This document provides an overview of the objectives covered in the Microsoft 70-411 exam for administering Windows Server 2012. It outlines 6 major topics that are evaluated, including deploying, managing and maintaining servers, configuring file and print services, configuring network services and access, configuring a Network Policy Server infrastructure, configuring and managing Active Directory, and configuring and managing Group Policy. Each topic is then broken down into specific objectives that candidates are expected to understand and demonstrate skills in to pass the exam.
This document provides an overview of Android mobile application development including:
- Android is an open source software stack for mobile devices including an operating system, middleware, and key applications.
- The Android software architecture includes components like the Linux kernel, libraries, Android runtime, application framework, and applications.
- Key building blocks for Android applications include activities, intents/intent receivers, services, and content providers.
- The Android SDK and Eclipse IDE can be used for application development along with emulators and real devices.
Selenium is a tool for automating web application testing. It provides an API that is easy to understand and maintain. Selenium WebDriver acts like a normal library and is not tied to any particular test framework. Selenium IDE allows recording and playback of user actions on a browser and can convert scripts to languages like Java and Python. It is useful for learning script syntax. Selenium WebDriver supports automation across different browsers while Selenium IDE only works on Firefox.
- ROLAP (Relational OLAP) stores OLAP data in a relational database like a star schema, with the fact table representing a "cube".
- To create a cube in ROLAP, multiple queries are needed to calculate aggregations at different dimension combinations, which is inefficient as the number of dimensions increases. The CUBE clause allows creating all aggregations with a single query.
- A key challenge with ROLAP is managing the large number of summary tables needed as more dimensions and granularities are added, which increases storage requirements exponentially if not addressed properly. Techniques include building summaries on-demand and selecting optimal pre-aggregations.
Android is an open-source operating system developed by Google and the Open Handset Alliance for use in mobile devices. It was founded in 2003 and purchased by Google in 2005. Key features of Android include support for multiple apps running simultaneously, optimized graphics, and an app marketplace. Major versions of Android include 1.5 Cupcake, 1.6 Donut, 2.0/2.1 Eclair, 2.2 Froyo, 2.3 Gingerbread, 3.0/3.2 Honeycomb, 4.0 Ice Cream Sandwich, 4.1/4.3 Jelly Bean, 5.0/5.1 Lollipop, and 6.0 Marshmallow. While Android
This document provides an overview of the Google Maps API for Android. It discusses how to set up a basic map view, add overlays to the map, calculate distances, add balloons with info windows, perform geocoding of addresses, and update the user interface using handlers. The topics covered include initializing the map, generating an API key, populating overlays, using MyLocationOverlay to track the user's location, converting between coordinate systems, and performing tasks off the main thread. Example code is provided on the speaker's website.
Windows 7 is a computer operating system developed by Microsoft as part of the Windows NT family of operating systems. It was released in 2009 as a faster, more reliable, and compatible refinement of Windows Vista. Windows 7 comes in several editions for different user types and has features like Aero Shake, Aero themes, home media streaming, and improved security tools.
This document provides an overview of Android mobile application development including:
- Android is an open source software stack for mobile devices including an operating system, middleware, and key applications.
- The Android software architecture includes components like the Linux kernel, libraries, Android runtime, application framework, and applications.
- Key building blocks for Android applications include activities, intents/intent receivers, services, and content providers.
- The Android SDK and Eclipse IDE can be used for application development along with emulators and real devices.
Selenium is a tool for automating web application testing. It provides an API that is easy to understand and maintain. Selenium WebDriver acts like a normal library and is not tied to any particular test framework. Selenium IDE allows recording and playback of user actions on a browser and can convert scripts to languages like Java and Python. It is useful for learning script syntax. Selenium WebDriver supports automation across different browsers while Selenium IDE only works on Firefox.
- ROLAP (Relational OLAP) stores OLAP data in a relational database like a star schema, with the fact table representing a "cube".
- To create a cube in ROLAP, multiple queries are needed to calculate aggregations at different dimension combinations, which is inefficient as the number of dimensions increases. The CUBE clause allows creating all aggregations with a single query.
- A key challenge with ROLAP is managing the large number of summary tables needed as more dimensions and granularities are added, which increases storage requirements exponentially if not addressed properly. Techniques include building summaries on-demand and selecting optimal pre-aggregations.
Android is an open-source operating system developed by Google and the Open Handset Alliance for use in mobile devices. It was founded in 2003 and purchased by Google in 2005. Key features of Android include support for multiple apps running simultaneously, optimized graphics, and an app marketplace. Major versions of Android include 1.5 Cupcake, 1.6 Donut, 2.0/2.1 Eclair, 2.2 Froyo, 2.3 Gingerbread, 3.0/3.2 Honeycomb, 4.0 Ice Cream Sandwich, 4.1/4.3 Jelly Bean, 5.0/5.1 Lollipop, and 6.0 Marshmallow. While Android
This document provides an overview of the Google Maps API for Android. It discusses how to set up a basic map view, add overlays to the map, calculate distances, add balloons with info windows, perform geocoding of addresses, and update the user interface using handlers. The topics covered include initializing the map, generating an API key, populating overlays, using MyLocationOverlay to track the user's location, converting between coordinate systems, and performing tasks off the main thread. Example code is provided on the speaker's website.
Windows 7 is a computer operating system developed by Microsoft as part of the Windows NT family of operating systems. It was released in 2009 as a faster, more reliable, and compatible refinement of Windows Vista. Windows 7 comes in several editions for different user types and has features like Aero Shake, Aero themes, home media streaming, and improved security tools.
This document presents information about mobile operating systems. It provides timelines of major mobile operating systems including Symbian OS, BlackBerry OS, iOS, Android, Windows Phone and others. It describes the architecture of Android including layers such as the Linux kernel, native libraries, Android runtime and applications framework. It also outlines the architecture of iOS including the Cocoa Touch layer, media layer, core services layer and core OS layer. In conclusion, it discusses how mobile operating systems continue to rapidly develop and impact many areas of technology.
The document provides information on 10 different mobile operating systems: Symbian OS, Android OS, iPhone OS, BlackBerry OS, Windows Phone 7, Palm OS, Palm webOS, Bada, Maemo OS, and MeeGo OS. It lists these operating systems and then discusses Symbian OS in more detail, covering its history and development, capabilities, security, performance, hardware support and connectivity. It also lists the native programming language of Symbian OS as C++.
This document summarizes and compares 10 different web browsers: Google Chrome, Mozilla Firefox, Internet Explorer, Apple Safari, Opera, Torch, UC Browser, Maxthon, Avant, and Netscape Navigator. It provides details on what each browser is, what platforms it runs on, and highlights some of its key features and limitations. The browsers are ordered from most popular to least popular based on worldwide usage statistics. Google Chrome is identified as the world's most used browser overall.
Presentation on Debian Operating System. In this presentation auther describes the Debian OS and Its Facility and Fetures point-by-point and How Debian Invented. It is also usefull for CSE Student for the presentation of their OS Subject.
