Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
MCITP Self-Paced Training Kit (Exam 70-647): Windows Server® 2008 Enterprise Administrator
Exam 70-647: Pro: Windows Server 2008, Enterprise Administrator Introduction
Lab Setup Instructions
Hardware Requirements Preparing the Computer Running Windows Server 2008 R2 Enterprise Preparing the Computer Running Windows Vista or Windows 7
Check Operating System Version Requirements Name the Computer Configure Networking
Using the CD
How to Install the Practice Tests How to Use the Practice Tests
Lesson Review Options Practice Test Options
How to Uninstall the Practice Tests
Acknowledgments Support & Feedback
Errata We Want to Hear from You Stay in Touch
Preparing for the Exam 1. Planning Name Resolution and Internet Protocol Addressing
Before You Begin Lesson 1: Planning Name Resolution
Planning Domain Name System Using Windows Server 2008 R2
Configuring Windows Server 2008 R2 DNS Using Stub Zones DNS Forwarding Zone Transfers and Replication DNS Records Administering DNS
Using New DNS Features and Enhancements
Supporting RODCs DNS Security Extensions DNS Cache Locking DNS Socket Pool DNS Devolution Control Background Zone Loading Using the GlobalNames DNS Zone for Legacy Support Planning WINS Replication for Legacy Support Supporting IPv6 Addresses
Planning a DNS Infrastructure
Planning a DNS Namespace Planning DNS Forwarding Planning the Zone Type Planning Root Hints Planning to Integrate AD DS with an Existing DNS Infrastructure Planning the GlobalNames Zone Practice: Configuring DNS
Lesson Summary Lesson Review
Lesson 2: Planning Internet Protocol Addressing
Analyzing the IPv6 Address Structure
IPv6 Address Syntax IPv6 Address Prefixes IPv6 Address Types IPv6 Unicast Addresses Global Unicast Addresses
Link-Local Addresses Site-Local/Unique-Local Addresses Special Addresses NSAP and IPX Addresses
IPv6 Multicast Addresses
The Solicited-Node Multicast Address
IPv6 Anycast Addresses
The Subnet-Router Anycast Address
Investigating the Advantages of IPv6
Increased Address Space Automatic Address Configuration Network-Level Security Real-Time Data Delivery Routing Table Size Header Size and Extension Headers Removal of Broadcast Traffic
Implementing IPv4-to-IPv6 Compatibility
IPv4-Compatible Address IPv4-Mapped Address Teredo Address Intra-Site Automatic Tunneling Addressing Protocol Addresses
Planning an IPv4-to-IPv6 Transition Strategy
Dual-Stack Transition Configured Tunneling Transition Automatic Tunneling 6to4 Teredo ISATAP
Using IPv6 Tools
Verifying IPv6 Configuration and Connectivity Configuring IPv6 Interfaces Verifying IPv6 Connectivity Troubleshooting Connectivity Verifying IPv6-Based TCP Connections
Configuring Clients Through DHCPv6 Planning an IPv6 Network
Analyzing Hardware Requirements Analyzing Software and Application Requirements Documenting Requirements Practice: Configuring IPv6 Connectivity
Lesson Summary Lesson Review
Chapter Review
Chapter Summary Key Terms Case Scenarios
Case Scenario 1: Configuring DNS Case Scenario 2: Implementing IPv6 Connectivity
Suggested Practices
Configure DNS Configure IPv6 Connectivity
Take a Practice Test
2. Designing Active Directory Domain Services
Before You Begin Lesson 1: Designing AD DS Forests and Domains
Designing the Forest Structure
Identifying the Role of AD DS Gathering Business, Technical, Security, and Network Requirements Gathering Autonomy and Isolation Requirements Determining the Number of Forests Required Designing the Forest Model
Designing the Domain Structure
Gathering Domain Design Requirements Designing the Domain Model Determining the Number of Domains Required Determining Whether to Upgrade Existing Domains or Deploy New Ones Designing the Forest Root Domain Designing Domain Trees
Designing Functional Levels
Designing Domain Functional Levels Designing Forest Functional Levels
Designing the Schema
Designing a Schema Modification Process Upgrading the Schema to Support Windows Server 2008 R2
