Post on 15-Apr-2017
Preparing for the Windows Server 2012 MCSE Server Infrastructure Exams 70-413 and 70-414
MCSE and MCSD Certifications
Web Applications Windows Store Apps
Server Infrastructure Desktop Infrastructure
Business Intelligence Data Platform
Private Cloud
Session Objective(s): • Describe key Windows Server 2012 exam objectives• Understand question styles• Prepare more effectively using available study material• Relate practical Windows Server 2012 experience to exam topics
Key Takeaway 1• Identify areas that may require extra studying
Key Takeaway 2• Action Plan for exam preparation and success
Session Objectives And Takeaways
Microsoft Certification
Changes to Certifications and Exams
Deeper Skill Set
Certification Requirement
Broader Skill Set
Recertification
Relevance Rigor
Increased RigorReflection of the real worldLearn more, validate moreSolutions are more complex, questions must reflect thatBest way to measure candidates know what they know
New item typesFewer multiple choiceCase studies
Scenario basedSee big picture and make decisions
Innovative item types
Exam Tips
Exam Basics40-60 questions1-4 hours to complete examCan review questions
Cannot move between case studies700 is passing700 is not 70%
MICROSOFT CONF IDENTIAL – INTERNAL ONLY
How to interpret questions
One or Multiple Correct Answers
Goal Statement
Business ProblemAll questions have a consistent anatomy
Multiple Distracters
Questions are not intended to trick you
Exam Content
Exam Objectives70-413• Plan and Deploy a Server Infrastructure (20%)• Design and Implement Network Infrastructure Services (20%)• Design and Implement Network Access Services (17%)• Design and Implement an Active Directory Infrastructure (Logical) (22%)• Design and Implement an Active Directory Infrastructure (Physical) (21%
)70-414• Manage and Maintain a Server Infrastructure (27%)• Plan and Implement a Highly Available Enterprise Infrastructure (26%)• Plan and Implement a Server Virtualization Infrastructure (26%)• Design and Implement Identity and Access Solutions (21%)
70-413• Plan and Deploy a Server Infrastructure (20%)• Design and Implement Network Infrastructure Services (20%)• Design and Implement Network Access Services (17%)• Design and Implement an Active Directory Infrastructure (Logical) (22%)• Design and Implement an Active Directory Infrastructure (Physical)
(21%)70-414
• Manage and Maintain a Server Infrastructure (27%)• Plan and Implement a Highly Available Enterprise Infrastructure (26%)• Plan and Implement a Server Virtualization Infrastructure (26%)• Design and Implement Identity and Access Solutions (21%)
Exam Objectives
MICROSOFT CONF IDENTIAL – INTERNAL ONLY
Design an Automated Server Installation StrategySelect an appropriate imaging strategy• Bare Metal vs. Virtual• High/Lite/Zero-touch• Thin/Thick/Hybrid
Tip: • What is the number of
images required for the configuration desired?
• How many disks are required?
Design a server implementation using Windows Assessment and Deployment Kit (ADK)
Tips: • Know what each tool does!• Know how to add custom
drivers and software packages to images
• Know how to updates imageshttp://technet.microsoft.com/en-us/library/hh831764.aspx
MICROSOFT CONF IDENTIAL – INTERNAL ONLY
Design an Automated Server Installation Strategy Design a Virtual Server Deployment• Hyper-V• System Center 2012 Virtual Machine
Manager• WDS
http://technet.microsoft.com/en-us/library/gg610634.aspx
MICROSOFT CONF IDENTIAL – INTERNAL ONLY
Plan and Implement a Server Deployment InfrastructureConfigure standalone and AD-integrated Windows Deployment Services (WDS) serversConfigure multi-site topology and distribution points in System Center 2012• Collections• Distribution Point Groups
Configure a multi-server topologyConfigure multicast deployment
http://technet.microsoft.com/en-us/library/hh397405.aspx
MICROSOFT CONF IDENTIAL – INTERNAL ONLY
Plan and Implement Server Upgrade and MigrationUpgrade and migration strategies• Prerequisites• In-place upgrade vs. server
migration• Migration planning tools
Tip: • Be familiar with Microsoft
Assessment and Planning (MAP) Toolkit and what it can do
Plan and migrate server rolesTips: • Know which roles can be
migrated and which can be co-hosted
• Know how to migrate print queues
http://technet.microsoft.com/en-us/library/jj134039.aspx
MICROSOFT CONF IDENTIAL – INTERNAL ONLY
Plan and Implement Server Upgrade and MigrationMigrate servers across domains and forestsDesign a server consolidation strategy
Plan for capacity and resource optimization
ADMT 3.2 Guide: http://www.microsoft.com/en-us/download/details.aspx?id=19188
ADMT 3.2 Supported OS and Target Domains: http://support.microsoft.com/kb/2753560
MICROSOFT CONF IDENTIAL – INTERNAL ONLY
You are planning the migration of sales.company.com. You need to identify the tools for this migration.
