You are previewing Self-Paced Training Kit (Exam 70-642): Configuring Windows Server® 2008 Network Infrastructure.
O'Reilly logo
Self-Paced Training Kit (Exam 70-642): Configuring Windows Server® 2008 Network Infrastructure

Book Description

EXAM PREP GUIDE

Fully updated for Windows Server 2008 R2! Ace your preparation for the skills measured by Exam 70-642 - and on the job. Work at your own pace through a series of lessons and reviews that fully cover each exam objective. Then, reinforce and apply your knowledge to real-world case scenarios and practice exercises.

Maximize your performance on the exam by learning to:

  • Configure IPv4 and IPv6 addressing

  • Deploy and configure DHCP servers, DNS servers, and DNS zones

  • Implement Ipsec, Windows Firewall, and Network Access Protection (NAP)

  • Plan and manage Windows Server Update Services

  • Manage file and print services in Windows Server 2008 R2

  • Enable remote and wireless access, including DirectAccess

  • Monitor and troubleshoot network performance

  • PRACTICE TESTS
    Assess your skills with practice tests. You can work through hundreds of questions using multiple testing modes to meet your specific learning needs. You get detailed explanations for right and wrong answers—including a customized learning path that describes how and where to focus your studies.

    NOTE

    Exam 70-642 is one of three required exams for MCSA: Windows Server 2008 certification. For a limited time, it is also valid for MCTS certification, which will be retired.

    For customers who purchase an ebook version of this title, instructions for downloading the CD files can be found in the ebook.

