Lesson Plans Configuring Windows Server 2008 Applications Infrastructure (Exam 70-643)
Table of Contents Course Overview... 2 Section 1.1: Windows Deployment Services (WDS)... 4 Section 1.2: WDS Installation... 6 Section 1.3: WDS Images... 8 Section 1.4: WDS Multicast... 10 Section 2.1: Windows Activation... 12 Section 2.2: Volume Licensing... 13 Section 3.1: Storage... 15 Section 3.2: Directly Attached Storage (DAS)... 16 Section 3.3: Storage Area Network (SAN)... 18 Section 4.1: Virtualization and Hyper-V... 20 Section 4.2: Virtual Machine Files... 22 Section 4.3: Virtual Networks... 24 Section 4.4: Virtual Machines... 26 Section 4.5: System Center VMM... 28 Section 5.1: DNS Load Balancing... 30 Section 5.2: Network Load Balancing (NLB)... 32 Section 5.3: Failover Clustering... 34 Section 6.1: Remote Desktop Services... 36 Section 6.2: Remote Desktop Connection (RDC)... 37 Section 6.3: RD Session Host... 39 Section 6.4: RD Licensing... 42 Section 6.5: RD Web Access... 44 Section 6.6: RemoteApp and Desktop Connection... 45 Section 6.7: RD Connection Broker... 47 Section 6.8: RD Gateway... 49 Section 6.9: Remote Desktop Optimization... 51 Section 7.1: Internet Information Services (IIS)... 53 Section 7.2: Web Sites... 55 Section 7.3: Web Applications... 57 Section 7.4: IIS Server Management... 59 Section 7.5: IIS Authentication... 61 Section 7.6: IIS Authorization... 63 Section 7.7: Secure Sockets Layer (SSL)... 65 Section 7.8: File Transfer Protocol (FTP)... 67 Section 7.9: Simple Mail Transfer Protocol (SMTP)... 69 Section 8.1: Windows Media Services (WMS)... 71 Section 8.2: Windows SharePoint Foundation 2010... 73 Practice Exams... 75 Appendix A: Approximate Time for the Course... 76 1
Course Overview This course prepares students for Exam 70-643: TS: Windows Server 2008 Applications Infrastructure, Configuring. It focuses on deploying servers and configuring Remote Desktop services, Web services infrastructure, and network application services. Module 1 Deployment This module discusses using Windows Deployment Services (WDS) to deploy Windows operating systems to client and server computers. Students will learn about four types of WDS images, installation of WSD, managing WDS images, and deploying an image to multiple computers using WDS Multicast. Module 2 Activation In this module students will learn how to manage Windows Activation to verify that the installation of Windows is properly licensed. They will also learn methods for performing volume licensing. Module 3 Storage This module covers management of server and network storage. Three types of storage are discussed: Directly Attached Storage (DAS), Network Attached Storage (NAS), and Storage Area Network (SAN). Strategies for managing disk and volumes for DAS are discussed as well as the methods typically used to create the SAN fabric. Students will also become familiar with the tools used to manage SANs. Module 4 Virtualization In Module 4 students will learn the basics of virtualization. They will learn how to configure virtual machines and Hyper-V, create a virtual network, and manage multiple Hyper-V and virtual servers. Module 5 High Availability Module 5 teaches the students the tools to configure high availability. They will learn how to configure DNS Round Robin, create a Network Load Balancing (NLB) cluster, and configure Failover Clustering. Module 6 Remote Desktop Services Module 6 discusses the details of Remote Desktop Services. Students will learn how to configure Remote Desktop Services client and server connections. They will learn how to use Remote Desktop Connection and Remote Desktops to manage connections to session hosts, install and configure RD Session Host and RD licensing, connect to a server using RD Web Access, configure remote applications, provide load balancing and fault tolerance for multiple remote desktop servers, configure RD Gateway policies, and configure and monitor 2
Remote Desktop resources through the use of Windows System Resource Manager (WSRM) and registry keys. Module 7 Web Services In Module 7 students will learn how to configure and manage Web services. They will learn how to manage Internet Information Services (IIS), Web sites, and Web applications, configure IIS Authentication and Authorization, configure Secure Sockets Layer (SSL) security through the use of digital certificates, create a File Transfer Protocol (FTP) site, and configure an SMTP server. Module 8 Network Application Services This module discusses network application services. Students will learn how to configure Windows Media Services (WMS) settings, use Windows SharePoint Foundation (WSF) 2010 to share data. Practice Exams In Practice Exams students will have the opportunity to test themselves and verify that they understand the concepts and are ready to take the certification exam. 3
Section 1.1: Windows Deployment Services (WDS) Summary In this section the students will learn the basics of deploying images using the Windows Deployment Services (WDS). WDS uses disk images for the deployment of Windows operating systems to client and server computers. An image is a single file containing the contents of an operating system installation and has the.wim extension. Students will become familiar with the functions of the four types of WDS images: Install image Boot image Capture boot image Discover boot image Windows Server 2008 Applications Infrastructure Objectives 101. Deploy images by using Windows Deployment Services. Lecture Focus Questions: Which operating systems can be deployed with Windows Deployment Services (WDS)? When would you use a discover boot image? When would you use a capture boot image? Why doesn't this boot image run on a WDS client that needs to install the operating system? How to you enable a non-pxe client to use WDS to install an operating system? How would you deploy a.vhd image using WDS? Video/Demo Time 1.1.1 Windows Deployment Services (WDS) 8:21 1.1.2 New Server 2008 R2 WDS Features 4:52 Total 13:13 4
Number of Exam Questions 2 questions Total Time About 20 minutes 5
Section 1.2: WDS Installation Summary This section discusses how to install WDS. Details include: Requirements for a WDS installation: o Server requirements o Network requirements o Client requirements Prestaging accounts PXE response settings: o Do not respond to any client computer o Respond only to known client computers o Respond to all (known and unknown) client computers Methods to control how computer accounts are created. Students will learn how to: Install the Windows Deployment Services (WDS) role. Configure WDS server settings. Prestage computer accounts in Active Directory for WDS. Windows Server 2008 Applications Infrastructure Objectives 101. Deploy images by using Windows Deployment Services. Lecture Focus Questions: Which two configuration options should you choose when the WDS server and DHCP server are on the same system? What should you do if the DHCP server is on a different subnet from the WDS server? What are the advantages of prestaging computer accounts when using WDS? What are two ways that you can control the computer name that is assigned to a computer during installation using WDS? What does the variable %03# do for specifying computer names? 6
Video/Demo Time 1.2.1 WDS Installation 4:13 1.2.2 Installing WDS 9:50 1.2.3 Prestaging Accounts 6:01 Total 20:04 Lab/Activity Configure a WDS Server Prestage Computer Accounts Number of Exam Questions 6 questions Total Time About 40 minutes 7
Section 1.3: WDS Images Summary This section explores managing WDS images. Details include: Tools to manage WDS images: o Windows Preinstallation Environment (WinPE) o System Preparation Tool (Sysprep) o Deployment Image Servicing and Management (DISM.exe) o ImageX o Windows System Image Manager (Windows SIM) Considerations for managing each image type: o Install o Boot o Discover o Capture Driver management for images Managing WDS images Students will learn how to: Create image groups and add install images. Add boot images to WDS. Use the Capture Image Wizard to create a custom install image. Use ImageX or DISM to customize an existing install image without redeploying it. Configure a WDS server and an install image to support unattended installation. Windows Server 2008 Applications Infrastructure Objectives 101. Deploy images by using Windows Deployment Services. Lecture Focus Questions: What is the difference between Sysprep, ImageX, and DISM? When can you use each tool? Which tasks can only be performed by one tool? What type of boot image can you use to deploy a 64-bit install image? What is the difference between static and dynamic discovery with a boot image? What is the relationship between a.wim file and a.rwm file? What is the advantage of dynamic driver provisioning? 8
