Learn your way! Get started

Windows Server 2008: Enterprise Administrator

with expert Robert O'Neill


Course at a glance

Included in these subscriptions:

  • Dev & IT Pro Video
  • Dev & IT Pro Power Pack
  • Power Pack Plus

Release date Release date 2/24/2012
Level Level Advanced
Runtime Runtime 10h 52m
Closed captioning Closed captioning N/A
Transcript Transcript N/A
eBooks / courseware eBooks / courseware N/A
Hands-on labs Hands-on labs N/A
Sample code Sample code N/A
Exams Exams Included
Platform Platform Internet Explorer Only


Enterprise Solutions
Enterprise Solutions

Need reporting, custom learning tracks, or SCORM? Learn More



Course description

When building a Windows Server 2008 Enterprise network there are many other aspects that need to be considered above building a single network. The Enterprise network may span several floors, buildings and miles. This course will show planning the DNS and IP addressing. From there the course will cover Designing Active Directory Domain Services and its physical requirements. The course will then cover Windows Server 2008 installation, upgrading, migration and administration. Next the course moves to the deployment to branch offices, setting up systems, security, client and remote access. Virtualization of servers is covered next and how that can create efficiencies with hardware. Then the course moves into data availability planning covering sharing, security, backups and restores. The last section covers designing software update infrastructure and managing compliance.

Prerequisites

Students should have knowledge of network systems and Microsoft server operating systems.

Learning Paths

This course will help you prepare for the following certification and exam:
MCITP: Enterprise Administrator
70-647: Windows Server 2008 Enterprise Administrator

Meet the expert

Robert O'Neill Robert O'Neill has been a consultant and a Microsoft Certified Trainer for Quality Training Services since 1996. He has worked with Fortune 1000 companies and training companies throughout the United States and the Caribbean. Robert holds numerous certifications including MCT, MCAD, MCTS, MCITP, EA, and MCPD. His expertise focuses on Windows Server 2008, Windows 7, Windows SharePoint, Visual Studio .NET, and CompTIA.


Course outline



Module 1

Planning Name Resolution (24:21)
  • Introduction (01:27)
  • FQDN Names Resolved Using DNS (01:13)
  • Root Level and Top Level (00:54)
  • Registered Names (00:58)
  • FQDN Names again (00:55)
  • DNS Name Resolution Methods (01:50)
  • Example of Name Resolution (01:10)
  • Stub Zones (01:59)
  • Options Include (01:24)
  • Forwarding (02:21)
  • Example of Forwarding (01:40)
  • Zone Transfer (01:41)
  • Secondary Zone Options (00:41)
  • Administration Tools (00:26)
  • DNS Features (05:12)
  • Summary (00:22)
Configuring DNS and WINS (32:56)
  • Introduction (00:53)
  • WINS is Legacy (02:43)
  • Deploy WINS (02:30)
  • Where to Put WINS (07:15)
  • Internal and External Name (02:35)
  • Use Internet Domain Name (01:15)
  • Zone Planning (01:38)
  • Zones Data and Replication (01:26)
  • Where to Put The DNS Server (02:20)
  • Zone Transfer Considerations (01:09)
  • Root Hints (01:07)
  • DNS Caching (00:50)
  • Demo: Configure IPv6 (06:41)
  • Summary (00:29)

