| About This Book |
|
xxxi | |
| Intended Audience |
|
xxxi | |
| Prerequisites |
|
xxxii | |
| About the CD ROM |
|
xxxii | |
| Features of This Book |
|
xxxiii | |
|
Part 1: Learn at Your Own Pace |
|
|
xxxiii | |
|
Part 2: Prepare for the Exam |
|
|
xxxiv | |
|
|
|
xxxiv | |
|
|
|
xxxv | |
|
|
|
xxxv | |
| Getting Started |
|
xxxvi | |
|
|
|
xxxvi | |
|
|
|
xxxvi | |
|
|
|
xxxvii | |
| The Microsoft Certified Professional Program |
|
xl | |
|
|
|
xl | |
|
Requirements for Becoming a Microsoft Certified Professional |
|
|
xli | |
| Technical Support |
|
xlii | |
| Evaluation Edition Software Support |
|
xliii | |
| Part 1 Learn at Your Own Pace |
|
|
1 Introduction to Active Directory |
|
|
|
|
|
1-3 | (1) |
|
|
|
1-3 | (1) |
|
Lesson 1: Active Directory Overview |
|
|
1-4 | (1) |
|
Understanding Directory Services |
|
|
1-4 | (1) |
|
Why Have a Directory Service? |
|
|
1-5 | (1) |
|
The Windows Server 2003 Directory Service |
|
|
1-5 | (1) |
|
|
|
1-8 | (1) |
|
Active Directory Components |
|
|
1-10 | (1) |
|
Catalog Services-The Global Catalog |
|
|
1-17 | (1) |
|
|
|
1-19 | (1) |
|
|
|
1-20 | (1) |
|
Lesson 2: Understanding Active Directory Concepts and Administration Tasks 1-21 |
|
|
|
|
|
1-21 | (1) |
|
|
|
1-25 | (1) |
|
Change and Configuration Management |
|
|
1-28 | (1) |
|
|
|
1-29 | (1) |
|
|
|
1-31 | (1) |
|
|
|
1-31 | (1) |
|
Active Directory Administration Tasks |
|
|
1-33 | (1) |
|
|
|
1-34 | (1) |
|
|
|
1-35 | (1) |
|
Lesson 3: Planning the Active Directory Infrastructure Design |
|
|
1-36 | (1) |
|
What Is an Active Directory Infrastructure Design? |
|
|
1-36 | (1) |
|
|
|
1-37 | (1) |
|
|
|
1-38 | (1) |
|
|
|
1-41 | (1) |
|
|
|
1-42 | (1) |
|
|
|
1-43 | (1) |
|
|
|
1-43 | (1) |
|
|
|
1-43 | (1) |
|
|
|
1-44 | (1) |
|
|
|
1-45 | (1) |
|
2 Installing and Configuring Active Directory |
|
|
|
|
|
2-1 | (1) |
|
|
|
2-2 | (1) |
|
Lesson 1: Preparing for Active Directory Installation |
|
|
2-3 | (1) |
|
Active Directory Installation Prerequisites |
|
|
2-3 | (1) |
|
Determining the Domain Structure |
|
|
2-3 | (1) |
|
Determining the Domain Name |
|
|
2-9 | (1) |
|
Determining the Storage Location of the Database and Log Files |
|
|
2-11 | (1) |
|
Determining the Location of the Shared System Volume Folder |
|
|
2-11 | (1) |
|
Determining the DNS Configuration Method |
|
|
2-11 | (1) |
|
Determining the DNS Configuration |
|
|
2-12 | (1) |
|
Practice: Configuring a Static IP Address and Preferred DNS Server |
|
|
2-14 | (1) |
|
|
|
2-15 | (1) |
|
|
|
2-16 | (1) |
|
Lesson 2: Installing and Removing Active Directory |
|
|
2-17 | (1) |
|
Installing Active Directory |
|
|
2-17 | (1) |
|
Removing Active Directory Services from a Domain Controller |
|
|
2-30 | (1) |
|
Practice: Installing and Removing Active Directory |
|
|
2-31 | (1) |
|
Practice: Fixing a DNS Configuration and Installing Active Directory |
|
|
2-33 | (1) |
|
|
|
2-35 | (1) |
|
|
|
2-36 | (1) |
|
Lesson 3: Verifying Active Directory Installation |
|
|
2-37 | (1) |
|
Verifying an Active Directory Installation |
|
|
2-37 | (1) |
|
Practice: Verifying Active Directory Installation |
|
|
2-41 | (1) |
|
|
|
2-42 | (1) |
|
|
|
2-42 | (1) |
|
Lesson 4: Troubleshooting Active Directory Installation and Removal |
|
|
2-43 | (1) |
|
Troubleshooting Active Directory Installation |
|
|
2-43 | (1) |
|
Troubleshooting Scenarios |
|
|
2-51 | (1) |
|
Practice: Using Active Directory Installation Troubleshooting Tools |
|
|
