وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Active Directory and Windows Server 40+ Hour with Labs

سرفصل های دوره

Domain Controllers (DC), Global Catalog, FSMO, Groups, Users, Security, Domains and Forests ,Trusts, GPO, much more..


1. Active Directory Introduction and Administration Tools
  • 1. Course introduction
  • 2. Module 1 Installing and configuring domain controllers. Overview
  • 3. AD DS components
  • 4. What is the AD DS schema
  • 5. What is an AD DS forest
  • 6. What is an AD DS domain
  • 7. What are OUs
  • 8. What is new in AD DS in Windows Server 2016
  • 9. What is Azure AD
  • 10. Overview of AD DS administration tools
  • 11. Using the Active Directory Administrative Center to administer and manage AD DS

  • 2. Overview of AD DS domain controllers
  • 1. Introduction
  • 2. What is a domain controller
  • 3. What is a global catalog
  • 4. Overview of domain controller SRV records
  • 5. AD DS sign-in process
  • 6. What are operations masters
  • 7. Transferring and seizing roles

  • 3. Deploying a domain controller
  • 1. Deploying a domain controller
  • 2. Installing a domain controller from Server Manager
  • 3. Demonstration Installing a domain controller from Server Manager
  • 4. Installing a domain controller on a Server Core installation of Windows Server 2
  • 5. Installing a domain controller by installing from media
  • 6. Cloning domain controllers
  • 7. Demonstration Cloning domain controllers
  • 8. Best Practices for Domain Controller Virtualization
  • 9. Demonstration Adding Another domain controllers
  • 10. Demonstration Installing a domain controller with Powershell
  • 11. Demonstration FSMO Roles

  • 4. Managing user accounts
  • 1. Managing user accounts
  • 2. Creating user accounts
  • 3. Configuring user account attributes
  • 4. Demonstration Managing user accounts
  • 5. Demonstration Creating user profiles
  • 6. Demonstration User account templates

  • 5. Using Windows PowerShell cmdlets to manage user accounts
  • 1. Using Windows PowerShell cmdlets to manage user accounts
  • 2. Using Windows PowerShell to create users
  • 3.1 9.Using Windows PowerShell for bulk users operations
  • 3. Using Windows PowerShell for bulk users operations
  • 4. Using Windows PowerShell to modify users properties
  • 5. Using Windows PowerShell to add users to groups
  • 6. Using Windows PowerShell to modify users properties. Part2
  • 7. Using Windows PowerShell to enablemove users
  • 8. Using Windows PowerShell to delete users
  • 9. Identity with Windows Server.html

  • 6. Managing groups in AD DS
  • 1. Managing groups in AD DS Section Overview
  • 2. Group types
  • 3. Group scopes
  • 4. Implementing group management
  • 5. Managing members with GPO
  • 6. Default groups
  • 7. Special identities
  • 8. Demonstration Managing groups in Windows Server

  • 7. Managing computer objects in AD DS
  • 1. Managing computer objects in AD DS Section Overview
  • 2. Specifying the location of computer accounts
  • 3. Controlling permissions to create computer accounts
  • 4. Joining a computer to a domain
  • 5. Resetting the computer account (secure channel)
  • 6. Performing an offline domain join

  • 8. Implementing and managing OUs
  • 1. Implementing and managing OUs Section Overview
  • 2. Planning OUs
  • 3. OU hierarchy considerations
  • 4. Considerations for using OUs
  • 5. AD DS permissions
  • 6. Delegating AD DS permissions

  • 9. Using Windows PowerShell for groups and computers administration
  • 1. Using Windows PowerShell for AD DS administration Section Overview
  • 2. Using Windows PowerShell cmdlets to manage groups
  • 3. PowerShell Managing, configuring and modifying Group objects. Part 1
  • 4. PowerShell Managing, configuring and modifying Group objects. Part 2
  • 5. PowerShell Managing, configuring and modifying Group objects. Part 3
  • 6. PowerShell Managing, configuring and modifying Group objects. Part 4
  • 7. PowerShell Managing, configuring and modifying Group objects. Part 5
  • 8. Windows PowerShell cmdlets to manage computers and OUs
  • 9. PowerShell Managing, configuring and modifying Computer objects. Part 1
  • 10. PowerShell Managing, configuring and modifying Computer objects. Part 2
  • 11. Powershell Key Concepts