Module 2

Planning IP Addressing (31:24)
  • Introduction (00:38)
  • IPv4 addresses (01:12)
  • IPv6 address (01:29)
  • IPv6 Prefix (01:05)
  • Unicast Addresses (02:14)
  • Global Addresses (01:12)
  • Link Local Address (02:09)
  • Site Local or Unique Local (00:45)
  • Special Addresses (01:00)
  • Multicast Addresses (00:49)
  • Anycast Addresses (00:38)
  • Address State (01:50)
  • Next Generation TCP/IP (01:34)
  • Teredo (01:11)
  • Teredo Addressing (00:59)
  • Teredo NAT Example (01:13)
  • ISATAP (00:40)
  • 6 to 4 (00:33)
  • Configuration (02:56)
  • Choices for Transition (00:29)
  • Demo: Setup IPv6 (06:13)
  • Summary (00:23)
Active Directory Domain (15:01)
  • Introduction (00:44)
  • AD DS Overview (00:43)
  • Schema and Domain (00:49)
  • Tree and Forest (00:49)
  • Domain Controller (01:18)
  • Gather Requirements (00:54)
  • Other Requirements-control (00:40)
  • Decide Forest Structure (02:36)
  • Data and Service (01:45)
  • Domain Structure Design (03:56)
  • Summary (00:41)
ADD Continued (21:11)
  • Introduction (00:31)
  • Upgrade DCs or New Hardware (01:40)
  • Forest Root Considerations (01:41)
  • Domain Considerations (01:07)
  • Functional Levels (00:32)
  • Domain Functional Levels (07:15)
  • Forest Functional Level (04:11)
  • Schema Management (01:38)
  • Upgrading DC or Domain (00:44)
  • AD DS Trusts Planning (01:28)
  • Summary (00:18)

Module 3

Domain Services: Physical (13:05)
  • Introduction (00:39)
  • Gathering infromation (01:12)
  • Physical Models-Single Site (02:05)
  • Physical Models-Multiple Site (02:08)
  • Replication Planning (01:41)
  • Things to Consider (01:11)
  • Hub and Spoke (01:17)
  • Full Mesh (00:42)
  • Hybrid (02:00)
  • Summary (00:06)
Domain Services: Links (19:57)
  • Introduction (00:15)
  • Designing Replication Links (00:40)
  • SMTP (00:38)
  • Site Links (01:35)
  • Schedule (02:00)
  • Site Link Bridging (01:22)
  • Planning Placement of DCs (01:25)
  • Regional Domain Controllers (01:54)
  • RODC (01:05)
  • Global Catalog Servers (01:27)
  • Forest Role and Domain Role (00:15)
  • Schem, RID, Domain Naming (01:33)
  • Planning Location Attribute (03:48)
  • Site Replication Topology (01:25)
  • Summary (00:28)
Planning Migration or Upgrade (20:39)
  • Introduction (00:35)
  • The Big Question (01:44)
  • Hardware Requirements (01:04)
  • Ways to Migrate/Upgrade (01:00)
  • Upgrade Existing Structure (01:08)
  • Restructure Current Structure (00:48)
  • Upgrade then Restructure (01:16)
  • Performing an Upgrade (01:25)
  • In Place Upgrade of DC (00:55)
  • Trust Relatrionships (01:14)
  • Types of Trust Relationships (02:18)
  • Accessing Reosources (02:18)
  • Authentication Across Domains (01:09)
  • Scenario (02:55)
  • Summary (00:44)

Module 4

Planning Federation Services (15:09)
  • Introduction (00:29)
  • AD Federation Services (01:06)
  • When to Use AD FS (01:07)
  • Federation Trust (00:39)
  • What to Need (01:13)
  • AD FS Claims (02:14)
  • AD FS Claims Mapping (01:47)
  • Securing (00:38)
  • AD FS Processes (03:32)
  • Requirements for AD FS (01:35)
  • Summary (00:43)
Identity Management: Unix (06:34)
  • Introduction (00:35)
  • Interoperating with UNIX (00:42)
  • Password Synchronization (01:18)
  • UNIX Based Subsystem (00:42)
  • Services Network File System (00:40)
  • Service for NIS (00:52)
  • Install NIS (01:19)
  • Summary (00:23)
Delegating Administration (42:43)
  • Introduction (00:38)
  • Gathering Infromation (01:16)
  • Compare Tasks with People (03:36)
  • What to Delegate (01:29)
  • How Will Admin be Perfromed (00:49)
  • Groups (01:10)
  • Local Groups (00:37)
  • Domain Local Groups (00:29)
  • Global Groups (00:15)
  • Universal Groups (00:24)
  • Groups can be converted (00:55)
  • Why Use Groups (00:45)
  • Solution (00:42)
  • Delegating tasks with Groups (01:38)
  • Consider Role Based Management (00:44)
  • Groups with Trust Relationships (00:32)
  • Shortcut Trust Relationships (02:41)
  • Assign a Manager to Groups (00:42)
  • Planning for auditing of AD DS (01:28)
  • Events Appear in Security Log (02:17)
  • OU Structure Planning (02:46)
  • Problem and Solution (00:30)
  • Delegate administration of OU (01:17)
  • Demo:Delegating Administration (12:10)
  • Large Company (02:08)
  • Summary (00:33)