Which tools should you select?A. ADMT 3.2 and GPMCB. AD FS and Federation GatewayC. ADMT 3.2 and AD FSD. AD LDS and GPMC
Sample Question
MICROSOFT CONF IDENTIAL – INTERNAL ONLY
You are planning the migration of sales.company.com. You need to identify the tools for this migration.
Which tools should you select?A. ADMT 3.2 and GPMCB. AD FS and Federation GatewayC. ADMT 3.2 and AD FSD. AD LDS and GPMC
Sample Question - Answer
MICROSOFT CONF IDENTIAL – INTERNAL ONLY
Plan and Deploy Virtual Machine Manager ServicesDesign Virtual Machine Manager service templatesDefine operating system profilesConfigure hardware and capability profiles
Tip: • Know the components
associated with templates for hardware profiles and guest OS profiles
Profiles and VM Templateshttp://technet.microsoft.com/en-us/library/hh368987.aspx
Service Templateshttp://technet.microsoft.com/en-us/library/gg675074.aspx
MICROSOFT CONF IDENTIAL – INTERNAL ONLY
Plan and Deploy Virtual Machine Manager ServicesConfigure image template librariesManage servicesManage logical networks
http://technet.microsoft.com/en-us/library/gg696967.aspx
MICROSOFT CONF IDENTIAL – INTERNAL ONLY
Plan and Implement File and Storage ServicesPlan and implement Storage Spaces and Storage Pools• Disk types• Data deduplication
Tip: • Deduplication is used on
NTFS volumes, but it can’t be used on boot/system volumes or Cluster Shared Volumes
Configure an iSCSI Storage Name Server (iSNS)Configure Network File System (NFS)Install Device Specific Modules (DSM)
http://technet.microsoft.com/en-us/library/hh831487.aspx
MICROSOFT CONF IDENTIAL – INTERNAL ONLY
Plan and Implement File and Storage ServicesStorage design considerations• SAN vs. DAS vs. NASPlanning for iSCSI and fibre channel SANs• Components
Configure an iSCSI target server
Tip: • Know the steps to configure
an iSCSI target
http://technet.microsoft.com/en-us/library/hh848272.aspx
MICROSOFT CONF IDENTIAL – INTERNAL ONLY
You are evaluating data deduplication for the planned Windows Server 2012 File Servers. All servers will have identically configured volumes.
On which volumes should you enable deduplication?A. C: - System VolumeB. D: - Data VolumeC. E: - CSVD. F: - CSV
Sample Question
MICROSOFT CONF IDENTIAL – INTERNAL ONLY
You are evaluating data deduplication for the planned Windows Server 2012 File Servers. All servers will have identically configured volumes.
On which volumes should you enable deduplication?A. C: - System VolumeB. D: - Data VolumeC. E: - CSVD. F: - CSV
Sample Question - Answer
70-413• Plan and Deploy a Server Infrastructure (20%)• Design and Implement Network Infrastructure Services (20%)• Design and Implement Network Access Services (17%)• Design and Implement an Active Directory Infrastructure (Logical) (22%)• Design and Implement an Active Directory Infrastructure (Physical)
(21%)70-414
• Manage and Maintain a Server Infrastructure (27%)• Plan and Implement a Highly Available Enterprise Infrastructure (26%)• Plan and Implement a Server Virtualization Infrastructure (26%)• Design and Implement Identity and Access Solutions (21%)
Exam Objectives
MICROSOFT CONF IDENTIAL – INTERNAL ONLY
Design a Name Resolution Solution StrategyDNS namespace design• Disjointed• IntegratedZones• Types• Hierarchy• Delegation• ReplicationMigration to application partitions
Tip:• Make sure you can explain
when and how to use forwarding, conditional forwarding, delegation records, stub zones, etc.
• Make sure you can describe how zone replication is implemented
http://technet.microsoft.com/en-us/library/cc725625(v=ws.10).aspx
MICROSOFT CONF IDENTIAL – INTERNAL ONLY
Design a Name Resolution Solution StrategyIPv6Secure name resolutionDNSSECDNS socket poolCache lockingDNS interoperability
Single-Label DNS name resolution
Tip: • Make sure you know when
and how to use the GlobalNames zone
DNS GlobalNames Zonehttp://technet.microsoft.com/en-us/library/cc731744.aspxDNSSEChttp://technet.microsoft.com/en-us/library/jj200221.aspx
MICROSOFT CONF IDENTIAL – INTERNAL ONLY
Design and Maintain a DHCP SolutionScopes• DHCP interoperability and
DHCPv6
Tips: • Placing scopes to support
geographical splits of IP addresses
• Managing scopes using PowerShell (import, etc.)
