Acknowledgments |
|
xxi | |
About This Book |
|
xxiii | |
|
|
xxiii | |
|
|
xxiv | |
|
|
xxiv | |
|
|
xxv | |
|
Part 1: Learn at Your Own Pace |
|
|
xxv | |
|
Part 2: Prepare for the Exam |
|
|
xxvi | |
|
|
xxvi | |
|
|
xxvii | |
|
|
xxviii | |
|
|
xxviii | |
|
|
xxviii | |
|
|
xxix | |
|
|
xxix | |
|
The Microsoft Certified Professional Program |
|
|
xxx | |
|
|
xxxi | |
|
Requirements for Becoming a Microsoft Certified Professional |
|
|
xxxi | |
|
|
xxxii | |
|
Evaluation Edition Software Support |
|
|
xxxiii | |
Part I Learn at Your Own Pace |
|
|
1 Planning and Configuring an Authentication Strategy |
|
|
1-3 | (1) |
|
|
1-3 | (1) |
|
|
1-4 | (1) |
|
Lesson 1: Understanding the Components of an Authentication Model |
|
|
1-6 | (1) |
|
The Difference Between Authentication and Authorization |
|
|
1-6 | (1) |
|
Network Authentication Systems |
|
|
1-7 | (1) |
|
|
1-8 | (1) |
|
Authentication Features of Windows Server 2003 |
|
|
1-9 | (1) |
|
Authentication Protocols in Windows Server 2003 |
|
|
1-9 | (1) |
|
|
1-11 | (1) |
|
|
1-12 | (1) |
|
The Kerberos Authentication Process |
|
|
1-13 | (1) |
|
Storage of Local User Credentials |
|
|
1-15 | (1) |
|
Tools for Troubleshooting Authentication Problems |
|
|
1-16 | (1) |
|
|
1-16 | (1) |
|
|
1-17 | (1) |
|
Lesson 2: Planning and Implementing an Authentication Strategy |
|
|
1-18 | (1) |
|
Considerations for Evaluating Your Environment |
|
|
1-18 | (1) |
|
Guidelines for Creating a Strong Password Policy |
|
|
1-19 | (1) |
|
Options for Account Lockout Policies |
|
|
1-21 | (1) |
|
Options for Creating a Kerberos Ticket Policy |
|
|
1-22 | (1) |
|
Windows 2003 Authentication Methods for Earlier Operating Systems |
|
|
1-24 | (1) |
|
Using Multifactor Authentication |
|
|
1-27 | (1) |
|
Practice: Adjusting Authentication Options |
|
|
1-28 | (1) |
|
|
1-30 | (1) |
|
|
1-31 | (1) |
|
Lesson 3: Configuring Authentication for Web Users |
|
|
1-32 | (1) |
|
Configuring Anonymous Access for Web Users |
|
|
1-32 | (1) |
|
Configuring Web Authentication |
|
|
1-33 | (1) |
|
|
1-34 | (1) |
|
Practice: Configuring Anonymous Authentication |
|
|
1-36 | (1) |
|
|
1-39 | (1) |
|
|
1-40 | (1) |
|
Lesson 4: Creating Trusts in Windows Server 2003 |
|
|
1-41 | (1) |
|
Trusts in Windows Server 2003 |
|
|
1-43 | (1) |
|
Practice: Creating Trusts |
|
|
1-49 | (1) |
|
|
1-53 | (1) |
|
|
1-55 | (1) |
|
|
1-56 | (1) |
|
|
1-57 | (1) |
|
|
1-58 | (1) |
|
|
1-60 | (1) |
|
|
1-60 | (1) |
|
|
1-60 | (1) |
|
|
1-61 | (1) |
|
Design Activity: Case Scenario Exercise |
|
|
1-65 | (1) |
|
Design Activity: Troubleshooting Lab |
|
|
1-65 | (1) |
|