Module 5

Enterprise Group Policy (30:25)
  • Introduction (00:49)
  • Policy for Multiple Domains (03:21)
  • Plan GPO Hierarchy (02:56)
  • Planning for Device Control (01:16)
  • GPO settings Device Control (01:48)
  • Authentication - Authorization (01:13)
  • Password Authentication (02:11)
  • Fine Grained Password Policies (04:28)
  • PSO Precedence Rules (01:51)
  • msDS-ResultantPSO (00:54)
  • Smart Card Authentication (01:26)
  • Demo: Fine Grained Policy (07:32)
  • Summary (00:33)
Branch Office Deployments (21:21)
  • Introduction (00:39)
  • Remote Location Administration (01:20)
  • Branch Administration (01:32)
  • Branch Office Components (01:02)
  • Deploying OS at Branch Office (00:41)
  • Hands on vs. Automated (01:04)
  • Automated Deployment (01:31)
  • Servers in the Branch Office (03:13)
  • Windows Server Core (01:32)
  • What Makes a Site a Site (02:30)
  • Domain Controller at a Branch (02:34)
  • What Type Domain Controller (01:13)
  • RODC Features (01:56)
  • Summary (00:27)
Office Deployments Continued (16:13)
  • Introduction (00:37)
  • Global Catalog (02:06)
  • Universal Group Caching (00:50)
  • Catalog in the Branch Office (00:50)
  • Master of Operations (00:50)
  • Relative ID Master (00:21)
  • Operations Masters (01:01)
  • DNS in the Branch Office (02:25)
  • DFS in Branch Offices (01:36)
  • RRAS in Branch Offices (01:24)
  • Hyper-V in Branch Offices (00:44)
  • Branch to Main Communication (00:40)
  • Securing Traffic (01:01)
  • Caching Data at Branch Office (01:11)
  • Summary (00:29)

Module 6

Branch Office Security (16:58)
  • Introduction (00:34)
  • Server Security (01:31)
  • Hardening Servers (01:59)
  • Branch Office Servers (00:30)
  • RODC Install Process (00:34)
  • Install RODC (01:41)
  • RODC Authentication (01:00)
  • Replication Policy Component (00:57)
  • Securing Branch Office Data (01:13)
  • Demo: Read only DNC (06:19)
  • Summary (00:35)
Designing Network Access (15:33)
  • Introduction (00:44)
  • Perimeter Network Design (00:39)
  • Network with 3 leg Firewall (00:43)
  • Network with Two Firewalls (01:14)
  • Which Design to Use (01:09)
  • Perimeter Network Security (01:02)
  • Network Address Translation (00:53)
  • Stateful Packet Inspection (00:54)
  • Proxy Server (00:47)
  • Application Layer Firewalls (01:21)
  • Forefront TMG (00:39)
  • Forefront TMG 3 leg Firewall (00:34)
  • Forefront TMG in back to back (00:48)
  • Forefront TMG Features (00:31)
  • Deploying Services (00:47)
  • Deploying Web Services (02:18)
  • Summary (00:20)
Designing Remote Access (22:45)
  • Introduction (00:32)
  • Remote Access (00:50)
  • PPT Protocol (01:02)
  • VPN Access (00:36)
  • PPTP (00:46)
  • L2TP (02:08)
  • SSTP (00:54)
  • IPSec Tunnel Mode (01:40)
  • DirectAccess (00:58)
  • DirectAccess Configuration (00:59)
  • DirectAccess Works (00:32)
  • VPN Authentication (01:04)
  • Which to Use (01:27)
  • Securing VPN Server Deployment (01:02)
  • Using RADIUS for Remote Access (00:52)
  • Network Policy Server (01:24)
  • Locating RADIUS Services (01:04)
  • Multiple Domain Authentication (01:10)
  • Medium Size Company Example (01:07)
  • Considerations (02:05)
  • Summary (00:23)

