Windows Server 2012 R2 - Administering

99
M20411 C www.globalknowledge.se [email protected] 020-73 73 73 Windows Server 2012 R2 - Administering Längd: 5 Days Kurskod: M20411 Version: C Sammanfattning: Get hands-on instruction and practice administering Windows Server 2012, including Windows Server 2012 R2, in this 5-day Microsoft Official Course. This course is part two in a series of three courses that provides the skills and knowledge necessary to implement a core Windows Server 2012 infrastructure in an existing enterprise environment. The three courses collectively cover implementing, managing, maintaining and provisioning services and infrastructure in a Windows Server 2012 environment. Although there is some cross-over of skills and tasks across these courses, this course primarily covers the administration tasks necessary to maintain a Windows Server 2012 infrastructure such as configuring and troubleshooting name resolution, user and group management with Active Directory Domain Services (ADDS) and Group Policy, implementing Remote Access solutions such as DirectAccess, VPNs and Web Application Proxy, implementing Network Policies and Network Access Protection, Data Security, deployment and maintenance of server images, as well as update management and monitoring of Windows Server 2012 environments. This course maps directly to and is the preferred choice for hands-on preparation for Microsoft Certified Solutions Associate (MCSA): Exam 411: Administering Windows Server 2012, which is the second of three exams required for MCSA: Windows Server 2012 certification. NOTE: Labs in this course are based on the General Availability release of Windows Server 2012 R2 and Windows 8.1. Målgrupp: This course is intended for Information Technology (IT) Professionals with hands on experience working in a Windows server 2008 or Windows Server 2012 environment who wish to acquire the skills and knowledge necessary to be able to manage and maintain the core infrastructure required for a Windows Server 2012 and Windows Server 2012 R2 environment. The key focus for students is to broaden the initial deployment of Windows Server 2012 services and infrastructure and provide the skills necessary to Manage and Maintain a domain based Windows Server 2012 environment, providing skills in areas such as User and Group management, Network Access and Data Security. Candidates typically interested in attending this course would be Windows Server Administrators experienced in working with Windows Server 2008 or Windows Server 2012 who wish to gain skills necessary to perform daily management and maintenance tasks in a Windows Server 2012 or Windows Server 2012 R2 environment.IT Professionals who are looking to take the 411, Administering Windows Server 2012 examIT professional wishing to take the Microsoft Certified Solutions Expert (MCSE) exams in DataCenter, Desktop Infrastructure, Messaging, Collaboration and Communications will also be interested in taking this course as they prepare for the Microsoft Certified Solutions Associate (MCSA) exams, which are a pre-requisite for their individual specialties. Målsättning: Configure and Troubleshoot Domain Name System Implement Network Access Protection Maintain Active Directory Domain Services Optimize File Services Manage User and Service Accounts Configure Encryption and Advanced Auditing Implement Group Policy Infrastructure Deploy and Maintain Server Images Manage User Desktops using Group Policy Implement Update Managements Configure and Troubleshoot Remote Access Monitor Windows Server 2012 Install, Configure and Troubleshoot Network Policy Server

Transcript of Windows Server 2012 R2 - Administering

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Windows Server 2012 R2 - Administering

Längd: 5 Days Kurskod: M20411 Version: C

Sammanfattning:

Get hands-on instruction and practice administering Windows Server 2012, including Windows Server 2012 R2, in this 5-day Microsoft OfficialCourse. This course is part two in a series of three courses that provides the skills and knowledge necessary to implement a core WindowsServer 2012 infrastructure in an existing enterprise environment. The three courses collectively cover implementing, managing, maintaining andprovisioning services and infrastructure in a Windows Server 2012 environment. Although there is some cross-over of skills and tasks acrossthese courses, this course primarily covers the administration tasks necessary to maintain a Windows Server 2012 infrastructure such asconfiguring and troubleshooting name resolution, user and group management with Active Directory Domain Services (ADDS) and GroupPolicy, implementing Remote Access solutions such as DirectAccess, VPNs and Web Application Proxy, implementing Network Policies andNetwork Access Protection, Data Security, deployment and maintenance of server images, as well as update management and monitoring ofWindows Server 2012 environments. This course maps directly to and is the preferred choice for hands-on preparation for Microsoft CertifiedSolutions Associate (MCSA): Exam 411: Administering Windows Server 2012, which is the second of three exams required for MCSA:Windows Server 2012 certification. NOTE: Labs in this course are based on the General Availability release of Windows Server 2012 R2 andWindows 8.1.

Målgrupp:

This course is intended for Information Technology (IT) Professionals with hands on experience working in a Windows server 2008 or WindowsServer 2012 environment who wish to acquire the skills and knowledge necessary to be able to manage and maintain the core infrastructurerequired for a Windows Server 2012 and Windows Server 2012 R2 environment. The key focus for students is to broaden the initial deployment of Windows Server 2012 services and infrastructure and provide the skillsnecessary to Manage and Maintain a domain based Windows Server 2012 environment, providing skills in areas such as User and Groupmanagement, Network Access and Data Security. Candidates typically interested in attending this course would beWindows Server Administrators experienced in working with Windows Server 2008 or Windows Server 2012 who wish to gain skills necessaryto perform daily management and maintenance tasks in a Windows Server 2012 or Windows Server 2012 R2 environment.IT Professionalswho are looking to take the 411, Administering Windows Server 2012 examIT professional wishing to take the Microsoft Certified SolutionsExpert (MCSE) exams in DataCenter, Desktop Infrastructure, Messaging, Collaboration and Communications will also be interested in takingthis course as they prepare for the Microsoft Certified Solutions Associate (MCSA) exams, which are a pre-requisite for their individualspecialties.

Målsättning:

Configure and Troubleshoot Domain Name System

Implement Network Access Protection

Maintain Active Directory Domain Services

Optimize File Services

Manage User and Service Accounts

Configure Encryption and Advanced Auditing

Implement Group Policy Infrastructure

Deploy and Maintain Server Images

Manage User Desktops using Group Policy

Implement Update Managements

Configure and Troubleshoot Remote Access

Monitor Windows Server 2012

Install, Configure and Troubleshoot Network Policy Server

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Förkunskaper:

Knowledge and skills concerning the initial implementation andconfiguration of core Windows Server services including ActiveDirectory Domain Services (AD DS), Networking Services andMicrosoft Hyper-V.Knowledge equivalent to course 20410A: Installing andConfiguring Windows Server 2012 as this course will build uponthat knowledge.

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Innehåll:

Module 1: Configuring and TroubleshootingDomain Name System line lineline Configuring the DNS Server Role Configuring the DNS Server Role

Configuring DNS Zones Configuring DNS ZonesConfiguring DNS Zone Transfers Configuring DNS Zone Transfers

line Managing and Troubleshooting DNS Managing and Troubleshooting DNSConfiguring the DNS Server Role Configuring DNS Resource Records Configuring DNS Resource RecordsConfiguring DNS Zones Configuring DNS Conditional Forwarding Configuring DNS Conditional ForwardingConfiguring DNS Zone Transfers Installing and Configuring DNS Zones Installing and Configuring DNS ZonesManaging and Troubleshooting DNS Troubleshooting DNS Troubleshooting DNSConfiguring DNS Resource Records Overview of AD DS Overview of AD DSConfiguring DNS Conditional Forwarding Implementing Virtualized Domain Implementing Virtualized DomainInstalling and Configuring DNS Zones Controllers ControllersTroubleshooting DNS Implementing Read-Only Domain Implementing Read-Only DomainOverview of AD DS Controllers ControllersImplementing Virtualized Domain Controllers Administering AD DS Administering AD DSImplementing Read-Only Domain Managing the AD DS Database Managing the AD DS DatabaseControllers Installing and Configuring a RODC Installing and Configuring a RODCAdministering AD DS Create and administer AD DS Snapshots Create and administer AD DS SnapshotsManaging the AD DS Database Configuring the Active Directory Recycle Configuring the Active Directory RecycleInstalling and Configuring a RODC Bin BinCreate and administer AD DS Snapshots Deploy a domain controller by using Deploy a domain controller by usingConfiguring the Active Directory Recycle Bin domain controller cloning domain controller cloningDeploy a domain controller by using domain Configuring Password Policy and User Configuring Password Policy and Usercontroller cloning Account AccountConfiguring Password Policy and User Configuring Managed Service Accounts Configuring Managed Service AccountsAccount Configuring Password Policy and Configuring Password Policy and AccountConfiguring Managed Service Accounts Account Lockout Settings Lockout SettingsConfiguring Password Policy and Account Creating and Associating a Group Creating and Associating a GroupLockout Settings Managed Service Account Managed Service AccountCreating and Associating a Group Managed Introducing Group Policy Introducing Group PolicyService Account Implementing and Administering GPOs Implementing and Administering GPOsIntroducing Group Policy Group Policy Scope and Group Policy Group Policy Scope and Group PolicyImplementing and Administering GPOs Processing ProcessingGroup Policy Scope and Group Policy Troubleshooting the Application of GPOs Troubleshooting the Application of GPOsProcessing Creating and Configuring GPOs Creating and Configuring GPOsTroubleshooting the Application of GPOs Managing GPO Scope Managing GPO ScopeCreating and Configuring GPOs Verify GPO Application Verify GPO ApplicationManaging GPO Scope Managing GPOs Managing GPOsVerify GPO Application Implementing Administrative Templates Implementing Administrative TemplatesManaging GPOs Configuring Folder Redirection and Configuring Folder Redirection and ScriptsImplementing Administrative Templates Scripts Configuring Group Policy PreferencesConfiguring Folder Redirection and Scripts Configuring Group Policy Preferences Managing Software with Group PolicyConfiguring Group Policy Preferences Managing Software with Group Policy Implement Settings Using Group PolicyManaging Software with Group Policy Implement Settings Using Group Policy PreferencesImplement Settings Using Group Policy Preferences Managing Office 2013 by usingPreferences Managing Office 2013 by using Administrative TemplatesManaging Office 2013 by using Administrative Templates Deploying Software by using Group PolicyAdministrative Templates Deploying Software by using Group Configuring Folder RedirectionDeploying Software by using Group Policy Policy Module 6: Configuring andConfiguring Folder Redirection Configuring Folder Redirection Troubleshooting Remote AccessModule 6: Configuring and Troubleshooting Module 6: Configuring and Remote Access OverviewRemote Access Troubleshooting Remote Access Implementing DirectAccess by Using theRemote Access Overview Remote Access Overview Getting Started WizardImplementing DirectAccess by Using the Implementing DirectAccess by Using the Implementing and Managing an AdvancedGetting Started Wizard Getting Started Wizard DirectAccess InfrastructureImplementing and Managing an Advanced Implementing and Managing an Implementing VPNDirectAccess Infrastructure Advanced DirectAccess Infrastructure Implementing Web Application ProxyImplementing VPN Implementing VPN Verifying Readiness for a DirectAccessImplementing Web Application Proxy Implementing Web Application Proxy DeploymentVerifying Readiness for a DirectAccess Verifying Readiness for a DirectAccess Running the Getting Started WizardDeployment Deployment Validating the DirectAccess DeploymentRunning the Getting Started Wizard Running the Getting Started Wizard Preparing the Environment forValidating the DirectAccess Deployment Validating the DirectAccess Deployment DirectAccess

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Preparing the Environment for DirectAccess Preparing the Environment for Implementing the Advanced DirectAccessImplementing the Advanced DirectAccess DirectAccess InfrastructureInfrastructure Implementing the Advanced Validating the DirectAccess DeploymentValidating the DirectAccess Deployment DirectAccess Infrastructure Implementing VPNImplementing VPN Validating the DirectAccess Deployment Validating the VPN DeploymentValidating the VPN Deployment Implementing VPN Implementing Web Application ProxyImplementing Web Application Proxy Validating the VPN Deployment Validating the Web Application ProxyValidating the Web Application Proxy Implementing Web Application Proxy DeploymentDeployment Validating the Web Application Proxy Installing and Configuring a Network PolicyInstalling and Configuring a Network Policy Deployment ServerServer Installing and Configuring a Network Configuring RADIUS Clients and ServersConfiguring RADIUS Clients and Servers Policy Server NPS Authentication MethodsNPS Authentication Methods Configuring RADIUS Clients and Servers Monitoring and Troubleshooting a NetworkMonitoring and Troubleshooting a Network NPS Authentication Methods Policy ServerPolicy Server Monitoring and Troubleshooting a Installing and Configuring NPS to SupportInstalling and Configuring NPS to Support Network Policy Server RADIUSRADIUS Installing and Configuring NPS to Configuring and Testing a RADIUS ClientConfiguring and Testing a RADIUS Client Support RADIUS Network Access Protection OverviewNetwork Access Protection Overview Configuring and Testing a RADIUS Client Configuring NAPConfiguring NAP Network Access Protection Overview Configuring IPSec Enforcement for NAPConfiguring IPSec Enforcement for NAP Configuring NAP Monitoring and Troubleshooting NAPMonitoring and Troubleshooting NAP Configuring IPSec Enforcement for NAP Configuring NAP with VPN EnforcementConfiguring NAP with VPN Enforcement Monitoring and Troubleshooting NAP Validating the DeploymentValidating the Deployment Configuring NAP with VPN Enforcement Configuring IPSec EnforcementConfiguring IPSec Enforcement Validating the Deployment Validating the DeploymentValidating the Deployment Configuring IPSec Enforcement Overview of FSRMOverview of FSRM Validating the Deployment Using FSRM to Manage Quotas, FileUsing FSRM to Manage Quotas, File Overview of FSRM Screens, and Storage ReportsScreens, and Storage Reports Using FSRM to Manage Quotas, File Implementing Classification ManagementImplementing Classification Management Screens, and Storage Reports and File Management Tasksand File Management Tasks Implementing Classification Management DFS OverviewDFS Overview and File Management Tasks Configuring DFS NamespacesConfiguring DFS Namespaces DFS Overview Configuring and Troubleshooting DFS-RConfiguring and Troubleshooting DFS-R Configuring DFS Namespaces Configuring FSRM QuotasConfiguring FSRM Quotas Configuring and Troubleshooting DFS-R Configuring File ScreeningConfiguring File Screening Configuring FSRM Quotas Installing the DFS role serviceInstalling the DFS role service Configuring File Screening Configuring a DFS NamespaceConfiguring a DFS Namespace Installing the DFS role service Configuring DFS-RConfiguring DFS-R Configuring a DFS Namespace Module 10: Configuring Encryption andModule 10: Configuring Encryption and Configuring DFS-R Advanced AuditingAdvanced Auditing Module 10: Configuring Encryption and Encrypting Drives by Using BitLockerEncrypting Drives by Using BitLocker Advanced Auditing Encrypting Files by Using Encrypting FileEncrypting Files by Using Encrypting File Encrypting Drives by Using BitLocker SystemSystem Encrypting Files by Using Encrypting File Configuring Advanced AuditingConfiguring Advanced Auditing System Securing Data Drives by Using BitLockerSecuring Data Drives by Using BitLocker Configuring Advanced Auditing Encrypting and Recovering FilesEncrypting and Recovering Files Securing Data Drives by Using BitLocker Configuring Advanced Audit PolicyConfiguring Advanced Audit Policy Encrypting and Recovering Files ConfigurationConfiguration Configuring Advanced Audit Policy Overview of Windows DeploymentOverview of Windows Deployment Services Configuration ServicesManaging Windows Deployment Images Overview of Windows Deployment Managing Windows Deployment ImagesImplementing Deployment with Windows Services Implementing Deployment with WindowsDeployment Services Managing Windows Deployment Images Deployment ServicesAdministering Windows Deployment Implementing Deployment with Windows Administering Windows DeploymentServices Deployment Services ServicesInstalling and Configuring Windows Administering Windows Deployment Installing and Configuring WindowsDeployment Services Services Deployment ServicesCreating Operating System Images with Installing and Configuring Windows Creating Operating System Images withWindows Deployment Services Deployment Services Windows Deployment ServicesConfiguring Custom Computer Naming Creating Operating System Images with Configuring Custom Computer NamingDeploying Images with Windows Windows Deployment Services Deploying Images with WindowsDeployment Services Configuring Custom Computer Naming Deployment ServicesOverview of WSUS Deploying Images with Windows Overview of WSUSDeploying Updates with WSUS Deployment Services Deploying Updates with WSUSImplementing the WSUS Server Role Overview of WSUS Implementing the WSUS Server RoleConfiguring Update Settings Deploying Updates with WSUS Configuring Update Settings

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Approving and Deploying an Update by Implementing the WSUS Server Role Approving and Deploying an Update byusing WSUS Configuring Update Settings using WSUSMonitoring Tools Approving and Deploying an Update by Monitoring ToolsUsing Performance Monitor using WSUS Using Performance MonitorMonitoring Event Logs Monitoring Tools Monitoring Event LogsEstablishing a Performance Baseline Using Performance Monitor Establishing a Performance BaselineIdentifying the Source of a Performance Monitoring Event Logs Identifying the Source of a PerformanceProblem Establishing a Performance Baseline ProblemViewing and Configuring Centralized Event Identifying the Source of a Performance Viewing and Configuring Centralized EventLogs Problem Logs

Viewing and Configuring CentralizedEvent Logs

line lineConfiguring the DNS Server Role Configuring the DNS Server RoleConfiguring DNS Zones line Configuring DNS ZonesConfiguring DNS Zone Transfers Configuring the DNS Server Role Configuring DNS Zone TransfersManaging and Troubleshooting DNS Configuring DNS Zones Managing and Troubleshooting DNSConfiguring DNS Resource Records Configuring DNS Zone Transfers Configuring DNS Resource RecordsConfiguring DNS Conditional Forwarding Managing and Troubleshooting DNS Configuring DNS Conditional ForwardingInstalling and Configuring DNS Zones Configuring DNS Resource Records Installing and Configuring DNS ZonesTroubleshooting DNS Configuring DNS Conditional Forwarding Troubleshooting DNSOverview of AD DS Installing and Configuring DNS Zones Overview of AD DSImplementing Virtualized Domain Controllers Troubleshooting DNS Implementing Virtualized DomainImplementing Read-Only Domain Overview of AD DS ControllersControllers Implementing Virtualized Domain Implementing Read-Only DomainAdministering AD DS Controllers ControllersManaging the AD DS Database Implementing Read-Only Domain Administering AD DSInstalling and Configuring a RODC Controllers Managing the AD DS DatabaseCreate and administer AD DS Snapshots Administering AD DS Installing and Configuring a RODCConfiguring the Active Directory Recycle Bin Managing the AD DS Database Create and administer AD DS SnapshotsDeploy a domain controller by using domain Installing and Configuring a RODC Configuring the Active Directory Recyclecontroller cloning Create and administer AD DS Snapshots BinConfiguring Password Policy and User Configuring the Active Directory Recycle Deploy a domain controller by usingAccount Bin domain controller cloningConfiguring Managed Service Accounts Deploy a domain controller by using Configuring Password Policy and UserConfiguring Password Policy and Account domain controller cloning AccountLockout Settings Configuring Password Policy and User Configuring Managed Service AccountsCreating and Associating a Group Managed Account Configuring Password Policy and AccountService Account Configuring Managed Service Accounts Lockout SettingsIntroducing Group Policy Configuring Password Policy and Creating and Associating a GroupImplementing and Administering GPOs Account Lockout Settings Managed Service AccountGroup Policy Scope and Group Policy Creating and Associating a Group Introducing Group PolicyProcessing Managed Service Account Implementing and Administering GPOsTroubleshooting the Application of GPOs Introducing Group Policy Group Policy Scope and Group PolicyCreating and Configuring GPOs Implementing and Administering GPOs ProcessingManaging GPO Scope Group Policy Scope and Group Policy Troubleshooting the Application of GPOsVerify GPO Application Processing Creating and Configuring GPOsManaging GPOs Troubleshooting the Application of GPOs Managing GPO ScopeImplementing Administrative Templates Creating and Configuring GPOs Verify GPO ApplicationConfiguring Folder Redirection and Scripts Managing GPO Scope Managing GPOsConfiguring Group Policy Preferences Verify GPO Application Implementing Administrative TemplatesManaging Software with Group Policy Managing GPOs Configuring Folder Redirection and ScriptsImplement Settings Using Group Policy Implementing Administrative Templates Configuring Group Policy PreferencesPreferences Configuring Folder Redirection and Managing Software with Group PolicyManaging Office 2013 by using Scripts Implement Settings Using Group PolicyAdministrative Templates Configuring Group Policy Preferences PreferencesDeploying Software by using Group Policy Managing Software with Group Policy Managing Office 2013 by usingConfiguring Folder Redirection Implement Settings Using Group Policy Administrative TemplatesModule 6: Configuring and Troubleshooting Preferences Deploying Software by using Group PolicyRemote Access Managing Office 2013 by using Configuring Folder RedirectionRemote Access Overview Administrative Templates Module 6: Configuring andImplementing DirectAccess by Using the Deploying Software by using Group Troubleshooting Remote AccessGetting Started Wizard Policy Remote Access OverviewImplementing and Managing an Advanced Configuring Folder Redirection Implementing DirectAccess by Using theDirectAccess Infrastructure Module 6: Configuring and Getting Started WizardImplementing VPN Troubleshooting Remote Access Implementing and Managing an Advanced

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Implementing Web Application Proxy Remote Access Overview DirectAccess InfrastructureVerifying Readiness for a DirectAccess Implementing DirectAccess by Using the Implementing VPNDeployment Getting Started Wizard Implementing Web Application ProxyRunning the Getting Started Wizard Implementing and Managing an Verifying Readiness for a DirectAccessValidating the DirectAccess Deployment Advanced DirectAccess Infrastructure DeploymentPreparing the Environment for DirectAccess Implementing VPN Running the Getting Started WizardImplementing the Advanced DirectAccess Implementing Web Application Proxy Validating the DirectAccess DeploymentInfrastructure Verifying Readiness for a DirectAccess Preparing the Environment forValidating the DirectAccess Deployment Deployment DirectAccessImplementing VPN Running the Getting Started Wizard Implementing the Advanced DirectAccessValidating the VPN Deployment Validating the DirectAccess Deployment InfrastructureImplementing Web Application Proxy Preparing the Environment for Validating the DirectAccess DeploymentValidating the Web Application Proxy DirectAccess Implementing VPNDeployment Implementing the Advanced Validating the VPN DeploymentInstalling and Configuring a Network Policy DirectAccess Infrastructure Implementing Web Application ProxyServer Validating the DirectAccess Deployment Validating the Web Application ProxyConfiguring RADIUS Clients and Servers Implementing VPN DeploymentNPS Authentication Methods Validating the VPN Deployment Installing and Configuring a Network PolicyMonitoring and Troubleshooting a Network Implementing Web Application Proxy ServerPolicy Server Validating the Web Application Proxy Configuring RADIUS Clients and ServersInstalling and Configuring NPS to Support Deployment NPS Authentication MethodsRADIUS Installing and Configuring a Network Monitoring and Troubleshooting a NetworkConfiguring and Testing a RADIUS Client Policy Server Policy ServerNetwork Access Protection Overview Configuring RADIUS Clients and Servers Installing and Configuring NPS to SupportConfiguring NAP NPS Authentication Methods RADIUSConfiguring IPSec Enforcement for NAP Monitoring and Troubleshooting a Configuring and Testing a RADIUS ClientMonitoring and Troubleshooting NAP Network Policy Server Network Access Protection OverviewConfiguring NAP with VPN Enforcement Installing and Configuring NPS to Configuring NAPValidating the Deployment Support RADIUS Configuring IPSec Enforcement for NAPConfiguring IPSec Enforcement Configuring and Testing a RADIUS Client Monitoring and Troubleshooting NAPValidating the Deployment Network Access Protection Overview Configuring NAP with VPN EnforcementOverview of FSRM Configuring NAP Validating the DeploymentUsing FSRM to Manage Quotas, File Configuring IPSec Enforcement for NAP Configuring IPSec EnforcementScreens, and Storage Reports Monitoring and Troubleshooting NAP Validating the DeploymentImplementing Classification Management Configuring NAP with VPN Enforcement Overview of FSRMand File Management Tasks Validating the Deployment Using FSRM to Manage Quotas, FileDFS Overview Configuring IPSec Enforcement Screens, and Storage ReportsConfiguring DFS Namespaces Validating the Deployment Implementing Classification ManagementConfiguring and Troubleshooting DFS-R Overview of FSRM and File Management TasksConfiguring FSRM Quotas Using FSRM to Manage Quotas, File DFS OverviewConfiguring File Screening Screens, and Storage Reports Configuring DFS NamespacesInstalling the DFS role service Implementing Classification Management Configuring and Troubleshooting DFS-RConfiguring a DFS Namespace and File Management Tasks Configuring FSRM QuotasConfiguring DFS-R DFS Overview Configuring File ScreeningModule 10: Configuring Encryption and Configuring DFS Namespaces Installing the DFS role serviceAdvanced Auditing Configuring and Troubleshooting DFS-R Configuring a DFS NamespaceEncrypting Drives by Using BitLocker Configuring FSRM Quotas Configuring DFS-REncrypting Files by Using Encrypting File Configuring File Screening Module 10: Configuring Encryption andSystem Installing the DFS role service Advanced AuditingConfiguring Advanced Auditing Configuring a DFS Namespace Encrypting Drives by Using BitLockerSecuring Data Drives by Using BitLocker Configuring DFS-R Encrypting Files by Using Encrypting FileEncrypting and Recovering Files Module 10: Configuring Encryption and SystemConfiguring Advanced Audit Policy Advanced Auditing Configuring Advanced AuditingConfiguration Encrypting Drives by Using BitLocker Securing Data Drives by Using BitLockerOverview of Windows Deployment Services Encrypting Files by Using Encrypting File Encrypting and Recovering FilesManaging Windows Deployment Images System Configuring Advanced Audit PolicyImplementing Deployment with Windows Configuring Advanced Auditing ConfigurationDeployment Services Securing Data Drives by Using BitLocker Overview of Windows DeploymentAdministering Windows Deployment Encrypting and Recovering Files ServicesServices Configuring Advanced Audit Policy Managing Windows Deployment ImagesInstalling and Configuring Windows Configuration Implementing Deployment with WindowsDeployment Services Overview of Windows Deployment Deployment ServicesCreating Operating System Images with Services Administering Windows DeploymentWindows Deployment Services Managing Windows Deployment Images ServicesConfiguring Custom Computer Naming Implementing Deployment with Windows Installing and Configuring WindowsDeploying Images with Windows Deployment Services Deployment Services

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Deployment Services Administering Windows Deployment Creating Operating System Images withOverview of WSUS Services Windows Deployment ServicesDeploying Updates with WSUS Installing and Configuring Windows Configuring Custom Computer NamingImplementing the WSUS Server Role Deployment Services Deploying Images with WindowsConfiguring Update Settings Creating Operating System Images with Deployment ServicesApproving and Deploying an Update by Windows Deployment Services Overview of WSUSusing WSUS Configuring Custom Computer Naming Deploying Updates with WSUSMonitoring Tools Deploying Images with Windows Implementing the WSUS Server RoleUsing Performance Monitor Deployment Services Configuring Update SettingsMonitoring Event Logs Overview of WSUS Approving and Deploying an Update byEstablishing a Performance Baseline Deploying Updates with WSUS using WSUSIdentifying the Source of a Performance Implementing the WSUS Server Role Monitoring ToolsProblem Configuring Update Settings Using Performance MonitorViewing and Configuring Centralized Event Approving and Deploying an Update by Monitoring Event LogsLogs using WSUS Establishing a Performance Baseline

Monitoring Tools Identifying the Source of a PerformanceUsing Performance Monitor Problem

line Monitoring Event Logs Viewing and Configuring Centralized EventConfiguring the DNS Server Role Establishing a Performance Baseline LogsConfiguring DNS Zones Identifying the Source of a PerformanceConfiguring DNS Zone Transfers ProblemManaging and Troubleshooting DNS Viewing and Configuring Centralized lineConfiguring DNS Resource Records Event Logs Configuring the DNS Server RoleConfiguring DNS Conditional Forwarding Configuring DNS ZonesInstalling and Configuring DNS Zones Configuring DNS Zone TransfersTroubleshooting DNS line Managing and Troubleshooting DNSOverview of AD DS Configuring the DNS Server Role Configuring DNS Resource RecordsImplementing Virtualized Domain Controllers Configuring DNS Zones Configuring DNS Conditional ForwardingImplementing Read-Only Domain Configuring DNS Zone Transfers Installing and Configuring DNS ZonesControllers Managing and Troubleshooting DNS Troubleshooting DNSAdministering AD DS Configuring DNS Resource Records Overview of AD DSManaging the AD DS Database Configuring DNS Conditional Forwarding Implementing Virtualized DomainInstalling and Configuring a RODC Installing and Configuring DNS Zones ControllersCreate and administer AD DS Snapshots Troubleshooting DNS Implementing Read-Only DomainConfiguring the Active Directory Recycle Bin Overview of AD DS ControllersDeploy a domain controller by using domain Implementing Virtualized Domain Administering AD DScontroller cloning Controllers Managing the AD DS DatabaseConfiguring Password Policy and User Implementing Read-Only Domain Installing and Configuring a RODCAccount Controllers Create and administer AD DS SnapshotsConfiguring Managed Service Accounts Administering AD DS Configuring the Active Directory RecycleConfiguring Password Policy and Account Managing the AD DS Database BinLockout Settings Installing and Configuring a RODC Deploy a domain controller by usingCreating and Associating a Group Managed Create and administer AD DS Snapshots domain controller cloningService Account Configuring the Active Directory Recycle Configuring Password Policy and UserIntroducing Group Policy Bin AccountImplementing and Administering GPOs Deploy a domain controller by using Configuring Managed Service AccountsGroup Policy Scope and Group Policy domain controller cloning Configuring Password Policy and AccountProcessing Configuring Password Policy and User Lockout SettingsTroubleshooting the Application of GPOs Account Creating and Associating a GroupCreating and Configuring GPOs Configuring Managed Service Accounts Managed Service AccountManaging GPO Scope Configuring Password Policy and Introducing Group PolicyVerify GPO Application Account Lockout Settings Implementing and Administering GPOsManaging GPOs Creating and Associating a Group Group Policy Scope and Group PolicyImplementing Administrative Templates Managed Service Account ProcessingConfiguring Folder Redirection and Scripts Introducing Group Policy Troubleshooting the Application of GPOsConfiguring Group Policy Preferences Implementing and Administering GPOs Creating and Configuring GPOsManaging Software with Group Policy Group Policy Scope and Group Policy Managing GPO ScopeImplement Settings Using Group Policy Processing Verify GPO ApplicationPreferences Troubleshooting the Application of GPOs Managing GPOsManaging Office 2013 by using Creating and Configuring GPOs Implementing Administrative TemplatesAdministrative Templates Managing GPO Scope Configuring Folder Redirection and ScriptsDeploying Software by using Group Policy Verify GPO Application Configuring Group Policy PreferencesConfiguring Folder Redirection Managing GPOs Managing Software with Group PolicyModule 6: Configuring and Troubleshooting Implementing Administrative Templates Implement Settings Using Group PolicyRemote Access Configuring Folder Redirection and PreferencesRemote Access Overview Scripts Managing Office 2013 by using

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Implementing DirectAccess by Using the Configuring Group Policy Preferences Administrative TemplatesGetting Started Wizard Managing Software with Group Policy Deploying Software by using Group PolicyImplementing and Managing an Advanced Implement Settings Using Group Policy Configuring Folder RedirectionDirectAccess Infrastructure Preferences Module 6: Configuring andImplementing VPN Managing Office 2013 by using Troubleshooting Remote AccessImplementing Web Application Proxy Administrative Templates Remote Access OverviewVerifying Readiness for a DirectAccess Deploying Software by using Group Implementing DirectAccess by Using theDeployment Policy Getting Started WizardRunning the Getting Started Wizard Configuring Folder Redirection Implementing and Managing an AdvancedValidating the DirectAccess Deployment Module 6: Configuring and DirectAccess InfrastructurePreparing the Environment for DirectAccess Troubleshooting Remote Access Implementing VPNImplementing the Advanced DirectAccess Remote Access Overview Implementing Web Application ProxyInfrastructure Implementing DirectAccess by Using the Verifying Readiness for a DirectAccessValidating the DirectAccess Deployment Getting Started Wizard DeploymentImplementing VPN Implementing and Managing an Running the Getting Started WizardValidating the VPN Deployment Advanced DirectAccess Infrastructure Validating the DirectAccess DeploymentImplementing Web Application Proxy Implementing VPN Preparing the Environment forValidating the Web Application Proxy Implementing Web Application Proxy DirectAccessDeployment Verifying Readiness for a DirectAccess Implementing the Advanced DirectAccessInstalling and Configuring a Network Policy Deployment InfrastructureServer Running the Getting Started Wizard Validating the DirectAccess DeploymentConfiguring RADIUS Clients and Servers Validating the DirectAccess Deployment Implementing VPNNPS Authentication Methods Preparing the Environment for Validating the VPN DeploymentMonitoring and Troubleshooting a Network DirectAccess Implementing Web Application ProxyPolicy Server Implementing the Advanced Validating the Web Application ProxyInstalling and Configuring NPS to Support DirectAccess Infrastructure DeploymentRADIUS Validating the DirectAccess Deployment Installing and Configuring a Network PolicyConfiguring and Testing a RADIUS Client Implementing VPN ServerNetwork Access Protection Overview Validating the VPN Deployment Configuring RADIUS Clients and ServersConfiguring NAP Implementing Web Application Proxy NPS Authentication MethodsConfiguring IPSec Enforcement for NAP Validating the Web Application Proxy Monitoring and Troubleshooting a NetworkMonitoring and Troubleshooting NAP Deployment Policy ServerConfiguring NAP with VPN Enforcement Installing and Configuring a Network Installing and Configuring NPS to SupportValidating the Deployment Policy Server RADIUSConfiguring IPSec Enforcement Configuring RADIUS Clients and Servers Configuring and Testing a RADIUS ClientValidating the Deployment NPS Authentication Methods Network Access Protection OverviewOverview of FSRM Monitoring and Troubleshooting a Configuring NAPUsing FSRM to Manage Quotas, File Network Policy Server Configuring IPSec Enforcement for NAPScreens, and Storage Reports Installing and Configuring NPS to Monitoring and Troubleshooting NAPImplementing Classification Management Support RADIUS Configuring NAP with VPN Enforcementand File Management Tasks Configuring and Testing a RADIUS Client Validating the DeploymentDFS Overview Network Access Protection Overview Configuring IPSec EnforcementConfiguring DFS Namespaces Configuring NAP Validating the DeploymentConfiguring and Troubleshooting DFS-R Configuring IPSec Enforcement for NAP Overview of FSRMConfiguring FSRM Quotas Monitoring and Troubleshooting NAP Using FSRM to Manage Quotas, FileConfiguring File Screening Configuring NAP with VPN Enforcement Screens, and Storage ReportsInstalling the DFS role service Validating the Deployment Implementing Classification ManagementConfiguring a DFS Namespace Configuring IPSec Enforcement and File Management TasksConfiguring DFS-R Validating the Deployment DFS OverviewModule 10: Configuring Encryption and Overview of FSRM Configuring DFS NamespacesAdvanced Auditing Using FSRM to Manage Quotas, File Configuring and Troubleshooting DFS-REncrypting Drives by Using BitLocker Screens, and Storage Reports Configuring FSRM QuotasEncrypting Files by Using Encrypting File Implementing Classification Management Configuring File ScreeningSystem and File Management Tasks Installing the DFS role serviceConfiguring Advanced Auditing DFS Overview Configuring a DFS NamespaceSecuring Data Drives by Using BitLocker Configuring DFS Namespaces Configuring DFS-REncrypting and Recovering Files Configuring and Troubleshooting DFS-R Module 10: Configuring Encryption andConfiguring Advanced Audit Policy Configuring FSRM Quotas Advanced AuditingConfiguration Configuring File Screening Encrypting Drives by Using BitLockerOverview of Windows Deployment Services Installing the DFS role service Encrypting Files by Using Encrypting FileManaging Windows Deployment Images Configuring a DFS Namespace SystemImplementing Deployment with Windows Configuring DFS-R Configuring Advanced AuditingDeployment Services Module 10: Configuring Encryption and Securing Data Drives by Using BitLockerAdministering Windows Deployment Advanced Auditing Encrypting and Recovering FilesServices Encrypting Drives by Using BitLocker Configuring Advanced Audit PolicyInstalling and Configuring Windows Encrypting Files by Using Encrypting File Configuration

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Deployment Services System Overview of Windows DeploymentCreating Operating System Images with Configuring Advanced Auditing ServicesWindows Deployment Services Securing Data Drives by Using BitLocker Managing Windows Deployment ImagesConfiguring Custom Computer Naming Encrypting and Recovering Files Implementing Deployment with WindowsDeploying Images with Windows Configuring Advanced Audit Policy Deployment ServicesDeployment Services Configuration Administering Windows DeploymentOverview of WSUS Overview of Windows Deployment ServicesDeploying Updates with WSUS Services Installing and Configuring WindowsImplementing the WSUS Server Role Managing Windows Deployment Images Deployment ServicesConfiguring Update Settings Implementing Deployment with Windows Creating Operating System Images withApproving and Deploying an Update by Deployment Services Windows Deployment Servicesusing WSUS Administering Windows Deployment Configuring Custom Computer NamingMonitoring Tools Services Deploying Images with WindowsUsing Performance Monitor Installing and Configuring Windows Deployment ServicesMonitoring Event Logs Deployment Services Overview of WSUSEstablishing a Performance Baseline Creating Operating System Images with Deploying Updates with WSUSIdentifying the Source of a Performance Windows Deployment Services Implementing the WSUS Server RoleProblem Configuring Custom Computer Naming Configuring Update SettingsViewing and Configuring Centralized Event Deploying Images with Windows Approving and Deploying an Update byLogs Deployment Services using WSUS

Overview of WSUS Monitoring ToolsDeploying Updates with WSUS Using Performance Monitor

line Implementing the WSUS Server Role Monitoring Event LogsConfiguring the DNS Server Role Configuring Update Settings Establishing a Performance BaselineConfiguring DNS Zones Approving and Deploying an Update by Identifying the Source of a PerformanceConfiguring DNS Zone Transfers using WSUS ProblemManaging and Troubleshooting DNS Monitoring Tools Viewing and Configuring Centralized EventConfiguring DNS Resource Records Using Performance Monitor LogsConfiguring DNS Conditional Forwarding Monitoring Event LogsInstalling and Configuring DNS Zones Establishing a Performance BaselineTroubleshooting DNS Identifying the Source of a Performance lineOverview of AD DS Problem Configuring the DNS Server RoleImplementing Virtualized Domain Controllers Viewing and Configuring Centralized Configuring DNS ZonesImplementing Read-Only Domain Event Logs Configuring DNS Zone TransfersControllers Managing and Troubleshooting DNSAdministering AD DS Configuring DNS Resource RecordsManaging the AD DS Database line Configuring DNS Conditional ForwardingInstalling and Configuring a RODC Configuring the DNS Server Role Installing and Configuring DNS ZonesCreate and administer AD DS Snapshots Configuring DNS Zones Troubleshooting DNSConfiguring the Active Directory Recycle Bin Configuring DNS Zone Transfers Overview of AD DSDeploy a domain controller by using domain Managing and Troubleshooting DNS Implementing Virtualized Domaincontroller cloning Configuring DNS Resource Records ControllersConfiguring Password Policy and User Configuring DNS Conditional Forwarding Implementing Read-Only DomainAccount Installing and Configuring DNS Zones ControllersConfiguring Managed Service Accounts Troubleshooting DNS Administering AD DSConfiguring Password Policy and Account Overview of AD DS Managing the AD DS DatabaseLockout Settings Implementing Virtualized Domain Installing and Configuring a RODCCreating and Associating a Group Managed Controllers Create and administer AD DS SnapshotsService Account Implementing Read-Only Domain Configuring the Active Directory RecycleIntroducing Group Policy Controllers BinImplementing and Administering GPOs Administering AD DS Deploy a domain controller by usingGroup Policy Scope and Group Policy Managing the AD DS Database domain controller cloningProcessing Installing and Configuring a RODC Configuring Password Policy and UserTroubleshooting the Application of GPOs Create and administer AD DS Snapshots AccountCreating and Configuring GPOs Configuring the Active Directory Recycle Configuring Managed Service AccountsManaging GPO Scope Bin Configuring Password Policy and AccountVerify GPO Application Deploy a domain controller by using Lockout SettingsManaging GPOs domain controller cloning Creating and Associating a GroupImplementing Administrative Templates Configuring Password Policy and User Managed Service AccountConfiguring Folder Redirection and Scripts Account Introducing Group PolicyConfiguring Group Policy Preferences Configuring Managed Service Accounts Implementing and Administering GPOsManaging Software with Group Policy Configuring Password Policy and Group Policy Scope and Group PolicyImplement Settings Using Group Policy Account Lockout Settings ProcessingPreferences Creating and Associating a Group Troubleshooting the Application of GPOsManaging Office 2013 by using Managed Service Account Creating and Configuring GPOsAdministrative Templates Introducing Group Policy Managing GPO Scope

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Deploying Software by using Group Policy Implementing and Administering GPOs Verify GPO ApplicationConfiguring Folder Redirection Group Policy Scope and Group Policy Managing GPOsModule 6: Configuring and Troubleshooting Processing Implementing Administrative TemplatesRemote Access Troubleshooting the Application of GPOs Configuring Folder Redirection and ScriptsRemote Access Overview Creating and Configuring GPOs Configuring Group Policy PreferencesImplementing DirectAccess by Using the Managing GPO Scope Managing Software with Group PolicyGetting Started Wizard Verify GPO Application Implement Settings Using Group PolicyImplementing and Managing an Advanced Managing GPOs PreferencesDirectAccess Infrastructure Implementing Administrative Templates Managing Office 2013 by usingImplementing VPN Configuring Folder Redirection and Administrative TemplatesImplementing Web Application Proxy Scripts Deploying Software by using Group PolicyVerifying Readiness for a DirectAccess Configuring Group Policy Preferences Configuring Folder RedirectionDeployment Managing Software with Group Policy Module 6: Configuring andRunning the Getting Started Wizard Implement Settings Using Group Policy Troubleshooting Remote AccessValidating the DirectAccess Deployment Preferences Remote Access OverviewPreparing the Environment for DirectAccess Managing Office 2013 by using Implementing DirectAccess by Using theImplementing the Advanced DirectAccess Administrative Templates Getting Started WizardInfrastructure Deploying Software by using Group Implementing and Managing an AdvancedValidating the DirectAccess Deployment Policy DirectAccess InfrastructureImplementing VPN Configuring Folder Redirection Implementing VPNValidating the VPN Deployment Module 6: Configuring and Implementing Web Application ProxyImplementing Web Application Proxy Troubleshooting Remote Access Verifying Readiness for a DirectAccessValidating the Web Application Proxy Remote Access Overview DeploymentDeployment Implementing DirectAccess by Using the Running the Getting Started WizardInstalling and Configuring a Network Policy Getting Started Wizard Validating the DirectAccess DeploymentServer Implementing and Managing an Preparing the Environment forConfiguring RADIUS Clients and Servers Advanced DirectAccess Infrastructure DirectAccessNPS Authentication Methods Implementing VPN Implementing the Advanced DirectAccessMonitoring and Troubleshooting a Network Implementing Web Application Proxy InfrastructurePolicy Server Verifying Readiness for a DirectAccess Validating the DirectAccess DeploymentInstalling and Configuring NPS to Support Deployment Implementing VPNRADIUS Running the Getting Started Wizard Validating the VPN DeploymentConfiguring and Testing a RADIUS Client Validating the DirectAccess Deployment Implementing Web Application ProxyNetwork Access Protection Overview Preparing the Environment for Validating the Web Application ProxyConfiguring NAP DirectAccess DeploymentConfiguring IPSec Enforcement for NAP Implementing the Advanced Installing and Configuring a Network PolicyMonitoring and Troubleshooting NAP DirectAccess Infrastructure ServerConfiguring NAP with VPN Enforcement Validating the DirectAccess Deployment Configuring RADIUS Clients and ServersValidating the Deployment Implementing VPN NPS Authentication MethodsConfiguring IPSec Enforcement Validating the VPN Deployment Monitoring and Troubleshooting a NetworkValidating the Deployment Implementing Web Application Proxy Policy ServerOverview of FSRM Validating the Web Application Proxy Installing and Configuring NPS to SupportUsing FSRM to Manage Quotas, File Deployment RADIUSScreens, and Storage Reports Installing and Configuring a Network Configuring and Testing a RADIUS ClientImplementing Classification Management Policy Server Network Access Protection Overviewand File Management Tasks Configuring RADIUS Clients and Servers Configuring NAPDFS Overview NPS Authentication Methods Configuring IPSec Enforcement for NAPConfiguring DFS Namespaces Monitoring and Troubleshooting a Monitoring and Troubleshooting NAPConfiguring and Troubleshooting DFS-R Network Policy Server Configuring NAP with VPN EnforcementConfiguring FSRM Quotas Installing and Configuring NPS to Validating the DeploymentConfiguring File Screening Support RADIUS Configuring IPSec EnforcementInstalling the DFS role service Configuring and Testing a RADIUS Client Validating the DeploymentConfiguring a DFS Namespace Network Access Protection Overview Overview of FSRMConfiguring DFS-R Configuring NAP Using FSRM to Manage Quotas, FileModule 10: Configuring Encryption and Configuring IPSec Enforcement for NAP Screens, and Storage ReportsAdvanced Auditing Monitoring and Troubleshooting NAP Implementing Classification ManagementEncrypting Drives by Using BitLocker Configuring NAP with VPN Enforcement and File Management TasksEncrypting Files by Using Encrypting File Validating the Deployment DFS OverviewSystem Configuring IPSec Enforcement Configuring DFS NamespacesConfiguring Advanced Auditing Validating the Deployment Configuring and Troubleshooting DFS-RSecuring Data Drives by Using BitLocker Overview of FSRM Configuring FSRM QuotasEncrypting and Recovering Files Using FSRM to Manage Quotas, File Configuring File ScreeningConfiguring Advanced Audit Policy Screens, and Storage Reports Installing the DFS role serviceConfiguration Implementing Classification Management Configuring a DFS NamespaceOverview of Windows Deployment Services and File Management Tasks Configuring DFS-RManaging Windows Deployment Images DFS Overview Module 10: Configuring Encryption and

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Implementing Deployment with Windows Configuring DFS Namespaces Advanced AuditingDeployment Services Configuring and Troubleshooting DFS-R Encrypting Drives by Using BitLockerAdministering Windows Deployment Configuring FSRM Quotas Encrypting Files by Using Encrypting FileServices Configuring File Screening SystemInstalling and Configuring Windows Installing the DFS role service Configuring Advanced AuditingDeployment Services Configuring a DFS Namespace Securing Data Drives by Using BitLockerCreating Operating System Images with Configuring DFS-R Encrypting and Recovering FilesWindows Deployment Services Module 10: Configuring Encryption and Configuring Advanced Audit PolicyConfiguring Custom Computer Naming Advanced Auditing ConfigurationDeploying Images with Windows Encrypting Drives by Using BitLocker Overview of Windows DeploymentDeployment Services Encrypting Files by Using Encrypting File ServicesOverview of WSUS System Managing Windows Deployment ImagesDeploying Updates with WSUS Configuring Advanced Auditing Implementing Deployment with WindowsImplementing the WSUS Server Role Securing Data Drives by Using BitLocker Deployment ServicesConfiguring Update Settings Encrypting and Recovering Files Administering Windows DeploymentApproving and Deploying an Update by Configuring Advanced Audit Policy Servicesusing WSUS Configuration Installing and Configuring WindowsMonitoring Tools Overview of Windows Deployment Deployment ServicesUsing Performance Monitor Services Creating Operating System Images withMonitoring Event Logs Managing Windows Deployment Images Windows Deployment ServicesEstablishing a Performance Baseline Implementing Deployment with Windows Configuring Custom Computer NamingIdentifying the Source of a Performance Deployment Services Deploying Images with WindowsProblem Administering Windows Deployment Deployment ServicesViewing and Configuring Centralized Event Services Overview of WSUSLogs Installing and Configuring Windows Deploying Updates with WSUS

Deployment Services Implementing the WSUS Server RoleCreating Operating System Images with Configuring Update Settings

line Windows Deployment Services Approving and Deploying an Update byConfiguring the DNS Server Role Configuring Custom Computer Naming using WSUSConfiguring DNS Zones Deploying Images with Windows Monitoring ToolsConfiguring DNS Zone Transfers Deployment Services Using Performance MonitorManaging and Troubleshooting DNS Overview of WSUS Monitoring Event LogsConfiguring DNS Resource Records Deploying Updates with WSUS Establishing a Performance BaselineConfiguring DNS Conditional Forwarding Implementing the WSUS Server Role Identifying the Source of a PerformanceInstalling and Configuring DNS Zones Configuring Update Settings ProblemTroubleshooting DNS Approving and Deploying an Update by Viewing and Configuring Centralized EventOverview of AD DS using WSUS LogsImplementing Virtualized Domain Controllers Monitoring ToolsImplementing Read-Only Domain Using Performance MonitorControllers Monitoring Event Logs lineAdministering AD DS Establishing a Performance Baseline Configuring the DNS Server RoleManaging the AD DS Database Identifying the Source of a Performance Configuring DNS ZonesInstalling and Configuring a RODC Problem Configuring DNS Zone TransfersCreate and administer AD DS Snapshots Viewing and Configuring Centralized Managing and Troubleshooting DNSConfiguring the Active Directory Recycle Bin Event Logs Configuring DNS Resource RecordsDeploy a domain controller by using domain Configuring DNS Conditional Forwardingcontroller cloning Installing and Configuring DNS ZonesConfiguring Password Policy and User line Troubleshooting DNSAccount Configuring the DNS Server Role Overview of AD DSConfiguring Managed Service Accounts Configuring DNS Zones Implementing Virtualized DomainConfiguring Password Policy and Account Configuring DNS Zone Transfers ControllersLockout Settings Managing and Troubleshooting DNS Implementing Read-Only DomainCreating and Associating a Group Managed Configuring DNS Resource Records ControllersService Account Configuring DNS Conditional Forwarding Administering AD DSIntroducing Group Policy Installing and Configuring DNS Zones Managing the AD DS DatabaseImplementing and Administering GPOs Troubleshooting DNS Installing and Configuring a RODCGroup Policy Scope and Group Policy Overview of AD DS Create and administer AD DS SnapshotsProcessing Implementing Virtualized Domain Configuring the Active Directory RecycleTroubleshooting the Application of GPOs Controllers BinCreating and Configuring GPOs Implementing Read-Only Domain Deploy a domain controller by usingManaging GPO Scope Controllers domain controller cloningVerify GPO Application Administering AD DS Configuring Password Policy and UserManaging GPOs Managing the AD DS Database AccountImplementing Administrative Templates Installing and Configuring a RODC Configuring Managed Service AccountsConfiguring Folder Redirection and Scripts Create and administer AD DS Snapshots Configuring Password Policy and AccountConfiguring Group Policy Preferences Configuring the Active Directory Recycle Lockout Settings

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Managing Software with Group Policy Bin Creating and Associating a GroupImplement Settings Using Group Policy Deploy a domain controller by using Managed Service AccountPreferences domain controller cloning Introducing Group PolicyManaging Office 2013 by using Configuring Password Policy and User Implementing and Administering GPOsAdministrative Templates Account Group Policy Scope and Group PolicyDeploying Software by using Group Policy Configuring Managed Service Accounts ProcessingConfiguring Folder Redirection Configuring Password Policy and Troubleshooting the Application of GPOsModule 6: Configuring and Troubleshooting Account Lockout Settings Creating and Configuring GPOsRemote Access Creating and Associating a Group Managing GPO ScopeRemote Access Overview Managed Service Account Verify GPO ApplicationImplementing DirectAccess by Using the Introducing Group Policy Managing GPOsGetting Started Wizard Implementing and Administering GPOs Implementing Administrative TemplatesImplementing and Managing an Advanced Group Policy Scope and Group Policy Configuring Folder Redirection and ScriptsDirectAccess Infrastructure Processing Configuring Group Policy PreferencesImplementing VPN Troubleshooting the Application of GPOs Managing Software with Group PolicyImplementing Web Application Proxy Creating and Configuring GPOs Implement Settings Using Group PolicyVerifying Readiness for a DirectAccess Managing GPO Scope PreferencesDeployment Verify GPO Application Managing Office 2013 by usingRunning the Getting Started Wizard Managing GPOs Administrative TemplatesValidating the DirectAccess Deployment Implementing Administrative Templates Deploying Software by using Group PolicyPreparing the Environment for DirectAccess Configuring Folder Redirection and Configuring Folder RedirectionImplementing the Advanced DirectAccess Scripts Module 6: Configuring andInfrastructure Configuring Group Policy Preferences Troubleshooting Remote AccessValidating the DirectAccess Deployment Managing Software with Group Policy Remote Access OverviewImplementing VPN Implement Settings Using Group Policy Implementing DirectAccess by Using theValidating the VPN Deployment Preferences Getting Started WizardImplementing Web Application Proxy Managing Office 2013 by using Implementing and Managing an AdvancedValidating the Web Application Proxy Administrative Templates DirectAccess InfrastructureDeployment Deploying Software by using Group Implementing VPNInstalling and Configuring a Network Policy Policy Implementing Web Application ProxyServer Configuring Folder Redirection Verifying Readiness for a DirectAccessConfiguring RADIUS Clients and Servers Module 6: Configuring and DeploymentNPS Authentication Methods Troubleshooting Remote Access Running the Getting Started WizardMonitoring and Troubleshooting a Network Remote Access Overview Validating the DirectAccess DeploymentPolicy Server Implementing DirectAccess by Using the Preparing the Environment forInstalling and Configuring NPS to Support Getting Started Wizard DirectAccessRADIUS Implementing and Managing an Implementing the Advanced DirectAccessConfiguring and Testing a RADIUS Client Advanced DirectAccess Infrastructure InfrastructureNetwork Access Protection Overview Implementing VPN Validating the DirectAccess DeploymentConfiguring NAP Implementing Web Application Proxy Implementing VPNConfiguring IPSec Enforcement for NAP Verifying Readiness for a DirectAccess Validating the VPN DeploymentMonitoring and Troubleshooting NAP Deployment Implementing Web Application ProxyConfiguring NAP with VPN Enforcement Running the Getting Started Wizard Validating the Web Application ProxyValidating the Deployment Validating the DirectAccess Deployment DeploymentConfiguring IPSec Enforcement Preparing the Environment for Installing and Configuring a Network PolicyValidating the Deployment DirectAccess ServerOverview of FSRM Implementing the Advanced Configuring RADIUS Clients and ServersUsing FSRM to Manage Quotas, File DirectAccess Infrastructure NPS Authentication MethodsScreens, and Storage Reports Validating the DirectAccess Deployment Monitoring and Troubleshooting a NetworkImplementing Classification Management Implementing VPN Policy Serverand File Management Tasks Validating the VPN Deployment Installing and Configuring NPS to SupportDFS Overview Implementing Web Application Proxy RADIUSConfiguring DFS Namespaces Validating the Web Application Proxy Configuring and Testing a RADIUS ClientConfiguring and Troubleshooting DFS-R Deployment Network Access Protection OverviewConfiguring FSRM Quotas Installing and Configuring a Network Configuring NAPConfiguring File Screening Policy Server Configuring IPSec Enforcement for NAPInstalling the DFS role service Configuring RADIUS Clients and Servers Monitoring and Troubleshooting NAPConfiguring a DFS Namespace NPS Authentication Methods Configuring NAP with VPN EnforcementConfiguring DFS-R Monitoring and Troubleshooting a Validating the DeploymentModule 10: Configuring Encryption and Network Policy Server Configuring IPSec EnforcementAdvanced Auditing Installing and Configuring NPS to Validating the DeploymentEncrypting Drives by Using BitLocker Support RADIUS Overview of FSRMEncrypting Files by Using Encrypting File Configuring and Testing a RADIUS Client Using FSRM to Manage Quotas, FileSystem Network Access Protection Overview Screens, and Storage ReportsConfiguring Advanced Auditing Configuring NAP Implementing Classification ManagementSecuring Data Drives by Using BitLocker Configuring IPSec Enforcement for NAP and File Management Tasks

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Encrypting and Recovering Files Monitoring and Troubleshooting NAP DFS OverviewConfiguring Advanced Audit Policy Configuring NAP with VPN Enforcement Configuring DFS NamespacesConfiguration Validating the Deployment Configuring and Troubleshooting DFS-ROverview of Windows Deployment Services Configuring IPSec Enforcement Configuring FSRM QuotasManaging Windows Deployment Images Validating the Deployment Configuring File ScreeningImplementing Deployment with Windows Overview of FSRM Installing the DFS role serviceDeployment Services Using FSRM to Manage Quotas, File Configuring a DFS NamespaceAdministering Windows Deployment Screens, and Storage Reports Configuring DFS-RServices Implementing Classification Management Module 10: Configuring Encryption andInstalling and Configuring Windows and File Management Tasks Advanced AuditingDeployment Services DFS Overview Encrypting Drives by Using BitLockerCreating Operating System Images with Configuring DFS Namespaces Encrypting Files by Using Encrypting FileWindows Deployment Services Configuring and Troubleshooting DFS-R SystemConfiguring Custom Computer Naming Configuring FSRM Quotas Configuring Advanced AuditingDeploying Images with Windows Configuring File Screening Securing Data Drives by Using BitLockerDeployment Services Installing the DFS role service Encrypting and Recovering FilesOverview of WSUS Configuring a DFS Namespace Configuring Advanced Audit PolicyDeploying Updates with WSUS Configuring DFS-R ConfigurationImplementing the WSUS Server Role Module 10: Configuring Encryption and Overview of Windows DeploymentConfiguring Update Settings Advanced Auditing ServicesApproving and Deploying an Update by Encrypting Drives by Using BitLocker Managing Windows Deployment Imagesusing WSUS Encrypting Files by Using Encrypting File Implementing Deployment with WindowsMonitoring Tools System Deployment ServicesUsing Performance Monitor Configuring Advanced Auditing Administering Windows DeploymentMonitoring Event Logs Securing Data Drives by Using BitLocker ServicesEstablishing a Performance Baseline Encrypting and Recovering Files Installing and Configuring WindowsIdentifying the Source of a Performance Configuring Advanced Audit Policy Deployment ServicesProblem Configuration Creating Operating System Images withViewing and Configuring Centralized Event Overview of Windows Deployment Windows Deployment ServicesLogs Services Configuring Custom Computer Naming

Managing Windows Deployment Images Deploying Images with WindowsLab : Configuring and Troubleshooting DNS Implementing Deployment with Windows Deployment Servicesline Deployment Services Overview of WSUS

