Module 1: ITIL/MOF Overview

This module describes the correspondence between MOF and ITIL processes and their implementation in System Center Service Manager 2010.

Lessons

  • ITIL/MOF Overview: Why People and Processes Matter; IT Service Lifecycle; Manage Layer; Change and Configuration Management
After completing this module, students will be able to:
  • Understand how MOF and ITIL processes are supported in System Center Service Manager 2010.

Module 2: Change Management

This module describes the Change Management processes in ITIL and MOF.

Lessons

  • The Change Management SMF Processes and Workflow
  • Change Management in Service Manager
After completing this module, students will be able to:
  • Understand Change Management features in System Center Service Manager 2010.

Module 3: Configuration Management

This module describes the ITIL and MOF Configuration Management processes.

Lessons

  • ITIL Definition of Configuration Management
  • ITIL Configuration Management Workflow
  • The Purpose of the Configuration Management SMF
  • System Center Service Manager CMDB
  • System Center Configuration Manager Integration
  • System Center Operation Manager Integration
After completing this module, students will be able to:
  • Understand Configuration Management features in general and how it fits into System Center Service Manager 2010.

Module 4: Service Desk

This module describes the Service Desk and Customer Service SMF processes.

Lessons

  • ITIL Definition of Service Desk
  • MOF Operate Phase
  • The Goals of the Customer Service SMF
  • The Purpose of the Customer Service SMF
  • Key Role Types in the Customer Service SMF
  • The Customer Service SMF Processes and Workflow
After completing this module, students will be able to:
  • Describe the purpose and the goals of the Customer Service SMF in the MOF IT Service lifecycle.
  • Identify the key processes and their associated role types that help achieve the SMF goals.

Module 5: Incident Management

This module describes the Incident Management processes in System Center Service Manager 2010.

Lessons

  • Incident Management in System Center Service Manager
  • Service Desk Scenario in Service Manager

Lab : Policy and Process Exercise: Incident Management

  • Incident Management in System Center Service Manager
After completing this module, students will be able to:
  • Use Incident Management features in System Center Service Manager 2010.

Module 6: Problem Management

This module describes the Incident Management processes in System Center Service Manager 2010.

Lessons

  • ITILs Definition of Problem Management
  • The ITIL Problem Management Process
  • The Goals of the Problem Management SMF
  • The Purpose of the Problem Management SMF
  • Key Role Types in the Problem Management SMF
  • The Problem Management SMF Processes and Workflow

Lab : Policy and Process Exercise: Problem Management

  • Repeating Incidents
After completing this module, students will be able to:
  • Understand ITIL and MOF Problem Management goals and purpose and workflow.
  • Discuss the Problem Management SMF purpose and goals in the context of the MOF IT Service lifecycle.
  • Identify the key processes and their associated role types that help in achieving the SMF goals.

Module 7: Reviews and Reports

This module describes how System Center Service Manager 2010 supports reporting.

Lessons

  • Purpose of SMF Reviews
  • SCSM Data Warehouse and Reports
After completing this module, students will be able to:
  • Describe how System Center Service Manager 2010 can support the MOF reviews and KPI’s.

Module 8: Organizational Analysis

This module provides an understanding of the organization where Service Manager is implemented and how this will influence the implementation of Service Manager.

Lessons

  • Overview of the Teams Used with Service Manager (MOF)
  • Description of Teams that Should Be in Place to Implement Service Manager
After completing this module, students will be able to:
  • Understand which IT-processes the Organization will use and in which order in connection Service Manager.
  • Investigate if the defined IT-processes are in place in the Organization.
  • Understand if the Quality of depended products are in the expected readiness quality to deliver input to Service Manager.
  • Define Personas for Service Manager.

Module 9: Planning and Architecture Design

This module explains how to plan for a Service Manager implementation and explains the different architecture components together with performance and scale scenarios and best practices for hardware sizing.

Lessons

  • Understanding the Quality of IT Processes
  • Understand the Requirements for the System Center Products that Service Manager will Integrate With
  • Reporting and Data Warehouse Requirements
  • Self Service Portal Requirements
  • Service Manager Components
  • Inside Service Manager
  • Service Manager Scalability
  • Hardware Sizing
  • Implementation Scenarios
After completing this module, students will be able to:
  • Understand Requirements
  • Inside Service Manager
  • Service Manager Components
  • Architecture Components
  • Explore Key Features
  • Performance and Scale
  • Hardware Sizing

Module 10: Deploying Service Manager

This module explains how Service Manager should be deployed in an IT-environment.

Lessons

  • Sizing the Environment (performance impact)
  • Installation and Setup
  • High Availability
  • SQL Best Practice
  • Troubleshooting

Lab : Installing Service Manager

  • Exercise 1: Install Service Manager Management Server.
  • Exercise 2: Install Service Manager Data Warehouse.
  • Exercise 3: Configuring integration between Service manager management Server and Data Warehouse
After completing this module, students will be able to:
  • Understand requirements for installing Service Manager.
  • Understand requirements for High Availability.
  • Understand how to optimize SQL for Service Manager performance.
  • Troubleshooting the Installation of Service Manager.

Module 11: Configuration Management and Connectors

This module explains how to implement configuration management and how to install and configure connectors for Service Manager.

Lessons

  • Configuration Management with Service Manager
  • Connectors
  • Active Directory
  • Operations Manager
  • Configuration Manager

Lab : Configuring Connectors

  • Exercise 1: Configuring Active Directory connector for Service Manager
  • Exercise 2: Configuring CI connector for Operations Manager
  • Exercise 3: Configuration Manager CI connector for Service Manager
  • Exercise 4: Import IC’s from a CSV file
After completing this module, students will be able to:
  • Understand Configuration Management
  • Plan what should go into the CMDB
  • Identify the CI’s (put into CMDB)
  • Control the CI’s
  • Verification and Audit (is the CMDB up to date)
  • Understand Connectors
  • Active Directory
  • Operations Manager
  • Configuration Manager
  • Import CSV files

Module 12: Service Manager Management Packs

This module covers Service Manager Management Packs.

Lessons

  • Explain the concepts of Management Packs and how they work
  • Explaining the different Management Packs Types
  • Explain the content and modules of a Management Pack
  • Explain the Incident Management Pack
  • Explain the Problem Management Pack
  • Explain the Change Management Pack
  • Explain Knowledge Management pack

Lab : How to Configure Incident Feeders

  • Exercise 1: Configuring Incident Management
  • Exercise 2: Configuring Alert connector for Operations Manager connector
  • Exercise 3: Configuring Mail Connector
  • Exercise 4: Configuring DCM connector for Configuration Manager connector
After completing this module, students will be able to:
  • Explain the functions and features of Service Manager Management Packs
  • Incident Management Pack
  • Problem Management Pack
  • Change Management Pack
  • Knowledge Management Pack

Module 13: User Roles and Functions

This module covers configuring and supporting User roles and profiles.

Lessons

  • Understand Security Scopes/UI Filters
  • User Role Profiles
  • Role Based Security
  • Creating User Roles and Scopes

Lab : Creating User Roles in Service Manager

  • Exercise 1: Creating User Roles and Scopes
After completing this module, students will be able to:
  • Understand how User and Role based Security can be used in Service Manager.

Module 14: Using System Center Service Manager

This module covers common user scenarios.

Lessons

  • How do you build the Incident process into Service Manager?
  • How do you build the Problem process into Service Manager?
  • How do you build the Change process into Service Manager?

Lab : Creating Incidents, Problems and Changes in Service Manager

  • Exercise 1: Creating Incidents in Service Manager Using Console, E-mail, Operations Manager, and DCM
  • Exercise 2: Creating a Problem in Service Manager
  • Exercise 3: Creating a Change in Service Manager
After completing this module, students will be able to:
  • Understand how your IT processes can be built into Service Manager.

Module 15: Data Warehouse and Reporting

This module shows the students how Data Warehouse and Reporting works with Service Manager.

Lessons

  • Data Warehouse and Reports
  • Anatomy of ETL
  • Favorite Reports
  • Linked Reports
  • Scheduled Reports
  • Service Manager Dashboard

Lab : Reporting and Data Warehouse

  • Exercise 1: Running Service Manager Reports
  • Exercise 2: Creating Favorite Reports
  • Exercise 3: Creating Linked reports
  • Exercise 4: Installing Service Manager Dashboard
After completing this module, students will be able to:
  • Understand how to use Service Manager Reporting and Data Warehouse.

Module 16: Self Service Portal

This module explains how to work with Self Service Portal. It also describes how to configure and install Self Service Portal.

Lessons

  • Self Service Portal Overview
  • How to configure Self Service Portal
  • End User Portal
  • Analyst Portal

Lab : Installing and using the Self Service Portal

  • Exercise 1: Installing and configuring the Self Service Portal
  • Exercise 2: Using the End User Portal
  • Exercise 3: Using the Analyst Portal
After completing this module, students will be able to:
  • Understand the functions of the Self Service Portal.
  • Use the Self Service Portal for End-user and Analyst.

Module 17: Maintaining Service Manager

This module shows the students how Maintain Service Manager.

Lessons

  • How to Maintain Service Manager on a Daily Basis
  • Configuring Notifications for Service Manager
  • Workflow Status
  • Announcements

Lab : Maintaining Service Manager

  • Exercise 1: Configuring Notifications in Service Manager
  • Exercise 2: Creating Announcements in Service Manager
  • Exercise 3: Creating Workflow in Service Manager
  • Exercise 4: Using the Exchange Connector (Optional)
After completing this module, students will be able to:
  • Maintaining Service Manager on a daily basis.

Module 18: Extending Service Manager

This module shows the students how extend Service Manager.

Lessons

  • How to Extend the CMDB
  • Introducing the Authoring Console
  • Introducing Forms
  • Introducing the MP XML Structure

Lab : Extending Service Manager

  • Exercise 1: Extending the CMDB using the authoring console
  • Exercise 2: Creating view for a new class in Service Manager
  • Exercise 3: Importing data into the CMDB
  • Exercise 4: Modifying a form in Service Manager
  • Exercise 5: Modifying Reports in Service Manager (Optional)
After completing this module, students will be able to:
  • Extend Service Manager.

Module 19: Troubleshooting Service Manager

This module covers troubleshooting common errors in Service Manager.

Lessons

  • Common Service Manager Error Scenarios and Remediation
After completing this module, students will be able to:
  • Troubleshoot and remediate common Service Manager error scenarios.

 

 

Module 1: Introduction to Clusters
This module provides an overview of cluster concepts and functionality.
Lessons
  • Overview of Clusters
  • Benefits of Using Clusters
  • Overview of the Windows Server 2008 High Availability Solutions
Lab : Identifying Windows Server 2008 High Availability Solutions
  • Exercise 1: Identifying solutions for Web servers
  • Exercise 2: Identifying solutions for database servers
  • Exercise 3: Identifying complex solutions
After completing this module, students will be able to:
  • Describe clusters.
  • Describe the benefits of deploying a clustered solution.
  • Describe the Windows Server 2008 clustering options.
Module 2: Introduction to Microsoft Windows Server 2008 Failover Clusters
This module describes key features and functionality of the Windows Server 2008 failover clusters.
Lessons
  • Overview of Windows Server 2008 Failover Clusters
  • Key Windows Server 2008 Failover Cluster Features
  • Overview of the Windows Server 2008 Quorum Models
Lab : Identifying Windows Server 2008 Clustering Solutions
  • Exercise 1: Identifying clustered scenarios
After completing this module, students will be able to:
  • Describe the Windows Server 2008 failover cluster terminology and concepts.
  • Briefly describe key features in Windows Server 2008 failover clusters.
  • Describe the Windows Server 2008 failover cluster scenarios.
  • Understand failover cluster components.
Module 3: Preparing to Install a Failover Cluster
This module explains the prerequisite requirements and planning required to install a Windows failover cluster.
Lessons
  • Overview of Requirements for Installing a Failover Cluster
  • Planning the Failover Cluster Implementation
  • Installing the Failover Cluster Feature and Validating the Cluster Configuration
  • Installing the Failover Cluster on Windows Server 2008 Server Core
Lab : Preparing for a Cluster Installation
  • Exercise 1: Installing the failover cluster feature
  • Exercise 2: Validating the failover cluster
After completing this module, students will be able to:
  • Describe failover cluster requirements.
  • Describe the planning required to deploy a Windows failover cluster.
  • Install the failover cluster feature and verify requirements.
  • Install the failover cluster feature on Windows Server 2008 server core.
Module 4: Overview of Failover Cluster Storage Requirements
This module explains storage fundamentals and how to plan and implement storage solutions for failover clusters.
Lessons
  • Overview of Storage Technologies
  • Introduction to Storage Area Networks
  • Planning a Storage Solution for Failover Clusters
  • Configuring an iSCSI Storage Connection
Lab : Identifying SAN Components
  • Exercise 1: Identifying fibre channel SAN components
  • Exercise 2: Identifying iSCSI SAN components
  • Exercise 3: Configuring iSCSI storage connections
After completing this module, students will be able to:
  • Describe storage technologies.
  • Explain storage area networks.
  • Plan a storage solution for failover clusters.
  • Describe the process to configure an iSCSI storage connection.
Module 5: Configuring a Failover Cluster
This module explains how to install and manage a failover cluster.
Lessons
  • Creating a New Failover Cluster
  • Managing a Failover Cluster
  • Verifying Failover Functionality
Lab : Creating and Administering a Cluster
  • Exercise 1: Creating a cluster
  • Exercise 2: Managing a failover cluster
After completing this module, students will be able to:
  • Create a new failover cluster.
  • Manage a failover cluster.
  • Test failover functionality.
Module 6: Configuring Cluster Resources and Server Roles
This module explains how to configure cluster resources and how to cluster common Window Server roles and applications.
Lessons
  • Configuring Cluster Resources
  • Implementing Failover Clusters for Server Roles Using Failover Cluster Management
  • Clustering Server Roles Using Windows Server Core
Lab : Clustering Server Roles and Features
  • Exercise 1: Configuring cluster resources
  • Exercise 2: Clustering the print server role using failover cluster management
  • Exercise 3: Clustering the file server role on Windows Server core
  • Exercise 4: Testing cluster availability
After completing this module, students will be able to:
  • Configure cluster resources.
  • Describe how to cluster common server roles using the Graphical User Interface.
  • Describe how to cluster common server roles using the command line interface.
Module 7: Maintaining Microsoft Failover Clusters
This module explains how to maintain and troubleshoot failover clusters.
Lessons
  • Monitoring Failover Clusters
  • Backing Up and Restoring Failover Clusters
  • Troubleshooting Failover Clusters
Lab : Maintaining Failover Clusters
  • Exercise 1: Monitoring failover clusters
  • Exercise 2: Backing up a failover cluster
  • Exercise 3: Restoring a failover cluster
After completing this module, students will be able to:
  • Monitor failover clusters.
  • Backup and restore failover clusters.
  • Troubleshoot failover clusters.
Module 8: Implementing Geographically Dispersed Clusters
This module explains geographically dispersed clusters and the challenges that they present. In addition, this module describes how to implement a multi-subnet cluster using Windows Server 2008.
Lessons
  • Overview of Geographically Dispersed Clusters
  • Implementing Geographically Dispersed Clusters Using Windows Server 2008
After completing this module, students will be able to:
  • Define the use and challenges of geographically dispersed clusters.
  • Describe how to implement geographically dispersed clusters using Windows Server 2008.
Module 9: Implementing Network Load Balanced Clusters
This module explains how to install and maintain network load balanced (NLB) clusters.
Lessons
  • Overview of Network Load Balancing
  • Configuring a Network Load Balanced Cluster
  • Maintaining a Network Load Balanced Cluster
Lab : Implementing an NLB cluster
  • Exercise 1: Preparing the NLB cluster nodes
  • Exercise 2: Configuring an NLB cluster
After completing this module, students will be able to:
  • Describe how NLB clustering works.
  • Install an NLB cluster.
  • Maintain an NLB cluster.
 

 

Module 1: Installing Microsoft System Center Operations Manager 2007 R2This module explains how to plan and install the components for the Management Group.Lessons

  • Preparing for Operations Manager 2007 R2
  • Using System Center Capacity Planner
  • Security
  • Installing System Center Operations Manager 2007 R2
  • Post Installation

Lab : Installing System Center Operations Manager

  • Installing System Center Operations Manager
After completing this module, students will be able to:
  • Install System Center Operations Manager 2007 and verify a successful installation.

Module 2: Using the Operations Console

This module explains how to use the Operations Console, create Operator Accounts, use the Web Console and create Views.

Lessons

  • Reviewing the Workspaces
  • Using the Web Console
  • Working with Views
  • Reviewing Security Roles

Lab : Creating Operator Accounts and Views

  • Creating Operator Accounts and Views
After completing this module, students will be able to:
  • Install the Operations Console on another system.
  • Understand the workspaces and views.
  • Install and use the Web Console.
  • Create Operators.

Module 3: Configuring Management Group and Agent Settings

This module explains how to define the default management group and agent settings, override the default settings for a management server and agents, and create notifications to be sent when alerts appear.

Lessons

  • Global Settings
  • Overriding Global Settings
  • Creating Notifications

Lab : Configuring Notification Settings

  • Configuring Notification Settings
After completing this module, students will be able to:
  • Configure default management group settings.
  • Override the default management group setting.
  • Configure notification settings and define who will receive the notifications.

Module 4: Agent Installation

This module explains how to install and configure the agent used to monitor systems within the Management Group.

Lessons

  • Configuring Active Directory
  • Push Installation
  • Manual Installation
  • Managing Agents

Lab : Agent Installation

  • Agent Installation
After completing this module, students will be able to:
  • Create an Active Directory container for automatic agent assignment.
  • Configure automatic installation settings.
  • Manually install and approve an agent.

Module 5: Management Packs

This module explains how to import, export and manage Management Packs used within the management group.

Lessons

  • Management Pack Overview
  • Importing and Exporting Management Packs
  • Creating and Sealing Management Packs

Lab : Creating Monitors

  • Creating Monitors

Lab : Creating Tasks

  • Creating Tasks

Lab : Associating Run As Profiles with a Management Pack

  • Associating Run As Profiles with a Management Pack

Lab : Configuring Overrides

  • Configuring Overrides
After completing this module, students will be able to:
  • Define the components that make up a management pack.
  • Create a new management pack.
  • Export and import management packs.
  • Seal a management pack.

Module 6: Reporting

This module explains how configure the reporting components for the management group.

Lessons

  • Installing and Configuring SQL Reporting Services
  • Installing Operations Manager Reporting
  • Creating and Viewing Reports

Lab : Creating Reports

  • Creating Reports
After completing this module, students will be able to:
  • Install and configure SQL Reporting Services.
  • Install and configure Operations Manager Reporting.
  • View reports.
  • Create reports using Report Builder.

Module 7: Agentless Exception Monitoring

This module explains how to configure the settings and group policy options for Agentless Exception Monitoring.

Lessons

  • Configuring Exception Monitoring
  • Managing Clients

Lab : Configuring Agentless Exception Monitoring

  • Configuring Agentless Exception Monitoring
After completing this module, students will be able to:
  • Configure a management server as an Agentless Exception Monitoring collector.
  • Configure clients to generate error reports and send them to the management server.

Module 8: Audit Collection Services

This module explains how to collect audit information from monitored systems and display the collected audit information using reports.

Lessons

  • Audit Collection Services Overview
  • Installing Audit Collection Services
  • Configuring Forwarders and Collectors
  • Importing ACS Reports

Lab : Configuring Forwarders

  • Configuring Forwarders

Lab : Importing ACS Reports

  • Importing ACS Reports
After completing this module, students will be able to:
  • Install and configure Audit Collection Services.
  • Optimize auditing.
  • Import Auditing reports.

Module 9: Synthetic Transactions

This module explains how to create transactions that mimic user actions and test functionality.

Lessons

  • Synthetic Transactions

Lab : Creating Synthetic Transactions

  • Creating Synthetic Transactions
After completing this module, students will be able to:
  • Identify the components of a Synthetic Transaction.
  • Create a Synthetic Transaction using the wizard.

Module 10: Distributed Applications

This module explains how to name, declare, assign values to, and use variables. It also describes how to store data in an array.

Lessons

  • Distributed Applications

Lab : Creating a Distributed Application Model

  • Creating a Distributed Application Model
After completing this module, students will be able to:
  • Use the Distributed Application wizard.
  • Identify the components of a Distributed Application.

Module 11: Monitoring Non-Microsoft Platforms

This module explains how to monitor non-Microsoft operating systems and devices.

Lessons

  • Tools for Monitoring Non-Microsoft Platforms
  • Using the Cross-Platform Extensions

Lab : Installing the Cross-Platform Client

  • Installing the Cross-Platform Client
After completing this module, students will be able to:
  • Understand the requirements for monitoring Linux and Unix systems.
  • Configure agent installation for Linux and Unix systems.
  • Monitor Linux and Unix systems.

Module 12: Complex Environments

This module explains how to configure complex scenarios. The information covered includes multihoming an agent so that it reports monitoring data to more than one management group, configuring agents in untrusted domains to use certificate-based authentication, configuring a gateway server to support clients in untrusted domains, and configuring management groups in a hierarchy.

Lessons

  • Multi-homing Agents
  • Untrusted Environments
  • Multi-Tiered Environments

Lab : Connecting Management Groups

  • Connecting Management Groups
After completing this module, students will be able to:
  • Multihome an agent.
  • Create a connector to another management group.
  • Create a connector subscription to a third-party management product.
  • Configure Certificate-based authentication.
  • Configure a Gateway Server.

Module 13: Backup and Recovery

This module explains how to safeguard the management group from failure by backing up the required systems and components.