    Table of Contents

    1. Self-Paced Training Kit (Exam 70-642): Configuring Windows Server® 2008 Network Infrastructure
    2. A Note Regarding Supplemental Files
    3. Exam 70-642: Windows Server 2008 Network Infrastructure, Configuring
    4. Introduction
      1. System Requirements
        1. Hardware Requirements
        2. Software Requirements
        3. Lab Setup Instructions
          1. Preparing the Windows Server 2008 R2 Computers
      2. Using the CD
        1. How to Install the Practice Tests
        2. How to Use the Practice Tests
          1. Lesson Review Options
          2. Practice Test Options
        3. How to Uninstall the Practice Tests
      3. Acknowledgments
      4. Support & Feedback
        1. Errata
        2. We Want to Hear from You
        3. Stay in Touch
    5. Preparing for the Exam
    6. 1. Understanding and Configuring TCP/IP
      1. Before You Begin
      2. Lesson 1: Introducing Windows Networking
        1. What Are Network Layers?
        2. Exploring the Layers of the TCP/IP Networking Model
          1. Network Interface Layer
          2. Internet Layer
          3. Transport Layer
          4. Application Layer
          5. TCP/IP Encapsulation
        3. Configuring Networking Properties in Windows Server 2008 R2
          1. Network and Sharing Center
          2. Viewing Network Connections
            1. Viewing Default Components of Network Connections
          3. Bridging Network Connections
          4. Viewing an Address Configuration
          5. Assigning an IP Configuration Manually
            1. Assigning an IPv4 Configuration Manually
            2. Assigning an IPv6 Configuration Manually
            3. Configuring IPv4 and IPv6 Settings Manually from the Command Prompt
          6. Configuring an IPv4 Connection to Receive an Address Automatically
            1. Understanding DHCP-Assigned Addresses
            2. Defining an Alternate Configuration
            3. Understanding Automatic Private IP Addressing
            4. Repairing a Network Connection with Ipconfig /Renew and the Diagnose Feature
            5. Troubleshooting Network Connectivity with Ping, Tracert, PathPing, and Arp
          7. Practice: Configuring TCP/IP Addresses
        4. Lesson Summary
        5. Lesson Review
      3. Lesson 2: Understanding IPv4 Addressing
        1. The Structure of IPv4 Addresses
          1. Network ID and Host ID
            1. IPv4 Addresses and ZIP+4 Compared
          2. Subnet Masks
            1. Subnet Mask Notations
            2. Subnet Mask Midrange Values
            3. Subnet Mask Octet Values
        2. Understanding Routing and Default Gateways
        3. Understanding IPv4 Address Ranges
          1. Using Public IPv4 Addresses
          2. Using Private IPv4 Addresses
          3. Understanding Address Blocks and Subnets
          4. Creating an IPv4 Address Block Reference Chart
          5. Determining the Block Size for a /n Network
          6. Determining the Block Size for a Dotted-Decimal Subnet Mask
            1. Determining Host Capacity Per Block
          7. Determining Block Size Requirements
        4. What Is Subnetting?
        5. Advantages of Subnetting
          1. Accommodating Physical Topology
          2. Restricting Broadcast Traffic
        6. The Subnet ID
        7. Creating Equally Sized Subnets
        8. Using Variable-Length Subnet Masks
        9. Enumerating Subnets in an Address Space
        10. Verifying Subnet Ownership and Configuration
          1. Practice: Learning to Work with Address Blocks
        11. Lesson Summary
        12. Lesson Review
      4. Lesson 3: Understanding IPv6 Addressing
        1. Introducing IPv6 Addresses
          1. The Structure of IPv6 Addresses
          2. How Do IPv6 Computers Receive an IPv6 Address?
        2. Understanding IPv6 Address Types
          1. Global Addresses
          2. Link-Local Addresses
          3. Unique Local Addresses
          4. States of an IPv6 Address
        3. IPv6 Transition Technologies
          1. Next Generation TCP/IP
          2. Intra-Site Automatic Tunnel Addressing Protocol
          3. 6to4
          4. Teredo
          5. IP-HTTPS
        4. Working with IPv6 Subnets
          1. Determining the Number of Bits Left in the Subnet ID
          2. Determining How Many Bits You Need for Subnetting
          3. Determining the New Network Prefix to Be Used Within Your Subnetted Portion of the Network
          4. Determining the Hexadecimal Increment Between Subnet Addresses
          5. Using the Hexadecimal Increment to Determine the Network Address of Each Subnet
          6. Practice: Testing IPv6 Connectivity
        5. Lesson Summary
        6. Lesson Review
      5. Chapter Review
