Search This Blog

Friday, December 30, 2011

poweshell cmdlets for office 365

poweshell cmdlets for office 365

To connect to the Microsoft Online service using a federated identity (ID), you type ___connect-MsolService -CurrentUser______________ at the Windows PowerShell prompt.

You can use the __get-MsilUser -DomainName mysuperboomer.com _______________ Microsoft Office 365 PowerShell command to obtain a list of all the users in a specific domain.

some office 265 knowledge

some office 265 knowledge

Which of the following are supported operating systems for Microsoft Office 365?
w7
vista with sp2

xp with sp3

mac os 10.1.3


True or False: The minimum CPU speed required for Microsoft Office Professional Plus is 500 MHz: true

Approximately how big is the Microsoft Online Services Sign-In Assistant download: 4MB

Wednesday, December 28, 2011

AD upgrade

AD upgrade

windows 2000 to 2008

you cannot do in place upgrade.


for normal upgrades, install 20008 as member server , then promte to dc

Wednesday, December 21, 2011

70-649 TS: Upgrading Your MCSE on Windows Server 2003 to Windows Server 2008, Technology Specialist

Exam 70-649: TS: Upgrading Your MCSE on Windows Server 2003 to Windows Server 2008, Technology Specialist



questions 21+25+25

I am suprised I got so many AD LDS questions in the exam, also a couple of Direct Access questions ;

That made me feel AD LDS is the main function of AD. how many IT guys actually implemented DirectAccess over internet?

so you can see 70-649 is very up to date with 2008 R2 version

anyway 70-649 is about

  • Microsoft Certified Technology Specialist (MCTS): Windows Server 2008 Active Directory Configuration





  • Microsoft Certified Technology Specialist (MCTS): Windows Server 2008 Network Infrastructure Configuration





  • Microsoft Certified Technology Specialist (MCTS): Windows Server 2008 Application Platform Configuration



  • dumps
    cbt videos
    trian signal videos
    books well chapters --- I will read throughly later pu.fffff...fff.
    fucenMalcolmReid --- MS online labs , my own lab, ms online learning
    my real world work experience with windows 2008, windows 2008 R2

    Merry Christmas and Happy New Year!!!!!!!

    ah... my iphone 4s siri can't do chinese input yet.


    70-647 Pro: Windows Server 2008, Enterprise Administrator

    Pro: Windows Server 2008, Enterprise Administrator

    70-647

    dumps

    cbt nuggets videos

    train signal videos

    ms online-labs

    my own test lab

    ms-online learning

    real-world work experience on windows 2008 , windows 2008 R2


    some books I wish I read them all like I did my mcse 2003

    75 question , some questions are trial

    MS is putting the latest 2008 R2 features into the test

    there are a couple of small testlet only timed 12 minutes (?), some small blocks of questions timed 8 minutes.

    there was the computer crash in the mid of the exam, there was suddenly a red alert message pop up on the screen, something like illegal software detected on the PC, quite shocking as it was the first time I saw this kind of message

    the proctor asked when I have done, I told her I didn't do anything abnormal. she told me to turn off the pc, I was baffled. so she turned it off for me, and logged me on again. I continued my test

    she said there was a connection problem sometimes with prometric

    Racist fucenMalcolmReid .... not surprisingly, some test takers are asians, yeah, blonde doesn't need to do this kind of labour


    anyway, as usual, there is no-boundary on the range of MS exam questions. of course this one is about
    Windows Server 2008, Enterprise Administrator
    Planning network and application services

    Designing core identity and access management components

    Designing support identity and access management components

    Designing for business continuity and data availability

    the difference between iphone 4 and iphone 4s

    replace iphone 4 with iphone 4s

    replace iphone 4 with iphone 4s

    after 70-647, 70-649

    http://www.iphonehacks.com/2011/10/how-to-transfer-data-from-old-iphone-to-new-iphone-4s.html


    http://support.apple.com/kb/HT1766

    you can migrate files and settings using info on above links

    It wont migrate wi-fi password or email password

    your just backup in itunes and restore to the new iphone 4s

    pity my iphone 4s is still 16GB version




    Monday, December 19, 2011

    Publishing an AD RMS server

    Publishing an AD RMS server

    http://technet.microsoft.com/en-us/library/gg313778.aspx

    When you deploy Microsoft SharePoint Products and Technologies in your organization, you can also use Information Rights Management (IRM) to enable content creators to control and protect their documents. To use IRM in your organization, you must also deploy an Active Directory Rights Management Services (AD RMS) server. With Forefront Unified Access Gateway (UAG) Service Pack 1, you can allow users to access IRM-protected libraries by publishing your SharePoint server and the AD RMS server.

    Authentication Mechanism Assurance for AD DS in Windows Server 2008 R2

    http://technet.microsoft.com/en-us/library/dd378897(WS.10).aspx

    Authentication Mechanism Assurance for AD DS in Windows Server 2008 R2

    This guide demonstrates how to enable authentication mechanism assurance in Active Directory® Domain Services (AD DS) in the Windows Server® 2008 R2 operating system. Authentication mechanism assurance is an added capability in Windows Server 2008 R2 AD DS that you can use when the domain functional level is set to Windows Server 2008 R2. When it is enabled, authentication mechanism assurance adds an administrator-designated global group membership to a user’s Kerberos token when the user’s credentials are authenticated during logon using a certificate-based logon method. This makes it possible for network resource administrators to control access to resources, such as files, folders, and printers, based on whether the user logs on using a certificate-based logon method, in addition to the type of certificate used. For example, when a user logs on using a smart card, the user’s access to resources on the network can be specified as different from what the access is when the user does not use a smart card (that is, when the user logs on by entering a user name and password).
    The major sections in this document are:

    Sunday, December 18, 2011

    MS TS 70-640 70-642 70-643 70-647 70-649 requirements

    MS TS 70-640 70-642 70-643 70-647 70-649 requirements

    the requirement dump is here; notice the requirements are very upto date , as it is up to 2008 R2. I would say it is very different from windows 2003 days


    70-640





    1. Configuring Domain Name System (DNS) for Active Directory (17%)

    ·         Configure zones.

    o    May include but is not limited to: Dynamic DNS (DDNS), Non-dynamic DNS (NDDNS), and Secure Dynamic DNS (SDDNS); Time to Live (TTL); GlobalNames; Primary, Secondary, Active Directory Integrated, Stub; SOA; zone scavenging; forward lookup; reverse lookup

    ·         Configure DNS server settings.

    o    May include but is not limited to: forwarding; root hints; configure zone delegation; round robin; disable recursion; debug logging; server scavenging

    ·         Configure zone transfers and replication.

    o    May include but is not limited to: configure replication scope (forestDNSzone; domainDNSzone); incremental zone transfers; DNS Notify; secure zone transfers; configure name servers; application directory partitions

    Configuring the Active Directory infrastructure (17 percent)

    ·         Configure a forest or a domain.

    o    May include but is not limited to: remove a domain; perform an unattended installation; Active Directory Migration Tool (ADMT) ; change forest and domain functional levels; interoperability with previous versions of Active Directory; multiple user principal name (UPN) suffixes; forestprep; domainprep

    ·         Configure trusts.

    o    May include but is not limited to: forest trust; selective authentication vs. forest-wide authentication; transitive trust; external trust; shortcut trust; SID filtering

    ·         Configure sites.

    o    May include but is not limited to: create Active Directory subnets; configure site links; configure site link costing; configure sites infrastructure

    ·         Configure Active Directory replication.

    o    May include but is not limited to: DFSR; one-way replication; Bridgehead server; replication scheduling; configure replication protocols; force intersite replication

    ·         Configure the global catalog.

    o    May include but is not limited to: Universal Group Membership Caching (UGMC); partial attribute set; promote to global catalog

    ·         Configure operations masters.

    o    May include but is not limited to: seize and transfer; backup operations master; operations master placement; Schema Master; extending the schema; time service

    Configuring Active Directory Roles and Services (14 percent)

    ·         Configure Active Directory Lightweight Directory Service (AD LDS).

    o    May include but is not limited to: migration to AD LDS; configure data within AD LDS; configure an authentication server; Server Core Installation

    ·         Configure Active Directory Rights Management Service (AD RMS).

    o    May include but is not limited to: certificate request and installation; self-enrollments; delegation; create RMS templates; RMS administrative roles; RM Add-on for IE

    ·         Configure the read-only domain controller (RODC).

    o    May include but is not limited to: replication; Administrator role separation; read-only DNS; BitLocker; credential caching; password replication; syskey; read-only SYSVOL; staged install

