Chapter 1 Planning and Implementing Server roles and Server Security Chapter 2 Planning, Implementing,and Maintaining Network Infrastructure59

Size: px
Start display at page:

Download "Chapter 1 Planning and Implementing Server roles and Server Security... 2. Chapter 2 Planning, Implementing,and Maintaining Network Infrastructure59"

Transcription

1

2 Table of Contents Chapter 1 Planning and Implementing Server roles and Server Security... 2 Answer Key 226 Explanations 243 Chapter 2 Planning, Implementing,and Maintaining Network Infrastructure59 Answer Key 229 Explanations 273 Chapter 3 Planning, Implementing, and Maintaining Server Availability Answer Key 231 Explanations 289 Chapter 4 Planning and Maintaining Network Security Answer Key 233 Explanations 304 Chapter 5 Planning, Implementing, and Maintaining Security Infrastructure Answer Key 235 Explanations 320 Chapter 6

3 Planning and Implementing an Active Directory Infrastructure158 Answer Key 236 Explanations 330 Chapter 7 Managing and Maintaining an Active Directory Infrastructure.185 Answer Key 238 Explanations 345 Chapter 8 Planning and Implementing User, Computer, and Group Strategies Answer Key 239 Explanations 352 Chapter 9 Planning and Implementing Group Policy Answer Key 240 Explanations 355 Chapter 10 Managing and Maintaining Group Policy Answer Key 241 Explanations 366

4 Planning a Server 2003 Environment Upgrade Copyright 2009 by PrepLogic, LLC. Product ID: 1103 Production Date: May 22, 2009 Total Questions: 265 All rights reserved. No part of this document shall be stored in a retrieval system or transmitted by any means, electronic, mechanical, photocopying, recording, or otherwise, without written permission from the publisher. No patent liability is assumed with respect to the use of the information contained herein. Warning and Disclaimer Every effort has been made to make this document as complete and as accurate as possible, but no warranty or fitness is implied. The publisher and authors assume no responsibility for errors or omissions. The information provided is on an "as is" basis. The authors and the publisher shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this document. Volume, Corporate, and Educational Sales PrepLogic offers favorable discounts on all products when ordered in quantity. For more information, please contact PrepLogic directly: solutions@preplogic.com

5 Planning and Implementing Server roles and Server Security 2 Chapter 1 Planning and Implementing Server roles and Server Security 1. You are the network administrator for FlapJacks Grocery Stores. Within the root domain of the forest-corp.flapjacks.com-the company runs seven application servers running Windows Server 2003 that provide a Point of Service (POS) application to the grocery store terminals. Transactions contain sensitive information about customers; therefore, the company wants all data transmissions secured. Which of the following methods do you select? Select the best answer. A. Kerberos v5 protocol B. NTLM authentication C. IPSec D. CHAP Find the Answer p. 226

6 2. You are the network administrator for Vortex, Inc. You have deployed five servers running Windows Server 2003 with Terminal Services. Using these servers, you will be providing an application to remote users across the Internet. You want to ensure that the people who attempt to connect via remote desktop connections are authorized to do so. Which of the following do you implement? Select the best answer. A. IPSec B. 3DES C g D. PEAP Find the Answer p. 226 Planning and Implementing Server roles and Server Security 3 3. You have been hired by Bluegrass Seed Corp. to design their Active Directory network. The company wants to migrate users from their NetWare network to Windows Server 2003 and migrate their GroupWise to Exchange Server. Bluegrass wants to secure their servers from unauthorized use. Which of the following protocols will make certain that the users connecting to the server are authorized to do so? Select the correct answer. A. RRAS B. IP C. IPSec D. Smart cards Find the Answer p. 226

7 4. You are the network administrator for Vortex, Inc. You are installing and configuring the first of several database servers, all which should be secured identically. Which of the following actions do you take? Select the best answer. A. * Open the Security Templates MMC snap-in. * Right-click %SystemRoot%\Security\Templates and select New Template. * Define the Account Policies, Local policies and Event Policies for the template. * Save the template and apply it to each database server as it's installed. B. * Open the Group Policy Editor snap-in. * Define the Account Policies, Local policies, and Event Policies for the server. * Save them as a template and apply the template to each database server as it is installed. C. * Use Resultant Set of Policy (RSoP) in planning mode to define Account Policies, Local Policies, and Event Policies. * Save the policies as a template and apply the template to each database server as it is installed. D. * Use gpresult to define a security template for Account Policies, Local Policies, and Event Policies. * Apply the security template to each database server as it is installed. Find the Answer p. 226 Planning and Implementing Server roles and Server Security 4

8 5. You are the administrator for Vortex, Inc. You are planning the installation of 17 Web servers running Windows Server These servers will provide a set of files to a subset of remote users who connect across the Internet and often via a virtual private network (VPN) link. You want to apply specific security to the folder that holds these files on each of the Web servers. Which of the following actions can you take? Select the best answer. A. Move the files to a standard file server and use Windows Explorer to apply security. B. Create a custom security template that applies folder security and apply that security template to each server. C. Install a certificate authority (CA) server and grant certificates to users. D. Use Resultant Set of Policy (RSoP) to apply file and folder rights to each server. Find the Answer p. 226 Planning and Implementing Server roles and Server Security 5 6. You are the network administrator for Vortex, Inc. You have four sites-nashville, Peoria, Troy, and Memphis. Memphis and Nashville are connected via a T3 line. Peoria is connected to Memphis via a 56-Kbps line and Troy is connected to Nashville via a 128-Kbps line that is heavily utilized. Troy and Peoria have less than 20 users each. Nashville and Memphis have 500 and 1000 users, respectively. There will be at least one domain controller in each location. Where should you place global catalog servers? Select all that apply. A. Nashville B. Memphis C. Troy D. Peoria Find the Answer p. 226