Administering Windows Deployment Deploying Updates with WSUSServices Implementing the WSUS Server Role

line Installing and Configuring Windows Configuring Update SettingsConfiguring the DNS Server Role Deployment Services Approving and Deploying an Update byConfiguring DNS Zones Creating Operating System Images with using WSUSConfiguring DNS Zone Transfers Windows Deployment Services Monitoring ToolsManaging and Troubleshooting DNS Configuring Custom Computer Naming Using Performance MonitorConfiguring DNS Resource Records Deploying Images with Windows Monitoring Event LogsConfiguring DNS Conditional Forwarding Deployment Services Establishing a Performance BaselineInstalling and Configuring DNS Zones Overview of WSUS Identifying the Source of a PerformanceTroubleshooting DNS Deploying Updates with WSUS ProblemOverview of AD DS Implementing the WSUS Server Role Viewing and Configuring Centralized EventImplementing Virtualized Domain Controllers Configuring Update Settings LogsImplementing Read-Only Domain Approving and Deploying an Update byControllers using WSUS Lab : Configuring Quotas and File ScreeningAdministering AD DS Monitoring Tools Using FSRMManaging the AD DS Database Using Performance Monitor lineInstalling and Configuring a RODC Monitoring Event LogsCreate and administer AD DS Snapshots Establishing a Performance BaselineConfiguring the Active Directory Recycle Bin Identifying the Source of a Performance lineDeploy a domain controller by using domain Problem Configuring the DNS Server Rolecontroller cloning Viewing and Configuring Centralized Configuring DNS ZonesConfiguring Password Policy and User Event Logs Configuring DNS Zone TransfersAccount Managing and Troubleshooting DNSConfiguring Managed Service Accounts Configuring DNS Resource RecordsConfiguring Password Policy and Account line Configuring DNS Conditional ForwardingLockout Settings Configuring the DNS Server Role Installing and Configuring DNS ZonesCreating and Associating a Group Managed Configuring DNS Zones Troubleshooting DNSService Account Configuring DNS Zone Transfers Overview of AD DSIntroducing Group Policy Managing and Troubleshooting DNS Implementing Virtualized DomainImplementing and Administering GPOs Configuring DNS Resource Records ControllersGroup Policy Scope and Group Policy Configuring DNS Conditional Forwarding Implementing Read-Only DomainProcessing Installing and Configuring DNS Zones Controllers

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Troubleshooting the Application of GPOs Troubleshooting DNS Administering AD DSCreating and Configuring GPOs Overview of AD DS Managing the AD DS DatabaseManaging GPO Scope Implementing Virtualized Domain Installing and Configuring a RODCVerify GPO Application Controllers Create and administer AD DS SnapshotsManaging GPOs Implementing Read-Only Domain Configuring the Active Directory RecycleImplementing Administrative Templates Controllers BinConfiguring Folder Redirection and Scripts Administering AD DS Deploy a domain controller by usingConfiguring Group Policy Preferences Managing the AD DS Database domain controller cloningManaging Software with Group Policy Installing and Configuring a RODC Configuring Password Policy and UserImplement Settings Using Group Policy Create and administer AD DS Snapshots AccountPreferences Configuring the Active Directory Recycle Configuring Managed Service AccountsManaging Office 2013 by using Bin Configuring Password Policy and AccountAdministrative Templates Deploy a domain controller by using Lockout SettingsDeploying Software by using Group Policy domain controller cloning Creating and Associating a GroupConfiguring Folder Redirection Configuring Password Policy and User Managed Service AccountModule 6: Configuring and Troubleshooting Account Introducing Group PolicyRemote Access Configuring Managed Service Accounts Implementing and Administering GPOsRemote Access Overview Configuring Password Policy and Group Policy Scope and Group PolicyImplementing DirectAccess by Using the Account Lockout Settings ProcessingGetting Started Wizard Creating and Associating a Group Troubleshooting the Application of GPOsImplementing and Managing an Advanced Managed Service Account Creating and Configuring GPOsDirectAccess Infrastructure Introducing Group Policy Managing GPO ScopeImplementing VPN Implementing and Administering GPOs Verify GPO ApplicationImplementing Web Application Proxy Group Policy Scope and Group Policy Managing GPOsVerifying Readiness for a DirectAccess Processing Implementing Administrative TemplatesDeployment Troubleshooting the Application of GPOs Configuring Folder Redirection and ScriptsRunning the Getting Started Wizard Creating and Configuring GPOs Configuring Group Policy PreferencesValidating the DirectAccess Deployment Managing GPO Scope Managing Software with Group PolicyPreparing the Environment for DirectAccess Verify GPO Application Implement Settings Using Group PolicyImplementing the Advanced DirectAccess Managing GPOs PreferencesInfrastructure Implementing Administrative Templates Managing Office 2013 by usingValidating the DirectAccess Deployment Configuring Folder Redirection and Administrative TemplatesImplementing VPN Scripts Deploying Software by using Group PolicyValidating the VPN Deployment Configuring Group Policy Preferences Configuring Folder RedirectionImplementing Web Application Proxy Managing Software with Group Policy Module 6: Configuring andValidating the Web Application Proxy Implement Settings Using Group Policy Troubleshooting Remote AccessDeployment Preferences Remote Access OverviewInstalling and Configuring a Network Policy Managing Office 2013 by using Implementing DirectAccess by Using theServer Administrative Templates Getting Started WizardConfiguring RADIUS Clients and Servers Deploying Software by using Group Implementing and Managing an AdvancedNPS Authentication Methods Policy DirectAccess InfrastructureMonitoring and Troubleshooting a Network Configuring Folder Redirection Implementing VPNPolicy Server Module 6: Configuring and Implementing Web Application ProxyInstalling and Configuring NPS to Support Troubleshooting Remote Access Verifying Readiness for a DirectAccessRADIUS Remote Access Overview DeploymentConfiguring and Testing a RADIUS Client Implementing DirectAccess by Using the Running the Getting Started WizardNetwork Access Protection Overview Getting Started Wizard Validating the DirectAccess DeploymentConfiguring NAP Implementing and Managing an Preparing the Environment forConfiguring IPSec Enforcement for NAP Advanced DirectAccess Infrastructure DirectAccessMonitoring and Troubleshooting NAP Implementing VPN Implementing the Advanced DirectAccessConfiguring NAP with VPN Enforcement Implementing Web Application Proxy InfrastructureValidating the Deployment Verifying Readiness for a DirectAccess Validating the DirectAccess DeploymentConfiguring IPSec Enforcement Deployment Implementing VPNValidating the Deployment Running the Getting Started Wizard Validating the VPN DeploymentOverview of FSRM Validating the DirectAccess Deployment Implementing Web Application ProxyUsing FSRM to Manage Quotas, File Preparing the Environment for Validating the Web Application ProxyScreens, and Storage Reports DirectAccess DeploymentImplementing Classification Management Implementing the Advanced Installing and Configuring a Network Policyand File Management Tasks DirectAccess Infrastructure ServerDFS Overview Validating the DirectAccess Deployment Configuring RADIUS Clients and ServersConfiguring DFS Namespaces Implementing VPN NPS Authentication MethodsConfiguring and Troubleshooting DFS-R Validating the VPN Deployment Monitoring and Troubleshooting a NetworkConfiguring FSRM Quotas Implementing Web Application Proxy Policy ServerConfiguring File Screening Validating the Web Application Proxy Installing and Configuring NPS to SupportInstalling the DFS role service Deployment RADIUSConfiguring a DFS Namespace Installing and Configuring a Network Configuring and Testing a RADIUS Client

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Configuring DFS-R Policy Server Network Access Protection OverviewModule 10: Configuring Encryption and Configuring RADIUS Clients and Servers Configuring NAPAdvanced Auditing NPS Authentication Methods Configuring IPSec Enforcement for NAPEncrypting Drives by Using BitLocker Monitoring and Troubleshooting a Monitoring and Troubleshooting NAPEncrypting Files by Using Encrypting File Network Policy Server Configuring NAP with VPN EnforcementSystem Installing and Configuring NPS to Validating the DeploymentConfiguring Advanced Auditing Support RADIUS Configuring IPSec EnforcementSecuring Data Drives by Using BitLocker Configuring and Testing a RADIUS Client Validating the DeploymentEncrypting and Recovering Files Network Access Protection Overview Overview of FSRMConfiguring Advanced Audit Policy Configuring NAP Using FSRM to Manage Quotas, FileConfiguration Configuring IPSec Enforcement for NAP Screens, and Storage ReportsOverview of Windows Deployment Services Monitoring and Troubleshooting NAP Implementing Classification ManagementManaging Windows Deployment Images Configuring NAP with VPN Enforcement and File Management TasksImplementing Deployment with Windows Validating the Deployment DFS OverviewDeployment Services Configuring IPSec Enforcement Configuring DFS NamespacesAdministering Windows Deployment Validating the Deployment Configuring and Troubleshooting DFS-RServices Overview of FSRM Configuring FSRM QuotasInstalling and Configuring Windows Using FSRM to Manage Quotas, File Configuring File ScreeningDeployment Services Screens, and Storage Reports Installing the DFS role serviceCreating Operating System Images with Implementing Classification Management Configuring a DFS NamespaceWindows Deployment Services and File Management Tasks Configuring DFS-RConfiguring Custom Computer Naming DFS Overview Module 10: Configuring Encryption andDeploying Images with Windows Configuring DFS Namespaces Advanced AuditingDeployment Services Configuring and Troubleshooting DFS-R Encrypting Drives by Using BitLockerOverview of WSUS Configuring FSRM Quotas Encrypting Files by Using Encrypting FileDeploying Updates with WSUS Configuring File Screening SystemImplementing the WSUS Server Role Installing the DFS role service Configuring Advanced AuditingConfiguring Update Settings Configuring a DFS Namespace Securing Data Drives by Using BitLockerApproving and Deploying an Update by Configuring DFS-R Encrypting and Recovering Filesusing WSUS Module 10: Configuring Encryption and Configuring Advanced Audit PolicyMonitoring Tools Advanced Auditing ConfigurationUsing Performance Monitor Encrypting Drives by Using BitLocker Overview of Windows DeploymentMonitoring Event Logs Encrypting Files by Using Encrypting File ServicesEstablishing a Performance Baseline System Managing Windows Deployment ImagesIdentifying the Source of a Performance Configuring Advanced Auditing Implementing Deployment with WindowsProblem Securing Data Drives by Using BitLocker Deployment ServicesViewing and Configuring Centralized Event Encrypting and Recovering Files Administering Windows DeploymentLogs Configuring Advanced Audit Policy Services

Configuration Installing and Configuring WindowsOverview of Windows Deployment Deployment Services

line Services Creating Operating System Images withConfiguring the DNS Server Role Managing Windows Deployment Images Windows Deployment ServicesConfiguring DNS Zones Implementing Deployment with Windows Configuring Custom Computer NamingConfiguring DNS Zone Transfers Deployment Services Deploying Images with WindowsManaging and Troubleshooting DNS Administering Windows Deployment Deployment ServicesConfiguring DNS Resource Records Services Overview of WSUSConfiguring DNS Conditional Forwarding Installing and Configuring Windows Deploying Updates with WSUSInstalling and Configuring DNS Zones Deployment Services Implementing the WSUS Server RoleTroubleshooting DNS Creating Operating System Images with Configuring Update SettingsOverview of AD DS Windows Deployment Services Approving and Deploying an Update byImplementing Virtualized Domain Controllers Configuring Custom Computer Naming using WSUSImplementing Read-Only Domain Deploying Images with Windows Monitoring ToolsControllers Deployment Services Using Performance MonitorAdministering AD DS Overview of WSUS Monitoring Event LogsManaging the AD DS Database Deploying Updates with WSUS Establishing a Performance BaselineInstalling and Configuring a RODC Implementing the WSUS Server Role Identifying the Source of a PerformanceCreate and administer AD DS Snapshots Configuring Update Settings ProblemConfiguring the Active Directory Recycle Bin Approving and Deploying an Update by Viewing and Configuring Centralized EventDeploy a domain controller by using domain using WSUS Logscontroller cloning Monitoring ToolsConfiguring Password Policy and User Using Performance MonitorAccount Monitoring Event Logs lineConfiguring Managed Service Accounts Establishing a Performance Baseline Configuring the DNS Server RoleConfiguring Password Policy and Account Identifying the Source of a Performance Configuring DNS ZonesLockout Settings Problem Configuring DNS Zone TransfersCreating and Associating a Group Managed Viewing and Configuring Centralized Managing and Troubleshooting DNS

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Service Account Event Logs Configuring DNS Resource RecordsIntroducing Group Policy Configuring DNS Conditional ForwardingImplementing and Administering GPOs Installing and Configuring DNS ZonesGroup Policy Scope and Group Policy line Troubleshooting DNSProcessing Configuring the DNS Server Role Overview of AD DSTroubleshooting the Application of GPOs Configuring DNS Zones Implementing Virtualized DomainCreating and Configuring GPOs Configuring DNS Zone Transfers ControllersManaging GPO Scope Managing and Troubleshooting DNS Implementing Read-Only DomainVerify GPO Application Configuring DNS Resource Records ControllersManaging GPOs Configuring DNS Conditional Forwarding Administering AD DSImplementing Administrative Templates Installing and Configuring DNS Zones Managing the AD DS DatabaseConfiguring Folder Redirection and Scripts Troubleshooting DNS Installing and Configuring a RODCConfiguring Group Policy Preferences Overview of AD DS Create and administer AD DS SnapshotsManaging Software with Group Policy Implementing Virtualized Domain Configuring the Active Directory RecycleImplement Settings Using Group Policy Controllers BinPreferences Implementing Read-Only Domain Deploy a domain controller by usingManaging Office 2013 by using Controllers domain controller cloningAdministrative Templates Administering AD DS Configuring Password Policy and UserDeploying Software by using Group Policy Managing the AD DS Database AccountConfiguring Folder Redirection Installing and Configuring a RODC Configuring Managed Service AccountsModule 6: Configuring and Troubleshooting Create and administer AD DS Snapshots Configuring Password Policy and AccountRemote Access Configuring the Active Directory Recycle Lockout SettingsRemote Access Overview Bin Creating and Associating a GroupImplementing DirectAccess by Using the Deploy a domain controller by using Managed Service AccountGetting Started Wizard domain controller cloning Introducing Group PolicyImplementing and Managing an Advanced Configuring Password Policy and User Implementing and Administering GPOsDirectAccess Infrastructure Account Group Policy Scope and Group PolicyImplementing VPN Configuring Managed Service Accounts ProcessingImplementing Web Application Proxy Configuring Password Policy and Troubleshooting the Application of GPOsVerifying Readiness for a DirectAccess Account Lockout Settings Creating and Configuring GPOsDeployment Creating and Associating a Group Managing GPO ScopeRunning the Getting Started Wizard Managed Service Account Verify GPO ApplicationValidating the DirectAccess Deployment Introducing Group Policy Managing GPOsPreparing the Environment for DirectAccess Implementing and Administering GPOs Implementing Administrative TemplatesImplementing the Advanced DirectAccess Group Policy Scope and Group Policy Configuring Folder Redirection and ScriptsInfrastructure Processing Configuring Group Policy PreferencesValidating the DirectAccess Deployment Troubleshooting the Application of GPOs Managing Software with Group PolicyImplementing VPN Creating and Configuring GPOs Implement Settings Using Group PolicyValidating the VPN Deployment Managing GPO Scope PreferencesImplementing Web Application Proxy Verify GPO Application Managing Office 2013 by usingValidating the Web Application Proxy Managing GPOs Administrative TemplatesDeployment Implementing Administrative Templates Deploying Software by using Group PolicyInstalling and Configuring a Network Policy Configuring Folder Redirection and Configuring Folder RedirectionServer Scripts Module 6: Configuring andConfiguring RADIUS Clients and Servers Configuring Group Policy Preferences Troubleshooting Remote AccessNPS Authentication Methods Managing Software with Group Policy Remote Access OverviewMonitoring and Troubleshooting a Network Implement Settings Using Group Policy Implementing DirectAccess by Using thePolicy Server Preferences Getting Started WizardInstalling and Configuring NPS to Support Managing Office 2013 by using Implementing and Managing an AdvancedRADIUS Administrative Templates DirectAccess InfrastructureConfiguring and Testing a RADIUS Client Deploying Software by using Group Implementing VPNNetwork Access Protection Overview Policy Implementing Web Application ProxyConfiguring NAP Configuring Folder Redirection Verifying Readiness for a DirectAccessConfiguring IPSec Enforcement for NAP Module 6: Configuring and DeploymentMonitoring and Troubleshooting NAP Troubleshooting Remote Access Running the Getting Started WizardConfiguring NAP with VPN Enforcement Remote Access Overview Validating the DirectAccess DeploymentValidating the Deployment Implementing DirectAccess by Using the Preparing the Environment forConfiguring IPSec Enforcement Getting Started Wizard DirectAccessValidating the Deployment Implementing and Managing an Implementing the Advanced DirectAccessOverview of FSRM Advanced DirectAccess Infrastructure InfrastructureUsing FSRM to Manage Quotas, File Implementing VPN Validating the DirectAccess DeploymentScreens, and Storage Reports Implementing Web Application Proxy Implementing VPNImplementing Classification Management Verifying Readiness for a DirectAccess Validating the VPN Deploymentand File Management Tasks Deployment Implementing Web Application ProxyDFS Overview Running the Getting Started Wizard Validating the Web Application ProxyConfiguring DFS Namespaces Validating the DirectAccess Deployment Deployment

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Configuring and Troubleshooting DFS-R Preparing the Environment for Installing and Configuring a Network PolicyConfiguring FSRM Quotas DirectAccess ServerConfiguring File Screening Implementing the Advanced Configuring RADIUS Clients and ServersInstalling the DFS role service DirectAccess Infrastructure NPS Authentication MethodsConfiguring a DFS Namespace Validating the DirectAccess Deployment Monitoring and Troubleshooting a NetworkConfiguring DFS-R Implementing VPN Policy ServerModule 10: Configuring Encryption and Validating the VPN Deployment Installing and Configuring NPS to SupportAdvanced Auditing Implementing Web Application Proxy RADIUSEncrypting Drives by Using BitLocker Validating the Web Application Proxy Configuring and Testing a RADIUS ClientEncrypting Files by Using Encrypting File Deployment Network Access Protection OverviewSystem Installing and Configuring a Network Configuring NAPConfiguring Advanced Auditing Policy Server Configuring IPSec Enforcement for NAPSecuring Data Drives by Using BitLocker Configuring RADIUS Clients and Servers Monitoring and Troubleshooting NAPEncrypting and Recovering Files NPS Authentication Methods Configuring NAP with VPN EnforcementConfiguring Advanced Audit Policy Monitoring and Troubleshooting a Validating the DeploymentConfiguration Network Policy Server Configuring IPSec EnforcementOverview of Windows Deployment Services Installing and Configuring NPS to Validating the DeploymentManaging Windows Deployment Images Support RADIUS Overview of FSRMImplementing Deployment with Windows Configuring and Testing a RADIUS Client Using FSRM to Manage Quotas, FileDeployment Services Network Access Protection Overview Screens, and Storage ReportsAdministering Windows Deployment Configuring NAP Implementing Classification ManagementServices Configuring IPSec Enforcement for NAP and File Management TasksInstalling and Configuring Windows Monitoring and Troubleshooting NAP DFS OverviewDeployment Services Configuring NAP with VPN Enforcement Configuring DFS NamespacesCreating Operating System Images with Validating the Deployment Configuring and Troubleshooting DFS-RWindows Deployment Services Configuring IPSec Enforcement Configuring FSRM QuotasConfiguring Custom Computer Naming Validating the Deployment Configuring File ScreeningDeploying Images with Windows Overview of FSRM Installing the DFS role serviceDeployment Services Using FSRM to Manage Quotas, File Configuring a DFS NamespaceOverview of WSUS Screens, and Storage Reports Configuring DFS-RDeploying Updates with WSUS Implementing Classification Management Module 10: Configuring Encryption andImplementing the WSUS Server Role and File Management Tasks Advanced AuditingConfiguring Update Settings DFS Overview Encrypting Drives by Using BitLockerApproving and Deploying an Update by Configuring DFS Namespaces Encrypting Files by Using Encrypting Fileusing WSUS Configuring and Troubleshooting DFS-R SystemMonitoring Tools Configuring FSRM Quotas Configuring Advanced AuditingUsing Performance Monitor Configuring File Screening Securing Data Drives by Using BitLockerMonitoring Event Logs Installing the DFS role service Encrypting and Recovering FilesEstablishing a Performance Baseline Configuring a DFS Namespace Configuring Advanced Audit PolicyIdentifying the Source of a Performance Configuring DFS-R ConfigurationProblem Module 10: Configuring Encryption and Overview of Windows DeploymentViewing and Configuring Centralized Event Advanced Auditing ServicesLogs Encrypting Drives by Using BitLocker Managing Windows Deployment Images

Encrypting Files by Using Encrypting File Implementing Deployment with WindowsSystem Deployment Services

line Configuring Advanced Auditing Administering Windows DeploymentConfiguring the DNS Server Role Securing Data Drives by Using BitLocker ServicesConfiguring DNS Zones Encrypting and Recovering Files Installing and Configuring WindowsConfiguring DNS Zone Transfers Configuring Advanced Audit Policy Deployment ServicesManaging and Troubleshooting DNS Configuration Creating Operating System Images withConfiguring DNS Resource Records Overview of Windows Deployment Windows Deployment ServicesConfiguring DNS Conditional Forwarding Services Configuring Custom Computer NamingInstalling and Configuring DNS Zones Managing Windows Deployment Images Deploying Images with WindowsTroubleshooting DNS Implementing Deployment with Windows Deployment ServicesOverview of AD DS Deployment Services Overview of WSUSImplementing Virtualized Domain Controllers Administering Windows Deployment Deploying Updates with WSUSImplementing Read-Only Domain Services Implementing the WSUS Server RoleControllers Installing and Configuring Windows Configuring Update SettingsAdministering AD DS Deployment Services Approving and Deploying an Update byManaging the AD DS Database Creating Operating System Images with using WSUSInstalling and Configuring a RODC Windows Deployment Services Monitoring ToolsCreate and administer AD DS Snapshots Configuring Custom Computer Naming Using Performance MonitorConfiguring the Active Directory Recycle Bin Deploying Images with Windows Monitoring Event LogsDeploy a domain controller by using domain Deployment Services Establishing a Performance Baselinecontroller cloning Overview of WSUS Identifying the Source of a PerformanceConfiguring Password Policy and User Deploying Updates with WSUS Problem

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Account Implementing the WSUS Server Role Viewing and Configuring Centralized EventConfiguring Managed Service Accounts Configuring Update Settings LogsConfiguring Password Policy and Account Approving and Deploying an Update byLockout Settings using WSUSCreating and Associating a Group Managed Monitoring Tools lineService Account Using Performance Monitor Configuring the DNS Server RoleIntroducing Group Policy Monitoring Event Logs Configuring DNS ZonesImplementing and Administering GPOs Establishing a Performance Baseline Configuring DNS Zone TransfersGroup Policy Scope and Group Policy Identifying the Source of a Performance Managing and Troubleshooting DNSProcessing Problem Configuring DNS Resource RecordsTroubleshooting the Application of GPOs Viewing and Configuring Centralized Configuring DNS Conditional ForwardingCreating and Configuring GPOs Event Logs Installing and Configuring DNS ZonesManaging GPO Scope Troubleshooting DNSVerify GPO Application Overview of AD DSManaging GPOs line Implementing Virtualized DomainImplementing Administrative Templates Configuring the DNS Server Role ControllersConfiguring Folder Redirection and Scripts Configuring DNS Zones Implementing Read-Only DomainConfiguring Group Policy Preferences Configuring DNS Zone Transfers ControllersManaging Software with Group Policy Managing and Troubleshooting DNS Administering AD DSImplement Settings Using Group Policy Configuring DNS Resource Records Managing the AD DS DatabasePreferences Configuring DNS Conditional Forwarding Installing and Configuring a RODCManaging Office 2013 by using Installing and Configuring DNS Zones Create and administer AD DS SnapshotsAdministrative Templates Troubleshooting DNS Configuring the Active Directory RecycleDeploying Software by using Group Policy Overview of AD DS BinConfiguring Folder Redirection Implementing Virtualized Domain Deploy a domain controller by usingModule 6: Configuring and Troubleshooting Controllers domain controller cloningRemote Access Implementing Read-Only Domain Configuring Password Policy and UserRemote Access Overview Controllers AccountImplementing DirectAccess by Using the Administering AD DS Configuring Managed Service AccountsGetting Started Wizard Managing the AD DS Database Configuring Password Policy and AccountImplementing and Managing an Advanced Installing and Configuring a RODC Lockout SettingsDirectAccess Infrastructure Create and administer AD DS Snapshots Creating and Associating a GroupImplementing VPN Configuring the Active Directory Recycle Managed Service AccountImplementing Web Application Proxy Bin Introducing Group PolicyVerifying Readiness for a DirectAccess Deploy a domain controller by using Implementing and Administering GPOsDeployment domain controller cloning Group Policy Scope and Group PolicyRunning the Getting Started Wizard Configuring Password Policy and User ProcessingValidating the DirectAccess Deployment Account Troubleshooting the Application of GPOsPreparing the Environment for DirectAccess Configuring Managed Service Accounts Creating and Configuring GPOsImplementing the Advanced DirectAccess Configuring Password Policy and Managing GPO ScopeInfrastructure Account Lockout Settings Verify GPO ApplicationValidating the DirectAccess Deployment Creating and Associating a Group Managing GPOsImplementing VPN Managed Service Account Implementing Administrative TemplatesValidating the VPN Deployment Introducing Group Policy Configuring Folder Redirection and ScriptsImplementing Web Application Proxy Implementing and Administering GPOs Configuring Group Policy PreferencesValidating the Web Application Proxy Group Policy Scope and Group Policy Managing Software with Group PolicyDeployment Processing Implement Settings Using Group PolicyInstalling and Configuring a Network Policy Troubleshooting the Application of GPOs PreferencesServer Creating and Configuring GPOs Managing Office 2013 by usingConfiguring RADIUS Clients and Servers Managing GPO Scope Administrative TemplatesNPS Authentication Methods Verify GPO Application Deploying Software by using Group PolicyMonitoring and Troubleshooting a Network Managing GPOs Configuring Folder RedirectionPolicy Server Implementing Administrative Templates Module 6: Configuring andInstalling and Configuring NPS to Support Configuring Folder Redirection and Troubleshooting Remote AccessRADIUS Scripts Remote Access OverviewConfiguring and Testing a RADIUS Client Configuring Group Policy Preferences Implementing DirectAccess by Using theNetwork Access Protection Overview Managing Software with Group Policy Getting Started WizardConfiguring NAP Implement Settings Using Group Policy Implementing and Managing an AdvancedConfiguring IPSec Enforcement for NAP Preferences DirectAccess InfrastructureMonitoring and Troubleshooting NAP Managing Office 2013 by using Implementing VPNConfiguring NAP with VPN Enforcement Administrative Templates Implementing Web Application ProxyValidating the Deployment Deploying Software by using Group Verifying Readiness for a DirectAccessConfiguring IPSec Enforcement Policy DeploymentValidating the Deployment Configuring Folder Redirection Running the Getting Started WizardOverview of FSRM Module 6: Configuring and Validating the DirectAccess DeploymentUsing FSRM to Manage Quotas, File Troubleshooting Remote Access Preparing the Environment for

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Screens, and Storage Reports Remote Access Overview DirectAccessImplementing Classification Management Implementing DirectAccess by Using the Implementing the Advanced DirectAccessand File Management Tasks Getting Started Wizard InfrastructureDFS Overview Implementing and Managing an Validating the DirectAccess DeploymentConfiguring DFS Namespaces Advanced DirectAccess Infrastructure Implementing VPNConfiguring and Troubleshooting DFS-R Implementing VPN Validating the VPN DeploymentConfiguring FSRM Quotas Implementing Web Application Proxy Implementing Web Application ProxyConfiguring File Screening Verifying Readiness for a DirectAccess Validating the Web Application ProxyInstalling the DFS role service Deployment DeploymentConfiguring a DFS Namespace Running the Getting Started Wizard Installing and Configuring a Network PolicyConfiguring DFS-R Validating the DirectAccess Deployment ServerModule 10: Configuring Encryption and Preparing the Environment for Configuring RADIUS Clients and ServersAdvanced Auditing DirectAccess NPS Authentication MethodsEncrypting Drives by Using BitLocker Implementing the Advanced Monitoring and Troubleshooting a NetworkEncrypting Files by Using Encrypting File DirectAccess Infrastructure Policy ServerSystem Validating the DirectAccess Deployment Installing and Configuring NPS to SupportConfiguring Advanced Auditing Implementing VPN RADIUSSecuring Data Drives by Using BitLocker Validating the VPN Deployment Configuring and Testing a RADIUS ClientEncrypting and Recovering Files Implementing Web Application Proxy Network Access Protection OverviewConfiguring Advanced Audit Policy Validating the Web Application Proxy Configuring NAPConfiguration Deployment Configuring IPSec Enforcement for NAPOverview of Windows Deployment Services Installing and Configuring a Network Monitoring and Troubleshooting NAPManaging Windows Deployment Images Policy Server Configuring NAP with VPN EnforcementImplementing Deployment with Windows Configuring RADIUS Clients and Servers Validating the DeploymentDeployment Services NPS Authentication Methods Configuring IPSec EnforcementAdministering Windows Deployment Monitoring and Troubleshooting a Validating the DeploymentServices Network Policy Server Overview of FSRMInstalling and Configuring Windows Installing and Configuring NPS to Using FSRM to Manage Quotas, FileDeployment Services Support RADIUS Screens, and Storage ReportsCreating Operating System Images with Configuring and Testing a RADIUS Client Implementing Classification ManagementWindows Deployment Services Network Access Protection Overview and File Management TasksConfiguring Custom Computer Naming Configuring NAP DFS OverviewDeploying Images with Windows Configuring IPSec Enforcement for NAP Configuring DFS NamespacesDeployment Services Monitoring and Troubleshooting NAP Configuring and Troubleshooting DFS-ROverview of WSUS Configuring NAP with VPN Enforcement Configuring FSRM QuotasDeploying Updates with WSUS Validating the Deployment Configuring File ScreeningImplementing the WSUS Server Role Configuring IPSec Enforcement Installing the DFS role serviceConfiguring Update Settings Validating the Deployment Configuring a DFS NamespaceApproving and Deploying an Update by Overview of FSRM Configuring DFS-Rusing WSUS Using FSRM to Manage Quotas, File Module 10: Configuring Encryption andMonitoring Tools Screens, and Storage Reports Advanced AuditingUsing Performance Monitor Implementing Classification Management Encrypting Drives by Using BitLockerMonitoring Event Logs and File Management Tasks Encrypting Files by Using Encrypting FileEstablishing a Performance Baseline DFS Overview SystemIdentifying the Source of a Performance Configuring DFS Namespaces Configuring Advanced AuditingProblem Configuring and Troubleshooting DFS-R Securing Data Drives by Using BitLockerViewing and Configuring Centralized Event Configuring FSRM Quotas Encrypting and Recovering FilesLogs Configuring File Screening Configuring Advanced Audit Policy

Installing the DFS role service ConfigurationConfiguring a DFS Namespace Overview of Windows Deployment

line Configuring DFS-R ServicesConfiguring the DNS Server Role Module 10: Configuring Encryption and Managing Windows Deployment ImagesConfiguring DNS Zones Advanced Auditing Implementing Deployment with WindowsConfiguring DNS Zone Transfers Encrypting Drives by Using BitLocker Deployment ServicesManaging and Troubleshooting DNS Encrypting Files by Using Encrypting File Administering Windows DeploymentConfiguring DNS Resource Records System ServicesConfiguring DNS Conditional Forwarding Configuring Advanced Auditing Installing and Configuring WindowsInstalling and Configuring DNS Zones Securing Data Drives by Using BitLocker Deployment ServicesTroubleshooting DNS Encrypting and Recovering Files Creating Operating System Images withOverview of AD DS Configuring Advanced Audit Policy Windows Deployment ServicesImplementing Virtualized Domain Controllers Configuration Configuring Custom Computer NamingImplementing Read-Only Domain Overview of Windows Deployment Deploying Images with WindowsControllers Services Deployment ServicesAdministering AD DS Managing Windows Deployment Images Overview of WSUSManaging the AD DS Database Implementing Deployment with Windows Deploying Updates with WSUSInstalling and Configuring a RODC Deployment Services Implementing the WSUS Server Role

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Create and administer AD DS Snapshots Administering Windows Deployment Configuring Update SettingsConfiguring the Active Directory Recycle Bin Services Approving and Deploying an Update byDeploy a domain controller by using domain Installing and Configuring Windows using WSUScontroller cloning Deployment Services Monitoring ToolsConfiguring Password Policy and User Creating Operating System Images with Using Performance MonitorAccount Windows Deployment Services Monitoring Event LogsConfiguring Managed Service Accounts Configuring Custom Computer Naming Establishing a Performance BaselineConfiguring Password Policy and Account Deploying Images with Windows Identifying the Source of a PerformanceLockout Settings Deployment Services ProblemCreating and Associating a Group Managed Overview of WSUS Viewing and Configuring Centralized EventService Account Deploying Updates with WSUS LogsIntroducing Group Policy Implementing the WSUS Server RoleImplementing and Administering GPOs Configuring Update Settings Lab : Implementing DFSGroup Policy Scope and Group Policy Approving and Deploying an Update by lineProcessing using WSUSTroubleshooting the Application of GPOs Monitoring ToolsCreating and Configuring GPOs Using Performance Monitor lineManaging GPO Scope Monitoring Event Logs Configuring the DNS Server RoleVerify GPO Application Establishing a Performance Baseline Configuring DNS ZonesManaging GPOs Identifying the Source of a Performance Configuring DNS Zone TransfersImplementing Administrative Templates Problem Managing and Troubleshooting DNSConfiguring Folder Redirection and Scripts Viewing and Configuring Centralized Configuring DNS Resource RecordsConfiguring Group Policy Preferences Event Logs Configuring DNS Conditional ForwardingManaging Software with Group Policy Installing and Configuring DNS ZonesImplement Settings Using Group Policy Troubleshooting DNSPreferences line Overview of AD DSManaging Office 2013 by using Configuring the DNS Server Role Implementing Virtualized DomainAdministrative Templates Configuring DNS Zones ControllersDeploying Software by using Group Policy Configuring DNS Zone Transfers Implementing Read-Only DomainConfiguring Folder Redirection Managing and Troubleshooting DNS ControllersModule 6: Configuring and Troubleshooting Configuring DNS Resource Records Administering AD DSRemote Access Configuring DNS Conditional Forwarding Managing the AD DS DatabaseRemote Access Overview Installing and Configuring DNS Zones Installing and Configuring a RODCImplementing DirectAccess by Using the Troubleshooting DNS Create and administer AD DS SnapshotsGetting Started Wizard Overview of AD DS Configuring the Active Directory RecycleImplementing and Managing an Advanced Implementing Virtualized Domain BinDirectAccess Infrastructure Controllers Deploy a domain controller by usingImplementing VPN Implementing Read-Only Domain domain controller cloningImplementing Web Application Proxy Controllers Configuring Password Policy and UserVerifying Readiness for a DirectAccess Administering AD DS AccountDeployment Managing the AD DS Database Configuring Managed Service AccountsRunning the Getting Started Wizard Installing and Configuring a RODC Configuring Password Policy and AccountValidating the DirectAccess Deployment Create and administer AD DS Snapshots Lockout SettingsPreparing the Environment for DirectAccess Configuring the Active Directory Recycle Creating and Associating a GroupImplementing the Advanced DirectAccess Bin Managed Service AccountInfrastructure Deploy a domain controller by using Introducing Group PolicyValidating the DirectAccess Deployment domain controller cloning Implementing and Administering GPOsImplementing VPN Configuring Password Policy and User Group Policy Scope and Group PolicyValidating the VPN Deployment Account ProcessingImplementing Web Application Proxy Configuring Managed Service Accounts Troubleshooting the Application of GPOsValidating the Web Application Proxy Configuring Password Policy and Creating and Configuring GPOsDeployment Account Lockout Settings Managing GPO ScopeInstalling and Configuring a Network Policy Creating and Associating a Group Verify GPO ApplicationServer Managed Service Account Managing GPOsConfiguring RADIUS Clients and Servers Introducing Group Policy Implementing Administrative TemplatesNPS Authentication Methods Implementing and Administering GPOs Configuring Folder Redirection and ScriptsMonitoring and Troubleshooting a Network Group Policy Scope and Group Policy Configuring Group Policy PreferencesPolicy Server Processing Managing Software with Group PolicyInstalling and Configuring NPS to Support Troubleshooting the Application of GPOs Implement Settings Using Group PolicyRADIUS Creating and Configuring GPOs PreferencesConfiguring and Testing a RADIUS Client Managing GPO Scope Managing Office 2013 by usingNetwork Access Protection Overview Verify GPO Application Administrative TemplatesConfiguring NAP Managing GPOs Deploying Software by using Group PolicyConfiguring IPSec Enforcement for NAP Implementing Administrative Templates Configuring Folder RedirectionMonitoring and Troubleshooting NAP Configuring Folder Redirection and Module 6: Configuring andConfiguring NAP with VPN Enforcement Scripts Troubleshooting Remote Access

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Validating the Deployment Configuring Group Policy Preferences Remote Access OverviewConfiguring IPSec Enforcement Managing Software with Group Policy Implementing DirectAccess by Using theValidating the Deployment Implement Settings Using Group Policy Getting Started WizardOverview of FSRM Preferences Implementing and Managing an AdvancedUsing FSRM to Manage Quotas, File Managing Office 2013 by using DirectAccess InfrastructureScreens, and Storage Reports Administrative Templates Implementing VPNImplementing Classification Management Deploying Software by using Group Implementing Web Application Proxyand File Management Tasks Policy Verifying Readiness for a DirectAccessDFS Overview Configuring Folder Redirection DeploymentConfiguring DFS Namespaces Module 6: Configuring and Running the Getting Started WizardConfiguring and Troubleshooting DFS-R Troubleshooting Remote Access Validating the DirectAccess DeploymentConfiguring FSRM Quotas Remote Access Overview Preparing the Environment forConfiguring File Screening Implementing DirectAccess by Using the DirectAccessInstalling the DFS role service Getting Started Wizard Implementing the Advanced DirectAccessConfiguring a DFS Namespace Implementing and Managing an InfrastructureConfiguring DFS-R Advanced DirectAccess Infrastructure Validating the DirectAccess DeploymentModule 10: Configuring Encryption and Implementing VPN Implementing VPNAdvanced Auditing Implementing Web Application Proxy Validating the VPN DeploymentEncrypting Drives by Using BitLocker Verifying Readiness for a DirectAccess Implementing Web Application ProxyEncrypting Files by Using Encrypting File Deployment Validating the Web Application ProxySystem Running the Getting Started Wizard DeploymentConfiguring Advanced Auditing Validating the DirectAccess Deployment Installing and Configuring a Network PolicySecuring Data Drives by Using BitLocker Preparing the Environment for ServerEncrypting and Recovering Files DirectAccess Configuring RADIUS Clients and ServersConfiguring Advanced Audit Policy Implementing the Advanced NPS Authentication MethodsConfiguration DirectAccess Infrastructure Monitoring and Troubleshooting a NetworkOverview of Windows Deployment Services Validating the DirectAccess Deployment Policy ServerManaging Windows Deployment Images Implementing VPN Installing and Configuring NPS to SupportImplementing Deployment with Windows Validating the VPN Deployment RADIUSDeployment Services Implementing Web Application Proxy Configuring and Testing a RADIUS ClientAdministering Windows Deployment Validating the Web Application Proxy Network Access Protection OverviewServices Deployment Configuring NAPInstalling and Configuring Windows Installing and Configuring a Network Configuring IPSec Enforcement for NAPDeployment Services Policy Server Monitoring and Troubleshooting NAPCreating Operating System Images with Configuring RADIUS Clients and Servers Configuring NAP with VPN EnforcementWindows Deployment Services NPS Authentication Methods Validating the DeploymentConfiguring Custom Computer Naming Monitoring and Troubleshooting a Configuring IPSec EnforcementDeploying Images with Windows Network Policy Server Validating the DeploymentDeployment Services Installing and Configuring NPS to Overview of FSRMOverview of WSUS Support RADIUS Using FSRM to Manage Quotas, FileDeploying Updates with WSUS Configuring and Testing a RADIUS Client Screens, and Storage ReportsImplementing the WSUS Server Role Network Access Protection Overview Implementing Classification ManagementConfiguring Update Settings Configuring NAP and File Management TasksApproving and Deploying an Update by Configuring IPSec Enforcement for NAP DFS Overviewusing WSUS Monitoring and Troubleshooting NAP Configuring DFS NamespacesMonitoring Tools Configuring NAP with VPN Enforcement Configuring and Troubleshooting DFS-RUsing Performance Monitor Validating the Deployment Configuring FSRM QuotasMonitoring Event Logs Configuring IPSec Enforcement Configuring File ScreeningEstablishing a Performance Baseline Validating the Deployment Installing the DFS role serviceIdentifying the Source of a Performance Overview of FSRM Configuring a DFS NamespaceProblem Using FSRM to Manage Quotas, File Configuring DFS-RViewing and Configuring Centralized Event Screens, and Storage Reports Module 10: Configuring Encryption andLogs Implementing Classification Management Advanced Auditing

and File Management Tasks Encrypting Drives by Using BitLockerDFS Overview Encrypting Files by Using Encrypting File

line Configuring DFS Namespaces SystemConfiguring the DNS Server Role Configuring and Troubleshooting DFS-R Configuring Advanced AuditingConfiguring DNS Zones Configuring FSRM Quotas Securing Data Drives by Using BitLockerConfiguring DNS Zone Transfers Configuring File Screening Encrypting and Recovering FilesManaging and Troubleshooting DNS Installing the DFS role service Configuring Advanced Audit PolicyConfiguring DNS Resource Records Configuring a DFS Namespace ConfigurationConfiguring DNS Conditional Forwarding Configuring DFS-R Overview of Windows DeploymentInstalling and Configuring DNS Zones Module 10: Configuring Encryption and ServicesTroubleshooting DNS Advanced Auditing Managing Windows Deployment ImagesOverview of AD DS Encrypting Drives by Using BitLocker Implementing Deployment with WindowsImplementing Virtualized Domain Controllers Encrypting Files by Using Encrypting File Deployment Services

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Implementing Read-Only Domain System Administering Windows DeploymentControllers Configuring Advanced Auditing ServicesAdministering AD DS Securing Data Drives by Using BitLocker Installing and Configuring WindowsManaging the AD DS Database Encrypting and Recovering Files Deployment ServicesInstalling and Configuring a RODC Configuring Advanced Audit Policy Creating Operating System Images withCreate and administer AD DS Snapshots Configuration Windows Deployment ServicesConfiguring the Active Directory Recycle Bin Overview of Windows Deployment Configuring Custom Computer NamingDeploy a domain controller by using domain Services Deploying Images with Windowscontroller cloning Managing Windows Deployment Images Deployment ServicesConfiguring Password Policy and User Implementing Deployment with Windows Overview of WSUSAccount Deployment Services Deploying Updates with WSUSConfiguring Managed Service Accounts Administering Windows Deployment Implementing the WSUS Server RoleConfiguring Password Policy and Account Services Configuring Update SettingsLockout Settings Installing and Configuring Windows Approving and Deploying an Update byCreating and Associating a Group Managed Deployment Services using WSUSService Account Creating Operating System Images with Monitoring ToolsIntroducing Group Policy Windows Deployment Services Using Performance MonitorImplementing and Administering GPOs Configuring Custom Computer Naming Monitoring Event LogsGroup Policy Scope and Group Policy Deploying Images with Windows Establishing a Performance BaselineProcessing Deployment Services Identifying the Source of a PerformanceTroubleshooting the Application of GPOs Overview of WSUS ProblemCreating and Configuring GPOs Deploying Updates with WSUS Viewing and Configuring Centralized EventManaging GPO Scope Implementing the WSUS Server Role LogsVerify GPO Application Configuring Update SettingsManaging GPOs Approving and Deploying an Update byImplementing Administrative Templates using WSUS lineConfiguring Folder Redirection and Scripts Monitoring Tools Configuring the DNS Server RoleConfiguring Group Policy Preferences Using Performance Monitor Configuring DNS ZonesManaging Software with Group Policy Monitoring Event Logs Configuring DNS Zone TransfersImplement Settings Using Group Policy Establishing a Performance Baseline Managing and Troubleshooting DNSPreferences Identifying the Source of a Performance Configuring DNS Resource RecordsManaging Office 2013 by using Problem Configuring DNS Conditional ForwardingAdministrative Templates Viewing and Configuring Centralized Installing and Configuring DNS ZonesDeploying Software by using Group Policy Event Logs Troubleshooting DNSConfiguring Folder Redirection Overview of AD DSModule 6: Configuring and Troubleshooting Lab : Implementing DirectAccess by Using Implementing Virtualized DomainRemote Access the Getting Started Wizard ControllersRemote Access Overview line Implementing Read-Only DomainImplementing DirectAccess by Using the ControllersGetting Started Wizard Administering AD DSImplementing and Managing an Advanced line Managing the AD DS DatabaseDirectAccess Infrastructure Configuring the DNS Server Role Installing and Configuring a RODCImplementing VPN Configuring DNS Zones Create and administer AD DS SnapshotsImplementing Web Application Proxy Configuring DNS Zone Transfers Configuring the Active Directory RecycleVerifying Readiness for a DirectAccess Managing and Troubleshooting DNS BinDeployment Configuring DNS Resource Records Deploy a domain controller by usingRunning the Getting Started Wizard Configuring DNS Conditional Forwarding domain controller cloningValidating the DirectAccess Deployment Installing and Configuring DNS Zones Configuring Password Policy and UserPreparing the Environment for DirectAccess Troubleshooting DNS AccountImplementing the Advanced DirectAccess Overview of AD DS Configuring Managed Service AccountsInfrastructure Implementing Virtualized Domain Configuring Password Policy and AccountValidating the DirectAccess Deployment Controllers Lockout SettingsImplementing VPN Implementing Read-Only Domain Creating and Associating a GroupValidating the VPN Deployment Controllers Managed Service AccountImplementing Web Application Proxy Administering AD DS Introducing Group PolicyValidating the Web Application Proxy Managing the AD DS Database Implementing and Administering GPOsDeployment Installing and Configuring a RODC Group Policy Scope and Group PolicyInstalling and Configuring a Network Policy Create and administer AD DS Snapshots ProcessingServer Configuring the Active Directory Recycle Troubleshooting the Application of GPOsConfiguring RADIUS Clients and Servers Bin Creating and Configuring GPOsNPS Authentication Methods Deploy a domain controller by using Managing GPO ScopeMonitoring and Troubleshooting a Network domain controller cloning Verify GPO ApplicationPolicy Server Configuring Password Policy and User Managing GPOsInstalling and Configuring NPS to Support Account Implementing Administrative TemplatesRADIUS Configuring Managed Service Accounts Configuring Folder Redirection and ScriptsConfiguring and Testing a RADIUS Client Configuring Password Policy and Configuring Group Policy Preferences

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Network Access Protection Overview Account Lockout Settings Managing Software with Group PolicyConfiguring NAP Creating and Associating a Group Implement Settings Using Group PolicyConfiguring IPSec Enforcement for NAP Managed Service Account PreferencesMonitoring and Troubleshooting NAP Introducing Group Policy Managing Office 2013 by usingConfiguring NAP with VPN Enforcement Implementing and Administering GPOs Administrative TemplatesValidating the Deployment Group Policy Scope and Group Policy Deploying Software by using Group PolicyConfiguring IPSec Enforcement Processing Configuring Folder RedirectionValidating the Deployment Troubleshooting the Application of GPOs Module 6: Configuring andOverview of FSRM Creating and Configuring GPOs Troubleshooting Remote AccessUsing FSRM to Manage Quotas, File Managing GPO Scope Remote Access OverviewScreens, and Storage Reports Verify GPO Application Implementing DirectAccess by Using theImplementing Classification Management Managing GPOs Getting Started Wizardand File Management Tasks Implementing Administrative Templates Implementing and Managing an AdvancedDFS Overview Configuring Folder Redirection and DirectAccess InfrastructureConfiguring DFS Namespaces Scripts Implementing VPNConfiguring and Troubleshooting DFS-R Configuring Group Policy Preferences Implementing Web Application ProxyConfiguring FSRM Quotas Managing Software with Group Policy Verifying Readiness for a DirectAccessConfiguring File Screening Implement Settings Using Group Policy DeploymentInstalling the DFS role service Preferences Running the Getting Started WizardConfiguring a DFS Namespace Managing Office 2013 by using Validating the DirectAccess DeploymentConfiguring DFS-R Administrative Templates Preparing the Environment forModule 10: Configuring Encryption and Deploying Software by using Group DirectAccessAdvanced Auditing Policy Implementing the Advanced DirectAccessEncrypting Drives by Using BitLocker Configuring Folder Redirection InfrastructureEncrypting Files by Using Encrypting File Module 6: Configuring and Validating the DirectAccess DeploymentSystem Troubleshooting Remote Access Implementing VPNConfiguring Advanced Auditing Remote Access Overview Validating the VPN DeploymentSecuring Data Drives by Using BitLocker Implementing DirectAccess by Using the Implementing Web Application ProxyEncrypting and Recovering Files Getting Started Wizard Validating the Web Application ProxyConfiguring Advanced Audit Policy Implementing and Managing an DeploymentConfiguration Advanced DirectAccess Infrastructure Installing and Configuring a Network PolicyOverview of Windows Deployment Services Implementing VPN ServerManaging Windows Deployment Images Implementing Web Application Proxy Configuring RADIUS Clients and ServersImplementing Deployment with Windows Verifying Readiness for a DirectAccess NPS Authentication MethodsDeployment Services Deployment Monitoring and Troubleshooting a NetworkAdministering Windows Deployment Running the Getting Started Wizard Policy ServerServices Validating the DirectAccess Deployment Installing and Configuring NPS to SupportInstalling and Configuring Windows Preparing the Environment for RADIUSDeployment Services DirectAccess Configuring and Testing a RADIUS ClientCreating Operating System Images with Implementing the Advanced Network Access Protection OverviewWindows Deployment Services DirectAccess Infrastructure Configuring NAPConfiguring Custom Computer Naming Validating the DirectAccess Deployment Configuring IPSec Enforcement for NAPDeploying Images with Windows Implementing VPN Monitoring and Troubleshooting NAPDeployment Services Validating the VPN Deployment Configuring NAP with VPN EnforcementOverview of WSUS Implementing Web Application Proxy Validating the DeploymentDeploying Updates with WSUS Validating the Web Application Proxy Configuring IPSec EnforcementImplementing the WSUS Server Role Deployment Validating the DeploymentConfiguring Update Settings Installing and Configuring a Network Overview of FSRMApproving and Deploying an Update by Policy Server Using FSRM to Manage Quotas, Fileusing WSUS Configuring RADIUS Clients and Servers Screens, and Storage ReportsMonitoring Tools NPS Authentication Methods Implementing Classification ManagementUsing Performance Monitor Monitoring and Troubleshooting a and File Management TasksMonitoring Event Logs Network Policy Server DFS OverviewEstablishing a Performance Baseline Installing and Configuring NPS to Configuring DFS NamespacesIdentifying the Source of a Performance Support RADIUS Configuring and Troubleshooting DFS-RProblem Configuring and Testing a RADIUS Client Configuring FSRM QuotasViewing and Configuring Centralized Event Network Access Protection Overview Configuring File ScreeningLogs Configuring NAP Installing the DFS role service

Configuring IPSec Enforcement for NAP Configuring a DFS NamespaceModule 2: Maintaining Active Directory Domain Monitoring and Troubleshooting NAP Configuring DFS-RServices Configuring NAP with VPN Enforcement Module 10: Configuring Encryption andline Validating the Deployment Advanced Auditing

Configuring IPSec Enforcement Encrypting Drives by Using BitLockerValidating the Deployment Encrypting Files by Using Encrypting File

line Overview of FSRM SystemConfiguring the DNS Server Role Using FSRM to Manage Quotas, File Configuring Advanced Auditing

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Configuring DNS Zones Screens, and Storage Reports Securing Data Drives by Using BitLockerConfiguring DNS Zone Transfers Implementing Classification Management Encrypting and Recovering FilesManaging and Troubleshooting DNS and File Management Tasks Configuring Advanced Audit PolicyConfiguring DNS Resource Records DFS Overview ConfigurationConfiguring DNS Conditional Forwarding Configuring DFS Namespaces Overview of Windows DeploymentInstalling and Configuring DNS Zones Configuring and Troubleshooting DFS-R ServicesTroubleshooting DNS Configuring FSRM Quotas Managing Windows Deployment ImagesOverview of AD DS Configuring File Screening Implementing Deployment with WindowsImplementing Virtualized Domain Controllers Installing the DFS role service Deployment ServicesImplementing Read-Only Domain Configuring a DFS Namespace Administering Windows DeploymentControllers Configuring DFS-R ServicesAdministering AD DS Module 10: Configuring Encryption and Installing and Configuring WindowsManaging the AD DS Database Advanced Auditing Deployment ServicesInstalling and Configuring a RODC Encrypting Drives by Using BitLocker Creating Operating System Images withCreate and administer AD DS Snapshots Encrypting Files by Using Encrypting File Windows Deployment ServicesConfiguring the Active Directory Recycle Bin System Configuring Custom Computer NamingDeploy a domain controller by using domain Configuring Advanced Auditing Deploying Images with Windowscontroller cloning Securing Data Drives by Using BitLocker Deployment ServicesConfiguring Password Policy and User Encrypting and Recovering Files Overview of WSUSAccount Configuring Advanced Audit Policy Deploying Updates with WSUSConfiguring Managed Service Accounts Configuration Implementing the WSUS Server RoleConfiguring Password Policy and Account Overview of Windows Deployment Configuring Update SettingsLockout Settings Services Approving and Deploying an Update byCreating and Associating a Group Managed Managing Windows Deployment Images using WSUSService Account Implementing Deployment with Windows Monitoring ToolsIntroducing Group Policy Deployment Services Using Performance MonitorImplementing and Administering GPOs Administering Windows Deployment Monitoring Event LogsGroup Policy Scope and Group Policy Services Establishing a Performance BaselineProcessing Installing and Configuring Windows Identifying the Source of a PerformanceTroubleshooting the Application of GPOs Deployment Services ProblemCreating and Configuring GPOs Creating Operating System Images with Viewing and Configuring Centralized EventManaging GPO Scope Windows Deployment Services LogsVerify GPO Application Configuring Custom Computer NamingManaging GPOs Deploying Images with WindowsImplementing Administrative Templates Deployment Services lineConfiguring Folder Redirection and Scripts Overview of WSUS Configuring the DNS Server RoleConfiguring Group Policy Preferences Deploying Updates with WSUS Configuring DNS ZonesManaging Software with Group Policy Implementing the WSUS Server Role Configuring DNS Zone TransfersImplement Settings Using Group Policy Configuring Update Settings Managing and Troubleshooting DNSPreferences Approving and Deploying an Update by Configuring DNS Resource RecordsManaging Office 2013 by using using WSUS Configuring DNS Conditional ForwardingAdministrative Templates Monitoring Tools Installing and Configuring DNS ZonesDeploying Software by using Group Policy Using Performance Monitor Troubleshooting DNSConfiguring Folder Redirection Monitoring Event Logs Overview of AD DSModule 6: Configuring and Troubleshooting Establishing a Performance Baseline Implementing Virtualized DomainRemote Access Identifying the Source of a Performance ControllersRemote Access Overview Problem Implementing Read-Only DomainImplementing DirectAccess by Using the Viewing and Configuring Centralized ControllersGetting Started Wizard Event Logs Administering AD DSImplementing and Managing an Advanced Managing the AD DS DatabaseDirectAccess Infrastructure Installing and Configuring a RODCImplementing VPN line Create and administer AD DS SnapshotsImplementing Web Application Proxy Configuring the DNS Server Role Configuring the Active Directory RecycleVerifying Readiness for a DirectAccess Configuring DNS Zones BinDeployment Configuring DNS Zone Transfers Deploy a domain controller by usingRunning the Getting Started Wizard Managing and Troubleshooting DNS domain controller cloningValidating the DirectAccess Deployment Configuring DNS Resource Records Configuring Password Policy and UserPreparing the Environment for DirectAccess Configuring DNS Conditional Forwarding AccountImplementing the Advanced DirectAccess Installing and Configuring DNS Zones Configuring Managed Service AccountsInfrastructure Troubleshooting DNS Configuring Password Policy and AccountValidating the DirectAccess Deployment Overview of AD DS Lockout SettingsImplementing VPN Implementing Virtualized Domain Creating and Associating a GroupValidating the VPN Deployment Controllers Managed Service AccountImplementing Web Application Proxy Implementing Read-Only Domain Introducing Group PolicyValidating the Web Application Proxy Controllers Implementing and Administering GPOsDeployment Administering AD DS Group Policy Scope and Group Policy

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Installing and Configuring a Network Policy Managing the AD DS Database ProcessingServer Installing and Configuring a RODC Troubleshooting the Application of GPOsConfiguring RADIUS Clients and Servers Create and administer AD DS Snapshots Creating and Configuring GPOsNPS Authentication Methods Configuring the Active Directory Recycle Managing GPO ScopeMonitoring and Troubleshooting a Network Bin Verify GPO ApplicationPolicy Server Deploy a domain controller by using Managing GPOsInstalling and Configuring NPS to Support domain controller cloning Implementing Administrative TemplatesRADIUS Configuring Password Policy and User Configuring Folder Redirection and ScriptsConfiguring and Testing a RADIUS Client Account Configuring Group Policy PreferencesNetwork Access Protection Overview Configuring Managed Service Accounts Managing Software with Group PolicyConfiguring NAP Configuring Password Policy and Implement Settings Using Group PolicyConfiguring IPSec Enforcement for NAP Account Lockout Settings PreferencesMonitoring and Troubleshooting NAP Creating and Associating a Group Managing Office 2013 by usingConfiguring NAP with VPN Enforcement Managed Service Account Administrative TemplatesValidating the Deployment Introducing Group Policy Deploying Software by using Group PolicyConfiguring IPSec Enforcement Implementing and Administering GPOs Configuring Folder RedirectionValidating the Deployment Group Policy Scope and Group Policy Module 6: Configuring andOverview of FSRM Processing Troubleshooting Remote AccessUsing FSRM to Manage Quotas, File Troubleshooting the Application of GPOs Remote Access OverviewScreens, and Storage Reports Creating and Configuring GPOs Implementing DirectAccess by Using theImplementing Classification Management Managing GPO Scope Getting Started Wizardand File Management Tasks Verify GPO Application Implementing and Managing an AdvancedDFS Overview Managing GPOs DirectAccess InfrastructureConfiguring DFS Namespaces Implementing Administrative Templates Implementing VPNConfiguring and Troubleshooting DFS-R Configuring Folder Redirection and Implementing Web Application ProxyConfiguring FSRM Quotas Scripts Verifying Readiness for a DirectAccessConfiguring File Screening Configuring Group Policy Preferences DeploymentInstalling the DFS role service Managing Software with Group Policy Running the Getting Started WizardConfiguring a DFS Namespace Implement Settings Using Group Policy Validating the DirectAccess DeploymentConfiguring DFS-R Preferences Preparing the Environment forModule 10: Configuring Encryption and Managing Office 2013 by using DirectAccessAdvanced Auditing Administrative Templates Implementing the Advanced DirectAccessEncrypting Drives by Using BitLocker Deploying Software by using Group InfrastructureEncrypting Files by Using Encrypting File Policy Validating the DirectAccess DeploymentSystem Configuring Folder Redirection Implementing VPNConfiguring Advanced Auditing Module 6: Configuring and Validating the VPN DeploymentSecuring Data Drives by Using BitLocker Troubleshooting Remote Access Implementing Web Application ProxyEncrypting and Recovering Files Remote Access Overview Validating the Web Application ProxyConfiguring Advanced Audit Policy Implementing DirectAccess by Using the DeploymentConfiguration Getting Started Wizard Installing and Configuring a Network PolicyOverview of Windows Deployment Services Implementing and Managing an ServerManaging Windows Deployment Images Advanced DirectAccess Infrastructure Configuring RADIUS Clients and ServersImplementing Deployment with Windows Implementing VPN NPS Authentication MethodsDeployment Services Implementing Web Application Proxy Monitoring and Troubleshooting a NetworkAdministering Windows Deployment Verifying Readiness for a DirectAccess Policy ServerServices Deployment Installing and Configuring NPS to SupportInstalling and Configuring Windows Running the Getting Started Wizard RADIUSDeployment Services Validating the DirectAccess Deployment Configuring and Testing a RADIUS ClientCreating Operating System Images with Preparing the Environment for Network Access Protection OverviewWindows Deployment Services DirectAccess Configuring NAPConfiguring Custom Computer Naming Implementing the Advanced Configuring IPSec Enforcement for NAPDeploying Images with Windows DirectAccess Infrastructure Monitoring and Troubleshooting NAPDeployment Services Validating the DirectAccess Deployment Configuring NAP with VPN EnforcementOverview of WSUS Implementing VPN Validating the DeploymentDeploying Updates with WSUS Validating the VPN Deployment Configuring IPSec EnforcementImplementing the WSUS Server Role Implementing Web Application Proxy Validating the DeploymentConfiguring Update Settings Validating the Web Application Proxy Overview of FSRMApproving and Deploying an Update by Deployment Using FSRM to Manage Quotas, Fileusing WSUS Installing and Configuring a Network Screens, and Storage ReportsMonitoring Tools Policy Server Implementing Classification ManagementUsing Performance Monitor Configuring RADIUS Clients and Servers and File Management TasksMonitoring Event Logs NPS Authentication Methods DFS OverviewEstablishing a Performance Baseline Monitoring and Troubleshooting a Configuring DFS NamespacesIdentifying the Source of a Performance Network Policy Server Configuring and Troubleshooting DFS-RProblem Installing and Configuring NPS to Configuring FSRM QuotasViewing and Configuring Centralized Event Support RADIUS Configuring File Screening