2 Planning and Configuring an Authorization Strategy |
|
|
2-1 | (1) |
|
|
2-1 | (1) |
|
|
2-2 | (1) |
|
Lesson 1: Understanding Authorization |
|
|
2-3 | (1) |
|
|
2-3 | (1) |
|
|
2-4 | (1) |
|
|
2-5 | (1) |
|
Standard and Special Permissions |
|
|
2-7 | (1) |
|
Practice: Denying Access Using Group Membership |
|
|
2-14 | (1) |
|
|
2-16 | (1) |
|
|
2-18 | (1) |
|
Lesson 2: Managing Groups in Windows Server 2003 |
|
|
2-19 | (1) |
|
Types of Groups in Windows Server 2003 |
|
|
2-19 | (1) |
|
|
2-20 | (1) |
|
Domain and Forest Functional Levels |
|
|
2-22 | (1) |
|
|
2-24 | (1) |
|
Special Groups and Accounts |
|
|
2-28 | (1) |
|
Tools for Administering Security Groups |
|
|
2-32 | (1) |
|
Creating Restricted Groups Policy |
|
|
2-32 | (1) |
|
Practice: Creating Groups and Assigning Rights |
|
|
2-34 | (1) |
|
|
2-35 | (1) |
|
|
2-37 | (1) |
|
Lesson 3: Planning, Implementing, and Maintaining an Authorization Strategy |
|
|
2-38 | (1) |
|
Authentication, Authorization, and the Principle of Least Privilege |
|
|
2-38 | (1) |
|
User/ACL Authorization Method |
|
|
2-39 | (1) |
|
Account Group/ACL Authorization Method |
|
|
2-39 | (1) |
|
Account Group/Resource Group Authorization Method |
|
|
2-40 | (1) |
|
|
2-41 | (1) |
|
Defining Which Users Can Create Groups |
|
|
2-43 | (1) |
|
|
2-44 | (1) |
|
|
2-44 | (1) |
|
|
2-45 | (1) |
|
|
2-46 | (1) |
|
Lesson 4: Troubleshooting Authorization Problems |
|
|
2-47 | (1) |
|
Troubleshooting Simple Authorization Problems |
|
|
2-47 | (1) |
|
Troubleshooting Complex Authorization Problems |
|
|
2-48 | (1) |
|
|
2-54 | (1) |
|
|
2-55 | (1) |
|
|
2-55 | (1) |
|
|
2-55 | (1) |
|
|
2-56 | (1) |
|
|
2-57 | (1) |
|
|
2-57 | (1) |
|
|
2-57 | (1) |
|
|
2-58 | (1) |
|
|
2-59 | (1) |
|
|
2-59 | (1) |
|
|
2-60 | (1) |
|
|
2-61 | (1) |
|
Design Activity: Case Scenario Exercise |
|
|
2-65 | (1) |
|
Design Activity: Troubleshooting Lab |
|
|
2-65 | (1) |
|
3 Deploying and Troubleshooting Security Templates |
|
|
3-1 | (7) |
|
Why This Chapter Matters 3-2 |
|
|
|
|
|
Lesson 1: Configuring Security Templates 3-4 |
|
|
|
Predefined Security Templates |
|
|
3-5 | (1) |
|
Security Template Planning |
|
|
3-6 | (1) |
|
Creating and Editing Security Templates |
|
|
3-7 | (1) |
|
Security Template Settings |
|
|
3-9 | (1) |
|
Security Configuration for Earlier Versions of Windows |
|
|
3-13 | (1) |
|
Practice: Create and Examine a New Security Template |
|
|
3-14 | (1) |
|
|
3-16 | (1) |
|
|
3-17 | (1) |
|
Lesson 2: Deploying Security Templates |
|
|
3-18 | (1) |
|
Deploying Security Templates Using Active Directory |
|
|
3-18 | (1) |
|
Deploying Security Templates Without Active Directory |
