23.07.2013 Views

MOC 6232A: Implementing a Microsoft SQL Server 2008 Database ...

MOC 6232A: Implementing a Microsoft SQL Server 2008 Database ...

MOC 6232A: Implementing a Microsoft SQL Server 2008 Database ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>MOC</strong> <strong>6232A</strong>: <strong>Implementing</strong> a <strong>Microsoft</strong> <strong>SQL</strong> <strong>Server</strong> <strong>2008</strong> <strong>Database</strong><br />

• Course Number: <strong>6232A</strong><br />

• Course Length: 5 Days<br />

Course Overview<br />

This course provides students with the knowledge and skills to implement a <strong>Microsoft</strong> <strong>SQL</strong><br />

<strong>Server</strong> <strong>2008</strong> database. It focuses on teaching individuals how to use <strong>SQL</strong> <strong>Server</strong> <strong>2008</strong> product<br />

features and tools related to implementing a database.<br />

Prerequisites<br />

Before attending this course, students must have:<br />

● Basic knowledge of the <strong>Microsoft</strong> Windows operating system and its core functionality<br />

● Working knowledge of Transact-<strong>SQL</strong>.<br />

● Working knowledge of relational databases.<br />

● Some experience with database design.<br />

Audience<br />

This course is intended for IT Professionals who administer and maintain <strong>SQL</strong> <strong>Server</strong> databases.<br />

Course Outline<br />

Course Introduction<br />

Course Introduction<br />

Module 01 - Creating <strong>Database</strong>s and <strong>Database</strong> Files<br />

Creating <strong>Database</strong>s and <strong>Database</strong> Files<br />

Lesson 1: Creating <strong>Database</strong>s<br />

Considerations for Creating a <strong>Database</strong><br />

Transaction Logging<br />

<strong>Database</strong> Options<br />

Data Compression<br />

Demo - Creating <strong>Database</strong>s<br />

Lesson 2: Creating Filegroups<br />

What are Filegroups?<br />

Improving <strong>Database</strong> Performance by Using Filegroups<br />

Demo - Creating Filegroups<br />

Lesson 3: Creating Schemas<br />

What are Schemas?<br />

How Object Name Resolution Works<br />

Demo - Creating a Schema<br />

1 hr. 19 min.<br />

4 min.


Lesson 4: Creating <strong>Database</strong> Snapshots<br />

How <strong>Database</strong> Snapshots Work<br />

When to Use <strong>Database</strong> Snapshots<br />

Demo - Creating <strong>Database</strong> Snapshots<br />

Lab: Creating <strong>Database</strong>s and <strong>Database</strong> Files<br />

Module 01 Review<br />

Module 02 - Creating Data Types and Tables<br />

Creating Data Types and Tables<br />

Lesson 1: Creating Data Types<br />

What Are System-Supplied Data Types?<br />

Using System-Supplied Data Types<br />

What Are Alias Data Types?<br />

Demo - Creating Data Types<br />

Lesson 2: Creating Tables<br />

How <strong>SQL</strong> <strong>Server</strong> Organizes Data in Rows<br />

How <strong>SQL</strong> <strong>Server</strong> Organizes Large Data Values<br />

Types of Tables<br />

Considerations for Creating Tables<br />

Generating Transact-<strong>SQL</strong> Scripts<br />

Demo - Creating Tables<br />

Lesson 3: Creating Partitioned Tables<br />

What Are Partitioned Tables?<br />

What Are Partition Functions?<br />

What Is a Partition Scheme?<br />

What Operations Can Be Performed on Partitioned Data?<br />

Demo - Creating a Partitioned Table<br />

Lab: Creating Data Types and Tables<br />

Module 02 Review<br />

Module 03 - Creating and Tuning Indexes<br />

Creating and Tuning Indexes<br />

Lesson 1: Planning Indexes<br />

How <strong>SQL</strong> <strong>Server</strong> Accesses Data<br />

What Is a Heap?<br />

What Is a Clustered Index?<br />

What Is a Nonclustered Index?<br />

<strong>SQL</strong> <strong>Server</strong> Storage Allocation<br />

Simple B-Tree Index Structure (Balanced)<br />

Complex B-Tree Index Structure (Balanced)<br />

Lesson 2: Creating Indexes<br />

Overview of Creating Indexes<br />

What Are Unique Indexes?<br />

Considerations for Creating Indexes with Multiple Columns<br />

When to Create Indexes on Computed Columns<br />

What Are Partitioned Indexes?<br />

Options for Incorporating Free Space in Indexes<br />

Methods for Obtaining Index Information<br />

1 hr. 14 min.<br />

1 hr. 9 min.


Demo - Creating Indexes<br />

Lesson 3: Optimizing Indexes<br />

What Is the <strong>Database</strong> Engine Tuning Advisor?<br />

Demo - Using the <strong>Database</strong> Engine Tuning Advisor<br />

Index Fragmentation<br />

Options for Defragmenting Indexes<br />

Demo - Defragmenting Indexes<br />

Lab: Creating and Optimizing Indexes<br />

Module 03 Review<br />

Module 04 - <strong>Implementing</strong> Data Integrity<br />

by Using Constraints and Triggers<br />

<strong>Implementing</strong> Data Integrity by Using Constraints and Triggers<br />

Lesson 1: Data Integrity Overview<br />

Types of Data Integrity<br />

Options for Enforcing Data Integrity<br />

Lesson 2: <strong>Implementing</strong> Constraints<br />

What Are Constraints?<br />

Key Constraints<br />

Other Constraints<br />

Cascading Referential Integrity<br />

Considerations for Constraint Checking<br />

Demo - Creating Constraints<br />

Lesson 3: <strong>Implementing</strong> Triggers<br />

What Are Triggers?<br />

How an INSERT Trigger Works<br />

How a DELETE Trigger Works<br />

How an UPDATE Trigger Works<br />

How an INSTEAD OF Trigger Works<br />

How Nested Triggers Work<br />

Considerations for Recursive Triggers<br />

Demo - Creating Triggers<br />

Lab: <strong>Implementing</strong> Data Integrity by Using Constraints and Triggers<br />

Module 04 Review<br />

Module 05 - Using XML<br />

Using XML<br />

Lesson 1: Using the XML Data Type<br />

What Is XML?<br />

What Is the XML Data Type?<br />

The Query, Value, and Exist Methods<br />

The Modify Method<br />

The Nodes Method<br />

Demo - Using the XML Data Type<br />

Lesson 2: Retrieving XML by Using FOR XML<br />

Introduction to the FOR XML Clause<br />

What Are RAW Mode Queries?<br />

1 hr. 10 min.<br />

3 hr. 19 min.