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Logs Configuring and Testing a RADIUS Client Installing the DFS role serviceNetwork Access Protection Overview Configuring a DFS NamespaceConfiguring NAP Configuring DFS-R

line Configuring IPSec Enforcement for NAP Module 10: Configuring Encryption andConfiguring the DNS Server Role Monitoring and Troubleshooting NAP Advanced AuditingConfiguring DNS Zones Configuring NAP with VPN Enforcement Encrypting Drives by Using BitLockerConfiguring DNS Zone Transfers Validating the Deployment Encrypting Files by Using Encrypting FileManaging and Troubleshooting DNS Configuring IPSec Enforcement SystemConfiguring DNS Resource Records Validating the Deployment Configuring Advanced AuditingConfiguring DNS Conditional Forwarding Overview of FSRM Securing Data Drives by Using BitLockerInstalling and Configuring DNS Zones Using FSRM to Manage Quotas, File Encrypting and Recovering FilesTroubleshooting DNS Screens, and Storage Reports Configuring Advanced Audit PolicyOverview of AD DS Implementing Classification Management ConfigurationImplementing Virtualized Domain Controllers and File Management Tasks Overview of Windows DeploymentImplementing Read-Only Domain DFS Overview ServicesControllers Configuring DFS Namespaces Managing Windows Deployment ImagesAdministering AD DS Configuring and Troubleshooting DFS-R Implementing Deployment with WindowsManaging the AD DS Database Configuring FSRM Quotas Deployment ServicesInstalling and Configuring a RODC Configuring File Screening Administering Windows DeploymentCreate and administer AD DS Snapshots Installing the DFS role service ServicesConfiguring the Active Directory Recycle Bin Configuring a DFS Namespace Installing and Configuring WindowsDeploy a domain controller by using domain Configuring DFS-R Deployment Servicescontroller cloning Module 10: Configuring Encryption and Creating Operating System Images withConfiguring Password Policy and User Advanced Auditing Windows Deployment ServicesAccount Encrypting Drives by Using BitLocker Configuring Custom Computer NamingConfiguring Managed Service Accounts Encrypting Files by Using Encrypting File Deploying Images with WindowsConfiguring Password Policy and Account System Deployment ServicesLockout Settings Configuring Advanced Auditing Overview of WSUSCreating and Associating a Group Managed Securing Data Drives by Using BitLocker Deploying Updates with WSUSService Account Encrypting and Recovering Files Implementing the WSUS Server RoleIntroducing Group Policy Configuring Advanced Audit Policy Configuring Update SettingsImplementing and Administering GPOs Configuration Approving and Deploying an Update byGroup Policy Scope and Group Policy Overview of Windows Deployment using WSUSProcessing Services Monitoring ToolsTroubleshooting the Application of GPOs Managing Windows Deployment Images Using Performance MonitorCreating and Configuring GPOs Implementing Deployment with Windows Monitoring Event LogsManaging GPO Scope Deployment Services Establishing a Performance BaselineVerify GPO Application Administering Windows Deployment Identifying the Source of a PerformanceManaging GPOs Services ProblemImplementing Administrative Templates Installing and Configuring Windows Viewing and Configuring Centralized EventConfiguring Folder Redirection and Scripts Deployment Services LogsConfiguring Group Policy Preferences Creating Operating System Images withManaging Software with Group Policy Windows Deployment ServicesImplement Settings Using Group Policy Configuring Custom Computer Naming linePreferences Deploying Images with Windows Configuring the DNS Server RoleManaging Office 2013 by using Deployment Services Configuring DNS ZonesAdministrative Templates Overview of WSUS Configuring DNS Zone TransfersDeploying Software by using Group Policy Deploying Updates with WSUS Managing and Troubleshooting DNSConfiguring Folder Redirection Implementing the WSUS Server Role Configuring DNS Resource RecordsModule 6: Configuring and Troubleshooting Configuring Update Settings Configuring DNS Conditional ForwardingRemote Access Approving and Deploying an Update by Installing and Configuring DNS ZonesRemote Access Overview using WSUS Troubleshooting DNSImplementing DirectAccess by Using the Monitoring Tools Overview of AD DSGetting Started Wizard Using Performance Monitor Implementing Virtualized DomainImplementing and Managing an Advanced Monitoring Event Logs ControllersDirectAccess Infrastructure Establishing a Performance Baseline Implementing Read-Only DomainImplementing VPN Identifying the Source of a Performance ControllersImplementing Web Application Proxy Problem Administering AD DSVerifying Readiness for a DirectAccess Viewing and Configuring Centralized Managing the AD DS DatabaseDeployment Event Logs Installing and Configuring a RODCRunning the Getting Started Wizard Create and administer AD DS SnapshotsValidating the DirectAccess Deployment Configuring the Active Directory RecyclePreparing the Environment for DirectAccess line BinImplementing the Advanced DirectAccess Configuring the DNS Server Role Deploy a domain controller by usingInfrastructure Configuring DNS Zones domain controller cloningValidating the DirectAccess Deployment Configuring DNS Zone Transfers Configuring Password Policy and User

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Implementing VPN Managing and Troubleshooting DNS AccountValidating the VPN Deployment Configuring DNS Resource Records Configuring Managed Service AccountsImplementing Web Application Proxy Configuring DNS Conditional Forwarding Configuring Password Policy and AccountValidating the Web Application Proxy Installing and Configuring DNS Zones Lockout SettingsDeployment Troubleshooting DNS Creating and Associating a GroupInstalling and Configuring a Network Policy Overview of AD DS Managed Service AccountServer Implementing Virtualized Domain Introducing Group PolicyConfiguring RADIUS Clients and Servers Controllers Implementing and Administering GPOsNPS Authentication Methods Implementing Read-Only Domain Group Policy Scope and Group PolicyMonitoring and Troubleshooting a Network Controllers ProcessingPolicy Server Administering AD DS Troubleshooting the Application of GPOsInstalling and Configuring NPS to Support Managing the AD DS Database Creating and Configuring GPOsRADIUS Installing and Configuring a RODC Managing GPO ScopeConfiguring and Testing a RADIUS Client Create and administer AD DS Snapshots Verify GPO ApplicationNetwork Access Protection Overview Configuring the Active Directory Recycle Managing GPOsConfiguring NAP Bin Implementing Administrative TemplatesConfiguring IPSec Enforcement for NAP Deploy a domain controller by using Configuring Folder Redirection and ScriptsMonitoring and Troubleshooting NAP domain controller cloning Configuring Group Policy PreferencesConfiguring NAP with VPN Enforcement Configuring Password Policy and User Managing Software with Group PolicyValidating the Deployment Account Implement Settings Using Group PolicyConfiguring IPSec Enforcement Configuring Managed Service Accounts PreferencesValidating the Deployment Configuring Password Policy and Managing Office 2013 by usingOverview of FSRM Account Lockout Settings Administrative TemplatesUsing FSRM to Manage Quotas, File Creating and Associating a Group Deploying Software by using Group PolicyScreens, and Storage Reports Managed Service Account Configuring Folder RedirectionImplementing Classification Management Introducing Group Policy Module 6: Configuring andand File Management Tasks Implementing and Administering GPOs Troubleshooting Remote AccessDFS Overview Group Policy Scope and Group Policy Remote Access OverviewConfiguring DFS Namespaces Processing Implementing DirectAccess by Using theConfiguring and Troubleshooting DFS-R Troubleshooting the Application of GPOs Getting Started WizardConfiguring FSRM Quotas Creating and Configuring GPOs Implementing and Managing an AdvancedConfiguring File Screening Managing GPO Scope DirectAccess InfrastructureInstalling the DFS role service Verify GPO Application Implementing VPNConfiguring a DFS Namespace Managing GPOs Implementing Web Application ProxyConfiguring DFS-R Implementing Administrative Templates Verifying Readiness for a DirectAccessModule 10: Configuring Encryption and Configuring Folder Redirection and DeploymentAdvanced Auditing Scripts Running the Getting Started WizardEncrypting Drives by Using BitLocker Configuring Group Policy Preferences Validating the DirectAccess DeploymentEncrypting Files by Using Encrypting File Managing Software with Group Policy Preparing the Environment forSystem Implement Settings Using Group Policy DirectAccessConfiguring Advanced Auditing Preferences Implementing the Advanced DirectAccessSecuring Data Drives by Using BitLocker Managing Office 2013 by using InfrastructureEncrypting and Recovering Files Administrative Templates Validating the DirectAccess DeploymentConfiguring Advanced Audit Policy Deploying Software by using Group Implementing VPNConfiguration Policy Validating the VPN DeploymentOverview of Windows Deployment Services Configuring Folder Redirection Implementing Web Application ProxyManaging Windows Deployment Images Module 6: Configuring and Validating the Web Application ProxyImplementing Deployment with Windows Troubleshooting Remote Access DeploymentDeployment Services Remote Access Overview Installing and Configuring a Network PolicyAdministering Windows Deployment Implementing DirectAccess by Using the ServerServices Getting Started Wizard Configuring RADIUS Clients and ServersInstalling and Configuring Windows Implementing and Managing an NPS Authentication MethodsDeployment Services Advanced DirectAccess Infrastructure Monitoring and Troubleshooting a NetworkCreating Operating System Images with Implementing VPN Policy ServerWindows Deployment Services Implementing Web Application Proxy Installing and Configuring NPS to SupportConfiguring Custom Computer Naming Verifying Readiness for a DirectAccess RADIUSDeploying Images with Windows Deployment Configuring and Testing a RADIUS ClientDeployment Services Running the Getting Started Wizard Network Access Protection OverviewOverview of WSUS Validating the DirectAccess Deployment Configuring NAPDeploying Updates with WSUS Preparing the Environment for Configuring IPSec Enforcement for NAPImplementing the WSUS Server Role DirectAccess Monitoring and Troubleshooting NAPConfiguring Update Settings Implementing the Advanced Configuring NAP with VPN EnforcementApproving and Deploying an Update by DirectAccess Infrastructure Validating the Deploymentusing WSUS Validating the DirectAccess Deployment Configuring IPSec EnforcementMonitoring Tools Implementing VPN Validating the DeploymentUsing Performance Monitor Validating the VPN Deployment Overview of FSRM

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Monitoring Event Logs Implementing Web Application Proxy Using FSRM to Manage Quotas, FileEstablishing a Performance Baseline Validating the Web Application Proxy Screens, and Storage ReportsIdentifying the Source of a Performance Deployment Implementing Classification ManagementProblem Installing and Configuring a Network and File Management TasksViewing and Configuring Centralized Event Policy Server DFS OverviewLogs Configuring RADIUS Clients and Servers Configuring DFS Namespaces

NPS Authentication Methods Configuring and Troubleshooting DFS-RMonitoring and Troubleshooting a Configuring FSRM Quotas

line Network Policy Server Configuring File ScreeningConfiguring the DNS Server Role Installing and Configuring NPS to Installing the DFS role serviceConfiguring DNS Zones Support RADIUS Configuring a DFS NamespaceConfiguring DNS Zone Transfers Configuring and Testing a RADIUS Client Configuring DFS-RManaging and Troubleshooting DNS Network Access Protection Overview Module 10: Configuring Encryption andConfiguring DNS Resource Records Configuring NAP Advanced AuditingConfiguring DNS Conditional Forwarding Configuring IPSec Enforcement for NAP Encrypting Drives by Using BitLockerInstalling and Configuring DNS Zones Monitoring and Troubleshooting NAP Encrypting Files by Using Encrypting FileTroubleshooting DNS Configuring NAP with VPN Enforcement SystemOverview of AD DS Validating the Deployment Configuring Advanced AuditingImplementing Virtualized Domain Controllers Configuring IPSec Enforcement Securing Data Drives by Using BitLockerImplementing Read-Only Domain Validating the Deployment Encrypting and Recovering FilesControllers Overview of FSRM Configuring Advanced Audit PolicyAdministering AD DS Using FSRM to Manage Quotas, File ConfigurationManaging the AD DS Database Screens, and Storage Reports Overview of Windows DeploymentInstalling and Configuring a RODC Implementing Classification Management ServicesCreate and administer AD DS Snapshots and File Management Tasks Managing Windows Deployment ImagesConfiguring the Active Directory Recycle Bin DFS Overview Implementing Deployment with WindowsDeploy a domain controller by using domain Configuring DFS Namespaces Deployment Servicescontroller cloning Configuring and Troubleshooting DFS-R Administering Windows DeploymentConfiguring Password Policy and User Configuring FSRM Quotas ServicesAccount Configuring File Screening Installing and Configuring WindowsConfiguring Managed Service Accounts Installing the DFS role service Deployment ServicesConfiguring Password Policy and Account Configuring a DFS Namespace Creating Operating System Images withLockout Settings Configuring DFS-R Windows Deployment ServicesCreating and Associating a Group Managed Module 10: Configuring Encryption and Configuring Custom Computer NamingService Account Advanced Auditing Deploying Images with WindowsIntroducing Group Policy Encrypting Drives by Using BitLocker Deployment ServicesImplementing and Administering GPOs Encrypting Files by Using Encrypting File Overview of WSUSGroup Policy Scope and Group Policy System Deploying Updates with WSUSProcessing Configuring Advanced Auditing Implementing the WSUS Server RoleTroubleshooting the Application of GPOs Securing Data Drives by Using BitLocker Configuring Update SettingsCreating and Configuring GPOs Encrypting and Recovering Files Approving and Deploying an Update byManaging GPO Scope Configuring Advanced Audit Policy using WSUSVerify GPO Application Configuration Monitoring ToolsManaging GPOs Overview of Windows Deployment Using Performance MonitorImplementing Administrative Templates Services Monitoring Event LogsConfiguring Folder Redirection and Scripts Managing Windows Deployment Images Establishing a Performance BaselineConfiguring Group Policy Preferences Implementing Deployment with Windows Identifying the Source of a PerformanceManaging Software with Group Policy Deployment Services ProblemImplement Settings Using Group Policy Administering Windows Deployment Viewing and Configuring Centralized EventPreferences Services LogsManaging Office 2013 by using Installing and Configuring WindowsAdministrative Templates Deployment ServicesDeploying Software by using Group Policy Creating Operating System Images with lineConfiguring Folder Redirection Windows Deployment Services Configuring the DNS Server RoleModule 6: Configuring and Troubleshooting Configuring Custom Computer Naming Configuring DNS ZonesRemote Access Deploying Images with Windows Configuring DNS Zone TransfersRemote Access Overview Deployment Services Managing and Troubleshooting DNSImplementing DirectAccess by Using the Overview of WSUS Configuring DNS Resource RecordsGetting Started Wizard Deploying Updates with WSUS Configuring DNS Conditional ForwardingImplementing and Managing an Advanced Implementing the WSUS Server Role Installing and Configuring DNS ZonesDirectAccess Infrastructure Configuring Update Settings Troubleshooting DNSImplementing VPN Approving and Deploying an Update by Overview of AD DSImplementing Web Application Proxy using WSUS Implementing Virtualized DomainVerifying Readiness for a DirectAccess Monitoring Tools ControllersDeployment Using Performance Monitor Implementing Read-Only DomainRunning the Getting Started Wizard Monitoring Event Logs Controllers

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Validating the DirectAccess Deployment Establishing a Performance Baseline Administering AD DSPreparing the Environment for DirectAccess Identifying the Source of a Performance Managing the AD DS DatabaseImplementing the Advanced DirectAccess Problem Installing and Configuring a RODCInfrastructure Viewing and Configuring Centralized Create and administer AD DS SnapshotsValidating the DirectAccess Deployment Event Logs Configuring the Active Directory RecycleImplementing VPN BinValidating the VPN Deployment Deploy a domain controller by usingImplementing Web Application Proxy line domain controller cloningValidating the Web Application Proxy Configuring the DNS Server Role Configuring Password Policy and UserDeployment Configuring DNS Zones AccountInstalling and Configuring a Network Policy Configuring DNS Zone Transfers Configuring Managed Service AccountsServer Managing and Troubleshooting DNS Configuring Password Policy and AccountConfiguring RADIUS Clients and Servers Configuring DNS Resource Records Lockout SettingsNPS Authentication Methods Configuring DNS Conditional Forwarding Creating and Associating a GroupMonitoring and Troubleshooting a Network Installing and Configuring DNS Zones Managed Service AccountPolicy Server Troubleshooting DNS Introducing Group PolicyInstalling and Configuring NPS to Support Overview of AD DS Implementing and Administering GPOsRADIUS Implementing Virtualized Domain Group Policy Scope and Group PolicyConfiguring and Testing a RADIUS Client Controllers ProcessingNetwork Access Protection Overview Implementing Read-Only Domain Troubleshooting the Application of GPOsConfiguring NAP Controllers Creating and Configuring GPOsConfiguring IPSec Enforcement for NAP Administering AD DS Managing GPO ScopeMonitoring and Troubleshooting NAP Managing the AD DS Database Verify GPO ApplicationConfiguring NAP with VPN Enforcement Installing and Configuring a RODC Managing GPOsValidating the Deployment Create and administer AD DS Snapshots Implementing Administrative TemplatesConfiguring IPSec Enforcement Configuring the Active Directory Recycle Configuring Folder Redirection and ScriptsValidating the Deployment Bin Configuring Group Policy PreferencesOverview of FSRM Deploy a domain controller by using Managing Software with Group PolicyUsing FSRM to Manage Quotas, File domain controller cloning Implement Settings Using Group PolicyScreens, and Storage Reports Configuring Password Policy and User PreferencesImplementing Classification Management Account Managing Office 2013 by usingand File Management Tasks Configuring Managed Service Accounts Administrative TemplatesDFS Overview Configuring Password Policy and Deploying Software by using Group PolicyConfiguring DFS Namespaces Account Lockout Settings Configuring Folder RedirectionConfiguring and Troubleshooting DFS-R Creating and Associating a Group Module 6: Configuring andConfiguring FSRM Quotas Managed Service Account Troubleshooting Remote AccessConfiguring File Screening Introducing Group Policy Remote Access OverviewInstalling the DFS role service Implementing and Administering GPOs Implementing DirectAccess by Using theConfiguring a DFS Namespace Group Policy Scope and Group Policy Getting Started WizardConfiguring DFS-R Processing Implementing and Managing an AdvancedModule 10: Configuring Encryption and Troubleshooting the Application of GPOs DirectAccess InfrastructureAdvanced Auditing Creating and Configuring GPOs Implementing VPNEncrypting Drives by Using BitLocker Managing GPO Scope Implementing Web Application ProxyEncrypting Files by Using Encrypting File Verify GPO Application Verifying Readiness for a DirectAccessSystem Managing GPOs DeploymentConfiguring Advanced Auditing Implementing Administrative Templates Running the Getting Started WizardSecuring Data Drives by Using BitLocker Configuring Folder Redirection and Validating the DirectAccess DeploymentEncrypting and Recovering Files Scripts Preparing the Environment forConfiguring Advanced Audit Policy Configuring Group Policy Preferences DirectAccessConfiguration Managing Software with Group Policy Implementing the Advanced DirectAccessOverview of Windows Deployment Services Implement Settings Using Group Policy InfrastructureManaging Windows Deployment Images Preferences Validating the DirectAccess DeploymentImplementing Deployment with Windows Managing Office 2013 by using Implementing VPNDeployment Services Administrative Templates Validating the VPN DeploymentAdministering Windows Deployment Deploying Software by using Group Implementing Web Application ProxyServices Policy Validating the Web Application ProxyInstalling and Configuring Windows Configuring Folder Redirection DeploymentDeployment Services Module 6: Configuring and Installing and Configuring a Network PolicyCreating Operating System Images with Troubleshooting Remote Access ServerWindows Deployment Services Remote Access Overview Configuring RADIUS Clients and ServersConfiguring Custom Computer Naming Implementing DirectAccess by Using the NPS Authentication MethodsDeploying Images with Windows Getting Started Wizard Monitoring and Troubleshooting a NetworkDeployment Services Implementing and Managing an Policy ServerOverview of WSUS Advanced DirectAccess Infrastructure Installing and Configuring NPS to SupportDeploying Updates with WSUS Implementing VPN RADIUSImplementing the WSUS Server Role Implementing Web Application Proxy Configuring and Testing a RADIUS Client

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Configuring Update Settings Verifying Readiness for a DirectAccess Network Access Protection OverviewApproving and Deploying an Update by Deployment Configuring NAPusing WSUS Running the Getting Started Wizard Configuring IPSec Enforcement for NAPMonitoring Tools Validating the DirectAccess Deployment Monitoring and Troubleshooting NAPUsing Performance Monitor Preparing the Environment for Configuring NAP with VPN EnforcementMonitoring Event Logs DirectAccess Validating the DeploymentEstablishing a Performance Baseline Implementing the Advanced Configuring IPSec EnforcementIdentifying the Source of a Performance DirectAccess Infrastructure Validating the DeploymentProblem Validating the DirectAccess Deployment Overview of FSRMViewing and Configuring Centralized Event Implementing VPN Using FSRM to Manage Quotas, FileLogs Validating the VPN Deployment Screens, and Storage Reports

Implementing Web Application Proxy Implementing Classification ManagementValidating the Web Application Proxy and File Management Tasks

line Deployment DFS OverviewConfiguring the DNS Server Role Installing and Configuring a Network Configuring DFS NamespacesConfiguring DNS Zones Policy Server Configuring and Troubleshooting DFS-RConfiguring DNS Zone Transfers Configuring RADIUS Clients and Servers Configuring FSRM QuotasManaging and Troubleshooting DNS NPS Authentication Methods Configuring File ScreeningConfiguring DNS Resource Records Monitoring and Troubleshooting a Installing the DFS role serviceConfiguring DNS Conditional Forwarding Network Policy Server Configuring a DFS NamespaceInstalling and Configuring DNS Zones Installing and Configuring NPS to Configuring DFS-RTroubleshooting DNS Support RADIUS Module 10: Configuring Encryption andOverview of AD DS Configuring and Testing a RADIUS Client Advanced AuditingImplementing Virtualized Domain Controllers Network Access Protection Overview Encrypting Drives by Using BitLockerImplementing Read-Only Domain Configuring NAP Encrypting Files by Using Encrypting FileControllers Configuring IPSec Enforcement for NAP SystemAdministering AD DS Monitoring and Troubleshooting NAP Configuring Advanced AuditingManaging the AD DS Database Configuring NAP with VPN Enforcement Securing Data Drives by Using BitLockerInstalling and Configuring a RODC Validating the Deployment Encrypting and Recovering FilesCreate and administer AD DS Snapshots Configuring IPSec Enforcement Configuring Advanced Audit PolicyConfiguring the Active Directory Recycle Bin Validating the Deployment ConfigurationDeploy a domain controller by using domain Overview of FSRM Overview of Windows Deploymentcontroller cloning Using FSRM to Manage Quotas, File ServicesConfiguring Password Policy and User Screens, and Storage Reports Managing Windows Deployment ImagesAccount Implementing Classification Management Implementing Deployment with WindowsConfiguring Managed Service Accounts and File Management Tasks Deployment ServicesConfiguring Password Policy and Account DFS Overview Administering Windows DeploymentLockout Settings Configuring DFS Namespaces ServicesCreating and Associating a Group Managed Configuring and Troubleshooting DFS-R Installing and Configuring WindowsService Account Configuring FSRM Quotas Deployment ServicesIntroducing Group Policy Configuring File Screening Creating Operating System Images withImplementing and Administering GPOs Installing the DFS role service Windows Deployment ServicesGroup Policy Scope and Group Policy Configuring a DFS Namespace Configuring Custom Computer NamingProcessing Configuring DFS-R Deploying Images with WindowsTroubleshooting the Application of GPOs Module 10: Configuring Encryption and Deployment ServicesCreating and Configuring GPOs Advanced Auditing Overview of WSUSManaging GPO Scope Encrypting Drives by Using BitLocker Deploying Updates with WSUSVerify GPO Application Encrypting Files by Using Encrypting File Implementing the WSUS Server RoleManaging GPOs System Configuring Update SettingsImplementing Administrative Templates Configuring Advanced Auditing Approving and Deploying an Update byConfiguring Folder Redirection and Scripts Securing Data Drives by Using BitLocker using WSUSConfiguring Group Policy Preferences Encrypting and Recovering Files Monitoring ToolsManaging Software with Group Policy Configuring Advanced Audit Policy Using Performance MonitorImplement Settings Using Group Policy Configuration Monitoring Event LogsPreferences Overview of Windows Deployment Establishing a Performance BaselineManaging Office 2013 by using Services Identifying the Source of a PerformanceAdministrative Templates Managing Windows Deployment Images ProblemDeploying Software by using Group Policy Implementing Deployment with Windows Viewing and Configuring Centralized EventConfiguring Folder Redirection Deployment Services LogsModule 6: Configuring and Troubleshooting Administering Windows DeploymentRemote Access ServicesRemote Access Overview Installing and Configuring Windows lineImplementing DirectAccess by Using the Deployment Services Configuring the DNS Server RoleGetting Started Wizard Creating Operating System Images with Configuring DNS ZonesImplementing and Managing an Advanced Windows Deployment Services Configuring DNS Zone TransfersDirectAccess Infrastructure Configuring Custom Computer Naming Managing and Troubleshooting DNS

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Implementing VPN Deploying Images with Windows Configuring DNS Resource RecordsImplementing Web Application Proxy Deployment Services Configuring DNS Conditional ForwardingVerifying Readiness for a DirectAccess Overview of WSUS Installing and Configuring DNS ZonesDeployment Deploying Updates with WSUS Troubleshooting DNSRunning the Getting Started Wizard Implementing the WSUS Server Role Overview of AD DSValidating the DirectAccess Deployment Configuring Update Settings Implementing Virtualized DomainPreparing the Environment for DirectAccess Approving and Deploying an Update by ControllersImplementing the Advanced DirectAccess using WSUS Implementing Read-Only DomainInfrastructure Monitoring Tools ControllersValidating the DirectAccess Deployment Using Performance Monitor Administering AD DSImplementing VPN Monitoring Event Logs Managing the AD DS DatabaseValidating the VPN Deployment Establishing a Performance Baseline Installing and Configuring a RODCImplementing Web Application Proxy Identifying the Source of a Performance Create and administer AD DS SnapshotsValidating the Web Application Proxy Problem Configuring the Active Directory RecycleDeployment Viewing and Configuring Centralized BinInstalling and Configuring a Network Policy Event Logs Deploy a domain controller by usingServer domain controller cloningConfiguring RADIUS Clients and Servers Lab : Deploying an Advanced DirectAccess Configuring Password Policy and UserNPS Authentication Methods Solution AccountMonitoring and Troubleshooting a Network line Configuring Managed Service AccountsPolicy Server Configuring Password Policy and AccountInstalling and Configuring NPS to Support Lockout SettingsRADIUS line Creating and Associating a GroupConfiguring and Testing a RADIUS Client Configuring the DNS Server Role Managed Service AccountNetwork Access Protection Overview Configuring DNS Zones Introducing Group PolicyConfiguring NAP Configuring DNS Zone Transfers Implementing and Administering GPOsConfiguring IPSec Enforcement for NAP Managing and Troubleshooting DNS Group Policy Scope and Group PolicyMonitoring and Troubleshooting NAP Configuring DNS Resource Records ProcessingConfiguring NAP with VPN Enforcement Configuring DNS Conditional Forwarding Troubleshooting the Application of GPOsValidating the Deployment Installing and Configuring DNS Zones Creating and Configuring GPOsConfiguring IPSec Enforcement Troubleshooting DNS Managing GPO ScopeValidating the Deployment Overview of AD DS Verify GPO ApplicationOverview of FSRM Implementing Virtualized Domain Managing GPOsUsing FSRM to Manage Quotas, File Controllers Implementing Administrative TemplatesScreens, and Storage Reports Implementing Read-Only Domain Configuring Folder Redirection and ScriptsImplementing Classification Management Controllers Configuring Group Policy Preferencesand File Management Tasks Administering AD DS Managing Software with Group PolicyDFS Overview Managing the AD DS Database Implement Settings Using Group PolicyConfiguring DFS Namespaces Installing and Configuring a RODC PreferencesConfiguring and Troubleshooting DFS-R Create and administer AD DS Snapshots Managing Office 2013 by usingConfiguring FSRM Quotas Configuring the Active Directory Recycle Administrative TemplatesConfiguring File Screening Bin Deploying Software by using Group PolicyInstalling the DFS role service Deploy a domain controller by using Configuring Folder RedirectionConfiguring a DFS Namespace domain controller cloning Module 6: Configuring andConfiguring DFS-R Configuring Password Policy and User Troubleshooting Remote AccessModule 10: Configuring Encryption and Account Remote Access OverviewAdvanced Auditing Configuring Managed Service Accounts Implementing DirectAccess by Using theEncrypting Drives by Using BitLocker Configuring Password Policy and Getting Started WizardEncrypting Files by Using Encrypting File Account Lockout Settings Implementing and Managing an AdvancedSystem Creating and Associating a Group DirectAccess InfrastructureConfiguring Advanced Auditing Managed Service Account Implementing VPNSecuring Data Drives by Using BitLocker Introducing Group Policy Implementing Web Application ProxyEncrypting and Recovering Files Implementing and Administering GPOs Verifying Readiness for a DirectAccessConfiguring Advanced Audit Policy Group Policy Scope and Group Policy DeploymentConfiguration Processing Running the Getting Started WizardOverview of Windows Deployment Services Troubleshooting the Application of GPOs Validating the DirectAccess DeploymentManaging Windows Deployment Images Creating and Configuring GPOs Preparing the Environment forImplementing Deployment with Windows Managing GPO Scope DirectAccessDeployment Services Verify GPO Application Implementing the Advanced DirectAccessAdministering Windows Deployment Managing GPOs InfrastructureServices Implementing Administrative Templates Validating the DirectAccess DeploymentInstalling and Configuring Windows Configuring Folder Redirection and Implementing VPNDeployment Services Scripts Validating the VPN DeploymentCreating Operating System Images with Configuring Group Policy Preferences Implementing Web Application ProxyWindows Deployment Services Managing Software with Group Policy Validating the Web Application ProxyConfiguring Custom Computer Naming Implement Settings Using Group Policy Deployment

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Deploying Images with Windows Preferences Installing and Configuring a Network PolicyDeployment Services Managing Office 2013 by using ServerOverview of WSUS Administrative Templates Configuring RADIUS Clients and ServersDeploying Updates with WSUS Deploying Software by using Group NPS Authentication MethodsImplementing the WSUS Server Role Policy Monitoring and Troubleshooting a NetworkConfiguring Update Settings Configuring Folder Redirection Policy ServerApproving and Deploying an Update by Module 6: Configuring and Installing and Configuring NPS to Supportusing WSUS Troubleshooting Remote Access RADIUSMonitoring Tools Remote Access Overview Configuring and Testing a RADIUS ClientUsing Performance Monitor Implementing DirectAccess by Using the Network Access Protection OverviewMonitoring Event Logs Getting Started Wizard Configuring NAPEstablishing a Performance Baseline Implementing and Managing an Configuring IPSec Enforcement for NAPIdentifying the Source of a Performance Advanced DirectAccess Infrastructure Monitoring and Troubleshooting NAPProblem Implementing VPN Configuring NAP with VPN EnforcementViewing and Configuring Centralized Event Implementing Web Application Proxy Validating the DeploymentLogs Verifying Readiness for a DirectAccess Configuring IPSec Enforcement

Deployment Validating the DeploymentRunning the Getting Started Wizard Overview of FSRM

line Validating the DirectAccess Deployment Using FSRM to Manage Quotas, FileConfiguring the DNS Server Role Preparing the Environment for Screens, and Storage ReportsConfiguring DNS Zones DirectAccess Implementing Classification ManagementConfiguring DNS Zone Transfers Implementing the Advanced and File Management TasksManaging and Troubleshooting DNS DirectAccess Infrastructure DFS OverviewConfiguring DNS Resource Records Validating the DirectAccess Deployment Configuring DFS NamespacesConfiguring DNS Conditional Forwarding Implementing VPN Configuring and Troubleshooting DFS-RInstalling and Configuring DNS Zones Validating the VPN Deployment Configuring FSRM QuotasTroubleshooting DNS Implementing Web Application Proxy Configuring File ScreeningOverview of AD DS Validating the Web Application Proxy Installing the DFS role serviceImplementing Virtualized Domain Controllers Deployment Configuring a DFS NamespaceImplementing Read-Only Domain Installing and Configuring a Network Configuring DFS-RControllers Policy Server Module 10: Configuring Encryption andAdministering AD DS Configuring RADIUS Clients and Servers Advanced AuditingManaging the AD DS Database NPS Authentication Methods Encrypting Drives by Using BitLockerInstalling and Configuring a RODC Monitoring and Troubleshooting a Encrypting Files by Using Encrypting FileCreate and administer AD DS Snapshots Network Policy Server SystemConfiguring the Active Directory Recycle Bin Installing and Configuring NPS to Configuring Advanced AuditingDeploy a domain controller by using domain Support RADIUS Securing Data Drives by Using BitLockercontroller cloning Configuring and Testing a RADIUS Client Encrypting and Recovering FilesConfiguring Password Policy and User Network Access Protection Overview Configuring Advanced Audit PolicyAccount Configuring NAP ConfigurationConfiguring Managed Service Accounts Configuring IPSec Enforcement for NAP Overview of Windows DeploymentConfiguring Password Policy and Account Monitoring and Troubleshooting NAP ServicesLockout Settings Configuring NAP with VPN Enforcement Managing Windows Deployment ImagesCreating and Associating a Group Managed Validating the Deployment Implementing Deployment with WindowsService Account Configuring IPSec Enforcement Deployment ServicesIntroducing Group Policy Validating the Deployment Administering Windows DeploymentImplementing and Administering GPOs Overview of FSRM ServicesGroup Policy Scope and Group Policy Using FSRM to Manage Quotas, File Installing and Configuring WindowsProcessing Screens, and Storage Reports Deployment ServicesTroubleshooting the Application of GPOs Implementing Classification Management Creating Operating System Images withCreating and Configuring GPOs and File Management Tasks Windows Deployment ServicesManaging GPO Scope DFS Overview Configuring Custom Computer NamingVerify GPO Application Configuring DFS Namespaces Deploying Images with WindowsManaging GPOs Configuring and Troubleshooting DFS-R Deployment ServicesImplementing Administrative Templates Configuring FSRM Quotas Overview of WSUSConfiguring Folder Redirection and Scripts Configuring File Screening Deploying Updates with WSUSConfiguring Group Policy Preferences Installing the DFS role service Implementing the WSUS Server RoleManaging Software with Group Policy Configuring a DFS Namespace Configuring Update SettingsImplement Settings Using Group Policy Configuring DFS-R Approving and Deploying an Update byPreferences Module 10: Configuring Encryption and using WSUSManaging Office 2013 by using Advanced Auditing Monitoring ToolsAdministrative Templates Encrypting Drives by Using BitLocker Using Performance MonitorDeploying Software by using Group Policy Encrypting Files by Using Encrypting File Monitoring Event LogsConfiguring Folder Redirection System Establishing a Performance BaselineModule 6: Configuring and Troubleshooting Configuring Advanced Auditing Identifying the Source of a PerformanceRemote Access Securing Data Drives by Using BitLocker Problem

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Remote Access Overview Encrypting and Recovering Files Viewing and Configuring Centralized EventImplementing DirectAccess by Using the Configuring Advanced Audit Policy LogsGetting Started Wizard ConfigurationImplementing and Managing an Advanced Overview of Windows DeploymentDirectAccess Infrastructure Services lineImplementing VPN Managing Windows Deployment Images Configuring the DNS Server RoleImplementing Web Application Proxy Implementing Deployment with Windows Configuring DNS ZonesVerifying Readiness for a DirectAccess Deployment Services Configuring DNS Zone TransfersDeployment Administering Windows Deployment Managing and Troubleshooting DNSRunning the Getting Started Wizard Services Configuring DNS Resource RecordsValidating the DirectAccess Deployment Installing and Configuring Windows Configuring DNS Conditional ForwardingPreparing the Environment for DirectAccess Deployment Services Installing and Configuring DNS ZonesImplementing the Advanced DirectAccess Creating Operating System Images with Troubleshooting DNSInfrastructure Windows Deployment Services Overview of AD DSValidating the DirectAccess Deployment Configuring Custom Computer Naming Implementing Virtualized DomainImplementing VPN Deploying Images with Windows ControllersValidating the VPN Deployment Deployment Services Implementing Read-Only DomainImplementing Web Application Proxy Overview of WSUS ControllersValidating the Web Application Proxy Deploying Updates with WSUS Administering AD DSDeployment Implementing the WSUS Server Role Managing the AD DS DatabaseInstalling and Configuring a Network Policy Configuring Update Settings Installing and Configuring a RODCServer Approving and Deploying an Update by Create and administer AD DS SnapshotsConfiguring RADIUS Clients and Servers using WSUS Configuring the Active Directory RecycleNPS Authentication Methods Monitoring Tools BinMonitoring and Troubleshooting a Network Using Performance Monitor Deploy a domain controller by usingPolicy Server Monitoring Event Logs domain controller cloningInstalling and Configuring NPS to Support Establishing a Performance Baseline Configuring Password Policy and UserRADIUS Identifying the Source of a Performance AccountConfiguring and Testing a RADIUS Client Problem Configuring Managed Service AccountsNetwork Access Protection Overview Viewing and Configuring Centralized Configuring Password Policy and AccountConfiguring NAP Event Logs Lockout SettingsConfiguring IPSec Enforcement for NAP Creating and Associating a GroupMonitoring and Troubleshooting NAP Managed Service AccountConfiguring NAP with VPN Enforcement line Introducing Group PolicyValidating the Deployment Configuring the DNS Server Role Implementing and Administering GPOsConfiguring IPSec Enforcement Configuring DNS Zones Group Policy Scope and Group PolicyValidating the Deployment Configuring DNS Zone Transfers ProcessingOverview of FSRM Managing and Troubleshooting DNS Troubleshooting the Application of GPOsUsing FSRM to Manage Quotas, File Configuring DNS Resource Records Creating and Configuring GPOsScreens, and Storage Reports Configuring DNS Conditional Forwarding Managing GPO ScopeImplementing Classification Management Installing and Configuring DNS Zones Verify GPO Applicationand File Management Tasks Troubleshooting DNS Managing GPOsDFS Overview Overview of AD DS Implementing Administrative TemplatesConfiguring DFS Namespaces Implementing Virtualized Domain Configuring Folder Redirection and ScriptsConfiguring and Troubleshooting DFS-R Controllers Configuring Group Policy PreferencesConfiguring FSRM Quotas Implementing Read-Only Domain Managing Software with Group PolicyConfiguring File Screening Controllers Implement Settings Using Group PolicyInstalling the DFS role service Administering AD DS PreferencesConfiguring a DFS Namespace Managing the AD DS Database Managing Office 2013 by usingConfiguring DFS-R Installing and Configuring a RODC Administrative TemplatesModule 10: Configuring Encryption and Create and administer AD DS Snapshots Deploying Software by using Group PolicyAdvanced Auditing Configuring the Active Directory Recycle Configuring Folder RedirectionEncrypting Drives by Using BitLocker Bin Module 6: Configuring andEncrypting Files by Using Encrypting File Deploy a domain controller by using Troubleshooting Remote AccessSystem domain controller cloning Remote Access OverviewConfiguring Advanced Auditing Configuring Password Policy and User Implementing DirectAccess by Using theSecuring Data Drives by Using BitLocker Account Getting Started WizardEncrypting and Recovering Files Configuring Managed Service Accounts Implementing and Managing an AdvancedConfiguring Advanced Audit Policy Configuring Password Policy and DirectAccess InfrastructureConfiguration Account Lockout Settings Implementing VPNOverview of Windows Deployment Services Creating and Associating a Group Implementing Web Application ProxyManaging Windows Deployment Images Managed Service Account Verifying Readiness for a DirectAccessImplementing Deployment with Windows Introducing Group Policy DeploymentDeployment Services Implementing and Administering GPOs Running the Getting Started WizardAdministering Windows Deployment Group Policy Scope and Group Policy Validating the DirectAccess DeploymentServices Processing Preparing the Environment for

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Installing and Configuring Windows Troubleshooting the Application of GPOs DirectAccessDeployment Services Creating and Configuring GPOs Implementing the Advanced DirectAccessCreating Operating System Images with Managing GPO Scope InfrastructureWindows Deployment Services Verify GPO Application Validating the DirectAccess DeploymentConfiguring Custom Computer Naming Managing GPOs Implementing VPNDeploying Images with Windows Implementing Administrative Templates Validating the VPN DeploymentDeployment Services Configuring Folder Redirection and Implementing Web Application ProxyOverview of WSUS Scripts Validating the Web Application ProxyDeploying Updates with WSUS Configuring Group Policy Preferences DeploymentImplementing the WSUS Server Role Managing Software with Group Policy Installing and Configuring a Network PolicyConfiguring Update Settings Implement Settings Using Group Policy ServerApproving and Deploying an Update by Preferences Configuring RADIUS Clients and Serversusing WSUS Managing Office 2013 by using NPS Authentication MethodsMonitoring Tools Administrative Templates Monitoring and Troubleshooting a NetworkUsing Performance Monitor Deploying Software by using Group Policy ServerMonitoring Event Logs Policy Installing and Configuring NPS to SupportEstablishing a Performance Baseline Configuring Folder Redirection RADIUSIdentifying the Source of a Performance Module 6: Configuring and Configuring and Testing a RADIUS ClientProblem Troubleshooting Remote Access Network Access Protection OverviewViewing and Configuring Centralized Event Remote Access Overview Configuring NAPLogs Implementing DirectAccess by Using the Configuring IPSec Enforcement for NAP

Getting Started Wizard Monitoring and Troubleshooting NAPImplementing and Managing an Configuring NAP with VPN Enforcement

line Advanced DirectAccess Infrastructure Validating the DeploymentConfiguring the DNS Server Role Implementing VPN Configuring IPSec EnforcementConfiguring DNS Zones Implementing Web Application Proxy Validating the DeploymentConfiguring DNS Zone Transfers Verifying Readiness for a DirectAccess Overview of FSRMManaging and Troubleshooting DNS Deployment Using FSRM to Manage Quotas, FileConfiguring DNS Resource Records Running the Getting Started Wizard Screens, and Storage ReportsConfiguring DNS Conditional Forwarding Validating the DirectAccess Deployment Implementing Classification ManagementInstalling and Configuring DNS Zones Preparing the Environment for and File Management TasksTroubleshooting DNS DirectAccess DFS OverviewOverview of AD DS Implementing the Advanced Configuring DFS NamespacesImplementing Virtualized Domain Controllers DirectAccess Infrastructure Configuring and Troubleshooting DFS-RImplementing Read-Only Domain Validating the DirectAccess Deployment Configuring FSRM QuotasControllers Implementing VPN Configuring File ScreeningAdministering AD DS Validating the VPN Deployment Installing the DFS role serviceManaging the AD DS Database Implementing Web Application Proxy Configuring a DFS NamespaceInstalling and Configuring a RODC Validating the Web Application Proxy Configuring DFS-RCreate and administer AD DS Snapshots Deployment Module 10: Configuring Encryption andConfiguring the Active Directory Recycle Bin Installing and Configuring a Network Advanced AuditingDeploy a domain controller by using domain Policy Server Encrypting Drives by Using BitLockercontroller cloning Configuring RADIUS Clients and Servers Encrypting Files by Using Encrypting FileConfiguring Password Policy and User NPS Authentication Methods SystemAccount Monitoring and Troubleshooting a Configuring Advanced AuditingConfiguring Managed Service Accounts Network Policy Server Securing Data Drives by Using BitLockerConfiguring Password Policy and Account Installing and Configuring NPS to Encrypting and Recovering FilesLockout Settings Support RADIUS Configuring Advanced Audit PolicyCreating and Associating a Group Managed Configuring and Testing a RADIUS Client ConfigurationService Account Network Access Protection Overview Overview of Windows DeploymentIntroducing Group Policy Configuring NAP ServicesImplementing and Administering GPOs Configuring IPSec Enforcement for NAP Managing Windows Deployment ImagesGroup Policy Scope and Group Policy Monitoring and Troubleshooting NAP Implementing Deployment with WindowsProcessing Configuring NAP with VPN Enforcement Deployment ServicesTroubleshooting the Application of GPOs Validating the Deployment Administering Windows DeploymentCreating and Configuring GPOs Configuring IPSec Enforcement ServicesManaging GPO Scope Validating the Deployment Installing and Configuring WindowsVerify GPO Application Overview of FSRM Deployment ServicesManaging GPOs Using FSRM to Manage Quotas, File Creating Operating System Images withImplementing Administrative Templates Screens, and Storage Reports Windows Deployment ServicesConfiguring Folder Redirection and Scripts Implementing Classification Management Configuring Custom Computer NamingConfiguring Group Policy Preferences and File Management Tasks Deploying Images with WindowsManaging Software with Group Policy DFS Overview Deployment ServicesImplement Settings Using Group Policy Configuring DFS Namespaces Overview of WSUSPreferences Configuring and Troubleshooting DFS-R Deploying Updates with WSUSManaging Office 2013 by using Configuring FSRM Quotas Implementing the WSUS Server Role

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Administrative Templates Configuring File Screening Configuring Update SettingsDeploying Software by using Group Policy Installing the DFS role service Approving and Deploying an Update byConfiguring Folder Redirection Configuring a DFS Namespace using WSUSModule 6: Configuring and Troubleshooting Configuring DFS-R Monitoring ToolsRemote Access Module 10: Configuring Encryption and Using Performance MonitorRemote Access Overview Advanced Auditing Monitoring Event LogsImplementing DirectAccess by Using the Encrypting Drives by Using BitLocker Establishing a Performance BaselineGetting Started Wizard Encrypting Files by Using Encrypting File Identifying the Source of a PerformanceImplementing and Managing an Advanced System ProblemDirectAccess Infrastructure Configuring Advanced Auditing Viewing and Configuring Centralized EventImplementing VPN Securing Data Drives by Using BitLocker LogsImplementing Web Application Proxy Encrypting and Recovering FilesVerifying Readiness for a DirectAccess Configuring Advanced Audit PolicyDeployment Configuration lineRunning the Getting Started Wizard Overview of Windows Deployment Configuring the DNS Server RoleValidating the DirectAccess Deployment Services Configuring DNS ZonesPreparing the Environment for DirectAccess Managing Windows Deployment Images Configuring DNS Zone TransfersImplementing the Advanced DirectAccess Implementing Deployment with Windows Managing and Troubleshooting DNSInfrastructure Deployment Services Configuring DNS Resource RecordsValidating the DirectAccess Deployment Administering Windows Deployment Configuring DNS Conditional ForwardingImplementing VPN Services Installing and Configuring DNS ZonesValidating the VPN Deployment Installing and Configuring Windows Troubleshooting DNSImplementing Web Application Proxy Deployment Services Overview of AD DSValidating the Web Application Proxy Creating Operating System Images with Implementing Virtualized DomainDeployment Windows Deployment Services ControllersInstalling and Configuring a Network Policy Configuring Custom Computer Naming Implementing Read-Only DomainServer Deploying Images with Windows ControllersConfiguring RADIUS Clients and Servers Deployment Services Administering AD DSNPS Authentication Methods Overview of WSUS Managing the AD DS DatabaseMonitoring and Troubleshooting a Network Deploying Updates with WSUS Installing and Configuring a RODCPolicy Server Implementing the WSUS Server Role Create and administer AD DS SnapshotsInstalling and Configuring NPS to Support Configuring Update Settings Configuring the Active Directory RecycleRADIUS Approving and Deploying an Update by BinConfiguring and Testing a RADIUS Client using WSUS Deploy a domain controller by usingNetwork Access Protection Overview Monitoring Tools domain controller cloningConfiguring NAP Using Performance Monitor Configuring Password Policy and UserConfiguring IPSec Enforcement for NAP Monitoring Event Logs AccountMonitoring and Troubleshooting NAP Establishing a Performance Baseline Configuring Managed Service AccountsConfiguring NAP with VPN Enforcement Identifying the Source of a Performance Configuring Password Policy and AccountValidating the Deployment Problem Lockout SettingsConfiguring IPSec Enforcement Viewing and Configuring Centralized Creating and Associating a GroupValidating the Deployment Event Logs Managed Service AccountOverview of FSRM Introducing Group PolicyUsing FSRM to Manage Quotas, File Implementing and Administering GPOsScreens, and Storage Reports line Group Policy Scope and Group PolicyImplementing Classification Management Configuring the DNS Server Role Processingand File Management Tasks Configuring DNS Zones Troubleshooting the Application of GPOsDFS Overview Configuring DNS Zone Transfers Creating and Configuring GPOsConfiguring DFS Namespaces Managing and Troubleshooting DNS Managing GPO ScopeConfiguring and Troubleshooting DFS-R Configuring DNS Resource Records Verify GPO ApplicationConfiguring FSRM Quotas Configuring DNS Conditional Forwarding Managing GPOsConfiguring File Screening Installing and Configuring DNS Zones Implementing Administrative TemplatesInstalling the DFS role service Troubleshooting DNS Configuring Folder Redirection and ScriptsConfiguring a DFS Namespace Overview of AD DS Configuring Group Policy PreferencesConfiguring DFS-R Implementing Virtualized Domain Managing Software with Group PolicyModule 10: Configuring Encryption and Controllers Implement Settings Using Group PolicyAdvanced Auditing Implementing Read-Only Domain PreferencesEncrypting Drives by Using BitLocker Controllers Managing Office 2013 by usingEncrypting Files by Using Encrypting File Administering AD DS Administrative TemplatesSystem Managing the AD DS Database Deploying Software by using Group PolicyConfiguring Advanced Auditing Installing and Configuring a RODC Configuring Folder RedirectionSecuring Data Drives by Using BitLocker Create and administer AD DS Snapshots Module 6: Configuring andEncrypting and Recovering Files Configuring the Active Directory Recycle Troubleshooting Remote AccessConfiguring Advanced Audit Policy Bin Remote Access OverviewConfiguration Deploy a domain controller by using Implementing DirectAccess by Using theOverview of Windows Deployment Services domain controller cloning Getting Started Wizard

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Managing Windows Deployment Images Configuring Password Policy and User Implementing and Managing an AdvancedImplementing Deployment with Windows Account DirectAccess InfrastructureDeployment Services Configuring Managed Service Accounts Implementing VPNAdministering Windows Deployment Configuring Password Policy and Implementing Web Application ProxyServices Account Lockout Settings Verifying Readiness for a DirectAccessInstalling and Configuring Windows Creating and Associating a Group DeploymentDeployment Services Managed Service Account Running the Getting Started WizardCreating Operating System Images with Introducing Group Policy Validating the DirectAccess DeploymentWindows Deployment Services Implementing and Administering GPOs Preparing the Environment forConfiguring Custom Computer Naming Group Policy Scope and Group Policy DirectAccessDeploying Images with Windows Processing Implementing the Advanced DirectAccessDeployment Services Troubleshooting the Application of GPOs InfrastructureOverview of WSUS Creating and Configuring GPOs Validating the DirectAccess DeploymentDeploying Updates with WSUS Managing GPO Scope Implementing VPNImplementing the WSUS Server Role Verify GPO Application Validating the VPN DeploymentConfiguring Update Settings Managing GPOs Implementing Web Application ProxyApproving and Deploying an Update by Implementing Administrative Templates Validating the Web Application Proxyusing WSUS Configuring Folder Redirection and DeploymentMonitoring Tools Scripts Installing and Configuring a Network PolicyUsing Performance Monitor Configuring Group Policy Preferences ServerMonitoring Event Logs Managing Software with Group Policy Configuring RADIUS Clients and ServersEstablishing a Performance Baseline Implement Settings Using Group Policy NPS Authentication MethodsIdentifying the Source of a Performance Preferences Monitoring and Troubleshooting a NetworkProblem Managing Office 2013 by using Policy ServerViewing and Configuring Centralized Event Administrative Templates Installing and Configuring NPS to SupportLogs Deploying Software by using Group RADIUS

Policy Configuring and Testing a RADIUS ClientLab : Maintaining AD DS Configuring Folder Redirection Network Access Protection Overviewline Module 6: Configuring and Configuring NAP

Troubleshooting Remote Access Configuring IPSec Enforcement for NAPRemote Access Overview Monitoring and Troubleshooting NAP

line Implementing DirectAccess by Using the Configuring NAP with VPN EnforcementConfiguring the DNS Server Role Getting Started Wizard Validating the DeploymentConfiguring DNS Zones Implementing and Managing an Configuring IPSec EnforcementConfiguring DNS Zone Transfers Advanced DirectAccess Infrastructure Validating the DeploymentManaging and Troubleshooting DNS Implementing VPN Overview of FSRMConfiguring DNS Resource Records Implementing Web Application Proxy Using FSRM to Manage Quotas, FileConfiguring DNS Conditional Forwarding Verifying Readiness for a DirectAccess Screens, and Storage ReportsInstalling and Configuring DNS Zones Deployment Implementing Classification ManagementTroubleshooting DNS Running the Getting Started Wizard and File Management TasksOverview of AD DS Validating the DirectAccess Deployment DFS OverviewImplementing Virtualized Domain Controllers Preparing the Environment for Configuring DFS NamespacesImplementing Read-Only Domain DirectAccess Configuring and Troubleshooting DFS-RControllers Implementing the Advanced Configuring FSRM QuotasAdministering AD DS DirectAccess Infrastructure Configuring File ScreeningManaging the AD DS Database Validating the DirectAccess Deployment Installing the DFS role serviceInstalling and Configuring a RODC Implementing VPN Configuring a DFS NamespaceCreate and administer AD DS Snapshots Validating the VPN Deployment Configuring DFS-RConfiguring the Active Directory Recycle Bin Implementing Web Application Proxy Module 10: Configuring Encryption andDeploy a domain controller by using domain Validating the Web Application Proxy Advanced Auditingcontroller cloning Deployment Encrypting Drives by Using BitLockerConfiguring Password Policy and User Installing and Configuring a Network Encrypting Files by Using Encrypting FileAccount Policy Server SystemConfiguring Managed Service Accounts Configuring RADIUS Clients and Servers Configuring Advanced AuditingConfiguring Password Policy and Account NPS Authentication Methods Securing Data Drives by Using BitLockerLockout Settings Monitoring and Troubleshooting a Encrypting and Recovering FilesCreating and Associating a Group Managed Network Policy Server Configuring Advanced Audit PolicyService Account Installing and Configuring NPS to ConfigurationIntroducing Group Policy Support RADIUS Overview of Windows DeploymentImplementing and Administering GPOs Configuring and Testing a RADIUS Client ServicesGroup Policy Scope and Group Policy Network Access Protection Overview Managing Windows Deployment ImagesProcessing Configuring NAP Implementing Deployment with WindowsTroubleshooting the Application of GPOs Configuring IPSec Enforcement for NAP Deployment ServicesCreating and Configuring GPOs Monitoring and Troubleshooting NAP Administering Windows DeploymentManaging GPO Scope Configuring NAP with VPN Enforcement ServicesVerify GPO Application Validating the Deployment Installing and Configuring Windows

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Managing GPOs Configuring IPSec Enforcement Deployment ServicesImplementing Administrative Templates Validating the Deployment Creating Operating System Images withConfiguring Folder Redirection and Scripts Overview of FSRM Windows Deployment ServicesConfiguring Group Policy Preferences Using FSRM to Manage Quotas, File Configuring Custom Computer NamingManaging Software with Group Policy Screens, and Storage Reports Deploying Images with WindowsImplement Settings Using Group Policy Implementing Classification Management Deployment ServicesPreferences and File Management Tasks Overview of WSUSManaging Office 2013 by using DFS Overview Deploying Updates with WSUSAdministrative Templates Configuring DFS Namespaces Implementing the WSUS Server RoleDeploying Software by using Group Policy Configuring and Troubleshooting DFS-R Configuring Update SettingsConfiguring Folder Redirection Configuring FSRM Quotas Approving and Deploying an Update byModule 6: Configuring and Troubleshooting Configuring File Screening using WSUSRemote Access Installing the DFS role service Monitoring ToolsRemote Access Overview Configuring a DFS Namespace Using Performance MonitorImplementing DirectAccess by Using the Configuring DFS-R Monitoring Event LogsGetting Started Wizard Module 10: Configuring Encryption and Establishing a Performance BaselineImplementing and Managing an Advanced Advanced Auditing Identifying the Source of a PerformanceDirectAccess Infrastructure Encrypting Drives by Using BitLocker ProblemImplementing VPN Encrypting Files by Using Encrypting File Viewing and Configuring Centralized EventImplementing Web Application Proxy System LogsVerifying Readiness for a DirectAccess Configuring Advanced AuditingDeployment Securing Data Drives by Using BitLocker Lab : Configuring Encryption and AdvancedRunning the Getting Started Wizard Encrypting and Recovering Files AuditingValidating the DirectAccess Deployment Configuring Advanced Audit Policy linePreparing the Environment for DirectAccess ConfigurationImplementing the Advanced DirectAccess Overview of Windows DeploymentInfrastructure Services lineValidating the DirectAccess Deployment Managing Windows Deployment Images Configuring the DNS Server RoleImplementing VPN Implementing Deployment with Windows Configuring DNS ZonesValidating the VPN Deployment Deployment Services Configuring DNS Zone TransfersImplementing Web Application Proxy Administering Windows Deployment Managing and Troubleshooting DNSValidating the Web Application Proxy Services Configuring DNS Resource RecordsDeployment Installing and Configuring Windows Configuring DNS Conditional ForwardingInstalling and Configuring a Network Policy Deployment Services Installing and Configuring DNS ZonesServer Creating Operating System Images with Troubleshooting DNSConfiguring RADIUS Clients and Servers Windows Deployment Services Overview of AD DSNPS Authentication Methods Configuring Custom Computer Naming Implementing Virtualized DomainMonitoring and Troubleshooting a Network Deploying Images with Windows ControllersPolicy Server Deployment Services Implementing Read-Only DomainInstalling and Configuring NPS to Support Overview of WSUS ControllersRADIUS Deploying Updates with WSUS Administering AD DSConfiguring and Testing a RADIUS Client Implementing the WSUS Server Role Managing the AD DS DatabaseNetwork Access Protection Overview Configuring Update Settings Installing and Configuring a RODCConfiguring NAP Approving and Deploying an Update by Create and administer AD DS SnapshotsConfiguring IPSec Enforcement for NAP using WSUS Configuring the Active Directory RecycleMonitoring and Troubleshooting NAP Monitoring Tools BinConfiguring NAP with VPN Enforcement Using Performance Monitor Deploy a domain controller by usingValidating the Deployment Monitoring Event Logs domain controller cloningConfiguring IPSec Enforcement Establishing a Performance Baseline Configuring Password Policy and UserValidating the Deployment Identifying the Source of a Performance AccountOverview of FSRM Problem Configuring Managed Service AccountsUsing FSRM to Manage Quotas, File Viewing and Configuring Centralized Configuring Password Policy and AccountScreens, and Storage Reports Event Logs Lockout SettingsImplementing Classification Management Creating and Associating a Groupand File Management Tasks Managed Service AccountDFS Overview line Introducing Group PolicyConfiguring DFS Namespaces Configuring the DNS Server Role Implementing and Administering GPOsConfiguring and Troubleshooting DFS-R Configuring DNS Zones Group Policy Scope and Group PolicyConfiguring FSRM Quotas Configuring DNS Zone Transfers ProcessingConfiguring File Screening Managing and Troubleshooting DNS Troubleshooting the Application of GPOsInstalling the DFS role service Configuring DNS Resource Records Creating and Configuring GPOsConfiguring a DFS Namespace Configuring DNS Conditional Forwarding Managing GPO ScopeConfiguring DFS-R Installing and Configuring DNS Zones Verify GPO ApplicationModule 10: Configuring Encryption and Troubleshooting DNS Managing GPOsAdvanced Auditing Overview of AD DS Implementing Administrative TemplatesEncrypting Drives by Using BitLocker Implementing Virtualized Domain Configuring Folder Redirection and Scripts