|
|
3-25 | (1) |
|
Practice: Applying and Deploying Security Templates |
|
|
3-27 | (1) |
|
|
3-29 | (1) |
|
|
3-30 | (1) |
|
Lesson 3: Troubleshooting Security Templates |
|
|
3-31 | (1) |
|
Troubleshooting Problems with Applying Group Policy |
|
|
3-31 | (1) |
|
Troubleshooting Unexpected Security Settings |
|
|
3-38 | (1) |
|
Troubleshooting System Policy |
|
|
3-43 | (1) |
|
|
3-44 | (1) |
|
|
3-45 | (1) |
|
|
3-45 | (1) |
|
|
3-48 | (1) |
|
|
3-49 | (1) |
|
|
3-50 | (1) |
|
|
3-50 | (1) |
|
|
3-50 | (1) |
|
|
3-51 | (1) |
|
Design Activity: Case Scenario Exercise |
|
|
3-54 | (1) |
|
Design Activity: Troubleshooting Exercise |
|
|
3-55 | (1) |
|
4 Hardening Computers for Specific Roles |
|
|
4-1 | (1) |
|
|
4-1 | (1) |
|
|
4-2 | (1) |
|
Lesson 1: Tuning Security for Client Roles 4-3 |
|
|
|
Planning Managed Client Computers 4-4 |
|
|
|
Software Restriction Policies |
|
|
4-5 | (1) |
|
Security for Desktop Computers |
|
|
4-7 | (1) |
|
Security for Mobile Computers |
|
|
4- | (1) |
|
|
4-9 | (1) |
|
Practice: Restricting Software |
|
|
4-10 | (1) |
|
|
4-13 | (1) |
|
|
4-14 | (1) |
|
Lesson 2: Tuning Security for Server Roles |
|
|
4-15 | (1) |
|
|
4-16 | (1) |
|
|
4-19 | (1) |
|
Security for DHCP Servers |
|
|
4-21 | (1) |
|
|
4-26 | (1) |
|
Security for Domain Controllers |
|
|
4-29 | (1) |
|
Security for Internet Information Services |
|
|
4-31 | (1) |
|
Security for Internet Authentication Service |
|
|
4-39 | (1) |
|
Security for Exchange Server |
|
|
4-43 | (1) |
|
|
4-46 | (1) |
|
Practice: Hardening Servers and Analyzing Traffic |
|
|
4-50 | (1) |
|
|
4-52 | (1) |
|
|
4-54 | (1) |
|
Lesson 3: Analyzing Security Configurations |
|
|
4-55 | (1) |
|
Security Configuration And Analysis |
|
|
4-55 | (1) |
|
Microsoft Baseline Security Analyzer-Graphical interface |
|
|
4-56 | (1) |
|
Microsoft Baseline Security Analyzer-Command-Line Interface |
|
|
4-58 | (1) |
|
Practice: Analyzing Security Configurations |
|
|
4-58 | (1) |
|
|
4-60 | (1) |
|
|
4-60 | (1) |
|
|
4-61 | (1) |
|
|
4-63 | (1) |
|
|
4-65 | (1) |
|
|
4-66 | (1) |
|
|
4-66 | (1) |
|
|
4-67 | (1) |
|
|
4-68 | (1) |
|
Design Activity: Case Scenario Exercise |
|
|
4-70 | (1) |
|
Design Activity : Troubleshooting Lab |
|
|
4-73 | (1) |
|
5 Planning an Update Management Infrastructure |
|
|
5-1 | (1) |
|
|
5-1 | (1) |
|
|
5-2 | (1) |
|
Lesson 1: Updating Fundamentals |
|
|
5-3 | (1) |
|
|
5-3 | (1) |
|
|
5-4 | (1) |
|
|
5-10 | (1) |
|
|
5-11 | (1) |
|
|
5-12 | (1) |
|
|
5-13 | (1) |
|
Lesson 2: Updating Infrastructure |
|
|
5-14 | (1) |
|
|
5-14 | (1) |
|
Assessing Your Environment |
|
|
5-15 | (1) |