DHCP Management• DHCP database maintenance• DHCP Management Pack• Delegation
Tip: • Know how to use PowerShell
to migrate/move DHCP dataDHCP Design Guidehttp://technet.microsoft.com/en-us/library/dd283016(v=ws.10).aspx DHCP Migration Guidehttp://technet.microsoft.com/en-us/library/dd379535(v=ws.10).aspx
MICROSOFT CONF IDENTIAL – INTERNAL ONLY
Design and Maintain a DHCP SolutionDHCP FilteringHigh-Availability• Split scopes• DHCP Failover• Modes• Topologies
• DHCP Failover clustering
Tip:• Know how to configure DHCP
Failover
DHCP Failoverhttp://technet.microsoft.com/en-us/library/hh831825.aspx
MICROSOFT CONF IDENTIAL – INTERNAL ONLY
Planning and Implementing an IPAM Provisioning StrategyIPAM implementation• Manual vs. Group Policy• Distributed vs. centralizedIPAM configuration• Role-Based access control• Auditing
Tip: • Know the IPAM security
groups and what each can do
IPAM management• IPAM Console• Migrate IPs• Manage and monitor multiple
DHCP and DNS servers
Tip: • Know the IPAM Cmdlets,
including but not limited to:• Invoke-IPAMGPProvisioning• Set-IPAMConfiguration
http://technet.microsoft.com/en-us/library/hh831353.aspx
MICROSOFT CONF IDENTIAL – INTERNAL ONLY
You need to recommend a solution for DHCP logging. The solution must meet technical requirements.
Which tool should you select?A. Event ViewerB. IP Address Management (IPAM)C. DHCP Audit LoggingD. DHCP Filtering
Sample Question
MICROSOFT CONF IDENTIAL – INTERNAL ONLY
You need to recommend a solution for DHCP logging. The solution must meet technical requirements.
Which tool should you select?A. Event ViewerB. IP Address Management (IPAM)C. DHCP Audit LoggingD. DHCP Filtering
Sample Question - Answer
70-413• Plan and Deploy a Server Infrastructure (20%)• Design and Implement Network Infrastructure Services (20%)• Design and Implement Network Access Services (17%)• Design and Implement an Active Directory Infrastructure (Logical) (22%)• Design and Implement an Active Directory Infrastructure (Physical)
(21%)70-414
• Manage and Maintain a Server Infrastructure (27%)• Plan and Implement a Highly Available Enterprise Infrastructure (26%)• Plan and Implement a Server Virtualization Infrastructure (26%)• Design and Implement Identity and Access Solutions (21%)
Exam Objectives
MICROSOFT CONF IDENTIAL – INTERNAL ONLY
Design a VPN SolutionConnection types• Client Remote Access• Site-to-SiteTunneling protocols• PPTP, L2TP, SSTPAuthentication Methods• PAP, CHAP. MS-CHAPv2, EAP,
Unauthenticated Access, Machine Certificate for IKEv2
Encryption methods• MPPE, IPSec, SSL
VPN server placement• Network Load BalancingUser environment configuration• Connection Manager
Administration Kit (CMAK)RADIUSNetwork Access Policies
http://technet.microsoft.com/en-us/library/hh831416.aspx
MICROSOFT CONF IDENTIAL – INTERNAL ONLY
Design and Implement a Direct Access SolutionComponentsDesign choices• Scope• Network• Native IPv6, 6to4, Teredo,
IP-HTTPS• Web server and certificate
infrastructure
Prerequisites• Server• Client• InfrastructureMigration from Forefront Unified Access Gateway (UAG)• Side-by-Side• Offline
http://technet.microsoft.com/en-us/library/hh831416.aspx
MICROSOFT CONF IDENTIAL – INTERNAL ONLY
Implement a Scalable Remote Access SolutionConfigure Site-to-Site VPN• Remote Access Management
Console• Enable Site-to-Site VPN
Configure DirectAccess• Remote Access Management
Console | ConfigurationImplement multi-site remote access• Enable Multisite Deployment
Wizard
Configure remote access clustered with NLB• Enable Load Balancing WizardConfigure packet filters• Windows Firewall with
Advanced Security consoleImplement packet tracing• Remote Access Management
Console | Monitoring | Start Tracing
http://technet.microsoft.com/en-us/library/hh831416.aspx
MICROSOFT CONF IDENTIAL – INTERNAL ONLY
Design a Network Protection SolutionNetwork Policy Server (NPS)• Server role used for both VPN
and DirectAccess
Tip: • Know the roles service
requirements for NPS, HRA, and Certification Authority
Network Access Protection (NAP)• Architecture• Components• Network Policies• Force Tunneling• Health Policies
Tip: • Understand how Force
Tunneling works and when to use it
http://technet.microsoft.com/en-us/library/hh831683.aspx
MICROSOFT CONF IDENTIAL – INTERNAL ONLY
Design a Network Protection SolutionNAP enforcement methods• IPSec• 802.1x• VPN• DHCP
Design considerations• Capacity • Server placement• Firewall• Remediation network• Remediation Server Groups
http://technet.microsoft.com/en-us/library/hh831683.aspx
Tip: • Know when each enforcement method should be used and the
requirements for each; also know how to configure each
MICROSOFT CONF IDENTIAL – INTERNAL ONLY
Implement a Network Protection SolutionImplement multi-RADIUS deploymentConfigure NAP enforcement for IPSec and 802.1xDeploy and configure the Endpoint Protection Client
Create anti-malware and firewall policiesMonitor for compliance
http://technet.microsoft.com/en-us/library/hh831683.aspx
MICROSOFT CONF IDENTIAL – INTERNAL ONLY
You need to recommend remote access solutions that meets the VPN requirements.
