After completing this module students will be able to:
- Describe Access and Information Protection solutions in business.
- Describe Access and Information Protection solutions in Windows Server 2012 and Windows Server 2012 R2.
- Describe Microsoft Forefront Identity Manager (FIM) 2010 R2.
After completing this module, students will be able to:
- Describe and perform various deployment techniques for AD DS.
- Describe virtual domain controller deployment considerations.
- Explain how new technologies in Windows Server 2012 and Windows Server 2012 R2 support virtual domain controllers.
- Describe Domain Controller cloning.
- Implement AD DS using the tools provided in Windows Server 2012 and Windows Server 2012 R2.
After completing this module, students will be able to:
- Understand the importance of securing domain controllers.
- Describe the benefit of read-only domain controllers (RODCs).
- Explain and implement password and account lockout policies.
- Implement audit authentication.
After completing this module, students will be able to:
- Describe AD DS replication.
- Configure AD DS sites.
- Configure and monitor AD DS replication.
After completing this module, students will be able to:
- Describe Group Policy.
- Implement and administer GPOs.
- Describe Group Policy scope and Group Policy processing.
- Troubleshoot the application of GPOs.
After completing this module, students will be able to:
- Implement Administrative Templates.
- Configure Folder Redirection and scripts.
- Configure Group Policy preferences.
After completing this module, students will be able to:
- Deploy Certificate Authorities.
- Administer Certificate Authorities.
- Troubleshoot, maintain, and monitor Certificate Authorities.
After completing this module, students will be able to:
- Use certificates in business environments.
- Deploy and manage certificate templates.
- Manage certificates deployment, revocation and recovery.
- Implement and manage smart cards.
After completing this module, students will be able to:
- Describe AD RMS.
- Explain how to deploy and manage an AD RMS infrastructure.
- Explain how to configure AD RMS content protection.
- Explain how to configure external access to AD RMS.
After completing this module, students will be able to:
- Describe DAC.
- Implement DAC components.
- Implement DAC for access control.
- Implement access-denied assistance.
- Implement and manage Work Folders.
- Implement Workplace Join.
After completing this module, students will be able to:
- Monitor AD DS.
- Manage the AD DS database.
- Recover objects from the AD DS database.
After completing this module, students will be able to:
- Describe Windows Azure AD.
- Administer Azure AD.
After completing this module, students will be able to:
- Describe AD LDS.
- Explain how to deploy AD LDS.
- Explain how to configure AD LDS instances and partitions.
- Explain how to configure AD LDS replication.