2-52 | (1) |
|
|
|
2-53 | (1) |
|
|
|
2-54 | (1) |
|
|
|
2-54 | (1) |
|
|
|
2-56 | (1) |
|
|
|
2-59 | (1) |
|
|
|
2-60 | (1) |
|
|
|
2-60 | (1) |
|
|
|
2-60 | (1) |
|
|
|
2-61 | (1) |
|
3 Administering Active Directory |
|
|
|
|
|
3-1 | (1) |
|
|
|
3-2 | (1) |
|
Lesson 1: Using Active Directory Administration Tools |
|
|
3-3 | (1) |
|
Active Directory Administration Tools |
|
|
3-3 | (1) |
|
Practice: Viewing Active Directory Administration Tools |
|
|
3-13 | (1) |
|
|
|
3-15 | (1) |
|
|
|
3-16 | (1) |
|
Lesson 2: Customizing MMCs |
|
|
3-17 | (1) |
|
|
|
3-17 | (1) |
|
Using MMCs for Remote Administration |
|
|
3-21 | (1) |
|
|
|
3-22 | (1) |
|
|
|
3-24 | (1) |
|
Practice: Customizing an MMC |
|
|
3-26 | (1) |
|
|
|
3-27 | (1) |
|
|
|
3-28 | (1) |
|
Lesson 3: Backing Up Active Directory |
|
|
3-29 | (1) |
|
|
|
3-29 | (1) |
|
Creating an Active Directory Backup |
|
|
3-29 | (1) |
|
Scheduling Active Directory Backup Operations |
|
|
3-36 | (1) |
|
Deleting Scheduled Active Directory Backup Operations |
|
|
3-39 | (1) |
|
Practice: Backing Up Active Directory |
|
|
3-41 | (1) |
|
|
|
3-42 | (1) |
|
|
|
3-43 | (1) |
|
Lesson 4: Restoring Active Directory |
|
|
3-44 | (1) |
|
Restoring Active Directory |
|
|
3-44 | (1) |
|
Preliminary Restore Tasks |
|
|
3-45 | (1) |
|
Performing a Nonauthoritative Restore |
|
|
3-46 | (1) |
|
Specifying Advanced Restore Settings for a Nonauthoritative Restore |
|
|
3-48 | (1) |
|
Performing an Authoritative Restore |
|
|
3-50 | (1) |
|
Practice: Restoring Active Directory |
|
|
3-53 | (1) |
|
|
|
3-53 | (1) |
|
|
|
3-54 | (1) |
|
|
|
3-55 | (1) |
|
|
|
3-56 | (1) |
|
|
|
3-59 | (1) |
|
|
|
3-60 | (1) |
|
|
|
3-60 | (1) |
|
|
|
3-61 | (1) |
|
|
|
3-62 | (1) |
|
4 Installing and Managing Domains, Trees, and Forests |
|
|
|
|
|
4-1 | (1) |
|
|
|
4-2 | (1) |
|
Lesson 1: Creating Multiple Domains, Trees, and Forests |
|
|
4-3 | (1) |
|
Creating Multiple Domains |
|
|
4-3 | (1) |
|
Creating Additional Domains |
|
|
4-6 | (1) |
|
|
|
4-9 | (1) |
|
Creating Additional Trees |
|
|
4-11 | (1) |
|
Creating Multiple Forests |
|
|
4-13 | (1) |
|
Creating Additional Forests |
|
|
4-15 | (1) |
|
Practice: Creating a Child Domain |
|
|
4-17 | (1) |
|
|
|
4-17 | (1) |
|
|
|
4-18 | (1) |
|
Lesson 2: Renaming and Restructuring Domains and Renaming Domain Controllers |
|
|
4-19 | (1) |
|
Renaming and Restructuring Domains |
|
|
4-19 | (1) |
|
Renaming a Domain Controller |
|
|
4-20 | (1) |
|
Practice: Renaming a Domain Controller |
|
|
4-22 | (1) |
|
|
|
4-23 | (1) |
|
|
|
4-23 | (1) |
|
Lesson 3: Managing Operations Master Roles |
|
|
4-24 | (1) |
|
|
|
4-24 | (1) |
|
Forest-Wide Operations Master Roles |
|
|
4-24 | (1) |
|
Domain-Wide Operations Master Roles |
|
|
4-25 | (1) |
|
Managing Operations Master Roles |
|
|
4-27 | (1) |
|
Planning Operations Master Location |
|
|
4-29 | (1) |
|
Viewing Operations Master Role Assignments |
|
|
4-31 | (1) |
|
Transferring an Operations Master Role Assignment |
|
|
4-32 | (1) |
|
Seizing an Operations Master Role Assignment |
|
|
4-35 | (1) |
|
Practice: Viewing and Transferring Operations Master Role Assignments |
|
|
4-38 | (1) |
|
Lesson Review Lesson Summary |
|
|
4-40 | (1) |
|
Lesson 4: Managing Trust Relationships |
|
|
4-41 | (1) |
|
|
|
4-41 | (1) |
|
Planning Trust Relationships |
|
|
4-43 | (1) |
|
Creating Trust Relationships |
|
|
4-49 | (1) |
|
Practice: Managing Trust Relationships |
|
|
4-70 | (1) |
|
|
|
4-71 | (1) |
|
|