  • 10. Advanced AD DS infrastructure management
  • 1. Course Overview
  • 2. Section Overview
  • 3. Overview of domain and forest boundaries in an AD DS structure
  • 4. Why implement multiple domains
  • 5. Why implement multiple forests
  • 6. Deploying a domain controller in Azure IaaS
  • 7. Managing objects in complex AD DS deployments
  • 8. Deploying a distributed AD DS environment. Section Overview
  • 9. AD DS domain functional levels
  • 10. AD DS forest functional levels
  • 11. Deploying new AD DS domains
  • 12. Considerations for implementing complex AD DS environments
  • 13. Demo Installing a domain controller in a new domain in an existing forest
  • 14. Upgrading a previous version of AD DS to Windows Server 2016
  • 15. Migrating to Windows Server 2016 AD DS from a previous version
  • 16. Configuring AD DS trusts. Section Overview
  • 17. Overview of different AD DS trust types
  • 18. How trusts work in a forest
  • 19. How trusts work between forests
  • 20. Configuring advanced AD DS trust settings

  • 11. Implementing and administering AD DS sites and replication
  • 1. Course Overview
  • 2. Section Overview
  • 3. What are AD DS partitions
  • 4. Characteristics of AD DS replication
  • 5. How AD DS replication works within a site
  • 6. Resolving replication conflicts
  • 7. How replication topology is generated
  • 8. How SYSVOL replication works
  • 9. Configuring AD DS sites Section Overview
  • 10. What are AD DS sites
  • 11. Why implement additional sites
  • 12. How replication works between sites
  • 13. What is the ISTG
  • 14. Overview of SRV records
  • 15. How client computers locate domain controllers within sites
  • 16. Moving domain controllers between sites
  • 17. Configuring and monitoring AD DS replication Section Overview
  • 18. What are AD DS site links
  • 19. What is site link bridging
  • 20. What is universal group membership caching
  • 21. Lab Sites and Replication. Exercies and Tasks
  • 22. Lab Sites and Replication. Solution
  • 23. Identity with Windows Server.html

  • 12. Implementing Group Policy
  • 1. Part 1
  • 2. Part 2
  • 3. Part 3
  • 4. Part 4
  • 5. Part 5
  • 6. Part 6
  • 7. Part 7
  • 8. Part 8
  • 9. Part 9
  • 10. Part 11
  • 11. Part 12
  • 12. Part 13
  • 13. Part 14
  • 14. Part 15
  • 15. Part 15
  • 16. Part 16
  • 17. Part 17
  • 18. Part 18
  • 19. Demo Delegating administration of Group Policy
  • 20. Part 19
  • 21. Part 20
  • 22. Part 21
  • 23. Part 22
  • 24. Part 23. Using sec. filtering
  • 25. Part 24
  • 26. Part 25
  • 27. Part 26
  • 28. Part 27
  • 29. Part 28
  • 30. Part 29
  • 31. Lab A Tasks Implementing a Group Policy infrastructure
  • 32. Lab A Solution Implementing a Group Policy infrastructure
  • 33. Lab Review

  • 13. Troubleshooting the application of GPOs
  • 1. Troubleshooting the application of GPOs Lesson Overview
  • 2. Refreshing GPOs
  • 3. What is RSoP
  • 4. Generating RSoP Report
  • 5. Demo Performing a what-if analysis with Group Policy Modeling Wizard
  • 6. Examining Group Policy event logs
  • 7. Detecting Group Policy health issues
  • 8. Review and Takeaways
  • 9. Lab B Tasks Troubleshooting Group Policy infrastructure
  • 10. Lab B Solution Troubleshooting Group Policy infrastructure
  • 11. Lab Review
  • 12. Module Review and Takeaways

  • 14. Managing user settings with Group Policy
  • 1. Course Overview
  • 2. Section Overview
  • 3. What are administrative templates
  • 4. What are .adm and .admx files
  • 5. Overview of the central store
  • 6. Demonstration Configuring settings with administrative templates
  • 7. Importing security templates
  • 8. Managing administrative templates

  • 15. Configuring Folder Redirection, Software Installation, and Scripts
  • 1. Section Overview
  • 2. What is Folder Redirection
  • 3. Settings for configuring Folder Redirection
  • 4. Security settings for redirected folders
  • 5. Demonstration Configuring Folder Redirection
  • 6. Managing software with Group Policy
  • 7. Group Policy settings for applying scripts
  • 8. Demonstration Configuring scripts with GPOs
  • 9. Identity with Windows Server.html

  • 16. Configuring Group Policy preferences
  • 1. Section Overview
  • 2. What are Group Policy preferences Comparing with Policy settings
  • 3. Features of Group Policy preferences
  • 4. Item-level targeting options
  • 5. Demonstration Configuring Group Policy preferences
  • 6. Identity with Windows Server.html
  • 7. Lab Tasks Managing user settings with Group Policy
  • 8. Lab Solution Managing user settings with Group Policy
  • 9. Lab Review Managing user settings with Group Policy
  • 10. Module Review and Takeaways Managing user settings with Group Policy