Which solutions should you recommend?[CHOOSE 2]A. RoutingB. Network Policy ServerC. DirectAccessD. VPN
Sample Question
MICROSOFT CONF IDENTIAL – INTERNAL ONLY
You need to recommend remote access solutions that meets the VPN requirements.
Which solutions should you recommend?[CHOOSE 2]A. Routing (doesn’t provide VPN connectivity)B. Network Policy Server (doesn’t provide VPN
connectivity)C. DirectAccessD. VPN
Sample Question - Answer
70-413• Plan and Deploy a Server Infrastructure (20%)• Design and Implement Network Infrastructure Services (20%)• Design and Implement Network Access Services (17%)• Design and Implement an Active Directory Infrastructure (Logical) (22%)• Design and Implement an Active Directory Infrastructure (Physical)
(21%)70-414
• Manage and Maintain a Server Infrastructure (27%)• Plan and Implement a Highly Available Enterprise Infrastructure (26%)• Plan and Implement a Server Virtualization Infrastructure (26%)• Design and Implement Identity and Access Solutions (21%)
Exam Objectives
MICROSOFT CONF IDENTIAL – INTERNAL ONLY
Design and Implement a Forest and Domain InfrastructureMulti-Forest architecture• Deploy and manage a test
forest including synchronization with production forests
Tip: • To prevent a forest owner
from gaining access to object in non-root domains, create a new forest and migrate the resources and the accounts to the new forest
Forest design• Forest Models• Single, organizational,
resource, restricted access
Tip: • Know the benefits and
disadvantages of each forest mode
Functional levelsDNS design for AD
http://technet.microsoft.com/en-us/library/cc754678(v=ws.10).aspx
MICROSOFT CONF IDENTIAL – INTERNAL ONLY
Design and Implement a Forest and Domain InfrastructureForest trusts• One-Way vs. Two-Way• Security considerations• SID Filtering• Selective Authentication• Name Suffix Routing• Resource Access
Tip: • Know how to configure a
Kerberos Realm Trust
Forest restructure• Domain upgrade• Domain migration• Domain rename• Rendom.exe• Repadmin.exe• Gpfixup.exe
Tip: • Use GPFixup after a domain
rename
http://technet.microsoft.com/en-us/library/cc974332(v=ws.10).aspx
MICROSOFT CONF IDENTIAL – INTERNAL ONLY
Design a Group Policy StrategyOU hierarchy design strategies• Location-based, resource-based,
organization-based, multi-tenancy based, hybridTip: Know the benefits and disadvantages of each strategy
Group Policy management• Centralized Storage • Advanced Group Policy Management
(AGMP)• Migration• Active Directory Migration Tool (ADMT
3.2)• Microsoft Desktop Optimization Pack
(MDOP)
Group Policy implementation• Inheritance blocking• Enforced policies• Loopback processing• Security Group filtering• WMI filtering• Slow-Link processing
http://technet.microsoft.com/en-us/library/cc754948(v=ws.10).aspx
MICROSOFT CONF IDENTIAL – INTERNAL ONLY
Design an Active Directory Permission ModelAdministrative models• Centralized vs. DecentralizedActive Directory quotasDelegation methods• Object-Type• Role-Based• Kerberos
Tip: Know how to configure Kerberos delegation
Delegation of Control• Delegwiz.inf• AdminSDHolder
Tip: Delegwiz.inf is used to ensure that admins can delegate custom tasks using Delegation of Control Wizard
Administrative tools• Deploy to client computers
http://www.microsoft.com/en-us/download/details.aspx?id=21678
MICROSOFT CONF IDENTIAL – INTERNAL ONLY
You need to recommend a management solution for Group Policy. The solution must meet technical requirements.
Which solution should you recommend?A. Microsoft Desktop Optimization Pack (MDOP)B. System Center 2012 Operations ManagerC. System Center 2012 Configuration ManagerD. Microsoft Baseline Security Analyzer (MBSA)
Sample Question
MICROSOFT CONF IDENTIAL – INTERNAL ONLY
You need to recommend a management solution for Group Policy. The solution must meet technical requirements.
