Windows Server 2008: Enterprise Administrator, Part 4 of 5
Interactive

Windows Server 2008: Enterprise Administrator, Part 4 of 5

LearnNow Online
Updated Oct 26, 2018

Course description

When building a Windows Server 2008 Enterprise network there are many other aspects that need to be considered above building a single network. The Enterprise network may span several floors, buildings and miles. This course will show planning the DNS and IP addressing. From there the course will cover Designing Active Directory Domain Services and its physical requirements. The course will then cover Windows Server 2008 installation, upgrading, migration and administration. Next the course moves to the deployment to branch offices, setting up systems, security, client and remote access. Virtualization of servers is covered next and how that can create efficiencies with hardware. Then the course moves into data availability planning covering sharing, security, backups and restores. The last section covers designing software update infrastructure and managing compliance.

Each LearnNowOnline training course is made up of Modules (typically an hour in length). Within each module there are Topics (typically 15-30 minutes each) and Subtopics (typically 2-5 minutes each). There is a Post Exam for each Module that must be passed with a score of 70% or higher to successfully and fully complete the course.


Prerequisites

Students should have knowledge of network systems and Microsoft server operating systems.


Meet the expert

Robert O'Neill

Robert O'Neill has been a consultant and a Microsoft Certified Trainer for Quality Training Services since 1996. He has worked with Fortune 1000 companies and training companies throughout the United States and the Caribbean. Robert holds numerous certifications including MCT, MCAD, MCTS, MCITP, EA, and MCPD. His expertise focuses on Windows Server 2008, Windows 7, Windows SharePoint, Visual Studio .NET, and CompTIA.

Video Runtime

129 Minutes

Time to complete

169 Minutes

Course Outline

Module 7

Designing Network Access (24:33)

  • Introduction (00:39)
  • Network Access Protection (01:27)
  • Example of Network Access (01:18)
  • Scenarios (01:04)
  • NAP Enforcement Types (00:20)
  • What NAP does and does NOT (01:14)
  • IPSec Enforcement (01:19)
  • IPSec Security Zones (01:20)
  • Small Environment IPSec (00:33)
  • Large Environment IPSec (01:12)
  • PKI infrastructure for IPSec (01:19)
  • Deploying Third Party NAP (01:19)
  • NAP VPN Enforcement (00:58)
  • After PPP Authentication (00:39)
  • VPN Authentication Protocols (00:39)
  • Certificate Hierarchy (00:58)
  • VPN Enforcement Consideration (01:05)
  • NAP 802.1x Enforcement (00:47)
  • 802.1x Considerations (00:43)
  • ACL or VLAN (00:41)
  • Authentication Consideration (00:40)
  • NAP DHCP Enforcement (01:22)
  • Domain vs. Server Isolation (00:25)
  • Comparison with IPSec (00:34)
  • Migration Considerations (00:32)
  • Which NAP Method (00:56)
  • Summary (00:17)

Remote Desktop Services (31:55)

  • Introduction (00:35)
  • Terminal Server (05:56)
  • Components of Remote Services (00:44)
  • Deploying License Servers (01:39)
  • Terminal Licensing Concerns (02:07)
  • Per Device CAL (01:26)
  • License Server Maintenance (01:05)
  • Deployment Considerations (01:26)
  • Remote Desktop Web Access (01:12)
  • Web Access - Server 2008 R2 (00:29)
  • Using Remote Apps (00:48)
  • New Features for Server 08 R2 (01:21)
  • Connection Broker Service (01:14)
  • Migrating to Connection Broker (00:40)
  • Managing Session Host Farms (00:54)
  • Remote Desktop Gateway (02:34)
  • Authorization Policies (01:27)
  • Configuring Secure Gateway (00:55)
  • Ports needed by RD Gateway (01:01)
  • Virtualization Host Servers (01:14)
  • RemoteFX (00:43)
  • Remote Desktop Scenario (01:56)
  • Summary (00:18)
Module 8

Application Deployment (22:05)

  • Introduction (00:30)
  • Deploying Software or Apps (00:45)
  • Group Policy Software Install (03:41)
  • Which method to use? (02:22)
  • Deployment using Group Policy (01:06)
  • Application Maintenance (01:57)
  • Considerations (05:02)
  • System Center Essentials 2010 (01:26)
  • SCCM 2007 (02:37)
  • Software deployment with SCCM (00:28)
  • Scenarios (01:42)
  • Summary (00:24)

Virtualization Planning (26:33)

  • Introduction (00:38)
  • Why use Virtualization (01:24)
  • Multiple hosted OS (01:52)
  • Hyper-V (07:18)
  • Installation requirements (00:48)
  • Hyper-V Installation (01:31)
  • Guest Operating Systems (00:52)
  • When to use Hyper-V (01:00)
  • Deploying Guest OS (01:54)
  • Planning Storage Requirements (00:59)
  • Planning Memory Requirements (00:51)
  • Processor Requirements (01:56)
  • Network Requirements (02:51)
  • Drive Considerations (02:11)
  • Summary (00:20)

Deploying Virtualization (24:28)

  • Introduction (00:40)
  • Installing the guest OS (00:33)
  • Hyper-V Manager (01:01)
  • Snapshots (00:40)
  • When to use Hyper-V (02:13)
  • Server Consolidation (00:56)
  • Virtual Machine Manager (06:33)
  • Application Virtualization (01:23)
  • When to deploy App-V (03:03)
  • App-V Deployment (04:50)
  • Questions (02:06)
  • Summary (00:24)
;