|
4-72 | (1) |
|
|
|
4-72 | (1) |
|
|
|
4-74 | (1) |
|
|
|
4-75 | (1) |
|
|
|
4-76 | (1) |
|
|
|
4-76 | (1) |
|
|
|
4-78 | (1) |
|
|
|
4-78 | (1) |
|
5 Configuring Sites and Managing Replication |
|
|
|
|
|
5-1 | (1) |
|
|
|
5-2 | (1) |
|
Lesson 1: Understanding Sites and Replication |
|
|
5-3 | (1) |
|
|
|
5-3 | (1) |
|
Understanding Replication |
|
|
5-4 | (1) |
|
|
|
5-9 | (1) |
|
|
|
5-10 | (1) |
|
Lesson 2: Configuring Sites |
|
|
5-11 | (1) |
|
|
|
5-11 | (1) |
|
|
|
5-12 | (1) |
|
|
|
5-15 | (1) |
|
Creating, Moving, and Removing Domain Controller Objects in a Site |
|
|
5-17 | (1) |
|
Designating a Site License Server |
|
|
5-19 | (1) |
|
Practice: Configuring Sites |
|
|
5-21 | (1) |
|
|
|
5-23 | (1) |
|
|
|
5-24 | (1) |
|
Lesson 3: Configuring Intersite Replication |
|
|
5-25 | (1) |
|
Configuring Intersite Replication |
|
|
5-25 | (1) |
|
|
|
5-25 | (1) |
|
Configuring Site Link Attributes |
|
|
5-28 | (1) |
|
Designating a Preferred Bridgehead Server |
|
|
5-31 | (1) |
|
Creating Site Link Bridges |
|
|
5-33 | (1) |
|
Creating and Configuring Connection Objects |
|
|
5-35 | (1) |
|
Practice: Configuring Intersite Replication |
|
|
5-38 | (1) |
|
|
|
5-39 | (1) |
|
|
|
5-40 | (1) |
|
Lesson 4: Configuring Global Catalog Servers |
|
|
5-41 | (1) |
|
Understanding Global Catalog Servers |
|
|
5-41 | (1) |
|
Creating or Removing Global Catalog |
|
|
5-44 | (1) |
|
Enabling the Universal Group Membership Caching Feature |
|
|
5-45 | (1) |
|
|
|
5-46 | (1) |
|
|
|
5-47 | (1) |
|
Lesson 5: Configuring Application Directory Partitions |
|
|
5-48 | (1) |
|
Application Directory Partitions |
|
|
5-48 | (1) |
|
Application Directory Partition Replication |
|
|
5-49 | (1) |
|
Application Directory Partitions and Domain Controller Demotion |
|
|
5-50 | (1) |
|
Security Descriptor Reference Domain |
|
|
5-51 | (1) |
|
Managing Application Directory Partitions |
|
|
5-52 | (1) |
|
|
|
5-57 | (1) |
|
|
|
5-58 | (1) |
|
Lesson 6: Monitoring and Troubleshooting Replication |
|
|
5-59 | (1) |
|
Monitoring and Troubleshooting Replication |
|
|
5-59 | (1) |
|
Troubleshooting Active Directory Replication |
|
|
5-66 | (1) |
|
Practice: Monitoring and Troubleshooting Active Directory Replication |
|
|
5-69 | (1) |
|
|
|
5-71 | (1) |
|
|
|
5-72 | (1) |
|
|
|
5-73 | (1) |
|
|
|
5-74 | (1) |
|
|
|
5-76 | (1) |
|
|
|
5-77 | (1) |
|
|
|
5-77 | (1) |
|
|
|
5-78 | (1) |
|
|
|
5-79 | (1) |
|
6 Implementing an OU Structure |
|
|
|
|
|
6-1 | (1) |
|
|
|
6-2 | (1) |
|
Lesson 1: Understanding OUs |
|
|
6-3 | (1) |
|
|
|
6-3 | (1) |
|
Defining OUs to Delegate Administration |
|
|
6-3 | (1) |
|
Defining OUs to Administer Group Policy |
|
|
6-7 | (1) |
|
Defining OUs to Hide Objects |
|
|
6-7 | (1) |
|
|
|
6-8 | (1) |
|
|
|
6-9 | (1) |
|
|
|
6-10 | (1) |
|
Lesson 2: Creating an OU Structure |
|
|
6-11 | (1) |
|
|
|
6-11 | (1) |
|
Creating OUs to Hide Objects |
|
|
6-12 | (1) |
|
|
|
6-13 | (1) |
|
|
|
6-15 | (1) |
|
|
|
6-15 | (1) |
|
Lesson 3: Administering OUs |
|
|
6-16 | (1) |
|
|
|
6-16 | (1) |
|
Practice: Administering OUs |
|
|
6-22 | (1) |
|
|
|
6-23 | (1) |
|
|
|
6-24 | (1) |
|
|
|
6-24 | (1) |
|
|
|
6-26 | (1) |
|
|
|
6-28 | (1) |
|
|
|
6-28 | (1) |
|
|
|
6-69 | (1) |
|
|
|
6-29 | (1) |
|
|
|
6-30 | (1) |
|
7 Administering User Accounts |
|
|
|
|
|
7-1 | (1) |
|
|
|
7-2 | (1) |
|
Lesson 1: Understanding User Accounts |
|
|
7-3 | (1) |
|
Understanding User Accounts |
|
|
7-3 | (1) |
|
|
|
7-4 | (1) |
|
|
|