The document summarizes the evolution of web browsers from 1990 to present. It discusses the early browsers developed in the 1990s like WorldWideWeb, Mosaic, Erwise, ViolaWWW, and MidasWWW. It then covers popular browsers from the 1990s and 2000s like Netscape, Internet Explorer, Opera, Safari, Firefox, and Google Chrome. The document provides brief details on the key features and market impact of each major browser.
Operating systems control our hardware and run our applications on them, how can we monitor linux operating system?
When we speak about monitoring it's the matter of all hardwares and users.
The slides below will describe the very common command line basic tools for monitoring.
This document provides an overview of the major mobile operating systems iOS and Android. It discusses their architectures and development. iOS was developed by Apple for use in iPhones, iPads, and iPods, and is known for its security features. Android is an open source operating system developed by Google that runs on ARM-based chips and uses a specialized Dalvik virtual machine. The document also briefly mentions other mobile operating systems like Firefox OS, Ubuntu Touch, and Windows Phone OS.
Appium + selenide comaqa.by. Антон СеменченкоAlina Dolgikh
Appium набирает все большую популярность среди инструментов для функционального тестирования мобильных приложений. Selenide - популярная Java обертка над Selenium Webdriver, позволяющая легко и непринужденно писать автоматизированные тесты для веб приложений. Можно ли интегрировать два инструмента, учитывая то, что appium использует свой клиент и свой протокол, несколько отличные от Selenium Webdriver? Что мы сможем выиграть в случае успеха? Давайте поговорим об этом!
This document discusses several mobile operating systems, including Android, iOS, Windows Phone, Symbian, and BlackBerry. It provides details on each OS such as their developer, programming languages used, and key features. The most prominent mobile OSs today are Android, developed by Google and based on Linux, iOS developed by Apple for their iPhone/iPad devices based on Mac OS X, and Windows Phone from Microsoft based on their Win32 platform.
An operating system is software that acts as an interface between computer hardware and the user, allowing applications like browsers and office software to run. There are several types of operating systems including batch processing, multiprogramming, multitasking, multiprocessing, and real-time operating systems. A batch processing OS processes large amounts of data in batches, while a multiprogramming OS can run many programs simultaneously by sharing processor time when one program is waiting for input/output. A multitasking OS further extends this by allowing users to run multiple programs at the same time.
This document discusses test automation using Selenium in a Docker container cluster environment. It begins with an introduction of the speaker and an overview of topics to be covered, including the current technology scenario, Selenium, Selenium Grid, Docker containers, orchestration tools, and recommended third party tools. Key points covered include using Docker containers instead of VMs to run tests in parallel in a lightweight manner, dockerizing tests by building test code into containers, and using orchestration tools like Kubernetes to automate and manage container resources for Selenium Grid. Examples of recommended third party tools that integrate Docker and Selenium are also provided.
This document is a project report for an online banking system submitted by Vivek Poddar. It includes an acknowledgements section thanking those who helped with the project. It also includes a certificate section certifying that the project was completed. The abstract provides an overview of the project, which involves developing an online banking application with a distributed architecture and centralized database using technologies like Oracle 10g and Java. The report includes sections on introduction, system analysis, feasibility study, requirements, design, coding, testing, security, and conclusions.
Ranorex is a software development company with locations in Florida (Tampa) and Austria (Graz) that provides innovative automated software testing solutions to thousands of companies and education institutions around the world. Ranorex offers a comprehensive range of desktop, web and mobile test automation tools which are used to improve the quality of the companies´ software applications. Get details at http://www.ranorex.com/product/tools.html.
This document contains source code and documentation for a house tax billing system developed using Android Studio and Firebase database. The system allows an admin to input tax rates by area into the Firebase database. Users can then view their tax amount based on their area selection. The code includes activities for admin input, user selection of area, and calculation of tax amount from the database values. Functions are defined for inputting data, retrieving data from storage, and setting the user interface.
The Microsoft 70-412 exam validates skills for advanced configuration of Windows Server 2012 services such as high availability, storage, backup and recovery, networking, Active Directory, and security. The exam covers topics including failover clustering, dynamic access control, IP address management, Active Directory Federation Services, and certificate authorities. Candidates who pass this exam along with two other exams have the skills needed to implement, manage, maintain and provision Windows Server 2012 services and infrastructure.
El documento presenta conceptos fundamentales de programación orientada a objetos como encapsulamiento, herencia, delegación, polimorfismo, clases abstractas y métodos abstractos. Explica las diferencias entre herencia y delegación, y cómo la herencia permite la reutilización de la interfaz mientras que la delegación permite reutilizar comportamiento sin mantener la misma interfaz. También describe conceptos como clases abstractas, polimorfismo y cómo a través de la herencia y redefinición de métodos los objetos de diferentes clases pueden responder de manera diferente al mismo mensaje.
This document presents information about mobile operating systems. It provides timelines of major mobile operating systems including Symbian OS, BlackBerry OS, iOS, Android, Windows Phone and others. It describes the architecture of Android including layers such as the Linux kernel, native libraries, Android runtime and applications framework. It also outlines the architecture of iOS including the Cocoa Touch layer, media layer, core services layer and core OS layer. In conclusion, it discusses how mobile operating systems continue to rapidly develop and impact many areas of technology.
The document provides information on 10 different mobile operating systems: Symbian OS, Android OS, iPhone OS, BlackBerry OS, Windows Phone 7, Palm OS, Palm webOS, Bada, Maemo OS, and MeeGo OS. It lists these operating systems and then discusses Symbian OS in more detail, covering its history and development, capabilities, security, performance, hardware support and connectivity. It also lists the native programming language of Symbian OS as C++.
This document summarizes and compares 10 different web browsers: Google Chrome, Mozilla Firefox, Internet Explorer, Apple Safari, Opera, Torch, UC Browser, Maxthon, Avant, and Netscape Navigator. It provides details on what each browser is, what platforms it runs on, and highlights some of its key features and limitations. The browsers are ordered from most popular to least popular based on worldwide usage statistics. Google Chrome is identified as the world's most used browser overall.
Presentation on Debian Operating System. In this presentation auther describes the Debian OS and Its Facility and Fetures point-by-point and How Debian Invented. It is also usefull for CSE Student for the presentation of their OS Subject.
The document summarizes the evolution of web browsers from 1990 to present. It discusses the early browsers developed in the 1990s like WorldWideWeb, Mosaic, Erwise, ViolaWWW, and MidasWWW. It then covers popular browsers from the 1990s and 2000s like Netscape, Internet Explorer, Opera, Safari, Firefox, and Google Chrome. The document provides brief details on the key features and market impact of each major browser.
Operating systems control our hardware and run our applications on them, how can we monitor linux operating system?
When we speak about monitoring it's the matter of all hardwares and users.
The slides below will describe the very common command line basic tools for monitoring.