Lessons

  • Planning Backup and Restore
  • Performing a Backup
  • Planning Restore Strategies

Lab : Promoting a Management Server

  • Promoting a Management Server
After completing this module, students will be able to:
  • Identify the components to backup.
  • Backup the required components.
  • Identify Restore requirements.

 

Module 1: Overview of Microsoft System Center Configuration Manager 2007This module explains Microsoft System Center Configuration Manager 2007 features, and describes primary infrastructure components and deployment scenarios of Configuration Manager 2007.Lessons

  • Introduction to System Center Configuration Manager 2007
  • Configuration Manager Features
  • Configuration Manager Deployment Scenarios
  • Overview of the Configuration Manager Client
After completing this module, students will be able to:
  • Describe Configuration Manager 2007.
  • Describe the Configuration Manager 2007 features.
  • Describe the Configuration Manager 2007 deployment scenarios.
  • Describe the Configuration Manager client.

Module 2: Planning and Deploying a Single-Site ArchitectureThis module describes planning considerations and deployment tasks for implementing Microsoft System Center Configuration Manager 2007 single-site architecture.Lessons

  • Planning a Configuration Manager 2007 Site Deployment
  • Preparing to Deploy a Configuration Manager 2007 Site
  • Installing a Configuration Manager 2007 Site Server
  • Performing Post-Setup Configuration Tasks
  • Discovering Resources
  • Tools for Monitoring and Troubleshooting Configuration Manager 2007

Lab : Deploying a Configuration Manager Site Server

  • Installing Configuration Manager Prerequisites
  • Extending the Active Directory Schema for Configuration Manager
  • Installing Configuration Manager 2007 SP2
  • Verifying a Successful Configuration Manager Site Server Installation
  • Verifying the Creation of the System Management Container
  • Installing Configuration Manager 2007 R3

Lab : Managing Users and Configuring Boundaries and Discovery Methods

  • Managing Configuration Manager Users
  • Configuring Boundaries
  • Enabling and Configuring Discovery Methods

Lab : Monitoring and Troubleshooting Configuration Manager 2007

  • Using the ConfigMgr Service Manager
  • Reviewing Log Files with Trace32
  • Reviewing Discovery Status Messages
  • Configuring Status Messages
After completing this module, students will be able to:
  • Plan a Configuration Manager 2007 site deployment.
  • Prepare to deploy a Configuration Manager 2007 site.
  • Install a Configuration Manager 2007 site server.
  • Perform post-setup configuration tasks.
  • Configure and enable discovery methods.
  • Monitor and troubleshoot Configuration Manager 2007.

Module 3: Planning for and Completing Client DeploymentThis module explains how to plan and deploy Configuration Manager 2007 clients.Lessons

  • Client Deployment Methods
  • Deploying Clients
  • Managing Configuration Manager 2007 Clients
  • Using Configuration Manager Reporting with Client Installation

Lab : Deploying Configuration Manager 2007 Clients

  • Preparing the Site for Client Installation
  • Deploying the Configuration Manager Client Using the Client Push Installation Method

Lab : Verifying Client Deployment

  • Verifying Client Deployment
After completing this module, students will be able to:
  • Determine the most appropriate client deployment method.
  • Deploy Configuration Manager 2007 clients.
  • Manage and verify Configuration Manager 2007 client deployment.
  • Use Configuration Manager reporting to monitor client deployment.

Module 4: Inventory Collection, Software Metering, and Asset IntelligenceThis module explains how to collect and manage hardware and software inventory, implement software metering, and use Asset Intelligence.Lessons

  • Overview of Inventory Collection
  • Collecting Hardware Inventory
  • Collecting Software Inventory
  • Managing and Troubleshooting Inventory
  • Asset Intelligence
  • Metering Software Usage

Lab : Collecting Inventory

  • Configuring and Managing Hardware Inventory
  • Modifying Hardware Inventory Collection
  • Configuring and Managing Software Inventory

Lab : Using Asset Intelligence

  • Configuring Asset Intelligence Prerequisites
  • Configuring Asset Intelligence
  • Customizing Asset Intelligence
  • Viewing Asset Intelligence Reports

Lab : Configuring Software Metering

  • Configuring Software Metering
After completing this module, students will be able to:
  • Describe inventory collection.
  • Explain how to collect hardware inventory.
  • Explain how to collect software inventory.
  • Manage and troubleshoot inventory.
  • Explain how to configure and use Asset Intelligence.
  • Describe how to implement software metering.

Module 5: Querying and Reporting DataThis module describes the data structure for data queries and status message queries, and also describes the available reporting options and how to configure and deploy the available reporting options.Lessons

  • Introduction to Data and Status Message Queries
  • Managing Queries
  • Configuring and Deploying a Reporting Point
  • SQL Reporting Services in Configuration Manager 2007 R2
  • Client Status Reporting in Configuration Manager 2007

Lab : Using Queries and Reports

  • Creating and Running Queries
  • Installing and Using a Reporting Point

Lab : Using SQL Reporting Services

  • Installing the Reporting Services Point Role
  • Managing the Reporting Services Point
  • Viewing SQL Reporting Services Reports

Lab : Installing and Using Client Status Reporting

  • Installing and Configuring Client Status Reporting
  • Installing and Viewing Client Status Reporting Reports
After completing this module, students will be able to:
  • Describe data and status message queries.
  • Manage queries.
  • Configure and deploy a reporting point.
  • Manage reports.
  • Create and use dashboards.
  • Install and use SQL Reporting Services in Configuration Manager 2007 R3.
  • Use client status reporting in Configuration Manager 2007.

Module 6: Distributing Software Using Microsoft System Center Configuration Manager 2007This module describes the processes and components used to prepare for and manage software distribution using Configuration Manager 2007.Lessons

  • Overview of the Software Distribution Process
  • Preparing for Software Distribution
  • Overview of Distribution Points
  • Creating and Populating Collections
  • Configuring Collection Settings
  • Creating and Configuring Packages and Programs
  • Distributing Packages
  • Advertising Programs
  • Monitoring and Troubleshooting Software Distribution

Lab : Preparing for Software Distribution

  • Configuring the Software Distribution Component
  • Configuring the Advertised Programs Client Agent
  • Configuring a Distribution Point

Lab : Creating and Configuring a Collection

  • Creating a Collection for Software Distribution

Lab : Creating a Package and Configuring Programs

  • Creating a Package and Configuring Programs

Lab : Deploying Applications by Using Software Distribution

  • Distributing a Package to a Distribution Point
  • Advertising a Program to a Collection
  • Running an Advertised Program
  • Reviewing Results
After completing this module, students will be able to:
  • Describe the software distribution process.
  • Explain how to prepare a site for software distribution.
  • Describe how distribution points work.
  • Explain how to create and populate collections for targeting software distribution.
  • Explain how to configure collections for targeting software distribution.
  • Explain how to create and configure packages and programs.
  • Explain how to distribute packages.
  • Explain how to advertise programs.
  • Explain how to monitor and troubleshoot the software distribution process.

Module 7: Deploying Virtual Applications Using Microsoft System Center Configuration Manager 2007This module explains how to deploy virtual applications using Configuration Manager 2007.Lessons

  • Configuring the Infrastructure to Support Application Virtualization
  • Deploying and Managing Application Virtualization Packages
  • Using Virtual Application Programs

Lab : Deploying Virtual Applications to Configuration Manager Clients

  • Preparing the Infrastructure for Application Virtualization
  • Deploying a Virtual Application Package
  • Launching and Monitoring a Virtual Application Program
After completing this module, students will be able to:
  • Describe infrastructure requirements to support App-V.
  • Deploy and manage virtual application packages.
  • Launch virtual applications on Configuration Manager clients.

Module 8: Deploying and Managing Software UpdatesThis module explains how to deploy and manage software updates to client computers throughout the enterprise.Lessons

  • Overview of Software Updates
  • Preparing the Configuration Manager 2007 Site for Software Updates
  • Managing Software Updates
  • Monitoring and Troubleshooting Software Updates

Lab : Deploying and Managing Software Updates

  • Configuring the Software Updates Infrastructure
  • Determining the Software Update Compliance
  • Deploying Software Updates to Clients
After completing this module, students will be able to:
  • Describe how the software updates feature integrates with System Center Configuration Manager 2007.
  • Prepare a Configuration Manager site for software updates.
  • Manage software updates.
  • Monitor and troubleshoot software updates.

Module 9: Deploying Operating Systems Using Microsoft System Center Configuration Manager 2007This module explains how to deploy operating systems using Configuration Manager 2007.Lessons

  • Overview of Operating System Deployment
  • Preparing for Operating System Deployment
  • Task Sequences in Operating System Deployment
  • Capturing Operating System Images
  • Managing User Data
  • Deploying an Operating System

Lab : Preparing for Operating System Capture and Deployment

  • Preparing the Reference Computer for Capture
  • Creating Packages for Operating System Deployment
  • Managing Drivers
  • Preparing the Environment for Operating System Deployment

Lab : Capturing a Reference Computer

  • Creating the Capture Operating System Task Sequence
  • Modifying the Capture Operating System Task Sequence
  • Advertising the Capture Operating System Task Sequence

Lab : Performing an In-Place Upgrade Using Hard Links

  • Preparing the Operating System Image
  • Creating a Task Sequence to Deploy a New Image
  • Advertising and Running the Task Sequence
After completing this module, students will be able to:
  • Describe operating system deployment.
  • Explain how to prepare for operating system deployment.
  • Describe task sequences in operating system deployment.
  • Capture operating system images.
  • Manage user data.
  • Deploy operating systems.

Module 10: Working with Desired Configuration ManagementThis module explains how to determine computer compliance using desired configuration management.Lessons

  • Overview of Desired Configuration Management
  • Configuring Desired Configuration Management
  • Viewing and Troubleshooting Compliance Results

Lab : Configuring Desired Configuration Management

  • Configuring Desired Configuration Management for Forefront Client Security
  • Assigning a Baseline and Performing a Baseline Evaluation
  • Viewing Desired Configuration Management Reports
After completing this module, students will be able to:
  • Describe desired configuration management.
  • Configure desired configuration management.
  • View and troubleshoot compliance results.

Module 11: Configuring Wake On LAN, Power Management, and Remote ToolsThis module explains how to configure the Wake On LAN, power management, and remote tools features in Configuration Manager 2007.Lessons

  • Overview of Wake On LAN
  • Overview of Power Management
  • Overview of Configuration Manager 2007 Remote Tools
  • Configuring the Remote Tools Client Agent

Lab : Configuring and Using Remote Tools

  • Configuring the Remote Tools Client Agent
  • Using Remote Tools
  • Monitoring Remote Tools Usage
After completing this module, students will be able to:
  • Describe the Wake On LAN feature.
  • Describe power management.
  • Describe the Configuration Manager 2007 Remote Tools feature.
  • Configure the Remote Tools Client Agent.

Module 12: Planning and Configuring a Multiple Site HierarchyThis module describes how to configure a multiple site hierarchy in Configuration Manager 2007.Lessons

  • Introduction to the Configuration Manager 2007 Site Hierarchy
  • Configuring Configuration Manager 2007 Site Communications
  • Installing a Secondary Site Server
  • Roaming in Multiple Site Hierarchies
  • Decommissioning Sites and Hierarchies

Lab : Planning a Configuration Manager 2007 Hierarchy and Installing a Primary Child Site

  • Planning a Configuration Manager Hierarchy
  • Preparing the Central Site
  • Configuring Parent-Site Communications Settings
  • Configuring Child-Site Communications Settings
  • Establishing the Parent-Child Relationship
  • Verifying Communication Between Parent and Child Sites
  • Transferring Site Settings

Lab : Installing Secondary Sites and Proxy Management Points

  • Installing a Secondary Site
  • Configuring Site Boundaries
  • Installing a Proxy Management Point

Lab : Roaming Between Configuration Manager 2007 Sites

  • Preparing Packages for Roaming
  • Roaming to a Primary Child Site
  • Roaming to a Secondary Child Site
After completing this module, students will be able to:
  • Describe Configuration Manager site hierarchies.
  • Describe site-to-site communication, and how to connect primary sites to parent sites.
  • Explain how to install a secondary child site.
  • Describe client roaming in multiple site hierarchies.
  • Explain how to decommission sites and hierarchies.

Module 13: Maintaining and Monitoring Microsoft System Center Configuration Manager 2007This module explains how to maintain and monitor Configuration Manager 2007.Lessons

  • Configuration Manager 2007 Maintenance Tasks
  • Backup and Recovery of Configuration Manager 2007
  • Using Windows Performance Monitor to Monitor Configuration Manager 2007

Lab : Backing Up and Repairing a Primary Site System

  • Configuring the Backup Configuration Files
  • Preparing the Configuration Manager Hierarchy
  • Backing up a Primary Site System
  • Performing a Site Repair
After completing this module, students will be able to:
  • Describe and schedule site maintenance tasks for Configuration Manager.
  • Describe and schedule backup and recovery tasks for Configuration Manager.
  • Explain how to use System Center Operations Manager 2007 to monitor Configuration Manager 2007.
  • Use Windows Performance Monitor to monitor Configuration Manager 2007.

Module 14: Microsoft System Center Configuration Manager 2007 Native Mode and Internet-Based Client ManagementThis module explains Configuration Manager 2007 native mode, and how to install it.Lessons

  • Introduction to the Configuration Manager 2007 Native Mode
  • The Public Key Infrastructure Required for Native Mode
  • Configuring Sites for Native Mode
  • Internet-Based Client Management

Lab : Configuring Native Mode

  • Configuring the Certificate Templates
  • Enrolling Certificates Required for Native Mode
  • Changing From Mixed Mode to Native Mode

Lab : Configuring a Site for Internet-Based Client Management

  • Configuring Site Roles for Internet-Based Client Management
  • Configuring Clients for Internet-Based Client Management
After completing this module, students will be able to:
  • Describe System Center Configuration Manager native mode.
  • Describe Public Key Infrastructure requirements for native mode.
  • Configure sites for native mode.
  • Configure Internet-Based Client Management.

 

Module 1: Configuring an IIS 7.0 Web Server

The students will be introduced to the process of installing a Web Server and configuring IIS features such as application development; health and diagnostics; HTTP features and more.

Lessons

  • Introducing Internet Information Services 7.0
  • Installing the Web Server Role in Windows Server 2008
  • Configuring Application Development, Health, and HTTP Features
  • Configuring Performance, Security, and Server Component Features

Lab : Configuring an IIS 7.0 Web Server

  • Installing IIS using Role Manager
  • Installing IIS using Unattend Setup
  • Installing IIS on Server Core from Command Line
  • Configuring IIS and Validate Functionality
After completing this module, students will be able to:
  • Describe the IIS 7.0 modular architecture.
  • Describe the IIS 7.0 workloads.
  • Describe the three methods for installing IIS 7.0.
  • Install IIS 7.0 using each of the three identified methods.
  • Configure common features for IIS 7.0.
  • Validate functionality of configured features.

Module 2: Configuring IIS 7.0 Web Sites and Application Pools

The students will be introduced to creating and managing Web sites and application pools.

Lessons

  • Introducing Web Sites and Application Pools
  • Creating a Web Site
  • Creating an Application Pool
  • Maintaining an Application Pool

Lab : Configuring IIS 7.0 Web Sites and Application Pools

  • Configuring Authentication Types
  • Creating a Web Site and Web Application
  • Creating an Application Pool
  • Configuring an Existing Application Pool
After completing this module, students will be able to:
  • Describe how the application pool is used.
  • Describe authentication types used in IIS 7.0.
  • Configure the authentication types for Web sites and application pools.
  • Create a Web site and a corresponding virtual directory.
  • Create a new application pool.
  • Configure an existing application pool.

Module 3: Configuring IIS 7.0 Application Settings

The students will be introduced to configuring application settings using ASP.NET.

Lessons

  • Configuring Application Settings
  • Configuring ASP.NET Security

Lab : Configuring IIS 7.0 Application Settings

  • Configuring ASP.NET
  • Configuring ASP.NET Application Development Settings
  • Configuring a Web Server to Host Multiple Web Applications with Separate Application Pools
  • Configuring ASP.NET Security
After completing this module, students will be able to:
  • Describe ASP.NET application development settings.
  • Configure ASP.NET.
  • Configure ASP.NET Web application development settings.
  • Configure a Web Server to host multiple Web applications with separate application pools using ASP.NET.
  • Configure ASP.NET security.

Module 4: Configuring IIS 7.0 Modules

The students will be introduced to configuring IIS modules.

Lessons

  • Configuring Native Modules
  • Configuring Managed Modules

Lab : Configuring IIS 7.0 Modules

  • Configuring and Editing Native Modules
  • Configuring and Edit Managed Modules
After completing this module, students will be able to:
  • Configure native modules.
  • Configure managed modules.
  • Edit managed and native modules.

Module 5: Securing the IIS 7.0 Web Server and Web Sites

The students will be introduced to configuring a secure Web Server and Web sites and to using logging as a tool for monitoring security.

Lessons

  • Configuring Secure Web Sites and Servers
  • Configure Other Aspects of Web Server Security
  • Configuring Logging for IIS 7.0

Lab : Securing IIS 7.0 Web Server and Web Sites

  • Configuring a Secure Web Server
  • Configuring Authorization, Authentication, and Access
  • Configuring Logging
After completing this module, students will be able to:
  • Configure a secure Web Server.
  • Configure authorization for IIS Web Server.
  • Configure authentication for IIS Web Server.
  • Configure access for IIS Web Server.
  • Configure a secure Web site.
  • Configure logging for IIS 7.0.

Module 6: Configuring Delegation and Remote Administration

The students will be introduced to assigning rights to Web site users and configuring users to serve as remote administrators of a server and its corresponding Web sites.

Lessons

  • Configuring Remote Administration
  • Configuring Delegated Administration
  • Configuring Feature Delegation

Lab : Configuring Delegation and Remote Administration

  • Configuring Remote Administration
  • Configuring Delegated Administration
  • Configuring Feature Delegation
After completing this module, students will be able to:
  • Describe remote administration service.
  • Configure remote administration.
  • Describe the new distributed, configuration system, applicationHost.config.
  • Describe how configuration files are distributed down to the application level Web.config for IIS settings.
  • Configure delegated administrative rights to a Web site.
  • Configure feature delegation for a specific Web site.

Module 7: Using Command-line and Scripting for IIS 7.0 Administration

The students will learn basic scripting methods for completing IIS 7.0 administrative tasks needed to maintain Web sites and Web Servers.

Lessons

  • Tools for Running Administrative Tasks in IIS
  • Executing Scripts for Administrative Tasks
  • Managing IIS Tasks

Lab : Using Command-line and Scripting for IIS 7.0 Administration

  • Managing IIS Web Sites with PowerShell
  • Executing a Script using WAP
  • Automating IIS Administration using Scripts
  • Navigating IIS tasks using WMI and Appcmd
After completing this module, students will be able to:
  • Maintain Web Servers with command-line tools
  • Identify when and how to run scripts using PowerShell.
  • Identify when and how to run scripts using the Microsoft Web Administration Provider.
  • Identify when and how to run scripts using command-line.
  • Execute an IIS script using PowerShell.
  • Execute an IIS script using Microsoft Web Administration Provider.
  • Execute an IIS script using command-line.
  • Automate IIS administration tasks using scripts.
  • Navigate IIS tasks using WMI Provider and appcmd.exe.

Module 8: Tuning IIS 7.0 for Improved Performance

The students will be introduced to techniques for improving Web Server performance.

Lessons

  • Implementing Best Practices for Improving IIS Performance
  • Configuring Options to Improve IIS Performance
  • Managing Application Pools to Improve IIS Performance

Lab : Tuning IIS 7.0 for Performance

  • Configuring IIS Performance Options
  • Managing Application Pools to Improve Performance
  • Deploying Applications
After completing this module, students will be able to:
  • Describe best practices for improving performance.
  • Configure options to improve IIS performance.
  • Manage application pools to improve IIS performance.

Module 9: Ensuring Web Site Availability with Web Farms

The students will learn to ensure Web site availability in a Web farm topology.

Lessons

  • Backing Up and Restoring Web Sites
  • Working with Shared Configurations
  • Configuring Network Load Balancing for IIS

Lab : Ensuring Web Site Availability with Web Farms

  • Backing Up an IIS Web Site
  • Restoring an IIS Web site
  • Enabling Shared Configurations
  • Configuring Network Load Balancing
After completing this module, students will be able to:
  • Back up an IIS 7.0 Web site.
  • Restore an IIS 7.0 Web site.
  • Enable shared configurations.
  • Ensure Web site availability using Network Load Balancing.

Module 10: Troubleshooting IIS 7.0 Web Servers

The students will learn to use audit logs to troubleshoot common Web Server related authentication, authorization, communication, and configuration error messages.

Lessons

  • Using IIS 7.0 Logging for Troubleshooting
  • Troubleshooting Authentication
  • Troubleshooting Authorization
  • Troubleshooting Communication
  • Troubleshooting Configuration

Lab : Troubleshooting IIS 7.0 Web Servers

  • Troubleshooting Authentication
  • Troubleshooting Authorization Types
  • Troubleshooting Communication
  • Troubleshooting Configuration
After completing this module, students will be able to:
  • Audit logs to troubleshoot IIS.
  • Troubleshoot authentication based on common error messages.
  • Troubleshoot authorization types for IIS 7.0.
  • Troubleshoot communication when managing a Web Server.
  • Troubleshoot configuration based on common error messages.

Module 1: Introduction to Microsoft Windows PowerShell

This module explains how to check your system for prerequisites for Windows PowerShell, use Server Manager to install Windows PowerShell architecture, confirm installation, and use Windows PowerShell commands to customize the Windows PowerShell environment.

