Create and Manage Group Policy |
Overview of Group Policy |
Create a Group Policy Objects |
Account Policies |
Local Policies |
Restricted Groups |
System Services |
Registry and File System |
Windows Firewall in Group Policy |
Software Restriction Policies |
Application Control Policies |
Loop Back Processing |
Folder Redirection |
Group Policies Preferences |
Slow Link Detection |
Administrative Templates |
Security Templates |
Software Installation |
Computer Assign Software |
User Assign Software |
User Publish Software |
WMI Filtering |
Inheritance |
GPO Backup |
Resultant Set of Policy |
Password Setting Object |
Securing Active Directory Domain Services |
Securing Domain Controllers |
Implementing Account Security |
Configuring Managed Service Accounts |
Manage Service Principal Names |
Configure Kerberos Constrained Delegation |
Deploying and Managing AD CS |
Describe AD CS |
Install a Enterprise Certificate Authority |
AIA & CDP |
Online Responder |
Certificate Template |
Certificate for IIS |
Certificate for VPN Server |
Pending Requests |
Revoked Certificates |
CA Hierarchy |
Implementing and Administering AD RMS |
Overview of AD RMS |
Install an AD RMS |
Install an AD RMS with HTTP |
AD RMS Console |
Deploying and Managing an AD RMS |
Configuring AD RMS Content Protection |
Deploying and Administering AD FS |
Overview of AD FS |
Install and Configure Active Directory Federation Services |
Claims Provider |
Relying Party Trust |
Authentication Methods |
Implement Web Application Proxy |
Monitoring, Managing, and Recovering AD DS |
Introduction |
Performance Monitor |
Resource Monitor |
Task Manager |
Managing Active Directory Snapshots |
Implement the Active Directory Recycle Bin |
Resorting an object with Active Directory Administrative Center |
Backing up Active Directory |
Restoring Active Directory Data |