What Are AUTO Mode Queries?<br />

What Are EXPLICIT Mode Queries?<br />

What Are PATH Mode Queries?<br />

Syntax for Retrieving Nested XML<br />

Demo - Using FOR XML<br />

Lesson 3: Shredding XML by Using OPENXML<br />

Overview of Shredding XML Data<br />

Stored Procedures for Managing In-Memory Node Trees<br />

OPENXML Syntax<br />

Syntax for Working with XML Namespaces<br />

Demo - Using OPENXML to Shred XML<br />

Lesson 4: Introducing XQuery<br />

What Is XQuery?<br />

XQuery Basics<br />

XQuery Expressions<br />

Demo - Using XQuery Expressions<br />

Lesson 5: Creating XML Indexes<br />

What Are XML Indexes?<br />

What Are the Benefits of XML Indexes?<br />

Types of XML Indexes<br />

Demo - Creating XML Indexes<br />

Lesson 6: <strong>Implementing</strong> XML Schemas<br />

What Are XML Schemas?<br />

XML Schema Validation<br />

What Is an XML Schema Collection?<br />

What Is Typed and Untyped XML<br />

Demo - Using Typed XML<br />

Lab: Using XML<br />

Module 05 Review<br />

Module 06 - <strong>Implementing</strong> Views<br />

<strong>Implementing</strong> Views<br />

Lesson 1: Introduction to Views<br />

What Is a View?<br />

Types of Views<br />

Advantages of Views<br />

Lesson 2: Creating and Managing Views<br />

Syntax for Creating Views<br />

Demo - Creating a View<br />

Syntax for Altering and Dropping Views<br />

View Encryption<br />

How Ownership Chains Affect Views<br />

Sources of Information About Views<br />

Considerations for Modifying Data in a View<br />

Demo - Creating Views with Transact <strong>SQL</strong><br />

Demo - Creating a View with Schema Binding<br />

Lesson 3: Optimizing Performance by Using Views<br />

Performance Considerations for Views<br />

Performance Considerations for Indexed Views<br />

What Is a Partitioned View?<br />

1 hr. 5 min.


Lab: <strong>Implementing</strong> Views<br />

Module 06 Review<br />

Module 07 - <strong>Implementing</strong> Stored Procedures<br />

<strong>Implementing</strong> Stored Procedures<br />

Lesson 1: Using Stored Procedures<br />

Discussion: What Is a Stored Procedure<br />

Syntax for Creating Stored Procedures<br />

Guidelines for Creating Stored Procedures<br />

Demo - Creating Stored Procedures<br />

Syntax for Altering Stored Procedures<br />

Syntax for Dropping Stored Procedures<br />

Demo - Altering and Dropping Stored Procedures<br />

Demo - Switching Execution Context<br />

Lesson 2: Creating Parameterized Stored Procedures<br />

Stored Procedure Parameters<br />

Demo - Creating a Parameterized Stored Procedure<br />

Table-valued Parameters<br />

Demo - Using Table Value Parameters<br />

Lesson 3: Working With Execution Plans<br />

What Is an Execution Plan?<br />

Viewing an Execution Plan<br />

Execution Plan Caching<br />

Query Compilation<br />

Forced Stored Procedure Recompilation<br />

Demo - Using Execution Plans<br />

Lesson 4: Handling Exceptions<br />

Syntax for Structured Exception Handling<br />

Guidelines for Handling Exceptions<br />

Demo - Handling Exceptions<br />

Lab: <strong>Implementing</strong> Stored Procedures<br />

Module 07 Review<br />

Module 08 - <strong>Implementing</strong> Functions<br />

<strong>Implementing</strong> Functions<br />

Lesson 1: Introducing Functions<br />

Types of Functions<br />

What Is a Scalar Function?<br />

Scalar Function Example<br />

What Is an Inline Table-Valued Function?<br />

Inline Table-Valued Function Example<br />

What Is a Multi-Statement Table-Valued Function?<br />

Multi-Statement Table-Valued Function Example<br />

Demo - Creating Functions<br />

Demo - Creating Inline Table-Valued Functions<br />

Demo - Creating Multi-Statement Table-Valued Functions<br />

Lesson 2: Working with Functions<br />

Deterministic and Nondeterministic Functions<br />

Guidelines for Creating Functions<br />

Rewriting Stored Procedures as Functions<br />

1 hr. 55 min.<br />

1 hr. 11 min.


Lesson 3: Controlling Execution Context<br />

What Is Execution Context?<br />

The EXECUTE AS Clause<br />

Extending Impersonation Context<br />

Lab: <strong>Implementing</strong> Functions<br />

Module 08 Review<br />

Module 09 - <strong>Implementing</strong> Managed Code in a <strong>Database</strong><br />

<strong>Implementing</strong> Managed Code in a <strong>Database</strong><br />

Lesson 1: Introduction to the <strong>SQL</strong> <strong>Server</strong> Common Language Runtime<br />

Introduction to the .NET Framework<br />

What Is the .NET Common Language Runtime?<br />

Advantages of Managed Code<br />

CLR Managed Code <strong>Database</strong> Objects<br />

Managed Code vs. Transact <strong>SQL</strong><br />

Lesson 2: Importing and Configuring Assemblies<br />

What Is an Assembly?<br />

Assembly Trust Levels<br />

Syntax for Importing an Assembly<br />

Demo - Importing and Configuring an Assembly<br />

Lesson 3: Creating Managed <strong>Database</strong> Objects<br />

Overview of Managed <strong>Database</strong> Objects<br />

Managed Stored Procedures, Triggers and Functions<br />

Managed Aggregates and User-Defined Types<br />

Demo - Creating Managed <strong>Database</strong> Objects<br />

Lab: <strong>Implementing</strong> Managed Code in a <strong>Database</strong><br />

Module 09 Review<br />

Module 10 - Managing Transactions and Locks<br />

Managing Transactions and Locks<br />

Lesson 1: Overview of Transactions and Locks<br />

What Are Transactions?<br />

What Are Locks?<br />

What Is Concurrency Control?<br />

Demo - Introducing Transactions<br />

Lesson 2: Managing Transactions<br />

Autocommit Transactions<br />

Explicit Transactions<br />

Implicit Transactions<br />

Transaction Recovery<br />

Considerations for Using Transactions<br />

Restricted Statements<br />

Lesson 3: Understanding <strong>SQL</strong> <strong>Server</strong> Locking Architecture<br />

What Concurrency Problems Are Prevented by Locking?<br />

Lockable Resources<br />

Types of Locks<br />

Lock Compatibility<br />

Locking Compatibility Matrix<br />

Lesson 4: Managing Locks<br />

Session-Level Locking Options<br />

1 hr. 10 min.<br />

2 hr. 2 min.