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Encrypting Files by Using Encrypting File Controllers Configuring Group Policy PreferencesSystem Implementing Read-Only Domain Managing Software with Group PolicyConfiguring Advanced Auditing Controllers Implement Settings Using Group PolicySecuring Data Drives by Using BitLocker Administering AD DS PreferencesEncrypting and Recovering Files Managing the AD DS Database Managing Office 2013 by usingConfiguring Advanced Audit Policy Installing and Configuring a RODC Administrative TemplatesConfiguration Create and administer AD DS Snapshots Deploying Software by using Group PolicyOverview of Windows Deployment Services Configuring the Active Directory Recycle Configuring Folder RedirectionManaging Windows Deployment Images Bin Module 6: Configuring andImplementing Deployment with Windows Deploy a domain controller by using Troubleshooting Remote AccessDeployment Services domain controller cloning Remote Access OverviewAdministering Windows Deployment Configuring Password Policy and User Implementing DirectAccess by Using theServices Account Getting Started WizardInstalling and Configuring Windows Configuring Managed Service Accounts Implementing and Managing an AdvancedDeployment Services Configuring Password Policy and DirectAccess InfrastructureCreating Operating System Images with Account Lockout Settings Implementing VPNWindows Deployment Services Creating and Associating a Group Implementing Web Application ProxyConfiguring Custom Computer Naming Managed Service Account Verifying Readiness for a DirectAccessDeploying Images with Windows Introducing Group Policy DeploymentDeployment Services Implementing and Administering GPOs Running the Getting Started WizardOverview of WSUS Group Policy Scope and Group Policy Validating the DirectAccess DeploymentDeploying Updates with WSUS Processing Preparing the Environment forImplementing the WSUS Server Role Troubleshooting the Application of GPOs DirectAccessConfiguring Update Settings Creating and Configuring GPOs Implementing the Advanced DirectAccessApproving and Deploying an Update by Managing GPO Scope Infrastructureusing WSUS Verify GPO Application Validating the DirectAccess DeploymentMonitoring Tools Managing GPOs Implementing VPNUsing Performance Monitor Implementing Administrative Templates Validating the VPN DeploymentMonitoring Event Logs Configuring Folder Redirection and Implementing Web Application ProxyEstablishing a Performance Baseline Scripts Validating the Web Application ProxyIdentifying the Source of a Performance Configuring Group Policy Preferences DeploymentProblem Managing Software with Group Policy Installing and Configuring a Network PolicyViewing and Configuring Centralized Event Implement Settings Using Group Policy ServerLogs Preferences Configuring RADIUS Clients and Servers

Managing Office 2013 by using NPS Authentication MethodsAdministrative Templates Monitoring and Troubleshooting a Network

line Deploying Software by using Group Policy ServerConfiguring the DNS Server Role Policy Installing and Configuring NPS to SupportConfiguring DNS Zones Configuring Folder Redirection RADIUSConfiguring DNS Zone Transfers Module 6: Configuring and Configuring and Testing a RADIUS ClientManaging and Troubleshooting DNS Troubleshooting Remote Access Network Access Protection OverviewConfiguring DNS Resource Records Remote Access Overview Configuring NAPConfiguring DNS Conditional Forwarding Implementing DirectAccess by Using the Configuring IPSec Enforcement for NAPInstalling and Configuring DNS Zones Getting Started Wizard Monitoring and Troubleshooting NAPTroubleshooting DNS Implementing and Managing an Configuring NAP with VPN EnforcementOverview of AD DS Advanced DirectAccess Infrastructure Validating the DeploymentImplementing Virtualized Domain Controllers Implementing VPN Configuring IPSec EnforcementImplementing Read-Only Domain Implementing Web Application Proxy Validating the DeploymentControllers Verifying Readiness for a DirectAccess Overview of FSRMAdministering AD DS Deployment Using FSRM to Manage Quotas, FileManaging the AD DS Database Running the Getting Started Wizard Screens, and Storage ReportsInstalling and Configuring a RODC Validating the DirectAccess Deployment Implementing Classification ManagementCreate and administer AD DS Snapshots Preparing the Environment for and File Management TasksConfiguring the Active Directory Recycle Bin DirectAccess DFS OverviewDeploy a domain controller by using domain Implementing the Advanced Configuring DFS Namespacescontroller cloning DirectAccess Infrastructure Configuring and Troubleshooting DFS-RConfiguring Password Policy and User Validating the DirectAccess Deployment Configuring FSRM QuotasAccount Implementing VPN Configuring File ScreeningConfiguring Managed Service Accounts Validating the VPN Deployment Installing the DFS role serviceConfiguring Password Policy and Account Implementing Web Application Proxy Configuring a DFS NamespaceLockout Settings Validating the Web Application Proxy Configuring DFS-RCreating and Associating a Group Managed Deployment Module 10: Configuring Encryption andService Account Installing and Configuring a Network Advanced AuditingIntroducing Group Policy Policy Server Encrypting Drives by Using BitLockerImplementing and Administering GPOs Configuring RADIUS Clients and Servers Encrypting Files by Using Encrypting FileGroup Policy Scope and Group Policy NPS Authentication Methods System

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Processing Monitoring and Troubleshooting a Configuring Advanced AuditingTroubleshooting the Application of GPOs Network Policy Server Securing Data Drives by Using BitLockerCreating and Configuring GPOs Installing and Configuring NPS to Encrypting and Recovering FilesManaging GPO Scope Support RADIUS Configuring Advanced Audit PolicyVerify GPO Application Configuring and Testing a RADIUS Client ConfigurationManaging GPOs Network Access Protection Overview Overview of Windows DeploymentImplementing Administrative Templates Configuring NAP ServicesConfiguring Folder Redirection and Scripts Configuring IPSec Enforcement for NAP Managing Windows Deployment ImagesConfiguring Group Policy Preferences Monitoring and Troubleshooting NAP Implementing Deployment with WindowsManaging Software with Group Policy Configuring NAP with VPN Enforcement Deployment ServicesImplement Settings Using Group Policy Validating the Deployment Administering Windows DeploymentPreferences Configuring IPSec Enforcement ServicesManaging Office 2013 by using Validating the Deployment Installing and Configuring WindowsAdministrative Templates Overview of FSRM Deployment ServicesDeploying Software by using Group Policy Using FSRM to Manage Quotas, File Creating Operating System Images withConfiguring Folder Redirection Screens, and Storage Reports Windows Deployment ServicesModule 6: Configuring and Troubleshooting Implementing Classification Management Configuring Custom Computer NamingRemote Access and File Management Tasks Deploying Images with WindowsRemote Access Overview DFS Overview Deployment ServicesImplementing DirectAccess by Using the Configuring DFS Namespaces Overview of WSUSGetting Started Wizard Configuring and Troubleshooting DFS-R Deploying Updates with WSUSImplementing and Managing an Advanced Configuring FSRM Quotas Implementing the WSUS Server RoleDirectAccess Infrastructure Configuring File Screening Configuring Update SettingsImplementing VPN Installing the DFS role service Approving and Deploying an Update byImplementing Web Application Proxy Configuring a DFS Namespace using WSUSVerifying Readiness for a DirectAccess Configuring DFS-R Monitoring ToolsDeployment Module 10: Configuring Encryption and Using Performance MonitorRunning the Getting Started Wizard Advanced Auditing Monitoring Event LogsValidating the DirectAccess Deployment Encrypting Drives by Using BitLocker Establishing a Performance BaselinePreparing the Environment for DirectAccess Encrypting Files by Using Encrypting File Identifying the Source of a PerformanceImplementing the Advanced DirectAccess System ProblemInfrastructure Configuring Advanced Auditing Viewing and Configuring Centralized EventValidating the DirectAccess Deployment Securing Data Drives by Using BitLocker LogsImplementing VPN Encrypting and Recovering FilesValidating the VPN Deployment Configuring Advanced Audit PolicyImplementing Web Application Proxy Configuration lineValidating the Web Application Proxy Overview of Windows Deployment Configuring the DNS Server RoleDeployment Services Configuring DNS ZonesInstalling and Configuring a Network Policy Managing Windows Deployment Images Configuring DNS Zone TransfersServer Implementing Deployment with Windows Managing and Troubleshooting DNSConfiguring RADIUS Clients and Servers Deployment Services Configuring DNS Resource RecordsNPS Authentication Methods Administering Windows Deployment Configuring DNS Conditional ForwardingMonitoring and Troubleshooting a Network Services Installing and Configuring DNS ZonesPolicy Server Installing and Configuring Windows Troubleshooting DNSInstalling and Configuring NPS to Support Deployment Services Overview of AD DSRADIUS Creating Operating System Images with Implementing Virtualized DomainConfiguring and Testing a RADIUS Client Windows Deployment Services ControllersNetwork Access Protection Overview Configuring Custom Computer Naming Implementing Read-Only DomainConfiguring NAP Deploying Images with Windows ControllersConfiguring IPSec Enforcement for NAP Deployment Services Administering AD DSMonitoring and Troubleshooting NAP Overview of WSUS Managing the AD DS DatabaseConfiguring NAP with VPN Enforcement Deploying Updates with WSUS Installing and Configuring a RODCValidating the Deployment Implementing the WSUS Server Role Create and administer AD DS SnapshotsConfiguring IPSec Enforcement Configuring Update Settings Configuring the Active Directory RecycleValidating the Deployment Approving and Deploying an Update by BinOverview of FSRM using WSUS Deploy a domain controller by usingUsing FSRM to Manage Quotas, File Monitoring Tools domain controller cloningScreens, and Storage Reports Using Performance Monitor Configuring Password Policy and UserImplementing Classification Management Monitoring Event Logs Accountand File Management Tasks Establishing a Performance Baseline Configuring Managed Service AccountsDFS Overview Identifying the Source of a Performance Configuring Password Policy and AccountConfiguring DFS Namespaces Problem Lockout SettingsConfiguring and Troubleshooting DFS-R Viewing and Configuring Centralized Creating and Associating a GroupConfiguring FSRM Quotas Event Logs Managed Service AccountConfiguring File Screening Introducing Group PolicyInstalling the DFS role service Lab : Implementing VPN Implementing and Administering GPOs

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Configuring a DFS Namespace line Group Policy Scope and Group PolicyConfiguring DFS-R ProcessingModule 10: Configuring Encryption and Troubleshooting the Application of GPOsAdvanced Auditing line Creating and Configuring GPOsEncrypting Drives by Using BitLocker Configuring the DNS Server Role Managing GPO ScopeEncrypting Files by Using Encrypting File Configuring DNS Zones Verify GPO ApplicationSystem Configuring DNS Zone Transfers Managing GPOsConfiguring Advanced Auditing Managing and Troubleshooting DNS Implementing Administrative TemplatesSecuring Data Drives by Using BitLocker Configuring DNS Resource Records Configuring Folder Redirection and ScriptsEncrypting and Recovering Files Configuring DNS Conditional Forwarding Configuring Group Policy PreferencesConfiguring Advanced Audit Policy Installing and Configuring DNS Zones Managing Software with Group PolicyConfiguration Troubleshooting DNS Implement Settings Using Group PolicyOverview of Windows Deployment Services Overview of AD DS PreferencesManaging Windows Deployment Images Implementing Virtualized Domain Managing Office 2013 by usingImplementing Deployment with Windows Controllers Administrative TemplatesDeployment Services Implementing Read-Only Domain Deploying Software by using Group PolicyAdministering Windows Deployment Controllers Configuring Folder RedirectionServices Administering AD DS Module 6: Configuring andInstalling and Configuring Windows Managing the AD DS Database Troubleshooting Remote AccessDeployment Services Installing and Configuring a RODC Remote Access OverviewCreating Operating System Images with Create and administer AD DS Snapshots Implementing DirectAccess by Using theWindows Deployment Services Configuring the Active Directory Recycle Getting Started WizardConfiguring Custom Computer Naming Bin Implementing and Managing an AdvancedDeploying Images with Windows Deploy a domain controller by using DirectAccess InfrastructureDeployment Services domain controller cloning Implementing VPNOverview of WSUS Configuring Password Policy and User Implementing Web Application ProxyDeploying Updates with WSUS Account Verifying Readiness for a DirectAccessImplementing the WSUS Server Role Configuring Managed Service Accounts DeploymentConfiguring Update Settings Configuring Password Policy and Running the Getting Started WizardApproving and Deploying an Update by Account Lockout Settings Validating the DirectAccess Deploymentusing WSUS Creating and Associating a Group Preparing the Environment forMonitoring Tools Managed Service Account DirectAccessUsing Performance Monitor Introducing Group Policy Implementing the Advanced DirectAccessMonitoring Event Logs Implementing and Administering GPOs InfrastructureEstablishing a Performance Baseline Group Policy Scope and Group Policy Validating the DirectAccess DeploymentIdentifying the Source of a Performance Processing Implementing VPNProblem Troubleshooting the Application of GPOs Validating the VPN DeploymentViewing and Configuring Centralized Event Creating and Configuring GPOs Implementing Web Application ProxyLogs Managing GPO Scope Validating the Web Application Proxy

Verify GPO Application DeploymentManaging GPOs Installing and Configuring a Network Policy

line Implementing Administrative Templates ServerConfiguring the DNS Server Role Configuring Folder Redirection and Configuring RADIUS Clients and ServersConfiguring DNS Zones Scripts NPS Authentication MethodsConfiguring DNS Zone Transfers Configuring Group Policy Preferences Monitoring and Troubleshooting a NetworkManaging and Troubleshooting DNS Managing Software with Group Policy Policy ServerConfiguring DNS Resource Records Implement Settings Using Group Policy Installing and Configuring NPS to SupportConfiguring DNS Conditional Forwarding Preferences RADIUSInstalling and Configuring DNS Zones Managing Office 2013 by using Configuring and Testing a RADIUS ClientTroubleshooting DNS Administrative Templates Network Access Protection OverviewOverview of AD DS Deploying Software by using Group Configuring NAPImplementing Virtualized Domain Controllers Policy Configuring IPSec Enforcement for NAPImplementing Read-Only Domain Configuring Folder Redirection Monitoring and Troubleshooting NAPControllers Module 6: Configuring and Configuring NAP with VPN EnforcementAdministering AD DS Troubleshooting Remote Access Validating the DeploymentManaging the AD DS Database Remote Access Overview Configuring IPSec EnforcementInstalling and Configuring a RODC Implementing DirectAccess by Using the Validating the DeploymentCreate and administer AD DS Snapshots Getting Started Wizard Overview of FSRMConfiguring the Active Directory Recycle Bin Implementing and Managing an Using FSRM to Manage Quotas, FileDeploy a domain controller by using domain Advanced DirectAccess Infrastructure Screens, and Storage Reportscontroller cloning Implementing VPN Implementing Classification ManagementConfiguring Password Policy and User Implementing Web Application Proxy and File Management TasksAccount Verifying Readiness for a DirectAccess DFS OverviewConfiguring Managed Service Accounts Deployment Configuring DFS NamespacesConfiguring Password Policy and Account Running the Getting Started Wizard Configuring and Troubleshooting DFS-RLockout Settings Validating the DirectAccess Deployment Configuring FSRM Quotas

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Creating and Associating a Group Managed Preparing the Environment for Configuring File ScreeningService Account DirectAccess Installing the DFS role serviceIntroducing Group Policy Implementing the Advanced Configuring a DFS NamespaceImplementing and Administering GPOs DirectAccess Infrastructure Configuring DFS-RGroup Policy Scope and Group Policy Validating the DirectAccess Deployment Module 10: Configuring Encryption andProcessing Implementing VPN Advanced AuditingTroubleshooting the Application of GPOs Validating the VPN Deployment Encrypting Drives by Using BitLockerCreating and Configuring GPOs Implementing Web Application Proxy Encrypting Files by Using Encrypting FileManaging GPO Scope Validating the Web Application Proxy SystemVerify GPO Application Deployment Configuring Advanced AuditingManaging GPOs Installing and Configuring a Network Securing Data Drives by Using BitLockerImplementing Administrative Templates Policy Server Encrypting and Recovering FilesConfiguring Folder Redirection and Scripts Configuring RADIUS Clients and Servers Configuring Advanced Audit PolicyConfiguring Group Policy Preferences NPS Authentication Methods ConfigurationManaging Software with Group Policy Monitoring and Troubleshooting a Overview of Windows DeploymentImplement Settings Using Group Policy Network Policy Server ServicesPreferences Installing and Configuring NPS to Managing Windows Deployment ImagesManaging Office 2013 by using Support RADIUS Implementing Deployment with WindowsAdministrative Templates Configuring and Testing a RADIUS Client Deployment ServicesDeploying Software by using Group Policy Network Access Protection Overview Administering Windows DeploymentConfiguring Folder Redirection Configuring NAP ServicesModule 6: Configuring and Troubleshooting Configuring IPSec Enforcement for NAP Installing and Configuring WindowsRemote Access Monitoring and Troubleshooting NAP Deployment ServicesRemote Access Overview Configuring NAP with VPN Enforcement Creating Operating System Images withImplementing DirectAccess by Using the Validating the Deployment Windows Deployment ServicesGetting Started Wizard Configuring IPSec Enforcement Configuring Custom Computer NamingImplementing and Managing an Advanced Validating the Deployment Deploying Images with WindowsDirectAccess Infrastructure Overview of FSRM Deployment ServicesImplementing VPN Using FSRM to Manage Quotas, File Overview of WSUSImplementing Web Application Proxy Screens, and Storage Reports Deploying Updates with WSUSVerifying Readiness for a DirectAccess Implementing Classification Management Implementing the WSUS Server RoleDeployment and File Management Tasks Configuring Update SettingsRunning the Getting Started Wizard DFS Overview Approving and Deploying an Update byValidating the DirectAccess Deployment Configuring DFS Namespaces using WSUSPreparing the Environment for DirectAccess Configuring and Troubleshooting DFS-R Monitoring ToolsImplementing the Advanced DirectAccess Configuring FSRM Quotas Using Performance MonitorInfrastructure Configuring File Screening Monitoring Event LogsValidating the DirectAccess Deployment Installing the DFS role service Establishing a Performance BaselineImplementing VPN Configuring a DFS Namespace Identifying the Source of a PerformanceValidating the VPN Deployment Configuring DFS-R ProblemImplementing Web Application Proxy Module 10: Configuring Encryption and Viewing and Configuring Centralized EventValidating the Web Application Proxy Advanced Auditing LogsDeployment Encrypting Drives by Using BitLockerInstalling and Configuring a Network Policy Encrypting Files by Using Encrypting FileServer System lineConfiguring RADIUS Clients and Servers Configuring Advanced Auditing Configuring the DNS Server RoleNPS Authentication Methods Securing Data Drives by Using BitLocker Configuring DNS ZonesMonitoring and Troubleshooting a Network Encrypting and Recovering Files Configuring DNS Zone TransfersPolicy Server Configuring Advanced Audit Policy Managing and Troubleshooting DNSInstalling and Configuring NPS to Support Configuration Configuring DNS Resource RecordsRADIUS Overview of Windows Deployment Configuring DNS Conditional ForwardingConfiguring and Testing a RADIUS Client Services Installing and Configuring DNS ZonesNetwork Access Protection Overview Managing Windows Deployment Images Troubleshooting DNSConfiguring NAP Implementing Deployment with Windows Overview of AD DSConfiguring IPSec Enforcement for NAP Deployment Services Implementing Virtualized DomainMonitoring and Troubleshooting NAP Administering Windows Deployment ControllersConfiguring NAP with VPN Enforcement Services Implementing Read-Only DomainValidating the Deployment Installing and Configuring Windows ControllersConfiguring IPSec Enforcement Deployment Services Administering AD DSValidating the Deployment Creating Operating System Images with Managing the AD DS DatabaseOverview of FSRM Windows Deployment Services Installing and Configuring a RODCUsing FSRM to Manage Quotas, File Configuring Custom Computer Naming Create and administer AD DS SnapshotsScreens, and Storage Reports Deploying Images with Windows Configuring the Active Directory RecycleImplementing Classification Management Deployment Services Binand File Management Tasks Overview of WSUS Deploy a domain controller by usingDFS Overview Deploying Updates with WSUS domain controller cloning

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Configuring DFS Namespaces Implementing the WSUS Server Role Configuring Password Policy and UserConfiguring and Troubleshooting DFS-R Configuring Update Settings AccountConfiguring FSRM Quotas Approving and Deploying an Update by Configuring Managed Service AccountsConfiguring File Screening using WSUS Configuring Password Policy and AccountInstalling the DFS role service Monitoring Tools Lockout SettingsConfiguring a DFS Namespace Using Performance Monitor Creating and Associating a GroupConfiguring DFS-R Monitoring Event Logs Managed Service AccountModule 10: Configuring Encryption and Establishing a Performance Baseline Introducing Group PolicyAdvanced Auditing Identifying the Source of a Performance Implementing and Administering GPOsEncrypting Drives by Using BitLocker Problem Group Policy Scope and Group PolicyEncrypting Files by Using Encrypting File Viewing and Configuring Centralized ProcessingSystem Event Logs Troubleshooting the Application of GPOsConfiguring Advanced Auditing Creating and Configuring GPOsSecuring Data Drives by Using BitLocker Managing GPO ScopeEncrypting and Recovering Files line Verify GPO ApplicationConfiguring Advanced Audit Policy Configuring the DNS Server Role Managing GPOsConfiguration Configuring DNS Zones Implementing Administrative TemplatesOverview of Windows Deployment Services Configuring DNS Zone Transfers Configuring Folder Redirection and ScriptsManaging Windows Deployment Images Managing and Troubleshooting DNS Configuring Group Policy PreferencesImplementing Deployment with Windows Configuring DNS Resource Records Managing Software with Group PolicyDeployment Services Configuring DNS Conditional Forwarding Implement Settings Using Group PolicyAdministering Windows Deployment Installing and Configuring DNS Zones PreferencesServices Troubleshooting DNS Managing Office 2013 by usingInstalling and Configuring Windows Overview of AD DS Administrative TemplatesDeployment Services Implementing Virtualized Domain Deploying Software by using Group PolicyCreating Operating System Images with Controllers Configuring Folder RedirectionWindows Deployment Services Implementing Read-Only Domain Module 6: Configuring andConfiguring Custom Computer Naming Controllers Troubleshooting Remote AccessDeploying Images with Windows Administering AD DS Remote Access OverviewDeployment Services Managing the AD DS Database Implementing DirectAccess by Using theOverview of WSUS Installing and Configuring a RODC Getting Started WizardDeploying Updates with WSUS Create and administer AD DS Snapshots Implementing and Managing an AdvancedImplementing the WSUS Server Role Configuring the Active Directory Recycle DirectAccess InfrastructureConfiguring Update Settings Bin Implementing VPNApproving and Deploying an Update by Deploy a domain controller by using Implementing Web Application Proxyusing WSUS domain controller cloning Verifying Readiness for a DirectAccessMonitoring Tools Configuring Password Policy and User DeploymentUsing Performance Monitor Account Running the Getting Started WizardMonitoring Event Logs Configuring Managed Service Accounts Validating the DirectAccess DeploymentEstablishing a Performance Baseline Configuring Password Policy and Preparing the Environment forIdentifying the Source of a Performance Account Lockout Settings DirectAccessProblem Creating and Associating a Group Implementing the Advanced DirectAccessViewing and Configuring Centralized Event Managed Service Account InfrastructureLogs Introducing Group Policy Validating the DirectAccess Deployment

Implementing and Administering GPOs Implementing VPNGroup Policy Scope and Group Policy Validating the VPN Deployment

line Processing Implementing Web Application ProxyConfiguring the DNS Server Role Troubleshooting the Application of GPOs Validating the Web Application ProxyConfiguring DNS Zones Creating and Configuring GPOs DeploymentConfiguring DNS Zone Transfers Managing GPO Scope Installing and Configuring a Network PolicyManaging and Troubleshooting DNS Verify GPO Application ServerConfiguring DNS Resource Records Managing GPOs Configuring RADIUS Clients and ServersConfiguring DNS Conditional Forwarding Implementing Administrative Templates NPS Authentication MethodsInstalling and Configuring DNS Zones Configuring Folder Redirection and Monitoring and Troubleshooting a NetworkTroubleshooting DNS Scripts Policy ServerOverview of AD DS Configuring Group Policy Preferences Installing and Configuring NPS to SupportImplementing Virtualized Domain Controllers Managing Software with Group Policy RADIUSImplementing Read-Only Domain Implement Settings Using Group Policy Configuring and Testing a RADIUS ClientControllers Preferences Network Access Protection OverviewAdministering AD DS Managing Office 2013 by using Configuring NAPManaging the AD DS Database Administrative Templates Configuring IPSec Enforcement for NAPInstalling and Configuring a RODC Deploying Software by using Group Monitoring and Troubleshooting NAPCreate and administer AD DS Snapshots Policy Configuring NAP with VPN EnforcementConfiguring the Active Directory Recycle Bin Configuring Folder Redirection Validating the DeploymentDeploy a domain controller by using domain Module 6: Configuring and Configuring IPSec Enforcementcontroller cloning Troubleshooting Remote Access Validating the Deployment

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Configuring Password Policy and User Remote Access Overview Overview of FSRMAccount Implementing DirectAccess by Using the Using FSRM to Manage Quotas, FileConfiguring Managed Service Accounts Getting Started Wizard Screens, and Storage ReportsConfiguring Password Policy and Account Implementing and Managing an Implementing Classification ManagementLockout Settings Advanced DirectAccess Infrastructure and File Management TasksCreating and Associating a Group Managed Implementing VPN DFS OverviewService Account Implementing Web Application Proxy Configuring DFS NamespacesIntroducing Group Policy Verifying Readiness for a DirectAccess Configuring and Troubleshooting DFS-RImplementing and Administering GPOs Deployment Configuring FSRM QuotasGroup Policy Scope and Group Policy Running the Getting Started Wizard Configuring File ScreeningProcessing Validating the DirectAccess Deployment Installing the DFS role serviceTroubleshooting the Application of GPOs Preparing the Environment for Configuring a DFS NamespaceCreating and Configuring GPOs DirectAccess Configuring DFS-RManaging GPO Scope Implementing the Advanced Module 10: Configuring Encryption andVerify GPO Application DirectAccess Infrastructure Advanced AuditingManaging GPOs Validating the DirectAccess Deployment Encrypting Drives by Using BitLockerImplementing Administrative Templates Implementing VPN Encrypting Files by Using Encrypting FileConfiguring Folder Redirection and Scripts Validating the VPN Deployment SystemConfiguring Group Policy Preferences Implementing Web Application Proxy Configuring Advanced AuditingManaging Software with Group Policy Validating the Web Application Proxy Securing Data Drives by Using BitLockerImplement Settings Using Group Policy Deployment Encrypting and Recovering FilesPreferences Installing and Configuring a Network Configuring Advanced Audit PolicyManaging Office 2013 by using Policy Server ConfigurationAdministrative Templates Configuring RADIUS Clients and Servers Overview of Windows DeploymentDeploying Software by using Group Policy NPS Authentication Methods ServicesConfiguring Folder Redirection Monitoring and Troubleshooting a Managing Windows Deployment ImagesModule 6: Configuring and Troubleshooting Network Policy Server Implementing Deployment with WindowsRemote Access Installing and Configuring NPS to Deployment ServicesRemote Access Overview Support RADIUS Administering Windows DeploymentImplementing DirectAccess by Using the Configuring and Testing a RADIUS Client ServicesGetting Started Wizard Network Access Protection Overview Installing and Configuring WindowsImplementing and Managing an Advanced Configuring NAP Deployment ServicesDirectAccess Infrastructure Configuring IPSec Enforcement for NAP Creating Operating System Images withImplementing VPN Monitoring and Troubleshooting NAP Windows Deployment ServicesImplementing Web Application Proxy Configuring NAP with VPN Enforcement Configuring Custom Computer NamingVerifying Readiness for a DirectAccess Validating the Deployment Deploying Images with WindowsDeployment Configuring IPSec Enforcement Deployment ServicesRunning the Getting Started Wizard Validating the Deployment Overview of WSUSValidating the DirectAccess Deployment Overview of FSRM Deploying Updates with WSUSPreparing the Environment for DirectAccess Using FSRM to Manage Quotas, File Implementing the WSUS Server RoleImplementing the Advanced DirectAccess Screens, and Storage Reports Configuring Update SettingsInfrastructure Implementing Classification Management Approving and Deploying an Update byValidating the DirectAccess Deployment and File Management Tasks using WSUSImplementing VPN DFS Overview Monitoring ToolsValidating the VPN Deployment Configuring DFS Namespaces Using Performance MonitorImplementing Web Application Proxy Configuring and Troubleshooting DFS-R Monitoring Event LogsValidating the Web Application Proxy Configuring FSRM Quotas Establishing a Performance BaselineDeployment Configuring File Screening Identifying the Source of a PerformanceInstalling and Configuring a Network Policy Installing the DFS role service ProblemServer Configuring a DFS Namespace Viewing and Configuring Centralized EventConfiguring RADIUS Clients and Servers Configuring DFS-R LogsNPS Authentication Methods Module 10: Configuring Encryption andMonitoring and Troubleshooting a Network Advanced AuditingPolicy Server Encrypting Drives by Using BitLocker lineInstalling and Configuring NPS to Support Encrypting Files by Using Encrypting File Configuring the DNS Server RoleRADIUS System Configuring DNS ZonesConfiguring and Testing a RADIUS Client Configuring Advanced Auditing Configuring DNS Zone TransfersNetwork Access Protection Overview Securing Data Drives by Using BitLocker Managing and Troubleshooting DNSConfiguring NAP Encrypting and Recovering Files Configuring DNS Resource RecordsConfiguring IPSec Enforcement for NAP Configuring Advanced Audit Policy Configuring DNS Conditional ForwardingMonitoring and Troubleshooting NAP Configuration Installing and Configuring DNS ZonesConfiguring NAP with VPN Enforcement Overview of Windows Deployment Troubleshooting DNSValidating the Deployment Services Overview of AD DSConfiguring IPSec Enforcement Managing Windows Deployment Images Implementing Virtualized DomainValidating the Deployment Implementing Deployment with Windows ControllersOverview of FSRM Deployment Services Implementing Read-Only Domain

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Using FSRM to Manage Quotas, File Administering Windows Deployment ControllersScreens, and Storage Reports Services Administering AD DSImplementing Classification Management Installing and Configuring Windows Managing the AD DS Databaseand File Management Tasks Deployment Services Installing and Configuring a RODCDFS Overview Creating Operating System Images with Create and administer AD DS SnapshotsConfiguring DFS Namespaces Windows Deployment Services Configuring the Active Directory RecycleConfiguring and Troubleshooting DFS-R Configuring Custom Computer Naming BinConfiguring FSRM Quotas Deploying Images with Windows Deploy a domain controller by usingConfiguring File Screening Deployment Services domain controller cloningInstalling the DFS role service Overview of WSUS Configuring Password Policy and UserConfiguring a DFS Namespace Deploying Updates with WSUS AccountConfiguring DFS-R Implementing the WSUS Server Role Configuring Managed Service AccountsModule 10: Configuring Encryption and Configuring Update Settings Configuring Password Policy and AccountAdvanced Auditing Approving and Deploying an Update by Lockout SettingsEncrypting Drives by Using BitLocker using WSUS Creating and Associating a GroupEncrypting Files by Using Encrypting File Monitoring Tools Managed Service AccountSystem Using Performance Monitor Introducing Group PolicyConfiguring Advanced Auditing Monitoring Event Logs Implementing and Administering GPOsSecuring Data Drives by Using BitLocker Establishing a Performance Baseline Group Policy Scope and Group PolicyEncrypting and Recovering Files Identifying the Source of a Performance ProcessingConfiguring Advanced Audit Policy Problem Troubleshooting the Application of GPOsConfiguration Viewing and Configuring Centralized Creating and Configuring GPOsOverview of Windows Deployment Services Event Logs Managing GPO ScopeManaging Windows Deployment Images Verify GPO ApplicationImplementing Deployment with Windows Managing GPOsDeployment Services line Implementing Administrative TemplatesAdministering Windows Deployment Configuring the DNS Server Role Configuring Folder Redirection and ScriptsServices Configuring DNS Zones Configuring Group Policy PreferencesInstalling and Configuring Windows Configuring DNS Zone Transfers Managing Software with Group PolicyDeployment Services Managing and Troubleshooting DNS Implement Settings Using Group PolicyCreating Operating System Images with Configuring DNS Resource Records PreferencesWindows Deployment Services Configuring DNS Conditional Forwarding Managing Office 2013 by usingConfiguring Custom Computer Naming Installing and Configuring DNS Zones Administrative TemplatesDeploying Images with Windows Troubleshooting DNS Deploying Software by using Group PolicyDeployment Services Overview of AD DS Configuring Folder RedirectionOverview of WSUS Implementing Virtualized Domain Module 6: Configuring andDeploying Updates with WSUS Controllers Troubleshooting Remote AccessImplementing the WSUS Server Role Implementing Read-Only Domain Remote Access OverviewConfiguring Update Settings Controllers Implementing DirectAccess by Using theApproving and Deploying an Update by Administering AD DS Getting Started Wizardusing WSUS Managing the AD DS Database Implementing and Managing an AdvancedMonitoring Tools Installing and Configuring a RODC DirectAccess InfrastructureUsing Performance Monitor Create and administer AD DS Snapshots Implementing VPNMonitoring Event Logs Configuring the Active Directory Recycle Implementing Web Application ProxyEstablishing a Performance Baseline Bin Verifying Readiness for a DirectAccessIdentifying the Source of a Performance Deploy a domain controller by using DeploymentProblem domain controller cloning Running the Getting Started WizardViewing and Configuring Centralized Event Configuring Password Policy and User Validating the DirectAccess DeploymentLogs Account Preparing the Environment for

Configuring Managed Service Accounts DirectAccessConfiguring Password Policy and Implementing the Advanced DirectAccess

line Account Lockout Settings InfrastructureConfiguring the DNS Server Role Creating and Associating a Group Validating the DirectAccess DeploymentConfiguring DNS Zones Managed Service Account Implementing VPNConfiguring DNS Zone Transfers Introducing Group Policy Validating the VPN DeploymentManaging and Troubleshooting DNS Implementing and Administering GPOs Implementing Web Application ProxyConfiguring DNS Resource Records Group Policy Scope and Group Policy Validating the Web Application ProxyConfiguring DNS Conditional Forwarding Processing DeploymentInstalling and Configuring DNS Zones Troubleshooting the Application of GPOs Installing and Configuring a Network PolicyTroubleshooting DNS Creating and Configuring GPOs ServerOverview of AD DS Managing GPO Scope Configuring RADIUS Clients and ServersImplementing Virtualized Domain Controllers Verify GPO Application NPS Authentication MethodsImplementing Read-Only Domain Managing GPOs Monitoring and Troubleshooting a NetworkControllers Implementing Administrative Templates Policy ServerAdministering AD DS Configuring Folder Redirection and Installing and Configuring NPS to SupportManaging the AD DS Database Scripts RADIUS

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Installing and Configuring a RODC Configuring Group Policy Preferences Configuring and Testing a RADIUS ClientCreate and administer AD DS Snapshots Managing Software with Group Policy Network Access Protection OverviewConfiguring the Active Directory Recycle Bin Implement Settings Using Group Policy Configuring NAPDeploy a domain controller by using domain Preferences Configuring IPSec Enforcement for NAPcontroller cloning Managing Office 2013 by using Monitoring and Troubleshooting NAPConfiguring Password Policy and User Administrative Templates Configuring NAP with VPN EnforcementAccount Deploying Software by using Group Validating the DeploymentConfiguring Managed Service Accounts Policy Configuring IPSec EnforcementConfiguring Password Policy and Account Configuring Folder Redirection Validating the DeploymentLockout Settings Module 6: Configuring and Overview of FSRMCreating and Associating a Group Managed Troubleshooting Remote Access Using FSRM to Manage Quotas, FileService Account Remote Access Overview Screens, and Storage ReportsIntroducing Group Policy Implementing DirectAccess by Using the Implementing Classification ManagementImplementing and Administering GPOs Getting Started Wizard and File Management TasksGroup Policy Scope and Group Policy Implementing and Managing an DFS OverviewProcessing Advanced DirectAccess Infrastructure Configuring DFS NamespacesTroubleshooting the Application of GPOs Implementing VPN Configuring and Troubleshooting DFS-RCreating and Configuring GPOs Implementing Web Application Proxy Configuring FSRM QuotasManaging GPO Scope Verifying Readiness for a DirectAccess Configuring File ScreeningVerify GPO Application Deployment Installing the DFS role serviceManaging GPOs Running the Getting Started Wizard Configuring a DFS NamespaceImplementing Administrative Templates Validating the DirectAccess Deployment Configuring DFS-RConfiguring Folder Redirection and Scripts Preparing the Environment for Module 10: Configuring Encryption andConfiguring Group Policy Preferences DirectAccess Advanced AuditingManaging Software with Group Policy Implementing the Advanced Encrypting Drives by Using BitLockerImplement Settings Using Group Policy DirectAccess Infrastructure Encrypting Files by Using Encrypting FilePreferences Validating the DirectAccess Deployment SystemManaging Office 2013 by using Implementing VPN Configuring Advanced AuditingAdministrative Templates Validating the VPN Deployment Securing Data Drives by Using BitLockerDeploying Software by using Group Policy Implementing Web Application Proxy Encrypting and Recovering FilesConfiguring Folder Redirection Validating the Web Application Proxy Configuring Advanced Audit PolicyModule 6: Configuring and Troubleshooting Deployment ConfigurationRemote Access Installing and Configuring a Network Overview of Windows DeploymentRemote Access Overview Policy Server ServicesImplementing DirectAccess by Using the Configuring RADIUS Clients and Servers Managing Windows Deployment ImagesGetting Started Wizard NPS Authentication Methods Implementing Deployment with WindowsImplementing and Managing an Advanced Monitoring and Troubleshooting a Deployment ServicesDirectAccess Infrastructure Network Policy Server Administering Windows DeploymentImplementing VPN Installing and Configuring NPS to ServicesImplementing Web Application Proxy Support RADIUS Installing and Configuring WindowsVerifying Readiness for a DirectAccess Configuring and Testing a RADIUS Client Deployment ServicesDeployment Network Access Protection Overview Creating Operating System Images withRunning the Getting Started Wizard Configuring NAP Windows Deployment ServicesValidating the DirectAccess Deployment Configuring IPSec Enforcement for NAP Configuring Custom Computer NamingPreparing the Environment for DirectAccess Monitoring and Troubleshooting NAP Deploying Images with WindowsImplementing the Advanced DirectAccess Configuring NAP with VPN Enforcement Deployment ServicesInfrastructure Validating the Deployment Overview of WSUSValidating the DirectAccess Deployment Configuring IPSec Enforcement Deploying Updates with WSUSImplementing VPN Validating the Deployment Implementing the WSUS Server RoleValidating the VPN Deployment Overview of FSRM Configuring Update SettingsImplementing Web Application Proxy Using FSRM to Manage Quotas, File Approving and Deploying an Update byValidating the Web Application Proxy Screens, and Storage Reports using WSUSDeployment Implementing Classification Management Monitoring ToolsInstalling and Configuring a Network Policy and File Management Tasks Using Performance MonitorServer DFS Overview Monitoring Event LogsConfiguring RADIUS Clients and Servers Configuring DFS Namespaces Establishing a Performance BaselineNPS Authentication Methods Configuring and Troubleshooting DFS-R Identifying the Source of a PerformanceMonitoring and Troubleshooting a Network Configuring FSRM Quotas ProblemPolicy Server Configuring File Screening Viewing and Configuring Centralized EventInstalling and Configuring NPS to Support Installing the DFS role service LogsRADIUS Configuring a DFS NamespaceConfiguring and Testing a RADIUS Client Configuring DFS-R Module 11: Deploying and Maintaining ServerNetwork Access Protection Overview Module 10: Configuring Encryption and ImagesConfiguring NAP Advanced Auditing lineConfiguring IPSec Enforcement for NAP Encrypting Drives by Using BitLockerMonitoring and Troubleshooting NAP Encrypting Files by Using Encrypting File

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Configuring NAP with VPN Enforcement System lineValidating the Deployment Configuring Advanced Auditing Configuring the DNS Server RoleConfiguring IPSec Enforcement Securing Data Drives by Using BitLocker Configuring DNS ZonesValidating the Deployment Encrypting and Recovering Files Configuring DNS Zone TransfersOverview of FSRM Configuring Advanced Audit Policy Managing and Troubleshooting DNSUsing FSRM to Manage Quotas, File Configuration Configuring DNS Resource RecordsScreens, and Storage Reports Overview of Windows Deployment Configuring DNS Conditional ForwardingImplementing Classification Management Services Installing and Configuring DNS Zonesand File Management Tasks Managing Windows Deployment Images Troubleshooting DNSDFS Overview Implementing Deployment with Windows Overview of AD DSConfiguring DFS Namespaces Deployment Services Implementing Virtualized DomainConfiguring and Troubleshooting DFS-R Administering Windows Deployment ControllersConfiguring FSRM Quotas Services Implementing Read-Only DomainConfiguring File Screening Installing and Configuring Windows ControllersInstalling the DFS role service Deployment Services Administering AD DSConfiguring a DFS Namespace Creating Operating System Images with Managing the AD DS DatabaseConfiguring DFS-R Windows Deployment Services Installing and Configuring a RODCModule 10: Configuring Encryption and Configuring Custom Computer Naming Create and administer AD DS SnapshotsAdvanced Auditing Deploying Images with Windows Configuring the Active Directory RecycleEncrypting Drives by Using BitLocker Deployment Services BinEncrypting Files by Using Encrypting File Overview of WSUS Deploy a domain controller by usingSystem Deploying Updates with WSUS domain controller cloningConfiguring Advanced Auditing Implementing the WSUS Server Role Configuring Password Policy and UserSecuring Data Drives by Using BitLocker Configuring Update Settings AccountEncrypting and Recovering Files Approving and Deploying an Update by Configuring Managed Service AccountsConfiguring Advanced Audit Policy using WSUS Configuring Password Policy and AccountConfiguration Monitoring Tools Lockout SettingsOverview of Windows Deployment Services Using Performance Monitor Creating and Associating a GroupManaging Windows Deployment Images Monitoring Event Logs Managed Service AccountImplementing Deployment with Windows Establishing a Performance Baseline Introducing Group PolicyDeployment Services Identifying the Source of a Performance Implementing and Administering GPOsAdministering Windows Deployment Problem Group Policy Scope and Group PolicyServices Viewing and Configuring Centralized ProcessingInstalling and Configuring Windows Event Logs Troubleshooting the Application of GPOsDeployment Services Creating and Configuring GPOsCreating Operating System Images with Lab : Implementing Web Application Proxy Managing GPO ScopeWindows Deployment Services line Verify GPO ApplicationConfiguring Custom Computer Naming Managing GPOsDeploying Images with Windows Implementing Administrative TemplatesDeployment Services line Configuring Folder Redirection and ScriptsOverview of WSUS Configuring the DNS Server Role Configuring Group Policy PreferencesDeploying Updates with WSUS Configuring DNS Zones Managing Software with Group PolicyImplementing the WSUS Server Role Configuring DNS Zone Transfers Implement Settings Using Group PolicyConfiguring Update Settings Managing and Troubleshooting DNS PreferencesApproving and Deploying an Update by Configuring DNS Resource Records Managing Office 2013 by usingusing WSUS Configuring DNS Conditional Forwarding Administrative TemplatesMonitoring Tools Installing and Configuring DNS Zones Deploying Software by using Group PolicyUsing Performance Monitor Troubleshooting DNS Configuring Folder RedirectionMonitoring Event Logs Overview of AD DS Module 6: Configuring andEstablishing a Performance Baseline Implementing Virtualized Domain Troubleshooting Remote AccessIdentifying the Source of a Performance Controllers Remote Access OverviewProblem Implementing Read-Only Domain Implementing DirectAccess by Using theViewing and Configuring Centralized Event Controllers Getting Started WizardLogs Administering AD DS Implementing and Managing an Advanced

Managing the AD DS Database DirectAccess InfrastructureModule 3: Managing User and Service Installing and Configuring a RODC Implementing VPNAccounts Create and administer AD DS Snapshots Implementing Web Application Proxyline Configuring the Active Directory Recycle Verifying Readiness for a DirectAccess

Bin DeploymentDeploy a domain controller by using Running the Getting Started Wizard

line domain controller cloning Validating the DirectAccess DeploymentConfiguring the DNS Server Role Configuring Password Policy and User Preparing the Environment forConfiguring DNS Zones Account DirectAccessConfiguring DNS Zone Transfers Configuring Managed Service Accounts Implementing the Advanced DirectAccessManaging and Troubleshooting DNS Configuring Password Policy and InfrastructureConfiguring DNS Resource Records Account Lockout Settings Validating the DirectAccess Deployment

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Configuring DNS Conditional Forwarding Creating and Associating a Group Implementing VPNInstalling and Configuring DNS Zones Managed Service Account Validating the VPN DeploymentTroubleshooting DNS Introducing Group Policy Implementing Web Application ProxyOverview of AD DS Implementing and Administering GPOs Validating the Web Application ProxyImplementing Virtualized Domain Controllers Group Policy Scope and Group Policy DeploymentImplementing Read-Only Domain Processing Installing and Configuring a Network PolicyControllers Troubleshooting the Application of GPOs ServerAdministering AD DS Creating and Configuring GPOs Configuring RADIUS Clients and ServersManaging the AD DS Database Managing GPO Scope NPS Authentication MethodsInstalling and Configuring a RODC Verify GPO Application Monitoring and Troubleshooting a NetworkCreate and administer AD DS Snapshots Managing GPOs Policy ServerConfiguring the Active Directory Recycle Bin Implementing Administrative Templates Installing and Configuring NPS to SupportDeploy a domain controller by using domain Configuring Folder Redirection and RADIUScontroller cloning Scripts Configuring and Testing a RADIUS ClientConfiguring Password Policy and User Configuring Group Policy Preferences Network Access Protection OverviewAccount Managing Software with Group Policy Configuring NAPConfiguring Managed Service Accounts Implement Settings Using Group Policy Configuring IPSec Enforcement for NAPConfiguring Password Policy and Account Preferences Monitoring and Troubleshooting NAPLockout Settings Managing Office 2013 by using Configuring NAP with VPN EnforcementCreating and Associating a Group Managed Administrative Templates Validating the DeploymentService Account Deploying Software by using Group Configuring IPSec EnforcementIntroducing Group Policy Policy Validating the DeploymentImplementing and Administering GPOs Configuring Folder Redirection Overview of FSRMGroup Policy Scope and Group Policy Module 6: Configuring and Using FSRM to Manage Quotas, FileProcessing Troubleshooting Remote Access Screens, and Storage ReportsTroubleshooting the Application of GPOs Remote Access Overview Implementing Classification ManagementCreating and Configuring GPOs Implementing DirectAccess by Using the and File Management TasksManaging GPO Scope Getting Started Wizard DFS OverviewVerify GPO Application Implementing and Managing an Configuring DFS NamespacesManaging GPOs Advanced DirectAccess Infrastructure Configuring and Troubleshooting DFS-RImplementing Administrative Templates Implementing VPN Configuring FSRM QuotasConfiguring Folder Redirection and Scripts Implementing Web Application Proxy Configuring File ScreeningConfiguring Group Policy Preferences Verifying Readiness for a DirectAccess Installing the DFS role serviceManaging Software with Group Policy Deployment Configuring a DFS NamespaceImplement Settings Using Group Policy Running the Getting Started Wizard Configuring DFS-RPreferences Validating the DirectAccess Deployment Module 10: Configuring Encryption andManaging Office 2013 by using Preparing the Environment for Advanced AuditingAdministrative Templates DirectAccess Encrypting Drives by Using BitLockerDeploying Software by using Group Policy Implementing the Advanced Encrypting Files by Using Encrypting FileConfiguring Folder Redirection DirectAccess Infrastructure SystemModule 6: Configuring and Troubleshooting Validating the DirectAccess Deployment Configuring Advanced AuditingRemote Access Implementing VPN Securing Data Drives by Using BitLockerRemote Access Overview Validating the VPN Deployment Encrypting and Recovering FilesImplementing DirectAccess by Using the Implementing Web Application Proxy Configuring Advanced Audit PolicyGetting Started Wizard Validating the Web Application Proxy ConfigurationImplementing and Managing an Advanced Deployment Overview of Windows DeploymentDirectAccess Infrastructure Installing and Configuring a Network ServicesImplementing VPN Policy Server Managing Windows Deployment ImagesImplementing Web Application Proxy Configuring RADIUS Clients and Servers Implementing Deployment with WindowsVerifying Readiness for a DirectAccess NPS Authentication Methods Deployment ServicesDeployment Monitoring and Troubleshooting a Administering Windows DeploymentRunning the Getting Started Wizard Network Policy Server ServicesValidating the DirectAccess Deployment Installing and Configuring NPS to Installing and Configuring WindowsPreparing the Environment for DirectAccess Support RADIUS Deployment ServicesImplementing the Advanced DirectAccess Configuring and Testing a RADIUS Client Creating Operating System Images withInfrastructure Network Access Protection Overview Windows Deployment ServicesValidating the DirectAccess Deployment Configuring NAP Configuring Custom Computer NamingImplementing VPN Configuring IPSec Enforcement for NAP Deploying Images with WindowsValidating the VPN Deployment Monitoring and Troubleshooting NAP Deployment ServicesImplementing Web Application Proxy Configuring NAP with VPN Enforcement Overview of WSUSValidating the Web Application Proxy Validating the Deployment Deploying Updates with WSUSDeployment Configuring IPSec Enforcement Implementing the WSUS Server RoleInstalling and Configuring a Network Policy Validating the Deployment Configuring Update SettingsServer Overview of FSRM Approving and Deploying an Update byConfiguring RADIUS Clients and Servers Using FSRM to Manage Quotas, File using WSUSNPS Authentication Methods Screens, and Storage Reports Monitoring Tools

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Monitoring and Troubleshooting a Network Implementing Classification Management Using Performance MonitorPolicy Server and File Management Tasks Monitoring Event LogsInstalling and Configuring NPS to Support DFS Overview Establishing a Performance BaselineRADIUS Configuring DFS Namespaces Identifying the Source of a PerformanceConfiguring and Testing a RADIUS Client Configuring and Troubleshooting DFS-R ProblemNetwork Access Protection Overview Configuring FSRM Quotas Viewing and Configuring Centralized EventConfiguring NAP Configuring File Screening LogsConfiguring IPSec Enforcement for NAP Installing the DFS role serviceMonitoring and Troubleshooting NAP Configuring a DFS NamespaceConfiguring NAP with VPN Enforcement Configuring DFS-R lineValidating the Deployment Module 10: Configuring Encryption and Configuring the DNS Server RoleConfiguring IPSec Enforcement Advanced Auditing Configuring DNS ZonesValidating the Deployment Encrypting Drives by Using BitLocker Configuring DNS Zone TransfersOverview of FSRM Encrypting Files by Using Encrypting File Managing and Troubleshooting DNSUsing FSRM to Manage Quotas, File System Configuring DNS Resource RecordsScreens, and Storage Reports Configuring Advanced Auditing Configuring DNS Conditional ForwardingImplementing Classification Management Securing Data Drives by Using BitLocker Installing and Configuring DNS Zonesand File Management Tasks Encrypting and Recovering Files Troubleshooting DNSDFS Overview Configuring Advanced Audit Policy Overview of AD DSConfiguring DFS Namespaces Configuration Implementing Virtualized DomainConfiguring and Troubleshooting DFS-R Overview of Windows Deployment ControllersConfiguring FSRM Quotas Services Implementing Read-Only DomainConfiguring File Screening Managing Windows Deployment Images ControllersInstalling the DFS role service Implementing Deployment with Windows Administering AD DSConfiguring a DFS Namespace Deployment Services Managing the AD DS DatabaseConfiguring DFS-R Administering Windows Deployment Installing and Configuring a RODCModule 10: Configuring Encryption and Services Create and administer AD DS SnapshotsAdvanced Auditing Installing and Configuring Windows Configuring the Active Directory RecycleEncrypting Drives by Using BitLocker Deployment Services BinEncrypting Files by Using Encrypting File Creating Operating System Images with Deploy a domain controller by usingSystem Windows Deployment Services domain controller cloningConfiguring Advanced Auditing Configuring Custom Computer Naming Configuring Password Policy and UserSecuring Data Drives by Using BitLocker Deploying Images with Windows AccountEncrypting and Recovering Files Deployment Services Configuring Managed Service AccountsConfiguring Advanced Audit Policy Overview of WSUS Configuring Password Policy and AccountConfiguration Deploying Updates with WSUS Lockout SettingsOverview of Windows Deployment Services Implementing the WSUS Server Role Creating and Associating a GroupManaging Windows Deployment Images Configuring Update Settings Managed Service AccountImplementing Deployment with Windows Approving and Deploying an Update by Introducing Group PolicyDeployment Services using WSUS Implementing and Administering GPOsAdministering Windows Deployment Monitoring Tools Group Policy Scope and Group PolicyServices Using Performance Monitor ProcessingInstalling and Configuring Windows Monitoring Event Logs Troubleshooting the Application of GPOsDeployment Services Establishing a Performance Baseline Creating and Configuring GPOsCreating Operating System Images with Identifying the Source of a Performance Managing GPO ScopeWindows Deployment Services Problem Verify GPO ApplicationConfiguring Custom Computer Naming Viewing and Configuring Centralized Managing GPOsDeploying Images with Windows Event Logs Implementing Administrative TemplatesDeployment Services Configuring Folder Redirection and ScriptsOverview of WSUS Configuring Group Policy PreferencesDeploying Updates with WSUS line Managing Software with Group PolicyImplementing the WSUS Server Role Configuring the DNS Server Role Implement Settings Using Group PolicyConfiguring Update Settings Configuring DNS Zones PreferencesApproving and Deploying an Update by Configuring DNS Zone Transfers Managing Office 2013 by usingusing WSUS Managing and Troubleshooting DNS Administrative TemplatesMonitoring Tools Configuring DNS Resource Records Deploying Software by using Group PolicyUsing Performance Monitor Configuring DNS Conditional Forwarding Configuring Folder RedirectionMonitoring Event Logs Installing and Configuring DNS Zones Module 6: Configuring andEstablishing a Performance Baseline Troubleshooting DNS Troubleshooting Remote AccessIdentifying the Source of a Performance Overview of AD DS Remote Access OverviewProblem Implementing Virtualized Domain Implementing DirectAccess by Using theViewing and Configuring Centralized Event Controllers Getting Started WizardLogs Implementing Read-Only Domain Implementing and Managing an Advanced