Which solution should you recommend?A. Microsoft Desktop Optimization Pack (MDOP)B. System Center 2012 Operations ManagerC. System Center 2012 Configuration ManagerD. Microsoft Baseline Security Analyzer (MBSA)
Sample Question - Answer
70-413Plan and Deploy a Server Infrastructure (20%)Design and Implement Network Infrastructure Services (20%)Design and Implement Network Access Services (%17)Design and Implement an Active Directory Infrastructure (Logical) (22%)Design and Implement an Active Directory Infrastructure (Physical) (21%)70-414Manage and Maintain a Server Infrastructure (27%)Plan and Implement a Highly Available Enterprise Infrastructure (26%)Plan and Implement a Server Virtualization Infrastructure (26%)Design and Implement Identity and Access Solutions (21%)
Exam Objectives
MICROSOFT CONF IDENTIAL – INTERNAL ONLY
Design an Active Directory Sites TopologyDesign considerationsProximity of Domain Controllers
Forest root domain controllerRegional domain controllerGlobal Catalog serverOperations master role
Sites and site linksSite costScheduleInterval
ReplicationReplication optimization
Number of physical sitesAvailable bandwidth between sites
Monitor and resolve Active Directory replication conflicts
repadmin /showrepldcdiag /test:replications
http://technet.microsoft.com/en-us/library/cc754678(v=ws.10).aspx
MICROSOFT CONF IDENTIAL – INTERNAL ONLY
Design a Domain Controller StrategyPlacementGlobal CatalogOperations Master roles
Read-Only Domain ControllersPartial Attribute Set
Domain Controller virtualization and cloning
Virtualization and Cloning http://technet.microsoft.com/en-us/library/jj574191.aspx
MICROSOFT CONF IDENTIAL – INTERNAL ONLY
Design and Implement a Branch Office InfrastructureConsiderations• Global Catalog• RODCs• Universal Group Membership
Caching• DNS• DHCPBranch Cache• Distributed vs. hosted
Confidential attributesDelegate administrationModify Filtered Attributes SetConfigure Password Replication PolicyConfigure Hash Publicationhttp://technet.microsoft.com/en-us/library/cc771744(v=ws.1
0).aspx
MICROSOFT CONF IDENTIAL – INTERNAL ONLY
You need ensure that a new site link bridge is used by the KCC between two datacenter locations named HQ and Branch. What must you do?
A. Configure the Bridge all site links setting as enabled.
B. Configure the Bridge all site links setting as disabled.C. Configure the Connection object schedule to
None.D. Run repadmin /kcc site:HQ.
Sample Question
MICROSOFT CONF IDENTIAL – INTERNAL ONLY
You need ensure that a new site link bridge object is used by the KCC between two datacenter locations named HQ and Branch. What must you do?A. Configure the Bridge all site links setting as
enabled.B. Configure the Bridge all site links setting as disabled.C. Configure the Connection object schedule to
None.D. Run repadmin /kcc site:HQ.Site link bridge objects are used by the KCC only when the Bridge all site links setting is disabled. Otherwise, site link bridge objects are ignored
Sample Question - Answer
70-413• Plan and Deploy a Server Infrastructure (20%)• Design and Implement Network Infrastructure Services (20%)• Design and Implement Network Access Services (17%)• Design and Implement an Active Directory Infrastructure (Logical) (22%)• Design and Implement an Active Directory Infrastructure (Physical)
(21%)70-414
• Manage and Maintain a Server Infrastructure (27%)• Plan and Implement a Highly Available Enterprise Infrastructure (26%)• Plan and Implement a Server Virtualization Infrastructure (26%)• Design and Implement Identity and Access Solutions (21%)
Exam Objectives
MICROSOFT CONF IDENTIAL – INTERNAL ONLY
Knowledge not specifically mentioned in exam objectives …Hyper-V Manager• Components• Network settings• Assigning VMs to appropriate
networks• NIC teaming
Tip: To ensure that users can access a VM even if a NIC fails, enable teaming and then create a virtual switch
Hyper-V Disks• Differencing• VHD vs. VHDX• Dynamically expanding
Tip: Given configuration information of various disks (parity, two-way mirror, three way mirror), be able to determine the number of physical disks required per virtual disk
http://technet.microsoft.com/en-us/library/hh831531.aspx
MICROSOFT CONF IDENTIAL – INTERNAL ONLY
Design an Administrative ModelDesign and implement administration of VMM 2012• Delegation• User Roles
Plan and implement self-service options in Systems Center 2012• VMM• Service Manager• Orchestrator
Implement Automated Remediation Using System Center 2012• Create and implement
baselines• VMM• Configuration Manager
• Plan and implement automation• Configure VMM to move a VM
dynamically based on policy• Integrate for automatic
remediation into an existing Enterprise infrastructure
Tip: Know what each product in System Center 2012 does and when to use it!!
