Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Microsoft 70-742: Identity in Windows Server 2016
Course Introduction
Course Introduction (3:08)
Instructor Introduction (1:24)
Chapter 01 - Installing and Configuring Domain Controllers
Chapter 01 Introduction (1:10)
Topic A: Overview of Active Directory Domain Services (0:50)
Information Protection Concepts (3:28)
Identity and Access (IDA) (1:37)
Authentication and Authorization (5:20)
AD DS Terms (2:50)
Access Tokens (2:10)
Access Control Lists (2:07)
The Kerberos Logon Process (6:04)
Workgroup vs. Domain (2:29)
Understanding AD DS Domains (2:11)
AD DS Components and Concepts (1:03)
Active Directory Database (2:21)
Physical Data Store (1:33)
Logical Partitions (4:23)
Active Directory Schema (4:18)
Domains (3:09)
Trees and Forests (3:00)
Organizational Units (2:28)
AD DS Sites (2:26)
Controlling Replication (0:51)
Trust Relationships (3:40)
Topic B: Overview of Domain Controllers (0:18)
Introducing Domain Controllers (1:59)
Global Catalog Servers (4:01)
Read-Only Domain Controllers (1:40)
FSMO Roles (7:06)
Demo - Working with FSMO Roles (6:48)
Locating Domain Controllers (3:25)
Demo - Viewing SRV Records (4:25)
Topic C: Deploying Domain Controllers (0:12)
Reasons for Multiple Domain Controllers (2:46)
Installing from Server Manager (2:53)
Considerations for Installing Domain Controllers (3:09)
Demo - Installing a Domain Controller (9:12)
Installing on Server Core (2:30)
Demo - Promoting a Server Core DC (14:41)
Upgrading Domain Controllers (2:00)
Additional Installation Options (1:34)
Cloning Domain Controllers (2:37)
Demo - Cloning Domain Controllers (17:31)
Chapter 01 Summary (1:39)
Chapter 01 Review (0:10)
Chapter 01 Quiz
Chapter 02 - Managing Active Directory Objects
Chapter 02 Introduction (1:01)
Topic A: Overview of AD DS Object Management (0:18)
Understanding AD DS Objects (2:00)
Names for AD DS Objects (2:50)
Management Tools (4:06)
Demo - Overview of AD DS Management Tools (13:34)
Topic B: Managing User Accounts (0:18)
The Importance of the User Account (1:49)
Naming Considerations (3:04)
Configuring User Passwords (3:28)
Creating User Accounts (2:06)
Demo - Creating AD DS Users (32:38)
Managing User Attributes (1:55)
User Account Management (1:47)
Demo - Managing Users (20:28)
Topic C: Managing Groups (0:16)
Group Types and Scopes (3:12)
Types of Groups (2:00)
Group Scopes (1:45)
Domain Local and Global Groups (1:41)
Universal Groups (0:36)
Group Nesting (0:58)
Group Naming Considerations (1:25)
Creating and Configuring Groups (1:14)
Demo - Creating and Configuring Groups (14:38)
Introduction to Default Groups (1:39)
Identifying Default Groups (2:32)
Administrative Groups (0:46)
Demo - Configuring Default Groups (3:56)
Using Special Identities (2:27)
Strategies for Using Groups (4:42)
Group Nesting Strategies (6:18)
Demo - Group Nesting (15:59)
Topic D: Managing Computer Accounts (0:20)
Introduction to Computer Accounts (2:10)
Creating Computer Accounts (2:01)
Working with Secure Channel Passwords (3:20)
Offline Domain Joins (2:03)
Demo - Working with Computer Accounts (9:57)
Topic E: Managing Organizational Units (0:42)
Planning Organizational Units (5:04)
OU Hierarchy Considerations (0:52)
Creating OUs (1:46)
Demo - Creating an OU Hierarchy (10:37)
Object Security in AD DS (1:21)
AD DS Object Permissions (1:34)
Demo - Viewing Object Permissions in Active Directory (5:40)
Delegating Administrative Control (1:52)
Modifying Delegated Rights (1:32)
Best Practices for Administrative Delegation (1:25)
Demo - Delegating Administrative Control (8:34)
Chapter 02 Summary (1:29)
Chapter 02 Review (0:10)
Chapter 02 Quiz
Chapter 03 - Securing Active Directory Domain Services
Chapter 03 Introduction (1:25)
Topic A: Securing Domain Controllers (0:13)