9 Planning and Implementing Server roles and Server Security 226 Answers: Chapter 1 1. C Review Question p. 2 Detailed Explanation p D Review Question p. 3 Detailed Explanation p D Review Question p. 3 Detailed Explanation p A Review Question p. 4 Detailed Explanation p B Review Question p. 5 Detailed Explanation p A, B Review Question p. 5 Detailed Explanation p D Review Question p. 6 Detailed Explanation p B Review Question p. 7 Detailed Explanation p C Review Question p. 8 Detailed Explanation p C Review Question p. 9 Detailed Explanation p C Review Question p. 9 Detailed Explanation p D Review Question p. 10 Detailed Explanation p A Review Question p. 11 Detailed Explanation p B Review Question p. 11 Detailed Explanation p B Review Question p. 12 Detailed Explanation p B Review Question p. 13 Detailed Explanation p C Review Question p. 13 Detailed Explanation p B, C Review Question p. 14 Detailed Explanation p C Review Question p. 15 Detailed Explanation p B Review Question p. 16 Detailed Explanation p C Review Question p. 17 Detailed Explanation p A Review Question p. 18 Detailed Explanation p B, C Review Question p. 19 Detailed Explanation p. 252

10 Planning and Implementing Server roles and Server Security 243 Explanations: Chapter 1 1. Review Question p. 2 Answers: C Explanation A. Kerberos is a method of authentication. It is not applicable to securing a data transmission. Explanation B. NTLM authentication will not protect data while it is in transmission. Explanation C. IPSec is a protocol used to secure TCP/IP data transmissions. It is used with tunneling protocols such as Point-to-Point Tunneling Protocol (PPTP) or Layer 2 Tunneling Protocol (L2TP). Explanation D. The Challenge Handshake Authentication Protocol (CHAP) is used for authenticating a client to a server. It will not secure data while it is in transmission. PrepLogic Question: Review Question p. 3 Answers: D Explanation A. Internet Protocol Security (IPSec) is used mainly for encrypting data transmission. In this scenario, you will need to provide a method of authentication prior to accessing the Terminal Services sessions. Explanation B. 3DES is a method of encryption. It will help protect data while it is in transmission. In this scenario, you will need to provide a method of authentication prior to accessing the Terminal Services sessions. Explanation C g is a wireless protocol. There was no mention of a wireless infrastructure, so this option is invalid. In this scenario, you will need to provide a method of authentication prior to accessing the Terminal Services sessions. Explanation D. Protected Extensible Authentication Protocol is intended for use in authenticating a user's identity. PrepLogic Question: Review Question p. 3 Answers: D Explanation A. Routing and Remote Access Services (RRAS) is not a protocol. It

11 Planning and Implementing Server roles and Server Security 244 offers a way for remote clients to connect to a server across public telephone networks or the Internet. Explanation B. Internet Protocol (IP) is the standard protocol used for communications across the network. Explanation C. Internet Protocol Security (IPSec) is used to encrypt the data transmitted across the network. IPSec is often used in conjunction with a tunneling protocol in a virtual private network (VPN) connection. Explanation D. Smart cards use certificates issued from a certificate authority (CA) server to ensure the identity of the person attempting a connection across the network. PrepLogic Question: Review Question p. 4 Answers: A Explanation A. The security template is a text file that provides security configuration information to the computers to which it is applied. Explanation B. You cannot save templates in the Group Policy Editor. Explanation C. RSoP does not have a facility to save policies as templates for application to other servers. Explanation D. Gpresult is a command-line tool used to display the current policies applicable to a particular computer and/or user. There is no security template capability within gpresult. PrepLogic Question: Review Question p. 5 Answers: B Explanation A. Because users may connect either via the Internet or VPN link, the use of a standard file server may not be the optimal method of accessing the folder. Explanation B. A custom security template can be created and applied to every Web server that will apply identical security configuration to each server. Explanation C. The CA server can grant certificates to users, but it will not apply or manage file rights to the files within the folders on the Web servers.

12 Explanation D. RSoP cannot be used to apply file rights. Planning and Implementing Server roles and Server Security 245 PrepLogic Question: Review Question p. 5 Answers: A, B Explanation A. Because Nashville has 500 users, it should have a global catalog server. Explanation B. Because Memphis has 1000 users, and is connected to Nashville via a link with a large amount of bandwidth, there should be at least one global catalog server in Memphis. Explanation C. Because Troy has fewer than 20 users and is connected to Nashville by a 128 Kbps link that has little available bandwidth, the traffic caused by the global catalog will likely be more than the link could withstand. Therefore, there should not be a global catalog server in Troy. Explanation D. Because Peoria has fewer than 20 users and is connected to Memphis by a 56 Kbps link, the traffic caused by the global catalog would likely be more than the link could withstand. Therefore, there should not be a global catalog server in Peoria. PrepLogic Question: Review Question p. 6 Answers: D Explanation A. Due to the heavy utilization of the links to the stores, you should not place global catalog servers there. Explanation B. There are fewer users in the warehouses than there are in the administrative offices, so the better placement for global catalog servers would be in Toronto, New York, and Chicago. Explanation C. Due to the heavy utilization of the links to the stores, you should not place global catalog servers there. Explanation D. You should place global catalog servers in the administrative offices. They have sufficient links between them to handle the global catalog replication. PrepLogic Question: Review Question p. 7