Module 7

Designing Network Access (24:33)
  • Introduction (00:39)
  • Network Access Protection (01:27)
  • Example of Network Access (01:18)
  • Scenarios (01:04)
  • NAP Enforcement Types (00:20)
  • What NAP does and does NOT (01:14)
  • IPSec Enforcement (01:19)
  • IPSec Security Zones (01:20)
  • Small Environment IPSec (00:33)
  • Large Environment IPSec (01:12)
  • PKI infrastructure for IPSec (01:19)
  • Deploying Third Party NAP (01:19)
  • NAP VPN Enforcement (00:58)
  • After PPP Authentication (00:39)
  • VPN Authentication Protocols (00:39)
  • Certificate Hierarchy (00:58)
  • VPN Enforcement Consideration (01:05)
  • NAP 802.1x Enforcement (00:47)
  • 802.1x Considerations (00:43)
  • ACL or VLAN (00:41)
  • Authentication Consideration (00:40)
  • NAP DHCP Enforcement (01:22)
  • Domain vs. Server Isolation (00:25)
  • Comparison with IPSec (00:34)
  • Migration Considerations (00:32)
  • Which NAP Method (00:56)
  • Summary (00:17)
Remote Desktop Services (31:55)
  • Introduction (00:35)
  • Terminal Server (05:56)
  • Components of Remote Services (00:44)
  • Deploying License Servers (01:39)
  • Terminal Licensing Concerns (02:07)
  • Per Device CAL (01:26)
  • License Server Maintenance (01:05)
  • Deployment Considerations (01:26)
  • Remote Desktop Web Access (01:12)
  • Web Access - Server 2008 R2 (00:29)
  • Using Remote Apps (00:48)
  • New Features for Server 08 R2 (01:21)
  • Connection Broker Service (01:14)
  • Migrating to Connection Broker (00:40)
  • Managing Session Host Farms (00:54)
  • Remote Desktop Gateway (02:34)
  • Authorization Policies (01:27)
  • Configuring Secure Gateway (00:55)
  • Ports needed by RD Gateway (01:01)
  • Virtualization Host Servers (01:14)
  • RemoteFX (00:43)
  • Remote Desktop Scenario (01:56)
  • Summary (00:18)

Module 8

Application Deployment (22:05)
  • Introduction (00:30)
  • Deploying Software or Apps (00:45)
  • Group Policy Software Install (03:41)
  • Which method to use? (02:22)
  • Deployment using Group Policy (01:06)
  • Application Maintenance (01:57)
  • Considerations (05:02)
  • System Center Essentials 2010 (01:26)
  • SCCM 2007 (02:37)
  • Software deployment with SCCM (00:28)
  • Scenarios (01:42)
  • Summary (00:24)
Virtualization Planning (26:33)
  • Introduction (00:38)
  • Why use Virtualization (01:24)
  • Multiple hosted OS (01:52)
  • Hyper-V (07:18)
  • Installation requirements (00:48)
  • Hyper-V Installation (01:31)
  • Guest Operating Systems (00:52)
  • When to use Hyper-V (01:00)
  • Deploying Guest OS (01:54)
  • Planning Storage Requirements (00:59)
  • Planning Memory Requirements (00:51)
  • Processor Requirements (01:56)
  • Network Requirements (02:51)
  • Drive Considerations (02:11)
  • Summary (00:20)
Deploying Virtualization (24:28)
  • Introduction (00:40)
  • Installing the guest OS (00:33)
  • Hyper-V Manager (01:01)
  • Snapshots (00:40)
  • When to use Hyper-V (02:13)
  • Server Consolidation (00:56)
  • Virtual Machine Manager (06:33)
  • Application Virtualization (01:23)
  • When to deploy App-V (03:03)
  • App-V Deployment (04:50)
  • Questions (02:06)
  • Summary (00:24)

