Sunday, August 17, 2014

System center configuration Manager 2012 syllabus(70-243)

  • Plan System Center Configuration Manager hierarchy and site system roles
·         Pre-installation requirements, examining the current computing environment, CAS, primary and secondary sites, branch cache, designing and recommending System Center Configuration Manager server architecture, extending the Active Directory schema (DNS service records, WINS), managed providers, discovery methods, and planning migration
  • Plan and configure security
·         PKI or self-signed certificates, HTTP or HTTPs implementation, NAP, FEP, and planning role-based security
  • Define the Business Continuity Plan (BCP)
·         Disaster recovery and site maintenance
Preparation resources

  • Configure the OSD environment
·         Configuring WDS, configuring PXE, configuring the VM build environment, and integrating with MDT
  • Build and capture an image
·         Updating base images, task sequences
  • Deploy an image
·         New (bare metal) and upgrade images, VHD deployment
  • Manage images
·         Drivers, servicing
Preparation resources
  • Create an application
·         Defining deployment types, deploying applications to RDSH, MSI, and App-V, and converting a package
  • Deploy an application
·         User device affinity, compliance settings, Software Center, and task sequences
  • Monitor application deployment
·         Resolving issues, managing application distribution points, distribution point groups, Content Library, SQL Server Reporting Services (SSRS), log files, and In Console Monitoring
  • Manage the software library and application catalog
·         Web portal configuration, work schedule, and definition of primary machines for users
  • Create and monitor software updates
·         Automatic Deployment Rules (ADR), SSRS, creating update groups, creating deployment packages, log files, and In Console Monitoring
  • Configure FEP clients by using System Center Configuration Manager
·         Creating and managing policy by using Configuration Manager, configuring definitions within the client policy, exporting from Configuration Manager, choosing which template to use, and select exclusions
Preparation resources
  • Build a Configuration Item (CI)
·         Creating a CI, importing a CI, setting CI versioning, and remediation rules
  • Create and monitor a baseline
·         Importing a configuration pack, building a custom baseline, SSRS, log files, In Console Monitoring, deploying a baseline
Preparation resources
  • Manage collections
·         Setting maintenance windows, defining rules for collections (collection membership, query-based collections), collection-specific settings
  • Monitor site health
·         SSRS, log files, In Console Monitoring, Toolkit
  • Configure software updates
·         Sync schedule, catalogs, products, WSUS, and superseded updates
  • Manage site communications
·         Configuring bandwidth settings for a site address, configuring senders, secondary sites (file-based replication, SQL replication paths), resolving DP connections
  • Manage boundary groups
·         Creating boundary groups, using boundary groups in more than one DP, client roaming, Internet-based clients
  • Manage role-based security
·         Security scopes, custom roles, cloned security roles and permissions
Preparation resources
  • Deploy clients
·         GPO, WSUS, logon scripts, manual, client push, OSD task sequence, monitoring client health
  • Manage mobile devices
·         Enrolling mobile devices, Exchange Connector, AMT enrollment point (out-of-band management), and wiping mobile devices
  • Manage client agent settings
·         Desired configuration settings, mobile device client agent, NAP client agent, configuring power management, configuring remote control agent, hardware inventory agent, software inventory agent, software metering agent, advertised programs agent, computer agent
Preparation resources
  • Manage hardware inventory
·         Configuring MOF, export and import settings, enabling or disabling WMI classes, extending hardware inventory to other client assets, WMI or registry reporting
  • Manage software inventory
·         Standardized vendor name, list of tracked inventory, report inventory data, asset intelligence, software metering (enable or disable rules, report software metering results)
  • Monitor inventory data flow
·         Client-to-site, site-to-site
Preparation resources
  • Build queries
·         Console queries, WQL, sub-selects
  • Create reports
·         Cloning and modifying reports, creating custom reports, import and export reports
  • Manage SSRS
·         Configuring security, configuring caching, configuring subscriptions
Preparation resources


Monday, June 16, 2014

MCSE 70-687 syllabus

  • Evaluate hardware readiness and compatibility
·         Choose between an upgrade and a clean installation; determine which SKU to use, including Windows RT; determine requirements for particular features, including Hyper-V, Miracast display, pervasive device encryption, virtual smart cards and Secure Boot
  • Install Windows 8.1
·         Install as Windows To Go, migrate from previous versions of Windows to Windows 8.1, upgrade from Windows 7 or Windows 8 to Windows 8.1, install to VHD, install additional Windows features, configure Windows for additional languages
  • Migrate and configure user data
·         Migrate user profiles; configure folder location; configure profiles, including profile version, local, roaming and mandatory

  • Configure devices and device drivers
·         Install, update, disable and roll back drivers; resolve driver issues; configure driver settings, including signed and unsigned drivers; manage driver packages
  • Install and configure desktop apps and Windows Store apps
·         Install and repair applications by using Windows Installer, configure default program settings, modify file associations, manage access to Windows Store
  • Control access to local hardware and applications
·         Configure application restrictions, including Software Restriction Policies and AppLocker; manage installation of and access to removable devices; configure Assigned Access
  • Configure Internet Explorer 11 and Internet Explorer for the desktop
·         Configure compatibility view; configure Internet Explorer 11 settings, including add-ons, downloads, security and privacy
  • Configure Hyper-V
·         Create and configure virtual machines, including integration services; create and manage checkpoints; create and configure virtual switches; create and configure virtual disks; move a virtual machine’s storage
  • Configure IP settings
·         Configure name resolution, connect to a network, configure network locations
  • Configure networking settings
·         Connect to a wireless network, manage preferred wireless networks, configure network adapters, configure location-aware printing
  • Configure and maintain network security
·         Configure Windows Firewall, configure Windows Firewall with Advanced Security, configure connection security rules (IPsec), configure authenticated exceptions, configure network discovery
  • Configure remote management
·         Choose the appropriate remote management tools; configure remote management settings; modify settings remotely by using MMCs or Windows PowerShell; configure Remote Assistance, including Easy Connect
  • Configure shared resources
·         Configure shared folder permissions, configure HomeGroup settings, configure libraries, configure shared printers, set up and configure OneDrive
  • Configure file and folder access
·         Encrypt files and folders by using Encrypting File System (EFS), configure NTFS permissions, configure disk quotas, configure file access auditing
  • Configure authentication and authorisation
·         Configure user rights, manage credentials, manage certificates, configure biometrics, configure picture passwords, configure PIN, set up and configure Microsoft account, configure virtual smart cards, configure authentication in workgroups or domains, configure User Account Control (UAC) behaviour
  • Configure remote connections
·         Configure remote authentication, configure Remote Desktop settings, configure virtual private network (VPN) connections and authentication, enable VPN reconnect, configure broadband tethering
  • Configure mobility options
·         Configure offline file policies, configure power policies, configure Windows To Go, configure sync options, configure WiFi direct
  • Configure security for mobile devices
·         Configure BitLocker and BitLocker To Go, configure startup key storage
  • Configure and manage updates
·         Configure update settings, configure Windows Update policies, manage update history, roll back updates, update Windows Store apps
  • Manage local storage
·         Manage disk volumes and file systems, manage storage spaces
  • Monitor system performance
·         Configure and analyse event logs, configure event subscriptions, configure Task Manager, monitor system resources, optimise networking performance, configure indexing options

  •  
  • Configure system recovery
·         Configure a recovery drive, configure system restore, perform a driver rollback, perform a refresh or recycle, configure restore points
  • Configure file recovery

·         Restore previous versions of files and folders, configure file history, recover files from OneDrive