Locking Isolation Level Options<br />

Setting ISOLATION for Session<br />

Lock Escalation<br />

Dynamic Locking<br />

What Are Deadlocks?<br />

Avoiding Deadlocks<br />

Methods to View Locking Information<br />

Demo - Viewing Locking Information<br />

Lab: Managing Transactions and Locks<br />

Module 10 Review<br />

Module 11 - Using Service Broker<br />

Using Service Broker<br />

Lesson 1: Service Broker Overview<br />

What Is Service Broker?<br />

Service Broker System Architecture<br />

Service Broker Conversation Architecture<br />

Service Broker Conversation Process<br />

Service Broker Conversation Priority<br />

Syntax for Creating Conversation Broker Priority<br />

Service Broker Security Architecture<br />

Management Studio Enhancements<br />

Lesson 2: Creating Service Broker Objects<br />

Enabling Service Broker<br />

External Activation Support<br />

Syntax for Creating Message Types<br />

Syntax for Creating Contracts<br />

Syntax for Creating Queues<br />

Syntax for Creating Services<br />

Demo - Creating Service Broker Objects<br />

Lesson 3: Sending and Receiving Messages<br />

Syntax for Sending Messages<br />

Syntax for Receiving Messages<br />

Demo - Sending and Receiving Messages<br />

Diagnostic Tools for Sending\Receiving Messages<br />

Lab: Using Service Broker<br />

Module 11 Review<br />

Course Closure<br />

Course Introduction<br />

Module 1 - Designing an AD Forest Infrastructure<br />

Designing an Active Directory Forest Infrastructure in Windows <strong>Server</strong> <strong>2008</strong><br />

Overview of AD DS Forest Design Requirements<br />

Design Requirements – AD DS Forest<br />

Business Requirements for an AD DS Forest Design<br />

AD Forest Design<br />

Administrative and Security Requirements<br />

Technical Requirements for an AD DS Forest Design<br />

Types of AD DS Forests<br />

1 hr. 20 min.<br />

1h7m<br />

8m


Benefits of a Single Forest Model<br />

Disadvantages of Single Forest Model<br />

Reasons for <strong>Implementing</strong> Multiple Forests<br />

Benefits of <strong>Implementing</strong> Forest Root Domains<br />

Types of Forest Functional Levels<br />

Forest Functional Levels<br />

Windows <strong>Server</strong> 2003 Forest Functional Level<br />

Guidelines for Designing an AD DS Forest<br />

Types of Trusts<br />

What Is UPN Suffix Routing?<br />

Guidelines for Designing Forest Trusts<br />

Demo: <strong>Implementing</strong> an AD Forest Trust Design<br />

Modifications to AD DS Schema<br />

Guidelines for AD DS Schema Modifications<br />

Demo: Schema Changes<br />

How Does Windows Time Service Work?<br />

Considerations for Configuring Windows Time Service<br />

Member <strong>Server</strong>s and Workstations<br />

Domain Controllers<br />

Considerations<br />

Module 1 Review<br />

Module 2 - Designing an AD Domain Infrastructure<br />

Designing an Active Directory Domain Infrastructure in Windows <strong>Server</strong> <strong>2008</strong><br />

AD DS Domain Design Models<br />

AD DS Domain Models<br />

Factors to Consider When Accessing Domain Models<br />

Reasons for Deploying Multiple AD DS Domains<br />

AD DS Domain Functional Levels<br />

Supported Domain Controller Operating Systems<br />

Considerations for Configuring and Placing the Domain Controllers<br />

Considerations for Deploying Domain Controllers in Branch Offices<br />

Read Only Domain Controller (RODC)<br />

Guidelines for Designing AD DS Domains<br />

Choosing an AD DS Namespace Strategy<br />

Guidelines for Integrating the Public and Private DNS Namespaces<br />

Guidelines for Integrating Multiple Internal DNS Namespaces<br />

Guidelines for <strong>Implementing</strong> DNS <strong>Server</strong>s<br />

Demo: Configuring Forwarders and Delegation Records<br />

Windows <strong>2008</strong> Domain Controllers<br />

Domain Controller on a <strong>Server</strong> Core<br />

Deploying Domain Controllers in Windows <strong>Server</strong> <strong>2008</strong><br />

Deploying Domain Controllers in Windows <strong>Server</strong> <strong>2008</strong> - RODC<br />

Why Deploy RODC?<br />

Considerations When Deploying Domain Controllers<br />

Demo: Configuring an RODC Replication Policy<br />

Types of AD DS Domain Trusts<br />

Security Considerations for Trusts<br />

Demo: Trust Design<br />

Module 02 Review<br />

1h11m


Module 03 - Designing AD Sites and Replication<br />

Designing Active Directory Sites and Replication in Windows <strong>Server</strong> <strong>2008</strong><br />

Things to Document Before the AD Site Design<br />

Network Information for an AD DS Site Design<br />

Location Data for an AD DS Site Design<br />

AD DS Site Models<br />

Guidelines for Creating Additional AD DS Sites<br />

Demo: <strong>Implementing</strong> AD DS Site Design<br />

Locations<br />

How Does Automatic Site Coverage Work?<br />

Types of Replication Topologies<br />

Considerations for Choosing a Replication Protocol<br />

Levels of Connectivity<br />

Choosing Replication Protocols<br />

Demo: <strong>Implementing</strong> AD DS Replication<br />

Replication of Global Catalog, RODC, and SYSVOL<br />

Knowledge Consistency Checker<br />

Inter Site Topology Generator<br />

Using Site Links to Manage Replication<br />

Considerations for Designing Site Links and Bridgehead <strong>Server</strong>s<br />