Video/Demo Time 1.3.1 WDS Image Management 4:20 1.3.2 Using Install Images 4:25 1.3.3 Creating a Boot Image 17:46 1.3.5 Creating a Discover Image 9:49 1.3.6 Customizing an Install Image 6:45 1.3.7 Using Unattend Files 5:49 1.3.8 Configuring Dynamic Driver Provisioning 4:37 1.3.9 Configuring a WDS PXE Provider 9:48 Total 63:19 Lab/Activity Create WDS Images Number of Exam Questions 9 questions Total Time About 80 minutes 9
Section 1.4: WDS Multicast Summary This section discusses using WDS Multicast to deploy an image to multiple computers simultaneously without impacting other network traffic. Details include: Configuring multicasting with WDS Using the WDS console to view and manage multicast transmissions Students will learn how to: Configure WDS server properties for multicast. Configure WDS multicast transmissions. Windows Server 2008 Applications Infrastructure Objectives 101. Deploy images by using Windows Deployment Services. Lecture Focus Questions: How does multicasting differ from unicasting? How does auto-cast differ from scheduled-casting? You have enabled scheduled-casting without a start condition. What must you do for a client to obtain an image using multicasting? What is the difference between deleting and disabling a multicast transmission? What are two ways you can force a client currently using multicast to use unicast to complete the installation? How do you split a multicast transmission so that faster clients are not slowed down by slower clients? Video/Demo Time 1.4.1 WDS Multicast 2:33 1.4.2 Configuring Multicast Transmission 7:52 Total 10:25 Lab/Activity Create a Multicast Transmission 10
Number of Exam Questions 5 questions Total Time About 20 minutes 11
Section 2.1: Windows Activation Summary In this section students will learn about Windows Activation used to verify that the installation of Windows is properly licensed. Discussed are the basic tools to work with Windows product keys and activation. The activation status of the system will be one of the following states: o Licensed o Grace o Notification Tools to manage licensing and activation on a Windows Server 2008 or 2008 R2 system: o Windows Activation Wizard o Windows Software Licensing Management Tool (slmgr.vbs) Students will learn how to: Use Slui.exe and Slmgr.vbs to manage Windows activation. Windows Server 2008 Applications Infrastructure Objectives 102. Configure Microsoft Windows activation. Lecture Focus Questions: Why is simply entering the product license key during installation insufficient to activate Windows? Which two methods can you can use to activate Windows on multiple computers? Which conditions might require re-activation? Video/Demo Time 2.1.1 Licensing and Activation 4:20 2.1.2 Activating Windows 3:36 Total 7:56 Total Time About 12 minutes 12
Section 2.2: Volume Licensing Summary This section examines solutions for volume licensing of Windows 2008 machines. Concepts covered include: Microsoft has two methods for performing volume licensing: o Multiple Activation Key (MAK) o Key Management Services (KMS) Differences between MAK and KMS Role of Volume Activation Management Tool (VAMT) Configuration considerations Students will learn how to: Use the Volume Activation Management Tool (VAMT) to add licenses and configure clients for volume licensing. Configure a client computer to use a specific KMS host. Windows Server 2008 Applications Infrastructure Objectives 102. Configure Microsoft Windows activation. Lecture Focus Questions: Which volume licensing activation method should you choose if clients will not have a periodic connection with the licensing server? Which volume licensing method should you choose if neither the clients nor the licensing server is allowed to have an Internet connection? When using MAK, which computers must activate directly with Microsoft (either online or by phone)? How does this differ when using KMS? Which firewall port must you open to allow VAMT to manage client computers? How can the Volume Activation Management Tool (VAMT) find client computers? 13
Video/Demo Time 2.2.1 Multiple Activation Key (MAK) 5:50 2.2.2 KMS Activation 6:37 2.2.3 Using VAMT 15:31 2.2.4 Configuring KMS 5:07 Total 33:05 Number of Exam Questions 7 questions Total Time About 45 minutes 14
Section 3.1: Storage Summary This section provides an overview of three options available for server and network storage: Direct Attached Storage (DAS) Network Attached Storage (NAS) Storage Area Network (SAN) Windows Server 2008 Applications Infrastructure Objectives 105. Configure storage. Lecture Focus Questions: What is one of the biggest disadvantages to directly attached storage (DAS)? What are the differences between Storage Area Network (SAN) and Network Attached Storage (NAS)? Which storage methods use block-level read and write operations? Why is this important? How does a NAS transfer files to and from the storage device? Video/Demo Time 3.1.1 Storage Types 4:45 Total Time About 10 minutes 15
Section 3.2: Directly Attached Storage (DAS) Summary This section discusses facts about Directly Attached Storage (DAS). Students will become familiar with details of the following: Partition styles of disks: o Master Boot Record (MBR) o GUID Partition Table (GPT) Disk types: o Basic o Dynamic Dynamic volume types: o Simple o Spanned o Striped (RAID 0) o Striped with parity (RAID 5) o Mirrored (RAID 1) RAID solutions: o RAID 0 + 1, RAID 1 + 0 o RAID 5 + 0 o RAID 5 + 1 Managing disk and volumes for directly-attached storage Strategies for adding space to existing volumes: o Extend the volume o Configure a mount point Recovery strategies for specified volume types: o Basic, simple, spanned, or striped o Mirrored volume o RAID-5 Students will learn how to: Create simple, spanned, mirrored, and RAID-5 volumes. Extend or add a mirror to an existing volume. Create a new volume and mount it to an empty folder. Windows Server 2008 Applications Infrastructure Objectives 104. Configure high availability. 105. Configure storage. 16
Lecture Focus Questions: Where is partition information stored with MBR and GPT disks? Which disk type uses partitions and extended partitions? Which types of volume configurations provide fault tolerance? Which volume configurations improve performance? What is the minimum number of disks required for a RAID-1 (mirrored) configuration? RAID-5? How much overhead is there with a RAID-5 implementation with 4 disks? Which disk configuration methods have no overhead? What do you have to do when you move a dynamic disk from one computer to another? Video/Demo Time 3.2.1 Disk Storage 4:04 3.2.4 Managing Disks and Volumes 18:06 Total 22:10 Lab/Activity Configure Volumes Configure Fault Tolerant Volumes Create a Mount Point Number of Exam Questions 11 questions Total Time About 60 minutes 17
Section 3.3: Storage Area Network (SAN) Summary This section presents information about Storage Area Network (SAN). Details include: Methods to create the SAN fabric: o iscsi o Fibre Channel (FC) Tools for working with and managing SANs: o Virtual Disk Service (VDS) o Disk Management o Share and Storage Management o Storage Explorer o iscsi Initiator o Internet Storage Name Service (isns) o Multipath I/O (MPIO) o Storage Manager for SANs (SMfS) o DiskRAID.exe Students will learn how to: Use the iscsi Initiator to configure targets. Add the Internet Storage Name Service (isns) role service and configure SAN resources for discoverability. Use DiskRAID.exe to manage VDS-compliant storage. Windows Server 2008 Applications Infrastructure Objectives 104. Configure high availability. 105. Configure storage. Lecture Focus Questions: What methods are used to create the SAN fabric? What advantages does iscsi have over Fibre Channel? What disadvantages does it have? Which SAN technology uses initiators and targets? Why is VDS-compliant hardware important when creating a SAN? Which SAN technology allows you to use CHAP and IPsec? How does N_Port Identification Virtualization facilitate the use of virtual machines on Fibre Channel? 18
