Planning and
Implementing Server Roles and Server Security |
Configure security for servers that
are assigned specific roles. |
|
Plan a secure baseline
installation.
- Plan a strategy to enforce system default security settings
on new systems.
- Identify client operating system default security settings.
- Identify all server operating system default security
settings.
|
|
Plan security for servers that are
assigned specific roles. Roles might include domain controllers, Web
servers, database servers, and mail servers.
- Deploy the security configuration for servers that are
assigned specific roles.
- Create custom security templates based on server roles.
|
|
Evaluate and select the operating
system to install on computers in an enterprise.
- Identify the minimum configuration to satisfy security
requirements.
|
|
Planning,
Implementing, and Maintaining a Network Infrastructure |
Plan a TCP/IP network
infrastructure strategy.
- Analyze IP addressing requirements.
- Plan an IP routing solution.
- Create an IP subnet scheme.
|
|
Plan and modify a network topology.
- Plan the physical placement of network resources.
- Identify network protocols to be used.
|
|
Plan an Internet connectivity
strategy. |
|
Plan network traffic monitoring.
Tools might include Network Monitor and System Monitor. |
|
Troubleshoot connectivity to the
Internet.
- Diagnose and resolve issues related to Network Address
Translation (NAT).
- Diagnose and resolve issues related to name resolution cache
information.
- Diagnose and resolve issues related to client configuration.
|
|
Troubleshoot TCP/IP addressing.
- Diagnose and resolve issues related to client computer
configuration.
- Diagnose and resolve issues related to DHCP server address
assignment.
|
|
Plan a host name resolution
strategy.
- Plan a DNS namespace design.
- Plan zone replication requirements.
- Plan a forwarding configuration.
- Plan for DNS security.
- Examine the interoperability of DNS with third-party DNS
solutions.
|
|
Plan a NetBIOS name resolution
strategy.
- Plan a WINS replication strategy.
- Plan NetBIOS name resolution by using the Lmhosts file.
|
|
Troubleshoot host name resolution.
- Diagnose and resolve issues related to DNS services.
- Diagnose and resolve issues related to client computer
configuration.
|
|
Planning,
Implementing, and Maintaining Routing and Remote Access |
Plan a routing strategy.
- Identify routing protocols to use in a specified
environment.
- Plan routing for IP multicast traffic.
|
|
Plan security for remote access
users.
- Plan remote access policies.
- Analyze protocol security requirements.
- Plan authentication methods for remote access clients.
|
|
Implement secure access between
private networks.
- Create and implement an IPSec policy.
|
|
Troubleshoot TCP/IP routing. Tools
might include the route, tracert, ping, pathping, and netsh commands
and Network Monitor.
|
|
Planning,
Implementing, and Maintaining Server Availability |
Plan services for high
availability.
- Plan a high availability solution that uses clustering
services.
- Plan a high availability solution that uses Network Load
Balancing.
|
|
Identify system bottlenecks,
including memory, processor, disk, and network related bottlenecks.
- Identify system bottlenecks by using System Monitor.
|
|
Implement a cluster server.
- Recover from cluster node failure.
|
|
Manage Network Load Balancing.
Tools might include the Network Load Balancing Monitor Microsoft
Management Console (MMC) snap-in and the WLBS cluster control
utility.
|
|
Plan a backup and recovery
strategy.
- Identify appropriate backup types. Methods include full,
incremental, and differential.
- Plan a backup strategy that uses volume shadow copy.
- Plan system recovery that uses Automated System Recovery
(ASR).
|
|
Planning and
Maintaining Network Security |
Configure network protocol
security.
- Configure protocol security in a heterogeneous client
computer environment.
- Configure protocol security by using IPSec policies.
|
|
Configure security for data
transmission.
- Configure IPSec policy settings.
|
|
Plan for network protocol security.
- Specify the required ports and protocols for specified
services.
- Plan an IPSec policy for secure network communications.
|
|
Plan secure network administration
methods.
- Create a plan to offer Remote Assistance to client
computers.
- Plan for remote administration by using Terminal Services.
|
|
Plan security for wireless
networks. |
|
Plan security for data
transmission.
- Secure data transmission between client computers to meet
security requirements.