Lessons

  • Introduction to Windows PowerShell
  • Installing Windows PowerShell in Windows Server 2008

Lab : Implementing Windows PowerShell

  • Installing Windows PowerShell
  • Customizing Windows PowerShell
After completing this module, students will be able to:
  • Describe the architecture, platforms, and prerequisites of the Windows PowerShell environment
  • Install Windows PowerShell using the Windows Server 2008 Server Manager

Module 2: Overview of Microsoft Windows PowerShell

This module explains basic concepts in Windows PowerShell, including objects, variables, cmdlets, and pipelines. It describes how to invoke available cmdlets and aliases, assign aliases. The module also includes demonstrations of tab expansion and basic operators.

Lessons

  • Overview of Objects
  • Working with Cmdlets
  • Tab Expansion, Aliases, and History
  • Using Variables and Types

Lab : Working with Windows PowerShell Cmdlets, Aliases, Objects, and Variables

  • Learning Cmdlets and Defining Aliases
  • Holding the Output of a Cmdlet
After completing this module, students will be able to:
  • Explain the fundamental relationship between information and operations that are bundled together into various classes of objects
  • Use the Windows PowerShell cmdlets Get-Command and Get-Help to obtain information about other cmdlets and their parameters.
  • Use tab expansion, aliases, and history in Windows PowerShell to get more done with less typing
  • Perform basic numeric and string operations using Windows PowerShell, including holding temporary values in variables

Module 3: Building Pipelines for Assembly-Line Style Processing

This module explains how to use a pipeline to connect the output of one cmdlet to the input of another, reorder objects, and filter objects based on specific properties. Arrays and their uses are also discussed.

Lessons

  • Using Pipelines
  • Using Arrays
  • Filtering and Iterating Through the Pipeline
  • Reordering Objects in a Pipeline

Lab : Implementing Pipelines in Windows PowerShell

  • Evaluating Process Properties Using the Get-Member Cmdlet
  • Calculating Process Memory Usage
  • Using Associative Array Variables
  • Sorting and Selecting Elements from a Resultant Set of Data
After completing this module, students will be able to:
  • Connect the output of one cmdlet to the input of another cmdlet as a method of building sequences of processing relationships toward a goal
  • Define arrays of data and hold cmdlet and pipeline results in an array
  • Filter objects that are flowing through a pipeline by using cmdlets such as Where-Object
  • Reorder objects and choose specific properties to filter objects that are coming down a pipeline by using the Sort-Object cmdlet and Select-Object cmdlets

Module 4: Managing Processes and Formatting Cmdlet Output

This module explains how to choose a format in which to present data that is appropriate to the data set, format specific process properties, such as memory usage or CPU time, and use custom formatting. It also describes how you can view, start, and stop processes and services.

Lessons

  • Managing Windows Processes with Microsoft Windows PowerShell
  • Formatting Cmdlet Output

Lab : Output Formatting and Process Control with Windows PowerShell

  • Implementing Basic Formatting Control
  • Formatting with the -f Operator
  • Implementing Advanced Formatting
After completing this module, students will be able to:
  • Monitor and control services and processes running on Windows operating systems
  • Present information with specific formatting through the use of formatting operators and cmdlets

Module 5: Introduction to Scripting with Microsoft Windows PowerShell

This module explains how to write and modify scripts to perform a sequence of cmdlets. Security and working with credentials are also discussed.

Lessons

  • Writing Windows PowerShell Scripts
  • Script Parameters
  • Security in Windows PowerShell
  • Customizing Windows PowerShell with Profiles

Lab : Implementing Scripts in Windows PowerShell

  • Writing and Running a Script
  • Customizing Profiles
After completing this module, students will be able to:
  • Design, write, and test sequences of operations and cmdlets using sequences, variables, and pipelines
  • Use parameters to pass additional data to a script in a structured way
  • Establish security with adequate execution policy and script signing
  • Customize profile files and describe the scope of profile files

Module 6: Implementing Flow Control and Functions

This module explains how to move scripts into functions and add functions to profiles. Flow of execution based on a common input, iterating in general and iterating through an array or collection are also discussed.

Lessons

  • Controlling the Flow of Execution Within Scripts
  • Iteration Flow Control
  • Developing and Using Functions

Lab : Implementing Functions and Flow Control in Windows PowerShell

  • Adding Flow Control in a Script
  • Creating Functions
After completing this module, students will be able to:
  • Use Windows PowerShell flow control language features to implement choices in scripts
  • Use Windows PowerShell flow control language features to implement repetition in scripts
  • Define functions to encapsulate a sequence of operations

Module 7: Working with Files, the Registry, and Certificate Stores

This module explains how to write scripts that perform specific tasks, such as searching files for particular text and modifying all matching files, or searching the event logs for events that match specific criteria. It also describes how to access data stores, the file store, the registry, certificate stores, and other stores, use wildcards and regular expressions, and import and export aliases and objects.

Lessons

  • Using Data Stores
  • Using Providers
  • Filtering and Selecting with Regular Expressions
  • Implementing Event Log Management
  • Persisting Objects in Files

Lab : Working with Files, the Registry, and Certificate Stores

  • Searching for Certain Files
  • Modifying Registry Entries
  • Generating Reports
  • Generating Reports on the Security Log
  • Comparing Files
After completing this module, students will be able to:
  • Use providers and cmdlets to access folders and files
  • Use providers and cmdlets to access registry keys and values, and public key certificate stores and certificates
  • Filter the set of files, values, or certificates with which to work, based on patterns in their attributes or content
  • Implement filtering techniques when using the Get-EventLog cmdlet
  • Move aliases and objects from Windows PowerShell memory (that is, RAM) in and out of files

Module 8: Managing the Windows Operating System Using Microsoft Windows PowerShell and WMI

This module explains how to use WMI to access system features, enumerate, defragment, and mount disk volumes in Windows PowerShell. Listing and configuring volume shadow copies, listing and creating shared folders with WMI, and configuring Terminal Services and IIS properties are also discussed.

Lessons

  • Introduction to WMI and WMI Objects
  • Managing Disks and Disk Volumes Using Windows PowerShell with WMI
  • Managing Shadow Copies Using Windows PowerShell with WMI
  • Managing Shared Folders with Windows PowerShell
  • Managing Terminal Services with WMI
  • Managing IIS 7.0 with WMI

Lab : Managing the Windows Operating System with Windows PowerShell and WMI

  • Using WMI Classes in Windows PowerShell
  • Using WMI Type Accelerators
  • Managing Disk Volumes in Windows PowerShell
  • Defragmenting Disk Volumes Using Windows PowerShell
  • Managing IIS 7.0 Properties Using WMI
After completing this module, students will be able to:
  • Use Get-WMIObject to retrieve WMI data from a local or remote system
  • Perform some common administrative tasks using Windows PowerShell and WMI
  • Manage volume shadow copies using Windows PowerShell
  • Manage shared folders using Windows PowerShell
  • Configure Terminal Services via WMI in Windows PowerShell
  • Administer IIS 7.0 with Windows PowerShell

Module 9: Administering Active Directory with Microsoft Windows PowerShell

This module explains how to write scripts to perform Active Directory administration tasks such as changing the domain functional level, moving FSMO roles, and creating and modifying objects such as groups and user accounts. Managing relationships between user accounts and groups is also demonstrated.

Lessons

  • Administering Domains and Forests Using .NET Objects
  • Managing User Accounts and Groups Using ADSI
  • Managing Relationships Between Users and Groups
  • Web Administration Using IIS 7.0

Lab : Administering Active Directory with Windows PowerShell

  • Managing Active Directory Domain and Forest Properties
  • Maintaining Active Directory with ADSI
  • Maintaining Relationships in Active Directory with ADSI
  • Managing IIS 7.0 with the .NET Web.Administration.ServerManager Class
After completing this module, students will be able to:
  • Administer Active Directory domain and forest roles and functionality using Windows PowerShell with .NET objects
  • Manage Active Directory-based user accounts and groups using the ADSI in Windows PowerShell
  • Manage relationships between user accounts and groups in Active Directory
  • Administer IIS 7.0 with Windows PowerShell

Module 10: Administering Group Policy in Microsoft Windows PowerShell Using COM

This module explains how to write scripts to perform Active Directory administration tasks such as changing the domain functional level, moving FSMO roles, and creating and modifying objects such as groups and user accounts. Managing relationships between user accounts and groups is also demonstrated.

Lessons

  • Managing GPOs Using the GPMC COM Interface
  • Managing Group Policy Objects
  • Reporting Group Policy

Lab : Administering Group Policy in Microsoft Windows PowerShell

  • Retrieving a GPO by Using a COM Object
  • Copying Group Policy Settings
  • Backing Up and Restoring a GPO
  • Generating Group Policy Reports
After completing this module, students will be able to:
  • Manage GPOs in an Active Directory environment using Windows PowerShell
  • Search, back up, and restore Group Policy Objects (GPOs) using Windows PowerShell
  • Generate reports of Group Policy in Windows PowerShell

Module 1: Overview of System Center 2012 Configuration ManagerThis module describes the System Center 2012 Configuration Manager feature set and explains how to manage sites by using the System Center 2012 Configuration Manager Console.Lessons

  • Introduction to System Center 2012 Configuration Manager
  • Overview of System Center 2012 Configuration Manager Architecture
  • Overview of the Configuration Manager Console
  • Tools for Monitoring and Troubleshooting a Configuration Manager Site

Lab : Exploring the Configuration Manager Console

  • Exploring the Configuration Manager Console
  • Searching in the Configuration Manager Console

Lab : Monitoring and Troubleshooting a Configuration Manager Site

  • Configuring Status Summarizers
  • Managing Components by Using Configuration Manager Service Manager
  • Monitoring Site and Component Status
  • Reviewing Log Files by Using Configuration Manager Trace Log Tool
After completing this module, students will be able to:
  • Describe the purpose and functionality of System Center 2012 Configuration Manager.
  • Describe the System Center 2012 Configuration Manager architecture.
  • Identify and locate the management features available in the Configuration Manager console.
  • Identify and use the tools available to monitor and troubleshoot a Configuration Manager site.

Module 2: Discovering and Organizing ResourcesThis module explains how to configure discovery methods, configure boundaries and boundary groups, manage user and device collections, and implement role-based security.Lessons

  • Configuring Resource Discovery
  • Configuring Boundaries and Boundary Groups
  • Configuring User and Device Collections
  • Configuring Role-Based Administration

Lab : Configuring Resource Discovery and Boundaries

  • Configuring Active Directory Discovery Methods
  • Configuring Boundaries and Boundary Groups

Lab : Configuring User and Device Collections

  • Creating a Device Collection
  • Creating a User Collection
  • Configuring a Maintenance Window

Lab : Configuring Role-Based Administration

  • Configuring a New Scope for Toronto Administrators
  • Configuring a New Administrative User
After completing this module, students will be able to:
  • Configure resource discovery.
  • Configure boundaries and boundary groups.
  • Configure user and device collections.
  • Configure role-based administration.

Module 3: Managing the Configuration Manager ClientThis module explains how to configure client deployment methods and client settings, and monitor client status.Lessons

  • Overview of the Configuration Manager Client
  • Deploying the Configuration Manager Client
  • Managing Client Agents
  • Configuring and Monitoring Client Status

Lab : Deploying the Configuration Manager Client

  • Preparing the Site for Client Installation
  • Deploying the Configuration Manager Client by Using Client Push Installation
  • Deploying the Configuration Manager Client by Using Group Policy (Optional)

Lab : Managing Client Settings

  • Configuring Client Settings

Lab : Configuring and Monitoring Client Status

  • Configuring and Monitoring Client Communication and Health Status
After completing this module, students will be able to:
  • Describe the requirements for installing the Configuration Manager 2012 client.
  • Describe the site roles and methods used to deploy the Configuration Manager client.
  • Describe how to configure the client agent settings.
  • Describe how to monitor client health.

Module 4: Managing Inventory and Software MeteringThis module explains how to configure and manage hardware and software inventory, monitor inventory data flow, and use asset intelligence and software metering. Lessons

  • Overview of Inventory Collection
  • Configuring Hardware Inventory
  • Configuring Software Inventory
  • Managing Inventory Collection
  • Configuring Asset Intelligence
  • Configuring Software Metering

Lab : Configuring and Managing Inventory Collection

  • Configuring Hardware Inventory
  • Configuring Software Inventory

Lab : Configuring and Managing Asset Intelligence

  • Preparing the Site for Asset Intelligence
  • Configuring Asset Intelligence
  • Customizing Asset Intelligence
  • Viewing Asset Intelligence Reports

Lab : Configuring Software Metering

  • Configuring Software Metering
After completing this module, students will be able to:
  • Describe inventory collection.
  • Configure and collect hardware inventory.
  • Configure and collect software inventory.
  • Manage inventory collection.
  • Configure asset intelligence.
  • Configure software metering.

Module 5: Querying and Reporting DataThis module explains how to create queries and run reports by using SQL Server Reporting Services.Lessons

  • Introduction to Queries
  • Managing Queries
  • Configuring SQL Server Reporting Services

Lab : Creating and Running Queries

  • Creating Data Queries
  • Creating Subselect Queries
  • Creating Status Message Queries

Lab : Configuring Reporting

  • Configuring a Reporting Services Point
After completing this module, students will be able to:
  • Describe data and status message queries.
  • Configure and manage data and status message queries.
  • Configure and manage SQL Server Reporting Services in Configuration Manager.

Module 6: Managing Software Deployments by Using Packages and ProgramsThis module explains how to create and deploy packages and programs.Lessons

  • Configuring Software Distribution
  • Configuring Packages and Programs
  • Distributing Content to Distribution Points
  • Deploying Programs to Configuration Manager Clients

Lab : Managing Software Deployment by Using Packages and Programs

  • Preparing the Infrastructure for Software Deployment
  • Creating a Package and Configuring Programs
  • Distributing Content to a Distribution Point
  • Deploying a Program to Configuration Manager Clients
After completing this module, students will be able to:
  • Describe the software distribution process and configure software distribution settings.
  • Configure packages and programs.
  • Distribute content to distribution points.
  • Deploy programs to Configuration Manager clients.

Module 7: Creating and Deploying ApplicationsThis module explains how to create and deploy applications by using the System Center 2012 Configuration Manager application model.Lessons

  • Overview of Application Management
  • Creating Applications
  • Deploying Applications
  • Configuring the Application Catalog

Lab : Creating and Deploying an Application

  • Creating and Deploying a Required Application
  • Creating and Deploying an Available Application

Lab : Deploying Applications from the Application Catalog

  • Installing and Configuring the Application Catalog
  • Creating and Deploying Applications to the Application Catalog
  • Installing Applications from the Application Catalog
After completing this module, students will be able to:
  • Describe application management in Configuration Manager.
  • Create applications.
  • Deploy applications.
  • Configure the Application Catalog.

Module 8: Managing Application DeploymentThis module explains how to configure application deployment requirements, application supersedence, application un-installation, and multiple deployment types.Lessons

  • Configuring Requirements and Dependencies for Deployment Types
  • Configuring Multiple Deployment Types and User Device Affinity
  • Managing Applications

Lab : Advanced Application Deployment

  • Configuring User Device Affinity
  • Creating Applications with Requirements
  • Deploying Required Applications to Users
  • Creating an Application with Multiple Deployment Types

Lab : Managing Application Supersedence and Removal

  • Using Application Supersedence
  • Uninstalling the Excel Viewer Application
After completing this module, students will be able to:
  • Describe the requirement rules and dependencies for deployment types.
  • Configure multiple deployment types and user device affinity.
  • Manage applications by uninstalling and replacing applications using application supersedence.

Module 9: Deploying and Managing Software UpdatesThis module explains how to deploy and manage software updates.Lessons

  • Overview of Software Updates
  • Preparing the Configuration Manager Site for Software Updates
  • Managing Software Updates
  • Configuring Automatic Deployment Rules
  • Monitoring and Troubleshooting Software Updates

Lab : Configuring the Site for Software Updates

  • Configuring and Synchronizing the Software Update Point

Lab : Deploying and Managing Software Updates

  • Determining Software Update Compliance
  • Deploying Software Updates to Clients
  • Configuring Automatic Deployment Rules
After completing this module, students will be able to:
  • Describe how the software updates feature integrates with Configuration Manager 2012.
  • Prepare a Configuration Manager site for software updates.
  • Manage software update evaluation and deployment.
  • Configure automatic deployment rules.
  • Monitor and troubleshoot software updates.

Module 10: Implementing Endpoint Protection in Configuration Manager 2012This module explains how to integrate and implement System Center 2012 Endpoint Protection with System Center 2012 Configuration Manager.Lessons

  • Overview of Endpoint Protection in Configuration Manager
  • Configuring and Monitoring Endpoint Protection Policies

Lab : Implementing Endpoint Protection

  • Configuring the Endpoint Protection Point and Client Settings
  • Configuring and Deploying Endpoint Protection Policies
  • Monitoring Endpoint Protection
After completing this module, students will be able to:
  • Describe how Endpoint Protection is used to detect and remediate malware and security vulnerabilities.
  • Configure and monitor Endpoint Protection policies.

Module 11: Managing Operating System DeploymentThis module explains how to deploy operating systems by using the System Center 2012 Configuration Manager infrastructure.Lessons

  • Overview of Operating System Deployment
  • Preparing the Site for Operating System Deployment
  • Capturing an Operating System Image
  • Deploying an Operating System

Lab : Preparing the Environment for Operating System Deployment

  • Managing Site System Roles Used to Support Operating System Deployment
  • Managing Packages to Support Operating System Deployment

Lab : Building and Capturing a Reference Image

  • Creating a Build and Capture Task Sequence
  • Capturing the Reference Computer

Lab : Performing an In-Place Upgrade

  • Preparing the Operating System Image
  • Creating a Task Sequence to Deploy an Image
  • Deploying an Image
After completing this module, students will be able to:
  • Describe operating system deployment.
  • Prepare a site for operating system deployment.
  • Capture operating system images.
  • Deploy operating systems.

Module 12: Managing Compliance SettingsThis module explains how to manage configuration items and baselines to assess and remediate the compliance of settings on devices.Lessons

  • Overview of Compliance Settings
  • Configuring Compliance Settings
  • Viewing Compliance Results

Lab : Managing Compliance Settings

  • Managing Configuration Items and Baselines
  • Viewing Compliance Settings Reports
  • Configuring Remediation in Compliance Settings
  • Using Compliance Information to Create Collections
After completing this module, students will be able to:
  • Describe the Compliance Settings feature.
  • Configure the Compliance Settings feature.
  • View compliance results.

Module 13: Managing Mobile DevicesThis module explains how to configure the mobile device management settings.Lessons

  • Configuring Mobile Device Management
  • Depth Management of Mobile Devices
  • Deploying Applications to Mobile Devices

Lab : Managing Mobile Devices

  • Preparing the Infrastructure for Mobile Device Management
  • Enrolling a Mobile Device
  • Managing Compliance Settings for a Mobile Device
  • Deploying an Application to a Mobile Device
After completing this module, students will be able to:
  • Configure mobile device management.
  • Describe how you can use depth management to manage supported mobile devices.
  • Deploy applications to mobile devices.

Module 14: Configuring Wake On LAN, Power Management, and Remote ControlThis module explains how to configure Wake On LAN, power management policies, and Remote Control.Lessons

  • Configuring Wake On LAN
  • Overview of Out of Band Management
  • Configuring Power Management Settings
  • Configuring Remote Control

Lab : Configuring Power Management Settings

  • Applying a Power Management Plan

Lab : Configuring Remote Control

  • Configuring the Remote Tools Client Settings and Permissions
  • Managing Desktops by Using Remote Control
After completing this module, students will be able to:
  • Configure the Wake On LAN feature.
  • Describe out of band management.
  • Configure power management settings.
  • Configure Remote Control features.

 

Module 1: Overview of the Windows Server 2008 ManagementIn this module, students learn the Windows Server 2008 environment including the roles, features, and the tools used to perform effective server management.Lessons

  • Lesson 1: Understanding the Windows Server 2008 Environment
  • Lesson 2: Overview of Windows Server 2008 Server Roles and Features
  • Lesson 3: Windows Server 2008 Administration Tools
  • Lesson 4: Managing Windows Server 2008 Server Core

Lab : Managing Server Roles in a Windows Server 2008 Environment

  • Exercise 1: Determining Server Roles and Installation Types
  • Exercise 2: Installing Windows Server 2008 Server Roles and Features
  • Exercise 3: Managing Windows Server 2008 Server Core
After completing this module, students will be able to:
  • Describe the considerations for implementing and managing a Windows Server 2008 environment.
  • Explain Windows Server 2008 server roles and features.
  • Describe Windows Server 2008 administration tools.
  • Manage Windows Server 2008 Server Core.

Module 2: Managing Windows Server 2008 Infrastructure RolesIn this module, students learn about IPv6 addressing and how to install and configure the DNS and DHCP server infrastructure roles.Lessons

  • Lesson 1: Understanding IPv6 Addressing
  • Lesson 2: Overview of the Domain Name System Server Role
  • Lesson 3: Configuring DNS Zones
  • Lesson 4: Overview of the DHCP Server Role
  • Lesson 5: Configuring DHCP Scopes and Options

Lab : Lab A: Installing and Configuring the DNS Server Role

  • Exercise 1: Installing and Configuring the DNS Server Role
  • Exercise 2: Configuring Primary Zones and Resource Records
  • Exercise 3: Monitoring and Troubleshooting DNS

Lab : Lab B: Installing and Configuring the DHCP Server Role

  • Exercise 1: Installing and authorizing the DHCP Server Role
  • Exercise 2: Configuring DHCP Scopes and Options
After completing this module, students will be able to:
  • Describe IPv6 addressing.
  • Describe the features and concepts related to the DNS server role.
  • Configure DNS zones.
  • Describe the features and concepts related to the DHCP server role.
  • Configure DHCP Scopes and options.

