⇒ Install servers Plan for a server installation; plan for server roles; plan for a server upgrade; install Server Core; optimize resource utilization by using Features on Demand; migrate roles from previous versions of Windows Server
⇒ Configure servers Configure Server Core; delegate administration; add and remove features in offline images; deploy roles on remote servers; convert Server Core to/from full GUI; configure services; configure NIC teaming
⇒ Configure local storage Design storage spaces; configure basic and dynamic disks; configure MBR and GPT disks; manage volumes; create and mount virtual hard disks (VHDs); configure storage pools and disk pools
⇒ Configure file and share access
⇒ Create and configure shares; configure share permissions; configure offline files
⇒ configure NTFS permissions; configure access-based enumeration (ABE)
⇒ configure Volume Shadow Copy Service (VSS); configure NTFS quotas
⇒ Configure print and document services
⇒ Configure the Easy Print print driver; configure Enterprise Print Management
⇒ configure drivers; configure printer pooling; configure print priorities; configure printer permissions
⇒ Configure servers for remote management
⇒ Configure WinRM; configure down-level server management; configure servers for day-to-day management tasks; configure multi-server management; configure Server Core;configure Windows Firewall
⇒ Create and configure virtual machine storage Create VHDs and VHDX; configure differencing drives; modify VHDs; configure pass-through disks; manage snapshots; implement a virtual Fibre Channel adapter
⇒ Create and configure virtual machine settings Configure dynamic memory; configure smart paging; configure Resource Metering;configure guest integration services
⇒ Create and configure virtual networks Implement Hyper-V Network Virtualization; configure Hyper-V virtual switches;optimize network performance; configure MAC addresses; configure network isolation;configure synthetic and legacy virtual network adapters
⇒ Configure IPv4 and IPv6 addressing Configure IP address options; configure subnetting; configure supernetting; configure interoperability between IPv4 and IPv6; configure ISATAP; configure Teredo
⇒ Deploy and configure Dynamic Host Configuration Protocol (DHCP) service Create and configure scopes; configure a DHCP reservation; configure DHCP options;configure client and server for PXE boot; configure DHCP relay agent; authorize DHCP server
⇒ Deploy and configure DNS service Configure Active Directory integration of primary zones; configure forwarders; configure Root Hints; manage DNS cache; create A and PTR resource records
⇒ Create and manage Active Directory groups and organizational units (OUs)Configure group nesting; convert groups including security, distribution, universal,domain local, and domain global; manage group membership using Group Policy enumerate group membership; delegate the creation and management of Active Directory objects; manage default Active Directory containers; create, copy, configure, and delete groups and OUs
⇒ Create and manage Active Directory users and computers Automate the creation of Active Directory accounts; create, copy, configure, and delete users and computers; configure templates; perform bulk Active Directory operations;configure user rights; offline domain join; manage inactive and disabled accounts
⇒ Install domain controllers Add or remove a domain controller from a domain; upgrade a domain controller; install Active Directory Domain Services (AD DS) on a Server Core installation; install a domain controller from Install from Media (IFM); resolve DNS SRV record registratio issues; configure a global catalog server
⇒ Create Group Policy objects (GPOs) Configure a Central Store; manage starter GPOs; configure GPO links; configure multiple local group policies; configure security filtering
⇒ Configure security policies Configure User Rights Assignment; configure Security Options settings; configure Security templates; configure Audit Policy; configure Local Users and Groups; configure User Account Control (UAC)
⇒ Configure application restriction policies Configure rule enforcement; configure Applocker rules; configure Software Restriction Policies
⇒ Configure Windows Firewall Configure rules for multiple profiles using Group Policy; configure connection security rules; configure Windows Firewall to allow or deny applications, scopes, ports, and users; configure authenticated firewall exceptions; import and export settings
⇒ Deploy, manage, and maintain servers