7-4 | (1) |
|
|
|
7-5 | (1) |
|
Domain User Account Naming Conventions |
|
|
7-6 | (1) |
|
Password Requirements and Guidelines |
|
|
7-7 | (1) |
|
|
|
7-9 | (1) |
|
|
|
7-11 | (1) |
|
|
|
7-12 | (1) |
|
Lesson 2: Creating User Accounts |
|
|
7-13 | (1) |
|
Creating Domain User Accounts |
|
|
7-13 | (1) |
|
Modifying Domain User Account Properties |
|
|
7-17 | (1) |
|
Practice: Creating, Modifying, and Verifying Domain User Accounts |
|
|
7-22 | (1) |
|
|
|
7-25 | (1) |
|
|
|
7-26 | (1) |
|
Lesson 3: Managing User Profiles and Home Folders |
|
|
7-27 | (1) |
|
Understanding User Profiles |
|
|
7-27 | (1) |
|
|
|
7-29 | (1) |
|
User Profiles Settings in Group Policy |
|
|
7-31 | (1) |
|
|
|
7-31 | (1) |
|
Practice: Managing User Profiles |
|
|
7-37 | (1) |
|
Best Practices for User Profiles |
|
|
7-39 | (1) |
|
|
|
7-39 | (1) |
|
Creating Home Folders on a Server |
|
|
7-40 | (1) |
|
Practice: Managing Home Folders |
|
|
7-41 | (1) |
|
|
|
7-42 | (1) |
|
|
|
7-43 | (1) |
|
Lesson 4: Maintaining User Accounts |
|
|
7-44 | (1) |
|
Renaming, Disabling, Enabling, and Deleting User Accounts |
|
|
7-44 | (1) |
|
Unlocking User Accounts and Resetting Passwords |
|
|
7-45 | (1) |
|
Practice: Administering User Accounts |
|
|
7-46 | (1) |
|
|
|
7-48 | (1) |
|
|
|
7-48 | (1) |
|
|
|
7-49 | (1) |
|
|
|
7-50 | (1) |
|
|
|
7-52 | (1) |
|
|
|
7-52 | (1) |
|
|
|
7-53 | (1) |
|
|
|
7-53 | (1) |
|
|
|
7-54 | (1) |
|
|
|
|
|
|
8-1 | (1) |
|
|
|
8-1 | (1) |
|
Lesson 1: Understanding Groups |
|
|
8-3 | (1) |
|
|
|
8-3 | (1) |
|
|
|
8-4 | (1) |
|
|
|
8-4 | (1) |
|
|
|
8-6 | (1) |
|
|
|
8-7 | (1) |
|
|
|
8-8 | (1) |
|
|
|
8-9 | (1) |
|
|
|
8-15 | (1) |
|
Practice: Planning New Group Accounts |
|
|
8-17 | (1) |
|
Group Accounts Planning Worksheet |
|
|
8-19 | (1) |
|
Group Accounts Planning Worksheet (Answers) |
|
|
8-20 | (1) |
|
|
|
8-21 | (1) |
|
|
|
8-22 | (1) |
|
Lesson 2: Creating and Administering Groups |
|
|
8-23 | (1) |
|
|
|
8-23 | (1) |
|
|
|
8-24 | (1) |
|
Adding Members to a Group |
|
|
8-25 | (1) |
|
|
|
8-26 | (1) |
|
Practice: Creating and Administering Groups |
|
|
8-27 | (1) |
|
|
|
8-28 | (1) |
|
|
|
8-29 | (1) |
|
Lesson 3: Administration Strategies |
|
|
8-30 | (1) |
|
Why You Should Not Run Your Computer as an Administrator |
|
|
8-30 | (1) |
|
|
|
8-30 | (1) |
|
Practice: Using Run As to Start a Program as an Administrator |
|
|
8-33 | (1) |
|
|
|
|
|
|
8-34 | (1) |
|
|
|
8-35 | (1) |
|
|
|
8-37 | (1) |
|
|
|
8-38 | (1) |
|
|
|
8-39 | (1) |
|
|
|
8-39 | (1) |
|
|
|
8-39 | (1) |
|
|
|
8-41 | (1) |
|
9 Administering Active Directory Objects |
|
|
|
|
|
9-1 | (1) |
|
|
|
9-1 | (1) |
|
Lesson 1: Locating Active Directory Objects |
|
|
9-3 | (1) |
|
Locating Active Directory Objects |
|
|
9-3 | (1) |
|
|
|
9-8 | (1) |
|
Practice: Locating Objects in Active Directory |
|
|
9-10 | (1) |
|
|
|
9-12 | (1) |
|
|
|
9-13 | (1) |
|
Lesson 2: Controlling Access to Active Directory Objects |
|
|
9-14 | (1) |
|
Understanding Access Control |
|
|
9-14 | (1) |
|
Assigning Standard Permissions |
|
|
9-22 | (1) |
|
Administering Special Permissions |
|
|
9-22 | (1) |
|
Setting Inheritance for a Permission |
|
|
9-23 | (1) |
|
Changing Inherited Permissions |
|
|
9-26 | (1) |
|
|
|
9-26 | (1) |
|
Removing Security Principals and Their Permissions |
|
|
9-28 | (1) |
|
Removing Special Permissions |
|
|
9-28 | (1) |
|
Transferring Object Ownership |
|
|
9-29 | (1) |
|
Practice: Controlling Access to Active Directory Objects |
