Designing a Microsoft Windows Server 2003 Active Directory and Network Infrastructure
1) Creating the Conceptual Design by Gathering and Analyzing Business and Technical Requirements
2) Analyze the impact of Active Directory on the existing technical environment.
    a) Analyze hardware and software requirements.
    b) Analyze interoperability requirements.
    c) Analyze current level of service within an existing technical environment.
    d) Analyze current network administration model.
    e) Analyze network requirements.
3) Analyze DNS for Active Directory directory service implementation.
    a) Analyze the current DNS infrastructure.
    b) Analyze the current namespace.
4) Analyze existing network operating system implementation.
    a) Identify the existing domain model.
    b) Identify the number and location of domain controllers on the network.
    c) Identify the configuration details of all servers on the network. Server types might include primary domain controllers, backup domain controllers, file servers, print servers, and Web servers.
5) Analyze security requirements for the Active Directory directory service.
    a) Analyze current security policies, standards, and procedures.
    b) Identify the impact of Active Directory on the current security infrastructure.
    c) Identify the existing trust relationships.
6) Design the Active Directory infrastructure to meet business and technical requirements.
    a) Design the envisioned administration model.
    b) Create the conceptual design of the Active Directory forest structure.
    c) Create the conceptual design of the Active Directory domain structure.
    d) Design the Active Directory replication strategy.
    e) Create the conceptual design of the organizational unit (OU) structure.
7) Design the network services infrastructure to meet business and technical requirements.
    a) Create the conceptual design of the DNS infrastructure.
    b) Create the conceptual design of the WINS infrastructure.
    c) Create the conceptual design of the DHCP infrastructure.
    d) Create the conceptual design of the remote access infrastructure.
8) Identify network topology and performance levels.
    a) Identify constraints in the current network infrastructure.
    b) Interpret current baseline performance requirements for each major subsystem.
9) Analyze the impact of the infrastructure design on the existing technical environment.
    a) Analyze hardware and software requirements.
    b) Analyze interoperability requirements.
    c) Analyze current level of service within the existing technical environment.
    d) Analyze network requirements.
10) Creating the Logical Design for an Active Directory Infrastructure
11) Design an OU structure.
    a) Identify the Group Policy requirements for the OU structure.
    b) Design an OU structure for the purpose of delegating authority.
12) Design a security group strategy.
    a) Define the scope of a security group to meet requirements.
    b) Define resource access requirements.
    c) Define administrative access requirements.
    d) Define user roles.
13) Design a user and computer authentication strategy.
    a) Identify common authentication requirements.
    b) Select authentication mechanisms.
    c) Optimize authentication by using shortcut trust relationships.
14) Design a user and computer account strategy.
    a) Specify account policy requirements.
    b) Specify account requirements for users, computers, administrators, and services.
15) Design an Active Directory naming strategy.
    a) Identify Internet domain name registration requirements.
    b) Specify the use of hierarchical namespace within Active Directory.
    c) Identify NetBIOS naming requirements.
16) Design migration paths to Active Directory.
    a) Define whether the migration will include an in-place upgrade, domain restructuring, or migration to a new Active Directory environment.
17) Design a strategy for Group Policy implementation.
    a) Design the administration of Group Policy objects (GPOs).
    b) Design the deployment strategy of GPOs.
    c) Create a strategy for configuring the user environment with Group Policy.
    d) Create a strategy for configuring the computer environment with Group Policy.
18) Design an Active Directory directory service site topology.
    a) Design sites.
    b) Identify site links.
19) Creating the Logical Design for a Network Services Infrastructure
20) Design a DNS name resolution strategy.
    a) Create the namespace design.
    b) Identify DNS interoperability with Active Directory, WINS, and DHCP.
    c) Specify zone requirements.
    d) Specify DNS security.
    e) Design a DNS strategy for interoperability with UNIX Berkeley Internet Name Domain (BIND) to support Active Directory.
21) Design a NetBIOS name resolution strategy.
    a) Design a WINS replication strategy.
22) Design security for remote access users.
    a) Identify security host requirements.
    b) Identify the authentication and accounting provider.
    c) Design remote access policies.
    d) Specify logging and auditing settings.
23) Design a DNS service implementation.
    a) Design a strategy for DNS zone storage.
    b) Specify the use of DNS server options.
    c) Identify the registration requirements of specific DNS records.
24) Design a remote access strategy.
    a) Specify the remote access method.
    b) Specify the authentication method for remote access.
25) Design an IP address assignment strategy.
    a) Specify DHCP integration with DNS infrastructure.
    b) Specify DHCP interoperability with client types.
26) Creating the Physical Design for an Active Directory and Network Infrastructure
27) Design DNS service placement.
28) Design an Active Directory implementation plan.
    a) Design the placement of domain controllers and global catalog servers.
    b) Plan the placement of flexible operations master roles.
    c) Select the domain controller creation process.
29) Specify the server specifications to meet system requirements.
30) Design Internet connectivity for a company.
31) Design a network and routing topology for a company.
    a) Design a TCP/IP addressing scheme through the use of IP subnets.
    b) Specify the placement of routers.
    c) Design IP address assignment by using DHCP.
    d) Design a perimeter network.
32) Design the remote access infrastructure.
    a) Plan capacity.
    b) Ascertain network settings required to access resources.
    c) Design for availability, redundancy, and survivability.
No comments:
Post a Comment