Controllers DirectAccess InfrastructureAdministering AD DS Implementing VPN

line Managing the AD DS Database Implementing Web Application Proxy

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Configuring the DNS Server Role Installing and Configuring a RODC Verifying Readiness for a DirectAccessConfiguring DNS Zones Create and administer AD DS Snapshots DeploymentConfiguring DNS Zone Transfers Configuring the Active Directory Recycle Running the Getting Started WizardManaging and Troubleshooting DNS Bin Validating the DirectAccess DeploymentConfiguring DNS Resource Records Deploy a domain controller by using Preparing the Environment forConfiguring DNS Conditional Forwarding domain controller cloning DirectAccessInstalling and Configuring DNS Zones Configuring Password Policy and User Implementing the Advanced DirectAccessTroubleshooting DNS Account InfrastructureOverview of AD DS Configuring Managed Service Accounts Validating the DirectAccess DeploymentImplementing Virtualized Domain Controllers Configuring Password Policy and Implementing VPNImplementing Read-Only Domain Account Lockout Settings Validating the VPN DeploymentControllers Creating and Associating a Group Implementing Web Application ProxyAdministering AD DS Managed Service Account Validating the Web Application ProxyManaging the AD DS Database Introducing Group Policy DeploymentInstalling and Configuring a RODC Implementing and Administering GPOs Installing and Configuring a Network PolicyCreate and administer AD DS Snapshots Group Policy Scope and Group Policy ServerConfiguring the Active Directory Recycle Bin Processing Configuring RADIUS Clients and ServersDeploy a domain controller by using domain Troubleshooting the Application of GPOs NPS Authentication Methodscontroller cloning Creating and Configuring GPOs Monitoring and Troubleshooting a NetworkConfiguring Password Policy and User Managing GPO Scope Policy ServerAccount Verify GPO Application Installing and Configuring NPS to SupportConfiguring Managed Service Accounts Managing GPOs RADIUSConfiguring Password Policy and Account Implementing Administrative Templates Configuring and Testing a RADIUS ClientLockout Settings Configuring Folder Redirection and Network Access Protection OverviewCreating and Associating a Group Managed Scripts Configuring NAPService Account Configuring Group Policy Preferences Configuring IPSec Enforcement for NAPIntroducing Group Policy Managing Software with Group Policy Monitoring and Troubleshooting NAPImplementing and Administering GPOs Implement Settings Using Group Policy Configuring NAP with VPN EnforcementGroup Policy Scope and Group Policy Preferences Validating the DeploymentProcessing Managing Office 2013 by using Configuring IPSec EnforcementTroubleshooting the Application of GPOs Administrative Templates Validating the DeploymentCreating and Configuring GPOs Deploying Software by using Group Overview of FSRMManaging GPO Scope Policy Using FSRM to Manage Quotas, FileVerify GPO Application Configuring Folder Redirection Screens, and Storage ReportsManaging GPOs Module 6: Configuring and Implementing Classification ManagementImplementing Administrative Templates Troubleshooting Remote Access and File Management TasksConfiguring Folder Redirection and Scripts Remote Access Overview DFS OverviewConfiguring Group Policy Preferences Implementing DirectAccess by Using the Configuring DFS NamespacesManaging Software with Group Policy Getting Started Wizard Configuring and Troubleshooting DFS-RImplement Settings Using Group Policy Implementing and Managing an Configuring FSRM QuotasPreferences Advanced DirectAccess Infrastructure Configuring File ScreeningManaging Office 2013 by using Implementing VPN Installing the DFS role serviceAdministrative Templates Implementing Web Application Proxy Configuring a DFS NamespaceDeploying Software by using Group Policy Verifying Readiness for a DirectAccess Configuring DFS-RConfiguring Folder Redirection Deployment Module 10: Configuring Encryption andModule 6: Configuring and Troubleshooting Running the Getting Started Wizard Advanced AuditingRemote Access Validating the DirectAccess Deployment Encrypting Drives by Using BitLockerRemote Access Overview Preparing the Environment for Encrypting Files by Using Encrypting FileImplementing DirectAccess by Using the DirectAccess SystemGetting Started Wizard Implementing the Advanced Configuring Advanced AuditingImplementing and Managing an Advanced DirectAccess Infrastructure Securing Data Drives by Using BitLockerDirectAccess Infrastructure Validating the DirectAccess Deployment Encrypting and Recovering FilesImplementing VPN Implementing VPN Configuring Advanced Audit PolicyImplementing Web Application Proxy Validating the VPN Deployment ConfigurationVerifying Readiness for a DirectAccess Implementing Web Application Proxy Overview of Windows DeploymentDeployment Validating the Web Application Proxy ServicesRunning the Getting Started Wizard Deployment Managing Windows Deployment ImagesValidating the DirectAccess Deployment Installing and Configuring a Network Implementing Deployment with WindowsPreparing the Environment for DirectAccess Policy Server Deployment ServicesImplementing the Advanced DirectAccess Configuring RADIUS Clients and Servers Administering Windows DeploymentInfrastructure NPS Authentication Methods ServicesValidating the DirectAccess Deployment Monitoring and Troubleshooting a Installing and Configuring WindowsImplementing VPN Network Policy Server Deployment ServicesValidating the VPN Deployment Installing and Configuring NPS to Creating Operating System Images withImplementing Web Application Proxy Support RADIUS Windows Deployment ServicesValidating the Web Application Proxy Configuring and Testing a RADIUS Client Configuring Custom Computer Naming

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Deployment Network Access Protection Overview Deploying Images with WindowsInstalling and Configuring a Network Policy Configuring NAP Deployment ServicesServer Configuring IPSec Enforcement for NAP Overview of WSUSConfiguring RADIUS Clients and Servers Monitoring and Troubleshooting NAP Deploying Updates with WSUSNPS Authentication Methods Configuring NAP with VPN Enforcement Implementing the WSUS Server RoleMonitoring and Troubleshooting a Network Validating the Deployment Configuring Update SettingsPolicy Server Configuring IPSec Enforcement Approving and Deploying an Update byInstalling and Configuring NPS to Support Validating the Deployment using WSUSRADIUS Overview of FSRM Monitoring ToolsConfiguring and Testing a RADIUS Client Using FSRM to Manage Quotas, File Using Performance MonitorNetwork Access Protection Overview Screens, and Storage Reports Monitoring Event LogsConfiguring NAP Implementing Classification Management Establishing a Performance BaselineConfiguring IPSec Enforcement for NAP and File Management Tasks Identifying the Source of a PerformanceMonitoring and Troubleshooting NAP DFS Overview ProblemConfiguring NAP with VPN Enforcement Configuring DFS Namespaces Viewing and Configuring Centralized EventValidating the Deployment Configuring and Troubleshooting DFS-R LogsConfiguring IPSec Enforcement Configuring FSRM QuotasValidating the Deployment Configuring File ScreeningOverview of FSRM Installing the DFS role service lineUsing FSRM to Manage Quotas, File Configuring a DFS Namespace Configuring the DNS Server RoleScreens, and Storage Reports Configuring DFS-R Configuring DNS ZonesImplementing Classification Management Module 10: Configuring Encryption and Configuring DNS Zone Transfersand File Management Tasks Advanced Auditing Managing and Troubleshooting DNSDFS Overview Encrypting Drives by Using BitLocker Configuring DNS Resource RecordsConfiguring DFS Namespaces Encrypting Files by Using Encrypting File Configuring DNS Conditional ForwardingConfiguring and Troubleshooting DFS-R System Installing and Configuring DNS ZonesConfiguring FSRM Quotas Configuring Advanced Auditing Troubleshooting DNSConfiguring File Screening Securing Data Drives by Using BitLocker Overview of AD DSInstalling the DFS role service Encrypting and Recovering Files Implementing Virtualized DomainConfiguring a DFS Namespace Configuring Advanced Audit Policy ControllersConfiguring DFS-R Configuration Implementing Read-Only DomainModule 10: Configuring Encryption and Overview of Windows Deployment ControllersAdvanced Auditing Services Administering AD DSEncrypting Drives by Using BitLocker Managing Windows Deployment Images Managing the AD DS DatabaseEncrypting Files by Using Encrypting File Implementing Deployment with Windows Installing and Configuring a RODCSystem Deployment Services Create and administer AD DS SnapshotsConfiguring Advanced Auditing Administering Windows Deployment Configuring the Active Directory RecycleSecuring Data Drives by Using BitLocker Services BinEncrypting and Recovering Files Installing and Configuring Windows Deploy a domain controller by usingConfiguring Advanced Audit Policy Deployment Services domain controller cloningConfiguration Creating Operating System Images with Configuring Password Policy and UserOverview of Windows Deployment Services Windows Deployment Services AccountManaging Windows Deployment Images Configuring Custom Computer Naming Configuring Managed Service AccountsImplementing Deployment with Windows Deploying Images with Windows Configuring Password Policy and AccountDeployment Services Deployment Services Lockout SettingsAdministering Windows Deployment Overview of WSUS Creating and Associating a GroupServices Deploying Updates with WSUS Managed Service AccountInstalling and Configuring Windows Implementing the WSUS Server Role Introducing Group PolicyDeployment Services Configuring Update Settings Implementing and Administering GPOsCreating Operating System Images with Approving and Deploying an Update by Group Policy Scope and Group PolicyWindows Deployment Services using WSUS ProcessingConfiguring Custom Computer Naming Monitoring Tools Troubleshooting the Application of GPOsDeploying Images with Windows Using Performance Monitor Creating and Configuring GPOsDeployment Services Monitoring Event Logs Managing GPO ScopeOverview of WSUS Establishing a Performance Baseline Verify GPO ApplicationDeploying Updates with WSUS Identifying the Source of a Performance Managing GPOsImplementing the WSUS Server Role Problem Implementing Administrative TemplatesConfiguring Update Settings Viewing and Configuring Centralized Configuring Folder Redirection and ScriptsApproving and Deploying an Update by Event Logs Configuring Group Policy Preferencesusing WSUS Managing Software with Group PolicyMonitoring Tools Implement Settings Using Group PolicyUsing Performance Monitor line PreferencesMonitoring Event Logs Configuring the DNS Server Role Managing Office 2013 by usingEstablishing a Performance Baseline Configuring DNS Zones Administrative TemplatesIdentifying the Source of a Performance Configuring DNS Zone Transfers Deploying Software by using Group PolicyProblem Managing and Troubleshooting DNS Configuring Folder Redirection

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Viewing and Configuring Centralized Event Configuring DNS Resource Records Module 6: Configuring andLogs Configuring DNS Conditional Forwarding Troubleshooting Remote Access

Installing and Configuring DNS Zones Remote Access OverviewTroubleshooting DNS Implementing DirectAccess by Using the

line Overview of AD DS Getting Started WizardConfiguring the DNS Server Role Implementing Virtualized Domain Implementing and Managing an AdvancedConfiguring DNS Zones Controllers DirectAccess InfrastructureConfiguring DNS Zone Transfers Implementing Read-Only Domain Implementing VPNManaging and Troubleshooting DNS Controllers Implementing Web Application ProxyConfiguring DNS Resource Records Administering AD DS Verifying Readiness for a DirectAccessConfiguring DNS Conditional Forwarding Managing the AD DS Database DeploymentInstalling and Configuring DNS Zones Installing and Configuring a RODC Running the Getting Started WizardTroubleshooting DNS Create and administer AD DS Snapshots Validating the DirectAccess DeploymentOverview of AD DS Configuring the Active Directory Recycle Preparing the Environment forImplementing Virtualized Domain Controllers Bin DirectAccessImplementing Read-Only Domain Deploy a domain controller by using Implementing the Advanced DirectAccessControllers domain controller cloning InfrastructureAdministering AD DS Configuring Password Policy and User Validating the DirectAccess DeploymentManaging the AD DS Database Account Implementing VPNInstalling and Configuring a RODC Configuring Managed Service Accounts Validating the VPN DeploymentCreate and administer AD DS Snapshots Configuring Password Policy and Implementing Web Application ProxyConfiguring the Active Directory Recycle Bin Account Lockout Settings Validating the Web Application ProxyDeploy a domain controller by using domain Creating and Associating a Group Deploymentcontroller cloning Managed Service Account Installing and Configuring a Network PolicyConfiguring Password Policy and User Introducing Group Policy ServerAccount Implementing and Administering GPOs Configuring RADIUS Clients and ServersConfiguring Managed Service Accounts Group Policy Scope and Group Policy NPS Authentication MethodsConfiguring Password Policy and Account Processing Monitoring and Troubleshooting a NetworkLockout Settings Troubleshooting the Application of GPOs Policy ServerCreating and Associating a Group Managed Creating and Configuring GPOs Installing and Configuring NPS to SupportService Account Managing GPO Scope RADIUSIntroducing Group Policy Verify GPO Application Configuring and Testing a RADIUS ClientImplementing and Administering GPOs Managing GPOs Network Access Protection OverviewGroup Policy Scope and Group Policy Implementing Administrative Templates Configuring NAPProcessing Configuring Folder Redirection and Configuring IPSec Enforcement for NAPTroubleshooting the Application of GPOs Scripts Monitoring and Troubleshooting NAPCreating and Configuring GPOs Configuring Group Policy Preferences Configuring NAP with VPN EnforcementManaging GPO Scope Managing Software with Group Policy Validating the DeploymentVerify GPO Application Implement Settings Using Group Policy Configuring IPSec EnforcementManaging GPOs Preferences Validating the DeploymentImplementing Administrative Templates Managing Office 2013 by using Overview of FSRMConfiguring Folder Redirection and Scripts Administrative Templates Using FSRM to Manage Quotas, FileConfiguring Group Policy Preferences Deploying Software by using Group Screens, and Storage ReportsManaging Software with Group Policy Policy Implementing Classification ManagementImplement Settings Using Group Policy Configuring Folder Redirection and File Management TasksPreferences Module 6: Configuring and DFS OverviewManaging Office 2013 by using Troubleshooting Remote Access Configuring DFS NamespacesAdministrative Templates Remote Access Overview Configuring and Troubleshooting DFS-RDeploying Software by using Group Policy Implementing DirectAccess by Using the Configuring FSRM QuotasConfiguring Folder Redirection Getting Started Wizard Configuring File ScreeningModule 6: Configuring and Troubleshooting Implementing and Managing an Installing the DFS role serviceRemote Access Advanced DirectAccess Infrastructure Configuring a DFS NamespaceRemote Access Overview Implementing VPN Configuring DFS-RImplementing DirectAccess by Using the Implementing Web Application Proxy Module 10: Configuring Encryption andGetting Started Wizard Verifying Readiness for a DirectAccess Advanced AuditingImplementing and Managing an Advanced Deployment Encrypting Drives by Using BitLockerDirectAccess Infrastructure Running the Getting Started Wizard Encrypting Files by Using Encrypting FileImplementing VPN Validating the DirectAccess Deployment SystemImplementing Web Application Proxy Preparing the Environment for Configuring Advanced AuditingVerifying Readiness for a DirectAccess DirectAccess Securing Data Drives by Using BitLockerDeployment Implementing the Advanced Encrypting and Recovering FilesRunning the Getting Started Wizard DirectAccess Infrastructure Configuring Advanced Audit PolicyValidating the DirectAccess Deployment Validating the DirectAccess Deployment ConfigurationPreparing the Environment for DirectAccess Implementing VPN Overview of Windows DeploymentImplementing the Advanced DirectAccess Validating the VPN Deployment ServicesInfrastructure Implementing Web Application Proxy Managing Windows Deployment Images

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Validating the DirectAccess Deployment Validating the Web Application Proxy Implementing Deployment with WindowsImplementing VPN Deployment Deployment ServicesValidating the VPN Deployment Installing and Configuring a Network Administering Windows DeploymentImplementing Web Application Proxy Policy Server ServicesValidating the Web Application Proxy Configuring RADIUS Clients and Servers Installing and Configuring WindowsDeployment NPS Authentication Methods Deployment ServicesInstalling and Configuring a Network Policy Monitoring and Troubleshooting a Creating Operating System Images withServer Network Policy Server Windows Deployment ServicesConfiguring RADIUS Clients and Servers Installing and Configuring NPS to Configuring Custom Computer NamingNPS Authentication Methods Support RADIUS Deploying Images with WindowsMonitoring and Troubleshooting a Network Configuring and Testing a RADIUS Client Deployment ServicesPolicy Server Network Access Protection Overview Overview of WSUSInstalling and Configuring NPS to Support Configuring NAP Deploying Updates with WSUSRADIUS Configuring IPSec Enforcement for NAP Implementing the WSUS Server RoleConfiguring and Testing a RADIUS Client Monitoring and Troubleshooting NAP Configuring Update SettingsNetwork Access Protection Overview Configuring NAP with VPN Enforcement Approving and Deploying an Update byConfiguring NAP Validating the Deployment using WSUSConfiguring IPSec Enforcement for NAP Configuring IPSec Enforcement Monitoring ToolsMonitoring and Troubleshooting NAP Validating the Deployment Using Performance MonitorConfiguring NAP with VPN Enforcement Overview of FSRM Monitoring Event LogsValidating the Deployment Using FSRM to Manage Quotas, File Establishing a Performance BaselineConfiguring IPSec Enforcement Screens, and Storage Reports Identifying the Source of a PerformanceValidating the Deployment Implementing Classification Management ProblemOverview of FSRM and File Management Tasks Viewing and Configuring Centralized EventUsing FSRM to Manage Quotas, File DFS Overview LogsScreens, and Storage Reports Configuring DFS NamespacesImplementing Classification Management Configuring and Troubleshooting DFS-Rand File Management Tasks Configuring FSRM Quotas lineDFS Overview Configuring File Screening Configuring the DNS Server RoleConfiguring DFS Namespaces Installing the DFS role service Configuring DNS ZonesConfiguring and Troubleshooting DFS-R Configuring a DFS Namespace Configuring DNS Zone TransfersConfiguring FSRM Quotas Configuring DFS-R Managing and Troubleshooting DNSConfiguring File Screening Module 10: Configuring Encryption and Configuring DNS Resource RecordsInstalling the DFS role service Advanced Auditing Configuring DNS Conditional ForwardingConfiguring a DFS Namespace Encrypting Drives by Using BitLocker Installing and Configuring DNS ZonesConfiguring DFS-R Encrypting Files by Using Encrypting File Troubleshooting DNSModule 10: Configuring Encryption and System Overview of AD DSAdvanced Auditing Configuring Advanced Auditing Implementing Virtualized DomainEncrypting Drives by Using BitLocker Securing Data Drives by Using BitLocker ControllersEncrypting Files by Using Encrypting File Encrypting and Recovering Files Implementing Read-Only DomainSystem Configuring Advanced Audit Policy ControllersConfiguring Advanced Auditing Configuration Administering AD DSSecuring Data Drives by Using BitLocker Overview of Windows Deployment Managing the AD DS DatabaseEncrypting and Recovering Files Services Installing and Configuring a RODCConfiguring Advanced Audit Policy Managing Windows Deployment Images Create and administer AD DS SnapshotsConfiguration Implementing Deployment with Windows Configuring the Active Directory RecycleOverview of Windows Deployment Services Deployment Services BinManaging Windows Deployment Images Administering Windows Deployment Deploy a domain controller by usingImplementing Deployment with Windows Services domain controller cloningDeployment Services Installing and Configuring Windows Configuring Password Policy and UserAdministering Windows Deployment Deployment Services AccountServices Creating Operating System Images with Configuring Managed Service AccountsInstalling and Configuring Windows Windows Deployment Services Configuring Password Policy and AccountDeployment Services Configuring Custom Computer Naming Lockout SettingsCreating Operating System Images with Deploying Images with Windows Creating and Associating a GroupWindows Deployment Services Deployment Services Managed Service AccountConfiguring Custom Computer Naming Overview of WSUS Introducing Group PolicyDeploying Images with Windows Deploying Updates with WSUS Implementing and Administering GPOsDeployment Services Implementing the WSUS Server Role Group Policy Scope and Group PolicyOverview of WSUS Configuring Update Settings ProcessingDeploying Updates with WSUS Approving and Deploying an Update by Troubleshooting the Application of GPOsImplementing the WSUS Server Role using WSUS Creating and Configuring GPOsConfiguring Update Settings Monitoring Tools Managing GPO ScopeApproving and Deploying an Update by Using Performance Monitor Verify GPO Applicationusing WSUS Monitoring Event Logs Managing GPOsMonitoring Tools Establishing a Performance Baseline Implementing Administrative Templates

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Using Performance Monitor Identifying the Source of a Performance Configuring Folder Redirection and ScriptsMonitoring Event Logs Problem Configuring Group Policy PreferencesEstablishing a Performance Baseline Viewing and Configuring Centralized Managing Software with Group PolicyIdentifying the Source of a Performance Event Logs Implement Settings Using Group PolicyProblem PreferencesViewing and Configuring Centralized Event Module 7: Installing, Configuring, and Managing Office 2013 by usingLogs Troubleshooting the Network Policy Server Administrative Templates

Role Deploying Software by using Group PolicyLab : Managing User and Service Accounts line Configuring Folder Redirectionline Module 6: Configuring and

Troubleshooting Remote Accessline Remote Access Overview

line Configuring the DNS Server Role Implementing DirectAccess by Using theConfiguring the DNS Server Role Configuring DNS Zones Getting Started WizardConfiguring DNS Zones Configuring DNS Zone Transfers Implementing and Managing an AdvancedConfiguring DNS Zone Transfers Managing and Troubleshooting DNS DirectAccess InfrastructureManaging and Troubleshooting DNS Configuring DNS Resource Records Implementing VPNConfiguring DNS Resource Records Configuring DNS Conditional Forwarding Implementing Web Application ProxyConfiguring DNS Conditional Forwarding Installing and Configuring DNS Zones Verifying Readiness for a DirectAccessInstalling and Configuring DNS Zones Troubleshooting DNS DeploymentTroubleshooting DNS Overview of AD DS Running the Getting Started WizardOverview of AD DS Implementing Virtualized Domain Validating the DirectAccess DeploymentImplementing Virtualized Domain Controllers Controllers Preparing the Environment forImplementing Read-Only Domain Implementing Read-Only Domain DirectAccessControllers Controllers Implementing the Advanced DirectAccessAdministering AD DS Administering AD DS InfrastructureManaging the AD DS Database Managing the AD DS Database Validating the DirectAccess DeploymentInstalling and Configuring a RODC Installing and Configuring a RODC Implementing VPNCreate and administer AD DS Snapshots Create and administer AD DS Snapshots Validating the VPN DeploymentConfiguring the Active Directory Recycle Bin Configuring the Active Directory Recycle Implementing Web Application ProxyDeploy a domain controller by using domain Bin Validating the Web Application Proxycontroller cloning Deploy a domain controller by using DeploymentConfiguring Password Policy and User domain controller cloning Installing and Configuring a Network PolicyAccount Configuring Password Policy and User ServerConfiguring Managed Service Accounts Account Configuring RADIUS Clients and ServersConfiguring Password Policy and Account Configuring Managed Service Accounts NPS Authentication MethodsLockout Settings Configuring Password Policy and Monitoring and Troubleshooting a NetworkCreating and Associating a Group Managed Account Lockout Settings Policy ServerService Account Creating and Associating a Group Installing and Configuring NPS to SupportIntroducing Group Policy Managed Service Account RADIUSImplementing and Administering GPOs Introducing Group Policy Configuring and Testing a RADIUS ClientGroup Policy Scope and Group Policy Implementing and Administering GPOs Network Access Protection OverviewProcessing Group Policy Scope and Group Policy Configuring NAPTroubleshooting the Application of GPOs Processing Configuring IPSec Enforcement for NAPCreating and Configuring GPOs Troubleshooting the Application of GPOs Monitoring and Troubleshooting NAPManaging GPO Scope Creating and Configuring GPOs Configuring NAP with VPN EnforcementVerify GPO Application Managing GPO Scope Validating the DeploymentManaging GPOs Verify GPO Application Configuring IPSec EnforcementImplementing Administrative Templates Managing GPOs Validating the DeploymentConfiguring Folder Redirection and Scripts Implementing Administrative Templates Overview of FSRMConfiguring Group Policy Preferences Configuring Folder Redirection and Using FSRM to Manage Quotas, FileManaging Software with Group Policy Scripts Screens, and Storage ReportsImplement Settings Using Group Policy Configuring Group Policy Preferences Implementing Classification ManagementPreferences Managing Software with Group Policy and File Management TasksManaging Office 2013 by using Implement Settings Using Group Policy DFS OverviewAdministrative Templates Preferences Configuring DFS NamespacesDeploying Software by using Group Policy Managing Office 2013 by using Configuring and Troubleshooting DFS-RConfiguring Folder Redirection Administrative Templates Configuring FSRM QuotasModule 6: Configuring and Troubleshooting Deploying Software by using Group Configuring File ScreeningRemote Access Policy Installing the DFS role serviceRemote Access Overview Configuring Folder Redirection Configuring a DFS NamespaceImplementing DirectAccess by Using the Module 6: Configuring and Configuring DFS-RGetting Started Wizard Troubleshooting Remote Access Module 10: Configuring Encryption andImplementing and Managing an Advanced Remote Access Overview Advanced AuditingDirectAccess Infrastructure Implementing DirectAccess by Using the Encrypting Drives by Using BitLockerImplementing VPN Getting Started Wizard Encrypting Files by Using Encrypting File

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Implementing Web Application Proxy Implementing and Managing an SystemVerifying Readiness for a DirectAccess Advanced DirectAccess Infrastructure Configuring Advanced AuditingDeployment Implementing VPN Securing Data Drives by Using BitLockerRunning the Getting Started Wizard Implementing Web Application Proxy Encrypting and Recovering FilesValidating the DirectAccess Deployment Verifying Readiness for a DirectAccess Configuring Advanced Audit PolicyPreparing the Environment for DirectAccess Deployment ConfigurationImplementing the Advanced DirectAccess Running the Getting Started Wizard Overview of Windows DeploymentInfrastructure Validating the DirectAccess Deployment ServicesValidating the DirectAccess Deployment Preparing the Environment for Managing Windows Deployment ImagesImplementing VPN DirectAccess Implementing Deployment with WindowsValidating the VPN Deployment Implementing the Advanced Deployment ServicesImplementing Web Application Proxy DirectAccess Infrastructure Administering Windows DeploymentValidating the Web Application Proxy Validating the DirectAccess Deployment ServicesDeployment Implementing VPN Installing and Configuring WindowsInstalling and Configuring a Network Policy Validating the VPN Deployment Deployment ServicesServer Implementing Web Application Proxy Creating Operating System Images withConfiguring RADIUS Clients and Servers Validating the Web Application Proxy Windows Deployment ServicesNPS Authentication Methods Deployment Configuring Custom Computer NamingMonitoring and Troubleshooting a Network Installing and Configuring a Network Deploying Images with WindowsPolicy Server Policy Server Deployment ServicesInstalling and Configuring NPS to Support Configuring RADIUS Clients and Servers Overview of WSUSRADIUS NPS Authentication Methods Deploying Updates with WSUSConfiguring and Testing a RADIUS Client Monitoring and Troubleshooting a Implementing the WSUS Server RoleNetwork Access Protection Overview Network Policy Server Configuring Update SettingsConfiguring NAP Installing and Configuring NPS to Approving and Deploying an Update byConfiguring IPSec Enforcement for NAP Support RADIUS using WSUSMonitoring and Troubleshooting NAP Configuring and Testing a RADIUS Client Monitoring ToolsConfiguring NAP with VPN Enforcement Network Access Protection Overview Using Performance MonitorValidating the Deployment Configuring NAP Monitoring Event LogsConfiguring IPSec Enforcement Configuring IPSec Enforcement for NAP Establishing a Performance BaselineValidating the Deployment Monitoring and Troubleshooting NAP Identifying the Source of a PerformanceOverview of FSRM Configuring NAP with VPN Enforcement ProblemUsing FSRM to Manage Quotas, File Validating the Deployment Viewing and Configuring Centralized EventScreens, and Storage Reports Configuring IPSec Enforcement LogsImplementing Classification Management Validating the Deploymentand File Management Tasks Overview of FSRMDFS Overview Using FSRM to Manage Quotas, File lineConfiguring DFS Namespaces Screens, and Storage Reports Configuring the DNS Server RoleConfiguring and Troubleshooting DFS-R Implementing Classification Management Configuring DNS ZonesConfiguring FSRM Quotas and File Management Tasks Configuring DNS Zone TransfersConfiguring File Screening DFS Overview Managing and Troubleshooting DNSInstalling the DFS role service Configuring DFS Namespaces Configuring DNS Resource RecordsConfiguring a DFS Namespace Configuring and Troubleshooting DFS-R Configuring DNS Conditional ForwardingConfiguring DFS-R Configuring FSRM Quotas Installing and Configuring DNS ZonesModule 10: Configuring Encryption and Configuring File Screening Troubleshooting DNSAdvanced Auditing Installing the DFS role service Overview of AD DSEncrypting Drives by Using BitLocker Configuring a DFS Namespace Implementing Virtualized DomainEncrypting Files by Using Encrypting File Configuring DFS-R ControllersSystem Module 10: Configuring Encryption and Implementing Read-Only DomainConfiguring Advanced Auditing Advanced Auditing ControllersSecuring Data Drives by Using BitLocker Encrypting Drives by Using BitLocker Administering AD DSEncrypting and Recovering Files Encrypting Files by Using Encrypting File Managing the AD DS DatabaseConfiguring Advanced Audit Policy System Installing and Configuring a RODCConfiguration Configuring Advanced Auditing Create and administer AD DS SnapshotsOverview of Windows Deployment Services Securing Data Drives by Using BitLocker Configuring the Active Directory RecycleManaging Windows Deployment Images Encrypting and Recovering Files BinImplementing Deployment with Windows Configuring Advanced Audit Policy Deploy a domain controller by usingDeployment Services Configuration domain controller cloningAdministering Windows Deployment Overview of Windows Deployment Configuring Password Policy and UserServices Services AccountInstalling and Configuring Windows Managing Windows Deployment Images Configuring Managed Service AccountsDeployment Services Implementing Deployment with Windows Configuring Password Policy and AccountCreating Operating System Images with Deployment Services Lockout SettingsWindows Deployment Services Administering Windows Deployment Creating and Associating a GroupConfiguring Custom Computer Naming Services Managed Service AccountDeploying Images with Windows Installing and Configuring Windows Introducing Group Policy

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Deployment Services Deployment Services Implementing and Administering GPOsOverview of WSUS Creating Operating System Images with Group Policy Scope and Group PolicyDeploying Updates with WSUS Windows Deployment Services ProcessingImplementing the WSUS Server Role Configuring Custom Computer Naming Troubleshooting the Application of GPOsConfiguring Update Settings Deploying Images with Windows Creating and Configuring GPOsApproving and Deploying an Update by Deployment Services Managing GPO Scopeusing WSUS Overview of WSUS Verify GPO ApplicationMonitoring Tools Deploying Updates with WSUS Managing GPOsUsing Performance Monitor Implementing the WSUS Server Role Implementing Administrative TemplatesMonitoring Event Logs Configuring Update Settings Configuring Folder Redirection and ScriptsEstablishing a Performance Baseline Approving and Deploying an Update by Configuring Group Policy PreferencesIdentifying the Source of a Performance using WSUS Managing Software with Group PolicyProblem Monitoring Tools Implement Settings Using Group PolicyViewing and Configuring Centralized Event Using Performance Monitor PreferencesLogs Monitoring Event Logs Managing Office 2013 by using

Establishing a Performance Baseline Administrative TemplatesIdentifying the Source of a Performance Deploying Software by using Group Policy

line Problem Configuring Folder RedirectionConfiguring the DNS Server Role Viewing and Configuring Centralized Module 6: Configuring andConfiguring DNS Zones Event Logs Troubleshooting Remote AccessConfiguring DNS Zone Transfers Remote Access OverviewManaging and Troubleshooting DNS Implementing DirectAccess by Using theConfiguring DNS Resource Records line Getting Started WizardConfiguring DNS Conditional Forwarding Configuring the DNS Server Role Implementing and Managing an AdvancedInstalling and Configuring DNS Zones Configuring DNS Zones DirectAccess InfrastructureTroubleshooting DNS Configuring DNS Zone Transfers Implementing VPNOverview of AD DS Managing and Troubleshooting DNS Implementing Web Application ProxyImplementing Virtualized Domain Controllers Configuring DNS Resource Records Verifying Readiness for a DirectAccessImplementing Read-Only Domain Configuring DNS Conditional Forwarding DeploymentControllers Installing and Configuring DNS Zones Running the Getting Started WizardAdministering AD DS Troubleshooting DNS Validating the DirectAccess DeploymentManaging the AD DS Database Overview of AD DS Preparing the Environment forInstalling and Configuring a RODC Implementing Virtualized Domain DirectAccessCreate and administer AD DS Snapshots Controllers Implementing the Advanced DirectAccessConfiguring the Active Directory Recycle Bin Implementing Read-Only Domain InfrastructureDeploy a domain controller by using domain Controllers Validating the DirectAccess Deploymentcontroller cloning Administering AD DS Implementing VPNConfiguring Password Policy and User Managing the AD DS Database Validating the VPN DeploymentAccount Installing and Configuring a RODC Implementing Web Application ProxyConfiguring Managed Service Accounts Create and administer AD DS Snapshots Validating the Web Application ProxyConfiguring Password Policy and Account Configuring the Active Directory Recycle DeploymentLockout Settings Bin Installing and Configuring a Network PolicyCreating and Associating a Group Managed Deploy a domain controller by using ServerService Account domain controller cloning Configuring RADIUS Clients and ServersIntroducing Group Policy Configuring Password Policy and User NPS Authentication MethodsImplementing and Administering GPOs Account Monitoring and Troubleshooting a NetworkGroup Policy Scope and Group Policy Configuring Managed Service Accounts Policy ServerProcessing Configuring Password Policy and Installing and Configuring NPS to SupportTroubleshooting the Application of GPOs Account Lockout Settings RADIUSCreating and Configuring GPOs Creating and Associating a Group Configuring and Testing a RADIUS ClientManaging GPO Scope Managed Service Account Network Access Protection OverviewVerify GPO Application Introducing Group Policy Configuring NAPManaging GPOs Implementing and Administering GPOs Configuring IPSec Enforcement for NAPImplementing Administrative Templates Group Policy Scope and Group Policy Monitoring and Troubleshooting NAPConfiguring Folder Redirection and Scripts Processing Configuring NAP with VPN EnforcementConfiguring Group Policy Preferences Troubleshooting the Application of GPOs Validating the DeploymentManaging Software with Group Policy Creating and Configuring GPOs Configuring IPSec EnforcementImplement Settings Using Group Policy Managing GPO Scope Validating the DeploymentPreferences Verify GPO Application Overview of FSRMManaging Office 2013 by using Managing GPOs Using FSRM to Manage Quotas, FileAdministrative Templates Implementing Administrative Templates Screens, and Storage ReportsDeploying Software by using Group Policy Configuring Folder Redirection and Implementing Classification ManagementConfiguring Folder Redirection Scripts and File Management TasksModule 6: Configuring and Troubleshooting Configuring Group Policy Preferences DFS OverviewRemote Access Managing Software with Group Policy Configuring DFS NamespacesRemote Access Overview Implement Settings Using Group Policy Configuring and Troubleshooting DFS-R

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Implementing DirectAccess by Using the Preferences Configuring FSRM QuotasGetting Started Wizard Managing Office 2013 by using Configuring File ScreeningImplementing and Managing an Advanced Administrative Templates Installing the DFS role serviceDirectAccess Infrastructure Deploying Software by using Group Configuring a DFS NamespaceImplementing VPN Policy Configuring DFS-RImplementing Web Application Proxy Configuring Folder Redirection Module 10: Configuring Encryption andVerifying Readiness for a DirectAccess Module 6: Configuring and Advanced AuditingDeployment Troubleshooting Remote Access Encrypting Drives by Using BitLockerRunning the Getting Started Wizard Remote Access Overview Encrypting Files by Using Encrypting FileValidating the DirectAccess Deployment Implementing DirectAccess by Using the SystemPreparing the Environment for DirectAccess Getting Started Wizard Configuring Advanced AuditingImplementing the Advanced DirectAccess Implementing and Managing an Securing Data Drives by Using BitLockerInfrastructure Advanced DirectAccess Infrastructure Encrypting and Recovering FilesValidating the DirectAccess Deployment Implementing VPN Configuring Advanced Audit PolicyImplementing VPN Implementing Web Application Proxy ConfigurationValidating the VPN Deployment Verifying Readiness for a DirectAccess Overview of Windows DeploymentImplementing Web Application Proxy Deployment ServicesValidating the Web Application Proxy Running the Getting Started Wizard Managing Windows Deployment ImagesDeployment Validating the DirectAccess Deployment Implementing Deployment with WindowsInstalling and Configuring a Network Policy Preparing the Environment for Deployment ServicesServer DirectAccess Administering Windows DeploymentConfiguring RADIUS Clients and Servers Implementing the Advanced ServicesNPS Authentication Methods DirectAccess Infrastructure Installing and Configuring WindowsMonitoring and Troubleshooting a Network Validating the DirectAccess Deployment Deployment ServicesPolicy Server Implementing VPN Creating Operating System Images withInstalling and Configuring NPS to Support Validating the VPN Deployment Windows Deployment ServicesRADIUS Implementing Web Application Proxy Configuring Custom Computer NamingConfiguring and Testing a RADIUS Client Validating the Web Application Proxy Deploying Images with WindowsNetwork Access Protection Overview Deployment Deployment ServicesConfiguring NAP Installing and Configuring a Network Overview of WSUSConfiguring IPSec Enforcement for NAP Policy Server Deploying Updates with WSUSMonitoring and Troubleshooting NAP Configuring RADIUS Clients and Servers Implementing the WSUS Server RoleConfiguring NAP with VPN Enforcement NPS Authentication Methods Configuring Update SettingsValidating the Deployment Monitoring and Troubleshooting a Approving and Deploying an Update byConfiguring IPSec Enforcement Network Policy Server using WSUSValidating the Deployment Installing and Configuring NPS to Monitoring ToolsOverview of FSRM Support RADIUS Using Performance MonitorUsing FSRM to Manage Quotas, File Configuring and Testing a RADIUS Client Monitoring Event LogsScreens, and Storage Reports Network Access Protection Overview Establishing a Performance BaselineImplementing Classification Management Configuring NAP Identifying the Source of a Performanceand File Management Tasks Configuring IPSec Enforcement for NAP ProblemDFS Overview Monitoring and Troubleshooting NAP Viewing and Configuring Centralized EventConfiguring DFS Namespaces Configuring NAP with VPN Enforcement LogsConfiguring and Troubleshooting DFS-R Validating the DeploymentConfiguring FSRM Quotas Configuring IPSec Enforcement Lab : Using Windows Deployment Services toConfiguring File Screening Validating the Deployment Deploy Windows Server 2012Installing the DFS role service Overview of FSRM lineConfiguring a DFS Namespace Using FSRM to Manage Quotas, FileConfiguring DFS-R Screens, and Storage ReportsModule 10: Configuring Encryption and Implementing Classification Management lineAdvanced Auditing and File Management Tasks Configuring the DNS Server RoleEncrypting Drives by Using BitLocker DFS Overview Configuring DNS ZonesEncrypting Files by Using Encrypting File Configuring DFS Namespaces Configuring DNS Zone TransfersSystem Configuring and Troubleshooting DFS-R Managing and Troubleshooting DNSConfiguring Advanced Auditing Configuring FSRM Quotas Configuring DNS Resource RecordsSecuring Data Drives by Using BitLocker Configuring File Screening Configuring DNS Conditional ForwardingEncrypting and Recovering Files Installing the DFS role service Installing and Configuring DNS ZonesConfiguring Advanced Audit Policy Configuring a DFS Namespace Troubleshooting DNSConfiguration Configuring DFS-R Overview of AD DSOverview of Windows Deployment Services Module 10: Configuring Encryption and Implementing Virtualized DomainManaging Windows Deployment Images Advanced Auditing ControllersImplementing Deployment with Windows Encrypting Drives by Using BitLocker Implementing Read-Only DomainDeployment Services Encrypting Files by Using Encrypting File ControllersAdministering Windows Deployment System Administering AD DSServices Configuring Advanced Auditing Managing the AD DS DatabaseInstalling and Configuring Windows Securing Data Drives by Using BitLocker Installing and Configuring a RODC

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Deployment Services Encrypting and Recovering Files Create and administer AD DS SnapshotsCreating Operating System Images with Configuring Advanced Audit Policy Configuring the Active Directory RecycleWindows Deployment Services Configuration BinConfiguring Custom Computer Naming Overview of Windows Deployment Deploy a domain controller by usingDeploying Images with Windows Services domain controller cloningDeployment Services Managing Windows Deployment Images Configuring Password Policy and UserOverview of WSUS Implementing Deployment with Windows AccountDeploying Updates with WSUS Deployment Services Configuring Managed Service AccountsImplementing the WSUS Server Role Administering Windows Deployment Configuring Password Policy and AccountConfiguring Update Settings Services Lockout SettingsApproving and Deploying an Update by Installing and Configuring Windows Creating and Associating a Groupusing WSUS Deployment Services Managed Service AccountMonitoring Tools Creating Operating System Images with Introducing Group PolicyUsing Performance Monitor Windows Deployment Services Implementing and Administering GPOsMonitoring Event Logs Configuring Custom Computer Naming Group Policy Scope and Group PolicyEstablishing a Performance Baseline Deploying Images with Windows ProcessingIdentifying the Source of a Performance Deployment Services Troubleshooting the Application of GPOsProblem Overview of WSUS Creating and Configuring GPOsViewing and Configuring Centralized Event Deploying Updates with WSUS Managing GPO ScopeLogs Implementing the WSUS Server Role Verify GPO Application

Configuring Update Settings Managing GPOsApproving and Deploying an Update by Implementing Administrative Templates

line using WSUS Configuring Folder Redirection and ScriptsConfiguring the DNS Server Role Monitoring Tools Configuring Group Policy PreferencesConfiguring DNS Zones Using Performance Monitor Managing Software with Group PolicyConfiguring DNS Zone Transfers Monitoring Event Logs Implement Settings Using Group PolicyManaging and Troubleshooting DNS Establishing a Performance Baseline PreferencesConfiguring DNS Resource Records Identifying the Source of a Performance Managing Office 2013 by usingConfiguring DNS Conditional Forwarding Problem Administrative TemplatesInstalling and Configuring DNS Zones Viewing and Configuring Centralized Deploying Software by using Group PolicyTroubleshooting DNS Event Logs Configuring Folder RedirectionOverview of AD DS Module 6: Configuring andImplementing Virtualized Domain Controllers Troubleshooting Remote AccessImplementing Read-Only Domain line Remote Access OverviewControllers Configuring the DNS Server Role Implementing DirectAccess by Using theAdministering AD DS Configuring DNS Zones Getting Started WizardManaging the AD DS Database Configuring DNS Zone Transfers Implementing and Managing an AdvancedInstalling and Configuring a RODC Managing and Troubleshooting DNS DirectAccess InfrastructureCreate and administer AD DS Snapshots Configuring DNS Resource Records Implementing VPNConfiguring the Active Directory Recycle Bin Configuring DNS Conditional Forwarding Implementing Web Application ProxyDeploy a domain controller by using domain Installing and Configuring DNS Zones Verifying Readiness for a DirectAccesscontroller cloning Troubleshooting DNS DeploymentConfiguring Password Policy and User Overview of AD DS Running the Getting Started WizardAccount Implementing Virtualized Domain Validating the DirectAccess DeploymentConfiguring Managed Service Accounts Controllers Preparing the Environment forConfiguring Password Policy and Account Implementing Read-Only Domain DirectAccessLockout Settings Controllers Implementing the Advanced DirectAccessCreating and Associating a Group Managed Administering AD DS InfrastructureService Account Managing the AD DS Database Validating the DirectAccess DeploymentIntroducing Group Policy Installing and Configuring a RODC Implementing VPNImplementing and Administering GPOs Create and administer AD DS Snapshots Validating the VPN DeploymentGroup Policy Scope and Group Policy Configuring the Active Directory Recycle Implementing Web Application ProxyProcessing Bin Validating the Web Application ProxyTroubleshooting the Application of GPOs Deploy a domain controller by using DeploymentCreating and Configuring GPOs domain controller cloning Installing and Configuring a Network PolicyManaging GPO Scope Configuring Password Policy and User ServerVerify GPO Application Account Configuring RADIUS Clients and ServersManaging GPOs Configuring Managed Service Accounts NPS Authentication MethodsImplementing Administrative Templates Configuring Password Policy and Monitoring and Troubleshooting a NetworkConfiguring Folder Redirection and Scripts Account Lockout Settings Policy ServerConfiguring Group Policy Preferences Creating and Associating a Group Installing and Configuring NPS to SupportManaging Software with Group Policy Managed Service Account RADIUSImplement Settings Using Group Policy Introducing Group Policy Configuring and Testing a RADIUS ClientPreferences Implementing and Administering GPOs Network Access Protection OverviewManaging Office 2013 by using Group Policy Scope and Group Policy Configuring NAPAdministrative Templates Processing Configuring IPSec Enforcement for NAP

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Deploying Software by using Group Policy Troubleshooting the Application of GPOs Monitoring and Troubleshooting NAPConfiguring Folder Redirection Creating and Configuring GPOs Configuring NAP with VPN EnforcementModule 6: Configuring and Troubleshooting Managing GPO Scope Validating the DeploymentRemote Access Verify GPO Application Configuring IPSec EnforcementRemote Access Overview Managing GPOs Validating the DeploymentImplementing DirectAccess by Using the Implementing Administrative Templates Overview of FSRMGetting Started Wizard Configuring Folder Redirection and Using FSRM to Manage Quotas, FileImplementing and Managing an Advanced Scripts Screens, and Storage ReportsDirectAccess Infrastructure Configuring Group Policy Preferences Implementing Classification ManagementImplementing VPN Managing Software with Group Policy and File Management TasksImplementing Web Application Proxy Implement Settings Using Group Policy DFS OverviewVerifying Readiness for a DirectAccess Preferences Configuring DFS NamespacesDeployment Managing Office 2013 by using Configuring and Troubleshooting DFS-RRunning the Getting Started Wizard Administrative Templates Configuring FSRM QuotasValidating the DirectAccess Deployment Deploying Software by using Group Configuring File ScreeningPreparing the Environment for DirectAccess Policy Installing the DFS role serviceImplementing the Advanced DirectAccess Configuring Folder Redirection Configuring a DFS NamespaceInfrastructure Module 6: Configuring and Configuring DFS-RValidating the DirectAccess Deployment Troubleshooting Remote Access Module 10: Configuring Encryption andImplementing VPN Remote Access Overview Advanced AuditingValidating the VPN Deployment Implementing DirectAccess by Using the Encrypting Drives by Using BitLockerImplementing Web Application Proxy Getting Started Wizard Encrypting Files by Using Encrypting FileValidating the Web Application Proxy Implementing and Managing an SystemDeployment Advanced DirectAccess Infrastructure Configuring Advanced AuditingInstalling and Configuring a Network Policy Implementing VPN Securing Data Drives by Using BitLockerServer Implementing Web Application Proxy Encrypting and Recovering FilesConfiguring RADIUS Clients and Servers Verifying Readiness for a DirectAccess Configuring Advanced Audit PolicyNPS Authentication Methods Deployment ConfigurationMonitoring and Troubleshooting a Network Running the Getting Started Wizard Overview of Windows DeploymentPolicy Server Validating the DirectAccess Deployment ServicesInstalling and Configuring NPS to Support Preparing the Environment for Managing Windows Deployment ImagesRADIUS DirectAccess Implementing Deployment with WindowsConfiguring and Testing a RADIUS Client Implementing the Advanced Deployment ServicesNetwork Access Protection Overview DirectAccess Infrastructure Administering Windows DeploymentConfiguring NAP Validating the DirectAccess Deployment ServicesConfiguring IPSec Enforcement for NAP Implementing VPN Installing and Configuring WindowsMonitoring and Troubleshooting NAP Validating the VPN Deployment Deployment ServicesConfiguring NAP with VPN Enforcement Implementing Web Application Proxy Creating Operating System Images withValidating the Deployment Validating the Web Application Proxy Windows Deployment ServicesConfiguring IPSec Enforcement Deployment Configuring Custom Computer NamingValidating the Deployment Installing and Configuring a Network Deploying Images with WindowsOverview of FSRM Policy Server Deployment ServicesUsing FSRM to Manage Quotas, File Configuring RADIUS Clients and Servers Overview of WSUSScreens, and Storage Reports NPS Authentication Methods Deploying Updates with WSUSImplementing Classification Management Monitoring and Troubleshooting a Implementing the WSUS Server Roleand File Management Tasks Network Policy Server Configuring Update SettingsDFS Overview Installing and Configuring NPS to Approving and Deploying an Update byConfiguring DFS Namespaces Support RADIUS using WSUSConfiguring and Troubleshooting DFS-R Configuring and Testing a RADIUS Client Monitoring ToolsConfiguring FSRM Quotas Network Access Protection Overview Using Performance MonitorConfiguring File Screening Configuring NAP Monitoring Event LogsInstalling the DFS role service Configuring IPSec Enforcement for NAP Establishing a Performance BaselineConfiguring a DFS Namespace Monitoring and Troubleshooting NAP Identifying the Source of a PerformanceConfiguring DFS-R Configuring NAP with VPN Enforcement ProblemModule 10: Configuring Encryption and Validating the Deployment Viewing and Configuring Centralized EventAdvanced Auditing Configuring IPSec Enforcement LogsEncrypting Drives by Using BitLocker Validating the DeploymentEncrypting Files by Using Encrypting File Overview of FSRMSystem Using FSRM to Manage Quotas, File lineConfiguring Advanced Auditing Screens, and Storage Reports Configuring the DNS Server RoleSecuring Data Drives by Using BitLocker Implementing Classification Management Configuring DNS ZonesEncrypting and Recovering Files and File Management Tasks Configuring DNS Zone TransfersConfiguring Advanced Audit Policy DFS Overview Managing and Troubleshooting DNSConfiguration Configuring DFS Namespaces Configuring DNS Resource RecordsOverview of Windows Deployment Services Configuring and Troubleshooting DFS-R Configuring DNS Conditional ForwardingManaging Windows Deployment Images Configuring FSRM Quotas Installing and Configuring DNS Zones

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Implementing Deployment with Windows Configuring File Screening Troubleshooting DNSDeployment Services Installing the DFS role service Overview of AD DSAdministering Windows Deployment Configuring a DFS Namespace Implementing Virtualized DomainServices Configuring DFS-R ControllersInstalling and Configuring Windows Module 10: Configuring Encryption and Implementing Read-Only DomainDeployment Services Advanced Auditing ControllersCreating Operating System Images with Encrypting Drives by Using BitLocker Administering AD DSWindows Deployment Services Encrypting Files by Using Encrypting File Managing the AD DS DatabaseConfiguring Custom Computer Naming System Installing and Configuring a RODCDeploying Images with Windows Configuring Advanced Auditing Create and administer AD DS SnapshotsDeployment Services Securing Data Drives by Using BitLocker Configuring the Active Directory RecycleOverview of WSUS Encrypting and Recovering Files BinDeploying Updates with WSUS Configuring Advanced Audit Policy Deploy a domain controller by usingImplementing the WSUS Server Role Configuration domain controller cloningConfiguring Update Settings Overview of Windows Deployment Configuring Password Policy and UserApproving and Deploying an Update by Services Accountusing WSUS Managing Windows Deployment Images Configuring Managed Service AccountsMonitoring Tools Implementing Deployment with Windows Configuring Password Policy and AccountUsing Performance Monitor Deployment Services Lockout SettingsMonitoring Event Logs Administering Windows Deployment Creating and Associating a GroupEstablishing a Performance Baseline Services Managed Service AccountIdentifying the Source of a Performance Installing and Configuring Windows Introducing Group PolicyProblem Deployment Services Implementing and Administering GPOsViewing and Configuring Centralized Event Creating Operating System Images with Group Policy Scope and Group PolicyLogs Windows Deployment Services Processing

Configuring Custom Computer Naming Troubleshooting the Application of GPOsModule 4: Implementing a Group Policy Deploying Images with Windows Creating and Configuring GPOsInfrastructure Deployment Services Managing GPO Scopeline Overview of WSUS Verify GPO Application

Deploying Updates with WSUS Managing GPOsImplementing the WSUS Server Role Implementing Administrative Templates

line Configuring Update Settings Configuring Folder Redirection and ScriptsConfiguring the DNS Server Role Approving and Deploying an Update by Configuring Group Policy PreferencesConfiguring DNS Zones using WSUS Managing Software with Group PolicyConfiguring DNS Zone Transfers Monitoring Tools Implement Settings Using Group PolicyManaging and Troubleshooting DNS Using Performance Monitor PreferencesConfiguring DNS Resource Records Monitoring Event Logs Managing Office 2013 by usingConfiguring DNS Conditional Forwarding Establishing a Performance Baseline Administrative TemplatesInstalling and Configuring DNS Zones Identifying the Source of a Performance Deploying Software by using Group PolicyTroubleshooting DNS Problem Configuring Folder RedirectionOverview of AD DS Viewing and Configuring Centralized Module 6: Configuring andImplementing Virtualized Domain Controllers Event Logs Troubleshooting Remote AccessImplementing Read-Only Domain Remote Access OverviewControllers Implementing DirectAccess by Using theAdministering AD DS line Getting Started WizardManaging the AD DS Database Configuring the DNS Server Role Implementing and Managing an AdvancedInstalling and Configuring a RODC Configuring DNS Zones DirectAccess InfrastructureCreate and administer AD DS Snapshots Configuring DNS Zone Transfers Implementing VPNConfiguring the Active Directory Recycle Bin Managing and Troubleshooting DNS Implementing Web Application ProxyDeploy a domain controller by using domain Configuring DNS Resource Records Verifying Readiness for a DirectAccesscontroller cloning Configuring DNS Conditional Forwarding DeploymentConfiguring Password Policy and User Installing and Configuring DNS Zones Running the Getting Started WizardAccount Troubleshooting DNS Validating the DirectAccess DeploymentConfiguring Managed Service Accounts Overview of AD DS Preparing the Environment forConfiguring Password Policy and Account Implementing Virtualized Domain DirectAccessLockout Settings Controllers Implementing the Advanced DirectAccessCreating and Associating a Group Managed Implementing Read-Only Domain InfrastructureService Account Controllers Validating the DirectAccess DeploymentIntroducing Group Policy Administering AD DS Implementing VPNImplementing and Administering GPOs Managing the AD DS Database Validating the VPN DeploymentGroup Policy Scope and Group Policy Installing and Configuring a RODC Implementing Web Application ProxyProcessing Create and administer AD DS Snapshots Validating the Web Application ProxyTroubleshooting the Application of GPOs Configuring the Active Directory Recycle DeploymentCreating and Configuring GPOs Bin Installing and Configuring a Network PolicyManaging GPO Scope Deploy a domain controller by using ServerVerify GPO Application domain controller cloning Configuring RADIUS Clients and Servers

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Managing GPOs Configuring Password Policy and User NPS Authentication MethodsImplementing Administrative Templates Account Monitoring and Troubleshooting a NetworkConfiguring Folder Redirection and Scripts Configuring Managed Service Accounts Policy ServerConfiguring Group Policy Preferences Configuring Password Policy and Installing and Configuring NPS to SupportManaging Software with Group Policy Account Lockout Settings RADIUSImplement Settings Using Group Policy Creating and Associating a Group Configuring and Testing a RADIUS ClientPreferences Managed Service Account Network Access Protection OverviewManaging Office 2013 by using Introducing Group Policy Configuring NAPAdministrative Templates Implementing and Administering GPOs Configuring IPSec Enforcement for NAPDeploying Software by using Group Policy Group Policy Scope and Group Policy Monitoring and Troubleshooting NAPConfiguring Folder Redirection Processing Configuring NAP with VPN EnforcementModule 6: Configuring and Troubleshooting Troubleshooting the Application of GPOs Validating the DeploymentRemote Access Creating and Configuring GPOs Configuring IPSec EnforcementRemote Access Overview Managing GPO Scope Validating the DeploymentImplementing DirectAccess by Using the Verify GPO Application Overview of FSRMGetting Started Wizard Managing GPOs Using FSRM to Manage Quotas, FileImplementing and Managing an Advanced Implementing Administrative Templates Screens, and Storage ReportsDirectAccess Infrastructure Configuring Folder Redirection and Implementing Classification ManagementImplementing VPN Scripts and File Management TasksImplementing Web Application Proxy Configuring Group Policy Preferences DFS OverviewVerifying Readiness for a DirectAccess Managing Software with Group Policy Configuring DFS NamespacesDeployment Implement Settings Using Group Policy Configuring and Troubleshooting DFS-RRunning the Getting Started Wizard Preferences Configuring FSRM QuotasValidating the DirectAccess Deployment Managing Office 2013 by using Configuring File ScreeningPreparing the Environment for DirectAccess Administrative Templates Installing the DFS role serviceImplementing the Advanced DirectAccess Deploying Software by using Group Configuring a DFS NamespaceInfrastructure Policy Configuring DFS-RValidating the DirectAccess Deployment Configuring Folder Redirection Module 10: Configuring Encryption andImplementing VPN Module 6: Configuring and Advanced AuditingValidating the VPN Deployment Troubleshooting Remote Access Encrypting Drives by Using BitLockerImplementing Web Application Proxy Remote Access Overview Encrypting Files by Using Encrypting FileValidating the Web Application Proxy Implementing DirectAccess by Using the SystemDeployment Getting Started Wizard Configuring Advanced AuditingInstalling and Configuring a Network Policy Implementing and Managing an Securing Data Drives by Using BitLockerServer Advanced DirectAccess Infrastructure Encrypting and Recovering FilesConfiguring RADIUS Clients and Servers Implementing VPN Configuring Advanced Audit PolicyNPS Authentication Methods Implementing Web Application Proxy ConfigurationMonitoring and Troubleshooting a Network Verifying Readiness for a DirectAccess Overview of Windows DeploymentPolicy Server Deployment ServicesInstalling and Configuring NPS to Support Running the Getting Started Wizard Managing Windows Deployment ImagesRADIUS Validating the DirectAccess Deployment Implementing Deployment with WindowsConfiguring and Testing a RADIUS Client Preparing the Environment for Deployment ServicesNetwork Access Protection Overview DirectAccess Administering Windows DeploymentConfiguring NAP Implementing the Advanced ServicesConfiguring IPSec Enforcement for NAP DirectAccess Infrastructure Installing and Configuring WindowsMonitoring and Troubleshooting NAP Validating the DirectAccess Deployment Deployment ServicesConfiguring NAP with VPN Enforcement Implementing VPN Creating Operating System Images withValidating the Deployment Validating the VPN Deployment Windows Deployment ServicesConfiguring IPSec Enforcement Implementing Web Application Proxy Configuring Custom Computer NamingValidating the Deployment Validating the Web Application Proxy Deploying Images with WindowsOverview of FSRM Deployment Deployment ServicesUsing FSRM to Manage Quotas, File Installing and Configuring a Network Overview of WSUSScreens, and Storage Reports Policy Server Deploying Updates with WSUSImplementing Classification Management Configuring RADIUS Clients and Servers Implementing the WSUS Server Roleand File Management Tasks NPS Authentication Methods Configuring Update SettingsDFS Overview Monitoring and Troubleshooting a Approving and Deploying an Update byConfiguring DFS Namespaces Network Policy Server using WSUSConfiguring and Troubleshooting DFS-R Installing and Configuring NPS to Monitoring ToolsConfiguring FSRM Quotas Support RADIUS Using Performance MonitorConfiguring File Screening Configuring and Testing a RADIUS Client Monitoring Event LogsInstalling the DFS role service Network Access Protection Overview Establishing a Performance BaselineConfiguring a DFS Namespace Configuring NAP Identifying the Source of a PerformanceConfiguring DFS-R Configuring IPSec Enforcement for NAP ProblemModule 10: Configuring Encryption and Monitoring and Troubleshooting NAP Viewing and Configuring Centralized EventAdvanced Auditing Configuring NAP with VPN Enforcement LogsEncrypting Drives by Using BitLocker Validating the Deployment

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Encrypting Files by Using Encrypting File Configuring IPSec EnforcementSystem Validating the Deployment lineConfiguring Advanced Auditing Overview of FSRM Configuring the DNS Server RoleSecuring Data Drives by Using BitLocker Using FSRM to Manage Quotas, File Configuring DNS ZonesEncrypting and Recovering Files Screens, and Storage Reports Configuring DNS Zone TransfersConfiguring Advanced Audit Policy Implementing Classification Management Managing and Troubleshooting DNSConfiguration and File Management Tasks Configuring DNS Resource RecordsOverview of Windows Deployment Services DFS Overview Configuring DNS Conditional ForwardingManaging Windows Deployment Images Configuring DFS Namespaces Installing and Configuring DNS ZonesImplementing Deployment with Windows Configuring and Troubleshooting DFS-R Troubleshooting DNSDeployment Services Configuring FSRM Quotas Overview of AD DSAdministering Windows Deployment Configuring File Screening Implementing Virtualized DomainServices Installing the DFS role service ControllersInstalling and Configuring Windows Configuring a DFS Namespace Implementing Read-Only DomainDeployment Services Configuring DFS-R ControllersCreating Operating System Images with Module 10: Configuring Encryption and Administering AD DSWindows Deployment Services Advanced Auditing Managing the AD DS DatabaseConfiguring Custom Computer Naming Encrypting Drives by Using BitLocker Installing and Configuring a RODCDeploying Images with Windows Encrypting Files by Using Encrypting File Create and administer AD DS SnapshotsDeployment Services System Configuring the Active Directory RecycleOverview of WSUS Configuring Advanced Auditing BinDeploying Updates with WSUS Securing Data Drives by Using BitLocker Deploy a domain controller by usingImplementing the WSUS Server Role Encrypting and Recovering Files domain controller cloningConfiguring Update Settings Configuring Advanced Audit Policy Configuring Password Policy and UserApproving and Deploying an Update by Configuration Accountusing WSUS Overview of Windows Deployment Configuring Managed Service AccountsMonitoring Tools Services Configuring Password Policy and AccountUsing Performance Monitor Managing Windows Deployment Images Lockout SettingsMonitoring Event Logs Implementing Deployment with Windows Creating and Associating a GroupEstablishing a Performance Baseline Deployment Services Managed Service AccountIdentifying the Source of a Performance Administering Windows Deployment Introducing Group PolicyProblem Services Implementing and Administering GPOsViewing and Configuring Centralized Event Installing and Configuring Windows Group Policy Scope and Group PolicyLogs Deployment Services Processing