Understanding Security Risks (4:13)
Using Group Policy (1:46)
Group Policy Security Settings (2:14)
Securing the Authentication Process (3:48)
Physical Access Security (3:05)
Branch Office Domain Controllers (2:06)
RODC Features (3:28)
RODC Limitations and Considerations (1:56)
Deploying RODCs (2:17)
Demo - Installing an RODC (8:13)
Password Replication Policies (2:03)
Topic B: Implementing Account Security (0:16)
Account Security in Windows Server 2016 (2:04)
Complexity Options (1:35)
Password Policies (2:39)
Account Lockout Policies (3:17)
Configuring Domain Password and Lockout Policies (1:23)
Demo - Configuring Account Policies in Group Policy (5:45)
Configuring Fine -Grained Password Policies (1:35)
Configuring Fine -Grained Password Policies Part 2 (2:31)
Configuring Fine -Grained Password Policies Part 3 (1:31)
Demo - Configuring Fine -Grained Password Policies (12:01)
Restricted Groups (2:03)
Protected Users Security Groups (2:03)
Authentication Policies (2:58)
Authentication Silos (1:12)
Enhancing Password Authentication (4:13)
Topic C: Auditing AD DS (0:12)
Utilizing Auditing (1:41)
The Purpose of Auditing (1:35)
Types of Events (4:04)
Auditing Goals (1:05)
Auditing File and Object Access (2:26)
Advanced Auditing (2:07)
Demo - Configuring Auditing (12:59)
Topic D: Configuring Managed Service Accounts (0:14)
Overview of Service Accounts (2:36)
Challenges to Managing Service Accounts (1:40)
Managed Service Accounts (1:08)
Group MSAs (1:01)
Demo - Configuring Group MSAs (7:08)
Chapter 03 Summary (1:49)
Chapter 03 Review (0:10)
Chapter 03 Quiz
Chapter 04 - Working with Complex AD DS Infrastructures
Chapter 04 Introduction (1:52)
Topic A: Overview of Advanced AD DS Deployments (0:13)
Domain Boundaries (3:28)
Forest Boundaries (1:32)
Reasons for Implementing Multiple Domains (3:21)
Reasons for Implementing Multiple Forests (2:39)
Deploying Domain Controllers in Azure (6:26)
Managing Objects (2:47)
Topic B: Deploying a Distributed AD DS Environment (0:13)
Domain Functional Levels (2:35)
Forest Functional Levels (1:08)
Deploying AD DS Domains (1:40)
DNS Considerations (4:52)
UPN Considerations (1:59)
Demo - Deploying a Child Domain (5:55)
Understanding Trust Relationships (3:05)
Types of Trusts (3:23)
How Trusts Work (2:43)
Forest Trusts (1:52)
Advanced Trust Settings (3:49)
Demo - Configuring a Forest Trust (11:20)
Topic C: Overview of AD DS Replication (0:20)
AD DS Partitions (1:34)
AD DS Replication (3:31)
Types of Replication (2:46)
Resolving Replication Conflicts (3:34)
Topic D: Configuring AD DS Sites (0:23)
Reasons for Sites (2:46)
Planning for Sites (2:01)
Overview of Sites and Subnets (1:49)
Moving Domain Controller Accounts (0:49)
Domain Controller Placement (3:43)
Demo - Creating Sites (7:59)
Controlling Inter -Site Replication (1:46)
Defining Site Links (1:15)
Site Links (1:29)
Site Link Properties (2:13)
Demo - Creating Site Links (6:46)
Bridgehead Servers (1:25)
Bridging Site Links (1:47)
Monitor and Manage Replication (1:23)
Chapter 04 Summary (1:08)
Chapter 04 Review (0:10)
Chapter 04 Quiz
Chapter 05 - Implementing Group Policy
Chapter 05 Introduction (1:12)
Topic A: Overview of Group Policy (0:11)
What is Group Policy? (2:22)
Group Policy Settings (1:39)
Local Group Policies (1:47)
Policies vs. Preferences (2:16)
Demo - Examining Policy Settings (6:23)
Domain Policies (2:43)
GPO Storage (1:37)
Linking GPOs (1:28)
GPO Processing Order (2:03)
Controlling Inheritance (1:38)
Determining Inheritance (0:45)
GPO Link Options (2:18)
Security Filtering (3:50)
WMI Filtering (2:20)
Refreshing Policies (2:12)
Other Processing Options (3:28)
Topic B: Creating and Configuring GPOs (0:12)
Creating GPOs (1:17)
Starter GPOs (1:58)
Administrative Templates (3:37)
Group Policy Preferences (1:12)
Demo - Creating and Configuring Policies (37:40)