Table of Contents. Chapter 1 70-297 Case Study 1... 1. Chapter 2 70-297 Case Study 2... 9. Chapter 3 70-297 Case Study 3... 17

Table of Contents. Chapter 1 70-297 Case Study 1... 1. Chapter 2 70-297 Case Study 2... 9. Chapter 3 70-297 Case Study 3... 17 Table of Contents Chapter 1 70-297 Case Study 1... 1 Answer Key 135 Explanations 152 Chapter 2 70-297 Case Study 2... 9 Answer Key 136 Explanations 159 Chapter 3 70-297 Case Study 3... 17 Answer Key 137

More information

MCSE Objectives. Exam 70-236: TS:Exchange Server 2007, Configuring

MCSE Objectives. Exam 70-236: TS:Exchange Server 2007, Configuring MCSE Objectives Exam 70-236: TS:Exchange Server 2007, Configuring Installing and Configuring Microsoft Exchange Servers Prepare the infrastructure for Exchange installation. Prepare the servers for Exchange

More information

Chapter 1 Manage Users, Computers and Groups...2. Chapter 2 Managing and Maintaining Access to Resources...43

Chapter 1 Manage Users, Computers and Groups...2. Chapter 2 Managing and Maintaining Access to Resources...43 Table of Contents Chapter 1 Manage Users, Computers and Groups...2 Answer Key 170 Explanations 184 Chapter 2 Managing and Maintaining Access to Resources...43 Answer Key 173 Explanations 216 Chapter 3

More information

Chapter 1 Implement EIGRP operations... 2. Chapter 2 Implement multiarea OSPF operations... 18. Chapter 4 Implement Cisco IOS routing features...

Chapter 1 Implement EIGRP operations... 2. Chapter 2 Implement multiarea OSPF operations... 18. Chapter 4 Implement Cisco IOS routing features... Table of Contents Chapter 1... 2 94 106 Chapter 2 Implement multiarea OSPF operations... 18 96 120 Chapter 3 Describe integrated IS-IS... 30 97 130 Chapter 4 Implement Cisco IOS routing features... 48

More information

70 299 Implementing and Administering Security in a Microsoft Windows Server 2003 Network

70 299 Implementing and Administering Security in a Microsoft Windows Server 2003 Network 70 299 Implementing and Administering Security in a Microsoft Windows Server 2003 Network Course Number: 70 299 Length: 1 Day(s) Course Overview This course is part of the MCSA training.. Prerequisites

More information

Understanding Windows Server 2003 Networking p. 1 The OSI Model p. 2 Protocol Stacks p. 4 Communication between Stacks p. 13 Microsoft's Network

Understanding Windows Server 2003 Networking p. 1 The OSI Model p. 2 Protocol Stacks p. 4 Communication between Stacks p. 13 Microsoft's Network Introduction p. xix Assessment Test p. xxxviii Understanding Windows Server 2003 Networking p. 1 The OSI Model p. 2 Protocol Stacks p. 4 Communication between Stacks p. 13 Microsoft's Network Components

More information

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure Question Number (ID) : 1 (jaamsp_mngnwi-025) Lisa would like to configure five of her 15 Web servers, which are running Microsoft Windows Server 2003, Web Edition, to always receive specific IP addresses

More information

Step-by-Step Guide for Creating and Testing Connection Manager Profiles in a Test Lab

Step-by-Step Guide for Creating and Testing Connection Manager Profiles in a Test Lab Step-by-Step Guide for Creating and Testing Connection Manager Profiles in a Test Lab Microsoft Corporation Published: May, 2005 Author: Microsoft Corporation Abstract This guide describes how to create

More information

Step-by-Step Guide for Setting Up VPN-based Remote Access in a

Step-by-Step Guide for Setting Up VPN-based Remote Access in a Page 1 of 41 TechNet Home > Products & Technologies > Server Operating Systems > Windows Server 2003 > Networking and Communications Step-by-Step Guide for Setting Up VPN-based Remote Access in a Test

More information

Planning and Maintaining a Microsoft Windows Server Network Infrastructure

Planning and Maintaining a Microsoft Windows Server Network Infrastructure Unit 27: Planning and Maintaining a Microsoft Windows Server Network Infrastructure Learning outcomes A candidate following a programme of learning leading to this unit will be able to: Configure security

More information

MCSE SYLLABUS. Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003:

MCSE SYLLABUS. Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003: MCSE SYLLABUS Course Contents : Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003: Managing Users, Computers and Groups. Configure access to shared folders. Managing and Maintaining

More information

ANNE ARUNDEL COMMUNITY COLLEGE ARNOLD, MARYLAND COURSE OUTLINE CATALOG DESCRIPTION

ANNE ARUNDEL COMMUNITY COLLEGE ARNOLD, MARYLAND COURSE OUTLINE CATALOG DESCRIPTION ANNE ARUNDEL COMMUNITY COLLEGE ARNOLD, MARYLAND COURSE OUTLINE COURSE: Windows 2003 Server COURSE NO: CSI 265 CREDIT HOURS: 3 hours of lecture weekly DEPARTMENT: CATALOG DESCRIPTION CSI 265 Windows 2003

More information

MCSE 2003. Core exams (Networking) One Client OS Exam. Core Exams (6 Exams Required)

MCSE 2003. Core exams (Networking) One Client OS Exam. Core Exams (6 Exams Required) MCSE 2003 Microsoft Certified Systems Engineer (MCSE) candidates on the Microsoft Windows Server 2003 track are required to satisfy the following requirements: Core Exams (6 Exams Required) Four networking

