0471-6454555
9447387064
9847003556

No1 Training Institute in Kerala

MCTS

Configuring Active Directory Certificate Services

Install Active Directory Certificate Services. ***Certificate authority (CA) types, including standalone, enterprise, root, and subordinate; role services; prepare for multiple-forest deployments Configure CA server settings ***Key archival; certificate database backup and restore; assigning administration roles; high-volume CAs; auditing Manage certificate templates. ***Certificate template types; securing template permissions; managing different certificate template versions; key recovery agent Manage enrollments. ***Network device enrollment service (NDES); auto enrollment; Web enrollment; extranet enrollment; smart card enrollment; authentication mechanism assurance; creating enrollment agents; deploying multiple-forest certificates; x.509 certificate mappin Manage certificate revocations. ***Configure Online Responders; Certificate Revocation List (CRL); CRL Distribution Point (CDP); Authority Information Access (AIA)
TRINITY TECHNOLOGIES

Maintaining the Active Directory environment

Configure backup and recovery ***Using Windows Server Backup; back up files and system state data to media; backup and restore by using removable media; perform an authoritative or non-authoritative restores; linked value replication; Directory Services Recovery Mode (DSRM); back Perform offline maintenance ***Offline defragmentation and compaction; Restartable Active Directory; Active Directory database mounting tool Monitor Active Directory ***Event viewer subscriptions; data collector sets; real-time monitoring; analyzing logs; WMI queries; PowerShell
TRINITY TECHNOLOGIES

Creating and maintaining Active Directory objects

Automate creation of Active Directory accounts. ***Bulk import; configure the UPN; create computer, user, and group accounts (scripts, import, migration); template accounts; contacts; distribution lists; offline domain join Maintain Active Directory accounts ***Manage computer accounts; configure group membership; account resets; delegation; AGDLP/AGGUDLP; deny domain local group; local vs. domain; Protected Admin; disabling accounts vs. deleting accounts; deprovisioning; contacts; creating organizationa Create and apply Group Policy objects (GPOs). ***Enforce, OU hierarchy, block inheritance, and enabling user objects; group policy processing priority; WMI; group policy filtering; group policy loopback; Group Policy Preferences (GPP) Configure GPO templates. ***User rights; ADMX Central Store; administrative templates; security templates; restricted groups; security options; starter GPOs; shell access policies Deploy and manage software by using GPOs ***Publishing to users; assigning software to users; assigning to computers; software removal; software restriction policies; AppLocker Configure account policies. ***Domain password policy; account lockout policy; fine-grain password policies Configure audit policy by using GPOs ***Audit logon events; audit account logon events; audit policy change; audit access privilege use; audit directory service access; audit object access; advanced audit policies; global object access auditing; “Reason for Access” reporting
TRINITY TECHNOLOGIES

Configuring Active Directory Roles and Services

Configure Active Directory Lightweight Directory Service (AD LDS). ***Migration to AD LDS; configure data within AD LDS; configure an authentication server; Server Core Installation Configure Active Directory Rights Management Service (AD RMS). ***Certificate request and installation; self-enrollments; delegation; create RMS templates; RMS administrative roles; RM Add-on for IE Configure the read-only domain controller (RODC). ***Replication; Administrator role separation; read-only DNS; BitLocker; credential caching; password replication; syskey; read-only SYSVOL; staged install Configure Active Directory Federation Services (AD FSv2). ***Install AD FS server role; exchange certificate with AD FS agents; configure trust policies; configure user and group claim mapping; import and export trust policies
TRINITY TECHNOLOGIES