  • 17. Group Policy Deployment Strategies
  • 1. Designing a Group Policy Friendly AD
  • 2. Demo Designing a Group Policy Friendly AD
  • 3. Best Practices for GP Deployment
  • 4. Demo Best Practices for GP Deployment
  • 5. Designing for Performance
  • 6. Module Review and Takeaways

  • 18. Introduction to Group Policy Scripting
  • 1. The Microsoft Group Policy PowerShell Module
  • 2. Demo The Microsoft Group Policy PowerShell Module
  • 3. Basic GPO Management With PowerShell
  • 4. Demo Basic GPO Management With PowerShell

  • 19. Securing domain controllers
  • 1. Section Overview
  • 2. Security risks that can affect domain controllers
  • 3. Modifying the security settings of domain controllers
  • 4. Implementing secure authentication
  • 5. Securing physical access to domain controllers
  • 6. What are RODCs
  • 7. Deploying an RODC
  • 8. Planning and configuring an RODC password replication policy
  • 9. Demonstration Configuring a password replication policy
  • 10. Separating RODC local administration

  • 20. Implementing account security
  • 1. Section Overview
  • 2. Password policies
  • 3. Account lockout policies
  • 4. Kerberos policies
  • 5. Demonstration Configuring a fine-grained password policy
  • 6. Protecting groups in AD DS
  • 7. Fine-grained password and lockout policies
  • 8. Tools for creating PSOs
  • 9. Demonstration Configuring authentication-related audit policies and viewing log
  • 10. PSO precedence and resultant PSO
  • 11. Account-security options
  • 12. Configuring user account policies

  • 21. Implementing audit authentication
  • 1. Section Overview
  • 2. Account logon and logon events
  • 3. Demonstration Configuring authentication-related audit policies and viewing log
  • 4. Scoping audit policies

  • 22. Configuring managed service accounts
  • 1. Section Overview
  • 2. Overview of service accounts
  • 3. Challenges of using service accounts
  • 4. Overview of managed service accounts
  • 5. What are group MSAs
  • 6. Demonstration Configuring group MSAs
  • 7. Lab Securing AD DS Exercises and Tasks
  • 8. Lab Securing AD DS. Solution
  • 9. Lab Securing AD DS. Solution. Part 2
  • 10. Lab Review
  • 11. Module Review and Takeaways

  • 23. Securing Windows Server and Group Policy
  • 1. SMB Security Features
  • 2. Demo Securing SMB - Auditing and Blocking SMBv1
  • 3. Demo Securing SMB Part 2 - SMB Signing and Encryption
  • 4. NTLM Security
  • 5. Implementing NTLM Security
  • 6. DNS Security
  • 7. Implementing DNSSEC
  • 8. Secure Management
  • 9. Managing Servers Using Windows Admin Center

  • 24. Deploying CAs
  • 1. Plan Your Progress
  • 2. Course Overview
  • 3. Section Overview Deploying CAs
  • 4. What is AD CS
  • 5. Options for implementing CA hierarchies
  • 6. Standalone vs. enterprise CAs
  • 7. Considerations for deploying a root CA
  • 8. Demonstration Deploying an enterprise root CA
  • 9. Considerations for deploying a subordinate CA
  • 10. How to use the CAPolicy.inf file for installing a CA

  • 25. Administering CAs
  • 1. Section Overview Administering CAs
  • 2. Managing CAs
  • 3. Configuring CA security
  • 4. Security roles for CA administration
  • 5. Configuring CA policy and exit modules
  • 6. Configuring CDPs and AIA locations
  • 7. Demonstration Configuring CA properties

  • 26. Troubleshooting and maintaining CAs
  • 1. Section Overview Troubleshooting CAs
  • 2. Troubleshooting CAs
  • 3. Renewing a CA certificate
  • 4. Moving a root CA to another computer
  • 5. Monitoring CA operations
  • 6. Lab Task Deploying and managing AD CS
  • 7. Lab Demonstration Steps Deploying and managing AD CS

  • 27. Deploying and managing certificates. Deploying and managing certificate template
  • 1. Plan Your Progress
  • 2. Course Overview
  • 3. Section Overview
  • 4. What are certificates and certificate templates
  • 5. Certificate template versions in Windows Server 2016
  • 6. Configuring certificate template permissions
  • 7. Configuring certificate template settings
  • 8. Options for updating a certificate template
  • 9. Demonstration Modifying and enabling a certificate template