This document provides an overview of the major mobile operating systems iOS and Android. It discusses their architectures and development. iOS was developed by Apple for use in iPhones, iPads, and iPods, and is known for its security features. Android is an open source operating system developed by Google that runs on ARM-based chips and uses a specialized Dalvik virtual machine. The document also briefly mentions other mobile operating systems like Firefox OS, Ubuntu Touch, and Windows Phone OS.
Appium + selenide comaqa.by. Антон СеменченкоAlina Dolgikh
Appium набирает все большую популярность среди инструментов для функционального тестирования мобильных приложений. Selenide - популярная Java обертка над Selenium Webdriver, позволяющая легко и непринужденно писать автоматизированные тесты для веб приложений. Можно ли интегрировать два инструмента, учитывая то, что appium использует свой клиент и свой протокол, несколько отличные от Selenium Webdriver? Что мы сможем выиграть в случае успеха? Давайте поговорим об этом!
This document discusses several mobile operating systems, including Android, iOS, Windows Phone, Symbian, and BlackBerry. It provides details on each OS such as their developer, programming languages used, and key features. The most prominent mobile OSs today are Android, developed by Google and based on Linux, iOS developed by Apple for their iPhone/iPad devices based on Mac OS X, and Windows Phone from Microsoft based on their Win32 platform.
An operating system is software that acts as an interface between computer hardware and the user, allowing applications like browsers and office software to run. There are several types of operating systems including batch processing, multiprogramming, multitasking, multiprocessing, and real-time operating systems. A batch processing OS processes large amounts of data in batches, while a multiprogramming OS can run many programs simultaneously by sharing processor time when one program is waiting for input/output. A multitasking OS further extends this by allowing users to run multiple programs at the same time.
This document discusses test automation using Selenium in a Docker container cluster environment. It begins with an introduction of the speaker and an overview of topics to be covered, including the current technology scenario, Selenium, Selenium Grid, Docker containers, orchestration tools, and recommended third party tools. Key points covered include using Docker containers instead of VMs to run tests in parallel in a lightweight manner, dockerizing tests by building test code into containers, and using orchestration tools like Kubernetes to automate and manage container resources for Selenium Grid. Examples of recommended third party tools that integrate Docker and Selenium are also provided.
This document is a project report for an online banking system submitted by Vivek Poddar. It includes an acknowledgements section thanking those who helped with the project. It also includes a certificate section certifying that the project was completed. The abstract provides an overview of the project, which involves developing an online banking application with a distributed architecture and centralized database using technologies like Oracle 10g and Java. The report includes sections on introduction, system analysis, feasibility study, requirements, design, coding, testing, security, and conclusions.
Ranorex is a software development company with locations in Florida (Tampa) and Austria (Graz) that provides innovative automated software testing solutions to thousands of companies and education institutions around the world. Ranorex offers a comprehensive range of desktop, web and mobile test automation tools which are used to improve the quality of the companies´ software applications. Get details at http://www.ranorex.com/product/tools.html.
This document contains source code and documentation for a house tax billing system developed using Android Studio and Firebase database. The system allows an admin to input tax rates by area into the Firebase database. Users can then view their tax amount based on their area selection. The code includes activities for admin input, user selection of area, and calculation of tax amount from the database values. Functions are defined for inputting data, retrieving data from storage, and setting the user interface.
The Microsoft 70-412 exam validates skills for advanced configuration of Windows Server 2012 services such as high availability, storage, backup and recovery, networking, Active Directory, and security. The exam covers topics including failover clustering, dynamic access control, IP address management, Active Directory Federation Services, and certificate authorities. Candidates who pass this exam along with two other exams have the skills needed to implement, manage, maintain and provision Windows Server 2012 services and infrastructure.
El documento presenta conceptos fundamentales de programación orientada a objetos como encapsulamiento, herencia, delegación, polimorfismo, clases abstractas y métodos abstractos. Explica las diferencias entre herencia y delegación, y cómo la herencia permite la reutilización de la interfaz mientras que la delegación permite reutilizar comportamiento sin mantener la misma interfaz. También describe conceptos como clases abstractas, polimorfismo y cómo a través de la herencia y redefinición de métodos los objetos de diferentes clases pueden responder de manera diferente al mismo mensaje.
Este documento trata sobre las estructuras de datos y algoritmos, que son conceptos fundamentales en ciencias de la computación. Las estructuras de datos organizan la información de forma lógica y eficiente para su almacenamiento y procesamiento, mientras que los algoritmos especifican los pasos a seguir para resolver problemas.
Mcts self paced training kit exam 432 sql server 2008 - implementation and ...Portal_do_Estudante_SQL
This document provides an overview of the objectives covered in the Exam 70-432: Microsoft SQL Server 2008—Implementation and Maintenance certification exam. It lists the exam topics and where to find them in the book. The topics include installing and configuring SQL Server 2008, maintaining SQL Server instances, managing security, maintaining databases, performing data management tasks, monitoring and troubleshooting, optimizing performance, implementing high availability through features like database mirroring and clustering, and more. The document provides the objectives, book chapter references, and publishing information for the exam preparation guide.
Este documento describe conceptos clave de la programación orientada a objetos en Java como la herencia, polimorfismo, interfaces y clases abstractas. Explica que la herencia permite crear nuevas clases a partir de clases existentes reutilizando sus métodos y campos. El polimorfismo permite que una variable pueda hacer referencia a objetos de tipos relacionados. Las interfaces definen lo que deben hacer las clases sin especificar cómo, y solo pueden contener constantes y firmas de métodos.
El polimorfismo en programación permite que objetos de diferentes clases respondan al mismo mensaje de forma distinta. Un objeto polimórfico puede tomar valores de diferentes tipos durante la ejecución del programa. El polimorfismo se logra a través de la herencia, donde subclases pueden implementar métodos de forma específica mientras comparten una superclase común.
Las clases abstractas sirven como base para otras clases y no pueden crearse objetos directamente de ellas. Contienen métodos abstractos que deben implementarse en las clases que hereden. Las interfaces definen métodos pero no implementaciones y una clase puede implementar múltiples interfaces.
Este documento proporciona información sobre la generación de informes con JasperReport y la herramienta iReport. Explica qué es iReport, los primeros pasos de configuración e implementación, y aspectos avanzados del diseño de informes como la creación de parámetros, variables y subinformes.
Este documento presenta información sobre abstracción en programación orientada a objetos. Define una clase abstracta como aquella sobre la cual no se pueden crear objetos concretos. Explica que las clases abstractas permiten definir métodos y propiedades comunes a todas las subclases, aunque algunos métodos pueden quedar sin implementar y marcarse como abstractos hasta que se definan en las clases hijas. Las clases abstractas soportan polimorfismo al permitir que objetos de clases derivadas respondan a métodos declarados en la clase padre abstracta.