Module 3: Configuring Access to File ServicesIn this module, students learn how to configure secure and efficient access to file services.Lessons

  • Lesson 1: Overview of Access Control
  • Lesson 2: Managing NTFS File and Folder Permissions
  • Lesson 3: Managing Permissions for Shared Resources
  • Lesson 4: Determining Effective Permissions

Lab : Managing Access to File Services

  • Exercise 1: Planning a Shared Folder Implementation (Discussion)
  • Exercise 2: Implementing a Shared Folder Implementation
  • Exercise 3: Evaluating the Shared Folder Implementation
After completing this module, students will be able to:
  • Describe the concept of access control for file services.
  • Manage NTFS file system and folder permissions.
  • Manage permissions for shared resources.
  • Determine effective permissions.

Module 4: Configuring and Managing Distributed File SystemIn this module, students will learn how to configure and manage a Distributed File System infrastructureLessons

  • Lesson 1: Distributed File System Overview
  • Lesson 2: Configuring DFS Namespaces
  • Lesson 3: Configuring DFS Replication

Lab : Installing and Configuring Distributed File System

  • Exercise 1: Installing the Distributed File System Role Service
  • Exercise 2: Creating a DFS Namespace
  • Exercise 3: Configuring Folder Targets and Folder Replication
  • Exercise 4: Viewing Diagnostic Reports for Replicated Folders
After completing this module, students will be able to:
  • Describe the Distributed File System.
  • Configure DFS Namespaces.
  • Configure DFS Replication.

Module 5: Managing File Resources by Using File Server Resource ManagerIn this module, students will learn how to use File Server Resource Manager to assist in data storage capacity management.Lessons

  • Lesson 1: Overview of File Server Resource Manager
  • Lesson 2: Configuring Quota Management
  • Lesson 3: Implementing File Screening
  • Lesson 4: Managing Storage Reports
  • Lesson 5: Implementing Classification Management and File Management Tasks

Lab : Lab A: Installing FSRM and Implementing Quota Management

  • Exercise 1: Installing the FSRM Role Service
  • Exercise 2: Configuring Storage Quotas

Lab : Lab B: Configuring File Screening and Storage Reports

  • Exercise 1: Configuring File Screening
  • Exercise 2: Generating Storage Reports

Lab : Lab C: Configuring Classification and File Management Tasks

  • Exercise 1: Configuring Classification Management
  • Exercise 2: Implementing File Management Tasks
After completing this module, students will be able to:
  • Describe File Server Resource Manager.
  • Configure quota management.
  • Implement file screening.
  • Implement classification management and file management tasks.
  • Manage storage reports.

Module 6: Configuring and Securing Remote AccessIn this module, students will learn how to secure remote access using features such as a Virtual Private Networks, Network Access Protection (NAP), and DirectAccess.Lessons

  • Lesson 1: Configuring a Virtual Private Network Connection
  • Lesson 2: Overview of Network Policies
  • Lesson 3: Integrating Network Access Protection with VPNs
  • Lesson 4: Configuring VPN Enforcement by Using NAP
  • Lesson 5: Overview of DirectAccess
  • Lesson 6: Deploying DirectAccess

Lab : Lab A: Implementing a Virtual Private Network

  • Exercise 1: Configuring Routing and Remote Access as a VPN Remote
  • Exercise 2: Configuring a Custom Network Policy

Lab : Lab B: Implementing NAP into a VPN Remote Access Solution

  • Exercise 1: Configuring NAP Components
  • Exercise 2: Configuring Client Settings to support NAP

Lab : Lab C: Implementing DirectAccess

  • Exercise 1: Reviewing the Existing Infrastructure Configuration
  • Exercise 2: Configuring Infrastructure Services for DirectAccess
  • Exercise 3: Configuring the DirectAccess Server and Verifying Connectivity
After completing this module, students will be able to:
  • Configure a VPN connection.
  • Explain network policies.
  • Integrate NAP with VPNs.
  • Configure and monitor NAP.
  • Describe DirectAccess.

Module 7: Managing Active Directory Domain ServicesIn this module, students will learn about the Active Directory infrastructure and how to manage AD DS objects.Lessons

  • Lesson 1: Overview of the Active Directory Infrastructure
  • Lesson 2: Working with Active Directory Administration Tools
  • Lesson 3: Managing User Accounts
  • Lesson 4: Managing Computer Accounts
  • Lesson 5: Managing Groups
  • Lesson 6: Using Queries to Locate Objects in AD DS

Lab : Lab A: Creating and Managing User and Computer Accounts

  • Exercise 1: Creating and Configuring User Accounts
  • Exercise 2: Creating and Configuring Computer Accounts

Lab : Lab B: Managing Groups and Locating Objects in AD DS

  • Exercise 1: Implementing Role-Based Management Using Groups
  • Exercise 2: Finding Objects in Active Directory
After completing this module, students will be able to:
  • Explain the Active Directory infrastructure.
  • Work with Active Directory Administration Tools.
  • Manage user accounts.
  • Manage computer accounts.
  • Manage groups.
  • Use queries to locate objects in AD DS.

Module 8: Configuring Active Directory Object Administration and Domain TrustIn this module, students will learn how to configure and manage AD DS object permissions; and configure trust between AD DS domains.Lessons

  • Lesson 1: Configuring Active Directory Object Administration
  • Lesson 2: Configuring Active Directory Trusts

Lab : Lab A: Configuring Active Directory Delegation

  • Exercise 1: Delegating Control of AD DS Objects
  • Exercise 2: Creating Managed Service Accounts in AD DS

Lab : Lab B: Administer Trust Relationships

  • Exercise 1: Administering a Trust Relationship
After completing this module, students will be able to:
  • Configure Active Directory object administration.
  • Configure Active Directory trusts.

Module 9: Creating and Managing Group Policy ObjectsIn this module, students will learn how to create and manage Group Policy Objects (GPOs).Lessons

  • Lesson 1: Overview of Group Policy
  • Lesson 2: Configuring the Scope of Group Policy Objects
  • Lesson 3: Managing Group Policy Objects
  • Lesson 4: Evaluating and Troubleshooting Group Policy Processing

Lab : Lab A: Creating and Configuring GPOs

  • Exercise 1: Creating and Configuring Group Policy Objects
  • Exercise 2: Managing the Scope of GPO Application

Lab : Lab B: Creating and Configuring GPOs

  • Exercise 1: Verifying GPO Application
  • Exercise 2: Managing GPOs
  • Exercise 3: Delegating Administrative Control of GPOs

Lab : Lab C: Troubleshooting Group Policy

  • Exercise 1: Troubleshooting incorrect policy settings – Scenario 1
  • Exercise 2: Troubleshooting incorrect policy settings – Scenario 2
After completing this module, students will be able to:
  • Explain Group Policy.
  • Configure the scope of GPOs.
  • Manage GPOs.
  • Evaluate and troubleshoot Group Policy processing.

Module 10: Using Group Policy to Configure User and Computer SettingsIn this module, students will understand the specific settings that can be managed using Group Policy.Lessons

  • Lesson 1: Using Group Policy to Configure Folder Redirection and Scripts
  • Lesson 2: Using Administrative Templates to Manage Users and Computers
  • Lesson 3: Deploying Software by Using Group Policy
  • Lesson 4: Deploying Group Policy Preferences

Lab : Lab A: Configuring Logon Scripts and Folder Redirection with Group Policy

  • Exercise 1 Using a Group Policy Logon Script to Map a Network Drive
  • Exercise 2: Using Group Policy to Redirect Folders

Lab : Lab B: Configuring Administrative Templates

  • Exercise 1: Configuring Administrative Templates

Lab : Lab C: Deploying Software Using (Group Policy

  • Exercise 1: Deploying a Software Package Using Group Policy

Lab : Lab D: Deploying Group Policy Preferences

  • Exercise 1: Configure Group Policy Preferences
After completing this module, students will be able to:
  • Use Group Policy to configure folder redirection and scripts.
  • Use Administrative Templates to manage users and computers.
  • Deploy software using Group Policy.
  • Deploy Group Policy preferences.

Module 11: Implementing Security Settings Using Group PolicyIn this module, students will learn how to secure network clients using Group Policy.Lessons

  • Lesson 1: Overview of Security Settings
  • Lesson 2: Implementing Fine-Grained Password Policies
  • Lesson 3: Restricting Group Membership and Access to Software

Lab : Lab A: Implementing Security Using Group Policy

  • Exercise 1: Configuring Account and Security Policy
  • Exercise 2: Implementing Fine-Grained Password Policies

Lab : Lab B: Configuring Restricted Groups and Application Control Policies

  • Exercise 1: Configuring Restricted Groups
  • Exercise 2: Configuring Application Control Policies
After completing this module, students will be able to:
  • Understand security settings.
  • Implement Fine-Grained Password Policies.
  • Restrict group membership and access to software.

Module 12: Providing Efficient Network Access for Remote OfficesIn this module, students will learn solutions that can be implemented to provide efficient remote office network access.Lessons

  • Lesson 1: Overview of Remote Office Requirements
  • Lesson 2: Implementing Read-Only Domain Controllers
  • Lesson 3: Implementing BranchCache

Lab : Lab A: Deploying a Read-Only Domain Controller

  • Exercise 1: Installing an RODC
  • Exercise 2: Configuring Password Replication Policy and Credential Caching

Lab : Lab B: Deploying BranchCache

  • Exercise 1: Configuring BranchCache in Distributed Cache Mode
  • Exercise 2: Configuring BranchCache in Hosted Cache Mode
After completing this module, students will be able to:
  • Explain remote office requirements.
  • Implement Read-Only Domain Controllers.
  • Implement BranchCache.

Module 13: Monitoring and Maintaining Windows Server 2008In this module, students will learn how to plan for and implement performance baselines and perform server monitoring using monitoring tools.Lessons

  • Lesson 1: Planning Maintenance Tasks
  • Lesson 2: Calculating a Server Baseline
  • Lesson 3: Interpreting Performance Counters
  • Lesson 4: Selecting Appropriate Monitoring Tools

Lab : Creating a Baseline of Performance Metrics

  • Exercise 1: Determining Performance Metrics
  • Exercise 2: Configuring a Performance Baseline
  • Exercise 3: Viewing Performance using Monitoring Tools
After completing this module, students will be able to:
  • Plan monitoring tasks.
  • Calculate server baselines.
  • Interpret performance counters.
  • Select appropriate monitoring tools.

Module 14: Managing Windows Server 2008 Backup, Restore, and Recovery

In this module, students will learn how to plan for and identify backup and restore strategies and to identify steps needed to recover from server startup issues.

Lessons

  • Lesson 1: Planning and Implementing File Backups on Windows Server 2008
  • Lesson 2: Planning and Implementing File Recovery
  • Lesson 3: Recovering Active Directory
  • Lesson 4: Troubleshooting Windows Server Startup

Lab : Lab A: Implementing Windows Server Backup and Recovery

  • Exercise 1: Evaluating the Existing Backup Plan
  • Exercise 2: Implementing a Recovery Plan

Lab : Lab B: Recovering Active Directory Objects

  • Exercise 1: Enabling Active Directory Recycle Bin
  • Exercise 2: Restoring a Deleted Active Directory Object
After completing this module, students will be able to:
  • Plan and implement backup on Windows Server 2008.
  • Plan and implement server restore.
  • Describe Active Directory recovery methods.
  • Troubleshoot Windows Server startup.

 

Module 1: Configuring Terminal Services Core Functionality

This module explains how to install TS and configure core functionality.

Lessons

  • Configuring TS Role
  • Configuring TS Settings

Lab : Configuring TS Core Functionali

  • Installing and Configuring TS Role
  • Configuring TS Settings
After completing this module, students will be able to:
  • Install and configure the TS role.
  • Configure TS settings.

Module 2: Configuring and Managing Terminal Services Licensing

This module explains how to configure and manage TS Licensing.

Lessons

  • Configuring TS Licensing
  • Managing TS Licenses

Lab : Configuring and Managing TS Licensing

  • Installing the TS Licensing Role
  • Configuring TS Licensing
  • Managing TS Licensing
After completing this module, students will be able to:
  • Identify the appropriate licensing scope.
  • Configure the license server scope: forest, domain, and workgroup licensing.
  • Identify when to use the per-user and per-device licensing modes.
  • Install the TS Licensing Role.
  • Configure TS licensing for per-user licenses.
  • Identify considerations when configuring TS licensing for per-device licenses.
  • Manage the licensing lifecycle.

Module 3: Configuring and Troubleshooting Terminal Services Connections

This module explains how to configure and troubleshoot connection properties using TS.

Lessons

  • Configuring TS Connection Properties
  • Configuring TS Properties Using Group Policy
  • Troubleshooting TS

Lab : Configuring and Troubleshooting TS Connections

  • Installing the TS Connection Properties
  • Troubleshooting Connectivity Issues
After completing this module, students will be able to:
  • Configure TS connection properties using the TS console.
  • Configure TS properties using Group Policy.
  • Troubleshoot TS connection properties for a single-user
  • Troubleshoot TS connection properties for multiple- users.

Module 4: Configuring Terminal Services Resources

This module explains how to configure TS Easy Print and TS RemoteApp.

Lessons

  • Installing Applications
  • Configuring Remote Applications
  • Configuring Printers

Lab : Configuring TS Resources

  • Configuring and Deploying TS RemoteApp Programs
  • Configuring TS Easy Print
After completing this module, students will be able to:
  • Identify the considerations for the types of applications that can be installed in a TS environment.
  • Install applications in a TS environment.
  • Configure TS Web Access to make TS RemoteApp programs available through a Web site.
  • Configure TS Easy Print.

Module 5: Configuring Terminal Services Web Access

This module explains how to configure TS Web Access.

Lessons

  • Installing the TS Web Access Role Service

Lab : Configuring TS Web Access

  • Configuring TS Web Access
  • Configuring TS RemoteApp Programs for TS Web Access
After completing this module, students will be able to:
  • Install the TS Web Access role service.
  • Configure TS Web Access.
  • Configure TS RemoteApp programs for TS Web Access.

Module 6: Configuring Session Broker

This module explains how to configure TS Session Broker.

Lessons

  • Configuring a TS Session Broker for a Load-Balanced Farm

Lab : Configuring a Session Broker

  • Configuring a Session Broker to Manage Traffic to Servers
After completing this module, students will be able to:
  • Configure a TS session broker for a load-balanced TS farm.

Module 7: Configuring and Troubleshooting Terminal Services Gateway

This module explains how to configure and troubleshoot TS Gateway.

Lessons

  • Configuring TS Gateway
  • Troubleshooting TS Gateway Connectivity Issues

Lab : Configuring and Troubleshooting TS Gateway

  • Configuring and Monitoring TS Gateway
  • Troubleshooting TS Gateway Connectivity
After completing this module, students will be able to:
  • Define when to use TS Gateway.
  • Configure TS Gateway properties.
  • Monitor active connections using TS Gateway console
  • Troubleshoot a TS Gateway connectivity issue.

Module 8: Managing and Monitoring Terminal Services

This module explains how to manage and monitor TS connections post installation and configuration. The students will also be introduced to configuring WSRM for TS.

Lessons

  • Managing Current TS Connections
  • Monitoring TS Connections
  • Configuring WSRM for TS

Lab : Managing and Monitoring TS

  • Managing TS Connections
  • Monitoring TS Connections
  • Configuring WSRM for TS
After completing this module, students will be able to:
  • Manage TS connections to ensure availability of the TS.
  • Resolve client connectivity issues by verifying end-user configuration using RDC.
  • Monitor TS connections to determine when to force client disconnect.
  • Identify monitoring methods for TS role specific instances.
  • Configure resource allocation policies using WSRM based on the environment.
  • Monitor WSRM performance using the WSRM Monitoring TS tool.

 

 

Module 1: Planning Server Deployment and UpgradeThis module explains how to plan Windows Server 2008 and Windows Server 2008 R2 deployments and upgrades.Lessons
  • Developing a Deployment Strategy
  • Virtualization Considerations
  • Selecting an Automation Strategy
  • Implementing an Automation Strategy
Lab : Planning and Implementing Server Deployment
  • Planning a Windows Server 2008 R2 Deployment
  • Modifying a Windows Server 2008 R2 Image
  • Preparing to Deploy the Windows Server 2008 R2 Image
After completing this module, students will be able to:
  • Develop a deployment strategy.
  • Determine factors that affect the implementation of virtualization within your organization.
  • Select a strategy for deployment automation.
  • Implement the selected automation strategy.

Module 2: Planning Server Management and Delegated AdministrationThis module explains how to plan for server management and delegated administration on Windows Server 2008 and Windows Server 2008 R2 environmentsLessons

  • Remote Server Management Tools
  • Decentralizing Systems Administration
Lab : Implementing Role-Based Systems Administration
  • Create an administrative-level role group
  • Creating an account management group
  • Enable and configure auditing for sensitive groups
After completing this module, students will be able to:
  • Plan for the implementation and use of Windows Server 2008 and Windows Server 2008 R2 remote management tools.
  • Plan and Implement decentralized systems administration.

Module 3: Planning Network Addressing and Name ResolutionThis module explains how to plan for IPv4 and IPv6 addressing in your network and to plan and implement DNS and DHCP in a Windows Server 2008 and Windows Server 2008 R2 environmentLessons

  • Provisioning IPv4 Addresses on Enterprise Networks
  • Provisioning IPv6 Addresses on Enterprise Networks
  • Transitioning to IPv6
  • Provisioning DNS Services on Enterprise Networks
Lab : Planning and Implementing DHCP and DNS
  • Planning the Deployment of DHCP and DNS Servers
  • Implementing DNS
  • Implementing DHCP
After completing this module, students will be able to:
  • Provision an IPv4 addressing scheme within your organization.
  • Provision an IPv6 addressing scheme within your organization.
  • Plan the transition to IPv6.
  • Plan and implement DNS name resolution services within your organization’s network.

Module 4: Planning and Provisioning Active Directory Domain ServicesThis module explains how to plan and provision Active Directory Domain Services in Windows Server 2008 and Windows Server 2008 R2 environments.Lessons

  • Deploying Domain Controllers in Multi-Site Organizations
  • Planning Administrative and Management Structures for AD DS
  • Planning a Maintenance Strategy for AD DS
  • Planning a Backup and Restore Strategy for AD DS
Lab : Planning for Active Directory Domain Services
  • Planning an Active Directory Structure
  • AD DS Backup and Recovery
  • Configuring Active Directory Recycle Bin
After completing this module, students will be able to:
  • Identify considerations for deploying domain controllers in multi-site organizations.
  • Plan administrative and management structures for AD DS
  • Plan a maintenance strategy for AD DS
  • Plan a backup and recovery strategy for AD DS.

Module 5: Planning Group Policy StrategyThis module explains how to plan and implement Group Policy strategy n Windows Server 2008 and Windows Server 2008 R2 environmentsLessons

  • Planning Group Policy Settings
  • Planning the Assignment of Group Policies
  • Planning the Management of Group Policy Objects
Lab : Planning and Implementing Group Policy
  • Planning Group Policy
  • Implementing the Proposed GPO Plan
After completing this module, students will be able to:
  • Plan GPO settings.
  • Plan the assignment of group policy objects to AD DS containers.
  • Plan how to manage GPOs within your organization.

Module 6: Planning Active Directory Certificate ServicesThis module explains how to plan Active Directory Certificate Services in Windows Server 2008 and Window Server 2008 R2 environments.Lessons

  • Enterprise PKI Deployment and Administration
  • Managing Certificate Templates
  • Planning Certificate Enrollment and Revocation
Lab : Configuring Certificate Services
  • Planning Certificate Services Deployment
  • Configure Stand-alone Root and Enterprise Subordinate CA
  • Configure Key Archiving and Recovery
  • Configure Online Certificate Status Protocol Array
After completing this module, students will be able to:
  • Plan enterprise PKI deployment and administration
  • Manage Certificate templates
  • Plan certificate enrollment and revocation

Module 7: Planning and Provisioning Application ServersThis module explains how to plan and provision application servers in Windows Server 2008 and Windows Server 2008 R2 environments.Lessons

  • Planning and Provisioning Web Services
  • Planning and Provisioning Presentation Virtualization
  • Planning and Provisioning Application Virtualization
Lab : Planning and Provisioning Application Servers
  • Planning Application Deployment
  • Configuring Remote Desktop Policies
  • Installing and Configuring a Remote Desktop Gateway
After completing this module, students will be able to:
  • Plan and provision web application servers.
  • Plan and provision remote desktop services
  • Plan and provision application virtualization servers.

Module 8: Planning File and Print ServicesThis module explains how to plan and implement File and Print services in your Windows Server 2008 and Windows Server 2008 R2 environment.Lessons

  • Provisioning File Services
  • Provisioning and Managing Storage
  • Provisioning and Managing Network Print Services
  • Migrating File and Print Services
Lab : Planning and Implementing File and Print Services
  • Planning File Services
  • Implementing File Services in the Branch Office
  • Implementing Print Services in the Branch Office
After completing this module, students will be able to:
  • Plan and implement the file service role.
  • Plan and manage storage.
  • Plan and manage shared printers.
  • Plan the migration of file and print services to Windows Server 2008 R2
 
Module 9: Planning Network AccessThis module explains how to plan and implement your network infrastructure components in your Windows Server 2008 and Windows server 2008 R2 environment.Lessons
  • Planning Network Security
  • Planning Virtual Private Networks
  • Planning Network Access Protection
  • Planning DirectAccess
Lab : Planning and Implementing Network Access
  • Planning Network Access
  • Implementing Network Access
After completing this module, students will be able to:
  • Plan network infrastructure components to improve network security
  • Plan and implement VPNs
  • Plan and implement NAP
  • Plan DirectAccess

Module 10: Provisioning Data and StorageThis module explains how to provision data and storage in your Windows Server 2008 and Windows server 2008 R2 environment.Lessons

  • Planning and Implementing Distributed File System
  • Planning and Implementing BranchCache
  • Provisioning Storage
Lab : Planning and Implementing Data Access
  • Planning Data Access
  • Installing and Configuring DFS
  • Enabling and Configuring BranchCache
After completing this module, students will be able to:
  • Plan and implement the Distributed File System.
  • Plan and implement BranchCache.
  • Provision an appropriate storage solution.