Designing Trusts to Optimize Intraforest Authentication
Practice: Designing AD DS Forests and Domains
Lesson Summary Lesson Review
Lesson 2: Designing the AD DS Physical Topology
Designing the Site Structure
Gathering Site Design Requirements Designing the Site Model
Designing Replication
Designing the Replication Topology Designing Site Links Designing Site Link Properties Designing Site Link Bridging
Designing the Placement of Domain Controllers
Designing the Placement of Forest Root Domain Controllers Designing the Placement of Regional Domain Controllers Designing the Placement of RODCs Designing the Placement of Global Catalog Servers Designing the Placement of Operations Master Role Holders
Designing Printer Location Policies
Practice: Designing the Active Directory Domain Services Physical Topology
Lesson Summary Lesson Review
Chapter Review
Chapter Summary Key Terms Case Scenarios
Case Scenario 1: Designing the AD DS Forest Case Scenario 2: Designing AD DS Sites Case Scenario 3: Designing the Placement of Domain Controllers
Suggested Practices
Implement Forests, Domains, and the Physical Topology Watch a Webcast Read a White Paper
Take a Practice Test
3. Planning Migrations, Trusts, and Interoperability
Before You Begin Lesson 1: Planning for Migration, Upgrade, and Restructuring
Migration Paths
Domain Upgrade Migration Path Domain Restructure Migration Path Upgrade-Then-Restructure Migration Path Active Directory Migration Tool
Upgrading an Existing Domain to Windows Server 2008 R2
Preparing the Environment In-Place Domain Controller Upgrade
Cross-Forest Authentication
Practice: Planning Forest Migration to Windows Server 2008 R2
Lesson Summary Lesson Review
Lesson 2: Planning for Interoperability
Planning Active Directory Federation Services Planning for UNIX Interoperability
Identity Management Password Synchronization Subsystem for UNIX-Based Applications Server for NIS Services for Network File System Practice: Planning for Interoperability
Lesson Summary Lesson Review
Chapter Review
Chapter Summary Key Terms Case Scenario
Case Scenario: Phasing Out a UNIX-Based Computer at Tailspin Toys
Suggested Practices
Plan for Domain or Forest Migration, Upgrade, and Restructuring Plan for Interoperability
Take a Practice Test
4. Designing Active Directory Administration and Group Policy Strategy
Before You Begin Lesson 1: Designing the Active Directory Domain Services Administrative Model
Delegating Active Directory Domain Services Administration
Delegation Benefits and Principles Managing Active Directory Domain Services through Delegation
Service Management Data Management
Defining the Administrative Model
Centralized Administration Model The Distributed Administration Model Mixed Administration Model
Using Group Strategy to Delegate Management Tasks
Management Roles Planning Forest-Level Trusts Planning Trust Type and Direction Creating Forest Trusts Planning Data Management Using Starter GPOs Using Group Policy Modeling and Results Using Migration Tables
Planning to Audit AD DS and Group Policy Compliance Planning Organizational Structure
Practice: Creating a Forest Trust
Lesson Summary Lesson Review
Lesson 2: Designing Enterprise-Level Group Policy Strategy
Planning a Group Policy Hierarchy
Filtering GPOs
Controlling Device Installation
Group Policy Settings That Control Device Installation Obtaining Hardware IDs, Compatible IDs, and GUIDs
Hardware IDs Compatible IDs GUIDs
Planning Authentication and Authorization
Multifactor Authentication and Authorization Using Password Authentication Configuring Fine-Grained Password Policies Using Smart Card Authentication Practice: Implementing Fine-Grained Password Policies
Lesson Summary Lesson Review
Chapter Review
Chapter Summary Key Terms Case Scenarios
Case Scenario 1: Designing a Delegation Strategy Case Scenario 2: Planning Authentication and Authorization
Suggested Practices