Video/Demo Time 3.3.1 SAN Technologies 4:10 3.3.3 SAN Management 4:15 3.3.4 Using SAN Management Tools 15:29 Total 23:54 Number of Exam Questions 11 questions Total Time About 40 minutes 19
Section 4.1: Virtualization and Hyper-V Summary This section examines using virtualization and Hyper-V to emulate one or more physical computers on a single platform. The following details about virtualization are presented: Types of virtualization o Server virtualization o Network virtualization o Storage virtualization Benefits of virtualization Considerations for a host machine when implementing virtual machines: o Software o CPU o RAM o Disk o Network o Security The role of Hyper-V Features supported by Hyper-V for Windows Server 2008 and 2008 R2 Additional features supported by Hyper-V for Windows Server 2008 with SP1: o VM Chimney o Live migration o Dynamic virtual machine storage o Dynamic memory Hyper-V architecture components: o Hypervisor o Partition o VMBus o Hyper stack Installation of Hyper-V Using Hyper-V Manager to create virtual machines Migrating the Hyper-V role to another server Students will learn how to: Add the Hyper-V role to a server. Use Hyper-V Manager to manage virtual machines and settings. Windows Server 2008 Applications Infrastructure Objectives 103. Configure Windows Server Hyper-V and virtual machines. 20
Lecture Focus Questions: How is server virtualization different than network virtualization? What are the advantages of virtualizing the machines in a data center? What benefits are provided by Integration Services? Where should you install Integration Services? Which operating system versions and architecture types support running Hyper-V? What are the hardware requirements for installing Hyper-V? Video/Demo Time 4.1.1 Virtualization 5:06 4.1.3 Hyper-V 5:34 4.1.4 New 2008 R2 Hyper-V Features 10:24 4.1.6 Installing Hyper-V 7:43 Total 28:47 Number of Exam Questions 4 questions Total Time About 45 minutes 21
Section 4.2: Virtual Machine Files Summary In this section students will explore information about virtual machine files. They will learn the following: Files for configuration and saving virtual machine state: o Virtual machine configuration file o Virtual Hard Disk (VHD) file o Save state files o Snapshot file o Symbolic link Options for configuring a hard disk for use by the virtual machine: o Fixed o Dynamically expanding o Differencing o Physical disk Actions that can be performed on virtual hard disks: o Convert o Compact o Merge o Expand o Snapshot Methods to move an entire virtual machine including the virtual hard disks: o Export/import o Manual Students will learn how to: Create fixed and dynamically expanding virtual hard disks. Create differencing disks from a parent disk. Convert, compact, merge, and expand virtual hard disks. Move virtual machines from one server running Hyper-V to another. Windows Server 2008 Applications Infrastructure Objectives 103. Configure Windows Server Hyper-V and virtual machines. Lecture Focus Questions: Where are virtual machine settings saved? What type of file is used? What does the symbolic link file do? What is disk pass-through? What does this allow you to do when configuring virtual machines? 22
Which virtual disk type offers the best performance? Which type minimizes disk space use? What happens to the physical size of a dynamically expanding VHD file as you add then delete files from the virtual disk? When would you compact a virtual disk? What benefit would you expect to see from compacting a disk? How can you increase the maximum size of a virtual hard disk? Video/Demo Time 4.2.1 Virtual Machine Files 4:23 4.2.2 Managing Virtual Files 17:02 4.2.5 Moving Virtual Machine Files 11:04 Total 32:29 Lab/Activity Create Virtual Hard Disks Number of Exam Questions 7 questions Total Time About 50 minutes 23
Section 4.3: Virtual Networks Summary This section discusses common types of virtual networks that can be configured when creating virtual networks using Hyper-V: External Internal Private network No network Students will learn how to: Create a virtual network. Windows Server 2008 Applications Infrastructure Objectives 103. Configure Windows Server Hyper-V and virtual machines. Lecture Focus Questions: What is the difference between an internal virtual network and a private virtual network? Which virtual network types do not allow virtual machines to communicate with other physical devices on the physical network? When would you need to use a legacy virtual network adapter? Video/Demo Time 4.3.1 Virtual Networks 2:35 4.3.2 Managing Virtual Networks 5:12 Total 7:47 Lab/Activity Create Virtual Networks 24
Number of Exam Questions 4 questions Total Time About 20 minutes 25
Section 4.4: Virtual Machines Summary This section examines creating and managing virtual machines. Students will become familiar with the following details: Steps to create and customize virtual machines Managing virtual machines Shutdown options Snapshots VHD native boot Actions that can be performed with a VHD file: o Create o Attach o Detach o Compact o Expand Tools to create and manage VHD files: o Disk Management o DiskPart o WIM2VHD o BCDEdit Students will learn how to: Create a virtual machine using existing virtual disks and virtual networks. Install a parent virtual machine using a fixed virtual hard disk. Customize the installation prior to creating child virtual machines. Create child virtual machines using differencing disks from a parent virtual machine. Manage virtual machine states. Windows Server 2008 Applications Infrastructure Objectives 103. Configure Windows Server Hyper-V and virtual machines. 26
Lecture Focus Questions: What type of virtual hard disk is created if you create the virtual disk at the same time that you create the virtual machine? For which virtual disk types must you create the disk before or after creating the virtual machine? How do you restrict the CPU features available on a virtual machine to use when installing older operating systems? When using differencing disks, what should you do after creating the parent virtual machine and before creating the differencing disks? What happens to the virtual machine files when you delete a virtual machine from the Hyper-V console? What is the difference between turning off and shutting down a virtual machine? Video/Demo Time 4.4.1 Creating Virtual Machines 16:38 4.4.6 Mounting and Booting a VHD 5:31 Total 22:09 Lab/Activity Create a Virtual Machine Create a Parent Virtual Machine Create Child Virtual Machines Number of Exam Questions 6 questions Total Time About 50 minutes 27
Section 4.5: System Center VMM Summary In this section students will learn about using System Center VMM as a single centralized console to manage multiple Hyper-V and virtual servers across the entire enterprise. Details include: System Center tools: o System Center Configuration Manager (SCCM) o System Center Operations Manager (SCOM) o System Center Virtual Machine Manager (SCVMM) Installing SCVMM SCVMM uses a library to organize the following objects: o Virtual hard disk file o Hardware profile o Operating system profile o Template o Virtual machine o Additional objects ISO images PowerShell scripts Answer files Use SCVMM to manage virtual servers through: o Migration o Virtual-to-Virtual (V2V) conversion o Physical-to-Virtual (P2V) conversion Options for delegating permissions with SCVMM: o Administrator o Delegated Administrator o Self-Service Students will learn to: Install System Center VMM and the VMM Administration console. Add virtual hard disks, profiles, templates and virtual machines to a library. Create virtual machines using components in a library. Perform migration and conversions using System Center VMM. Windows Server 2008 Applications Infrastructure Objectives 103. Configure Windows Server Hyper-V and virtual machines. 28