  • 28. Managing certificate deployment, revocation, and recovery
  • 1. Section Overview Section Overview Managing certificate deployment, revocation,
  • 2. Certificate enrollment methods
  • 3. Overview of certificate autoenrollment
  • 4. What is an enrollment agent
  • 5. How does certificate revocation work
  • 6. Overview of key archival and recovery
  • 7. Demonstration Configuring a CA for key archival
  • 8. Using certificates for SSL
  • 9. Using certificates for digital signatures
  • 10. Using certificates for content encryption
  • 11. Demonstration Signing a document digitally. Encrypting a file with EFS

  • 29. Lab Deploying and using certificates
  • 1. Lab Task Deploying and using certificates
  • 2. Lab Demonstration Steps Deploying and using certificates

  • 30. Implementing and Administering AD FS
  • 1. Course Overview
  • 2. Overview of AD FS Section Overview
  • 3. What is identity federation
  • 4. What are claims-based identity and claims-based authentication
  • 5. Overview of web services
  • 6. What is AD FS
  • 7. Whats new in AD FS in Windows Server 2016
  • 8. How AD FS enables SSo in a single organization
  • 9. Section overview AD FS requirements and planning
  • 10 AD FS components
  • 11 AD FS requirements
  • 12. PKI and certificate requirements
  • 13. Federation server roles
  • 14. Planning an AD FS deployment for online services
  • 15. Planning a highly available AD FS deployment
  • 16. Capacity planning

  • 31. Deploying and configuring AD FS
  • 1. Section Overview Deploying and configuring AD FS
  • 2. What are AD FS claims and claim rules
  • 3. What is a claims provider trust
  • 4. Installing and configuring AD FS
  • 5. Configuring an account partner and a resource partner
  • 6. Configuring claims rules
  • 7. How home realm discovery works
  • 8. Managing an AD FS deployment

  • 32. Web Application Proxy
  • 1. Web Application Proxy. Section Overview
  • 2. What is the Web Application Proxy
  • 3. Web Application Proxy and AD FS proxy
  • 4. Web Application Proxy authentication methods
  • 5. Scenarios for using the Web Application Proxy

  • 33. Implementing Server 2019 Identity Federation and Access Hands-On and Exras
  • 1. Understanding Active Directory Federation Services
  • 2. Whats New in ADFS 2019
  • 3. The Lab Environment
  • 4. Understanding Certificates for ADFS
  • 5. Generating the ADFS Service Certificate
  • 6. Installing ADFS 2019
  • 7. Understanding the ADFS Upgrade Process
  • 8. Upgrading an ADFS 2016 Environment to ADFS 2019
  • 9. Exploring the ADFSHelp Website
  • 10. The ADFS Diagnostics Analyzer
  • 11. The ADFS Rapid Restore Tool
  • 12. Understanding Claims in ADFS
  • 13. Single Sign-on and Federation with WS-Federation and SAML
  • 14. Modern Authentication with OpenID Connect and OAuth 2.0
  • 15. Understanding Application Groups
  • 16. Configuring an Application Group and Claims in ADFS
  • 17. Deploy the Sample Application to IIS

  • 34. Even More on Group Policy - Group Policy Processing
  • 1. Group Policy Processing
  • 2. Demo Understanding Group Policy Processing
  • 3. Group Policy Targeting
  • 4. Demo Group Policy Targeting at Work
  • 5. Group Policy Linking, Filtering, and Order of Processing
  • 6. Demo Examples of GPO Linking, Filtering, and LSDOU
  • 7. GPO Processing Hierarchy
  • 8. Demo GPO Processing Hierarchy
  • 9. Summary

  • 35. Tools of the Trade
  • 1. Installing the GPMC
  • 2. Demo Downloading and Installing GPMC
  • 3. Navigating the GPMC
  • 4. Demo Navigating the GPMC
  • 5. Understanding GPO Properties
  • 6. Demo Understanding GPO Properties
  • 7. Creating and Editing GPOs
  • 8. Demo Creating, Editing, and Commenting GPOs
  • 9. Summary

  • 36. How Group Policy Gets Applied
  • 1. The Group Policy Processing Cycle
  • 2. Background and Foreground Processing
  • 3. Synchronous and Asynchronous Processing
  • 4. Demo Synchronous and Asynchronous Processing
  • 5. Group Policy Processing Mechanics
  • 6. Demo Group Policy Processing Mechanics
  • 7. Manual GP Processing
  • 8. Demo Manual GP Processing
  • 9. Summary

