• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/118

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

118 Cards in this Set

  • Front
  • Back

Tunneling Protocols




IKEv2 - used to setup secure SA (security association)


PPP (obsolete)


L2TP VPN


PPTP (obsolete)

Internet Key Exchange


Point to Point Protocol


Layer 2 Tunneling Protocol


Point-to-Point Tunneling Protocol

Authentication Protocols




PAP


CHAP


MS-CHAPV2


EAP

PAP - Backwards compatibility. No encryption


CHAP - old like PAP but with Encryption


MS-CHAPV2 - best choice


EAP - Radius or NAP

CMAK

CMAK - Connection Manager Administration Kit




Create and deploy VPN profiles

NAP

Network Access Protection


(depricated)

Forefront UAG

Forefront Unified Access Gateway

Why is Direct Access better?

No PKI certs


No consec. public IPs


Can be on same server as RRAS


Simplified deployment

Ipv4 / ipv6 tunneling protocols

6to4 - DA client has public IP (directly connected)




Teredo - DA client behind NAT (private IP) UDP 3544




Last option: IP-HTTPS - DA behind NAT, but UDP 3544 blocked

ISATAP

Manages outbound IPv6for Direct Access


(turn it on for the future)




Intra-Site Automatic Tunnel Addressing Protocol

What are the 3 things to know for the 413?

Direct Access is an always on VPN.




System Center VM Manager is how to make a private cloud.




IPAM is great for government or HIPAA that needs to audit.

ADFS

Active Directory Federated Services isn't so bad for device management.




Like Sharepoint it has gotten much simpler.

Windows Server 2016 Servercore

All boxes we setup should be managed via remote server manager.




Just have to setup Remote-PS and WSMAN




(it will ensure the longevity of VNS support)

What are work folders?

Similiar to offline files and folder redirection accept files are accessible externally via HTTPS




(can connect with non domain PC using credentials if u have a public cert)





What do you need for Work folders?

Windows Server 2012 R2 and above




Windows 8.1 and above or


Windows 7: Pro, ultimate, or Enterprise


(with download package)




Also exists clients for iOS, Android, Windows phone

What are the limits of work folders?

There is no ability for group folder share.




No ability to share outside organization.




To access outside of network need Web App Proxy and AD FS.

How to setup work folders on server?

add work foldersrole.


New sync share.




Externally available: add roles WAP / ADFS


certificate on server (public or push private)


IIS Web site


Publish URL through Web App Proxy

How to setup work folders on workstations

Control panel > setup work folders




(Windows 7 must download work folders package)

What is workplace join?




(not a full domain join)

Claims-based SSO (Single Sign On) for non-domain devices.




Allows a user to join a personal machine to access resources that have been selectively granted.

Workplace Join limitations

No group policy or traditional management.




AD object created, but access must be granted selectively. (not a domain user)

Workplace join requirements

AD FS




Device REgistration services




UPNs (Dan@vns.net as opposed to doldenkamp)

What is Active Directory Federation Services


(AD FS)

Web service that grants identity (SSO) thru claims based authentication




Can serve as an intermediary for

What is claims based authentication

Specified attributes representing users and computers




Authentication does not use Windows NT username




No AD trust (or even windows) required

what do you need on your certificate and DNS to make AD FS work for work folders external?

Public Wildcard cert or SAN with:


server FQDN (ADFS-box.vns.net)


enterpriseregistration.vns.net




DNS:


A record for FQDN to ADFS server

What is WAP?


Web Application Proxy

Reverse proxy (from the outside to the inside)




formerly UAG (forefront Unified Access Gateway)




replaces AD FS Proxy




For publishing internal apps / services to outside

What 2 things do you need for:




Internet based Work Folders


and Workplace join

WAP & AD FS

What works with workplace join?

Do not suggest workplace join. MS is moving to Intune and Azure AD for device enrollment.




Windows 8.1, iOS, Android




(Windows 7 client has a separate download)


(Windows 10 not supported)

What do you need to link on premise to Windows Azure services?