http://technet.microsoft.com/en-us/library/gg610615.aspx
MICROSOFT CONF IDENTIAL – INTERNAL ONLY
Design a Monitoring StrategyPlan for performance monitoring• Tools• Event Viewer, Resource Monitor,
Performance Monitor, Reliability Monitor
• Monitor server roles• Domain Controllers, file server, web
server, remote desktop session host
• Monitor a virtualized environment• Performance Monitor• Resource Metering• PowerShell cmdlets
Plan for centralized monitoring and reporting• Server Manager• Multiple server management, Best
Practices Analyzer, Event logs• Operations Manager• Components• Alerts, Notification channels,
Subscriptions, Access reports• Audit Collection Services• Deployment• Distributed application• Service Level Tracking object• Monitor overridehttp://technet.microsoft.com/en-us/library/hh801900.aspx
MICROSOFT CONF IDENTIAL – INTERNAL ONLY
Design an Update InfrastructureSelect an appropriate update management technologyDeploy Updates using WSUS• Topology• Replica mode vs. autonomous
modeCluster-Aware Updating
Deploy software updates using Virtual Machine ManagerUpdate VDI desktop imagesDeploy updates using Configuration Manager• Software update points• Distribution points• Compliance settinghttp://technet.microsoft.com/en-us/library/hh831694.aspx
MICROSOFT CONF IDENTIAL – INTERNAL ONLY
Implement Automated RemediationBaselines• VMM - Create an update
baseline • Configuration Manager -
implement a Desired Configuration Management (DCM) baseline
Implement VMM Integration with Operations Manager
Configure VMM to move a VM dynamically based on policyIntegrate Systems Center for automatic remediation into your existing infrastructure
http://technet.microsoft.com/en-us/library/hh881887.aspx
MICROSOFT CONF IDENTIAL – INTERNAL ONLY
You are configuring a 60-disk JBOD as a single storage pool with Storage Spaces. You configure the pool as a three-way mirror. How many disks can fail in the 60 disk enclosure without losing data?Choose all that apply.A. One diskB. Two disksC. Three disksD. Six disksE. 29 disks
Sample Question
MICROSOFT CONF IDENTIAL – INTERNAL ONLY
You are configuring a 60-disk JBOD as a single storage pool with Storage Spaces. You configure the pool as a three-way mirror. How many disks can fail in the 60 disk enclosure without losing data?Choose all that apply.A. One diskB. Two disksC. Three disksD. Six disksE. 29 disks
Sample Question - Answer
MICROSOFT CONF IDENTIAL – INTERNAL ONLY
You are deploying the new web app to several servers that includes a custom registry key. The solution must ensure the registry key was applied successfully.
What should you do? [ Select the BEST Answer ]A. Operations Manager -> create a monitorB. GPMC -> create a Group Policy Object (GPO)C. Config Manager -> create Compliance
Settings.D. From Orchestrator -> create a runbook.
Sample Question
MICROSOFT CONF IDENTIAL – INTERNAL ONLY
You are deploying the new web app to several servers that includes a custom registry key. The solution must ensure the registry key was applied successfully.
What should you do? [ Select the BEST Answer ]A. Operations Manager -> create a monitorB. GPMC -> create a Group Policy Object (GPO)C. Config Manager -> create Compliance
Settings.D. From Orchestrator -> create a runbook.
Sample Question - Answer
70-413• Plan and Deploy a Server Infrastructure (20%)• Design and Implement Network Infrastructure Services (20%)• Design and Implement Network Access Services (17%)• Design and Implement an Active Directory Infrastructure (Logical) (22%)• Design and Implement an Active Directory Infrastructure (Physical)
(21%)70-414
• Manage and Maintain a Server Infrastructure (27%)• Plan and Implement a Highly Available Enterprise Infrastructure (26%)• Plan and Implement a Server Virtualization Infrastructure (26%)• Design and Implement Identity and Access Solutions (21%)
Exam Objectives
MICROSOFT CONF IDENTIAL – INTERNAL ONLY
Plan and Implement Failover ClusteringDesign Choices• Redundant networks• Network Infrastructure• WAN Link upgrade • Network priority settings
• Resource failover and failback• Heartbeat and DNS settings• Quorum configuration• Storage placement and data
replication• Cluster Shared Volumes (CSV)
Tips:Use CSV to:• Implement the clustered File
Server role of a file server for a scale-out application data type for a cluster
• Minimize the downtime that shared folders are unavailable during a failover of a file server role
• Know the process used to ensure that clustered servers can store new VMs on a SAN
• Know the steps for configuring a scale-out file-server cluster to ensure a disk stays accessiblehttp://technet.microsoft.com/en-us/library/hh831579.aspx
MICROSOFT CONF IDENTIAL – INTERNAL ONLY
Plan and Implement Highly Available Network ServicesPlan for and configure Network Load Balancing (NLB)Design Considerations• Fault-tolerant networking• Multi-cast vs. unicast
configuration• State management
Automated deployment of NLB using VMM service templates
http://technet.microsoft.com/en-us/library/hh831698.aspx
MICROSOFT CONF IDENTIAL – INTERNAL ONLY
Plan and Implement Highly Available Storage SolutionsPlan and configure Storage Pools and Storage SpacesDesign highly-available, multi-replica DFS namespaces
Plan for and configure multi-path I/O (including Server Core)Configure highly available iSCSI Target and iSNS server
Tip: Know the steps for configuring a highly-available iSCSI target
http://technet.microsoft.com/en-us/library/hh831739.aspx
MICROSOFT CONF IDENTIAL – INTERNAL ONLY
Plan and Implement Highly Available Server RolesDHCP• Split scope, Failover Clustering,
DHCP FailoverHyper-V• ClusteringContinuously-Available File Shares• Hyper-V over SMBDFS Namespace Server
Use Generic Application, Generic Script, and Generic Service clustering rolesSQL Server• Database replication
Tip: Database replication would be the BEST way to ensure disaster recovery in a data center SAN with a 2-node failover cluster hosting SQLhttp://technet.microsoft.com/en-us/library/hh831579.aspx
MICROSOFT CONF IDENTIAL – INTERNAL ONLY
Plan and Implement Business Continuity and Disaster RecoveryPlan a backup and recovery strategy
Tip: use Windows Server Backup to backup VM files and folders from shared storage, including open files.