        1. Chapter Summary
        2. Key Terms
        3. Case Scenarios
          1. Case Scenario: Working with IPv4 Address Blocks
        4. Suggested Practices
          1. Configure IP Addressing
        5. Take a Practice Test
    7. 2. Configuring Name Resolution
      1. Before You Begin
      2. Lesson 1: Understanding Name Resolution in Windows Server 2008 Networks
        1. Name Resolution Methods in Windows
        2. What Is Link Local Multicast Name Resolution?
        3. What Is NetBIOS Name Resolution?
          1. NetBIOS Name Resolution Methods
            1. NetBIOS Broadcasts
            2. WINS
            3. Lmhosts File
          2. Enabling and Disabling NetBIOS
          3. NetBIOS Node Types
          4. Advantages and Disadvantages of NetBIOS
        4. What Is DNS Name Resolution?
          1. DNS Namespace
          2. Domain Names
          3. Private Domain Namespace
        5. DNS Components
          1. DNS Servers
          2. DNS Zones
          3. DNS Resolvers
          4. Resource Records
        6. Understanding How a DNS Query Works
          1. DNS Resolution Methods
          2. DNS Query Steps
            1. Step 1: The Local Resolver
            2. Step 2: Querying a DNS Server
          3. Understanding Recursion
          4. Root Hints
          5. Query Example
        7. Understanding How Caching Works
          1. DNS Client Cache
          2. DNS Server Cache
            1. Time to Live Values
          3. Practice: Exploring Automatic Name Resolution in Local Networks
        8. Lesson Summary
        9. Lesson Review
      3. Lesson 2: Deploying a DNS Server
        1. Deploying a DNS Server on a Domain Controller
        2. Deploying a DNS Server on a Stand-Alone or Member Server
        3. Deploying a DNS Server on a Server Core Installation of Windows Server 2008 R2
        4. Configuring a Caching-Only DNS Server
        5. Configuring Server Properties
          1. Interfaces Tab
          2. Root Hints Tab
          3. Forwarders Tab
            1. When to Use Forwarders
            2. When to Use Conditional Forwarding
        6. Configuring DNS Socket Pooling
        7. Configuring DNS Cache Locking
          1. Practice: Exploring DNS in an Active Directory Environment
        8. Lesson Summary
        9. Lesson Review
      4. Lesson 3: Configuring DNS Client Settings
        1. Specifying DNS Servers
        2. Specifying a Computer Name and DNS Suffixes
          1. Configuring a Connection-Specific DNS Suffix
        3. Configuring a Suffix Search List
          1. Default DNS Suffix Searches
          2. DNS Devolution Levels
          3. Custom DNS Suffix Search Lists
        4. Configuring Dynamic Update Settings
          1. Default Client Update Behavior
            1. Update Behavior for Host Records
            2. Update Behavior for Pointer Records
        5. Viewing and Clearing the DNS Client Cache
          1. Practice: Managing the DNS Client Cache
        6. Lesson Summary
        7. Lesson Review
      5. Chapter Review
        1. Chapter Summary
        2. Key Terms
        3. Case Scenarios
          1. Case Scenario 1: Troubleshooting DNS Clients
          2. Case Scenario 2: Deploying a DNS Server
        4. Suggested Practices
          1. Configure a DNS Server
          2. Configure Name Resolution for Client Computers
        5. Take a Practice Test
    8. 3. Configuring a DNS Zone Infrastructure
      1. Before You Begin
      2. Lesson 1: Creating and Configuring Zones
        1. Creating Zones
          1. Choosing a Zone Type
            1. Primary Zones
            2. Secondary Zones
            3. Stub Zones
            4. Storing the Zone in Active Directory
            5. Standard Zones
          2. Choosing an Active Directory Zone Replication Scope
          3. Creating a Forward or Reverse Lookup Zone
          4. Choosing a Zone Name
          5. Configuring Dynamic Update Settings
            1. Dynamic Updates and DNS Record Security
        2. Examining Built-in Resource Records
          1. Start of Authority (SOA) Records
          2. Name Server Records
        3. Creating Resource Records
          1. Record Types
            1. Host Resource Records
            2. Alias Resource Records
            3. Mail Exchanger Resource Records
            4. Pointer Resource Records
            5. Service Resource Records
        4. Enabling DNS to Use WINS Resolution
        5. Aging and Scavenging
          1. Enabling Aging
          2. Time Stamping
          3. Modifying Zone Aging/Scavenging Properties
          4. Performing Scavenging
        6. Using a GlobalNames Zone
          1. Deploying a GlobalNames Zone
          2. Practice: Deploying a GlobalNames Zone
        7. Lesson Summary
        8. Lesson Review
