TestOut Windows Server Pro: Manage and Administer – English 3.1.x LESSON PLAN Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Table of Contents Course Overview .................................................................................................. 4 Course Introduction for Instructors ........................................................................ 5 Section 1.1: Active Directory Overview ................................................................. 7 Section 1.2: Speeding Up Authentication .............................................................. 8 Section 1.3: Single Master Operations Roles (FSMO) .......................................... 9 Section 1.4: Read Only Domain Controllers (RODCs) ........................................ 11 Section 1.5: Virtual Domain Controllers .............................................................. 13 Section 1.6: Service Accounts ............................................................................ 14 Section 1.7: Maintaining Active Directory ............................................................ 16 Section 1.8: Restoring Active Directory ............................................................... 18 Section 2.1: Group Policy Foundation ................................................................. 20 Section 2.2: Administrative Templates ................................................................ 23 Section 2.3: Folder Redirection ........................................................................... 25 Section 2.4: Software Deployment ...................................................................... 26 Section 2.5: Security Settings ............................................................................. 28 Section 2.6: Password and Account Policies ...................................................... 30 Section 2.7: Advanced Auditing .......................................................................... 32 Section 2.8: Preferences ..................................................................................... 34 Section 2.9: Group Policy Management .............................................................. 36 Section 2.10: Management Delegation ............................................................... 38 Section 3.1: File Server Resource Manager ....................................................... 39 Section 3.2: Distributed File System ................................................................... 41 Section 3.3: Distributed File System Replication................................................. 43 Section 3.4: File Encryption ................................................................................ 45 Section 3.5: Disk Encryption ............................................................................... 47 Section 4.1: DNS Name Resolution .................................................................... 49 Section 4.2: DNS Forwarding and Delegation .................................................... 50 Section 4.3: DNS Zone ....................................................................................... 52 Section 4.4: DNS Zone Management ................................................................. 54 Section 4.5: DNS Records .................................................................................. 56 Section 4.6: DNS Options ................................................................................... 58 Section 5.1: Routing............................................................................................ 60 Section 5.2: Network Address Translation (NAT)................................................ 62 Section 5.3: Virtual Private Networks (VPN) ....................................................... 63 Section 5.4: Network Policy Server ..................................................................... 65 Section 5.5: RADIUS .......................................................................................... 67 Section 5.6: Network Access Protection ............................................................. 69 Section 5.7: DirectAccess ................................................................................... 71 Section 6.1: Windows Software Update Services (WSUS) ................................. 73 Section 6.2: Windows Deployment Services (WDS) ........................................... 76 Section 6.3: WDS Image Management ............................................................... 78 Section 6.4: Performance Monitor....................................................................... 80 Section 6.5: Event Viewer ................................................................................... 82 Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 6.6: Network Monitor .............................................................................. 84 Windows Server Pro: Manage and Administer Practice Exams .......................... 85 Microsoft 70-411 Practice Exams ....................................................................... 86 Appendix A: Approximate Time for the Course ................................................... 87 Appendix B: Exam 70-411: Administering Windows Server 2012 Objectives ..... 90 Appendix C: Windows Server Pro: Manage and Administer Objectives ............. 96 Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Course Overview This course prepares students for TestOut’s Windows Server Pro: Manage and Administer exam and Microsoft’s 70-411 certification exam. Module 1 – Active Directory This module teaches the students details about using Active Directory. This will include authentication, FSMO, RODCs, and maintaining and restoring Active Directory. Module 2 – Group Policy In this module students will learn about creating, configuring and managing GPOs. Module 3 – File Services This module teaches students about controlling and organizing file resources and protecting access to data. Module 4 – DNS This module examines name resolution, resolving queries for records, creating and managing DNS zones, and creating DNS records. Module 5 – Remote Access Management In this module students will learn concepts about managing remote access. This includes understanding and configuring routers, securing communications over an untrusted network, authorizing remote clients and protecting access to a network. Module 6 – Server Management This module discusses management of server such as, updating software, deploying operating systems, and monitoring server, logs, and network traffic. Practice Exams In Practice Exams students will have the opportunity to test themselves and verify that they understand the concepts and are ready to take the certification exam. The practice exams contain examples of the types of questions that a student will find on the actual exam: Microsoft 70-411 Practice Exams Windows Server Pro: Manage and Administer Practice Exams Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Course Introduction for Instructors This course provides students with the knowledge to become industry certified as a Windows professional. It prepares the student for the following exams: Microsoft’s 70-411: Administering Windows Server 2012 TestOut’s Windows Server Pro: Manage and Administer Microsoft’s 70-411: Administering Windows 2012 certification measures the students’ ability to administer, configure, and manage Windows Server 2012 operating system. The following knowledge domains are addressed: Deploy, manage, and maintain servers Configure file and print services Configure network services and access Configure a network policy server infrastructure Configure and manage Active Directory Configure and manage Group Policy Note: MS 70-411 objectives are listed in Appendix B: 70-411: Administering Windows Server 2012 Objectives TestOut’s Windows Server Pro: Manage & Administer certification measures the students’ ability to perform real-world job skills using the Windows Server 2012 operating system. The following knowledge domains are addressed: Active Directory Management Group Policy Configuration File Services Management DNS Configuration Routing Configuration Routing and Remote Access Configuration Deployment Management Note: TestOut’s Windows Server Pro: Manage & Administer objectives are listed in Appendix C: Windows Server Pro: Manage and Administer Objectives The section introductions in LabSim and the lesson plans list the objectives that are met for each of the exams in that section. Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. The following icons are placed in front of lesson items in LabSim to help students quickly recognize the items in each section: = Demonstration = Exam = Lab/Simulation = Text lesson or fact sheet = Video The video and demonstration icons are used throughout the lesson plans to help instructors differentiate between the timing for the videos and demonstrations. In the lesson plans the Total Time for each section is calculated by adding the approximate time for each section which is calculated using the following elements: Video/demo times Approximate time to read the text lesson (the length of each text lesson is taken into consideration) Simulations (5 minutes is assigned per simulation. This is the amount of time it would take for a knowledgeable student to complete the lab activity. Plan that the new students will take much longer than this depending upon their knowledge level and computer experience.) Questions (1 minute per question) Note: Appendix A: Approximate Time for the Course contains the approximate time for each section which are totaled for the entire course. Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 1.1: Active Directory Overview Summary This section provides an overview of Active Directory. Concepts covered include: Active Directory: o Centralized database o Contains user account and security information o Hierarchical framework with the following components: Domain Object Organization Unit (OU) Generic Containers Trees and Forests Domain Controller Sites and Subnets o NTDS.dit database file: Data table Link table Security descriptor (SD) Lecture Focus Questions: Why is DNS important for Active Directory? What is the purpose of the schema? What are the advantages of using organizational units over generic containers? What is the difference between a tree and a forest? How can you tell when a new domain starts a new tree? How does a site differ from a domain? Video/Demo 1.1.1 Overview of Active Directory Time 8:13 Number of Exam Questions 7 questions Total Time About 20 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 1.2: Speeding Up Authentication Summary This section provides information about speeding up authentication in the case of multiple-domain and multiple-site design. Features to improve performance in these situations include: Global Catalog Universal Group Membership Caching (UGMC) Global Catalog vs UGMC Lightweight Directory Access Protocol (LDAP) Students will learn how to: Add or remove the global catalog from a domain controller. Enable Universal Group Membership Caching for a site. Windows Server Pro: Manage and Administer Exam Objectives: 1.0 Active Directory Management. o Implement Global Catalog Servers o Implement Universal Group Membership Caching (UGMC) 70-411 Exam Objectives: 502. Configure Domain Controllers. o Configure Universal Group Membership Caching (UGMC) Lecture Focus Questions: What are the advantages of having more than one Global Catalog server? Why does a single domain network not need a Global Catalog server? What is the function of Universal Group Membership caching? When should Universal Group Membership caching be implemented? When would you use global catalog servers instead? Video/Demo 1.2.1 Authentication Overview 1.2.2 Global Catalog Servers and UGMC Total Time 4:47 2:23 7:10 Lab/Activity Configure Global Catalog Servers Enable Universal Group Membership Caching Number of Exam Questions 8 questions Total Time About 30 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 1.3: Single Master Operations Roles (FSMO) Summary This section provides details about Single Master Operations Roles (FSMO). Students will learn about: The role of operations master roles Operation roles at the forest levels: o Schema master o Domain naming master Operation roles at the domain levels: o Relative ID (RID) Master o Primary Domain Controller (PDC) Emulator o Infrastructure Master Considerations about using operations master roles Recommendations when designing operations master roles placement Managing operations master role placement Tools to manage operations master role placement: o MMC Snap-in Management Tool o Ntdsutil.exe Details about the standby operations master Students will learn how to: Transfer operation master roles among domain controllers. Troubleshoot operation master roles to diagnose network problems. Seize an operation master role in the case of a failed role operations