Скачать книгу

10

      Configure WSUS synchronization

      Configure WSUS groups

      Manage patch management in mixed environments Monitor servers

      Configure Data Collector Sets (DCS)

      Configure alerts

      Monitor real-time performance

      Monitor virtual machines (VMS)

      Monitor events

      Configure event subscriptions

      Configure network monitoring

      Schedule performance monitoring

      Configure Distributed File System (DFS), Chapter 11

      Install and configure DFS namespaces

      Configure DFS Replication Targets

      Configure Replication Scheduling

      Configure Remote Differential Compression settings

      Configure staging

      Configure fault tolerance

      Clone a DFS database

      Recover DFS databases

      Optimize DFS replication

      Configure File Server Resource Manager (FSRM), Chapter 11

      Install the FSRM role service

      Configure quotas

      Configure file screens

      Configure reports

      Configure file management tasks

      Configure file and disk encryption, Chapter 11

      Configure Bitlocker encryption

      Configure the Network Unlock feature

      Configure Bitlocker policies

      Configure the EFS recovery agent

      Manage EFS and Bitlocker certificates including backup and restore

      Configure advanced audit policies, Chapter 11

      Implement auditing using Group Policy and AuditPol.exe

      Create expression-based

      Create removable device audit policies

      Configure DNS zones, Chapter 12

      Configure primary and secondary zones

      Configure stub zones

      Configure conditional forwards

      Configure zone and conditional forward storage in Active Directory

      Configure zone delegation

      Configure zone transfer settings

      Configure notify settings

      Configure DNS records, Chapter 12

      Create and configure DNS Resource Records (RR) including A, AAAA, PTR, SOA, NS, SRV, CNAME, and MX records

      Configure zone scavenging

      Configure record options including time to live (TTL) and weight

      Configure round robin

      Configure secure dynamic updates

      Configure VPN and routing, Chapter 13

      Install and configure the Remote Access role

      Implement Network Address Translation (NAT)

      Configure VPN settings

      Configure remote dial-in settings for users

      Configure routing

      Configure Web Application proxy in passthrough mode

      Configure DirectAccess, Chapter 13

      Implement server requirements

      Implement client configuration

      Configure DNS for DirectAccess

      Configure certificates for DirectAccess

      Configure Network Policy Server (NPS), Chapter 14

      Configure a NPS server including RADIUS proxy

      Configure RADIUS clients

      Configure NPS templates

      Configure RADIUS accounting

      Configure certificates

      Configure NPS policies, Chapter 14

      Configure connection request policies

      Configure network policies for VPN clients (multilink and bandwidth allocation, IP filters, encryption, IP addressing)

      Import and export NPS policies

      Configure Network Access Protection (NAP), Chapter 14

      Configure System Health Validators (SHVs)

      Configure health policies

      Configure NAP enforcement using DHCP and VPN

      Configure isolation and remediation of non-compliant computers using DHCP and VPN

      Configure NAP client settings

      Configure service authentication, Chapter 15

      Create and configure Service Accounts

      Create and configure Group Managed Service Accounts

      Configure Kerberos delegation

      Manage Service Principal Names (SPNS)

      Configure virtual accounts

      Configure Domain Controllers, Chapter 15

      Transfer and seize operations master roles

      Install and configure a read-only domain controller (RODC)

      Configure domain controller cloning

      Maintain Active Directory, Chapter 15

      Back up Active Directory and SYSVOL

      Manage Active Directory offline

      Optimize an Active Directory database

      Clean up metadata

      Configure Active Directory snapshots

      Perform object- and container-level recovery

      Perform Active Directory restore

      Configure and restore objects by using the Active Directory Recycle Bin

      Configure account policies, Chapter 15

      Configure domain and local user password policy settings

      Configure and apply Password Settings Objects (PSOs)

      Delegate password settings management

      Configure account lockout policy settings

      Configure Kerberos policy settings

      Configure Group Policy processing, Chapter 16

      Configure processing order and precedence

      Configure blocking of inheritance

      Configure enforced policies

      Configure security filtering and WMI filtering

      Configure loopback processing

      Configure and manage slow-link processing and group policy caching

      Configure client-side extension (CSE) behavior

      Force group policy update

      Configure Group Policy settings, Chapter 16

      Configure settings including software installation, folder redirection, scripts, and administrative template settings

      Import security templates

      Import custom administrative template file

      Convert administrative templates using admx migrator

      Configure property filters for administrative templates

      Manage Group Policy objects (GPOs), Chapter 16

      Back up, import, copy, and restore GPOs

      Create

Скачать книгу