More information

Step By Step Guide: Demonstrate DirectAccess in a Test Lab

Step By Step Guide: Demonstrate DirectAccess in a Test Lab Step By Step Guide: Demonstrate DirectAccess in a Test Lab Microsoft Corporation Published: May 2009 Updated: October 2009 Abstract DirectAccess is a new feature in the Windows 7 and Windows Server 2008

More information

Introduction. Assessment Test

Introduction. Assessment Test 61699ftoc.fm Page ix Friday, May 9, 2008 11:26 AM Introduction Assessment Test xvii xxviii Chapter 1 Understanding Windows Server 2008 Networking 1 Understanding the OSI Model 2 Protocol Stacks 4 Communication

More information

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 http://technet.microsoft.com/en-us/library/cc757501(ws.10).aspx Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 Updated: October 7, 2005 Applies To: Windows Server 2003 with

More information

Microsoft Windows Server System White Paper

Microsoft Windows Server System White Paper Introduction to Network Access Protection Microsoft Corporation Published: June 2004, Updated: May 2006 Abstract Network Access Protection, a platform for Microsoft Windows Server "Longhorn" (now in beta

More information

Astaro Security Gateway V8. Remote Access via L2TP over IPSec Configuring ASG and Client

Astaro Security Gateway V8. Remote Access via L2TP over IPSec Configuring ASG and Client Astaro Security Gateway V8 Remote Access via L2TP over IPSec Configuring ASG and Client 1. Introduction This guide contains complementary information on the Administration Guide and the Online Help. If

More information

MCSA Objectives. Exam 70-236: TS:Exchange Server 2007, Configuring

MCSA Objectives. Exam 70-236: TS:Exchange Server 2007, Configuring MCSA Objectives Exam 70-236: TS:Exchange Server 2007, Configuring Installing and Configuring Microsoft Exchange Servers Prepare the infrastructure for Exchange installation. Prepare the servers for Exchange

More information

Step-by-Step Guide for Setting Up VPN-based Remote Access in a Test Lab

Step-by-Step Guide for Setting Up VPN-based Remote Access in a Test Lab Página 1 de 54 Step-by-Step Guide for Setting Up VPN-based Remote Access in a Test Lab This guide provides detailed information about how you can use five computers to create a test lab with which to configure

More information

Internet Authentication Service (IAS) Operations Guide

Internet Authentication Service (IAS) Operations Guide Internet Authentication Service (IAS) Operations Guide Microsoft Corporation Published: August 2005 Author: James McIllece Editor: Scott Somohano Abstract The Internet Authentication Service (IAS) Operations

More information

How to Install Microsoft Mobile Information Server 2002 Server ActiveSync. Joey Masterson

How to Install Microsoft Mobile Information Server 2002 Server ActiveSync. Joey Masterson How to Install Microsoft Mobile Information Server 2002 Server ActiveSync Joey Masterson How to Install Microsoft Mobile Information Server 2002 Server ActiveSync Joey Masterson Copyright Information

More information

MICROSOFT CERTIFIED SYSTEMS ENGINEER Windows 2003 Track

MICROSOFT CERTIFIED SYSTEMS ENGINEER Windows 2003 Track MICROSOFT CERTIFIED SYSTEMS ENGINEER Windows 2003 Track In recent years Microsoft s MCSE programs has established itself as the premier computer and networking industry certification. For the Windows 2003

More information

Security. TestOut Modules 12.6 12.10

Security. TestOut Modules 12.6 12.10 Security TestOut Modules 12.6 12.10 Authentication Authentication is the process of submitting and checking credentials to validate or prove user identity. 1. Username 2. Credentials Password Smart card

More information

7.1. Remote Access Connection

7.1. Remote Access Connection 7.1. Remote Access Connection When a client uses a dial up connection, it connects to the remote access server across the telephone system. Windows client and server operating systems use the Point to

More information

המרכז ללימודי חוץ המכללה האקדמית ספיר. ד.נ חוף אשקלון 79165 טל'- 08-6801535 פקס- 08-6801543 בשיתוף עם מכללת הנגב ע"ש ספיר

המרכז ללימודי חוץ המכללה האקדמית ספיר. ד.נ חוף אשקלון 79165 טל'- 08-6801535 פקס- 08-6801543 בשיתוף עם מכללת הנגב עש ספיר מודולות הלימוד של מייקרוסופט הקורס מחולק ל 4 מודולות כמפורט:.1Configuring Microsoft Windows Vista Client 70-620 Installing and upgrading Windows Vista Identify hardware requirements. Perform a clean installation.

More information

Defender 5.7. Remote Access User Guide

Defender 5.7. Remote Access User Guide Defender 5.7 Remote Access User Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Ensuring the security of your mobile business intelligence

Ensuring the security of your mobile business intelligence IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive

More information

Planning and Implementing Windows Server 2008

Planning and Implementing Windows Server 2008 Planning and Implementing Windows Server 2008 Course Number: 6433A Course Length: 5 Days Course Overview This five day course is intended for IT Professionals who are interested in the knowledge and skills

More information

MOC 6435A Designing a Windows Server 2008 Network Infrastructure

MOC 6435A Designing a Windows Server 2008 Network Infrastructure MOC 6435A Designing a Windows Server 2008 Network Infrastructure Course Number: 6435A Course Length: 5 Days Certification Exam This course will help you prepare for the following Microsoft exam: Exam 70647:

More information

Matrix Technical Support Mailer 167 NAVAN CNX200 PPTP VPN with Windows Client

Matrix Technical Support Mailer 167 NAVAN CNX200 PPTP VPN with Windows Client Matrix Technical Support Mailer 167 NAVAN CNX200 PPTP VPN with Windows Client 22/07/2014 Dear Friends, This mailer helps you in understanding and configuring PPTP VPN of Matrix NAVAN CNX200 with Windows

