- Friday
- April 26th, 2024
- Ajouter un cours
........ What Is Network Access Protection? • Enforce health-requirement policies on client computers • Ensure client computers are compliant with policies • Offer remediation support for computers that do not meet health requirements Network Access Protection cannot: • Prevent authorized...
........... Introduction • Name • Company affiliation • Title/function • Job responsibility • Active Directory experience • TCP/IP networking experience • Windows Server 2003 and Windows Server 2008 experience • Operating system deployment experience • Your expectations for the course...
.......... Establishing a Communication Plan Frequency • Do you communicate planned changes in a batch on a set schedule or do you only communicate proposed changes when they are approved? Audience • Are your change plans communicated to the entire business or are they...
......... Module 6: Planning for the Application Server Role • Determining Application Server Role Requirements • Overview of the Application Server Role Components • Supporting the .NET Framework Scenarios That Require the Application Server Role Hosting custom applications by using...
........ Characteristics of a Defense in Depth Strategy A robust defense-in-depth strategy includes: A security risk management framework Identity and access management policies Network protection Update management Education Incident response Continual reassessment and optimization Layers in a Defense-in-Depth Strategy Policies...
......... Network Load Balancing Features of Network Load Balancing Distributes traffic across two or more nodes Uses standard hardware Improves scalability Does not synchronize nodes Improvements in Network Load Balancing for Windows Server 2008 Networking Security Installation and management Troubleshooting...
........ Lesson: Identifying Hardware Support Issues • Troubleshooting Tools • Evaluating Hardware Devices • Determining Driver Status Troubleshooting Tools • Windows Server 2008 tools - Event Viewer - WRPM - Device Manager - WMI scripting • Hardware vendor tools •...
........ Lesson: Planning Monitoring Tasks • Reasons for Monitoring • Monitoring Methods • Planning for Event Monitoring Reasons for Monitoring • Health of the IT infrastructure: - Normal activity - Abnormal activity • Service-level agreement monitoring • Planning for future...
.......... Lab A: Deploying Active Directory Domain Services • Exercise 1: Installing a Read-only Domain Controller (RODC) onto Server Core, and Creating a Branch Office Site • Exercise 2: Creating a Domain in a Separate Tree and Separate Site Logon...