Site to Site VPN.




(not necessary for O365 DirSync)

What are load balancing DIPs?

Dedicated IP addresses.




For adding nodes to Direct Access load balancing cluster.

What are entry points for with regards to Direct Access?

used for Multisite deployments to associate groups with specific Direct Access servers.



Direct Access requirements

server: Windows server 2012 R2




client: Windows 8.1 and above

NAP

Network Access Protection


(depricated)




Making clients get updated and AV cleaned before access internal resources

What can Domain rename affect?

AD partitions, DNS, replication, user logon experience

What tools to use for domain rename

Rendom.exe


GPFixup.exe

How to export / restore GPO?

Group Policy Management >


right click Group Policy Objects > Backup




Actions > migration table editor


tools > Populate from backup




Right click > browse: to map to new objects


create new GPO > Import settings

What is PES used for?

Password Export Server (PES)




A DLL used to encrypt passwords for use when migrating users to a new domain while retaining password security.

How to use PES on source and destination domains

commandline key setup for pes.pes on source



ADMT Password Migration DLL Setup on destination




Ensure service is running.

How to change a domain name step 1:




Rendom





Rendom / list


modify the xml


Rendom /showforest to view


rendom /upload


rendom /prepare


if error replicate Active directory


rendom /exexcute

change domain name step 2:




GPFixup

GPFixup /old dns /new dns




gpfixup / old netbios /new netbios




rendom /clean


rendom /end




(next fix domain membership of workstations)

MDOP

Microsoft Desktop Optimization Package

AGPM

Advanced Group Policy Management console

GPO applying priority mnemonic:




SDOU

(L)ocal policy is applied first




then (S)ite


(D)omain


(Organizational (U)nit policy




tip: deploy as few GPOs as possible

When to use enforce inheritance for GPOs

When you are managing multiple domains and are trying to over-ride an admin who has blocked inheritance or need to overwrite below policies.




(so pretty much never. It changes the order of applying GPO and applies it last.)

Faster GPOs

Asynchronism GPO settings




(don't wait for the network before letting users log on)

GPO best practices

-Avoid site linked GPOs


-Seperate Users and computers


-Multiple OUs is ok but avoid nested OUs if possible




(except disabled or deleted sub-OU for organization)

How to do change management (versioning) and GPO approval?

AGPM

What is loopback processing for GPOs



replace mode:


applies both the computer & user policies




merge mode: applies both the computer & user policies but computer policies win out




[ie: when user logs into machine (terminal server or kiosk)]

Powershell GPO backup

Backup-GPO -All -Path c:\backup

What does this command do?




Invoke-command -ComputerName (get-content "c:\servers.txt") -scriptblock {invoke-gpupdate}

force a text list of computers to update their group policy




You can also right click an OU and select group policy update in Server 2012

select * from win32_OperatingSystem where version like "6.2%" and producttype = "3"

WMI filtering for targeting Windows 8.1 machines




(a GUI tool to create a WMI query is freeware WMI Explorer 2.0)




WMI filters can be applied to a GPO to limit the GPO's scope

What is the group policy refresh window?

90 minutes + random offset


DC's refresh every 5 minutes




can be adjusted for slow link

What is Desktop Optimization Pack for software assurance?




(download for MSDN or intune users)

Bitlocker Admin & monitoring


Enterprise desktop


User experience virtualization




Advanced GP Mgmnt - versioning, differences, change control, delete failsafe (recycle bin)




(useful for Producers)

What is the default slow link detection threshold

500 Kbps




For client side extensions:




(scripts, folder redirection, printers, registry security)




Win 8.1 and higher does GPO caching

Modern replacement for Group Policy?

Desired State Configuration (DSC)




accomplishes same goals as GP w/o GP overhead.

AD Object security:




- DACL with AD


-protet against deletion flag

Discretionary Access Control List.




Every AD object: OU, group, user, computer, GPO, has a DACL.




Enable advanced to view security tab


Defines what an object can do.