|
|
5-16 | (1) |
|
The Update Test Environment |
|
|
5-24 | (1) |
|
Practice: Evaluating Your Updating Infrastructure |
|
|
5-25 | (1) |
|
|
5-26 | (1) |
|
|
5-27 | (1) |
|
Lesson 3: Updating Process |
|
|
5-28 | (1) |
|
|
5-29 | (1) |
|
|
5-30 | (1) |
|
|
5-32 | (1) |
|
|
5-33 | (1) |
|
|
5-33 | (1) |
|
|
5-34 | (1) |
|
|
5-35 | (1) |
|
Practice: Evaluating Your Updating Process |
|
|
5-36 | (1) |
|
|
5-36 | (1) |
|
|
5-37 | (1) |
|
|
5-37 | (1) |
|
|
5-37 | (1) |
|
|
5-39 | (1) |
|
|
5-42 | (1) |
|
|
5-43 | (1) |
|
|
5-43 | (1) |
|
|
5-44 | (1) |
|
|
5-44 | (1) |
|
|
5-45 | (1) |
|
Design Activity: Case Scenario Exercise |
|
|
5-48 | (1) |
|
Design Activity: Troubleshooting Lab |
|
|
5-50 | (1) |
|
6 Assessing and Deploying a Patch Management Infrastructure |
|
|
6-1 | (1) |
|
|
6-1 | (1) |
|
|
6-2 | (1) |
|
Lesson 1: Assessing Patch Levels |
|
|
6-3 | (1) |
|
|
6-3 | (1) |
|
|
6-6 | (1) |
|
Practice: Assessing Patch Levels on the Current Network |
|
|
6-11 | (1) |
|
|
6-13 | (1) |
|
|
6-14 | (1) |
|
Lesson 2: Deploying Updates on New Clients |
|
|
6-15 | (1) |
|
|
6-15 | (1) |
|
|
6-19 | (1) |
|
Scripting Non-Microsoft Updates |
|
|
6-23 | (1) |
|
Practice: Creating an Integrated Installation |
|
|
6-24 | (1) |
|
|
6-25 | (1) |
|
|
6-26 | (1) |
|
Lesson 3: Deploying Updates on Existing Clients |
|
|
6-27 | (1) |
|
Manually Applying Updates |
|
|
6-27 | (1) |
|
|
6-29 | (1) |
|
|
6-29 | (1) |
|
|
6-32 | (1) |
|
|
6-36 | (1) |
|
Practice: Configuring Software Update Services and the Automatic Updates Client |
|
|
6-38 | (1) |
|
|
6-41 | (1) |
|
|
6-42 | (1) |
|
|
6-43 | (1) |
|
|
6-43 | (1) |
|
|
6-43 | (1) |
|
|
6-45 | (1) |
|
|
6-45 | (1) |
|
|
6-46 | (1) |
|
|
6-46 | (1) |
|
|
6-47 | (1) |
|
|
6-47 | (1) |
|
|
6-48 | (1) |
|
|
6-49 | (1) |
|
Design Activity: Case Scenario Exercise |
|
|
6-51 | (1) |
|
Design Activity: Troubleshooting Lab |
|
|
6-53 | (1) |
|
7 Installing, Configuring, and Managing Certification Services |
|
|
7-1 | (1) |
|
|
7-1 | (1) |
|
|
7-2 | (1) |
|
Lesson 1: Public Key Infrastructure Fundamentals |
|
|
7-3 | (1) |
|
Cryptography and Encryption |
|
|
7-3 | (1) |
|
Public Key Infrastructure |
|
|
7-4 | (1) |
|
Windows Server 2003 Certificate Services |
|
|
7-8 | (1) |
|
Practice: Configuring a CA Hierarchy |
|
|
7-13 | (1) |
|
|
7-17 | (1) |
|
|
7-17 | (1) |
|
Lesson 2: Managing Certificate Templates |
|
|
7-19 | (1) |
|
Overview of Certificate Templates |
|
|
7-19 | (1) |
|
Certificate Template Versions |
|
|
7-21 | (1) |
|
Certificate Template Usage |
|
|
7-21 | (1) |
|
Certificate Template Permissions |
|
|
7-24 | (1) |
|
Methods for Updating a Certificate Template |