More information

Designing, Deploying and Managing a Network Solution for Small- and Medium-sized Businesses Course No. MS2395 3 Days

Designing, Deploying and Managing a Network Solution for Small- and Medium-sized Businesses Course No. MS2395 3 Days COURSE OVERVIEW The goal of this three-day course is to provide students with the skills and knowledge necessary to select, deploy, and manage a Microsoft networking solution for small and medium-sized

More information

Module 6. Configuring and Troubleshooting Routing and Remote Access. Contents:

Module 6. Configuring and Troubleshooting Routing and Remote Access. Contents: Configuring and Troubleshooting Routing and Remote Access 6-1 Module 6 Configuring and Troubleshooting Routing and Remote Access Contents: Lesson 1: Configuring Network Access 6-3 Lesson 2: Configuring

More information

Digipass Plug-In for IAS. IAS Plug-In IAS. Microsoft's Internet Authentication Service. Installation Guide

Digipass Plug-In for IAS. IAS Plug-In IAS. Microsoft's Internet Authentication Service. Installation Guide Digipass Plug-In for IAS IAS Plug-In IAS Microsoft's Internet Authentication Service Installation Guide Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations

More information

Deploying Remote Desktop IP Virtualization Step-by-Step Guide

Deploying Remote Desktop IP Virtualization Step-by-Step Guide Deploying Remote Desktop IP Virtualization Step-by-Step Guide Microsoft Corporation Updated: April 2010 Published: July 2009 Abstract Remote Desktop IP Virtualization provides administrators the ability

More information

Microsoft Dynamics GP. Workflow Installation Guide Release 10.0

Microsoft Dynamics GP. Workflow Installation Guide Release 10.0 Microsoft Dynamics GP Workflow Installation Guide Release 10.0 Copyright Copyright 2008 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the responsibility of

More information

OVERVIEW OF TYPICAL WINDOWS SERVER ROLES

OVERVIEW OF TYPICAL WINDOWS SERVER ROLES OVERVIEW OF TYPICAL WINDOWS SERVER ROLES Before you start Objectives: learn about common server roles which can be used in Windows environment. Prerequisites: no prerequisites. Key terms: network, server,

More information

Wireless VPN White Paper. WIALAN Technologies, Inc. http://www.wialan.com

Wireless VPN White Paper. WIALAN Technologies, Inc. http://www.wialan.com Wireless VPN White Paper WIALAN Technologies, Inc. http://www.wialan.com 2014 WIALAN Technologies, Inc. all rights reserved. All company and product names are registered trademarks of their owners. Abstract

More information

Installation Guide Supplement

Installation Guide Supplement Installation Guide Supplement for use with Microsoft ISA Server and Forefront TMG Websense Web Security Websense Web Filter v7.5 1996 2010, Websense Inc. All rights reserved. 10240 Sorrento Valley Rd.,

More information

TS Gateway Step-By-Step Guide

TS Gateway Step-By-Step Guide TS Gateway Step-By-Step Guide Microsoft Corporation Published: December 2007 Modified: July 2008 Abstract Terminal Services Gateway (TS Gateway) is a new role service available to users of the Microsoft

More information

Configuring Windows Server 2008 Network Infrastructure

Configuring Windows Server 2008 Network Infrastructure Configuring Windows Server 2008 Network Infrastructure Course Number: 70-642 Certification Exam This course is preparation for the Microsoft Technical Specialist (TS) exam, Exam 70-642: TS: Windows Server

More information

Windows Firewall with Advanced Security Step-by-Step Guide - Deploying Firewall Policies

Windows Firewall with Advanced Security Step-by-Step Guide - Deploying Firewall Policies Windows Firewall with Advanced Security Step-by-Step Guide - Deploying Firewall Policies Microsoft Corporation Published: October 2007 Author: Dave Bishop Editor: Scott Somohano Technical Reviewers: Sarah

More information

Deploying Personal Virtual Desktops by Using RemoteApp and Desktop Connection Step-by-Step Guide

Deploying Personal Virtual Desktops by Using RemoteApp and Desktop Connection Step-by-Step Guide c623242f-20f0-40fe-b5c1-8412a094fdc7 Deploying Personal Virtual Desktops by Using RemoteApp and Desktop Connection Step-by-Step Guide Microsoft Corporation Published: June 2009 Updated: April 2010 Abstract

More information

Experiment # 6 Remote Access Services

Experiment # 6 Remote Access Services Experiment # 6 Remote Access Services 7-1 : Introduction Businesses today want access to their information anywhere, at any time. Whether on the road with customers or working from home, employees need

More information

Module 10: Supporting Remote Users

Module 10: Supporting Remote Users Module 10: Supporting Remote Users Contents Overview 1 Establishing Remote Access Connections 2 Connecting to Virtual Private Networks 13 Configuring Inbound Connections 17 Configuring Authentication Protocols

More information

Lesson Plans Managing a Windows 2003 Network Infrastructure

Lesson Plans Managing a Windows 2003 Network Infrastructure Lesson Plans Managing a Windows 2003 Network Infrastructure (Exam 70-291) Table of Contents Course Overview... 2 Section 0.1: Introduction... 3 Section 1.1: Client Configuration... 4 Section 1.2: IP Addressing...

