Windows Server 2008: Enterprise Administrator, Part 5 of 5
Interactive

Windows Server 2008: Enterprise Administrator, Part 5 of 5

LearnNow Online
Updated Oct 26, 2018

Course description

When building a Windows Server 2008 Enterprise network there are many other aspects that need to be considered above building a single network. The Enterprise network may span several floors, buildings and miles. This course will show planning the DNS and IP addressing. From there the course will cover Designing Active Directory Domain Services and its physical requirements. The course will then cover Windows Server 2008 installation, upgrading, migration and administration. Next the course moves to the deployment to branch offices, setting up systems, security, client and remote access. Virtualization of servers is covered next and how that can create efficiencies with hardware. Then the course moves into data availability planning covering sharing, security, backups and restores. The last section covers designing software update infrastructure and managing compliance.

Each LearnNowOnline training course is made up of Modules (typically an hour in length). Within each module there are Topics (typically 15-30 minutes each) and Subtopics (typically 2-5 minutes each). There is a Post Exam for each Module that must be passed with a score of 70% or higher to successfully and fully complete the course.


Prerequisites

Students should have knowledge of network systems and Microsoft server operating systems.


Meet the expert

Robert O'Neill

Robert O'Neill has been a consultant and a Microsoft Certified Trainer for Quality Training Services since 1996. He has worked with Fortune 1000 companies and training companies throughout the United States and the Caribbean. Robert holds numerous certifications including MCT, MCAD, MCTS, MCITP, EA, and MCPD. His expertise focuses on Windows Server 2008, Windows 7, Windows SharePoint, Visual Studio .NET, and CompTIA.

Video Runtime

156 Minutes

Time to complete

196 Minutes

Course Outline

Module 9

Planning Data Sharing DFS (23:46)

  • Introduction (00:29)
  • Data Sharing with DFS (00:35)
  • New for Server 2008 R2 (01:33)
  • Namespace Type (03:21)
  • Folder Targets (02:01)
  • DFS Replication (01:10)
  • DFS Configuration (01:26)
  • Failover and Failback (00:57)
  • Setting Target Priority (01:59)
  • DFS Replication (01:05)
  • Requirements for DFS-R (01:37)
  • Replication Process (04:28)
  • Designing DFS (02:37)
  • Summary (00:22)

Data Sharing SharePoint (13:06)

  • Introduction (00:38)
  • What is SharePoint (00:25)
  • SharePoint Considerations (02:22)
  • SharePoint Services 3.0 (02:33)
  • SharePoint Configuration (01:06)
  • SharePoint Server 2007 (03:11)
  • When would you use SP (02:25)
  • Summary (00:22)

Planning Data Security (22:56)

  • Introduction (00:32)
  • BitLocker Drive Encryption (04:12)
  • Encrypted File System - EFS (02:27)
  • EFS Best Practices (02:46)
  • Rights Management Services (02:39)
  • What is needed to deploy RMS (01:57)
  • Server 2008 Security Features (01:03)
  • ACL Document Example (02:44)
  • Certificates and Licenses (01:10)
  • Deployment Considerations (02:09)
  • Apps that use AD RMS now (00:43)
  • Summary (00:29)

Data Security Backups (19:20)

  • Introduction (00:32)
  • System State Backup (00:46)
  • Domain Controller Recovery (02:19)
  • When to Backup (01:32)
  • Where to Backup (01:34)
  • Restore Options (03:25)
  • Non-Authoritative Restore (01:30)
  • Authoritative Restore (00:47)
  • Domain Services Maintenance (00:38)
  • What if an OM DC fails (02:58)
  • Infrastrusture Master (00:30)
  • PDC Emulator (00:51)
  • Now the Reality (01:13)
  • Summary (00:37)
Module 10

Data Security Availability (14:16)

  • Introduction (00:34)
  • Network Load Balancing (NLB) (03:39)
  • Clustering Servers (02:33)
  • Cluster Server Components (01:04)
  • Cluster Server Hardware (01:46)
  • iSCSI (01:12)
  • Network Infrastructure (00:47)
  • Cluster Server Uses (02:22)
  • Summary (00:15)

Public Key Infrastructure (19:19)

  • Introduction (00:33)
  • What is it (01:25)
  • Certificate Services (02:02)
  • Applications of PKI (02:17)
  • Who Needs Certificates (00:57)
  • CA Hierarchy Installation (01:33)
  • Business needs assessment (01:31)
  • Active Directory Requirements (01:36)
  • Certificate Templates (02:08)
  • Infrastructure Planning (00:44)
  • Types of CA (00:27)
  • How Many Certificate Servers (03:29)
  • Summary (00:32)

Enrolling for Certificates (19:08)

  • Introduction (00:35)
  • Enrolling for Certificates (01:49)
  • To use Web enrollment (01:13)
  • Manual Certificate Enrollment (01:04)
  • Renewing a Certificate (00:59)
  • Manual or Automatic Approvals (00:38)
  • Renewal Considerations (00:50)
  • CA Certificate Renewal (01:45)
  • Certificate is no longer valid (01:21)
  • Certificate Revocation List (02:49)
  • Publishing the CRL (00:43)
  • CRL Issues (00:44)
  • CRL vs. Online Responder (01:46)
  • CRL published to LDAP issues (02:09)
  • Summary (00:36)

Designing Software Updates (12:13)

  • Introduction (00:35)
  • Keeping Systems up to Date (01:09)
  • WSUS (01:04)
  • WSUS installs as a Role (03:26)
  • Test Updates (01:58)
  • Managing Computers (00:57)
  • Update Installation Policy (02:42)
  • Summary (00:18)

Designing Compliance (12:48)

  • Introduction (00:30)
  • System Center Essentials 2010 (01:16)
  • System Center Configuartion (00:49)
  • SCCM Deployment (01:12)
  • Software deployment with SCCM (00:39)
  • Reporting with SCCM (01:08)
  • Compliance (00:43)
  • Server Update Reporting (01:54)
  • Security Baselines (02:53)
  • Role based Security Policies (01:06)
  • Summary (00:34)
;