Module 11: Planning Update DeploymentThis module explains how to plan and implement a Windows Server Update Service topology and how to deploy and manage updates in your Windows Server 2008 and Windows Server 2008 R2 environment.Lessons

  • WSUS Topologies
  • Update Management
Lab : Multi-Site WSUS Deployment
  • Analyze WSUS Deployment Plan
  • Configure a Replica WSUS Server
  • Configure WSUS for BranchCache
After completing this module, students will be able to:
  • Plan an appropriate Windows Server Update Services (WSUS) topology
  • Deploy and manage updates

Module 12: Planning High AvailabilityThis module explains how to plan and implement High Availability in your Windows Server 2008 and Windows Server 2008 R2 environment.Lessons

  • Planning Network Load Balancing
  • Planning Failover Clustering
  • Planning for Service Availability
Lab : Planning and Implementing High Availability
  • Planning High Availability
  • Implementing High Availability
After completing this module, students will be able to:
  • Plan and deploy network load balancing.
  • Plan and deploy failover clustering.
  • Plan for high service availability.

Module 13: Planning Performance and Event MonitoringThis module explains how to plan for performance and event monitoring in your Windows Server 2008 and Windows Server 2008 R2 environment.Lessons

  • Monitoring and Analyzing Server Performance
  • Managing Events
Lab : Planning and Implementing Event Log Management
  • Planning Enterprise Event Log Management
  • Configuring Event Subscriptions
  • Creating Custom Views
  • Creating Event Tasks
After completing this module, students will be able to:
  • Monitor and analyze server performance.
  • Manage events.

Module 14: Enterprise Backup and RecoveryThis module explains how to plan for back ups and disaster recovery in your Windows Server 2008 and Windows Server 2008 R2 environmentLessons

  • Disaster Recovery Concepts
  • Planning Windows Server Backup
  • Planning Recovery of Data and servers
Lab : Backing Up and Restoring from VHD
  • Creating a Disaster Recovery Plan
  • Configure network backup with Windows Server Backup
  • Mount Backup VHD and Extract Data
  • Configure a Windows Server 2008 server to boot from backup VHD
After completing this module, students will be able to:
  • Understand Disaster Recovery Concepts
  • Plan Windows Server Backup
  • Plan recovery of data and servers
 

 

Module 1: Introducing Active Directory Domain Services

This module provides an overview of Active Directory components and concepts and steps through the basics of installing and configuring an Active Directory domain

Lessons

  • Lesson 1: Overview of Active Directory, Identity, and Access
  • Lesson 2: Active Directory Components and Concepts
  • Lesson 3: Install Active Directory Domain Services

Lab : Install an AD DS DC to Create a Single Domain Forest

  • Perform Post-Installation Configuration Tasks
  • Install a New Windows Server 2008 Forest with the Windows Interface
  • Raise Domain and Forest Functional Levels
After completing this module, students will be able to:
  • Describe the functionality of AD DS in an enterprise in relation to identity and access.
  • Describe the major components of AD DS.
  • Install AD DS and configure it as a domain controller.

Module 2: Administering Active Directory Securely and Efficiently

This module explains how to work securely and efficiently in Active Directory using Administration Tools and some best practices as well as use of Windows PowerShell.

Lessons

  • Work with Active Directory Administration Tools
  • Custom Consoles and Least Privilege
  • Find Objects in Active Directory
  • Use Windows PowerShell to Administer Active Directory

Lab : Administer Active Directory Using Administrative Tools

  • Perform Administrative Tasks by Using Administrative Tools
  • Create a Custom Active Directory Administrative Console
  • Perform Administrative Tasks with Least Privilege, Run As Administrator, and User Account Control

Lab : Find Objects in Active Directory

  • Find Objects in Active Directory
  • Use Saved Queries

Lab : Use Windows PowerShell to Administer Active Directory

  • Use PowerShell Commands to Administer Active Directory
After completing this module, students will be able to:
  • Describe and work with Active Directory administration tools.
  • Describe the purpose and functionality of custom consoles and least privilege.
  • Locate objects in Active Directory.
  • Administer Active Directory by using Windows PowerShell.

Module 3: Managing Users and Service Accounts

This module explains how to create, manage and support user and Managed Service Accounts in Active Directory.

Lessons

  • Create and Administer User Accounts
  • Configure User Object Attributes
  • Automate User Account Creation
  • Create and Configure Managed Service Accounts

Lab : Create and Administer User Accounts

  • Create User Accounts
  • Administer User Accounts

Lab : Configure User Object Attributes

  • Examine User Object Attributes
  • Manage User Object Attributes
  • Create Users from a Template

Lab : Automate User Account Creation

  • Export and Import Users with CSVDE
  • Import Users with LDIFDE
  • Import Users by Using Windows PowerShell

Lab : Create and Administer Managed Service Accounts

  • Create and Associate a Managed Service Account
After completing this module, students will be able to:
  • Create and administer user accounts.
  • Configure user object attributes.
  • Automate user account creation.
  • Create and configure managed service accounts.

Module 4: Managing Groups

This module explains how to create, modify, delete, and support group objects in Active Directory.

Lessons

  • Overview of Groups
  • Administer Groups
  • Best Practices for Group Management

Lab : Administer Groups

  • Implement Role-Based Management by Using Groups
  • (Advanced Optional) Explore Group Membership Reporting Tools
  • (Advanced Optional) Understand “Account Unknown” Permissions

Lab : Best Practices for Group Management

  • Implement Best Practices for Group Management
After completing this module, students will be able to:
  • Describe the role of groups in managing an enterprise.
  • Administer groups with by using the built-in tools in Windows Server 2008
  • Describe the best practices for managing groups.

Module 5: Managing Computer Accounts

This module explains how to create and configure computer accounts.

Lessons

  • Create Computers and Join the Domain
  • Administer Computer Objects and Accounts
  • Perform an Offline Domain Join

Lab : Create Computers and Join the Domain

  • Join a computer to the Domain with the Windows Interface
  • Secure Computer Joins
  • Manage Computer Account Creation

Lab : Administer Computer Objects and Accounts

  • Administer Computer Objects Through Their Life Cycle
  • Administer and Troubleshoot Computer Accounts

Lab : Perform an Offline Domain Join

  • Perform an Offline Domain Join
After completing this module, students will be able to:
  • Create computer accounts and join them to a domain.
  • Administer computer objects and accounts by using the Windows Interface and command-line tools.
  • Describe and perform the Offline Domain Join process.

Module 6: Implementing a Group Policy Infrastructure

This module explains what Group Policy is, how it works, and how best to implement Group Policy in your organization.

Lessons

  • Understand Group Policy
  • Implement GPOs
  • Manage Group Policy Scope
  • Group Policy Processing
  • Troubleshoot Policy Application

Lab : Implement Group Policy

  • Create, Edit, and Link GPOs
  • Use Filtering and Commenting

Lab : Manage Group Policy Scope

  • Configure GPO Scope with Links
  • Configure GPO Scope with Filtering
  • Configure Loopback Processing

Lab : Troubleshoot Policy Application

  • Perform RSoP Analysis
  • Use the Group Policy Modeling Wizard
  • View Policy Events
After completing this module, students will be able to:
  • Describe the components and technologies that comprise the Group Policy framework.
  • Implement GPOs.
  • Configure and understand a variety of policy setting types.
  • Scope GPOs by using links, security groups, Windows Management Instrumentation filters, loopback processing, and preference targeting.
  • Describe how GPOs are processed.
  • Locate the event logs containing Group Policy–related events and troubleshoot Group Policy application.

Module 7: Managing User Desktop with Group Policy

This module explains how to manage and configure desktop environments using Administrative templates and Group Policy Preferences as well as how to deploy software using Group Policy

Lessons

  • Implement Administrative Templates
  • Configure Group Policy Preferences
  • Manage Software with GPSI

Lab : Manage Administrative Templates and Central Store

  • Manage Administrative Templates

Lab : Manage Group Policy Preferences

  • Configure Group Policy Preferences
  • Verify Group Policy Preferences Application

Lab : Manage Software with GPSI

  • Deploy Software with GPSI
  • Upgrade Applications with GPSI
After completing this module, students will be able to:
  • Describe Administrative Templates
  • Understand and Configure Group Policy preferences
  • Manage software by using GPSI

Module 8: Managing Enterprise Security and Configuration with Group Policy Settings

This module explains how to use Group Policy to manage a variety of components and features of Windows. It will also explain how to audit files and folders and how to restrict access to applications using application control policies.

Lessons

  • Manage Group Membership by Using Group Policy Settings
  • Manage Security Settings
  • Auditing
  • Software Restriction Policy and Applocker

Lab : Using Group Policy to Manage Group Membership

  • Configure the Membership of Administrators by Using Restricted Group Policies

Lab : Manage Security Settings

  • Manage Local Security Settings
  • Create a Security Template
  • Use the security Configuration Wizard

Lab : Audit File System Access

  • Configure Permissions and Audit Settings
  • Configure Audit Policy
  • Examine Audit Results

Lab : Configure Application Control Policies

  • Configure Application Control Policies
After completing this module, students will be able to:
 
  • Manage group membership by using Group Policy Settings
  • Manage security settings
  • Describe the purpose and functionality of auditing
  • Describe the purpose of the Software Restriction Policy and Applocker
 

Module 9: Securing Administration

This module explains how to administer Active Directory Domain Services Securely.

Lessons

  • Delegate Administrative Permissions
  • Audit Active Directory Administration

Lab : Delegate Administration

  • Delegate Permission to Create and Support User Accounts
  • View Delegated Permissions
  • Remove and Reset Permissions

Lab : Audit Active Directory Changes

  • Audit Changes to Active Directory Using Default Audit Policy
  • Audit Changes to Active Directory Using Directory Service Changes Auditing
After completing this module, students will be able to:
  • Delegate administrative permissions.
  • Audit Active Directory administration.

Module 10: Improving the Security of Authentication in an AD DS Domain

This module explains the domain-side components of authentication, including the policies that specify password requirements and the auditing of authentication-related activities.

Lessons

  • Configure Password and Lockout Policies
  • Audit Authentication
  • Configure Read-Only Domain Controllers

Lab : Configure Password and Account Lockout Policies

  • Configure the Domain’s Password and Lockout Policies
  • Configure a Fine-Grained Password Policy

Lab : Audit Authentication

  • Audit Authentication

Lab : Configure Read-Only Domain Controllers

  • Exercise 1: Install an RODC
  • Exercise 2: Configure Password Replication Policy
  • Exercise 3: Manage Credential Caching
After completing this module, students will be able to:
  • Configure password and lockout policies.
  • Audit authentication.
  • Configure read-only domain controllers.

Module 11: Configuring Domain Name System

This module explains how to implement DNS to support name resolution both within your AD DS domain and outside your domain and your intranet.

Lessons

  • Install and Configure DNS in an AD DS Domain
  • Integration of AD DS, DNS, and Windows
  • Advanced DNS Configuration and Administration

Lab : Installing the DNS Service

  • Add the DNS Server Role
  • Configure Forward Lookup Zones and Resource Records

Lab : Advanced Configuration of DNS

  • Enable Scavenging of DNS Zones
  • Explore Domain Controller Location
  • Configure Name Resolution for External Domains
After completing this module, students will be able to:
  • Install and configure DNS in an AD DS domain.
  • Describe the integration of AD DS, DNS, and Windows.
  • Describe advanced DNS configuration and administration tasks.

Module 12: Administering AD DS Domain Controllers

This module explains how to add Windows Server 2008 domain controllers to a forest or domain, how to prepare a Microsoft Windows Server 2003 forest or domain for its first Windows Server 2008 DC, how to manage the roles performed by DCs, and how to migrate the replication of SYSVOL from the File Replication Service (FRS) used in previous versions of Windows to the Distributed File System Replication (DFS-R) mechanism that provides more robust and manageable replication.

Lessons

  • Domain Controller Installation Options
  • Install a Server Core Domain Controller
  • Manage Operations Masters
  • Configure Global Catalog
  • Configure DFS-R Replication of SYSVOL

Lab : Install Domain Controllers

  • Create an Additional DC with the Active Directory Domain Services Installation Wizard
  • Add a Domain Controller from the Command Line
  • Create a Domain Controller from Installation Media

Lab : Install a Server Core Domain Controller

  • Perform Post-Installation Configuration on Server Core
  • Create a Domain Controller with Server Core

Lab : Transfer Operations Masters Roles

  • Identify Operations Masters
  • Transfer Operations Masters Roles

Lab : Configure the Global Catalog and Universal Group Membership Caching

  • Configure a Global Catalog
  • Configure Universal Group Membership Caching

Lab : Configure DFS-R Replication of SYSVOL

  • Observe the Replication of SYSVOL
  • Prepare to Migrate to DFS-R
  • Migrate SYSVOL Replication to DFS-R
  • Verify DFS-R Replication of SYSVOL
After completing this module, students will be able to:
  • Identify the domain controller installation options.
  • Install a Server Core DC.
  • Manage operations masters.
  • Configure Global Catalog
  • Configure DFS-R replication of SYSVOL.

Module 13: Managing Sites and Active Directory Replication

This module explains how to create a distributed directory service that supports domain controllers in portions of your network that are separated by expensive, slow, or unreliable links and how to configure replication amongst those servers.

Lessons

  • Configure Sites and Subnets
  • Configure Replication

Lab : Configure Sites and Subnets

  • Configure the Default Site
  • Create Additional Sites
  • Move Domain Controllers into Sites

Lab : Configure Replication

  • Create a Connection Object
  • Create Site Links
  • Designate a Preferred Bridgehead Server
  • Configure Intersite Replication
After completing this module, students will be able to:
  • Configure sites and subnets.
  • Configure replication.

Module 14: Directory Service Continuity

This module explains about the technologies and tools that are available to help ensure the health and longevity of the directory service. You will explore tools that help you monitor performance in real time, and you will learn to log performance over time so that you can keep an eye on performance trends in order to spot potential problems.

Lessons

  • Monitor Active Directory
  • Manage the Active Directory Database
  • Active Directory Recycle Bin
  • Back Up and Restore AD DS and Domain Controllers

Lab : Monitor Active Directory Events and Performance

  • Monitor AD DS with Performance Monitor
  • Work with Data Collector Sets

Lab : Manage the Active Directory Database

  • Perform Database Maintenance
  • Work with Snapshots and Recover a Deleted User

Lab : Using Active Directory Recycle Bin

  • Enable Active Directory Recycle Bin
  • Restore Deleted Objects with Active Directory Recycle Bin

Lab : Back Up and Restore Active Directory

  • Back Up Active Directory
  • Restore Active Directory and a Deleted OU
After completing this module, students will be able to:
  • Monitor Active Directory.
  • Manage the Active Directory database.
  • Describe the purpose of the Active Directory Recycle Bin.
  • Back up and restore AD DS and domain controllers.

Module 15: Managing Multiple Domains and Forests

This module explains how to raise the domain and forest functionality levels within your environment, how to design the optimal AD DS infrastructure for your enterprise, how to migrate objects between domains and forests, and how to enable authentication and resources access across multiple domains and forests.

Lessons

  • Configure Domain and Forest Functional Levels
  • Manage Multiple Domains and Trust Relationships
  • Move Objects between Domains and Forests

Lab : Administer Trust Relationships

  • Configure Name Resolution between Contoso.com and Tailspintoys.com
  • Create a Forest Trust
After completing this module, students will be able to:
  • Configure domain and forest functional levels.
  • Manage multiple domains and trust relationships.
  • Move objects between domains and forests.

 

Module 1: Evaluating and Planning for VirtualizationDescribe virtualization as it relates to server, desktop, and application environments. Students also will learn how to plan for critical decision points related to hardware requirements, storage, availability, and security.Lessons

  • Overview of Microsoft Virtualization
  • Overview of Microsoft Virtualization
  • Evaluating the Current Environment for Virtualization
  • Evaluating the Current Environment for Virtualization

Lab : Evaluating the Network Environment for Virtualization

  • Planning for the Hyper-V Server Role
  • Assessing the Computing Environment by Using the MAP Toolkit
After completing this module, students will be able to:
  • Describe the challenges that traditional network environments face, which organizations can address by using virtualization technologies.
  • Describe virtualization technology.
  • Identify options available for server virtualization.
  • Identify options available for desktop and presentation virtualization.
  • Identify options available for application virtualization.
  • Determine the most appropriate virtualization solution based upon organizational requirements.
  • Describe management tasks for a virtual environment.
  • Describe the components that make up the Microsoft System Center solution.
  • Describe how you can use System Center Virtual Machine Manager to manage virtual environments.
  • Describe how you can use System Center Data Protection Manager to backup and recover a virtual environment.
  • Describe how you can use System Center Operations Manager to monitor and respond to performance issues that relate to the virtual environment.
  • Describe how you can use System Center Operations Manager to manage and maintain both physical and virtual systems.
  • Describe management tasks for a virtual environment.
  • Describe the components that make up the Microsoft System Center solution.
  • Describe how you can use System Center Virtual Machine Manager to manage virtual environments.
  • Describe how you can use System Center Data Protection Manager to backup and recover a virtual environment.
  • Describe how you can use System Center Operations Manager to monitor and respond to performance issues that relate to the virtual environment.
  • Describe how you can use System Center Operations Manager to manage and maintain both physical and virtual systems.
  • Describe the Hyper-V Server Role.
  • Describe requirements and limits for the Hyper-V Server Role.
  • Describe planning considerations for Hyper-V disks and storage.
  • Describe options for storage configuration in Hyper-V.
  • Describe options for providing high availability for Hyper-V.
Module 2: Installing and Configuring the Hyper-V Server RoleAfter completing this module, you will be able to install the Hyper-V server role, and configure host and virtual network settings.Lessons
  • Installing the Hyper-V Server Role
  • Configuring Hyper-V Settings and Virtual Networks

Lab : Installing and Configuring the Hyper-V Server Role

  • Installing the Hyper-V Role
  • Determining Virtual Network Configuration Settings Based On Organizational Requirements
  • Configuring Virtual Network Settings Using Virtual Network ManagerIn this exercise, you will: Configure virtual networks based on the design in Exercise 2
  • Installing Remote Management Tools
After completing this module, students will be able to:
 
  • Describe the prerequisites for installing Hyper-V.
  • Describe the process for installing Hyper-V on a Windows Server 2008 R2 host.
  • Identify the management tools that you can use to manage the Hyper-V server role.
  • Install and configure Hyper-V management for remote administration.
  • Installing the Hyper-V Server Role on a Server Core Installation of Windows Server 2008 R2.
  • Modify the default folders for virtual machines and virtual hard disks.
  • Configure Hyper-V user settings.
  • Determine when to use external, internal, or private virtual machine networks.
  • Use Virtual Network Manager to configure virtual networks.
  • Configure Hyper-V to support VLANs.

Module 3: Creating and Configuring Virtual Hard Disks and Virtual MachinesAfter completing this module, you will be able to determine and configure the most appropriate virtual hard disk(s) to use in a virtual machine. Students also will be able to create and configure virtual machines.Lessons

  • Creating and Configuring Virtual Hard Disks
  • Creating and Configuring Virtual Machines
  • Managing Virtual Machine Snapshots
  • Working with the Virtual Machine Connection Application

Lab : Creating Virtual Hard Disks and Virtual Machines

  • Creating Appropriate Virtual Hard Disks, Based On Organizational Requirements
  • Creating New Virtual Machines Using the Virtual Machine Wizard
  • Modifying Virtual Machine Settings
  • Creating and Modifying Virtual Machine Snapshots
After completing this module, students will be able to:
  • Describe storage options for virtual machines.
  • Prepare the host computer to attach physical disks to a virtual machine.
  • Configure storage based on Internet Small Computer System Interface (iSCSI).
  • Describe the types of virtual hard disks.
  • Describe the use and benefits of pass-through disks.
  • Create a new virtual hard disk using the new Virtual Hard Disk Wizard.
  • Edit and inspect virtual hard disks.
  • Describe considerations for creating new virtual machines.
  • Create a new virtual machine using the new Virtual Machine Wizard.
  • Configure virtual machine settings.
  • Describe the Hyper-V integration services.
  • Import and export virtual machines.
  • Describe the file formats that you use for virtual machines.
  • Migrate legacy virtual machines to Hyper-V.
  • Describe what a virtual machine snapshot is and how you use it. Be sure to include information on the file format.
  • Describe considerations for using snapshots, including storage sizing and requirements.
  • Creating and managing virtual machine snapshots.
  • This lesson will begin by describing a snapshot and the scenarios in which you use snapshots in the enterprise environment.
  • This lesson also describes the concept of a virtual machine snapshot. -This lesson focuses on the management aspects of applying, and deleting, and reverting snapshots. This lesson will also discuss how to configure the snapshot storage. location.
  • Describe the Virtual Machine Connection Tool.
  • List the considerations for using the virtual machine connection tool.
  • Discuss connecting to remote virtual machines from a domain and to a virtual machine in a remote domain.

