20413B: Designing and Implementing a Server Infrastructure

Course Introduction 6m
Course Introduction
Module 01 - Planning a Server Upgrade and Migration 52m
Lesson 1: Upgrade and Migration Considerations
Windows Server 2012 Editions
Preinstallation Requirements
In-Place Upgrade vs. Server Migration
In-Place Upgrade Scenarios
Benefits of Migrating to Windows Server 2012
Tools Available to Help Plan the Upgrade and Migration
Lesson 2: Creating a Server Upgrade and Migration Plan
Overview of Deployment Planning
Windows Server 2012 Licensing and Activation
Discussion: Planning Volume Activation
Determining Which Roles Can Be Migrated
Determining Which Roles Can Be Co-Hosted
Lesson 3: Planning for Virtualization
Considerations for Implementing Virtualization
Which Virtual Licenses Are Included?
Guidelines for Configuring Hyper-V Hosts
Virtual Machine Design Considerations
Virtualization Considerations for Common Applications
Best Practices for Planning Application Virtualization
Discussion: Choosing Between Virtual and Physical Deployments
Demo - Creating and Configuring Virtual Machines
Module 01 Review
Module 02 - Planning and Implementing a Server Deployment 55m
Infrastructure
Lesson 1: Selecting an Appropriate Server Imaging Strategy
What Is Windows Imaging Format?
Performing High-Touch with Retail Media Deployments
Performing High-Touch with Standard Image Deployments
Performing Lite-Touch High-Volume Deployments
Performing Zero-Touch High-Volume Deployments
Lesson 2: Selecting a Deployment Automation Strategy
Discussion: What Is Your Current Deployment Strategy?
Why Use Automated Deployment Methods?
Selecting an Image-Based Deployment Strategy
Deployment Considerations for Virtualized Workloads
Lesson 3: Implementing an Automated Deployment Strategy
Overview of Tools Used for Image-Based Installation
Windows ADK
Windows DS
Microsoft Deployment Toolkit
Deploying Windows Server by Using Configuration Manager SP1
Tools Available for Deploying Virtual Machines
Choosing a Deployment Scenario
Demo - Preparing the Windows Server 2012 Image
Module 02 Review
Module 03 - Designing and Maintaining an IP Configuration and Address 1h 11m Management Solution
Lesson 1: Designing and Implementing DHCP
Best Practices for Designing an IPv4 Addressing Scheme
Discussion: Selecting an IP Addressing Scheme
Planning DHCP Server Placement
Planning for DHCP Server Availability
Configuring DHCP Failover
Demo - Implementing DHCP Failover
Supporting IPv6 Hosts with DHCP
Guidelines for Designing a DHCP Solution
Lesson 2: Planning and Implementing DHCP Scopes
Determining DHCP Lease Length
Implementing Superscopes
Using DHCP Reservations
DHCP Options Classes
DHCP Policy-Based Assignment
Lesson 3: Planning and Implementing an IPAM Provisioning Strategy
What Is IPAM?
IPAM Architecture
IPAM Deployment Requirements
Considerations for IPAM Deployment
Managing IP Addressing with IPAM
IPAM Management and Monitoring
Demo - Managing DHCP Options
Demo - Implementing IPAM
Module 03 Review
Module 04 - Designing and Implementing Name Resolution 2h 2m
Lesson 1: Designing a DNS Server Implementation Strategy
Gathering Information About Your Network Infrastructure
Planning DNS Server Capacity
Determining DNS Server Placement
Selecting DNS Server Roles
Security Considerations for DNS Servers
Demo - Installing the DNS Server Role
Lesson 2: Designing the DNS Namespace
DNS Namespace Scenarios
Choosing a Namespace Design
Considerations for Hosting Namespaces
Lesson 3: Designing and Implementing DNS Zones
Types of DNS Zones
Location of Zone Data
Discussion: Designing a DNS Zone Strategy
Considerations for the NetBIOS Name Resolution
Demo - Creating DNS Zones
Lesson 4: Designing and Configuring DNS Zone Replication and Delegation
When to Implement Secondary Zones
Zone Transfers and Replication
Planning Zone Transfer Security
Integrating Namespaces
Demo - Configuring Zone Transfers
Lesson 5: Optimizing DNS Servers
Optimizing DNS Recursion
Optimizing DNS Root Hints
Optimizing DNS Server Functionality
Optimizing Active Directory-Integrated Zones
Demo - Optimizing DNS
Lesson 6: Designing DNS for High Availability and Security
Best Practices for Making DNS Highly Available
How to Use Network Load Balancing for Providing Availability of DNS
Common DNS Security Attacks
Selecting a DNS Security Strategy
Selecting Additional Security Settings
DNSSEC In Windows Server 2012
Discussion: Guidelines for Designing DNS Security
Demo - Configuring DNS SEC
Module 04 Review
Module 05 - Designing and Implementing an Active Directory Domain 1h 39
Services Forest and Domain Infrastructure
Lesson 1: Designing an AD DS Forest
What Is an AD DS Forest?
