Amazon cover image
Image from Amazon.com

MCSE CoursePrep examguide / studyguide exam #70-217 : Implementing and administering a microsoft windows 2000 directory services infrastructure / Kevin Hilscher and John Hales.

By: Contributor(s): Publication details: Australia : Course Technology, c2002.Description: vii, 152 p. : ill. ; 24 cmISBN:
  • 9780619035051
  • 0619035056
Subject(s): DDC classification:
  • 22 003 HIL
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)


TABLE OF CONTENTS

Section 1: Installing, Configuring, and Troublshooting Active Directory
1.1 Install Active Directory
1.2 Create Sites
1.3 Create Subnets
1.4 Create Site Links
1.5 Craeting Site Link Bridges
1.6 Create Connection Objects
Etc.

Section 2: Installing, Configuring, Managing, Monitoring, and Troubleshooting DNS for Active Directory
2.1 Install DNS for Active Directory
2.2 Integrate AD DNS Zones with Non-AD DNS Zones
2.3 Configure Zones for Dynamic Updates
2.4 Manage Replication of DNS Data
2.5 Monitor and Troublshoot DNS

Section 3: Configuring, Managing, Monitoring, Optimizing, and Troubleshooting Change and Configuration Management
3.1 Create a Group Policy Object (GPO)
3.2 Link an Existing GPO
3.3 Delegate Administrative Control of Group Policy
3.4 Modify Group Policy Inheritance
3.5 Filter Group Policy Settings by Associating Security Groups to GPOs
Etc.

Section 4: Managing, Monitoring, and Optimizing the Components of Active Directory
4.1 Move Active Directory Objects
4.2 Publish Resources in Active Directory
4.3 Locate Objects in Active Directory
4.4 Create and Manage Accounts Manually or by Scripting
4.5 Control Access to Active Directory Objects
Etc.

Section 5: Configuring, Managing, Monitoring, and Troubleshooting Security in a Directory Services Infrastructure
5.1 Apply Security Policies by Using Group Policy
5.2 Create Security Configurations by Using Security Configuration and Analysis and Security Templates
5.3 Analyze Security Configurations by Using Security Configuration and Analysis and Security Templates
5.4 Troubleshoot / Modify Security Configurations by Using Configuration and Analysis and Security Templates
5.5 Implement an Audit Policy
5.6 Monitor Security Events
5.7 Analyze Security Events

Includes : Glossary: p.151-152

0019591

There are no comments on this title.

to post a comment.