Designing the Active Directory Domain Services Administrative Model Designing Enterprise-Level Group Policy Strategy
Take a Practice Test
5. Designing a Network Access Strategy
Before You Begin Lesson 1: Perimeter Networks and Remote Access Strategies
Designing the Perimeter Network
Types of Perimeter Network Architectures Securing the Perimeter Network
Planning for Microsoft Forefront Threat Management Gateway Server Third-Party Firewall Products
Deploying Strategic Services in the Perimeter Network
Planning Web Services Deployment in the Perimeter Network
Planning IPv6 Access for Web Services
Designing a Remote Access Strategy
Planning for VPN Remote Access Connections Designing a VPN Protocol Solution
VPN Tunneling Protocols Point-to-Point Tunneling Protocol Layer 2 Tunneling Protocol Secure Sockets Tunneling Protocol IPsec Tunnel Mode with IKEv2 and VPN Reconnect DirectAccess: The No VPN Solution Other Deployment Considerations for DirectAccess Authentication Protocols
Designing Secure VPN Server Deployment
VPN Server Deployment at Branch Offices Centralized Management of VPN Access
Designing a RADIUS Solution for Remote Access
Designing a RADIUS Solution for the Main Office
Deployment Location for RADIUS Services Planning RADIUS Communication Load Balancing and High Availability of a RADIUS Infrastructure
Designing a RADIUS Solution for Branch Office Remote Access Scaling RADIUS Authentication for Multiple Domains and Forests RADIUS Enhancements in Windows Server 2008 R2 Practice: Designing a RADIUS Solution for a Midsize Enterprise
Lesson Summary Lesson Review
Lesson 2: Designing Network Access Policy and Server and Domain Isolation
Network Access Protection Overview
Overview of NAP Infrastructure Where NAP Works
Considerations for NAP Enforcement Planning NAP IPsec Enforcement
Designing NAP IPsec Enforcement
Restricted Network Boundary Network Secure Network
Scaling NAP IPsec Enforcement for Small Environments Scaling NAP IPsec Enforcement for Larger Environments PKI Support for IPsec Enforcement
Structure of the PKI Configuring Additional NAP Components on Clients Configuring NAP Health Policy Servers
Planning NAP VPN Enforcement
Planning VPN Authentication Protocol Use for VPN Enforcement Other VPN Enforcement Considerations
Non-NAP-Capable VPN Clients Migrating from Network Access Quarantine Control Configuring Additional NAP Components on Clients and NAP Health Policy Servers
Planning NAP 802.1x Enforcement
Design Considerations for 802.1x Enforcement Access Point Considerations ACLs vs. VLANs Planning Authentication Protocols for 802.1x Enforcement Other 802.1x Enforcement Considerations
Configuring Additional NAP Components on Clients and NAP Health Policy Servers
Planning NAP DHCP Enforcement
Design Considerations for DHCP Enforcement
Configuring Additional NAP Components on Clients and NAP Health Policy Servers
Final Say on DHCP Enforcement
Domain and Server Isolation
Domain vs. Server Isolation Comparing Server and Domain Isolation to IPsec Enforcement Moving from Server and Domain Isolation to IPsec NAP
Lesson Summary Lesson Review
Chapter Review
Chapter Summary Key Terms Case Scenario
Case Scenario: Designing a NAP Solution for a Large Enterprise
Suggested Practices
Implement VPNs, RADIUS Solution, and NAP Enforcement Watch a Webcast Read a White Paper
Take a Practice Test
6. Design a Branch Office Deployment
Before You Begin Lesson 1: Branch Office Deployment
Branch Office Services
Designing the Active Directory Structure for Branch Office Administration Administrator Role Separation Components and Services in the Branch Office Windows Deployment Services
Windows Server 2008 R2 Server—Member or Stand-Alone Windows Server 2008 R2 Server Core Windows Server 2008—Full Installation
Adding a Domain Controller
Full Domain Controller Read-Only Domain Controller Server Core Domain Controller Global Catalog Operations Masters Domain Name System DHCP Services Multisite (Branch Office) Clustering with Microsoft Cluster Services DFS Replication for Data Fault Tolerance Routing and Remote Access Services Windows Server Update Services Virtualization in the Branch Office