- Secure data transmission by using IPSec.
|
|
Troubleshoot security for data
transmission. Tools might include the IP Security Monitor MMC
snap-in and the Resultant Set of Policy (RSoP) MMC snap-in. |
|
Planning,
Implementing, and Maintaining Security Infrastructure. |
Configure Active Directory
directory service for certificate publication. |
|
Plan a public key infrastructure (PKI)
that uses Certificate Services.
- Identify the appropriate type of certificate authority to
support certificate issuance requirements.
- Plan the enrollment and distribution of certificates.
- Plan for the use of smart cards for authentication.
|
|
Plan a framework for planning and
implementing security.
- Plan for security monitoring.
- Plan a change and configuration management framework for
security.
|
|
Plan a security update
infrastructure. Tools might include Microsoft Baseline Security
Analyzer and Microsoft Software Update Services. |
|
Planning and
Implementing an Active Directory Infrastructure |
Plan a strategy for placing global
catalog servers.
- Evaluate network traffic considerations when placing global
catalog servers.
- Evaluate the need to enable universal group caching.
|
|
Plan flexible operations master
role placement.
- Plan for business continuity of operations master roles.
- Identify operations master role dependencies.
|
|
Implement an Active Directory
directory service forest and domain structure.
- Create the forest root domain.
- Create a child domain.
- Create and configure Application Data Partitions.
- Install and configure an Active Directory domain controller.
- Set an Active Directory forest and domain functional level
based on requirements.
- Establish trust relationships. Types of trust relationships
might include external trusts, shortcut trusts, and cross-forest
trusts.
|
|
Implement an Active Directory site
topology.
- Configure site links.
- Configure preferred bridgehead servers.
|
|
Plan an administrative delegation
strategy.
- Plan an organizational unit (OU) structure based on
delegation requirements.
- Plan a security group hierarchy based on delegation
requirements.
|
|
Managing and
Maintaining an Active Directory Infrastructure |
Manage an Active Directory forest
and domain structure.
- Manage trust relationships.
- Manage schema modifications.
- Add or remove a UPN suffix.
|
|
Manage an Active Directory site.
- Configure replication schedules.
- Configure site link costs.
- Configure site boundaries.
|
|
Monitor Active Directory
replication failures. Tools might include Replication Monitor, Event
Viewer, and support tools.
- Monitor Active Directory replication.
- Monitor File Replication service (FRS) replication.
|
|
Restore Active Directory directory
services.
- Perform an authoritative restore operation.
- Perform a nonauthoritative restore operation.
|
|
Troubleshoot Active Directory.
- Diagnose and resolve issues related to Active Directory
replication.
- Diagnose and resolve issues related to operations master
role failure.
- Diagnose and resolve issues related to the Active Directory
database.
|
|
Planning and
Implementing User, Computer, and Group Strategies |
Plan a security group strategy. |
|
Plan a user authentication
strategy.
- Plan a smart card authentication strategy.
- Create a password policy for domain users.
|
|
Plan an OU structure.
- Analyze the administrative requirements for an OU.
- Analyze the Group Policy requirements for an OU structure.
|
|
Implement an OU structure.
- Create an OU.
- Delegate permissions for an OU to a user or to a security
group.
- Move objects within an OU hierarchy.
|
|
Planning and
Implementing Group Policy
|
Plan Group Policy strategy.
- Plan a Group Policy strategy by using Resultant Set of
Policy (RSoP) Planning mode.
- Plan a strategy for configuring the user environment by
using Group Policy.
- Plan a strategy for configuring the computer environment by
using Group Policy.
|
|
Configure the user environment by
using Group Policy.
- Distribute software by using Group Policy.
- Automatically enroll user certificates by using Group
Policy.
- Redirect folders by using Group Policy.
- Configure user security settings by using Group Policy.
|
|
Deploy a computer environment by
using Group Policy.
- Distribute software by using Group Policy.
- Automatically enroll computer certificates by using Group
Policy.
- Configure computer security settings by using Group Policy.
|
|
Managing and
Maintaining Group Policy
|
Troubleshoot issues related to
Group Policy application. deployment. Tools might include RSoP and
the gpresult command. |
|
Maintain installed software by
using Group Policy.
- Distribute updates to software distributed by Group Policy.
- Configure automatic updates for network clients by using
Group Policy.
|
|
Troubleshoot the application of
Group Policy security settings. Tools might include RSoP and the
gpresult command. |
|