Learn your way! Get started

Managing Windows 2003 Environment

with expert Rafiq Wayani


Course at a glance

Included in these subscriptions:

  • Dev & IT Pro Video
  • Dev & IT Pro Power Pack
  • Power Pack Plus

Release date Release date 12/1/2005
Level Level Intermediate
Runtime Runtime 9h 36m
Closed captioning Closed captioning N/A
Transcript Transcript N/A
eBooks / courseware eBooks / courseware N/A
Hands-on labs Hands-on labs N/A
Sample code Sample code N/A
Exams Exams Included
Platform Platform Internet Explorer Only


Enterprise Solutions
Enterprise Solutions

Need reporting, custom learning tracks, or SCORM? Learn More



Course description

Managing and Maintaining a Microsoft Windows Server 2003 Environment course will give you the knowledge and skills necessary to prepare to pass Microsoft exam 70-290. This course is intended for individuals pursuing the MCSA or MCSE on Windows Server 2003 certification.

Meet the expert

Rafiq Wayani Rafiq Wayani has extensive experience including more than 20 years in IT as Systems Architect, Software Engineer, DBA, and Project Manager. Wayani has instructed in a variety of technical areas, has designed and implemented network and information systems, and is certified across a wide range of platforms and systems including Microsoft Solutions Developer, Systems Engineer, Application Developer, Database Administrator, Trainer; Novell Netware Administrator and Engineer; Master Certified Netware Engineer; and A Certified.


Course outline



Module 1

Server Roles / Logon Process (25:16)
  • Introduction (01:09)
  • Computer Roles (05:10)
  • Windows Server 2003 Editions (01:09)
  • Directory Services (04:24)
  • Active Directory Demo (02:35)
  • Organize / Manage Resources (01:22)
  • Logon Process (01:15)
  • Local / Domain Logon Demo (04:43)
  • Secondary Logon Demo (02:40)
  • Summary (00:44)
AD Users and Computers / DNS (30:40)
  • Introduction (00:40)
  • AD Users and Computers (00:36)
  • AD Users and Computers Demo (01:18)
  • Adding a New User in AD (04:49)
  • Adding a New Computer in AD (02:36)
  • Insert Client into a Domain (04:41)
  • AD Sites and Services (01:34)
  • AD Domains and Trusts (01:04)
  • Computer Management (02:42)
  • Tools (00:54)
  • Domain Name Service (DNS) (01:21)
  • DNS Demo (03:43)
  • Add an Alias (02:44)
  • Best Practices (01:31)
  • Summary (00:20)
AD Terms / Remote / MMC (41:52)
  • Introduction (00:38)
  • Active Directory Terms (02:51)
  • Remote Desktop (01:24)
  • Enable Remote Desktop (03:08)
  • Remote Desktop Options (04:36)
  • Save Rem. Desktop Shortcuts (02:58)
  • Adminpak.msi (01:30)
  • Install Adminpak.msi (01:40)
  • Adminpak Demo (04:17)
  • MS Management Console (01:12)
  • MMC Demo (00:45)
  • Add Snap-Ins to MMC (02:09)
  • Disable User Account (02:48)
  • Create User Template (02:38)
  • Add New User Using Template (01:33)
  • Create User Using DSADD (03:51)
  • Remove User Using DSRM (01:24)
  • Best Practices (01:45)
  • Summary (00:36)

Module 2

OUs / Searching / Groups (42:18)
  • Introduction (00:38)
  • Organization Unit Models (OU) (02:10)
  • Organization Unit Demo (07:00)
  • Names Associated with OUs (02:20)
  • Searching in Active Directory (00:59)
  • Searching in AD Demo (00:40)
  • Using the Find Tool in AD (01:19)
  • Using Custom Search (01:42)
  • Using Common Queries (00:57)
  • Create/Use Saved Queries (02:44)
  • Domain Functional Levels (00:59)
  • Groups in Active Directory (04:35)
  • Create a New Group (02:07)
  • Domain/Forest Levels (02:51)
  • Add a Group Using DSADD (01:59)
  • Remove a Group Using DSRM (01:11)
  • Find a User in a Group Visually (00:33)
  • Work with Groups Using dsget (02:19)
  • Modifying Group Scope (02:42)
  • Best Practices (01:59)
  • Summary (00:23)
Security / Shared Folders (37:47)
  • Introduction (00:30)
  • Access to Resources (02:48)
  • User SID, ACE, and DACL Info (04:21)
  • Folder and File Security (01:02)
  • Well-Known SIDs (01:54)
  • Well-Known SIDs Demo (01:43)
  • Permissions (01:30)
  • Permissions Demo (03:30)
  • Permission Types (01:24)
  • Permissions in AD (02:13)
  • Shared Folders (03:27)
  • Shared Folders Demo (00:26)
  • Network vs NTFS Permissions (02:36)
  • Shared Folder Permissions (02:07)
  • Hide a Shared Folder (02:32)
  • View a Hidden Shared Folder (00:32)
  • Naming a Share (01:49)
  • Create Shares from cmd (01:38)
  • Best Practices (01:07)
  • Summary (00:29)