Module 9

Planning Data Sharing DFS (23:46)
  • Introduction (00:29)
  • Data Sharing with DFS (00:35)
  • New for Server 2008 R2 (01:33)
  • Namespace Type (03:21)
  • Folder Targets (02:01)
  • DFS Replication (01:10)
  • DFS Configuration (01:26)
  • Failover and Failback (00:57)
  • Setting Target Priority (01:59)
  • DFS Replication (01:05)
  • Requirements for DFS-R (01:37)
  • Replication Process (04:28)
  • Designing DFS (02:37)
  • Summary (00:22)
Data Sharing SharePoint (13:06)
  • Introduction (00:38)
  • What is SharePoint (00:25)
  • SharePoint Considerations (02:22)
  • SharePoint Services 3.0 (02:33)
  • SharePoint Configuration (01:06)
  • SharePoint Server 2007 (03:11)
  • When would you use SP (02:25)
  • Summary (00:22)
Planning Data Security (22:56)
  • Introduction (00:32)
  • BitLocker Drive Encryption (04:12)
  • Encrypted File System - EFS (02:27)
  • EFS Best Practices (02:46)
  • Rights Management Services (02:39)
  • What is needed to deploy RMS (01:57)
  • Server 2008 Security Features (01:03)
  • ACL Document Example (02:44)
  • Certificates and Licenses (01:10)
  • Deployment Considerations (02:09)
  • Apps that use AD RMS now (00:43)
  • Summary (00:29)
Data Security Backups (19:20)
  • Introduction (00:32)
  • System State Backup (00:46)
  • Domain Controller Recovery (02:19)
  • When to Backup (01:32)
  • Where to Backup (01:34)
  • Restore Options (03:25)
  • Non-Authoritative Restore (01:30)
  • Authoritative Restore (00:47)
  • Domain Services Maintenance (00:38)
  • What if an OM DC fails (02:58)
  • Infrastrusture Master (00:30)
  • PDC Emulator (00:51)
  • Now the Reality (01:13)
  • Summary (00:37)

Module 10

Data Security Availability (14:16)
  • Introduction (00:34)
  • Network Load Balancing (NLB) (03:39)
  • Clustering Servers (02:33)
  • Cluster Server Components (01:04)
  • Cluster Server Hardware (01:46)
  • iSCSI (01:12)
  • Network Infrastructure (00:47)
  • Cluster Server Uses (02:22)
  • Summary (00:15)
Public Key Infrastructure (19:19)
  • Introduction (00:33)
  • What is it (01:25)
  • Certificate Services (02:02)
  • Applications of PKI (02:17)
  • Who Needs Certificates (00:57)
  • CA Hierarchy Installation (01:33)
  • Business needs assessment (01:31)
  • Active Directory Requirements (01:36)
  • Certificate Templates (02:08)
  • Infrastructure Planning (00:44)
  • Types of CA (00:27)
  • How Many Certificate Servers (03:29)
  • Summary (00:32)
Enrolling for Certificates (19:08)
  • Introduction (00:35)
  • Enrolling for Certificates (01:49)
  • To use Web enrollment (01:13)
  • Manual Certificate Enrollment (01:04)
  • Renewing a Certificate (00:59)
  • Manual or Automatic Approvals (00:38)
  • Renewal Considerations (00:50)
  • CA Certificate Renewal (01:45)
  • Certificate is no longer valid (01:21)
  • Certificate Revocation List (02:49)
  • Publishing the CRL (00:43)
  • CRL Issues (00:44)
  • CRL vs. Online Responder (01:46)
  • CRL published to LDAP issues (02:09)
  • Summary (00:36)
Designing Software Updates (12:13)
  • Introduction (00:35)
  • Keeping Systems up to Date (01:09)
  • WSUS (01:04)
  • WSUS installs as a Role (03:26)
  • Test Updates (01:58)
  • Managing Computers (00:57)
  • Update Installation Policy (02:42)
  • Summary (00:18)
Designing Compliance (12:48)
  • Introduction (00:30)
  • System Center Essentials 2010 (01:16)
  • System Center Configuartion (00:49)
  • SCCM Deployment (01:12)
  • Software deployment with SCCM (00:39)
  • Reporting with SCCM (01:08)
  • Compliance (00:43)
  • Server Update Reporting (01:54)
  • Security Baselines (02:53)
  • Role based Security Policies (01:06)
  • Summary (00:34)