Module 4: Integrating System Center Virtual Machine Manager with Microsoft Hyper-V Server 2008 R2After completing this module, students will be able to plan for, and deploy, System Center Virtual Machine Manager with their Hyper-V solution.Lessons

  • Planning for Integration of System Center Virtual Machine Manager
  • Installing the VMM Server and Administrator Console
  • Managing Hosts and Host Groups

Lab : Planning and Deploying VMM 2008 R2

  • Planning for the Implementation of SCVMM 2008 R2, Based Upon Organizational Requirements
  • Installing and Configuring SCVMM Server and Administration Console Components
After completing this module, students will be able to:
  • Creating and Managing Host Groups
  • Describe the VMM.
  • Describe VMM 2008 R2 components.
  • Describe system requirements for installing VMM 2008 R2 components.
  • Plan for the management of hosts and host groups.
  • Plan for the implementation of the VMM database.
  • Plan for the implementation of the VMM Library.
  • Describe considerations for installing the VMM Server and Administrator console, including domain requirements, account requirements, and other requirements.
  • Describe the process for installing the VMM Server.
  • Use the VMM Configuration Analyzer to identify configuration issues.
  • Describe the installation and features of the VMM administrator console.
  • Describe common post-installation tasks.
  • Describe the Windows PowerShell – VMM command shell.
  • Describe reasons for using host groups.
  • Create and modify the properties of host groups.
  • Describe the types of hosts that you can add to VMM 2008.
  • Configure default virtual machine paths.
  • Describe the process for adding hosts in an Active Directory directory service domain.
  • Describe the process for adding hosts located in a perimeter network.
  • Describe the management options for a host.

Module 5: Creating and Deploying Virtual Machines Using System Center Virtual Machine Manager 2008 R2After completing this module, students will be able to use VMM 2008 R2 to create and deploy virtual machines.Lessons

  • Creating a New Virtual Machine Using VMM 2008 R2
  • Converting a Physical Server to a Virtual Machine
  • Converting and Migrating Virtual Machines

Lab : Creating and Deploying Virtual Machines

  • Creating a New Virtual Machine
  • Deploying a New Virtual Machine from the VMM Library
  • Converting a VMware-Based Virtual Machine to a Hyper-V Based Virtual Machine
After completing this module, students will be able to:
  • Describe supported operating systems and hardware capabilities for virtual machines.
  • Identify sources that you can use for new virtual machines.
  • Describe placement options when creating a new virtual machine.
  • Describe how you use ratings to determine appropriate placement.
  • Describe how to customize placement ratings for a specific virtual machine.
  • Deploy stored virtual machines from a VMM Library.
  • Describe considerations and methods for determining physical-to-virtual (P2V) machine conversion candidates.
  • Describe requirements for physical source computers.
  • Perform a P2V conversion.
  • Identify the difference between converting and migrating a virtual machine.
  • Describe requirements for performing a V2V conversion.
  • Describe the options you have when performing a V2V conversion.
  • Describe the considerations and the process for migrating a virtual machine.
  • Describe scenarios for cloning an existing virtual machine.
  • Describe considerations for cloning a virtual machine.
  • Describe the process and decision points for cloning a virtual machine.

Module 6: Managing Virtual Machines Using Virtual Machine Manager 2008This module explains how to perform various management tasks on virtual machines stored within the VMM infrastructure.Lessons

  • Overview of VMM Management Tasks
  • Creating and Managing Checkpoints

Lab : Managing Virtual Machines Using VMM 2008 R2

  • Modifying Virtual Machine Properties
  • Managing Virtual Machine Checkpoints
After completing this module, students will be able to:
  • Describe common actions for operating and managing virtual machines.
  • Perform actions used to operate a virtual machine.
  • Perform actions used to deploy, migrate, and store virtual machines.
  • Perform actions used to manage configurations, disks, and checkpoints.
  • Describe virtual machine property options.
  • Perform actions to configure virtual machine property options.
  • Describe considerations for using checkpoints.
  • Create and modify a VMM checkpoint.
  • Manage VMM checkpoints.

Module 7: Configuring and Managing the VMM LibraryThis module explains how to configure and manage resources in the VMM Library.Lessons

  • Overview of the VMM Library
  • Managing Profiles and Templates
  • Designing Fault Tolerance for the VMM Library

Lab : Configuring and Managing the VMM Library

  • Adding a Library Server and Library Resources
  • Creating a Hardware Profile
  • Creating a Guest Operating-System Profile
  • Creating a Virtual Machine Template
  • Configuring highly available file servers for Virtual Machine Library Using DFS
After completing this module, students will be able to:
  • Describe what the VMM Library is and the types of resources that are stored within the library.
  • Add a Library Server and assign library groups.
  • Add library shares to a library server.
  • Add file-based resources to the library.
  • Describe hardware profiles and benefits of their usage.
  • Describe guest operating system profiles and benefits of their usage.
  • Show how to create a hardware and guest operating-system profile.
  • Describe the benefits for creating and using virtual machine templates.
  • Describe the components that make up a virtual machine template.
  • Create a virtual machine template.
  • Describe options for providing fault tolerance for the VMM Library.
  • Compare and evaluate the differences between the options.
  • List the considerations for supporting highly available Library Servers.

Module 8: Configuring User Roles and the Virtual Machine Manager Self-Service PortalThis module explains how to configure and manage user roles and the Virtual Machine Manager Self-Service Portal.Lessons

  • Configuring User Roles
  • Installing and Configuring the VMM Self-Service Portal

Lab : Configuring the VMM Self-Service Portal

  • Preparing the Host Group and User Role Requirements
  • Implementing the Self-Service Portal
After completing this module, students will be able to:
  • Describe the concept of role-based security in VMM 2008 R2.
  • Describe the role types that are available in VMM 2008 R2.
  • Describe the objects that you can delegate by using Role-based security.
  • Describe the process for creating a user role in VMM 2008.
  • Create user roles in VMM 2008 R2.
  • Determine the most appropriate role-based security configuration based upon organizational requirements.
  • Describe considerations for implementing the VMM Self-Service Portal.
  • Describe the overall process for implementing the Self-Service Portal.
  • Describe system requirements for the VMM Self-Service Portal.
  • Install the SCVMM Self-Service Portal.
  • Configure user access to the SCVMM Self-Service Portal.
  • Describe security best practices for the SCVMM Self-Service Portal.

Module 9: Implementing High Availability for Server VirtualizationThis module explains how to configure high availability for server virtualization.Lessons

  • Overview of Failover Clustering
  • Implementing Failover Clustering with Hyper-V
  • Implementing High Availability with VMM 2008 R2

Lab : Implementing High Availability for Server Virtualization

  • Installing and Configuring the Failover Clustering Feature
  • Configuring Live Migration
  • Integrating Failover Clustering with VMM 2008 R2
After completing this module, students will be able to:
  • Describe options for providing high availability for virtualization.
  • Describe what a Failover Cluster is and how it provides high availability for virtual machines.
  • Describe new Failover Cluster functionality available in Windows Server 2008 R2.
  • Describe considerations for a Failover Cluster design.
  • Determine appropriate Quorum configurations for Failover Clusters.
  • Describe how Failover Clusters work with Hyper-V.
  • Describe best practices for implementing Failover clustering with Hyper-V.
  • Describe requirements for using Hyper-V with failover clustering.
  • Describe the overall process for implementing Hyper-V and failover clustering.
  • Implement failover clustering with Hyper-V.
  • Describe Live Migration.
  • Describe the overall process for implementing Live Migration.
  • Perform Live Migration using Hyper-V.
  • Describe planning considerations for implementing high availability with SCVMM 2008 R2.
  • Describe the overall process for configuring host clusters to support high availability.
  • Describe how to manage host clusters.
  • Implement clustering using VMM 2008.

Module 10: Maintaining Software Updates Using the Offline Virtual Machine Servicing ToolThis module explains how to maintain software updates using the Offline Virtual Machine Servicing Tool.Lessons

  • Overview of the Offline Virtual Machine Servicing Tool
  • Configuring WSUS and the Offline Virtual Machine Servicing Tool

Lab : Maintaining Software Updates Using the Offline Virtual Machine Servicing Tool

  • Configuring Infrastructure Prerequisites to Support the Offline Virtual Machine Servicing Tool
  • Installing and Configuring the Offline Virtual Machine Servicing Tool
After completing this module, students will be able to:
  • Describe methods for maintaining software updates.
  • Describe how the Offline Virtual Machine Servicing Tool works.
  • Describe infrastructure requirements for the Offline Virtual Machine Servicing Tool.
  • Describe tasks required to prepare the virtual machines for offline software-update management.
  • Describe the process for configuration WSUS to support virtual machine servicing.
  • Configure WSUS to support virtual machine servicing.
  • Describe the process for installing and configuring the Offline Virtual Machine Servicing Tool.
  • Install and configure the Offline Virtual Machine Servicing Tool.

Module 11: Monitoring and Reporting VirtualizationThis module explains how to use the monitoring tools included with VMM 2008 and integrate System Center Operations Manager to provide extended monitoring, reporting, and troubleshooting capabilities.Lessons

  • Monitoring Jobs in VMM 2008 R2
  • Integrating System Center Operations Manager with VMM 2008 R2
  • Configuring Performance and Resource Optimization

Lab : Integrating System Center Operations Manager with VMM 2008

  • Configuring System Center Operations Manager for VMM 2008 Integration
  • Configuring PRO
After completing this module, students will be able to:
  • Describe the VMM jobs feature.
  • Describe the methods used to view job status.
  • Cancel and restart jobs.
  • Filter job status.
  • Track changes using Jobs view.
  • Perform management tasks related to job status in VMM.
  • Identify reporting needs for specific virtual environment scenarios.
  • Describe features provided by integrating System Center Operations Manger.
  • Describe prerequisites for integrating Operations Manager.
  • Describe the process for integrating Operations Manager with VMM 2008 R2.
  • Enable reporting in VMM 2008 R2.
  • Describe Performance and Resource Optimization (PRO).
  • Plan for the implementation of PRO.
  • Enable PRO integration.
  • View and implement PRO Tips.

Module 12: Backup and Restore Strategies for Virtual MachinesThis module explains how to configure and manage resources in the VMM Library.Lessons

  • Overview of Backup and Restore Options for Virtual Machines and the VMM Database
  • Implementing Data Protection Manager for Backing Up the VMM Infrastructure

Lab : Using Data Protection Manager to Back Up the VMM 2008 Infrastructure

After completing this module, students will be able to:
  • Describe options for backing up virtual machines.
  • Use the SCVMM Administrator console to back up the VMM database.
  • Describe the process and tools used to restore the VMM database.
  • Describe the features of Data Protection Manager 2007 SP1.
  • Describe the prerequisites for installing and implementing Data Protection Manager 2007 SP1.
  • Describe the process for installing and configuring Data Protection Manager 2007 SP1.
  • Describe the process for configuring backup processes for SCVMM 2008 and Data Protection Manager 2007 SP1.

Module 13: Desktop Virtualization Using Remote Desktop ServicesThis module explains how to describe and implement the core role services included in the Remote Desktop Services server Role.Lessons

  • Overview of Remote Desktop Services
  • Implementing the Remote Desktop Session Host
  • Implementing Remote Desktop Connection Broker
  • Implementing the Remote Desktop Connection Virtualization Host

Lab : Implementing Remote Desktop Services

  • Installing the Remote Desktop Session Host
  • Installing and configuring the Remote Desktop Session Host
  • Installing the Remote Desktop Connection Broker
  • Configuring the Remote Desktop Connection Broker
  • Installing and Configuring the Remote Desktop Virtualization Host
  • Deploying an Application Using RemoteApp
After completing this module, students will be able to:
  • Describe the benefits of Remote Desktop Services.
  • Describe the Role Services included with the Remote Desktop Services sever role.
  • Describe updates to the client experience with Remote Desktop Services.
  • Describe RD Licensing.
  • Describe the prerequisites for installing and implementing the RD Session Host.
  • Describe common configuration and management tasks for the RD Session Host.
  • Describe how to secure an RD Session Host.
  • What is the RDS Broker Role?
  • Describe the prerequisites for installing and implementing the RDS Connection Broker.
  • Describe common configuration and management tasks for the RDS Connection Broker.
  • Deploying RemoteApp to a Windows 7 Client Start menu.
  • Describe the virtual desktop infrastructure concept and how the Remote Desktop Virtualization host works.
  • Describe the prerequisites for installing and implementing the RD Virtualization Host.

Module 14: Extending Remote Desktop Services Outside the OrganizationThis module explains how to implement and configure the Remote Desktop Gateway and Remote Desktop Web Access.Lessons

  • Configuring the Remote Desktop Gateway
  • Configuring Remote Desktop Web Access

Lab : Integrating Remote Desktop Web Access into the Desktop Virtualization Infrastructure

  • Installing Remote Desktop Gateway
  • Installing Remote Desktop Web Access
  • Configuring Remote Desktop Web Access
  • Integrating RemoteApp and Desktop Connection with Remote Desktop Web Access
After completing this module, students will be able to:
  • Describe how the Remote Desktop Gateway works.
  • Describe how to secure the Remote Desktop Gateway.
  • Use Authorization Policies with Remote Desktop gateway.
  • Describe how to configure the Remote Desktop Gateway.
  • Describe how to use network access protocol (NAP) remediation with Remote Desktop Gateway.
  • Use certificates for Remote Desktop Gateway.
  • Describe the prerequisites for installing and implementing Remote Desktop Web Access.
  • Describe how to implement RemoteApp and Desktop connection with RD Web Access.
  • Describe how to secure Remote Desktop Web Access.
  • Configure Single Sign-on for Remote Desktop Web Access.
  • Integrate RemoteApp and Remote Desktop Web Access.

 

 

Module 1: Planning and Configuring IPv4This module explains how to deploy and configure networking services in your organization. This module explains how to implement an IPv4 addressing scheme, determine which name services to deploy, and troubleshoot network-related problems.Lessons
  • Implementing an IPv4 Network Infrastructure
  • Overview of Name Resolution Services in an IPv4 Network Infrastructure
  • Configuring and Troubleshooting IPv4
Lab : Planning and Configuring IPv4
  • Selecting an IPv4 Addressing scheme for branch offices
  • Implementing and Verifying IPv4 in the branch office
After completing this module, students will be able to:
  • Plan an IPv4 addressing scheme.
  • Determine which name services you must deploy.
  • Configure and troubleshoot an IPv4 network.
Module 2: Configuring and Troubleshooting DHCPThis module introduces you to Dynamic Host Configuration Protocol (DHCP), which plays an important role in the Windows Server 2008 R2 infrastructure. It is the primary means of distributing important network configuration information to network clients, and it provides configuration information to other network-enabled services, including Windows Deployment Services (WDS) and Network Access Protection (NAP). To support and troubleshoot a Windows Server-based network infrastructure, it is important that you understand how to deploy, configure, and troubleshoot the DHCP Server Role.Lessons
  • Overview of the DHCP Server Role
  • Configuring DHCP Scopes
  • Configuring DHCP Options
  • Managing a DHCP Database
  • Monitoring and Troubleshooting DHCP
  • Configuring DHCP Security
Lab : Configuring and Troubleshooting the DHCP Server Role
  • Selecting a Suitable DHCP Configuration
  • Implementing DHCP
  • Reconfiguring DHCP in the Head Office
  • Testing the Configuration
  • Troubleshooting DHCP Issues
After completing this module, students will be able to:
  • Describe the function of the DHCP Server Role.
  • Configure DHCP scopes.
  • Configure DHCP options.
  • Manage a DHCP database.
  • Monitor and troubleshoot the DHCP Server Role.
  • Configure security the DHCP Server Role.
Module 3: Configuring and Troubleshooting DNSThis module introduces you to Domain Name System (DNS), which is the foundation name service in Windows Server 2008 R2. It is vital that you understand how to deploy, configure, manage, and troubleshoot this critical service.Lessons
  • Installing the DNS Server Role
  • Configuring the DNS Server Role
  • Configuring DNS Zones
  • Configuring DNS Zone Transfers
  • Managing and Troubleshooting DNS
Lab : Configuring and Troubleshooting DNS
  • Selecting a DNS Configuration
  • Deploying and Configuring DNS
  • Troubleshooting DNS
After completing this module, students will be able to:
  • Install the DNS server role.
  • Configure the DNS server role.
  • Create and configure DNS zones.
  • Configure zone transfers.
  • Manage and troubleshoot DNS.
Module 4: Configuring and Troubleshooting IPv6 TCP/IPThis module introduces you to IPv6, a technology that will help ensure that the Internet can support a growing user base and the increasingly large number of IP-enabled devices. The current Internet Protocol Version 4 (IPv4) has served as the underlying Internet protocol for almost thirty years. Its robustness, scalability, and limited feature set is now challenged by the growing need for new IP addresses, due in large part to the rapid growth of new network-aware devices.Lessons
  • Overview of IPv6
  • IPv6 Addressing
  • Coexistence with IPv6
  • IPv6 Transition Technologies
  • Transitioning from IPv4 to IPv6
Lab : Configuring an ISATAP Router
  • Configuring a New IPv6 Network and Client
  • Configuring an ISATAP Router to Enable Communication Between an IPv4 Network and an IPv6 Network
Lab : Converting the Network to Native IPv6
  • Transitioning to a Native IPv6 Network
After completing this module, students will be able to:
  • Describe the features and benefits of IPv6.
  • Implement IPv6 addressing.
  • Implement an IPv6 coexistence strategy.
  • Describe and select a suitable IPv6 transition solution.
  • Transition from IPv4 to IPv6.
  • Troubleshoot an IPv6-based network.
Module 5: Configuring and Troubleshooting Routing and Remote AccessTo support your organization’s distributed workforce, you must become familiar with technologies that enable remote users to connect to your organization’s network infrastructure. These technologies include virtual private networks (VPNs) and DirectAccess. It is important that you understand how to configure and secure your remote access clients by using network policies. This module explores these remote access technologies.Lessons
  • Configuring Network Access
  • Configuring VPN Access
  • Overview of Network Policies
  • Overview of the Connection Manager Administration Kit
  • Troubleshooting Routing and Remote Access
  • Configuring DirectAccess
Lab : Configuring and Managing Network Access
  • Configuring Routing and Remote Access as a VPN Remote Access Solution
  • Configuring a Custom Network Policy
  • Create and distribute a CMAK Profile
Lab : Configuring and Managing DirectAccess
  • Configure the AD DS Domain Controller and DNS
  • Configure the PKI Environment
  • Configure the DirectAccess Clients and Test Intranet Access
  • Configure the DirectAccess Server
  • Verify DirectAccess Functionality
After completing this module, students will be able to:
  • Configure network access.
  • Create and configure a VPN solution.
  • Describe the role of network policies.
  • Use the Connection Manager Administration Kit to create and configure client connection profiles.
  • Troubleshoot routing and remote access.
  • Implement DirectAccess.
Module 6: Installing, Configuring, and Troubleshooting the Network Policy Server Role ServiceNPS provides support for the Remote Authentication Dial-In User Service (RADIUS) protocol, and can be configured as a RADIUS server or proxy. Additionally, NPS provides functionality that is essential for the implementation of Network Access Protection (NAP). This module explains how to install, configure, and troubleshoot NPS.Lessons
  • Installing and Configuring a Network Policy Server
  • Configuring RADIUS Clients and Servers
  • NPS Authentication Methods
  • Monitoring and Troubleshooting a Network Policy Server
Lab : Configuring and Managing Network Policy Server
  • Installing and Configuring the Network Policy Server Role Service
  • Configuring a RADIUS Client
  • Configuring Certificate Auto-Enrollment
  • Configuring and Testing the VPN
After completing this module, students will be able to:
  • Install and configure NPS.
  • Configure RADIUS clients and servers.
  • Describe NPS authentication methods.
  • Monitor and troubleshoot NPS.
Module 7: Implementing Network Access ProtectionIn this module, you will learn about Network Access Protection (NAP). NAP enables you to create customized health-requirement policies to validate computer health before allowing access or communication. NAP also automatically updates compliant computers to ensure on-going compliance and can limit the access of noncompliant computers to a restricted network until they become compliant.Lessons
  • Overview of Network Access Protection
  • How NAP Works
  • Configuring NAP
  • Monitoring and Troubleshooting NAP
Lab : Implementing NAP into a VPN Remote Access Solution
  • Configuring NAP Components
  • Configuring Client Settings to Support NAP
After completing this module, students will be able to:
  • Describe how NAP can help protect your network.
  • Describe the various NAP enforcement processes.
  • Configure NAP.
  • Monitor and troubleshoot NAP.
Module 8: Increasing Security for Windows ServersSecurity is an essential consideration for networking with Windows Server 2008. In this module, you will learn how to implement various methods to increase security. Windows Firewall with Advanced Security is one of the features in Windows Server 2008 that is used to increase security. You can also use Windows Server Update Services to ensure that approved security updates are applied to servers in a timely way.Lessons
  • Windows Security Overview
  • Configuring Windows Firewall with Advanced Security
  • Deploying Updates with Windows Server Update Services
Lab : Increasing Security for Windows Servers
  • Deploying a Windows Firewall Rule
  • Implementing WSUS
After completing this module, students will be able to:
  • Describe a process for increasing the security of Windows Server 2008.
  • Configure Windows Firewall with Advanced Security.
  • Describe Windows Server Update Services and how to use it.
Module 9: Increasing Security for Network CommunicationInternet Protocol security (IPsec) is a framework of open standards for protecting communications over IP networks through cryptographic security services. IPsec supports network-level peer authentication, data-origin authentication, data integrity, data confidentiality (encryption), and replay protection. The Microsoft IPsec implementation is based on standards that the Internet Engineering Task Force (IETF) IPsec working group developed. In this module, you will learn how to implement, configure, and troubleshoot IPsec.Lessons
  • Overview of IPsec
  • Configuring Connection Security Rules
  • Configuring NAP with IPsec Enforcement
  • Monitoring and Troubleshooting IPsec
Lab : Increasing Security for Network Communication
  • Selecting a Network Security Configuration
  • Configuring IPsec to Authenticate Computers
  • Testing IPsec Authentication
After completing this module, students will be able to:
  • Describe when and how to use IPsec.
  • Configure Connection Security rules.
  • Configure IPsec with NAP Enforcement.
  • Describe how to monitor and troubleshoot IPsec.
Module 10: Configuring and Troubleshooting Network File and Print ServicesFile and print services are some of the most commonly implemented network services for end users. Unlike infrastructure services like DNS, file and print services are highly visible to the end users. In this module, you will learn how to configure and troubleshoot file and print services to provide high quality service to end users. In addition, you will see how both EFS and BitLocker can be used to increase the security of files that are located in file shares.Lessons
  • Configuring and Troubleshooting File Shares
  • Encrypting Network Files with EFS
  • Encrypting Partitions with BitLocker
  • Configuring and Troubleshooting Network Printing
Lab : Configuring and Troubleshooting Network File and Print Services
  • Creating and Configuring a File Share
  • Encrypting and Recovering Files
  • Creating and Configuring a Printer Pool
After completing this module, students will be able to:
  • Describe how to manage file share security.
  • Explain how to encrypt network files with EFS.
  • Describe how to encrypt partitions with BitLocker.
  • Discuss how to configure and troubleshoot network printing.
Module 11: Optimizing Data Access for Branch Offices
Many organizations maintain a large number of file resources that need to be organized and made highly available to users. These file resources are often stored on servers and provided to users who are distributed geographically in widespread locations. In this module, you will learn how to provide efficient access to network resources with minimal traffic over a WAN link.
Lessons
  • Branch Office Data Access
  • DFS Overview
  • Overview of DFS Namespaces
  • Configuring DFS Replication
  • Configuring BranchCache
Lab : Implementing DFS
  • Installing the DFS Role Service
  • Configuring the Required Namespace
  • Configuring DFS Replication
Lab : Implementing BranchCache
  • Performing Initial Configuration Tasks for BranchCache
  • Configuring BranchCache Clients
  • Configuring BranchCache on the Branch Server
  • Monitoring BranchCache
After completing this module, students will be able to:
  • Describe the challenges experienced when providing data access to branch offices.
  • Identify the basic components of DFS.
  • Describe DFS namespaces.
  • Explain how to configure DFS replication.
  • Discuss how to configure BranchCache.
Module 12: Controlling and Monitoring Network StorageNetwork storage for users is a finite resource that must be managed appropriately to ensure that it remains available for all users. If network storage is not monitored and managed, it can become filled with irrelevant data, such as personal music or movies. Irrelevant data increases network storage costs and in some cases can prevent useful data from placement on the network storage. In this module, you will learn how to monitor and manage network storage.Lessons
  • Monitoring Network Storage
  • Controlling Network Storage Utilization
  • Managing File Types on Network Storage
Lab : Controlling and Monitoring Network Storage
  • Configuring FSRM Quotas
  • Configuring File Screening
  • Configuring File Classification and File Management
After completing this module, students will be able to:
  • Describe how to monitor network storage by using FSRM.
  • Explain how to manage quotas by using FSRM.
  • Describe how to implement file screening, classification management, and file management tasks by using FSRM.
Module 13: Recovering Network Data and ServersThis module explains how to recover network data and servers. There are a variety of scenarios where a network data or a server that provides networks services can be lost. Volume shadow copies can be used to restore previous versions of files when a file is accidentally deleted or modified on a computer that is running Windows Server 2008. Windows Server Backup can be used to back up and restore data files or an entire server.Lessons
  • Recovering Network Data with Volume Shadow Copies
  • Recovering Network Data and Servers with Windows Server Backup
Lab : Recovering Network Data and Servers
  • Configuring Shadow Copies
  • Configuring a Scheduled Backup
After completing this module, students will be able to:
  • Describe how to configure and use volume shadow copies.
  • Describe how to configure and use Windows Server Backup.
Module 14: Monitoring Windows Server 2008 Network Infrastructure Servers
When a system failure or an event that affects system performance occurs, you need to be able to repair the problem or resolve the issue quickly and efficiently. With so many variables and possibilities in the modern network environment, the ability to determine the root cause quickly often depends on having an effective performance monitoring methodology and toolset. In this module, you will learn to use performance-monitoring tools to identify components that require additional tuning and troubleshooting. By identifying components that require additional tuning, you can improve the efficiency of your servers.
Lessons
  • Monitoring Tools
  • Using Performance Monitor
  • Monitoring Event Logs
Lab : Monitoring Windows Server 2008 Network Infrastructure Servers
  • Establishing a Performance Baseline
  • Identifying the Source of a Performance Problem
  • Centralizing Events Logs
After completing this module, students will be able to:
  • Describe monitoring tools for Windows Server 2008 R2.
  • Describe how to use performance monitor.
  • Describe how to monitor event logs.
 

