Learn your way! Get started

Microsoft Desktop, Part 8: Security and Infrastructure

with expert Chris Bell


Watch trailer

Microsoft Desktop, Part 8: Security and Infrastructure Trailer

Course at a glance

Included in these subscriptions:

  • Dev & IT Pro Video
  • Dev & IT Pro Power Pack
  • Power Pack Plus

Release date Release date 12/30/2013
Level Level Intermediate
Runtime Runtime 1h 45m
Closed captioning Closed captioning N/A
Transcript Transcript N/A
eBooks / courseware eBooks / courseware N/A
Hands-on labs Hands-on labs N/A
Sample code Sample code N/A
Exams Exams Included


Enterprise Solutions
Enterprise Solutions

Need reporting, custom learning tracks, or SCORM? Learn More



Course description

Key threats from the desktop end points of data leakage, misuse of software licenses, unprotected devices and improper configuration of privileges are key threats to an enterprise infrastructure. Microsoft offers a wide variety of security options to protect enterprise desktop endpoints from these threats. On the other hand, a desktop infrastructure has various functionalities that enable the smooth functioning of the system. These include the update infrastructure, virtual desktop infrastructure and the virtual desktop, or VD, collection. Through this course we will get familiar with managing desktop security options that we can use to protect desktop systems from malicious data access and malware threats. We will also ensure the smooth functioning of the systems by designing an update infrastructure and installing required updates using the Windows Server Update services, or WSUS.

Prerequisites

The course assumes that students have some familiarity with Microsoft Windows, basic networking concepts, and a fundamental understanding of computer hardware.

Learning Paths

This course will help you prepare for the following certification and exam:
MCSE 2012: Desktop Infrastructure
70-415: Implementing a Desktop Infrastructure

This course is part of the following LearnNowOnline SuccessPaths™:
Windows Server 2012

Meet the expert

Chris Bell Chris Bell, MCITP, is an 18-year SQL Server veteran for both business intelligence and application development providing solutions for businesses, organizations, and individuals. He is the founder and CEO of WaterOx Consulting, Inc., a provider of remote SQL Server consulting and services. Chris is also the founder and current President of the Washington DC chapter of PASS and a member of the Board of Directors for CPCUG. Chris also frequently attends and presents at PASS events around the country, sharing his passion for all things SQL Server. In 2012, Chris was one of 5 finalists in the world for Red Gate’s Exceptional DBA Award.


Course outline



Managing Desktop Security

Advanced Auditing (07:22)
  • Introduction (00:18)
  • Advanced Auditing (01:05)
  • UAC (01:10)
  • Device Restriction Policies (01:33)
  • Demo: Advanced Auditing (03:02)
  • Summary (00:11)
Endpoint Protection (16:03)
  • Introduction (00:19)
  • Implement Endpoint Protection (00:55)
  • Endpoint Protection Features (01:12)
  • Endpoint Protection Alerts (00:29)
  • Client Settings (00:41)
  • Demo: Endpoint Protection Set-Up (03:45)
  • Demo: Client Settings (02:18)
  • Demo: Create Automatic Rule (03:52)
  • Demo: Deployment Package (02:18)
  • Summary (00:10)
Anti Malware Protection (05:28)
  • Introduction (00:15)
  • Anti-MalwareProtectionPolicies (00:52)
  • Demo: Anti-Malware Protection (03:57)
  • Summary (00:22)
System Center 2012 DPM (11:27)
  • Introduction (00:23)
  • System Center 2012 DPM (00:43)
  • Demo: DPM Setup (01:53)
  • Demo: DPM Alerts (04:42)
  • Demo: Operations Manager (03:29)
  • Summary (00:14)
Bit Locker (14:44)
  • Introduction (00:26)
  • BitLocker (02:04)
  • BitLocker Modes (00:36)
  • BitLocker Recovery Key (00:37)
  • Demo: Enable BitLocker (02:39)
  • Demo: New Drive (03:45)
  • Demo: BitLocker (04:15)
  • Summary (00:18)
Removable Media (05:20)
  • Introduction (00:25)
  • Removable Media Restrictions (01:59)
  • Demo: Removable Media Rules (02:45)
  • Summary (00:09)
Encrypting File System (09:20)
  • Introduction (00:25)
  • EFS (00:55)
  • Centrally Managed EFS Solutions (01:24)
  • Demo: EFS Folder (01:50)
  • Demo: EFS Certificates (04:34)
  • Summary (00:11)

Desktop Infrastructure

Windows Update Infrastructure (12:41)
  • Introduction (00:35)
  • WSUS (00:43)
  • VM Pool Patching (00:59)
  • VM Manager Integration (00:58)
  • WSUS and SCCM Integration (01:04)
  • Multi-Tier WSUS (00:56)
  • Replica WSUS Servers (00:30)
  • Windows Intune (01:02)
  • UpdateInfrastructureGuidelines (00:41)
  • Demo: Updates with SCCM (04:50)
  • Summary (00:18)
Monitor Virtual Infrastructure (15:29)
  • Introduction (00:23)
  • VDI (01:19)
  • RDS Servers (01:00)
  • RDS Capacity Analysis (01:11)
  • Bottleneck Remediation (01:17)
  • VM Guests (00:30)
  • Health Monitoring (00:53)
  • RD Session Host Server (00:55)
  • Re-Direction Modes (00:57)
  • VDI Performance Factors (01:14)
  • Demo: RDS Monitoring (02:40)
  • Demo: VDI Monitoring (02:50)
  • Summary (00:16)
Manage Virtual Collections (07:27)
  • Introduction (00:30)
  • Pooled VD Collection (01:18)
  • Personal VD Collection (00:43)
  • Managed Collection (01:02)
  • Unmanaged Collection (00:37)
  • Demo: Monitor VDs (02:54)
  • Summary (00:21)