      3. Lesson 2: Configuring Zone Replication, Transfers, and Delegations
        1. Configuring Zone Replication for Active Directory–Integrated Zones
          1. Replication and Application Directory Partitions
            1. DomainDnsZones and ForestDNSZones
            2. Custom Application Directory Partitions
            3. Storing DNS Data in the Domain Partition
          2. Choosing Zone Replication Scope
          3. Creating Custom Application Directory Partitions
        2. Using Zone Transfers
          1. Zone Transfer Initiation
          2. Enabling Zone Transfers
          3. Configuring Notifications
          4. Manually Updating a Secondary Zone
        3. Understanding Zone Delegations
          1. When to Delegate Zones
          2. How Delegations Work
          3. Creating a Zone Delegation
        4. Implementing Stub Zones
          1. Stub Zone Example
          2. Other Uses for Stub Zones
          3. Practice: Creating an Application Directory Partition for DNS
          4. Practice: Deploying a Secondary Zone
        5. Lesson Summary
        6. Lesson Review
      4. Lesson 3: Implementing DNSSEC
        1. Understanding Public Key Cryptography in DNSSEC
          1. Understanding Key Pairs
          2. Understanding Digital Signatures
          3. Understanding DNSSEC Trust Relationships
        2. Understanding DNSSEC Name Resolution
        3. Configuring DNSSEC
          1. Configuring DNSSEC in Windows Server 2008 R2
            1. Preparing A Zone for DNSSEC
            2. Choosing a Key Rollover Mechanism
            3. Generating Key Pairs
            4. Signing a Zone File
            5. Configure Trust Anchors
          2. Configuring Clients for DNSSEC
          3. Practice: Configuring DNSSEC
        4. Lesson Summary
        5. Lesson Review
      5. Chapter Review
        1. Chapter Summary
        2. Key Terms
        3. Case Scenarios
          1. Case Scenario 1: Managing Outdated Zone Data
          2. Case Scenario 2: Configuring Zone Transfers
        4. Suggested Practices
          1. Configure a DNS Infrastructure
        5. Take a Practice Test
    9. 4. Creating a DHCP Infrastructure
      1. Before You Begin
      2. Lesson 1: Installing a DHCP Server
        1. Understanding DHCP Address Assignment
          1. Understanding Address Leases
          2. Understanding DHCP Scopes
          3. Understanding DHCP Options
        2. Adding the DHCP Server Role
          1. Selecting Network Connection Bindings
          2. Specifying IPv4 DNS Server Settings
          3. Specifying IPv4 WINS Server Settings
          4. Adding DHCP Scopes
          5. Configuring DHCPv6 Stateless Mode
            1. Configuring Clients for Stateful or Stateless IPv6 Addressing
          6. Configuring IPv6 DNS Server Settings
          7. Authorizing DHCP Server
          8. Practice: Deploying a DHCP Server
        3. Lesson Summary
        4. Lesson Review
      3. Lesson 2: Configuring a DHCP Server
        1. Performing Post-Installation Tasks
          1. Creating Address Exclusions
          2. Creating Reservations
          3. Adjusting Lease Durations
          4. Configuring Additional DHCP Options
        2. Understanding DHCP Options Classes
          1. Implementing User Classes
        3. Controlling DHCP Access Through MAC Filtering
        4. DHCP Delay Configuration
        5. Using the DHCP Split-Scope Configuration Wizard
        6. Configuring DHCP to Perform Dynamic DNS Updates for Clients
          1. Configuring Name Protection
          2. Using the DnsUpdateProxy Security Group
        7. Installing and Configuring DHCP on a Server Core Installation
          1. Practice: Creating an Exclusion Range
        8. Lesson Summary
        9. Lesson Review
      4. Chapter Review
        1. Chapter Summary
        2. Key Terms
        3. Case Scenarios
          1. Case Scenario 1: Deploying a New DHCP Server
          2. Case Scenario 2: Configuring DHCP Options
        4. Suggested Practice
          1. Configure DHCP
        5. Take a Practice Test
    10. 5. Configuring IP Routing
      1. Before You Begin
      2. Lesson 1: Routing
        1. Routing Overview
        2. Examining Network Routes
        3. Routing Protocols
          1. Installing Routing and Remote Access Services
          2. Configuring RIP
          3. Configuring an IGMP Proxy
        4. Demand-Dial Routing
        5. Static Routing
          1. Configuring Static Routing with the Route Command
          2. Configuring Static Routing with Routing and Remote Access
          3. Practice: Analyzing and Configuring Routing
        6. Lesson Summary
        7. Lesson Review
      3. Chapter Review
        1. Chapter Summary
        2. Key Terms
        3. Case Scenarios