|
|
7-25 | (1) |
|
Practice: Superseding Certificate Templates |
|
|
7-27 | (1) |
|
|
7-29 | (1) |
|
|
7-30 | (1) |
|
Lesson 3: Deploying and Revoking Certificates |
|
|
7-31 | (1) |
|
Certificate Enrollment Process |
|
|
7-31 | (1) |
|
Certificate Enrollment Methods |
|
|
7-32 | (1) |
|
|
7-35 | (1) |
|
|
7-36 | (1) |
|
Troubleshooting CRL Publishing |
|
|
7-38 | (1) |
|
Practice: Creating and Revoking Certificates |
|
|
7-39 | (1) |
|
|
7-44 | (1) |
|
|
7-45 | (1) |
|
Lesson 4: Archiving and Recovering Certificates |
|
|
7-46 | (1) |
|
|
7-46 | (1) |
|
|
7-47 | (1) |
|
|
7-49 | (1) |
|
|
7-50 | (1) |
|
Practice: Exporting and Recovering Keys |
|
|
7-52 | (1) |
|
|
7-58 | (1) |
|
|
7-59 | (1) |
|
|
7-59 | (1) |
|
|
7-59 | (1) |
|
|
7-60 | (1) |
|
|
7-61 | (1) |
|
|
7-61 | (1) |
|
Exercise 1: Re-Creating the Problem |
|
|
7-61 | (1) |
|
|
7-62 | (1) |
|
|
7-63 | (1) |
|
|
7-64 | (1) |
|
|
7-66 | (1) |
|
Design Activity: Case Scenario Exercise |
|
|
7-69 | (1) |
|
Design Activity: Troubleshooting Lab |
|
|
7-70 | (1) |
|
8 Planning and Configuring IPSec |
|
|
8-1 | (1) |
|
|
8-1 | (1) |
|
|
8-2 | (1) |
|
Lesson 1: IPSec Fundamentals |
|
|
8-3 | (1) |
|
|
8-3 | (1) |
|
Securing Host-to-Host Communications |
|
|
8-4 | (1) |
|
Securing Host-to-Network Communications |
|
|
8-6 | (1) |
|
Securing Network-to-Network Communications |
|
|
8-8 | (1) |
|
Negotiating IPSec Connections |
|
|
8-10 | (1) |
|
Authentication Header and ESP |
|
|
8-13 | (1) |
|
|
8-13 | (1) |
|
|
8-15 | (1) |
|
|
8-16 | (1) |
|
Lesson 2: Planning an IPSec Infrastructure |
|
|
8-17 | (1) |
|
Active Directory Considerations |
|
|
8-17 | (1) |
|
Authentications for IPSec |
|
|
8-18 | (1) |
|
|
8-21 | (1) |
|
|
8-22 | (1) |
|
|
8-23 | (1) |
|
Lesson 3: Configuring IPSec |
|
|
8-24 | (1) |
|
|
8-24 | (1) |
|
|
8-26 | (1) |
|
|
8-29 | (1) |
|
Configuring IP Security Policies with Graphical Tools |
|
|
8-30 | (1) |
|
Configuring IP Security Policies with Command-Line Tools |
|
|
8-32 | (1) |
|
Certificate Revocation List Checking |
|
|
8-33 | (1) |
|
Practice: Configuring IP Security Policies |
|
|
8-34 | (1) |
|
|
8-38 | (1) |
|
|
8-39 | (1) |
|
|
8-39 | (1) |
|
|
8-39 | (1) |
|
|
8-40 | (1) |
|
|
8-41 | (1) |
|
|
8-41 | (1) |
|
|
8-42 | (1) |
|
|
8-42 | (1) |
|
|
8-43 | (1) |
|
|
8-43 | (1) |
|
|
8-44 | (1) |
|
|
8-45 | (1) |
|
Design Activity: Case Scenario Exercise |
|
|
8-47 | (1) |
|
Design Activity: Troubleshooting Lab |
|
|
8-48 | (1) |
|
9 Deploying and Troubleshooting IPSec |
|
|
9-1 | (1) |
|
|
9-1 | (1) |
|
|
9-2 | (1) |
|
Lesson 1: Deploying IPSec |
|
|
9-3 | (1) |
|