Creating Operating System Images with Troubleshooting the Application of GPOsWindows Deployment Services Creating and Configuring GPOs

line Configuring Custom Computer Naming Managing GPO ScopeConfiguring the DNS Server Role Deploying Images with Windows Verify GPO ApplicationConfiguring DNS Zones Deployment Services Managing GPOsConfiguring DNS Zone Transfers Overview of WSUS Implementing Administrative TemplatesManaging and Troubleshooting DNS Deploying Updates with WSUS Configuring Folder Redirection and ScriptsConfiguring DNS Resource Records Implementing the WSUS Server Role Configuring Group Policy PreferencesConfiguring DNS Conditional Forwarding Configuring Update Settings Managing Software with Group PolicyInstalling and Configuring DNS Zones Approving and Deploying an Update by Implement Settings Using Group PolicyTroubleshooting DNS using WSUS PreferencesOverview of AD DS Monitoring Tools Managing Office 2013 by usingImplementing Virtualized Domain Controllers Using Performance Monitor Administrative TemplatesImplementing Read-Only Domain Monitoring Event Logs Deploying Software by using Group PolicyControllers Establishing a Performance Baseline Configuring Folder RedirectionAdministering AD DS Identifying the Source of a Performance Module 6: Configuring andManaging the AD DS Database Problem Troubleshooting Remote AccessInstalling and Configuring a RODC Viewing and Configuring Centralized Remote Access OverviewCreate and administer AD DS Snapshots Event Logs Implementing DirectAccess by Using theConfiguring the Active Directory Recycle Bin Getting Started WizardDeploy a domain controller by using domain Implementing and Managing an Advancedcontroller cloning line DirectAccess InfrastructureConfiguring Password Policy and User Configuring the DNS Server Role Implementing VPNAccount Configuring DNS Zones Implementing Web Application ProxyConfiguring Managed Service Accounts Configuring DNS Zone Transfers Verifying Readiness for a DirectAccessConfiguring Password Policy and Account Managing and Troubleshooting DNS DeploymentLockout Settings Configuring DNS Resource Records Running the Getting Started WizardCreating and Associating a Group Managed Configuring DNS Conditional Forwarding Validating the DirectAccess DeploymentService Account Installing and Configuring DNS Zones Preparing the Environment forIntroducing Group Policy Troubleshooting DNS DirectAccessImplementing and Administering GPOs Overview of AD DS Implementing the Advanced DirectAccessGroup Policy Scope and Group Policy Implementing Virtualized Domain Infrastructure

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Processing Controllers Validating the DirectAccess DeploymentTroubleshooting the Application of GPOs Implementing Read-Only Domain Implementing VPNCreating and Configuring GPOs Controllers Validating the VPN DeploymentManaging GPO Scope Administering AD DS Implementing Web Application ProxyVerify GPO Application Managing the AD DS Database Validating the Web Application ProxyManaging GPOs Installing and Configuring a RODC DeploymentImplementing Administrative Templates Create and administer AD DS Snapshots Installing and Configuring a Network PolicyConfiguring Folder Redirection and Scripts Configuring the Active Directory Recycle ServerConfiguring Group Policy Preferences Bin Configuring RADIUS Clients and ServersManaging Software with Group Policy Deploy a domain controller by using NPS Authentication MethodsImplement Settings Using Group Policy domain controller cloning Monitoring and Troubleshooting a NetworkPreferences Configuring Password Policy and User Policy ServerManaging Office 2013 by using Account Installing and Configuring NPS to SupportAdministrative Templates Configuring Managed Service Accounts RADIUSDeploying Software by using Group Policy Configuring Password Policy and Configuring and Testing a RADIUS ClientConfiguring Folder Redirection Account Lockout Settings Network Access Protection OverviewModule 6: Configuring and Troubleshooting Creating and Associating a Group Configuring NAPRemote Access Managed Service Account Configuring IPSec Enforcement for NAPRemote Access Overview Introducing Group Policy Monitoring and Troubleshooting NAPImplementing DirectAccess by Using the Implementing and Administering GPOs Configuring NAP with VPN EnforcementGetting Started Wizard Group Policy Scope and Group Policy Validating the DeploymentImplementing and Managing an Advanced Processing Configuring IPSec EnforcementDirectAccess Infrastructure Troubleshooting the Application of GPOs Validating the DeploymentImplementing VPN Creating and Configuring GPOs Overview of FSRMImplementing Web Application Proxy Managing GPO Scope Using FSRM to Manage Quotas, FileVerifying Readiness for a DirectAccess Verify GPO Application Screens, and Storage ReportsDeployment Managing GPOs Implementing Classification ManagementRunning the Getting Started Wizard Implementing Administrative Templates and File Management TasksValidating the DirectAccess Deployment Configuring Folder Redirection and DFS OverviewPreparing the Environment for DirectAccess Scripts Configuring DFS NamespacesImplementing the Advanced DirectAccess Configuring Group Policy Preferences Configuring and Troubleshooting DFS-RInfrastructure Managing Software with Group Policy Configuring FSRM QuotasValidating the DirectAccess Deployment Implement Settings Using Group Policy Configuring File ScreeningImplementing VPN Preferences Installing the DFS role serviceValidating the VPN Deployment Managing Office 2013 by using Configuring a DFS NamespaceImplementing Web Application Proxy Administrative Templates Configuring DFS-RValidating the Web Application Proxy Deploying Software by using Group Module 10: Configuring Encryption andDeployment Policy Advanced AuditingInstalling and Configuring a Network Policy Configuring Folder Redirection Encrypting Drives by Using BitLockerServer Module 6: Configuring and Encrypting Files by Using Encrypting FileConfiguring RADIUS Clients and Servers Troubleshooting Remote Access SystemNPS Authentication Methods Remote Access Overview Configuring Advanced AuditingMonitoring and Troubleshooting a Network Implementing DirectAccess by Using the Securing Data Drives by Using BitLockerPolicy Server Getting Started Wizard Encrypting and Recovering FilesInstalling and Configuring NPS to Support Implementing and Managing an Configuring Advanced Audit PolicyRADIUS Advanced DirectAccess Infrastructure ConfigurationConfiguring and Testing a RADIUS Client Implementing VPN Overview of Windows DeploymentNetwork Access Protection Overview Implementing Web Application Proxy ServicesConfiguring NAP Verifying Readiness for a DirectAccess Managing Windows Deployment ImagesConfiguring IPSec Enforcement for NAP Deployment Implementing Deployment with WindowsMonitoring and Troubleshooting NAP Running the Getting Started Wizard Deployment ServicesConfiguring NAP with VPN Enforcement Validating the DirectAccess Deployment Administering Windows DeploymentValidating the Deployment Preparing the Environment for ServicesConfiguring IPSec Enforcement DirectAccess Installing and Configuring WindowsValidating the Deployment Implementing the Advanced Deployment ServicesOverview of FSRM DirectAccess Infrastructure Creating Operating System Images withUsing FSRM to Manage Quotas, File Validating the DirectAccess Deployment Windows Deployment ServicesScreens, and Storage Reports Implementing VPN Configuring Custom Computer NamingImplementing Classification Management Validating the VPN Deployment Deploying Images with Windowsand File Management Tasks Implementing Web Application Proxy Deployment ServicesDFS Overview Validating the Web Application Proxy Overview of WSUSConfiguring DFS Namespaces Deployment Deploying Updates with WSUSConfiguring and Troubleshooting DFS-R Installing and Configuring a Network Implementing the WSUS Server RoleConfiguring FSRM Quotas Policy Server Configuring Update SettingsConfiguring File Screening Configuring RADIUS Clients and Servers Approving and Deploying an Update byInstalling the DFS role service NPS Authentication Methods using WSUS

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Configuring a DFS Namespace Monitoring and Troubleshooting a Monitoring ToolsConfiguring DFS-R Network Policy Server Using Performance MonitorModule 10: Configuring Encryption and Installing and Configuring NPS to Monitoring Event LogsAdvanced Auditing Support RADIUS Establishing a Performance BaselineEncrypting Drives by Using BitLocker Configuring and Testing a RADIUS Client Identifying the Source of a PerformanceEncrypting Files by Using Encrypting File Network Access Protection Overview ProblemSystem Configuring NAP Viewing and Configuring Centralized EventConfiguring Advanced Auditing Configuring IPSec Enforcement for NAP LogsSecuring Data Drives by Using BitLocker Monitoring and Troubleshooting NAPEncrypting and Recovering Files Configuring NAP with VPN EnforcementConfiguring Advanced Audit Policy Validating the Deployment lineConfiguration Configuring IPSec Enforcement Configuring the DNS Server RoleOverview of Windows Deployment Services Validating the Deployment Configuring DNS ZonesManaging Windows Deployment Images Overview of FSRM Configuring DNS Zone TransfersImplementing Deployment with Windows Using FSRM to Manage Quotas, File Managing and Troubleshooting DNSDeployment Services Screens, and Storage Reports Configuring DNS Resource RecordsAdministering Windows Deployment Implementing Classification Management Configuring DNS Conditional ForwardingServices and File Management Tasks Installing and Configuring DNS ZonesInstalling and Configuring Windows DFS Overview Troubleshooting DNSDeployment Services Configuring DFS Namespaces Overview of AD DSCreating Operating System Images with Configuring and Troubleshooting DFS-R Implementing Virtualized DomainWindows Deployment Services Configuring FSRM Quotas ControllersConfiguring Custom Computer Naming Configuring File Screening Implementing Read-Only DomainDeploying Images with Windows Installing the DFS role service ControllersDeployment Services Configuring a DFS Namespace Administering AD DSOverview of WSUS Configuring DFS-R Managing the AD DS DatabaseDeploying Updates with WSUS Module 10: Configuring Encryption and Installing and Configuring a RODCImplementing the WSUS Server Role Advanced Auditing Create and administer AD DS SnapshotsConfiguring Update Settings Encrypting Drives by Using BitLocker Configuring the Active Directory RecycleApproving and Deploying an Update by Encrypting Files by Using Encrypting File Binusing WSUS System Deploy a domain controller by usingMonitoring Tools Configuring Advanced Auditing domain controller cloningUsing Performance Monitor Securing Data Drives by Using BitLocker Configuring Password Policy and UserMonitoring Event Logs Encrypting and Recovering Files AccountEstablishing a Performance Baseline Configuring Advanced Audit Policy Configuring Managed Service AccountsIdentifying the Source of a Performance Configuration Configuring Password Policy and AccountProblem Overview of Windows Deployment Lockout SettingsViewing and Configuring Centralized Event Services Creating and Associating a GroupLogs Managing Windows Deployment Images Managed Service Account

Implementing Deployment with Windows Introducing Group PolicyDeployment Services Implementing and Administering GPOs

line Administering Windows Deployment Group Policy Scope and Group PolicyConfiguring the DNS Server Role Services ProcessingConfiguring DNS Zones Installing and Configuring Windows Troubleshooting the Application of GPOsConfiguring DNS Zone Transfers Deployment Services Creating and Configuring GPOsManaging and Troubleshooting DNS Creating Operating System Images with Managing GPO ScopeConfiguring DNS Resource Records Windows Deployment Services Verify GPO ApplicationConfiguring DNS Conditional Forwarding Configuring Custom Computer Naming Managing GPOsInstalling and Configuring DNS Zones Deploying Images with Windows Implementing Administrative TemplatesTroubleshooting DNS Deployment Services Configuring Folder Redirection and ScriptsOverview of AD DS Overview of WSUS Configuring Group Policy PreferencesImplementing Virtualized Domain Controllers Deploying Updates with WSUS Managing Software with Group PolicyImplementing Read-Only Domain Implementing the WSUS Server Role Implement Settings Using Group PolicyControllers Configuring Update Settings PreferencesAdministering AD DS Approving and Deploying an Update by Managing Office 2013 by usingManaging the AD DS Database using WSUS Administrative TemplatesInstalling and Configuring a RODC Monitoring Tools Deploying Software by using Group PolicyCreate and administer AD DS Snapshots Using Performance Monitor Configuring Folder RedirectionConfiguring the Active Directory Recycle Bin Monitoring Event Logs Module 6: Configuring andDeploy a domain controller by using domain Establishing a Performance Baseline Troubleshooting Remote Accesscontroller cloning Identifying the Source of a Performance Remote Access OverviewConfiguring Password Policy and User Problem Implementing DirectAccess by Using theAccount Viewing and Configuring Centralized Getting Started WizardConfiguring Managed Service Accounts Event Logs Implementing and Managing an AdvancedConfiguring Password Policy and Account DirectAccess InfrastructureLockout Settings Lab : Installing and Configuring a Network Implementing VPN

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Creating and Associating a Group Managed Policy Server Implementing Web Application ProxyService Account line Verifying Readiness for a DirectAccessIntroducing Group Policy DeploymentImplementing and Administering GPOs Running the Getting Started WizardGroup Policy Scope and Group Policy line Validating the DirectAccess DeploymentProcessing Configuring the DNS Server Role Preparing the Environment forTroubleshooting the Application of GPOs Configuring DNS Zones DirectAccessCreating and Configuring GPOs Configuring DNS Zone Transfers Implementing the Advanced DirectAccessManaging GPO Scope Managing and Troubleshooting DNS InfrastructureVerify GPO Application Configuring DNS Resource Records Validating the DirectAccess DeploymentManaging GPOs Configuring DNS Conditional Forwarding Implementing VPNImplementing Administrative Templates Installing and Configuring DNS Zones Validating the VPN DeploymentConfiguring Folder Redirection and Scripts Troubleshooting DNS Implementing Web Application ProxyConfiguring Group Policy Preferences Overview of AD DS Validating the Web Application ProxyManaging Software with Group Policy Implementing Virtualized Domain DeploymentImplement Settings Using Group Policy Controllers Installing and Configuring a Network PolicyPreferences Implementing Read-Only Domain ServerManaging Office 2013 by using Controllers Configuring RADIUS Clients and ServersAdministrative Templates Administering AD DS NPS Authentication MethodsDeploying Software by using Group Policy Managing the AD DS Database Monitoring and Troubleshooting a NetworkConfiguring Folder Redirection Installing and Configuring a RODC Policy ServerModule 6: Configuring and Troubleshooting Create and administer AD DS Snapshots Installing and Configuring NPS to SupportRemote Access Configuring the Active Directory Recycle RADIUSRemote Access Overview Bin Configuring and Testing a RADIUS ClientImplementing DirectAccess by Using the Deploy a domain controller by using Network Access Protection OverviewGetting Started Wizard domain controller cloning Configuring NAPImplementing and Managing an Advanced Configuring Password Policy and User Configuring IPSec Enforcement for NAPDirectAccess Infrastructure Account Monitoring and Troubleshooting NAPImplementing VPN Configuring Managed Service Accounts Configuring NAP with VPN EnforcementImplementing Web Application Proxy Configuring Password Policy and Validating the DeploymentVerifying Readiness for a DirectAccess Account Lockout Settings Configuring IPSec EnforcementDeployment Creating and Associating a Group Validating the DeploymentRunning the Getting Started Wizard Managed Service Account Overview of FSRMValidating the DirectAccess Deployment Introducing Group Policy Using FSRM to Manage Quotas, FilePreparing the Environment for DirectAccess Implementing and Administering GPOs Screens, and Storage ReportsImplementing the Advanced DirectAccess Group Policy Scope and Group Policy Implementing Classification ManagementInfrastructure Processing and File Management TasksValidating the DirectAccess Deployment Troubleshooting the Application of GPOs DFS OverviewImplementing VPN Creating and Configuring GPOs Configuring DFS NamespacesValidating the VPN Deployment Managing GPO Scope Configuring and Troubleshooting DFS-RImplementing Web Application Proxy Verify GPO Application Configuring FSRM QuotasValidating the Web Application Proxy Managing GPOs Configuring File ScreeningDeployment Implementing Administrative Templates Installing the DFS role serviceInstalling and Configuring a Network Policy Configuring Folder Redirection and Configuring a DFS NamespaceServer Scripts Configuring DFS-RConfiguring RADIUS Clients and Servers Configuring Group Policy Preferences Module 10: Configuring Encryption andNPS Authentication Methods Managing Software with Group Policy Advanced AuditingMonitoring and Troubleshooting a Network Implement Settings Using Group Policy Encrypting Drives by Using BitLockerPolicy Server Preferences Encrypting Files by Using Encrypting FileInstalling and Configuring NPS to Support Managing Office 2013 by using SystemRADIUS Administrative Templates Configuring Advanced AuditingConfiguring and Testing a RADIUS Client Deploying Software by using Group Securing Data Drives by Using BitLockerNetwork Access Protection Overview Policy Encrypting and Recovering FilesConfiguring NAP Configuring Folder Redirection Configuring Advanced Audit PolicyConfiguring IPSec Enforcement for NAP Module 6: Configuring and ConfigurationMonitoring and Troubleshooting NAP Troubleshooting Remote Access Overview of Windows DeploymentConfiguring NAP with VPN Enforcement Remote Access Overview ServicesValidating the Deployment Implementing DirectAccess by Using the Managing Windows Deployment ImagesConfiguring IPSec Enforcement Getting Started Wizard Implementing Deployment with WindowsValidating the Deployment Implementing and Managing an Deployment ServicesOverview of FSRM Advanced DirectAccess Infrastructure Administering Windows DeploymentUsing FSRM to Manage Quotas, File Implementing VPN ServicesScreens, and Storage Reports Implementing Web Application Proxy Installing and Configuring WindowsImplementing Classification Management Verifying Readiness for a DirectAccess Deployment Servicesand File Management Tasks Deployment Creating Operating System Images withDFS Overview Running the Getting Started Wizard Windows Deployment Services

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Configuring DFS Namespaces Validating the DirectAccess Deployment Configuring Custom Computer NamingConfiguring and Troubleshooting DFS-R Preparing the Environment for Deploying Images with WindowsConfiguring FSRM Quotas DirectAccess Deployment ServicesConfiguring File Screening Implementing the Advanced Overview of WSUSInstalling the DFS role service DirectAccess Infrastructure Deploying Updates with WSUSConfiguring a DFS Namespace Validating the DirectAccess Deployment Implementing the WSUS Server RoleConfiguring DFS-R Implementing VPN Configuring Update SettingsModule 10: Configuring Encryption and Validating the VPN Deployment Approving and Deploying an Update byAdvanced Auditing Implementing Web Application Proxy using WSUSEncrypting Drives by Using BitLocker Validating the Web Application Proxy Monitoring ToolsEncrypting Files by Using Encrypting File Deployment Using Performance MonitorSystem Installing and Configuring a Network Monitoring Event LogsConfiguring Advanced Auditing Policy Server Establishing a Performance BaselineSecuring Data Drives by Using BitLocker Configuring RADIUS Clients and Servers Identifying the Source of a PerformanceEncrypting and Recovering Files NPS Authentication Methods ProblemConfiguring Advanced Audit Policy Monitoring and Troubleshooting a Viewing and Configuring Centralized EventConfiguration Network Policy Server LogsOverview of Windows Deployment Services Installing and Configuring NPS toManaging Windows Deployment Images Support RADIUSImplementing Deployment with Windows Configuring and Testing a RADIUS Client lineDeployment Services Network Access Protection Overview Configuring the DNS Server RoleAdministering Windows Deployment Configuring NAP Configuring DNS ZonesServices Configuring IPSec Enforcement for NAP Configuring DNS Zone TransfersInstalling and Configuring Windows Monitoring and Troubleshooting NAP Managing and Troubleshooting DNSDeployment Services Configuring NAP with VPN Enforcement Configuring DNS Resource RecordsCreating Operating System Images with Validating the Deployment Configuring DNS Conditional ForwardingWindows Deployment Services Configuring IPSec Enforcement Installing and Configuring DNS ZonesConfiguring Custom Computer Naming Validating the Deployment Troubleshooting DNSDeploying Images with Windows Overview of FSRM Overview of AD DSDeployment Services Using FSRM to Manage Quotas, File Implementing Virtualized DomainOverview of WSUS Screens, and Storage Reports ControllersDeploying Updates with WSUS Implementing Classification Management Implementing Read-Only DomainImplementing the WSUS Server Role and File Management Tasks ControllersConfiguring Update Settings DFS Overview Administering AD DSApproving and Deploying an Update by Configuring DFS Namespaces Managing the AD DS Databaseusing WSUS Configuring and Troubleshooting DFS-R Installing and Configuring a RODCMonitoring Tools Configuring FSRM Quotas Create and administer AD DS SnapshotsUsing Performance Monitor Configuring File Screening Configuring the Active Directory RecycleMonitoring Event Logs Installing the DFS role service BinEstablishing a Performance Baseline Configuring a DFS Namespace Deploy a domain controller by usingIdentifying the Source of a Performance Configuring DFS-R domain controller cloningProblem Module 10: Configuring Encryption and Configuring Password Policy and UserViewing and Configuring Centralized Event Advanced Auditing AccountLogs Encrypting Drives by Using BitLocker Configuring Managed Service Accounts

Encrypting Files by Using Encrypting File Configuring Password Policy and AccountSystem Lockout Settings

line Configuring Advanced Auditing Creating and Associating a GroupConfiguring the DNS Server Role Securing Data Drives by Using BitLocker Managed Service AccountConfiguring DNS Zones Encrypting and Recovering Files Introducing Group PolicyConfiguring DNS Zone Transfers Configuring Advanced Audit Policy Implementing and Administering GPOsManaging and Troubleshooting DNS Configuration Group Policy Scope and Group PolicyConfiguring DNS Resource Records Overview of Windows Deployment ProcessingConfiguring DNS Conditional Forwarding Services Troubleshooting the Application of GPOsInstalling and Configuring DNS Zones Managing Windows Deployment Images Creating and Configuring GPOsTroubleshooting DNS Implementing Deployment with Windows Managing GPO ScopeOverview of AD DS Deployment Services Verify GPO ApplicationImplementing Virtualized Domain Controllers Administering Windows Deployment Managing GPOsImplementing Read-Only Domain Services Implementing Administrative TemplatesControllers Installing and Configuring Windows Configuring Folder Redirection and ScriptsAdministering AD DS Deployment Services Configuring Group Policy PreferencesManaging the AD DS Database Creating Operating System Images with Managing Software with Group PolicyInstalling and Configuring a RODC Windows Deployment Services Implement Settings Using Group PolicyCreate and administer AD DS Snapshots Configuring Custom Computer Naming PreferencesConfiguring the Active Directory Recycle Bin Deploying Images with Windows Managing Office 2013 by usingDeploy a domain controller by using domain Deployment Services Administrative Templatescontroller cloning Overview of WSUS Deploying Software by using Group Policy

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Configuring Password Policy and User Deploying Updates with WSUS Configuring Folder RedirectionAccount Implementing the WSUS Server Role Module 6: Configuring andConfiguring Managed Service Accounts Configuring Update Settings Troubleshooting Remote AccessConfiguring Password Policy and Account Approving and Deploying an Update by Remote Access OverviewLockout Settings using WSUS Implementing DirectAccess by Using theCreating and Associating a Group Managed Monitoring Tools Getting Started WizardService Account Using Performance Monitor Implementing and Managing an AdvancedIntroducing Group Policy Monitoring Event Logs DirectAccess InfrastructureImplementing and Administering GPOs Establishing a Performance Baseline Implementing VPNGroup Policy Scope and Group Policy Identifying the Source of a Performance Implementing Web Application ProxyProcessing Problem Verifying Readiness for a DirectAccessTroubleshooting the Application of GPOs Viewing and Configuring Centralized DeploymentCreating and Configuring GPOs Event Logs Running the Getting Started WizardManaging GPO Scope Validating the DirectAccess DeploymentVerify GPO Application Preparing the Environment forManaging GPOs line DirectAccessImplementing Administrative Templates Configuring the DNS Server Role Implementing the Advanced DirectAccessConfiguring Folder Redirection and Scripts Configuring DNS Zones InfrastructureConfiguring Group Policy Preferences Configuring DNS Zone Transfers Validating the DirectAccess DeploymentManaging Software with Group Policy Managing and Troubleshooting DNS Implementing VPNImplement Settings Using Group Policy Configuring DNS Resource Records Validating the VPN DeploymentPreferences Configuring DNS Conditional Forwarding Implementing Web Application ProxyManaging Office 2013 by using Installing and Configuring DNS Zones Validating the Web Application ProxyAdministrative Templates Troubleshooting DNS DeploymentDeploying Software by using Group Policy Overview of AD DS Installing and Configuring a Network PolicyConfiguring Folder Redirection Implementing Virtualized Domain ServerModule 6: Configuring and Troubleshooting Controllers Configuring RADIUS Clients and ServersRemote Access Implementing Read-Only Domain NPS Authentication MethodsRemote Access Overview Controllers Monitoring and Troubleshooting a NetworkImplementing DirectAccess by Using the Administering AD DS Policy ServerGetting Started Wizard Managing the AD DS Database Installing and Configuring NPS to SupportImplementing and Managing an Advanced Installing and Configuring a RODC RADIUSDirectAccess Infrastructure Create and administer AD DS Snapshots Configuring and Testing a RADIUS ClientImplementing VPN Configuring the Active Directory Recycle Network Access Protection OverviewImplementing Web Application Proxy Bin Configuring NAPVerifying Readiness for a DirectAccess Deploy a domain controller by using Configuring IPSec Enforcement for NAPDeployment domain controller cloning Monitoring and Troubleshooting NAPRunning the Getting Started Wizard Configuring Password Policy and User Configuring NAP with VPN EnforcementValidating the DirectAccess Deployment Account Validating the DeploymentPreparing the Environment for DirectAccess Configuring Managed Service Accounts Configuring IPSec EnforcementImplementing the Advanced DirectAccess Configuring Password Policy and Validating the DeploymentInfrastructure Account Lockout Settings Overview of FSRMValidating the DirectAccess Deployment Creating and Associating a Group Using FSRM to Manage Quotas, FileImplementing VPN Managed Service Account Screens, and Storage ReportsValidating the VPN Deployment Introducing Group Policy Implementing Classification ManagementImplementing Web Application Proxy Implementing and Administering GPOs and File Management TasksValidating the Web Application Proxy Group Policy Scope and Group Policy DFS OverviewDeployment Processing Configuring DFS NamespacesInstalling and Configuring a Network Policy Troubleshooting the Application of GPOs Configuring and Troubleshooting DFS-RServer Creating and Configuring GPOs Configuring FSRM QuotasConfiguring RADIUS Clients and Servers Managing GPO Scope Configuring File ScreeningNPS Authentication Methods Verify GPO Application Installing the DFS role serviceMonitoring and Troubleshooting a Network Managing GPOs Configuring a DFS NamespacePolicy Server Implementing Administrative Templates Configuring DFS-RInstalling and Configuring NPS to Support Configuring Folder Redirection and Module 10: Configuring Encryption andRADIUS Scripts Advanced AuditingConfiguring and Testing a RADIUS Client Configuring Group Policy Preferences Encrypting Drives by Using BitLockerNetwork Access Protection Overview Managing Software with Group Policy Encrypting Files by Using Encrypting FileConfiguring NAP Implement Settings Using Group Policy SystemConfiguring IPSec Enforcement for NAP Preferences Configuring Advanced AuditingMonitoring and Troubleshooting NAP Managing Office 2013 by using Securing Data Drives by Using BitLockerConfiguring NAP with VPN Enforcement Administrative Templates Encrypting and Recovering FilesValidating the Deployment Deploying Software by using Group Configuring Advanced Audit PolicyConfiguring IPSec Enforcement Policy ConfigurationValidating the Deployment Configuring Folder Redirection Overview of Windows DeploymentOverview of FSRM Module 6: Configuring and Services

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Using FSRM to Manage Quotas, File Troubleshooting Remote Access Managing Windows Deployment ImagesScreens, and Storage Reports Remote Access Overview Implementing Deployment with WindowsImplementing Classification Management Implementing DirectAccess by Using the Deployment Servicesand File Management Tasks Getting Started Wizard Administering Windows DeploymentDFS Overview Implementing and Managing an ServicesConfiguring DFS Namespaces Advanced DirectAccess Infrastructure Installing and Configuring WindowsConfiguring and Troubleshooting DFS-R Implementing VPN Deployment ServicesConfiguring FSRM Quotas Implementing Web Application Proxy Creating Operating System Images withConfiguring File Screening Verifying Readiness for a DirectAccess Windows Deployment ServicesInstalling the DFS role service Deployment Configuring Custom Computer NamingConfiguring a DFS Namespace Running the Getting Started Wizard Deploying Images with WindowsConfiguring DFS-R Validating the DirectAccess Deployment Deployment ServicesModule 10: Configuring Encryption and Preparing the Environment for Overview of WSUSAdvanced Auditing DirectAccess Deploying Updates with WSUSEncrypting Drives by Using BitLocker Implementing the Advanced Implementing the WSUS Server RoleEncrypting Files by Using Encrypting File DirectAccess Infrastructure Configuring Update SettingsSystem Validating the DirectAccess Deployment Approving and Deploying an Update byConfiguring Advanced Auditing Implementing VPN using WSUSSecuring Data Drives by Using BitLocker Validating the VPN Deployment Monitoring ToolsEncrypting and Recovering Files Implementing Web Application Proxy Using Performance MonitorConfiguring Advanced Audit Policy Validating the Web Application Proxy Monitoring Event LogsConfiguration Deployment Establishing a Performance BaselineOverview of Windows Deployment Services Installing and Configuring a Network Identifying the Source of a PerformanceManaging Windows Deployment Images Policy Server ProblemImplementing Deployment with Windows Configuring RADIUS Clients and Servers Viewing and Configuring Centralized EventDeployment Services NPS Authentication Methods LogsAdministering Windows Deployment Monitoring and Troubleshooting aServices Network Policy Server Module 12: Implementing UpdateInstalling and Configuring Windows Installing and Configuring NPS to ManagementDeployment Services Support RADIUS lineCreating Operating System Images with Configuring and Testing a RADIUS ClientWindows Deployment Services Network Access Protection OverviewConfiguring Custom Computer Naming Configuring NAP lineDeploying Images with Windows Configuring IPSec Enforcement for NAP Configuring the DNS Server RoleDeployment Services Monitoring and Troubleshooting NAP Configuring DNS ZonesOverview of WSUS Configuring NAP with VPN Enforcement Configuring DNS Zone TransfersDeploying Updates with WSUS Validating the Deployment Managing and Troubleshooting DNSImplementing the WSUS Server Role Configuring IPSec Enforcement Configuring DNS Resource RecordsConfiguring Update Settings Validating the Deployment Configuring DNS Conditional ForwardingApproving and Deploying an Update by Overview of FSRM Installing and Configuring DNS Zonesusing WSUS Using FSRM to Manage Quotas, File Troubleshooting DNSMonitoring Tools Screens, and Storage Reports Overview of AD DSUsing Performance Monitor Implementing Classification Management Implementing Virtualized DomainMonitoring Event Logs and File Management Tasks ControllersEstablishing a Performance Baseline DFS Overview Implementing Read-Only DomainIdentifying the Source of a Performance Configuring DFS Namespaces ControllersProblem Configuring and Troubleshooting DFS-R Administering AD DSViewing and Configuring Centralized Event Configuring FSRM Quotas Managing the AD DS DatabaseLogs Configuring File Screening Installing and Configuring a RODC

Installing the DFS role service Create and administer AD DS SnapshotsConfiguring a DFS Namespace Configuring the Active Directory Recycle

line Configuring DFS-R BinConfiguring the DNS Server Role Module 10: Configuring Encryption and Deploy a domain controller by usingConfiguring DNS Zones Advanced Auditing domain controller cloningConfiguring DNS Zone Transfers Encrypting Drives by Using BitLocker Configuring Password Policy and UserManaging and Troubleshooting DNS Encrypting Files by Using Encrypting File AccountConfiguring DNS Resource Records System Configuring Managed Service AccountsConfiguring DNS Conditional Forwarding Configuring Advanced Auditing Configuring Password Policy and AccountInstalling and Configuring DNS Zones Securing Data Drives by Using BitLocker Lockout SettingsTroubleshooting DNS Encrypting and Recovering Files Creating and Associating a GroupOverview of AD DS Configuring Advanced Audit Policy Managed Service AccountImplementing Virtualized Domain Controllers Configuration Introducing Group PolicyImplementing Read-Only Domain Overview of Windows Deployment Implementing and Administering GPOsControllers Services Group Policy Scope and Group PolicyAdministering AD DS Managing Windows Deployment Images ProcessingManaging the AD DS Database Implementing Deployment with Windows Troubleshooting the Application of GPOs

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Installing and Configuring a RODC Deployment Services Creating and Configuring GPOsCreate and administer AD DS Snapshots Administering Windows Deployment Managing GPO ScopeConfiguring the Active Directory Recycle Bin Services Verify GPO ApplicationDeploy a domain controller by using domain Installing and Configuring Windows Managing GPOscontroller cloning Deployment Services Implementing Administrative TemplatesConfiguring Password Policy and User Creating Operating System Images with Configuring Folder Redirection and ScriptsAccount Windows Deployment Services Configuring Group Policy PreferencesConfiguring Managed Service Accounts Configuring Custom Computer Naming Managing Software with Group PolicyConfiguring Password Policy and Account Deploying Images with Windows Implement Settings Using Group PolicyLockout Settings Deployment Services PreferencesCreating and Associating a Group Managed Overview of WSUS Managing Office 2013 by usingService Account Deploying Updates with WSUS Administrative TemplatesIntroducing Group Policy Implementing the WSUS Server Role Deploying Software by using Group PolicyImplementing and Administering GPOs Configuring Update Settings Configuring Folder RedirectionGroup Policy Scope and Group Policy Approving and Deploying an Update by Module 6: Configuring andProcessing using WSUS Troubleshooting Remote AccessTroubleshooting the Application of GPOs Monitoring Tools Remote Access OverviewCreating and Configuring GPOs Using Performance Monitor Implementing DirectAccess by Using theManaging GPO Scope Monitoring Event Logs Getting Started WizardVerify GPO Application Establishing a Performance Baseline Implementing and Managing an AdvancedManaging GPOs Identifying the Source of a Performance DirectAccess InfrastructureImplementing Administrative Templates Problem Implementing VPNConfiguring Folder Redirection and Scripts Viewing and Configuring Centralized Implementing Web Application ProxyConfiguring Group Policy Preferences Event Logs Verifying Readiness for a DirectAccessManaging Software with Group Policy DeploymentImplement Settings Using Group Policy Running the Getting Started WizardPreferences line Validating the DirectAccess DeploymentManaging Office 2013 by using Configuring the DNS Server Role Preparing the Environment forAdministrative Templates Configuring DNS Zones DirectAccessDeploying Software by using Group Policy Configuring DNS Zone Transfers Implementing the Advanced DirectAccessConfiguring Folder Redirection Managing and Troubleshooting DNS InfrastructureModule 6: Configuring and Troubleshooting Configuring DNS Resource Records Validating the DirectAccess DeploymentRemote Access Configuring DNS Conditional Forwarding Implementing VPNRemote Access Overview Installing and Configuring DNS Zones Validating the VPN DeploymentImplementing DirectAccess by Using the Troubleshooting DNS Implementing Web Application ProxyGetting Started Wizard Overview of AD DS Validating the Web Application ProxyImplementing and Managing an Advanced Implementing Virtualized Domain DeploymentDirectAccess Infrastructure Controllers Installing and Configuring a Network PolicyImplementing VPN Implementing Read-Only Domain ServerImplementing Web Application Proxy Controllers Configuring RADIUS Clients and ServersVerifying Readiness for a DirectAccess Administering AD DS NPS Authentication MethodsDeployment Managing the AD DS Database Monitoring and Troubleshooting a NetworkRunning the Getting Started Wizard Installing and Configuring a RODC Policy ServerValidating the DirectAccess Deployment Create and administer AD DS Snapshots Installing and Configuring NPS to SupportPreparing the Environment for DirectAccess Configuring the Active Directory Recycle RADIUSImplementing the Advanced DirectAccess Bin Configuring and Testing a RADIUS ClientInfrastructure Deploy a domain controller by using Network Access Protection OverviewValidating the DirectAccess Deployment domain controller cloning Configuring NAPImplementing VPN Configuring Password Policy and User Configuring IPSec Enforcement for NAPValidating the VPN Deployment Account Monitoring and Troubleshooting NAPImplementing Web Application Proxy Configuring Managed Service Accounts Configuring NAP with VPN EnforcementValidating the Web Application Proxy Configuring Password Policy and Validating the DeploymentDeployment Account Lockout Settings Configuring IPSec EnforcementInstalling and Configuring a Network Policy Creating and Associating a Group Validating the DeploymentServer Managed Service Account Overview of FSRMConfiguring RADIUS Clients and Servers Introducing Group Policy Using FSRM to Manage Quotas, FileNPS Authentication Methods Implementing and Administering GPOs Screens, and Storage ReportsMonitoring and Troubleshooting a Network Group Policy Scope and Group Policy Implementing Classification ManagementPolicy Server Processing and File Management TasksInstalling and Configuring NPS to Support Troubleshooting the Application of GPOs DFS OverviewRADIUS Creating and Configuring GPOs Configuring DFS NamespacesConfiguring and Testing a RADIUS Client Managing GPO Scope Configuring and Troubleshooting DFS-RNetwork Access Protection Overview Verify GPO Application Configuring FSRM QuotasConfiguring NAP Managing GPOs Configuring File ScreeningConfiguring IPSec Enforcement for NAP Implementing Administrative Templates Installing the DFS role serviceMonitoring and Troubleshooting NAP Configuring Folder Redirection and Configuring a DFS Namespace

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Configuring NAP with VPN Enforcement Scripts Configuring DFS-RValidating the Deployment Configuring Group Policy Preferences Module 10: Configuring Encryption andConfiguring IPSec Enforcement Managing Software with Group Policy Advanced AuditingValidating the Deployment Implement Settings Using Group Policy Encrypting Drives by Using BitLockerOverview of FSRM Preferences Encrypting Files by Using Encrypting FileUsing FSRM to Manage Quotas, File Managing Office 2013 by using SystemScreens, and Storage Reports Administrative Templates Configuring Advanced AuditingImplementing Classification Management Deploying Software by using Group Securing Data Drives by Using BitLockerand File Management Tasks Policy Encrypting and Recovering FilesDFS Overview Configuring Folder Redirection Configuring Advanced Audit PolicyConfiguring DFS Namespaces Module 6: Configuring and ConfigurationConfiguring and Troubleshooting DFS-R Troubleshooting Remote Access Overview of Windows DeploymentConfiguring FSRM Quotas Remote Access Overview ServicesConfiguring File Screening Implementing DirectAccess by Using the Managing Windows Deployment ImagesInstalling the DFS role service Getting Started Wizard Implementing Deployment with WindowsConfiguring a DFS Namespace Implementing and Managing an Deployment ServicesConfiguring DFS-R Advanced DirectAccess Infrastructure Administering Windows DeploymentModule 10: Configuring Encryption and Implementing VPN ServicesAdvanced Auditing Implementing Web Application Proxy Installing and Configuring WindowsEncrypting Drives by Using BitLocker Verifying Readiness for a DirectAccess Deployment ServicesEncrypting Files by Using Encrypting File Deployment Creating Operating System Images withSystem Running the Getting Started Wizard Windows Deployment ServicesConfiguring Advanced Auditing Validating the DirectAccess Deployment Configuring Custom Computer NamingSecuring Data Drives by Using BitLocker Preparing the Environment for Deploying Images with WindowsEncrypting and Recovering Files DirectAccess Deployment ServicesConfiguring Advanced Audit Policy Implementing the Advanced Overview of WSUSConfiguration DirectAccess Infrastructure Deploying Updates with WSUSOverview of Windows Deployment Services Validating the DirectAccess Deployment Implementing the WSUS Server RoleManaging Windows Deployment Images Implementing VPN Configuring Update SettingsImplementing Deployment with Windows Validating the VPN Deployment Approving and Deploying an Update byDeployment Services Implementing Web Application Proxy using WSUSAdministering Windows Deployment Validating the Web Application Proxy Monitoring ToolsServices Deployment Using Performance MonitorInstalling and Configuring Windows Installing and Configuring a Network Monitoring Event LogsDeployment Services Policy Server Establishing a Performance BaselineCreating Operating System Images with Configuring RADIUS Clients and Servers Identifying the Source of a PerformanceWindows Deployment Services NPS Authentication Methods ProblemConfiguring Custom Computer Naming Monitoring and Troubleshooting a Viewing and Configuring Centralized EventDeploying Images with Windows Network Policy Server LogsDeployment Services Installing and Configuring NPS toOverview of WSUS Support RADIUSDeploying Updates with WSUS Configuring and Testing a RADIUS Client lineImplementing the WSUS Server Role Network Access Protection Overview Configuring the DNS Server RoleConfiguring Update Settings Configuring NAP Configuring DNS ZonesApproving and Deploying an Update by Configuring IPSec Enforcement for NAP Configuring DNS Zone Transfersusing WSUS Monitoring and Troubleshooting NAP Managing and Troubleshooting DNSMonitoring Tools Configuring NAP with VPN Enforcement Configuring DNS Resource RecordsUsing Performance Monitor Validating the Deployment Configuring DNS Conditional ForwardingMonitoring Event Logs Configuring IPSec Enforcement Installing and Configuring DNS ZonesEstablishing a Performance Baseline Validating the Deployment Troubleshooting DNSIdentifying the Source of a Performance Overview of FSRM Overview of AD DSProblem Using FSRM to Manage Quotas, File Implementing Virtualized DomainViewing and Configuring Centralized Event Screens, and Storage Reports ControllersLogs Implementing Classification Management Implementing Read-Only Domain

and File Management Tasks ControllersLab : Implementing a Group Policy DFS Overview Administering AD DSInfrastructure Configuring DFS Namespaces Managing the AD DS Databaseline Configuring and Troubleshooting DFS-R Installing and Configuring a RODC

Configuring FSRM Quotas Create and administer AD DS SnapshotsConfiguring File Screening Configuring the Active Directory Recycle

line Installing the DFS role service BinConfiguring the DNS Server Role Configuring a DFS Namespace Deploy a domain controller by usingConfiguring DNS Zones Configuring DFS-R domain controller cloningConfiguring DNS Zone Transfers Module 10: Configuring Encryption and Configuring Password Policy and UserManaging and Troubleshooting DNS Advanced Auditing AccountConfiguring DNS Resource Records Encrypting Drives by Using BitLocker Configuring Managed Service Accounts

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Configuring DNS Conditional Forwarding Encrypting Files by Using Encrypting File Configuring Password Policy and AccountInstalling and Configuring DNS Zones System Lockout SettingsTroubleshooting DNS Configuring Advanced Auditing Creating and Associating a GroupOverview of AD DS Securing Data Drives by Using BitLocker Managed Service AccountImplementing Virtualized Domain Controllers Encrypting and Recovering Files Introducing Group PolicyImplementing Read-Only Domain Configuring Advanced Audit Policy Implementing and Administering GPOsControllers Configuration Group Policy Scope and Group PolicyAdministering AD DS Overview of Windows Deployment ProcessingManaging the AD DS Database Services Troubleshooting the Application of GPOsInstalling and Configuring a RODC Managing Windows Deployment Images Creating and Configuring GPOsCreate and administer AD DS Snapshots Implementing Deployment with Windows Managing GPO ScopeConfiguring the Active Directory Recycle Bin Deployment Services Verify GPO ApplicationDeploy a domain controller by using domain Administering Windows Deployment Managing GPOscontroller cloning Services Implementing Administrative TemplatesConfiguring Password Policy and User Installing and Configuring Windows Configuring Folder Redirection and ScriptsAccount Deployment Services Configuring Group Policy PreferencesConfiguring Managed Service Accounts Creating Operating System Images with Managing Software with Group PolicyConfiguring Password Policy and Account Windows Deployment Services Implement Settings Using Group PolicyLockout Settings Configuring Custom Computer Naming PreferencesCreating and Associating a Group Managed Deploying Images with Windows Managing Office 2013 by usingService Account Deployment Services Administrative TemplatesIntroducing Group Policy Overview of WSUS Deploying Software by using Group PolicyImplementing and Administering GPOs Deploying Updates with WSUS Configuring Folder RedirectionGroup Policy Scope and Group Policy Implementing the WSUS Server Role Module 6: Configuring andProcessing Configuring Update Settings Troubleshooting Remote AccessTroubleshooting the Application of GPOs Approving and Deploying an Update by Remote Access OverviewCreating and Configuring GPOs using WSUS Implementing DirectAccess by Using theManaging GPO Scope Monitoring Tools Getting Started WizardVerify GPO Application Using Performance Monitor Implementing and Managing an AdvancedManaging GPOs Monitoring Event Logs DirectAccess InfrastructureImplementing Administrative Templates Establishing a Performance Baseline Implementing VPNConfiguring Folder Redirection and Scripts Identifying the Source of a Performance Implementing Web Application ProxyConfiguring Group Policy Preferences Problem Verifying Readiness for a DirectAccessManaging Software with Group Policy Viewing and Configuring Centralized DeploymentImplement Settings Using Group Policy Event Logs Running the Getting Started WizardPreferences Validating the DirectAccess DeploymentManaging Office 2013 by using Module 8: Implementing Network Access Preparing the Environment forAdministrative Templates Protection DirectAccessDeploying Software by using Group Policy line Implementing the Advanced DirectAccessConfiguring Folder Redirection InfrastructureModule 6: Configuring and Troubleshooting Validating the DirectAccess DeploymentRemote Access line Implementing VPNRemote Access Overview Configuring the DNS Server Role Validating the VPN DeploymentImplementing DirectAccess by Using the Configuring DNS Zones Implementing Web Application ProxyGetting Started Wizard Configuring DNS Zone Transfers Validating the Web Application ProxyImplementing and Managing an Advanced Managing and Troubleshooting DNS DeploymentDirectAccess Infrastructure Configuring DNS Resource Records Installing and Configuring a Network PolicyImplementing VPN Configuring DNS Conditional Forwarding ServerImplementing Web Application Proxy Installing and Configuring DNS Zones Configuring RADIUS Clients and ServersVerifying Readiness for a DirectAccess Troubleshooting DNS NPS Authentication MethodsDeployment Overview of AD DS Monitoring and Troubleshooting a NetworkRunning the Getting Started Wizard Implementing Virtualized Domain Policy ServerValidating the DirectAccess Deployment Controllers Installing and Configuring NPS to SupportPreparing the Environment for DirectAccess Implementing Read-Only Domain RADIUSImplementing the Advanced DirectAccess Controllers Configuring and Testing a RADIUS ClientInfrastructure Administering AD DS Network Access Protection OverviewValidating the DirectAccess Deployment Managing the AD DS Database Configuring NAPImplementing VPN Installing and Configuring a RODC Configuring IPSec Enforcement for NAPValidating the VPN Deployment Create and administer AD DS Snapshots Monitoring and Troubleshooting NAPImplementing Web Application Proxy Configuring the Active Directory Recycle Configuring NAP with VPN EnforcementValidating the Web Application Proxy Bin Validating the DeploymentDeployment Deploy a domain controller by using Configuring IPSec EnforcementInstalling and Configuring a Network Policy domain controller cloning Validating the DeploymentServer Configuring Password Policy and User Overview of FSRMConfiguring RADIUS Clients and Servers Account Using FSRM to Manage Quotas, FileNPS Authentication Methods Configuring Managed Service Accounts Screens, and Storage Reports

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Monitoring and Troubleshooting a Network Configuring Password Policy and Implementing Classification ManagementPolicy Server Account Lockout Settings and File Management TasksInstalling and Configuring NPS to Support Creating and Associating a Group DFS OverviewRADIUS Managed Service Account Configuring DFS NamespacesConfiguring and Testing a RADIUS Client Introducing Group Policy Configuring and Troubleshooting DFS-RNetwork Access Protection Overview Implementing and Administering GPOs Configuring FSRM QuotasConfiguring NAP Group Policy Scope and Group Policy Configuring File ScreeningConfiguring IPSec Enforcement for NAP Processing Installing the DFS role serviceMonitoring and Troubleshooting NAP Troubleshooting the Application of GPOs Configuring a DFS NamespaceConfiguring NAP with VPN Enforcement Creating and Configuring GPOs Configuring DFS-RValidating the Deployment Managing GPO Scope Module 10: Configuring Encryption andConfiguring IPSec Enforcement Verify GPO Application Advanced AuditingValidating the Deployment Managing GPOs Encrypting Drives by Using BitLockerOverview of FSRM Implementing Administrative Templates Encrypting Files by Using Encrypting FileUsing FSRM to Manage Quotas, File Configuring Folder Redirection and SystemScreens, and Storage Reports Scripts Configuring Advanced AuditingImplementing Classification Management Configuring Group Policy Preferences Securing Data Drives by Using BitLockerand File Management Tasks Managing Software with Group Policy Encrypting and Recovering FilesDFS Overview Implement Settings Using Group Policy Configuring Advanced Audit PolicyConfiguring DFS Namespaces Preferences ConfigurationConfiguring and Troubleshooting DFS-R Managing Office 2013 by using Overview of Windows DeploymentConfiguring FSRM Quotas Administrative Templates ServicesConfiguring File Screening Deploying Software by using Group Managing Windows Deployment ImagesInstalling the DFS role service Policy Implementing Deployment with WindowsConfiguring a DFS Namespace Configuring Folder Redirection Deployment ServicesConfiguring DFS-R Module 6: Configuring and Administering Windows DeploymentModule 10: Configuring Encryption and Troubleshooting Remote Access ServicesAdvanced Auditing Remote Access Overview Installing and Configuring WindowsEncrypting Drives by Using BitLocker Implementing DirectAccess by Using the Deployment ServicesEncrypting Files by Using Encrypting File Getting Started Wizard Creating Operating System Images withSystem Implementing and Managing an Windows Deployment ServicesConfiguring Advanced Auditing Advanced DirectAccess Infrastructure Configuring Custom Computer NamingSecuring Data Drives by Using BitLocker Implementing VPN Deploying Images with WindowsEncrypting and Recovering Files Implementing Web Application Proxy Deployment ServicesConfiguring Advanced Audit Policy Verifying Readiness for a DirectAccess Overview of WSUSConfiguration Deployment Deploying Updates with WSUSOverview of Windows Deployment Services Running the Getting Started Wizard Implementing the WSUS Server RoleManaging Windows Deployment Images Validating the DirectAccess Deployment Configuring Update SettingsImplementing Deployment with Windows Preparing the Environment for Approving and Deploying an Update byDeployment Services DirectAccess using WSUSAdministering Windows Deployment Implementing the Advanced Monitoring ToolsServices DirectAccess Infrastructure Using Performance MonitorInstalling and Configuring Windows Validating the DirectAccess Deployment Monitoring Event LogsDeployment Services Implementing VPN Establishing a Performance BaselineCreating Operating System Images with Validating the VPN Deployment Identifying the Source of a PerformanceWindows Deployment Services Implementing Web Application Proxy ProblemConfiguring Custom Computer Naming Validating the Web Application Proxy Viewing and Configuring Centralized EventDeploying Images with Windows Deployment LogsDeployment Services Installing and Configuring a NetworkOverview of WSUS Policy ServerDeploying Updates with WSUS Configuring RADIUS Clients and Servers lineImplementing the WSUS Server Role NPS Authentication Methods Configuring the DNS Server RoleConfiguring Update Settings Monitoring and Troubleshooting a Configuring DNS ZonesApproving and Deploying an Update by Network Policy Server Configuring DNS Zone Transfersusing WSUS Installing and Configuring NPS to Managing and Troubleshooting DNSMonitoring Tools Support RADIUS Configuring DNS Resource RecordsUsing Performance Monitor Configuring and Testing a RADIUS Client Configuring DNS Conditional ForwardingMonitoring Event Logs Network Access Protection Overview Installing and Configuring DNS ZonesEstablishing a Performance Baseline Configuring NAP Troubleshooting DNSIdentifying the Source of a Performance Configuring IPSec Enforcement for NAP Overview of AD DSProblem Monitoring and Troubleshooting NAP Implementing Virtualized DomainViewing and Configuring Centralized Event Configuring NAP with VPN Enforcement ControllersLogs Validating the Deployment Implementing Read-Only Domain

Configuring IPSec Enforcement ControllersValidating the Deployment Administering AD DS

line Overview of FSRM Managing the AD DS Database

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Configuring the DNS Server Role Using FSRM to Manage Quotas, File Installing and Configuring a RODCConfiguring DNS Zones Screens, and Storage Reports Create and administer AD DS SnapshotsConfiguring DNS Zone Transfers Implementing Classification Management Configuring the Active Directory RecycleManaging and Troubleshooting DNS and File Management Tasks BinConfiguring DNS Resource Records DFS Overview Deploy a domain controller by usingConfiguring DNS Conditional Forwarding Configuring DFS Namespaces domain controller cloningInstalling and Configuring DNS Zones Configuring and Troubleshooting DFS-R Configuring Password Policy and UserTroubleshooting DNS Configuring FSRM Quotas AccountOverview of AD DS Configuring File Screening Configuring Managed Service AccountsImplementing Virtualized Domain Controllers Installing the DFS role service Configuring Password Policy and AccountImplementing Read-Only Domain Configuring a DFS Namespace Lockout SettingsControllers Configuring DFS-R Creating and Associating a GroupAdministering AD DS Module 10: Configuring Encryption and Managed Service AccountManaging the AD DS Database Advanced Auditing Introducing Group PolicyInstalling and Configuring a RODC Encrypting Drives by Using BitLocker Implementing and Administering GPOsCreate and administer AD DS Snapshots Encrypting Files by Using Encrypting File Group Policy Scope and Group PolicyConfiguring the Active Directory Recycle Bin System ProcessingDeploy a domain controller by using domain Configuring Advanced Auditing Troubleshooting the Application of GPOscontroller cloning Securing Data Drives by Using BitLocker Creating and Configuring GPOsConfiguring Password Policy and User Encrypting and Recovering Files Managing GPO ScopeAccount Configuring Advanced Audit Policy Verify GPO ApplicationConfiguring Managed Service Accounts Configuration Managing GPOsConfiguring Password Policy and Account Overview of Windows Deployment Implementing Administrative TemplatesLockout Settings Services Configuring Folder Redirection and ScriptsCreating and Associating a Group Managed Managing Windows Deployment Images Configuring Group Policy PreferencesService Account Implementing Deployment with Windows Managing Software with Group PolicyIntroducing Group Policy Deployment Services Implement Settings Using Group PolicyImplementing and Administering GPOs Administering Windows Deployment PreferencesGroup Policy Scope and Group Policy Services Managing Office 2013 by usingProcessing Installing and Configuring Windows Administrative TemplatesTroubleshooting the Application of GPOs Deployment Services Deploying Software by using Group PolicyCreating and Configuring GPOs Creating Operating System Images with Configuring Folder RedirectionManaging GPO Scope Windows Deployment Services Module 6: Configuring andVerify GPO Application Configuring Custom Computer Naming Troubleshooting Remote AccessManaging GPOs Deploying Images with Windows Remote Access OverviewImplementing Administrative Templates Deployment Services Implementing DirectAccess by Using theConfiguring Folder Redirection and Scripts Overview of WSUS Getting Started WizardConfiguring Group Policy Preferences Deploying Updates with WSUS Implementing and Managing an AdvancedManaging Software with Group Policy Implementing the WSUS Server Role DirectAccess InfrastructureImplement Settings Using Group Policy Configuring Update Settings Implementing VPNPreferences Approving and Deploying an Update by Implementing Web Application ProxyManaging Office 2013 by using using WSUS Verifying Readiness for a DirectAccessAdministrative Templates Monitoring Tools DeploymentDeploying Software by using Group Policy Using Performance Monitor Running the Getting Started WizardConfiguring Folder Redirection Monitoring Event Logs Validating the DirectAccess DeploymentModule 6: Configuring and Troubleshooting Establishing a Performance Baseline Preparing the Environment forRemote Access Identifying the Source of a Performance DirectAccessRemote Access Overview Problem Implementing the Advanced DirectAccessImplementing DirectAccess by Using the Viewing and Configuring Centralized InfrastructureGetting Started Wizard Event Logs Validating the DirectAccess DeploymentImplementing and Managing an Advanced Implementing VPNDirectAccess Infrastructure Validating the VPN DeploymentImplementing VPN line Implementing Web Application ProxyImplementing Web Application Proxy Configuring the DNS Server Role Validating the Web Application ProxyVerifying Readiness for a DirectAccess Configuring DNS Zones DeploymentDeployment Configuring DNS Zone Transfers Installing and Configuring a Network PolicyRunning the Getting Started Wizard Managing and Troubleshooting DNS ServerValidating the DirectAccess Deployment Configuring DNS Resource Records Configuring RADIUS Clients and ServersPreparing the Environment for DirectAccess Configuring DNS Conditional Forwarding NPS Authentication MethodsImplementing the Advanced DirectAccess Installing and Configuring DNS Zones Monitoring and Troubleshooting a NetworkInfrastructure Troubleshooting DNS Policy ServerValidating the DirectAccess Deployment Overview of AD DS Installing and Configuring NPS to SupportImplementing VPN Implementing Virtualized Domain RADIUSValidating the VPN Deployment Controllers Configuring and Testing a RADIUS ClientImplementing Web Application Proxy Implementing Read-Only Domain Network Access Protection OverviewValidating the Web Application Proxy Controllers Configuring NAP