Considerations for Designing Site-Link Bridging<br />

Considerations for Site Link Bridging<br />

Options for Configuring AD DS Replication<br />

Guidelines for Configuring AD DS Replication<br />

Guidelines for Placing Domain Controllers<br />

Guidelines for Placing RODCs<br />

Guidelines for Placing Global Catalog <strong>Server</strong>s<br />

Guidelines for Placing Operations Master <strong>Server</strong>s<br />

Module 03 Review<br />

Module 04 - Designing AD Domain Administrative Structures<br />

Designing Active Directory Domain Administrative Structures in Windows <strong>Server</strong> <strong>2008</strong><br />

Types of IT Administrative Models<br />

Guidelines for Gathering Information on the Current Administrative Structures<br />

Business Requirements for Existing Structure<br />

Legal Requirements<br />

Guidelines for Gathering Information on Organizational Resources<br />

Guidelines for Gathering Information on Administrative Processes<br />

Strategies for Designing Organizational Units<br />

Strategies for Delegating Administrative Control<br />

Strategies for Designing Group Policy Structures<br />

Considerations for Designing Organizational Unit Hierarchies<br />

Guidelines for Designing an Organizational Unit Structure<br />

Demo: Creating an AD OU Design<br />

AD DS Groups in Windows <strong>Server</strong> <strong>2008</strong><br />

Group Scope<br />

Guidelines for Developing a Group Naming Strategy<br />

Considerations for Group Nesting<br />

Group Nesting<br />

1h20m<br />

56m


Strategies for Using Groups to Access Resources<br />

Strategies for Placing Group Objects<br />

Guidelines for Designing an AD DS Group Strategy<br />

Guidelines for Designing a User Account Strategy<br />

Guidelines for Designing a Computer Account Strategy<br />

Naming Strategies for Computer Accounts<br />

Guidelines for Securing User and Computer Account Management<br />

Demo: Automating User Account Management<br />

Tools for Automating User and Computer Account Management<br />

Module 04 Review<br />

Module 05 - Designing AD Group Policy<br />

Designing Active Directory Group Policy in Windows <strong>Server</strong> <strong>2008</strong><br />

Gathering Organizational Information<br />

Gathering Information on Security Requirements<br />

Gathering Information on Desktop Management Requirements<br />

Gathering Information on Desktop Management<br />

Gathering Information on Administrative Processes<br />

Configuring Group Policy Settings<br />

Demo: Designing AD Group Policy<br />

Applying Group Policy Settings<br />

Demo: <strong>Implementing</strong> AD Group Policy<br />

Group Policy Storage Locations<br />

ADMX Format for Administrative Template<br />

Guidelines for Designing Administrative Templates<br />

Slow Link Detection<br />

Best Practices for Group Policy Model Design<br />

Guidelines for Designing Group Policy Inheritance<br />

Guidelines for Designing Group Policy Filtering<br />

Guidelines for Designing Group Policy Application<br />

GPO Backup and Recovery Strategy<br />

GPO Migration Strategy<br />

Delegating GPO Administration<br />

GPO Administration<br />

Module 05 Review<br />

Module 06 - Designing AD Security<br />

Designing Active Directory Security in Windows <strong>Server</strong> <strong>2008</strong><br />

Gathering Information for Designing Account Security Policies<br />

Key Components for Designing Account Security Policies<br />

Guidelines for Designing Account and Password Policy<br />

Guidelines for Designing Secure Account Management<br />

Fine-Grained Password Policies<br />

What Are Fine-Grained Password Policies?<br />

Storing Fine-Grained Password Policies<br />

Demo: Designing AD DS Security<br />

Password Setting Object Attributes<br />

How PSOs Are Processed and Applied<br />

Guidelines for Designing Fine-Grained<br />

Key Components that Affect Domain Controller Security<br />

1h21m<br />

1h52m


Why Modify the Default Domain Controller Security Policy?<br />

<strong>Server</strong> Core <strong>Server</strong> Roles<br />

<strong>Server</strong> Core as a Solution for Domain Controller Deployment<br />

What is the Security Configuration Wizard?<br />

Scenarios for Using the Security Configuration Wizard<br />

What Are Read-Only Domain Controllers?<br />

Prerequisites for Deploying RODCs<br />

Administrator Role Separation on RODCs<br />

Demo: Domain Controller/RODC Security Policies<br />

Administrator Responsibilities<br />

Service Administrator and Service Management<br />

Data Administrators and Data Management<br />

What Are Administrative Autonomy<br />

Delegation of Administrative Permission<br />

Attributes of a Good Delegation Model<br />

Guidelines for Creating a Delegation Model<br />

Guidelines for Using and Securing Administrator Accounts<br />

Demo: Restricted Groups<br />

Auditing Administrative Access<br />

Module 06 Review<br />

Module 07 - Designing AD High Availability<br />

Designing Active Directory High Availability in Windows <strong>Server</strong> <strong>2008</strong><br />

What is High Availability?<br />

Components of an Active Directory High Availability Design<br />

Active Directory High Availability<br />

Business Requirements for AD DS High Availability<br />

Infrastructure Requirements for AD DS High Availability<br />

High Availability Options for Network Infrastructure<br />

Process of Planning for High Availability<br />

Guidelines for Designing Highly Available Domain Controllers<br />

Global Catalog Placement and High Availability<br />

Demo: Designing AD DS Availability<br />

High Availability of DNS<br />

Guidelines for Designing Highly Available Network Infrastructure<br />

Module 07 Review<br />

Module 08 - Designing AD Disaster Recovery<br />

Designing Active Directory Disaster Recovery in Windows <strong>Server</strong> <strong>2008</strong><br />

Overview of <strong>Database</strong> Maintenance<br />

NTDSUtil.exe<br />

Benefits of Restartable AD DS in Windows <strong>Server</strong> <strong>2008</strong><br />

Considerations for Using Restartable AD DS<br />

Overview of AD DS Backup and Recovery<br />

Windows <strong>Server</strong> Backup<br />

AD DS Backup and Recovery in Windows <strong>Server</strong> <strong>2008</strong><br />