Active Directory domain and forest recoveryDomain Controller restore and cloning
AD object and container restore• Authoritative RestoreActive Directory Recycle BinHyper-V Replicahttp://technet.microsoft.com/en-us/library/jj134172.aspx
http://technet.microsoft.com/en-us/library/jj614621.aspx
MICROSOFT CONF IDENTIAL – INTERNAL ONLY
You are planning to implement two Windows Server 2012 clusters. You need to plan the application of automated Windows Updates in your plans.
What should you include in your plans? [BEST Answer]A. System Center Configuration Manager SUP
RolesB. System Center VMM with WSUS IntegrationC. Cluster Aware Updating (CAU) D. Windows Server Update Services
Sample Question
MICROSOFT CONF IDENTIAL – INTERNAL ONLY
You are planning to implement two Windows Server 2012 clusters. You need to plan the application of automated Windows Updates in your plans.
What should you include in your plans? [BEST Answer]A. System Center Configuration Manager SUP
RolesB. System Center VMM with WSUS IntegrationC. Cluster Aware Updating (CAU) D. Windows Server Update Services
Sample Question - Answer
70-413• Plan and Deploy a Server Infrastructure (20%)• Design and Implement Network Infrastructure Services (20%)• Design and Implement Network Access Services (17%)• Design and Implement an Active Directory Infrastructure (Logical) (22%)• Design and Implement an Active Directory Infrastructure (Physical)
(21%)70-414
• Manage and Maintain a Server Infrastructure (27%)• Plan and Implement a Highly Available Enterprise Infrastructure (26%)• Plan and Implement a Server Virtualization Infrastructure (26%)• Design and Implement Identity and Access Solutions (21%)
Exam Objectives
MICROSOFT CONF IDENTIAL – INTERNAL ONLY
Plan and Implement Virtualization HostsDelegation of virtualization environment• Hosts, services, VMs• Self-service• User Role Profiles• Delegated Administrators• Self-Service Users• Read-Only Administrators• Administrators
Multi-Host libraries• Including equivalent objectsHost Resource OptimizationIntegrate third-party virtualization platformsTip: To enable users to self-create a VM
based on an existing VHD, you need a hardware profile, VM template and a guest OS profilePlanning:
http://technet.microsoft.com/en-us/library/gg610615.aspx Delegation: http://technet.microsoft.com/en-us/library/gg675078.aspx
MICROSOFT CONF IDENTIAL – INTERNAL ONLY
Plan and Implement Virtualization GuestsPlan and implement highly-available VMsTips: • You must create a Cloud before you
can delegate permissions for users to manage their VMs
• Use Microsoft Assessment and Planning (MAP) toolkit scans to generate monthly reports that contain a list of all installed software on VMs without installing additional software on the VMs
Create VMM Templates
Configure Placement Rules
Guest resource optimization• Smart page file• Dynamic memory• RemoteFX• Dynamic Optimization http://technet.microsoft.com/en-us/library/gg675109.aspx http://technet.microsoft.com/en-us/library/gg696970.as
px
MICROSOFT CONF IDENTIAL – INTERNAL ONLY
Plan and Implement Virtualization NetworkingVMM Logical NetworksIP Address and MAC Address settings across multiple Hyper-V hosts• Including IP virtualization
Tip: Know how to enable MAC address spoofing on the virtual network adapter of VMs and why you would do it.
Virtual Network Optimization
http://technet.microsoft.com/en-us/library/gg610596.aspx
MICROSOFT CONF IDENTIAL – INTERNAL ONLY
Plan and Implement Virtualization StorageHyper-V host storage• Standalone vs. clustered• SMB• Cluster Shared Volumes
Hyper-V guest storage• Virtual fibre channel• iSCSI• Pass-through disks
Storage Optimization
http://technet.microsoft.com/en-us/library/gg610600.aspx
MICROSOFT CONF IDENTIAL – INTERNAL ONLY
Plan and Implement Virtual Guest MovementMigration between Hyper-V hosts• Live Migration• SAN migration• Network migration
Plan for and manage V2V
Plan for and manage P2V• Requirements
Tip: Given a list of servers with corresponding operating system and configuration information, know which servers can be converted to VMs
Migration: http://technet.microsoft.com/en-us/library/jj860420.aspx P2V: http://technet.microsoft.com/en-us/library/hh368990.aspx V2V: http://technet.microsoft.com/en-us/library/jj860442.aspx
MICROSOFT CONF IDENTIAL – INTERNAL ONLY
You are planning to deploy the new web app via a Service Template with Network Load Balancing (NLB).
Which component should be added to the Service Template? [Select the BEST Answer]A. Guest OS ProfileB. Host ProfileC. Capability ProfileD. VIP Template
Sample Question
MICROSOFT CONF IDENTIAL – INTERNAL ONLY
You are planning to deploy the new web app via a Service Template with Network Load Balancing (NLB).
Which component should be added to the Service Template? [Select the BEST Answer]A. Guest OS ProfileB. Host ProfileC. Capability ProfileD. VIP Template
Sample Question - Answer
70-413• Plan and Deploy a Server Infrastructure (20%)• Design and Implement Network Infrastructure Services (20%)• Design and Implement Network Access Services (17%)• Design and Implement an Active Directory Infrastructure (Logical) (22%)• Design and Implement an Active Directory Infrastructure (Physical)
(21%)70-414
• Manage and Maintain a Server Infrastructure (27%)• Plan and Implement a Highly Available Enterprise Infrastructure (26%)• Plan and Implement a Server Virtualization Infrastructure (26%)• Design and Implement Identity and Access Solutions (21%)
Exam Objectives
MICROSOFT CONF IDENTIAL – INTERNAL ONLY
Design a Certificate Services InfrastructureMulti-Tier Certificate Authority (CA) hierarchy • Offline Root• Stand-alone vs. Enterprise
Multi-Forest CA deployment
Trust between organizationsNetwork device enrollment
Configure and manage• Offline root CA• Certificate Enrollment Web
Services• Network Device enrollment
Services• Online Certificates Status
Protocol responders
Implement and manage• Administrator role separation• Trust between organizations• CA migration
Monitor CA health
http://technet.microsoft.com/en-us/library/hh831740.aspx
MICROSOFT CONF IDENTIAL – INTERNAL ONLY
Implement and Manage CertificatesManage• Certificate templates• Certificate renewal• Internet-based clients
• Certificate deployment and renewal to network devices
Configure and Manage• Key archival and recovery
Implement and Manage• Deployment• Validation• Revocation
http://technet.microsoft.com/en-us/library/hh831740.aspx
MICROSOFT CONF IDENTIAL – INTERNAL ONLY
Design and Implement a Federated Identity SolutionPlan and implement • Claims-Based authentication• Relying Party Trusts
• Claims Provider Trust rulesPlan for identity integration with Cloud services
Plan and configure Attribute Stores• AD LDS• AD DS• SQL Server
http://technet.microsoft.com/en-us/library/hh831502.aspx
MICROSOFT CONF IDENTIAL – INTERNAL ONLY
Design and implement AD Rights Management Services (AD RMS)Manage• Service Connection Points• Trusted User Domains• Trusted Publishing Domains• Federated Identity support• Distributed and Archived
Rights Policy templatesPlan for and manage AD RMS client deployment
Plan for • High-Availability deployment• Decommissioning
http://technet.microsoft.com/en-us/library/hh831364.aspx
MICROSOFT CONF IDENTIAL – INTERNAL ONLY
You are planning to implement AD CS for supporting certificate management for Web app authentication.
What is the minimum number of certificate servers you should plan to deploy? [Select the BEST Answer]A. TwoB. ThreeC. FourD. Six
Sample Question
MICROSOFT CONF IDENTIAL – INTERNAL ONLY
You are planning to implement AD CS for supporting certificate management for Web app authentication.
What is the minimum number of certificate servers you should plan to deploy? [Select the BEST Answer]A. TwoB. ThreeC. FourD. Six
Sample Question - Answer
Session Objective(s): • Describe key Windows Server 2012 exam objectives• Understand question styles• Prepare more effectively using available study material• Relate practical Windows Server 2012 experience to exam topics
Key Takeaway 1• Identify areas that may require extra studying
Key Takeaway 2• Action Plan for exam preparation and success
In Review: Session Objectives And Takeaways
Breakout Sessions (session codes and titles)Many, but focus on Labs perhaps?
Related content
Labs (session codes and titles)DCIM-H205 Build Your Storage Infrastructure with Windows Server 2012 R2
DCIM-H322 Exploring Virtualization with Windows Server 2012 R2 Hyper-V
DCIM-H321 Windows Server 2012 R2: Introduction to Failover Clustering with Hyper-V
Related Certification Exam70-413 + 70-414
ResourcesLearning
Microsoft Certification & Training Resourceswww.microsoft.com/learning
msdnResources for Developers
http://microsoft.com/msdn
TechNetResources for IT Professionals
http://microsoft.com/technet
Sessions on Demandhttp://channel9.msdn.com/Events/TechEd
Complete an evaluation and enter to win!
Evaluate this session
Scan this QR code to evaluate this session.
© 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries.The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.