Planning and Maintaining a Microsoft Windows Server 2003 Network Infrastructure
Planning and Implementing Server Roles and Server Security
2) Configure security for servers that are assigned specific roles.
3) Plan a secure baseline installation.
a) Plan a strategy to enforce system default security settings on new systems.
b) Identify client operating system default security settings.
c) Identify all server operating system default security settings.
4) Plan security for servers that are assigned specific roles. Roles might include domain controllers, Web servers, database servers, and mail servers.
a) Deploy the security configuration for servers that are assigned specific roles.
b) Create custom security templates based on server roles.
5) Evaluate and select the operating system to install on computers in an enterprise.
a) Identify the minimum configuration to satisfy security requirements.
6) Planning, Implementing, and Maintaining a Network Infrastructure
7) Plan a TCP/IP network infrastructure strategy.
a) Analyze IP addressing requirements.
b) Plan an IP routing solution.
c) Create an IP subnet scheme.
8) Plan and modify a network topology.
a) Plan the physical placement of network resources.
b) Identify network protocols to be used.
9) Plan an Internet connectivity strategy.
10) Plan network traffic monitoring. Tools might include Network Monitor and System Monitor.
11) Troubleshoot connectivity to the Internet.
a) Diagnose and resolve issues related to Network Address Translation (NAT).
b) Diagnose and resolve issues related to name resolution cache information.
c) Diagnose and resolve issues related to client configuration.
12) Troubleshoot TCP/IP addressing.
a) Diagnose and resolve issues related to client computer configuration.
b) Diagnose and resolve issues related to DHCP server address assignment.
13) Plan a host name resolution strategy.
a) Plan a DNS namespace design.
b) Plan zone replication requirements.
c) Plan a forwarding configuration.
d) Plan for DNS security.
e) Examine the interoperability of DNS with third-party DNS solutions.
14) Plan a NetBIOS name resolution strategy.
a) Plan a WINS replication strategy.
b) Plan NetBIOS name resolution by using the Lmhosts file.
15) Troubleshoot host name resolution.
a) Diagnose and resolve issues related to DNS services.
b) Diagnose and resolve issues related to client computer configuration.
16) Planning, Implementing, and Maintaining Routing and Remote Access
17) Plan a routing strategy.
a) Identify routing protocols to use in a specified environment.
b) Plan routing for IP multicast traffic.
18) Plan security for remote access users.
a) Plan remote access policies.
b) Analyze protocol security requirements.
c) Plan authentication methods for remote access clients.
19) Implement secure access between private networks.
a) Create and implement an IPSec policy.
20) Troubleshoot TCP/IP routing. Tools might include the route, tracert, ping, pathping, and netsh commands and Network Monitor.
21) Planning, Implementing, and Maintaining Server Availability
22) Plan services for high availability.
a) Plan a high-availability solution that uses clustering services.
b) Plan a high-availability solution that uses Network Load Balancing.
23) Identify system bottlenecks, including memory, processor, disk, and network related bottlenecks.
a) Identify system bottlenecks by using System Monitor.
24) Implement a cluster server.
a) Recover from cluster node failure.
25) Manage Network Load Balancing. Tools might include the Network Load Balancing Monitor Microsoft Management Console (MMC) snap-in and the WLBS cluster control utility.
26) Plan a backup and recovery strategy.
a) Identify appropriate backup types. Methods include full, incremental, and differential.
b) Plan a backup strategy that uses volume shadow copy.
c) Plan system recovery that uses Automated System Recovery (ASR).
27) Planning and Maintaining Network Security
28) Configure network protocol security.
a) Configure protocol security in a heterogeneous client computer environment.
b) Configure protocol security by using IPSec policies.
29) Configure security for data transmission.
a) Configure IPSec policy settings.
30) Plan for network protocol security.
a) Specify the required ports and protocols for specified services.
b) Plan an IPSec policy for secure network communications.
31) Plan secure network administration methods.
a) Create a plan to offer Remote Assistance to client computers.
b) Plan for remote administration by using Terminal Services.
32) Plan security for wireless networks.
33) Plan security for data transmission.
a) Secure data transmission between client computers to meet security requirements.
b) Secure data transmission by using IPSec.
34) Troubleshoot security for data transmission. Tools might include the IP Security Monitor MMC snap-in and the Resultant Set of Policy (RSoP) MMC snap-in.
35) Planning, Implementing, and Maintaining Security Infrastructure.
36) Configure Active Directory directory service for certificate publication.
37) Plan a public key infrastructure (PKI) that uses Certificate Services.
a) Identify the appropriate type of certificate authority to support certificate issuance requirements.
b) Plan the enrollment and distribution of certificates.
c) Plan for the use of smart cards for authentication.
38) Plan a framework for planning and implementing security.
a) Plan for security monitoring.
b) Plan a change and configuration management framework for security.
39) Plan a security update infrastructure. Tools might include Microsoft Baseline Security Analyzer and Microsoft Software Update Services.
No comments:
Post a Comment