Active Directory Domain Services Backup System Components<br />

System State Data<br />

Critical Volumes – Review<br />

Options for Restoring AD DS<br />

57m<br />

27m


Considerations for Restoring AD DS<br />

Guidelines for Designing Backup and Recovery in AD DS<br />

Why Monitor AD DS?<br />

Tools for Monitoring AD DS<br />

Reliability and Performance Monitor<br />

Demo: Disaster Recovery and Monitoring<br />

Guidelines for Monitoring Active Directory Domain Controllers<br />

NTDS Counters – Monitoring AD<br />

Module 08 Review<br />

Module 09 - Designing Public Key Infrastructure<br />

Designing Public Key Infrastructure in Windows <strong>Server</strong> <strong>2008</strong><br />

What is a PKI?<br />

Key Components of a PKI<br />

PKI Solution Requirements<br />

Applications That Use PKI<br />

Certification Authorities and PKI<br />

Comparison of Enterprise and Standalone<br />

Internal and Public Certification Authorities<br />

Using Both Internal and External Public CA’s<br />

Active Directory Certificate Services in Windows <strong>Server</strong> <strong>2008</strong><br />

Features in AD CS<br />

Gathering Information for Designing Certification Authority Hierarchy<br />

Certification Authority Hierarchy Roles<br />

Common Roles in a CA Hierarchy<br />

Demo: Designing PKI for Windows <strong>Server</strong><br />

Options for Designing Certification Authority Hierarchy<br />

Types of CA Hierarchies<br />

Guidelines for Designing a Certification Authority Hierarchy<br />

What Are Certificate Templates?<br />

Certificate Templates in Windows <strong>Server</strong> <strong>2008</strong><br />

Managing Certificate Templates<br />

Superseding Templates Feature<br />

Designing Certificate Templates<br />

Designing Certificate Templates with Customized Add-ons<br />

Demo: Updating Templates<br />

Guidelines for Designing Certificate Templates<br />

Certificate Distribution and Enrollment<br />

Choosing Enrollment Method<br />

Certificate Autoenrollment<br />

Demo: <strong>Implementing</strong> Autoenrollment<br />

What is Certificate Revocation?<br />

Guidelines for Designing Certificate Revocation<br />

Module 09 Review<br />

Module 10 - Designing an AD RMS Infrastructure<br />

Designing an Active Directory RMS Infrastructure in Windows <strong>Server</strong> <strong>2008</strong><br />

What is AD RMS?<br />

Key Components of AD RMS<br />

Scalability Requirements for AD RMS Design<br />

1h29m<br />

45m


Considerations for External Client AD RMS Access<br />

What are AD RMS Rights Policy Templates?<br />

Options for Configuring AD RMS Clusters<br />

Guidelines for Designing AD RMS Clusters<br />

Options for Granting External Users Access to AD RMS<br />

Guidelines for Designing AD RMS Access<br />

AD RMS Backup Components<br />

Options for Restoring AD RMS<br />

Troubleshooting AD RMS Restores – Different Processes<br />

Restoring a Cluster Member<br />

Restoring a Non-Cluster <strong>Server</strong><br />

Demo: Exploring RMS<br />

RMS Root <strong>Server</strong><br />

Guidelines for <strong>Implementing</strong> an AD RMS Backup and Recovery Strategy<br />

Module 10 Review<br />

Module 11 - Designing an AD Federation Services Implementation<br />

54m<br />

Designing an Active Directory Federation Services Implementation in Windows <strong>Server</strong> <strong>2008</strong><br />

What is Active Directory Federation Services?<br />

Key Components of AD FS<br />

Deployment Scenarios for AD FS<br />

AD FS <strong>Server</strong> Roles<br />

AD FS <strong>Server</strong> Placement<br />

AD FS User Account Stores<br />

Components of a B2B Federation Trust<br />

B2B Federation Trust<br />

Demo: Adding the Federation Service Role<br />

Demo: Exporting Certificates<br />

Demo: Importing Certificates<br />

Key Components of B2B Federation Trust<br />

Guidelines for Configuring Certificates and Applications<br />

Guidelines for Designing the Account and Resource Partner Components<br />

Guidelines for Deploying and Securing AD FS <strong>Server</strong>s<br />

Deploy Federation <strong>Server</strong> Proxy In Perimeter Network When…<br />

Additional Guidelines for Deploying and Securing ADFS <strong>Server</strong>s<br />

Options for Configuring AD FS Claims<br />

AD FS Group Claims<br />

Guidelines for Usage of AD FS Claims<br />

Understanding AD FS Applications<br />

Guidelines for Usage of Token-based and Claims-aware Applications<br />

Module 11 Review<br />

Module 12 - Designing an AD LDS Implementation<br />

Designing an Active Directory LDS Implementation<br />

What is AD LDS?<br />

AD LDS Usage<br />

LDAP-Compliant Application Directories<br />

Definitions - LDAP Application Directories<br />

LDAP Compliant Applications - Defined<br />

Extranet Authentication Scenarios<br />

1h


Using AD LDS for Developing Schema Modifications<br />

Key Sizing Factors for AD LDS <strong>Server</strong>s<br />

AD LDS Replication Scenarios<br />

Integration of AD LDS with AD DS<br />

Guidelines for Designing AD LDS Instances and Application Partitions<br />

Schema Changes and AD LDS<br />

Replication of AD LDS Data<br />

Planning AD LDS Replication Traffic across WAN Links<br />

AD LDS Sites and Site Links<br />

Guidelines for Designing AD LDS Schema and Replication<br />

User Proxies in AD LDS<br />

Authentication and Authorization in AD LDS<br />

<strong>Implementing</strong> Synchronization between AD DS and AD LDS<br />

Demo: Working with AD LDS<br />

Module 12 Review<br />

Module 13 - Designing AD Migrations<br />

Designing Active Directory Migrations in Windows <strong>Server</strong> <strong>2008</strong><br />