|
|
9-30 | (1) |
|
|
|
9-32 | (1) |
|
|
|
9-33 | (1) |
|
Lesson 3: Delegating Administrative Control of Active Directory Objects |
|
|
9-34 | (1) |
|
Delegating Administrative Control |
|
|
9-34 | (1) |
|
|
|
9-39 | (1) |
|
|
|
9-39 | (1) |
|
|
|
9-40 | (1) |
|
|
|
9-41 | (1) |
|
|
|
9-43 | (1) |
|
|
|
9-44 | (1) |
|
|
|
9-44 | (1) |
|
|
|
9-45 | (1) |
|
|
|
9-46 | (1) |
|
10 Implementing Group Policy |
|
|
|
|
|
10-1 | (1) |
|
|
|
10-2 | (1) |
|
Lesson 1: Understanding Group Policy |
|
|
10-3 | (1) |
|
Understanding Group Policies |
|
|
10-3 | (1) |
|
|
|
10-4 | (1) |
|
|
|
10-8 | (1) |
|
|
|
10-13 | (1) |
|
How Group Policy Affects Startup and Logging On |
|
|
10-15 | (1) |
|
How Group Policy Is Applied |
|
|
10-16 | (1) |
|
Using Security Groups to Filter GPO Scope |
|
|
10-20 | (1) |
|
Using WMI Queries to Filter GPO Scope |
|
|
10-20 | (1) |
|
Delegating Control of GPOs |
|
|
10-21 | (1) |
|
Resultant Set of Policy (RSOP) |
|
|
10-21 | (1) |
|
|
|
10-21 | (1) |
|
|
|
10-22 | (1) |
|
Lesson 2: Group Policy Planning Strategies |
|
|
10-23 | (1) |
|
Group Policy Planning Strategies |
|
|
10-23 | (1) |
|
Plan Group Policy Settings |
|
|
10-23 | (1) |
|
|
|
10-24 | (1) |
|
Planning Administrative Control of GPOs |
|
|
10-26 | (1) |
|
|
|
10-29 | (1) |
|
|
|
10-30 | (1) |
|
Lesson 3: Implementing a GPO |
|
|
10-31 | (1) |
|
|
|
10-31 | (1) |
|
|
|
10-31 | (1) |
|
Creating an MMC for a GPO |
|
|
10-32 | (1) |
|
Delegating Control of a GPO |
|
|
10-33 | (1) |
|
Configuring Group Policy Settings |
|
|
10-36 | (1) |
|
Disabling Unused Group Policy Settings |
|
|
10-37 | (1) |
|
Indicating GPO Processing Exceptions |
|
|
10-38 | (1) |
|
Filtering GPO Scope with Security Groups |
|
|
10-40 | (1) |
|
|
|
10-41 | (1) |
|
|
|
10-42 | (1) |
|
|
|
10-42 | (1) |
|
|
|
10-43 | (1) |
|
Editing a GPO and GPO Settings |
|
|
10-43 | (1) |
|
|
|
10-44 | (1) |
|
Group Policy Best Practices |
|
|
10-44 | (1) |
|
Practice: Implementing a GPO |
|
|
10-45 | (1) |
|
|
|
10-48 | (1) |
|
|
|
10-49 | (1) |
|
|
|
10-50 | (1) |
|
|
|
10-52 | (1) |
|
|
|
10-55 | (1) |
|
|
|
10-56 | (1) |
|
|
|
10-56 | (1) |
|
|
|
10-56 | (1) |
|
|
|
10-57 | (1) |
|
11 Administering Group Policy |
|
|
|
|
|
11-1 | (1) |
|
|
|
11-2 | (1) |
|
Lesson 1: Managing Group Policy with RSoP |
|
|
11-3 | (1) |
|
|
|
11-3 | (1) |
|
Generating RSoP Queries with the Resultant Set Of Policy Wizard |
|
|
11-4 | (1) |
|
Generating RSOP Queries with the Gpresult Command-Line Tool |
|
|
11-19 | (1) |
|
Generating RSOP Queries with the Advanced System Information Policy Tool |
|
|
11-22 | (1) |
|
Delegating Control of RSoP |
|
|
11-23 | (1) |
|
Practice: Generating RSoP Queries |
|
|
11-24 | (1) |
|
|
|
11-26 | (1) |
|
|
|
11-27 | (1) |
|
Lesson 2: Managing Special Folders with Group Policy |
|
|
11-28 | (1) |
|
|
|
11-28 | (1) |
|
Default Special Folder Locations |
|
|
11-30 | (1) |
|
Setting Up Folder Redirection |
|
|
11-30 | (1) |
|
Policy Removal Considerations |
|
|
11-37 | (1) |
|
Folder Redirection and Offline Files |
|
|
11-38 | (1) |
|
Folder Redirection Best Practices |
|
|
11-46 | (1) |
|
Practice: Managing Special Folders |
|
|
11-47 | (1) |
|
|
|
11-48 | (1) |
|
|
|
11-49 | (1) |
|
Lesson 3: Troubleshooting Group Policy |
|
|
11-50 | (1) |
|
Troubleshooting Group Policy |
|
|
11-50 | (1) |
|
Group Policy Troubleshooting Scenarios |
|
|
11-54 | (1) |
|
|
|
11-58 | (1) |
|
|
|
11-59 | (1) |
|
|
|
11-59 | (1) |
|
|
|
11-61 | (1) |