master. Windows Server Pro: Manage and Administer Exam Objectives: 1.0 Active Directory Management. o Manage Flexible Single-Master Operation (FSMO) roles 70-411 Exam Objectives: 502. Configure Domain Controllers. o Transfer and seize operations masters Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Lecture Focus Questions: What is the purpose of an operation master role server? What is the function of a PDC emulator? What does the infrastructure master do? Which operations master roles are located at the forest level? How many of these roles are there in a forest? How many domain operations masters are in a forest? You are installing a new domain controller in a new domain in an existing forest. How many operation master roles will that server hold? What might happen if the RID master becomes unavailable? Which role(s) should be placed on a global catalog server? Which roles should not? What is the difference between transferring a role and seizing a role? Video/Demo 1.3.1 Overview of FSMO Roles 1.3.2 FSMO Role Transfer/Failure 1.3.3 Viewing FSMO Roles 1.3.5 Transferring FSMO Roles 1.3.6 Seizing FSMO Roles Total Time 10:00 2:38 4:11 4:18 4:41 25:48 Lab/Activity Transfer RID and PDC Masters Transfer the Infrastructure Master Troubleshoot Operations Masters Number of Exam Questions 7 questions Total Time About 55 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 1.4: Read Only Domain Controllers (RODCs) Summary This section provides information about deploying Read Only Domain Controllers (RODCs). Details covered include: Features of RODCs: o Administrator role separation o Unidirectional replication o Read-only data o Password replication o DNS Server service Installing RODC Students will learn how to: Pre-create RODC accounts in Active Directory. Install an RODC. Windows Server Pro: Manage and Administer Exam Objectives: 1.0 Active Directory Management. o Implement a Read Only Domain Controller (RODC) 70-411 Exam Objectives: 502. Configure Domain Controllers. o Install and configure a read-only domain controller (RODC) Lecture Focus Questions: What is the purpose of administrator role separation? How does unidirectional replication protect your network? How does using an RODC allow for domain logon in the event of a WAN link failure? How do DNS zones work differently on an RODC? What are the forest functional level requirements for installing an RODC? Which operating system versions must run on the PDC emulator? Which permissions do you need to install an RODC? Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Video/Demo 1.4.1 Read Only Domain Controllers (RODCs) 1.4.3 Pre-creating the RODC Account Total Time 6:46 7:19 14:05 Lab/Activity Create RODC Accounts Number of Exam Questions 6 questions Total Time About 30 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 1.5: Virtual Domain Controllers Summary This section discusses creating virtual domain controllers. Details covered include: Issues concerning creating a snapshot of a Virtual Domain Controller and later reverting back to earlier snapshots o Update Sequence Number (USN) rollback o VM-Generation-ID System requirements: o Supported hypervisors o Supported guest operating systems Virtual Domain Controller Cloning System prerequisites before cloning a virtual domain controller: o Supported hypervisors o Supported guest operating systems o PDC Emulator The basic steps for cloning a virtual domain controller 70-411 Exam Objectives: 502. Configure Domain Controllers. o Configure Domain Controller cloning Lecture Focus Questions: Which versions of the Windows operating system support VMGeneration-ID identifiers? Why is the VM-Generation-ID stored in two different locations? What is the advantage of creating a new virtual domain controller by cloning an existing virtual domain controller? Which group must the computer object for the domain controller be a member of to be cloned? Video/Demo 1.5.1 Domain Controller Cloning Time 7:41 Number of Exam Questions 6 questions Total Time About 20 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 1.6: Service Accounts Summary This section examines using service accounts to allow an application or service to interact with the operating system. Concepts covered include: Categories of service accounts: o Built-in local user account o Domain user account o Managed service account o Virtual account o Group managed service account Requirements to use managed or virtual accounts Common service account cmdlets: o New-ADServiceAccount o Get-ADServiceAccount o Set-ADServiceAccount o Remove-ADServiceAccount o Install-ADServiceAccount Considerations when using group managed service accounts Students will learn how to: Create a service account. Create a managed service account and a group managed service account. 70-411 Exam Objectives: 501 Configure service authentication. o Create and configure Service Accounts o Create and configure Group Managed Service Accounts o Create and configure Managed Service Accounts o Configure Kerberos delegation o Manage Service Principal Names (SPNs) o Configure virtual accounts Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Lecture Focus Questions: What are the differences between a managed service account and a virtual service account? Which operating system is required to manage a service with a managed service account? Which Windows PowerShell cmdlet will create a new managed service account? If you have a domain controller running Windows Server 2003, how can you still use a virtual account? Video/Demo Time 1.6.1 Overview of Service Accounts 2:55 1.6.2 Kerberos Delegation 2:33 1.6.3 Creating Service Accounts 10:32 1.6.4 Creating Managed Service Accounts 5:13 1.6.5 Creating Group Managed Service Accounts 7:43 1.6.6 Configuring Virtual Accounts 1:25 Total 30:21 Number of Exam Questions 8 questions Total Time About 45 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 1.7: Maintaining Active Directory Summary In this section students will learn details about maintaining Active Directory. Concepts covered include: Considerations when performing a system state backup Using the Group Policy Management console to back up and restore only Group Policy data Steps to make and use snapshots of the Active Directory database Tasks that can be performed from the command using the NTDSUtil command o Changing the recovery mode password o Cleaning the metadata o Manually compacting the database o Manually moving the database and log files Students will learn how to: Back up Active Directory and the SYSVOL. Create and mount an Active Directory snapshot. Use the NTDSUtil command to manage and optimize Active Directory from the command line. Windows Server Pro: Manage and Administer Exam Objectives: 1.0 Active Directory Management. o Backup Active Directory 70-411 Exam Objectives: 503 Maintain Active Directory. o Back up Active Directory and SYSVOL o Manage Active Directory offline o Optimize an Active Directory database o Clean up metadata o Configure Active Directory snapshots Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Lecture Focus Questions: Which backup type should you perform if you want to protect Active Directory? What are the requirements for performing a system state backup? When using the dsamain command with the /dbpath option to expose a snapshot through an LDAP server, why can't you use port 389? Which port should you use? Using NTDSUtil, which tasks can you perform to manage the Active Directory? Video/Demo 1.7.1 Backing up Active Directory 1.7.2 Backing up AD and the SYSVOL 1.7.4 Managing AD Snapshots 1.7.7 Active Directory Maintenance 1.7.8 Using NTDSUtil Total Time 2:10 2:36 7:51 4:17 12:25 29:19 Lab/Activity Back up Active Directory Number of Exam Questions 8 questions Total Time About 50 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 1.8: Restoring Active Directory Summary This section discusses methods of restoring Active Directory. Details include: Active Directory Recycle Bin: o Requirements o Enabling the Recycle Bin Steps to enable the Recycle Bin in an existing forest Considerations when using the Recycle Bin to restore delete Active Directory objects Types of restoration available when restoring Active Directory: o Nonauthoritative o Authoritative Methods for performing a domain controller restore: o Reinstalling Active Directory o Nonauthoritative system state restore o Authoritative system state restore o Critical volume or Bare metal recovery Set the Burflags registry settings at the domain controller to perform a restore to all replicas in the domain: o D2 performs a nonauthoritative restore o D4 performs an authoritative restore Methods to restore lost Active Directory data: o LostAndFound container o Nonauthoritative restore o Authoritative restore o Active Directory Recycle Bin o Database snapshot Warning and solution of a problem where group membership will not be restored when you restore Active Directory objects with an authoritative restore Students will learn how to: Use the AD Recycle Bin to recover AD deleted objects. Use the Administrative Center to recover a user. Use the PowerShell command to recover a user. Perform an authoritative restore using NTDSUtil. Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. 70-411 Exam Objectives: 503 Maintain Active Directory. o Perform object- and container-level recovery o Perform Active Directory restore o Configure and restore objects by using the Active Directory Recycle Bin Lecture Focus Questions: What is the difference between an authoritative and a nonauthoritative restore? Why might group membership not be restored with an authoritative restore? When would this problem exist and how can you overcome it? Which forest functional level is required for the Active Directory Recycle Bin? What are the differences when a deleted object lifetime expires versus when a recycled object lifetime expires? Video/Demo 1.8.1 Restoring Active Directory 1.8.2 Active Directory Recycle Bin 1.8.4 AD Restore Total Time 6:56 6:28 10:00 23:24 Number of Exam Questions 12 questions Total Time About 45 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 2.1: Group Policy Foundation Summary This section discusses creating and managing Group Policy objects. Details include: GPO settings: o Undefined o Defined Considerations when you configure GPO settings Intervals that Windows refreshes the effective Group Policy settings Gpupdate command switches to manually refresh group policy settings: o No switch o /force o /target:user o /target:computer o /boot o /logoff Group Policy inheritance: o The order in which GPOs are applied o Effective GPO settings o Categories: Computer policies User policies Methods to customize how GPO settings are applied: o Block inheritance o Enforced o GPO Permissions o Disabling a GPO link o Disabling a part of the GPO o WMI filtering o Loopback processing o Slow link detection o Group Policy caching o Account policies Guidelines when you use GPOs to deploy GPOs Students will learn how to: Create and link Group Policy objects. Modify and control Group Policy processing order. Control how group policies are processed by configuring Group Policy slow link detection and loopback processing. Troubleshoot Group Policy from a workstation using gpresult and RSOP. Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Troubleshoot Group Policy from a server using Group Policy Modeling and Group Policy Results. Block inheritance to domain controllers and member servers. Windows Server Pro: Manage and Administer Exam Objectives: 2.0 Group Policy Configuration. o Manage Group Policy processing order 70-411 Exam Objectives: 601 Configure Group Policy processing. o Configure processing order and precedence o Configure blocking of inheritance o Configure enforced policies o Configure security filtering and WMI filtering o Configure loopback processing o Configure and manage slow-link processing o Configure client-side extension (CSE) behavior Lecture Focus Questions: What is the difference between deleting a GPO and deleting a GPO link? What is an undefined GPO setting? How does this affect the effective settings for a user or computer? When are Group Policy settings refreshed? How do you manually refresh Group Policy settings? What will determine the effective Group Policy setting when an individual setting is configured in two different GPOs? When are computer policies enforced? User policies enforced? How do you prevent inheritance from being blocked for a specific GPO? Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Video/Demo 2.1.1 Group Policy Processing Order 2.1.2 Linking GPOs 2.1.3 Modifying GPO Processing Order 2.1.4 Modifying GPO Processing Order 2.1.5 Loopback Processing and Slow Link Detection 2.1.6 Loopback Processing and Slow Link Detection 2.1.7 Configuring Group Policy Caching 2.1.9 Troubleshooting Group Policy Total Time 4:51 4:04 4:34 8:54 2:25 8:16 3:54 8:51 45:49 Lab/Activity Control GPO Inheritance Configure GPO Permissions Number of Exam Questions 10 questions Total Time About 70 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 2.2: Administrative Templates Summary This section discusses using Administrative Templates. Concepts covered include: Prior to Windows Server 2008, the Administrative Template format was .adm files The process to work with .adm files Older adm file format has been replaced on Windows Server 2008 (and later) by the following: o .admx files o .adml files ADMX files are saved on the local computer in the %systemroot%\PolicyDefinitions folder The central storage location for .admx and .adml files on a domain controller is SYSVOL\domain_name\Policies\PolicyDefinitions folder Students will learn how to: Import custom Administrative Templates. Use the ADMX Migrator to convert older .adm Administrative Templates to the new .admx format. Configure property filters for Administrative Templates. Create a Central Store to share .admx files with multiple computers. Windows Server Pro: Manage and Administer Exam Objectives: 1.0 Group Policy Configuration. o Create custom administrative templates by importing GPOs 70-411 Exam Objectives: 602 Configure Group Policy settings. o Configure settings including software installation, folder redirection, scripts, and administrative template settings o Import security templates o Import custom administrative template file o Convert administrative templates using ADMX Migrator o Configure property filters for administrative templates Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Lecture Focus Questions: What is the Administrative Template central store and where is it located? What are the advantages of the .admx file format? What is the function of .adml files? Video/Demo 2.2.1 Custom Administrative Templates 2.2.2 Importing Custom Administrative Templates 2.2.4 Converting Administrative Templates 2.2.5 Configuring Property Filters 2.2.6 Central Stores 2.2.7 Creating a Central Store 2.2.8 Exploring Admin Template Settings Total Time 1:50 3:58 4:06 2:18 1:45 3:52 6:48 24:37 Lab/Activity Import a GPO Number of Exam Questions 6 questions Total Time About 35 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 2.3: Folder Redirection Summary In this section students will learn the benefits of folder redirection and how to configure folder redirection. Students will learn how to: Configure folder redirection to move the contents of the Documents folder to a new location. 70-411 Exam Objectives: 602 Configure Group Policy settings. o Configure settings including software installation, folder redirection, scripts, and administrative template settings Lecture Focus Questions: Why would you choose to use folder redirection? What is the difference between basic redirection and advanced redirection? A folder that has been redirected appears to be on the local system, but where is it actually stored? Video/Demo 2.3.1 Folder Redirection 2.3.2 Configuring Folder Redirection Total Time 1:52 3:59 5:51 Number of Exam Questions 5 questions Total Time About 10 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 2.4: Software Deployment Summary In this section students will learn about the software deployment lifecycle. Details in this section include: Steps in the software deployment lifecycle: o Plan o Deploy o Manage (Upgrade) o Remove Guidelines when you manage software distribution Students will learn how to: Assign and publish software installer packages. Configure software installation packages to customize deployment and removal. Windows Server Pro: Manage and Administer Exam Objectives: 2.0 Group Policy Configuration. o Deploy software using Group Policy 70-411 Exam Objectives: 602 Configure Group Policy settings. o Configure settings including software installation, folder redirection, scripts, and administrative template settings Lecture Focus Questions: What is the difference between assigned and published software? Why should you use the UNC path to an installer package rather than the local path? What does it mean when a user or computer is outside of the scope of management for a software installation package? What happens to the software when this condition exists? Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Video/Demo 2.4.1 Software Deployment 2.4.2 Deploying Software with a GPO Total Time 2:43 14:38 17:21 Lab/Activity Assign Software Deploy Software 1 Deploy Software 2 Number of Exam Questions 14 questions Total Time About 50 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 2.5: Security Settings Summary This section examines the following common GPO security setting categories: Account Policies Local Policies/Audit Policy Local Policies/User Rights Assignment Local Policies/Security Options Windows Firewall with Advanced Security Network List Manager Policies Public Key Policies Software Restriction Policies Application Control Policies IP Security Policies Advanced Audit Policy Configuration Event Log Restricted Groups System Services Registry File System Wireless Network Students will learn how to: Configure, save, and import a security template. Windows Server Pro: Manage and Administer Exam Objectives: 2.0 Group Policy Configuration. o Implement the following GPO policies: Security Advanced audit 70-411 Exam Objectives: 602. Configure Group Policy settings. o Import security templates Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Lecture Focus Questions: What is the difference between a user right and a security option? Under what conditions are Account Policies in effect? What are some of the User Rights Assignments you might consider using? What is the function of the Network List Manager Policies? Video/Demo 2.5.1 Security Options 2.5.2 Creating Security Templates Total Time 1:43 10:10 11:53 Lab/Activity Configure Security Options Number of Exam Questions 7 questions Total Time About 30 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 2.6: Password and Account Policies Summary This section covers password and account policies. Concepts covered include: Password Policy: o Enforce password history o Maximum password age o Minimum password age o Minimum password length o Password must meet complexity requirements o Store passwords using reversible encryption Account Lockout Policy: o Account lockout duration o Account lockout threshold o Reset account lockout after Considerations when managing account policies Kerberos policies: o Enforce user logon restrictions o Maximum lifetime for service ticket o Maximum lifetime for user ticket o Maximum lifetime for user ticket renewal o Maximum tolerance for computer clock synchronization The role of granular password policies Facts about granular password policies Using ADSI Edit to create a PSO Managing granular passwords using Active Directory Administrative Center Students will learn how to: Configure and manage Account Policy settings. Use ADSI Edit to configure granular password policy settings. Windows Server Pro: Manage and Administer Exam Objectives: 2.0 Group Policy Configuration. o Implement the following GPO policies: Account Fine-grained password 70-411 Exam Objectives: 504. Configure account policies. Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. o o o o o o Configure domain user password policy Configure and apply Password Settings Objects (PSOs) Delegate password settings management Configure local user password policy Configure account lockout settings Configure Kerberos policy settings Lecture Focus Questions: Users in a network have to change their passwords every 30 days, but many users have reported that they simply enter the same password to make the change. Which policy can you configure to prevent this? What is the effect of setting the minimum password age account policy to 5 days? How can you prevent users from creating passwords like desk, mom, chair, or office? What is the effect of setting the account lockout policy to 0? What happens when you configure the Account Policies settings in a GPO linked to an OU? How can you configure different account policy settings for different users? Which object types can you associate with a granular password policy? A user has a granular password policy applied directly to the user account, and a different policy applied to a group of which the user is a member. Which policy will be in effect? Video/Demo Time 2.6.1 Password Policies 2.6.2 Configuring Domain User Password Policy 2.6.3 Configuring Account Lockout 2.6.4 Configuring Local Password Policies 2.6.5 Configuring Kerberos Policy Settings 2.6.8 Creating a Fine-grained Password Policy Total 2:09 4:30 2:18 3:11 6:47 9:25 28:20 Lab/Activity Configure Account Policies Create a Fine-grained Password Policy Number of Exam Questions 14 questions Total Time About 60 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 2.7: Advanced Auditing Summary This section provides information about 53 new auditing capabilities that have been integrated with Group Policy. Concepts covered include: Details about the advanced audit policy configuration Categories of the 53 new auditing policy settings: o Account Logon o Account Management o Detailed Tracking o DS Access o Logon/Logoff o Object Access o Policy Change o Privilege Use o System o Global Object Access Auditing Students will learn how to: Use Group Policy to enforce auditing and secure audit logs. Windows Server Pro: Manage and Administer Exam Objectives: 2.0 Group Policy Configuration. o Implement the following GPO policies: Advanced audit 70-411 Exam Objectives: 204. Configure advanced audit policies. o Implement auditing using Group Policy and AuditPol.exe o Create expression-based audit policies o Create removable device audit policies Lecture Focus Questions: What is the difference between auditing for success and auditing for failure? How can you configure auditing to track changes to Active Directory objects? What is the result of excessive auditing? Why should you design periodic reviews of audit logs? Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Video/Demo 2.7.1 Advanced Audit Policies 2.7.2 Auditing Folder Access Total Time 7:22 14:46 22:08 Lab/Activity Configure Advanced Auditing Configure Removable Device Auditing Number of Exam Questions 12 questions Total Time About 45 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 2.8: Preferences Summary This section discusses using Group Policy preferences to configure, deploy, and manage operating system and application settings that you cannot manage using Group Policy settings. Details covered include: Comparison of characteristics of Group Policy preferences to Group Policy settings Facts about Group Policy preferences Group Policy preferences: o Drive maps o Environment o Files Folders o Ini Files o Network shares o Registry o Shortcuts o Devices o Folder options o Internet settings o Local users and groups o Network options o Power options o Printers o Regional options o Scheduled tasks o Services o Start menu Students will learn how to: Configure Group Policy preferences in a GPO. Deploy shortcuts in a GPO. Windows Server Pro: Manage and Administer Exam Objectives: 2.0 Group Policy Configuration. o Configure Group Policy Preferences Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. 70-411 Exam Objectives: 604 Configure Group Policy preferences. o Configure Group Policy Preferences (GPP) settings including printers, network drive mappings, power options, custom registry settings, Control Panel settings, Internet Explorer settings, file and folder deployment, and shortcut deployment. o Configure item-level targeting Lecture Focus Questions: What is the main difference between Group Policy preferences and Group Policy settings? Which types of applications and operating system features does Group Policy preferences support? How do you configure Group Policy preferences? What are the operating system prerequisites for applying Group Policy preferences? Video/Demo 2.8.1 Group Policy Preferences 2.8.2 Configuring Group Policy Preferences Total Time 1:58 7:47 9:45 Lab/Activity Configure Internet Explorer Settings in a GPO Configure Power Options in a GPO Deploy Desktop Shortcuts in a GPO Number of Exam Questions 6 questions Total Time About 35 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 2.9: Group Policy Management Summary This section examines management of Group Policy objects. Concepts covered include: Considerations when you manage Group policy objects Methods to create another GPO from an existing GPO: o Copy o Backup and Import o Starter GPO Using cmdlets in the Group Policy module for Windows PowerShell to manage domain-based GPOs Common GPO management cmdlets include: o New-GPO o Copy-GPO o Get-GPO o Backup-GPO o Remove-GPO o Rename-GPO o Restore-GPO o Import-GPO o New-GPLink o Set-GPLink o Remove-GPLink o New-GPStarterGPO The dcgpofix command switches to restore the default group Policy objects to their original state: o /target:dc o /target:domain o /target:both o /ignoreschema Using the Remote Group Policy update Updating Group Policy using the Group Policy Management console Students will learn how to: Back up and restore a GPO. Create and configure a migration table to migrate domain-specific settings. Restore default GPOs to what they were initially when Active Directory was installed. Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Windows Server Pro: Manage and Administer Exam Objectives: 2.0 Group Policy Configuration. o Backup and restore GPOs 70-411 Exam Objectives: 603. Manage Group Policy objects (GPOs). o Back up, import, copy, and restore GPOs o Create and configure Migration Table o Reset default GPOs o Force Group Policy update Lecture Focus Questions: What is the difference between deleting a GPO and deleting a GPO link? How can you copy a GPO from one domain to another? How can you copy starter GPOs? Which tools can you use to manage GPOs and GPO links? When moving GPOs from one domain to another, how do you handle settings that are domain-specific and cannot be copied directly? Video/Demo 2.9.1 Group Policy Management 2.9.2 Managing GPOs 2.9.5 Migration Tables 2.9.6 Configuring Migration Tables 2.9.7 GPO Default Setting 2.9.8 Resetting GPO Defaults 2.9.9 Forcing Group Policy Updates Total Time 1:26 5:14 1:10 4:26 1:31 3:18 1:15 18:20 Lab/Activity Back Up a GPO Restore a GPO Number of Exam Questions 9 questions Total Time About 40 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 2.10: Management Delegation Summary This section examines delegating out Group Policy management. Students will learn how to: Create a GPO and delegate the management of particular tasks for all GPOs to a specified group. Use the Delegation of Control Wizard to delegate common administrative tasks. Windows Server Pro: Manage and Administer Exam Objectives: 2.0 Group Policy Configuration. o Delegate GPO management 70-411 Exam Objectives: 603. Manage Group Policy objects (GPOs). o Delegate Group Policy management Lecture Focus Questions: What is the two-step procedure required to delegate Group Policy object management? Which tools are required to complete a delegation of management? Video/Demo Time 2.10.1 GPO Management Delegation 2.10.2 Delegating GPO Management 2.10.4 Delegating Password Management 1:07 4:30 4:24 Total 10:01 Lab/Activity Delegate GPO Creation Delegate Administrative Control Number of Exam Questions 6 questions Total Time About 25 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 3.1: File Server Resource Manager Summary This section provides details of using the File Server Resource Manager to allow administrators to understand, control, and manage the quantity and type of data stored on their servers. Concepts covered include: FSRM is installed as a role service of the File Services role Key FSRM features: o Quotas o Notifications o File Screening o Storage Reports o File Classification o File Management Methods for configuring quotas for Windows Server: o NTFS Disk Quotas o FSRM Folder and Volume Quotas Students will learn how to: Configure volume and folder quotas. Create quota templates. Configure file screens and file screen exceptions. Generate FSRM reports for both quotas and overall file system use. Schedule FSRM reports. Windows Server Pro: Manage and Administer Exam Objectives: 3.0 File Services Management. o Configure FSRM quotas o Configure FSRM file screens 70-411 Exam Objectives: 202 Configure File Server Resource Manager (FSRM). o Install the FSRM role o Configure quotas o Configure file screens o Configure reports Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Lecture Focus Questions: What are the primary differences between disk quotas with NTFS and quotas implemented through FSRM? How does a soft quota differ from a hard quota? How do quota templates facilitate quota management? What is the difference between a quota and a file screen? How is an active file screen more restrictive than a passive file screen? How can you automatically assign classification information to files? What can you accomplish with the file expiration task? Video/Demo 3.1.1 File Server Resource Manager (FSRM) 3.1.2 Installing FSRM 3.1.4 FSRM Quotas 3.1.6 File Screens 3.1.8 Configuring Reports Total Time 2:49 1:07 4:59 4:41 3:32 17:08 Lab/Activity Add Role Services for FSRM Configure FSRM Quotas Configure FSRM File Screens Number of Exam Questions 15 questions Total Time About 50 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 3.2: Distributed File System Summary This section discusses using the Distributed File System (DFS) to provide a way to logically organize shared folders on multiple servers into a single logical folder hierarchy called a namespace. Concepts covered include: DFS Namespaces include the following components: o Namespace o Namespace server o Namespace root o Folder Namespace types and criteria: o Stand-alone o Domain-based Considerations when managing DFS Namespaces Students will learn how to: Create a DFS namespace with folders and targets. Add role services as required to support DFS and the appropriate replication method. Windows Server Pro: Manage and Administer Exam Objectives: 3.0 File Services Management. o Implement DFS replication 70-411 Exam Objectives: 201. Configure Distributed File System (DFS). o Install and configure DFS namespaces Lecture Focus Questions: What is the difference between the namespace root and a folder within DFS? If you have multiple namespace servers, which namespace type should you implement? Which namespace type and mode would you choose to support accessbased enumeration? If you have a single namespace server and that server fails, what happens to client access for folders within the DFS structure? Why? Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. How can you prevent users from adding or changing files in a replicated folder? Video/Demo 3.2.1 DFS Namespaces and Replication 3.2.2 Installing a DFS Namespace Total Time 4:54 4:38 9:32 Lab/Activity Add Role Services for DFS and Create a Namespace Number of Exam Questions 6 questions Total Time About 25 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 3.3: Distributed File System Replication Summary This section discusses using the Distributed File System replication to increase fault tolerance and improve access. Concepts covered include: Components that DFS replication uses to control replications: o Replication group o Replicated folder o Connection Considerations when configuring DFS Cloning the DFS database in Windows Server 2012 R2 Recovering a corrupted database using DFS Replication in Windows Server 2012 R2 Optimization strategies for DFS: o Fault tolerance o Referrals o Remote Differential Compression (RDC) o Polling o Staging o Single-master Students will learn how to: Configure DFS replication of folder targets. Create and configure a replication schedule. Manage and optimize DFS by configuring staging and fault tolerance. Windows Server Pro: Manage and Administer Exam Objectives: 3.0 File Services Management. o Implement DFS replication 70-411 Exam Objectives: 201. Configure Distributed File System (DFS). o Configure DFS Replication Targets o Configure Replication Scheduling o Configure Remote Differential Compression settings o Configure staging o Configure fault tolerance Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Lecture Focus Questions: When can you add a failover cluster to a DFS replication group? How does Remote Differential Compression conserve bandwidth? Adam, Bob, and Curt access different copies of a replicated folder and modify the same file simultaneously. When each of them saves the file, which file becomes the authoritative copy? What happens to the other copies of this file? Video/Demo 3.3.1 Staging and Fault Tolerance 3.3.2 Configuring DFS Replication Targets 3.3.3 Cloning the DFS Database 3.3.5 Optimizing DFS Total Time 12:00 6:53 10:58 10:00 39:51 Number of Exam Questions 9 questions Total Time About 55 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 3.4: File Encryption Summary In this section students will learn about protecting data through file and disk encryption. Concepts covered include: Components of EFS: o Encryption Process o Access to Encrypted Data o EFS-Related Group Policy o Encrypted Data Management o Remote Storage o Certificate Management Students will learn how to: Encrypt or decrypt a file or folder. Add authorized users to allow encrypted file access. Designate DRAs for file recovery. Configure EFS settings in Group Policy. Windows Server Pro: Manage and Administer Exam Objectives: 3.0 File Services Management. o Encrypt files and folders with EFS 70-411 Exam Objectives: 203. Configure file and disk encryption. o Configure the EFS recovery agent o Manage EFS and Bitlocker certificates including backup and restore Lecture Focus Questions: What is the importance of the DRA in the encryption process? Which users have access to encrypted files and folders? What is the relationship between encryption and compression? What is the significance of encrypting the pagefile? How does Rekeywiz affect your encryption deployment? Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Video/Demo 3.4.1 Overview of EFS 3.4.2 EFS Recovery Agents 3.4.3 Encrypting a Folder 3.4.4 Designating an EFS Recovery Agent 3.4.5 Managing EFS Certificates Total Time 2:25 2:38 8:38 11:49 6:31 32:01 Lab/Activity Encrypt a Folder Number of Exam Questions 11 questions Total Time About 50 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 3.5: Disk Encryption Summary In this section students will learn about using BitLocker to protect unauthorized data access on lost, stole or otherwise compromised systems. Concepts covered include: BitLocker key is required to access the contents of the encrypted volume BitLocker uses integrity checking BitLocker is only available on: o Windows Vista Ultimate and Enterprise editions o Windows 7 Ultimate and Enterprise editions o Windows 8 Professional and Enterprise editions o Windows Server 2008 or Windows Server 2008 R2 o Windows Server 2012 BitLocker is not installed by default BitLocker To Go Components of BitLocker: o BitLocker partition o Trusted Platform Module (TPM) o Non-TPM device support How BitLocker differs from the Encrypting File System (EFS) Security components of a BitLocker configuration: o TPM owner password o Recovery key o PIN o Startup key o Data volume key o Data Recovery Agent o Network Unlock BitLocker modes which determine the security level: o TPM-only o TPM with startup key o TPM with PIN o TPM with PIN and startup key o Without a TPM How to configure and manage BitLocker Students will learn how to: Generate recovery keys and create a BitLocker DRA. Configure BitLocker on a computer with a TPM. Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Windows Server Pro: Manage and Administer Exam Objectives: 3.0 File Services Management. o Encrypt the server hard disk with BitLocker 70-411 Exam Objectives: 203. Configure file and disk encryption. o Configure BitLocker encryption o Configure the Network Unlock feature o Configure BitLocker policies o Manage EFS and BitLocker certificates including backup and restore Lecture Focus Questions: When implementing BitLocker, why is it a good idea to run a system check before encrypting the drive? What is the difference in function between BitLocker and BitLocker To Go? When using BitLocker, what are the requirements of the Trusted Platform Module? How can you implement BitLocker without a TPM? What would happen if BitLocker were enabled, and the USB flash device which holds the key were to be lost? Video/Demo 3.5.1 BitLocker Disk Encryption 3.5.2 Configuring BitLocker Encryption Total Time 11:35 11:40 23:15 Lab/Activity Configure BitLocker with a TPM Number of Exam Questions 15 questions Total Time About 50 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 4.1: DNS Name Resolution Summary This section provides details of how DNS Name Resolution maps logical host names to IP addresses. Concepts covered include: A DNS server holds a database of hostnames and their corresponding IP addresses HOSTS file Components of the DNS hierarchy: o .dot domain (also called the root domain) o Top Level Domains (TLDs) (.com, .edu, .gov) o Second-level and additional domains o Hosts Fully Qualified Domain Name (FQDN) DNS is a distributed database Caching-only DNS DNS name resolution process for the client DNS name resolution process for the server Lecture Focus Questions: What is the purpose of DNS? How does an FQDN identify a host? What is the difference between a DNS server and a caching-only DNS server? What is the difference between forwarding and recursion? Video/Demo 4.1.1 Fully Qualified Domain Names 4.1.3 Name Resolution Total Time 3:20 8:17 11:37 Number of Exam Questions 11 questions Total Time About 25 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 4.2: DNS Forwarding and Delegation Summary This section provides details of using DNS forwarding and delegation to resolve queries for records. Concepts covered include: The role of a forwarder Methods to control the server’s use of forwarders: o Secondary zone o Stub zone o Conditional forwarder o Disable recursion Reasons to perform zone delegation Process to delegate a zone Students will learn how to: Create a root zone. Use DNS Manager to setup forwarding and conditional forwarding to resolve names. Create a delegation to enable name resolution. Windows Server Pro: Manage and Administer Exam Objectives: 4.0 DNS Configuration. o Configure DNS forwarders o Create DNS delegations 70-411 Exam Objectives: 301. Configure DNS zones. o Configure zone and conditional forwards o Configure zone and conditional forward storage in Active Directory o Configure zone delegation Lecture Focus Questions: What is the role of a forwarder? What could be a disadvantage of using secondary zones? Under what circumstances would you choose to set up conditional forwarding? When should you set up zone delegation? Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Video/Demo 4.2.1 Configuring Forwarding and Root Hints 4.2.4 Creating a Delegation Total Time 9:46 4:43 14:29 Lab/Activity Configure Forwarders Delegate Domains Number of Exam Questions 7 questions Total Time About 35 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 4.3: DNS Zone Summary This section discusses provides the basic information about creating and using DNS zones. Concepts covered include: Types of DNS zones: o Primary o Secondary o Active Directory-integrated o Stub Zones are classified as one of two types: o Forward lookup zone o Reverse lookup zone Details about zone transfers Tools to update of zone data: o DNS console o Dnscmd command An Active Directory-integrated zone stores DNS information in Active Directory rather than a zone file Students will learn how to: Create a standard primary zone and a standard secondary zone. Create a stub zone to refer requests over to the authoritative server. Create a Primary forward lookup zone and configure it to allow zone transfers to any server. Configure a reverse lookup zone. Create a new zone and configure the zone to be stored in Active Directory. Windows Server Pro: Manage and Administer Exam Objectives: 4.0 DNS Configuration. o Create the following types of DNS zones Primary Secondary Stub Reverse-lookup Active Directory-integrated Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. 70-411 Exam Objectives: 301. Configure DNS zones. o Configure primary and secondary zones o Configure stub zones Lecture Focus Questions: What is the difference between the name resolution of a forward lookup zone and a reverse lookup zone? What are the advantages of using an Active Directory-integrated zone? What are the main difference between a primary zone and a secondary zone? Which tools can you use to manually force an update of zone data? Which type of DNS server can host an Active Directory-integrated zone? What is the function of the Start of Authority (SOA) record? Video/Demo 4.3.1 Forward and Reverse Lookup Zones 4.3.2 Standard DNS Zones 4.3.3 AD Integrated Zones 4.3.6 Creating a New Zone Total Time 2:05 5:57 5:37 11:29 25:08 Lab/Activity Create Standard Zones Create a Reverse Lookup Zone Create an Active Directory-integrated Zone Number of Exam Questions 8 questions Total Time About 55 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 4.4: DNS Zone Management Summary This section discusses management of DNS zones. Concepts covered include: Details about configuring DNS zones Zone data is replicated based on the replication scope: o All domain controllers in this domain o All DNS servers in this domain o All DNS servers in this forest o Application partition Reverse Zone Name Format for: o IPv4 o IPv6 Students will learn how to: Change an existing zone to a different zone type. Configure the properties of an existing zone as needed. Disable zone transfers for a specified zone. Enable Dynamic DNS to minimize DNS administration. Windows Server Pro: Manage and Administer Exam Objectives: 4.0 DNS Configuration. o Manage zone transfers 70-411 Exam Objectives: 302. Configure DNS records. o Configure zone scavenging o Configure record options including Tim to Live (TTL) and weight o Configure secure dynamic updates Lecture Focus Questions: How does replicating DNS information to all domain controllers in the domain affect network traffic versus replicating to all DNS servers in the forest? Which type of zone would you create if you wanted to use secure dynamic updates? What is the purpose of PTR records? What is the zone name format for the reverse lookup network of 1375:2614:DDAB:EE21? Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Video/Demo 4.4.1 Configuring Zone Properties Time 7:24 Lab/Activity Disable Zone Transfers Configure a Partner DNS Solution Enable Dynamic DNS Updates Troubleshoot Dynamic DNS Number of Exam Questions 15 questions Total Time About 45 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 4.5: DNS Records Summary This section discusses DNS records which store entries for hostnames, IP addresses, and other information in the zone database. Details include: Common resource records: o SOA (Start of Authority) o NS (Name Server) o A (Host Address) o AAAA (Quad-A) o MX (Mail Exchanger) o CNAME (Canonical Name) o DNAME (Domain Alias) o SRV (Service Locator) o PTR (Pointer) o WINS and WINS-R Resource Records Considerations when managing resource records Using the dnscmd command to add a DNS record Students will learn how to: Create and configure an MX record to identify email servers. Configure the priority and weight of a SRV record to regulate the traffic to the records. Create A records and PTR records for hosts. Create CNAME records to be used as aliases to allow clients to access an intranet website. Use ping to troubleshoot DNS problems. Windows Server Pro: Manage and Administer Exam Objectives: 4.0 DNS Configuration. o Manage dynamic DNS updates 70-411 Exam Objectives: 302. Configure DNS records. o Create and configure DNS Resource Records (RR) including A, AAAA, PTR, SOA, NS, SRV, CNAME, and MX records Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Lecture Focus Questions: What information does an SOA record contain? What is the difference between an A and a quad-A record? How is the DNAME record similar to a CNAME record? Which are the most common DNS records? Video/Demo 4.5.1 DNS Record Types 4.5.2 Creating Common Records Total Time 6:19 9:44 16:03 Lab/Activity Create Host Records Create CNAME Records Troubleshoot DNS Records Number of Exam Questions 15 questions Total Time About 50 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 4.6: DNS Options Summary In this section students will learn about different DNS options that can be configured or controlled. Concepts covered in this section include: DNS Manager tabs to configure DNS server properties: o Interfaces o Forwarders o Root Hints o Debug Logging o Event Logging o Monitoring o Security o Advanced Configure DNS Round Robin Debug logging options to configure debug logging: o Packet direction o Packet contents o Transport protocol o Packet type o Other options o File path and name o Maximum size (bytes) Stale records and Time to Live (TTL) value Scavenging is controlled through a combination of DNS server and zone properties: o Zone properties No-refresh interval Refresh interval o DNS server properties: Scavenge Stale Resource Records Enable automatic scavenging of stale records o Considerations when configuring scavenging Students will learn how to: Enable DNS round robin on a DNS server. Enable scavenging of stale records on a DNS server. Enable scavenging of stale records and aging on Active Directory zones. Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Windows Server Pro: Manage and Administer Exam Objectives: 4.0 DNS Configuration. o Manage dynamic DNS updates Create DNS records Configure DNS Round Robin Configure DNS aging and scavenging 70-411 Exam Objectives: 302. Configure DNS records. o Configure record options including Time to Live (TTL) and weight o Configure round robin o Configure secure dynamic updates Lecture Focus Questions: How do stale records affect DNS server performance? When is a DNS record considered stale? How does the no-refresh interval affect scavenging? When should you activate debug logging? For what period of time? Where do you enable scavenging? Video/Demo 4.6.1 DNS Server Properties 4.6.2 Exploring DNS Server Properties Total Time 0:33 6:21 6:54 Lab/Activity Configure DNS Round Robin Configure DNS Aging and Scavenging Number of Exam Questions 9 questions Total Time About 35 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 5.1: Routing Summary This section discusses routing. The following details are covered: The role of routers Static route Route metric Default route Persistent route Managing routing table entries: o View the IPv4 or IPv6 routing table o Add an IPv4 static route o Change a route o Add an IPv6 static route o Delete a route Considerations when creating routes Characteristics of RIP Features of RIP that can be configured: o Packet Protocol o Authentication o Route Filters o Neighbors o Timers o Clean-up Updates o VLSM Students will learn how to: Install Routing and Remote Access on a server and configure it to function as a router. Enable LAN routing on a server using the Configure and Enable Routing and Remote Access wizard. Using metrics, configure static routes on a server with subnets to make additional networks accessible. Configure RIP by adding the RIP protocol and adding interfaces to run RIP. Windows Server Pro: Manage and Administer Exam Objectives: 5.0 Routing and Remote Access Configuration. o Configure LAN routing Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. 70-411 Exam Objectives: 303. Configure VPN and routing. o Install and configure the Remote Access role Configure routing Lecture Focus Questions: Which role do you install on a Windows server to get the routing component? What is the purpose of a default route? Under what circumstances can you most effectively use static routes? Which switch used with route add allows you to make a route permanent? Which routes are automatically added to the routing table when routing is enabled? Which routing protocols does Windows Server 2012 support? What is the difference between RIP version 2 and RIP? Why has RIP version 2 become the standard? What is Silent RIP and how does it affect learning and sharing routes? What affect does configuring neighbors have on RIP broadcasts and multicasts? What is route summarization? Video/Demo Time 5.1.1 Routing and Remote Access 5.1.2 Installing RRAS 5.1.4 Routing 5.1.5 Configuring Routing 2:02 3:07 7:48 17:00 Total 29:57 Lab/Activity Add Role Services for Routing and Remote Access Enable LAN Routing Add Static Routes Configure RIP Routing Number of Exam Questions 6 questions Total Time About 65 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 5.2: Network Address Translation (NAT) Summary This section discusses the role of NAT and configuring a NAT router. Students will learn how to: Configure a server as a NAT router. Configure a NAT router to provide DHCP and DNS proxy services. Windows Server Pro: Manage and Administer Exam Objectives: 5.0 Routing and Remote Access Configuration. o Configure Network Address Translation (NAT) routing 70-411 Exam Objectives: 303. Configure VPN and routing. o Install and configure the Remote Access role o Configure routing Lecture Focus Questions: What does a NAT router do? What are the address ranges you can use when deploying NAT? How can NAT provide security for a private network? Video/Demo Time 5.2.1 NAT 5.2.2 Implementing NAT 3:18 15:17 Total 18:35 Lab/Activity Configure NAT Number of Exam Questions 6 questions Total Time About 30 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 5.3: Virtual Private Networks (VPN) Summary This section discusses using a Virtual Private Network (VPN) to support secured communications over an untrusted network. VPN protocols that are supported: o Point-to-Point Tunneling protocol (PPTP) o Layer Two Tunneling Protocol (L2TP) o Secure Socket Tunneling Protocol (SSTP) o Internet Key Exchange 2 (IKEv2) Comparison of authentication protocols: o Password Authentication Protocol (PAP) o Challenge Handshake Authentication Protocol (CHAP) o Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAP v2) o Extensible Authentication Protocol-Transport Layer Security (EAPTLS) Configuration tasks to configure a VPN Server: o Enable remote access o Configure ports o Configure addressing o Configure network policies The role of Web Application Proxy Settings used for VPN connections on Windows clients: o General o Options o Security o Networking o Sharing The role of VPN Reconnect Students will learn how to: Configure a server as a VPN remote access server. Windows Server Pro: Manage and Administer Exam Objectives: 5.0 Routing and Remote Access Configuration. o Configure a VPN server Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. 