Group Policy Management (0:42)
Delegation of Control (2:05)
Demo - Managing GPOs (7:54)
Topic C: Monitoring and Troubleshooting Group Policy (0:23)
Troubleshooting Group Policy Application (3:05)
Troubleshooting Group Policy Application (2:48)
Demo - Troubleshooting Group Policy Application (11:40)
Topic D: Security Management Using Group Policy (1:03)
Security Management Using Group Policy (0:50)
Configuring User Rights (1:24)
Managing Security Option s (1:52)
User Account Control (2:09)
Demo - Managing Security Options (5:43)
Controlling Applications (1:09)
Software Restriction Policies (3:23)
Security Levels (1:09)
AppLocker (1:41)
Support for AppLocker (0:58)
AppLocker Rules (1:55)
Creating Default Rules (3:00)
Demo - Controlling Applications Using Group Policy (11:35)
Configuring the Windows Firewall (1:58)
Windows Firewall with Advanced Security (1:31)
Firewall Profiles (1:03)
Creating Firewall Rules (0:24)
Configuring the Windows Firewall (0:52)
Types of Rules (1:31)
Connection Security Rules (1:43)
Demo - Configuring Firewalls using Group Policy (7:30)
Topic E: Managing User Environments (0:24)
Using Scripts in Group Policy (1:18)
What is Folder Redirection? (1:53)
Common Folders for Redirection (1:06)
Redirection Options (1:38)
Demo - Configuring Folder Redirection (5:38)
Deploying Software Using Group Policy (2:09)
How Software Distribution Works (0:44)
Using Windows Installer (1:35)
Software Life Cycle (0:58)
Deploying Software (1:05)
Deployment Options (2:04)
Maintaining Software through Group Policy (0:56)
Removing Software Deployments (0:44)
Chapter 05 Summary (1:42)
Chapter 05 Review (0:10)
Chapter 05 Quiz
Chapter 06 - Understanding Microsoft Azure AD and Directory Synchronization
Chapter 06 Introduction (1:19)
Topic A: Planning Directory Synchronization (0:19)
Overview of Azure AD (5:38)
Limitations of AD DS (2:37)
Extending AD DS Authentication (3:35)
Comparing AD DS and Azure AD (1:58)
Authentication Options (4:54)
Planning Directory Synchronization (2:57)
Enabling AD DS Synchronization (2:03)
Topic B: Implementing Azure AD Connect (0:10)
What is Azure AD Connect? (1:50)
Azure AD Connect Requirements (4:01)
Azure AD Connect Express Settings (1:06)
Azure AD Connect Custom Installation (2:06)
Monitoring Azure AD (1:06)
Privileged Identity Management (1:23)
Topic C: Managing Identities with Directory Synchronization (0:06)
Managing Users (8:01)
Managing Groups (0:55)
Filtering Azure AD Connect (2:03)
Monitoring Directory Synchronization (1:46)
Troubleshooting Directory Synchronization (1:24)
Chapter 06 Summary (1:29)
Chapter 06 Review (0:10)
Chapter 06 Quiz
Chapter 07 - Monitoring and Recovering AD DS
Chapter 07 Introduction (1:25)
Topic A: Monitoring AD DS (0:15)
Performance Monitoring Benefits (2:05)
Establishing Performance Baselines (2:13)
Introduction to Monitoring Tools (0:51)
Event Viewer (2:34)
Demo - Using Event Viewer (5:12)
Reliability Monitor (1:52)
Real -Time Monitoring (2:42)
Data Collector Sets (1:26)
Data Collection Points (0:49)
Common AD DS Counters (4:34)
Best Practices (2:48)
Topic B: Database Management (0:07)
Physical Data Store (2:59)
Using NTDSUtil (2:35)
AD DS Maintenance (1:27)
Topic C: Backup and Recovery in AD DS (0:11)
Disaster Recovery for Active Directory (1:26)
Backing Up Active Directory (4:17)
Using Backup Tools (0:40)
Backup Requirements (1:44)
Restoring Data (4:27)
Additional Restore Options (3:53)
Demo - Enabling the AD Recycle Bin (3:23)
Best Practices for Backup and Recovery (1:27)
Chapter 07 Summary (1:58)
Chapter 07 Review (0:10)
Chapter 07 Quiz
Chapter 08 - Implementing Active Directory Certificate Services
Chapter 08 Introduction (1:26)
Topic A: Overview of Public Key Infrastructure and AD CS (0:08)
What is a PKI? (1:38)
Encryption Types (2:05)