    ·         Configure Active Directory Federation Services (AD FSv2).

    o    May include but is not limited to: install AD FS server role; exchange certificate with AD FS agents; configure trust policies; configure user and group claim mapping; import and export trust policies

    Creating and maintaining Active Directory objects (18 percent)

    ·         Automate creation of Active Directory accounts.

    o    May include but is not limited to: bulk import; configure the UPN; create computer, user, and group accounts (scripts, import, migration); template accounts; contacts; distribution lists; offline domain join

    ·         Maintain Active Directory accounts.

    o    May include but is not limited to: manage computer accounts; configure group membership; account resets; delegation; AGDLP/AGGUDLP; deny domain local group; local vs. domain; Protected Admin; disabling accounts vs. deleting accounts; deprovisioning; contacts; creating organizational units (OUs); delegation of control; protecting AD objects from deletion; managed service accounts

    ·         Create and apply Group Policy objects (GPOs).

    o    May include but is not limited to: enforce, OU hierarchy, block inheritance, and enabling user objects; group policy processing priority; WMI; group policy filtering; group policy loopback; Group Policy Preferences (GPP)

    ·         Configure GPO templates.

    o    May include but is not limited to: user rights; ADMX Central Store; administrative templates; security templates; restricted groups; security options; starter GPOs; shell access policies

    ·         Deploy and manage software by using GPOs.

    o    May include but is not limited to: publishing to users; assigning software to users; assigning to computers; software removal; software restriction policies; AppLocker

    ·         Configure account policies.

    o    May include but is not limited to: domain password policy; account lockout policy; fine-grain password policies

    ·         Configure audit policy by using GPOs.

    o    May include but is not limited to: audit logon events; audit account logon events; audit policy change; audit access privilege use; audit directory service access; audit object access; advanced audit policies; global object access auditing; “Reason for Access” reporting

    Maintaining the Active Directory environment (18 percent)

    ·         Configure backup and recovery.

    o    May include but is not limited to: using Windows Server Backup; back up files and system state data to media; backup and restore by using removable media; perform an authoritative or non-authoritative restores; linked value replication; Directory Services Recovery Mode (DSRM); backup and restore GPOs; configure AD recycle bin

    ·         Perform offline maintenance.

    o    May include but is not limited to: offline defragmentation and compaction; Restartable Active Directory; Active Directory database mounting tool

    ·         Monitor Active Directory.

    o    May include but is not limited to: event viewer subscriptions; data collector sets; real-time monitoring; analyzing logs; WMI queries; PowerShell

    Configuring Active Directory Certificate Services (15 percent)

    ·         Install Active Directory Certificate Services.

    o    May include but is not limited to: certificate authority (CA) types, including standalone, enterprise, root, and subordinate; role services; prepare for multiple-forest deployments

    ·         Configure CA server settings.

    o    May include but is not limited to: key archival; certificate database backup and restore; assigning administration roles; high-volume CAs; auditing

    ·         Manage certificate templates.

    o    May include but is not limited to: certificate template types; securing template permissions; managing different certificate template versions; key recovery agent

    ·         Manage enrollments.

    o    May include but is not limited to: network device enrollment service (NDES); auto enrollment; Web enrollment; extranet enrollment; smart card enrollment; authentication mechanism assurance; creating enrollment agents; deploying multiple-forest certificates; x.509 certificate mapping

    ·         Manage certificate revocations.

    o    May include but is not limited to: configure Online Responders; Certificate Revocation List (CRL); CRL Distribution Point (CDP); Authority Information Access (AIA)

























    70-642

    1. Configuring Addressing and Services (24 percent)

    ·         Configure IPv4 and IPv6 addressing.

    o    May include but is not limited to: configure IP address options; subnetting; supernetting; multi-homed; interoperability between IPv4 and IPv6

    ·         Configure Dynamic Host Configuration Protocol (DHCP).

    o    May include but is not limited to: DHCP options; creating new options; PXE boot; default user profiles; DHCP relay agents; exclusions; authorize server in Active Directory; scopes; DHCPv6

    ·         Configure routing.

    o    May include but is not limited to: static routing; persistent routing; Routing Internet Protocol (RIP); metrics; choosing a default gateway; maintaining a routing table; demand-dial routing; IGMP proxy

    ·         Configure Windows Firewall with Advanced Security.