Module 3

Shares / NTFS (41:42)
  • Introduction (00:34)
  • Administrative Shares (01:15)
  • View all Local Drive Shares (02:34)
  • Administrative Shares cont. (01:08)
  • View Administrative Shares (01:10)
  • Shared Folders (00:56)
  • Perm. to Create Shared Folder (04:31)
  • Create Shared Folders (03:34)
  • Publish Shared Folders (01:39)
  • Publish a Shared Folder in AD (02:19)
  • Map a Drive to a Shared Folder (01:18)
  • Shared Folder Permissions (01:28)
  • Shared Folder Perm. Demo (08:31)
  • NTFS (03:25)
  • File and Folder Permissions (01:36)
  • NTFS Permissions Demo (04:08)
  • Best Practices (01:12)
  • Summary (00:16)
Perm. / Caching / Printing (53:07)
  • Introduction (00:41)
  • Copy/Move Data Within NTFS (00:58)
  • Copy/Move Folders Demo (04:32)
  • Effective Permissions (00:52)
  • Determine Effective Permission (02:20)
  • Offline Files (03:03)
  • Offline Folder Caching (01:52)
  • Offline Caching Demo (03:13)
  • Printing Terminology (01:34)
  • Clients that Can Print (00:20)
  • Printing Methods (01:14)
  • Connect Printer Using TCP/IP (02:43)
  • Shared Network Printer (01:00)
  • Shared Printer Permissions (01:15)
  • Setting Shared Printer Perm. (05:32)
  • Printer Drivers (01:25)
  • Locate/Config. Printer Drivers (03:08)
  • Printer Spooler (01:30)
  • Setup and Use Print Spooling (04:43)
  • Print Priorities and Scheduling (02:03)
  • Setup Printer Scheduling (04:29)
  • Best Practices (03:58)
  • Summary (00:30)

Module 4

Active Directory / Group Policy (44:30)
  • Introduction (00:44)
  • AD Object Permissions (01:17)
  • View/Assign AD Object Perm. (03:26)
  • Char. of AD Objects Perms. (01:05)
  • Permission Inheritance (02:02)
  • Permission Inheritance Demo (04:49)
  • Delegating Control (02:09)
  • Delegation of Control Wizard (02:33)
  • Test New Delegation Perm. (06:08)
  • Group Policy (02:49)
  • Group Policy Management (01:34)
  • Edit the allUsers Group Policy (00:37)
  • Test allUsers Group Policy (03:42)
  • Group Policy Inheritance (01:38)
  • Create/Apply Policy to Cont. (04:14)
  • Block Inheritance to Containers (02:57)
  • Set Enforced Inheritance (02:09)
  • Summary (00:30)
More Group Policy (47:11)
  • Introduction (00:56)
  • Group Policy (01:20)
  • Local Computer Policy (00:21)
  • Group Policy Object Editor (02:18)
  • Edit a Group Policy (03:28)
  • Disable Shut Down Command (02:16)
  • Tools Used to Create GPOs (01:37)
  • Interface without GPMC (02:09)
  • Install GPMC (00:58)
  • GPMC (00:51)
  • Interface with GPMC Installed (00:35)
  • Group Policy Conflicts (00:53)
  • Group Policy Conflicts Demo (03:38)
  • Scripts in Group Policy (01:07)
  • Create/Execute a Script (02:30)
  • Attach Script Using GP (02:02)
  • Determining Applied Policy (01:40)
  • gpupdate / gpresult tools (03:38)
  • gpupdate / force (00:49)
  • GP Report/Modeling/Result (04:49)
  • Folder Redirection (01:37)
  • Folder Redirection Demo (06:29)
  • Summary (00:56)

