Learn your way! Get started

Windows Server 2008: Server Administrator

with expert Robert O'Neill


Course at a glance

Included in these subscriptions:

  • Dev & IT Pro Video
  • Dev & IT Pro Power Pack
  • Power Pack Plus

Release date Release date 11/4/2011
Level Level Advanced
Runtime Runtime 11h 27m
Closed captioning Closed captioning N/A
Transcript Transcript N/A
eBooks / courseware eBooks / courseware N/A
Hands-on labs Hands-on labs N/A
Sample code Sample code N/A
Exams Exams Included
Platform Platform Internet Explorer Only


Enterprise Solutions
Enterprise Solutions

Need reporting, custom learning tracks, or SCORM? Learn More



Course description

Microsoft Windows Server 2008 has many features that need to be considered before administering a network. This course will cover many aspect of administration of Windows Server 2008, starting with preparing for deployment, network infrastructure and Active Directory. Once the server is in place Group Policies will need to be created and the course will show you how to do that. After that comes application servers, file and print services. The most important part of any network is security and we will cover that. From there the courses moves to server administration, monitoring and maintenance and then cover disaster recovery. At the end the newest of technologies virtualization is covered with the Microsoft Hyper V technology.

Prerequisites

The users must have an understanding of computers and computer networks. Previous experience with Microsoft Server is helpful.

Meet the expert

Robert O'Neill Robert O'Neill has been a consultant and a Microsoft Certified Trainer for Quality Training Services since 1996. He has worked with Fortune 1000 companies and training companies throughout the United States and the Caribbean. Robert holds numerous certifications including MCT, MCAD, MCTS, MCITP, EA, and MCPD. His expertise focuses on Windows Server 2008, Windows 7, Windows SharePoint, Visual Studio .NET, and CompTIA.


Course outline



Module 1

Planning Server Deployment (47:40)
  • Introduction (01:09)
  • Deploying Windows Server 2008 (00:40)
  • Document Everything (01:56)
  • Help for the Planning Process (01:08)
  • Industry Standards (01:15)
  • Microsoft Operations Framework (01:03)
  • Planning and Managing (01:24)
  • Service Level Agreement (04:08)
  • Solution Accelerators (00:32)
  • Single Server Versions (03:37)
  • Licenses (04:30)
  • What to Consider (01:11)
  • Planning for Upgrading Server (02:20)
  • Clean Install is the Best (01:37)
  • Bitlocker (01:29)
  • Device Driver Issues (01:41)
  • Planning the Installation (01:15)
  • Hands On VS. Automated (05:34)
  • Activating the OS (02:30)
  • Upgrade or Migrate (02:37)
  • Which Edition of Server 2008 (03:21)
  • 32 Bit vs. 64 Bit (01:56)
  • Summary (00:36)
TCP_IP Addressing (28:11)
  • Introduction (00:39)
  • TCP/IP Overview (02:15)
  • Address Ranges (02:04)
  • Classless Inter Domain Routing (01:23)
  • Private Addresses (03:11)
  • TCP/IP Address Planning (01:35)
  • Address Planning Scenario 1 (03:21)
  • Address Planning Scenario 2 (03:22)
  • Manual or Dynamic Addressing (02:55)
  • Variable Length Subnet Mask (01:13)
  • Internal Subnets (01:58)
  • Client Configuration (00:43)
  • DHCP Considerations (01:27)
  • Packet Routing (01:34)
  • Summary (00:25)

Module 2

DHCP and IPV6 Overview (21:52)
  • Introduction (00:35)
  • DHCP and IPV6: Demo (10:09)
  • TCP/IP v6 Overview (00:57)
  • IPv6 Address (01:35)
  • Routers (00:42)
  • Global Addresses (01:00)
  • Link Local Address (02:16)
  • Unique Local Address (00:46)
  • Address States (00:59)
  • Next Generation TCP/IP (00:29)
  • ISATAP (00:28)
  • 6 to 4 (00:27)
  • Teredo (00:52)
  • Summary (00:32)
Namespace Planning (32:06)
  • Introduction (00:44)
  • OSI Stack Overview (02:38)
  • TCP/IP Stack (03:35)
  • Choosing Domain Name (04:33)
  • DNS Servers (03:05)
  • Single Name Resolution (04:27)
  • WINS Servers (02:00)
  • Access From the Internet (03:35)
  • Practice Planning (06:48)
  • Summary (00:38)

Module 3

Active Directory Prep Overview (39:26)
  • Introduction (00:39)
  • AD DS Overview (01:19)
  • AD DS Terms (01:43)
  • Domain Functional Level (05:30)
  • Forest Functional Level (02:52)
  • Domain Controller (02:19)
  • Organizational Unit (01:21)
  • Read Only Domain Controller (02:15)
  • Master of Operations (01:26)
  • Relative ID Master (01:10)
  • Global Catalog (01:35)
  • Active Directory: Demo (16:29)
  • Summary (00:42)
Active Directory Trust (31:13)
  • Introduction (00:40)
  • Trust Relationships (05:41)
  • AD DS Preparations (01:19)
  • Deployment Considerations (03:46)
  • Infrastructure Design (00:58)
  • One Name Domains (01:17)
  • Multiple Name Domains (00:28)
  • Domain Funtional Levels (00:40)
  • Forest Functional Level (01:11)
  • Physical Network Preparations (02:26)
  • Site Planning (03:57)
  • Certificate Services (01:02)
  • Lightweight Directory Services (01:02)
  • Federation Services (01:19)
  • Rights Management Services (00:49)
  • Considerations (04:00)
  • Summary (00:30)