    o    May include but is not limited to: inbound and outbound rules; custom rules; authorized users; authorized computers; configure firewall by using Group Policy; network location profiles; service groups; import/export policies; isolation policy; IPsec group policies; Connection Security Rules

    Configuring Names Resolution (27 percent)

    ·         Configure a Domain Name System (DNS) server.

    o    May include but is not limited to: conditional forwarding; external forwarders; root hints; cache-only; socket pooling; cache locking

    ·         Configure DNS zones.

    o    May include but is not limited to: zone scavenging; zone types; Active Directory integration; Dynamic Domain Name System (DDNS); Secure DDNS; GlobalNames; zone delegation; DNS Security Extensions (DNSSEC); reverse lookup zones

    ·         Configure DNS records.

    o    May include but is not limited to: record types; Time to live (TTL); weighting records; registering records; netmask ordering; DnsUpdateProxy group; round robin; DNS record security; auditing

    ·         Configure DNS replication.

    o    May include but is not limited to: DNS secondary zones; DNS stub zones; Active Directory Integrated replication scopes; securing zone transfer; SOA refresh; auditing

    ·         Configure name resolution for client computers.

    o    May include but is not limited to: configuring HOSTS file; Link-Local Multicast Name Resolution (LLMNR); broadcasting; resolver cache; DNS server list; Suffix Search order; DNS devolution

    Configuring Network Access (22 percent)

    ·         Configure remote access.

    o    May include but is not limited to: dial-up; Remote Access Policy; Network Address Translation (NAT); VPN protocols, such as Secure Socket Tunneling Protocol (SSTP) and IKEv2; Routing and Remote Access Services (RRAS); packet filters; Connection Manager; VPN reconnect; RAS authentication by using MS-CHAP, MS-CHAP v2, and EAP

    ·         Configure Network Access Protection (NAP).

    o    May include but is not limited to: network layer protection; DHCP enforcement; VPN enforcement; RDS enforcement; configure NAP health policies; IPsec enforcement; 802.1x enforcement; flexible host isolation; multi-configuration System Health Validator (SHV)

    ·         Configure DirectAccess.

    o    May include but is not limited to: IPv6; IPsec; server requirements; client requirements; perimeter network; name resolution policy table

    ·         Configure Network Policy Server (NPS).

    o    May include but is not limited to: IEEE 802.11 wireless; IEEE 802.3 wired; group policy for wireless; RADIUS accounting; Connection Request policies; RADIUS proxy; NPS templates

    Configuring File and Print Services (13 percent)

    ·         Configure a file server.

    o    May include but is not limited to: file share publishing; Offline Files; share permissions; NTFS permissions; encrypting file system (EFS); BitLocker; Access-Based Enumeration (ABE); branch cache; Share and Storage Management console

    ·         Configure Distributed File System (DFS).

    o    May include but is not limited to: DFS namespace; DFS configuration and application; creating and configuring targets; DFS replication; read-only replicated folder; failover cluster support; health reporting

    ·         Configure backup and restore.

    o    May include but is not limited to: backup types; backup schedules; managing remotely; restoring data; shadow copy services; volume snapshot services (VSS); bare metal restore; backup to remote file share

    ·         Manage file server resources.

    o    May include but is not limited to: FSRM; quota by volume or quota by user; quota entries; quota templates; file classification; Storage Manager for SANs; file management tasks; file screening

    ·         Configure and monitor print services.

    o    May include but is not limited to: printer share; publish printers to Active Directory; printer permissions; deploy printer connections; install printer drivers; export and import print queues and printer settings; add counters to Performance Monitor to monitor print servers; print pooling; print priority; print driver isolation; location-aware printing; print management delegation

    Monitoring and Managing a Network Infrastructure (14 percent)

    ·         Configure Windows Server Update Services (WSUS) server settings.

    o    May include but is not limited to: update type selection; client settings; Group Policy object (GPO); client targeting; software updates; test and approval; disconnected networks

    ·         Configure performance monitoring.

    o    May include but is not limited to: Data Collector Sets; Performance Monitor; Reliability Monitor; monitoring System Stability Index; page files; analyze performance data

    ·         Configure event logs.

    o    May include but is not limited to: custom views; application and services logs; subscriptions; attaching tasks to events find and filter

    ·         Gather network data.