          1. Case Scenario 1: Adding a Second Default Gateway
          2. Case Scenario 2: Adding a New Subnet
        4. Suggested Practices
        5. Take a Practice Test
    11. 6. Protecting Network Traffic with IPsec
      1. Before You Begin
      2. Lesson 1: Configuring IPsec
        1. What Is IPsec?
          1. IPsec Policies
            1. IPsec Policy Example
          2. Connection Security Rules
          3. Security Associations
          4. How IPsec Connections Are Established
        2. Using IPsec in Tunnel Mode
        3. Authentication Methods for IPsec
        4. Assigning a Predefined IPsec Policy
        5. Creating a New IPsec Policy
          1. Using the Create IP Security Rule Wizard
          2. Managing IP Filter Lists and Filter Actions
        6. Creating and Configuring a Connection Security Rule
          1. Using the New Connection Security Rule Wizard
            1. Rule Type Page
            2. Endpoints Page
            3. Requirements Page
            4. Authentication Method Page
            5. Protocols and Ports Page
            6. Profile Page
            7. Name Page
          2. Configuring IPsec Settings for Connection Security Rules
          3. Practice: Deploying IPsec Through IPsec Policies and Connection Security Rules
        7. Lesson Summary
        8. Lesson Review
      3. Chapter Review
        1. Chapter Summary
        2. Key Terms
        3. Case Scenario
          1. Case Scenario: Implementing IPsec
        4. Suggested Practices
          1. Deploy IPsec
          2. Watch a Webcast
        5. Take a Practice Test
    12. 7. Connecting to Networks
      1. Before You Begin
      2. Lesson 1: Configuring Network Policy Server
        1. Wireless Security Standards
        2. Infrastructure and Ad Hoc Wireless Networks
        3. Configuring the Public Key Infrastructure
        4. Authenticating Wireless Networks by Using Windows Server 2008 R2
          1. Configuring the RADIUS Server for Wireless Networks
          2. Configuring RADIUS Proxies
          3. Monitoring RADIUS Server Logons
            1. Using Event Viewer
            2. RADIUS Logging
            3. Enabling Trace Logging on the Server
        5. Connecting to Wireless Networks
        6. Deploying Wireless Networks with WPA-EAP
        7. Wired Network Security
        8. Using NPS Templates
          1. Practice: Configuring WPA-EAP Authentication for a Wireless Access Point
        9. Lesson Summary
        10. Lesson Review
      3. Lesson 2: Configuring Network Address Translation
        1. Network Address Translation Concepts
        2. Configuring Internet Connection Sharing
        3. Configuring Network Address Translation by Using Routing And Remote Access
          1. Enabling NAT
          2. Enabling DHCP
          3. Enabling Forwarding of DNS Requests
          4. Configuring Client Computers
        4. Troubleshooting Network Address Translation
          1. Practice: Configuring NAT
        5. Lesson Summary
        6. Lesson Review
      4. Lesson 3: Connecting to Remote Networks
        1. Remote Access Overview
          1. Dial-Up Connections
          2. Virtual Private Networks
        2. Configuring Dial-Up Connections
          1. Configuring the Dial-Up Server
          2. Configuring the RADIUS Server for Dial-Up Connections
          3. Configuring the Dial-Up Client
        3. Configuring VPN Connections
          1. Configuring the VPN Server
          2. Configuring VPN Packet Filters
          3. Configuring the VPN Client
          4. Configuring VPN Reconnect
        4. Troubleshooting VPN Connection Problems
        5. Configuring Connection Restrictions
        6. Testing Connectivity
          1. Ipconfig
          2. Ping
          3. Tracert
          4. Practice: Establishing a Remote Access VPN Connection
        7. Lesson Summary
        8. Lesson Review
      5. Lesson 4: Configuring DirectAccess
        1. DirectAccess Connection Types
        2. Using DirectAccess on IPv4 Networks
        3. DirectAccess and Name Resolution
        4. The Network Location Server
        5. DirectAccess Requirements
        6. DirectAccess Limitations
        7. Firewall Configuration
        8. Running the DirectAccess Setup Wizard
          1. Practice: Configuring DirectAccess
        9. Lesson Summary
        10. Lesson Review
      6. Chapter Review
        1. Chapter Summary
        2. Key Terms
        3. Case Scenarios
          1. Case Scenario 1: Connecting a Branch Office to the Internet
            1. Questions
          2. Case Scenario 2: Planning Remote Access
            1. Interviews
            2. Questions
        4. Suggested Practices
          1. Configure Wireless Access
          2. Configure Remote Access