Sql server 2012_licensing_reference_guideamenus006
This document provides an overview of Microsoft SQL Server 2012 licensing. It describes the different editions of SQL Server 2012, including Enterprise, Business Intelligence, and Standard Editions. It also outlines the two main licensing models: Core-Based Licensing and Server+CAL Licensing. Finally, it discusses licensing SQL Server 2012 in virtual environments and for various advanced scenarios.
Este documento trata sobre interfaces en Java. Explica que las interfaces definen métodos genéricos y que las clases pueden implementar interfaces múltiples. También describe la herencia y cómo las clases pueden heredar atributos y métodos de clases padre a través de la palabra clave "extends".
El documento ofrece consejos sobre el diseño de interfaces, recomendando trazar primero las ideas y wireframes antes de codificar, comenzar desde el centro de la interfaz, aislar diferentes escenarios, considerar los tres estados regulares de la interfaz, incorporar funciones administrativas dentro de la interfaz pública, y diseñar una interfaz única que hable el mismo idioma para todos los usuarios.
Este documento presenta el libro "Estructuras de datos" en su tercera edición. El libro describe estructuras de datos fundamentales como arreglos, registros, pilas, colas, listas y árboles, así como algoritmos de ordenación y búsqueda. El objetivo del libro es presentar estas estructuras de datos y algoritmos de forma independiente de cualquier lenguaje de programación particular.
The document outlines details of three Microsoft courses taken by James SampleNameHere on updating skills from older Exchange Server versions to Exchange Server 2010. The courses included Installing and Configuring Windows Server 2012 with Wes Anderson on June 5, 2015, Administering Windows Server 2012 with Wes Anderson on June 12, 2015, and Configuring Advanced Windows Server 2012 Services with Jim Garrett on June 19, 2015.
Una clase abstracta define comportamiento común para sus subclases pero no puede crear instancias, mientras que una interfaz define un contrato de métodos abstractos que clases concretas deben implementar. Ambos permiten modelar jerarquías de clases con comportamiento polimórfico.
The document provides information about the Microsoft 70-410 exam which tests skills for implementing a Windows Server 2012 infrastructure. It covers six major topics including installing and configuring servers, server roles and features, Hyper-V, network services, Active Directory, and Group Policy. The objectives are organized into chapters that walk through installing servers, configuring server roles, Hyper-V, network services, Active Directory, and Group Policy. It provides details on tasks for each objective like installing different server versions, configuring storage, and deploying roles remotely.
This document provides information about a training course on installing and configuring Windows Server 2012. It discusses that the course will be taught by a Microsoft Certified Trainer and includes a customer satisfaction guarantee. After the course, students are encouraged to pursue Microsoft certification. The course will cover topics like Active Directory, IPv4, DHCP, DNS, storage, and Hyper-V and prepare students for the 70-410 exam. It outlines the course modules and labs that will be completed in a virtual machine environment. It also provides information on Microsoft certification paths.
Installing and Configuring Windows Server® 2012Napoleon NV
This document provides information about a training course on installing and configuring Windows Server 2012. It discusses that the training will be led by a Microsoft Certified Trainer and includes hands-on labs using virtual machines. Upon completion of the training, students will be prepared to install and configure core Windows Server 2012 services and pursue Microsoft certification exams. The course outline covers topics such as Active Directory, IPv4, DHCP, DNS, storage, and Hyper-V.
This document provides information about a training course on installing and configuring Windows Server 2012. It discusses that the training will be led by a Microsoft Certified Trainer and includes hands-on labs using virtual machines. Upon completion of the training, students will be prepared to install and configure core Windows Server 2012 services and pursue Microsoft certification exams. The course outline covers topics such as Active Directory, IPv4, DHCP, DNS, storage, and Hyper-V.
SSDN Technologies is Microsoft partner training institute of MCSA Windows server 2012 in Gurgaon, Delhi. We also provide mcsa windows server 410 lesson training by certified trainers in India.
Microsoft Certification And Learning Resourcesclouthou
Microsoft Certifications are valuable in the market and will remain valuable as long as companies are using the technologies covered in the certification. Over time, certifications will retire and eventually will transition to a “legacy” status. https://www.pass4sureexam.com/vendor/Microsoft
This document provides an overview and outline of a Microsoft course on installing and configuring Windows Server 2012. It introduces the instructor and facilities, describes the audience and prerequisites for the course, outlines the course modules, and discusses Microsoft certification opportunities. The course will use virtual machines to guide students through hands-on labs configuring a Windows Server 2012 infrastructure for a fictitious company.
You have to make sure that your preparations is good enough before you appear in the Microsoft 70-246 exam. The good exam preparation leads toward better results. Visit Passcertification for pass4sure Microsoft 70-246 exam updated questions. For more information visit the below link: http://www.passcertification.com/70-246.html
IT professionals who are experienced in other non-Microsoft technologies, who meet the course prerequisites and are looking to cross-train on Windows Server 2012 and Windows Server 2012 R2.
This document is a resume for Syed Shamsuddin summarizing his career experience and qualifications. It details his 7 years of experience in virtualization and Windows server management, including administration of VMware ESX/ESXi and Windows Hyper-V servers. It also lists his relevant technical skills and 5 projects from his previous roles supporting implementations of Microsoft System Center and Dell management software.
SYSTEM CENTER 2012: CONFIGURATION MANAGERAngel Gani
360 GSP is a training provider focused on improving performance and skills through industry-focused courses. They aim to transform companies' productivity by accelerating growth for employees of all levels. 360 GSP has a proven track record of high-quality courses delivered by expert instructors and administrators to maximize student learning.
Pankaj Kumar is a Windows server engineer with over 10 years of experience administrating Windows servers, Active Directory, Exchange Server, and network security solutions. He is proficient in Windows Server 2012/2008/2003, Active Directory, DNS, DHCP, IIS, and has experience with virtualization, firewalls, antivirus, and backup solutions. Pankaj holds certifications from Microsoft and other organizations and aims to work in a responsible position where he can apply his technical skills and experience.
This course covers Windows Server administration over 15 lessons, focusing on installation, configuration, server roles, storage, Active Directory, networking services, virtualization, and troubleshooting. Each lesson includes readings, videos, and hands-on activities to help students prepare for the Microsoft MTA Exam 98-365 in Windows Server administration fundamentals. The course materials can be downloaded as learning guides. Prior networking knowledge is recommended for this advanced computer networking course.
Serhad makbuloglu passed the MCSA Windows Server 2012 upgrade exam with scores of 887, 833, and 887 on exams 70-410, 70-411, and 70-412 respectively. The score report provides details on Serhad's performance on each exam component and indicates that access to MCP membership benefits and exam results will be available online within 7 days.
This document contains personal and professional details about Saad Fazal. It includes his contact information, career objectives, professional certifications in Microsoft technologies, hands-on experience managing Windows servers, Active Directory, and Microsoft systems and software. It also lists his education and includes additional skills in operating systems, virtualization, hardware, security, System Center, and languages.