Configuring the Active Directory infrastructure

Configure a forest or a domain. ***Remove a domain; perform an unattended installation; Active Directory Migration Tool (ADMT) ; change forest and domain functional levels; interoperability with previous versions of Active Directory; multiple user principal name (UPN) suffixes; for Configure trusts. ***Forest trust; selective authentication vs. forest-wide authentication; transitive trust; external trust; shortcut trust; SID filtering Configure sites ***Create Active Directory subnets; configure site links; configure site link costing; configure sites infrastructure Configure Active Directory replication. ***DFSR; one-way replication; Bridgehead server; replication scheduling; configure replication protocols; force intersite replication Configure the global catalog ***Universal Group Membership Caching (UGMC); partial attribute set; promote to global catalog Configure operations masters ***Seize and transfer; backup operations master; operations master placement; Schema Master; extending the schema; time service
TRINITY TECHNOLOGIES

Configuring Domain Name System (DNS) for Active Directory

• Configure zones ***Dynamic DNS (DDNS), Non-dynamic DNS (NDDNS), and Secure Dynamic DNS (SDDNS); Time to Live (TTL); GlobalNames; Primary, Secondary, Active Directory Integrated, Stub; SOA; zone scavenging; forward lookup; reverse lookup Configure DNS server settings ***Forwarding; root hints; configure zone delegation; round robin; disable recursion; debug logging; server scavenging Configure zone transfers and replication ***Configure replication scope (forestDNSzone; domainDNSzone); incremental zone transfers; DNS Notify; secure zone transfers; configure name servers; application directory partitions
TRINITY TECHNOLOGIES

Windows Server 2008 Active Directory, Configuring

TRINITY TECHNOLOGIES

Configuring Backup and Recovery Options

Configure backup ***Creating a system recovery disk; backing up files, folders, or full system; scheduling backups Configure system recovery options ***Configuring system restore points; restoring system settings; last known good configuration; complete restore; driver rollback Configure file recovery options. ***Configuring file restore points; restoring previous versions of files and folders; restoring damaged or deleted files by using shadow copies; restore user profiles
TRINITY TECHNOLOGIES

Monitoring and Maintaining Systems that Run Windows 7

Configure updates to Windows 7 ***Configuring update settings; determining source of updates; configuring Windows Update policies; reviewing update history; checking for new updates; rolling back updates Manage disks. ***Managing disk volumes; managing file system fragmentation; RAID; removable device policies Monitor systems. ***Configuring event logging; filtering event logs; event subscriptions; data collector sets; generating a system diagnostics report Configure performance settings ***Configuring page files; configuring hard drive cache; updated drivers; configuring networking performance; configuring power plans; configuring processor scheduling; configuring desktop environment; configuring services and programs to resolve per
TRINITY TECHNOLOGIES

Configuring Mobile Computing

Configure BitLocker and BitLocker To Go. ***Configuring BitLocker and BitLocker To Go policies; managing Trusted Platform Module (TPM) PINs; configuring startup key storage; data recovery agent support Configure DirectAccess ***Configuring client side; configuring authentication; network infrastructure requirements Configure mobility options ***Configuring offline file policies; transparent caching; creating and migrating power policy • Configure remote connections. ***Establishing VPN connections and authentication; enabling a VPN reconnect; advanced security auditing; NAP quarantine remediation; dial-up connections; remote desktop; published apps
TRINITY TECHNOLOGIES

Configuring Access to Resources

Configure shared resources ***Folder virtualization; shared folder permissions; printers and queues; configuring HomeGroup settings Configure file and folder access ***Encrypting files and folders by using EFS; configuring NTFS permissions; resolving effective permissions issues; copying files vs. moving files Configure user account control (UAC). ***Configuring local security policy; configuring admin vs. standard UAC prompt behaviors; configuring Secure Desktop Configure authentication and authorization ***Resolving authentication issues; configuring rights; managing credentials; managing certificates; smart cards with PIV; elevating user privileges; multifactor authentication Configure BranchCache ***Distributed cache mode vs. hosted mode; network infrastructure requirements; configuring settings; certificate management
TRINITY TECHNOLOGIES