70-411 Exam Objectives: 303. Configure VPN and routing. o Configure VPN settings o Configure remote dial-in settings for users o Configure routing o Configure Web Application proxy in pass-through mode Lecture Focus Questions: Which VPN protocols does Windows support? Which authentication protocols support smart card use? What makes CHAP vulnerable to security breaches? What type of security environments use EAP? Video/Demo Time 5.3.1 VPN 5.3.4 Configuring VPN 5.3.5 Configuring Web Application Proxy 5:43 20:39 11:38 Total 38:00 Lab/Activity Configure a VPN Server Number of Exam Questions 15 questions Total Time About 65 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 5.4: Network Policy Server Summary This section discusses using the Network Policy Server for authorization of remote clients. Concepts covered include: The role of authorization Components of a network policy: o Conditions o Constraints o Permissions o Settings The process used for authentication when a remote access connection is requested Students will learn how to: Create and configure a connection request policy with conditions, permissions, authentications, and constraints. Create and save NPS templates that can be used later when configuring other features of NPS. Windows Server Pro: Manage and Administer Exam Objectives: 5.0 Routing and Remote Access Configuration. o Create Network Policy Server (NPS) policies 70-411 Exam Objectives: 402. Configure NPS policies. o Configure connection request policies o Configure network policies for VPN clients (multilink and bandwidth allocation, IP filters, encryption, IP addressing) o Manage NPS templates o Import and export NPS policies Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Lecture Focus Questions: What is the difference between authorization and authentication? What is the difference between constraints and conditions? How are they similar? What happens to a connection that matches the policy conditions but not the policy constraints? How many other policies will be checked in this scenario? Where does the server find the permissions for a connection? What must occur before settings are applied? Video/Demo 5.4.1 NPS Policies for VPN Clients 5.4.3 Exploring NPS Policies for VPN Clients 5.4.6 Using NPS Templates Total Time 3:49 11:53 3:12 18:54 Lab/Activity Create a Network Access Policy 1 Create a Network Access Policy 2 Number of Exam Questions 8 questions Total Time About 40 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 5.5: RADIUS Summary This section examines using network policies stored on a RADIUS server to authenticate remote access clients from multiple servers. Concepts covered include: Components of a RADIUS solution: o Remote access clients o RADIUS client o RADIUS server o RADIUS proxy o Remote RADIUS server group o Network policies o Connection request policies o RADIUS Accounting o NPS templates o User account databases o RADIUS messages Configuration components and tasks to configure a RADIUS solution: o RADIUS server o RADIUS client o Remote access client o RADIUS proxy o RADIUS Accounting Best practices for configuring NPS for RADIUS RADIUS Accounting o Types of events to log on the RADIUS server: Accounting requests Authentication requests Periodic status information logs o Types of logging that can be configured: Local file logging SQL server logging Students will learn how to: Configure a remote access server as a RADIUS client. Configure a RADIUS server. Configure a RADIUS proxy by configuring Remote RADIUS Server groups and Connection Request policies. Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Windows Server Pro: Manage and Administer Exam Objectives: 5.0 Routing and Remote Access Configuration. o Configure a RADIUS authentication solution o Implement a RADIUS proxy server 70-411 Exam Objectives: 401. Configure Network Policy Server (NPS). o Configure multiple RADIUS server infrastructures o Configure a RADIUS server o Configure RADIUS clients o Manage RADIUS templates o Configure RADIUS accounting o Configure certificates Lecture Focus Questions: When using a RADIUS solution, where are network access policies configured? What is the difference between a RADIUS client and a remote access client? Why would you implement a RADIUS proxy? What is the difference between a RADIUS client and a RADIUS proxy? What is the difference between a connection request policy and a network access policy? How does the RADIUS proxy use the remote RADIUS server group when processing authentication requests? Video/Demo Time 5.5.1 RADIUS Concepts 5:58 5.5.2 Configuring RADIUS Clients 7:28 5.5.3 Configuring RADIUS Accounting 2:44 5.5.4 Configuring a Multi-server RADIUS Infrastructure 4:29 5.5.5 Configuring Connection Request Policies 10:07 Total 30:46 Lab/Activity Configure a RADIUS Solution Configure a RADIUS Proxy Number of Exam Questions 10 questions Total Time About 60 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 5.6: Network Access Protection Summary This section discusses using Network Access Protection (NAP) to allow administrators to regulate network access or communication based on a computer’s compliance with health requirement policies. Concepts covered include: Features of NAP o Health state validation o Health policy compliance o Limited access network Components that comprise the NAP system: o NAP Client o NAP Server o Enforcement Server (ES) o Remediation Server Steps to configure the NAP server Steps to configure the client computer Configuration steps for the following enforcement points: o DHCP o VPN o 802.1x o Remote Desktop Gateway o IPsec Students will learn how to: Configure a DHCP server as an enforcement point. Configure SHV settings, remediation server groups, health policies, and network policies for NAP. Enable NAP enforcement on a client computer. Windows Server Pro: Manage and Administer Exam Objectives: 5.0 Routing and Remote Access Configuration. o Implement a Network Access Protection (NAP) by creating the following policies: Security Health Validator Health Network Connection Request 70-411 Exam Objectives: Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. 403. Configure Network Access Protection (NAP). o Configure System Health Validators (SHVs) o Configure health policies o Configure NAP enforcement using DHCP and VPN o Configure isolation and remediation of non-compliant computers using DHCP and VPN o Configure NAP client settings Lecture Focus Questions: Why is a non-compliant computer not necessarily an immediate security threat? What happens to a computer that receives a limited access health state validation? What functions are performed by the System Health Validator (SHV)? Which NAP component do you modify to identify the health checks that should be performed? How do remediation servers and auto-remediation help clients become compliant? Which type of communication occurs in the boundary network when using IPsec enforcement? Video/Demo Time 5.6.1 Overview of NAP 10:10 5.6.3 Configuring NAP Enforcement using DHCP 14:08 5.6.4 Configuring Auto-remediation 0:58 5.6.5 Configuring NAP Enforcement using VPN 12:31 Total 37:47 Lab/Activity Configure a System Health Validator Number of Exam Questions 13 questions Total Time About 65 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 5.7: DirectAccess Summary This section discusses using DirectAccess to connect through an Internet connection to a corporate intranet. Details covered include: How DirectAccess works DirectAccess connection methods: o Full enterprise network access (end-to-edge) o Selected server access (modified end-to-edge) o End-to-end The process that DirectAccess clients use to connect to intranet resources DirectAccess requirements: o Infrastructure o Server o Client DirectAccess configuration components: o Server o Client side Students will learn how to: Prepare a server with the server requirements to set up DirectAccess. Build the infrastructure for DirectAccess by configuring DNS and certificates to support DirectAccess. Deploy DirectAccess by identifying remote clients, defining the remote access server, setting up the infrastructure servers, and identifying internal application servers. 70-411 Exam Objectives: 304. Configure DirectAccess. o Implement server requirements o Implement client configuration o Configure DNS for DirectAccess o Configure certificates for DirectAccess Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Lecture Focus Questions: What are the advantages of using DirectAccess to access corporate file servers? What is the difference between full enterprise network access and selected server access? What are the requirements for a DirectAccess server? How does the client's IP address configuration affect how the client sends traffic to the DirectAccess server? Video/Demo 5.7.1 DirectAccess Overview 5.7.3 DirectAccess Requirements 5.7.4 Implementing Server Requirements for DirectAccess 5.7.5 Configuring DNS for DirectAccess 5.7.6 Configuring Certificates for DirectAccess 5.7.7 Configuring DirectAccess Total Time 7:34 6:34 7:15 2:33 12:12 6:55 43:03 Number of Exam Questions 11 questions Total Time About 65 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 6.1: Windows Software Update Services (WSUS) Summary This section examines using the Windows Software Update Services (WSUS) to update software. Details covered include: WSUS advantages Components of WSUS: o Microsoft Update o Windows Server Update Services (WSUS) server o Automatic Updates WSUS deployment scenarios: o Single WSUS server o Multiple independent servers o Multiple synchronized servers o Disconnected WSUS server Products that Microsoft Update and WSUS support updating: o Windows operating systems o Exchange Server o SQL Server o Microsoft Office Control updates based on the following criteria: o Product family (such as operating system version or product o Update classification (such as critical updates or drivers) o Language Considerations for configuring WSUS on the server: o Installation o Configure the server o Approve updates o Add downstream servers Automatic Update policies: o Configure Automatic Updates o Specify Intranet Microsoft Update Service Location o Enable Client-Side Targeting o Reschedule Automatic Updates Scheduled Installations o No Auto-Restart with Logged On Users for Scheduled Automatic Updates Installations o Automatic Updates Detection Frequency o Allow Automatic Updates Immediate Installation o Re-prompt for Restart with Scheduled Installation o Allow Non-administrators to Receive Update Notifications o Do Not Display ‘Install Updates and Shut Down’ Option in Shut Down Windows Dialog Box Settings in the Configure Automatic Updates policy: o Download Option Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Automatic Notification o Installation Option Automatic (Scheduled) Notification Targeting provides different updates based on group membership Groups are created on the WSUS server through the console Client computers are assigned to a group with: o Server-side targeting o Client-side targeting Facts to be aware of when using computer groups Students will learn how to: Install WSUS and configure a WSUS server to download updates from Microsoft Update. Synchronize and approve updates. Run reports to view client and update information. Control client update behavior through Group Policy. Create computer groups for targeting, and manually modify group membership. Enable client-side targeting on the WSUS server. Configure client-side targeting through Group Policy. Windows Server Pro: Manage and Administer Exam Objectives: 6.0 Deployment Manager. o Configure a WSUS server o Control access to WSUS updates using the following: Computer groups Client-side targeting 70-411 Exam Objectives: 102. Implement patch management. o Install and configure the Windows Server update Services (WSUS) role o Configure group policies for updates o Configure client-side targeting o Configure WSUS synchronization o Configure WSUS groups o Manage patch management in mixed environments Lecture Focus Questions: How do clients receive updates in the absence of WSUS? What are the disadvantages that this method poses for your network? Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. When should you deploy multiple, independent WSUS servers? How is this configuration similar to a single WSUS server? How would you deploy WSUS when an Internet connection is not allowed for an isolated network? What is the difference between synchronizing updates, downloading updates, and approving updates? By default, how often does the client check for updates? Which policy allows you to have clients check more frequently? Which policy points clients to your WSUS server instead of the Microsoft Update Web site? When using client-side targeting, how do you identify the computer group for a specific computer? How does this differ from server-side targeting? Video/Demo 6.1.1 WSUS Overview and Concepts 6.1.3 Installing WSUS 6.1.4 Configuring WSUS 6.1.7 WSUS GPOs and Groups 6.1.8 Configuring WSUS Group Policies Total Time 5:42 5:32 10:06 2:48 5:43 29:51 Lab/Activity Configure a Downstream Server Configure Computer Groups Configure Client-side Targeting Number of Exam Questions 10 questions Total Time About 65 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 6.2: Windows Deployment Services (WDS) Summary This section discusses using the Windows Deployment Services (WDS) to enable the deployment of Windows operating systems to client and server computers. Details covered include: Types of WDS images: o Install Image o Boot Image o Capture Boot Image o Discover Boot Image Condition under which WDS can be used to deploy virtual hard disk images Server and network requirements for Windows Deployment Services Clients requirements for using WDS to install a Windows operating system Prestaging a computer account Managing computer accounts used by WDS PXE response methods: o Do not respond to any client computer o Respond only to known client computers o Respond to all (known and unknown) client computers Methods to control how computer accounts are created Students will learn how to: Add the Windows Deployment Services server role and install the Deployment Server and Transport Server role services. Configure and manage settings for the WDS server. Prestage computer accounts to control which computers will respond to WDS servers. Windows Server Pro: Manage and Administer Exam Objectives: 6.0 Deployment Manager. o Install and configure a WDS server o Create WDS images 70-411 Exam Objectives: 101. Deploy and manage server images. o Install the Windows Deployment Services (WDS) role o Configure and manage boot, install, and discover images Lecture Focus Questions: Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Which operating systems can be deployed with Windows Deployment Services (WDS)? When would you use a discover boot image? When would you use a capture boot image? Why doesn't this boot image run on a WDS client that needs to install the operating system? How do you enable a non-PXE client to use WDS to install an operating system? How would you deploy a .VHD image using WDS? Video/Demo 6.2.1 WDS Overview 6.2.2 Imaging Concepts 6.2.4 Installing WDS 6.2.5 Configuring WDS Total Time 3:58 4:33 1:09 6:47 16:27 Lab/Activity Configure a WDS Server Pre-stage Computer Accounts Number of Exam Questions 9 questions Total Time About 45 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 6.3: WDS Image Management Summary This section discusses management of WDS images. Details covered include: Considerations when configuring multicasting with WDS Use the WDS console to view and manage multicast transmission that are in progress Tools to manage WDS images o Windows Preinstallation Environment (WinPE) o System Preparation Tool (Sysprep) o Deployment Image Servicing and Management (DISM.exe) o ImageX o Windows System Image Manager (Windows SIM) o WDSUtil Windows PowerShell cmdlets to perform common tasks in WDS Facts about WDS images Students will learn how to: Configure WDS server properties for multicast. Configure WDS multicast transmissions. Create image groups and add install images. Add boot images to WDS. Windows Server Pro: Manage and Administer Exam Objectives: 6.0 Deployment Manager. o Create WDS images o Control access to images o Deploy images to clients 70-411 Exam Objectives: 101. Deploy and manage server images. o Update images with patches, hotfixes, and drivers o Install features for offline images o Configure driver groups and packages Lecture Focus Questions: How does multicasting differ from unicasting? How does auto-cast differ from scheduled-casting? Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. You have enabled scheduled-casting without a start condition. What must you do for a client to obtain an image using multicasting? What is the difference between deleting and deactivating a multicast transmission? Which two ways can you force a client currently using multicast to use unicast to complete the installation? How do you split a multicast transmission so that faster clients are not slowed down by slower clients? What are the differences between Sysprep, ImageX, and DISM? When can you use each tool? Which tasks can only be performed by one tool? Which type of boot image can you use to deploy a 64-bit install image? What is the relationship between a .wim file and a .rwm file? What is the advantage of dynamic driver provisioning? Video/Demo 6.3.1 Managing Images 6.3.3 Updating Images with Features Total Time 10:30 13:43 24:13 Lab/Activity Create WDS Images Create a Multicast Transmission Number of Exam Questions 10 questions Total Time About 50 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 6.4: Performance Monitor Summary This section discusses Performance Monitor and the other tools that can be used to monitor the reliability and performance of a Windows Server 2012 system: Task Manager Resource Monitor Reliability Monitor Performance Monitor Data Collector Sets Students will learn how to: Use Performance Monitor to create a data collector and configure the settings. Use Performance Monitor to set alerts that will be triggered when a condition is met. Use Task Manager, Resource Monitor and Performance Monitor to monitor real-time performance. 70-411 Exam Objectives: 103. Monitor servers. o Configure Data Collector Sets (DCS) o Configure alerts o Monitor real-time performance o Monitor virtual machines (VMs) o Schedule performance monitoring Lecture Focus Questions: Which tool uses the System Stability Index number? What would a System Stability Index number of 2 indicate? What is the main difference between Task Manager and Resource Monitor when it comes to monitoring the server? Performance Monitor uses objects and counters to track performance. What is the difference between an object and a counter? Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Video/Demo 6.4.1 Overview of Server Monitoring 6.4.2 Performance Monitor (DCS) 6.4.3 Performance Monitor (Alerts) 6.4.4 Real-time Performance Monitoring Total Time 4:24 8:43 4:26 4:57 22:30 Number of Exam Questions 13 questions Total Time About 40 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 6.5: Event Viewer Summary This section discusses using Event Viewer to view and manage local and remote logs. Details covered include: Common event logs include: o Application o Security o System o Setup o ForwardedEvents Features available with event logs: o Log size o Save events o Filter events o Custom views o Attach a Task o Event Log Online Help Computers running the following versions of Windows can be configured as collector systems: o Windows Server 2003 R2 or later o Windows Vista or later Computers running the following versions of Windows can be configured as source systems: o Windows XP with SP2 or later o Windows Server 2003 with SP1 or later Event subscriptions use the following services: o Windows Remote Management (WinRM) o Windows Event Collector (Wecsvc) Subscription type and source computers: o Collector initiated o Source computer initiated Delivery optimization options: o Normal o Minimize bandwidth o Minimize latency o Custom Configuring subscription types: o Collector initiated o Source initiated Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Students will learn how to: View events to gather information, such as Event ID, Log Name, User, and Computer. Create event filters and custom views. Search and save logs. Attach tasks to events or to logs. Configure subscriptions to pull events from remote machines. 70-411 Exam Objectives: 103. Monitor servers. o Monitor events o Configure event subscriptions o Configure network monitoring Lecture Focus Questions: Which log do you view to troubleshoot errors during a software installation? What options do you have for a log file that has reached its designated capacity? What happens to the data in a log that you save that has a filter on it? How does a custom view differ from adding a filter to a log? How can you combine events from multiple logs into a single report? What tasks can you attach to an event or log? What is the purpose of the Event Log Online Help link inside each event? What two services are required to configure event subscriptions? Where do you go to view events collected from remote computers collected using event subscriptions? Video/Demo 6.5.1 Event Viewer and Event Subscriptions 6.5.2 Exploring Event Viewer 6.5.4 Configuring Event Subscriptions Total Time 4:34 6:57 6:47 18:18 Number of Exam Questions 12 questions Total Time About 35 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 6.6: Network Monitor Summary This section discusses using Network Monitor to capture, view, and analyze network traffic. Details covered include: System Requirements o Supported operating systems o Hardware requirements Capture Filter o Display filter o Capture filter Aliases Conversations Parsers Command line Students will learn how to: Configure Network Monitor to capture packets. Configure and remove capture and display filters. Configure conversations to group data by type. Configure aliases to replace IP addresses with names. 70-411 Exam Objectives: 103. Monitor servers. o Configure network monitoring Lecture Focus Questions: What are the differences between display filters and capture filters? What is the difference between capturing in promiscuous mode and capturing without promiscuous mode? When will using promiscuous mode not result in significant differences in the data captured? How can aliases make troubleshooting easier? What permissions do you need to run Network Monitor? Video/Demo 6.6.1 Network Monitoring Time 6:28 Number of Exam Questions 7 questions Total Time About 15 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Windows Server Pro: Manage and Administer Practice Exams Summary This section provides information to help prepare students to take the Windows Server Pro: Manage and Administer certification exam. Students will have the opportunity of testing their mastery of the concepts presented in this course to reaffirm that they are ready for the certification exam. Students will typically take about 5-10 minutes (depending upon the complexity and their level of knowledge) to complete each simulation question in the following practice exams. There is no time limit on the amount of time a student can take to complete the practice exams for the following domains. Objective 1: Active Directory Management (7 simulation questions) Objective 2: Group Policy Configuration (18 simulation question) Objective 3: File Services Management (6 simulation questions) Objective 4: DNS Configuration (14 simulation questions) Objective 5: Routing and Remote Access Configuration (11 simulation questions) Objective 6: Deployment Management (7 simulation questions) The Windows Server Pro: Manage and Administer Certification Practice Exam consists of 15 simulation questions that are randomly selected from the above practice exams. Each time the Certification Practice Exam is accessed different questions may be presented. Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Microsoft 70-411 Practice Exams Summary This section provides information to help prepare students to take the MS 70-411 exam and to register for the exam. Students will have the opportunity of testing their mastery of the concepts presented in this course to reaffirm that they are ready for the certification exam. Students will typically take about 1 minute to complete each question in the following practice exams. There is no time limit on the amount of time a student can take to complete the practice exams for the following domains. Objective 100. Deploy, Manage, and Maintain Servers (61 questions) Objective 200. Configure File and Print Services (69 questions) Objective 300. Configure Network Services and Access (110 questions) Objective 400. Configure a Network Policy Server Infrastructure (31 questions) Objective 500. Configure and Manage Active Directory (76 questions) Objective 600. Configure and Manage Group Policy (63 questions) The Microsoft 70-411 Certification Practice Exam consists of 60 questions that are randomly selected from the above practice exams. Each time the Certification Practice Exam is accessed different questions may be presented. The Certification Practice Exam has a time limit of 2 hours. A passing score of 95% should verify that the student has mastered the concepts and is ready to take the real certification exam. Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Appendix A: Approximate Time for the Course The total time for the LabSim Windows Server Pro: Manage and Administer course is approximately 44 hours and 30 minutes. The time is calculated by adding the approximate time for each section which is calculated using the following elements: Video/demo times Approximate time to read the text lesson (the length of each text lesson is taken into consideration) Simulations (5 minutes assigned per simulation, of course many students may take longer depending upon their knowledge level and experience) Questions (1 minute per question) The breakdown for this course is as follows: Module Sections Time Minute HR:MM 20 30 55 30 20 45 50 45 295 4:55 70 35 10 50 30 60 45 35 40 25 400 6:40 1.0 Active Directory 1.1 Active Directory Overview 1.2 Speeding Up Authentication 1.3 Single Master Operations Roles (FSMO) 1.4 Read Only Domain Controllers (RODCs) 1.5 Virtual Domain Controllers 1.6 Service Accounts 1.7 Maintaining Active Directory 1.8 Restoring Active Directory 2.0 Group Policy 2.1 Group Policy Foundation 2.2 Administrative Templates 2.3 Folder Redirection 2.4 Software Deployment 2.5 Security Settings 2.6 Password and Account Policies 2.7 Advanced Auditing 2.8 Preferences 2.9 Group Policy Management 2.10 Management Delegation Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. 3.0 File Services 3.1 File Server Resource Manager 3.2 Distributed File System (DFS) 3.3 Distributed File System Replication 3.4 File Encryption 3.5 Disk Encryption 50 25 55 50 50 220 3:50 4.1 DNS Name Resolution 4.2 DNS Forwarding and Delegation 4.3 DNS Zones 4.4 DNS Zone Management 4.5 DNS Records 4.6 DNS Options 25 35 55 45 50 35 245 4:05 65 30 65 40 60 65 65 390 6:30 65 45 50 40 35 15 250 4:10 390 6:30 4.0 DNS 5.0 Remote Access Management 5.1 Routing 5.2 Network Address Translation (NAT) 5.3 Virtual Private Networks (VPN) 5.4 Network Policy Server 5.5 RADIUS 5.6 Network Access Protection 5.7 DirectAccess 6.0 Server Management 6.1 Windows Software Update Services (WSUS) 6.2 Windows Deployment Services (WDS) 6.3 WDS Image Management 6.4 Performance Monitor 6.5 Event Viewer 6.6 Network Monitor Windows Server Pro: Manage & Administer Certification Practice Exam 100. Active Directory Management (7 questions) 200. Group Policy Configuration (18 questions) 300. File Services Management (6 questions) 400. DNS Configuration (14 questions) 35 90 30 70 500. Routing and Remote Access Configuration (11 questions) 600. Deployment Management (7 questions) Certification Practice Exam (15 questions) 55 35 75 Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Microsoft 70-411 Practice Exams 100. Deploy, Manage, and Maintain Servers (61 questions) 200. Configure File and Print Services (69 questions) 61 69 300. Configure Network Service and Access, (110 questions) 110 400. Configure a Network Policy Server Infrastructure (31 questions) 31 500. Configure and Manage Active Directory (76 questions) 76 600. Configure and Manage Group Policy (63 questions) Certification Practice Exam (60 questions) 63 60 Total Time 470 7:50 2660 44:30 Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Appendix B: Exam 70-411: Administering Windows Server 2012 Objectives The Windows Exam 70-411: Administering Windows Server 2012 certification exam covers the following objectives. In the spread sheet below the column to the right lists the sections where the information is located in the course: # Objective 100 Deploy, Manage, and Maintain Servers (17 percent) 101 Deploy and manage server images This objective may include but is not limited to: Module.Section 6.2, 6.3 Install the Windows Deployment Services (WDS) role Configure and manage boot, install, and discover images Update images with patches, hotfixes, and drivers Install features for offline images Configure driver groups and packages 102 Implement patch management This objective may include but is not limited to: 6.1 Install and configure the Windows Server Update Services (WSUS) role Configure group policies for updates Configure client-side targeting Configure WSUS synchronization Configure WSUS groups Manage patch management in mixed environments 103 Monitor servers This objective may include but is not limited to: 6.4, 6.5, 6.6 Configure Data Collector Sets (DCS) Configure alerts Monitor real-time performance Monitor virtual machines (VMs) Monitor events Configure event subscriptions Configure network monitoring Schedule performance monitoring 200 Configure File and Print Services (15 percent) Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. 201 Configure Distributed File System (DFS) This objective may include but is not limited to: 3.2, 3.3 Install and configure DFS namespaces Configure DFS Replication Targets Configure Replication Scheduling Configure Remote Differential Compression settings Configure staging Configure fault tolerance 202 Configure File Server Resource Manager (FSRM) This objective may include but is not limited to: 3.1 Install the FSRM role Configure quotas Configure file screens Configure reports 203 Configure file and disk encryption This objective may include but is not limited to: 3.4, 3.5 Configure BitLocker encryption Configure the Network Unlock feature Configure BitLocker policies Configure the EFS recovery agent Manage EFS and BitLocker certificates including backup and restore 204 Configure advanced audit policies This objective may include but is not limited to: 2.7 Implement auditing using Group Policy and AuditPol.exe Create expression-based audit policies Create removable device audit policies Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. 300 Configure Network Services and Access (17 percent) 301 Configure DNS zones This objective may include but is not limited to: 4.2, 4.3 Configure primary and secondary zones Configure stub zones Configure conditional forwards Configure zone and conditional forward storage in Active Directory Configure zone delegation Configure zone transfer settings Configure notify settings 302 Configure DNS records This objective may include but is not limited to: 4.4, 4.5, 4.6 Create and configure DNS Resource Records (RR) including A, AAAA, PTR, SOA, NS, SRV, CNAME, and MX records Configure zone scavenging Configure record options including Time To Live (TTL) and weight Configure round robin Configure secure dynamic updates 303 Configure VPN and routing This objective may include but is not limited to: 5.1, 5.2, 5.3 Install and configure the Remote Access role Implement Network Address Translation (NAT) Configure VPN settings Configure remote dial-in settings for users Configure routing Configure Web Application Proxy in pass-through mode 304 Configure DirectAccess This objective may include but is not limited to: 5.7 Implement server requirements Implement client configuration Configure DNS for DirectAccess Configure certificates for DirectAccess 400 Configure a Network Policy Server Infrastructure (14 percent) Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. 401 Configure Network Policy Server (NPS) This objective may include but is not limited to: 5.5 Configure multiple RADIUS server infrastructures Configure a RADIUS server, including RADIUS proxy Configure RADIUS clients Configure NPS templates Configure RADIUS accounting Configure certificates 402 Configure NPS policies This objective may include but is not limited to: 5.4 Configure connection request policies Configure network policies for VPN clients (multilink and bandwidth allocation, IP filters, encryption, IP addressing) Manage NPS templates Import and export NPS policies 403 Configure Network Access Protection (NAP) This objective may include but is not limited to: 5.6 Configure System Health Validators (SHVs) Configure health policies Configure NAP enforcement using DHCP and VPN Configure isolation and remediation of non-compliant computers using DHCP and VPN Configure NAP client settings 500 Configure and Manage Active Directory (19 percent) 501 Configure service authentication This objective may include but is not limited to: 1.6 Create and configure Service Accounts Create and configure Group Managed Service Accounts Create and configure Managed Service Accounts Configure Kerberos delegation Manage Service Principal Names (SPNs) Configure virtual accounts 502 Configure Domain Controllers This objective may include but is not limited to: 1.2, 1.3, 1.4, 1.5 Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Configure Universal Group Membership Caching (UGMC) Transfer and seize operations masters Install and configure a read-only domain controller (RODC) Configure Domain Controller cloning 503 Maintain Active Directory This objective may include but is not limited to: 1.7, 1.8 Back up Active Directory and SYSVOL Manage Active Directory offline Optimize an Active Directory database Clean up metadata Configure Active Directory snapshots Perform object- and container-level recovery Perform Active Directory restore Configure and restore objects by using the Active Directory Recycle Bin 504 Configure account policies This objective may include but is not limited to: 2.6 Configure domain user password policy Configure and apply Password Settings Objects (PSOs) Delegate password settings management Configure local user password policy Configure account lockout settings Configure Kerberos policy settings 600 Configure and Manage Group Policy (18 percent) 601 Configure Group Policy processing This objective may include but is not limited to: 2.1, 2.9 Configure processing order and precedence Configure blocking of inheritance Configure enforced policies Configure security filtering and WMI filtering Configure loopback processing Configure and manage slow-link processing Configure client-side extension (CSE) behavior Force Group Policy update Configure and manage slow-link processing and Group Policy caching. Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. 602 Configure Group Policy settings This objective may include but is not limited to: 2.2, 2.3, 2.4, 2.5 Configure settings including software installation, folder redirection, scripts, and administrative template settings Import security templates Import custom administrative template file Convert administrative templates using ADMX Migrator Configure property filters for administrative templates 603 Manage Group Policy objects (GPOs) This objective may include but is not limited to: 2.9, 2.10 Back up, import, copy, and restore GPOs Create and configure Migration Table Reset default GPOs Delegate Group Policy management 604 Configure Group Policy preferences This objective may include but is not limited to: 2.8 Configure Group Policy Preferences (GPP) settings including printers, network drive mappings, power options, custom registry settings, Control Panel settings, Internet Explorer settings, file and folder deployment, and shortcut deployment Configure item-level targeting Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Appendix C: Windows Server Pro: Manage and Administer Objectives The Windows Server Pro: Manage and Administer certification exam covers the following objectives. In the spread sheet below the column to the right lists the sections where the information is located in the course: # 1.0 Objective Module.Section Active Directory Management 1.2, 1.3, 1.4, 1.7 Implement Global Catalog Servers. Implement Universal Group Membership Caching (UGMC). Manage Flexible Single-Master Operation (FSMO) roles. Implement a Read Only Domain Controller (RODC). Backup Active Directory. 2.0 Group Policy Configuration Manage the Group Policy processing order. Create custom administrative templates by importing GPOs. Deploy software using Group Policy. Implement the following GPO policies: o Security o Account o Fine-grained password o Advanced audit Configure Group Policy preferences. Backup and restore GPOs. Delegate GPO management. 3.0 File Services Management 2.1, 2.2, 2.4 2.5, 2.6, 2.7 2.8, 2.9, 2.10 3.1, 3.2, 3.3 3.4, 3.5 Configure FSRM quotas. Configure FSRM file screens. Implement DFS replication. Encrypt files and folders with EFS. Encrypt the server hard disk with BitLocker. Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. 4.0 DNS Configuration 4.2, 4.3, 4.4 4.5, 4.6 Configure DNS forwarders. Create DNS delegations. Create the following types of DNS zones: o Primary o Secondary o Stub o Reverse-lookup o Active Directory-integrated Manage zone transfers. Manage dynamic DNS updates. Create DNS records. Configure DNS Round Robin. Configure DNS aging and scavenging. 5.0 Routing and Remote Access Configuration 5.1, 5.2, 5.3 5.4, 5.5, 5.6 Configure LAN routing. Configure Network Address Translation (NAT) routing. Configure a VPN server. Create Network Policy Server (NPS) policies. Configure a RADIUS authentication solution. Implement a RADIUS proxy server. Implement Network Access Protection (NAP) by creating the following policies: o Security Health Validator o Health o Network o Connection Request 6.0 Deployment Management 6.1, 6.2, 6.3 Configure a WSUS server. Control access to WSUS updates using the following: o Computer groups o Client-side targeting Install and configure a WDS server. Create WDS images. Control access to images. Deploy images to clients. Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them.