 

Module 1:Understanding Network Infrastructure

In this module, students will learn how to describe fundamental network component and terminology thus enabling the student to select an appropriate network component in a particular scenario. Students will also learn to determine the appropriate network infrastructure component for a given scenario.

Lessons

  • Lesson 1: Network Architecture Standards
  • Lesson 2: Local Area Networking
  • Lesson 3: Wide Area Networking
  • Lesson 4: Wireless Networking
  • Lesson 5: Connecting to the Internet
  • Lesson 6: Remote Access

Lab : Selecting Network Infrastructure Components

  • Exercise: Determining Appropriate Networking Components
After completing this module, students will be able to:
  • Describe physical network topologies and standards.
  • Define local area networks (LANs).
  • Define wide area networks (WANs).
  • Describe wireless networking technologies.
  • Explain how to connect a network to the Internet.
  • Describe how technologies connect remote access.

Module 2: Connecting Network Components

In this module, students will learn to build a network using network hardware components and technologies. The student will also learn to determine the appropriate network hardware and wiring components for a given situation.

Lessons

  • Lesson 1: Understanding the OSI Model
  • Lesson 2: Understanding Adapters, Hubs, and Switches
  • Lesson 3: Understanding Routing
  • Lesson 4: Understanding Media Types

Lab : Connecting Network Components

  • Exercise 1: Determining the Appropriate Network Hardware
  • Exercise 2: Selecting a Suitable Wiring Infrastructure
After completing this module, students will be able to:
  • Describe the industry standard protocol model.
  • Describe adapters, hubs, and switches.
  • Describe routing technologies and protocols.
  • Describe wiring methodologies and standards.

Module 3: Implementing TCP/IP

In this module, students will describe the protocols and services within the TCP/IP suite of protocols. Students will learn to implement IPv4 within a Windows environment. Students will also learn basic understanding of IPv6 and name resolution.

Lessons

  • Lesson 1: Overview of TCP/IP
  • Lesson 2: Understanding IPv4 Addressing
  • Lesson 3: Configuring IPv4
  • Lesson 4: Understanding IPv6
  • Lesson 5: Name Resolution

Lab : Implementing TCP/IP

  • Exercise 1: Determining an Appropriate IPv4 Addressing Scheme
  • Exercise 2: Configuring IPv4 with Windows Server 2008
  • Exercise 3: Verifying the Configuration
  • Exercise 4: Configuring and Testing Name Resolution
  • Exercise 5: Viewing the IPv6 Configuration
After completing this module, students will be able to:
  • Describe the functionality of the TCP/IP suite.
  • Describe IPv4 addressing.
  • Configure an IPv4 network.
  • Describe IPv6 addressing and transition.
  • Describe the various name resolution methods used by TCP/IP hosts.

Module 4: Implementing Storage in Windows ServerThis module will introduce students to different storage technologies, discuss how to implement the storage solutions in Windows Server 2008 R2 and will finish with helping you detail a resilient strategy for your storage that will be tolerant in various ways, helping to avoid unplanned downtime and loss of data.Lessons

  • Lesson 1: Identifying Storage Technologies
  • Lesson 2: Managing Disks and Volumes
  • Lesson 3: Implementing RAID

Lab : Implementing Storage in Windows Server

  • Exercise 1: Creating a New Volume
  • Exercise 2: Creating a Fault Tolerant Disk Configuration
  • Exercise 3: Implementing the Windows iSCSI initiator
After completing this module, students will be able to:
  • Identify storage technologies.
  • Manage disks and volumes.
  • Implement RAID.

Module 5: Installing and Configuring Windows Server

In this module, students will learn to understand the various options available for installing Windows Server and to complete an installation. Students will also launch a local media setup and then perform the post-installation configuration of a server.

Lessons

  • Lesson 1: Installing Windows Server
  • Lesson 2: Managing Services
  • Lesson 3: Managing Peripherals and Devices

Lab : Installing Windows Server

  • Exercise 1: Performing a Local Media-Based Installation
  • Exercise 2: Configuring Windows Server
  • Exercise 3: Configuring Services
  • Exercise 4: Configuring Devices
After completing this module, students will be able to:
  • Install Windows Server 2008 R2.
  • Manage Services.
  • Manage Devices and Device Drivers.

Module 6: Windows Server Roles

In this module, students will learn to deploy server roles to support a business scenario.
Students will also learn to implement appropriate server roles to support a given scenario.

Lessons

  • Lesson 1: Role-Based Deployment
  • Lesson 2: Deploying Role-Specific Servers

Lab : Implementing Server Roles

  • Exercise 1: Determining the Appropriate Roles to Deploy
  • Exercise 2: Deploying the Determined Server Roles
After completing this module, students will be able to:
  • Describe different types of servers.
  • Select and install server roles and features to support different types of servers.

Module 7: Implementing Active Directory Domain Services

In this module, students will learn to implement an AD DS forest.
Students will also create and configure an AD DS forest.

Lessons

  • Lesson 1: Introducing AD DS
  • Lesson 2: Implementing AD DS
  • Lesson 3: Managing Users, Groups, and Computers
  • Lesson 4: Implementing Organizational Units
  • Lesson 5: Implementing Group Policy

Lab : Lab: Implementing AD DS

  • Exercise 1: Promoting a New Domain Controller
  • Exercise 2: Creating an Organizational Unit
  • Exercise 3: Configuring Accounts
  • Exercise 4: Creating a GPO
After completing this module, students will be able to:
  • Describe the fundamental features of AD DS.
  • Manage objects in a domain.
  • Implement organizational units (OUs) for managing groups and objects.
  • Configure client computers centrally with group policy objects (GPOs).

Module 8: Implementing IT Security Layers

In this module, students will learn the concept of defense-in-depth and how to implement this approach with Windows Server. Students will also learn to implement security best practices to help to secure the network.

Lessons

  • Lesson 1: Overview of Defense-in-Depth
  • Lesson 2: Physical Security
  • Lesson 3: Internet Security

Lab : Implementing IT Security Layers

  • Exercise 1: Implementing Physical Security
  • Exercise 2: Configuring Security Settings in Internet Explorer
After completing this module, students will be able to:
  • Identify security threats at all levels and mitigate those threats.
  • Describe physical security risks and identify mitigations.
  • Identify Internet-based security threats and protect against them.

Module 9: Implementing Windows Server Security

In this module, students will understand security features in Windows Server to help to provide defense-in-depth. Students will also implement some of the Windows Server security features.

Lessons

  • Lesson 1: Overview of Windows Security
  • Lesson 2: Securing Files and Folders
  • Lesson 3: Implementing Encryption

Lab : Lab: Implementing Windows Security

  • Exercise 1: Configuring an Accounts Policy
  • Exercise 2: Securing NTFS Files and Folders
  • Exercise 3: Encrypting Files
After completing this module, students will be able to:
  • Configure a password policy.
  • Secure an NTFS folder.
  • Encrypt files.

Module 10: Implementing Network Security

In this module, students will describe the security-related threats to an organization’s network and the technologies available in Windows Server to mitigate these risks.
Students will also implement network-related security features in Windows Server.

Lessons

  • Lesson 1: Overview of Network Security
  • Lesson 2: Implementing Firewall
  • Lesson 3: Network Access Protection

Lab : Implementing Network Security

  • Exercise 1: Configuring Windows Firewall with Advanced Security
  • Exercise 2: Configuring Compliance with NAP
After completing this module, students will be able to:
  • Identify network-based security threats.
  • Implement Windows Firewall to secure Windows hosts.
  • Explain how to enforce corporate compliance.

Module 11: Implementing Security Software

In this module, students will identify and implement additional software components to enhance an organization’s security. Students will also analyze and secure a Windows Server.

Lessons

  • Lesson 1: Client Protection Features
  • Lesson 2: E-Mail Protection
  • Lesson 3: Server Protection

Lab : Implementing Security Software

  • Exercise 1: Restricting Applications with AppLocker
  • Exercise 2: Using the Security Configuration Wizard
  • Exercise 3: Hardening the Security Settings on Windows Server 2008
After completing this module, students will be able to:
  • Implement Windows Server and features to improve client security.
  • Describe security threats posed by e-mail and how to mitigate these threats.
  • Explain how to improve server security using Windows Server security analysis and hardening tools.

Module 12: Monitoring Server Performance

In this module, students will identify a poorly performing server. Students will also monitor a server to determine the performance level.

Lessons

  • Lesson 1: Overview of Server Components
  • Lesson 2: Performance Monitoring

Lab : Monitoring Server Performance

  • Exercise 1: Creating a Performance Baseline
  • Exercise 2: Simulating a Server Load
  • Exercise 3: Gathering Additional Performance Data
  • Exercise 4: Determining Probable Performance Bottlenecks
After completing this module, students will be able to:
  • Identify server components that are impacted through excessive workloads.
  • Measure system resource usage and identify component bottlenecks.

Module 13: Maintaining Windows Server

In this module, students will understand the tools available and the methods to employ to maintain and troubleshoot Windows Server. Students will also learn how to maintain and troubleshoot Windows Server systems.

Lessons

  • Lesson 1: Troubleshooting Windows Server Startup
  • Lesson 2: Server Availability and Data Recovery
  • Lesson 3: Applying Updates to Windows Server
  • Lesson 4: Troubleshooting Windows Server

Lab : Maintaining Windows Server

  • Exercise 1: Troubleshooting the Startup Process
  • Exercise 2: Installing and Configuring WSUS
  • Exercise 3: Gathering Information to Start the Troubleshooting Process
After completing this module, students will be able to:
  • Troubleshoot the Windows Server boot process.
  • Implement high-availability and recovery technologies to improve system availability.
  • Explain the importance of system updates.
  • Implement an appropriate troubleshooting methodology to resolve problems with Windows Server.

Module 14: Implementing Virtualization

In this module, students will understand the virtualization technologies provided by Microsoft. Students will also create and configure a virtual machine with Hyper-V.

Lessons

  • Lesson 1: Overview of Virtualization Technologies
  • Lesson 2: Implementing Hyper-V Role

Lab : Implementing Virtualization

  • Exercise 1: Creating the VHDs
  • Exercise 2: Creating New Virtual Machines
  • Exercise 3: Modifying Virtual Machine Settings
  • Exercise 4: Creating and Applying Virtual Machine Snapshots
After completing this module, students will be able to:
  • Describe the various virtualization technologies.
  • Implement server virtualization with Hyper-V.

 

Module 1: Preparing to Deploy Windows 7 Business DesktopsThis module helps you plan and perform effective preparation tasks for deploying Windows 7 clients. It begins by discussing client, hardware, and deployment lifecycles. It also discusses how to assess existing computing environments and licensing.Lessons

  • Overview of the Desktop Lifecycle
  • Desktop Deployment: Challenges and Considerations
  • Tools and Technologies Used in the Desktop Deployment Lifecycle
  • Assessing the Current Computing Environment for Deploying Windows 7
  • Designing Windows Activation

Lab : Assessing the Computing Environment by Using the Microsoft Assessment and Planning Toolkit

  • Assessing the Computing Environment by Using Microsoft Assessment and Planning Toolkit

Lab : Recommending an Activation Strategy

  • Review the Activation Scenario
After completing this module, students will be able to:
  • Describe the client, hardware, and desktop deployment lifecycles.
  • Explain the challenges involved and considerations for deploying desktops.
  • Describe the tools and technologies that are used in the desktop deployment lifecycle.
  • Assess the current computing environment to determine the feasibility of deploying Windows 7.
  • Design the licensing and activation strategy for a given business scenario.

Module 2: Assessing Application Compatibility in Windows 7This module describes the process for addressing common application compatibility issues experienced during a typical operating system deployment. It also explains how to use the Microsoft Application Compatibility Toolkit (ACT) to help inventory, analyze, and mitigate application compatibility issues.Lessons

  • Overview of Application Compatibility
  • Assessing and Resolving Application Compatibility Issues by Using ACT 5.5

Lab : Evaluating Application Compatibility Using the Microsoft Application Compatibility Toolkit

  • Installing and Configuring ACT
  • Collecting Application Inventory
  • Organizing the Application Inventory
  • Analyzing Application Inventory Results

Lab : Creating Application Compatibility Fixes

  • Identifying Application Compatibility Issues
  • Mitigating Application Issues
After completing this module, students will be able to:
  • Describe the process and guidelines for resolving common application compatibility issues during an operating system deployment.
  • Inventory, analyze, and mitigate application compatibility issues by using ACT 5.5.

Module 3: Evaluating Windows 7 Deployment MethodsThis module discusses different deployment scenarios and methods that are available when deploying Windows 7. It also discusses various tools and technologies to use in the different scenarios, and considerations for selecting a deployment scenario and method.Lessons

  • Evaluating In-Place Deployment
  • Evaluating Side-by-Side Deployment
  • Evaluating Lite-Touch Deployment Method
  • Evaluating Zero-Touch Deployment Method

Lab : Determining the Windows 7 Deployment Method

  • Determining Windows 7 Deployment Methods
After completing this module, students will be able to:
  • Determine the feasibility of installing Windows 7 by using in-place deployment.
  • Determine the feasibility of installing Windows 7 by using side-by-side deployment.
  • Determine the feasibility of using the Lite Touch deployment method for deploying Windows 7 in a given business scenario.
  • Determine the feasibility of using the Zero Touch deployment method for deploying Windows 7 in a given business scenario.

Module 4: Designing Standard Windows 7 ImagesThis module, explains the underlying architecture of the computer imaging system that can be used to create and deploy a custom image of a Windows 7 desktop. It also discusses the different phases of the imaging process, and how to determine imaging strategy and image servicing opportunities in Windows 7.Lessons

  • Overview of Windows 7 Installation Architecture
  • Overview of the Imaging Process
  • Determining the Image Strategy
  • Selecting the Image Servicing Methods

Lab : Determining the Windows 7 Imaging Strategy

  • Determining the Windows 7 Image Strategy
After completing this module, students will be able to:
  • Explain the Windows 7 installation architecture.
  • Explain the different phases of the imaging process.
  • Determine the appropriate Windows 7 imaging strategy based on specific business requirements.
  • Select appropriate image servicing methods to service Windows 7 images based on specific business requirements.

Module 5: Deploying Windows 7 by Using WAIKThis module explains the underlying computer imaging architecture of Windows AIK 2.0, which can be used to create and deploy a custom Windows 7 desktop image.Lessons

  • Overview of WAIK 2.0
  • Building a Reference Windows 7 Image by Using Windows SIM and Sysprep
  • Managing the Windows Preinstallation Environment
  • Capturing, Applying, and Servicing a Windows 7 Image

Lab : Installing WAIK

  • Install the Windows Automated Installation Kit
  • Identify Resources and Tools included with the Windows Automated Installation Kit

Lab : Building a Reference Image Using Windows SIM and Sysprep

  • Building a Custom Answer File by Using Windows SIM
  • Installing a Reference Computer using a Custom Answer File
  • Generalizing a Reference Computer by Using Sysprep

Lab : Creating Windows PE Boot Media

  • Adding Packages and Drivers to Windows PE
  • Creating a Bootable Windows PE ISO Image
  • Starting the Windows PE Operating System Environment

Lab : Capturing and Applying a Windows 7 Image Using ImageX

  • Capturing an Image Using ImageX
  • Apply an Image Using ImageX

Lab : Servicing Images by Using DISM

  • Servicing a Reference image using DISM
After completing this module, students will be able to:
  • Explain the key features and functionality provided by WAIK 2.0.
  • Build a reference Windows 7 image by using Windows SIM and Sysprep.
  • Create a custom Windows PE bootable image.
  • Capture, apply, and service a Windows 7 image.

Module 6: Deploying Windows 7 by Using Windows Deployment ServicesThis module describes how WDS can be used to deploy custom system images to client computers located within the network infrastructure.Lessons

  • Overview of WDS
  • Designing and Configuring WDS for Windows 7 Deployment

Lab : Deploying Windows 7 by Using Windows Deployment Services

  • Designing the WDS Environment
  • Installing and Configuring the WDS Server Role
  • Adding Boot and Install Images to WDS
  • Provisioning Drivers by Using WDS
  • Deploying a Desktop Operating System Using WDS
After completing this module, students will be able to:
  • Explain how WDS can be used to deploy Windows 7.
  • Design and configure WDS for Windows 7 deployment.

