You are previewing Exam Ref 70-412: Configuring Advanced Windows Server 2012 R2 Services.
O'Reilly logo
Exam Ref 70-412: Configuring Advanced Windows Server 2012 R2 Services

Book Description

Fully updated for Windows Server 2012 R2, and designed for experienced IT professionals ready to advance their status, this Exam Ref focuses on the critical-thinking and decision-making acumen needed for success at the MCSA or MCSE level.

Table of Contents

  1. Introduction
    1. Microsoft certifications
    2. Errata & book support
    3. We want to hear from you
    4. Stay in touch
  2. Preparing for the exam
  3. 1. Configure and manage high availability
    1. Objective 1.1: Configure Network Load Balancing (NLB)
      1. Network Load Balancing fundamentals
      2. Creating and configuring an NLB cluster
      3. Configuring port rules
        1. Adding hosts in the NLB cluster
        2. Understanding NLB cmdlets for Windows PowerShell
      4. Upgrading an NLB cluster
      5. Objective summary
      6. Objective review
    2. Objective 1.2: Configure failover clustering
      1. Understanding failover clustering
        1. Understanding the hardware components of a failover cluster
        2. Understanding the software requirements of a failover cluster
      2. Creating a failover cluster
      3. Configuring cluster networking
      4. Using Active Directory Detached Clusters
      5. Configuring cluster storage
        1. Adding new disks to a cluster
        2. Creating cluster storage pools
        3. Using cluster-shared volumes (CSVs)
        4. Using shared virtual hard disk
      6. Configuring Quorum
      7. Implementing Cluster Aware Updating
      8. Migrating a failover cluster
      9. Objective summary
      10. Objective review
    3. Objective 1.3: Manage failover clustering roles
      1. Configuring roles
        1. Configuring File Server role types
        2. Configuring role properties
      2. Assigning role startup priorities
      3. Using node drain
      4. Monitoring services on clustered virtual machines
      5. Objective summary
      6. Objective review
    4. Objective 1.4: Manage virtual machine (VM) movement
      1. Performing a live migration
        1. Preparing for live migration
        2. Moving VM storage to a CSV
        3. Performing live migration outside a clustered environment
      2. Additional migration considerations
        1. Enabling processor compatibility
        2. Matching names of virtual switches
      3. Using storage migration
      4. Configuring virtual machine network health protection
      5. Configuring drain on shutdown
      6. Objective summary
      7. Objective review
    5. Answers
      1. Objective 1.1: Thought experiment
      2. Objective 1.1: Review
      3. Objective 1.2: Thought experiment
      4. Objective 1.2: Review
      5. Objective 1.3: Thought experiment
      6. Objective 1.3: Review
      7. Objective 1.4: Thought experiment
      8. Objective 1.4: Review
  4. 2. Configure file and storage solutions
    1. Objective 2.1: Configure advanced file services
      1. What is BranchCache?
        1. Hosted Cache mode
        2. Distributed Cache mode
      2. Configuring BranchCache
        1. Configuring the content servers
        2. Configuring the hosted cache servers (optional)
        3. Configuring BranchCache clients for Distributed Cache mode
        4. Configuring BranchCache clients for Hosted Cache mode
          1. Windows 7 Compatibility
          2. Hosted Cache Server Discovery
      3. Using File Server Resource Manager (FSRM)
        1. File screens
        2. Quotas
        3. Storage reports
        4. File management tasks
      4. Implementing file access auditing
      5. Installing the Server for NFS component
      6. Objective summary
      7. Objective review
    2. Objective 2.2: Implement Dynamic Access Control (DAC)
      1. Introducing DAC
      2. Configuring claims-based authentication
        1. Defining user and device claims types
        2. Enabling Kerberos support for claims-based access control
      3. Configuring file classification
        1. Enabling or creating selected resource properties
        2. Adding resource properties to a resource property list
        3. Updating Active Directory file and folder objects
        4. Classifying files and folders
          1. Manual classification
          2. Automatic classification
          3. Access-denied assistance
      4. Configuring access policies
        1. Creating a central access policy that includes claims
          1. Creating a new central access rule
          2. Adding central access rules to a central access policy
        2. Deploying central access policy to file servers
