Friday 22 August 2014

Windows Server 2008 Network Infrastructure Training

Windows Server 2008 Network Infrastructure Training

 
 
The Globomantics Scenario
What You Will Need
Are You Ready to Get Started?
 Configuring DHCP
Introduction to DHCP
How Does DHCP Work?
How to Configuring DHCP in Windows Server 2008
Authorizing DHCP
Creating Scopes
Configuring Scope Options
Address Leases
Reservations
Using DHCP in a Routed Network
How Does DHCP Relay Agent Work?
How to Configuring a DHCP Relay Agent in Windows Server 2008
 Managing DHCP
Add and Remove Bindings
Location of Database
Backup & Restore
DHCP Service
DHCP Management Permissions
Statistics
Scope Reconciliation
Audit Logging
Conflict Detection
Integration with DNS and NAP
Performance Counters
 Setting Up Routing
What is a Router?
How to Use Server 2008 as a Router
Routing Table
Adding Static Entry to a Routing Table
Inbound and Outbound Filters
Static vs. Dynamic Routing
Dynamic Routing Protocols: RIP & OSPF
How RIP Works in Server 2008
 Configuring DNS
Introduction to DNS
Installing the DNS Server Role in Windows Server 2008
What is a Domain Namespace?
What is a DNS Query?
How Queries Work
What is a Forwarder?
Setting Up Standard DNS Forwarders in Windows Server 2008
Setting Up Conditional DNS Forwarders in Windows Server 2008
How Caching Works
Clearing the DNS Cache
What is a DNS Zone?
Zone Types
Stub Zones
Active Directory Integrated Zones
Forward and Reverse Lookup
Dynamic Updates
Configuring a DNS Zone
Creating Stub Zones
DNS Records
DNS Zone Transfers
Configuring Resource Records and Zone Transfers
Zone Transfer Issues
 Managing DNS
What is Time to Live? (TTL)
What is Aging and Scavenging?
Setting the TTL Value and the Aging and Scavenging Parameters
Testing DNS Queries
nslookup
dnscommand
Performance Monitor
DNS Event Logs
DNS Debug Logging
 Name Resolution
What are Host and NetBIOS Names?
How Are Names Resolved?
Hosts & LMHosts Files / DNS & WINS Servers
DNS & WINS Servers
hostname & nbtstat Commands
Client Configuration
Troubleshooting Name Resolution
DNS Cache and Host File
GlobalNames Zone
WINS Lookup and GlobalNames Zone Demo
 Securing Data
NTFS Permissions
Assigning NTFS Permission
Special NTFS Permissions
Inheritable Permissions
Examples - Effective User Permissions
Creating Users & Groups
Demo - Effective User Permissions
Encrypting File System (EFS)
Cryptography
Public Key Encryption
How Does EFS Work?
Enabling EFS
 Sharing Data
Sharing Folders
Installing File Service Role
Sharing Using Provision a Share Folder Wizard
Accessing Shared Folder
Disk Quotas
Setting Disk Quotas Using Group Policy
Quota Management Utility
Offline Files
Distributed File System (DFS)
Creating Replica on a Different Server
Raising Domain & Forest Functional Level
 Configuring Print Services
Installing a Printer
Sharing a Printer
Installing Print Services Role
Using Print Management Snap-In
Configuring Print Permissions
Printer Priorities and Scheduling
Printer Pooling
Setting Up Printer Pooling on Server 2008
Managing Drivers
Troubleshooting Printers
Restarting Printer Spooler Service
 Windows Server Update Services (WSUS)
What Is WSUS?
Why Use WSUS?
Installing Necessary Services
Downloading and Installing WSUS
Configuring WSUS Server Options
Computer Groups and Server-Side Targeting
Using Group Policy and Client-Side Targeting
How to Approve Updates
 Backup and Recovery
How to Configure the Shadow Copy Service
Recovering Data Using Shadow Copy
Installing the Windows Server Backup Feature
Creating a Backup Volume
Scheduling Backups
Recovering Data
Complete System Recovery
Additional Backup Tips
 Monitoring Windows Server 2008
Task Manager
Event Viewer
Performance Monitor
Reliability Monitor
Data Collector Sets
 Configuring Remote Access
Installing the RRAS Component
Configuring RRAS
How to Configure a Client to Connect
Making a Connection
Manually Controlling Connections
Creating a Network Policy
Network Policy Order
Testing Our New Network Policy
Configuring RRAS - True VPN Setup
What is RADIUS?
 Wireless Networks
Is Wireless Good or Bad?
Wireless Networking Standards
Wireless Security (Maybe)
Connecting to a Wireless Network
Setting Up Security on a Router
Windows Firewall
Why Do We Need a Firewall?
Windows Firewall in Server 2008
Firewall Profiles
Creating a New Firewall Rule
Creating a Program Outbound Rule
Configuring with Group Policy
 Securing Network Traffic with IPSec
What is IPSec?
IPSec Protocols
Tunnel Mode vs. Transport Mode
Authentication Methods
Configuring IPSec in Server 2008
Creating New IPSec Policy
Getting IPSec to Work
Using Connection Security Rules
 Network Access Protection (NAP)
What is NAP?
NAP Enforcement Types
System Health Agents (SHAs) and System Health Validators (SHVs)
Health Requirement Policies
Installing Necessary Roles: DHCP Role and Network Policy and Access Services
Role
Installing and Configuring NAP: DHCP Enforcement
NAP Client Configuration
Testing Our Client for NAP Enforcement

No comments:

Post a Comment