and receive results from them.Lessons • • Working with Background Jobs Using Windows PowerShell Remoting Lab : Working with Background Jobs • • • • • • • Using background jobs with WMI Using background jobs for local computers Receiving the results from a completed job Removing a completed job Waiting for a background job to complete Stopping a background job before it completes Working with the properties of a job Lab : Using Windows PowerShell Remoting • • • • Interactive remoting Fan-out remoting Fan-out remoting using background jobs Saving information from background jobs After completing this module, students will be able to: • • Work with Background Jobs. Use Windows PowerShell Remoting. Automating Windows Server 2008 R2 AdministrationThis module gives an opportunity to complete several realworld administration tasks related to Windows Server 2008 R2. It provides minimal instruction in how to use the cmdlets and techniques required to accomplish the lab portion of this module; instead, it lets students rely on the skills they have learned in the preceding modules of this course.Lessons • • • • • • Windows Server 2008 R2 Modules Overview Server Manager Cmdlets Overview Group Policy Cmdlets Overview Troubleshooting Pack Overview Best Practices Analyzer Cmdlets Overview IIS Cmdlets Overview Lab : Using the Server Manager Cmdlets • • • • Listing all currently installed features Comparing objects Installing a new server feature Exporting current configuration to XML Lab : Using the Group Policy Cmdlets • • • • Listing all the Group Policy Objects in the domain Creating a text-based report Creating an HTML report Backing up all Group Policy Objects Lab : Using the Troubleshooting Pack Cmdlets • • • Importing the Troubleshooting Pack module Solving an end-user problem interactively Solving a problem using answer files Lab : Using the Best Practice Analyzer Cmdlets • • • Importing the Best Practice module Viewing existing models Running a Best Practices scan Lab : Using the IIS Cmdlets • • • • • • Importing the IIS module Creating a new web site Backing up IIS Modifying web site bindings Using the IIS PSDrive Restoring an IIS Configuration After completing this module, students will be able to: • • • • • • Give Give Give Give Give Give an an an an an an overview overview overview overview overview overview of of of of of of Windows Server 2008 Modules. Server Manager Cmdlets. Group Policy Cmdlets. Troubleshooting Pack. Best Practices Analyzer Cmdlets. IIS Cmdlets.