This document provides an overview of the topics that will be covered in a two-day Microsoft Virtual Academy course on installing and configuring Windows Server 2012. Day one will cover deploying and managing Windows Server 2012, Active Directory Domain Services, networking, and DNS. Day two will cover local storage, file and print services, Group Policy, server virtualization, and security. The document also introduces the two presenters, Rick Claus and Ed Liberman, and provides expectations and objectives for the course.
70-410 Installing and Configuring Windows Server 2012drakoumu
This course is part one in a series of three courses that provides the skills and knowledge necessary to implement a core Windows Server 2012 infrastructure in an existing enterprise environment.http://www.pass4sureexam.co/70-410.html
This document provides an overview of a two-day training course on server virtualization with Windows Server Hyper-V and System Center. Day 1 covers installing and configuring Hyper-V, creating and managing virtual machines and networks. Day 2 focuses on installing and using System Center Virtual Machine Manager to manage the virtualization infrastructure, including networking, storage, and virtual machines. The presenters are introduced, including their backgrounds working with Microsoft virtualization technologies.
Similar to Windows Server 2012 Exam Paper 70-411 PDF (20)
Windows_Server_2016_Virtualization White Paper By VeeamKesavan Munuswamy
This document discusses the history and new features of virtualization technologies in Microsoft Windows Server 2016, including Hyper-V, Nano Server, and Windows Containers. It covers the evolution of virtualization support from early products like Windows Virtual PC to the current Hyper-V and container capabilities in Windows Server 2016. The document also summarizes several key new features in Windows Server 2016 like Resilient File System, production checkpoints for Hyper-V, and PowerShell Direct functionality.
The document provides an overview of how the SQL Server Query Optimizer works. It analyzes candidate execution plans for a given query, estimates the cost of each plan, and selects the lowest cost plan. Generating candidate plans, assessing plan costs, query execution, and plan caching are discussed. The challenges of query optimization and reading execution plans are also introduced. Join ordering is highlighted as one of the most complex optimization problems due to the exponential increase in possible plans as the number of tables grows.
Step by Step Windows Azure pack for windows server 2012 R2 Guide v1Kesavan Munuswamy
Windows Azure Pack allows organizations to offer cloud services like IaaS and databases to customers within their own datacenter. This document provides step-by-step instructions to install and configure Windows Azure Pack in a proof of concept environment at Contoso Inc. It covers installing WAP, configuring VMM, SPF, and the WAP portals. It then demonstrates how a tenant can provision a VM and SQL database from the cloud offerings.
This document is an excerpt from a book about SQL Server source control basics. It discusses the history and concepts of source control, including versioning, branching, merging and database deployment. The book uses examples with the Subversion source control system and the Bookstore database to demonstrate key source control processes for database development projects.
This document provides tips to help developers work more efficiently with databases and SQL Server. It includes tips for using object-relational mapping tools, writing efficient T-SQL code, creating optimal indexes, and designing databases for performance. The tips cover topics such as parameterizing queries, writing stored procedures for complex reads, minimizing transactions and locks, and normalizing database structure. The goal is to help developers avoid common issues that can degrade database and application performance.
This document provides an overview of the fundamentals of SQL Server 2012 replication. It begins with an introduction to the key components that make up SQL Server replication, including publications, subscribers, distributors, and replication agents. The document then discusses the three main types of replication in SQL Server 2012: snapshot replication, transactional replication, and merge replication. It concludes with a brief summary of the key points about SQL Server replication.
This document provides an overview of a book about SQL Server backup and restore. It discusses the importance of database backups for disaster recovery and the responsibilities of a DBA to have an effective backup and restore plan. The book will cover topics like different backup types, recovery models, planning backup storage and schedules, restoring databases, and using tools like SQL Backup Pro. It is intended to help DBAs create and test backup solutions tailored to their specific database requirements.
Extending Role Security in Analysis Services for SQL ServerKesavan Munuswamy
The document describes a method for extending role security in Analysis Services for SQL Server using dimensional security. It involves creating a data warehouse schema with tables that connect user accounts to dimensions in a many-to-many relationship. A cube is then created from this schema to implement security by limiting what dimension members a user can view based on their account. The method simplifies security administration compared to traditional role-based security.
This document provides an overview of Windows Server Failover Clustering (WSFC) and how it supports high availability solutions in SQL Server 2012, including AlwaysOn Availability Groups and Failover Cluster Instances. WSFC enables failover capabilities through a clustered group of independent servers that work together to increase application availability. It provides distributed metadata, resource management, health monitoring, and failover coordination that SQL Server technologies leverage to improve database and server instance availability and disaster recovery.
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Tatiana Kojar
Skybuffer AI, built on the robust SAP Business Technology Platform (SAP BTP), is the latest and most advanced version of our AI development, reaffirming our commitment to delivering top-tier AI solutions. Skybuffer AI harnesses all the innovative capabilities of the SAP BTP in the AI domain, from Conversational AI to cutting-edge Generative AI and Retrieval-Augmented Generation (RAG). It also helps SAP customers safeguard their investments into SAP Conversational AI and ensure a seamless, one-click transition to SAP Business AI.
With Skybuffer AI, various AI models can be integrated into a single communication channel such as Microsoft Teams. This integration empowers business users with insights drawn from SAP backend systems, enterprise documents, and the expansive knowledge of Generative AI. And the best part of it is that it is all managed through our intuitive no-code Action Server interface, requiring no extensive coding knowledge and making the advanced AI accessible to more users.
Dive into the realm of operating systems (OS) with Pravash Chandra Das, a seasoned Digital Forensic Analyst, as your guide. 🚀 This comprehensive presentation illuminates the core concepts, types, and evolution of OS, essential for understanding modern computing landscapes.
Beginning with the foundational definition, Das clarifies the pivotal role of OS as system software orchestrating hardware resources, software applications, and user interactions. Through succinct descriptions, he delineates the diverse types of OS, from single-user, single-task environments like early MS-DOS iterations, to multi-user, multi-tasking systems exemplified by modern Linux distributions.
Crucial components like the kernel and shell are dissected, highlighting their indispensable functions in resource management and user interface interaction. Das elucidates how the kernel acts as the central nervous system, orchestrating process scheduling, memory allocation, and device management. Meanwhile, the shell serves as the gateway for user commands, bridging the gap between human input and machine execution. 💻
The narrative then shifts to a captivating exploration of prominent desktop OSs, Windows, macOS, and Linux. Windows, with its globally ubiquitous presence and user-friendly interface, emerges as a cornerstone in personal computing history. macOS, lauded for its sleek design and seamless integration with Apple's ecosystem, stands as a beacon of stability and creativity. Linux, an open-source marvel, offers unparalleled flexibility and security, revolutionizing the computing landscape. 🖥️
Moving to the realm of mobile devices, Das unravels the dominance of Android and iOS. Android's open-source ethos fosters a vibrant ecosystem of customization and innovation, while iOS boasts a seamless user experience and robust security infrastructure. Meanwhile, discontinued platforms like Symbian and Palm OS evoke nostalgia for their pioneering roles in the smartphone revolution.
