CIS 409 Lab 11 Implementing an Advanced Dynamic Host CONFIGURATION Protocol (DHCP) Solution
CIS 409 Lab 21 Installing And Configuring Active Directory Rights Management Services
CIS 409 Lab 1 Configuring Network Load Balancing
Exercise 1.1 Installing the Network Load Balancing Feature
Exercise 1.2 Creating a Windows Server 2012 NLB Cluster
Exercise 1.3 Configuring DNS
Exercise 1.4 Configuring Cluster Properties
Exercise 1.5 Managing the Cluster Nodes
Exercise 1.6 Removing the NLB Cluster
Lab Challenge Upgrading an NLB Cluster
CIS 409 CIS409 CIS/409 ENTIRE COURSE HELP – STRAYER UNIVERSITY
CIS 409 Lab 10 Configuring site-Level Fault Tolerance
Exercise 10.1 Configuring and Enabling Hyper-V Replication
Exercise 10.2 Configuring Replication for a VM
Lab Challenge Configuring Multi-Site Failure Cluster
CIS 409 CIS409 CIS/409 ENTIRE COURSE HELP – STRAYER UNIVERSITY
CIS 409 Lab 11 Implementing an Advanced Dynamic Host CONFIGURATION Protocol (DHCP) Solution
Exercise 11.1 Creating a Vendor Class
Exercise 11.2 Creating a DHCP Policy
Exercise 11.3 Creating and Configuring a Superscope
Exercise 11.4 Creating and Configuring Multicast Scopes
Exercise 11.5 Implementing DHCPv6 Scopes
Exercise 11.6 Configuring DHCP Name Protection
Lab Challenge Creating a DHCP Split-Scope
CIS 409 CIS409 CIS/409 ENTIRE COURSE HELP – STRAYER UNIVERSITY
CIS 409 Lab 12 Implementing an Advanced DNS Solution
Exercise 12.1 Configuring DNSSEC
Exercise 12.2 Enabling DNS Cache Locking
Exercise 12.3 Configuring DNS Logging
Exercise 12.4 Disabling Recursion
Exercise 12.5 Configuring Net mask Ordering
Exercise 12.6 Configuring a Global Names Zone
Lab Challenge Delegating DNS Administration
CIS 409 CIS409 CIS/409 ENTIRE COURSE HELP – STRAYER UNIVERSITY
CIS 409 Lab 13 Deploying And Managing IPAM
Exercise 13.1 Installing an IPAM on a Member Server
Exercise 13.2 Configuring IPAM
Lab Challenge Migrating to IPAM
CIS 409 CIS409 CIS/409 ENTIRE COURSE HELP – STRAYER UNIVERSITY
CIS 409 Lab 14 Configuring A Domain And Forest
Exercise 14.1 Creating a Child Domain
Exercise 14.2 Demoting a Domain Controller
Exercise 14.3 Installing a New Forest
Exercise 14.4 Raising the Domain and Forest Functional Level
Exercise 14.5 Configuring Multiple UPN Suffixes
Lab Challenge Performing an Upgrade Installation
CIS 409 CIS409 CIS/409 ENTIRE COURSE HELP – STRAYER UNIVERSITY
CIS 409 Lab 15 Configuring Trusts
Exercise 15.1 Creating and Configuring a One-Way External Trust
Exercise 15.2 Creating and Configuring a Two-Way Forest Trust
Exercise 15.3 Validating and Testing a Trust
Lab Challenge Configuring Selective Authentication between two Trusted Domains
CIS 409 CIS409 CIS/409 ENTIRE COURSE HELP – STRAYER UNIVERSITY
CIS 409 Lab 16 Configuring Sites
Exercise 16.1Adding Sites and Subnets
Exercise 16.2 Configuring a Bridgehead Server
Exercise 16.3 Creating a Site Link
Exercise 16.4 Modifying the Replication Interval
and Replication Schedule of a Site Link
Lab Challenge Working with DNS SRV Records
CIS 409 CIS409 CIS/409 ENTIRE COURSE HELP – STRAYER UNIVERSITY
CIS 409 Lab 17 Managing Active Directory And Sysvol Replication
Exercise 17.1 Demoting a Domain Controller
Exercise 17.2 Promoting a Domain Controller
Exercise 17.3 Replicating with Active Directory Sites and Services
Exercise 17.4 Using REPADMIN
Exercise 17.5 Configuring Password Replication Policies for an RODC
LAB Challenge Upgrading SYSVOL Replication to DFSR
CIS 409 CIS409 CIS/409 ENTIRE COURSE HELP – STRAYER UNIVERSITY
CIS 409 Lab 18 Implementing Active Directory Federation Services
Exercise 18.1 Installing the Active Directory Federation Services
Exercise 18.2 Creating a standalone Federation Server
Exercise 18.3 Creating and Configuring a Sample WIF Application
Exercise 18.4 Implementing Relying Party Trusts
Exercise 18.5 Configuring the Active Directory Claims Provider Trust
Lab Challenge Configuring a Global Authentication Policy
CIS 409 CIS409 CIS/409 ENTIRE COURSE HELP – STRAYER UNIVERSITY
CIS 409 Lab 19 Installing And Configuring Active Directory Certificate Services
Exercise 19.1 Installing an Enterprise Certificate Authority
Exercise 19.2 Installing a Subordinate Certificate Server
Exercise 19.3 Configuring Certified Revocation List (CRL) Distribution Point
Exercise 19.4 Installing the Online Responder Role
Exercise 19.5 Performing a CA Backup
Lab Challenge Managing Administrative Roles
CIS 409 CIS409 CIS/409 ENTIRE COURSE HELP – STRAYER UNIVERSITY
CIS 409 Lab 2 Configuring Failover Clustering
Exercise 2.1 Configuring the iSCSI Client
Exercise 2.2 Installing the Failover Clustering Feature
Exercise 2.3 Creating a Failover Cluster
Exercise 2.4 Configuring the Quorum