    o    May include but is not limited to: Simple Network Management Protocol (SNMP); Network Monitor; Connection Security Rules monitoring

    70-643

    Deploying Servers (28 percent)

    ·         Deploy images by using Windows Deployment Services.

    o    May include but is not limited to: Install from media (IFM); configure Windows Deployment Services; capture Windows Deployment Services images; deploy Windows Deployment Services images; dynamic driver provisioning; PXE provider; multicasting; VHD deployment

    ·         Configure Microsoft Windows activation.

    o    May include but is not limited to: install a KMS server; create a DNS SRV record; replicate volume license data; Multiple Activation Key (MAK); managing activation

    ·         Configure Windows Server Hyper-V and virtual machines.

    o    May include but is not limited to: Virtual networking; virtualization hardware requirements; Virtual Hard Disks; migration types; Integration Services; dynamic memory allocation; dynamic virtual machine storage; import/export; snapshot

    ·         Configure high availability.

    o    May include but is not limited to: failover clustering; Network Load Balancing; geo-clustering support; cluster service migration; Cluster Shared Volumes (CSV)

    ·         Configure storage.

    o    May include but is not limited to: RAID types; Virtual Disk Specification (VDS); iSCSI Initiator; Storage Area Networks (SANs); mount points; Multipath I/O (MPIO); VHD mounting; boot from VHD; N-Port Identification Virtualization (NPIV)

    Configuring Remote Desktop Services (26 percent)

    ·         Configure RemoteApp and Remote Desktop Web Access.

    o    May include but is not limited to: providing access to remote resources; per-user filtering; forms-based authentication; single sign-on

    ·         Configure Remote Desktop Gateway (RD Gateway).

    o    May include but is not limited to: certificate configuration; Remote Desktop resource authorization policy (RD RAP); Remote Desktop connection authorization policy (RD CAP); Remote Desktop group policy

    ·         Configure Remote Desktop Connection Broker.

    o    May include but is not limited to: redirection modes; DNS registration; set by using group policy

    ·         Configure and monitor Remote Desktop resources.

    o    May include but is not limited to: allocate resources by using Windows Server Resource Manager; configure application logging; fair share CPU scheduling; viewing processes

    ·         Configure Remote Desktop licensing.

    o    May include but is not limited to: deploy licensing server; connectivity between Remote Desktop Session Hosts (RD Session Hosts) and Remote Desktop Licensing (RD Licensing); recovering Remote Desktop Licensing server; managing Remote Desktop Services client access licenses (RDS CALs); revoking licensing

    ·         Configure Remote Desktop Session Host.

    o    May include but is not limited to: session options; session permissions; display data prioritization; profiles and home folders; IP Virtualization; RemoteFX

    Configuring a Web Services Infrastructure (25 percent)

    ·         Configure Web applications.

    o    May include but is not limited to: directory-dependent; publishing; URL-specified configuration; Microsoft .NET components, for example, .NET and aspx; configure application pools; manage service accounts; server core

    ·         Manage Web sites.

    o    May include but is not limited to: migrate sites and Web applications; publish IIS Web sites; configure virtual directories; xcopy deployment

    ·         Configure a File Transfer Protocol (FTP) server.

    o    May include but is not limited to: configure for extranet users; configure permissions; configure File Transfer Protocol Secure (FTPS); WebDAV integration; user isolation

    ·         Configure Simple Mail Transfer Protocol (SMTP).

    o    May include but is not limited to: setting up smart hosts; configuring size limitations; setting up security and authentication to the delivering server; creating proper service accounts; authentication; SMTP relay

    ·         Manage the Web Server (IIS) role.

    o    May include but is not limited to: Web site content backup and restore; IIS configuration backup; monitor IIS; configuration logging and tracing; delegation of administrative rights

    ·         Configure SSL security.

    o    May include but is not limited to: configure certificates; requesting SSL certificate; renewing SSL certificate; exporting and importing certificates

    ·         Configure Web site authentication and permissions.

    o    May include but is not limited to: configure site permissions and authentication; configure application permissions; client certificate mappings; request filtering

    Configuring Network Application Services (21 percent)

    ·         Manage the Streaming Media Services role.

    o    May include but is not limited to: installation; on-demand replication; caching and proxy; multicast streaming; advertising; Web-based administration; Real-Time Streaming Protocol (RTSP)