The journey concludes with a reflection on the ever-evolving landscape of OS, underscored by the emergence of real-time operating systems (RTOS) and the persistent quest for innovation and efficiency. As technology continues to shape our world, understanding the foundations and evolution of operating systems remains paramount. Join Pravash Chandra Das on this illuminating journey through the heart of computing. 🌟
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfflufftailshop
When it comes to unit testing in the .NET ecosystem, developers have a wide range of options available. Among the most popular choices are NUnit, XUnit, and MSTest. These unit testing frameworks provide essential tools and features to help ensure the quality and reliability of code. However, understanding the differences between these frameworks is crucial for selecting the most suitable one for your projects.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...alexjohnson7307
Predictive maintenance is a proactive approach that anticipates equipment failures before they happen. At the forefront of this innovative strategy is Artificial Intelligence (AI), which brings unprecedented precision and efficiency. AI in predictive maintenance is transforming industries by reducing downtime, minimizing costs, and enhancing productivity.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
Trusted Execution Environment for Decentralized Process MiningLucaBarbaro3
Presentation of the paper "Trusted Execution Environment for Decentralized Process Mining" given during the CAiSE 2024 Conference in Cyprus on June 7, 2024.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
This presentation provides valuable insights into effective cost-saving techniques on AWS. Learn how to optimize your AWS resources by rightsizing, increasing elasticity, picking the right storage class, and choosing the best pricing model. Additionally, discover essential governance mechanisms to ensure continuous cost efficiency. Whether you are new to AWS or an experienced user, this presentation provides clear and practical tips to help you reduce your cloud costs and get the most out of your budget.
2. ABOUT THE EXAM
The Microsoft 70‐411 exam is part two of a series of three exams that test the skills and
knowledge necessary to administer a Windows Server 2012 infrastructure in an Enterprise
environment. Passing this exam validates a candidate's ability to administer the tasks required
to maintain a Windows Server 2012 infrastructure, such as user and group management,
network access, and data security. Passing this exam along with the other two exams confirms
that a candidate has the skills and knowledge necessary for implementing, managing,
maintaining, and provisioning services and infrastructure in a Windows Server 2012
environment.
Six major topics make up the Microsoft 70‐411 Certification. The topics are as follows:
Deploy, Manage, and Maintain Servers
Configure File and Print Services
Configure Network Services and Access
Configure a Network Policy Server Infrastructure
Configure and Manage Active Directory
Configure and Manage Group Policy
This guide will walk you through all the skills measured by the exam, as published by Microsoft.
5. CHAPTER 1 – DEPLOY, MANAGE, AND MAINTAIN SERVERS
1.1 DEPLOY AND MANAGE SERVER IMAGES
Install the Windows Deployment Services (WDS) role
Windows Deployment Services (WDS) is used to facilitate OS deployment. The WDS role is the updated and
redesigned version of Remote Installation Services (RIS). Through it you may deploy Windows operating systems over
a network.
To use WDS an existing server must configured as the Deployment Server and the Transport Server. They must
members of or join a domain that has DHCP and DNS running and properly configured.
Configure and manage boot, install, and discover images
At least one boot image and one install image must be created and made available in order to boot to the WDS server
and subsequently install from an image. Note that the client computer must be capable of performing a PXE boot and
meet the minimum hardware requirements for the operating system of the install image. The client must have a
minimum of 512 MB of RAM.
Update images with patches, hotfixes, and drivers
OCSetup is a command‐line tool used for applying updates to an online Windows image. This allows installation of
*.msi files via MSIExec.exe. It can also install and remove Component‐Based Servicing (CBS) packages online by
passing them to DISM.
In order to install the system MSI packages via OCSetup, they must first be staged. Additionally, the paths to the
packages must be specified in an answer file. Staging an installer file involves placing it in the location specified in the
CustomSetup registry key.
If the installation package requires a custom installer, it must first be registered. This is accomplished by adding the
name of the package to the following registry key:
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionSetupOC SetupComponents
6. Install features for offline images
Oscdimg is used to create an image in the *.iso format for customized Windows PE. You use Expand.exe to
decompress the update files. Intlcfg.exe is used to change the language & locale, fonts, input settings, etc., for a given
installation.
Through the Deployment Image Servicing and Management (DISM) tool you can build and deploy offline Windows
images. It is a scriptable command‐line utility used to mount/unmount system images as well as update operating
system components.
For DISM to work properly, the Windows image must be local. If the answer file for an image is named unattend.xml,
only the settings specified in the offlineServicing configuration pass can be applied.
1.2 IMPLEMENT PATCH MANAGEMENT
Install and configure the Windows Server Update Services (WSUS) role
Windows Server Update Services (WSUS) is a server role configured via the WSUS Configuration Wizard.
For proper operation, ensure the server's firewall allows client access to the server so that updates can be retrieved.
The server itself must be able to connect to the Upstream Server if is designated to download updates from elsewhere.
If there is a proxy server, its name and user credentials must be known and provided when prompted.
Configure group policies for updates
The WSUS Setup program can configure IIS to automatically distribute the latest version of Automatic Updates to
clients that contact WSUS. This can also be done via domain based GPO to configure updates. Without AD DS only the
Local Group Policy Editor can be used to configure Automatic Updates.
13. all BitLocker‐protected drives.
drives on the local computer on which the OS is installed.
drives permanently installed on the local computer.
removable data drives.
Configure the EFS recovery agent
You should ensure that the private key for the data recovery agent is not always kept online for the sake of security. To
be precise, the data recovery agent’s key should be made offline (as .pfx file) at all time unless it is needed for use by a
recovery process.
You may add data recovery agents to the EFS Policy. However, it has no effect on the existing encrypted files. Any user
who can decrypt an EFS file can add other users' public keys to it. Also, you cannot assign keys from a group of users ‐
each user’s public key has to be accessed on an individual basis.
Manage EFS and Bitlocker certificates including backup and restore
By default the data recovery agent is contained in the personal certificate store of the administrator account of the first
domain controller. However, on standalone/workgroup machines it would be contained in the personal certificate
store of the local administrator.
Encrypting File System (EFS) certificates allow the certificate holder to encrypt and decrypt data. Ordinary EFS users
should be granted this type of certificate. File Recovery certificates are for recovering encrypted files. Domain admins
and/or designated data recovery agents should be granted this type of certificate instead. In any case you should use
the Certificates MMC snap‐in to back up the default recovery keys.
2.4 CONFIGURE ADVANCED AUDIT POLICIES
Implement auditing using Group Policy and AuditPol.exe
You may implement audit policy using GPO. You need to first specify the categories of events that are to be audited (it
is the event categories that constitute your audit policy). You then specify the size and behavior of the Security log.
Basic audit policy is never compatible with the advanced audit policy settings applied via Group Policy. When the
advanced audit policy settings are applied through using Group Policy, the current computer's local audit policy
settings are cleared.