Lecture Focus Questions: What advantages does using System Center VMM have over using Hyper-V Manager? What port is used by the VMM Administration console to communicate with servers running Hyper-V? What ports are used to communicate and transfer files with a library server? Which profile type would you edit to modify the amount of RAM used for a virtual machine? What is the difference between migration and conversion of virtual machines? Which conversion scenario requires that the source machine be offline during the conversion process? Why? Video/Demo Time 4.5.1 System Center VMM 2:48 4.5.2 Using System Center VMM 23:57 Total 26:45 Number of Exam Questions 4 questions Total Time About 35 minutes 29
Section 5.1: DNS Load Balancing Summary In this section students will learn how to use DNS Round Bobin to provide a simple method of load balancing by distributing DNS client requests from a hostname to multiple physical devices. Methods include: DNS Round Robin Netmask Ordering Record Weighting Students will learn how to: Enable DNS round robin on a DNS server. Configure multiple host (A or AAAA) records for use by DNS round robin. Windows Server 2008 Applications Infrastructure Objectives 104. Configure high availability. 203. Configure Remote Desktop Connection Broker. Lecture Focus Questions: What is the difference between DNS round robin and Network Load Balancing (NLB)? What are several disadvantages to using DNS round robin when performing load balancing? You have a Web site that uses one of two Web servers. If you configure DNS round robin for the DNS server name, what else should you do to ensure that clients get the same experience regardless of which Web server they connect to? Which DNS load balancing feature will provide the address of the closest resource? Which DNS load balancing feature allows you to specify a weighted priority for server resources? Video/Demo Time 5.1.1 DNS Round Robin 2:53 5.1.2 Configuring DNS Round Robin 3:21 Total 6:14 30
Lab/Activity Configure DNS Round Robin Total Time About 15 minutes 31
Section 5.2: Network Load Balancing (NLB) Summary This section discusses using Network Load Balancing (NLB) to provide configuring and management of load balancing. Load balancing distributes the workload between multiple servers and provides fault tolerance by providing multiple servers that are available to fulfill a request. Details include: The role of servers using Network Load Balancing Cluster operating modes that determine how incoming requests are distributed to the cluster members: o Unicast o Mulicast Details about defining port rules Managing and configuring NLB Managing port rules NLB cluster status options: o Suspend o Resume o Start o Stop o Drainstop o Drain o Reload Students will learn how to: Create an NLB cluster Define port rules to customize how cluster hosts respond. Windows Server 2008 Applications Infrastructure Objectives 104. Configure high availability. Lecture Focus Questions: What IP address do clients use to connect to computers running NLB? What is the heartbeat, and how is it used in convergence? When will convergence occur? What should you do on a cluster host to use unicast mode if the host needs to perform peer-to-peer communications with other cluster hosts? How can you prevent a cluster host from responding to traffic sent to a specific port? 32
Which client affinity option should you use when clients connect to a NLB cluster using multiple proxy servers? What happens to traffic not identified by a port rule? How can you control which cluster host responds? What happens if a cluster host has a weight value of 0 when multiple host filtering is used? Video/Demo Time 5.2.1 Network Load Balancing (NLB) 6:08 5.2.3 Configuring NLB 13:46 Total 19:54 Lab/Activity Configure an NLB Cluster 1 Configure an NLB Cluster 2 Number of Exam Questions 8 questions Total Time About 45 minutes 33
Section 5.3: Failover Clustering Summary This section provides information about using Failover Clustering to increase the availability and fault tolerance of network servers through the use of shared disk resources. Students will become familiar with the following concepts: Role of Failover Clustering Ways that services and applications running on cluster members are configured: o Single-instance o Multiple-instance Quorum modes: o Node Majority o Node and Disk Majority o Node and File Share Majority o No Majority; Disk Only Cluster Shared Volumes Steps to configure Failover Clustering Network types that a cluster can use: o Cluster storage o Cluster node communication o Client connections Managing Failover Clustering Students will learn how to: Validate server configuration prior to creating a failover cluster. Configure storage for Failover Clustering. Add the Failover Clustering feature, create a failover cluster, and add nodes to the cluster. Configure a service or application for clustering. Configure failover and failback for a clustered resource. Configure networks on failover cluster nodes. Windows Server 2008 Applications Infrastructure Objectives 104. Configure high availability. 34
Lecture Focus Questions: How is Failover Clustering different from NLB? Which application types are best used with NLB? How does a single-instance application differ from a multiple-instance application? Which quorum mode should be used if you have an even number of cluster hosts? Why? Which quorum mode allows the cluster to continue operating even if only one cluster host is still available? Which methods can you use to assign IP addresses to cluster members? What is the difference between a possible and a preferred owner for a resource? How do you prevent a node from being used for failover? How do Cluster Shared Volumes simplify the configuration of clustered virtual machines? Video/Demo Time 5.3.1 Failover Clustering 7:24 5.3.3 Creating a Failover Cluster 16:51 5.3.4 Managing Failover Clustering 11:29 Total 35:44 Number of Exam Questions 14 questions Total Time About 60 minutes 35
Section 6.1: Remote Desktop Services Summary In this section students will learn the basics of using Remote Desktop Services to: Provide a desktop for thin clients. Run applications remotely for a client that may not be compatible or have sufficient resources. Remotely manage a server. Centralize management of user desktops. Centralize data storage and application installations. Windows Server 2008 Applications Infrastructure Objectives 206. Configure Remote Desktop Session Host. Lecture Focus Questions: How does the Remote Desktop Protocol (RDP) work to show the contents of a remote desktop? What advantages does Remote Desktop Services provide over running applications locally on a client workstation? How do the default Remote Desktop connections differ from Remote Desktop Session Host connections? Video/Demo Time 6.1.1 Remote Desktop Services 5:04 Total Time About 5 minutes 36
Section 6.2: Remote Desktop Connection (RDC) Summary This section covers using Remote Desktop Connection (RDC) software to allow client computers to make a Remote Desktop connection to another computer. Details include: The role of Remote Desktop Connection Features available for: o Remote Desktop client version 6.1 o Remote Desktop client version 7.0 o Remote Desktop client version 7.10 Students will learn how to: Enable Remote Desktop connections to a server and control which users are allowed to connect. Use Remote Desktop Connection and Remote Desktops to manage connections to session hosts. Configure Remote Desktop Connection properties to redirect local devices and customize the Remote Desktop experience. Save a Remote Desktop connection. Windows Server 2008 Applications Infrastructure Objectives 206. Configure Remote Desktop Session Host. Lecture Focus Questions: What does RD Web Access use to show a Remote Desktop in a browser? Which operating systems already include the Remote Desktop Connection software? What Remote Desktop client version is required to support using your local printer and access through a RD Gateway server? What happens when you close the Remote Desktop Connection window? What happens when you choose Shut Down from the Start menu within the Remote Desktop Connection window? 37
Video/Demo Time 6.2.1 Remote Desktop Connection (RDC) 4:11 6.2.2 Configuring RDC 9:24 6.2.3 Configuring Remote Assistance 5:05 6.2.5 RD User Experience Overview 5:58 Total 24:38 Lab/Activity Allow Remote Desktop Connections Number of Exam Questions 6 questions Total Time About 40 minutes 38
Section 6.3: RD Session Host Summary This section discusses installing, configuring, and managing RD Session Host. The following concepts are discussed: Two free connections that allow for remote administration without installed the Remote Desktop Session Host Add the Remote Desktop Session Host role service to support more than two remote client sessions or running remote applications Features to improve user experience: o Desktop Experience o Quality Windows Audio Video Experience Features to provide tools for administration: o Network Load Balancing o Windows Server Backup o Windows PowerShell o Group Policy Manager Console o Windows System Resource Management Objects used by a Remote Desktop Session Host to identify and control client connections to the session host: o Session o User o Connection o Process o Group Policy Session states: o Active o Idle o Disconnected o Ended Utilities used to manage user connections and sessions: o Tscon.exe o Tsdiscon.exe o Msg.exe o Logoff.exe o Query user o Tskill.exe o Chglogon.exe Configuring session settings Configuring user profiles Connecting to or remote controlling a session Multiple sessions/single session Connection settings/permissions 39
o Query Information o Set Information o Remote Control o Logon o Logoff o Message o Connect o Disconnect o Virtual Channels User Access levels: o Full Control o User Access o Guest Access Features included in Remote Desktop Services with Windows 2008 R2: o Single sign-on o Easy Print driver o Remote Desktop IP Virtualization Students will learn how to: Add the Remote Desktop Services role service. Use Remote Desktop Session Host Configuration to edit properties of connection objects. Use Remote Desktop Services Manager to manage users, sessions, and processes running on a session host. Configure Active Directory and Group Policy settings to control session limits. Windows Server 2008 Applications Infrastructure Objectives 206. Configure Remote Desktop Session Host. Lecture Focus Questions: When does authentication occur when using Network Level Authentication (NLA)? Which RDP client version is required to support NLA? How do you allow user access to a session host that is a domain controller? What is provided by the Desktop Experience feature? What is the difference between an idle, disconnected, or ended session? What happens to applications running within the session for each state? What is the difference between ending a session and resetting a session? What must you do if you want to remote control an existing session on a session host? 40
How does the Easy Print feature in Remote Desktop Services simplify printer administration? Video/Demo Time 6.3.1 RD Session Host 4:17 6.3.2 Installing RD Session Host 5:55 6.3.3 Configuring RD Session Host 6:40 6.3.6 RD Session Host Connection Security 4:44 6.3.7 Managing RD Session Host Connections 5:04 6.3.8 Managing RD User Profiles and Data 7:52 6.3.9 Managing RD User Environment 6:21 Total 40:53 Lab/Activity Install and Configure RD Session Host Configure Session Limits Number of Exam Questions 22 questions Total Time About 80 minutes 41
Section 6.4: RD Licensing Summary In this section students will learn how to install, configure, and manage licenses for Remote Desktop Services. Each device or user connecting to a session host is required to obtain a Remote Desktop Services client access license (FDS CAL). Students will learn how to: Add the RD Licensing role service. Activate the licensing server and add licenses. Configure a session host to use a specific licensing server. Windows Server 2008 Applications Infrastructure Objectives 205. Configure Remote Desktop licensing. Lecture Focus Questions: What is the difference between a per-user license and a per-device license? When would a per-device license be a better choice? What tools can you use to view per-user or per-device license reports? Which licensing server version is required to support a mixed environment with both legacy terminal servers and session hosts? Which operating systems support automatic license server discovery? Video/Demo Time 6.4.1 RD Licensing 4:53 6.4.2 Configuring RD Licensing 4:17 Total 9:10 Lab/Activity Configure an RD Licensing Server Restrict Access to a Licensing Server 42
Number of Exam Questions 7 questions Total Time About 30 minutes 43
Section 6.5: RD Web Access Summary This section provides the basics of using the RD Web Access role service to allow clients to access a session host through a Web browser. Students will also learn about the following: New features provided by RD Web Access on Windows Server 2008 R2: o Forms-based authentication o Per user RemoteApp filtering o Single sign-on between the RS Session Host and RD Web Access o Public and private mode option Students will learn how to: Add the RD Web Access role service. Connect to a session host using RD Web Access. Windows Server 2008 Applications Infrastructure Objectives 201. Configure RemoteApp and Remote Desktop Web Access. Lecture Focus Questions: Which client version is required to connect to a session host through a Web browser? What port is used by RD Web Access? What URL do you use to connect to a server running RD Web Access? Video/Demo Time 6.5.1 RD Web Access 2:51 6.5.2 Installing and Configuring RD Web Access 4:35 Total 7:26 Number of Exam Questions 1 question Total Time About 10 minutes 44
Section 6.6: RemoteApp and Desktop Connection Summary This section discusses configuring RemoteApp to launch a program on a remote desktop session host and run that program directly within a window on the client desktop. The application appears to be local even though it is running on a remote system. The following areas are discussed: Benefits of using RemoteApp Using RemoteApp Methods to install applications on the session host using the: o.msi file o Control Panel o Run the change user /install command from the command line Methods to make applications available to remote clients o.rdp Shortcut File o.msi Installer Package o RD Web Access application list o RemoteAPP and Desktop Connection Students will learn how to: Make applications available through RemoteApp and Desktop Connection. Create.rdp and.msi files for RemoteApp applications. Windows Server 2008 Applications Infrastructure Objectives 201. Configure RemoteApp and Remote Desktop Web Access. Lecture Focus Questions: How does a user access applications through RemoteApp and Desktop Connection? How does RemoteApp improve security of session hosts? How many sessions are used if a user launches three applications on the same session host using RemoteApp? How do you add RemoteApp support to a session host? What are the three ways you can use to make applications visible to remote desktop clients? Which method requires no configuration on the client computer? What is the difference between a personal virtual desktop and a virtual desktop pool? Which roles and role services are required to provide access to virtual desktops? 45
Video/Demo Time 6.6.1 RemoteApp and Desktop Connection 2:41 6.6.2 Configuring RemoteApp 6:09 Total 8:50 Lab/Activity Configure Remote Applications Number of Exam Questions 8 questions Total Time About 25 minutes 46
Section 6.7: RD Connection Broker Summary This section explores configuring the RD Connection Broker to provide load balancing and fault tolerance for multiple remote desktop servers. Students will learn how to: Add the RD Connection Broker role service. Join a session host to a RD Connection Broker farm. Configure DNS load balancing to identify session host farm members. Windows Server 2008 Applications Infrastructure Objectives 203. Configure Remote Desktop Connection Broker. Lecture Focus Questions: What advantage does using RD Connection Broker have over using network load balancing? Why might you still use network load balancing when implementing the RD Connection Broker? How can you unevenly distribute client sessions in a Remote Desktop server farm? Which version of Remote Desktop is required on the clients? How does RD Connection Broker relate to RemoteApp and Desktop Connection? Video/Demo Time 6.7.1 RD Connection Broker 3:23 6.7.2 Configuring RD Connection Broker 12:32 Total 15:55 Lab/Activity Configure an RD Connection Broker Server Add a Server to an RD Farm Configure RD Connection Broker Settings Using Group Policy 47
Number of Exam Questions 8 questions Total Time About 40 minutes 48
Section 6.8: RD Gateway Summary This section examines configuring RD Gateway to allows users with the Remote Desktop client and an Internet connection to connect to computers on an internal network. Students will learn how to: Add the RD Gateway role service. Create RD connection authorization policies (RD CAPs) and resource authorization policies (RD RAPs) to control session host access. Windows Server 2008 Applications Infrastructure Objectives 202. Configure Remote Desktop Gateway (RD Gateway). Lecture Focus Questions: What ports must be opened in the outer firewall to allow connections to the RD Gateway server? Which servers can you allow access to using RD Gateway? What is the difference between a RD CAP and a RD RAP? Which restricts access to specific computers? Why would you use a RADIUS server with RD Gateway? How does RD Gateway integrate with NAP? Video/Demo Time 6.8.1 RD Gateway 6:11 6.8.2 Configuring RD Gateway 14:47 Total 20:58 Lab/Activity Configure RD Gateway Policies 49
Number of Exam Questions 11 questions Total Time About 40 minutes 50
Section 6.9: Remote Desktop Optimization Summary This section provides information on two tools than can be used to optimize the resources of Remote Desktop Services: 1. Windows System Resource Manager (WSRM) can be configured to control resource allocation of system resources by applications, processes, or services. 2. Registry keys can be set to customize the priority that a session host places on virtual channel traffic that is used for display, keyboard, and mouse data. Students will learn how to: Add the Windows System Resource Manager (WSRM) feature and set a managing profile to control resource use by Remote Desktop. Edit the registry to control network bandwidth allocated to Remote Desktop Services. Windows Server 2008 Applications Infrastructure Objectives 204. Configure and monitor Remote Desktop resources. Lecture Focus Questions: What is the difference between the equal per user profile and the equal per session profile? How can a user overcome the restrictions enforced by the equal per session profile? Which built-in profiles in WSRM control memory allocation? What is the default ratio of display and channel bandwidth allocation? What is the percentage of bandwidth allocated to display data with the following settings: 25 for FlowControlDisplayBandwidth and 5 for FlowControlChannelBandwidth? Video/Demo Time 6.9.1 Windows Server Resource Manager 3:22 6.9.2 Managing RD with WSRM 3:08 Total 6:30 51
Number of Exam Questions 6 questions Total Time About 15 minutes 52
Section 7.1: Internet Information Services (IIS) Summary This section provides an overview of Internet Information Services (IIS) v7.0 which comes with Server 2008. The following elements are discussed: Modular design Configuration files are XML file Support for PHP FTP upgraded Migration issues Installation process Default content directory is C:\InetPub\wwwroot Hierarchical settings IIS.NET Installation of IIS through Server Manager Managing IIS using the IIS Manager tool. Students will learn how to: Add the Web Server (IIS) role to your server. Use Internet Information Services (IIS) Manager to configure settings for IIS and a Web site. View installed modules in IIS. Configure the default document. Windows Server 2008 Applications Infrastructure Objectives 305. Manage the Web Server (IIS) role. Lecture Focus Questions: How do settings for the IIS server affect the Web site and virtual directories? What happens when you configure a setting for both the server and a Web site? Which setting will be used for the Web site? What is the relationship between a role service for IIS and a module in IIS? How does the binding identify a Web site? 53
Video/Demo Time 7.1.1 Internet Information Services (IIS) 3:38 7.1.2 Installing and Managing IIS 15:47 Total 19:25 Total Time About 20 minutes 54
Section 7.2: Web Sites Summary In this section students will learn how to create, configure, and manage Web sites and Web site bindings. Settings to configure a Web site include: Site Binding Home Directory Default Document Directory Browsing HTTP Error Pages HTTP Redirect Compression Logging Limits Virtual Directories Students will learn how to: Create Web sites in IIS and configure Web site bindings. Configure Web site settings including the default document, directory browsing, error pages, and logging. Create virtual directories and configure virtual directory settings. Windows Server 2008 Applications Infrastructure Objectives 302. Manage Web sites. 305. Manage the Web Server (IIS) role. Lecture Focus Questions: What information makes up the Web site binding? What information must be unique when you run multiple Web sites on the same server? What does IIS do when it can't find a default document? What should you do with the default document when enabling directory browsing? What is the advantage of using W3C log format over other log formats? What logging type would you choose if you wanted to store log entries in a database? How do settings on a Web site affect settings on a virtual directory? What is pass-through authentication? How does it affect user actions when configured for a virtual directory? 55
Video/Demo Time 7.2.1 Web Site Bindings 2:38 7.2.2 Configuring Site Bindings 14:50 7.2.3 Web Site Management 5:00 7.2.4 Configuring Web Site Settings 15:51 Total 38:19 Lab/Activity Create a Web Site Number of Exam Questions 10 questions Total Time About 60 minutes 56
Section 7.3: Web Applications Summary This section discusses managing Web applications. Concepts covered include: Role services that are used to support Web applications: o ASP.NET o NET Extensibility o ASP o CGI o ISAPI Extensions o ISAPI Filters o Server Side Includes (SSI) Tools to manage application pools and applications Pipeline modes The role of the DefaultAppPool application pool Recycling Trust categories: o Full (internal) o High (web_hightrust.config) o Medium (web_mediumtrust.config) o Low (web_lowtrust.config) o Minimal (web_minimaltrust.config) Impersonation methods: o Authenticated user o Specific user Handler mappings: o Managed Handler o Module Mapping o Script Map o Wildcard Script Map ISAPI support Perl and PHP support Students will learn how to: Create an application pool and configure the pipeline mode. Change the application pool used by a Web site. Start and stop application pools using Appcmd. Add role services to provide Web application functionality. Configure.NET Trust Levels. Enable ASP.NET Impersonation for the server, Web site, or application. 57
Windows Server 2008 Applications Infrastructure Objectives 301. Configure Web applications. Lecture Focus Questions: Which IIS role services are server-side scripting technologies? Which role services execute applications on the IIS server? What is the difference between ISAPI extensions and ISAPI filters? When would you use each? Which file extensions are associated with a server-side include? What protocol is used to enable PHP and Perl in IIS? By default, which application pool is used when you create a new Web site? Which application pool is used when you add an application to a Web site? Which ASP.NET trust levels prevent the application from accessing files outside of the application directory? Which handler mapping type would you specify for an application that runs using managed code? Which type would you configure for an application that uses native code? Video/Demo Time 7.3.1 Web Applications 10:35 7.3.2 Managing Web Applications 10:27 Total 21:02 Number of Exam Questions 13 questions Total Time About 40 minutes 58
Section 7.4: IIS Server Management Summary This section examines management of the IIS Server. Details include: Tools to manage IIS: o IIS Manager console o Appcmd.exe o Iisreset o Powershell o.net code o WMI command-line (WMIC) o Best Practices Analyzer Files to store IIS configuration settings: o ApplicationHost.config o Web.config Using a shared configuration to configure multiple servers Using a managed service account to manage network application such as IIS Students will learn how to: Use Appcmd and Iisreset to manage the IIS server. View and edit Web.config files. Export an IIS server configuration. Use the exported files to configure multiple Web servers with a shared configuration. Windows Server 2008 Applications Infrastructure Objectives 305. Manage the Web Server (IIS) role. Lecture Focus Questions: What must you do before using PowerShell to manage your IIS server? Where are IIS server settings stored? Where are settings for a Web site or virtual directory stored? You create a new application for a Web site, but you don't see a Web.config file for the application. Why not? 59
Video/Demo Time 7.4.1 IIS Server Management 3:07 7.4.2 Managing the IIS Server 8:44 Total 11:51 Number of Exam Questions 2 questions Total Time About 15 minutes 60
Section 7.5: IIS Authentication Summary In this section students will learn about the different types of authentications methods that IIS 7.5 provides: Anonymous Forms Basic Authentication Digest Authentication Windows Authentication Client Certificate Mapping Authentication IIS Client Certificate Mapping Authentication ASP.NET Impersonation Students will learn how to: Add authentication methods as role services to your Web server. Configure authentication for a server, Web site, virtual directory, or application. Windows Server 2008 Applications Infrastructure Objectives 307. Configure Web site authentication and permissions. Lecture Focus Questions: You enable anonymous authentication on a server named WS1. What user account is used for authentication? You have enabled basic authentication for a Web site, but users are still able to access the Web site without authenticating. What else should you do? Which authentication method would you choose if you wanted to authenticate using Windows accounts through a proxy server while eliminating the logon prompt in the browser? You want to use certificates for authentication to a Web site, but you want certificates accepted based on information in the certificate (such as the organization name). Which authentication method would you choose? By default, what user account is used for an ASP.NET application with impersonation disabled? 61
Video/Demo Time 7.5.1 IIS Authentication 5:15 7.5.2 Configuring IIS Authentication 8:21 Total 13:36 Lab/Activity Configure IIS Authentication Number of Exam Questions 12 questions Total Time About 35 minutes 62
Section 7.6: IIS Authorization Summary This section discusses authorization, which is the process of determining what resources users should have access to. Details include: IIS provides the following methods to control resource access: o NTFS Permissions o IP and Domain Name Restrictions o Request Filtering o URL Authorization (also called authorization rules) Use IIS Manager to allow remote administration of a Web site. Using feature delegation to control which IIS features are configurable o Delegation option (or permission) for features: Read/Write Read Only Not Delegated Students will learn how to: Add role services for adding authorization functionality to IIS. Configure address and domain name restrictions. Configure allow and deny authorization rules. Enable remote management and configure IIS Manager Users and IIS Manager Permissions to enable remote management for a Web site. Windows Server 2008 Applications Infrastructure Objectives 305. Manage the Web Server (IIS) role. 307. Configure Web site authentication and permissions. Lecture Focus Questions: What additional functionality is required to enforce domain name restrictions? Why? What is the difference between domain name restrictions and authorization rules? What is the difference between using IIS Manager Users and domain user accounts? How can you prevent other administrators from overriding authentication settings configured at a server on individual Web sites or virtual directories? 63
Video/Demo Time 7.6.1 IIS Authorization 4:49 7.6.2 Configuring IIS Authorization 8:40 Total 13:29 Lab/Activity Configure IIS Authorization Configure Administrative Authorization Number of Exam Questions 7 questions Total Time About 35 minutes 64
Section 7.7: Secure Sockets Layer (SSL) Summary This section provides the details of how SSL is used with IIS to validate the identity of the Web server and encrypt communications between the Web server and Web clients. SSL requires the use of digital certificates. Students will become familiar with how digital certificates are obtained and verified. The following methods can be used by the Web server to obtain its SSL certificate: Self-signed certificate Internal CA External CA Students will learn how to: Bind SSL to a Web site. Require SSL for access to a Web site or virtual directory. Windows Server 2008 Applications Infrastructure Objectives 306. Configure SSL security. Lecture Focus Questions: What steps must you perform on client computers when using a selfsigned certificate on your Web server for SSL? Why is this configuration generally not used in a production environment? You have a Web site that will be using SSL for customer orders. How should you obtain the certificate for the Web server? When requesting a certificate for a Web server, what name should be in the subject name of the certificate? What setting on the Web server should match the subject name in the certificate? Video/Demo Time 7.7.1 SSL 8:05 7.7.2 Configuring SSL 7:56 Total 16:01 65
Lab/Activity Require SSL Number of Exam Questions 7 questions Total Time About 30 minutes 66
Section 7.8: File Transfer Protocol (FTP) Summary This section explores using File Transfer Protocol (FTP) to download from or save files to the server. Students will become familiar with: FTP Server role service includes the following features: o IIS Manager o Virtual Host Name o User Isolation o SSL with FTP o Authentication o Permissions o Request Filtering TCP ports that FTP uses: o Port 21 for control information o Port 20 for data Tools to access FTP content o Ftp o Internet Explorer, using the URL: ftp://sitename o Windows Explorer Web-based Distributed Authoring and Versioning (WebDAV) Students will learn how to: Create an FTP site in IIS and configure FTP site authentication, authorization, and other settings. Bind FTP to a Web site. Windows Server 2008 Applications Infrastructure Objectives 303. Configure a File Transfer Protocol (FTP) server. Lecture Focus Questions: How can you host multiple FTP sites on your server that uses the same port number? What URL would a user type in a browser to access an FTP site using a username and password? When using anonymous authentication, what information is typically requested from users? Why is this not sufficient for either authentication or tracking FTP users? 67
Video/Demo Time 7.8.1 FTP 4:42 7.8.2 Using FTP 10:39 Total 15:21 Lab/Activity Create an FTP Site Number of Exam Questions 8 questions Total Time About 30 minutes 68
Section 7.9: Simple Mail Transfer Protocol (SMTP) Summary This section discusses configuring Simple Mail Transfer Protocol (SMTP). Students will become familiar with the following concepts: Default SMTP virtual server and default content directory Bindings for SMTP Creating MX record in DNS that point to the SMTP server SMTP relay Smart host LDAP routing SMTP server mail directories: o Badmail o Drop o Pickup o Queue SMTP supports these authentication types: o Anonymous o Basic o Windows Integrated Allow and Deny lists Masquerade domain SMTP operators Configuring IIS to use SMTP Students will learn how to: Add the SMTP feature. Configure SMTP server features including bindings, logging, authentication, and delivery settings. Configure ASP.NET to integrate with an SMTP server. Windows Server 2008 Applications Infrastructure Objectives 304. Configure Simple Mail Transfer Protocol (SMTP). 69
