You are previewing Exam Ref 70-413: Designing and Implementing a Server Infrastructure.
O'Reilly logo
Exam Ref 70-413: Designing and Implementing a Server Infrastructure

Book Description

Prepare for Exam 70-413—and help demonstrate your real-world mastery of enterprise server design and implementation. Designed for experienced, MCSA-certified professionals ready to advance their status—Exam Ref focuses on the critical-thinking and decision-making acumen needed for success at the MCSE level.

Optimize your exam-prep by focusing on the expertise needed to:

  • Plan and Deploy a Server Infrastructure

  • Design and Implement Network Infrastructure Services

  • Design and Implement Network Access Services

  • Design and Implement an Active Directory Infrastructure (Logical)

  • Design and Implement an Active Directory Infrastructure (Physical)

  • Table of Contents

    1. Dedication
    2. Special Upgrade Offer
    3. Introduction
      1. Microsoft Certified Professional Program
      2. Acknowledgments
      3. Support & Feedback
        1. Errata
        2. We Want to Hear from You
        3. Stay in Touch
      4. Preparing for the Exam
    4. 1. Plan and Deploy a Server Infrastructure
      1. Objective 1.1: Design an automated server installation strategy
        1. Understanding design considerations
          1. Answer files
          2. Images
            1. Boot Images
            2. Install Images
          3. Windows Deployment Services
          4. Bare metal/virtual deployment
        2. Using the Windows Assessment and Deployment Kit
        3. Understanding virtual server deployment
        4. Objective summary
        5. Objective review
      2. Objective 1.2: Plan and implement a server deployment infrastructure
        1. Configuring multicast deployment
        2. Configuring multisite topology and distribution points
          1. Prestaging clients
        3. Configuring a multi-server topology
        4. Configuring WDS
        5. Objective summary
        6. Objective review
      3. Objective 1.3: Plan and implement server upgrade and migration
        1. Planning for role migration
          1. Planning migration of AD DS and DNS
          2. Planning migration of File Services servers
        2. Migrating server roles
          1. Migrating AD DS and DNS server roles
          2. Migrating File Services roles
          3. Migrating Dynamic Host Configuration Protocol (DHCP) server roles
        3. Migrating servers across domains and forests
        4. Designing a server consolidation strategy
          1. Determine the virtualization scope
          2. Create a list of workloads
            1. Determining Resource Requirements
            2. Selecting Backup and Fault-tolerance Approaches
          3. Summarize and analyze workload requirements
        5. Planning for capacity and resource optimization
          1. The MAP toolkit
          2. Trim storage
        6. Objective summary
        7. Objective review
      4. Objective 1.4: Plan and deploy Virtual Machine Manager services
        1. Designing VMM service templates
        2. Defining operating system profiles
          1. Creating a new standalone guest operating system profile
          2. Defining a guest operating system profile with template creation
        3. Configuring hardware and capability profiles
        4. Managing services
        5. Configuring image and template libraries
        6. Managing logical networks
          1. Defining static IP pools
        7. Objective summary
        8. Objective review
      5. Objective 1.5: Plan and implement file and storage services
        1. Planning for file and storage service
          1. iSCSI and Fibre Channel
          2. Virtual Fibre Channel
          3. Storage Spaces and storage pools
          4. Data deduplication
        2. Configuring the iSCSI Target Server
        3. Configuring Internet Storage Name Server
        4. Configuring Network File System
        5. Installing device-specific modules
        6. Objective summary
        7. Objective review
      6. Chapter summary
      7. Answers
        1. Objective 1.1: Thought experiment
        2. Objective 1.1: Review
        3. Objective 1.2: Thought experiment
        4. Objective 1.2: Review
        5. Objective 1.3: Thought experiment
        6. Objective 1.3: Review
        7. Objective 1.4: Thought experiment
        8. Objective 1.4: Review
        9. Objective 1.5: Thought experiment
        10. Objective 1.5: Review
    5. 2. Design and Implement Network Infrastructure Services
      1. Objective 2.1: Design and maintain a Dynamic Host Configuration Protocol (DHCP) solution
        1. Designing a highly available DHCP solution
          1. Split scope
          2. DHCP failover
          3. DHCP failover clustering
          4. DHCP Interoperability
          5. DHCPv6 considerations
        2. Implementing DHCP filtering
        3. Implementing and configuring a DHCP Management Pack
        4. Maintaining a DHCP database
        5. Objective summary
        6. Objective review
      2. Objective 2.2: Design a name resolution solution strategy
        1. Designing a name resolution strategy
          1. Secure name resolution
          2. DNSSEC
          3. DNS socket pool
          4. Cache locking
          5. Disjoint namespaces
          6. DNS interoperability
          7. Migration to application partitions
          8. IPv6
          9. Single-label DNS name resolution
          10. Zone hierarchy and zone delegation
        2. Objective summary
        3. Objective review
      3. Objective 2.3: Design and manage an IP address management solution
        1. Design considerations for IP address management
        2. Configuring role-based access control
        3. Configuring IPAM auditing
        4. Migrating IP addresses
        5. Managing and monitoring multiple DHCP and DNS servers
        6. Configuring data collection
        7. Objective summary
        8. Objective review
      4. Chapter summary
      5. Answers
        1. Objective 2.1: Thought experiment
        2. Objective 2.1: Review
        3. Objective 2.2: Thought experiment
        4. Objective 2.2: Review
        5. Objective 2.3: Thought experiment
        6. Objective 2.3: Review
    6. 3. Design and Implement Network Access Services
      1. Objective 3.1: Design a VPN solution
        1. VPN design considerations
        2. Security certificate deployment
          1. IPsec certificate considerations