At the command line, you use auditpol /get to show the current audit policy. You use auditpol /set to set the audit
policy. You use auditpol /clear to clear a policy. You use auditpol /backup to save the policy to a file, or use /restore to
restore the policy from the backup file.
18.
Configure zone scavenging
Both aging and scavenging are for performing cleanup and removal of stale resource records so they don't accumulate
in zone data. The DNS Manager UI can be used to configure these. Or, if you use dnscmd, /Aging is for enabling aging
for zones, while /RefreshInterval is for specifying the Refresh interval for a scavenging‐enabled zone.
/ScavengingInterval is for fine tuning the scavenging interval.
Configure record options including Time To Live (TTL) and weight
Time to Live (TTL) is used by name servers for determining the length of time a name can be cached. By default the TTL
is 60 minutes. You can modify the TTL values via the DNS Manager UI. On the client side, registry editing would become
necessary (HKEY_LOCAL_MACHINESystemCurrentControlSetServicesDnscacheParameters).
It is also possible to cut down the workload on the PDC emulator operations master by adjusting the weight for DNS
service SRV resource records by editing the registry under
HKLMSYSTEMCurrentControlSetServicesNetlogonParameters. The valid value is between 0 and 65535, with a
default of 100. A higher value always indicates a lower priority.
20.
Configure remote dial‐in settings for users
When RRAS has been added via the Server Manager, you may invoke the Routing and Remote Access Server Setup
Wizard via the Routing and Remote Access snap‐in. From there you may click Configure and Enable Routing and
Remote Access. In the Remote Access page you may enable dial up support for end users. You may setup an IPv4
Remote access server or an IPv6 Remote access server. Both IPv4 Forwarding and IPv6 Forwarding are supported.
Configure routing
To allow RRAS to be operated as a Ipv4 router, you should also enable and configure RIP. You can do so by first clicking
on Ipv4‐General and then click on the Action menu.
21. For IPv4, RIP Version 2 for Internet Protocol is the most populr choice. You may add it, then right‐click RIP and choose
New Interface. You will need to pick the interface that is connected to a subnet on which the remote router is
connected so your interface can communicate using RIP. You can also right click on RIP and choose Show neighbors to
find out about the routing partners on the network. Static routes can be manually added by right clicking on the Static
Routes item.
3.4 CONFIGURE DIRECTACCESS
Implement server requirements
You need to install the DirectAccess and VPN role and the corresponding role services. In fact we would recommend
that you also install routing:
22. After role installation you may call up the wizard for further configuration. Your server must be a member of a domain
or configuration will fail.
A complete DirectAccess solution for mobile access would require a DirectAccess server running Windows Server 2012
with dual network adapters. You need one facing the internet and another facing the intranet. The former needs to
have two consecutive public IPv4 addresses assigned. There must also be a domain controller and DNS server running
Windows Server 2012, as well as a public key infrastructure issuing computer certificates.
Implement client configuration
DirectAccess aims to allow connectivity to the corporate network without the need for using traditional VPN
connections. It supports domain‐joined Windows 7 Enterprise and Ultimate edition clients as well as Windows 8 clients.
Earlier clients, however, are not supported.
Configure DNS for Direct Access
Split‐brain DNS refers to the use of the same DNS domain for both Internet and intranet resources. For this kind of
setup to work, you need to list the FQDNs that are duplicated on the Internet and intranet. You can then accordingly
decide which resources your DirectAccess client may reach. In a non‐split‐brain setup the Internet namespace is not
the same as the intranet namespace so you would not need to make such decision.
If you are using ISATAP for IPv6 connectivity to support your DirectAccess clients, you better use DNS servers that run
Windows Server 2008 R2 or later since their DNS Server service can support the processing of DNS traffics on the
ISATAP interfaces. If your IPv6‐capable non‐Windows based DNS server do not support DNS dynamic update for IPv6
addresses, you will need to manually add AAAA records for your servers.
The DirectAccess Setup Wizard allows you to configure local name resolution behavior. The possible options are Use
local name resolution only if the internal network DNS servers determined that the name does not exist; Use local
name resolution if the internal network DNS servers determined that the name does not exist or if the internal
network DNS servers are not reachable and the DirectAccess client computer is on a private network; and Use local
name resolution if there is any type of error when attempting to resolve the name using internal network DNS servers.
The first option is the most secure.
Configure certificates for Direct Access
There should be one certificate per client and one per Direct Access server. You may use certutil to display information
on the digital certificates that have been installed on a DirectAccess client, DirectAccess server, or any other intranet
resources.
24. SQL logging with backup ‐ you log first to SQL, and use text file as backup if SQL fails.
Configure certificates
For client authentication to take place a digital certificate must be installed on the RADIUS server for providing
authentication, encryption, and validation. This can be done via the Certificate Console.
4.2 CONFIGURE NPS POLICIES
Configure connection request policies
Network policies refer to conditions, constraints, and settings that designate who is authorized to connect to the
network and the revelant circumstances. You may view your network policies as rules with conditions and settings.
NPS will compare the conditions of the rule to the properties of the connection requests.
Connection request policies are the conditions and settings that allow you to indicate the RADIUS servers that perform
the authentication and authorization of connection requests. If you use NPS as the RADIUS server, the default
connection request policy will be the only configured policy. However, if NPS serves as a proxy only, NPS will not
process any connection requests locally.
Configure network policies for VPN clients (multilink and bandwidth allocation, IP filters, encryption,
IP addressing)
You can configure these parameters in the client side network policies:
Multilink and Bandwidth Allocation Protocol BAP deals with using multiple dial‐up connections from one computer.
IP Filters are for creating IPv4 and IPv6 filters for controlling the IP traffic that the clients can send or receive.
Encryption is for specifying the encryption level required.
IP Settings are for specifying the client IP address assignment rules that are for use in the network policy.
Idle Timeout is for specifying the max time in minutes that the network access server can stay idle before cutting
off the connection.
Session Timeout is for specifying the max time in minutes that a user may stay connected.
25. Manage NPS templates
You can use NPS templates to configure NPS on servers. There are many templates available, which include:
Shared Secrets
RADIUS Clients
Remote RADIUS Servers
IP Filters
Health Policies
Remediation Server Groups
To create a template, you need to use the NPS Console (you simply right‐click on a template type and click New). To
use a template, from within the RADIUS client properties you choose the option known as Select an existing Shared
Secrets template.
Import and export NPS policies
You may export NPS configuration and policies via Netsh (you need to use netsh nps export) or Windows PowerShell
(via Export‐NpsConfiguration). With the later, a XML file will be created for import later. Do realize that the exported
NPS server configurations are never encrypted in the XML file so you must be careful in protecting it.
4.3 CONFIGURE NETWORK ACCESS PROTECTION (NAP)
Configure System Health Validators (SHVs)
When you need NPS to be configured to block certain clients or traffics (in other words, to perform validation), the
steps involved are:
Creating a System Health Validator SHV (you can do so via the Network Policy snap‐in).
