Vi ste ovdje
Overview/Description
Active Directory Federation Services provides web-based authorization and authentication services for all users in your organization, both internal and external. Active Directory Rights Management is used to protect an organization's confidential information, and other information that needs to be protected. This course examines both of these technologies and how they work together to increase the security infrastructure in your organization. This course is part of a series of Skillsoft courses that cover the objectives for exam 70-414: Implementing an Advanced Server...
Overview/Description
Understanding the Active Directory forest structure; the mechanics of domain controllers, hosted services and strategic placement, along with Active Directory replication is fundamental to effective planning, appropriate design and efficient deployment of a Active Directory forest infrastructure. Forest and domain planning and design is a team effort, and should be a methodical, sequential, and cyclical process. The forest stakeholders and IT designers should support the forest and domain design process; functional outlines and defined security requirement specifications...
Overview/Description
An Active Directory site is best defined as a group of Active Directory resources that are hosted on a fast, reliable, and very well-connected network. This course details the design and planning of Active Directory sites that help you map the infrastructure to an organizations physical requirements. This includes strategic domain controller placement and the strategic placement of services such as FSMO roles and the Global Catalog. Branch office support is detailed including the use of Read-Only Domain Controllers, the Filtered Attribute Set (FAT), GPMC, and...
Overview/Description
Planning and design of the Organization Unit structure within each forest domain is a primary task in support of a operationally optimized Active Directory infrastructure – this course discusses Organizational Unit design and some of the primary architectural components of an Active Directory-controlled environment. The Active Directory security model is designed to support focused, selective and targeted delegated administration of the system objects and resources. Being familiar with the Active Directory security model and developing a proactive maintenance approach is...
Overview/Description
The strategic design and implementation of an operating system (OS) solution deployment requires a comprehensive understanding of all of the available tools involved in the OS design, customization, encapsulation, distribution and deployment process. Each new release of a Windows operating system brings new and newly named utilities, and it requires a forensic investigation to keep up with the new and deprecated OS servicing and deployment tools and utilities. This course discusses server deployment design, operating system deployment tools and techniques; including the...
Overview/Description
The Dynamic Host Configuration Protocol (DHCP) service and its interoperation with other key services is important in the planning, strategic design, and implementation and maintenance of key Active Directory infrastructural services. In planning the design of the DHCP service deployment, the reliability and continuous availability of the service is key to successfully operation, while the integration of the DHCP service with other Windows 2012 services should also form the backdrop of the DHCP deployment mechanics and operation. In planning the design of a DHCP solution...
Overview/Description
The designing and planning of end-user and system supporting file and storage solutions is the first step in provisioning an optimized network service solution – a storage solution must be included early in the system design process, as early the hardware appraisal and system specification phase. Although Server 2012 and Active Directory-controlled environment can adequately react and adapt to change, knowing the capabilities of the Server 2012 File and Storage Service server role and the required storage requirements, allows the system designers and network stakeholders...
Overview/Description
The planning, strategic design, and implementation and maintenance of key Active Directory infrastructural services include network services such as an IP address management solution and a virtual private network. This course outlines the design and planning considerations for the new Server 2012 IP Address Management feature known as IPAM. Areas covered include the IPAM feature, Group Policy based and manual provisioning of IPAM, IPAM deployment design such as distributed, centralized and hybrid topologies. The configuration of role-based access control, IPAM auditing,...
Overview/Description
In this course the other main remote access solution technology In Windows Server 2012 R2 is reviewed; DirectAccess. Introduced with Server 2008 R2, the DirectAccess role service role has been augmented and improved, and includes a new fast deployment options allowing small organization to plan and deploy a remote client access solution, on minimal hardware, in a short amount of time. This course covers the new simple deployment method for DirectAccess, and the new remote access server role which supports both VPN and DirectAccess services on the same Server 2012...
Overview/Description
The Server 2012 Network Policy and Access Services (NPAS) server role is deployed to support network security, and optionally to examine and maintain the health of the client computer that request access to the network and its protected resources. This course focuses on network protection, and in particular how the Server 2012 Network Protection and Access System role operates when configured to serve as a Network Access Protection (NAP) client health service monitor. The course also covers NAP; a complex and extensive mechanism that is deployed to protect internal...