      5. Objective summary
      6. Objective review
    3. Objective 2.3: Configure and optimize storage
      1. iSCSI storage
        1. Installing the iSCSI Target Server
        2. Enabling iSCSI Initiator
        3. Understanding iSCSI components
        4. Configuring iSCSI storage
        5. Configuring the iSCSI Initiator
        6. Configuring the new disk on the remote server
        7. Managing existing iSCSI virtual disks and targets
        8. Using Internet iStorage Name Service (iSNS) Server
      2. Using Features on Demand
      3. Installing the Data Deduplication component
      4. Using storage tiers
      5. Objective summary
      6. Objective review
    4. Answers
      1. Objective 2.1: Thought experiment
      2. Objective 2.1: Review
      3. Objective 2.2: Thought experiment
      4. Objective 2.2: Review
      5. Objective 2.3: Thought experiment
      6. Objective 2.3: Review
  5. 3. Implement business continuity and disaster recovery
    1. Objective 3.1: Configure and manage backups
      1. Using the Windows Server Backup feature
        1. Backup Options page
        2. Select Backup Configuration page
        3. Select Items For Backup page
        4. Add Items
        5. Advanced Settings
          1. Configuring Exclusions
          2. Configuring VSS Settings
        6. Destination type
        7. Performance settings
        8. Command-line tools for backup
      2. Understanding Backup Operators
      3. Using the Shadow Copies feature (Previous Versions)
      4. Configuring Windows Azure Backup
        1. Create a Windows Azure account
        2. Create a vault and add a certificate
        3. Download and install the Windows Azure Backup Agent
        4. Register your server
        5. Create a schedule
          1. Specifying retention settings
        6. Configure the Back Up Now option
        7. Choose a Recover Data option
        8. Enable bandwidth throttling
      5. Objective summary
      6. Objective review
    2. Objective 3.2: Recover servers
      1. Using the Advanced Boot Options menu
        1. Booting into Safe Mode: Alternatives with Bcdedit and Msconfig
      2. Recovering servers with the Windows installation media
        1. Configuring System Image Recovery
        2. Using command-line recovery tools
          1. Startrep
          2. Bootrec
          3. Bcdedit
      3. Objective summary
      4. Objective review
    3. Objective 3.3: Configure site-level fault tolerance
      1. Configuring Hyper-V physical host servers
      2. Configuring VMs
        1. Configuring failover TCP/IP settings
        2. Resynchronizing the primary and replica VMs
      3. Performing Hyper-V Replica failover
        1. Planned failover
        2. Unplanned failover
        3. Test failover
      4. Using Hyper-V Replica in a failover cluster
      5. Configuring Hyper-V Replica Extended Replication
      6. Using Global Update Manager
      7. Recovering multi-site failover clusters
      8. Objective summary
      9. Objective review
    4. Answers
      1. Objective 3.1: Thought experiment
      2. Objective 3.1: Review
      3. Objective 3.2: Thought experiment
      4. Objective 3.2: Review
      5. Objective 3.3: Thought experiment
      6. Objective 3.3: Review
  6. 4. Configure network services
    1. Objective 4.1: Implement an advanced DHCP solution
      1. Creating and configuring superscopes and multicast scopes
        1. DHCP superscopes
        2. Multicast scopes
      2. Implementing DHCPv6
        1. Understanding Windows clients and stateful addressing
        2. Configuring DHCPv6
      3. Configuring high availability for DHCP
        1. DHCP failover
        2. Configuring DHCP split scopes
      4. Configuring DNS registration
      5. Configuring DHCP Name Protection
      6. Objective summary
      7. Objective review
    2. Objective 4.2: Implement an advanced DNS solution
      1. Implementing DNSSEC
      2. Configuring DNS Socket Pool
      3. Configuring DNS cache locking
      4. Configuring DNS logging
      5. Configuring delegated administration
      6. Configuring recursion
      7. Configuring netmask ordering
      8. Configuring a GlobalNames zone
      9. Analyzing zone-level statistics
      10. Objective summary
      11. Objective review
    3. Objective 4.3: Deploy and manage IPAM
      1. Understanding IPAM
      2. Installing and configuring IPAM
        1. Connect To IPAM Server
        2. Provision The IPAM Server
        3. Configure Server Discovery
        4. Start Server Discovery
        5. Select Or Add Servers To Manage And Verify IPAM Access
        6. Retrieve Data From Managed Servers
      3. Managing address space