    ·         Secure streaming media.

    o    May include but is not limited to: encryption; sharing business rules; configuring license delivery; configuring policy templates; configure Windows Media Rights Manager; automatically acquire media usage rights; Microsoft DRM upgrade service

    ·         Configure SharePoint Foundation options.

    o    May include but is not limited to: site permissions; backup; service accounts; rights management services (RMS); migration; audience targeting; claims-based authentication; SharePoint Timer jobs; usage and report logging

    ·         Configure SharePoint Foundation integration.

    o    May include but is not limited to: configuring a document library to receive e-mail; configuring incoming vs. outgoing e-mail; support for Office Web Apps and SharePoint Workspaces







    70-647

    Planning network and application services (23 percent)

    ·         Plan for name resolution and IP addressing. May include but is not limited to: internal and external naming strategy, naming resolution support for legacy clients, naming resolution for directory services, IP addressing scheme, TCP/IP version coexistence

    ·         Design for network access. May include but is not limited to: network access policies, remote access strategy, perimeter networks, server and domain isolation

    ·         Plan for application delivery. May include but is not limited to: application virtualization, presentation virtualization, locally installed software, Web-based applications

    ·         Plan for Remote Desktop Services. May include but is not limited to: Terminal Services licensing, Remote Desktop Services infrastructure

    Designing core identity and access management components (25 percent)

    ·         Design Active Directory forests and domains. May include but is not limited to: forest structure, forest and domain functional levels, intra-organizational authorization and authentication, schema modifications

    ·         Design the Active Directory physical topology. May include but is not limited to: placement of servers, site and replication topology, printer location policies

    ·         Design the Active Directory administrative model. May include but is not limited to: delegation, group strategy, compliance auditing, group administration, organizational structure

    ·         Design the enterprise-level group policy strategy. May include but is not limited to: group policy hierarchy and scope filtering, control device installation, authentication and authorization

    Designing support identity and access management components (29 percent)

    ·         Plan for domain or forest migration, upgrade, and restructuring. May include but is not limited to: cross-forest authentication, backward compatibility, object migration, migration planning, implementation planning, environment preparation

    ·         Design the branch office deployment. May include but is not limited to: authentication strategy, server security

    ·         Design and implement public key infrastructure. May include but is not limited to: certificate services, PKI operations and maintenance, certificate life cycle management

    ·         Plan for interoperability. May include but is not limited to: inter-organizational authorization and authentication, application authentication interoperability, cross-platform interoperability

    Designing for business continuity and data availability (23 percent)

    ·         Plan for business continuity. May include but is not limited to: service availability, directory service recovery

    ·         Design for software updates and compliance management. May include but is not limited to: patch management and patch management compliance, Microsoft Update and Windows Update, security baselines, system health models

    ·         Design the operating system virtualization strategy. May include but is not limited to: server consolidation, application compatibility, virtualization management, placement of servers

    ·         Design for data management and data access. May include but is not limited to: data security, data accessibility and redundancy, data collaboration

















































    70-649

    Configuring Additional Active Directory Server Roles

    ·         Configure Active Directory Lightweight Directory Service (AD LDS)

    May include but is not limited to: migration to AD LDS, configuring data within AD LDS, configuring an authentication server, server core, Windows Server 2008 Hyper-V

    ·         Configure Active Directory Rights Management Service (AD RMS)

    May include but is not limited to: certificate request and installation, self-enrollments, delegation, Active Directory Metadirectory Services (AD MDS), Windows Server virtualization

    ·         Configure the read-only domain controller (RODC)

    May include but is not limited to: unidirectional replication, Administrator role separation, read-only DNS, BitLocker, credential caching, password replication, syskey, Windows Server virtualization

    ·         Configure Active Directory Federation Services (ADFS)

    May include but is not limited to: installing AD FS server role, exchange certificate with AD FS agents, configuring trust policies, configuring user and group claim mapping, Windows Server virtualization

    Configuring IP Addressing and Services

    ·         Configure IPv4 and IPv6 addressing

    May include but is not limited to: configuring IP options, subnetting, supernetting, alternative configuration

    ·         Configure Dynamic Host Configuration Protocol (DHCP)

    May include but is not limited to: DHCP options, creating new options, PXE boot, default user profiles, DHCP relay agents, exclusions, authorizing server in Active Directory, scopes, server core, Windows Server Hyper-V