Configuring Network Connectivity

Configure IPv4 network settings ***Connecting to a network; configuring name resolution; setting up a connection for a network; network locations; resolving connectivity issues; APIPA Configure IPv6 network settings ***Configuring name resolution; connecting to a network; setting up a connection for a network; network locations; resolving connectivity issues; link local multicast name resolution Configure networking settings ***Adding a physically connected (wired) or wireless device; connecting to a wireless network; configuring security settings on the client; set preferred wireless networks; configuring network adapters; configuring location-aware printing Configure Windows Firewall Configuring rules for multiple profiles; allowing or denying an application; network-profile-specific rules; configuring notifications; configuring authenticated exceptions Configure remote management ***o Remote management methods; configuring remote management tools; executing PowerShell commands
TRINITY TECHNOLOGIES

Configuring Hardware and Applications

Configure devices. ***Updating, disabling, and uninstalling drivers; signed drivers; conflicts between drivers; configuring driver settings; resolving problem device driver Configure application compatibility. ***o Setting compatibility mode; implementing shims; compatibility issues with Internet Explorer Configure application restrictions. ***Setting software restriction policies; setting application control policies; setting through group policy or local security policy Configure Internet Explorer Configuring compatibility view; configuring security settings; configuring providers; managing add-ons; controlling InPrivate mode; certificates for secure Web sites
TRINITY TECHNOLOGIES

Deploying Windows 7

Capture a system image ***Preparing system for capture; creating a WIM file; automated capture; manual capture Prepare a system image for deployment. ***Inserting an application into a system image; inserting a driver into a system image; inserting an update into a system image; configuring tasks to run after deployment Deploy a system image. ***Automated deployment methods; manually deploying a customized image Configure a VHD. ***Creating, deploying, booting, mounting, and updating VHDs; offline updates; offline servicing
TRINITY TECHNOLOGIES

Installing, Upgrading, and Migrating to Windows 7

Perform a clean installation ***Identifying hardware requirements; setting up as the sole operating system; setting up as dual boot; installation methods; boot from the source of installation, preparing the installation source: USB, CD, network share, WDS Upgrade to Windows 7 from previous versions of Windows. ***Upgrading from Windows Vista; migrating from Windows XP; upgrading from one edition of Windows 7 to another edition of Windows 7 Migrate user profiles. ***Migrating from one machine to another; migrating from previous versions of Windows; side-by-side vs. wipe and load
TRINITY TECHNOLOGIES

Windows 7, Configuring Exam: 70-680

TRINITY TECHNOLOGIES

Windows 7, Configuring Exam: 70-680

Installing, Upgrading, and Migrating to Windows 7

Perform a clean installation ***Identifying hardware requirements; setting up as the sole operating system; setting up as dual boot; installation methods; boot from the source of installation, preparing the installation source: USB, CD, network share, WDS Upgrade to Windows 7 from previous versions of Windows. ***Upgrading from Windows Vista; migrating from Windows XP; upgrading from one edition of Windows 7 to another edition of Windows 7 Migrate user profiles. ***Migrating from one machine to another; migrating from previous versions of Windows; side-by-side vs. wipe and load

Deploying Windows 7

Capture a system image ***Preparing system for capture; creating a WIM file; automated capture; manual capture Prepare a system image for deployment. ***Inserting an application into a system image; inserting a driver into a system image; inserting an update into a system image; configuring tasks to run after deployment Deploy a system image. ***Automated deployment methods; manually deploying a customized image Configure a VHD. ***Creating, deploying, booting, mounting, and updating VHDs; offline updates; offline servicing

Configuring Hardware and Applications

Configure devices. ***Updating, disabling, and uninstalling drivers; signed drivers; conflicts between drivers; configuring driver settings; resolving problem device driver Configure application compatibility. ***o Setting compatibility mode; implementing shims; compatibility issues with Internet Explorer Configure application restrictions. ***Setting software restriction policies; setting application control policies; setting through group policy or local security policy Configure Internet Explorer Configuring compatibility view; configuring security settings; configuring providers; managing add-ons; controlling InPrivate mode; certificates for secure Web sites