Module 7: Deploying Windows 7 by Using Lite Touch InstallationThis module describes how to design the Lite Touch Installation (LTI) environment, and provides you with an overview of the techniques that you can use to build and deploy Windows 7 using the MDT and the LTI scenario.Lessons

  • Designing the Lite Touch Installation Environment
  • Implementing MDT 2010 for Deploying Windows 7

Lab : Planning and Configuring MDT 2010

  • Planning the MDT Lite Touch Environment
  • Installing MDT 2010 and Additional Component Files
  • Configuring the Deployment Share
  • Creating a Task Sequence

Lab : Deploying Windows 7 by Using Lite Touch Installation

  • Updating the Deployment Share to Generate Windows PE Media
  • Installing Windows 7 Using Lite Touch Installation
After completing this module, students will be able to:
  • Design the Lite Touch installation environment for deploying Windows 7.
  • Perform Lite Touch installation of Windows 7 by using MDT 2010.

Module 8: Deploying Windows 7 by Using Zero Touch InstallationThis module describes the necessary prerequisites and procedures for deploying the Windows 7 operating system using Zero Touch Installation methodology.Lessons

  • Designing the Zero Touch Installation Environment
  • Performing Zero-touch Installation of Windows 7 by using MDT 2010 and Configuration Manager 2007

Lab : Deploying Windows 7 by Using Zero Touch Installation

  • Planning the Zero Touch Installation Environment
  • Preparing the Zero Touch Installation Environment
  • Configuring Deployment Packages and System Images
  • Configuring and Advertising a Client Task Sequence
After completing this module, students will be able to:
Design the Zero Touch installation environment for deploying Windows 7.
Perform the Zero Touch installation of Windows 7 by using MDT 2010 and Configuration Manager 2007.

Module 9: Migrating User State by Using WET and USMT 4.0This module explains user state migration, and how to use tools, such as Windows Easy Transfer and the Microsoft Windows User State Migration Tool (USMT), in various migration scenarios.Lessons

  • Overview of User State Migration
  • Overview of USMT 4.0
  • Planning User State Migration (USMT 4.0)
  • Migrating User State by Using USMT 4.0

Lab : Migrating User State by Using Windows Easy Transfer

  • Preparing the Window Easy Transfer Source Files
  • Capturing User State Information from a Source Computer
  • Loading User State Information to a Target Computer

Lab : Migrating User State by Using the User State Migration Tool 4.0

  • Planning for the User State Migration
  • Creating USMT Migration Scripts
  • Capturing and Restoring User State by Using USMT
  • Performing a Hard-Link Migration

Lab : Migrating User State by Using State using Hard Link Migration

  • Performing a Hard-Link Migration
After completing this module, students will be able to:
  • Migrate user state by using WET.
  • Explain how USMT 4.0 can be used to migrate user state.
  • Plan for user state migration.
  • Migrate user state by using USMT 4.0.

Module 10: Designing, Configuring, and Managing the Client EnvironmentThis module examines how to design, configure, and manage Windows 7 client configurations. Specifically, it discusses Group Policy, Internet Explorer, and system security settings.Lessons

  • Overview of Planning Client Configuration
  • Designing and Configuring Standard System Settings
  • Designing and Configuring Internet Explorer Settings
  • Designing and Configuring Security Settings
  • Designing and Implementing Group Policy
  • Troubleshooting Group Policy

Lab : Designing and Configuring the Client Environment

  • Designing a Client Environment
  • Implementing a Client Configuration

Lab : Troubleshooting GPO Issues

  • Resolving a GPO Application Problem
After completing this module, students will be able to:
  • Determine the method for implementing the client configuration.
  • Design and configure standard system settings on Windows 7 client computers.
  • Design and configure Internet Explorer settings on Windows 7 client computers.
  • Design and configure security settings on Windows 7 client computers.
  • Design and implement group policy for configuring Windows 7 client computers.
  • Troubleshoot group policy issues.

Module 11: Planning and Deploying Applications and Updates to Windows 7 ClientsThis module discusses the implications of deploying applications to Windows 7 clients including Microsoft Office 2007. It also discusses the use of Windows Server Update Services (WSUS).Lessons

  • Determining the Application Deployment Method
  • Deploying the 2007 Microsoft Office System
  • Planning and Configuring Desktop Updates by Using WSUS

Lab : Determining the Application Deployment Method

  • Determining the Application Deployment Method

Lab : Customizing the Microsoft Office Professional Plus 2007 Installation

  • Configuring the Setup Category
  • Configuring the Features Category
  • Installing Microsoft Office Professional Plus By Using the Setup Customization File

Lab : Planning and Managing Updates by Using WSUS

  • Planning Automatic Updates Settings
  • Configuring Automatic Updates Settings by Using Group Policy
  • Approving and Deploying an Update by Using WSUS
After completing this module, students will be able to:
  • Determine an appropriate application deployment method based upon business requirements.
  • Customize and deploy Office 2007 based on business requirements.
  • Plan and configure desktop updates by using WSUS.

Module 12: Deploying Windows 7 – Challenge ScenarioThis module is a comprehensive lab that gives the students an opportunity to perform an end-to-end deployment of Windows 7 by using the LTI.Lessons

  • Deploying Windows 7 – Challenge Scenario

Lab : Planning an End-to-End Windows 7 LTI Deployment

  • Planning the MDT Lite Touch Environment

Lab : Deploying Windows 7 using the LTI Deployment Plan

  • Performing a Network Assessment
  • Configuring MDT 2010 for an LTI Deployment
  • Configuring WDS for a PXE and Multicast Deployment
  • Configuring an MDT 2010 Deployment Share
  • Creating the Reference Computer
  • Preparing the Deployment Task Sequences
  • Performing an Upgrade on Target Computers
After completing this module, students will be able to:
  • Plan an end-to-end Windows 7 LTI deployment.
  • Deploy Windows 7 by using the LTI deployment plan.

 

Module 1: Installing, Upgrading, and Migrating to Windows 7This module explains how to install, upgrade and migrate to Windows 7. It also describes the key features, editions, and hardware requirements of Windows 7.Lessons

  • Preparing to Install Windows 7
  • Performing a Clean Installation of Windows 7
  • Upgrading and Migrating to Windows 7
  • Performing Image-based Installation of Windows 7
  • Configuring Application Compatibility

Lab : Installing and Configuring Windows 7

  • Migrating Settings by using Windows Easy Transfer
  • Configuring a Reference Image of Windows 7
  • Configuring a Reference Image
After completing this module, students will be able to:
  • Describe the key features, editions, and hardware requirements of Windows 7.
  • Perform a clean installation of Windows 7
  • Upgrade and Migrate to Windows 7 from an earlier version of Windows.
  • Perform an image-based installation of Windows 7
  • Resolve common application compatibility issues.

Module 2: Configuring Disks and Device DriversThis module examines how to configure disks, partitions, volumes, and device drivers to enable Windows 7 to function as desired.Lessons

  • Partitioning Disks in Windows 7
  • Managing Disk Volumes
  • Maintaining Disks in Windows 7
  • Installing and Configuring Device Drivers

Lab : Configuring Disks and Device Drivers

  • Configuring Disks
  • Configuring Disk Quotas (Optional)
  • Updating a Device Driver
After completing this module, students will be able to:
  • Configure disk partitions on a Windows 7 client computer
  • Create and manage disk volumes
  • Manage file system fragmentation and disk quotas
  • Install and configure device drivers

Module 3: Configuring File Access and Printers on Windows 7 Client ComputersThis module explains how to manage access to shared folders and printers on a computer running Windows 7. Specifically, it describes how to share and secure folders, configure folder compression, and how to install, configure, and administer printing.Lessons

  • Overview of Authentication and Authorization
  • Managing File Access in Windows 7
  • Managing Shared Folders
  • Configuring File Compression
  • Managing Printing

Lab : Configuring File Access and Printers on Windows 7 Client Computers

  • Create and Configure a Public Shared Folder for all Users
  • Configuring Shared Access to Files for Specific Users
  • Creating and Sharing a Printer
After completing this module, students will be able to:
  • Describe authentication and authorization
  • Manage file access on a Windows 7 client computer
  • Create and manage shared folders
  • Configure file compression
  • Install, configure, and administer printers

Module 4: Configuring Network ConnectivityThis module explains both IPv4 and IPv6 network connectivity. It also describes how to implement automatic IP Address Allocation and troubleshoot network connectivity.Lessons

  • Configuring IPv4 Network Connectivity
  • Configuring IPv6 Network Connectivity
  • Implementing Automatic IP Address Allocation
  • Overview of Name Resolution
  • Troubleshooting Network Issues

Lab : Configuring Network Connectivity

  • Configuring IPv4 Addressing
  • Configuring IPv6 Addressing
  • Troubleshooting Network Connectivity
After completing this module, students will be able to:
  • Configure IPv4 network connectivity.
  • Configure IPv6 network connectivity.
  • Implement automatic IP address allocation.
  • Troubleshoot common network related issues by using the tools available in Windows 7.

Module 5: Configuring Wireless Network ConnectionsThis module describes key wireless network technologies and how to configure wireless network components and the Windows 7 elements that are necessary to access wireless networks.
Lessons

  • Overview of Wireless Networks
  • Configuring a Wireless Network

Lab : Configuring Wireless Network Connections

  • Determining the appropriate configuration for a wireless network
  • Troubleshooting Wireless Connectivity
After completing this module, students will be able to:
  • Describe the standards and technologies related to wireless network connections.
  • Configure a wireless network connection.

Module 6: Securing Windows 7 DesktopsThis module describes how to make a Windows 7 computer more secure while ensuring usability is not sacrificed in the process. Specifically, it describes Windows Firewall, User Account Control, Windows Defender, and Security in Internet Explorer 8.Lessons

  • Overview of Security Management in Windows 7
  • Securing a Windows 7 Client Computer by Using Local Security Policy Settings
  • Securing Data by Using EFS and BitLocker
  • Configuring Application Restrictions
  • Configuring User Account Control
  • Configuring Windows Firewall
  • Configuring Security Settings in Internet Explorer 8
  • Configuring Windows Defender

Lab : Configuring UAC, Local Security Policies, EFS, and AppLocker

  • Using Action Center
  • Configuring Local Security Policies
  • Encrypting Data
  • Configuring AppLocker

Lab : Configuring Windows Firewall, Internet Explorer 8 Security Settings, and Windows Defender

  • Configuring Windows Firewall
  • Configuring Internet Explorer 8 Security
  • Configuring Windows Defender
After completing this module, students will be able to:
  • Explain the security management features of Windows 7.
  • Configure local security policy settings on a Windows 7 client computer.
  • Secure data by using EFS and BitLocker.
  • Configure application restrictions by using AppLocker.
  • Configure user account control settings.
  • Configure Windows Firewall on a Windows 7 client computer.
  • Configure security-related settings in Internet Explorer to help protect a Windows 7 client computer that is connected to the Internet.
  • Configure Windows Defender to help protect a Windows 7 client computer against malicious software.

Module 7: Optimizing and Maintaining Windows 7 Client ComputersThis module describes how to use the monitoring and configuration tools to obtain information about Windows 7 performance and how to troubleshoot performance and reliability problems.Lessons

  • Maintaining Performance by Using the Windows 7 Performance Tools
  • Maintaining Reliability by Using the Windows 7 Diagnostic Tools
  • Backing Up and Restoring Data by Using Windows Backup
  • Restoring a Windows 7 System by Using System Restore Points
  • Configuring Windows Update

Lab : Optimizing and Maintaining Windows 7 Client Computers

  • Monitoring System Performance
  • Backing Up and Restoring Data
  • Configuring System Restore Points
  • Configuring Windows Update
After completing this module, students will be able to:
  • Maintain the performance of a Windows 7 client computer by using performance management tools.
  • Maintain reliability of a Windows 7 client computer by using the diagnostic tools.
  • Back up and restore data on a Windows 7 client computer by using Windows Backup.
  • Restore a Windows 7 system by using system restore points.
  • Configure Windows Update on a Windows 7 client computer.

Module 8: Configuring Mobile Computing and Remote Access in Windows 7This module explains how to configure mobile devices and remote access. It also discusses DirectAccess and BranchCache which are new for Windows 7.Lessons

  • Configuring Mobile Computer and Device Settings
  • Configuring Remote Desktop and Remote Assistance for Remote Access
  • Configuring DirectAccess for Remote Access
  • Configuring BranchCache for Remote Access

Lab : Configuring Mobile Computing and Remote Access in Windows 7

  • Creating a Sync Partnership
  • Configuring Power Options
  • Enabling Remote Desktop
  • Enabling BranchCache
After completing this module, students will be able to:
  • Configure mobile computer and device settings on a Windows 7 client computer.
  • Configure Remote Desktop and Remote Assistance on a Windows 7 client computer.
  • Configure DirectAccess on a Windows 7 client computer for remote access.
  • Configure BranchCache on a branch office Windows 7 client computer.

Module 1: Deploying Microsoft Exchange Server 2010This module describes how to prepare for, and perform, an Exchange Server 2010 installation. It also provides details on the Exchange Server 2010 deployment.Lessons

  • Overview of Exchange Server 2010 Requirements
  • Installing Exchange Server 2010 Server Roles
  • Completing an Exchange Server 2010 Installation

Lab : Installing Exchange Server 2010

  • Evaluating Requirements for an Exchange Server Installation
  • Preparing for an Exchange Server 2010 Installation
  • Installing Exchange Server 2010

Lab : Verifying an Exchange Server 2010 Installation

  • Verifying an Exchange Server 2010 Installation
After completing this module, students will be able to:
  • Describe Exchange Server 2010 requirements.
  • Install the Exchange Server 2010 server roles.
  • Complete an Exchange Server 2010 installation.

Module 2: Configuring Mailbox ServersThis module describes the management tools that you can use to manage Exchange Server 2010. It also describes the Mailbox server role, some of the new Exchange Server 2010 features, the most common Mailbox server role post-installation tasks, and public folders.Lessons

  • Overview of Exchange Server 2010 Administrative Tools
  • Configuring Mailbox Server Roles
  • Configuring Public Folders

Lab : Configuring Mailbox Servers

  • Configuring Mailbox Databases
  • Configuring Public Folders
After completing this module, students will be able to:
  • Describe the Exchange Server 2010 administrative tools.
  • Configure mailbox server roles.
  • Configure public folders.

Module 3: Managing Recipient ObjectsThis module describes how you can manage recipient objects, address policies, and address lists in Exchange Server 2010. It also describes procedures for performing bulk management tasks in Exchange Management Shell.Lessons

  • Managing Mailboxes
  • Managing Other Recipients
  • Configuring E-Mail Address Policies
  • Configuring Address Lists
  • Performing Bulk Recipient Management Tasks

Lab : Managing Recipient Objects

  • Managing Recipients
  • Configuring E-Mail Address Policies
  • Configuring Address Lists
  • Performing Bulk Recipient Management Tasks
After completing this module, students will be able to:
  • Manage mailboxes in Exchange Server 2010.
  • Manage other recipients in Exchange Server 2010.
  • Configure e-mail address policies.
  • Configure address lists.
  • Perform bulk recipient management tasks.

Module 4: Managing Client AccessThis module provides details on how to implement the Client Access server role in Exchange Server 2010.Lessons

  • Configuring the Client Access Server Role
  • Configuring Client Access Services for Outlook Clients
  • Configuring Outlook Web App
  • Configuring Mobile Messaging

Lab : Configuring Client Access Servers for Outlook Anywhere Access

  • Configuring Client Access Servers
  • Configuring Outlook Anywhere

Lab : Configuring Client Access Servers for Outlook Web App and Exchange ActiveSync

  • Configuring Outlook Web App
  • Configuring Exchange ActiveSync
After completing this module, students will be able to:
  • Configure the Client Access server role.
  • Configure Client Access services for Outlook Clients.
  • Configure Outlook Web App.
  • Configure mobile messaging.

Module 5: Managing Message TransportThis module details how to manage message transport in Exchange Server 2010. It also describes how to deploy and configure the Hub Transport server.Lessons

  • Overview of Message Transport
  • Configuring Message Transport

Lab : Managing Message Transport

  • Configuring Internet Message Transport
  • Troubleshooting Message Transport
  • Troubleshooting Internet Message Delivery
After completing this module, students will be able to:
  • Describe message transport in Exchange Server 2010.
  • Configure message transport.

Module 6: Implementing Messaging SecurityThis module describes how to plan for and deploy the Edge Transport server role and the security issues related to the deployment. It also describes how to configure secure SMTP messaging as well as Domain Security.Lessons

  • Deploying Edge Transport Servers
  • Deploying an Antivirus Solution
  • Configuring an Anti-Spam Solution
  • Configuring Secure SMTP Messaging

Lab : Configuring Edge Transport Servers and Forefront Protection 2010

  • Configuring Edge Transport Servers
  • Configuring ForeFront Protection 2010 for Exchange Servers

Lab : Implementing Anti-Spam Solutions

  • Configuring an Anti-Spam Solution on Edge Transport Servers
After completing this module, students will be able to:
  • Deploy Edge Transport servers.
  • Deploy an antivirus solution.
  • Configure an anti-spam solution.
  • Configure secure SMTP messaging.

Module 7: Implementing High AvailabilityThis module describes the high availability technology built into Exchange Server 2010 and some of the outside factors that affect highly available solutions.Lessons

  • Overview of High Availability Options
  • Configuring Highly Available Mailbox Databases
  • Deploying Highly Available Non-Mailbox Servers

Lab : Implementing High Availability

  • Deploying a DAG
  • Deploying Highly Available Hub Transport and Client Access Servers
  • Testing the High Availability Configuration
After completing this module, students will be able to:
  • Describe high availability options.
  • Configure highly available mailbox databases.
  • Deploy highly available nonmailbox servers.

Module 8: Implementing Backup and Recovery

This module describes the backup and restore features built into Exchange Server 2010 and considerations for creating a suitable backup plan.

Lessons

  • Planning Backup and Recovery
  • Backing Up Exchange Server 2010
  • Restoring Exchange Server 2010

Lab : Implementing Backup and Recovery

  • Backing Up Exchange Server 2010
  • Restoring Exchange Server Data
  • Restoring Exchange Servers (optional)
After completing this module, students will be able to:
  • Plan backup and recovery.
  • Backup Exchange Server 2010.
  • Restore Exchange Server 2010.

Module 9: Configuring Messaging Policy and ComplianceThis module describes how to configure the Exchange Server 2010 messaging policy and compliance features.Lessons

  • Introducing Messaging Policy and Compliance
  • Configuring Transport Rules
  • Configuring Journaling and Multi-Mailbox Search
  • Configuring Messaging Records Management
  • Configuring Personal Archives

Lab : Configuring Transport Rules, Journal Rules, and Multi-Mailbox Search

  • Configuring Transport Rules
  • Configuring Journal Rules and Multi-Mailbox Search

Lab : Configuring Messaging Records Management and Personal Archives

  • Configuring Messaging Records Management
  • Configuring Personal Archives
After completing this module, students will be able to:
  • Describe messaging policy and compliance.
  • Configure transport rules.
  • Configure journaling and Multi-Mailbox Search.
  • Configure Messaging Records Management.
  • Configure Personal Archives.

Module 10: Securing Microsoft Exchange Server 2010This module describes how to configure administrative permissions with Role Based Access Control and how to secure the Exchange Server configuration.Lessons

  • Configuring Role Based Access Control
  • Configuring Security for Server Roles in Exchange Server 2010
  • Configuring Secure Internet Access

Lab : Securing Exchange Server 2010

  • Configuring Exchange Server Permissions
  • Configuring a Reverse Proxy for Exchange Server Access
After completing this module, students will be able to:
  • Configure role based access control permissions.
  • Configure security for Exchange Server 2010 server roles.
  • Configure secure Internet access.

Module 11: Maintaining Microsoft Exchange Server 2010This module describes how to monitor and maintain Exchange Server 2010. It also describes how to troubleshoot Exchange Server when problems arise.Lessons

  • Monitoring Exchange Server 2010
  • Maintaining Exchange Server 2010
  • Troubleshooting Exchange Server 2010

Lab : Maintaining Exchange Server 2010

  • Monitoring Exchange Server 2010
  • Troubleshooting Database Availability
  • Troubleshooting Client Access Servers
After completing this module, students will be able to:
  • Monitor Exchange Server 2010.
  • Maintain Exchange Server 2010.
  • Troubleshoot Exchange Server 2010.

Module 12:Upgrading from Exchange Server 2003 or Exchange Server 2007 to Exchange Server 2010This module describes how to upgrade an existing Exchange Server 2003 or Exchange Server 2007 organization to an Exchange Server 2010 organization. It also describes the various considerations for implementing coexistence between the two messaging systems after an Exchange Server 2010 deployment.Lessons

  • Overview of Upgrading to Exchange Server 2010
  • Upgrading from Exchange Server 2003 to Exchange Server 2010
  • Upgrading from Exchange Server 2007 to Exchange Server 2010

Lab : (no lab)

After completing this module, students will be able to:
  • Describe the general Exchange Server 2010 upgrade scenarios and strategies.
  • Upgrade from Exchange Server 2003 to Exchange Server 2010.
  • Upgrade from Exchange Server 2007 to Exchange Server 2010.

Module 13: Implementing Unified MessagingThis appendix describes how Unified Messaging integrates Exchange Server with telephony networks. It also describes how to configure Unified Messaging.Lessons

  • Overview of Telephony
  • Introducing Unified Messaging
  • Configuring Unified Messaging

Lab : Implementing Unified Messaging

  • Installing and Configuring Unified Messaging Features
After completing this module, students will be able to:
  • Describe telephony systems.
  • Describe Unified Messaging features and integration with Exchange Server 2010.
  • Configure Unified Messaging.

Module 14: Advanced Topics in Exchange Server 2010

This appendix provides an overview of how to implement a highly available Exchange Server 2010 deployment across multiple data centers. It also describes how to deploy Federated Sharing.

Lessons

  • Deploying Highly Available Solutions for Multiple Sites
  • Implementing Federated Sharing