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Deployment Administering AD DS Configuring IPSec Enforcement for NAPInstalling and Configuring a Network Policy Managing the AD DS Database Monitoring and Troubleshooting NAPServer Installing and Configuring a RODC Configuring NAP with VPN EnforcementConfiguring RADIUS Clients and Servers Create and administer AD DS Snapshots Validating the DeploymentNPS Authentication Methods Configuring the Active Directory Recycle Configuring IPSec EnforcementMonitoring and Troubleshooting a Network Bin Validating the DeploymentPolicy Server Deploy a domain controller by using Overview of FSRMInstalling and Configuring NPS to Support domain controller cloning Using FSRM to Manage Quotas, FileRADIUS Configuring Password Policy and User Screens, and Storage ReportsConfiguring and Testing a RADIUS Client Account Implementing Classification ManagementNetwork Access Protection Overview Configuring Managed Service Accounts and File Management TasksConfiguring NAP Configuring Password Policy and DFS OverviewConfiguring IPSec Enforcement for NAP Account Lockout Settings Configuring DFS NamespacesMonitoring and Troubleshooting NAP Creating and Associating a Group Configuring and Troubleshooting DFS-RConfiguring NAP with VPN Enforcement Managed Service Account Configuring FSRM QuotasValidating the Deployment Introducing Group Policy Configuring File ScreeningConfiguring IPSec Enforcement Implementing and Administering GPOs Installing the DFS role serviceValidating the Deployment Group Policy Scope and Group Policy Configuring a DFS NamespaceOverview of FSRM Processing Configuring DFS-RUsing FSRM to Manage Quotas, File Troubleshooting the Application of GPOs Module 10: Configuring Encryption andScreens, and Storage Reports Creating and Configuring GPOs Advanced AuditingImplementing Classification Management Managing GPO Scope Encrypting Drives by Using BitLockerand File Management Tasks Verify GPO Application Encrypting Files by Using Encrypting FileDFS Overview Managing GPOs SystemConfiguring DFS Namespaces Implementing Administrative Templates Configuring Advanced AuditingConfiguring and Troubleshooting DFS-R Configuring Folder Redirection and Securing Data Drives by Using BitLockerConfiguring FSRM Quotas Scripts Encrypting and Recovering FilesConfiguring File Screening Configuring Group Policy Preferences Configuring Advanced Audit PolicyInstalling the DFS role service Managing Software with Group Policy ConfigurationConfiguring a DFS Namespace Implement Settings Using Group Policy Overview of Windows DeploymentConfiguring DFS-R Preferences ServicesModule 10: Configuring Encryption and Managing Office 2013 by using Managing Windows Deployment ImagesAdvanced Auditing Administrative Templates Implementing Deployment with WindowsEncrypting Drives by Using BitLocker Deploying Software by using Group Deployment ServicesEncrypting Files by Using Encrypting File Policy Administering Windows DeploymentSystem Configuring Folder Redirection ServicesConfiguring Advanced Auditing Module 6: Configuring and Installing and Configuring WindowsSecuring Data Drives by Using BitLocker Troubleshooting Remote Access Deployment ServicesEncrypting and Recovering Files Remote Access Overview Creating Operating System Images withConfiguring Advanced Audit Policy Implementing DirectAccess by Using the Windows Deployment ServicesConfiguration Getting Started Wizard Configuring Custom Computer NamingOverview of Windows Deployment Services Implementing and Managing an Deploying Images with WindowsManaging Windows Deployment Images Advanced DirectAccess Infrastructure Deployment ServicesImplementing Deployment with Windows Implementing VPN Overview of WSUSDeployment Services Implementing Web Application Proxy Deploying Updates with WSUSAdministering Windows Deployment Verifying Readiness for a DirectAccess Implementing the WSUS Server RoleServices Deployment Configuring Update SettingsInstalling and Configuring Windows Running the Getting Started Wizard Approving and Deploying an Update byDeployment Services Validating the DirectAccess Deployment using WSUSCreating Operating System Images with Preparing the Environment for Monitoring ToolsWindows Deployment Services DirectAccess Using Performance MonitorConfiguring Custom Computer Naming Implementing the Advanced Monitoring Event LogsDeploying Images with Windows DirectAccess Infrastructure Establishing a Performance BaselineDeployment Services Validating the DirectAccess Deployment Identifying the Source of a PerformanceOverview of WSUS Implementing VPN ProblemDeploying Updates with WSUS Validating the VPN Deployment Viewing and Configuring Centralized EventImplementing the WSUS Server Role Implementing Web Application Proxy LogsConfiguring Update Settings Validating the Web Application ProxyApproving and Deploying an Update by Deployment Lab : Implementing Update Managementusing WSUS Installing and Configuring a Network lineMonitoring Tools Policy ServerUsing Performance Monitor Configuring RADIUS Clients and ServersMonitoring Event Logs NPS Authentication Methods lineEstablishing a Performance Baseline Monitoring and Troubleshooting a Configuring the DNS Server RoleIdentifying the Source of a Performance Network Policy Server Configuring DNS ZonesProblem Installing and Configuring NPS to Configuring DNS Zone Transfers

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Viewing and Configuring Centralized Event Support RADIUS Managing and Troubleshooting DNSLogs Configuring and Testing a RADIUS Client Configuring DNS Resource Records

Network Access Protection Overview Configuring DNS Conditional ForwardingConfiguring NAP Installing and Configuring DNS Zones

line Configuring IPSec Enforcement for NAP Troubleshooting DNSConfiguring the DNS Server Role Monitoring and Troubleshooting NAP Overview of AD DSConfiguring DNS Zones Configuring NAP with VPN Enforcement Implementing Virtualized DomainConfiguring DNS Zone Transfers Validating the Deployment ControllersManaging and Troubleshooting DNS Configuring IPSec Enforcement Implementing Read-Only DomainConfiguring DNS Resource Records Validating the Deployment ControllersConfiguring DNS Conditional Forwarding Overview of FSRM Administering AD DSInstalling and Configuring DNS Zones Using FSRM to Manage Quotas, File Managing the AD DS DatabaseTroubleshooting DNS Screens, and Storage Reports Installing and Configuring a RODCOverview of AD DS Implementing Classification Management Create and administer AD DS SnapshotsImplementing Virtualized Domain Controllers and File Management Tasks Configuring the Active Directory RecycleImplementing Read-Only Domain DFS Overview BinControllers Configuring DFS Namespaces Deploy a domain controller by usingAdministering AD DS Configuring and Troubleshooting DFS-R domain controller cloningManaging the AD DS Database Configuring FSRM Quotas Configuring Password Policy and UserInstalling and Configuring a RODC Configuring File Screening AccountCreate and administer AD DS Snapshots Installing the DFS role service Configuring Managed Service AccountsConfiguring the Active Directory Recycle Bin Configuring a DFS Namespace Configuring Password Policy and AccountDeploy a domain controller by using domain Configuring DFS-R Lockout Settingscontroller cloning Module 10: Configuring Encryption and Creating and Associating a GroupConfiguring Password Policy and User Advanced Auditing Managed Service AccountAccount Encrypting Drives by Using BitLocker Introducing Group PolicyConfiguring Managed Service Accounts Encrypting Files by Using Encrypting File Implementing and Administering GPOsConfiguring Password Policy and Account System Group Policy Scope and Group PolicyLockout Settings Configuring Advanced Auditing ProcessingCreating and Associating a Group Managed Securing Data Drives by Using BitLocker Troubleshooting the Application of GPOsService Account Encrypting and Recovering Files Creating and Configuring GPOsIntroducing Group Policy Configuring Advanced Audit Policy Managing GPO ScopeImplementing and Administering GPOs Configuration Verify GPO ApplicationGroup Policy Scope and Group Policy Overview of Windows Deployment Managing GPOsProcessing Services Implementing Administrative TemplatesTroubleshooting the Application of GPOs Managing Windows Deployment Images Configuring Folder Redirection and ScriptsCreating and Configuring GPOs Implementing Deployment with Windows Configuring Group Policy PreferencesManaging GPO Scope Deployment Services Managing Software with Group PolicyVerify GPO Application Administering Windows Deployment Implement Settings Using Group PolicyManaging GPOs Services PreferencesImplementing Administrative Templates Installing and Configuring Windows Managing Office 2013 by usingConfiguring Folder Redirection and Scripts Deployment Services Administrative TemplatesConfiguring Group Policy Preferences Creating Operating System Images with Deploying Software by using Group PolicyManaging Software with Group Policy Windows Deployment Services Configuring Folder RedirectionImplement Settings Using Group Policy Configuring Custom Computer Naming Module 6: Configuring andPreferences Deploying Images with Windows Troubleshooting Remote AccessManaging Office 2013 by using Deployment Services Remote Access OverviewAdministrative Templates Overview of WSUS Implementing DirectAccess by Using theDeploying Software by using Group Policy Deploying Updates with WSUS Getting Started WizardConfiguring Folder Redirection Implementing the WSUS Server Role Implementing and Managing an AdvancedModule 6: Configuring and Troubleshooting Configuring Update Settings DirectAccess InfrastructureRemote Access Approving and Deploying an Update by Implementing VPNRemote Access Overview using WSUS Implementing Web Application ProxyImplementing DirectAccess by Using the Monitoring Tools Verifying Readiness for a DirectAccessGetting Started Wizard Using Performance Monitor DeploymentImplementing and Managing an Advanced Monitoring Event Logs Running the Getting Started WizardDirectAccess Infrastructure Establishing a Performance Baseline Validating the DirectAccess DeploymentImplementing VPN Identifying the Source of a Performance Preparing the Environment forImplementing Web Application Proxy Problem DirectAccessVerifying Readiness for a DirectAccess Viewing and Configuring Centralized Implementing the Advanced DirectAccessDeployment Event Logs InfrastructureRunning the Getting Started Wizard Validating the DirectAccess DeploymentValidating the DirectAccess Deployment Implementing VPNPreparing the Environment for DirectAccess line Validating the VPN DeploymentImplementing the Advanced DirectAccess Configuring the DNS Server Role Implementing Web Application ProxyInfrastructure Configuring DNS Zones Validating the Web Application Proxy

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Validating the DirectAccess Deployment Configuring DNS Zone Transfers DeploymentImplementing VPN Managing and Troubleshooting DNS Installing and Configuring a Network PolicyValidating the VPN Deployment Configuring DNS Resource Records ServerImplementing Web Application Proxy Configuring DNS Conditional Forwarding Configuring RADIUS Clients and ServersValidating the Web Application Proxy Installing and Configuring DNS Zones NPS Authentication MethodsDeployment Troubleshooting DNS Monitoring and Troubleshooting a NetworkInstalling and Configuring a Network Policy Overview of AD DS Policy ServerServer Implementing Virtualized Domain Installing and Configuring NPS to SupportConfiguring RADIUS Clients and Servers Controllers RADIUSNPS Authentication Methods Implementing Read-Only Domain Configuring and Testing a RADIUS ClientMonitoring and Troubleshooting a Network Controllers Network Access Protection OverviewPolicy Server Administering AD DS Configuring NAPInstalling and Configuring NPS to Support Managing the AD DS Database Configuring IPSec Enforcement for NAPRADIUS Installing and Configuring a RODC Monitoring and Troubleshooting NAPConfiguring and Testing a RADIUS Client Create and administer AD DS Snapshots Configuring NAP with VPN EnforcementNetwork Access Protection Overview Configuring the Active Directory Recycle Validating the DeploymentConfiguring NAP Bin Configuring IPSec EnforcementConfiguring IPSec Enforcement for NAP Deploy a domain controller by using Validating the DeploymentMonitoring and Troubleshooting NAP domain controller cloning Overview of FSRMConfiguring NAP with VPN Enforcement Configuring Password Policy and User Using FSRM to Manage Quotas, FileValidating the Deployment Account Screens, and Storage ReportsConfiguring IPSec Enforcement Configuring Managed Service Accounts Implementing Classification ManagementValidating the Deployment Configuring Password Policy and and File Management TasksOverview of FSRM Account Lockout Settings DFS OverviewUsing FSRM to Manage Quotas, File Creating and Associating a Group Configuring DFS NamespacesScreens, and Storage Reports Managed Service Account Configuring and Troubleshooting DFS-RImplementing Classification Management Introducing Group Policy Configuring FSRM Quotasand File Management Tasks Implementing and Administering GPOs Configuring File ScreeningDFS Overview Group Policy Scope and Group Policy Installing the DFS role serviceConfiguring DFS Namespaces Processing Configuring a DFS NamespaceConfiguring and Troubleshooting DFS-R Troubleshooting the Application of GPOs Configuring DFS-RConfiguring FSRM Quotas Creating and Configuring GPOs Module 10: Configuring Encryption andConfiguring File Screening Managing GPO Scope Advanced AuditingInstalling the DFS role service Verify GPO Application Encrypting Drives by Using BitLockerConfiguring a DFS Namespace Managing GPOs Encrypting Files by Using Encrypting FileConfiguring DFS-R Implementing Administrative Templates SystemModule 10: Configuring Encryption and Configuring Folder Redirection and Configuring Advanced AuditingAdvanced Auditing Scripts Securing Data Drives by Using BitLockerEncrypting Drives by Using BitLocker Configuring Group Policy Preferences Encrypting and Recovering FilesEncrypting Files by Using Encrypting File Managing Software with Group Policy Configuring Advanced Audit PolicySystem Implement Settings Using Group Policy ConfigurationConfiguring Advanced Auditing Preferences Overview of Windows DeploymentSecuring Data Drives by Using BitLocker Managing Office 2013 by using ServicesEncrypting and Recovering Files Administrative Templates Managing Windows Deployment ImagesConfiguring Advanced Audit Policy Deploying Software by using Group Implementing Deployment with WindowsConfiguration Policy Deployment ServicesOverview of Windows Deployment Services Configuring Folder Redirection Administering Windows DeploymentManaging Windows Deployment Images Module 6: Configuring and ServicesImplementing Deployment with Windows Troubleshooting Remote Access Installing and Configuring WindowsDeployment Services Remote Access Overview Deployment ServicesAdministering Windows Deployment Implementing DirectAccess by Using the Creating Operating System Images withServices Getting Started Wizard Windows Deployment ServicesInstalling and Configuring Windows Implementing and Managing an Configuring Custom Computer NamingDeployment Services Advanced DirectAccess Infrastructure Deploying Images with WindowsCreating Operating System Images with Implementing VPN Deployment ServicesWindows Deployment Services Implementing Web Application Proxy Overview of WSUSConfiguring Custom Computer Naming Verifying Readiness for a DirectAccess Deploying Updates with WSUSDeploying Images with Windows Deployment Implementing the WSUS Server RoleDeployment Services Running the Getting Started Wizard Configuring Update SettingsOverview of WSUS Validating the DirectAccess Deployment Approving and Deploying an Update byDeploying Updates with WSUS Preparing the Environment for using WSUSImplementing the WSUS Server Role DirectAccess Monitoring ToolsConfiguring Update Settings Implementing the Advanced Using Performance MonitorApproving and Deploying an Update by DirectAccess Infrastructure Monitoring Event Logsusing WSUS Validating the DirectAccess Deployment Establishing a Performance BaselineMonitoring Tools Implementing VPN Identifying the Source of a Performance

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Using Performance Monitor Validating the VPN Deployment ProblemMonitoring Event Logs Implementing Web Application Proxy Viewing and Configuring Centralized EventEstablishing a Performance Baseline Validating the Web Application Proxy LogsIdentifying the Source of a Performance DeploymentProblem Installing and Configuring a NetworkViewing and Configuring Centralized Event Policy Server lineLogs Configuring RADIUS Clients and Servers Configuring the DNS Server Role

NPS Authentication Methods Configuring DNS ZonesMonitoring and Troubleshooting a Configuring DNS Zone Transfers

line Network Policy Server Managing and Troubleshooting DNSConfiguring the DNS Server Role Installing and Configuring NPS to Configuring DNS Resource RecordsConfiguring DNS Zones Support RADIUS Configuring DNS Conditional ForwardingConfiguring DNS Zone Transfers Configuring and Testing a RADIUS Client Installing and Configuring DNS ZonesManaging and Troubleshooting DNS Network Access Protection Overview Troubleshooting DNSConfiguring DNS Resource Records Configuring NAP Overview of AD DSConfiguring DNS Conditional Forwarding Configuring IPSec Enforcement for NAP Implementing Virtualized DomainInstalling and Configuring DNS Zones Monitoring and Troubleshooting NAP ControllersTroubleshooting DNS Configuring NAP with VPN Enforcement Implementing Read-Only DomainOverview of AD DS Validating the Deployment ControllersImplementing Virtualized Domain Controllers Configuring IPSec Enforcement Administering AD DSImplementing Read-Only Domain Validating the Deployment Managing the AD DS DatabaseControllers Overview of FSRM Installing and Configuring a RODCAdministering AD DS Using FSRM to Manage Quotas, File Create and administer AD DS SnapshotsManaging the AD DS Database Screens, and Storage Reports Configuring the Active Directory RecycleInstalling and Configuring a RODC Implementing Classification Management BinCreate and administer AD DS Snapshots and File Management Tasks Deploy a domain controller by usingConfiguring the Active Directory Recycle Bin DFS Overview domain controller cloningDeploy a domain controller by using domain Configuring DFS Namespaces Configuring Password Policy and Usercontroller cloning Configuring and Troubleshooting DFS-R AccountConfiguring Password Policy and User Configuring FSRM Quotas Configuring Managed Service AccountsAccount Configuring File Screening Configuring Password Policy and AccountConfiguring Managed Service Accounts Installing the DFS role service Lockout SettingsConfiguring Password Policy and Account Configuring a DFS Namespace Creating and Associating a GroupLockout Settings Configuring DFS-R Managed Service AccountCreating and Associating a Group Managed Module 10: Configuring Encryption and Introducing Group PolicyService Account Advanced Auditing Implementing and Administering GPOsIntroducing Group Policy Encrypting Drives by Using BitLocker Group Policy Scope and Group PolicyImplementing and Administering GPOs Encrypting Files by Using Encrypting File ProcessingGroup Policy Scope and Group Policy System Troubleshooting the Application of GPOsProcessing Configuring Advanced Auditing Creating and Configuring GPOsTroubleshooting the Application of GPOs Securing Data Drives by Using BitLocker Managing GPO ScopeCreating and Configuring GPOs Encrypting and Recovering Files Verify GPO ApplicationManaging GPO Scope Configuring Advanced Audit Policy Managing GPOsVerify GPO Application Configuration Implementing Administrative TemplatesManaging GPOs Overview of Windows Deployment Configuring Folder Redirection and ScriptsImplementing Administrative Templates Services Configuring Group Policy PreferencesConfiguring Folder Redirection and Scripts Managing Windows Deployment Images Managing Software with Group PolicyConfiguring Group Policy Preferences Implementing Deployment with Windows Implement Settings Using Group PolicyManaging Software with Group Policy Deployment Services PreferencesImplement Settings Using Group Policy Administering Windows Deployment Managing Office 2013 by usingPreferences Services Administrative TemplatesManaging Office 2013 by using Installing and Configuring Windows Deploying Software by using Group PolicyAdministrative Templates Deployment Services Configuring Folder RedirectionDeploying Software by using Group Policy Creating Operating System Images with Module 6: Configuring andConfiguring Folder Redirection Windows Deployment Services Troubleshooting Remote AccessModule 6: Configuring and Troubleshooting Configuring Custom Computer Naming Remote Access OverviewRemote Access Deploying Images with Windows Implementing DirectAccess by Using theRemote Access Overview Deployment Services Getting Started WizardImplementing DirectAccess by Using the Overview of WSUS Implementing and Managing an AdvancedGetting Started Wizard Deploying Updates with WSUS DirectAccess InfrastructureImplementing and Managing an Advanced Implementing the WSUS Server Role Implementing VPNDirectAccess Infrastructure Configuring Update Settings Implementing Web Application ProxyImplementing VPN Approving and Deploying an Update by Verifying Readiness for a DirectAccessImplementing Web Application Proxy using WSUS DeploymentVerifying Readiness for a DirectAccess Monitoring Tools Running the Getting Started WizardDeployment Using Performance Monitor Validating the DirectAccess Deployment

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Running the Getting Started Wizard Monitoring Event Logs Preparing the Environment forValidating the DirectAccess Deployment Establishing a Performance Baseline DirectAccessPreparing the Environment for DirectAccess Identifying the Source of a Performance Implementing the Advanced DirectAccessImplementing the Advanced DirectAccess Problem InfrastructureInfrastructure Viewing and Configuring Centralized Validating the DirectAccess DeploymentValidating the DirectAccess Deployment Event Logs Implementing VPNImplementing VPN Validating the VPN DeploymentValidating the VPN Deployment Implementing Web Application ProxyImplementing Web Application Proxy line Validating the Web Application ProxyValidating the Web Application Proxy Configuring the DNS Server Role DeploymentDeployment Configuring DNS Zones Installing and Configuring a Network PolicyInstalling and Configuring a Network Policy Configuring DNS Zone Transfers ServerServer Managing and Troubleshooting DNS Configuring RADIUS Clients and ServersConfiguring RADIUS Clients and Servers Configuring DNS Resource Records NPS Authentication MethodsNPS Authentication Methods Configuring DNS Conditional Forwarding Monitoring and Troubleshooting a NetworkMonitoring and Troubleshooting a Network Installing and Configuring DNS Zones Policy ServerPolicy Server Troubleshooting DNS Installing and Configuring NPS to SupportInstalling and Configuring NPS to Support Overview of AD DS RADIUSRADIUS Implementing Virtualized Domain Configuring and Testing a RADIUS ClientConfiguring and Testing a RADIUS Client Controllers Network Access Protection OverviewNetwork Access Protection Overview Implementing Read-Only Domain Configuring NAPConfiguring NAP Controllers Configuring IPSec Enforcement for NAPConfiguring IPSec Enforcement for NAP Administering AD DS Monitoring and Troubleshooting NAPMonitoring and Troubleshooting NAP Managing the AD DS Database Configuring NAP with VPN EnforcementConfiguring NAP with VPN Enforcement Installing and Configuring a RODC Validating the DeploymentValidating the Deployment Create and administer AD DS Snapshots Configuring IPSec EnforcementConfiguring IPSec Enforcement Configuring the Active Directory Recycle Validating the DeploymentValidating the Deployment Bin Overview of FSRMOverview of FSRM Deploy a domain controller by using Using FSRM to Manage Quotas, FileUsing FSRM to Manage Quotas, File domain controller cloning Screens, and Storage ReportsScreens, and Storage Reports Configuring Password Policy and User Implementing Classification ManagementImplementing Classification Management Account and File Management Tasksand File Management Tasks Configuring Managed Service Accounts DFS OverviewDFS Overview Configuring Password Policy and Configuring DFS NamespacesConfiguring DFS Namespaces Account Lockout Settings Configuring and Troubleshooting DFS-RConfiguring and Troubleshooting DFS-R Creating and Associating a Group Configuring FSRM QuotasConfiguring FSRM Quotas Managed Service Account Configuring File ScreeningConfiguring File Screening Introducing Group Policy Installing the DFS role serviceInstalling the DFS role service Implementing and Administering GPOs Configuring a DFS NamespaceConfiguring a DFS Namespace Group Policy Scope and Group Policy Configuring DFS-RConfiguring DFS-R Processing Module 10: Configuring Encryption andModule 10: Configuring Encryption and Troubleshooting the Application of GPOs Advanced AuditingAdvanced Auditing Creating and Configuring GPOs Encrypting Drives by Using BitLockerEncrypting Drives by Using BitLocker Managing GPO Scope Encrypting Files by Using Encrypting FileEncrypting Files by Using Encrypting File Verify GPO Application SystemSystem Managing GPOs Configuring Advanced AuditingConfiguring Advanced Auditing Implementing Administrative Templates Securing Data Drives by Using BitLockerSecuring Data Drives by Using BitLocker Configuring Folder Redirection and Encrypting and Recovering FilesEncrypting and Recovering Files Scripts Configuring Advanced Audit PolicyConfiguring Advanced Audit Policy Configuring Group Policy Preferences ConfigurationConfiguration Managing Software with Group Policy Overview of Windows DeploymentOverview of Windows Deployment Services Implement Settings Using Group Policy ServicesManaging Windows Deployment Images Preferences Managing Windows Deployment ImagesImplementing Deployment with Windows Managing Office 2013 by using Implementing Deployment with WindowsDeployment Services Administrative Templates Deployment ServicesAdministering Windows Deployment Deploying Software by using Group Administering Windows DeploymentServices Policy ServicesInstalling and Configuring Windows Configuring Folder Redirection Installing and Configuring WindowsDeployment Services Module 6: Configuring and Deployment ServicesCreating Operating System Images with Troubleshooting Remote Access Creating Operating System Images withWindows Deployment Services Remote Access Overview Windows Deployment ServicesConfiguring Custom Computer Naming Implementing DirectAccess by Using the Configuring Custom Computer NamingDeploying Images with Windows Getting Started Wizard Deploying Images with WindowsDeployment Services Implementing and Managing an Deployment ServicesOverview of WSUS Advanced DirectAccess Infrastructure Overview of WSUSDeploying Updates with WSUS Implementing VPN Deploying Updates with WSUS

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Implementing the WSUS Server Role Implementing Web Application Proxy Implementing the WSUS Server RoleConfiguring Update Settings Verifying Readiness for a DirectAccess Configuring Update SettingsApproving and Deploying an Update by Deployment Approving and Deploying an Update byusing WSUS Running the Getting Started Wizard using WSUSMonitoring Tools Validating the DirectAccess Deployment Monitoring ToolsUsing Performance Monitor Preparing the Environment for Using Performance MonitorMonitoring Event Logs DirectAccess Monitoring Event LogsEstablishing a Performance Baseline Implementing the Advanced Establishing a Performance BaselineIdentifying the Source of a Performance DirectAccess Infrastructure Identifying the Source of a PerformanceProblem Validating the DirectAccess Deployment ProblemViewing and Configuring Centralized Event Implementing VPN Viewing and Configuring Centralized EventLogs Validating the VPN Deployment Logs

Implementing Web Application ProxyValidating the Web Application Proxy

line Deployment lineConfiguring the DNS Server Role Installing and Configuring a Network Configuring the DNS Server RoleConfiguring DNS Zones Policy Server Configuring DNS ZonesConfiguring DNS Zone Transfers Configuring RADIUS Clients and Servers Configuring DNS Zone TransfersManaging and Troubleshooting DNS NPS Authentication Methods Managing and Troubleshooting DNSConfiguring DNS Resource Records Monitoring and Troubleshooting a Configuring DNS Resource RecordsConfiguring DNS Conditional Forwarding Network Policy Server Configuring DNS Conditional ForwardingInstalling and Configuring DNS Zones Installing and Configuring NPS to Installing and Configuring DNS ZonesTroubleshooting DNS Support RADIUS Troubleshooting DNSOverview of AD DS Configuring and Testing a RADIUS Client Overview of AD DSImplementing Virtualized Domain Controllers Network Access Protection Overview Implementing Virtualized DomainImplementing Read-Only Domain Configuring NAP ControllersControllers Configuring IPSec Enforcement for NAP Implementing Read-Only DomainAdministering AD DS Monitoring and Troubleshooting NAP ControllersManaging the AD DS Database Configuring NAP with VPN Enforcement Administering AD DSInstalling and Configuring a RODC Validating the Deployment Managing the AD DS DatabaseCreate and administer AD DS Snapshots Configuring IPSec Enforcement Installing and Configuring a RODCConfiguring the Active Directory Recycle Bin Validating the Deployment Create and administer AD DS SnapshotsDeploy a domain controller by using domain Overview of FSRM Configuring the Active Directory Recyclecontroller cloning Using FSRM to Manage Quotas, File BinConfiguring Password Policy and User Screens, and Storage Reports Deploy a domain controller by usingAccount Implementing Classification Management domain controller cloningConfiguring Managed Service Accounts and File Management Tasks Configuring Password Policy and UserConfiguring Password Policy and Account DFS Overview AccountLockout Settings Configuring DFS Namespaces Configuring Managed Service AccountsCreating and Associating a Group Managed Configuring and Troubleshooting DFS-R Configuring Password Policy and AccountService Account Configuring FSRM Quotas Lockout SettingsIntroducing Group Policy Configuring File Screening Creating and Associating a GroupImplementing and Administering GPOs Installing the DFS role service Managed Service AccountGroup Policy Scope and Group Policy Configuring a DFS Namespace Introducing Group PolicyProcessing Configuring DFS-R Implementing and Administering GPOsTroubleshooting the Application of GPOs Module 10: Configuring Encryption and Group Policy Scope and Group PolicyCreating and Configuring GPOs Advanced Auditing ProcessingManaging GPO Scope Encrypting Drives by Using BitLocker Troubleshooting the Application of GPOsVerify GPO Application Encrypting Files by Using Encrypting File Creating and Configuring GPOsManaging GPOs System Managing GPO ScopeImplementing Administrative Templates Configuring Advanced Auditing Verify GPO ApplicationConfiguring Folder Redirection and Scripts Securing Data Drives by Using BitLocker Managing GPOsConfiguring Group Policy Preferences Encrypting and Recovering Files Implementing Administrative TemplatesManaging Software with Group Policy Configuring Advanced Audit Policy Configuring Folder Redirection and ScriptsImplement Settings Using Group Policy Configuration Configuring Group Policy PreferencesPreferences Overview of Windows Deployment Managing Software with Group PolicyManaging Office 2013 by using Services Implement Settings Using Group PolicyAdministrative Templates Managing Windows Deployment Images PreferencesDeploying Software by using Group Policy Implementing Deployment with Windows Managing Office 2013 by usingConfiguring Folder Redirection Deployment Services Administrative TemplatesModule 6: Configuring and Troubleshooting Administering Windows Deployment Deploying Software by using Group PolicyRemote Access Services Configuring Folder RedirectionRemote Access Overview Installing and Configuring Windows Module 6: Configuring andImplementing DirectAccess by Using the Deployment Services Troubleshooting Remote AccessGetting Started Wizard Creating Operating System Images with Remote Access OverviewImplementing and Managing an Advanced Windows Deployment Services Implementing DirectAccess by Using the

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

DirectAccess Infrastructure Configuring Custom Computer Naming Getting Started WizardImplementing VPN Deploying Images with Windows Implementing and Managing an AdvancedImplementing Web Application Proxy Deployment Services DirectAccess InfrastructureVerifying Readiness for a DirectAccess Overview of WSUS Implementing VPNDeployment Deploying Updates with WSUS Implementing Web Application ProxyRunning the Getting Started Wizard Implementing the WSUS Server Role Verifying Readiness for a DirectAccessValidating the DirectAccess Deployment Configuring Update Settings DeploymentPreparing the Environment for DirectAccess Approving and Deploying an Update by Running the Getting Started WizardImplementing the Advanced DirectAccess using WSUS Validating the DirectAccess DeploymentInfrastructure Monitoring Tools Preparing the Environment forValidating the DirectAccess Deployment Using Performance Monitor DirectAccessImplementing VPN Monitoring Event Logs Implementing the Advanced DirectAccessValidating the VPN Deployment Establishing a Performance Baseline InfrastructureImplementing Web Application Proxy Identifying the Source of a Performance Validating the DirectAccess DeploymentValidating the Web Application Proxy Problem Implementing VPNDeployment Viewing and Configuring Centralized Validating the VPN DeploymentInstalling and Configuring a Network Policy Event Logs Implementing Web Application ProxyServer Validating the Web Application ProxyConfiguring RADIUS Clients and Servers DeploymentNPS Authentication Methods line Installing and Configuring a Network PolicyMonitoring and Troubleshooting a Network Configuring the DNS Server Role ServerPolicy Server Configuring DNS Zones Configuring RADIUS Clients and ServersInstalling and Configuring NPS to Support Configuring DNS Zone Transfers NPS Authentication MethodsRADIUS Managing and Troubleshooting DNS Monitoring and Troubleshooting a NetworkConfiguring and Testing a RADIUS Client Configuring DNS Resource Records Policy ServerNetwork Access Protection Overview Configuring DNS Conditional Forwarding Installing and Configuring NPS to SupportConfiguring NAP Installing and Configuring DNS Zones RADIUSConfiguring IPSec Enforcement for NAP Troubleshooting DNS Configuring and Testing a RADIUS ClientMonitoring and Troubleshooting NAP Overview of AD DS Network Access Protection OverviewConfiguring NAP with VPN Enforcement Implementing Virtualized Domain Configuring NAPValidating the Deployment Controllers Configuring IPSec Enforcement for NAPConfiguring IPSec Enforcement Implementing Read-Only Domain Monitoring and Troubleshooting NAPValidating the Deployment Controllers Configuring NAP with VPN EnforcementOverview of FSRM Administering AD DS Validating the DeploymentUsing FSRM to Manage Quotas, File Managing the AD DS Database Configuring IPSec EnforcementScreens, and Storage Reports Installing and Configuring a RODC Validating the DeploymentImplementing Classification Management Create and administer AD DS Snapshots Overview of FSRMand File Management Tasks Configuring the Active Directory Recycle Using FSRM to Manage Quotas, FileDFS Overview Bin Screens, and Storage ReportsConfiguring DFS Namespaces Deploy a domain controller by using Implementing Classification ManagementConfiguring and Troubleshooting DFS-R domain controller cloning and File Management TasksConfiguring FSRM Quotas Configuring Password Policy and User DFS OverviewConfiguring File Screening Account Configuring DFS NamespacesInstalling the DFS role service Configuring Managed Service Accounts Configuring and Troubleshooting DFS-RConfiguring a DFS Namespace Configuring Password Policy and Configuring FSRM QuotasConfiguring DFS-R Account Lockout Settings Configuring File ScreeningModule 10: Configuring Encryption and Creating and Associating a Group Installing the DFS role serviceAdvanced Auditing Managed Service Account Configuring a DFS NamespaceEncrypting Drives by Using BitLocker Introducing Group Policy Configuring DFS-REncrypting Files by Using Encrypting File Implementing and Administering GPOs Module 10: Configuring Encryption andSystem Group Policy Scope and Group Policy Advanced AuditingConfiguring Advanced Auditing Processing Encrypting Drives by Using BitLockerSecuring Data Drives by Using BitLocker Troubleshooting the Application of GPOs Encrypting Files by Using Encrypting FileEncrypting and Recovering Files Creating and Configuring GPOs SystemConfiguring Advanced Audit Policy Managing GPO Scope Configuring Advanced AuditingConfiguration Verify GPO Application Securing Data Drives by Using BitLockerOverview of Windows Deployment Services Managing GPOs Encrypting and Recovering FilesManaging Windows Deployment Images Implementing Administrative Templates Configuring Advanced Audit PolicyImplementing Deployment with Windows Configuring Folder Redirection and ConfigurationDeployment Services Scripts Overview of Windows DeploymentAdministering Windows Deployment Configuring Group Policy Preferences ServicesServices Managing Software with Group Policy Managing Windows Deployment ImagesInstalling and Configuring Windows Implement Settings Using Group Policy Implementing Deployment with WindowsDeployment Services Preferences Deployment ServicesCreating Operating System Images with Managing Office 2013 by using Administering Windows DeploymentWindows Deployment Services Administrative Templates Services

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Configuring Custom Computer Naming Deploying Software by using Group Installing and Configuring WindowsDeploying Images with Windows Policy Deployment ServicesDeployment Services Configuring Folder Redirection Creating Operating System Images withOverview of WSUS Module 6: Configuring and Windows Deployment ServicesDeploying Updates with WSUS Troubleshooting Remote Access Configuring Custom Computer NamingImplementing the WSUS Server Role Remote Access Overview Deploying Images with WindowsConfiguring Update Settings Implementing DirectAccess by Using the Deployment ServicesApproving and Deploying an Update by Getting Started Wizard Overview of WSUSusing WSUS Implementing and Managing an Deploying Updates with WSUSMonitoring Tools Advanced DirectAccess Infrastructure Implementing the WSUS Server RoleUsing Performance Monitor Implementing VPN Configuring Update SettingsMonitoring Event Logs Implementing Web Application Proxy Approving and Deploying an Update byEstablishing a Performance Baseline Verifying Readiness for a DirectAccess using WSUSIdentifying the Source of a Performance Deployment Monitoring ToolsProblem Running the Getting Started Wizard Using Performance MonitorViewing and Configuring Centralized Event Validating the DirectAccess Deployment Monitoring Event LogsLogs Preparing the Environment for Establishing a Performance Baseline

DirectAccess Identifying the Source of a PerformanceModule 5: Managing User Desktops with Group Implementing the Advanced ProblemPolicy DirectAccess Infrastructure Viewing and Configuring Centralized Eventline Validating the DirectAccess Deployment Logs

Implementing VPNValidating the VPN Deployment

line Implementing Web Application Proxy lineConfiguring the DNS Server Role Validating the Web Application Proxy Configuring the DNS Server RoleConfiguring DNS Zones Deployment Configuring DNS ZonesConfiguring DNS Zone Transfers Installing and Configuring a Network Configuring DNS Zone TransfersManaging and Troubleshooting DNS Policy Server Managing and Troubleshooting DNSConfiguring DNS Resource Records Configuring RADIUS Clients and Servers Configuring DNS Resource RecordsConfiguring DNS Conditional Forwarding NPS Authentication Methods Configuring DNS Conditional ForwardingInstalling and Configuring DNS Zones Monitoring and Troubleshooting a Installing and Configuring DNS ZonesTroubleshooting DNS Network Policy Server Troubleshooting DNSOverview of AD DS Installing and Configuring NPS to Overview of AD DSImplementing Virtualized Domain Controllers Support RADIUS Implementing Virtualized DomainImplementing Read-Only Domain Configuring and Testing a RADIUS Client ControllersControllers Network Access Protection Overview Implementing Read-Only DomainAdministering AD DS Configuring NAP ControllersManaging the AD DS Database Configuring IPSec Enforcement for NAP Administering AD DSInstalling and Configuring a RODC Monitoring and Troubleshooting NAP Managing the AD DS DatabaseCreate and administer AD DS Snapshots Configuring NAP with VPN Enforcement Installing and Configuring a RODCConfiguring the Active Directory Recycle Bin Validating the Deployment Create and administer AD DS SnapshotsDeploy a domain controller by using domain Configuring IPSec Enforcement Configuring the Active Directory Recyclecontroller cloning Validating the Deployment BinConfiguring Password Policy and User Overview of FSRM Deploy a domain controller by usingAccount Using FSRM to Manage Quotas, File domain controller cloningConfiguring Managed Service Accounts Screens, and Storage Reports Configuring Password Policy and UserConfiguring Password Policy and Account Implementing Classification Management AccountLockout Settings and File Management Tasks Configuring Managed Service AccountsCreating and Associating a Group Managed DFS Overview Configuring Password Policy and AccountService Account Configuring DFS Namespaces Lockout SettingsIntroducing Group Policy Configuring and Troubleshooting DFS-R Creating and Associating a GroupImplementing and Administering GPOs Configuring FSRM Quotas Managed Service AccountGroup Policy Scope and Group Policy Configuring File Screening Introducing Group PolicyProcessing Installing the DFS role service Implementing and Administering GPOsTroubleshooting the Application of GPOs Configuring a DFS Namespace Group Policy Scope and Group PolicyCreating and Configuring GPOs Configuring DFS-R ProcessingManaging GPO Scope Module 10: Configuring Encryption and Troubleshooting the Application of GPOsVerify GPO Application Advanced Auditing Creating and Configuring GPOsManaging GPOs Encrypting Drives by Using BitLocker Managing GPO ScopeImplementing Administrative Templates Encrypting Files by Using Encrypting File Verify GPO ApplicationConfiguring Folder Redirection and Scripts System Managing GPOsConfiguring Group Policy Preferences Configuring Advanced Auditing Implementing Administrative TemplatesManaging Software with Group Policy Securing Data Drives by Using BitLocker Configuring Folder Redirection and ScriptsImplement Settings Using Group Policy Encrypting and Recovering Files Configuring Group Policy PreferencesPreferences Configuring Advanced Audit Policy Managing Software with Group PolicyManaging Office 2013 by using Configuration Implement Settings Using Group Policy

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Administrative Templates Overview of Windows Deployment PreferencesDeploying Software by using Group Policy Services Managing Office 2013 by usingConfiguring Folder Redirection Managing Windows Deployment Images Administrative TemplatesModule 6: Configuring and Troubleshooting Implementing Deployment with Windows Deploying Software by using Group PolicyRemote Access Deployment Services Configuring Folder RedirectionRemote Access Overview Administering Windows Deployment Module 6: Configuring andImplementing DirectAccess by Using the Services Troubleshooting Remote AccessGetting Started Wizard Installing and Configuring Windows Remote Access OverviewImplementing and Managing an Advanced Deployment Services Implementing DirectAccess by Using theDirectAccess Infrastructure Creating Operating System Images with Getting Started WizardImplementing VPN Windows Deployment Services Implementing and Managing an AdvancedImplementing Web Application Proxy Configuring Custom Computer Naming DirectAccess InfrastructureVerifying Readiness for a DirectAccess Deploying Images with Windows Implementing VPNDeployment Deployment Services Implementing Web Application ProxyRunning the Getting Started Wizard Overview of WSUS Verifying Readiness for a DirectAccessValidating the DirectAccess Deployment Deploying Updates with WSUS DeploymentPreparing the Environment for DirectAccess Implementing the WSUS Server Role Running the Getting Started WizardImplementing the Advanced DirectAccess Configuring Update Settings Validating the DirectAccess DeploymentInfrastructure Approving and Deploying an Update by Preparing the Environment forValidating the DirectAccess Deployment using WSUS DirectAccessImplementing VPN Monitoring Tools Implementing the Advanced DirectAccessValidating the VPN Deployment Using Performance Monitor InfrastructureImplementing Web Application Proxy Monitoring Event Logs Validating the DirectAccess DeploymentValidating the Web Application Proxy Establishing a Performance Baseline Implementing VPNDeployment Identifying the Source of a Performance Validating the VPN DeploymentInstalling and Configuring a Network Policy Problem Implementing Web Application ProxyServer Viewing and Configuring Centralized Validating the Web Application ProxyConfiguring RADIUS Clients and Servers Event Logs DeploymentNPS Authentication Methods Installing and Configuring a Network PolicyMonitoring and Troubleshooting a Network Lab : Implementing NAP with VPN ServerPolicy Server Enforcement Configuring RADIUS Clients and ServersInstalling and Configuring NPS to Support line NPS Authentication MethodsRADIUS Monitoring and Troubleshooting a NetworkConfiguring and Testing a RADIUS Client Policy ServerNetwork Access Protection Overview line Installing and Configuring NPS to SupportConfiguring NAP Configuring the DNS Server Role RADIUSConfiguring IPSec Enforcement for NAP Configuring DNS Zones Configuring and Testing a RADIUS ClientMonitoring and Troubleshooting NAP Configuring DNS Zone Transfers Network Access Protection OverviewConfiguring NAP with VPN Enforcement Managing and Troubleshooting DNS Configuring NAPValidating the Deployment Configuring DNS Resource Records Configuring IPSec Enforcement for NAPConfiguring IPSec Enforcement Configuring DNS Conditional Forwarding Monitoring and Troubleshooting NAPValidating the Deployment Installing and Configuring DNS Zones Configuring NAP with VPN EnforcementOverview of FSRM Troubleshooting DNS Validating the DeploymentUsing FSRM to Manage Quotas, File Overview of AD DS Configuring IPSec EnforcementScreens, and Storage Reports Implementing Virtualized Domain Validating the DeploymentImplementing Classification Management Controllers Overview of FSRMand File Management Tasks Implementing Read-Only Domain Using FSRM to Manage Quotas, FileDFS Overview Controllers Screens, and Storage ReportsConfiguring DFS Namespaces Administering AD DS Implementing Classification ManagementConfiguring and Troubleshooting DFS-R Managing the AD DS Database and File Management TasksConfiguring FSRM Quotas Installing and Configuring a RODC DFS OverviewConfiguring File Screening Create and administer AD DS Snapshots Configuring DFS NamespacesInstalling the DFS role service Configuring the Active Directory Recycle Configuring and Troubleshooting DFS-RConfiguring a DFS Namespace Bin Configuring FSRM QuotasConfiguring DFS-R Deploy a domain controller by using Configuring File ScreeningModule 10: Configuring Encryption and domain controller cloning Installing the DFS role serviceAdvanced Auditing Configuring Password Policy and User Configuring a DFS NamespaceEncrypting Drives by Using BitLocker Account Configuring DFS-REncrypting Files by Using Encrypting File Configuring Managed Service Accounts Module 10: Configuring Encryption andSystem Configuring Password Policy and Advanced AuditingConfiguring Advanced Auditing Account Lockout Settings Encrypting Drives by Using BitLockerSecuring Data Drives by Using BitLocker Creating and Associating a Group Encrypting Files by Using Encrypting FileEncrypting and Recovering Files Managed Service Account SystemConfiguring Advanced Audit Policy Introducing Group Policy Configuring Advanced AuditingConfiguration Implementing and Administering GPOs Securing Data Drives by Using BitLockerOverview of Windows Deployment Services Group Policy Scope and Group Policy Encrypting and Recovering Files

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Managing Windows Deployment Images Processing Configuring Advanced Audit PolicyImplementing Deployment with Windows Troubleshooting the Application of GPOs ConfigurationDeployment Services Creating and Configuring GPOs Overview of Windows DeploymentAdministering Windows Deployment Managing GPO Scope ServicesServices Verify GPO Application Managing Windows Deployment ImagesInstalling and Configuring Windows Managing GPOs Implementing Deployment with WindowsDeployment Services Implementing Administrative Templates Deployment ServicesCreating Operating System Images with Configuring Folder Redirection and Administering Windows DeploymentWindows Deployment Services Scripts ServicesConfiguring Custom Computer Naming Configuring Group Policy Preferences Installing and Configuring WindowsDeploying Images with Windows Managing Software with Group Policy Deployment ServicesDeployment Services Implement Settings Using Group Policy Creating Operating System Images withOverview of WSUS Preferences Windows Deployment ServicesDeploying Updates with WSUS Managing Office 2013 by using Configuring Custom Computer NamingImplementing the WSUS Server Role Administrative Templates Deploying Images with WindowsConfiguring Update Settings Deploying Software by using Group Deployment ServicesApproving and Deploying an Update by Policy Overview of WSUSusing WSUS Configuring Folder Redirection Deploying Updates with WSUSMonitoring Tools Module 6: Configuring and Implementing the WSUS Server RoleUsing Performance Monitor Troubleshooting Remote Access Configuring Update SettingsMonitoring Event Logs Remote Access Overview Approving and Deploying an Update byEstablishing a Performance Baseline Implementing DirectAccess by Using the using WSUSIdentifying the Source of a Performance Getting Started Wizard Monitoring ToolsProblem Implementing and Managing an Using Performance MonitorViewing and Configuring Centralized Event Advanced DirectAccess Infrastructure Monitoring Event LogsLogs Implementing VPN Establishing a Performance Baseline

Implementing Web Application Proxy Identifying the Source of a PerformanceVerifying Readiness for a DirectAccess Problem

line Deployment Viewing and Configuring Centralized EventConfiguring the DNS Server Role Running the Getting Started Wizard LogsConfiguring DNS Zones Validating the DirectAccess DeploymentConfiguring DNS Zone Transfers Preparing the Environment for Module 13: Monitoring Windows Server 2012Managing and Troubleshooting DNS DirectAccess lineConfiguring DNS Resource Records Implementing the AdvancedConfiguring DNS Conditional Forwarding DirectAccess InfrastructureInstalling and Configuring DNS Zones Validating the DirectAccess Deployment lineTroubleshooting DNS Implementing VPN Configuring the DNS Server RoleOverview of AD DS Validating the VPN Deployment Configuring DNS ZonesImplementing Virtualized Domain Controllers Implementing Web Application Proxy Configuring DNS Zone TransfersImplementing Read-Only Domain Validating the Web Application Proxy Managing and Troubleshooting DNSControllers Deployment Configuring DNS Resource RecordsAdministering AD DS Installing and Configuring a Network Configuring DNS Conditional ForwardingManaging the AD DS Database Policy Server Installing and Configuring DNS ZonesInstalling and Configuring a RODC Configuring RADIUS Clients and Servers Troubleshooting DNSCreate and administer AD DS Snapshots NPS Authentication Methods Overview of AD DSConfiguring the Active Directory Recycle Bin Monitoring and Troubleshooting a Implementing Virtualized DomainDeploy a domain controller by using domain Network Policy Server Controllerscontroller cloning Installing and Configuring NPS to Implementing Read-Only DomainConfiguring Password Policy and User Support RADIUS ControllersAccount Configuring and Testing a RADIUS Client Administering AD DSConfiguring Managed Service Accounts Network Access Protection Overview Managing the AD DS DatabaseConfiguring Password Policy and Account Configuring NAP Installing and Configuring a RODCLockout Settings Configuring IPSec Enforcement for NAP Create and administer AD DS SnapshotsCreating and Associating a Group Managed Monitoring and Troubleshooting NAP Configuring the Active Directory RecycleService Account Configuring NAP with VPN Enforcement BinIntroducing Group Policy Validating the Deployment Deploy a domain controller by usingImplementing and Administering GPOs Configuring IPSec Enforcement domain controller cloningGroup Policy Scope and Group Policy Validating the Deployment Configuring Password Policy and UserProcessing Overview of FSRM AccountTroubleshooting the Application of GPOs Using FSRM to Manage Quotas, File Configuring Managed Service AccountsCreating and Configuring GPOs Screens, and Storage Reports Configuring Password Policy and AccountManaging GPO Scope Implementing Classification Management Lockout SettingsVerify GPO Application and File Management Tasks Creating and Associating a GroupManaging GPOs DFS Overview Managed Service AccountImplementing Administrative Templates Configuring DFS Namespaces Introducing Group PolicyConfiguring Folder Redirection and Scripts Configuring and Troubleshooting DFS-R Implementing and Administering GPOs

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Configuring Group Policy Preferences Configuring FSRM Quotas Group Policy Scope and Group PolicyManaging Software with Group Policy Configuring File Screening ProcessingImplement Settings Using Group Policy Installing the DFS role service Troubleshooting the Application of GPOsPreferences Configuring a DFS Namespace Creating and Configuring GPOsManaging Office 2013 by using Configuring DFS-R Managing GPO ScopeAdministrative Templates Module 10: Configuring Encryption and Verify GPO ApplicationDeploying Software by using Group Policy Advanced Auditing Managing GPOsConfiguring Folder Redirection Encrypting Drives by Using BitLocker Implementing Administrative TemplatesModule 6: Configuring and Troubleshooting Encrypting Files by Using Encrypting File Configuring Folder Redirection and ScriptsRemote Access System Configuring Group Policy PreferencesRemote Access Overview Configuring Advanced Auditing Managing Software with Group PolicyImplementing DirectAccess by Using the Securing Data Drives by Using BitLocker Implement Settings Using Group PolicyGetting Started Wizard Encrypting and Recovering Files PreferencesImplementing and Managing an Advanced Configuring Advanced Audit Policy Managing Office 2013 by usingDirectAccess Infrastructure Configuration Administrative TemplatesImplementing VPN Overview of Windows Deployment Deploying Software by using Group PolicyImplementing Web Application Proxy Services Configuring Folder RedirectionVerifying Readiness for a DirectAccess Managing Windows Deployment Images Module 6: Configuring andDeployment Implementing Deployment with Windows Troubleshooting Remote AccessRunning the Getting Started Wizard Deployment Services Remote Access OverviewValidating the DirectAccess Deployment Administering Windows Deployment Implementing DirectAccess by Using thePreparing the Environment for DirectAccess Services Getting Started WizardImplementing the Advanced DirectAccess Installing and Configuring Windows Implementing and Managing an AdvancedInfrastructure Deployment Services DirectAccess InfrastructureValidating the DirectAccess Deployment Creating Operating System Images with Implementing VPNImplementing VPN Windows Deployment Services Implementing Web Application ProxyValidating the VPN Deployment Configuring Custom Computer Naming Verifying Readiness for a DirectAccessImplementing Web Application Proxy Deploying Images with Windows DeploymentValidating the Web Application Proxy Deployment Services Running the Getting Started WizardDeployment Overview of WSUS Validating the DirectAccess DeploymentInstalling and Configuring a Network Policy Deploying Updates with WSUS Preparing the Environment forServer Implementing the WSUS Server Role DirectAccessConfiguring RADIUS Clients and Servers Configuring Update Settings Implementing the Advanced DirectAccessNPS Authentication Methods Approving and Deploying an Update by InfrastructureMonitoring and Troubleshooting a Network using WSUS Validating the DirectAccess DeploymentPolicy Server Monitoring Tools Implementing VPNInstalling and Configuring NPS to Support Using Performance Monitor Validating the VPN DeploymentRADIUS Monitoring Event Logs Implementing Web Application ProxyConfiguring and Testing a RADIUS Client Establishing a Performance Baseline Validating the Web Application ProxyNetwork Access Protection Overview Identifying the Source of a Performance DeploymentConfiguring NAP Problem Installing and Configuring a Network PolicyConfiguring IPSec Enforcement for NAP Viewing and Configuring Centralized ServerMonitoring and Troubleshooting NAP Event Logs Configuring RADIUS Clients and ServersConfiguring NAP with VPN Enforcement NPS Authentication MethodsValidating the Deployment Monitoring and Troubleshooting a NetworkConfiguring IPSec Enforcement line Policy ServerValidating the Deployment Configuring the DNS Server Role Installing and Configuring NPS to SupportOverview of FSRM Configuring DNS Zones RADIUSUsing FSRM to Manage Quotas, File Configuring DNS Zone Transfers Configuring and Testing a RADIUS ClientScreens, and Storage Reports Managing and Troubleshooting DNS Network Access Protection OverviewImplementing Classification Management Configuring DNS Resource Records Configuring NAPand File Management Tasks Configuring DNS Conditional Forwarding Configuring IPSec Enforcement for NAPDFS Overview Installing and Configuring DNS Zones Monitoring and Troubleshooting NAPConfiguring DFS Namespaces Troubleshooting DNS Configuring NAP with VPN EnforcementConfiguring and Troubleshooting DFS-R Overview of AD DS Validating the DeploymentConfiguring FSRM Quotas Implementing Virtualized Domain Configuring IPSec EnforcementConfiguring File Screening Controllers Validating the DeploymentInstalling the DFS role service Implementing Read-Only Domain Overview of FSRMConfiguring a DFS Namespace Controllers Using FSRM to Manage Quotas, FileConfiguring DFS-R Administering AD DS Screens, and Storage ReportsModule 10: Configuring Encryption and Managing the AD DS Database Implementing Classification ManagementAdvanced Auditing Installing and Configuring a RODC and File Management TasksEncrypting Drives by Using BitLocker Create and administer AD DS Snapshots DFS OverviewEncrypting Files by Using Encrypting File Configuring the Active Directory Recycle Configuring DFS NamespacesSystem Bin Configuring and Troubleshooting DFS-RConfiguring Advanced Auditing Deploy a domain controller by using Configuring FSRM Quotas

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Securing Data Drives by Using BitLocker domain controller cloning Configuring File ScreeningEncrypting and Recovering Files Configuring Password Policy and User Installing the DFS role serviceConfiguring Advanced Audit Policy Account Configuring a DFS NamespaceConfiguration Configuring Managed Service Accounts Configuring DFS-ROverview of Windows Deployment Services Configuring Password Policy and Module 10: Configuring Encryption andManaging Windows Deployment Images Account Lockout Settings Advanced AuditingImplementing Deployment with Windows Creating and Associating a Group Encrypting Drives by Using BitLockerDeployment Services Managed Service Account Encrypting Files by Using Encrypting FileAdministering Windows Deployment Introducing Group Policy SystemServices Implementing and Administering GPOs Configuring Advanced AuditingInstalling and Configuring Windows Group Policy Scope and Group Policy Securing Data Drives by Using BitLockerDeployment Services Processing Encrypting and Recovering FilesCreating Operating System Images with Troubleshooting the Application of GPOs Configuring Advanced Audit PolicyWindows Deployment Services Creating and Configuring GPOs ConfigurationConfiguring Custom Computer Naming Managing GPO Scope Overview of Windows DeploymentDeploying Images with Windows Verify GPO Application ServicesDeployment Services Managing GPOs Managing Windows Deployment ImagesOverview of WSUS Implementing Administrative Templates Implementing Deployment with WindowsDeploying Updates with WSUS Configuring Folder Redirection and Deployment ServicesImplementing the WSUS Server Role Scripts Administering Windows DeploymentConfiguring Update Settings Configuring Group Policy Preferences ServicesApproving and Deploying an Update by Managing Software with Group Policy Installing and Configuring Windowsusing WSUS Implement Settings Using Group Policy Deployment ServicesMonitoring Tools Preferences Creating Operating System Images withUsing Performance Monitor Managing Office 2013 by using Windows Deployment ServicesMonitoring Event Logs Administrative Templates Configuring Custom Computer NamingEstablishing a Performance Baseline Deploying Software by using Group Deploying Images with WindowsIdentifying the Source of a Performance Policy Deployment ServicesProblem Configuring Folder Redirection Overview of WSUSViewing and Configuring Centralized Event Module 6: Configuring and Deploying Updates with WSUSLogs Troubleshooting Remote Access Implementing the WSUS Server Role

Remote Access Overview Configuring Update SettingsImplementing DirectAccess by Using the Approving and Deploying an Update by

line Getting Started Wizard using WSUSConfiguring the DNS Server Role Implementing and Managing an Monitoring ToolsConfiguring DNS Zones Advanced DirectAccess Infrastructure Using Performance MonitorConfiguring DNS Zone Transfers Implementing VPN Monitoring Event LogsManaging and Troubleshooting DNS Implementing Web Application Proxy Establishing a Performance BaselineConfiguring DNS Resource Records Verifying Readiness for a DirectAccess Identifying the Source of a PerformanceConfiguring DNS Conditional Forwarding Deployment ProblemInstalling and Configuring DNS Zones Running the Getting Started Wizard Viewing and Configuring Centralized EventTroubleshooting DNS Validating the DirectAccess Deployment LogsOverview of AD DS Preparing the Environment forImplementing Virtualized Domain Controllers DirectAccessImplementing Read-Only Domain Implementing the Advanced lineControllers DirectAccess Infrastructure Configuring the DNS Server RoleAdministering AD DS Validating the DirectAccess Deployment Configuring DNS ZonesManaging the AD DS Database Implementing VPN Configuring DNS Zone TransfersInstalling and Configuring a RODC Validating the VPN Deployment Managing and Troubleshooting DNSCreate and administer AD DS Snapshots Implementing Web Application Proxy Configuring DNS Resource RecordsConfiguring the Active Directory Recycle Bin Validating the Web Application Proxy Configuring DNS Conditional ForwardingDeploy a domain controller by using domain Deployment Installing and Configuring DNS Zonescontroller cloning Installing and Configuring a Network Troubleshooting DNSConfiguring Password Policy and User Policy Server Overview of AD DSAccount Configuring RADIUS Clients and Servers Implementing Virtualized DomainConfiguring Managed Service Accounts NPS Authentication Methods ControllersConfiguring Password Policy and Account Monitoring and Troubleshooting a Implementing Read-Only DomainLockout Settings Network Policy Server ControllersCreating and Associating a Group Managed Installing and Configuring NPS to Administering AD DSService Account Support RADIUS Managing the AD DS DatabaseIntroducing Group Policy Configuring and Testing a RADIUS Client Installing and Configuring a RODCImplementing and Administering GPOs Network Access Protection Overview Create and administer AD DS SnapshotsGroup Policy Scope and Group Policy Configuring NAP Configuring the Active Directory RecycleProcessing Configuring IPSec Enforcement for NAP BinTroubleshooting the Application of GPOs Monitoring and Troubleshooting NAP Deploy a domain controller by usingCreating and Configuring GPOs Configuring NAP with VPN Enforcement domain controller cloning