AD DS Forest Models
Benefits of a Single Forest Model
Considerations for Implementing Multiple Forests
Guidelines for Designing an AD DS Forest Infrastructure
Discussion: Selecting a Suitable Forest Design
Lesson 2: Designing and Implementing AD DS Forest Trusts
Characteristics of Forest Trusts
Forest Trust Security Considerations
Resource Access
Guidelines for Designing Forest Trusts
Demo - Creating a Forest Trust
Lesson 3: Designing and Implementing AD DS Domains
AD DS Domain Models
Reasons for Deploying Multiple Domains
Considerations for Deploying Dedicated Forest Root Domains
Guidelines for Designing AD DS Domains
Demo - Implementing an AD DS Domain
Lesson 4: Designing DNS Namespaces in AD DS Environments
AD DS and DNS Integration
Options for Designing an AD DS Namespace
Designing DNS Application Partitions
Guidelines for Implementing DNS Servers into AD DS Environments
Lesson 5: Designing AD DS Domain Trusts
Trust Relationships
Shortcut Trusts
External Trusts and Realm Trusts
Guidelines for Designing AD DS Domain Trusts
Module 05 Review
Module 06 - Designing and Implementing an Active Directory 1h 15m
Organizational Unit Infrastructure
Lesson 1: Planning the Active Directory Administrative Tasks Delegation Model
What Is an Active Directory Administrative Tasks Delegation Model?
Typical IT Administrative Models
Gathering Information on the Current Administrative Structures
Gathering Information on Organizational Resources
Gathering Information on Administrative Processes
Considerations for Branch Office Delegation
Lesson 2: Designing the OU Structure
Strategies for Designing OUS
Options for Delegating Administrative Control
Designing OUs for Delegating Administrative Control
Designing OUs for Applying GPOs
Considerations for Designing OU Hierarchies
Protecting OUs from Accidental Deletion
Demo - Implementing OUS
Lesson 3: Designing and Implementing an Active Directory Group Strategy
Active Directory Groups in Windows Server 2012
Developing an Active Directory Group Naming Strategy
Strategies for Using Groups to Access Resources
Considerations for Planning Group Administration
Guidelines for Designing an Active Directory Group Strategy
Demo - Creating and Managing Groups
Module 06 Review
Module 07 - Designing and Implementing a Group Policy Object Strategy 1h 21m
Lesson 1: Gathering the Information Required for a GPO Design
Gathering Organizational Information
Gathering Information on Security Requirements
Gathering Information on Desktop Management Requirements
Gathering Information on Administrative Processes
Lesson 2: Designing and Implementing GPOs
Overview of Group Policy Settings
Considerations for Designing Administrative Templates
Managing GPO Storage
Considerations for Designing Group Policy Preferences
Best Practices for GPO Design
Demo - Implementing GPOs
Lesson 3: Designing GPO Processing
Considerations for Designing Group Policy Inheritance
Considerations for Designing Group Policy Filtering
Understanding Slow Link Detection
Considerations for Designing Group Policy Processing
Lesson 4: Planning Group Policy Management
Considerations for Designing Backup and Recovery for Group Policy
Considerations for Migrating GPOs
Considerations for Designing Group Policy Administration
Demo - Managing GPOs
Module 07 Review
Module 08 - Designing and Implementing an Active Directory Domain 1h 37m
Services Topology
Lesson 1: Designing and Implementing AD DS Sites
Benefits of Deploying AD DS Sites
Options for Designing AD DS Sites
Collecting Information for an AD DS Site Design
How Does Automatic Site Coverage Work?
Considerations for Designing AD DS Sites
Demo - Creating Site Objects
Lesson 2: Designing AD DS Replication
AD DS Replication Components
What Are the KCC and ISTG?