PKI Components (1:56)
PKI Enabled Applications (1:49)
Certificate Authorities (1:45)
CA Types (0:49)
Internal vs. External CAs (3:24)
AD CS in Windows Server 2016 (3:15)
Topic B: Deploying Certificate Authority Hierarchy (0:13)
Decision Factors for CA Hierarchy (0:39)
CA Hierarchy Roles (1:40)
Best Practices for CA Hierarchies (1:22)
Installing Root CAs (1:18)
Installing Root CAs Part 2 (1:16)
Demo - Installing a Root CA (8:01)
Installing Subordinate CAs (0:50)
Benefits of Using Subordinates (1:36)
Automating Installations (1:58)
Topic C: Administering Certificate Authorities (0:25)
Administration Tools (3:09)
Configuring CA Security (1:22)
Security Roles for CA Administration (1:58)
Policy and Exit Modules (1:29)
Certificate Revocation Lists (CRL) (2:37)
Publishing the CRL (0:57)
Publishing AIAs and CDPs (1:14)
Topic D: Deploying and Managing Certificates (0:08)
Digital Certificates (1:54)
Certificate Templates (1:08)
Template Versions in Windows Server 2016 (2:11)
Certificate Template Permissions (1:13)
Updating Templates (1:21)
Demo - Modifying and Enabling a Certificate Template (5:44)
Enrollment Types (2:02)
Manual Enrollment (0:58)
Automating Enrollment (0:36)
Autoenrollment Components (0:56)
Demo - Configuring Autoenrollment (7:22)
Credential Roaming (0:48)
Topic E: Managing Revocation and Distribution (0:22)
Certificate Revocation (1:24)
Online Responder (1:41)
Online Responder Process (0:50)
Comparing CRL and OCSP (1:32)
Configuring an Online Responder (1:01)
Topic F: Configuring Certificate Recovery (0:16)
Importance of Key Archival and Recovery (1:03)
Key Archival (1:27)
Data Recovery vs. Key Recovery (1:24)
Archival Methods (0:44)
Export Methods (0:46)
Automating Archival (1:01)
Recovering Lost Keys (1:11)
Chapter 08 Summary (1:57)
Chapter 08 Review (0:10)
Chapter 08 Quiz
Chapter 09 - Implementing Active Directory Federation Services (AD FS)
Chapter 09 Introduction (1:17)
Topic A: Overview of AD FS (0:10)
What is Identity Federation? (3:09)
Federation Benefits (1:35)
AD FS Components (2:13)
Additional AD FS Terms (4:03)
Identity Federation Scenarios (1:49)
Business to Business Scenario (1:54)
Business to Employee Scenario (0:46)
Business to Consumer Scenario (0:32)
New Features in Windows Server 2016 (1:30)
Topic B: Planning and Deploying AD FS (0:06)
AD FS Requirements (2:10)
Server Roles (2:03)
Planning High Availability (3:04)
AD FS Claims (2:34)
AD FS Claim Rules (3:38)
Trust Relationships (2:32)
Installing AD FS (2:59)
Demo - Installing AD FS (8:39)
Configuring Partners (3:35)
Home Realm Discovery (2:06)
Managing AD FS (1:53)
Topic C: Overview of Web Application Proxy (0:17)
Introducing the Web Application Proxy (2:49)
Web Application Proxy and AD FS Proxy (1:47)
Authentication Methods (2:02)
Publishing Software (1:26)
Chapter 09 Summary (1:05)
Chapter 09 Review (0:10)
Chapter 09 Quiz
Chapter 10 - Implementing Active Directory Rights Management Services
Chapter 10 Intoduction (0:44)
Topic A: Overview of AD RMS (0:12)
Introducing AD RMS (2:56)
The AD RMS Difference (2:57)
AD RMS Components (2:06)
Certificates and Licenses (2:36)
Protecting Content (0:59)
Consuming Content (1:32)
Azure RMS (0:57)
Topic B: Deploying AD RMS (0:09)
Deployment Scenarios (2:03)
Installation Overview (1:15)
AD RMS Configuration (1:08)
Demo - Installing AD RMS Cluster (5:59)
AD RMS Management (2:02)
External Sharing (1:43)
Topic C: Protecting Content with AD RMS (0:08)
Rights Policy Templates (1:13)
Configuring Templates for Offline Usage (0:49)
Demo - Configuring Rights Management Templates (5:37)
Exclusion Policies (1:24)
Chapter 10 Summary (0:44)
Chapter 10 Review (0:10)
Chapter 10 Quiz
Course Closure (2:29)
Considerations for Installing Domain Controllers
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock