.

Чтение книги онлайн.

Читать онлайн книгу - страница 8

Автор:
Жанр:
Серия:
Издательство:
 -

Скачать книгу

style="font-size:15px;">      Back up, import, copy, and restore GPOs

      Create and configure Migration Table

      Reset default GPOs

      Delegate Group Policy management

      Configure Group Policy Preferences (GPP), Chapter 16

      Configure GPP settings including printers, network drive mappings, power options, custom registry settings, Control Panel settings, Internet Explorer settings, file and folder deployment, and shortcut deployment

      Configure item-level targeting

      Part III: Exam 70-412: Configuring Advanced Windows Server 2012 Services

      Configure Network Load Balancing (NLB), Chapter 17

      This objective may include, but is not limited to:

      Install NLB nodes

      Configure NLB prerequisites

      Configure affinity

      Configure port rules

      Configure cluster operation mode

      Upgrade an NLB cluster

      Configure failover clustering, Chapter 17

      This objective may include, but is not limited to:

      Configure Quorum

      Configure cluster networking

      Restore single node or cluster configuration

      Configure cluster storage

      Implement cluster aware updating

      Upgrade a cluster

      Manage failover-clustering roles, Chapter 17

      This objective may include, but is not limited to:

      Configure role-specific settings including continuously available shares

      Configure VM monitoring

      Configure failover and preference settings

      Manage Virtual Machine (VM) Movement, Chapter 17

      This objective may include, but is not limited to:

      Configure Virtual Machine network health protection

      Configure drain on shutdown

      Perform quick, live and storage migrations

      Import/export/copy of VMS

      Configure advanced file services, Chapter 18

      Configure NFS data store

      Configure BranchCache

      Configure File Classification Infrastructure (FCI) using File Server Resource Manager (FSRM)

      Configure file access auditing

      Implement Dynamic Access Control (DAC), Chapter 18

      Configure user and device claim types

      Create and configure resource properties and lists

      Create and configure Central Access Rules and Policies

      Configure file classification

      Implement policy changes and staging

      Perform access-denied remediation

      Configure and optimize storage, Chapter 18

      Configure iSCSI Target and Initiator

      Configure Internet Storage Name Server (iSNS)

      Implement thin provisioning and trim

      Manage server free space using Features on Demand

      Configure tiered storage

      Configure and manage backups, Chapter 19

      Configure Windows Server backups

      Configure Windows Azure backups

      Configure role-specific backups

      Manage VSS settings using VSSAdmin

      Recover Servers, Chapter 19

      Restore from backups

      Perform a Bare Metal Restore (BMR)

      Recover servers using Windows Recovery Environment (Win RE) and safe mode

      Configure the Boot Configuration Data (BCD) store

      Configure site-level fault tolerance, Chapter 19

      Configure Hyper-V Replica including Hyper-V Replica Broker and VMs

      Configure multi-site clustering including network settings, Quorum, and failover settings

      Configure Hyper-V Replica extended replication

      Configure Global Update Manager

      Recover a multi-site failover cluster

      Implement an advanced Dynamic Host Configuration Protocol (DHCP) solution, Chapter 20

      Create and configure superscopes and multicast scopes

      Implement DHCPv6

      Configure high availability for DHCP including DHCP failover and split scopes

      Configure DHCP Name Protection

      Configure DNS registration

      Implement an advanced DNS solution, Chapter 20

      Configure security for DNS including DNSSEC, DNS Socket Pool, and cache locking

      Configure DNS logging

      Configure delegated administration

      Configure recursion

      Configure netmask ordering

      Configure a GlobalNames zone

      Analyze zone level statistics

      Deploy and manage IPAM, Chapter 20

      Provision IPAM manually or by using Group Policy

      Configure server discovery

      Create and manage IP blocks and ranges

      Monitor utilization of IP address space

      Migrate to IPAM

      Delegate IPAM administration

      Manage IPAM collections

      Configure IPAM database storage

Скачать книгу