          2. IP-HTTPS certificate considerations
          3. Network location server certificate considerations
        3. Firewall design considerations
        4. Client and site-to-site considerations
        5. Bandwidth and protocol implications
        6. VPN deployment configurations with CMAK
        7. Objective summary
        8. Objective review
      2. Objective 3.2: Design a DirectAccess solution
        1. Designing a DirectAccess topology
        2. Migrating from Forefront UAG
          1. Side-by-side migration
          2. Offline migration
        3. Deploying DirectAccess
        4. Using enterprise certificates
        5. Objective summary
        6. Objective review
      3. Objective 3.3: Implement a scalable Remote Access solution
        1. Configuring site-to-site VPN
        2. Configuring packet filters
        3. Implementing packet tracing
        4. Implementing Multisite Remote Access
        5. Configuring Remote Access clustered with NLB
        6. Configuring DirectAccess
        7. Objective summary
        8. Objective review
      4. Objective 3.4: Design a network protection solution
        1. Understanding network protection solutions
          1. DHCP
          2. IPsec
          3. VPN
          4. 802.1X
        2. Planning for capacity and server placement
          1. NAP enforcement server
          2. Health policy server
          3. NAP certificate authority servers
          4. Remediation and health requirement servers
        3. Planning for NPS and firewall access
        4. Remediation Network
        5. Objective summary
        6. Objective review
      5. Objective 3.5: Implement a network protection solution
        1. Implementing multiple RADIUS servers
        2. Configuring NAP enforcement for IPsec and 802.1X
          1. IPsec policy enforcement
          2. 802.1X policy enforcement
        3. Deploying and configuring the Endpoint Protection Client
          1. Create Endpoint Protection Site System role
          2. Configure alerts
          3. Configure the default antimalware policy
          4. Configure custom client settings
          5. Deploying a policy
        4. Setting up antimalware and firewall policies
          1. Creating an antimalware policy
          2. Creating Windows Firewall Policy
        5. Monitoring compliance
        6. Objective summary
        7. Objective review
      6. Chapter summary
      7. Answers
        1. Objective 3.1: Thought experiment
        2. Objective 3.1: Review
        3. Objective 3.2: Thought experiment
        4. Objective 3.2: Review
        5. Objective 3.3: Thought experiment
        6. Objective 3.3: Review
        7. Objective 3.4: Thought experiment
        8. Objective 3.4: Review
        9. Objective 3.5: Thought experiment
        10. Objective 3.5: Review
    7. 4. Design and Implement an Active Directory Infrastructure (Logical)
      1. Objective 4.1: Design a forest and domain infrastructure
        1. Multi-forest architecture
        2. Trusts
        3. Functional levels
        4. Domain upgrade
        5. Domain migration and forest restructure
        6. Hybrid cloud services
        7. Objective summary
        8. Objective review
      2. Objective 4.2: Implement a forest and domain infrastructure
        1. Configuring domain rename
          1. Preliminary steps for domain rename
          2. Steps for domain rename
        2. Configuring a Kerberos realm trust
        3. Implementing a domain upgrade
        4. Implementing a domain migration
        5. Implementing a forest restructure
        6. Deploying and managing a test forest
        7. Objective summary
        8. Objective review
      3. Objective 4.3: Design a Group Policy strategy
        1. Blocking inheritance
        2. Using enforced policies
        3. Using loopback processing
        4. Using Windows Management Instrumentation (WMI) filters
        5. Understanding site-linked GPOs
        6. Using slow link processing
        7. Understanding group strategies
        8. Understanding OU hierarchy
        9. Using advanced Group policy Management
        10. Objective summary
        11. Objective review
      4. Objective 4.4: Design an Active Directory permission model
        1. Understanding design considerations for Active Directory permissions
        2. Customizing tasks in the Delegation of Control Wizard
        3. Deploying Remote Server administrative Tools on a client computer
        4. Delegating permissions on administrative users
        5. Configuring Kerberos delegation
        6. Objective summary
        7. Objective review
      5. Chapter summary
      6. Answers
        1. Objective 4.1: Thought experiment
        2. Objective 4.1: Review
        3. Objective 4.2: Thought experiment
        4. Objective 4.2: Review
        5. Objective 4.3: Thought experiment
        6. Objective 4.3: Review
        7. Objective 4.4: Thought experiment
        8. Objective 4.4: Review
    8. 5. Design and Implement an Active Directory Infrastructure (Physical)
      1. Objective 5.1: Design an Active Directory sites topology
        1. Understanding Active Directory topology design
        2. Monitoring and resolving Active Directory replication conflicts
        3. Objective summary
        4. Objective review
      2. Objective 5.2: Design a domain controller strategy
        1. Global catalog and operations master roles
        2. Read-only domain controllers
        3. Partial attribute set
        4. Domain controller cloning
        5. Objective summary
        6. Objective review
      3. Objective 5.3: Design and implement a branch office infrastructure
        1. Understanding branch office infrastructure design considerations
          1. RODC, global catalog, and UGMC
          2. DNS and DHCP
          3. BranchCache
        2. Implementing confidential attributes
        3. Delegating administration
        4. Modifying the filtered attribute set
        5. Configuring Password Replication Policy
        6. Configuring Hash Publication
        7. Objective summary
        8. Objective review
      4. Chapter summary
      5. Answers
        1. Objective 5.1: Thought experiment
        2. Objective 5.1: Review
        3. Objective 5.2: Thought experiment
        4. Objective 5.2: Review
        5. Objective 5.3: Thought experiment
        6. Objective 5.3: Review
    9. Index
    10. About the Author
    11. Special Upgrade Offer
    12. Copyright