Configuring Network Connectivity

Configure IPv4 network settings ***Connecting to a network; configuring name resolution; setting up a connection for a network; network locations; resolving connectivity issues; APIPA Configure IPv6 network settings ***Configuring name resolution; connecting to a network; setting up a connection for a network; network locations; resolving connectivity issues; link local multicast name resolution Configure networking settings ***Adding a physically connected (wired) or wireless device; connecting to a wireless network; configuring security settings on the client; set preferred wireless networks; configuring network adapters; configuring location-aware printing Configure Windows Firewall Configuring rules for multiple profiles; allowing or denying an application; network-profile-specific rules; configuring notifications; configuring authenticated exceptions Configure remote management ***o Remote management methods; configuring remote management tools; executing PowerShell commands

Configuring Access to Resources

Configure shared resources ***Folder virtualization; shared folder permissions; printers and queues; configuring HomeGroup settings Configure file and folder access ***Encrypting files and folders by using EFS; configuring NTFS permissions; resolving effective permissions issues; copying files vs. moving files Configure user account control (UAC). ***Configuring local security policy; configuring admin vs. standard UAC prompt behaviors; configuring Secure Desktop Configure authentication and authorization ***Resolving authentication issues; configuring rights; managing credentials; managing certificates; smart cards with PIV; elevating user privileges; multifactor authentication Configure BranchCache ***Distributed cache mode vs. hosted mode; network infrastructure requirements; configuring settings; certificate management

Configuring Mobile Computing

Configure BitLocker and BitLocker To Go. ***Configuring BitLocker and BitLocker To Go policies; managing Trusted Platform Module (TPM) PINs; configuring startup key storage; data recovery agent support Configure DirectAccess ***Configuring client side; configuring authentication; network infrastructure requirements Configure mobility options ***Configuring offline file policies; transparent caching; creating and migrating power policy • Configure remote connections. ***Establishing VPN connections and authentication; enabling a VPN reconnect; advanced security auditing; NAP quarantine remediation; dial-up connections; remote desktop; published apps

Monitoring and Maintaining Systems that Run Windows 7

Configure updates to Windows 7 ***Configuring update settings; determining source of updates; configuring Windows Update policies; reviewing update history; checking for new updates; rolling back updates Manage disks. ***Managing disk volumes; managing file system fragmentation; RAID; removable device policies Monitor systems. ***Configuring event logging; filtering event logs; event subscriptions; data collector sets; generating a system diagnostics report Configure performance settings ***Configuring page files; configuring hard drive cache; updated drivers; configuring networking performance; configuring power plans; configuring processor scheduling; configuring desktop environment; configuring services and programs to resolve per

Configuring Backup and Recovery Options

Configure backup ***Creating a system recovery disk; backing up files, folders, or full system; scheduling backups Configure system recovery options ***Configuring system restore points; restoring system settings; last known good configuration; complete restore; driver rollback Configure file recovery options. ***Configuring file restore points; restoring previous versions of files and folders; restoring damaged or deleted files by using shadow copies; restore user profiles

Windows Server 2008 Active Directory, Configuring

Configuring Domain Name System (DNS) for Active Directory

• Configure zones ***Dynamic DNS (DDNS), Non-dynamic DNS (NDDNS), and Secure Dynamic DNS (SDDNS); Time to Live (TTL); GlobalNames; Primary, Secondary, Active Directory Integrated, Stub; SOA; zone scavenging; forward lookup; reverse lookup Configure DNS server settings ***Forwarding; root hints; configure zone delegation; round robin; disable recursion; debug logging; server scavenging Configure zone transfers and replication ***Configure replication scope (forestDNSzone; domainDNSzone); incremental zone transfers; DNS Notify; secure zone transfers; configure name servers; application directory partitions