Admin SD Holder

Protects against privilege escalation attacks and DOS attacks.




- way to protect enterprise & domain admin account from modification




(not a 413 exam topic)




ADUC > System > AdminSDHolder

Default authentication protocol used by Active DIrectory

Kerberos




[Kerberos delegation - provide service accounts with ability to relay credentials. (act as user once authenticated)]

How to delegate access to an OU in a mixed control environment

Right click OU in ADUC


Delegate acess wizard

How to setup Password reset for helpdesk






After delegation access has been granted

MMC Taskpads:


Install RSAT tools


mmc /a (for author mode)


add snap-in


drill down ADUC to OU


Right click create new window


Right click root: New taskpad window


deploy with RSAT tools installed

What is the default protocol for AD replication

RPC over IP




replication topologies:


ring, hub and spoke, full mesh, hybrid




(number / direction of connections)

413 question about AD sites info

Look at topology and paths. Calculate costs.




Know that lowest cost is the fastest path.




Multi-hop paths will add the cost of each hop when calculating the route for AD site sync.

AD replication monitoring tools

CLI:


Repadmin /showrepl /syncall /showconn


PS Get-ADReplicationFailure


PS Get-ADReplicationPartnerMetadata


Get-ADReplicationUptoDateVectorTable




GUI: (Replmon depricated)


ADREPLSTATUS tool (free download)



Simplest way to identify AD replication problems?

download ADREPLStatus tool




- click refresh replication status


- click errors only

Site link best practices

Set lower speed links with higher cost.


Site links should only have two sites per link.


Don't define scheduling unless reasons.


Diagram the flow.




Large networks?


Think interconnected hub and spokes


or multi hub & spoke for redundancy

What are the FISMO roles?

Schema master


Domain naming master


RID master


PDC emulator


Infrastructure master




You should know what they do by now.

differentiate between PAS and FAS

Partial Attribute Set - read-only partition that the GC carries. (RO is the forest parts outside of local domain)

Linking FSMO and FL (Funtional Level features)

ie: Can you do DC cloning with a FL of . . .




view 412 cards for FL features

Why is Global catalog important?






GC attribute enabled under sites > servers > NTDS settings: properties

required for user logon:


forest wide search, UPN resolution




Put GC on every DC . . except (edge case)




for multi-domain foreset (none of our sites)


don't put infrastructure master on GC

Who has the FSMOs?

Powershell or GUI: ADUC / AD sites / AD domain




best w/ CLI:


netdom query fsmo

How to change schema master?

Register a DLL and load schema master with MMC




All other FSMO are simple to change via GUI.




I prefer CLI: NTDSUtil /?


/? will walk you through it

Show me a worthless PS script to display the replicated parts of the PAS

Get-ADObject -SearchBase "CN=Schema, CN=Configuration,DC=Company,DC=pri"


-LDAPFilter "(isMemberOfPartialAtributeSet=TRUE)"


-Properties ldapdisplayname | Select ldapdisplayname




effing beautiful how easy to query by attribute

What FSMO roles are critical to AD Forest scope?

Forest Scope:


Schema Master


Domain naming master




(put on one DC in forest root and secure)

What FSMO roles are critical to AD domain scope?

Infrastructure master - inter domain obj ref.




RID Master - new pool of unique IDs




PDC emulator - process pwd changes


rep DC updates, time sync, DM browser




(put RID & PD on single DC)

What problem does DC cloning solve?

Snapshot recoverying VM DCs




solution: VM-Generation-ID attribute


(works in Hyper-V & vSphere if follow steps)




Duplicate a functioning domain member.




(AD prep)

DC Cloning requirements?

- Cloned server must be running Server 2012


- Forest functional level 2003


- AD Schema version must be 2012 (ver 56)


-PDC em. FSMO holder must be 2012


- Add computer to "Cloneable DC" AD group


- Create xml w/ PS (%systemroot%\NTDS)


on VM startup windows will sysprep from XML

What scenario do you recommend a RODC

When a branch office has no local IT staff, few users, potential WAN links, and limited physical security.

What does RODC offer

Enhanced security. - no duh


R/O all partitions, DNS, Sysvol


cached creds, FAS, ARS




make it servercore, FOD (features on demand)


and bitlocker

What are FAS and ARS?

FAS - Filtered Attribute Set


ARS - Administratrive Role Seperation




security features

How to setup an RODC with creds?

ADUC


Right click Domain controllers


"Pre-create RODC acct)




Do this BEFORE creating the computer account


install ADDS (do not join to domain)


When promoting then select the RODC acct

kn ow the two RODC password rep groups for password caching

Denied RODC Password replication group


(deny does not prevent logon, just prevents caching of creds)




Allowed RODC Password replication group

deduplication volume requirements

No system or boot volume




MBR /GPT ok but file system must be NTFS




no de-duping CSV (clustered shared volume)




Remotely mapped not supported

When to use failover clustering vs network load balancing

clustering is typically recommended for stateful applications (ie: applications or databases)


Only one node is up at any given time.




NLB spreads the load. NLB is easier to setup but does not save the user's state.

What tools to migrate a domain?

ADMT (Active Directory Migration Tools) to move AD related objects




GPMC to migrate GPOs

I need to track / audit IP address leases

IPAM.




Note:


Server 2012 req'd for IPAM


cannot be installed on DHCP server

Sync-ADObject

replicate objects between DCs.


(restore from recycle and then sync)




Also used to populate passwords in RODC

What is KMS for server deployment

licensing strategy.




Key Management Services




centralized activation of multiple clients with volume activation services

What is VAMT

VAMT 3.0


Volume Activation Management Tool




Generate license reports.

Get-Azure Publish Settings File The Get-AzurePublishSettingsFile cmdlet opens your default browser, signs into your Windows Azure account, and automatically downloads a .publishsettings file that contains information and a certificate for your Windows Azure subscription.

This file is used by the Import-AzureSubscription cmdlet and is an XML file with a “.publishsettings” extension.

The Import-AzurePublishSettingsFile cmdlet imports a .publishsettings file that has been downloaded using the Get-AzurePublishSettingsFile cmdlet. This file contains settings and an encoded certificate that provides management credentials for the Windows Azure account.

Set Azure Storage Account


The Set-AzureStorageAccount cmdlet updates the properties of an Azure storage account in the current subscription.

O D X Windows Offloaded Data Transfer (ODX)





O.D.X functionality in Windows maximizes an enterprise’s investment in intelligent storage arrays by enabling the arrays todirectly transfer data within or between compatible storage devices, bypassing the host computer. Windows Offloaded Data Transfers Overview

Un Register- D N S Server Directory Partition

Un Register- D N S Server Directory Partition


cmdlet deregisters a Domain Name System (DNS) server from a specified DNS application directory partition.

Branch Cache is designed to reduce WAN link utilization and improve application responsiveness for branch office workers who access content from servers in remote locations. Branch office client computers use a locally maintained cache of data to reduce traffic over a WAN link.

The cache can be distributed across client computers (Distributed Cache mode) or can be housed on a server in the branch (Hosted Cache mode).

Implement Network Access Protection (NAP).

Ensure that NAP with IPSec enforcement can be configured.

Health Registration Authority

H R A is a component of aNetwork Access Protection (NAP) infrastructure that plays a central role in NAP Internet Protocol security (IPsec) enforcement. HRA obtains health certificates on behalf of NAP clients when they are compliant with network health requirements.

S C V M M

System Center Virtual Machine Manager

REN DOM

Rendom dot exe is a command-line tool that is used to rename Active Directory domains.

NET DOM

NET DOM Makes it possible for administrators to manage Windows Server 2003 and Windows 2000 domains and trust relationships from a command prompt.

Ree D I R user

Redirects the default container for newly created users to a specified target OU so that newly created user objects are created in the specific target OU instead of in CN=Users.

REP Admin

Makes it possible for administrators to diagnose Active Directory replication problems between domain controllers running Windows operating systems.

S P N

Service Principal Names

Set S P N

Makes it possible for administrators to read, modify, and delete the Service Principal Names (SPN) directory property for an Active Directory service account.

L DIF DEE

Creates, modifies, and deletes directory objects on computers running Windows Server 2003 or Windows XP Professional operating systems.

AD Prep

Extends the Active Directory schema and updates permissions as necessary to prepare a forest and domain for a domain controller that runs the Windows Server 2008 operating system.

Get- AD Authentication Policy

Gets one or more Active Directory DomainServices authentication policies

F A S

filtered attribute set

Search Flag

for a readonly domain controller (RODC) and marking the attribute as confidential data.

K C C

The Knowledge Consistency Checker

What does K C C do?

The replication topology itself consists of the set of connection objects that enable inbound replication from a source domain controller to the destination domain controller that stores the connection object. The Knowledge Consistency Checker creates these connection objects automatically on each domain controller.

Internet Key Exchange (I K E or I K E v2) is the protocol used to set up a security association (S A) in the I P sec protocol suite.

Secure Socket Tunneling Protocol S S T P is a form of V P N tunnel that provides a mechanism to transport P P P or L 2 T P traffic through an S S L 3.0 channel.

D N S locking property

Cache locking is configured as a percent value. For example, if the cache locking value is set to 50, then the D N S server will not overwrite a cached entry for half of the duration of the T T L. By default, the cache locking percent value is 100. This means that cached entries will not be overwritten for the entire duration of the T T L.

N A T NAT Network address translation

Network address translation (N A T) allows you to share a connection to the public Internet through a single interface with a single public IP address. The computers on the private network use private, non-routable addresses. NAT maps the private addresses to the public address.

W D S Windows Deployment Services using multi casting

Consider implementing multicasting if your organization: Has network routers that support multicasting. Is a large company that requires many concurrent client installations. Wants to use network bandwidth efficiently. This is because with this feature, images are sent over the network only once, and you can specify limitations

Sync- A D Object

The Sync- A D Object cmdlet replicates a single object between any two domain controllers that have partitions in common. The two domain controllers do not need to be direct replication partners. It can also be used to populate passwords in a read-only domain controller R O D C cache.

I PAM

I PAM includes components for: Automatic IP address infrastructure discover)’: I PAM discovers domain controllers, D H C P servers, and D N S servers in the domains you choose.

I PAM also enables I P address tracking using D H C P lease events and user logon events collected from Network Policy Server ( N P S), domain controllers, and D H C P servers.

Tracking is available by I P address, client ID, host name, or user name. Monitoring and management of D H C P and D N S services: I PAM enables automated service availability monitoring for Microsoft D H C P and D N S servers across the forest.

Network Load Balancing N L B

The Network Load Balancing feature distributes traffic across several servers by using the T C P I P networking protocol. By combining two or more computers that are running applications into a single virtual cluster, N L B provides reliability and performance for web servers and other mission-critical servers.

implement RADIUS authentication for V P N connections.

Modify the authentication provider.




The web application must use integrated Windows authentication. Users’ credentials must be passed from the web applications to the See quell Server.

the Data Deduplication feature doesn’t do everything in this version. It is only available in certain Windows Server 2012 editions and has some limitations. Deduplication was built for N T F S data volumes and it does not support boot or system drives and cannot be used with Cluster Shared Volumes (C S V)

We don’t support deduplicating live V M or running See quell databases.

Microsoft Desktop Optimization Pack M DOP

The Microsoft Desktop Optimization Pack for Software Assurance further extends this value by reducing application deployment costs, enabling delivery of applications as services, and allowing for better management and control of enterprise desktop environments.

Together these technologies deliver a highly cost-effective and flexible Windows desktop management solution.

The Microsoft Desktop Optimization Pack M DOP for Software Assurance is an add-on subscription license available. It uses innovative technologies to help reduce the total cost of ownership of the Windows desktop by accelerating operating system and application management and enhancing IT responsiveness and end-user uptime.