|
|
|
11-64 | (1) |
|
|
|
11-64 | (1) |
|
|
|
11-65 | (1) |
|
|
|
11-65 | (1) |
|
|
|
11-66 | (1) |
|
12 Deploying Software with Group Policy |
|
|
|
|
|
12-1 | (1) |
|
|
|
12-1 | (1) |
|
Lesson 1: Understanding Software Deployment with Group Policy |
|
|
12-3 | (1) |
|
Understanding Software Deployment with Group Policy |
|
|
12-3 | (1) |
|
Software Installation Extension |
|
|
12-4 | (1) |
|
Add Or Remove Programs in Control Panel |
|
|
12-7 | (1) |
|
Software Deployment Approaches |
|
|
12-7 | (1) |
|
Software Deployment Processes |
|
|
12-8 | (1) |
|
Distributing Windows Installer Packages |
|
|
12-10 | (1) |
|
|
|
12-11 | (1) |
|
|
|
12-12 | (1) |
|
Lesson 2: Deploying Software with Group Policy |
|
|
12-13 | (1) |
|
Deploying Software with Group Policy |
|
|
12-13 | (1) |
|
Planning and Preparing a Software Deployment |
|
|
12-13 | (1) |
|
|
|
12-15 | (1) |
|
Creating a GPO and a GPO Console for Software Deployment |
|
|
12-16 | (1) |
|
Specifying Software Deployment Properties for the GPO |
|
|
12-16 | (1) |
|
Adding Windows Installer Packages to the GPO and Selecting Package Deployment Method |
|
|
12-20 | (1) |
|
Setting Windows Installer Package Properties |
|
|
12-21 | (1) |
|
Software Deployment Best Practices |
|
|
12-27 | (1) |
|
Practice: Deploying Software with Group Policy |
|
|
12-28 | (1) |
|
|
|
12-32 | (1) |
|
|
|
12-33 | (1) |
|
Lesson 3: Maintaining Software Deployed with Group Policy |
|
|
12-34 | (1) |
|
Redeploying Applications Deployed with Group Policy |
|
|
12-34 | (1) |
|
Upgrading Applications Deployed with Group Policy |
|
|
12-34 | (1) |
|
Removing Applications Deployed with Group Policy |
|
|
12-37 | (1) |
|
|
|
12-39 | (1) |
|
|
|
12-40 | (1) |
|
Lesson 4: Troubleshooting Software Deployed with Group Policy |
|
|
12-41 | (1) |
|
Troubleshooting Software Deployed with Group Policy |
|
|
12-41 | (1) |
|
Software Deployment Troubleshooting Scenarios |
|
|
12-42 | (1) |
|
|
|
12-46 | (1) |
|
|
|
12-47 | (1) |
|
|
|
12-47 | (1) |
|
|
|
12-49 | (1) |
|
|
|
12-51 | (1) |
|
|
|
12-52 | (1) |
|
|
|
12-52 | (1) |
|
|
|
12-53 | (1) |
|
|
|
12-54 | (1) |
|
13 Administering Security with Group Policy |
|
|
|
|
|
13-1 | (1) |
|
|
|
13-2 | (1) |
|
Lesson 1: Understanding Active Directory Security |
|
|
13-3 | (1) |
|
Understanding Security Administration with Group Policy |
|
|
13-3 | (1) |
|
Security Settings in Group Policy |
|
|
13-4 | (1) |
|
Best Practices for Security Settings |
|
|
13-10 | (1) |
|
|
|
13-11 | (1) |
|
|
|
13-12 | (1) |
|
Lesson 2: Implementing Software Restriction Policies |
|
|
13-13 | (1) |
|
Understanding Software Restriction Policies |
|
|
13-13 | (1) |
|
|
|
13-14 | (1) |
|
How Software Restriction Policies Work |
|
|
13-15 | (1) |
|
Implementing Software Restriction Policies |
|
|
13-17 | (1) |
|
Optional Tasks for Implementing Software Restriction Policies |
|
|
13-24 | (1) |
|
Best Practices for Software Restriction Policies |
|
|
13-26 | (1) |
|
Software Restriction Policies Troubleshooting |
|
|
13-27 | (1) |
|
|
|
13-28 | (1) |
|
|
|
13-29 | (1) |
|
Lesson 3: Implementing an Audit Policy |
|
|
13-30 | (1) |
|
|
|
13-30 | (1) |
|
Understanding Audit Policies |
|
|
13-31 | (1) |
|
Implementing an Audit Policy |
|
|
13-33 | (1) |
|
Best Practices for Audit Policies |
|
|
13-40 | (1) |
|
Practice: Implementing Audit Policies |
|
|
13-41 | (1) |
|
|
|
13-44 | (1) |
|
|
|
13-45 | (1) |
|
Lesson 4: Administering the Security Log |
|
|