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Managing GPO Scope Validating the Deployment Configuring Password Policy and UserVerify GPO Application Configuring IPSec Enforcement AccountManaging GPOs Validating the Deployment Configuring Managed Service AccountsImplementing Administrative Templates Overview of FSRM Configuring Password Policy and AccountConfiguring Folder Redirection and Scripts Using FSRM to Manage Quotas, File Lockout SettingsConfiguring Group Policy Preferences Screens, and Storage Reports Creating and Associating a GroupManaging Software with Group Policy Implementing Classification Management Managed Service AccountImplement Settings Using Group Policy and File Management Tasks Introducing Group PolicyPreferences DFS Overview Implementing and Administering GPOsManaging Office 2013 by using Configuring DFS Namespaces Group Policy Scope and Group PolicyAdministrative Templates Configuring and Troubleshooting DFS-R ProcessingDeploying Software by using Group Policy Configuring FSRM Quotas Troubleshooting the Application of GPOsConfiguring Folder Redirection Configuring File Screening Creating and Configuring GPOsModule 6: Configuring and Troubleshooting Installing the DFS role service Managing GPO ScopeRemote Access Configuring a DFS Namespace Verify GPO ApplicationRemote Access Overview Configuring DFS-R Managing GPOsImplementing DirectAccess by Using the Module 10: Configuring Encryption and Implementing Administrative TemplatesGetting Started Wizard Advanced Auditing Configuring Folder Redirection and ScriptsImplementing and Managing an Advanced Encrypting Drives by Using BitLocker Configuring Group Policy PreferencesDirectAccess Infrastructure Encrypting Files by Using Encrypting File Managing Software with Group PolicyImplementing VPN System Implement Settings Using Group PolicyImplementing Web Application Proxy Configuring Advanced Auditing PreferencesVerifying Readiness for a DirectAccess Securing Data Drives by Using BitLocker Managing Office 2013 by usingDeployment Encrypting and Recovering Files Administrative TemplatesRunning the Getting Started Wizard Configuring Advanced Audit Policy Deploying Software by using Group PolicyValidating the DirectAccess Deployment Configuration Configuring Folder RedirectionPreparing the Environment for DirectAccess Overview of Windows Deployment Module 6: Configuring andImplementing the Advanced DirectAccess Services Troubleshooting Remote AccessInfrastructure Managing Windows Deployment Images Remote Access OverviewValidating the DirectAccess Deployment Implementing Deployment with Windows Implementing DirectAccess by Using theImplementing VPN Deployment Services Getting Started WizardValidating the VPN Deployment Administering Windows Deployment Implementing and Managing an AdvancedImplementing Web Application Proxy Services DirectAccess InfrastructureValidating the Web Application Proxy Installing and Configuring Windows Implementing VPNDeployment Deployment Services Implementing Web Application ProxyInstalling and Configuring a Network Policy Creating Operating System Images with Verifying Readiness for a DirectAccessServer Windows Deployment Services DeploymentConfiguring RADIUS Clients and Servers Configuring Custom Computer Naming Running the Getting Started WizardNPS Authentication Methods Deploying Images with Windows Validating the DirectAccess DeploymentMonitoring and Troubleshooting a Network Deployment Services Preparing the Environment forPolicy Server Overview of WSUS DirectAccessInstalling and Configuring NPS to Support Deploying Updates with WSUS Implementing the Advanced DirectAccessRADIUS Implementing the WSUS Server Role InfrastructureConfiguring and Testing a RADIUS Client Configuring Update Settings Validating the DirectAccess DeploymentNetwork Access Protection Overview Approving and Deploying an Update by Implementing VPNConfiguring NAP using WSUS Validating the VPN DeploymentConfiguring IPSec Enforcement for NAP Monitoring Tools Implementing Web Application ProxyMonitoring and Troubleshooting NAP Using Performance Monitor Validating the Web Application ProxyConfiguring NAP with VPN Enforcement Monitoring Event Logs DeploymentValidating the Deployment Establishing a Performance Baseline Installing and Configuring a Network PolicyConfiguring IPSec Enforcement Identifying the Source of a Performance ServerValidating the Deployment Problem Configuring RADIUS Clients and ServersOverview of FSRM Viewing and Configuring Centralized NPS Authentication MethodsUsing FSRM to Manage Quotas, File Event Logs Monitoring and Troubleshooting a NetworkScreens, and Storage Reports Policy ServerImplementing Classification Management Installing and Configuring NPS to Supportand File Management Tasks line RADIUSDFS Overview Configuring the DNS Server Role Configuring and Testing a RADIUS ClientConfiguring DFS Namespaces Configuring DNS Zones Network Access Protection OverviewConfiguring and Troubleshooting DFS-R Configuring DNS Zone Transfers Configuring NAPConfiguring FSRM Quotas Managing and Troubleshooting DNS Configuring IPSec Enforcement for NAPConfiguring File Screening Configuring DNS Resource Records Monitoring and Troubleshooting NAPInstalling the DFS role service Configuring DNS Conditional Forwarding Configuring NAP with VPN EnforcementConfiguring a DFS Namespace Installing and Configuring DNS Zones Validating the DeploymentConfiguring DFS-R Troubleshooting DNS Configuring IPSec EnforcementModule 10: Configuring Encryption and Overview of AD DS Validating the Deployment

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Advanced Auditing Implementing Virtualized Domain Overview of FSRMEncrypting Drives by Using BitLocker Controllers Using FSRM to Manage Quotas, FileEncrypting Files by Using Encrypting File Implementing Read-Only Domain Screens, and Storage ReportsSystem Controllers Implementing Classification ManagementConfiguring Advanced Auditing Administering AD DS and File Management TasksSecuring Data Drives by Using BitLocker Managing the AD DS Database DFS OverviewEncrypting and Recovering Files Installing and Configuring a RODC Configuring DFS NamespacesConfiguring Advanced Audit Policy Create and administer AD DS Snapshots Configuring and Troubleshooting DFS-RConfiguration Configuring the Active Directory Recycle Configuring FSRM QuotasOverview of Windows Deployment Services Bin Configuring File ScreeningManaging Windows Deployment Images Deploy a domain controller by using Installing the DFS role serviceImplementing Deployment with Windows domain controller cloning Configuring a DFS NamespaceDeployment Services Configuring Password Policy and User Configuring DFS-RAdministering Windows Deployment Account Module 10: Configuring Encryption andServices Configuring Managed Service Accounts Advanced AuditingInstalling and Configuring Windows Configuring Password Policy and Encrypting Drives by Using BitLockerDeployment Services Account Lockout Settings Encrypting Files by Using Encrypting FileCreating Operating System Images with Creating and Associating a Group SystemWindows Deployment Services Managed Service Account Configuring Advanced AuditingConfiguring Custom Computer Naming Introducing Group Policy Securing Data Drives by Using BitLockerDeploying Images with Windows Implementing and Administering GPOs Encrypting and Recovering FilesDeployment Services Group Policy Scope and Group Policy Configuring Advanced Audit PolicyOverview of WSUS Processing ConfigurationDeploying Updates with WSUS Troubleshooting the Application of GPOs Overview of Windows DeploymentImplementing the WSUS Server Role Creating and Configuring GPOs ServicesConfiguring Update Settings Managing GPO Scope Managing Windows Deployment ImagesApproving and Deploying an Update by Verify GPO Application Implementing Deployment with Windowsusing WSUS Managing GPOs Deployment ServicesMonitoring Tools Implementing Administrative Templates Administering Windows DeploymentUsing Performance Monitor Configuring Folder Redirection and ServicesMonitoring Event Logs Scripts Installing and Configuring WindowsEstablishing a Performance Baseline Configuring Group Policy Preferences Deployment ServicesIdentifying the Source of a Performance Managing Software with Group Policy Creating Operating System Images withProblem Implement Settings Using Group Policy Windows Deployment ServicesViewing and Configuring Centralized Event Preferences Configuring Custom Computer NamingLogs Managing Office 2013 by using Deploying Images with Windows

Administrative Templates Deployment ServicesDeploying Software by using Group Overview of WSUS

line Policy Deploying Updates with WSUSConfiguring the DNS Server Role Configuring Folder Redirection Implementing the WSUS Server RoleConfiguring DNS Zones Module 6: Configuring and Configuring Update SettingsConfiguring DNS Zone Transfers Troubleshooting Remote Access Approving and Deploying an Update byManaging and Troubleshooting DNS Remote Access Overview using WSUSConfiguring DNS Resource Records Implementing DirectAccess by Using the Monitoring ToolsConfiguring DNS Conditional Forwarding Getting Started Wizard Using Performance MonitorInstalling and Configuring DNS Zones Implementing and Managing an Monitoring Event LogsTroubleshooting DNS Advanced DirectAccess Infrastructure Establishing a Performance BaselineOverview of AD DS Implementing VPN Identifying the Source of a PerformanceImplementing Virtualized Domain Controllers Implementing Web Application Proxy ProblemImplementing Read-Only Domain Verifying Readiness for a DirectAccess Viewing and Configuring Centralized EventControllers Deployment LogsAdministering AD DS Running the Getting Started WizardManaging the AD DS Database Validating the DirectAccess DeploymentInstalling and Configuring a RODC Preparing the Environment for lineCreate and administer AD DS Snapshots DirectAccess Configuring the DNS Server RoleConfiguring the Active Directory Recycle Bin Implementing the Advanced Configuring DNS ZonesDeploy a domain controller by using domain DirectAccess Infrastructure Configuring DNS Zone Transferscontroller cloning Validating the DirectAccess Deployment Managing and Troubleshooting DNSConfiguring Password Policy and User Implementing VPN Configuring DNS Resource RecordsAccount Validating the VPN Deployment Configuring DNS Conditional ForwardingConfiguring Managed Service Accounts Implementing Web Application Proxy Installing and Configuring DNS ZonesConfiguring Password Policy and Account Validating the Web Application Proxy Troubleshooting DNSLockout Settings Deployment Overview of AD DSCreating and Associating a Group Managed Installing and Configuring a Network Implementing Virtualized DomainService Account Policy Server ControllersIntroducing Group Policy Configuring RADIUS Clients and Servers Implementing Read-Only Domain

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Implementing and Administering GPOs NPS Authentication Methods ControllersGroup Policy Scope and Group Policy Monitoring and Troubleshooting a Administering AD DSProcessing Network Policy Server Managing the AD DS DatabaseTroubleshooting the Application of GPOs Installing and Configuring NPS to Installing and Configuring a RODCCreating and Configuring GPOs Support RADIUS Create and administer AD DS SnapshotsManaging GPO Scope Configuring and Testing a RADIUS Client Configuring the Active Directory RecycleVerify GPO Application Network Access Protection Overview BinManaging GPOs Configuring NAP Deploy a domain controller by usingImplementing Administrative Templates Configuring IPSec Enforcement for NAP domain controller cloningConfiguring Folder Redirection and Scripts Monitoring and Troubleshooting NAP Configuring Password Policy and UserConfiguring Group Policy Preferences Configuring NAP with VPN Enforcement AccountManaging Software with Group Policy Validating the Deployment Configuring Managed Service AccountsImplement Settings Using Group Policy Configuring IPSec Enforcement Configuring Password Policy and AccountPreferences Validating the Deployment Lockout SettingsManaging Office 2013 by using Overview of FSRM Creating and Associating a GroupAdministrative Templates Using FSRM to Manage Quotas, File Managed Service AccountDeploying Software by using Group Policy Screens, and Storage Reports Introducing Group PolicyConfiguring Folder Redirection Implementing Classification Management Implementing and Administering GPOsModule 6: Configuring and Troubleshooting and File Management Tasks Group Policy Scope and Group PolicyRemote Access DFS Overview ProcessingRemote Access Overview Configuring DFS Namespaces Troubleshooting the Application of GPOsImplementing DirectAccess by Using the Configuring and Troubleshooting DFS-R Creating and Configuring GPOsGetting Started Wizard Configuring FSRM Quotas Managing GPO ScopeImplementing and Managing an Advanced Configuring File Screening Verify GPO ApplicationDirectAccess Infrastructure Installing the DFS role service Managing GPOsImplementing VPN Configuring a DFS Namespace Implementing Administrative TemplatesImplementing Web Application Proxy Configuring DFS-R Configuring Folder Redirection and ScriptsVerifying Readiness for a DirectAccess Module 10: Configuring Encryption and Configuring Group Policy PreferencesDeployment Advanced Auditing Managing Software with Group PolicyRunning the Getting Started Wizard Encrypting Drives by Using BitLocker Implement Settings Using Group PolicyValidating the DirectAccess Deployment Encrypting Files by Using Encrypting File PreferencesPreparing the Environment for DirectAccess System Managing Office 2013 by usingImplementing the Advanced DirectAccess Configuring Advanced Auditing Administrative TemplatesInfrastructure Securing Data Drives by Using BitLocker Deploying Software by using Group PolicyValidating the DirectAccess Deployment Encrypting and Recovering Files Configuring Folder RedirectionImplementing VPN Configuring Advanced Audit Policy Module 6: Configuring andValidating the VPN Deployment Configuration Troubleshooting Remote AccessImplementing Web Application Proxy Overview of Windows Deployment Remote Access OverviewValidating the Web Application Proxy Services Implementing DirectAccess by Using theDeployment Managing Windows Deployment Images Getting Started WizardInstalling and Configuring a Network Policy Implementing Deployment with Windows Implementing and Managing an AdvancedServer Deployment Services DirectAccess InfrastructureConfiguring RADIUS Clients and Servers Administering Windows Deployment Implementing VPNNPS Authentication Methods Services Implementing Web Application ProxyMonitoring and Troubleshooting a Network Installing and Configuring Windows Verifying Readiness for a DirectAccessPolicy Server Deployment Services DeploymentInstalling and Configuring NPS to Support Creating Operating System Images with Running the Getting Started WizardRADIUS Windows Deployment Services Validating the DirectAccess DeploymentConfiguring and Testing a RADIUS Client Configuring Custom Computer Naming Preparing the Environment forNetwork Access Protection Overview Deploying Images with Windows DirectAccessConfiguring NAP Deployment Services Implementing the Advanced DirectAccessConfiguring IPSec Enforcement for NAP Overview of WSUS InfrastructureMonitoring and Troubleshooting NAP Deploying Updates with WSUS Validating the DirectAccess DeploymentConfiguring NAP with VPN Enforcement Implementing the WSUS Server Role Implementing VPNValidating the Deployment Configuring Update Settings Validating the VPN DeploymentConfiguring IPSec Enforcement Approving and Deploying an Update by Implementing Web Application ProxyValidating the Deployment using WSUS Validating the Web Application ProxyOverview of FSRM Monitoring Tools DeploymentUsing FSRM to Manage Quotas, File Using Performance Monitor Installing and Configuring a Network PolicyScreens, and Storage Reports Monitoring Event Logs ServerImplementing Classification Management Establishing a Performance Baseline Configuring RADIUS Clients and Serversand File Management Tasks Identifying the Source of a Performance NPS Authentication MethodsDFS Overview Problem Monitoring and Troubleshooting a NetworkConfiguring DFS Namespaces Viewing and Configuring Centralized Policy ServerConfiguring and Troubleshooting DFS-R Event Logs Installing and Configuring NPS to SupportConfiguring FSRM Quotas RADIUS

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Configuring File Screening Lab : Implementing IPSec Enforcement for Configuring and Testing a RADIUS ClientInstalling the DFS role service NAP Network Access Protection OverviewConfiguring a DFS Namespace line Configuring NAPConfiguring DFS-R Configuring IPSec Enforcement for NAPModule 10: Configuring Encryption and Monitoring and Troubleshooting NAPAdvanced Auditing line Configuring NAP with VPN EnforcementEncrypting Drives by Using BitLocker Configuring the DNS Server Role Validating the DeploymentEncrypting Files by Using Encrypting File Configuring DNS Zones Configuring IPSec EnforcementSystem Configuring DNS Zone Transfers Validating the DeploymentConfiguring Advanced Auditing Managing and Troubleshooting DNS Overview of FSRMSecuring Data Drives by Using BitLocker Configuring DNS Resource Records Using FSRM to Manage Quotas, FileEncrypting and Recovering Files Configuring DNS Conditional Forwarding Screens, and Storage ReportsConfiguring Advanced Audit Policy Installing and Configuring DNS Zones Implementing Classification ManagementConfiguration Troubleshooting DNS and File Management TasksOverview of Windows Deployment Services Overview of AD DS DFS OverviewManaging Windows Deployment Images Implementing Virtualized Domain Configuring DFS NamespacesImplementing Deployment with Windows Controllers Configuring and Troubleshooting DFS-RDeployment Services Implementing Read-Only Domain Configuring FSRM QuotasAdministering Windows Deployment Controllers Configuring File ScreeningServices Administering AD DS Installing the DFS role serviceInstalling and Configuring Windows Managing the AD DS Database Configuring a DFS NamespaceDeployment Services Installing and Configuring a RODC Configuring DFS-RCreating Operating System Images with Create and administer AD DS Snapshots Module 10: Configuring Encryption andWindows Deployment Services Configuring the Active Directory Recycle Advanced AuditingConfiguring Custom Computer Naming Bin Encrypting Drives by Using BitLockerDeploying Images with Windows Deploy a domain controller by using Encrypting Files by Using Encrypting FileDeployment Services domain controller cloning SystemOverview of WSUS Configuring Password Policy and User Configuring Advanced AuditingDeploying Updates with WSUS Account Securing Data Drives by Using BitLockerImplementing the WSUS Server Role Configuring Managed Service Accounts Encrypting and Recovering FilesConfiguring Update Settings Configuring Password Policy and Configuring Advanced Audit PolicyApproving and Deploying an Update by Account Lockout Settings Configurationusing WSUS Creating and Associating a Group Overview of Windows DeploymentMonitoring Tools Managed Service Account ServicesUsing Performance Monitor Introducing Group Policy Managing Windows Deployment ImagesMonitoring Event Logs Implementing and Administering GPOs Implementing Deployment with WindowsEstablishing a Performance Baseline Group Policy Scope and Group Policy Deployment ServicesIdentifying the Source of a Performance Processing Administering Windows DeploymentProblem Troubleshooting the Application of GPOs ServicesViewing and Configuring Centralized Event Creating and Configuring GPOs Installing and Configuring WindowsLogs Managing GPO Scope Deployment Services

Verify GPO Application Creating Operating System Images withManaging GPOs Windows Deployment Services

line Implementing Administrative Templates Configuring Custom Computer NamingConfiguring the DNS Server Role Configuring Folder Redirection and Deploying Images with WindowsConfiguring DNS Zones Scripts Deployment ServicesConfiguring DNS Zone Transfers Configuring Group Policy Preferences Overview of WSUSManaging and Troubleshooting DNS Managing Software with Group Policy Deploying Updates with WSUSConfiguring DNS Resource Records Implement Settings Using Group Policy Implementing the WSUS Server RoleConfiguring DNS Conditional Forwarding Preferences Configuring Update SettingsInstalling and Configuring DNS Zones Managing Office 2013 by using Approving and Deploying an Update byTroubleshooting DNS Administrative Templates using WSUSOverview of AD DS Deploying Software by using Group Monitoring ToolsImplementing Virtualized Domain Controllers Policy Using Performance MonitorImplementing Read-Only Domain Configuring Folder Redirection Monitoring Event LogsControllers Module 6: Configuring and Establishing a Performance BaselineAdministering AD DS Troubleshooting Remote Access Identifying the Source of a PerformanceManaging the AD DS Database Remote Access Overview ProblemInstalling and Configuring a RODC Implementing DirectAccess by Using the Viewing and Configuring Centralized EventCreate and administer AD DS Snapshots Getting Started Wizard LogsConfiguring the Active Directory Recycle Bin Implementing and Managing anDeploy a domain controller by using domain Advanced DirectAccess Infrastructurecontroller cloning Implementing VPN lineConfiguring Password Policy and User Implementing Web Application Proxy Configuring the DNS Server RoleAccount Verifying Readiness for a DirectAccess Configuring DNS ZonesConfiguring Managed Service Accounts Deployment Configuring DNS Zone Transfers

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Configuring Password Policy and Account Running the Getting Started Wizard Managing and Troubleshooting DNSLockout Settings Validating the DirectAccess Deployment Configuring DNS Resource RecordsCreating and Associating a Group Managed Preparing the Environment for Configuring DNS Conditional ForwardingService Account DirectAccess Installing and Configuring DNS ZonesIntroducing Group Policy Implementing the Advanced Troubleshooting DNSImplementing and Administering GPOs DirectAccess Infrastructure Overview of AD DSGroup Policy Scope and Group Policy Validating the DirectAccess Deployment Implementing Virtualized DomainProcessing Implementing VPN ControllersTroubleshooting the Application of GPOs Validating the VPN Deployment Implementing Read-Only DomainCreating and Configuring GPOs Implementing Web Application Proxy ControllersManaging GPO Scope Validating the Web Application Proxy Administering AD DSVerify GPO Application Deployment Managing the AD DS DatabaseManaging GPOs Installing and Configuring a Network Installing and Configuring a RODCImplementing Administrative Templates Policy Server Create and administer AD DS SnapshotsConfiguring Folder Redirection and Scripts Configuring RADIUS Clients and Servers Configuring the Active Directory RecycleConfiguring Group Policy Preferences NPS Authentication Methods BinManaging Software with Group Policy Monitoring and Troubleshooting a Deploy a domain controller by usingImplement Settings Using Group Policy Network Policy Server domain controller cloningPreferences Installing and Configuring NPS to Configuring Password Policy and UserManaging Office 2013 by using Support RADIUS AccountAdministrative Templates Configuring and Testing a RADIUS Client Configuring Managed Service AccountsDeploying Software by using Group Policy Network Access Protection Overview Configuring Password Policy and AccountConfiguring Folder Redirection Configuring NAP Lockout SettingsModule 6: Configuring and Troubleshooting Configuring IPSec Enforcement for NAP Creating and Associating a GroupRemote Access Monitoring and Troubleshooting NAP Managed Service AccountRemote Access Overview Configuring NAP with VPN Enforcement Introducing Group PolicyImplementing DirectAccess by Using the Validating the Deployment Implementing and Administering GPOsGetting Started Wizard Configuring IPSec Enforcement Group Policy Scope and Group PolicyImplementing and Managing an Advanced Validating the Deployment ProcessingDirectAccess Infrastructure Overview of FSRM Troubleshooting the Application of GPOsImplementing VPN Using FSRM to Manage Quotas, File Creating and Configuring GPOsImplementing Web Application Proxy Screens, and Storage Reports Managing GPO ScopeVerifying Readiness for a DirectAccess Implementing Classification Management Verify GPO ApplicationDeployment and File Management Tasks Managing GPOsRunning the Getting Started Wizard DFS Overview Implementing Administrative TemplatesValidating the DirectAccess Deployment Configuring DFS Namespaces Configuring Folder Redirection and ScriptsPreparing the Environment for DirectAccess Configuring and Troubleshooting DFS-R Configuring Group Policy PreferencesImplementing the Advanced DirectAccess Configuring FSRM Quotas Managing Software with Group PolicyInfrastructure Configuring File Screening Implement Settings Using Group PolicyValidating the DirectAccess Deployment Installing the DFS role service PreferencesImplementing VPN Configuring a DFS Namespace Managing Office 2013 by usingValidating the VPN Deployment Configuring DFS-R Administrative TemplatesImplementing Web Application Proxy Module 10: Configuring Encryption and Deploying Software by using Group PolicyValidating the Web Application Proxy Advanced Auditing Configuring Folder RedirectionDeployment Encrypting Drives by Using BitLocker Module 6: Configuring andInstalling and Configuring a Network Policy Encrypting Files by Using Encrypting File Troubleshooting Remote AccessServer System Remote Access OverviewConfiguring RADIUS Clients and Servers Configuring Advanced Auditing Implementing DirectAccess by Using theNPS Authentication Methods Securing Data Drives by Using BitLocker Getting Started WizardMonitoring and Troubleshooting a Network Encrypting and Recovering Files Implementing and Managing an AdvancedPolicy Server Configuring Advanced Audit Policy DirectAccess InfrastructureInstalling and Configuring NPS to Support Configuration Implementing VPNRADIUS Overview of Windows Deployment Implementing Web Application ProxyConfiguring and Testing a RADIUS Client Services Verifying Readiness for a DirectAccessNetwork Access Protection Overview Managing Windows Deployment Images DeploymentConfiguring NAP Implementing Deployment with Windows Running the Getting Started WizardConfiguring IPSec Enforcement for NAP Deployment Services Validating the DirectAccess DeploymentMonitoring and Troubleshooting NAP Administering Windows Deployment Preparing the Environment forConfiguring NAP with VPN Enforcement Services DirectAccessValidating the Deployment Installing and Configuring Windows Implementing the Advanced DirectAccessConfiguring IPSec Enforcement Deployment Services InfrastructureValidating the Deployment Creating Operating System Images with Validating the DirectAccess DeploymentOverview of FSRM Windows Deployment Services Implementing VPNUsing FSRM to Manage Quotas, File Configuring Custom Computer Naming Validating the VPN DeploymentScreens, and Storage Reports Deploying Images with Windows Implementing Web Application ProxyImplementing Classification Management Deployment Services Validating the Web Application Proxy

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

and File Management Tasks Overview of WSUS DeploymentDFS Overview Deploying Updates with WSUS Installing and Configuring a Network PolicyConfiguring DFS Namespaces Implementing the WSUS Server Role ServerConfiguring and Troubleshooting DFS-R Configuring Update Settings Configuring RADIUS Clients and ServersConfiguring FSRM Quotas Approving and Deploying an Update by NPS Authentication MethodsConfiguring File Screening using WSUS Monitoring and Troubleshooting a NetworkInstalling the DFS role service Monitoring Tools Policy ServerConfiguring a DFS Namespace Using Performance Monitor Installing and Configuring NPS to SupportConfiguring DFS-R Monitoring Event Logs RADIUSModule 10: Configuring Encryption and Establishing a Performance Baseline Configuring and Testing a RADIUS ClientAdvanced Auditing Identifying the Source of a Performance Network Access Protection OverviewEncrypting Drives by Using BitLocker Problem Configuring NAPEncrypting Files by Using Encrypting File Viewing and Configuring Centralized Configuring IPSec Enforcement for NAPSystem Event Logs Monitoring and Troubleshooting NAPConfiguring Advanced Auditing Configuring NAP with VPN EnforcementSecuring Data Drives by Using BitLocker Validating the DeploymentEncrypting and Recovering Files line Configuring IPSec EnforcementConfiguring Advanced Audit Policy Configuring the DNS Server Role Validating the DeploymentConfiguration Configuring DNS Zones Overview of FSRMOverview of Windows Deployment Services Configuring DNS Zone Transfers Using FSRM to Manage Quotas, FileManaging Windows Deployment Images Managing and Troubleshooting DNS Screens, and Storage ReportsImplementing Deployment with Windows Configuring DNS Resource Records Implementing Classification ManagementDeployment Services Configuring DNS Conditional Forwarding and File Management TasksAdministering Windows Deployment Installing and Configuring DNS Zones DFS OverviewServices Troubleshooting DNS Configuring DFS NamespacesInstalling and Configuring Windows Overview of AD DS Configuring and Troubleshooting DFS-RDeployment Services Implementing Virtualized Domain Configuring FSRM QuotasCreating Operating System Images with Controllers Configuring File ScreeningWindows Deployment Services Implementing Read-Only Domain Installing the DFS role serviceConfiguring Custom Computer Naming Controllers Configuring a DFS NamespaceDeploying Images with Windows Administering AD DS Configuring DFS-RDeployment Services Managing the AD DS Database Module 10: Configuring Encryption andOverview of WSUS Installing and Configuring a RODC Advanced AuditingDeploying Updates with WSUS Create and administer AD DS Snapshots Encrypting Drives by Using BitLockerImplementing the WSUS Server Role Configuring the Active Directory Recycle Encrypting Files by Using Encrypting FileConfiguring Update Settings Bin SystemApproving and Deploying an Update by Deploy a domain controller by using Configuring Advanced Auditingusing WSUS domain controller cloning Securing Data Drives by Using BitLockerMonitoring Tools Configuring Password Policy and User Encrypting and Recovering FilesUsing Performance Monitor Account Configuring Advanced Audit PolicyMonitoring Event Logs Configuring Managed Service Accounts ConfigurationEstablishing a Performance Baseline Configuring Password Policy and Overview of Windows DeploymentIdentifying the Source of a Performance Account Lockout Settings ServicesProblem Creating and Associating a Group Managing Windows Deployment ImagesViewing and Configuring Centralized Event Managed Service Account Implementing Deployment with WindowsLogs Introducing Group Policy Deployment Services

Implementing and Administering GPOs Administering Windows DeploymentLab : Managing User Desktops with Group Group Policy Scope and Group Policy ServicesPolicy Processing Installing and Configuring Windowsline Troubleshooting the Application of GPOs Deployment Services

Creating and Configuring GPOs Creating Operating System Images withManaging GPO Scope Windows Deployment Services

line Verify GPO Application Configuring Custom Computer NamingConfiguring the DNS Server Role Managing GPOs Deploying Images with WindowsConfiguring DNS Zones Implementing Administrative Templates Deployment ServicesConfiguring DNS Zone Transfers Configuring Folder Redirection and Overview of WSUSManaging and Troubleshooting DNS Scripts Deploying Updates with WSUSConfiguring DNS Resource Records Configuring Group Policy Preferences Implementing the WSUS Server RoleConfiguring DNS Conditional Forwarding Managing Software with Group Policy Configuring Update SettingsInstalling and Configuring DNS Zones Implement Settings Using Group Policy Approving and Deploying an Update byTroubleshooting DNS Preferences using WSUSOverview of AD DS Managing Office 2013 by using Monitoring ToolsImplementing Virtualized Domain Controllers Administrative Templates Using Performance MonitorImplementing Read-Only Domain Deploying Software by using Group Monitoring Event LogsControllers Policy Establishing a Performance BaselineAdministering AD DS Configuring Folder Redirection Identifying the Source of a Performance

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Managing the AD DS Database Module 6: Configuring and ProblemInstalling and Configuring a RODC Troubleshooting Remote Access Viewing and Configuring Centralized EventCreate and administer AD DS Snapshots Remote Access Overview LogsConfiguring the Active Directory Recycle Bin Implementing DirectAccess by Using theDeploy a domain controller by using domain Getting Started Wizard Lab : Monitoring Windows Server 2012controller cloning Implementing and Managing an lineConfiguring Password Policy and User Advanced DirectAccess InfrastructureAccount Implementing VPNConfiguring Managed Service Accounts Implementing Web Application Proxy lineConfiguring Password Policy and Account Verifying Readiness for a DirectAccess Configuring the DNS Server RoleLockout Settings Deployment Configuring DNS ZonesCreating and Associating a Group Managed Running the Getting Started Wizard Configuring DNS Zone TransfersService Account Validating the DirectAccess Deployment Managing and Troubleshooting DNSIntroducing Group Policy Preparing the Environment for Configuring DNS Resource RecordsImplementing and Administering GPOs DirectAccess Configuring DNS Conditional ForwardingGroup Policy Scope and Group Policy Implementing the Advanced Installing and Configuring DNS ZonesProcessing DirectAccess Infrastructure Troubleshooting DNSTroubleshooting the Application of GPOs Validating the DirectAccess Deployment Overview of AD DSCreating and Configuring GPOs Implementing VPN Implementing Virtualized DomainManaging GPO Scope Validating the VPN Deployment ControllersVerify GPO Application Implementing Web Application Proxy Implementing Read-Only DomainManaging GPOs Validating the Web Application Proxy ControllersImplementing Administrative Templates Deployment Administering AD DSConfiguring Folder Redirection and Scripts Installing and Configuring a Network Managing the AD DS DatabaseConfiguring Group Policy Preferences Policy Server Installing and Configuring a RODCManaging Software with Group Policy Configuring RADIUS Clients and Servers Create and administer AD DS SnapshotsImplement Settings Using Group Policy NPS Authentication Methods Configuring the Active Directory RecyclePreferences Monitoring and Troubleshooting a BinManaging Office 2013 by using Network Policy Server Deploy a domain controller by usingAdministrative Templates Installing and Configuring NPS to domain controller cloningDeploying Software by using Group Policy Support RADIUS Configuring Password Policy and UserConfiguring Folder Redirection Configuring and Testing a RADIUS Client AccountModule 6: Configuring and Troubleshooting Network Access Protection Overview Configuring Managed Service AccountsRemote Access Configuring NAP Configuring Password Policy and AccountRemote Access Overview Configuring IPSec Enforcement for NAP Lockout SettingsImplementing DirectAccess by Using the Monitoring and Troubleshooting NAP Creating and Associating a GroupGetting Started Wizard Configuring NAP with VPN Enforcement Managed Service AccountImplementing and Managing an Advanced Validating the Deployment Introducing Group PolicyDirectAccess Infrastructure Configuring IPSec Enforcement Implementing and Administering GPOsImplementing VPN Validating the Deployment Group Policy Scope and Group PolicyImplementing Web Application Proxy Overview of FSRM ProcessingVerifying Readiness for a DirectAccess Using FSRM to Manage Quotas, File Troubleshooting the Application of GPOsDeployment Screens, and Storage Reports Creating and Configuring GPOsRunning the Getting Started Wizard Implementing Classification Management Managing GPO ScopeValidating the DirectAccess Deployment and File Management Tasks Verify GPO ApplicationPreparing the Environment for DirectAccess DFS Overview Managing GPOsImplementing the Advanced DirectAccess Configuring DFS Namespaces Implementing Administrative TemplatesInfrastructure Configuring and Troubleshooting DFS-R Configuring Folder Redirection and ScriptsValidating the DirectAccess Deployment Configuring FSRM Quotas Configuring Group Policy PreferencesImplementing VPN Configuring File Screening Managing Software with Group PolicyValidating the VPN Deployment Installing the DFS role service Implement Settings Using Group PolicyImplementing Web Application Proxy Configuring a DFS Namespace PreferencesValidating the Web Application Proxy Configuring DFS-R Managing Office 2013 by usingDeployment Module 10: Configuring Encryption and Administrative TemplatesInstalling and Configuring a Network Policy Advanced Auditing Deploying Software by using Group PolicyServer Encrypting Drives by Using BitLocker Configuring Folder RedirectionConfiguring RADIUS Clients and Servers Encrypting Files by Using Encrypting File Module 6: Configuring andNPS Authentication Methods System Troubleshooting Remote AccessMonitoring and Troubleshooting a Network Configuring Advanced Auditing Remote Access OverviewPolicy Server Securing Data Drives by Using BitLocker Implementing DirectAccess by Using theInstalling and Configuring NPS to Support Encrypting and Recovering Files Getting Started WizardRADIUS Configuring Advanced Audit Policy Implementing and Managing an AdvancedConfiguring and Testing a RADIUS Client Configuration DirectAccess InfrastructureNetwork Access Protection Overview Overview of Windows Deployment Implementing VPNConfiguring NAP Services Implementing Web Application ProxyConfiguring IPSec Enforcement for NAP Managing Windows Deployment Images Verifying Readiness for a DirectAccess

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Monitoring and Troubleshooting NAP Implementing Deployment with Windows DeploymentConfiguring NAP with VPN Enforcement Deployment Services Running the Getting Started WizardValidating the Deployment Administering Windows Deployment Validating the DirectAccess DeploymentConfiguring IPSec Enforcement Services Preparing the Environment forValidating the Deployment Installing and Configuring Windows DirectAccessOverview of FSRM Deployment Services Implementing the Advanced DirectAccessUsing FSRM to Manage Quotas, File Creating Operating System Images with InfrastructureScreens, and Storage Reports Windows Deployment Services Validating the DirectAccess DeploymentImplementing Classification Management Configuring Custom Computer Naming Implementing VPNand File Management Tasks Deploying Images with Windows Validating the VPN DeploymentDFS Overview Deployment Services Implementing Web Application ProxyConfiguring DFS Namespaces Overview of WSUS Validating the Web Application ProxyConfiguring and Troubleshooting DFS-R Deploying Updates with WSUS DeploymentConfiguring FSRM Quotas Implementing the WSUS Server Role Installing and Configuring a Network PolicyConfiguring File Screening Configuring Update Settings ServerInstalling the DFS role service Approving and Deploying an Update by Configuring RADIUS Clients and ServersConfiguring a DFS Namespace using WSUS NPS Authentication MethodsConfiguring DFS-R Monitoring Tools Monitoring and Troubleshooting a NetworkModule 10: Configuring Encryption and Using Performance Monitor Policy ServerAdvanced Auditing Monitoring Event Logs Installing and Configuring NPS to SupportEncrypting Drives by Using BitLocker Establishing a Performance Baseline RADIUSEncrypting Files by Using Encrypting File Identifying the Source of a Performance Configuring and Testing a RADIUS ClientSystem Problem Network Access Protection OverviewConfiguring Advanced Auditing Viewing and Configuring Centralized Configuring NAPSecuring Data Drives by Using BitLocker Event Logs Configuring IPSec Enforcement for NAPEncrypting and Recovering Files Monitoring and Troubleshooting NAPConfiguring Advanced Audit Policy Configuring NAP with VPN EnforcementConfiguration line Validating the DeploymentOverview of Windows Deployment Services Configuring the DNS Server Role Configuring IPSec EnforcementManaging Windows Deployment Images Configuring DNS Zones Validating the DeploymentImplementing Deployment with Windows Configuring DNS Zone Transfers Overview of FSRMDeployment Services Managing and Troubleshooting DNS Using FSRM to Manage Quotas, FileAdministering Windows Deployment Configuring DNS Resource Records Screens, and Storage ReportsServices Configuring DNS Conditional Forwarding Implementing Classification ManagementInstalling and Configuring Windows Installing and Configuring DNS Zones and File Management TasksDeployment Services Troubleshooting DNS DFS OverviewCreating Operating System Images with Overview of AD DS Configuring DFS NamespacesWindows Deployment Services Implementing Virtualized Domain Configuring and Troubleshooting DFS-RConfiguring Custom Computer Naming Controllers Configuring FSRM QuotasDeploying Images with Windows Implementing Read-Only Domain Configuring File ScreeningDeployment Services Controllers Installing the DFS role serviceOverview of WSUS Administering AD DS Configuring a DFS NamespaceDeploying Updates with WSUS Managing the AD DS Database Configuring DFS-RImplementing the WSUS Server Role Installing and Configuring a RODC Module 10: Configuring Encryption andConfiguring Update Settings Create and administer AD DS Snapshots Advanced AuditingApproving and Deploying an Update by Configuring the Active Directory Recycle Encrypting Drives by Using BitLockerusing WSUS Bin Encrypting Files by Using Encrypting FileMonitoring Tools Deploy a domain controller by using SystemUsing Performance Monitor domain controller cloning Configuring Advanced AuditingMonitoring Event Logs Configuring Password Policy and User Securing Data Drives by Using BitLockerEstablishing a Performance Baseline Account Encrypting and Recovering FilesIdentifying the Source of a Performance Configuring Managed Service Accounts Configuring Advanced Audit PolicyProblem Configuring Password Policy and ConfigurationViewing and Configuring Centralized Event Account Lockout Settings Overview of Windows DeploymentLogs Creating and Associating a Group Services

Managed Service Account Managing Windows Deployment ImagesIntroducing Group Policy Implementing Deployment with Windows

line Implementing and Administering GPOs Deployment ServicesConfiguring the DNS Server Role Group Policy Scope and Group Policy Administering Windows DeploymentConfiguring DNS Zones Processing ServicesConfiguring DNS Zone Transfers Troubleshooting the Application of GPOs Installing and Configuring WindowsManaging and Troubleshooting DNS Creating and Configuring GPOs Deployment ServicesConfiguring DNS Resource Records Managing GPO Scope Creating Operating System Images withConfiguring DNS Conditional Forwarding Verify GPO Application Windows Deployment ServicesInstalling and Configuring DNS Zones Managing GPOs Configuring Custom Computer NamingTroubleshooting DNS Implementing Administrative Templates Deploying Images with Windows

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Overview of AD DS Configuring Folder Redirection and Deployment ServicesImplementing Virtualized Domain Controllers Scripts Overview of WSUSImplementing Read-Only Domain Configuring Group Policy Preferences Deploying Updates with WSUSControllers Managing Software with Group Policy Implementing the WSUS Server RoleAdministering AD DS Implement Settings Using Group Policy Configuring Update SettingsManaging the AD DS Database Preferences Approving and Deploying an Update byInstalling and Configuring a RODC Managing Office 2013 by using using WSUSCreate and administer AD DS Snapshots Administrative Templates Monitoring ToolsConfiguring the Active Directory Recycle Bin Deploying Software by using Group Using Performance MonitorDeploy a domain controller by using domain Policy Monitoring Event Logscontroller cloning Configuring Folder Redirection Establishing a Performance BaselineConfiguring Password Policy and User Module 6: Configuring and Identifying the Source of a PerformanceAccount Troubleshooting Remote Access ProblemConfiguring Managed Service Accounts Remote Access Overview Viewing and Configuring Centralized EventConfiguring Password Policy and Account Implementing DirectAccess by Using the LogsLockout Settings Getting Started WizardCreating and Associating a Group Managed Implementing and Managing anService Account Advanced DirectAccess Infrastructure lineIntroducing Group Policy Implementing VPN Configuring the DNS Server RoleImplementing and Administering GPOs Implementing Web Application Proxy Configuring DNS ZonesGroup Policy Scope and Group Policy Verifying Readiness for a DirectAccess Configuring DNS Zone TransfersProcessing Deployment Managing and Troubleshooting DNSTroubleshooting the Application of GPOs Running the Getting Started Wizard Configuring DNS Resource RecordsCreating and Configuring GPOs Validating the DirectAccess Deployment Configuring DNS Conditional ForwardingManaging GPO Scope Preparing the Environment for Installing and Configuring DNS ZonesVerify GPO Application DirectAccess Troubleshooting DNSManaging GPOs Implementing the Advanced Overview of AD DSImplementing Administrative Templates DirectAccess Infrastructure Implementing Virtualized DomainConfiguring Folder Redirection and Scripts Validating the DirectAccess Deployment ControllersConfiguring Group Policy Preferences Implementing VPN Implementing Read-Only DomainManaging Software with Group Policy Validating the VPN Deployment ControllersImplement Settings Using Group Policy Implementing Web Application Proxy Administering AD DSPreferences Validating the Web Application Proxy Managing the AD DS DatabaseManaging Office 2013 by using Deployment Installing and Configuring a RODCAdministrative Templates Installing and Configuring a Network Create and administer AD DS SnapshotsDeploying Software by using Group Policy Policy Server Configuring the Active Directory RecycleConfiguring Folder Redirection Configuring RADIUS Clients and Servers BinModule 6: Configuring and Troubleshooting NPS Authentication Methods Deploy a domain controller by usingRemote Access Monitoring and Troubleshooting a domain controller cloningRemote Access Overview Network Policy Server Configuring Password Policy and UserImplementing DirectAccess by Using the Installing and Configuring NPS to AccountGetting Started Wizard Support RADIUS Configuring Managed Service AccountsImplementing and Managing an Advanced Configuring and Testing a RADIUS Client Configuring Password Policy and AccountDirectAccess Infrastructure Network Access Protection Overview Lockout SettingsImplementing VPN Configuring NAP Creating and Associating a GroupImplementing Web Application Proxy Configuring IPSec Enforcement for NAP Managed Service AccountVerifying Readiness for a DirectAccess Monitoring and Troubleshooting NAP Introducing Group PolicyDeployment Configuring NAP with VPN Enforcement Implementing and Administering GPOsRunning the Getting Started Wizard Validating the Deployment Group Policy Scope and Group PolicyValidating the DirectAccess Deployment Configuring IPSec Enforcement ProcessingPreparing the Environment for DirectAccess Validating the Deployment Troubleshooting the Application of GPOsImplementing the Advanced DirectAccess Overview of FSRM Creating and Configuring GPOsInfrastructure Using FSRM to Manage Quotas, File Managing GPO ScopeValidating the DirectAccess Deployment Screens, and Storage Reports Verify GPO ApplicationImplementing VPN Implementing Classification Management Managing GPOsValidating the VPN Deployment and File Management Tasks Implementing Administrative TemplatesImplementing Web Application Proxy DFS Overview Configuring Folder Redirection and ScriptsValidating the Web Application Proxy Configuring DFS Namespaces Configuring Group Policy PreferencesDeployment Configuring and Troubleshooting DFS-R Managing Software with Group PolicyInstalling and Configuring a Network Policy Configuring FSRM Quotas Implement Settings Using Group PolicyServer Configuring File Screening PreferencesConfiguring RADIUS Clients and Servers Installing the DFS role service Managing Office 2013 by usingNPS Authentication Methods Configuring a DFS Namespace Administrative TemplatesMonitoring and Troubleshooting a Network Configuring DFS-R Deploying Software by using Group PolicyPolicy Server Module 10: Configuring Encryption and Configuring Folder RedirectionInstalling and Configuring NPS to Support Advanced Auditing Module 6: Configuring and

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

RADIUS Encrypting Drives by Using BitLocker Troubleshooting Remote AccessConfiguring and Testing a RADIUS Client Encrypting Files by Using Encrypting File Remote Access OverviewNetwork Access Protection Overview System Implementing DirectAccess by Using theConfiguring NAP Configuring Advanced Auditing Getting Started WizardConfiguring IPSec Enforcement for NAP Securing Data Drives by Using BitLocker Implementing and Managing an AdvancedMonitoring and Troubleshooting NAP Encrypting and Recovering Files DirectAccess InfrastructureConfiguring NAP with VPN Enforcement Configuring Advanced Audit Policy Implementing VPNValidating the Deployment Configuration Implementing Web Application ProxyConfiguring IPSec Enforcement Overview of Windows Deployment Verifying Readiness for a DirectAccessValidating the Deployment Services DeploymentOverview of FSRM Managing Windows Deployment Images Running the Getting Started WizardUsing FSRM to Manage Quotas, File Implementing Deployment with Windows Validating the DirectAccess DeploymentScreens, and Storage Reports Deployment Services Preparing the Environment forImplementing Classification Management Administering Windows Deployment DirectAccessand File Management Tasks Services Implementing the Advanced DirectAccessDFS Overview Installing and Configuring Windows InfrastructureConfiguring DFS Namespaces Deployment Services Validating the DirectAccess DeploymentConfiguring and Troubleshooting DFS-R Creating Operating System Images with Implementing VPNConfiguring FSRM Quotas Windows Deployment Services Validating the VPN DeploymentConfiguring File Screening Configuring Custom Computer Naming Implementing Web Application ProxyInstalling the DFS role service Deploying Images with Windows Validating the Web Application ProxyConfiguring a DFS Namespace Deployment Services DeploymentConfiguring DFS-R Overview of WSUS Installing and Configuring a Network PolicyModule 10: Configuring Encryption and Deploying Updates with WSUS ServerAdvanced Auditing Implementing the WSUS Server Role Configuring RADIUS Clients and ServersEncrypting Drives by Using BitLocker Configuring Update Settings NPS Authentication MethodsEncrypting Files by Using Encrypting File Approving and Deploying an Update by Monitoring and Troubleshooting a NetworkSystem using WSUS Policy ServerConfiguring Advanced Auditing Monitoring Tools Installing and Configuring NPS to SupportSecuring Data Drives by Using BitLocker Using Performance Monitor RADIUSEncrypting and Recovering Files Monitoring Event Logs Configuring and Testing a RADIUS ClientConfiguring Advanced Audit Policy Establishing a Performance Baseline Network Access Protection OverviewConfiguration Identifying the Source of a Performance Configuring NAPOverview of Windows Deployment Services Problem Configuring IPSec Enforcement for NAPManaging Windows Deployment Images Viewing and Configuring Centralized Monitoring and Troubleshooting NAPImplementing Deployment with Windows Event Logs Configuring NAP with VPN EnforcementDeployment Services Validating the DeploymentAdministering Windows Deployment Module 9: Optimizing File Services Configuring IPSec EnforcementServices line Validating the DeploymentInstalling and Configuring Windows Overview of FSRMDeployment Services Using FSRM to Manage Quotas, FileCreating Operating System Images with line Screens, and Storage ReportsWindows Deployment Services Configuring the DNS Server Role Implementing Classification ManagementConfiguring Custom Computer Naming Configuring DNS Zones and File Management TasksDeploying Images with Windows Configuring DNS Zone Transfers DFS OverviewDeployment Services Managing and Troubleshooting DNS Configuring DFS NamespacesOverview of WSUS Configuring DNS Resource Records Configuring and Troubleshooting DFS-RDeploying Updates with WSUS Configuring DNS Conditional Forwarding Configuring FSRM QuotasImplementing the WSUS Server Role Installing and Configuring DNS Zones Configuring File ScreeningConfiguring Update Settings Troubleshooting DNS Installing the DFS role serviceApproving and Deploying an Update by Overview of AD DS Configuring a DFS Namespaceusing WSUS Implementing Virtualized Domain Configuring DFS-RMonitoring Tools Controllers Module 10: Configuring Encryption andUsing Performance Monitor Implementing Read-Only Domain Advanced AuditingMonitoring Event Logs Controllers Encrypting Drives by Using BitLockerEstablishing a Performance Baseline Administering AD DS Encrypting Files by Using Encrypting FileIdentifying the Source of a Performance Managing the AD DS Database SystemProblem Installing and Configuring a RODC Configuring Advanced AuditingViewing and Configuring Centralized Event Create and administer AD DS Snapshots Securing Data Drives by Using BitLockerLogs Configuring the Active Directory Recycle Encrypting and Recovering Files

Bin Configuring Advanced Audit PolicyDeploy a domain controller by using Configurationdomain controller cloning Overview of Windows DeploymentConfiguring Password Policy and User ServicesAccount Managing Windows Deployment ImagesConfiguring Managed Service Accounts Implementing Deployment with Windows

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Configuring Password Policy and Deployment ServicesAccount Lockout Settings Administering Windows DeploymentCreating and Associating a Group ServicesManaged Service Account Installing and Configuring WindowsIntroducing Group Policy Deployment ServicesImplementing and Administering GPOs Creating Operating System Images withGroup Policy Scope and Group Policy Windows Deployment ServicesProcessing Configuring Custom Computer NamingTroubleshooting the Application of GPOs Deploying Images with WindowsCreating and Configuring GPOs Deployment ServicesManaging GPO Scope Overview of WSUSVerify GPO Application Deploying Updates with WSUSManaging GPOs Implementing the WSUS Server RoleImplementing Administrative Templates Configuring Update SettingsConfiguring Folder Redirection and Approving and Deploying an Update byScripts using WSUSConfiguring Group Policy Preferences Monitoring ToolsManaging Software with Group Policy Using Performance MonitorImplement Settings Using Group Policy Monitoring Event LogsPreferences Establishing a Performance BaselineManaging Office 2013 by using Identifying the Source of a PerformanceAdministrative Templates ProblemDeploying Software by using Group Viewing and Configuring Centralized EventPolicy LogsConfiguring Folder RedirectionModule 6: Configuring andTroubleshooting Remote Access lineRemote Access Overview Configuring the DNS Server RoleImplementing DirectAccess by Using the Configuring DNS ZonesGetting Started Wizard Configuring DNS Zone TransfersImplementing and Managing an Managing and Troubleshooting DNSAdvanced DirectAccess Infrastructure Configuring DNS Resource RecordsImplementing VPN Configuring DNS Conditional ForwardingImplementing Web Application Proxy Installing and Configuring DNS ZonesVerifying Readiness for a DirectAccess Troubleshooting DNSDeployment Overview of AD DSRunning the Getting Started Wizard Implementing Virtualized DomainValidating the DirectAccess Deployment ControllersPreparing the Environment for Implementing Read-Only DomainDirectAccess ControllersImplementing the Advanced Administering AD DSDirectAccess Infrastructure Managing the AD DS DatabaseValidating the DirectAccess Deployment Installing and Configuring a RODCImplementing VPN Create and administer AD DS SnapshotsValidating the VPN Deployment Configuring the Active Directory RecycleImplementing Web Application Proxy BinValidating the Web Application Proxy Deploy a domain controller by usingDeployment domain controller cloningInstalling and Configuring a Network Configuring Password Policy and UserPolicy Server AccountConfiguring RADIUS Clients and Servers Configuring Managed Service AccountsNPS Authentication Methods Configuring Password Policy and AccountMonitoring and Troubleshooting a Lockout SettingsNetwork Policy Server Creating and Associating a GroupInstalling and Configuring NPS to Managed Service AccountSupport RADIUS Introducing Group PolicyConfiguring and Testing a RADIUS Client Implementing and Administering GPOsNetwork Access Protection Overview Group Policy Scope and Group PolicyConfiguring NAP ProcessingConfiguring IPSec Enforcement for NAP Troubleshooting the Application of GPOsMonitoring and Troubleshooting NAP Creating and Configuring GPOsConfiguring NAP with VPN Enforcement Managing GPO ScopeValidating the Deployment Verify GPO ApplicationConfiguring IPSec Enforcement Managing GPOsValidating the Deployment Implementing Administrative TemplatesOverview of FSRM Configuring Folder Redirection and Scripts

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Using FSRM to Manage Quotas, File Configuring Group Policy PreferencesScreens, and Storage Reports Managing Software with Group PolicyImplementing Classification Management Implement Settings Using Group Policyand File Management Tasks PreferencesDFS Overview Managing Office 2013 by usingConfiguring DFS Namespaces Administrative TemplatesConfiguring and Troubleshooting DFS-R Deploying Software by using Group PolicyConfiguring FSRM Quotas Configuring Folder RedirectionConfiguring File Screening Module 6: Configuring andInstalling the DFS role service Troubleshooting Remote AccessConfiguring a DFS Namespace Remote Access OverviewConfiguring DFS-R Implementing DirectAccess by Using theModule 10: Configuring Encryption and Getting Started WizardAdvanced Auditing Implementing and Managing an AdvancedEncrypting Drives by Using BitLocker DirectAccess InfrastructureEncrypting Files by Using Encrypting File Implementing VPNSystem Implementing Web Application ProxyConfiguring Advanced Auditing Verifying Readiness for a DirectAccessSecuring Data Drives by Using BitLocker DeploymentEncrypting and Recovering Files Running the Getting Started WizardConfiguring Advanced Audit Policy Validating the DirectAccess DeploymentConfiguration Preparing the Environment forOverview of Windows Deployment DirectAccessServices Implementing the Advanced DirectAccessManaging Windows Deployment Images InfrastructureImplementing Deployment with Windows Validating the DirectAccess DeploymentDeployment Services Implementing VPNAdministering Windows Deployment Validating the VPN DeploymentServices Implementing Web Application ProxyInstalling and Configuring Windows Validating the Web Application ProxyDeployment Services DeploymentCreating Operating System Images with Installing and Configuring a Network PolicyWindows Deployment Services ServerConfiguring Custom Computer Naming Configuring RADIUS Clients and ServersDeploying Images with Windows NPS Authentication MethodsDeployment Services Monitoring and Troubleshooting a NetworkOverview of WSUS Policy ServerDeploying Updates with WSUS Installing and Configuring NPS to SupportImplementing the WSUS Server Role RADIUSConfiguring Update Settings Configuring and Testing a RADIUS ClientApproving and Deploying an Update by Network Access Protection Overviewusing WSUS Configuring NAPMonitoring Tools Configuring IPSec Enforcement for NAPUsing Performance Monitor Monitoring and Troubleshooting NAPMonitoring Event Logs Configuring NAP with VPN EnforcementEstablishing a Performance Baseline Validating the DeploymentIdentifying the Source of a Performance Configuring IPSec EnforcementProblem Validating the DeploymentViewing and Configuring Centralized Overview of FSRMEvent Logs Using FSRM to Manage Quotas, File

Screens, and Storage ReportsImplementing Classification Management

line and File Management TasksConfiguring the DNS Server Role DFS OverviewConfiguring DNS Zones Configuring DFS NamespacesConfiguring DNS Zone Transfers Configuring and Troubleshooting DFS-RManaging and Troubleshooting DNS Configuring FSRM QuotasConfiguring DNS Resource Records Configuring File ScreeningConfiguring DNS Conditional Forwarding Installing the DFS role serviceInstalling and Configuring DNS Zones Configuring a DFS NamespaceTroubleshooting DNS Configuring DFS-ROverview of AD DS Module 10: Configuring Encryption andImplementing Virtualized Domain Advanced AuditingControllers Encrypting Drives by Using BitLockerImplementing Read-Only Domain Encrypting Files by Using Encrypting FileControllers System

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Administering AD DS Configuring Advanced AuditingManaging the AD DS Database Securing Data Drives by Using BitLockerInstalling and Configuring a RODC Encrypting and Recovering FilesCreate and administer AD DS Snapshots Configuring Advanced Audit PolicyConfiguring the Active Directory Recycle ConfigurationBin Overview of Windows DeploymentDeploy a domain controller by using Servicesdomain controller cloning Managing Windows Deployment ImagesConfiguring Password Policy and User Implementing Deployment with WindowsAccount Deployment ServicesConfiguring Managed Service Accounts Administering Windows DeploymentConfiguring Password Policy and ServicesAccount Lockout Settings Installing and Configuring WindowsCreating and Associating a Group Deployment ServicesManaged Service Account Creating Operating System Images withIntroducing Group Policy Windows Deployment ServicesImplementing and Administering GPOs Configuring Custom Computer NamingGroup Policy Scope and Group Policy Deploying Images with WindowsProcessing Deployment ServicesTroubleshooting the Application of GPOs Overview of WSUSCreating and Configuring GPOs Deploying Updates with WSUSManaging GPO Scope Implementing the WSUS Server RoleVerify GPO Application Configuring Update SettingsManaging GPOs Approving and Deploying an Update byImplementing Administrative Templates using WSUSConfiguring Folder Redirection and Monitoring ToolsScripts Using Performance MonitorConfiguring Group Policy Preferences Monitoring Event LogsManaging Software with Group Policy Establishing a Performance BaselineImplement Settings Using Group Policy Identifying the Source of a PerformancePreferences ProblemManaging Office 2013 by using Viewing and Configuring Centralized EventAdministrative Templates LogsDeploying Software by using GroupPolicyConfiguring Folder RedirectionModule 6: Configuring andTroubleshooting Remote AccessRemote Access OverviewImplementing DirectAccess by Using theGetting Started WizardImplementing and Managing anAdvanced DirectAccess InfrastructureImplementing VPNImplementing Web Application ProxyVerifying Readiness for a DirectAccessDeploymentRunning the Getting Started WizardValidating the DirectAccess DeploymentPreparing the Environment forDirectAccessImplementing the AdvancedDirectAccess InfrastructureValidating the DirectAccess DeploymentImplementing VPNValidating the VPN DeploymentImplementing Web Application ProxyValidating the Web Application ProxyDeploymentInstalling and Configuring a NetworkPolicy ServerConfiguring RADIUS Clients and ServersNPS Authentication MethodsMonitoring and Troubleshooting aNetwork Policy ServerInstalling and Configuring NPS to

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Support RADIUSConfiguring and Testing a RADIUS ClientNetwork Access Protection OverviewConfiguring NAPConfiguring IPSec Enforcement for NAPMonitoring and Troubleshooting NAPConfiguring NAP with VPN EnforcementValidating the DeploymentConfiguring IPSec EnforcementValidating the DeploymentOverview of FSRMUsing FSRM to Manage Quotas, FileScreens, and Storage ReportsImplementing Classification Managementand File Management TasksDFS OverviewConfiguring DFS NamespacesConfiguring and Troubleshooting DFS-RConfiguring FSRM QuotasConfiguring File ScreeningInstalling the DFS role serviceConfiguring a DFS NamespaceConfiguring DFS-RModule 10: Configuring Encryption andAdvanced AuditingEncrypting Drives by Using BitLockerEncrypting Files by Using Encrypting FileSystemConfiguring Advanced AuditingSecuring Data Drives by Using BitLockerEncrypting and Recovering FilesConfiguring Advanced Audit PolicyConfigurationOverview of Windows DeploymentServicesManaging Windows Deployment ImagesImplementing Deployment with WindowsDeployment ServicesAdministering Windows DeploymentServicesInstalling and Configuring WindowsDeployment ServicesCreating Operating System Images withWindows Deployment ServicesConfiguring Custom Computer NamingDeploying Images with WindowsDeployment ServicesOverview of WSUSDeploying Updates with WSUSImplementing the WSUS Server RoleConfiguring Update SettingsApproving and Deploying an Update byusing WSUSMonitoring ToolsUsing Performance MonitorMonitoring Event LogsEstablishing a Performance BaselineIdentifying the Source of a PerformanceProblemViewing and Configuring CentralizedEvent Logs

M20411 C www.globalknowledge.se [email protected] 020-73 73 73

Övrig information:

För mer information eller kursbokning, vänligen kontakta oss på telefon. 020-73 73 73

[email protected]

www.globalknowledge.se

Vretenvägen 13, plan 3, 171 54 Solna