Configure WSUS synchronization
Configure WSUS groups
Manage patch management in mixed environments Monitor servers
Configure Data Collector Sets (DCS)
Configure alerts
Monitor real-time performance
Monitor virtual machines (VMS)
Monitor events
Configure event subscriptions
Configure network monitoring
Schedule performance monitoring
Configure Distributed File System (DFS), Chapter 11
Install and configure DFS namespaces
Configure DFS Replication Targets
Configure Replication Scheduling
Configure Remote Differential Compression settings
Configure staging
Configure fault tolerance
Clone a DFS database
Recover DFS databases
Optimize DFS replication
Configure File Server Resource Manager (FSRM), Chapter 11
Install the FSRM role service
Configure quotas
Configure file screens
Configure reports
Configure file management tasks
Configure file and disk encryption, Chapter 11
Configure Bitlocker encryption
Configure the Network Unlock feature
Configure Bitlocker policies
Configure the EFS recovery agent
Manage EFS and Bitlocker certificates including backup and restore
Configure advanced audit policies, Chapter 11
Implement auditing using Group Policy and AuditPol.exe
Create expression-based
Create removable device audit policies
Configure DNS zones, Chapter 12
Configure primary and secondary zones
Configure stub zones
Configure conditional forwards
Configure zone and conditional forward storage in Active Directory
Configure zone delegation
Configure zone transfer settings
Configure notify settings
Configure DNS records, Chapter 12
Create and configure DNS Resource Records (RR) including A, AAAA, PTR, SOA, NS, SRV, CNAME, and MX records
Configure zone scavenging
Configure record options including time to live (TTL) and weight
Configure round robin
Configure secure dynamic updates
Configure VPN and routing, Chapter 13
Install and configure the Remote Access role
Implement Network Address Translation (NAT)
Configure VPN settings
Configure remote dial-in settings for users
Configure routing
Configure Web Application proxy in passthrough mode
Configure DirectAccess, Chapter 13
Implement server requirements
Implement client configuration
Configure DNS for DirectAccess
Configure certificates for DirectAccess
Configure Network Policy Server (NPS), Chapter 14
Configure a NPS server including RADIUS proxy
Configure RADIUS clients
Configure NPS templates
Configure RADIUS accounting
Configure certificates
Configure NPS policies, Chapter 14
Configure connection request policies
Configure network policies for VPN clients (multilink and bandwidth allocation, IP filters, encryption, IP addressing)
Import and export NPS policies
Configure Network Access Protection (NAP), Chapter 14
Configure System Health Validators (SHVs)
Configure health policies
Configure NAP enforcement using DHCP and VPN
Configure isolation and remediation of non-compliant computers using DHCP and VPN
Configure NAP client settings
Configure service authentication, Chapter 15
Create and configure Service Accounts
Create and configure Group Managed Service Accounts
Configure Kerberos delegation
Manage Service Principal Names (SPNS)
Configure virtual accounts
Configure Domain Controllers, Chapter 15
Transfer and seize operations master roles
Install and configure a read-only domain controller (RODC)
Configure domain controller cloning
Maintain Active Directory, Chapter 15
Back up Active Directory and SYSVOL
Manage Active Directory offline
Optimize an Active Directory database
Clean up metadata
Configure Active Directory snapshots
Perform object- and container-level recovery
Perform Active Directory restore
Configure and restore objects by using the Active Directory Recycle Bin
Configure account policies, Chapter 15
Configure domain and local user password policy settings
Configure and apply Password Settings Objects (PSOs)
Delegate password settings management
Configure account lockout policy settings
Configure Kerberos policy settings
Configure Group Policy processing, Chapter 16
Configure processing order and precedence
Configure blocking of inheritance
Configure enforced policies
Configure security filtering and WMI filtering
Configure loopback processing
Configure and manage slow-link processing and group policy caching
Configure client-side extension (CSE) behavior
Force group policy update
Configure Group Policy settings, Chapter 16
Configure settings including software installation, folder redirection, scripts, and administrative template settings
Import security templates
Import custom administrative template file
Convert administrative templates using admx migrator
Configure property filters for administrative templates
Manage Group Policy objects (GPOs), Chapter 16
Back up, import, copy, and restore GPOs
Create