Lecture Focus Questions: What binding information is used for SMTP? What is the default port used by SMTP? What DNS record allows hosts to find mail servers? What is the relationship between a smart host and an SMTP relay? What controls should you implement if you have enabled SMTP relay on your server? Which directory is used by the SMTP server for mail waiting to be delivered? Which directory holds mail that is waiting to be processed by another application? What does the masquerade domain setting do? How does it modify outgoing or incoming mail? Video/Demo Time 7.9.1 SMTP 4:32 7.9.2 Configuring SMTP 4:43 Total 9:15 Number of Exam Questions 8 questions Total Time About 15 minutes 70
Section 8.1: Windows Media Services (WMS) Summary This section provides information about configuring Windows Media Services (WMS) to act as a platform for delivering video and audio content over a network. WMS can deliver two types of content: o On-demand o Live (broadcast) Students will become familiar with the following protocols for streaming information to clients: o Real-Total Time Streaming Protocol (RTSP) o HTTP streaming Components of WMS: o Origin server o Publishing server o Distribution server o Encoder o Announcement Advanced Systems Format (ASF) Digital Rights Management (DRM) Windows Media Digital Rights Manager (WMDRM) Installing and configuring WMS Additional configuration options for WMS: o Authentication o Authorization o Playlists o Advertising o Caching of streaming media Configuring caching of streaming media Interfaces that can be used to administer a Windows Media server behind a firewall: o Windows Media Services Administrator for the Web o Windows Media Services snap-in Students will learn how to: Download and install Windows Media Services. Configure WMS settings including the control protocol, authentication, and authorization. Create a publishing point to make content available. 71
Windows Server 2008 Applications Infrastructure Objectives 401. Mange the Streaming Media Services role. 402. Secure streaming media. Lecture Focus Questions: Which WMS transmission types can be paused and rewound? Which can use multicast transmissions? How can you support Apple clients with WMS when using the Real-Total Time Streaming Protocol (RTSP)? Why can't you use HTTP streaming on a server that is hosting a Web site using the default bindings? What is the difference between an origin server and a distribution server? Which feature would you add to a Windows Server 2008 R2 server to test streaming media? Which authentication method uses NTLM or Kerberos for authentication? What must you configure to insert advertising in your media content? What is the difference between interstitial and wrapper advertising? Video/Demo Time 8.1.1 Windows Media Services (WMS) 5:36 8.1.3 Configuring WMS 9:17 Total 14:53 Number of Exam Questions 14 questions Total Time About 35 minutes 72
Section 8.2: Windows SharePoint Foundation 2010 Summary This section explores using Windows SharePoint Foundation (WSF) to provide collaboration tools and a platform for developing Web-based applications. There are two versions of SharePoint: SharePoint Foundation 2010 free version with limited features SharePoint Server 2010 commercial version with advanced features Students will become familiar with how the following elements are related to WSF: Install prerequisite components using the Microsoft SharePoint 2010 Products Preparation Tool Steps to install WSF 2010 Websites created automatically during installation o Team site o Central administration site Configuration components of SharePoint: o Site Collection o Document Library o Web Parts o Authentication o Authorization o Usage and Health Reporting o E-mail Integration Students will learn how to: Install Windows SharePoint Foundation 2010. Use the SharePoint Central Administration Web site to configure SharePoint. Use the SharePoint team site to share documents. Enable e-mail for a document library. Windows Server 2008 Applications Infrastructure Objectives 403. Configure SharePoint Foundation options. 404. Configure SharePoint Foundation e-mail integration. 73
Lecture Focus Questions: What additional features do you get with SharePoint Server 2010 compared to SharePoint Foundation 2010? You have installed WSF 2010 using the internal Windows database. You now want to use a SQL database. What must you do? What is the difference between a site collection and a document library? What is the purpose of a Web part? What does it allow you to do? Video/Demo Time 8.2.1 Windows SharePoint Foundation (WSF) 2010 5:53 8.2.2 Installing WSF 2010 2:51 8.2.3 Configuring and Using WSF 2010 6:52 Total 15:36 Number of Exam Questions 16 questions Total Time About 35 minutes 74
Practice Exams Summary This section provides information to help prepare students to take the exam and to register for the exam. Students will also have the opportunity of testing their mastery of the concepts presented in this course to reaffirm that they are ready for the certification exam. For example, all questions that apply to Objective 100. Deploying Servers are grouped together and presented in practice exam 100. Deploying Servers, All Questions. Students will typically take about 60-90 minutes to complete each of the following practice exams. 100. Deploying Servers, All Questions (98 questions) 200. Remote Desktop Services, All Questions (70 questions) 300. Web Services Infrastructure, All Questions (66 questions) 400. Network Application Services, All Questions (30 questions) The Certification Practice Exam consists of 69 questions that are randomly selected from the above practice exams. Each time the Certification Practice Exam is accessed different questions may be presented. The Certification Practice Exam has a Total Time limit of 200 minutes -- just like the real certification exam. A passing score of 95% should verify that the student has mastered the concepts and is ready to take the real certification exam. 75
Appendix A: Approximate Time for the Course The total time for the LabSim for Configuring Windows Server 2008 Applications Infrastructure Exam 70-643 course is approximately 26 hours and 55 minutes. The time is calculated by adding the approximate time for each section which is calculated using the following elements: Video/demo times Approximate time to read the text lesson (the length of each text lesson is taken into consideration) Simulations (5 minutes assigned per simulation) Questions (1 minute per question) The breakdown for this course is as follows: Module Sections Time Minute HR:MM 1.0 Deployment 1.1 Windows Deployment Services (WDS) 20 1.2 WDS Installation 40 1.3 WDS Images 80 1.4 WDS Multicast 20 160 2:40 2.0 Activation 2.1 Windows Activation 12 2.2 Volume Licensing 45 57 :57 3.0 Storage 3.1 Storage 10 3.2 Directly Attached Storage (DAS) 60 3.3 Storage Area Network (SAN) 40 110 1:50 4.0 Virtualization 4.1 Virtualization and Hyper V 45 4.2 Virtual Machine Files 50 4.3 Virtual Networks 20 4.4 Virtual Machines 50 4.5 System Center VMM 35 200 3:20 5.0 High Availability 5.1 DNS Round Robin 15 5.2 Network Load Balancing (NLB) 45 5.3 Failover Clustering 60 120 2:00 76
6.0 Remote Desktop Services 6.1 Remote Desktop Services 5 6.2 Remote Desktop Connection (RDC) 40 6.3 RD Session Host 80 6.4 RD Licensing 30 6.5 RD Web Access 10 6.6 RemoteApp and Desktop Connection 25 6.7 RD Connection Broker 40 6.8 RD Gateway 40 6.9 Remote Desktop Optimization 15 285 4:45 7.0 Web Services 7.1 Internet Information Services (IIS) 20 7.2 Web Sites 60 7.3 Web Applications 40 7.4 IIS Server Management 15 7.5 IIS Authentication 35 7.6 IIS Authorization 35 7.7 Secure Sockets Layer (SSL) 30 7.8 File Transfer Protocol (FTP) 30 7.9 Simple Mail Transfer Protocol (SMTP) 15 280 4:40 8.0 Network Application Services 8.1 Windows Media Services (WMS) 35 82 Windows SharePoint Foundation 2010 35 70 1:10 Practice Exams 100: Deploying Servers (98 questions) 98 200: Remote Desktop Services (70 questions) 70 300: Web Services Infrastructure (66 questions) 66 4: Network Application Services (30 questions) 30 Certification Practice Exam (100 questions) 69 333 5:33 Total Time 1615 26:55 77