Branch Office Communications Considerations
Site Link Considerations for the Branch Office Confidentiality for Data in Transit Improve Branch Office Performance Using BranchCache Practice: The Branch Office Administrator
Lesson Summary Lesson Review
Lesson 2: Branch Office Server Security
Overview of Security for the Branch Office Securing Windows Server 2008 in the Branch Office
Security Overview for the Information System in the Branch Office
Infrastructure Firewalls Host-Based Firewalls The Intrusion Detection System/Intrusion Protection System Server Hardening
Securing Windows Server 2008 in the Branch Office
The RODC RODC Disadvantages Installing an RODC Delegated Installation of the RODC Installing the RODC from Customized Media The RODC Authentication Process Replication Concerns with the RODC Automatic Site Coverage RODC Compromise The Password Settings Object
Security for Data in Storage
Read-Only DFS Replicas The Encrypting File System BitLocker
Securing the Branch Office with Network Access Protection
Lesson Summary Lesson Review
Chapter Review
Chapter Summary Key Terms Case Scenarios
Case Scenario 1: Contoso Trucking, Part 1 Case Scenario 2: Contoso Trucking, Part 2 Case Scenario 3: Contoso Trucking, Part 3
Suggested Practices
Branch Office Deployment Read a White Paper
Take a Practice Test
7. Designing Remote Desktop Services and Application Deployment
Before You Begin Lesson 1: Designing Remote Desktop Services
Planning a Remote Desktop Session Deployment Remote Desktop Licensing
License Server Deployment License Server Activation Remote Desktop Services Client Access Licenses Backing Up and Restoring a License Server License Server Deployment License Server High Availability
Deploying Applications Using Remote Desktop Web Access Planning the Deployment of Applications Using RemoteApp Planning RD Session Host Server Farms Planning the Migration to Remote Desktop Connection Broker Planning the Deployment of Remote Desktop Gateway Servers
RD Desktop Gateway Services for Windows Server R2 Planning Connection Authorization Policies Planning Resource Authorization Policies
Planning for Secure Communications Designing for RD Virtualization Host Servers Designing for RemoteFX Content
Practice: Planning Use of the Remote Desktop Gateway
Lesson Summary Lesson Review
Lesson 2: Designing Application Deployment
Designing Application Deployment using Group Policy Planning Application Deployment with System Center Essentials Planning the Deployment of Applications Using System Center Configuration Manager 2007
System Center Configuration Manager 2007 Client Deployment Deploying Applications with System Center Configuration Manager 2007 Practice: Planning Application Deployment
Lesson Summary Lesson Review
Chapter Review
Chapter Summary Key Terms Case Scenario
Case Scenario: Planning a Remote Desktop Services Strategy for Wingtip Toys
Suggested Practices
Provision Applications
Take a Practice Test
8. Designing Virtualization
Before You Begin Lesson 1: Designing Operating System Virtualization
Planning for Hyper-V
Hyper-V Considerations
Planning for Guest Operating Systems
Planning Your Virtual Machine Deployment
Planning your Virtual Machine Storage Planning Processor and Memory Settings For your Virtual Machines Planning the Virtual Network Configuration Planning the Virtual Hard Disks Configuration Installing the Guest Operating systems
Managing Virtualized Servers
Snapshots Licensing Modifying Hardware Settings
Candidates for Virtualization Planning for Server Consolidation
Virtual Server Migration Toolkit System Center Virtual Machine Manager 2008 R2 Components of a System Center Virtual Machine Manager 2008 R2 Deployment SCVMM 2008 R2 in the Branch Office Practice: Designing Virtual Server Deployment
Lesson Summary Lesson Review