  • 37. Policy Scenarios - Desktop and Server Lockdown
  • 1. Understanding Administrative Templates Policy
  • 2. Demo How Registry Tattooing Works
  • 3. Administrative Templates and ADMX Files
  • 4. Demo Administrative Templates and ADMX Files
  • 5. Deploying Administrative Templates
  • 6. Summary

  • 38. Policy Scenarios - Security Policy
  • 1. Overview of Available Security Policy
  • 2. Deployment Scenario Group Membership Control
  • 3. Demo Group Membership Control
  • 4. Deployment Scenario Managing Windows Firewall
  • 5. Demo Managing Windows Firewall
  • 6. Application Control Policies (AppLocker)
  • 7. Demo AppLocker
  • 8. Demo AppLocker

  • 39. Policy Scenarios - Managing Internet Explorer Configuration
  • 1. The Three Policy Areas for Managing IE
  • 2. Demo Introducing the Three IE Policy Areas
  • 3. Using GP Preferences Internet Settings
  • 4. Demo Using GP Preferences Internet Settings
  • 5. Using IE Administrative Templates
  • 6. Demo Using IE Administrative Templates
  • 7. Managing (and Removing) IE Maintenance Policy
  • 8. Demo Managing (and Removing) IE Maintenance Policy
  • 9. Summary

  • 40. Even More on Group Policy - Scenarios - Deploying Software Using Group Policy
  • 1. Capabilities and Features in Group Policy Software Installation
  • 2. Demo Capabilities & Features in Group Policy Installation
  • 3. GPSI Best Practices
  • 4. Demo Deploying Software Using Group Policy
  • 5. Managing the Software Lifecycle
  • 6. Demo Patching an Existing Deployment
  • 7. Summary

  • 41. Policy Scenarios - Folder Redirection, User Settings, and Data
  • 1. How Folder Redirection Helps Redirect User Settings & Data
  • 2. Demo Understanding the User Profile
  • 3. Implementing Folder Redirection
  • 4. Demo Implementing Folder Redirection
  • 5. Using Group Policy Preferences for Folder Redirection
  • 6. Demo Using Group Policy Preferences for Folder Redirection
  • 7. Summary

  • 42. Policy Scenarios - Introduction to Group Policy Preferences
  • 1. Group Policy Preferences Overview
  • 2. Demo Group Policy Preferences Overview
  • 3. Managing Local Users and Groups
  • 4. Demo Managing Local Users and Groups
  • 5. GPP Drive Mapping
  • 6. Demo GPP Drive Mapping
  • 7. GPP Printer Mapping
  • 8. Demo GPP Printer Mapping
  • 9. Using GPP for Registry Changes
  • 10. Demo Using GPP for Registry Changes
  • 11. Summary

  • 43. Policy Scenarios - Managing StartupLogon Scripts
  • 1. Group Policy Scripts Capabilities and Limitations
  • 2. Demo Navigating Group Policy Scripts
  • 3. Deploying StartupShutdown Scripts
  • 4. Demo Deploying StartupShutdown Scripts
  • 5. Deploying LogonLogoff Scripts
  • 6. Demo Deploying LogonLogoff Scripts
  • 7. Script Configuration Options
  • 8. Summary

  • 44. Kiosks and Remote Desktop Services Scenario
  • 1. Understanding Group Policy Loopback Processing
  • 2. Demo Understanding Group Policy Loopback Processing
  • 3. Kiosk Configurations and Loopback Processing
  • 4. Demo Kiosk Configurations and Loopback Processing
  • 5. RDS, VDI, and Loopback Processing
  • 6. Summary

  • 45. Group Policy Management Tasks
  • 1. GPO Backup and Restoral
  • 2. Demo GPO Backup and Restoral
  • 3. Group Policy Delegation
  • 4. Demo Group Policy Delegation
  • 5. GPO Import Tasks
  • 6. Demo GPO Import Tasks
  • 7. Demo Starter GPO

  • 46. Basic Group Policy Troubleshooting
  • 1. Common Group Policy Problems
  • 2. Troubleshooting with RSoP
  • 3. Demo Troubleshooting with RSoP
  • 4. Monitoring GPO Replication
  • 5. Demo Monitoring GPO Replication
  • 6. Group Policy Logging
  • 7. Demo Group Policy Logging
  • 8. Group Policy Tracing
  • 9. Demo Group Policy Tracing
  • 53,700 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 30258
    حجم: 18878 مگابایت
    مدت زمان: 2473 دقیقه
    تاریخ انتشار: 2 اسفند 1402
    طراحی سایت و خدمات سئو

    53,700 تومان
    افزودن به سبد خرید