          3. Configure Network Authentication
          4. Configure DirectAccess
        5. Take a Practice Test
    13. 8. Configuring Windows Firewall and Network Access Protection
      1. Before You Begin
      2. Lesson 1: Configuring Windows Firewall
        1. Why Firewalls Are Important
        2. Firewall Profiles
        3. Filtering Inbound Traffic
        4. Filtering Outbound Traffic
        5. Configuring Scope
        6. Authorizing Connections
        7. Configuring Firewall Settings with Group Policy
        8. Enabling Logging for Windows Firewall
        9. Identifying Network Communications
          1. Practice: Configuring Windows Firewall
        10. Lesson Summary
        11. Lesson Review
      3. Lesson 2: Configuring Network Access Protection
        1. Network Access Protection Concepts
          1. Enforcement Types
            1. IPsec Connection Security
            2. 802.1X Access Points
            3. VPN Servers
            4. DHCP Servers
            5. Remote Desktop Gateways
          2. System Health Agents and System Health Validators
        2. Planning a NAP Deployment
        3. Installing and Configuring the Network Policy Server
          1. Installing NAP
          2. Using the Configure NAP Wizard
        4. Configuring NAP Enforcement
          1. Configuring IPsec Enforcement
            1. Step 1: Installing the HRA Role Service
            2. Step 2: Configuring the NAP Wizard
            3. Step 3: Configuring HRA
            4. Step 4: Configuring Client Computers for IPsec Enforcement
            5. Step 5: Configuring IPsec Connection Security Rules
          2. Configuring 802.1X Enforcement
          3. Configuring DHCP Enforcement
            1. Enabling NAP on All DHCP Scopes
            2. Enabling NAP on a Single DHCP Scope
          4. Configuring VPN Enforcement
          5. Configuring RD Gateway Enforcement
        5. Configuring NAP Components
          1. Configuring NAP Clients
          2. Configuring a Health Requirement Policy
            1. Configuring SHVs
            2. Configuring the Windows Security Health Validator
            3. Configuring Remediation
            4. Configuring Network Policies
          3. Configuring NAP for Monitoring Only
        6. NAP Logging
          1. Practice: Configuring DHCP NAP Enforcement
        7. Lesson Summary
        8. Lesson Review
      4. Chapter Review
        1. Chapter Summary
        2. Key Terms
        3. Case Scenarios
          1. Case Scenario 1: Evaluating Firewall Settings
            1. Interviews
            2. Questions
          2. Case Scenario 2: Planning NAP
            1. Questions
        4. Suggested Practices
          1. Configure Firewall Settings
          2. Configure Network Access Protection
        5. Take a Practice Test
    14. 9. Managing Software Updates
      1. Before You Begin
      2. Lesson 1: Understanding Windows Server Update Services
        1. WSUS Overview
        2. Windows Update Client
        3. WSUS Architecture
          1. Organizations with One Office
          2. Organizations with Multiple Offices
          3. Organizations with Multiple IT Departments
        4. WSUS Requirements
        5. Planning the WSUS Installation
        6. Auditing Updates
        7. Lesson Summary
        8. Lesson Review
      3. Lesson 2: Using Windows Server Update Services
        1. Installing Windows Server Update Services
        2. Configuring Windows Server Update Services
          1. Configuring WSUS Options
          2. Configuring Computer Groups
            1. Server-Side Targeting
            2. Client-side Targeting
          3. Configuring Client Computers
          4. Approving Updates
          5. Declining Updates
          6. Viewing Reports
          7. Managing Synchronizations
          8. Administering WSUS from the Command Line
          9. Configuring WSUS to Use an SSL Certificate
        3. Troubleshooting Problems Installing Updates
          1. Troubleshooting WSUS
          2. Troubleshooting the Windows Update Client
        4. Removing Updates
          1. Practice: Deploying Updates with WSUS
        5. Lesson Summary
        6. Lesson Review
      4. Chapter Review
        1. Chapter Summary
        2. Key Terms
        3. Case Scenarios
          1. Case Scenario 1: Planning a Basic WSUS Infrastructure
          2. Case Scenario 2: Planning a Complex WSUS Infrastructure
            1. Interviews
            2. Questions
        4. Suggested Practice
          1. Configure Windows Server Update Services Server Settings
        5. Take a Practice Test
    15. 10. Monitoring Computers
      1. Before You Begin
      2. Lesson 1: Monitoring Events
        1. Using Event Viewer
          1. Filtering Events
          2. Using Custom Views