13-46 | (1) |
|
Understanding Windows Server 2003 Logs |
|
|
13-46 | (1) |
|
|
|
13-47 | (1) |
|
Finding Events in the Security Log |
|
|
13-48 | (1) |
|
Filtering Events in the Security Log |
|
|
13-50 | (1) |
|
Configuring the Security Log |
|
|
13-51 | (1) |
|
Clearing the Security Log |
|
|
13-52 | (1) |
|
Archiving the Security Log |
|
|
13-53 | (1) |
|
Practice: Administering the Security Log |
|
|
13-54 | (1) |
|
|
|
13-55 | (1) |
|
|
|
13-56 | (1) |
|
Lesson 5: Using Security Templates |
|
|
13-57 | (1) |
|
Understanding Security Templates |
|
|
13-57 | (1) |
|
Managing Security Templates |
|
|
13-63 | (1) |
|
Best Practices for Security Templates |
|
|
13-66 | (1) |
|
Practice: Managing Security Templates |
|
|
13-67 | (1) |
|
|
|
13-68 | (1) |
|
|
|
13-69 | (1) |
|
Lesson 6: Using Security Configuration And Analysis |
|
|
13-70 | (1) |
|
Understanding the Security Configuration And Analysis Feature |
|
|
13-70 | (1) |
|
Using the Security Configuration And Analysis Feature |
|
|
13-70 | (1) |
|
Security Configuration And Analysis Best Practices |
|
|
13-78 | (1) |
|
Security Configuration And Analysis Troubleshooting |
|
|
13-78 | (1) |
|
Practice: Using Security Configuration And Analysis |
|
|
13-79 | (1) |
|
|
|
13-81 | (1) |
|
|
|
13-81 | (1) |
|
|
|
13-82 | (1) |
|
|
|
13-83 | (1) |
|
|
|
13-86 | (1) |
|
|
|
13-87 | (1) |
|
|
|
13-87 | (1) |
|
|
|
13-87 | (1) |
|
|
|
13-88 | (1) |
|
14 Managing Active Directory Performance |
|
|
|
|
|
14-1 | (1) |
|
|
|
14-1 | (1) |
|
Lesson 1: Monitoring Performance with Service Logs and System Monitor |
|
|
14-2 | (1) |
|
Understanding the Directory and File Replication Service Logs |
|
|
14-2 | (1) |
|
Understanding System Monitor |
|
|
14-3 | (1) |
|
Monitoring Performance with the Directory Service Log and System Monitor Best Practices |
|
|
14-14 | (1) |
|
Directory Service Log and System Monitor Troubleshooting |
|
|
14-14 | (1) |
|
Practice: Using System Monitor |
|
|
14-17 | (1) |
|
|
|
14-17 | (1) |
|
|
|
14-18 | (1) |
|
Lesson 2: Monitoring Performance with Performance Logs And Alerts |
|
|
14-19 | (1) |
|
The Performance Logs And Alerts Snap In |
|
|
14-19 | (1) |
|
Managing Active Directory Performance from the Command Line |
|
|
14-31 | (1) |
|
Monitoring Performance with Performance Logs And Alerts Best Practices |
|
|
14-31 | (1) |
|
Performance Logs And Alerts Troubleshooting |
|
|
14-32 | (1) |
|
Practice: Using Performance Logs And Alerts |
|
|
14-33 | (1) |
|
|
|
14-35 | (1) |
|
|
|
14-36 | (1) |
|
Lesson 3: Optimizing and Troubleshooting Active Directory Performance |
|
|
14-37 | (1) |
|
Optimizing and Troubleshooting Active Directory Performance |
|
|
14-37 | (1) |
|
Troubleshooting Active Directory Performance with the Directory Service Log |
|
|
14-38 | (1) |
|
Troubleshooting Active Directory Performance with the Performance Console |
|
|
14-41 | (1) |
|
|
|
14-43 | (1) |
|
|
|
14-44 | (1) |
|
|
|
14-44 | (1) |
|
|
|
14-46 | (1) |
|
|
|
14-48 | (1) |
|
|
|
14-49 | (1) |
|
|
|
14-49 | (1) |
|
|
|
14-49 | (1) |
|
|
|
14-50 | (1) |
| Part 2 Prepare for the Exam |
|
|
15 Planning and Implementing an Active Directory Infrastructure (1.0) |
|
|
|
Tested Skills and Suggested Practices |
|
|
15-3 | (1) |
|
|
|
15-5 | (1) |
|
Plan a Strategy for Placing Global Catalog Servers |
|
|
15-7 | (1) |
|
|
|
15-8 | (1) |
|
|
|
15-10 | (1) |
|
Plan Flexible Operations Master Role Placement |
|
|
15-12 | (1) |
|
|
|
15-13 | (1) |
|
|
|