⇒ Deploy and manage server images Install the Windows Deployment Services (WDS) role; configure and manage boot, install, and discover images; update images with patches, hotfixes, and drivers; install features for offline images
⇒ Install and configure the Windows Server Update Services (WSUS) role; configure group policies for updates; configure client-side targeting; configure WSUS synchronization; configure WSUS groups
⇒ Implement patch management
⇒ Monitor servers
⇒ Configure Data Collector Sets (DCS); configure alerts; monitor real-time performance; monitor virtual machines (VMs); monitor events; configure event subscriptions; configure network monitoring
⇒ Configure Distributed File System (DFS) Install and configure DFS namespaces; configure DFS Replication Targets; configure Replication Scheduling; configure Remote Differential Compression settings; configure staging; configure fault tolerance
⇒ Configure File Server Resource Manager (FSRM) Install the FSRM role; configure quotas; configure file screens; configure reports
⇒ Configure file and disk encryption Configure Bitlocker encryption; configure the Network Unlock feature; configure Bitlocker policies; configure the EFS recovery agent; manage EFS and Bitlockercertificates including backup and restore
⇒ Configure advanced audit policies Implement auditing using Group Policy and AuditPol.exe; create expression-based audit policies; create removable device audit policies
⇒ Configure DNS zones Configure primary and secondary zones; configure stub zones; configure conditional forwards; configure zone and conditional forward storage in Active Directory; configure zone delegation; configure zone transfer settings; configure notify settings
⇒ Configure DNS records Create and configure DNS Resource Records (RR) including A, AAAA, PTR, SOA, NS,SRV, CNAME, and MX records; configure zone scavenging; configure record options including Time To Live (TTL) and weight; configure round robin; configure secure dynamic updates
⇒ Configure VPN and routing Install and configure the Remote Access role; implement Network Address Translation (NAT); configure VPN settings; configure remote dial-in settings for users; configure routing
⇒ Configure Direct Access Implement server requirements; implement client configuration; configure DNS for Direct Access; configure certificates for Direct Access
⇒ Configure Network Policy Server (NPS) Configure multiple RADIUS server infrastructures; configure RADIUS clients; manage RADIUS templates; configure RADIUS accounting; configure certificates
⇒ Configure NPS policiesConfigure connection request policies; configure network policies for VPN clients (multilink and bandwidth allocation, IP filters, encryption, IP addressing); manage NPS templates; import and export NPS policies
⇒ Configure Network Access Protection (NAP) Configure System Health Validators (SHVs); configure health policies; configure NAP enforcement using DHCP and VPN; configure isolation and remediation of non-compliant computers using DHCP and VPN; configure NAP client settings
⇒ Configure advanced file services Configure NFS data store; configure BranchCache; configure File Classification Infrastructure (FCI) using File Server Resource Manager (FSRM); configure file access auditing
⇒ Implement Dynamic Access Control (DAC) Configure user and device claim types; implement policy changes and staging; perform access-denied remediation; configure file classification
⇒ Configure and optimize storage Configure iSCSI Target and Initiator; configure Internet Storage Name server (iSNS);implement thin provisioning and trim; manage server free space using Features on Demand
⇒ Manage and maintain a server infrastructure
⇒ Design an administrative model Design considerations including user rights, built-in groups, and end-user self-service portal; design a delegation of administration structure for Microsoft System Center 2012 Design a monitoring strategy
⇒ Design considerations including monitoring servers using Audit Collection Services (ACS),performance monitoring, centralized monitoring, and centralized reporting; implement and optimize System Center 2012 – Operations Manager management packs; plan for monitoring Active Directory Implement automated remediation Create an Update Baseline in Virtual Machine Manager; implement a Desired Configuration Management (DCM) Baseline; implement Virtual Machine Manager Integration with Operations Manager; configure Virtual Machine Manager to move a VM dynamically based on policy;integrate System Center 2012 for automatic remediation into your existing enterprise infrastructure
Duration
2-3 MonthsAvailable Seats
15Online Training Schedule
8.00 pm to 10.00 pmIndustrial Training Schedule in Chandigarh
8.00 am to 7.00 pm