Module 4

Group Policy Overview (42:31)
  • Introduction (00:45)
  • Group Policy Overview (00:49)
  • New Features (01:37)
  • Policies vs. Preferences (02:00)
  • Preference Settings Categories (00:31)
  • Group Policy Application (06:05)
  • What"s New (03:24)
  • Application of Policies (02:12)
  • Organizational Units (02:18)
  • Group Policy Application (01:00)
  • How Settings Apply (03:37)
  • WMI Filtering (00:45)
  • Considerations (01:10)
  • Group Policy: Demo (15:30)
  • Summary (00:42)
Group Policy Planning (34:31)
  • Introduction (00:45)
  • Group Policy Tools (01:53)
  • GPO Replication (01:19)
  • ADMX and ADML (02:25)
  • Central Store (01:08)
  • Starter GPOs (01:01)
  • Number of GPOs Needed (02:17)
  • Maintaining GPOs (01:19)
  • Delegating Control of GPOs (01:13)
  • Folder Redirection (03:27)
  • GP Software Installation (03:15)
  • Which Method to use (01:51)
  • Deploying Scripts with GP (01:18)
  • Group Policy Planning: Demo (10:37)
  • Summary (00:34)

Module 5

Application Servers Overview (21:14)
  • Introduction (00:36)
  • Application Servers Overview (01:41)
  • Traditional Application Concerns (03:37)
  • Web Application Concerns (02:11)
  • Updating Application Servers (01:09)
  • Authentication (02:45)
  • Windows Server 2008 Features (01:48)
  • Application Servers: Demo (06:55)
  • Summary (00:26)
Application Servers (37:22)
  • Introduction (00:50)
  • Web Server Authentication (01:20)
  • SSL (01:36)
  • Web Application Concerns (02:04)
  • What does SQL do (03:46)
  • SQL Server Editions (00:38)
  • SQL Databases (01:20)
  • SQL Data Access (01:35)
  • Transaction Commitment Process (01:06)
  • Transaction Logs and Backup (01:25)
  • Restoring from a Backup (01:08)
  • SQL Performance Considerations (01:26)
  • Testing Compatability (01:33)
  • Deploying Applications (02:20)
  • Windows Terminal Server (01:28)
  • Terminal Server Changes (02:09)
  • Terminal Server Concerns (02:30)
  • Application Server: Demo (08:05)
  • Summary (00:54)

Module 6

File and Print (28:17)
  • Introduction (00:41)
  • Windows Server Resource Access (02:01)
  • Public Folders (01:43)
  • Sharing Resources (01:05)
  • Protecting File Resources (01:22)
  • Sharing Considerations (01:36)
  • NTFS Permissions (02:58)
  • NTFS Permission Planning (02:38)
  • Share vs. NTFS Permissions (02:28)
  • File and Print: Demo (11:16)
  • Summary (00:24)
Resource Management (24:29)
  • Introduction (00:38)
  • Encrypted File System (01:21)
  • Preparing for EFS (01:47)
  • Performance - File Servers (00:57)
  • Availability - File Servers (01:01)
  • Data Storage (02:41)
  • Managing Storage Requirements (01:54)
  • Quotas (00:56)
  • Quota Types (02:12)
  • Quotas Set Limits (01:19)
  • File Screen Templates (01:06)
  • Resource Management - Reports (02:07)
  • Demo: Resource Manager (03:34)
  • Demo: Reports (02:13)
  • Summary (00:37)
DFS and Printing (33:02)
  • Introduction (00:54)
  • Distributed File System (01:01)
  • DFS Namespace (01:29)
  • DFS Namespace - Two Types (02:59)
  • DFS Data Availability (00:28)
  • DFS Replication (02:20)
  • DFS Deployment Considerations (01:27)
  • Sharing Printers (00:49)
  • Print Server Review (01:55)
  • Printer Options (02:10)
  • Print Management Console (00:45)
  • Print Drivers (01:10)
  • Group Policy for Printers (02:08)
  • Demo: Print Services (02:22)
  • Demo: Print Management (07:59)
  • Demo: Deploy Printer (02:27)
  • Summary (00:29)

Module 7

Network Security Overview (35:55)
  • Introduction (00:45)
  • Network Security (05:05)
  • Mitigation Steps (01:26)
  • Network Profiles (00:36)
  • Firewall Advanced Security (00:43)
  • Firewall Rule Considerations (05:15)
  • Connection Security Rules (02:13)
  • Creating Isolation (01:50)
  • Viruses and Malware (01:55)
  • Protecting Against (01:06)
  • Considerations (02:43)
  • User Account Control (01:58)
  • Security Configuration Wizard (01:05)
  • Demo: Configure Firewall (05:22)
  • Demo: Creating Firewall Rule (03:19)
  • Summary (00:28)
Remote Access (19:15)
  • Introduction (00:41)
  • Remote Access - Protocol (02:08)
  • RADIUS (01:07)
  • Network Policy Server (02:32)
  • NPS Server Configuration (00:44)
  • NPS as RADIUS Server (00:36)
  • NPS as RADIUS Proxy (01:20)
  • Demo: Role for NPS (00:52)
  • Demo: Policy for VPN (03:15)
  • Demo: Create VPN (05:30)
  • Summary (00:27)
Network Access Protection (15:02)
  • Introduction (00:38)
  • Overview (01:28)
  • Scenarios for Guest Network (01:01)
  • System Health Validation (00:41)
  • Health Policy (00:32)
  • Remediation Server Group (00:30)
  • DHCP Enforcement (01:01)
  • VPN Enforcement (00:31)
  • 802.1x Access Points (00:56)
  • IPsec (01:09)
  • Demo: Client Services (06:06)
  • Summary (00:25)

Module 8

Server 2008 Admin Overview (31:14)
  • Introduction (00:38)
  • Administration of Server 2008 (01:27)
  • Common Day to Day Tasks (04:40)
  • Server Manager (03:59)
  • Command Line Tools (04:15)
  • Remote Administration (05:51)
  • Demo: Server Manager (04:36)
  • Demo: Active Directory (05:03)
  • Demo: Command Line (00:14)
  • Summary (00:27)
Server Core Administration (30:45)
  • Introduction (00:39)
  • Server Core (01:44)
  • Server Core Roles (01:40)
  • Server Core Features (02:15)
  • Server Core Administration (03:43)
  • Logged onto Server Core (00:34)
  • Promoting Server Core to DC (01:01)
  • Who is the Server Admin (01:39)
  • Demo: Delegate Roles (06:53)
  • Demo: Delegate Computers (05:22)
  • Demo: Add User with Powershell (04:44)
  • Summary (00:24)

Module 9

Monitoring and Maintenance (42:08)
  • Introduction (00:38)
  • Proactively Monitoring (02:20)
  • Tools used for Monitoring (01:58)
  • Monitoring Factors (02:23)
  • Monitoring Performance (00:47)
  • Baseline (02:16)
  • Monitoring Tools in Detail (01:28)
  • Applications and Services Logs (01:48)
  • Configuring Forwarded Events (00:54)
  • Collecting Computer Config (02:40)
  • Custom Configuration (01:43)
  • Planning Event Forwarding (02:03)
  • Keeping Systems Up to Date (01:20)
  • WSUS (01:22)
  • WSUS installs as a Role (01:04)
  • WSUS Process (03:23)
  • Test Updates (01:24)
  • Demo: Performance Monitor (08:48)
  • Demo: Reports (03:17)
  • Summary (00:26)
High Availability (25:05)
  • Introduction (00:52)
  • Overview (01:11)
  • High Availability Options (00:54)
  • Network Load Balancing (03:41)
  • NLB Options (01:44)
  • Disk Drives (01:45)
  • RAID 0 (00:35)
  • RAID 1 (00:32)
  • RAID 0 + 1 (00:44)
  • RAID 1 + 0 (00:47)
  • RAID 5 (01:06)
  • RAID 6 (01:03)
  • Which RAID to use (02:00)
  • Demo: Set Up RAID (07:37)
  • Summary (00:28)

Module 10

Client and Shadow Copies (29:44)
  • Introduction (00:40)
  • Clustering Servers (01:03)
  • Features (01:01)
  • Cluster Server Components (01:05)
  • Cluster Server Hardware (01:31)
  • iSCSI (00:58)
  • Network Infrastructure (01:41)
  • Cluster Server Uses (02:44)
  • Cluster Server Failover (00:48)
  • Quorum Types (01:20)
  • Quorum Processes (00:39)
  • NLB or Failover Cluster (01:53)
  • Backups (00:58)
  • Who Should Backup (01:05)
  • Shadow Copies (03:16)
  • Demo: Shadow Copies (08:20)
  • Summary (00:33)
Virtualization Planning (13:18)
  • Introduction (00:36)
  • Overview (00:47)
  • Different Virtualization Tech (02:28)
  • Hyper-V (00:35)
  • Features of Hyper-V (01:24)
  • Hyper-V Architecture (01:09)
  • Installation Requirements (02:13)
  • Installation Considerations (01:43)
  • Demo: Hyper-V Role (01:55)
  • Summary (00:23)
Configuring And Virtualization (23:20)
  • Introduction (00:38)
  • Hyper-V Configuration (02:20)
  • Drive Considerations (01:53)
  • When to use Hyper-V (02:50)
  • Snapshots (01:23)
  • Managing Hyper-V Hosts (01:34)
  • Using VMM (04:04)
  • Hyper-V Failover Cluster (00:31)
  • Managing Virtual Machines (01:03)
  • Backing up a Virtual Machine (00:38)
  • Demo: Create a VOS (05:58)
  • Summary (00:23)