        2. Automatically Responding to Events
        3. Configuring Event Forwarding
          1. Configuring the Forwarding Computer
          2. Configuring the Collecting Computer
          3. Creating an Event Subscription
          4. Configuring Event Forwarding to Use HTTPS
          5. Troubleshooting Event Forwarding
          6. Practice: Responding to and Collecting Events
        4. Lesson Summary
        5. Lesson Review
      3. Lesson 2: Monitoring Performance and Reliability
        1. Using Performance Monitor
        2. Using Reliability Monitor
        3. Using Data Collector Sets
          1. Using Built-in Data Collector Sets
          2. Creating a Data Collector Set
          3. Customizing a Data Collector Set
          4. Saving Performance Data
          5. Viewing Saved Performance Data in a Report
          6. Using Logman
        4. Configuring Virtual Memory
          1. Practice: Running a Data Collector Set and Analyzing the Results
        5. Lesson Summary
        6. Lesson Review
      4. Lesson 3: Using Network Monitor and Simple Network Management Protocol
        1. Installing Network Monitor
        2. Capturing and Analyzing Network Communications
          1. Capturing Network Data
          2. Capturing Network Data by Using a Command Prompt
          3. Analyzing Network Data
          4. Assigning Aliases
          5. Filtering Network Data
        3. Configuring SNMP
          1. Practice: Capturing and Analyzing Network Traffic
        4. Lesson Summary
        5. Lesson Review
      5. Chapter Review
        1. Chapter Summary
        2. Key Terms
        3. Case Scenarios
          1. Case Scenario 1: Troubleshooting a Network Performance Problem
            1. Interviews
            2. Questions
          2. Case Scenario 2: Monitoring Computers for Low Disk Space
        4. Suggested Practices
          1. Configure Event Logs
          2. Configure Performance Monitoring
          3. Gather Network Data
        5. Take a Practice Test
    16. 11. Managing Files
      1. Before You Begin
      2. Lesson 1: Managing File Security
        1. NTFS File Permissions
        2. Encrypting File System
          1. Protecting Files and Folders with EFS
          2. Sharing Files Protected with EFS
          3. Configuring EFS by Using Group Policy Settings
          4. Configuring a Data Recovery Agent
        3. BitLocker
          1. BitLocker Modes
          2. Managing TPM Hardware
          3. Enabling BitLocker Encryption
          4. Practice: Encrypting and Recovering Files
        4. Lesson Summary
        5. Lesson Review
      3. Lesson 2: Sharing Folders
        1. Installing the File Services Server Role
        2. Quotas
          1. Configuring Disk Quotas by Using the Quota Management Console
            1. Creating Quota Templates
            2. Creating Quotas
          2. Configuring Disk Quotas at a Command Prompt or Script
          3. Configuring Disk Quotas by Using Windows Explorer
          4. Configuring Disk Quotas by Using Group Policy
        3. Folder Sharing
          1. Sharing Folders from Windows Explorer
          2. Sharing Folders by Using the Provision A Shared Folder Wizard
          3. Sharing Folders from a Command Prompt or Script
          4. Connecting to Shared Folders
        4. Classification Management
          1. Creating Classification Properties
          2. Creating Classification Rules
        5. Distributed File System
          1. Installing DFS
          2. Creating a DFS Namespace
          3. Adding Folders to a DFS Namespace
          4. Configuring DFS Root Permissions
          5. Configuring DFS from a Command Prompt or Script
          6. Generating Health Reports for DFS Replication
          7. Configuring Failover Clustering for DFS
        6. Offline Files
        7. BranchCache
          1. Using BranchCache Modes
            1. Distributed Cache Mode
            2. Hosted Cache Mode
          2. Configuring BranchCache
            1. Installing Required Components for a File Server
            2. Installing Required Components for a Web Server or Hosted Cache Server
            3. Configuring BranchCache Servers
            4. Configuring BranchCache Clients
          3. Practice: Working with Shared Folders
        8. Lesson Summary
        9. Lesson Review
      4. Lesson 3: Backing Up and Restoring Files
        1. Shadow Copies
          1. Managing Shadow Copies from Windows Explorer
          2. Managing Shadow Copies from a Command Prompt
        2. Windows Server Backup
          1. Installing Windows Server Backup Features
          2. Manually Performing a Backup
          3. Scheduling Backups
          4. Performing Backups from a Command Prompt or Script