More information

Updating Systems Engineer Skills from Microsoft Windows 2000 to Windows Server 2003

Updating Systems Engineer Skills from Microsoft Windows 2000 to Windows Server 2003 Updating Systems Engineer Skills from Microsoft Windows 2000 to Windows Server 2003 Course 2210 Three days Instructor-led - Hands-On Introduction This three-day, instructor-led workshop provides students

More information

Any system currently running the Schneider Electric MBX Driver Suite or any activated Cyberlogic software suite.

Any system currently running the Schneider Electric MBX Driver Suite or any activated Cyberlogic software suite. Cyberlogic Knowledge Base KB2015-01: ACTIVATION FAILS AFTER CHANGES TO WINDOWS Applies To: Any system currently running the Schneider Electric MBX Driver Suite or any activated Cyberlogic software suite.

More information

DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access

DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access With IDENTIKEY Server / Axsguard IDENTIFIER Integration Guidelines Disclaimer Disclaimer of Warranties and Limitations

More information

DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication

DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication Certificate Based 2010 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 31 Disclaimer Disclaimer of

More information

This section provides a summary of using network location profiles to identify network connection types. Details include:

This section provides a summary of using network location profiles to identify network connection types. Details include: Module 7 Network Access and Security In Module 7 students will learn several strategies for controlling network access and enhancing network security. These will include: controlling network location profiles,

More information

AD CS. http://technet.microsoft.com/en-us/library/cc731564.aspx

AD CS. http://technet.microsoft.com/en-us/library/cc731564.aspx AD CS AD CS http://technet.microsoft.com/en-us/library/cc731564.aspx Active Directory Certificate Services (AD CS) is an Identity and Access Control security technology that provides customizable services

More information

MCTS Guide to Microsoft Windows 7. Chapter 14 Remote Access

MCTS Guide to Microsoft Windows 7. Chapter 14 Remote Access MCTS Guide to Microsoft Windows 7 Chapter 14 Remote Access Objectives Understand remote access and remote control features in Windows 7 Understand virtual private networking features in Windows 7 Describe

More information

Howto: How to configure static port mapping in the corporate router/firewall for Panda GateDefender Integra VPN networks

Howto: How to configure static port mapping in the corporate router/firewall for Panda GateDefender Integra VPN networks Howto: How to configure static port mapping in the corporate router/firewall for Panda GateDefender Integra VPN networks How-to guides for configuring VPNs with GateDefender Integra Panda Security wants

More information

Application Note: Onsight Device VPN Configuration V1.1

Application Note: Onsight Device VPN Configuration V1.1 Application Note: Onsight Device VPN Configuration V1.1 Table of Contents OVERVIEW 2 1 SUPPORTED VPN TYPES 2 1.1 OD VPN CLIENT 2 1.2 SUPPORTED PROTOCOLS AND CONFIGURATION 2 2 OD VPN CONFIGURATION 2 2.1

More information

Dell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud

Dell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud Dell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud February 2015 This guide describes how to deploy Dell One Identity Cloud Access Manager within

More information

Defender EAP Agent Installation and Configuration Guide

Defender EAP Agent Installation and Configuration Guide Defender EAP Agent Installation and Configuration Guide Introduction A VPN is an extension of a private network that encompasses links across shared or public networks like the Internet. VPN connections

More information

Training Name Installing and Configuring Windows Server 2012

Training Name Installing and Configuring Windows Server 2012 Training Name Installing and Configuring Windows Server 2012 Exam Code 70 410 At Course Completion After completing this course, students will be able to: Install and configure Windows Server 2012. Describe

More information

Designing and Implementing a Server Infrastructure

Designing and Implementing a Server Infrastructure Course Code: M20413 Vendor: Microsoft Course Overview Duration: 5 RRP: 2,025 Designing and Implementing a Server Infrastructure Overview Get hands-on instruction and practice planning, designing and deploying

More information

Troubleshooting File and Printer Sharing in Microsoft Windows XP

Troubleshooting File and Printer Sharing in Microsoft Windows XP Operating System Troubleshooting File and Printer Sharing in Microsoft Windows XP Microsoft Corporation Published: November 2003 Updated: August 2004 Abstract File and printer sharing for Microsoft Windows

More information

COURSE 20413C: DESIGNING AND IMPLEMENTING A SERVER INFRASTRUCTURE

COURSE 20413C: DESIGNING AND IMPLEMENTING A SERVER INFRASTRUCTURE ABOUT THIS COURSE This 5 day course covers the knowledge and skills needed to provide an enterprise solution that supports manual and automated server installations in a physical and virtual environment

More information

AD RMS Step-by-Step Guide

AD RMS Step-by-Step Guide AD RMS Step-by-Step Guide Microsoft Corporation Published: March 2008 Author: Brian Lich Editor: Carolyn Eller Abstract This step-by-step guide provides instructions for setting up a test environment to

More information

Designing and Implementing a Server Infrastructure

Designing and Implementing a Server Infrastructure Page 1 of 7 Overview This 5-day instructor-led course provides you with the skills and knowledge needed to plan, design, and deploy a physical and logical Windows Server 2012 Active Directory Domain Services

More information

IBM Proventia Management SiteProtector. Configuring Firewalls for SiteProtector Traffic Version 2.0, Service Pack 8.1

IBM Proventia Management SiteProtector. Configuring Firewalls for SiteProtector Traffic Version 2.0, Service Pack 8.1 IBM Proventia Management SiteProtector Configuring Firewalls for SiteProtector Traffic Version 2.0, Service Pack 8.1 Copyright Statement Copyright IBM Corporation 1994, 2010. IBM Global Services Route

More information

Designing and Implementing a Server Infrastructure 20413C; 5 days, Instructor-led