Options for Designing Replication Topologies
Considerations for Choosing a Replication Protocol
Planning Global Catalog and RODC Replication
Planning for SYSVOL Replication
Considerations for Designing Site Links
Considerations for Designing Bridgehead Servers
Considerations for Designing Site Link Bridging
Demo - Configuring AD DS Replication
Lesson 3: Designing the Placement of Domain Controllers
Planning Hardware Requirements for Domain Controllers
Considerations for Deploying Domain Controllers on the Server Core
Considerations for Planning Domain Controller Locations
Considerations for Planning Global Catalog Server Locations
Considerations for Planning Operations Master Server Locations
Guidelines for Monitoring Active Directory Domain Controllers
Considerations for Branch Offices
Lesson 4: Virtualization Considerations for Domain Controllers
Considerations for Virtualizing Domain Controllers
Securing Virtualized Domain Controllers
Considerations for Deploying Domain Controllers as Virtual Machines
Cloning Domain Controllers
Lesson 5: Designing Highly Available Domain Controllers
Planning for High Availability
Components of an AD DS High Availability Design
Considerations for Designing Highly Available Domain Controllers
Considerations for Designing Highly Available Global Catalog Servers
Considerations for Designing a Highly Available DNS Infrastructure
Considerations for Designing a Highly Available Network Infrastructure
Considerations for Backup and Recovery in AD DS
Module 08 Review
Module 09 - Planning and Implementing Storage 1h 1m
Lesson 1: Storage Considerations
Considerations for Different Types of Storage
SAN Components
Virtual Hard Disk Considerations
Lesson 2: Planning and Implementing iSCSI SANs
What Is iSCSI?
iSCSI Target Server and iSCSI Initiator
Options for Implementing High Availability for iSCSI
Demo - Implementing iSCSI
Considerations for Implementing iSCSI Storage
Lesson 3: Storage Spaces in Windows Server 2012
What Are Storage Spaces?
Features of Storage Spaces
Considerations for Storage Spaces
Storage Optimization in Windows Server 2012
Demo - Implementing Storage Spaces
Module 09 Review
Module 10 - Planning and Implementing File Services 1h 14m
Lesson 1: Planning and Implementing DFS
Considerations for Planning a DFS Namespace
Considerations for Planning DFS Replication
DFS Data Storage Scenarios
Demo - Deploying and Configuring DFS
Lesson 2: Planning and Implementing BranchCache
What Is BranchCache?
Selecting a BranchCache Mode
Preparing to Implement BranchCache
Demo - Implementing BranchCache
Discussion: DFS Replication or BranchCache?
Lesson 3: Planning and Implementing Dynamic Access Control
What Is Dynamic Access Control?
What Are Identity, Claims, and Central Access Policy?
Reasons to Implement Dynamic Access Control
Planning for Central Access Policy
Planning File Classifications
Planning File Access Auditing
Planning Access-Denied Assistance
Prerequisites for Dynamic Access Control
Discussion: Implementing Dynamic Access Control
Demo - Creating Central Access Rules and Policies for Dynamic Access Control
Module 10 Review
Module 11 - Designing and Implementing Network Access Services 1h 52m
Lesson 1: Designing and Implementing Remote Access Services
Considerations for Implementing Network Access
Remote Access Methods
Selecting a Suitable Tunneling Protocol
Choosing an Authentication and Encryption Method
Planning a Remote Access Services Strategy
Planning Network Access Policies
Discussion: Designing Remote Access
Demo - Implementing a VPN
Lesson 2: Designing RADIUS Authentication by Using NPS
RADIUS Roles of Windows Server 2012
Components of a RADIUS Solution
Connection Request Policies
Considerations for Configuring Connection Request Processing
Discussion: Designing a RADIUS Implementation
Lesson 3: Designing a Perimeter Network
Extranet Options
What Services Should Be on the Perimeter Network?
Designing a Firewall Solution
Discussion: Designing Internet Connectivity
Lesson 4: Planning and Implementing DirectAccess
Components of DirectAccess
The Process of Designing DirectAccess
Prerequisites for Implementing DirectAccess
What’s New in DirectAccess in Windows Server 2012?
Implementing DirectAccess
Demo - Configuring a DirectAccess Server with the Getting Started Wizard
Module 11 Review
Module 12 - Designing and Implementing Network Protection 1h 47m
Lesson 1: Overview of Network Security Design
Discussion: What Network Threats Do Organizations Face?
Key Principles of Network Security
What Is the Defense-in-Depth Model?
The Process of Designing Security
Network Security Policies and Procedures
Lesson 2: Identifying and Mitigating Common Network Security Threats
Overview of Network Attacks
Combating Common Network Vulnerabilities
Risk Assessment and Impact
The MOF Risk Management Process
Guidelines for Creating a Risk Management Plan
Lesson 3: Designing and Implementing a Windows Firewall Strategy
Discussion: Scenarios Addressed by Windows Firewall
IPsec Benefits and Usage
Connection Security Rules
Authentication Options and Methods
Best Practices for Designing Network Security Rules
Demo - Configuring Connection Security Rules
Lesson 4: Designing and Implementing a NAP Infrastructure
Systems Health Agents and System Health Validators
Considerations for Defining a NAP Policy
Considerations When Defining Your SHV Settings
Managing Unsupported Operating Systems
Considerations for Defining Your Network Policies
Considerations for Selecting an Enforcement Method
Remediation Server Groups
Demo - Implementing NAP
Module 12 Review
Course Closure

Total Duration: 16h 51m