AD DS Migration Strategies<br />

Domain Upgrade Strategy<br />

Domain Restructure Strategy<br />

Domain Upgrade and Restructure<br />

Criteria for Choosing a Migration Strategy<br />

Guidelines for Choosing the Domain Upgrade Strategy<br />

Guidelines for Choosing the Domain Restructure Strategy<br />

Guidelines for Choosing the Domain Upgrade and Restructure Strategy<br />

Documenting the Current Environment<br />

Active Directory Structure<br />

Current Network Services<br />

Current Domain Controller Hardware and Software<br />

Cleaning Up the Current Active Directory Environment<br />

Hardware and Application Compatibility<br />

Preparing a Domain and Forest for Upgrade<br />

Upgrade Guidelines<br />

Domain Functional Levels in Windows <strong>Server</strong> <strong>2008</strong><br />

Windows 2000 Native Functional Level<br />

Windows <strong>Server</strong> 2003 Functional Level<br />

Windows <strong>Server</strong> <strong>2008</strong> Functional Mode<br />

SID History<br />

Active Directory Migration Tool<br />

ADMT Scenarios<br />

Preparing a Domain to Run ADMT<br />

Demo: Installing ADMT<br />

Intraforest and Interforest Restructuring<br />

Demo: Using ADMT Trusts<br />

59m


Guidelines for Restructuring Domains<br />

Module 13 Review<br />

Course Closure<br />

Course Introduction<br />

Module 1 - Designing an AD Forest Infrastructure<br />

Designing an Active Directory Forest Infrastructure in Windows <strong>Server</strong> <strong>2008</strong><br />

Overview of AD DS Forest Design Requirements<br />

Design Requirements – AD DS Forest<br />

Business Requirements for an AD DS Forest Design<br />

AD Forest Design<br />

Administrative and Security Requirements<br />

Technical Requirements for an AD DS Forest Design<br />

Types of AD DS Forests<br />

Benefits of a Single Forest Model<br />

Disadvantages of Single Forest Model<br />

Reasons for <strong>Implementing</strong> Multiple Forests<br />

Benefits of <strong>Implementing</strong> Forest Root Domains<br />

Types of Forest Functional Levels<br />

Forest Functional Levels<br />

Windows <strong>Server</strong> 2003 Forest Functional Level<br />

Guidelines for Designing an AD DS Forest<br />

Types of Trusts<br />

What Is UPN Suffix Routing?<br />

Guidelines for Designing Forest Trusts<br />

Demo: <strong>Implementing</strong> an AD Forest Trust Design<br />

Modifications to AD DS Schema<br />

Guidelines for AD DS Schema Modifications<br />

Demo: Schema Changes<br />

How Does Windows Time Service Work?<br />

Considerations for Configuring Windows Time Service<br />

Member <strong>Server</strong>s and Workstations<br />

Domain Controllers<br />

Considerations<br />

Module 1 Review<br />

Module 2 - Designing an AD Domain Infrastructure<br />

Designing an Active Directory Domain Infrastructure in Windows <strong>Server</strong> <strong>2008</strong><br />

AD DS Domain Design Models<br />

AD DS Domain Models<br />

Factors to Consider When Accessing Domain Models<br />

Reasons for Deploying Multiple AD DS Domains<br />

AD DS Domain Functional Levels<br />

Supported Domain Controller Operating Systems<br />

Considerations for Configuring and Placing the Domain Controllers<br />

Considerations for Deploying Domain Controllers in Branch Offices<br />

Read Only Domain Controller (RODC)<br />

Guidelines for Designing AD DS Domains<br />

Choosing an AD DS Namespace Strategy<br />

Guidelines for Integrating the Public and Private DNS Namespaces<br />

1h7m<br />

1h11m<br />

8m


Guidelines for Integrating Multiple Internal DNS Namespaces<br />

Guidelines for <strong>Implementing</strong> DNS <strong>Server</strong>s<br />

Demo: Configuring Forwarders and Delegation Records<br />

Windows <strong>2008</strong> Domain Controllers<br />

Domain Controller on a <strong>Server</strong> Core<br />

Deploying Domain Controllers in Windows <strong>Server</strong> <strong>2008</strong><br />

Deploying Domain Controllers in Windows <strong>Server</strong> <strong>2008</strong> - RODC<br />

Why Deploy RODC?<br />

Considerations When Deploying Domain Controllers<br />

Demo: Configuring an RODC Replication Policy<br />

Types of AD DS Domain Trusts<br />

Security Considerations for Trusts<br />

Demo: Trust Design<br />

Module 02 Review<br />

Module 03 - Designing AD Sites and Replication<br />

Designing Active Directory Sites and Replication in Windows <strong>Server</strong> <strong>2008</strong><br />

Things to Document Before the AD Site Design<br />

Network Information for an AD DS Site Design<br />

Location Data for an AD DS Site Design<br />

AD DS Site Models<br />

Guidelines for Creating Additional AD DS Sites<br />

Demo: <strong>Implementing</strong> AD DS Site Design<br />

Locations<br />

How Does Automatic Site Coverage Work?<br />

Types of Replication Topologies<br />

Considerations for Choosing a Replication Protocol<br />

Levels of Connectivity<br />

Choosing Replication Protocols<br />

Demo: <strong>Implementing</strong> AD DS Replication<br />

Replication of Global Catalog, RODC, and SYSVOL<br />

Knowledge Consistency Checker<br />

Inter Site Topology Generator<br />

Using Site Links to Manage Replication<br />

Considerations for Designing Site Links and Bridgehead <strong>Server</strong>s<br />

Considerations for Designing Site-Link Bridging<br />

Considerations for Site Link Bridging<br />

Options for Configuring AD DS Replication<br />

Guidelines for Configuring AD DS Replication<br />

Guidelines for Placing Domain Controllers<br />

Guidelines for Placing RODCs<br />

Guidelines for Placing Global Catalog <strong>Server</strong>s<br />

Guidelines for Placing Operations Master <strong>Server</strong>s<br />

Module 03 Review<br />

Module 04 - Designing AD Domain Administrative Structures<br />

Designing Active Directory Domain Administrative Structures in Windows <strong>Server</strong> <strong>2008</strong><br />

Types of IT Administrative Models<br />

Guidelines for Gathering Information on the Current Administrative Structures<br />