Creating a health policy for the compliant clients and also the noncompliant clients.
Creating a network policy for the compliant clients and also the noncompliant clients.
27. CHAPTER 5 – CONFIGURE AND MANAGE ACTIVE DIRECTORY
5.1 CONFIGURE SERVICE AUTHENTICATION
Create and configure Service Accounts
A service account is a user account, just that it is created for providing a security context for services. You may
create and manage service accounts individually via Active Directory Users and Computers.
On a computer not joined to a domain, you may configure an application to run as Local Service, Network
Service, or Local System. The problem with these accounts is that they are shared among many services and
there is no way to have them managed at the domain level. If you use a domain account instead of a local one,
you can isolate its privileges, just that you must manually manage the passwords.
Create and configure Group Managed Service Accounts
When group Managed Service Accounts (gMSA) is used as service principal, Windows will manage the password
for the account. gMSA is like a Managed Service Accounts MSA but with functionality extended across multiple
servers. With it you can tie a group of servers to one single service account, which is particularly useful for multi‐
instance Server cluster.
Do note that this is a feature that requires Windows Server 2012 R2 Domain Controller with Active Directory
PowerShell Module imported into it.
Create and configure Managed Service Accounts
A managed service account (MSA) allows services to have isolation of their own domain accounts and at the
same time avoiding the need for manually administering the account credentials. The goal is to create a class of
domain accounts for managing and maintaining services on the local computers. The client computer must be
running at least Windows Server 2008 R2 or Windows 7 to enjoy the feature. The domain must be at least
Windows Server 2008 R2, or you will need to prepare the schema using adprep /forestprep and adprep
/domainprep respectively. In any case, a MSA can only be used on one domain server.
Configure Kerberos delegation
Constrained delegation is a feature of Kerberos V5. It allows a service to obtain service tickets using the
delegated user's identity. These service tickets allow access to only a restricted list of services running on
specific servers. You may accordingly limit the network resources that a service trusted for delegation may reach.
30. Optimize an Active Directory database
Active Directory (AD) can automatically perform online defragmentation of the database at the default
intervals of every 12 hours during Garbage Collection. Online defragmentation can optimize the database
without reducing its size. It can reclaim space in the directory for new objects though. In fact, the process will
create a new and compacted version of Ntds.dit.
Another option is to defrag the database offline, which is a more thorough defrag also capable of compacting
the database. Before attempting offline defragmentation, you are strongly recommended to make a full system
state backup of the domain controller. Do make sure there is enough free space on the drive. When you perform
offline defragmentation Windows is not going to change the original Active Directory database. Instead it will
produce a defragmented copy. This is why the process needs to use a large amount of free space on the drive as
the work space plus space for storing the copy (which should be at least 115% of the original size).
As said before you use net stop ntds to stop AD locally. From within ntdsutil you need to use activate instance
ntds and then files to reach the file maintenance prompt, then start the defrag process via compact to. When
done you need to quit ntdsutil entirely and manually copy the new database to the original directory database
location.
Clean up metadata
Metadata cleanup is a process you need to perform on a domain controller after AD DS removal. The process
primarily removes those data items that identify a domain controller to the AD DS replication system as well as
all FRS/DFS Replication connections. The process will also try to transfer or seize any remaining operations
master roles.
You use Active Directory Users and Computers or Active Directory Sites and Services to delete a domain
controller permanently. You may also use ntdsutil's metadata cleanup command to clean up the metadata.
Configure Active Directory snapshots
A snapshot is in fact a shadow copy of the volumes that contain the Active Directory database. With it you can
view the data inside it without the need to run the server in Directory Services Restore Mode. Do note that it
does not let you to copy items from inside the snapshot to the live database, unless you manually export the
objects out of it. You can use ntdsutil under the elevated command prompt to create a snapshot. You reach the
snapshot: prompt via the snapshot command and then use create to create the snapshot. You may view the
available snapshots via list all. And you may mount one via mount.
Perform object‐ and container‐level recovery
With an authoritative restore you return a deleted object or container to its pre‐deletion state at the time it was
backed up. There are usually 2 parts to such restore process. First there is a nonauthoritative restore from
backup, then there is an authoritative restore of the deleted objects. You need to do this before allowing
replication to occur.
31. To perform an authoritative restore, you need to use the authoritative restore subcommand of Ntdsutil or
Dsdbutil (which is available if you have the AD LDS server role in place). You need to first stop the AD DS service
or the AD LDS service, and you must set the active instance accordingly.
Since Windows Server 2012 there is the Active Directory recycle bin facility which allows you to restore active
directory user objects natively, as long as your forest has the “Windows server 2008 R2” functional level or
beyond. The process does take time to complete since replication is necessary.
Perform Active Directory restore
As said before, if you start the system and press F8 to enter the Directory Services Restore Mode, you are also
working offline. You will need to logon locally as a local admin. A Nonauthoritative restore means you have a
domain controller restored from backup media, then allow the restored data to be updated through normal
replication. This process usually requires that you take the domain controller offline.
After going offline, you may invoke the Restore Wizard to restore the System State data. You click Start ‐ Run,
then type in Ntbackup to invoke the Backup tool. From the Tools menu you click Restore Wizard to call up the
wizard.
5.4 CONFIGURE ACCOUNT POLICIES
Configure domain user password policy
Password policies are for domain accounts or local accounts ‐ they determine a number of settings for
passwords, such as:
Enforcing password history
Enforcing maximum password age
Enforcing minimum password age
Enforcing minimum password length
Enforcing password complexity requirements
Storing passwords using reversible encryption
35.
Import security templates
You may want to deploy security templates through importing them into a GPO. First you should create OUs for
the different types of computers that are to use a different security template. Then you add the computer
accounts for these computers to the proper OU. Finally you add a link to a GPO for each of these computer OUs.
You can always import a security template into a GPO via the Group Policy Object Editor.
Import custom administrative template file
Administrative Templates for GPOs can be used to set and control registry settings. Administrative Template
files are XML based for defining registry‐based Group Policy settings that can be configured via the Group Policy
Management Editor. With the language‐neutral ADMX file it is possible to determine the number, types and
locations of policy settings by category in the editor. ADML files, on the other hand, are for supplying language‐
specific information to the ADMX files. Note that when you use GPEDIT.msc to launch the Group Policy Object
Editor, it will automatically read all ADMX files that are stored in the %systemroot%PolicyDefinitions folder.
Convert administrative templates using ADMX Migrator
The ADMX Migrator utility is a free MMC snap in tool you can use to convert legacy ADM files into the new
ADMX format. You can also use the ADMX Migrator's ADMX Editor to edit ADMX file via a GUI. This tool can be
downloaded from:
http://www.microsoft.com/en‐hk/download/details.aspx?id=15058
The tool requires .NET framework 2.0 at the least. The minimum OS version required is Windows XP SP 2.