Deploying IPSec by Using Active Directory |
|
|
9-3 | (1) |
|
Deploying IPSec Using Scripts |
|
|
9-6 | (1) |
|
Deploying Certificate Services for IPSec |
|
|
9-10 | (1) |
|
Practice: Deploying IPSec Configurations |
|
|
9-12 | (1) |
|
|
9-16 | (1) |
|
|
9-17 | (1) |
|
Lesson 2: Monitoring IPSec |
|
|
9-18 | (1) |
|
IP Security Monitor Snap-In |
|
|
9-18 | (1) |
|
|
9-23 | (1) |
|
|
9-28 | (1) |
|
|
9-29 | (1) |
|
|
9-29 | (1) |
|
|
9-30 | (1) |
|
|
9-31 | (1) |
|
|
9-32 | (1) |
|
|
9-33 | (1) |
|
|
9-33 | (1) |
|
|
9-33 | (1) |
|
Practice: Monitoring IPSec |
|
|
9-34 | (1) |
|
|
9-38 | (1) |
|
|
9-39 | (1) |
|
Lesson 3: Troubleshooting IPSec |
|
|
9-40 | (1) |
|
General Troubleshooting Guidelines |
|
|
9-40 | (1) |
|
Kerberos Authentication Problems |
|
|
9-41 | (1) |
|
Certificate Authentication Problems |
|
|
9-42 | (1) |
|
Troubleshooting Firewalls, Routers, and Packet Filtering |
|
|
9-43 | (1) |
|
Network Address Translation Problems |
|
|
9-43 | (1) |
|
Interoperability Problems |
|
|
9-44 | (1) |
|
|
9-46 | (1) |
|
|
9-46 | (1) |
|
|
9-47 | (1) |
|
|
9-47 | (1) |
|
|
9-48 | (1) |
|
|
9-49 | (1) |
|
|
9-50 | (1) |
|
|
9-50 | (1) |
|
|
9-51 | (1) |
|
|
9-52 | (1) |
|
|
9-52 | (1) |
|
|
9-52 | (1) |
|
|
9-53 | (1) |
|
Design Activity: Case Scenario Exercise |
|
|
9-55 | (1) |
|
Design Activity: Troubleshooting Lab |
|
|
9-56 | (1) |
|
10 Planning and Implementing Security for Wireless Networks |
|
|
10-1 | (1) |
|
|
10-1 | (1) |
|
|
10-2 | (1) |
|
Lesson 1: Wireless Network Security Fundamentals |
|
|
10-3 | (1) |
|
|
10-3 | (1) |
|
|
10-4 | (1) |
|
|
10-11 | (1) |
|
Other Wireless Security Techniques |
|
|
10-13 | (1) |
|
|
10-15 | (1) |
|
|
10-15 | (1) |
|
Lesson 2: Configuring Wireless Security |
|
|
10-17 | (1) |
|
Planning Wireless Access Policies |
|
|
10-17 | (1) |
|
Designing the Authorization Strategy |
|
|
10-19 | (1) |
|
Configuring the Certificate Infrastructure |
|
|
10-20 | (1) |
|
|
10-21 | (1) |
|
Configuring Wireless Clients |
|
|
10-24 | (1) |
|
|
10-29 | (1) |
|
Practice: Deploying WEP Encryption with PEAP Authentication |
|
|
10-29 | (1) |
|
|
10-34 | (1) |
|
|
10-35 | (1) |
|
|
10-36 | (1) |
|
|
10-36 | (1) |
|
|
10-36 | (1) |
|
|
10-37 | (1) |
|
|
10-38 | (1) |
|
|
10-38 | (1) |
|
|
10-39 | (1) |
|
|
10-39 | (1) |
|
|
10-39 | (1) |
|
|
10-40 | (1) |
|
|
10-41 | (1) |
|
Design Activity: Case Scenario Exercise |
|
|
10-42 | (1) |
|
Design Activity: Troubleshooting Lab |
|
|
10-43 | (1) |
|
11 Deploying, Configuring, and Managing SSL Certificates |
|
|
11-1 | (1) |
|
|
11-1 | (1) |
|
|
11-2 | (1) |
|
Lesson 1: Overview of Secure Sockets Layer (SSL) |
|
|
11-3 | (1) |
|
|