Designing and Implementing a Server Infrastructure 20413C; 5 days, Instructor-led Designing and Implementing a Server Infrastructure 20413C; 5 days, Instructor-led Course Description Get hands-on instruction and practice planning, designing and deploying a physical and logical Windows

More information

Designing and Implementing a Server Infrastructure

Designing and Implementing a Server Infrastructure Course 20413C: Designing and Implementing a Server Infrastructure Course Details Course Outline Module 1: Planning Server Upgrade and Migration This module explains how to plan a server upgrade and migration

More information

Deployment of IEEE 802.1X for Wired Networks Using Microsoft Windows

Deployment of IEEE 802.1X for Wired Networks Using Microsoft Windows Operating System Deployment of IEEE 802.1X for Wired Networks Using Microsoft Windows Microsoft Corporation Published: October 2003 Updated: October 2005 Abstract This article describes how to deploy IEEE

More information

Course 20413: Designing and Implementing a Server Infrastructure

Course 20413: Designing and Implementing a Server Infrastructure Course 20413: Designing and Implementing a Server Infrastructure Overview About this course Get hands-on instruction and practice planning, designing and deploying a physical and logical Windows Server

More information

This module explains how to configure and troubleshoot DNS, including DNS replication and caching.

This module explains how to configure and troubleshoot DNS, including DNS replication and caching. Module 1: Configuring and Troubleshooting Domain Name System This module explains how to configure and troubleshoot DNS, including DNS replication and caching. Configuring the DNS Server Role Configuring

More information

Designing a Windows Server 2008 Network Infrastructure

Designing a Windows Server 2008 Network Infrastructure Designing a Windows Server 2008 Network Infrastructure MOC6435 About this Course This five-day course will provide students with an understanding of how to design a Windows Server 2008 Network Infrastructure

More information

Designing and Implementing a Server Infrastructure

Designing and Implementing a Server Infrastructure Course 20413C: Designing and Implementing a Server Infrastructure Page 1 of 7 Designing and Implementing a Server Infrastructure Course 20413: 4 days; Instructor-Led Introduction This 4-day instructor-led

More information

DIGIPASS Authentication for GajShield GS Series

DIGIPASS Authentication for GajShield GS Series DIGIPASS Authentication for GajShield GS Series With Vasco VACMAN Middleware 3.0 2008 VASCO Data Security. All rights reserved. Page 1 of 1 Integration Guideline Disclaimer Disclaimer of Warranties and

More information

Desingning and Implementing a Server Infrastructure

Desingning and Implementing a Server Infrastructure About this Course Desingning and Implementing a Server Get hands-on instruction and practice planning, designing and deploying a physical and logical Windows Server 2012 R2 enterprise infrastructure in

More information

Administering Windows Server 2012 (20411) H4D01S

Administering Windows Server 2012 (20411) H4D01S HP Education Services course data sheet Administering Windows Server 2012 (20411) H4D01S Course Overview This course is part two of a series of three courses. Through this series you will gain the skills

More information

Veeam Cloud Connect. Version 8.0. Administrator Guide

Veeam Cloud Connect. Version 8.0. Administrator Guide Veeam Cloud Connect Version 8.0 Administrator Guide April, 2015 2015 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be

More information

Deploying Remote Desktop Web Access with Remote Desktop Connection Broker Step-by- Step Guide

Deploying Remote Desktop Web Access with Remote Desktop Connection Broker Step-by- Step Guide Deploying Remote Desktop Web Access with Remote Desktop Connection Broker Step-by- Step Guide Microsoft Corporation Updated: April 2010 Published: May 2009 Abstract RemoteApp and Desktop Connection provides

More information

iphone in Business Security Overview

iphone in Business Security Overview iphone in Business Security Overview iphone can securely access corporate services and protect data on the device. It provides strong encryption for data in transmission, proven authentication methods

More information

How to Secure a Groove Manager Web Site

How to Secure a Groove Manager Web Site How to Secure a Groove Manager Web Site Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the companies, organizations,

More information

Administering Windows Server 2012

Administering Windows Server 2012 Administering Windows Server 2012 Course Summary Configuring and Troubleshooting Domain Name System Maintaining Active Directory Domain Services Managing User and Service Accounts Implementing a Group

More information

University Computing & Telecommunications Virtual Private Networking: How To/Self- Help Guide Windows 8.1 Operating System.

University Computing & Telecommunications Virtual Private Networking: How To/Self- Help Guide Windows 8.1 Operating System. A VPN (Virtual Private Network) provides a secure, encrypted tunnel from your computer to UHCL's network when off campus. UHCL offers VPN software to allow authenticated, secure access to many UHCL resources

More information

Step-by-Step Guide for Setting Up Network Quarantine and Remote Access Certificate Provisioning in a Test Lab

Step-by-Step Guide for Setting Up Network Quarantine and Remote Access Certificate Provisioning in a Test Lab Step-by-Step Guide for Setting Up Network Quarantine and Remote Access Certificate Provisioning in a Test Lab Microsoft Corporation Published: May, 2005 Author: Microsoft Corporation Abstract This guide

More information

Module 1: Overview of Network Infrastructure Design This module describes the key components of network infrastructure design.