Business Requirements for Existing Structure<br />

1h20m<br />

56m


Legal Requirements<br />

Guidelines for Gathering Information on Organizational Resources<br />

Guidelines for Gathering Information on Administrative Processes<br />

Strategies for Designing Organizational Units<br />

Strategies for Delegating Administrative Control<br />

Strategies for Designing Group Policy Structures<br />

Considerations for Designing Organizational Unit Hierarchies<br />

Guidelines for Designing an Organizational Unit Structure<br />

Demo: Creating an AD OU Design<br />

AD DS Groups in Windows <strong>Server</strong> <strong>2008</strong><br />

Group Scope<br />

Guidelines for Developing a Group Naming Strategy<br />

Considerations for Group Nesting<br />

Group Nesting<br />

Strategies for Using Groups to Access Resources<br />

Strategies for Placing Group Objects<br />

Guidelines for Designing an AD DS Group Strategy<br />

Guidelines for Designing a User Account Strategy<br />

Guidelines for Designing a Computer Account Strategy<br />

Naming Strategies for Computer Accounts<br />

Guidelines for Securing User and Computer Account Management<br />

Demo: Automating User Account Management<br />

Tools for Automating User and Computer Account Management<br />

Module 04 Review<br />

Module 05 - Designing AD Group Policy<br />

Designing Active Directory Group Policy in Windows <strong>Server</strong> <strong>2008</strong><br />

Gathering Organizational Information<br />

Gathering Information on Security Requirements<br />

Gathering Information on Desktop Management Requirements<br />

Gathering Information on Desktop Management<br />

Gathering Information on Administrative Processes<br />

Configuring Group Policy Settings<br />

Demo: Designing AD Group Policy<br />

Applying Group Policy Settings<br />

Demo: <strong>Implementing</strong> AD Group Policy<br />

Group Policy Storage Locations<br />

ADMX Format for Administrative Template<br />

Guidelines for Designing Administrative Templates<br />

Slow Link Detection<br />

Best Practices for Group Policy Model Design<br />

Guidelines for Designing Group Policy Inheritance<br />

Guidelines for Designing Group Policy Filtering<br />

Guidelines for Designing Group Policy Application<br />

GPO Backup and Recovery Strategy<br />

GPO Migration Strategy<br />

Delegating GPO Administration<br />

GPO Administration<br />

Module 05 Review<br />

1h21m


Module 06 - Designing AD Security<br />

Designing Active Directory Security in Windows <strong>Server</strong> <strong>2008</strong><br />

Gathering Information for Designing Account Security Policies<br />

Key Components for Designing Account Security Policies<br />

Guidelines for Designing Account and Password Policy<br />

Guidelines for Designing Secure Account Management<br />

Fine-Grained Password Policies<br />

What Are Fine-Grained Password Policies?<br />

Storing Fine-Grained Password Policies<br />

Demo: Designing AD DS Security<br />

Password Setting Object Attributes<br />

How PSOs Are Processed and Applied<br />

Guidelines for Designing Fine-Grained<br />

Key Components that Affect Domain Controller Security<br />

Why Modify the Default Domain Controller Security Policy?<br />

<strong>Server</strong> Core <strong>Server</strong> Roles<br />

<strong>Server</strong> Core as a Solution for Domain Controller Deployment<br />

What is the Security Configuration Wizard?<br />

Scenarios for Using the Security Configuration Wizard<br />

What Are Read-Only Domain Controllers?<br />

Prerequisites for Deploying RODCs<br />

Administrator Role Separation on RODCs<br />

Demo: Domain Controller/RODC Security Policies<br />

Administrator Responsibilities<br />

Service Administrator and Service Management<br />

Data Administrators and Data Management<br />

What Are Administrative Autonomy<br />

Delegation of Administrative Permission<br />

Attributes of a Good Delegation Model<br />

Guidelines for Creating a Delegation Model<br />

Guidelines for Using and Securing Administrator Accounts<br />

Demo: Restricted Groups<br />

Auditing Administrative Access<br />

Module 06 Review<br />

Module 07 - Designing AD High Availability<br />

Designing Active Directory High Availability in Windows <strong>Server</strong> <strong>2008</strong><br />

What is High Availability?<br />

Components of an Active Directory High Availability Design<br />

Active Directory High Availability<br />

Business Requirements for AD DS High Availability<br />

Infrastructure Requirements for AD DS High Availability<br />

High Availability Options for Network Infrastructure<br />

Process of Planning for High Availability<br />

Guidelines for Designing Highly Available Domain Controllers<br />

Global Catalog Placement and High Availability<br />

Demo: Designing AD DS Availability<br />

High Availability of DNS<br />

Guidelines for Designing Highly Available Network Infrastructure<br />

Module 07 Review<br />

1h52m<br />

27m


Module 08 - Designing AD Disaster Recovery<br />

Designing Active Directory Disaster Recovery in Windows <strong>Server</strong> <strong>2008</strong><br />

Overview of <strong>Database</strong> Maintenance<br />

NTDSUtil.exe<br />

Benefits of Restartable AD DS in Windows <strong>Server</strong> <strong>2008</strong><br />

Considerations for Using Restartable AD DS<br />

Overview of AD DS Backup and Recovery<br />

Windows <strong>Server</strong> Backup<br />

AD DS Backup and Recovery in Windows <strong>Server</strong> <strong>2008</strong><br />

Active Directory Domain Services Backup System Components<br />

System State Data<br />

Critical Volumes – Review<br />

Options for Restoring AD DS<br />

Considerations for Restoring AD DS<br />

Guidelines for Designing Backup and Recovery in AD DS<br />

Why Monitor AD DS?<br />

Tools for Monitoring AD DS<br />

Reliability and Performance Monitor<br />

Demo: Disaster Recovery and Monitoring<br />

Guidelines for Monitoring Active Directory Domain Controllers<br />

NTDS Counters – Monitoring AD<br />

Module 08 Review<br />

Module 09 - Designing Public Key Infrastructure<br />

Designing Public Key Infrastructure in Windows <strong>Server</strong> <strong>2008</strong><br />

What is a PKI?<br />

Key Components of a PKI<br />

PKI Solution Requirements<br />

Applications That Use PKI<br />

Certification Authorities and PKI<br />

Comparison of Enterprise and Standalone<br />

Internal and Public Certification Authorities<br />

Using Both Internal and External Public CA’s<br />

Active Directory Certificate Services in Windows <strong>Server</strong> <strong>2008</strong><br />

Features in AD CS<br />

Gathering Information for Designing Certification Authority Hierarchy<br />

Certification Authority Hierarchy Roles<br />

Common Roles in a CA Hierarchy<br />

Demo: Designing PKI for Windows <strong>Server</strong><br />

Options for Designing Certification Authority Hierarchy<br />

Types of CA Hierarchies<br />

Guidelines for Designing a Certification Authority Hierarchy<br />

What Are Certificate Templates?<br />

Certificate Templates in Windows <strong>Server</strong> <strong>2008</strong><br />

Managing Certificate Templates<br />

Superseding Templates Feature<br />

Designing Certificate Templates<br />

Designing Certificate Templates with Customized Add-ons<br />

Demo: Updating Templates<br />

57m<br />

1h29m


Guidelines for Designing Certificate Templates<br />

Certificate Distribution and Enrollment<br />

Choosing Enrollment Method<br />

Certificate Autoenrollment<br />

Demo: <strong>Implementing</strong> Autoenrollment<br />

What is Certificate Revocation?<br />

Guidelines for Designing Certificate Revocation<br />

Module 09 Review<br />

Module 10 - Designing an AD RMS Infrastructure<br />

Designing an Active Directory RMS Infrastructure in Windows <strong>Server</strong> <strong>2008</strong><br />

What is AD RMS?<br />

Key Components of AD RMS<br />

Scalability Requirements for AD RMS Design<br />

Considerations for External Client AD RMS Access<br />

What are AD RMS Rights Policy Templates?<br />

Options for Configuring AD RMS Clusters<br />

Guidelines for Designing AD RMS Clusters<br />

Options for Granting External Users Access to AD RMS<br />

Guidelines for Designing AD RMS Access<br />

AD RMS Backup Components<br />

Options for Restoring AD RMS<br />

Troubleshooting AD RMS Restores – Different Processes<br />

Restoring a Cluster Member<br />

Restoring a Non-Cluster <strong>Server</strong><br />

Demo: Exploring RMS<br />

RMS Root <strong>Server</strong><br />

Guidelines for <strong>Implementing</strong> an AD RMS Backup and Recovery Strategy<br />

Module 10 Review<br />

Module 11 - Designing an AD Federation Services Implementation<br />

Designing an Active Directory Federation Services Implementation in Windows <strong>Server</strong> <strong>2008</strong><br />

54m<br />

What is Active Directory Federation Services?<br />

Key Components of AD FS<br />

Deployment Scenarios for AD FS<br />

AD FS <strong>Server</strong> Roles<br />

AD FS <strong>Server</strong> Placement<br />

AD FS User Account Stores<br />

Components of a B2B Federation Trust<br />

B2B Federation Trust<br />

Demo: Adding the Federation Service Role<br />

Demo: Exporting Certificates<br />

Demo: Importing Certificates<br />

Key Components of B2B Federation Trust<br />

Guidelines for Configuring Certificates and Applications<br />

Guidelines for Designing the Account and Resource Partner Components<br />

Guidelines for Deploying and Securing AD FS <strong>Server</strong>s<br />

Deploy Federation <strong>Server</strong> Proxy In Perimeter Network When…<br />

Additional Guidelines for Deploying and Securing ADFS <strong>Server</strong>s<br />

Options for Configuring AD FS Claims<br />

45m


AD FS Group Claims<br />

Guidelines for Usage of AD FS Claims<br />

Understanding AD FS Applications<br />

Guidelines for Usage of Token-based and Claims-aware Applications<br />

Module 11 Review<br />

Module 12 - Designing an AD LDS Implementation<br />

Designing an Active Directory LDS Implementation<br />

What is AD LDS?<br />

AD LDS Usage<br />

LDAP-Compliant Application Directories<br />

Definitions - LDAP Application Directories<br />

LDAP Compliant Applications - Defined<br />

Extranet Authentication Scenarios<br />

Using AD LDS for Developing Schema Modifications<br />

Key Sizing Factors for AD LDS <strong>Server</strong>s<br />

AD LDS Replication Scenarios<br />

Integration of AD LDS with AD DS<br />

Guidelines for Designing AD LDS Instances and Application Partitions<br />

Schema Changes and AD LDS<br />

Replication of AD LDS Data<br />

Planning AD LDS Replication Traffic across WAN Links<br />

AD LDS Sites and Site Links<br />

Guidelines for Designing AD LDS Schema and Replication<br />

User Proxies in AD LDS<br />

Authentication and Authorization in AD LDS<br />

<strong>Implementing</strong> Synchronization between AD DS and AD LDS<br />

Demo: Working with AD LDS<br />

Module 12 Review<br />

Module 13 - Designing AD Migrations<br />

Designing Active Directory Migrations in Windows <strong>Server</strong> <strong>2008</strong><br />

AD DS Migration Strategies<br />

Domain Upgrade Strategy<br />

Domain Restructure Strategy<br />

Domain Upgrade and Restructure<br />

Criteria for Choosing a Migration Strategy<br />

Guidelines for Choosing the Domain Upgrade Strategy<br />

Guidelines for Choosing the Domain Restructure Strategy<br />

Guidelines for Choosing the Domain Upgrade and Restructure Strategy<br />

Documenting the Current Environment<br />

Active Directory Structure<br />

Current Network Services<br />

Current Domain Controller Hardware and Software<br />

Cleaning Up the Current Active Directory Environment<br />

1h<br />

59m


Hardware and Application Compatibility<br />

Preparing a Domain and Forest for Upgrade<br />

Upgrade Guidelines<br />

Domain Functional Levels in Windows <strong>Server</strong> <strong>2008</strong><br />

Windows 2000 Native Functional Level<br />

Windows <strong>Server</strong> 2003 Functional Level<br />

Windows <strong>Server</strong> <strong>2008</strong> Functional Mode<br />

SID History<br />

Active Directory Migration Tool<br />

ADMT Scenarios<br />

Preparing a Domain to Run ADMT<br />

Demo: Installing ADMT<br />

Intraforest and Interforest Restructuring<br />

Demo: Using ADMT Trusts<br />

Guidelines for Restructuring Domains<br />

Module 13 Review<br />

Course Closure<br />

Total Duration: 16 hrs 57 min

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!