Lesson 2: Designing Application Virtualization
Microsoft Application Virtualization
Planning the Deployment of Application Virtualization App-V Branch Office Deployments Practice: Planning Application Virtualization
Lesson Summary Lesson Review
Chapter Review
Chapter Summary Key Terms Case Scenario
Case Scenario: Tailspin Toys Server Consolidation
Suggested Practices
Windows Server Virtualization Plan Application Virtualization Watch a Webcast
Take a Practice Test
9. Designing Solutions for Data Sharing, Data Security, and Business Continuity
Before You Begin Lesson 1: Planning for Data Sharing and Collaboration
Planning a DFS Deployment
Reviewing DFS Concepts and Features DFS Component Technologies
DFS Namespaces Advanced Settings and Features
Referral Ordering Failover and Failback Target Priority Redundant Domain-Based Namespace Servers Namespace Scalability Mode Read-Only Replicated Folders Support for Access-Based Enumeration
DFS Replication Advanced Settings and Features
RDC Cross-File RDC Replication Schedule and Bandwidth Throttling Replication Filters Staging Folder Conflict And Deleted Folder Disabled Memberships
Overview of the DFS Design Process Planning a SharePoint Infrastructure
Assessing Needs for Windows SharePoint Services 3.0
Reviewing Windows for SharePoint Services Features Understanding Windows SharePoint Services Deployment Options
Assessing Needs for Microsoft Office SharePoint Server 2007
Differences Between Windows SharePoint Services 3.0 and Microsoft Office SharePoint Server 2007 Examples of Solutions Based on Microsoft Office SharePoint Server 2007
Practice: Designing a Data Sharing Solution
Lesson Summary Lesson Review
Lesson 2: Choosing Data Security Solutions
Protecting Volume Data with BitLocker
BitLocker Drive Encryption BitLocker Performance Issues
Choosing a BitLocker Authentication Mode BitLocker Security Design Considerations Planning for EFS Using AD RMS
Creating and Viewing Rights-Protected Information AD RMS Applications Practice: Designing Data Storage Security
Lesson Summary Lesson Review
Lesson 3: Planning for System Recoverability and Availability
Planning AD DS Maintenance and Recovery Procedures
Planning for AD DS Backup
Windows Server Backup and Wbadmin
Planning for AD DS Recovery Stopping AD DS to Perform Maintenance Procedures
Seizing Operations Master Roles Using Network Load Balancing to Support High-Usage Servers
Identifying Applications for NLB
When Not to Use NLB
Using Failover Clusters to Maintain High Availability
Comparing NLB and Failover Clusters Preparing Failover Cluster Hardware
Lesson Summary Lesson Review
Chapter Review
Chapter Summary Key Terms Case Scenario
Case Scenario: Designing Solutions for Sharing, Security, and Availability
Suggested Practices
Watch a Webcast Read a White Paper
Take a Practice Test
10. Planning and Designing a Public Key Infrastructure
Before You Begin Lesson 1: Identifying PKI Requirements
Reviewing PKI Concepts Identifying PKI-Enabled Applications Identifying Certificate Requirements
Identifying Certificate Security Requirements
Reviewing the Company Security Policy Assessing Business Requirements Assessing External Requirements Assessing Active Directory Requirements Assessing Certificate Template Requirements
Practice: Identifying PKI opportunities
Lesson Summary Lesson Review
Lesson 2: Designing the CA Hierarchy
Planning the CA Infrastructure
Designing Root CAs Selecting Internal CAs vs. Third-Party CAs
Internal Certification Authorities External Certification Authorities
Defining CA Types and Roles
Enterprise vs. Stand-alone Certification Authorities The Root CA The Subordinate CA
Using Offline CAs Determining the Number of CAs Required Practice: Planning the CA Infrastructure
Lesson Summary Lesson Review
Lesson 3: Creating a Certificate Management Plan
Selecting a Certificate Enrollment Method
Selecting Automatic vs. Manual Requests Selecting Automatic vs. Manual Approval Selecting an Enrollment and Renewal User Interface Using CA Certificate Renewal