Module 5

Security / Auditing / Log Files (36:24)
  • Introduction (00:30)
  • User Rights vs Permissions (00:48)
  • Where to Find User Rights (01:04)
  • Where to Find User Permission (01:09)
  • Security Policy (00:44)
  • Security Templates (03:07)
  • Testing Security Policy (00:48)
  • Create Security Templates (01:32)
  • Assign Security Templates (01:27)
  • Create New Security Template (01:19)
  • Security Config and Analysis (04:16)
  • Import New Template into GP (03:57)
  • Auditing (02:13)
  • Enable Auditing (03:38)
  • Auditing in the Event Viewer (05:29)
  • Audit with Group Policy (02:08)
  • Log Files (00:41)
  • Best Practices (00:43)
  • Summary (00:43)
Perf. / Drivers / File Storage (45:30)
  • Introduction (00:44)
  • Server Performance - Memory (03:02)
  • Memory Bottleneck (02:09)
  • Monitoring Mem. Performance (03:25)
  • Server Perf. - Processor (02:16)
  • Monitoring Processor Perf. (01:41)
  • Server Performance - Disks (01:54)
  • Monitor Disk Performance (01:49)
  • Server Performance - Network (02:14)
  • Maintaining Device Drivers (04:50)
  • Viewing Device Manager (00:33)
  • Device Details (02:16)
  • Scan for Hardware Changes (00:44)
  • GP Setting (Unsigned Driver) (01:00)
  • Driver Signing Options (00:47)
  • Use GP for Unsigned Devices (02:15)
  • Rollback Driver Installation (00:55)
  • Rollback Driver Install Demo (01:19)
  • Managing Data Storage (01:50)
  • Compact Command-Line Tool (01:17)
  • How to Compress Files/Folders (00:38)
  • Compress Files/Folders Demo (04:21)
  • Effects of Moving/Copying CD (01:17)
  • Best Practices (01:30)
  • Summary (00:34)
Encryption / Disk Quotas (17:42)
  • Introduction (00:41)
  • EFS Encryption (01:19)
  • Encrypt Data Using Explorer (03:33)
  • Enc/Dec with Cipher Command (02:09)
  • Decrypt Using Explorer (01:49)
  • Move/Copy Enc. Files/Folders (02:52)
  • Managing Disk Quotas (01:09)
  • Managing Disk Quotas Demo (03:36)
  • Summary (00:31)

Module 6

Disaster Recovery - Part 1 (25:49)
  • Introduction (00:58)
  • Safe Mode (02:30)
  • Safe Mode Options (00:58)
  • Safe Mode Demo (02:24)
  • Last Known Good Config (01:18)
  • Recovery Console (00:53)
  • Install the Recovery Console (01:27)
  • Enter Recovery Mode (02:59)
  • Windows Startup Disk (01:23)
  • Create a Startup Disk (03:58)
  • Restart Using the Startup Disk (01:02)
  • Simulate a Startup Failure (04:25)
  • Startup Disk Requirements (00:59)
  • Summary (00:29)
Disaster Recovery - Part 2 (17:05)
  • Introduction (00:41)
  • Disaster Recovery (00:40)
  • Automated System Recovery (01:08)
  • ASR Wizard (01:47)
  • Save Only System State Info (02:01)
  • ASR Restore (02:10)
  • Configure Shadow Copies (05:45)
  • Best Practices (02:30)
  • Summary (00:19)
Windows Update Services (16:33)
  • Introduction (00:39)
  • Software Update Services (00:35)
  • Requirements for SUS (00:58)
  • Install SUS (03:21)
  • Configure SUS (02:09)
  • Using SSL with SUS (01:12)
  • Backup SUS (04:03)
  • Restore SUS (02:00)
  • Best Practices (01:04)
  • Summary (00:28)
Disk Management (06:50)
  • Introduction (00:41)
  • Disk Management Overview (00:31)
  • DiskPart Utility (00:42)
  • Computer Management Demo (01:43)
  • DiskPart Tool Demo (02:41)
  • Summary (00:28)
RAID (08:56)
  • Introduction (00:28)
  • RAID Explained (01:21)
  • RAID Levels (02:08)
  • Software/Hardware RAID (00:55)
  • Disk Maintenance (01:10)
  • Software Site License (01:23)
  • 2003 License Console (01:03)
  • Summary (00:24)
Internet Information Server (22:07)
  • Introduction (00:29)
  • IIS 6.0 - What"s New? (01:38)
  • Install IIS With Manager Server (02:54)
  • Test the Installation (01:13)
  • Install Remote Admin Tools (01:27)
  • Test Remote Admin Tools (02:03)
  • machine.config File (01:36)
  • Built-In Configuration Scripts (02:27)
  • Application Pools (00:42)
  • Create an Application Pool (03:13)
  • IIS Configuration Backup (00:37)
  • IIS Config Backup Demo (02:32)
  • Best Practices (00:54)
  • Summary (00:17)
Terminal Services (14:49)
  • Introduction (00:25)
  • Terminal Services (00:56)
  • Installing Terminal Services (02:54)
  • Configuring Terminal Services (01:09)
  • Terminal Services Manager (01:56)
  • Use Group Policy for Config (02:42)
  • Remote Control (01:38)
  • Best Practices (02:50)
  • Summary (00:14)