Windows Server 2008: Enterprise Administrator, Part 3 of 5
Interactive

Windows Server 2008: Enterprise Administrator, Part 3 of 5

LearnNow Online
Updated Oct 26, 2018

Course description

When building a Windows Server 2008 Enterprise network there are many other aspects that need to be considered above building a single network. The Enterprise network may span several floors, buildings and miles. This course will show planning the DNS and IP addressing. From there the course will cover Designing Active Directory Domain Services and its physical requirements. The course will then cover Windows Server 2008 installation, upgrading, migration and administration. Next the course moves to the deployment to branch offices, setting up systems, security, client and remote access. Virtualization of servers is covered next and how that can create efficiencies with hardware. Then the course moves into data availability planning covering sharing, security, backups and restores. The last section covers designing software update infrastructure and managing compliance.

Each LearnNowOnline training course is made up of Modules (typically an hour in length). Within each module there are Topics (typically 15-30 minutes each) and Subtopics (typically 2-5 minutes each). There is a Post Exam for each Module that must be passed with a score of 70% or higher to successfully and fully complete the course.


Prerequisites

Students should have knowledge of network systems and Microsoft server operating systems.


Meet the expert

Robert O'Neill

Robert O'Neill has been a consultant and a Microsoft Certified Trainer for Quality Training Services since 1996. He has worked with Fortune 1000 companies and training companies throughout the United States and the Caribbean. Robert holds numerous certifications including MCT, MCAD, MCTS, MCITP, EA, and MCPD. His expertise focuses on Windows Server 2008, Windows 7, Windows SharePoint, Visual Studio .NET, and CompTIA.

Video Runtime

123 Minutes

Time to complete

163 Minutes

Course Outline

Module 5

Enterprise Group Policy (30:25)

  • Introduction (00:49)
  • Policy for Multiple Domains (03:21)
  • Plan GPO Hierarchy (02:56)
  • Planning for Device Control (01:16)
  • GPO settings Device Control (01:48)
  • Authentication - Authorization (01:13)
  • Password Authentication (02:11)
  • Fine Grained Password Policies (04:28)
  • PSO Precedence Rules (01:51)
  • msDS-ResultantPSO (00:54)
  • Smart Card Authentication (01:26)
  • Demo: Fine Grained Policy (07:32)
  • Summary (00:33)

Branch Office Deployments (21:21)

  • Introduction (00:39)
  • Remote Location Administration (01:20)
  • Branch Administration (01:32)
  • Branch Office Components (01:02)
  • Deploying OS at Branch Office (00:41)
  • Hands on vs. Automated (01:04)
  • Automated Deployment (01:31)
  • Servers in the Branch Office (03:13)
  • Windows Server Core (01:32)
  • What Makes a Site a Site (02:30)
  • Domain Controller at a Branch (02:34)
  • What Type Domain Controller (01:13)
  • RODC Features (01:56)
  • Summary (00:27)

Office Deployments Continued (16:13)

  • Introduction (00:37)
  • Global Catalog (02:06)
  • Universal Group Caching (00:50)
  • Catalog in the Branch Office (00:50)
  • Master of Operations (00:50)
  • Relative ID Master (00:21)
  • Operations Masters (01:01)
  • DNS in the Branch Office (02:25)
  • DFS in Branch Offices (01:36)
  • RRAS in Branch Offices (01:24)
  • Hyper-V in Branch Offices (00:44)
  • Branch to Main Communication (00:40)
  • Securing Traffic (01:01)
  • Caching Data at Branch Office (01:11)
  • Summary (00:29)
Module 6

Branch Office Security (16:58)

  • Introduction (00:34)
  • Server Security (01:31)
  • Hardening Servers (01:59)
  • Branch Office Servers (00:30)
  • RODC Install Process (00:34)
  • Install RODC (01:41)
  • RODC Authentication (01:00)
  • Replication Policy Component (00:57)
  • Securing Branch Office Data (01:13)
  • Demo: Read only DNC (06:19)
  • Summary (00:35)

Designing Network Access (15:33)

  • Introduction (00:44)
  • Perimeter Network Design (00:39)
  • Network with 3 leg Firewall (00:43)
  • Network with Two Firewalls (01:14)
  • Which Design to Use (01:09)
  • Perimeter Network Security (01:02)
  • Network Address Translation (00:53)
  • Stateful Packet Inspection (00:54)
  • Proxy Server (00:47)
  • Application Layer Firewalls (01:21)
  • Forefront TMG (00:39)
  • Forefront TMG 3 leg Firewall (00:34)
  • Forefront TMG in back to back (00:48)
  • Forefront TMG Features (00:31)
  • Deploying Services (00:47)
  • Deploying Web Services (02:18)
  • Summary (00:20)

Designing Remote Access (22:45)

  • Introduction (00:32)
  • Remote Access (00:50)
  • PPT Protocol (01:02)
  • VPN Access (00:36)
  • PPTP (00:46)
  • L2TP (02:08)
  • SSTP (00:54)
  • IPSec Tunnel Mode (01:40)
  • DirectAccess (00:58)
  • DirectAccess Configuration (00:59)
  • DirectAccess Works (00:32)
  • VPN Authentication (01:04)
  • Which to Use (01:27)
  • Securing VPN Server Deployment (01:02)
  • Using RADIUS for Remote Access (00:52)
  • Network Policy Server (01:24)
  • Locating RADIUS Services (01:04)
  • Multiple Domain Authentication (01:10)
  • Medium Size Company Example (01:07)
  • Considerations (02:05)
  • Summary (00:23)
;