Module 1: Overview of Network Infrastructure Design This module describes the key components of network infrastructure design. SSM6435 - Course 6435A: Designing a Windows Server 2008 Network Infrastructure Overview About this Course This five-day course will provide students with an understanding of how to design a Windows Server

More information

How To Set Up A Vpn Tunnel Between Winxp And Zwall On A Pc 2 And Winxp On A Windows Xp 2 On A Microsoft Gbk2 (Windows) On A Macbook 2 (Windows 2) On An Ip

How To Set Up A Vpn Tunnel Between Winxp And Zwall On A Pc 2 And Winxp On A Windows Xp 2 On A Microsoft Gbk2 (Windows) On A Macbook 2 (Windows 2) On An Ip WINXP VPN to ZyWALL Tunneling 1. Setup WINXP VPN 2. Setup ZyWALL VPN This page guides us to setup a VPN connection between the WINXP VPN software and ZyWALL router. There will be several devices we need

More information

Unit title: Network Infrastructure 2: Planning and Maintenance

Unit title: Network Infrastructure 2: Planning and Maintenance Higher National Unit Specification General information for centres Unit code: DG00 35 Unit purpose: This Unit is designed to introduce candidates to the issues involved in planning and maintaining a network

More information

Ensuring the security of your mobile business intelligence

Ensuring the security of your mobile business intelligence IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive

More information

Cisco QuickVPN Installation Tips for Windows Operating Systems

Cisco QuickVPN Installation Tips for Windows Operating Systems Article ID: 2922 Cisco QuickVPN Installation Tips for Windows Operating Systems Objective Cisco QuickVPN is a free software designed for remote access to a network. It is easy to install on a PC and simple

More information

Creating a VPN Using Windows 2003 Server and XP Professional

Creating a VPN Using Windows 2003 Server and XP Professional Creating a VPN Using Windows 2003 Server and XP Professional Recommended Instructor Preparation for Learning Activity Instructor Notes: There are two main types of VPNs: User-to-Network This type of VPN

More information

Preliminary Course Syllabus

Preliminary Course Syllabus Preliminary Course Syllabus Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure: Network Services Elements of this syllabus are subject to change. Key Data Course

More information

New Security Features

New Security Features New Security Features BlackBerry 10 OS Version 10.3.2 Published: 2015-06-08 SWD-20150608104314635 Contents About this guide... 4 What's new... 4 NFC smart card support... 5 OCSP stapling support in the

More information

Virtual Private Networks Solutions for Secure Remote Access. White Paper

Virtual Private Networks Solutions for Secure Remote Access. White Paper Virtual Private Networks Solutions for Secure Remote Access White Paper Copyright Decipher Information Systems, 2005. All rights reserved. The information in this publication is furnished for information

More information

COURSE OUTLINE MOC 20413: DESIGNING AND IMPLEMENTING A SERVER INFRASTRUCTURE

COURSE OUTLINE MOC 20413: DESIGNING AND IMPLEMENTING A SERVER INFRASTRUCTURE COURSE OUTLINE MOC 20413: DESIGNING AND IMPLEMENTING A SERVER INFRASTRUCTURE MODULE 1: PLANNING SERVER UPGRADE AND MIGRATION This module explains how to plan a server upgrade and migration strategy. Considerations

More information

Dlink DFL 800/1600 series: Using the built-in MS L2TP/IPSEC VPN client with certificates

Dlink DFL 800/1600 series: Using the built-in MS L2TP/IPSEC VPN client with certificates Dlink DFL 800/1600 series: Using the built-in MS L2TP/IPSEC VPN client with certificates In this guide we have used Microsoft CA (Certification Authority) to generate client and gateway certificates. Certification

More information

Remote Firewall Deployment

Remote Firewall Deployment StoneGate How-To Remote Firewall Deployment StoneGate Firewall 3.0 and Management Center 3.5 Table of Contents The Scenario............................... page 3 Adjusting the Access Rules and NAT rules..........

More information

Implementing a Microsoft Windows 2000 Network Infrastructure

Implementing a Microsoft Windows 2000 Network Infrastructure Course Outline Implementing a Microsoft Windows 2000 Network Infrastructure Other Information MS2153 Days 5 Starting Time 9:00 Finish Time 4:30 Lunch & refreshments are included with this course. Implementing

More information

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu VPN Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining

More information

Placing the BlackBerry Enterprise Server for Microsoft Exchange in a demilitarized zone

Placing the BlackBerry Enterprise Server for Microsoft Exchange in a demilitarized zone Placing the for Originally posted: June 2002 Affected software versions BlackBerry Enterprise version 2.0 for Microsoft Exchange version 2.1 for Microsoft Exchange version 3.5 for Microsoft Exchange Summary

More information

MCSA Instructor-led Live Online Training Program. Course Outline MCSA 70-410. Deploying and Managing Windows Server 2012

MCSA Instructor-led Live Online Training Program. Course Outline MCSA 70-410. Deploying and Managing Windows Server 2012 Course Outline MCSA 70-410 Deploying and Managing Windows Server 2012 Windows Server 2012 Overview Overview of Windows Server 2012 Management Installing Windows Server 2012 Post-Installation Configuration

More information

HOTPin Integration Guide: DirectAccess

HOTPin Integration Guide: DirectAccess 1 HOTPin Integration Guide: DirectAccess Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; Celestix assumes no responsibility

More information

I. What is VPN? II. Types of VPN connection. There are two types of VPN connection:

I. What is VPN? II. Types of VPN connection. There are two types of VPN connection: Table of Content I. What is VPN?... 2 II. Types of VPN connection... 2 III. Types of VPN Protocol... 3 IV. Remote Access VPN configuration... 4 a. PPTP protocol configuration... 4 Network Topology... 4

More information

VPNC Interoperability Profile

VPNC Interoperability Profile StoneGate Firewall/VPN 4.2 and StoneGate Management Center 4.2 VPNC Interoperability Profile For VPN Consortium Example Scenario 1 Introduction This document describes how to configure a StoneGate Firewall/VPN

More information