          5. Recovering Individual Files
          6. Recovering Files or Volumes
          7. Recovering from a Backup When Windows Will Not Start
          8. Practice: Backing Up and Restoring Files
        3. Lesson Summary
        4. Lesson Review
      5. Chapter Review
        1. Chapter Summary
        2. Key Terms
        3. Case Scenarios
          1. Case Scenario 1: Planning File Services
          2. Case Scenario 2: Planning Disaster Recovery
        4. Suggested Practices
          1. Configure a File Server
          2. Configure Distributed File System
          3. Configure Shadow Copy Services
          4. Configure Backup and Restore
          5. Manage File Server Resources
        5. Take a Practice Test
    17. 12. Managing Printers
      1. Before You Begin
      2. Lesson 1: Managing Printers
        1. Installing the Print And Document Services Server Role
        2. Installing Printers
          1. Installing a Printer by Using Control Panel
          2. Installing a Printer by Using the Print Management Snap-in
        3. Sharing Printers
        4. Configuring Print Server and Printer Permissions
        5. Adding Printer Drivers
        6. Configuring Printer Pooling
        7. Configuring Printer Priorities
        8. Managing Internet Printing
        9. Generating Notifications
        10. Deploying Printers with Group Policy
        11. Migrating Printers
          1. Exporting Printers
          2. Importing Printers
        12. Managing Printers from a Command Prompt or Script
        13. Monitoring Printers
          1. Practice: Installing and Sharing a Printer
        14. Lesson Summary
        15. Lesson Review
      3. Chapter Review
        1. Chapter Summary
        2. Key Terms
        3. Case Scenario
          1. Case Scenario: Managing Network Printers
        4. Suggested Practices
          1. Configure and Monitor Print Services
        5. Take a Practice Test
    18. A. Answers
      1. Chapter 1: Lesson Review Answers
        1. Lesson 1
        2. Lesson 2
        3. Lesson 3
      2. Chapter 1: Case Scenario Answers
        1. Case Scenario: Working with IPv4 Address Blocks
      3. Chapter 2: Lesson Review Answers
        1. Lesson 1
        2. Lesson 2
        3. Lesson 3
      4. Chapter 2: Case Scenario Answers
        1. Case Scenario 1: Troubleshooting DNS Clients
        2. Case Scenario 2: Deploying a DNS Server
      5. Chapter 3: Lesson Review Answers
        1. Lesson 1
        2. Lesson 2
        3. Lesson 3
      6. Chapter 3: Case Scenario Answers
        1. Case Scenario 1: Managing Outdated Zone Data
        2. Case Scenario 2: Configuring Zone Transfers
      7. Chapter 4: Lesson Review Answers
        1. Lesson 1
        2. Lesson 2
      8. Chapter 4: Case Scenario Answers
        1. Case Scenario 1: Deploying a New DHCP Server
        2. Case Scenario 2: Configuring DHCP Options
      9. Chapter 5: Lesson Review Answers
        1. Lesson
        2. Case Scenario 1: Adding a Second Default Gateway
        3. Case Scenario 2: Adding a New Subnet
      10. Chapter 6: Lesson Review Answers
        1. Lesson
      11. Chapter 6: Case Scenario Answers
        1. Case Scenario: Implementing IPsec
      12. Chapter 7: Lesson Review Answers
        1. Lesson 1
        2. Lesson 2
        3. Lesson 3
        4. Lesson 4
      13. Chapter 7: Case Scenario Answers
        1. Case Scenario 1: Connecting a Branch Office to the Internet
        2. Case Scenario 2: Planning Remote Access
      14. Chapter 8: Lesson Review Answers
        1. Lesson 1
        2. Lesson 2
      15. Chapter 8: Case Scenario Answers
        1. Case Scenario 1: Evaluating Firewall Settings
        2. Case Scenario 2: Planning NAP
      16. Chapter 9: Lesson Review Answers
        1. Lesson 1
        2. Lesson 2
      17. Chapter 9: Case Scenario Answers
        1. Case Scenario 1: Planning a Basic WSUS Infrastructure
        2. Case Scenario 2: Planning a Complex WSUS Infrastructure
      18. Chapter 10: Lesson Review Answers
        1. Lesson 1
        2. Lesson 2
        3. Lesson 3
      19. Chapter 10: Case Scenario Answers
        1. Case Scenario 1: Troubleshooting a Network Performance Problem
        2. Case Scenario 2: Monitoring Computers for Low Disk Space
      20. Chapter 11: Lesson Review Answers
        1. Lesson 1
        2. Lesson 2
        3. Lesson 3
      21. Chapter 11: Case Scenario Answers
        1. Case Scenario 1: Planning File Services
        2. Case Scenario 2: Planning Disaster Recovery
      22. Chapter 12: Lesson Review Answers
        1. Lesson
      23. Chapter 12: Case Scenario Answers
        1. Case Scenario: Managing Network Printers
    19. Glossary
    20. B. About the Authors
    21. Index
    22. About the Authors
    23. Copyright