Exercise 2.5 Implementing Cluster Aware Updating
Lab Challenge Upgrading a Failover Cluster
CIS 409 CIS409 CIS/409 ENTIRE COURSE HELP – STRAYER UNIVERSITY
CIS 409 Lab 20 Managing Certificates
Exercise 20.1 Importing and Exporting Digital Certificates
Exercise 20.2 Renewing a CA Certificate
Exercise 20.3 Creating a New User Certificate Template
Exercise 20.4 Requesting a Certificate
Exercise 20.5 Configuring Auto Enrollment
Exercise 20.6 Configuring Enrollment Agents
Lab Challenge Configuring the Key Recovery Agent
CIS 409 CIS409 CIS/409 ENTIRE COURSE HELP – STRAYER UNIVERSITY
CIS 409 Lab 21 Installing And Configuring Active Directory Rights Management Services
Exercise 21.1 Installing Active Directory Rights Management Service (AD RMS)
Exercise 21.2 Creating and Enabling the Super Users Group
Exercise 21.3 Creating a Distributed Rights Policy Template
Exercise 21.4 Enabling and Configuring an Application Exclusion
Lab Challenge Backing Up and Restoring AD RMS
CIS 409 CIS409 CIS/409 ENTIRE COURSE HELP – STRAYER UNIVERSITY
CIS 409 Lab 3 Managing Failover Clustering
Exercise 3.1 Deploying the General Use File Server Role
Exercise 3.2 Deploying a Scale-Out File Server
Exercise 3.3Configuring Failover and Preference Settings
Exercise 3.4 Managing a Cluster and Cluster Nodes
Exercise 3.5 Destroying a Cluster
Lab Challenge Configuring VM Monitoring
CIS 409 CIS409 CIS/409 ENTIRE COURSE HELP – STRAYER UNIVERSITY
CIS 409 Lab 4 Managing VM Movement
Exercise 4.1 Moving a VM Storage Location
Exercise 4.2 Moving a VM to Another Host
Exercise 4.3 Copying a VM
Exercise 4.4 Exporting and Importing a VM
Lab Challenge Configuring Computers for Live Migration
CIS 409 CIS409 CIS/409 ENTIRE COURSE HELP – STRAYER UNIVERSITY
CIS 409 Lab 5 Configuring Advanced file Solutions
Exercise 5.1 Creating an NFS Shared Folder
Exercise 5.2 Installing and Configuring BranchCache
Exercise 5.3 Using File Classification
Exercise 5.4 Configuring File Access Auditing
Lab Challenge Creating an NFS Shared Folder on a Cluster
CIS 409 CIS409 CIS/409 ENTIRE COURSE HELP – STRAYER UNIVERSITY
CIS 409 Lab 6 Implementing Dynamic Access Control
Exercise 6.1 Using Dynamic Access Control
Exercise 6.2 Implementing a Central Access Policy
Lab Challenge Performing Access-Denied Remediation
CIS 409 CIS409 CIS/409 ENTIRE COURSE HELP – STRAYER UNIVERSITY
CIS 409 Lab 7 Configuring and Optimizing Storage
Exercise 7.1 Removing an iSCSI Target
Exercise 7.2 Creating and Configuring an iSCSI Target
Exercise 7.3 Configuring iSCSI Initiator
Exercise 7.4 Using Features on Demand
Lab Challenge Implementing Thin Provisioning
CIS 409 CIS409 CIS/409 ENTIRE COURSE HELP – STRAYER UNIVERSITY
CIS 409 Lab 8 Configuring and Managing Backups
Exercise 8.1 Installing the Windows Server Backup Feature
Exercise 8.2 Performing a Manual Backup of a Local Volume to a Remote Share
Exercise 8.3 Backing up the System State
Exercise 8.4 Managing VSS Settings
Exercise 8.5 Enabling Shadow Copies for Shared Volumes
Lab Challenge Using Hyper-V Snapshots
CIS 409 CIS409 CIS/409 ENTIRE COURSE HELP – STRAYER UNIVERSITY
CIS 409 Lab 9 Recovering Servers
Exercise 9.1 Restoring a folder using Windows Server Backup
Exercise 9.2 Restoring the System State of a System
Exercise 9.3 Restoring a File Using Shadow Copy
Exercise 9.4 Booting Into Safe Mode
Exercise 9.5 Using Command Prompt Repair Tools
Lab Challenge Performing an Authoritative Restore
CIS 409 CIS409 CIS/409 ENTIRE COURSE HELP – STRAYER UNIVERSITY
CIS 409 Week 10 Assignment 2 Managing a Merger (100% Score)
Assignment 2: Managing a Merger
Imagine you work for Quality Corporation (Quality.ad) who has just recently bought Crescent Inc. (Crescent.ad) in a recent merger. Quality and Crescent have separate offices in St. Louis (Quality HQ), Little Rock, and Austin (Crescent HQ). Crescent also has offices in Oklahoma City, Tulsa, and Santa Fe. The desire is to establish trusts between the two (2) AD forests and consolidate core services (DNS, DHCP, etc.) as soon as possible. Both companies are running Server 2012 as Domain Controllers. Their primary DNS, DHCP, and Domain Controller servers are in the two (2) corporate headquarters with secondary servers located in the other cities to reduce latency.For the Quality.ad domain, the Flexible Single Master Operation (FMSO) roles are located on Server01, which is located at the Quality HQ. For the Crescent.ad domain, the FSMO roles are located on RWDC01, which is located at the Crescent HQ. In addition, the Quality.ad domain has several servers configured as a Certificate Authority, and the Crescent.ad domain has a single Certificate Authority.
During this acquisition, you will need to consider the following:
• The Crescent Inc. has developed several enhancements for the widgets that your company produces. The engineering documents are installed on the ServerDocs located at the Austin office. You will need to configure the necessary systems so that the engineers from Quality Corporation can access these documents. Since these documents are considered proprietary and highly confidential, you must ensure that no other users except the two (2) engineering teams can access these documents and that the documents stay within the company.
• For both organizations, all user IDs and digital certificates from the other organization must be recognized.
Write a six to eight (6-8) page paper in which you:
1. Explain the key considerations behind establishing trust relationships between the two (2) domains.
2. Suggest a method for consolidating Core Network services.
3. Provide a plan for integrating both AD forests eliminating duplication of service wherever possible.
Your assignment must follow these formatting requirements:
• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
• Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are:
• Describe, manage, and install Active Directory replication, federation services, and certificate services.
• Demonstrate the ability to plan an advanced AD, DHCP, and DNS solution.
• Describe and plan for configuring a domain and forest as well as configuring trusts.
• Use technology and information resources to research issues in advanced network infrastructure environments.
• Write clearly and concisely about advanced network infrastructure topics using proper writing mechanics and technical style conventions.
CIS 409 CIS409 CIS/409 ENTIRE COURSE HELP – STRAYER UNIVERSITY
CIS 409 Week 6 Assignment 1 Disaster Recovery Plan (100% Score)
Assignment 1: Disaster Recovery Plan
You are an administrator for the Contoso Corporation. The Contoso Corporation has two (2) large sites. The corporate office is in New York and the manufacturing site is in Cleveland, Ohio. In addition, the Contoso Corporation has five (5) smaller sites.
At the Corporate site, you currently have eight (8) physical Hyper-V hosts that host approximately one hundred twenty (120) virtual machines. The virtual machines are running Windows Server 2008 R2 and Windows Server 2012. The servers are needed to host email, various databases, file services, print services, and a point-of sales-application. The virtual machines are stored on a centrally located storage area network (SAN) that has multiple power supplies, and use redundant array of independent disks (RAID).
Over the last three (3) years, you have had two (2) power failures that caused the servers to go down at the corporate office. Recently, during one (1) of these incidents, files on one (1) of the servers were corrupted. It was later discovered that the backup could only partially restore the data files, but could not restore the server itself.
The servers must remain available and reliable. As the administrator, you must ensure that you can recover from a failure or problem quickly with minimum loss.
Write a three to five (3-5) page paper in which you:
1. Develop a continuity plan / disaster recovery plan for Contoso Corporation in which you address the following:
1. Suggest an approach that provides redundancy (failover) for all mission critical functions in the event of a disaster including power failure. Consider the following in your approach: Essential Infrastructure; Email; Database; File Services; Print Services; Point-of-Sale Applications; Power Redundancy Solutions.
2. Identify the changes that should be made to the backup procedures in order to address the problem with the server backups.
3. Outline the necessary actions that Server Administrators must verify for proper operation of servers in the event of a failover.
4. Provide a plan for returning all services back to the primary systems once the crisis has passed.
5. Examine the pros and cons of moving part of the data center to the Cleveland office and housing it there on a permanent basis. Provide your recommendation for the stated action.
Your assignment must follow these formatting requirements:
• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
• Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are:
• Demonstrate the ability to describe, manage, and configure load balancing and failover clustering.
• Demonstrate the ability to configure and manage backups to include role-specific and online or cloud environments.
• Demonstrate the ability to recover servers to include files and volumes.
• Use technology and information resources to research issues in advanced network infrastructure environments.
• Write clearly and concisely about advanced network infrastructure topics using proper writing mechanics and technical style conventions.