15-15 | (1) |
|
Implement an Active Directory Forest and Domain Structure |
|
|
15-17 | (1) |
|
|
|
15-20 | (1) |
|
|
|
15-24 | (1) |
|
Implement an Active Directory Site Topology |
|
|
15-28 | (1) |
|
|
|
15-29 | (1) |
|
|
|
15-31 | (1) |
|
Plan an Administrative Delegation Strategy |
|
|
15-32 | (1) |
|
|
|
15-33 | (1) |
|
|
|
15-35 | (1) |
|
16 Managing and Maintaining an Active Directory Infrastructure (2.0) |
|
|
|
Tested Skills and Suggested Practices |
|
|
16-1 | (1) |
|
|
|
16-4 | (1) |
|
Manage an Active Directory Forest and Domain Structure |
|
|
16-6 | (1) |
|
|
|
16-8 | (1) |
|
|
|
16-11 | (1) |
|
Manage an Active Directory Site |
|
|
16-14 | (1) |
|
|
|
16-16 | (1) |
|
|
|
16-19 | (1) |
|
Manage Active Directory Replicaton Failures |
|
|
16-21 | (1) |
|
|
|
16-23 | (1) |
|
|
|
16-26 | (1) |
|
Restore Active Directory Directory Services |
|
|
16-28 | (1) |
|
|
|
16-29 | (1) |
|
|
|
16-31 | (1) |
|
Troubleshoot Active Directory |
|
|
16-33 | (1) |
|
|
|
16-34 | (1) |
|
|
|
16-36 | (1) |
|
17 Planning and Implementing User, Computer, and Group Strategies (3.0) |
|
|
|
Tested Skills and Suggested Practices |
|
|
17-2 | (1) |
|
|
|
17-4 | (1) |
|
Plan a Security Group Strategy |
|
|
17-5 | (1) |
|
|
|
17-6 | (1) |
|
|
|
17-10 | (1) |
|
Plan a User Authentication Strategy |
|
|
17-14 | (1) |
|
|
|
17-15 | (1) |
|
|
|
17-18 | (1) |
|
|
|
17-20 | (1) |
|
|
|
17-22 | (1) |
|
|
|
17-25 | (1) |
|
Implement an OU Structure |
|
|
17-28 | (1) |
|
|
|
17-29 | (1) |
|
|
|
17-32 | (1) |
|
18 Planning and Implementing Group Policy (4.0) |
|
|
|
Tested Skills and Suggested Practices |
|
|
18-1 | (1) |
|
|
|
18-3 | (1) |
|
Plan Group Policy Strategy |
|
|
18-5 | (1) |
|
|
|
18-7 | (1) |
|
|
|
18-11 | (1) |
|
Configure the User Environment by Using Group Policy |
|
|
18-15 | (1) |
|
|
|
18-17 | (1) |
|
|
|
18-21 | (1) |
|
Deploy a Computer Environment by Using Group Policy |
|
|
18-24 | (1) |
|
|
|
18-25 | (1) |
|
|
|
18-30 | (1) |
|
19 Managing and Maintaining Group Policy (5.0) |
|
|
|
Tested Skills and Suggested Practices |
|
|
19-1 | (1) |
|
|
|
19-3 | (1) |
|
Troubleshoot Issues Related to Group Policy Application Deployment |
|
|
19-5 | (1) |
|
|
|
19-6 | (1) |
|
|
|
19-11 | (1) |
|
Maintain Installed Software by Using Group Policy |
|
|
19-14 | (1) |
|
|
|
19-15 | (1) |
|
|
|
19-20 | (1) |
|
Troubleshoot the Application of Group Policy Security Settings |
|
|
19-24 | |
|
|
|
19-25 | (1) |
|
|
|
19-28 | |
| Part III Appendixes |
|
|
A New Active Directory Directory Features in the Windows Server 2003 Family |
|
|
|
New System Wide Active Directory Features |
|
|
A-3 | |
|
New Change and Configuration Management Features |
|
|
A-5 | |
|
New Domain- and Forest-Wide Active Directory Features |
|
|
A-6 | |
|
B Active Directory Setup Answer File Parameters |
|
|
|
|
|
B-1 | |
|
|
|
B-1 | |
|
|
|
B-2 | |
|
|
|
B-2 | |
|
|
|
B-2 | |
|
|
|
B-2 | |
|
|
|
B-3 | |
|
|
|
B-3 | |
|
DisableCancelForDnslnstall |
|
|
B-3 | |
|
|
|
B-4 | |
|
|
|
B-4 | |
|
|
|
B-4 | |
|
|
|
B-4 | |
|
|
|
B-5 | |
|
|
|
B-5 | |
|
|
|
B-5 | |
|
|
|
B-5 | |
|
|
|
B-6 | |
|
RemoveApplicationPartitions |
|
|
B-6 | |
|
|
|
B-6 | |
|
|
|
B-7 | |
|
|
|
B-7 | |
|
|
|
B-7 | |
|
|
|
B-8 | |
|
|
|
B-8 | |
|
|
|
B-8 | |
|
|
|
B-9 | |
|
|
|
B-9 | |
|
|
|
B-9 | |
|
|
|
B-9 | |
|
|
|
B-10 | |
|
|
|
B-10 | |
|
C Active Directory Setup Answer File Parameters |
|
|
|
|
|
C-1 | |
|
|
|
C-5 | |
|
|
|
C-6 | |
| Glossary |
|
G-1 | |
| Index |
|
I-1 | |