11-3 | (1) |
|
|
11-4 | (1) |
|
Obtaining SSL Certificates |
|
|
11-5 | (1) |
|
Renewing SSL Certificates |
|
|
11-6 | (1) |
|
|
11-7 | (1) |
|
|
11-8 | (1) |
|
|
11-9 | (1) |
|
Lesson 2: Configuring SSL for IIS |
|
|
11-10 | (1) |
|
Using SSL Certificates with a Web Site |
|
|
11-10 | (1) |
|
The Web Server Certificate Wizard |
|
|
11-12 | (1) |
|
|
11-16 | (1) |
|
|
11-19 | (1) |
|
Practice: Using Certificates for SSL |
|
|
11-21 | (1) |
|
|
11-24 | (1) |
|
|
11-25 | (1) |
|
Lesson 3: Other SSL Applications |
|
|
11-26 | (1) |
|
Enabling SSL on Active Directory Domain Controllers |
|
|
11-26 | (1) |
|
Enabling SSL on Computers Running SQL Server |
|
|
11-27 | (1) |
|
Enabling SSL on Mail Servers |
|
|
11-31 | (1) |
|
Enabling SSL on Microsoft Outlook |
|
|
11-33 | (1) |
|
Practice: Protecting Active Directory Communications |
|
|
11-34 | (1) |
|
|
11-37 | (1) |
|
|
11-38 | (1) |
|
|
11-38 | (1) |
|
|
11-38 | (1) |
|
|
11-39 | (1) |
|
|
11-40 | (1) |
|
|
11-41 | (1) |
|
|
11-41 | (1) |
|
|
11-42 | (1) |
|
|
11-43 | (1) |
|
|
11-43 | (1) |
|
|
11-43 | (1) |
|
|
11-44 | (1) |
|
Design Activity: Case Scenario Exercise |
|
|
11-46 | (1) |
|
Design Activity: Troubleshooting Lab |
|
|
11-47 | (1) |
|
12 Securing Remote Access |
|
|
12-1 | (1) |
|
|
12-1 | (1) |
|
|
12-2 | (1) |
|
Lesson 1: Remote Access Fundamentals |
|
|
12-3 | (1) |
|
|
12-3 | (1) |
|
|
12-5 | (1) |
|
|
12-8 | (1) |
|
|
12-15 | (1) |
|
|
12-16 | (1) |
|
Lesson 2: Configuring Remote Access Servers |
|
|
12-17 | (1) |
|
Configuring Authentication |
|
|
12-17 | (1) |
|
Configuring Authorization |
|
|
12-19 | (1) |
|
Configuring Authentication with Certificates or Smart Cards |
|
|
12-23 | (1) |
|
Practice: Configuring a VPN Server and Client |
|
|
12-24 | (1) |
|
|
12-28 | (1) |
|
|
12-29 | (1) |
|
Lesson 3: Configuring Remote Access Clients |
|
|
12-30 | (1) |
|
Configuring Client-Side Authentication Protocols |
|
|
12-30 | (1) |
|
|
12-32 | (1) |
|
|
12-35 | (1) |
|
|
12-41 | (1) |
|
|
12-41 | (1) |
|
|
12-41 | (1) |
|
|
12-41 | (1) |
|
|
12-42 | (1) |
|
|
12-43 | (1) |
|
|
12-43 | (1) |
|
|
12-44 | (1) |
|
|
12-44 | (1) |
|
|
12-45 | (1) |
|
|
12-45 | (1) |
|
|
12-45 | (1) |
|
|
12-47 | (1) |
|
Design Activity: Case Scenario Exercise |
|
|
12-49 | (1) |
|
Design Activity: Troubleshooting Lab |
|
|
12-50 | (1) |
Part II Prepare for the Exam |
|
|
13 Implementing, Managing, and Troubleshooting Security Policies (1.0) |
|
|
13-3 | (1) |
|
Testing Skills and Suggested Practices |
|
|
13-4 | (1) |
|
|
13-5 | (1) |
|
Objective 1.1: Plan Security Templates Based on Computer Role |
|
|
13-7 | (1) |
|
|
13-8 | (1) |
|
|