Configuring the Active Directory infrastructure

Configure a forest or a domain. ***Remove a domain; perform an unattended installation; Active Directory Migration Tool (ADMT) ; change forest and domain functional levels; interoperability with previous versions of Active Directory; multiple user principal name (UPN) suffixes; for Configure trusts. ***Forest trust; selective authentication vs. forest-wide authentication; transitive trust; external trust; shortcut trust; SID filtering Configure sites ***Create Active Directory subnets; configure site links; configure site link costing; configure sites infrastructure Configure Active Directory replication. ***DFSR; one-way replication; Bridgehead server; replication scheduling; configure replication protocols; force intersite replication Configure the global catalog ***Universal Group Membership Caching (UGMC); partial attribute set; promote to global catalog Configure operations masters ***Seize and transfer; backup operations master; operations master placement; Schema Master; extending the schema; time service

Configuring Active Directory Roles and Services

Configure Active Directory Lightweight Directory Service (AD LDS). ***Migration to AD LDS; configure data within AD LDS; configure an authentication server; Server Core Installation Configure Active Directory Rights Management Service (AD RMS). ***Certificate request and installation; self-enrollments; delegation; create RMS templates; RMS administrative roles; RM Add-on for IE Configure the read-only domain controller (RODC). ***Replication; Administrator role separation; read-only DNS; BitLocker; credential caching; password replication; syskey; read-only SYSVOL; staged install Configure Active Directory Federation Services (AD FSv2). ***Install AD FS server role; exchange certificate with AD FS agents; configure trust policies; configure user and group claim mapping; import and export trust policies

Creating and maintaining Active Directory objects

Automate creation of Active Directory accounts. ***Bulk import; configure the UPN; create computer, user, and group accounts (scripts, import, migration); template accounts; contacts; distribution lists; offline domain join Maintain Active Directory accounts ***Manage computer accounts; configure group membership; account resets; delegation; AGDLP/AGGUDLP; deny domain local group; local vs. domain; Protected Admin; disabling accounts vs. deleting accounts; deprovisioning; contacts; creating organizationa Create and apply Group Policy objects (GPOs). ***Enforce, OU hierarchy, block inheritance, and enabling user objects; group policy processing priority; WMI; group policy filtering; group policy loopback; Group Policy Preferences (GPP) Configure GPO templates. ***User rights; ADMX Central Store; administrative templates; security templates; restricted groups; security options; starter GPOs; shell access policies Deploy and manage software by using GPOs ***Publishing to users; assigning software to users; assigning to computers; software removal; software restriction policies; AppLocker Configure account policies. ***Domain password policy; account lockout policy; fine-grain password policies Configure audit policy by using GPOs ***Audit logon events; audit account logon events; audit policy change; audit access privilege use; audit directory service access; audit object access; advanced audit policies; global object access auditing; “Reason for Access” reporting

Maintaining the Active Directory environment

Configure backup and recovery ***Using Windows Server Backup; back up files and system state data to media; backup and restore by using removable media; perform an authoritative or non-authoritative restores; linked value replication; Directory Services Recovery Mode (DSRM); back Perform offline maintenance ***Offline defragmentation and compaction; Restartable Active Directory; Active Directory database mounting tool Monitor Active Directory ***Event viewer subscriptions; data collector sets; real-time monitoring; analyzing logs; WMI queries; PowerShell

Configuring Active Directory Certificate Services

Install Active Directory Certificate Services. ***Certificate authority (CA) types, including standalone, enterprise, root, and subordinate; role services; prepare for multiple-forest deployments Configure CA server settings ***Key archival; certificate database backup and restore; assigning administration roles; high-volume CAs; auditing Manage certificate templates. ***Certificate template types; securing template permissions; managing different certificate template versions; key recovery agent Manage enrollments. ***Network device enrollment service (NDES); auto enrollment; Web enrollment; extranet enrollment; smart card enrollment; authentication mechanism assurance; creating enrollment agents; deploying multiple-forest certificates; x.509 certificate mappin Manage certificate revocations. ***Configure Online Responders; Certificate Revocation List (CRL); CRL Distribution Point (CDP); Authority Information Access (AIA)