    ·         Configure routing

    May include but is not limited to: static routing, persistent routing, Routing Internet Protocol (RIP), Open Shortest Path First (OSPF)

    ·         Configure IPsec

    May include but is not limited to: creating IPsec policy, IPsec Authentication Header (AH), IPsec Encapsulating Security Payload (ESP)

    Monitoring and Managing a Network Infrastructure

    ·         Configure Windows Software Update Services (WSUS) server settings

    May include but is not limited to: updating type selection, client settings, Group Policy object (GPO), client targeting, software updates, test and approval, disconnected networks

    ·         Capture performance data

    May include but is not limited to: Data Collector Sets, Performance Monitor, Reliability Monitor, monitoring System Stability Index

    ·         Monitor event logs

    May include but is not limited to: custom views, application and services logs, subscriptions, DNS log

    ·         Gather network data

    May include but is not limited to: Simple Network Management Protocol (SNMP), Baseline Security Analyzer, Network Monitor

    Deploying Servers

    ·         Deploy images by using Windows Deployment Services

    May include but is not limited to: installing from media (IFM), configuring Windows Deployment Services, capturing Windows Deployment Services images, deploying Windows Deployment Services images, server core

    ·         Configure Microsoft Windows activation

    May include but is not limited to: installing a KMS server, creating a DNS SRV record, replicating volume license data

    ·         Configure Windows Server Hyper-V and virtual machines

    May include but is not limited to: virtual networking, virtualization hardware requirements, Virtual Hard Disks, migrating from physical to virtual, VM additions, backup, optimization, server core

    ·         Configure high availability

    May include but is not limited to: failover clustering, Network Load Balancing, hardware redundancy

    ·         Configure storage

    May include but is not limited to: RAID types, Virtual Disk Specification (VDS) API, Network Attached Storage, iSCSI and Fibre Channel storage area networks, mount points

    Configuring Remote Desktop Services

    ·         Configure RemoteApp and Remote Desktop Web Access.


    May include but is not limited to: providing access to remote resources; per-user filtering; forms-based authentication; single sign-on

    ·         Configure Remote Desktop Gateway (RD Gateway).


    May include but is not limited to: certificate configuration; Remote Desktop resource authorization policy (RD RAP); Remote Desktop connection authorization policy (RD CAP); Remote Desktop group policy

    ·         Configure Remote Desktop Connection Broker.

    May include but is not limited to: redirection modes; DNS registration; set by using group policy

    ·         Configure and monitor Remote Desktop resources.

    May include but is not limited to: allocate resources by using Windows Server Resource Manager; configure application logging; fair share CPU scheduling; viewing processes

    ·         Configure Remote Desktop licensing.

    May include but is not limited to: deploy licensing server; connectivity between Remote Desktop Session Hosts (RD Session Hosts) and Remote Desktop Licensing (RD Licensing); recovering Remote Desktop Licensing server; managing Remote Desktop Services client access licenses (RDS CALs); revoking licensing

    ·         Configure Remote Desktop Session Host.

    May include but is not limited to: session options; session permissions; display data prioritization; profiles and home folders; IP Virtualization; RemoteFX

    Configuring a Web Services Infrastructure

    ·         Configure Web applications

    May include but is not limited to: directory-dependent, publishing, URL-specified configuration, Microsoft .NET components, for example, .NET and .aspx, configuring application pools

    ·         Manage Web sites

    May include but is not limited to: migrating sites and Web applications, publishing IIS Web sites, configuring virtual directories

    ·         Configure a File Transfer Protocol (FTP) server

    May include but is not limited to: configuring for extranet users, configuring permissions

    ·         Configure Simple Mail Transfer Protocol Services (SMTP)

    May include but is not limited to: setting up smart hosts, configuring size limitations, setting up security and authentication to the delivering server, creating proper service accounts, authentication, SMTP relay

    ·         Manage Internet Information Services (IIS)

    May include but is not limited to: Web site content backup and restore, IIS configuration backup, monitoring IIS, configuring logging, delegation of administrative rights

    ·         Configure SSL security

    May include but is not limited to: configuring certificates, requesting SSL certificate, renewing SSL certificate, exporting and importing certificates

    ·         Configure Web site authentication and permissions

    May include but is not limited to: configuring site permissions and authentication, configuring application permissions, client certificate mappings