13-11 | (1) |
|
Objective 1.2: Configure Security Templates |
|
|
13-14 | (1) |
|
|
13-15 | (1) |
|
|
13-20 | (1) |
|
Objective 1.3: Deploy Security Templates |
|
|
13-23 | (1) |
|
|
13-24 | (1) |
|
|
13-29 | (1) |
|
Objective 1.4: Troubleshoot Security Template Problems |
|
|
13-32 | (1) |
|
|
13-33 | (1) |
|
|
13-36 | (1) |
|
Objective 1.5: Configure Additional Security Based on Computer Roles |
|
|
13-38 | (1) |
|
|
13-39 | (1) |
|
|
13-42 | (1) |
|
14 Implementing, Managing, and Troubleshooting Patch Management Infrastructure (2.0) |
|
|
14-1 | (1) |
|
Testing Skills and Suggested Practices |
|
|
14-1 | (1) |
|
|
14-2 | (1) |
|
Objective 2.1: Plan the Deployment of Service Packs and Hotfixes |
|
|
14-4 | (1) |
|
|
14-5 | (1) |
|
|
14-11 | (1) |
|
Objective 2.2: Assess the Current Status of Service Packs and Hotfixes |
|
|
14-15 | (1) |
|
|
14-16 | (1) |
|
|
14-22 | (1) |
|
Objective 2.3: Deploy Service Packs and Hotfixes |
|
|
14-27 | (1) |
|
|
14-28 | (1) |
|
|
14-34 | (1) |
|
15 Implementing, Managing, and Troubleshooting Security for Network Communications (3.0) |
|
|
15-1 | (1) |
|
Testing Skills and Suggested Practices |
|
|
15-2 | (1) |
|
|
15-5 | (1) |
|
Objective 3.1: Plan IPSec Deployment |
|
|
15-8 | (1) |
|
|
15-9 | (1) |
|
|
15-15 | (1) |
|
Objective 3.2: Configure IPSec Policies to Secure Communication between Networks and Hosts |
|
|
15-20 | (1) |
|
|
15-21 | (1) |
|
|
15-24 | (1) |
|
Objective 3.3: Deploy and Manage IPSec Policies |
|
|
15-26 | (1) |
|
|
15-27 | (1) |
|
|
15-30 | (1) |
|
Objective 3.4: Troubleshoot IPSec |
|
|
15-32 | (1) |
|
|
15-33 | (1) |
|
|
15-37 | (1) |
|
Objective 3.5: Plan and Implement Security for Wireless Networks |
|
|
15-40 | (1) |
|
|
15-41 | (1) |
|
|
15-43 | (1) |
|
Objective 3.6: Deploy, Manage, and Configure SSL Certificates |
|
|
15-45 | (1) |
|
|
15-46 | (1) |
|
|
15-49 | (1) |
|
Objective 3.7: Configure Security for Remote Access Users |
|
|
15-51 | (1) |
|
|
15-52 | (1) |
|
|
15-56 | (1) |
|
16 Planning, Configuring, and Troubleshooting Authentication, Authorization, and PKI (4.0) |
|
|
16-1 | |
|
Testing Skills and Suggested Practices |
|
|
16-2 | (1) |
|
|
16-4 | (1) |
|
Objective 4.1: Plan and Configure Authentication |
|
|
16-6 | (1) |
|
|
16-7 | (1) |
|
|
16-10 | (1) |
|
Objective 4.2: Plan Group Structure |
|
|
16-13 | (1) |
|
|
16-14 | (1) |
|
|
16-18 | (1) |
|
Objective 4.3: Plan and Configure Authorization |
|
|
16-21 | (1) |
|
|
16-22 | (1) |
|
|
16-26 | (1) |
|
Objective 4.4: Install, Manage, and Configure Certificate Services |
|
|
16-29 | |
|
|
16-30 | (1) |
|
|
16-33 | |
Glossary |
|
G-1 | |
Index |
|
I-1 | |