        1. Adding your IP address space to the IPAM database
        2. Creating custom fields
        3. Applying a custom field to addresses and ranges
        4. Creating IP address range groups
        5. Finding and allocating an address from a range
        6. Viewing and configuring IP utilization thresholds
        7. Delegating IPAM administration
      4. Configuring IPAM database storage
      5. Objective summary
      6. Objective review
    4. Answers
      1. Objective 4.1: Thought experiment
      2. Objective 4.1: Review
      3. Objective 4.2: Thought experiment
      4. Objective 4.2: Review
      5. Objective 4.3: Thought experiment
      6. Objective 4.3: Review
  7. 5. Configure the Active Directory infrastructure
    1. Objective 5.1: Configure a forest or a domain
      1. Implementing multi-domain Active Directory environments
      2. Implementing multi-forest Active Directory environments
      3. Configuring interoperability with previous versions of Active Directory
      4. Upgrading existing domains and forests
      5. Configuring multiple user principal name (UPN) suffixes
      6. Objective summary
      7. Objective review
    2. Objective 5.2: Configure trusts
      1. Understanding trust concepts
      2. Configuring external trusts and realm trusts
      3. Configuring forest trusts
      4. Configuring shortcut trusts
      5. Configuring trust authentication
      6. Configuring Security IDentifier (SID) filtering
      7. Configuring name suffix routing
      8. Objective summary
      9. Objective review
    3. Objective 5.3: Configure sites
      1. Configuring sites and subnets
      2. Creating and configuring site links
      3. Managing registration of SRV records
      4. Moving domain controllers between sites
      5. Objective summary
      6. Objective review
    4. Objective 5.4: Manage Active Directory and SYSVOL replication
      1. Configuring replication to Read-Only Domain Controllers (RODCs)
      2. Monitoring and managing replication
      3. Upgrading SYSVOL replication to Distributed File System Replication (DFSR)
      4. Objective summary
      5. Objective review
    5. Answers
      1. Objective 5.1: Thought experiment
      2. Objective 5.1: Review
      3. Objective 5.2: Thought experiment
      4. Objective 5.2: Review
      5. Objective 5.3: Thought experiment
      6. Objective 5.3: Review
      7. Objective 5.4: Thought experiment
      8. Objective 5.4: Review
  8. 6. Configure access and information protection solutions
    1. Objective 6.1: Implement Active Directory Federation Services (AD FS)
      1. Installing AD FS
      2. Implementing claims-based authentication
        1. Configuring relying party trusts
        2. Configuring claims-provider trusts
      3. Configuring authentication policies
      4. Configuring Workplace Join
      5. Configuring multi-factor authentication
      6. Objective summary
      7. Objective review
    2. Objective 6.2: Install and configure Active Directory Certificate Services (AD CS)
      1. Installing an Enterprise Certificate Authority (CA)
        1. Deploying an enterprise root CA
        2. Deploying an enterprise subordinate CA
        3. Deploying a standalone root CA
        4. Deploying a standalone subordinate CA
      2. Configuring CRL Distribution Points (CDP)
      3. Installing and configuring online responders
      4. Implementing administrative role separation
      5. Configuring CA backup and recovery
      6. Objective summary
      7. Objective review
    3. Objective 6.3: Manage certificates
      1. Managing certificate templates
      2. Implementing and managing certificate validation and revocation
      3. Managing certificate enrollment
      4. Managing certificate renewal
      5. Configuring and managing key archival and recovery
      6. Implementing and managing certificate deployment
      7. Objective summary
      8. Objective review
    4. Objective 6.4: Install and configure Active Directory Rights Management Services (AD RMS)
      1. Installing a licensing or certificate AD RMS server
      2. Managing AD RMS Service Connection Point (SCP)
      3. Managing RMS templates
      4. Configuring exclusion policies
      5. Backing up and restoring AD RMS
      6. Objective summary
      7. Objective review
    5. Answers
      1. Objective 6.1: Thought experiment
      2. Objective 6.1: Review
      3. Objective 6.2: Thought experiment
      4. Objective 6.2: Review
      5. Objective 6.3: Thought experiment
      6. Objective 6.3: Review
      7. Objective 6.4: Thought experiment
      8. Objective 6.4: Review
  9. A. About the authors
  10. Index
  11. About the Authors
  12. Copyright