Creating a CA Renewal Strategy Defining a Revocation Policy
Certificate Revocation Lists
Problems with Certificate Revocation Lists
Online Certificate Status Protocol (OCSP) Determining Publication Points AD CS Best Practices Analyzer Practice: Planning a PKI Management Strategy
Lesson Summary Lesson Review
Chapter Review
Chapter Summary Key Terms Case Scenario
Case Scenario: Planning a PKI
Suggested Practices
Watch a Webcast Read a White Paper
Take a Practice Test
11. Designing Software Update Infrastructure and Managing Compliance
Before You Begin Lesson 1: Designing a Software Update Infrastructure
Microsoft Update as a Software Update Solution Windows Server Update Services as a Software Update Solution
Managing WSUS WSUS Deployment Hierarchies WSUS Administration Models WSUS Computer Groups Update Installation Behavior Planning Automatic Approvals Planning the Deployment of WSUS in Enterprise Environments
System Center Essentials 2010
System Center Essentials 2010 Software Update Configuration System Center Essentials 2010 in the Enterprise
System Center Configuration Manager 2007
Practice: Windows Server 2008 Software Update Infrastructure
Lesson Summary Lesson Review
Lesson 2: Managing Software Update Compliance
Microsoft Baseline Security Analyzer
WSUS Reporting
System Center Configuration Manager 2007 Compliance and Reporting Planning and Deploying Security Baselines
Security Configuration Wizard The Scwcmd Command-Line Tool Role-Based Security Policy Best Practices Practice: Role-Based Security and System Center Essentials Reporting
Lesson Summary Lesson Review
Chapter Review
Chapter Summary Key Terms Case Scenarios
Case Scenario 1: Deploying WSUS 3.0 SP2 at Fabrikam, Inc. Case Scenario 2: Security Policies at Coho Vineyard and Coho Winery
Suggested Practices
Designing for Software Updates and Compliance Management
Take a Practice Test
A. Answers
Chapter 1: Lesson Review Answers
Lesson 1 Lesson 2
Chapter 1: Case Scenarios Answers
Case Scenario 1: Configuring DNS Case Scenario 2: Implementing IPv6 Connectivity
Chapter 2: Lesson Review Answers
Lesson 1 Lesson 2
Chapter 2: Case Scenario Answers
Case Scenario 1: Designing the AD DS Forest Case Scenario 2: Designing AD DS Sites Case Scenario 3: Designing the Placement of Domain Controllers
Chapter 3: Lesson Review Answers
Lesson 1 Lesson 2
Chapter 3: Case Scenario Answers
Case Scenario: Phasing Out a UNIX-Based Computer at Tailspin Toys
Chapter 4: Lesson Review Answers
Lesson 1 Lesson 2
Chapter 4: Case Scenario Answers
Case Scenario 1: Designing a Delegation Strategy Case Scenario 2: Planning Authentication and Authorization
Chapter 5: Lesson Review Answers
Lesson 1 Lesson 2
Chapter 5: Case Scenario Answers
Case Scenario: Designing a NAP Solution for a Large Enterprise
Chapter 6: Lesson Review Answers
Lesson 1 Lesson 2
Chapter 6: Case Scenario Answers
Case Scenario 1: Contoso Trucking, Part 1 Case Scenario 2: Contoso Trucking, Part 2 Case Scenario 3: Contoso Trucking, Part 3
Chapter 7: Lesson Review Answers
Lesson 1 Lesson 2
Chapter 7: Case Scenario Answers
Case Scenario: Planning a Remote Desktop Services Strategy for Wingtip Toys
Chapter 8: Lesson Review Answers
Lesson 1 Lesson 2
Chapter 8: Case Scenario Answers
Case Scenario: Tailspin Toys Server Consolidation
Chapter 9: Lesson Review Answers
Lesson 1 Lesson 2 Lesson 3
Chapter 9: Case Scenario Answers
Case Scenario: Designing Solutions for Sharing, Security, and Availability
Chapter 10: Lesson Review Answers
Lesson 1 Lesson 2 Lesson 3
Chapter 10: Case Scenario Answers
Case Scenario: Planning a PKI
Chapter 11: Lesson Review Answers
Lesson 1 Lesson 2
Chapter 11: Case Scenario Answers
Case Scenario 1: Deploying WSUS 3.0 SP2 at Fabrikam, Inc. Case Scenario 2: Security Policies at Coho Vineyard and Coho Winery
Glossary B. About the Authors Index About the Authors
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion