Proactive Directory Performance Management

Windows Server includes several tools that help identify potential issues with system resources. When systems are not configured properly and are not assigned appropriate resources such as CPU, RAM, or disk space, systems monitoring will help you identify where bottlenecks occur. Use the buttons below to navigate through the lesson When you identify these bottlenecks,…

Read More

Protecting DCs as Virtual Machines

When a server is created as a VM instead of being installed on a physical computer, it becomes nothing more than a set of files on a disk because the disk drives for the computer are hosted in virtual hard drives. DCs running both AD DS and DNS are ideal candidates for virtualization on either…

Read More

Proactive Directory Maintenance and Data Store Protection

AD DS is a distributed database that contains information about the users, the computers, the servers, the services, and more that run in your network, hence its categorization as a network operating system (NOS) as well as a lightweight directory access protocol (LDAP) directory service. Because of this, administration activities can be shared amongst several…

Read More

Active Directory Authentication Quiz

This quiz covers the the training module “Authentication”. This module contains four lessons. Configuring Password and Lockout Policies Auditing Authentication Configuring a Read-Only Domain Controller Password Replication Policy [mtouchquiz 22]

Read More

Password Replication Policy

In the previous lesson we installed an RODC, to continue we will create a branchofficeusers security group and populate it with users. We will then create a password replication policy, monitor credential caching, and prepopulate credentials on the RODC. Use the buttons below to navigate through the lesson In this scenario we will create 3…

Read More

Configuring a Read-Only Domain Controller

Consider an enterprise that is characterized by a main site and  branch offices. The branch offices connect to the main site over WAN links that might be congested, expensive, slow, or unreliable. Users in the branch office must be authenticated by Active Directory to access resources in the domain. Should a DC be placed in…

Read More

Auditing Authentication in Windows Server 2003

When a user logs on to any computer in the domain using his or her domain user account, a domain controller authenticates the attempt to log on to the domain account. This generates an account logon event on the domain controller. Use the buttons below to navigate through the lesson The computer to which the…

Read More

Configuring Password and Lockout Policies in Windows Server 2008

In a Windows Server 2008 domain, users are required to change their password every 42 days, and a password must be at least seven characters long and meet complexity requirements including the use of three of four character types: uppercase, lowercase, numeric, and nonalphanumeric. Use the buttons below to navigate through the lesson Three password…

Read More

Active Directory Group Policy Quiz

This quiz covers the the training module “Group Policy”. This module contains three lessons. Introduction to Group Policy Group Policy Inheritance Creating a Group Policy [mtouchquiz 21]

Read More

Creating a Group Policy

Scenario: your company has just employed a temporary worker who is tasked with editing xml documents. He requires an xml editor to be installed on his workstation. This is a large project and may require further editors to be employed. To ease the administration of the software deployment, you decide to create a group policy…

Read More